]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-hppa.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
7898deda 2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001
252b5132
RH
3 Free Software Foundation, Inc.
4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
35#include "elf-hppa.h"
edd21aca 36#include "elf32-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
30667bf3 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
30667bf3 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
30667bf3
AM
144enum elf32_hppa_stub_type {
145 hppa_stub_long_branch,
146 hppa_stub_long_branch_shared,
147 hppa_stub_import,
148 hppa_stub_import_shared,
149 hppa_stub_export,
150 hppa_stub_none
151};
152
30667bf3 153struct elf32_hppa_stub_hash_entry {
252b5132 154
edd21aca 155 /* Base hash table entry structure. */
252b5132
RH
156 struct bfd_hash_entry root;
157
edd21aca
AM
158 /* The stub section. */
159 asection *stub_sec;
160
161 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 162 bfd_vma stub_offset;
252b5132
RH
163
164 /* Given the symbol's value and its section we can determine its final
165 value when building the stubs (so the stub knows where to jump. */
30667bf3 166 bfd_vma target_value;
252b5132 167 asection *target_section;
30667bf3
AM
168
169 enum elf32_hppa_stub_type stub_type;
170
171 /* The symbol table entry, if any, that this was derived from. */
172 struct elf32_hppa_link_hash_entry *h;
173
25f72752
AM
174 /* Where this stub is being called from, or, in the case of combined
175 stub sections, the first input section in the group. */
176 asection *id_sec;
252b5132
RH
177};
178
30667bf3
AM
179struct elf32_hppa_link_hash_entry {
180
181 struct elf_link_hash_entry elf;
182
183 /* A pointer to the most recently used stub hash entry against this
184 symbol. */
185 struct elf32_hppa_stub_hash_entry *stub_cache;
186
30667bf3
AM
187 /* Used to count relocations for delayed sizing of relocation
188 sections. */
189 struct elf32_hppa_dyn_reloc_entry {
190
191 /* Next relocation in the chain. */
192 struct elf32_hppa_dyn_reloc_entry *next;
193
98ceb8ce
AM
194 /* The input section of the reloc. */
195 asection *sec;
30667bf3
AM
196
197 /* Number of relocs copied in this section. */
198 bfd_size_type count;
98ceb8ce
AM
199
200#if RELATIVE_DYNRELOCS
201 /* Number of relative relocs copied for the input section. */
202 bfd_size_type relative_count;
203#endif
204 } *dyn_relocs;
30667bf3
AM
205
206 /* Set during a static link if we detect a function is PIC. */
12cca0d2
AM
207 unsigned int maybe_pic_call:1;
208
209 /* Set if the only reason we need a .plt entry is for a non-PIC to
210 PIC function call. */
74d1c347
AM
211 unsigned int pic_call:1;
212
213 /* Set if this symbol is used by a plabel reloc. */
214 unsigned int plabel:1;
30667bf3
AM
215};
216
30667bf3
AM
217struct elf32_hppa_link_hash_table {
218
252b5132 219 /* The main hash table. */
ebe50bae 220 struct elf_link_hash_table elf;
252b5132
RH
221
222 /* The stub hash table. */
edd21aca 223 struct bfd_hash_table stub_hash_table;
252b5132 224
30667bf3
AM
225 /* Linker stub bfd. */
226 bfd *stub_bfd;
227
30667bf3
AM
228 /* Linker call-backs. */
229 asection * (*add_stub_section) PARAMS ((const char *, asection *));
230 void (*layout_sections_again) PARAMS ((void));
231
25f72752
AM
232 /* Array to keep track of which stub sections have been created, and
233 information on stub grouping. */
234 struct map_stub {
235 /* This is the section to which stubs in the group will be
236 attached. */
237 asection *link_sec;
238 /* The stub section. */
239 asection *stub_sec;
25f72752 240 } *stub_group;
30667bf3 241
30667bf3
AM
242 /* Short-cuts to get to dynamic linker sections. */
243 asection *sgot;
244 asection *srelgot;
245 asection *splt;
246 asection *srelplt;
247 asection *sdynbss;
248 asection *srelbss;
47d89dba 249
c46b7515
AM
250 /* Used during a final link to store the base of the text and data
251 segments so that we can perform SEGREL relocations. */
252 bfd_vma text_segment_base;
253 bfd_vma data_segment_base;
254
47d89dba
AM
255 /* Whether we support multiple sub-spaces for shared libs. */
256 unsigned int multi_subspace:1;
257
258 /* Flags set when PCREL12F and PCREL17F branches detected. Used to
259 select suitable defaults for the stub group size. */
260 unsigned int has_12bit_branch:1;
261 unsigned int has_17bit_branch:1;
262
263 /* Set if we need a .plt stub to support lazy dynamic linking. */
264 unsigned int need_plt_stub:1;
ec338859
AM
265
266 /* Small local sym to section mapping cache. */
267 struct sym_sec_cache sym_sec;
252b5132
RH
268};
269
30667bf3
AM
270/* Various hash macros and functions. */
271#define hppa_link_hash_table(p) \
edd21aca 272 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 273
30667bf3
AM
274#define hppa_stub_hash_lookup(table, string, create, copy) \
275 ((struct elf32_hppa_stub_hash_entry *) \
276 bfd_hash_lookup ((table), (string), (create), (copy)))
277
278static struct bfd_hash_entry *stub_hash_newfunc
279 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 280
30667bf3 281static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 282 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
283
284static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
285 PARAMS ((bfd *));
286
30667bf3
AM
287/* Stub handling functions. */
288static char *hppa_stub_name
289 PARAMS ((const asection *, const asection *,
290 const struct elf32_hppa_link_hash_entry *,
291 const Elf_Internal_Rela *));
edd21aca 292
30667bf3
AM
293static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
294 PARAMS ((const asection *, const asection *,
295 struct elf32_hppa_link_hash_entry *,
25f72752
AM
296 const Elf_Internal_Rela *,
297 struct elf32_hppa_link_hash_table *));
edd21aca 298
30667bf3 299static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 300 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
301
302static enum elf32_hppa_stub_type hppa_type_of_stub
303 PARAMS ((asection *, const Elf_Internal_Rela *,
304 struct elf32_hppa_link_hash_entry *, bfd_vma));
305
306static boolean hppa_build_one_stub
307 PARAMS ((struct bfd_hash_entry *, PTR));
308
309static boolean hppa_size_one_stub
310 PARAMS ((struct bfd_hash_entry *, PTR));
311
30667bf3
AM
312/* BFD and elf backend functions. */
313static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 314
edd21aca
AM
315static boolean elf32_hppa_add_symbol_hook
316 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
317 const char **, flagword *, asection **, bfd_vma *));
252b5132 318
30667bf3
AM
319static boolean elf32_hppa_create_dynamic_sections
320 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 321
ebe50bae
AM
322static void elf32_hppa_copy_indirect_symbol
323 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
324
30667bf3
AM
325static boolean elf32_hppa_check_relocs
326 PARAMS ((bfd *, struct bfd_link_info *,
327 asection *, const Elf_Internal_Rela *));
328
329static asection *elf32_hppa_gc_mark_hook
330 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
331 struct elf_link_hash_entry *, Elf_Internal_Sym *));
332
333static boolean elf32_hppa_gc_sweep_hook
334 PARAMS ((bfd *, struct bfd_link_info *,
335 asection *, const Elf_Internal_Rela *));
336
74d1c347
AM
337static void elf32_hppa_hide_symbol
338 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
339
30667bf3
AM
340static boolean elf32_hppa_adjust_dynamic_symbol
341 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
342
a8d02d66
AM
343static boolean mark_PIC_calls
344 PARAMS ((struct elf_link_hash_entry *, PTR));
345
e5ee5df1 346static boolean allocate_plt_static
30667bf3
AM
347 PARAMS ((struct elf_link_hash_entry *, PTR));
348
98ceb8ce
AM
349static boolean allocate_dynrelocs
350 PARAMS ((struct elf_link_hash_entry *, PTR));
351
352static boolean readonly_dynrelocs
30667bf3 353 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 354
d5c73c2f
AM
355static boolean clobber_millicode_symbols
356 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
357
30667bf3
AM
358static boolean elf32_hppa_size_dynamic_sections
359 PARAMS ((bfd *, struct bfd_link_info *));
360
c46b7515
AM
361static boolean elf32_hppa_final_link
362 PARAMS ((bfd *, struct bfd_link_info *));
363
364static void hppa_record_segment_addr
365 PARAMS ((bfd *, asection *, PTR));
366
30667bf3
AM
367static bfd_reloc_status_type final_link_relocate
368 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 369 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
370 struct elf32_hppa_link_hash_entry *));
371
372static boolean elf32_hppa_relocate_section
373 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
374 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
375
c46b7515
AM
376static int hppa_unwind_entry_compare
377 PARAMS ((const PTR, const PTR));
378
30667bf3
AM
379static boolean elf32_hppa_finish_dynamic_symbol
380 PARAMS ((bfd *, struct bfd_link_info *,
381 struct elf_link_hash_entry *, Elf_Internal_Sym *));
382
98ceb8ce
AM
383static enum elf_reloc_type_class elf32_hppa_reloc_type_class
384 PARAMS ((const Elf_Internal_Rela *));
385
30667bf3
AM
386static boolean elf32_hppa_finish_dynamic_sections
387 PARAMS ((bfd *, struct bfd_link_info *));
388
d952f17a
AM
389static void elf32_hppa_post_process_headers
390 PARAMS ((bfd *, struct bfd_link_info *));
391
30667bf3
AM
392static int elf32_hppa_elf_get_symbol_type
393 PARAMS ((Elf_Internal_Sym *, int));
252b5132 394
252b5132
RH
395/* Assorted hash table functions. */
396
397/* Initialize an entry in the stub hash table. */
398
399static struct bfd_hash_entry *
30667bf3 400stub_hash_newfunc (entry, table, string)
252b5132
RH
401 struct bfd_hash_entry *entry;
402 struct bfd_hash_table *table;
403 const char *string;
404{
252b5132
RH
405 /* Allocate the structure if it has not already been allocated by a
406 subclass. */
ebe50bae 407 if (entry == NULL)
30667bf3 408 {
ebe50bae
AM
409 entry = bfd_hash_allocate (table,
410 sizeof (struct elf32_hppa_stub_hash_entry));
411 if (entry == NULL)
412 return entry;
30667bf3 413 }
252b5132
RH
414
415 /* Call the allocation method of the superclass. */
ebe50bae
AM
416 entry = bfd_hash_newfunc (entry, table, string);
417 if (entry != NULL)
252b5132 418 {
ebe50bae
AM
419 struct elf32_hppa_stub_hash_entry *eh;
420
252b5132 421 /* Initialize the local fields. */
ebe50bae
AM
422 eh = (struct elf32_hppa_stub_hash_entry *) entry;
423 eh->stub_sec = NULL;
424 eh->stub_offset = 0;
425 eh->target_value = 0;
426 eh->target_section = NULL;
427 eh->stub_type = hppa_stub_long_branch;
428 eh->h = NULL;
429 eh->id_sec = NULL;
30667bf3
AM
430 }
431
ebe50bae 432 return entry;
30667bf3
AM
433}
434
30667bf3
AM
435/* Initialize an entry in the link hash table. */
436
437static struct bfd_hash_entry *
438hppa_link_hash_newfunc (entry, table, string)
439 struct bfd_hash_entry *entry;
440 struct bfd_hash_table *table;
441 const char *string;
442{
30667bf3
AM
443 /* Allocate the structure if it has not already been allocated by a
444 subclass. */
ebe50bae 445 if (entry == NULL)
30667bf3 446 {
ebe50bae
AM
447 entry = bfd_hash_allocate (table,
448 sizeof (struct elf32_hppa_link_hash_entry));
449 if (entry == NULL)
450 return entry;
30667bf3
AM
451 }
452
453 /* Call the allocation method of the superclass. */
ebe50bae
AM
454 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
455 if (entry != NULL)
30667bf3 456 {
ebe50bae
AM
457 struct elf32_hppa_link_hash_entry *eh;
458
30667bf3 459 /* Initialize the local fields. */
ebe50bae
AM
460 eh = (struct elf32_hppa_link_hash_entry *) entry;
461 eh->stub_cache = NULL;
462 eh->dyn_relocs = NULL;
463 eh->maybe_pic_call = 0;
464 eh->pic_call = 0;
465 eh->plabel = 0;
252b5132
RH
466 }
467
ebe50bae 468 return entry;
252b5132
RH
469}
470
252b5132
RH
471/* Create the derived linker hash table. The PA ELF port uses the derived
472 hash table to keep information specific to the PA ELF linker (without
473 using static variables). */
474
475static struct bfd_link_hash_table *
476elf32_hppa_link_hash_table_create (abfd)
477 bfd *abfd;
478{
479 struct elf32_hppa_link_hash_table *ret;
dc810e39 480 bfd_size_type amt = sizeof (*ret);
252b5132 481
dc810e39 482 ret = (struct elf32_hppa_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
483 if (ret == NULL)
484 return NULL;
edd21aca 485
ebe50bae 486 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132
RH
487 {
488 bfd_release (abfd, ret);
489 return NULL;
490 }
edd21aca
AM
491
492 /* Init the stub hash table too. */
30667bf3 493 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
494 return NULL;
495
30667bf3 496 ret->stub_bfd = NULL;
30667bf3
AM
497 ret->add_stub_section = NULL;
498 ret->layout_sections_again = NULL;
25f72752 499 ret->stub_group = NULL;
30667bf3
AM
500 ret->sgot = NULL;
501 ret->srelgot = NULL;
502 ret->splt = NULL;
503 ret->srelplt = NULL;
504 ret->sdynbss = NULL;
505 ret->srelbss = NULL;
c46b7515
AM
506 ret->text_segment_base = (bfd_vma) -1;
507 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
508 ret->multi_subspace = 0;
509 ret->has_12bit_branch = 0;
510 ret->has_17bit_branch = 0;
511 ret->need_plt_stub = 0;
ec338859 512 ret->sym_sec.abfd = NULL;
252b5132 513
ebe50bae 514 return &ret->elf.root;
252b5132
RH
515}
516
30667bf3
AM
517/* Build a name for an entry in the stub hash table. */
518
edd21aca 519static char *
30667bf3 520hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 521 const asection *input_section;
30667bf3
AM
522 const asection *sym_sec;
523 const struct elf32_hppa_link_hash_entry *hash;
524 const Elf_Internal_Rela *rel;
edd21aca
AM
525{
526 char *stub_name;
dc810e39 527 bfd_size_type len;
edd21aca 528
30667bf3
AM
529 if (hash)
530 {
531 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
532 stub_name = bfd_malloc (len);
533 if (stub_name != NULL)
534 {
535 sprintf (stub_name, "%08x_%s+%x",
536 input_section->id & 0xffffffff,
537 hash->elf.root.root.string,
538 (int) rel->r_addend & 0xffffffff);
539 }
540 }
541 else
edd21aca 542 {
30667bf3
AM
543 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
544 stub_name = bfd_malloc (len);
545 if (stub_name != NULL)
546 {
547 sprintf (stub_name, "%08x_%x:%x+%x",
548 input_section->id & 0xffffffff,
549 sym_sec->id & 0xffffffff,
550 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
551 (int) rel->r_addend & 0xffffffff);
552 }
edd21aca
AM
553 }
554 return stub_name;
555}
252b5132 556
30667bf3
AM
557/* Look up an entry in the stub hash. Stub entries are cached because
558 creating the stub name takes a bit of time. */
559
560static struct elf32_hppa_stub_hash_entry *
83c81bfe 561hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
562 const asection *input_section;
563 const asection *sym_sec;
564 struct elf32_hppa_link_hash_entry *hash;
565 const Elf_Internal_Rela *rel;
83c81bfe 566 struct elf32_hppa_link_hash_table *htab;
252b5132 567{
30667bf3 568 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
569 const asection *id_sec;
570
571 /* If this input section is part of a group of sections sharing one
572 stub section, then use the id of the first section in the group.
