projects
/
deliverable
/
binutils-gdb.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
ARM process record: median instructions
[deliverable/binutils-gdb.git]
/
bfd
/
elf32-hppa.c
diff --git
a/bfd/elf32-hppa.c
b/bfd/elf32-hppa.c
index 2c1b9dbaebf653467342c4050fde4ea718519af0..699d02a58282a4f3edb0f527964c8e0c42c72bf0 100644
(file)
--- a/
bfd/elf32-hppa.c
+++ b/
bfd/elf32-hppa.c
@@
-1,7
+1,5
@@
/* BFD back-end for HP PA-RISC ELF files.
/* BFD back-end for HP PA-RISC ELF files.
- Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
- 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
- Free Software Foundation, Inc.
+ Copyright (C) 1990-2016 Free Software Foundation, Inc.
Original code by
Center for Software Science
Original code by
Center for Software Science
@@
-272,7
+270,7
@@
struct elf32_hppa_link_hash_table
/* Assorted information used by elf32_hppa_size_stubs. */
unsigned int bfd_count;
/* Assorted information used by elf32_hppa_size_stubs. */
unsigned int bfd_count;
- int top_index;
+
unsigned
int top_index;
asection **input_list;
Elf_Internal_Sym **all_local_syms;
asection **input_list;
Elf_Internal_Sym **all_local_syms;
@@
-409,6
+407,18
@@
hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
return entry;
}
return entry;
}
+/* Free the derived linker hash table. */
+
+static void
+elf32_hppa_link_hash_table_free (bfd *obfd)
+{
+ struct elf32_hppa_link_hash_table *htab
+ = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
+
+ bfd_hash_table_free (&htab->bstab);
+ _bfd_elf_link_hash_table_free (obfd);
+}
+
/* Create the derived linker hash table. The PA ELF port uses the derived
hash table to keep information specific to the PA ELF linker (without
using static variables). */
/* Create the derived linker hash table. The PA ELF port uses the derived
hash table to keep information specific to the PA ELF linker (without
using static variables). */
@@
-434,25
+444,17
@@
elf32_hppa_link_hash_table_create (bfd *abfd)
/* Init the stub hash table too. */
if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
sizeof (struct elf32_hppa_stub_hash_entry)))
/* Init the stub hash table too. */
if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
sizeof (struct elf32_hppa_stub_hash_entry)))
- return NULL;
+ {
+ _bfd_elf_link_hash_table_free (abfd);
+ return NULL;
+ }
+ htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
htab->text_segment_base = (bfd_vma) -1;
htab->data_segment_base = (bfd_vma) -1;
return &htab->etab.root;
}
htab->text_segment_base = (bfd_vma) -1;
htab->data_segment_base = (bfd_vma) -1;
return &htab->etab.root;
}
-/* Free the derived linker hash table. */
-
-static void
-elf32_hppa_link_hash_table_free (struct bfd_link_hash_table *btab)
-{
- struct elf32_hppa_link_hash_table *htab
- = (struct elf32_hppa_link_hash_table *) btab;
-
- bfd_hash_table_free (&htab->bstab);
- _bfd_generic_link_hash_table_free (btab);
-}
-
/* Build a name for an entry in the stub hash table. */
static char *
/* Build a name for an entry in the stub hash table. */
static char *
@@
-607,7
+609,7
@@
hppa_type_of_stub (asection *input_sec,
&& hh->eh.plt.offset != (bfd_vma) -1
&& hh->eh.dynindx != -1
&& !hh->plabel
&& hh->eh.plt.offset != (bfd_vma) -1
&& hh->eh.dynindx != -1
&& !hh->plabel
- && (
info->shared
+ && (
bfd_link_pic (info)
