readonly_dynrelocs
[binutils-gdb.git] / bfd / elf32-hppa.c
1 /* BFD back-end for HP PA-RISC ELF files.
2 Copyright (C) 1990-2017 Free Software Foundation, Inc.
3
4 Original code by
5 Center for Software Science
6 Department of Computer Science
7 University of Utah
8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
11
12 This file is part of BFD, the Binary File Descriptor library.
13
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
16 the Free Software Foundation; either version 3 of the License, or
17 (at your option) any later version.
18
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
23
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
28
29 #include "sysdep.h"
30 #include "bfd.h"
31 #include "libbfd.h"
32 #include "elf-bfd.h"
33 #include "elf/hppa.h"
34 #include "libhppa.h"
35 #include "elf32-hppa.h"
36 #define ARCH_SIZE 32
37 #include "elf32-hppa.h"
38 #include "elf-hppa.h"
39
40 /* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
42 following:
43
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
50
51 /* We use two hash tables to hold information for linking PA ELF objects.
52
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
56
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
59 necessary to build the linker stubs during a link.
60
61 There are a number of different stubs generated by the linker.
62
63 Long branch stub:
64 : ldil LR'X,%r1
65 : be,n RR'X(%sr4,%r1)
66
67 PIC long branch stub:
68 : b,l .+8,%r1
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
71
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
74 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
75 : ldw RR'lt_ptr+ltoff(%r1),%r21
76 : bv %r0(%r21)
77 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
78
79 Import stub to call shared library routine from shared library
80 (single sub-space version)
81 : addil LR'ltoff,%r19 ; get procedure entry point
82 : ldw RR'ltoff(%r1),%r21
83 : bv %r0(%r21)
84 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
85
86 Import stub to call shared library routine from normal object file
87 (multiple sub-space support)
88 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
89 : ldw RR'lt_ptr+ltoff(%r1),%r21
90 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
91 : ldsid (%r21),%r1
92 : mtsp %r1,%sr0
93 : be 0(%sr0,%r21) ; branch to target
94 : stw %rp,-24(%sp) ; save rp
95
96 Import stub to call shared library routine from shared library
97 (multiple sub-space support)
98 : addil LR'ltoff,%r19 ; get procedure entry point
99 : ldw RR'ltoff(%r1),%r21
100 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
101 : ldsid (%r21),%r1
102 : mtsp %r1,%sr0
103 : be 0(%sr0,%r21) ; branch to target
104 : stw %rp,-24(%sp) ; save rp
105
106 Export stub to return from shared lib routine (multiple sub-space support)
107 One of these is created for each exported procedure in a shared
108 library (and stored in the shared lib). Shared lib routines are
109 called via the first instruction in the export stub so that we can
110 do an inter-space return. Not required for single sub-space.
111 : bl,n X,%rp ; trap the return
112 : nop
113 : ldw -24(%sp),%rp ; restore the original rp
114 : ldsid (%rp),%r1
115 : mtsp %r1,%sr0
116 : be,n 0(%sr0,%rp) ; inter-space return. */
117
118
119 /* Variable names follow a coding style.
120 Please follow this (Apps Hungarian) style:
121
122 Structure/Variable Prefix
123 elf_link_hash_table "etab"
124 elf_link_hash_entry "eh"
125
126 elf32_hppa_link_hash_table "htab"
127 elf32_hppa_link_hash_entry "hh"
128
129 bfd_hash_table "btab"
130 bfd_hash_entry "bh"
131
132 bfd_hash_table containing stubs "bstab"
133 elf32_hppa_stub_hash_entry "hsh"
134
135 elf32_hppa_dyn_reloc_entry "hdh"
136
137 Always remember to use GNU Coding Style. */
138
139 #define PLT_ENTRY_SIZE 8
140 #define GOT_ENTRY_SIZE 4
141 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
142
143 static const bfd_byte plt_stub[] =
144 {
145 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
146 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
147 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
148 #define PLT_STUB_ENTRY (3*4)
149 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
150 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
151 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
152 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
153 };
154
155 /* Section name for stubs is the associated section name plus this
156 string. */
157 #define STUB_SUFFIX ".stub"
158
159 /* We don't need to copy certain PC- or GP-relative dynamic relocs
160 into a shared object's dynamic section. All the relocs of the
161 limited class we are interested in, are absolute. */
162 #ifndef RELATIVE_DYNRELOCS
163 #define RELATIVE_DYNRELOCS 0
164 #define IS_ABSOLUTE_RELOC(r_type) 1
165 #define pc_dynrelocs(hh) 0
166 #endif
167
168 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
169 copying dynamic variables from a shared lib into an app's dynbss
170 section, and instead use a dynamic relocation to point into the
171 shared lib. */
172 #define ELIMINATE_COPY_RELOCS 1
173
174 enum elf32_hppa_stub_type
175 {
176 hppa_stub_long_branch,
177 hppa_stub_long_branch_shared,
178 hppa_stub_import,
179 hppa_stub_import_shared,
180 hppa_stub_export,
181 hppa_stub_none
182 };
183
184 struct elf32_hppa_stub_hash_entry
185 {
186 /* Base hash table entry structure. */
187 struct bfd_hash_entry bh_root;
188
189 /* The stub section. */
190 asection *stub_sec;
191
192 /* Offset within stub_sec of the beginning of this stub. */
193 bfd_vma stub_offset;
194
195 /* Given the symbol's value and its section we can determine its final
196 value when building the stubs (so the stub knows where to jump. */
197 bfd_vma target_value;
198 asection *target_section;
199
200 enum elf32_hppa_stub_type stub_type;
201
202 /* The symbol table entry, if any, that this was derived from. */
203 struct elf32_hppa_link_hash_entry *hh;
204
205 /* Where this stub is being called from, or, in the case of combined
206 stub sections, the first input section in the group. */
207 asection *id_sec;
208 };
209
210 enum _tls_type
211 {
212 GOT_UNKNOWN = 0,
213 GOT_NORMAL = 1,
214 GOT_TLS_GD = 2,
215 GOT_TLS_LDM = 4,
216 GOT_TLS_IE = 8
217 };
218
219 struct elf32_hppa_link_hash_entry
220 {
221 struct elf_link_hash_entry eh;
222
223 /* A pointer to the most recently used stub hash entry against this
224 symbol. */
225 struct elf32_hppa_stub_hash_entry *hsh_cache;
226
227 /* Used to count relocations for delayed sizing of relocation
228 sections. */
229 struct elf32_hppa_dyn_reloc_entry
230 {
231 /* Next relocation in the chain. */
232 struct elf32_hppa_dyn_reloc_entry *hdh_next;
233
234 /* The input section of the reloc. */
235 asection *sec;
236
237 /* Number of relocs copied in this section. */
238 bfd_size_type count;
239
240 #if RELATIVE_DYNRELOCS
241 /* Number of relative relocs copied for the input section. */
242 bfd_size_type relative_count;
243 #endif
244 } *dyn_relocs;
245
246 ENUM_BITFIELD (_tls_type) tls_type : 8;
247
248 /* Set if this symbol is used by a plabel reloc. */
249 unsigned int plabel:1;
250 };
251
252 struct elf32_hppa_link_hash_table
253 {
254 /* The main hash table. */
255 struct elf_link_hash_table etab;
256
257 /* The stub hash table. */
258 struct bfd_hash_table bstab;
259
260 /* Linker stub bfd. */
261 bfd *stub_bfd;
262
263 /* Linker call-backs. */
264 asection * (*add_stub_section) (const char *, asection *);
265 void (*layout_sections_again) (void);
266
267 /* Array to keep track of which stub sections have been created, and
268 information on stub grouping. */
269 struct map_stub
270 {
271 /* This is the section to which stubs in the group will be
272 attached. */
273 asection *link_sec;
274 /* The stub section. */
275 asection *stub_sec;
276 } *stub_group;
277
278 /* Assorted information used by elf32_hppa_size_stubs. */
279 unsigned int bfd_count;
280 unsigned int top_index;
281 asection **input_list;
282 Elf_Internal_Sym **all_local_syms;
283
284 /* Used during a final link to store the base of the text and data
285 segments so that we can perform SEGREL relocations. */
286 bfd_vma text_segment_base;
287 bfd_vma data_segment_base;
288
289 /* Whether we support multiple sub-spaces for shared libs. */
290 unsigned int multi_subspace:1;
291
292 /* Flags set when various size branches are detected. Used to
293 select suitable defaults for the stub group size. */
294 unsigned int has_12bit_branch:1;
295 unsigned int has_17bit_branch:1;
296 unsigned int has_22bit_branch:1;
297
298 /* Set if we need a .plt stub to support lazy dynamic linking. */
299 unsigned int need_plt_stub:1;
300
301 /* Small local sym cache. */
302 struct sym_cache sym_cache;
303
304 /* Data for LDM relocations. */
305 union
306 {
307 bfd_signed_vma refcount;
308 bfd_vma offset;
309 } tls_ldm_got;
310 };
311
312 /* Various hash macros and functions. */
313 #define hppa_link_hash_table(p) \
314 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
315 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
316
317 #define hppa_elf_hash_entry(ent) \
318 ((struct elf32_hppa_link_hash_entry *)(ent))
319
320 #define hppa_stub_hash_entry(ent) \
