2004-08-07 Andrew Cagney <cagney@gnu.org>
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
e5094212 2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
b2a8e766 3 2002, 2003, 2004 Free Software Foundation, Inc.
252b5132 4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132 10
ae9a127f 11 This file is part of BFD, the Binary File Descriptor library.
252b5132 12
ae9a127f
NC
13 This program is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2 of the License, or
16 (at your option) any later version.
252b5132 17
ae9a127f
NC
18 This program is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
252b5132 22
ae9a127f
NC
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
edd21aca 35#include "elf32-hppa.h"
189c6563 36#include "elf-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
46fe4e66 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
46fe4e66 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
ae9a127f 114 : be,n 0(%sr0,%rp) ; inter-space return. */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
4fc8051d
AM
144/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
145 copying dynamic variables from a shared lib into an app's dynbss
146 section, and instead use a dynamic relocation to point into the
147 shared lib. */
148#define ELIMINATE_COPY_RELOCS 1
149
30667bf3
AM
150enum elf32_hppa_stub_type {
151 hppa_stub_long_branch,
152 hppa_stub_long_branch_shared,
153 hppa_stub_import,
154 hppa_stub_import_shared,
155 hppa_stub_export,
156 hppa_stub_none
157};
158
30667bf3 159struct elf32_hppa_stub_hash_entry {
252b5132 160
edd21aca 161 /* Base hash table entry structure. */
252b5132
RH
162 struct bfd_hash_entry root;
163
edd21aca
AM
164 /* The stub section. */
165 asection *stub_sec;
166
167 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 168 bfd_vma stub_offset;
252b5132
RH
169
170 /* Given the symbol's value and its section we can determine its final
171 value when building the stubs (so the stub knows where to jump. */
30667bf3 172 bfd_vma target_value;
252b5132 173 asection *target_section;
30667bf3
AM
174
175 enum elf32_hppa_stub_type stub_type;
176
177 /* The symbol table entry, if any, that this was derived from. */
178 struct elf32_hppa_link_hash_entry *h;
179
25f72752
AM
180 /* Where this stub is being called from, or, in the case of combined
181 stub sections, the first input section in the group. */
182 asection *id_sec;
252b5132
RH
183};
184
30667bf3
AM
185struct elf32_hppa_link_hash_entry {
186
187 struct elf_link_hash_entry elf;
188
189 /* A pointer to the most recently used stub hash entry against this
190 symbol. */
191 struct elf32_hppa_stub_hash_entry *stub_cache;
192
30667bf3
AM
193 /* Used to count relocations for delayed sizing of relocation
194 sections. */
195 struct elf32_hppa_dyn_reloc_entry {
196
197 /* Next relocation in the chain. */
198 struct elf32_hppa_dyn_reloc_entry *next;
199
98ceb8ce
AM
200 /* The input section of the reloc. */
201 asection *sec;
30667bf3
AM
202
203 /* Number of relocs copied in this section. */
204 bfd_size_type count;
98ceb8ce
AM
205
206#if RELATIVE_DYNRELOCS
207 /* Number of relative relocs copied for the input section. */
208 bfd_size_type relative_count;
209#endif
210 } *dyn_relocs;
30667bf3 211
74d1c347
AM
212 /* Set if this symbol is used by a plabel reloc. */
213 unsigned int plabel:1;
30667bf3
AM
214};
215
30667bf3
AM
216struct elf32_hppa_link_hash_table {
217
252b5132 218 /* The main hash table. */
ebe50bae 219 struct elf_link_hash_table elf;
252b5132
RH
220
221 /* The stub hash table. */
edd21aca 222 struct bfd_hash_table stub_hash_table;
252b5132 223
30667bf3
AM
224 /* Linker stub bfd. */
225 bfd *stub_bfd;
226
30667bf3 227 /* Linker call-backs. */
c39a58e6
AM
228 asection * (*add_stub_section) (const char *, asection *);
229 void (*layout_sections_again) (void);
30667bf3 230
25f72752
AM
231 /* Array to keep track of which stub sections have been created, and
232 information on stub grouping. */
233 struct map_stub {
234 /* This is the section to which stubs in the group will be
235 attached. */
236 asection *link_sec;
237 /* The stub section. */
238 asection *stub_sec;
25f72752 239 } *stub_group;
30667bf3 240
b4655ea9
AM
241 /* Assorted information used by elf32_hppa_size_stubs. */
242 unsigned int bfd_count;
243 int top_index;
244 asection **input_list;
245 Elf_Internal_Sym **all_local_syms;
246
30667bf3
AM
247 /* Short-cuts to get to dynamic linker sections. */
248 asection *sgot;
249 asection *srelgot;
250 asection *splt;
251 asection *srelplt;
252 asection *sdynbss;
253 asection *srelbss;
47d89dba 254
c46b7515
AM
255 /* Used during a final link to store the base of the text and data
256 segments so that we can perform SEGREL relocations. */
257 bfd_vma text_segment_base;
258 bfd_vma data_segment_base;
259
47d89dba
AM
260 /* Whether we support multiple sub-spaces for shared libs. */
261 unsigned int multi_subspace:1;
262
067fa4a6 263 /* Flags set when various size branches are detected. Used to
47d89dba
AM
264 select suitable defaults for the stub group size. */
265 unsigned int has_12bit_branch:1;
266 unsigned int has_17bit_branch:1;
067fa4a6 267 unsigned int has_22bit_branch:1;
47d89dba
AM
268
269 /* Set if we need a .plt stub to support lazy dynamic linking. */
270 unsigned int need_plt_stub:1;
ec338859
AM
271
272 /* Small local sym to section mapping cache. */
273 struct sym_sec_cache sym_sec;
252b5132
RH
274};
275
30667bf3
AM
276/* Various hash macros and functions. */
277#define hppa_link_hash_table(p) \
edd21aca 278 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 279
30667bf3
AM
280#define hppa_stub_hash_lookup(table, string, create, copy) \
281 ((struct elf32_hppa_stub_hash_entry *) \
282 bfd_hash_lookup ((table), (string), (create), (copy)))
283
252b5132
RH
284/* Assorted hash table functions. */
285
286/* Initialize an entry in the stub hash table. */
287
288static struct bfd_hash_entry *
c39a58e6
AM
289stub_hash_newfunc (struct bfd_hash_entry *entry,
290 struct bfd_hash_table *table,
291 const char *string)
252b5132 292{
252b5132
RH
293 /* Allocate the structure if it has not already been allocated by a
294 subclass. */
ebe50bae 295 if (entry == NULL)
30667bf3 296 {
ebe50bae
AM
297 entry = bfd_hash_allocate (table,
298 sizeof (struct elf32_hppa_stub_hash_entry));
299 if (entry == NULL)
300 return entry;
30667bf3 301 }
252b5132
RH
302
303 /* Call the allocation method of the superclass. */
ebe50bae
AM
304 entry = bfd_hash_newfunc (entry, table, string);
305 if (entry != NULL)
252b5132 306 {
ebe50bae
AM
307 struct elf32_hppa_stub_hash_entry *eh;
308
252b5132 309 /* Initialize the local fields. */
ebe50bae
AM
310 eh = (struct elf32_hppa_stub_hash_entry *) entry;
311 eh->stub_sec = NULL;
312 eh->stub_offset = 0;
313 eh->target_value = 0;
314 eh->target_section = NULL;
315 eh->stub_type = hppa_stub_long_branch;
316 eh->h = NULL;
317 eh->id_sec = NULL;
30667bf3
AM
318 }
319
ebe50bae 320 return entry;
30667bf3
AM
321}
322
30667bf3
AM
323/* Initialize an entry in the link hash table. */
324
325static struct bfd_hash_entry *
c39a58e6
AM
326hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
327 struct bfd_hash_table *table,
328 const char *string)
30667bf3 329{
30667bf3
AM
330 /* Allocate the structure if it has not already been allocated by a
331 subclass. */
ebe50bae 332 if (entry == NULL)
30667bf3 333 {
ebe50bae
AM
334 entry = bfd_hash_allocate (table,
335 sizeof (struct elf32_hppa_link_hash_entry));
336 if (entry == NULL)
337 return entry;
30667bf3
AM
338 }
339
340 /* Call the allocation method of the superclass. */
ebe50bae
AM
341 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
342 if (entry != NULL)
30667bf3 343 {
ebe50bae
AM
344 struct elf32_hppa_link_hash_entry *eh;
345
30667bf3 346 /* Initialize the local fields. */
ebe50bae
AM
347 eh = (struct elf32_hppa_link_hash_entry *) entry;
348 eh->stub_cache = NULL;
349 eh->dyn_relocs = NULL;
ebe50bae 350 eh->plabel = 0;
252b5132
RH
351 }
352
ebe50bae 353 return entry;
252b5132
RH
354}
355
252b5132
RH
356/* Create the derived linker hash table. The PA ELF port uses the derived
357 hash table to keep information specific to the PA ELF linker (without
358 using static variables). */
359
360static struct bfd_link_hash_table *
c39a58e6 361elf32_hppa_link_hash_table_create (bfd *abfd)
252b5132
RH
362{
363 struct elf32_hppa_link_hash_table *ret;
dc810e39 364 bfd_size_type amt = sizeof (*ret);
252b5132 365
c39a58e6 366 ret = bfd_malloc (amt);
252b5132
RH
367 if (ret == NULL)
368 return NULL;
edd21aca 369
ebe50bae 370 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132 371 {
e2d34d7d 372 free (ret);
252b5132
RH
373 return NULL;
374 }
edd21aca
AM
375
376 /* Init the stub hash table too. */
30667bf3 377 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
378 return NULL;
379
30667bf3 380 ret->stub_bfd = NULL;
30667bf3
AM
381 ret->add_stub_section = NULL;
382 ret->layout_sections_again = NULL;
25f72752 383 ret->stub_group = NULL;
30667bf3
AM
384 ret->sgot = NULL;
385 ret->srelgot = NULL;
386 ret->splt = NULL;
387 ret->srelplt = NULL;
388 ret->sdynbss = NULL;
389 ret->srelbss = NULL;
c46b7515
AM
390 ret->text_segment_base = (bfd_vma) -1;
391 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
392 ret->multi_subspace = 0;
393 ret->has_12bit_branch = 0;
394 ret->has_17bit_branch = 0;
067fa4a6 395 ret->has_22bit_branch = 0;
47d89dba 396 ret->need_plt_stub = 0;
ec338859 397 ret->sym_sec.abfd = NULL;
252b5132 398
ebe50bae 399 return &ret->elf.root;
252b5132
RH
400}
401
e2d34d7d
DJ
402/* Free the derived linker hash table. */
403
404static void
c39a58e6 405elf32_hppa_link_hash_table_free (struct bfd_link_hash_table *hash)
e2d34d7d
DJ
406{
407 struct elf32_hppa_link_hash_table *ret
408 = (struct elf32_hppa_link_hash_table *) hash;
409
410 bfd_hash_table_free (&ret->stub_hash_table);
411 _bfd_generic_link_hash_table_free (hash);
412}
413
30667bf3
AM
414/* Build a name for an entry in the stub hash table. */
415
edd21aca 416static char *
c39a58e6
AM
417hppa_stub_name (const asection *input_section,
418 const asection *sym_sec,
419 const struct elf32_hppa_link_hash_entry *hash,
420 const Elf_Internal_Rela *rel)
edd21aca
AM
421{
422 char *stub_name;
dc810e39 423 bfd_size_type len;
edd21aca 424
30667bf3
AM
425 if (hash)
426 {
427 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
428 stub_name = bfd_malloc (len);
429 if (stub_name != NULL)
430 {
431 sprintf (stub_name, "%08x_%s+%x",
432 input_section->id & 0xffffffff,
433 hash->elf.root.root.string,
434 (int) rel->r_addend & 0xffffffff);
435 }
436 }
437 else
edd21aca 438 {
30667bf3
AM
439 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
440 stub_name = bfd_malloc (len);
441 if (stub_name != NULL)
442 {
443 sprintf (stub_name, "%08x_%x:%x+%x",
444 input_section->id & 0xffffffff,
445 sym_sec->id & 0xffffffff,
446 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
447 (int) rel->r_addend & 0xffffffff);
448 }
edd21aca
AM
449 }
450 return stub_name;
451}
252b5132 452
30667bf3
AM
453/* Look up an entry in the stub hash. Stub entries are cached because
454 creating the stub name takes a bit of time. */
455
456static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
457hppa_get_stub_entry (const asection *input_section,
458 const asection *sym_sec,
459 struct elf32_hppa_link_hash_entry *hash,
460 const Elf_Internal_Rela *rel,
461 struct elf32_hppa_link_hash_table *htab)
252b5132 462{
30667bf3 463 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
464 const asection *id_sec;
465
466 /* If this input section is part of a group of sections sharing one
467 stub section, then use the id of the first section in the group.
468 Stub names need to include a section id, as there may well be
469 more than one stub used to reach say, printf, and we need to
470 distinguish between them. */
83c81bfe 471 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 472
30667bf3
AM
473 if (hash != NULL && hash->stub_cache != NULL
474 && hash->stub_cache->h == hash
25f72752 475 && hash->stub_cache->id_sec == id_sec)
edd21aca 476 {
30667bf3
AM
477 stub_entry = hash->stub_cache;
478 }
479 else
480 {
30667bf3 481 char *stub_name;
edd21aca 482
25f72752 483 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
484 if (stub_name == NULL)
485 return NULL;
edd21aca 486
83c81bfe 487 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 488 stub_name, FALSE, FALSE);
f09ebc7d
AM
489 if (hash != NULL)
490 hash->stub_cache = stub_entry;
30667bf3
AM
491
492 free (stub_name);
edd21aca 493 }
30667bf3
AM
494
495 return stub_entry;
496}
497
30667bf3
AM
498/* Add a new stub entry to the stub hash. Not all fields of the new
499 stub entry are initialised. */
500
501static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
502hppa_add_stub (const char *stub_name,
503 asection *section,
504 struct elf32_hppa_link_hash_table *htab)
30667bf3 505{
25f72752 506 asection *link_sec;
30667bf3 507 asection *stub_sec;
30667bf3 508 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 509
83c81bfe
AM
510 link_sec = htab->stub_group[section->id].link_sec;
511 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 512 if (stub_sec == NULL)
edd21aca 513 {
83c81bfe 514 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
515 if (stub_sec == NULL)
516 {
d4c88bbb 517 size_t namelen;
dc810e39 518 bfd_size_type len;
30667bf3
AM
519 char *s_name;
520
d4c88bbb
AM
521 namelen = strlen (link_sec->name);
522 len = namelen + sizeof (STUB_SUFFIX);
83c81bfe 523 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
524 if (s_name == NULL)
525 return NULL;
526
d4c88bbb
AM
527 memcpy (s_name, link_sec->name, namelen);
528 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
83c81bfe 529 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
530 if (stub_sec == NULL)
531 return NULL;
83c81bfe 532 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 533 }
83c81bfe 534 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 535 }
252b5132 536
30667bf3 537 /* Enter this entry into the linker stub hash table. */
83c81bfe 538 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 539 TRUE, FALSE);
30667bf3
AM
540 if (stub_entry == NULL)
541 {
542 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 543 bfd_archive_filename (section->owner),
30667bf3
AM
544 stub_name);
545 return NULL;
edd21aca
AM
546 }
547
30667bf3 548 stub_entry->stub_sec = stub_sec;
30667bf3 549 stub_entry->stub_offset = 0;
25f72752 550 stub_entry->id_sec = link_sec;
30667bf3 551 return stub_entry;
edd21aca
AM
552}
553
30667bf3
AM
554/* Determine the type of stub needed, if any, for a call. */
555
556static enum elf32_hppa_stub_type
c39a58e6
AM
557hppa_type_of_stub (asection *input_sec,
558 const Elf_Internal_Rela *rel,
559 struct elf32_hppa_link_hash_entry *hash,
a252afa4
DA
560 bfd_vma destination,
561 struct bfd_link_info *info)
edd21aca 562{
edd21aca 563 bfd_vma location;
30667bf3
AM
564 bfd_vma branch_offset;
565 bfd_vma max_branch_offset;
566 unsigned int r_type;
567
568 if (hash != NULL
067fa4a6 569 && hash->elf.plt.offset != (bfd_vma) -1
a252afa4
DA
570 && hash->elf.dynindx != -1
571 && !hash->plabel
572 && (info->shared
573 || !(hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
574 || hash->elf.root.type == bfd_link_hash_defweak))
30667bf3 575 {
067fa4a6
AM
576 /* We need an import stub. Decide between hppa_stub_import
577 and hppa_stub_import_shared later. */
30667bf3
AM
578 return hppa_stub_import;
579 }
edd21aca 580
30667bf3
AM
581 /* Determine where the call point is. */
582 location = (input_sec->output_offset
583 + input_sec->output_section->vma
584 + rel->r_offset);
edd21aca 585
30667bf3
AM
586 branch_offset = destination - location - 8;
587 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 588
30667bf3
AM
589 /* Determine if a long branch stub is needed. parisc branch offsets
590 are relative to the second instruction past the branch, ie. +8
591 bytes on from the branch instruction location. The offset is
592 signed and counts in units of 4 bytes. */
593 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 594 {
30667bf3
AM
595 max_branch_offset = (1 << (17-1)) << 2;
596 }
597 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
598 {
599 max_branch_offset = (1 << (12-1)) << 2;
600 }
25f72752 601 else /* R_PARISC_PCREL22F. */
30667bf3
AM
602 {
603 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
604 }
605
30667bf3 606 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
607 return hppa_stub_long_branch;
608
30667bf3
AM
609 return hppa_stub_none;
610}
edd21aca 611
30667bf3
AM
612/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
613 IN_ARG contains the link info pointer. */
edd21aca 614
30667bf3
AM
615#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
616#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 617
30667bf3 618#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 619#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 620#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 621
3ee1d854
AM
622#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
623#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 624#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 625#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 626
3ee1d854
AM
627#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
628#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 629
30667bf3
AM
630#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
631#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
632#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
633#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 634
067fa4a6 635#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
636#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
637#define NOP 0x08000240 /* nop */
638#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
639#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
640#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 641
30667bf3
AM
642#ifndef R19_STUBS
643#define R19_STUBS 1
644#endif
edd21aca 645
30667bf3
AM
646#if R19_STUBS
647#define LDW_R1_DLT LDW_R1_R19
648#else
649#define LDW_R1_DLT LDW_R1_DP
650#endif
edd21aca 651
b34976b6 652static bfd_boolean
c39a58e6 653hppa_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
30667bf3
AM
654{
655 struct elf32_hppa_stub_hash_entry *stub_entry;
656 struct bfd_link_info *info;
83c81bfe 657 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
658 asection *stub_sec;
659 bfd *stub_bfd;
660 bfd_byte *loc;
661 bfd_vma sym_value;
74d1c347 662 bfd_vma insn;
8dea1268 663 bfd_vma off;
74d1c347 664 int val;
30667bf3 665 int size;
edd21aca 666
30667bf3
AM
667 /* Massage our args to the form they really have. */
668 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
c39a58e6 669 info = in_arg;
30667bf3 670
83c81bfe 671 htab = hppa_link_hash_table (info);
30667bf3 672 stub_sec = stub_entry->stub_sec;
edd21aca 673
30667bf3 674 /* Make a note of the offset within the stubs for this entry. */
eea6121a 675 stub_entry->stub_offset = stub_sec->size;
30667bf3 676 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 677
30667bf3
AM
678 stub_bfd = stub_sec->owner;
679
680 switch (stub_entry->stub_type)
681 {
682 case hppa_stub_long_branch:
683 /* Create the long branch. A long branch is formed with "ldil"
684 loading the upper bits of the target address into a register,
685 then branching with "be" which adds in the lower bits.
