Fix RELOC_FOR_GLOBAL_SYMBOLS macro so that it can cope with user defined symbols...
[binutils-gdb.git] / bfd / elf32-hppa.c
blob3a959a0fc2511bfe4ca854796c8481605f9a28b4
1 /* BFD back-end for HP PA-RISC ELF files.
2 Copyright (C) 1990-2024 Free Software Foundation, Inc.
4 Original code by
5 Center for Software Science
6 Department of Computer Science
7 University of Utah
8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
12 This file is part of BFD, the Binary File Descriptor library.
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
16 the Free Software Foundation; either version 3 of the License, or
17 (at your option) any later version.
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
29 #include "sysdep.h"
30 #include "bfd.h"
31 #include "libbfd.h"
32 #include "elf-bfd.h"
33 #include "elf/hppa.h"
34 #include "libhppa.h"
35 #include "elf32-hppa.h"
36 #define ARCH_SIZE 32
37 #include "elf32-hppa.h"
38 #include "elf-hppa.h"
40 /* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
42 following:
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
51 /* We use two hash tables to hold information for linking PA ELF objects.
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
59 necessary to build the linker stubs during a link.
61 There are a number of different stubs generated by the linker.
63 Long branch stub:
64 : ldil LR'X,%r1
65 : be,n RR'X(%sr4,%r1)
67 PIC long branch stub:
68 : b,l .+8,%r1
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
74 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
75 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
76 : ldw 0(%r22),%r21 ; get procedure entry point
77 : bv %r0(%r21)
78 : ldw 4(%r22),%r19 ; get new dlt value.
80 Import stub to call shared library routine from shared library
81 (single sub-space version)
82 : addil LR'ltoff,%r19 ; get PLT address
83 : ldo RR'ltoff(%r1),%r22
84 : ldw 0(%r22),%r21 ; get procedure entry point
85 : bv %r0(%r21)
86 : ldw 4(%r22),%r19 ; get new dlt value.
88 Import stub to call shared library routine from normal object file
89 (multiple sub-space support)
90 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
91 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
92 : ldw 0(%r22),%r21 ; get procedure entry point
93 : ldsid (%r21),%r1 ; get target sid
94 : ldw 4(%r22),%r19 ; get new dlt value.
95 : mtsp %r1,%sr0
96 : be 0(%sr0,%r21) ; branch to target
97 : stw %rp,-24(%sp) ; save rp
99 Import stub to call shared library routine from shared library
100 (multiple sub-space support)
101 : addil LR'ltoff,%r19 ; get PLT address
102 : ldo RR'ltoff(%r1),%r22
103 : ldw 0(%r22),%r21 ; get procedure entry point
104 : ldsid (%r21),%r1 ; get target sid
105 : ldw 4(%r22),%r19 ; get new dlt value.
106 : mtsp %r1,%sr0
107 : be 0(%sr0,%r21) ; branch to target
108 : stw %rp,-24(%sp) ; save rp
110 Export stub to return from shared lib routine (multiple sub-space support)
111 One of these is created for each exported procedure in a shared
112 library (and stored in the shared lib). Shared lib routines are
113 called via the first instruction in the export stub so that we can
114 do an inter-space return. Not required for single sub-space.
115 : bl,n X,%rp ; trap the return
116 : nop
117 : ldw -24(%sp),%rp ; restore the original rp
118 : ldsid (%rp),%r1
119 : mtsp %r1,%sr0
120 : be,n 0(%sr0,%rp) ; inter-space return. */
123 /* Variable names follow a coding style.
124 Please follow this (Apps Hungarian) style:
126 Structure/Variable Prefix
127 elf_link_hash_table "etab"
128 elf_link_hash_entry "eh"
130 elf32_hppa_link_hash_table "htab"
131 elf32_hppa_link_hash_entry "hh"
133 bfd_hash_table "btab"
134 bfd_hash_entry "bh"
136 bfd_hash_table containing stubs "bstab"
137 elf32_hppa_stub_hash_entry "hsh"
139 Always remember to use GNU Coding Style. */
141 #define PLT_ENTRY_SIZE 8
142 #define GOT_ENTRY_SIZE 4
143 #define LONG_BRANCH_STUB_SIZE 8
144 #define LONG_BRANCH_SHARED_STUB_SIZE 12
145 #define IMPORT_STUB_SIZE 20
146 #define IMPORT_SHARED_STUB_SIZE 32
147 #define EXPORT_STUB_SIZE 24
148 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
150 static const bfd_byte plt_stub[] =
152 0x0e, 0x80, 0x10, 0x95, /* 1: ldw 0(%r20),%r21 */
153 0xea, 0xa0, 0xc0, 0x00, /* bv %r0(%r21) */
154 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
155 #define PLT_STUB_ENTRY (3*4)
156 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
157 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
158 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
159 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
162 /* Section name for stubs is the associated section name plus this
163 string. */
164 #define STUB_SUFFIX ".stub"
166 /* We don't need to copy certain PC- or GP-relative dynamic relocs
167 into a shared object's dynamic section. All the relocs of the
168 limited class we are interested in, are absolute. */
169 #ifndef RELATIVE_DYNRELOCS
170 #define RELATIVE_DYNRELOCS 0
171 #define IS_ABSOLUTE_RELOC(r_type) 1
172 #define pc_dynrelocs(hh) 0
173 #endif
175 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
176 copying dynamic variables from a shared lib into an app's dynbss
177 section, and instead use a dynamic relocation to point into the
178 shared lib. */
179 #define ELIMINATE_COPY_RELOCS 1
181 enum elf32_hppa_stub_type
183 hppa_stub_long_branch,
184 hppa_stub_long_branch_shared,
185 hppa_stub_import,
186 hppa_stub_import_shared,
187 hppa_stub_export,
188 hppa_stub_none
191 struct elf32_hppa_stub_hash_entry
193 /* Base hash table entry structure. */
194 struct bfd_hash_entry bh_root;
196 /* The stub section. */
197 asection *stub_sec;
199 /* Offset within stub_sec of the beginning of this stub. */
200 bfd_vma stub_offset;
202 /* Given the symbol's value and its section we can determine its final
203 value when building the stubs (so the stub knows where to jump. */
204 bfd_vma target_value;
205 asection *target_section;
207 enum elf32_hppa_stub_type stub_type;
209 /* The symbol table entry, if any, that this was derived from. */
210 struct elf32_hppa_link_hash_entry *hh;
212 /* Where this stub is being called from, or, in the case of combined
213 stub sections, the first input section in the group. */
214 asection *id_sec;
217 enum _tls_type
219 GOT_UNKNOWN = 0,
220 GOT_NORMAL = 1,
221 GOT_TLS_GD = 2,
222 GOT_TLS_LDM = 4,
223 GOT_TLS_IE = 8
226 struct elf32_hppa_link_hash_entry
228 struct elf_link_hash_entry eh;
230 /* A pointer to the most recently used stub hash entry against this
231 symbol. */
232 struct elf32_hppa_stub_hash_entry *hsh_cache;
234 ENUM_BITFIELD (_tls_type) tls_type : 8;
236 /* Set if this symbol is used by a plabel reloc. */
237 unsigned int plabel:1;
240 struct elf32_hppa_link_hash_table
242 /* The main hash table. */
243 struct elf_link_hash_table etab;
245 /* The stub hash table. */
246 struct bfd_hash_table bstab;
248 /* Linker stub bfd. */
249 bfd *stub_bfd;
251 /* Linker call-backs. */
252 asection * (*add_stub_section) (const char *, asection *);
253 void (*layout_sections_again) (void);
255 /* Array to keep track of which stub sections have been created, and
256 information on stub grouping. */
257 struct map_stub
259 /* This is the section to which stubs in the group will be
260 attached. */
261 asection *link_sec;
262 /* The stub section. */
263 asection *stub_sec;
264 } *stub_group;
266 /* Assorted information used by elf32_hppa_size_stubs. */
267 unsigned int bfd_count;
268 unsigned int top_index;
269 asection **input_list;
270 Elf_Internal_Sym **all_local_syms;
272 /* Used during a final link to store the base of the text and data
273 segments so that we can perform SEGREL relocations. */
274 bfd_vma text_segment_base;
275 bfd_vma data_segment_base;
277 /* Whether we support multiple sub-spaces for shared libs. */
278 unsigned int multi_subspace:1;
280 /* Flags set when various size branches are detected. Used to
281 select suitable defaults for the stub group size. */
282 unsigned int has_12bit_branch:1;
283 unsigned int has_17bit_branch:1;
284 unsigned int has_22bit_branch:1;
286 /* Set if we need a .plt stub to support lazy dynamic linking. */
287 unsigned int need_plt_stub:1;
289 /* Data for LDM relocations. */
290 union
292 bfd_signed_vma refcount;
293 bfd_vma offset;
294 } tls_ldm_got;
297 /* Various hash macros and functions. */
298 #define hppa_link_hash_table(p) \
299 ((is_elf_hash_table ((p)->hash) \
300 && elf_hash_table_id (elf_hash_table (p)) == HPPA32_ELF_DATA) \
301 ? (struct elf32_hppa_link_hash_table *) (p)->hash : NULL)
303 #define hppa_elf_hash_entry(ent) \
304 ((struct elf32_hppa_link_hash_entry *)(ent))
306 #define hppa_stub_hash_entry(ent) \
307 ((struct elf32_hppa_stub_hash_entry *)(ent))
309 #define hppa_stub_hash_lookup(table, string, create, copy) \
310 ((struct elf32_hppa_stub_hash_entry *) \
311 bfd_hash_lookup ((table), (string), (create), (copy)))
313 #define hppa_elf_local_got_tls_type(abfd) \
314 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
316 #define hh_name(hh) \
317 (hh ? hh->eh.root.root.string : "<undef>")
319 #define eh_name(eh) \
320 (eh ? eh->root.root.string : "<undef>")
322 /* Assorted hash table functions. */
324 /* Initialize an entry in the stub hash table. */
326 static struct bfd_hash_entry *
327 stub_hash_newfunc (struct bfd_hash_entry *entry,
328 struct bfd_hash_table *table,
329 const char *string)
331 /* Allocate the structure if it has not already been allocated by a
332 subclass. */
333 if (entry == NULL)
335 entry = bfd_hash_allocate (table,
336 sizeof (struct elf32_hppa_stub_hash_entry));
337 if (entry == NULL)
338 return entry;
341 /* Call the allocation method of the superclass. */
342 entry = bfd_hash_newfunc (entry, table, string);
343 if (entry != NULL)
345 struct elf32_hppa_stub_hash_entry *hsh;
347 /* Initialize the local fields. */
348 hsh = hppa_stub_hash_entry (entry);
349 hsh->stub_sec = NULL;
350 hsh->stub_offset = 0;
351 hsh->target_value = 0;
352 hsh->target_section = NULL;
353 hsh->stub_type = hppa_stub_long_branch;
354 hsh->hh = NULL;
355 hsh->id_sec = NULL;
358 return entry;
361 /* Initialize an entry in the link hash table. */
363 static struct bfd_hash_entry *
364 hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
365 struct bfd_hash_table *table,
366 const char *string)
368 /* Allocate the structure if it has not already been allocated by a
369 subclass. */
370 if (entry == NULL)
372 entry = bfd_hash_allocate (table,
373 sizeof (struct elf32_hppa_link_hash_entry));
374 if (entry == NULL)
375 return entry;
378 /* Call the allocation method of the superclass. */
379 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
380 if (entry != NULL)
382 struct elf32_hppa_link_hash_entry *hh;
384 /* Initialize the local fields. */
385 hh = hppa_elf_hash_entry (entry);
386 hh->hsh_cache = NULL;
387 hh->plabel = 0;
388 hh->tls_type = GOT_UNKNOWN;
391 return entry;
394 /* Free the derived linker hash table. */
396 static void
397 elf32_hppa_link_hash_table_free (bfd *obfd)
399 struct elf32_hppa_link_hash_table *htab
400 = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
402 bfd_hash_table_free (&htab->bstab);
403 _bfd_elf_link_hash_table_free (obfd);
406 /* Create the derived linker hash table. The PA ELF port uses the derived
407 hash table to keep information specific to the PA ELF linker (without
408 using static variables). */
410 static struct bfd_link_hash_table *
411 elf32_hppa_link_hash_table_create (bfd *abfd)
413 struct elf32_hppa_link_hash_table *htab;
414 size_t amt = sizeof (*htab);
416 htab = bfd_zmalloc (amt);
417 if (htab == NULL)
418 return NULL;
420 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
421 sizeof (struct elf32_hppa_link_hash_entry),
422 HPPA32_ELF_DATA))
424 free (htab);
425 return NULL;
428 /* Init the stub hash table too. */
429 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
430 sizeof (struct elf32_hppa_stub_hash_entry)))
432 _bfd_elf_link_hash_table_free (abfd);
433 return NULL;
435 htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
436 htab->etab.dt_pltgot_required = true;
438 htab->text_segment_base = (bfd_vma) -1;
439 htab->data_segment_base = (bfd_vma) -1;
440 return &htab->etab.root;
443 /* Initialize the linker stubs BFD so that we can use it for linker
444 created dynamic sections. */
446 void
447 elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
449 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
451 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
452 htab->etab.dynobj = abfd;
455 /* Build a name for an entry in the stub hash table. */
457 static char *
458 hppa_stub_name (const asection *input_section,
459 const asection *sym_sec,
460 const struct elf32_hppa_link_hash_entry *hh,
461 const Elf_Internal_Rela *rela)
463 char *stub_name;
464 bfd_size_type len;
466 if (hh)
468 len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
469 stub_name = bfd_malloc (len);
470 if (stub_name != NULL)
471 sprintf (stub_name, "%08x_%s+%x",
472 input_section->id & 0xffffffff,
473 hh_name (hh),
474 (int) rela->r_addend & 0xffffffff);
476 else
478 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
479 stub_name = bfd_malloc (len);
480 if (stub_name != NULL)
481 sprintf (stub_name, "%08x_%x:%x+%x",
482 input_section->id & 0xffffffff,
483 sym_sec->id & 0xffffffff,
484 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
485 (int) rela->r_addend & 0xffffffff);
487 return stub_name;
490 /* Look up an entry in the stub hash. Stub entries are cached because
491 creating the stub name takes a bit of time. */
493 static struct elf32_hppa_stub_hash_entry *
494 hppa_get_stub_entry (const asection *input_section,
495 const asection *sym_sec,
496 struct elf32_hppa_link_hash_entry *hh,
497 const Elf_Internal_Rela *rela,
498 struct elf32_hppa_link_hash_table *htab)
500 struct elf32_hppa_stub_hash_entry *hsh_entry;
501 const asection *id_sec;
503 /* If this input section is part of a group of sections sharing one
504 stub section, then use the id of the first section in the group.