321 ((struct elf32_hppa_stub_hash_entry *)(ent))
322
323 #define hppa_stub_hash_lookup(table, string, create, copy) \
324 ((struct elf32_hppa_stub_hash_entry *) \
325 bfd_hash_lookup ((table), (string), (create), (copy)))
326
327 #define hppa_elf_local_got_tls_type(abfd) \
328 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
329
330 #define hh_name(hh) \
331 (hh ? hh->eh.root.root.string : "<undef>")
332
333 #define eh_name(eh) \
334 (eh ? eh->root.root.string : "<undef>")
335
336 /* Assorted hash table functions. */
337
338 /* Initialize an entry in the stub hash table. */
339
340 static struct bfd_hash_entry *
341 stub_hash_newfunc (struct bfd_hash_entry *entry,
342 struct bfd_hash_table *table,
343 const char *string)
344 {
345 /* Allocate the structure if it has not already been allocated by a
346 subclass. */
347 if (entry == NULL)
348 {
349 entry = bfd_hash_allocate (table,
350 sizeof (struct elf32_hppa_stub_hash_entry));
351 if (entry == NULL)
352 return entry;
353 }
354
355 /* Call the allocation method of the superclass. */
356 entry = bfd_hash_newfunc (entry, table, string);
357 if (entry != NULL)
358 {
359 struct elf32_hppa_stub_hash_entry *hsh;
360
361 /* Initialize the local fields. */
362 hsh = hppa_stub_hash_entry (entry);
363 hsh->stub_sec = NULL;
364 hsh->stub_offset = 0;
365 hsh->target_value = 0;
366 hsh->target_section = NULL;
367 hsh->stub_type = hppa_stub_long_branch;
368 hsh->hh = NULL;
369 hsh->id_sec = NULL;
370 }
371
372 return entry;
373 }
374
375 /* Initialize an entry in the link hash table. */
376
377 static struct bfd_hash_entry *
378 hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
379 struct bfd_hash_table *table,
380 const char *string)
381 {
382 /* Allocate the structure if it has not already been allocated by a
383 subclass. */
384 if (entry == NULL)
385 {
386 entry = bfd_hash_allocate (table,
387 sizeof (struct elf32_hppa_link_hash_entry));
388 if (entry == NULL)
389 return entry;
390 }
391
392 /* Call the allocation method of the superclass. */
393 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
394 if (entry != NULL)
395 {
396 struct elf32_hppa_link_hash_entry *hh;
397
398 /* Initialize the local fields. */
399 hh = hppa_elf_hash_entry (entry);
400 hh->hsh_cache = NULL;
401 hh->dyn_relocs = NULL;
402 hh->plabel = 0;
403 hh->tls_type = GOT_UNKNOWN;
404 }
405
406 return entry;
407 }
408
409 /* Free the derived linker hash table. */
410
411 static void
412 elf32_hppa_link_hash_table_free (bfd *obfd)
413 {
414 struct elf32_hppa_link_hash_table *htab
415 = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
416
417 bfd_hash_table_free (&htab->bstab);
418 _bfd_elf_link_hash_table_free (obfd);
419 }
420
421 /* Create the derived linker hash table. The PA ELF port uses the derived
422 hash table to keep information specific to the PA ELF linker (without
423 using static variables). */
424
425 static struct bfd_link_hash_table *
426 elf32_hppa_link_hash_table_create (bfd *abfd)
427 {
428 struct elf32_hppa_link_hash_table *htab;
429 bfd_size_type amt = sizeof (*htab);
430
431 htab = bfd_zmalloc (amt);
432 if (htab == NULL)
433 return NULL;
434
435 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
436 sizeof (struct elf32_hppa_link_hash_entry),
437 HPPA32_ELF_DATA))
438 {
439 free (htab);
440 return NULL;
441 }
442
443 /* Init the stub hash table too. */
444 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
445 sizeof (struct elf32_hppa_stub_hash_entry)))
446 {
447 _bfd_elf_link_hash_table_free (abfd);
448 return NULL;
449 }
450 htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
451
452 htab->text_segment_base = (bfd_vma) -1;
453 htab->data_segment_base = (bfd_vma) -1;
454 return &htab->etab.root;
455 }
456
457 /* Initialize the linker stubs BFD so that we can use it for linker
458 created dynamic sections. */
459
460 void
461 elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
462 {
463 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
464
465 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
466 htab->etab.dynobj = abfd;
467 }
468
469 /* Build a name for an entry in the stub hash table. */
470
471 static char *
472 hppa_stub_name (const asection *input_section,
473 const asection *sym_sec,
474 const struct elf32_hppa_link_hash_entry *hh,
475 const Elf_Internal_Rela *rela)
476 {
477 char *stub_name;
478 bfd_size_type len;
479
480 if (hh)
481 {
482 len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
483 stub_name = bfd_malloc (len);
484 if (stub_name != NULL)
485 sprintf (stub_name, "%08x_%s+%x",
486 input_section->id & 0xffffffff,
487 hh_name (hh),
488 (int) rela->r_addend & 0xffffffff);
489 }
490 else
491 {
492 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
493 stub_name = bfd_malloc (len);
494 if (stub_name != NULL)
495 sprintf (stub_name, "%08x_%x:%x+%x",
496 input_section->id & 0xffffffff,
497 sym_sec->id & 0xffffffff,
498 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
499 (int) rela->r_addend & 0xffffffff);
500 }
501 return stub_name;
502 }
503
504 /* Look up an entry in the stub hash. Stub entries are cached because
505 creating the stub name takes a bit of time. */
506
507 static struct elf32_hppa_stub_hash_entry *
508 hppa_get_stub_entry (const asection *input_section,
509 const asection *sym_sec,
510 struct elf32_hppa_link_hash_entry *hh,
511 const Elf_Internal_Rela *rela,
512 struct elf32_hppa_link_hash_table *htab)
513 {
514 struct elf32_hppa_stub_hash_entry *hsh_entry;
515 const asection *id_sec;
516
517 /* If this input section is part of a group of sections sharing one
518 stub section, then use the id of the first section in the group.
519 Stub names need to include a section id, as there may well be
520 more than one stub used to reach say, printf, and we need to
521 distinguish between them. */
522 id_sec = htab->stub_group[input_section->id].link_sec;
523
524 if (hh != NULL && hh->hsh_cache != NULL
525 && hh->hsh_cache->hh == hh
526 && hh->hsh_cache->id_sec == id_sec)
527 {
528 hsh_entry = hh->hsh_cache;
529 }
530 else
531 {
532 char *stub_name;
533
534 stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
535 if (stub_name == NULL)
536 return NULL;
537
538 hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
539 stub_name, FALSE, FALSE);
540 if (hh != NULL)
541 hh->hsh_cache = hsh_entry;
542
543 free (stub_name);
544 }
545
546 return hsh_entry;
547 }
548
549 /* Add a new stub entry to the stub hash. Not all fields of the new
550 stub entry are initialised. */
551
552 static struct elf32_hppa_stub_hash_entry *
553 hppa_add_stub (const char *stub_name,
554 asection *section,
555 struct elf32_hppa_link_hash_table *htab)
556 {
557 asection *link_sec;
558 asection *stub_sec;
559 struct elf32_hppa_stub_hash_entry *hsh;
560
561 link_sec = htab->stub_group[section->id].link_sec;
562 stub_sec = htab->stub_group[section->id].stub_sec;
563 if (stub_sec == NULL)
564 {
565 stub_sec = htab->stub_group[link_sec->id].stub_sec;
566 if (stub_sec == NULL)
567 {
568 size_t namelen;
569 bfd_size_type len;
570 char *s_name;
571
572 namelen = strlen (link_sec->name);
573 len = namelen + sizeof (STUB_SUFFIX);
574 s_name = bfd_alloc (htab->stub_bfd, len);
575 if (s_name == NULL)
576 return NULL;
577
578 memcpy (s_name, link_sec->name, namelen);
579 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
580 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
581 if (stub_sec == NULL)
582 return NULL;
583 htab->stub_group[link_sec->id].stub_sec = stub_sec;
584 }
585 htab->stub_group[section->id].stub_sec = stub_sec;
586 }
587
588 /* Enter this entry into the linker stub hash table. */
589 hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
590 TRUE, FALSE);
591 if (hsh == NULL)
592 {
593 /* xgettext:c-format */
594 _bfd_error_handler (_("%B: cannot create stub entry %s"),
595 section->owner, stub_name);
596 return NULL;
597 }
598
599 hsh->stub_sec = stub_sec;
600 hsh->stub_offset = 0;
601 hsh->id_sec = link_sec;
602 return hsh;
603 }
604
605 /* Determine the type of stub needed, if any, for a call. */
606
607 static enum elf32_hppa_stub_type
608 hppa_type_of_stub (asection *input_sec,
609 const Elf_Internal_Rela *rela,
610 struct elf32_hppa_link_hash_entry *hh,
611 bfd_vma destination,
612 struct bfd_link_info *info)
613 {
614 bfd_vma location;
615 bfd_vma branch_offset;
616 bfd_vma max_branch_offset;
617 unsigned int r_type;
618
619 if (hh != NULL
620 && hh->eh.plt.offset != (bfd_vma) -1
621 && hh->eh.dynindx != -1
622 && !hh->plabel
623 && (bfd_link_pic (info)
624 || !hh->eh.def_regular
625 || hh->eh.root.type == bfd_link_hash_defweak))
626 {
627 /* We need an import stub. Decide between hppa_stub_import
628 and hppa_stub_import_shared later. */
629 return hppa_stub_import;
630 }
631
632 /* Determine where the call point is. */
633 location = (input_sec->output_offset
634 + input_sec->output_section->vma
635 + rela->r_offset);
636
637 branch_offset = destination - location - 8;
638 r_type = ELF32_R_TYPE (rela->r_info);
639
640 /* Determine if a long branch stub is needed. parisc branch offsets
641 are relative to the second instruction past the branch, ie. +8
642 bytes on from the branch instruction location. The offset is