686 The "be" has its delay slot nullified. */
687 sym_value = (stub_entry->target_value
688 + stub_entry->target_section->output_offset
689 + stub_entry->target_section->output_section->vma);
690
c39a58e6 691 val = hppa_field_adjust (sym_value, 0, e_lrsel);
74d1c347 692 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
693 bfd_put_32 (stub_bfd, insn, loc);
694
c39a58e6 695 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
74d1c347 696 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
697 bfd_put_32 (stub_bfd, insn, loc + 4);
698
30667bf3 699 size = 8;
edd21aca
AM
700 break;
701
30667bf3
AM
702 case hppa_stub_long_branch_shared:
703 /* Branches are relative. This is where we are going to. */
704 sym_value = (stub_entry->target_value
705 + stub_entry->target_section->output_offset
706 + stub_entry->target_section->output_section->vma);
707
708 /* And this is where we are coming from, more or less. */
709 sym_value -= (stub_entry->stub_offset
710 + stub_sec->output_offset
711 + stub_sec->output_section->vma);
712
74d1c347 713 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 714 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 715 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
716 bfd_put_32 (stub_bfd, insn, loc + 4);
717
47d89dba 718 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 719 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
720 bfd_put_32 (stub_bfd, insn, loc + 8);
721 size = 12;
722 break;
edd21aca 723
30667bf3
AM
724 case hppa_stub_import:
725 case hppa_stub_import_shared:
8dea1268
AM
726 off = stub_entry->h->elf.plt.offset;
727 if (off >= (bfd_vma) -2)
49e9d0d3 728 abort ();
8dea1268
AM
729
730 off &= ~ (bfd_vma) 1;
731 sym_value = (off
83c81bfe
AM
732 + htab->splt->output_offset
733 + htab->splt->output_section->vma
734 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
735
736 insn = ADDIL_DP;
737#if R19_STUBS
738 if (stub_entry->stub_type == hppa_stub_import_shared)
739 insn = ADDIL_R19;
740#endif
c39a58e6 741 val = hppa_field_adjust (sym_value, 0, e_lrsel),
74d1c347 742 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 743 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 744
47d89dba
AM
745 /* It is critical to use lrsel/rrsel here because we are using
746 two different offsets (+0 and +4) from sym_value. If we use
747 lsel/rsel then with unfortunate sym_values we will round
748 sym_value+4 up to the next 2k block leading to a mis-match
749 between the lsel and rsel value. */
c39a58e6 750 val = hppa_field_adjust (sym_value, 0, e_rrsel);
74d1c347 751 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 752 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 753
83c81bfe 754 if (htab->multi_subspace)
30667bf3 755 {
47d89dba 756 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 757 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 758 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 759
74d1c347
AM
760 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
761 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
762 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
763 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 764
30667bf3
AM
765 size = 28;
766 }
767 else
768 {
74d1c347 769 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 770 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 771 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 772 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 773
30667bf3
AM
774 size = 16;
775 }
252b5132 776
30667bf3 777 break;
252b5132 778
30667bf3
AM
779 case hppa_stub_export:
780 /* Branches are relative. This is where we are going to. */
781 sym_value = (stub_entry->target_value
782 + stub_entry->target_section->output_offset
783 + stub_entry->target_section->output_section->vma);
252b5132 784
30667bf3
AM
785 /* And this is where we are coming from. */
786 sym_value -= (stub_entry->stub_offset
787 + stub_sec->output_offset
788 + stub_sec->output_section->vma);
edd21aca 789
067fa4a6
AM
790 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
791 && (!htab->has_22bit_branch
792 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 793 {
edd21aca 794 (*_bfd_error_handler)
30667bf3 795 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 796 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
797 stub_sec->name,
798 (long) stub_entry->stub_offset,
799 stub_entry->root.string);
800 bfd_set_error (bfd_error_bad_value);
b34976b6 801 return FALSE;
252b5132 802 }
30667bf3 803
74d1c347 804 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
805 if (!htab->has_22bit_branch)
806 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
807 else
808 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
809 bfd_put_32 (stub_bfd, insn, loc);
810
74d1c347
AM
811 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
812 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
813 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
814 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
815 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
816
817 /* Point the function symbol at the stub. */
818 stub_entry->h->elf.root.u.def.section = stub_sec;
eea6121a 819 stub_entry->h->elf.root.u.def.value = stub_sec->size;
30667bf3
AM
820
821 size = 24;
822 break;
823
824 default:
825 BFD_FAIL ();
b34976b6 826 return FALSE;
252b5132
RH
827 }
828
eea6121a 829 stub_sec->size += size;
b34976b6 830 return TRUE;
252b5132
RH
831}
832
30667bf3
AM
833#undef LDIL_R1
834#undef BE_SR4_R1
835#undef BL_R1
836#undef ADDIL_R1
837#undef DEPI_R1
30667bf3
AM
838#undef LDW_R1_R21
839#undef LDW_R1_DLT
840#undef LDW_R1_R19
841#undef ADDIL_R19
842#undef LDW_R1_DP
843#undef LDSID_R21_R1
844#undef MTSP_R1
845#undef BE_SR0_R21
846#undef STW_RP
847#undef BV_R0_R21
848#undef BL_RP
849#undef NOP
850#undef LDW_RP
851#undef LDSID_RP_R1
852#undef BE_SR0_RP
252b5132 853
30667bf3
AM
854/* As above, but don't actually build the stub. Just bump offset so
855 we know stub section sizes. */
856
b34976b6 857static bfd_boolean
c39a58e6 858hppa_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
252b5132 859{
30667bf3 860 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 861 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
862 int size;
863
864 /* Massage our args to the form they really have. */
865 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
c39a58e6 866 htab = in_arg;
30667bf3
AM
867
868 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 869 size = 8;
30667bf3
AM
870 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
871 size = 12;
872 else if (stub_entry->stub_type == hppa_stub_export)
873 size = 24;
74d1c347 874 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 875 {
83c81bfe 876 if (htab->multi_subspace)
30667bf3
AM
877 size = 28;
878 else
879 size = 16;
880 }
252b5132 881
eea6121a 882 stub_entry->stub_sec->size += size;
b34976b6 883 return TRUE;
30667bf3 884}
252b5132 885
30667bf3
AM
886/* Return nonzero if ABFD represents an HPPA ELF32 file.
887 Additionally we set the default architecture and machine. */
888
b34976b6 889static bfd_boolean
c39a58e6 890elf32_hppa_object_p (bfd *abfd)
30667bf3 891{
24a5e751
L
892 Elf_Internal_Ehdr * i_ehdrp;
893 unsigned int flags;
252b5132 894
24a5e751
L
895 i_ehdrp = elf_elfheader (abfd);
896 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
897 {
6c21aa76
NC
898 /* GCC on hppa-linux produces binaries with OSABI=Linux,
899 but the kernel produces corefiles with OSABI=SysV. */
900 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX &&
901 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
b34976b6 902 return FALSE;
24a5e751 903 }
225247f0
JT
904 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
905 {
906 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
907 but the kernel produces corefiles with OSABI=SysV. */
908 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
909 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
910 return FALSE;
911 }
24a5e751
L
912 else
913 {
914 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 915 return FALSE;
24a5e751
L
916 }
917
918 flags = i_ehdrp->e_flags;
30667bf3
AM
919 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
920 {
921 case EFA_PARISC_1_0:
922 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
923 case EFA_PARISC_1_1:
924 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
925 case EFA_PARISC_2_0:
926 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
927 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
928 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
929 }
b34976b6 930 return TRUE;
252b5132
RH
931}
932
30667bf3
AM
933/* Create the .plt and .got sections, and set up our hash table
934 short-cuts to various dynamic sections. */
935
b34976b6 936static bfd_boolean
c39a58e6 937elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 938{
83c81bfe 939 struct elf32_hppa_link_hash_table *htab;
edd21aca 940
30667bf3 941 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
942 htab = hppa_link_hash_table (info);
943 if (htab->splt != NULL)
b34976b6 944 return TRUE;
edd21aca 945
30667bf3
AM
946 /* Call the generic code to do most of the work. */
947 if (! _bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 948 return FALSE;
252b5132 949
83c81bfe
AM
950 htab->splt = bfd_get_section_by_name (abfd, ".plt");
951 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 952
83c81bfe
AM
953 htab->sgot = bfd_get_section_by_name (abfd, ".got");
954 htab->srelgot = bfd_make_section (abfd, ".rela.got");
955 if (htab->srelgot == NULL
956 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
957 (SEC_ALLOC
958 | SEC_LOAD
959 | SEC_HAS_CONTENTS
960 | SEC_IN_MEMORY
961 | SEC_LINKER_CREATED
962 | SEC_READONLY))
83c81bfe 963 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
b34976b6 964 return FALSE;
edd21aca 965
83c81bfe
AM
966 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
967 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3 968
b34976b6 969 return TRUE;
30667bf3
AM
970}
971
ebe50bae
AM
972/* Copy the extra info we tack onto an elf_link_hash_entry. */
973
51b64d56 974static void
9c5bfbb7 975elf32_hppa_copy_indirect_symbol (const struct elf_backend_data *bed,
c39a58e6
AM
976 struct elf_link_hash_entry *dir,
977 struct elf_link_hash_entry *ind)
ebe50bae
AM
978{
979 struct elf32_hppa_link_hash_entry *edir, *eind;
980
981 edir = (struct elf32_hppa_link_hash_entry *) dir;
982 eind = (struct elf32_hppa_link_hash_entry *) ind;
983
bbd7ec4a 984 if (eind->dyn_relocs != NULL)
ebe50bae 985 {
bbd7ec4a
AM
986 if (edir->dyn_relocs != NULL)
987 {
988 struct elf32_hppa_dyn_reloc_entry **pp;
989 struct elf32_hppa_dyn_reloc_entry *p;
990
1e370bd2 991 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
992 abort ();
993
994 /* Add reloc counts against the weak sym to the strong sym
995 list. Merge any entries against the same section. */
996 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
997 {
998 struct elf32_hppa_dyn_reloc_entry *q;
999
1000 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1001 if (q->sec == p->sec)
1002 {
1003#if RELATIVE_DYNRELOCS
1004 q->relative_count += p->relative_count;
1005#endif
1006 q->count += p->count;
1007 *pp = p->next;
1008 break;
1009 }
1010 if (q == NULL)
1011 pp = &p->next;
1012 }
1013 *pp = edir->dyn_relocs;
1014 }
1015
ebe50bae
AM
1016 edir->dyn_relocs = eind->dyn_relocs;
1017 eind->dyn_relocs = NULL;
1018 }
ebe50bae 1019
4fc8051d
AM
1020 if (ELIMINATE_COPY_RELOCS
1021 && ind->root.type != bfd_link_hash_indirect
1022 && (dir->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
1023 /* If called to transfer flags for a weakdef during processing
1024 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
1025 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
1026 dir->elf_link_hash_flags |=
1027 (ind->elf_link_hash_flags & (ELF_LINK_HASH_REF_DYNAMIC
1028 | ELF_LINK_HASH_REF_REGULAR
3addb0a9
DJ
1029 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
1030 | ELF_LINK_HASH_NEEDS_PLT));
4fc8051d
AM
1031 else
1032 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
ebe50bae
AM
1033}
1034
30667bf3 1035/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1036 calculate needed space in the global offset table, procedure linkage
1037 table, and dynamic reloc sections. At this point we haven't
1038 necessarily read all the input files. */
252b5132 1039
b34976b6 1040static bfd_boolean
c39a58e6
AM
1041elf32_hppa_check_relocs (bfd *abfd,
1042 struct bfd_link_info *info,
1043 asection *sec,
1044 const Elf_Internal_Rela *relocs)
252b5132 1045{
30667bf3
AM
1046 Elf_Internal_Shdr *symtab_hdr;
1047 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1048 const Elf_Internal_Rela *rel;
1049 const Elf_Internal_Rela *rel_end;
83c81bfe 1050 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1051 asection *sreloc;
1052 asection *stubreloc;
1053
1049f94e 1054 if (info->relocatable)
b34976b6 1055 return TRUE;
30667bf3 1056
83c81bfe 1057 htab = hppa_link_hash_table (info);
30667bf3
AM
1058 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1059 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1060 sreloc = NULL;
1061 stubreloc = NULL;
1062
1063 rel_end = relocs + sec->reloc_count;
1064 for (rel = relocs; rel < rel_end; rel++)
1065 {
1066 enum {
1067 NEED_GOT = 1,
1068 NEED_PLT = 2,
1069 NEED_DYNREL = 4,
98ceb8ce 1070 PLT_PLABEL = 8
30667bf3 1071 };
edd21aca 1072
30667bf3
AM
1073 unsigned int r_symndx, r_type;
1074 struct elf32_hppa_link_hash_entry *h;
1075 int need_entry;
252b5132 1076
30667bf3 1077 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1078
30667bf3
AM
1079 if (r_symndx < symtab_hdr->sh_info)
1080 h = NULL;
1081 else
1082 h = ((struct elf32_hppa_link_hash_entry *)
1083 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1084
30667bf3 1085 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1086
30667bf3
AM
1087 switch (r_type)
1088 {
1089 case R_PARISC_DLTIND14F:
1090 case R_PARISC_DLTIND14R:
1091 case R_PARISC_DLTIND21L:
1092 /* This symbol requires a global offset table entry. */
1093 need_entry = NEED_GOT;
30667bf3
AM
1094 break;
1095
1096 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1097 case R_PARISC_PLABEL21L:
1098 case R_PARISC_PLABEL32:
74d1c347 1099 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1100 if (rel->r_addend != 0)
1101 abort ();
74d1c347
AM
1102
1103 /* If we are creating a shared library, then we need to
1104 create a PLT entry for all PLABELs, because PLABELs with
1105 local symbols may be passed via a pointer to another
1106 object. Additionally, output a dynamic relocation
4dc86686
AM
1107 pointing to the PLT entry.
1108 For executables, the original 32-bit ABI allowed two
1109 different styles of PLABELs (function pointers): For
1110 global functions, the PLABEL word points into the .plt
1111 two bytes past a (function address, gp) pair, and for
1112 local functions the PLABEL points directly at the
1113 function. The magic +2 for the first type allows us to
1114 differentiate between the two. As you can imagine, this
1115 is a real pain when it comes to generating code to call
1116 functions indirectly or to compare function pointers.
1117 We avoid the mess by always pointing a PLABEL into the
1118 .plt, even for local functions. */
74d1c347 1119 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1120 break;
1121
1122 case R_PARISC_PCREL12F:
83c81bfe 1123 htab->has_12bit_branch = 1;
067fa4a6
AM
1124 goto branch_common;
1125
30667bf3
AM
1126 case R_PARISC_PCREL17C:
1127 case R_PARISC_PCREL17F:
83c81bfe 1128 htab->has_17bit_branch = 1;
067fa4a6
AM
1129 goto branch_common;
1130
30667bf3 1131 case R_PARISC_PCREL22F:
067fa4a6
AM
1132 htab->has_22bit_branch = 1;
1133 branch_common:
47d89dba
AM
1134 /* Function calls might need to go through the .plt, and
1135 might require long branch stubs. */
30667bf3
AM
1136 if (h == NULL)
1137 {
1138 /* We know local syms won't need a .plt entry, and if
1139 they need a long branch stub we can't guarantee that
1140 we can reach the stub. So just flag an error later
1141 if we're doing a shared link and find we need a long
1142 branch stub. */
1143 continue;
1144 }
1145 else
1146 {
1147 /* Global symbols will need a .plt entry if they remain
1148 global, and in most cases won't need a long branch
1149 stub. Unfortunately, we have to cater for the case
1150 where a symbol is forced local by versioning, or due
1151 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1152 need_entry = NEED_PLT;
4dc86686 1153 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1154 need_entry = 0;
30667bf3
AM
1155 }
1156 break;
1157
36751eee 1158 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1159 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1160 case R_PARISC_PCREL14F: /* PC relative load/store. */
1161 case R_PARISC_PCREL14R:
1162 case R_PARISC_PCREL17R: /* External branches. */
1163 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
36751eee 1164 case R_PARISC_PCREL32:
30667bf3
AM
1165 /* We don't need to propagate the relocation if linking a
1166 shared object since these are section relative. */
1167 continue;
1168
1169 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1170 case R_PARISC_DPREL14R:
1171 case R_PARISC_DPREL21L:
1172 if (info->shared)
1173 {
1174 (*_bfd_error_handler)
1175 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1176 bfd_archive_filename (abfd),
30667bf3
AM
1177 elf_hppa_howto_table[r_type].name);
1178 bfd_set_error (bfd_error_bad_value);
b34976b6 1179 return FALSE;
30667bf3
AM
1180 }
1181 /* Fall through. */
1182
1183 case R_PARISC_DIR17F: /* Used for external branches. */
1184 case R_PARISC_DIR17R:
47d89dba
AM
1185 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1186 case R_PARISC_DIR14R:
30667bf3 1187 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
067fa4a6 1188#if 0
30667bf3
AM
1189 /* Help debug shared library creation. Any of the above
1190 relocs can be used in shared libs, but they may cause
1191 pages to become unshared. */
1192 if (info->shared)
1193 {
1194 (*_bfd_error_handler)
1195 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1196 bfd_archive_filename (abfd),
30667bf3
AM
1197 elf_hppa_howto_table[r_type].name);
1198 }
1199 /* Fall through. */
1200#endif
1201
c46b7515 1202 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1203 /* We may want to output a dynamic relocation later. */
1204 need_entry = NEED_DYNREL;
1205 break;
1206
1207 /* This relocation describes the C++ object vtable hierarchy.
