]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-hppa.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
7898deda 2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001
252b5132
RH
3 Free Software Foundation, Inc.
4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
35#include "elf-hppa.h"
edd21aca 36#include "elf32-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
30667bf3 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
30667bf3 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
74d1c347 117#define PLABEL_PLT_ENTRY_SIZE PLT_ENTRY_SIZE
30667bf3
AM
118#define GOT_ENTRY_SIZE 4
119#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
120
47d89dba
AM
121static const bfd_byte plt_stub[] =
122{
123 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
124 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
125 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
126#define PLT_STUB_ENTRY (3*4)
127 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
128 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
129 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
130 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
131};
132
30667bf3
AM
133/* Section name for stubs is the associated section name plus this
134 string. */
135#define STUB_SUFFIX ".stub"
136
98ceb8ce
AM
137/* We don't need to copy certain PC- or GP-relative dynamic relocs
138 into a shared object's dynamic section. All the relocs of the
139 limited class we are interested in, are absolute. */
140#ifndef RELATIVE_DYNRELOCS
141#define RELATIVE_DYNRELOCS 0
446f2863 142#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
143#endif
144
30667bf3
AM
145enum elf32_hppa_stub_type {
146 hppa_stub_long_branch,
147 hppa_stub_long_branch_shared,
148 hppa_stub_import,
149 hppa_stub_import_shared,
150 hppa_stub_export,
151 hppa_stub_none
152};
153
30667bf3 154struct elf32_hppa_stub_hash_entry {
252b5132 155
edd21aca 156 /* Base hash table entry structure. */
252b5132
RH
157 struct bfd_hash_entry root;
158
edd21aca
AM
159 /* The stub section. */
160 asection *stub_sec;
161
162 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 163 bfd_vma stub_offset;
252b5132
RH
164
165 /* Given the symbol's value and its section we can determine its final
166 value when building the stubs (so the stub knows where to jump. */
30667bf3 167 bfd_vma target_value;
252b5132 168 asection *target_section;
30667bf3
AM
169
170 enum elf32_hppa_stub_type stub_type;
171
172 /* The symbol table entry, if any, that this was derived from. */
173 struct elf32_hppa_link_hash_entry *h;
174
25f72752
AM
175 /* Where this stub is being called from, or, in the case of combined
176 stub sections, the first input section in the group. */
177 asection *id_sec;
252b5132
RH
178};
179
30667bf3
AM
180struct elf32_hppa_link_hash_entry {
181
182 struct elf_link_hash_entry elf;
183
184 /* A pointer to the most recently used stub hash entry against this
185 symbol. */
186 struct elf32_hppa_stub_hash_entry *stub_cache;
187
30667bf3
AM
188 /* Used to count relocations for delayed sizing of relocation
189 sections. */
190 struct elf32_hppa_dyn_reloc_entry {
191
192 /* Next relocation in the chain. */
193 struct elf32_hppa_dyn_reloc_entry *next;
194
98ceb8ce
AM
195 /* The input section of the reloc. */
196 asection *sec;
30667bf3
AM
197
198 /* Number of relocs copied in this section. */
199 bfd_size_type count;
98ceb8ce
AM
200
201#if RELATIVE_DYNRELOCS
202 /* Number of relative relocs copied for the input section. */
203 bfd_size_type relative_count;
204#endif
205 } *dyn_relocs;
30667bf3
AM
206
207 /* Set during a static link if we detect a function is PIC. */
12cca0d2
AM
208 unsigned int maybe_pic_call:1;
209
210 /* Set if the only reason we need a .plt entry is for a non-PIC to
211 PIC function call. */
74d1c347
AM
212 unsigned int pic_call:1;
213
214 /* Set if this symbol is used by a plabel reloc. */
215 unsigned int plabel:1;
216
217 /* Set if this symbol is an init or fini function and thus should
218 use an absolute reloc. */
219 unsigned int plt_abs:1;
30667bf3
AM
220};
221
30667bf3
AM
222struct elf32_hppa_link_hash_table {
223
252b5132 224 /* The main hash table. */
ebe50bae 225 struct elf_link_hash_table elf;
252b5132
RH
226
227 /* The stub hash table. */
edd21aca 228 struct bfd_hash_table stub_hash_table;
252b5132 229
30667bf3
AM
230 /* Linker stub bfd. */
231 bfd *stub_bfd;
232
30667bf3
AM
233 /* Linker call-backs. */
234 asection * (*add_stub_section) PARAMS ((const char *, asection *));
235 void (*layout_sections_again) PARAMS ((void));
236
25f72752
AM
237 /* Array to keep track of which stub sections have been created, and
238 information on stub grouping. */
239 struct map_stub {
240 /* This is the section to which stubs in the group will be
241 attached. */
242 asection *link_sec;
243 /* The stub section. */
244 asection *stub_sec;
25f72752 245 } *stub_group;
30667bf3 246
30667bf3
AM
247 /* Short-cuts to get to dynamic linker sections. */
248 asection *sgot;
249 asection *srelgot;
250 asection *splt;
251 asection *srelplt;
252 asection *sdynbss;
253 asection *srelbss;
47d89dba 254
c46b7515
AM
255 /* Used during a final link to store the base of the text and data
256 segments so that we can perform SEGREL relocations. */
257 bfd_vma text_segment_base;
258 bfd_vma data_segment_base;
259
47d89dba
AM
260 /* Whether we support multiple sub-spaces for shared libs. */
261 unsigned int multi_subspace:1;
262
263 /* Flags set when PCREL12F and PCREL17F branches detected. Used to
264 select suitable defaults for the stub group size. */
265 unsigned int has_12bit_branch:1;
266 unsigned int has_17bit_branch:1;
267
268 /* Set if we need a .plt stub to support lazy dynamic linking. */
269 unsigned int need_plt_stub:1;
252b5132
RH
270};
271
30667bf3
AM
272/* Various hash macros and functions. */
273#define hppa_link_hash_table(p) \
edd21aca 274 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 275
30667bf3
AM
276#define hppa_stub_hash_lookup(table, string, create, copy) \
277 ((struct elf32_hppa_stub_hash_entry *) \
278 bfd_hash_lookup ((table), (string), (create), (copy)))
279
280static struct bfd_hash_entry *stub_hash_newfunc
281 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 282
30667bf3 283static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 284 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
285
286static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
287 PARAMS ((bfd *));
288
30667bf3
AM
289/* Stub handling functions. */
290static char *hppa_stub_name
291 PARAMS ((const asection *, const asection *,
292 const struct elf32_hppa_link_hash_entry *,
293 const Elf_Internal_Rela *));
edd21aca 294
30667bf3
AM
295static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
296 PARAMS ((const asection *, const asection *,
297 struct elf32_hppa_link_hash_entry *,
25f72752
AM
298 const Elf_Internal_Rela *,
299 struct elf32_hppa_link_hash_table *));
edd21aca 300
30667bf3 301static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 302 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
303
304static enum elf32_hppa_stub_type hppa_type_of_stub
305 PARAMS ((asection *, const Elf_Internal_Rela *,
306 struct elf32_hppa_link_hash_entry *, bfd_vma));
307
308static boolean hppa_build_one_stub
309 PARAMS ((struct bfd_hash_entry *, PTR));
310
311static boolean hppa_size_one_stub
312 PARAMS ((struct bfd_hash_entry *, PTR));
313
30667bf3
AM
314/* BFD and elf backend functions. */
315static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 316
edd21aca
AM
317static boolean elf32_hppa_add_symbol_hook
318 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
319 const char **, flagword *, asection **, bfd_vma *));
252b5132 320
30667bf3
AM
321static boolean elf32_hppa_create_dynamic_sections
322 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 323
ebe50bae
AM
324static void elf32_hppa_copy_indirect_symbol
325 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
326
30667bf3
AM
327static boolean elf32_hppa_check_relocs
328 PARAMS ((bfd *, struct bfd_link_info *,
329 asection *, const Elf_Internal_Rela *));
330
331static asection *elf32_hppa_gc_mark_hook
332 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
333 struct elf_link_hash_entry *, Elf_Internal_Sym *));
334
335static boolean elf32_hppa_gc_sweep_hook
336 PARAMS ((bfd *, struct bfd_link_info *,
337 asection *, const Elf_Internal_Rela *));
338
74d1c347
AM
339static void elf32_hppa_hide_symbol
340 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
341
30667bf3
AM
342static boolean elf32_hppa_adjust_dynamic_symbol
343 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
344
345static boolean hppa_handle_PIC_calls
346 PARAMS ((struct elf_link_hash_entry *, PTR));
347
98ceb8ce
AM
348static boolean allocate_dynrelocs
349 PARAMS ((struct elf_link_hash_entry *, PTR));
350
351static boolean readonly_dynrelocs
30667bf3 352 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 353
d5c73c2f
AM
354static boolean clobber_millicode_symbols
355 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
356
30667bf3
AM
357static boolean elf32_hppa_size_dynamic_sections
358 PARAMS ((bfd *, struct bfd_link_info *));
359
c46b7515
AM
360static boolean elf32_hppa_final_link
361 PARAMS ((bfd *, struct bfd_link_info *));
362
363static void hppa_record_segment_addr
364 PARAMS ((bfd *, asection *, PTR));
365
30667bf3
AM
366static bfd_reloc_status_type final_link_relocate
367 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 368 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
369 struct elf32_hppa_link_hash_entry *));
370
371static boolean elf32_hppa_relocate_section
372 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
373 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
374
c46b7515
AM
375static int hppa_unwind_entry_compare
376 PARAMS ((const PTR, const PTR));
377
30667bf3
AM
378static boolean elf32_hppa_finish_dynamic_symbol
379 PARAMS ((bfd *, struct bfd_link_info *,
380 struct elf_link_hash_entry *, Elf_Internal_Sym *));
381
98ceb8ce
AM
382static enum elf_reloc_type_class elf32_hppa_reloc_type_class
383 PARAMS ((const Elf_Internal_Rela *));
384
30667bf3
AM
385static boolean elf32_hppa_finish_dynamic_sections
386 PARAMS ((bfd *, struct bfd_link_info *));
387
d952f17a
AM
388static void elf32_hppa_post_process_headers
389 PARAMS ((bfd *, struct bfd_link_info *));
390
30667bf3
AM
391static int elf32_hppa_elf_get_symbol_type
392 PARAMS ((Elf_Internal_Sym *, int));
252b5132 393
252b5132
RH
394/* Assorted hash table functions. */
395
396/* Initialize an entry in the stub hash table. */
397
398static struct bfd_hash_entry *
30667bf3 399stub_hash_newfunc (entry, table, string)
252b5132
RH
400 struct bfd_hash_entry *entry;
401 struct bfd_hash_table *table;
402 const char *string;
403{
252b5132
RH
404 /* Allocate the structure if it has not already been allocated by a
405 subclass. */
ebe50bae 406 if (entry == NULL)
30667bf3 407 {
ebe50bae
AM
408 entry = bfd_hash_allocate (table,
409 sizeof (struct elf32_hppa_stub_hash_entry));
410 if (entry == NULL)
411 return entry;
30667bf3 412 }
252b5132
RH
413
414 /* Call the allocation method of the superclass. */
ebe50bae
AM
415 entry = bfd_hash_newfunc (entry, table, string);
416 if (entry != NULL)
252b5132 417 {
ebe50bae
AM
418 struct elf32_hppa_stub_hash_entry *eh;
419
252b5132 420 /* Initialize the local fields. */
ebe50bae
AM
421 eh = (struct elf32_hppa_stub_hash_entry *) entry;
422 eh->stub_sec = NULL;
423 eh->stub_offset = 0;
424 eh->target_value = 0;
425 eh->target_section = NULL;
426 eh->stub_type = hppa_stub_long_branch;
427 eh->h = NULL;
428 eh->id_sec = NULL;
30667bf3
AM
429 }
430
ebe50bae 431 return entry;
30667bf3
AM
432}
433
30667bf3
AM
434/* Initialize an entry in the link hash table. */
435
436static struct bfd_hash_entry *
437hppa_link_hash_newfunc (entry, table, string)
438 struct bfd_hash_entry *entry;
439 struct bfd_hash_table *table;
440 const char *string;
441{
30667bf3
AM
442 /* Allocate the structure if it has not already been allocated by a
443 subclass. */
ebe50bae 444 if (entry == NULL)
30667bf3 445 {
ebe50bae
AM
446 entry = bfd_hash_allocate (table,
447 sizeof (struct elf32_hppa_link_hash_entry));
448 if (entry == NULL)
449 return entry;
30667bf3
AM
450 }
451
452 /* Call the allocation method of the superclass. */
ebe50bae
AM
453 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
454 if (entry != NULL)
30667bf3 455 {
ebe50bae
AM
456 struct elf32_hppa_link_hash_entry *eh;
457
30667bf3 458 /* Initialize the local fields. */
ebe50bae
AM
459 eh = (struct elf32_hppa_link_hash_entry *) entry;
460 eh->stub_cache = NULL;
461 eh->dyn_relocs = NULL;
462 eh->maybe_pic_call = 0;
463 eh->pic_call = 0;
464 eh->plabel = 0;
465 eh->plt_abs = 0;
252b5132
RH
466 }
467
ebe50bae 468 return entry;
252b5132
RH
469}
470
252b5132
RH
471/* Create the derived linker hash table. The PA ELF port uses the derived
472 hash table to keep information specific to the PA ELF linker (without
473 using static variables). */
474
475static struct bfd_link_hash_table *
476elf32_hppa_link_hash_table_create (abfd)
477 bfd *abfd;
478{
479 struct elf32_hppa_link_hash_table *ret;
dc810e39 480 bfd_size_type amt = sizeof (*ret);
252b5132 481
dc810e39 482 ret = (struct elf32_hppa_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
483 if (ret == NULL)
484 return NULL;
edd21aca 485
ebe50bae 486 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132
RH
487 {
488 bfd_release (abfd, ret);
489 return NULL;
490 }
edd21aca
AM
491
492 /* Init the stub hash table too. */
30667bf3 493 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
494 return NULL;
495
30667bf3 496 ret->stub_bfd = NULL;
30667bf3
AM
497 ret->add_stub_section = NULL;
498 ret->layout_sections_again = NULL;
25f72752 499 ret->stub_group = NULL;
30667bf3
AM
500 ret->sgot = NULL;
501 ret->srelgot = NULL;
502 ret->splt = NULL;
503 ret->srelplt = NULL;
504 ret->sdynbss = NULL;
505 ret->srelbss = NULL;
c46b7515
AM
506 ret->text_segment_base = (bfd_vma) -1;
507 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
508 ret->multi_subspace = 0;
509 ret->has_12bit_branch = 0;
510 ret->has_17bit_branch = 0;
511 ret->need_plt_stub = 0;
252b5132 512
ebe50bae 513 return &ret->elf.root;
252b5132
RH
514}
515
30667bf3
AM
516/* Build a name for an entry in the stub hash table. */
517
edd21aca 518static char *
30667bf3 519hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 520 const asection *input_section;
30667bf3
AM
521 const asection *sym_sec;
522 const struct elf32_hppa_link_hash_entry *hash;
523 const Elf_Internal_Rela *rel;
edd21aca
AM
524{
525 char *stub_name;
dc810e39 526 bfd_size_type len;
edd21aca 527
30667bf3
AM
528 if (hash)
529 {
530 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
531 stub_name = bfd_malloc (len);
532 if (stub_name != NULL)
533 {
534 sprintf (stub_name, "%08x_%s+%x",
535 input_section->id & 0xffffffff,
536 hash->elf.root.root.string,
537 (int) rel->r_addend & 0xffffffff);
538 }
539 }
540 else
edd21aca 541 {
30667bf3
AM
542 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
543 stub_name = bfd_malloc (len);
544 if (stub_name != NULL)
545 {
546 sprintf (stub_name, "%08x_%x:%x+%x",
547 input_section->id & 0xffffffff,
548 sym_sec->id & 0xffffffff,
549 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
550 (int) rel->r_addend & 0xffffffff);
551 }
edd21aca
AM
552 }
553 return stub_name;
554}
252b5132 555
30667bf3
AM
556/* Look up an entry in the stub hash. Stub entries are cached because
557 creating the stub name takes a bit of time. */
558
559static struct elf32_hppa_stub_hash_entry *
83c81bfe 560hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
561 const asection *input_section;
562 const asection *sym_sec;
563 struct elf32_hppa_link_hash_entry *hash;
564 const Elf_Internal_Rela *rel;
83c81bfe 565 struct elf32_hppa_link_hash_table *htab;
252b5132 566{
30667bf3 567 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
568 const asection *id_sec;
569
570 /* If this input section is part of a group of sections sharing one
571 stub section, then use the id of the first section in the group.
