1 /* BFD back-end for HP PA-RISC ELF files.
2 Copyright (C) 1990-2017 Free Software Foundation, Inc.
5 Center for Software Science
6 Department of Computer Science
8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
12 This file is part of BFD, the Binary File Descriptor library.
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
16 the Free Software Foundation; either version 3 of the License, or
17 (at your option) any later version.
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
35 #include "elf32-hppa.h"
37 #include "elf32-hppa.h"
40 /* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
51 /* We use two hash tables to hold information for linking PA ELF objects.
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
59 necessary to build the linker stubs during a link.
61 There are a number of different stubs generated by the linker.
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
74 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
75 : ldw RR'lt_ptr+ltoff(%r1),%r21
77 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
79 Import stub to call shared library routine from shared library
80 (single sub-space version)
81 : addil LR'ltoff,%r19 ; get procedure entry point
82 : ldw RR'ltoff(%r1),%r21
84 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
86 Import stub to call shared library routine from normal object file
87 (multiple sub-space support)
88 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
89 : ldw RR'lt_ptr+ltoff(%r1),%r21
90 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
93 : be 0(%sr0,%r21) ; branch to target
94 : stw %rp,-24(%sp) ; save rp
96 Import stub to call shared library routine from shared library
97 (multiple sub-space support)
98 : addil LR'ltoff,%r19 ; get procedure entry point
99 : ldw RR'ltoff(%r1),%r21
100 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
103 : be 0(%sr0,%r21) ; branch to target
104 : stw %rp,-24(%sp) ; save rp
106 Export stub to return from shared lib routine (multiple sub-space support)
107 One of these is created for each exported procedure in a shared
108 library (and stored in the shared lib). Shared lib routines are
109 called via the first instruction in the export stub so that we can
110 do an inter-space return. Not required for single sub-space.
111 : bl,n X,%rp ; trap the return
113 : ldw -24(%sp),%rp ; restore the original rp
116 : be,n 0(%sr0,%rp) ; inter-space return. */
119 /* Variable names follow a coding style.
120 Please follow this (Apps Hungarian) style:
122 Structure/Variable Prefix
123 elf_link_hash_table "etab"
124 elf_link_hash_entry "eh"
126 elf32_hppa_link_hash_table "htab"
127 elf32_hppa_link_hash_entry "hh"
129 bfd_hash_table "btab"
132 bfd_hash_table containing stubs "bstab"
133 elf32_hppa_stub_hash_entry "hsh"
135 elf32_hppa_dyn_reloc_entry "hdh"
137 Always remember to use GNU Coding Style. */
139 #define PLT_ENTRY_SIZE 8
140 #define GOT_ENTRY_SIZE 4
141 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
143 static const bfd_byte plt_stub
[] =
145 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
146 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
147 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
148 #define PLT_STUB_ENTRY (3*4)
149 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
150 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
151 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
152 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
155 /* Section name for stubs is the associated section name plus this
157 #define STUB_SUFFIX ".stub"
159 /* We don't need to copy certain PC- or GP-relative dynamic relocs
160 into a shared object's dynamic section. All the relocs of the
161 limited class we are interested in, are absolute. */
162 #ifndef RELATIVE_DYNRELOCS
163 #define RELATIVE_DYNRELOCS 0
164 #define IS_ABSOLUTE_RELOC(r_type) 1
165 #define pc_dynrelocs(hh) 0
168 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
169 copying dynamic variables from a shared lib into an app's dynbss
170 section, and instead use a dynamic relocation to point into the
172 #define ELIMINATE_COPY_RELOCS 1
174 enum elf32_hppa_stub_type
176 hppa_stub_long_branch
,
177 hppa_stub_long_branch_shared
,
179 hppa_stub_import_shared
,
184 struct elf32_hppa_stub_hash_entry
186 /* Base hash table entry structure. */
187 struct bfd_hash_entry bh_root
;
189 /* The stub section. */
192 /* Offset within stub_sec of the beginning of this stub. */
195 /* Given the symbol's value and its section we can determine its final
196 value when building the stubs (so the stub knows where to jump. */
197 bfd_vma target_value
;
198 asection
*target_section
;
200 enum elf32_hppa_stub_type stub_type
;
202 /* The symbol table entry, if any, that this was derived from. */
203 struct elf32_hppa_link_hash_entry
*hh
;
205 /* Where this stub is being called from, or, in the case of combined
206 stub sections, the first input section in the group. */
219 struct elf32_hppa_link_hash_entry
221 struct elf_link_hash_entry eh
;
223 /* A pointer to the most recently used stub hash entry against this
225 struct elf32_hppa_stub_hash_entry
*hsh_cache
;
227 /* Used to count relocations for delayed sizing of relocation
229 struct elf32_hppa_dyn_reloc_entry
231 /* Next relocation in the chain. */
232 struct elf32_hppa_dyn_reloc_entry
*hdh_next
;
234 /* The input section of the reloc. */
237 /* Number of relocs copied in this section. */
240 #if RELATIVE_DYNRELOCS
241 /* Number of relative relocs copied for the input section. */
242 bfd_size_type relative_count
;
246 ENUM_BITFIELD (_tls_type
) tls_type
: 8;
248 /* Set if this symbol is used by a plabel reloc. */
249 unsigned int plabel
:1;
252 struct elf32_hppa_link_hash_table
254 /* The main hash table. */
255 struct elf_link_hash_table etab
;
257 /* The stub hash table. */
258 struct bfd_hash_table bstab
;
260 /* Linker stub bfd. */
263 /* Linker call-backs. */
264 asection
* (*add_stub_section
) (const char *, asection
*);
265 void (*layout_sections_again
) (void);
267 /* Array to keep track of which stub sections have been created, and
268 information on stub grouping. */
271 /* This is the section to which stubs in the group will be
274 /* The stub section. */
278 /* Assorted information used by elf32_hppa_size_stubs. */
279 unsigned int bfd_count
;
280 unsigned int top_index
;
281 asection
**input_list
;
282 Elf_Internal_Sym
**all_local_syms
;
284 /* Used during a final link to store the base of the text and data
285 segments so that we can perform SEGREL relocations. */
286 bfd_vma text_segment_base
;
287 bfd_vma data_segment_base
;
289 /* Whether we support multiple sub-spaces for shared libs. */
290 unsigned int multi_subspace
:1;
292 /* Flags set when various size branches are detected. Used to
293 select suitable defaults for the stub group size. */
294 unsigned int has_12bit_branch
:1;
295 unsigned int has_17bit_branch
:1;
296 unsigned int has_22bit_branch
:1;
298 /* Set if we need a .plt stub to support lazy dynamic linking. */
299 unsigned int need_plt_stub
:1;
301 /* Small local sym cache. */
302 struct sym_cache sym_cache
;
304 /* Data for LDM relocations. */
307 bfd_signed_vma refcount
;
312 /* Various hash macros and functions. */
313 #define hppa_link_hash_table(p) \
314 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
315 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
317 #define hppa_elf_hash_entry(ent) \
318 ((struct elf32_hppa_link_hash_entry *)(ent))
320 #define hppa_stub_hash_entry(ent) \
321 ((struct elf32_hppa_stub_hash_entry *)(ent))
323 #define hppa_stub_hash_lookup(table, string, create, copy) \
324 ((struct elf32_hppa_stub_hash_entry *) \
325 bfd_hash_lookup ((table), (string), (create), (copy)))
327 #define hppa_elf_local_got_tls_type(abfd) \
328 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
330 #define hh_name(hh) \
331 (hh ? hh->eh.root.root.string : "<undef>")
333 #define eh_name(eh) \
334 (eh ? eh->root.root.string : "<undef>")
336 /* Assorted hash table functions. */
338 /* Initialize an entry in the stub hash table. */
340 static struct bfd_hash_entry
*
341 stub_hash_newfunc (struct bfd_hash_entry
*entry
,
342 struct bfd_hash_table
*table
,
345 /* Allocate the structure if it has not already been allocated by a
349 entry
= bfd_hash_allocate (table
,
350 sizeof (struct elf32_hppa_stub_hash_entry
));
355 /* Call the allocation method of the superclass. */
356 entry
= bfd_hash_newfunc (entry
, table
, string
);
359 struct elf32_hppa_stub_hash_entry
*hsh
;
361 /* Initialize the local fields. */
362 hsh
= hppa_stub_hash_entry (entry
);
363 hsh
->stub_sec
= NULL
;
364 hsh
->stub_offset
= 0;
365 hsh
->target_value
= 0;
366 hsh
->target_section
= NULL
;
367 hsh
->stub_type
= hppa_stub_long_branch
;
375 /* Initialize an entry in the link hash table. */
377 static struct bfd_hash_entry
*
378 hppa_link_hash_newfunc (struct bfd_hash_entry
*entry
,
379 struct bfd_hash_table
*table
,
382 /* Allocate the structure if it has not already been allocated by a
386 entry
= bfd_hash_allocate (table
,
387 sizeof (struct elf32_hppa_link_hash_entry
));
392 /* Call the allocation method of the superclass. */
393 entry
= _bfd_elf_link_hash_newfunc (entry
, table
, string
);
396 struct elf32_hppa_link_hash_entry
*hh
;
398 /* Initialize the local fields. */
399 hh
= hppa_elf_hash_entry (entry
);
400 hh
->hsh_cache
= NULL
;
401 hh
->dyn_relocs
= NULL
;
403 hh
->tls_type
= GOT_UNKNOWN
;
409 /* Free the derived linker hash table. */
412 elf32_hppa_link_hash_table_free (bfd
*obfd
)
414 struct elf32_hppa_link_hash_table
*htab
415 = (struct elf32_hppa_link_hash_table
*) obfd
->link
.hash
;
417 bfd_hash_table_free (&htab
->bstab
);
418 _bfd_elf_link_hash_table_free (obfd
);
421 /* Create the derived linker hash table. The PA ELF port uses the derived
422 hash table to keep information specific to the PA ELF linker (without
423 using static variables). */
425 static struct bfd_link_hash_table
*
426 elf32_hppa_link_hash_table_create (bfd
*abfd
)
428 struct elf32_hppa_link_hash_table
*htab
;
429 bfd_size_type amt
= sizeof (*htab
);
431 htab
= bfd_zmalloc (amt
);
435 if (!_bfd_elf_link_hash_table_init (&htab
->etab
, abfd
, hppa_link_hash_newfunc
,
436 sizeof (struct elf32_hppa_link_hash_entry
),
443 /* Init the stub hash table too. */
444 if (!bfd_hash_table_init (&htab
->bstab
, stub_hash_newfunc
,
445 sizeof (struct elf32_hppa_stub_hash_entry
)))
447 _bfd_elf_link_hash_table_free (abfd
);
450 htab
->etab
.root
.hash_table_free
= elf32_hppa_link_hash_table_free
;
452 htab
->text_segment_base
= (bfd_vma
) -1;
453 htab
->data_segment_base
= (bfd_vma
) -1;
454 return &htab
->etab
.root
;
457 /* Initialize the linker stubs BFD so that we can use it for linker
458 created dynamic sections. */
461 elf32_hppa_init_stub_bfd (bfd
*abfd
, struct bfd_link_info
*info
)
463 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
465 elf_elfheader (abfd
)->e_ident
[EI_CLASS
] = ELFCLASS32
;
466 htab
->etab
.dynobj
= abfd
;
469 /* Build a name for an entry in the stub hash table. */
472 hppa_stub_name (const asection
*input_section
,
473 const asection
*sym_sec
,
474 const struct elf32_hppa_link_hash_entry
*hh
,
475 const Elf_Internal_Rela
*rela
)
482 len
= 8 + 1 + strlen (hh_name (hh
)) + 1 + 8 + 1;
483 stub_name
= bfd_malloc (len
);
484 if (stub_name
!= NULL
)
485 sprintf (stub_name
, "%08x_%s+%x",
486 input_section
->id
& 0xffffffff,
488 (int) rela
->r_addend
& 0xffffffff);
492 len
= 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
493 stub_name
= bfd_malloc (len
);
494 if (stub_name
!= NULL
)
495 sprintf (stub_name
, "%08x_%x:%x+%x",
496 input_section
->id
& 0xffffffff,
497 sym_sec
->id
& 0xffffffff,
498 (int) ELF32_R_SYM (rela
->r_info
) & 0xffffffff,
499 (int) rela
->r_addend
& 0xffffffff);
504 /* Look up an entry in the stub hash. Stub entries are cached because
505 creating the stub name takes a bit of time. */
507 static struct elf32_hppa_stub_hash_entry
*
508 hppa_get_stub_entry (const asection
*input_section
,
509 const asection
*sym_sec
,
510 struct elf32_hppa_link_hash_entry
*hh
,
511 const Elf_Internal_Rela
*rela
,
512 struct elf32_hppa_link_hash_table
*htab
)
514 struct elf32_hppa_stub_hash_entry
*hsh_entry
;
515 const asection
*id_sec
;
517 /* If this input section is part of a group of sections sharing one
518 stub section, then use the id of the first section in the group.
519 Stub names need to include a section id, as there may well be
520 more than one stub used to reach say, printf, and we need to
521 distinguish between them. */
522 id_sec
= htab
->stub_group
[input_section
->id
].link_sec
;
524 if (hh
!= NULL
&& hh
->hsh_cache
!= NULL
525 && hh
->hsh_cache
->hh
== hh
526 && hh
->hsh_cache
->id_sec
== id_sec
)
528 hsh_entry
= hh
->hsh_cache
;
534 stub_name
= hppa_stub_name (id_sec
, sym_sec
, hh
, rela
);
535 if (stub_name
== NULL
)
538 hsh_entry
= hppa_stub_hash_lookup (&htab
->bstab
,
539 stub_name
, FALSE
, FALSE
);
541 hh
->hsh_cache
= hsh_entry
;
549 /* Add a new stub entry to the stub hash. Not all fields of the new
550 stub entry are initialised. */
552 static struct elf32_hppa_stub_hash_entry
*
553 hppa_add_stub (const char *stub_name
,
555 struct elf32_hppa_link_hash_table
*htab
)
559 struct elf32_hppa_stub_hash_entry
*hsh
;
561 link_sec
= htab
->stub_group
[section
->id
].link_sec
;
562 stub_sec
= htab
->stub_group
[section
->id
].stub_sec
;
563 if (stub_sec
== NULL
)
565 stub_sec
= htab
->stub_group
[link_sec
->id
].stub_sec
;
566 if (stub_sec
== NULL
)
572 namelen
= strlen (link_sec
->name
);
573 len
= namelen
+ sizeof (STUB_SUFFIX
);
574 s_name
= bfd_alloc (htab
->stub_bfd
, len
);
578 memcpy (s_name
, link_sec
->name
, namelen
);
579 memcpy (s_name
+ namelen
, STUB_SUFFIX
, sizeof (STUB_SUFFIX
));
580 stub_sec
= (*htab
->add_stub_section
) (s_name
, link_sec
);
581 if (stub_sec
== NULL
)
583 htab
->stub_group
[link_sec
->id
].stub_sec
= stub_sec
;
585 htab
->stub_group
[section
->id
].stub_sec
= stub_sec
;
588 /* Enter this entry into the linker stub hash table. */
589 hsh
= hppa_stub_hash_lookup (&htab
->bstab
, stub_name
,
593 /* xgettext:c-format */
594 _bfd_error_handler (_("%B: cannot create stub entry %s"),
595 section
->owner
, stub_name
);
599 hsh
->stub_sec
= stub_sec
;
600 hsh
->stub_offset
= 0;
601 hsh
->id_sec
= link_sec
;
605 /* Determine the type of stub needed, if any, for a call. */
607 static enum elf32_hppa_stub_type
608 hppa_type_of_stub (asection
*input_sec
,
609 const Elf_Internal_Rela
*rela
,
610 struct elf32_hppa_link_hash_entry
*hh
,
612 struct bfd_link_info
*info
)
615 bfd_vma branch_offset
;
616 bfd_vma max_branch_offset
;
620 && hh
->eh
.plt
.offset
!= (bfd_vma
) -1
621 && hh
->eh
.dynindx
!= -1
623 && (bfd_link_pic (info
)
624 || !hh
->eh
.def_regular
625 || hh
->eh
.root
.type
== bfd_link_hash_defweak
))
627 /* We need an import stub. Decide between hppa_stub_import
628 and hppa_stub_import_shared later. */
629 return hppa_stub_import
;
632 /* Determine where the call point is. */
633 location
= (input_sec
->output_offset
634 + input_sec
->output_section
->vma
637 branch_offset
= destination
- location
- 8;
638 r_type
= ELF32_R_TYPE (rela
->r_info
);
640 /* Determine if a long branch stub is needed. parisc branch offsets
641 are relative to the second instruction past the branch, ie. +8
642 bytes on from the branch instruction location. The offset is
643 signed and counts in units of 4 bytes. */
644 if (r_type
== (unsigned int) R_PARISC_PCREL17F
)
645 max_branch_offset
= (1 << (17 - 1)) << 2;
647 else if (r_type
== (unsigned int) R_PARISC_PCREL12F
)
648 max_branch_offset
= (1 << (12 - 1)) << 2;
650 else /* R_PARISC_PCREL22F. */
651 max_branch_offset
= (1 << (22 - 1)) << 2;
653 if (branch_offset
+ max_branch_offset
>= 2*max_branch_offset
)
654 return hppa_stub_long_branch
;
656 return hppa_stub_none
;
659 /* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
660 IN_ARG contains the link info pointer. */
662 #define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
663 #define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
665 #define BL_R1 0xe8200000 /* b,l .+8,%r1 */
666 #define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
667 #define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
669 #define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
670 #define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
671 #define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
672 #define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
674 #define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
675 #define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
677 #define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
678 #define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
679 #define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
680 #define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
682 #define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
683 #define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
684 #define NOP 0x08000240 /* nop */
685 #define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
686 #define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
687 #define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
694 #define LDW_R1_DLT LDW_R1_R19
696 #define LDW_R1_DLT LDW_R1_DP
700 hppa_build_one_stub (struct bfd_hash_entry
*bh
, void *in_arg
)
702 struct elf32_hppa_stub_hash_entry
*hsh
;
703 struct bfd_link_info
*info
;
704 struct elf32_hppa_link_hash_table
*htab
;
714 /* Massage our args to the form they really have. */
715 hsh
= hppa_stub_hash_entry (bh
);
716 info
= (struct bfd_link_info
*)in_arg
;
718 htab
= hppa_link_hash_table (info
);
722 stub_sec
= hsh
->stub_sec
;
724 /* Make a note of the offset within the stubs for this entry. */
725 hsh
->stub_offset
= stub_sec
->size
;
726 loc
= stub_sec
->contents
+ hsh
->stub_offset
;
728 stub_bfd
= stub_sec
->owner
;
730 switch (hsh
->stub_type
)
732 case hppa_stub_long_branch
:
733 /* Create the long branch. A long branch is formed with "ldil"
734 loading the upper bits of the target address into a register,
735 then branching with "be" which adds in the lower bits.