505 Stub names need to include a section id, as there may well be
506 more than one stub used to reach say, printf, and we need to
507 distinguish between them. */
508 id_sec = htab->stub_group[input_section->id].link_sec;
509 if (id_sec == NULL)
510 return NULL;
512 if (hh != NULL && hh->hsh_cache != NULL
513 && hh->hsh_cache->hh == hh
514 && hh->hsh_cache->id_sec == id_sec)
516 hsh_entry = hh->hsh_cache;
518 else
520 char *stub_name;
522 stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
523 if (stub_name == NULL)
524 return NULL;
526 hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
527 stub_name, false, false);
528 if (hh != NULL)
529 hh->hsh_cache = hsh_entry;
531 free (stub_name);
534 return hsh_entry;
537 /* Add a new stub entry to the stub hash. Not all fields of the new
538 stub entry are initialised. */
540 static struct elf32_hppa_stub_hash_entry *
541 hppa_add_stub (const char *stub_name,
542 asection *section,
543 struct elf32_hppa_link_hash_table *htab)
545 asection *link_sec;
546 asection *stub_sec;
547 struct elf32_hppa_stub_hash_entry *hsh;
549 link_sec = htab->stub_group[section->id].link_sec;
550 stub_sec = htab->stub_group[section->id].stub_sec;
551 if (stub_sec == NULL)
553 stub_sec = htab->stub_group[link_sec->id].stub_sec;
554 if (stub_sec == NULL)
556 size_t namelen;
557 bfd_size_type len;
558 char *s_name;
560 namelen = strlen (link_sec->name);
561 len = namelen + sizeof (STUB_SUFFIX);
562 s_name = bfd_alloc (htab->stub_bfd, len);
563 if (s_name == NULL)
564 return NULL;
566 memcpy (s_name, link_sec->name, namelen);
567 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
568 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
569 if (stub_sec == NULL)
570 return NULL;
571 htab->stub_group[link_sec->id].stub_sec = stub_sec;
573 htab->stub_group[section->id].stub_sec = stub_sec;
576 /* Enter this entry into the linker stub hash table. */
577 hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
578 true, false);
579 if (hsh == NULL)
581 /* xgettext:c-format */
582 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
583 section->owner, stub_name);
584 return NULL;
587 hsh->stub_sec = stub_sec;
588 hsh->stub_offset = 0;
589 hsh->id_sec = link_sec;
590 return hsh;
593 /* Determine the type of stub needed, if any, for a call. */
595 static enum elf32_hppa_stub_type
596 hppa_type_of_stub (asection *input_sec,
597 const Elf_Internal_Rela *rela,
598 struct elf32_hppa_link_hash_entry *hh,
599 bfd_vma destination,
600 struct bfd_link_info *info)
602 bfd_vma location;
603 bfd_vma branch_offset;
604 bfd_vma max_branch_offset;
605 unsigned int r_type;
607 if (hh != NULL
608 && hh->eh.plt.offset != (bfd_vma) -1
609 && hh->eh.dynindx != -1
610 && !hh->plabel
611 && (bfd_link_pic (info)
612 || !hh->eh.def_regular
613 || hh->eh.root.type == bfd_link_hash_defweak))
615 /* We need an import stub. Decide between hppa_stub_import
616 and hppa_stub_import_shared later. */
617 return hppa_stub_import;
620 if (destination == (bfd_vma) -1)
621 return hppa_stub_none;
623 /* Determine where the call point is. */
624 location = (input_sec->output_offset
625 + input_sec->output_section->vma
626 + rela->r_offset);
628 branch_offset = destination - location - 8;
629 r_type = ELF32_R_TYPE (rela->r_info);
631 /* Determine if a long branch stub is needed. parisc branch offsets
632 are relative to the second instruction past the branch, ie. +8
633 bytes on from the branch instruction location. The offset is
634 signed and counts in units of 4 bytes. */
635 if (r_type == (unsigned int) R_PARISC_PCREL17F)
636 max_branch_offset = (1 << (17 - 1)) << 2;
638 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
639 max_branch_offset = (1 << (12 - 1)) << 2;
641 else /* R_PARISC_PCREL22F. */
642 max_branch_offset = (1 << (22 - 1)) << 2;
644 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
645 return hppa_stub_long_branch;
647 return hppa_stub_none;
650 /* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
651 IN_ARG contains the link info pointer. */
653 #define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
654 #define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
656 #define BL_R1 0xe8200000 /* b,l .+8,%r1 */
657 #define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
658 #define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
660 #define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
661 #define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
662 #define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
663 #define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
665 #define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
666 #define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
668 #define LDO_R1_R22 0x34360000 /* ldo RR'XXX(%r1),%r22 */
669 #define LDW_R22_R21 0x0ec01095 /* ldw 0(%r22),%r21 */
670 #define LDW_R22_R19 0x0ec81093 /* ldw 4(%r22),%r19 */
672 #define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
673 #define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
674 #define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
675 #define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
677 #define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
678 #define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
679 #define NOP 0x08000240 /* nop */
680 #define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
681 #define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
682 #define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
684 #ifndef R19_STUBS
685 #define R19_STUBS 1
686 #endif
688 #if R19_STUBS
689 #define LDW_R1_DLT LDW_R1_R19
690 #else
691 #define LDW_R1_DLT LDW_R1_DP
692 #endif
694 static bool
695 hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
697 struct elf32_hppa_stub_hash_entry *hsh;
698 struct bfd_link_info *info;
699 struct elf32_hppa_link_hash_table *htab;
700 asection *stub_sec;
701 bfd *stub_bfd;
702 bfd_byte *loc;
703 bfd_vma sym_value;
704 bfd_vma insn;
705 bfd_vma off;
706 int val;
707 int size;
709 /* Massage our args to the form they really have. */
710 hsh = hppa_stub_hash_entry (bh);
711 info = (struct bfd_link_info *)in_arg;
713 htab = hppa_link_hash_table (info);
714 if (htab == NULL)
715 return false;
717 stub_sec = hsh->stub_sec;
719 /* Make a note of the offset within the stubs for this entry. */
720 hsh->stub_offset = stub_sec->size;
721 loc = stub_sec->contents + hsh->stub_offset;
723 stub_bfd = stub_sec->owner;
725 switch (hsh->stub_type)
727 case hppa_stub_long_branch:
728 /* Fail if the target section could not be assigned to an output
729 section. The user should fix his linker script. */
730 if (hsh->target_section->output_section == NULL
731 && info->non_contiguous_regions)
732 info->callbacks->einfo (_("%F%P: Could not assign `%pA' to an output "
733 "section. Retry without "
734 "--enable-non-contiguous-regions.\n"),
735 hsh->target_section);
737 /* Create the long branch. A long branch is formed with "ldil"
738 loading the upper bits of the target address into a register,
739 then branching with "be" which adds in the lower bits.
740 The "be" has its delay slot nullified. */
741 sym_value = (hsh->target_value
742 + hsh->target_section->output_offset
743 + hsh->target_section->output_section->vma);
745 val = hppa_field_adjust (sym_value, 0, e_lrsel);
746 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
747 bfd_put_32 (stub_bfd, insn, loc);
749 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
750 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
751 bfd_put_32 (stub_bfd, insn, loc + 4);
753 size = LONG_BRANCH_STUB_SIZE;
754 break;
756 case hppa_stub_long_branch_shared:
757 /* Fail if the target section could not be assigned to an output
758 section. The user should fix his linker script. */
759 if (hsh->target_section->output_section == NULL
760 && info->non_contiguous_regions)
761 info->callbacks->einfo (_("%F%P: Could not assign `%pA' to an output "
762 "section. Retry without "
763 "--enable-non-contiguous-regions.\n"),
764 hsh->target_section);
766 /* Branches are relative. This is where we are going to. */
767 sym_value = (hsh->target_value
768 + hsh->target_section->output_offset
769 + hsh->target_section->output_section->vma);
771 /* And this is where we are coming from, more or less. */
772 sym_value -= (hsh->stub_offset
773 + stub_sec->output_offset
774 + stub_sec->output_section->vma);
776 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
777 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
778 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
779 bfd_put_32 (stub_bfd, insn, loc + 4);
781 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
782 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
783 bfd_put_32 (stub_bfd, insn, loc + 8);
784 size = LONG_BRANCH_SHARED_STUB_SIZE;
785 break;
787 case hppa_stub_import:
788 case hppa_stub_import_shared:
789 off = hsh->hh->eh.plt.offset;
790 if (off >= (bfd_vma) -2)
791 abort ();
793 off &= ~ (bfd_vma) 1;
794 sym_value = (off
795 + htab->etab.splt->output_offset
796 + htab->etab.splt->output_section->vma
797 - elf_gp (htab->etab.splt->output_section->owner));
799 insn = ADDIL_DP;
800 #if R19_STUBS
801 if (hsh->stub_type == hppa_stub_import_shared)
802 insn = ADDIL_R19;
803 #endif
805 /* Load function descriptor address into register %r22. It is
806 sometimes needed for lazy binding. */
807 val = hppa_field_adjust (sym_value, 0, e_lrsel),
808 insn = hppa_rebuild_insn ((int) insn, val, 21);
809 bfd_put_32 (stub_bfd, insn, loc);
811 val = hppa_field_adjust (sym_value, 0, e_rrsel);
812 insn = hppa_rebuild_insn ((int) LDO_R1_R22, val, 14);
813 bfd_put_32 (stub_bfd, insn, loc + 4);
815 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R21, loc + 8);
817 if (htab->multi_subspace)
819 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
820 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
821 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 20);
822 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 24);
823 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 28);
825 size = IMPORT_SHARED_STUB_SIZE;
827 else
829 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 12);
830 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
832 size = IMPORT_STUB_SIZE;
835 break;
837 case hppa_stub_export:
838 /* Fail if the target section could not be assigned to an output
839 section. The user should fix his linker script. */
840 if (hsh->target_section->output_section == NULL
841 && info->non_contiguous_regions)
842 info->callbacks->einfo (_("%F%P: Could not assign `%pA' to an output "
843 "section. Retry without "
844 "--enable-non-contiguous-regions.\n"),
845 hsh->target_section);
847 /* Branches are relative. This is where we are going to. */
848 sym_value = (hsh->target_value
849 + hsh->target_section->output_offset
850 + hsh->target_section->output_section->vma);
852 /* And this is where we are coming from. */
853 sym_value -= (hsh->stub_offset
854 + stub_sec->output_offset
855 + stub_sec->output_section->vma);
857 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
858 && (!htab->has_22bit_branch
859 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
861 _bfd_error_handler
862 /* xgettext:c-format */
863 (_("%pB(%pA+%#" PRIx64 "): "
864 "cannot reach %s, recompile with -ffunction-sections"),
865 hsh->target_section->owner,
866 stub_sec,
867 (uint64_t) hsh->stub_offset,
868 hsh->bh_root.string);
869 bfd_set_error (bfd_error_bad_value);
870 return false;
873 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
874 if (!htab->has_22bit_branch)
875 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
876 else
877 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
878 bfd_put_32 (stub_bfd, insn, loc);
880 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
881 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
882 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
883 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
884 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
886 /* Point the function symbol at the stub. */
887 hsh->hh->eh.root.u.def.section = stub_sec;
888 hsh->hh->eh.root.u.def.value = stub_sec->size;
890 size = EXPORT_STUB_SIZE;
891 break;
893 default:
894 BFD_FAIL ();
895 return false;
898 stub_sec->size += size;
899 return true;
902 #undef LDIL_R1
903 #undef BE_SR4_R1
904 #undef BL_R1
905 #undef ADDIL_R1
906 #undef DEPI_R1
907 #undef LDW_R1_R21
908 #undef LDW_R1_DLT
909 #undef LDW_R1_R19
910 #undef ADDIL_R19
911 #undef LDW_R1_DP
912 #undef LDSID_R21_R1
913 #undef MTSP_R1
914 #undef BE_SR0_R21
915 #undef STW_RP
916 #undef BV_R0_R21
917 #undef BL_RP
918 #undef NOP
919 #undef LDW_RP
920 #undef LDSID_RP_R1
921 #undef BE_SR0_RP
923 /* As above, but don't actually build the stub. Just bump offset so
924 we know stub section sizes. */
926 static bool
927 hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
929 struct elf32_hppa_stub_hash_entry *hsh;
930 struct elf32_hppa_link_hash_table *htab;
931 int size;
933 /* Massage our args to the form they really have. */
934 hsh = hppa_stub_hash_entry (bh);
935 htab = in_arg;
937 if (hsh->stub_type == hppa_stub_long_branch)
938 size = LONG_BRANCH_STUB_SIZE;
939 else if (hsh->stub_type == hppa_stub_long_branch_shared)
940 size = LONG_BRANCH_SHARED_STUB_SIZE;
941 else if (hsh->stub_type == hppa_stub_export)
942 size = EXPORT_STUB_SIZE;
943 else /* hppa_stub_import or hppa_stub_import_shared. */
945 if (htab->multi_subspace)
946 size = IMPORT_SHARED_STUB_SIZE;
947 else
948 size = IMPORT_STUB_SIZE;
951 hsh->stub_sec->size += size;
952 return true;
955 /* Return nonzero if ABFD represents an HPPA ELF32 file.
956 Additionally we set the default architecture and machine. */
958 static bool
959 elf32_hppa_object_p (bfd *abfd)
961 Elf_Internal_Ehdr * i_ehdrp;
962 unsigned int flags;
964 i_ehdrp = elf_elfheader (abfd);
965 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
967 /* GCC on hppa-linux produces binaries with OSABI=GNU,
968 but the kernel produces corefiles with OSABI=SysV. */
969 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
970 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
971 return false;
973 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
975 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
976 but the kernel produces corefiles with OSABI=SysV. */
977 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
978 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
979 return false;
981 else
983 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
984 return false;
987 flags = i_ehdrp->e_flags;
988 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
990 case EFA_PARISC_1_0:
991 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
992 case EFA_PARISC_1_1:
993 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
994 case EFA_PARISC_2_0:
995 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
996 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
997 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
999 return true;
1002 /* Create the .plt and .got sections, and set up our hash table
1003 short-cuts to various dynamic sections. */
1005 static bool
1006 elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1008 struct elf32_hppa_link_hash_table *htab;
1009 struct elf_link_hash_entry *eh;
1011 /* Don't try to create the .plt and .got twice. */
1012 htab = hppa_link_hash_table (info);
1013 if (htab == NULL)
1014 return false;
1015 if (htab->etab.splt != NULL)
1016 return true;
1018 /* Call the generic code to do most of the work. */
1019 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1020 return false;
1022 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1023 application, because __canonicalize_funcptr_for_compare needs it. */
1024 eh = elf_hash_table (info)->hgot;
1025 eh->forced_local = 0;
1026 eh->other = STV_DEFAULT;
1027 return bfd_elf_link_record_dynamic_symbol (info, eh);
1030 /* Copy the extra info we tack onto an elf_link_hash_entry. */
1032 static void
1033 elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
1034 struct elf_link_hash_entry *eh_dir,
1035 struct elf_link_hash_entry *eh_ind)
1037 struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
1039 hh_dir = hppa_elf_hash_entry (eh_dir);
1040 hh_ind = hppa_elf_hash_entry (eh_ind);
1042 if (eh_ind->root.type == bfd_link_hash_indirect)
1044 hh_dir->plabel |= hh_ind->plabel;
1045 hh_dir->tls_type |= hh_ind->tls_type;
1046 hh_ind->tls_type = GOT_UNKNOWN;
1049 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
1052 static int
1053 elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1054 int r_type, int is_local ATTRIBUTE_UNUSED)
1056 /* For now we don't support linker optimizations. */
1057 return r_type;
1060 /* Return a pointer to the local GOT, PLT and TLS reference counts
1061 for ABFD. Returns NULL if the storage allocation fails. */
1063 static bfd_signed_vma *
1064 hppa32_elf_local_refcounts (bfd *abfd)
1066 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1067 bfd_signed_vma *local_refcounts;
1069 local_refcounts = elf_local_got_refcounts (abfd);
1070 if (local_refcounts == NULL)
1072 bfd_size_type size;
1074 /* Allocate space for local GOT and PLT reference
1075 counts. Done this way to save polluting elf_obj_tdata
1076 with another target specific pointer. */
1077 size = symtab_hdr->sh_info;
1078 size *= 2 * sizeof (bfd_signed_vma);
1079 /* Add in space to store the local GOT TLS types. */
1080 size += symtab_hdr->sh_info;
1081 local_refcounts = bfd_zalloc (abfd, size);
1082 if (local_refcounts == NULL)
1083 return NULL;
1084 elf_local_got_refcounts (abfd) = local_refcounts;
1085 memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1086 symtab_hdr->sh_info);
1088 return local_refcounts;
1092 /* Look through the relocs for a section during the first phase, and
1093 calculate needed space in the global offset table, procedure linkage
1094 table, and dynamic reloc sections. At this point we haven't
1095 necessarily read all the input files. */
1097 static bool
1098 elf32_hppa_check_relocs (bfd *abfd,
1099 struct bfd_link_info *info,
1100 asection *sec,
1101 const Elf_Internal_Rela *relocs)
1103 Elf_Internal_Shdr *symtab_hdr;
1104 struct elf_link_hash_entry **eh_syms;
1105 const Elf_Internal_Rela *rela;
1106 const Elf_Internal_Rela *rela_end;
1107 struct elf32_hppa_link_hash_table *htab;
1108 asection *sreloc;
1110 if (bfd_link_relocatable (info))
1111 return true;
1113 htab = hppa_link_hash_table (info);
1114 if (htab == NULL)
1115 return false;
1116 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1117 eh_syms = elf_sym_hashes (abfd);
1118 sreloc = NULL;
1120 rela_end = relocs + sec->reloc_count;
1121 for (rela = relocs; rela < rela_end; rela++)
1123 enum {
1124 NEED_GOT = 1,
1125 NEED_PLT = 2,
1126 NEED_DYNREL = 4,
1127 PLT_PLABEL = 8
1130 unsigned int r_symndx, r_type;
1131 struct elf32_hppa_link_hash_entry *hh;
1132 int need_entry = 0;
1134 r_symndx = ELF32_R_SYM (rela->r_info);
1136 if (r_symndx < symtab_hdr->sh_info)
1137 hh = NULL;
1138 else
1140 hh = hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
1141 while (hh->eh.root.type == bfd_link_hash_indirect
1142 || hh->eh.root.type == bfd_link_hash_warning)
1143 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
1146 r_type = ELF32_R_TYPE (rela->r_info);
1147 r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
1149 switch (r_type)
1151 case R_PARISC_DLTIND14F:
1152 case R_PARISC_DLTIND14R:
1153 case R_PARISC_DLTIND21L:
1154 /* This symbol requires a global offset table entry. */
1155 need_entry = NEED_GOT;
1156 break;
1158 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1159 case R_PARISC_PLABEL21L:
1160 case R_PARISC_PLABEL32:
1161 /* If the addend is non-zero, we break badly. */
1162 if (rela->r_addend != 0)
1163 abort ();
1165 /* If we are creating a shared library, then we need to
1166 create a PLT entry for all PLABELs, because PLABELs with
1167 local symbols may be passed via a pointer to another
1168 object. Additionally, output a dynamic relocation
1169 pointing to the PLT entry.