643 signed and counts in units of 4 bytes. */
644 if (r_type == (unsigned int) R_PARISC_PCREL17F)
645 max_branch_offset = (1 << (17 - 1)) << 2;
646
647 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
648 max_branch_offset = (1 << (12 - 1)) << 2;
649
650 else /* R_PARISC_PCREL22F. */
651 max_branch_offset = (1 << (22 - 1)) << 2;
652
653 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
654 return hppa_stub_long_branch;
655
656 return hppa_stub_none;
657 }
658
659 /* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
660 IN_ARG contains the link info pointer. */
661
662 #define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
663 #define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
664
665 #define BL_R1 0xe8200000 /* b,l .+8,%r1 */
666 #define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
667 #define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
668
669 #define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
670 #define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
671 #define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
672 #define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
673
674 #define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
675 #define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
676
677 #define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
678 #define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
679 #define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
680 #define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
681
682 #define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
683 #define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
684 #define NOP 0x08000240 /* nop */
685 #define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
686 #define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
687 #define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
688
689 #ifndef R19_STUBS
690 #define R19_STUBS 1
691 #endif
692
693 #if R19_STUBS
694 #define LDW_R1_DLT LDW_R1_R19
695 #else
696 #define LDW_R1_DLT LDW_R1_DP
697 #endif
698
699 static bfd_boolean
700 hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
701 {
702 struct elf32_hppa_stub_hash_entry *hsh;
703 struct bfd_link_info *info;
704 struct elf32_hppa_link_hash_table *htab;
705 asection *stub_sec;
706 bfd *stub_bfd;
707 bfd_byte *loc;
708 bfd_vma sym_value;
709 bfd_vma insn;
710 bfd_vma off;
711 int val;
712 int size;
713
714 /* Massage our args to the form they really have. */
715 hsh = hppa_stub_hash_entry (bh);
716 info = (struct bfd_link_info *)in_arg;
717
718 htab = hppa_link_hash_table (info);
719 if (htab == NULL)
720 return FALSE;
721
722 stub_sec = hsh->stub_sec;
723
724 /* Make a note of the offset within the stubs for this entry. */
725 hsh->stub_offset = stub_sec->size;
726 loc = stub_sec->contents + hsh->stub_offset;
727
728 stub_bfd = stub_sec->owner;
729
730 switch (hsh->stub_type)
731 {
732 case hppa_stub_long_branch:
733 /* Create the long branch. A long branch is formed with "ldil"
734 loading the upper bits of the target address into a register,
735 then branching with "be" which adds in the lower bits.
736 The "be" has its delay slot nullified. */
737 sym_value = (hsh->target_value
738 + hsh->target_section->output_offset
739 + hsh->target_section->output_section->vma);
740
741 val = hppa_field_adjust (sym_value, 0, e_lrsel);
742 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
743 bfd_put_32 (stub_bfd, insn, loc);
744
745 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
746 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
747 bfd_put_32 (stub_bfd, insn, loc + 4);
748
749 size = 8;
750 break;
751
752 case hppa_stub_long_branch_shared:
753 /* Branches are relative. This is where we are going to. */
754 sym_value = (hsh->target_value
755 + hsh->target_section->output_offset
756 + hsh->target_section->output_section->vma);
757
758 /* And this is where we are coming from, more or less. */
759 sym_value -= (hsh->stub_offset
760 + stub_sec->output_offset
761 + stub_sec->output_section->vma);
762
763 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
764 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
765 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
766 bfd_put_32 (stub_bfd, insn, loc + 4);
767
768 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
769 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
770 bfd_put_32 (stub_bfd, insn, loc + 8);
771 size = 12;
772 break;
773
774 case hppa_stub_import:
775 case hppa_stub_import_shared:
776 off = hsh->hh->eh.plt.offset;
777 if (off >= (bfd_vma) -2)
778 abort ();
779
780 off &= ~ (bfd_vma) 1;
781 sym_value = (off
782 + htab->etab.splt->output_offset
783 + htab->etab.splt->output_section->vma
784 - elf_gp (htab->etab.splt->output_section->owner));
785
786 insn = ADDIL_DP;
787 #if R19_STUBS
788 if (hsh->stub_type == hppa_stub_import_shared)
789 insn = ADDIL_R19;
790 #endif
791 val = hppa_field_adjust (sym_value, 0, e_lrsel),
792 insn = hppa_rebuild_insn ((int) insn, val, 21);
793 bfd_put_32 (stub_bfd, insn, loc);
794
795 /* It is critical to use lrsel/rrsel here because we are using
796 two different offsets (+0 and +4) from sym_value. If we use
797 lsel/rsel then with unfortunate sym_values we will round
798 sym_value+4 up to the next 2k block leading to a mis-match
799 between the lsel and rsel value. */
800 val = hppa_field_adjust (sym_value, 0, e_rrsel);
801 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
802 bfd_put_32 (stub_bfd, insn, loc + 4);
803
804 if (htab->multi_subspace)
805 {
806 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
807 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
808 bfd_put_32 (stub_bfd, insn, loc + 8);
809
810 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
811 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
812 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
813 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
814
815 size = 28;
816 }
817 else
818 {
819 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
820 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
821 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
822 bfd_put_32 (stub_bfd, insn, loc + 12);
823
824 size = 16;
825 }
826
827 break;
828
829 case hppa_stub_export:
830 /* Branches are relative. This is where we are going to. */
831 sym_value = (hsh->target_value
832 + hsh->target_section->output_offset
833 + hsh->target_section->output_section->vma);
834
835 /* And this is where we are coming from. */
836 sym_value -= (hsh->stub_offset
837 + stub_sec->output_offset
838 + stub_sec->output_section->vma);
839
840 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
841 && (!htab->has_22bit_branch
842 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
843 {
844 _bfd_error_handler
845 /* xgettext:c-format */
846 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
847 hsh->target_section->owner,
848 stub_sec,
849 hsh->stub_offset,
850 hsh->bh_root.string);
851 bfd_set_error (bfd_error_bad_value);
852 return FALSE;
853 }
854
855 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
856 if (!htab->has_22bit_branch)
857 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
858 else
859 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
860 bfd_put_32 (stub_bfd, insn, loc);
861
862 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
863 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
864 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
865 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
866 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
867
868 /* Point the function symbol at the stub. */
869 hsh->hh->eh.root.u.def.section = stub_sec;
870 hsh->hh->eh.root.u.def.value = stub_sec->size;
871
872 size = 24;
873 break;
874
875 default:
876 BFD_FAIL ();
877 return FALSE;
878 }
879
880 stub_sec->size += size;
881 return TRUE;
882 }
883
884 #undef LDIL_R1
885 #undef BE_SR4_R1
886 #undef BL_R1
887 #undef ADDIL_R1
888 #undef DEPI_R1
889 #undef LDW_R1_R21
890 #undef LDW_R1_DLT
891 #undef LDW_R1_R19
892 #undef ADDIL_R19
893 #undef LDW_R1_DP
894 #undef LDSID_R21_R1
895 #undef MTSP_R1
896 #undef BE_SR0_R21
897 #undef STW_RP
898 #undef BV_R0_R21
899 #undef BL_RP
900 #undef NOP
901 #undef LDW_RP
902 #undef LDSID_RP_R1
903 #undef BE_SR0_RP
904
905 /* As above, but don't actually build the stub. Just bump offset so
906 we know stub section sizes. */
907
908 static bfd_boolean
909 hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
910 {
911 struct elf32_hppa_stub_hash_entry *hsh;
912 struct elf32_hppa_link_hash_table *htab;
913 int size;
914
915 /* Massage our args to the form they really have. */
916 hsh = hppa_stub_hash_entry (bh);
917 htab = in_arg;
918
919 if (hsh->stub_type == hppa_stub_long_branch)
920 size = 8;
921 else if (hsh->stub_type == hppa_stub_long_branch_shared)
922 size = 12;
923 else if (hsh->stub_type == hppa_stub_export)
924 size = 24;
925 else /* hppa_stub_import or hppa_stub_import_shared. */
926 {
927 if (htab->multi_subspace)
928 size = 28;
929 else
930 size = 16;
931 }
932
933 hsh->stub_sec->size += size;
934 return TRUE;
935 }
936
937 /* Return nonzero if ABFD represents an HPPA ELF32 file.