573 Stub names need to include a section id, as there may well be
574 more than one stub used to reach say, printf, and we need to
575 distinguish between them. */
83c81bfe 576 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 577
30667bf3
AM
578 if (hash != NULL && hash->stub_cache != NULL
579 && hash->stub_cache->h == hash
25f72752 580 && hash->stub_cache->id_sec == id_sec)
edd21aca 581 {
30667bf3
AM
582 stub_entry = hash->stub_cache;
583 }
584 else
585 {
30667bf3 586 char *stub_name;
edd21aca 587
25f72752 588 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
589 if (stub_name == NULL)
590 return NULL;
edd21aca 591
83c81bfe 592 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 593 stub_name, false, false);
f09ebc7d
AM
594 if (hash != NULL)
595 hash->stub_cache = stub_entry;
30667bf3
AM
596
597 free (stub_name);
edd21aca 598 }
30667bf3
AM
599
600 return stub_entry;
601}
602
30667bf3
AM
603/* Add a new stub entry to the stub hash. Not all fields of the new
604 stub entry are initialised. */
605
606static struct elf32_hppa_stub_hash_entry *
83c81bfe 607hppa_add_stub (stub_name, section, htab)
30667bf3
AM
608 const char *stub_name;
609 asection *section;
83c81bfe 610 struct elf32_hppa_link_hash_table *htab;
30667bf3 611{
25f72752 612 asection *link_sec;
30667bf3 613 asection *stub_sec;
30667bf3 614 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 615
83c81bfe
AM
616 link_sec = htab->stub_group[section->id].link_sec;
617 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 618 if (stub_sec == NULL)
edd21aca 619 {
83c81bfe 620 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
621 if (stub_sec == NULL)
622 {
dc810e39 623 bfd_size_type len;
30667bf3
AM
624 char *s_name;
625
25f72752 626 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 627 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
628 if (s_name == NULL)
629 return NULL;
630
25f72752 631 strcpy (s_name, link_sec->name);
30667bf3 632 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 633 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
634 if (stub_sec == NULL)
635 return NULL;
83c81bfe 636 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 637 }
83c81bfe 638 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 639 }
252b5132 640
30667bf3 641 /* Enter this entry into the linker stub hash table. */
83c81bfe 642 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
643 true, false);
644 if (stub_entry == NULL)
645 {
646 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 647 bfd_archive_filename (section->owner),
30667bf3
AM
648 stub_name);
649 return NULL;
edd21aca
AM
650 }
651
30667bf3 652 stub_entry->stub_sec = stub_sec;
30667bf3 653 stub_entry->stub_offset = 0;
25f72752 654 stub_entry->id_sec = link_sec;
30667bf3 655 return stub_entry;
edd21aca
AM
656}
657
30667bf3
AM
658/* Determine the type of stub needed, if any, for a call. */
659
660static enum elf32_hppa_stub_type
661hppa_type_of_stub (input_sec, rel, hash, destination)
662 asection *input_sec;
663 const Elf_Internal_Rela *rel;
664 struct elf32_hppa_link_hash_entry *hash;
665 bfd_vma destination;
edd21aca 666{
edd21aca 667 bfd_vma location;
30667bf3
AM
668 bfd_vma branch_offset;
669 bfd_vma max_branch_offset;
670 unsigned int r_type;
671
672 if (hash != NULL
673 && (((hash->elf.root.type == bfd_link_hash_defined
74d1c347
AM
674 || hash->elf.root.type == bfd_link_hash_defweak)
675 && hash->elf.root.u.def.section->output_section == NULL)
676 || (hash->elf.root.type == bfd_link_hash_defweak
677 && hash->elf.dynindx != -1
678 && hash->elf.plt.offset != (bfd_vma) -1)
30667bf3
AM
679 || hash->elf.root.type == bfd_link_hash_undefweak
680 || hash->elf.root.type == bfd_link_hash_undefined
12cca0d2 681 || (hash->maybe_pic_call && !(input_sec->flags & SEC_HAS_GOT_REF))))
30667bf3
AM
682 {
683 /* If output_section is NULL, then it's a symbol defined in a
684 shared library. We will need an import stub. Decide between
74d1c347
AM
685 hppa_stub_import and hppa_stub_import_shared later. For
686 shared links we need stubs for undefined or weak syms too;
687 They will presumably be resolved by the dynamic linker. */
30667bf3
AM
688 return hppa_stub_import;
689 }
edd21aca 690
30667bf3
AM
691 /* Determine where the call point is. */
692 location = (input_sec->output_offset
693 + input_sec->output_section->vma
694 + rel->r_offset);
edd21aca 695
30667bf3
AM
696 branch_offset = destination - location - 8;
697 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 698
30667bf3
AM
699 /* Determine if a long branch stub is needed. parisc branch offsets
700 are relative to the second instruction past the branch, ie. +8
701 bytes on from the branch instruction location. The offset is
702 signed and counts in units of 4 bytes. */
703 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 704 {
30667bf3
AM
705 max_branch_offset = (1 << (17-1)) << 2;
706 }
707 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
708 {
709 max_branch_offset = (1 << (12-1)) << 2;
710 }
25f72752 711 else /* R_PARISC_PCREL22F. */
30667bf3
AM
712 {
713 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
714 }
715
30667bf3 716 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
717 return hppa_stub_long_branch;
718
30667bf3
AM
719 return hppa_stub_none;
720}
edd21aca 721
30667bf3
AM
722/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
723 IN_ARG contains the link info pointer. */
edd21aca 724
30667bf3
AM
725#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
726#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 727
30667bf3 728#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 729#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 730#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 731
3ee1d854
AM
732#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
733#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 734#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 735#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 736
3ee1d854
AM
737#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
738#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 739
30667bf3
AM
740#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
741#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
742#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
743#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 744
30667bf3
AM
745#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
746#define NOP 0x08000240 /* nop */
747#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
748#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
749#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 750
30667bf3
AM
751#ifndef R19_STUBS
752#define R19_STUBS 1
753#endif
edd21aca 754
30667bf3
AM
755#if R19_STUBS
756#define LDW_R1_DLT LDW_R1_R19
757#else
758#define LDW_R1_DLT LDW_R1_DP
759#endif
edd21aca 760
30667bf3
AM
761static boolean
762hppa_build_one_stub (gen_entry, in_arg)
763 struct bfd_hash_entry *gen_entry;
764 PTR in_arg;
765{
766 struct elf32_hppa_stub_hash_entry *stub_entry;
767 struct bfd_link_info *info;
83c81bfe 768 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
769 asection *stub_sec;
770 bfd *stub_bfd;
771 bfd_byte *loc;
772 bfd_vma sym_value;
74d1c347 773 bfd_vma insn;
8dea1268 774 bfd_vma off;
74d1c347 775 int val;
30667bf3 776 int size;
edd21aca 777
30667bf3
AM
778 /* Massage our args to the form they really have. */
779 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
780 info = (struct bfd_link_info *) in_arg;
781
83c81bfe 782 htab = hppa_link_hash_table (info);
30667bf3 783 stub_sec = stub_entry->stub_sec;
edd21aca 784
30667bf3 785 /* Make a note of the offset within the stubs for this entry. */
74d1c347 786 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 787 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 788
30667bf3
AM
789 stub_bfd = stub_sec->owner;
790
791 switch (stub_entry->stub_type)
792 {
793 case hppa_stub_long_branch:
794 /* Create the long branch. A long branch is formed with "ldil"
795 loading the upper bits of the target address into a register,
796 then branching with "be" which adds in the lower bits.
797 The "be" has its delay slot nullified. */
798 sym_value = (stub_entry->target_value
799 + stub_entry->target_section->output_offset
800 + stub_entry->target_section->output_section->vma);
801
74d1c347
AM
802 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
803 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
804 bfd_put_32 (stub_bfd, insn, loc);
805
74d1c347
AM
806 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
807 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
808 bfd_put_32 (stub_bfd, insn, loc + 4);
809
30667bf3 810 size = 8;
edd21aca
AM
811 break;
812
30667bf3
AM
813 case hppa_stub_long_branch_shared:
814 /* Branches are relative. This is where we are going to. */
815 sym_value = (stub_entry->target_value
816 + stub_entry->target_section->output_offset
817 + stub_entry->target_section->output_section->vma);
818
819 /* And this is where we are coming from, more or less. */
820 sym_value -= (stub_entry->stub_offset
821 + stub_sec->output_offset
822 + stub_sec->output_section->vma);
823
74d1c347 824 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 825 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 826 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
827 bfd_put_32 (stub_bfd, insn, loc + 4);
828
47d89dba 829 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 830 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
831 bfd_put_32 (stub_bfd, insn, loc + 8);
832 size = 12;
833 break;
edd21aca 834
30667bf3
AM
835 case hppa_stub_import:
836 case hppa_stub_import_shared:
8dea1268
AM
837 off = stub_entry->h->elf.plt.offset;
838 if (off >= (bfd_vma) -2)
49e9d0d3 839 abort ();
8dea1268
AM
840
841 off &= ~ (bfd_vma) 1;
842 sym_value = (off
83c81bfe
AM
843 + htab->splt->output_offset
844 + htab->splt->output_section->vma
845 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
846
847 insn = ADDIL_DP;
848#if R19_STUBS
849 if (stub_entry->stub_type == hppa_stub_import_shared)
850 insn = ADDIL_R19;
851#endif
47d89dba 852 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 853 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 854 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 855
47d89dba
AM
856 /* It is critical to use lrsel/rrsel here because we are using
857 two different offsets (+0 and +4) from sym_value. If we use
858 lsel/rsel then with unfortunate sym_values we will round
859 sym_value+4 up to the next 2k block leading to a mis-match
860 between the lsel and rsel value. */
861 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 862 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 863 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 864
83c81bfe 865 if (htab->multi_subspace)
30667bf3 866 {
47d89dba 867 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 868 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 869 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 870
74d1c347
AM
871 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
872 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
873 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
874 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 875
30667bf3
AM
876 size = 28;
877 }
878 else
879 {
74d1c347 880 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 881 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 882 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 883 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 884
30667bf3
AM
885 size = 16;
886 }
252b5132 887
30667bf3
AM
888 if (!info->shared
889 && stub_entry->h != NULL
890 && stub_entry->h->pic_call)
252b5132 891 {
30667bf3
AM
892 /* Build the .plt entry needed to call a PIC function from
893 statically linked code. We don't need any relocs. */
894 bfd *dynobj;
895 struct elf32_hppa_link_hash_entry *eh;
896 bfd_vma value;
252b5132 897
ebe50bae 898 dynobj = htab->elf.dynobj;
30667bf3 899 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 900
49e9d0d3
AM
901 if (eh->elf.root.type != bfd_link_hash_defined
902 && eh->elf.root.type != bfd_link_hash_defweak)
903 abort ();
252b5132 904
30667bf3
AM
905 value = (eh->elf.root.u.def.value
906 + eh->elf.root.u.def.section->output_offset
907 + eh->elf.root.u.def.section->output_section->vma);
252b5132 908
30667bf3 909 /* Fill in the entry in the procedure linkage table.
252b5132 910
30667bf3 911 The format of a plt entry is
74d1c347
AM
912 <funcaddr>
913 <__gp>. */
252b5132 914
83c81bfe
AM
915 bfd_put_32 (htab->splt->owner, value,
916 htab->splt->contents + off);
917 value = elf_gp (htab->splt->output_section->owner);
918 bfd_put_32 (htab->splt->owner, value,
919 htab->splt->contents + off + 4);
252b5132 920 }
30667bf3 921 break;
252b5132 922
30667bf3
AM
923 case hppa_stub_export:
924 /* Branches are relative. This is where we are going to. */
925 sym_value = (stub_entry->target_value
926 + stub_entry->target_section->output_offset
927 + stub_entry->target_section->output_section->vma);
252b5132 928
30667bf3
AM
929 /* And this is where we are coming from. */
930 sym_value -= (stub_entry->stub_offset
931 + stub_sec->output_offset
932 + stub_sec->output_section->vma);
edd21aca 933
30667bf3
AM
934 if (sym_value - 8 + 0x40000 >= 0x80000)
935 {
edd21aca 936 (*_bfd_error_handler)
30667bf3 937 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 938 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
939 stub_sec->name,
940 (long) stub_entry->stub_offset,
941 stub_entry->root.string);
942 bfd_set_error (bfd_error_bad_value);
edd21aca 943 return false;
252b5132 944 }
30667bf3 945
74d1c347
AM
946 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
947 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
30667bf3
AM
948 bfd_put_32 (stub_bfd, insn, loc);
949
74d1c347
AM
950 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
951 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
952 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
953 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
954 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
955
956 /* Point the function symbol at the stub. */
957 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 958 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
959
960 size = 24;
961 break;
962
963 default:
964 BFD_FAIL ();
965 return false;
252b5132
RH
966 }
967
74d1c347 968 stub_sec->_raw_size += size;
252b5132
RH
969 return true;
970}
971
30667bf3
AM
972#undef LDIL_R1
973#undef BE_SR4_R1
974#undef BL_R1
975#undef ADDIL_R1
976#undef DEPI_R1
977#undef ADDIL_DP
978#undef LDW_R1_R21
979#undef LDW_R1_DLT
980#undef LDW_R1_R19
981#undef ADDIL_R19
982#undef LDW_R1_DP
983#undef LDSID_R21_R1
984#undef MTSP_R1
985#undef BE_SR0_R21
986#undef STW_RP
987#undef BV_R0_R21
988#undef BL_RP
989#undef NOP
990#undef LDW_RP
991#undef LDSID_RP_R1
992#undef BE_SR0_RP
252b5132 993
30667bf3
AM
994/* As above, but don't actually build the stub. Just bump offset so
995 we know stub section sizes. */
996
997static boolean
998hppa_size_one_stub (gen_entry, in_arg)
999 struct bfd_hash_entry *gen_entry;
1000 PTR in_arg;
252b5132 1001{
30667bf3 1002 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1003 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1004 int size;
1005
1006 /* Massage our args to the form they really have. */
1007 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1008 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1009
1010 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1011 size = 8;
30667bf3
AM
1012 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1013 size = 12;
1014 else if (stub_entry->stub_type == hppa_stub_export)
1015 size = 24;
74d1c347 1016 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1017 {
83c81bfe 1018 if (htab->multi_subspace)
30667bf3
AM
1019 size = 28;
1020 else
1021 size = 16;
1022 }
252b5132 1023
74d1c347 1024 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1025 return true;
1026}
252b5132 1027
30667bf3
AM
1028/* Return nonzero if ABFD represents an HPPA ELF32 file.
1029 Additionally we set the default architecture and machine. */
1030
1031static boolean
1032elf32_hppa_object_p (abfd)
1033 bfd *abfd;
1034{
24a5e751
L
1035 Elf_Internal_Ehdr * i_ehdrp;
1036 unsigned int flags;
252b5132 1037
24a5e751
L
1038 i_ehdrp = elf_elfheader (abfd);
1039 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1040 {
1041 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1042 return false;
1043 }
1044 else
1045 {
1046 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1047 return false;
1048 }
1049
1050 flags = i_ehdrp->e_flags;
30667bf3
AM
1051 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1052 {
1053 case EFA_PARISC_1_0:
1054 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1055 case EFA_PARISC_1_1:
1056 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1057 case EFA_PARISC_2_0:
1058 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1059 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1060 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1061 }
1062 return true;
252b5132
RH
1063}
1064
252b5132
RH
1065/* Undo the generic ELF code's subtraction of section->vma from the
1066 value of each external symbol. */
1067
1068static boolean
1069elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1070 bfd *abfd ATTRIBUTE_UNUSED;
1071 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1072 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1073 const char **namep ATTRIBUTE_UNUSED;
1074 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1075 asection **secp;
1076 bfd_vma *valp;
1077{
1078 *valp += (*secp)->vma;
1079 return true;
1080}
1081
30667bf3
AM
1082/* Create the .plt and .got sections, and set up our hash table
1083 short-cuts to various dynamic sections. */
1084
1085static boolean
1086elf32_hppa_create_dynamic_sections (abfd, info)
1087 bfd *abfd;
1088 struct bfd_link_info *info;
252b5132 1089{
83c81bfe 1090 struct elf32_hppa_link_hash_table *htab;
edd21aca 1091
30667bf3 1092 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1093 htab = hppa_link_hash_table (info);
1094 if (htab->splt != NULL)
30667bf3 1095 return true;
edd21aca 1096
30667bf3
AM
1097 /* Call the generic code to do most of the work. */
1098 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1099 return false;
252b5132 1100
83c81bfe
AM
1101 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1102 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1103
83c81bfe
AM
1104 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1105 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1106 if (htab->srelgot == NULL
1107 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1108 (SEC_ALLOC
1109 | SEC_LOAD
1110 | SEC_HAS_CONTENTS
1111 | SEC_IN_MEMORY
1112 | SEC_LINKER_CREATED
1113 | SEC_READONLY))
83c81bfe 1114 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1115 return false;
edd21aca 1116
83c81bfe
AM
1117 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1118 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1119
1120 return true;
1121}
1122
ebe50bae
AM
1123/* Copy the extra info we tack onto an elf_link_hash_entry. */
1124
51b64d56 1125static void
ebe50bae
AM
1126elf32_hppa_copy_indirect_symbol (dir, ind)
1127 struct elf_link_hash_entry *dir, *ind;
1128{
1129 struct elf32_hppa_link_hash_entry *edir, *eind;
1130
1131 edir = (struct elf32_hppa_link_hash_entry *) dir;
1132 eind = (struct elf32_hppa_link_hash_entry *) ind;
1133
bbd7ec4a 1134 if (eind->dyn_relocs != NULL)
ebe50bae 1135 {
bbd7ec4a
AM
1136 if (edir->dyn_relocs != NULL)
1137 {
1138 struct elf32_hppa_dyn_reloc_entry **pp;
1139 struct elf32_hppa_dyn_reloc_entry *p;
1140
1e370bd2 1141 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
1142 abort ();
1143
1144 /* Add reloc counts against the weak sym to the strong sym
1145 list. Merge any entries against the same section. */
1146 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1147 {
1148 struct elf32_hppa_dyn_reloc_entry *q;
1149
1150 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1151 if (q->sec == p->sec)
1152 {
1153#if RELATIVE_DYNRELOCS
1154 q->relative_count += p->relative_count;
1155#endif
1156 q->count += p->count;
1157 *pp = p->next;
1158 break;
1159 }
1160 if (q == NULL)
1161 pp = &p->next;
1162 }
1163 *pp = edir->dyn_relocs;
1164 }
1165
ebe50bae
AM
1166 edir->dyn_relocs = eind->dyn_relocs;
1167 eind->dyn_relocs = NULL;
1168 }
ebe50bae
AM
1169
1170 _bfd_elf_link_hash_copy_indirect (dir, ind);
1171}
1172
30667bf3 1173/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1174 calculate needed space in the global offset table, procedure linkage
1175 table, and dynamic reloc sections. At this point we haven't
1176 necessarily read all the input files. */
252b5132
RH
1177
1178static boolean
30667bf3
AM
1179elf32_hppa_check_relocs (abfd, info, sec, relocs)
1180 bfd *abfd;
1181 struct bfd_link_info *info;
1182 asection *sec;
1183 const Elf_Internal_Rela *relocs;
252b5132 1184{
30667bf3
AM
1185 Elf_Internal_Shdr *symtab_hdr;
1186 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1187 const Elf_Internal_Rela *rel;
1188 const Elf_Internal_Rela *rel_end;
83c81bfe 1189 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1190 asection *sreloc;
1191 asection *stubreloc;
1192
1193 if (info->relocateable)
1194 return true;
1195
83c81bfe 1196 htab = hppa_link_hash_table (info);
30667bf3
AM
1197 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1198 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1199 sreloc = NULL;
1200 stubreloc = NULL;
1201
1202 rel_end = relocs + sec->reloc_count;
1203 for (rel = relocs; rel < rel_end; rel++)
1204 {
1205 enum {
1206 NEED_GOT = 1,
1207 NEED_PLT = 2,
1208 NEED_DYNREL = 4,
98ceb8ce 1209 PLT_PLABEL = 8
30667bf3 1210 };
edd21aca 1211
30667bf3
AM
1212 unsigned int r_symndx, r_type;
1213 struct elf32_hppa_link_hash_entry *h;
1214 int need_entry;
252b5132 1215
30667bf3 1216 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1217
30667bf3
AM
1218 if (r_symndx < symtab_hdr->sh_info)
1219 h = NULL;
1220 else
1221 h = ((struct elf32_hppa_link_hash_entry *)
1222 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1223
30667bf3 1224 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1225
30667bf3
AM
1226 switch (r_type)
1227 {
1228 case R_PARISC_DLTIND14F:
1229 case R_PARISC_DLTIND14R:
1230 case R_PARISC_DLTIND21L:
1231 /* This symbol requires a global offset table entry. */
1232 need_entry = NEED_GOT;
1233
1234 /* Mark this section as containing PIC code. */
1235 sec->flags |= SEC_HAS_GOT_REF;
1236 break;
1237
1238 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1239 case R_PARISC_PLABEL21L:
1240 case R_PARISC_PLABEL32:
74d1c347 1241 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1242 if (rel->r_addend != 0)
1243 abort ();
74d1c347
AM
1244
1245 /* If we are creating a shared library, then we need to
1246 create a PLT entry for all PLABELs, because PLABELs with
1247 local symbols may be passed via a pointer to another
1248 object. Additionally, output a dynamic relocation
4dc86686
AM
1249 pointing to the PLT entry.