572 Stub names need to include a section id, as there may well be
573 more than one stub used to reach say, printf, and we need to
574 distinguish between them. */
83c81bfe 575 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 576
30667bf3
AM
577 if (hash != NULL && hash->stub_cache != NULL
578 && hash->stub_cache->h == hash
25f72752 579 && hash->stub_cache->id_sec == id_sec)
edd21aca 580 {
30667bf3
AM
581 stub_entry = hash->stub_cache;
582 }
583 else
584 {
30667bf3 585 char *stub_name;
edd21aca 586
25f72752 587 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
588 if (stub_name == NULL)
589 return NULL;
edd21aca 590
83c81bfe 591 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 592 stub_name, false, false);
30667bf3
AM
593 if (stub_entry == NULL)
594 {
595 if (hash == NULL || hash->elf.root.type != bfd_link_hash_undefweak)
596 (*_bfd_error_handler) (_("%s(%s+0x%lx): cannot find stub entry %s"),
8f615d07 597 bfd_archive_filename (input_section->owner),
30667bf3
AM
598 input_section->name,
599 (long) rel->r_offset,
600 stub_name);
601 }
602 else
603 {
604 if (hash != NULL)
605 hash->stub_cache = stub_entry;
606 }
607
608 free (stub_name);
edd21aca 609 }
30667bf3
AM
610
611 return stub_entry;
612}
613
30667bf3
AM
614/* Add a new stub entry to the stub hash. Not all fields of the new
615 stub entry are initialised. */
616
617static struct elf32_hppa_stub_hash_entry *
83c81bfe 618hppa_add_stub (stub_name, section, htab)
30667bf3
AM
619 const char *stub_name;
620 asection *section;
83c81bfe 621 struct elf32_hppa_link_hash_table *htab;
30667bf3 622{
25f72752 623 asection *link_sec;
30667bf3 624 asection *stub_sec;
30667bf3 625 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 626
83c81bfe
AM
627 link_sec = htab->stub_group[section->id].link_sec;
628 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 629 if (stub_sec == NULL)
edd21aca 630 {
83c81bfe 631 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
632 if (stub_sec == NULL)
633 {
dc810e39 634 bfd_size_type len;
30667bf3
AM
635 char *s_name;
636
25f72752 637 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 638 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
639 if (s_name == NULL)
640 return NULL;
641
25f72752 642 strcpy (s_name, link_sec->name);
30667bf3 643 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 644 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
645 if (stub_sec == NULL)
646 return NULL;
83c81bfe 647 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 648 }
83c81bfe 649 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 650 }
252b5132 651
30667bf3 652 /* Enter this entry into the linker stub hash table. */
83c81bfe 653 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
654 true, false);
655 if (stub_entry == NULL)
656 {
657 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 658 bfd_archive_filename (section->owner),
30667bf3
AM
659 stub_name);
660 return NULL;
edd21aca
AM
661 }
662
30667bf3 663 stub_entry->stub_sec = stub_sec;
30667bf3 664 stub_entry->stub_offset = 0;
25f72752 665 stub_entry->id_sec = link_sec;
30667bf3 666 return stub_entry;
edd21aca
AM
667}
668
30667bf3
AM
669/* Determine the type of stub needed, if any, for a call. */
670
671static enum elf32_hppa_stub_type
672hppa_type_of_stub (input_sec, rel, hash, destination)
673 asection *input_sec;
674 const Elf_Internal_Rela *rel;
675 struct elf32_hppa_link_hash_entry *hash;
676 bfd_vma destination;
edd21aca 677{
edd21aca 678 bfd_vma location;
30667bf3
AM
679 bfd_vma branch_offset;
680 bfd_vma max_branch_offset;
681 unsigned int r_type;
682
683 if (hash != NULL
684 && (((hash->elf.root.type == bfd_link_hash_defined
74d1c347
AM
685 || hash->elf.root.type == bfd_link_hash_defweak)
686 && hash->elf.root.u.def.section->output_section == NULL)
687 || (hash->elf.root.type == bfd_link_hash_defweak
688 && hash->elf.dynindx != -1
689 && hash->elf.plt.offset != (bfd_vma) -1)
30667bf3
AM
690 || hash->elf.root.type == bfd_link_hash_undefweak
691 || hash->elf.root.type == bfd_link_hash_undefined
12cca0d2 692 || (hash->maybe_pic_call && !(input_sec->flags & SEC_HAS_GOT_REF))))
30667bf3
AM
693 {
694 /* If output_section is NULL, then it's a symbol defined in a
695 shared library. We will need an import stub. Decide between
74d1c347
AM
696 hppa_stub_import and hppa_stub_import_shared later. For
697 shared links we need stubs for undefined or weak syms too;
698 They will presumably be resolved by the dynamic linker. */
30667bf3
AM
699 return hppa_stub_import;
700 }
edd21aca 701
30667bf3
AM
702 /* Determine where the call point is. */
703 location = (input_sec->output_offset
704 + input_sec->output_section->vma
705 + rel->r_offset);
edd21aca 706
30667bf3
AM
707 branch_offset = destination - location - 8;
708 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 709
30667bf3
AM
710 /* Determine if a long branch stub is needed. parisc branch offsets
711 are relative to the second instruction past the branch, ie. +8
712 bytes on from the branch instruction location. The offset is
713 signed and counts in units of 4 bytes. */
714 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 715 {
30667bf3
AM
716 max_branch_offset = (1 << (17-1)) << 2;
717 }
718 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
719 {
720 max_branch_offset = (1 << (12-1)) << 2;
721 }
25f72752 722 else /* R_PARISC_PCREL22F. */
30667bf3
AM
723 {
724 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
725 }
726
30667bf3 727 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
728 return hppa_stub_long_branch;
729
30667bf3
AM
730 return hppa_stub_none;
731}
edd21aca 732
30667bf3
AM
733/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
734 IN_ARG contains the link info pointer. */
edd21aca 735
30667bf3
AM
736#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
737#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 738
30667bf3 739#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 740#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 741#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 742
3ee1d854
AM
743#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
744#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 745#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 746#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 747
3ee1d854
AM
748#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
749#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 750
30667bf3
AM
751#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
752#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
753#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
754#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 755
30667bf3
AM
756#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
757#define NOP 0x08000240 /* nop */
758#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
759#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
760#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 761
30667bf3
AM
762#ifndef R19_STUBS
763#define R19_STUBS 1
764#endif
edd21aca 765
30667bf3
AM
766#if R19_STUBS
767#define LDW_R1_DLT LDW_R1_R19
768#else
769#define LDW_R1_DLT LDW_R1_DP
770#endif
edd21aca 771
30667bf3
AM
772static boolean
773hppa_build_one_stub (gen_entry, in_arg)
774 struct bfd_hash_entry *gen_entry;
775 PTR in_arg;
776{
777 struct elf32_hppa_stub_hash_entry *stub_entry;
778 struct bfd_link_info *info;
83c81bfe 779 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
780 asection *stub_sec;
781 bfd *stub_bfd;
782 bfd_byte *loc;
783 bfd_vma sym_value;
74d1c347 784 bfd_vma insn;
8dea1268 785 bfd_vma off;
74d1c347 786 int val;
30667bf3 787 int size;
edd21aca 788
30667bf3
AM
789 /* Massage our args to the form they really have. */
790 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
791 info = (struct bfd_link_info *) in_arg;
792
83c81bfe 793 htab = hppa_link_hash_table (info);
30667bf3 794 stub_sec = stub_entry->stub_sec;
edd21aca 795
30667bf3 796 /* Make a note of the offset within the stubs for this entry. */
74d1c347 797 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 798 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 799
30667bf3
AM
800 stub_bfd = stub_sec->owner;
801
802 switch (stub_entry->stub_type)
803 {
804 case hppa_stub_long_branch:
805 /* Create the long branch. A long branch is formed with "ldil"
806 loading the upper bits of the target address into a register,
807 then branching with "be" which adds in the lower bits.
808 The "be" has its delay slot nullified. */
809 sym_value = (stub_entry->target_value
810 + stub_entry->target_section->output_offset
811 + stub_entry->target_section->output_section->vma);
812
74d1c347
AM
813 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
814 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
815 bfd_put_32 (stub_bfd, insn, loc);
816
74d1c347
AM
817 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
818 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
819 bfd_put_32 (stub_bfd, insn, loc + 4);
820
30667bf3 821 size = 8;
edd21aca
AM
822 break;
823
30667bf3
AM
824 case hppa_stub_long_branch_shared:
825 /* Branches are relative. This is where we are going to. */
826 sym_value = (stub_entry->target_value
827 + stub_entry->target_section->output_offset
828 + stub_entry->target_section->output_section->vma);
829
830 /* And this is where we are coming from, more or less. */
831 sym_value -= (stub_entry->stub_offset
832 + stub_sec->output_offset
833 + stub_sec->output_section->vma);
834
74d1c347 835 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 836 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 837 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
838 bfd_put_32 (stub_bfd, insn, loc + 4);
839
47d89dba 840 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 841 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
842 bfd_put_32 (stub_bfd, insn, loc + 8);
843 size = 12;
844 break;
edd21aca 845
30667bf3
AM
846 case hppa_stub_import:
847 case hppa_stub_import_shared:
8dea1268
AM
848 off = stub_entry->h->elf.plt.offset;
849 if (off >= (bfd_vma) -2)
49e9d0d3 850 abort ();
8dea1268
AM
851
852 off &= ~ (bfd_vma) 1;
853 sym_value = (off
83c81bfe
AM
854 + htab->splt->output_offset
855 + htab->splt->output_section->vma
856 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
857
858 insn = ADDIL_DP;
859#if R19_STUBS
860 if (stub_entry->stub_type == hppa_stub_import_shared)
861 insn = ADDIL_R19;
862#endif
47d89dba 863 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 864 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 865 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 866
47d89dba
AM
867 /* It is critical to use lrsel/rrsel here because we are using
868 two different offsets (+0 and +4) from sym_value. If we use
869 lsel/rsel then with unfortunate sym_values we will round
870 sym_value+4 up to the next 2k block leading to a mis-match
871 between the lsel and rsel value. */
872 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 873 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 874 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 875
83c81bfe 876 if (htab->multi_subspace)
30667bf3 877 {
47d89dba 878 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 879 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 880 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 881
74d1c347
AM
882 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
883 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
884 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
885 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 886
30667bf3
AM
887 size = 28;
888 }
889 else
890 {
74d1c347 891 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 892 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 893 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 894 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 895
30667bf3
AM
896 size = 16;
897 }
252b5132 898
30667bf3
AM
899 if (!info->shared
900 && stub_entry->h != NULL
901 && stub_entry->h->pic_call)
252b5132 902 {
30667bf3
AM
903 /* Build the .plt entry needed to call a PIC function from
904 statically linked code. We don't need any relocs. */
905 bfd *dynobj;
906 struct elf32_hppa_link_hash_entry *eh;
907 bfd_vma value;
252b5132 908
ebe50bae 909 dynobj = htab->elf.dynobj;
30667bf3 910 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 911
49e9d0d3
AM
912 if (eh->elf.root.type != bfd_link_hash_defined
913 && eh->elf.root.type != bfd_link_hash_defweak)
914 abort ();
252b5132 915
30667bf3
AM
916 value = (eh->elf.root.u.def.value
917 + eh->elf.root.u.def.section->output_offset
918 + eh->elf.root.u.def.section->output_section->vma);
252b5132 919
30667bf3 920 /* Fill in the entry in the procedure linkage table.
252b5132 921
30667bf3 922 The format of a plt entry is
74d1c347
AM
923 <funcaddr>
924 <__gp>. */
252b5132 925
83c81bfe
AM
926 bfd_put_32 (htab->splt->owner, value,
927 htab->splt->contents + off);
928 value = elf_gp (htab->splt->output_section->owner);
929 bfd_put_32 (htab->splt->owner, value,
930 htab->splt->contents + off + 4);
252b5132 931 }
30667bf3 932 break;
252b5132 933
30667bf3
AM
934 case hppa_stub_export:
935 /* Branches are relative. This is where we are going to. */
936 sym_value = (stub_entry->target_value
937 + stub_entry->target_section->output_offset
938 + stub_entry->target_section->output_section->vma);
252b5132 939
30667bf3
AM
940 /* And this is where we are coming from. */
941 sym_value -= (stub_entry->stub_offset
942 + stub_sec->output_offset
943 + stub_sec->output_section->vma);
edd21aca 944
30667bf3
AM
945 if (sym_value - 8 + 0x40000 >= 0x80000)
946 {
edd21aca 947 (*_bfd_error_handler)
30667bf3 948 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 949 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
950 stub_sec->name,
951 (long) stub_entry->stub_offset,
952 stub_entry->root.string);
953 bfd_set_error (bfd_error_bad_value);
edd21aca 954 return false;
252b5132 955 }
30667bf3 956
74d1c347
AM
957 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
958 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
30667bf3
AM
959 bfd_put_32 (stub_bfd, insn, loc);
960
74d1c347
AM
961 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
962 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
963 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
964 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
965 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
966
967 /* Point the function symbol at the stub. */
968 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 969 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
970
971 size = 24;
972 break;
973
974 default:
975 BFD_FAIL ();
976 return false;
252b5132
RH
977 }
978
74d1c347 979 stub_sec->_raw_size += size;
252b5132
RH
980 return true;
981}
982
30667bf3
AM
983#undef LDIL_R1
984#undef BE_SR4_R1
985#undef BL_R1
986#undef ADDIL_R1
987#undef DEPI_R1
988#undef ADDIL_DP
989#undef LDW_R1_R21
990#undef LDW_R1_DLT
991#undef LDW_R1_R19
992#undef ADDIL_R19
993#undef LDW_R1_DP
994#undef LDSID_R21_R1
995#undef MTSP_R1
996#undef BE_SR0_R21
997#undef STW_RP
998#undef BV_R0_R21
999#undef BL_RP
1000#undef NOP
1001#undef LDW_RP
1002#undef LDSID_RP_R1
1003#undef BE_SR0_RP
252b5132 1004
30667bf3
AM
1005/* As above, but don't actually build the stub. Just bump offset so
1006 we know stub section sizes. */
1007
1008static boolean
1009hppa_size_one_stub (gen_entry, in_arg)
1010 struct bfd_hash_entry *gen_entry;
1011 PTR in_arg;
252b5132 1012{
30667bf3 1013 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1014 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1015 int size;
1016
1017 /* Massage our args to the form they really have. */
1018 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1019 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1020
1021 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1022 size = 8;
30667bf3
AM
1023 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1024 size = 12;
1025 else if (stub_entry->stub_type == hppa_stub_export)
1026 size = 24;
74d1c347 1027 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1028 {
83c81bfe 1029 if (htab->multi_subspace)
30667bf3
AM
1030 size = 28;
1031 else
1032 size = 16;
1033 }
252b5132 1034
74d1c347 1035 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1036 return true;
1037}
252b5132 1038
30667bf3
AM
1039/* Return nonzero if ABFD represents an HPPA ELF32 file.
1040 Additionally we set the default architecture and machine. */
1041
1042static boolean
1043elf32_hppa_object_p (abfd)
1044 bfd *abfd;
1045{
24a5e751
L
1046 Elf_Internal_Ehdr * i_ehdrp;
1047 unsigned int flags;
252b5132 1048
24a5e751
L
1049 i_ehdrp = elf_elfheader (abfd);
1050 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1051 {
1052 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1053 return false;
1054 }
1055 else
1056 {
1057 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1058 return false;
1059 }
1060
1061 flags = i_ehdrp->e_flags;
30667bf3
AM
1062 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1063 {
1064 case EFA_PARISC_1_0:
1065 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1066 case EFA_PARISC_1_1:
1067 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1068 case EFA_PARISC_2_0:
1069 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1070 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1071 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1072 }
1073 return true;
252b5132
RH
1074}
1075
252b5132
RH
1076/* Undo the generic ELF code's subtraction of section->vma from the
1077 value of each external symbol. */
1078
1079static boolean
1080elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1081 bfd *abfd ATTRIBUTE_UNUSED;
1082 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1083 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1084 const char **namep ATTRIBUTE_UNUSED;
1085 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1086 asection **secp;
1087 bfd_vma *valp;
1088{
1089 *valp += (*secp)->vma;
1090 return true;
1091}
1092
30667bf3
AM
1093/* Create the .plt and .got sections, and set up our hash table
1094 short-cuts to various dynamic sections. */
1095
1096static boolean
1097elf32_hppa_create_dynamic_sections (abfd, info)
1098 bfd *abfd;
1099 struct bfd_link_info *info;
252b5132 1100{
83c81bfe 1101 struct elf32_hppa_link_hash_table *htab;
edd21aca 1102
30667bf3 1103 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1104 htab = hppa_link_hash_table (info);
1105 if (htab->splt != NULL)
30667bf3 1106 return true;
edd21aca 1107
30667bf3
AM
1108 /* Call the generic code to do most of the work. */
1109 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1110 return false;
252b5132 1111
83c81bfe
AM
1112 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1113 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1114
83c81bfe
AM
1115 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1116 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1117 if (htab->srelgot == NULL
1118 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1119 (SEC_ALLOC
1120 | SEC_LOAD
1121 | SEC_HAS_CONTENTS
1122 | SEC_IN_MEMORY
1123 | SEC_LINKER_CREATED
1124 | SEC_READONLY))
83c81bfe 1125 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1126 return false;
edd21aca 1127
83c81bfe
AM
1128 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1129 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1130
1131 return true;
1132}
1133
ebe50bae
AM
1134/* Copy the extra info we tack onto an elf_link_hash_entry. */
1135
1136void
1137elf32_hppa_copy_indirect_symbol (dir, ind)
1138 struct elf_link_hash_entry *dir, *ind;
1139{
1140 struct elf32_hppa_link_hash_entry *edir, *eind;
1141
1142 edir = (struct elf32_hppa_link_hash_entry *) dir;
1143 eind = (struct elf32_hppa_link_hash_entry *) ind;
1144
1145 if (edir->dyn_relocs == NULL)
1146 {
1147 edir->dyn_relocs = eind->dyn_relocs;
1148 eind->dyn_relocs = NULL;
1149 }
1150 else if (eind->dyn_relocs != NULL)
1151 abort ();
1152
1153 _bfd_elf_link_hash_copy_indirect (dir, ind);
1154}
1155
30667bf3
AM
1156/* Look through the relocs for a section during the first phase, and
1157 allocate space in the global offset table or procedure linkage
1158 table. At this point we haven't necessarily read all the input
1159 files. */
252b5132
RH
1160
1161static boolean
30667bf3
AM
1162elf32_hppa_check_relocs (abfd, info, sec, relocs)
1163 bfd *abfd;
1164 struct bfd_link_info *info;
1165 asection *sec;
1166 const Elf_Internal_Rela *relocs;
252b5132 1167{
30667bf3
AM
1168 bfd *dynobj;
1169 Elf_Internal_Shdr *symtab_hdr;
1170 struct elf_link_hash_entry **sym_hashes;
1171 bfd_signed_vma *local_got_refcounts;
1172 const Elf_Internal_Rela *rel;
1173 const Elf_Internal_Rela *rel_end;
83c81bfe 1174 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1175 asection *sreloc;
1176 asection *stubreloc;
1177
1178 if (info->relocateable)
1179 return true;
1180
83c81bfe 1181 htab = hppa_link_hash_table (info);
ebe50bae 1182 dynobj = htab->elf.dynobj;
30667bf3
AM
1183 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1184 sym_hashes = elf_sym_hashes (abfd);
1185 local_got_refcounts = elf_local_got_refcounts (abfd);
1186 sreloc = NULL;
1187 stubreloc = NULL;
1188
1189 rel_end = relocs + sec->reloc_count;
1190 for (rel = relocs; rel < rel_end; rel++)
1191 {
1192 enum {
1193 NEED_GOT = 1,
1194 NEED_PLT = 2,
1195 NEED_DYNREL = 4,
98ceb8ce 1196 PLT_PLABEL = 8
30667bf3 1197 };
edd21aca 1198
30667bf3
AM
1199 unsigned int r_symndx, r_type;
1200 struct elf32_hppa_link_hash_entry *h;
1201 int need_entry;
252b5132 1202
30667bf3 1203 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1204
30667bf3
AM
1205 if (r_symndx < symtab_hdr->sh_info)
1206 h = NULL;
1207 else
1208 h = ((struct elf32_hppa_link_hash_entry *)
1209 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1210
30667bf3 1211 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1212
30667bf3
AM
1213 switch (r_type)
1214 {
1215 case R_PARISC_DLTIND14F:
1216 case R_PARISC_DLTIND14R:
1217 case R_PARISC_DLTIND21L:
1218 /* This symbol requires a global offset table entry. */
1219 need_entry = NEED_GOT;
1220
1221 /* Mark this section as containing PIC code. */
1222 sec->flags |= SEC_HAS_GOT_REF;
1223 break;
1224
1225 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1226 case R_PARISC_PLABEL21L:
1227 case R_PARISC_PLABEL32:
74d1c347 1228 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1229 if (rel->r_addend != 0)
1230 abort ();
74d1c347
AM
1231
1232 /* If we are creating a shared library, then we need to
1233 create a PLT entry for all PLABELs, because PLABELs with
1234 local symbols may be passed via a pointer to another
1235 object. Additionally, output a dynamic relocation
4dc86686
AM
1236 pointing to the PLT entry.