736 The "be" has its delay slot nullified. */
737 sym_value
= (hsh
->target_value
738 + hsh
->target_section
->output_offset
739 + hsh
->target_section
->output_section
->vma
);
741 val
= hppa_field_adjust (sym_value
, 0, e_lrsel
);
742 insn
= hppa_rebuild_insn ((int) LDIL_R1
, val
, 21);
743 bfd_put_32 (stub_bfd
, insn
, loc
);
745 val
= hppa_field_adjust (sym_value
, 0, e_rrsel
) >> 2;
746 insn
= hppa_rebuild_insn ((int) BE_SR4_R1
, val
, 17);
747 bfd_put_32 (stub_bfd
, insn
, loc
+ 4);
752 case hppa_stub_long_branch_shared
:
753 /* Branches are relative. This is where we are going to. */
754 sym_value
= (hsh
->target_value
755 + hsh
->target_section
->output_offset
756 + hsh
->target_section
->output_section
->vma
);
758 /* And this is where we are coming from, more or less. */
759 sym_value
-= (hsh
->stub_offset
760 + stub_sec
->output_offset
761 + stub_sec
->output_section
->vma
);
763 bfd_put_32 (stub_bfd
, (bfd_vma
) BL_R1
, loc
);
764 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) -8, e_lrsel
);
765 insn
= hppa_rebuild_insn ((int) ADDIL_R1
, val
, 21);
766 bfd_put_32 (stub_bfd
, insn
, loc
+ 4);
768 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) -8, e_rrsel
) >> 2;
769 insn
= hppa_rebuild_insn ((int) BE_SR4_R1
, val
, 17);
770 bfd_put_32 (stub_bfd
, insn
, loc
+ 8);
774 case hppa_stub_import
:
775 case hppa_stub_import_shared
:
776 off
= hsh
->hh
->eh
.plt
.offset
;
777 if (off
>= (bfd_vma
) -2)
780 off
&= ~ (bfd_vma
) 1;
782 + htab
->etab
.splt
->output_offset
783 + htab
->etab
.splt
->output_section
->vma
784 - elf_gp (htab
->etab
.splt
->output_section
->owner
));
788 if (hsh
->stub_type
== hppa_stub_import_shared
)
791 val
= hppa_field_adjust (sym_value
, 0, e_lrsel
),
792 insn
= hppa_rebuild_insn ((int) insn
, val
, 21);
793 bfd_put_32 (stub_bfd
, insn
, loc
);
795 /* It is critical to use lrsel/rrsel here because we are using
796 two different offsets (+0 and +4) from sym_value. If we use
797 lsel/rsel then with unfortunate sym_values we will round
798 sym_value+4 up to the next 2k block leading to a mis-match
799 between the lsel and rsel value. */
800 val
= hppa_field_adjust (sym_value
, 0, e_rrsel
);
801 insn
= hppa_rebuild_insn ((int) LDW_R1_R21
, val
, 14);
802 bfd_put_32 (stub_bfd
, insn
, loc
+ 4);
804 if (htab
->multi_subspace
)
806 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) 4, e_rrsel
);
807 insn
= hppa_rebuild_insn ((int) LDW_R1_DLT
, val
, 14);
808 bfd_put_32 (stub_bfd
, insn
, loc
+ 8);
810 bfd_put_32 (stub_bfd
, (bfd_vma
) LDSID_R21_R1
, loc
+ 12);
811 bfd_put_32 (stub_bfd
, (bfd_vma
) MTSP_R1
, loc
+ 16);
812 bfd_put_32 (stub_bfd
, (bfd_vma
) BE_SR0_R21
, loc
+ 20);
813 bfd_put_32 (stub_bfd
, (bfd_vma
) STW_RP
, loc
+ 24);
819 bfd_put_32 (stub_bfd
, (bfd_vma
) BV_R0_R21
, loc
+ 8);
820 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) 4, e_rrsel
);
821 insn
= hppa_rebuild_insn ((int) LDW_R1_DLT
, val
, 14);
822 bfd_put_32 (stub_bfd
, insn
, loc
+ 12);
829 case hppa_stub_export
:
830 /* Branches are relative. This is where we are going to. */
831 sym_value
= (hsh
->target_value
832 + hsh
->target_section
->output_offset
833 + hsh
->target_section
->output_section
->vma
);
835 /* And this is where we are coming from. */
836 sym_value
-= (hsh
->stub_offset
837 + stub_sec
->output_offset
838 + stub_sec
->output_section
->vma
);
840 if (sym_value
- 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
841 && (!htab
->has_22bit_branch
842 || sym_value
- 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
845 /* xgettext:c-format */
846 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
847 hsh
->target_section
->owner
,
850 hsh
->bh_root
.string
);
851 bfd_set_error (bfd_error_bad_value
);
855 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) -8, e_fsel
) >> 2;
856 if (!htab
->has_22bit_branch
)
857 insn
= hppa_rebuild_insn ((int) BL_RP
, val
, 17);
859 insn
= hppa_rebuild_insn ((int) BL22_RP
, val
, 22);
860 bfd_put_32 (stub_bfd
, insn
, loc
);
862 bfd_put_32 (stub_bfd
, (bfd_vma
) NOP
, loc
+ 4);
863 bfd_put_32 (stub_bfd
, (bfd_vma
) LDW_RP
, loc
+ 8);
864 bfd_put_32 (stub_bfd
, (bfd_vma
) LDSID_RP_R1
, loc
+ 12);
865 bfd_put_32 (stub_bfd
, (bfd_vma
) MTSP_R1
, loc
+ 16);
866 bfd_put_32 (stub_bfd
, (bfd_vma
) BE_SR0_RP
, loc
+ 20);
868 /* Point the function symbol at the stub. */
869 hsh
->hh
->eh
.root
.u
.def
.section
= stub_sec
;
870 hsh
->hh
->eh
.root
.u
.def
.value
= stub_sec
->size
;
880 stub_sec
->size
+= size
;
905 /* As above, but don't actually build the stub. Just bump offset so
906 we know stub section sizes. */
909 hppa_size_one_stub (struct bfd_hash_entry
*bh
, void *in_arg
)
911 struct elf32_hppa_stub_hash_entry
*hsh
;
912 struct elf32_hppa_link_hash_table
*htab
;
915 /* Massage our args to the form they really have. */
916 hsh
= hppa_stub_hash_entry (bh
);
919 if (hsh
->stub_type
== hppa_stub_long_branch
)
921 else if (hsh
->stub_type
== hppa_stub_long_branch_shared
)
923 else if (hsh
->stub_type
== hppa_stub_export
)
925 else /* hppa_stub_import or hppa_stub_import_shared. */
927 if (htab
->multi_subspace
)
933 hsh
->stub_sec
->size
+= size
;
937 /* Return nonzero if ABFD represents an HPPA ELF32 file.
938 Additionally we set the default architecture and machine. */
941 elf32_hppa_object_p (bfd
*abfd
)
943 Elf_Internal_Ehdr
* i_ehdrp
;
946 i_ehdrp
= elf_elfheader (abfd
);
947 if (strcmp (bfd_get_target (abfd
), "elf32-hppa-linux") == 0)
949 /* GCC on hppa-linux produces binaries with OSABI=GNU,
950 but the kernel produces corefiles with OSABI=SysV. */
951 if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_GNU
&&
952 i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_NONE
) /* aka SYSV */
955 else if (strcmp (bfd_get_target (abfd
), "elf32-hppa-netbsd") == 0)
957 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
958 but the kernel produces corefiles with OSABI=SysV. */
959 if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_NETBSD
&&
960 i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_NONE
) /* aka SYSV */
965 if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_HPUX
)
969 flags
= i_ehdrp
->e_flags
;
970 switch (flags
& (EF_PARISC_ARCH
| EF_PARISC_WIDE
))
973 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 10);
975 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 11);
977 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 20);
978 case EFA_PARISC_2_0
| EF_PARISC_WIDE
:
979 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 25);
984 /* Create the .plt and .got sections, and set up our hash table
985 short-cuts to various dynamic sections. */
988 elf32_hppa_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
990 struct elf32_hppa_link_hash_table
*htab
;
991 struct elf_link_hash_entry
*eh
;
993 /* Don't try to create the .plt and .got twice. */
994 htab
= hppa_link_hash_table (info
);
997 if (htab
->etab
.splt
!= NULL
)
1000 /* Call the generic code to do most of the work. */
1001 if (! _bfd_elf_create_dynamic_sections (abfd
, info
))
1004 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1005 application, because __canonicalize_funcptr_for_compare needs it. */
1006 eh
= elf_hash_table (info
)->hgot
;
1007 eh
->forced_local
= 0;
1008 eh
->other
= STV_DEFAULT
;
1009 return bfd_elf_link_record_dynamic_symbol (info
, eh
);
1012 /* Copy the extra info we tack onto an elf_link_hash_entry. */
1015 elf32_hppa_copy_indirect_symbol (struct bfd_link_info
*info
,
1016 struct elf_link_hash_entry
*eh_dir
,
1017 struct elf_link_hash_entry
*eh_ind
)
1019 struct elf32_hppa_link_hash_entry
*hh_dir
, *hh_ind
;
1021 hh_dir
= hppa_elf_hash_entry (eh_dir
);
1022 hh_ind
= hppa_elf_hash_entry (eh_ind
);
1024 if (hh_ind
->dyn_relocs
!= NULL
1025 && eh_ind
->root
.type
== bfd_link_hash_indirect
)
1027 if (hh_dir
->dyn_relocs
!= NULL
)
1029 struct elf32_hppa_dyn_reloc_entry
**hdh_pp
;
1030 struct elf32_hppa_dyn_reloc_entry
*hdh_p
;
1032 /* Add reloc counts against the indirect sym to the direct sym
1033 list. Merge any entries against the same section. */
1034 for (hdh_pp
= &hh_ind
->dyn_relocs
; (hdh_p
= *hdh_pp
) != NULL
; )
1036 struct elf32_hppa_dyn_reloc_entry
*hdh_q
;
1038 for (hdh_q
= hh_dir
->dyn_relocs
;
1040 hdh_q
= hdh_q
->hdh_next
)
1041 if (hdh_q
->sec
== hdh_p
->sec
)
1043 #if RELATIVE_DYNRELOCS
1044 hdh_q
->relative_count
+= hdh_p
->relative_count
;
1046 hdh_q
->count
+= hdh_p
->count
;
1047 *hdh_pp
= hdh_p
->hdh_next
;
1051 hdh_pp
= &hdh_p
->hdh_next
;
1053 *hdh_pp
= hh_dir
->dyn_relocs
;
1056 hh_dir
->dyn_relocs
= hh_ind
->dyn_relocs
;
1057 hh_ind
->dyn_relocs
= NULL
;
1060 if (eh_ind
->root
.type
== bfd_link_hash_indirect
)
1062 hh_dir
->plabel
|= hh_ind
->plabel
;
1063 hh_dir
->tls_type
|= hh_ind
->tls_type
;
1064 hh_ind
->tls_type
= GOT_UNKNOWN
;
1067 _bfd_elf_link_hash_copy_indirect (info
, eh_dir
, eh_ind
);
1071 elf32_hppa_optimized_tls_reloc (struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
1072 int r_type
, int is_local ATTRIBUTE_UNUSED
)
1074 /* For now we don't support linker optimizations. */
1078 /* Return a pointer to the local GOT, PLT and TLS reference counts
1079 for ABFD. Returns NULL if the storage allocation fails. */
1081 static bfd_signed_vma
*
1082 hppa32_elf_local_refcounts (bfd
*abfd
)
1084 Elf_Internal_Shdr
*symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1085 bfd_signed_vma
*local_refcounts
;
1087 local_refcounts
= elf_local_got_refcounts (abfd
);
1088 if (local_refcounts
== NULL
)
1092 /* Allocate space for local GOT and PLT reference
1093 counts. Done this way to save polluting elf_obj_tdata
1094 with another target specific pointer. */
1095 size
= symtab_hdr
->sh_info
;
1096 size
*= 2 * sizeof (bfd_signed_vma
);
1097 /* Add in space to store the local GOT TLS types. */
1098 size
+= symtab_hdr
->sh_info
;
1099 local_refcounts
= bfd_zalloc (abfd
, size
);
1100 if (local_refcounts
== NULL
)
1102 elf_local_got_refcounts (abfd
) = local_refcounts
;
1103 memset (hppa_elf_local_got_tls_type (abfd
), GOT_UNKNOWN
,
1104 symtab_hdr
->sh_info
);
1106 return local_refcounts
;
1110 /* Look through the relocs for a section during the first phase, and
1111 calculate needed space in the global offset table, procedure linkage
1112 table, and dynamic reloc sections. At this point we haven't
1113 necessarily read all the input files. */
1116 elf32_hppa_check_relocs (bfd
*abfd
,
1117 struct bfd_link_info
*info
,
1119 const Elf_Internal_Rela
*relocs
)
1121 Elf_Internal_Shdr
*symtab_hdr
;
1122 struct elf_link_hash_entry
**eh_syms
;
1123 const Elf_Internal_Rela
*rela
;
1124 const Elf_Internal_Rela
*rela_end
;
1125 struct elf32_hppa_link_hash_table
*htab
;
1128 if (bfd_link_relocatable (info
))
1131 htab
= hppa_link_hash_table (info
);
1134 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1135 eh_syms
= elf_sym_hashes (abfd
);
1138 rela_end
= relocs
+ sec
->reloc_count
;
1139 for (rela
= relocs
; rela
< rela_end
; rela
++)
1148 unsigned int r_symndx
, r_type
;
1149 struct elf32_hppa_link_hash_entry
*hh
;
1152 r_symndx
= ELF32_R_SYM (rela
->r_info
);
1154 if (r_symndx
< symtab_hdr
->sh_info
)
1158 hh
= hppa_elf_hash_entry (eh_syms
[r_symndx
- symtab_hdr
->sh_info
]);
1159 while (hh
->eh
.root
.type
== bfd_link_hash_indirect
1160 || hh
->eh
.root
.type
== bfd_link_hash_warning
)
1161 hh
= hppa_elf_hash_entry (hh
->eh
.root
.u
.i
.link
);
1164 r_type
= ELF32_R_TYPE (rela
->r_info
);
1165 r_type
= elf32_hppa_optimized_tls_reloc (info
, r_type
, hh
== NULL
);
1169 case R_PARISC_DLTIND14F
:
1170 case R_PARISC_DLTIND14R
:
1171 case R_PARISC_DLTIND21L
:
1172 /* This symbol requires a global offset table entry. */
1173 need_entry
= NEED_GOT
;
1176 case R_PARISC_PLABEL14R
: /* "Official" procedure labels. */
1177 case R_PARISC_PLABEL21L
:
1178 case R_PARISC_PLABEL32
:
1179 /* If the addend is non-zero, we break badly. */
1180 if (rela
->r_addend
!= 0)
1183 /* If we are creating a shared library, then we need to
1184 create a PLT entry for all PLABELs, because PLABELs with
1185 local symbols may be passed via a pointer to another
1186 object. Additionally, output a dynamic relocation
1187 pointing to the PLT entry.
1189 For executables, the original 32-bit ABI allowed two
1190 different styles of PLABELs (function pointers): For
1191 global functions, the PLABEL word points into the .plt
1192 two bytes past a (function address, gp) pair, and for
1193 local functions the PLABEL points directly at the
1194 function. The magic +2 for the first type allows us to
1195 differentiate between the two. As you can imagine, this
1196 is a real pain when it comes to generating code to call
1197 functions indirectly or to compare function pointers.