1250 For executables, the original 32-bit ABI allowed two
1251 different styles of PLABELs (function pointers): For
1252 global functions, the PLABEL word points into the .plt
1253 two bytes past a (function address, gp) pair, and for
1254 local functions the PLABEL points directly at the
1255 function. The magic +2 for the first type allows us to
1256 differentiate between the two. As you can imagine, this
1257 is a real pain when it comes to generating code to call
1258 functions indirectly or to compare function pointers.
1259 We avoid the mess by always pointing a PLABEL into the
1260 .plt, even for local functions. */
74d1c347 1261 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1262 break;
1263
1264 case R_PARISC_PCREL12F:
83c81bfe 1265 htab->has_12bit_branch = 1;
47d89dba 1266 /* Fall thru. */
30667bf3
AM
1267 case R_PARISC_PCREL17C:
1268 case R_PARISC_PCREL17F:
83c81bfe 1269 htab->has_17bit_branch = 1;
47d89dba 1270 /* Fall thru. */
30667bf3 1271 case R_PARISC_PCREL22F:
47d89dba
AM
1272 /* Function calls might need to go through the .plt, and
1273 might require long branch stubs. */
30667bf3
AM
1274 if (h == NULL)
1275 {
1276 /* We know local syms won't need a .plt entry, and if
1277 they need a long branch stub we can't guarantee that
1278 we can reach the stub. So just flag an error later
1279 if we're doing a shared link and find we need a long
1280 branch stub. */
1281 continue;
1282 }
1283 else
1284 {
1285 /* Global symbols will need a .plt entry if they remain
1286 global, and in most cases won't need a long branch
1287 stub. Unfortunately, we have to cater for the case
1288 where a symbol is forced local by versioning, or due
1289 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1290 need_entry = NEED_PLT;
4dc86686 1291 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1292 need_entry = 0;
30667bf3
AM
1293 }
1294 break;
1295
1296 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1297 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1298 case R_PARISC_PCREL14F: /* PC relative load/store. */
1299 case R_PARISC_PCREL14R:
1300 case R_PARISC_PCREL17R: /* External branches. */
1301 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1302 /* We don't need to propagate the relocation if linking a
1303 shared object since these are section relative. */
1304 continue;
1305
1306 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1307 case R_PARISC_DPREL14R:
1308 case R_PARISC_DPREL21L:
1309 if (info->shared)
1310 {
1311 (*_bfd_error_handler)
1312 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1313 bfd_archive_filename (abfd),
30667bf3
AM
1314 elf_hppa_howto_table[r_type].name);
1315 bfd_set_error (bfd_error_bad_value);
1316 return false;
1317 }
1318 /* Fall through. */
1319
1320 case R_PARISC_DIR17F: /* Used for external branches. */
1321 case R_PARISC_DIR17R:
47d89dba
AM
1322 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1323 case R_PARISC_DIR14R:
30667bf3
AM
1324 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1325#if 1
1326 /* Help debug shared library creation. Any of the above
1327 relocs can be used in shared libs, but they may cause
1328 pages to become unshared. */
1329 if (info->shared)
1330 {
1331 (*_bfd_error_handler)
1332 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1333 bfd_archive_filename (abfd),
30667bf3
AM
1334 elf_hppa_howto_table[r_type].name);
1335 }
1336 /* Fall through. */
1337#endif
1338
c46b7515 1339 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1340 /* We may want to output a dynamic relocation later. */
1341 need_entry = NEED_DYNREL;
1342 break;
1343
1344 /* This relocation describes the C++ object vtable hierarchy.
1345 Reconstruct it for later use during GC. */
1346 case R_PARISC_GNU_VTINHERIT:
1347 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1348 &h->elf, rel->r_offset))
1349 return false;
1350 continue;
1351
1352 /* This relocation describes which C++ vtable entries are actually
1353 used. Record for later use during GC. */
1354 case R_PARISC_GNU_VTENTRY:
1355 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1356 &h->elf, rel->r_addend))
30667bf3
AM
1357 return false;
1358 continue;
1359
1360 default:
1361 continue;
1362 }
1363
1364 /* Now carry out our orders. */
1365 if (need_entry & NEED_GOT)
1366 {
1367 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1368 relocation for this entry. */
83c81bfe 1369 if (htab->sgot == NULL)
30667bf3 1370 {
3ac8354b
AM
1371 if (htab->elf.dynobj == NULL)
1372 htab->elf.dynobj = abfd;
1373 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
30667bf3
AM
1374 return false;
1375 }
1376
1377 if (h != NULL)
1378 {
51b64d56 1379 h->elf.got.refcount += 1;
30667bf3
AM
1380 }
1381 else
1382 {
3ac8354b
AM
1383 bfd_signed_vma *local_got_refcounts;
1384
30667bf3 1385 /* This is a global offset table entry for a local symbol. */
3ac8354b 1386 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1387 if (local_got_refcounts == NULL)
1388 {
dc810e39 1389 bfd_size_type size;
30667bf3 1390
74d1c347
AM
1391 /* Allocate space for local got offsets and local
1392 plt offsets. Done this way to save polluting
1393 elf_obj_tdata with another target specific
1394 pointer. */
dc810e39
AM
1395 size = symtab_hdr->sh_info;
1396 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1397 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1398 bfd_zalloc (abfd, size));
30667bf3
AM
1399 if (local_got_refcounts == NULL)
1400 return false;
1401 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1402 }
ebe50bae 1403 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1404 }
1405 }
1406
1407 if (need_entry & NEED_PLT)
1408 {
1409 /* If we are creating a shared library, and this is a reloc
1410 against a weak symbol or a global symbol in a dynamic
1411 object, then we will be creating an import stub and a
1412 .plt entry for the symbol. Similarly, on a normal link
1413 to symbols defined in a dynamic object we'll need the
1414 import stub and a .plt entry. We don't know yet whether
1415 the symbol is defined or not, so make an entry anyway and
1416 clean up later in adjust_dynamic_symbol. */
1417 if ((sec->flags & SEC_ALLOC) != 0)
1418 {
74d1c347 1419 if (h != NULL)
30667bf3 1420 {
51b64d56
AM
1421 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1422 h->elf.plt.refcount += 1;
74d1c347 1423
36605136
AM
1424 /* If this .plt entry is for a plabel, mark it so
1425 that adjust_dynamic_symbol will keep the entry
1426 even if it appears to be local. */
74d1c347
AM
1427 if (need_entry & PLT_PLABEL)
1428 h->plabel = 1;
1429 }
1430 else if (need_entry & PLT_PLABEL)
1431 {
3ac8354b 1432 bfd_signed_vma *local_got_refcounts;
68fb2e56 1433 bfd_signed_vma *local_plt_refcounts;
74d1c347 1434
3ac8354b 1435 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1436 if (local_got_refcounts == NULL)
1437 {
dc810e39 1438 bfd_size_type size;
74d1c347
AM
1439
1440 /* Allocate space for local got offsets and local
1441 plt offsets. */
dc810e39
AM
1442 size = symtab_hdr->sh_info;
1443 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1444 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1445 bfd_zalloc (abfd, size));
74d1c347
AM
1446 if (local_got_refcounts == NULL)
1447 return false;
1448 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1449 }
68fb2e56
AM
1450 local_plt_refcounts = (local_got_refcounts
1451 + symtab_hdr->sh_info);
ebe50bae 1452 local_plt_refcounts[r_symndx] += 1;
30667bf3 1453 }
30667bf3
AM
1454 }
1455 }
1456
98ceb8ce 1457 if (need_entry & NEED_DYNREL)
30667bf3
AM
1458 {
1459 /* Flag this symbol as having a non-got, non-plt reference
1460 so that we generate copy relocs if it turns out to be
1461 dynamic. */
ebe50bae 1462 if (h != NULL && !info->shared)
30667bf3
AM
1463 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1464
1465 /* If we are creating a shared library then we need to copy
1466 the reloc into the shared library. However, if we are
1467 linking with -Bsymbolic, we need only copy absolute
1468 relocs or relocs against symbols that are not defined in
1469 an object we are including in the link. PC- or DP- or
1470 DLT-relative relocs against any local sym or global sym
1471 with DEF_REGULAR set, can be discarded. At this point we
1472 have not seen all the input files, so it is possible that
1473 DEF_REGULAR is not set now but will be set later (it is
1474 never cleared). We account for that possibility below by
98ceb8ce 1475 storing information in the dyn_relocs field of the
30667bf3
AM
1476 hash table entry.
1477
1478 A similar situation to the -Bsymbolic case occurs when
1479 creating shared libraries and symbol visibility changes
1480 render the symbol local.
1481
1482 As it turns out, all the relocs we will be creating here
1483 are absolute, so we cannot remove them on -Bsymbolic
1484 links or visibility changes anyway. A STUB_REL reloc
1485 is absolute too, as in that case it is the reloc in the
1486 stub we will be creating, rather than copying the PCREL
56882138
AM
1487 reloc in the branch.
1488
1489 If on the other hand, we are creating an executable, we
1490 may need to keep relocations for symbols satisfied by a
1491 dynamic library if we manage to avoid copy relocs for the
1492 symbol. */
446f2863
AM
1493 if ((info->shared
1494 && (sec->flags & SEC_ALLOC) != 0
1495 && (IS_ABSOLUTE_RELOC (r_type)
1496 || (h != NULL
1497 && (!info->symbolic
1498 || h->elf.root.type == bfd_link_hash_defweak
1499 || (h->elf.elf_link_hash_flags
1500 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1501 || (!info->shared
1502 && (sec->flags & SEC_ALLOC) != 0
1503 && h != NULL
446f2863
AM
1504 && (h->elf.root.type == bfd_link_hash_defweak
1505 || (h->elf.elf_link_hash_flags
1506 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1507 {
ec338859
AM
1508 struct elf32_hppa_dyn_reloc_entry *p;
1509 struct elf32_hppa_dyn_reloc_entry **head;
1510
30667bf3
AM
1511 /* Create a reloc section in dynobj and make room for
1512 this reloc. */
98ceb8ce 1513 if (sreloc == NULL)
30667bf3
AM
1514 {
1515 char *name;
3ac8354b 1516 bfd *dynobj;
30667bf3 1517
98ceb8ce
AM
1518 name = (bfd_elf_string_from_elf_section
1519 (abfd,
1520 elf_elfheader (abfd)->e_shstrndx,
1521 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1522 if (name == NULL)
1523 {
1524 (*_bfd_error_handler)
1525 (_("Could not find relocation section for %s"),
1526 sec->name);
1527 bfd_set_error (bfd_error_bad_value);
1528 return false;
1529 }
1530
3ac8354b
AM
1531 if (htab->elf.dynobj == NULL)
1532 htab->elf.dynobj = abfd;
1533
1534 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1535 sreloc = bfd_get_section_by_name (dynobj, name);
1536 if (sreloc == NULL)
30667bf3
AM
1537 {
1538 flagword flags;
1539
98ceb8ce 1540 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1541 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1542 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1543 if ((sec->flags & SEC_ALLOC) != 0)
1544 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1545 if (sreloc == NULL
1546 || !bfd_set_section_flags (dynobj, sreloc, flags)
1547 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1548 return false;
1549 }
30667bf3 1550
98ceb8ce 1551 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1552 }
1553
98ceb8ce
AM
1554 /* If this is a global symbol, we count the number of
1555 relocations we need for this symbol. */
1556 if (h != NULL)
30667bf3 1557 {
ec338859
AM
1558 head = &h->dyn_relocs;
1559 }
1560 else
1561 {
1562 /* Track dynamic relocs needed for local syms too.
1563 We really need local syms available to do this
1564 easily. Oh well. */
1565
1566 asection *s;
1567 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1568 sec, r_symndx);
1569 if (s == NULL)
1570 return false;
30667bf3 1571
ec338859
AM
1572 head = ((struct elf32_hppa_dyn_reloc_entry **)
1573 &elf_section_data (s)->local_dynrel);
1574 }
1575
1576 p = *head;
1577 if (p == NULL || p->sec != sec)
1578 {
1579 p = ((struct elf32_hppa_dyn_reloc_entry *)
1580 bfd_alloc (htab->elf.dynobj,
1581 (bfd_size_type) sizeof *p));
1582 if (p == NULL)
1583 return false;
1584 p->next = *head;
1585 *head = p;
1586 p->sec = sec;
1587 p->count = 0;
98ceb8ce 1588#if RELATIVE_DYNRELOCS
ec338859 1589 p->relative_count = 0;
98ceb8ce 1590#endif
ec338859 1591 }
98ceb8ce 1592
ec338859 1593 p->count += 1;
98ceb8ce 1594#if RELATIVE_DYNRELOCS
ec338859
AM
1595 if (!IS_ABSOLUTE_RELOC (rtype))
1596 p->relative_count += 1;
98ceb8ce 1597#endif
30667bf3
AM
1598 }
1599 }
1600 }
edd21aca
AM
1601
1602 return true;
1603}
1604
30667bf3
AM
1605/* Return the section that should be marked against garbage collection
1606 for a given relocation. */
1607
1608static asection *
1609elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1610 bfd *abfd;
1611 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1612 Elf_Internal_Rela *rel;
1613 struct elf_link_hash_entry *h;
1614 Elf_Internal_Sym *sym;
1615{
1616 if (h != NULL)
1617 {
1618 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1619 {
1620 case R_PARISC_GNU_VTINHERIT:
1621 case R_PARISC_GNU_VTENTRY:
1622 break;
1623
1624 default:
1625 switch (h->root.type)
1626 {
1627 case bfd_link_hash_defined:
1628 case bfd_link_hash_defweak:
1629 return h->root.u.def.section;
1630
1631 case bfd_link_hash_common:
1632 return h->root.u.c.p->section;
1633
1634 default:
1635 break;
1636 }
1637 }
1638 }
1639 else
1640 {
1641 if (!(elf_bad_symtab (abfd)
1642 && ELF_ST_BIND (sym->st_info) != STB_LOCAL)
1643 && ! ((sym->st_shndx <= 0 || sym->st_shndx >= SHN_LORESERVE)
1644 && sym->st_shndx != SHN_COMMON))
1645 {
1646 return bfd_section_from_elf_index (abfd, sym->st_shndx);
1647 }
1648 }
1649
1650 return NULL;
1651}
1652
30667bf3
AM
1653/* Update the got and plt entry reference counts for the section being
1654 removed. */
edd21aca
AM
1655
1656static boolean
30667bf3
AM
1657elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1658 bfd *abfd;
1659 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1660 asection *sec;
1661 const Elf_Internal_Rela *relocs;
edd21aca 1662{
30667bf3
AM
1663 Elf_Internal_Shdr *symtab_hdr;
1664 struct elf_link_hash_entry **sym_hashes;
1665 bfd_signed_vma *local_got_refcounts;
74d1c347 1666 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1667 const Elf_Internal_Rela *rel, *relend;
1668 unsigned long r_symndx;
1669 struct elf_link_hash_entry *h;
83c81bfe 1670 struct elf32_hppa_link_hash_table *htab;
30667bf3 1671 bfd *dynobj;
30667bf3 1672
ec338859 1673 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1674
30667bf3
AM
1675 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1676 sym_hashes = elf_sym_hashes (abfd);
1677 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1678 local_plt_refcounts = local_got_refcounts;
1679 if (local_plt_refcounts != NULL)
1680 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1681 htab = hppa_link_hash_table (info);
ebe50bae 1682 dynobj = htab->elf.dynobj;
30667bf3
AM
1683 if (dynobj == NULL)
1684 return true;
1685
30667bf3
AM
1686 relend = relocs + sec->reloc_count;
1687 for (rel = relocs; rel < relend; rel++)
1688 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1689 {
1690 case R_PARISC_DLTIND14F:
1691 case R_PARISC_DLTIND14R:
1692 case R_PARISC_DLTIND21L:
1693 r_symndx = ELF32_R_SYM (rel->r_info);
1694 if (r_symndx >= symtab_hdr->sh_info)
1695 {
1696 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1697 if (h->got.refcount > 0)
4dc86686 1698 h->got.refcount -= 1;
30667bf3
AM
1699 }
1700 else if (local_got_refcounts != NULL)
1701 {
1702 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1703 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1704 }
1705 break;
edd21aca 1706
30667bf3
AM
1707 case R_PARISC_PCREL12F:
1708 case R_PARISC_PCREL17C:
1709 case R_PARISC_PCREL17F:
1710 case R_PARISC_PCREL22F:
1711 r_symndx = ELF32_R_SYM (rel->r_info);
1712 if (r_symndx >= symtab_hdr->sh_info)
1713 {
1714 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1715 if (h->plt.refcount > 0)
1716 h->plt.refcount -= 1;
1717 }
1718 break;
edd21aca 1719
74d1c347
AM
1720 case R_PARISC_PLABEL14R:
1721 case R_PARISC_PLABEL21L:
1722 case R_PARISC_PLABEL32:
1723 r_symndx = ELF32_R_SYM (rel->r_info);
1724 if (r_symndx >= symtab_hdr->sh_info)
1725 {
98ceb8ce
AM
1726 struct elf32_hppa_link_hash_entry *eh;
1727 struct elf32_hppa_dyn_reloc_entry **pp;
1728 struct elf32_hppa_dyn_reloc_entry *p;
1729
74d1c347 1730 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1731
74d1c347
AM
1732 if (h->plt.refcount > 0)
1733 h->plt.refcount -= 1;
98ceb8ce
AM
1734
1735 eh = (struct elf32_hppa_link_hash_entry *) h;
1736
1737 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1738 if (p->sec == sec)
1739 {
1740#if RELATIVE_DYNRELOCS
1741 if (!IS_ABSOLUTE_RELOC (rtype))
1742 p->relative_count -= 1;
1743#endif
1744 p->count -= 1;
1745 if (p->count == 0)
1746 *pp = p->next;
1747 break;
1748 }
74d1c347
AM
1749 }
1750 else if (local_plt_refcounts != NULL)
1751 {
1752 if (local_plt_refcounts[r_symndx] > 0)
1753 local_plt_refcounts[r_symndx] -= 1;
1754 }
1755 break;
1756
98ceb8ce
AM
1757 case R_PARISC_DIR32:
1758 r_symndx = ELF32_R_SYM (rel->r_info);
1759 if (r_symndx >= symtab_hdr->sh_info)
1760 {
1761 struct elf32_hppa_link_hash_entry *eh;
1762 struct elf32_hppa_dyn_reloc_entry **pp;
1763 struct elf32_hppa_dyn_reloc_entry *p;
1764
1765 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1766
1767 eh = (struct elf32_hppa_link_hash_entry *) h;
1768
1769 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1770 if (p->sec == sec)
1771 {
1772#if RELATIVE_DYNRELOCS
1773 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1774 p->relative_count -= 1;
1775#endif
1776 p->count -= 1;
1777 if (p->count == 0)
1778 *pp = p->next;
1779 break;
1780 }
1781 }
1782 break;
1783
30667bf3
AM
1784 default:
1785 break;
1786 }
252b5132 1787
252b5132
RH
1788 return true;
1789}
1790
74d1c347
AM
1791/* Our own version of hide_symbol, so that we can keep plt entries for
1792 plabels. */
1793
1794static void
1795elf32_hppa_hide_symbol (info, h)
1796 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1797 struct elf_link_hash_entry *h;
1798{
5fba655a
L
1799 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
1800 h->dynindx = -1;
74d1c347
AM
1801 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1802 {
1803 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1804 h->plt.offset = (bfd_vma) -1;
1805 }
1806}
1807
4dc86686
AM
1808/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1809 will be called from elflink.h. If elflink.h doesn't call our
1810 finish_dynamic_symbol routine, we'll need to do something about
1811 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1812#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1813 ((DYN) \
1814 && ((INFO)->shared \
1815 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1816 && ((H)->dynindx != -1 \
1817 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1818
30667bf3
AM
1819/* Adjust a symbol defined by a dynamic object and referenced by a
1820 regular object. The current definition is in some section of the
1821 dynamic object, but we're not including those sections. We have to
1822 change the definition to something the rest of the link can
1823 understand. */
252b5132 1824
30667bf3
AM
1825static boolean
1826elf32_hppa_adjust_dynamic_symbol (info, h)
1827 struct bfd_link_info *info;
1828 struct elf_link_hash_entry *h;
252b5132 1829{
83c81bfe 1830 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1831 struct elf32_hppa_link_hash_entry *eh;
1832 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1833 asection *s;
3ac8354b 1834 unsigned int power_of_two;
30667bf3
AM
1835
1836 /* If this is a function, put it in the procedure linkage table. We
1837 will fill in the contents of the procedure linkage table later,
1838 when we know the address of the .got section. */
1839 if (h->type == STT_FUNC
1840 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1841 {
12cca0d2
AM
1842 if (!info->shared
1843 && h->plt.refcount > 0
1844 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1845 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
1846 {
1847 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
1848 }
1849
30667bf3
AM
1850 if (h->plt.refcount <= 0
1851 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1852 && h->root.type != bfd_link_hash_defweak
74d1c347 1853 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1854 && (!info->shared || info->symbolic)))
1855 {
1856 /* The .plt entry is not needed when:
1857 a) Garbage collection has removed all references to the
1858 symbol, or
1859 b) We know for certain the symbol is defined in this
74d1c347
AM
1860 object, and it's not a weak definition, nor is the symbol
1861 used by a plabel relocation. Either this object is the
1862 application or we are doing a shared symbolic link. */
1863
1864 /* As a special sop to the hppa ABI, we keep a .plt entry
1865 for functions in sections containing PIC code. */
12cca0d2
AM
1866 if (((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call)
1867 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1868 else
1869 {
1870 h->plt.offset = (bfd_vma) -1;
1871 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1872 }
30667bf3 1873 }
4dc86686 1874
30667bf3
AM
1875 return true;
1876 }
bbd7ec4a
AM
1877 else
1878 h->plt.offset = (bfd_vma) -1;
edd21aca 1879
30667bf3
AM
1880 /* If this is a weak symbol, and there is a real definition, the
1881 processor independent code will have arranged for us to see the
1882 real definition first, and we can just use the same value. */
1883 if (h->weakdef != NULL)
edd21aca 1884 {
49e9d0d3
AM
1885 if (h->weakdef->root.type != bfd_link_hash_defined
1886 && h->weakdef->root.type != bfd_link_hash_defweak)
1887 abort ();
30667bf3
AM
1888 h->root.u.def.section = h->weakdef->root.u.def.section;
1889 h->root.u.def.value = h->weakdef->root.u.def.value;
0a991dfe 1890 return true;
30667bf3 1891 }
edd21aca 1892
30667bf3
AM
1893 /* This is a reference to a symbol defined by a dynamic object which
1894 is not a function. */
1895
1896 /* If we are creating a shared library, we must presume that the
1897 only references to the symbol are via the global offset table.