1237 For executables, the original 32-bit ABI allowed two
1238 different styles of PLABELs (function pointers): For
1239 global functions, the PLABEL word points into the .plt
1240 two bytes past a (function address, gp) pair, and for
1241 local functions the PLABEL points directly at the
1242 function. The magic +2 for the first type allows us to
1243 differentiate between the two. As you can imagine, this
1244 is a real pain when it comes to generating code to call
1245 functions indirectly or to compare function pointers.
1246 We avoid the mess by always pointing a PLABEL into the
1247 .plt, even for local functions. */
74d1c347 1248 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1249 break;
1250
1251 case R_PARISC_PCREL12F:
83c81bfe 1252 htab->has_12bit_branch = 1;
47d89dba 1253 /* Fall thru. */
30667bf3
AM
1254 case R_PARISC_PCREL17C:
1255 case R_PARISC_PCREL17F:
83c81bfe 1256 htab->has_17bit_branch = 1;
47d89dba 1257 /* Fall thru. */
30667bf3 1258 case R_PARISC_PCREL22F:
47d89dba
AM
1259 /* Function calls might need to go through the .plt, and
1260 might require long branch stubs. */
30667bf3
AM
1261 if (h == NULL)
1262 {
1263 /* We know local syms won't need a .plt entry, and if
1264 they need a long branch stub we can't guarantee that
1265 we can reach the stub. So just flag an error later
1266 if we're doing a shared link and find we need a long
1267 branch stub. */
1268 continue;
1269 }
1270 else
1271 {
1272 /* Global symbols will need a .plt entry if they remain
1273 global, and in most cases won't need a long branch
1274 stub. Unfortunately, we have to cater for the case
1275 where a symbol is forced local by versioning, or due
1276 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1277 need_entry = NEED_PLT;
4dc86686 1278 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1279 need_entry = 0;
30667bf3
AM
1280 }
1281 break;
1282
1283 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1284 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1285 case R_PARISC_PCREL14F: /* PC relative load/store. */
1286 case R_PARISC_PCREL14R:
1287 case R_PARISC_PCREL17R: /* External branches. */
1288 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1289 /* We don't need to propagate the relocation if linking a
1290 shared object since these are section relative. */
1291 continue;
1292
1293 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1294 case R_PARISC_DPREL14R:
1295 case R_PARISC_DPREL21L:
1296 if (info->shared)
1297 {
1298 (*_bfd_error_handler)
1299 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1300 bfd_archive_filename (abfd),
30667bf3
AM
1301 elf_hppa_howto_table[r_type].name);
1302 bfd_set_error (bfd_error_bad_value);
1303 return false;
1304 }
1305 /* Fall through. */
1306
1307 case R_PARISC_DIR17F: /* Used for external branches. */
1308 case R_PARISC_DIR17R:
47d89dba
AM
1309 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1310 case R_PARISC_DIR14R:
30667bf3
AM
1311 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1312#if 1
1313 /* Help debug shared library creation. Any of the above
1314 relocs can be used in shared libs, but they may cause
1315 pages to become unshared. */
1316 if (info->shared)
1317 {
1318 (*_bfd_error_handler)
1319 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1320 bfd_archive_filename (abfd),
30667bf3
AM
1321 elf_hppa_howto_table[r_type].name);
1322 }
1323 /* Fall through. */
1324#endif
1325
c46b7515 1326 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1327 /* We may want to output a dynamic relocation later. */
1328 need_entry = NEED_DYNREL;
1329 break;
1330
1331 /* This relocation describes the C++ object vtable hierarchy.
1332 Reconstruct it for later use during GC. */
1333 case R_PARISC_GNU_VTINHERIT:
1334 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1335 &h->elf, rel->r_offset))
1336 return false;
1337 continue;
1338
1339 /* This relocation describes which C++ vtable entries are actually
1340 used. Record for later use during GC. */
1341 case R_PARISC_GNU_VTENTRY:
1342 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1343 &h->elf, rel->r_addend))
30667bf3
AM
1344 return false;
1345 continue;
1346
1347 default:
1348 continue;
1349 }
1350
1351 /* Now carry out our orders. */
1352 if (need_entry & NEED_GOT)
1353 {
1354 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1355 relocation for this entry. */
30667bf3 1356 if (dynobj == NULL)
ebe50bae 1357 htab->elf.dynobj = dynobj = abfd;
30667bf3 1358
83c81bfe 1359 if (htab->sgot == NULL)
30667bf3
AM
1360 {
1361 if (! elf32_hppa_create_dynamic_sections (dynobj, info))
1362 return false;
1363 }
1364
1365 if (h != NULL)
1366 {
1367 if (h->elf.got.refcount == -1)
446f2863 1368 h->elf.got.refcount = 1;
30667bf3
AM
1369 else
1370 h->elf.got.refcount += 1;
1371 }
1372 else
1373 {
1374 /* This is a global offset table entry for a local symbol. */
1375 if (local_got_refcounts == NULL)
1376 {
dc810e39 1377 bfd_size_type size;
30667bf3 1378
74d1c347
AM
1379 /* Allocate space for local got offsets and local
1380 plt offsets. Done this way to save polluting
1381 elf_obj_tdata with another target specific
1382 pointer. */
dc810e39
AM
1383 size = symtab_hdr->sh_info;
1384 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1385 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1386 bfd_zalloc (abfd, size));
30667bf3
AM
1387 if (local_got_refcounts == NULL)
1388 return false;
1389 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1390 }
ebe50bae 1391 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1392 }
1393 }
1394
1395 if (need_entry & NEED_PLT)
1396 {
1397 /* If we are creating a shared library, and this is a reloc
1398 against a weak symbol or a global symbol in a dynamic
1399 object, then we will be creating an import stub and a
1400 .plt entry for the symbol. Similarly, on a normal link
1401 to symbols defined in a dynamic object we'll need the
1402 import stub and a .plt entry. We don't know yet whether
1403 the symbol is defined or not, so make an entry anyway and
1404 clean up later in adjust_dynamic_symbol. */
1405 if ((sec->flags & SEC_ALLOC) != 0)
1406 {
74d1c347 1407 if (h != NULL)
30667bf3 1408 {
74d1c347
AM
1409 if (h->elf.plt.refcount == -1)
1410 {
1411 h->elf.plt.refcount = 1;
1412 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1413 }
1414 else
1415 h->elf.plt.refcount += 1;
1416
36605136
AM
1417 /* If this .plt entry is for a plabel, mark it so
1418 that adjust_dynamic_symbol will keep the entry
1419 even if it appears to be local. */
74d1c347
AM
1420 if (need_entry & PLT_PLABEL)
1421 h->plabel = 1;
1422 }
1423 else if (need_entry & PLT_PLABEL)
1424 {
68fb2e56 1425 bfd_signed_vma *local_plt_refcounts;
74d1c347
AM
1426
1427 if (local_got_refcounts == NULL)
1428 {
dc810e39 1429 bfd_size_type size;
74d1c347
AM
1430
1431 /* Allocate space for local got offsets and local
1432 plt offsets. */
dc810e39
AM
1433 size = symtab_hdr->sh_info;
1434 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1435 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1436 bfd_zalloc (abfd, size));
74d1c347
AM
1437 if (local_got_refcounts == NULL)
1438 return false;
1439 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1440 }
68fb2e56
AM
1441 local_plt_refcounts = (local_got_refcounts
1442 + symtab_hdr->sh_info);
ebe50bae 1443 local_plt_refcounts[r_symndx] += 1;
30667bf3 1444 }
30667bf3
AM
1445 }
1446 }
1447
98ceb8ce 1448 if (need_entry & NEED_DYNREL)
30667bf3
AM
1449 {
1450 /* Flag this symbol as having a non-got, non-plt reference
1451 so that we generate copy relocs if it turns out to be
1452 dynamic. */
ebe50bae 1453 if (h != NULL && !info->shared)
30667bf3
AM
1454 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1455
1456 /* If we are creating a shared library then we need to copy
1457 the reloc into the shared library. However, if we are
1458 linking with -Bsymbolic, we need only copy absolute
1459 relocs or relocs against symbols that are not defined in
1460 an object we are including in the link. PC- or DP- or
1461 DLT-relative relocs against any local sym or global sym
1462 with DEF_REGULAR set, can be discarded. At this point we
1463 have not seen all the input files, so it is possible that
1464 DEF_REGULAR is not set now but will be set later (it is
1465 never cleared). We account for that possibility below by
98ceb8ce 1466 storing information in the dyn_relocs field of the
30667bf3
AM
1467 hash table entry.
1468
1469 A similar situation to the -Bsymbolic case occurs when
1470 creating shared libraries and symbol visibility changes
1471 render the symbol local.
1472
1473 As it turns out, all the relocs we will be creating here
1474 are absolute, so we cannot remove them on -Bsymbolic
1475 links or visibility changes anyway. A STUB_REL reloc
1476 is absolute too, as in that case it is the reloc in the
1477 stub we will be creating, rather than copying the PCREL
56882138
AM
1478 reloc in the branch.
1479
1480 If on the other hand, we are creating an executable, we
1481 may need to keep relocations for symbols satisfied by a
1482 dynamic library if we manage to avoid copy relocs for the
1483 symbol. */
446f2863
AM
1484 if ((info->shared
1485 && (sec->flags & SEC_ALLOC) != 0
1486 && (IS_ABSOLUTE_RELOC (r_type)
1487 || (h != NULL
1488 && (!info->symbolic
1489 || h->elf.root.type == bfd_link_hash_defweak
1490 || (h->elf.elf_link_hash_flags
1491 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1492 || (!info->shared
1493 && (sec->flags & SEC_ALLOC) != 0
1494 && h != NULL
446f2863
AM
1495 && (h->elf.root.type == bfd_link_hash_defweak
1496 || (h->elf.elf_link_hash_flags
1497 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1498 {
30667bf3
AM
1499 /* Create a reloc section in dynobj and make room for
1500 this reloc. */
98ceb8ce 1501 if (sreloc == NULL)
30667bf3
AM
1502 {
1503 char *name;
1504
1505 if (dynobj == NULL)
ebe50bae 1506 htab->elf.dynobj = dynobj = abfd;
30667bf3 1507
98ceb8ce
AM
1508 name = (bfd_elf_string_from_elf_section
1509 (abfd,
1510 elf_elfheader (abfd)->e_shstrndx,
1511 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1512 if (name == NULL)
1513 {
1514 (*_bfd_error_handler)
1515 (_("Could not find relocation section for %s"),
1516 sec->name);
1517 bfd_set_error (bfd_error_bad_value);
1518 return false;
1519 }
1520
98ceb8ce
AM
1521 sreloc = bfd_get_section_by_name (dynobj, name);
1522 if (sreloc == NULL)
30667bf3
AM
1523 {
1524 flagword flags;
1525
98ceb8ce 1526 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1527 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1528 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1529 if ((sec->flags & SEC_ALLOC) != 0)
1530 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1531 if (sreloc == NULL
1532 || !bfd_set_section_flags (dynobj, sreloc, flags)
1533 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1534 return false;
1535 }
30667bf3 1536
98ceb8ce 1537 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1538 }
1539
98ceb8ce
AM
1540 /* If this is a global symbol, we count the number of
1541 relocations we need for this symbol. */
1542 if (h != NULL)
30667bf3 1543 {
98ceb8ce 1544 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1545
98ceb8ce
AM
1546 p = h->dyn_relocs;
1547 if (p == NULL || p->sec != sec)
30667bf3 1548 {
98ceb8ce
AM
1549 p = ((struct elf32_hppa_dyn_reloc_entry *)
1550 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
30667bf3 1551 if (p == NULL)
98ceb8ce
AM
1552 return false;
1553 p->next = h->dyn_relocs;
1554 h->dyn_relocs = p;
1555 p->sec = sec;
1556 p->count = 0;
1557#if RELATIVE_DYNRELOCS
1558 p->relative_count = 0;
1559#endif
30667bf3 1560 }
98ceb8ce
AM
1561
1562 p->count += 1;
1563#if RELATIVE_DYNRELOCS
1564 if (!IS_ABSOLUTE_RELOC (rtype))
1565 p->relative_count += 1;
1566#endif
1567 }
1568 else
1569 {
1570 /* Track dynamic relocs needed for local syms too. */
1571 elf_section_data (sec)->local_dynrel += 1;
30667bf3
AM
1572 }
1573 }
1574 }
1575 }
edd21aca
AM
1576
1577 return true;
1578}
1579
30667bf3
AM
1580/* Return the section that should be marked against garbage collection
1581 for a given relocation. */
1582
1583static asection *
1584elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1585 bfd *abfd;
1586 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1587 Elf_Internal_Rela *rel;
1588 struct elf_link_hash_entry *h;
1589 Elf_Internal_Sym *sym;
1590{
1591 if (h != NULL)
1592 {
1593 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1594 {
1595 case R_PARISC_GNU_VTINHERIT:
1596 case R_PARISC_GNU_VTENTRY:
1597 break;
1598
1599 default:
1600 switch (h->root.type)
1601 {
1602 case bfd_link_hash_defined:
1603 case bfd_link_hash_defweak:
1604 return h->root.u.def.section;
1605
1606 case bfd_link_hash_common:
1607 return h->root.u.c.p->section;
1608
1609 default:
1610 break;
1611 }
1612 }
1613 }
1614 else
1615 {
1616 if (!(elf_bad_symtab (abfd)
1617 && ELF_ST_BIND (sym->st_info) != STB_LOCAL)
1618 && ! ((sym->st_shndx <= 0 || sym->st_shndx >= SHN_LORESERVE)
1619 && sym->st_shndx != SHN_COMMON))
1620 {
1621 return bfd_section_from_elf_index (abfd, sym->st_shndx);
1622 }
1623 }
1624
1625 return NULL;
1626}
1627
30667bf3
AM
1628/* Update the got and plt entry reference counts for the section being
1629 removed. */
edd21aca
AM
1630
1631static boolean
30667bf3
AM
1632elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1633 bfd *abfd;
1634 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1635 asection *sec;
1636 const Elf_Internal_Rela *relocs;
edd21aca 1637{
30667bf3
AM
1638 Elf_Internal_Shdr *symtab_hdr;
1639 struct elf_link_hash_entry **sym_hashes;
1640 bfd_signed_vma *local_got_refcounts;
74d1c347 1641 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1642 const Elf_Internal_Rela *rel, *relend;
1643 unsigned long r_symndx;
1644 struct elf_link_hash_entry *h;
83c81bfe 1645 struct elf32_hppa_link_hash_table *htab;
30667bf3 1646 bfd *dynobj;
30667bf3 1647
98ceb8ce
AM
1648 elf_section_data (sec)->local_dynrel = 0;
1649
30667bf3
AM
1650 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1651 sym_hashes = elf_sym_hashes (abfd);
1652 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1653 local_plt_refcounts = local_got_refcounts;
1654 if (local_plt_refcounts != NULL)
1655 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1656 htab = hppa_link_hash_table (info);
ebe50bae 1657 dynobj = htab->elf.dynobj;
30667bf3
AM
1658 if (dynobj == NULL)
1659 return true;
1660
30667bf3
AM
1661 relend = relocs + sec->reloc_count;
1662 for (rel = relocs; rel < relend; rel++)
1663 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1664 {
1665 case R_PARISC_DLTIND14F:
1666 case R_PARISC_DLTIND14R:
1667 case R_PARISC_DLTIND21L:
1668 r_symndx = ELF32_R_SYM (rel->r_info);
1669 if (r_symndx >= symtab_hdr->sh_info)
1670 {
1671 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1672 if (h->got.refcount > 0)
4dc86686 1673 h->got.refcount -= 1;
30667bf3
AM
1674 }
1675 else if (local_got_refcounts != NULL)
1676 {
1677 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1678 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1679 }
1680 break;
edd21aca 1681
30667bf3
AM
1682 case R_PARISC_PCREL12F:
1683 case R_PARISC_PCREL17C:
1684 case R_PARISC_PCREL17F:
1685 case R_PARISC_PCREL22F:
1686 r_symndx = ELF32_R_SYM (rel->r_info);
1687 if (r_symndx >= symtab_hdr->sh_info)
1688 {
1689 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1690 if (h->plt.refcount > 0)
1691 h->plt.refcount -= 1;
1692 }
1693 break;
edd21aca 1694
74d1c347
AM
1695 case R_PARISC_PLABEL14R:
1696 case R_PARISC_PLABEL21L:
1697 case R_PARISC_PLABEL32:
1698 r_symndx = ELF32_R_SYM (rel->r_info);
1699 if (r_symndx >= symtab_hdr->sh_info)
1700 {
98ceb8ce
AM
1701 struct elf32_hppa_link_hash_entry *eh;
1702 struct elf32_hppa_dyn_reloc_entry **pp;
1703 struct elf32_hppa_dyn_reloc_entry *p;
1704
74d1c347 1705 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1706
74d1c347
AM
1707 if (h->plt.refcount > 0)
1708 h->plt.refcount -= 1;
98ceb8ce
AM
1709
1710 eh = (struct elf32_hppa_link_hash_entry *) h;
1711
1712 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1713 if (p->sec == sec)
1714 {
1715#if RELATIVE_DYNRELOCS
1716 if (!IS_ABSOLUTE_RELOC (rtype))
1717 p->relative_count -= 1;
1718#endif
1719 p->count -= 1;
1720 if (p->count == 0)
1721 *pp = p->next;
1722 break;
1723 }
74d1c347
AM
1724 }
1725 else if (local_plt_refcounts != NULL)
1726 {
1727 if (local_plt_refcounts[r_symndx] > 0)
1728 local_plt_refcounts[r_symndx] -= 1;
1729 }
1730 break;
1731
98ceb8ce
AM
1732 case R_PARISC_DIR32:
1733 r_symndx = ELF32_R_SYM (rel->r_info);
1734 if (r_symndx >= symtab_hdr->sh_info)
1735 {
1736 struct elf32_hppa_link_hash_entry *eh;
1737 struct elf32_hppa_dyn_reloc_entry **pp;
1738 struct elf32_hppa_dyn_reloc_entry *p;
1739
1740 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1741
1742 eh = (struct elf32_hppa_link_hash_entry *) h;
1743
1744 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1745 if (p->sec == sec)
1746 {
1747#if RELATIVE_DYNRELOCS
1748 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1749 p->relative_count -= 1;
1750#endif
1751 p->count -= 1;
1752 if (p->count == 0)
1753 *pp = p->next;
1754 break;
1755 }
1756 }
1757 break;
1758
30667bf3
AM
1759 default:
1760 break;
1761 }
252b5132 1762
252b5132
RH
1763 return true;
1764}
1765
74d1c347
AM
1766/* Our own version of hide_symbol, so that we can keep plt entries for
1767 plabels. */
1768
1769static void
1770elf32_hppa_hide_symbol (info, h)
1771 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1772 struct elf_link_hash_entry *h;
1773{
5fba655a
L
1774 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
1775 h->dynindx = -1;
74d1c347
AM
1776 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1777 {
1778 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1779 h->plt.offset = (bfd_vma) -1;
1780 }
1781}
1782
4dc86686
AM
1783/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1784 will be called from elflink.h. If elflink.h doesn't call our
1785 finish_dynamic_symbol routine, we'll need to do something about
1786 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1787#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1788 ((DYN) \
1789 && ((INFO)->shared \
1790 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1791 && ((H)->dynindx != -1 \
1792 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1793
30667bf3
AM
1794/* Adjust a symbol defined by a dynamic object and referenced by a
1795 regular object. The current definition is in some section of the
1796 dynamic object, but we're not including those sections. We have to
1797 change the definition to something the rest of the link can
1798 understand. */
252b5132 1799
30667bf3
AM
1800static boolean
1801elf32_hppa_adjust_dynamic_symbol (info, h)
1802 struct bfd_link_info *info;
1803 struct elf_link_hash_entry *h;
252b5132 1804{
30667bf3 1805 bfd *dynobj;
83c81bfe 1806 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1807 struct elf32_hppa_link_hash_entry *eh;
1808 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3
AM
1809 asection *s;
1810
83c81bfe 1811 htab = hppa_link_hash_table (info);
ebe50bae 1812 dynobj = htab->elf.dynobj;
30667bf3
AM
1813
1814 /* If this is a function, put it in the procedure linkage table. We
1815 will fill in the contents of the procedure linkage table later,
1816 when we know the address of the .got section. */
1817 if (h->type == STT_FUNC
1818 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1819 {
12cca0d2
AM
1820 if (!info->shared
1821 && h->plt.refcount > 0
1822 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1823 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
1824 {
1825 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
1826 }
1827
30667bf3
AM
1828 if (h->plt.refcount <= 0
1829 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1830 && h->root.type != bfd_link_hash_defweak
74d1c347 1831 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1832 && (!info->shared || info->symbolic)))
1833 {
1834 /* The .plt entry is not needed when:
1835 a) Garbage collection has removed all references to the
1836 symbol, or
1837 b) We know for certain the symbol is defined in this
74d1c347
AM
1838 object, and it's not a weak definition, nor is the symbol
1839 used by a plabel relocation. Either this object is the
1840 application or we are doing a shared symbolic link. */
1841
1842 /* As a special sop to the hppa ABI, we keep a .plt entry
1843 for functions in sections containing PIC code. */
12cca0d2
AM
1844 if (((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call)
1845 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1846 else
1847 {
1848 h->plt.offset = (bfd_vma) -1;
1849 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1850 }
30667bf3 1851 }
4dc86686 1852
30667bf3
AM
1853 return true;
1854 }
edd21aca 1855
30667bf3
AM
1856 /* If this is a weak symbol, and there is a real definition, the
1857 processor independent code will have arranged for us to see the
1858 real definition first, and we can just use the same value. */
1859 if (h->weakdef != NULL)
edd21aca 1860 {
49e9d0d3
AM
1861 if (h->weakdef->root.type != bfd_link_hash_defined
1862 && h->weakdef->root.type != bfd_link_hash_defweak)
1863 abort ();
30667bf3
AM
1864 h->root.u.def.section = h->weakdef->root.u.def.section;
1865 h->root.u.def.value = h->weakdef->root.u.def.value;
30667bf3 1866 }
edd21aca 1867
30667bf3
AM
1868 /* This is a reference to a symbol defined by a dynamic object which
1869 is not a function. */
1870
1871 /* If we are creating a shared library, we must presume that the
1872 only references to the symbol are via the global offset table.
