ELF: Don't set non_ir_ref_regular in check_relocs
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
2571583a 2 Copyright (C) 1990-2017 Free Software Foundation, Inc.
252b5132 3
30667bf3 4 Original code by
252b5132
RH
5 Center for Software Science
6 Department of Computer Science
7 University of Utah
30667bf3 8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9b52905e
NC
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
68ffbac6 11
ae9a127f 12 This file is part of BFD, the Binary File Descriptor library.
252b5132 13
ae9a127f
NC
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
cd123cb7 16 the Free Software Foundation; either version 3 of the License, or
ae9a127f 17 (at your option) any later version.
252b5132 18
ae9a127f
NC
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
252b5132 23
ae9a127f
NC
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
cd123cb7
NC
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
252b5132 28
252b5132 29#include "sysdep.h"
3db64b00 30#include "bfd.h"
252b5132
RH
31#include "libbfd.h"
32#include "elf-bfd.h"
9e103c9c
JL
33#include "elf/hppa.h"
34#include "libhppa.h"
35#include "elf32-hppa.h"
36#define ARCH_SIZE 32
edd21aca 37#include "elf32-hppa.h"
189c6563 38#include "elf-hppa.h"
9e103c9c 39
74d1c347
AM
40/* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
42 following:
43
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
50
edd21aca 51/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
52
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
56
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
30667bf3
AM
59 necessary to build the linker stubs during a link.
60
61 There are a number of different stubs generated by the linker.
62
63 Long branch stub:
64 : ldil LR'X,%r1
65 : be,n RR'X(%sr4,%r1)
66
67 PIC long branch stub:
68 : b,l .+8,%r1
3ee1d854
AM
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
71
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
3ee1d854
AM
74 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
75 : ldw RR'lt_ptr+ltoff(%r1),%r21
46fe4e66 76 : bv %r0(%r21)
3ee1d854 77 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
78
79 Import stub to call shared library routine from shared library
80 (single sub-space version)
3ee1d854
AM
81 : addil LR'ltoff,%r19 ; get procedure entry point
82 : ldw RR'ltoff(%r1),%r21
46fe4e66 83 : bv %r0(%r21)
3ee1d854 84 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
85
86 Import stub to call shared library routine from normal object file
87 (multiple sub-space support)
3ee1d854
AM
88 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
89 : ldw RR'lt_ptr+ltoff(%r1),%r21
90 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
91 : ldsid (%r21),%r1
92 : mtsp %r1,%sr0
93 : be 0(%sr0,%r21) ; branch to target
94 : stw %rp,-24(%sp) ; save rp
95
96 Import stub to call shared library routine from shared library
97 (multiple sub-space support)
3ee1d854
AM
98 : addil LR'ltoff,%r19 ; get procedure entry point
99 : ldw RR'ltoff(%r1),%r21
100 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
101 : ldsid (%r21),%r1
102 : mtsp %r1,%sr0
103 : be 0(%sr0,%r21) ; branch to target
104 : stw %rp,-24(%sp) ; save rp
105
106 Export stub to return from shared lib routine (multiple sub-space support)
107 One of these is created for each exported procedure in a shared
108 library (and stored in the shared lib). Shared lib routines are
109 called via the first instruction in the export stub so that we can
110 do an inter-space return. Not required for single sub-space.
111 : bl,n X,%rp ; trap the return
112 : nop
113 : ldw -24(%sp),%rp ; restore the original rp
114 : ldsid (%rp),%r1
115 : mtsp %r1,%sr0
ae9a127f 116 : be,n 0(%sr0,%rp) ; inter-space return. */
30667bf3 117
875c0872
DA
118
119/* Variable names follow a coding style.
120 Please follow this (Apps Hungarian) style:
121
122 Structure/Variable Prefix
123 elf_link_hash_table "etab"
124 elf_link_hash_entry "eh"
68ffbac6 125
875c0872
DA
126 elf32_hppa_link_hash_table "htab"
127 elf32_hppa_link_hash_entry "hh"
128
129 bfd_hash_table "btab"
130 bfd_hash_entry "bh"
68ffbac6 131
875c0872
DA
132 bfd_hash_table containing stubs "bstab"
133 elf32_hppa_stub_hash_entry "hsh"
134
135 elf32_hppa_dyn_reloc_entry "hdh"
68ffbac6 136
875c0872 137 Always remember to use GNU Coding Style. */
68ffbac6 138
30667bf3
AM
139#define PLT_ENTRY_SIZE 8
140#define GOT_ENTRY_SIZE 4
141#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
142
47d89dba
AM
143static const bfd_byte plt_stub[] =
144{
145 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
146 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
147 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
148#define PLT_STUB_ENTRY (3*4)
149 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
150 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
151 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
152 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
153};
154
30667bf3 155/* Section name for stubs is the associated section name plus this
29942be8
NC
156 string. */
157#define STUB_SUFFIX ".stub"
30667bf3 158
98ceb8ce
AM
159/* We don't need to copy certain PC- or GP-relative dynamic relocs
160 into a shared object's dynamic section. All the relocs of the
161 limited class we are interested in, are absolute. */
162#ifndef RELATIVE_DYNRELOCS
163#define RELATIVE_DYNRELOCS 0
446f2863 164#define IS_ABSOLUTE_RELOC(r_type) 1
287c7eaf 165#define pc_dynrelocs(hh) 0
30667bf3
AM
166#endif
167
4fc8051d
AM
168/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
169 copying dynamic variables from a shared lib into an app's dynbss
170 section, and instead use a dynamic relocation to point into the
171 shared lib. */
172#define ELIMINATE_COPY_RELOCS 1
173
9b52905e
NC
174enum elf32_hppa_stub_type
175{
30667bf3
AM
176 hppa_stub_long_branch,
177 hppa_stub_long_branch_shared,
178 hppa_stub_import,
179 hppa_stub_import_shared,
180 hppa_stub_export,
181 hppa_stub_none
182};
183
9b52905e
NC
184struct elf32_hppa_stub_hash_entry
185{
edd21aca 186 /* Base hash table entry structure. */
a63e02c7 187 struct bfd_hash_entry bh_root;
252b5132 188
edd21aca
AM
189 /* The stub section. */
190 asection *stub_sec;
191
192 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 193 bfd_vma stub_offset;
252b5132
RH
194
195 /* Given the symbol's value and its section we can determine its final
196 value when building the stubs (so the stub knows where to jump. */
30667bf3 197 bfd_vma target_value;
252b5132 198 asection *target_section;
30667bf3
AM
199
200 enum elf32_hppa_stub_type stub_type;
201
202 /* The symbol table entry, if any, that this was derived from. */
a63e02c7 203 struct elf32_hppa_link_hash_entry *hh;
30667bf3 204
25f72752
AM
205 /* Where this stub is being called from, or, in the case of combined
206 stub sections, the first input section in the group. */
207 asection *id_sec;
252b5132
RH
208};
209
2e684e75
AM
210enum _tls_type
211 {
212 GOT_UNKNOWN = 0,
213 GOT_NORMAL = 1,
214 GOT_TLS_GD = 2,
215 GOT_TLS_LDM = 4,
216 GOT_TLS_IE = 8
217 };
218
9b52905e
NC
219struct elf32_hppa_link_hash_entry
220{
a63e02c7 221 struct elf_link_hash_entry eh;
30667bf3
AM
222
223 /* A pointer to the most recently used stub hash entry against this
224 symbol. */
a63e02c7 225 struct elf32_hppa_stub_hash_entry *hsh_cache;
30667bf3 226
30667bf3
AM
227 /* Used to count relocations for delayed sizing of relocation
228 sections. */
9b52905e
NC
229 struct elf32_hppa_dyn_reloc_entry
230 {
30667bf3 231 /* Next relocation in the chain. */
a63e02c7 232 struct elf32_hppa_dyn_reloc_entry *hdh_next;
30667bf3 233
98ceb8ce
AM
234 /* The input section of the reloc. */
235 asection *sec;
30667bf3
AM
236
237 /* Number of relocs copied in this section. */
238 bfd_size_type count;
98ceb8ce
AM
239
240#if RELATIVE_DYNRELOCS
241 /* Number of relative relocs copied for the input section. */
242 bfd_size_type relative_count;
243#endif
244 } *dyn_relocs;
30667bf3 245
2e684e75 246 ENUM_BITFIELD (_tls_type) tls_type : 8;
9b52905e 247
74d1c347
AM
248 /* Set if this symbol is used by a plabel reloc. */
249 unsigned int plabel:1;
30667bf3
AM
250};
251
9b52905e
NC
252struct elf32_hppa_link_hash_table
253{
252b5132 254 /* The main hash table. */
a63e02c7 255 struct elf_link_hash_table etab;
252b5132
RH
256
257 /* The stub hash table. */
a63e02c7 258 struct bfd_hash_table bstab;
252b5132 259
30667bf3
AM
260 /* Linker stub bfd. */
261 bfd *stub_bfd;
262
30667bf3 263 /* Linker call-backs. */
c39a58e6
AM
264 asection * (*add_stub_section) (const char *, asection *);
265 void (*layout_sections_again) (void);
30667bf3 266
25f72752
AM
267 /* Array to keep track of which stub sections have been created, and
268 information on stub grouping. */
9b52905e
NC
269 struct map_stub
270 {
25f72752
AM
271 /* This is the section to which stubs in the group will be
272 attached. */
273 asection *link_sec;
274 /* The stub section. */
275 asection *stub_sec;
25f72752 276 } *stub_group;
30667bf3 277
b4655ea9
AM
278 /* Assorted information used by elf32_hppa_size_stubs. */
279 unsigned int bfd_count;
7292b3ac 280 unsigned int top_index;
b4655ea9
AM
281 asection **input_list;
282 Elf_Internal_Sym **all_local_syms;
283
c46b7515
AM
284 /* Used during a final link to store the base of the text and data
285 segments so that we can perform SEGREL relocations. */
286 bfd_vma text_segment_base;
287 bfd_vma data_segment_base;
288
47d89dba
AM
289 /* Whether we support multiple sub-spaces for shared libs. */
290 unsigned int multi_subspace:1;
291
067fa4a6 292 /* Flags set when various size branches are detected. Used to
47d89dba
AM
293 select suitable defaults for the stub group size. */
294 unsigned int has_12bit_branch:1;
295 unsigned int has_17bit_branch:1;
067fa4a6 296 unsigned int has_22bit_branch:1;
47d89dba
AM
297
298 /* Set if we need a .plt stub to support lazy dynamic linking. */
299 unsigned int need_plt_stub:1;
ec338859 300
87d72d41
AM
301 /* Small local sym cache. */
302 struct sym_cache sym_cache;
9b52905e
NC
303
304 /* Data for LDM relocations. */
305 union
306 {
307 bfd_signed_vma refcount;
308 bfd_vma offset;
309 } tls_ldm_got;
252b5132
RH
310};
311
30667bf3
AM
312/* Various hash macros and functions. */
313#define hppa_link_hash_table(p) \
4dfe6ac6
NC
314 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
315 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
252b5132 316
875c0872
DA
317#define hppa_elf_hash_entry(ent) \
318 ((struct elf32_hppa_link_hash_entry *)(ent))
319
320#define hppa_stub_hash_entry(ent) \
321 ((struct elf32_hppa_stub_hash_entry *)(ent))
322
30667bf3
AM
323#define hppa_stub_hash_lookup(table, string, create, copy) \
324 ((struct elf32_hppa_stub_hash_entry *) \
325 bfd_hash_lookup ((table), (string), (create), (copy)))
326
9b52905e
NC
327#define hppa_elf_local_got_tls_type(abfd) \
328 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
329
330#define hh_name(hh) \
331 (hh ? hh->eh.root.root.string : "<undef>")
332
333#define eh_name(eh) \
334 (eh ? eh->root.root.string : "<undef>")
335
252b5132
RH
336/* Assorted hash table functions. */
337
338/* Initialize an entry in the stub hash table. */
339
340static struct bfd_hash_entry *
c39a58e6
AM
341stub_hash_newfunc (struct bfd_hash_entry *entry,
342 struct bfd_hash_table *table,
343 const char *string)
252b5132 344{
252b5132
RH
345 /* Allocate the structure if it has not already been allocated by a
346 subclass. */
ebe50bae 347 if (entry == NULL)
30667bf3 348 {
ebe50bae
AM
349 entry = bfd_hash_allocate (table,
350 sizeof (struct elf32_hppa_stub_hash_entry));
351 if (entry == NULL)
352 return entry;
30667bf3 353 }
252b5132
RH
354
355 /* Call the allocation method of the superclass. */
ebe50bae
AM
356 entry = bfd_hash_newfunc (entry, table, string);
357 if (entry != NULL)
252b5132 358 {
875c0872 359 struct elf32_hppa_stub_hash_entry *hsh;
ebe50bae 360
252b5132 361 /* Initialize the local fields. */
875c0872
DA
362 hsh = hppa_stub_hash_entry (entry);
363 hsh->stub_sec = NULL;
364 hsh->stub_offset = 0;
365 hsh->target_value = 0;
366 hsh->target_section = NULL;
367 hsh->stub_type = hppa_stub_long_branch;
a63e02c7 368 hsh->hh = NULL;
875c0872 369 hsh->id_sec = NULL;
30667bf3
AM
370 }
371
ebe50bae 372 return entry;
30667bf3
AM
373}
374
30667bf3
AM
375/* Initialize an entry in the link hash table. */
376
377static struct bfd_hash_entry *
c39a58e6
AM
378hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
379 struct bfd_hash_table *table,
380 const char *string)
30667bf3 381{
30667bf3
AM
382 /* Allocate the structure if it has not already been allocated by a
383 subclass. */
ebe50bae 384 if (entry == NULL)
30667bf3 385 {
ebe50bae
AM
386 entry = bfd_hash_allocate (table,
387 sizeof (struct elf32_hppa_link_hash_entry));
388 if (entry == NULL)
389 return entry;
30667bf3
AM
390 }
391
392 /* Call the allocation method of the superclass. */
ebe50bae
AM
393 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
394 if (entry != NULL)
30667bf3 395 {
875c0872 396 struct elf32_hppa_link_hash_entry *hh;
ebe50bae 397
30667bf3 398 /* Initialize the local fields. */
875c0872 399 hh = hppa_elf_hash_entry (entry);
a63e02c7 400 hh->hsh_cache = NULL;
875c0872
DA
401 hh->dyn_relocs = NULL;
402 hh->plabel = 0;
9b52905e 403 hh->tls_type = GOT_UNKNOWN;
252b5132
RH
404 }
405
ebe50bae 406 return entry;
252b5132
RH
407}
408
68faa637
AM
409/* Free the derived linker hash table. */
410
411static void
d495ab0d 412elf32_hppa_link_hash_table_free (bfd *obfd)
68faa637
AM
413{
414 struct elf32_hppa_link_hash_table *htab
d495ab0d 415 = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
68faa637
AM
416
417 bfd_hash_table_free (&htab->bstab);
d495ab0d 418 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
419}
420
252b5132
RH
421/* Create the derived linker hash table. The PA ELF port uses the derived
422 hash table to keep information specific to the PA ELF linker (without
423 using static variables). */
424
425static struct bfd_link_hash_table *
c39a58e6 426elf32_hppa_link_hash_table_create (bfd *abfd)
252b5132 427{
875c0872
DA
428 struct elf32_hppa_link_hash_table *htab;
429 bfd_size_type amt = sizeof (*htab);
252b5132 430
7bf52ea2 431 htab = bfd_zmalloc (amt);
875c0872 432 if (htab == NULL)
252b5132 433 return NULL;
edd21aca 434
66eb6687 435 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
4dfe6ac6
NC
436 sizeof (struct elf32_hppa_link_hash_entry),
437 HPPA32_ELF_DATA))
252b5132 438 {
875c0872 439 free (htab);
252b5132
RH
440 return NULL;
441 }
edd21aca
AM
442
443 /* Init the stub hash table too. */
66eb6687
AM
444 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
445 sizeof (struct elf32_hppa_stub_hash_entry)))
d495ab0d
AM
446 {
447 _bfd_elf_link_hash_table_free (abfd);
448 return NULL;
449 }
450 htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
edd21aca 451
875c0872
DA
452 htab->text_segment_base = (bfd_vma) -1;
453 htab->data_segment_base = (bfd_vma) -1;
a63e02c7 454 return &htab->etab.root;
252b5132
RH
455}
456
a464198b
AM
457/* Initialize the linker stubs BFD so that we can use it for linker
458 created dynamic sections. */
459
460void
461elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
462{
463 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
464
465 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
466 htab->etab.dynobj = abfd;
467}
468
30667bf3
AM
469/* Build a name for an entry in the stub hash table. */
470
edd21aca 471static char *
c39a58e6
AM
472hppa_stub_name (const asection *input_section,
473 const asection *sym_sec,
875c0872
DA
474 const struct elf32_hppa_link_hash_entry *hh,
475 const Elf_Internal_Rela *rela)
edd21aca
AM
476{
477 char *stub_name;
dc810e39 478 bfd_size_type len;
edd21aca 479
875c0872 480 if (hh)
30667bf3 481 {
9b52905e 482 len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
30667bf3
AM
483 stub_name = bfd_malloc (len);
484 if (stub_name != NULL)
9b52905e
NC
485 sprintf (stub_name, "%08x_%s+%x",
486 input_section->id & 0xffffffff,
487 hh_name (hh),
488 (int) rela->r_addend & 0xffffffff);
30667bf3
AM
489 }
490 else
edd21aca 491 {
30667bf3
AM
492 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
493 stub_name = bfd_malloc (len);
494 if (stub_name != NULL)
9b52905e
NC
495 sprintf (stub_name, "%08x_%x:%x+%x",
496 input_section->id & 0xffffffff,
497 sym_sec->id & 0xffffffff,
498 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
499 (int) rela->r_addend & 0xffffffff);
edd21aca
AM
500 }
501 return stub_name;
502}
252b5132 503
30667bf3
AM
504/* Look up an entry in the stub hash. Stub entries are cached because
505 creating the stub name takes a bit of time. */
506
507static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
508hppa_get_stub_entry (const asection *input_section,
509 const asection *sym_sec,
875c0872
DA
510 struct elf32_hppa_link_hash_entry *hh,
511 const Elf_Internal_Rela *rela,
c39a58e6 512 struct elf32_hppa_link_hash_table *htab)
252b5132 513{
a63e02c7 514 struct elf32_hppa_stub_hash_entry *hsh_entry;
25f72752
AM
515 const asection *id_sec;
516
517 /* If this input section is part of a group of sections sharing one
518 stub section, then use the id of the first section in the group.
519 Stub names need to include a section id, as there may well be
520 more than one stub used to reach say, printf, and we need to
521 distinguish between them. */
83c81bfe 522 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 523
a63e02c7
DA
524 if (hh != NULL && hh->hsh_cache != NULL
525 && hh->hsh_cache->hh == hh
526 && hh->hsh_cache->id_sec == id_sec)
edd21aca 527 {
a63e02c7 528 hsh_entry = hh->hsh_cache;
30667bf3
AM
529 }
530 else
531 {
30667bf3 532 char *stub_name;
edd21aca 533
875c0872 534 stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
30667bf3
AM
535 if (stub_name == NULL)
536 return NULL;
edd21aca 537
a63e02c7 538 hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
b34976b6 539 stub_name, FALSE, FALSE);
875c0872 540 if (hh != NULL)
a63e02c7 541 hh->hsh_cache = hsh_entry;
30667bf3
AM
542
543 free (stub_name);
edd21aca 544 }
30667bf3 545
a63e02c7 546 return hsh_entry;
30667bf3
AM
547}
548
30667bf3
AM
549/* Add a new stub entry to the stub hash. Not all fields of the new
550 stub entry are initialised. */
551
552static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
553hppa_add_stub (const char *stub_name,
554 asection *section,
555 struct elf32_hppa_link_hash_table *htab)
30667bf3 556{
25f72752 557 asection *link_sec;
30667bf3 558 asection *stub_sec;
875c0872 559 struct elf32_hppa_stub_hash_entry *hsh;
edd21aca 560
83c81bfe
AM
561 link_sec = htab->stub_group[section->id].link_sec;
562 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 563 if (stub_sec == NULL)
edd21aca 564 {
83c81bfe 565 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
566 if (stub_sec == NULL)
567 {
d4c88bbb 568 size_t namelen;
dc810e39 569 bfd_size_type len;
30667bf3
AM
570 char *s_name;
571
d4c88bbb
AM
572 namelen = strlen (link_sec->name);
573 len = namelen + sizeof (STUB_SUFFIX);
83c81bfe 574 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
575 if (s_name == NULL)
576 return NULL;
577
d4c88bbb
AM
578 memcpy (s_name, link_sec->name, namelen);
579 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
83c81bfe 580 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
581 if (stub_sec == NULL)
582 return NULL;
83c81bfe 583 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 584 }
83c81bfe 585 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 586 }
252b5132 587
30667bf3 588 /* Enter this entry into the linker stub hash table. */
a63e02c7 589 hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
b34976b6 590 TRUE, FALSE);
875c0872 591 if (hsh == NULL)
30667bf3 592 {
695344c0 593 /* xgettext:c-format */
4eca0228
AM
594 _bfd_error_handler (_("%B: cannot create stub entry %s"),
595 section->owner, stub_name);
30667bf3 596 return NULL;
edd21aca
AM
597 }
598
875c0872
DA
599 hsh->stub_sec = stub_sec;
600 hsh->stub_offset = 0;
601 hsh->id_sec = link_sec;
602 return hsh;
edd21aca
AM
603}
604
30667bf3
AM
605/* Determine the type of stub needed, if any, for a call. */
606
607static enum elf32_hppa_stub_type
c39a58e6 608hppa_type_of_stub (asection *input_sec,
875c0872
DA
609 const Elf_Internal_Rela *rela,
610 struct elf32_hppa_link_hash_entry *hh,
a252afa4
DA
611 bfd_vma destination,
612 struct bfd_link_info *info)
edd21aca 613{
edd21aca 614 bfd_vma location;
30667bf3
AM
615 bfd_vma branch_offset;
616 bfd_vma max_branch_offset;
617 unsigned int r_type;
618
875c0872 619 if (hh != NULL
a63e02c7
DA
620 && hh->eh.plt.offset != (bfd_vma) -1
621 && hh->eh.dynindx != -1
875c0872 622 && !hh->plabel
0e1862bb 623 && (bfd_link_pic (info)
a63e02c7
DA
624 || !hh->eh.def_regular
625 || hh->eh.root.type == bfd_link_hash_defweak))
30667bf3 626 {
067fa4a6
AM
627 /* We need an import stub. Decide between hppa_stub_import
628 and hppa_stub_import_shared later. */
30667bf3
AM
629 return hppa_stub_import;
630 }
edd21aca 631
30667bf3
AM
632 /* Determine where the call point is. */
633 location = (input_sec->output_offset
634 + input_sec->output_section->vma
875c0872 635 + rela->r_offset);
edd21aca 636
30667bf3 637 branch_offset = destination - location - 8;
875c0872 638 r_type = ELF32_R_TYPE (rela->r_info);
edd21aca 639
30667bf3
AM
640 /* Determine if a long branch stub is needed. parisc branch offsets
641 are relative to the second instruction past the branch, ie. +8
642 bytes on from the branch instruction location. The offset is
643 signed and counts in units of 4 bytes. */
644 if (r_type == (unsigned int) R_PARISC_PCREL17F)
9b52905e
NC
645 max_branch_offset = (1 << (17 - 1)) << 2;
646
30667bf3 647 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
9b52905e
NC
648 max_branch_offset = (1 << (12 - 1)) << 2;
649
25f72752 650 else /* R_PARISC_PCREL22F. */
9b52905e 651 max_branch_offset = (1 << (22 - 1)) << 2;
edd21aca 652
30667bf3 653 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
654 return hppa_stub_long_branch;
655
30667bf3
AM
656 return hppa_stub_none;
657}
edd21aca 658
30667bf3
AM
659/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
660 IN_ARG contains the link info pointer. */
edd21aca 661
30667bf3
AM
662#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
663#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 664
30667bf3 665#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 666#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 667#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 668
3ee1d854
AM
669#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
670#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 671#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 672#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 673
3ee1d854
AM
674#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
675#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 676
30667bf3
AM
677#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
678#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
679#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
680#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 681
067fa4a6 682#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
683#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
684#define NOP 0x08000240 /* nop */
685#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
686#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
687#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 688
30667bf3
AM
689#ifndef R19_STUBS
690#define R19_STUBS 1
691#endif
edd21aca 692
30667bf3
AM
693#if R19_STUBS
694#define LDW_R1_DLT LDW_R1_R19
695#else
696#define LDW_R1_DLT LDW_R1_DP
697#endif
edd21aca 698
b34976b6 699static bfd_boolean
875c0872 700hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
30667bf3 701{
875c0872 702 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3 703 struct bfd_link_info *info;
83c81bfe 704 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
705 asection *stub_sec;
706 bfd *stub_bfd;
707 bfd_byte *loc;
708 bfd_vma sym_value;
74d1c347 709 bfd_vma insn;
8dea1268 710 bfd_vma off;
74d1c347 711 int val;
30667bf3 712 int size;
edd21aca 713
30667bf3 714 /* Massage our args to the form they really have. */
875c0872
DA
715 hsh = hppa_stub_hash_entry (bh);
716 info = (struct bfd_link_info *)in_arg;
30667bf3 717
83c81bfe 718 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
719 if (htab == NULL)
720 return FALSE;
721
875c0872 722 stub_sec = hsh->stub_sec;
edd21aca 723
30667bf3 724 /* Make a note of the offset within the stubs for this entry. */
875c0872
DA
725 hsh->stub_offset = stub_sec->size;
726 loc = stub_sec->contents + hsh->stub_offset;
252b5132 727
30667bf3
AM
728 stub_bfd = stub_sec->owner;
729
875c0872 730 switch (hsh->stub_type)
30667bf3
AM
731 {
732 case hppa_stub_long_branch:
733 /* Create the long branch. A long branch is formed with "ldil"
734 loading the upper bits of the target address into a register,
735 then branching with "be" which adds in the lower bits.