938 Additionally we set the default architecture and machine. */
939
940 static bfd_boolean
941 elf32_hppa_object_p (bfd *abfd)
942 {
943 Elf_Internal_Ehdr * i_ehdrp;
944 unsigned int flags;
945
946 i_ehdrp = elf_elfheader (abfd);
947 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
948 {
949 /* GCC on hppa-linux produces binaries with OSABI=GNU,
950 but the kernel produces corefiles with OSABI=SysV. */
951 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
952 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
953 return FALSE;
954 }
955 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
956 {
957 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
958 but the kernel produces corefiles with OSABI=SysV. */
959 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
960 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
961 return FALSE;
962 }
963 else
964 {
965 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
966 return FALSE;
967 }
968
969 flags = i_ehdrp->e_flags;
970 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
971 {
972 case EFA_PARISC_1_0:
973 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
974 case EFA_PARISC_1_1:
975 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
976 case EFA_PARISC_2_0:
977 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
978 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
979 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
980 }
981 return TRUE;
982 }
983
984 /* Create the .plt and .got sections, and set up our hash table
985 short-cuts to various dynamic sections. */
986
987 static bfd_boolean
988 elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
989 {
990 struct elf32_hppa_link_hash_table *htab;
991 struct elf_link_hash_entry *eh;
992
993 /* Don't try to create the .plt and .got twice. */
994 htab = hppa_link_hash_table (info);
995 if (htab == NULL)
996 return FALSE;
997 if (htab->etab.splt != NULL)
998 return TRUE;
999
1000 /* Call the generic code to do most of the work. */
1001 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1002 return FALSE;
1003
1004 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1005 application, because __canonicalize_funcptr_for_compare needs it. */
1006 eh = elf_hash_table (info)->hgot;
1007 eh->forced_local = 0;
1008 eh->other = STV_DEFAULT;
1009 return bfd_elf_link_record_dynamic_symbol (info, eh);
1010 }
1011
1012 /* Copy the extra info we tack onto an elf_link_hash_entry. */
1013
1014 static void
1015 elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
1016 struct elf_link_hash_entry *eh_dir,
1017 struct elf_link_hash_entry *eh_ind)
1018 {
1019 struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
1020
1021 hh_dir = hppa_elf_hash_entry (eh_dir);
1022 hh_ind = hppa_elf_hash_entry (eh_ind);
1023
1024 if (hh_ind->dyn_relocs != NULL
1025 && eh_ind->root.type == bfd_link_hash_indirect)
1026 {
1027 if (hh_dir->dyn_relocs != NULL)
1028 {
1029 struct elf32_hppa_dyn_reloc_entry **hdh_pp;
1030 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1031
1032 /* Add reloc counts against the indirect sym to the direct sym
1033 list. Merge any entries against the same section. */
1034 for (hdh_pp = &hh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
1035 {
1036 struct elf32_hppa_dyn_reloc_entry *hdh_q;
1037
1038 for (hdh_q = hh_dir->dyn_relocs;
1039 hdh_q != NULL;
1040 hdh_q = hdh_q->hdh_next)
1041 if (hdh_q->sec == hdh_p->sec)
1042 {
1043 #if RELATIVE_DYNRELOCS
1044 hdh_q->relative_count += hdh_p->relative_count;
1045 #endif
1046 hdh_q->count += hdh_p->count;
1047 *hdh_pp = hdh_p->hdh_next;
1048 break;
1049 }
1050 if (hdh_q == NULL)
1051 hdh_pp = &hdh_p->hdh_next;
1052 }
1053 *hdh_pp = hh_dir->dyn_relocs;
1054 }
1055
1056 hh_dir->dyn_relocs = hh_ind->dyn_relocs;
1057 hh_ind->dyn_relocs = NULL;
1058 }
1059
1060 if (eh_ind->root.type == bfd_link_hash_indirect)
1061 {
1062 hh_dir->plabel |= hh_ind->plabel;
1063 hh_dir->tls_type |= hh_ind->tls_type;
1064 hh_ind->tls_type = GOT_UNKNOWN;
1065 }
1066
1067 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
1068 }
1069
1070 static int
1071 elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1072 int r_type, int is_local ATTRIBUTE_UNUSED)
1073 {
1074 /* For now we don't support linker optimizations. */
1075 return r_type;
1076 }
1077
1078 /* Return a pointer to the local GOT, PLT and TLS reference counts
1079 for ABFD. Returns NULL if the storage allocation fails. */
1080
1081 static bfd_signed_vma *
1082 hppa32_elf_local_refcounts (bfd *abfd)
1083 {
1084 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1085 bfd_signed_vma *local_refcounts;
1086
1087 local_refcounts = elf_local_got_refcounts (abfd);
1088 if (local_refcounts == NULL)
1089 {
1090 bfd_size_type size;
1091
1092 /* Allocate space for local GOT and PLT reference
1093 counts. Done this way to save polluting elf_obj_tdata
1094 with another target specific pointer. */
1095 size = symtab_hdr->sh_info;
1096 size *= 2 * sizeof (bfd_signed_vma);
1097 /* Add in space to store the local GOT TLS types. */
1098 size += symtab_hdr->sh_info;
1099 local_refcounts = bfd_zalloc (abfd, size);
1100 if (local_refcounts == NULL)
1101 return NULL;
1102 elf_local_got_refcounts (abfd) = local_refcounts;
1103 memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1104 symtab_hdr->sh_info);
1105 }
1106 return local_refcounts;
1107 }
1108
1109
1110 /* Look through the relocs for a section during the first phase, and
1111 calculate needed space in the global offset table, procedure linkage
1112 table, and dynamic reloc sections. At this point we haven't
1113 necessarily read all the input files. */
1114
1115 static bfd_boolean
1116 elf32_hppa_check_relocs (bfd *abfd,
1117 struct bfd_link_info *info,
1118 asection *sec,
1119 const Elf_Internal_Rela *relocs)
1120 {
1121 Elf_Internal_Shdr *symtab_hdr;
1122 struct elf_link_hash_entry **eh_syms;
1123 const Elf_Internal_Rela *rela;
1124 const Elf_Internal_Rela *rela_end;
1125 struct elf32_hppa_link_hash_table *htab;
1126 asection *sreloc;
1127
1128 if (bfd_link_relocatable (info))
1129 return TRUE;
1130
1131 htab = hppa_link_hash_table (info);
1132 if (htab == NULL)
1133 return FALSE;
1134 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1135 eh_syms = elf_sym_hashes (abfd);
1136 sreloc = NULL;
1137
1138 rela_end = relocs + sec->reloc_count;
1139 for (rela = relocs; rela < rela_end; rela++)
1140 {
1141 enum {
1142 NEED_GOT = 1,
1143 NEED_PLT = 2,
1144 NEED_DYNREL = 4,
1145 PLT_PLABEL = 8
1146 };
1147
1148 unsigned int r_symndx, r_type;
1149 struct elf32_hppa_link_hash_entry *hh;
1150 int need_entry = 0;
1151
1152 r_symndx = ELF32_R_SYM (rela->r_info);
1153
1154 if (r_symndx < symtab_hdr->sh_info)
1155 hh = NULL;
1156 else
1157 {
1158 hh = hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
1159 while (hh->eh.root.type == bfd_link_hash_indirect
1160 || hh->eh.root.type == bfd_link_hash_warning)
1161 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
1162 }
1163
1164 r_type = ELF32_R_TYPE (rela->r_info);
1165 r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
1166
1167 switch (r_type)
1168 {
1169 case R_PARISC_DLTIND14F:
1170 case R_PARISC_DLTIND14R:
1171 case R_PARISC_DLTIND21L:
1172 /* This symbol requires a global offset table entry. */
1173 need_entry = NEED_GOT;
1174 break;
1175
1176 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1177 case R_PARISC_PLABEL21L:
1178 case R_PARISC_PLABEL32:
1179 /* If the addend is non-zero, we break badly. */
1180 if (rela->r_addend != 0)
1181 abort ();
1182
1183 /* If we are creating a shared library, then we need to
1184 create a PLT entry for all PLABELs, because PLABELs with
1185 local symbols may be passed via a pointer to another
1186 object. Additionally, output a dynamic relocation
1187 pointing to the PLT entry.
1188
1189 For executables, the original 32-bit ABI allowed two
1190 different styles of PLABELs (function pointers): For
1191 global functions, the PLABEL word points into the .plt
1192 two bytes past a (function address, gp) pair, and for
1193 local functions the PLABEL points directly at the
1194 function. The magic +2 for the first type allows us to
1195 differentiate between the two. As you can imagine, this
1196 is a real pain when it comes to generating code to call
1197 functions indirectly or to compare function pointers.
