2002-04-04 Michael Snyder <msnyder@redhat.com>
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
e5094212
AM
2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
3 2002 Free Software Foundation, Inc.
252b5132 4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
edd21aca 35#include "elf32-hppa.h"
189c6563 36#include "elf-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
30667bf3 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
30667bf3 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
30667bf3
AM
144enum elf32_hppa_stub_type {
145 hppa_stub_long_branch,
146 hppa_stub_long_branch_shared,
147 hppa_stub_import,
148 hppa_stub_import_shared,
149 hppa_stub_export,
150 hppa_stub_none
151};
152
30667bf3 153struct elf32_hppa_stub_hash_entry {
252b5132 154
edd21aca 155 /* Base hash table entry structure. */
252b5132
RH
156 struct bfd_hash_entry root;
157
edd21aca
AM
158 /* The stub section. */
159 asection *stub_sec;
160
161 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 162 bfd_vma stub_offset;
252b5132
RH
163
164 /* Given the symbol's value and its section we can determine its final
165 value when building the stubs (so the stub knows where to jump. */
30667bf3 166 bfd_vma target_value;
252b5132 167 asection *target_section;
30667bf3
AM
168
169 enum elf32_hppa_stub_type stub_type;
170
171 /* The symbol table entry, if any, that this was derived from. */
172 struct elf32_hppa_link_hash_entry *h;
173
25f72752
AM
174 /* Where this stub is being called from, or, in the case of combined
175 stub sections, the first input section in the group. */
176 asection *id_sec;
252b5132
RH
177};
178
30667bf3
AM
179struct elf32_hppa_link_hash_entry {
180
181 struct elf_link_hash_entry elf;
182
183 /* A pointer to the most recently used stub hash entry against this
184 symbol. */
185 struct elf32_hppa_stub_hash_entry *stub_cache;
186
30667bf3
AM
187 /* Used to count relocations for delayed sizing of relocation
188 sections. */
189 struct elf32_hppa_dyn_reloc_entry {
190
191 /* Next relocation in the chain. */
192 struct elf32_hppa_dyn_reloc_entry *next;
193
98ceb8ce
AM
194 /* The input section of the reloc. */
195 asection *sec;
30667bf3
AM
196
197 /* Number of relocs copied in this section. */
198 bfd_size_type count;
98ceb8ce
AM
199
200#if RELATIVE_DYNRELOCS
201 /* Number of relative relocs copied for the input section. */
202 bfd_size_type relative_count;
203#endif
204 } *dyn_relocs;
30667bf3
AM
205
206 /* Set during a static link if we detect a function is PIC. */
12cca0d2
AM
207 unsigned int maybe_pic_call:1;
208
209 /* Set if the only reason we need a .plt entry is for a non-PIC to
210 PIC function call. */
74d1c347
AM
211 unsigned int pic_call:1;
212
213 /* Set if this symbol is used by a plabel reloc. */
214 unsigned int plabel:1;
30667bf3
AM
215};
216
30667bf3
AM
217struct elf32_hppa_link_hash_table {
218
252b5132 219 /* The main hash table. */
ebe50bae 220 struct elf_link_hash_table elf;
252b5132
RH
221
222 /* The stub hash table. */
edd21aca 223 struct bfd_hash_table stub_hash_table;
252b5132 224
30667bf3
AM
225 /* Linker stub bfd. */
226 bfd *stub_bfd;
227
30667bf3
AM
228 /* Linker call-backs. */
229 asection * (*add_stub_section) PARAMS ((const char *, asection *));
230 void (*layout_sections_again) PARAMS ((void));
231
25f72752
AM
232 /* Array to keep track of which stub sections have been created, and
233 information on stub grouping. */
234 struct map_stub {
235 /* This is the section to which stubs in the group will be
236 attached. */
237 asection *link_sec;
238 /* The stub section. */
239 asection *stub_sec;
25f72752 240 } *stub_group;
30667bf3 241
30667bf3
AM
242 /* Short-cuts to get to dynamic linker sections. */
243 asection *sgot;
244 asection *srelgot;
245 asection *splt;
246 asection *srelplt;
247 asection *sdynbss;
248 asection *srelbss;
47d89dba 249
c46b7515
AM
250 /* Used during a final link to store the base of the text and data
251 segments so that we can perform SEGREL relocations. */
252 bfd_vma text_segment_base;
253 bfd_vma data_segment_base;
254
47d89dba
AM
255 /* Whether we support multiple sub-spaces for shared libs. */
256 unsigned int multi_subspace:1;
257
258 /* Flags set when PCREL12F and PCREL17F branches detected. Used to
259 select suitable defaults for the stub group size. */
260 unsigned int has_12bit_branch:1;
261 unsigned int has_17bit_branch:1;
262
263 /* Set if we need a .plt stub to support lazy dynamic linking. */
264 unsigned int need_plt_stub:1;
ec338859
AM
265
266 /* Small local sym to section mapping cache. */
267 struct sym_sec_cache sym_sec;
252b5132
RH
268};
269
30667bf3
AM
270/* Various hash macros and functions. */
271#define hppa_link_hash_table(p) \
edd21aca 272 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 273
30667bf3
AM
274#define hppa_stub_hash_lookup(table, string, create, copy) \
275 ((struct elf32_hppa_stub_hash_entry *) \
276 bfd_hash_lookup ((table), (string), (create), (copy)))
277
278static struct bfd_hash_entry *stub_hash_newfunc
279 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 280
30667bf3 281static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 282 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
283
284static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
285 PARAMS ((bfd *));
286
30667bf3
AM
287/* Stub handling functions. */
288static char *hppa_stub_name
289 PARAMS ((const asection *, const asection *,
290 const struct elf32_hppa_link_hash_entry *,
291 const Elf_Internal_Rela *));
edd21aca 292
30667bf3
AM
293static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
294 PARAMS ((const asection *, const asection *,
295 struct elf32_hppa_link_hash_entry *,
25f72752
AM
296 const Elf_Internal_Rela *,
297 struct elf32_hppa_link_hash_table *));
edd21aca 298
30667bf3 299static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 300 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
301
302static enum elf32_hppa_stub_type hppa_type_of_stub
303 PARAMS ((asection *, const Elf_Internal_Rela *,
304 struct elf32_hppa_link_hash_entry *, bfd_vma));
305
306static boolean hppa_build_one_stub
307 PARAMS ((struct bfd_hash_entry *, PTR));
308
309static boolean hppa_size_one_stub
310 PARAMS ((struct bfd_hash_entry *, PTR));
311
30667bf3
AM
312/* BFD and elf backend functions. */
313static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 314
edd21aca
AM
315static boolean elf32_hppa_add_symbol_hook
316 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
317 const char **, flagword *, asection **, bfd_vma *));
252b5132 318
30667bf3
AM
319static boolean elf32_hppa_create_dynamic_sections
320 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 321
ebe50bae
AM
322static void elf32_hppa_copy_indirect_symbol
323 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
324
30667bf3
AM
325static boolean elf32_hppa_check_relocs
326 PARAMS ((bfd *, struct bfd_link_info *,
327 asection *, const Elf_Internal_Rela *));
328
329static asection *elf32_hppa_gc_mark_hook
330 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
331 struct elf_link_hash_entry *, Elf_Internal_Sym *));
332
333static boolean elf32_hppa_gc_sweep_hook
334 PARAMS ((bfd *, struct bfd_link_info *,
335 asection *, const Elf_Internal_Rela *));
336
74d1c347 337static void elf32_hppa_hide_symbol
e5094212 338 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, boolean));
74d1c347 339
30667bf3
AM
340static boolean elf32_hppa_adjust_dynamic_symbol
341 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
342
a8d02d66
AM
343static boolean mark_PIC_calls
344 PARAMS ((struct elf_link_hash_entry *, PTR));
345
e5ee5df1 346static boolean allocate_plt_static
30667bf3
AM
347 PARAMS ((struct elf_link_hash_entry *, PTR));
348
98ceb8ce
AM
349static boolean allocate_dynrelocs
350 PARAMS ((struct elf_link_hash_entry *, PTR));
351
352static boolean readonly_dynrelocs
30667bf3 353 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 354
d5c73c2f
AM
355static boolean clobber_millicode_symbols
356 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
357
30667bf3
AM
358static boolean elf32_hppa_size_dynamic_sections
359 PARAMS ((bfd *, struct bfd_link_info *));
360
c46b7515
AM
361static boolean elf32_hppa_final_link
362 PARAMS ((bfd *, struct bfd_link_info *));
363
364static void hppa_record_segment_addr
365 PARAMS ((bfd *, asection *, PTR));
366
30667bf3
AM
367static bfd_reloc_status_type final_link_relocate
368 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 369 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
370 struct elf32_hppa_link_hash_entry *));
371
372static boolean elf32_hppa_relocate_section
373 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
374 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
375
c46b7515
AM
376static int hppa_unwind_entry_compare
377 PARAMS ((const PTR, const PTR));
378
30667bf3
AM
379static boolean elf32_hppa_finish_dynamic_symbol
380 PARAMS ((bfd *, struct bfd_link_info *,
381 struct elf_link_hash_entry *, Elf_Internal_Sym *));
382
98ceb8ce
AM
383static enum elf_reloc_type_class elf32_hppa_reloc_type_class
384 PARAMS ((const Elf_Internal_Rela *));
385
30667bf3
AM
386static boolean elf32_hppa_finish_dynamic_sections
387 PARAMS ((bfd *, struct bfd_link_info *));
388
d952f17a
AM
389static void elf32_hppa_post_process_headers
390 PARAMS ((bfd *, struct bfd_link_info *));
391
30667bf3
AM
392static int elf32_hppa_elf_get_symbol_type
393 PARAMS ((Elf_Internal_Sym *, int));
252b5132 394
252b5132
RH
395/* Assorted hash table functions. */
396
397/* Initialize an entry in the stub hash table. */
398
399static struct bfd_hash_entry *
30667bf3 400stub_hash_newfunc (entry, table, string)
252b5132
RH
401 struct bfd_hash_entry *entry;
402 struct bfd_hash_table *table;
403 const char *string;
404{
252b5132
RH
405 /* Allocate the structure if it has not already been allocated by a
406 subclass. */
ebe50bae 407 if (entry == NULL)
30667bf3 408 {
ebe50bae
AM
409 entry = bfd_hash_allocate (table,
410 sizeof (struct elf32_hppa_stub_hash_entry));
411 if (entry == NULL)
412 return entry;
30667bf3 413 }
252b5132
RH
414
415 /* Call the allocation method of the superclass. */
ebe50bae
AM
416 entry = bfd_hash_newfunc (entry, table, string);
417 if (entry != NULL)
252b5132 418 {
ebe50bae
AM
419 struct elf32_hppa_stub_hash_entry *eh;
420
252b5132 421 /* Initialize the local fields. */
ebe50bae
AM
422 eh = (struct elf32_hppa_stub_hash_entry *) entry;
423 eh->stub_sec = NULL;
424 eh->stub_offset = 0;
425 eh->target_value = 0;
426 eh->target_section = NULL;
427 eh->stub_type = hppa_stub_long_branch;
428 eh->h = NULL;
429 eh->id_sec = NULL;
30667bf3
AM
430 }
431
ebe50bae 432 return entry;
30667bf3
AM
433}
434
30667bf3
AM
435/* Initialize an entry in the link hash table. */
436
437static struct bfd_hash_entry *
438hppa_link_hash_newfunc (entry, table, string)
439 struct bfd_hash_entry *entry;
440 struct bfd_hash_table *table;
441 const char *string;
442{
30667bf3
AM
443 /* Allocate the structure if it has not already been allocated by a
444 subclass. */
ebe50bae 445 if (entry == NULL)
30667bf3 446 {
ebe50bae
AM
447 entry = bfd_hash_allocate (table,
448 sizeof (struct elf32_hppa_link_hash_entry));
449 if (entry == NULL)
450 return entry;
30667bf3
AM
451 }
452
453 /* Call the allocation method of the superclass. */
ebe50bae
AM
454 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
455 if (entry != NULL)
30667bf3 456 {
ebe50bae
AM
457 struct elf32_hppa_link_hash_entry *eh;
458
30667bf3 459 /* Initialize the local fields. */
ebe50bae
AM
460 eh = (struct elf32_hppa_link_hash_entry *) entry;
461 eh->stub_cache = NULL;
462 eh->dyn_relocs = NULL;
463 eh->maybe_pic_call = 0;
464 eh->pic_call = 0;
465 eh->plabel = 0;
252b5132
RH
466 }
467
ebe50bae 468 return entry;
252b5132
RH
469}
470
252b5132
RH
471/* Create the derived linker hash table. The PA ELF port uses the derived
472 hash table to keep information specific to the PA ELF linker (without
473 using static variables). */
474
475static struct bfd_link_hash_table *
476elf32_hppa_link_hash_table_create (abfd)
477 bfd *abfd;
478{
479 struct elf32_hppa_link_hash_table *ret;
dc810e39 480 bfd_size_type amt = sizeof (*ret);
252b5132 481
dc810e39 482 ret = (struct elf32_hppa_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
483 if (ret == NULL)
484 return NULL;
edd21aca 485
ebe50bae 486 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132
RH
487 {
488 bfd_release (abfd, ret);
489 return NULL;
490 }
edd21aca
AM
491
492 /* Init the stub hash table too. */
30667bf3 493 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
494 return NULL;
495
30667bf3 496 ret->stub_bfd = NULL;
30667bf3
AM
497 ret->add_stub_section = NULL;
498 ret->layout_sections_again = NULL;
25f72752 499 ret->stub_group = NULL;
30667bf3
AM
500 ret->sgot = NULL;
501 ret->srelgot = NULL;
502 ret->splt = NULL;
503 ret->srelplt = NULL;
504 ret->sdynbss = NULL;
505 ret->srelbss = NULL;
c46b7515
AM
506 ret->text_segment_base = (bfd_vma) -1;
507 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
508 ret->multi_subspace = 0;
509 ret->has_12bit_branch = 0;
510 ret->has_17bit_branch = 0;
511 ret->need_plt_stub = 0;
ec338859 512 ret->sym_sec.abfd = NULL;
252b5132 513
ebe50bae 514 return &ret->elf.root;
252b5132
RH
515}
516
30667bf3
AM
517/* Build a name for an entry in the stub hash table. */
518
edd21aca 519static char *
30667bf3 520hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 521 const asection *input_section;
30667bf3
AM
522 const asection *sym_sec;
523 const struct elf32_hppa_link_hash_entry *hash;
524 const Elf_Internal_Rela *rel;
edd21aca
AM
525{
526 char *stub_name;
dc810e39 527 bfd_size_type len;
edd21aca 528
30667bf3
AM
529 if (hash)
530 {
531 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
532 stub_name = bfd_malloc (len);
533 if (stub_name != NULL)
534 {
535 sprintf (stub_name, "%08x_%s+%x",
536 input_section->id & 0xffffffff,
537 hash->elf.root.root.string,
538 (int) rel->r_addend & 0xffffffff);
539 }
540 }
541 else
edd21aca 542 {
30667bf3
AM
543 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
544 stub_name = bfd_malloc (len);
545 if (stub_name != NULL)
546 {
547 sprintf (stub_name, "%08x_%x:%x+%x",
548 input_section->id & 0xffffffff,
549 sym_sec->id & 0xffffffff,
550 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
551 (int) rel->r_addend & 0xffffffff);
552 }
edd21aca
AM
553 }
554 return stub_name;
555}
252b5132 556
30667bf3
AM
557/* Look up an entry in the stub hash. Stub entries are cached because
558 creating the stub name takes a bit of time. */
559
560static struct elf32_hppa_stub_hash_entry *
83c81bfe 561hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
562 const asection *input_section;
563 const asection *sym_sec;
564 struct elf32_hppa_link_hash_entry *hash;
565 const Elf_Internal_Rela *rel;
83c81bfe 566 struct elf32_hppa_link_hash_table *htab;
252b5132 567{
30667bf3 568 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
569 const asection *id_sec;
570
571 /* If this input section is part of a group of sections sharing one
572 stub section, then use the id of the first section in the group.