1198 We avoid the mess by always pointing a PLABEL into the
1199 .plt, even for local functions. */
1200 need_entry
= PLT_PLABEL
| NEED_PLT
;
1201 if (bfd_link_pic (info
))
1202 need_entry
|= NEED_DYNREL
;
1205 case R_PARISC_PCREL12F
:
1206 htab
->has_12bit_branch
= 1;
1209 case R_PARISC_PCREL17C
:
1210 case R_PARISC_PCREL17F
:
1211 htab
->has_17bit_branch
= 1;
1214 case R_PARISC_PCREL22F
:
1215 htab
->has_22bit_branch
= 1;
1217 /* Function calls might need to go through the .plt, and
1218 might require long branch stubs. */
1221 /* We know local syms won't need a .plt entry, and if
1222 they need a long branch stub we can't guarantee that
1223 we can reach the stub. So just flag an error later
1224 if we're doing a shared link and find we need a long
1230 /* Global symbols will need a .plt entry if they remain
1231 global, and in most cases won't need a long branch
1232 stub. Unfortunately, we have to cater for the case
1233 where a symbol is forced local by versioning, or due
1234 to symbolic linking, and we lose the .plt entry. */
1235 need_entry
= NEED_PLT
;
1236 if (hh
->eh
.type
== STT_PARISC_MILLI
)
1241 case R_PARISC_SEGBASE
: /* Used to set segment base. */
1242 case R_PARISC_SEGREL32
: /* Relative reloc, used for unwind. */
1243 case R_PARISC_PCREL14F
: /* PC relative load/store. */
1244 case R_PARISC_PCREL14R
:
1245 case R_PARISC_PCREL17R
: /* External branches. */
1246 case R_PARISC_PCREL21L
: /* As above, and for load/store too. */
1247 case R_PARISC_PCREL32
:
1248 /* We don't need to propagate the relocation if linking a
1249 shared object since these are section relative. */
1252 case R_PARISC_DPREL14F
: /* Used for gp rel data load/store. */
1253 case R_PARISC_DPREL14R
:
1254 case R_PARISC_DPREL21L
:
1255 if (bfd_link_pic (info
))
1258 /* xgettext:c-format */
1259 (_("%B: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1261 elf_hppa_howto_table
[r_type
].name
);
1262 bfd_set_error (bfd_error_bad_value
);
1267 case R_PARISC_DIR17F
: /* Used for external branches. */
1268 case R_PARISC_DIR17R
:
1269 case R_PARISC_DIR14F
: /* Used for load/store from absolute locn. */
1270 case R_PARISC_DIR14R
:
1271 case R_PARISC_DIR21L
: /* As above, and for ext branches too. */
1272 case R_PARISC_DIR32
: /* .word relocs. */
1273 /* We may want to output a dynamic relocation later. */
1274 need_entry
= NEED_DYNREL
;
1277 /* This relocation describes the C++ object vtable hierarchy.
1278 Reconstruct it for later use during GC. */
1279 case R_PARISC_GNU_VTINHERIT
:
1280 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, &hh
->eh
, rela
->r_offset
))
1284 /* This relocation describes which C++ vtable entries are actually
1285 used. Record for later use during GC. */
1286 case R_PARISC_GNU_VTENTRY
:
1287 BFD_ASSERT (hh
!= NULL
);
1289 && !bfd_elf_gc_record_vtentry (abfd
, sec
, &hh
->eh
, rela
->r_addend
))
1293 case R_PARISC_TLS_GD21L
:
1294 case R_PARISC_TLS_GD14R
:
1295 case R_PARISC_TLS_LDM21L
:
1296 case R_PARISC_TLS_LDM14R
:
1297 need_entry
= NEED_GOT
;
1300 case R_PARISC_TLS_IE21L
:
1301 case R_PARISC_TLS_IE14R
:
1302 if (bfd_link_dll (info
))
1303 info
->flags
|= DF_STATIC_TLS
;
1304 need_entry
= NEED_GOT
;
1311 /* Now carry out our orders. */
1312 if (need_entry
& NEED_GOT
)
1314 int tls_type
= GOT_NORMAL
;
1320 case R_PARISC_TLS_GD21L
:
1321 case R_PARISC_TLS_GD14R
:
1322 tls_type
= GOT_TLS_GD
;
1324 case R_PARISC_TLS_LDM21L
:
1325 case R_PARISC_TLS_LDM14R
:
1326 tls_type
= GOT_TLS_LDM
;
1328 case R_PARISC_TLS_IE21L
:
1329 case R_PARISC_TLS_IE14R
:
1330 tls_type
= GOT_TLS_IE
;
1334 /* Allocate space for a GOT entry, as well as a dynamic
1335 relocation for this entry. */
1336 if (htab
->etab
.sgot
== NULL
)
1338 if (!elf32_hppa_create_dynamic_sections (htab
->etab
.dynobj
, info
))
1344 if (tls_type
== GOT_TLS_LDM
)
1345 htab
->tls_ldm_got
.refcount
+= 1;
1347 hh
->eh
.got
.refcount
+= 1;
1348 hh
->tls_type
|= tls_type
;
1352 bfd_signed_vma
*local_got_refcounts
;
1354 /* This is a global offset table entry for a local symbol. */
1355 local_got_refcounts
= hppa32_elf_local_refcounts (abfd
);
1356 if (local_got_refcounts
== NULL
)
1358 if (tls_type
== GOT_TLS_LDM
)
1359 htab
->tls_ldm_got
.refcount
+= 1;
1361 local_got_refcounts
[r_symndx
] += 1;
1363 hppa_elf_local_got_tls_type (abfd
) [r_symndx
] |= tls_type
;
1367 if (need_entry
& NEED_PLT
)
1369 /* If we are creating a shared library, and this is a reloc
1370 against a weak symbol or a global symbol in a dynamic
1371 object, then we will be creating an import stub and a
1372 .plt entry for the symbol. Similarly, on a normal link
1373 to symbols defined in a dynamic object we'll need the
1374 import stub and a .plt entry. We don't know yet whether
1375 the symbol is defined or not, so make an entry anyway and
1376 clean up later in adjust_dynamic_symbol. */
1377 if ((sec
->flags
& SEC_ALLOC
) != 0)
1381 hh
->eh
.needs_plt
= 1;
1382 hh
->eh
.plt
.refcount
+= 1;
1384 /* If this .plt entry is for a plabel, mark it so
1385 that adjust_dynamic_symbol will keep the entry
1386 even if it appears to be local. */
1387 if (need_entry
& PLT_PLABEL
)
1390 else if (need_entry
& PLT_PLABEL
)
1392 bfd_signed_vma
*local_got_refcounts
;
1393 bfd_signed_vma
*local_plt_refcounts
;
1395 local_got_refcounts
= hppa32_elf_local_refcounts (abfd
);
1396 if (local_got_refcounts
== NULL
)
1398 local_plt_refcounts
= (local_got_refcounts
1399 + symtab_hdr
->sh_info
);
1400 local_plt_refcounts
[r_symndx
] += 1;
1405 if ((need_entry
& NEED_DYNREL
) != 0
1406 && (sec
->flags
& SEC_ALLOC
) != 0)
1408 /* Flag this symbol as having a non-got, non-plt reference
1409 so that we generate copy relocs if it turns out to be
1412 hh
->eh
.non_got_ref
= 1;
1414 /* If we are creating a shared library then we need to copy
1415 the reloc into the shared library. However, if we are
1416 linking with -Bsymbolic, we need only copy absolute
1417 relocs or relocs against symbols that are not defined in
1418 an object we are including in the link. PC- or DP- or
1419 DLT-relative relocs against any local sym or global sym
1420 with DEF_REGULAR set, can be discarded. At this point we
1421 have not seen all the input files, so it is possible that
1422 DEF_REGULAR is not set now but will be set later (it is
1423 never cleared). We account for that possibility below by
1424 storing information in the dyn_relocs field of the
1427 A similar situation to the -Bsymbolic case occurs when
1428 creating shared libraries and symbol visibility changes
1429 render the symbol local.
1431 As it turns out, all the relocs we will be creating here
1432 are absolute, so we cannot remove them on -Bsymbolic
1433 links or visibility changes anyway. A STUB_REL reloc
1434 is absolute too, as in that case it is the reloc in the
1435 stub we will be creating, rather than copying the PCREL
1436 reloc in the branch.
1438 If on the other hand, we are creating an executable, we
1439 may need to keep relocations for symbols satisfied by a
1440 dynamic library if we manage to avoid copy relocs for the
1442 if ((bfd_link_pic (info
)
1443 && (IS_ABSOLUTE_RELOC (r_type
)
1445 && (!SYMBOLIC_BIND (info
, &hh
->eh
)
1446 || hh
->eh
.root
.type
== bfd_link_hash_defweak
1447 || !hh
->eh
.def_regular
))))
1448 || (ELIMINATE_COPY_RELOCS
1449 && !bfd_link_pic (info
)
1451 && (hh
->eh
.root
.type
== bfd_link_hash_defweak
1452 || !hh
->eh
.def_regular
)))
1454 struct elf32_hppa_dyn_reloc_entry
*hdh_p
;
1455 struct elf32_hppa_dyn_reloc_entry
**hdh_head
;
1457 /* Create a reloc section in dynobj and make room for
1461 sreloc
= _bfd_elf_make_dynamic_reloc_section
1462 (sec
, htab
->etab
.dynobj
, 2, abfd
, /*rela?*/ TRUE
);
1466 bfd_set_error (bfd_error_bad_value
);
1471 /* If this is a global symbol, we count the number of
1472 relocations we need for this symbol. */
1475 hdh_head
= &hh
->dyn_relocs
;
1479 /* Track dynamic relocs needed for local syms too.
1480 We really need local syms available to do this
1484 Elf_Internal_Sym
*isym
;
1486 isym
= bfd_sym_from_r_symndx (&htab
->sym_cache
,
1491 sr
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
1495 vpp
= &elf_section_data (sr
)->local_dynrel
;
1496 hdh_head
= (struct elf32_hppa_dyn_reloc_entry
**) vpp
;
1500 if (hdh_p
== NULL
|| hdh_p
->sec
!= sec
)
1502 hdh_p
= bfd_alloc (htab
->etab
.dynobj
, sizeof *hdh_p
);
1505 hdh_p
->hdh_next
= *hdh_head
;
1509 #if RELATIVE_DYNRELOCS
1510 hdh_p
->relative_count
= 0;
1515 #if RELATIVE_DYNRELOCS
1516 if (!IS_ABSOLUTE_RELOC (rtype
))
1517 hdh_p
->relative_count
+= 1;
1526 /* Return the section that should be marked against garbage collection
1527 for a given relocation. */
1530 elf32_hppa_gc_mark_hook (asection
*sec
,
1531 struct bfd_link_info
*info
,
1532 Elf_Internal_Rela
*rela
,
1533 struct elf_link_hash_entry
*hh
,
1534 Elf_Internal_Sym
*sym
)
1537 switch ((unsigned int) ELF32_R_TYPE (rela
->r_info
))
1539 case R_PARISC_GNU_VTINHERIT
:
1540 case R_PARISC_GNU_VTENTRY
:
1544 return _bfd_elf_gc_mark_hook (sec
, info
, rela
, hh
, sym
);
1547 /* Support for core dump NOTE sections. */
1550 elf32_hppa_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
1555 switch (note
->descsz
)
1560 case 396: /* Linux/hppa */
1562 elf_tdata (abfd
)->core
->signal
= bfd_get_16 (abfd
, note
->descdata
+ 12);
1565 elf_tdata (abfd
)->core
->lwpid
= bfd_get_32 (abfd
, note
->descdata
+ 24);
1574 /* Make a ".reg/999" section. */
1575 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
1576 size
, note
->descpos
+ offset
);
1580 elf32_hppa_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
1582 switch (note
->descsz
)
1587 case 124: /* Linux/hppa elf_prpsinfo. */
1588 elf_tdata (abfd
)->core
->program
1589 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 28, 16);
1590 elf_tdata (abfd
)->core
->command
1591 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 44, 80);
1594 /* Note that for some reason, a spurious space is tacked
1595 onto the end of the args in some (at least one anyway)
1596 implementations, so strip it off if it exists. */
1598 char *command
= elf_tdata (abfd
)->core
->command
;
1599 int n
= strlen (command
);
1601 if (0 < n
&& command
[n
- 1] == ' ')
1602 command
[n
- 1] = '\0';
1608 /* Our own version of hide_symbol, so that we can keep plt entries for
1612 elf32_hppa_hide_symbol (struct bfd_link_info
*info
,
1613 struct elf_link_hash_entry
*eh
,
1614 bfd_boolean force_local
)
1618 eh
->forced_local
= 1;
1619 if (eh
->dynindx
!= -1)
1622 _bfd_elf_strtab_delref (elf_hash_table (info
)->dynstr
,
1626 /* PR 16082: Remove version information from hidden symbol. */
1627 eh
->verinfo
.verdef
= NULL
;
1628 eh
->verinfo
.vertree
= NULL
;
1631 /* STT_GNU_IFUNC symbol must go through PLT. */
1632 if (! hppa_elf_hash_entry (eh
)->plabel
1633 && eh
->type
!= STT_GNU_IFUNC
)
1636 eh
->plt
= elf_hash_table (info
)->init_plt_offset
;
1640 /* Find any dynamic relocs that apply to read-only sections. */
1643 readonly_dynrelocs (struct elf_link_hash_entry
*eh
)
1645 struct elf32_hppa_link_hash_entry
*hh
;
1646 struct elf32_hppa_dyn_reloc_entry
*hdh_p
;
1648 hh
= hppa_elf_hash_entry (eh
);
1649 for (hdh_p
= hh
->dyn_relocs
; hdh_p
!= NULL
; hdh_p
= hdh_p
->hdh_next
)
1651 asection
*sec
= hdh_p
->sec
->output_section
;
1653 if (sec
!= NULL
&& (sec
->flags
& SEC_READONLY
) != 0)
1659 /* Return true if we have dynamic relocs against H or any of its weak
1660 aliases, that apply to read-only sections. Cannot be used after
1661 size_dynamic_sections. */
1664 alias_readonly_dynrelocs (struct elf_link_hash_entry
*eh
)
1666 struct elf32_hppa_link_hash_entry
*hh
= hppa_elf_hash_entry (eh
);
1669 if (readonly_dynrelocs (&hh
->eh
))
1671 hh
= hppa_elf_hash_entry (hh
->eh
.u
.alias
);
1672 } while (hh
!= NULL
&& &hh
->eh
!= eh
);
1677 /* Adjust a symbol defined by a dynamic object and referenced by a
1678 regular object. The current definition is in some section of the
1679 dynamic object, but we're not including those sections. We have to
1680 change the definition to something the rest of the link can
1684 elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info
*info
,
1685 struct elf_link_hash_entry
*eh
)
1687 struct elf32_hppa_link_hash_table
*htab
;
1688 asection
*sec
, *srel
;
1690 /* If this is a function, put it in the procedure linkage table. We
1691 will fill in the contents of the procedure linkage table later. */
1692 if (eh
->type
== STT_FUNC
1695 bfd_boolean local
= (SYMBOL_CALLS_LOCAL (info
, eh
)
1696 || UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
));
1697 /* Discard dyn_relocs when non-pic if we've decided that a
1698 function symbol is local. */
1699 if (!bfd_link_pic (info
) && local
)
1700 hppa_elf_hash_entry (eh
)->dyn_relocs
= NULL
;
1702 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1703 The refcounts are not reliable when it has been hidden since
1704 hide_symbol can be called before the plabel flag is set. */
1705 if (hppa_elf_hash_entry (eh
)->plabel
)
1706 eh
->plt
.refcount
= 1;
1708 /* Note that unlike some other backends, the refcount is not
1709 incremented for a non-call (and non-plabel) function reference. */
1710 else if (eh
->plt
.refcount
<= 0
1713 /* The .plt entry is not needed when:
1714 a) Garbage collection has removed all references to the
1716 b) We know for certain the symbol is defined in this
1717 object, and it's not a weak definition, nor is the symbol
1718 used by a plabel relocation. Either this object is the
1719 application or we are doing a shared symbolic link. */
1720 eh
->plt
.offset
= (bfd_vma
) -1;
1724 /* Unlike other targets, elf32-hppa.c does not define a function
1725 symbol in a non-pic executable on PLT stub code, so we don't
1726 have a local definition in that case. ie. dyn_relocs can't
1729 /* Function symbols can't have copy relocs. */
1733 eh
->plt
.offset
= (bfd_vma
) -1;
1735 htab
= hppa_link_hash_table (info
);
1739 /* If this is a weak symbol, and there is a real definition, the
1740 processor independent code will have arranged for us to see the
1741 real definition first, and we can just use the same value. */
1742 if (eh
->is_weakalias
)
1744 struct elf_link_hash_entry
*def
= weakdef (eh
);
1745 BFD_ASSERT (def
->root
.type
== bfd_link_hash_defined
);
1746 eh
->root
.u
.def
.section
= def
->root
.u
.def
.section
;
1747 eh
->root
.u
.def
.value
= def
->root
.u
.def
.value
;
1748 if (def
->root
.u
.def
.section
== htab
->etab
.sdynbss
1749 || def
->root
.u
.def
.section
== htab
->etab
.sdynrelro
)
1750 hppa_elf_hash_entry (eh
)->dyn_relocs
= NULL
;
1754 /* This is a reference to a symbol defined by a dynamic object which
1755 is not a function. */
1757 /* If we are creating a shared library, we must presume that the
1758 only references to the symbol are via the global offset table.