|| !hh->eh.def_regular
|| hh->eh.root.type == bfd_link_hash_defweak))
{
|| !hh->eh.def_regular
|| hh->eh.root.type == bfd_link_hash_defweak))
{
@@
-1135,7
+1137,7
@@
elf32_hppa_check_relocs (bfd *abfd,
asection *sreloc;
int tls_type = GOT_UNKNOWN, old_tls_type = GOT_UNKNOWN;
asection *sreloc;
int tls_type = GOT_UNKNOWN, old_tls_type = GOT_UNKNOWN;
- if (
info->relocatable
)
+ if (
bfd_link_relocatable (info)
)
return TRUE;
htab = hppa_link_hash_table (info);
return TRUE;
htab = hppa_link_hash_table (info);
@@
-1169,6
+1171,10
@@
elf32_hppa_check_relocs (bfd *abfd,
while (hh->eh.root.type == bfd_link_hash_indirect
|| hh->eh.root.type == bfd_link_hash_warning)
hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
while (hh->eh.root.type == bfd_link_hash_indirect
|| hh->eh.root.type == bfd_link_hash_warning)
hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
+
+ /* PR15323, ref flags aren't set for references in the same
+ object. */
+ hh->eh.root.non_ir_ref = 1;
}
r_type = ELF32_R_TYPE (rela->r_info);
}
r_type = ELF32_R_TYPE (rela->r_info);
@@
-1260,7
+1266,7
@@
elf32_hppa_check_relocs (bfd *abfd,
case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
case R_PARISC_DPREL14R:
case R_PARISC_DPREL21L:
case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
case R_PARISC_DPREL14R:
case R_PARISC_DPREL21L:
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
{
(*_bfd_error_handler)
(_("%B: relocation %s can not be used when making a shared object; recompile with -fPIC"),
{
(*_bfd_error_handler)
(_("%B: relocation %s can not be used when making a shared object; recompile with -fPIC"),
@@
-1306,7
+1312,7
@@
elf32_hppa_check_relocs (bfd *abfd,
case R_PARISC_TLS_IE21L:
case R_PARISC_TLS_IE14R:
case R_PARISC_TLS_IE21L:
case R_PARISC_TLS_IE14R:
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
info->flags |= DF_STATIC_TLS;
need_entry = NEED_GOT;
break;
info->flags |= DF_STATIC_TLS;
need_entry = NEED_GOT;
break;
@@
-1426,7
+1432,7
@@
elf32_hppa_check_relocs (bfd *abfd,
/* Flag this symbol as having a non-got, non-plt reference
so that we generate copy relocs if it turns out to be
dynamic. */
/* Flag this symbol as having a non-got, non-plt reference
so that we generate copy relocs if it turns out to be
dynamic. */
- if (hh != NULL && !
info->shared
)
+ if (hh != NULL && !
bfd_link_pic (info)
)
hh->eh.non_got_ref = 1;
/* If we are creating a shared library then we need to copy
hh->eh.non_got_ref = 1;
/* If we are creating a shared library then we need to copy
@@
-1457,15
+1463,15
@@
elf32_hppa_check_relocs (bfd *abfd,
may need to keep relocations for symbols satisfied by a
dynamic library if we manage to avoid copy relocs for the
symbol. */
may need to keep relocations for symbols satisfied by a
dynamic library if we manage to avoid copy relocs for the
symbol. */
- if ((
info->shared
+ if ((
bfd_link_pic (info)
&& (sec->flags & SEC_ALLOC) != 0
&& (IS_ABSOLUTE_RELOC (r_type)
|| (hh != NULL
&& (sec->flags & SEC_ALLOC) != 0
&& (IS_ABSOLUTE_RELOC (r_type)
|| (hh != NULL
- && (!
info->symbolic
+ && (!
SYMBOLIC_BIND (info, &hh->eh)
|| hh->eh.root.type == bfd_link_hash_defweak
|| !hh->eh.def_regular))))
|| (ELIMINATE_COPY_RELOCS
|| hh->eh.root.type == bfd_link_hash_defweak
|| !hh->eh.def_regular))))
|| (ELIMINATE_COPY_RELOCS
- && !
info->shared
+ && !
