* config/i386/tm-i386.h (MAX_NUM_REGS): Removed.
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
e5094212
AM
2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
3 2002 Free Software Foundation, Inc.
252b5132 4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
edd21aca 35#include "elf32-hppa.h"
189c6563 36#include "elf-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
46fe4e66 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
46fe4e66 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
30667bf3
AM
144enum elf32_hppa_stub_type {
145 hppa_stub_long_branch,
146 hppa_stub_long_branch_shared,
147 hppa_stub_import,
148 hppa_stub_import_shared,
149 hppa_stub_export,
150 hppa_stub_none
151};
152
30667bf3 153struct elf32_hppa_stub_hash_entry {
252b5132 154
edd21aca 155 /* Base hash table entry structure. */
252b5132
RH
156 struct bfd_hash_entry root;
157
edd21aca
AM
158 /* The stub section. */
159 asection *stub_sec;
160
161 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 162 bfd_vma stub_offset;
252b5132
RH
163
164 /* Given the symbol's value and its section we can determine its final
165 value when building the stubs (so the stub knows where to jump. */
30667bf3 166 bfd_vma target_value;
252b5132 167 asection *target_section;
30667bf3
AM
168
169 enum elf32_hppa_stub_type stub_type;
170
171 /* The symbol table entry, if any, that this was derived from. */
172 struct elf32_hppa_link_hash_entry *h;
173
25f72752
AM
174 /* Where this stub is being called from, or, in the case of combined
175 stub sections, the first input section in the group. */
176 asection *id_sec;
252b5132
RH
177};
178
30667bf3
AM
179struct elf32_hppa_link_hash_entry {
180
181 struct elf_link_hash_entry elf;
182
183 /* A pointer to the most recently used stub hash entry against this
184 symbol. */
185 struct elf32_hppa_stub_hash_entry *stub_cache;
186
30667bf3
AM
187 /* Used to count relocations for delayed sizing of relocation
188 sections. */
189 struct elf32_hppa_dyn_reloc_entry {
190
191 /* Next relocation in the chain. */
192 struct elf32_hppa_dyn_reloc_entry *next;
193
98ceb8ce
AM
194 /* The input section of the reloc. */
195 asection *sec;
30667bf3
AM
196
197 /* Number of relocs copied in this section. */
198 bfd_size_type count;
98ceb8ce
AM
199
200#if RELATIVE_DYNRELOCS
201 /* Number of relative relocs copied for the input section. */
202 bfd_size_type relative_count;
203#endif
204 } *dyn_relocs;
30667bf3 205
12cca0d2
AM
206 /* Set if the only reason we need a .plt entry is for a non-PIC to
207 PIC function call. */
74d1c347
AM
208 unsigned int pic_call:1;
209
210 /* Set if this symbol is used by a plabel reloc. */
211 unsigned int plabel:1;
30667bf3
AM
212};
213
30667bf3
AM
214struct elf32_hppa_link_hash_table {
215
252b5132 216 /* The main hash table. */
ebe50bae 217 struct elf_link_hash_table elf;
252b5132
RH
218
219 /* The stub hash table. */
edd21aca 220 struct bfd_hash_table stub_hash_table;
252b5132 221
30667bf3
AM
222 /* Linker stub bfd. */
223 bfd *stub_bfd;
224
30667bf3
AM
225 /* Linker call-backs. */
226 asection * (*add_stub_section) PARAMS ((const char *, asection *));
227 void (*layout_sections_again) PARAMS ((void));
228
25f72752
AM
229 /* Array to keep track of which stub sections have been created, and
230 information on stub grouping. */
231 struct map_stub {
232 /* This is the section to which stubs in the group will be
233 attached. */
234 asection *link_sec;
235 /* The stub section. */
236 asection *stub_sec;
25f72752 237 } *stub_group;
30667bf3 238
b4655ea9
AM
239 /* Assorted information used by elf32_hppa_size_stubs. */
240 unsigned int bfd_count;
241 int top_index;
242 asection **input_list;
243 Elf_Internal_Sym **all_local_syms;
244
30667bf3
AM
245 /* Short-cuts to get to dynamic linker sections. */
246 asection *sgot;
247 asection *srelgot;
248 asection *splt;
249 asection *srelplt;
250 asection *sdynbss;
251 asection *srelbss;
47d89dba 252
c46b7515
AM
253 /* Used during a final link to store the base of the text and data
254 segments so that we can perform SEGREL relocations. */
255 bfd_vma text_segment_base;
256 bfd_vma data_segment_base;
257
47d89dba
AM
258 /* Whether we support multiple sub-spaces for shared libs. */
259 unsigned int multi_subspace:1;
260
067fa4a6 261 /* Flags set when various size branches are detected. Used to
47d89dba
AM
262 select suitable defaults for the stub group size. */
263 unsigned int has_12bit_branch:1;
264 unsigned int has_17bit_branch:1;
067fa4a6 265 unsigned int has_22bit_branch:1;
47d89dba
AM
266
267 /* Set if we need a .plt stub to support lazy dynamic linking. */
268 unsigned int need_plt_stub:1;
ec338859
AM
269
270 /* Small local sym to section mapping cache. */
271 struct sym_sec_cache sym_sec;
252b5132
RH
272};
273
30667bf3
AM
274/* Various hash macros and functions. */
275#define hppa_link_hash_table(p) \
edd21aca 276 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 277
30667bf3
AM
278#define hppa_stub_hash_lookup(table, string, create, copy) \
279 ((struct elf32_hppa_stub_hash_entry *) \
280 bfd_hash_lookup ((table), (string), (create), (copy)))
281
282static struct bfd_hash_entry *stub_hash_newfunc
283 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 284
30667bf3 285static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 286 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
287
288static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
289 PARAMS ((bfd *));
290
e2d34d7d
DJ
291static void elf32_hppa_link_hash_table_free
292 PARAMS ((struct bfd_link_hash_table *));
293
30667bf3
AM
294/* Stub handling functions. */
295static char *hppa_stub_name
296 PARAMS ((const asection *, const asection *,
297 const struct elf32_hppa_link_hash_entry *,
298 const Elf_Internal_Rela *));
edd21aca 299
30667bf3
AM
300static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
301 PARAMS ((const asection *, const asection *,
302 struct elf32_hppa_link_hash_entry *,
25f72752
AM
303 const Elf_Internal_Rela *,
304 struct elf32_hppa_link_hash_table *));
edd21aca 305
30667bf3 306static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 307 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
308
309static enum elf32_hppa_stub_type hppa_type_of_stub
310 PARAMS ((asection *, const Elf_Internal_Rela *,
311 struct elf32_hppa_link_hash_entry *, bfd_vma));
312
313static boolean hppa_build_one_stub
314 PARAMS ((struct bfd_hash_entry *, PTR));
315
316static boolean hppa_size_one_stub
317 PARAMS ((struct bfd_hash_entry *, PTR));
318
30667bf3
AM
319/* BFD and elf backend functions. */
320static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 321
edd21aca
AM
322static boolean elf32_hppa_add_symbol_hook
323 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
324 const char **, flagword *, asection **, bfd_vma *));
252b5132 325
30667bf3
AM
326static boolean elf32_hppa_create_dynamic_sections
327 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 328
ebe50bae
AM
329static void elf32_hppa_copy_indirect_symbol
330 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
331
30667bf3
AM
332static boolean elf32_hppa_check_relocs
333 PARAMS ((bfd *, struct bfd_link_info *,
334 asection *, const Elf_Internal_Rela *));
335
336static asection *elf32_hppa_gc_mark_hook
337 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
338 struct elf_link_hash_entry *, Elf_Internal_Sym *));
339
340static boolean elf32_hppa_gc_sweep_hook
341 PARAMS ((bfd *, struct bfd_link_info *,
342 asection *, const Elf_Internal_Rela *));
343
74d1c347 344static void elf32_hppa_hide_symbol
e5094212 345 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, boolean));
74d1c347 346
30667bf3
AM
347static boolean elf32_hppa_adjust_dynamic_symbol
348 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
349
a8d02d66
AM
350static boolean mark_PIC_calls
351 PARAMS ((struct elf_link_hash_entry *, PTR));
352
e5ee5df1 353static boolean allocate_plt_static
30667bf3
AM
354 PARAMS ((struct elf_link_hash_entry *, PTR));
355
98ceb8ce
AM
356static boolean allocate_dynrelocs
357 PARAMS ((struct elf_link_hash_entry *, PTR));
358
359static boolean readonly_dynrelocs
30667bf3 360 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 361
d5c73c2f
AM
362static boolean clobber_millicode_symbols
363 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
364
30667bf3
AM
365static boolean elf32_hppa_size_dynamic_sections
366 PARAMS ((bfd *, struct bfd_link_info *));
367
b4655ea9
AM
368static void group_sections
369 PARAMS ((struct elf32_hppa_link_hash_table *, bfd_size_type, boolean));
370
371static int get_local_syms
372 PARAMS ((bfd *, bfd *, struct bfd_link_info *));
373
c46b7515
AM
374static boolean elf32_hppa_final_link
375 PARAMS ((bfd *, struct bfd_link_info *));
376
377static void hppa_record_segment_addr
378 PARAMS ((bfd *, asection *, PTR));
379
30667bf3
AM
380static bfd_reloc_status_type final_link_relocate
381 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 382 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
383 struct elf32_hppa_link_hash_entry *));
384
385static boolean elf32_hppa_relocate_section
386 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
387 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
388
389static boolean elf32_hppa_finish_dynamic_symbol
390 PARAMS ((bfd *, struct bfd_link_info *,
391 struct elf_link_hash_entry *, Elf_Internal_Sym *));
392
98ceb8ce
AM
393static enum elf_reloc_type_class elf32_hppa_reloc_type_class
394 PARAMS ((const Elf_Internal_Rela *));
395
30667bf3
AM
396static boolean elf32_hppa_finish_dynamic_sections
397 PARAMS ((bfd *, struct bfd_link_info *));
398
d952f17a
AM
399static void elf32_hppa_post_process_headers
400 PARAMS ((bfd *, struct bfd_link_info *));
401
30667bf3
AM
402static int elf32_hppa_elf_get_symbol_type
403 PARAMS ((Elf_Internal_Sym *, int));
252b5132 404
252b5132
RH
405/* Assorted hash table functions. */
406
407/* Initialize an entry in the stub hash table. */
408
409static struct bfd_hash_entry *
30667bf3 410stub_hash_newfunc (entry, table, string)
252b5132
RH
411 struct bfd_hash_entry *entry;
412 struct bfd_hash_table *table;
413 const char *string;
414{
252b5132
RH
415 /* Allocate the structure if it has not already been allocated by a
416 subclass. */
ebe50bae 417 if (entry == NULL)
30667bf3 418 {
ebe50bae
AM
419 entry = bfd_hash_allocate (table,
420 sizeof (struct elf32_hppa_stub_hash_entry));
421 if (entry == NULL)
422 return entry;
30667bf3 423 }
252b5132
RH
424
425 /* Call the allocation method of the superclass. */
ebe50bae
AM
426 entry = bfd_hash_newfunc (entry, table, string);
427 if (entry != NULL)
252b5132 428 {
ebe50bae
AM
429 struct elf32_hppa_stub_hash_entry *eh;
430
252b5132 431 /* Initialize the local fields. */
ebe50bae
AM
432 eh = (struct elf32_hppa_stub_hash_entry *) entry;
433 eh->stub_sec = NULL;
434 eh->stub_offset = 0;
435 eh->target_value = 0;
436 eh->target_section = NULL;
437 eh->stub_type = hppa_stub_long_branch;
438 eh->h = NULL;
439 eh->id_sec = NULL;
30667bf3
AM
440 }
441
ebe50bae 442 return entry;
30667bf3
AM
443}
444
30667bf3
AM
445/* Initialize an entry in the link hash table. */
446
447static struct bfd_hash_entry *
448hppa_link_hash_newfunc (entry, table, string)
449 struct bfd_hash_entry *entry;
450 struct bfd_hash_table *table;
451 const char *string;
452{
30667bf3
AM
453 /* Allocate the structure if it has not already been allocated by a
454 subclass. */
ebe50bae 455 if (entry == NULL)
30667bf3 456 {
ebe50bae
AM
457 entry = bfd_hash_allocate (table,
458 sizeof (struct elf32_hppa_link_hash_entry));
459 if (entry == NULL)
460 return entry;
30667bf3
AM
461 }
462
463 /* Call the allocation method of the superclass. */
ebe50bae
AM
464 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
465 if (entry != NULL)
30667bf3 466 {
ebe50bae
AM
467 struct elf32_hppa_link_hash_entry *eh;
468
30667bf3 469 /* Initialize the local fields. */
ebe50bae
AM
470 eh = (struct elf32_hppa_link_hash_entry *) entry;
471 eh->stub_cache = NULL;
472 eh->dyn_relocs = NULL;
ebe50bae
AM
473 eh->pic_call = 0;
474 eh->plabel = 0;
252b5132
RH
475 }
476
ebe50bae 477 return entry;
252b5132
RH
478}
479
252b5132
RH
480/* Create the derived linker hash table. The PA ELF port uses the derived
481 hash table to keep information specific to the PA ELF linker (without
482 using static variables). */
483
484static struct bfd_link_hash_table *
485elf32_hppa_link_hash_table_create (abfd)
486 bfd *abfd;
487{
488 struct elf32_hppa_link_hash_table *ret;
dc810e39 489 bfd_size_type amt = sizeof (*ret);
252b5132 490
e2d34d7d 491 ret = (struct elf32_hppa_link_hash_table *) bfd_malloc (amt);
252b5132
RH
492 if (ret == NULL)
493 return NULL;
edd21aca 494
ebe50bae 495 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132 496 {
e2d34d7d 497 free (ret);
252b5132
RH
498 return NULL;
499 }
edd21aca
AM
500
501 /* Init the stub hash table too. */
30667bf3 502 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
503 return NULL;
504
30667bf3 505 ret->stub_bfd = NULL;
30667bf3
AM
506 ret->add_stub_section = NULL;
507 ret->layout_sections_again = NULL;
25f72752 508 ret->stub_group = NULL;
30667bf3
AM
509 ret->sgot = NULL;
510 ret->srelgot = NULL;
511 ret->splt = NULL;
512 ret->srelplt = NULL;
513 ret->sdynbss = NULL;
514 ret->srelbss = NULL;
c46b7515
AM
515 ret->text_segment_base = (bfd_vma) -1;
516 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
517 ret->multi_subspace = 0;
518 ret->has_12bit_branch = 0;
519 ret->has_17bit_branch = 0;
067fa4a6 520 ret->has_22bit_branch = 0;
47d89dba 521 ret->need_plt_stub = 0;
ec338859 522 ret->sym_sec.abfd = NULL;
252b5132 523
ebe50bae 524 return &ret->elf.root;
252b5132
RH
525}
526
e2d34d7d
DJ
527/* Free the derived linker hash table. */
528
529static void
530elf32_hppa_link_hash_table_free (hash)
531 struct bfd_link_hash_table *hash;
532{
533 struct elf32_hppa_link_hash_table *ret
534 = (struct elf32_hppa_link_hash_table *) hash;
535
536 bfd_hash_table_free (&ret->stub_hash_table);
537 _bfd_generic_link_hash_table_free (hash);
538}
539
30667bf3
AM
540/* Build a name for an entry in the stub hash table. */
541
edd21aca 542static char *
30667bf3 543hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 544 const asection *input_section;
30667bf3
AM
545 const asection *sym_sec;
546 const struct elf32_hppa_link_hash_entry *hash;
547 const Elf_Internal_Rela *rel;
edd21aca
AM
548{
549 char *stub_name;
dc810e39 550 bfd_size_type len;
edd21aca 551
30667bf3
AM
552 if (hash)
553 {
554 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
555 stub_name = bfd_malloc (len);
556 if (stub_name != NULL)
557 {
558 sprintf (stub_name, "%08x_%s+%x",
559 input_section->id & 0xffffffff,
560 hash->elf.root.root.string,
561 (int) rel->r_addend & 0xffffffff);
562 }
563 }
564 else
edd21aca 565 {
30667bf3
AM
566 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
567 stub_name = bfd_malloc (len);
568 if (stub_name != NULL)
569 {
570 sprintf (stub_name, "%08x_%x:%x+%x",
571 input_section->id & 0xffffffff,
572 sym_sec->id & 0xffffffff,
573 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
574 (int) rel->r_addend & 0xffffffff);
575 }
edd21aca
AM
576 }
577 return stub_name;
578}
252b5132 579
30667bf3
AM
580/* Look up an entry in the stub hash. Stub entries are cached because
581 creating the stub name takes a bit of time. */
582
583static struct elf32_hppa_stub_hash_entry *
83c81bfe 584hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
585 const asection *input_section;
586 const asection *sym_sec;
587 struct elf32_hppa_link_hash_entry *hash;
588 const Elf_Internal_Rela *rel;
83c81bfe 589 struct elf32_hppa_link_hash_table *htab;
252b5132 590{
30667bf3 591 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
592 const asection *id_sec;
593
594 /* If this input section is part of a group of sections sharing one
595 stub section, then use the id of the first section in the group.