1208 Reconstruct it for later use during GC. */
1209 case R_PARISC_GNU_VTINHERIT:
c152c796 1210 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &h->elf, rel->r_offset))
b34976b6 1211 return FALSE;
30667bf3
AM
1212 continue;
1213
1214 /* This relocation describes which C++ vtable entries are actually
1215 used. Record for later use during GC. */
1216 case R_PARISC_GNU_VTENTRY:
c152c796 1217 if (!bfd_elf_gc_record_vtentry (abfd, sec, &h->elf, rel->r_addend))
b34976b6 1218 return FALSE;
30667bf3
AM
1219 continue;
1220
1221 default:
1222 continue;
1223 }
1224
1225 /* Now carry out our orders. */
1226 if (need_entry & NEED_GOT)
1227 {
1228 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1229 relocation for this entry. */
83c81bfe 1230 if (htab->sgot == NULL)
30667bf3 1231 {
3ac8354b
AM
1232 if (htab->elf.dynobj == NULL)
1233 htab->elf.dynobj = abfd;
1234 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
b34976b6 1235 return FALSE;
30667bf3
AM
1236 }
1237
1238 if (h != NULL)
1239 {
51b64d56 1240 h->elf.got.refcount += 1;
30667bf3
AM
1241 }
1242 else
1243 {
3ac8354b
AM
1244 bfd_signed_vma *local_got_refcounts;
1245
30667bf3 1246 /* This is a global offset table entry for a local symbol. */
3ac8354b 1247 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1248 if (local_got_refcounts == NULL)
1249 {
dc810e39 1250 bfd_size_type size;
30667bf3 1251
74d1c347
AM
1252 /* Allocate space for local got offsets and local
1253 plt offsets. Done this way to save polluting
1254 elf_obj_tdata with another target specific
1255 pointer. */
dc810e39
AM
1256 size = symtab_hdr->sh_info;
1257 size *= 2 * sizeof (bfd_signed_vma);
c39a58e6 1258 local_got_refcounts = bfd_zalloc (abfd, size);
30667bf3 1259 if (local_got_refcounts == NULL)
b34976b6 1260 return FALSE;
30667bf3 1261 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1262 }
ebe50bae 1263 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1264 }
1265 }
1266
1267 if (need_entry & NEED_PLT)
1268 {
1269 /* If we are creating a shared library, and this is a reloc
1270 against a weak symbol or a global symbol in a dynamic
1271 object, then we will be creating an import stub and a
1272 .plt entry for the symbol. Similarly, on a normal link
1273 to symbols defined in a dynamic object we'll need the
1274 import stub and a .plt entry. We don't know yet whether
1275 the symbol is defined or not, so make an entry anyway and
1276 clean up later in adjust_dynamic_symbol. */
1277 if ((sec->flags & SEC_ALLOC) != 0)
1278 {
74d1c347 1279 if (h != NULL)
30667bf3 1280 {
51b64d56
AM
1281 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1282 h->elf.plt.refcount += 1;
74d1c347 1283
36605136
AM
1284 /* If this .plt entry is for a plabel, mark it so
1285 that adjust_dynamic_symbol will keep the entry
1286 even if it appears to be local. */
74d1c347
AM
1287 if (need_entry & PLT_PLABEL)
1288 h->plabel = 1;
1289 }
1290 else if (need_entry & PLT_PLABEL)
1291 {
3ac8354b 1292 bfd_signed_vma *local_got_refcounts;
68fb2e56 1293 bfd_signed_vma *local_plt_refcounts;
74d1c347 1294
3ac8354b 1295 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1296 if (local_got_refcounts == NULL)
1297 {
dc810e39 1298 bfd_size_type size;
74d1c347
AM
1299
1300 /* Allocate space for local got offsets and local
1301 plt offsets. */
dc810e39
AM
1302 size = symtab_hdr->sh_info;
1303 size *= 2 * sizeof (bfd_signed_vma);
c39a58e6 1304 local_got_refcounts = bfd_zalloc (abfd, size);
74d1c347 1305 if (local_got_refcounts == NULL)
b34976b6 1306 return FALSE;
74d1c347 1307 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1308 }
68fb2e56
AM
1309 local_plt_refcounts = (local_got_refcounts
1310 + symtab_hdr->sh_info);
ebe50bae 1311 local_plt_refcounts[r_symndx] += 1;
30667bf3 1312 }
30667bf3
AM
1313 }
1314 }
1315
98ceb8ce 1316 if (need_entry & NEED_DYNREL)
30667bf3
AM
1317 {
1318 /* Flag this symbol as having a non-got, non-plt reference
1319 so that we generate copy relocs if it turns out to be
1320 dynamic. */
ebe50bae 1321 if (h != NULL && !info->shared)
30667bf3
AM
1322 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1323
1324 /* If we are creating a shared library then we need to copy
1325 the reloc into the shared library. However, if we are
1326 linking with -Bsymbolic, we need only copy absolute
1327 relocs or relocs against symbols that are not defined in
1328 an object we are including in the link. PC- or DP- or
1329 DLT-relative relocs against any local sym or global sym
1330 with DEF_REGULAR set, can be discarded. At this point we
1331 have not seen all the input files, so it is possible that
1332 DEF_REGULAR is not set now but will be set later (it is
1333 never cleared). We account for that possibility below by
98ceb8ce 1334 storing information in the dyn_relocs field of the
30667bf3
AM
1335 hash table entry.
1336
1337 A similar situation to the -Bsymbolic case occurs when
1338 creating shared libraries and symbol visibility changes
1339 render the symbol local.
1340
1341 As it turns out, all the relocs we will be creating here
1342 are absolute, so we cannot remove them on -Bsymbolic
1343 links or visibility changes anyway. A STUB_REL reloc
1344 is absolute too, as in that case it is the reloc in the
1345 stub we will be creating, rather than copying the PCREL
56882138
AM
1346 reloc in the branch.
1347
1348 If on the other hand, we are creating an executable, we
1349 may need to keep relocations for symbols satisfied by a
1350 dynamic library if we manage to avoid copy relocs for the
1351 symbol. */
446f2863
AM
1352 if ((info->shared
1353 && (sec->flags & SEC_ALLOC) != 0
1354 && (IS_ABSOLUTE_RELOC (r_type)
1355 || (h != NULL
1356 && (!info->symbolic
1357 || h->elf.root.type == bfd_link_hash_defweak
1358 || (h->elf.elf_link_hash_flags
1359 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
4fc8051d
AM
1360 || (ELIMINATE_COPY_RELOCS
1361 && !info->shared
446f2863
AM
1362 && (sec->flags & SEC_ALLOC) != 0
1363 && h != NULL
446f2863
AM
1364 && (h->elf.root.type == bfd_link_hash_defweak
1365 || (h->elf.elf_link_hash_flags
1366 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1367 {
ec338859
AM
1368 struct elf32_hppa_dyn_reloc_entry *p;
1369 struct elf32_hppa_dyn_reloc_entry **head;
1370
30667bf3
AM
1371 /* Create a reloc section in dynobj and make room for
1372 this reloc. */
98ceb8ce 1373 if (sreloc == NULL)
30667bf3
AM
1374 {
1375 char *name;
3ac8354b 1376 bfd *dynobj;
30667bf3 1377
98ceb8ce
AM
1378 name = (bfd_elf_string_from_elf_section
1379 (abfd,
1380 elf_elfheader (abfd)->e_shstrndx,
1381 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1382 if (name == NULL)
1383 {
1384 (*_bfd_error_handler)
1385 (_("Could not find relocation section for %s"),
1386 sec->name);
1387 bfd_set_error (bfd_error_bad_value);
b34976b6 1388 return FALSE;
30667bf3
AM
1389 }
1390
3ac8354b
AM
1391 if (htab->elf.dynobj == NULL)
1392 htab->elf.dynobj = abfd;
1393
1394 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1395 sreloc = bfd_get_section_by_name (dynobj, name);
1396 if (sreloc == NULL)
30667bf3
AM
1397 {
1398 flagword flags;
1399
98ceb8ce 1400 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1401 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1402 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1403 if ((sec->flags & SEC_ALLOC) != 0)
1404 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1405 if (sreloc == NULL
1406 || !bfd_set_section_flags (dynobj, sreloc, flags)
1407 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 1408 return FALSE;
30667bf3 1409 }
30667bf3 1410
98ceb8ce 1411 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1412 }
1413
98ceb8ce
AM
1414 /* If this is a global symbol, we count the number of
1415 relocations we need for this symbol. */
1416 if (h != NULL)
30667bf3 1417 {
ec338859
AM
1418 head = &h->dyn_relocs;
1419 }
1420 else
1421 {
1422 /* Track dynamic relocs needed for local syms too.
1423 We really need local syms available to do this
1424 easily. Oh well. */
1425
1426 asection *s;
1427 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1428 sec, r_symndx);
1429 if (s == NULL)
b34976b6 1430 return FALSE;
30667bf3 1431
ec338859
AM
1432 head = ((struct elf32_hppa_dyn_reloc_entry **)
1433 &elf_section_data (s)->local_dynrel);
1434 }
1435
1436 p = *head;
1437 if (p == NULL || p->sec != sec)
1438 {
c39a58e6 1439 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
ec338859 1440 if (p == NULL)
b34976b6 1441 return FALSE;
ec338859
AM
1442 p->next = *head;
1443 *head = p;
1444 p->sec = sec;
1445 p->count = 0;
98ceb8ce 1446#if RELATIVE_DYNRELOCS
ec338859 1447 p->relative_count = 0;
98ceb8ce 1448#endif
ec338859 1449 }
98ceb8ce 1450
ec338859 1451 p->count += 1;
98ceb8ce 1452#if RELATIVE_DYNRELOCS
ec338859
AM
1453 if (!IS_ABSOLUTE_RELOC (rtype))
1454 p->relative_count += 1;
98ceb8ce 1455#endif
30667bf3
AM
1456 }
1457 }
1458 }
edd21aca 1459
b34976b6 1460 return TRUE;
edd21aca
AM
1461}
1462
30667bf3
AM
1463/* Return the section that should be marked against garbage collection
1464 for a given relocation. */
1465
1466static asection *
c39a58e6
AM
1467elf32_hppa_gc_mark_hook (asection *sec,
1468 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1469 Elf_Internal_Rela *rel,
1470 struct elf_link_hash_entry *h,
1471 Elf_Internal_Sym *sym)
30667bf3
AM
1472{
1473 if (h != NULL)
1474 {
1475 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1476 {
1477 case R_PARISC_GNU_VTINHERIT:
1478 case R_PARISC_GNU_VTENTRY:
1479 break;
1480
1481 default:
1482 switch (h->root.type)
1483 {
1484 case bfd_link_hash_defined:
1485 case bfd_link_hash_defweak:
1486 return h->root.u.def.section;
1487
1488 case bfd_link_hash_common:
1489 return h->root.u.c.p->section;
1490
1491 default:
1492 break;
1493 }
1494 }
1495 }
1496 else
1e2f5b6e 1497 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
30667bf3
AM
1498
1499 return NULL;
1500}
1501
30667bf3
AM
1502/* Update the got and plt entry reference counts for the section being
1503 removed. */
edd21aca 1504
b34976b6 1505static bfd_boolean
c39a58e6
AM
1506elf32_hppa_gc_sweep_hook (bfd *abfd,
1507 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1508 asection *sec,
1509 const Elf_Internal_Rela *relocs)
edd21aca 1510{
30667bf3
AM
1511 Elf_Internal_Shdr *symtab_hdr;
1512 struct elf_link_hash_entry **sym_hashes;
1513 bfd_signed_vma *local_got_refcounts;
74d1c347 1514 bfd_signed_vma *local_plt_refcounts;
30667bf3 1515 const Elf_Internal_Rela *rel, *relend;
30667bf3 1516
ec338859 1517 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1518
30667bf3
AM
1519 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1520 sym_hashes = elf_sym_hashes (abfd);
1521 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1522 local_plt_refcounts = local_got_refcounts;
1523 if (local_plt_refcounts != NULL)
1524 local_plt_refcounts += symtab_hdr->sh_info;
30667bf3 1525
30667bf3
AM
1526 relend = relocs + sec->reloc_count;
1527 for (rel = relocs; rel < relend; rel++)
26e41594
AM
1528 {
1529 unsigned long r_symndx;
1530 unsigned int r_type;
1531 struct elf_link_hash_entry *h = NULL;
1532
1533 r_symndx = ELF32_R_SYM (rel->r_info);
1534 if (r_symndx >= symtab_hdr->sh_info)
1535 {
1536 struct elf32_hppa_link_hash_entry *eh;
1537 struct elf32_hppa_dyn_reloc_entry **pp;
1538 struct elf32_hppa_dyn_reloc_entry *p;
1539
1540 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1541 eh = (struct elf32_hppa_link_hash_entry *) h;
1542
1543 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1544 if (p->sec == sec)
1545 {
1546 /* Everything must go for SEC. */
1547 *pp = p->next;
1548 break;
1549 }
1550 }
1551
1552 r_type = ELF32_R_TYPE (rel->r_info);
1553 switch (r_type)
1554 {
1555 case R_PARISC_DLTIND14F:
1556 case R_PARISC_DLTIND14R:
1557 case R_PARISC_DLTIND21L:
1558 if (h != NULL)
1559 {
1560 if (h->got.refcount > 0)
1561 h->got.refcount -= 1;
1562 }
1563 else if (local_got_refcounts != NULL)
1564 {
1565 if (local_got_refcounts[r_symndx] > 0)
1566 local_got_refcounts[r_symndx] -= 1;
1567 }
1568 break;
98ceb8ce 1569
26e41594
AM
1570 case R_PARISC_PCREL12F:
1571 case R_PARISC_PCREL17C:
1572 case R_PARISC_PCREL17F:
1573 case R_PARISC_PCREL22F:
1574 if (h != NULL)
1575 {
1576 if (h->plt.refcount > 0)
1577 h->plt.refcount -= 1;
1578 }
1579 break;
1580
1581 case R_PARISC_PLABEL14R:
1582 case R_PARISC_PLABEL21L:
1583 case R_PARISC_PLABEL32:
1584 if (h != NULL)
1585 {
1586 if (h->plt.refcount > 0)
1587 h->plt.refcount -= 1;
1588 }
1589 else if (local_plt_refcounts != NULL)
1590 {
1591 if (local_plt_refcounts[r_symndx] > 0)
1592 local_plt_refcounts[r_symndx] -= 1;
1593 }
1594 break;
1595
1596 default:
1597 break;
1598 }
1599 }
252b5132 1600
b34976b6 1601 return TRUE;
252b5132
RH
1602}
1603
74d1c347
AM
1604/* Our own version of hide_symbol, so that we can keep plt entries for
1605 plabels. */
1606
1607static void
c39a58e6
AM
1608elf32_hppa_hide_symbol (struct bfd_link_info *info,
1609 struct elf_link_hash_entry *h,
1610 bfd_boolean force_local)
74d1c347 1611{
e5094212
AM
1612 if (force_local)
1613 {
1614 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1615 if (h->dynindx != -1)
1616 {
1617 h->dynindx = -1;
1618 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1619 h->dynstr_index);
1620 }
1621 }
1622
74d1c347
AM
1623 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1624 {
1625 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1626 h->plt.offset = (bfd_vma) -1;
1627 }
1628}
1629
30667bf3
AM
1630/* Adjust a symbol defined by a dynamic object and referenced by a
1631 regular object. The current definition is in some section of the
1632 dynamic object, but we're not including those sections. We have to
1633 change the definition to something the rest of the link can
1634 understand. */
252b5132 1635
b34976b6 1636static bfd_boolean
c39a58e6
AM
1637elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
1638 struct elf_link_hash_entry *h)
252b5132 1639{
83c81bfe 1640 struct elf32_hppa_link_hash_table *htab;
30667bf3 1641 asection *s;
3ac8354b 1642 unsigned int power_of_two;
30667bf3
AM
1643
1644 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1645 will fill in the contents of the procedure linkage table later. */
30667bf3
AM
1646 if (h->type == STT_FUNC
1647 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1648 {
1649 if (h->plt.refcount <= 0
1650 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1651 && h->root.type != bfd_link_hash_defweak
74d1c347 1652 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1653 && (!info->shared || info->symbolic)))
1654 {
1655 /* The .plt entry is not needed when:
1656 a) Garbage collection has removed all references to the
1657 symbol, or
1658 b) We know for certain the symbol is defined in this
74d1c347
AM
1659 object, and it's not a weak definition, nor is the symbol
1660 used by a plabel relocation. Either this object is the
1661 application or we are doing a shared symbolic link. */
1662
a252afa4
DA
1663 h->plt.offset = (bfd_vma) -1;
1664 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1665 }
4dc86686 1666
b34976b6 1667 return TRUE;
30667bf3 1668 }
bbd7ec4a
AM
1669 else
1670 h->plt.offset = (bfd_vma) -1;
edd21aca 1671
30667bf3
AM
1672 /* If this is a weak symbol, and there is a real definition, the
1673 processor independent code will have arranged for us to see the
1674 real definition first, and we can just use the same value. */
1675 if (h->weakdef != NULL)
edd21aca 1676 {
49e9d0d3
AM
1677 if (h->weakdef->root.type != bfd_link_hash_defined
1678 && h->weakdef->root.type != bfd_link_hash_defweak)
1679 abort ();
30667bf3
AM
1680 h->root.u.def.section = h->weakdef->root.u.def.section;
1681 h->root.u.def.value = h->weakdef->root.u.def.value;
4fc8051d
AM
1682 if (ELIMINATE_COPY_RELOCS)
1683 h->elf_link_hash_flags
1684 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
1685 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
b34976b6 1686 return TRUE;
30667bf3 1687 }
edd21aca 1688
30667bf3
AM
1689 /* This is a reference to a symbol defined by a dynamic object which
1690 is not a function. */
1691
1692 /* If we are creating a shared library, we must presume that the
1693 only references to the symbol are via the global offset table.