1898 For such cases we need not do anything here; the relocations will
1899 be handled correctly by relocate_section. */
1900 if (info->shared)
1901 return true;
1902
1903 /* If there are no references to this symbol that do not use the
1904 GOT, we don't need to generate a copy reloc. */
1905 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1906 return true;
1907
ebe50bae
AM
1908 eh = (struct elf32_hppa_link_hash_entry *) h;
1909 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1910 {
1911 s = p->sec->output_section;
1912 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1913 break;
1914 }
1915
1916 /* If we didn't find any dynamic relocs in read-only sections, then
1917 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1918 if (p == NULL)
1919 {
1920 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1921 return true;
1922 }
1923
30667bf3
AM
1924 /* We must allocate the symbol in our .dynbss section, which will
1925 become part of the .bss section of the executable. There will be
1926 an entry for this symbol in the .dynsym section. The dynamic
1927 object will contain position independent code, so all references
1928 from the dynamic object to this symbol will go through the global
1929 offset table. The dynamic linker will use the .dynsym entry to
1930 determine the address it must put in the global offset table, so
1931 both the dynamic object and the regular object will refer to the
1932 same memory location for the variable. */
1933
3ac8354b 1934 htab = hppa_link_hash_table (info);
30667bf3
AM
1935
1936 /* We must generate a COPY reloc to tell the dynamic linker to
1937 copy the initial value out of the dynamic object and into the
3ac8354b 1938 runtime process image. */
30667bf3
AM
1939 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1940 {
3ac8354b 1941 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1942 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1943 }
252b5132 1944
3ac8354b
AM
1945 /* We need to figure out the alignment required for this symbol. I
1946 have no idea how other ELF linkers handle this. */
30667bf3 1947
3ac8354b
AM
1948 power_of_two = bfd_log2 (h->size);
1949 if (power_of_two > 3)
1950 power_of_two = 3;
1951
1952 /* Apply the required alignment. */
1953 s = htab->sdynbss;
1954 s->_raw_size = BFD_ALIGN (s->_raw_size,
1955 (bfd_size_type) (1 << power_of_two));
1956 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1957 {
1958 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1959 return false;
1960 }
30667bf3 1961
30667bf3
AM
1962 /* Define the symbol as being at this point in the section. */
1963 h->root.u.def.section = s;
1964 h->root.u.def.value = s->_raw_size;
edd21aca 1965
30667bf3
AM
1966 /* Increment the section size to make room for the symbol. */
1967 s->_raw_size += h->size;
252b5132
RH
1968
1969 return true;
1970}
1971
30667bf3
AM
1972/* Called via elf_link_hash_traverse to create .plt entries for an
1973 application that uses statically linked PIC functions. Similar to
1974 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1975
30667bf3 1976static boolean
a8d02d66 1977mark_PIC_calls (h, inf)
30667bf3 1978 struct elf_link_hash_entry *h;
4dc86686 1979 PTR inf ATTRIBUTE_UNUSED;
252b5132 1980{
30667bf3
AM
1981 if (! (h->plt.refcount > 0
1982 && (h->root.type == bfd_link_hash_defined
1983 || h->root.type == bfd_link_hash_defweak)
1984 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 1985 {
30667bf3
AM
1986 h->plt.offset = (bfd_vma) -1;
1987 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1988 return true;
252b5132
RH
1989 }
1990
74d1c347 1991 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
12cca0d2 1992 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
30667bf3 1993 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 1994
4dc86686
AM
1995 return true;
1996}
1997
e5ee5df1
AM
1998/* Allocate space in the .plt for entries that won't have relocations.
1999 ie. pic_call and plabel entries. */
a8d02d66
AM
2000
2001static boolean
e5ee5df1 2002allocate_plt_static (h, inf)
a8d02d66
AM
2003 struct elf_link_hash_entry *h;
2004 PTR inf;
2005{
2006 struct bfd_link_info *info;
2007 struct elf32_hppa_link_hash_table *htab;
2008 asection *s;
2009
2010 if (h->root.type == bfd_link_hash_indirect
2011 || h->root.type == bfd_link_hash_warning)
2012 return true;
2013
2014 info = (struct bfd_link_info *) inf;
2015 htab = hppa_link_hash_table (info);
2016 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2017 {
e5ee5df1
AM
2018 /* Make an entry in the .plt section for non-pic code that is
2019 calling pic code. */
a8d02d66
AM
2020 s = htab->splt;
2021 h->plt.offset = s->_raw_size;
e5ee5df1
AM
2022 s->_raw_size += PLT_ENTRY_SIZE;
2023 }
2024 else if (htab->elf.dynamic_sections_created
2025 && h->plt.refcount > 0)
2026 {
2027 /* Make sure this symbol is output as a dynamic symbol.
2028 Undefined weak syms won't yet be marked as dynamic. */
2029 if (h->dynindx == -1
2030 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2031 && h->type != STT_PARISC_MILLI)
a8d02d66 2032 {
e5ee5df1
AM
2033 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2034 return false;
2035 }
2036
2037 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2038 {
2039 /* Allocate these later. */
2040 }
2041 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
2042 {
2043 /* Make an entry in the .plt section for plabel references
2044 that won't have a .plt entry for other reasons. */
2045 s = htab->splt;
2046 h->plt.offset = s->_raw_size;
2047 s->_raw_size += PLT_ENTRY_SIZE;
a8d02d66
AM
2048 }
2049 else
e5ee5df1
AM
2050 {
2051 /* No .plt entry needed. */
2052 h->plt.offset = (bfd_vma) -1;
2053 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2054 }
2055 }
2056 else
2057 {
2058 h->plt.offset = (bfd_vma) -1;
2059 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
2060 }
2061
2062 return true;
2063}
2064
4dc86686
AM
2065/* Allocate space in .plt, .got and associated reloc sections for
2066 global syms. */
2067
2068static boolean
98ceb8ce 2069allocate_dynrelocs (h, inf)
4dc86686
AM
2070 struct elf_link_hash_entry *h;
2071 PTR inf;
2072{
2073 struct bfd_link_info *info;
83c81bfe 2074 struct elf32_hppa_link_hash_table *htab;
4dc86686 2075 asection *s;
446f2863 2076 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 2077 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 2078
73a74a62
AM
2079 if (h->root.type == bfd_link_hash_indirect
2080 || h->root.type == bfd_link_hash_warning)
2081 return true;
2082
30667bf3 2083 info = (struct bfd_link_info *) inf;
83c81bfe 2084 htab = hppa_link_hash_table (info);
e5ee5df1
AM
2085 if (htab->elf.dynamic_sections_created
2086 && h->plt.offset != (bfd_vma) -1
2087 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call
2088 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
4dc86686 2089 {
e5ee5df1
AM
2090 /* Make an entry in the .plt section. */
2091 s = htab->splt;
2092 h->plt.offset = s->_raw_size;
2093 s->_raw_size += PLT_ENTRY_SIZE;
3ac8354b 2094
e5ee5df1
AM
2095 /* We also need to make an entry in the .rela.plt section. */
2096 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2097 htab->need_plt_stub = 1;
4dc86686 2098 }
edd21aca 2099
4dc86686
AM
2100 if (h->got.refcount > 0)
2101 {
446f2863
AM
2102 /* Make sure this symbol is output as a dynamic symbol.
2103 Undefined weak syms won't yet be marked as dynamic. */
2104 if (h->dynindx == -1
2105 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2106 && h->type != STT_PARISC_MILLI)
2107 {
2108 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2109 return false;
2110 }
2111
83c81bfe 2112 s = htab->sgot;
4dc86686
AM
2113 h->got.offset = s->_raw_size;
2114 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
2115 if (htab->elf.dynamic_sections_created
2116 && (info->shared
2117 || (h->dynindx != -1
2118 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
2119 {
2120 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
2121 }
4dc86686
AM
2122 }
2123 else
2124 h->got.offset = (bfd_vma) -1;
30667bf3 2125
446f2863 2126 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2127 if (eh->dyn_relocs == NULL)
446f2863 2128 return true;
30667bf3 2129
98ceb8ce
AM
2130 /* If this is a -Bsymbolic shared link, then we need to discard all
2131 space allocated for dynamic pc-relative relocs against symbols
2132 defined in a regular object. For the normal shared case, discard
2133 space for relocs that have become local due to symbol visibility
2134 changes. */
2135 if (info->shared)
446f2863 2136 {
98ceb8ce
AM
2137#if RELATIVE_DYNRELOCS
2138 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2139 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2140 || info->symbolic))
446f2863 2141 {
98ceb8ce 2142 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2143
98ceb8ce
AM
2144 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2145 {
2146 p->count -= p->relative_count;
2147 p->relative_count = 0;
2148 if (p->count == 0)
2149 *pp = p->next;
2150 else
2151 pp = &p->next;
2152 }
2153 }
2154#endif
446f2863 2155 }
98ceb8ce 2156 else
30667bf3 2157 {
98ceb8ce
AM
2158 /* For the non-shared case, discard space for relocs against
2159 symbols which turn out to need copy relocs or are not
2160 dynamic. */
2161 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2162 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2163 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2164 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2165 && (h->root.type == bfd_link_hash_undefweak
2166 || h->root.type == bfd_link_hash_undefined))))
2167 {
2168 /* Make sure this symbol is output as a dynamic symbol.
2169 Undefined weak syms won't yet be marked as dynamic. */
2170 if (h->dynindx == -1
2171 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2172 && h->type != STT_PARISC_MILLI)
2173 {
2174 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2175 return false;
2176 }
2177
2178 /* If that succeeded, we know we'll be keeping all the
2179 relocs. */
2180 if (h->dynindx != -1)
2181 goto keep;
2182 }
446f2863 2183
98ceb8ce
AM
2184 eh->dyn_relocs = NULL;
2185 return true;
2186
ec338859 2187 keep: ;
30667bf3 2188 }
30667bf3 2189
98ceb8ce
AM
2190 /* Finally, allocate space. */
2191 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2192 {
98ceb8ce
AM
2193 asection *sreloc = elf_section_data (p->sec)->sreloc;
2194 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2195 }
30667bf3
AM
2196
2197 return true;
2198}
30667bf3 2199
d5c73c2f
AM
2200/* This function is called via elf_link_hash_traverse to force
2201 millicode symbols local so they do not end up as globals in the
2202 dynamic symbol table. We ought to be able to do this in
2203 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2204 for all dynamic symbols. Arguably, this is a bug in
2205 elf_adjust_dynamic_symbol. */
2206
2207static boolean
2208clobber_millicode_symbols (h, info)
2209 struct elf_link_hash_entry *h;
2210 struct bfd_link_info *info;
2211{
8dea1268
AM
2212 /* We only want to remove these from the dynamic symbol table.