596 Stub names need to include a section id, as there may well be
597 more than one stub used to reach say, printf, and we need to
598 distinguish between them. */
83c81bfe 599 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 600
30667bf3
AM
601 if (hash != NULL && hash->stub_cache != NULL
602 && hash->stub_cache->h == hash
25f72752 603 && hash->stub_cache->id_sec == id_sec)
edd21aca 604 {
30667bf3
AM
605 stub_entry = hash->stub_cache;
606 }
607 else
608 {
30667bf3 609 char *stub_name;
edd21aca 610
25f72752 611 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
612 if (stub_name == NULL)
613 return NULL;
edd21aca 614
83c81bfe 615 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 616 stub_name, false, false);
f09ebc7d
AM
617 if (hash != NULL)
618 hash->stub_cache = stub_entry;
30667bf3
AM
619
620 free (stub_name);
edd21aca 621 }
30667bf3
AM
622
623 return stub_entry;
624}
625
30667bf3
AM
626/* Add a new stub entry to the stub hash. Not all fields of the new
627 stub entry are initialised. */
628
629static struct elf32_hppa_stub_hash_entry *
83c81bfe 630hppa_add_stub (stub_name, section, htab)
30667bf3
AM
631 const char *stub_name;
632 asection *section;
83c81bfe 633 struct elf32_hppa_link_hash_table *htab;
30667bf3 634{
25f72752 635 asection *link_sec;
30667bf3 636 asection *stub_sec;
30667bf3 637 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 638
83c81bfe
AM
639 link_sec = htab->stub_group[section->id].link_sec;
640 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 641 if (stub_sec == NULL)
edd21aca 642 {
83c81bfe 643 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
644 if (stub_sec == NULL)
645 {
dc810e39 646 bfd_size_type len;
30667bf3
AM
647 char *s_name;
648
25f72752 649 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 650 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
651 if (s_name == NULL)
652 return NULL;
653
25f72752 654 strcpy (s_name, link_sec->name);
30667bf3 655 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 656 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
657 if (stub_sec == NULL)
658 return NULL;
83c81bfe 659 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 660 }
83c81bfe 661 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 662 }
252b5132 663
30667bf3 664 /* Enter this entry into the linker stub hash table. */
83c81bfe 665 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
666 true, false);
667 if (stub_entry == NULL)
668 {
669 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 670 bfd_archive_filename (section->owner),
30667bf3
AM
671 stub_name);
672 return NULL;
edd21aca
AM
673 }
674
30667bf3 675 stub_entry->stub_sec = stub_sec;
30667bf3 676 stub_entry->stub_offset = 0;
25f72752 677 stub_entry->id_sec = link_sec;
30667bf3 678 return stub_entry;
edd21aca
AM
679}
680
30667bf3
AM
681/* Determine the type of stub needed, if any, for a call. */
682
683static enum elf32_hppa_stub_type
684hppa_type_of_stub (input_sec, rel, hash, destination)
685 asection *input_sec;
686 const Elf_Internal_Rela *rel;
687 struct elf32_hppa_link_hash_entry *hash;
688 bfd_vma destination;
edd21aca 689{
edd21aca 690 bfd_vma location;
30667bf3
AM
691 bfd_vma branch_offset;
692 bfd_vma max_branch_offset;
693 unsigned int r_type;
694
695 if (hash != NULL
067fa4a6
AM
696 && hash->elf.plt.offset != (bfd_vma) -1
697 && (hash->elf.dynindx != -1 || hash->pic_call)
698 && !hash->plabel)
30667bf3 699 {
067fa4a6
AM
700 /* We need an import stub. Decide between hppa_stub_import
701 and hppa_stub_import_shared later. */
30667bf3
AM
702 return hppa_stub_import;
703 }
edd21aca 704
30667bf3
AM
705 /* Determine where the call point is. */
706 location = (input_sec->output_offset
707 + input_sec->output_section->vma
708 + rel->r_offset);
edd21aca 709
30667bf3
AM
710 branch_offset = destination - location - 8;
711 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 712
30667bf3
AM
713 /* Determine if a long branch stub is needed. parisc branch offsets
714 are relative to the second instruction past the branch, ie. +8
715 bytes on from the branch instruction location. The offset is
716 signed and counts in units of 4 bytes. */
717 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 718 {
30667bf3
AM
719 max_branch_offset = (1 << (17-1)) << 2;
720 }
721 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
722 {
723 max_branch_offset = (1 << (12-1)) << 2;
724 }
25f72752 725 else /* R_PARISC_PCREL22F. */
30667bf3
AM
726 {
727 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
728 }
729
30667bf3 730 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
731 return hppa_stub_long_branch;
732
30667bf3
AM
733 return hppa_stub_none;
734}
edd21aca 735
30667bf3
AM
736/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
737 IN_ARG contains the link info pointer. */
edd21aca 738
30667bf3
AM
739#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
740#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 741
30667bf3 742#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 743#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 744#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 745
3ee1d854
AM
746#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
747#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 748#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 749#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 750
3ee1d854
AM
751#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
752#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 753
30667bf3
AM
754#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
755#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
756#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
757#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 758
067fa4a6 759#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
760#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
761#define NOP 0x08000240 /* nop */
762#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
763#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
764#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 765
30667bf3
AM
766#ifndef R19_STUBS
767#define R19_STUBS 1
768#endif
edd21aca 769
30667bf3
AM
770#if R19_STUBS
771#define LDW_R1_DLT LDW_R1_R19
772#else
773#define LDW_R1_DLT LDW_R1_DP
774#endif
edd21aca 775
30667bf3
AM
776static boolean
777hppa_build_one_stub (gen_entry, in_arg)
778 struct bfd_hash_entry *gen_entry;
779 PTR in_arg;
780{
781 struct elf32_hppa_stub_hash_entry *stub_entry;
782 struct bfd_link_info *info;
83c81bfe 783 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
784 asection *stub_sec;
785 bfd *stub_bfd;
786 bfd_byte *loc;
787 bfd_vma sym_value;
74d1c347 788 bfd_vma insn;
8dea1268 789 bfd_vma off;
74d1c347 790 int val;
30667bf3 791 int size;
edd21aca 792
30667bf3
AM
793 /* Massage our args to the form they really have. */
794 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
795 info = (struct bfd_link_info *) in_arg;
796
83c81bfe 797 htab = hppa_link_hash_table (info);
30667bf3 798 stub_sec = stub_entry->stub_sec;
edd21aca 799
30667bf3 800 /* Make a note of the offset within the stubs for this entry. */
74d1c347 801 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 802 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 803
30667bf3
AM
804 stub_bfd = stub_sec->owner;
805
806 switch (stub_entry->stub_type)
807 {
808 case hppa_stub_long_branch:
809 /* Create the long branch. A long branch is formed with "ldil"
810 loading the upper bits of the target address into a register,
811 then branching with "be" which adds in the lower bits.
812 The "be" has its delay slot nullified. */
813 sym_value = (stub_entry->target_value
814 + stub_entry->target_section->output_offset
815 + stub_entry->target_section->output_section->vma);
816
74d1c347
AM
817 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
818 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
819 bfd_put_32 (stub_bfd, insn, loc);
820
74d1c347
AM
821 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
822 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
823 bfd_put_32 (stub_bfd, insn, loc + 4);
824
30667bf3 825 size = 8;
edd21aca
AM
826 break;
827
30667bf3
AM
828 case hppa_stub_long_branch_shared:
829 /* Branches are relative. This is where we are going to. */
830 sym_value = (stub_entry->target_value
831 + stub_entry->target_section->output_offset
832 + stub_entry->target_section->output_section->vma);
833
834 /* And this is where we are coming from, more or less. */
835 sym_value -= (stub_entry->stub_offset
836 + stub_sec->output_offset
837 + stub_sec->output_section->vma);
838
74d1c347 839 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 840 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 841 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
842 bfd_put_32 (stub_bfd, insn, loc + 4);
843
47d89dba 844 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 845 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
846 bfd_put_32 (stub_bfd, insn, loc + 8);
847 size = 12;
848 break;
edd21aca 849
30667bf3
AM
850 case hppa_stub_import:
851 case hppa_stub_import_shared:
8dea1268
AM
852 off = stub_entry->h->elf.plt.offset;
853 if (off >= (bfd_vma) -2)
49e9d0d3 854 abort ();
8dea1268
AM
855
856 off &= ~ (bfd_vma) 1;
857 sym_value = (off
83c81bfe
AM
858 + htab->splt->output_offset
859 + htab->splt->output_section->vma
860 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
861
862 insn = ADDIL_DP;
863#if R19_STUBS
864 if (stub_entry->stub_type == hppa_stub_import_shared)
865 insn = ADDIL_R19;
866#endif
47d89dba 867 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 868 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 869 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 870
47d89dba
AM
871 /* It is critical to use lrsel/rrsel here because we are using
872 two different offsets (+0 and +4) from sym_value. If we use
873 lsel/rsel then with unfortunate sym_values we will round
874 sym_value+4 up to the next 2k block leading to a mis-match
875 between the lsel and rsel value. */
876 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 877 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 878 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 879
83c81bfe 880 if (htab->multi_subspace)
30667bf3 881 {
47d89dba 882 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 883 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 884 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 885
74d1c347
AM
886 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
887 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
888 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
889 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 890
30667bf3
AM
891 size = 28;
892 }
893 else
894 {
74d1c347 895 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 896 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 897 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 898 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 899
30667bf3
AM
900 size = 16;
901 }
252b5132 902
30667bf3
AM
903 if (!info->shared
904 && stub_entry->h != NULL
905 && stub_entry->h->pic_call)
252b5132 906 {
30667bf3
AM
907 /* Build the .plt entry needed to call a PIC function from
908 statically linked code. We don't need any relocs. */
909 bfd *dynobj;
910 struct elf32_hppa_link_hash_entry *eh;
911 bfd_vma value;
252b5132 912
ebe50bae 913 dynobj = htab->elf.dynobj;
30667bf3 914 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 915
49e9d0d3
AM
916 if (eh->elf.root.type != bfd_link_hash_defined
917 && eh->elf.root.type != bfd_link_hash_defweak)
918 abort ();
252b5132 919
30667bf3
AM
920 value = (eh->elf.root.u.def.value
921 + eh->elf.root.u.def.section->output_offset
922 + eh->elf.root.u.def.section->output_section->vma);
252b5132 923
30667bf3 924 /* Fill in the entry in the procedure linkage table.
252b5132 925
30667bf3 926 The format of a plt entry is
74d1c347
AM
927 <funcaddr>
928 <__gp>. */
252b5132 929
83c81bfe
AM
930 bfd_put_32 (htab->splt->owner, value,
931 htab->splt->contents + off);
932 value = elf_gp (htab->splt->output_section->owner);
933 bfd_put_32 (htab->splt->owner, value,
934 htab->splt->contents + off + 4);
252b5132 935 }
30667bf3 936 break;
252b5132 937
30667bf3
AM
938 case hppa_stub_export:
939 /* Branches are relative. This is where we are going to. */
940 sym_value = (stub_entry->target_value
941 + stub_entry->target_section->output_offset
942 + stub_entry->target_section->output_section->vma);
252b5132 943
30667bf3
AM
944 /* And this is where we are coming from. */
945 sym_value -= (stub_entry->stub_offset
946 + stub_sec->output_offset
947 + stub_sec->output_section->vma);
edd21aca 948
067fa4a6
AM
949 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
950 && (!htab->has_22bit_branch
951 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 952 {
edd21aca 953 (*_bfd_error_handler)
30667bf3 954 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 955 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
956 stub_sec->name,
957 (long) stub_entry->stub_offset,
958 stub_entry->root.string);
959 bfd_set_error (bfd_error_bad_value);
edd21aca 960 return false;
252b5132 961 }
30667bf3 962
74d1c347 963 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
964 if (!htab->has_22bit_branch)
965 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
966 else
967 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
968 bfd_put_32 (stub_bfd, insn, loc);
969
74d1c347
AM
970 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
971 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
972 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
973 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
974 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
975
976 /* Point the function symbol at the stub. */
977 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 978 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
979
980 size = 24;
981 break;
982
983 default:
984 BFD_FAIL ();
985 return false;
252b5132
RH
986 }
987
74d1c347 988 stub_sec->_raw_size += size;
252b5132
RH
989 return true;
990}
991
30667bf3
AM
992#undef LDIL_R1
993#undef BE_SR4_R1
994#undef BL_R1
995#undef ADDIL_R1
996#undef DEPI_R1
997#undef ADDIL_DP
998#undef LDW_R1_R21
999#undef LDW_R1_DLT
1000#undef LDW_R1_R19
1001#undef ADDIL_R19
1002#undef LDW_R1_DP
1003#undef LDSID_R21_R1
1004#undef MTSP_R1
1005#undef BE_SR0_R21
1006#undef STW_RP
1007#undef BV_R0_R21
1008#undef BL_RP
1009#undef NOP
1010#undef LDW_RP
1011#undef LDSID_RP_R1
1012#undef BE_SR0_RP
252b5132 1013
30667bf3
AM
1014/* As above, but don't actually build the stub. Just bump offset so
1015 we know stub section sizes. */
1016
1017static boolean
1018hppa_size_one_stub (gen_entry, in_arg)
1019 struct bfd_hash_entry *gen_entry;
1020 PTR in_arg;
252b5132 1021{
30667bf3 1022 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1023 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1024 int size;
1025
1026 /* Massage our args to the form they really have. */
1027 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1028 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1029
1030 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1031 size = 8;
30667bf3
AM
1032 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1033 size = 12;
1034 else if (stub_entry->stub_type == hppa_stub_export)
1035 size = 24;
74d1c347 1036 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1037 {
83c81bfe 1038 if (htab->multi_subspace)
30667bf3
AM
1039 size = 28;
1040 else
1041 size = 16;
1042 }
252b5132 1043
74d1c347 1044 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1045 return true;
1046}
252b5132 1047
30667bf3
AM
1048/* Return nonzero if ABFD represents an HPPA ELF32 file.
1049 Additionally we set the default architecture and machine. */
1050
1051static boolean
1052elf32_hppa_object_p (abfd)
1053 bfd *abfd;
1054{
24a5e751
L
1055 Elf_Internal_Ehdr * i_ehdrp;
1056 unsigned int flags;
252b5132 1057
24a5e751
L
1058 i_ehdrp = elf_elfheader (abfd);
1059 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1060 {
1061 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1062 return false;
1063 }
1064 else
1065 {
1066 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1067 return false;
1068 }
1069
1070 flags = i_ehdrp->e_flags;
30667bf3
AM
1071 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1072 {
1073 case EFA_PARISC_1_0:
1074 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1075 case EFA_PARISC_1_1:
1076 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1077 case EFA_PARISC_2_0:
1078 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1079 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1080 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1081 }
1082 return true;
252b5132
RH
1083}
1084
252b5132
RH
1085/* Undo the generic ELF code's subtraction of section->vma from the
1086 value of each external symbol. */
1087
1088static boolean
1089elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1090 bfd *abfd ATTRIBUTE_UNUSED;
1091 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1092 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1093 const char **namep ATTRIBUTE_UNUSED;
1094 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1095 asection **secp;
1096 bfd_vma *valp;
1097{
1098 *valp += (*secp)->vma;
1099 return true;
1100}
1101
30667bf3
AM
1102/* Create the .plt and .got sections, and set up our hash table
1103 short-cuts to various dynamic sections. */
1104
1105static boolean
1106elf32_hppa_create_dynamic_sections (abfd, info)
1107 bfd *abfd;
1108 struct bfd_link_info *info;
252b5132 1109{
83c81bfe 1110 struct elf32_hppa_link_hash_table *htab;
edd21aca 1111
30667bf3 1112 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1113 htab = hppa_link_hash_table (info);
1114 if (htab->splt != NULL)
30667bf3 1115 return true;
edd21aca 1116
30667bf3
AM
1117 /* Call the generic code to do most of the work. */
1118 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1119 return false;
252b5132 1120
83c81bfe
AM
1121 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1122 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1123
83c81bfe
AM
1124 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1125 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1126 if (htab->srelgot == NULL
1127 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1128 (SEC_ALLOC
1129 | SEC_LOAD
1130 | SEC_HAS_CONTENTS
1131 | SEC_IN_MEMORY
1132 | SEC_LINKER_CREATED
1133 | SEC_READONLY))
83c81bfe 1134 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1135 return false;
edd21aca 1136
83c81bfe
AM
1137 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1138 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1139
1140 return true;
1141}
1142
ebe50bae
AM
1143/* Copy the extra info we tack onto an elf_link_hash_entry. */
1144
51b64d56 1145static void
ebe50bae
AM
1146elf32_hppa_copy_indirect_symbol (dir, ind)
1147 struct elf_link_hash_entry *dir, *ind;
1148{
1149 struct elf32_hppa_link_hash_entry *edir, *eind;
1150
1151 edir = (struct elf32_hppa_link_hash_entry *) dir;
1152 eind = (struct elf32_hppa_link_hash_entry *) ind;
1153
bbd7ec4a 1154 if (eind->dyn_relocs != NULL)
ebe50bae 1155 {
bbd7ec4a
AM
1156 if (edir->dyn_relocs != NULL)
1157 {
1158 struct elf32_hppa_dyn_reloc_entry **pp;
1159 struct elf32_hppa_dyn_reloc_entry *p;
1160
1e370bd2 1161 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
1162 abort ();
1163
1164 /* Add reloc counts against the weak sym to the strong sym
1165 list. Merge any entries against the same section. */
1166 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1167 {
1168 struct elf32_hppa_dyn_reloc_entry *q;
1169
1170 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1171 if (q->sec == p->sec)
1172 {
1173#if RELATIVE_DYNRELOCS
1174 q->relative_count += p->relative_count;
1175#endif
1176 q->count += p->count;
1177 *pp = p->next;
1178 break;
1179 }
1180 if (q == NULL)
1181 pp = &p->next;
1182 }
1183 *pp = edir->dyn_relocs;
1184 }
1185
ebe50bae
AM
1186 edir->dyn_relocs = eind->dyn_relocs;
1187 eind->dyn_relocs = NULL;
1188 }
ebe50bae
AM
1189
1190 _bfd_elf_link_hash_copy_indirect (dir, ind);
1191}
1192
30667bf3 1193/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1194 calculate needed space in the global offset table, procedure linkage
1195 table, and dynamic reloc sections. At this point we haven't
1196 necessarily read all the input files. */
252b5132
RH
1197
1198static boolean
30667bf3
AM
1199elf32_hppa_check_relocs (abfd, info, sec, relocs)
1200 bfd *abfd;
1201 struct bfd_link_info *info;
1202 asection *sec;
1203 const Elf_Internal_Rela *relocs;
252b5132 1204{
30667bf3
AM
1205 Elf_Internal_Shdr *symtab_hdr;
1206 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1207 const Elf_Internal_Rela *rel;
1208 const Elf_Internal_Rela *rel_end;
83c81bfe 1209 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1210 asection *sreloc;
1211 asection *stubreloc;
1212
1213 if (info->relocateable)
1214 return true;
1215
83c81bfe 1216 htab = hppa_link_hash_table (info);
30667bf3
AM
1217 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1218 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1219 sreloc = NULL;
1220 stubreloc = NULL;
1221
1222 rel_end = relocs + sec->reloc_count;
1223 for (rel = relocs; rel < rel_end; rel++)
1224 {
1225 enum {
1226 NEED_GOT = 1,
1227 NEED_PLT = 2,
1228 NEED_DYNREL = 4,
98ceb8ce 1229 PLT_PLABEL = 8
30667bf3 1230 };
edd21aca 1231
30667bf3
AM
1232 unsigned int r_symndx, r_type;
1233 struct elf32_hppa_link_hash_entry *h;
1234 int need_entry;
252b5132 1235
30667bf3 1236 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1237
30667bf3
AM
1238 if (r_symndx < symtab_hdr->sh_info)
1239 h = NULL;
1240 else
1241 h = ((struct elf32_hppa_link_hash_entry *)
1242 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1243
30667bf3 1244 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1245
30667bf3
AM
1246 switch (r_type)
1247 {
1248 case R_PARISC_DLTIND14F:
1249 case R_PARISC_DLTIND14R:
1250 case R_PARISC_DLTIND21L:
1251 /* This symbol requires a global offset table entry. */
1252 need_entry = NEED_GOT;
1253
1254 /* Mark this section as containing PIC code. */
1255 sec->flags |= SEC_HAS_GOT_REF;
1256 break;
1257
1258 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1259 case R_PARISC_PLABEL21L:
1260 case R_PARISC_PLABEL32:
74d1c347 1261 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1262 if (rel->r_addend != 0)
1263 abort ();
74d1c347
AM
1264
1265 /* If we are creating a shared library, then we need to
1266 create a PLT entry for all PLABELs, because PLABELs with
1267 local symbols may be passed via a pointer to another
1268 object. Additionally, output a dynamic relocation
4dc86686
AM
1269 pointing to the PLT entry.
1270 For executables, the original 32-bit ABI allowed two
1271 different styles of PLABELs (function pointers): For
1272 global functions, the PLABEL word points into the .plt
1273 two bytes past a (function address, gp) pair, and for
1274 local functions the PLABEL points directly at the
1275 function. The magic +2 for the first type allows us to
1276 differentiate between the two. As you can imagine, this
1277 is a real pain when it comes to generating code to call
1278 functions indirectly or to compare function pointers.