1694 For such cases we need not do anything here; the relocations will
1695 be handled correctly by relocate_section. */
1696 if (info->shared)
b34976b6 1697 return TRUE;
30667bf3
AM
1698
1699 /* If there are no references to this symbol that do not use the
1700 GOT, we don't need to generate a copy reloc. */
1701 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 1702 return TRUE;
30667bf3 1703
4fc8051d 1704 if (ELIMINATE_COPY_RELOCS)
ebe50bae 1705 {
4fc8051d
AM
1706 struct elf32_hppa_link_hash_entry *eh;
1707 struct elf32_hppa_dyn_reloc_entry *p;
ebe50bae 1708
4fc8051d
AM
1709 eh = (struct elf32_hppa_link_hash_entry *) h;
1710 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1711 {
1712 s = p->sec->output_section;
1713 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1714 break;
1715 }
1716
1717 /* If we didn't find any dynamic relocs in read-only sections, then
1718 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1719 if (p == NULL)
1720 {
1721 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1722 return TRUE;
1723 }
ebe50bae
AM
1724 }
1725
30667bf3
AM
1726 /* We must allocate the symbol in our .dynbss section, which will
1727 become part of the .bss section of the executable. There will be
1728 an entry for this symbol in the .dynsym section. The dynamic
1729 object will contain position independent code, so all references
1730 from the dynamic object to this symbol will go through the global
1731 offset table. The dynamic linker will use the .dynsym entry to
1732 determine the address it must put in the global offset table, so
1733 both the dynamic object and the regular object will refer to the
1734 same memory location for the variable. */
1735
3ac8354b 1736 htab = hppa_link_hash_table (info);
30667bf3
AM
1737
1738 /* We must generate a COPY reloc to tell the dynamic linker to
1739 copy the initial value out of the dynamic object and into the
3ac8354b 1740 runtime process image. */
30667bf3
AM
1741 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1742 {
eea6121a 1743 htab->srelbss->size += sizeof (Elf32_External_Rela);
30667bf3 1744 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1745 }
252b5132 1746
3ac8354b
AM
1747 /* We need to figure out the alignment required for this symbol. I
1748 have no idea how other ELF linkers handle this. */
30667bf3 1749
3ac8354b
AM
1750 power_of_two = bfd_log2 (h->size);
1751 if (power_of_two > 3)
1752 power_of_two = 3;
1753
1754 /* Apply the required alignment. */
1755 s = htab->sdynbss;
eea6121a 1756 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
3ac8354b
AM
1757 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1758 {
1759 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 1760 return FALSE;
3ac8354b 1761 }
30667bf3 1762
30667bf3
AM
1763 /* Define the symbol as being at this point in the section. */
1764 h->root.u.def.section = s;
eea6121a 1765 h->root.u.def.value = s->size;
edd21aca 1766
30667bf3 1767 /* Increment the section size to make room for the symbol. */
eea6121a 1768 s->size += h->size;
252b5132 1769
b34976b6 1770 return TRUE;
252b5132
RH
1771}
1772
e5ee5df1 1773/* Allocate space in the .plt for entries that won't have relocations.
a252afa4 1774 ie. plabel entries. */
a8d02d66 1775
b34976b6 1776static bfd_boolean
c39a58e6 1777allocate_plt_static (struct elf_link_hash_entry *h, void *inf)
a8d02d66
AM
1778{
1779 struct bfd_link_info *info;
1780 struct elf32_hppa_link_hash_table *htab;
1781 asection *s;
1782
e92d460e 1783 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1784 return TRUE;
a8d02d66 1785
e92d460e
AM
1786 if (h->root.type == bfd_link_hash_warning)
1787 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1788
c39a58e6 1789 info = inf;
a8d02d66 1790 htab = hppa_link_hash_table (info);
a252afa4 1791 if (htab->elf.dynamic_sections_created
e5ee5df1
AM
1792 && h->plt.refcount > 0)
1793 {
1794 /* Make sure this symbol is output as a dynamic symbol.
1795 Undefined weak syms won't yet be marked as dynamic. */
1796 if (h->dynindx == -1
1797 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
1798 && h->type != STT_PARISC_MILLI)
a8d02d66 1799 {
c152c796 1800 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1801 return FALSE;
e5ee5df1
AM
1802 }
1803
c152c796 1804 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
e5ee5df1 1805 {
067fa4a6
AM
1806 /* Allocate these later. From this point on, h->plabel
1807 means that the plt entry is only used by a plabel.
1808 We'll be using a normal plt entry for this symbol, so
1809 clear the plabel indicator. */
1810 ((struct elf32_hppa_link_hash_entry *) h)->plabel = 0;
e5ee5df1
AM
1811 }
1812 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
1813 {
1814 /* Make an entry in the .plt section for plabel references
1815 that won't have a .plt entry for other reasons. */
1816 s = htab->splt;
eea6121a
AM
1817 h->plt.offset = s->size;
1818 s->size += PLT_ENTRY_SIZE;
a8d02d66
AM
1819 }
1820 else
e5ee5df1
AM
1821 {
1822 /* No .plt entry needed. */
1823 h->plt.offset = (bfd_vma) -1;
1824 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1825 }
1826 }
1827 else
1828 {
1829 h->plt.offset = (bfd_vma) -1;
1830 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
1831 }
1832
b34976b6 1833 return TRUE;
a8d02d66
AM
1834}
1835
4dc86686
AM
1836/* Allocate space in .plt, .got and associated reloc sections for
1837 global syms. */
1838
b34976b6 1839static bfd_boolean
c39a58e6 1840allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
4dc86686
AM
1841{
1842 struct bfd_link_info *info;
83c81bfe 1843 struct elf32_hppa_link_hash_table *htab;
4dc86686 1844 asection *s;
446f2863 1845 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 1846 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 1847
e92d460e 1848 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1849 return TRUE;
73a74a62 1850
e92d460e
AM
1851 if (h->root.type == bfd_link_hash_warning)
1852 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1853
c39a58e6 1854 info = inf;
83c81bfe 1855 htab = hppa_link_hash_table (info);
e5ee5df1
AM
1856 if (htab->elf.dynamic_sections_created
1857 && h->plt.offset != (bfd_vma) -1
067fa4a6 1858 && !((struct elf32_hppa_link_hash_entry *) h)->plabel)
4dc86686 1859 {
e5ee5df1
AM
1860 /* Make an entry in the .plt section. */
1861 s = htab->splt;
eea6121a
AM
1862 h->plt.offset = s->size;
1863 s->size += PLT_ENTRY_SIZE;
3ac8354b 1864
e5ee5df1 1865 /* We also need to make an entry in the .rela.plt section. */
eea6121a 1866 htab->srelplt->size += sizeof (Elf32_External_Rela);
e5ee5df1 1867 htab->need_plt_stub = 1;
4dc86686 1868 }
edd21aca 1869
4dc86686
AM
1870 if (h->got.refcount > 0)
1871 {
446f2863
AM
1872 /* Make sure this symbol is output as a dynamic symbol.
1873 Undefined weak syms won't yet be marked as dynamic. */
1874 if (h->dynindx == -1
1875 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
1876 && h->type != STT_PARISC_MILLI)
1877 {
c152c796 1878 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1879 return FALSE;
446f2863
AM
1880 }
1881
83c81bfe 1882 s = htab->sgot;
eea6121a
AM
1883 h->got.offset = s->size;
1884 s->size += GOT_ENTRY_SIZE;
ce757d15
AM
1885 if (htab->elf.dynamic_sections_created
1886 && (info->shared
1887 || (h->dynindx != -1
1888 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
1889 {
eea6121a 1890 htab->srelgot->size += sizeof (Elf32_External_Rela);
ce757d15 1891 }
4dc86686
AM
1892 }
1893 else
1894 h->got.offset = (bfd_vma) -1;
30667bf3 1895
446f2863 1896 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 1897 if (eh->dyn_relocs == NULL)
b34976b6 1898 return TRUE;
30667bf3 1899
98ceb8ce
AM
1900 /* If this is a -Bsymbolic shared link, then we need to discard all
1901 space allocated for dynamic pc-relative relocs against symbols
1902 defined in a regular object. For the normal shared case, discard
1903 space for relocs that have become local due to symbol visibility
1904 changes. */
1905 if (info->shared)
446f2863 1906 {
98ceb8ce 1907#if RELATIVE_DYNRELOCS
4fc8051d 1908 if (SYMBOL_CALLS_LOCAL (info, h))
446f2863 1909 {
98ceb8ce 1910 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 1911
98ceb8ce
AM
1912 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1913 {
1914 p->count -= p->relative_count;
1915 p->relative_count = 0;
1916 if (p->count == 0)
1917 *pp = p->next;
1918 else
1919 pp = &p->next;
1920 }
1921 }
1922#endif
4fc8051d
AM
1923
1924 /* Also discard relocs on undefined weak syms with non-default
1925 visibility. */
1926 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1927 && h->root.type == bfd_link_hash_undefweak)
1928 eh->dyn_relocs = NULL;
446f2863 1929 }
98ceb8ce 1930 else
30667bf3 1931 {
98ceb8ce
AM
1932 /* For the non-shared case, discard space for relocs against
1933 symbols which turn out to need copy relocs or are not
1934 dynamic. */
1935 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
4fc8051d
AM
1936 && ((ELIMINATE_COPY_RELOCS
1937 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
98ceb8ce 1938 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 1939 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
1940 && (h->root.type == bfd_link_hash_undefweak
1941 || h->root.type == bfd_link_hash_undefined))))
1942 {
1943 /* Make sure this symbol is output as a dynamic symbol.
1944 Undefined weak syms won't yet be marked as dynamic. */
1945 if (h->dynindx == -1
1946 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
1947 && h->type != STT_PARISC_MILLI)
1948 {
c152c796 1949 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1950 return FALSE;
98ceb8ce
AM
1951 }
1952
1953 /* If that succeeded, we know we'll be keeping all the
1954 relocs. */
1955 if (h->dynindx != -1)
1956 goto keep;
1957 }
446f2863 1958
98ceb8ce 1959 eh->dyn_relocs = NULL;
b34976b6 1960 return TRUE;
98ceb8ce 1961
ec338859 1962 keep: ;
30667bf3 1963 }
30667bf3 1964
98ceb8ce
AM
1965 /* Finally, allocate space. */
1966 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 1967 {
98ceb8ce 1968 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 1969 sreloc->size += p->count * sizeof (Elf32_External_Rela);
30667bf3 1970 }
30667bf3 1971
b34976b6 1972 return TRUE;
30667bf3 1973}
30667bf3 1974
d5c73c2f
AM
1975/* This function is called via elf_link_hash_traverse to force
1976 millicode symbols local so they do not end up as globals in the
1977 dynamic symbol table. We ought to be able to do this in
1978 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
1979 for all dynamic symbols. Arguably, this is a bug in
1980 elf_adjust_dynamic_symbol. */
1981
b34976b6 1982static bfd_boolean
c39a58e6
AM
1983clobber_millicode_symbols (struct elf_link_hash_entry *h,
1984 struct bfd_link_info *info)
d5c73c2f 1985{
e92d460e
AM
1986 if (h->root.type == bfd_link_hash_warning)
1987 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1988
142f8c94
AM
1989 if (h->type == STT_PARISC_MILLI
1990 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
e0522e89 1991 {
b34976b6 1992 elf32_hppa_hide_symbol (info, h, TRUE);
e0522e89 1993 }
b34976b6 1994 return TRUE;
d5c73c2f
AM
1995}
1996
98ceb8ce
AM
1997/* Find any dynamic relocs that apply to read-only sections. */
1998
b34976b6 1999static bfd_boolean
c39a58e6 2000readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
98ceb8ce
AM
2001{
2002 struct elf32_hppa_link_hash_entry *eh;
2003 struct elf32_hppa_dyn_reloc_entry *p;
2004
e92d460e
AM
2005 if (h->root.type == bfd_link_hash_warning)
2006 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2007
98ceb8ce
AM
2008 eh = (struct elf32_hppa_link_hash_entry *) h;
2009 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2010 {
2011 asection *s = p->sec->output_section;
2012
2013 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2014 {
c39a58e6 2015 struct bfd_link_info *info = inf;
98ceb8ce
AM
2016
2017 info->flags |= DF_TEXTREL;
2018
2019 /* Not an error, just cut short the traversal. */
b34976b6 2020 return FALSE;
98ceb8ce
AM
2021 }
2022 }
b34976b6 2023 return TRUE;
98ceb8ce
AM
2024}
2025
30667bf3
AM
2026/* Set the sizes of the dynamic sections. */
2027
b34976b6 2028static bfd_boolean
c39a58e6
AM
2029elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2030 struct bfd_link_info *info)
30667bf3 2031{
83c81bfe 2032 struct elf32_hppa_link_hash_table *htab;
30667bf3 2033 bfd *dynobj;
98ceb8ce 2034 bfd *ibfd;
30667bf3 2035 asection *s;
b34976b6 2036 bfd_boolean relocs;
30667bf3 2037
83c81bfe 2038 htab = hppa_link_hash_table (info);
ebe50bae 2039 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2040 if (dynobj == NULL)
2041 abort ();
30667bf3 2042
ebe50bae 2043 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2044 {
2045 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 2046 if (info->executable)
30667bf3
AM
2047 {
2048 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2049 if (s == NULL)
2050 abort ();
eea6121a 2051 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
30667bf3
AM
2052 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2053 }
74d1c347 2054
d5c73c2f 2055 /* Force millicode symbols local. */
ebe50bae 2056 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2057 clobber_millicode_symbols,
2058 info);
68fb2e56 2059 }
d5c73c2f 2060
98ceb8ce
AM
2061 /* Set up .got and .plt offsets for local syms, and space for local
2062 dynamic relocs. */
2063 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2064 {
2065 bfd_signed_vma *local_got;
2066 bfd_signed_vma *end_local_got;
2067 bfd_signed_vma *local_plt;
2068 bfd_signed_vma *end_local_plt;
2069 bfd_size_type locsymcount;
2070 Elf_Internal_Shdr *symtab_hdr;
2071 asection *srel;
74d1c347 2072
98ceb8ce 2073 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2074 continue;
4dc86686 2075
98ceb8ce
AM
2076 for (s = ibfd->sections; s != NULL; s = s->next)
2077 {
ec338859 2078 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2079
ec338859
AM
2080 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2081 elf_section_data (s)->local_dynrel);
2082 p != NULL;
2083 p = p->next)
98ceb8ce 2084 {
ec338859
AM
2085 if (!bfd_is_abs_section (p->sec)
2086 && bfd_is_abs_section (p->sec->output_section))
2087 {
2088 /* Input section has been discarded, either because
2089 it is a copy of a linkonce section or due to
2090 linker script /DISCARD/, so we'll be discarding
2091 the relocs too. */
2092 }
248866a8 2093 else if (p->count != 0)
ec338859
AM
2094 {
2095 srel = elf_section_data (p->sec)->sreloc;
eea6121a 2096 srel->size += p->count * sizeof (Elf32_External_Rela);
248866a8
AM
2097 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2098 info->flags |= DF_TEXTREL;
ec338859 2099 }
98ceb8ce
AM
2100 }
2101 }
2102
2103 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2104 if (!local_got)
2105 continue;
74d1c347 2106
98ceb8ce 2107 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2108 locsymcount = symtab_hdr->sh_info;
2109 end_local_got = local_got + locsymcount;
83c81bfe
AM
2110 s = htab->sgot;
2111 srel = htab->srelgot;
68fb2e56
AM
2112 for (; local_got < end_local_got; ++local_got)
2113 {
2114 if (*local_got > 0)
4dc86686 2115 {
eea6121a
AM
2116 *local_got = s->size;
2117 s->size += GOT_ENTRY_SIZE;
68fb2e56 2118 if (info->shared)
eea6121a 2119 srel->size += sizeof (Elf32_External_Rela);
4dc86686 2120 }
68fb2e56
AM
2121 else
2122 *local_got = (bfd_vma) -1;
2123 }
74d1c347 2124
68fb2e56
AM
2125 local_plt = end_local_got;
2126 end_local_plt = local_plt + locsymcount;
ebe50bae 2127 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2128 {
2129 /* Won't be used, but be safe. */
2130 for (; local_plt < end_local_plt; ++local_plt)
2131 *local_plt = (bfd_vma) -1;
2132 }
2133 else
2134 {
83c81bfe
AM
2135 s = htab->splt;
2136 srel = htab->srelplt;
74d1c347
AM
2137 for (; local_plt < end_local_plt; ++local_plt)
2138 {
2139 if (*local_plt > 0)
2140 {
eea6121a
AM
2141 *local_plt = s->size;
2142 s->size += PLT_ENTRY_SIZE;
74d1c347 2143 if (info->shared)
eea6121a 2144 srel->size += sizeof (Elf32_External_Rela);
74d1c347
AM
2145 }
2146 else
2147 *local_plt = (bfd_vma) -1;
2148 }
2149 }
30667bf3 2150 }
30667bf3 2151
e5ee5df1
AM
2152 /* Do all the .plt entries without relocs first. The dynamic linker
2153 uses the last .plt reloc to find the end of the .plt (and hence