736 The "be" has its delay slot nullified. */
875c0872
DA
737 sym_value = (hsh->target_value
738 + hsh->target_section->output_offset
739 + hsh->target_section->output_section->vma);
30667bf3 740
c39a58e6 741 val = hppa_field_adjust (sym_value, 0, e_lrsel);
74d1c347 742 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
743 bfd_put_32 (stub_bfd, insn, loc);
744
c39a58e6 745 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
74d1c347 746 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
747 bfd_put_32 (stub_bfd, insn, loc + 4);
748
30667bf3 749 size = 8;
edd21aca
AM
750 break;
751
30667bf3
AM
752 case hppa_stub_long_branch_shared:
753 /* Branches are relative. This is where we are going to. */
875c0872
DA
754 sym_value = (hsh->target_value
755 + hsh->target_section->output_offset
756 + hsh->target_section->output_section->vma);
30667bf3
AM
757
758 /* And this is where we are coming from, more or less. */
875c0872 759 sym_value -= (hsh->stub_offset
30667bf3
AM
760 + stub_sec->output_offset
761 + stub_sec->output_section->vma);
762
74d1c347 763 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 764 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 765 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
766 bfd_put_32 (stub_bfd, insn, loc + 4);
767
47d89dba 768 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 769 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
770 bfd_put_32 (stub_bfd, insn, loc + 8);
771 size = 12;
772 break;
edd21aca 773
30667bf3
AM
774 case hppa_stub_import:
775 case hppa_stub_import_shared:
a63e02c7 776 off = hsh->hh->eh.plt.offset;
8dea1268 777 if (off >= (bfd_vma) -2)
49e9d0d3 778 abort ();
8dea1268
AM
779
780 off &= ~ (bfd_vma) 1;
781 sym_value = (off
ce558b89
AM
782 + htab->etab.splt->output_offset
783 + htab->etab.splt->output_section->vma
784 - elf_gp (htab->etab.splt->output_section->owner));
30667bf3
AM
785
786 insn = ADDIL_DP;
787#if R19_STUBS
875c0872 788 if (hsh->stub_type == hppa_stub_import_shared)
30667bf3
AM
789 insn = ADDIL_R19;
790#endif
c39a58e6 791 val = hppa_field_adjust (sym_value, 0, e_lrsel),
74d1c347 792 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 793 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 794
47d89dba
AM
795 /* It is critical to use lrsel/rrsel here because we are using
796 two different offsets (+0 and +4) from sym_value. If we use
797 lsel/rsel then with unfortunate sym_values we will round
798 sym_value+4 up to the next 2k block leading to a mis-match
799 between the lsel and rsel value. */
c39a58e6 800 val = hppa_field_adjust (sym_value, 0, e_rrsel);
74d1c347 801 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 802 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 803
83c81bfe 804 if (htab->multi_subspace)
30667bf3 805 {
47d89dba 806 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 807 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 808 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 809
74d1c347
AM
810 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
811 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
812 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
813 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 814
30667bf3
AM
815 size = 28;
816 }
817 else
818 {
74d1c347 819 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 820 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 821 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 822 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 823
30667bf3
AM
824 size = 16;
825 }
252b5132 826
30667bf3 827 break;
252b5132 828
30667bf3
AM
829 case hppa_stub_export:
830 /* Branches are relative. This is where we are going to. */
875c0872
DA
831 sym_value = (hsh->target_value
832 + hsh->target_section->output_offset
833 + hsh->target_section->output_section->vma);
252b5132 834
30667bf3 835 /* And this is where we are coming from. */
875c0872 836 sym_value -= (hsh->stub_offset
30667bf3
AM
837 + stub_sec->output_offset
838 + stub_sec->output_section->vma);
edd21aca 839
067fa4a6
AM
840 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
841 && (!htab->has_22bit_branch
842 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 843 {
4eca0228 844 _bfd_error_handler
695344c0 845 /* xgettext:c-format */
d42c267e 846 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
875c0872 847 hsh->target_section->owner,
d003868e 848 stub_sec,
d42c267e 849 hsh->stub_offset,
a63e02c7 850 hsh->bh_root.string);
30667bf3 851 bfd_set_error (bfd_error_bad_value);
b34976b6 852 return FALSE;
252b5132 853 }
30667bf3 854
74d1c347 855 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
856 if (!htab->has_22bit_branch)
857 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
858 else
859 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
860 bfd_put_32 (stub_bfd, insn, loc);
861
74d1c347
AM
862 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
863 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
864 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
865 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
866 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
867
868 /* Point the function symbol at the stub. */
a63e02c7
DA
869 hsh->hh->eh.root.u.def.section = stub_sec;
870 hsh->hh->eh.root.u.def.value = stub_sec->size;
30667bf3
AM
871
872 size = 24;
873 break;
874
875 default:
876 BFD_FAIL ();
b34976b6 877 return FALSE;
252b5132
RH
878 }
879
eea6121a 880 stub_sec->size += size;
b34976b6 881 return TRUE;
252b5132
RH
882}
883
30667bf3
AM
884#undef LDIL_R1
885#undef BE_SR4_R1
886#undef BL_R1
887#undef ADDIL_R1
888#undef DEPI_R1
30667bf3
AM
889#undef LDW_R1_R21
890#undef LDW_R1_DLT
891#undef LDW_R1_R19
892#undef ADDIL_R19
893#undef LDW_R1_DP
894#undef LDSID_R21_R1
895#undef MTSP_R1
896#undef BE_SR0_R21
897#undef STW_RP
898#undef BV_R0_R21
899#undef BL_RP
900#undef NOP
901#undef LDW_RP
902#undef LDSID_RP_R1
903#undef BE_SR0_RP
252b5132 904
30667bf3
AM
905/* As above, but don't actually build the stub. Just bump offset so
906 we know stub section sizes. */
907
b34976b6 908static bfd_boolean
875c0872 909hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
252b5132 910{
875c0872 911 struct elf32_hppa_stub_hash_entry *hsh;
83c81bfe 912 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
913 int size;
914
915 /* Massage our args to the form they really have. */
875c0872 916 hsh = hppa_stub_hash_entry (bh);
c39a58e6 917 htab = in_arg;
30667bf3 918
875c0872 919 if (hsh->stub_type == hppa_stub_long_branch)
98ceb8ce 920 size = 8;
875c0872 921 else if (hsh->stub_type == hppa_stub_long_branch_shared)
30667bf3 922 size = 12;
875c0872 923 else if (hsh->stub_type == hppa_stub_export)
30667bf3 924 size = 24;
74d1c347 925 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 926 {
83c81bfe 927 if (htab->multi_subspace)
30667bf3
AM
928 size = 28;
929 else
930 size = 16;
931 }
252b5132 932
875c0872 933 hsh->stub_sec->size += size;
b34976b6 934 return TRUE;
30667bf3 935}
252b5132 936
30667bf3
AM
937/* Return nonzero if ABFD represents an HPPA ELF32 file.
938 Additionally we set the default architecture and machine. */
939
b34976b6 940static bfd_boolean
c39a58e6 941elf32_hppa_object_p (bfd *abfd)
30667bf3 942{
24a5e751
L
943 Elf_Internal_Ehdr * i_ehdrp;
944 unsigned int flags;
252b5132 945
24a5e751
L
946 i_ehdrp = elf_elfheader (abfd);
947 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
948 {
9c55345c 949 /* GCC on hppa-linux produces binaries with OSABI=GNU,
6c21aa76 950 but the kernel produces corefiles with OSABI=SysV. */
9c55345c 951 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
6c21aa76 952 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
b34976b6 953 return FALSE;
24a5e751 954 }
225247f0
JT
955 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
956 {
957 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
958 but the kernel produces corefiles with OSABI=SysV. */
959 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
960 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
961 return FALSE;
962 }
24a5e751
L
963 else
964 {
965 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 966 return FALSE;
24a5e751
L
967 }
968
969 flags = i_ehdrp->e_flags;
30667bf3
AM
970 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
971 {
972 case EFA_PARISC_1_0:
973 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
974 case EFA_PARISC_1_1:
975 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
976 case EFA_PARISC_2_0:
977 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
978 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
979 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
980 }
b34976b6 981 return TRUE;
252b5132
RH
982}
983
30667bf3
AM
984/* Create the .plt and .got sections, and set up our hash table
985 short-cuts to various dynamic sections. */
986
b34976b6 987static bfd_boolean
c39a58e6 988elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 989{
83c81bfe 990 struct elf32_hppa_link_hash_table *htab;
875c0872 991 struct elf_link_hash_entry *eh;
edd21aca 992
30667bf3 993 /* Don't try to create the .plt and .got twice. */
83c81bfe 994 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
995 if (htab == NULL)
996 return FALSE;
ce558b89 997 if (htab->etab.splt != NULL)
b34976b6 998 return TRUE;
edd21aca 999
30667bf3
AM
1000 /* Call the generic code to do most of the work. */
1001 if (! _bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 1002 return FALSE;
252b5132 1003
b18e2ae5
AM
1004 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1005 application, because __canonicalize_funcptr_for_compare needs it. */
875c0872
DA
1006 eh = elf_hash_table (info)->hgot;
1007 eh->forced_local = 0;
1008 eh->other = STV_DEFAULT;
1009 return bfd_elf_link_record_dynamic_symbol (info, eh);
30667bf3
AM
1010}
1011
ebe50bae
AM
1012/* Copy the extra info we tack onto an elf_link_hash_entry. */
1013
51b64d56 1014static void
fcfa13d2 1015elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
875c0872
DA
1016 struct elf_link_hash_entry *eh_dir,
1017 struct elf_link_hash_entry *eh_ind)
ebe50bae 1018{
875c0872 1019 struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
ebe50bae 1020
875c0872
DA
1021 hh_dir = hppa_elf_hash_entry (eh_dir);
1022 hh_ind = hppa_elf_hash_entry (eh_ind);
ebe50bae 1023
287c7eaf
AM
1024 if (hh_ind->dyn_relocs != NULL
1025 && eh_ind->root.type == bfd_link_hash_indirect)
ebe50bae 1026 {
875c0872 1027 if (hh_dir->dyn_relocs != NULL)
bbd7ec4a 1028 {
875c0872
DA
1029 struct elf32_hppa_dyn_reloc_entry **hdh_pp;
1030 struct elf32_hppa_dyn_reloc_entry *hdh_p;
bbd7ec4a 1031
fcfa13d2 1032 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 1033 list. Merge any entries against the same section. */
875c0872 1034 for (hdh_pp = &hh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
bbd7ec4a 1035 {
875c0872 1036 struct elf32_hppa_dyn_reloc_entry *hdh_q;
bbd7ec4a 1037
fcfa13d2
AM
1038 for (hdh_q = hh_dir->dyn_relocs;
1039 hdh_q != NULL;
1040 hdh_q = hdh_q->hdh_next)
875c0872 1041 if (hdh_q->sec == hdh_p->sec)
bbd7ec4a
AM
1042 {
1043#if RELATIVE_DYNRELOCS
875c0872 1044 hdh_q->relative_count += hdh_p->relative_count;
bbd7ec4a 1045#endif
875c0872 1046 hdh_q->count += hdh_p->count;
a63e02c7 1047 *hdh_pp = hdh_p->hdh_next;
bbd7ec4a
AM
1048 break;
1049 }
875c0872 1050 if (hdh_q == NULL)
a63e02c7 1051 hdh_pp = &hdh_p->hdh_next;
bbd7ec4a 1052 }
875c0872 1053 *hdh_pp = hh_dir->dyn_relocs;
bbd7ec4a
AM
1054 }
1055
875c0872
DA
1056 hh_dir->dyn_relocs = hh_ind->dyn_relocs;
1057 hh_ind->dyn_relocs = NULL;
ebe50bae 1058 }
ebe50bae 1059
4fc8051d 1060 if (ELIMINATE_COPY_RELOCS
875c0872
DA
1061 && eh_ind->root.type != bfd_link_hash_indirect
1062 && eh_dir->dynamic_adjusted)
f5385ebf
AM
1063 {
1064 /* If called to transfer flags for a weakdef during processing
1065 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
1066 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
e81830c5
AM
1067 if (eh_dir->versioned != versioned_hidden)
1068 eh_dir->ref_dynamic |= eh_ind->ref_dynamic;
875c0872
DA
1069 eh_dir->ref_regular |= eh_ind->ref_regular;
1070 eh_dir->ref_regular_nonweak |= eh_ind->ref_regular_nonweak;
1071 eh_dir->needs_plt |= eh_ind->needs_plt;
f5385ebf 1072 }
4fc8051d 1073 else
9b52905e 1074 {
e81830c5
AM
1075 if (eh_ind->root.type == bfd_link_hash_indirect)
1076 {
1077 hh_dir->plabel |= hh_ind->plabel;
1078 hh_dir->tls_type |= hh_ind->tls_type;
1079 hh_ind->tls_type = GOT_UNKNOWN;
1080 }
9b52905e
NC
1081
1082 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
1083 }
1084}
1085
1086static int
1087elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1088 int r_type, int is_local ATTRIBUTE_UNUSED)
1089{
1090 /* For now we don't support linker optimizations. */
1091 return r_type;
ebe50bae
AM
1092}
1093
d45b7d74
DA
1094/* Return a pointer to the local GOT, PLT and TLS reference counts
1095 for ABFD. Returns NULL if the storage allocation fails. */
1096
1097static bfd_signed_vma *
1098hppa32_elf_local_refcounts (bfd *abfd)
1099{
1100 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1101 bfd_signed_vma *local_refcounts;
68ffbac6 1102
d45b7d74
DA
1103 local_refcounts = elf_local_got_refcounts (abfd);
1104 if (local_refcounts == NULL)
1105 {
1106 bfd_size_type size;
1107
1108 /* Allocate space for local GOT and PLT reference
1109 counts. Done this way to save polluting elf_obj_tdata
1110 with another target specific pointer. */
1111 size = symtab_hdr->sh_info;
1112 size *= 2 * sizeof (bfd_signed_vma);
1113 /* Add in space to store the local GOT TLS types. */
1114 size += symtab_hdr->sh_info;
1115 local_refcounts = bfd_zalloc (abfd, size);
1116 if (local_refcounts == NULL)
1117 return NULL;
1118 elf_local_got_refcounts (abfd) = local_refcounts;
1119 memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1120 symtab_hdr->sh_info);
1121 }
1122 return local_refcounts;
1123}
1124
1125
30667bf3 1126/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1127 calculate needed space in the global offset table, procedure linkage
1128 table, and dynamic reloc sections. At this point we haven't
1129 necessarily read all the input files. */
252b5132 1130
b34976b6 1131static bfd_boolean
c39a58e6
AM
1132elf32_hppa_check_relocs (bfd *abfd,
1133 struct bfd_link_info *info,
1134 asection *sec,
1135 const Elf_Internal_Rela *relocs)
252b5132 1136{
30667bf3 1137 Elf_Internal_Shdr *symtab_hdr;
875c0872
DA
1138 struct elf_link_hash_entry **eh_syms;
1139 const Elf_Internal_Rela *rela;
1140 const Elf_Internal_Rela *rela_end;
83c81bfe 1141 struct elf32_hppa_link_hash_table *htab;
30667bf3 1142 asection *sreloc;
30667bf3 1143
0e1862bb 1144 if (bfd_link_relocatable (info))
b34976b6 1145 return TRUE;
30667bf3 1146
83c81bfe 1147 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1148 if (htab == NULL)
1149 return FALSE;
30667bf3 1150 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
875c0872 1151 eh_syms = elf_sym_hashes (abfd);
30667bf3 1152 sreloc = NULL;
30667bf3 1153
875c0872
DA
1154 rela_end = relocs + sec->reloc_count;
1155 for (rela = relocs; rela < rela_end; rela++)
30667bf3
AM
1156 {
1157 enum {
1158 NEED_GOT = 1,
1159 NEED_PLT = 2,
1160 NEED_DYNREL = 4,
98ceb8ce 1161 PLT_PLABEL = 8
30667bf3 1162 };
edd21aca 1163
30667bf3 1164 unsigned int r_symndx, r_type;
875c0872
DA
1165 struct elf32_hppa_link_hash_entry *hh;
1166 int need_entry = 0;
252b5132 1167
875c0872 1168 r_symndx = ELF32_R_SYM (rela->r_info);
252b5132 1169
30667bf3 1170 if (r_symndx < symtab_hdr->sh_info)
875c0872 1171 hh = NULL;
30667bf3 1172 else
f7c5057a 1173 {
875c0872 1174 hh = hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
a63e02c7
DA
1175 while (hh->eh.root.type == bfd_link_hash_indirect
1176 || hh->eh.root.type == bfd_link_hash_warning)
1177 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
f7c5057a 1178 }
252b5132 1179
875c0872 1180 r_type = ELF32_R_TYPE (rela->r_info);
9b52905e 1181 r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
252b5132 1182
30667bf3
AM
1183 switch (r_type)
1184 {
1185 case R_PARISC_DLTIND14F:
1186 case R_PARISC_DLTIND14R:
1187 case R_PARISC_DLTIND21L:
1188 /* This symbol requires a global offset table entry. */
1189 need_entry = NEED_GOT;
30667bf3
AM
1190 break;
1191
1192 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1193 case R_PARISC_PLABEL21L:
1194 case R_PARISC_PLABEL32:
74d1c347 1195 /* If the addend is non-zero, we break badly. */
875c0872 1196 if (rela->r_addend != 0)
49e9d0d3 1197 abort ();
74d1c347
AM
1198
1199 /* If we are creating a shared library, then we need to
1200 create a PLT entry for all PLABELs, because PLABELs with
1201 local symbols may be passed via a pointer to another
1202 object. Additionally, output a dynamic relocation
4dc86686 1203 pointing to the PLT entry.
875c0872 1204
4dc86686
AM
1205 For executables, the original 32-bit ABI allowed two
1206 different styles of PLABELs (function pointers): For
1207 global functions, the PLABEL word points into the .plt
1208 two bytes past a (function address, gp) pair, and for
1209 local functions the PLABEL points directly at the
1210 function. The magic +2 for the first type allows us to
1211 differentiate between the two. As you can imagine, this
1212 is a real pain when it comes to generating code to call
1213 functions indirectly or to compare function pointers.