1279 We avoid the mess by always pointing a PLABEL into the
1280 .plt, even for local functions. */
74d1c347 1281 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1282 break;
1283
1284 case R_PARISC_PCREL12F:
83c81bfe 1285 htab->has_12bit_branch = 1;
067fa4a6
AM
1286 goto branch_common;
1287
30667bf3
AM
1288 case R_PARISC_PCREL17C:
1289 case R_PARISC_PCREL17F:
83c81bfe 1290 htab->has_17bit_branch = 1;
067fa4a6
AM
1291 goto branch_common;
1292
30667bf3 1293 case R_PARISC_PCREL22F:
067fa4a6
AM
1294 htab->has_22bit_branch = 1;
1295 branch_common:
47d89dba
AM
1296 /* Function calls might need to go through the .plt, and
1297 might require long branch stubs. */
30667bf3
AM
1298 if (h == NULL)
1299 {
1300 /* We know local syms won't need a .plt entry, and if
1301 they need a long branch stub we can't guarantee that
1302 we can reach the stub. So just flag an error later
1303 if we're doing a shared link and find we need a long
1304 branch stub. */
1305 continue;
1306 }
1307 else
1308 {
1309 /* Global symbols will need a .plt entry if they remain
1310 global, and in most cases won't need a long branch
1311 stub. Unfortunately, we have to cater for the case
1312 where a symbol is forced local by versioning, or due
1313 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1314 need_entry = NEED_PLT;
4dc86686 1315 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1316 need_entry = 0;
30667bf3
AM
1317 }
1318 break;
1319
1320 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1321 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1322 case R_PARISC_PCREL14F: /* PC relative load/store. */
1323 case R_PARISC_PCREL14R:
1324 case R_PARISC_PCREL17R: /* External branches. */
1325 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1326 /* We don't need to propagate the relocation if linking a
1327 shared object since these are section relative. */
1328 continue;
1329
1330 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1331 case R_PARISC_DPREL14R:
1332 case R_PARISC_DPREL21L:
1333 if (info->shared)
1334 {
1335 (*_bfd_error_handler)
1336 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1337 bfd_archive_filename (abfd),
30667bf3
AM
1338 elf_hppa_howto_table[r_type].name);
1339 bfd_set_error (bfd_error_bad_value);
1340 return false;
1341 }
1342 /* Fall through. */
1343
1344 case R_PARISC_DIR17F: /* Used for external branches. */
1345 case R_PARISC_DIR17R:
47d89dba
AM
1346 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1347 case R_PARISC_DIR14R:
30667bf3 1348 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
067fa4a6 1349#if 0
30667bf3
AM
1350 /* Help debug shared library creation. Any of the above
1351 relocs can be used in shared libs, but they may cause
1352 pages to become unshared. */
1353 if (info->shared)
1354 {
1355 (*_bfd_error_handler)
1356 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1357 bfd_archive_filename (abfd),
30667bf3
AM
1358 elf_hppa_howto_table[r_type].name);
1359 }
1360 /* Fall through. */
1361#endif
1362
c46b7515 1363 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1364 /* We may want to output a dynamic relocation later. */
1365 need_entry = NEED_DYNREL;
1366 break;
1367
1368 /* This relocation describes the C++ object vtable hierarchy.
1369 Reconstruct it for later use during GC. */
1370 case R_PARISC_GNU_VTINHERIT:
1371 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1372 &h->elf, rel->r_offset))
1373 return false;
1374 continue;
1375
1376 /* This relocation describes which C++ vtable entries are actually
1377 used. Record for later use during GC. */
1378 case R_PARISC_GNU_VTENTRY:
1379 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1380 &h->elf, rel->r_addend))
30667bf3
AM
1381 return false;
1382 continue;
1383
1384 default:
1385 continue;
1386 }
1387
1388 /* Now carry out our orders. */
1389 if (need_entry & NEED_GOT)
1390 {
1391 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1392 relocation for this entry. */
83c81bfe 1393 if (htab->sgot == NULL)
30667bf3 1394 {
3ac8354b
AM
1395 if (htab->elf.dynobj == NULL)
1396 htab->elf.dynobj = abfd;
1397 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
30667bf3
AM
1398 return false;
1399 }
1400
1401 if (h != NULL)
1402 {
51b64d56 1403 h->elf.got.refcount += 1;
30667bf3
AM
1404 }
1405 else
1406 {
3ac8354b
AM
1407 bfd_signed_vma *local_got_refcounts;
1408
30667bf3 1409 /* This is a global offset table entry for a local symbol. */
3ac8354b 1410 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1411 if (local_got_refcounts == NULL)
1412 {
dc810e39 1413 bfd_size_type size;
30667bf3 1414
74d1c347
AM
1415 /* Allocate space for local got offsets and local
1416 plt offsets. Done this way to save polluting
1417 elf_obj_tdata with another target specific
1418 pointer. */
dc810e39
AM
1419 size = symtab_hdr->sh_info;
1420 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1421 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1422 bfd_zalloc (abfd, size));
30667bf3
AM
1423 if (local_got_refcounts == NULL)
1424 return false;
1425 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1426 }
ebe50bae 1427 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1428 }
1429 }
1430
1431 if (need_entry & NEED_PLT)
1432 {
1433 /* If we are creating a shared library, and this is a reloc
1434 against a weak symbol or a global symbol in a dynamic
1435 object, then we will be creating an import stub and a
1436 .plt entry for the symbol. Similarly, on a normal link
1437 to symbols defined in a dynamic object we'll need the
1438 import stub and a .plt entry. We don't know yet whether
1439 the symbol is defined or not, so make an entry anyway and
1440 clean up later in adjust_dynamic_symbol. */
1441 if ((sec->flags & SEC_ALLOC) != 0)
1442 {
74d1c347 1443 if (h != NULL)
30667bf3 1444 {
51b64d56
AM
1445 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1446 h->elf.plt.refcount += 1;
74d1c347 1447
36605136
AM
1448 /* If this .plt entry is for a plabel, mark it so
1449 that adjust_dynamic_symbol will keep the entry
1450 even if it appears to be local. */
74d1c347
AM
1451 if (need_entry & PLT_PLABEL)
1452 h->plabel = 1;
1453 }
1454 else if (need_entry & PLT_PLABEL)
1455 {
3ac8354b 1456 bfd_signed_vma *local_got_refcounts;
68fb2e56 1457 bfd_signed_vma *local_plt_refcounts;
74d1c347 1458
3ac8354b 1459 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1460 if (local_got_refcounts == NULL)
1461 {
dc810e39 1462 bfd_size_type size;
74d1c347
AM
1463
1464 /* Allocate space for local got offsets and local
1465 plt offsets. */
dc810e39
AM
1466 size = symtab_hdr->sh_info;
1467 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1468 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1469 bfd_zalloc (abfd, size));
74d1c347
AM
1470 if (local_got_refcounts == NULL)
1471 return false;
1472 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1473 }
68fb2e56
AM
1474 local_plt_refcounts = (local_got_refcounts
1475 + symtab_hdr->sh_info);
ebe50bae 1476 local_plt_refcounts[r_symndx] += 1;
30667bf3 1477 }
30667bf3
AM
1478 }
1479 }
1480
98ceb8ce 1481 if (need_entry & NEED_DYNREL)
30667bf3
AM
1482 {
1483 /* Flag this symbol as having a non-got, non-plt reference
1484 so that we generate copy relocs if it turns out to be
1485 dynamic. */
ebe50bae 1486 if (h != NULL && !info->shared)
30667bf3
AM
1487 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1488
1489 /* If we are creating a shared library then we need to copy
1490 the reloc into the shared library. However, if we are
1491 linking with -Bsymbolic, we need only copy absolute
1492 relocs or relocs against symbols that are not defined in
1493 an object we are including in the link. PC- or DP- or
1494 DLT-relative relocs against any local sym or global sym
1495 with DEF_REGULAR set, can be discarded. At this point we
1496 have not seen all the input files, so it is possible that
1497 DEF_REGULAR is not set now but will be set later (it is
1498 never cleared). We account for that possibility below by
98ceb8ce 1499 storing information in the dyn_relocs field of the
30667bf3
AM
1500 hash table entry.
1501
1502 A similar situation to the -Bsymbolic case occurs when
1503 creating shared libraries and symbol visibility changes
1504 render the symbol local.
1505
1506 As it turns out, all the relocs we will be creating here
1507 are absolute, so we cannot remove them on -Bsymbolic
1508 links or visibility changes anyway. A STUB_REL reloc
1509 is absolute too, as in that case it is the reloc in the
1510 stub we will be creating, rather than copying the PCREL
56882138
AM
1511 reloc in the branch.
1512
1513 If on the other hand, we are creating an executable, we
1514 may need to keep relocations for symbols satisfied by a
1515 dynamic library if we manage to avoid copy relocs for the
1516 symbol. */
446f2863
AM
1517 if ((info->shared
1518 && (sec->flags & SEC_ALLOC) != 0
1519 && (IS_ABSOLUTE_RELOC (r_type)
1520 || (h != NULL
1521 && (!info->symbolic
1522 || h->elf.root.type == bfd_link_hash_defweak
1523 || (h->elf.elf_link_hash_flags
1524 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1525 || (!info->shared
1526 && (sec->flags & SEC_ALLOC) != 0
1527 && h != NULL
446f2863
AM
1528 && (h->elf.root.type == bfd_link_hash_defweak
1529 || (h->elf.elf_link_hash_flags
1530 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1531 {
ec338859
AM
1532 struct elf32_hppa_dyn_reloc_entry *p;
1533 struct elf32_hppa_dyn_reloc_entry **head;
1534
30667bf3
AM
1535 /* Create a reloc section in dynobj and make room for
1536 this reloc. */
98ceb8ce 1537 if (sreloc == NULL)
30667bf3
AM
1538 {
1539 char *name;
3ac8354b 1540 bfd *dynobj;
30667bf3 1541
98ceb8ce
AM
1542 name = (bfd_elf_string_from_elf_section
1543 (abfd,
1544 elf_elfheader (abfd)->e_shstrndx,
1545 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1546 if (name == NULL)
1547 {
1548 (*_bfd_error_handler)
1549 (_("Could not find relocation section for %s"),
1550 sec->name);
1551 bfd_set_error (bfd_error_bad_value);
1552 return false;
1553 }
1554
3ac8354b
AM
1555 if (htab->elf.dynobj == NULL)
1556 htab->elf.dynobj = abfd;
1557
1558 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1559 sreloc = bfd_get_section_by_name (dynobj, name);
1560 if (sreloc == NULL)
30667bf3
AM
1561 {
1562 flagword flags;
1563
98ceb8ce 1564 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1565 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1566 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1567 if ((sec->flags & SEC_ALLOC) != 0)
1568 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1569 if (sreloc == NULL
1570 || !bfd_set_section_flags (dynobj, sreloc, flags)
1571 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1572 return false;
1573 }
30667bf3 1574
98ceb8ce 1575 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1576 }
1577
98ceb8ce
AM
1578 /* If this is a global symbol, we count the number of
1579 relocations we need for this symbol. */
1580 if (h != NULL)
30667bf3 1581 {
ec338859
AM
1582 head = &h->dyn_relocs;
1583 }
1584 else
1585 {
1586 /* Track dynamic relocs needed for local syms too.
1587 We really need local syms available to do this
1588 easily. Oh well. */
1589
1590 asection *s;
1591 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1592 sec, r_symndx);
1593 if (s == NULL)
1594 return false;
30667bf3 1595
ec338859
AM
1596 head = ((struct elf32_hppa_dyn_reloc_entry **)
1597 &elf_section_data (s)->local_dynrel);
1598 }
1599
1600 p = *head;
1601 if (p == NULL || p->sec != sec)
1602 {
1603 p = ((struct elf32_hppa_dyn_reloc_entry *)
1604 bfd_alloc (htab->elf.dynobj,
1605 (bfd_size_type) sizeof *p));
1606 if (p == NULL)
1607 return false;
1608 p->next = *head;
1609 *head = p;
1610 p->sec = sec;
1611 p->count = 0;
98ceb8ce 1612#if RELATIVE_DYNRELOCS
ec338859 1613 p->relative_count = 0;
98ceb8ce 1614#endif
ec338859 1615 }
98ceb8ce 1616
ec338859 1617 p->count += 1;
98ceb8ce 1618#if RELATIVE_DYNRELOCS
ec338859
AM
1619 if (!IS_ABSOLUTE_RELOC (rtype))
1620 p->relative_count += 1;
98ceb8ce 1621#endif
30667bf3
AM
1622 }
1623 }
1624 }
edd21aca
AM
1625
1626 return true;
1627}
1628
30667bf3
AM
1629/* Return the section that should be marked against garbage collection
1630 for a given relocation. */
1631
1632static asection *
1633elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1634 bfd *abfd;
1635 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1636 Elf_Internal_Rela *rel;
1637 struct elf_link_hash_entry *h;
1638 Elf_Internal_Sym *sym;
1639{
1640 if (h != NULL)
1641 {
1642 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1643 {
1644 case R_PARISC_GNU_VTINHERIT:
1645 case R_PARISC_GNU_VTENTRY:
1646 break;
1647
1648 default:
1649 switch (h->root.type)
1650 {
1651 case bfd_link_hash_defined:
1652 case bfd_link_hash_defweak:
1653 return h->root.u.def.section;
1654
1655 case bfd_link_hash_common:
1656 return h->root.u.c.p->section;
1657
1658 default:
1659 break;
1660 }
1661 }
1662 }
1663 else
1664 {
9ad5cbcf 1665 return bfd_section_from_elf_index (abfd, sym->st_shndx);
30667bf3
AM
1666 }
1667
1668 return NULL;
1669}
1670
30667bf3
AM
1671/* Update the got and plt entry reference counts for the section being
1672 removed. */
edd21aca
AM
1673
1674static boolean
30667bf3
AM
1675elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1676 bfd *abfd;
1677 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1678 asection *sec;
1679 const Elf_Internal_Rela *relocs;
edd21aca 1680{
30667bf3
AM
1681 Elf_Internal_Shdr *symtab_hdr;
1682 struct elf_link_hash_entry **sym_hashes;
1683 bfd_signed_vma *local_got_refcounts;
74d1c347 1684 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1685 const Elf_Internal_Rela *rel, *relend;
1686 unsigned long r_symndx;
1687 struct elf_link_hash_entry *h;
83c81bfe 1688 struct elf32_hppa_link_hash_table *htab;
30667bf3 1689 bfd *dynobj;
30667bf3 1690
ec338859 1691 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1692
30667bf3
AM
1693 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1694 sym_hashes = elf_sym_hashes (abfd);
1695 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1696 local_plt_refcounts = local_got_refcounts;
1697 if (local_plt_refcounts != NULL)
1698 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1699 htab = hppa_link_hash_table (info);
ebe50bae 1700 dynobj = htab->elf.dynobj;
30667bf3
AM
1701 if (dynobj == NULL)
1702 return true;
1703
30667bf3
AM
1704 relend = relocs + sec->reloc_count;
1705 for (rel = relocs; rel < relend; rel++)
1706 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1707 {
1708 case R_PARISC_DLTIND14F:
1709 case R_PARISC_DLTIND14R:
1710 case R_PARISC_DLTIND21L:
1711 r_symndx = ELF32_R_SYM (rel->r_info);
1712 if (r_symndx >= symtab_hdr->sh_info)
1713 {
1714 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1715 if (h->got.refcount > 0)
4dc86686 1716 h->got.refcount -= 1;
30667bf3
AM
1717 }
1718 else if (local_got_refcounts != NULL)
1719 {
1720 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1721 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1722 }
1723 break;
edd21aca 1724
30667bf3
AM
1725 case R_PARISC_PCREL12F:
1726 case R_PARISC_PCREL17C:
1727 case R_PARISC_PCREL17F:
1728 case R_PARISC_PCREL22F:
1729 r_symndx = ELF32_R_SYM (rel->r_info);
1730 if (r_symndx >= symtab_hdr->sh_info)
1731 {
1732 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1733 if (h->plt.refcount > 0)
1734 h->plt.refcount -= 1;
1735 }
1736 break;
edd21aca 1737
74d1c347
AM
1738 case R_PARISC_PLABEL14R:
1739 case R_PARISC_PLABEL21L:
1740 case R_PARISC_PLABEL32:
1741 r_symndx = ELF32_R_SYM (rel->r_info);
1742 if (r_symndx >= symtab_hdr->sh_info)
1743 {
98ceb8ce
AM
1744 struct elf32_hppa_link_hash_entry *eh;
1745 struct elf32_hppa_dyn_reloc_entry **pp;
1746 struct elf32_hppa_dyn_reloc_entry *p;
1747
74d1c347 1748 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1749
74d1c347
AM
1750 if (h->plt.refcount > 0)
1751 h->plt.refcount -= 1;
98ceb8ce
AM
1752
1753 eh = (struct elf32_hppa_link_hash_entry *) h;
1754
1755 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1756 if (p->sec == sec)
1757 {
1758#if RELATIVE_DYNRELOCS
1759 if (!IS_ABSOLUTE_RELOC (rtype))
1760 p->relative_count -= 1;
1761#endif
1762 p->count -= 1;
1763 if (p->count == 0)
1764 *pp = p->next;
1765 break;
1766 }
74d1c347
AM
1767 }
1768 else if (local_plt_refcounts != NULL)
1769 {
1770 if (local_plt_refcounts[r_symndx] > 0)
1771 local_plt_refcounts[r_symndx] -= 1;
1772 }
1773 break;
1774
98ceb8ce
AM
1775 case R_PARISC_DIR32:
1776 r_symndx = ELF32_R_SYM (rel->r_info);
1777 if (r_symndx >= symtab_hdr->sh_info)
1778 {
1779 struct elf32_hppa_link_hash_entry *eh;
1780 struct elf32_hppa_dyn_reloc_entry **pp;
1781 struct elf32_hppa_dyn_reloc_entry *p;
1782
1783 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1784
1785 eh = (struct elf32_hppa_link_hash_entry *) h;
1786
1787 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1788 if (p->sec == sec)
1789 {
1790#if RELATIVE_DYNRELOCS
1791 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1792 p->relative_count -= 1;
1793#endif
1794 p->count -= 1;
1795 if (p->count == 0)
1796 *pp = p->next;
1797 break;
1798 }
1799 }
1800 break;
1801
30667bf3
AM
1802 default:
1803 break;
1804 }
252b5132 1805
252b5132
RH
1806 return true;
1807}
1808
74d1c347
AM
1809/* Our own version of hide_symbol, so that we can keep plt entries for
1810 plabels. */
1811
1812static void
e5094212
AM
1813elf32_hppa_hide_symbol (info, h, force_local)
1814 struct bfd_link_info *info;
74d1c347 1815 struct elf_link_hash_entry *h;
e5094212 1816 boolean force_local;
74d1c347 1817{
e5094212
AM
1818 if (force_local)
1819 {
1820 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1821 if (h->dynindx != -1)
1822 {
1823 h->dynindx = -1;
1824 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1825 h->dynstr_index);
1826 }
1827 }
1828
74d1c347
AM
1829 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1830 {
1831 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1832 h->plt.offset = (bfd_vma) -1;
1833 }
1834}
1835
4dc86686
AM
1836/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1837 will be called from elflink.h. If elflink.h doesn't call our
1838 finish_dynamic_symbol routine, we'll need to do something about
1839 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1840#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1841 ((DYN) \
1842 && ((INFO)->shared \
1843 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1844 && ((H)->dynindx != -1 \
1845 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1846
30667bf3
AM
1847/* Adjust a symbol defined by a dynamic object and referenced by a
1848 regular object. The current definition is in some section of the
1849 dynamic object, but we're not including those sections. We have to
1850 change the definition to something the rest of the link can
1851 understand. */
252b5132 1852
30667bf3
AM
1853static boolean
1854elf32_hppa_adjust_dynamic_symbol (info, h)
1855 struct bfd_link_info *info;
1856 struct elf_link_hash_entry *h;
252b5132 1857{
83c81bfe 1858 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1859 struct elf32_hppa_link_hash_entry *eh;
1860 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1861 asection *s;
3ac8354b 1862 unsigned int power_of_two;
30667bf3
AM
1863
1864 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1865 will fill in the contents of the procedure linkage table later. */
30667bf3
AM
1866 if (h->type == STT_FUNC
1867 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1868 {
1869 if (h->plt.refcount <= 0
1870 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1871 && h->root.type != bfd_link_hash_defweak
74d1c347 1872 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1873 && (!info->shared || info->symbolic)))
1874 {
1875 /* The .plt entry is not needed when:
1876 a) Garbage collection has removed all references to the
1877 symbol, or
1878 b) We know for certain the symbol is defined in this
74d1c347
AM
1879 object, and it's not a weak definition, nor is the symbol
1880 used by a plabel relocation. Either this object is the
1881 application or we are doing a shared symbolic link. */
1882
1883 /* As a special sop to the hppa ABI, we keep a .plt entry
1884 for functions in sections containing PIC code. */
067fa4a6
AM
1885 if (!info->shared
1886 && h->plt.refcount > 0
1887 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1888 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
12cca0d2 1889 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1890 else
1891 {
1892 h->plt.offset = (bfd_vma) -1;
1893 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1894 }
30667bf3 1895 }
4dc86686 1896
30667bf3
AM
1897 return true;
1898 }
bbd7ec4a
AM
1899 else
1900 h->plt.offset = (bfd_vma) -1;
edd21aca 1901
30667bf3
AM
1902 /* If this is a weak symbol, and there is a real definition, the
1903 processor independent code will have arranged for us to see the
1904 real definition first, and we can just use the same value. */
1905 if (h->weakdef != NULL)
edd21aca 1906 {
49e9d0d3
AM
1907 if (h->weakdef->root.type != bfd_link_hash_defined
1908 && h->weakdef->root.type != bfd_link_hash_defweak)
1909 abort ();
30667bf3
AM
1910 h->root.u.def.section = h->weakdef->root.u.def.section;
1911 h->root.u.def.value = h->weakdef->root.u.def.value;
0a991dfe 1912 return true;
30667bf3 1913 }
edd21aca 1914
30667bf3
AM
1915 /* This is a reference to a symbol defined by a dynamic object which
1916 is not a function. */
1917
1918 /* If we are creating a shared library, we must presume that the
1919 only references to the symbol are via the global offset table.