1171 For executables, the original 32-bit ABI allowed two
1172 different styles of PLABELs (function pointers): For
1173 global functions, the PLABEL word points into the .plt
1174 two bytes past a (function address, gp) pair, and for
1175 local functions the PLABEL points directly at the
1176 function. The magic +2 for the first type allows us to
1177 differentiate between the two. As you can imagine, this
1178 is a real pain when it comes to generating code to call
1179 functions indirectly or to compare function pointers.
1180 We avoid the mess by always pointing a PLABEL into the
1181 .plt, even for local functions. */
1182 need_entry = PLT_PLABEL | NEED_PLT;
1183 if (bfd_link_pic (info))
1184 need_entry |= NEED_DYNREL;
1185 break;
1187 case R_PARISC_PCREL12F:
1188 htab->has_12bit_branch = 1;
1189 goto branch_common;
1191 case R_PARISC_PCREL17C:
1192 case R_PARISC_PCREL17F:
1193 htab->has_17bit_branch = 1;
1194 goto branch_common;
1196 case R_PARISC_PCREL22F:
1197 htab->has_22bit_branch = 1;
1198 branch_common:
1199 /* Function calls might need to go through the .plt, and
1200 might require long branch stubs. */
1201 if (hh == NULL)
1203 /* We know local syms won't need a .plt entry, and if
1204 they need a long branch stub we can't guarantee that
1205 we can reach the stub. So just flag an error later
1206 if we're doing a shared link and find we need a long
1207 branch stub. */
1208 continue;
1210 else
1212 /* Global symbols will need a .plt entry if they remain
1213 global, and in most cases won't need a long branch
1214 stub. Unfortunately, we have to cater for the case
1215 where a symbol is forced local by versioning, or due
1216 to symbolic linking, and we lose the .plt entry. */
1217 need_entry = NEED_PLT;
1218 if (hh->eh.type == STT_PARISC_MILLI)
1219 need_entry = 0;
1221 break;
1223 case R_PARISC_SEGBASE: /* Used to set segment base. */
1224 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
1225 case R_PARISC_PCREL14F: /* PC relative load/store. */
1226 case R_PARISC_PCREL14R:
1227 case R_PARISC_PCREL17R: /* External branches. */
1228 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1229 case R_PARISC_PCREL32:
1230 /* We don't need to propagate the relocation if linking a
1231 shared object since these are section relative. */
1232 continue;
1234 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1235 case R_PARISC_DPREL14R:
1236 case R_PARISC_DPREL21L:
1237 if (bfd_link_pic (info))
1239 _bfd_error_handler
1240 /* xgettext:c-format */
1241 (_("%pB: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1242 abfd,
1243 elf_hppa_howto_table[r_type].name);
1244 bfd_set_error (bfd_error_bad_value);
1245 return false;
1247 /* Fall through. */
1249 case R_PARISC_DIR17F: /* Used for external branches. */
1250 case R_PARISC_DIR17R:
1251 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1252 case R_PARISC_DIR14R:
1253 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1254 case R_PARISC_DIR32: /* .word relocs. */
1255 /* We may want to output a dynamic relocation later. */
1256 need_entry = NEED_DYNREL;
1257 break;
1259 /* This relocation describes the C++ object vtable hierarchy.
1260 Reconstruct it for later use during GC. */
1261 case R_PARISC_GNU_VTINHERIT:
1262 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
1263 return false;
1264 continue;
1266 /* This relocation describes which C++ vtable entries are actually
1267 used. Record for later use during GC. */
1268 case R_PARISC_GNU_VTENTRY:
1269 if (!bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
1270 return false;
1271 continue;
1273 case R_PARISC_TLS_GD21L:
1274 case R_PARISC_TLS_GD14R:
1275 case R_PARISC_TLS_LDM21L:
1276 case R_PARISC_TLS_LDM14R:
1277 need_entry = NEED_GOT;
1278 break;
1280 case R_PARISC_TLS_IE21L:
1281 case R_PARISC_TLS_IE14R:
1282 if (bfd_link_dll (info))
1283 info->flags |= DF_STATIC_TLS;
1284 need_entry = NEED_GOT;
1285 break;
1287 default:
1288 continue;
1291 /* Now carry out our orders. */
1292 if (need_entry & NEED_GOT)
1294 int tls_type = GOT_NORMAL;
1296 switch (r_type)
1298 default:
1299 break;
1300 case R_PARISC_TLS_GD21L:
1301 case R_PARISC_TLS_GD14R:
1302 tls_type = GOT_TLS_GD;
1303 break;
1304 case R_PARISC_TLS_LDM21L:
1305 case R_PARISC_TLS_LDM14R:
1306 tls_type = GOT_TLS_LDM;
1307 break;
1308 case R_PARISC_TLS_IE21L:
1309 case R_PARISC_TLS_IE14R:
1310 tls_type = GOT_TLS_IE;
1311 break;
1314 /* Allocate space for a GOT entry, as well as a dynamic
1315 relocation for this entry. */
1316 if (htab->etab.sgot == NULL)
1318 if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
1319 return false;
1322 if (hh != NULL)
1324 if (tls_type == GOT_TLS_LDM)
1325 htab->tls_ldm_got.refcount += 1;
1326 else
1327 hh->eh.got.refcount += 1;
1328 hh->tls_type |= tls_type;
1330 else
1332 bfd_signed_vma *local_got_refcounts;
1334 /* This is a global offset table entry for a local symbol. */
1335 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1336 if (local_got_refcounts == NULL)
1337 return false;
1338 if (tls_type == GOT_TLS_LDM)
1339 htab->tls_ldm_got.refcount += 1;
1340 else
1341 local_got_refcounts[r_symndx] += 1;
1343 hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
1347 if (need_entry & NEED_PLT)
1349 /* If we are creating a shared library, and this is a reloc
1350 against a weak symbol or a global symbol in a dynamic
1351 object, then we will be creating an import stub and a
1352 .plt entry for the symbol. Similarly, on a normal link
1353 to symbols defined in a dynamic object we'll need the
1354 import stub and a .plt entry. We don't know yet whether
1355 the symbol is defined or not, so make an entry anyway and
1356 clean up later in adjust_dynamic_symbol. */
1357 if ((sec->flags & SEC_ALLOC) != 0)
1359 if (hh != NULL)
1361 hh->eh.needs_plt = 1;
1362 hh->eh.plt.refcount += 1;
1364 /* If this .plt entry is for a plabel, mark it so
1365 that adjust_dynamic_symbol will keep the entry
1366 even if it appears to be local. */
1367 if (need_entry & PLT_PLABEL)
1368 hh->plabel = 1;
1370 else if (need_entry & PLT_PLABEL)
1372 bfd_signed_vma *local_got_refcounts;
1373 bfd_signed_vma *local_plt_refcounts;
1375 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1376 if (local_got_refcounts == NULL)
1377 return false;
1378 local_plt_refcounts = (local_got_refcounts
1379 + symtab_hdr->sh_info);
1380 local_plt_refcounts[r_symndx] += 1;
1385 if ((need_entry & NEED_DYNREL) != 0
1386 && (sec->flags & SEC_ALLOC) != 0)
1388 /* Flag this symbol as having a non-got, non-plt reference
1389 so that we generate copy relocs if it turns out to be
1390 dynamic. */
1391 if (hh != NULL)
1392 hh->eh.non_got_ref = 1;
1394 /* If we are creating a shared library then we need to copy
1395 the reloc into the shared library. However, if we are
1396 linking with -Bsymbolic, we need only copy absolute
1397 relocs or relocs against symbols that are not defined in
1398 an object we are including in the link. PC- or DP- or
1399 DLT-relative relocs against any local sym or global sym
1400 with DEF_REGULAR set, can be discarded. At this point we
1401 have not seen all the input files, so it is possible that
1402 DEF_REGULAR is not set now but will be set later (it is
1403 never cleared). We account for that possibility below by
1404 storing information in the dyn_relocs field of the
1405 hash table entry.
1407 A similar situation to the -Bsymbolic case occurs when
1408 creating shared libraries and symbol visibility changes
1409 render the symbol local.
1411 As it turns out, all the relocs we will be creating here
1412 are absolute, so we cannot remove them on -Bsymbolic
1413 links or visibility changes anyway. A STUB_REL reloc
1414 is absolute too, as in that case it is the reloc in the
1415 stub we will be creating, rather than copying the PCREL
1416 reloc in the branch.
1418 If on the other hand, we are creating an executable, we
1419 may need to keep relocations for symbols satisfied by a
1420 dynamic library if we manage to avoid copy relocs for the
1421 symbol. */
1422 if ((bfd_link_pic (info)
1423 && (IS_ABSOLUTE_RELOC (r_type)
1424 || (hh != NULL
1425 && (!SYMBOLIC_BIND (info, &hh->eh)
1426 || hh->eh.root.type == bfd_link_hash_defweak
1427 || !hh->eh.def_regular))))
1428 || (ELIMINATE_COPY_RELOCS
1429 && !bfd_link_pic (info)
1430 && hh != NULL
1431 && (hh->eh.root.type == bfd_link_hash_defweak
1432 || !hh->eh.def_regular)))
1434 struct elf_dyn_relocs *hdh_p;
1435 struct elf_dyn_relocs **hdh_head;
1437 /* Create a reloc section in dynobj and make room for
1438 this reloc. */
1439 if (sreloc == NULL)
1441 sreloc = _bfd_elf_make_dynamic_reloc_section
1442 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ true);
1444 if (sreloc == NULL)
1446 bfd_set_error (bfd_error_bad_value);
1447 return false;
1451 /* If this is a global symbol, we count the number of
1452 relocations we need for this symbol. */
1453 if (hh != NULL)
1455 hdh_head = &hh->eh.dyn_relocs;
1457 else
1459 /* Track dynamic relocs needed for local syms too.
1460 We really need local syms available to do this
1461 easily. Oh well. */
1462 asection *sr;
1463 void *vpp;
1464 Elf_Internal_Sym *isym;
1466 isym = bfd_sym_from_r_symndx (&htab->etab.sym_cache,
1467 abfd, r_symndx);
1468 if (isym == NULL)
1469 return false;
1471 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1472 if (sr == NULL)
1473 sr = sec;
1475 vpp = &elf_section_data (sr)->local_dynrel;
1476 hdh_head = (struct elf_dyn_relocs **) vpp;
1479 hdh_p = *hdh_head;
1480 if (hdh_p == NULL || hdh_p->sec != sec)
1482 hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
1483 if (hdh_p == NULL)
1484 return false;
1485 hdh_p->next = *hdh_head;
1486 *hdh_head = hdh_p;
1487 hdh_p->sec = sec;
1488 hdh_p->count = 0;
1489 #if RELATIVE_DYNRELOCS
1490 hdh_p->pc_count = 0;
1491 #endif
1494 hdh_p->count += 1;
1495 #if RELATIVE_DYNRELOCS
1496 if (!IS_ABSOLUTE_RELOC (rtype))
1497 hdh_p->pc_count += 1;
1498 #endif
1503 return true;
1506 /* Return the section that should be marked against garbage collection
1507 for a given relocation. */
1509 static asection *
1510 elf32_hppa_gc_mark_hook (asection *sec,
1511 struct bfd_link_info *info,
1512 Elf_Internal_Rela *rela,
1513 struct elf_link_hash_entry *hh,
1514 Elf_Internal_Sym *sym)
1516 if (hh != NULL)
1517 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1519 case R_PARISC_GNU_VTINHERIT:
1520 case R_PARISC_GNU_VTENTRY:
1521 return NULL;
1524 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
1527 /* Support for core dump NOTE sections. */
1529 static bool
1530 elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1532 int offset;
1533 size_t size;
1535 switch (note->descsz)
1537 default:
1538 return false;
1540 case 396: /* Linux/hppa */
1541 /* pr_cursig */
1542 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1544 /* pr_pid */
1545 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
1547 /* pr_reg */
1548 offset = 72;
1549 size = 320;
1551 break;
1554 /* Make a ".reg/999" section. */
1555 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1556 size, note->descpos + offset);
1559 static bool
1560 elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1562 switch (note->descsz)
1564 default:
1565 return false;
1567 case 124: /* Linux/hppa elf_prpsinfo. */
1568 elf_tdata (abfd)->core->program
1569 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
1570 elf_tdata (abfd)->core->command
1571 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1574 /* Note that for some reason, a spurious space is tacked
1575 onto the end of the args in some (at least one anyway)
1576 implementations, so strip it off if it exists. */
1578 char *command = elf_tdata (abfd)->core->command;
1579 int n = strlen (command);
1581 if (0 < n && command[n - 1] == ' ')
1582 command[n - 1] = '\0';
1585 return true;
1588 /* Our own version of hide_symbol, so that we can keep plt entries for
1589 plabels. */
1591 static void
1592 elf32_hppa_hide_symbol (struct bfd_link_info *info,
1593 struct elf_link_hash_entry *eh,
1594 bool force_local)
1596 if (force_local)
1598 eh->forced_local = 1;
1599 if (eh->dynindx != -1)
1601 eh->dynindx = -1;
1602 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1603 eh->dynstr_index);
1606 /* PR 16082: Remove version information from hidden symbol. */
1607 eh->verinfo.verdef = NULL;
1608 eh->verinfo.vertree = NULL;
1611 /* STT_GNU_IFUNC symbol must go through PLT. */
1612 if (! hppa_elf_hash_entry (eh)->plabel
1613 && eh->type != STT_GNU_IFUNC)
1615 eh->needs_plt = 0;
1616 eh->plt = elf_hash_table (info)->init_plt_offset;
1620 /* Return true if we have dynamic relocs against H or any of its weak
1621 aliases, that apply to read-only sections. Cannot be used after
1622 size_dynamic_sections. */
1624 static bool
1625 alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1627 struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1630 if (_bfd_elf_readonly_dynrelocs (&hh->eh))
1631 return true;
1632 hh = hppa_elf_hash_entry (hh->eh.u.alias);
1633 } while (hh != NULL && &hh->eh != eh);
1635 return false;
1638 /* Adjust a symbol defined by a dynamic object and referenced by a
1639 regular object. The current definition is in some section of the
1640 dynamic object, but we're not including those sections. We have to
1641 change the definition to something the rest of the link can
1642 understand. */
1644 static bool
1645 elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
1646 struct elf_link_hash_entry *eh)
1648 struct elf32_hppa_link_hash_table *htab;
1649 asection *sec, *srel;
1651 /* If this is a function, put it in the procedure linkage table. We
1652 will fill in the contents of the procedure linkage table later. */
1653 if (eh->type == STT_FUNC
1654 || eh->needs_plt)
1656 bool local = (SYMBOL_CALLS_LOCAL (info, eh)
1657 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
1658 /* Discard dyn_relocs when non-pic if we've decided that a
1659 function symbol is local. */
1660 if (!bfd_link_pic (info) && local)
1661 eh->dyn_relocs = NULL;
1663 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1664 The refcounts are not reliable when it has been hidden since
1665 hide_symbol can be called before the plabel flag is set. */
1666 if (hppa_elf_hash_entry (eh)->plabel)
1667 eh->plt.refcount = 1;
1669 /* Note that unlike some other backends, the refcount is not
1670 incremented for a non-call (and non-plabel) function reference. */
1671 else if (eh->plt.refcount <= 0
1672 || local)
1674 /* The .plt entry is not needed when:
1675 a) Garbage collection has removed all references to the
1676 symbol, or
1677 b) We know for certain the symbol is defined in this
1678 object, and it's not a weak definition, nor is the symbol
1679 used by a plabel relocation. Either this object is the
1680 application or we are doing a shared symbolic link. */
1681 eh->plt.offset = (bfd_vma) -1;
1682 eh->needs_plt = 0;
1685 /* Unlike other targets, elf32-hppa.c does not define a function
1686 symbol in a non-pic executable on PLT stub code, so we don't
1687 have a local definition in that case. ie. dyn_relocs can't
1688 be discarded. */
1690 /* Function symbols can't have copy relocs. */
1691 return true;
1693 else
1694 eh->plt.offset = (bfd_vma) -1;
1696 htab = hppa_link_hash_table (info);
1697 if (htab == NULL)
1698 return false;
1700 /* If this is a weak symbol, and there is a real definition, the
1701 processor independent code will have arranged for us to see the
1702 real definition first, and we can just use the same value. */
1703 if (eh->is_weakalias)
1705 struct elf_link_hash_entry *def = weakdef (eh);
1706 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1707 eh->root.u.def.section = def->root.u.def.section;
1708 eh->root.u.def.value = def->root.u.def.value;
1709 if (def->root.u.def.section == htab->etab.sdynbss
1710 || def->root.u.def.section == htab->etab.sdynrelro)
1711 eh->dyn_relocs = NULL;
1712 return true;
1715 /* This is a reference to a symbol defined by a dynamic object which
1716 is not a function. */
1718 /* If we are creating a shared library, we must presume that the
1719 only references to the symbol are via the global offset table.