1214 We avoid the mess by always pointing a PLABEL into the
1215 .plt, even for local functions. */
127e8e9f
AM
1216 need_entry = PLT_PLABEL | NEED_PLT;
1217 if (bfd_link_pic (info))
1218 need_entry |= NEED_DYNREL;
30667bf3
AM
1219 break;
1220
1221 case R_PARISC_PCREL12F:
83c81bfe 1222 htab->has_12bit_branch = 1;
067fa4a6
AM
1223 goto branch_common;
1224
30667bf3
AM
1225 case R_PARISC_PCREL17C:
1226 case R_PARISC_PCREL17F:
83c81bfe 1227 htab->has_17bit_branch = 1;
067fa4a6
AM
1228 goto branch_common;
1229
30667bf3 1230 case R_PARISC_PCREL22F:
067fa4a6
AM
1231 htab->has_22bit_branch = 1;
1232 branch_common:
47d89dba
AM
1233 /* Function calls might need to go through the .plt, and
1234 might require long branch stubs. */
875c0872 1235 if (hh == NULL)
30667bf3
AM
1236 {
1237 /* We know local syms won't need a .plt entry, and if
1238 they need a long branch stub we can't guarantee that
1239 we can reach the stub. So just flag an error later
1240 if we're doing a shared link and find we need a long
1241 branch stub. */
1242 continue;
1243 }
1244 else
1245 {
1246 /* Global symbols will need a .plt entry if they remain
1247 global, and in most cases won't need a long branch
1248 stub. Unfortunately, we have to cater for the case
1249 where a symbol is forced local by versioning, or due
1250 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1251 need_entry = NEED_PLT;
a63e02c7 1252 if (hh->eh.type == STT_PARISC_MILLI)
98ceb8ce 1253 need_entry = 0;
30667bf3
AM
1254 }
1255 break;
1256
36751eee 1257 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1258 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1259 case R_PARISC_PCREL14F: /* PC relative load/store. */
1260 case R_PARISC_PCREL14R:
1261 case R_PARISC_PCREL17R: /* External branches. */
1262 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
36751eee 1263 case R_PARISC_PCREL32:
30667bf3
AM
1264 /* We don't need to propagate the relocation if linking a
1265 shared object since these are section relative. */
1266 continue;
1267
1268 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1269 case R_PARISC_DPREL14R:
1270 case R_PARISC_DPREL21L:
0e1862bb 1271 if (bfd_link_pic (info))
30667bf3 1272 {
4eca0228 1273 _bfd_error_handler
695344c0 1274 /* xgettext:c-format */
d003868e
AM
1275 (_("%B: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1276 abfd,
30667bf3
AM
1277 elf_hppa_howto_table[r_type].name);
1278 bfd_set_error (bfd_error_bad_value);
b34976b6 1279 return FALSE;
30667bf3
AM
1280 }
1281 /* Fall through. */
1282
1283 case R_PARISC_DIR17F: /* Used for external branches. */
1284 case R_PARISC_DIR17R:
47d89dba
AM
1285 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1286 case R_PARISC_DIR14R:
30667bf3 1287 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
c46b7515 1288 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1289 /* We may want to output a dynamic relocation later. */
1290 need_entry = NEED_DYNREL;
1291 break;
1292
1293 /* This relocation describes the C++ object vtable hierarchy.
1294 Reconstruct it for later use during GC. */
1295 case R_PARISC_GNU_VTINHERIT:
a63e02c7 1296 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
b34976b6 1297 return FALSE;
30667bf3
AM
1298 continue;
1299
1300 /* This relocation describes which C++ vtable entries are actually
1301 used. Record for later use during GC. */
1302 case R_PARISC_GNU_VTENTRY:
d17e0c6e
JB
1303 BFD_ASSERT (hh != NULL);
1304 if (hh != NULL
1305 && !bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
b34976b6 1306 return FALSE;
30667bf3
AM
1307 continue;
1308
9b52905e
NC
1309 case R_PARISC_TLS_GD21L:
1310 case R_PARISC_TLS_GD14R:
1311 case R_PARISC_TLS_LDM21L:
1312 case R_PARISC_TLS_LDM14R:
1313 need_entry = NEED_GOT;
1314 break;
1315
1316 case R_PARISC_TLS_IE21L:
1317 case R_PARISC_TLS_IE14R:
2e684e75 1318 if (bfd_link_dll (info))
9b52905e
NC
1319 info->flags |= DF_STATIC_TLS;
1320 need_entry = NEED_GOT;
1321 break;
1322
30667bf3
AM
1323 default:
1324 continue;
1325 }
1326
1327 /* Now carry out our orders. */
1328 if (need_entry & NEED_GOT)
1329 {
2e684e75
AM
1330 int tls_type = GOT_NORMAL;
1331
9b52905e
NC
1332 switch (r_type)
1333 {
1334 default:
9b52905e
NC
1335 break;
1336 case R_PARISC_TLS_GD21L:
1337 case R_PARISC_TLS_GD14R:
2e684e75 1338 tls_type = GOT_TLS_GD;
9b52905e
NC
1339 break;
1340 case R_PARISC_TLS_LDM21L:
1341 case R_PARISC_TLS_LDM14R:
2e684e75 1342 tls_type = GOT_TLS_LDM;
9b52905e
NC
1343 break;
1344 case R_PARISC_TLS_IE21L:
1345 case R_PARISC_TLS_IE14R:
2e684e75 1346 tls_type = GOT_TLS_IE;
9b52905e
NC
1347 break;
1348 }
1349
30667bf3 1350 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1351 relocation for this entry. */
ce558b89 1352 if (htab->etab.sgot == NULL)
30667bf3 1353 {
a63e02c7 1354 if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
b34976b6 1355 return FALSE;
30667bf3
AM
1356 }
1357
2e684e75 1358 if (hh != NULL)
30667bf3 1359 {
2e684e75
AM
1360 if (tls_type == GOT_TLS_LDM)
1361 htab->tls_ldm_got.refcount += 1;
9b52905e 1362 else
2e684e75
AM
1363 hh->eh.got.refcount += 1;
1364 hh->tls_type |= tls_type;
1365 }
1366 else
1367 {
1368 bfd_signed_vma *local_got_refcounts;
9b52905e 1369
2e684e75
AM
1370 /* This is a global offset table entry for a local symbol. */
1371 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1372 if (local_got_refcounts == NULL)
1373 return FALSE;
1374 if (tls_type == GOT_TLS_LDM)
1375 htab->tls_ldm_got.refcount += 1;
1376 else
1377 local_got_refcounts[r_symndx] += 1;
9b52905e 1378
2e684e75 1379 hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
30667bf3
AM
1380 }
1381 }
1382
1383 if (need_entry & NEED_PLT)
1384 {
1385 /* If we are creating a shared library, and this is a reloc
1386 against a weak symbol or a global symbol in a dynamic
1387 object, then we will be creating an import stub and a
1388 .plt entry for the symbol. Similarly, on a normal link
1389 to symbols defined in a dynamic object we'll need the
1390 import stub and a .plt entry. We don't know yet whether
1391 the symbol is defined or not, so make an entry anyway and
1392 clean up later in adjust_dynamic_symbol. */
1393 if ((sec->flags & SEC_ALLOC) != 0)
1394 {
875c0872 1395 if (hh != NULL)
30667bf3 1396 {
a63e02c7
DA
1397 hh->eh.needs_plt = 1;
1398 hh->eh.plt.refcount += 1;
74d1c347 1399
36605136
AM
1400 /* If this .plt entry is for a plabel, mark it so
1401 that adjust_dynamic_symbol will keep the entry
1402 even if it appears to be local. */
74d1c347 1403 if (need_entry & PLT_PLABEL)
875c0872 1404 hh->plabel = 1;
74d1c347
AM
1405 }
1406 else if (need_entry & PLT_PLABEL)
1407 {
3ac8354b 1408 bfd_signed_vma *local_got_refcounts;
68fb2e56 1409 bfd_signed_vma *local_plt_refcounts;
74d1c347 1410
d45b7d74 1411 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
74d1c347 1412 if (local_got_refcounts == NULL)
d45b7d74 1413 return FALSE;
68fb2e56
AM
1414 local_plt_refcounts = (local_got_refcounts
1415 + symtab_hdr->sh_info);
ebe50bae 1416 local_plt_refcounts[r_symndx] += 1;
30667bf3 1417 }
30667bf3
AM
1418 }
1419 }
1420
d336fa6d
AM
1421 if ((need_entry & NEED_DYNREL) != 0
1422 && (sec->flags & SEC_ALLOC) != 0)
30667bf3
AM
1423 {
1424 /* Flag this symbol as having a non-got, non-plt reference
1425 so that we generate copy relocs if it turns out to be
1426 dynamic. */
0e1862bb 1427 if (hh != NULL && !bfd_link_pic (info))
a63e02c7 1428 hh->eh.non_got_ref = 1;
30667bf3
AM
1429
1430 /* If we are creating a shared library then we need to copy
1431 the reloc into the shared library. However, if we are
1432 linking with -Bsymbolic, we need only copy absolute
1433 relocs or relocs against symbols that are not defined in
1434 an object we are including in the link. PC- or DP- or
1435 DLT-relative relocs against any local sym or global sym
1436 with DEF_REGULAR set, can be discarded. At this point we
1437 have not seen all the input files, so it is possible that
1438 DEF_REGULAR is not set now but will be set later (it is
1439 never cleared). We account for that possibility below by
98ceb8ce 1440 storing information in the dyn_relocs field of the
30667bf3
AM
1441 hash table entry.
1442
1443 A similar situation to the -Bsymbolic case occurs when
1444 creating shared libraries and symbol visibility changes
1445 render the symbol local.
1446
1447 As it turns out, all the relocs we will be creating here
1448 are absolute, so we cannot remove them on -Bsymbolic
1449 links or visibility changes anyway. A STUB_REL reloc
1450 is absolute too, as in that case it is the reloc in the
1451 stub we will be creating, rather than copying the PCREL
56882138
AM
1452 reloc in the branch.
1453
1454 If on the other hand, we are creating an executable, we
1455 may need to keep relocations for symbols satisfied by a
1456 dynamic library if we manage to avoid copy relocs for the
1457 symbol. */
0e1862bb 1458 if ((bfd_link_pic (info)
446f2863 1459 && (IS_ABSOLUTE_RELOC (r_type)
875c0872 1460 || (hh != NULL
a496fbc8 1461 && (!SYMBOLIC_BIND (info, &hh->eh)
a63e02c7
DA
1462 || hh->eh.root.type == bfd_link_hash_defweak
1463 || !hh->eh.def_regular))))
4fc8051d 1464 || (ELIMINATE_COPY_RELOCS
0e1862bb 1465 && !bfd_link_pic (info)
875c0872 1466 && hh != NULL
a63e02c7
DA
1467 && (hh->eh.root.type == bfd_link_hash_defweak
1468 || !hh->eh.def_regular)))
30667bf3 1469 {
875c0872
DA
1470 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1471 struct elf32_hppa_dyn_reloc_entry **hdh_head;
ec338859 1472
30667bf3
AM
1473 /* Create a reloc section in dynobj and make room for
1474 this reloc. */
98ceb8ce 1475 if (sreloc == NULL)
30667bf3 1476 {
83bac4b0
NC
1477 sreloc = _bfd_elf_make_dynamic_reloc_section
1478 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
1479
98ceb8ce 1480 if (sreloc == NULL)
30667bf3 1481 {
83bac4b0
NC
1482 bfd_set_error (bfd_error_bad_value);
1483 return FALSE;
30667bf3 1484 }
30667bf3
AM
1485 }
1486
98ceb8ce
AM
1487 /* If this is a global symbol, we count the number of
1488 relocations we need for this symbol. */
875c0872 1489 if (hh != NULL)
30667bf3 1490 {
875c0872 1491 hdh_head = &hh->dyn_relocs;
ec338859
AM
1492 }
1493 else
1494 {
1495 /* Track dynamic relocs needed for local syms too.
1496 We really need local syms available to do this
1497 easily. Oh well. */
875c0872 1498 asection *sr;
6edfbbad 1499 void *vpp;
87d72d41 1500 Elf_Internal_Sym *isym;
6edfbbad 1501
87d72d41
AM
1502 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1503 abfd, r_symndx);
1504 if (isym == NULL)
b34976b6 1505 return FALSE;
30667bf3 1506
87d72d41
AM
1507 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1508 if (sr == NULL)
1509 sr = sec;
1510
6edfbbad
DJ
1511 vpp = &elf_section_data (sr)->local_dynrel;
1512 hdh_head = (struct elf32_hppa_dyn_reloc_entry **) vpp;
ec338859
AM
1513 }
1514
875c0872
DA
1515 hdh_p = *hdh_head;
1516 if (hdh_p == NULL || hdh_p->sec != sec)
ec338859 1517 {
a63e02c7 1518 hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
875c0872 1519 if (hdh_p == NULL)
b34976b6 1520 return FALSE;
a63e02c7 1521 hdh_p->hdh_next = *hdh_head;
875c0872
DA
1522 *hdh_head = hdh_p;
1523 hdh_p->sec = sec;
1524 hdh_p->count = 0;
98ceb8ce 1525#if RELATIVE_DYNRELOCS
875c0872 1526 hdh_p->relative_count = 0;
98ceb8ce 1527#endif
ec338859 1528 }
98ceb8ce 1529
875c0872 1530 hdh_p->count += 1;
98ceb8ce 1531#if RELATIVE_DYNRELOCS
ec338859 1532 if (!IS_ABSOLUTE_RELOC (rtype))
875c0872 1533 hdh_p->relative_count += 1;
98ceb8ce 1534#endif
30667bf3
AM
1535 }
1536 }
1537 }
edd21aca 1538
b34976b6 1539 return TRUE;
edd21aca
AM
1540}
1541
30667bf3
AM
1542/* Return the section that should be marked against garbage collection
1543 for a given relocation. */
1544
1545static asection *
c39a58e6 1546elf32_hppa_gc_mark_hook (asection *sec,
07adf181 1547 struct bfd_link_info *info,
875c0872
DA
1548 Elf_Internal_Rela *rela,
1549 struct elf_link_hash_entry *hh,
c39a58e6 1550 Elf_Internal_Sym *sym)
30667bf3 1551{
875c0872 1552 if (hh != NULL)
07adf181
AM
1553 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1554 {
1555 case R_PARISC_GNU_VTINHERIT:
1556 case R_PARISC_GNU_VTENTRY:
1557 return NULL;
1558 }
30667bf3 1559
07adf181 1560 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
30667bf3
AM
1561}
1562
edfc032f
AM
1563/* Support for core dump NOTE sections. */
1564
1565static bfd_boolean
1566elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1567{
1568 int offset;
1569 size_t size;
1570
1571 switch (note->descsz)
1572 {
1573 default:
1574 return FALSE;
1575
1576 case 396: /* Linux/hppa */
1577 /* pr_cursig */
228e534f 1578 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
edfc032f
AM
1579
1580 /* pr_pid */
228e534f 1581 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
edfc032f
AM
1582
1583 /* pr_reg */
1584 offset = 72;
1585 size = 320;
1586
1587 break;
1588 }
1589
1590 /* Make a ".reg/999" section. */
1591 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1592 size, note->descpos + offset);
1593}
1594
1595static bfd_boolean
1596elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1597{
1598 switch (note->descsz)
1599 {
1600 default:
1601 return FALSE;
1602
1603 case 124: /* Linux/hppa elf_prpsinfo. */
228e534f 1604 elf_tdata (abfd)->core->program
edfc032f 1605 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
228e534f 1606 elf_tdata (abfd)->core->command
edfc032f
AM
1607 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1608 }
1609
1610 /* Note that for some reason, a spurious space is tacked
1611 onto the end of the args in some (at least one anyway)
1612 implementations, so strip it off if it exists. */
1613 {
228e534f 1614 char *command = elf_tdata (abfd)->core->command;
edfc032f
AM
1615 int n = strlen (command);
1616
1617 if (0 < n && command[n - 1] == ' ')
1618 command[n - 1] = '\0';
1619 }
1620
1621 return TRUE;
1622}
1623
74d1c347
AM
1624/* Our own version of hide_symbol, so that we can keep plt entries for
1625 plabels. */
1626
1627static void
c39a58e6 1628elf32_hppa_hide_symbol (struct bfd_link_info *info,
875c0872 1629 struct elf_link_hash_entry *eh,
c39a58e6 1630 bfd_boolean force_local)
74d1c347 1631{
e5094212
AM
1632 if (force_local)
1633 {
875c0872
DA
1634 eh->forced_local = 1;
1635 if (eh->dynindx != -1)
e5094212 1636 {
875c0872 1637 eh->dynindx = -1;
e5094212 1638 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
875c0872 1639 eh->dynstr_index);
e5094212 1640 }
31fc8a0b
NC
1641
1642 /* PR 16082: Remove version information from hidden symbol. */
1643 eh->verinfo.verdef = NULL;
1644 eh->verinfo.vertree = NULL;
e5094212
AM
1645 }
1646
4340287b
DA
1647 /* STT_GNU_IFUNC symbol must go through PLT. */
1648 if (! hppa_elf_hash_entry (eh)->plabel
1649 && eh->type != STT_GNU_IFUNC)
74d1c347 1650 {
875c0872 1651 eh->needs_plt = 0;
4340287b 1652 eh->plt = elf_hash_table (info)->init_plt_offset;
74d1c347
AM
1653 }
1654}
1655
127e8e9f
AM
1656/* Find any dynamic relocs that apply to read-only sections. */
1657
1658static asection *
1659readonly_dynrelocs (struct elf_link_hash_entry *eh)
1660{
1661 struct elf32_hppa_link_hash_entry *hh;
1662 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1663
1664 hh = hppa_elf_hash_entry (eh);
1665 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
1666 {
1667 asection *sec = hdh_p->sec->output_section;
1668
1669 if (sec != NULL && (sec->flags & SEC_READONLY) != 0)
1670 return hdh_p->sec;
1671 }
1672 return NULL;
1673}
1674
287c7eaf
AM
1675/* Return true if we have dynamic relocs against H or any of its weak
1676 aliases, that apply to read-only sections. Cannot be used after
1677 size_dynamic_sections. */
1678
1679static bfd_boolean
1680alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1681{
1682 struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1683 do
1684 {
1685 if (readonly_dynrelocs (&hh->eh))
1686 return TRUE;
1687 hh = hppa_elf_hash_entry (hh->eh.u.alias);
1688 } while (hh != NULL && &hh->eh != eh);
1689
1690 return FALSE;
1691}
1692
30667bf3
AM
1693/* Adjust a symbol defined by a dynamic object and referenced by a
1694 regular object. The current definition is in some section of the
1695 dynamic object, but we're not including those sections. We have to
1696 change the definition to something the rest of the link can
1697 understand. */
252b5132 1698
b34976b6 1699static bfd_boolean
c39a58e6 1700elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
875c0872 1701 struct elf_link_hash_entry *eh)
252b5132 1702{
83c81bfe 1703 struct elf32_hppa_link_hash_table *htab;
5474d94f 1704 asection *sec, *srel;
30667bf3
AM
1705
1706 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1707 will fill in the contents of the procedure linkage table later. */
875c0872
DA
1708 if (eh->type == STT_FUNC
1709 || eh->needs_plt)
30667bf3 1710 {
127e8e9f
AM
1711 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, eh)
1712 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
287c7eaf 1713 /* Discard dyn_relocs when non-pic if we've decided that a
529fe20e 1714 function symbol is local. */
287c7eaf
AM
1715 if (!bfd_link_pic (info) && local)
1716 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
127e8e9f 1717
4340287b
DA
1718 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1719 The refcounts are not reliable when it has been hidden since
1720 hide_symbol can be called before the plabel flag is set. */
d336fa6d 1721 if (hppa_elf_hash_entry (eh)->plabel)
4340287b
DA
1722 eh->plt.refcount = 1;
1723
127e8e9f
AM
1724 /* Note that unlike some other backends, the refcount is not
1725 incremented for a non-call (and non-plabel) function reference. */
d336fa6d 1726 else if (eh->plt.refcount <= 0
127e8e9f 1727 || local)
30667bf3
AM
1728 {
1729 /* The .plt entry is not needed when:
1730 a) Garbage collection has removed all references to the
1731 symbol, or
1732 b) We know for certain the symbol is defined in this
74d1c347
AM
1733 object, and it's not a weak definition, nor is the symbol
1734 used by a plabel relocation. Either this object is the
1735 application or we are doing a shared symbolic link. */
875c0872
DA
1736 eh->plt.offset = (bfd_vma) -1;
1737 eh->needs_plt = 0;
30667bf3 1738 }
4dc86686 1739
287c7eaf
AM
1740 /* Unlike other targets, elf32-hppa.c does not define a function
1741 symbol in a non-pic executable on PLT stub code, so we don't
1742 have a local definition in that case. ie. dyn_relocs can't
1743 be discarded. */
1744
127e8e9f 1745 /* Function symbols can't have copy relocs. */
b34976b6 1746 return TRUE;
30667bf3 1747 }
bbd7ec4a 1748 else
875c0872 1749 eh->plt.offset = (bfd_vma) -1;
edd21aca 1750
30667bf3
AM
1751 /* If this is a weak symbol, and there is a real definition, the
1752 processor independent code will have arranged for us to see the
1753 real definition first, and we can just use the same value. */
60d67dc8 1754 if (eh->is_weakalias)
edd21aca 1755 {
60d67dc8
AM
1756 struct elf_link_hash_entry *def = weakdef (eh);
1757 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1758 eh->root.u.def.section = def->root.u.def.section;
1759 eh->root.u.def.value = def->root.u.def.value;
4fc8051d 1760 if (ELIMINATE_COPY_RELOCS)
60d67dc8 1761 eh->non_got_ref = def->non_got_ref;
b34976b6 1762 return TRUE;
30667bf3 1763 }
edd21aca 1764
30667bf3
AM
1765 /* This is a reference to a symbol defined by a dynamic object which
1766 is not a function. */
1767
1768 /* If we are creating a shared library, we must presume that the
1769 only references to the symbol are via the global offset table.
