daily update
[binutils.git] / bfd / elf64-hppa.c
blob957e61a000c9efab8ee7673e0b5fd95f83854649
1 /* Support for HPPA 64-bit ELF
2 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009,
3 2010 Free Software Foundation, Inc.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
22 #include "alloca-conf.h"
23 #include "sysdep.h"
24 #include "bfd.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/hppa.h"
28 #include "libhppa.h"
29 #include "elf64-hppa.h"
32 #define ARCH_SIZE 64
34 #define PLT_ENTRY_SIZE 0x10
35 #define DLT_ENTRY_SIZE 0x8
36 #define OPD_ENTRY_SIZE 0x20
38 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/pa20_64/dld.sl"
40 /* The stub is supposed to load the target address and target's DP
41 value out of the PLT, then do an external branch to the target
42 address.
44 LDD PLTOFF(%r27),%r1
45 BVE (%r1)
46 LDD PLTOFF+8(%r27),%r27
48 Note that we must use the LDD with a 14 bit displacement, not the one
49 with a 5 bit displacement. */
50 static char plt_stub[] = {0x53, 0x61, 0x00, 0x00, 0xe8, 0x20, 0xd0, 0x00,
51 0x53, 0x7b, 0x00, 0x00 };
53 struct elf64_hppa_link_hash_entry
55 struct elf_link_hash_entry eh;
57 /* Offsets for this symbol in various linker sections. */
58 bfd_vma dlt_offset;
59 bfd_vma plt_offset;
60 bfd_vma opd_offset;
61 bfd_vma stub_offset;
63 /* The index of the (possibly local) symbol in the input bfd and its
64 associated BFD. Needed so that we can have relocs against local
65 symbols in shared libraries. */
66 long sym_indx;
67 bfd *owner;
69 /* Dynamic symbols may need to have two different values. One for
70 the dynamic symbol table, one for the normal symbol table.
72 In such cases we store the symbol's real value and section
73 index here so we can restore the real value before we write
74 the normal symbol table. */
75 bfd_vma st_value;
76 int st_shndx;
78 /* Used to count non-got, non-plt relocations for delayed sizing
79 of relocation sections. */
80 struct elf64_hppa_dyn_reloc_entry
82 /* Next relocation in the chain. */
83 struct elf64_hppa_dyn_reloc_entry *next;
85 /* The type of the relocation. */
86 int type;
88 /* The input section of the relocation. */
89 asection *sec;
91 /* Number of relocs copied in this section. */
92 bfd_size_type count;
94 /* The index of the section symbol for the input section of
95 the relocation. Only needed when building shared libraries. */
96 int sec_symndx;
98 /* The offset within the input section of the relocation. */
99 bfd_vma offset;
101 /* The addend for the relocation. */
102 bfd_vma addend;
104 } *reloc_entries;
106 /* Nonzero if this symbol needs an entry in one of the linker
107 sections. */
108 unsigned want_dlt;
109 unsigned want_plt;
110 unsigned want_opd;
111 unsigned want_stub;
114 struct elf64_hppa_link_hash_table
116 struct elf_link_hash_table root;
118 /* Shortcuts to get to the various linker defined sections. */
119 asection *dlt_sec;
120 asection *dlt_rel_sec;
121 asection *plt_sec;
122 asection *plt_rel_sec;
123 asection *opd_sec;
124 asection *opd_rel_sec;
125 asection *other_rel_sec;
127 /* Offset of __gp within .plt section. When the PLT gets large we want
128 to slide __gp into the PLT section so that we can continue to use
129 single DP relative instructions to load values out of the PLT. */
130 bfd_vma gp_offset;
132 /* Note this is not strictly correct. We should create a stub section for
133 each input section with calls. The stub section should be placed before
134 the section with the call. */
135 asection *stub_sec;
137 bfd_vma text_segment_base;
138 bfd_vma data_segment_base;
140 /* We build tables to map from an input section back to its
141 symbol index. This is the BFD for which we currently have
142 a map. */
143 bfd *section_syms_bfd;
145 /* Array of symbol numbers for each input section attached to the
146 current BFD. */
147 int *section_syms;
150 #define hppa_link_hash_table(p) \
151 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
152 == HPPA64_ELF_DATA ? ((struct elf64_hppa_link_hash_table *) ((p)->hash)) : NULL)
154 #define hppa_elf_hash_entry(ent) \
155 ((struct elf64_hppa_link_hash_entry *)(ent))
157 #define eh_name(eh) \
158 (eh ? eh->root.root.string : "<undef>")
160 typedef struct bfd_hash_entry *(*new_hash_entry_func)
161 (struct bfd_hash_entry *, struct bfd_hash_table *, const char *);
163 static struct bfd_link_hash_table *elf64_hppa_hash_table_create
164 (bfd *abfd);
166 /* This must follow the definitions of the various derived linker
167 hash tables and shared functions. */
168 #include "elf-hppa.h"
170 static bfd_boolean elf64_hppa_object_p
171 (bfd *);
173 static void elf64_hppa_post_process_headers
174 (bfd *, struct bfd_link_info *);
176 static bfd_boolean elf64_hppa_create_dynamic_sections
177 (bfd *, struct bfd_link_info *);
179 static bfd_boolean elf64_hppa_adjust_dynamic_symbol
180 (struct bfd_link_info *, struct elf_link_hash_entry *);
182 static bfd_boolean elf64_hppa_mark_milli_and_exported_functions
183 (struct elf_link_hash_entry *, void *);
185 static bfd_boolean elf64_hppa_size_dynamic_sections
186 (bfd *, struct bfd_link_info *);
188 static int elf64_hppa_link_output_symbol_hook
189 (struct bfd_link_info *, const char *, Elf_Internal_Sym *,
190 asection *, struct elf_link_hash_entry *);
192 static bfd_boolean elf64_hppa_finish_dynamic_symbol
193 (bfd *, struct bfd_link_info *,
194 struct elf_link_hash_entry *, Elf_Internal_Sym *);
196 static enum elf_reloc_type_class elf64_hppa_reloc_type_class
197 (const Elf_Internal_Rela *);
199 static bfd_boolean elf64_hppa_finish_dynamic_sections
200 (bfd *, struct bfd_link_info *);
202 static bfd_boolean elf64_hppa_check_relocs
203 (bfd *, struct bfd_link_info *,
204 asection *, const Elf_Internal_Rela *);
206 static bfd_boolean elf64_hppa_dynamic_symbol_p
207 (struct elf_link_hash_entry *, struct bfd_link_info *);
209 static bfd_boolean elf64_hppa_mark_exported_functions
210 (struct elf_link_hash_entry *, void *);
212 static bfd_boolean elf64_hppa_finalize_opd
213 (struct elf_link_hash_entry *, void *);
215 static bfd_boolean elf64_hppa_finalize_dlt
216 (struct elf_link_hash_entry *, void *);
218 static bfd_boolean allocate_global_data_dlt
219 (struct elf_link_hash_entry *, void *);
221 static bfd_boolean allocate_global_data_plt
222 (struct elf_link_hash_entry *, void *);
224 static bfd_boolean allocate_global_data_stub
225 (struct elf_link_hash_entry *, void *);
227 static bfd_boolean allocate_global_data_opd
228 (struct elf_link_hash_entry *, void *);
230 static bfd_boolean get_reloc_section
231 (bfd *, struct elf64_hppa_link_hash_table *, asection *);
233 static bfd_boolean count_dyn_reloc
234 (bfd *, struct elf64_hppa_link_hash_entry *,
235 int, asection *, int, bfd_vma, bfd_vma);
237 static bfd_boolean allocate_dynrel_entries
238 (struct elf_link_hash_entry *, void *);
240 static bfd_boolean elf64_hppa_finalize_dynreloc
241 (struct elf_link_hash_entry *, void *);
243 static bfd_boolean get_opd
244 (bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *);
246 static bfd_boolean get_plt
247 (bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *);
249 static bfd_boolean get_dlt
250 (bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *);
252 static bfd_boolean get_stub
253 (bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *);
255 static int elf64_hppa_elf_get_symbol_type
256 (Elf_Internal_Sym *, int);
258 /* Initialize an entry in the link hash table. */
260 static struct bfd_hash_entry *
261 hppa64_link_hash_newfunc (struct bfd_hash_entry *entry,
262 struct bfd_hash_table *table,
263 const char *string)
265 /* Allocate the structure if it has not already been allocated by a
266 subclass. */
267 if (entry == NULL)
269 entry = bfd_hash_allocate (table,
270 sizeof (struct elf64_hppa_link_hash_entry));
271 if (entry == NULL)
272 return entry;
275 /* Call the allocation method of the superclass. */
276 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
277 if (entry != NULL)
279 struct elf64_hppa_link_hash_entry *hh;
281 /* Initialize our local data. All zeros. */
282 hh = hppa_elf_hash_entry (entry);
283 memset (&hh->dlt_offset, 0,
284 (sizeof (struct elf64_hppa_link_hash_entry)
285 - offsetof (struct elf64_hppa_link_hash_entry, dlt_offset)));
288 return entry;
291 /* Create the derived linker hash table. The PA64 ELF port uses this
292 derived hash table to keep information specific to the PA ElF
293 linker (without using static variables). */
295 static struct bfd_link_hash_table*
296 elf64_hppa_hash_table_create (bfd *abfd)
298 struct elf64_hppa_link_hash_table *htab;
299 bfd_size_type amt = sizeof (*htab);
301 htab = bfd_zalloc (abfd, amt);
302 if (htab == NULL)
303 return NULL;
305 if (!_bfd_elf_link_hash_table_init (&htab->root, abfd,
306 hppa64_link_hash_newfunc,
307 sizeof (struct elf64_hppa_link_hash_entry),
308 HPPA64_ELF_DATA))
310 bfd_release (abfd, htab);
311 return NULL;
314 htab->text_segment_base = (bfd_vma) -1;
315 htab->data_segment_base = (bfd_vma) -1;
317 return &htab->root.root;
320 /* Return nonzero if ABFD represents a PA2.0 ELF64 file.
322 Additionally we set the default architecture and machine. */
323 static bfd_boolean
324 elf64_hppa_object_p (bfd *abfd)
326 Elf_Internal_Ehdr * i_ehdrp;
327 unsigned int flags;
329 i_ehdrp = elf_elfheader (abfd);
330 if (strcmp (bfd_get_target (abfd), "elf64-hppa-linux") == 0)
332 /* GCC on hppa-linux produces binaries with OSABI=Linux,
333 but the kernel produces corefiles with OSABI=SysV. */
334 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX
335 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
336 return FALSE;
338 else
340 /* HPUX produces binaries with OSABI=HPUX,
341 but the kernel produces corefiles with OSABI=SysV. */
342 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX
343 && i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
344 return FALSE;
347 flags = i_ehdrp->e_flags;
348 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
350 case EFA_PARISC_1_0:
351 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
352 case EFA_PARISC_1_1:
353 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
354 case EFA_PARISC_2_0:
355 if (i_ehdrp->e_ident[EI_CLASS] == ELFCLASS64)
356 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
357 else
358 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
359 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
360 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
362 /* Don't be fussy. */
363 return TRUE;
366 /* Given section type (hdr->sh_type), return a boolean indicating
367 whether or not the section is an elf64-hppa specific section. */
368 static bfd_boolean
369 elf64_hppa_section_from_shdr (bfd *abfd,
370 Elf_Internal_Shdr *hdr,
371 const char *name,
372 int shindex)
374 asection *newsect;
376 switch (hdr->sh_type)
378 case SHT_PARISC_EXT:
379 if (strcmp (name, ".PARISC.archext") != 0)
380 return FALSE;
381 break;
382 case SHT_PARISC_UNWIND:
383 if (strcmp (name, ".PARISC.unwind") != 0)
384 return FALSE;
385 break;
386 case SHT_PARISC_DOC:
387 case SHT_PARISC_ANNOT:
388 default:
389 return FALSE;
392 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
393 return FALSE;
394 newsect = hdr->bfd_section;
396 return TRUE;
399 /* SEC is a section containing relocs for an input BFD when linking; return
400 a suitable section for holding relocs in the output BFD for a link. */
402 static bfd_boolean
403 get_reloc_section (bfd *abfd,
404 struct elf64_hppa_link_hash_table *hppa_info,
405 asection *sec)
407 const char *srel_name;
408 asection *srel;
409 bfd *dynobj;
411 srel_name = (bfd_elf_string_from_elf_section
412 (abfd, elf_elfheader(abfd)->e_shstrndx,
413 elf_section_data(sec)->rel_hdr.sh_name));
414 if (srel_name == NULL)
415 return FALSE;
417 BFD_ASSERT ((CONST_STRNEQ (srel_name, ".rela")
418 && strcmp (bfd_get_section_name (abfd, sec),
419 srel_name + 5) == 0)
420 || (CONST_STRNEQ (srel_name, ".rel")
421 && strcmp (bfd_get_section_name (abfd, sec),
422 srel_name + 4) == 0));
424 dynobj = hppa_info->root.dynobj;
425 if (!dynobj)
426 hppa_info->root.dynobj = dynobj = abfd;
428 srel = bfd_get_section_by_name (dynobj, srel_name);
429 if (srel == NULL)
431 srel = bfd_make_section_with_flags (dynobj, srel_name,
432 (SEC_ALLOC
433 | SEC_LOAD
434 | SEC_HAS_CONTENTS
435 | SEC_IN_MEMORY
436 | SEC_LINKER_CREATED
437 | SEC_READONLY));
438 if (srel == NULL
439 || !bfd_set_section_alignment (dynobj, srel, 3))
440 return FALSE;
443 hppa_info->other_rel_sec = srel;
444 return TRUE;
447 /* Add a new entry to the list of dynamic relocations against DYN_H.
449 We use this to keep a record of all the FPTR relocations against a
450 particular symbol so that we can create FPTR relocations in the
451 output file. */
453 static bfd_boolean
454 count_dyn_reloc (bfd *abfd,
455 struct elf64_hppa_link_hash_entry *hh,
456 int type,
457 asection *sec,
458 int sec_symndx,
459 bfd_vma offset,
460 bfd_vma addend)
462 struct elf64_hppa_dyn_reloc_entry *rent;
464 rent = (struct elf64_hppa_dyn_reloc_entry *)
465 bfd_alloc (abfd, (bfd_size_type) sizeof (*rent));
466 if (!rent)
467 return FALSE;
469 rent->next = hh->reloc_entries;
470 rent->type = type;
471 rent->sec = sec;
472 rent->sec_symndx = sec_symndx;
473 rent->offset = offset;
474 rent->addend = addend;
475 hh->reloc_entries = rent;
477 return TRUE;
480 /* Return a pointer to the local DLT, PLT and OPD reference counts
481 for ABFD. Returns NULL if the storage allocation fails. */
483 static bfd_signed_vma *
484 hppa64_elf_local_refcounts (bfd *abfd)
486 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
487 bfd_signed_vma *local_refcounts;
489 local_refcounts = elf_local_got_refcounts (abfd);
490 if (local_refcounts == NULL)
492 bfd_size_type size;
494 /* Allocate space for local DLT, PLT and OPD reference
495 counts. Done this way to save polluting elf_obj_tdata
496 with another target specific pointer. */
497 size = symtab_hdr->sh_info;
498 size *= 3 * sizeof (bfd_signed_vma);
499 local_refcounts = bfd_zalloc (abfd, size);
500 elf_local_got_refcounts (abfd) = local_refcounts;
502 return local_refcounts;
505 /* Scan the RELOCS and record the type of dynamic entries that each
506 referenced symbol needs. */
508 static bfd_boolean
509 elf64_hppa_check_relocs (bfd *abfd,
510 struct bfd_link_info *info,
511 asection *sec,
512 const Elf_Internal_Rela *relocs)
514 struct elf64_hppa_link_hash_table *hppa_info;
515 const Elf_Internal_Rela *relend;
516 Elf_Internal_Shdr *symtab_hdr;
517 const Elf_Internal_Rela *rel;
518 asection *dlt, *plt, *stubs;
519 char *buf;
520 size_t buf_len;
521 unsigned int sec_symndx;
523 if (info->relocatable)
524 return TRUE;
526 /* If this is the first dynamic object found in the link, create
527 the special sections required for dynamic linking. */
528 if (! elf_hash_table (info)->dynamic_sections_created)
530 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
531 return FALSE;
534 hppa_info = hppa_link_hash_table (info);
535 if (hppa_info == NULL)
536 return FALSE;
537 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
539 /* If necessary, build a new table holding section symbols indices
540 for this BFD. */
542 if (info->shared && hppa_info->section_syms_bfd != abfd)
544 unsigned long i;
545 unsigned int highest_shndx;
546 Elf_Internal_Sym *local_syms = NULL;
547 Elf_Internal_Sym *isym, *isymend;
548 bfd_size_type amt;
550 /* We're done with the old cache of section index to section symbol
551 index information. Free it.