1720 For such cases we need not do anything here; the relocations will
1721 be handled correctly by relocate_section. */
1722 if (bfd_link_pic (info))
1723 return true;
1725 /* If there are no references to this symbol that do not use the
1726 GOT, we don't need to generate a copy reloc. */
1727 if (!eh->non_got_ref)
1728 return true;
1730 /* If -z nocopyreloc was given, we won't generate them either. */
1731 if (info->nocopyreloc)
1732 return true;
1734 /* If we don't find any dynamic relocs in read-only sections, then
1735 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1736 if (ELIMINATE_COPY_RELOCS
1737 && !alias_readonly_dynrelocs (eh))
1738 return true;
1740 /* We must allocate the symbol in our .dynbss section, which will
1741 become part of the .bss section of the executable. There will be
1742 an entry for this symbol in the .dynsym section. The dynamic
1743 object will contain position independent code, so all references
1744 from the dynamic object to this symbol will go through the global
1745 offset table. The dynamic linker will use the .dynsym entry to
1746 determine the address it must put in the global offset table, so
1747 both the dynamic object and the regular object will refer to the
1748 same memory location for the variable. */
1749 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1751 sec = htab->etab.sdynrelro;
1752 srel = htab->etab.sreldynrelro;
1754 else
1756 sec = htab->etab.sdynbss;
1757 srel = htab->etab.srelbss;
1759 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
1761 /* We must generate a COPY reloc to tell the dynamic linker to
1762 copy the initial value out of the dynamic object and into the
1763 runtime process image. */
1764 srel->size += sizeof (Elf32_External_Rela);
1765 eh->needs_copy = 1;
1768 /* We no longer want dyn_relocs. */
1769 eh->dyn_relocs = NULL;
1770 return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
1773 /* If EH is undefined, make it dynamic if that makes sense. */
1775 static bool
1776 ensure_undef_dynamic (struct bfd_link_info *info,
1777 struct elf_link_hash_entry *eh)
1779 struct elf_link_hash_table *htab = elf_hash_table (info);
1781 if (htab->dynamic_sections_created
1782 && (eh->root.type == bfd_link_hash_undefweak
1783 || eh->root.type == bfd_link_hash_undefined)
1784 && eh->dynindx == -1
1785 && !eh->forced_local
1786 && eh->type != STT_PARISC_MILLI
1787 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
1788 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1789 return bfd_elf_link_record_dynamic_symbol (info, eh);
1790 return true;
1793 /* Allocate space in the .plt for entries that won't have relocations.
1794 ie. plabel entries. */
1796 static bool
1797 allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
1799 struct bfd_link_info *info;
1800 struct elf32_hppa_link_hash_table *htab;
1801 struct elf32_hppa_link_hash_entry *hh;
1802 asection *sec;
1804 if (eh->root.type == bfd_link_hash_indirect)
1805 return true;
1807 info = (struct bfd_link_info *) inf;
1808 hh = hppa_elf_hash_entry (eh);
1809 htab = hppa_link_hash_table (info);
1810 if (htab == NULL)
1811 return false;
1813 if (htab->etab.dynamic_sections_created
1814 && eh->plt.refcount > 0)
1816 if (!ensure_undef_dynamic (info, eh))
1817 return false;
1819 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
1821 /* Allocate these later. From this point on, h->plabel
1822 means that the plt entry is only used by a plabel.
1823 We'll be using a normal plt entry for this symbol, so
1824 clear the plabel indicator. */
1826 hh->plabel = 0;
1828 else if (hh->plabel)
1830 /* Make an entry in the .plt section for plabel references
1831 that won't have a .plt entry for other reasons. */
1832 sec = htab->etab.splt;
1833 eh->plt.offset = sec->size;
1834 sec->size += PLT_ENTRY_SIZE;
1835 if (bfd_link_pic (info))
1836 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1838 else
1840 /* No .plt entry needed. */
1841 eh->plt.offset = (bfd_vma) -1;
1842 eh->needs_plt = 0;
1845 else
1847 eh->plt.offset = (bfd_vma) -1;
1848 eh->needs_plt = 0;
1851 return true;
1854 /* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1856 static inline unsigned int
1857 got_entries_needed (int tls_type)
1859 unsigned int need = 0;
1861 if ((tls_type & GOT_NORMAL) != 0)
1862 need += GOT_ENTRY_SIZE;
1863 if ((tls_type & GOT_TLS_GD) != 0)
1864 need += GOT_ENTRY_SIZE * 2;
1865 if ((tls_type & GOT_TLS_IE) != 0)
1866 need += GOT_ENTRY_SIZE;
1867 return need;
1870 /* Calculate size of relocs needed for symbol given its TLS_TYPE and
1871 NEEDed GOT entries. TPREL_KNOWN says a TPREL offset can be
1872 calculated at link time. DTPREL_KNOWN says the same for a DTPREL
1873 offset. */
1875 static inline unsigned int
1876 got_relocs_needed (int tls_type, unsigned int need,
1877 bool dtprel_known, bool tprel_known)
1879 /* All the entries we allocated need relocs.
1880 Except for GD and IE with local symbols. */
1881 if ((tls_type & GOT_TLS_GD) != 0 && dtprel_known)
1882 need -= GOT_ENTRY_SIZE;
1883 if ((tls_type & GOT_TLS_IE) != 0 && tprel_known)
1884 need -= GOT_ENTRY_SIZE;
1885 return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1888 /* Allocate space in .plt, .got and associated reloc sections for
1889 global syms. */
1891 static bool
1892 allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
1894 struct bfd_link_info *info;
1895 struct elf32_hppa_link_hash_table *htab;
1896 asection *sec;
1897 struct elf32_hppa_link_hash_entry *hh;
1898 struct elf_dyn_relocs *hdh_p;
1900 if (eh->root.type == bfd_link_hash_indirect)
1901 return true;
1903 info = inf;
1904 htab = hppa_link_hash_table (info);
1905 if (htab == NULL)
1906 return false;
1908 hh = hppa_elf_hash_entry (eh);
1910 if (htab->etab.dynamic_sections_created
1911 && eh->plt.offset != (bfd_vma) -1
1912 && !hh->plabel
1913 && eh->plt.refcount > 0)
1915 /* Make an entry in the .plt section. */
1916 sec = htab->etab.splt;
1917 eh->plt.offset = sec->size;
1918 sec->size += PLT_ENTRY_SIZE;
1920 /* We also need to make an entry in the .rela.plt section. */
1921 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1922 htab->need_plt_stub = 1;
1925 if (eh->got.refcount > 0)
1927 unsigned int need;
1929 if (!ensure_undef_dynamic (info, eh))
1930 return false;
1932 sec = htab->etab.sgot;
1933 eh->got.offset = sec->size;
1934 need = got_entries_needed (hh->tls_type);
1935 sec->size += need;
1936 if (htab->etab.dynamic_sections_created
1937 && (bfd_link_dll (info)
1938 || (bfd_link_pic (info) && (hh->tls_type & GOT_NORMAL) != 0)
1939 || (eh->dynindx != -1
1940 && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1941 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1943 bool local = SYMBOL_REFERENCES_LOCAL (info, eh);
1944 htab->etab.srelgot->size
1945 += got_relocs_needed (hh->tls_type, need, local,
1946 local && bfd_link_executable (info));
1949 else
1950 eh->got.offset = (bfd_vma) -1;
1952 /* If no dynamic sections we can't have dynamic relocs. */
1953 if (!htab->etab.dynamic_sections_created)
1954 eh->dyn_relocs = NULL;
1956 /* Discard relocs on undefined syms with non-default visibility. */
1957 else if ((eh->root.type == bfd_link_hash_undefined
1958 && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
1959 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1960 eh->dyn_relocs = NULL;
1962 if (eh->dyn_relocs == NULL)
1963 return true;
1965 /* If this is a -Bsymbolic shared link, then we need to discard all
1966 space allocated for dynamic pc-relative relocs against symbols
1967 defined in a regular object. For the normal shared case, discard
1968 space for relocs that have become local due to symbol visibility
1969 changes. */
1970 if (bfd_link_pic (info))
1972 #if RELATIVE_DYNRELOCS
1973 if (SYMBOL_CALLS_LOCAL (info, eh))
1975 struct elf_dyn_relocs **hdh_pp;
1977 for (hdh_pp = &eh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
1979 hdh_p->count -= hdh_p->pc_count;
1980 hdh_p->pc_count = 0;
1981 if (hdh_p->count == 0)
1982 *hdh_pp = hdh_p->next;
1983 else
1984 hdh_pp = &hdh_p->next;
1987 #endif
1989 if (eh->dyn_relocs != NULL)
1991 if (!ensure_undef_dynamic (info, eh))
1992 return false;
1995 else if (ELIMINATE_COPY_RELOCS)
1997 /* For the non-shared case, discard space for relocs against
1998 symbols which turn out to need copy relocs or are not
1999 dynamic. */
2001 if (eh->dynamic_adjusted
2002 && !eh->def_regular
2003 && !ELF_COMMON_DEF_P (eh))
2005 if (!ensure_undef_dynamic (info, eh))
2006 return false;
2008 if (eh->dynindx == -1)
2009 eh->dyn_relocs = NULL;
2011 else
2012 eh->dyn_relocs = NULL;
2015 /* Finally, allocate space. */
2016 for (hdh_p = eh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
2018 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2019 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
2022 return true;
2025 /* This function is called via elf_link_hash_traverse to force
2026 millicode symbols local so they do not end up as globals in the
2027 dynamic symbol table. We ought to be able to do this in
2028 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2029 for all dynamic symbols. Arguably, this is a bug in
2030 elf_adjust_dynamic_symbol. */
2032 static bool
2033 clobber_millicode_symbols (struct elf_link_hash_entry *eh,
2034 void *info)
2036 if (eh->type == STT_PARISC_MILLI
2037 && !eh->forced_local)
2038 elf32_hppa_hide_symbol ((struct bfd_link_info *) info, eh, true);
2039 return true;
2042 /* Set the sizes of the dynamic sections. */
2044 static bool
2045 elf32_hppa_late_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2046 struct bfd_link_info *info)
2048 struct elf32_hppa_link_hash_table *htab;
2049 bfd *dynobj;
2050 bfd *ibfd;
2051 asection *sec;
2052 bool relocs;
2054 htab = hppa_link_hash_table (info);
2055 if (htab == NULL)
2056 return false;
2058 dynobj = htab->etab.dynobj;
2059 if (dynobj == NULL)
2060 return true;
2062 if (htab->etab.dynamic_sections_created)
2064 /* Set the contents of the .interp section to the interpreter. */
2065 if (bfd_link_executable (info) && !info->nointerp)
2067 sec = bfd_get_linker_section (dynobj, ".interp");
2068 if (sec == NULL)
2069 abort ();
2070 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2071 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2074 /* Force millicode symbols local. */
2075 elf_link_hash_traverse (&htab->etab,
2076 clobber_millicode_symbols,
2077 info);
2080 /* Set up .got and .plt offsets for local syms, and space for local
2081 dynamic relocs. */
2082 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2084 bfd_signed_vma *local_got;
2085 bfd_signed_vma *end_local_got;
2086 bfd_signed_vma *local_plt;
2087 bfd_signed_vma *end_local_plt;
2088 bfd_size_type locsymcount;
2089 Elf_Internal_Shdr *symtab_hdr;
2090 asection *srel;
2091 char *local_tls_type;
2093 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2094 continue;
2096 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
2098 struct elf_dyn_relocs *hdh_p;
2100 for (hdh_p = ((struct elf_dyn_relocs *)
2101 elf_section_data (sec)->local_dynrel);
2102 hdh_p != NULL;
2103 hdh_p = hdh_p->next)
2105 if (!bfd_is_abs_section (hdh_p->sec)
2106 && bfd_is_abs_section (hdh_p->sec->output_section))
2108 /* Input section has been discarded, either because
2109 it is a copy of a linkonce section or due to
2110 linker script /DISCARD/, so we'll be discarding
2111 the relocs too. */
2113 else if (hdh_p->count != 0)
2115 srel = elf_section_data (hdh_p->sec)->sreloc;
2116 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2117 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
2118 info->flags |= DF_TEXTREL;
2123 local_got = elf_local_got_refcounts (ibfd);
2124 if (!local_got)
2125 continue;
2127 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2128 locsymcount = symtab_hdr->sh_info;
2129 end_local_got = local_got + locsymcount;
2130 local_tls_type = hppa_elf_local_got_tls_type (ibfd);
2131 sec = htab->etab.sgot;
2132 srel = htab->etab.srelgot;
2133 for (; local_got < end_local_got; ++local_got)
2135 if (*local_got > 0)
2137 unsigned int need;
2139 *local_got = sec->size;
2140 need = got_entries_needed (*local_tls_type);
2141 sec->size += need;
2142 if (bfd_link_dll (info)
2143 || (bfd_link_pic (info)
2144 && (*local_tls_type & GOT_NORMAL) != 0))
2145 htab->etab.srelgot->size
2146 += got_relocs_needed (*local_tls_type, need, true,
2147 bfd_link_executable (info));
2149 else
2150 *local_got = (bfd_vma) -1;
2152 ++local_tls_type;
2155 local_plt = end_local_got;
2156 end_local_plt = local_plt + locsymcount;
2157 if (! htab->etab.dynamic_sections_created)
2159 /* Won't be used, but be safe. */
2160 for (; local_plt < end_local_plt; ++local_plt)
2161 *local_plt = (bfd_vma) -1;
2163 else
2165 sec = htab->etab.splt;
2166 srel = htab->etab.srelplt;
2167 for (; local_plt < end_local_plt; ++local_plt)
2169 if (*local_plt > 0)
2171 *local_plt = sec->size;
2172 sec->size += PLT_ENTRY_SIZE;
2173 if (bfd_link_pic (info))
2174 srel->size += sizeof (Elf32_External_Rela);
2176 else
2177 *local_plt = (bfd_vma) -1;
2182 if (htab->tls_ldm_got.refcount > 0)
2184 /* Allocate 2 got entries and 1 dynamic reloc for
2185 R_PARISC_TLS_DTPMOD32 relocs. */
2186 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2187 htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2188 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2190 else
2191 htab->tls_ldm_got.offset = -1;
2193 /* Do all the .plt entries without relocs first. The dynamic linker
2194 uses the last .plt reloc to find the end of the .plt (and hence
2195 the start of the .got) for lazy linking. */
2196 elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
2198 /* Allocate global sym .plt and .got entries, and space for global
2199 sym dynamic relocs. */
2200 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
2202 /* The check_relocs and adjust_dynamic_symbol entry points have
2203 determined the sizes of the various dynamic sections. Allocate
2204 memory for them. */
2205 relocs = false;
2206 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
2208 if ((sec->flags & SEC_LINKER_CREATED) == 0)
2209 continue;
2211 if (sec == htab->etab.splt)
2213 if (htab->need_plt_stub)
2215 /* Make space for the plt stub at the end of the .plt
2216 section. We want this stub right at the end, up
2217 against the .got section. */
2218 int gotalign = bfd_section_alignment (htab->etab.sgot);
2219 int pltalign = bfd_section_alignment (sec);
2220 int align = gotalign > 3 ? gotalign : 3;
2221 bfd_size_type mask;
2223 if (align > pltalign)
2224 bfd_set_section_alignment (sec, align);
2225 mask = ((bfd_size_type) 1 << gotalign) - 1;
2226 sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
2229 else if (sec == htab->etab.sgot
2230 || sec == htab->etab.sdynbss
2231 || sec == htab->etab.sdynrelro)
2233 else if (startswith (bfd_section_name (sec), ".rela"))
2235 if (sec->size != 0)
2237 /* Remember whether there are any reloc sections other
2238 than .rela.plt. */
2239 if (sec != htab->etab.srelplt)
2240 relocs = true;
2242 /* We use the reloc_count field as a counter if we need
2243 to copy relocs into the output file. */
2244 sec->reloc_count = 0;
2247 else
2249 /* It's not one of our sections, so don't allocate space. */
2250 continue;
2253 if (sec->size == 0)
2255 /* If we don't need this section, strip it from the
2256 output file. This is mostly to handle .rela.bss and
2257 .rela.plt. We must create both sections in
2258 create_dynamic_sections, because they must be created
2259 before the linker maps input sections to output
2260 sections. The linker does that before
2261 adjust_dynamic_symbol is called, and it is that
2262 function which decides whether anything needs to go
2263 into these sections. */
2264 sec->flags |= SEC_EXCLUDE;
2265 continue;
2268 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2269 continue;
2271 /* Allocate memory for the section contents. Zero it, because
2272 we may not fill in all the reloc sections. */
2273 sec->contents = bfd_zalloc (dynobj, sec->size);
2274 if (sec->contents == NULL)
2275 return false;
2278 return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
2281 /* External entry points for sizing and building linker stubs. */
2283 /* Set up various things so that we can make a list of input sections
2284 for each output section included in the link. Returns -1 on error,
2285 0 when no stubs will be needed, and 1 on success. */
2288 elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
2290 bfd *input_bfd;
2291 unsigned int bfd_count;
2292 unsigned int top_id, top_index;
2293 asection *section;
2294 asection **input_list, **list;
2295 size_t amt;
2296 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2298 if (htab == NULL)
2299 return -1;
2301 /* Count the number of input BFDs and find the top input section id. */
2302 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
2303 input_bfd != NULL;
2304 input_bfd = input_bfd->link.next)
2306 bfd_count += 1;
2307 for (section = input_bfd->sections;
2308 section != NULL;
2309 section = section->next)
2311 if (top_id < section->id)
2312 top_id = section->id;
2315 htab->bfd_count = bfd_count;
2317 amt = sizeof (struct map_stub) * (top_id + 1);
2318 htab->stub_group = bfd_zmalloc (amt);
2319 if (htab->stub_group == NULL)
2320 return -1;
2322 /* We can't use output_bfd->section_count here to find the top output
2323 section index as some sections may have been removed, and
2324 strip_excluded_output_sections doesn't renumber the indices. */
2325 for (section = output_bfd->sections, top_index = 0;
2326 section != NULL;
2327 section = section->next)
2329 if (top_index < section->index)
2330 top_index = section->index;
2333 htab->top_index = top_index;
2334 amt = sizeof (asection *) * (top_index + 1);
2335 input_list = bfd_malloc (amt);
2336 htab->input_list = input_list;
2337 if (input_list == NULL)
2338 return -1;
2340 /* For sections we aren't interested in, mark their entries with a
2341 value we can check later. */
2342 list = input_list + top_index;
2344 *list = bfd_abs_section_ptr;
2345 while (list-- != input_list);
2347 for (section = output_bfd->sections;
2348 section != NULL;
2349 section = section->next)
2351 if ((section->flags & SEC_CODE) != 0)
2352 input_list[section->index] = NULL;
2355 return 1;
2358 /* The linker repeatedly calls this function for each input section,
2359 in the order that input sections are linked into output sections.