1770 For such cases we need not do anything here; the relocations will
1771 be handled correctly by relocate_section. */
0e1862bb 1772 if (bfd_link_pic (info))
b34976b6 1773 return TRUE;
30667bf3
AM
1774
1775 /* If there are no references to this symbol that do not use the
1776 GOT, we don't need to generate a copy reloc. */
875c0872 1777 if (!eh->non_got_ref)
529fe20e 1778 return TRUE;
ebe50bae 1779
127e8e9f
AM
1780 /* If -z nocopyreloc was given, we won't generate them either. */
1781 if (info->nocopyreloc)
529fe20e 1782 return TRUE;
4fc8051d 1783
127e8e9f 1784 if (ELIMINATE_COPY_RELOCS
287c7eaf 1785 && !alias_readonly_dynrelocs (eh))
127e8e9f 1786 {
4fc8051d
AM
1787 /* If we didn't find any dynamic relocs in read-only sections, then
1788 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
127e8e9f 1789 return TRUE;
ebe50bae
AM
1790 }
1791
30667bf3
AM
1792 /* We must allocate the symbol in our .dynbss section, which will
1793 become part of the .bss section of the executable. There will be
1794 an entry for this symbol in the .dynsym section. The dynamic
1795 object will contain position independent code, so all references
1796 from the dynamic object to this symbol will go through the global
1797 offset table. The dynamic linker will use the .dynsym entry to
1798 determine the address it must put in the global offset table, so
1799 both the dynamic object and the regular object will refer to the
1800 same memory location for the variable. */
1801
3ac8354b 1802 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1803 if (htab == NULL)
1804 return FALSE;
30667bf3
AM
1805
1806 /* We must generate a COPY reloc to tell the dynamic linker to
1807 copy the initial value out of the dynamic object and into the
3ac8354b 1808 runtime process image. */
5474d94f
AM
1809 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1810 {
1811 sec = htab->etab.sdynrelro;
1812 srel = htab->etab.sreldynrelro;
1813 }
1814 else
1815 {
1816 sec = htab->etab.sdynbss;
1817 srel = htab->etab.srelbss;
1818 }
1d7e9d18 1819 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
30667bf3 1820 {
5474d94f 1821 srel->size += sizeof (Elf32_External_Rela);
875c0872 1822 eh->needs_copy = 1;
edd21aca 1823 }
252b5132 1824
529fe20e 1825 /* We no longer want dyn_relocs. */
287c7eaf 1826 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
6cabe1ea 1827 return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
252b5132
RH
1828}
1829
46434633 1830/* If EH is undefined, make it dynamic if that makes sense. */
595e0a47
AM
1831
1832static bfd_boolean
46434633
AM
1833ensure_undef_dynamic (struct bfd_link_info *info,
1834 struct elf_link_hash_entry *eh)
595e0a47 1835{
46434633
AM
1836 struct elf_link_hash_table *htab = elf_hash_table (info);
1837
1838 if (htab->dynamic_sections_created
1839 && (eh->root.type == bfd_link_hash_undefweak
1840 || eh->root.type == bfd_link_hash_undefined)
1841 && eh->dynindx == -1
595e0a47
AM
1842 && !eh->forced_local
1843 && eh->type != STT_PARISC_MILLI
60c1b909 1844 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
595e0a47
AM
1845 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1846 return bfd_elf_link_record_dynamic_symbol (info, eh);
1847 return TRUE;
1848}
1849
e5ee5df1 1850/* Allocate space in the .plt for entries that won't have relocations.
a252afa4 1851 ie. plabel entries. */
a8d02d66 1852
b34976b6 1853static bfd_boolean
875c0872 1854allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
a8d02d66
AM
1855{
1856 struct bfd_link_info *info;
1857 struct elf32_hppa_link_hash_table *htab;
875c0872
DA
1858 struct elf32_hppa_link_hash_entry *hh;
1859 asection *sec;
a8d02d66 1860
875c0872 1861 if (eh->root.type == bfd_link_hash_indirect)
b34976b6 1862 return TRUE;
a8d02d66 1863
875c0872 1864 info = (struct bfd_link_info *) inf;
9b52905e 1865 hh = hppa_elf_hash_entry (eh);
a8d02d66 1866 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1867 if (htab == NULL)
1868 return FALSE;
1869
a63e02c7 1870 if (htab->etab.dynamic_sections_created
875c0872 1871 && eh->plt.refcount > 0)
e5ee5df1 1872 {
46434633 1873 if (!ensure_undef_dynamic (info, eh))
595e0a47 1874 return FALSE;
e5ee5df1 1875
0e1862bb 1876 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
e5ee5df1 1877 {
067fa4a6
AM
1878 /* Allocate these later. From this point on, h->plabel
1879 means that the plt entry is only used by a plabel.
1880 We'll be using a normal plt entry for this symbol, so
1881 clear the plabel indicator. */
68ffbac6 1882
875c0872 1883 hh->plabel = 0;
e5ee5df1 1884 }
875c0872 1885 else if (hh->plabel)
e5ee5df1
AM
1886 {
1887 /* Make an entry in the .plt section for plabel references
1888 that won't have a .plt entry for other reasons. */
ce558b89 1889 sec = htab->etab.splt;
875c0872
DA
1890 eh->plt.offset = sec->size;
1891 sec->size += PLT_ENTRY_SIZE;
247d6c4c
AM
1892 if (bfd_link_pic (info))
1893 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
a8d02d66
AM
1894 }
1895 else
e5ee5df1
AM
1896 {
1897 /* No .plt entry needed. */
875c0872
DA
1898 eh->plt.offset = (bfd_vma) -1;
1899 eh->needs_plt = 0;
e5ee5df1
AM
1900 }
1901 }
1902 else
1903 {
875c0872
DA
1904 eh->plt.offset = (bfd_vma) -1;
1905 eh->needs_plt = 0;
a8d02d66
AM
1906 }
1907
b34976b6 1908 return TRUE;
a8d02d66
AM
1909}
1910
2e684e75
AM
1911/* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1912
1913static inline unsigned int
1914got_entries_needed (int tls_type)
1915{
1916 unsigned int need = 0;
1917
1918 if ((tls_type & GOT_NORMAL) != 0)
1919 need += GOT_ENTRY_SIZE;
1920 if ((tls_type & GOT_TLS_GD) != 0)
1921 need += GOT_ENTRY_SIZE * 2;
1922 if ((tls_type & GOT_TLS_IE) != 0)
1923 need += GOT_ENTRY_SIZE;
1924 return need;
1925}
1926
1927/* Calculate size of relocs needed for symbol given its TLS_TYPE and
1928 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated
1929 at link time. */
1930
1931static inline unsigned int
1932got_relocs_needed (int tls_type, unsigned int need, bfd_boolean known)
1933{
1934 /* All the entries we allocated need relocs.
1935 Except IE in executable with a local symbol. We could also omit
1936 the DTPOFF reloc on the second word of a GD entry under the same
1937 condition as that for IE, but ld.so might want to differentiate
1938 LD and GD entries at some stage. */
1939 if ((tls_type & GOT_TLS_IE) != 0 && known)
1940 need -= GOT_ENTRY_SIZE;
1941 return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1942}
1943
4dc86686
AM
1944/* Allocate space in .plt, .got and associated reloc sections for
1945 global syms. */
1946
b34976b6 1947static bfd_boolean
875c0872 1948allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
4dc86686
AM
1949{
1950 struct bfd_link_info *info;
83c81bfe 1951 struct elf32_hppa_link_hash_table *htab;
875c0872
DA
1952 asection *sec;
1953 struct elf32_hppa_link_hash_entry *hh;
1954 struct elf32_hppa_dyn_reloc_entry *hdh_p;
4dc86686 1955
875c0872 1956 if (eh->root.type == bfd_link_hash_indirect)
b34976b6 1957 return TRUE;
73a74a62 1958
c39a58e6 1959 info = inf;
83c81bfe 1960 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1961 if (htab == NULL)
1962 return FALSE;
1963
875c0872 1964 hh = hppa_elf_hash_entry (eh);
68ffbac6 1965
a63e02c7 1966 if (htab->etab.dynamic_sections_created
875c0872
DA
1967 && eh->plt.offset != (bfd_vma) -1
1968 && !hh->plabel
1969 && eh->plt.refcount > 0)
4dc86686 1970 {
e5ee5df1 1971 /* Make an entry in the .plt section. */
ce558b89 1972 sec = htab->etab.splt;
875c0872
DA
1973 eh->plt.offset = sec->size;
1974 sec->size += PLT_ENTRY_SIZE;
3ac8354b 1975
e5ee5df1 1976 /* We also need to make an entry in the .rela.plt section. */
ce558b89 1977 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
e5ee5df1 1978 htab->need_plt_stub = 1;
4dc86686 1979 }
edd21aca 1980
875c0872 1981 if (eh->got.refcount > 0)
4dc86686 1982 {
2e684e75
AM
1983 unsigned int need;
1984
46434633 1985 if (!ensure_undef_dynamic (info, eh))
595e0a47 1986 return FALSE;
446f2863 1987
ce558b89 1988 sec = htab->etab.sgot;
875c0872 1989 eh->got.offset = sec->size;
2e684e75
AM
1990 need = got_entries_needed (hh->tls_type);
1991 sec->size += need;
a63e02c7 1992 if (htab->etab.dynamic_sections_created
0e1862bb 1993 && (bfd_link_pic (info)
875c0872 1994 || (eh->dynindx != -1
d336fa6d
AM
1995 && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1996 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
ce757d15 1997 {
2e684e75
AM
1998 bfd_boolean tprel_known = (bfd_link_executable (info)
1999 && SYMBOL_REFERENCES_LOCAL (info, eh));
2000 htab->etab.srelgot->size
2001 += got_relocs_needed (hh->tls_type, need, tprel_known);
ce757d15 2002 }
4dc86686
AM
2003 }
2004 else
875c0872 2005 eh->got.offset = (bfd_vma) -1;
30667bf3 2006
d336fa6d
AM
2007 /* If no dynamic sections we can't have dynamic relocs. */
2008 if (!htab->etab.dynamic_sections_created)
2009 hh->dyn_relocs = NULL;
2010
529fe20e
AM
2011 /* Discard relocs on undefined syms with non-default visibility. */
2012 else if ((eh->root.type == bfd_link_hash_undefined
2013 && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
2014 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
2015 hh->dyn_relocs = NULL;
2016
875c0872 2017 if (hh->dyn_relocs == NULL)
287c7eaf 2018 return TRUE;
30667bf3 2019
98ceb8ce
AM
2020 /* If this is a -Bsymbolic shared link, then we need to discard all
2021 space allocated for dynamic pc-relative relocs against symbols
2022 defined in a regular object. For the normal shared case, discard
2023 space for relocs that have become local due to symbol visibility
2024 changes. */
0e1862bb 2025 if (bfd_link_pic (info))
446f2863 2026 {
98ceb8ce 2027#if RELATIVE_DYNRELOCS
529fe20e 2028 if (SYMBOL_CALLS_LOCAL (info, eh))
446f2863 2029 {
875c0872 2030 struct elf32_hppa_dyn_reloc_entry **hdh_pp;
30667bf3 2031
875c0872 2032 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
98ceb8ce 2033 {
875c0872
DA
2034 hdh_p->count -= hdh_p->relative_count;
2035 hdh_p->relative_count = 0;
2036 if (hdh_p->count == 0)
a63e02c7 2037 *hdh_pp = hdh_p->hdh_next;
98ceb8ce 2038 else
a63e02c7 2039 hdh_pp = &hdh_p->hdh_next;
98ceb8ce
AM
2040 }
2041 }
2042#endif
4fc8051d 2043
46434633 2044 if (hh->dyn_relocs != NULL)
22d606e9 2045 {
46434633 2046 if (!ensure_undef_dynamic (info, eh))
595e0a47 2047 return FALSE;
22d606e9 2048 }
446f2863 2049 }
d336fa6d 2050 else if (ELIMINATE_COPY_RELOCS)
30667bf3 2051 {
98ceb8ce
AM
2052 /* For the non-shared case, discard space for relocs against
2053 symbols which turn out to need copy relocs or are not
2054 dynamic. */
68ffbac6 2055
529fe20e 2056 if (eh->dynamic_adjusted
529fe20e
AM
2057 && !eh->def_regular
2058 && !ELF_COMMON_DEF_P (eh))
98ceb8ce 2059 {
46434633 2060 if (!ensure_undef_dynamic (info, eh))
595e0a47 2061 return FALSE;
98ceb8ce 2062
46434633 2063 if (eh->dynindx == -1)
287c7eaf 2064 hh->dyn_relocs = NULL;
98ceb8ce 2065 }
46434633 2066 else
287c7eaf 2067 hh->dyn_relocs = NULL;
30667bf3 2068 }
30667bf3 2069
98ceb8ce 2070 /* Finally, allocate space. */
a63e02c7 2071 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
30667bf3 2072 {
875c0872
DA
2073 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2074 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
30667bf3 2075 }
30667bf3 2076
b34976b6 2077 return TRUE;
30667bf3 2078}
30667bf3 2079
d5c73c2f
AM
2080/* This function is called via elf_link_hash_traverse to force
2081 millicode symbols local so they do not end up as globals in the
2082 dynamic symbol table. We ought to be able to do this in
2083 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2084 for all dynamic symbols. Arguably, this is a bug in
2085 elf_adjust_dynamic_symbol. */
2086
b34976b6 2087static bfd_boolean
875c0872 2088clobber_millicode_symbols (struct elf_link_hash_entry *eh,
c39a58e6 2089 struct bfd_link_info *info)
d5c73c2f 2090{
875c0872
DA
2091 if (eh->type == STT_PARISC_MILLI
2092 && !eh->forced_local)
e0522e89 2093 {
875c0872 2094 elf32_hppa_hide_symbol (info, eh, TRUE);
e0522e89 2095 }
b34976b6 2096 return TRUE;
d5c73c2f
AM
2097}
2098
127e8e9f
AM
2099/* Set DF_TEXTREL if we find any dynamic relocs that apply to
2100 read-only sections. */
98ceb8ce 2101
b34976b6 2102static bfd_boolean
127e8e9f 2103maybe_set_textrel (struct elf_link_hash_entry *eh, void *inf)
98ceb8ce 2104{
127e8e9f 2105 asection *sec;
98ceb8ce 2106
127e8e9f
AM
2107 if (eh->root.type == bfd_link_hash_indirect)
2108 return TRUE;
98ceb8ce 2109
127e8e9f
AM
2110 sec = readonly_dynrelocs (eh);
2111 if (sec != NULL)
2112 {
2113 struct bfd_link_info *info = (struct bfd_link_info *) inf;
98ceb8ce 2114
127e8e9f
AM
2115 info->flags |= DF_TEXTREL;
2116 info->callbacks->minfo
2117 (_("%B: dynamic relocation in read-only section `%A'\n"),
2118 sec->owner, sec);
98ceb8ce 2119
127e8e9f
AM
2120 /* Not an error, just cut short the traversal. */
2121 return FALSE;
98ceb8ce 2122 }
b34976b6 2123 return TRUE;
98ceb8ce
AM
2124}
2125
30667bf3
AM
2126/* Set the sizes of the dynamic sections. */
2127
b34976b6 2128static bfd_boolean
c39a58e6
AM
2129elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2130 struct bfd_link_info *info)
30667bf3 2131{
83c81bfe 2132 struct elf32_hppa_link_hash_table *htab;
30667bf3 2133 bfd *dynobj;
98ceb8ce 2134 bfd *ibfd;
875c0872 2135 asection *sec;
b34976b6 2136 bfd_boolean relocs;
30667bf3 2137
83c81bfe 2138 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
2139 if (htab == NULL)
2140 return FALSE;
2141
a63e02c7 2142 dynobj = htab->etab.dynobj;
49e9d0d3
AM
2143 if (dynobj == NULL)
2144 abort ();
30667bf3 2145
a63e02c7 2146 if (htab->etab.dynamic_sections_created)
30667bf3
AM
2147 {
2148 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2149 if (bfd_link_executable (info) && !info->nointerp)
30667bf3 2150 {
3d4d4302 2151 sec = bfd_get_linker_section (dynobj, ".interp");
875c0872 2152 if (sec == NULL)
49e9d0d3 2153 abort ();
875c0872
DA
2154 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2155 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
30667bf3 2156 }
74d1c347 2157
d5c73c2f 2158 /* Force millicode symbols local. */
a63e02c7 2159 elf_link_hash_traverse (&htab->etab,
d5c73c2f
AM
2160 clobber_millicode_symbols,
2161 info);
68fb2e56 2162 }
d5c73c2f 2163
98ceb8ce
AM
2164 /* Set up .got and .plt offsets for local syms, and space for local
2165 dynamic relocs. */
c72f2fb2 2166 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
68fb2e56
AM
2167 {
2168 bfd_signed_vma *local_got;
2169 bfd_signed_vma *end_local_got;
2170 bfd_signed_vma *local_plt;
2171 bfd_signed_vma *end_local_plt;
2172 bfd_size_type locsymcount;
2173 Elf_Internal_Shdr *symtab_hdr;
2174 asection *srel;
9b52905e 2175 char *local_tls_type;
74d1c347 2176
98ceb8ce 2177 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2178 continue;
4dc86686 2179
875c0872 2180 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
98ceb8ce 2181 {
875c0872 2182 struct elf32_hppa_dyn_reloc_entry *hdh_p;
98ceb8ce 2183
875c0872
DA
2184 for (hdh_p = ((struct elf32_hppa_dyn_reloc_entry *)
2185 elf_section_data (sec)->local_dynrel);
2186 hdh_p != NULL;
a63e02c7 2187 hdh_p = hdh_p->hdh_next)
98ceb8ce 2188 {
875c0872
DA
2189 if (!bfd_is_abs_section (hdh_p->sec)
2190 && bfd_is_abs_section (hdh_p->sec->output_section))
ec338859
AM
2191 {
2192 /* Input section has been discarded, either because
2193 it is a copy of a linkonce section or due to
2194 linker script /DISCARD/, so we'll be discarding
2195 the relocs too. */
2196 }
875c0872 2197 else if (hdh_p->count != 0)
ec338859 2198 {
875c0872
DA
2199 srel = elf_section_data (hdh_p->sec)->sreloc;
2200 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2201 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
248866a8 2202 info->flags |= DF_TEXTREL;
ec338859 2203 }
98ceb8ce
AM
2204 }
2205 }
2206
2207 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2208 if (!local_got)
2209 continue;
74d1c347 2210
98ceb8ce 2211 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2212 locsymcount = symtab_hdr->sh_info;
2213 end_local_got = local_got + locsymcount;
9b52905e 2214 local_tls_type = hppa_elf_local_got_tls_type (ibfd);
ce558b89
AM
2215 sec = htab->etab.sgot;
2216 srel = htab->etab.srelgot;
68fb2e56
AM
2217 for (; local_got < end_local_got; ++local_got)
2218 {
2219 if (*local_got > 0)
4dc86686 2220 {
2e684e75
AM
2221 unsigned int need;
2222
875c0872 2223 *local_got = sec->size;
2e684e75
AM
2224 need = got_entries_needed (*local_tls_type);
2225 sec->size += need;
0e1862bb 2226 if (bfd_link_pic (info))
2e684e75
AM
2227 {
2228 bfd_boolean tprel_known = bfd_link_executable (info);
2229 htab->etab.srelgot->size
2230 += got_relocs_needed (*local_tls_type, need, tprel_known);
2231 }
4dc86686 2232 }
68fb2e56
AM
2233 else
2234 *local_got = (bfd_vma) -1;
9b52905e
NC
2235
2236 ++local_tls_type;
68fb2e56 2237 }
74d1c347 2238
68fb2e56
AM
2239 local_plt = end_local_got;
2240 end_local_plt = local_plt + locsymcount;
a63e02c7 2241 if (! htab->etab.dynamic_sections_created)
68fb2e56
AM
2242 {
2243 /* Won't be used, but be safe. */
2244 for (; local_plt < end_local_plt; ++local_plt)
2245 *local_plt = (bfd_vma) -1;
2246 }
2247 else
2248 {
ce558b89
AM
2249 sec = htab->etab.splt;
2250 srel = htab->etab.srelplt;
74d1c347
AM
2251 for (; local_plt < end_local_plt; ++local_plt)
2252 {
2253 if (*local_plt > 0)
2254 {
875c0872
DA
2255 *local_plt = sec->size;
2256 sec->size += PLT_ENTRY_SIZE;
0e1862bb 2257 if (bfd_link_pic (info))
eea6121a 2258 srel->size += sizeof (Elf32_External_Rela);
74d1c347
AM
2259 }
2260 else
2261 *local_plt = (bfd_vma) -1;
2262 }
2263 }
30667bf3 2264 }
68ffbac6 2265
9b52905e
NC
2266 if (htab->tls_ldm_got.refcount > 0)
2267 {
68ffbac6 2268 /* Allocate 2 got entries and 1 dynamic reloc for
9b52905e 2269 R_PARISC_TLS_DTPMOD32 relocs. */
ce558b89
AM
2270 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2271 htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2272 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
9b52905e
NC
2273 }
2274 else
2275 htab->tls_ldm_got.offset = -1;
30667bf3 2276
e5ee5df1
AM
2277 /* Do all the .plt entries without relocs first. The dynamic linker
2278 uses the last .plt reloc to find the end of the .plt (and hence
2279 the start of the .got) for lazy linking. */
a63e02c7 2280 elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
a8d02d66 2281
98ceb8ce
AM
2282 /* Allocate global sym .plt and .got entries, and space for global
2283 sym dynamic relocs. */
a63e02c7 2284 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
30667bf3
AM
2285
2286 /* The check_relocs and adjust_dynamic_symbol entry points have
2287 determined the sizes of the various dynamic sections. Allocate
2288 memory for them. */
b34976b6 2289 relocs = FALSE;
875c0872 2290 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
30667bf3 2291 {
875c0872 2292 if ((sec->flags & SEC_LINKER_CREATED) == 0)
30667bf3
AM
2293 continue;
2294
ce558b89 2295 if (sec == htab->etab.splt)
68fb2e56 2296 {
83c81bfe 2297 if (htab->need_plt_stub)
68fb2e56
AM
2298 {
2299 /* Make space for the plt stub at the end of the .plt
2300 section. We want this stub right at the end, up
2301 against the .got section. */
ce558b89 2302 int gotalign = bfd_section_alignment (dynobj, htab->etab.sgot);
875c0872 2303 int pltalign = bfd_section_alignment (dynobj, sec);
68fb2e56 2304 bfd_size_type mask;
30667bf3 2305
68fb2e56 2306 if (gotalign > pltalign)
a253d456 2307 (void) bfd_set_section_alignment (dynobj, sec, gotalign);
68fb2e56 2308 mask = ((bfd_size_type) 1 << gotalign) - 1;
875c0872 2309 sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
68fb2e56
AM
2310 }
2311 }
ce558b89 2312 else if (sec == htab->etab.sgot
5474d94f
AM
2313 || sec == htab->etab.sdynbss
2314 || sec == htab->etab.sdynrelro)
68fb2e56 2315 ;
0112cd26 2316 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, sec), ".rela"))
30667bf3 2317 {
875c0872 2318 if (sec->size != 0)
30667bf3 2319 {
4e12ff7f
AM
2320 /* Remember whether there are any reloc sections other
2321 than .rela.plt. */
ce558b89 2322 if (sec != htab->etab.srelplt)
b34976b6 2323 relocs = TRUE;
47d89dba 2324
30667bf3
AM
2325 /* We use the reloc_count field as a counter if we need
2326 to copy relocs into the output file. */
875c0872 2327 sec->reloc_count = 0;
30667bf3
AM
2328 }
2329 }
30667bf3
AM
2330 else
2331 {
2332 /* It's not one of our sections, so don't allocate space. */
2333 continue;
2334 }
2335
875c0872 2336 if (sec->size == 0)
30667bf3
AM
2337 {
2338 /* If we don't need this section, strip it from the
2339 output file. This is mostly to handle .rela.bss and
2340 .rela.plt. We must create both sections in
2341 create_dynamic_sections, because they must be created
2342 before the linker maps input sections to output
2343 sections. The linker does that before
2344 adjust_dynamic_symbol is called, and it is that
2345 function which decides whether anything needs to go
2346 into these sections. */
875c0872 2347 sec->flags |= SEC_EXCLUDE;
30667bf3
AM
2348 continue;
2349 }
2350
c456f082
AM
2351 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2352 continue;
2353
30667bf3
AM
2354 /* Allocate memory for the section contents. Zero it, because
2355 we may not fill in all the reloc sections. */
875c0872 2356 sec->contents = bfd_zalloc (dynobj, sec->size);
c456f082 2357 if (sec->contents == NULL)
b34976b6 2358 return FALSE;
30667bf3
AM
2359 }
2360
a63e02c7 2361 if (htab->etab.dynamic_sections_created)
30667bf3
AM
2362 {
2363 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2364 actually has nothing to do with the PLT, it is how we
2365 communicate the LTP value of a load module to the dynamic
2366 linker. */
dc810e39 2367#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2368 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
2369
2370 if (!add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 2371 return FALSE;
30667bf3
AM
2372
2373 /* Add some entries to the .dynamic section. We fill in the
2374 values later, in elf32_hppa_finish_dynamic_sections, but we
2375 must add the entries now so that we get the correct size for
2376 the .dynamic section. The DT_DEBUG entry is filled in by the
2377 dynamic linker and used by the debugger. */
0e1862bb 2378 if (bfd_link_executable (info))
30667bf3 2379 {
dc810e39 2380 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2381 return FALSE;
30667bf3
AM
2382 }
2383
ce558b89 2384 if (htab->etab.srelplt->size != 0)
30667bf3 2385 {
dc810e39
AM
2386 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2387 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2388 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2389 return FALSE;
30667bf3
AM
2390 }
2391
2392 if (relocs)
2393 {
dc810e39
AM
2394 if (!add_dynamic_entry (DT_RELA, 0)
2395 || !add_dynamic_entry (DT_RELASZ, 0)
2396 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2397 return FALSE;
30667bf3 2398
98ceb8ce
AM
2399 /* If any dynamic relocs apply to a read-only section,
2400 then we need a DT_TEXTREL entry. */
248866a8 2401 if ((info->flags & DF_TEXTREL) == 0)
127e8e9f 2402 elf_link_hash_traverse (&htab->etab, maybe_set_textrel, info);
98ceb8ce
AM
2403
2404 if ((info->flags & DF_TEXTREL) != 0)
2405 {
2406 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2407 return FALSE;
98ceb8ce 2408 }
30667bf3
AM
2409 }
2410 }
dc810e39 2411#undef add_dynamic_entry
30667bf3 2412
b34976b6 2413 return TRUE;
30667bf3
AM
2414}
2415
30667bf3
AM
2416/* External entry points for sizing and building linker stubs. */
2417
b4655ea9
AM
2418/* Set up various things so that we can make a list of input sections
2419 for each output section included in the link. Returns -1 on error,
cedb70c5 2420 0 when no stubs will be needed, and 1 on success. */
30667bf3 2421
b4655ea9 2422int
c39a58e6 2423elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
30667bf3
AM
2424{
2425 bfd *input_bfd;
b4655ea9 2426 unsigned int bfd_count;
7292b3ac 2427 unsigned int top_id, top_index;
30667bf3 2428 asection *section;
25f72752 2429 asection **input_list, **list;
dc810e39 2430 bfd_size_type amt;
b4655ea9 2431 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2432
4dfe6ac6
NC
2433 if (htab == NULL)
2434 return -1;
2435
1badb539
AM
2436 /* Count the number of input BFDs and find the top input section id. */
2437 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3 2438 input_bfd != NULL;
c72f2fb2 2439 input_bfd = input_bfd->link.next)
30667bf3
AM
2440 {
2441 bfd_count += 1;
25f72752
AM
2442 for (section = input_bfd->sections;
2443 section != NULL;
2444 section = section->next)
2445 {
2446 if (top_id < section->id)
2447 top_id = section->id;
2448 }
30667bf3 2449 }
b4655ea9 2450 htab->bfd_count = bfd_count;
30667bf3 2451
dc810e39 2452 amt = sizeof (struct map_stub) * (top_id + 1);
c39a58e6 2453 htab->stub_group = bfd_zmalloc (amt);
83c81bfe 2454 if (htab->stub_group == NULL)
b4655ea9 2455 return -1;
1badb539 2456
b4655ea9 2457 /* We can't use output_bfd->section_count here to find the top output
1badb539 2458 section index as some sections may have been removed, and
8423293d 2459 strip_excluded_output_sections doesn't renumber the indices. */
1badb539
AM
2460 for (section = output_bfd->sections, top_index = 0;
2461 section != NULL;
2462 section = section->next)
2463 {
2464 if (top_index < section->index)
2465 top_index = section->index;
2466 }
2467
b4655ea9 2468 htab->top_index = top_index;
dc810e39 2469 amt = sizeof (asection *) * (top_index + 1);
c39a58e6 2470 input_list = bfd_malloc (amt);
b4655ea9 2471 htab->input_list = input_list;
25f72752 2472 if (input_list == NULL)
b4655ea9 2473 return -1;
25f72752 2474
1badb539
AM
2475 /* For sections we aren't interested in, mark their entries with a
2476 value we can check later. */
2477 list = input_list + top_index;
2478 do
2479 *list = bfd_abs_section_ptr;
2480 while (list-- != input_list);
2481
2482 for (section = output_bfd->sections;
2483 section != NULL;
2484 section = section->next)
2485 {
47d89dba 2486 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2487 input_list[section->index] = NULL;
2488 }
2489
b4655ea9
AM
2490 return 1;
2491}
2492
2493/* The linker repeatedly calls this function for each input section,
2494 in the order that input sections are linked into output sections.