1759 For such cases we need not do anything here; the relocations will
1760 be handled correctly by relocate_section. */
1761 if (bfd_link_pic (info
))
1764 /* If there are no references to this symbol that do not use the
1765 GOT, we don't need to generate a copy reloc. */
1766 if (!eh
->non_got_ref
)
1769 /* If -z nocopyreloc was given, we won't generate them either. */
1770 if (info
->nocopyreloc
)
1773 if (ELIMINATE_COPY_RELOCS
1774 && !alias_readonly_dynrelocs (eh
))
1776 /* If we didn't find any dynamic relocs in read-only sections, then
1777 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1781 /* We must allocate the symbol in our .dynbss section, which will
1782 become part of the .bss section of the executable. There will be
1783 an entry for this symbol in the .dynsym section. The dynamic
1784 object will contain position independent code, so all references
1785 from the dynamic object to this symbol will go through the global
1786 offset table. The dynamic linker will use the .dynsym entry to
1787 determine the address it must put in the global offset table, so
1788 both the dynamic object and the regular object will refer to the
1789 same memory location for the variable. */
1790 if ((eh
->root
.u
.def
.section
->flags
& SEC_READONLY
) != 0)
1792 sec
= htab
->etab
.sdynrelro
;
1793 srel
= htab
->etab
.sreldynrelro
;
1797 sec
= htab
->etab
.sdynbss
;
1798 srel
= htab
->etab
.srelbss
;
1800 if ((eh
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0 && eh
->size
!= 0)
1802 /* We must generate a COPY reloc to tell the dynamic linker to
1803 copy the initial value out of the dynamic object and into the
1804 runtime process image. */
1805 srel
->size
+= sizeof (Elf32_External_Rela
);
1809 /* We no longer want dyn_relocs. */
1810 hppa_elf_hash_entry (eh
)->dyn_relocs
= NULL
;
1811 return _bfd_elf_adjust_dynamic_copy (info
, eh
, sec
);
1814 /* If EH is undefined, make it dynamic if that makes sense. */
1817 ensure_undef_dynamic (struct bfd_link_info
*info
,
1818 struct elf_link_hash_entry
*eh
)
1820 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
1822 if (htab
->dynamic_sections_created
1823 && (eh
->root
.type
== bfd_link_hash_undefweak
1824 || eh
->root
.type
== bfd_link_hash_undefined
)
1825 && eh
->dynindx
== -1
1826 && !eh
->forced_local
1827 && eh
->type
!= STT_PARISC_MILLI
1828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
)
1829 && ELF_ST_VISIBILITY (eh
->other
) == STV_DEFAULT
)
1830 return bfd_elf_link_record_dynamic_symbol (info
, eh
);
1834 /* Allocate space in the .plt for entries that won't have relocations.
1835 ie. plabel entries. */
1838 allocate_plt_static (struct elf_link_hash_entry
*eh
, void *inf
)
1840 struct bfd_link_info
*info
;
1841 struct elf32_hppa_link_hash_table
*htab
;
1842 struct elf32_hppa_link_hash_entry
*hh
;
1845 if (eh
->root
.type
== bfd_link_hash_indirect
)
1848 info
= (struct bfd_link_info
*) inf
;
1849 hh
= hppa_elf_hash_entry (eh
);
1850 htab
= hppa_link_hash_table (info
);
1854 if (htab
->etab
.dynamic_sections_created
1855 && eh
->plt
.refcount
> 0)
1857 if (!ensure_undef_dynamic (info
, eh
))
1860 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info
), eh
))
1862 /* Allocate these later. From this point on, h->plabel
1863 means that the plt entry is only used by a plabel.
1864 We'll be using a normal plt entry for this symbol, so
1865 clear the plabel indicator. */
1869 else if (hh
->plabel
)
1871 /* Make an entry in the .plt section for plabel references
1872 that won't have a .plt entry for other reasons. */
1873 sec
= htab
->etab
.splt
;
1874 eh
->plt
.offset
= sec
->size
;
1875 sec
->size
+= PLT_ENTRY_SIZE
;
1876 if (bfd_link_pic (info
))
1877 htab
->etab
.srelplt
->size
+= sizeof (Elf32_External_Rela
);
1881 /* No .plt entry needed. */
1882 eh
->plt
.offset
= (bfd_vma
) -1;
1888 eh
->plt
.offset
= (bfd_vma
) -1;
1895 /* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1897 static inline unsigned int
1898 got_entries_needed (int tls_type
)
1900 unsigned int need
= 0;
1902 if ((tls_type
& GOT_NORMAL
) != 0)
1903 need
+= GOT_ENTRY_SIZE
;
1904 if ((tls_type
& GOT_TLS_GD
) != 0)
1905 need
+= GOT_ENTRY_SIZE
* 2;
1906 if ((tls_type
& GOT_TLS_IE
) != 0)
1907 need
+= GOT_ENTRY_SIZE
;
1911 /* Calculate size of relocs needed for symbol given its TLS_TYPE and
1912 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated
1915 static inline unsigned int
1916 got_relocs_needed (int tls_type
, unsigned int need
, bfd_boolean known
)
1918 /* All the entries we allocated need relocs.
1919 Except IE in executable with a local symbol. We could also omit
1920 the DTPOFF reloc on the second word of a GD entry under the same
1921 condition as that for IE, but ld.so might want to differentiate
1922 LD and GD entries at some stage. */
1923 if ((tls_type
& GOT_TLS_IE
) != 0 && known
)
1924 need
-= GOT_ENTRY_SIZE
;
1925 return need
* sizeof (Elf32_External_Rela
) / GOT_ENTRY_SIZE
;
1928 /* Allocate space in .plt, .got and associated reloc sections for
1932 allocate_dynrelocs (struct elf_link_hash_entry
*eh
, void *inf
)
1934 struct bfd_link_info
*info
;
1935 struct elf32_hppa_link_hash_table
*htab
;
1937 struct elf32_hppa_link_hash_entry
*hh
;
1938 struct elf32_hppa_dyn_reloc_entry
*hdh_p
;
1940 if (eh
->root
.type
== bfd_link_hash_indirect
)
1944 htab
= hppa_link_hash_table (info
);
1948 hh
= hppa_elf_hash_entry (eh
);
1950 if (htab
->etab
.dynamic_sections_created
1951 && eh
->plt
.offset
!= (bfd_vma
) -1
1953 && eh
->plt
.refcount
> 0)
1955 /* Make an entry in the .plt section. */
1956 sec
= htab
->etab
.splt
;
1957 eh
->plt
.offset
= sec
->size
;
1958 sec
->size
+= PLT_ENTRY_SIZE
;
1960 /* We also need to make an entry in the .rela.plt section. */
1961 htab
->etab
.srelplt
->size
+= sizeof (Elf32_External_Rela
);
1962 htab
->need_plt_stub
= 1;
1965 if (eh
->got
.refcount
> 0)
1969 if (!ensure_undef_dynamic (info
, eh
))
1972 sec
= htab
->etab
.sgot
;
1973 eh
->got
.offset
= sec
->size
;
1974 need
= got_entries_needed (hh
->tls_type
);
1976 if (htab
->etab
.dynamic_sections_created
1977 && (bfd_link_pic (info
)
1978 || (eh
->dynindx
!= -1
1979 && !SYMBOL_REFERENCES_LOCAL (info
, eh
)))
1980 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
))
1982 bfd_boolean tprel_known
= (bfd_link_executable (info
)
1983 && SYMBOL_REFERENCES_LOCAL (info
, eh
));
1984 htab
->etab
.srelgot
->size
1985 += got_relocs_needed (hh
->tls_type
, need
, tprel_known
);
1989 eh
->got
.offset
= (bfd_vma
) -1;
1991 /* If no dynamic sections we can't have dynamic relocs. */
1992 if (!htab
->etab
.dynamic_sections_created
)
1993 hh
->dyn_relocs
= NULL
;
1995 /* Discard relocs on undefined syms with non-default visibility. */
1996 else if ((eh
->root
.type
== bfd_link_hash_undefined
1997 && ELF_ST_VISIBILITY (eh
->other
) != STV_DEFAULT
)
1998 || UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
))
1999 hh
->dyn_relocs
= NULL
;
2001 if (hh
->dyn_relocs
== NULL
)
2004 /* If this is a -Bsymbolic shared link, then we need to discard all
2005 space allocated for dynamic pc-relative relocs against symbols
2006 defined in a regular object. For the normal shared case, discard
2007 space for relocs that have become local due to symbol visibility
2009 if (bfd_link_pic (info
))
2011 #if RELATIVE_DYNRELOCS
2012 if (SYMBOL_CALLS_LOCAL (info
, eh
))
2014 struct elf32_hppa_dyn_reloc_entry
**hdh_pp
;
2016 for (hdh_pp
= &hh
->dyn_relocs
; (hdh_p
= *hdh_pp
) != NULL
; )
2018 hdh_p
->count
-= hdh_p
->relative_count
;
2019 hdh_p
->relative_count
= 0;
2020 if (hdh_p
->count
== 0)
2021 *hdh_pp
= hdh_p
->hdh_next
;
2023 hdh_pp
= &hdh_p
->hdh_next
;
2028 if (hh
->dyn_relocs
!= NULL
)
2030 if (!ensure_undef_dynamic (info
, eh
))
2034 else if (ELIMINATE_COPY_RELOCS
)
2036 /* For the non-shared case, discard space for relocs against
2037 symbols which turn out to need copy relocs or are not
2040 if (eh
->dynamic_adjusted
2042 && !ELF_COMMON_DEF_P (eh
))
2044 if (!ensure_undef_dynamic (info
, eh
))
2047 if (eh
->dynindx
== -1)
2048 hh
->dyn_relocs
= NULL
;
2051 hh
->dyn_relocs
= NULL
;
2054 /* Finally, allocate space. */
2055 for (hdh_p
= hh
->dyn_relocs
; hdh_p
!= NULL
; hdh_p
= hdh_p
->hdh_next
)
2057 asection
*sreloc
= elf_section_data (hdh_p
->sec
)->sreloc
;
2058 sreloc
->size
+= hdh_p
->count
* sizeof (Elf32_External_Rela
);
2064 /* This function is called via elf_link_hash_traverse to force
2065 millicode symbols local so they do not end up as globals in the
2066 dynamic symbol table. We ought to be able to do this in
2067 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2068 for all dynamic symbols. Arguably, this is a bug in
2069 elf_adjust_dynamic_symbol. */
2072 clobber_millicode_symbols (struct elf_link_hash_entry
*eh
,
2073 struct bfd_link_info
*info
)
2075 if (eh
->type
== STT_PARISC_MILLI
2076 && !eh
->forced_local
)
2078 elf32_hppa_hide_symbol (info
, eh
, TRUE
);
2083 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
2084 read-only sections. */
2087 maybe_set_textrel (struct elf_link_hash_entry
*eh
, void *inf
)
2091 if (eh
->root
.type
== bfd_link_hash_indirect
)
2094 sec
= readonly_dynrelocs (eh
);
2097 struct bfd_link_info
*info
= (struct bfd_link_info
*) inf
;
2099 info
->flags
|= DF_TEXTREL
;
2100 info
->callbacks
->minfo
2101 (_("%B: dynamic relocation against `%T' in read-only section `%A'\n"),
2102 sec
->owner
, eh
->root
.root
.string
, sec
);
2104 /* Not an error, just cut short the traversal. */
2110 /* Set the sizes of the dynamic sections. */
2113 elf32_hppa_size_dynamic_sections (bfd
*output_bfd ATTRIBUTE_UNUSED
,
2114 struct bfd_link_info
*info
)
2116 struct elf32_hppa_link_hash_table
*htab
;
2122 htab
= hppa_link_hash_table (info
);
2126 dynobj
= htab
->etab
.dynobj
;
2130 if (htab
->etab
.dynamic_sections_created
)
2132 /* Set the contents of the .interp section to the interpreter. */
2133 if (bfd_link_executable (info
) && !info
->nointerp
)
2135 sec
= bfd_get_linker_section (dynobj
, ".interp");
2138 sec
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
2139 sec
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
2142 /* Force millicode symbols local. */
2143 elf_link_hash_traverse (&htab
->etab
,
2144 clobber_millicode_symbols
,
2148 /* Set up .got and .plt offsets for local syms, and space for local
2150 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
2152 bfd_signed_vma
*local_got
;
2153 bfd_signed_vma
*end_local_got
;
2154 bfd_signed_vma
*local_plt
;
2155 bfd_signed_vma
*end_local_plt
;
2156 bfd_size_type locsymcount
;
2157 Elf_Internal_Shdr
*symtab_hdr
;
2159 char *local_tls_type
;
2161 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
)
2164 for (sec
= ibfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
2166 struct elf32_hppa_dyn_reloc_entry
*hdh_p
;
2168 for (hdh_p
= ((struct elf32_hppa_dyn_reloc_entry
*)
2169 elf_section_data (sec
)->local_dynrel
);
2171 hdh_p
= hdh_p
->hdh_next
)
2173 if (!bfd_is_abs_section (hdh_p
->sec
)
2174 && bfd_is_abs_section (hdh_p
->sec
->output_section
))
2176 /* Input section has been discarded, either because
2177 it is a copy of a linkonce section or due to
2178 linker script /DISCARD/, so we'll be discarding
2181 else if (hdh_p
->count
!= 0)
2183 srel
= elf_section_data (hdh_p
->sec
)->sreloc
;
2184 srel
->size
+= hdh_p
->count
* sizeof (Elf32_External_Rela
);
2185 if ((hdh_p
->sec
->output_section
->flags
& SEC_READONLY
) != 0)
2186 info
->flags
|= DF_TEXTREL
;
2191 local_got
= elf_local_got_refcounts (ibfd
);
2195 symtab_hdr
= &elf_tdata (ibfd
)->symtab_hdr
;
2196 locsymcount
= symtab_hdr
->sh_info
;
2197 end_local_got
= local_got
+ locsymcount
;
2198 local_tls_type
= hppa_elf_local_got_tls_type (ibfd
);
2199 sec
= htab
->etab
.sgot
;
2200 srel
= htab
->etab
.srelgot
;
2201 for (; local_got
< end_local_got
; ++local_got
)
2207 *local_got
= sec
->size
;
2208 need
= got_entries_needed (*local_tls_type
);
2210 if (bfd_link_pic (info
))
2212 bfd_boolean tprel_known
= bfd_link_executable (info
);
2213 htab
->etab
.srelgot
->size
2214 += got_relocs_needed (*local_tls_type
, need
, tprel_known
);
2218 *local_got
= (bfd_vma
) -1;
2223 local_plt
= end_local_got
;
2224 end_local_plt
= local_plt
+ locsymcount
;
2225 if (! htab
->etab
.dynamic_sections_created
)
2227 /* Won't be used, but be safe. */
2228 for (; local_plt
< end_local_plt
; ++local_plt
)
2229 *local_plt
= (bfd_vma
) -1;
2233 sec
= htab
->etab
.splt
;
2234 srel
= htab
->etab
.srelplt
;
2235 for (; local_plt
< end_local_plt
; ++local_plt
)
2239 *local_plt
= sec
->size
;
2240 sec
->size
+= PLT_ENTRY_SIZE
;
2241 if (bfd_link_pic (info
))
2242 srel
->size
+= sizeof (Elf32_External_Rela
);
2245 *local_plt
= (bfd_vma
) -1;
2250 if (htab
->tls_ldm_got
.refcount
> 0)
2252 /* Allocate 2 got entries and 1 dynamic reloc for
2253 R_PARISC_TLS_DTPMOD32 relocs. */
2254 htab
->tls_ldm_got
.offset
= htab
->etab
.sgot
->size
;
2255 htab
->etab
.sgot
->size
+= (GOT_ENTRY_SIZE
* 2);
2256 htab
->etab
.srelgot
->size
+= sizeof (Elf32_External_Rela
);
2259 htab
->tls_ldm_got
.offset
= -1;
2261 /* Do all the .plt entries without relocs first. The dynamic linker
2262 uses the last .plt reloc to find the end of the .plt (and hence
2263 the start of the .got) for lazy linking. */
2264 elf_link_hash_traverse (&htab
->etab
, allocate_plt_static
, info
);
2266 /* Allocate global sym .plt and .got entries, and space for global
2267 sym dynamic relocs. */
2268 elf_link_hash_traverse (&htab
->etab
, allocate_dynrelocs
, info
);
2270 /* The check_relocs and adjust_dynamic_symbol entry points have
2271 determined the sizes of the various dynamic sections. Allocate
2274 for (sec
= dynobj
->sections
; sec
!= NULL
; sec
= sec
->next
)
2276 if ((sec
->flags
& SEC_LINKER_CREATED
) == 0)
2279 if (sec
== htab
->etab
.splt
)
2281 if (htab
->need_plt_stub
)
2283 /* Make space for the plt stub at the end of the .plt
2284 section. We want this stub right at the end, up
2285 against the .got section. */
2286 int gotalign
= bfd_section_alignment (dynobj
, htab
->etab
.sgot
);
2287 int pltalign
= bfd_section_alignment (dynobj
, sec
);
2290 if (gotalign
> pltalign
)
2291 (void) bfd_set_section_alignment (dynobj
, sec
, gotalign
);
2292 mask
= ((bfd_size_type
) 1 << gotalign
) - 1;
2293 sec
->size
= (sec
->size
+ sizeof (plt_stub
) + mask
) & ~mask
;
2296 else if (sec
== htab
->etab
.sgot
2297 || sec
== htab
->etab
.sdynbss
2298 || sec
== htab
->etab
.sdynrelro
)
2300 else if (CONST_STRNEQ (bfd_get_section_name (dynobj
, sec
), ".rela"))
2304 /* Remember whether there are any reloc sections other
2306 if (sec
!= htab
->etab
.srelplt
)
2309 /* We use the reloc_count field as a counter if we need
2310 to copy relocs into the output file. */
2311 sec
->reloc_count
= 0;
2316 /* It's not one of our sections, so don't allocate space. */
2322 /* If we don't need this section, strip it from the
2323 output file. This is mostly to handle .rela.bss and
2324 .rela.plt. We must create both sections in
2325 create_dynamic_sections, because they must be created
2326 before the linker maps input sections to output
2327 sections. The linker does that before
2328 adjust_dynamic_symbol is called, and it is that
2329 function which decides whether anything needs to go
2330 into these sections. */
2331 sec
->flags
|= SEC_EXCLUDE
;
2335 if ((sec
->flags
& SEC_HAS_CONTENTS
) == 0)
2338 /* Allocate memory for the section contents. Zero it, because
2339 we may not fill in all the reloc sections. */
2340 sec
->contents
= bfd_zalloc (dynobj
, sec
->size
);
2341 if (sec
->contents
== NULL
)
2345 if (htab
->etab
.dynamic_sections_created
)
2347 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2348 actually has nothing to do with the PLT, it is how we
2349 communicate the LTP value of a load module to the dynamic
2351 #define add_dynamic_entry(TAG, VAL) \
2352 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2354 if (!add_dynamic_entry (DT_PLTGOT
, 0))
2357 /* Add some entries to the .dynamic section. We fill in the
2358 values later, in elf32_hppa_finish_dynamic_sections, but we
2359 must add the entries now so that we get the correct size for
2360 the .dynamic section. The DT_DEBUG entry is filled in by the
2361 dynamic linker and used by the debugger. */
2362 if (bfd_link_executable (info
))
2364 if (!add_dynamic_entry (DT_DEBUG
, 0))
2368 if (htab
->etab
.srelplt
->size
!= 0)
2370 if (!add_dynamic_entry (DT_PLTRELSZ
, 0)
2371 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
2372 || !add_dynamic_entry (DT_JMPREL
, 0))
2378 if (!add_dynamic_entry (DT_RELA
, 0)
2379 || !add_dynamic_entry (DT_RELASZ
, 0)
2380 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf32_External_Rela
)))
2383 /* If any dynamic relocs apply to a read-only section,
2384 then we need a DT_TEXTREL entry. */
2385 if ((info
->flags
& DF_TEXTREL
) == 0)
2386 elf_link_hash_traverse (&htab
->etab
, maybe_set_textrel
, info
);
2388 if ((info
->flags
& DF_TEXTREL
) != 0)
2390 if (!add_dynamic_entry (DT_TEXTREL
, 0))
2395 #undef add_dynamic_entry
2400 /* External entry points for sizing and building linker stubs. */
2402 /* Set up various things so that we can make a list of input sections
2403 for each output section included in the link. Returns -1 on error,
2404 0 when no stubs will be needed, and 1 on success. */
2407 elf32_hppa_setup_section_lists (bfd
*output_bfd
, struct bfd_link_info
*info
)
2410 unsigned int bfd_count
;
2411 unsigned int top_id
, top_index
;
2413 asection
**input_list
, **list
;
2415 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2420 /* Count the number of input BFDs and find the top input section id. */
2421 for (input_bfd
= info
->input_bfds
, bfd_count
= 0, top_id
= 0;
2423 input_bfd
= input_bfd
->link
.next
)
2426 for (section
= input_bfd
->sections
;
2428 section
= section
->next
)
2430 if (top_id
< section
->id
)
2431 top_id
= section
->id
;
2434 htab
->bfd_count
= bfd_count
;
2436 amt
= sizeof (struct map_stub
) * (top_id
+ 1);
2437 htab
->stub_group
= bfd_zmalloc (amt
);
2438 if (htab
->stub_group
== NULL
)
2441 /* We can't use output_bfd->section_count here to find the top output
2442 section index as some sections may have been removed, and
2443 strip_excluded_output_sections doesn't renumber the indices. */
2444 for (section
= output_bfd
->sections
, top_index
= 0;
2446 section
= section
->next
)
2448 if (top_index
< section
->index
)
2449 top_index
= section
->index
;
2452 htab
->top_index
= top_index
;
2453 amt
= sizeof (asection
*) * (top_index
+ 1);
2454 input_list
= bfd_malloc (amt
);
2455 htab
->input_list
= input_list
;
2456 if (input_list
== NULL
)
2459 /* For sections we aren't interested in, mark their entries with a
2460 value we can check later. */
2461 list
= input_list
+ top_index
;
2463 *list
= bfd_abs_section_ptr
;
2464 while (list
-- != input_list
);
2466 for (section
= output_bfd
->sections
;
2468 section
= section
->next
)
2470 if ((section
->flags
& SEC_CODE
) != 0)
2471 input_list
[section
->index
] = NULL
;
2477 /* The linker repeatedly calls this function for each input section,
2478 in the order that input sections are linked into output sections.