573 Stub names need to include a section id, as there may well be
574 more than one stub used to reach say, printf, and we need to
575 distinguish between them. */
83c81bfe 576 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 577
30667bf3
AM
578 if (hash != NULL && hash->stub_cache != NULL
579 && hash->stub_cache->h == hash
25f72752 580 && hash->stub_cache->id_sec == id_sec)
edd21aca 581 {
30667bf3
AM
582 stub_entry = hash->stub_cache;
583 }
584 else
585 {
30667bf3 586 char *stub_name;
edd21aca 587
25f72752 588 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
589 if (stub_name == NULL)
590 return NULL;
edd21aca 591
83c81bfe 592 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 593 stub_name, false, false);
f09ebc7d
AM
594 if (hash != NULL)
595 hash->stub_cache = stub_entry;
30667bf3
AM
596
597 free (stub_name);
edd21aca 598 }
30667bf3
AM
599
600 return stub_entry;
601}
602
30667bf3
AM
603/* Add a new stub entry to the stub hash. Not all fields of the new
604 stub entry are initialised. */
605
606static struct elf32_hppa_stub_hash_entry *
83c81bfe 607hppa_add_stub (stub_name, section, htab)
30667bf3
AM
608 const char *stub_name;
609 asection *section;
83c81bfe 610 struct elf32_hppa_link_hash_table *htab;
30667bf3 611{
25f72752 612 asection *link_sec;
30667bf3 613 asection *stub_sec;
30667bf3 614 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 615
83c81bfe
AM
616 link_sec = htab->stub_group[section->id].link_sec;
617 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 618 if (stub_sec == NULL)
edd21aca 619 {
83c81bfe 620 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
621 if (stub_sec == NULL)
622 {
dc810e39 623 bfd_size_type len;
30667bf3
AM
624 char *s_name;
625
25f72752 626 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 627 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
628 if (s_name == NULL)
629 return NULL;
630
25f72752 631 strcpy (s_name, link_sec->name);
30667bf3 632 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 633 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
634 if (stub_sec == NULL)
635 return NULL;
83c81bfe 636 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 637 }
83c81bfe 638 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 639 }
252b5132 640
30667bf3 641 /* Enter this entry into the linker stub hash table. */
83c81bfe 642 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
643 true, false);
644 if (stub_entry == NULL)
645 {
646 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 647 bfd_archive_filename (section->owner),
30667bf3
AM
648 stub_name);
649 return NULL;
edd21aca
AM
650 }
651
30667bf3 652 stub_entry->stub_sec = stub_sec;
30667bf3 653 stub_entry->stub_offset = 0;
25f72752 654 stub_entry->id_sec = link_sec;
30667bf3 655 return stub_entry;
edd21aca
AM
656}
657
30667bf3
AM
658/* Determine the type of stub needed, if any, for a call. */
659
660static enum elf32_hppa_stub_type
661hppa_type_of_stub (input_sec, rel, hash, destination)
662 asection *input_sec;
663 const Elf_Internal_Rela *rel;
664 struct elf32_hppa_link_hash_entry *hash;
665 bfd_vma destination;
edd21aca 666{
edd21aca 667 bfd_vma location;
30667bf3
AM
668 bfd_vma branch_offset;
669 bfd_vma max_branch_offset;
670 unsigned int r_type;
671
672 if (hash != NULL
673 && (((hash->elf.root.type == bfd_link_hash_defined
74d1c347
AM
674 || hash->elf.root.type == bfd_link_hash_defweak)
675 && hash->elf.root.u.def.section->output_section == NULL)
676 || (hash->elf.root.type == bfd_link_hash_defweak
677 && hash->elf.dynindx != -1
678 && hash->elf.plt.offset != (bfd_vma) -1)
30667bf3
AM
679 || hash->elf.root.type == bfd_link_hash_undefweak
680 || hash->elf.root.type == bfd_link_hash_undefined
12cca0d2 681 || (hash->maybe_pic_call && !(input_sec->flags & SEC_HAS_GOT_REF))))
30667bf3
AM
682 {
683 /* If output_section is NULL, then it's a symbol defined in a
684 shared library. We will need an import stub. Decide between
74d1c347
AM
685 hppa_stub_import and hppa_stub_import_shared later. For
686 shared links we need stubs for undefined or weak syms too;
687 They will presumably be resolved by the dynamic linker. */
30667bf3
AM
688 return hppa_stub_import;
689 }
edd21aca 690
30667bf3
AM
691 /* Determine where the call point is. */
692 location = (input_sec->output_offset
693 + input_sec->output_section->vma
694 + rel->r_offset);
edd21aca 695
30667bf3
AM
696 branch_offset = destination - location - 8;
697 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 698
30667bf3
AM
699 /* Determine if a long branch stub is needed. parisc branch offsets
700 are relative to the second instruction past the branch, ie. +8
701 bytes on from the branch instruction location. The offset is
702 signed and counts in units of 4 bytes. */
703 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 704 {
30667bf3
AM
705 max_branch_offset = (1 << (17-1)) << 2;
706 }
707 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
708 {
709 max_branch_offset = (1 << (12-1)) << 2;
710 }
25f72752 711 else /* R_PARISC_PCREL22F. */
30667bf3
AM
712 {
713 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
714 }
715
30667bf3 716 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
717 return hppa_stub_long_branch;
718
30667bf3
AM
719 return hppa_stub_none;
720}
edd21aca 721
30667bf3
AM
722/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
723 IN_ARG contains the link info pointer. */
edd21aca 724
30667bf3
AM
725#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
726#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 727
30667bf3 728#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 729#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 730#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 731
3ee1d854
AM
732#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
733#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 734#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 735#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 736
3ee1d854
AM
737#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
738#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 739
30667bf3
AM
740#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
741#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
742#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
743#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 744
30667bf3
AM
745#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
746#define NOP 0x08000240 /* nop */
747#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
748#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
749#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 750
30667bf3
AM
751#ifndef R19_STUBS
752#define R19_STUBS 1
753#endif
edd21aca 754
30667bf3
AM
755#if R19_STUBS
756#define LDW_R1_DLT LDW_R1_R19
757#else
758#define LDW_R1_DLT LDW_R1_DP
759#endif
edd21aca 760
30667bf3
AM
761static boolean
762hppa_build_one_stub (gen_entry, in_arg)
763 struct bfd_hash_entry *gen_entry;
764 PTR in_arg;
765{
766 struct elf32_hppa_stub_hash_entry *stub_entry;
767 struct bfd_link_info *info;
83c81bfe 768 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
769 asection *stub_sec;
770 bfd *stub_bfd;
771 bfd_byte *loc;
772 bfd_vma sym_value;
74d1c347 773 bfd_vma insn;
8dea1268 774 bfd_vma off;
74d1c347 775 int val;
30667bf3 776 int size;
edd21aca 777
30667bf3
AM
778 /* Massage our args to the form they really have. */
779 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
780 info = (struct bfd_link_info *) in_arg;
781
83c81bfe 782 htab = hppa_link_hash_table (info);
30667bf3 783 stub_sec = stub_entry->stub_sec;
edd21aca 784
30667bf3 785 /* Make a note of the offset within the stubs for this entry. */
74d1c347 786 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 787 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 788
30667bf3
AM
789 stub_bfd = stub_sec->owner;
790
791 switch (stub_entry->stub_type)
792 {
793 case hppa_stub_long_branch:
794 /* Create the long branch. A long branch is formed with "ldil"
795 loading the upper bits of the target address into a register,
796 then branching with "be" which adds in the lower bits.
797 The "be" has its delay slot nullified. */
798 sym_value = (stub_entry->target_value
799 + stub_entry->target_section->output_offset
800 + stub_entry->target_section->output_section->vma);
801
74d1c347
AM
802 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
803 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
804 bfd_put_32 (stub_bfd, insn, loc);
805
74d1c347
AM
806 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
807 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
808 bfd_put_32 (stub_bfd, insn, loc + 4);
809
30667bf3 810 size = 8;
edd21aca
AM
811 break;
812
30667bf3
AM
813 case hppa_stub_long_branch_shared:
814 /* Branches are relative. This is where we are going to. */
815 sym_value = (stub_entry->target_value
816 + stub_entry->target_section->output_offset
817 + stub_entry->target_section->output_section->vma);
818
819 /* And this is where we are coming from, more or less. */
820 sym_value -= (stub_entry->stub_offset
821 + stub_sec->output_offset
822 + stub_sec->output_section->vma);
823
74d1c347 824 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 825 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 826 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
827 bfd_put_32 (stub_bfd, insn, loc + 4);
828
47d89dba 829 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 830 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
831 bfd_put_32 (stub_bfd, insn, loc + 8);
832 size = 12;
833 break;
edd21aca 834
30667bf3
AM
835 case hppa_stub_import:
836 case hppa_stub_import_shared:
8dea1268
AM
837 off = stub_entry->h->elf.plt.offset;
838 if (off >= (bfd_vma) -2)
49e9d0d3 839 abort ();
8dea1268
AM
840
841 off &= ~ (bfd_vma) 1;
842 sym_value = (off
83c81bfe
AM
843 + htab->splt->output_offset
844 + htab->splt->output_section->vma
845 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
846
847 insn = ADDIL_DP;
848#if R19_STUBS
849 if (stub_entry->stub_type == hppa_stub_import_shared)
850 insn = ADDIL_R19;
851#endif
47d89dba 852 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 853 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 854 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 855
47d89dba
AM
856 /* It is critical to use lrsel/rrsel here because we are using
857 two different offsets (+0 and +4) from sym_value. If we use
858 lsel/rsel then with unfortunate sym_values we will round
859 sym_value+4 up to the next 2k block leading to a mis-match
860 between the lsel and rsel value. */
861 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 862 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 863 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 864
83c81bfe 865 if (htab->multi_subspace)
30667bf3 866 {
47d89dba 867 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 868 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 869 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 870
74d1c347
AM
871 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
872 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
873 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
874 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 875
30667bf3
AM
876 size = 28;
877 }
878 else
879 {
74d1c347 880 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 881 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 882 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 883 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 884
30667bf3
AM
885 size = 16;
886 }
252b5132 887
30667bf3
AM
888 if (!info->shared
889 && stub_entry->h != NULL
890 && stub_entry->h->pic_call)
252b5132 891 {
30667bf3
AM
892 /* Build the .plt entry needed to call a PIC function from
893 statically linked code. We don't need any relocs. */
894 bfd *dynobj;
895 struct elf32_hppa_link_hash_entry *eh;
896 bfd_vma value;
252b5132 897
ebe50bae 898 dynobj = htab->elf.dynobj;
30667bf3 899 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 900
49e9d0d3
AM
901 if (eh->elf.root.type != bfd_link_hash_defined
902 && eh->elf.root.type != bfd_link_hash_defweak)
903 abort ();
252b5132 904
30667bf3
AM
905 value = (eh->elf.root.u.def.value
906 + eh->elf.root.u.def.section->output_offset
907 + eh->elf.root.u.def.section->output_section->vma);
252b5132 908
30667bf3 909 /* Fill in the entry in the procedure linkage table.
252b5132 910
30667bf3 911 The format of a plt entry is
74d1c347
AM
912 <funcaddr>
913 <__gp>. */
252b5132 914
83c81bfe
AM
915 bfd_put_32 (htab->splt->owner, value,
916 htab->splt->contents + off);
917 value = elf_gp (htab->splt->output_section->owner);
918 bfd_put_32 (htab->splt->owner, value,
919 htab->splt->contents + off + 4);
252b5132 920 }
30667bf3 921 break;
252b5132 922
30667bf3
AM
923 case hppa_stub_export:
924 /* Branches are relative. This is where we are going to. */
925 sym_value = (stub_entry->target_value
926 + stub_entry->target_section->output_offset
927 + stub_entry->target_section->output_section->vma);
252b5132 928
30667bf3
AM
929 /* And this is where we are coming from. */
930 sym_value -= (stub_entry->stub_offset
931 + stub_sec->output_offset
932 + stub_sec->output_section->vma);
edd21aca 933
30667bf3
AM
934 if (sym_value - 8 + 0x40000 >= 0x80000)
935 {
edd21aca 936 (*_bfd_error_handler)
30667bf3 937 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 938 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
939 stub_sec->name,
940 (long) stub_entry->stub_offset,
941 stub_entry->root.string);
942 bfd_set_error (bfd_error_bad_value);
edd21aca 943 return false;
252b5132 944 }
30667bf3 945
74d1c347
AM
946 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
947 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
30667bf3
AM
948 bfd_put_32 (stub_bfd, insn, loc);
949
74d1c347
AM
950 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
951 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
952 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
953 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
954 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
955
956 /* Point the function symbol at the stub. */
957 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 958 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
959
960 size = 24;
961 break;
962
963 default:
964 BFD_FAIL ();
965 return false;
252b5132
RH
966 }
967
74d1c347 968 stub_sec->_raw_size += size;
252b5132
RH
969 return true;
970}
971
30667bf3
AM
972#undef LDIL_R1
973#undef BE_SR4_R1
974#undef BL_R1
975#undef ADDIL_R1
976#undef DEPI_R1
977#undef ADDIL_DP
978#undef LDW_R1_R21
979#undef LDW_R1_DLT
980#undef LDW_R1_R19
981#undef ADDIL_R19
982#undef LDW_R1_DP
983#undef LDSID_R21_R1
984#undef MTSP_R1
985#undef BE_SR0_R21
986#undef STW_RP
987#undef BV_R0_R21
988#undef BL_RP
989#undef NOP
990#undef LDW_RP
991#undef LDSID_RP_R1
992#undef BE_SR0_RP
252b5132 993
30667bf3
AM
994/* As above, but don't actually build the stub. Just bump offset so
995 we know stub section sizes. */
996
997static boolean
998hppa_size_one_stub (gen_entry, in_arg)
999 struct bfd_hash_entry *gen_entry;
1000 PTR in_arg;
252b5132 1001{
30667bf3 1002 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1003 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1004 int size;
1005
1006 /* Massage our args to the form they really have. */
1007 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1008 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1009
1010 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1011 size = 8;
30667bf3
AM
1012 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1013 size = 12;
1014 else if (stub_entry->stub_type == hppa_stub_export)
1015 size = 24;
74d1c347 1016 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1017 {
83c81bfe 1018 if (htab->multi_subspace)
30667bf3
AM
1019 size = 28;
1020 else
1021 size = 16;
1022 }
252b5132 1023
74d1c347 1024 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1025 return true;
1026}
252b5132 1027
30667bf3
AM
1028/* Return nonzero if ABFD represents an HPPA ELF32 file.
1029 Additionally we set the default architecture and machine. */
1030
1031static boolean
1032elf32_hppa_object_p (abfd)
1033 bfd *abfd;
1034{
24a5e751
L
1035 Elf_Internal_Ehdr * i_ehdrp;
1036 unsigned int flags;
252b5132 1037
24a5e751
L
1038 i_ehdrp = elf_elfheader (abfd);
1039 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1040 {
1041 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1042 return false;
1043 }
1044 else
1045 {
1046 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1047 return false;
1048 }
1049
1050 flags = i_ehdrp->e_flags;
30667bf3
AM
1051 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1052 {
1053 case EFA_PARISC_1_0:
1054 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1055 case EFA_PARISC_1_1:
1056 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1057 case EFA_PARISC_2_0:
1058 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1059 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1060 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1061 }
1062 return true;
252b5132
RH
1063}
1064
252b5132
RH
1065/* Undo the generic ELF code's subtraction of section->vma from the
1066 value of each external symbol. */
1067
1068static boolean
1069elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1070 bfd *abfd ATTRIBUTE_UNUSED;
1071 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1072 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1073 const char **namep ATTRIBUTE_UNUSED;
1074 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1075 asection **secp;
1076 bfd_vma *valp;
1077{
1078 *valp += (*secp)->vma;
1079 return true;
1080}
1081
30667bf3
AM
1082/* Create the .plt and .got sections, and set up our hash table
1083 short-cuts to various dynamic sections. */
1084
1085static boolean
1086elf32_hppa_create_dynamic_sections (abfd, info)
1087 bfd *abfd;
1088 struct bfd_link_info *info;
252b5132 1089{
83c81bfe 1090 struct elf32_hppa_link_hash_table *htab;
edd21aca 1091
30667bf3 1092 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1093 htab = hppa_link_hash_table (info);
1094 if (htab->splt != NULL)
30667bf3 1095 return true;
edd21aca 1096
30667bf3
AM
1097 /* Call the generic code to do most of the work. */
1098 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1099 return false;
252b5132 1100
83c81bfe
AM
1101 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1102 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1103
83c81bfe
AM
1104 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1105 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1106 if (htab->srelgot == NULL
1107 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1108 (SEC_ALLOC
1109 | SEC_LOAD
1110 | SEC_HAS_CONTENTS
1111 | SEC_IN_MEMORY
1112 | SEC_LINKER_CREATED
1113 | SEC_READONLY))
83c81bfe 1114 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1115 return false;
edd21aca 1116
83c81bfe
AM
1117 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1118 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1119
1120 return true;
1121}
1122
ebe50bae
AM
1123/* Copy the extra info we tack onto an elf_link_hash_entry. */
1124
51b64d56 1125static void
ebe50bae
AM
1126elf32_hppa_copy_indirect_symbol (dir, ind)
1127 struct elf_link_hash_entry *dir, *ind;
1128{
1129 struct elf32_hppa_link_hash_entry *edir, *eind;
1130
1131 edir = (struct elf32_hppa_link_hash_entry *) dir;
1132 eind = (struct elf32_hppa_link_hash_entry *) ind;
1133
bbd7ec4a 1134 if (eind->dyn_relocs != NULL)
ebe50bae 1135 {
bbd7ec4a
AM
1136 if (edir->dyn_relocs != NULL)
1137 {
1138 struct elf32_hppa_dyn_reloc_entry **pp;
1139 struct elf32_hppa_dyn_reloc_entry *p;
1140
1e370bd2 1141 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
1142 abort ();
1143
1144 /* Add reloc counts against the weak sym to the strong sym
1145 list. Merge any entries against the same section. */
1146 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1147 {
1148 struct elf32_hppa_dyn_reloc_entry *q;
1149
1150 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1151 if (q->sec == p->sec)
1152 {
1153#if RELATIVE_DYNRELOCS
1154 q->relative_count += p->relative_count;
1155#endif
1156 q->count += p->count;
1157 *pp = p->next;
1158 break;
1159 }
1160 if (q == NULL)
1161 pp = &p->next;
1162 }
1163 *pp = edir->dyn_relocs;
1164 }
1165
ebe50bae
AM
1166 edir->dyn_relocs = eind->dyn_relocs;
1167 eind->dyn_relocs = NULL;
1168 }
ebe50bae
AM
1169
1170 _bfd_elf_link_hash_copy_indirect (dir, ind);
1171}
1172
30667bf3 1173/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1174 calculate needed space in the global offset table, procedure linkage
1175 table, and dynamic reloc sections. At this point we haven't
1176 necessarily read all the input files. */
252b5132
RH
1177
1178static boolean
30667bf3
AM
1179elf32_hppa_check_relocs (abfd, info, sec, relocs)
1180 bfd *abfd;
1181 struct bfd_link_info *info;
1182 asection *sec;
1183 const Elf_Internal_Rela *relocs;
252b5132 1184{
30667bf3
AM
1185 Elf_Internal_Shdr *symtab_hdr;
1186 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1187 const Elf_Internal_Rela *rel;
1188 const Elf_Internal_Rela *rel_end;
83c81bfe 1189 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1190 asection *sreloc;
1191 asection *stubreloc;
1192
1193 if (info->relocateable)
1194 return true;
1195
83c81bfe 1196 htab = hppa_link_hash_table (info);
30667bf3
AM
1197 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1198 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1199 sreloc = NULL;
1200 stubreloc = NULL;
1201
1202 rel_end = relocs + sec->reloc_count;
1203 for (rel = relocs; rel < rel_end; rel++)
1204 {
1205 enum {
1206 NEED_GOT = 1,
1207 NEED_PLT = 2,
1208 NEED_DYNREL = 4,
98ceb8ce 1209 PLT_PLABEL = 8
30667bf3 1210 };
edd21aca 1211
30667bf3
AM
1212 unsigned int r_symndx, r_type;
1213 struct elf32_hppa_link_hash_entry *h;
1214 int need_entry;
252b5132 1215
30667bf3 1216 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1217
30667bf3
AM
1218 if (r_symndx < symtab_hdr->sh_info)
1219 h = NULL;
1220 else
1221 h = ((struct elf32_hppa_link_hash_entry *)
1222 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1223
30667bf3 1224 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1225
30667bf3
AM
1226 switch (r_type)
1227 {
1228 case R_PARISC_DLTIND14F:
1229 case R_PARISC_DLTIND14R:
1230 case R_PARISC_DLTIND21L:
1231 /* This symbol requires a global offset table entry. */
1232 need_entry = NEED_GOT;
1233
1234 /* Mark this section as containing PIC code. */
1235 sec->flags |= SEC_HAS_GOT_REF;
1236 break;
1237
1238 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1239 case R_PARISC_PLABEL21L:
1240 case R_PARISC_PLABEL32:
74d1c347 1241 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1242 if (rel->r_addend != 0)
1243 abort ();
74d1c347
AM
1244
1245 /* If we are creating a shared library, then we need to
1246 create a PLT entry for all PLABELs, because PLABELs with
1247 local symbols may be passed via a pointer to another
1248 object. Additionally, output a dynamic relocation
4dc86686
AM
1249 pointing to the PLT entry.
1250 For executables, the original 32-bit ABI allowed two
1251 different styles of PLABELs (function pointers): For
1252 global functions, the PLABEL word points into the .plt
1253 two bytes past a (function address, gp) pair, and for
1254 local functions the PLABEL points directly at the
1255 function. The magic +2 for the first type allows us to
1256 differentiate between the two. As you can imagine, this
1257 is a real pain when it comes to generating code to call
1258 functions indirectly or to compare function pointers.