1873 For such cases we need not do anything here; the relocations will
1874 be handled correctly by relocate_section. */
1875 if (info->shared)
1876 return true;
1877
1878 /* If there are no references to this symbol that do not use the
1879 GOT, we don't need to generate a copy reloc. */
1880 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1881 return true;
1882
ebe50bae
AM
1883 eh = (struct elf32_hppa_link_hash_entry *) h;
1884 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1885 {
1886 s = p->sec->output_section;
1887 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1888 break;
1889 }
1890
1891 /* If we didn't find any dynamic relocs in read-only sections, then
1892 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1893 if (p == NULL)
1894 {
1895 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1896 return true;
1897 }
1898
30667bf3
AM
1899 /* We must allocate the symbol in our .dynbss section, which will
1900 become part of the .bss section of the executable. There will be
1901 an entry for this symbol in the .dynsym section. The dynamic
1902 object will contain position independent code, so all references
1903 from the dynamic object to this symbol will go through the global
1904 offset table. The dynamic linker will use the .dynsym entry to
1905 determine the address it must put in the global offset table, so
1906 both the dynamic object and the regular object will refer to the
1907 same memory location for the variable. */
1908
83c81bfe 1909 s = htab->sdynbss;
30667bf3
AM
1910
1911 /* We must generate a COPY reloc to tell the dynamic linker to
1912 copy the initial value out of the dynamic object and into the
1913 runtime process image. We need to remember the offset into the
1914 .rela.bss section we are going to use. */
1915 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1916 {
1917 asection *srel;
1918
83c81bfe 1919 srel = htab->srelbss;
30667bf3
AM
1920 srel->_raw_size += sizeof (Elf32_External_Rela);
1921 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1922 }
252b5132 1923
30667bf3
AM
1924 {
1925 /* We need to figure out the alignment required for this symbol. I
1926 have no idea how other ELF linkers handle this. */
1927 unsigned int power_of_two;
1928
1929 power_of_two = bfd_log2 (h->size);
1930 if (power_of_two > 3)
1931 power_of_two = 3;
1932
1933 /* Apply the required alignment. */
1934 s->_raw_size = BFD_ALIGN (s->_raw_size,
1935 (bfd_size_type) (1 << power_of_two));
1936 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1937 {
1938 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
1939 return false;
1940 }
1941 }
1942 /* Define the symbol as being at this point in the section. */
1943 h->root.u.def.section = s;
1944 h->root.u.def.value = s->_raw_size;
edd21aca 1945
30667bf3
AM
1946 /* Increment the section size to make room for the symbol. */
1947 s->_raw_size += h->size;
252b5132
RH
1948
1949 return true;
1950}
1951
30667bf3
AM
1952/* Called via elf_link_hash_traverse to create .plt entries for an
1953 application that uses statically linked PIC functions. Similar to
1954 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1955
30667bf3
AM
1956static boolean
1957hppa_handle_PIC_calls (h, inf)
1958 struct elf_link_hash_entry *h;
4dc86686 1959 PTR inf ATTRIBUTE_UNUSED;
252b5132 1960{
30667bf3
AM
1961 if (! (h->plt.refcount > 0
1962 && (h->root.type == bfd_link_hash_defined
1963 || h->root.type == bfd_link_hash_defweak)
1964 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 1965 {
30667bf3
AM
1966 h->plt.offset = (bfd_vma) -1;
1967 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1968 return true;
252b5132
RH
1969 }
1970
74d1c347 1971 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
12cca0d2 1972 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
30667bf3 1973 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 1974
4dc86686
AM
1975 return true;
1976}
1977
1978/* Allocate space in .plt, .got and associated reloc sections for
1979 global syms. */
1980
1981static boolean
98ceb8ce 1982allocate_dynrelocs (h, inf)
4dc86686
AM
1983 struct elf_link_hash_entry *h;
1984 PTR inf;
1985{
1986 struct bfd_link_info *info;
83c81bfe 1987 struct elf32_hppa_link_hash_table *htab;
4dc86686 1988 asection *s;
446f2863 1989 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 1990 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 1991
73a74a62
AM
1992 if (h->root.type == bfd_link_hash_indirect
1993 || h->root.type == bfd_link_hash_warning)
1994 return true;
1995
30667bf3 1996 info = (struct bfd_link_info *) inf;
83c81bfe 1997 htab = hppa_link_hash_table (info);
ebe50bae 1998 if ((htab->elf.dynamic_sections_created
4dc86686
AM
1999 && h->plt.refcount > 0)
2000 || ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2001 {
446f2863
AM
2002 /* Make sure this symbol is output as a dynamic symbol.
2003 Undefined weak syms won't yet be marked as dynamic. */
2004 if (h->dynindx == -1
2005 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2006 && h->type != STT_PARISC_MILLI
2007 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2008 {
2009 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2010 return false;
2011 }
2012
4dc86686 2013 /* Make an entry in the .plt section. */
83c81bfe 2014 s = htab->splt;
4dc86686
AM
2015 h->plt.offset = s->_raw_size;
2016 if (PLABEL_PLT_ENTRY_SIZE != PLT_ENTRY_SIZE
2017 && ((struct elf32_hppa_link_hash_entry *) h)->plabel
2018 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
2019 {
2020 /* Add some extra space for the dynamic linker to use. */
2021 s->_raw_size += PLABEL_PLT_ENTRY_SIZE;
2022 }
2023 else
2024 s->_raw_size += PLT_ENTRY_SIZE;
2025
2026 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call
2027 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2028 {
2029 /* We also need to make an entry in the .rela.plt section. */
83c81bfe
AM
2030 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2031 htab->need_plt_stub = 1;
4dc86686
AM
2032 }
2033 }
2034 else
2035 {
2036 h->plt.offset = (bfd_vma) -1;
2037 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2038 }
edd21aca 2039
4dc86686
AM
2040 if (h->got.refcount > 0)
2041 {
2042 boolean dyn;
2043
446f2863
AM
2044 /* Make sure this symbol is output as a dynamic symbol.
2045 Undefined weak syms won't yet be marked as dynamic. */
2046 if (h->dynindx == -1
2047 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2048 && h->type != STT_PARISC_MILLI)
2049 {
2050 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2051 return false;
2052 }
2053
83c81bfe 2054 s = htab->sgot;
4dc86686
AM
2055 h->got.offset = s->_raw_size;
2056 s->_raw_size += GOT_ENTRY_SIZE;
ebe50bae 2057 dyn = htab->elf.dynamic_sections_created;
4dc86686 2058 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h))
83c81bfe 2059 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
4dc86686
AM
2060 }
2061 else
2062 h->got.offset = (bfd_vma) -1;
30667bf3 2063
446f2863 2064 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2065 if (eh->dyn_relocs == NULL)
446f2863 2066 return true;
30667bf3 2067
98ceb8ce
AM
2068 /* If this is a -Bsymbolic shared link, then we need to discard all
2069 space allocated for dynamic pc-relative relocs against symbols
2070 defined in a regular object. For the normal shared case, discard
2071 space for relocs that have become local due to symbol visibility
2072 changes. */
2073 if (info->shared)
446f2863 2074 {
98ceb8ce
AM
2075#if RELATIVE_DYNRELOCS
2076 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2077 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2078 || info->symbolic))
446f2863 2079 {
98ceb8ce 2080 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2081
98ceb8ce
AM
2082 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2083 {
2084 p->count -= p->relative_count;
2085 p->relative_count = 0;
2086 if (p->count == 0)
2087 *pp = p->next;
2088 else
2089 pp = &p->next;
2090 }
2091 }
2092#endif
446f2863 2093 }
98ceb8ce 2094 else
30667bf3 2095 {
98ceb8ce
AM
2096 /* For the non-shared case, discard space for relocs against
2097 symbols which turn out to need copy relocs or are not
2098 dynamic. */
2099 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2100 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2101 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2102 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2103 && (h->root.type == bfd_link_hash_undefweak
2104 || h->root.type == bfd_link_hash_undefined))))
2105 {
2106 /* Make sure this symbol is output as a dynamic symbol.
2107 Undefined weak syms won't yet be marked as dynamic. */
2108 if (h->dynindx == -1
2109 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2110 && h->type != STT_PARISC_MILLI)
2111 {
2112 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2113 return false;
2114 }
2115
2116 /* If that succeeded, we know we'll be keeping all the
2117 relocs. */
2118 if (h->dynindx != -1)
2119 goto keep;
2120 }
446f2863 2121
98ceb8ce
AM
2122 eh->dyn_relocs = NULL;
2123 return true;
2124
2125 keep:
30667bf3 2126 }
30667bf3 2127
98ceb8ce
AM
2128 /* Finally, allocate space. */
2129 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2130 {
98ceb8ce
AM
2131 asection *sreloc = elf_section_data (p->sec)->sreloc;
2132 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2133 }
30667bf3
AM
2134
2135 return true;
2136}
30667bf3 2137
d5c73c2f
AM
2138/* This function is called via elf_link_hash_traverse to force
2139 millicode symbols local so they do not end up as globals in the
2140 dynamic symbol table. We ought to be able to do this in
2141 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2142 for all dynamic symbols. Arguably, this is a bug in
2143 elf_adjust_dynamic_symbol. */
2144
2145static boolean
2146clobber_millicode_symbols (h, info)
2147 struct elf_link_hash_entry *h;
2148 struct bfd_link_info *info;
2149{
8dea1268
AM
2150 /* We only want to remove these from the dynamic symbol table.