2495 Build lists of input sections to determine groupings between which
2496 we may insert linker stubs. */
2497
2498void
c39a58e6 2499elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
b4655ea9
AM
2500{
2501 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2502
4dfe6ac6
NC
2503 if (htab == NULL)
2504 return;
2505
b4655ea9 2506 if (isec->output_section->index <= htab->top_index)
25f72752 2507 {
b4655ea9
AM
2508 asection **list = htab->input_list + isec->output_section->index;
2509 if (*list != bfd_abs_section_ptr)
25f72752 2510 {
b4655ea9 2511 /* Steal the link_sec pointer for our list. */
83c81bfe 2512#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2513 /* This happens to make the list in reverse order,
2514 which is what we want. */
2515 PREV_SEC (isec) = *list;
2516 *list = isec;
25f72752
AM
2517 }
2518 }
b4655ea9 2519}
25f72752 2520
b4655ea9
AM
2521/* See whether we can group stub sections together. Grouping stub
2522 sections may result in fewer stubs. More importantly, we need to
2523 put all .init* and .fini* stubs at the beginning of the .init or
2524 .fini output sections respectively, because glibc splits the
2525 _init and _fini functions into multiple parts. Putting a stub in
2526 the middle of a function is not a good idea. */
2527
2528static void
c39a58e6
AM
2529group_sections (struct elf32_hppa_link_hash_table *htab,
2530 bfd_size_type stub_group_size,
2531 bfd_boolean stubs_always_before_branch)
b4655ea9
AM
2532{
2533 asection **list = htab->input_list + htab->top_index;
1badb539 2534 do
25f72752
AM
2535 {
2536 asection *tail = *list;
1badb539
AM
2537 if (tail == bfd_abs_section_ptr)
2538 continue;
25f72752
AM
2539 while (tail != NULL)
2540 {
2541 asection *curr;
2542 asection *prev;
2543 bfd_size_type total;
00b28bb0 2544 bfd_boolean big_sec;
25f72752
AM
2545
2546 curr = tail;
eea6121a 2547 total = tail->size;
00b28bb0
AM
2548 big_sec = total >= stub_group_size;
2549
25f72752
AM
2550 while ((prev = PREV_SEC (curr)) != NULL
2551 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2552 < stub_group_size))
25f72752
AM
2553 curr = prev;
2554
2555 /* OK, the size from the start of CURR to the end is less
a248e267 2556 than 240000 bytes and thus can be handled by one stub
25f72752 2557 section. (or the tail section is itself larger than
a248e267 2558 240000 bytes, in which case we may be toast.)
25f72752
AM
2559 We should really be keeping track of the total size of
2560 stubs added here, as stubs contribute to the final output
2561 section size. That's a little tricky, and this way will
a248e267
AM
2562 only break if stubs added total more than 22144 bytes, or
2563 2768 long branch stubs. It seems unlikely for more than
2564 2768 different functions to be called, especially from
2565 code only 240000 bytes long. This limit used to be
2566 250000, but c++ code tends to generate lots of little
2567 functions, and sometimes violated the assumption. */
25f72752
AM
2568 do
2569 {
2570 prev = PREV_SEC (tail);
2571 /* Set up this stub group. */
83c81bfe 2572 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2573 }
2574 while (tail != curr && (tail = prev) != NULL);
2575
a248e267 2576 /* But wait, there's more! Input sections up to 240000
00b28bb0
AM
2577 bytes before the stub section can be handled by it too.
2578 Don't do this if we have a really large section after the
2579 stubs, as adding more stubs increases the chance that
2580 branches may not reach into the stub section. */
2581 if (!stubs_always_before_branch && !big_sec)
25f72752 2582 {
47d89dba
AM
2583 total = 0;
2584 while (prev != NULL
2585 && ((total += tail->output_offset - prev->output_offset)
2586 < stub_group_size))
2587 {
2588 tail = prev;
2589 prev = PREV_SEC (tail);
83c81bfe 2590 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2591 }
25f72752
AM
2592 }
2593 tail = prev;
2594 }
2595 }
b4655ea9
AM
2596 while (list-- != htab->input_list);
2597 free (htab->input_list);
1badb539 2598#undef PREV_SEC
b4655ea9
AM
2599}
2600
2601/* Read in all local syms for all input bfds, and create hash entries
2602 for export stubs if we are building a multi-subspace shared lib.
2603 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2604
2605static int
c39a58e6 2606get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
b4655ea9
AM
2607{
2608 unsigned int bfd_indx;
2609 Elf_Internal_Sym *local_syms, **all_local_syms;
2610 int stub_changed = 0;
2611 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2612
4dfe6ac6
NC
2613 if (htab == NULL)
2614 return -1;
2615
30667bf3
AM
2616 /* We want to read in symbol extension records only once. To do this
2617 we need to read in the local symbols in parallel and save them for
2618 later use; so hold pointers to the local symbols in an array. */
b4655ea9 2619 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
c39a58e6 2620 all_local_syms = bfd_zmalloc (amt);
b4655ea9 2621 htab->all_local_syms = all_local_syms;
30667bf3 2622 if (all_local_syms == NULL)
b4655ea9 2623 return -1;
30667bf3
AM
2624
2625 /* Walk over all the input BFDs, swapping in local symbols.
2626 If we are creating a shared library, create hash entries for the
2627 export stubs. */
b4655ea9 2628 for (bfd_indx = 0;
30667bf3 2629 input_bfd != NULL;
c72f2fb2 2630 input_bfd = input_bfd->link.next, bfd_indx++)
30667bf3
AM
2631 {
2632 Elf_Internal_Shdr *symtab_hdr;
edd21aca 2633
252b5132
RH
2634 /* We'll need the symbol table in a second. */
2635 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2636 if (symtab_hdr->sh_info == 0)
2637 continue;
2638
6cdc0ccc
AM
2639 /* We need an array of the local symbols attached to the input bfd. */
2640 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
edd21aca 2641 if (local_syms == NULL)
edd21aca 2642 {
6cdc0ccc
AM
2643 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2644 symtab_hdr->sh_info, 0,
2645 NULL, NULL, NULL);
2646 /* Cache them for elf_link_input_bfd. */
2647 symtab_hdr->contents = (unsigned char *) local_syms;
edd21aca 2648 }
6cdc0ccc
AM
2649 if (local_syms == NULL)
2650 return -1;
edd21aca 2651
6cdc0ccc 2652 all_local_syms[bfd_indx] = local_syms;
edd21aca 2653
0e1862bb 2654 if (bfd_link_pic (info) && htab->multi_subspace)
30667bf3 2655 {
875c0872
DA
2656 struct elf_link_hash_entry **eh_syms;
2657 struct elf_link_hash_entry **eh_symend;
30667bf3
AM
2658 unsigned int symcount;
2659
2660 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2661 - symtab_hdr->sh_info);
875c0872
DA
2662 eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2663 eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
30667bf3
AM
2664
2665 /* Look through the global syms for functions; We need to
2666 build export stubs for all globally visible functions. */
875c0872 2667 for (; eh_syms < eh_symend; eh_syms++)
30667bf3 2668 {
875c0872 2669 struct elf32_hppa_link_hash_entry *hh;
30667bf3 2670
875c0872 2671 hh = hppa_elf_hash_entry (*eh_syms);
30667bf3 2672
a63e02c7
DA
2673 while (hh->eh.root.type == bfd_link_hash_indirect
2674 || hh->eh.root.type == bfd_link_hash_warning)
2675 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
30667bf3
AM
2676
2677 /* At this point in the link, undefined syms have been
2678 resolved, so we need to check that the symbol was
2679 defined in this BFD. */
a63e02c7
DA
2680 if ((hh->eh.root.type == bfd_link_hash_defined
2681 || hh->eh.root.type == bfd_link_hash_defweak)
2682 && hh->eh.type == STT_FUNC
2683 && hh->eh.root.u.def.section->output_section != NULL
2684 && (hh->eh.root.u.def.section->output_section->owner
25f72752 2685 == output_bfd)
a63e02c7
DA
2686 && hh->eh.root.u.def.section->owner == input_bfd
2687 && hh->eh.def_regular
2688 && !hh->eh.forced_local
2689 && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
30667bf3
AM
2690 {
2691 asection *sec;
2692 const char *stub_name;
875c0872 2693 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3 2694
a63e02c7 2695 sec = hh->eh.root.u.def.section;
9b52905e 2696 stub_name = hh_name (hh);
a63e02c7 2697 hsh = hppa_stub_hash_lookup (&htab->bstab,
30667bf3 2698 stub_name,
b34976b6 2699 FALSE, FALSE);
875c0872 2700 if (hsh == NULL)
30667bf3 2701 {
875c0872
DA
2702 hsh = hppa_add_stub (stub_name, sec, htab);
2703 if (!hsh)
b4655ea9 2704 return -1;
30667bf3 2705
a63e02c7
DA
2706 hsh->target_value = hh->eh.root.u.def.value;
2707 hsh->target_section = hh->eh.root.u.def.section;
875c0872 2708 hsh->stub_type = hppa_stub_export;
a63e02c7 2709 hsh->hh = hh;
30667bf3
AM
2710 stub_changed = 1;
2711 }
2712 else
2713 {
695344c0 2714 /* xgettext:c-format */
4eca0228
AM
2715 _bfd_error_handler (_("%B: duplicate export stub %s"),
2716 input_bfd, stub_name);
30667bf3
AM
2717 }
2718 }
2719 }
30667bf3
AM
2720 }
2721 }
edd21aca 2722
b4655ea9
AM
2723 return stub_changed;
2724}
2725
2726/* Determine and set the size of the stub section for a final link.