1259 We avoid the mess by always pointing a PLABEL into the
1260 .plt, even for local functions. */
74d1c347 1261 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1262 break;
1263
1264 case R_PARISC_PCREL12F:
83c81bfe 1265 htab->has_12bit_branch = 1;
47d89dba 1266 /* Fall thru. */
30667bf3
AM
1267 case R_PARISC_PCREL17C:
1268 case R_PARISC_PCREL17F:
83c81bfe 1269 htab->has_17bit_branch = 1;
47d89dba 1270 /* Fall thru. */
30667bf3 1271 case R_PARISC_PCREL22F:
47d89dba
AM
1272 /* Function calls might need to go through the .plt, and
1273 might require long branch stubs. */
30667bf3
AM
1274 if (h == NULL)
1275 {
1276 /* We know local syms won't need a .plt entry, and if
1277 they need a long branch stub we can't guarantee that
1278 we can reach the stub. So just flag an error later
1279 if we're doing a shared link and find we need a long
1280 branch stub. */
1281 continue;
1282 }
1283 else
1284 {
1285 /* Global symbols will need a .plt entry if they remain
1286 global, and in most cases won't need a long branch
1287 stub. Unfortunately, we have to cater for the case
1288 where a symbol is forced local by versioning, or due
1289 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1290 need_entry = NEED_PLT;
4dc86686 1291 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1292 need_entry = 0;
30667bf3
AM
1293 }
1294 break;
1295
1296 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1297 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1298 case R_PARISC_PCREL14F: /* PC relative load/store. */
1299 case R_PARISC_PCREL14R:
1300 case R_PARISC_PCREL17R: /* External branches. */
1301 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1302 /* We don't need to propagate the relocation if linking a
1303 shared object since these are section relative. */
1304 continue;
1305
1306 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1307 case R_PARISC_DPREL14R:
1308 case R_PARISC_DPREL21L:
1309 if (info->shared)
1310 {
1311 (*_bfd_error_handler)
1312 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1313 bfd_archive_filename (abfd),
30667bf3
AM
1314 elf_hppa_howto_table[r_type].name);
1315 bfd_set_error (bfd_error_bad_value);
1316 return false;
1317 }
1318 /* Fall through. */
1319
1320 case R_PARISC_DIR17F: /* Used for external branches. */
1321 case R_PARISC_DIR17R:
47d89dba
AM
1322 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1323 case R_PARISC_DIR14R:
30667bf3
AM
1324 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1325#if 1
1326 /* Help debug shared library creation. Any of the above
1327 relocs can be used in shared libs, but they may cause
1328 pages to become unshared. */
1329 if (info->shared)
1330 {
1331 (*_bfd_error_handler)
1332 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1333 bfd_archive_filename (abfd),
30667bf3
AM
1334 elf_hppa_howto_table[r_type].name);
1335 }
1336 /* Fall through. */
1337#endif
1338
c46b7515 1339 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1340 /* We may want to output a dynamic relocation later. */
1341 need_entry = NEED_DYNREL;
1342 break;
1343
1344 /* This relocation describes the C++ object vtable hierarchy.
1345 Reconstruct it for later use during GC. */
1346 case R_PARISC_GNU_VTINHERIT:
1347 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1348 &h->elf, rel->r_offset))
1349 return false;
1350 continue;
1351
1352 /* This relocation describes which C++ vtable entries are actually
1353 used. Record for later use during GC. */
1354 case R_PARISC_GNU_VTENTRY:
1355 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1356 &h->elf, rel->r_addend))
30667bf3
AM
1357 return false;
1358 continue;
1359
1360 default:
1361 continue;
1362 }
1363
1364 /* Now carry out our orders. */
1365 if (need_entry & NEED_GOT)
1366 {
1367 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1368 relocation for this entry. */
83c81bfe 1369 if (htab->sgot == NULL)
30667bf3 1370 {
3ac8354b
AM
1371 if (htab->elf.dynobj == NULL)
1372 htab->elf.dynobj = abfd;
1373 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
30667bf3
AM
1374 return false;
1375 }
1376
1377 if (h != NULL)
1378 {
51b64d56 1379 h->elf.got.refcount += 1;
30667bf3
AM
1380 }
1381 else
1382 {
3ac8354b
AM
1383 bfd_signed_vma *local_got_refcounts;
1384
30667bf3 1385 /* This is a global offset table entry for a local symbol. */
3ac8354b 1386 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1387 if (local_got_refcounts == NULL)
1388 {
dc810e39 1389 bfd_size_type size;
30667bf3 1390
74d1c347
AM
1391 /* Allocate space for local got offsets and local
1392 plt offsets. Done this way to save polluting
1393 elf_obj_tdata with another target specific
1394 pointer. */
dc810e39
AM
1395 size = symtab_hdr->sh_info;
1396 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1397 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1398 bfd_zalloc (abfd, size));
30667bf3
AM
1399 if (local_got_refcounts == NULL)
1400 return false;
1401 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1402 }
ebe50bae 1403 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1404 }
1405 }
1406
1407 if (need_entry & NEED_PLT)
1408 {
1409 /* If we are creating a shared library, and this is a reloc
1410 against a weak symbol or a global symbol in a dynamic
1411 object, then we will be creating an import stub and a
1412 .plt entry for the symbol. Similarly, on a normal link
1413 to symbols defined in a dynamic object we'll need the
1414 import stub and a .plt entry. We don't know yet whether
1415 the symbol is defined or not, so make an entry anyway and
1416 clean up later in adjust_dynamic_symbol. */
1417 if ((sec->flags & SEC_ALLOC) != 0)
1418 {
74d1c347 1419 if (h != NULL)
30667bf3 1420 {
51b64d56
AM
1421 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1422 h->elf.plt.refcount += 1;
74d1c347 1423
36605136
AM
1424 /* If this .plt entry is for a plabel, mark it so
1425 that adjust_dynamic_symbol will keep the entry
1426 even if it appears to be local. */
74d1c347
AM
1427 if (need_entry & PLT_PLABEL)
1428 h->plabel = 1;
1429 }
1430 else if (need_entry & PLT_PLABEL)
1431 {
3ac8354b 1432 bfd_signed_vma *local_got_refcounts;
68fb2e56 1433 bfd_signed_vma *local_plt_refcounts;
74d1c347 1434
3ac8354b 1435 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1436 if (local_got_refcounts == NULL)
1437 {
dc810e39 1438 bfd_size_type size;
74d1c347
AM
1439
1440 /* Allocate space for local got offsets and local
1441 plt offsets. */
dc810e39
AM
1442 size = symtab_hdr->sh_info;
1443 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1444 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1445 bfd_zalloc (abfd, size));
74d1c347
AM
1446 if (local_got_refcounts == NULL)
1447 return false;
1448 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1449 }
68fb2e56
AM
1450 local_plt_refcounts = (local_got_refcounts
1451 + symtab_hdr->sh_info);
ebe50bae 1452 local_plt_refcounts[r_symndx] += 1;
30667bf3 1453 }
30667bf3
AM
1454 }
1455 }
1456
98ceb8ce 1457 if (need_entry & NEED_DYNREL)
30667bf3
AM
1458 {
1459 /* Flag this symbol as having a non-got, non-plt reference
1460 so that we generate copy relocs if it turns out to be
1461 dynamic. */
ebe50bae 1462 if (h != NULL && !info->shared)
30667bf3
AM
1463 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1464
1465 /* If we are creating a shared library then we need to copy
1466 the reloc into the shared library. However, if we are
1467 linking with -Bsymbolic, we need only copy absolute
1468 relocs or relocs against symbols that are not defined in
1469 an object we are including in the link. PC- or DP- or
1470 DLT-relative relocs against any local sym or global sym
1471 with DEF_REGULAR set, can be discarded. At this point we
1472 have not seen all the input files, so it is possible that
1473 DEF_REGULAR is not set now but will be set later (it is
1474 never cleared). We account for that possibility below by
98ceb8ce 1475 storing information in the dyn_relocs field of the
30667bf3
AM
1476 hash table entry.
1477
1478 A similar situation to the -Bsymbolic case occurs when
1479 creating shared libraries and symbol visibility changes
1480 render the symbol local.
1481
1482 As it turns out, all the relocs we will be creating here
1483 are absolute, so we cannot remove them on -Bsymbolic
1484 links or visibility changes anyway. A STUB_REL reloc
1485 is absolute too, as in that case it is the reloc in the
1486 stub we will be creating, rather than copying the PCREL
56882138
AM
1487 reloc in the branch.
1488
1489 If on the other hand, we are creating an executable, we
1490 may need to keep relocations for symbols satisfied by a
1491 dynamic library if we manage to avoid copy relocs for the
1492 symbol. */
446f2863
AM
1493 if ((info->shared
1494 && (sec->flags & SEC_ALLOC) != 0
1495 && (IS_ABSOLUTE_RELOC (r_type)
1496 || (h != NULL
1497 && (!info->symbolic
1498 || h->elf.root.type == bfd_link_hash_defweak
1499 || (h->elf.elf_link_hash_flags
1500 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1501 || (!info->shared
1502 && (sec->flags & SEC_ALLOC) != 0
1503 && h != NULL
446f2863
AM
1504 && (h->elf.root.type == bfd_link_hash_defweak
1505 || (h->elf.elf_link_hash_flags
1506 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1507 {
ec338859
AM
1508 struct elf32_hppa_dyn_reloc_entry *p;
1509 struct elf32_hppa_dyn_reloc_entry **head;
1510
30667bf3
AM
1511 /* Create a reloc section in dynobj and make room for
1512 this reloc. */
98ceb8ce 1513 if (sreloc == NULL)
30667bf3
AM
1514 {
1515 char *name;
3ac8354b 1516 bfd *dynobj;
30667bf3 1517
98ceb8ce
AM
1518 name = (bfd_elf_string_from_elf_section
1519 (abfd,
1520 elf_elfheader (abfd)->e_shstrndx,
1521 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1522 if (name == NULL)
1523 {
1524 (*_bfd_error_handler)
1525 (_("Could not find relocation section for %s"),
1526 sec->name);
1527 bfd_set_error (bfd_error_bad_value);
1528 return false;
1529 }
1530
3ac8354b
AM
1531 if (htab->elf.dynobj == NULL)
1532 htab->elf.dynobj = abfd;
1533
1534 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1535 sreloc = bfd_get_section_by_name (dynobj, name);
1536 if (sreloc == NULL)
30667bf3
AM
1537 {
1538 flagword flags;
1539
98ceb8ce 1540 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1541 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1542 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1543 if ((sec->flags & SEC_ALLOC) != 0)
1544 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1545 if (sreloc == NULL
1546 || !bfd_set_section_flags (dynobj, sreloc, flags)
1547 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1548 return false;
1549 }
30667bf3 1550
98ceb8ce 1551 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1552 }
1553
98ceb8ce
AM
1554 /* If this is a global symbol, we count the number of
1555 relocations we need for this symbol. */
1556 if (h != NULL)
30667bf3 1557 {
ec338859
AM
1558 head = &h->dyn_relocs;
1559 }
1560 else
1561 {
1562 /* Track dynamic relocs needed for local syms too.
1563 We really need local syms available to do this
1564 easily. Oh well. */
1565
1566 asection *s;
1567 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1568 sec, r_symndx);
1569 if (s == NULL)
1570 return false;
30667bf3 1571
ec338859
AM
1572 head = ((struct elf32_hppa_dyn_reloc_entry **)
1573 &elf_section_data (s)->local_dynrel);
1574 }
1575
1576 p = *head;
1577 if (p == NULL || p->sec != sec)
1578 {
1579 p = ((struct elf32_hppa_dyn_reloc_entry *)
1580 bfd_alloc (htab->elf.dynobj,
1581 (bfd_size_type) sizeof *p));
1582 if (p == NULL)
1583 return false;
1584 p->next = *head;
1585 *head = p;
1586 p->sec = sec;
1587 p->count = 0;
98ceb8ce 1588#if RELATIVE_DYNRELOCS
ec338859 1589 p->relative_count = 0;
98ceb8ce 1590#endif
ec338859 1591 }
98ceb8ce 1592
ec338859 1593 p->count += 1;
98ceb8ce 1594#if RELATIVE_DYNRELOCS
ec338859
AM
1595 if (!IS_ABSOLUTE_RELOC (rtype))
1596 p->relative_count += 1;
98ceb8ce 1597#endif
30667bf3
AM
1598 }
1599 }
1600 }
edd21aca
AM
1601
1602 return true;
1603}
1604
30667bf3
AM
1605/* Return the section that should be marked against garbage collection
1606 for a given relocation. */
1607
1608static asection *
1609elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1610 bfd *abfd;
1611 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1612 Elf_Internal_Rela *rel;
1613 struct elf_link_hash_entry *h;
1614 Elf_Internal_Sym *sym;
1615{
1616 if (h != NULL)
1617 {
1618 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1619 {
1620 case R_PARISC_GNU_VTINHERIT:
1621 case R_PARISC_GNU_VTENTRY:
1622 break;
1623
1624 default:
1625 switch (h->root.type)
1626 {
1627 case bfd_link_hash_defined:
1628 case bfd_link_hash_defweak:
1629 return h->root.u.def.section;
1630
1631 case bfd_link_hash_common:
1632 return h->root.u.c.p->section;
1633
1634 default:
1635 break;
1636 }
1637 }
1638 }
1639 else
1640 {
9ad5cbcf 1641 return bfd_section_from_elf_index (abfd, sym->st_shndx);
30667bf3
AM
1642 }
1643
1644 return NULL;
1645}
1646
30667bf3
AM
1647/* Update the got and plt entry reference counts for the section being
1648 removed. */
edd21aca
AM
1649
1650static boolean
30667bf3
AM
1651elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1652 bfd *abfd;
1653 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1654 asection *sec;
1655 const Elf_Internal_Rela *relocs;
edd21aca 1656{
30667bf3
AM
1657 Elf_Internal_Shdr *symtab_hdr;
1658 struct elf_link_hash_entry **sym_hashes;
1659 bfd_signed_vma *local_got_refcounts;
74d1c347 1660 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1661 const Elf_Internal_Rela *rel, *relend;
1662 unsigned long r_symndx;
1663 struct elf_link_hash_entry *h;
83c81bfe 1664 struct elf32_hppa_link_hash_table *htab;
30667bf3 1665 bfd *dynobj;
30667bf3 1666
ec338859 1667 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1668
30667bf3
AM
1669 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1670 sym_hashes = elf_sym_hashes (abfd);
1671 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1672 local_plt_refcounts = local_got_refcounts;
1673 if (local_plt_refcounts != NULL)
1674 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1675 htab = hppa_link_hash_table (info);
ebe50bae 1676 dynobj = htab->elf.dynobj;
30667bf3
AM
1677 if (dynobj == NULL)
1678 return true;
1679
30667bf3
AM
1680 relend = relocs + sec->reloc_count;
1681 for (rel = relocs; rel < relend; rel++)
1682 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1683 {
1684 case R_PARISC_DLTIND14F:
1685 case R_PARISC_DLTIND14R:
1686 case R_PARISC_DLTIND21L:
1687 r_symndx = ELF32_R_SYM (rel->r_info);
1688 if (r_symndx >= symtab_hdr->sh_info)
1689 {
1690 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1691 if (h->got.refcount > 0)
4dc86686 1692 h->got.refcount -= 1;
30667bf3
AM
1693 }
1694 else if (local_got_refcounts != NULL)
1695 {
1696 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1697 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1698 }
1699 break;
edd21aca 1700
30667bf3
AM
1701 case R_PARISC_PCREL12F:
1702 case R_PARISC_PCREL17C:
1703 case R_PARISC_PCREL17F:
1704 case R_PARISC_PCREL22F:
1705 r_symndx = ELF32_R_SYM (rel->r_info);
1706 if (r_symndx >= symtab_hdr->sh_info)
1707 {
1708 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1709 if (h->plt.refcount > 0)
1710 h->plt.refcount -= 1;
1711 }
1712 break;
edd21aca 1713
74d1c347
AM
1714 case R_PARISC_PLABEL14R:
1715 case R_PARISC_PLABEL21L:
1716 case R_PARISC_PLABEL32:
1717 r_symndx = ELF32_R_SYM (rel->r_info);
1718 if (r_symndx >= symtab_hdr->sh_info)
1719 {
98ceb8ce
AM
1720 struct elf32_hppa_link_hash_entry *eh;
1721 struct elf32_hppa_dyn_reloc_entry **pp;
1722 struct elf32_hppa_dyn_reloc_entry *p;
1723
74d1c347 1724 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1725
74d1c347
AM
1726 if (h->plt.refcount > 0)
1727 h->plt.refcount -= 1;
98ceb8ce
AM
1728
1729 eh = (struct elf32_hppa_link_hash_entry *) h;
1730
1731 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1732 if (p->sec == sec)
1733 {
1734#if RELATIVE_DYNRELOCS
1735 if (!IS_ABSOLUTE_RELOC (rtype))
1736 p->relative_count -= 1;
1737#endif
1738 p->count -= 1;
1739 if (p->count == 0)
1740 *pp = p->next;
1741 break;
1742 }
74d1c347
AM
1743 }
1744 else if (local_plt_refcounts != NULL)
1745 {
1746 if (local_plt_refcounts[r_symndx] > 0)
1747 local_plt_refcounts[r_symndx] -= 1;
1748 }
1749 break;
1750
98ceb8ce
AM
1751 case R_PARISC_DIR32:
1752 r_symndx = ELF32_R_SYM (rel->r_info);
1753 if (r_symndx >= symtab_hdr->sh_info)
1754 {
1755 struct elf32_hppa_link_hash_entry *eh;
1756 struct elf32_hppa_dyn_reloc_entry **pp;
1757 struct elf32_hppa_dyn_reloc_entry *p;
1758
1759 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1760
1761 eh = (struct elf32_hppa_link_hash_entry *) h;
1762
1763 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1764 if (p->sec == sec)
1765 {
1766#if RELATIVE_DYNRELOCS
1767 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1768 p->relative_count -= 1;
1769#endif
1770 p->count -= 1;
1771 if (p->count == 0)
1772 *pp = p->next;
1773 break;
1774 }
1775 }
1776 break;
1777
30667bf3
AM
1778 default:
1779 break;
1780 }
252b5132 1781
252b5132
RH
1782 return true;
1783}
1784
74d1c347
AM
1785/* Our own version of hide_symbol, so that we can keep plt entries for
1786 plabels. */
1787
1788static void
e5094212
AM
1789elf32_hppa_hide_symbol (info, h, force_local)
1790 struct bfd_link_info *info;
74d1c347 1791 struct elf_link_hash_entry *h;
e5094212 1792 boolean force_local;
74d1c347 1793{
e5094212
AM
1794 if (force_local)
1795 {
1796 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1797 if (h->dynindx != -1)
1798 {
1799 h->dynindx = -1;
1800 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1801 h->dynstr_index);
1802 }
1803 }
1804
74d1c347
AM
1805 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1806 {
1807 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1808 h->plt.offset = (bfd_vma) -1;
1809 }
1810}
1811
4dc86686
AM
1812/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1813 will be called from elflink.h. If elflink.h doesn't call our
1814 finish_dynamic_symbol routine, we'll need to do something about
1815 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1816#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1817 ((DYN) \
1818 && ((INFO)->shared \
1819 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1820 && ((H)->dynindx != -1 \
1821 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1822
30667bf3
AM
1823/* Adjust a symbol defined by a dynamic object and referenced by a
1824 regular object. The current definition is in some section of the
1825 dynamic object, but we're not including those sections. We have to
1826 change the definition to something the rest of the link can
1827 understand. */
252b5132 1828
30667bf3
AM
1829static boolean
1830elf32_hppa_adjust_dynamic_symbol (info, h)
1831 struct bfd_link_info *info;
1832 struct elf_link_hash_entry *h;
252b5132 1833{
83c81bfe 1834 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1835 struct elf32_hppa_link_hash_entry *eh;
1836 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1837 asection *s;
3ac8354b 1838 unsigned int power_of_two;
30667bf3
AM
1839
1840 /* If this is a function, put it in the procedure linkage table. We
1841 will fill in the contents of the procedure linkage table later,
1842 when we know the address of the .got section. */
1843 if (h->type == STT_FUNC
1844 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1845 {
12cca0d2
AM
1846 if (!info->shared
1847 && h->plt.refcount > 0
1848 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1849 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
1850 {
1851 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
1852 }
1853
30667bf3
AM
1854 if (h->plt.refcount <= 0
1855 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1856 && h->root.type != bfd_link_hash_defweak
74d1c347 1857 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1858 && (!info->shared || info->symbolic)))
1859 {
1860 /* The .plt entry is not needed when:
1861 a) Garbage collection has removed all references to the
1862 symbol, or
1863 b) We know for certain the symbol is defined in this
74d1c347
AM
1864 object, and it's not a weak definition, nor is the symbol
1865 used by a plabel relocation. Either this object is the
1866 application or we are doing a shared symbolic link. */
1867
1868 /* As a special sop to the hppa ABI, we keep a .plt entry
1869 for functions in sections containing PIC code. */
12cca0d2
AM
1870 if (((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call)
1871 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1872 else
1873 {
1874 h->plt.offset = (bfd_vma) -1;
1875 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1876 }
30667bf3 1877 }
4dc86686 1878
30667bf3
AM
1879 return true;
1880 }
bbd7ec4a
AM
1881 else
1882 h->plt.offset = (bfd_vma) -1;
edd21aca 1883
30667bf3
AM
1884 /* If this is a weak symbol, and there is a real definition, the
1885 processor independent code will have arranged for us to see the
1886 real definition first, and we can just use the same value. */
1887 if (h->weakdef != NULL)
edd21aca 1888 {
49e9d0d3
AM
1889 if (h->weakdef->root.type != bfd_link_hash_defined
1890 && h->weakdef->root.type != bfd_link_hash_defweak)
1891 abort ();
30667bf3
AM
1892 h->root.u.def.section = h->weakdef->root.u.def.section;
1893 h->root.u.def.value = h->weakdef->root.u.def.value;
0a991dfe 1894 return true;
30667bf3 1895 }
edd21aca 1896
30667bf3
AM
1897 /* This is a reference to a symbol defined by a dynamic object which
1898 is not a function. */
1899
1900 /* If we are creating a shared library, we must presume that the
1901 only references to the symbol are via the global offset table.