2154 the start of the .got) for lazy linking. */
c39a58e6 2155 elf_link_hash_traverse (&htab->elf, allocate_plt_static, info);
a8d02d66 2156
98ceb8ce
AM
2157 /* Allocate global sym .plt and .got entries, and space for global
2158 sym dynamic relocs. */
c39a58e6 2159 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
30667bf3
AM
2160
2161 /* The check_relocs and adjust_dynamic_symbol entry points have
2162 determined the sizes of the various dynamic sections. Allocate
2163 memory for them. */
b34976b6 2164 relocs = FALSE;
30667bf3
AM
2165 for (s = dynobj->sections; s != NULL; s = s->next)
2166 {
30667bf3
AM
2167 if ((s->flags & SEC_LINKER_CREATED) == 0)
2168 continue;
2169
83c81bfe 2170 if (s == htab->splt)
68fb2e56 2171 {
83c81bfe 2172 if (htab->need_plt_stub)
68fb2e56
AM
2173 {
2174 /* Make space for the plt stub at the end of the .plt
2175 section. We want this stub right at the end, up
2176 against the .got section. */
83c81bfe 2177 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2178 int pltalign = bfd_section_alignment (dynobj, s);
2179 bfd_size_type mask;
30667bf3 2180
68fb2e56
AM
2181 if (gotalign > pltalign)
2182 bfd_set_section_alignment (dynobj, s, gotalign);
2183 mask = ((bfd_size_type) 1 << gotalign) - 1;
eea6121a 2184 s->size = (s->size + sizeof (plt_stub) + mask) & ~mask;
68fb2e56
AM
2185 }
2186 }
83c81bfe 2187 else if (s == htab->sgot)
68fb2e56
AM
2188 ;
2189 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3 2190 {
eea6121a 2191 if (s->size != 0)
30667bf3 2192 {
4e12ff7f
AM
2193 /* Remember whether there are any reloc sections other
2194 than .rela.plt. */
2195 if (s != htab->srelplt)
b34976b6 2196 relocs = TRUE;
47d89dba 2197
30667bf3
AM
2198 /* We use the reloc_count field as a counter if we need
2199 to copy relocs into the output file. */
2200 s->reloc_count = 0;
2201 }
2202 }
30667bf3
AM
2203 else
2204 {
2205 /* It's not one of our sections, so don't allocate space. */
2206 continue;
2207 }
2208
eea6121a 2209 if (s->size == 0)
30667bf3
AM
2210 {
2211 /* If we don't need this section, strip it from the
2212 output file. This is mostly to handle .rela.bss and
2213 .rela.plt. We must create both sections in
2214 create_dynamic_sections, because they must be created
2215 before the linker maps input sections to output
2216 sections. The linker does that before
2217 adjust_dynamic_symbol is called, and it is that
2218 function which decides whether anything needs to go
2219 into these sections. */
2220 _bfd_strip_section_from_output (info, s);
2221 continue;
2222 }
2223
2224 /* Allocate memory for the section contents. Zero it, because
2225 we may not fill in all the reloc sections. */
eea6121a
AM
2226 s->contents = bfd_zalloc (dynobj, s->size);
2227 if (s->contents == NULL && s->size != 0)
b34976b6 2228 return FALSE;
30667bf3
AM
2229 }
2230
ebe50bae 2231 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2232 {
2233 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2234 actually has nothing to do with the PLT, it is how we
2235 communicate the LTP value of a load module to the dynamic
2236 linker. */
dc810e39 2237#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2238 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
2239
2240 if (!add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 2241 return FALSE;
30667bf3
AM
2242
2243 /* Add some entries to the .dynamic section. We fill in the
2244 values later, in elf32_hppa_finish_dynamic_sections, but we
2245 must add the entries now so that we get the correct size for
2246 the .dynamic section. The DT_DEBUG entry is filled in by the
2247 dynamic linker and used by the debugger. */
dc810e39 2248 if (!info->shared)
30667bf3 2249 {
dc810e39 2250 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2251 return FALSE;
30667bf3
AM
2252 }
2253
eea6121a 2254 if (htab->srelplt->size != 0)
30667bf3 2255 {
dc810e39
AM
2256 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2257 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2258 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2259 return FALSE;
30667bf3
AM
2260 }
2261
2262 if (relocs)
2263 {
dc810e39
AM
2264 if (!add_dynamic_entry (DT_RELA, 0)
2265 || !add_dynamic_entry (DT_RELASZ, 0)
2266 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2267 return FALSE;
30667bf3 2268
98ceb8ce
AM
2269 /* If any dynamic relocs apply to a read-only section,
2270 then we need a DT_TEXTREL entry. */
248866a8 2271 if ((info->flags & DF_TEXTREL) == 0)
c39a58e6 2272 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
98ceb8ce
AM
2273
2274 if ((info->flags & DF_TEXTREL) != 0)
2275 {
2276 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2277 return FALSE;
98ceb8ce 2278 }
30667bf3
AM
2279 }
2280 }
dc810e39 2281#undef add_dynamic_entry
30667bf3 2282
b34976b6 2283 return TRUE;
30667bf3
AM
2284}
2285
30667bf3
AM
2286/* External entry points for sizing and building linker stubs. */
2287
b4655ea9
AM
2288/* Set up various things so that we can make a list of input sections
2289 for each output section included in the link. Returns -1 on error,
cedb70c5 2290 0 when no stubs will be needed, and 1 on success. */
30667bf3 2291
b4655ea9 2292int
c39a58e6 2293elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
30667bf3
AM
2294{
2295 bfd *input_bfd;
b4655ea9
AM
2296 unsigned int bfd_count;
2297 int top_id, top_index;
30667bf3 2298 asection *section;
25f72752 2299 asection **input_list, **list;
dc810e39 2300 bfd_size_type amt;
b4655ea9 2301 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2302
1badb539
AM
2303 /* Count the number of input BFDs and find the top input section id. */
2304 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2305 input_bfd != NULL;
2306 input_bfd = input_bfd->link_next)
2307 {
2308 bfd_count += 1;
25f72752
AM
2309 for (section = input_bfd->sections;
2310 section != NULL;
2311 section = section->next)
2312 {
2313 if (top_id < section->id)
2314 top_id = section->id;
2315 }
30667bf3 2316 }
b4655ea9 2317 htab->bfd_count = bfd_count;
30667bf3 2318
dc810e39 2319 amt = sizeof (struct map_stub) * (top_id + 1);
c39a58e6 2320 htab->stub_group = bfd_zmalloc (amt);
83c81bfe 2321 if (htab->stub_group == NULL)
b4655ea9 2322 return -1;
1badb539 2323
b4655ea9 2324 /* We can't use output_bfd->section_count here to find the top output
1badb539
AM
2325 section index as some sections may have been removed, and
2326 _bfd_strip_section_from_output doesn't renumber the indices. */
2327 for (section = output_bfd->sections, top_index = 0;
2328 section != NULL;
2329 section = section->next)
2330 {
2331 if (top_index < section->index)
2332 top_index = section->index;
2333 }
2334
b4655ea9 2335 htab->top_index = top_index;
dc810e39 2336 amt = sizeof (asection *) * (top_index + 1);
c39a58e6 2337 input_list = bfd_malloc (amt);
b4655ea9 2338 htab->input_list = input_list;
25f72752 2339 if (input_list == NULL)
b4655ea9 2340 return -1;
25f72752 2341
1badb539
AM
2342 /* For sections we aren't interested in, mark their entries with a
2343 value we can check later. */
2344 list = input_list + top_index;
2345 do
2346 *list = bfd_abs_section_ptr;
2347 while (list-- != input_list);
2348
2349 for (section = output_bfd->sections;
2350 section != NULL;
2351 section = section->next)
2352 {
47d89dba 2353 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2354 input_list[section->index] = NULL;
2355 }
2356
b4655ea9
AM
2357 return 1;
2358}
2359
2360/* The linker repeatedly calls this function for each input section,
2361 in the order that input sections are linked into output sections.
2362 Build lists of input sections to determine groupings between which
2363 we may insert linker stubs. */
2364
2365void
c39a58e6 2366elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
b4655ea9
AM
2367{
2368 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2369
2370 if (isec->output_section->index <= htab->top_index)
25f72752 2371 {
b4655ea9
AM
2372 asection **list = htab->input_list + isec->output_section->index;
2373 if (*list != bfd_abs_section_ptr)
25f72752 2374 {
b4655ea9 2375 /* Steal the link_sec pointer for our list. */
83c81bfe 2376#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2377 /* This happens to make the list in reverse order,
2378 which is what we want. */
2379 PREV_SEC (isec) = *list;
2380 *list = isec;
25f72752
AM
2381 }
2382 }
b4655ea9 2383}
25f72752 2384
b4655ea9
AM
2385/* See whether we can group stub sections together. Grouping stub
2386 sections may result in fewer stubs. More importantly, we need to
2387 put all .init* and .fini* stubs at the beginning of the .init or
2388 .fini output sections respectively, because glibc splits the
2389 _init and _fini functions into multiple parts. Putting a stub in
2390 the middle of a function is not a good idea. */
2391
2392static void
c39a58e6
AM
2393group_sections (struct elf32_hppa_link_hash_table *htab,
2394 bfd_size_type stub_group_size,
2395 bfd_boolean stubs_always_before_branch)
b4655ea9
AM
2396{
2397 asection **list = htab->input_list + htab->top_index;
1badb539 2398 do
25f72752
AM
2399 {
2400 asection *tail = *list;
1badb539
AM
2401 if (tail == bfd_abs_section_ptr)
2402 continue;
25f72752
AM
2403 while (tail != NULL)
2404 {
2405 asection *curr;
2406 asection *prev;
2407 bfd_size_type total;
00b28bb0 2408 bfd_boolean big_sec;
25f72752
AM
2409
2410 curr = tail;
eea6121a 2411 total = tail->size;
00b28bb0
AM
2412 big_sec = total >= stub_group_size;
2413
25f72752
AM
2414 while ((prev = PREV_SEC (curr)) != NULL
2415 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2416 < stub_group_size))
25f72752
AM
2417 curr = prev;
2418
2419 /* OK, the size from the start of CURR to the end is less
a248e267 2420 than 240000 bytes and thus can be handled by one stub
25f72752 2421 section. (or the tail section is itself larger than
a248e267 2422 240000 bytes, in which case we may be toast.)
25f72752
AM
2423 We should really be keeping track of the total size of
2424 stubs added here, as stubs contribute to the final output
2425 section size. That's a little tricky, and this way will
a248e267
AM
2426 only break if stubs added total more than 22144 bytes, or
2427 2768 long branch stubs. It seems unlikely for more than
2428 2768 different functions to be called, especially from
2429 code only 240000 bytes long. This limit used to be
2430 250000, but c++ code tends to generate lots of little
2431 functions, and sometimes violated the assumption. */
25f72752
AM
2432 do
2433 {
2434 prev = PREV_SEC (tail);
2435 /* Set up this stub group. */
83c81bfe 2436 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2437 }
2438 while (tail != curr && (tail = prev) != NULL);
2439
a248e267 2440 /* But wait, there's more! Input sections up to 240000
00b28bb0
AM
2441 bytes before the stub section can be handled by it too.
2442 Don't do this if we have a really large section after the
2443 stubs, as adding more stubs increases the chance that
2444 branches may not reach into the stub section. */
2445 if (!stubs_always_before_branch && !big_sec)
25f72752 2446 {
47d89dba
AM
2447 total = 0;
2448 while (prev != NULL
2449 && ((total += tail->output_offset - prev->output_offset)
2450 < stub_group_size))
2451 {
2452 tail = prev;
2453 prev = PREV_SEC (tail);
83c81bfe 2454 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2455 }
25f72752
AM
2456 }
2457 tail = prev;
2458 }
2459 }
b4655ea9
AM
2460 while (list-- != htab->input_list);
2461 free (htab->input_list);
1badb539 2462#undef PREV_SEC
b4655ea9
AM
2463}
2464
2465/* Read in all local syms for all input bfds, and create hash entries
2466 for export stubs if we are building a multi-subspace shared lib.
2467 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2468
2469static int
c39a58e6 2470get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
b4655ea9
AM
2471{
2472 unsigned int bfd_indx;
2473 Elf_Internal_Sym *local_syms, **all_local_syms;
2474 int stub_changed = 0;
2475 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3
AM
2476
2477 /* We want to read in symbol extension records only once. To do this
2478 we need to read in the local symbols in parallel and save them for
2479 later use; so hold pointers to the local symbols in an array. */
b4655ea9 2480 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
c39a58e6 2481 all_local_syms = bfd_zmalloc (amt);
b4655ea9 2482 htab->all_local_syms = all_local_syms;
30667bf3 2483 if (all_local_syms == NULL)
b4655ea9 2484 return -1;
30667bf3
AM
2485
2486 /* Walk over all the input BFDs, swapping in local symbols.
2487 If we are creating a shared library, create hash entries for the
2488 export stubs. */
b4655ea9 2489 for (bfd_indx = 0;
30667bf3 2490 input_bfd != NULL;
25f72752 2491 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2492 {
2493 Elf_Internal_Shdr *symtab_hdr;
edd21aca 2494
252b5132
RH
2495 /* We'll need the symbol table in a second. */
2496 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2497 if (symtab_hdr->sh_info == 0)
2498 continue;
2499
6cdc0ccc
AM
2500 /* We need an array of the local symbols attached to the input bfd. */
2501 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
edd21aca 2502 if (local_syms == NULL)
edd21aca 2503 {
6cdc0ccc
AM
2504 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2505 symtab_hdr->sh_info, 0,
2506 NULL, NULL, NULL);
2507 /* Cache them for elf_link_input_bfd. */
2508 symtab_hdr->contents = (unsigned char *) local_syms;
edd21aca 2509 }
6cdc0ccc
AM
2510 if (local_syms == NULL)
2511 return -1;
edd21aca 2512
6cdc0ccc 2513 all_local_syms[bfd_indx] = local_syms;
edd21aca 2514
83c81bfe 2515 if (info->shared && htab->multi_subspace)
30667bf3 2516 {
25f72752
AM
2517 struct elf_link_hash_entry **sym_hashes;
2518 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2519 unsigned int symcount;
2520
2521 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2522 - symtab_hdr->sh_info);
25f72752
AM
2523 sym_hashes = elf_sym_hashes (input_bfd);
2524 end_hashes = sym_hashes + symcount;
30667bf3
AM
2525
2526 /* Look through the global syms for functions; We need to
2527 build export stubs for all globally visible functions. */
25f72752 2528 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2529 {
2530 struct elf32_hppa_link_hash_entry *hash;
2531
25f72752 2532 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2533
2534 while (hash->elf.root.type == bfd_link_hash_indirect
2535 || hash->elf.root.type == bfd_link_hash_warning)
2536 hash = ((struct elf32_hppa_link_hash_entry *)
2537 hash->elf.root.u.i.link);
2538
2539 /* At this point in the link, undefined syms have been
2540 resolved, so we need to check that the symbol was
2541 defined in this BFD. */
2542 if ((hash->elf.root.type == bfd_link_hash_defined
2543 || hash->elf.root.type == bfd_link_hash_defweak)
2544 && hash->elf.type == STT_FUNC
2545 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2546 && (hash->elf.root.u.def.section->output_section->owner
2547 == output_bfd)
30667bf3
AM
2548 && hash->elf.root.u.def.section->owner == input_bfd
2549 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2550 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2551 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2552 {
2553 asection *sec;
2554 const char *stub_name;
2555 struct elf32_hppa_stub_hash_entry *stub_entry;
2556
2557 sec = hash->elf.root.u.def.section;
2558 stub_name = hash->elf.root.root.string;
83c81bfe 2559 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3 2560 stub_name,
b34976b6 2561 FALSE, FALSE);
30667bf3
AM
2562 if (stub_entry == NULL)
2563 {
83c81bfe 2564 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3 2565 if (!stub_entry)
b4655ea9 2566 return -1;
30667bf3
AM
2567
2568 stub_entry->target_value = hash->elf.root.u.def.value;
2569 stub_entry->target_section = hash->elf.root.u.def.section;
2570 stub_entry->stub_type = hppa_stub_export;
2571 stub_entry->h = hash;
2572 stub_changed = 1;
2573 }
2574 else
2575 {
2576 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2577 bfd_archive_filename (input_bfd),
2578 stub_name);
30667bf3
AM
2579 }
2580 }
2581 }
30667bf3
AM
2582 }
2583 }
edd21aca 2584
b4655ea9
AM
2585 return stub_changed;
2586}
2587
2588/* Determine and set the size of the stub section for a final link.