2151 Therefore we do not leave ELF_LINK_FORCED_LOCAL set. */
d5c73c2f 2152 if (h->type == STT_PARISC_MILLI)
e0522e89
AM
2153 {
2154 unsigned short oldflags = h->elf_link_hash_flags;
2155 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
2156 elf32_hppa_hide_symbol (info, h);
2157 h->elf_link_hash_flags &= ~ELF_LINK_FORCED_LOCAL;
2158 h->elf_link_hash_flags |= oldflags & ELF_LINK_FORCED_LOCAL;
2159 }
d5c73c2f
AM
2160 return true;
2161}
2162
98ceb8ce
AM
2163/* Find any dynamic relocs that apply to read-only sections. */
2164
2165static boolean
2166readonly_dynrelocs (h, inf)
2167 struct elf_link_hash_entry *h;
2168 PTR inf;
2169{
2170 struct elf32_hppa_link_hash_entry *eh;
2171 struct elf32_hppa_dyn_reloc_entry *p;
2172
2173 eh = (struct elf32_hppa_link_hash_entry *) h;
2174 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2175 {
2176 asection *s = p->sec->output_section;
2177
2178 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2179 {
2180 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2181
2182 info->flags |= DF_TEXTREL;
2183
2184 /* Not an error, just cut short the traversal. */
2185 return false;
2186 }
2187 }
2188 return true;
2189}
2190
30667bf3
AM
2191/* Set the sizes of the dynamic sections. */
2192
2193static boolean
2194elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2195 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2196 struct bfd_link_info *info;
2197{
83c81bfe 2198 struct elf32_hppa_link_hash_table *htab;
30667bf3 2199 bfd *dynobj;
98ceb8ce 2200 bfd *ibfd;
30667bf3
AM
2201 asection *s;
2202 boolean relocs;
30667bf3 2203
83c81bfe 2204 htab = hppa_link_hash_table (info);
ebe50bae 2205 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2206 if (dynobj == NULL)
2207 abort ();
30667bf3 2208
ebe50bae 2209 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2210 {
2211 /* Set the contents of the .interp section to the interpreter. */
2212 if (! info->shared)
2213 {
2214 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2215 if (s == NULL)
2216 abort ();
30667bf3
AM
2217 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2218 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2219 }
74d1c347 2220
d5c73c2f 2221 /* Force millicode symbols local. */
ebe50bae 2222 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2223 clobber_millicode_symbols,
2224 info);
68fb2e56
AM
2225 }
2226 else
2227 {
2228 /* Run through the function symbols, looking for any that are
2229 PIC, and allocate space for the necessary .plt entries so
2230 that %r19 will be set up. */
2231 if (! info->shared)
ebe50bae 2232 elf_link_hash_traverse (&htab->elf,
68fb2e56
AM
2233 hppa_handle_PIC_calls,
2234 info);
2235 }
d5c73c2f 2236
98ceb8ce
AM
2237 /* Set up .got and .plt offsets for local syms, and space for local
2238 dynamic relocs. */
2239 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2240 {
2241 bfd_signed_vma *local_got;
2242 bfd_signed_vma *end_local_got;
2243 bfd_signed_vma *local_plt;
2244 bfd_signed_vma *end_local_plt;
2245 bfd_size_type locsymcount;
2246 Elf_Internal_Shdr *symtab_hdr;
2247 asection *srel;
74d1c347 2248
98ceb8ce 2249 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2250 continue;
4dc86686 2251
98ceb8ce
AM
2252 for (s = ibfd->sections; s != NULL; s = s->next)
2253 {
2254 bfd_size_type count = elf_section_data (s)->local_dynrel;
2255
2256 if (count != 0)
2257 {
2258 srel = elf_section_data (s)->sreloc;
2259 srel->_raw_size += count * sizeof (Elf32_External_Rela);
2260 }
2261 }
2262
2263 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2264 if (!local_got)
2265 continue;
74d1c347 2266
98ceb8ce 2267 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2268 locsymcount = symtab_hdr->sh_info;
2269 end_local_got = local_got + locsymcount;
83c81bfe
AM
2270 s = htab->sgot;
2271 srel = htab->srelgot;
68fb2e56
AM
2272 for (; local_got < end_local_got; ++local_got)
2273 {
2274 if (*local_got > 0)
4dc86686 2275 {
68fb2e56
AM
2276 *local_got = s->_raw_size;
2277 s->_raw_size += GOT_ENTRY_SIZE;
2278 if (info->shared)
2279 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2280 }
68fb2e56
AM
2281 else
2282 *local_got = (bfd_vma) -1;
2283 }
74d1c347 2284
68fb2e56
AM
2285 local_plt = end_local_got;
2286 end_local_plt = local_plt + locsymcount;
ebe50bae 2287 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2288 {
2289 /* Won't be used, but be safe. */
2290 for (; local_plt < end_local_plt; ++local_plt)
2291 *local_plt = (bfd_vma) -1;
2292 }
2293 else
2294 {
83c81bfe
AM
2295 s = htab->splt;
2296 srel = htab->srelplt;
74d1c347
AM
2297 for (; local_plt < end_local_plt; ++local_plt)
2298 {
2299 if (*local_plt > 0)
2300 {
74d1c347
AM
2301 *local_plt = s->_raw_size;
2302 s->_raw_size += PLT_ENTRY_SIZE;
2303 if (info->shared)
4dc86686 2304 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2305 }
2306 else
2307 *local_plt = (bfd_vma) -1;
2308 }
2309 }
30667bf3 2310 }
30667bf3 2311
98ceb8ce
AM
2312 /* Allocate global sym .plt and .got entries, and space for global
2313 sym dynamic relocs. */
ebe50bae 2314 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2315
2316 /* The check_relocs and adjust_dynamic_symbol entry points have
2317 determined the sizes of the various dynamic sections. Allocate
2318 memory for them. */
2319 relocs = false;
30667bf3
AM
2320 for (s = dynobj->sections; s != NULL; s = s->next)
2321 {
30667bf3
AM
2322 if ((s->flags & SEC_LINKER_CREATED) == 0)
2323 continue;
2324
83c81bfe 2325 if (s == htab->splt)
68fb2e56 2326 {
83c81bfe 2327 if (htab->need_plt_stub)
68fb2e56
AM
2328 {
2329 /* Make space for the plt stub at the end of the .plt
2330 section. We want this stub right at the end, up
2331 against the .got section. */
83c81bfe 2332 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2333 int pltalign = bfd_section_alignment (dynobj, s);
2334 bfd_size_type mask;
30667bf3 2335
68fb2e56
AM
2336 if (gotalign > pltalign)
2337 bfd_set_section_alignment (dynobj, s, gotalign);
2338 mask = ((bfd_size_type) 1 << gotalign) - 1;
2339 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2340 }
2341 }
83c81bfe 2342 else if (s == htab->sgot)
68fb2e56
AM
2343 ;
2344 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2345 {
2346 if (s->_raw_size != 0)
2347 {
30667bf3
AM
2348 /* Remember whether there are any reloc sections other
2349 than .rela.plt. */
83c81bfe 2350 if (s != htab->srelplt)
47d89dba
AM
2351 relocs = true;
2352
30667bf3
AM
2353 /* We use the reloc_count field as a counter if we need
2354 to copy relocs into the output file. */
2355 s->reloc_count = 0;
2356 }
2357 }
30667bf3
AM
2358 else
2359 {
2360 /* It's not one of our sections, so don't allocate space. */
2361 continue;
2362 }
2363
2364 if (s->_raw_size == 0)
2365 {
2366 /* If we don't need this section, strip it from the
2367 output file. This is mostly to handle .rela.bss and
2368 .rela.plt. We must create both sections in
2369 create_dynamic_sections, because they must be created
2370 before the linker maps input sections to output
2371 sections. The linker does that before
2372 adjust_dynamic_symbol is called, and it is that
2373 function which decides whether anything needs to go
2374 into these sections. */
2375 _bfd_strip_section_from_output (info, s);
2376 continue;
2377 }
2378
2379 /* Allocate memory for the section contents. Zero it, because
2380 we may not fill in all the reloc sections. */
2381 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2382 if (s->contents == NULL && s->_raw_size != 0)
2383 return false;
2384 }
2385
ebe50bae 2386 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2387 {
2388 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2389 actually has nothing to do with the PLT, it is how we
2390 communicate the LTP value of a load module to the dynamic
2391 linker. */
dc810e39
AM
2392#define add_dynamic_entry(TAG, VAL) \
2393 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2394
2395 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2396 return false;
2397
2398 /* Add some entries to the .dynamic section. We fill in the
2399 values later, in elf32_hppa_finish_dynamic_sections, but we
2400 must add the entries now so that we get the correct size for
2401 the .dynamic section. The DT_DEBUG entry is filled in by the
2402 dynamic linker and used by the debugger. */
dc810e39 2403 if (!info->shared)
30667bf3 2404 {
dc810e39 2405 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2406 return false;
2407 }
2408
83c81bfe 2409 if (htab->srelplt->_raw_size != 0)
30667bf3 2410 {
dc810e39
AM
2411 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2412 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2413 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2414 return false;
2415 }
2416
2417 if (relocs)
2418 {
dc810e39
AM
2419 if (!add_dynamic_entry (DT_RELA, 0)
2420 || !add_dynamic_entry (DT_RELASZ, 0)
2421 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2422 return false;
30667bf3 2423
98ceb8ce
AM
2424 /* If any dynamic relocs apply to a read-only section,
2425 then we need a DT_TEXTREL entry. */
ebe50bae 2426 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, (PTR) info);
98ceb8ce
AM
2427
2428 if ((info->flags & DF_TEXTREL) != 0)
2429 {
2430 if (!add_dynamic_entry (DT_TEXTREL, 0))
2431 return false;
2432 }
30667bf3
AM
2433 }
2434 }
dc810e39 2435#undef add_dynamic_entry
30667bf3
AM
2436
2437 return true;
2438}
2439
30667bf3
AM
2440/* External entry points for sizing and building linker stubs. */
2441
2442/* Determine and set the size of the stub section for a final link.
2443
2444 The basic idea here is to examine all the relocations looking for
2445 PC-relative calls to a target that is unreachable with a "bl"
2446 instruction. */
2447
2448boolean
47d89dba 2449elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
30667bf3 2450 add_stub_section, layout_sections_again)
25f72752 2451 bfd *output_bfd;
30667bf3 2452 bfd *stub_bfd;
30667bf3 2453 struct bfd_link_info *info;
25f72752 2454 boolean multi_subspace;
47d89dba 2455 bfd_signed_vma group_size;
30667bf3
AM
2456 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2457 void (*layout_sections_again) PARAMS ((void));
2458{
2459 bfd *input_bfd;
2460 asection *section;
25f72752 2461 asection **input_list, **list;
30667bf3 2462 Elf_Internal_Sym *local_syms, **all_local_syms;
25f72752
AM
2463 unsigned int bfd_indx, bfd_count;
2464 int top_id, top_index;
83c81bfe 2465 struct elf32_hppa_link_hash_table *htab;
47d89dba
AM
2466 bfd_size_type stub_group_size;
2467 boolean stubs_always_before_branch;
30667bf3 2468 boolean stub_changed = 0;
25f72752 2469 boolean ret = 0;
dc810e39 2470 bfd_size_type amt;
30667bf3 2471
83c81bfe 2472 htab = hppa_link_hash_table (info);
30667bf3
AM
2473
2474 /* Stash our params away. */
83c81bfe
AM
2475 htab->stub_bfd = stub_bfd;
2476 htab->multi_subspace = multi_subspace;
2477 htab->add_stub_section = add_stub_section;
2478 htab->layout_sections_again = layout_sections_again;
47d89dba
AM
2479 stubs_always_before_branch = group_size < 0;
2480 if (group_size < 0)
2481 stub_group_size = -group_size;
2482 else
2483 stub_group_size = group_size;
2484 if (stub_group_size == 1)
2485 {
2486 /* Default values. */
2487 stub_group_size = 8000000;
83c81bfe 2488 if (htab->has_17bit_branch || htab->multi_subspace)
47d89dba 2489 stub_group_size = 250000;
83c81bfe 2490 if (htab->has_12bit_branch)
47d89dba
AM
2491 stub_group_size = 7812;
2492 }
30667bf3 2493
1badb539
AM
2494 /* Count the number of input BFDs and find the top input section id. */
2495 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2496 input_bfd != NULL;
2497 input_bfd = input_bfd->link_next)
2498 {
2499 bfd_count += 1;
25f72752
AM
2500 for (section = input_bfd->sections;
2501 section != NULL;
2502 section = section->next)
2503 {
2504 if (top_id < section->id)
2505 top_id = section->id;
2506 }
30667bf3
AM
2507 }
2508
dc810e39 2509 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2510 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2511 if (htab->stub_group == NULL)
30667bf3
AM
2512 return false;
2513
1badb539
AM
2514 /* Make a list of input sections for each output section included in
2515 the link.
2516
2517 We can't use output_bfd->section_count here to find the top output
2518 section index as some sections may have been removed, and
2519 _bfd_strip_section_from_output doesn't renumber the indices. */
2520 for (section = output_bfd->sections, top_index = 0;
2521 section != NULL;
2522 section = section->next)
2523 {
2524 if (top_index < section->index)
2525 top_index = section->index;
2526 }
2527
dc810e39
AM
2528 amt = sizeof (asection *) * (top_index + 1);
2529 input_list = (asection **) bfd_malloc (amt);
25f72752
AM
2530 if (input_list == NULL)
2531 return false;
2532
1badb539
AM
2533 /* For sections we aren't interested in, mark their entries with a
2534 value we can check later. */
2535 list = input_list + top_index;
2536 do
2537 *list = bfd_abs_section_ptr;
2538 while (list-- != input_list);
2539
2540 for (section = output_bfd->sections;
2541 section != NULL;
2542 section = section->next)
2543 {
47d89dba 2544 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2545 input_list[section->index] = NULL;
2546 }
2547
2548 /* Now actually build the lists. */
25f72752
AM
2549 for (input_bfd = info->input_bfds;
2550 input_bfd != NULL;
2551 input_bfd = input_bfd->link_next)
2552 {
2553 for (section = input_bfd->sections;
2554 section != NULL;
2555 section = section->next)
2556 {
2557 if (section->output_section != NULL
1badb539
AM
2558 && section->output_section->owner == output_bfd
2559 && section->output_section->index <= top_index)
25f72752
AM
2560 {
2561 list = input_list + section->output_section->index;
1badb539
AM
2562 if (*list != bfd_abs_section_ptr)
2563 {
2564 /* Steal the link_sec pointer for our list. */
83c81bfe 2565#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
1badb539
AM
2566 /* This happens to make the list in reverse order,
2567 which is what we want. */
2568 PREV_SEC (section) = *list;
2569 *list = section;
2570 }
25f72752
AM
2571 }
2572 }
2573 }
2574
2575 /* See whether we can group stub sections together. Grouping stub
2576 sections may result in fewer stubs. More importantly, we need to
2577 put all .init* and .fini* stubs at the beginning of the .init or
2578 .fini output sections respectively, because glibc splits the
2579 _init and _fini functions into multiple parts. Putting a stub in
2580 the middle of a function is not a good idea. */
a017a724 2581 list = input_list + top_index;
1badb539 2582 do
25f72752
AM
2583 {
2584 asection *tail = *list;
1badb539
AM
2585 if (tail == bfd_abs_section_ptr)
2586 continue;
25f72752
AM
2587 while (tail != NULL)
2588 {
2589 asection *curr;
2590 asection *prev;
2591 bfd_size_type total;
2592
2593 curr = tail;
2594 if (tail->_cooked_size)
2595 total = tail->_cooked_size;
2596 else
2597 total = tail->_raw_size;
2598 while ((prev = PREV_SEC (curr)) != NULL
2599 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2600 < stub_group_size))
25f72752
AM
2601 curr = prev;
2602
2603 /* OK, the size from the start of CURR to the end is less
2604 than 250000 bytes and thus can be handled by one stub
2605 section. (or the tail section is itself larger than
2606 250000 bytes, in which case we may be toast.)
2607 We should really be keeping track of the total size of
2608 stubs added here, as stubs contribute to the final output
2609 section size. That's a little tricky, and this way will
2610 only break if stubs added total more than 12144 bytes, or
2611 1518 long branch stubs. It seems unlikely for more than
2612 1518 different functions to be called, especially from
2613 code only 250000 bytes long. */
2614 do
2615 {
2616 prev = PREV_SEC (tail);
2617 /* Set up this stub group. */
83c81bfe 2618 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2619 }
2620 while (tail != curr && (tail = prev) != NULL);
2621
2622 /* But wait, there's more! Input sections up to 250000
2623 bytes before the stub section can be handled by it too. */
47d89dba 2624 if (!stubs_always_before_branch)
25f72752 2625 {
47d89dba
AM
2626 total = 0;
2627 while (prev != NULL
2628 && ((total += tail->output_offset - prev->output_offset)
2629 < stub_group_size))
2630 {
2631 tail = prev;
2632 prev = PREV_SEC (tail);
83c81bfe 2633 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2634 }
25f72752
AM
2635 }
2636 tail = prev;
2637 }
2638 }
1badb539 2639 while (list-- != input_list);
25f72752 2640 free (input_list);
1badb539 2641#undef PREV_SEC
30667bf3
AM
2642
2643 /* We want to read in symbol extension records only once. To do this
2644 we need to read in the local symbols in parallel and save them for
2645 later use; so hold pointers to the local symbols in an array. */
dc810e39
AM
2646 amt = sizeof (Elf_Internal_Sym *) * bfd_count;
2647 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
30667bf3 2648 if (all_local_syms == NULL)
25f72752 2649 return false;
30667bf3
AM
2650
2651 /* Walk over all the input BFDs, swapping in local symbols.
2652 If we are creating a shared library, create hash entries for the
2653 export stubs. */
25f72752 2654 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2655 input_bfd != NULL;
25f72752 2656 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2657 {
2658 Elf_Internal_Shdr *symtab_hdr;
2659 Elf_Internal_Sym *isym;
25f72752 2660 Elf32_External_Sym *ext_syms, *esym, *end_sy;
dc810e39 2661 bfd_size_type sec_size;
edd21aca 2662
252b5132
RH
2663 /* We'll need the symbol table in a second. */
2664 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2665 if (symtab_hdr->sh_info == 0)
2666 continue;
2667
edd21aca
AM
2668 /* We need an array of the local symbols attached to the input bfd.