1902 For such cases we need not do anything here; the relocations will
1903 be handled correctly by relocate_section. */
1904 if (info->shared)
1905 return true;
1906
1907 /* If there are no references to this symbol that do not use the
1908 GOT, we don't need to generate a copy reloc. */
1909 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1910 return true;
1911
ebe50bae
AM
1912 eh = (struct elf32_hppa_link_hash_entry *) h;
1913 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1914 {
1915 s = p->sec->output_section;
1916 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1917 break;
1918 }
1919
1920 /* If we didn't find any dynamic relocs in read-only sections, then
1921 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1922 if (p == NULL)
1923 {
1924 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1925 return true;
1926 }
1927
30667bf3
AM
1928 /* We must allocate the symbol in our .dynbss section, which will
1929 become part of the .bss section of the executable. There will be
1930 an entry for this symbol in the .dynsym section. The dynamic
1931 object will contain position independent code, so all references
1932 from the dynamic object to this symbol will go through the global
1933 offset table. The dynamic linker will use the .dynsym entry to
1934 determine the address it must put in the global offset table, so
1935 both the dynamic object and the regular object will refer to the
1936 same memory location for the variable. */
1937
3ac8354b 1938 htab = hppa_link_hash_table (info);
30667bf3
AM
1939
1940 /* We must generate a COPY reloc to tell the dynamic linker to
1941 copy the initial value out of the dynamic object and into the
3ac8354b 1942 runtime process image. */
30667bf3
AM
1943 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1944 {
3ac8354b 1945 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1946 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1947 }
252b5132 1948
3ac8354b
AM
1949 /* We need to figure out the alignment required for this symbol. I
1950 have no idea how other ELF linkers handle this. */
30667bf3 1951
3ac8354b
AM
1952 power_of_two = bfd_log2 (h->size);
1953 if (power_of_two > 3)
1954 power_of_two = 3;
1955
1956 /* Apply the required alignment. */
1957 s = htab->sdynbss;
1958 s->_raw_size = BFD_ALIGN (s->_raw_size,
1959 (bfd_size_type) (1 << power_of_two));
1960 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1961 {
1962 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1963 return false;
1964 }
30667bf3 1965
30667bf3
AM
1966 /* Define the symbol as being at this point in the section. */
1967 h->root.u.def.section = s;
1968 h->root.u.def.value = s->_raw_size;
edd21aca 1969
30667bf3
AM
1970 /* Increment the section size to make room for the symbol. */
1971 s->_raw_size += h->size;
252b5132
RH
1972
1973 return true;
1974}
1975
30667bf3
AM
1976/* Called via elf_link_hash_traverse to create .plt entries for an
1977 application that uses statically linked PIC functions. Similar to
1978 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1979
30667bf3 1980static boolean
a8d02d66 1981mark_PIC_calls (h, inf)
30667bf3 1982 struct elf_link_hash_entry *h;
4dc86686 1983 PTR inf ATTRIBUTE_UNUSED;
252b5132 1984{
e92d460e
AM
1985 if (h->root.type == bfd_link_hash_warning)
1986 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1987
30667bf3
AM
1988 if (! (h->plt.refcount > 0
1989 && (h->root.type == bfd_link_hash_defined
1990 || h->root.type == bfd_link_hash_defweak)
1991 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 1992 {
30667bf3
AM
1993 h->plt.offset = (bfd_vma) -1;
1994 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1995 return true;
252b5132
RH
1996 }
1997
74d1c347 1998 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
12cca0d2 1999 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
30667bf3 2000 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 2001
4dc86686
AM
2002 return true;
2003}
2004
e5ee5df1
AM
2005/* Allocate space in the .plt for entries that won't have relocations.
2006 ie. pic_call and plabel entries. */
a8d02d66
AM
2007
2008static boolean
e5ee5df1 2009allocate_plt_static (h, inf)
a8d02d66
AM
2010 struct elf_link_hash_entry *h;
2011 PTR inf;
2012{
2013 struct bfd_link_info *info;
2014 struct elf32_hppa_link_hash_table *htab;
2015 asection *s;
2016
e92d460e 2017 if (h->root.type == bfd_link_hash_indirect)
a8d02d66
AM
2018 return true;
2019
e92d460e
AM
2020 if (h->root.type == bfd_link_hash_warning)
2021 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2022
a8d02d66
AM
2023 info = (struct bfd_link_info *) inf;
2024 htab = hppa_link_hash_table (info);
2025 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2026 {
e5ee5df1
AM
2027 /* Make an entry in the .plt section for non-pic code that is
2028 calling pic code. */
a8d02d66
AM
2029 s = htab->splt;
2030 h->plt.offset = s->_raw_size;
e5ee5df1
AM
2031 s->_raw_size += PLT_ENTRY_SIZE;
2032 }
2033 else if (htab->elf.dynamic_sections_created
2034 && h->plt.refcount > 0)
2035 {
2036 /* Make sure this symbol is output as a dynamic symbol.
2037 Undefined weak syms won't yet be marked as dynamic. */
2038 if (h->dynindx == -1
2039 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2040 && h->type != STT_PARISC_MILLI)
a8d02d66 2041 {
e5ee5df1
AM
2042 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2043 return false;
2044 }
2045
2046 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2047 {
2048 /* Allocate these later. */
2049 }
2050 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
2051 {
2052 /* Make an entry in the .plt section for plabel references
2053 that won't have a .plt entry for other reasons. */
2054 s = htab->splt;
2055 h->plt.offset = s->_raw_size;
2056 s->_raw_size += PLT_ENTRY_SIZE;
a8d02d66
AM
2057 }
2058 else
e5ee5df1
AM
2059 {
2060 /* No .plt entry needed. */
2061 h->plt.offset = (bfd_vma) -1;
2062 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2063 }
2064 }
2065 else
2066 {
2067 h->plt.offset = (bfd_vma) -1;
2068 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
2069 }
2070
2071 return true;
2072}
2073
4dc86686
AM
2074/* Allocate space in .plt, .got and associated reloc sections for
2075 global syms. */
2076
2077static boolean
98ceb8ce 2078allocate_dynrelocs (h, inf)
4dc86686
AM
2079 struct elf_link_hash_entry *h;
2080 PTR inf;
2081{
2082 struct bfd_link_info *info;
83c81bfe 2083 struct elf32_hppa_link_hash_table *htab;
4dc86686 2084 asection *s;
446f2863 2085 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 2086 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 2087
e92d460e 2088 if (h->root.type == bfd_link_hash_indirect)
73a74a62
AM
2089 return true;
2090
e92d460e
AM
2091 if (h->root.type == bfd_link_hash_warning)
2092 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2093
30667bf3 2094 info = (struct bfd_link_info *) inf;
83c81bfe 2095 htab = hppa_link_hash_table (info);
e5ee5df1
AM
2096 if (htab->elf.dynamic_sections_created
2097 && h->plt.offset != (bfd_vma) -1
2098 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call
2099 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
4dc86686 2100 {
e5ee5df1
AM
2101 /* Make an entry in the .plt section. */
2102 s = htab->splt;
2103 h->plt.offset = s->_raw_size;
2104 s->_raw_size += PLT_ENTRY_SIZE;
3ac8354b 2105
e5ee5df1
AM
2106 /* We also need to make an entry in the .rela.plt section. */
2107 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2108 htab->need_plt_stub = 1;
4dc86686 2109 }
edd21aca 2110
4dc86686
AM
2111 if (h->got.refcount > 0)
2112 {
446f2863
AM
2113 /* Make sure this symbol is output as a dynamic symbol.
2114 Undefined weak syms won't yet be marked as dynamic. */
2115 if (h->dynindx == -1
2116 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2117 && h->type != STT_PARISC_MILLI)
2118 {
2119 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2120 return false;
2121 }
2122
83c81bfe 2123 s = htab->sgot;
4dc86686
AM
2124 h->got.offset = s->_raw_size;
2125 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
2126 if (htab->elf.dynamic_sections_created
2127 && (info->shared
2128 || (h->dynindx != -1
2129 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
2130 {
2131 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
2132 }
4dc86686
AM
2133 }
2134 else
2135 h->got.offset = (bfd_vma) -1;
30667bf3 2136
446f2863 2137 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2138 if (eh->dyn_relocs == NULL)
446f2863 2139 return true;
30667bf3 2140
98ceb8ce
AM
2141 /* If this is a -Bsymbolic shared link, then we need to discard all
2142 space allocated for dynamic pc-relative relocs against symbols
2143 defined in a regular object. For the normal shared case, discard
2144 space for relocs that have become local due to symbol visibility
2145 changes. */
2146 if (info->shared)
446f2863 2147 {
98ceb8ce
AM
2148#if RELATIVE_DYNRELOCS
2149 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2150 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2151 || info->symbolic))
446f2863 2152 {
98ceb8ce 2153 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2154
98ceb8ce
AM
2155 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2156 {
2157 p->count -= p->relative_count;
2158 p->relative_count = 0;
2159 if (p->count == 0)
2160 *pp = p->next;
2161 else
2162 pp = &p->next;
2163 }
2164 }
2165#endif
446f2863 2166 }
98ceb8ce 2167 else
30667bf3 2168 {
98ceb8ce
AM
2169 /* For the non-shared case, discard space for relocs against
2170 symbols which turn out to need copy relocs or are not
2171 dynamic. */
2172 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2173 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2174 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2175 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2176 && (h->root.type == bfd_link_hash_undefweak
2177 || h->root.type == bfd_link_hash_undefined))))
2178 {
2179 /* Make sure this symbol is output as a dynamic symbol.
2180 Undefined weak syms won't yet be marked as dynamic. */
2181 if (h->dynindx == -1
2182 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2183 && h->type != STT_PARISC_MILLI)
2184 {
2185 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2186 return false;
2187 }
2188
2189 /* If that succeeded, we know we'll be keeping all the
2190 relocs. */
2191 if (h->dynindx != -1)
2192 goto keep;
2193 }
446f2863 2194
98ceb8ce
AM
2195 eh->dyn_relocs = NULL;
2196 return true;
2197
ec338859 2198 keep: ;
30667bf3 2199 }
30667bf3 2200
98ceb8ce
AM
2201 /* Finally, allocate space. */
2202 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2203 {
98ceb8ce
AM
2204 asection *sreloc = elf_section_data (p->sec)->sreloc;
2205 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2206 }
30667bf3
AM
2207
2208 return true;
2209}
30667bf3 2210
d5c73c2f
AM
2211/* This function is called via elf_link_hash_traverse to force
2212 millicode symbols local so they do not end up as globals in the
2213 dynamic symbol table. We ought to be able to do this in
2214 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2215 for all dynamic symbols. Arguably, this is a bug in
2216 elf_adjust_dynamic_symbol. */
2217
2218static boolean
2219clobber_millicode_symbols (h, info)
2220 struct elf_link_hash_entry *h;
2221 struct bfd_link_info *info;
2222{
e92d460e
AM
2223 if (h->root.type == bfd_link_hash_warning)
2224 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2225
142f8c94
AM
2226 if (h->type == STT_PARISC_MILLI
2227 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
e0522e89 2228 {
e5094212 2229 elf32_hppa_hide_symbol (info, h, true);
e0522e89 2230 }
d5c73c2f
AM
2231 return true;
2232}
2233
98ceb8ce
AM
2234/* Find any dynamic relocs that apply to read-only sections. */
2235
2236static boolean
2237readonly_dynrelocs (h, inf)
2238 struct elf_link_hash_entry *h;
2239 PTR inf;
2240{
2241 struct elf32_hppa_link_hash_entry *eh;
2242 struct elf32_hppa_dyn_reloc_entry *p;
2243
e92d460e
AM
2244 if (h->root.type == bfd_link_hash_warning)
2245 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2246
98ceb8ce
AM
2247 eh = (struct elf32_hppa_link_hash_entry *) h;
2248 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2249 {
2250 asection *s = p->sec->output_section;
2251
2252 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2253 {
2254 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2255
2256 info->flags |= DF_TEXTREL;
2257
2258 /* Not an error, just cut short the traversal. */
2259 return false;
2260 }
2261 }
2262 return true;
2263}
2264
30667bf3
AM
2265/* Set the sizes of the dynamic sections. */
2266
2267static boolean
2268elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2269 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2270 struct bfd_link_info *info;
2271{
83c81bfe 2272 struct elf32_hppa_link_hash_table *htab;
30667bf3 2273 bfd *dynobj;
98ceb8ce 2274 bfd *ibfd;
30667bf3
AM
2275 asection *s;
2276 boolean relocs;
30667bf3 2277
83c81bfe 2278 htab = hppa_link_hash_table (info);
ebe50bae 2279 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2280 if (dynobj == NULL)
2281 abort ();
30667bf3 2282
ebe50bae 2283 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2284 {
2285 /* Set the contents of the .interp section to the interpreter. */
2286 if (! info->shared)
2287 {
2288 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2289 if (s == NULL)
2290 abort ();
30667bf3
AM
2291 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2292 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2293 }
74d1c347 2294
d5c73c2f 2295 /* Force millicode symbols local. */
ebe50bae 2296 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2297 clobber_millicode_symbols,
2298 info);
68fb2e56
AM
2299 }
2300 else
2301 {
2302 /* Run through the function symbols, looking for any that are
a8d02d66
AM
2303 PIC, and mark them as needing .plt entries so that %r19 will
2304 be set up. */
68fb2e56 2305 if (! info->shared)
a8d02d66 2306 elf_link_hash_traverse (&htab->elf, mark_PIC_calls, (PTR) info);
68fb2e56 2307 }
d5c73c2f 2308
98ceb8ce
AM
2309 /* Set up .got and .plt offsets for local syms, and space for local
2310 dynamic relocs. */
2311 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2312 {
2313 bfd_signed_vma *local_got;
2314 bfd_signed_vma *end_local_got;
2315 bfd_signed_vma *local_plt;
2316 bfd_signed_vma *end_local_plt;
2317 bfd_size_type locsymcount;
2318 Elf_Internal_Shdr *symtab_hdr;
2319 asection *srel;
74d1c347 2320
98ceb8ce 2321 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2322 continue;
4dc86686 2323
98ceb8ce
AM
2324 for (s = ibfd->sections; s != NULL; s = s->next)
2325 {
ec338859 2326 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2327
ec338859
AM
2328 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2329 elf_section_data (s)->local_dynrel);
2330 p != NULL;
2331 p = p->next)
98ceb8ce 2332 {
ec338859
AM
2333 if (!bfd_is_abs_section (p->sec)
2334 && bfd_is_abs_section (p->sec->output_section))
2335 {
2336 /* Input section has been discarded, either because
2337 it is a copy of a linkonce section or due to
2338 linker script /DISCARD/, so we'll be discarding
2339 the relocs too. */
2340 }
248866a8 2341 else if (p->count != 0)