2479 Build lists of input sections to determine groupings between which
2480 we may insert linker stubs. */
2483 elf32_hppa_next_input_section (struct bfd_link_info
*info
, asection
*isec
)
2485 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2490 if (isec
->output_section
->index
<= htab
->top_index
)
2492 asection
**list
= htab
->input_list
+ isec
->output_section
->index
;
2493 if (*list
!= bfd_abs_section_ptr
)
2495 /* Steal the link_sec pointer for our list. */
2496 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
2497 /* This happens to make the list in reverse order,
2498 which is what we want. */
2499 PREV_SEC (isec
) = *list
;
2505 /* See whether we can group stub sections together. Grouping stub
2506 sections may result in fewer stubs. More importantly, we need to
2507 put all .init* and .fini* stubs at the beginning of the .init or
2508 .fini output sections respectively, because glibc splits the
2509 _init and _fini functions into multiple parts. Putting a stub in
2510 the middle of a function is not a good idea. */
2513 group_sections (struct elf32_hppa_link_hash_table
*htab
,
2514 bfd_size_type stub_group_size
,
2515 bfd_boolean stubs_always_before_branch
)
2517 asection
**list
= htab
->input_list
+ htab
->top_index
;
2520 asection
*tail
= *list
;
2521 if (tail
== bfd_abs_section_ptr
)
2523 while (tail
!= NULL
)
2527 bfd_size_type total
;
2528 bfd_boolean big_sec
;
2532 big_sec
= total
>= stub_group_size
;
2534 while ((prev
= PREV_SEC (curr
)) != NULL
2535 && ((total
+= curr
->output_offset
- prev
->output_offset
)
2539 /* OK, the size from the start of CURR to the end is less
2540 than 240000 bytes and thus can be handled by one stub
2541 section. (or the tail section is itself larger than
2542 240000 bytes, in which case we may be toast.)
2543 We should really be keeping track of the total size of
2544 stubs added here, as stubs contribute to the final output
2545 section size. That's a little tricky, and this way will
2546 only break if stubs added total more than 22144 bytes, or
2547 2768 long branch stubs. It seems unlikely for more than
2548 2768 different functions to be called, especially from
2549 code only 240000 bytes long. This limit used to be
2550 250000, but c++ code tends to generate lots of little
2551 functions, and sometimes violated the assumption. */
2554 prev
= PREV_SEC (tail
);
2555 /* Set up this stub group. */
2556 htab
->stub_group
[tail
->id
].link_sec
= curr
;
2558 while (tail
!= curr
&& (tail
= prev
) != NULL
);
2560 /* But wait, there's more! Input sections up to 240000
2561 bytes before the stub section can be handled by it too.
2562 Don't do this if we have a really large section after the
2563 stubs, as adding more stubs increases the chance that
2564 branches may not reach into the stub section. */
2565 if (!stubs_always_before_branch
&& !big_sec
)
2569 && ((total
+= tail
->output_offset
- prev
->output_offset
)
2573 prev
= PREV_SEC (tail
);
2574 htab
->stub_group
[tail
->id
].link_sec
= curr
;
2580 while (list
-- != htab
->input_list
);
2581 free (htab
->input_list
);
2585 /* Read in all local syms for all input bfds, and create hash entries
2586 for export stubs if we are building a multi-subspace shared lib.
2587 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2590 get_local_syms (bfd
*output_bfd
, bfd
*input_bfd
, struct bfd_link_info
*info
)
2592 unsigned int bfd_indx
;
2593 Elf_Internal_Sym
*local_syms
, **all_local_syms
;
2594 int stub_changed
= 0;
2595 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2600 /* We want to read in symbol extension records only once. To do this
2601 we need to read in the local symbols in parallel and save them for
2602 later use; so hold pointers to the local symbols in an array. */
2603 bfd_size_type amt
= sizeof (Elf_Internal_Sym
*) * htab
->bfd_count
;
2604 all_local_syms
= bfd_zmalloc (amt
);
2605 htab
->all_local_syms
= all_local_syms
;
2606 if (all_local_syms
== NULL
)
2609 /* Walk over all the input BFDs, swapping in local symbols.
2610 If we are creating a shared library, create hash entries for the
2614 input_bfd
= input_bfd
->link
.next
, bfd_indx
++)
2616 Elf_Internal_Shdr
*symtab_hdr
;
2618 /* We'll need the symbol table in a second. */
2619 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2620 if (symtab_hdr
->sh_info
== 0)
2623 /* We need an array of the local symbols attached to the input bfd. */
2624 local_syms
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2625 if (local_syms
== NULL
)
2627 local_syms
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
2628 symtab_hdr
->sh_info
, 0,
2630 /* Cache them for elf_link_input_bfd. */
2631 symtab_hdr
->contents
= (unsigned char *) local_syms
;
2633 if (local_syms
== NULL
)
2636 all_local_syms
[bfd_indx
] = local_syms
;
2638 if (bfd_link_pic (info
) && htab
->multi_subspace
)
2640 struct elf_link_hash_entry
**eh_syms
;
2641 struct elf_link_hash_entry
**eh_symend
;
2642 unsigned int symcount
;
2644 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2645 - symtab_hdr
->sh_info
);
2646 eh_syms
= (struct elf_link_hash_entry
**) elf_sym_hashes (input_bfd
);
2647 eh_symend
= (struct elf_link_hash_entry
**) (eh_syms
+ symcount
);
2649 /* Look through the global syms for functions; We need to
2650 build export stubs for all globally visible functions. */
2651 for (; eh_syms
< eh_symend
; eh_syms
++)
2653 struct elf32_hppa_link_hash_entry
*hh
;
2655 hh
= hppa_elf_hash_entry (*eh_syms
);
2657 while (hh
->eh
.root
.type
== bfd_link_hash_indirect
2658 || hh
->eh
.root
.type
== bfd_link_hash_warning
)
2659 hh
= hppa_elf_hash_entry (hh
->eh
.root
.u
.i
.link
);
2661 /* At this point in the link, undefined syms have been
2662 resolved, so we need to check that the symbol was
2663 defined in this BFD. */
2664 if ((hh
->eh
.root
.type
== bfd_link_hash_defined
2665 || hh
->eh
.root
.type
== bfd_link_hash_defweak
)
2666 && hh
->eh
.type
== STT_FUNC
2667 && hh
->eh
.root
.u
.def
.section
->output_section
!= NULL
2668 && (hh
->eh
.root
.u
.def
.section
->output_section
->owner
2670 && hh
->eh
.root
.u
.def
.section
->owner
== input_bfd
2671 && hh
->eh
.def_regular
2672 && !hh
->eh
.forced_local
2673 && ELF_ST_VISIBILITY (hh
->eh
.other
) == STV_DEFAULT
)
2676 const char *stub_name
;
2677 struct elf32_hppa_stub_hash_entry
*hsh
;
2679 sec
= hh
->eh
.root
.u
.def
.section
;
2680 stub_name
= hh_name (hh
);
2681 hsh
= hppa_stub_hash_lookup (&htab
->bstab
,
2686 hsh
= hppa_add_stub (stub_name
, sec
, htab
);
2690 hsh
->target_value
= hh
->eh
.root
.u
.def
.value
;
2691 hsh
->target_section
= hh
->eh
.root
.u
.def
.section
;
2692 hsh
->stub_type
= hppa_stub_export
;
2698 /* xgettext:c-format */
2699 _bfd_error_handler (_("%B: duplicate export stub %s"),
2700 input_bfd
, stub_name
);
2707 return stub_changed
;
2710 /* Determine and set the size of the stub section for a final link.