1920 For such cases we need not do anything here; the relocations will
1921 be handled correctly by relocate_section. */
1922 if (info->shared)
1923 return true;
1924
1925 /* If there are no references to this symbol that do not use the
1926 GOT, we don't need to generate a copy reloc. */
1927 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1928 return true;
1929
ebe50bae
AM
1930 eh = (struct elf32_hppa_link_hash_entry *) h;
1931 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1932 {
1933 s = p->sec->output_section;
1934 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1935 break;
1936 }
1937
1938 /* If we didn't find any dynamic relocs in read-only sections, then
46fe4e66 1939 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
ebe50bae
AM
1940 if (p == NULL)
1941 {
1942 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1943 return true;
1944 }
1945
30667bf3
AM
1946 /* We must allocate the symbol in our .dynbss section, which will
1947 become part of the .bss section of the executable. There will be
1948 an entry for this symbol in the .dynsym section. The dynamic
1949 object will contain position independent code, so all references
1950 from the dynamic object to this symbol will go through the global
1951 offset table. The dynamic linker will use the .dynsym entry to
1952 determine the address it must put in the global offset table, so
1953 both the dynamic object and the regular object will refer to the
1954 same memory location for the variable. */
1955
3ac8354b 1956 htab = hppa_link_hash_table (info);
30667bf3
AM
1957
1958 /* We must generate a COPY reloc to tell the dynamic linker to
1959 copy the initial value out of the dynamic object and into the
3ac8354b 1960 runtime process image. */
30667bf3
AM
1961 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1962 {
3ac8354b 1963 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1964 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1965 }
252b5132 1966
3ac8354b
AM
1967 /* We need to figure out the alignment required for this symbol. I
1968 have no idea how other ELF linkers handle this. */
30667bf3 1969
3ac8354b
AM
1970 power_of_two = bfd_log2 (h->size);
1971 if (power_of_two > 3)
1972 power_of_two = 3;
1973
1974 /* Apply the required alignment. */
1975 s = htab->sdynbss;
1976 s->_raw_size = BFD_ALIGN (s->_raw_size,
1977 (bfd_size_type) (1 << power_of_two));
1978 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1979 {
1980 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1981 return false;
1982 }
30667bf3 1983
30667bf3
AM
1984 /* Define the symbol as being at this point in the section. */
1985 h->root.u.def.section = s;
1986 h->root.u.def.value = s->_raw_size;
edd21aca 1987
30667bf3
AM
1988 /* Increment the section size to make room for the symbol. */
1989 s->_raw_size += h->size;
252b5132
RH
1990
1991 return true;
1992}
1993
30667bf3
AM
1994/* Called via elf_link_hash_traverse to create .plt entries for an
1995 application that uses statically linked PIC functions. Similar to
1996 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1997
30667bf3 1998static boolean
a8d02d66 1999mark_PIC_calls (h, inf)
30667bf3 2000 struct elf_link_hash_entry *h;
4dc86686 2001 PTR inf ATTRIBUTE_UNUSED;
252b5132 2002{
e92d460e
AM
2003 if (h->root.type == bfd_link_hash_warning)
2004 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2005
30667bf3
AM
2006 if (! (h->plt.refcount > 0
2007 && (h->root.type == bfd_link_hash_defined
2008 || h->root.type == bfd_link_hash_defweak)
2009 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 2010 {
30667bf3
AM
2011 h->plt.offset = (bfd_vma) -1;
2012 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2013 return true;
252b5132
RH
2014 }
2015
74d1c347 2016 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
30667bf3 2017 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 2018
4dc86686
AM
2019 return true;
2020}
2021
e5ee5df1
AM
2022/* Allocate space in the .plt for entries that won't have relocations.
2023 ie. pic_call and plabel entries. */
a8d02d66
AM
2024
2025static boolean
e5ee5df1 2026allocate_plt_static (h, inf)
a8d02d66
AM
2027 struct elf_link_hash_entry *h;
2028 PTR inf;
2029{
2030 struct bfd_link_info *info;
2031 struct elf32_hppa_link_hash_table *htab;
2032 asection *s;
2033
e92d460e 2034 if (h->root.type == bfd_link_hash_indirect)
a8d02d66
AM
2035 return true;
2036
e92d460e
AM
2037 if (h->root.type == bfd_link_hash_warning)
2038 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2039
a8d02d66
AM
2040 info = (struct bfd_link_info *) inf;
2041 htab = hppa_link_hash_table (info);
2042 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2043 {
e5ee5df1
AM
2044 /* Make an entry in the .plt section for non-pic code that is
2045 calling pic code. */
067fa4a6 2046 ((struct elf32_hppa_link_hash_entry *) h)->plabel = 0;
a8d02d66
AM
2047 s = htab->splt;
2048 h->plt.offset = s->_raw_size;
e5ee5df1
AM
2049 s->_raw_size += PLT_ENTRY_SIZE;
2050 }
2051 else if (htab->elf.dynamic_sections_created
2052 && h->plt.refcount > 0)
2053 {
2054 /* Make sure this symbol is output as a dynamic symbol.
2055 Undefined weak syms won't yet be marked as dynamic. */
2056 if (h->dynindx == -1
2057 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2058 && h->type != STT_PARISC_MILLI)
a8d02d66 2059 {
e5ee5df1
AM
2060 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2061 return false;
2062 }
2063
2064 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2065 {
067fa4a6
AM
2066 /* Allocate these later. From this point on, h->plabel
2067 means that the plt entry is only used by a plabel.
2068 We'll be using a normal plt entry for this symbol, so
2069 clear the plabel indicator. */
2070 ((struct elf32_hppa_link_hash_entry *) h)->plabel = 0;
e5ee5df1
AM
2071 }
2072 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
2073 {
2074 /* Make an entry in the .plt section for plabel references
2075 that won't have a .plt entry for other reasons. */
2076 s = htab->splt;
2077 h->plt.offset = s->_raw_size;
2078 s->_raw_size += PLT_ENTRY_SIZE;
a8d02d66
AM
2079 }
2080 else
e5ee5df1
AM
2081 {
2082 /* No .plt entry needed. */
2083 h->plt.offset = (bfd_vma) -1;
2084 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2085 }
2086 }
2087 else
2088 {
2089 h->plt.offset = (bfd_vma) -1;
2090 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
2091 }
2092
2093 return true;
2094}
2095
4dc86686
AM
2096/* Allocate space in .plt, .got and associated reloc sections for
2097 global syms. */
2098
2099static boolean
98ceb8ce 2100allocate_dynrelocs (h, inf)
4dc86686
AM
2101 struct elf_link_hash_entry *h;
2102 PTR inf;
2103{
2104 struct bfd_link_info *info;
83c81bfe 2105 struct elf32_hppa_link_hash_table *htab;
4dc86686 2106 asection *s;
446f2863 2107 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 2108 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 2109
e92d460e 2110 if (h->root.type == bfd_link_hash_indirect)
73a74a62
AM
2111 return true;
2112
e92d460e
AM
2113 if (h->root.type == bfd_link_hash_warning)
2114 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2115
30667bf3 2116 info = (struct bfd_link_info *) inf;
83c81bfe 2117 htab = hppa_link_hash_table (info);
e5ee5df1
AM
2118 if (htab->elf.dynamic_sections_created
2119 && h->plt.offset != (bfd_vma) -1
2120 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call
067fa4a6 2121 && !((struct elf32_hppa_link_hash_entry *) h)->plabel)
4dc86686 2122 {
e5ee5df1
AM
2123 /* Make an entry in the .plt section. */
2124 s = htab->splt;
2125 h->plt.offset = s->_raw_size;
2126 s->_raw_size += PLT_ENTRY_SIZE;
3ac8354b 2127
e5ee5df1
AM
2128 /* We also need to make an entry in the .rela.plt section. */
2129 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2130 htab->need_plt_stub = 1;
4dc86686 2131 }
edd21aca 2132
4dc86686
AM
2133 if (h->got.refcount > 0)
2134 {
446f2863
AM
2135 /* Make sure this symbol is output as a dynamic symbol.
2136 Undefined weak syms won't yet be marked as dynamic. */
2137 if (h->dynindx == -1
2138 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2139 && h->type != STT_PARISC_MILLI)
2140 {
2141 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2142 return false;
2143 }
2144
83c81bfe 2145 s = htab->sgot;
4dc86686
AM
2146 h->got.offset = s->_raw_size;
2147 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
2148 if (htab->elf.dynamic_sections_created
2149 && (info->shared
2150 || (h->dynindx != -1
2151 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
2152 {
2153 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
2154 }
4dc86686
AM
2155 }
2156 else
2157 h->got.offset = (bfd_vma) -1;
30667bf3 2158
446f2863 2159 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2160 if (eh->dyn_relocs == NULL)
446f2863 2161 return true;
30667bf3 2162
98ceb8ce
AM
2163 /* If this is a -Bsymbolic shared link, then we need to discard all
2164 space allocated for dynamic pc-relative relocs against symbols
2165 defined in a regular object. For the normal shared case, discard
2166 space for relocs that have become local due to symbol visibility
2167 changes. */
2168 if (info->shared)
446f2863 2169 {
98ceb8ce
AM
2170#if RELATIVE_DYNRELOCS
2171 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2172 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2173 || info->symbolic))
446f2863 2174 {
98ceb8ce 2175 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2176
98ceb8ce
AM
2177 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2178 {
2179 p->count -= p->relative_count;
2180 p->relative_count = 0;
2181 if (p->count == 0)
2182 *pp = p->next;
2183 else
2184 pp = &p->next;
2185 }
2186 }
2187#endif
446f2863 2188 }
98ceb8ce 2189 else
30667bf3 2190 {
98ceb8ce
AM
2191 /* For the non-shared case, discard space for relocs against
2192 symbols which turn out to need copy relocs or are not
2193 dynamic. */
2194 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2195 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2196 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2197 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2198 && (h->root.type == bfd_link_hash_undefweak
2199 || h->root.type == bfd_link_hash_undefined))))
2200 {
2201 /* Make sure this symbol is output as a dynamic symbol.
2202 Undefined weak syms won't yet be marked as dynamic. */
2203 if (h->dynindx == -1
2204 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2205 && h->type != STT_PARISC_MILLI)
2206 {
2207 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2208 return false;
2209 }
2210
2211 /* If that succeeded, we know we'll be keeping all the
2212 relocs. */
2213 if (h->dynindx != -1)
2214 goto keep;
2215 }
446f2863 2216
98ceb8ce
AM
2217 eh->dyn_relocs = NULL;
2218 return true;
2219
ec338859 2220 keep: ;
30667bf3 2221 }
30667bf3 2222
98ceb8ce
AM
2223 /* Finally, allocate space. */
2224 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2225 {
98ceb8ce
AM
2226 asection *sreloc = elf_section_data (p->sec)->sreloc;
2227 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2228 }
30667bf3
AM
2229
2230 return true;
2231}
30667bf3 2232
d5c73c2f
AM
2233/* This function is called via elf_link_hash_traverse to force
2234 millicode symbols local so they do not end up as globals in the
2235 dynamic symbol table. We ought to be able to do this in
2236 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2237 for all dynamic symbols. Arguably, this is a bug in
2238 elf_adjust_dynamic_symbol. */
2239
2240static boolean
2241clobber_millicode_symbols (h, info)
2242 struct elf_link_hash_entry *h;
2243 struct bfd_link_info *info;
2244{
e92d460e
AM
2245 if (h->root.type == bfd_link_hash_warning)
2246 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2247
142f8c94
AM
2248 if (h->type == STT_PARISC_MILLI
2249 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
e0522e89 2250 {
e5094212 2251 elf32_hppa_hide_symbol (info, h, true);
e0522e89 2252 }
d5c73c2f
AM
2253 return true;
2254}
2255
98ceb8ce
AM
2256/* Find any dynamic relocs that apply to read-only sections. */
2257
2258static boolean
2259readonly_dynrelocs (h, inf)
2260 struct elf_link_hash_entry *h;
2261 PTR inf;
2262{
2263 struct elf32_hppa_link_hash_entry *eh;
2264 struct elf32_hppa_dyn_reloc_entry *p;
2265
e92d460e
AM
2266 if (h->root.type == bfd_link_hash_warning)
2267 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2268
98ceb8ce
AM
2269 eh = (struct elf32_hppa_link_hash_entry *) h;
2270 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2271 {
2272 asection *s = p->sec->output_section;
2273
2274 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2275 {
2276 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2277
2278 info->flags |= DF_TEXTREL;
2279
2280 /* Not an error, just cut short the traversal. */
2281 return false;
2282 }
2283 }
2284 return true;
2285}
2286
30667bf3
AM
2287/* Set the sizes of the dynamic sections. */
2288
2289static boolean
2290elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2291 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2292 struct bfd_link_info *info;
2293{
83c81bfe 2294 struct elf32_hppa_link_hash_table *htab;
30667bf3 2295 bfd *dynobj;
98ceb8ce 2296 bfd *ibfd;
30667bf3
AM
2297 asection *s;
2298 boolean relocs;
30667bf3 2299
83c81bfe 2300 htab = hppa_link_hash_table (info);
ebe50bae 2301 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2302 if (dynobj == NULL)
2303 abort ();
30667bf3 2304
ebe50bae 2305 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2306 {
2307 /* Set the contents of the .interp section to the interpreter. */
2308 if (! info->shared)
2309 {
2310 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2311 if (s == NULL)
2312 abort ();
30667bf3
AM
2313 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2314 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2315 }
74d1c347 2316
d5c73c2f 2317 /* Force millicode symbols local. */
ebe50bae 2318 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2319 clobber_millicode_symbols,
2320 info);
68fb2e56
AM
2321 }
2322 else
2323 {
2324 /* Run through the function symbols, looking for any that are
a8d02d66
AM
2325 PIC, and mark them as needing .plt entries so that %r19 will
2326 be set up. */
68fb2e56 2327 if (! info->shared)
a8d02d66 2328 elf_link_hash_traverse (&htab->elf, mark_PIC_calls, (PTR) info);
68fb2e56 2329 }
d5c73c2f 2330
98ceb8ce
AM
2331 /* Set up .got and .plt offsets for local syms, and space for local
2332 dynamic relocs. */
2333 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2334 {
2335 bfd_signed_vma *local_got;
2336 bfd_signed_vma *end_local_got;
2337 bfd_signed_vma *local_plt;
2338 bfd_signed_vma *end_local_plt;
2339 bfd_size_type locsymcount;
2340 Elf_Internal_Shdr *symtab_hdr;
2341 asection *srel;
74d1c347 2342
98ceb8ce 2343 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2344 continue;
4dc86686 2345
98ceb8ce
AM
2346 for (s = ibfd->sections; s != NULL; s = s->next)
2347 {
ec338859 2348 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2349
ec338859
AM
2350 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2351 elf_section_data (s)->local_dynrel);
2352 p != NULL;
2353 p = p->next)
98ceb8ce 2354 {
ec338859
AM
2355 if (!bfd_is_abs_section (p->sec)
2356 && bfd_is_abs_section (p->sec->output_section))
2357 {
2358 /* Input section has been discarded, either because
2359 it is a copy of a linkonce section or due to
2360 linker script /DISCARD/, so we'll be discarding
2361 the relocs too. */
2362 }
248866a8 2363 else if (p->count != 0)
ec338859
AM
2364 {
2365 srel = elf_section_data (p->sec)->sreloc;
2366 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
248866a8
AM
2367 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2368 info->flags |= DF_TEXTREL;
ec338859 2369 }
98ceb8ce
AM
2370 }
2371 }
2372
2373 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2374 if (!local_got)
2375 continue;
74d1c347 2376
98ceb8ce 2377 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2378 locsymcount = symtab_hdr->sh_info;
2379 end_local_got = local_got + locsymcount;
83c81bfe
AM
2380 s = htab->sgot;
2381 srel = htab->srelgot;
68fb2e56
AM
2382 for (; local_got < end_local_got; ++local_got)
2383 {
2384 if (*local_got > 0)
4dc86686 2385 {
68fb2e56
AM
2386 *local_got = s->_raw_size;
2387 s->_raw_size += GOT_ENTRY_SIZE;
2388 if (info->shared)
2389 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2390 }
68fb2e56
AM
2391 else
2392 *local_got = (bfd_vma) -1;
2393 }
74d1c347 2394
68fb2e56
AM
2395 local_plt = end_local_got;
2396 end_local_plt = local_plt + locsymcount;
ebe50bae 2397 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2398 {
2399 /* Won't be used, but be safe. */
2400 for (; local_plt < end_local_plt; ++local_plt)
2401 *local_plt = (bfd_vma) -1;
2402 }
2403 else
2404 {
83c81bfe
AM
2405 s = htab->splt;
2406 srel = htab->srelplt;
74d1c347
AM
2407 for (; local_plt < end_local_plt; ++local_plt)
2408 {
2409 if (*local_plt > 0)
2410 {
74d1c347
AM
2411 *local_plt = s->_raw_size;
2412 s->_raw_size += PLT_ENTRY_SIZE;
2413 if (info->shared)
4dc86686 2414 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2415 }
2416 else
2417 *local_plt = (bfd_vma) -1;
2418 }
2419 }
30667bf3 2420 }
30667bf3 2421
e5ee5df1
AM
2422 /* Do all the .plt entries without relocs first. The dynamic linker
2423 uses the last .plt reloc to find the end of the .plt (and hence
2424 the start of the .got) for lazy linking. */
2425 elf_link_hash_traverse (&htab->elf, allocate_plt_static, (PTR) info);
a8d02d66 2426
98ceb8ce
AM