ec338859
AM
2342 {
2343 srel = elf_section_data (p->sec)->sreloc;
2344 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
248866a8
AM
2345 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2346 info->flags |= DF_TEXTREL;
ec338859 2347 }
98ceb8ce
AM
2348 }
2349 }
2350
2351 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2352 if (!local_got)
2353 continue;
74d1c347 2354
98ceb8ce 2355 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2356 locsymcount = symtab_hdr->sh_info;
2357 end_local_got = local_got + locsymcount;
83c81bfe
AM
2358 s = htab->sgot;
2359 srel = htab->srelgot;
68fb2e56
AM
2360 for (; local_got < end_local_got; ++local_got)
2361 {
2362 if (*local_got > 0)
4dc86686 2363 {
68fb2e56
AM
2364 *local_got = s->_raw_size;
2365 s->_raw_size += GOT_ENTRY_SIZE;
2366 if (info->shared)
2367 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2368 }
68fb2e56
AM
2369 else
2370 *local_got = (bfd_vma) -1;
2371 }
74d1c347 2372
68fb2e56
AM
2373 local_plt = end_local_got;
2374 end_local_plt = local_plt + locsymcount;
ebe50bae 2375 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2376 {
2377 /* Won't be used, but be safe. */
2378 for (; local_plt < end_local_plt; ++local_plt)
2379 *local_plt = (bfd_vma) -1;
2380 }
2381 else
2382 {
83c81bfe
AM
2383 s = htab->splt;
2384 srel = htab->srelplt;
74d1c347
AM
2385 for (; local_plt < end_local_plt; ++local_plt)
2386 {
2387 if (*local_plt > 0)
2388 {
74d1c347
AM
2389 *local_plt = s->_raw_size;
2390 s->_raw_size += PLT_ENTRY_SIZE;
2391 if (info->shared)
4dc86686 2392 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2393 }
2394 else
2395 *local_plt = (bfd_vma) -1;
2396 }
2397 }
30667bf3 2398 }
30667bf3 2399
e5ee5df1
AM
2400 /* Do all the .plt entries without relocs first. The dynamic linker
2401 uses the last .plt reloc to find the end of the .plt (and hence
2402 the start of the .got) for lazy linking. */
2403 elf_link_hash_traverse (&htab->elf, allocate_plt_static, (PTR) info);
a8d02d66 2404
98ceb8ce
AM
2405 /* Allocate global sym .plt and .got entries, and space for global
2406 sym dynamic relocs. */
ebe50bae 2407 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2408
2409 /* The check_relocs and adjust_dynamic_symbol entry points have
2410 determined the sizes of the various dynamic sections. Allocate
2411 memory for them. */
2412 relocs = false;
30667bf3
AM
2413 for (s = dynobj->sections; s != NULL; s = s->next)
2414 {
30667bf3
AM
2415 if ((s->flags & SEC_LINKER_CREATED) == 0)
2416 continue;
2417
83c81bfe 2418 if (s == htab->splt)
68fb2e56 2419 {
83c81bfe 2420 if (htab->need_plt_stub)
68fb2e56
AM
2421 {
2422 /* Make space for the plt stub at the end of the .plt
2423 section. We want this stub right at the end, up
2424 against the .got section. */
83c81bfe 2425 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2426 int pltalign = bfd_section_alignment (dynobj, s);
2427 bfd_size_type mask;
30667bf3 2428
68fb2e56
AM
2429 if (gotalign > pltalign)
2430 bfd_set_section_alignment (dynobj, s, gotalign);
2431 mask = ((bfd_size_type) 1 << gotalign) - 1;
2432 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2433 }
2434 }
83c81bfe 2435 else if (s == htab->sgot)
68fb2e56
AM
2436 ;
2437 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2438 {
2439 if (s->_raw_size != 0)
2440 {
4e12ff7f
AM
2441 /* Remember whether there are any reloc sections other
2442 than .rela.plt. */
2443 if (s != htab->srelplt)
2444 relocs = true;
47d89dba 2445
30667bf3
AM
2446 /* We use the reloc_count field as a counter if we need
2447 to copy relocs into the output file. */
2448 s->reloc_count = 0;
2449 }
2450 }
30667bf3
AM
2451 else
2452 {
2453 /* It's not one of our sections, so don't allocate space. */
2454 continue;
2455 }
2456
2457 if (s->_raw_size == 0)
2458 {
2459 /* If we don't need this section, strip it from the
2460 output file. This is mostly to handle .rela.bss and
2461 .rela.plt. We must create both sections in
2462 create_dynamic_sections, because they must be created
2463 before the linker maps input sections to output
2464 sections. The linker does that before
2465 adjust_dynamic_symbol is called, and it is that
2466 function which decides whether anything needs to go
2467 into these sections. */
2468 _bfd_strip_section_from_output (info, s);
2469 continue;
2470 }
2471
2472 /* Allocate memory for the section contents. Zero it, because
2473 we may not fill in all the reloc sections. */
2474 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2475 if (s->contents == NULL && s->_raw_size != 0)
2476 return false;
2477 }
2478
ebe50bae 2479 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2480 {
2481 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2482 actually has nothing to do with the PLT, it is how we
2483 communicate the LTP value of a load module to the dynamic
2484 linker. */
dc810e39
AM
2485#define add_dynamic_entry(TAG, VAL) \
2486 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2487
2488 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2489 return false;
2490
2491 /* Add some entries to the .dynamic section. We fill in the
2492 values later, in elf32_hppa_finish_dynamic_sections, but we
2493 must add the entries now so that we get the correct size for
2494 the .dynamic section. The DT_DEBUG entry is filled in by the
2495 dynamic linker and used by the debugger. */
dc810e39 2496 if (!info->shared)
30667bf3 2497 {
dc810e39 2498 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2499 return false;
2500 }
2501
83c81bfe 2502 if (htab->srelplt->_raw_size != 0)
30667bf3 2503 {
dc810e39
AM
2504 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2505 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2506 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2507 return false;
2508 }
2509
2510 if (relocs)
2511 {
dc810e39
AM
2512 if (!add_dynamic_entry (DT_RELA, 0)
2513 || !add_dynamic_entry (DT_RELASZ, 0)
2514 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2515 return false;
30667bf3 2516
98ceb8ce
AM
2517 /* If any dynamic relocs apply to a read-only section,
2518 then we need a DT_TEXTREL entry. */
248866a8
AM
2519 if ((info->flags & DF_TEXTREL) == 0)
2520 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2521 (PTR) info);
98ceb8ce
AM
2522
2523 if ((info->flags & DF_TEXTREL) != 0)
2524 {
2525 if (!add_dynamic_entry (DT_TEXTREL, 0))
2526 return false;
2527 }
30667bf3
AM
2528 }
2529 }
dc810e39 2530#undef add_dynamic_entry
30667bf3
AM
2531
2532 return true;
2533}
2534
30667bf3
AM
2535/* External entry points for sizing and building linker stubs. */
2536
2537/* Determine and set the size of the stub section for a final link.
2538
2539 The basic idea here is to examine all the relocations looking for
2540 PC-relative calls to a target that is unreachable with a "bl"
2541 instruction. */
2542
2543boolean
47d89dba 2544elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
30667bf3 2545 add_stub_section, layout_sections_again)
25f72752 2546 bfd *output_bfd;
30667bf3 2547 bfd *stub_bfd;
30667bf3 2548 struct bfd_link_info *info;
25f72752 2549 boolean multi_subspace;
47d89dba 2550 bfd_signed_vma group_size;
30667bf3
AM
2551 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2552 void (*layout_sections_again) PARAMS ((void));
2553{
2554 bfd *input_bfd;
2555 asection *section;
25f72752 2556 asection **input_list, **list;
30667bf3 2557 Elf_Internal_Sym *local_syms, **all_local_syms;
25f72752
AM
2558 unsigned int bfd_indx, bfd_count;
2559 int top_id, top_index;
83c81bfe 2560 struct elf32_hppa_link_hash_table *htab;
47d89dba
AM
2561 bfd_size_type stub_group_size;
2562 boolean stubs_always_before_branch;
30667bf3 2563 boolean stub_changed = 0;
25f72752 2564 boolean ret = 0;
dc810e39 2565 bfd_size_type amt;
30667bf3 2566
83c81bfe 2567 htab = hppa_link_hash_table (info);
30667bf3
AM
2568
2569 /* Stash our params away. */
83c81bfe
AM
2570 htab->stub_bfd = stub_bfd;
2571 htab->multi_subspace = multi_subspace;
2572 htab->add_stub_section = add_stub_section;
2573 htab->layout_sections_again = layout_sections_again;
47d89dba
AM
2574 stubs_always_before_branch = group_size < 0;
2575 if (group_size < 0)
2576 stub_group_size = -group_size;
2577 else
2578 stub_group_size = group_size;
2579 if (stub_group_size == 1)
2580 {
2581 /* Default values. */
a248e267 2582 stub_group_size = 7680000;
83c81bfe 2583 if (htab->has_17bit_branch || htab->multi_subspace)
a248e267 2584 stub_group_size = 240000;
83c81bfe 2585 if (htab->has_12bit_branch)
a248e267 2586 stub_group_size = 7500;
47d89dba 2587 }
30667bf3 2588
1badb539
AM
2589 /* Count the number of input BFDs and find the top input section id. */
2590 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2591 input_bfd != NULL;
2592 input_bfd = input_bfd->link_next)
2593 {
2594 bfd_count += 1;
25f72752
AM
2595 for (section = input_bfd->sections;
2596 section != NULL;
2597 section = section->next)
2598 {
2599 if (top_id < section->id)
2600 top_id = section->id;
2601 }
30667bf3
AM
2602 }
2603
dc810e39 2604 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2605 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2606 if (htab->stub_group == NULL)
30667bf3
AM
2607 return false;
2608
1badb539
AM
2609 /* Make a list of input sections for each output section included in
2610 the link.
2611
2612 We can't use output_bfd->section_count here to find the top output
2613 section index as some sections may have been removed, and
2614 _bfd_strip_section_from_output doesn't renumber the indices. */
2615 for (section = output_bfd->sections, top_index = 0;
2616 section != NULL;
2617 section = section->next)
2618 {
2619 if (top_index < section->index)
2620 top_index = section->index;
2621 }
2622
dc810e39
AM
2623 amt = sizeof (asection *) * (top_index + 1);
2624 input_list = (asection **) bfd_malloc (amt);
25f72752
AM
2625 if (input_list == NULL)
2626 return false;
2627
1badb539
AM
2628 /* For sections we aren't interested in, mark their entries with a
2629 value we can check later. */
2630 list = input_list + top_index;
2631 do
2632 *list = bfd_abs_section_ptr;
2633 while (list-- != input_list);
2634
2635 for (section = output_bfd->sections;
2636 section != NULL;
2637 section = section->next)
2638 {
47d89dba 2639 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2640 input_list[section->index] = NULL;
2641 }
2642
2643 /* Now actually build the lists. */
25f72752
AM
2644 for (input_bfd = info->input_bfds;
2645 input_bfd != NULL;
2646 input_bfd = input_bfd->link_next)
2647 {
2648 for (section = input_bfd->sections;
2649 section != NULL;
2650 section = section->next)
2651 {
2652 if (section->output_section != NULL
1badb539
AM
2653 && section->output_section->owner == output_bfd
2654 && section->output_section->index <= top_index)
25f72752
AM
2655 {
2656 list = input_list + section->output_section->index;
1badb539
AM
2657 if (*list != bfd_abs_section_ptr)
2658 {
2659 /* Steal the link_sec pointer for our list. */
83c81bfe 2660#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
1badb539
AM
2661 /* This happens to make the list in reverse order,
2662 which is what we want. */
2663 PREV_SEC (section) = *list;
2664 *list = section;
2665 }
25f72752
AM
2666 }
2667 }
2668 }
2669
2670 /* See whether we can group stub sections together. Grouping stub
2671 sections may result in fewer stubs. More importantly, we need to
2672 put all .init* and .fini* stubs at the beginning of the .init or
2673 .fini output sections respectively, because glibc splits the
2674 _init and _fini functions into multiple parts. Putting a stub in
2675 the middle of a function is not a good idea. */
a017a724 2676 list = input_list + top_index;
1badb539 2677 do
25f72752
AM
2678 {
2679 asection *tail = *list;
1badb539
AM
2680 if (tail == bfd_abs_section_ptr)
2681 continue;
25f72752
AM
2682 while (tail != NULL)
2683 {
2684 asection *curr;
2685 asection *prev;
2686 bfd_size_type total;
2687
2688 curr = tail;
2689 if (tail->_cooked_size)
2690 total = tail->_cooked_size;
2691 else
2692 total = tail->_raw_size;
2693 while ((prev = PREV_SEC (curr)) != NULL
2694 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2695 < stub_group_size))
25f72752
AM
2696 curr = prev;
2697
2698 /* OK, the size from the start of CURR to the end is less
a248e267 2699 than 240000 bytes and thus can be handled by one stub
25f72752 2700 section. (or the tail section is itself larger than
a248e267 2701 240000 bytes, in which case we may be toast.)
25f72752
AM
2702 We should really be keeping track of the total size of
2703 stubs added here, as stubs contribute to the final output
2704 section size. That's a little tricky, and this way will
a248e267
AM
2705 only break if stubs added total more than 22144 bytes, or
2706 2768 long branch stubs. It seems unlikely for more than
2707 2768 different functions to be called, especially from
2708 code only 240000 bytes long. This limit used to be
2709 250000, but c++ code tends to generate lots of little
2710 functions, and sometimes violated the assumption. */
25f72752
AM
2711 do
2712 {
2713 prev = PREV_SEC (tail);
2714 /* Set up this stub group. */
83c81bfe 2715 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2716 }
2717 while (tail != curr && (tail = prev) != NULL);
2718
a248e267 2719 /* But wait, there's more! Input sections up to 240000
25f72752 2720 bytes before the stub section can be handled by it too. */
47d89dba 2721 if (!stubs_always_before_branch)
25f72752 2722 {
47d89dba
AM
2723 total = 0;
2724 while (prev != NULL
2725 && ((total += tail->output_offset - prev->output_offset)
2726 < stub_group_size))
2727 {
2728 tail = prev;
2729 prev = PREV_SEC (tail);
83c81bfe 2730 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2731 }
25f72752
AM
2732 }
2733 tail = prev;
2734 }
2735 }
1badb539 2736 while (list-- != input_list);
25f72752 2737 free (input_list);
1badb539 2738#undef PREV_SEC
30667bf3
AM
2739
2740 /* We want to read in symbol extension records only once. To do this
2741 we need to read in the local symbols in parallel and save them for
2742 later use; so hold pointers to the local symbols in an array. */
dc810e39
AM
2743 amt = sizeof (Elf_Internal_Sym *) * bfd_count;
2744 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
30667bf3 2745 if (all_local_syms == NULL)
25f72752 2746 return false;
30667bf3
AM
2747
2748 /* Walk over all the input BFDs, swapping in local symbols.
2749 If we are creating a shared library, create hash entries for the
2750 export stubs. */
25f72752 2751 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2752 input_bfd != NULL;
25f72752 2753 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2754 {
2755 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 2756 Elf_Internal_Shdr *shndx_hdr;
30667bf3 2757 Elf_Internal_Sym *isym;
25f72752 2758 Elf32_External_Sym *ext_syms, *esym, *end_sy;
9ad5cbcf 2759 Elf_External_Sym_Shndx *shndx_buf, *shndx;
dc810e39 2760 bfd_size_type sec_size;
edd21aca 2761
252b5132
RH
2762 /* We'll need the symbol table in a second. */
2763 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2764 if (symtab_hdr->sh_info == 0)
2765 continue;
2766
edd21aca
AM
2767 /* We need an array of the local symbols attached to the input bfd.