1198 We avoid the mess by always pointing a PLABEL into the
1199 .plt, even for local functions. */
1200 need_entry = PLT_PLABEL | NEED_PLT;
1201 if (bfd_link_pic (info))
1202 need_entry |= NEED_DYNREL;
1203 break;
1204
1205 case R_PARISC_PCREL12F:
1206 htab->has_12bit_branch = 1;
1207 goto branch_common;
1208
1209 case R_PARISC_PCREL17C:
1210 case R_PARISC_PCREL17F:
1211 htab->has_17bit_branch = 1;
1212 goto branch_common;
1213
1214 case R_PARISC_PCREL22F:
1215 htab->has_22bit_branch = 1;
1216 branch_common:
1217 /* Function calls might need to go through the .plt, and
1218 might require long branch stubs. */
1219 if (hh == NULL)
1220 {
1221 /* We know local syms won't need a .plt entry, and if
1222 they need a long branch stub we can't guarantee that
1223 we can reach the stub. So just flag an error later
1224 if we're doing a shared link and find we need a long
1225 branch stub. */
1226 continue;
1227 }
1228 else
1229 {
1230 /* Global symbols will need a .plt entry if they remain
1231 global, and in most cases won't need a long branch
1232 stub. Unfortunately, we have to cater for the case
1233 where a symbol is forced local by versioning, or due
1234 to symbolic linking, and we lose the .plt entry. */
1235 need_entry = NEED_PLT;
1236 if (hh->eh.type == STT_PARISC_MILLI)
1237 need_entry = 0;
1238 }
1239 break;
1240
1241 case R_PARISC_SEGBASE: /* Used to set segment base. */
1242 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
1243 case R_PARISC_PCREL14F: /* PC relative load/store. */
1244 case R_PARISC_PCREL14R:
1245 case R_PARISC_PCREL17R: /* External branches. */
1246 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1247 case R_PARISC_PCREL32:
1248 /* We don't need to propagate the relocation if linking a
1249 shared object since these are section relative. */
1250 continue;
1251
1252 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1253 case R_PARISC_DPREL14R:
1254 case R_PARISC_DPREL21L:
1255 if (bfd_link_pic (info))
1256 {
1257 _bfd_error_handler
1258 /* xgettext:c-format */
1259 (_("%B: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1260 abfd,
1261 elf_hppa_howto_table[r_type].name);
1262 bfd_set_error (bfd_error_bad_value);
1263 return FALSE;
1264 }
1265 /* Fall through. */
1266
1267 case R_PARISC_DIR17F: /* Used for external branches. */
1268 case R_PARISC_DIR17R:
1269 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1270 case R_PARISC_DIR14R:
1271 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1272 case R_PARISC_DIR32: /* .word relocs. */
1273 /* We may want to output a dynamic relocation later. */
1274 need_entry = NEED_DYNREL;
1275 break;
1276
1277 /* This relocation describes the C++ object vtable hierarchy.
1278 Reconstruct it for later use during GC. */
1279 case R_PARISC_GNU_VTINHERIT:
1280 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
1281 return FALSE;
1282 continue;
1283
1284 /* This relocation describes which C++ vtable entries are actually
1285 used. Record for later use during GC. */
1286 case R_PARISC_GNU_VTENTRY:
1287 BFD_ASSERT (hh != NULL);
1288 if (hh != NULL
1289 && !bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
1290 return FALSE;
1291 continue;
1292
1293 case R_PARISC_TLS_GD21L:
1294 case R_PARISC_TLS_GD14R:
1295 case R_PARISC_TLS_LDM21L:
1296 case R_PARISC_TLS_LDM14R:
1297 need_entry = NEED_GOT;
1298 break;
1299
1300 case R_PARISC_TLS_IE21L:
1301 case R_PARISC_TLS_IE14R:
1302 if (bfd_link_dll (info))
1303 info->flags |= DF_STATIC_TLS;
1304 need_entry = NEED_GOT;
1305 break;
1306
1307 default:
1308 continue;
1309 }
1310
1311 /* Now carry out our orders. */
1312 if (need_entry & NEED_GOT)
1313 {
1314 int tls_type = GOT_NORMAL;
1315
1316 switch (r_type)
1317 {
1318 default:
1319 break;
1320 case R_PARISC_TLS_GD21L:
1321 case R_PARISC_TLS_GD14R:
1322 tls_type = GOT_TLS_GD;
1323 break;
1324 case R_PARISC_TLS_LDM21L:
1325 case R_PARISC_TLS_LDM14R:
1326 tls_type = GOT_TLS_LDM;
1327 break;
1328 case R_PARISC_TLS_IE21L:
1329 case R_PARISC_TLS_IE14R:
1330 tls_type = GOT_TLS_IE;
1331 break;
1332 }
1333
1334 /* Allocate space for a GOT entry, as well as a dynamic
1335 relocation for this entry. */
1336 if (htab->etab.sgot == NULL)
1337 {
1338 if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
1339 return FALSE;
1340 }
1341
1342 if (hh != NULL)
1343 {
1344 if (tls_type == GOT_TLS_LDM)
1345 htab->tls_ldm_got.refcount += 1;
1346 else
1347 hh->eh.got.refcount += 1;
1348 hh->tls_type |= tls_type;
1349 }
1350 else
1351 {
1352 bfd_signed_vma *local_got_refcounts;
1353
1354 /* This is a global offset table entry for a local symbol. */
1355 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1356 if (local_got_refcounts == NULL)
1357 return FALSE;
1358 if (tls_type == GOT_TLS_LDM)
1359 htab->tls_ldm_got.refcount += 1;
1360 else
1361 local_got_refcounts[r_symndx] += 1;
1362
1363 hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
1364 }
1365 }
1366
1367 if (need_entry & NEED_PLT)
1368 {
1369 /* If we are creating a shared library, and this is a reloc
1370 against a weak symbol or a global symbol in a dynamic
1371 object, then we will be creating an import stub and a
1372 .plt entry for the symbol. Similarly, on a normal link
1373 to symbols defined in a dynamic object we'll need the
1374 import stub and a .plt entry. We don't know yet whether
1375 the symbol is defined or not, so make an entry anyway and
1376 clean up later in adjust_dynamic_symbol. */
1377 if ((sec->flags & SEC_ALLOC) != 0)
1378 {
1379 if (hh != NULL)
1380 {
1381 hh->eh.needs_plt = 1;
1382 hh->eh.plt.refcount += 1;
1383
1384 /* If this .plt entry is for a plabel, mark it so
1385 that adjust_dynamic_symbol will keep the entry
1386 even if it appears to be local. */
1387 if (need_entry & PLT_PLABEL)
1388 hh->plabel = 1;
1389 }
1390 else if (need_entry & PLT_PLABEL)
1391 {
1392 bfd_signed_vma *local_got_refcounts;
1393 bfd_signed_vma *local_plt_refcounts;
1394
1395 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1396 if (local_got_refcounts == NULL)
1397 return FALSE;
1398 local_plt_refcounts = (local_got_refcounts
1399 + symtab_hdr->sh_info);
1400 local_plt_refcounts[r_symndx] += 1;
1401 }
1402 }
1403 }
1404
1405 if ((need_entry & NEED_DYNREL) != 0
1406 && (sec->flags & SEC_ALLOC) != 0)
1407 {
1408 /* Flag this symbol as having a non-got, non-plt reference
1409 so that we generate copy relocs if it turns out to be
1410 dynamic. */
1411 if (hh != NULL)
1412 hh->eh.non_got_ref = 1;
1413
1414 /* If we are creating a shared library then we need to copy
1415 the reloc into the shared library. However, if we are
1416 linking with -Bsymbolic, we need only copy absolute
1417 relocs or relocs against symbols that are not defined in
1418 an object we are including in the link. PC- or DP- or
1419 DLT-relative relocs against any local sym or global sym
1420 with DEF_REGULAR set, can be discarded. At this point we
1421 have not seen all the input files, so it is possible that
1422 DEF_REGULAR is not set now but will be set later (it is
1423 never cleared). We account for that possibility below by
1424 storing information in the dyn_relocs field of the
1425 hash table entry.
1426
1427 A similar situation to the -Bsymbolic case occurs when
1428 creating shared libraries and symbol visibility changes
1429 render the symbol local.
1430
1431 As it turns out, all the relocs we will be creating here
1432 are absolute, so we cannot remove them on -Bsymbolic
1433 links or visibility changes anyway. A STUB_REL reloc
1434 is absolute too, as in that case it is the reloc in the
1435 stub we will be creating, rather than copying the PCREL
1436 reloc in the branch.
1437
1438 If on the other hand, we are creating an executable, we
1439 may need to keep relocations for symbols satisfied by a
1440 dynamic library if we manage to avoid copy relocs for the
1441 symbol. */
1442 if ((bfd_link_pic (info)
1443 && (IS_ABSOLUTE_RELOC (r_type)
1444 || (hh != NULL
1445 && (!SYMBOLIC_BIND (info, &hh->eh)
1446 || hh->eh.root.type == bfd_link_hash_defweak
1447 || !hh->eh.def_regular))))
1448 || (ELIMINATE_COPY_RELOCS
1449 && !bfd_link_pic (info)
1450 && hh != NULL
1451 && (hh->eh.root.type == bfd_link_hash_defweak
1452 || !hh->eh.def_regular)))
1453 {
1454 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1455 struct elf32_hppa_dyn_reloc_entry **hdh_head;
1456
1457 /* Create a reloc section in dynobj and make room for
1458 this reloc. */
1459 if (sreloc == NULL)
1460 {
1461 sreloc = _bfd_elf_make_dynamic_reloc_section
1462 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
1463
1464 if (sreloc == NULL)
1465 {
1466 bfd_set_error (bfd_error_bad_value);
1467 return FALSE;
1468 }
1469 }
1470
1471 /* If this is a global symbol, we count the number of
1472 relocations we need for this symbol. */
1473 if (hh != NULL)
1474 {
1475 hdh_head = &hh->dyn_relocs;
1476 }
1477 else
1478 {
1479 /* Track dynamic relocs needed for local syms too.