bfd_link_pic (info)
&& (sec->flags & SEC_ALLOC) != 0
&& hh != NULL
&& (hh->eh.root.type == bfd_link_hash_defweak
&& (sec->flags & SEC_ALLOC) != 0
&& hh != NULL
&& (hh->eh.root.type == bfd_link_hash_defweak
@@
-1583,7
+1589,7
@@
elf32_hppa_gc_sweep_hook (bfd *abfd,
const Elf_Internal_Rela *rela, *relend;
struct elf32_hppa_link_hash_table *htab;
const Elf_Internal_Rela *rela, *relend;
struct elf32_hppa_link_hash_table *htab;
- if (
info->relocatable
)
+ if (
bfd_link_relocatable (info)
)
return TRUE;
htab = hppa_link_hash_table (info);
return TRUE;
htab = hppa_link_hash_table (info);
@@
-1706,10
+1712,10
@@
elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
case 396: /* Linux/hppa */
/* pr_cursig */
case 396: /* Linux/hppa */
/* pr_cursig */
- elf_tdata (abfd)->core
_
signal = bfd_get_16 (abfd, note->descdata + 12);
+ elf_tdata (abfd)->core
->
signal = bfd_get_16 (abfd, note->descdata + 12);
/* pr_pid */
/* pr_pid */
- elf_tdata (abfd)->core
_
lwpid = bfd_get_32 (abfd, note->descdata + 24);
+ elf_tdata (abfd)->core
->
lwpid = bfd_get_32 (abfd, note->descdata + 24);
/* pr_reg */
offset = 72;
/* pr_reg */
offset = 72;
@@
-1732,9
+1738,9
@@
elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
return FALSE;
case 124: /* Linux/hppa elf_prpsinfo. */
return FALSE;
case 124: /* Linux/hppa elf_prpsinfo. */
- elf_tdata (abfd)->core
_
program
+ elf_tdata (abfd)->core
->
program
= _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
= _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
- elf_tdata (abfd)->core
_
command
+ elf_tdata (abfd)->core
->
command
= _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
}
= _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
}
@@
-1742,7
+1748,7
@@
elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
onto the end of the args in some (at least one anyway)
implementations, so strip it off if it exists. */
{
onto the end of the args in some (at least one anyway)
implementations, so strip it off if it exists. */
{
- char *command = elf_tdata (abfd)->core
_
command;
+ char *command = elf_tdata (abfd)->core
->
command;
int n = strlen (command);
if (0 < n && command[n - 1] == ' ')
int n = strlen (command);
if (0 < n && command[n - 1] == ' ')
@@
-1769,6
+1775,10
@@
elf32_hppa_hide_symbol (struct bfd_link_info *info,
_bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
eh->dynstr_index);
}
_bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
eh->dynstr_index);
}
+
+ /* PR 16082: Remove version information from hidden symbol. */
+ eh->verinfo.verdef = NULL;
+ eh->verinfo.vertree = NULL;
}
/* STT_GNU_IFUNC symbol must go through PLT. */
}
/* STT_GNU_IFUNC symbol must go through PLT. */
@@
-1809,7
+1819,7
@@
elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
|| (eh->def_regular
&& eh->root.type != bfd_link_hash_defweak
&& ! hppa_elf_hash_entry (eh)->plabel
|| (eh->def_regular
&& eh->root.type != bfd_link_hash_defweak
&& ! hppa_elf_hash_entry (eh)->plabel
- && (!
info->shared || info->symbolic
)))
+ && (!
bfd_link_pic (info) || SYMBOLIC_BIND (info, eh)
)))
{
/* The .plt entry is not needed when:
a) Garbage collection has removed all references to the
{
/* The .plt entry is not needed when:
a) Garbage collection has removed all references to the
@@
-1850,7
+1860,7
@@
elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
only references to the symbol are via the global offset table.
For such cases we need not do anything here; the relocations will
be handled correctly by relocate_section. */
only references to the symbol are via the global offset table.
For such cases we need not do anything here; the relocations will
be handled correctly by relocate_section. */
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
return TRUE;
/* If there are no references to this symbol that do not use the
return TRUE;
/* If there are no references to this symbol that do not use the
@@
-1905,7
+1915,7
@@
elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
sec = htab->sdynbss;
sec = htab->sdynbss;
- return _bfd_elf_adjust_dynamic_copy (eh, sec);
+ return _bfd_elf_adjust_dynamic_copy (
info,
eh, sec);
}
/* Allocate space in the .plt for entries that won't have relocations.
}
/* Allocate space in the .plt for entries that won't have relocations.
@@
-1941,7
+1951,7
@@
allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
return FALSE;
}
return FALSE;
}
- if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
info->shared
, eh))
+ if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
bfd_link_pic (info)
, eh))
{
/* Allocate these later. From this point on, h->plabel
means that the plt entry is only used by a plabel.