2712 The basic idea here is to examine all the relocations looking for
2713 PC-relative calls to a target that is unreachable with a "bl"
2717 elf32_hppa_size_stubs
2718 (bfd
*output_bfd
, bfd
*stub_bfd
, struct bfd_link_info
*info
,
2719 bfd_boolean multi_subspace
, bfd_signed_vma group_size
,
2720 asection
* (*add_stub_section
) (const char *, asection
*),
2721 void (*layout_sections_again
) (void))
2723 bfd_size_type stub_group_size
;
2724 bfd_boolean stubs_always_before_branch
;
2725 bfd_boolean stub_changed
;
2726 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2731 /* Stash our params away. */
2732 htab
->stub_bfd
= stub_bfd
;
2733 htab
->multi_subspace
= multi_subspace
;
2734 htab
->add_stub_section
= add_stub_section
;
2735 htab
->layout_sections_again
= layout_sections_again
;
2736 stubs_always_before_branch
= group_size
< 0;
2738 stub_group_size
= -group_size
;
2740 stub_group_size
= group_size
;
2741 if (stub_group_size
== 1)
2743 /* Default values. */
2744 if (stubs_always_before_branch
)
2746 stub_group_size
= 7680000;
2747 if (htab
->has_17bit_branch
|| htab
->multi_subspace
)
2748 stub_group_size
= 240000;
2749 if (htab
->has_12bit_branch
)
2750 stub_group_size
= 7500;
2754 stub_group_size
= 6971392;
2755 if (htab
->has_17bit_branch
|| htab
->multi_subspace
)
2756 stub_group_size
= 217856;
2757 if (htab
->has_12bit_branch
)
2758 stub_group_size
= 6808;
2762 group_sections (htab
, stub_group_size
, stubs_always_before_branch
);
2764 switch (get_local_syms (output_bfd
, info
->input_bfds
, info
))
2767 if (htab
->all_local_syms
)
2768 goto error_ret_free_local
;
2772 stub_changed
= FALSE
;
2776 stub_changed
= TRUE
;
2783 unsigned int bfd_indx
;
2786 for (input_bfd
= info
->input_bfds
, bfd_indx
= 0;
2788 input_bfd
= input_bfd
->link
.next
, bfd_indx
++)
2790 Elf_Internal_Shdr
*symtab_hdr
;
2792 Elf_Internal_Sym
*local_syms
;
2794 /* We'll need the symbol table in a second. */
2795 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2796 if (symtab_hdr
->sh_info
== 0)
2799 local_syms
= htab
->all_local_syms
[bfd_indx
];
2801 /* Walk over each section attached to the input bfd. */
2802 for (section
= input_bfd
->sections
;
2804 section
= section
->next
)
2806 Elf_Internal_Rela
*internal_relocs
, *irelaend
, *irela
;
2808 /* If there aren't any relocs, then there's nothing more
2810 if ((section
->flags
& SEC_RELOC
) == 0
2811 || section
->reloc_count
== 0)
2814 /* If this section is a link-once section that will be
2815 discarded, then don't create any stubs. */
2816 if (section
->output_section
== NULL
2817 || section
->output_section
->owner
!= output_bfd
)
2820 /* Get the relocs. */
2822 = _bfd_elf_link_read_relocs (input_bfd
, section
, NULL
, NULL
,
2824 if (internal_relocs
== NULL
)
2825 goto error_ret_free_local
;
2827 /* Now examine each relocation. */
2828 irela
= internal_relocs
;
2829 irelaend
= irela
+ section
->reloc_count
;
2830 for (; irela
< irelaend
; irela
++)
2832 unsigned int r_type
, r_indx
;
2833 enum elf32_hppa_stub_type stub_type
;
2834 struct elf32_hppa_stub_hash_entry
*hsh
;
2837 bfd_vma destination
;
2838 struct elf32_hppa_link_hash_entry
*hh
;
2840 const asection
*id_sec
;
2842 r_type
= ELF32_R_TYPE (irela
->r_info
);
2843 r_indx
= ELF32_R_SYM (irela
->r_info
);
2845 if (r_type
>= (unsigned int) R_PARISC_UNIMPLEMENTED
)
2847 bfd_set_error (bfd_error_bad_value
);
2848 error_ret_free_internal
:
2849 if (elf_section_data (section
)->relocs
== NULL
)
2850 free (internal_relocs
);
2851 goto error_ret_free_local
;
2854 /* Only look for stubs on call instructions. */
2855 if (r_type
!= (unsigned int) R_PARISC_PCREL12F
2856 && r_type
!= (unsigned int) R_PARISC_PCREL17F
2857 && r_type
!= (unsigned int) R_PARISC_PCREL22F
)
2860 /* Now determine the call target, its name, value,
2866 if (r_indx
< symtab_hdr
->sh_info
)
2868 /* It's a local symbol. */
2869 Elf_Internal_Sym
*sym
;
2870 Elf_Internal_Shdr
*hdr
;
2873 sym
= local_syms
+ r_indx
;
2874 if (ELF_ST_TYPE (sym
->st_info
) != STT_SECTION
)
2875 sym_value
= sym
->st_value
;
2876 shndx
= sym
->st_shndx
;
2877 if (shndx
< elf_numsections (input_bfd
))
2879 hdr
= elf_elfsections (input_bfd
)[shndx
];
2880 sym_sec
= hdr
->bfd_section
;
2881 destination
= (sym_value
+ irela
->r_addend
2882 + sym_sec
->output_offset
2883 + sym_sec
->output_section
->vma
);
2888 /* It's an external symbol. */
2891 e_indx
= r_indx
- symtab_hdr
->sh_info
;
2892 hh
= hppa_elf_hash_entry (elf_sym_hashes (input_bfd
)[e_indx
]);
2894 while (hh
->eh
.root
.type
== bfd_link_hash_indirect
2895 || hh
->eh
.root
.type
== bfd_link_hash_warning
)
2896 hh
= hppa_elf_hash_entry (hh
->eh
.root
.u
.i
.link
);
2898 if (hh
->eh
.root
.type
== bfd_link_hash_defined
2899 || hh
->eh
.root
.type
== bfd_link_hash_defweak
)
2901 sym_sec
= hh
->eh
.root
.u
.def
.section
;
2902 sym_value
= hh
->eh
.root
.u
.def
.value
;
2903 if (sym_sec
->output_section
!= NULL
)
2904 destination
= (sym_value
+ irela
->r_addend
2905 + sym_sec
->output_offset
2906 + sym_sec
->output_section
->vma
);
2908 else if (hh
->eh
.root
.type
== bfd_link_hash_undefweak
)
2910 if (! bfd_link_pic (info
))
2913 else if (hh
->eh
.root
.type
== bfd_link_hash_undefined
)
2915 if (! (info
->unresolved_syms_in_objects
== RM_IGNORE
2916 && (ELF_ST_VISIBILITY (hh
->eh
.other
)
2918 && hh
->eh
.type
!= STT_PARISC_MILLI
))
2923 bfd_set_error (bfd_error_bad_value
);
2924 goto error_ret_free_internal
;
2928 /* Determine what (if any) linker stub is needed. */
2929 stub_type
= hppa_type_of_stub (section
, irela
, hh
,
2931 if (stub_type
== hppa_stub_none
)
2934 /* Support for grouping stub sections. */
2935 id_sec
= htab
->stub_group
[section
->id
].link_sec
;
2937 /* Get the name of this stub. */
2938 stub_name
= hppa_stub_name (id_sec
, sym_sec
, hh
, irela
);
2940 goto error_ret_free_internal
;
2942 hsh
= hppa_stub_hash_lookup (&htab
->bstab
,
2947 /* The proper stub has already been created. */
2952 hsh
= hppa_add_stub (stub_name
, section
, htab
);
2956 goto error_ret_free_internal
;
2959 hsh
->target_value
= sym_value
;
2960 hsh
->target_section
= sym_sec
;
2961 hsh
->stub_type
= stub_type
;
2962 if (bfd_link_pic (info
))
2964 if (stub_type
== hppa_stub_import
)
2965 hsh
->stub_type
= hppa_stub_import_shared
;
2966 else if (stub_type
== hppa_stub_long_branch
)
2967 hsh
->stub_type
= hppa_stub_long_branch_shared
;
2970 stub_changed
= TRUE
;
2973 /* We're done with the internal relocs, free them. */
2974 if (elf_section_data (section
)->relocs
== NULL
)
2975 free (internal_relocs
);
2982 /* OK, we've added some stubs. Find out the new size of the
2984 for (stub_sec
= htab
->stub_bfd
->sections
;
2986 stub_sec
= stub_sec
->next
)
2987 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
2990 bfd_hash_traverse (&htab
->bstab
, hppa_size_one_stub
, htab
);
2992 /* Ask the linker to do its stuff. */
2993 (*htab
->layout_sections_again
) ();
2994 stub_changed
= FALSE
;
2997 free (htab
->all_local_syms
);
3000 error_ret_free_local
:
3001 free (htab
->all_local_syms
);
3005 /* For a final link, this function is called after we have sized the
3006 stubs to provide a value for __gp. */
3009 elf32_hppa_set_gp (bfd
*abfd
, struct bfd_link_info
*info
)
3011 struct bfd_link_hash_entry
*h
;
3012 asection
*sec
= NULL
;
3015 h
= bfd_link_hash_lookup (info
->hash
, "$global$", FALSE
, FALSE
, FALSE
);
3018 && (h
->type
== bfd_link_hash_defined
3019 || h
->type
== bfd_link_hash_defweak
))
3021 gp_val
= h
->u
.def
.value
;
3022 sec
= h
->u
.def
.section
;
3026 asection
*splt
= bfd_get_section_by_name (abfd
, ".plt");
3027 asection
*sgot
= bfd_get_section_by_name (abfd
, ".got");
3029 /* Choose to point our LTP at, in this order, one of .plt, .got,
3030 or .data, if these sections exist. In the case of choosing
3031 .plt try to make the LTP ideal for addressing anywhere in the
3032 .plt or .got with a 14 bit signed offset. Typically, the end
3033 of the .plt is the start of the .got, so choose .plt + 0x2000
3034 if either the .plt or .got is larger than 0x2000. If both
3035 the .plt and .got are smaller than 0x2000, choose the end of
3036 the .plt section. */
3037 sec
= strcmp (bfd_get_target (abfd
), "elf32-hppa-netbsd") == 0
3042 if (gp_val
> 0x2000 || (sgot
&& sgot
->size
> 0x2000))
3052 if (strcmp (bfd_get_target (abfd
), "elf32-hppa-netbsd") != 0)
3054 /* We know we don't have a .plt. If .got is large,
3056 if (sec
->size
> 0x2000)
3062 /* No .plt or .got. Who cares what the LTP is? */
3063 sec
= bfd_get_section_by_name (abfd
, ".data");
3069 h
->type
= bfd_link_hash_defined
;
3070 h
->u
.def
.value
= gp_val
;
3072 h
->u
.def
.section
= sec
;
3074 h
->u
.def
.section
= bfd_abs_section_ptr
;
3078 if (bfd_get_flavour (abfd
) == bfd_target_elf_flavour
)
3080 if (sec
!= NULL
&& sec
->output_section
!= NULL
)
3081 gp_val
+= sec
->output_section
->vma
+ sec
->output_offset
;
3083 elf_gp (abfd
) = gp_val
;
3088 /* Build all the stubs associated with the current output file. The
3089 stubs are kept in a hash table attached to the main linker hash
3090 table. We also set up the .plt entries for statically linked PIC
3091 functions here. This function is called via hppaelf_finish in the
3095 elf32_hppa_build_stubs (struct bfd_link_info
*info
)
3098 struct bfd_hash_table
*table
;
3099 struct elf32_hppa_link_hash_table
*htab
;
3101 htab
= hppa_link_hash_table (info
);
3105 for (stub_sec
= htab
->stub_bfd
->sections
;
3107 stub_sec
= stub_sec
->next
)
3108 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0
3109 && stub_sec
->size
!= 0)
3111 /* Allocate memory to hold the linker stubs. */
3112 stub_sec
->contents
= bfd_zalloc (htab
->stub_bfd
, stub_sec
->size
);
3113 if (stub_sec
->contents
== NULL
)
3118 /* Build the stubs as directed by the stub hash table. */
3119 table
= &htab
->bstab
;
3120 bfd_hash_traverse (table
, hppa_build_one_stub
, info
);
3125 /* Return the base vma address which should be subtracted from the real
3126 address when resolving a dtpoff relocation.
3127 This is PT_TLS segment p_vaddr. */
3130 dtpoff_base (struct bfd_link_info
*info
)
3132 /* If tls_sec is NULL, we should have signalled an error already. */
3133 if (elf_hash_table (info
)->tls_sec
== NULL
)
3135 return elf_hash_table (info
)->tls_sec
->vma
;
3138 /* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3141 tpoff (struct bfd_link_info
*info
, bfd_vma address
)
3143 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
3145 /* If tls_sec is NULL, we should have signalled an error already. */
3146 if (htab
->tls_sec
== NULL
)
3148 /* hppa TLS ABI is variant I and static TLS block start just after
3149 tcbhead structure which has 2 pointer fields. */
3150 return (address
- htab
->tls_sec
->vma
3151 + align_power ((bfd_vma
) 8, htab
->tls_sec
->alignment_power
));
3154 /* Perform a final link. */
3157 elf32_hppa_final_link (bfd
*abfd
, struct bfd_link_info
*info
)
3161 /* Invoke the regular ELF linker to do all the work. */
3162 if (!bfd_elf_final_link (abfd
, info
))
3165 /* If we're producing a final executable, sort the contents of the
3167 if (bfd_link_relocatable (info
))
3170 /* Do not attempt to sort non-regular files. This is here
3171 especially for configure scripts and kernel builds which run
3172 tests with "ld [...] -o /dev/null". */
3173 if (stat (abfd
->filename
, &buf
) != 0
3174 || !S_ISREG(buf
.st_mode
))
3177 return elf_hppa_sort_unwind (abfd
);
3180 /* Record the lowest address for the data and text segments. */
3183 hppa_record_segment_addr (bfd
*abfd
, asection
*section
, void *data
)
3185 struct elf32_hppa_link_hash_table
*htab
;
3187 htab
= (struct elf32_hppa_link_hash_table
*) data
;
3191 if ((section
->flags
& (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
3194 Elf_Internal_Phdr
*p
;
3196 p
= _bfd_elf_find_segment_containing_section (abfd
, section
->output_section
);
3197 BFD_ASSERT (p
!= NULL
);
3200 if ((section
->flags
& SEC_READONLY
) != 0)
3202 if (value
< htab
->text_segment_base
)
3203 htab
->text_segment_base
= value
;
3207 if (value
< htab
->data_segment_base
)
3208 htab
->data_segment_base
= value
;
3213 /* Perform a relocation as part of a final link. */
3215 static bfd_reloc_status_type
3216 final_link_relocate (asection
*input_section
,
3218 const Elf_Internal_Rela
*rela
,
3220 struct elf32_hppa_link_hash_table
*htab
,
3222 struct elf32_hppa_link_hash_entry
*hh
,
3223 struct bfd_link_info
*info
)
3226 unsigned int r_type
= ELF32_R_TYPE (rela
->r_info
);
3227 unsigned int orig_r_type
= r_type
;
3228 reloc_howto_type
*howto
= elf_hppa_howto_table
+ r_type
;
3229 int r_format
= howto
->bitsize
;
3230 enum hppa_reloc_field_selector_type_alt r_field
;
3231 bfd
*input_bfd
= input_section
->owner
;
3232 bfd_vma offset
= rela
->r_offset
;
3233 bfd_vma max_branch_offset
= 0;
3234 bfd_byte
*hit_data
= contents
+ offset
;
3235 bfd_signed_vma addend
= rela
->r_addend
;
3237 struct elf32_hppa_stub_hash_entry
*hsh
= NULL
;
3240 if (r_type
== R_PARISC_NONE
)
3241 return bfd_reloc_ok
;
3243 insn
= bfd_get_32 (input_bfd
, hit_data
);
3245 /* Find out where we are and where we're going. */
3246 location
= (offset
+
3247 input_section
->output_offset
+
3248 input_section
->output_section
->vma
);
3250 /* If we are not building a shared library, convert DLTIND relocs to
3252 if (!bfd_link_pic (info
))
3256 case R_PARISC_DLTIND21L
:
3257 case R_PARISC_TLS_GD21L
:
3258 case R_PARISC_TLS_LDM21L
:
3259 case R_PARISC_TLS_IE21L
:
3260 r_type
= R_PARISC_DPREL21L
;
3263 case R_PARISC_DLTIND14R
:
3264 case R_PARISC_TLS_GD14R
:
3265 case R_PARISC_TLS_LDM14R
:
3266 case R_PARISC_TLS_IE14R
:
3267 r_type
= R_PARISC_DPREL14R
;
3270 case R_PARISC_DLTIND14F
:
3271 r_type
= R_PARISC_DPREL14F
;
3278 case R_PARISC_PCREL12F
:
3279 case R_PARISC_PCREL17F
:
3280 case R_PARISC_PCREL22F
:
3281 /* If this call should go via the plt, find the import stub in
3284 || sym_sec
->output_section
== NULL
3286 && hh
->eh
.plt
.offset
!= (bfd_vma
) -1
3287 && hh
->eh
.dynindx
!= -1
3289 && (bfd_link_pic (info
)
3290 || !hh
->eh
.def_regular
3291 || hh
->eh
.root
.type
== bfd_link_hash_defweak
)))
3293 hsh
= hppa_get_stub_entry (input_section
, sym_sec
,
3297 value
= (hsh
->stub_offset
3298 + hsh
->stub_sec
->output_offset
3299 + hsh
->stub_sec
->output_section
->vma
);
3302 else if (sym_sec
== NULL
&& hh
!= NULL
3303 && hh
->eh
.root
.type
== bfd_link_hash_undefweak
)
3305 /* It's OK if undefined weak. Calls to undefined weak
3306 symbols behave as if the "called" function
3307 immediately returns. We can thus call to a weak
3308 function without first checking whether the function
3314 return bfd_reloc_undefined
;
3318 case R_PARISC_PCREL21L
:
3319 case R_PARISC_PCREL17C
:
3320 case R_PARISC_PCREL17R
:
3321 case R_PARISC_PCREL14R
:
3322 case R_PARISC_PCREL14F
:
3323 case R_PARISC_PCREL32
:
3324 /* Make it a pc relative offset. */
3329 case R_PARISC_DPREL21L
:
3330 case R_PARISC_DPREL14R
:
3331 case R_PARISC_DPREL14F
:
3332 /* Convert instructions that use the linkage table pointer (r19) to
3333 instructions that use the global data pointer (dp). This is the
3334 most efficient way of using PIC code in an incomplete executable,
3335 but the user must follow the standard runtime conventions for
3336 accessing data for this to work. */
3337 if (orig_r_type
!= r_type
)
3339 if (r_type
== R_PARISC_DPREL21L
)
3341 /* GCC sometimes uses a register other than r19 for the
3342 operation, so we must convert any addil instruction
3343 that uses this relocation. */
3344 if ((insn
& 0xfc000000) == ((int) OP_ADDIL
<< 26))
3347 /* We must have a ldil instruction. It's too hard to find
3348 and convert the associated add instruction, so issue an
3351 /* xgettext:c-format */
3352 (_("%B(%A+%#Lx): %s fixup for insn %#x is not supported in a non-shared link"),
3359 else if (r_type
== R_PARISC_DPREL14F
)
3361 /* This must be a format 1 load/store. Change the base
3363 insn
= (insn
& 0xfc1ffff) | (27 << 21);
3367 /* For all the DP relative relocations, we need to examine the symbol's
3368 section. If it has no section or if it's a code section, then
3369 "data pointer relative" makes no sense. In that case we don't
3370 adjust the "value", and for 21 bit addil instructions, we change the
3371 source addend register from %dp to %r0. This situation commonly
3372 arises for undefined weak symbols and when a variable's "constness"
3373 is declared differently from the way the variable is defined. For
3374 instance: "extern int foo" with foo defined as "const int foo". */
3375 if (sym_sec
== NULL
|| (sym_sec
->flags
& SEC_CODE
) != 0)
3377 if ((insn
& ((0x3f << 26) | (0x1f << 21)))
3378 == (((int) OP_ADDIL
<< 26) | (27 << 21)))
3380 insn
&= ~ (0x1f << 21);
3382 /* Now try to make things easy for the dynamic linker. */
3388 case R_PARISC_DLTIND21L
:
3389 case R_PARISC_DLTIND14R
:
3390 case R_PARISC_DLTIND14F
:
3391 case R_PARISC_TLS_GD21L
:
3392 case R_PARISC_TLS_LDM21L
:
3393 case R_PARISC_TLS_IE21L
:
3394 case R_PARISC_TLS_GD14R
:
3395 case R_PARISC_TLS_LDM14R
:
3396 case R_PARISC_TLS_IE14R
:
3397 value
-= elf_gp (input_section
->output_section
->owner
);
3400 case R_PARISC_SEGREL32
:
3401 if ((sym_sec
->flags
& SEC_CODE
) != 0)
3402 value
-= htab
->text_segment_base
;
3404 value
-= htab
->data_segment_base
;
3413 case R_PARISC_DIR32
:
3414 case R_PARISC_DIR14F
:
3415 case R_PARISC_DIR17F
:
3416 case R_PARISC_PCREL17C
:
3417 case R_PARISC_PCREL14F
:
3418 case R_PARISC_PCREL32
:
3419 case R_PARISC_DPREL14F
:
3420 case R_PARISC_PLABEL32
:
3421 case R_PARISC_DLTIND14F
:
3422 case R_PARISC_SEGBASE
:
3423 case R_PARISC_SEGREL32
:
3424 case R_PARISC_TLS_DTPMOD32
:
3425 case R_PARISC_TLS_DTPOFF32
:
3426 case R_PARISC_TLS_TPREL32
:
3430 case R_PARISC_DLTIND21L
:
3431 case R_PARISC_PCREL21L
:
3432 case R_PARISC_PLABEL21L
:
3436 case R_PARISC_DIR21L
:
3437 case R_PARISC_DPREL21L
:
3438 case R_PARISC_TLS_GD21L
:
3439 case R_PARISC_TLS_LDM21L
:
3440 case R_PARISC_TLS_LDO21L
:
3441 case R_PARISC_TLS_IE21L
:
3442 case R_PARISC_TLS_LE21L
:
3446 case R_PARISC_PCREL17R
:
3447 case R_PARISC_PCREL14R
:
3448 case R_PARISC_PLABEL14R
:
3449 case R_PARISC_DLTIND14R
:
3453 case R_PARISC_DIR17R
:
3454 case R_PARISC_DIR14R
:
3455 case R_PARISC_DPREL14R
:
3456 case R_PARISC_TLS_GD14R
:
3457 case R_PARISC_TLS_LDM14R
:
3458 case R_PARISC_TLS_LDO14R
:
3459 case R_PARISC_TLS_IE14R
:
3460 case R_PARISC_TLS_LE14R
:
3464 case R_PARISC_PCREL12F
:
3465 case R_PARISC_PCREL17F
:
3466 case R_PARISC_PCREL22F
:
3469 if (r_type
== (unsigned int) R_PARISC_PCREL17F
)
3471 max_branch_offset
= (1 << (17-1)) << 2;
3473 else if (r_type
== (unsigned int) R_PARISC_PCREL12F
)
3475 max_branch_offset
= (1 << (12-1)) << 2;
3479 max_branch_offset
= (1 << (22-1)) << 2;
3482 /* sym_sec is NULL on undefined weak syms or when shared on
3483 undefined syms. We've already checked for a stub for the
3484 shared undefined case. */
3485 if (sym_sec
== NULL
)
3488 /* If the branch is out of reach, then redirect the
3489 call to the local stub for this function. */
3490 if (value
+ addend
+ max_branch_offset
>= 2*max_branch_offset
)
3492 hsh
= hppa_get_stub_entry (input_section
, sym_sec
,
3495 return bfd_reloc_undefined
;
3497 /* Munge up the value and addend so that we call the stub
3498 rather than the procedure directly. */
3499 value
= (hsh
->stub_offset
3500 + hsh
->stub_sec
->output_offset
3501 + hsh
->stub_sec
->output_section
->vma
3507 /* Something we don't know how to handle. */
3509 return bfd_reloc_notsupported
;
3512 /* Make sure we can reach the stub. */
3513 if (max_branch_offset
!= 0
3514 && value
+ addend
+ max_branch_offset
>= 2*max_branch_offset
)
3517 /* xgettext:c-format */
3518 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
3522 hsh
->bh_root
.string
);
3523 bfd_set_error (bfd_error_bad_value
);
3524 return bfd_reloc_notsupported
;
3527 val
= hppa_field_adjust (value
, addend
, r_field
);
3531 case R_PARISC_PCREL12F
:
3532 case R_PARISC_PCREL17C
:
3533 case R_PARISC_PCREL17F
:
3534 case R_PARISC_PCREL17R
:
3535 case R_PARISC_PCREL22F
:
3536 case R_PARISC_DIR17F
:
3537 case R_PARISC_DIR17R
:
3538 /* This is a branch. Divide the offset by four.