2360 Build lists of input sections to determine groupings between which
2361 we may insert linker stubs. */
2363 void
2364 elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
2366 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2368 if (htab == NULL)
2369 return;
2371 if (isec->output_section->index <= htab->top_index)
2373 asection **list = htab->input_list + isec->output_section->index;
2374 if (*list != bfd_abs_section_ptr)
2376 /* Steal the link_sec pointer for our list. */
2377 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
2378 /* This happens to make the list in reverse order,
2379 which is what we want. */
2380 PREV_SEC (isec) = *list;
2381 *list = isec;
2386 /* See whether we can group stub sections together. Grouping stub
2387 sections may result in fewer stubs. More importantly, we need to
2388 put all .init* and .fini* stubs at the beginning of the .init or
2389 .fini output sections respectively, because glibc splits the
2390 _init and _fini functions into multiple parts. Putting a stub in
2391 the middle of a function is not a good idea. */
2393 static void
2394 group_sections (struct elf32_hppa_link_hash_table *htab,
2395 bfd_size_type stub_group_size,
2396 bool stubs_always_before_branch)
2398 asection **list = htab->input_list + htab->top_index;
2401 asection *tail = *list;
2402 if (tail == bfd_abs_section_ptr)
2403 continue;
2404 while (tail != NULL)
2406 asection *curr;
2407 asection *prev;
2408 bfd_size_type total;
2409 bool big_sec;
2411 curr = tail;
2412 total = tail->size;
2413 big_sec = total >= stub_group_size;
2415 while ((prev = PREV_SEC (curr)) != NULL
2416 && ((total += curr->output_offset - prev->output_offset)
2417 < stub_group_size))
2418 curr = prev;
2420 /* OK, the size from the start of CURR to the end is less
2421 than 240000 bytes and thus can be handled by one stub
2422 section. (or the tail section is itself larger than
2423 240000 bytes, in which case we may be toast.)
2424 We should really be keeping track of the total size of
2425 stubs added here, as stubs contribute to the final output
2426 section size. That's a little tricky, and this way will
2427 only break if stubs added total more than 22144 bytes, or
2428 2768 long branch stubs. It seems unlikely for more than
2429 2768 different functions to be called, especially from
2430 code only 240000 bytes long. This limit used to be
2431 250000, but c++ code tends to generate lots of little
2432 functions, and sometimes violated the assumption. */
2435 prev = PREV_SEC (tail);
2436 /* Set up this stub group. */
2437 htab->stub_group[tail->id].link_sec = curr;
2439 while (tail != curr && (tail = prev) != NULL);
2441 /* But wait, there's more! Input sections up to 240000
2442 bytes before the stub section can be handled by it too.
2443 Don't do this if we have a really large section after the
2444 stubs, as adding more stubs increases the chance that
2445 branches may not reach into the stub section. */
2446 if (!stubs_always_before_branch && !big_sec)
2448 total = 0;
2449 while (prev != NULL
2450 && ((total += tail->output_offset - prev->output_offset)
2451 < stub_group_size))
2453 tail = prev;
2454 prev = PREV_SEC (tail);
2455 htab->stub_group[tail->id].link_sec = curr;
2458 tail = prev;
2461 while (list-- != htab->input_list);
2462 free (htab->input_list);
2463 #undef PREV_SEC
2466 /* Read in all local syms for all input bfds, and create hash entries
2467 for export stubs if we are building a multi-subspace shared lib.
2468 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2470 static int
2471 get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
2473 unsigned int bfd_indx;
2474 Elf_Internal_Sym *local_syms, **all_local_syms;
2475 int stub_changed = 0;
2476 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2478 if (htab == NULL)
2479 return -1;
2481 /* We want to read in symbol extension records only once. To do this
2482 we need to read in the local symbols in parallel and save them for
2483 later use; so hold pointers to the local symbols in an array. */
2484 size_t amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
2485 all_local_syms = bfd_zmalloc (amt);
2486 htab->all_local_syms = all_local_syms;
2487 if (all_local_syms == NULL)
2488 return -1;
2490 /* Walk over all the input BFDs, swapping in local symbols.
2491 If we are creating a shared library, create hash entries for the
2492 export stubs. */
2493 for (bfd_indx = 0;
2494 input_bfd != NULL;
2495 input_bfd = input_bfd->link.next, bfd_indx++)
2497 Elf_Internal_Shdr *symtab_hdr;
2499 /* We'll need the symbol table in a second. */
2500 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2501 if (symtab_hdr->sh_info == 0)
2502 continue;
2504 /* We need an array of the local symbols attached to the input bfd. */
2505 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
2506 if (local_syms == NULL)
2508 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2509 symtab_hdr->sh_info, 0,
2510 NULL, NULL, NULL);
2511 /* Cache them for elf_link_input_bfd. */
2512 symtab_hdr->contents = (unsigned char *) local_syms;
2514 if (local_syms == NULL)
2515 return -1;
2517 all_local_syms[bfd_indx] = local_syms;
2519 if (bfd_link_pic (info) && htab->multi_subspace)
2521 struct elf_link_hash_entry **eh_syms;
2522 struct elf_link_hash_entry **eh_symend;
2523 unsigned int symcount;
2525 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2526 - symtab_hdr->sh_info);
2527 eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2528 eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
2530 /* Look through the global syms for functions; We need to
2531 build export stubs for all globally visible functions. */
2532 for (; eh_syms < eh_symend; eh_syms++)
2534 struct elf32_hppa_link_hash_entry *hh;
2536 hh = hppa_elf_hash_entry (*eh_syms);
2538 while (hh->eh.root.type == bfd_link_hash_indirect
2539 || hh->eh.root.type == bfd_link_hash_warning)
2540 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2542 /* At this point in the link, undefined syms have been
2543 resolved, so we need to check that the symbol was
2544 defined in this BFD. */
2545 if ((hh->eh.root.type == bfd_link_hash_defined
2546 || hh->eh.root.type == bfd_link_hash_defweak)
2547 && hh->eh.type == STT_FUNC
2548 && hh->eh.root.u.def.section->output_section != NULL
2549 && (hh->eh.root.u.def.section->output_section->owner
2550 == output_bfd)
2551 && hh->eh.root.u.def.section->owner == input_bfd
2552 && hh->eh.def_regular
2553 && !hh->eh.forced_local
2554 && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
2556 asection *sec;
2557 const char *stub_name;
2558 struct elf32_hppa_stub_hash_entry *hsh;
2560 sec = hh->eh.root.u.def.section;
2561 stub_name = hh_name (hh);
2562 hsh = hppa_stub_hash_lookup (&htab->bstab,
2563 stub_name,
2564 false, false);
2565 if (hsh == NULL)
2567 hsh = hppa_add_stub (stub_name, sec, htab);
2568 if (!hsh)
2569 return -1;
2571 hsh->target_value = hh->eh.root.u.def.value;
2572 hsh->target_section = hh->eh.root.u.def.section;
2573 hsh->stub_type = hppa_stub_export;
2574 hsh->hh = hh;
2575 stub_changed = 1;
2577 else
2579 /* xgettext:c-format */
2580 _bfd_error_handler (_("%pB: duplicate export stub %s"),
2581 input_bfd, stub_name);
2588 return stub_changed;
2591 /* Determine and set the size of the stub section for a final link.
2593 The basic idea here is to examine all the relocations looking for
2594 PC-relative calls to a target that is unreachable with a "bl"
2595 instruction. */
2597 bool
2598 elf32_hppa_size_stubs
2599 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2600 bool multi_subspace, bfd_signed_vma group_size,
2601 asection * (*add_stub_section) (const char *, asection *),
2602 void (*layout_sections_again) (void))
2604 bfd_size_type stub_group_size;
2605 bool stubs_always_before_branch;
2606 bool stub_changed;
2607 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2609 if (htab == NULL)
2610 return false;
2612 /* Stash our params away. */
2613 htab->stub_bfd = stub_bfd;
2614 htab->multi_subspace = multi_subspace;
2615 htab->add_stub_section = add_stub_section;
2616 htab->layout_sections_again = layout_sections_again;
2617 stubs_always_before_branch = group_size < 0;
2618 if (group_size < 0)
2619 stub_group_size = -group_size;
2620 else
2621 stub_group_size = group_size;
2622 if (stub_group_size == 1)
2624 /* Default values. */
2625 if (stubs_always_before_branch)
2627 stub_group_size = 7680000;
2628 if (htab->has_17bit_branch || htab->multi_subspace)
2629 stub_group_size = 240000;
2630 if (htab->has_12bit_branch)
2631 stub_group_size = 7500;
2633 else
2635 stub_group_size = 6971392;
2636 if (htab->has_17bit_branch || htab->multi_subspace)
2637 stub_group_size = 217856;
2638 if (htab->has_12bit_branch)
2639 stub_group_size = 6808;
2643 group_sections (htab, stub_group_size, stubs_always_before_branch);
2645 switch (get_local_syms (output_bfd, info->input_bfds, info))
2647 default:
2648 if (htab->all_local_syms)
2649 goto error_ret_free_local;
2650 return false;
2652 case 0:
2653 stub_changed = false;
2654 break;
2656 case 1:
2657 stub_changed = true;
2658 break;
2661 while (1)
2663 bfd *input_bfd;
2664 unsigned int bfd_indx;
2665 asection *stub_sec;
2667 for (input_bfd = info->input_bfds, bfd_indx = 0;
2668 input_bfd != NULL;
2669 input_bfd = input_bfd->link.next, bfd_indx++)
2671 Elf_Internal_Shdr *symtab_hdr;
2672 asection *section;
2673 Elf_Internal_Sym *local_syms;
2675 /* We'll need the symbol table in a second. */
2676 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2677 if (symtab_hdr->sh_info == 0)
2678 continue;
2680 local_syms = htab->all_local_syms[bfd_indx];
2682 /* Walk over each section attached to the input bfd. */
2683 for (section = input_bfd->sections;
2684 section != NULL;
2685 section = section->next)
2687 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2689 /* If there aren't any relocs, then there's nothing more
2690 to do. */
2691 if ((section->flags & SEC_RELOC) == 0
2692 || (section->flags & SEC_ALLOC) == 0
2693 || (section->flags & SEC_LOAD) == 0
2694 || (section->flags & SEC_CODE) == 0
2695 || section->reloc_count == 0)
2696 continue;
2698 /* If this section is a link-once section that will be
2699 discarded, then don't create any stubs. */
2700 if (section->output_section == NULL
2701 || section->output_section->owner != output_bfd)
2702 continue;
2704 /* Get the relocs. */
2705 internal_relocs
2706 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
2707 info->keep_memory);
2708 if (internal_relocs == NULL)
2709 goto error_ret_free_local;
2711 /* Now examine each relocation. */
2712 irela = internal_relocs;
2713 irelaend = irela + section->reloc_count;
2714 for (; irela < irelaend; irela++)
2716 unsigned int r_type, r_indx;
2717 enum elf32_hppa_stub_type stub_type;
2718 struct elf32_hppa_stub_hash_entry *hsh;
2719 asection *sym_sec;
2720 bfd_vma sym_value;
2721 bfd_vma destination;
2722 struct elf32_hppa_link_hash_entry *hh;
2723 char *stub_name;
2724 const asection *id_sec;
2726 r_type = ELF32_R_TYPE (irela->r_info);
2727 r_indx = ELF32_R_SYM (irela->r_info);
2729 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2731 bfd_set_error (bfd_error_bad_value);
2732 error_ret_free_internal:
2733 if (elf_section_data (section)->relocs == NULL)
2734 free (internal_relocs);
2735 goto error_ret_free_local;
2738 /* Only look for stubs on call instructions. */
2739 if (r_type != (unsigned int) R_PARISC_PCREL12F
2740 && r_type != (unsigned int) R_PARISC_PCREL17F
2741 && r_type != (unsigned int) R_PARISC_PCREL22F)
2742 continue;
2744 /* Now determine the call target, its name, value,
2745 section. */
2746 sym_sec = NULL;
2747 sym_value = 0;
2748 destination = -1;
2749 hh = NULL;
2750 if (r_indx < symtab_hdr->sh_info)
2752 /* It's a local symbol. */
2753 Elf_Internal_Sym *sym;
2754 Elf_Internal_Shdr *hdr;
2755 unsigned int shndx;
2757 sym = local_syms + r_indx;
2758 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2759 sym_value = sym->st_value;
2760 shndx = sym->st_shndx;
2761 if (shndx < elf_numsections (input_bfd))
2763 hdr = elf_elfsections (input_bfd)[shndx];
2764 sym_sec = hdr->bfd_section;
2765 destination = (sym_value + irela->r_addend
2766 + sym_sec->output_offset
2767 + sym_sec->output_section->vma);
2770 else
2772 /* It's an external symbol. */
2773 int e_indx;
2775 e_indx = r_indx - symtab_hdr->sh_info;
2776 hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
2778 while (hh->eh.root.type == bfd_link_hash_indirect
2779 || hh->eh.root.type == bfd_link_hash_warning)
2780 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2782 if (hh->eh.root.type == bfd_link_hash_defined
2783 || hh->eh.root.type == bfd_link_hash_defweak)
2785 sym_sec = hh->eh.root.u.def.section;
2786 sym_value = hh->eh.root.u.def.value;
2787 if (sym_sec->output_section != NULL)
2788 destination = (sym_value + irela->r_addend
2789 + sym_sec->output_offset
2790 + sym_sec->output_section->vma);
2792 else if (hh->eh.root.type == bfd_link_hash_undefweak)
2794 if (! bfd_link_pic (info))
2795 continue;
2797 else if (hh->eh.root.type == bfd_link_hash_undefined)
2799 if (! (info->unresolved_syms_in_objects == RM_IGNORE
2800 && (ELF_ST_VISIBILITY (hh->eh.other)
2801 == STV_DEFAULT)
2802 && hh->eh.type != STT_PARISC_MILLI))
2803 continue;
2805 else
2807 bfd_set_error (bfd_error_bad_value);
2808 goto error_ret_free_internal;
2812 /* Determine what (if any) linker stub is needed. */
2813 stub_type = hppa_type_of_stub (section, irela, hh,
2814 destination, info);
2815 if (stub_type == hppa_stub_none)
2816 continue;
2818 /* Support for grouping stub sections. */
2819 id_sec = htab->stub_group[section->id].link_sec;
2821 /* Get the name of this stub. */
2822 stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
2823 if (!stub_name)
2824 goto error_ret_free_internal;
2826 hsh = hppa_stub_hash_lookup (&htab->bstab,
2827 stub_name,
2828 false, false);
2829 if (hsh != NULL)
2831 /* The proper stub has already been created. */
2832 free (stub_name);
2833 continue;
2836 hsh = hppa_add_stub (stub_name, section, htab);
2837 if (hsh == NULL)
2839 free (stub_name);
2840 goto error_ret_free_internal;
2843 hsh->target_value = sym_value;
2844 hsh->target_section = sym_sec;
2845 hsh->stub_type = stub_type;
2846 if (bfd_link_pic (info))
2848 if (stub_type == hppa_stub_import)
2849 hsh->stub_type = hppa_stub_import_shared;
2850 else if (stub_type == hppa_stub_long_branch)
2851 hsh->stub_type = hppa_stub_long_branch_shared;
2853 hsh->hh = hh;
2854 stub_changed = true;
2857 /* We're done with the internal relocs, free them. */
2858 if (elf_section_data (section)->relocs == NULL)
2859 free (internal_relocs);
2863 if (!stub_changed)
2864 break;
2866 /* OK, we've added some stubs. Find out the new size of the
2867 stub sections. */
2868 for (stub_sec = htab->stub_bfd->sections;
2869 stub_sec != NULL;
2870 stub_sec = stub_sec->next)
2871 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
2872 stub_sec->size = 0;
2874 bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
2876 /* Ask the linker to do its stuff. */
2877 (*htab->layout_sections_again) ();
2878 stub_changed = false;
2881 free (htab->all_local_syms);
2882 return true;
2884 error_ret_free_local:
2885 free (htab->all_local_syms);
2886 return false;
2889 /* For a final link, this function is called after we have sized the
2890 stubs to provide a value for __gp. */
2892 bool
2893 elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
2895 struct bfd_link_hash_entry *h;
2896 asection *sec = NULL;
2897 bfd_vma gp_val = 0;
2899 h = bfd_link_hash_lookup (info->hash, "$global$", false, false, false);
2901 if (h != NULL
2902 && (h->type == bfd_link_hash_defined
2903 || h->type == bfd_link_hash_defweak))
2905 gp_val = h->u.def.value;
2906 sec = h->u.def.section;
2908 else
2910 asection *splt = bfd_get_section_by_name (abfd, ".plt");
2911 asection *sgot = bfd_get_section_by_name (abfd, ".got");
2913 /* Choose to point our LTP at, in this order, one of .plt, .got,
2914 or .data, if these sections exist. In the case of choosing
2915 .plt try to make the LTP ideal for addressing anywhere in the
2916 .plt or .got with a 14 bit signed offset. Typically, the end
2917 of the .plt is the start of the .got, so choose .plt + 0x2000
2918 if either the .plt or .got is larger than 0x2000. If both
2919 the .plt and .got are smaller than 0x2000, choose the end of
2920 the .plt section. */
2921 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
2922 ? NULL : splt;
2923 if (sec != NULL)
2925 gp_val = sec->size;
2926 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
2928 gp_val = 0x2000;
2931 else
2933 sec = sgot;
2934 if (sec != NULL)
2936 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
2938 /* We know we don't have a .plt. If .got is large,
2939 offset our LTP. */
2940 if (sec->size > 0x2000)
2941 gp_val = 0x2000;
2944 else
2946 /* No .plt or .got. Who cares what the LTP is? */
2947 sec = bfd_get_section_by_name (abfd, ".data");
2951 if (h != NULL)
2953 h->type = bfd_link_hash_defined;
2954 h->u.def.value = gp_val;
2955 if (sec != NULL)
2956 h->u.def.section = sec;
2957 else
2958 h->u.def.section = bfd_abs_section_ptr;
2962 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
2964 if (sec != NULL && sec->output_section != NULL)
2965 gp_val += sec->output_section->vma + sec->output_offset;
2967 elf_gp (abfd) = gp_val;
2969 return true;
2972 /* Build all the stubs associated with the current output file. The
2973 stubs are kept in a hash table attached to the main linker hash
2974 table. We also set up the .plt entries for statically linked PIC
2975 functions here. This function is called via hppaelf_finish in the
2976 linker. */
2978 bool
2979 elf32_hppa_build_stubs (struct bfd_link_info *info)
2981 asection *stub_sec;
2982 struct bfd_hash_table *table;
2983 struct elf32_hppa_link_hash_table *htab;
2985 htab = hppa_link_hash_table (info);
2986 if (htab == NULL)
2987 return false;
2989 for (stub_sec = htab->stub_bfd->sections;
2990 stub_sec != NULL;
2991 stub_sec = stub_sec->next)
2992 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
2993 && stub_sec->size != 0)
2995 /* Allocate memory to hold the linker stubs. */
2996 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
2997 if (stub_sec->contents == NULL)
2998 return false;
2999 stub_sec->size = 0;
3002 /* Build the stubs as directed by the stub hash table. */
3003 table = &htab->bstab;
3004 bfd_hash_traverse (table, hppa_build_one_stub, info);
3006 return true;
3009 /* Return the base vma address which should be subtracted from the real
3010 address when resolving a dtpoff relocation.