{
/* Allocate these later. From this point on, h->plabel
means that the plt entry is only used by a plabel.
@@
-2032,7
+2042,7
@@
allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
else if ((hh->tls_type & GOT_TLS_GD) == GOT_TLS_GD)
sec->size += GOT_ENTRY_SIZE;
if (htab->etab.dynamic_sections_created
else if ((hh->tls_type & GOT_TLS_GD) == GOT_TLS_GD)
sec->size += GOT_ENTRY_SIZE;
if (htab->etab.dynamic_sections_created
- && (
info->shared
+ && (
bfd_link_pic (info)
|| (eh->dynindx != -1
&& !eh->forced_local)))
{
|| (eh->dynindx != -1
&& !eh->forced_local)))
{
@@
-2054,7
+2064,7
@@
allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
defined in a regular object. For the normal shared case, discard
space for relocs that have become local due to symbol visibility
changes. */
defined in a regular object. For the normal shared case, discard
space for relocs that have become local due to symbol visibility
changes. */
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
{
#if RELATIVE_DYNRELOCS
if (SYMBOL_CALLS_LOCAL (info, eh))
{
#if RELATIVE_DYNRELOCS
if (SYMBOL_CALLS_LOCAL (info, eh))
@@
-2205,7
+2215,7
@@
elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
if (htab->etab.dynamic_sections_created)
{
/* Set the contents of the .interp section to the interpreter. */
if (htab->etab.dynamic_sections_created)
{
/* Set the contents of the .interp section to the interpreter. */
- if (
info->executable
)
+ if (
bfd_link_executable (info) && !info->nointerp
)
{
sec = bfd_get_linker_section (dynobj, ".interp");
if (sec == NULL)
{
sec = bfd_get_linker_section (dynobj, ".interp");
if (sec == NULL)
@@
-2222,7
+2232,7
@@
elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
/* Set up .got and .plt offsets for local syms, and space for local
dynamic relocs. */
/* Set up .got and .plt offsets for local syms, and space for local
dynamic relocs. */
- for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link
_
next)
+ for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link
.
next)
{
bfd_signed_vma *local_got;
bfd_signed_vma *end_local_got;
{
bfd_signed_vma *local_got;
bfd_signed_vma *end_local_got;
@@
-2283,7
+2293,7
@@
elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
sec->size += 2 * GOT_ENTRY_SIZE;
else if ((*local_tls_type & GOT_TLS_GD) == GOT_TLS_GD)
sec->size += GOT_ENTRY_SIZE;
sec->size += 2 * GOT_ENTRY_SIZE;
else if ((*local_tls_type & GOT_TLS_GD) == GOT_TLS_GD)
sec->size += GOT_ENTRY_SIZE;
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
{
srel->size += sizeof (Elf32_External_Rela);
if ((*local_tls_type & (GOT_TLS_GD | GOT_TLS_IE)) == (GOT_TLS_GD | GOT_TLS_IE))
{
srel->size += sizeof (Elf32_External_Rela);
if ((*local_tls_type & (GOT_TLS_GD | GOT_TLS_IE)) == (GOT_TLS_GD | GOT_TLS_IE))
@@
-2316,7
+2326,7
@@
elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
{
*local_plt = sec->size;
sec->size += PLT_ENTRY_SIZE;
{
*local_plt = sec->size;
sec->size += PLT_ENTRY_SIZE;
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
srel->size += sizeof (Elf32_External_Rela);
}
else
srel->size += sizeof (Elf32_External_Rela);
}
else
@@
-2366,7
+2376,7
@@
elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
bfd_size_type mask;
if (gotalign > pltalign)
bfd_size_type mask;
if (gotalign > pltalign)
- bfd_set_section_alignment (dynobj, sec, gotalign);
+
(void)
bfd_set_section_alignment (dynobj, sec, gotalign);
mask = ((bfd_size_type) 1 << gotalign) - 1;
sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
}
mask = ((bfd_size_type) 1 << gotalign) - 1;
sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
}
@@
-2436,7
+2446,7
@@
elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
must add the entries now so that we get the correct size for
the .dynamic section. The DT_DEBUG entry is filled in by the
dynamic linker and used by the debugger. */
must add the entries now so that we get the correct size for
the .dynamic section. The DT_DEBUG entry is filled in by the
dynamic linker and used by the debugger. */
- if (
info->executable
)
+ if (
bfd_link_executable (info)
)
{
if (!add_dynamic_entry (DT_DEBUG, 0))
return FALSE;
{
if (!add_dynamic_entry (DT_DEBUG, 0))
return FALSE;
@@
-2485,7
+2495,7
@@
elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
{
bfd *input_bfd;
unsigned int bfd_count;
{
bfd *input_bfd;
unsigned int bfd_count;
- int top_id, top_index;
+
unsigned
int top_id, top_index;
asection *section;
asection **input_list, **list;
bfd_size_type amt;
asection *section;
asection **input_list, **list;
bfd_size_type amt;
@@
-2497,7
+2507,7
@@
elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
/* Count the number of input BFDs and find the top input section id. */
for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
input_bfd != NULL;
/* Count the number of input BFDs and find the top input section id. */
for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
input_bfd != NULL;
- input_bfd = input_bfd->link
_
next)
+ input_bfd = input_bfd->link
.