2589
2590 The basic idea here is to examine all the relocations looking for
2591 PC-relative calls to a target that is unreachable with a "bl"
2592 instruction. */
2593
b34976b6 2594bfd_boolean
c39a58e6
AM
2595elf32_hppa_size_stubs
2596 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2597 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2598 asection * (*add_stub_section) (const char *, asection *),
2599 void (*layout_sections_again) (void))
b4655ea9
AM
2600{
2601 bfd_size_type stub_group_size;
b34976b6
AM
2602 bfd_boolean stubs_always_before_branch;
2603 bfd_boolean stub_changed;
b4655ea9
AM
2604 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2605
2606 /* Stash our params away. */
2607 htab->stub_bfd = stub_bfd;
2608 htab->multi_subspace = multi_subspace;
2609 htab->add_stub_section = add_stub_section;
2610 htab->layout_sections_again = layout_sections_again;
2611 stubs_always_before_branch = group_size < 0;
2612 if (group_size < 0)
2613 stub_group_size = -group_size;
2614 else
2615 stub_group_size = group_size;
2616 if (stub_group_size == 1)
2617 {
2618 /* Default values. */
acc990f2
AM
2619 if (stubs_always_before_branch)
2620 {
2621 stub_group_size = 7680000;
2622 if (htab->has_17bit_branch || htab->multi_subspace)
2623 stub_group_size = 240000;
2624 if (htab->has_12bit_branch)
2625 stub_group_size = 7500;
2626 }
2627 else
2628 {
2629 stub_group_size = 6971392;
2630 if (htab->has_17bit_branch || htab->multi_subspace)
2631 stub_group_size = 217856;
2632 if (htab->has_12bit_branch)
2633 stub_group_size = 6808;
2634 }
b4655ea9
AM
2635 }
2636
2637 group_sections (htab, stub_group_size, stubs_always_before_branch);
2638
2639 switch (get_local_syms (output_bfd, info->input_bfds, info))
2640 {
2641 default:
2642 if (htab->all_local_syms)
2643 goto error_ret_free_local;
b34976b6 2644 return FALSE;
b4655ea9
AM
2645
2646 case 0:
b34976b6 2647 stub_changed = FALSE;
b4655ea9
AM
2648 break;
2649
2650 case 1:
b34976b6 2651 stub_changed = TRUE;
b4655ea9
AM
2652 break;
2653 }
2654
edd21aca
AM
2655 while (1)
2656 {
b4655ea9
AM
2657 bfd *input_bfd;
2658 unsigned int bfd_indx;
30667bf3
AM
2659 asection *stub_sec;
2660
25f72752 2661 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2662 input_bfd != NULL;
25f72752 2663 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2664 {
2665 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2666 asection *section;
2667 Elf_Internal_Sym *local_syms;
30667bf3
AM
2668
2669 /* We'll need the symbol table in a second. */
2670 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2671 if (symtab_hdr->sh_info == 0)
2672 continue;
2673
b4655ea9 2674 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2675
2676 /* Walk over each section attached to the input bfd. */
2677 for (section = input_bfd->sections;
2678 section != NULL;
25f72752 2679 section = section->next)
30667bf3 2680 {
30667bf3
AM
2681 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2682
2683 /* If there aren't any relocs, then there's nothing more
2684 to do. */
2685 if ((section->flags & SEC_RELOC) == 0
2686 || section->reloc_count == 0)
2687 continue;
2688
25f72752
AM
2689 /* If this section is a link-once section that will be
2690 discarded, then don't create any stubs. */
2691 if (section->output_section == NULL
2692 || section->output_section->owner != output_bfd)
2693 continue;
2694
1e2f5b6e
AM
2695 /* Get the relocs. */
2696 internal_relocs
c39a58e6 2697 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 2698 info->keep_memory);
30667bf3 2699 if (internal_relocs == NULL)
1e2f5b6e 2700 goto error_ret_free_local;
30667bf3
AM
2701
2702 /* Now examine each relocation. */
2703 irela = internal_relocs;
2704 irelaend = irela + section->reloc_count;
2705 for (; irela < irelaend; irela++)
2706 {
2707 unsigned int r_type, r_indx;
2708 enum elf32_hppa_stub_type stub_type;
2709 struct elf32_hppa_stub_hash_entry *stub_entry;
2710 asection *sym_sec;
2711 bfd_vma sym_value;
2712 bfd_vma destination;
2713 struct elf32_hppa_link_hash_entry *hash;
2714 char *stub_name;
25f72752 2715 const asection *id_sec;
30667bf3
AM
2716
2717 r_type = ELF32_R_TYPE (irela->r_info);
2718 r_indx = ELF32_R_SYM (irela->r_info);
2719
2720 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2721 {
2722 bfd_set_error (bfd_error_bad_value);
1e2f5b6e
AM
2723 error_ret_free_internal:
2724 if (elf_section_data (section)->relocs == NULL)
2725 free (internal_relocs);
2726 goto error_ret_free_local;
30667bf3
AM
2727 }
2728
2729 /* Only look for stubs on call instructions. */
2730 if (r_type != (unsigned int) R_PARISC_PCREL12F
2731 && r_type != (unsigned int) R_PARISC_PCREL17F
2732 && r_type != (unsigned int) R_PARISC_PCREL22F)
2733 continue;
2734
2735 /* Now determine the call target, its name, value,
2736 section. */
2737 sym_sec = NULL;
2738 sym_value = 0;
2739 destination = 0;
2740 hash = NULL;
2741 if (r_indx < symtab_hdr->sh_info)
2742 {
2743 /* It's a local symbol. */
2744 Elf_Internal_Sym *sym;
2745 Elf_Internal_Shdr *hdr;
2746
2747 sym = local_syms + r_indx;
2748 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
2749 sym_sec = hdr->bfd_section;
2750 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2751 sym_value = sym->st_value;
2752 destination = (sym_value + irela->r_addend
2753 + sym_sec->output_offset
2754 + sym_sec->output_section->vma);
2755 }
2756 else
2757 {
2758 /* It's an external symbol. */
2759 int e_indx;
2760
2761 e_indx = r_indx - symtab_hdr->sh_info;
2762 hash = ((struct elf32_hppa_link_hash_entry *)
2763 elf_sym_hashes (input_bfd)[e_indx]);
2764
2765 while (hash->elf.root.type == bfd_link_hash_indirect
2766 || hash->elf.root.type == bfd_link_hash_warning)
2767 hash = ((struct elf32_hppa_link_hash_entry *)
2768 hash->elf.root.u.i.link);
2769
2770 if (hash->elf.root.type == bfd_link_hash_defined
2771 || hash->elf.root.type == bfd_link_hash_defweak)
2772 {
2773 sym_sec = hash->elf.root.u.def.section;
2774 sym_value = hash->elf.root.u.def.value;
2775 if (sym_sec->output_section != NULL)
2776 destination = (sym_value + irela->r_addend
2777 + sym_sec->output_offset
2778 + sym_sec->output_section->vma);
2779 }
2780 else if (hash->elf.root.type == bfd_link_hash_undefweak)
c432ba1a
AM
2781 {
2782 if (! info->shared)
2783 continue;
2784 }
30667bf3 2785 else if (hash->elf.root.type == bfd_link_hash_undefined)
c432ba1a 2786 {
59c2e50f 2787 if (! (info->unresolved_syms_in_objects == RM_IGNORE
c432ba1a
AM
2788 && (ELF_ST_VISIBILITY (hash->elf.other)
2789 == STV_DEFAULT)
2790 && hash->elf.type != STT_PARISC_MILLI))
2791 continue;
2792 }
30667bf3
AM
2793 else
2794 {
2795 bfd_set_error (bfd_error_bad_value);
2796 goto error_ret_free_internal;
2797 }
2798 }
2799
2800 /* Determine what (if any) linker stub is needed. */
2801 stub_type = hppa_type_of_stub (section, irela, hash,
a252afa4 2802 destination, info);
30667bf3
AM
2803 if (stub_type == hppa_stub_none)
2804 continue;
2805
25f72752 2806 /* Support for grouping stub sections. */
83c81bfe 2807 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2808
30667bf3 2809 /* Get the name of this stub. */
25f72752 2810 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
2811 if (!stub_name)
2812 goto error_ret_free_internal;
2813
83c81bfe 2814 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3 2815 stub_name,
b34976b6 2816 FALSE, FALSE);
30667bf3
AM
2817 if (stub_entry != NULL)
2818 {
2819 /* The proper stub has already been created. */
2820 free (stub_name);
2821 continue;
2822 }
2823
83c81bfe 2824 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
2825 if (stub_entry == NULL)
2826 {
2827 free (stub_name);
1e2f5b6e 2828 goto error_ret_free_internal;
30667bf3
AM
2829 }
2830
2831 stub_entry->target_value = sym_value;
2832 stub_entry->target_section = sym_sec;
2833 stub_entry->stub_type = stub_type;
2834 if (info->shared)
2835 {
2836 if (stub_type == hppa_stub_import)
2837 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 2838 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
2839 stub_entry->stub_type = hppa_stub_long_branch_shared;
2840 }
2841 stub_entry->h = hash;
b34976b6 2842 stub_changed = TRUE;
30667bf3
AM
2843 }
2844
2845 /* We're done with the internal relocs, free them. */
1e2f5b6e
AM
2846 if (elf_section_data (section)->relocs == NULL)
2847 free (internal_relocs);
30667bf3
AM
2848 }
2849 }
2850
2851 if (!stub_changed)
2852 break;
2853
2854 /* OK, we've added some stubs. Find out the new size of the
2855 stub sections. */
83c81bfe 2856 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
2857 stub_sec != NULL;
2858 stub_sec = stub_sec->next)
eea6121a 2859 stub_sec->size = 0;
74d1c347 2860
83c81bfe 2861 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 2862
30667bf3 2863 /* Ask the linker to do its stuff. */
83c81bfe 2864 (*htab->layout_sections_again) ();
b34976b6 2865 stub_changed = FALSE;
30667bf3
AM
2866 }
2867
6cdc0ccc 2868 free (htab->all_local_syms);
b34976b6 2869 return TRUE;
30667bf3
AM
2870
2871 error_ret_free_local:
b4655ea9 2872 free (htab->all_local_syms);
b34976b6 2873 return FALSE;
30667bf3
AM
2874}
2875
30667bf3
AM
2876/* For a final link, this function is called after we have sized the
2877 stubs to provide a value for __gp. */
2878
b34976b6 2879bfd_boolean
c39a58e6 2880elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
30667bf3 2881{
b4655ea9
AM
2882 struct bfd_link_hash_entry *h;
2883 asection *sec = NULL;
2884 bfd_vma gp_val = 0;
83c81bfe 2885 struct elf32_hppa_link_hash_table *htab;
30667bf3 2886
83c81bfe 2887 htab = hppa_link_hash_table (info);
b34976b6 2888 h = bfd_link_hash_lookup (&htab->elf.root, "$global$", FALSE, FALSE, FALSE);
30667bf3 2889
df8634e3 2890 if (h != NULL
b4655ea9
AM
2891 && (h->type == bfd_link_hash_defined
2892 || h->type == bfd_link_hash_defweak))
30667bf3 2893 {
b4655ea9
AM
2894 gp_val = h->u.def.value;
2895 sec = h->u.def.section;
30667bf3
AM
2896 }
2897 else
2898 {
0eddce27
AM
2899 asection *splt = bfd_get_section_by_name (abfd, ".plt");
2900 asection *sgot = bfd_get_section_by_name (abfd, ".got");
b4655ea9 2901
74d1c347
AM
2902 /* Choose to point our LTP at, in this order, one of .plt, .got,
2903 or .data, if these sections exist. In the case of choosing
2904 .plt try to make the LTP ideal for addressing anywhere in the
2905 .plt or .got with a 14 bit signed offset. Typically, the end
2906 of the .plt is the start of the .got, so choose .plt + 0x2000
2907 if either the .plt or .got is larger than 0x2000. If both
2908 the .plt and .got are smaller than 0x2000, choose the end of
2909 the .plt section. */
225247f0
JT
2910 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
2911 ? NULL : splt;
74d1c347 2912 if (sec != NULL)
30667bf3 2913 {
eea6121a
AM
2914 gp_val = sec->size;
2915 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
74d1c347
AM
2916 {
2917 gp_val = 0x2000;
2918 }
2919 }
2920 else
2921 {
b4655ea9 2922 sec = sgot;
74d1c347
AM
2923 if (sec != NULL)
2924 {
225247f0
JT
2925 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
2926 {
2927 /* We know we don't have a .plt. If .got is large,
2928 offset our LTP. */
2929 if (sec->size > 0x2000)
2930 gp_val = 0x2000;
2931 }
74d1c347
AM
2932 }
2933 else
2934 {
2935 /* No .plt or .got. Who cares what the LTP is? */
2936 sec = bfd_get_section_by_name (abfd, ".data");
2937 }
30667bf3 2938 }
df8634e3
AM
2939
2940 if (h != NULL)
2941 {
b4655ea9
AM
2942 h->type = bfd_link_hash_defined;
2943 h->u.def.value = gp_val;
df8634e3 2944 if (sec != NULL)
b4655ea9 2945 h->u.def.section = sec;
df8634e3 2946 else
b4655ea9 2947 h->u.def.section = bfd_abs_section_ptr;
df8634e3 2948 }
30667bf3
AM
2949 }
2950
b32b5d6e 2951 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
2952 gp_val += sec->output_section->vma + sec->output_offset;
2953
2954 elf_gp (abfd) = gp_val;
b34976b6 2955 return TRUE;
30667bf3
AM
2956}
2957
30667bf3
AM
2958/* Build all the stubs associated with the current output file. The
2959 stubs are kept in a hash table attached to the main linker hash
2960 table. We also set up the .plt entries for statically linked PIC
2961 functions here. This function is called via hppaelf_finish in the
2962 linker. */
2963
b34976b6 2964bfd_boolean
c39a58e6 2965elf32_hppa_build_stubs (struct bfd_link_info *info)
30667bf3
AM
2966{
2967 asection *stub_sec;
2968 struct bfd_hash_table *table;
83c81bfe 2969 struct elf32_hppa_link_hash_table *htab;
30667bf3 2970
83c81bfe 2971 htab = hppa_link_hash_table (info);
30667bf3 2972
83c81bfe 2973 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
2974 stub_sec != NULL;
2975 stub_sec = stub_sec->next)
2976 {
dc810e39 2977 bfd_size_type size;
30667bf3
AM
2978
2979 /* Allocate memory to hold the linker stubs. */
eea6121a 2980 size = stub_sec->size;
c39a58e6 2981 stub_sec->contents = bfd_zalloc (htab->stub_bfd, size);
30667bf3 2982 if (stub_sec->contents == NULL && size != 0)
b34976b6 2983 return FALSE;
eea6121a 2984 stub_sec->size = 0;
30667bf3
AM
2985 }
2986
2987 /* Build the stubs as directed by the stub hash table. */
83c81bfe 2988 table = &htab->stub_hash_table;
30667bf3
AM
2989 bfd_hash_traverse (table, hppa_build_one_stub, info);
2990
b34976b6 2991 return TRUE;
30667bf3
AM
2992}
2993
c46b7515
AM
2994/* Perform a final link. */
2995
b34976b6 2996static bfd_boolean
c39a58e6 2997elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
c46b7515 2998{
4dc86686 2999 /* Invoke the regular ELF linker to do all the work. */
c152c796 3000 if (!bfd_elf_final_link (abfd, info))
b34976b6 3001 return FALSE;
c46b7515
AM
3002
3003 /* If we're producing a final executable, sort the contents of the
985142a4 3004 unwind section. */
46fe4e66 3005 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3006}
3007
3008/* Record the lowest address for the data and text segments. */
3009
3010static void
c39a58e6
AM
3011hppa_record_segment_addr (bfd *abfd ATTRIBUTE_UNUSED,
3012 asection *section,
3013 void *data)
c46b7515 3014{
83c81bfe 3015 struct elf32_hppa_link_hash_table *htab;
c46b7515 3016
83c81bfe 3017 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3018
3019 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3020 {
3021 bfd_vma value = section->vma - section->filepos;
3022
3023 if ((section->flags & SEC_READONLY) != 0)
3024 {
83c81bfe
AM
3025 if (value < htab->text_segment_base)
3026 htab->text_segment_base = value;
c46b7515
AM
3027 }
3028 else
3029 {
83c81bfe
AM
3030 if (value < htab->data_segment_base)
3031 htab->data_segment_base = value;
c46b7515
AM
3032 }
3033 }
3034}
3035
30667bf3
AM
3036/* Perform a relocation as part of a final link. */
3037
3038static bfd_reloc_status_type
c39a58e6
AM
3039final_link_relocate (asection *input_section,
3040 bfd_byte *contents,
3041 const Elf_Internal_Rela *rel,
3042 bfd_vma value,
3043 struct elf32_hppa_link_hash_table *htab,
3044 asection *sym_sec,
a252afa4
DA
3045 struct elf32_hppa_link_hash_entry *h,
3046 struct bfd_link_info *info)
30667bf3
AM
3047{
3048 int insn;
3049 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
a252afa4 3050 unsigned int orig_r_type = r_type;
30667bf3
AM
3051 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3052 int r_format = howto->bitsize;
3053 enum hppa_reloc_field_selector_type_alt r_field;
3054 bfd *input_bfd = input_section->owner;
3055 bfd_vma offset = rel->r_offset;
3056 bfd_vma max_branch_offset = 0;
3057 bfd_byte *hit_data = contents + offset;
3058 bfd_signed_vma addend = rel->r_addend;
3059 bfd_vma location;
3060 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3061 int val;
3062
3063 if (r_type == R_PARISC_NONE)
3064 return bfd_reloc_ok;
3065
3066 insn = bfd_get_32 (input_bfd, hit_data);
3067
3068 /* Find out where we are and where we're going. */
3069 location = (offset +
3070 input_section->output_offset +
3071 input_section->output_section->vma);
3072
a252afa4
DA
3073 /* If we are not building a shared library, convert DLTIND relocs to
3074 DPREL relocs. */
3075 if (!info->shared)
3076 {
3077 switch (r_type)
4fc8051d
AM
3078 {
3079 case R_PARISC_DLTIND21L:
3080 r_type = R_PARISC_DPREL21L;
a252afa4
DA
3081 break;
3082
4fc8051d
AM
3083 case R_PARISC_DLTIND14R:
3084 r_type = R_PARISC_DPREL14R;
a252afa4
DA
3085 break;
3086
4fc8051d
AM
3087 case R_PARISC_DLTIND14F:
3088 r_type = R_PARISC_DPREL14F;
a252afa4
DA
3089 break;
3090 }
3091 }
3092
30667bf3
AM
3093 switch (r_type)
3094 {
3095 case R_PARISC_PCREL12F:
3096 case R_PARISC_PCREL17F:
3097 case R_PARISC_PCREL22F:
067fa4a6
AM
3098 /* If this call should go via the plt, find the import stub in
3099 the stub hash. */
30667bf3
AM
3100 if (sym_sec == NULL
3101 || sym_sec->output_section == NULL
12cca0d2 3102 || (h != NULL
067fa4a6 3103 && h->elf.plt.offset != (bfd_vma) -1
a252afa4
DA
3104 && h->elf.dynindx != -1
3105 && !h->plabel
3106 && (info->shared
3107 || !(h->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
3108 || h->elf.root.type == bfd_link_hash_defweak)))
30667bf3
AM
3109 {
3110 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3111 h, rel, htab);
30667bf3
AM
3112 if (stub_entry != NULL)
3113 {
3114 value = (stub_entry->stub_offset
3115 + stub_entry->stub_sec->output_offset
3116 + stub_entry->stub_sec->output_section->vma);
3117 addend = 0;
3118 }
3119 else if (sym_sec == NULL && h != NULL
3120 && h->elf.root.type == bfd_link_hash_undefweak)
3121 {
db20fd76
AM
3122 /* It's OK if undefined weak. Calls to undefined weak
3123 symbols behave as if the "called" function
3124 immediately returns. We can thus call to a weak
3125 function without first checking whether the function
3126 is defined. */
30667bf3 3127 value = location;
db20fd76 3128 addend = 8;
30667bf3
AM