1480 We really need local syms available to do this
1481 easily. Oh well. */
1482 asection *sr;
1483 void *vpp;
1484 Elf_Internal_Sym *isym;
1485
1486 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1487 abfd, r_symndx);
1488 if (isym == NULL)
1489 return FALSE;
1490
1491 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1492 if (sr == NULL)
1493 sr = sec;
1494
1495 vpp = &elf_section_data (sr)->local_dynrel;
1496 hdh_head = (struct elf32_hppa_dyn_reloc_entry **) vpp;
1497 }
1498
1499 hdh_p = *hdh_head;
1500 if (hdh_p == NULL || hdh_p->sec != sec)
1501 {
1502 hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
1503 if (hdh_p == NULL)
1504 return FALSE;
1505 hdh_p->hdh_next = *hdh_head;
1506 *hdh_head = hdh_p;
1507 hdh_p->sec = sec;
1508 hdh_p->count = 0;
1509 #if RELATIVE_DYNRELOCS
1510 hdh_p->relative_count = 0;
1511 #endif
1512 }
1513
1514 hdh_p->count += 1;
1515 #if RELATIVE_DYNRELOCS
1516 if (!IS_ABSOLUTE_RELOC (rtype))
1517 hdh_p->relative_count += 1;
1518 #endif
1519 }
1520 }
1521 }
1522
1523 return TRUE;
1524 }
1525
1526 /* Return the section that should be marked against garbage collection
1527 for a given relocation. */
1528
1529 static asection *
1530 elf32_hppa_gc_mark_hook (asection *sec,
1531 struct bfd_link_info *info,
1532 Elf_Internal_Rela *rela,
1533 struct elf_link_hash_entry *hh,
1534 Elf_Internal_Sym *sym)
1535 {
1536 if (hh != NULL)
1537 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1538 {
1539 case R_PARISC_GNU_VTINHERIT:
1540 case R_PARISC_GNU_VTENTRY:
1541 return NULL;
1542 }
1543
1544 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
1545 }
1546
1547 /* Support for core dump NOTE sections. */
1548
1549 static bfd_boolean
1550 elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1551 {
1552 int offset;
1553 size_t size;
1554
1555 switch (note->descsz)
1556 {
1557 default:
1558 return FALSE;
1559
1560 case 396: /* Linux/hppa */
1561 /* pr_cursig */
1562 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1563
1564 /* pr_pid */
1565 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
1566
1567 /* pr_reg */
1568 offset = 72;
1569 size = 320;
1570
1571 break;
1572 }
1573
1574 /* Make a ".reg/999" section. */
1575 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1576 size, note->descpos + offset);
1577 }
1578
1579 static bfd_boolean
1580 elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1581 {
1582 switch (note->descsz)
1583 {
1584 default:
1585 return FALSE;
1586
1587 case 124: /* Linux/hppa elf_prpsinfo. */
1588 elf_tdata (abfd)->core->program
1589 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
1590 elf_tdata (abfd)->core->command
1591 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1592 }
1593
1594 /* Note that for some reason, a spurious space is tacked
1595 onto the end of the args in some (at least one anyway)
1596 implementations, so strip it off if it exists. */
1597 {
1598 char *command = elf_tdata (abfd)->core->command;
1599 int n = strlen (command);
1600
1601 if (0 < n && command[n - 1] == ' ')
1602 command[n - 1] = '\0';
1603 }
1604
1605 return TRUE;
1606 }
1607
1608 /* Our own version of hide_symbol, so that we can keep plt entries for
1609 plabels. */
1610
1611 static void
1612 elf32_hppa_hide_symbol (struct bfd_link_info *info,
1613 struct elf_link_hash_entry *eh,
1614 bfd_boolean force_local)
1615 {
1616 if (force_local)
1617 {
1618 eh->forced_local = 1;
1619 if (eh->dynindx != -1)
1620 {
1621 eh->dynindx = -1;
1622 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1623 eh->dynstr_index);
1624 }
1625
1626 /* PR 16082: Remove version information from hidden symbol. */
1627 eh->verinfo.verdef = NULL;
1628 eh->verinfo.vertree = NULL;
1629 }
1630
1631 /* STT_GNU_IFUNC symbol must go through PLT. */
1632 if (! hppa_elf_hash_entry (eh)->plabel
1633 && eh->type != STT_GNU_IFUNC)
1634 {
1635 eh->needs_plt = 0;
1636 eh->plt = elf_hash_table (info)->init_plt_offset;
1637 }
1638 }
1639
1640 /* Find any dynamic relocs that apply to read-only sections. */
1641
1642 static asection *
1643 readonly_dynrelocs (struct elf_link_hash_entry *eh)
1644 {
1645 struct elf32_hppa_link_hash_entry *hh;
1646 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1647
1648 hh = hppa_elf_hash_entry (eh);
1649 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
1650 {
1651 asection *sec = hdh_p->sec->output_section;
1652
1653 if (sec != NULL && (sec->flags & SEC_READONLY) != 0)
1654 return hdh_p->sec;
1655 }
1656 return NULL;
1657 }
1658
1659 /* Return true if we have dynamic relocs against H or any of its weak
1660 aliases, that apply to read-only sections. Cannot be used after
1661 size_dynamic_sections. */
1662
1663 static bfd_boolean
1664 alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1665 {
1666 struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1667 do
1668 {
1669 if (readonly_dynrelocs (&hh->eh))
1670 return TRUE;
1671 hh = hppa_elf_hash_entry (hh->eh.u.alias);
1672 } while (hh != NULL && &hh->eh != eh);
1673
1674 return FALSE;
1675 }
1676
1677 /* Adjust a symbol defined by a dynamic object and referenced by a
1678 regular object. The current definition is in some section of the
1679 dynamic object, but we're not including those sections. We have to
1680 change the definition to something the rest of the link can
1681 understand. */
1682
1683 static bfd_boolean
1684 elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
1685 struct elf_link_hash_entry *eh)
1686 {
1687 struct elf32_hppa_link_hash_table *htab;
1688 asection *sec, *srel;
1689
1690 /* If this is a function, put it in the procedure linkage table. We
1691 will fill in the contents of the procedure linkage table later. */
1692 if (eh->type == STT_FUNC
1693 || eh->needs_plt)
1694 {
1695 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, eh)
1696 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
1697 /* Discard dyn_relocs when non-pic if we've decided that a
1698 function symbol is local. */
1699 if (!bfd_link_pic (info) && local)
1700 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
1701
1702 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1703 The refcounts are not reliable when it has been hidden since
1704 hide_symbol can be called before the plabel flag is set. */
1705 if (hppa_elf_hash_entry (eh)->plabel)
1706 eh->plt.refcount = 1;
1707
1708 /* Note that unlike some other backends, the refcount is not
1709 incremented for a non-call (and non-plabel) function reference. */
1710 else if (eh->plt.refcount <= 0
1711 || local)
1712 {
1713 /* The .plt entry is not needed when:
1714 a) Garbage collection has removed all references to the
1715 symbol, or
1716 b) We know for certain the symbol is defined in this
1717 object, and it's not a weak definition, nor is the symbol
1718 used by a plabel relocation. Either this object is the
1719 application or we are doing a shared symbolic link. */
1720 eh->plt.offset = (bfd_vma) -1;
1721 eh->needs_plt = 0;
1722 }
1723
1724 /* Unlike other targets, elf32-hppa.c does not define a function
1725 symbol in a non-pic executable on PLT stub code, so we don't
1726 have a local definition in that case. ie. dyn_relocs can't
1727 be discarded. */
1728
1729 /* Function symbols can't have copy relocs. */
1730 return TRUE;
1731 }
1732 else
1733 eh->plt.offset = (bfd_vma) -1;
1734
1735 htab = hppa_link_hash_table (info);
1736 if (htab == NULL)
1737 return FALSE;
1738
1739 /* If this is a weak symbol, and there is a real definition, the
1740 processor independent code will have arranged for us to see the
1741 real definition first, and we can just use the same value. */
1742 if (eh->is_weakalias)
1743 {
1744 struct elf_link_hash_entry *def = weakdef (eh);
1745 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1746 eh->root.u.def.section = def->root.u.def.section;
1747 eh->root.u.def.value = def->root.u.def.value;
1748 if (def->root.u.def.section == htab->etab.sdynbss
1749 || def->root.u.def.section == htab->etab.sdynrelro)
1750 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
1751 return TRUE;
1752 }
1753
1754 /* This is a reference to a symbol defined by a dynamic object which
1755 is not a function. */
1756
1757 /* If we are creating a shared library, we must presume that the
1758 only references to the symbol are via the global offset table.
1759 For such cases we need not do anything here; the relocations will
1760 be handled correctly by relocate_section. */
1761 if (bfd_link_pic (info))
1762 return TRUE;
1763
1764 /* If there are no references to this symbol that do not use the
1765 GOT, we don't need to generate a copy reloc. */
1766 if (!eh->non_got_ref)
1767 return TRUE;
1768
1769 /* If -z nocopyreloc was given, we won't generate them either. */
1770 if (info->nocopyreloc)
1771 return TRUE;
1772
1773 if (ELIMINATE_COPY_RELOCS
1774 && !alias_readonly_dynrelocs (eh))
1775 {
1776 /* If we didn't find any dynamic relocs in read-only sections, then
1777 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1778 return TRUE;
1779 }
1780
1781 /* We must allocate the symbol in our .dynbss section, which will
1782 become part of the .bss section of the executable. There will be
1783 an entry for this symbol in the .dynsym section. The dynamic
1784 object will contain position independent code, so all references
1785 from the dynamic object to this symbol will go through the global
1786 offset table. The dynamic linker will use the .dynsym entry to
1787 determine the address it must put in the global offset table, so
1788 both the dynamic object and the regular object will refer to the
1789 same memory location for the variable. */
1790 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1791 {
1792 sec = htab->etab.sdynrelro;
1793 srel = htab->etab.sreldynrelro;
1794 }
1795 else
1796 {
1797 sec = htab->etab.sdynbss;
1798 srel = htab->etab.srelbss;
1799 }
1800 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
1801 {
1802 /* We must generate a COPY reloc to tell the dynamic linker to
1803 copy the initial value out of the dynamic object and into the
1804 runtime process image. */
1805 srel->size += sizeof (Elf32_External_Rela);
1806 eh->needs_copy = 1;
1807 }
1808
1809 /* We no longer want dyn_relocs. */
1810 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
1811 return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
1812 }
1813
1814 /* If EH is undefined, make it dynamic if that makes sense. */
1815
1816 static bfd_boolean
1817 ensure_undef_dynamic (struct bfd_link_info *info,
1818 struct elf_link_hash_entry *eh)
1819 {
1820 struct elf_link_hash_table *htab = elf_hash_table (info);
1821
1822 if (htab->dynamic_sections_created
1823 && (eh->root.type == bfd_link_hash_undefweak
1824 || eh->root.type == bfd_link_hash_undefined)
1825 && eh->dynindx == -1
1826 && !eh->forced_local
1827 && eh->type != STT_PARISC_MILLI
1828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
1829 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1830 return bfd_elf_link_record_dynamic_symbol (info, eh);
1831 return TRUE;
1832 }
1833
1834 /* Allocate space in the .plt for entries that won't have relocations.