553 ?!? Note we leak the last section_syms array. Presumably we
554 could free it in one of the later routines in this file. */
555 if (hppa_info->section_syms)
556 free (hppa_info->section_syms);
558 /* Read this BFD's local symbols. */
559 if (symtab_hdr->sh_info != 0)
561 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
562 if (local_syms == NULL)
563 local_syms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
564 symtab_hdr->sh_info, 0,
565 NULL, NULL, NULL);
566 if (local_syms == NULL)
567 return FALSE;
570 /* Record the highest section index referenced by the local symbols. */
571 highest_shndx = 0;
572 isymend = local_syms + symtab_hdr->sh_info;
573 for (isym = local_syms; isym < isymend; isym++)
575 if (isym->st_shndx > highest_shndx
576 && isym->st_shndx < SHN_LORESERVE)
577 highest_shndx = isym->st_shndx;
580 /* Allocate an array to hold the section index to section symbol index
581 mapping. Bump by one since we start counting at zero. */
582 highest_shndx++;
583 amt = highest_shndx;
584 amt *= sizeof (int);
585 hppa_info->section_syms = (int *) bfd_malloc (amt);
587 /* Now walk the local symbols again. If we find a section symbol,
588 record the index of the symbol into the section_syms array. */
589 for (i = 0, isym = local_syms; isym < isymend; i++, isym++)
591 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
592 hppa_info->section_syms[isym->st_shndx] = i;
595 /* We are finished with the local symbols. */
596 if (local_syms != NULL
597 && symtab_hdr->contents != (unsigned char *) local_syms)
599 if (! info->keep_memory)
600 free (local_syms);
601 else
603 /* Cache the symbols for elf_link_input_bfd. */
604 symtab_hdr->contents = (unsigned char *) local_syms;
608 /* Record which BFD we built the section_syms mapping for. */
609 hppa_info->section_syms_bfd = abfd;
612 /* Record the symbol index for this input section. We may need it for
613 relocations when building shared libraries. When not building shared
614 libraries this value is never really used, but assign it to zero to
615 prevent out of bounds memory accesses in other routines. */
616 if (info->shared)
618 sec_symndx = _bfd_elf_section_from_bfd_section (abfd, sec);
620 /* If we did not find a section symbol for this section, then
621 something went terribly wrong above. */
622 if (sec_symndx == SHN_BAD)
623 return FALSE;
625 if (sec_symndx < SHN_LORESERVE)
626 sec_symndx = hppa_info->section_syms[sec_symndx];
627 else
628 sec_symndx = 0;
630 else
631 sec_symndx = 0;
633 dlt = plt = stubs = NULL;
634 buf = NULL;
635 buf_len = 0;
637 relend = relocs + sec->reloc_count;
638 for (rel = relocs; rel < relend; ++rel)
640 enum
642 NEED_DLT = 1,
643 NEED_PLT = 2,
644 NEED_STUB = 4,
645 NEED_OPD = 8,
646 NEED_DYNREL = 16,
649 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
650 struct elf64_hppa_link_hash_entry *hh;
651 int need_entry;
652 bfd_boolean maybe_dynamic;
653 int dynrel_type = R_PARISC_NONE;
654 static reloc_howto_type *howto;
656 if (r_symndx >= symtab_hdr->sh_info)
658 /* We're dealing with a global symbol -- find its hash entry
659 and mark it as being referenced. */
660 long indx = r_symndx - symtab_hdr->sh_info;
661 hh = hppa_elf_hash_entry (elf_sym_hashes (abfd)[indx]);
662 while (hh->eh.root.type == bfd_link_hash_indirect
663 || hh->eh.root.type == bfd_link_hash_warning)
664 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
666 hh->eh.ref_regular = 1;
668 else
669 hh = NULL;
671 /* We can only get preliminary data on whether a symbol is
672 locally or externally defined, as not all of the input files
673 have yet been processed. Do something with what we know, as
674 this may help reduce memory usage and processing time later. */
675 maybe_dynamic = FALSE;
676 if (hh && ((info->shared
677 && (!info->symbolic
678 || info->unresolved_syms_in_shared_libs == RM_IGNORE))
679 || !hh->eh.def_regular
680 || hh->eh.root.type == bfd_link_hash_defweak))
681 maybe_dynamic = TRUE;
683 howto = elf_hppa_howto_table + ELF64_R_TYPE (rel->r_info);
684 need_entry = 0;
685 switch (howto->type)
687 /* These are simple indirect references to symbols through the
688 DLT. We need to create a DLT entry for any symbols which
689 appears in a DLTIND relocation. */
690 case R_PARISC_DLTIND21L:
691 case R_PARISC_DLTIND14R:
692 case R_PARISC_DLTIND14F:
693 case R_PARISC_DLTIND14WR:
694 case R_PARISC_DLTIND14DR:
695 need_entry = NEED_DLT;
696 break;
698 /* ?!? These need a DLT entry. But I have no idea what to do with
699 the "link time TP value. */
700 case R_PARISC_LTOFF_TP21L:
701 case R_PARISC_LTOFF_TP14R:
702 case R_PARISC_LTOFF_TP14F:
703 case R_PARISC_LTOFF_TP64:
704 case R_PARISC_LTOFF_TP14WR:
705 case R_PARISC_LTOFF_TP14DR:
706 case R_PARISC_LTOFF_TP16F:
707 case R_PARISC_LTOFF_TP16WF:
708 case R_PARISC_LTOFF_TP16DF:
709 need_entry = NEED_DLT;
710 break;
712 /* These are function calls. Depending on their precise target we
713 may need to make a stub for them. The stub uses the PLT, so we
714 need to create PLT entries for these symbols too. */
715 case R_PARISC_PCREL12F:
716 case R_PARISC_PCREL17F:
717 case R_PARISC_PCREL22F:
718 case R_PARISC_PCREL32:
719 case R_PARISC_PCREL64:
720 case R_PARISC_PCREL21L:
721 case R_PARISC_PCREL17R:
722 case R_PARISC_PCREL17C:
723 case R_PARISC_PCREL14R:
724 case R_PARISC_PCREL14F:
725 case R_PARISC_PCREL22C:
726 case R_PARISC_PCREL14WR:
727 case R_PARISC_PCREL14DR:
728 case R_PARISC_PCREL16F:
729 case R_PARISC_PCREL16WF:
730 case R_PARISC_PCREL16DF:
731 /* Function calls might need to go through the .plt, and
732 might need a long branch stub. */
733 if (hh != NULL && hh->eh.type != STT_PARISC_MILLI)
734 need_entry = (NEED_PLT | NEED_STUB);
735 else
736 need_entry = 0;
737 break;
739 case R_PARISC_PLTOFF21L:
740 case R_PARISC_PLTOFF14R:
741 case R_PARISC_PLTOFF14F:
742 case R_PARISC_PLTOFF14WR:
743 case R_PARISC_PLTOFF14DR:
744 case R_PARISC_PLTOFF16F:
745 case R_PARISC_PLTOFF16WF:
746 case R_PARISC_PLTOFF16DF:
747 need_entry = (NEED_PLT);
748 break;
750 case R_PARISC_DIR64:
751 if (info->shared || maybe_dynamic)
752 need_entry = (NEED_DYNREL);
753 dynrel_type = R_PARISC_DIR64;
754 break;
756 /* This is an indirect reference through the DLT to get the address
757 of a OPD descriptor. Thus we need to make a DLT entry that points
758 to an OPD entry. */
759 case R_PARISC_LTOFF_FPTR21L:
760 case R_PARISC_LTOFF_FPTR14R:
761 case R_PARISC_LTOFF_FPTR14WR:
762 case R_PARISC_LTOFF_FPTR14DR:
763 case R_PARISC_LTOFF_FPTR32:
764 case R_PARISC_LTOFF_FPTR64:
765 case R_PARISC_LTOFF_FPTR16F:
766 case R_PARISC_LTOFF_FPTR16WF:
767 case R_PARISC_LTOFF_FPTR16DF:
768 if (info->shared || maybe_dynamic)
769 need_entry = (NEED_DLT | NEED_OPD | NEED_PLT);
770 else
771 need_entry = (NEED_DLT | NEED_OPD | NEED_PLT);
772 dynrel_type = R_PARISC_FPTR64;
773 break;
775 /* This is a simple OPD entry. */
776 case R_PARISC_FPTR64:
777 if (info->shared || maybe_dynamic)
778 need_entry = (NEED_OPD | NEED_PLT | NEED_DYNREL);
779 else
780 need_entry = (NEED_OPD | NEED_PLT);
781 dynrel_type = R_PARISC_FPTR64;
782 break;
784 /* Add more cases as needed. */
787 if (!need_entry)
788 continue;
790 if (hh)
792 /* Stash away enough information to be able to find this symbol
793 regardless of whether or not it is local or global. */
794 hh->owner = abfd;
795 hh->sym_indx = r_symndx;
798 /* Create what's needed. */
799 if (need_entry & NEED_DLT)
801 /* Allocate space for a DLT entry, as well as a dynamic
802 relocation for this entry. */
803 if (! hppa_info->dlt_sec
804 && ! get_dlt (abfd, info, hppa_info))
805 goto err_out;
807 if (hh != NULL)
809 hh->want_dlt = 1;
810 hh->eh.got.refcount += 1;
812 else
814 bfd_signed_vma *local_dlt_refcounts;
816 /* This is a DLT entry for a local symbol. */
817 local_dlt_refcounts = hppa64_elf_local_refcounts (abfd);
818 if (local_dlt_refcounts == NULL)
819 return FALSE;
820 local_dlt_refcounts[r_symndx] += 1;
824 if (need_entry & NEED_PLT)
826 if (! hppa_info->plt_sec
827 && ! get_plt (abfd, info, hppa_info))
828 goto err_out;
830 if (hh != NULL)
832 hh->want_plt = 1;
833 hh->eh.needs_plt = 1;
834 hh->eh.plt.refcount += 1;
836 else
838 bfd_signed_vma *local_dlt_refcounts;
839 bfd_signed_vma *local_plt_refcounts;
841 /* This is a PLT entry for a local symbol. */
842 local_dlt_refcounts = hppa64_elf_local_refcounts (abfd);
843 if (local_dlt_refcounts == NULL)
844 return FALSE;
845 local_plt_refcounts = local_dlt_refcounts + symtab_hdr->sh_info;
846 local_plt_refcounts[r_symndx] += 1;
850 if (need_entry & NEED_STUB)
852 if (! hppa_info->stub_sec
853 && ! get_stub (abfd, info, hppa_info))
854 goto err_out;
855 if (hh)
856 hh->want_stub = 1;
859 if (need_entry & NEED_OPD)
861 if (! hppa_info->opd_sec
862 && ! get_opd (abfd, info, hppa_info))
863 goto err_out;
865 /* FPTRs are not allocated by the dynamic linker for PA64,
866 though it is possible that will change in the future. */
868 if (hh != NULL)
869 hh->want_opd = 1;
870 else
872 bfd_signed_vma *local_dlt_refcounts;
873 bfd_signed_vma *local_opd_refcounts;
875 /* This is a OPD for a local symbol. */
876 local_dlt_refcounts = hppa64_elf_local_refcounts (abfd);
877 if (local_dlt_refcounts == NULL)
878 return FALSE;
879 local_opd_refcounts = (local_dlt_refcounts
880 + 2 * symtab_hdr->sh_info);
881 local_opd_refcounts[r_symndx] += 1;
885 /* Add a new dynamic relocation to the chain of dynamic
886 relocations for this symbol. */
887 if ((need_entry & NEED_DYNREL) && (sec->flags & SEC_ALLOC))
889 if (! hppa_info->other_rel_sec
890 && ! get_reloc_section (abfd, hppa_info, sec))
891 goto err_out;
893 /* Count dynamic relocations against global symbols. */
894 if (hh != NULL
895 && !count_dyn_reloc (abfd, hh, dynrel_type, sec,
896 sec_symndx, rel->r_offset, rel->r_addend))
897 goto err_out;
899 /* If we are building a shared library and we just recorded
900 a dynamic R_PARISC_FPTR64 relocation, then make sure the
901 section symbol for this section ends up in the dynamic
902 symbol table. */
903 if (info->shared && dynrel_type == R_PARISC_FPTR64
904 && ! (bfd_elf_link_record_local_dynamic_symbol
905 (info, abfd, sec_symndx)))
906 return FALSE;
910 if (buf)
911 free (buf);
912 return TRUE;
914 err_out:
915 if (buf)
916 free (buf);
917 return FALSE;
920 struct elf64_hppa_allocate_data
922 struct bfd_link_info *info;
923 bfd_size_type ofs;
926 /* Should we do dynamic things to this symbol? */
928 static bfd_boolean
929 elf64_hppa_dynamic_symbol_p (struct elf_link_hash_entry *eh,
930 struct bfd_link_info *info)
932 /* ??? What, if anything, needs to happen wrt STV_PROTECTED symbols
933 and relocations that retrieve a function descriptor? Assume the
934 worst for now. */
935 if (_bfd_elf_dynamic_symbol_p (eh, info, 1))
937 /* ??? Why is this here and not elsewhere is_local_label_name. */
938 if (eh->root.root.string[0] == '$' && eh->root.root.string[1] == '$')
939 return FALSE;
941 return TRUE;
943 else
944 return FALSE;
947 /* Mark all functions exported by this file so that we can later allocate
948 entries in .opd for them. */
950 static bfd_boolean
951 elf64_hppa_mark_exported_functions (struct elf_link_hash_entry *eh, void *data)
953 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
954 struct bfd_link_info *info = (struct bfd_link_info *)data;
955 struct elf64_hppa_link_hash_table *hppa_info;
957 hppa_info = hppa_link_hash_table (info);
958 if (hppa_info == NULL)
959 return FALSE;
961 if (eh->root.type == bfd_link_hash_warning)
962 eh = (struct elf_link_hash_entry *) eh->root.u.i.link;
964 if (eh
965 && (eh->root.type == bfd_link_hash_defined
966 || eh->root.type == bfd_link_hash_defweak)
967 && eh->root.u.def.section->output_section != NULL
968 && eh->type == STT_FUNC)
970 if (! hppa_info->opd_sec
971 && ! get_opd (hppa_info->root.dynobj, info, hppa_info))
972 return FALSE;
974 hh->want_opd = 1;
976 /* Put a flag here for output_symbol_hook. */
977 hh->st_shndx = -1;
978 eh->needs_plt = 1;
981 return TRUE;
984 /* Allocate space for a DLT entry. */
986 static bfd_boolean
987 allocate_global_data_dlt (struct elf_link_hash_entry *eh, void *data)
989 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
990 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
992 if (hh->want_dlt)
994 if (x->info->shared)
996 /* Possibly add the symbol to the local dynamic symbol
997 table since we might need to create a dynamic relocation
998 against it. */
999 if (eh->dynindx == -1 && eh->type != STT_PARISC_MILLI)
1001 bfd *owner = eh->root.u.def.section->owner;
1003 if (! (bfd_elf_link_record_local_dynamic_symbol
1004 (x->info, owner, hh->sym_indx)))
1005 return FALSE;
1009 hh->dlt_offset = x->ofs;
1010 x->ofs += DLT_ENTRY_SIZE;
1012 return TRUE;
1015 /* Allocate space for a DLT.PLT entry. */
1017 static bfd_boolean
1018 allocate_global_data_plt (struct elf_link_hash_entry *eh, void *data)
1020 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1021 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *) data;
1023 if (hh->want_plt
1024 && elf64_hppa_dynamic_symbol_p (eh, x->info)
1025 && !((eh->root.type == bfd_link_hash_defined
1026 || eh->root.type == bfd_link_hash_defweak)
1027 && eh->root.u.def.section->output_section != NULL))
1029 hh->plt_offset = x->ofs;
1030 x->ofs += PLT_ENTRY_SIZE;
1031 if (hh->plt_offset < 0x2000)
1033 struct elf64_hppa_link_hash_table *hppa_info;
1035 hppa_info = hppa_link_hash_table (x->info);
1036 if (hppa_info == NULL)
1037 return FALSE;
1039 hppa_info->gp_offset = hh->plt_offset;
1042 else
1043 hh->want_plt = 0;
1045 return TRUE;
1048 /* Allocate space for a STUB entry. */
1050 static bfd_boolean
1051 allocate_global_data_stub (struct elf_link_hash_entry *eh, void *data)
1053 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1054 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1056 if (hh->want_stub
1057 && elf64_hppa_dynamic_symbol_p (eh, x->info)
1058 && !((eh->root.type == bfd_link_hash_defined
1059 || eh->root.type == bfd_link_hash_defweak)
1060 && eh->root.u.def.section->output_section != NULL))
1062 hh->stub_offset = x->ofs;
1063 x->ofs += sizeof (plt_stub);
1065 else
1066 hh->want_stub = 0;
1067 return TRUE;
1070 /* Allocate space for a FPTR entry. */
1072 static bfd_boolean
1073 allocate_global_data_opd (struct elf_link_hash_entry *eh, void *data)
1075 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1076 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1078 if (hh && hh->want_opd)
1080 while (hh->eh.root.type == bfd_link_hash_indirect
1081 || hh->eh.root.type == bfd_link_hash_warning)
1082 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
1084 /* We never need an opd entry for a symbol which is not
1085 defined by this output file. */