2727
2728 The basic idea here is to examine all the relocations looking for
2729 PC-relative calls to a target that is unreachable with a "bl"
2730 instruction. */
2731
b34976b6 2732bfd_boolean
c39a58e6
AM
2733elf32_hppa_size_stubs
2734 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2735 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2736 asection * (*add_stub_section) (const char *, asection *),
2737 void (*layout_sections_again) (void))
b4655ea9
AM
2738{
2739 bfd_size_type stub_group_size;
b34976b6
AM
2740 bfd_boolean stubs_always_before_branch;
2741 bfd_boolean stub_changed;
b4655ea9
AM
2742 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2743
4dfe6ac6
NC
2744 if (htab == NULL)
2745 return FALSE;
2746
b4655ea9
AM
2747 /* Stash our params away. */
2748 htab->stub_bfd = stub_bfd;
2749 htab->multi_subspace = multi_subspace;
2750 htab->add_stub_section = add_stub_section;
2751 htab->layout_sections_again = layout_sections_again;
2752 stubs_always_before_branch = group_size < 0;
2753 if (group_size < 0)
2754 stub_group_size = -group_size;
2755 else
2756 stub_group_size = group_size;
2757 if (stub_group_size == 1)
2758 {
2759 /* Default values. */
acc990f2
AM
2760 if (stubs_always_before_branch)
2761 {
2762 stub_group_size = 7680000;
2763 if (htab->has_17bit_branch || htab->multi_subspace)
2764 stub_group_size = 240000;
2765 if (htab->has_12bit_branch)
2766 stub_group_size = 7500;
2767 }
2768 else
2769 {
2770 stub_group_size = 6971392;
2771 if (htab->has_17bit_branch || htab->multi_subspace)
2772 stub_group_size = 217856;
2773 if (htab->has_12bit_branch)
2774 stub_group_size = 6808;
2775 }
b4655ea9
AM
2776 }
2777
2778 group_sections (htab, stub_group_size, stubs_always_before_branch);
2779
2780 switch (get_local_syms (output_bfd, info->input_bfds, info))
2781 {
2782 default:
2783 if (htab->all_local_syms)
2784 goto error_ret_free_local;
b34976b6 2785 return FALSE;
b4655ea9
AM
2786
2787 case 0:
b34976b6 2788 stub_changed = FALSE;
b4655ea9
AM
2789 break;
2790
2791 case 1:
b34976b6 2792 stub_changed = TRUE;
b4655ea9
AM
2793 break;
2794 }
2795
edd21aca
AM
2796 while (1)
2797 {
b4655ea9
AM
2798 bfd *input_bfd;
2799 unsigned int bfd_indx;
30667bf3
AM
2800 asection *stub_sec;
2801
25f72752 2802 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2803 input_bfd != NULL;
c72f2fb2 2804 input_bfd = input_bfd->link.next, bfd_indx++)
30667bf3
AM
2805 {
2806 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2807 asection *section;
2808 Elf_Internal_Sym *local_syms;
30667bf3
AM
2809
2810 /* We'll need the symbol table in a second. */
2811 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2812 if (symtab_hdr->sh_info == 0)
2813 continue;
2814
b4655ea9 2815 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2816
2817 /* Walk over each section attached to the input bfd. */
2818 for (section = input_bfd->sections;
2819 section != NULL;
25f72752 2820 section = section->next)
30667bf3 2821 {
30667bf3
AM
2822 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2823
2824 /* If there aren't any relocs, then there's nothing more
2825 to do. */
2826 if ((section->flags & SEC_RELOC) == 0
2827 || section->reloc_count == 0)
2828 continue;
2829
25f72752
AM
2830 /* If this section is a link-once section that will be
2831 discarded, then don't create any stubs. */
2832 if (section->output_section == NULL
2833 || section->output_section->owner != output_bfd)
2834 continue;
2835
1e2f5b6e
AM
2836 /* Get the relocs. */
2837 internal_relocs
c39a58e6 2838 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 2839 info->keep_memory);
30667bf3 2840 if (internal_relocs == NULL)
1e2f5b6e 2841 goto error_ret_free_local;
30667bf3
AM
2842
2843 /* Now examine each relocation. */
2844 irela = internal_relocs;
2845 irelaend = irela + section->reloc_count;
2846 for (; irela < irelaend; irela++)
2847 {
2848 unsigned int r_type, r_indx;
2849 enum elf32_hppa_stub_type stub_type;
875c0872 2850 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3
AM
2851 asection *sym_sec;
2852 bfd_vma sym_value;
2853 bfd_vma destination;
875c0872 2854 struct elf32_hppa_link_hash_entry *hh;
30667bf3 2855 char *stub_name;
25f72752 2856 const asection *id_sec;
30667bf3
AM
2857
2858 r_type = ELF32_R_TYPE (irela->r_info);
2859 r_indx = ELF32_R_SYM (irela->r_info);
2860
2861 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2862 {
2863 bfd_set_error (bfd_error_bad_value);
1e2f5b6e
AM
2864 error_ret_free_internal:
2865 if (elf_section_data (section)->relocs == NULL)
2866 free (internal_relocs);
2867 goto error_ret_free_local;
30667bf3
AM
2868 }
2869
2870 /* Only look for stubs on call instructions. */
2871 if (r_type != (unsigned int) R_PARISC_PCREL12F
2872 && r_type != (unsigned int) R_PARISC_PCREL17F
2873 && r_type != (unsigned int) R_PARISC_PCREL22F)
2874 continue;
2875
2876 /* Now determine the call target, its name, value,
2877 section. */
2878 sym_sec = NULL;
2879 sym_value = 0;
2880 destination = 0;
875c0872 2881 hh = NULL;
30667bf3
AM
2882 if (r_indx < symtab_hdr->sh_info)
2883 {
2884 /* It's a local symbol. */
2885 Elf_Internal_Sym *sym;
2886 Elf_Internal_Shdr *hdr;
4fbb74a6 2887 unsigned int shndx;
30667bf3
AM
2888
2889 sym = local_syms + r_indx;
30667bf3
AM
2890 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2891 sym_value = sym->st_value;
4fbb74a6
AM
2892 shndx = sym->st_shndx;
2893 if (shndx < elf_numsections (input_bfd))
2894 {
2895 hdr = elf_elfsections (input_bfd)[shndx];
2896 sym_sec = hdr->bfd_section;
2897 destination = (sym_value + irela->r_addend
2898 + sym_sec->output_offset
2899 + sym_sec->output_section->vma);
2900 }
30667bf3
AM
2901 }
2902 else
2903 {
2904 /* It's an external symbol. */
2905 int e_indx;
2906
2907 e_indx = r_indx - symtab_hdr->sh_info;
875c0872 2908 hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
30667bf3 2909
a63e02c7
DA
2910 while (hh->eh.root.type == bfd_link_hash_indirect
2911 || hh->eh.root.type == bfd_link_hash_warning)
2912 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
30667bf3 2913
a63e02c7
DA
2914 if (hh->eh.root.type == bfd_link_hash_defined
2915 || hh->eh.root.type == bfd_link_hash_defweak)
30667bf3 2916 {
a63e02c7
DA
2917 sym_sec = hh->eh.root.u.def.section;
2918 sym_value = hh->eh.root.u.def.value;
30667bf3
AM
2919 if (sym_sec->output_section != NULL)
2920 destination = (sym_value + irela->r_addend
2921 + sym_sec->output_offset
2922 + sym_sec->output_section->vma);
2923 }
a63e02c7 2924 else if (hh->eh.root.type == bfd_link_hash_undefweak)
c432ba1a 2925 {
0e1862bb 2926 if (! bfd_link_pic (info))
c432ba1a
AM
2927 continue;
2928 }
a63e02c7 2929 else if (hh->eh.root.type == bfd_link_hash_undefined)
c432ba1a 2930 {
59c2e50f 2931 if (! (info->unresolved_syms_in_objects == RM_IGNORE
a63e02c7 2932 && (ELF_ST_VISIBILITY (hh->eh.other)
c432ba1a 2933 == STV_DEFAULT)
a63e02c7 2934 && hh->eh.type != STT_PARISC_MILLI))
c432ba1a
AM
2935 continue;
2936 }
30667bf3
AM
2937 else
2938 {
2939 bfd_set_error (bfd_error_bad_value);
2940 goto error_ret_free_internal;
2941 }
2942 }
2943
2944 /* Determine what (if any) linker stub is needed. */
875c0872 2945 stub_type = hppa_type_of_stub (section, irela, hh,
a252afa4 2946 destination, info);
30667bf3
AM
2947 if (stub_type == hppa_stub_none)
2948 continue;
2949
25f72752 2950 /* Support for grouping stub sections. */
83c81bfe 2951 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2952
30667bf3 2953 /* Get the name of this stub. */
875c0872 2954 stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
30667bf3
AM
2955 if (!stub_name)
2956 goto error_ret_free_internal;
2957
a63e02c7 2958 hsh = hppa_stub_hash_lookup (&htab->bstab,
30667bf3 2959 stub_name,
b34976b6 2960 FALSE, FALSE);
875c0872 2961 if (hsh != NULL)
30667bf3
AM
2962 {
2963 /* The proper stub has already been created. */
2964 free (stub_name);
2965 continue;
2966 }
2967
875c0872
DA
2968 hsh = hppa_add_stub (stub_name, section, htab);
2969 if (hsh == NULL)
30667bf3
AM
2970 {
2971 free (stub_name);
1e2f5b6e 2972 goto error_ret_free_internal;
30667bf3
AM
2973 }
2974
875c0872
DA
2975 hsh->target_value = sym_value;
2976 hsh->target_section = sym_sec;
2977 hsh->stub_type = stub_type;
0e1862bb 2978 if (bfd_link_pic (info))
30667bf3
AM
2979 {
2980 if (stub_type == hppa_stub_import)
875c0872 2981 hsh->stub_type = hppa_stub_import_shared;
98ceb8ce 2982 else if (stub_type == hppa_stub_long_branch)
875c0872 2983 hsh->stub_type = hppa_stub_long_branch_shared;
30667bf3 2984 }
a63e02c7 2985 hsh->hh = hh;
b34976b6 2986 stub_changed = TRUE;
30667bf3
AM
2987 }
2988
2989 /* We're done with the internal relocs, free them. */
1e2f5b6e
AM
2990 if (elf_section_data (section)->relocs == NULL)
2991 free (internal_relocs);
30667bf3
AM
2992 }
2993 }
2994
2995 if (!stub_changed)
2996 break;
2997
2998 /* OK, we've added some stubs. Find out the new size of the
2999 stub sections. */
83c81bfe 3000 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3001 stub_sec != NULL;
3002 stub_sec = stub_sec->next)
a464198b
AM
3003 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
3004 stub_sec->size = 0;
74d1c347 3005
a63e02c7 3006 bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
74d1c347 3007
30667bf3 3008 /* Ask the linker to do its stuff. */
83c81bfe 3009 (*htab->layout_sections_again) ();
b34976b6 3010 stub_changed = FALSE;
30667bf3
AM
3011 }
3012
6cdc0ccc 3013 free (htab->all_local_syms);
b34976b6 3014 return TRUE;
30667bf3
AM
3015
3016 error_ret_free_local:
b4655ea9 3017 free (htab->all_local_syms);
b34976b6 3018 return FALSE;
30667bf3
AM
3019}
3020
30667bf3
AM
3021/* For a final link, this function is called after we have sized the
3022 stubs to provide a value for __gp. */
3023
b34976b6 3024bfd_boolean
c39a58e6 3025elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
30667bf3 3026{
b4655ea9
AM
3027 struct bfd_link_hash_entry *h;
3028 asection *sec = NULL;
3029 bfd_vma gp_val = 0;
30667bf3 3030
55ef6584 3031 h = bfd_link_hash_lookup (info->hash, "$global$", FALSE, FALSE, FALSE);
30667bf3 3032
df8634e3 3033 if (h != NULL
b4655ea9
AM
3034 && (h->type == bfd_link_hash_defined
3035 || h->type == bfd_link_hash_defweak))
30667bf3 3036 {
b4655ea9
AM
3037 gp_val = h->u.def.value;
3038 sec = h->u.def.section;
30667bf3
AM
3039 }
3040 else
3041 {
0eddce27
AM
3042 asection *splt = bfd_get_section_by_name (abfd, ".plt");
3043 asection *sgot = bfd_get_section_by_name (abfd, ".got");
b4655ea9 3044
74d1c347
AM
3045 /* Choose to point our LTP at, in this order, one of .plt, .got,
3046 or .data, if these sections exist. In the case of choosing
3047 .plt try to make the LTP ideal for addressing anywhere in the
3048 .plt or .got with a 14 bit signed offset. Typically, the end
3049 of the .plt is the start of the .got, so choose .plt + 0x2000
3050 if either the .plt or .got is larger than 0x2000. If both
3051 the .plt and .got are smaller than 0x2000, choose the end of
3052 the .plt section. */
225247f0
JT
3053 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
3054 ? NULL : splt;
74d1c347 3055 if (sec != NULL)
30667bf3 3056 {
eea6121a
AM
3057 gp_val = sec->size;
3058 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
74d1c347
AM
3059 {
3060 gp_val = 0x2000;
3061 }
3062 }
3063 else
3064 {
b4655ea9 3065 sec = sgot;
74d1c347
AM
3066 if (sec != NULL)
3067 {
225247f0
JT
3068 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
3069 {
3070 /* We know we don't have a .plt. If .got is large,
3071 offset our LTP. */
3072 if (sec->size > 0x2000)
3073 gp_val = 0x2000;
3074 }
74d1c347
AM
3075 }
3076 else
3077 {
3078 /* No .plt or .got. Who cares what the LTP is? */
3079 sec = bfd_get_section_by_name (abfd, ".data");
3080 }
30667bf3 3081 }
df8634e3
AM
3082
3083 if (h != NULL)
3084 {
b4655ea9
AM
3085 h->type = bfd_link_hash_defined;
3086 h->u.def.value = gp_val;
df8634e3 3087 if (sec != NULL)
b4655ea9 3088 h->u.def.section = sec;
df8634e3 3089 else
b4655ea9 3090 h->u.def.section = bfd_abs_section_ptr;
df8634e3 3091 }
30667bf3
AM
3092 }
3093
55ef6584
AM
3094 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
3095 {
3096 if (sec != NULL && sec->output_section != NULL)
3097 gp_val += sec->output_section->vma + sec->output_offset;
74d1c347 3098
55ef6584
AM
3099 elf_gp (abfd) = gp_val;
3100 }
b34976b6 3101 return TRUE;
30667bf3
AM
3102}
3103
30667bf3
AM
3104/* Build all the stubs associated with the current output file. The
3105 stubs are kept in a hash table attached to the main linker hash
3106 table. We also set up the .plt entries for statically linked PIC
3107 functions here. This function is called via hppaelf_finish in the
3108 linker. */
3109
b34976b6 3110bfd_boolean
c39a58e6 3111elf32_hppa_build_stubs (struct bfd_link_info *info)
30667bf3
AM
3112{
3113 asection *stub_sec;
3114 struct bfd_hash_table *table;
83c81bfe 3115 struct elf32_hppa_link_hash_table *htab;
30667bf3 3116
83c81bfe 3117 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
3118 if (htab == NULL)
3119 return FALSE;
30667bf3 3120
83c81bfe 3121 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3122 stub_sec != NULL;
3123 stub_sec = stub_sec->next)
a464198b
AM
3124 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
3125 && stub_sec->size != 0)
3126 {
3127 /* Allocate memory to hold the linker stubs. */
3128 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
3129 if (stub_sec->contents == NULL)
3130 return FALSE;
3131 stub_sec->size = 0;
3132 }
30667bf3
AM
3133
3134 /* Build the stubs as directed by the stub hash table. */
a63e02c7 3135 table = &htab->bstab;
30667bf3
AM
3136 bfd_hash_traverse (table, hppa_build_one_stub, info);
3137
b34976b6 3138 return TRUE;
30667bf3
AM
3139}
3140
9b52905e 3141/* Return the base vma address which should be subtracted from the real
68ffbac6 3142 address when resolving a dtpoff relocation.
9b52905e
NC
3143 This is PT_TLS segment p_vaddr. */
3144
3145static bfd_vma
3146dtpoff_base (struct bfd_link_info *info)
3147{
3148 /* If tls_sec is NULL, we should have signalled an error already. */
3149 if (elf_hash_table (info)->tls_sec == NULL)
3150 return 0;
3151 return elf_hash_table (info)->tls_sec->vma;
3152}
3153
3154/* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3155
3156static bfd_vma
3157tpoff (struct bfd_link_info *info, bfd_vma address)
3158{
3159 struct elf_link_hash_table *htab = elf_hash_table (info);
3160
3161 /* If tls_sec is NULL, we should have signalled an error already. */
3162 if (htab->tls_sec == NULL)
3163 return 0;
68ffbac6 3164 /* hppa TLS ABI is variant I and static TLS block start just after
9b52905e 3165 tcbhead structure which has 2 pointer fields. */
68ffbac6 3166 return (address - htab->tls_sec->vma
9b52905e
NC
3167 + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3168}
3169
c46b7515
AM
3170/* Perform a final link. */
3171
b34976b6 3172static bfd_boolean
c39a58e6 3173elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
c46b7515 3174{
6d4b2867
JDA
3175 struct stat buf;
3176
4dc86686 3177 /* Invoke the regular ELF linker to do all the work. */
c152c796 3178 if (!bfd_elf_final_link (abfd, info))
b34976b6 3179 return FALSE;
c46b7515
AM
3180
3181 /* If we're producing a final executable, sort the contents of the
985142a4 3182 unwind section. */
0e1862bb 3183 if (bfd_link_relocatable (info))
d9f40817
DA
3184 return TRUE;
3185
6d4b2867
JDA
3186 /* Do not attempt to sort non-regular files. This is here
3187 especially for configure scripts and kernel builds which run
3188 tests with "ld [...] -o /dev/null". */
3189 if (stat (abfd->filename, &buf) != 0
3190 || !S_ISREG(buf.st_mode))
3191 return TRUE;
3192
46fe4e66 3193 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3194}
3195
3196/* Record the lowest address for the data and text segments. */
3197
3198static void
2ea37f1c 3199hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
c46b7515 3200{
83c81bfe 3201 struct elf32_hppa_link_hash_table *htab;
c46b7515 3202
875c0872 3203 htab = (struct elf32_hppa_link_hash_table*) data;
4dfe6ac6
NC
3204 if (htab == NULL)
3205 return;
c46b7515
AM
3206
3207 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3208 {
2ea37f1c
NC
3209 bfd_vma value;
3210 Elf_Internal_Phdr *p;
3211
3212 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3213 BFD_ASSERT (p != NULL);
3214 value = p->p_vaddr;
c46b7515
AM
3215
3216 if ((section->flags & SEC_READONLY) != 0)
3217 {
83c81bfe
AM
3218 if (value < htab->text_segment_base)
3219 htab->text_segment_base = value;
c46b7515
AM
3220 }
3221 else
3222 {
83c81bfe
AM
3223 if (value < htab->data_segment_base)
3224 htab->data_segment_base = value;
c46b7515
AM
3225 }
3226 }
3227}
3228
30667bf3
AM
3229/* Perform a relocation as part of a final link. */
3230
3231static bfd_reloc_status_type
c39a58e6
AM
3232final_link_relocate (asection *input_section,
3233 bfd_byte *contents,
875c0872 3234 const Elf_Internal_Rela *rela,
c39a58e6
AM
3235 bfd_vma value,
3236 struct elf32_hppa_link_hash_table *htab,
3237 asection *sym_sec,
875c0872 3238 struct elf32_hppa_link_hash_entry *hh,
a252afa4 3239 struct bfd_link_info *info)
30667bf3
AM
3240{
3241 int insn;
875c0872 3242 unsigned int r_type = ELF32_R_TYPE (rela->r_info);
a252afa4 3243 unsigned int orig_r_type = r_type;
30667bf3
AM
3244 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3245 int r_format = howto->bitsize;
3246 enum hppa_reloc_field_selector_type_alt r_field;
3247 bfd *input_bfd = input_section->owner;
875c0872 3248 bfd_vma offset = rela->r_offset;
30667bf3
AM
3249 bfd_vma max_branch_offset = 0;
3250 bfd_byte *hit_data = contents + offset;
875c0872 3251 bfd_signed_vma addend = rela->r_addend;
30667bf3 3252 bfd_vma location;
875c0872 3253 struct elf32_hppa_stub_hash_entry *hsh = NULL;
68ffbac6 3254 int val;
30667bf3
AM
3255
3256 if (r_type == R_PARISC_NONE)
3257 return bfd_reloc_ok;
3258
3259 insn = bfd_get_32 (input_bfd, hit_data);
3260
3261 /* Find out where we are and where we're going. */
3262 location = (offset +
3263 input_section->output_offset +
3264 input_section->output_section->vma);
3265
a252afa4
DA
3266 /* If we are not building a shared library, convert DLTIND relocs to
3267 DPREL relocs. */
0e1862bb 3268 if (!bfd_link_pic (info))
a252afa4
DA
3269 {
3270 switch (r_type)
4fc8051d
AM
3271 {
3272 case R_PARISC_DLTIND21L:
143bb599
DA
3273 case R_PARISC_TLS_GD21L:
3274 case R_PARISC_TLS_LDM21L:
3275 case R_PARISC_TLS_IE21L:
4fc8051d 3276 r_type = R_PARISC_DPREL21L;
a252afa4
DA
3277 break;
3278
4fc8051d 3279 case R_PARISC_DLTIND14R:
143bb599
DA
3280 case R_PARISC_TLS_GD14R:
3281 case R_PARISC_TLS_LDM14R:
3282 case R_PARISC_TLS_IE14R:
4fc8051d 3283 r_type = R_PARISC_DPREL14R;
a252afa4
DA
3284 break;
3285
4fc8051d
AM
3286 case R_PARISC_DLTIND14F:
3287 r_type = R_PARISC_DPREL14F;
a252afa4
DA
3288 break;
3289 }
3290 }
3291
30667bf3
AM
3292 switch (r_type)
3293 {
3294 case R_PARISC_PCREL12F:
3295 case R_PARISC_PCREL17F:
3296 case R_PARISC_PCREL22F:
067fa4a6
AM
3297 /* If this call should go via the plt, find the import stub in
3298 the stub hash. */
30667bf3
AM
3299 if (sym_sec == NULL
3300 || sym_sec->output_section == NULL
875c0872 3301 || (hh != NULL
a63e02c7
DA
3302 && hh->eh.plt.offset != (bfd_vma) -1
3303 && hh->eh.dynindx != -1
875c0872 3304 && !hh->plabel
0e1862bb 3305 && (bfd_link_pic (info)
a63e02c7
DA
3306 || !hh->eh.def_regular
3307 || hh->eh.root.type == bfd_link_hash_defweak)))
30667bf3 3308 {
875c0872
DA
3309 hsh = hppa_get_stub_entry (input_section, sym_sec,
3310 hh, rela, htab);
3311 if (hsh != NULL)
30667bf3 3312 {
875c0872
DA
3313 value = (hsh->stub_offset
3314 + hsh->stub_sec->output_offset
3315 + hsh->stub_sec->output_section->vma);
30667bf3
AM
3316 addend = 0;
3317 }
875c0872 3318 else if (sym_sec == NULL && hh != NULL
a63e02c7 3319 && hh->eh.root.type == bfd_link_hash_undefweak)
30667bf3 3320 {
db20fd76
AM
3321 /* It's OK if undefined weak. Calls to undefined weak
3322 symbols behave as if the "called" function
3323 immediately returns. We can thus call to a weak
3324 function without first checking whether the function
3325 is defined. */
30667bf3 3326 value = location;
db20fd76 3327 addend = 8;
30667bf3
AM
3328 }
3329 else
f09ebc7d 3330 return bfd_reloc_undefined;
30667bf3
AM
3331 }
3332 /* Fall thru. */
3333
3334 case R_PARISC_PCREL21L:
3335 case R_PARISC_PCREL17C:
3336 case R_PARISC_PCREL17R:
3337 case R_PARISC_PCREL14R:
3338 case R_PARISC_PCREL14F:
36751eee 3339 case R_PARISC_PCREL32:
30667bf3
AM
3340 /* Make it a pc relative offset. */
3341 value -= location;
3342 addend -= 8;
3343 break;
3344
3345 case R_PARISC_DPREL21L:
3346 case R_PARISC_DPREL14R:
3347 case R_PARISC_DPREL14F:
a252afa4
DA
3348 /* Convert instructions that use the linkage table pointer (r19) to
3349 instructions that use the global data pointer (dp). This is the
3350 most efficient way of using PIC code in an incomplete executable,
3351 but the user must follow the standard runtime conventions for
3352 accessing data for this to work. */
143bb599 3353 if (orig_r_type != r_type)
a252afa4 3354 {
143bb599
DA
3355 if (r_type == R_PARISC_DPREL21L)
3356 {
3357 /* GCC sometimes uses a register other than r19 for the
3358 operation, so we must convert any addil instruction
3359 that uses this relocation. */
3360 if ((insn & 0xfc000000) == ((int) OP_ADDIL << 26))
3361 insn = ADDIL_DP;
3362 else
3363 /* We must have a ldil instruction. It's too hard to find
3364 and convert the associated add instruction, so issue an
3365 error. */
4eca0228 3366 _bfd_error_handler
695344c0 3367 /* xgettext:c-format */
d42c267e 3368 (_("%B(%A+%#Lx): %s fixup for insn %#x is not supported in a non-shared link"),
143bb599
DA
3369 input_bfd,
3370 input_section,
d42c267e 3371 offset,
143bb599
DA
3372 howto->name,
3373 insn);
3374 }
3375 else if (r_type == R_PARISC_DPREL14F)
3376 {
3377 /* This must be a format 1 load/store. Change the base
3378 register to dp. */
3379 insn = (insn & 0xfc1ffff) | (27 << 21);
3380 }
a252afa4
DA
3381 }
3382
143bb599
DA
3383 /* For all the DP relative relocations, we need to examine the symbol's
3384 section. If it has no section or if it's a code section, then
3385 "data pointer relative" makes no sense. In that case we don't
3386 adjust the "value", and for 21 bit addil instructions, we change the
3387 source addend register from %dp to %r0. This situation commonly
3388 arises for undefined weak symbols and when a variable's "constness"
3389 is declared differently from the way the variable is defined. For
3390 instance: "extern int foo" with foo defined as "const int foo". */
95d0f04a 3391 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
30667bf3
AM
3392 {
3393 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3394 == (((int) OP_ADDIL << 26) | (27 << 21)))
3395 {
3396 insn &= ~ (0x1f << 21);
30667bf3
AM
3397 }
3398 /* Now try to make things easy for the dynamic linker. */
3399
3400 break;
3401 }
74d1c347 3402 /* Fall thru. */
30667bf3
AM
3403
3404 case R_PARISC_DLTIND21L:
3405 case R_PARISC_DLTIND14R:
3406 case R_PARISC_DLTIND14F:
143bb599
DA
3407 case R_PARISC_TLS_GD21L:
3408 case R_PARISC_TLS_LDM21L:
3409 case R_PARISC_TLS_IE21L:
9b52905e 3410 case R_PARISC_TLS_GD14R:
9b52905e 3411 case R_PARISC_TLS_LDM14R:
9b52905e 3412 case R_PARISC_TLS_IE14R:
30667bf3
AM
3413 value -= elf_gp (input_section->output_section->owner);
3414 break;
3415
c46b7515
AM
3416 case R_PARISC_SEGREL32:
3417 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3418 value -= htab->text_segment_base;
c46b7515 3419 else
83c81bfe 3420 value -= htab->data_segment_base;
c46b7515
AM
3421 break;
3422
30667bf3
AM
3423 default:
3424 break;
3425 }
3426
3427 switch (r_type)
3428 {
3429 case R_PARISC_DIR32:
47d89dba 3430 case R_PARISC_DIR14F:
30667bf3
AM
3431 case R_PARISC_DIR17F:
3432 case R_PARISC_PCREL17C:
3433 case R_PARISC_PCREL14F:
36751eee 3434 case R_PARISC_PCREL32:
30667bf3
AM
3435 case R_PARISC_DPREL14F:
3436 case R_PARISC_PLABEL32:
3437 case R_PARISC_DLTIND14F:
3438 case R_PARISC_SEGBASE:
3439 case R_PARISC_SEGREL32:
9b52905e
NC
3440 case R_PARISC_TLS_DTPMOD32:
3441 case R_PARISC_TLS_DTPOFF32:
3442 case R_PARISC_TLS_TPREL32:
30667bf3
AM
3443 r_field = e_fsel;
3444 break;
3445
1bf42538 3446 case R_PARISC_DLTIND21L:
30667bf3 3447 case R_PARISC_PCREL21L:
30667bf3 3448 case R_PARISC_PLABEL21L:
1bf42538
JL
3449 r_field = e_lsel;
3450 break;
3451
3452 case R_PARISC_DIR21L:
3453 case R_PARISC_DPREL21L:
9b52905e
NC
3454 case R_PARISC_TLS_GD21L:
3455 case R_PARISC_TLS_LDM21L:
3456 case R_PARISC_TLS_LDO21L:
3457 case R_PARISC_TLS_IE21L:
3458 case R_PARISC_TLS_LE21L:
30667bf3
AM
3459 r_field = e_lrsel;
3460 break;
3461
30667bf3 3462 case R_PARISC_PCREL17R:
30667bf3 3463 case R_PARISC_PCREL14R:
30667bf3
AM
3464 case R_PARISC_PLABEL14R:
3465 case R_PARISC_DLTIND14R:
1bf42538
JL
3466 r_field = e_rsel;
3467 break;
3468
3469 case R_PARISC_DIR17R:
3470 case R_PARISC_DIR14R:
3471 case R_PARISC_DPREL14R:
9b52905e
NC
3472 case R_PARISC_TLS_GD14R:
3473 case R_PARISC_TLS_LDM14R:
3474 case R_PARISC_TLS_LDO14R:
3475 case R_PARISC_TLS_IE14R:
3476 case R_PARISC_TLS_LE14R:
30667bf3
AM
3477 r_field = e_rrsel;
3478 break;
3479
3480 case R_PARISC_PCREL12F:
3481 case R_PARISC_PCREL17F:
3482 case R_PARISC_PCREL22F:
3483 r_field = e_fsel;
3484
3485 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3486 {
3487 max_branch_offset = (1 << (17-1)) << 2;
3488 }
3489 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3490 {
3491 max_branch_offset = (1 << (12-1)) << 2;
3492 }
3493 else
3494 {
3495 max_branch_offset = (1 << (22-1)) << 2;
3496 }
3497
3498 /* sym_sec is NULL on undefined weak syms or when shared on
3499 undefined syms. We've already checked for a stub for the
3500 shared undefined case. */
3501 if (sym_sec == NULL)
3502 break;
3503
3504 /* If the branch is out of reach, then redirect the
3505 call to the local stub for this function. */
3506 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3507 {
875c0872
DA
3508 hsh = hppa_get_stub_entry (input_section, sym_sec,
3509 hh, rela, htab);
3510 if (hsh == NULL)
f09ebc7d 3511 return bfd_reloc_undefined;
30667bf3
AM
3512
3513 /* Munge up the value and addend so that we call the stub
3514 rather than the procedure directly. */
875c0872
DA
3515 value = (hsh->stub_offset
3516 + hsh->stub_sec->output_offset
3517 + hsh->stub_sec->output_section->vma
30667bf3
AM
3518 - location);
3519 addend = -8;
3520 }
3521 break;
3522
3523 /* Something we don't know how to handle. */
3524 default:
3525 return bfd_reloc_notsupported;
3526 }
3527
3528 /* Make sure we can reach the stub. */
3529 if (max_branch_offset != 0
3530 && value + addend + max_branch_offset >= 2*max_branch_offset)
3531 {
4eca0228 3532 _bfd_error_handler
695344c0 3533 /* xgettext:c-format */
d42c267e 3534 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
d003868e
AM
3535 input_bfd,
3536 input_section,
d42c267e 3537 offset,
a63e02c7 3538 hsh->bh_root.string);
ce757d15 3539 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3540 return bfd_reloc_notsupported;
3541 }
3542
3543 val = hppa_field_adjust (value, addend, r_field);
3544
3545 switch (r_type)
3546 {
3547 case R_PARISC_PCREL12F:
3548 case R_PARISC_PCREL17C:
3549 case R_PARISC_PCREL17F:
3550 case R_PARISC_PCREL17R:
3551 case R_PARISC_PCREL22F:
3552 case R_PARISC_DIR17F:
3553 case R_PARISC_DIR17R:
3554 /* This is a branch. Divide the offset by four.