2213 Therefore we do not leave ELF_LINK_FORCED_LOCAL set. */
d5c73c2f 2214 if (h->type == STT_PARISC_MILLI)
e0522e89 2215 {
a0e94dc0 2216 struct elf32_hppa_link_hash_table *htab;
e0522e89 2217 unsigned short oldflags = h->elf_link_hash_flags;
a0e94dc0 2218
e0522e89
AM
2219 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
2220 elf32_hppa_hide_symbol (info, h);
a0e94dc0
AM
2221 htab = hppa_link_hash_table (info);
2222 _bfd_elf_strtab_delref (htab->elf.dynstr, h->dynstr_index);
e0522e89
AM
2223 h->elf_link_hash_flags &= ~ELF_LINK_FORCED_LOCAL;
2224 h->elf_link_hash_flags |= oldflags & ELF_LINK_FORCED_LOCAL;
2225 }
d5c73c2f
AM
2226 return true;
2227}
2228
98ceb8ce
AM
2229/* Find any dynamic relocs that apply to read-only sections. */
2230
2231static boolean
2232readonly_dynrelocs (h, inf)
2233 struct elf_link_hash_entry *h;
2234 PTR inf;
2235{
2236 struct elf32_hppa_link_hash_entry *eh;
2237 struct elf32_hppa_dyn_reloc_entry *p;
2238
2239 eh = (struct elf32_hppa_link_hash_entry *) h;
2240 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2241 {
2242 asection *s = p->sec->output_section;
2243
2244 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2245 {
2246 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2247
2248 info->flags |= DF_TEXTREL;
2249
2250 /* Not an error, just cut short the traversal. */
2251 return false;
2252 }
2253 }
2254 return true;
2255}
2256
30667bf3
AM
2257/* Set the sizes of the dynamic sections. */
2258
2259static boolean
2260elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2261 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2262 struct bfd_link_info *info;
2263{
83c81bfe 2264 struct elf32_hppa_link_hash_table *htab;
30667bf3 2265 bfd *dynobj;
98ceb8ce 2266 bfd *ibfd;
30667bf3
AM
2267 asection *s;
2268 boolean relocs;
30667bf3 2269
83c81bfe 2270 htab = hppa_link_hash_table (info);
ebe50bae 2271 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2272 if (dynobj == NULL)
2273 abort ();
30667bf3 2274
ebe50bae 2275 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2276 {
2277 /* Set the contents of the .interp section to the interpreter. */
2278 if (! info->shared)
2279 {
2280 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2281 if (s == NULL)
2282 abort ();
30667bf3
AM
2283 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2284 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2285 }
74d1c347 2286
d5c73c2f 2287 /* Force millicode symbols local. */
ebe50bae 2288 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2289 clobber_millicode_symbols,
2290 info);
68fb2e56
AM
2291 }
2292 else
2293 {
2294 /* Run through the function symbols, looking for any that are
a8d02d66
AM
2295 PIC, and mark them as needing .plt entries so that %r19 will
2296 be set up. */
68fb2e56 2297 if (! info->shared)
a8d02d66 2298 elf_link_hash_traverse (&htab->elf, mark_PIC_calls, (PTR) info);
68fb2e56 2299 }
d5c73c2f 2300
98ceb8ce
AM
2301 /* Set up .got and .plt offsets for local syms, and space for local
2302 dynamic relocs. */
2303 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2304 {
2305 bfd_signed_vma *local_got;
2306 bfd_signed_vma *end_local_got;
2307 bfd_signed_vma *local_plt;
2308 bfd_signed_vma *end_local_plt;
2309 bfd_size_type locsymcount;
2310 Elf_Internal_Shdr *symtab_hdr;
2311 asection *srel;
74d1c347 2312
98ceb8ce 2313 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2314 continue;
4dc86686 2315
98ceb8ce
AM
2316 for (s = ibfd->sections; s != NULL; s = s->next)
2317 {
ec338859 2318 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2319
ec338859
AM
2320 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2321 elf_section_data (s)->local_dynrel);
2322 p != NULL;
2323 p = p->next)
98ceb8ce 2324 {
ec338859
AM
2325 if (!bfd_is_abs_section (p->sec)
2326 && bfd_is_abs_section (p->sec->output_section))
2327 {
2328 /* Input section has been discarded, either because
2329 it is a copy of a linkonce section or due to
2330 linker script /DISCARD/, so we'll be discarding
2331 the relocs too. */
2332 }
2333 else
2334 {
2335 srel = elf_section_data (p->sec)->sreloc;
2336 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
2337 }
98ceb8ce
AM
2338 }
2339 }
2340
2341 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2342 if (!local_got)
2343 continue;
74d1c347 2344
98ceb8ce 2345 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2346 locsymcount = symtab_hdr->sh_info;
2347 end_local_got = local_got + locsymcount;
83c81bfe
AM
2348 s = htab->sgot;
2349 srel = htab->srelgot;
68fb2e56
AM
2350 for (; local_got < end_local_got; ++local_got)
2351 {
2352 if (*local_got > 0)
4dc86686 2353 {
68fb2e56
AM
2354 *local_got = s->_raw_size;
2355 s->_raw_size += GOT_ENTRY_SIZE;
2356 if (info->shared)
2357 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2358 }
68fb2e56
AM
2359 else
2360 *local_got = (bfd_vma) -1;
2361 }
74d1c347 2362
68fb2e56
AM
2363 local_plt = end_local_got;
2364 end_local_plt = local_plt + locsymcount;
ebe50bae 2365 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2366 {
2367 /* Won't be used, but be safe. */
2368 for (; local_plt < end_local_plt; ++local_plt)
2369 *local_plt = (bfd_vma) -1;
2370 }
2371 else
2372 {
83c81bfe
AM
2373 s = htab->splt;
2374 srel = htab->srelplt;
74d1c347
AM
2375 for (; local_plt < end_local_plt; ++local_plt)
2376 {
2377 if (*local_plt > 0)
2378 {
74d1c347
AM
2379 *local_plt = s->_raw_size;
2380 s->_raw_size += PLT_ENTRY_SIZE;
2381 if (info->shared)
4dc86686 2382 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2383 }
2384 else
2385 *local_plt = (bfd_vma) -1;
2386 }
2387 }
30667bf3 2388 }
30667bf3 2389
e5ee5df1
AM
2390 /* Do all the .plt entries without relocs first. The dynamic linker
2391 uses the last .plt reloc to find the end of the .plt (and hence
2392 the start of the .got) for lazy linking. */
2393 elf_link_hash_traverse (&htab->elf, allocate_plt_static, (PTR) info);
a8d02d66 2394
98ceb8ce
AM
2395 /* Allocate global sym .plt and .got entries, and space for global
2396 sym dynamic relocs. */
ebe50bae 2397 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2398
2399 /* The check_relocs and adjust_dynamic_symbol entry points have
2400 determined the sizes of the various dynamic sections. Allocate
2401 memory for them. */
2402 relocs = false;
30667bf3
AM
2403 for (s = dynobj->sections; s != NULL; s = s->next)
2404 {
30667bf3
AM
2405 if ((s->flags & SEC_LINKER_CREATED) == 0)
2406 continue;
2407
83c81bfe 2408 if (s == htab->splt)
68fb2e56 2409 {
83c81bfe 2410 if (htab->need_plt_stub)
68fb2e56
AM
2411 {
2412 /* Make space for the plt stub at the end of the .plt
2413 section. We want this stub right at the end, up
2414 against the .got section. */
83c81bfe 2415 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2416 int pltalign = bfd_section_alignment (dynobj, s);
2417 bfd_size_type mask;
30667bf3 2418
68fb2e56
AM
2419 if (gotalign > pltalign)
2420 bfd_set_section_alignment (dynobj, s, gotalign);
2421 mask = ((bfd_size_type) 1 << gotalign) - 1;
2422 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2423 }
2424 }
83c81bfe 2425 else if (s == htab->sgot)
68fb2e56
AM
2426 ;
2427 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2428 {
2429 if (s->_raw_size != 0)
2430 {
4e12ff7f
AM
2431 /* Remember whether there are any reloc sections other
2432 than .rela.plt. */
2433 if (s != htab->srelplt)
2434 relocs = true;
47d89dba 2435
30667bf3
AM
2436 /* We use the reloc_count field as a counter if we need
2437 to copy relocs into the output file. */
2438 s->reloc_count = 0;
2439 }
2440 }
30667bf3
AM
2441 else
2442 {
2443 /* It's not one of our sections, so don't allocate space. */
2444 continue;
2445 }
2446
2447 if (s->_raw_size == 0)
2448 {
2449 /* If we don't need this section, strip it from the
2450 output file. This is mostly to handle .rela.bss and
2451 .rela.plt. We must create both sections in
2452 create_dynamic_sections, because they must be created
2453 before the linker maps input sections to output
2454 sections. The linker does that before
2455 adjust_dynamic_symbol is called, and it is that
2456 function which decides whether anything needs to go
2457 into these sections. */
2458 _bfd_strip_section_from_output (info, s);
2459 continue;
2460 }
2461
2462 /* Allocate memory for the section contents. Zero it, because
2463 we may not fill in all the reloc sections. */
2464 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2465 if (s->contents == NULL && s->_raw_size != 0)
2466 return false;
2467 }
2468
ebe50bae 2469 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2470 {
2471 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2472 actually has nothing to do with the PLT, it is how we
2473 communicate the LTP value of a load module to the dynamic
2474 linker. */
dc810e39
AM
2475#define add_dynamic_entry(TAG, VAL) \
2476 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2477
2478 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2479 return false;
2480
2481 /* Add some entries to the .dynamic section. We fill in the
2482 values later, in elf32_hppa_finish_dynamic_sections, but we
2483 must add the entries now so that we get the correct size for
2484 the .dynamic section. The DT_DEBUG entry is filled in by the
2485 dynamic linker and used by the debugger. */
dc810e39 2486 if (!info->shared)
30667bf3 2487 {
dc810e39 2488 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2489 return false;
2490 }
2491
83c81bfe 2492 if (htab->srelplt->_raw_size != 0)
30667bf3 2493 {
dc810e39
AM
2494 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2495 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2496 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2497 return false;
2498 }
2499
2500 if (relocs)
2501 {
dc810e39
AM
2502 if (!add_dynamic_entry (DT_RELA, 0)
2503 || !add_dynamic_entry (DT_RELASZ, 0)
2504 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2505 return false;
30667bf3 2506
98ceb8ce
AM
2507 /* If any dynamic relocs apply to a read-only section,
2508 then we need a DT_TEXTREL entry. */
ebe50bae 2509 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, (PTR) info);
98ceb8ce
AM
2510
2511 if ((info->flags & DF_TEXTREL) != 0)
2512 {
2513 if (!add_dynamic_entry (DT_TEXTREL, 0))
2514 return false;
2515 }
30667bf3
AM
2516 }
2517 }
dc810e39 2518#undef add_dynamic_entry
30667bf3
AM
2519
2520 return true;
2521}
2522
30667bf3
AM
2523/* External entry points for sizing and building linker stubs. */
2524
2525/* Determine and set the size of the stub section for a final link.
2526
2527 The basic idea here is to examine all the relocations looking for
2528 PC-relative calls to a target that is unreachable with a "bl"
2529 instruction. */
2530
2531boolean
47d89dba 2532elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
30667bf3 2533 add_stub_section, layout_sections_again)
25f72752 2534 bfd *output_bfd;
30667bf3 2535 bfd *stub_bfd;
30667bf3 2536 struct bfd_link_info *info;
25f72752 2537 boolean multi_subspace;
47d89dba 2538 bfd_signed_vma group_size;
30667bf3
AM
2539 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2540 void (*layout_sections_again) PARAMS ((void));
2541{
2542 bfd *input_bfd;
2543 asection *section;
25f72752 2544 asection **input_list, **list;
30667bf3 2545 Elf_Internal_Sym *local_syms, **all_local_syms;
25f72752
AM
2546 unsigned int bfd_indx, bfd_count;
2547 int top_id, top_index;
83c81bfe 2548 struct elf32_hppa_link_hash_table *htab;
47d89dba
AM
2549 bfd_size_type stub_group_size;
2550 boolean stubs_always_before_branch;
30667bf3 2551 boolean stub_changed = 0;
25f72752 2552 boolean ret = 0;
dc810e39 2553 bfd_size_type amt;
30667bf3 2554
83c81bfe 2555 htab = hppa_link_hash_table (info);
30667bf3
AM
2556
2557 /* Stash our params away. */
83c81bfe
AM
2558 htab->stub_bfd = stub_bfd;
2559 htab->multi_subspace = multi_subspace;
2560 htab->add_stub_section = add_stub_section;
2561 htab->layout_sections_again = layout_sections_again;
47d89dba
AM
2562 stubs_always_before_branch = group_size < 0;
2563 if (group_size < 0)
2564 stub_group_size = -group_size;
2565 else
2566 stub_group_size = group_size;
2567 if (stub_group_size == 1)
2568 {
2569 /* Default values. */
a248e267 2570 stub_group_size = 7680000;
83c81bfe 2571 if (htab->has_17bit_branch || htab->multi_subspace)
a248e267 2572 stub_group_size = 240000;
83c81bfe 2573 if (htab->has_12bit_branch)
a248e267 2574 stub_group_size = 7500;
47d89dba 2575 }
30667bf3 2576
1badb539
AM
2577 /* Count the number of input BFDs and find the top input section id. */
2578 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2579 input_bfd != NULL;
2580 input_bfd = input_bfd->link_next)
2581 {
2582 bfd_count += 1;
25f72752
AM
2583 for (section = input_bfd->sections;
2584 section != NULL;
2585 section = section->next)
2586 {
2587 if (top_id < section->id)
2588 top_id = section->id;
2589 }
30667bf3
AM
2590 }
2591
dc810e39 2592 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2593 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2594 if (htab->stub_group == NULL)
30667bf3
AM
2595 return false;
2596
1badb539
AM
2597 /* Make a list of input sections for each output section included in
2598 the link.
2599
2600 We can't use output_bfd->section_count here to find the top output
2601 section index as some sections may have been removed, and
2602 _bfd_strip_section_from_output doesn't renumber the indices. */
2603 for (section = output_bfd->sections, top_index = 0;
2604 section != NULL;
2605 section = section->next)
2606 {
2607 if (top_index < section->index)
2608 top_index = section->index;
2609 }
2610
dc810e39
AM
2611 amt = sizeof (asection *) * (top_index + 1);
2612 input_list = (asection **) bfd_malloc (amt);
25f72752
AM
2613 if (input_list == NULL)
2614 return false;
2615
1badb539
AM
2616 /* For sections we aren't interested in, mark their entries with a
2617 value we can check later. */
2618 list = input_list + top_index;
2619 do
2620 *list = bfd_abs_section_ptr;
2621 while (list-- != input_list);
2622
2623 for (section = output_bfd->sections;
2624 section != NULL;
2625 section = section->next)
2626 {
47d89dba 2627 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2628 input_list[section->index] = NULL;
2629 }
2630
2631 /* Now actually build the lists. */
25f72752
AM
2632 for (input_bfd = info->input_bfds;
2633 input_bfd != NULL;
2634 input_bfd = input_bfd->link_next)
2635 {
2636 for (section = input_bfd->sections;
2637 section != NULL;
2638 section = section->next)
2639 {
2640 if (section->output_section != NULL
1badb539
AM
2641 && section->output_section->owner == output_bfd
2642 && section->output_section->index <= top_index)
25f72752
AM
2643 {
2644 list = input_list + section->output_section->index;
1badb539
AM
2645 if (*list != bfd_abs_section_ptr)
2646 {
2647 /* Steal the link_sec pointer for our list. */
83c81bfe 2648#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
1badb539
AM
2649 /* This happens to make the list in reverse order,
2650 which is what we want. */
2651 PREV_SEC (section) = *list;
2652 *list = section;
2653 }
25f72752
AM
2654 }
2655 }
2656 }
2657
2658 /* See whether we can group stub sections together. Grouping stub
2659 sections may result in fewer stubs. More importantly, we need to
2660 put all .init* and .fini* stubs at the beginning of the .init or
2661 .fini output sections respectively, because glibc splits the
2662 _init and _fini functions into multiple parts. Putting a stub in
2663 the middle of a function is not a good idea. */
a017a724 2664 list = input_list + top_index;
1badb539 2665 do
25f72752
AM
2666 {
2667 asection *tail = *list;
1badb539
AM
2668 if (tail == bfd_abs_section_ptr)
2669 continue;
25f72752
AM
2670 while (tail != NULL)
2671 {
2672 asection *curr;
2673 asection *prev;
2674 bfd_size_type total;
2675
2676 curr = tail;
2677 if (tail->_cooked_size)
2678 total = tail->_cooked_size;
2679 else
2680 total = tail->_raw_size;
2681 while ((prev = PREV_SEC (curr)) != NULL
2682 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2683 < stub_group_size))
25f72752
AM
2684 curr = prev;
2685
2686 /* OK, the size from the start of CURR to the end is less
a248e267 2687 than 240000 bytes and thus can be handled by one stub
25f72752 2688 section. (or the tail section is itself larger than
a248e267 2689 240000 bytes, in which case we may be toast.)
25f72752
AM
2690 We should really be keeping track of the total size of
2691 stubs added here, as stubs contribute to the final output
2692 section size. That's a little tricky, and this way will
a248e267
AM
2693 only break if stubs added total more than 22144 bytes, or
2694 2768 long branch stubs. It seems unlikely for more than
2695 2768 different functions to be called, especially from
2696 code only 240000 bytes long. This limit used to be
2697 250000, but c++ code tends to generate lots of little
2698 functions, and sometimes violated the assumption. */
25f72752
AM
2699 do
2700 {
2701 prev = PREV_SEC (tail);
2702 /* Set up this stub group. */
83c81bfe 2703 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2704 }
2705 while (tail != curr && (tail = prev) != NULL);
2706
a248e267 2707 /* But wait, there's more! Input sections up to 240000
25f72752 2708 bytes before the stub section can be handled by it too. */
47d89dba 2709 if (!stubs_always_before_branch)
25f72752 2710 {
47d89dba
AM
2711 total = 0;
2712 while (prev != NULL
2713 && ((total += tail->output_offset - prev->output_offset)
2714 < stub_group_size))
2715 {
2716 tail = prev;
2717 prev = PREV_SEC (tail);
83c81bfe 2718 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2719 }
25f72752
AM
2720 }
2721 tail = prev;
2722 }
2723 }
1badb539 2724 while (list-- != input_list);
25f72752 2725 free (input_list);
1badb539 2726#undef PREV_SEC
30667bf3
AM
2727
2728 /* We want to read in symbol extension records only once. To do this
2729 we need to read in the local symbols in parallel and save them for
2730 later use; so hold pointers to the local symbols in an array. */
dc810e39
AM
2731 amt = sizeof (Elf_Internal_Sym *) * bfd_count;
2732 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
30667bf3 2733 if (all_local_syms == NULL)
25f72752 2734 return false;
30667bf3
AM
2735
2736 /* Walk over all the input BFDs, swapping in local symbols.
2737 If we are creating a shared library, create hash entries for the
2738 export stubs. */
25f72752 2739 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2740 input_bfd != NULL;
25f72752 2741 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2742 {
2743 Elf_Internal_Shdr *symtab_hdr;
2744 Elf_Internal_Sym *isym;
25f72752 2745 Elf32_External_Sym *ext_syms, *esym, *end_sy;
dc810e39 2746 bfd_size_type sec_size;
edd21aca 2747
252b5132
RH
2748 /* We'll need the symbol table in a second. */
2749 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2750 if (symtab_hdr->sh_info == 0)
2751 continue;
2752
edd21aca
AM
2753 /* We need an array of the local symbols attached to the input bfd.