1086 if (hh && (hh->eh.root.type == bfd_link_hash_undefined
1087 || hh->eh.root.type == bfd_link_hash_undefweak
1088 || hh->eh.root.u.def.section->output_section == NULL))
1089 hh->want_opd = 0;
1091 /* If we are creating a shared library, took the address of a local
1092 function or might export this function from this object file, then
1093 we have to create an opd descriptor. */
1094 else if (x->info->shared
1095 || hh == NULL
1096 || (hh->eh.dynindx == -1 && hh->eh.type != STT_PARISC_MILLI)
1097 || (hh->eh.root.type == bfd_link_hash_defined
1098 || hh->eh.root.type == bfd_link_hash_defweak))
1100 /* If we are creating a shared library, then we will have to
1101 create a runtime relocation for the symbol to properly
1102 initialize the .opd entry. Make sure the symbol gets
1103 added to the dynamic symbol table. */
1104 if (x->info->shared
1105 && (hh == NULL || (hh->eh.dynindx == -1)))
1107 bfd *owner;
1108 /* PR 6511: Default to using the dynamic symbol table. */
1109 owner = (hh->owner ? hh->owner: eh->root.u.def.section->owner);
1111 if (!bfd_elf_link_record_local_dynamic_symbol
1112 (x->info, owner, hh->sym_indx))
1113 return FALSE;
1116 /* This may not be necessary or desirable anymore now that
1117 we have some support for dealing with section symbols
1118 in dynamic relocs. But name munging does make the result
1119 much easier to debug. ie, the EPLT reloc will reference
1120 a symbol like .foobar, instead of .text + offset. */
1121 if (x->info->shared && eh)
1123 char *new_name;
1124 struct elf_link_hash_entry *nh;
1126 new_name = alloca (strlen (eh->root.root.string) + 2);
1127 new_name[0] = '.';
1128 strcpy (new_name + 1, eh->root.root.string);
1130 nh = elf_link_hash_lookup (elf_hash_table (x->info),
1131 new_name, TRUE, TRUE, TRUE);
1133 nh->root.type = eh->root.type;
1134 nh->root.u.def.value = eh->root.u.def.value;
1135 nh->root.u.def.section = eh->root.u.def.section;
1137 if (! bfd_elf_link_record_dynamic_symbol (x->info, nh))
1138 return FALSE;
1141 hh->opd_offset = x->ofs;
1142 x->ofs += OPD_ENTRY_SIZE;
1145 /* Otherwise we do not need an opd entry. */
1146 else
1147 hh->want_opd = 0;
1149 return TRUE;
1152 /* HP requires the EI_OSABI field to be filled in. The assignment to
1153 EI_ABIVERSION may not be strictly necessary. */
1155 static void
1156 elf64_hppa_post_process_headers (bfd *abfd,
1157 struct bfd_link_info *link_info ATTRIBUTE_UNUSED)
1159 Elf_Internal_Ehdr * i_ehdrp;
1161 i_ehdrp = elf_elfheader (abfd);
1163 i_ehdrp->e_ident[EI_OSABI] = get_elf_backend_data (abfd)->elf_osabi;
1164 i_ehdrp->e_ident[EI_ABIVERSION] = 1;
1167 /* Create function descriptor section (.opd). This section is called .opd
1168 because it contains "official procedure descriptors". The "official"
1169 refers to the fact that these descriptors are used when taking the address
1170 of a procedure, thus ensuring a unique address for each procedure. */
1172 static bfd_boolean
1173 get_opd (bfd *abfd,
1174 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1175 struct elf64_hppa_link_hash_table *hppa_info)
1177 asection *opd;
1178 bfd *dynobj;
1180 opd = hppa_info->opd_sec;
1181 if (!opd)
1183 dynobj = hppa_info->root.dynobj;
1184 if (!dynobj)
1185 hppa_info->root.dynobj = dynobj = abfd;
1187 opd = bfd_make_section_with_flags (dynobj, ".opd",
1188 (SEC_ALLOC
1189 | SEC_LOAD
1190 | SEC_HAS_CONTENTS
1191 | SEC_IN_MEMORY
1192 | SEC_LINKER_CREATED));
1193 if (!opd
1194 || !bfd_set_section_alignment (abfd, opd, 3))
1196 BFD_ASSERT (0);
1197 return FALSE;
1200 hppa_info->opd_sec = opd;
1203 return TRUE;
1206 /* Create the PLT section. */
1208 static bfd_boolean
1209 get_plt (bfd *abfd,
1210 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1211 struct elf64_hppa_link_hash_table *hppa_info)
1213 asection *plt;
1214 bfd *dynobj;
1216 plt = hppa_info->plt_sec;
1217 if (!plt)
1219 dynobj = hppa_info->root.dynobj;
1220 if (!dynobj)
1221 hppa_info->root.dynobj = dynobj = abfd;
1223 plt = bfd_make_section_with_flags (dynobj, ".plt",
1224 (SEC_ALLOC
1225 | SEC_LOAD
1226 | SEC_HAS_CONTENTS
1227 | SEC_IN_MEMORY
1228 | SEC_LINKER_CREATED));
1229 if (!plt
1230 || !bfd_set_section_alignment (abfd, plt, 3))
1232 BFD_ASSERT (0);
1233 return FALSE;
1236 hppa_info->plt_sec = plt;
1239 return TRUE;
1242 /* Create the DLT section. */
1244 static bfd_boolean
1245 get_dlt (bfd *abfd,
1246 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1247 struct elf64_hppa_link_hash_table *hppa_info)
1249 asection *dlt;
1250 bfd *dynobj;
1252 dlt = hppa_info->dlt_sec;
1253 if (!dlt)
1255 dynobj = hppa_info->root.dynobj;
1256 if (!dynobj)
1257 hppa_info->root.dynobj = dynobj = abfd;
1259 dlt = bfd_make_section_with_flags (dynobj, ".dlt",
1260 (SEC_ALLOC
1261 | SEC_LOAD
1262 | SEC_HAS_CONTENTS
1263 | SEC_IN_MEMORY
1264 | SEC_LINKER_CREATED));
1265 if (!dlt
1266 || !bfd_set_section_alignment (abfd, dlt, 3))
1268 BFD_ASSERT (0);
1269 return FALSE;
1272 hppa_info->dlt_sec = dlt;
1275 return TRUE;
1278 /* Create the stubs section. */
1280 static bfd_boolean
1281 get_stub (bfd *abfd,
1282 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1283 struct elf64_hppa_link_hash_table *hppa_info)
1285 asection *stub;
1286 bfd *dynobj;
1288 stub = hppa_info->stub_sec;
1289 if (!stub)
1291 dynobj = hppa_info->root.dynobj;
1292 if (!dynobj)
1293 hppa_info->root.dynobj = dynobj = abfd;
1295 stub = bfd_make_section_with_flags (dynobj, ".stub",
1296 (SEC_ALLOC | SEC_LOAD
1297 | SEC_HAS_CONTENTS
1298 | SEC_IN_MEMORY
1299 | SEC_READONLY
1300 | SEC_LINKER_CREATED));
1301 if (!stub
1302 || !bfd_set_section_alignment (abfd, stub, 3))
1304 BFD_ASSERT (0);
1305 return FALSE;
1308 hppa_info->stub_sec = stub;
1311 return TRUE;
1314 /* Create sections necessary for dynamic linking. This is only a rough
1315 cut and will likely change as we learn more about the somewhat
1316 unusual dynamic linking scheme HP uses.
1318 .stub:
1319 Contains code to implement cross-space calls. The first time one
1320 of the stubs is used it will call into the dynamic linker, later
1321 calls will go straight to the target.
1323 The only stub we support right now looks like
1325 ldd OFFSET(%dp),%r1
1326 bve %r0(%r1)
1327 ldd OFFSET+8(%dp),%dp
1329 Other stubs may be needed in the future. We may want the remove
1330 the break/nop instruction. It is only used right now to keep the
1331 offset of a .plt entry and a .stub entry in sync.
1333 .dlt:
1334 This is what most people call the .got. HP used a different name.
1335 Losers.
1337 .rela.dlt:
1338 Relocations for the DLT.
1340 .plt:
1341 Function pointers as address,gp pairs.
1343 .rela.plt:
1344 Should contain dynamic IPLT (and EPLT?) relocations.
1346 .opd:
1347 FPTRS
1349 .rela.opd:
1350 EPLT relocations for symbols exported from shared libraries. */
1352 static bfd_boolean
1353 elf64_hppa_create_dynamic_sections (bfd *abfd,
1354 struct bfd_link_info *info)
1356 asection *s;
1357 struct elf64_hppa_link_hash_table *hppa_info;
1359 hppa_info = hppa_link_hash_table (info);
1360 if (hppa_info == NULL)
1361 return FALSE;
1363 if (! get_stub (abfd, info, hppa_info))
1364 return FALSE;
1366 if (! get_dlt (abfd, info, hppa_info))
1367 return FALSE;
1369 if (! get_plt (abfd, info, hppa_info))
1370 return FALSE;
1372 if (! get_opd (abfd, info, hppa_info))
1373 return FALSE;
1375 s = bfd_make_section_with_flags (abfd, ".rela.dlt",
1376 (SEC_ALLOC | SEC_LOAD
1377 | SEC_HAS_CONTENTS
1378 | SEC_IN_MEMORY
1379 | SEC_READONLY
1380 | SEC_LINKER_CREATED));
1381 if (s == NULL
1382 || !bfd_set_section_alignment (abfd, s, 3))
1383 return FALSE;
1384 hppa_info->dlt_rel_sec = s;
1386 s = bfd_make_section_with_flags (abfd, ".rela.plt",
1387 (SEC_ALLOC | SEC_LOAD
1388 | SEC_HAS_CONTENTS
1389 | SEC_IN_MEMORY
1390 | SEC_READONLY
1391 | SEC_LINKER_CREATED));
1392 if (s == NULL
1393 || !bfd_set_section_alignment (abfd, s, 3))
1394 return FALSE;
1395 hppa_info->plt_rel_sec = s;
1397 s = bfd_make_section_with_flags (abfd, ".rela.data",
1398 (SEC_ALLOC | SEC_LOAD
1399 | SEC_HAS_CONTENTS
1400 | SEC_IN_MEMORY
1401 | SEC_READONLY
1402 | SEC_LINKER_CREATED));
1403 if (s == NULL
1404 || !bfd_set_section_alignment (abfd, s, 3))
1405 return FALSE;
1406 hppa_info->other_rel_sec = s;
1408 s = bfd_make_section_with_flags (abfd, ".rela.opd",
1409 (SEC_ALLOC | SEC_LOAD
1410 | SEC_HAS_CONTENTS
1411 | SEC_IN_MEMORY
1412 | SEC_READONLY
1413 | SEC_LINKER_CREATED));
1414 if (s == NULL
1415 || !bfd_set_section_alignment (abfd, s, 3))
1416 return FALSE;
1417 hppa_info->opd_rel_sec = s;
1419 return TRUE;
1422 /* Allocate dynamic relocations for those symbols that turned out
1423 to be dynamic. */
1425 static bfd_boolean
1426 allocate_dynrel_entries (struct elf_link_hash_entry *eh, void *data)
1428 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1429 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1430 struct elf64_hppa_link_hash_table *hppa_info;
1431 struct elf64_hppa_dyn_reloc_entry *rent;
1432 bfd_boolean dynamic_symbol, shared;
1434 hppa_info = hppa_link_hash_table (x->info);
1435 if (hppa_info == NULL)
1436 return FALSE;
1438 dynamic_symbol = elf64_hppa_dynamic_symbol_p (eh, x->info);
1439 shared = x->info->shared;
1441 /* We may need to allocate relocations for a non-dynamic symbol
1442 when creating a shared library. */
1443 if (!dynamic_symbol && !shared)
1444 return TRUE;
1446 /* Take care of the normal data relocations. */
1448 for (rent = hh->reloc_entries; rent; rent = rent->next)
1450 /* Allocate one iff we are building a shared library, the relocation
1451 isn't a R_PARISC_FPTR64, or we don't want an opd entry. */
1452 if (!shared && rent->type == R_PARISC_FPTR64 && hh->want_opd)
1453 continue;
1455 hppa_info->other_rel_sec->size += sizeof (Elf64_External_Rela);
1457 /* Make sure this symbol gets into the dynamic symbol table if it is
1458 not already recorded. ?!? This should not be in the loop since
1459 the symbol need only be added once. */
1460 if (eh->dynindx == -1 && eh->type != STT_PARISC_MILLI)
1461 if (!bfd_elf_link_record_local_dynamic_symbol
1462 (x->info, rent->sec->owner, hh->sym_indx))
1463 return FALSE;
1466 /* Take care of the GOT and PLT relocations. */
1468 if ((dynamic_symbol || shared) && hh->want_dlt)
1469 hppa_info->dlt_rel_sec->size += sizeof (Elf64_External_Rela);
1471 /* If we are building a shared library, then every symbol that has an
1472 opd entry will need an EPLT relocation to relocate the symbol's address
1473 and __gp value based on the runtime load address. */
1474 if (shared && hh->want_opd)
1475 hppa_info->opd_rel_sec->size += sizeof (Elf64_External_Rela);
1477 if (hh->want_plt && dynamic_symbol)
1479 bfd_size_type t = 0;
1481 /* Dynamic symbols get one IPLT relocation. Local symbols in
1482 shared libraries get two REL relocations. Local symbols in
1483 main applications get nothing. */
1484 if (dynamic_symbol)
1485 t = sizeof (Elf64_External_Rela);
1486 else if (shared)
1487 t = 2 * sizeof (Elf64_External_Rela);
1489 hppa_info->plt_rel_sec->size += t;
1492 return TRUE;
1495 /* Adjust a symbol defined by a dynamic object and referenced by a
1496 regular object. */
1498 static bfd_boolean
1499 elf64_hppa_adjust_dynamic_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1500 struct elf_link_hash_entry *eh)
1502 /* ??? Undefined symbols with PLT entries should be re-defined
1503 to be the PLT entry. */
1505 /* If this is a weak symbol, and there is a real definition, the
1506 processor independent code will have arranged for us to see the
1507 real definition first, and we can just use the same value. */
1508 if (eh->u.weakdef != NULL)
1510 BFD_ASSERT (eh->u.weakdef->root.type == bfd_link_hash_defined
1511 || eh->u.weakdef->root.type == bfd_link_hash_defweak);
1512 eh->root.u.def.section = eh->u.weakdef->root.u.def.section;
1513 eh->root.u.def.value = eh->u.weakdef->root.u.def.value;
1514 return TRUE;
1517 /* If this is a reference to a symbol defined by a dynamic object which
1518 is not a function, we might allocate the symbol in our .dynbss section
1519 and allocate a COPY dynamic relocation.
1521 But PA64 code is canonically PIC, so as a rule we can avoid this sort
1522 of hackery. */
1524 return TRUE;
1527 /* This function is called via elf_link_hash_traverse to mark millicode
1528 symbols with a dynindx of -1 and to remove the string table reference
1529 from the dynamic symbol table. If the symbol is not a millicode symbol,
1530 elf64_hppa_mark_exported_functions is called. */
1532 static bfd_boolean
1533 elf64_hppa_mark_milli_and_exported_functions (struct elf_link_hash_entry *eh,
1534 void *data)
1536 struct elf_link_hash_entry *elf = eh;
1537 struct bfd_link_info *info = (struct bfd_link_info *)data;
1539 if (elf->root.type == bfd_link_hash_warning)
1540 elf = (struct elf_link_hash_entry *) elf->root.u.i.link;
1542 if (elf->type == STT_PARISC_MILLI)
1544 if (elf->dynindx != -1)
1546 elf->dynindx = -1;
1547 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1548 elf->dynstr_index);
1550 return TRUE;
1553 return elf64_hppa_mark_exported_functions (eh, data);
1556 /* Set the final sizes of the dynamic sections and allocate memory for
1557 the contents of our special sections. */
1559 static bfd_boolean
1560 elf64_hppa_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1562 struct elf64_hppa_link_hash_table *hppa_info;
1563 struct elf64_hppa_allocate_data data;
1564 bfd *dynobj;
1565 bfd *ibfd;
1566 asection *sec;
1567 bfd_boolean plt;
1568 bfd_boolean relocs;
1569 bfd_boolean reltext;
1571 hppa_info = hppa_link_hash_table (info);
1572 if (hppa_info == NULL)
1573 return FALSE;
1575 dynobj = elf_hash_table (info)->dynobj;
1576 BFD_ASSERT (dynobj != NULL);
1578 /* Mark each function this program exports so that we will allocate
1579 space in the .opd section for each function's FPTR. If we are
1580 creating dynamic sections, change the dynamic index of millicode
1581 symbols to -1 and remove them from the string table for .dynstr.
1583 We have to traverse the main linker hash table since we have to
1584 find functions which may not have been mentioned in any relocs. */
1585 elf_link_hash_traverse (elf_hash_table (info),
1586 (elf_hash_table (info)->dynamic_sections_created
1587 ? elf64_hppa_mark_milli_and_exported_functions
1588 : elf64_hppa_mark_exported_functions),
1589 info);
1591 if (elf_hash_table (info)->dynamic_sections_created)
1593 /* Set the contents of the .interp section to the interpreter. */
1594 if (info->executable)
1596 sec = bfd_get_section_by_name (dynobj, ".interp");
1597 BFD_ASSERT (sec != NULL);
1598 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
1599 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1602 else
1604 /* We may have created entries in the .rela.got section.