3555 Note that we need to decide whether it's a branch or
3556 otherwise by inspecting the reloc. Inspecting insn won't
3557 work as insn might be from a .word directive. */
3558 val >>= 2;
3559 break;
3560
3561 default:
3562 break;
3563 }
3564
3565 insn = hppa_rebuild_insn (insn, val, r_format);
3566
3567 /* Update the instruction word. */
74d1c347 3568 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3569 return bfd_reloc_ok;
3570}
3571
30667bf3
AM
3572/* Relocate an HPPA ELF section. */
3573
b34976b6 3574static bfd_boolean
c39a58e6
AM
3575elf32_hppa_relocate_section (bfd *output_bfd,
3576 struct bfd_link_info *info,
3577 bfd *input_bfd,
3578 asection *input_section,
3579 bfd_byte *contents,
3580 Elf_Internal_Rela *relocs,
3581 Elf_Internal_Sym *local_syms,
3582 asection **local_sections)
30667bf3 3583{
30667bf3 3584 bfd_vma *local_got_offsets;
83c81bfe 3585 struct elf32_hppa_link_hash_table *htab;
30667bf3 3586 Elf_Internal_Shdr *symtab_hdr;
875c0872 3587 Elf_Internal_Rela *rela;
30667bf3 3588 Elf_Internal_Rela *relend;
30667bf3
AM
3589
3590 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3591
83c81bfe 3592 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
3593 if (htab == NULL)
3594 return FALSE;
3595
74d1c347 3596 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3 3597
875c0872 3598 rela = relocs;
30667bf3 3599 relend = relocs + input_section->reloc_count;
875c0872 3600 for (; rela < relend; rela++)
30667bf3
AM
3601 {
3602 unsigned int r_type;
3603 reloc_howto_type *howto;
3604 unsigned int r_symndx;
875c0872 3605 struct elf32_hppa_link_hash_entry *hh;
30667bf3
AM
3606 Elf_Internal_Sym *sym;
3607 asection *sym_sec;
3608 bfd_vma relocation;
875c0872 3609 bfd_reloc_status_type rstatus;
30667bf3 3610 const char *sym_name;
b34976b6
AM
3611 bfd_boolean plabel;
3612 bfd_boolean warned_undef;
30667bf3 3613
875c0872 3614 r_type = ELF32_R_TYPE (rela->r_info);
30667bf3
AM
3615 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3616 {
3617 bfd_set_error (bfd_error_bad_value);
b34976b6 3618 return FALSE;
30667bf3
AM
3619 }
3620 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3621 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3622 continue;
3623
875c0872
DA
3624 r_symndx = ELF32_R_SYM (rela->r_info);
3625 hh = NULL;
30667bf3
AM
3626 sym = NULL;
3627 sym_sec = NULL;
b34976b6 3628 warned_undef = FALSE;
30667bf3
AM
3629 if (r_symndx < symtab_hdr->sh_info)
3630 {
3631 /* This is a local symbol, h defaults to NULL. */
3632 sym = local_syms + r_symndx;
3633 sym_sec = local_sections[r_symndx];
875c0872 3634 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
30667bf3
AM
3635 }
3636 else
3637 {
875c0872 3638 struct elf_link_hash_entry *eh;
62d887d4 3639 bfd_boolean unresolved_reloc, ignored;
b2a8e766 3640 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
560e09e9 3641
875c0872 3642 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
b2a8e766 3643 r_symndx, symtab_hdr, sym_hashes,
875c0872 3644 eh, sym_sec, relocation,
62d887d4
L
3645 unresolved_reloc, warned_undef,
3646 ignored);
560e09e9 3647
0e1862bb 3648 if (!bfd_link_relocatable (info)
ab96bf03 3649 && relocation == 0
875c0872
DA
3650 && eh->root.type != bfd_link_hash_defined
3651 && eh->root.type != bfd_link_hash_defweak
3652 && eh->root.type != bfd_link_hash_undefweak)
4fc8051d 3653 {
59c2e50f 3654 if (info->unresolved_syms_in_objects == RM_IGNORE
875c0872
DA
3655 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3656 && eh->type == STT_PARISC_MILLI)
560e09e9 3657 {
1a72702b
AM
3658 (*info->callbacks->undefined_symbol)
3659 (info, eh_name (eh), input_bfd,
3660 input_section, rela->r_offset, FALSE);
560e09e9
NC
3661 warned_undef = TRUE;
3662 }
30667bf3 3663 }
875c0872 3664 hh = hppa_elf_hash_entry (eh);
30667bf3
AM
3665 }
3666
dbaa2011 3667 if (sym_sec != NULL && discarded_section (sym_sec))
e4067dbb 3668 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
3669 rela, 1, relend,
3670 elf_hppa_howto_table + r_type, 0,
e4067dbb 3671 contents);
ab96bf03 3672
0e1862bb 3673 if (bfd_link_relocatable (info))
ab96bf03
AM
3674 continue;
3675
30667bf3 3676 /* Do any required modifications to the relocation value, and
25f72752
AM
3677 determine what types of dynamic info we need to output, if
3678 any. */
74d1c347 3679 plabel = 0;
30667bf3
AM
3680 switch (r_type)
3681 {
3682 case R_PARISC_DLTIND14F:
3683 case R_PARISC_DLTIND14R:
3684 case R_PARISC_DLTIND21L:
ce757d15
AM
3685 {
3686 bfd_vma off;
d336fa6d
AM
3687 bfd_boolean do_got = FALSE;
3688 bfd_boolean reloc = bfd_link_pic (info);
ce757d15
AM
3689
3690 /* Relocation is to the entry for this symbol in the
3691 global offset table. */
875c0872 3692 if (hh != NULL)
ce757d15 3693 {
b34976b6 3694 bfd_boolean dyn;
ce757d15 3695
a63e02c7
DA
3696 off = hh->eh.got.offset;
3697 dyn = htab->etab.dynamic_sections_created;
d336fa6d
AM
3698 reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3699 && (reloc
3700 || (hh->eh.dynindx != -1
3701 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3702 if (!reloc
3703 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3704 bfd_link_pic (info),
3705 &hh->eh))
ce757d15
AM
3706 {
3707 /* If we aren't going to call finish_dynamic_symbol,
3708 then we need to handle initialisation of the .got
3709 entry and create needed relocs here. Since the
3710 offset must always be a multiple of 4, we use the
3711 least significant bit to record whether we have
3712 initialised it already. */
3713 if ((off & 1) != 0)
3714 off &= ~1;
3715 else
3716 {
a63e02c7 3717 hh->eh.got.offset |= 1;
d336fa6d 3718 do_got = TRUE;
ce757d15
AM
3719 }
3720 }
3721 }
3722 else
3723 {
3724 /* Local symbol case. */
3725 if (local_got_offsets == NULL)
3726 abort ();
3727
3728 off = local_got_offsets[r_symndx];
3729
3730 /* The offset must always be a multiple of 4. We use
3731 the least significant bit to record whether we have
3732 already generated the necessary reloc. */
3733 if ((off & 1) != 0)
3734 off &= ~1;
3735 else
3736 {
3737 local_got_offsets[r_symndx] |= 1;
d336fa6d 3738 do_got = TRUE;
ce757d15
AM
3739 }
3740 }
68fb2e56 3741
ce757d15
AM
3742 if (do_got)
3743 {
d336fa6d 3744 if (reloc)
ce757d15
AM
3745 {
3746 /* Output a dynamic relocation for this GOT entry.
3747 In this case it is relative to the base of the
3748 object because the symbol index is zero. */
3749 Elf_Internal_Rela outrel;
947216bf 3750 bfd_byte *loc;
ce558b89 3751 asection *sec = htab->etab.srelgot;
ce757d15
AM
3752
3753 outrel.r_offset = (off
ce558b89
AM
3754 + htab->etab.sgot->output_offset
3755 + htab->etab.sgot->output_section->vma);
ce757d15
AM
3756 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3757 outrel.r_addend = relocation;
875c0872
DA
3758 loc = sec->contents;
3759 loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3760 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3761 }
3762 else
30667bf3 3763 bfd_put_32 (output_bfd, relocation,
ce558b89 3764 htab->etab.sgot->contents + off);
ce757d15 3765 }
30667bf3 3766
ce757d15
AM
3767 if (off >= (bfd_vma) -2)
3768 abort ();
30667bf3 3769
ce757d15
AM
3770 /* Add the base of the GOT to the relocation value. */
3771 relocation = (off
ce558b89
AM
3772 + htab->etab.sgot->output_offset
3773 + htab->etab.sgot->output_section->vma);
ce757d15 3774 }
30667bf3 3775 break;
252b5132 3776
c46b7515
AM
3777 case R_PARISC_SEGREL32:
3778 /* If this is the first SEGREL relocation, then initialize
3779 the segment base values. */
83c81bfe
AM
3780 if (htab->text_segment_base == (bfd_vma) -1)
3781 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3782 break;
3783
30667bf3
AM
3784 case R_PARISC_PLABEL14R:
3785 case R_PARISC_PLABEL21L:
3786 case R_PARISC_PLABEL32:
a63e02c7 3787 if (htab->etab.dynamic_sections_created)
252b5132 3788 {
ce757d15 3789 bfd_vma off;
b34976b6 3790 bfd_boolean do_plt = 0;
74d1c347
AM
3791 /* If we have a global symbol with a PLT slot, then
3792 redirect this relocation to it. */
875c0872 3793 if (hh != NULL)
74d1c347 3794 {
a63e02c7 3795 off = hh->eh.plt.offset;
0e1862bb
L
3796 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3797 bfd_link_pic (info),
a63e02c7 3798 &hh->eh))
8dea1268
AM
3799 {
3800 /* In a non-shared link, adjust_dynamic_symbols
3801 isn't called for symbols forced local. We
dc810e39 3802 need to write out the plt entry here. */
8dea1268
AM
3803 if ((off & 1) != 0)
3804 off &= ~1;
3805 else
3806 {
a63e02c7 3807 hh->eh.plt.offset |= 1;
ce757d15 3808 do_plt = 1;
8dea1268
AM
3809 }
3810 }
74d1c347
AM
3811 }
3812 else
3813 {
68fb2e56
AM
3814 bfd_vma *local_plt_offsets;
3815
3816 if (local_got_offsets == NULL)
3817 abort ();
74d1c347 3818
68fb2e56
AM
3819 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3820 off = local_plt_offsets[r_symndx];
74d1c347
AM
3821
3822 /* As for the local .got entry case, we use the last
3823 bit to record whether we've already initialised
3824 this local .plt entry. */
3825 if ((off & 1) != 0)
3826 off &= ~1;
ce757d15
AM
3827 else
3828 {
3829 local_plt_offsets[r_symndx] |= 1;
3830 do_plt = 1;
3831 }
3832 }
3833
3834 if (do_plt)
3835 {
0e1862bb 3836 if (bfd_link_pic (info))
ce757d15
AM
3837 {
3838 /* Output a dynamic IPLT relocation for this
3839 PLT entry. */
3840 Elf_Internal_Rela outrel;
947216bf 3841 bfd_byte *loc;
ce558b89 3842 asection *s = htab->etab.srelplt;
ce757d15
AM
3843
3844 outrel.r_offset = (off
ce558b89
AM
3845 + htab->etab.splt->output_offset
3846 + htab->etab.splt->output_section->vma);
ce757d15
AM
3847 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3848 outrel.r_addend = relocation;
947216bf
AM
3849 loc = s->contents;
3850 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3851 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3852 }
74d1c347
AM
3853 else
3854 {
3855 bfd_put_32 (output_bfd,
3856 relocation,
ce558b89 3857 htab->etab.splt->contents + off);
74d1c347 3858 bfd_put_32 (output_bfd,
ce558b89
AM
3859 elf_gp (htab->etab.splt->output_section->owner),
3860 htab->etab.splt->contents + off + 4);
74d1c347
AM
3861 }
3862 }
3863
68fb2e56 3864 if (off >= (bfd_vma) -2)
49e9d0d3 3865 abort ();
74d1c347
AM
3866
3867 /* PLABELs contain function pointers. Relocation is to
3868 the entry for the function in the .plt. The magic +2
3869 offset signals to $$dyncall that the function pointer
3870 is in the .plt and thus has a gp pointer too.
3871 Exception: Undefined PLABELs should have a value of
3872 zero. */
875c0872 3873 if (hh == NULL
a63e02c7
DA
3874 || (hh->eh.root.type != bfd_link_hash_undefweak
3875 && hh->eh.root.type != bfd_link_hash_undefined))
74d1c347
AM
3876 {
3877 relocation = (off
ce558b89
AM
3878 + htab->etab.splt->output_offset
3879 + htab->etab.splt->output_section->vma
74d1c347
AM
3880 + 2);
3881 }
3882 plabel = 1;
30667bf3 3883 }
1a0670f3 3884 /* Fall through. */
30667bf3
AM
3885
3886 case R_PARISC_DIR17F:
3887 case R_PARISC_DIR17R:
47d89dba 3888 case R_PARISC_DIR14F:
30667bf3
AM
3889 case R_PARISC_DIR14R:
3890 case R_PARISC_DIR21L:
3891 case R_PARISC_DPREL14F:
3892 case R_PARISC_DPREL14R:
3893 case R_PARISC_DPREL21L:
3894 case R_PARISC_DIR32:
b1e24c02 3895 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
3896 break;
3897
287c7eaf
AM
3898 if (bfd_link_pic (info)
3899 ? ((hh == NULL
3900 || hh->dyn_relocs != NULL)
3901 && ((hh != NULL && pc_dynrelocs (hh))
3902 || IS_ABSOLUTE_RELOC (r_type)))
3903 : (hh != NULL
3904 && hh->dyn_relocs != NULL))
30667bf3
AM
3905 {
3906 Elf_Internal_Rela outrel;
b34976b6 3907 bfd_boolean skip;
98ceb8ce 3908 asection *sreloc;
947216bf 3909 bfd_byte *loc;
252b5132 3910
30667bf3
AM
3911 /* When generating a shared object, these relocations
3912 are copied into the output file to be resolved at run
3913 time. */
252b5132 3914
875c0872 3915 outrel.r_addend = rela->r_addend;
c629eae0
JJ
3916 outrel.r_offset =
3917 _bfd_elf_section_offset (output_bfd, info, input_section,
875c0872 3918 rela->r_offset);
0bb2d96a
JJ
3919 skip = (outrel.r_offset == (bfd_vma) -1
3920 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3921 outrel.r_offset += (input_section->output_offset
3922 + input_section->output_section->vma);
68ffbac6 3923
30667bf3 3924 if (skip)
252b5132 3925 {
30667bf3 3926 memset (&outrel, 0, sizeof (outrel));
252b5132 3927 }
875c0872 3928 else if (hh != NULL
a63e02c7 3929 && hh->eh.dynindx != -1
74d1c347 3930 && (plabel
446f2863 3931 || !IS_ABSOLUTE_RELOC (r_type)
0e1862bb 3932 || !bfd_link_pic (info)
a496fbc8 3933 || !SYMBOLIC_BIND (info, &hh->eh)
a63e02c7 3934 || !hh->eh.def_regular))
252b5132 3935 {
a63e02c7 3936 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
30667bf3
AM
3937 }
3938 else /* It's a local symbol, or one marked to become local. */
3939 {
3940 int indx = 0;
edd21aca 3941
30667bf3
AM
3942 /* Add the absolute offset of the symbol. */
3943 outrel.r_addend += relocation;
edd21aca 3944
74d1c347
AM
3945 /* Global plabels need to be processed by the
3946 dynamic linker so that functions have at most one
3947 fptr. For this reason, we need to differentiate
3948 between global and local plabels, which we do by
3949 providing the function symbol for a global plabel
3950 reloc, and no symbol for local plabels. */
3951 if (! plabel
3952 && sym_sec != NULL
30667bf3
AM
3953 && sym_sec->output_section != NULL
3954 && ! bfd_is_abs_section (sym_sec))
252b5132 3955 {
74541ad4
AM
3956 asection *osec;
3957
3958 osec = sym_sec->output_section;
3959 indx = elf_section_data (osec)->dynindx;
3960 if (indx == 0)
3961 {
3962 osec = htab->etab.text_index_section;
3963 indx = elf_section_data (osec)->dynindx;
3964 }
3965 BFD_ASSERT (indx != 0);
4b71bec0 3966
30667bf3
AM
3967 /* We are turning this relocation into one
3968 against a section symbol, so subtract out the
3969 output section's address but not the offset
3970 of the input section in the output section. */
74541ad4 3971 outrel.r_addend -= osec->vma;
252b5132 3972 }
252b5132 3973
30667bf3
AM
3974 outrel.r_info = ELF32_R_INFO (indx, r_type);
3975 }
98ceb8ce
AM
3976 sreloc = elf_section_data (input_section)->sreloc;
3977 if (sreloc == NULL)
3978 abort ();
3979
947216bf
AM
3980 loc = sreloc->contents;
3981 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
98ceb8ce 3982 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3983 }
3984 break;
68ffbac6 3985
9b52905e
NC
3986 case R_PARISC_TLS_LDM21L:
3987 case R_PARISC_TLS_LDM14R:
3988 {
3989 bfd_vma off;
68ffbac6 3990
9b52905e
NC
3991 off = htab->tls_ldm_got.offset;
3992 if (off & 1)
3993 off &= ~1;
3994 else
3995 {
3996 Elf_Internal_Rela outrel;
3997 bfd_byte *loc;
3998
68ffbac6 3999 outrel.r_offset = (off
ce558b89
AM
4000 + htab->etab.sgot->output_section->vma
4001 + htab->etab.sgot->output_offset);
9b52905e
NC
4002 outrel.r_addend = 0;
4003 outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
ce558b89
AM
4004 loc = htab->etab.srelgot->contents;
4005 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
9b52905e
NC
4006
4007 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4008 htab->tls_ldm_got.offset |= 1;
4009 }
4010
4011 /* Add the base of the GOT to the relocation value. */
4012 relocation = (off
ce558b89
AM
4013 + htab->etab.sgot->output_offset
4014 + htab->etab.sgot->output_section->vma);
9b52905e
NC
4015
4016 break;
4017 }
4018
4019 case R_PARISC_TLS_LDO21L:
4020 case R_PARISC_TLS_LDO14R:
4021 relocation -= dtpoff_base (info);
4022 break;
4023
4024 case R_PARISC_TLS_GD21L:
4025 case R_PARISC_TLS_GD14R:
4026 case R_PARISC_TLS_IE21L:
4027 case R_PARISC_TLS_IE14R:
4028 {
4029 bfd_vma off;
4030 int indx;
4031 char tls_type;
4032
4033 indx = 0;
4034 if (hh != NULL)
4035 {
2e684e75
AM
4036 if (!htab->etab.dynamic_sections_created
4037 || hh->eh.dynindx == -1
4038 || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
4039 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
4040 /* This is actually a static link, or it is a
4041 -Bsymbolic link and the symbol is defined
4042 locally, or the symbol was forced to be local
4043 because of a version file. */
4044 ;
4045 else
4046 indx = hh->eh.dynindx;
9b52905e
NC
4047 off = hh->eh.got.offset;
4048 tls_type = hh->tls_type;
4049 }
4050 else
4051 {
4052 off = local_got_offsets[r_symndx];
4053 tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
4054 }
4055
4056 if (tls_type == GOT_UNKNOWN)
4057 abort ();
4058
4059 if ((off & 1) != 0)
4060 off &= ~1;
4061 else
4062 {
4063 bfd_boolean need_relocs = FALSE;
4064 Elf_Internal_Rela outrel;
4065 bfd_byte *loc = NULL;
4066 int cur_off = off;
4067
4068 /* The GOT entries have not been initialized yet. Do it
4069 now, and emit any relocations. If both an IE GOT and a
4070 GD GOT are necessary, we emit the GD first. */
4071
2e684e75
AM
4072 if (indx != 0
4073 || (bfd_link_pic (info)
4074 && (hh == NULL
4075 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
9b52905e
NC
4076 {
4077 need_relocs = TRUE;
ce558b89 4078 loc = htab->etab.srelgot->contents;
2e684e75
AM
4079 loc += (htab->etab.srelgot->reloc_count
4080 * sizeof (Elf32_External_Rela));
9b52905e
NC
4081 }
4082
4083 if (tls_type & GOT_TLS_GD)
4084 {
4085 if (need_relocs)
4086 {
2e684e75
AM
4087 outrel.r_offset
4088 = (cur_off
4089 + htab->etab.sgot->output_section->vma
4090 + htab->etab.sgot->output_offset);
4091 outrel.r_info
4092 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
9b52905e 4093 outrel.r_addend = 0;
9b52905e 4094 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ce558b89 4095 htab->etab.srelgot->reloc_count++;
9b52905e 4096 loc += sizeof (Elf32_External_Rela);
2e684e75
AM
4097 outrel.r_info
4098 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
4099 outrel.r_offset += 4;
4100 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4101 htab->etab.srelgot->reloc_count++;
4102 loc += sizeof (Elf32_External_Rela);
4103 bfd_put_32 (output_bfd, 0,
4104 htab->etab.sgot->contents + cur_off);
4105 bfd_put_32 (output_bfd, 0,
4106 htab->etab.sgot->contents + cur_off + 4);
9b52905e
NC
4107 }
4108 else
4109 {
4110 /* If we are not emitting relocations for a
4111 general dynamic reference, then we must be in a
4112 static link or an executable link with the
4113 symbol binding locally. Mark it as belonging
4114 to module 1, the executable. */