3129 }
3130 else
f09ebc7d 3131 return bfd_reloc_undefined;
30667bf3
AM
3132 }
3133 /* Fall thru. */
3134
3135 case R_PARISC_PCREL21L:
3136 case R_PARISC_PCREL17C:
3137 case R_PARISC_PCREL17R:
3138 case R_PARISC_PCREL14R:
3139 case R_PARISC_PCREL14F:
36751eee 3140 case R_PARISC_PCREL32:
30667bf3
AM
3141 /* Make it a pc relative offset. */
3142 value -= location;
3143 addend -= 8;
3144 break;
3145
3146 case R_PARISC_DPREL21L:
3147 case R_PARISC_DPREL14R:
3148 case R_PARISC_DPREL14F:
a252afa4
DA
3149 /* Convert instructions that use the linkage table pointer (r19) to
3150 instructions that use the global data pointer (dp). This is the
3151 most efficient way of using PIC code in an incomplete executable,
3152 but the user must follow the standard runtime conventions for
3153 accessing data for this to work. */
3154 if (orig_r_type == R_PARISC_DLTIND21L)
3155 {
3156 /* Convert addil instructions if the original reloc was a
3157 DLTIND21L. GCC sometimes uses a register other than r19 for
3158 the operation, so we must convert any addil instruction
3159 that uses this relocation. */
3160 if ((insn & 0xfc000000) == ((int) OP_ADDIL << 26))
3161 insn = ADDIL_DP;
3162 else
3163 /* We must have a ldil instruction. It's too hard to find
3164 and convert the associated add instruction, so issue an
3165 error. */
3166 (*_bfd_error_handler)
4fc8051d 3167 (_("%s(%s+0x%lx): %s fixup for insn 0x%x is not supported in a non-shared link"),
a252afa4
DA
3168 bfd_archive_filename (input_bfd),
3169 input_section->name,
3170 (long) rel->r_offset,
3171 howto->name,
3172 insn);
3173 }
3174 else if (orig_r_type == R_PARISC_DLTIND14F)
3175 {
3176 /* This must be a format 1 load/store. Change the base
3177 register to dp. */
3178 insn = (insn & 0xfc1ffff) | (27 << 21);
3179 }
3180
30667bf3 3181 /* For all the DP relative relocations, we need to examine the symbol's
95d0f04a
DA
3182 section. If it has no section or if it's a code section, then
3183 "data pointer relative" makes no sense. In that case we don't
3184 adjust the "value", and for 21 bit addil instructions, we change the
3185 source addend register from %dp to %r0. This situation commonly
3186 arises for undefined weak symbols and when a variable's "constness"
30667bf3
AM
3187 is declared differently from the way the variable is defined. For
3188 instance: "extern int foo" with foo defined as "const int foo". */
95d0f04a 3189 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
30667bf3
AM
3190 {
3191 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3192 == (((int) OP_ADDIL << 26) | (27 << 21)))
3193 {
3194 insn &= ~ (0x1f << 21);
067fa4a6 3195#if 0 /* debug them. */
30667bf3
AM
3196 (*_bfd_error_handler)
3197 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3198 bfd_archive_filename (input_bfd),
30667bf3
AM
3199 input_section->name,
3200 (long) rel->r_offset,
3201 howto->name);
3202#endif
3203 }
3204 /* Now try to make things easy for the dynamic linker. */
3205
3206 break;
3207 }
74d1c347 3208 /* Fall thru. */
30667bf3
AM
3209
3210 case R_PARISC_DLTIND21L:
3211 case R_PARISC_DLTIND14R:
3212 case R_PARISC_DLTIND14F:
3213 value -= elf_gp (input_section->output_section->owner);
3214 break;
3215
c46b7515
AM
3216 case R_PARISC_SEGREL32:
3217 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3218 value -= htab->text_segment_base;
c46b7515 3219 else
83c81bfe 3220 value -= htab->data_segment_base;
c46b7515
AM
3221 break;
3222
30667bf3
AM
3223 default:
3224 break;
3225 }
3226
3227 switch (r_type)
3228 {
3229 case R_PARISC_DIR32:
47d89dba 3230 case R_PARISC_DIR14F:
30667bf3
AM
3231 case R_PARISC_DIR17F:
3232 case R_PARISC_PCREL17C:
3233 case R_PARISC_PCREL14F:
36751eee 3234 case R_PARISC_PCREL32:
30667bf3
AM
3235 case R_PARISC_DPREL14F:
3236 case R_PARISC_PLABEL32:
3237 case R_PARISC_DLTIND14F:
3238 case R_PARISC_SEGBASE:
3239 case R_PARISC_SEGREL32:
3240 r_field = e_fsel;
3241 break;
3242
1bf42538 3243 case R_PARISC_DLTIND21L:
30667bf3 3244 case R_PARISC_PCREL21L:
30667bf3 3245 case R_PARISC_PLABEL21L:
1bf42538
JL
3246 r_field = e_lsel;
3247 break;
3248
3249 case R_PARISC_DIR21L:
3250 case R_PARISC_DPREL21L:
30667bf3
AM
3251 r_field = e_lrsel;
3252 break;
3253
30667bf3 3254 case R_PARISC_PCREL17R:
30667bf3 3255 case R_PARISC_PCREL14R:
30667bf3
AM
3256 case R_PARISC_PLABEL14R:
3257 case R_PARISC_DLTIND14R:
1bf42538
JL
3258 r_field = e_rsel;
3259 break;
3260
3261 case R_PARISC_DIR17R:
3262 case R_PARISC_DIR14R:
3263 case R_PARISC_DPREL14R:
30667bf3
AM
3264 r_field = e_rrsel;
3265 break;
3266
3267 case R_PARISC_PCREL12F:
3268 case R_PARISC_PCREL17F:
3269 case R_PARISC_PCREL22F:
3270 r_field = e_fsel;
3271
3272 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3273 {
3274 max_branch_offset = (1 << (17-1)) << 2;
3275 }
3276 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3277 {
3278 max_branch_offset = (1 << (12-1)) << 2;
3279 }
3280 else
3281 {
3282 max_branch_offset = (1 << (22-1)) << 2;
3283 }
3284
3285 /* sym_sec is NULL on undefined weak syms or when shared on
3286 undefined syms. We've already checked for a stub for the
3287 shared undefined case. */
3288 if (sym_sec == NULL)
3289 break;
3290
3291 /* If the branch is out of reach, then redirect the
3292 call to the local stub for this function. */
3293 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3294 {
3295 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3296 h, rel, htab);
30667bf3 3297 if (stub_entry == NULL)
f09ebc7d 3298 return bfd_reloc_undefined;
30667bf3
AM
3299
3300 /* Munge up the value and addend so that we call the stub
3301 rather than the procedure directly. */
3302 value = (stub_entry->stub_offset
3303 + stub_entry->stub_sec->output_offset
3304 + stub_entry->stub_sec->output_section->vma
3305 - location);
3306 addend = -8;
3307 }
3308 break;
3309
3310 /* Something we don't know how to handle. */
3311 default:
3312 return bfd_reloc_notsupported;
3313 }
3314
3315 /* Make sure we can reach the stub. */
3316 if (max_branch_offset != 0
3317 && value + addend + max_branch_offset >= 2*max_branch_offset)
3318 {
3319 (*_bfd_error_handler)
3320 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3321 bfd_archive_filename (input_bfd),
30667bf3
AM
3322 input_section->name,
3323 (long) rel->r_offset,
3324 stub_entry->root.string);
ce757d15 3325 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3326 return bfd_reloc_notsupported;
3327 }
3328
3329 val = hppa_field_adjust (value, addend, r_field);
3330
3331 switch (r_type)
3332 {
3333 case R_PARISC_PCREL12F:
3334 case R_PARISC_PCREL17C:
3335 case R_PARISC_PCREL17F:
3336 case R_PARISC_PCREL17R:
3337 case R_PARISC_PCREL22F:
3338 case R_PARISC_DIR17F:
3339 case R_PARISC_DIR17R:
3340 /* This is a branch. Divide the offset by four.
3341 Note that we need to decide whether it's a branch or
3342 otherwise by inspecting the reloc. Inspecting insn won't
3343 work as insn might be from a .word directive. */
3344 val >>= 2;
3345 break;
3346
3347 default:
3348 break;
3349 }
3350
3351 insn = hppa_rebuild_insn (insn, val, r_format);
3352
3353 /* Update the instruction word. */
74d1c347 3354 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3355 return bfd_reloc_ok;
3356}
3357
30667bf3
AM
3358/* Relocate an HPPA ELF section. */
3359
b34976b6 3360static bfd_boolean
c39a58e6
AM
3361elf32_hppa_relocate_section (bfd *output_bfd,
3362 struct bfd_link_info *info,
3363 bfd *input_bfd,
3364 asection *input_section,
3365 bfd_byte *contents,
3366 Elf_Internal_Rela *relocs,
3367 Elf_Internal_Sym *local_syms,
3368 asection **local_sections)
30667bf3 3369{
30667bf3 3370 bfd_vma *local_got_offsets;
83c81bfe 3371 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3372 Elf_Internal_Shdr *symtab_hdr;
3373 Elf_Internal_Rela *rel;
3374 Elf_Internal_Rela *relend;
30667bf3 3375
1049f94e 3376 if (info->relocatable)
b34976b6 3377 return TRUE;
f0fe0e16 3378
30667bf3
AM
3379 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3380
83c81bfe 3381 htab = hppa_link_hash_table (info);
74d1c347 3382 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3383
3384 rel = relocs;
3385 relend = relocs + input_section->reloc_count;
3386 for (; rel < relend; rel++)
3387 {
3388 unsigned int r_type;
3389 reloc_howto_type *howto;
3390 unsigned int r_symndx;
3391 struct elf32_hppa_link_hash_entry *h;
3392 Elf_Internal_Sym *sym;
3393 asection *sym_sec;
3394 bfd_vma relocation;
3395 bfd_reloc_status_type r;
3396 const char *sym_name;
b34976b6
AM
3397 bfd_boolean plabel;
3398 bfd_boolean warned_undef;
30667bf3
AM
3399
3400 r_type = ELF32_R_TYPE (rel->r_info);
3401 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3402 {
3403 bfd_set_error (bfd_error_bad_value);
b34976b6 3404 return FALSE;
30667bf3
AM
3405 }
3406 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3407 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3408 continue;
3409
30667bf3 3410 /* This is a final link. */
f0fe0e16 3411 r_symndx = ELF32_R_SYM (rel->r_info);
30667bf3
AM
3412 h = NULL;
3413 sym = NULL;
3414 sym_sec = NULL;
b34976b6 3415 warned_undef = FALSE;
30667bf3
AM
3416 if (r_symndx < symtab_hdr->sh_info)
3417 {
3418 /* This is a local symbol, h defaults to NULL. */
3419 sym = local_syms + r_symndx;
3420 sym_sec = local_sections[r_symndx];
8517fae7 3421 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rel);
30667bf3
AM
3422 }
3423 else
3424 {
560e09e9
NC
3425 struct elf_link_hash_entry *hh;
3426 bfd_boolean unresolved_reloc;
b2a8e766 3427 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
560e09e9 3428
b2a8e766
AM
3429 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
3430 r_symndx, symtab_hdr, sym_hashes,
3431 hh, sym_sec, relocation,
3432 unresolved_reloc, warned_undef);
560e09e9
NC
3433
3434 if (relocation == 0
3435 && hh->root.type != bfd_link_hash_defined
3436 && hh->root.type != bfd_link_hash_defweak
3437 && hh->root.type != bfd_link_hash_undefweak)
4fc8051d 3438 {
59c2e50f 3439 if (info->unresolved_syms_in_objects == RM_IGNORE
560e09e9
NC
3440 && ELF_ST_VISIBILITY (hh->other) == STV_DEFAULT
3441 && hh->type == STT_PARISC_MILLI)
3442 {
3443 if (! info->callbacks->undefined_symbol
3444 (info, hh->root.root.string, input_bfd,
59c2e50f 3445 input_section, rel->r_offset, FALSE))
560e09e9
NC
3446 return FALSE;
3447 warned_undef = TRUE;
3448 }
30667bf3 3449 }
560e09e9 3450 h = (struct elf32_hppa_link_hash_entry *) hh;
30667bf3
AM
3451 }
3452
3453 /* Do any required modifications to the relocation value, and
25f72752
AM
3454 determine what types of dynamic info we need to output, if
3455 any. */
74d1c347 3456 plabel = 0;
30667bf3
AM
3457 switch (r_type)
3458 {
3459 case R_PARISC_DLTIND14F:
3460 case R_PARISC_DLTIND14R:
3461 case R_PARISC_DLTIND21L:
ce757d15
AM
3462 {
3463 bfd_vma off;
b34976b6 3464 bfd_boolean do_got = 0;
ce757d15
AM
3465
3466 /* Relocation is to the entry for this symbol in the
3467 global offset table. */
3468 if (h != NULL)
3469 {
b34976b6 3470 bfd_boolean dyn;
ce757d15
AM
3471
3472 off = h->elf.got.offset;
3473 dyn = htab->elf.dynamic_sections_created;
c152c796
AM
3474 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared,
3475 &h->elf))
ce757d15
AM
3476 {
3477 /* If we aren't going to call finish_dynamic_symbol,
3478 then we need to handle initialisation of the .got
3479 entry and create needed relocs here. Since the
3480 offset must always be a multiple of 4, we use the
3481 least significant bit to record whether we have
3482 initialised it already. */
3483 if ((off & 1) != 0)
3484 off &= ~1;
3485 else
3486 {
3487 h->elf.got.offset |= 1;
3488 do_got = 1;
3489 }
3490 }
3491 }
3492 else
3493 {
3494 /* Local symbol case. */
3495 if (local_got_offsets == NULL)
3496 abort ();
3497
3498 off = local_got_offsets[r_symndx];
3499
3500 /* The offset must always be a multiple of 4. We use
3501 the least significant bit to record whether we have
3502 already generated the necessary reloc. */
3503 if ((off & 1) != 0)
3504 off &= ~1;
3505 else
3506 {
3507 local_got_offsets[r_symndx] |= 1;
3508 do_got = 1;
3509 }
3510 }
68fb2e56 3511
ce757d15
AM
3512 if (do_got)
3513 {
3514 if (info->shared)
3515 {
3516 /* Output a dynamic relocation for this GOT entry.
3517 In this case it is relative to the base of the
3518 object because the symbol index is zero. */
3519 Elf_Internal_Rela outrel;
947216bf
AM
3520 bfd_byte *loc;
3521 asection *s = htab->srelgot;
ce757d15
AM
3522
3523 outrel.r_offset = (off
3524 + htab->sgot->output_offset
3525 + htab->sgot->output_section->vma);
3526 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3527 outrel.r_addend = relocation;
947216bf
AM
3528 loc = s->contents;
3529 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3530 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3531 }
3532 else
30667bf3 3533 bfd_put_32 (output_bfd, relocation,
83c81bfe 3534 htab->sgot->contents + off);
ce757d15 3535 }
30667bf3 3536
ce757d15
AM
3537 if (off >= (bfd_vma) -2)
3538 abort ();
30667bf3 3539
ce757d15
AM
3540 /* Add the base of the GOT to the relocation value. */
3541 relocation = (off
3542 + htab->sgot->output_offset
3543 + htab->sgot->output_section->vma);
3544 }
30667bf3 3545 break;
252b5132 3546
c46b7515
AM
3547 case R_PARISC_SEGREL32:
3548 /* If this is the first SEGREL relocation, then initialize
3549 the segment base values. */
83c81bfe
AM
3550 if (htab->text_segment_base == (bfd_vma) -1)
3551 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3552 break;
3553
30667bf3
AM
3554 case R_PARISC_PLABEL14R:
3555 case R_PARISC_PLABEL21L:
3556 case R_PARISC_PLABEL32:
ebe50bae 3557 if (htab->elf.dynamic_sections_created)
252b5132 3558 {
ce757d15 3559 bfd_vma off;
b34976b6 3560 bfd_boolean do_plt = 0;
ce757d15 3561
74d1c347
AM
3562 /* If we have a global symbol with a PLT slot, then
3563 redirect this relocation to it. */
3564 if (h != NULL)
3565 {
3566 off = h->elf.plt.offset;
c152c796
AM
3567 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared,
3568 &h->elf))
8dea1268
AM
3569 {
3570 /* In a non-shared link, adjust_dynamic_symbols
3571 isn't called for symbols forced local. We
dc810e39 3572 need to write out the plt entry here. */
8dea1268
AM
3573 if ((off & 1) != 0)
3574 off &= ~1;
3575 else
3576 {
8dea1268 3577 h->elf.plt.offset |= 1;
ce757d15 3578 do_plt = 1;
8dea1268
AM
3579 }
3580 }
74d1c347
AM
3581 }
3582 else
3583 {
68fb2e56
AM
3584 bfd_vma *local_plt_offsets;
3585
3586 if (local_got_offsets == NULL)
3587 abort ();
74d1c347 3588
68fb2e56
AM
3589 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3590 off = local_plt_offsets[r_symndx];
74d1c347
AM
3591
3592 /* As for the local .got entry case, we use the last
3593 bit to record whether we've already initialised
3594 this local .plt entry. */
3595 if ((off & 1) != 0)
3596 off &= ~1;
ce757d15
AM
3597 else
3598 {
3599 local_plt_offsets[r_symndx] |= 1;
3600 do_plt = 1;
3601 }
3602 }
3603
3604 if (do_plt)
3605 {
3606 if (info->shared)
3607 {
3608 /* Output a dynamic IPLT relocation for this
3609 PLT entry. */
3610 Elf_Internal_Rela outrel;
947216bf
AM
3611 bfd_byte *loc;
3612 asection *s = htab->srelplt;
ce757d15
AM
3613
3614 outrel.r_offset = (off
3615 + htab->splt->output_offset
3616 + htab->splt->output_section->vma);
3617 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3618 outrel.r_addend = relocation;
947216bf
AM
3619 loc = s->contents;
3620 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3621 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3622 }
74d1c347
AM
3623 else
3624 {
3625 bfd_put_32 (output_bfd,
3626 relocation,
83c81bfe 3627 htab->splt->contents + off);
74d1c347 3628 bfd_put_32 (output_bfd,
83c81bfe
AM
3629 elf_gp (htab->splt->output_section->owner),
3630 htab->splt->contents + off + 4);
74d1c347
AM
3631 }
3632 }
3633
68fb2e56 3634 if (off >= (bfd_vma) -2)
49e9d0d3 3635 abort ();
74d1c347
AM
3636
3637 /* PLABELs contain function pointers. Relocation is to
3638 the entry for the function in the .plt. The magic +2
3639 offset signals to $$dyncall that the function pointer
3640 is in the .plt and thus has a gp pointer too.
3641 Exception: Undefined PLABELs should have a value of
3642 zero. */
3643 if (h == NULL
3644 || (h->elf.root.type != bfd_link_hash_undefweak
3645 && h->elf.root.type != bfd_link_hash_undefined))
3646 {
3647 relocation = (off
83c81bfe
AM
3648 + htab->splt->output_offset
3649 + htab->splt->output_section->vma
74d1c347
AM
3650 + 2);
3651 }
3652 plabel = 1;
30667bf3
AM
3653 }
3654 /* Fall through and possibly emit a dynamic relocation. */
3655
3656 case R_PARISC_DIR17F:
3657 case R_PARISC_DIR17R:
47d89dba 3658 case R_PARISC_DIR14F:
30667bf3
AM
3659 case R_PARISC_DIR14R:
3660 case R_PARISC_DIR21L:
3661 case R_PARISC_DPREL14F:
3662 case R_PARISC_DPREL14R:
3663 case R_PARISC_DPREL21L:
3664 case R_PARISC_DIR32:
ec338859
AM
3665 /* r_symndx will be zero only for relocs against symbols
3666 from removed linkonce sections, or sections discarded by
3667 a linker script. */
3668 if (r_symndx == 0
3669 || (input_section->flags & SEC_ALLOC) == 0)
3670 break;
3671
30667bf3 3672 /* The reloc types handled here and this conditional
56882138 3673 expression must match the code in ..check_relocs and
ec338859 3674 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
3675 as in ..check_relocs, with some extra conditions (dynindx
3676 test in this case) to cater for relocs removed by
ec338859 3677 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
3678 here does indeed match the one in ..check_relocs, the
3679 difference being that here we test DEF_DYNAMIC as well as
3680 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3681 which is why we can't use just that test here.