1605 However, if we are not creating the dynamic sections, we will
1606 not actually use these entries. Reset the size of .rela.dlt,
1607 which will cause it to get stripped from the output file
1608 below. */
1609 sec = bfd_get_section_by_name (dynobj, ".rela.dlt");
1610 if (sec != NULL)
1611 sec->size = 0;
1614 /* Set up DLT, PLT and OPD offsets for local syms, and space for local
1615 dynamic relocs. */
1616 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
1618 bfd_signed_vma *local_dlt;
1619 bfd_signed_vma *end_local_dlt;
1620 bfd_signed_vma *local_plt;
1621 bfd_signed_vma *end_local_plt;
1622 bfd_signed_vma *local_opd;
1623 bfd_signed_vma *end_local_opd;
1624 bfd_size_type locsymcount;
1625 Elf_Internal_Shdr *symtab_hdr;
1626 asection *srel;
1628 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
1629 continue;
1631 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
1633 struct elf64_hppa_dyn_reloc_entry *hdh_p;
1635 for (hdh_p = ((struct elf64_hppa_dyn_reloc_entry *)
1636 elf_section_data (sec)->local_dynrel);
1637 hdh_p != NULL;
1638 hdh_p = hdh_p->next)
1640 if (!bfd_is_abs_section (hdh_p->sec)
1641 && bfd_is_abs_section (hdh_p->sec->output_section))
1643 /* Input section has been discarded, either because
1644 it is a copy of a linkonce section or due to
1645 linker script /DISCARD/, so we'll be discarding
1646 the relocs too. */
1648 else if (hdh_p->count != 0)
1650 srel = elf_section_data (hdh_p->sec)->sreloc;
1651 srel->size += hdh_p->count * sizeof (Elf64_External_Rela);
1652 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
1653 info->flags |= DF_TEXTREL;
1658 local_dlt = elf_local_got_refcounts (ibfd);
1659 if (!local_dlt)
1660 continue;
1662 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
1663 locsymcount = symtab_hdr->sh_info;
1664 end_local_dlt = local_dlt + locsymcount;
1665 sec = hppa_info->dlt_sec;
1666 srel = hppa_info->dlt_rel_sec;
1667 for (; local_dlt < end_local_dlt; ++local_dlt)
1669 if (*local_dlt > 0)
1671 *local_dlt = sec->size;
1672 sec->size += DLT_ENTRY_SIZE;
1673 if (info->shared)
1675 srel->size += sizeof (Elf64_External_Rela);
1678 else
1679 *local_dlt = (bfd_vma) -1;
1682 local_plt = end_local_dlt;
1683 end_local_plt = local_plt + locsymcount;
1684 if (! hppa_info->root.dynamic_sections_created)
1686 /* Won't be used, but be safe. */
1687 for (; local_plt < end_local_plt; ++local_plt)
1688 *local_plt = (bfd_vma) -1;
1690 else
1692 sec = hppa_info->plt_sec;
1693 srel = hppa_info->plt_rel_sec;
1694 for (; local_plt < end_local_plt; ++local_plt)
1696 if (*local_plt > 0)
1698 *local_plt = sec->size;
1699 sec->size += PLT_ENTRY_SIZE;
1700 if (info->shared)
1701 srel->size += sizeof (Elf64_External_Rela);
1703 else
1704 *local_plt = (bfd_vma) -1;
1708 local_opd = end_local_plt;
1709 end_local_opd = local_opd + locsymcount;
1710 if (! hppa_info->root.dynamic_sections_created)
1712 /* Won't be used, but be safe. */
1713 for (; local_opd < end_local_opd; ++local_opd)
1714 *local_opd = (bfd_vma) -1;
1716 else
1718 sec = hppa_info->opd_sec;
1719 srel = hppa_info->opd_rel_sec;
1720 for (; local_opd < end_local_opd; ++local_opd)
1722 if (*local_opd > 0)
1724 *local_opd = sec->size;
1725 sec->size += OPD_ENTRY_SIZE;
1726 if (info->shared)
1727 srel->size += sizeof (Elf64_External_Rela);
1729 else
1730 *local_opd = (bfd_vma) -1;
1735 /* Allocate the GOT entries. */
1737 data.info = info;
1738 if (hppa_info->dlt_sec)
1740 data.ofs = hppa_info->dlt_sec->size;
1741 elf_link_hash_traverse (elf_hash_table (info),
1742 allocate_global_data_dlt, &data);
1743 hppa_info->dlt_sec->size = data.ofs;
1746 if (hppa_info->plt_sec)
1748 data.ofs = hppa_info->plt_sec->size;
1749 elf_link_hash_traverse (elf_hash_table (info),
1750 allocate_global_data_plt, &data);
1751 hppa_info->plt_sec->size = data.ofs;
1754 if (hppa_info->stub_sec)
1756 data.ofs = 0x0;
1757 elf_link_hash_traverse (elf_hash_table (info),
1758 allocate_global_data_stub, &data);
1759 hppa_info->stub_sec->size = data.ofs;
1762 /* Allocate space for entries in the .opd section. */
1763 if (hppa_info->opd_sec)
1765 data.ofs = hppa_info->opd_sec->size;
1766 elf_link_hash_traverse (elf_hash_table (info),
1767 allocate_global_data_opd, &data);
1768 hppa_info->opd_sec->size = data.ofs;
1771 /* Now allocate space for dynamic relocations, if necessary. */
1772 if (hppa_info->root.dynamic_sections_created)
1773 elf_link_hash_traverse (elf_hash_table (info),
1774 allocate_dynrel_entries, &data);
1776 /* The sizes of all the sections are set. Allocate memory for them. */
1777 plt = FALSE;
1778 relocs = FALSE;
1779 reltext = FALSE;
1780 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
1782 const char *name;
1784 if ((sec->flags & SEC_LINKER_CREATED) == 0)
1785 continue;
1787 /* It's OK to base decisions on the section name, because none
1788 of the dynobj section names depend upon the input files. */
1789 name = bfd_get_section_name (dynobj, sec);
1791 if (strcmp (name, ".plt") == 0)
1793 /* Remember whether there is a PLT. */
1794 plt = sec->size != 0;
1796 else if (strcmp (name, ".opd") == 0
1797 || CONST_STRNEQ (name, ".dlt")
1798 || strcmp (name, ".stub") == 0
1799 || strcmp (name, ".got") == 0)
1801 /* Strip this section if we don't need it; see the comment below. */
1803 else if (CONST_STRNEQ (name, ".rela"))
1805 if (sec->size != 0)
1807 asection *target;
1809 /* Remember whether there are any reloc sections other
1810 than .rela.plt. */
1811 if (strcmp (name, ".rela.plt") != 0)
1813 const char *outname;
1815 relocs = TRUE;
1817 /* If this relocation section applies to a read only
1818 section, then we probably need a DT_TEXTREL
1819 entry. The entries in the .rela.plt section
1820 really apply to the .got section, which we
1821 created ourselves and so know is not readonly. */
1822 outname = bfd_get_section_name (output_bfd,
1823 sec->output_section);
1824 target = bfd_get_section_by_name (output_bfd, outname + 4);
1825 if (target != NULL
1826 && (target->flags & SEC_READONLY) != 0
1827 && (target->flags & SEC_ALLOC) != 0)
1828 reltext = TRUE;
1831 /* We use the reloc_count field as a counter if we need
1832 to copy relocs into the output file. */
1833 sec->reloc_count = 0;
1836 else
1838 /* It's not one of our sections, so don't allocate space. */
1839 continue;
1842 if (sec->size == 0)
1844 /* If we don't need this section, strip it from the
1845 output file. This is mostly to handle .rela.bss and
1846 .rela.plt. We must create both sections in
1847 create_dynamic_sections, because they must be created
1848 before the linker maps input sections to output
1849 sections. The linker does that before
1850 adjust_dynamic_symbol is called, and it is that
1851 function which decides whether anything needs to go
1852 into these sections. */
1853 sec->flags |= SEC_EXCLUDE;
1854 continue;
1857 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
1858 continue;
1860 /* Allocate memory for the section contents if it has not
1861 been allocated already. We use bfd_zalloc here in case
1862 unused entries are not reclaimed before the section's
1863 contents are written out. This should not happen, but this
1864 way if it does, we get a R_PARISC_NONE reloc instead of
1865 garbage. */
1866 if (sec->contents == NULL)
1868 sec->contents = (bfd_byte *) bfd_zalloc (dynobj, sec->size);
1869 if (sec->contents == NULL)
1870 return FALSE;
1874 if (elf_hash_table (info)->dynamic_sections_created)
1876 /* Always create a DT_PLTGOT. It actually has nothing to do with
1877 the PLT, it is how we communicate the __gp value of a load
1878 module to the dynamic linker. */
1879 #define add_dynamic_entry(TAG, VAL) \
1880 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1882 if (!add_dynamic_entry (DT_HP_DLD_FLAGS, 0)
1883 || !add_dynamic_entry (DT_PLTGOT, 0))
1884 return FALSE;
1886 /* Add some entries to the .dynamic section. We fill in the
1887 values later, in elf64_hppa_finish_dynamic_sections, but we
1888 must add the entries now so that we get the correct size for
1889 the .dynamic section. The DT_DEBUG entry is filled in by the
1890 dynamic linker and used by the debugger. */
1891 if (! info->shared)
1893 if (!add_dynamic_entry (DT_DEBUG, 0)
1894 || !add_dynamic_entry (DT_HP_DLD_HOOK, 0)
1895 || !add_dynamic_entry (DT_HP_LOAD_MAP, 0))
1896 return FALSE;
1899 /* Force DT_FLAGS to always be set.
1900 Required by HPUX 11.00 patch PHSS_26559. */
1901 if (!add_dynamic_entry (DT_FLAGS, (info)->flags))
1902 return FALSE;
1904 if (plt)
1906 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
1907 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1908 || !add_dynamic_entry (DT_JMPREL, 0))
1909 return FALSE;
1912 if (relocs)
1914 if (!add_dynamic_entry (DT_RELA, 0)
1915 || !add_dynamic_entry (DT_RELASZ, 0)
1916 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
1917 return FALSE;
1920 if (reltext)
1922 if (!add_dynamic_entry (DT_TEXTREL, 0))
1923 return FALSE;
1924 info->flags |= DF_TEXTREL;
1927 #undef add_dynamic_entry
1929 return TRUE;
1932 /* Called after we have output the symbol into the dynamic symbol
1933 table, but before we output the symbol into the normal symbol
1934 table.
1936 For some symbols we had to change their address when outputting
1937 the dynamic symbol table. We undo that change here so that
1938 the symbols have their expected value in the normal symbol
1939 table. Ick. */
1941 static int
1942 elf64_hppa_link_output_symbol_hook (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1943 const char *name,
1944 Elf_Internal_Sym *sym,
1945 asection *input_sec ATTRIBUTE_UNUSED,
1946 struct elf_link_hash_entry *eh)
1948 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1950 /* We may be called with the file symbol or section symbols.
1951 They never need munging, so it is safe to ignore them. */
1952 if (!name || !eh)
1953 return 1;
1955 /* Function symbols for which we created .opd entries *may* have been
1956 munged by finish_dynamic_symbol and have to be un-munged here.
1958 Note that finish_dynamic_symbol sometimes turns dynamic symbols
1959 into non-dynamic ones, so we initialize st_shndx to -1 in
1960 mark_exported_functions and check to see if it was overwritten
1961 here instead of just checking eh->dynindx. */
1962 if (hh->want_opd && hh->st_shndx != -1)
1964 /* Restore the saved value and section index. */
1965 sym->st_value = hh->st_value;
1966 sym->st_shndx = hh->st_shndx;
1969 return 1;
1972 /* Finish up dynamic symbol handling. We set the contents of various
1973 dynamic sections here. */
1975 static bfd_boolean
1976 elf64_hppa_finish_dynamic_symbol (bfd *output_bfd,
1977 struct bfd_link_info *info,
1978 struct elf_link_hash_entry *eh,
1979 Elf_Internal_Sym *sym)
1981 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1982 asection *stub, *splt, *sdlt, *sopd, *spltrel, *sdltrel;
1983 struct elf64_hppa_link_hash_table *hppa_info;
1985 hppa_info = hppa_link_hash_table (info);
1986 if (hppa_info == NULL)
1987 return FALSE;
1989 stub = hppa_info->stub_sec;
1990 splt = hppa_info->plt_sec;
1991 sdlt = hppa_info->dlt_sec;
1992 sopd = hppa_info->opd_sec;
1993 spltrel = hppa_info->plt_rel_sec;
1994 sdltrel = hppa_info->dlt_rel_sec;
1996 /* Incredible. It is actually necessary to NOT use the symbol's real
1997 value when building the dynamic symbol table for a shared library.
1998 At least for symbols that refer to functions.
2000 We will store a new value and section index into the symbol long
2001 enough to output it into the dynamic symbol table, then we restore
2002 the original values (in elf64_hppa_link_output_symbol_hook). */
2003 if (hh->want_opd)
2005 BFD_ASSERT (sopd != NULL);
2007 /* Save away the original value and section index so that we
2008 can restore them later. */
2009 hh->st_value = sym->st_value;
2010 hh->st_shndx = sym->st_shndx;
2012 /* For the dynamic symbol table entry, we want the value to be
2013 address of this symbol's entry within the .opd section. */
2014 sym->st_value = (hh->opd_offset
2015 + sopd->output_offset
2016 + sopd->output_section->vma);
2017 sym->st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
2018 sopd->output_section);
2021 /* Initialize a .plt entry if requested. */
2022 if (hh->want_plt
2023 && elf64_hppa_dynamic_symbol_p (eh, info))
2025 bfd_vma value;
2026 Elf_Internal_Rela rel;
2027 bfd_byte *loc;
2029 BFD_ASSERT (splt != NULL && spltrel != NULL);
2031 /* We do not actually care about the value in the PLT entry
2032 if we are creating a shared library and the symbol is
2033 still undefined, we create a dynamic relocation to fill
2034 in the correct value. */
2035 if (info->shared && eh->root.type == bfd_link_hash_undefined)
2036 value = 0;
2037 else
2038 value = (eh->root.u.def.value + eh->root.u.def.section->vma);
2040 /* Fill in the entry in the procedure linkage table.
2042 The format of a plt entry is
2043 <funcaddr> <__gp>.
2045 plt_offset is the offset within the PLT section at which to
2046 install the PLT entry.
2048 We are modifying the in-memory PLT contents here, so we do not add
2049 in the output_offset of the PLT section. */
2051 bfd_put_64 (splt->owner, value, splt->contents + hh->plt_offset);
2052 value = _bfd_get_gp_value (splt->output_section->owner);
2053 bfd_put_64 (splt->owner, value, splt->contents + hh->plt_offset + 0x8);
2055 /* Create a dynamic IPLT relocation for this entry.
2057 We are creating a relocation in the output file's PLT section,
2058 which is included within the DLT secton. So we do need to include
2059 the PLT's output_offset in the computation of the relocation's
2060 address. */
2061 rel.r_offset = (hh->plt_offset + splt->output_offset
2062 + splt->output_section->vma);
2063 rel.r_info = ELF64_R_INFO (hh->eh.dynindx, R_PARISC_IPLT);
2064 rel.r_addend = 0;
2066 loc = spltrel->contents;
2067 loc += spltrel->reloc_count++ * sizeof (Elf64_External_Rela);
2068 bfd_elf64_swap_reloca_out (splt->output_section->owner, &rel, loc);
2071 /* Initialize an external call stub entry if requested. */
2072 if (hh->want_stub
2073 && elf64_hppa_dynamic_symbol_p (eh, info))
2075 bfd_vma value;
2076 int insn;
2077 unsigned int max_offset;
2079 BFD_ASSERT (stub != NULL);
2081 /* Install the generic stub template.
2083 We are modifying the contents of the stub section, so we do not
2084 need to include the stub section's output_offset here. */
2085 memcpy (stub->contents + hh->stub_offset, plt_stub, sizeof (plt_stub));
2087 /* Fix up the first ldd instruction.
2089 We are modifying the contents of the STUB section in memory,
2090 so we do not need to include its output offset in this computation.
2092 Note the plt_offset value is the value of the PLT entry relative to
2093 the start of the PLT section. These instructions will reference
2094 data relative to the value of __gp, which may not necessarily have
2095 the same address as the start of the PLT section.
2097 gp_offset contains the offset of __gp within the PLT section. */
2098 value = hh->plt_offset - hppa_info->gp_offset;
2100 insn = bfd_get_32 (stub->owner, stub->contents + hh->stub_offset);
2101 if (output_bfd->arch_info->mach >= 25)
2103 /* Wide mode allows 16 bit offsets. */
2104 max_offset = 32768;
2105 insn &= ~ 0xfff1;
2106 insn |= re_assemble_16 ((int) value);
2108 else
2110 max_offset = 8192;
2111 insn &= ~ 0x3ff1;
2112 insn |= re_assemble_14 ((int) value);
2115 if ((value & 7) || value + max_offset >= 2*max_offset - 8)
2117 (*_bfd_error_handler) (_("stub entry for %s cannot load .plt, dp offset = %ld"),
2118 hh->eh.root.root.string,
2119 (long) value);
2120 return FALSE;
2123 bfd_put_32 (stub->owner, (bfd_vma) insn,
2124 stub->contents + hh->stub_offset);
2126 /* Fix up the second ldd instruction. */
2127 value += 8;
2128 insn = bfd_get_32 (stub->owner, stub->contents + hh->stub_offset + 8);
2129 if (output_bfd->arch_info->mach >= 25)
2131 insn &= ~ 0xfff1;
2132 insn |= re_assemble_16 ((int) value);
2134 else
2136 insn &= ~ 0x3ff1;
2137 insn |= re_assemble_14 ((int) value);
2139 bfd_put_32 (stub->owner, (bfd_vma) insn,
2140 stub->contents + hh->stub_offset + 8);
2143 return TRUE;
2146 /* The .opd section contains FPTRs for each function this file
2147 exports. Initialize the FPTR entries. */
2149 static bfd_boolean
2150 elf64_hppa_finalize_opd (struct elf_link_hash_entry *eh, void *data)
2152 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
2153 struct bfd_link_info *info = (struct bfd_link_info *)data;
2154 struct elf64_hppa_link_hash_table *hppa_info;
2155 asection *sopd;
2156 asection *sopdrel;
2158 hppa_info = hppa_link_hash_table (info);
2159 if (hppa_info == NULL)
2160 return FALSE;
2162 sopd = hppa_info->opd_sec;
2163 sopdrel = hppa_info->opd_rel_sec;
2165 if (hh->want_opd)
2167 bfd_vma value;
2169 /* The first two words of an .opd entry are zero.
2171 We are modifying the contents of the OPD section in memory, so we
2172 do not need to include its output offset in this computation. */
2173 memset (sopd->contents + hh->opd_offset, 0, 16);
2175 value = (eh->root.u.def.value
2176 + eh->root.u.def.section->output_section->vma
2177 + eh->root.u.def.section->output_offset);
2179 /* The next word is the address of the function. */
2180 bfd_put_64 (sopd->owner, value, sopd->contents + hh->opd_offset + 16);
2182 /* The last word is our local __gp value. */
2183 value = _bfd_get_gp_value (sopd->output_section->owner);
2184 bfd_put_64 (sopd->owner, value, sopd->contents + hh->opd_offset + 24);
2187 /* If we are generating a shared library, we must generate EPLT relocations
2188 for each entry in the .opd, even for static functions (they may have
2189 had their address taken). */
2190 if (info->shared && hh->want_opd)
2192 Elf_Internal_Rela rel;
2193 bfd_byte *loc;
2194 int dynindx;
2196 /* We may need to do a relocation against a local symbol, in
2197 which case we have to look up it's dynamic symbol index off
2198 the local symbol hash table. */
2199 if (eh->dynindx != -1)
2200 dynindx = eh->dynindx;
2201 else
2202 dynindx
2203 = _bfd_elf_link_lookup_local_dynindx (info, hh->owner,
2204 hh->sym_indx);
2206 /* The offset of this relocation is the absolute address of the
2207 .opd entry for this symbol. */
2208 rel.r_offset = (hh->opd_offset + sopd->output_offset
2209 + sopd->output_section->vma);
2211 /* If H is non-null, then we have an external symbol.