2754 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2755 sec_size = symtab_hdr->sh_info;
2756 sec_size *= sizeof (Elf_Internal_Sym);
2757 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2758 if (local_syms == NULL)
2759 {
2760 goto error_ret_free_local;
2761 }
25f72752 2762 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2763 sec_size = symtab_hdr->sh_info;
2764 sec_size *= sizeof (Elf32_External_Sym);
2765 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2766 if (ext_syms == NULL)
2767 {
2768 goto error_ret_free_local;
2769 }
2770
2771 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2772 || (bfd_bread (ext_syms, sec_size, input_bfd) != sec_size))
edd21aca
AM
2773 {
2774 free (ext_syms);
2775 goto error_ret_free_local;
2776 }
2777
2778 /* Swap the local symbols in. */
2779 isym = local_syms;
2780 esym = ext_syms;
25f72752 2781 for (end_sy = esym + symtab_hdr->sh_info; esym < end_sy; esym++, isym++)
edd21aca
AM
2782 bfd_elf32_swap_symbol_in (input_bfd, esym, isym);
2783
2784 /* Now we can free the external symbols. */
2785 free (ext_syms);
edd21aca 2786
83c81bfe 2787 if (info->shared && htab->multi_subspace)
30667bf3 2788 {
25f72752
AM
2789 struct elf_link_hash_entry **sym_hashes;
2790 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2791 unsigned int symcount;
2792
2793 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2794 - symtab_hdr->sh_info);
25f72752
AM
2795 sym_hashes = elf_sym_hashes (input_bfd);
2796 end_hashes = sym_hashes + symcount;
30667bf3
AM
2797
2798 /* Look through the global syms for functions; We need to
2799 build export stubs for all globally visible functions. */
25f72752 2800 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2801 {
2802 struct elf32_hppa_link_hash_entry *hash;
2803
25f72752 2804 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2805
2806 while (hash->elf.root.type == bfd_link_hash_indirect
2807 || hash->elf.root.type == bfd_link_hash_warning)
2808 hash = ((struct elf32_hppa_link_hash_entry *)
2809 hash->elf.root.u.i.link);
2810
2811 /* At this point in the link, undefined syms have been
2812 resolved, so we need to check that the symbol was
2813 defined in this BFD. */
2814 if ((hash->elf.root.type == bfd_link_hash_defined
2815 || hash->elf.root.type == bfd_link_hash_defweak)
2816 && hash->elf.type == STT_FUNC
2817 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2818 && (hash->elf.root.u.def.section->output_section->owner
2819 == output_bfd)
30667bf3
AM
2820 && hash->elf.root.u.def.section->owner == input_bfd
2821 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2822 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2823 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2824 {
2825 asection *sec;
2826 const char *stub_name;
2827 struct elf32_hppa_stub_hash_entry *stub_entry;
2828
2829 sec = hash->elf.root.u.def.section;
2830 stub_name = hash->elf.root.root.string;
83c81bfe 2831 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2832 stub_name,
2833 false, false);
2834 if (stub_entry == NULL)
2835 {
83c81bfe 2836 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3
AM
2837 if (!stub_entry)
2838 goto error_ret_free_local;
2839
2840 stub_entry->target_value = hash->elf.root.u.def.value;
2841 stub_entry->target_section = hash->elf.root.u.def.section;
2842 stub_entry->stub_type = hppa_stub_export;
2843 stub_entry->h = hash;
2844 stub_changed = 1;
2845 }
2846 else
2847 {
2848 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2849 bfd_archive_filename (input_bfd),
2850 stub_name);
30667bf3
AM
2851 }
2852 }
2853 }
30667bf3
AM
2854 }
2855 }
edd21aca
AM
2856
2857 while (1)
2858 {
30667bf3
AM
2859 asection *stub_sec;
2860
25f72752 2861 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2862 input_bfd != NULL;
25f72752 2863 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2864 {
2865 Elf_Internal_Shdr *symtab_hdr;
2866
2867 /* We'll need the symbol table in a second. */
2868 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2869 if (symtab_hdr->sh_info == 0)
2870 continue;
2871
25f72752 2872 local_syms = all_local_syms[bfd_indx];
30667bf3
AM
2873
2874 /* Walk over each section attached to the input bfd. */
2875 for (section = input_bfd->sections;
2876 section != NULL;
25f72752 2877 section = section->next)
30667bf3
AM
2878 {
2879 Elf_Internal_Shdr *input_rel_hdr;
2880 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2881 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2882
2883 /* If there aren't any relocs, then there's nothing more
2884 to do. */
2885 if ((section->flags & SEC_RELOC) == 0
2886 || section->reloc_count == 0)
2887 continue;
2888
25f72752
AM
2889 /* If this section is a link-once section that will be
2890 discarded, then don't create any stubs. */
2891 if (section->output_section == NULL
2892 || section->output_section->owner != output_bfd)
2893 continue;
2894
30667bf3 2895 /* Allocate space for the external relocations. */
dc810e39
AM
2896 amt = section->reloc_count;
2897 amt *= sizeof (Elf32_External_Rela);
2898 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
2899 if (external_relocs == NULL)
2900 {
2901 goto error_ret_free_local;
2902 }
2903
2904 /* Likewise for the internal relocations. */
dc810e39
AM
2905 amt = section->reloc_count;
2906 amt *= sizeof (Elf_Internal_Rela);
2907 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
2908 if (internal_relocs == NULL)
2909 {
2910 free (external_relocs);
2911 goto error_ret_free_local;
2912 }
2913
2914 /* Read in the external relocs. */
2915 input_rel_hdr = &elf_section_data (section)->rel_hdr;
2916 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2917 || bfd_bread (external_relocs,
30667bf3
AM
2918 input_rel_hdr->sh_size,
2919 input_bfd) != input_rel_hdr->sh_size)
2920 {
2921 free (external_relocs);
2922 error_ret_free_internal:
2923 free (internal_relocs);
2924 goto error_ret_free_local;
2925 }
2926
2927 /* Swap in the relocs. */
2928 erela = external_relocs;
2929 erelaend = erela + section->reloc_count;
2930 irela = internal_relocs;
2931 for (; erela < erelaend; erela++, irela++)
2932 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
2933
2934 /* We're done with the external relocs, free them. */
2935 free (external_relocs);
2936
2937 /* Now examine each relocation. */
2938 irela = internal_relocs;
2939 irelaend = irela + section->reloc_count;
2940 for (; irela < irelaend; irela++)
2941 {
2942 unsigned int r_type, r_indx;
2943 enum elf32_hppa_stub_type stub_type;
2944 struct elf32_hppa_stub_hash_entry *stub_entry;
2945 asection *sym_sec;
2946 bfd_vma sym_value;
2947 bfd_vma destination;
2948 struct elf32_hppa_link_hash_entry *hash;
2949 char *stub_name;
25f72752 2950 const asection *id_sec;
30667bf3
AM
2951
2952 r_type = ELF32_R_TYPE (irela->r_info);
2953 r_indx = ELF32_R_SYM (irela->r_info);
2954
2955 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2956 {
2957 bfd_set_error (bfd_error_bad_value);
2958 goto error_ret_free_internal;
2959 }
2960
2961 /* Only look for stubs on call instructions. */
2962 if (r_type != (unsigned int) R_PARISC_PCREL12F
2963 && r_type != (unsigned int) R_PARISC_PCREL17F
2964 && r_type != (unsigned int) R_PARISC_PCREL22F)
2965 continue;
2966
2967 /* Now determine the call target, its name, value,
2968 section. */
2969 sym_sec = NULL;
2970 sym_value = 0;
2971 destination = 0;
2972 hash = NULL;
2973 if (r_indx < symtab_hdr->sh_info)
2974 {
2975 /* It's a local symbol. */
2976 Elf_Internal_Sym *sym;
2977 Elf_Internal_Shdr *hdr;
2978
2979 sym = local_syms + r_indx;
2980 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
2981 sym_sec = hdr->bfd_section;
2982 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2983 sym_value = sym->st_value;
2984 destination = (sym_value + irela->r_addend
2985 + sym_sec->output_offset
2986 + sym_sec->output_section->vma);
2987 }
2988 else
2989 {
2990 /* It's an external symbol. */
2991 int e_indx;
2992
2993 e_indx = r_indx - symtab_hdr->sh_info;
2994 hash = ((struct elf32_hppa_link_hash_entry *)
2995 elf_sym_hashes (input_bfd)[e_indx]);
2996
2997 while (hash->elf.root.type == bfd_link_hash_indirect
2998 || hash->elf.root.type == bfd_link_hash_warning)
2999 hash = ((struct elf32_hppa_link_hash_entry *)
3000 hash->elf.root.u.i.link);
3001
3002 if (hash->elf.root.type == bfd_link_hash_defined
3003 || hash->elf.root.type == bfd_link_hash_defweak)
3004 {
3005 sym_sec = hash->elf.root.u.def.section;
3006 sym_value = hash->elf.root.u.def.value;
3007 if (sym_sec->output_section != NULL)
3008 destination = (sym_value + irela->r_addend
3009 + sym_sec->output_offset
3010 + sym_sec->output_section->vma);
3011 }
3012 else if (hash->elf.root.type == bfd_link_hash_undefweak)
3013 {
3014 if (! info->shared)
3015 continue;
3016 }
3017 else if (hash->elf.root.type == bfd_link_hash_undefined)
3018 {
3019 if (! (info->shared
3020 && !info->no_undefined
3021 && (ELF_ST_VISIBILITY (hash->elf.other)
2a5aaecb
AM
3022 == STV_DEFAULT)
3023 && hash->elf.type != STT_PARISC_MILLI))
30667bf3
AM
3024 continue;
3025 }
3026 else
3027 {
3028 bfd_set_error (bfd_error_bad_value);
3029 goto error_ret_free_internal;
3030 }
3031 }
3032
3033 /* Determine what (if any) linker stub is needed. */
3034 stub_type = hppa_type_of_stub (section, irela, hash,
3035 destination);
3036 if (stub_type == hppa_stub_none)
3037 continue;
3038
25f72752 3039 /* Support for grouping stub sections. */
83c81bfe 3040 id_sec = htab->stub_group[section->id].link_sec;
25f72752 3041
30667bf3 3042 /* Get the name of this stub. */
25f72752 3043 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
3044 if (!stub_name)
3045 goto error_ret_free_internal;
3046
83c81bfe 3047 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
3048 stub_name,
3049 false, false);
3050 if (stub_entry != NULL)
3051 {
3052 /* The proper stub has already been created. */
3053 free (stub_name);
3054 continue;
3055 }
3056
83c81bfe 3057 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
3058 if (stub_entry == NULL)
3059 {
3060 free (stub_name);
3061 goto error_ret_free_local;
3062 }
3063
3064 stub_entry->target_value = sym_value;
3065 stub_entry->target_section = sym_sec;
3066 stub_entry->stub_type = stub_type;
3067 if (info->shared)
3068 {
3069 if (stub_type == hppa_stub_import)
3070 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 3071 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
3072 stub_entry->stub_type = hppa_stub_long_branch_shared;
3073 }
3074 stub_entry->h = hash;
3075 stub_changed = 1;
3076 }
3077
3078 /* We're done with the internal relocs, free them. */
3079 free (internal_relocs);
3080 }
3081 }
3082
3083 if (!stub_changed)
3084 break;
3085
3086 /* OK, we've added some stubs. Find out the new size of the
3087 stub sections. */
83c81bfe 3088 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3089 stub_sec != NULL;
3090 stub_sec = stub_sec->next)
3091 {
74d1c347
AM
3092 stub_sec->_raw_size = 0;
3093 stub_sec->_cooked_size = 0;
3094 }
74d1c347 3095
83c81bfe 3096 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3097
30667bf3 3098 /* Ask the linker to do its stuff. */
83c81bfe 3099 (*htab->layout_sections_again) ();
30667bf3
AM
3100 stub_changed = 0;
3101 }
3102
25f72752 3103 ret = 1;
30667bf3
AM
3104
3105 error_ret_free_local:
25f72752
AM
3106 while (bfd_count-- > 0)
3107 if (all_local_syms[bfd_count])
3108 free (all_local_syms[bfd_count]);
30667bf3
AM
3109 free (all_local_syms);
3110
25f72752 3111 return ret;
30667bf3
AM
3112}
3113
30667bf3
AM
3114/* For a final link, this function is called after we have sized the
3115 stubs to provide a value for __gp. */
3116
3117boolean
3118elf32_hppa_set_gp (abfd, info)
3119 bfd *abfd;
3120 struct bfd_link_info *info;
3121{
83c81bfe 3122 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3123 struct elf_link_hash_entry *h;
3124 asection *sec;
3125 bfd_vma gp_val;
3126
83c81bfe 3127 htab = hppa_link_hash_table (info);
ebe50bae 3128 h = elf_link_hash_lookup (&htab->elf, "$global$", false, false, false);
30667bf3 3129
df8634e3
AM
3130 if (h != NULL
3131 && (h->root.type == bfd_link_hash_defined
3132 || h->root.type == bfd_link_hash_defweak))
30667bf3
AM
3133 {
3134 gp_val = h->root.u.def.value;
3135 sec = h->root.u.def.section;
3136 }
3137 else
3138 {
74d1c347
AM
3139 /* Choose to point our LTP at, in this order, one of .plt, .got,
3140 or .data, if these sections exist. In the case of choosing
3141 .plt try to make the LTP ideal for addressing anywhere in the
3142 .plt or .got with a 14 bit signed offset. Typically, the end
3143 of the .plt is the start of the .got, so choose .plt + 0x2000
3144 if either the .plt or .got is larger than 0x2000. If both
3145 the .plt and .got are smaller than 0x2000, choose the end of
3146 the .plt section. */
3147
83c81bfe 3148 sec = htab->splt;
74d1c347 3149 if (sec != NULL)
30667bf3 3150 {
74d1c347
AM
3151 gp_val = sec->_raw_size;
3152 if (gp_val > 0x2000
83c81bfe 3153 || (htab->sgot && htab->sgot->_raw_size > 0x2000))
74d1c347
AM
3154 {
3155 gp_val = 0x2000;
3156 }
3157 }
3158 else
3159 {
3160 gp_val = 0;
83c81bfe 3161 sec = htab->sgot;
74d1c347
AM
3162 if (sec != NULL)
3163 {
3164 /* We know we don't have a .plt. If .got is large,
3165 offset our LTP. */
3166 if (sec->_raw_size > 0x2000)
3167 gp_val = 0x2000;
3168 }
3169 else
3170 {
3171 /* No .plt or .got. Who cares what the LTP is? */
3172 sec = bfd_get_section_by_name (abfd, ".data");
3173 }
30667bf3 3174 }
df8634e3
AM
3175
3176 if (h != NULL)
3177 {
3178 h->root.type = bfd_link_hash_defined;
3179 h->root.u.def.value = gp_val;
3180 if (sec != NULL)
3181 h->root.u.def.section = sec;
3182 else
3183 h->root.u.def.section = bfd_abs_section_ptr;
3184 }
30667bf3
AM
3185 }
3186
b32b5d6e 3187 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3188 gp_val += sec->output_section->vma + sec->output_offset;
3189
3190 elf_gp (abfd) = gp_val;
30667bf3
AM
3191 return true;
3192}
3193
30667bf3
AM
3194/* Build all the stubs associated with the current output file. The
3195 stubs are kept in a hash table attached to the main linker hash
3196 table. We also set up the .plt entries for statically linked PIC
3197 functions here. This function is called via hppaelf_finish in the
3198 linker. */
3199
3200boolean
3201elf32_hppa_build_stubs (info)
3202 struct bfd_link_info *info;
3203{
3204 asection *stub_sec;
3205 struct bfd_hash_table *table;
83c81bfe 3206 struct elf32_hppa_link_hash_table *htab;
30667bf3 3207
83c81bfe 3208 htab = hppa_link_hash_table (info);
30667bf3 3209
83c81bfe 3210 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3211 stub_sec != NULL;
3212 stub_sec = stub_sec->next)
3213 {
dc810e39 3214 bfd_size_type size;
30667bf3
AM
3215
3216 /* Allocate memory to hold the linker stubs. */
74d1c347 3217 size = stub_sec->_raw_size;
83c81bfe 3218 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3219 if (stub_sec->contents == NULL && size != 0)
3220 return false;
74d1c347 3221 stub_sec->_raw_size = 0;
30667bf3
AM
3222 }
3223
3224 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3225 table = &htab->stub_hash_table;
30667bf3
AM
3226 bfd_hash_traverse (table, hppa_build_one_stub, info);
3227
3228 return true;
3229}
3230
c46b7515
AM
3231/* Perform a final link. */
3232
3233static boolean
3234elf32_hppa_final_link (abfd, info)
3235 bfd *abfd;
3236 struct bfd_link_info *info;
3237{
3238 asection *s;
3239
4dc86686
AM
3240 /* Invoke the regular ELF linker to do all the work. */
3241 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3242 return false;
3243
3244 /* If we're producing a final executable, sort the contents of the
3245 unwind section. Magic section names, but this is much safer than
3246 having elf32_hppa_relocate_section remember where SEGREL32 relocs
3247 occurred. Consider what happens if someone inept creates a
3248 linker script that puts unwind information in .text. */
3249 s = bfd_get_section_by_name (abfd, ".PARISC.unwind");
3250 if (s != NULL)
3251 {
3252 bfd_size_type size;
3253 char *contents;
3254
3255 size = s->_raw_size;
3256 contents = bfd_malloc (size);
3257 if (contents == NULL)
3258 return false;
3259
3260 if (! bfd_get_section_contents (abfd, s, contents, (file_ptr) 0, size))
3261 return false;
3262
dc810e39 3263 qsort (contents, (size_t) (size / 16), 16, hppa_unwind_entry_compare);
c46b7515
AM
3264
3265 if (! bfd_set_section_contents (abfd, s, contents, (file_ptr) 0, size))
3266 return false;
3267 }
3268 return true;
3269}
3270
3271/* Record the lowest address for the data and text segments. */
3272
3273static void
3274hppa_record_segment_addr (abfd, section, data)
3275 bfd *abfd ATTRIBUTE_UNUSED;
3276 asection *section;
3277 PTR data;
3278{
83c81bfe 3279 struct elf32_hppa_link_hash_table *htab;
c46b7515 3280
83c81bfe 3281 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3282
3283 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3284 {
3285 bfd_vma value = section->vma - section->filepos;
3286
3287 if ((section->flags & SEC_READONLY) != 0)
3288 {
83c81bfe
AM
3289 if (value < htab->text_segment_base)
3290 htab->text_segment_base = value;
c46b7515
AM
3291 }
3292 else
3293 {
83c81bfe
AM
3294 if (value < htab->data_segment_base)
3295 htab->data_segment_base = value;
c46b7515
AM
3296 }
3297 }
3298}
3299
30667bf3
AM
3300/* Perform a relocation as part of a final link. */
3301
3302static bfd_reloc_status_type
83c81bfe 3303final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3304 asection *input_section;
3305 bfd_byte *contents;
3306 const Elf_Internal_Rela *rel;
3307 bfd_vma value;
83c81bfe 3308 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3309 asection *sym_sec;
3310 struct elf32_hppa_link_hash_entry *h;
3311{
3312 int insn;
3313 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3314 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3315 int r_format = howto->bitsize;
3316 enum hppa_reloc_field_selector_type_alt r_field;
3317 bfd *input_bfd = input_section->owner;
3318 bfd_vma offset = rel->r_offset;
3319 bfd_vma max_branch_offset = 0;
3320 bfd_byte *hit_data = contents + offset;
3321 bfd_signed_vma addend = rel->r_addend;
3322 bfd_vma location;
3323 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3324 int val;
3325
3326 if (r_type == R_PARISC_NONE)
3327 return bfd_reloc_ok;
3328
3329 insn = bfd_get_32 (input_bfd, hit_data);
3330
3331 /* Find out where we are and where we're going. */
3332 location = (offset +
3333 input_section->output_offset +
3334 input_section->output_section->vma);
3335
3336 switch (r_type)
3337 {
3338 case R_PARISC_PCREL12F:
3339 case R_PARISC_PCREL17F:
3340 case R_PARISC_PCREL22F:
3341 /* If this is a call to a function defined in another dynamic
3342 library, or if it is a call to a PIC function in the same
74d1c347
AM
3343 object, or if this is a shared link and it is a call to a
3344 weak symbol which may or may not be in the same object, then
3345 find the import stub in the stub hash. */
30667bf3
AM
3346 if (sym_sec == NULL
3347 || sym_sec->output_section == NULL
12cca0d2
AM
3348 || (h != NULL
3349 && ((h->maybe_pic_call
3350 && !(input_section->flags & SEC_HAS_GOT_REF))
3351 || (h->elf.root.type == bfd_link_hash_defweak
3352 && h->elf.dynindx != -1
3353 && h->elf.plt.offset != (bfd_vma) -1))))
30667bf3
AM
3354 {
3355 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3356 h, rel, htab);
30667bf3
AM
3357 if (stub_entry != NULL)
3358 {
3359 value = (stub_entry->stub_offset
3360 + stub_entry->stub_sec->output_offset
3361 + stub_entry->stub_sec->output_section->vma);
3362 addend = 0;
3363 }
3364 else if (sym_sec == NULL && h != NULL
3365 && h->elf.root.type == bfd_link_hash_undefweak)
3366 {
db20fd76
AM
3367 /* It's OK if undefined weak. Calls to undefined weak
3368 symbols behave as if the "called" function
3369 immediately returns. We can thus call to a weak
3370 function without first checking whether the function
3371 is defined. */
30667bf3 3372 value = location;
db20fd76 3373 addend = 8;
30667bf3
AM
3374 }
3375 else
f09ebc7d 3376 return bfd_reloc_undefined;
30667bf3
AM
3377 }
3378 /* Fall thru. */
3379
3380 case R_PARISC_PCREL21L:
3381 case R_PARISC_PCREL17C:
3382 case R_PARISC_PCREL17R:
3383 case R_PARISC_PCREL14R:
3384 case R_PARISC_PCREL14F:
3385 /* Make it a pc relative offset. */
3386 value -= location;
3387 addend -= 8;
3388 break;
3389
3390 case R_PARISC_DPREL21L:
3391 case R_PARISC_DPREL14R:
3392 case R_PARISC_DPREL14F:
3393 /* For all the DP relative relocations, we need to examine the symbol's
3394 section. If it's a code section, then "data pointer relative" makes
3395 no sense. In that case we don't adjust the "value", and for 21 bit
3396 addil instructions, we change the source addend register from %dp to
3397 %r0. This situation commonly arises when a variable's "constness"
3398 is declared differently from the way the variable is defined. For
3399 instance: "extern int foo" with foo defined as "const int foo". */
3400 if (sym_sec == NULL)
3401 break;
3402 if ((sym_sec->flags & SEC_CODE) != 0)
3403 {
3404 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3405 == (((int) OP_ADDIL << 26) | (27 << 21)))
3406 {
3407 insn &= ~ (0x1f << 21);
74d1c347 3408#if 1 /* debug them. */
30667bf3
AM
3409 (*_bfd_error_handler)
3410 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3411 bfd_archive_filename (input_bfd),
30667bf3
AM
3412 input_section->name,
3413 (long) rel->r_offset,
3414 howto->name);
3415#endif
3416 }
3417 /* Now try to make things easy for the dynamic linker. */
3418
3419 break;
3420 }
74d1c347 3421 /* Fall thru. */
30667bf3
AM
3422
3423 case R_PARISC_DLTIND21L:
3424 case R_PARISC_DLTIND14R:
3425 case R_PARISC_DLTIND14F:
3426 value -= elf_gp (input_section->output_section->owner);
3427 break;
3428
c46b7515
AM
3429 case R_PARISC_SEGREL32:
3430 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3431 value -= htab->text_segment_base;
c46b7515 3432 else
83c81bfe 3433 value -= htab->data_segment_base;
c46b7515
AM
3434 break;
3435
30667bf3
AM
3436 default:
3437 break;
3438 }
3439
3440 switch (r_type)
3441 {
3442 case R_PARISC_DIR32:
47d89dba 3443 case R_PARISC_DIR14F:
30667bf3
AM
3444 case R_PARISC_DIR17F:
3445 case R_PARISC_PCREL17C:
3446 case R_PARISC_PCREL14F:
3447 case R_PARISC_DPREL14F:
3448 case R_PARISC_PLABEL32:
3449 case R_PARISC_DLTIND14F:
3450 case R_PARISC_SEGBASE:
3451 case R_PARISC_SEGREL32:
3452 r_field = e_fsel;
3453 break;
3454
3455 case R_PARISC_DIR21L:
3456 case R_PARISC_PCREL21L:
3457 case R_PARISC_DPREL21L:
3458 case R_PARISC_PLABEL21L:
3459 case R_PARISC_DLTIND21L:
3460 r_field = e_lrsel;
3461 break;
3462
3463 case R_PARISC_DIR17R:
3464 case R_PARISC_PCREL17R:
3465 case R_PARISC_DIR14R:
3466 case R_PARISC_PCREL14R:
3467 case R_PARISC_DPREL14R:
3468 case R_PARISC_PLABEL14R:
3469 case R_PARISC_DLTIND14R:
3470 r_field = e_rrsel;
3471 break;
3472
3473 case R_PARISC_PCREL12F:
3474 case R_PARISC_PCREL17F:
3475 case R_PARISC_PCREL22F:
3476 r_field = e_fsel;
3477
3478 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3479 {
3480 max_branch_offset = (1 << (17-1)) << 2;
3481 }
3482 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3483 {
3484 max_branch_offset = (1 << (12-1)) << 2;
3485 }
3486 else
3487 {
3488 max_branch_offset = (1 << (22-1)) << 2;
3489 }
3490
3491 /* sym_sec is NULL on undefined weak syms or when shared on
3492 undefined syms. We've already checked for a stub for the
3493 shared undefined case. */
3494 if (sym_sec == NULL)
3495 break;
3496
3497 /* If the branch is out of reach, then redirect the
3498 call to the local stub for this function. */
3499 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3500 {
3501 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3502 h, rel, htab);
30667bf3 3503 if (stub_entry == NULL)
f09ebc7d 3504 return bfd_reloc_undefined;
30667bf3
AM
3505
3506 /* Munge up the value and addend so that we call the stub
3507 rather than the procedure directly. */
3508 value = (stub_entry->stub_offset
3509 + stub_entry->stub_sec->output_offset
3510 + stub_entry->stub_sec->output_section->vma
3511 - location);
3512 addend = -8;
3513 }
3514 break;
3515
3516 /* Something we don't know how to handle. */
3517 default:
3518 return bfd_reloc_notsupported;
3519 }
3520
3521 /* Make sure we can reach the stub. */
3522 if (max_branch_offset != 0
3523 && value + addend + max_branch_offset >= 2*max_branch_offset)
3524 {
3525 (*_bfd_error_handler)
3526 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3527 bfd_archive_filename (input_bfd),
30667bf3
AM
3528 input_section->name,
3529 (long) rel->r_offset,
3530 stub_entry->root.string);
ce757d15 3531 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3532 return bfd_reloc_notsupported;
3533 }
3534
3535 val = hppa_field_adjust (value, addend, r_field);
3536
3537 switch (r_type)
3538 {
3539 case R_PARISC_PCREL12F:
3540 case R_PARISC_PCREL17C:
3541 case R_PARISC_PCREL17F:
3542 case R_PARISC_PCREL17R:
3543 case R_PARISC_PCREL22F:
3544 case R_PARISC_DIR17F:
3545 case R_PARISC_DIR17R:
3546 /* This is a branch. Divide the offset by four.