4115 bfd_put_32 (output_bfd, 1,
ce558b89 4116 htab->etab.sgot->contents + cur_off);
2e684e75 4117 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
ce558b89 4118 htab->etab.sgot->contents + cur_off + 4);
9b52905e 4119 }
9b52905e
NC
4120 cur_off += 8;
4121 }
4122
4123 if (tls_type & GOT_TLS_IE)
4124 {
2e684e75
AM
4125 if (need_relocs
4126 && !(bfd_link_executable (info)
4127 && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
9b52905e 4128 {
2e684e75
AM
4129 outrel.r_offset
4130 = (cur_off
4131 + htab->etab.sgot->output_section->vma
4132 + htab->etab.sgot->output_offset);
4133 outrel.r_info = ELF32_R_INFO (indx,
4134 R_PARISC_TLS_TPREL32);
9b52905e
NC
4135 if (indx == 0)
4136 outrel.r_addend = relocation - dtpoff_base (info);
4137 else
4138 outrel.r_addend = 0;
9b52905e 4139 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ce558b89 4140 htab->etab.srelgot->reloc_count++;
9b52905e
NC
4141 loc += sizeof (Elf32_External_Rela);
4142 }
4143 else
4144 bfd_put_32 (output_bfd, tpoff (info, relocation),
ce558b89 4145 htab->etab.sgot->contents + cur_off);
9b52905e
NC
4146 cur_off += 4;
4147 }
4148
4149 if (hh != NULL)
4150 hh->eh.got.offset |= 1;
4151 else
4152 local_got_offsets[r_symndx] |= 1;
4153 }
4154
2e684e75
AM
4155 if ((tls_type & GOT_NORMAL) != 0
4156 && (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4157 {
4158 if (hh != NULL)
4159 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4160 hh_name (hh));
4161 else
4162 {
4163 Elf_Internal_Sym *isym
4164 = bfd_sym_from_r_symndx (&htab->sym_cache,
4165 input_bfd, r_symndx);
4166 if (isym == NULL)
4167 return FALSE;
4168 sym_name
4169 = bfd_elf_string_from_elf_section (input_bfd,
4170 symtab_hdr->sh_link,
4171 isym->st_name);
4172 if (sym_name == NULL)
4173 return FALSE;
4174 if (*sym_name == '\0')
4175 sym_name = bfd_section_name (input_bfd, sym_sec);
4176 _bfd_error_handler
4177 (_("%B:%s has both normal and TLS relocs"),
4178 input_bfd, sym_name);
4179 }
4180 bfd_set_error (bfd_error_bad_value);
4181 return FALSE;
4182 }
4183
9b52905e
NC
4184 if ((tls_type & GOT_TLS_GD)
4185 && r_type != R_PARISC_TLS_GD21L
4186 && r_type != R_PARISC_TLS_GD14R)
4187 off += 2 * GOT_ENTRY_SIZE;
4188
4189 /* Add the base of the GOT to the relocation value. */
4190 relocation = (off
ce558b89
AM
4191 + htab->etab.sgot->output_offset
4192 + htab->etab.sgot->output_section->vma);
9b52905e
NC
4193
4194 break;
4195 }
4196
4197 case R_PARISC_TLS_LE21L:
4198 case R_PARISC_TLS_LE14R:
4199 {
4200 relocation = tpoff (info, relocation);
4201 break;
4202 }
4203 break;
edd21aca 4204
30667bf3
AM
4205 default:
4206 break;
4207 }
252b5132 4208
875c0872
DA
4209 rstatus = final_link_relocate (input_section, contents, rela, relocation,
4210 htab, sym_sec, hh, info);
252b5132 4211
875c0872 4212 if (rstatus == bfd_reloc_ok)
30667bf3 4213 continue;
252b5132 4214
875c0872 4215 if (hh != NULL)
9b52905e 4216 sym_name = hh_name (hh);
30667bf3
AM
4217 else
4218 {
4219 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4220 symtab_hdr->sh_link,
4221 sym->st_name);
4222 if (sym_name == NULL)
b34976b6 4223 return FALSE;
30667bf3
AM
4224 if (*sym_name == '\0')
4225 sym_name = bfd_section_name (input_bfd, sym_sec);
4226 }
edd21aca 4227
30667bf3 4228 howto = elf_hppa_howto_table + r_type;
252b5132 4229
875c0872 4230 if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
30667bf3 4231 {
875c0872 4232 if (rstatus == bfd_reloc_notsupported || !warned_undef)
f09ebc7d 4233 {
4eca0228 4234 _bfd_error_handler
695344c0 4235 /* xgettext:c-format */
d42c267e 4236 (_("%B(%A+%#Lx): cannot handle %s for %s"),
d003868e
AM
4237 input_bfd,
4238 input_section,
d42c267e 4239 rela->r_offset,
f09ebc7d
AM
4240 howto->name,
4241 sym_name);
4242 bfd_set_error (bfd_error_bad_value);
b34976b6 4243 return FALSE;
f09ebc7d 4244 }
30667bf3
AM
4245 }
4246 else
1a72702b
AM
4247 (*info->callbacks->reloc_overflow)
4248 (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4249 (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
30667bf3 4250 }
edd21aca 4251
b34976b6 4252 return TRUE;
30667bf3 4253}
252b5132 4254
30667bf3
AM
4255/* Finish up dynamic symbol handling. We set the contents of various
4256 dynamic sections here. */
252b5132 4257
b34976b6 4258static bfd_boolean
c39a58e6
AM
4259elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4260 struct bfd_link_info *info,
875c0872 4261 struct elf_link_hash_entry *eh,
c39a58e6 4262 Elf_Internal_Sym *sym)
30667bf3 4263{
83c81bfe 4264 struct elf32_hppa_link_hash_table *htab;
875c0872 4265 Elf_Internal_Rela rela;
a252afa4 4266 bfd_byte *loc;
edd21aca 4267
83c81bfe 4268 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
4269 if (htab == NULL)
4270 return FALSE;
30667bf3 4271
875c0872 4272 if (eh->plt.offset != (bfd_vma) -1)
30667bf3
AM
4273 {
4274 bfd_vma value;
30667bf3 4275
875c0872 4276 if (eh->plt.offset & 1)
8dea1268
AM
4277 abort ();
4278
30667bf3
AM
4279 /* This symbol has an entry in the procedure linkage table. Set
4280 it up.
4281
4282 The format of a plt entry is
74d1c347
AM
4283 <funcaddr>
4284 <__gp>
47d89dba 4285 */
30667bf3 4286 value = 0;
875c0872
DA
4287 if (eh->root.type == bfd_link_hash_defined
4288 || eh->root.type == bfd_link_hash_defweak)
30667bf3 4289 {
875c0872
DA
4290 value = eh->root.u.def.value;
4291 if (eh->root.u.def.section->output_section != NULL)
4292 value += (eh->root.u.def.section->output_offset
4293 + eh->root.u.def.section->output_section->vma);
252b5132 4294 }
edd21aca 4295
a252afa4 4296 /* Create a dynamic IPLT relocation for this entry. */
875c0872 4297 rela.r_offset = (eh->plt.offset
ce558b89
AM
4298 + htab->etab.splt->output_offset
4299 + htab->etab.splt->output_section->vma);
875c0872 4300 if (eh->dynindx != -1)
30667bf3 4301 {
875c0872
DA
4302 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4303 rela.r_addend = 0;
30667bf3 4304 }
ce757d15 4305 else
47d89dba 4306 {
a252afa4
DA
4307 /* This symbol has been marked to become local, and is
4308 used by a plabel so must be kept in the .plt. */
875c0872
DA
4309 rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4310 rela.r_addend = value;
47d89dba
AM
4311 }
4312
ce558b89
AM
4313 loc = htab->etab.srelplt->contents;
4314 loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4315 bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
a252afa4 4316
875c0872 4317 if (!eh->def_regular)
30667bf3
AM
4318 {
4319 /* Mark the symbol as undefined, rather than as defined in
4320 the .plt section. Leave the value alone. */
4321 sym->st_shndx = SHN_UNDEF;
4322 }
4323 }
edd21aca 4324
9b52905e 4325 if (eh->got.offset != (bfd_vma) -1
2e684e75 4326 && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
d336fa6d 4327 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
30667bf3 4328 {
d336fa6d
AM
4329 bfd_boolean is_dyn = (eh->dynindx != -1
4330 && !SYMBOL_REFERENCES_LOCAL (info, eh));
4331
4332 if (is_dyn || bfd_link_pic (info))
30667bf3 4333 {
d336fa6d
AM
4334 /* This symbol has an entry in the global offset table. Set
4335 it up. */
4336
4337 rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4338 + htab->etab.sgot->output_offset
4339 + htab->etab.sgot->output_section->vma);
4340
4341 /* If this is a -Bsymbolic link and the symbol is defined
4342 locally or was forced to be local because of a version
4343 file, we just want to emit a RELATIVE reloc. The entry
4344 in the global offset table will already have been
4345 initialized in the relocate_section function. */
4346 if (!is_dyn)
4347 {
4348 rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4349 rela.r_addend = (eh->root.u.def.value
4350 + eh->root.u.def.section->output_offset
4351 + eh->root.u.def.section->output_section->vma);
4352 }
4353 else
4354 {
4355 if ((eh->got.offset & 1) != 0)
4356 abort ();
875c0872 4357
d336fa6d
AM
4358 bfd_put_32 (output_bfd, 0,
4359 htab->etab.sgot->contents + (eh->got.offset & ~1));
4360 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4361 rela.r_addend = 0;
4362 }
edd21aca 4363
d336fa6d
AM
4364 loc = htab->etab.srelgot->contents;
4365 loc += (htab->etab.srelgot->reloc_count++
4366 * sizeof (Elf32_External_Rela));
4367 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4368 }
30667bf3 4369 }
edd21aca 4370
875c0872 4371 if (eh->needs_copy)
30667bf3 4372 {
875c0872 4373 asection *sec;
30667bf3
AM
4374
4375 /* This symbol needs a copy reloc. Set it up. */
4376
875c0872
DA
4377 if (! (eh->dynindx != -1
4378 && (eh->root.type == bfd_link_hash_defined
4379 || eh->root.type == bfd_link_hash_defweak)))
49e9d0d3 4380 abort ();
30667bf3 4381
875c0872
DA
4382 rela.r_offset = (eh->root.u.def.value
4383 + eh->root.u.def.section->output_offset
4384 + eh->root.u.def.section->output_section->vma);
4385 rela.r_addend = 0;
4386 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
afbf7e8e 4387 if (eh->root.u.def.section == htab->etab.sdynrelro)
5474d94f
AM
4388 sec = htab->etab.sreldynrelro;
4389 else
4390 sec = htab->etab.srelbss;
875c0872
DA
4391 loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4392 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
30667bf3
AM
4393 }
4394
4395 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 4396 if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
30667bf3
AM
4397 {
4398 sym->st_shndx = SHN_ABS;
4399 }
4400
b34976b6 4401 return TRUE;
30667bf3
AM
4402}
4403
98ceb8ce
AM
4404/* Used to decide how to sort relocs in an optimal manner for the
4405 dynamic linker, before writing them out. */
4406
4407static enum elf_reloc_type_class
7e612e98
AM
4408elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4409 const asection *rel_sec ATTRIBUTE_UNUSED,
4410 const Elf_Internal_Rela *rela)
98ceb8ce 4411{
9b52905e 4412 /* Handle TLS relocs first; we don't want them to be marked
cf35638d 4413 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
9b52905e
NC
4414 check below. */
4415 switch ((int) ELF32_R_TYPE (rela->r_info))
4416 {
4417 case R_PARISC_TLS_DTPMOD32:
4418 case R_PARISC_TLS_DTPOFF32:
4419 case R_PARISC_TLS_TPREL32:
4420 return reloc_class_normal;
4421 }
4422
cf35638d 4423 if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
98ceb8ce
AM
4424 return reloc_class_relative;
4425
4426 switch ((int) ELF32_R_TYPE (rela->r_info))
4427 {
4428 case R_PARISC_IPLT:
4429 return reloc_class_plt;
4430 case R_PARISC_COPY:
4431 return reloc_class_copy;
4432 default:
4433 return reloc_class_normal;
4434 }
4435}
4436
30667bf3
AM
4437/* Finish up the dynamic sections. */
4438
b34976b6 4439static bfd_boolean
c39a58e6
AM
4440elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4441 struct bfd_link_info *info)
30667bf3
AM
4442{
4443 bfd *dynobj;
83c81bfe 4444 struct elf32_hppa_link_hash_table *htab;
30667bf3 4445 asection *sdyn;
894891db 4446 asection * sgot;
30667bf3 4447
83c81bfe 4448 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
4449 if (htab == NULL)
4450 return FALSE;
4451
a63e02c7 4452 dynobj = htab->etab.dynobj;
30667bf3 4453
ce558b89 4454 sgot = htab->etab.sgot;
894891db
NC
4455 /* A broken linker script might have discarded the dynamic sections.
4456 Catch this here so that we do not seg-fault later on. */
4457 if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4458 return FALSE;
4459
3d4d4302 4460 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
30667bf3 4461
a63e02c7 4462 if (htab->etab.dynamic_sections_created)
30667bf3
AM
4463 {
4464 Elf32_External_Dyn *dyncon, *dynconend;
4465
49e9d0d3
AM
4466 if (sdyn == NULL)
4467 abort ();
30667bf3
AM
4468
4469 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 4470 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
30667bf3 4471 for (; dyncon < dynconend; dyncon++)
edd21aca 4472 {
30667bf3
AM
4473 Elf_Internal_Dyn dyn;
4474 asection *s;
4475
4476 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4477
4478 switch (dyn.d_tag)
4479 {
4480 default:
3ac8354b 4481 continue;
30667bf3
AM
4482
4483 case DT_PLTGOT:
4484 /* Use PLTGOT to set the GOT register. */
4485 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4486 break;
4487
4488 case DT_JMPREL:
ce558b89 4489 s = htab->etab.srelplt;
30667bf3 4490 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4491 break;
4492
4493 case DT_PLTRELSZ:
ce558b89 4494 s = htab->etab.srelplt;
eea6121a 4495 dyn.d_un.d_val = s->size;
30667bf3
AM
4496 break;
4497 }
3ac8354b
AM
4498
4499 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4500 }
252b5132 4501 }
edd21aca 4502
894891db 4503 if (sgot != NULL && sgot->size != 0)
30667bf3 4504 {
74d1c347
AM
4505 /* Fill in the first entry in the global offset table.
4506 We use it to point to our dynamic section, if we have one. */
30667bf3 4507 bfd_put_32 (output_bfd,
c39a58e6 4508 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
894891db 4509 sgot->contents);
30667bf3 4510
74d1c347 4511 /* The second entry is reserved for use by the dynamic linker. */
894891db 4512 memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4513
30667bf3 4514 /* Set .got entry size. */
894891db 4515 elf_section_data (sgot->output_section)
74d1c347 4516 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4517 }
4518
ce558b89 4519 if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
47d89dba 4520 {
f3c3938c
JDA
4521 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4522 plt stubs and as such the section does not hold a table of fixed-size
4523 entries. */
ce558b89 4524 elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
47d89dba 4525
83c81bfe 4526 if (htab->need_plt_stub)
47d89dba
AM
4527 {
4528 /* Set up the .plt stub. */
ce558b89
AM
4529 memcpy (htab->etab.splt->contents
4530 + htab->etab.splt->size - sizeof (plt_stub),
47d89dba
AM
4531 plt_stub, sizeof (plt_stub));
4532
ce558b89
AM
4533 if ((htab->etab.splt->output_offset
4534 + htab->etab.splt->output_section->vma
4535 + htab->etab.splt->size)
894891db
NC
4536 != (sgot->output_offset
4537 + sgot->output_section->vma))
47d89dba 4538 {
4eca0228 4539 _bfd_error_handler
47d89dba 4540 (_(".got section not immediately after .plt section"));
b34976b6 4541 return FALSE;
47d89dba
AM
4542 }
4543 }
4544 }
30667bf3 4545
b34976b6 4546 return TRUE;
30667bf3 4547}
252b5132 4548
30667bf3
AM
4549/* Called when writing out an object file to decide the type of a
4550 symbol. */
4551static int
c39a58e6 4552elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
30667bf3
AM
4553{
4554 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4555 return STT_PARISC_MILLI;
4556 else
4557 return type;
252b5132
RH
4558}
4559
4560/* Misc BFD support code. */
30667bf3
AM
4561#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4562#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
0c8d6e5c 4563#define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
30667bf3
AM
4564#define elf_info_to_howto elf_hppa_info_to_howto
4565#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4566
252b5132 4567/* Stuff for the BFD linker. */
c46b7515 4568#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4569#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
30667bf3 4570#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4571#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3 4572#define elf_backend_check_relocs elf32_hppa_check_relocs
c0e331c7 4573#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
30667bf3
AM
4574#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4575#define elf_backend_fake_sections elf_hppa_fake_sections
4576#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4577#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4578#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4579#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4580#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
74541ad4 4581#define elf_backend_init_index_section _bfd_elf_init_1_index_section
30667bf3 4582#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
edfc032f
AM
4583#define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4584#define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
30667bf3
AM
4585#define elf_backend_object_p elf32_hppa_object_p
4586#define elf_backend_final_write_processing elf_hppa_final_write_processing
4587#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4588#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
8a696751 4589#define elf_backend_action_discarded elf_hppa_action_discarded
30667bf3
AM
4590
4591#define elf_backend_can_gc_sections 1
51b64d56 4592#define elf_backend_can_refcount 1
30667bf3
AM
4593#define elf_backend_plt_alignment 2
4594#define elf_backend_want_got_plt 0
4595#define elf_backend_plt_readonly 0
4596#define elf_backend_want_plt_sym 0
74d1c347 4597#define elf_backend_got_header_size 8
5474d94f 4598#define elf_backend_want_dynrelro 1
f0fe0e16 4599#define elf_backend_rela_normal 1
64f52338 4600#define elf_backend_dtrel_excludes_plt 1
a8c75b76 4601#define elf_backend_no_page_alias 1
252b5132 4602
6d00b590 4603#define TARGET_BIG_SYM hppa_elf32_vec
252b5132
RH
4604#define TARGET_BIG_NAME "elf32-hppa"
4605#define ELF_ARCH bfd_arch_hppa
ae95ffa6 4606#define ELF_TARGET_ID HPPA32_ELF_DATA
252b5132
RH
4607#define ELF_MACHINE_CODE EM_PARISC
4608#define ELF_MAXPAGESIZE 0x1000
d1036acb 4609#define ELF_OSABI ELFOSABI_HPUX
914dfb0f 4610#define elf32_bed elf32_hppa_hpux_bed
252b5132
RH
4611
4612#include "elf32-target.h"
d952f17a
AM
4613
4614#undef TARGET_BIG_SYM
6d00b590 4615#define TARGET_BIG_SYM hppa_elf32_linux_vec
d952f17a 4616#undef TARGET_BIG_NAME
914dfb0f 4617#define TARGET_BIG_NAME "elf32-hppa-linux"
d1036acb 4618#undef ELF_OSABI
9c55345c 4619#define ELF_OSABI ELFOSABI_GNU
914dfb0f
DA
4620#undef elf32_bed
4621#define elf32_bed elf32_hppa_linux_bed
d952f17a 4622
d952f17a 4623#include "elf32-target.h"
225247f0
JT
4624
4625#undef TARGET_BIG_SYM
6d00b590 4626#define TARGET_BIG_SYM hppa_elf32_nbsd_vec
225247f0 4627#undef TARGET_BIG_NAME
914dfb0f 4628#define TARGET_BIG_NAME "elf32-hppa-netbsd"
d1036acb
L
4629#undef ELF_OSABI
4630#define ELF_OSABI ELFOSABI_NETBSD
914dfb0f
DA
4631#undef elf32_bed
4632#define elf32_bed elf32_hppa_netbsd_bed
225247f0
JT
4633
4634#include "elf32-target.h"
This page took 1.375919 seconds and 4 git commands to generate.