next)
{
bfd_count += 1;
for (section = input_bfd->sections;
{
bfd_count += 1;
for (section = input_bfd->sections;
@@
-2688,7
+2698,7
@@
get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
export stubs. */
for (bfd_indx = 0;
input_bfd != NULL;
export stubs. */
for (bfd_indx = 0;
input_bfd != NULL;
- input_bfd = input_bfd->link
_
next, bfd_indx++)
+ input_bfd = input_bfd->link
.
next, bfd_indx++)
{
Elf_Internal_Shdr *symtab_hdr;
{
Elf_Internal_Shdr *symtab_hdr;
@@
-2712,7
+2722,7
@@
get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
all_local_syms[bfd_indx] = local_syms;
all_local_syms[bfd_indx] = local_syms;
- if (
info->shared
&& htab->multi_subspace)
+ if (
bfd_link_pic (info)
&& htab->multi_subspace)
{
struct elf_link_hash_entry **eh_syms;
struct elf_link_hash_entry **eh_symend;
{
struct elf_link_hash_entry **eh_syms;
struct elf_link_hash_entry **eh_symend;
@@
-2862,7
+2872,7
@@
elf32_hppa_size_stubs
for (input_bfd = info->input_bfds, bfd_indx = 0;
input_bfd != NULL;
for (input_bfd = info->input_bfds, bfd_indx = 0;
input_bfd != NULL;
- input_bfd = input_bfd->link
_
next, bfd_indx++)
+ input_bfd = input_bfd->link
.
next, bfd_indx++)
{
Elf_Internal_Shdr *symtab_hdr;
asection *section;
{
Elf_Internal_Shdr *symtab_hdr;
asection *section;
@@
-2984,7
+2994,7
@@
elf32_hppa_size_stubs
}
else if (hh->eh.root.type == bfd_link_hash_undefweak)
{
}
else if (hh->eh.root.type == bfd_link_hash_undefweak)
{
- if (!
info->shared
)
+ if (!
bfd_link_pic (info)
)
continue;
}
else if (hh->eh.root.type == bfd_link_hash_undefined)
continue;
}
else if (hh->eh.root.type == bfd_link_hash_undefined)
@@
-3036,7
+3046,7
@@
elf32_hppa_size_stubs
hsh->target_value = sym_value;
hsh->target_section = sym_sec;
hsh->stub_type = stub_type;
hsh->target_value = sym_value;
hsh->target_section = sym_sec;
hsh->stub_type = stub_type;
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
{
if (stub_type == hppa_stub_import)
hsh->stub_type = hppa_stub_import_shared;
{
if (stub_type == hppa_stub_import)
hsh->stub_type = hppa_stub_import_shared;
@@
-3235,13
+3245,22
@@
tpoff (struct bfd_link_info *info, bfd_vma address)
static bfd_boolean
elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
{
static bfd_boolean
elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
{
+ struct stat buf;
+
/* Invoke the regular ELF linker to do all the work. */
if (!bfd_elf_final_link (abfd, info))
return FALSE;
/* If we're producing a final executable, sort the contents of the
unwind section. */
/* Invoke the regular ELF linker to do all the work. */
if (!bfd_elf_final_link (abfd, info))
return FALSE;
/* If we're producing a final executable, sort the contents of the
unwind section. */
- if (info->relocatable)
+ if (bfd_link_relocatable (info))
+ return TRUE;
+
+ /* Do not attempt to sort non-regular files. This is here
+ especially for configure scripts and kernel builds which run
+ tests with "ld [...] -o /dev/null". */
+ if (stat (abfd->filename, &buf) != 0
+ || !S_ISREG(buf.st_mode))
return TRUE;
return elf_hppa_sort_unwind (abfd);
return TRUE;
return elf_hppa_sort_unwind (abfd);
@@
-3319,7
+3338,7
@@
final_link_relocate (asection *input_section,
/* If we are not building a shared library, convert DLTIND relocs to
DPREL relocs. */
/* If we are not building a shared library, convert DLTIND relocs to
DPREL relocs. */
- if (!