2213 It is imperative that we use a different dynamic symbol for the
2214 EPLT relocation if the symbol has global scope.
2216 In the dynamic symbol table, the function symbol will have a value
2217 which is address of the function's .opd entry.
2219 Thus, we can not use that dynamic symbol for the EPLT relocation
2220 (if we did, the data in the .opd would reference itself rather
2221 than the actual address of the function). Instead we have to use
2222 a new dynamic symbol which has the same value as the original global
2223 function symbol.
2225 We prefix the original symbol with a "." and use the new symbol in
2226 the EPLT relocation. This new symbol has already been recorded in
2227 the symbol table, we just have to look it up and use it.
2229 We do not have such problems with static functions because we do
2230 not make their addresses in the dynamic symbol table point to
2231 the .opd entry. Ultimately this should be safe since a static
2232 function can not be directly referenced outside of its shared
2233 library.
2235 We do have to play similar games for FPTR relocations in shared
2236 libraries, including those for static symbols. See the FPTR
2237 handling in elf64_hppa_finalize_dynreloc. */
2238 if (eh)
2240 char *new_name;
2241 struct elf_link_hash_entry *nh;
2243 new_name = alloca (strlen (eh->root.root.string) + 2);
2244 new_name[0] = '.';
2245 strcpy (new_name + 1, eh->root.root.string);
2247 nh = elf_link_hash_lookup (elf_hash_table (info),
2248 new_name, TRUE, TRUE, FALSE);
2250 /* All we really want from the new symbol is its dynamic
2251 symbol index. */
2252 if (nh)
2253 dynindx = nh->dynindx;
2256 rel.r_addend = 0;
2257 rel.r_info = ELF64_R_INFO (dynindx, R_PARISC_EPLT);
2259 loc = sopdrel->contents;
2260 loc += sopdrel->reloc_count++ * sizeof (Elf64_External_Rela);
2261 bfd_elf64_swap_reloca_out (sopd->output_section->owner, &rel, loc);
2263 return TRUE;
2266 /* The .dlt section contains addresses for items referenced through the
2267 dlt. Note that we can have a DLTIND relocation for a local symbol, thus
2268 we can not depend on finish_dynamic_symbol to initialize the .dlt. */
2270 static bfd_boolean
2271 elf64_hppa_finalize_dlt (struct elf_link_hash_entry *eh, void *data)
2273 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
2274 struct bfd_link_info *info = (struct bfd_link_info *)data;
2275 struct elf64_hppa_link_hash_table *hppa_info;
2276 asection *sdlt, *sdltrel;
2278 hppa_info = hppa_link_hash_table (info);
2279 if (hppa_info == NULL)
2280 return FALSE;
2282 sdlt = hppa_info->dlt_sec;
2283 sdltrel = hppa_info->dlt_rel_sec;
2285 /* H/DYN_H may refer to a local variable and we know it's
2286 address, so there is no need to create a relocation. Just install
2287 the proper value into the DLT, note this shortcut can not be
2288 skipped when building a shared library. */
2289 if (! info->shared && hh && hh->want_dlt)
2291 bfd_vma value;
2293 /* If we had an LTOFF_FPTR style relocation we want the DLT entry
2294 to point to the FPTR entry in the .opd section.
2296 We include the OPD's output offset in this computation as
2297 we are referring to an absolute address in the resulting
2298 object file. */
2299 if (hh->want_opd)
2301 value = (hh->opd_offset
2302 + hppa_info->opd_sec->output_offset
2303 + hppa_info->opd_sec->output_section->vma);
2305 else if ((eh->root.type == bfd_link_hash_defined
2306 || eh->root.type == bfd_link_hash_defweak)
2307 && eh->root.u.def.section)
2309 value = eh->root.u.def.value + eh->root.u.def.section->output_offset;
2310 if (eh->root.u.def.section->output_section)
2311 value += eh->root.u.def.section->output_section->vma;
2312 else
2313 value += eh->root.u.def.section->vma;
2315 else
2316 /* We have an undefined function reference. */
2317 value = 0;
2319 /* We do not need to include the output offset of the DLT section
2320 here because we are modifying the in-memory contents. */
2321 bfd_put_64 (sdlt->owner, value, sdlt->contents + hh->dlt_offset);
2324 /* Create a relocation for the DLT entry associated with this symbol.
2325 When building a shared library the symbol does not have to be dynamic. */
2326 if (hh->want_dlt
2327 && (elf64_hppa_dynamic_symbol_p (eh, info) || info->shared))
2329 Elf_Internal_Rela rel;
2330 bfd_byte *loc;
2331 int dynindx;
2333 /* We may need to do a relocation against a local symbol, in
2334 which case we have to look up it's dynamic symbol index off
2335 the local symbol hash table. */
2336 if (eh && eh->dynindx != -1)
2337 dynindx = eh->dynindx;
2338 else
2339 dynindx
2340 = _bfd_elf_link_lookup_local_dynindx (info, hh->owner,
2341 hh->sym_indx);
2343 /* Create a dynamic relocation for this entry. Do include the output
2344 offset of the DLT entry since we need an absolute address in the
2345 resulting object file. */
2346 rel.r_offset = (hh->dlt_offset + sdlt->output_offset
2347 + sdlt->output_section->vma);
2348 if (eh && eh->type == STT_FUNC)
2349 rel.r_info = ELF64_R_INFO (dynindx, R_PARISC_FPTR64);
2350 else
2351 rel.r_info = ELF64_R_INFO (dynindx, R_PARISC_DIR64);
2352 rel.r_addend = 0;
2354 loc = sdltrel->contents;
2355 loc += sdltrel->reloc_count++ * sizeof (Elf64_External_Rela);
2356 bfd_elf64_swap_reloca_out (sdlt->output_section->owner, &rel, loc);
2358 return TRUE;
2361 /* Finalize the dynamic relocations. Specifically the FPTR relocations
2362 for dynamic functions used to initialize static data. */
2364 static bfd_boolean
2365 elf64_hppa_finalize_dynreloc (struct elf_link_hash_entry *eh,
2366 void *data)
2368 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
2369 struct bfd_link_info *info = (struct bfd_link_info *)data;
2370 struct elf64_hppa_link_hash_table *hppa_info;
2371 int dynamic_symbol;
2373 dynamic_symbol = elf64_hppa_dynamic_symbol_p (eh, info);
2375 if (!dynamic_symbol && !info->shared)
2376 return TRUE;
2378 if (hh->reloc_entries)
2380 struct elf64_hppa_dyn_reloc_entry *rent;
2381 int dynindx;
2383 hppa_info = hppa_link_hash_table (info);
2384 if (hppa_info == NULL)
2385 return FALSE;
2387 /* We may need to do a relocation against a local symbol, in
2388 which case we have to look up it's dynamic symbol index off
2389 the local symbol hash table. */
2390 if (eh->dynindx != -1)
2391 dynindx = eh->dynindx;
2392 else
2393 dynindx
2394 = _bfd_elf_link_lookup_local_dynindx (info, hh->owner,
2395 hh->sym_indx);
2397 for (rent = hh->reloc_entries; rent; rent = rent->next)
2399 Elf_Internal_Rela rel;
2400 bfd_byte *loc;
2402 /* Allocate one iff we are building a shared library, the relocation
2403 isn't a R_PARISC_FPTR64, or we don't want an opd entry. */
2404 if (!info->shared && rent->type == R_PARISC_FPTR64 && hh->want_opd)
2405 continue;
2407 /* Create a dynamic relocation for this entry.
2409 We need the output offset for the reloc's section because
2410 we are creating an absolute address in the resulting object
2411 file. */
2412 rel.r_offset = (rent->offset + rent->sec->output_offset
2413 + rent->sec->output_section->vma);
2415 /* An FPTR64 relocation implies that we took the address of
2416 a function and that the function has an entry in the .opd
2417 section. We want the FPTR64 relocation to reference the
2418 entry in .opd.
2420 We could munge the symbol value in the dynamic symbol table
2421 (in fact we already do for functions with global scope) to point
2422 to the .opd entry. Then we could use that dynamic symbol in
2423 this relocation.
2425 Or we could do something sensible, not munge the symbol's
2426 address and instead just use a different symbol to reference
2427 the .opd entry. At least that seems sensible until you
2428 realize there's no local dynamic symbols we can use for that
2429 purpose. Thus the hair in the check_relocs routine.
2431 We use a section symbol recorded by check_relocs as the
2432 base symbol for the relocation. The addend is the difference
2433 between the section symbol and the address of the .opd entry. */
2434 if (info->shared && rent->type == R_PARISC_FPTR64 && hh->want_opd)
2436 bfd_vma value, value2;
2438 /* First compute the address of the opd entry for this symbol. */
2439 value = (hh->opd_offset
2440 + hppa_info->opd_sec->output_section->vma
2441 + hppa_info->opd_sec->output_offset);
2443 /* Compute the value of the start of the section with
2444 the relocation. */
2445 value2 = (rent->sec->output_section->vma
2446 + rent->sec->output_offset);
2448 /* Compute the difference between the start of the section
2449 with the relocation and the opd entry. */
2450 value -= value2;
2452 /* The result becomes the addend of the relocation. */
2453 rel.r_addend = value;
2455 /* The section symbol becomes the symbol for the dynamic
2456 relocation. */
2457 dynindx
2458 = _bfd_elf_link_lookup_local_dynindx (info,
2459 rent->sec->owner,
2460 rent->sec_symndx);
2462 else
2463 rel.r_addend = rent->addend;
2465 rel.r_info = ELF64_R_INFO (dynindx, rent->type);
2467 loc = hppa_info->other_rel_sec->contents;
2468 loc += (hppa_info->other_rel_sec->reloc_count++
2469 * sizeof (Elf64_External_Rela));
2470 bfd_elf64_swap_reloca_out (hppa_info->other_rel_sec->output_section->owner,
2471 &rel, loc);
2475 return TRUE;
2478 /* Used to decide how to sort relocs in an optimal manner for the
2479 dynamic linker, before writing them out. */
2481 static enum elf_reloc_type_class
2482 elf64_hppa_reloc_type_class (const Elf_Internal_Rela *rela)
2484 if (ELF64_R_SYM (rela->r_info) == 0)
2485 return reloc_class_relative;
2487 switch ((int) ELF64_R_TYPE (rela->r_info))
2489 case R_PARISC_IPLT:
2490 return reloc_class_plt;
2491 case R_PARISC_COPY:
2492 return reloc_class_copy;
2493 default:
2494 return reloc_class_normal;
2498 /* Finish up the dynamic sections. */
2500 static bfd_boolean
2501 elf64_hppa_finish_dynamic_sections (bfd *output_bfd,
2502 struct bfd_link_info *info)
2504 bfd *dynobj;
2505 asection *sdyn;
2506 struct elf64_hppa_link_hash_table *hppa_info;
2508 hppa_info = hppa_link_hash_table (info);
2509 if (hppa_info == NULL)
2510 return FALSE;
2512 /* Finalize the contents of the .opd section. */
2513 elf_link_hash_traverse (elf_hash_table (info),
2514 elf64_hppa_finalize_opd,
2515 info);
2517 elf_link_hash_traverse (elf_hash_table (info),
2518 elf64_hppa_finalize_dynreloc,
2519 info);
2521 /* Finalize the contents of the .dlt section. */
2522 dynobj = elf_hash_table (info)->dynobj;
2523 /* Finalize the contents of the .dlt section. */
2524 elf_link_hash_traverse (elf_hash_table (info),
2525 elf64_hppa_finalize_dlt,
2526 info);
2528 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2530 if (elf_hash_table (info)->dynamic_sections_created)
2532 Elf64_External_Dyn *dyncon, *dynconend;
2534 BFD_ASSERT (sdyn != NULL);
2536 dyncon = (Elf64_External_Dyn *) sdyn->contents;
2537 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
2538 for (; dyncon < dynconend; dyncon++)
2540 Elf_Internal_Dyn dyn;
2541 asection *s;
2543 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
2545 switch (dyn.d_tag)
2547 default:
2548 break;
2550 case DT_HP_LOAD_MAP:
2551 /* Compute the absolute address of 16byte scratchpad area
2552 for the dynamic linker.
2554 By convention the linker script will allocate the scratchpad
2555 area at the start of the .data section. So all we have to
2556 to is find the start of the .data section. */
2557 s = bfd_get_section_by_name (output_bfd, ".data");
2558 dyn.d_un.d_ptr = s->vma;
2559 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2560 break;
2562 case DT_PLTGOT:
2563 /* HP's use PLTGOT to set the GOT register. */
2564 dyn.d_un.d_ptr = _bfd_get_gp_value (output_bfd);
2565 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2566 break;
2568 case DT_JMPREL:
2569 s = hppa_info->plt_rel_sec;
2570 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2571 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2572 break;
2574 case DT_PLTRELSZ:
2575 s = hppa_info->plt_rel_sec;
2576 dyn.d_un.d_val = s->size;
2577 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2578 break;
2580 case DT_RELA:
2581 s = hppa_info->other_rel_sec;
2582 if (! s || ! s->size)
2583 s = hppa_info->dlt_rel_sec;
2584 if (! s || ! s->size)
2585 s = hppa_info->opd_rel_sec;
2586 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2587 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2588 break;
2590 case DT_RELASZ:
2591 s = hppa_info->other_rel_sec;
2592 dyn.d_un.d_val = s->size;
2593 s = hppa_info->dlt_rel_sec;
2594 dyn.d_un.d_val += s->size;
2595 s = hppa_info->opd_rel_sec;
2596 dyn.d_un.d_val += s->size;
2597 /* There is some question about whether or not the size of
2598 the PLT relocs should be included here. HP's tools do
2599 it, so we'll emulate them. */
2600 s = hppa_info->plt_rel_sec;
2601 dyn.d_un.d_val += s->size;
2602 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2603 break;
2609 return TRUE;
2612 /* Support for core dump NOTE sections. */
2614 static bfd_boolean
2615 elf64_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2617 int offset;
2618 size_t size;
2620 switch (note->descsz)
2622 default:
2623 return FALSE;
2625 case 760: /* Linux/hppa */
2626 /* pr_cursig */
2627 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
2629 /* pr_pid */
2630 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 32);
2632 /* pr_reg */
2633 offset = 112;
2634 size = 640;
2636 break;
2639 /* Make a ".reg/999" section. */
2640 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2641 size, note->descpos + offset);
2644 static bfd_boolean
2645 elf64_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2647 char * command;
2648 int n;
2650 switch (note->descsz)
2652 default:
2653 return FALSE;
2655 case 136: /* Linux/hppa elf_prpsinfo. */
2656 elf_tdata (abfd)->core_program
2657 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2658 elf_tdata (abfd)->core_command
2659 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2662 /* Note that for some reason, a spurious space is tacked
2663 onto the end of the args in some (at least one anyway)
2664 implementations, so strip it off if it exists. */
2665 command = elf_tdata (abfd)->core_command;
2666 n = strlen (command);
2668 if (0 < n && command[n - 1] == ' ')
2669 command[n - 1] = '\0';
2671 return TRUE;
2674 /* Return the number of additional phdrs we will need.
2676 The generic ELF code only creates PT_PHDRs for executables. The HP
2677 dynamic linker requires PT_PHDRs for dynamic libraries too.
2679 This routine indicates that the backend needs one additional program
2680 header for that case.
2682 Note we do not have access to the link info structure here, so we have
2683 to guess whether or not we are building a shared library based on the
2684 existence of a .interp section. */
2686 static int
2687 elf64_hppa_additional_program_headers (bfd *abfd,
2688 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2690 asection *s;
2692 /* If we are creating a shared library, then we have to create a
2693 PT_PHDR segment. HP's dynamic linker chokes without it. */
2694 s = bfd_get_section_by_name (abfd, ".interp");
2695 if (! s)
2696 return 1;
2697 return 0;
2700 /* Allocate and initialize any program headers required by this
2701 specific backend.
2703 The generic ELF code only creates PT_PHDRs for executables. The HP
2704 dynamic linker requires PT_PHDRs for dynamic libraries too.
2706 This allocates the PT_PHDR and initializes it in a manner suitable
2707 for the HP linker.