2669 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2670 sec_size = symtab_hdr->sh_info;
2671 sec_size *= sizeof (Elf_Internal_Sym);
2672 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2673 if (local_syms == NULL)
2674 {
2675 goto error_ret_free_local;
2676 }
25f72752 2677 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2678 sec_size = symtab_hdr->sh_info;
2679 sec_size *= sizeof (Elf32_External_Sym);
2680 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2681 if (ext_syms == NULL)
2682 {
2683 goto error_ret_free_local;
2684 }
2685
2686 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2687 || (bfd_bread (ext_syms, sec_size, input_bfd) != sec_size))
edd21aca
AM
2688 {
2689 free (ext_syms);
2690 goto error_ret_free_local;
2691 }
2692
2693 /* Swap the local symbols in. */
2694 isym = local_syms;
2695 esym = ext_syms;
25f72752 2696 for (end_sy = esym + symtab_hdr->sh_info; esym < end_sy; esym++, isym++)
edd21aca
AM
2697 bfd_elf32_swap_symbol_in (input_bfd, esym, isym);
2698
2699 /* Now we can free the external symbols. */
2700 free (ext_syms);
edd21aca 2701
83c81bfe 2702 if (info->shared && htab->multi_subspace)
30667bf3 2703 {
25f72752
AM
2704 struct elf_link_hash_entry **sym_hashes;
2705 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2706 unsigned int symcount;
2707
2708 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2709 - symtab_hdr->sh_info);
25f72752
AM
2710 sym_hashes = elf_sym_hashes (input_bfd);
2711 end_hashes = sym_hashes + symcount;
30667bf3
AM
2712
2713 /* Look through the global syms for functions; We need to
2714 build export stubs for all globally visible functions. */
25f72752 2715 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2716 {
2717 struct elf32_hppa_link_hash_entry *hash;
2718
25f72752 2719 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2720
2721 while (hash->elf.root.type == bfd_link_hash_indirect
2722 || hash->elf.root.type == bfd_link_hash_warning)
2723 hash = ((struct elf32_hppa_link_hash_entry *)
2724 hash->elf.root.u.i.link);
2725
2726 /* At this point in the link, undefined syms have been
2727 resolved, so we need to check that the symbol was
2728 defined in this BFD. */
2729 if ((hash->elf.root.type == bfd_link_hash_defined
2730 || hash->elf.root.type == bfd_link_hash_defweak)
2731 && hash->elf.type == STT_FUNC
2732 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2733 && (hash->elf.root.u.def.section->output_section->owner
2734 == output_bfd)
30667bf3
AM
2735 && hash->elf.root.u.def.section->owner == input_bfd
2736 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2737 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2738 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2739 {
2740 asection *sec;
2741 const char *stub_name;
2742 struct elf32_hppa_stub_hash_entry *stub_entry;
2743
2744 sec = hash->elf.root.u.def.section;
2745 stub_name = hash->elf.root.root.string;
83c81bfe 2746 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2747 stub_name,
2748 false, false);
2749 if (stub_entry == NULL)
2750 {
83c81bfe 2751 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3
AM
2752 if (!stub_entry)
2753 goto error_ret_free_local;
2754
2755 stub_entry->target_value = hash->elf.root.u.def.value;
2756 stub_entry->target_section = hash->elf.root.u.def.section;
2757 stub_entry->stub_type = hppa_stub_export;
2758 stub_entry->h = hash;
2759 stub_changed = 1;
2760 }
2761 else
2762 {
2763 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2764 bfd_archive_filename (input_bfd),
2765 stub_name);
30667bf3
AM
2766 }
2767 }
2768 }
30667bf3
AM
2769 }
2770 }
edd21aca
AM
2771
2772 while (1)
2773 {
30667bf3
AM
2774 asection *stub_sec;
2775
25f72752 2776 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2777 input_bfd != NULL;
25f72752 2778 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2779 {
2780 Elf_Internal_Shdr *symtab_hdr;
2781
2782 /* We'll need the symbol table in a second. */
2783 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2784 if (symtab_hdr->sh_info == 0)
2785 continue;
2786
25f72752 2787 local_syms = all_local_syms[bfd_indx];
30667bf3
AM
2788
2789 /* Walk over each section attached to the input bfd. */
2790 for (section = input_bfd->sections;
2791 section != NULL;
25f72752 2792 section = section->next)
30667bf3
AM
2793 {
2794 Elf_Internal_Shdr *input_rel_hdr;
2795 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2796 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2797
2798 /* If there aren't any relocs, then there's nothing more
2799 to do. */
2800 if ((section->flags & SEC_RELOC) == 0
2801 || section->reloc_count == 0)
2802 continue;
2803
25f72752
AM
2804 /* If this section is a link-once section that will be
2805 discarded, then don't create any stubs. */
2806 if (section->output_section == NULL
2807 || section->output_section->owner != output_bfd)
2808 continue;
2809
30667bf3 2810 /* Allocate space for the external relocations. */
dc810e39
AM
2811 amt = section->reloc_count;
2812 amt *= sizeof (Elf32_External_Rela);
2813 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
2814 if (external_relocs == NULL)
2815 {
2816 goto error_ret_free_local;
2817 }
2818
2819 /* Likewise for the internal relocations. */
dc810e39
AM
2820 amt = section->reloc_count;
2821 amt *= sizeof (Elf_Internal_Rela);
2822 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
2823 if (internal_relocs == NULL)
2824 {
2825 free (external_relocs);
2826 goto error_ret_free_local;
2827 }
2828
2829 /* Read in the external relocs. */
2830 input_rel_hdr = &elf_section_data (section)->rel_hdr;
2831 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2832 || bfd_bread (external_relocs,
30667bf3
AM
2833 input_rel_hdr->sh_size,
2834 input_bfd) != input_rel_hdr->sh_size)
2835 {
2836 free (external_relocs);
2837 error_ret_free_internal:
2838 free (internal_relocs);
2839 goto error_ret_free_local;
2840 }
2841
2842 /* Swap in the relocs. */
2843 erela = external_relocs;
2844 erelaend = erela + section->reloc_count;
2845 irela = internal_relocs;
2846 for (; erela < erelaend; erela++, irela++)
2847 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
2848
2849 /* We're done with the external relocs, free them. */
2850 free (external_relocs);
2851
2852 /* Now examine each relocation. */
2853 irela = internal_relocs;
2854 irelaend = irela + section->reloc_count;
2855 for (; irela < irelaend; irela++)
2856 {
2857 unsigned int r_type, r_indx;
2858 enum elf32_hppa_stub_type stub_type;
2859 struct elf32_hppa_stub_hash_entry *stub_entry;
2860 asection *sym_sec;
2861 bfd_vma sym_value;
2862 bfd_vma destination;
2863 struct elf32_hppa_link_hash_entry *hash;
2864 char *stub_name;
25f72752 2865 const asection *id_sec;
30667bf3
AM
2866
2867 r_type = ELF32_R_TYPE (irela->r_info);
2868 r_indx = ELF32_R_SYM (irela->r_info);
2869
2870 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2871 {
2872 bfd_set_error (bfd_error_bad_value);
2873 goto error_ret_free_internal;
2874 }
2875
2876 /* Only look for stubs on call instructions. */
2877 if (r_type != (unsigned int) R_PARISC_PCREL12F
2878 && r_type != (unsigned int) R_PARISC_PCREL17F
2879 && r_type != (unsigned int) R_PARISC_PCREL22F)
2880 continue;
2881
2882 /* Now determine the call target, its name, value,
2883 section. */
2884 sym_sec = NULL;
2885 sym_value = 0;
2886 destination = 0;
2887 hash = NULL;
2888 if (r_indx < symtab_hdr->sh_info)
2889 {
2890 /* It's a local symbol. */
2891 Elf_Internal_Sym *sym;
2892 Elf_Internal_Shdr *hdr;
2893
2894 sym = local_syms + r_indx;
2895 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
2896 sym_sec = hdr->bfd_section;
2897 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2898 sym_value = sym->st_value;
2899 destination = (sym_value + irela->r_addend
2900 + sym_sec->output_offset
2901 + sym_sec->output_section->vma);
2902 }
2903 else
2904 {
2905 /* It's an external symbol. */
2906 int e_indx;
2907
2908 e_indx = r_indx - symtab_hdr->sh_info;
2909 hash = ((struct elf32_hppa_link_hash_entry *)
2910 elf_sym_hashes (input_bfd)[e_indx]);
2911
2912 while (hash->elf.root.type == bfd_link_hash_indirect
2913 || hash->elf.root.type == bfd_link_hash_warning)
2914 hash = ((struct elf32_hppa_link_hash_entry *)
2915 hash->elf.root.u.i.link);
2916
2917 if (hash->elf.root.type == bfd_link_hash_defined
2918 || hash->elf.root.type == bfd_link_hash_defweak)
2919 {
2920 sym_sec = hash->elf.root.u.def.section;
2921 sym_value = hash->elf.root.u.def.value;
2922 if (sym_sec->output_section != NULL)
2923 destination = (sym_value + irela->r_addend
2924 + sym_sec->output_offset
2925 + sym_sec->output_section->vma);
2926 }
2927 else if (hash->elf.root.type == bfd_link_hash_undefweak)
2928 {
2929 if (! info->shared)
2930 continue;
2931 }
2932 else if (hash->elf.root.type == bfd_link_hash_undefined)
2933 {
2934 if (! (info->shared
2935 && !info->no_undefined
2936 && (ELF_ST_VISIBILITY (hash->elf.other)
2937 == STV_DEFAULT)))
2938 continue;
2939 }
2940 else
2941 {
2942 bfd_set_error (bfd_error_bad_value);
2943 goto error_ret_free_internal;
2944 }
2945 }
2946
2947 /* Determine what (if any) linker stub is needed. */
2948 stub_type = hppa_type_of_stub (section, irela, hash,
2949 destination);
2950 if (stub_type == hppa_stub_none)
2951 continue;
2952
25f72752 2953 /* Support for grouping stub sections. */
83c81bfe 2954 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2955
30667bf3 2956 /* Get the name of this stub. */
25f72752 2957 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
2958 if (!stub_name)
2959 goto error_ret_free_internal;
2960
83c81bfe 2961 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2962 stub_name,
2963 false, false);
2964 if (stub_entry != NULL)
2965 {
2966 /* The proper stub has already been created. */
2967 free (stub_name);
2968 continue;
2969 }
2970
83c81bfe 2971 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
2972 if (stub_entry == NULL)
2973 {
2974 free (stub_name);
2975 goto error_ret_free_local;
2976 }
2977
2978 stub_entry->target_value = sym_value;
2979 stub_entry->target_section = sym_sec;
2980 stub_entry->stub_type = stub_type;
2981 if (info->shared)
2982 {
2983 if (stub_type == hppa_stub_import)
2984 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 2985 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
2986 stub_entry->stub_type = hppa_stub_long_branch_shared;
2987 }
2988 stub_entry->h = hash;
2989 stub_changed = 1;
2990 }
2991
2992 /* We're done with the internal relocs, free them. */
2993 free (internal_relocs);
2994 }
2995 }
2996
2997 if (!stub_changed)
2998 break;
2999
3000 /* OK, we've added some stubs. Find out the new size of the
3001 stub sections. */
83c81bfe 3002 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3003 stub_sec != NULL;
3004 stub_sec = stub_sec->next)
3005 {
74d1c347
AM
3006 stub_sec->_raw_size = 0;
3007 stub_sec->_cooked_size = 0;
3008 }
74d1c347 3009
83c81bfe 3010 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3011
30667bf3 3012 /* Ask the linker to do its stuff. */
83c81bfe 3013 (*htab->layout_sections_again) ();
30667bf3
AM
3014 stub_changed = 0;
3015 }
3016
25f72752 3017 ret = 1;
30667bf3
AM
3018
3019 error_ret_free_local:
25f72752
AM
3020 while (bfd_count-- > 0)
3021 if (all_local_syms[bfd_count])
3022 free (all_local_syms[bfd_count]);
30667bf3
AM
3023 free (all_local_syms);
3024
25f72752 3025 return ret;
30667bf3
AM
3026}
3027
30667bf3
AM
3028/* For a final link, this function is called after we have sized the
3029 stubs to provide a value for __gp. */
3030
3031boolean
3032elf32_hppa_set_gp (abfd, info)
3033 bfd *abfd;
3034 struct bfd_link_info *info;
3035{
83c81bfe 3036 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3037 struct elf_link_hash_entry *h;
3038 asection *sec;
3039 bfd_vma gp_val;
3040
83c81bfe 3041 htab = hppa_link_hash_table (info);
ebe50bae 3042 h = elf_link_hash_lookup (&htab->elf, "$global$", false, false, false);
30667bf3 3043
df8634e3
AM
3044 if (h != NULL
3045 && (h->root.type == bfd_link_hash_defined
3046 || h->root.type == bfd_link_hash_defweak))
30667bf3
AM
3047 {
3048 gp_val = h->root.u.def.value;
3049 sec = h->root.u.def.section;
3050 }
3051 else
3052 {
74d1c347
AM
3053 /* Choose to point our LTP at, in this order, one of .plt, .got,
3054 or .data, if these sections exist. In the case of choosing
3055 .plt try to make the LTP ideal for addressing anywhere in the
3056 .plt or .got with a 14 bit signed offset. Typically, the end
3057 of the .plt is the start of the .got, so choose .plt + 0x2000
3058 if either the .plt or .got is larger than 0x2000. If both
3059 the .plt and .got are smaller than 0x2000, choose the end of
3060 the .plt section. */
3061
83c81bfe 3062 sec = htab->splt;
74d1c347 3063 if (sec != NULL)
30667bf3 3064 {
74d1c347
AM
3065 gp_val = sec->_raw_size;
3066 if (gp_val > 0x2000
83c81bfe 3067 || (htab->sgot && htab->sgot->_raw_size > 0x2000))
74d1c347
AM
3068 {
3069 gp_val = 0x2000;
3070 }
3071 }
3072 else
3073 {
3074 gp_val = 0;
83c81bfe 3075 sec = htab->sgot;
74d1c347
AM
3076 if (sec != NULL)
3077 {
3078 /* We know we don't have a .plt. If .got is large,
3079 offset our LTP. */
3080 if (sec->_raw_size > 0x2000)
3081 gp_val = 0x2000;
3082 }
3083 else
3084 {
3085 /* No .plt or .got. Who cares what the LTP is? */
3086 sec = bfd_get_section_by_name (abfd, ".data");
3087 }
30667bf3 3088 }
df8634e3
AM
3089
3090 if (h != NULL)
3091 {
3092 h->root.type = bfd_link_hash_defined;
3093 h->root.u.def.value = gp_val;
3094 if (sec != NULL)
3095 h->root.u.def.section = sec;
3096 else
3097 h->root.u.def.section = bfd_abs_section_ptr;
3098 }
30667bf3
AM
3099 }
3100
b32b5d6e 3101 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3102 gp_val += sec->output_section->vma + sec->output_offset;
3103
3104 elf_gp (abfd) = gp_val;
30667bf3
AM
3105 return true;
3106}
3107
30667bf3
AM
3108/* Build all the stubs associated with the current output file. The
3109 stubs are kept in a hash table attached to the main linker hash
3110 table. We also set up the .plt entries for statically linked PIC
3111 functions here. This function is called via hppaelf_finish in the
3112 linker. */
3113
3114boolean
3115elf32_hppa_build_stubs (info)
3116 struct bfd_link_info *info;
3117{
3118 asection *stub_sec;
3119 struct bfd_hash_table *table;
83c81bfe 3120 struct elf32_hppa_link_hash_table *htab;
30667bf3 3121
83c81bfe 3122 htab = hppa_link_hash_table (info);
30667bf3 3123
83c81bfe 3124 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3125 stub_sec != NULL;
3126 stub_sec = stub_sec->next)
3127 {
dc810e39 3128 bfd_size_type size;
30667bf3
AM
3129
3130 /* Allocate memory to hold the linker stubs. */
74d1c347 3131 size = stub_sec->_raw_size;
83c81bfe 3132 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3133 if (stub_sec->contents == NULL && size != 0)
3134 return false;
74d1c347 3135 stub_sec->_raw_size = 0;
30667bf3
AM
3136 }
3137
3138 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3139 table = &htab->stub_hash_table;
30667bf3
AM
3140 bfd_hash_traverse (table, hppa_build_one_stub, info);
3141
3142 return true;
3143}
3144
c46b7515
AM
3145/* Perform a final link. */
3146
3147static boolean
3148elf32_hppa_final_link (abfd, info)
3149 bfd *abfd;
3150 struct bfd_link_info *info;
3151{
3152 asection *s;
3153
4dc86686
AM
3154 /* Invoke the regular ELF linker to do all the work. */
3155 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3156 return false;
3157
3158 /* If we're producing a final executable, sort the contents of the
3159 unwind section. Magic section names, but this is much safer than
3160 having elf32_hppa_relocate_section remember where SEGREL32 relocs
3161 occurred. Consider what happens if someone inept creates a
3162 linker script that puts unwind information in .text. */
3163 s = bfd_get_section_by_name (abfd, ".PARISC.unwind");
3164 if (s != NULL)
3165 {
3166 bfd_size_type size;
3167 char *contents;
3168
3169 size = s->_raw_size;
3170 contents = bfd_malloc (size);
3171 if (contents == NULL)
3172 return false;
3173
3174 if (! bfd_get_section_contents (abfd, s, contents, (file_ptr) 0, size))
3175 return false;
3176
dc810e39 3177 qsort (contents, (size_t) (size / 16), 16, hppa_unwind_entry_compare);
c46b7515
AM
3178
3179 if (! bfd_set_section_contents (abfd, s, contents, (file_ptr) 0, size))
3180 return false;
3181 }
3182 return true;
3183}
3184
3185/* Record the lowest address for the data and text segments. */
3186
3187static void
3188hppa_record_segment_addr (abfd, section, data)
3189 bfd *abfd ATTRIBUTE_UNUSED;
3190 asection *section;
3191 PTR data;
3192{
83c81bfe 3193 struct elf32_hppa_link_hash_table *htab;
c46b7515 3194
83c81bfe 3195 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3196
3197 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3198 {
3199 bfd_vma value = section->vma - section->filepos;
3200
3201 if ((section->flags & SEC_READONLY) != 0)
3202 {
83c81bfe
AM
3203 if (value < htab->text_segment_base)
3204 htab->text_segment_base = value;
c46b7515
AM
3205 }
3206 else
3207 {
83c81bfe
AM
3208 if (value < htab->data_segment_base)
3209 htab->data_segment_base = value;
c46b7515
AM
3210 }
3211 }
3212}
3213
30667bf3
AM
3214/* Perform a relocation as part of a final link. */
3215
3216static bfd_reloc_status_type
83c81bfe 3217final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3218 asection *input_section;
3219 bfd_byte *contents;
3220 const Elf_Internal_Rela *rel;
3221 bfd_vma value;
83c81bfe 3222 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3223 asection *sym_sec;
3224 struct elf32_hppa_link_hash_entry *h;
3225{
3226 int insn;
3227 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3228 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3229 int r_format = howto->bitsize;
3230 enum hppa_reloc_field_selector_type_alt r_field;
3231 bfd *input_bfd = input_section->owner;
3232 bfd_vma offset = rel->r_offset;
3233 bfd_vma max_branch_offset = 0;
3234 bfd_byte *hit_data = contents + offset;
3235 bfd_signed_vma addend = rel->r_addend;
3236 bfd_vma location;
3237 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3238 int val;
3239
3240 if (r_type == R_PARISC_NONE)
3241 return bfd_reloc_ok;
3242
3243 insn = bfd_get_32 (input_bfd, hit_data);
3244
3245 /* Find out where we are and where we're going. */
3246 location = (offset +
3247 input_section->output_offset +
3248 input_section->output_section->vma);
3249
3250 switch (r_type)
3251 {
3252 case R_PARISC_PCREL12F:
3253 case R_PARISC_PCREL17F:
3254 case R_PARISC_PCREL22F:
3255 /* If this is a call to a function defined in another dynamic
3256 library, or if it is a call to a PIC function in the same
74d1c347
AM
3257 object, or if this is a shared link and it is a call to a
3258 weak symbol which may or may not be in the same object, then
3259 find the import stub in the stub hash. */
30667bf3
AM
3260 if (sym_sec == NULL
3261 || sym_sec->output_section == NULL
12cca0d2
AM
3262 || (h != NULL
3263 && ((h->maybe_pic_call
3264 && !(input_section->flags & SEC_HAS_GOT_REF))
3265 || (h->elf.root.type == bfd_link_hash_defweak
3266 && h->elf.dynindx != -1
3267 && h->elf.plt.offset != (bfd_vma) -1))))
30667bf3
AM
3268 {
3269 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3270 h, rel, htab);
30667bf3
AM
3271 if (stub_entry != NULL)
3272 {
3273 value = (stub_entry->stub_offset
3274 + stub_entry->stub_sec->output_offset
3275 + stub_entry->stub_sec->output_section->vma);
3276 addend = 0;
3277 }
3278 else if (sym_sec == NULL && h != NULL
3279 && h->elf.root.type == bfd_link_hash_undefweak)
3280 {
db20fd76
AM
3281 /* It's OK if undefined weak. Calls to undefined weak
3282 symbols behave as if the "called" function
3283 immediately returns. We can thus call to a weak
3284 function without first checking whether the function
3285 is defined. */
30667bf3 3286 value = location;
db20fd76 3287 addend = 8;
30667bf3
AM
3288 }
3289 else
3290 return bfd_reloc_notsupported;
3291 }
3292 /* Fall thru. */
3293
3294 case R_PARISC_PCREL21L:
3295 case R_PARISC_PCREL17C:
3296 case R_PARISC_PCREL17R:
3297 case R_PARISC_PCREL14R:
3298 case R_PARISC_PCREL14F:
3299 /* Make it a pc relative offset. */
3300 value -= location;
3301 addend -= 8;
3302 break;
3303
3304 case R_PARISC_DPREL21L:
3305 case R_PARISC_DPREL14R:
3306 case R_PARISC_DPREL14F:
3307 /* For all the DP relative relocations, we need to examine the symbol's
3308 section. If it's a code section, then "data pointer relative" makes
3309 no sense. In that case we don't adjust the "value", and for 21 bit
3310 addil instructions, we change the source addend register from %dp to
3311 %r0. This situation commonly arises when a variable's "constness"
3312 is declared differently from the way the variable is defined. For
3313 instance: "extern int foo" with foo defined as "const int foo". */
3314 if (sym_sec == NULL)
3315 break;
3316 if ((sym_sec->flags & SEC_CODE) != 0)
3317 {
3318 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3319 == (((int) OP_ADDIL << 26) | (27 << 21)))
3320 {
3321 insn &= ~ (0x1f << 21);
74d1c347 3322#if 1 /* debug them. */
30667bf3
AM
3323 (*_bfd_error_handler)
3324 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3325 bfd_archive_filename (input_bfd),
30667bf3
AM
3326 input_section->name,
3327 (long) rel->r_offset,
3328 howto->name);
3329#endif
3330 }
3331 /* Now try to make things easy for the dynamic linker. */
3332
3333 break;
3334 }
74d1c347 3335 /* Fall thru. */
30667bf3
AM
3336
3337 case R_PARISC_DLTIND21L:
3338 case R_PARISC_DLTIND14R:
3339 case R_PARISC_DLTIND14F:
3340 value -= elf_gp (input_section->output_section->owner);
3341 break;
3342
c46b7515
AM
3343 case R_PARISC_SEGREL32:
3344 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3345 value -= htab->text_segment_base;
c46b7515 3346 else
83c81bfe 3347 value -= htab->data_segment_base;
c46b7515
AM
3348 break;
3349
30667bf3
AM
3350 default:
3351 break;
3352 }
3353
3354 switch (r_type)
3355 {
3356 case R_PARISC_DIR32:
47d89dba 3357 case R_PARISC_DIR14F:
30667bf3
AM
3358 case R_PARISC_DIR17F:
3359 case R_PARISC_PCREL17C:
3360 case R_PARISC_PCREL14F:
3361 case R_PARISC_DPREL14F:
3362 case R_PARISC_PLABEL32:
3363 case R_PARISC_DLTIND14F:
3364 case R_PARISC_SEGBASE:
3365 case R_PARISC_SEGREL32:
3366 r_field = e_fsel;
3367 break;
3368
3369 case R_PARISC_DIR21L:
3370 case R_PARISC_PCREL21L:
3371 case R_PARISC_DPREL21L:
3372 case R_PARISC_PLABEL21L:
3373 case R_PARISC_DLTIND21L:
3374 r_field = e_lrsel;
3375 break;
3376
3377 case R_PARISC_DIR17R:
3378 case R_PARISC_PCREL17R:
3379 case R_PARISC_DIR14R:
3380 case R_PARISC_PCREL14R:
3381 case R_PARISC_DPREL14R:
3382 case R_PARISC_PLABEL14R:
3383 case R_PARISC_DLTIND14R:
3384 r_field = e_rrsel;
3385 break;
3386
3387 case R_PARISC_PCREL12F:
3388 case R_PARISC_PCREL17F:
3389 case R_PARISC_PCREL22F:
3390 r_field = e_fsel;
3391
3392 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3393 {
3394 max_branch_offset = (1 << (17-1)) << 2;
3395 }
3396 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3397 {
3398 max_branch_offset = (1 << (12-1)) << 2;
3399 }
3400 else
3401 {
3402 max_branch_offset = (1 << (22-1)) << 2;
3403 }
3404
3405 /* sym_sec is NULL on undefined weak syms or when shared on
3406 undefined syms. We've already checked for a stub for the
3407 shared undefined case. */
3408 if (sym_sec == NULL)
3409 break;
3410
3411 /* If the branch is out of reach, then redirect the
3412 call to the local stub for this function. */
3413 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3414 {
3415 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3416 h, rel, htab);
30667bf3
AM
3417 if (stub_entry == NULL)
3418 return bfd_reloc_notsupported;
3419
3420 /* Munge up the value and addend so that we call the stub
3421 rather than the procedure directly. */
3422 value = (stub_entry->stub_offset
3423 + stub_entry->stub_sec->output_offset
3424 + stub_entry->stub_sec->output_section->vma
3425 - location);
3426 addend = -8;
3427 }
3428 break;
3429
3430 /* Something we don't know how to handle. */
3431 default:
3432 return bfd_reloc_notsupported;
3433 }
3434
3435 /* Make sure we can reach the stub. */
3436 if (max_branch_offset != 0
3437 && value + addend + max_branch_offset >= 2*max_branch_offset)
3438 {
3439 (*_bfd_error_handler)
3440 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3441 bfd_archive_filename (input_bfd),
30667bf3
AM
3442 input_section->name,
3443 (long) rel->r_offset,
3444 stub_entry->root.string);
3445 return bfd_reloc_notsupported;
3446 }
3447
3448 val = hppa_field_adjust (value, addend, r_field);
3449
3450 switch (r_type)
3451 {
3452 case R_PARISC_PCREL12F:
3453 case R_PARISC_PCREL17C:
3454 case R_PARISC_PCREL17F:
3455 case R_PARISC_PCREL17R:
3456 case R_PARISC_PCREL22F:
3457 case R_PARISC_DIR17F:
3458 case R_PARISC_DIR17R:
3459 /* This is a branch. Divide the offset by four.