3682 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3683 there all files have not been loaded. */
446f2863 3684 if ((info->shared
4fc8051d
AM
3685 && (h == NULL
3686 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3687 || h->elf.root.type != bfd_link_hash_undefweak)
446f2863 3688 && (IS_ABSOLUTE_RELOC (r_type)
4fc8051d 3689 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
446f2863 3690 || (!info->shared
446f2863
AM
3691 && h != NULL
3692 && h->elf.dynindx != -1
3693 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
4fc8051d
AM
3694 && ((ELIMINATE_COPY_RELOCS
3695 && (h->elf.elf_link_hash_flags
3696 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
56882138
AM
3697 && (h->elf.elf_link_hash_flags
3698 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3699 || h->elf.root.type == bfd_link_hash_undefweak
3700 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3701 {
3702 Elf_Internal_Rela outrel;
b34976b6 3703 bfd_boolean skip;
98ceb8ce 3704 asection *sreloc;
947216bf 3705 bfd_byte *loc;
252b5132 3706
30667bf3
AM
3707 /* When generating a shared object, these relocations
3708 are copied into the output file to be resolved at run
3709 time. */
252b5132 3710
30667bf3 3711 outrel.r_addend = rel->r_addend;
c629eae0
JJ
3712 outrel.r_offset =
3713 _bfd_elf_section_offset (output_bfd, info, input_section,
3714 rel->r_offset);
0bb2d96a
JJ
3715 skip = (outrel.r_offset == (bfd_vma) -1
3716 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3717 outrel.r_offset += (input_section->output_offset
3718 + input_section->output_section->vma);
3719
3720 if (skip)
252b5132 3721 {
30667bf3 3722 memset (&outrel, 0, sizeof (outrel));
252b5132 3723 }
74d1c347
AM
3724 else if (h != NULL
3725 && h->elf.dynindx != -1
3726 && (plabel
446f2863
AM
3727 || !IS_ABSOLUTE_RELOC (r_type)
3728 || !info->shared
74d1c347 3729 || !info->symbolic
30667bf3
AM
3730 || (h->elf.elf_link_hash_flags
3731 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3732 {
30667bf3
AM
3733 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3734 }
3735 else /* It's a local symbol, or one marked to become local. */
3736 {
3737 int indx = 0;
edd21aca 3738
30667bf3
AM
3739 /* Add the absolute offset of the symbol. */
3740 outrel.r_addend += relocation;
edd21aca 3741
74d1c347
AM
3742 /* Global plabels need to be processed by the
3743 dynamic linker so that functions have at most one
3744 fptr. For this reason, we need to differentiate
3745 between global and local plabels, which we do by
3746 providing the function symbol for a global plabel
3747 reloc, and no symbol for local plabels. */
3748 if (! plabel
3749 && sym_sec != NULL
30667bf3
AM
3750 && sym_sec->output_section != NULL
3751 && ! bfd_is_abs_section (sym_sec))
252b5132 3752 {
4b71bec0
DA
3753 /* Skip this relocation if the output section has
3754 been discarded. */
3755 if (bfd_is_abs_section (sym_sec->output_section))
3756 break;
3757
30667bf3
AM
3758 indx = elf_section_data (sym_sec->output_section)->dynindx;
3759 /* We are turning this relocation into one
3760 against a section symbol, so subtract out the
3761 output section's address but not the offset
3762 of the input section in the output section. */
3763 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 3764 }
252b5132 3765
30667bf3
AM
3766 outrel.r_info = ELF32_R_INFO (indx, r_type);
3767 }
68fb2e56
AM
3768#if 0
3769 /* EH info can cause unaligned DIR32 relocs.
3770 Tweak the reloc type for the dynamic linker. */
3771 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
3772 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
3773 R_PARISC_DIR32U);
3774#endif
98ceb8ce
AM
3775 sreloc = elf_section_data (input_section)->sreloc;
3776 if (sreloc == NULL)
3777 abort ();
3778
947216bf
AM
3779 loc = sreloc->contents;
3780 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
98ceb8ce 3781 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3782 }
3783 break;
edd21aca 3784
30667bf3
AM
3785 default:
3786 break;
3787 }
252b5132 3788
30667bf3 3789 r = final_link_relocate (input_section, contents, rel, relocation,
a252afa4 3790 htab, sym_sec, h, info);
252b5132 3791
30667bf3
AM
3792 if (r == bfd_reloc_ok)
3793 continue;
252b5132 3794
30667bf3
AM
3795 if (h != NULL)
3796 sym_name = h->elf.root.root.string;
3797 else
3798 {
3799 sym_name = bfd_elf_string_from_elf_section (input_bfd,
3800 symtab_hdr->sh_link,
3801 sym->st_name);
3802 if (sym_name == NULL)
b34976b6 3803 return FALSE;
30667bf3
AM
3804 if (*sym_name == '\0')
3805 sym_name = bfd_section_name (input_bfd, sym_sec);
3806 }
edd21aca 3807
30667bf3 3808 howto = elf_hppa_howto_table + r_type;
252b5132 3809
30667bf3
AM
3810 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
3811 {
f09ebc7d
AM
3812 if (r == bfd_reloc_notsupported || !warned_undef)
3813 {
3814 (*_bfd_error_handler)
3815 (_("%s(%s+0x%lx): cannot handle %s for %s"),
3816 bfd_archive_filename (input_bfd),
3817 input_section->name,
3818 (long) rel->r_offset,
3819 howto->name,
3820 sym_name);
3821 bfd_set_error (bfd_error_bad_value);
b34976b6 3822 return FALSE;
f09ebc7d 3823 }
30667bf3
AM
3824 }
3825 else
3826 {
3827 if (!((*info->callbacks->reloc_overflow)
c39a58e6
AM
3828 (info, sym_name, howto->name, 0, input_bfd, input_section,
3829 rel->r_offset)))
b34976b6 3830 return FALSE;
30667bf3
AM
3831 }
3832 }
edd21aca 3833
b34976b6 3834 return TRUE;
30667bf3 3835}
252b5132 3836
30667bf3
AM
3837/* Finish up dynamic symbol handling. We set the contents of various
3838 dynamic sections here. */
252b5132 3839
b34976b6 3840static bfd_boolean
c39a58e6
AM
3841elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
3842 struct bfd_link_info *info,
3843 struct elf_link_hash_entry *h,
3844 Elf_Internal_Sym *sym)
30667bf3 3845{
83c81bfe 3846 struct elf32_hppa_link_hash_table *htab;
a252afa4
DA
3847 Elf_Internal_Rela rel;
3848 bfd_byte *loc;
edd21aca 3849
83c81bfe 3850 htab = hppa_link_hash_table (info);
30667bf3 3851
30667bf3
AM
3852 if (h->plt.offset != (bfd_vma) -1)
3853 {
3854 bfd_vma value;
30667bf3 3855
8dea1268
AM
3856 if (h->plt.offset & 1)
3857 abort ();
3858
30667bf3
AM
3859 /* This symbol has an entry in the procedure linkage table. Set
3860 it up.
3861
3862 The format of a plt entry is
74d1c347
AM
3863 <funcaddr>
3864 <__gp>
47d89dba 3865 */
30667bf3
AM
3866 value = 0;
3867 if (h->root.type == bfd_link_hash_defined
3868 || h->root.type == bfd_link_hash_defweak)
3869 {
3870 value = h->root.u.def.value;
3871 if (h->root.u.def.section->output_section != NULL)
3872 value += (h->root.u.def.section->output_offset
3873 + h->root.u.def.section->output_section->vma);
252b5132 3874 }
edd21aca 3875
a252afa4
DA
3876 /* Create a dynamic IPLT relocation for this entry. */
3877 rel.r_offset = (h->plt.offset
3878 + htab->splt->output_offset
3879 + htab->splt->output_section->vma);
3880 if (h->dynindx != -1)
30667bf3 3881 {
a252afa4
DA
3882 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
3883 rel.r_addend = 0;
30667bf3 3884 }
ce757d15 3885 else
47d89dba 3886 {
a252afa4
DA
3887 /* This symbol has been marked to become local, and is
3888 used by a plabel so must be kept in the .plt. */
3889 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3890 rel.r_addend = value;
47d89dba
AM
3891 }
3892
a252afa4
DA
3893 loc = htab->srelplt->contents;
3894 loc += htab->srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
3895 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner, &rel, loc);
3896
30667bf3
AM
3897 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3898 {
3899 /* Mark the symbol as undefined, rather than as defined in
3900 the .plt section. Leave the value alone. */
3901 sym->st_shndx = SHN_UNDEF;
3902 }
3903 }
edd21aca 3904
30667bf3
AM
3905 if (h->got.offset != (bfd_vma) -1)
3906 {
30667bf3
AM
3907 /* This symbol has an entry in the global offset table. Set it
3908 up. */
3909
3910 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
3911 + htab->sgot->output_offset
3912 + htab->sgot->output_section->vma);
30667bf3 3913
4dc86686
AM
3914 /* If this is a -Bsymbolic link and the symbol is defined
3915 locally or was forced to be local because of a version file,
3916 we just want to emit a RELATIVE reloc. The entry in the
3917 global offset table will already have been initialized in the
3918 relocate_section function. */
3919 if (info->shared
3920 && (info->symbolic || h->dynindx == -1)
3921 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 3922 {
74d1c347 3923 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
3924 rel.r_addend = (h->root.u.def.value
3925 + h->root.u.def.section->output_offset
3926 + h->root.u.def.section->output_section->vma);
3927 }
3928 else
3929 {
49e9d0d3
AM
3930 if ((h->got.offset & 1) != 0)
3931 abort ();
c39a58e6 3932 bfd_put_32 (output_bfd, 0, htab->sgot->contents + h->got.offset);
30667bf3
AM
3933 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
3934 rel.r_addend = 0;
3935 }
edd21aca 3936
947216bf
AM
3937 loc = htab->srelgot->contents;
3938 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3ac8354b 3939 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 3940 }
edd21aca 3941
30667bf3
AM
3942 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
3943 {
3944 asection *s;
30667bf3
AM
3945
3946 /* This symbol needs a copy reloc. Set it up. */
3947
49e9d0d3
AM
3948 if (! (h->dynindx != -1
3949 && (h->root.type == bfd_link_hash_defined
3950 || h->root.type == bfd_link_hash_defweak)))
3951 abort ();
30667bf3 3952
83c81bfe 3953 s = htab->srelbss;
30667bf3
AM
3954
3955 rel.r_offset = (h->root.u.def.value
3956 + h->root.u.def.section->output_offset
3957 + h->root.u.def.section->output_section->vma);
3958 rel.r_addend = 0;
3959 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
947216bf 3960 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3ac8354b 3961 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
3962 }
3963
3964 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3965 if (h->root.root.string[0] == '_'
3966 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
3967 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
3968 {
3969 sym->st_shndx = SHN_ABS;
3970 }
3971
b34976b6 3972 return TRUE;
30667bf3
AM
3973}
3974
98ceb8ce
AM
3975/* Used to decide how to sort relocs in an optimal manner for the
3976 dynamic linker, before writing them out. */
3977
3978static enum elf_reloc_type_class
c39a58e6 3979elf32_hppa_reloc_type_class (const Elf_Internal_Rela *rela)
98ceb8ce
AM
3980{
3981 if (ELF32_R_SYM (rela->r_info) == 0)
3982 return reloc_class_relative;
3983
3984 switch ((int) ELF32_R_TYPE (rela->r_info))
3985 {
3986 case R_PARISC_IPLT:
3987 return reloc_class_plt;
3988 case R_PARISC_COPY:
3989 return reloc_class_copy;
3990 default:
3991 return reloc_class_normal;
3992 }
3993}
3994
30667bf3
AM
3995/* Finish up the dynamic sections. */
3996
b34976b6 3997static bfd_boolean
c39a58e6
AM
3998elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
3999 struct bfd_link_info *info)
30667bf3
AM
4000{
4001 bfd *dynobj;
83c81bfe 4002 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4003 asection *sdyn;
4004
83c81bfe 4005 htab = hppa_link_hash_table (info);
ebe50bae 4006 dynobj = htab->elf.dynobj;
30667bf3
AM
4007
4008 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4009
ebe50bae 4010 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4011 {
4012 Elf32_External_Dyn *dyncon, *dynconend;
4013
49e9d0d3
AM
4014 if (sdyn == NULL)
4015 abort ();
30667bf3
AM
4016
4017 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 4018 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
30667bf3 4019 for (; dyncon < dynconend; dyncon++)
edd21aca 4020 {
30667bf3
AM
4021 Elf_Internal_Dyn dyn;
4022 asection *s;
4023
4024 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4025
4026 switch (dyn.d_tag)
4027 {
4028 default:
3ac8354b 4029 continue;
30667bf3
AM
4030
4031 case DT_PLTGOT:
4032 /* Use PLTGOT to set the GOT register. */
4033 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4034 break;
4035
4036 case DT_JMPREL:
83c81bfe 4037 s = htab->srelplt;
30667bf3 4038 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4039 break;
4040
4041 case DT_PLTRELSZ:
83c81bfe 4042 s = htab->srelplt;
eea6121a 4043 dyn.d_un.d_val = s->size;
30667bf3 4044 break;
4e12ff7f
AM
4045
4046 case DT_RELASZ:
4047 /* Don't count procedure linkage table relocs in the
4048 overall reloc count. */
6348e046
AM
4049 s = htab->srelplt;
4050 if (s == NULL)
4051 continue;
eea6121a 4052 dyn.d_un.d_val -= s->size;
6348e046
AM
4053 break;
4054
4055 case DT_RELA:
4056 /* We may not be using the standard ELF linker script.
4057 If .rela.plt is the first .rela section, we adjust
4058 DT_RELA to not include it. */
4059 s = htab->srelplt;
4060 if (s == NULL)
4061 continue;
4062 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
4063 continue;
eea6121a 4064 dyn.d_un.d_ptr += s->size;
4e12ff7f 4065 break;
30667bf3 4066 }
3ac8354b
AM
4067
4068 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4069 }
252b5132 4070 }
edd21aca 4071
eea6121a 4072 if (htab->sgot != NULL && htab->sgot->size != 0)
30667bf3 4073 {
74d1c347
AM
4074 /* Fill in the first entry in the global offset table.
4075 We use it to point to our dynamic section, if we have one. */
30667bf3 4076 bfd_put_32 (output_bfd,
c39a58e6 4077 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
83c81bfe 4078 htab->sgot->contents);
30667bf3 4079
74d1c347 4080 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4081 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4082
30667bf3 4083 /* Set .got entry size. */
83c81bfe 4084 elf_section_data (htab->sgot->output_section)
74d1c347 4085 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4086 }
4087
eea6121a 4088 if (htab->splt != NULL && htab->splt->size != 0)
47d89dba
AM
4089 {
4090 /* Set plt entry size. */
83c81bfe 4091 elf_section_data (htab->splt->output_section)
47d89dba
AM
4092 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4093
83c81bfe 4094 if (htab->need_plt_stub)
47d89dba
AM
4095 {
4096 /* Set up the .plt stub. */
83c81bfe 4097 memcpy (htab->splt->contents
eea6121a 4098 + htab->splt->size - sizeof (plt_stub),
47d89dba
AM
4099 plt_stub, sizeof (plt_stub));
4100
83c81bfe
AM
4101 if ((htab->splt->output_offset
4102 + htab->splt->output_section->vma
eea6121a 4103 + htab->splt->size)
83c81bfe
AM
4104 != (htab->sgot->output_offset
4105 + htab->sgot->output_section->vma))
47d89dba
AM
4106 {
4107 (*_bfd_error_handler)
4108 (_(".got section not immediately after .plt section"));
b34976b6 4109 return FALSE;
47d89dba
AM
4110 }
4111 }
4112 }
30667bf3 4113
b34976b6 4114 return TRUE;
30667bf3 4115}
252b5132 4116
d952f17a
AM
4117/* Tweak the OSABI field of the elf header. */
4118
4119static void
c39a58e6
AM
4120elf32_hppa_post_process_headers (bfd *abfd,
4121 struct bfd_link_info *info ATTRIBUTE_UNUSED)
d952f17a
AM
4122{
4123 Elf_Internal_Ehdr * i_ehdrp;
4124
4125 i_ehdrp = elf_elfheader (abfd);
4126
4127 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4128 {
4129 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4130 }
225247f0
JT
4131 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
4132 {
4133 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_NETBSD;
4134 }
d952f17a
AM
4135 else
4136 {
4137 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4138 }
4139}
4140
30667bf3
AM
4141/* Called when writing out an object file to decide the type of a
4142 symbol. */
4143static int
c39a58e6 4144elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
30667bf3
AM
4145{
4146 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4147 return STT_PARISC_MILLI;
4148 else
4149 return type;
252b5132
RH
4150}
4151
4152/* Misc BFD support code. */
30667bf3
AM
4153#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4154#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4155#define elf_info_to_howto elf_hppa_info_to_howto
4156#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4157
252b5132 4158/* Stuff for the BFD linker. */
c46b7515 4159#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4160#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
e2d34d7d 4161#define bfd_elf32_bfd_link_hash_table_free elf32_hppa_link_hash_table_free
30667bf3 4162#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4163#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4164#define elf_backend_check_relocs elf32_hppa_check_relocs
4165#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4166#define elf_backend_fake_sections elf_hppa_fake_sections
4167#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4168#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4169#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4170#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4171#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4172#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4173#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4174#define elf_backend_object_p elf32_hppa_object_p
4175#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4176#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4177#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4178#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4179
4180#define elf_backend_can_gc_sections 1
51b64d56 4181#define elf_backend_can_refcount 1
30667bf3
AM
4182#define elf_backend_plt_alignment 2
4183#define elf_backend_want_got_plt 0
4184#define elf_backend_plt_readonly 0
4185#define elf_backend_want_plt_sym 0
74d1c347 4186#define elf_backend_got_header_size 8
f0fe0e16 4187#define elf_backend_rela_normal 1
252b5132
RH
4188
4189#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4190#define TARGET_BIG_NAME "elf32-hppa"
4191#define ELF_ARCH bfd_arch_hppa
4192#define ELF_MACHINE_CODE EM_PARISC
4193#define ELF_MAXPAGESIZE 0x1000
4194
4195#include "elf32-target.h"
d952f17a
AM
4196
4197#undef TARGET_BIG_SYM
4198#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4199#undef TARGET_BIG_NAME
4200#define TARGET_BIG_NAME "elf32-hppa-linux"
4201
4202#define INCLUDED_TARGET_FILE 1
4203#include "elf32-target.h"
225247f0
JT
4204
4205#undef TARGET_BIG_SYM
4206#define TARGET_BIG_SYM bfd_elf32_hppa_nbsd_vec
4207#undef TARGET_BIG_NAME
4208#define TARGET_BIG_NAME "elf32-hppa-netbsd"
4209
4210#include "elf32-target.h"
This page took 0.511167 seconds and 4 git commands to generate.