2709 Note we do not have access to the link info structure here, so we have
2710 to guess whether or not we are building a shared library based on the
2711 existence of a .interp section. */
2713 static bfd_boolean
2714 elf64_hppa_modify_segment_map (bfd *abfd,
2715 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2717 struct elf_segment_map *m;
2718 asection *s;
2720 s = bfd_get_section_by_name (abfd, ".interp");
2721 if (! s)
2723 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2724 if (m->p_type == PT_PHDR)
2725 break;
2726 if (m == NULL)
2728 m = ((struct elf_segment_map *)
2729 bfd_zalloc (abfd, (bfd_size_type) sizeof *m));
2730 if (m == NULL)
2731 return FALSE;
2733 m->p_type = PT_PHDR;
2734 m->p_flags = PF_R | PF_X;
2735 m->p_flags_valid = 1;
2736 m->p_paddr_valid = 1;
2737 m->includes_phdrs = 1;
2739 m->next = elf_tdata (abfd)->segment_map;
2740 elf_tdata (abfd)->segment_map = m;
2744 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2745 if (m->p_type == PT_LOAD)
2747 unsigned int i;
2749 for (i = 0; i < m->count; i++)
2751 /* The code "hint" is not really a hint. It is a requirement
2752 for certain versions of the HP dynamic linker. Worse yet,
2753 it must be set even if the shared library does not have
2754 any code in its "text" segment (thus the check for .hash
2755 to catch this situation). */
2756 if (m->sections[i]->flags & SEC_CODE
2757 || (strcmp (m->sections[i]->name, ".hash") == 0))
2758 m->p_flags |= (PF_X | PF_HP_CODE);
2762 return TRUE;
2765 /* Called when writing out an object file to decide the type of a
2766 symbol. */
2767 static int
2768 elf64_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym,
2769 int type)
2771 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
2772 return STT_PARISC_MILLI;
2773 else
2774 return type;
2777 /* Support HP specific sections for core files. */
2779 static bfd_boolean
2780 elf64_hppa_section_from_phdr (bfd *abfd, Elf_Internal_Phdr *hdr, int sec_index,
2781 const char *typename)
2783 if (hdr->p_type == PT_HP_CORE_KERNEL)
2785 asection *sect;
2787 if (!_bfd_elf_make_section_from_phdr (abfd, hdr, sec_index, typename))
2788 return FALSE;
2790 sect = bfd_make_section_anyway (abfd, ".kernel");
2791 if (sect == NULL)
2792 return FALSE;
2793 sect->size = hdr->p_filesz;
2794 sect->filepos = hdr->p_offset;
2795 sect->flags = SEC_HAS_CONTENTS | SEC_READONLY;
2796 return TRUE;
2799 if (hdr->p_type == PT_HP_CORE_PROC)
2801 int sig;
2803 if (bfd_seek (abfd, hdr->p_offset, SEEK_SET) != 0)
2804 return FALSE;
2805 if (bfd_bread (&sig, 4, abfd) != 4)
2806 return FALSE;
2808 elf_tdata (abfd)->core_signal = sig;
2810 if (!_bfd_elf_make_section_from_phdr (abfd, hdr, sec_index, typename))
2811 return FALSE;
2813 /* GDB uses the ".reg" section to read register contents. */
2814 return _bfd_elfcore_make_pseudosection (abfd, ".reg", hdr->p_filesz,
2815 hdr->p_offset);
2818 if (hdr->p_type == PT_HP_CORE_LOADABLE
2819 || hdr->p_type == PT_HP_CORE_STACK
2820 || hdr->p_type == PT_HP_CORE_MMF)
2821 hdr->p_type = PT_LOAD;
2823 return _bfd_elf_make_section_from_phdr (abfd, hdr, sec_index, typename);
2826 /* Hook called by the linker routine which adds symbols from an object
2827 file. HP's libraries define symbols with HP specific section
2828 indices, which we have to handle. */
2830 static bfd_boolean
2831 elf_hppa_add_symbol_hook (bfd *abfd,
2832 struct bfd_link_info *info ATTRIBUTE_UNUSED,
2833 Elf_Internal_Sym *sym,
2834 const char **namep ATTRIBUTE_UNUSED,
2835 flagword *flagsp ATTRIBUTE_UNUSED,
2836 asection **secp,
2837 bfd_vma *valp)
2839 unsigned int sec_index = sym->st_shndx;
2841 switch (sec_index)
2843 case SHN_PARISC_ANSI_COMMON:
2844 *secp = bfd_make_section_old_way (abfd, ".PARISC.ansi.common");
2845 (*secp)->flags |= SEC_IS_COMMON;
2846 *valp = sym->st_size;
2847 break;
2849 case SHN_PARISC_HUGE_COMMON:
2850 *secp = bfd_make_section_old_way (abfd, ".PARISC.huge.common");
2851 (*secp)->flags |= SEC_IS_COMMON;
2852 *valp = sym->st_size;
2853 break;
2856 return TRUE;
2859 static bfd_boolean
2860 elf_hppa_unmark_useless_dynamic_symbols (struct elf_link_hash_entry *h,
2861 void *data)
2863 struct bfd_link_info *info = data;
2865 if (h->root.type == bfd_link_hash_warning)
2866 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2868 /* If we are not creating a shared library, and this symbol is
2869 referenced by a shared library but is not defined anywhere, then
2870 the generic code will warn that it is undefined.
2872 This behavior is undesirable on HPs since the standard shared
2873 libraries contain references to undefined symbols.
2875 So we twiddle the flags associated with such symbols so that they
2876 will not trigger the warning. ?!? FIXME. This is horribly fragile.
2878 Ultimately we should have better controls over the generic ELF BFD
2879 linker code. */
2880 if (! info->relocatable
2881 && info->unresolved_syms_in_shared_libs != RM_IGNORE
2882 && h->root.type == bfd_link_hash_undefined
2883 && h->ref_dynamic
2884 && !h->ref_regular)
2886 h->ref_dynamic = 0;
2887 h->pointer_equality_needed = 1;
2890 return TRUE;
2893 static bfd_boolean
2894 elf_hppa_remark_useless_dynamic_symbols (struct elf_link_hash_entry *h,
2895 void *data)
2897 struct bfd_link_info *info = data;
2899 if (h->root.type == bfd_link_hash_warning)
2900 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2902 /* If we are not creating a shared library, and this symbol is
2903 referenced by a shared library but is not defined anywhere, then
2904 the generic code will warn that it is undefined.
2906 This behavior is undesirable on HPs since the standard shared
2907 libraries contain references to undefined symbols.
2909 So we twiddle the flags associated with such symbols so that they
2910 will not trigger the warning. ?!? FIXME. This is horribly fragile.
2912 Ultimately we should have better controls over the generic ELF BFD
2913 linker code. */
2914 if (! info->relocatable
2915 && info->unresolved_syms_in_shared_libs != RM_IGNORE
2916 && h->root.type == bfd_link_hash_undefined
2917 && !h->ref_dynamic
2918 && !h->ref_regular
2919 && h->pointer_equality_needed)
2921 h->ref_dynamic = 1;
2922 h->pointer_equality_needed = 0;
2925 return TRUE;
2928 static bfd_boolean
2929 elf_hppa_is_dynamic_loader_symbol (const char *name)
2931 return (! strcmp (name, "__CPU_REVISION")
2932 || ! strcmp (name, "__CPU_KEYBITS_1")
2933 || ! strcmp (name, "__SYSTEM_ID_D")
2934 || ! strcmp (name, "__FPU_MODEL")
2935 || ! strcmp (name, "__FPU_REVISION")
2936 || ! strcmp (name, "__ARGC")
2937 || ! strcmp (name, "__ARGV")
2938 || ! strcmp (name, "__ENVP")
2939 || ! strcmp (name, "__TLS_SIZE_D")
2940 || ! strcmp (name, "__LOAD_INFO")
2941 || ! strcmp (name, "__systab"));
2944 /* Record the lowest address for the data and text segments. */
2945 static void
2946 elf_hppa_record_segment_addrs (bfd *abfd,
2947 asection *section,
2948 void *data)
2950 struct elf64_hppa_link_hash_table *hppa_info = data;
2952 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
2954 bfd_vma value;
2955 Elf_Internal_Phdr *p;
2957 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
2958 BFD_ASSERT (p != NULL);
2959 value = p->p_vaddr;
2961 if (section->flags & SEC_READONLY)
2963 if (value < hppa_info->text_segment_base)
2964 hppa_info->text_segment_base = value;
2966 else
2968 if (value < hppa_info->data_segment_base)
2969 hppa_info->data_segment_base = value;
2974 /* Called after we have seen all the input files/sections, but before
2975 final symbol resolution and section placement has been determined.
2977 We use this hook to (possibly) provide a value for __gp, then we
2978 fall back to the generic ELF final link routine. */
2980 static bfd_boolean
2981 elf_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
2983 bfd_boolean retval;
2984 struct elf64_hppa_link_hash_table *hppa_info = hppa_link_hash_table (info);
2986 if (hppa_info == NULL)
2987 return FALSE;
2989 if (! info->relocatable)
2991 struct elf_link_hash_entry *gp;
2992 bfd_vma gp_val;
2994 /* The linker script defines a value for __gp iff it was referenced
2995 by one of the objects being linked. First try to find the symbol
2996 in the hash table. If that fails, just compute the value __gp
2997 should have had. */
2998 gp = elf_link_hash_lookup (elf_hash_table (info), "__gp", FALSE,
2999 FALSE, FALSE);
3001 if (gp)
3004 /* Adjust the value of __gp as we may want to slide it into the
3005 .plt section so that the stubs can access PLT entries without
3006 using an addil sequence. */
3007 gp->root.u.def.value += hppa_info->gp_offset;
3009 gp_val = (gp->root.u.def.section->output_section->vma
3010 + gp->root.u.def.section->output_offset
3011 + gp->root.u.def.value);
3013 else
3015 asection *sec;
3017 /* First look for a .plt section. If found, then __gp is the
3018 address of the .plt + gp_offset.
3020 If no .plt is found, then look for .dlt, .opd and .data (in
3021 that order) and set __gp to the base address of whichever
3022 section is found first. */
3024 sec = hppa_info->plt_sec;
3025 if (sec && ! (sec->flags & SEC_EXCLUDE))
3026 gp_val = (sec->output_offset
3027 + sec->output_section->vma
3028 + hppa_info->gp_offset);
3029 else
3031 sec = hppa_info->dlt_sec;
3032 if (!sec || (sec->flags & SEC_EXCLUDE))
3033 sec = hppa_info->opd_sec;
3034 if (!sec || (sec->flags & SEC_EXCLUDE))
3035 sec = bfd_get_section_by_name (abfd, ".data");
3036 if (!sec || (sec->flags & SEC_EXCLUDE))
3037 gp_val = 0;
3038 else
3039 gp_val = sec->output_offset + sec->output_section->vma;
3043 /* Install whatever value we found/computed for __gp. */
3044 _bfd_set_gp_value (abfd, gp_val);
3047 /* We need to know the base of the text and data segments so that we
3048 can perform SEGREL relocations. We will record the base addresses
3049 when we encounter the first SEGREL relocation. */
3050 hppa_info->text_segment_base = (bfd_vma)-1;
3051 hppa_info->data_segment_base = (bfd_vma)-1;
3053 /* HP's shared libraries have references to symbols that are not
3054 defined anywhere. The generic ELF BFD linker code will complain
3055 about such symbols.
3057 So we detect the losing case and arrange for the flags on the symbol
3058 to indicate that it was never referenced. This keeps the generic
3059 ELF BFD link code happy and appears to not create any secondary
3060 problems. Ultimately we need a way to control the behavior of the
3061 generic ELF BFD link code better. */
3062 elf_link_hash_traverse (elf_hash_table (info),
3063 elf_hppa_unmark_useless_dynamic_symbols,
3064 info);
3066 /* Invoke the regular ELF backend linker to do all the work. */
3067 retval = bfd_elf_final_link (abfd, info);
3069 elf_link_hash_traverse (elf_hash_table (info),
3070 elf_hppa_remark_useless_dynamic_symbols,
3071 info);
3073 /* If we're producing a final executable, sort the contents of the
3074 unwind section. */
3075 if (retval && !info->relocatable)
3076 retval = elf_hppa_sort_unwind (abfd);
3078 return retval;
3081 /* Relocate the given INSN. VALUE should be the actual value we want
3082 to insert into the instruction, ie by this point we should not be
3083 concerned with computing an offset relative to the DLT, PC, etc.
3084 Instead this routine is meant to handle the bit manipulations needed
3085 to insert the relocation into the given instruction. */
3087 static int
3088 elf_hppa_relocate_insn (int insn, int sym_value, unsigned int r_type)
3090 switch (r_type)
3092 /* This is any 22 bit branch. In PA2.0 syntax it corresponds to
3093 the "B" instruction. */
3094 case R_PARISC_PCREL22F:
3095 case R_PARISC_PCREL22C:
3096 return (insn & ~0x3ff1ffd) | re_assemble_22 (sym_value);
3098 /* This is any 12 bit branch. */
3099 case R_PARISC_PCREL12F:
3100 return (insn & ~0x1ffd) | re_assemble_12 (sym_value);
3102 /* This is any 17 bit branch. In PA2.0 syntax it also corresponds
3103 to the "B" instruction as well as BE. */
3104 case R_PARISC_PCREL17F:
3105 case R_PARISC_DIR17F:
3106 case R_PARISC_DIR17R:
3107 case R_PARISC_PCREL17C:
3108 case R_PARISC_PCREL17R:
3109 return (insn & ~0x1f1ffd) | re_assemble_17 (sym_value);
3111 /* ADDIL or LDIL instructions. */
3112 case R_PARISC_DLTREL21L:
3113 case R_PARISC_DLTIND21L:
3114 case R_PARISC_LTOFF_FPTR21L:
3115 case R_PARISC_PCREL21L:
3116 case R_PARISC_LTOFF_TP21L:
3117 case R_PARISC_DPREL21L:
3118 case R_PARISC_PLTOFF21L:
3119 case R_PARISC_DIR21L:
3120 return (insn & ~0x1fffff) | re_assemble_21 (sym_value);
3122 /* LDO and integer loads/stores with 14 bit displacements. */
3123 case R_PARISC_DLTREL14R:
3124 case R_PARISC_DLTREL14F:
3125 case R_PARISC_DLTIND14R:
3126 case R_PARISC_DLTIND14F:
3127 case R_PARISC_LTOFF_FPTR14R:
3128 case R_PARISC_PCREL14R:
3129 case R_PARISC_PCREL14F:
3130 case R_PARISC_LTOFF_TP14R:
3131 case R_PARISC_LTOFF_TP14F:
3132 case R_PARISC_DPREL14R:
3133 case R_PARISC_DPREL14F:
3134 case R_PARISC_PLTOFF14R:
3135 case R_PARISC_PLTOFF14F:
3136 case R_PARISC_DIR14R:
3137 case R_PARISC_DIR14F:
3138 return (insn & ~0x3fff) | low_sign_unext (sym_value, 14);
3140 /* PA2.0W LDO and integer loads/stores with 16 bit displacements. */
3141 case R_PARISC_LTOFF_FPTR16F:
3142 case R_PARISC_PCREL16F:
3143 case R_PARISC_LTOFF_TP16F:
3144 case R_PARISC_GPREL16F:
3145 case R_PARISC_PLTOFF16F:
3146 case R_PARISC_DIR16F:
3147 case R_PARISC_LTOFF16F:
3148 return (insn & ~0xffff) | re_assemble_16 (sym_value);
3150 /* Doubleword loads and stores with a 14 bit displacement. */
3151 case R_PARISC_DLTREL14DR:
3152 case R_PARISC_DLTIND14DR:
3153 case R_PARISC_LTOFF_FPTR14DR:
3154 case R_PARISC_LTOFF_FPTR16DF:
3155 case R_PARISC_PCREL14DR:
3156 case R_PARISC_PCREL16DF:
3157 case R_PARISC_LTOFF_TP14DR:
3158 case R_PARISC_LTOFF_TP16DF:
3159 case R_PARISC_DPREL14DR:
3160 case R_PARISC_GPREL16DF:
3161 case R_PARISC_PLTOFF14DR:
3162 case R_PARISC_PLTOFF16DF:
3163 case R_PARISC_DIR14DR:
3164 case R_PARISC_DIR16DF:
3165 case R_PARISC_LTOFF16DF:
3166 return (insn & ~0x3ff1) | (((sym_value & 0x2000) >> 13)
3167 | ((sym_value & 0x1ff8) << 1));
3169 /* Floating point single word load/store instructions. */
3170 case R_PARISC_DLTREL14WR:
3171 case R_PARISC_DLTIND14WR:
3172 case R_PARISC_LTOFF_FPTR14WR:
3173 case R_PARISC_LTOFF_FPTR16WF:
3174 case R_PARISC_PCREL14WR:
3175 case R_PARISC_PCREL16WF:
3176 case R_PARISC_LTOFF_TP14WR:
3177 case R_PARISC_LTOFF_TP16WF:
3178 case R_PARISC_DPREL14WR:
3179 case R_PARISC_GPREL16WF:
3180 case R_PARISC_PLTOFF14WR:
3181 case R_PARISC_PLTOFF16WF:
3182 case R_PARISC_DIR16WF:
3183 case R_PARISC_DIR14WR:
3184 case R_PARISC_LTOFF16WF:
3185 return (insn & ~0x3ff9) | (((sym_value & 0x2000) >> 13)
3186 | ((sym_value & 0x1ffc) << 1));
3188 default:
3189 return insn;
3193 /* Compute the value for a relocation (REL) during a final link stage,
3194 then insert the value into the proper location in CONTENTS.
3196 VALUE is a tentative value for the relocation and may be overridden
3197 and modified here based on the specific relocation to be performed.
3199 For example we do conversions for PC-relative branches in this routine
3200 or redirection of calls to external routines to stubs.
3202 The work of actually applying the relocation is left to a helper
3203 routine in an attempt to reduce the complexity and size of this
3204 function. */
3206 static bfd_reloc_status_type
3207 elf_hppa_final_link_relocate (Elf_Internal_Rela *rel,
3208 bfd *input_bfd,
3209 bfd *output_bfd,
3210 asection *input_section,
3211 bfd_byte *contents,
3212 bfd_vma value,
3213 struct bfd_link_info *info,
3214 asection *sym_sec,
3215 struct elf_link_hash_entry *eh)
3217 struct elf64_hppa_link_hash_table *hppa_info = hppa_link_hash_table (info);
3218 struct elf64_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
3219 bfd_vma *local_offsets;
3220 Elf_Internal_Shdr *symtab_hdr;
3221 int insn;
3222 bfd_vma max_branch_offset = 0;
3223 bfd_vma offset = rel->r_offset;
3224 bfd_signed_vma addend = rel->r_addend;
3225 reloc_howto_type *howto = elf_hppa_howto_table + ELF_R_TYPE (rel->r_info);
3226 unsigned int r_symndx = ELF_R_SYM (rel->r_info);
3227 unsigned int r_type = howto->type;
3228 bfd_byte *hit_data = contents + offset;
3230 if (hppa_info == NULL)
3231 return bfd_reloc_notsupported;
3233 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3234 local_offsets = elf_local_got_offsets (input_bfd);
3235 insn = bfd_get_32 (input_bfd, hit_data);
3237 switch (r_type)
3239 case R_PARISC_NONE:
3240 break;
3242 /* Basic function call support.