3547 Note that we need to decide whether it's a branch or
3548 otherwise by inspecting the reloc. Inspecting insn won't
3549 work as insn might be from a .word directive. */
3550 val >>= 2;
3551 break;
3552
3553 default:
3554 break;
3555 }
3556
3557 insn = hppa_rebuild_insn (insn, val, r_format);
3558
3559 /* Update the instruction word. */
74d1c347 3560 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3561 return bfd_reloc_ok;
3562}
3563
30667bf3
AM
3564/* Relocate an HPPA ELF section. */
3565
3566static boolean
3567elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3568 contents, relocs, local_syms, local_sections)
3569 bfd *output_bfd;
3570 struct bfd_link_info *info;
3571 bfd *input_bfd;
3572 asection *input_section;
3573 bfd_byte *contents;
3574 Elf_Internal_Rela *relocs;
3575 Elf_Internal_Sym *local_syms;
3576 asection **local_sections;
3577{
30667bf3 3578 bfd_vma *local_got_offsets;
83c81bfe 3579 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3580 Elf_Internal_Shdr *symtab_hdr;
3581 Elf_Internal_Rela *rel;
3582 Elf_Internal_Rela *relend;
30667bf3
AM
3583
3584 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3585
83c81bfe 3586 htab = hppa_link_hash_table (info);
74d1c347 3587 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3588
3589 rel = relocs;
3590 relend = relocs + input_section->reloc_count;
3591 for (; rel < relend; rel++)
3592 {
3593 unsigned int r_type;
3594 reloc_howto_type *howto;
3595 unsigned int r_symndx;
3596 struct elf32_hppa_link_hash_entry *h;
3597 Elf_Internal_Sym *sym;
3598 asection *sym_sec;
3599 bfd_vma relocation;
3600 bfd_reloc_status_type r;
3601 const char *sym_name;
74d1c347 3602 boolean plabel;
f09ebc7d 3603 boolean warned_undef;
30667bf3
AM
3604
3605 r_type = ELF32_R_TYPE (rel->r_info);
3606 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3607 {
3608 bfd_set_error (bfd_error_bad_value);
3609 return false;
3610 }
3611 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3612 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3613 continue;
3614
3615 r_symndx = ELF32_R_SYM (rel->r_info);
3616
3617 if (info->relocateable)
3618 {
3ac8354b 3619 /* This is a relocatable link. We don't have to change
30667bf3
AM
3620 anything, unless the reloc is against a section symbol,
3621 in which case we have to adjust according to where the
3622 section symbol winds up in the output section. */
3623 if (r_symndx < symtab_hdr->sh_info)
3624 {
3625 sym = local_syms + r_symndx;
3626 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3627 {
3628 sym_sec = local_sections[r_symndx];
3629 rel->r_addend += sym_sec->output_offset;
3630 }
3631 }
3632 continue;
3633 }
3634
3635 /* This is a final link. */
3636 h = NULL;
3637 sym = NULL;
3638 sym_sec = NULL;
f09ebc7d 3639 warned_undef = false;
30667bf3
AM
3640 if (r_symndx < symtab_hdr->sh_info)
3641 {
3642 /* This is a local symbol, h defaults to NULL. */
3643 sym = local_syms + r_symndx;
3644 sym_sec = local_sections[r_symndx];
f8df10f4 3645 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sym_sec, rel);
30667bf3
AM
3646 }
3647 else
3648 {
3649 int indx;
3650
3651 /* It's a global; Find its entry in the link hash. */
3652 indx = r_symndx - symtab_hdr->sh_info;
3653 h = ((struct elf32_hppa_link_hash_entry *)
3654 elf_sym_hashes (input_bfd)[indx]);
3655 while (h->elf.root.type == bfd_link_hash_indirect
3656 || h->elf.root.type == bfd_link_hash_warning)
3657 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3658
3659 relocation = 0;
3660 if (h->elf.root.type == bfd_link_hash_defined
3661 || h->elf.root.type == bfd_link_hash_defweak)
3662 {
3663 sym_sec = h->elf.root.u.def.section;
3664 /* If sym_sec->output_section is NULL, then it's a
3665 symbol defined in a shared library. */
3666 if (sym_sec->output_section != NULL)
3667 relocation = (h->elf.root.u.def.value
3668 + sym_sec->output_offset
3669 + sym_sec->output_section->vma);
3670 }
3671 else if (h->elf.root.type == bfd_link_hash_undefweak)
3672 ;
3673 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3674 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3675 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3676 {
671bae9c 3677 if (info->symbolic && !info->allow_shlib_undefined)
f09ebc7d
AM
3678 {
3679 if (!((*info->callbacks->undefined_symbol)
3680 (info, h->elf.root.root.string, input_bfd,
3681 input_section, rel->r_offset, false)))
3682 return false;
3683 warned_undef = true;
3684 }
30667bf3
AM
3685 }
3686 else
3687 {
3688 if (!((*info->callbacks->undefined_symbol)
3689 (info, h->elf.root.root.string, input_bfd,
3690 input_section, rel->r_offset, true)))
3691 return false;
f09ebc7d 3692 warned_undef = true;
30667bf3
AM
3693 }
3694 }
3695
3696 /* Do any required modifications to the relocation value, and
25f72752
AM
3697 determine what types of dynamic info we need to output, if
3698 any. */
74d1c347 3699 plabel = 0;
30667bf3
AM
3700 switch (r_type)
3701 {
3702 case R_PARISC_DLTIND14F:
3703 case R_PARISC_DLTIND14R:
3704 case R_PARISC_DLTIND21L:
ce757d15
AM
3705 {
3706 bfd_vma off;
3707 boolean do_got = 0;
3708
3709 /* Relocation is to the entry for this symbol in the
3710 global offset table. */
3711 if (h != NULL)
3712 {
3713 boolean dyn;
3714
3715 off = h->elf.got.offset;
3716 dyn = htab->elf.dynamic_sections_created;
3717 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3718 {
3719 /* If we aren't going to call finish_dynamic_symbol,
3720 then we need to handle initialisation of the .got
3721 entry and create needed relocs here. Since the
3722 offset must always be a multiple of 4, we use the
3723 least significant bit to record whether we have
3724 initialised it already. */
3725 if ((off & 1) != 0)
3726 off &= ~1;
3727 else
3728 {
3729 h->elf.got.offset |= 1;
3730 do_got = 1;
3731 }
3732 }
3733 }
3734 else
3735 {
3736 /* Local symbol case. */
3737 if (local_got_offsets == NULL)
3738 abort ();
3739
3740 off = local_got_offsets[r_symndx];
3741
3742 /* The offset must always be a multiple of 4. We use
3743 the least significant bit to record whether we have
3744 already generated the necessary reloc. */
3745 if ((off & 1) != 0)
3746 off &= ~1;
3747 else
3748 {
3749 local_got_offsets[r_symndx] |= 1;
3750 do_got = 1;
3751 }
3752 }
68fb2e56 3753
ce757d15
AM
3754 if (do_got)
3755 {
3756 if (info->shared)
3757 {
3758 /* Output a dynamic relocation for this GOT entry.
3759 In this case it is relative to the base of the
3760 object because the symbol index is zero. */
3761 Elf_Internal_Rela outrel;
3762 asection *srelgot = htab->srelgot;
3763 Elf32_External_Rela *loc;
3764
3765 outrel.r_offset = (off
3766 + htab->sgot->output_offset
3767 + htab->sgot->output_section->vma);
3768 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3769 outrel.r_addend = relocation;
3770 loc = (Elf32_External_Rela *) srelgot->contents;
3771 loc += srelgot->reloc_count++;
3772 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3773 }
3774 else
30667bf3 3775 bfd_put_32 (output_bfd, relocation,
83c81bfe 3776 htab->sgot->contents + off);
ce757d15 3777 }
30667bf3 3778
ce757d15
AM
3779 if (off >= (bfd_vma) -2)
3780 abort ();
30667bf3 3781
ce757d15
AM
3782 /* Add the base of the GOT to the relocation value. */
3783 relocation = (off
3784 + htab->sgot->output_offset
3785 + htab->sgot->output_section->vma);
3786 }
30667bf3 3787 break;
252b5132 3788
c46b7515
AM
3789 case R_PARISC_SEGREL32:
3790 /* If this is the first SEGREL relocation, then initialize
3791 the segment base values. */
83c81bfe
AM
3792 if (htab->text_segment_base == (bfd_vma) -1)
3793 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3794 break;
3795
30667bf3
AM
3796 case R_PARISC_PLABEL14R:
3797 case R_PARISC_PLABEL21L:
3798 case R_PARISC_PLABEL32:
ebe50bae 3799 if (htab->elf.dynamic_sections_created)
252b5132 3800 {
ce757d15
AM
3801 bfd_vma off;
3802 boolean do_plt = 0;
3803
74d1c347
AM
3804 /* If we have a global symbol with a PLT slot, then
3805 redirect this relocation to it. */
3806 if (h != NULL)
3807 {
3808 off = h->elf.plt.offset;
4dc86686 3809 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3810 {
3811 /* In a non-shared link, adjust_dynamic_symbols
3812 isn't called for symbols forced local. We
dc810e39 3813 need to write out the plt entry here. */
8dea1268
AM
3814 if ((off & 1) != 0)
3815 off &= ~1;
3816 else
3817 {
8dea1268 3818 h->elf.plt.offset |= 1;
ce757d15 3819 do_plt = 1;
8dea1268
AM
3820 }
3821 }
74d1c347
AM
3822 }
3823 else
3824 {
68fb2e56
AM
3825 bfd_vma *local_plt_offsets;
3826
3827 if (local_got_offsets == NULL)
3828 abort ();
74d1c347 3829
68fb2e56
AM
3830 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3831 off = local_plt_offsets[r_symndx];
74d1c347
AM
3832
3833 /* As for the local .got entry case, we use the last
3834 bit to record whether we've already initialised
3835 this local .plt entry. */
3836 if ((off & 1) != 0)
3837 off &= ~1;
ce757d15
AM
3838 else
3839 {
3840 local_plt_offsets[r_symndx] |= 1;
3841 do_plt = 1;
3842 }
3843 }
3844
3845 if (do_plt)
3846 {
3847 if (info->shared)
3848 {
3849 /* Output a dynamic IPLT relocation for this
3850 PLT entry. */
3851 Elf_Internal_Rela outrel;
3852 asection *srelplt = htab->srelplt;
3853 Elf32_External_Rela *loc;
3854
3855 outrel.r_offset = (off
3856 + htab->splt->output_offset
3857 + htab->splt->output_section->vma);
3858 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3859 outrel.r_addend = relocation;
3860 loc = (Elf32_External_Rela *) srelplt->contents;
3861 loc += srelplt->reloc_count++;
3862 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3863 }
74d1c347
AM
3864 else
3865 {
3866 bfd_put_32 (output_bfd,
3867 relocation,
83c81bfe 3868 htab->splt->contents + off);
74d1c347 3869 bfd_put_32 (output_bfd,
83c81bfe
AM
3870 elf_gp (htab->splt->output_section->owner),
3871 htab->splt->contents + off + 4);
74d1c347
AM
3872 }
3873 }
3874
68fb2e56 3875 if (off >= (bfd_vma) -2)
49e9d0d3 3876 abort ();
74d1c347
AM
3877
3878 /* PLABELs contain function pointers. Relocation is to
3879 the entry for the function in the .plt. The magic +2
3880 offset signals to $$dyncall that the function pointer
3881 is in the .plt and thus has a gp pointer too.
3882 Exception: Undefined PLABELs should have a value of
3883 zero. */
3884 if (h == NULL
3885 || (h->elf.root.type != bfd_link_hash_undefweak
3886 && h->elf.root.type != bfd_link_hash_undefined))
3887 {
3888 relocation = (off
83c81bfe
AM
3889 + htab->splt->output_offset
3890 + htab->splt->output_section->vma
74d1c347
AM
3891 + 2);
3892 }
3893 plabel = 1;
30667bf3
AM
3894 }
3895 /* Fall through and possibly emit a dynamic relocation. */
3896
3897 case R_PARISC_DIR17F:
3898 case R_PARISC_DIR17R:
47d89dba 3899 case R_PARISC_DIR14F:
30667bf3
AM
3900 case R_PARISC_DIR14R:
3901 case R_PARISC_DIR21L:
3902 case R_PARISC_DPREL14F:
3903 case R_PARISC_DPREL14R:
3904 case R_PARISC_DPREL21L:
3905 case R_PARISC_DIR32:
ec338859
AM
3906 /* r_symndx will be zero only for relocs against symbols
3907 from removed linkonce sections, or sections discarded by
3908 a linker script. */
3909 if (r_symndx == 0
3910 || (input_section->flags & SEC_ALLOC) == 0)
3911 break;
3912
30667bf3 3913 /* The reloc types handled here and this conditional
56882138 3914 expression must match the code in ..check_relocs and
ec338859 3915 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
3916 as in ..check_relocs, with some extra conditions (dynindx
3917 test in this case) to cater for relocs removed by
ec338859 3918 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
3919 here does indeed match the one in ..check_relocs, the
3920 difference being that here we test DEF_DYNAMIC as well as
3921 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3922 which is why we can't use just that test here.