3011 This is PT_TLS segment p_vaddr. */
3013 static bfd_vma
3014 dtpoff_base (struct bfd_link_info *info)
3016 /* If tls_sec is NULL, we should have signalled an error already. */
3017 if (elf_hash_table (info)->tls_sec == NULL)
3018 return 0;
3019 return elf_hash_table (info)->tls_sec->vma;
3022 /* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3024 static bfd_vma
3025 tpoff (struct bfd_link_info *info, bfd_vma address)
3027 struct elf_link_hash_table *htab = elf_hash_table (info);
3029 /* If tls_sec is NULL, we should have signalled an error already. */
3030 if (htab->tls_sec == NULL)
3031 return 0;
3032 /* hppa TLS ABI is variant I and static TLS block start just after
3033 tcbhead structure which has 2 pointer fields. */
3034 return (address - htab->tls_sec->vma
3035 + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3038 /* Perform a final link. */
3040 static bool
3041 elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
3043 struct stat buf;
3045 /* Invoke the regular ELF linker to do all the work. */
3046 if (!bfd_elf_final_link (abfd, info))
3047 return false;
3049 /* If we're producing a final executable, sort the contents of the
3050 unwind section. */
3051 if (bfd_link_relocatable (info))
3052 return true;
3054 /* Do not attempt to sort non-regular files. This is here
3055 especially for configure scripts and kernel builds which run
3056 tests with "ld [...] -o /dev/null". */
3057 if (stat (bfd_get_filename (abfd), &buf) != 0
3058 || !S_ISREG(buf.st_mode))
3059 return true;
3061 return elf_hppa_sort_unwind (abfd);
3064 /* Record the lowest address for the data and text segments. */
3066 static void
3067 hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
3069 struct elf32_hppa_link_hash_table *htab;
3071 htab = (struct elf32_hppa_link_hash_table*) data;
3072 if (htab == NULL)
3073 return;
3075 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3077 bfd_vma value;
3078 Elf_Internal_Phdr *p;
3080 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3081 BFD_ASSERT (p != NULL);
3082 value = p->p_vaddr;
3084 if ((section->flags & SEC_READONLY) != 0)
3086 if (value < htab->text_segment_base)
3087 htab->text_segment_base = value;
3089 else
3091 if (value < htab->data_segment_base)
3092 htab->data_segment_base = value;
3097 /* Perform a relocation as part of a final link. */
3099 static bfd_reloc_status_type
3100 final_link_relocate (asection *input_section,
3101 bfd_byte *contents,
3102 const Elf_Internal_Rela *rela,
3103 bfd_vma value,
3104 struct elf32_hppa_link_hash_table *htab,
3105 asection *sym_sec,
3106 struct elf32_hppa_link_hash_entry *hh,
3107 struct bfd_link_info *info)
3109 unsigned int insn;
3110 unsigned int r_type = ELF32_R_TYPE (rela->r_info);
3111 unsigned int orig_r_type = r_type;
3112 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3113 int r_format;
3114 enum hppa_reloc_field_selector_type_alt r_field;
3115 bfd *input_bfd = input_section->owner;
3116 bfd_vma offset = rela->r_offset;
3117 bfd_vma max_branch_offset = 0;
3118 bfd_byte *hit_data = contents + offset;
3119 bfd_signed_vma addend = rela->r_addend;
3120 bfd_vma location;
3121 struct elf32_hppa_stub_hash_entry *hsh = NULL;
3122 int val;
3124 if (r_type == R_PARISC_NONE)
3125 return bfd_reloc_ok;
3127 insn = bfd_get_32 (input_bfd, hit_data);
3129 /* Find out where we are and where we're going. */
3130 location = (offset +
3131 input_section->output_offset +
3132 input_section->output_section->vma);
3134 /* If we are not building a shared library, convert DLTIND relocs to
3135 DPREL relocs. */
3136 if (!bfd_link_pic (info))
3138 switch (r_type)
3140 case R_PARISC_DLTIND21L:
3141 case R_PARISC_TLS_GD21L:
3142 case R_PARISC_TLS_LDM21L:
3143 case R_PARISC_TLS_IE21L:
3144 r_type = R_PARISC_DPREL21L;
3145 break;
3147 case R_PARISC_DLTIND14R:
3148 case R_PARISC_TLS_GD14R:
3149 case R_PARISC_TLS_LDM14R:
3150 case R_PARISC_TLS_IE14R:
3151 r_type = R_PARISC_DPREL14R;
3152 break;
3154 case R_PARISC_DLTIND14F:
3155 r_type = R_PARISC_DPREL14F;
3156 break;
3160 switch (r_type)
3162 case R_PARISC_PCREL12F:
3163 case R_PARISC_PCREL17F:
3164 case R_PARISC_PCREL22F:
3165 /* If this call should go via the plt, find the import stub in
3166 the stub hash. */
3167 if (sym_sec == NULL
3168 || sym_sec->output_section == NULL
3169 || (hh != NULL
3170 && hh->eh.plt.offset != (bfd_vma) -1
3171 && hh->eh.dynindx != -1
3172 && !hh->plabel
3173 && (bfd_link_pic (info)
3174 || !hh->eh.def_regular
3175 || hh->eh.root.type == bfd_link_hash_defweak)))
3177 hsh = hppa_get_stub_entry (input_section, sym_sec,
3178 hh, rela, htab);
3179 if (hsh != NULL)
3181 value = (hsh->stub_offset
3182 + hsh->stub_sec->output_offset
3183 + hsh->stub_sec->output_section->vma);
3184 addend = 0;
3186 else if (sym_sec == NULL && hh != NULL
3187 && hh->eh.root.type == bfd_link_hash_undefweak)
3189 /* It's OK if undefined weak. Calls to undefined weak
3190 symbols behave as if the "called" function
3191 immediately returns. We can thus call to a weak
3192 function without first checking whether the function
3193 is defined. */
3194 value = location;
3195 addend = 8;
3197 else
3198 return bfd_reloc_undefined;
3200 /* Fall thru. */
3202 case R_PARISC_PCREL21L:
3203 case R_PARISC_PCREL17C:
3204 case R_PARISC_PCREL17R:
3205 case R_PARISC_PCREL14R:
3206 case R_PARISC_PCREL14F:
3207 case R_PARISC_PCREL32:
3208 /* Make it a pc relative offset. */
3209 value -= location;
3210 addend -= 8;
3211 break;
3213 case R_PARISC_DPREL21L:
3214 case R_PARISC_DPREL14R:
3215 case R_PARISC_DPREL14F:
3216 /* Convert instructions that use the linkage table pointer (r19) to
3217 instructions that use the global data pointer (dp). This is the
3218 most efficient way of using PIC code in an incomplete executable,
3219 but the user must follow the standard runtime conventions for
3220 accessing data for this to work. */
3221 if (orig_r_type != r_type)
3223 if (r_type == R_PARISC_DPREL21L)
3225 /* GCC sometimes uses a register other than r19 for the
3226 operation, so we must convert any addil instruction
3227 that uses this relocation. */
3228 if ((insn & 0xfc000000) == OP_ADDIL << 26)
3229 insn = ADDIL_DP;
3230 else
3231 /* We must have a ldil instruction. It's too hard to find
3232 and convert the associated add instruction, so issue an
3233 error. */
3234 _bfd_error_handler
3235 /* xgettext:c-format */
3236 (_("%pB(%pA+%#" PRIx64 "): %s fixup for insn %#x "
3237 "is not supported in a non-shared link"),
3238 input_bfd,
3239 input_section,
3240 (uint64_t) offset,
3241 howto->name,
3242 insn);
3244 else if (r_type == R_PARISC_DPREL14F)
3246 /* This must be a format 1 load/store. Change the base
3247 register to dp. */
3248 insn = (insn & 0xfc1ffff) | (27 << 21);
3252 /* For all the DP relative relocations, we need to examine the symbol's
3253 section. If it has no section or if it's a code section, then
3254 "data pointer relative" makes no sense. In that case we don't
3255 adjust the "value", and for 21 bit addil instructions, we change the
3256 source addend register from %dp to %r0. This situation commonly
3257 arises for undefined weak symbols and when a variable's "constness"
3258 is declared differently from the way the variable is defined. For
3259 instance: "extern int foo" with foo defined as "const int foo". */
3260 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
3262 if ((insn & ((0x3fu << 26) | (0x1f << 21)))
3263 == ((OP_ADDIL << 26) | (27 << 21)))
3265 insn &= ~ (0x1f << 21);
3267 /* Now try to make things easy for the dynamic linker. */
3269 break;
3271 /* Fall thru. */
3273 case R_PARISC_DLTIND21L:
3274 case R_PARISC_DLTIND14R:
3275 case R_PARISC_DLTIND14F:
3276 case R_PARISC_TLS_GD21L:
3277 case R_PARISC_TLS_LDM21L:
3278 case R_PARISC_TLS_IE21L:
3279 case R_PARISC_TLS_GD14R:
3280 case R_PARISC_TLS_LDM14R:
3281 case R_PARISC_TLS_IE14R:
3282 value -= elf_gp (input_section->output_section->owner);
3283 break;
3285 case R_PARISC_SEGREL32:
3286 if ((sym_sec->flags & SEC_CODE) != 0)
3287 value -= htab->text_segment_base;
3288 else
3289 value -= htab->data_segment_base;
3290 break;
3292 default:
3293 break;
3296 switch (r_type)
3298 case R_PARISC_DIR32:
3299 case R_PARISC_DIR14F:
3300 case R_PARISC_DIR17F:
3301 case R_PARISC_PCREL17C:
3302 case R_PARISC_PCREL14F:
3303 case R_PARISC_PCREL32:
3304 case R_PARISC_DPREL14F:
3305 case R_PARISC_PLABEL32:
3306 case R_PARISC_DLTIND14F:
3307 case R_PARISC_SEGBASE:
3308 case R_PARISC_SEGREL32:
3309 case R_PARISC_TLS_DTPMOD32:
3310 case R_PARISC_TLS_DTPOFF32:
3311 case R_PARISC_TLS_TPREL32:
3312 r_field = e_fsel;
3313 break;
3315 case R_PARISC_DLTIND21L:
3316 case R_PARISC_PCREL21L:
3317 case R_PARISC_PLABEL21L:
3318 r_field = e_lsel;
3319 break;
3321 case R_PARISC_DIR21L:
3322 case R_PARISC_DPREL21L:
3323 case R_PARISC_TLS_GD21L:
3324 case R_PARISC_TLS_LDM21L:
3325 case R_PARISC_TLS_LDO21L:
3326 case R_PARISC_TLS_IE21L:
3327 case R_PARISC_TLS_LE21L:
3328 r_field = e_lrsel;
3329 break;
3331 case R_PARISC_PCREL17R:
3332 case R_PARISC_PCREL14R:
3333 case R_PARISC_PLABEL14R:
3334 case R_PARISC_DLTIND14R:
3335 r_field = e_rsel;
3336 break;
3338 case R_PARISC_DIR17R:
3339 case R_PARISC_DIR14R:
3340 case R_PARISC_DPREL14R:
3341 case R_PARISC_TLS_GD14R:
3342 case R_PARISC_TLS_LDM14R:
3343 case R_PARISC_TLS_LDO14R:
3344 case R_PARISC_TLS_IE14R:
3345 case R_PARISC_TLS_LE14R:
3346 r_field = e_rrsel;
3347 break;
3349 case R_PARISC_PCREL12F:
3350 case R_PARISC_PCREL17F:
3351 case R_PARISC_PCREL22F:
3352 r_field = e_fsel;
3354 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3356 max_branch_offset = (1 << (17-1)) << 2;
3358 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3360 max_branch_offset = (1 << (12-1)) << 2;
3362 else
3364 max_branch_offset = (1 << (22-1)) << 2;
3367 /* sym_sec is NULL on undefined weak syms or when shared on
3368 undefined syms. We've already checked for a stub for the
3369 shared undefined case. */
3370 if (sym_sec == NULL)
3371 break;
3373 /* If the branch is out of reach, then redirect the
3374 call to the local stub for this function. */
3375 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3377 hsh = hppa_get_stub_entry (input_section, sym_sec,
3378 hh, rela, htab);
3379 if (hsh == NULL)
3380 return bfd_reloc_undefined;
3382 /* Munge up the value and addend so that we call the stub
3383 rather than the procedure directly. */
3384 value = (hsh->stub_offset
3385 + hsh->stub_sec->output_offset
3386 + hsh->stub_sec->output_section->vma
3387 - location);
3388 addend = -8;
3390 break;
3392 /* Something we don't know how to handle. */
3393 default:
3394 return bfd_reloc_notsupported;
3397 /* Make sure we can reach the stub. */
3398 if (max_branch_offset != 0
3399 && value + addend + max_branch_offset >= 2*max_branch_offset)
3401 _bfd_error_handler
3402 /* xgettext:c-format */
3403 (_("%pB(%pA+%#" PRIx64 "): cannot reach %s, "
3404 "recompile with -ffunction-sections"),
3405 input_bfd,
3406 input_section,
3407 (uint64_t) offset,
3408 hsh->bh_root.string);
3409 bfd_set_error (bfd_error_bad_value);
3410 return bfd_reloc_notsupported;
3413 val = hppa_field_adjust (value, addend, r_field);
3415 switch (r_type)
3417 case R_PARISC_PCREL12F:
3418 case R_PARISC_PCREL17C:
3419 case R_PARISC_PCREL17F:
3420 case R_PARISC_PCREL17R:
3421 case R_PARISC_PCREL22F:
3422 case R_PARISC_DIR17F:
3423 case R_PARISC_DIR17R:
3424 /* This is a branch. Divide the offset by four.