3244 Note for a call to a function defined in another dynamic library
3245 we want to redirect the call to a stub. */
3247 /* PC relative relocs without an implicit offset. */
3248 case R_PARISC_PCREL21L:
3249 case R_PARISC_PCREL14R:
3250 case R_PARISC_PCREL14F:
3251 case R_PARISC_PCREL14WR:
3252 case R_PARISC_PCREL14DR:
3253 case R_PARISC_PCREL16F:
3254 case R_PARISC_PCREL16WF:
3255 case R_PARISC_PCREL16DF:
3257 /* If this is a call to a function defined in another dynamic
3258 library, then redirect the call to the local stub for this
3259 function. */
3260 if (sym_sec == NULL || sym_sec->output_section == NULL)
3261 value = (hh->stub_offset + hppa_info->stub_sec->output_offset
3262 + hppa_info->stub_sec->output_section->vma);
3264 /* Turn VALUE into a proper PC relative address. */
3265 value -= (offset + input_section->output_offset
3266 + input_section->output_section->vma);
3268 /* Adjust for any field selectors. */
3269 if (r_type == R_PARISC_PCREL21L)
3270 value = hppa_field_adjust (value, -8 + addend, e_lsel);
3271 else if (r_type == R_PARISC_PCREL14F
3272 || r_type == R_PARISC_PCREL16F
3273 || r_type == R_PARISC_PCREL16WF
3274 || r_type == R_PARISC_PCREL16DF)
3275 value = hppa_field_adjust (value, -8 + addend, e_fsel);
3276 else
3277 value = hppa_field_adjust (value, -8 + addend, e_rsel);
3279 /* Apply the relocation to the given instruction. */
3280 insn = elf_hppa_relocate_insn (insn, (int) value, r_type);
3281 break;
3284 case R_PARISC_PCREL12F:
3285 case R_PARISC_PCREL22F:
3286 case R_PARISC_PCREL17F:
3287 case R_PARISC_PCREL22C:
3288 case R_PARISC_PCREL17C:
3289 case R_PARISC_PCREL17R:
3291 /* If this is a call to a function defined in another dynamic
3292 library, then redirect the call to the local stub for this
3293 function. */
3294 if (sym_sec == NULL || sym_sec->output_section == NULL)
3295 value = (hh->stub_offset + hppa_info->stub_sec->output_offset
3296 + hppa_info->stub_sec->output_section->vma);
3298 /* Turn VALUE into a proper PC relative address. */
3299 value -= (offset + input_section->output_offset
3300 + input_section->output_section->vma);
3301 addend -= 8;
3303 if (r_type == (unsigned int) R_PARISC_PCREL22F)
3304 max_branch_offset = (1 << (22-1)) << 2;
3305 else if (r_type == (unsigned int) R_PARISC_PCREL17F)
3306 max_branch_offset = (1 << (17-1)) << 2;
3307 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3308 max_branch_offset = (1 << (12-1)) << 2;
3310 /* Make sure we can reach the branch target. */
3311 if (max_branch_offset != 0
3312 && value + addend + max_branch_offset >= 2*max_branch_offset)
3314 (*_bfd_error_handler)
3315 (_("%B(%A+0x%lx): cannot reach %s"),
3316 input_bfd,
3317 input_section,
3318 offset,
3319 eh->root.root.string);
3320 bfd_set_error (bfd_error_bad_value);
3321 return bfd_reloc_notsupported;
3324 /* Adjust for any field selectors. */
3325 if (r_type == R_PARISC_PCREL17R)
3326 value = hppa_field_adjust (value, addend, e_rsel);
3327 else
3328 value = hppa_field_adjust (value, addend, e_fsel);
3330 /* All branches are implicitly shifted by 2 places. */
3331 value >>= 2;
3333 /* Apply the relocation to the given instruction. */
3334 insn = elf_hppa_relocate_insn (insn, (int) value, r_type);
3335 break;
3338 /* Indirect references to data through the DLT. */
3339 case R_PARISC_DLTIND14R:
3340 case R_PARISC_DLTIND14F:
3341 case R_PARISC_DLTIND14DR:
3342 case R_PARISC_DLTIND14WR:
3343 case R_PARISC_DLTIND21L:
3344 case R_PARISC_LTOFF_FPTR14R:
3345 case R_PARISC_LTOFF_FPTR14DR:
3346 case R_PARISC_LTOFF_FPTR14WR:
3347 case R_PARISC_LTOFF_FPTR21L:
3348 case R_PARISC_LTOFF_FPTR16F:
3349 case R_PARISC_LTOFF_FPTR16WF:
3350 case R_PARISC_LTOFF_FPTR16DF:
3351 case R_PARISC_LTOFF_TP21L:
3352 case R_PARISC_LTOFF_TP14R:
3353 case R_PARISC_LTOFF_TP14F:
3354 case R_PARISC_LTOFF_TP14WR:
3355 case R_PARISC_LTOFF_TP14DR:
3356 case R_PARISC_LTOFF_TP16F:
3357 case R_PARISC_LTOFF_TP16WF:
3358 case R_PARISC_LTOFF_TP16DF:
3359 case R_PARISC_LTOFF16F:
3360 case R_PARISC_LTOFF16WF:
3361 case R_PARISC_LTOFF16DF:
3363 bfd_vma off;
3365 /* If this relocation was against a local symbol, then we still
3366 have not set up the DLT entry (it's not convenient to do so
3367 in the "finalize_dlt" routine because it is difficult to get
3368 to the local symbol's value).
3370 So, if this is a local symbol (h == NULL), then we need to
3371 fill in its DLT entry.
3373 Similarly we may still need to set up an entry in .opd for
3374 a local function which had its address taken. */
3375 if (hh == NULL)
3377 bfd_vma *local_opd_offsets, *local_dlt_offsets;
3379 if (local_offsets == NULL)
3380 abort ();
3382 /* Now do .opd creation if needed. */
3383 if (r_type == R_PARISC_LTOFF_FPTR14R
3384 || r_type == R_PARISC_LTOFF_FPTR14DR
3385 || r_type == R_PARISC_LTOFF_FPTR14WR
3386 || r_type == R_PARISC_LTOFF_FPTR21L
3387 || r_type == R_PARISC_LTOFF_FPTR16F
3388 || r_type == R_PARISC_LTOFF_FPTR16WF
3389 || r_type == R_PARISC_LTOFF_FPTR16DF)
3391 local_opd_offsets = local_offsets + 2 * symtab_hdr->sh_info;
3392 off = local_opd_offsets[r_symndx];
3394 /* The last bit records whether we've already initialised
3395 this local .opd entry. */
3396 if ((off & 1) != 0)
3398 BFD_ASSERT (off != (bfd_vma) -1);
3399 off &= ~1;
3401 else
3403 local_opd_offsets[r_symndx] |= 1;
3405 /* The first two words of an .opd entry are zero. */
3406 memset (hppa_info->opd_sec->contents + off, 0, 16);
3408 /* The next word is the address of the function. */
3409 bfd_put_64 (hppa_info->opd_sec->owner, value + addend,
3410 (hppa_info->opd_sec->contents + off + 16));
3412 /* The last word is our local __gp value. */
3413 value = _bfd_get_gp_value
3414 (hppa_info->opd_sec->output_section->owner);
3415 bfd_put_64 (hppa_info->opd_sec->owner, value,
3416 (hppa_info->opd_sec->contents + off + 24));
3419 /* The DLT value is the address of the .opd entry. */
3420 value = (off
3421 + hppa_info->opd_sec->output_offset
3422 + hppa_info->opd_sec->output_section->vma);
3423 addend = 0;
3426 local_dlt_offsets = local_offsets;
3427 off = local_dlt_offsets[r_symndx];
3429 if ((off & 1) != 0)
3431 BFD_ASSERT (off != (bfd_vma) -1);
3432 off &= ~1;
3434 else
3436 local_dlt_offsets[r_symndx] |= 1;
3437 bfd_put_64 (hppa_info->dlt_sec->owner,
3438 value + addend,
3439 hppa_info->dlt_sec->contents + off);
3442 else
3443 off = hh->dlt_offset;
3445 /* We want the value of the DLT offset for this symbol, not
3446 the symbol's actual address. Note that __gp may not point
3447 to the start of the DLT, so we have to compute the absolute
3448 address, then subtract out the value of __gp. */
3449 value = (off
3450 + hppa_info->dlt_sec->output_offset
3451 + hppa_info->dlt_sec->output_section->vma);
3452 value -= _bfd_get_gp_value (output_bfd);
3454 /* All DLTIND relocations are basically the same at this point,
3455 except that we need different field selectors for the 21bit
3456 version vs the 14bit versions. */
3457 if (r_type == R_PARISC_DLTIND21L
3458 || r_type == R_PARISC_LTOFF_FPTR21L
3459 || r_type == R_PARISC_LTOFF_TP21L)
3460 value = hppa_field_adjust (value, 0, e_lsel);
3461 else if (r_type == R_PARISC_DLTIND14F
3462 || r_type == R_PARISC_LTOFF_FPTR16F
3463 || r_type == R_PARISC_LTOFF_FPTR16WF
3464 || r_type == R_PARISC_LTOFF_FPTR16DF
3465 || r_type == R_PARISC_LTOFF16F
3466 || r_type == R_PARISC_LTOFF16DF
3467 || r_type == R_PARISC_LTOFF16WF
3468 || r_type == R_PARISC_LTOFF_TP16F
3469 || r_type == R_PARISC_LTOFF_TP16WF
3470 || r_type == R_PARISC_LTOFF_TP16DF)
3471 value = hppa_field_adjust (value, 0, e_fsel);
3472 else
3473 value = hppa_field_adjust (value, 0, e_rsel);
3475 insn = elf_hppa_relocate_insn (insn, (int) value, r_type);
3476 break;
3479 case R_PARISC_DLTREL14R:
3480 case R_PARISC_DLTREL14F:
3481 case R_PARISC_DLTREL14DR:
3482 case R_PARISC_DLTREL14WR:
3483 case R_PARISC_DLTREL21L:
3484 case R_PARISC_DPREL21L:
3485 case R_PARISC_DPREL14WR:
3486 case R_PARISC_DPREL14DR:
3487 case R_PARISC_DPREL14R:
3488 case R_PARISC_DPREL14F:
3489 case R_PARISC_GPREL16F:
3490 case R_PARISC_GPREL16WF:
3491 case R_PARISC_GPREL16DF:
3493 /* Subtract out the global pointer value to make value a DLT
3494 relative address. */
3495 value -= _bfd_get_gp_value (output_bfd);
3497 /* All DLTREL relocations are basically the same at this point,
3498 except that we need different field selectors for the 21bit
3499 version vs the 14bit versions. */
3500 if (r_type == R_PARISC_DLTREL21L
3501 || r_type == R_PARISC_DPREL21L)
3502 value = hppa_field_adjust (value, addend, e_lrsel);
3503 else if (r_type == R_PARISC_DLTREL14F
3504 || r_type == R_PARISC_DPREL14F
3505 || r_type == R_PARISC_GPREL16F
3506 || r_type == R_PARISC_GPREL16WF
3507 || r_type == R_PARISC_GPREL16DF)
3508 value = hppa_field_adjust (value, addend, e_fsel);
3509 else
3510 value = hppa_field_adjust (value, addend, e_rrsel);
3512 insn = elf_hppa_relocate_insn (insn, (int) value, r_type);
3513 break;
3516 case R_PARISC_DIR21L:
3517 case R_PARISC_DIR17R:
3518 case R_PARISC_DIR17F:
3519 case R_PARISC_DIR14R:
3520 case R_PARISC_DIR14F:
3521 case R_PARISC_DIR14WR:
3522 case R_PARISC_DIR14DR:
3523 case R_PARISC_DIR16F:
3524 case R_PARISC_DIR16WF:
3525 case R_PARISC_DIR16DF:
3527 /* All DIR relocations are basically the same at this point,
3528 except that branch offsets need to be divided by four, and
3529 we need different field selectors. Note that we don't
3530 redirect absolute calls to local stubs. */
3532 if (r_type == R_PARISC_DIR21L)
3533 value = hppa_field_adjust (value, addend, e_lrsel);
3534 else if (r_type == R_PARISC_DIR17F
3535 || r_type == R_PARISC_DIR16F
3536 || r_type == R_PARISC_DIR16WF
3537 || r_type == R_PARISC_DIR16DF
3538 || r_type == R_PARISC_DIR14F)
3539 value = hppa_field_adjust (value, addend, e_fsel);
3540 else
3541 value = hppa_field_adjust (value, addend, e_rrsel);
3543 if (r_type == R_PARISC_DIR17R || r_type == R_PARISC_DIR17F)
3544 /* All branches are implicitly shifted by 2 places. */
3545 value >>= 2;
3547 insn = elf_hppa_relocate_insn (insn, (int) value, r_type);
3548 break;
3551 case R_PARISC_PLTOFF21L:
3552 case R_PARISC_PLTOFF14R:
3553 case R_PARISC_PLTOFF14F:
3554 case R_PARISC_PLTOFF14WR:
3555 case R_PARISC_PLTOFF14DR:
3556 case R_PARISC_PLTOFF16F:
3557 case R_PARISC_PLTOFF16WF:
3558 case R_PARISC_PLTOFF16DF:
3560 /* We want the value of the PLT offset for this symbol, not
3561 the symbol's actual address. Note that __gp may not point
3562 to the start of the DLT, so we have to compute the absolute
3563 address, then subtract out the value of __gp. */
3564 value = (hh->plt_offset
3565 + hppa_info->plt_sec->output_offset
3566 + hppa_info->plt_sec->output_section->vma);
3567 value -= _bfd_get_gp_value (output_bfd);
3569 /* All PLTOFF relocations are basically the same at this point,
3570 except that we need different field selectors for the 21bit
3571 version vs the 14bit versions. */
3572 if (r_type == R_PARISC_PLTOFF21L)
3573 value = hppa_field_adjust (value, addend, e_lrsel);
3574 else if (r_type == R_PARISC_PLTOFF14F
3575 || r_type == R_PARISC_PLTOFF16F
3576 || r_type == R_PARISC_PLTOFF16WF
3577 || r_type == R_PARISC_PLTOFF16DF)
3578 value = hppa_field_adjust (value, addend, e_fsel);
3579 else
3580 value = hppa_field_adjust (value, addend, e_rrsel);
3582 insn = elf_hppa_relocate_insn (insn, (int) value, r_type);
3583 break;
3586 case R_PARISC_LTOFF_FPTR32:
3588 /* We may still need to create the FPTR itself if it was for
3589 a local symbol. */
3590 if (hh == NULL)
3592 /* The first two words of an .opd entry are zero. */
3593 memset (hppa_info->opd_sec->contents + hh->opd_offset, 0, 16);
3595 /* The next word is the address of the function. */
3596 bfd_put_64 (hppa_info->opd_sec->owner, value + addend,
3597 (hppa_info->opd_sec->contents
3598 + hh->opd_offset + 16));
3600 /* The last word is our local __gp value. */
3601 value = _bfd_get_gp_value
3602 (hppa_info->opd_sec->output_section->owner);
3603 bfd_put_64 (hppa_info->opd_sec->owner, value,
3604 hppa_info->opd_sec->contents + hh->opd_offset + 24);
3606 /* The DLT value is the address of the .opd entry. */
3607 value = (hh->opd_offset
3608 + hppa_info->opd_sec->output_offset
3609 + hppa_info->opd_sec->output_section->vma);
3611 bfd_put_64 (hppa_info->dlt_sec->owner,
3612 value,
3613 hppa_info->dlt_sec->contents + hh->dlt_offset);
3616 /* We want the value of the DLT offset for this symbol, not
3617 the symbol's actual address. Note that __gp may not point
3618 to the start of the DLT, so we have to compute the absolute
3619 address, then subtract out the value of __gp. */
3620 value = (hh->dlt_offset
3621 + hppa_info->dlt_sec->output_offset
3622 + hppa_info->dlt_sec->output_section->vma);
3623 value -= _bfd_get_gp_value (output_bfd);
3624 bfd_put_32 (input_bfd, value, hit_data);
3625 return bfd_reloc_ok;
3628 case R_PARISC_LTOFF_FPTR64:
3629 case R_PARISC_LTOFF_TP64:
3631 /* We may still need to create the FPTR itself if it was for
3632 a local symbol. */
3633 if (eh == NULL && r_type == R_PARISC_LTOFF_FPTR64)
3635 /* The first two words of an .opd entry are zero. */
3636 memset (hppa_info->opd_sec->contents + hh->opd_offset, 0, 16);
3638 /* The next word is the address of the function. */
3639 bfd_put_64 (hppa_info->opd_sec->owner, value + addend,
3640 (hppa_info->opd_sec->contents
3641 + hh->opd_offset + 16));
3643 /* The last word is our local __gp value. */
3644 value = _bfd_get_gp_value
3645 (hppa_info->opd_sec->output_section->owner);
3646 bfd_put_64 (hppa_info->opd_sec->owner, value,
3647 hppa_info->opd_sec->contents + hh->opd_offset + 24);
3649 /* The DLT value is the address of the .opd entry. */
3650 value = (hh->opd_offset
3651 + hppa_info->opd_sec->output_offset
3652 + hppa_info->opd_sec->output_section->vma);
3654 bfd_put_64 (hppa_info->dlt_sec->owner,
3655 value,
3656 hppa_info->dlt_sec->contents + hh->dlt_offset);
3659 /* We want the value of the DLT offset for this symbol, not
3660 the symbol's actual address. Note that __gp may not point
3661 to the start of the DLT, so we have to compute the absolute
3662 address, then subtract out the value of __gp. */
3663 value = (hh->dlt_offset
3664 + hppa_info->dlt_sec->output_offset
3665 + hppa_info->dlt_sec->output_section->vma);
3666 value -= _bfd_get_gp_value (output_bfd);
3667 bfd_put_64 (input_bfd, value, hit_data);
3668 return bfd_reloc_ok;
3671 case R_PARISC_DIR32:
3672 bfd_put_32 (input_bfd, value + addend, hit_data);
3673 return bfd_reloc_ok;
3675 case R_PARISC_DIR64:
3676 bfd_put_64 (input_bfd, value + addend, hit_data);
3677 return bfd_reloc_ok;
3679 case R_PARISC_GPREL64:
3680 /* Subtract out the global pointer value to make value a DLT
3681 relative address. */
3682 value -= _bfd_get_gp_value (output_bfd);
3684 bfd_put_64 (input_bfd, value + addend, hit_data);
3685 return bfd_reloc_ok;
3687 case R_PARISC_LTOFF64:
3688 /* We want the value of the DLT offset for this symbol, not
3689 the symbol's actual address. Note that __gp may not point
3690 to the start of the DLT, so we have to compute the absolute
3691 address, then subtract out the value of __gp. */
3692 value = (hh->dlt_offset
3693 + hppa_info->dlt_sec->output_offset
3694 + hppa_info->dlt_sec->output_section->vma);
3695 value -= _bfd_get_gp_value (output_bfd);
3697 bfd_put_64 (input_bfd, value + addend, hit_data);
3698 return bfd_reloc_ok;
3700 case R_PARISC_PCREL32:
3702 /* If this is a call to a function defined in another dynamic
3703 library, then redirect the call to the local stub for this
3704 function. */
3705 if (sym_sec == NULL || sym_sec->output_section == NULL)
3706 value = (hh->stub_offset + hppa_info->stub_sec->output_offset
3707 + hppa_info->stub_sec->output_section->vma);
3709 /* Turn VALUE into a proper PC relative address. */
3710 value -= (offset + input_section->output_offset
3711 + input_section->output_section->vma);
3713 value += addend;
3714 value -= 8;
3715 bfd_put_32 (input_bfd, value, hit_data);
3716 return bfd_reloc_ok;
3719 case R_PARISC_PCREL64:
3721 /* If this is a call to a function defined in another dynamic
3722 library, then redirect the call to the local stub for this
3723 function. */
3724 if (sym_sec == NULL || sym_sec->output_section == NULL)
3725 value = (hh->stub_offset + hppa_info->stub_sec->output_offset
3726 + hppa_info->stub_sec->output_section->vma);
3728 /* Turn VALUE into a proper PC relative address. */
3729 value -= (offset + input_section->output_offset
3730 + input_section->output_section->vma);
3732 value += addend;
3733 value -= 8;
3734 bfd_put_64 (input_bfd, value, hit_data);
3735 return bfd_reloc_ok;
3738 case R_PARISC_FPTR64:
3740 bfd_vma off;
3742 /* We may still need to create the FPTR itself if it was for
3743 a local symbol. */
3744 if (hh == NULL)
3746 bfd_vma *local_opd_offsets;
3748 if (local_offsets == NULL)
3749 abort ();
3751 local_opd_offsets = local_offsets + 2 * symtab_hdr->sh_info;
3752 off = local_opd_offsets[r_symndx];
3754 /* The last bit records whether we've already initialised
3755 this local .opd entry. */
3756 if ((off & 1) != 0)
3758 BFD_ASSERT (off != (bfd_vma) -1);
3759 off &= ~1;
3761 else
3763 /* The first two words of an .opd entry are zero. */
3764 memset (hppa_info->opd_sec->contents + off, 0, 16);
3766 /* The next word is the address of the function. */
3767 bfd_put_64 (hppa_info->opd_sec->owner, value + addend,
3768 (hppa_info->opd_sec->contents + off + 16));
3770 /* The last word is our local __gp value. */
3771 value = _bfd_get_gp_value
3772 (hppa_info->opd_sec->output_section->owner);
3773 bfd_put_64 (hppa_info->opd_sec->owner, value,
3774 hppa_info->opd_sec->contents + off + 24);
3777 else
3778 off = hh->opd_offset;
3780 if (hh == NULL || hh->want_opd)
3781 /* We want the value of the OPD offset for this symbol. */
3782 value = (off
3783 + hppa_info->opd_sec->output_offset
3784 + hppa_info->opd_sec->output_section->vma);
3785 else
3786 /* We want the address of the symbol. */
3787 value += addend;
3789 bfd_put_64 (input_bfd, value, hit_data);
3790 return bfd_reloc_ok;
3793 case R_PARISC_SECREL32:
3794 if (sym_sec)
3795 value -= sym_sec->output_section->vma;
3796 bfd_put_32 (input_bfd, value + addend, hit_data);
3797 return bfd_reloc_ok;
3799 case R_PARISC_SEGREL32:
3800 case R_PARISC_SEGREL64:
3802 /* If this is the first SEGREL relocation, then initialize
3803 the segment base values. */
3804 if (hppa_info->text_segment_base == (bfd_vma) -1)
3805 bfd_map_over_sections (output_bfd, elf_hppa_record_segment_addrs,
3806 hppa_info);
3808 /* VALUE holds the absolute address. We want to include the
3809 addend, then turn it into a segment relative address.