1835 ie. plabel entries. */
1836
1837 static bfd_boolean
1838 allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
1839 {
1840 struct bfd_link_info *info;
1841 struct elf32_hppa_link_hash_table *htab;
1842 struct elf32_hppa_link_hash_entry *hh;
1843 asection *sec;
1844
1845 if (eh->root.type == bfd_link_hash_indirect)
1846 return TRUE;
1847
1848 info = (struct bfd_link_info *) inf;
1849 hh = hppa_elf_hash_entry (eh);
1850 htab = hppa_link_hash_table (info);
1851 if (htab == NULL)
1852 return FALSE;
1853
1854 if (htab->etab.dynamic_sections_created
1855 && eh->plt.refcount > 0)
1856 {
1857 if (!ensure_undef_dynamic (info, eh))
1858 return FALSE;
1859
1860 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
1861 {
1862 /* Allocate these later. From this point on, h->plabel
1863 means that the plt entry is only used by a plabel.
1864 We'll be using a normal plt entry for this symbol, so
1865 clear the plabel indicator. */
1866
1867 hh->plabel = 0;
1868 }
1869 else if (hh->plabel)
1870 {
1871 /* Make an entry in the .plt section for plabel references
1872 that won't have a .plt entry for other reasons. */
1873 sec = htab->etab.splt;
1874 eh->plt.offset = sec->size;
1875 sec->size += PLT_ENTRY_SIZE;
1876 if (bfd_link_pic (info))
1877 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1878 }
1879 else
1880 {
1881 /* No .plt entry needed. */
1882 eh->plt.offset = (bfd_vma) -1;
1883 eh->needs_plt = 0;
1884 }
1885 }
1886 else
1887 {
1888 eh->plt.offset = (bfd_vma) -1;
1889 eh->needs_plt = 0;
1890 }
1891
1892 return TRUE;
1893 }
1894
1895 /* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1896
1897 static inline unsigned int
1898 got_entries_needed (int tls_type)
1899 {
1900 unsigned int need = 0;
1901
1902 if ((tls_type & GOT_NORMAL) != 0)
1903 need += GOT_ENTRY_SIZE;
1904 if ((tls_type & GOT_TLS_GD) != 0)
1905 need += GOT_ENTRY_SIZE * 2;
1906 if ((tls_type & GOT_TLS_IE) != 0)
1907 need += GOT_ENTRY_SIZE;
1908 return need;
1909 }
1910
1911 /* Calculate size of relocs needed for symbol given its TLS_TYPE and
1912 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated
1913 at link time. */
1914
1915 static inline unsigned int
1916 got_relocs_needed (int tls_type, unsigned int need, bfd_boolean known)
1917 {
1918 /* All the entries we allocated need relocs.
1919 Except IE in executable with a local symbol. We could also omit
1920 the DTPOFF reloc on the second word of a GD entry under the same
1921 condition as that for IE, but ld.so might want to differentiate
1922 LD and GD entries at some stage. */
1923 if ((tls_type & GOT_TLS_IE) != 0 && known)
1924 need -= GOT_ENTRY_SIZE;
1925 return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1926 }
1927
1928 /* Allocate space in .plt, .got and associated reloc sections for
1929 global syms. */
1930
1931 static bfd_boolean
1932 allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
1933 {
1934 struct bfd_link_info *info;
1935 struct elf32_hppa_link_hash_table *htab;
1936 asection *sec;
1937 struct elf32_hppa_link_hash_entry *hh;
1938 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1939
1940 if (eh->root.type == bfd_link_hash_indirect)
1941 return TRUE;
1942
1943 info = inf;
1944 htab = hppa_link_hash_table (info);
1945 if (htab == NULL)
1946 return FALSE;
1947
1948 hh = hppa_elf_hash_entry (eh);
1949
1950 if (htab->etab.dynamic_sections_created
1951 && eh->plt.offset != (bfd_vma) -1
1952 && !hh->plabel
1953 && eh->plt.refcount > 0)
1954 {
1955 /* Make an entry in the .plt section. */
1956 sec = htab->etab.splt;
1957 eh->plt.offset = sec->size;
1958 sec->size += PLT_ENTRY_SIZE;
1959
1960 /* We also need to make an entry in the .rela.plt section. */
1961 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1962 htab->need_plt_stub = 1;
1963 }
1964
1965 if (eh->got.refcount > 0)
1966 {
1967 unsigned int need;
1968
1969 if (!ensure_undef_dynamic (info, eh))
1970 return FALSE;
1971
1972 sec = htab->etab.sgot;
1973 eh->got.offset = sec->size;
1974 need = got_entries_needed (hh->tls_type);
1975 sec->size += need;
1976 if (htab->etab.dynamic_sections_created
1977 && (bfd_link_pic (info)
1978 || (eh->dynindx != -1
1979 && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1980 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1981 {
1982 bfd_boolean tprel_known = (bfd_link_executable (info)
1983 && SYMBOL_REFERENCES_LOCAL (info, eh));
1984 htab->etab.srelgot->size
1985 += got_relocs_needed (hh->tls_type, need, tprel_known);
1986 }
1987 }
1988 else
1989 eh->got.offset = (bfd_vma) -1;
1990
1991 /* If no dynamic sections we can't have dynamic relocs. */
1992 if (!htab->etab.dynamic_sections_created)
1993 hh->dyn_relocs = NULL;
1994
1995 /* Discard relocs on undefined syms with non-default visibility. */
1996 else if ((eh->root.type == bfd_link_hash_undefined
1997 && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
1998 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1999 hh->dyn_relocs = NULL;
2000
2001 if (hh->dyn_relocs == NULL)
2002 return TRUE;
2003
2004 /* If this is a -Bsymbolic shared link, then we need to discard all
2005 space allocated for dynamic pc-relative relocs against symbols
2006 defined in a regular object. For the normal shared case, discard
2007 space for relocs that have become local due to symbol visibility
2008 changes. */
2009 if (bfd_link_pic (info))
2010 {
2011 #if RELATIVE_DYNRELOCS
2012 if (SYMBOL_CALLS_LOCAL (info, eh))
2013 {
2014 struct elf32_hppa_dyn_reloc_entry **hdh_pp;
2015
2016 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
2017 {
2018 hdh_p->count -= hdh_p->relative_count;
2019 hdh_p->relative_count = 0;
2020 if (hdh_p->count == 0)
2021 *hdh_pp = hdh_p->hdh_next;
2022 else
2023 hdh_pp = &hdh_p->hdh_next;
2024 }
2025 }
2026 #endif
2027
2028 if (hh->dyn_relocs != NULL)
2029 {
2030 if (!ensure_undef_dynamic (info, eh))
2031 return FALSE;
2032 }
2033 }
2034 else if (ELIMINATE_COPY_RELOCS)
2035 {
2036 /* For the non-shared case, discard space for relocs against
2037 symbols which turn out to need copy relocs or are not
2038 dynamic. */
2039
2040 if (eh->dynamic_adjusted
2041 && !eh->def_regular
2042 && !ELF_COMMON_DEF_P (eh))
2043 {
2044 if (!ensure_undef_dynamic (info, eh))
2045 return FALSE;
2046
2047 if (eh->dynindx == -1)
2048 hh->dyn_relocs = NULL;
2049 }
2050 else
2051 hh->dyn_relocs = NULL;
2052 }
2053
2054 /* Finally, allocate space. */
2055 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
2056 {
2057 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2058 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
2059 }
2060
2061 return TRUE;
2062 }
2063
2064 /* This function is called via elf_link_hash_traverse to force
2065 millicode symbols local so they do not end up as globals in the
2066 dynamic symbol table. We ought to be able to do this in
2067 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2068 for all dynamic symbols. Arguably, this is a bug in
2069 elf_adjust_dynamic_symbol. */
2070
2071 static bfd_boolean
2072 clobber_millicode_symbols (struct elf_link_hash_entry *eh,
2073 struct bfd_link_info *info)
2074 {
2075 if (eh->type == STT_PARISC_MILLI
2076 && !eh->forced_local)
2077 {
2078 elf32_hppa_hide_symbol (info, eh, TRUE);
2079 }
2080 return TRUE;
2081 }
2082
2083 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
2084 read-only sections. */
2085
2086 static bfd_boolean
2087 maybe_set_textrel (struct elf_link_hash_entry *eh, void *inf)
2088 {
2089 asection *sec;
2090
2091 if (eh->root.type == bfd_link_hash_indirect)
2092 return TRUE;
2093
2094 sec = readonly_dynrelocs (eh);
2095 if (sec != NULL)
2096 {
2097 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2098
2099 info->flags |= DF_TEXTREL;
2100 info->callbacks->minfo
2101 (_("%B: dynamic relocation against `%T' in read-only section `%A'\n"),
2102 sec->owner, eh->root.root.string, sec);
2103
2104 /* Not an error, just cut short the traversal. */
2105 return FALSE;
2106 }
2107 return TRUE;
2108 }
2109
2110 /* Set the sizes of the dynamic sections. */
2111
2112 static bfd_boolean