2427 /* Allocate global sym .plt and .got entries, and space for global
2428 sym dynamic relocs. */
ebe50bae 2429 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2430
2431 /* The check_relocs and adjust_dynamic_symbol entry points have
2432 determined the sizes of the various dynamic sections. Allocate
2433 memory for them. */
2434 relocs = false;
30667bf3
AM
2435 for (s = dynobj->sections; s != NULL; s = s->next)
2436 {
30667bf3
AM
2437 if ((s->flags & SEC_LINKER_CREATED) == 0)
2438 continue;
2439
83c81bfe 2440 if (s == htab->splt)
68fb2e56 2441 {
83c81bfe 2442 if (htab->need_plt_stub)
68fb2e56
AM
2443 {
2444 /* Make space for the plt stub at the end of the .plt
2445 section. We want this stub right at the end, up
2446 against the .got section. */
83c81bfe 2447 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2448 int pltalign = bfd_section_alignment (dynobj, s);
2449 bfd_size_type mask;
30667bf3 2450
68fb2e56
AM
2451 if (gotalign > pltalign)
2452 bfd_set_section_alignment (dynobj, s, gotalign);
2453 mask = ((bfd_size_type) 1 << gotalign) - 1;
2454 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2455 }
2456 }
83c81bfe 2457 else if (s == htab->sgot)
68fb2e56
AM
2458 ;
2459 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2460 {
2461 if (s->_raw_size != 0)
2462 {
4e12ff7f
AM
2463 /* Remember whether there are any reloc sections other
2464 than .rela.plt. */
2465 if (s != htab->srelplt)
2466 relocs = true;
47d89dba 2467
30667bf3
AM
2468 /* We use the reloc_count field as a counter if we need
2469 to copy relocs into the output file. */
2470 s->reloc_count = 0;
2471 }
2472 }
30667bf3
AM
2473 else
2474 {
2475 /* It's not one of our sections, so don't allocate space. */
2476 continue;
2477 }
2478
2479 if (s->_raw_size == 0)
2480 {
2481 /* If we don't need this section, strip it from the
2482 output file. This is mostly to handle .rela.bss and
2483 .rela.plt. We must create both sections in
2484 create_dynamic_sections, because they must be created
2485 before the linker maps input sections to output
2486 sections. The linker does that before
2487 adjust_dynamic_symbol is called, and it is that
2488 function which decides whether anything needs to go
2489 into these sections. */
2490 _bfd_strip_section_from_output (info, s);
2491 continue;
2492 }
2493
2494 /* Allocate memory for the section contents. Zero it, because
2495 we may not fill in all the reloc sections. */
2496 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2497 if (s->contents == NULL && s->_raw_size != 0)
2498 return false;
2499 }
2500
ebe50bae 2501 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2502 {
2503 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2504 actually has nothing to do with the PLT, it is how we
2505 communicate the LTP value of a load module to the dynamic
2506 linker. */
dc810e39
AM
2507#define add_dynamic_entry(TAG, VAL) \
2508 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2509
2510 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2511 return false;
2512
2513 /* Add some entries to the .dynamic section. We fill in the
2514 values later, in elf32_hppa_finish_dynamic_sections, but we
2515 must add the entries now so that we get the correct size for
2516 the .dynamic section. The DT_DEBUG entry is filled in by the
2517 dynamic linker and used by the debugger. */
dc810e39 2518 if (!info->shared)
30667bf3 2519 {
dc810e39 2520 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2521 return false;
2522 }
2523
83c81bfe 2524 if (htab->srelplt->_raw_size != 0)
30667bf3 2525 {
dc810e39
AM
2526 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2527 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2528 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2529 return false;
2530 }
2531
2532 if (relocs)
2533 {
dc810e39
AM
2534 if (!add_dynamic_entry (DT_RELA, 0)
2535 || !add_dynamic_entry (DT_RELASZ, 0)
2536 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2537 return false;
30667bf3 2538
98ceb8ce
AM
2539 /* If any dynamic relocs apply to a read-only section,
2540 then we need a DT_TEXTREL entry. */
248866a8
AM
2541 if ((info->flags & DF_TEXTREL) == 0)
2542 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2543 (PTR) info);
98ceb8ce
AM
2544
2545 if ((info->flags & DF_TEXTREL) != 0)
2546 {
2547 if (!add_dynamic_entry (DT_TEXTREL, 0))
2548 return false;
2549 }
30667bf3
AM
2550 }
2551 }
dc810e39 2552#undef add_dynamic_entry
30667bf3
AM
2553
2554 return true;
2555}
2556
30667bf3
AM
2557/* External entry points for sizing and building linker stubs. */
2558
b4655ea9
AM
2559/* Set up various things so that we can make a list of input sections
2560 for each output section included in the link. Returns -1 on error,
cedb70c5 2561 0 when no stubs will be needed, and 1 on success. */
30667bf3 2562
b4655ea9
AM
2563int
2564elf32_hppa_setup_section_lists (output_bfd, info)
25f72752 2565 bfd *output_bfd;
30667bf3 2566 struct bfd_link_info *info;
30667bf3
AM
2567{
2568 bfd *input_bfd;
b4655ea9
AM
2569 unsigned int bfd_count;
2570 int top_id, top_index;
30667bf3 2571 asection *section;
25f72752 2572 asection **input_list, **list;
dc810e39 2573 bfd_size_type amt;
b4655ea9 2574 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2575
b4655ea9
AM
2576 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour)
2577 return 0;
30667bf3 2578
1badb539
AM
2579 /* Count the number of input BFDs and find the top input section id. */
2580 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2581 input_bfd != NULL;
2582 input_bfd = input_bfd->link_next)
2583 {
2584 bfd_count += 1;
25f72752
AM
2585 for (section = input_bfd->sections;
2586 section != NULL;
2587 section = section->next)
2588 {
2589 if (top_id < section->id)
2590 top_id = section->id;
2591 }
30667bf3 2592 }
b4655ea9 2593 htab->bfd_count = bfd_count;
30667bf3 2594
dc810e39 2595 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2596 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2597 if (htab->stub_group == NULL)
b4655ea9 2598 return -1;
1badb539 2599
b4655ea9 2600 /* We can't use output_bfd->section_count here to find the top output
1badb539
AM
2601 section index as some sections may have been removed, and
2602 _bfd_strip_section_from_output doesn't renumber the indices. */
2603 for (section = output_bfd->sections, top_index = 0;
2604 section != NULL;
2605 section = section->next)
2606 {
2607 if (top_index < section->index)
2608 top_index = section->index;
2609 }
2610
b4655ea9 2611 htab->top_index = top_index;
dc810e39
AM
2612 amt = sizeof (asection *) * (top_index + 1);
2613 input_list = (asection **) bfd_malloc (amt);
b4655ea9 2614 htab->input_list = input_list;
25f72752 2615 if (input_list == NULL)
b4655ea9 2616 return -1;
25f72752 2617
1badb539
AM
2618 /* For sections we aren't interested in, mark their entries with a
2619 value we can check later. */
2620 list = input_list + top_index;
2621 do
2622 *list = bfd_abs_section_ptr;
2623 while (list-- != input_list);
2624
2625 for (section = output_bfd->sections;
2626 section != NULL;
2627 section = section->next)
2628 {
47d89dba 2629 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2630 input_list[section->index] = NULL;
2631 }
2632
b4655ea9
AM
2633 return 1;
2634}
2635
2636/* The linker repeatedly calls this function for each input section,
2637 in the order that input sections are linked into output sections.
2638 Build lists of input sections to determine groupings between which
2639 we may insert linker stubs. */
2640
2641void
2642elf32_hppa_next_input_section (info, isec)
2643 struct bfd_link_info *info;
2644 asection *isec;
2645{
2646 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2647
2648 if (isec->output_section->index <= htab->top_index)
25f72752 2649 {
b4655ea9
AM
2650 asection **list = htab->input_list + isec->output_section->index;
2651 if (*list != bfd_abs_section_ptr)
25f72752 2652 {
b4655ea9 2653 /* Steal the link_sec pointer for our list. */
83c81bfe 2654#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2655 /* This happens to make the list in reverse order,
2656 which is what we want. */
2657 PREV_SEC (isec) = *list;
2658 *list = isec;
25f72752
AM
2659 }
2660 }
b4655ea9 2661}
25f72752 2662
b4655ea9
AM
2663/* See whether we can group stub sections together. Grouping stub
2664 sections may result in fewer stubs. More importantly, we need to
2665 put all .init* and .fini* stubs at the beginning of the .init or
2666 .fini output sections respectively, because glibc splits the
2667 _init and _fini functions into multiple parts. Putting a stub in
2668 the middle of a function is not a good idea. */
2669
2670static void
2671group_sections (htab, stub_group_size, stubs_always_before_branch)
2672 struct elf32_hppa_link_hash_table *htab;
2673 bfd_size_type stub_group_size;
2674 boolean stubs_always_before_branch;
2675{
2676 asection **list = htab->input_list + htab->top_index;
1badb539 2677 do
25f72752
AM
2678 {
2679 asection *tail = *list;
1badb539
AM
2680 if (tail == bfd_abs_section_ptr)
2681 continue;
25f72752
AM
2682 while (tail != NULL)
2683 {
2684 asection *curr;
2685 asection *prev;
2686 bfd_size_type total;
2687
2688 curr = tail;
2689 if (tail->_cooked_size)
2690 total = tail->_cooked_size;
2691 else
2692 total = tail->_raw_size;
2693 while ((prev = PREV_SEC (curr)) != NULL
2694 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2695 < stub_group_size))
25f72752
AM
2696 curr = prev;
2697
2698 /* OK, the size from the start of CURR to the end is less
a248e267 2699 than 240000 bytes and thus can be handled by one stub
25f72752 2700 section. (or the tail section is itself larger than
a248e267 2701 240000 bytes, in which case we may be toast.)
25f72752
AM
2702 We should really be keeping track of the total size of
2703 stubs added here, as stubs contribute to the final output
2704 section size. That's a little tricky, and this way will
a248e267
AM
2705 only break if stubs added total more than 22144 bytes, or
2706 2768 long branch stubs. It seems unlikely for more than
2707 2768 different functions to be called, especially from
2708 code only 240000 bytes long. This limit used to be
2709 250000, but c++ code tends to generate lots of little
2710 functions, and sometimes violated the assumption. */
25f72752
AM
2711 do
2712 {
2713 prev = PREV_SEC (tail);
2714 /* Set up this stub group. */
83c81bfe 2715 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2716 }
2717 while (tail != curr && (tail = prev) != NULL);
2718
a248e267 2719 /* But wait, there's more! Input sections up to 240000
25f72752 2720 bytes before the stub section can be handled by it too. */
47d89dba 2721 if (!stubs_always_before_branch)
25f72752 2722 {
47d89dba
AM
2723 total = 0;
2724 while (prev != NULL
2725 && ((total += tail->output_offset - prev->output_offset)
2726 < stub_group_size))
2727 {
2728 tail = prev;
2729 prev = PREV_SEC (tail);
83c81bfe 2730 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2731 }
25f72752
AM
2732 }
2733 tail = prev;
2734 }
2735 }
b4655ea9
AM
2736 while (list-- != htab->input_list);
2737 free (htab->input_list);
1badb539 2738#undef PREV_SEC
b4655ea9
AM
2739}
2740
2741/* Read in all local syms for all input bfds, and create hash entries
2742 for export stubs if we are building a multi-subspace shared lib.
2743 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2744
2745static int
2746get_local_syms (output_bfd, input_bfd, info)
2747 bfd *output_bfd;
2748 bfd *input_bfd;
2749 struct bfd_link_info *info;
2750{
2751 unsigned int bfd_indx;
2752 Elf_Internal_Sym *local_syms, **all_local_syms;
2753 int stub_changed = 0;
2754 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3
AM
2755
2756 /* We want to read in symbol extension records only once. To do this
2757 we need to read in the local symbols in parallel and save them for
2758 later use; so hold pointers to the local symbols in an array. */
b4655ea9 2759 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
dc810e39 2760 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
b4655ea9 2761 htab->all_local_syms = all_local_syms;
30667bf3 2762 if (all_local_syms == NULL)
b4655ea9 2763 return -1;
30667bf3
AM
2764
2765 /* Walk over all the input BFDs, swapping in local symbols.
2766 If we are creating a shared library, create hash entries for the
2767 export stubs. */
b4655ea9 2768 for (bfd_indx = 0;
30667bf3 2769 input_bfd != NULL;
25f72752 2770 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2771 {
2772 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 2773 Elf_Internal_Shdr *shndx_hdr;
30667bf3 2774 Elf_Internal_Sym *isym;
25f72752 2775 Elf32_External_Sym *ext_syms, *esym, *end_sy;
9ad5cbcf 2776 Elf_External_Sym_Shndx *shndx_buf, *shndx;
dc810e39 2777 bfd_size_type sec_size;
edd21aca 2778
252b5132
RH
2779 /* We'll need the symbol table in a second. */
2780 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2781 if (symtab_hdr->sh_info == 0)
2782 continue;
2783
edd21aca
AM
2784 /* We need an array of the local symbols attached to the input bfd.
2785 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2786 sec_size = symtab_hdr->sh_info;
2787 sec_size *= sizeof (Elf_Internal_Sym);
2788 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca 2789 if (local_syms == NULL)
b4655ea9 2790 return -1;
9ad5cbcf 2791
25f72752 2792 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2793 sec_size = symtab_hdr->sh_info;
2794 sec_size *= sizeof (Elf32_External_Sym);
2795 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca 2796 if (ext_syms == NULL)
b4655ea9 2797 return -1;
edd21aca
AM
2798
2799 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf 2800 || bfd_bread ((PTR) ext_syms, sec_size, input_bfd) != sec_size)
edd21aca 2801 {
9ad5cbcf 2802 error_ret_free_ext_syms:
edd21aca 2803 free (ext_syms);
b4655ea9 2804 return -1;
edd21aca
AM
2805 }
2806
9ad5cbcf
AM
2807 shndx_buf = NULL;
2808 shndx_hdr = &elf_tdata (input_bfd)->symtab_shndx_hdr;
2809 if (shndx_hdr->sh_size != 0)
2810 {
2811 sec_size = symtab_hdr->sh_info;
2812 sec_size *= sizeof (Elf_External_Sym_Shndx);
2813 shndx_buf = (Elf_External_Sym_Shndx *) bfd_malloc (sec_size);
2814 if (shndx_buf == NULL)
2815 goto error_ret_free_ext_syms;
2816
2817 if (bfd_seek (input_bfd, shndx_hdr->sh_offset, SEEK_SET) != 0
2818 || bfd_bread ((PTR) shndx_buf, sec_size, input_bfd) != sec_size)
2819 {
2820 free (shndx_buf);
2821 goto error_ret_free_ext_syms;
2822 }
2823 }
2824
edd21aca 2825 /* Swap the local symbols in. */
9ad5cbcf
AM
2826 for (esym = ext_syms, end_sy = esym + symtab_hdr->sh_info,
2827 isym = local_syms, shndx = shndx_buf;
2828 esym < end_sy;
2829 esym++, isym++, shndx = (shndx ? shndx + 1 : NULL))
f8ecb12b
AM
2830 bfd_elf32_swap_symbol_in (input_bfd, (const PTR) esym,
2831 (const PTR) shndx, isym);
edd21aca
AM
2832
2833 /* Now we can free the external symbols. */
9ad5cbcf 2834 free (shndx_buf);
edd21aca 2835 free (ext_syms);
edd21aca 2836
83c81bfe 2837 if (info->shared && htab->multi_subspace)
30667bf3 2838 {
25f72752
AM
2839 struct elf_link_hash_entry **sym_hashes;
2840 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2841 unsigned int symcount;
2842
2843 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2844 - symtab_hdr->sh_info);
25f72752
AM
2845 sym_hashes = elf_sym_hashes (input_bfd);
2846 end_hashes = sym_hashes + symcount;
30667bf3
AM
2847
2848 /* Look through the global syms for functions; We need to
2849 build export stubs for all globally visible functions. */
25f72752 2850 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2851 {
2852 struct elf32_hppa_link_hash_entry *hash;
2853
25f72752 2854 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2855
2856 while (hash->elf.root.type == bfd_link_hash_indirect
2857 || hash->elf.root.type == bfd_link_hash_warning)
2858 hash = ((struct elf32_hppa_link_hash_entry *)
2859 hash->elf.root.u.i.link);
2860
2861 /* At this point in the link, undefined syms have been
2862 resolved, so we need to check that the symbol was
2863 defined in this BFD. */
2864 if ((hash->elf.root.type == bfd_link_hash_defined
2865 || hash->elf.root.type == bfd_link_hash_defweak)
2866 && hash->elf.type == STT_FUNC
2867 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2868 && (hash->elf.root.u.def.section->output_section->owner
2869 == output_bfd)
30667bf3
AM
2870 && hash->elf.root.u.def.section->owner == input_bfd
2871 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2872 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2873 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2874 {
2875 asection *sec;
2876 const char *stub_name;
2877 struct elf32_hppa_stub_hash_entry *stub_entry;
2878
2879 sec = hash->elf.root.u.def.section;
2880 stub_name = hash->elf.root.root.string;
83c81bfe 2881 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2882 stub_name,
2883 false, false);
2884 if (stub_entry == NULL)
2885 {
83c81bfe 2886 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3 2887 if (!stub_entry)
b4655ea9 2888 return -1;
30667bf3
AM
2889
2890 stub_entry->target_value = hash->elf.root.u.def.value;
2891 stub_entry->target_section = hash->elf.root.u.def.section;
2892 stub_entry->stub_type = hppa_stub_export;
2893 stub_entry->h = hash;
2894 stub_changed = 1;
2895 }
2896 else
2897 {
2898 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2899 bfd_archive_filename (input_bfd),
2900 stub_name);
30667bf3
AM
2901 }
2902 }
2903 }
30667bf3
AM
2904 }
2905 }
edd21aca 2906
b4655ea9
AM
2907 return stub_changed;
2908}
2909
2910/* Determine and set the size of the stub section for a final link.