3539 Note that we need to decide whether it's a branch or
3540 otherwise by inspecting the reloc. Inspecting insn won't
3541 work as insn might be from a .word directive. */
3549 insn
= hppa_rebuild_insn (insn
, val
, r_format
);
3551 /* Update the instruction word. */
3552 bfd_put_32 (input_bfd
, (bfd_vma
) insn
, hit_data
);
3553 return bfd_reloc_ok
;
3556 /* Relocate an HPPA ELF section. */
3559 elf32_hppa_relocate_section (bfd
*output_bfd
,
3560 struct bfd_link_info
*info
,
3562 asection
*input_section
,
3564 Elf_Internal_Rela
*relocs
,
3565 Elf_Internal_Sym
*local_syms
,
3566 asection
**local_sections
)
3568 bfd_vma
*local_got_offsets
;
3569 struct elf32_hppa_link_hash_table
*htab
;
3570 Elf_Internal_Shdr
*symtab_hdr
;
3571 Elf_Internal_Rela
*rela
;
3572 Elf_Internal_Rela
*relend
;
3574 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
3576 htab
= hppa_link_hash_table (info
);
3580 local_got_offsets
= elf_local_got_offsets (input_bfd
);
3583 relend
= relocs
+ input_section
->reloc_count
;
3584 for (; rela
< relend
; rela
++)
3586 unsigned int r_type
;
3587 reloc_howto_type
*howto
;
3588 unsigned int r_symndx
;
3589 struct elf32_hppa_link_hash_entry
*hh
;
3590 Elf_Internal_Sym
*sym
;
3593 bfd_reloc_status_type rstatus
;
3594 const char *sym_name
;
3596 bfd_boolean warned_undef
;
3598 r_type
= ELF32_R_TYPE (rela
->r_info
);
3599 if (r_type
>= (unsigned int) R_PARISC_UNIMPLEMENTED
)
3601 bfd_set_error (bfd_error_bad_value
);
3604 if (r_type
== (unsigned int) R_PARISC_GNU_VTENTRY
3605 || r_type
== (unsigned int) R_PARISC_GNU_VTINHERIT
)
3608 r_symndx
= ELF32_R_SYM (rela
->r_info
);
3612 warned_undef
= FALSE
;
3613 if (r_symndx
< symtab_hdr
->sh_info
)
3615 /* This is a local symbol, h defaults to NULL. */
3616 sym
= local_syms
+ r_symndx
;
3617 sym_sec
= local_sections
[r_symndx
];
3618 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sym_sec
, rela
);
3622 struct elf_link_hash_entry
*eh
;
3623 bfd_boolean unresolved_reloc
, ignored
;
3624 struct elf_link_hash_entry
**sym_hashes
= elf_sym_hashes (input_bfd
);
3626 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rela
,
3627 r_symndx
, symtab_hdr
, sym_hashes
,
3628 eh
, sym_sec
, relocation
,
3629 unresolved_reloc
, warned_undef
,
3632 if (!bfd_link_relocatable (info
)
3634 && eh
->root
.type
!= bfd_link_hash_defined
3635 && eh
->root
.type
!= bfd_link_hash_defweak
3636 && eh
->root
.type
!= bfd_link_hash_undefweak
)
3638 if (info
->unresolved_syms_in_objects
== RM_IGNORE
3639 && ELF_ST_VISIBILITY (eh
->other
) == STV_DEFAULT
3640 && eh
->type
== STT_PARISC_MILLI
)
3642 (*info
->callbacks
->undefined_symbol
)
3643 (info
, eh_name (eh
), input_bfd
,
3644 input_section
, rela
->r_offset
, FALSE
);
3645 warned_undef
= TRUE
;
3648 hh
= hppa_elf_hash_entry (eh
);
3651 if (sym_sec
!= NULL
&& discarded_section (sym_sec
))
3652 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
3654 elf_hppa_howto_table
+ r_type
, 0,
3657 if (bfd_link_relocatable (info
))
3660 /* Do any required modifications to the relocation value, and
3661 determine what types of dynamic info we need to output, if
3666 case R_PARISC_DLTIND14F
:
3667 case R_PARISC_DLTIND14R
:
3668 case R_PARISC_DLTIND21L
:
3671 bfd_boolean do_got
= FALSE
;
3672 bfd_boolean reloc
= bfd_link_pic (info
);
3674 /* Relocation is to the entry for this symbol in the
3675 global offset table. */
3680 off
= hh
->eh
.got
.offset
;
3681 dyn
= htab
->etab
.dynamic_sections_created
;
3682 reloc
= (!UNDEFWEAK_NO_DYNAMIC_RELOC (info
, &hh
->eh
)
3684 || (hh
->eh
.dynindx
!= -1
3685 && !SYMBOL_REFERENCES_LOCAL (info
, &hh
->eh
))));
3687 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
,
3688 bfd_link_pic (info
),
3691 /* If we aren't going to call finish_dynamic_symbol,
3692 then we need to handle initialisation of the .got
3693 entry and create needed relocs here. Since the
3694 offset must always be a multiple of 4, we use the
3695 least significant bit to record whether we have
3696 initialised it already. */
3701 hh
->eh
.got
.offset
|= 1;
3708 /* Local symbol case. */
3709 if (local_got_offsets
== NULL
)
3712 off
= local_got_offsets
[r_symndx
];
3714 /* The offset must always be a multiple of 4. We use
3715 the least significant bit to record whether we have
3716 already generated the necessary reloc. */
3721 local_got_offsets
[r_symndx
] |= 1;
3730 /* Output a dynamic relocation for this GOT entry.
3731 In this case it is relative to the base of the
3732 object because the symbol index is zero. */
3733 Elf_Internal_Rela outrel
;
3735 asection
*sec
= htab
->etab
.srelgot
;
3737 outrel
.r_offset
= (off
3738 + htab
->etab
.sgot
->output_offset
3739 + htab
->etab
.sgot
->output_section
->vma
);
3740 outrel
.r_info
= ELF32_R_INFO (0, R_PARISC_DIR32
);
3741 outrel
.r_addend
= relocation
;
3742 loc
= sec
->contents
;
3743 loc
+= sec
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3744 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3747 bfd_put_32 (output_bfd
, relocation
,
3748 htab
->etab
.sgot
->contents
+ off
);
3751 if (off
>= (bfd_vma
) -2)
3754 /* Add the base of the GOT to the relocation value. */
3756 + htab
->etab
.sgot
->output_offset
3757 + htab
->etab
.sgot
->output_section
->vma
);
3761 case R_PARISC_SEGREL32
:
3762 /* If this is the first SEGREL relocation, then initialize
3763 the segment base values. */
3764 if (htab
->text_segment_base
== (bfd_vma
) -1)
3765 bfd_map_over_sections (output_bfd
, hppa_record_segment_addr
, htab
);
3768 case R_PARISC_PLABEL14R
:
3769 case R_PARISC_PLABEL21L
:
3770 case R_PARISC_PLABEL32
:
3771 if (htab
->etab
.dynamic_sections_created
)
3774 bfd_boolean do_plt
= 0;
3775 /* If we have a global symbol with a PLT slot, then
3776 redirect this relocation to it. */
3779 off
= hh
->eh
.plt
.offset
;
3780 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3781 bfd_link_pic (info
),
3784 /* In a non-shared link, adjust_dynamic_symbol
3785 isn't called for symbols forced local. We
3786 need to write out the plt entry here. */
3791 hh
->eh
.plt
.offset
|= 1;
3798 bfd_vma
*local_plt_offsets
;
3800 if (local_got_offsets
== NULL
)
3803 local_plt_offsets
= local_got_offsets
+ symtab_hdr
->sh_info
;
3804 off
= local_plt_offsets
[r_symndx
];
3806 /* As for the local .got entry case, we use the last
3807 bit to record whether we've already initialised
3808 this local .plt entry. */
3813 local_plt_offsets
[r_symndx
] |= 1;
3820 if (bfd_link_pic (info
))
3822 /* Output a dynamic IPLT relocation for this
3824 Elf_Internal_Rela outrel
;
3826 asection
*s
= htab
->etab
.srelplt
;
3828 outrel
.r_offset
= (off
3829 + htab
->etab
.splt
->output_offset
3830 + htab
->etab
.splt
->output_section
->vma
);
3831 outrel
.r_info
= ELF32_R_INFO (0, R_PARISC_IPLT
);
3832 outrel
.r_addend
= relocation
;
3834 loc
+= s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3835 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3839 bfd_put_32 (output_bfd
,
3841 htab
->etab
.splt
->contents
+ off
);
3842 bfd_put_32 (output_bfd
,
3843 elf_gp (htab
->etab
.splt
->output_section
->owner
),
3844 htab
->etab
.splt
->contents
+ off
+ 4);
3848 if (off
>= (bfd_vma
) -2)
3851 /* PLABELs contain function pointers. Relocation is to
3852 the entry for the function in the .plt. The magic +2
3853 offset signals to $$dyncall that the function pointer
3854 is in the .plt and thus has a gp pointer too.
3855 Exception: Undefined PLABELs should have a value of
3858 || (hh
->eh
.root
.type
!= bfd_link_hash_undefweak
3859 && hh
->eh
.root
.type
!= bfd_link_hash_undefined
))
3862 + htab
->etab
.splt
->output_offset
3863 + htab
->etab
.splt
->output_section
->vma
3870 case R_PARISC_DIR17F
:
3871 case R_PARISC_DIR17R
:
3872 case R_PARISC_DIR14F
:
3873 case R_PARISC_DIR14R
:
3874 case R_PARISC_DIR21L
:
3875 case R_PARISC_DPREL14F
:
3876 case R_PARISC_DPREL14R
:
3877 case R_PARISC_DPREL21L
:
3878 case R_PARISC_DIR32
:
3879 if ((input_section
->flags
& SEC_ALLOC
) == 0)
3882 if (bfd_link_pic (info
)
3884 || hh
->dyn_relocs
!= NULL
)
3885 && ((hh
!= NULL
&& pc_dynrelocs (hh
))
3886 || IS_ABSOLUTE_RELOC (r_type
)))
3888 && hh
->dyn_relocs
!= NULL
))
3890 Elf_Internal_Rela outrel
;
3895 /* When generating a shared object, these relocations
3896 are copied into the output file to be resolved at run
3899 outrel
.r_addend
= rela
->r_addend
;
3901 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
3903 skip
= (outrel
.r_offset
== (bfd_vma
) -1
3904 || outrel
.r_offset
== (bfd_vma
) -2);
3905 outrel
.r_offset
+= (input_section
->output_offset
3906 + input_section
->output_section
->vma
);
3910 memset (&outrel
, 0, sizeof (outrel
));
3913 && hh
->eh
.dynindx
!= -1
3915 || !IS_ABSOLUTE_RELOC (r_type
)
3916 || !bfd_link_pic (info
)
3917 || !SYMBOLIC_BIND (info
, &hh
->eh
)
3918 || !hh
->eh
.def_regular
))
3920 outrel
.r_info
= ELF32_R_INFO (hh
->eh
.dynindx
, r_type
);
3922 else /* It's a local symbol, or one marked to become local. */
3926 /* Add the absolute offset of the symbol. */
3927 outrel
.r_addend
+= relocation
;
3929 /* Global plabels need to be processed by the
3930 dynamic linker so that functions have at most one
3931 fptr. For this reason, we need to differentiate
3932 between global and local plabels, which we do by
3933 providing the function symbol for a global plabel
3934 reloc, and no symbol for local plabels. */
3937 && sym_sec
->output_section
!= NULL
3938 && ! bfd_is_abs_section (sym_sec
))
3942 osec
= sym_sec
->output_section
;
3943 indx
= elf_section_data (osec
)->dynindx
;
3946 osec
= htab
->etab
.text_index_section
;
3947 indx
= elf_section_data (osec
)->dynindx
;
3949 BFD_ASSERT (indx
!= 0);
3951 /* We are turning this relocation into one
3952 against a section symbol, so subtract out the
3953 output section's address but not the offset
3954 of the input section in the output section. */
3955 outrel
.r_addend
-= osec
->vma
;
3958 outrel
.r_info
= ELF32_R_INFO (indx
, r_type
);
3960 sreloc
= elf_section_data (input_section
)->sreloc
;
3964 loc
= sreloc
->contents
;
3965 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3966 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3970 case R_PARISC_TLS_LDM21L
:
3971 case R_PARISC_TLS_LDM14R
:
3975 off
= htab
->tls_ldm_got
.offset
;
3980 Elf_Internal_Rela outrel
;
3983 outrel
.r_offset
= (off
3984 + htab
->etab
.sgot
->output_section
->vma
3985 + htab
->etab
.sgot
->output_offset
);
3986 outrel
.r_addend
= 0;
3987 outrel
.r_info
= ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32
);
3988 loc
= htab
->etab
.srelgot
->contents
;
3989 loc
+= htab
->etab
.srelgot
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3991 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3992 htab
->tls_ldm_got
.offset
|= 1;
3995 /* Add the base of the GOT to the relocation value. */
3997 + htab
->etab
.sgot
->output_offset
3998 + htab
->etab
.sgot
->output_section
->vma
);
4003 case R_PARISC_TLS_LDO21L
:
4004 case R_PARISC_TLS_LDO14R
:
4005 relocation
-= dtpoff_base (info
);
4008 case R_PARISC_TLS_GD21L
:
4009 case R_PARISC_TLS_GD14R
:
4010 case R_PARISC_TLS_IE21L
:
4011 case R_PARISC_TLS_IE14R
:
4020 if (!htab
->etab
.dynamic_sections_created
4021 || hh
->eh
.dynindx
== -1
4022 || SYMBOL_REFERENCES_LOCAL (info
, &hh
->eh
)
4023 || UNDEFWEAK_NO_DYNAMIC_RELOC (info
, &hh
->eh
))
4024 /* This is actually a static link, or it is a
4025 -Bsymbolic link and the symbol is defined
4026 locally, or the symbol was forced to be local
4027 because of a version file. */
4030 indx
= hh
->eh
.dynindx
;
4031 off
= hh
->eh
.got
.offset
;
4032 tls_type
= hh
->tls_type
;
4036 off
= local_got_offsets
[r_symndx
];
4037 tls_type
= hppa_elf_local_got_tls_type (input_bfd
)[r_symndx
];
4040 if (tls_type
== GOT_UNKNOWN
)
4047 bfd_boolean need_relocs
= FALSE
;
4048 Elf_Internal_Rela outrel
;
4049 bfd_byte
*loc
= NULL
;
4052 /* The GOT entries have not been initialized yet. Do it
4053 now, and emit any relocations. If both an IE GOT and a
4054 GD GOT are necessary, we emit the GD first. */
4057 || (bfd_link_pic (info
)
4059 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, &hh
->eh
))))
4062 loc
= htab
->etab
.srelgot
->contents
;
4063 loc
+= (htab
->etab
.srelgot
->reloc_count
4064 * sizeof (Elf32_External_Rela
));
4067 if (tls_type
& GOT_TLS_GD
)
4073 + htab
->etab
.sgot
->output_section
->vma
4074 + htab
->etab
.sgot
->output_offset
);
4076 = ELF32_R_INFO (indx
, R_PARISC_TLS_DTPMOD32
);
4077 outrel
.r_addend
= 0;
4078 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4079 htab
->etab
.srelgot
->reloc_count
++;
4080 loc
+= sizeof (Elf32_External_Rela
);
4082 = ELF32_R_INFO (indx
, R_PARISC_TLS_DTPOFF32
);
4083 outrel
.r_offset
+= 4;
4084 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4085 htab
->etab
.srelgot
->reloc_count
++;
4086 loc
+= sizeof (Elf32_External_Rela
);
4087 bfd_put_32 (output_bfd
, 0,
4088 htab
->etab
.sgot
->contents
+ cur_off
);
4089 bfd_put_32 (output_bfd
, 0,
4090 htab
->etab
.sgot
->contents
+ cur_off
+ 4);
4094 /* If we are not emitting relocations for a
4095 general dynamic reference, then we must be in a
4096 static link or an executable link with the
4097 symbol binding locally. Mark it as belonging
4098 to module 1, the executable. */
4099 bfd_put_32 (output_bfd
, 1,
4100 htab
->etab
.sgot
->contents
+ cur_off
);
4101 bfd_put_32 (output_bfd
, relocation
- dtpoff_base (info
),
4102 htab
->etab
.sgot
->contents