info->shared
)
+ if (!
bfd_link_pic (info)
)
{
switch (r_type)
{
{
switch (r_type)
{
@@
-3356,7
+3375,7
@@
final_link_relocate (asection *input_section,
&& hh->eh.plt.offset != (bfd_vma) -1
&& hh->eh.dynindx != -1
&& !hh->plabel
&& hh->eh.plt.offset != (bfd_vma) -1
&& hh->eh.dynindx != -1
&& !hh->plabel
- && (
info->shared
+ && (
bfd_link_pic (info)
|| !hh->eh.def_regular
|| hh->eh.root.type == bfd_link_hash_defweak)))
{
|| !hh->eh.def_regular
|| hh->eh.root.type == bfd_link_hash_defweak)))
{
@@
-3688,15
+3707,16
@@
elf32_hppa_relocate_section (bfd *output_bfd,
else
{
struct elf_link_hash_entry *eh;
else
{
struct elf_link_hash_entry *eh;
- bfd_boolean unresolved_reloc;
+ bfd_boolean unresolved_reloc
, ignored
;
struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
r_symndx, symtab_hdr, sym_hashes,
eh, sym_sec, relocation,
struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
r_symndx, symtab_hdr, sym_hashes,
eh, sym_sec, relocation,
- unresolved_reloc, warned_undef);
+ unresolved_reloc, warned_undef,
+ ignored);
- if (!
info->relocatable
+ if (!
bfd_link_relocatable (info)
&& relocation == 0
&& eh->root.type != bfd_link_hash_defined
&& eh->root.type != bfd_link_hash_defweak
&& relocation == 0
&& eh->root.type != bfd_link_hash_defined
&& eh->root.type != bfd_link_hash_defweak
@@
-3722,7
+3742,7
@@
elf32_hppa_relocate_section (bfd *output_bfd,
elf_hppa_howto_table + r_type, 0,
contents);
elf_hppa_howto_table + r_type, 0,
contents);
- if (
info->relocatable
)
+ if (
bfd_link_relocatable (info)
)
continue;
/* Do any required modifications to the relocation value, and
continue;
/* Do any required modifications to the relocation value, and
@@
-3746,7
+3766,8
@@
elf32_hppa_relocate_section (bfd *output_bfd,
off = hh->eh.got.offset;
dyn = htab->etab.dynamic_sections_created;
off = hh->eh.got.offset;
dyn = htab->etab.dynamic_sections_created;
- if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared,
+ if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
+ bfd_link_pic (info),
&hh->eh))
{
/* If we aren't going to call finish_dynamic_symbol,
&hh->eh))
{
/* If we aren't going to call finish_dynamic_symbol,
@@
-3786,7
+3807,7
@@
elf32_hppa_relocate_section (bfd *output_bfd,
if (do_got)
{
if (do_got)
{
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
{
/* Output a dynamic relocation for this GOT entry.
In this case it is relative to the base of the
{
/* Output a dynamic relocation for this GOT entry.