2911
2912 The basic idea here is to examine all the relocations looking for
2913 PC-relative calls to a target that is unreachable with a "bl"
2914 instruction. */
2915
2916boolean
2917elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
2918 add_stub_section, layout_sections_again)
2919 bfd *output_bfd;
2920 bfd *stub_bfd;
2921 struct bfd_link_info *info;
2922 boolean multi_subspace;
2923 bfd_signed_vma group_size;
2924 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2925 void (*layout_sections_again) PARAMS ((void));
2926{
2927 bfd_size_type stub_group_size;
2928 boolean stubs_always_before_branch;
2929 boolean stub_changed;
2930 boolean ret = 0;
2931 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2932
2933 /* Stash our params away. */
2934 htab->stub_bfd = stub_bfd;
2935 htab->multi_subspace = multi_subspace;
2936 htab->add_stub_section = add_stub_section;
2937 htab->layout_sections_again = layout_sections_again;
2938 stubs_always_before_branch = group_size < 0;
2939 if (group_size < 0)
2940 stub_group_size = -group_size;
2941 else
2942 stub_group_size = group_size;
2943 if (stub_group_size == 1)
2944 {
2945 /* Default values. */
2946 stub_group_size = 7680000;
2947 if (htab->has_17bit_branch || htab->multi_subspace)
2948 stub_group_size = 240000;
2949 if (htab->has_12bit_branch)
2950 stub_group_size = 7500;
2951 }
2952
2953 group_sections (htab, stub_group_size, stubs_always_before_branch);
2954
2955 switch (get_local_syms (output_bfd, info->input_bfds, info))
2956 {
2957 default:
2958 if (htab->all_local_syms)
2959 goto error_ret_free_local;
2960 return false;
2961
2962 case 0:
2963 stub_changed = false;
2964 break;
2965
2966 case 1:
2967 stub_changed = true;
2968 break;
2969 }
2970
edd21aca
AM
2971 while (1)
2972 {
b4655ea9
AM
2973 bfd *input_bfd;
2974 unsigned int bfd_indx;
30667bf3
AM
2975 asection *stub_sec;
2976
25f72752 2977 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2978 input_bfd != NULL;
25f72752 2979 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2980 {
2981 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2982 asection *section;
2983 Elf_Internal_Sym *local_syms;
30667bf3
AM
2984
2985 /* We'll need the symbol table in a second. */
2986 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2987 if (symtab_hdr->sh_info == 0)
2988 continue;
2989
b4655ea9 2990 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2991
2992 /* Walk over each section attached to the input bfd. */
2993 for (section = input_bfd->sections;
2994 section != NULL;
25f72752 2995 section = section->next)
30667bf3
AM
2996 {
2997 Elf_Internal_Shdr *input_rel_hdr;
2998 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2999 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
b4655ea9 3000 bfd_size_type amt;
30667bf3
AM
3001
3002 /* If there aren't any relocs, then there's nothing more
3003 to do. */
3004 if ((section->flags & SEC_RELOC) == 0
3005 || section->reloc_count == 0)
3006 continue;
3007
25f72752
AM
3008 /* If this section is a link-once section that will be
3009 discarded, then don't create any stubs. */
3010 if (section->output_section == NULL
3011 || section->output_section->owner != output_bfd)
3012 continue;
3013
30667bf3 3014 /* Allocate space for the external relocations. */
dc810e39
AM
3015 amt = section->reloc_count;
3016 amt *= sizeof (Elf32_External_Rela);
3017 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
3018 if (external_relocs == NULL)
3019 {
3020 goto error_ret_free_local;
3021 }
3022
3023 /* Likewise for the internal relocations. */
dc810e39
AM
3024 amt = section->reloc_count;
3025 amt *= sizeof (Elf_Internal_Rela);
3026 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
3027 if (internal_relocs == NULL)
3028 {
3029 free (external_relocs);
3030 goto error_ret_free_local;
3031 }
3032
3033 /* Read in the external relocs. */
3034 input_rel_hdr = &elf_section_data (section)->rel_hdr;
3035 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf
AM
3036 || bfd_bread ((PTR) external_relocs,
3037 input_rel_hdr->sh_size,
3038 input_bfd) != input_rel_hdr->sh_size)
30667bf3
AM
3039 {
3040 free (external_relocs);
3041 error_ret_free_internal:
3042 free (internal_relocs);
3043 goto error_ret_free_local;
3044 }
3045
3046 /* Swap in the relocs. */
3047 erela = external_relocs;
3048 erelaend = erela + section->reloc_count;
3049 irela = internal_relocs;
3050 for (; erela < erelaend; erela++, irela++)
3051 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
3052
3053 /* We're done with the external relocs, free them. */
3054 free (external_relocs);
3055
3056 /* Now examine each relocation. */
3057 irela = internal_relocs;
3058 irelaend = irela + section->reloc_count;
3059 for (; irela < irelaend; irela++)
3060 {
3061 unsigned int r_type, r_indx;
3062 enum elf32_hppa_stub_type stub_type;
3063 struct elf32_hppa_stub_hash_entry *stub_entry;
3064 asection *sym_sec;
3065 bfd_vma sym_value;
3066 bfd_vma destination;
3067 struct elf32_hppa_link_hash_entry *hash;
3068 char *stub_name;
25f72752 3069 const asection *id_sec;
30667bf3
AM
3070
3071 r_type = ELF32_R_TYPE (irela->r_info);
3072 r_indx = ELF32_R_SYM (irela->r_info);
3073
3074 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3075 {
3076 bfd_set_error (bfd_error_bad_value);
3077 goto error_ret_free_internal;
3078 }
3079
3080 /* Only look for stubs on call instructions. */
3081 if (r_type != (unsigned int) R_PARISC_PCREL12F
3082 && r_type != (unsigned int) R_PARISC_PCREL17F
3083 && r_type != (unsigned int) R_PARISC_PCREL22F)
3084 continue;
3085
3086 /* Now determine the call target, its name, value,
3087 section. */
3088 sym_sec = NULL;
3089 sym_value = 0;
3090 destination = 0;
3091 hash = NULL;
3092 if (r_indx < symtab_hdr->sh_info)
3093 {
3094 /* It's a local symbol. */
3095 Elf_Internal_Sym *sym;
3096 Elf_Internal_Shdr *hdr;
3097
3098 sym = local_syms + r_indx;
3099 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
3100 sym_sec = hdr->bfd_section;
3101 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3102 sym_value = sym->st_value;
3103 destination = (sym_value + irela->r_addend
3104 + sym_sec->output_offset
3105 + sym_sec->output_section->vma);
3106 }
3107 else
3108 {
3109 /* It's an external symbol. */
3110 int e_indx;
3111
3112 e_indx = r_indx - symtab_hdr->sh_info;
3113 hash = ((struct elf32_hppa_link_hash_entry *)
3114 elf_sym_hashes (input_bfd)[e_indx]);
3115
3116 while (hash->elf.root.type == bfd_link_hash_indirect
3117 || hash->elf.root.type == bfd_link_hash_warning)
3118 hash = ((struct elf32_hppa_link_hash_entry *)
3119 hash->elf.root.u.i.link);
3120
3121 if (hash->elf.root.type == bfd_link_hash_defined
3122 || hash->elf.root.type == bfd_link_hash_defweak)
3123 {
3124 sym_sec = hash->elf.root.u.def.section;
3125 sym_value = hash->elf.root.u.def.value;
3126 if (sym_sec->output_section != NULL)
3127 destination = (sym_value + irela->r_addend
3128 + sym_sec->output_offset
3129 + sym_sec->output_section->vma);
3130 }
3131 else if (hash->elf.root.type == bfd_link_hash_undefweak)
c432ba1a
AM
3132 {
3133 if (! info->shared)
3134 continue;
3135 }
30667bf3 3136 else if (hash->elf.root.type == bfd_link_hash_undefined)
c432ba1a
AM
3137 {
3138 if (! (info->shared
3139 && !info->no_undefined
3140 && (ELF_ST_VISIBILITY (hash->elf.other)
3141 == STV_DEFAULT)
3142 && hash->elf.type != STT_PARISC_MILLI))
3143 continue;
3144 }
30667bf3
AM
3145 else
3146 {
3147 bfd_set_error (bfd_error_bad_value);
3148 goto error_ret_free_internal;
3149 }
3150 }
3151
3152 /* Determine what (if any) linker stub is needed. */
3153 stub_type = hppa_type_of_stub (section, irela, hash,
3154 destination);
3155 if (stub_type == hppa_stub_none)
3156 continue;
3157
25f72752 3158 /* Support for grouping stub sections. */
83c81bfe 3159 id_sec = htab->stub_group[section->id].link_sec;
25f72752 3160
30667bf3 3161 /* Get the name of this stub. */
25f72752 3162 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
3163 if (!stub_name)
3164 goto error_ret_free_internal;
3165
83c81bfe 3166 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
3167 stub_name,
3168 false, false);
3169 if (stub_entry != NULL)
3170 {
3171 /* The proper stub has already been created. */
3172 free (stub_name);
3173 continue;
3174 }
3175
83c81bfe 3176 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
3177 if (stub_entry == NULL)
3178 {
3179 free (stub_name);
3180 goto error_ret_free_local;
3181 }
3182
3183 stub_entry->target_value = sym_value;
3184 stub_entry->target_section = sym_sec;
3185 stub_entry->stub_type = stub_type;
3186 if (info->shared)
3187 {
3188 if (stub_type == hppa_stub_import)
3189 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 3190 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
3191 stub_entry->stub_type = hppa_stub_long_branch_shared;
3192 }
3193 stub_entry->h = hash;
b4655ea9 3194 stub_changed = true;
30667bf3
AM
3195 }
3196
3197 /* We're done with the internal relocs, free them. */
3198 free (internal_relocs);
3199 }
3200 }
3201
3202 if (!stub_changed)
3203 break;
3204
3205 /* OK, we've added some stubs. Find out the new size of the
3206 stub sections. */
83c81bfe 3207 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3208 stub_sec != NULL;
3209 stub_sec = stub_sec->next)
3210 {
74d1c347
AM
3211 stub_sec->_raw_size = 0;
3212 stub_sec->_cooked_size = 0;
3213 }
74d1c347 3214
83c81bfe 3215 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3216
30667bf3 3217 /* Ask the linker to do its stuff. */
83c81bfe 3218 (*htab->layout_sections_again) ();
b4655ea9 3219 stub_changed = false;
30667bf3
AM
3220 }
3221
b4655ea9 3222 ret = true;
30667bf3
AM
3223
3224 error_ret_free_local:
b4655ea9
AM
3225 while (htab->bfd_count-- > 0)
3226 if (htab->all_local_syms[htab->bfd_count])
3227 free (htab->all_local_syms[htab->bfd_count]);
3228 free (htab->all_local_syms);
30667bf3 3229
25f72752 3230 return ret;
30667bf3
AM
3231}
3232
30667bf3
AM
3233/* For a final link, this function is called after we have sized the
3234 stubs to provide a value for __gp. */
3235
3236boolean
3237elf32_hppa_set_gp (abfd, info)
3238 bfd *abfd;
3239 struct bfd_link_info *info;
3240{
b4655ea9
AM
3241 struct bfd_link_hash_entry *h;
3242 asection *sec = NULL;
3243 bfd_vma gp_val = 0;
83c81bfe 3244 struct elf32_hppa_link_hash_table *htab;
30667bf3 3245
83c81bfe 3246 htab = hppa_link_hash_table (info);
b4655ea9 3247 h = bfd_link_hash_lookup (&htab->elf.root, "$global$", false, false, false);
30667bf3 3248
df8634e3 3249 if (h != NULL
b4655ea9
AM
3250 && (h->type == bfd_link_hash_defined
3251 || h->type == bfd_link_hash_defweak))
30667bf3 3252 {
b4655ea9
AM
3253 gp_val = h->u.def.value;
3254 sec = h->u.def.section;
30667bf3
AM
3255 }
3256 else
3257 {
b4655ea9
AM
3258 asection *splt;
3259 asection *sgot;
3260
3261 if (htab->elf.root.creator->flavour == bfd_target_elf_flavour)
3262 {
3263 splt = htab->splt;
3264 sgot = htab->sgot;
3265 }
3266 else
3267 {
3268 /* If we're not elf, look up the output sections in the
3269 hope we may actually find them. */
3270 splt = bfd_get_section_by_name (abfd, ".plt");
3271 sgot = bfd_get_section_by_name (abfd, ".got");
3272 }
3273
74d1c347
AM
3274 /* Choose to point our LTP at, in this order, one of .plt, .got,
3275 or .data, if these sections exist. In the case of choosing
3276 .plt try to make the LTP ideal for addressing anywhere in the
3277 .plt or .got with a 14 bit signed offset. Typically, the end
3278 of the .plt is the start of the .got, so choose .plt + 0x2000
3279 if either the .plt or .got is larger than 0x2000. If both
3280 the .plt and .got are smaller than 0x2000, choose the end of
3281 the .plt section. */
b4655ea9 3282 sec = splt;
74d1c347 3283 if (sec != NULL)
30667bf3 3284 {
74d1c347 3285 gp_val = sec->_raw_size;
b4655ea9 3286 if (gp_val > 0x2000 || (sgot && sgot->_raw_size > 0x2000))
74d1c347
AM
3287 {
3288 gp_val = 0x2000;
3289 }
3290 }
3291 else
3292 {
b4655ea9 3293 sec = sgot;
74d1c347
AM
3294 if (sec != NULL)
3295 {
3296 /* We know we don't have a .plt. If .got is large,
3297 offset our LTP. */
3298 if (sec->_raw_size > 0x2000)
3299 gp_val = 0x2000;
3300 }
3301 else
3302 {
3303 /* No .plt or .got. Who cares what the LTP is? */
3304 sec = bfd_get_section_by_name (abfd, ".data");
3305 }
30667bf3 3306 }
df8634e3
AM
3307
3308 if (h != NULL)
3309 {
b4655ea9
AM
3310 h->type = bfd_link_hash_defined;
3311 h->u.def.value = gp_val;
df8634e3 3312 if (sec != NULL)
b4655ea9 3313 h->u.def.section = sec;
df8634e3 3314 else
b4655ea9 3315 h->u.def.section = bfd_abs_section_ptr;
df8634e3 3316 }
30667bf3
AM
3317 }
3318
b32b5d6e 3319 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3320 gp_val += sec->output_section->vma + sec->output_offset;
3321
3322 elf_gp (abfd) = gp_val;
30667bf3
AM
3323 return true;
3324}
3325
30667bf3
AM
3326/* Build all the stubs associated with the current output file. The
3327 stubs are kept in a hash table attached to the main linker hash
3328 table. We also set up the .plt entries for statically linked PIC
3329 functions here. This function is called via hppaelf_finish in the
3330 linker. */
3331
3332boolean
3333elf32_hppa_build_stubs (info)
3334 struct bfd_link_info *info;
3335{
3336 asection *stub_sec;
3337 struct bfd_hash_table *table;
83c81bfe 3338 struct elf32_hppa_link_hash_table *htab;
30667bf3 3339
83c81bfe 3340 htab = hppa_link_hash_table (info);
30667bf3 3341
83c81bfe 3342 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3343 stub_sec != NULL;
3344 stub_sec = stub_sec->next)
3345 {
dc810e39 3346 bfd_size_type size;
30667bf3
AM
3347
3348 /* Allocate memory to hold the linker stubs. */
74d1c347 3349 size = stub_sec->_raw_size;
83c81bfe 3350 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3351 if (stub_sec->contents == NULL && size != 0)
3352 return false;
74d1c347 3353 stub_sec->_raw_size = 0;
30667bf3
AM
3354 }
3355
3356 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3357 table = &htab->stub_hash_table;
30667bf3
AM
3358 bfd_hash_traverse (table, hppa_build_one_stub, info);
3359
3360 return true;
3361}
3362
c46b7515
AM
3363/* Perform a final link. */
3364
3365static boolean
3366elf32_hppa_final_link (abfd, info)
3367 bfd *abfd;
3368 struct bfd_link_info *info;
3369{
4dc86686
AM
3370 /* Invoke the regular ELF linker to do all the work. */
3371 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3372 return false;
3373
3374 /* If we're producing a final executable, sort the contents of the
985142a4 3375 unwind section. */
46fe4e66 3376 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3377}
3378
3379/* Record the lowest address for the data and text segments. */
3380
3381static void
3382hppa_record_segment_addr (abfd, section, data)
3383 bfd *abfd ATTRIBUTE_UNUSED;
3384 asection *section;
3385 PTR data;
3386{
83c81bfe 3387 struct elf32_hppa_link_hash_table *htab;
c46b7515 3388
83c81bfe 3389 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3390
3391 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3392 {
3393 bfd_vma value = section->vma - section->filepos;
3394
3395 if ((section->flags & SEC_READONLY) != 0)
3396 {
83c81bfe
AM
3397 if (value < htab->text_segment_base)
3398 htab->text_segment_base = value;
c46b7515
AM
3399 }
3400 else
3401 {
83c81bfe
AM
3402 if (value < htab->data_segment_base)
3403 htab->data_segment_base = value;
c46b7515
AM
3404 }
3405 }
3406}
3407
30667bf3
AM
3408/* Perform a relocation as part of a final link. */
3409
3410static bfd_reloc_status_type
83c81bfe 3411final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3412 asection *input_section;
3413 bfd_byte *contents;
3414 const Elf_Internal_Rela *rel;
3415 bfd_vma value;
83c81bfe 3416 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3417 asection *sym_sec;
3418 struct elf32_hppa_link_hash_entry *h;
3419{
3420 int insn;
3421 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3422 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3423 int r_format = howto->bitsize;
3424 enum hppa_reloc_field_selector_type_alt r_field;
3425 bfd *input_bfd = input_section->owner;
3426 bfd_vma offset = rel->r_offset;
3427 bfd_vma max_branch_offset = 0;
3428 bfd_byte *hit_data = contents + offset;
3429 bfd_signed_vma addend = rel->r_addend;
3430 bfd_vma location;
3431 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3432 int val;
3433
3434 if (r_type == R_PARISC_NONE)
3435 return bfd_reloc_ok;
3436
3437 insn = bfd_get_32 (input_bfd, hit_data);
3438
3439 /* Find out where we are and where we're going. */
3440 location = (offset +
3441 input_section->output_offset +
3442 input_section->output_section->vma);