3923 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3924 there all files have not been loaded. */
446f2863 3925 if ((info->shared
446f2863
AM
3926 && (IS_ABSOLUTE_RELOC (r_type)
3927 || (h != NULL
3928 && h->elf.dynindx != -1
3929 && (!info->symbolic
3930 || (h->elf.elf_link_hash_flags
3931 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3932 || (!info->shared
446f2863
AM
3933 && h != NULL
3934 && h->elf.dynindx != -1
3935 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3936 && (((h->elf.elf_link_hash_flags
3937 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3938 && (h->elf.elf_link_hash_flags
3939 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3940 || h->elf.root.type == bfd_link_hash_undefweak
3941 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3942 {
3943 Elf_Internal_Rela outrel;
3944 boolean skip;
98ceb8ce
AM
3945 asection *sreloc;
3946 Elf32_External_Rela *loc;
252b5132 3947
30667bf3
AM
3948 /* When generating a shared object, these relocations
3949 are copied into the output file to be resolved at run
3950 time. */
252b5132 3951
30667bf3
AM
3952 outrel.r_offset = rel->r_offset;
3953 outrel.r_addend = rel->r_addend;
3954 skip = false;
3955 if (elf_section_data (input_section)->stab_info != NULL)
edd21aca 3956 {
ce757d15
AM
3957 bfd_vma off;
3958
30667bf3 3959 off = (_bfd_stab_section_offset
ebe50bae 3960 (output_bfd, &htab->elf.stab_info,
30667bf3
AM
3961 input_section,
3962 &elf_section_data (input_section)->stab_info,
3963 rel->r_offset));
3964 if (off == (bfd_vma) -1)
3965 skip = true;
3966 outrel.r_offset = off;
edd21aca 3967 }
252b5132 3968
30667bf3
AM
3969 outrel.r_offset += (input_section->output_offset
3970 + input_section->output_section->vma);
3971
3972 if (skip)
252b5132 3973 {
30667bf3 3974 memset (&outrel, 0, sizeof (outrel));
252b5132 3975 }
74d1c347
AM
3976 else if (h != NULL
3977 && h->elf.dynindx != -1
3978 && (plabel
446f2863
AM
3979 || !IS_ABSOLUTE_RELOC (r_type)
3980 || !info->shared
74d1c347 3981 || !info->symbolic
30667bf3
AM
3982 || (h->elf.elf_link_hash_flags
3983 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3984 {
30667bf3
AM
3985 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3986 }
3987 else /* It's a local symbol, or one marked to become local. */
3988 {
3989 int indx = 0;
edd21aca 3990
30667bf3
AM
3991 /* Add the absolute offset of the symbol. */
3992 outrel.r_addend += relocation;
edd21aca 3993
74d1c347
AM
3994 /* Global plabels need to be processed by the
3995 dynamic linker so that functions have at most one
3996 fptr. For this reason, we need to differentiate
3997 between global and local plabels, which we do by
3998 providing the function symbol for a global plabel
3999 reloc, and no symbol for local plabels. */
4000 if (! plabel
4001 && sym_sec != NULL
30667bf3
AM
4002 && sym_sec->output_section != NULL
4003 && ! bfd_is_abs_section (sym_sec))
252b5132 4004 {
30667bf3
AM
4005 indx = elf_section_data (sym_sec->output_section)->dynindx;
4006 /* We are turning this relocation into one
4007 against a section symbol, so subtract out the
4008 output section's address but not the offset
4009 of the input section in the output section. */
4010 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 4011 }
252b5132 4012
30667bf3
AM
4013 outrel.r_info = ELF32_R_INFO (indx, r_type);
4014 }
68fb2e56
AM
4015#if 0
4016 /* EH info can cause unaligned DIR32 relocs.
4017 Tweak the reloc type for the dynamic linker. */
4018 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
4019 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
4020 R_PARISC_DIR32U);
4021#endif
98ceb8ce
AM
4022 sreloc = elf_section_data (input_section)->sreloc;
4023 if (sreloc == NULL)
4024 abort ();
4025
3ac8354b
AM
4026 loc = (Elf32_External_Rela *) sreloc->contents;
4027 loc += sreloc->reloc_count++;
98ceb8ce 4028 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
4029 }
4030 break;
edd21aca 4031
30667bf3
AM
4032 default:
4033 break;
4034 }
252b5132 4035
30667bf3 4036 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 4037 htab, sym_sec, h);
252b5132 4038
30667bf3
AM
4039 if (r == bfd_reloc_ok)
4040 continue;
252b5132 4041
30667bf3
AM
4042 if (h != NULL)
4043 sym_name = h->elf.root.root.string;
4044 else
4045 {
4046 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4047 symtab_hdr->sh_link,
4048 sym->st_name);
4049 if (sym_name == NULL)
4050 return false;
4051 if (*sym_name == '\0')
4052 sym_name = bfd_section_name (input_bfd, sym_sec);
4053 }
edd21aca 4054
30667bf3 4055 howto = elf_hppa_howto_table + r_type;
252b5132 4056
30667bf3
AM
4057 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
4058 {
f09ebc7d
AM
4059 if (r == bfd_reloc_notsupported || !warned_undef)
4060 {
4061 (*_bfd_error_handler)
4062 (_("%s(%s+0x%lx): cannot handle %s for %s"),
4063 bfd_archive_filename (input_bfd),
4064 input_section->name,
4065 (long) rel->r_offset,
4066 howto->name,
4067 sym_name);
4068 bfd_set_error (bfd_error_bad_value);
4069 return false;
4070 }
30667bf3
AM
4071 }
4072 else
4073 {
4074 if (!((*info->callbacks->reloc_overflow)
4075 (info, sym_name, howto->name, (bfd_vma) 0,
4076 input_bfd, input_section, rel->r_offset)))
4077 return false;
4078 }
4079 }
edd21aca 4080
30667bf3
AM
4081 return true;
4082}
252b5132 4083
c46b7515
AM
4084/* Comparison function for qsort to sort unwind section during a
4085 final link. */
4086
4087static int
4088hppa_unwind_entry_compare (a, b)
4089 const PTR a;
4090 const PTR b;
4091{
4092 const bfd_byte *ap, *bp;
4093 unsigned long av, bv;
4094
4095 ap = (const bfd_byte *) a;
4096 av = (unsigned long) ap[0] << 24;
4097 av |= (unsigned long) ap[1] << 16;
4098 av |= (unsigned long) ap[2] << 8;
4099 av |= (unsigned long) ap[3];
4100
4101 bp = (const bfd_byte *) b;
4102 bv = (unsigned long) bp[0] << 24;
4103 bv |= (unsigned long) bp[1] << 16;
4104 bv |= (unsigned long) bp[2] << 8;
4105 bv |= (unsigned long) bp[3];
4106
4107 return av < bv ? -1 : av > bv ? 1 : 0;
4108}
4109
30667bf3
AM
4110/* Finish up dynamic symbol handling. We set the contents of various
4111 dynamic sections here. */
252b5132 4112
30667bf3
AM
4113static boolean
4114elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4115 bfd *output_bfd;
4116 struct bfd_link_info *info;
4117 struct elf_link_hash_entry *h;
4118 Elf_Internal_Sym *sym;
4119{
83c81bfe 4120 struct elf32_hppa_link_hash_table *htab;
edd21aca 4121
83c81bfe 4122 htab = hppa_link_hash_table (info);
30667bf3 4123
30667bf3
AM
4124 if (h->plt.offset != (bfd_vma) -1)
4125 {
4126 bfd_vma value;
30667bf3 4127
8dea1268
AM
4128 if (h->plt.offset & 1)
4129 abort ();
4130
30667bf3
AM
4131 /* This symbol has an entry in the procedure linkage table. Set
4132 it up.
4133
4134 The format of a plt entry is
74d1c347
AM
4135 <funcaddr>
4136 <__gp>
47d89dba 4137 */
30667bf3
AM
4138 value = 0;
4139 if (h->root.type == bfd_link_hash_defined
4140 || h->root.type == bfd_link_hash_defweak)
4141 {
4142 value = h->root.u.def.value;
4143 if (h->root.u.def.section->output_section != NULL)
4144 value += (h->root.u.def.section->output_offset
4145 + h->root.u.def.section->output_section->vma);
252b5132 4146 }
edd21aca 4147
74d1c347 4148 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4149 {
47d89dba 4150 Elf_Internal_Rela rel;
3ac8354b 4151 Elf32_External_Rela *loc;
47d89dba 4152
30667bf3
AM
4153 /* Create a dynamic IPLT relocation for this entry. */
4154 rel.r_offset = (h->plt.offset
83c81bfe
AM
4155 + htab->splt->output_offset
4156 + htab->splt->output_section->vma);
ce757d15 4157 if (h->dynindx != -1)
74d1c347
AM
4158 {
4159 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4160 rel.r_addend = 0;
4161 }
4162 else
4163 {
4164 /* This symbol has been marked to become local, and is
4165 used by a plabel so must be kept in the .plt. */
4166 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4167 rel.r_addend = value;
4168 }
30667bf3 4169
3ac8354b
AM
4170 loc = (Elf32_External_Rela *) htab->srelplt->contents;
4171 loc += htab->srelplt->reloc_count++;
83c81bfe 4172 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4173 &rel, loc);
30667bf3 4174 }
ce757d15 4175 else
47d89dba 4176 {
ce757d15
AM
4177 bfd_put_32 (htab->splt->owner,
4178 value,
4179 htab->splt->contents + h->plt.offset);
4180 bfd_put_32 (htab->splt->owner,
4181 elf_gp (htab->splt->output_section->owner),
4182 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4183 }
4184
30667bf3
AM
4185 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4186 {
4187 /* Mark the symbol as undefined, rather than as defined in
4188 the .plt section. Leave the value alone. */
4189 sym->st_shndx = SHN_UNDEF;
4190 }
4191 }
edd21aca 4192
30667bf3
AM
4193 if (h->got.offset != (bfd_vma) -1)
4194 {
4195 Elf_Internal_Rela rel;
3ac8354b 4196 Elf32_External_Rela *loc;
30667bf3
AM
4197
4198 /* This symbol has an entry in the global offset table. Set it
4199 up. */
4200
4201 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4202 + htab->sgot->output_offset
4203 + htab->sgot->output_section->vma);
30667bf3 4204
4dc86686
AM
4205 /* If this is a -Bsymbolic link and the symbol is defined
4206 locally or was forced to be local because of a version file,
4207 we just want to emit a RELATIVE reloc. The entry in the
4208 global offset table will already have been initialized in the
4209 relocate_section function. */
4210 if (info->shared
4211 && (info->symbolic || h->dynindx == -1)
4212 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4213 {
74d1c347 4214 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4215 rel.r_addend = (h->root.u.def.value
4216 + h->root.u.def.section->output_offset
4217 + h->root.u.def.section->output_section->vma);
4218 }
4219 else
4220 {
49e9d0d3
AM
4221 if ((h->got.offset & 1) != 0)
4222 abort ();
30667bf3 4223 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4224 htab->sgot->contents + h->got.offset);
30667bf3
AM
4225 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4226 rel.r_addend = 0;
4227 }
edd21aca 4228
3ac8354b
AM
4229 loc = (Elf32_External_Rela *) htab->srelgot->contents;
4230 loc += htab->srelgot->reloc_count++;
4231 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4232 }
edd21aca 4233
30667bf3
AM
4234 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4235 {
4236 asection *s;
4237 Elf_Internal_Rela rel;
3ac8354b 4238 Elf32_External_Rela *loc;
30667bf3
AM
4239
4240 /* This symbol needs a copy reloc. Set it up. */
4241
49e9d0d3
AM
4242 if (! (h->dynindx != -1
4243 && (h->root.type == bfd_link_hash_defined
4244 || h->root.type == bfd_link_hash_defweak)))
4245 abort ();
30667bf3 4246
83c81bfe 4247 s = htab->srelbss;
30667bf3
AM
4248
4249 rel.r_offset = (h->root.u.def.value
4250 + h->root.u.def.section->output_offset
4251 + h->root.u.def.section->output_section->vma);
4252 rel.r_addend = 0;
4253 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
3ac8354b
AM
4254 loc = (Elf32_External_Rela *) s->contents + s->reloc_count++;
4255 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4256 }
4257
4258 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4259 if (h->root.root.string[0] == '_'
4260 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4261 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4262 {
4263 sym->st_shndx = SHN_ABS;
4264 }
4265
4266 return true;
4267}
4268
98ceb8ce
AM
4269/* Used to decide how to sort relocs in an optimal manner for the
4270 dynamic linker, before writing them out. */
4271
4272static enum elf_reloc_type_class
4273elf32_hppa_reloc_type_class (rela)
4274 const Elf_Internal_Rela *rela;
4275{
4276 if (ELF32_R_SYM (rela->r_info) == 0)
4277 return reloc_class_relative;
4278
4279 switch ((int) ELF32_R_TYPE (rela->r_info))
4280 {
4281 case R_PARISC_IPLT:
4282 return reloc_class_plt;
4283 case R_PARISC_COPY:
4284 return reloc_class_copy;
4285 default:
4286 return reloc_class_normal;
4287 }
4288}
4289
30667bf3
AM
4290/* Finish up the dynamic sections. */
4291
4292static boolean
4293elf32_hppa_finish_dynamic_sections (output_bfd, info)
4294 bfd *output_bfd;
4295 struct bfd_link_info *info;
4296{
4297 bfd *dynobj;
83c81bfe 4298 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4299 asection *sdyn;
4300
83c81bfe 4301 htab = hppa_link_hash_table (info);
ebe50bae 4302 dynobj = htab->elf.dynobj;
30667bf3
AM
4303
4304 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4305
ebe50bae 4306 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4307 {
4308 Elf32_External_Dyn *dyncon, *dynconend;
4309
49e9d0d3
AM
4310 if (sdyn == NULL)
4311 abort ();
30667bf3
AM
4312
4313 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4314 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4315 for (; dyncon < dynconend; dyncon++)
edd21aca 4316 {
30667bf3
AM
4317 Elf_Internal_Dyn dyn;
4318 asection *s;
4319
4320 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4321
4322 switch (dyn.d_tag)
4323 {
4324 default:
3ac8354b 4325 continue;
30667bf3
AM
4326
4327 case DT_PLTGOT:
4328 /* Use PLTGOT to set the GOT register. */
4329 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4330 break;
4331
4332 case DT_JMPREL:
83c81bfe 4333 s = htab->srelplt;
30667bf3 4334 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4335 break;
4336
4337 case DT_PLTRELSZ:
83c81bfe 4338 s = htab->srelplt;
30667bf3
AM
4339 if (s->_cooked_size != 0)
4340 dyn.d_un.d_val = s->_cooked_size;
4341 else
4342 dyn.d_un.d_val = s->_raw_size;
30667bf3 4343 break;
4e12ff7f
AM
4344
4345 case DT_RELASZ:
4346 /* Don't count procedure linkage table relocs in the
4347 overall reloc count. */
4348 if (htab->srelplt != NULL)
4349 {
4350 s = htab->srelplt->output_section;
4351 if (s->_cooked_size != 0)
4352 dyn.d_un.d_val -= s->_cooked_size;
4353 else
4354 dyn.d_un.d_val -= s->_raw_size;
4355 }
4356 break;
30667bf3 4357 }
3ac8354b
AM
4358
4359 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4360 }
252b5132 4361 }
edd21aca 4362
83c81bfe 4363 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4364 {
74d1c347
AM
4365 /* Fill in the first entry in the global offset table.
4366 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4367 bfd_put_32 (output_bfd,
4368 (sdyn != NULL
4369 ? sdyn->output_section->vma + sdyn->output_offset
4370 : (bfd_vma) 0),
83c81bfe 4371 htab->sgot->contents);
30667bf3 4372
74d1c347 4373 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4374 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4375
30667bf3 4376 /* Set .got entry size. */
83c81bfe 4377 elf_section_data (htab->sgot->output_section)
74d1c347 4378 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4379 }
4380
83c81bfe 4381 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4382 {
4383 /* Set plt entry size. */
83c81bfe 4384 elf_section_data (htab->splt->output_section)
47d89dba
AM
4385 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4386
83c81bfe 4387 if (htab->need_plt_stub)
47d89dba
AM
4388 {
4389 /* Set up the .plt stub. */
83c81bfe
AM
4390 memcpy (htab->splt->contents
4391 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4392 plt_stub, sizeof (plt_stub));
4393
83c81bfe
AM
4394 if ((htab->splt->output_offset
4395 + htab->splt->output_section->vma
4396 + htab->splt->_raw_size)
4397 != (htab->sgot->output_offset
4398 + htab->sgot->output_section->vma))
47d89dba
AM
4399 {
4400 (*_bfd_error_handler)
4401 (_(".got section not immediately after .plt section"));
4402 return false;
4403 }
4404 }
4405 }
30667bf3 4406
252b5132 4407 return true;
30667bf3 4408}
252b5132 4409
d952f17a
AM
4410/* Tweak the OSABI field of the elf header. */
4411
4412static void
4413elf32_hppa_post_process_headers (abfd, link_info)
4414 bfd *abfd;
4415 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4416{
4417 Elf_Internal_Ehdr * i_ehdrp;
4418
4419 i_ehdrp = elf_elfheader (abfd);
4420
4421 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4422 {
4423 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4424 }
4425 else
4426 {
4427 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4428 }
4429}
4430
30667bf3
AM
4431/* Called when writing out an object file to decide the type of a
4432 symbol. */
4433static int
4434elf32_hppa_elf_get_symbol_type (elf_sym, type)
4435 Elf_Internal_Sym *elf_sym;
4436 int type;
4437{
4438 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4439 return STT_PARISC_MILLI;
4440 else
4441 return type;
252b5132
RH
4442}
4443
4444/* Misc BFD support code. */
30667bf3
AM
4445#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4446#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4447#define elf_info_to_howto elf_hppa_info_to_howto
4448#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4449
252b5132 4450/* Stuff for the BFD linker. */
c46b7515 4451#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3
AM
4452#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4453#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4454#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4455#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4456#define elf_backend_check_relocs elf32_hppa_check_relocs
4457#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4458#define elf_backend_fake_sections elf_hppa_fake_sections
4459#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4460#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4461#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4462#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4463#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4464#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4465#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4466#define elf_backend_object_p elf32_hppa_object_p
4467#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4468#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4469#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4470#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4471
4472#define elf_backend_can_gc_sections 1
51b64d56 4473#define elf_backend_can_refcount 1
30667bf3
AM
4474#define elf_backend_plt_alignment 2
4475#define elf_backend_want_got_plt 0
4476#define elf_backend_plt_readonly 0
4477#define elf_backend_want_plt_sym 0
74d1c347 4478#define elf_backend_got_header_size 8
252b5132
RH
4479
4480#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4481#define TARGET_BIG_NAME "elf32-hppa"
4482#define ELF_ARCH bfd_arch_hppa
4483#define ELF_MACHINE_CODE EM_PARISC
4484#define ELF_MAXPAGESIZE 0x1000
4485
4486#include "elf32-target.h"
d952f17a
AM
4487
4488#undef TARGET_BIG_SYM
4489#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4490#undef TARGET_BIG_NAME
4491#define TARGET_BIG_NAME "elf32-hppa-linux"
4492
4493#define INCLUDED_TARGET_FILE 1
4494#include "elf32-target.h"