2768 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2769 sec_size = symtab_hdr->sh_info;
2770 sec_size *= sizeof (Elf_Internal_Sym);
2771 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca 2772 if (local_syms == NULL)
9ad5cbcf
AM
2773 goto error_ret_free_local;
2774
25f72752 2775 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2776 sec_size = symtab_hdr->sh_info;
2777 sec_size *= sizeof (Elf32_External_Sym);
2778 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca 2779 if (ext_syms == NULL)
9ad5cbcf 2780 goto error_ret_free_local;
edd21aca
AM
2781
2782 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf 2783 || bfd_bread ((PTR) ext_syms, sec_size, input_bfd) != sec_size)
edd21aca 2784 {
9ad5cbcf 2785 error_ret_free_ext_syms:
edd21aca
AM
2786 free (ext_syms);
2787 goto error_ret_free_local;
2788 }
2789
9ad5cbcf
AM
2790 shndx_buf = NULL;
2791 shndx_hdr = &elf_tdata (input_bfd)->symtab_shndx_hdr;
2792 if (shndx_hdr->sh_size != 0)
2793 {
2794 sec_size = symtab_hdr->sh_info;
2795 sec_size *= sizeof (Elf_External_Sym_Shndx);
2796 shndx_buf = (Elf_External_Sym_Shndx *) bfd_malloc (sec_size);
2797 if (shndx_buf == NULL)
2798 goto error_ret_free_ext_syms;
2799
2800 if (bfd_seek (input_bfd, shndx_hdr->sh_offset, SEEK_SET) != 0
2801 || bfd_bread ((PTR) shndx_buf, sec_size, input_bfd) != sec_size)
2802 {
2803 free (shndx_buf);
2804 goto error_ret_free_ext_syms;
2805 }
2806 }
2807
edd21aca 2808 /* Swap the local symbols in. */
9ad5cbcf
AM
2809 for (esym = ext_syms, end_sy = esym + symtab_hdr->sh_info,
2810 isym = local_syms, shndx = shndx_buf;
2811 esym < end_sy;
2812 esym++, isym++, shndx = (shndx ? shndx + 1 : NULL))
2813 bfd_elf32_swap_symbol_in (input_bfd, esym, shndx, isym);
edd21aca
AM
2814
2815 /* Now we can free the external symbols. */
9ad5cbcf 2816 free (shndx_buf);
edd21aca 2817 free (ext_syms);
edd21aca 2818
83c81bfe 2819 if (info->shared && htab->multi_subspace)
30667bf3 2820 {
25f72752
AM
2821 struct elf_link_hash_entry **sym_hashes;
2822 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2823 unsigned int symcount;
2824
2825 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2826 - symtab_hdr->sh_info);
25f72752
AM
2827 sym_hashes = elf_sym_hashes (input_bfd);
2828 end_hashes = sym_hashes + symcount;
30667bf3
AM
2829
2830 /* Look through the global syms for functions; We need to
2831 build export stubs for all globally visible functions. */
25f72752 2832 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2833 {
2834 struct elf32_hppa_link_hash_entry *hash;
2835
25f72752 2836 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2837
2838 while (hash->elf.root.type == bfd_link_hash_indirect
2839 || hash->elf.root.type == bfd_link_hash_warning)
2840 hash = ((struct elf32_hppa_link_hash_entry *)
2841 hash->elf.root.u.i.link);
2842
2843 /* At this point in the link, undefined syms have been
2844 resolved, so we need to check that the symbol was
2845 defined in this BFD. */
2846 if ((hash->elf.root.type == bfd_link_hash_defined
2847 || hash->elf.root.type == bfd_link_hash_defweak)
2848 && hash->elf.type == STT_FUNC
2849 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2850 && (hash->elf.root.u.def.section->output_section->owner
2851 == output_bfd)
30667bf3
AM
2852 && hash->elf.root.u.def.section->owner == input_bfd
2853 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2854 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2855 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2856 {
2857 asection *sec;
2858 const char *stub_name;
2859 struct elf32_hppa_stub_hash_entry *stub_entry;
2860
2861 sec = hash->elf.root.u.def.section;
2862 stub_name = hash->elf.root.root.string;
83c81bfe 2863 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2864 stub_name,
2865 false, false);
2866 if (stub_entry == NULL)
2867 {
83c81bfe 2868 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3
AM
2869 if (!stub_entry)
2870 goto error_ret_free_local;
2871
2872 stub_entry->target_value = hash->elf.root.u.def.value;
2873 stub_entry->target_section = hash->elf.root.u.def.section;
2874 stub_entry->stub_type = hppa_stub_export;
2875 stub_entry->h = hash;
2876 stub_changed = 1;
2877 }
2878 else
2879 {
2880 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2881 bfd_archive_filename (input_bfd),
2882 stub_name);
30667bf3
AM
2883 }
2884 }
2885 }
30667bf3
AM
2886 }
2887 }
edd21aca
AM
2888
2889 while (1)
2890 {
30667bf3
AM
2891 asection *stub_sec;
2892
25f72752 2893 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2894 input_bfd != NULL;
25f72752 2895 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2896 {
2897 Elf_Internal_Shdr *symtab_hdr;
2898
2899 /* We'll need the symbol table in a second. */
2900 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2901 if (symtab_hdr->sh_info == 0)
2902 continue;
2903
25f72752 2904 local_syms = all_local_syms[bfd_indx];
30667bf3
AM
2905
2906 /* Walk over each section attached to the input bfd. */
2907 for (section = input_bfd->sections;
2908 section != NULL;
25f72752 2909 section = section->next)
30667bf3
AM
2910 {
2911 Elf_Internal_Shdr *input_rel_hdr;
2912 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2913 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2914
2915 /* If there aren't any relocs, then there's nothing more
2916 to do. */
2917 if ((section->flags & SEC_RELOC) == 0
2918 || section->reloc_count == 0)
2919 continue;
2920
25f72752
AM
2921 /* If this section is a link-once section that will be
2922 discarded, then don't create any stubs. */
2923 if (section->output_section == NULL
2924 || section->output_section->owner != output_bfd)
2925 continue;
2926
30667bf3 2927 /* Allocate space for the external relocations. */
dc810e39
AM
2928 amt = section->reloc_count;
2929 amt *= sizeof (Elf32_External_Rela);
2930 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
2931 if (external_relocs == NULL)
2932 {
2933 goto error_ret_free_local;
2934 }
2935
2936 /* Likewise for the internal relocations. */
dc810e39
AM
2937 amt = section->reloc_count;
2938 amt *= sizeof (Elf_Internal_Rela);
2939 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
2940 if (internal_relocs == NULL)
2941 {
2942 free (external_relocs);
2943 goto error_ret_free_local;
2944 }
2945
2946 /* Read in the external relocs. */
2947 input_rel_hdr = &elf_section_data (section)->rel_hdr;
2948 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf
AM
2949 || bfd_bread ((PTR) external_relocs,
2950 input_rel_hdr->sh_size,
2951 input_bfd) != input_rel_hdr->sh_size)
30667bf3
AM
2952 {
2953 free (external_relocs);
2954 error_ret_free_internal:
2955 free (internal_relocs);
2956 goto error_ret_free_local;
2957 }
2958
2959 /* Swap in the relocs. */
2960 erela = external_relocs;
2961 erelaend = erela + section->reloc_count;
2962 irela = internal_relocs;
2963 for (; erela < erelaend; erela++, irela++)
2964 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
2965
2966 /* We're done with the external relocs, free them. */
2967 free (external_relocs);
2968
2969 /* Now examine each relocation. */
2970 irela = internal_relocs;
2971 irelaend = irela + section->reloc_count;
2972 for (; irela < irelaend; irela++)
2973 {
2974 unsigned int r_type, r_indx;
2975 enum elf32_hppa_stub_type stub_type;
2976 struct elf32_hppa_stub_hash_entry *stub_entry;
2977 asection *sym_sec;
2978 bfd_vma sym_value;
2979 bfd_vma destination;
2980 struct elf32_hppa_link_hash_entry *hash;
2981 char *stub_name;
25f72752 2982 const asection *id_sec;
30667bf3
AM
2983
2984 r_type = ELF32_R_TYPE (irela->r_info);
2985 r_indx = ELF32_R_SYM (irela->r_info);
2986
2987 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2988 {
2989 bfd_set_error (bfd_error_bad_value);
2990 goto error_ret_free_internal;
2991 }
2992
2993 /* Only look for stubs on call instructions. */
2994 if (r_type != (unsigned int) R_PARISC_PCREL12F
2995 && r_type != (unsigned int) R_PARISC_PCREL17F
2996 && r_type != (unsigned int) R_PARISC_PCREL22F)
2997 continue;
2998
2999 /* Now determine the call target, its name, value,
3000 section. */
3001 sym_sec = NULL;
3002 sym_value = 0;
3003 destination = 0;
3004 hash = NULL;
3005 if (r_indx < symtab_hdr->sh_info)
3006 {
3007 /* It's a local symbol. */
3008 Elf_Internal_Sym *sym;
3009 Elf_Internal_Shdr *hdr;
3010
3011 sym = local_syms + r_indx;
3012 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
3013 sym_sec = hdr->bfd_section;
3014 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3015 sym_value = sym->st_value;
3016 destination = (sym_value + irela->r_addend
3017 + sym_sec->output_offset
3018 + sym_sec->output_section->vma);
3019 }
3020 else
3021 {
3022 /* It's an external symbol. */
3023 int e_indx;
3024
3025 e_indx = r_indx - symtab_hdr->sh_info;
3026 hash = ((struct elf32_hppa_link_hash_entry *)
3027 elf_sym_hashes (input_bfd)[e_indx]);
3028
3029 while (hash->elf.root.type == bfd_link_hash_indirect
3030 || hash->elf.root.type == bfd_link_hash_warning)
3031 hash = ((struct elf32_hppa_link_hash_entry *)
3032 hash->elf.root.u.i.link);
3033
3034 if (hash->elf.root.type == bfd_link_hash_defined
3035 || hash->elf.root.type == bfd_link_hash_defweak)
3036 {
3037 sym_sec = hash->elf.root.u.def.section;
3038 sym_value = hash->elf.root.u.def.value;
3039 if (sym_sec->output_section != NULL)
3040 destination = (sym_value + irela->r_addend
3041 + sym_sec->output_offset
3042 + sym_sec->output_section->vma);
3043 }
3044 else if (hash->elf.root.type == bfd_link_hash_undefweak)
3045 {
3046 if (! info->shared)
3047 continue;
3048 }
3049 else if (hash->elf.root.type == bfd_link_hash_undefined)
3050 {
3051 if (! (info->shared
3052 && !info->no_undefined
3053 && (ELF_ST_VISIBILITY (hash->elf.other)
2a5aaecb
AM
3054 == STV_DEFAULT)
3055 && hash->elf.type != STT_PARISC_MILLI))
30667bf3
AM
3056 continue;
3057 }
3058 else
3059 {
3060 bfd_set_error (bfd_error_bad_value);
3061 goto error_ret_free_internal;
3062 }
3063 }
3064
3065 /* Determine what (if any) linker stub is needed. */
3066 stub_type = hppa_type_of_stub (section, irela, hash,
3067 destination);
3068 if (stub_type == hppa_stub_none)
3069 continue;
3070
25f72752 3071 /* Support for grouping stub sections. */
83c81bfe 3072 id_sec = htab->stub_group[section->id].link_sec;
25f72752 3073
30667bf3 3074 /* Get the name of this stub. */
25f72752 3075 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
3076 if (!stub_name)
3077 goto error_ret_free_internal;
3078
83c81bfe 3079 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
3080 stub_name,
3081 false, false);
3082 if (stub_entry != NULL)
3083 {
3084 /* The proper stub has already been created. */
3085 free (stub_name);
3086 continue;
3087 }
3088
83c81bfe 3089 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
3090 if (stub_entry == NULL)
3091 {
3092 free (stub_name);
3093 goto error_ret_free_local;
3094 }
3095
3096 stub_entry->target_value = sym_value;
3097 stub_entry->target_section = sym_sec;
3098 stub_entry->stub_type = stub_type;
3099 if (info->shared)
3100 {
3101 if (stub_type == hppa_stub_import)
3102 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 3103 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
3104 stub_entry->stub_type = hppa_stub_long_branch_shared;
3105 }
3106 stub_entry->h = hash;
3107 stub_changed = 1;
3108 }
3109
3110 /* We're done with the internal relocs, free them. */
3111 free (internal_relocs);
3112 }
3113 }
3114
3115 if (!stub_changed)
3116 break;
3117
3118 /* OK, we've added some stubs. Find out the new size of the
3119 stub sections. */
83c81bfe 3120 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3121 stub_sec != NULL;
3122 stub_sec = stub_sec->next)
3123 {
74d1c347
AM
3124 stub_sec->_raw_size = 0;
3125 stub_sec->_cooked_size = 0;
3126 }
74d1c347 3127
83c81bfe 3128 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3129
30667bf3 3130 /* Ask the linker to do its stuff. */
83c81bfe 3131 (*htab->layout_sections_again) ();
30667bf3
AM
3132 stub_changed = 0;
3133 }
3134
25f72752 3135 ret = 1;
30667bf3
AM
3136
3137 error_ret_free_local:
25f72752
AM
3138 while (bfd_count-- > 0)
3139 if (all_local_syms[bfd_count])
3140 free (all_local_syms[bfd_count]);
30667bf3
AM
3141 free (all_local_syms);
3142
25f72752 3143 return ret;
30667bf3
AM
3144}
3145
30667bf3
AM
3146/* For a final link, this function is called after we have sized the
3147 stubs to provide a value for __gp. */
3148
3149boolean
3150elf32_hppa_set_gp (abfd, info)
3151 bfd *abfd;
3152 struct bfd_link_info *info;
3153{
83c81bfe 3154 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3155 struct elf_link_hash_entry *h;
3156 asection *sec;
3157 bfd_vma gp_val;
3158
83c81bfe 3159 htab = hppa_link_hash_table (info);
ebe50bae 3160 h = elf_link_hash_lookup (&htab->elf, "$global$", false, false, false);
30667bf3 3161
df8634e3
AM
3162 if (h != NULL
3163 && (h->root.type == bfd_link_hash_defined
3164 || h->root.type == bfd_link_hash_defweak))
30667bf3
AM
3165 {
3166 gp_val = h->root.u.def.value;
3167 sec = h->root.u.def.section;
3168 }
3169 else
3170 {
74d1c347
AM
3171 /* Choose to point our LTP at, in this order, one of .plt, .got,
3172 or .data, if these sections exist. In the case of choosing
3173 .plt try to make the LTP ideal for addressing anywhere in the
3174 .plt or .got with a 14 bit signed offset. Typically, the end
3175 of the .plt is the start of the .got, so choose .plt + 0x2000
3176 if either the .plt or .got is larger than 0x2000. If both
3177 the .plt and .got are smaller than 0x2000, choose the end of
3178 the .plt section. */
3179
83c81bfe 3180 sec = htab->splt;
74d1c347 3181 if (sec != NULL)
30667bf3 3182 {
74d1c347
AM
3183 gp_val = sec->_raw_size;
3184 if (gp_val > 0x2000
83c81bfe 3185 || (htab->sgot && htab->sgot->_raw_size > 0x2000))
74d1c347
AM
3186 {
3187 gp_val = 0x2000;
3188 }
3189 }
3190 else
3191 {
3192 gp_val = 0;
83c81bfe 3193 sec = htab->sgot;
74d1c347
AM
3194 if (sec != NULL)
3195 {
3196 /* We know we don't have a .plt. If .got is large,
3197 offset our LTP. */
3198 if (sec->_raw_size > 0x2000)
3199 gp_val = 0x2000;
3200 }
3201 else
3202 {
3203 /* No .plt or .got. Who cares what the LTP is? */
3204 sec = bfd_get_section_by_name (abfd, ".data");
3205 }
30667bf3 3206 }
df8634e3
AM
3207
3208 if (h != NULL)
3209 {
3210 h->root.type = bfd_link_hash_defined;
3211 h->root.u.def.value = gp_val;
3212 if (sec != NULL)
3213 h->root.u.def.section = sec;
3214 else
3215 h->root.u.def.section = bfd_abs_section_ptr;
3216 }
30667bf3
AM
3217 }
3218
b32b5d6e 3219 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3220 gp_val += sec->output_section->vma + sec->output_offset;
3221
3222 elf_gp (abfd) = gp_val;
30667bf3
AM
3223 return true;
3224}
3225
30667bf3
AM
3226/* Build all the stubs associated with the current output file. The
3227 stubs are kept in a hash table attached to the main linker hash
3228 table. We also set up the .plt entries for statically linked PIC
3229 functions here. This function is called via hppaelf_finish in the
3230 linker. */
3231
3232boolean
3233elf32_hppa_build_stubs (info)
3234 struct bfd_link_info *info;
3235{
3236 asection *stub_sec;
3237 struct bfd_hash_table *table;
83c81bfe 3238 struct elf32_hppa_link_hash_table *htab;
30667bf3 3239
83c81bfe 3240 htab = hppa_link_hash_table (info);
30667bf3 3241
83c81bfe 3242 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3243 stub_sec != NULL;
3244 stub_sec = stub_sec->next)
3245 {
dc810e39 3246 bfd_size_type size;
30667bf3
AM
3247
3248 /* Allocate memory to hold the linker stubs. */
74d1c347 3249 size = stub_sec->_raw_size;
83c81bfe 3250 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3251 if (stub_sec->contents == NULL && size != 0)
3252 return false;
74d1c347 3253 stub_sec->_raw_size = 0;
30667bf3
AM
3254 }
3255
3256 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3257 table = &htab->stub_hash_table;
30667bf3
AM
3258 bfd_hash_traverse (table, hppa_build_one_stub, info);
3259
3260 return true;
3261}
3262
c46b7515
AM
3263/* Perform a final link. */
3264
3265static boolean
3266elf32_hppa_final_link (abfd, info)
3267 bfd *abfd;
3268 struct bfd_link_info *info;
3269{
3270 asection *s;
3271
4dc86686
AM
3272 /* Invoke the regular ELF linker to do all the work. */
3273 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3274 return false;
3275
3276 /* If we're producing a final executable, sort the contents of the
3277 unwind section. Magic section names, but this is much safer than
3278 having elf32_hppa_relocate_section remember where SEGREL32 relocs
3279 occurred. Consider what happens if someone inept creates a
3280 linker script that puts unwind information in .text. */
3281 s = bfd_get_section_by_name (abfd, ".PARISC.unwind");
3282 if (s != NULL)
3283 {
3284 bfd_size_type size;
3285 char *contents;
3286
3287 size = s->_raw_size;
3288 contents = bfd_malloc (size);
3289 if (contents == NULL)
3290 return false;
3291
3292 if (! bfd_get_section_contents (abfd, s, contents, (file_ptr) 0, size))
3293 return false;
3294
dc810e39 3295 qsort (contents, (size_t) (size / 16), 16, hppa_unwind_entry_compare);
c46b7515
AM
3296
3297 if (! bfd_set_section_contents (abfd, s, contents, (file_ptr) 0, size))
3298 return false;
3299 }
3300 return true;
3301}
3302
3303/* Record the lowest address for the data and text segments. */
3304
3305static void
3306hppa_record_segment_addr (abfd, section, data)
3307 bfd *abfd ATTRIBUTE_UNUSED;
3308 asection *section;
3309 PTR data;
3310{
83c81bfe 3311 struct elf32_hppa_link_hash_table *htab;
c46b7515 3312
83c81bfe 3313 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3314
3315 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3316 {
3317 bfd_vma value = section->vma - section->filepos;
3318
3319 if ((section->flags & SEC_READONLY) != 0)
3320 {
83c81bfe
AM
3321 if (value < htab->text_segment_base)
3322 htab->text_segment_base = value;
c46b7515
AM
3323 }
3324 else
3325 {
83c81bfe
AM
3326 if (value < htab->data_segment_base)
3327 htab->data_segment_base = value;
c46b7515
AM
3328 }
3329 }
3330}
3331
30667bf3
AM
3332/* Perform a relocation as part of a final link. */
3333
3334static bfd_reloc_status_type
83c81bfe 3335final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3336 asection *input_section;
3337 bfd_byte *contents;
3338 const Elf_Internal_Rela *rel;
3339 bfd_vma value;
83c81bfe 3340 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3341 asection *sym_sec;
3342 struct elf32_hppa_link_hash_entry *h;
3343{
3344 int insn;
3345 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3346 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3347 int r_format = howto->bitsize;
3348 enum hppa_reloc_field_selector_type_alt r_field;
3349 bfd *input_bfd = input_section->owner;
3350 bfd_vma offset = rel->r_offset;
3351 bfd_vma max_branch_offset = 0;
3352 bfd_byte *hit_data = contents + offset;
3353 bfd_signed_vma addend = rel->r_addend;