3443
3444 switch (r_type)
3445 {
3446 case R_PARISC_PCREL12F:
3447 case R_PARISC_PCREL17F:
3448 case R_PARISC_PCREL22F:
067fa4a6
AM
3449 /* If this call should go via the plt, find the import stub in
3450 the stub hash. */
30667bf3
AM
3451 if (sym_sec == NULL
3452 || sym_sec->output_section == NULL
12cca0d2 3453 || (h != NULL
067fa4a6
AM
3454 && h->elf.plt.offset != (bfd_vma) -1
3455 && (h->elf.dynindx != -1 || h->pic_call)
3456 && !h->plabel))
30667bf3
AM
3457 {
3458 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3459 h, rel, htab);
30667bf3
AM
3460 if (stub_entry != NULL)
3461 {
3462 value = (stub_entry->stub_offset
3463 + stub_entry->stub_sec->output_offset
3464 + stub_entry->stub_sec->output_section->vma);
3465 addend = 0;
3466 }
3467 else if (sym_sec == NULL && h != NULL
3468 && h->elf.root.type == bfd_link_hash_undefweak)
3469 {
db20fd76
AM
3470 /* It's OK if undefined weak. Calls to undefined weak
3471 symbols behave as if the "called" function
3472 immediately returns. We can thus call to a weak
3473 function without first checking whether the function
3474 is defined. */
30667bf3 3475 value = location;
db20fd76 3476 addend = 8;
30667bf3
AM
3477 }
3478 else
f09ebc7d 3479 return bfd_reloc_undefined;
30667bf3
AM
3480 }
3481 /* Fall thru. */
3482
3483 case R_PARISC_PCREL21L:
3484 case R_PARISC_PCREL17C:
3485 case R_PARISC_PCREL17R:
3486 case R_PARISC_PCREL14R:
3487 case R_PARISC_PCREL14F:
3488 /* Make it a pc relative offset. */
3489 value -= location;
3490 addend -= 8;
3491 break;
3492
3493 case R_PARISC_DPREL21L:
3494 case R_PARISC_DPREL14R:
3495 case R_PARISC_DPREL14F:
3496 /* For all the DP relative relocations, we need to examine the symbol's
3497 section. If it's a code section, then "data pointer relative" makes
3498 no sense. In that case we don't adjust the "value", and for 21 bit
3499 addil instructions, we change the source addend register from %dp to
3500 %r0. This situation commonly arises when a variable's "constness"
3501 is declared differently from the way the variable is defined. For
3502 instance: "extern int foo" with foo defined as "const int foo". */
3503 if (sym_sec == NULL)
3504 break;
3505 if ((sym_sec->flags & SEC_CODE) != 0)
3506 {
3507 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3508 == (((int) OP_ADDIL << 26) | (27 << 21)))
3509 {
3510 insn &= ~ (0x1f << 21);
067fa4a6 3511#if 0 /* debug them. */
30667bf3
AM
3512 (*_bfd_error_handler)
3513 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3514 bfd_archive_filename (input_bfd),
30667bf3
AM
3515 input_section->name,
3516 (long) rel->r_offset,
3517 howto->name);
3518#endif
3519 }
3520 /* Now try to make things easy for the dynamic linker. */
3521
3522 break;
3523 }
74d1c347 3524 /* Fall thru. */
30667bf3
AM
3525
3526 case R_PARISC_DLTIND21L:
3527 case R_PARISC_DLTIND14R:
3528 case R_PARISC_DLTIND14F:
3529 value -= elf_gp (input_section->output_section->owner);
3530 break;
3531
c46b7515
AM
3532 case R_PARISC_SEGREL32:
3533 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3534 value -= htab->text_segment_base;
c46b7515 3535 else
83c81bfe 3536 value -= htab->data_segment_base;
c46b7515
AM
3537 break;
3538
30667bf3
AM
3539 default:
3540 break;
3541 }
3542
3543 switch (r_type)
3544 {
3545 case R_PARISC_DIR32:
47d89dba 3546 case R_PARISC_DIR14F:
30667bf3
AM
3547 case R_PARISC_DIR17F:
3548 case R_PARISC_PCREL17C:
3549 case R_PARISC_PCREL14F:
3550 case R_PARISC_DPREL14F:
3551 case R_PARISC_PLABEL32:
3552 case R_PARISC_DLTIND14F:
3553 case R_PARISC_SEGBASE:
3554 case R_PARISC_SEGREL32:
3555 r_field = e_fsel;
3556 break;
3557
1bf42538 3558 case R_PARISC_DLTIND21L:
30667bf3 3559 case R_PARISC_PCREL21L:
30667bf3 3560 case R_PARISC_PLABEL21L:
1bf42538
JL
3561 r_field = e_lsel;
3562 break;
3563
3564 case R_PARISC_DIR21L:
3565 case R_PARISC_DPREL21L:
30667bf3
AM
3566 r_field = e_lrsel;
3567 break;
3568
30667bf3 3569 case R_PARISC_PCREL17R:
30667bf3 3570 case R_PARISC_PCREL14R:
30667bf3
AM
3571 case R_PARISC_PLABEL14R:
3572 case R_PARISC_DLTIND14R:
1bf42538
JL
3573 r_field = e_rsel;
3574 break;
3575
3576 case R_PARISC_DIR17R:
3577 case R_PARISC_DIR14R:
3578 case R_PARISC_DPREL14R:
30667bf3
AM
3579 r_field = e_rrsel;
3580 break;
3581
3582 case R_PARISC_PCREL12F:
3583 case R_PARISC_PCREL17F:
3584 case R_PARISC_PCREL22F:
3585 r_field = e_fsel;
3586
3587 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3588 {
3589 max_branch_offset = (1 << (17-1)) << 2;
3590 }
3591 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3592 {
3593 max_branch_offset = (1 << (12-1)) << 2;
3594 }
3595 else
3596 {
3597 max_branch_offset = (1 << (22-1)) << 2;
3598 }
3599
3600 /* sym_sec is NULL on undefined weak syms or when shared on
3601 undefined syms. We've already checked for a stub for the
3602 shared undefined case. */
3603 if (sym_sec == NULL)
3604 break;
3605
3606 /* If the branch is out of reach, then redirect the
3607 call to the local stub for this function. */
3608 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3609 {
3610 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3611 h, rel, htab);
30667bf3 3612 if (stub_entry == NULL)
f09ebc7d 3613 return bfd_reloc_undefined;
30667bf3
AM
3614
3615 /* Munge up the value and addend so that we call the stub
3616 rather than the procedure directly. */
3617 value = (stub_entry->stub_offset
3618 + stub_entry->stub_sec->output_offset
3619 + stub_entry->stub_sec->output_section->vma
3620 - location);
3621 addend = -8;
3622 }
3623 break;
3624
3625 /* Something we don't know how to handle. */
3626 default:
3627 return bfd_reloc_notsupported;
3628 }
3629
3630 /* Make sure we can reach the stub. */
3631 if (max_branch_offset != 0
3632 && value + addend + max_branch_offset >= 2*max_branch_offset)
3633 {
3634 (*_bfd_error_handler)
3635 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3636 bfd_archive_filename (input_bfd),
30667bf3
AM
3637 input_section->name,
3638 (long) rel->r_offset,
3639 stub_entry->root.string);
ce757d15 3640 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3641 return bfd_reloc_notsupported;
3642 }
3643
3644 val = hppa_field_adjust (value, addend, r_field);
3645
3646 switch (r_type)
3647 {
3648 case R_PARISC_PCREL12F:
3649 case R_PARISC_PCREL17C:
3650 case R_PARISC_PCREL17F:
3651 case R_PARISC_PCREL17R:
3652 case R_PARISC_PCREL22F:
3653 case R_PARISC_DIR17F:
3654 case R_PARISC_DIR17R:
3655 /* This is a branch. Divide the offset by four.
3656 Note that we need to decide whether it's a branch or
3657 otherwise by inspecting the reloc. Inspecting insn won't
3658 work as insn might be from a .word directive. */
3659 val >>= 2;
3660 break;
3661
3662 default:
3663 break;
3664 }
3665
3666 insn = hppa_rebuild_insn (insn, val, r_format);
3667
3668 /* Update the instruction word. */
74d1c347 3669 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3670 return bfd_reloc_ok;
3671}
3672
30667bf3
AM
3673/* Relocate an HPPA ELF section. */
3674
3675static boolean
3676elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3677 contents, relocs, local_syms, local_sections)
3678 bfd *output_bfd;
3679 struct bfd_link_info *info;
3680 bfd *input_bfd;
3681 asection *input_section;
3682 bfd_byte *contents;
3683 Elf_Internal_Rela *relocs;
3684 Elf_Internal_Sym *local_syms;
3685 asection **local_sections;
3686{
30667bf3 3687 bfd_vma *local_got_offsets;
83c81bfe 3688 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3689 Elf_Internal_Shdr *symtab_hdr;
3690 Elf_Internal_Rela *rel;
3691 Elf_Internal_Rela *relend;
30667bf3
AM
3692
3693 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3694
83c81bfe 3695 htab = hppa_link_hash_table (info);
74d1c347 3696 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3697
3698 rel = relocs;
3699 relend = relocs + input_section->reloc_count;
3700 for (; rel < relend; rel++)
3701 {
3702 unsigned int r_type;
3703 reloc_howto_type *howto;
3704 unsigned int r_symndx;
3705 struct elf32_hppa_link_hash_entry *h;
3706 Elf_Internal_Sym *sym;
3707 asection *sym_sec;
3708 bfd_vma relocation;
3709 bfd_reloc_status_type r;
3710 const char *sym_name;
74d1c347 3711 boolean plabel;
f09ebc7d 3712 boolean warned_undef;
30667bf3
AM
3713
3714 r_type = ELF32_R_TYPE (rel->r_info);
3715 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3716 {
3717 bfd_set_error (bfd_error_bad_value);
3718 return false;
3719 }
3720 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3721 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3722 continue;
3723
3724 r_symndx = ELF32_R_SYM (rel->r_info);
3725
3726 if (info->relocateable)
3727 {
3ac8354b 3728 /* This is a relocatable link. We don't have to change
30667bf3
AM
3729 anything, unless the reloc is against a section symbol,
3730 in which case we have to adjust according to where the
3731 section symbol winds up in the output section. */
3732 if (r_symndx < symtab_hdr->sh_info)
3733 {
3734 sym = local_syms + r_symndx;
3735 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3736 {
3737 sym_sec = local_sections[r_symndx];
3738 rel->r_addend += sym_sec->output_offset;
3739 }
3740 }
3741 continue;
3742 }
3743
3744 /* This is a final link. */
3745 h = NULL;
3746 sym = NULL;
3747 sym_sec = NULL;
f09ebc7d 3748 warned_undef = false;
30667bf3
AM
3749 if (r_symndx < symtab_hdr->sh_info)
3750 {
3751 /* This is a local symbol, h defaults to NULL. */
3752 sym = local_syms + r_symndx;
3753 sym_sec = local_sections[r_symndx];
f8df10f4 3754 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sym_sec, rel);
30667bf3
AM
3755 }
3756 else
3757 {
3758 int indx;
3759
3760 /* It's a global; Find its entry in the link hash. */
3761 indx = r_symndx - symtab_hdr->sh_info;
3762 h = ((struct elf32_hppa_link_hash_entry *)
3763 elf_sym_hashes (input_bfd)[indx]);
3764 while (h->elf.root.type == bfd_link_hash_indirect
3765 || h->elf.root.type == bfd_link_hash_warning)
3766 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3767
3768 relocation = 0;
3769 if (h->elf.root.type == bfd_link_hash_defined
3770 || h->elf.root.type == bfd_link_hash_defweak)
3771 {
3772 sym_sec = h->elf.root.u.def.section;
3773 /* If sym_sec->output_section is NULL, then it's a
3774 symbol defined in a shared library. */
3775 if (sym_sec->output_section != NULL)
3776 relocation = (h->elf.root.u.def.value
3777 + sym_sec->output_offset
3778 + sym_sec->output_section->vma);
3779 }
3780 else if (h->elf.root.type == bfd_link_hash_undefweak)
3781 ;
3782 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3783 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3784 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3785 {
671bae9c 3786 if (info->symbolic && !info->allow_shlib_undefined)
f09ebc7d
AM
3787 {
3788 if (!((*info->callbacks->undefined_symbol)
3789 (info, h->elf.root.root.string, input_bfd,
3790 input_section, rel->r_offset, false)))
3791 return false;
3792 warned_undef = true;
3793 }
30667bf3
AM
3794 }
3795 else
3796 {
3797 if (!((*info->callbacks->undefined_symbol)
3798 (info, h->elf.root.root.string, input_bfd,
3799 input_section, rel->r_offset, true)))
3800 return false;
f09ebc7d 3801 warned_undef = true;
30667bf3
AM
3802 }
3803 }
3804
3805 /* Do any required modifications to the relocation value, and
25f72752
AM
3806 determine what types of dynamic info we need to output, if
3807 any. */
74d1c347 3808 plabel = 0;
30667bf3
AM
3809 switch (r_type)
3810 {
3811 case R_PARISC_DLTIND14F:
3812 case R_PARISC_DLTIND14R:
3813 case R_PARISC_DLTIND21L:
ce757d15
AM
3814 {
3815 bfd_vma off;
3816 boolean do_got = 0;
3817
3818 /* Relocation is to the entry for this symbol in the
3819 global offset table. */
3820 if (h != NULL)
3821 {
3822 boolean dyn;
3823
3824 off = h->elf.got.offset;
3825 dyn = htab->elf.dynamic_sections_created;
3826 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3827 {
3828 /* If we aren't going to call finish_dynamic_symbol,
3829 then we need to handle initialisation of the .got
3830 entry and create needed relocs here. Since the
3831 offset must always be a multiple of 4, we use the
3832 least significant bit to record whether we have
3833 initialised it already. */
3834 if ((off & 1) != 0)
3835 off &= ~1;
3836 else
3837 {
3838 h->elf.got.offset |= 1;
3839 do_got = 1;
3840 }
3841 }
3842 }
3843 else
3844 {
3845 /* Local symbol case. */
3846 if (local_got_offsets == NULL)
3847 abort ();
3848
3849 off = local_got_offsets[r_symndx];
3850
3851 /* The offset must always be a multiple of 4. We use
3852 the least significant bit to record whether we have
3853 already generated the necessary reloc. */
3854 if ((off & 1) != 0)
3855 off &= ~1;
3856 else
3857 {
3858 local_got_offsets[r_symndx] |= 1;
3859 do_got = 1;
3860 }
3861 }
68fb2e56 3862
ce757d15
AM
3863 if (do_got)
3864 {
3865 if (info->shared)
3866 {
3867 /* Output a dynamic relocation for this GOT entry.
3868 In this case it is relative to the base of the
3869 object because the symbol index is zero. */
3870 Elf_Internal_Rela outrel;
3871 asection *srelgot = htab->srelgot;
3872 Elf32_External_Rela *loc;
3873
3874 outrel.r_offset = (off
3875 + htab->sgot->output_offset
3876 + htab->sgot->output_section->vma);
3877 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3878 outrel.r_addend = relocation;
3879 loc = (Elf32_External_Rela *) srelgot->contents;
3880 loc += srelgot->reloc_count++;
3881 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3882 }
3883 else
30667bf3 3884 bfd_put_32 (output_bfd, relocation,
83c81bfe 3885 htab->sgot->contents + off);
ce757d15 3886 }
30667bf3 3887
ce757d15
AM
3888 if (off >= (bfd_vma) -2)
3889 abort ();
30667bf3 3890
ce757d15
AM
3891 /* Add the base of the GOT to the relocation value. */
3892 relocation = (off
3893 + htab->sgot->output_offset
3894 + htab->sgot->output_section->vma);
3895 }
30667bf3 3896 break;
252b5132 3897
c46b7515
AM
3898 case R_PARISC_SEGREL32:
3899 /* If this is the first SEGREL relocation, then initialize
3900 the segment base values. */
83c81bfe
AM
3901 if (htab->text_segment_base == (bfd_vma) -1)
3902 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3903 break;
3904
30667bf3
AM
3905 case R_PARISC_PLABEL14R:
3906 case R_PARISC_PLABEL21L:
3907 case R_PARISC_PLABEL32:
ebe50bae 3908 if (htab->elf.dynamic_sections_created)
252b5132 3909 {
ce757d15
AM
3910 bfd_vma off;
3911 boolean do_plt = 0;
3912
74d1c347
AM
3913 /* If we have a global symbol with a PLT slot, then
3914 redirect this relocation to it. */
3915 if (h != NULL)
3916 {
3917 off = h->elf.plt.offset;
4dc86686 3918 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3919 {
3920 /* In a non-shared link, adjust_dynamic_symbols
3921 isn't called for symbols forced local. We
dc810e39 3922 need to write out the plt entry here. */
8dea1268
AM
3923 if ((off & 1) != 0)
3924 off &= ~1;
3925 else
3926 {
8dea1268 3927 h->elf.plt.offset |= 1;
ce757d15 3928 do_plt = 1;
8dea1268
AM
3929 }
3930 }
74d1c347
AM
3931 }
3932 else
3933 {
68fb2e56
AM
3934 bfd_vma *local_plt_offsets;
3935
3936 if (local_got_offsets == NULL)
3937 abort ();
74d1c347 3938
68fb2e56
AM
3939 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3940 off = local_plt_offsets[r_symndx];
74d1c347
AM
3941
3942 /* As for the local .got entry case, we use the last
3943 bit to record whether we've already initialised
3944 this local .plt entry. */
3945 if ((off & 1) != 0)
3946 off &= ~1;
ce757d15
AM
3947 else
3948 {
3949 local_plt_offsets[r_symndx] |= 1;
3950 do_plt = 1;
3951 }
3952 }
3953
3954 if (do_plt)
3955 {
3956 if (info->shared)
3957 {
3958 /* Output a dynamic IPLT relocation for this
3959 PLT entry. */
3960 Elf_Internal_Rela outrel;
3961 asection *srelplt = htab->srelplt;
3962 Elf32_External_Rela *loc;
3963
3964 outrel.r_offset = (off
3965 + htab->splt->output_offset
3966 + htab->splt->output_section->vma);
3967 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3968 outrel.r_addend = relocation;
3969 loc = (Elf32_External_Rela *) srelplt->contents;
3970 loc += srelplt->reloc_count++;
3971 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3972 }
74d1c347
AM
3973 else
3974 {
3975 bfd_put_32 (output_bfd,
3976 relocation,
83c81bfe 3977 htab->splt->contents + off);
74d1c347 3978 bfd_put_32 (output_bfd,
83c81bfe
AM
3979 elf_gp (htab->splt->output_section->owner),
3980 htab->splt->contents + off + 4);
74d1c347
AM
3981 }
3982 }
3983
68fb2e56 3984 if (off >= (bfd_vma) -2)
49e9d0d3 3985 abort ();
74d1c347
AM
3986
3987 /* PLABELs contain function pointers. Relocation is to
3988 the entry for the function in the .plt. The magic +2
3989 offset signals to $$dyncall that the function pointer
3990 is in the .plt and thus has a gp pointer too.