3811 The segment is derived from SYM_SEC. We assume that there are
3812 only two segments of note in the resulting executable/shlib.
3813 A readonly segment (.text) and a readwrite segment (.data). */
3814 value += addend;
3816 if (sym_sec->flags & SEC_CODE)
3817 value -= hppa_info->text_segment_base;
3818 else
3819 value -= hppa_info->data_segment_base;
3821 if (r_type == R_PARISC_SEGREL32)
3822 bfd_put_32 (input_bfd, value, hit_data);
3823 else
3824 bfd_put_64 (input_bfd, value, hit_data);
3825 return bfd_reloc_ok;
3828 /* Something we don't know how to handle. */
3829 default:
3830 return bfd_reloc_notsupported;
3833 /* Update the instruction word. */
3834 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
3835 return bfd_reloc_ok;
3838 /* Relocate an HPPA ELF section. */
3840 static bfd_boolean
3841 elf64_hppa_relocate_section (bfd *output_bfd,
3842 struct bfd_link_info *info,
3843 bfd *input_bfd,
3844 asection *input_section,
3845 bfd_byte *contents,
3846 Elf_Internal_Rela *relocs,
3847 Elf_Internal_Sym *local_syms,
3848 asection **local_sections)
3850 Elf_Internal_Shdr *symtab_hdr;
3851 Elf_Internal_Rela *rel;
3852 Elf_Internal_Rela *relend;
3853 struct elf64_hppa_link_hash_table *hppa_info;
3855 hppa_info = hppa_link_hash_table (info);
3856 if (hppa_info == NULL)
3857 return FALSE;
3859 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3861 rel = relocs;
3862 relend = relocs + input_section->reloc_count;
3863 for (; rel < relend; rel++)
3865 int r_type;
3866 reloc_howto_type *howto = elf_hppa_howto_table + ELF_R_TYPE (rel->r_info);
3867 unsigned long r_symndx;
3868 struct elf_link_hash_entry *eh;
3869 Elf_Internal_Sym *sym;
3870 asection *sym_sec;
3871 bfd_vma relocation;
3872 bfd_reloc_status_type r;
3873 bfd_boolean warned_undef;
3875 r_type = ELF_R_TYPE (rel->r_info);
3876 if (r_type < 0 || r_type >= (int) R_PARISC_UNIMPLEMENTED)
3878 bfd_set_error (bfd_error_bad_value);
3879 return FALSE;
3881 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3882 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3883 continue;
3885 /* This is a final link. */
3886 r_symndx = ELF_R_SYM (rel->r_info);
3887 eh = NULL;
3888 sym = NULL;
3889 sym_sec = NULL;
3890 warned_undef = FALSE;
3891 if (r_symndx < symtab_hdr->sh_info)
3893 /* This is a local symbol, hh defaults to NULL. */
3894 sym = local_syms + r_symndx;
3895 sym_sec = local_sections[r_symndx];
3896 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rel);
3898 else
3900 /* This is not a local symbol. */
3901 bfd_boolean unresolved_reloc;
3902 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
3904 /* It seems this can happen with erroneous or unsupported
3905 input (mixing a.out and elf in an archive, for example.) */
3906 if (sym_hashes == NULL)
3907 return FALSE;
3909 eh = sym_hashes[r_symndx - symtab_hdr->sh_info];
3911 while (eh->root.type == bfd_link_hash_indirect
3912 || eh->root.type == bfd_link_hash_warning)
3913 eh = (struct elf_link_hash_entry *) eh->root.u.i.link;
3915 warned_undef = FALSE;
3916 unresolved_reloc = FALSE;
3917 relocation = 0;
3918 if (eh->root.type == bfd_link_hash_defined
3919 || eh->root.type == bfd_link_hash_defweak)
3921 sym_sec = eh->root.u.def.section;
3922 if (sym_sec == NULL
3923 || sym_sec->output_section == NULL)
3924 /* Set a flag that will be cleared later if we find a
3925 relocation value for this symbol. output_section
3926 is typically NULL for symbols satisfied by a shared
3927 library. */
3928 unresolved_reloc = TRUE;
3929 else
3930 relocation = (eh->root.u.def.value
3931 + sym_sec->output_section->vma
3932 + sym_sec->output_offset);
3934 else if (eh->root.type == bfd_link_hash_undefweak)
3936 else if (info->unresolved_syms_in_objects == RM_IGNORE
3937 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
3939 else if (!info->relocatable
3940 && elf_hppa_is_dynamic_loader_symbol (eh->root.root.string))
3941 continue;
3942 else if (!info->relocatable)
3944 bfd_boolean err;
3945 err = (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
3946 || ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT);
3947 if (!info->callbacks->undefined_symbol (info,
3948 eh->root.root.string,
3949 input_bfd,
3950 input_section,
3951 rel->r_offset, err))
3952 return FALSE;
3953 warned_undef = TRUE;
3956 if (!info->relocatable
3957 && relocation == 0
3958 && eh->root.type != bfd_link_hash_defined
3959 && eh->root.type != bfd_link_hash_defweak
3960 && eh->root.type != bfd_link_hash_undefweak)
3962 if (info->unresolved_syms_in_objects == RM_IGNORE
3963 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3964 && eh->type == STT_PARISC_MILLI)
3966 if (! info->callbacks->undefined_symbol
3967 (info, eh_name (eh), input_bfd,
3968 input_section, rel->r_offset, FALSE))
3969 return FALSE;
3970 warned_undef = TRUE;
3975 if (sym_sec != NULL && elf_discarded_section (sym_sec))
3977 /* For relocs against symbols from removed linkonce sections,
3978 or sections discarded by a linker script, we just want the
3979 section contents zeroed. Avoid any special processing. */
3980 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
3981 rel->r_info = 0;
3982 rel->r_addend = 0;
3983 continue;
3986 if (info->relocatable)
3987 continue;
3989 r = elf_hppa_final_link_relocate (rel, input_bfd, output_bfd,
3990 input_section, contents,
3991 relocation, info, sym_sec,
3992 eh);
3994 if (r != bfd_reloc_ok)
3996 switch (r)
3998 default:
3999 abort ();
4000 case bfd_reloc_overflow:
4002 const char *sym_name;
4004 if (eh != NULL)
4005 sym_name = NULL;
4006 else
4008 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4009 symtab_hdr->sh_link,
4010 sym->st_name);
4011 if (sym_name == NULL)
4012 return FALSE;
4013 if (*sym_name == '\0')
4014 sym_name = bfd_section_name (input_bfd, sym_sec);
4017 if (!((*info->callbacks->reloc_overflow)
4018 (info, (eh ? &eh->root : NULL), sym_name,
4019 howto->name, (bfd_vma) 0, input_bfd,
4020 input_section, rel->r_offset)))
4021 return FALSE;
4023 break;
4027 return TRUE;
4030 static const struct bfd_elf_special_section elf64_hppa_special_sections[] =
4032 { STRING_COMMA_LEN (".fini"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
4033 { STRING_COMMA_LEN (".init"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
4034 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_PARISC_SHORT },
4035 { STRING_COMMA_LEN (".dlt"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_PARISC_SHORT },
4036 { STRING_COMMA_LEN (".sdata"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE + SHF_PARISC_SHORT },
4037 { STRING_COMMA_LEN (".sbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_PARISC_SHORT },
4038 { STRING_COMMA_LEN (".tbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE + SHF_HP_TLS },
4039 { NULL, 0, 0, 0, 0 }
4042 /* The hash bucket size is the standard one, namely 4. */
4044 const struct elf_size_info hppa64_elf_size_info =
4046 sizeof (Elf64_External_Ehdr),
4047 sizeof (Elf64_External_Phdr),
4048 sizeof (Elf64_External_Shdr),
4049 sizeof (Elf64_External_Rel),
4050 sizeof (Elf64_External_Rela),
4051 sizeof (Elf64_External_Sym),
4052 sizeof (Elf64_External_Dyn),
4053 sizeof (Elf_External_Note),
4056 64, 3,
4057 ELFCLASS64, EV_CURRENT,
4058 bfd_elf64_write_out_phdrs,
4059 bfd_elf64_write_shdrs_and_ehdr,
4060 bfd_elf64_checksum_contents,
4061 bfd_elf64_write_relocs,
4062 bfd_elf64_swap_symbol_in,
4063 bfd_elf64_swap_symbol_out,
4064 bfd_elf64_slurp_reloc_table,
4065 bfd_elf64_slurp_symbol_table,
4066 bfd_elf64_swap_dyn_in,
4067 bfd_elf64_swap_dyn_out,
4068 bfd_elf64_swap_reloc_in,
4069 bfd_elf64_swap_reloc_out,
4070 bfd_elf64_swap_reloca_in,
4071 bfd_elf64_swap_reloca_out
4074 #define TARGET_BIG_SYM bfd_elf64_hppa_vec
4075 #define TARGET_BIG_NAME "elf64-hppa"
4076 #define ELF_ARCH bfd_arch_hppa
4077 #define ELF_MACHINE_CODE EM_PARISC
4078 /* This is not strictly correct. The maximum page size for PA2.0 is
4079 64M. But everything still uses 4k. */
4080 #define ELF_MAXPAGESIZE 0x1000
4081 #define ELF_OSABI ELFOSABI_HPUX
4083 #define bfd_elf64_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4084 #define bfd_elf64_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
4085 #define bfd_elf64_bfd_is_local_label_name elf_hppa_is_local_label_name
4086 #define elf_info_to_howto elf_hppa_info_to_howto
4087 #define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
4089 #define elf_backend_section_from_shdr elf64_hppa_section_from_shdr
4090 #define elf_backend_object_p elf64_hppa_object_p
4091 #define elf_backend_final_write_processing \
4092 elf_hppa_final_write_processing
4093 #define elf_backend_fake_sections elf_hppa_fake_sections
4094 #define elf_backend_add_symbol_hook elf_hppa_add_symbol_hook
4096 #define elf_backend_relocate_section elf_hppa_relocate_section
4098 #define bfd_elf64_bfd_final_link elf_hppa_final_link
4100 #define elf_backend_create_dynamic_sections \
4101 elf64_hppa_create_dynamic_sections
4102 #define elf_backend_post_process_headers elf64_hppa_post_process_headers
4104 #define elf_backend_omit_section_dynsym \
4105 ((bfd_boolean (*) (bfd *, struct bfd_link_info *, asection *)) bfd_true)
4106 #define elf_backend_adjust_dynamic_symbol \
4107 elf64_hppa_adjust_dynamic_symbol
4109 #define elf_backend_size_dynamic_sections \
4110 elf64_hppa_size_dynamic_sections
4112 #define elf_backend_finish_dynamic_symbol \
4113 elf64_hppa_finish_dynamic_symbol
4114 #define elf_backend_finish_dynamic_sections \
4115 elf64_hppa_finish_dynamic_sections
4116 #define elf_backend_grok_prstatus elf64_hppa_grok_prstatus
4117 #define elf_backend_grok_psinfo elf64_hppa_grok_psinfo
4119 /* Stuff for the BFD linker: */
4120 #define bfd_elf64_bfd_link_hash_table_create \
4121 elf64_hppa_hash_table_create
4123 #define elf_backend_check_relocs \
4124 elf64_hppa_check_relocs
4126 #define elf_backend_size_info \
4127 hppa64_elf_size_info
4129 #define elf_backend_additional_program_headers \
4130 elf64_hppa_additional_program_headers
4132 #define elf_backend_modify_segment_map \
4133 elf64_hppa_modify_segment_map
4135 #define elf_backend_link_output_symbol_hook \
4136 elf64_hppa_link_output_symbol_hook
4138 #define elf_backend_want_got_plt 0
4139 #define elf_backend_plt_readonly 0
4140 #define elf_backend_want_plt_sym 0
4141 #define elf_backend_got_header_size 0
4142 #define elf_backend_type_change_ok TRUE
4143 #define elf_backend_get_symbol_type elf64_hppa_elf_get_symbol_type
4144 #define elf_backend_reloc_type_class elf64_hppa_reloc_type_class
4145 #define elf_backend_rela_normal 1
4146 #define elf_backend_special_sections elf64_hppa_special_sections
4147 #define elf_backend_action_discarded elf_hppa_action_discarded
4148 #define elf_backend_section_from_phdr elf64_hppa_section_from_phdr
4150 #define elf64_bed elf64_hppa_hpux_bed
4152 #include "elf64-target.h"
4154 #undef TARGET_BIG_SYM
4155 #define TARGET_BIG_SYM bfd_elf64_hppa_linux_vec
4156 #undef TARGET_BIG_NAME
4157 #define TARGET_BIG_NAME "elf64-hppa-linux"
4158 #undef ELF_OSABI
4159 #define ELF_OSABI ELFOSABI_LINUX
4160 #undef elf_backend_post_process_headers
4161 #define elf_backend_post_process_headers _bfd_elf_set_osabi
4162 #undef elf64_bed
4163 #define elf64_bed elf64_hppa_linux_bed
4165 #include "elf64-target.h"