3354 bfd_vma location;
3355 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3356 int val;
3357
3358 if (r_type == R_PARISC_NONE)
3359 return bfd_reloc_ok;
3360
3361 insn = bfd_get_32 (input_bfd, hit_data);
3362
3363 /* Find out where we are and where we're going. */
3364 location = (offset +
3365 input_section->output_offset +
3366 input_section->output_section->vma);
3367
3368 switch (r_type)
3369 {
3370 case R_PARISC_PCREL12F:
3371 case R_PARISC_PCREL17F:
3372 case R_PARISC_PCREL22F:
3373 /* If this is a call to a function defined in another dynamic
3374 library, or if it is a call to a PIC function in the same
74d1c347
AM
3375 object, or if this is a shared link and it is a call to a
3376 weak symbol which may or may not be in the same object, then
3377 find the import stub in the stub hash. */
30667bf3
AM
3378 if (sym_sec == NULL
3379 || sym_sec->output_section == NULL
12cca0d2
AM
3380 || (h != NULL
3381 && ((h->maybe_pic_call
3382 && !(input_section->flags & SEC_HAS_GOT_REF))
3383 || (h->elf.root.type == bfd_link_hash_defweak
3384 && h->elf.dynindx != -1
3385 && h->elf.plt.offset != (bfd_vma) -1))))
30667bf3
AM
3386 {
3387 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3388 h, rel, htab);
30667bf3
AM
3389 if (stub_entry != NULL)
3390 {
3391 value = (stub_entry->stub_offset
3392 + stub_entry->stub_sec->output_offset
3393 + stub_entry->stub_sec->output_section->vma);
3394 addend = 0;
3395 }
3396 else if (sym_sec == NULL && h != NULL
3397 && h->elf.root.type == bfd_link_hash_undefweak)
3398 {
db20fd76
AM
3399 /* It's OK if undefined weak. Calls to undefined weak
3400 symbols behave as if the "called" function
3401 immediately returns. We can thus call to a weak
3402 function without first checking whether the function
3403 is defined. */
30667bf3 3404 value = location;
db20fd76 3405 addend = 8;
30667bf3
AM
3406 }
3407 else
f09ebc7d 3408 return bfd_reloc_undefined;
30667bf3
AM
3409 }
3410 /* Fall thru. */
3411
3412 case R_PARISC_PCREL21L:
3413 case R_PARISC_PCREL17C:
3414 case R_PARISC_PCREL17R:
3415 case R_PARISC_PCREL14R:
3416 case R_PARISC_PCREL14F:
3417 /* Make it a pc relative offset. */
3418 value -= location;
3419 addend -= 8;
3420 break;
3421
3422 case R_PARISC_DPREL21L:
3423 case R_PARISC_DPREL14R:
3424 case R_PARISC_DPREL14F:
3425 /* For all the DP relative relocations, we need to examine the symbol's
3426 section. If it's a code section, then "data pointer relative" makes
3427 no sense. In that case we don't adjust the "value", and for 21 bit
3428 addil instructions, we change the source addend register from %dp to
3429 %r0. This situation commonly arises when a variable's "constness"
3430 is declared differently from the way the variable is defined. For
3431 instance: "extern int foo" with foo defined as "const int foo". */
3432 if (sym_sec == NULL)
3433 break;
3434 if ((sym_sec->flags & SEC_CODE) != 0)
3435 {
3436 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3437 == (((int) OP_ADDIL << 26) | (27 << 21)))
3438 {
3439 insn &= ~ (0x1f << 21);
74d1c347 3440#if 1 /* debug them. */
30667bf3
AM
3441 (*_bfd_error_handler)
3442 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3443 bfd_archive_filename (input_bfd),
30667bf3
AM
3444 input_section->name,
3445 (long) rel->r_offset,
3446 howto->name);
3447#endif
3448 }
3449 /* Now try to make things easy for the dynamic linker. */
3450
3451 break;
3452 }
74d1c347 3453 /* Fall thru. */
30667bf3
AM
3454
3455 case R_PARISC_DLTIND21L:
3456 case R_PARISC_DLTIND14R:
3457 case R_PARISC_DLTIND14F:
3458 value -= elf_gp (input_section->output_section->owner);
3459 break;
3460
c46b7515
AM
3461 case R_PARISC_SEGREL32:
3462 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3463 value -= htab->text_segment_base;
c46b7515 3464 else
83c81bfe 3465 value -= htab->data_segment_base;
c46b7515
AM
3466 break;
3467
30667bf3
AM
3468 default:
3469 break;
3470 }
3471
3472 switch (r_type)
3473 {
3474 case R_PARISC_DIR32:
47d89dba 3475 case R_PARISC_DIR14F:
30667bf3
AM
3476 case R_PARISC_DIR17F:
3477 case R_PARISC_PCREL17C:
3478 case R_PARISC_PCREL14F:
3479 case R_PARISC_DPREL14F:
3480 case R_PARISC_PLABEL32:
3481 case R_PARISC_DLTIND14F:
3482 case R_PARISC_SEGBASE:
3483 case R_PARISC_SEGREL32:
3484 r_field = e_fsel;
3485 break;
3486
1bf42538 3487 case R_PARISC_DLTIND21L:
30667bf3 3488 case R_PARISC_PCREL21L:
30667bf3 3489 case R_PARISC_PLABEL21L:
1bf42538
JL
3490 r_field = e_lsel;
3491 break;
3492
3493 case R_PARISC_DIR21L:
3494 case R_PARISC_DPREL21L:
30667bf3
AM
3495 r_field = e_lrsel;
3496 break;
3497
30667bf3 3498 case R_PARISC_PCREL17R:
30667bf3 3499 case R_PARISC_PCREL14R:
30667bf3
AM
3500 case R_PARISC_PLABEL14R:
3501 case R_PARISC_DLTIND14R:
1bf42538
JL
3502 r_field = e_rsel;
3503 break;
3504
3505 case R_PARISC_DIR17R:
3506 case R_PARISC_DIR14R:
3507 case R_PARISC_DPREL14R:
30667bf3
AM
3508 r_field = e_rrsel;
3509 break;
3510
3511 case R_PARISC_PCREL12F:
3512 case R_PARISC_PCREL17F:
3513 case R_PARISC_PCREL22F:
3514 r_field = e_fsel;
3515
3516 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3517 {
3518 max_branch_offset = (1 << (17-1)) << 2;
3519 }
3520 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3521 {
3522 max_branch_offset = (1 << (12-1)) << 2;
3523 }
3524 else
3525 {
3526 max_branch_offset = (1 << (22-1)) << 2;
3527 }
3528
3529 /* sym_sec is NULL on undefined weak syms or when shared on
3530 undefined syms. We've already checked for a stub for the
3531 shared undefined case. */
3532 if (sym_sec == NULL)
3533 break;
3534
3535 /* If the branch is out of reach, then redirect the
3536 call to the local stub for this function. */
3537 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3538 {
3539 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3540 h, rel, htab);
30667bf3 3541 if (stub_entry == NULL)
f09ebc7d 3542 return bfd_reloc_undefined;
30667bf3
AM
3543
3544 /* Munge up the value and addend so that we call the stub
3545 rather than the procedure directly. */
3546 value = (stub_entry->stub_offset
3547 + stub_entry->stub_sec->output_offset
3548 + stub_entry->stub_sec->output_section->vma
3549 - location);
3550 addend = -8;
3551 }
3552 break;
3553
3554 /* Something we don't know how to handle. */
3555 default:
3556 return bfd_reloc_notsupported;
3557 }
3558
3559 /* Make sure we can reach the stub. */
3560 if (max_branch_offset != 0
3561 && value + addend + max_branch_offset >= 2*max_branch_offset)
3562 {
3563 (*_bfd_error_handler)
3564 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3565 bfd_archive_filename (input_bfd),
30667bf3
AM
3566 input_section->name,
3567 (long) rel->r_offset,
3568 stub_entry->root.string);
ce757d15 3569 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3570 return bfd_reloc_notsupported;
3571 }
3572
3573 val = hppa_field_adjust (value, addend, r_field);
3574
3575 switch (r_type)
3576 {
3577 case R_PARISC_PCREL12F:
3578 case R_PARISC_PCREL17C:
3579 case R_PARISC_PCREL17F:
3580 case R_PARISC_PCREL17R:
3581 case R_PARISC_PCREL22F:
3582 case R_PARISC_DIR17F:
3583 case R_PARISC_DIR17R:
3584 /* This is a branch. Divide the offset by four.
3585 Note that we need to decide whether it's a branch or
3586 otherwise by inspecting the reloc. Inspecting insn won't
3587 work as insn might be from a .word directive. */
3588 val >>= 2;
3589 break;
3590
3591 default:
3592 break;
3593 }
3594
3595 insn = hppa_rebuild_insn (insn, val, r_format);
3596
3597 /* Update the instruction word. */
74d1c347 3598 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3599 return bfd_reloc_ok;
3600}
3601
30667bf3
AM
3602/* Relocate an HPPA ELF section. */
3603
3604static boolean
3605elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3606 contents, relocs, local_syms, local_sections)
3607 bfd *output_bfd;
3608 struct bfd_link_info *info;
3609 bfd *input_bfd;
3610 asection *input_section;
3611 bfd_byte *contents;
3612 Elf_Internal_Rela *relocs;
3613 Elf_Internal_Sym *local_syms;
3614 asection **local_sections;
3615{
30667bf3 3616 bfd_vma *local_got_offsets;
83c81bfe 3617 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3618 Elf_Internal_Shdr *symtab_hdr;
3619 Elf_Internal_Rela *rel;
3620 Elf_Internal_Rela *relend;
30667bf3
AM
3621
3622 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3623
83c81bfe 3624 htab = hppa_link_hash_table (info);
74d1c347 3625 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3626
3627 rel = relocs;
3628 relend = relocs + input_section->reloc_count;
3629 for (; rel < relend; rel++)
3630 {
3631 unsigned int r_type;
3632 reloc_howto_type *howto;
3633 unsigned int r_symndx;
3634 struct elf32_hppa_link_hash_entry *h;
3635 Elf_Internal_Sym *sym;
3636 asection *sym_sec;
3637 bfd_vma relocation;
3638 bfd_reloc_status_type r;
3639 const char *sym_name;
74d1c347 3640 boolean plabel;
f09ebc7d 3641 boolean warned_undef;
30667bf3
AM
3642
3643 r_type = ELF32_R_TYPE (rel->r_info);
3644 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3645 {
3646 bfd_set_error (bfd_error_bad_value);
3647 return false;
3648 }
3649 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3650 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3651 continue;
3652
3653 r_symndx = ELF32_R_SYM (rel->r_info);
3654
3655 if (info->relocateable)
3656 {
3ac8354b 3657 /* This is a relocatable link. We don't have to change
30667bf3
AM
3658 anything, unless the reloc is against a section symbol,
3659 in which case we have to adjust according to where the
3660 section symbol winds up in the output section. */
3661 if (r_symndx < symtab_hdr->sh_info)
3662 {
3663 sym = local_syms + r_symndx;
3664 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3665 {
3666 sym_sec = local_sections[r_symndx];
3667 rel->r_addend += sym_sec->output_offset;
3668 }
3669 }
3670 continue;
3671 }
3672
3673 /* This is a final link. */
3674 h = NULL;
3675 sym = NULL;
3676 sym_sec = NULL;
f09ebc7d 3677 warned_undef = false;
30667bf3
AM
3678 if (r_symndx < symtab_hdr->sh_info)
3679 {
3680 /* This is a local symbol, h defaults to NULL. */
3681 sym = local_syms + r_symndx;
3682 sym_sec = local_sections[r_symndx];
f8df10f4 3683 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sym_sec, rel);
30667bf3
AM
3684 }
3685 else
3686 {
3687 int indx;
3688
3689 /* It's a global; Find its entry in the link hash. */
3690 indx = r_symndx - symtab_hdr->sh_info;
3691 h = ((struct elf32_hppa_link_hash_entry *)
3692 elf_sym_hashes (input_bfd)[indx]);
3693 while (h->elf.root.type == bfd_link_hash_indirect
3694 || h->elf.root.type == bfd_link_hash_warning)
3695 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3696
3697 relocation = 0;
3698 if (h->elf.root.type == bfd_link_hash_defined
3699 || h->elf.root.type == bfd_link_hash_defweak)
3700 {
3701 sym_sec = h->elf.root.u.def.section;
3702 /* If sym_sec->output_section is NULL, then it's a
3703 symbol defined in a shared library. */
3704 if (sym_sec->output_section != NULL)
3705 relocation = (h->elf.root.u.def.value
3706 + sym_sec->output_offset
3707 + sym_sec->output_section->vma);
3708 }
3709 else if (h->elf.root.type == bfd_link_hash_undefweak)
3710 ;
3711 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3712 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3713 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3714 {
671bae9c 3715 if (info->symbolic && !info->allow_shlib_undefined)
f09ebc7d
AM
3716 {
3717 if (!((*info->callbacks->undefined_symbol)
3718 (info, h->elf.root.root.string, input_bfd,
3719 input_section, rel->r_offset, false)))
3720 return false;
3721 warned_undef = true;
3722 }
30667bf3
AM
3723 }
3724 else
3725 {
3726 if (!((*info->callbacks->undefined_symbol)
3727 (info, h->elf.root.root.string, input_bfd,
3728 input_section, rel->r_offset, true)))
3729 return false;
f09ebc7d 3730 warned_undef = true;
30667bf3
AM
3731 }
3732 }
3733
3734 /* Do any required modifications to the relocation value, and
25f72752
AM
3735 determine what types of dynamic info we need to output, if
3736 any. */
74d1c347 3737 plabel = 0;
30667bf3
AM
3738 switch (r_type)
3739 {
3740 case R_PARISC_DLTIND14F:
3741 case R_PARISC_DLTIND14R:
3742 case R_PARISC_DLTIND21L:
ce757d15
AM
3743 {
3744 bfd_vma off;
3745 boolean do_got = 0;
3746
3747 /* Relocation is to the entry for this symbol in the
3748 global offset table. */
3749 if (h != NULL)
3750 {
3751 boolean dyn;
3752
3753 off = h->elf.got.offset;
3754 dyn = htab->elf.dynamic_sections_created;
3755 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3756 {
3757 /* If we aren't going to call finish_dynamic_symbol,
3758 then we need to handle initialisation of the .got
3759 entry and create needed relocs here. Since the
3760 offset must always be a multiple of 4, we use the
3761 least significant bit to record whether we have
3762 initialised it already. */
3763 if ((off & 1) != 0)
3764 off &= ~1;
3765 else
3766 {
3767 h->elf.got.offset |= 1;
3768 do_got = 1;
3769 }
3770 }
3771 }
3772 else
3773 {
3774 /* Local symbol case. */
3775 if (local_got_offsets == NULL)
3776 abort ();
3777
3778 off = local_got_offsets[r_symndx];
3779
3780 /* The offset must always be a multiple of 4. We use
3781 the least significant bit to record whether we have
3782 already generated the necessary reloc. */
3783 if ((off & 1) != 0)
3784 off &= ~1;
3785 else
3786 {
3787 local_got_offsets[r_symndx] |= 1;
3788 do_got = 1;
3789 }
3790 }
68fb2e56 3791
ce757d15
AM
3792 if (do_got)
3793 {
3794 if (info->shared)
3795 {
3796 /* Output a dynamic relocation for this GOT entry.
3797 In this case it is relative to the base of the
3798 object because the symbol index is zero. */
3799 Elf_Internal_Rela outrel;
3800 asection *srelgot = htab->srelgot;
3801 Elf32_External_Rela *loc;
3802
3803 outrel.r_offset = (off
3804 + htab->sgot->output_offset
3805 + htab->sgot->output_section->vma);
3806 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3807 outrel.r_addend = relocation;
3808 loc = (Elf32_External_Rela *) srelgot->contents;
3809 loc += srelgot->reloc_count++;
3810 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3811 }
3812 else
30667bf3 3813 bfd_put_32 (output_bfd, relocation,
83c81bfe 3814 htab->sgot->contents + off);
ce757d15 3815 }
30667bf3 3816
ce757d15
AM
3817 if (off >= (bfd_vma) -2)
3818 abort ();
30667bf3 3819
ce757d15
AM
3820 /* Add the base of the GOT to the relocation value. */
3821 relocation = (off
3822 + htab->sgot->output_offset
3823 + htab->sgot->output_section->vma);
3824 }
30667bf3 3825 break;
252b5132 3826
c46b7515
AM
3827 case R_PARISC_SEGREL32:
3828 /* If this is the first SEGREL relocation, then initialize
3829 the segment base values. */
83c81bfe
AM
3830 if (htab->text_segment_base == (bfd_vma) -1)
3831 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3832 break;
3833
30667bf3
AM
3834 case R_PARISC_PLABEL14R:
3835 case R_PARISC_PLABEL21L:
3836 case R_PARISC_PLABEL32:
ebe50bae 3837 if (htab->elf.dynamic_sections_created)
252b5132 3838 {
ce757d15
AM
3839 bfd_vma off;
3840 boolean do_plt = 0;
3841
74d1c347
AM
3842 /* If we have a global symbol with a PLT slot, then
3843 redirect this relocation to it. */
3844 if (h != NULL)
3845 {
3846 off = h->elf.plt.offset;
4dc86686 3847 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3848 {
3849 /* In a non-shared link, adjust_dynamic_symbols
3850 isn't called for symbols forced local. We
dc810e39 3851 need to write out the plt entry here. */
8dea1268
AM
3852 if ((off & 1) != 0)
3853 off &= ~1;
3854 else
3855 {
8dea1268 3856 h->elf.plt.offset |= 1;
ce757d15 3857 do_plt = 1;
8dea1268
AM
3858 }
3859 }
74d1c347
AM
3860 }
3861 else
3862 {
68fb2e56
AM
3863 bfd_vma *local_plt_offsets;
3864
3865 if (local_got_offsets == NULL)
3866 abort ();
74d1c347 3867
68fb2e56
AM
3868 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3869 off = local_plt_offsets[r_symndx];
74d1c347
AM
3870
3871 /* As for the local .got entry case, we use the last
3872 bit to record whether we've already initialised
3873 this local .plt entry. */
3874 if ((off & 1) != 0)
3875 off &= ~1;
ce757d15
AM
3876 else
3877 {
3878 local_plt_offsets[r_symndx] |= 1;
3879 do_plt = 1;
3880 }
3881 }
3882
3883 if (do_plt)
3884 {
3885 if (info->shared)
3886 {
3887 /* Output a dynamic IPLT relocation for this
3888 PLT entry. */
3889 Elf_Internal_Rela outrel;
3890 asection *srelplt = htab->srelplt;
3891 Elf32_External_Rela *loc;
3892
3893 outrel.r_offset = (off
3894 + htab->splt->output_offset
3895 + htab->splt->output_section->vma);
3896 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3897 outrel.r_addend = relocation;
3898 loc = (Elf32_External_Rela *) srelplt->contents;
3899 loc += srelplt->reloc_count++;
3900 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3901 }
74d1c347
AM
3902 else
3903 {
3904 bfd_put_32 (output_bfd,
3905 relocation,
83c81bfe 3906 htab->splt->contents + off);
74d1c347 3907 bfd_put_32 (output_bfd,
83c81bfe
AM
3908 elf_gp (htab->splt->output_section->owner),
3909 htab->splt->contents + off + 4);
74d1c347
AM
3910 }
3911 }
3912
68fb2e56 3913 if (off >= (bfd_vma) -2)
49e9d0d3 3914 abort ();
74d1c347
AM
3915
3916 /* PLABELs contain function pointers. Relocation is to
3917 the entry for the function in the .plt. The magic +2
3918 offset signals to $$dyncall that the function pointer
3919 is in the .plt and thus has a gp pointer too.
3920 Exception: Undefined PLABELs should have a value of
3921 zero. */
3922 if (h == NULL
3923 || (h->elf.root.type != bfd_link_hash_undefweak
3924 && h->elf.root.type != bfd_link_hash_undefined))
3925 {
3926 relocation = (off
83c81bfe
AM
3927 + htab->splt->output_offset
3928 + htab->splt->output_section->vma
74d1c347
AM
3929 + 2);
3930 }
3931 plabel = 1;
30667bf3
AM
3932 }
3933 /* Fall through and possibly emit a dynamic relocation. */
3934
3935 case R_PARISC_DIR17F:
3936 case R_PARISC_DIR17R:
47d89dba 3937 case R_PARISC_DIR14F:
30667bf3
AM
3938 case R_PARISC_DIR14R:
3939 case R_PARISC_DIR21L:
3940 case R_PARISC_DPREL14F:
3941 case R_PARISC_DPREL14R:
3942 case R_PARISC_DPREL21L:
3943 case R_PARISC_DIR32:
ec338859
AM
3944 /* r_symndx will be zero only for relocs against symbols
3945 from removed linkonce sections, or sections discarded by
3946 a linker script. */
3947 if (r_symndx == 0
3948 || (input_section->flags & SEC_ALLOC) == 0)
3949 break;
3950
30667bf3 3951 /* The reloc types handled here and this conditional
56882138 3952 expression must match the code in ..check_relocs and
ec338859 3953 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
3954 as in ..check_relocs, with some extra conditions (dynindx
3955 test in this case) to cater for relocs removed by
ec338859 3956 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
3957 here does indeed match the one in ..check_relocs, the
3958 difference being that here we test DEF_DYNAMIC as well as
3959 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3960 which is why we can't use just that test here.