3460 Note that we need to decide whether it's a branch or
3461 otherwise by inspecting the reloc. Inspecting insn won't
3462 work as insn might be from a .word directive. */
3463 val >>= 2;
3464 break;
3465
3466 default:
3467 break;
3468 }
3469
3470 insn = hppa_rebuild_insn (insn, val, r_format);
3471
3472 /* Update the instruction word. */
74d1c347 3473 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3474 return bfd_reloc_ok;
3475}
3476
30667bf3
AM
3477/* Relocate an HPPA ELF section. */
3478
3479static boolean
3480elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3481 contents, relocs, local_syms, local_sections)
3482 bfd *output_bfd;
3483 struct bfd_link_info *info;
3484 bfd *input_bfd;
3485 asection *input_section;
3486 bfd_byte *contents;
3487 Elf_Internal_Rela *relocs;
3488 Elf_Internal_Sym *local_syms;
3489 asection **local_sections;
3490{
3491 bfd *dynobj;
3492 bfd_vma *local_got_offsets;
83c81bfe 3493 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3494 Elf_Internal_Shdr *symtab_hdr;
3495 Elf_Internal_Rela *rel;
3496 Elf_Internal_Rela *relend;
30667bf3
AM
3497
3498 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3499
83c81bfe 3500 htab = hppa_link_hash_table (info);
ebe50bae 3501 dynobj = htab->elf.dynobj;
74d1c347 3502 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3503
3504 rel = relocs;
3505 relend = relocs + input_section->reloc_count;
3506 for (; rel < relend; rel++)
3507 {
3508 unsigned int r_type;
3509 reloc_howto_type *howto;
3510 unsigned int r_symndx;
3511 struct elf32_hppa_link_hash_entry *h;
3512 Elf_Internal_Sym *sym;
3513 asection *sym_sec;
3514 bfd_vma relocation;
3515 bfd_reloc_status_type r;
3516 const char *sym_name;
74d1c347 3517 boolean plabel;
68fb2e56 3518 bfd_vma off;
30667bf3
AM
3519
3520 r_type = ELF32_R_TYPE (rel->r_info);
3521 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3522 {
3523 bfd_set_error (bfd_error_bad_value);
3524 return false;
3525 }
3526 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3527 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3528 continue;
3529
3530 r_symndx = ELF32_R_SYM (rel->r_info);
3531
3532 if (info->relocateable)
3533 {
3534 /* This is a relocateable link. We don't have to change
3535 anything, unless the reloc is against a section symbol,
3536 in which case we have to adjust according to where the
3537 section symbol winds up in the output section. */
3538 if (r_symndx < symtab_hdr->sh_info)
3539 {
3540 sym = local_syms + r_symndx;
3541 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3542 {
3543 sym_sec = local_sections[r_symndx];
3544 rel->r_addend += sym_sec->output_offset;
3545 }
3546 }
3547 continue;
3548 }
3549
3550 /* This is a final link. */
3551 h = NULL;
3552 sym = NULL;
3553 sym_sec = NULL;
3554 if (r_symndx < symtab_hdr->sh_info)
3555 {
3556 /* This is a local symbol, h defaults to NULL. */
3557 sym = local_syms + r_symndx;
3558 sym_sec = local_sections[r_symndx];
3559 relocation = ((ELF_ST_TYPE (sym->st_info) == STT_SECTION
3560 ? 0 : sym->st_value)
3561 + sym_sec->output_offset
3562 + sym_sec->output_section->vma);
3563 }
3564 else
3565 {
3566 int indx;
3567
3568 /* It's a global; Find its entry in the link hash. */
3569 indx = r_symndx - symtab_hdr->sh_info;
3570 h = ((struct elf32_hppa_link_hash_entry *)
3571 elf_sym_hashes (input_bfd)[indx]);
3572 while (h->elf.root.type == bfd_link_hash_indirect
3573 || h->elf.root.type == bfd_link_hash_warning)
3574 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3575
3576 relocation = 0;
3577 if (h->elf.root.type == bfd_link_hash_defined
3578 || h->elf.root.type == bfd_link_hash_defweak)
3579 {
3580 sym_sec = h->elf.root.u.def.section;
3581 /* If sym_sec->output_section is NULL, then it's a
3582 symbol defined in a shared library. */
3583 if (sym_sec->output_section != NULL)
3584 relocation = (h->elf.root.u.def.value
3585 + sym_sec->output_offset
3586 + sym_sec->output_section->vma);
3587 }
3588 else if (h->elf.root.type == bfd_link_hash_undefweak)
3589 ;
3590 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3591 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3592 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3593 {
671bae9c 3594 if (info->symbolic && !info->allow_shlib_undefined)
30667bf3
AM
3595 if (!((*info->callbacks->undefined_symbol)
3596 (info, h->elf.root.root.string, input_bfd,
3597 input_section, rel->r_offset, false)))
3598 return false;
3599 }
3600 else
3601 {
3602 if (!((*info->callbacks->undefined_symbol)
3603 (info, h->elf.root.root.string, input_bfd,
3604 input_section, rel->r_offset, true)))
3605 return false;
3606 }
3607 }
3608
3609 /* Do any required modifications to the relocation value, and
25f72752
AM
3610 determine what types of dynamic info we need to output, if
3611 any. */
74d1c347 3612 plabel = 0;
30667bf3
AM
3613 switch (r_type)
3614 {
3615 case R_PARISC_DLTIND14F:
3616 case R_PARISC_DLTIND14R:
3617 case R_PARISC_DLTIND21L:
3618 /* Relocation is to the entry for this symbol in the global
3619 offset table. */
3620 if (h != NULL)
3621 {
4dc86686 3622 boolean dyn;
30667bf3
AM
3623
3624 off = h->elf.got.offset;
ebe50bae 3625 dyn = htab->elf.dynamic_sections_created;
4dc86686 3626 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
30667bf3
AM
3627 {
3628 /* This is actually a static link, or it is a
3629 -Bsymbolic link and the symbol is defined
3630 locally, or the symbol was forced to be local
3631 because of a version file. We must initialize
3632 this entry in the global offset table. Since the
3633 offset must always be a multiple of 4, we use the
3634 least significant bit to record whether we have
3635 initialized it already.
3636
3637 When doing a dynamic link, we create a .rela.got
3638 relocation entry to initialize the value. This
3639 is done in the finish_dynamic_symbol routine. */
3640 if ((off & 1) != 0)
3641 off &= ~1;
3642 else
3643 {
3644 bfd_put_32 (output_bfd, relocation,
83c81bfe 3645 htab->sgot->contents + off);
30667bf3
AM
3646 h->elf.got.offset |= 1;
3647 }
3648 }
30667bf3
AM
3649 }
3650 else
3651 {
3652 /* Local symbol case. */
68fb2e56 3653 if (local_got_offsets == NULL)
49e9d0d3 3654 abort ();
30667bf3 3655
68fb2e56
AM
3656 off = local_got_offsets[r_symndx];
3657
30667bf3
AM
3658 /* The offset must always be a multiple of 4. We use
3659 the least significant bit to record whether we have
3660 already generated the necessary reloc. */
3661 if ((off & 1) != 0)
3662 off &= ~1;
3663 else
3664 {
3665 bfd_put_32 (output_bfd, relocation,
83c81bfe 3666 htab->sgot->contents + off);
30667bf3
AM
3667
3668 if (info->shared)
3669 {
8dea1268
AM
3670 /* Output a dynamic relocation for this GOT
3671 entry. In this case it is relative to the
3672 base of the object because the symbol index
3673 is zero. */
30667bf3 3674 Elf_Internal_Rela outrel;
83c81bfe 3675 asection *srelgot = htab->srelgot;
30667bf3
AM
3676
3677 outrel.r_offset = (off
83c81bfe
AM
3678 + htab->sgot->output_offset
3679 + htab->sgot->output_section->vma);
74d1c347 3680 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
3681 outrel.r_addend = relocation;
3682 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3683 ((Elf32_External_Rela *)
3684 srelgot->contents
3685 + srelgot->reloc_count));
3686 ++srelgot->reloc_count;
3687 }
252b5132 3688
30667bf3
AM
3689 local_got_offsets[r_symndx] |= 1;
3690 }
30667bf3 3691 }
252b5132 3692
68fb2e56
AM
3693 if (off >= (bfd_vma) -2)
3694 abort ();
3695
30667bf3 3696 /* Add the base of the GOT to the relocation value. */
68fb2e56 3697 relocation = (off
83c81bfe
AM
3698 + htab->sgot->output_offset
3699 + htab->sgot->output_section->vma);
30667bf3 3700 break;
252b5132 3701
c46b7515
AM
3702 case R_PARISC_SEGREL32:
3703 /* If this is the first SEGREL relocation, then initialize
3704 the segment base values. */
83c81bfe
AM
3705 if (htab->text_segment_base == (bfd_vma) -1)
3706 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3707 break;
3708
30667bf3
AM
3709 case R_PARISC_PLABEL14R:
3710 case R_PARISC_PLABEL21L:
3711 case R_PARISC_PLABEL32:
ebe50bae 3712 if (htab->elf.dynamic_sections_created)
252b5132 3713 {
74d1c347
AM
3714 /* If we have a global symbol with a PLT slot, then
3715 redirect this relocation to it. */
3716 if (h != NULL)
3717 {
3718 off = h->elf.plt.offset;
4dc86686 3719 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3720 {
3721 /* In a non-shared link, adjust_dynamic_symbols
3722 isn't called for symbols forced local. We
dc810e39 3723 need to write out the plt entry here. */
8dea1268
AM
3724 if ((off & 1) != 0)
3725 off &= ~1;
3726 else
3727 {
3728 bfd_put_32 (output_bfd,
3729 relocation,
83c81bfe 3730 htab->splt->contents + off);
8dea1268 3731 bfd_put_32 (output_bfd,
83c81bfe
AM
3732 elf_gp (htab->splt->output_section->owner),
3733 htab->splt->contents + off + 4);
8dea1268
AM
3734 h->elf.plt.offset |= 1;
3735 }
3736 }
74d1c347
AM
3737 }
3738 else
3739 {
68fb2e56
AM
3740 bfd_vma *local_plt_offsets;
3741
3742 if (local_got_offsets == NULL)
3743 abort ();
74d1c347 3744
68fb2e56
AM
3745 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3746 off = local_plt_offsets[r_symndx];
74d1c347
AM
3747
3748 /* As for the local .got entry case, we use the last
3749 bit to record whether we've already initialised
3750 this local .plt entry. */
3751 if ((off & 1) != 0)
3752 off &= ~1;
3753 else
3754 {
3755 bfd_put_32 (output_bfd,
3756 relocation,
83c81bfe 3757 htab->splt->contents + off);
74d1c347 3758 bfd_put_32 (output_bfd,
83c81bfe
AM
3759 elf_gp (htab->splt->output_section->owner),
3760 htab->splt->contents + off + 4);
74d1c347
AM
3761
3762 if (info->shared)
3763 {
3764 /* Output a dynamic IPLT relocation for this
3765 PLT entry. */
3766 Elf_Internal_Rela outrel;
83c81bfe 3767 asection *srelplt = htab->srelplt;
74d1c347
AM
3768
3769 outrel.r_offset = (off
83c81bfe
AM
3770 + htab->splt->output_offset
3771 + htab->splt->output_section->vma);
74d1c347
AM
3772 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3773 outrel.r_addend = relocation;
3774 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
3775 ((Elf32_External_Rela *)
3776 srelplt->contents
3777 + srelplt->reloc_count));
3778 ++srelplt->reloc_count;
3779 }
3780
68fb2e56 3781 local_plt_offsets[r_symndx] |= 1;
74d1c347
AM
3782 }
3783 }
3784
68fb2e56 3785 if (off >= (bfd_vma) -2)
49e9d0d3 3786 abort ();
74d1c347
AM
3787
3788 /* PLABELs contain function pointers. Relocation is to
3789 the entry for the function in the .plt. The magic +2
3790 offset signals to $$dyncall that the function pointer
3791 is in the .plt and thus has a gp pointer too.
3792 Exception: Undefined PLABELs should have a value of
3793 zero. */
3794 if (h == NULL
3795 || (h->elf.root.type != bfd_link_hash_undefweak
3796 && h->elf.root.type != bfd_link_hash_undefined))
3797 {
3798 relocation = (off
83c81bfe
AM
3799 + htab->splt->output_offset
3800 + htab->splt->output_section->vma
74d1c347
AM
3801 + 2);
3802 }
3803 plabel = 1;
30667bf3
AM
3804 }
3805 /* Fall through and possibly emit a dynamic relocation. */
3806
3807 case R_PARISC_DIR17F:
3808 case R_PARISC_DIR17R:
47d89dba 3809 case R_PARISC_DIR14F:
30667bf3
AM
3810 case R_PARISC_DIR14R:
3811 case R_PARISC_DIR21L:
3812 case R_PARISC_DPREL14F:
3813 case R_PARISC_DPREL14R:
3814 case R_PARISC_DPREL21L:
3815 case R_PARISC_DIR32:
3816 /* The reloc types handled here and this conditional
56882138
AM
3817 expression must match the code in ..check_relocs and
3818 ..discard_relocs. ie. We need exactly the same condition
3819 as in ..check_relocs, with some extra conditions (dynindx
3820 test in this case) to cater for relocs removed by
3821 ..discard_relocs. If you squint, the non-shared test
3822 here does indeed match the one in ..check_relocs, the
3823 difference being that here we test DEF_DYNAMIC as well as
3824 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3825 which is why we can't use just that test here.