In this case it is relative to the base of the
@@
-3838,7
+3859,8
@@
elf32_hppa_relocate_section (bfd *output_bfd,
if (hh != NULL)
{
off = hh->eh.plt.offset;
if (hh != NULL)
{
off = hh->eh.plt.offset;
- if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared,
+ if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
+ bfd_link_pic (info),
&hh->eh))
{
/* In a non-shared link, adjust_dynamic_symbols
&hh->eh))
{
/* In a non-shared link, adjust_dynamic_symbols
@@
-3877,7
+3899,7
@@
elf32_hppa_relocate_section (bfd *output_bfd,
if (do_plt)
{
if (do_plt)
{
- if (
info->shared
)
+ if (
bfd_link_pic (info)
)
{
/* Output a dynamic IPLT relocation for this
PLT entry. */
{
/* Output a dynamic IPLT relocation for this
PLT entry. */
@@
-3951,13
+3973,13
@@
elf32_hppa_relocate_section (bfd *output_bfd,
which is why we can't use just that test here.
Conversely, DEF_DYNAMIC can't be used in check_relocs as
there all files have not been loaded. */
which is why we can't use just that test here.
Conversely, DEF_DYNAMIC can't be used in check_relocs as
there all files have not been loaded. */
- if ((
info->shared
+ if ((
bfd_link_pic (info)
&& (hh == NULL
|| ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT
|| hh->eh.root.type != bfd_link_hash_undefweak)
&& (IS_ABSOLUTE_RELOC (r_type)
|| !SYMBOL_CALLS_LOCAL (info, &hh->eh)))
&& (hh == NULL
|| ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT
|| hh->eh.root.type != bfd_link_hash_undefweak)
&& (IS_ABSOLUTE_RELOC (r_type)
|| !SYMBOL_CALLS_LOCAL (info, &hh->eh)))
- || (!
info->shared
+ || (!
bfd_link_pic (info)
&& hh != NULL
&& hh->eh.dynindx != -1
&& !hh->eh.non_got_ref
&& hh != NULL
&& hh->eh.dynindx != -1
&& !hh->eh.non_got_ref
@@
-3993,8
+4015,8
@@
elf32_hppa_relocate_section (bfd *output_bfd,
&& hh->eh.dynindx != -1
&& (plabel
|| !IS_ABSOLUTE_RELOC (r_type)
&& hh->eh.dynindx != -1
&& (plabel
|| !IS_ABSOLUTE_RELOC (r_type)
- || !
info->shared
- || !
info->symbolic
+ || !
bfd_link_pic (info)
+ || !
SYMBOLIC_BIND (info, &hh->eh)
|| !hh->eh.def_regular))
{
outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
|| !hh->eh.def_regular))
{
outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
@@
-4100,8
+4122,10
@@
elf32_hppa_relocate_section (bfd *output_bfd,
bfd_boolean dyn;
dyn = htab->etab.dynamic_sections_created;
bfd_boolean dyn;
dyn = htab->etab.dynamic_sections_created;
- if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, &hh->eh)
- && (!info->shared
+ if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
+ bfd_link_pic (info),
+ &hh->eh)
+ && (!bfd_link_pic (info)
|| !SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
{
indx = hh->eh.dynindx;
|| !SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
{
indx = hh->eh.dynindx;
@@
-4131,7
+4155,7
@@
elf32_hppa_relocate_section (bfd *output_bfd,
now, and emit any relocations. If both an IE GOT and a
GD GOT are necessary, we emit the GD first. */
now, and emit any relocations. If both an IE GOT and a
GD GOT are necessary, we emit the GD first. */
- if ((
info->shared
|| indx != 0)
+ if ((
bfd_link_pic (info)
|| indx != 0)
&& (hh == NULL
|| ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT
|| hh->eh.root.type != bfd_link_hash_undefweak))
&& (hh == NULL
|| ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT
|| hh->eh.root.type != bfd_link_hash_undefweak))
@@
-4377,8
+4401,8
@@
elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
we just want to emit a RELATIVE reloc. The entry in the
global offset table will already have been initialized in the
relocate_section function. */
we just want to emit a RELATIVE reloc. The entry in the
global offset table will already have been initialized in the
relocate_section function. */
- if (
info->shared
- && (
info->symbolic
|| eh->dynindx == -1)
+ if (
bfd_link_pic (info)
+ && (
SYMBOLIC_BIND (info, eh)
|| eh->dynindx == -1)
&& eh->def_regular)
{
rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
&& eh->def_regular)
{
rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
@@
-4436,7
+4460,9
@@
elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