3425 Note that we need to decide whether it's a branch or
3426 otherwise by inspecting the reloc. Inspecting insn won't
3427 work as insn might be from a .word directive. */
3428 val >>= 2;
3429 break;
3431 default:
3432 break;
3435 r_format = bfd_hppa_insn2fmt (input_bfd, insn);
3436 switch (r_format)
3438 case 10:
3439 case -10:
3440 if (val & 7)
3442 _bfd_error_handler
3443 /* xgettext:c-format */
3444 (_("%pB(%pA+%#" PRIx64 "): displacement %#x for insn %#x "
3445 "is not a multiple of 8 (gp %#x)"),
3446 input_bfd,
3447 input_section,
3448 (uint64_t) offset,
3449 val,
3450 insn,
3451 (unsigned int) elf_gp (input_section->output_section->owner));
3452 bfd_set_error (bfd_error_bad_value);
3453 return bfd_reloc_notsupported;
3455 break;
3457 case -11:
3458 case -16:
3459 if (val & 3)
3461 _bfd_error_handler
3462 /* xgettext:c-format */
3463 (_("%pB(%pA+%#" PRIx64 "): displacement %#x for insn %#x "
3464 "is not a multiple of 4 (gp %#x)"),
3465 input_bfd,
3466 input_section,
3467 (uint64_t) offset,
3468 val,
3469 insn,
3470 (unsigned int) elf_gp (input_section->output_section->owner));
3471 bfd_set_error (bfd_error_bad_value);
3472 return bfd_reloc_notsupported;
3474 break;
3476 default:
3477 break;
3479 insn = hppa_rebuild_insn (insn, val, r_format);
3481 /* Update the instruction word. */
3482 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
3483 return bfd_reloc_ok;
3486 /* Relocate an HPPA ELF section. */
3488 static int
3489 elf32_hppa_relocate_section (bfd *output_bfd,
3490 struct bfd_link_info *info,
3491 bfd *input_bfd,
3492 asection *input_section,
3493 bfd_byte *contents,
3494 Elf_Internal_Rela *relocs,
3495 Elf_Internal_Sym *local_syms,
3496 asection **local_sections)
3498 bfd_vma *local_got_offsets;
3499 struct elf32_hppa_link_hash_table *htab;
3500 Elf_Internal_Shdr *symtab_hdr;
3501 Elf_Internal_Rela *rela;
3502 Elf_Internal_Rela *relend;
3504 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3506 htab = hppa_link_hash_table (info);
3507 if (htab == NULL)
3508 return false;
3510 local_got_offsets = elf_local_got_offsets (input_bfd);
3512 rela = relocs;
3513 relend = relocs + input_section->reloc_count;
3514 for (; rela < relend; rela++)
3516 unsigned int r_type;
3517 reloc_howto_type *howto;
3518 unsigned int r_symndx;
3519 struct elf32_hppa_link_hash_entry *hh;
3520 Elf_Internal_Sym *sym;
3521 asection *sym_sec;
3522 bfd_vma relocation;
3523 bfd_reloc_status_type rstatus;
3524 const char *sym_name;
3525 bool plabel;
3526 bool warned_undef;
3528 r_type = ELF32_R_TYPE (rela->r_info);
3529 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3531 bfd_set_error (bfd_error_bad_value);
3532 return false;
3534 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3535 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3536 continue;
3538 r_symndx = ELF32_R_SYM (rela->r_info);
3539 hh = NULL;
3540 sym = NULL;
3541 sym_sec = NULL;
3542 warned_undef = false;
3543 if (r_symndx < symtab_hdr->sh_info)
3545 /* This is a local symbol, h defaults to NULL. */
3546 sym = local_syms + r_symndx;
3547 sym_sec = local_sections[r_symndx];
3548 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
3550 else
3552 struct elf_link_hash_entry *eh;
3553 bool unresolved_reloc, ignored;
3554 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
3556 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
3557 r_symndx, symtab_hdr, sym_hashes,
3558 eh, sym_sec, relocation,
3559 unresolved_reloc, warned_undef,
3560 ignored);
3562 if (!bfd_link_relocatable (info)
3563 && relocation == 0
3564 && eh->root.type != bfd_link_hash_defined
3565 && eh->root.type != bfd_link_hash_defweak
3566 && eh->root.type != bfd_link_hash_undefweak)
3568 if (info->unresolved_syms_in_objects == RM_IGNORE
3569 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3570 && eh->type == STT_PARISC_MILLI)
3572 (*info->callbacks->undefined_symbol)
3573 (info, eh_name (eh), input_bfd,
3574 input_section, rela->r_offset, false);
3575 warned_undef = true;
3578 hh = hppa_elf_hash_entry (eh);
3581 if (sym_sec != NULL && discarded_section (sym_sec))
3582 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
3583 rela, 1, relend,
3584 elf_hppa_howto_table + r_type, 0,
3585 contents);
3587 if (bfd_link_relocatable (info))
3588 continue;
3590 /* Do any required modifications to the relocation value, and
3591 determine what types of dynamic info we need to output, if
3592 any. */
3593 plabel = 0;
3594 switch (r_type)
3596 case R_PARISC_DLTIND14F:
3597 case R_PARISC_DLTIND14R:
3598 case R_PARISC_DLTIND21L:
3600 bfd_vma off;
3601 bool do_got = false;
3602 bool reloc = bfd_link_pic (info);
3604 /* Relocation is to the entry for this symbol in the
3605 global offset table. */
3606 if (hh != NULL)
3608 bool dyn;
3610 off = hh->eh.got.offset;
3611 dyn = htab->etab.dynamic_sections_created;
3612 reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3613 && (reloc
3614 || (hh->eh.dynindx != -1
3615 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3616 if (!reloc
3617 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3618 bfd_link_pic (info),
3619 &hh->eh))
3621 /* If we aren't going to call finish_dynamic_symbol,
3622 then we need to handle initialisation of the .got
3623 entry and create needed relocs here. Since the
3624 offset must always be a multiple of 4, we use the
3625 least significant bit to record whether we have
3626 initialised it already. */
3627 if ((off & 1) != 0)
3628 off &= ~1;
3629 else
3631 hh->eh.got.offset |= 1;
3632 do_got = true;
3636 else
3638 /* Local symbol case. */
3639 if (local_got_offsets == NULL)
3640 abort ();
3642 off = local_got_offsets[r_symndx];
3644 /* The offset must always be a multiple of 4. We use
3645 the least significant bit to record whether we have
3646 already generated the necessary reloc. */
3647 if ((off & 1) != 0)
3648 off &= ~1;
3649 else
3651 local_got_offsets[r_symndx] |= 1;
3652 do_got = true;
3656 if (do_got)
3658 if (reloc)
3660 /* Output a dynamic relocation for this GOT entry.
3661 In this case it is relative to the base of the
3662 object because the symbol index is zero. */
3663 Elf_Internal_Rela outrel;
3664 bfd_byte *loc;
3665 asection *sec = htab->etab.srelgot;
3667 outrel.r_offset = (off
3668 + htab->etab.sgot->output_offset
3669 + htab->etab.sgot->output_section->vma);
3670 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3671 outrel.r_addend = relocation;
3672 loc = sec->contents;
3673 loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
3674 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3676 else
3677 bfd_put_32 (output_bfd, relocation,
3678 htab->etab.sgot->contents + off);
3681 if (off >= (bfd_vma) -2)
3682 abort ();
3684 /* Add the base of the GOT to the relocation value. */
3685 relocation = (off
3686 + htab->etab.sgot->output_offset
3687 + htab->etab.sgot->output_section->vma);
3689 break;
3691 case R_PARISC_SEGREL32:
3692 /* If this is the first SEGREL relocation, then initialize
3693 the segment base values. */
3694 if (htab->text_segment_base == (bfd_vma) -1)
3695 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
3696 break;
3698 case R_PARISC_PLABEL14R:
3699 case R_PARISC_PLABEL21L:
3700 case R_PARISC_PLABEL32:
3701 if (htab->etab.dynamic_sections_created)
3703 bfd_vma off;
3704 bool do_plt = 0;
3705 /* If we have a global symbol with a PLT slot, then
3706 redirect this relocation to it. */
3707 if (hh != NULL)
3709 off = hh->eh.plt.offset;
3710 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3711 bfd_link_pic (info),
3712 &hh->eh))
3714 /* In a non-shared link, adjust_dynamic_symbol
3715 isn't called for symbols forced local. We
3716 need to write out the plt entry here. */
3717 if ((off & 1) != 0)
3718 off &= ~1;
3719 else
3721 hh->eh.plt.offset |= 1;
3722 do_plt = 1;
3726 else
3728 bfd_vma *local_plt_offsets;
3730 if (local_got_offsets == NULL)
3731 abort ();
3733 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3734 off = local_plt_offsets[r_symndx];
3736 /* As for the local .got entry case, we use the last
3737 bit to record whether we've already initialised
3738 this local .plt entry. */
3739 if ((off & 1) != 0)
3740 off &= ~1;
3741 else
3743 local_plt_offsets[r_symndx] |= 1;
3744 do_plt = 1;
3748 if (do_plt)
3750 if (bfd_link_pic (info))
3752 /* Output a dynamic IPLT relocation for this
3753 PLT entry. */
3754 Elf_Internal_Rela outrel;
3755 bfd_byte *loc;
3756 asection *s = htab->etab.srelplt;
3758 outrel.r_offset = (off
3759 + htab->etab.splt->output_offset
3760 + htab->etab.splt->output_section->vma);
3761 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3762 outrel.r_addend = relocation;
3763 loc = s->contents;
3764 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
3765 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3767 else
3769 bfd_put_32 (output_bfd,
3770 relocation,
3771 htab->etab.splt->contents + off);
3772 bfd_put_32 (output_bfd,
3773 elf_gp (htab->etab.splt->output_section->owner),
3774 htab->etab.splt->contents + off + 4);
3778 if (off >= (bfd_vma) -2)
3779 abort ();
3781 /* PLABELs contain function pointers. Relocation is to
3782 the entry for the function in the .plt. The magic +2
3783 offset signals to $$dyncall that the function pointer
3784 is in the .plt and thus has a gp pointer too.
3785 Exception: Undefined PLABELs should have a value of
3786 zero. */
3787 if (hh == NULL
3788 || (hh->eh.root.type != bfd_link_hash_undefweak
3789 && hh->eh.root.type != bfd_link_hash_undefined))
3791 relocation = (off
3792 + htab->etab.splt->output_offset
3793 + htab->etab.splt->output_section->vma
3794 + 2);
3796 plabel = 1;
3798 /* Fall through. */
3800 case R_PARISC_DIR17F:
3801 case R_PARISC_DIR17R:
3802 case R_PARISC_DIR14F:
3803 case R_PARISC_DIR14R:
3804 case R_PARISC_DIR21L:
3805 case R_PARISC_DPREL14F:
3806 case R_PARISC_DPREL14R:
3807 case R_PARISC_DPREL21L:
3808 case R_PARISC_DIR32:
3809 if ((input_section->flags & SEC_ALLOC) == 0)
3810 break;
3812 if (bfd_link_pic (info)
3813 ? ((hh == NULL
3814 || hh->eh.dyn_relocs != NULL)
3815 && ((hh != NULL && pc_dynrelocs (hh))
3816 || IS_ABSOLUTE_RELOC (r_type)))
3817 : (hh != NULL
3818 && hh->eh.dyn_relocs != NULL))
3820 Elf_Internal_Rela outrel;
3821 bool skip;
3822 asection *sreloc;
3823 bfd_byte *loc;
3825 /* When generating a shared object, these relocations
3826 are copied into the output file to be resolved at run
3827 time. */
3829 outrel.r_addend = rela->r_addend;
3830 outrel.r_offset =
3831 _bfd_elf_section_offset (output_bfd, info, input_section,
3832 rela->r_offset);
3833 skip = (outrel.r_offset == (bfd_vma) -1
3834 || outrel.r_offset == (bfd_vma) -2);
3835 outrel.r_offset += (input_section->output_offset
3836 + input_section->output_section->vma);
3838 if (skip)
3840 memset (&outrel, 0, sizeof (outrel));
3842 else if (hh != NULL
3843 && hh->eh.dynindx != -1
3844 && (plabel
3845 || !IS_ABSOLUTE_RELOC (r_type)
3846 || !bfd_link_pic (info)
3847 || !SYMBOLIC_BIND (info, &hh->eh)
3848 || !hh->eh.def_regular))
3850 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
3852 else /* It's a local symbol, or one marked to become local. */
3854 int indx = 0;
3856 /* Add the absolute offset of the symbol. */
3857 outrel.r_addend += relocation;
3859 /* Global plabels need to be processed by the
3860 dynamic linker so that functions have at most one
3861 fptr. For this reason, we need to differentiate
3862 between global and local plabels, which we do by
3863 providing the function symbol for a global plabel
3864 reloc, and no symbol for local plabels. */
3865 if (! plabel
3866 && sym_sec != NULL
3867 && sym_sec->output_section != NULL
3868 && ! bfd_is_abs_section (sym_sec))
3870 asection *osec;
3872 osec = sym_sec->output_section;
3873 indx = elf_section_data (osec)->dynindx;
3874 if (indx == 0)
3876 osec = htab->etab.text_index_section;
3877 indx = elf_section_data (osec)->dynindx;
3879 BFD_ASSERT (indx != 0);
3881 /* We are turning this relocation into one
3882 against a section symbol, so subtract out the
3883 output section's address but not the offset
3884 of the input section in the output section. */
3885 outrel.r_addend -= osec->vma;
3888 outrel.r_info = ELF32_R_INFO (indx, r_type);
3890 sreloc = elf_section_data (input_section)->sreloc;
3891 if (sreloc == NULL)
3892 abort ();
3894 loc = sreloc->contents;
3895 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3896 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3898 break;
3900 case R_PARISC_TLS_LDM21L:
3901 case R_PARISC_TLS_LDM14R:
3903 bfd_vma off;
3905 off = htab->tls_ldm_got.offset;
3906 if (off & 1)
3907 off &= ~1;
3908 else
3910 Elf_Internal_Rela outrel;
3911 bfd_byte *loc;
3913 outrel.r_offset = (off
3914 + htab->etab.sgot->output_section->vma
3915 + htab->etab.sgot->output_offset);
3916 outrel.r_addend = 0;
3917 outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
3918 loc = htab->etab.srelgot->contents;
3919 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3921 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3922 htab->tls_ldm_got.offset |= 1;
3925 /* Add the base of the GOT to the relocation value. */
3926 relocation = (off
3927 + htab->etab.sgot->output_offset
3928 + htab->etab.sgot->output_section->vma);
3930 break;
3933 case R_PARISC_TLS_LDO21L:
3934 case R_PARISC_TLS_LDO14R:
3935 relocation -= dtpoff_base (info);
3936 break;
3938 case R_PARISC_TLS_GD21L:
3939 case R_PARISC_TLS_GD14R:
3940 case R_PARISC_TLS_IE21L:
3941 case R_PARISC_TLS_IE14R:
3943 bfd_vma off;
3944 int indx;
3945 char tls_type;
3947 indx = 0;
3948 if (hh != NULL)
3950 if (!htab->etab.dynamic_sections_created
3951 || hh->eh.dynindx == -1
3952 || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
3953 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
3954 /* This is actually a static link, or it is a
3955 -Bsymbolic link and the symbol is defined
3956 locally, or the symbol was forced to be local
3957 because of a version file. */
3959 else
3960 indx = hh->eh.dynindx;
3961 off = hh->eh.got.offset;
3962 tls_type = hh->tls_type;
3964 else
3966 off = local_got_offsets[r_symndx];
3967 tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
3970 if (tls_type == GOT_UNKNOWN)
3971 abort ();
3973 if ((off & 1) != 0)
3974 off &= ~1;
3975 else
3977 bool need_relocs = false;
3978 Elf_Internal_Rela outrel;
3979 bfd_byte *loc = NULL;
3980 int cur_off = off;
3982 /* The GOT entries have not been initialized yet. Do it
3983 now, and emit any relocations. If both an IE GOT and a
3984 GD GOT are necessary, we emit the GD first. */
3986 if (indx != 0
3987 || (bfd_link_dll (info)
3988 && (hh == NULL
3989 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
3991 need_relocs = true;
3992 loc = htab->etab.srelgot->contents;
3993 loc += (htab->etab.srelgot->reloc_count
3994 * sizeof (Elf32_External_Rela));
3997 if (tls_type & GOT_TLS_GD)
3999 if (need_relocs)
4001 outrel.r_offset
4002 = (cur_off
4003 + htab->etab.sgot->output_section->vma
4004 + htab->etab.sgot->output_offset);
4005 outrel.r_info
4006 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
4007 outrel.r_addend = 0;
4008 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4009 htab->etab.srelgot->reloc_count++;
4010 loc += sizeof (Elf32_External_Rela);
4011 bfd_put_32 (output_bfd, 0,
4012 htab->etab.sgot->contents + cur_off);
4014 else
4015 /* If we are not emitting relocations for a