3961 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3962 there all files have not been loaded. */
446f2863 3963 if ((info->shared
446f2863
AM
3964 && (IS_ABSOLUTE_RELOC (r_type)
3965 || (h != NULL
3966 && h->elf.dynindx != -1
3967 && (!info->symbolic
3968 || (h->elf.elf_link_hash_flags
3969 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3970 || (!info->shared
446f2863
AM
3971 && h != NULL
3972 && h->elf.dynindx != -1
3973 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3974 && (((h->elf.elf_link_hash_flags
3975 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3976 && (h->elf.elf_link_hash_flags
3977 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3978 || h->elf.root.type == bfd_link_hash_undefweak
3979 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3980 {
3981 Elf_Internal_Rela outrel;
3982 boolean skip;
98ceb8ce
AM
3983 asection *sreloc;
3984 Elf32_External_Rela *loc;
252b5132 3985
30667bf3
AM
3986 /* When generating a shared object, these relocations
3987 are copied into the output file to be resolved at run
3988 time. */
252b5132 3989
30667bf3 3990 outrel.r_addend = rel->r_addend;
c629eae0
JJ
3991 outrel.r_offset =
3992 _bfd_elf_section_offset (output_bfd, info, input_section,
3993 rel->r_offset);
0bb2d96a
JJ
3994 skip = (outrel.r_offset == (bfd_vma) -1
3995 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3996 outrel.r_offset += (input_section->output_offset
3997 + input_section->output_section->vma);
3998
3999 if (skip)
252b5132 4000 {
30667bf3 4001 memset (&outrel, 0, sizeof (outrel));
252b5132 4002 }
74d1c347
AM
4003 else if (h != NULL
4004 && h->elf.dynindx != -1
4005 && (plabel
446f2863
AM
4006 || !IS_ABSOLUTE_RELOC (r_type)
4007 || !info->shared
74d1c347 4008 || !info->symbolic
30667bf3
AM
4009 || (h->elf.elf_link_hash_flags
4010 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 4011 {
30667bf3
AM
4012 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
4013 }
4014 else /* It's a local symbol, or one marked to become local. */
4015 {
4016 int indx = 0;
edd21aca 4017
30667bf3
AM
4018 /* Add the absolute offset of the symbol. */
4019 outrel.r_addend += relocation;
edd21aca 4020
74d1c347
AM
4021 /* Global plabels need to be processed by the
4022 dynamic linker so that functions have at most one
4023 fptr. For this reason, we need to differentiate
4024 between global and local plabels, which we do by
4025 providing the function symbol for a global plabel
4026 reloc, and no symbol for local plabels. */
4027 if (! plabel
4028 && sym_sec != NULL
30667bf3
AM
4029 && sym_sec->output_section != NULL
4030 && ! bfd_is_abs_section (sym_sec))
252b5132 4031 {
30667bf3
AM
4032 indx = elf_section_data (sym_sec->output_section)->dynindx;
4033 /* We are turning this relocation into one
4034 against a section symbol, so subtract out the
4035 output section's address but not the offset
4036 of the input section in the output section. */
4037 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 4038 }
252b5132 4039
30667bf3
AM
4040 outrel.r_info = ELF32_R_INFO (indx, r_type);
4041 }
68fb2e56
AM
4042#if 0
4043 /* EH info can cause unaligned DIR32 relocs.
4044 Tweak the reloc type for the dynamic linker. */
4045 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
4046 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
4047 R_PARISC_DIR32U);
4048#endif
98ceb8ce
AM
4049 sreloc = elf_section_data (input_section)->sreloc;
4050 if (sreloc == NULL)
4051 abort ();
4052
3ac8354b
AM
4053 loc = (Elf32_External_Rela *) sreloc->contents;
4054 loc += sreloc->reloc_count++;
98ceb8ce 4055 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
4056 }
4057 break;
edd21aca 4058
30667bf3
AM
4059 default:
4060 break;
4061 }
252b5132 4062
30667bf3 4063 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 4064 htab, sym_sec, h);
252b5132 4065
30667bf3
AM
4066 if (r == bfd_reloc_ok)
4067 continue;
252b5132 4068
30667bf3
AM
4069 if (h != NULL)
4070 sym_name = h->elf.root.root.string;
4071 else
4072 {
4073 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4074 symtab_hdr->sh_link,
4075 sym->st_name);
4076 if (sym_name == NULL)
4077 return false;
4078 if (*sym_name == '\0')
4079 sym_name = bfd_section_name (input_bfd, sym_sec);
4080 }
edd21aca 4081
30667bf3 4082 howto = elf_hppa_howto_table + r_type;
252b5132 4083
30667bf3
AM
4084 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
4085 {
f09ebc7d
AM
4086 if (r == bfd_reloc_notsupported || !warned_undef)
4087 {
4088 (*_bfd_error_handler)
4089 (_("%s(%s+0x%lx): cannot handle %s for %s"),
4090 bfd_archive_filename (input_bfd),
4091 input_section->name,
4092 (long) rel->r_offset,
4093 howto->name,
4094 sym_name);
4095 bfd_set_error (bfd_error_bad_value);
4096 return false;
4097 }
30667bf3
AM
4098 }
4099 else
4100 {
4101 if (!((*info->callbacks->reloc_overflow)
4102 (info, sym_name, howto->name, (bfd_vma) 0,
4103 input_bfd, input_section, rel->r_offset)))
4104 return false;
4105 }
4106 }
edd21aca 4107
30667bf3
AM
4108 return true;
4109}
252b5132 4110
c46b7515
AM
4111/* Comparison function for qsort to sort unwind section during a
4112 final link. */
4113
4114static int
4115hppa_unwind_entry_compare (a, b)
4116 const PTR a;
4117 const PTR b;
4118{
4119 const bfd_byte *ap, *bp;
4120 unsigned long av, bv;
4121
4122 ap = (const bfd_byte *) a;
4123 av = (unsigned long) ap[0] << 24;
4124 av |= (unsigned long) ap[1] << 16;
4125 av |= (unsigned long) ap[2] << 8;
4126 av |= (unsigned long) ap[3];
4127
4128 bp = (const bfd_byte *) b;
4129 bv = (unsigned long) bp[0] << 24;
4130 bv |= (unsigned long) bp[1] << 16;
4131 bv |= (unsigned long) bp[2] << 8;
4132 bv |= (unsigned long) bp[3];
4133
4134 return av < bv ? -1 : av > bv ? 1 : 0;
4135}
4136
30667bf3
AM
4137/* Finish up dynamic symbol handling. We set the contents of various
4138 dynamic sections here. */
252b5132 4139
30667bf3
AM
4140static boolean
4141elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4142 bfd *output_bfd;
4143 struct bfd_link_info *info;
4144 struct elf_link_hash_entry *h;
4145 Elf_Internal_Sym *sym;
4146{
83c81bfe 4147 struct elf32_hppa_link_hash_table *htab;
edd21aca 4148
83c81bfe 4149 htab = hppa_link_hash_table (info);
30667bf3 4150
30667bf3
AM
4151 if (h->plt.offset != (bfd_vma) -1)
4152 {
4153 bfd_vma value;
30667bf3 4154
8dea1268
AM
4155 if (h->plt.offset & 1)
4156 abort ();
4157
30667bf3
AM
4158 /* This symbol has an entry in the procedure linkage table. Set
4159 it up.
4160
4161 The format of a plt entry is
74d1c347
AM
4162 <funcaddr>
4163 <__gp>
47d89dba 4164 */
30667bf3
AM
4165 value = 0;
4166 if (h->root.type == bfd_link_hash_defined
4167 || h->root.type == bfd_link_hash_defweak)
4168 {
4169 value = h->root.u.def.value;
4170 if (h->root.u.def.section->output_section != NULL)
4171 value += (h->root.u.def.section->output_offset
4172 + h->root.u.def.section->output_section->vma);
252b5132 4173 }
edd21aca 4174
74d1c347 4175 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4176 {
47d89dba 4177 Elf_Internal_Rela rel;
3ac8354b 4178 Elf32_External_Rela *loc;
47d89dba 4179
30667bf3
AM
4180 /* Create a dynamic IPLT relocation for this entry. */
4181 rel.r_offset = (h->plt.offset
83c81bfe
AM
4182 + htab->splt->output_offset
4183 + htab->splt->output_section->vma);
ce757d15 4184 if (h->dynindx != -1)
74d1c347
AM
4185 {
4186 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4187 rel.r_addend = 0;
4188 }
4189 else
4190 {
4191 /* This symbol has been marked to become local, and is
4192 used by a plabel so must be kept in the .plt. */
4193 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4194 rel.r_addend = value;
4195 }
30667bf3 4196
3ac8354b
AM
4197 loc = (Elf32_External_Rela *) htab->srelplt->contents;
4198 loc += htab->srelplt->reloc_count++;
83c81bfe 4199 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4200 &rel, loc);
30667bf3 4201 }
ce757d15 4202 else
47d89dba 4203 {
ce757d15
AM
4204 bfd_put_32 (htab->splt->owner,
4205 value,
4206 htab->splt->contents + h->plt.offset);
4207 bfd_put_32 (htab->splt->owner,
4208 elf_gp (htab->splt->output_section->owner),
4209 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4210 }
4211
30667bf3
AM
4212 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4213 {
4214 /* Mark the symbol as undefined, rather than as defined in
4215 the .plt section. Leave the value alone. */
4216 sym->st_shndx = SHN_UNDEF;
4217 }
4218 }
edd21aca 4219
30667bf3
AM
4220 if (h->got.offset != (bfd_vma) -1)
4221 {
4222 Elf_Internal_Rela rel;
3ac8354b 4223 Elf32_External_Rela *loc;
30667bf3
AM
4224
4225 /* This symbol has an entry in the global offset table. Set it
4226 up. */
4227
4228 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4229 + htab->sgot->output_offset
4230 + htab->sgot->output_section->vma);
30667bf3 4231
4dc86686
AM
4232 /* If this is a -Bsymbolic link and the symbol is defined
4233 locally or was forced to be local because of a version file,
4234 we just want to emit a RELATIVE reloc. The entry in the
4235 global offset table will already have been initialized in the
4236 relocate_section function. */
4237 if (info->shared
4238 && (info->symbolic || h->dynindx == -1)
4239 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4240 {
74d1c347 4241 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4242 rel.r_addend = (h->root.u.def.value
4243 + h->root.u.def.section->output_offset
4244 + h->root.u.def.section->output_section->vma);
4245 }
4246 else
4247 {
49e9d0d3
AM
4248 if ((h->got.offset & 1) != 0)
4249 abort ();
30667bf3 4250 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4251 htab->sgot->contents + h->got.offset);
30667bf3
AM
4252 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4253 rel.r_addend = 0;
4254 }
edd21aca 4255
3ac8354b
AM
4256 loc = (Elf32_External_Rela *) htab->srelgot->contents;
4257 loc += htab->srelgot->reloc_count++;
4258 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4259 }
edd21aca 4260
30667bf3
AM
4261 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4262 {
4263 asection *s;
4264 Elf_Internal_Rela rel;
3ac8354b 4265 Elf32_External_Rela *loc;
30667bf3
AM
4266
4267 /* This symbol needs a copy reloc. Set it up. */
4268
49e9d0d3
AM
4269 if (! (h->dynindx != -1
4270 && (h->root.type == bfd_link_hash_defined
4271 || h->root.type == bfd_link_hash_defweak)))
4272 abort ();
30667bf3 4273
83c81bfe 4274 s = htab->srelbss;
30667bf3
AM
4275
4276 rel.r_offset = (h->root.u.def.value
4277 + h->root.u.def.section->output_offset
4278 + h->root.u.def.section->output_section->vma);
4279 rel.r_addend = 0;
4280 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
3ac8354b
AM
4281 loc = (Elf32_External_Rela *) s->contents + s->reloc_count++;
4282 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4283 }
4284
4285 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4286 if (h->root.root.string[0] == '_'
4287 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4288 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4289 {
4290 sym->st_shndx = SHN_ABS;
4291 }
4292
4293 return true;
4294}
4295
98ceb8ce
AM
4296/* Used to decide how to sort relocs in an optimal manner for the
4297 dynamic linker, before writing them out. */
4298
4299static enum elf_reloc_type_class
4300elf32_hppa_reloc_type_class (rela)
4301 const Elf_Internal_Rela *rela;
4302{
4303 if (ELF32_R_SYM (rela->r_info) == 0)
4304 return reloc_class_relative;
4305
4306 switch ((int) ELF32_R_TYPE (rela->r_info))
4307 {
4308 case R_PARISC_IPLT:
4309 return reloc_class_plt;
4310 case R_PARISC_COPY:
4311 return reloc_class_copy;
4312 default:
4313 return reloc_class_normal;
4314 }
4315}
4316
30667bf3
AM
4317/* Finish up the dynamic sections. */
4318
4319static boolean
4320elf32_hppa_finish_dynamic_sections (output_bfd, info)
4321 bfd *output_bfd;
4322 struct bfd_link_info *info;
4323{
4324 bfd *dynobj;
83c81bfe 4325 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4326 asection *sdyn;
4327
83c81bfe 4328 htab = hppa_link_hash_table (info);
ebe50bae 4329 dynobj = htab->elf.dynobj;
30667bf3
AM
4330
4331 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4332
ebe50bae 4333 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4334 {
4335 Elf32_External_Dyn *dyncon, *dynconend;
4336
49e9d0d3
AM
4337 if (sdyn == NULL)
4338 abort ();
30667bf3
AM
4339
4340 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4341 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4342 for (; dyncon < dynconend; dyncon++)
edd21aca 4343 {
30667bf3
AM
4344 Elf_Internal_Dyn dyn;
4345 asection *s;
4346
4347 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4348
4349 switch (dyn.d_tag)
4350 {
4351 default:
3ac8354b 4352 continue;
30667bf3
AM
4353
4354 case DT_PLTGOT:
4355 /* Use PLTGOT to set the GOT register. */
4356 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4357 break;
4358
4359 case DT_JMPREL:
83c81bfe 4360 s = htab->srelplt;
30667bf3 4361 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4362 break;
4363
4364 case DT_PLTRELSZ:
83c81bfe 4365 s = htab->srelplt;
30667bf3
AM
4366 if (s->_cooked_size != 0)
4367 dyn.d_un.d_val = s->_cooked_size;
4368 else
4369 dyn.d_un.d_val = s->_raw_size;
30667bf3 4370 break;
4e12ff7f
AM
4371
4372 case DT_RELASZ:
4373 /* Don't count procedure linkage table relocs in the
4374 overall reloc count. */
4375 if (htab->srelplt != NULL)
4376 {
4377 s = htab->srelplt->output_section;
4378 if (s->_cooked_size != 0)
4379 dyn.d_un.d_val -= s->_cooked_size;
4380 else
4381 dyn.d_un.d_val -= s->_raw_size;
4382 }
4383 break;
30667bf3 4384 }
3ac8354b
AM
4385
4386 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4387 }
252b5132 4388 }
edd21aca 4389
83c81bfe 4390 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4391 {
74d1c347
AM
4392 /* Fill in the first entry in the global offset table.
4393 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4394 bfd_put_32 (output_bfd,
4395 (sdyn != NULL
4396 ? sdyn->output_section->vma + sdyn->output_offset
4397 : (bfd_vma) 0),
83c81bfe 4398 htab->sgot->contents);
30667bf3 4399
74d1c347 4400 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4401 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4402
30667bf3 4403 /* Set .got entry size. */
83c81bfe 4404 elf_section_data (htab->sgot->output_section)
74d1c347 4405 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4406 }
4407
83c81bfe 4408 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4409 {
4410 /* Set plt entry size. */
83c81bfe 4411 elf_section_data (htab->splt->output_section)
47d89dba
AM
4412 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4413
83c81bfe 4414 if (htab->need_plt_stub)
47d89dba
AM
4415 {
4416 /* Set up the .plt stub. */
83c81bfe
AM
4417 memcpy (htab->splt->contents
4418 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4419 plt_stub, sizeof (plt_stub));
4420
83c81bfe
AM
4421 if ((htab->splt->output_offset
4422 + htab->splt->output_section->vma
4423 + htab->splt->_raw_size)
4424 != (htab->sgot->output_offset
4425 + htab->sgot->output_section->vma))
47d89dba
AM
4426 {
4427 (*_bfd_error_handler)
4428 (_(".got section not immediately after .plt section"));
4429 return false;
4430 }
4431 }
4432 }
30667bf3 4433
252b5132 4434 return true;
30667bf3 4435}
252b5132 4436
d952f17a
AM
4437/* Tweak the OSABI field of the elf header. */
4438
4439static void
4440elf32_hppa_post_process_headers (abfd, link_info)
4441 bfd *abfd;
4442 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4443{
4444 Elf_Internal_Ehdr * i_ehdrp;
4445
4446 i_ehdrp = elf_elfheader (abfd);
4447
4448 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4449 {
4450 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4451 }
4452 else
4453 {
4454 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4455 }
4456}
4457
30667bf3
AM
4458/* Called when writing out an object file to decide the type of a
4459 symbol. */
4460static int
4461elf32_hppa_elf_get_symbol_type (elf_sym, type)
4462 Elf_Internal_Sym *elf_sym;
4463 int type;
4464{
4465 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4466 return STT_PARISC_MILLI;
4467 else
4468 return type;
252b5132
RH
4469}
4470
4471/* Misc BFD support code. */
30667bf3
AM
4472#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4473#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4474#define elf_info_to_howto elf_hppa_info_to_howto
4475#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4476
252b5132 4477/* Stuff for the BFD linker. */
c46b7515 4478#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3
AM
4479#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4480#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4481#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4482#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4483#define elf_backend_check_relocs elf32_hppa_check_relocs
4484#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4485#define elf_backend_fake_sections elf_hppa_fake_sections
4486#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4487#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4488#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4489#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4490#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4491#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4492#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4493#define elf_backend_object_p elf32_hppa_object_p
4494#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4495#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4496#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4497#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4498
4499#define elf_backend_can_gc_sections 1
51b64d56 4500#define elf_backend_can_refcount 1
30667bf3
AM
4501#define elf_backend_plt_alignment 2
4502#define elf_backend_want_got_plt 0
4503#define elf_backend_plt_readonly 0
4504#define elf_backend_want_plt_sym 0
74d1c347 4505#define elf_backend_got_header_size 8
252b5132
RH
4506
4507#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4508#define TARGET_BIG_NAME "elf32-hppa"
4509#define ELF_ARCH bfd_arch_hppa
4510#define ELF_MACHINE_CODE EM_PARISC
4511#define ELF_MAXPAGESIZE 0x1000
4512
4513#include "elf32-target.h"
d952f17a
AM
4514
4515#undef TARGET_BIG_SYM
4516#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4517#undef TARGET_BIG_NAME
4518#define TARGET_BIG_NAME "elf32-hppa-linux"
4519
4520#define INCLUDED_TARGET_FILE 1
4521#include "elf32-target.h"
This page took 0.373563 seconds and 4 git commands to generate.