dynamic linker, before writing them out. */
static enum elf_reloc_type_class
dynamic linker, before writing them out. */
static enum elf_reloc_type_class
-elf32_hppa_reloc_type_class (const Elf_Internal_Rela *rela)
+elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
+ const asection *rel_sec ATTRIBUTE_UNUSED,
+ const Elf_Internal_Rela *rela)
{
/* Handle TLS relocs first; we don't want them to be marked
relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
{
/* Handle TLS relocs first; we don't want them to be marked
relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
@@
-4568,9
+4594,10
@@
elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
if (htab->splt != NULL && htab->splt->size != 0)
{
if (htab->splt != NULL && htab->splt->size != 0)
{
- /* Set plt entry size. */
- elf_section_data (htab->splt->output_section)
- ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
+ /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
+ plt stubs and as such the section does not hold a table of fixed-size
+ entries. */
+ elf_section_data (htab->splt->output_section)->this_hdr.sh_entsize = 0;
if (htab->need_plt_stub)
{
if (htab->need_plt_stub)
{
@@
-4616,7
+4643,6
@@
elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
/* Stuff for the BFD linker. */
#define bfd_elf32_bfd_final_link elf32_hppa_final_link
#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
/* Stuff for the BFD linker. */
#define bfd_elf32_bfd_final_link elf32_hppa_final_link
#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
-#define bfd_elf32_bfd_link_hash_table_free elf32_hppa_link_hash_table_free
#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
#define elf_backend_check_relocs elf32_hppa_check_relocs
#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
#define elf_backend_check_relocs elf32_hppa_check_relocs
@@
-4634,7
+4660,6
@@
elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
#define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
#define elf_backend_object_p elf32_hppa_object_p
#define elf_backend_final_write_processing elf_hppa_final_write_processing
#define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
#define elf_backend_object_p elf32_hppa_object_p
#define elf_backend_final_write_processing elf_hppa_final_write_processing
-#define elf_backend_post_process_headers _bfd_elf_set_osabi
#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
#define elf_backend_action_discarded elf_hppa_action_discarded
#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
#define elf_backend_action_discarded elf_hppa_action_discarded
@@
-4648,7
+4673,7
@@
elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
#define elf_backend_got_header_size 8
#define elf_backend_rela_normal 1
#define elf_backend_got_header_size 8
#define elf_backend_rela_normal 1
-#define TARGET_BIG_SYM
bfd_elf32_hppa
_vec
+#define TARGET_BIG_SYM
hppa_elf32
_vec
#define TARGET_BIG_NAME "elf32-hppa"
#define ELF_ARCH bfd_arch_hppa
#define ELF_TARGET_ID HPPA32_ELF_DATA
#define TARGET_BIG_NAME "elf32-hppa"
#define ELF_ARCH bfd_arch_hppa
#define ELF_TARGET_ID HPPA32_ELF_DATA
@@
-4660,7
+4685,7
@@
elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
#include "elf32-target.h"
#undef TARGET_BIG_SYM
#include "elf32-target.h"
#undef TARGET_BIG_SYM
-#define TARGET_BIG_SYM
bfd_elf32_hppa
_linux_vec
+#define TARGET_BIG_SYM
hppa_elf32
_linux_vec
#undef TARGET_BIG_NAME
#define TARGET_BIG_NAME "elf32-hppa-linux"
#undef ELF_OSABI
#undef TARGET_BIG_NAME
#define TARGET_BIG_NAME "elf32-hppa-linux"
#undef ELF_OSABI
@@
-4671,7
+4696,7
@@
elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
#include "elf32-target.h"
#undef TARGET_BIG_SYM
#include "elf32-target.h"
#undef TARGET_BIG_SYM
-#define TARGET_BIG_SYM
bfd_elf32_hppa
_nbsd_vec
+#define TARGET_BIG_SYM
hppa_elf32
_nbsd_vec
#undef TARGET_BIG_NAME
#define TARGET_BIG_NAME "elf32-hppa-netbsd"
#undef ELF_OSABI
#undef TARGET_BIG_NAME
#define TARGET_BIG_NAME "elf32-hppa-netbsd"
#undef ELF_OSABI
This page took
0.035169 seconds
and
4
git commands to generate.