3991 Exception: Undefined PLABELs should have a value of
3992 zero. */
3993 if (h == NULL
3994 || (h->elf.root.type != bfd_link_hash_undefweak
3995 && h->elf.root.type != bfd_link_hash_undefined))
3996 {
3997 relocation = (off
83c81bfe
AM
3998 + htab->splt->output_offset
3999 + htab->splt->output_section->vma
74d1c347
AM
4000 + 2);
4001 }
4002 plabel = 1;
30667bf3
AM
4003 }
4004 /* Fall through and possibly emit a dynamic relocation. */
4005
4006 case R_PARISC_DIR17F:
4007 case R_PARISC_DIR17R:
47d89dba 4008 case R_PARISC_DIR14F:
30667bf3
AM
4009 case R_PARISC_DIR14R:
4010 case R_PARISC_DIR21L:
4011 case R_PARISC_DPREL14F:
4012 case R_PARISC_DPREL14R:
4013 case R_PARISC_DPREL21L:
4014 case R_PARISC_DIR32:
ec338859
AM
4015 /* r_symndx will be zero only for relocs against symbols
4016 from removed linkonce sections, or sections discarded by
4017 a linker script. */
4018 if (r_symndx == 0
4019 || (input_section->flags & SEC_ALLOC) == 0)
4020 break;
4021
30667bf3 4022 /* The reloc types handled here and this conditional
56882138 4023 expression must match the code in ..check_relocs and
ec338859 4024 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
4025 as in ..check_relocs, with some extra conditions (dynindx
4026 test in this case) to cater for relocs removed by
ec338859 4027 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
4028 here does indeed match the one in ..check_relocs, the
4029 difference being that here we test DEF_DYNAMIC as well as
4030 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
4031 which is why we can't use just that test here.
4032 Conversely, DEF_DYNAMIC can't be used in check_relocs as
4033 there all files have not been loaded. */
446f2863 4034 if ((info->shared
446f2863
AM
4035 && (IS_ABSOLUTE_RELOC (r_type)
4036 || (h != NULL
4037 && h->elf.dynindx != -1
4038 && (!info->symbolic
4039 || (h->elf.elf_link_hash_flags
4040 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
4041 || (!info->shared
446f2863
AM
4042 && h != NULL
4043 && h->elf.dynindx != -1
4044 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
4045 && (((h->elf.elf_link_hash_flags
4046 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4047 && (h->elf.elf_link_hash_flags
4048 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
4049 || h->elf.root.type == bfd_link_hash_undefweak
4050 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
4051 {
4052 Elf_Internal_Rela outrel;
4053 boolean skip;
98ceb8ce
AM
4054 asection *sreloc;
4055 Elf32_External_Rela *loc;
252b5132 4056
30667bf3
AM
4057 /* When generating a shared object, these relocations
4058 are copied into the output file to be resolved at run
4059 time. */
252b5132 4060
30667bf3 4061 outrel.r_addend = rel->r_addend;
c629eae0
JJ
4062 outrel.r_offset =
4063 _bfd_elf_section_offset (output_bfd, info, input_section,
4064 rel->r_offset);
0bb2d96a
JJ
4065 skip = (outrel.r_offset == (bfd_vma) -1
4066 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
4067 outrel.r_offset += (input_section->output_offset
4068 + input_section->output_section->vma);
4069
4070 if (skip)
252b5132 4071 {
30667bf3 4072 memset (&outrel, 0, sizeof (outrel));
252b5132 4073 }
74d1c347
AM
4074 else if (h != NULL
4075 && h->elf.dynindx != -1
4076 && (plabel
446f2863
AM
4077 || !IS_ABSOLUTE_RELOC (r_type)
4078 || !info->shared
74d1c347 4079 || !info->symbolic
30667bf3
AM
4080 || (h->elf.elf_link_hash_flags
4081 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 4082 {
30667bf3
AM
4083 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
4084 }
4085 else /* It's a local symbol, or one marked to become local. */
4086 {
4087 int indx = 0;
edd21aca 4088
30667bf3
AM
4089 /* Add the absolute offset of the symbol. */
4090 outrel.r_addend += relocation;
edd21aca 4091
74d1c347
AM
4092 /* Global plabels need to be processed by the
4093 dynamic linker so that functions have at most one
4094 fptr. For this reason, we need to differentiate
4095 between global and local plabels, which we do by
4096 providing the function symbol for a global plabel
4097 reloc, and no symbol for local plabels. */
4098 if (! plabel
4099 && sym_sec != NULL
30667bf3
AM
4100 && sym_sec->output_section != NULL
4101 && ! bfd_is_abs_section (sym_sec))
252b5132 4102 {
30667bf3
AM
4103 indx = elf_section_data (sym_sec->output_section)->dynindx;
4104 /* We are turning this relocation into one
4105 against a section symbol, so subtract out the
4106 output section's address but not the offset
4107 of the input section in the output section. */
4108 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 4109 }
252b5132 4110
30667bf3
AM
4111 outrel.r_info = ELF32_R_INFO (indx, r_type);
4112 }
68fb2e56
AM
4113#if 0
4114 /* EH info can cause unaligned DIR32 relocs.
4115 Tweak the reloc type for the dynamic linker. */
4116 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
4117 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
4118 R_PARISC_DIR32U);
4119#endif
98ceb8ce
AM
4120 sreloc = elf_section_data (input_section)->sreloc;
4121 if (sreloc == NULL)
4122 abort ();
4123
3ac8354b
AM
4124 loc = (Elf32_External_Rela *) sreloc->contents;
4125 loc += sreloc->reloc_count++;
98ceb8ce 4126 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
4127 }
4128 break;
edd21aca 4129
30667bf3
AM
4130 default:
4131 break;
4132 }
252b5132 4133
30667bf3 4134 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 4135 htab, sym_sec, h);
252b5132 4136
30667bf3
AM
4137 if (r == bfd_reloc_ok)
4138 continue;
252b5132 4139
30667bf3
AM
4140 if (h != NULL)
4141 sym_name = h->elf.root.root.string;
4142 else
4143 {
4144 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4145 symtab_hdr->sh_link,
4146 sym->st_name);
4147 if (sym_name == NULL)
4148 return false;
4149 if (*sym_name == '\0')
4150 sym_name = bfd_section_name (input_bfd, sym_sec);
4151 }
edd21aca 4152
30667bf3 4153 howto = elf_hppa_howto_table + r_type;
252b5132 4154
30667bf3
AM
4155 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
4156 {
f09ebc7d
AM
4157 if (r == bfd_reloc_notsupported || !warned_undef)
4158 {
4159 (*_bfd_error_handler)
4160 (_("%s(%s+0x%lx): cannot handle %s for %s"),
4161 bfd_archive_filename (input_bfd),
4162 input_section->name,
4163 (long) rel->r_offset,
4164 howto->name,
4165 sym_name);
4166 bfd_set_error (bfd_error_bad_value);
4167 return false;
4168 }
30667bf3
AM
4169 }
4170 else
4171 {
4172 if (!((*info->callbacks->reloc_overflow)
4173 (info, sym_name, howto->name, (bfd_vma) 0,
4174 input_bfd, input_section, rel->r_offset)))
4175 return false;
4176 }
4177 }
edd21aca 4178
30667bf3
AM
4179 return true;
4180}
252b5132 4181
30667bf3
AM
4182/* Finish up dynamic symbol handling. We set the contents of various
4183 dynamic sections here. */
252b5132 4184
30667bf3
AM
4185static boolean
4186elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4187 bfd *output_bfd;
4188 struct bfd_link_info *info;
4189 struct elf_link_hash_entry *h;
4190 Elf_Internal_Sym *sym;
4191{
83c81bfe 4192 struct elf32_hppa_link_hash_table *htab;
edd21aca 4193
83c81bfe 4194 htab = hppa_link_hash_table (info);
30667bf3 4195
30667bf3
AM
4196 if (h->plt.offset != (bfd_vma) -1)
4197 {
4198 bfd_vma value;
30667bf3 4199
8dea1268
AM
4200 if (h->plt.offset & 1)
4201 abort ();
4202
30667bf3
AM
4203 /* This symbol has an entry in the procedure linkage table. Set
4204 it up.
4205
4206 The format of a plt entry is
74d1c347
AM
4207 <funcaddr>
4208 <__gp>
47d89dba 4209 */
30667bf3
AM
4210 value = 0;
4211 if (h->root.type == bfd_link_hash_defined
4212 || h->root.type == bfd_link_hash_defweak)
4213 {
4214 value = h->root.u.def.value;
4215 if (h->root.u.def.section->output_section != NULL)
4216 value += (h->root.u.def.section->output_offset
4217 + h->root.u.def.section->output_section->vma);
252b5132 4218 }
edd21aca 4219
74d1c347 4220 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4221 {
47d89dba 4222 Elf_Internal_Rela rel;
3ac8354b 4223 Elf32_External_Rela *loc;
47d89dba 4224
30667bf3
AM
4225 /* Create a dynamic IPLT relocation for this entry. */
4226 rel.r_offset = (h->plt.offset
83c81bfe
AM
4227 + htab->splt->output_offset
4228 + htab->splt->output_section->vma);
ce757d15 4229 if (h->dynindx != -1)
74d1c347
AM
4230 {
4231 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4232 rel.r_addend = 0;
4233 }
4234 else
4235 {
4236 /* This symbol has been marked to become local, and is
4237 used by a plabel so must be kept in the .plt. */
4238 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4239 rel.r_addend = value;
4240 }
30667bf3 4241
3ac8354b
AM
4242 loc = (Elf32_External_Rela *) htab->srelplt->contents;
4243 loc += htab->srelplt->reloc_count++;
83c81bfe 4244 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4245 &rel, loc);
30667bf3 4246 }
ce757d15 4247 else
47d89dba 4248 {
ce757d15
AM
4249 bfd_put_32 (htab->splt->owner,
4250 value,
4251 htab->splt->contents + h->plt.offset);
4252 bfd_put_32 (htab->splt->owner,
4253 elf_gp (htab->splt->output_section->owner),
4254 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4255 }
4256
30667bf3
AM
4257 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4258 {
4259 /* Mark the symbol as undefined, rather than as defined in
4260 the .plt section. Leave the value alone. */
4261 sym->st_shndx = SHN_UNDEF;
4262 }
4263 }
edd21aca 4264
30667bf3
AM
4265 if (h->got.offset != (bfd_vma) -1)
4266 {
4267 Elf_Internal_Rela rel;
3ac8354b 4268 Elf32_External_Rela *loc;
30667bf3
AM
4269
4270 /* This symbol has an entry in the global offset table. Set it
4271 up. */
4272
4273 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4274 + htab->sgot->output_offset
4275 + htab->sgot->output_section->vma);
30667bf3 4276
4dc86686
AM
4277 /* If this is a -Bsymbolic link and the symbol is defined
4278 locally or was forced to be local because of a version file,
4279 we just want to emit a RELATIVE reloc. The entry in the
4280 global offset table will already have been initialized in the
4281 relocate_section function. */
4282 if (info->shared
4283 && (info->symbolic || h->dynindx == -1)
4284 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4285 {
74d1c347 4286 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4287 rel.r_addend = (h->root.u.def.value
4288 + h->root.u.def.section->output_offset
4289 + h->root.u.def.section->output_section->vma);
4290 }
4291 else
4292 {
49e9d0d3
AM
4293 if ((h->got.offset & 1) != 0)
4294 abort ();
30667bf3 4295 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4296 htab->sgot->contents + h->got.offset);
30667bf3
AM
4297 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4298 rel.r_addend = 0;
4299 }
edd21aca 4300
3ac8354b
AM
4301 loc = (Elf32_External_Rela *) htab->srelgot->contents;
4302 loc += htab->srelgot->reloc_count++;
4303 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4304 }
edd21aca 4305
30667bf3
AM
4306 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4307 {
4308 asection *s;
4309 Elf_Internal_Rela rel;
3ac8354b 4310 Elf32_External_Rela *loc;
30667bf3
AM
4311
4312 /* This symbol needs a copy reloc. Set it up. */
4313
49e9d0d3
AM
4314 if (! (h->dynindx != -1
4315 && (h->root.type == bfd_link_hash_defined
4316 || h->root.type == bfd_link_hash_defweak)))
4317 abort ();
30667bf3 4318
83c81bfe 4319 s = htab->srelbss;
30667bf3
AM
4320
4321 rel.r_offset = (h->root.u.def.value
4322 + h->root.u.def.section->output_offset
4323 + h->root.u.def.section->output_section->vma);
4324 rel.r_addend = 0;
4325 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
3ac8354b
AM
4326 loc = (Elf32_External_Rela *) s->contents + s->reloc_count++;
4327 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4328 }
4329
4330 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4331 if (h->root.root.string[0] == '_'
4332 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4333 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4334 {
4335 sym->st_shndx = SHN_ABS;
4336 }
4337
4338 return true;
4339}
4340
98ceb8ce
AM
4341/* Used to decide how to sort relocs in an optimal manner for the
4342 dynamic linker, before writing them out. */
4343
4344static enum elf_reloc_type_class
4345elf32_hppa_reloc_type_class (rela)
4346 const Elf_Internal_Rela *rela;
4347{
4348 if (ELF32_R_SYM (rela->r_info) == 0)
4349 return reloc_class_relative;
4350
4351 switch ((int) ELF32_R_TYPE (rela->r_info))
4352 {
4353 case R_PARISC_IPLT:
4354 return reloc_class_plt;
4355 case R_PARISC_COPY:
4356 return reloc_class_copy;
4357 default:
4358 return reloc_class_normal;
4359 }
4360}
4361
30667bf3
AM
4362/* Finish up the dynamic sections. */
4363
4364static boolean
4365elf32_hppa_finish_dynamic_sections (output_bfd, info)
4366 bfd *output_bfd;
4367 struct bfd_link_info *info;
4368{
4369 bfd *dynobj;
83c81bfe 4370 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4371 asection *sdyn;
4372
83c81bfe 4373 htab = hppa_link_hash_table (info);
ebe50bae 4374 dynobj = htab->elf.dynobj;
30667bf3
AM
4375
4376 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4377
ebe50bae 4378 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4379 {
4380 Elf32_External_Dyn *dyncon, *dynconend;
4381
49e9d0d3
AM
4382 if (sdyn == NULL)
4383 abort ();
30667bf3
AM
4384
4385 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4386 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4387 for (; dyncon < dynconend; dyncon++)
edd21aca 4388 {
30667bf3
AM
4389 Elf_Internal_Dyn dyn;
4390 asection *s;
4391
4392 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4393
4394 switch (dyn.d_tag)
4395 {
4396 default:
3ac8354b 4397 continue;
30667bf3
AM
4398
4399 case DT_PLTGOT:
4400 /* Use PLTGOT to set the GOT register. */
4401 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4402 break;
4403
4404 case DT_JMPREL:
83c81bfe 4405 s = htab->srelplt;
30667bf3 4406 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4407 break;
4408
4409 case DT_PLTRELSZ:
83c81bfe 4410 s = htab->srelplt;
30667bf3
AM
4411 if (s->_cooked_size != 0)
4412 dyn.d_un.d_val = s->_cooked_size;
4413 else
4414 dyn.d_un.d_val = s->_raw_size;
30667bf3 4415 break;
4e12ff7f
AM
4416
4417 case DT_RELASZ:
4418 /* Don't count procedure linkage table relocs in the
4419 overall reloc count. */
4420 if (htab->srelplt != NULL)
4421 {
4422 s = htab->srelplt->output_section;
4423 if (s->_cooked_size != 0)
4424 dyn.d_un.d_val -= s->_cooked_size;
4425 else
4426 dyn.d_un.d_val -= s->_raw_size;
4427 }
4428 break;
30667bf3 4429 }
3ac8354b
AM
4430
4431 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4432 }
252b5132 4433 }
edd21aca 4434
83c81bfe 4435 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4436 {
74d1c347
AM
4437 /* Fill in the first entry in the global offset table.
4438 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4439 bfd_put_32 (output_bfd,
4440 (sdyn != NULL
4441 ? sdyn->output_section->vma + sdyn->output_offset
4442 : (bfd_vma) 0),
83c81bfe 4443 htab->sgot->contents);
30667bf3 4444
74d1c347 4445 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4446 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4447
30667bf3 4448 /* Set .got entry size. */
83c81bfe 4449 elf_section_data (htab->sgot->output_section)
74d1c347 4450 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4451 }
4452
83c81bfe 4453 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4454 {
4455 /* Set plt entry size. */
83c81bfe 4456 elf_section_data (htab->splt->output_section)
47d89dba
AM
4457 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4458
83c81bfe 4459 if (htab->need_plt_stub)
47d89dba
AM
4460 {
4461 /* Set up the .plt stub. */
83c81bfe
AM
4462 memcpy (htab->splt->contents
4463 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4464 plt_stub, sizeof (plt_stub));
4465
83c81bfe
AM
4466 if ((htab->splt->output_offset
4467 + htab->splt->output_section->vma
4468 + htab->splt->_raw_size)
4469 != (htab->sgot->output_offset
4470 + htab->sgot->output_section->vma))
47d89dba
AM
4471 {
4472 (*_bfd_error_handler)
4473 (_(".got section not immediately after .plt section"));
4474 return false;
4475 }
4476 }
4477 }
30667bf3 4478
252b5132 4479 return true;
30667bf3 4480}
252b5132 4481
d952f17a
AM
4482/* Tweak the OSABI field of the elf header. */
4483
4484static void
4485elf32_hppa_post_process_headers (abfd, link_info)
4486 bfd *abfd;
4487 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4488{
4489 Elf_Internal_Ehdr * i_ehdrp;
4490
4491 i_ehdrp = elf_elfheader (abfd);
4492
4493 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4494 {
4495 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4496 }
4497 else
4498 {
4499 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4500 }
4501}
4502
30667bf3
AM
4503/* Called when writing out an object file to decide the type of a
4504 symbol. */
4505static int
4506elf32_hppa_elf_get_symbol_type (elf_sym, type)
4507 Elf_Internal_Sym *elf_sym;
4508 int type;
4509{
4510 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4511 return STT_PARISC_MILLI;
4512 else
4513 return type;
252b5132
RH
4514}
4515
4516/* Misc BFD support code. */
30667bf3
AM
4517#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4518#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4519#define elf_info_to_howto elf_hppa_info_to_howto
4520#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4521
252b5132 4522/* Stuff for the BFD linker. */
c46b7515 4523#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4524#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
e2d34d7d 4525#define bfd_elf32_bfd_link_hash_table_free elf32_hppa_link_hash_table_free
30667bf3
AM
4526#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4527#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4528#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4529#define elf_backend_check_relocs elf32_hppa_check_relocs
4530#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4531#define elf_backend_fake_sections elf_hppa_fake_sections
4532#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4533#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4534#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4535#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4536#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4537#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4538#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4539#define elf_backend_object_p elf32_hppa_object_p
4540#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4541#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4542#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4543#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4544
4545#define elf_backend_can_gc_sections 1
51b64d56 4546#define elf_backend_can_refcount 1
30667bf3
AM
4547#define elf_backend_plt_alignment 2
4548#define elf_backend_want_got_plt 0
4549#define elf_backend_plt_readonly 0
4550#define elf_backend_want_plt_sym 0
74d1c347 4551#define elf_backend_got_header_size 8
252b5132
RH
4552
4553#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4554#define TARGET_BIG_NAME "elf32-hppa"
4555#define ELF_ARCH bfd_arch_hppa
4556#define ELF_MACHINE_CODE EM_PARISC
4557#define ELF_MAXPAGESIZE 0x1000
4558
4559#include "elf32-target.h"
d952f17a
AM
4560
4561#undef TARGET_BIG_SYM
4562#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4563#undef TARGET_BIG_NAME
4564#define TARGET_BIG_NAME "elf32-hppa-linux"
4565
4566#define INCLUDED_TARGET_FILE 1
4567#include "elf32-target.h"
This page took 0.423899 seconds and 4 git commands to generate.