3826 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3827 there all files have not been loaded. */
446f2863
AM
3828 if ((info->shared
3829 && (input_section->flags & SEC_ALLOC) != 0
3830 && (IS_ABSOLUTE_RELOC (r_type)
3831 || (h != NULL
3832 && h->elf.dynindx != -1
3833 && (!info->symbolic
3834 || (h->elf.elf_link_hash_flags
3835 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3836 || (!info->shared
3837 && (input_section->flags & SEC_ALLOC) != 0
3838 && h != NULL
3839 && h->elf.dynindx != -1
3840 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3841 && (((h->elf.elf_link_hash_flags
3842 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3843 && (h->elf.elf_link_hash_flags
3844 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3845 || h->elf.root.type == bfd_link_hash_undefweak
3846 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3847 {
3848 Elf_Internal_Rela outrel;
3849 boolean skip;
98ceb8ce
AM
3850 asection *sreloc;
3851 Elf32_External_Rela *loc;
252b5132 3852
30667bf3
AM
3853 /* When generating a shared object, these relocations
3854 are copied into the output file to be resolved at run
3855 time. */
252b5132 3856
30667bf3
AM
3857 outrel.r_offset = rel->r_offset;
3858 outrel.r_addend = rel->r_addend;
3859 skip = false;
3860 if (elf_section_data (input_section)->stab_info != NULL)
edd21aca 3861 {
30667bf3 3862 off = (_bfd_stab_section_offset
ebe50bae 3863 (output_bfd, &htab->elf.stab_info,
30667bf3
AM
3864 input_section,
3865 &elf_section_data (input_section)->stab_info,
3866 rel->r_offset));
3867 if (off == (bfd_vma) -1)
3868 skip = true;
3869 outrel.r_offset = off;
edd21aca 3870 }
252b5132 3871
30667bf3
AM
3872 outrel.r_offset += (input_section->output_offset
3873 + input_section->output_section->vma);
3874
3875 if (skip)
252b5132 3876 {
30667bf3 3877 memset (&outrel, 0, sizeof (outrel));
252b5132 3878 }
74d1c347
AM
3879 else if (h != NULL
3880 && h->elf.dynindx != -1
3881 && (plabel
446f2863
AM
3882 || !IS_ABSOLUTE_RELOC (r_type)
3883 || !info->shared
74d1c347 3884 || !info->symbolic
30667bf3
AM
3885 || (h->elf.elf_link_hash_flags
3886 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3887 {
30667bf3
AM
3888 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3889 }
3890 else /* It's a local symbol, or one marked to become local. */
3891 {
3892 int indx = 0;
edd21aca 3893
30667bf3
AM
3894 /* Add the absolute offset of the symbol. */
3895 outrel.r_addend += relocation;
edd21aca 3896
74d1c347
AM
3897 /* Global plabels need to be processed by the
3898 dynamic linker so that functions have at most one
3899 fptr. For this reason, we need to differentiate
3900 between global and local plabels, which we do by
3901 providing the function symbol for a global plabel
3902 reloc, and no symbol for local plabels. */
3903 if (! plabel
3904 && sym_sec != NULL
30667bf3
AM
3905 && sym_sec->output_section != NULL
3906 && ! bfd_is_abs_section (sym_sec))
252b5132 3907 {
30667bf3
AM
3908 indx = elf_section_data (sym_sec->output_section)->dynindx;
3909 /* We are turning this relocation into one
3910 against a section symbol, so subtract out the
3911 output section's address but not the offset
3912 of the input section in the output section. */
3913 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 3914 }
252b5132 3915
30667bf3
AM
3916 outrel.r_info = ELF32_R_INFO (indx, r_type);
3917 }
68fb2e56
AM
3918#if 0
3919 /* EH info can cause unaligned DIR32 relocs.
3920 Tweak the reloc type for the dynamic linker. */
3921 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
3922 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
3923 R_PARISC_DIR32U);
3924#endif
98ceb8ce
AM
3925 sreloc = elf_section_data (input_section)->sreloc;
3926 if (sreloc == NULL)
3927 abort ();
3928
3929 loc = ((Elf32_External_Rela *) sreloc->contents
3930 + sreloc->reloc_count);
3931 sreloc->reloc_count += 1;
3932 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3933 }
3934 break;
edd21aca 3935
30667bf3
AM
3936 default:
3937 break;
3938 }
252b5132 3939
30667bf3 3940 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 3941 htab, sym_sec, h);
252b5132 3942
30667bf3
AM
3943 if (r == bfd_reloc_ok)
3944 continue;
252b5132 3945
30667bf3
AM
3946 if (h != NULL)
3947 sym_name = h->elf.root.root.string;
3948 else
3949 {
3950 sym_name = bfd_elf_string_from_elf_section (input_bfd,
3951 symtab_hdr->sh_link,
3952 sym->st_name);
3953 if (sym_name == NULL)
3954 return false;
3955 if (*sym_name == '\0')
3956 sym_name = bfd_section_name (input_bfd, sym_sec);
3957 }
edd21aca 3958
30667bf3 3959 howto = elf_hppa_howto_table + r_type;
252b5132 3960
30667bf3
AM
3961 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
3962 {
3963 (*_bfd_error_handler)
3964 (_("%s(%s+0x%lx): cannot handle %s for %s"),
8f615d07 3965 bfd_archive_filename (input_bfd),
30667bf3
AM
3966 input_section->name,
3967 (long) rel->r_offset,
3968 howto->name,
3969 sym_name);
8f615d07
AM
3970 bfd_set_error (bfd_error_bad_value);
3971 return false;
30667bf3
AM
3972 }
3973 else
3974 {
3975 if (!((*info->callbacks->reloc_overflow)
3976 (info, sym_name, howto->name, (bfd_vma) 0,
3977 input_bfd, input_section, rel->r_offset)))
3978 return false;
3979 }
3980 }
edd21aca 3981
30667bf3
AM
3982 return true;
3983}
252b5132 3984
c46b7515
AM
3985/* Comparison function for qsort to sort unwind section during a
3986 final link. */
3987
3988static int
3989hppa_unwind_entry_compare (a, b)
3990 const PTR a;
3991 const PTR b;
3992{
3993 const bfd_byte *ap, *bp;
3994 unsigned long av, bv;
3995
3996 ap = (const bfd_byte *) a;
3997 av = (unsigned long) ap[0] << 24;
3998 av |= (unsigned long) ap[1] << 16;
3999 av |= (unsigned long) ap[2] << 8;
4000 av |= (unsigned long) ap[3];
4001
4002 bp = (const bfd_byte *) b;
4003 bv = (unsigned long) bp[0] << 24;
4004 bv |= (unsigned long) bp[1] << 16;
4005 bv |= (unsigned long) bp[2] << 8;
4006 bv |= (unsigned long) bp[3];
4007
4008 return av < bv ? -1 : av > bv ? 1 : 0;
4009}
4010
30667bf3
AM
4011/* Finish up dynamic symbol handling. We set the contents of various
4012 dynamic sections here. */
252b5132 4013
30667bf3
AM
4014static boolean
4015elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4016 bfd *output_bfd;
4017 struct bfd_link_info *info;
4018 struct elf_link_hash_entry *h;
4019 Elf_Internal_Sym *sym;
4020{
83c81bfe 4021 struct elf32_hppa_link_hash_table *htab;
30667bf3 4022 bfd *dynobj;
edd21aca 4023
83c81bfe 4024 htab = hppa_link_hash_table (info);
ebe50bae 4025 dynobj = htab->elf.dynobj;
30667bf3 4026
30667bf3
AM
4027 if (h->plt.offset != (bfd_vma) -1)
4028 {
4029 bfd_vma value;
30667bf3 4030
8dea1268
AM
4031 if (h->plt.offset & 1)
4032 abort ();
4033
30667bf3
AM
4034 /* This symbol has an entry in the procedure linkage table. Set
4035 it up.
4036
4037 The format of a plt entry is
74d1c347
AM
4038 <funcaddr>
4039 <__gp>
47d89dba 4040 */
30667bf3
AM
4041 value = 0;
4042 if (h->root.type == bfd_link_hash_defined
4043 || h->root.type == bfd_link_hash_defweak)
4044 {
4045 value = h->root.u.def.value;
4046 if (h->root.u.def.section->output_section != NULL)
4047 value += (h->root.u.def.section->output_offset
4048 + h->root.u.def.section->output_section->vma);
252b5132 4049 }
edd21aca 4050
74d1c347 4051 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4052 {
47d89dba
AM
4053 Elf_Internal_Rela rel;
4054
30667bf3
AM
4055 /* Create a dynamic IPLT relocation for this entry. */
4056 rel.r_offset = (h->plt.offset
83c81bfe
AM
4057 + htab->splt->output_offset
4058 + htab->splt->output_section->vma);
74d1c347
AM
4059 if (! ((struct elf32_hppa_link_hash_entry *) h)->plt_abs
4060 && h->dynindx != -1)
4061 {
47d89dba
AM
4062 /* To support lazy linking, the function pointer is
4063 initialised to point to a special stub stored at the
8dea1268
AM
4064 end of the .plt. This is not done for plt entries
4065 with a base-relative dynamic relocation. */
83c81bfe
AM
4066 value = (htab->splt->output_offset
4067 + htab->splt->output_section->vma
4068 + htab->splt->_raw_size
47d89dba
AM
4069 - sizeof (plt_stub)
4070 + PLT_STUB_ENTRY);
74d1c347
AM
4071 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4072 rel.r_addend = 0;
4073 }
4074 else
4075 {
4076 /* This symbol has been marked to become local, and is
4077 used by a plabel so must be kept in the .plt. */
4078 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4079 rel.r_addend = value;
4080 }
30667bf3 4081
83c81bfe 4082 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
30667bf3
AM
4083 &rel,
4084 ((Elf32_External_Rela *)
83c81bfe
AM
4085 htab->srelplt->contents
4086 + htab->srelplt->reloc_count));
4087 htab->srelplt->reloc_count++;
30667bf3
AM
4088 }
4089
83c81bfe 4090 bfd_put_32 (htab->splt->owner,
47d89dba 4091 value,
83c81bfe
AM
4092 htab->splt->contents + h->plt.offset);
4093 bfd_put_32 (htab->splt->owner,
4094 elf_gp (htab->splt->output_section->owner),
4095 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4096 if (PLABEL_PLT_ENTRY_SIZE != PLT_ENTRY_SIZE
4097 && ((struct elf32_hppa_link_hash_entry *) h)->plabel
4098 && h->dynindx != -1)
4099 {
83c81bfe 4100 memset (htab->splt->contents + h->plt.offset + 8,
47d89dba
AM
4101 0, PLABEL_PLT_ENTRY_SIZE - PLT_ENTRY_SIZE);
4102 }
4103
30667bf3
AM
4104 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4105 {
4106 /* Mark the symbol as undefined, rather than as defined in
4107 the .plt section. Leave the value alone. */
4108 sym->st_shndx = SHN_UNDEF;
4109 }
4110 }
edd21aca 4111
30667bf3
AM
4112 if (h->got.offset != (bfd_vma) -1)
4113 {
4114 Elf_Internal_Rela rel;
4115
4116 /* This symbol has an entry in the global offset table. Set it
4117 up. */
4118
4119 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4120 + htab->sgot->output_offset
4121 + htab->sgot->output_section->vma);
30667bf3 4122
4dc86686
AM
4123 /* If this is a -Bsymbolic link and the symbol is defined
4124 locally or was forced to be local because of a version file,
4125 we just want to emit a RELATIVE reloc. The entry in the
4126 global offset table will already have been initialized in the
4127 relocate_section function. */
4128 if (info->shared
4129 && (info->symbolic || h->dynindx == -1)
4130 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4131 {
74d1c347 4132 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4133 rel.r_addend = (h->root.u.def.value
4134 + h->root.u.def.section->output_offset
4135 + h->root.u.def.section->output_section->vma);
4136 }
4137 else
4138 {
49e9d0d3
AM
4139 if ((h->got.offset & 1) != 0)
4140 abort ();
30667bf3 4141 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4142 htab->sgot->contents + h->got.offset);
30667bf3
AM
4143 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4144 rel.r_addend = 0;
4145 }
edd21aca 4146
30667bf3
AM
4147 bfd_elf32_swap_reloca_out (output_bfd, &rel,
4148 ((Elf32_External_Rela *)
83c81bfe
AM
4149 htab->srelgot->contents
4150 + htab->srelgot->reloc_count));
4151 ++htab->srelgot->reloc_count;
30667bf3 4152 }
edd21aca 4153
30667bf3
AM
4154 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4155 {
4156 asection *s;
4157 Elf_Internal_Rela rel;
4158
4159 /* This symbol needs a copy reloc. Set it up. */
4160
49e9d0d3
AM
4161 if (! (h->dynindx != -1
4162 && (h->root.type == bfd_link_hash_defined
4163 || h->root.type == bfd_link_hash_defweak)))
4164 abort ();
30667bf3 4165
83c81bfe 4166 s = htab->srelbss;
30667bf3
AM
4167
4168 rel.r_offset = (h->root.u.def.value
4169 + h->root.u.def.section->output_offset
4170 + h->root.u.def.section->output_section->vma);
4171 rel.r_addend = 0;
4172 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
4173 bfd_elf32_swap_reloca_out (output_bfd, &rel,
4174 ((Elf32_External_Rela *) s->contents
4175 + s->reloc_count));
4176 ++s->reloc_count;
4177 }
4178
4179 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4180 if (h->root.root.string[0] == '_'
4181 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4182 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4183 {
4184 sym->st_shndx = SHN_ABS;
4185 }
4186
4187 return true;
4188}
4189
98ceb8ce
AM
4190/* Used to decide how to sort relocs in an optimal manner for the
4191 dynamic linker, before writing them out. */
4192
4193static enum elf_reloc_type_class
4194elf32_hppa_reloc_type_class (rela)
4195 const Elf_Internal_Rela *rela;
4196{
4197 if (ELF32_R_SYM (rela->r_info) == 0)
4198 return reloc_class_relative;
4199
4200 switch ((int) ELF32_R_TYPE (rela->r_info))
4201 {
4202 case R_PARISC_IPLT:
4203 return reloc_class_plt;
4204 case R_PARISC_COPY:
4205 return reloc_class_copy;
4206 default:
4207 return reloc_class_normal;
4208 }
4209}
4210
30667bf3
AM
4211/* Finish up the dynamic sections. */
4212
4213static boolean
4214elf32_hppa_finish_dynamic_sections (output_bfd, info)
4215 bfd *output_bfd;
4216 struct bfd_link_info *info;
4217{
4218 bfd *dynobj;
83c81bfe 4219 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4220 asection *sdyn;
4221
83c81bfe 4222 htab = hppa_link_hash_table (info);
ebe50bae 4223 dynobj = htab->elf.dynobj;
30667bf3
AM
4224
4225 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4226
ebe50bae 4227 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4228 {
4229 Elf32_External_Dyn *dyncon, *dynconend;
4230
49e9d0d3
AM
4231 if (sdyn == NULL)
4232 abort ();
30667bf3
AM
4233
4234 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4235 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4236 for (; dyncon < dynconend; dyncon++)
edd21aca 4237 {
30667bf3
AM
4238 Elf_Internal_Dyn dyn;
4239 asection *s;
4240
4241 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4242
4243 switch (dyn.d_tag)
4244 {
4245 default:
4246 break;
4247
4248 case DT_PLTGOT:
4249 /* Use PLTGOT to set the GOT register. */
4250 dyn.d_un.d_ptr = elf_gp (output_bfd);
4251 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4252 break;
4253
4254 case DT_JMPREL:
83c81bfe 4255 s = htab->srelplt;
30667bf3
AM
4256 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4257 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4258 break;
4259
4260 case DT_PLTRELSZ:
83c81bfe 4261 s = htab->srelplt;
30667bf3
AM
4262 if (s->_cooked_size != 0)
4263 dyn.d_un.d_val = s->_cooked_size;
4264 else
4265 dyn.d_un.d_val = s->_raw_size;
4266 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4267 break;
4268 }
edd21aca 4269 }
252b5132 4270 }
edd21aca 4271
83c81bfe 4272 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4273 {
74d1c347
AM
4274 /* Fill in the first entry in the global offset table.
4275 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4276 bfd_put_32 (output_bfd,
4277 (sdyn != NULL
4278 ? sdyn->output_section->vma + sdyn->output_offset
4279 : (bfd_vma) 0),
83c81bfe 4280 htab->sgot->contents);
30667bf3 4281
74d1c347 4282 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4283 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4284
30667bf3 4285 /* Set .got entry size. */
83c81bfe 4286 elf_section_data (htab->sgot->output_section)
74d1c347 4287 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4288 }
4289
83c81bfe 4290 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4291 {
4292 /* Set plt entry size. */
83c81bfe 4293 elf_section_data (htab->splt->output_section)
47d89dba
AM
4294 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4295
83c81bfe 4296 if (htab->need_plt_stub)
47d89dba
AM
4297 {
4298 /* Set up the .plt stub. */
83c81bfe
AM
4299 memcpy (htab->splt->contents
4300 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4301 plt_stub, sizeof (plt_stub));
4302
83c81bfe
AM
4303 if ((htab->splt->output_offset
4304 + htab->splt->output_section->vma
4305 + htab->splt->_raw_size)
4306 != (htab->sgot->output_offset
4307 + htab->sgot->output_section->vma))
47d89dba
AM
4308 {
4309 (*_bfd_error_handler)
4310 (_(".got section not immediately after .plt section"));
4311 return false;
4312 }
4313 }
4314 }
30667bf3 4315
252b5132 4316 return true;
30667bf3 4317}
252b5132 4318
d952f17a
AM
4319/* Tweak the OSABI field of the elf header. */
4320
4321static void
4322elf32_hppa_post_process_headers (abfd, link_info)
4323 bfd *abfd;
4324 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4325{
4326 Elf_Internal_Ehdr * i_ehdrp;
4327
4328 i_ehdrp = elf_elfheader (abfd);
4329
4330 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4331 {
4332 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4333 }
4334 else
4335 {
4336 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4337 }
4338}
4339
30667bf3
AM
4340/* Called when writing out an object file to decide the type of a
4341 symbol. */
4342static int
4343elf32_hppa_elf_get_symbol_type (elf_sym, type)
4344 Elf_Internal_Sym *elf_sym;
4345 int type;
4346{
4347 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4348 return STT_PARISC_MILLI;
4349 else
4350 return type;
252b5132
RH
4351}
4352
4353/* Misc BFD support code. */
30667bf3
AM
4354#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4355#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4356#define elf_info_to_howto elf_hppa_info_to_howto
4357#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4358
252b5132 4359/* Stuff for the BFD linker. */
c46b7515 4360#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3
AM
4361#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4362#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4363#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4364#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4365#define elf_backend_check_relocs elf32_hppa_check_relocs
4366#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4367#define elf_backend_fake_sections elf_hppa_fake_sections
4368#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4369#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4370#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4371#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4372#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4373#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4374#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4375#define elf_backend_object_p elf32_hppa_object_p
4376#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4377#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4378#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4379#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4380
4381#define elf_backend_can_gc_sections 1
4382#define elf_backend_plt_alignment 2
4383#define elf_backend_want_got_plt 0
4384#define elf_backend_plt_readonly 0
4385#define elf_backend_want_plt_sym 0
74d1c347 4386#define elf_backend_got_header_size 8
252b5132
RH
4387
4388#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4389#define TARGET_BIG_NAME "elf32-hppa"
4390#define ELF_ARCH bfd_arch_hppa
4391#define ELF_MACHINE_CODE EM_PARISC
4392#define ELF_MAXPAGESIZE 0x1000
4393
4394#include "elf32-target.h"
d952f17a
AM
4395
4396#undef TARGET_BIG_SYM
4397#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4398#undef TARGET_BIG_NAME
4399#define TARGET_BIG_NAME "elf32-hppa-linux"
4400
4401#define INCLUDED_TARGET_FILE 1
4402#include "elf32-target.h"