+ cur_off
+ 4);
4107 if (tls_type
& GOT_TLS_IE
)
4110 && !(bfd_link_executable (info
)
4111 && SYMBOL_REFERENCES_LOCAL (info
, &hh
->eh
)))
4115 + htab
->etab
.sgot
->output_section
->vma
4116 + htab
->etab
.sgot
->output_offset
);
4117 outrel
.r_info
= ELF32_R_INFO (indx
,
4118 R_PARISC_TLS_TPREL32
);
4120 outrel
.r_addend
= relocation
- dtpoff_base (info
);
4122 outrel
.r_addend
= 0;
4123 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4124 htab
->etab
.srelgot
->reloc_count
++;
4125 loc
+= sizeof (Elf32_External_Rela
);
4128 bfd_put_32 (output_bfd
, tpoff (info
, relocation
),
4129 htab
->etab
.sgot
->contents
+ cur_off
);
4134 hh
->eh
.got
.offset
|= 1;
4136 local_got_offsets
[r_symndx
] |= 1;
4139 if ((tls_type
& GOT_NORMAL
) != 0
4140 && (tls_type
& (GOT_TLS_GD
| GOT_TLS_LDM
| GOT_TLS_IE
)) != 0)
4143 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4147 Elf_Internal_Sym
*isym
4148 = bfd_sym_from_r_symndx (&htab
->sym_cache
,
4149 input_bfd
, r_symndx
);
4153 = bfd_elf_string_from_elf_section (input_bfd
,
4154 symtab_hdr
->sh_link
,
4156 if (sym_name
== NULL
)
4158 if (*sym_name
== '\0')
4159 sym_name
= bfd_section_name (input_bfd
, sym_sec
);
4161 (_("%B:%s has both normal and TLS relocs"),
4162 input_bfd
, sym_name
);
4164 bfd_set_error (bfd_error_bad_value
);
4168 if ((tls_type
& GOT_TLS_GD
)
4169 && r_type
!= R_PARISC_TLS_GD21L
4170 && r_type
!= R_PARISC_TLS_GD14R
)
4171 off
+= 2 * GOT_ENTRY_SIZE
;
4173 /* Add the base of the GOT to the relocation value. */
4175 + htab
->etab
.sgot
->output_offset
4176 + htab
->etab
.sgot
->output_section
->vma
);
4181 case R_PARISC_TLS_LE21L
:
4182 case R_PARISC_TLS_LE14R
:
4184 relocation
= tpoff (info
, relocation
);
4193 rstatus
= final_link_relocate (input_section
, contents
, rela
, relocation
,
4194 htab
, sym_sec
, hh
, info
);
4196 if (rstatus
== bfd_reloc_ok
)
4200 sym_name
= hh_name (hh
);
4203 sym_name
= bfd_elf_string_from_elf_section (input_bfd
,
4204 symtab_hdr
->sh_link
,
4206 if (sym_name
== NULL
)
4208 if (*sym_name
== '\0')
4209 sym_name
= bfd_section_name (input_bfd
, sym_sec
);
4212 howto
= elf_hppa_howto_table
+ r_type
;
4214 if (rstatus
== bfd_reloc_undefined
|| rstatus
== bfd_reloc_notsupported
)
4216 if (rstatus
== bfd_reloc_notsupported
|| !warned_undef
)
4219 /* xgettext:c-format */
4220 (_("%B(%A+%#Lx): cannot handle %s for %s"),
4226 bfd_set_error (bfd_error_bad_value
);
4231 (*info
->callbacks
->reloc_overflow
)
4232 (info
, (hh
? &hh
->eh
.root
: NULL
), sym_name
, howto
->name
,
4233 (bfd_vma
) 0, input_bfd
, input_section
, rela
->r_offset
);
4239 /* Finish up dynamic symbol handling. We set the contents of various
4240 dynamic sections here. */
4243 elf32_hppa_finish_dynamic_symbol (bfd
*output_bfd
,
4244 struct bfd_link_info
*info
,
4245 struct elf_link_hash_entry
*eh
,
4246 Elf_Internal_Sym
*sym
)
4248 struct elf32_hppa_link_hash_table
*htab
;
4249 Elf_Internal_Rela rela
;
4252 htab
= hppa_link_hash_table (info
);
4256 if (eh
->plt
.offset
!= (bfd_vma
) -1)
4260 if (eh
->plt
.offset
& 1)
4263 /* This symbol has an entry in the procedure linkage table. Set
4266 The format of a plt entry is
4271 if (eh
->root
.type
== bfd_link_hash_defined
4272 || eh
->root
.type
== bfd_link_hash_defweak
)
4274 value
= eh
->root
.u
.def
.value
;
4275 if (eh
->root
.u
.def
.section
->output_section
!= NULL
)
4276 value
+= (eh
->root
.u
.def
.section
->output_offset
4277 + eh
->root
.u
.def
.section
->output_section
->vma
);
4280 /* Create a dynamic IPLT relocation for this entry. */
4281 rela
.r_offset
= (eh
->plt
.offset
4282 + htab
->etab
.splt
->output_offset
4283 + htab
->etab
.splt
->output_section
->vma
);
4284 if (eh
->dynindx
!= -1)
4286 rela
.r_info
= ELF32_R_INFO (eh
->dynindx
, R_PARISC_IPLT
);
4291 /* This symbol has been marked to become local, and is
4292 used by a plabel so must be kept in the .plt. */
4293 rela
.r_info
= ELF32_R_INFO (0, R_PARISC_IPLT
);
4294 rela
.r_addend
= value
;
4297 loc
= htab
->etab
.srelplt
->contents
;
4298 loc
+= htab
->etab
.srelplt
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4299 bfd_elf32_swap_reloca_out (htab
->etab
.splt
->output_section
->owner
, &rela
, loc
);
4301 if (!eh
->def_regular
)
4303 /* Mark the symbol as undefined, rather than as defined in
4304 the .plt section. Leave the value alone. */
4305 sym
->st_shndx
= SHN_UNDEF
;
4309 if (eh
->got
.offset
!= (bfd_vma
) -1
4310 && (hppa_elf_hash_entry (eh
)->tls_type
& GOT_NORMAL
) != 0
4311 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
))
4313 bfd_boolean is_dyn
= (eh
->dynindx
!= -1
4314 && !SYMBOL_REFERENCES_LOCAL (info
, eh
));
4316 if (is_dyn
|| bfd_link_pic (info
))
4318 /* This symbol has an entry in the global offset table. Set
4321 rela
.r_offset
= ((eh
->got
.offset
&~ (bfd_vma
) 1)
4322 + htab
->etab
.sgot
->output_offset
4323 + htab
->etab
.sgot
->output_section
->vma
);
4325 /* If this is a -Bsymbolic link and the symbol is defined
4326 locally or was forced to be local because of a version
4327 file, we just want to emit a RELATIVE reloc. The entry
4328 in the global offset table will already have been
4329 initialized in the relocate_section function. */
4332 rela
.r_info
= ELF32_R_INFO (0, R_PARISC_DIR32
);
4333 rela
.r_addend
= (eh
->root
.u
.def
.value
4334 + eh
->root
.u
.def
.section
->output_offset
4335 + eh
->root
.u
.def
.section
->output_section
->vma
);
4339 if ((eh
->got
.offset
& 1) != 0)
4342 bfd_put_32 (output_bfd
, 0,
4343 htab
->etab
.sgot
->contents
+ (eh
->got
.offset
& ~1));
4344 rela
.r_info
= ELF32_R_INFO (eh
->dynindx
, R_PARISC_DIR32
);
4348 loc
= htab
->etab
.srelgot
->contents
;
4349 loc
+= (htab
->etab
.srelgot
->reloc_count
++
4350 * sizeof (Elf32_External_Rela
));
4351 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
4359 /* This symbol needs a copy reloc. Set it up. */
4361 if (! (eh
->dynindx
!= -1
4362 && (eh
->root
.type
== bfd_link_hash_defined
4363 || eh
->root
.type
== bfd_link_hash_defweak
)))
4366 rela
.r_offset
= (eh
->root
.u
.def
.value
4367 + eh
->root
.u
.def
.section
->output_offset
4368 + eh
->root
.u
.def
.section
->output_section
->vma
);
4370 rela
.r_info
= ELF32_R_INFO (eh
->dynindx
, R_PARISC_COPY
);
4371 if (eh
->root
.u
.def
.section
== htab
->etab
.sdynrelro
)
4372 sec
= htab
->etab
.sreldynrelro
;
4374 sec
= htab
->etab
.srelbss
;
4375 loc
= sec
->contents
+ sec
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4376 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
4379 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4380 if (eh
== htab
->etab
.hdynamic
|| eh
== htab
->etab
.hgot
)
4382 sym
->st_shndx
= SHN_ABS
;
4388 /* Used to decide how to sort relocs in an optimal manner for the
4389 dynamic linker, before writing them out. */
4391 static enum elf_reloc_type_class
4392 elf32_hppa_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
4393 const asection
*rel_sec ATTRIBUTE_UNUSED
,
4394 const Elf_Internal_Rela
*rela
)
4396 /* Handle TLS relocs first; we don't want them to be marked
4397 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
4399 switch ((int) ELF32_R_TYPE (rela
->r_info
))
4401 case R_PARISC_TLS_DTPMOD32
:
4402 case R_PARISC_TLS_DTPOFF32
:
4403 case R_PARISC_TLS_TPREL32
:
4404 return reloc_class_normal
;
4407 if (ELF32_R_SYM (rela
->r_info
) == STN_UNDEF
)
4408 return reloc_class_relative
;
4410 switch ((int) ELF32_R_TYPE (rela
->r_info
))
4413 return reloc_class_plt
;
4415 return reloc_class_copy
;
4417 return reloc_class_normal
;
4421 /* Finish up the dynamic sections. */
4424 elf32_hppa_finish_dynamic_sections (bfd
*output_bfd
,
4425 struct bfd_link_info
*info
)
4428 struct elf32_hppa_link_hash_table
*htab
;
4432 htab
= hppa_link_hash_table (info
);
4436 dynobj
= htab
->etab
.dynobj
;
4438 sgot
= htab
->etab
.sgot
;
4439 /* A broken linker script might have discarded the dynamic sections.
4440 Catch this here so that we do not seg-fault later on. */
4441 if (sgot
!= NULL
&& bfd_is_abs_section (sgot
->output_section
))
4444 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
4446 if (htab
->etab
.dynamic_sections_created
)
4448 Elf32_External_Dyn
*dyncon
, *dynconend
;
4453 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
4454 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
4455 for (; dyncon
< dynconend
; dyncon
++)
4457 Elf_Internal_Dyn dyn
;
4460 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
4468 /* Use PLTGOT to set the GOT register. */
4469 dyn
.d_un
.d_ptr
= elf_gp (output_bfd
);
4473 s
= htab
->etab
.srelplt
;
4474 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
4478 s
= htab
->etab
.srelplt
;
4479 dyn
.d_un
.d_val
= s
->size
;
4483 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
4487 if (sgot
!= NULL
&& sgot
->size
!= 0)
4489 /* Fill in the first entry in the global offset table.
4490 We use it to point to our dynamic section, if we have one. */
4491 bfd_put_32 (output_bfd
,
4492 sdyn
? sdyn
->output_section
->vma
+ sdyn
->output_offset
: 0,
4495 /* The second entry is reserved for use by the dynamic linker. */
4496 memset (sgot
->contents
+ GOT_ENTRY_SIZE
, 0, GOT_ENTRY_SIZE
);
4498 /* Set .got entry size. */
4499 elf_section_data (sgot
->output_section
)
4500 ->this_hdr
.sh_entsize
= GOT_ENTRY_SIZE
;
4503 if (htab
->etab
.splt
!= NULL
&& htab
->etab
.splt
->size
!= 0)
4505 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4506 plt stubs and as such the section does not hold a table of fixed-size
4508 elf_section_data (htab
->etab
.splt
->output_section
)->this_hdr
.sh_entsize
= 0;
4510 if (htab
->need_plt_stub
)
4512 /* Set up the .plt stub. */
4513 memcpy (htab
->etab
.splt
->contents
4514 + htab
->etab
.splt
->size
- sizeof (plt_stub
),
4515 plt_stub
, sizeof (plt_stub
));
4517 if ((htab
->etab
.splt
->output_offset
4518 + htab
->etab
.splt
->output_section
->vma
4519 + htab
->etab
.splt
->size
)
4520 != (sgot
->output_offset
4521 + sgot
->output_section
->vma
))
4524 (_(".got section not immediately after .plt section"));
4533 /* Called when writing out an object file to decide the type of a
4536 elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym
*elf_sym
, int type
)
4538 if (ELF_ST_TYPE (elf_sym
->st_info
) == STT_PARISC_MILLI
)
4539 return STT_PARISC_MILLI
;
4544 /* Misc BFD support code. */
4545 #define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4546 #define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4547 #define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
4548 #define elf_info_to_howto elf_hppa_info_to_howto
4549 #define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
4551 /* Stuff for the BFD linker. */
4552 #define bfd_elf32_bfd_final_link elf32_hppa_final_link
4553 #define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4554 #define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
4555 #define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
4556 #define elf_backend_check_relocs elf32_hppa_check_relocs
4557 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4558 #define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4559 #define elf_backend_fake_sections elf_hppa_fake_sections
4560 #define elf_backend_relocate_section elf32_hppa_relocate_section
4561 #define elf_backend_hide_symbol elf32_hppa_hide_symbol
4562 #define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4563 #define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4564 #define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4565 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4566 #define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4567 #define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4568 #define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
4569 #define elf_backend_object_p elf32_hppa_object_p
4570 #define elf_backend_final_write_processing elf_hppa_final_write_processing
4571 #define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
4572 #define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
4573 #define elf_backend_action_discarded elf_hppa_action_discarded
4575 #define elf_backend_can_gc_sections 1
4576 #define elf_backend_can_refcount 1
4577 #define elf_backend_plt_alignment 2
4578 #define elf_backend_want_got_plt 0
4579 #define elf_backend_plt_readonly 0
4580 #define elf_backend_want_plt_sym 0
4581 #define elf_backend_got_header_size 8
4582 #define elf_backend_want_dynrelro 1
4583 #define elf_backend_rela_normal 1
4584 #define elf_backend_dtrel_excludes_plt 1
4585 #define elf_backend_no_page_alias 1
4587 #define TARGET_BIG_SYM hppa_elf32_vec
4588 #define TARGET_BIG_NAME "elf32-hppa"
4589 #define ELF_ARCH bfd_arch_hppa
4590 #define ELF_TARGET_ID HPPA32_ELF_DATA
4591 #define ELF_MACHINE_CODE EM_PARISC
4592 #define ELF_MAXPAGESIZE 0x1000
4593 #define ELF_OSABI ELFOSABI_HPUX
4594 #define elf32_bed elf32_hppa_hpux_bed
4596 #include "elf32-target.h"
4598 #undef TARGET_BIG_SYM
4599 #define TARGET_BIG_SYM hppa_elf32_linux_vec
4600 #undef TARGET_BIG_NAME
4601 #define TARGET_BIG_NAME "elf32-hppa-linux"
4603 #define ELF_OSABI ELFOSABI_GNU
4605 #define elf32_bed elf32_hppa_linux_bed
4607 #include "elf32-target.h"
4609 #undef TARGET_BIG_SYM
4610 #define TARGET_BIG_SYM hppa_elf32_nbsd_vec
4611 #undef TARGET_BIG_NAME
4612 #define TARGET_BIG_NAME "elf32-hppa-netbsd"
4614 #define ELF_OSABI ELFOSABI_NETBSD
4616 #define elf32_bed elf32_hppa_netbsd_bed
4618 #include "elf32-target.h"