4016 general dynamic reference, then we must be in a
4017 static link or an executable link with the
4018 symbol binding locally. Mark it as belonging
4019 to module 1, the executable. */
4020 bfd_put_32 (output_bfd, 1,
4021 htab->etab.sgot->contents + cur_off);
4023 if (indx != 0)
4025 outrel.r_info
4026 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
4027 outrel.r_offset += 4;
4028 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4029 htab->etab.srelgot->reloc_count++;
4030 loc += sizeof (Elf32_External_Rela);
4031 bfd_put_32 (output_bfd, 0,
4032 htab->etab.sgot->contents + cur_off + 4);
4034 else
4035 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
4036 htab->etab.sgot->contents + cur_off + 4);
4037 cur_off += 8;
4040 if (tls_type & GOT_TLS_IE)
4042 if (need_relocs
4043 && !(bfd_link_executable (info)
4044 && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
4046 outrel.r_offset
4047 = (cur_off
4048 + htab->etab.sgot->output_section->vma
4049 + htab->etab.sgot->output_offset);
4050 outrel.r_info = ELF32_R_INFO (indx,
4051 R_PARISC_TLS_TPREL32);
4052 if (indx == 0)
4053 outrel.r_addend = relocation - dtpoff_base (info);
4054 else
4055 outrel.r_addend = 0;
4056 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4057 htab->etab.srelgot->reloc_count++;
4058 loc += sizeof (Elf32_External_Rela);
4060 else
4061 bfd_put_32 (output_bfd, tpoff (info, relocation),
4062 htab->etab.sgot->contents + cur_off);
4063 cur_off += 4;
4066 if (hh != NULL)
4067 hh->eh.got.offset |= 1;
4068 else
4069 local_got_offsets[r_symndx] |= 1;
4072 if ((tls_type & GOT_NORMAL) != 0
4073 && (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4075 if (hh != NULL)
4076 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4077 hh_name (hh));
4078 else
4080 Elf_Internal_Sym *isym
4081 = bfd_sym_from_r_symndx (&htab->etab.sym_cache,
4082 input_bfd, r_symndx);
4083 if (isym == NULL)
4084 return false;
4085 sym_name
4086 = bfd_elf_string_from_elf_section (input_bfd,
4087 symtab_hdr->sh_link,
4088 isym->st_name);
4089 if (sym_name == NULL)
4090 return false;
4091 if (*sym_name == '\0')
4092 sym_name = bfd_section_name (sym_sec);
4093 _bfd_error_handler
4094 (_("%pB:%s has both normal and TLS relocs"),
4095 input_bfd, sym_name);
4097 bfd_set_error (bfd_error_bad_value);
4098 return false;
4101 if ((tls_type & GOT_TLS_GD)
4102 && r_type != R_PARISC_TLS_GD21L
4103 && r_type != R_PARISC_TLS_GD14R)
4104 off += 2 * GOT_ENTRY_SIZE;
4106 /* Add the base of the GOT to the relocation value. */
4107 relocation = (off
4108 + htab->etab.sgot->output_offset
4109 + htab->etab.sgot->output_section->vma);
4111 break;
4114 case R_PARISC_TLS_LE21L:
4115 case R_PARISC_TLS_LE14R:
4117 relocation = tpoff (info, relocation);
4118 break;
4120 break;
4122 default:
4123 break;
4126 rstatus = final_link_relocate (input_section, contents, rela, relocation,
4127 htab, sym_sec, hh, info);
4129 if (rstatus == bfd_reloc_ok)
4130 continue;
4132 if (hh != NULL)
4133 sym_name = hh_name (hh);
4134 else
4136 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4137 symtab_hdr->sh_link,
4138 sym->st_name);
4139 if (sym_name == NULL)
4140 return false;
4141 if (*sym_name == '\0')
4142 sym_name = bfd_section_name (sym_sec);
4145 howto = elf_hppa_howto_table + r_type;
4147 if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
4149 if (rstatus == bfd_reloc_notsupported || !warned_undef)
4151 _bfd_error_handler
4152 /* xgettext:c-format */
4153 (_("%pB(%pA+%#" PRIx64 "): cannot handle %s for %s"),
4154 input_bfd,
4155 input_section,
4156 (uint64_t) rela->r_offset,
4157 howto->name,
4158 sym_name);
4159 bfd_set_error (bfd_error_bad_value);
4160 return false;
4163 else
4164 (*info->callbacks->reloc_overflow)
4165 (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4166 (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
4169 return true;
4172 /* Finish up dynamic symbol handling. We set the contents of various
4173 dynamic sections here. */
4175 static bool
4176 elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4177 struct bfd_link_info *info,
4178 struct elf_link_hash_entry *eh,
4179 Elf_Internal_Sym *sym)
4181 struct elf32_hppa_link_hash_table *htab;
4182 Elf_Internal_Rela rela;
4183 bfd_byte *loc;
4185 htab = hppa_link_hash_table (info);
4187 if (eh->plt.offset != (bfd_vma) -1)
4189 bfd_vma value;
4191 if (eh->plt.offset & 1)
4192 abort ();
4194 /* This symbol has an entry in the procedure linkage table. Set
4195 it up.
4197 The format of a plt entry is
4198 <funcaddr>
4199 <__gp>
4201 value = 0;
4202 if (eh->root.type == bfd_link_hash_defined
4203 || eh->root.type == bfd_link_hash_defweak)
4205 value = eh->root.u.def.value;
4206 if (eh->root.u.def.section->output_section != NULL)
4207 value += (eh->root.u.def.section->output_offset
4208 + eh->root.u.def.section->output_section->vma);
4211 /* Create a dynamic IPLT relocation for this entry. */
4212 rela.r_offset = (eh->plt.offset
4213 + htab->etab.splt->output_offset
4214 + htab->etab.splt->output_section->vma);
4215 if (eh->dynindx != -1)
4217 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4218 rela.r_addend = 0;
4220 else
4222 /* This symbol has been marked to become local, and is
4223 used by a plabel so must be kept in the .plt. */
4224 rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4225 rela.r_addend = value;
4228 loc = htab->etab.srelplt->contents;
4229 loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4230 bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
4232 if (!eh->def_regular)
4234 /* Mark the symbol as undefined, rather than as defined in
4235 the .plt section. Leave the value alone. */
4236 sym->st_shndx = SHN_UNDEF;
4240 if (eh->got.offset != (bfd_vma) -1
4241 && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
4242 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
4244 bool is_dyn = (eh->dynindx != -1
4245 && !SYMBOL_REFERENCES_LOCAL (info, eh));
4247 if (is_dyn || bfd_link_pic (info))
4249 /* This symbol has an entry in the global offset table. Set
4250 it up. */
4252 rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4253 + htab->etab.sgot->output_offset
4254 + htab->etab.sgot->output_section->vma);
4256 /* If this is a -Bsymbolic link and the symbol is defined
4257 locally or was forced to be local because of a version
4258 file, we just want to emit a RELATIVE reloc. The entry
4259 in the global offset table will already have been
4260 initialized in the relocate_section function. */
4261 if (!is_dyn
4262 && (eh->root.type == bfd_link_hash_defined
4263 || eh->root.type == bfd_link_hash_defweak))
4265 rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4266 rela.r_addend = (eh->root.u.def.value
4267 + eh->root.u.def.section->output_offset
4268 + eh->root.u.def.section->output_section->vma);
4270 else
4272 if ((eh->got.offset & 1) != 0)
4273 abort ();
4275 bfd_put_32 (output_bfd, 0,
4276 htab->etab.sgot->contents + (eh->got.offset & ~1));
4277 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4278 rela.r_addend = 0;
4281 loc = htab->etab.srelgot->contents;
4282 loc += (htab->etab.srelgot->reloc_count++
4283 * sizeof (Elf32_External_Rela));
4284 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4288 if (eh->needs_copy)
4290 asection *sec;
4292 /* This symbol needs a copy reloc. Set it up. */
4294 if (! (eh->dynindx != -1
4295 && (eh->root.type == bfd_link_hash_defined
4296 || eh->root.type == bfd_link_hash_defweak)))
4297 abort ();
4299 rela.r_offset = (eh->root.u.def.value
4300 + eh->root.u.def.section->output_offset
4301 + eh->root.u.def.section->output_section->vma);
4302 rela.r_addend = 0;
4303 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
4304 if (eh->root.u.def.section == htab->etab.sdynrelro)
4305 sec = htab->etab.sreldynrelro;
4306 else
4307 sec = htab->etab.srelbss;
4308 loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4309 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4312 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4313 if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
4315 sym->st_shndx = SHN_ABS;
4318 return true;
4321 /* Used to decide how to sort relocs in an optimal manner for the
4322 dynamic linker, before writing them out. */
4324 static enum elf_reloc_type_class
4325 elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4326 const asection *rel_sec ATTRIBUTE_UNUSED,
4327 const Elf_Internal_Rela *rela)
4329 /* Handle TLS relocs first; we don't want them to be marked
4330 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
4331 check below. */
4332 switch ((int) ELF32_R_TYPE (rela->r_info))
4334 case R_PARISC_TLS_DTPMOD32:
4335 case R_PARISC_TLS_DTPOFF32:
4336 case R_PARISC_TLS_TPREL32:
4337 return reloc_class_normal;
4340 if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
4341 return reloc_class_relative;
4343 switch ((int) ELF32_R_TYPE (rela->r_info))
4345 case R_PARISC_IPLT:
4346 return reloc_class_plt;
4347 case R_PARISC_COPY:
4348 return reloc_class_copy;
4349 default:
4350 return reloc_class_normal;
4354 /* Finish up the dynamic sections. */
4356 static bool
4357 elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4358 struct bfd_link_info *info)
4360 bfd *dynobj;
4361 struct elf32_hppa_link_hash_table *htab;
4362 asection *sdyn;
4363 asection * sgot;
4365 htab = hppa_link_hash_table (info);
4366 if (htab == NULL)
4367 return false;
4369 dynobj = htab->etab.dynobj;
4371 sgot = htab->etab.sgot;
4372 /* A broken linker script might have discarded the dynamic sections.
4373 Catch this here so that we do not seg-fault later on. */
4374 if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4375 return false;
4377 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4379 if (htab->etab.dynamic_sections_created)
4381 Elf32_External_Dyn *dyncon, *dynconend;
4383 if (sdyn == NULL)
4384 abort ();
4386 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4387 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4388 for (; dyncon < dynconend; dyncon++)
4390 Elf_Internal_Dyn dyn;
4391 asection *s;
4393 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4395 switch (dyn.d_tag)
4397 default:
4398 continue;
4400 case DT_PLTGOT:
4401 /* Use PLTGOT to set the GOT register. */
4402 dyn.d_un.d_ptr = elf_gp (output_bfd);
4403 break;
4405 case DT_JMPREL:
4406 s = htab->etab.srelplt;
4407 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4408 break;
4410 case DT_PLTRELSZ:
4411 s = htab->etab.srelplt;
4412 dyn.d_un.d_val = s->size;
4413 break;
4416 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4420 if (sgot != NULL && sgot->size != 0)
4422 /* Fill in the first entry in the global offset table.
4423 We use it to point to our dynamic section, if we have one. */
4424 bfd_put_32 (output_bfd,
4425 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
4426 sgot->contents);
4428 /* The second entry is reserved for use by the dynamic linker. */
4429 memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
4431 /* Set .got entry size. */
4432 elf_section_data (sgot->output_section)
4433 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
4436 if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
4438 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4439 plt stubs and as such the section does not hold a table of fixed-size
4440 entries. */
4441 elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
4443 if (htab->need_plt_stub)
4445 /* Set up the .plt stub. */
4446 memcpy (htab->etab.splt->contents
4447 + htab->etab.splt->size - sizeof (plt_stub),
4448 plt_stub, sizeof (plt_stub));
4450 if ((htab->etab.splt->output_offset
4451 + htab->etab.splt->output_section->vma
4452 + htab->etab.splt->size)
4453 != (sgot->output_offset
4454 + sgot->output_section->vma))
4456 _bfd_error_handler
4457 (_(".got section not immediately after .plt section"));
4458 return false;
4463 return true;
4466 /* Called when writing out an object file to decide the type of a
4467 symbol. */
4468 static int
4469 elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
4471 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4472 return STT_PARISC_MILLI;
4473 else
4474 return type;
4477 /* Misc BFD support code. */
4478 #define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4479 #define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4480 #define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
4481 #define elf_info_to_howto elf_hppa_info_to_howto
4482 #define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
4484 /* Stuff for the BFD linker. */
4485 #define bfd_elf32_bfd_final_link elf32_hppa_final_link
4486 #define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4487 #define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
4488 #define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
4489 #define elf_backend_check_relocs elf32_hppa_check_relocs
4490 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4491 #define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4492 #define elf_backend_fake_sections elf_hppa_fake_sections
4493 #define elf_backend_relocate_section elf32_hppa_relocate_section
4494 #define elf_backend_hide_symbol elf32_hppa_hide_symbol
4495 #define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4496 #define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4497 #define elf_backend_late_size_sections elf32_hppa_late_size_sections
4498 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4499 #define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4500 #define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4501 #define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
4502 #define elf_backend_object_p elf32_hppa_object_p
4503 #define elf_backend_final_write_processing elf_hppa_final_write_processing
4504 #define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
4505 #define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
4506 #define elf_backend_action_discarded elf_hppa_action_discarded
4508 #define elf_backend_can_gc_sections 1
4509 #define elf_backend_can_refcount 1
4510 #define elf_backend_plt_alignment 2
4511 #define elf_backend_want_got_plt 0
4512 #define elf_backend_plt_readonly 0
4513 #define elf_backend_want_plt_sym 0
4514 #define elf_backend_got_header_size 8
4515 #define elf_backend_want_dynrelro 1
4516 #define elf_backend_rela_normal 1
4517 #define elf_backend_dtrel_excludes_plt 1
4518 #define elf_backend_no_page_alias 1
4520 #define TARGET_BIG_SYM hppa_elf32_vec
4521 #define TARGET_BIG_NAME "elf32-hppa"
4522 #define ELF_ARCH bfd_arch_hppa
4523 #define ELF_TARGET_ID HPPA32_ELF_DATA
4524 #define ELF_MACHINE_CODE EM_PARISC
4525 #define ELF_MAXPAGESIZE 0x1000
4526 #define ELF_OSABI ELFOSABI_HPUX
4527 #define elf32_bed elf32_hppa_hpux_bed
4529 #include "elf32-target.h"
4531 #undef TARGET_BIG_SYM
4532 #define TARGET_BIG_SYM hppa_elf32_linux_vec
4533 #undef TARGET_BIG_NAME
4534 #define TARGET_BIG_NAME "elf32-hppa-linux"
4535 #undef ELF_OSABI
4536 #define ELF_OSABI ELFOSABI_GNU
4537 #undef elf32_bed
4538 #define elf32_bed elf32_hppa_linux_bed
4540 #include "elf32-target.h"
4542 #undef TARGET_BIG_SYM
4543 #define TARGET_BIG_SYM hppa_elf32_nbsd_vec
4544 #undef TARGET_BIG_NAME
4545 #define TARGET_BIG_NAME "elf32-hppa-netbsd"
4546 #undef ELF_OSABI
4547 #define ELF_OSABI ELFOSABI_NETBSD
4548 #undef elf32_bed
4549 #define elf32_bed elf32_hppa_netbsd_bed
4551 #include "elf32-target.h"