2113 elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2114 struct bfd_link_info *info)
2115 {
2116 struct elf32_hppa_link_hash_table *htab;
2117 bfd *dynobj;
2118 bfd *ibfd;
2119 asection *sec;
2120 bfd_boolean relocs;
2121
2122 htab = hppa_link_hash_table (info);
2123 if (htab == NULL)
2124 return FALSE;
2125
2126 dynobj = htab->etab.dynobj;
2127 if (dynobj == NULL)
2128 abort ();
2129
2130 if (htab->etab.dynamic_sections_created)
2131 {
2132 /* Set the contents of the .interp section to the interpreter. */
2133 if (bfd_link_executable (info) && !info->nointerp)
2134 {
2135 sec = bfd_get_linker_section (dynobj, ".interp");
2136 if (sec == NULL)
2137 abort ();
2138 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2139 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2140 }
2141
2142 /* Force millicode symbols local. */
2143 elf_link_hash_traverse (&htab->etab,
2144 clobber_millicode_symbols,
2145 info);
2146 }
2147
2148 /* Set up .got and .plt offsets for local syms, and space for local
2149 dynamic relocs. */
2150 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2151 {
2152 bfd_signed_vma *local_got;
2153 bfd_signed_vma *end_local_got;
2154 bfd_signed_vma *local_plt;
2155 bfd_signed_vma *end_local_plt;
2156 bfd_size_type locsymcount;
2157 Elf_Internal_Shdr *symtab_hdr;
2158 asection *srel;
2159 char *local_tls_type;
2160
2161 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2162 continue;
2163
2164 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
2165 {
2166 struct elf32_hppa_dyn_reloc_entry *hdh_p;
2167
2168 for (hdh_p = ((struct elf32_hppa_dyn_reloc_entry *)
2169 elf_section_data (sec)->local_dynrel);
2170 hdh_p != NULL;
2171 hdh_p = hdh_p->hdh_next)
2172 {
2173 if (!bfd_is_abs_section (hdh_p->sec)
2174 && bfd_is_abs_section (hdh_p->sec->output_section))
2175 {
2176 /* Input section has been discarded, either because
2177 it is a copy of a linkonce section or due to
2178 linker script /DISCARD/, so we'll be discarding
2179 the relocs too. */
2180 }
2181 else if (hdh_p->count != 0)
2182 {
2183 srel = elf_section_data (hdh_p->sec)->sreloc;
2184 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2185 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
2186 info->flags |= DF_TEXTREL;
2187 }
2188 }
2189 }
2190
2191 local_got = elf_local_got_refcounts (ibfd);
2192 if (!local_got)
2193 continue;
2194
2195 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2196 locsymcount = symtab_hdr->sh_info;
2197 end_local_got = local_got + locsymcount;
2198 local_tls_type = hppa_elf_local_got_tls_type (ibfd);
2199 sec = htab->etab.sgot;
2200 srel = htab->etab.srelgot;
2201 for (; local_got < end_local_got; ++local_got)
2202 {
2203 if (*local_got > 0)
2204 {
2205 unsigned int need;
2206
2207 *local_got = sec->size;
2208 need = got_entries_needed (*local_tls_type);
2209 sec->size += need;
2210 if (bfd_link_pic (info))
2211 {
2212 bfd_boolean tprel_known = bfd_link_executable (info);
2213 htab->etab.srelgot->size
2214 += got_relocs_needed (*local_tls_type, need, tprel_known);
2215 }
2216 }
2217 else
2218 *local_got = (bfd_vma) -1;
2219
2220 ++local_tls_type;
2221 }
2222
2223 local_plt = end_local_got;
2224 end_local_plt = local_plt + locsymcount;
2225 if (! htab->etab.dynamic_sections_created)
2226 {
2227 /* Won't be used, but be safe. */
2228 for (; local_plt < end_local_plt; ++local_plt)
2229 *local_plt = (bfd_vma) -1;
2230 }
2231 else
2232 {
2233 sec = htab->etab.splt;
2234 srel = htab->etab.srelplt;
2235 for (; local_plt < end_local_plt; ++local_plt)
2236 {
2237 if (*local_plt > 0)
2238 {
2239 *local_plt = sec->size;
2240 sec->size += PLT_ENTRY_SIZE;
2241 if (bfd_link_pic (info))
2242 srel->size += sizeof (Elf32_External_Rela);
2243 }
2244 else
2245 *local_plt = (bfd_vma) -1;
2246 }
2247 }
2248 }
2249
2250 if (htab->tls_ldm_got.refcount > 0)
2251 {
2252 /* Allocate 2 got entries and 1 dynamic reloc for
2253 R_PARISC_TLS_DTPMOD32 relocs. */
2254 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2255 htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2256 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2257 }
2258 else
2259 htab->tls_ldm_got.offset = -1;
2260
2261 /* Do all the .plt entries without relocs first. The dynamic linker
2262 uses the last .plt reloc to find the end of the .plt (and hence
2263 the start of the .got) for lazy linking. */
2264 elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
2265
2266 /* Allocate global sym .plt and .got entries, and space for global
2267 sym dynamic relocs. */
2268 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
2269
2270 /* The check_relocs and adjust_dynamic_symbol entry points have
2271 determined the sizes of the various dynamic sections. Allocate
2272 memory for them. */
2273 relocs = FALSE;
2274 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
2275 {
2276 if ((sec->flags & SEC_LINKER_CREATED) == 0)
2277 continue;
2278
2279 if (sec == htab->etab.splt)
2280 {
2281 if (htab->need_plt_stub)
2282 {
2283 /* Make space for the plt stub at the end of the .plt
2284 section. We want this stub right at the end, up
2285 against the .got section. */
2286 int gotalign = bfd_section_alignment (dynobj, htab->etab.sgot);
2287 int pltalign = bfd_section_alignment (dynobj, sec);
2288 bfd_size_type mask;
2289
2290 if (gotalign > pltalign)
2291 (void) bfd_set_section_alignment (dynobj, sec, gotalign);
2292 mask = ((bfd_size_type) 1 << gotalign) - 1;
2293 sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
2294 }
2295 }
2296 else if (sec == htab->etab.sgot
2297 || sec == htab->etab.sdynbss
2298 || sec == htab->etab.sdynrelro)
2299 ;
2300 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, sec), ".rela"))
2301 {
2302 if (sec->size != 0)
2303 {
2304 /* Remember whether there are any reloc sections other
2305 than .rela.plt. */
2306 if (sec != htab->etab.srelplt)
2307 relocs = TRUE;
2308
2309 /* We use the reloc_count field as a counter if we need
2310 to copy relocs into the output file. */
2311 sec->reloc_count = 0;
2312 }
2313 }
2314 else
2315 {
2316 /* It's not one of our sections, so don't allocate space. */
2317 continue;
2318 }
2319
2320 if (sec->size == 0)
2321 {
2322 /* If we don't need this section, strip it from the
2323 output file. This is mostly to handle .rela.bss and
2324 .rela.plt. We must create both sections in
2325 create_dynamic_sections, because they must be created
2326 before the linker maps input sections to output
2327 sections. The linker does that before
2328 adjust_dynamic_symbol is called, and it is that
2329 function which decides whether anything needs to go
2330 into these sections. */
2331 sec->flags |= SEC_EXCLUDE;
2332 continue;
2333 }
2334
2335 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2336 continue;
2337
2338 /* Allocate memory for the section contents. Zero it, because
2339 we may not fill in all the reloc sections. */
2340 sec->contents = bfd_zalloc (dynobj, sec->size);
2341 if (sec->contents == NULL)
2342 return FALSE;
2343 }
2344
2345 if (htab->etab.dynamic_sections_created)
2346 {
2347 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2348 actually has nothing to do with the PLT, it is how we
2349 communicate the LTP value of a load module to the dynamic
2350 linker. */
2351 #define add_dynamic_entry(TAG, VAL) \
2352 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2353
2354 if (!add_dynamic_entry (DT_PLTGOT, 0))
2355 return FALSE;
2356
2357 /* Add some entries to the .dynamic section. We fill in the
2358 values later, in elf32_hppa_finish_dynamic_sections, but we
2359 must add the entries now so that we get the correct size for
2360 the .dynamic section. The DT_DEBUG entry is filled in by the
2361 dynamic linker and used by the debugger. */
2362 if (bfd_link_executable (info))
2363 {
2364 if (!add_dynamic_entry (DT_DEBUG, 0))
2365 return FALSE;
2366 }
2367
2368 if (htab->etab.srelplt->size != 0)
2369 {
2370 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2371 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2372 || !add_dynamic_entry (DT_JMPREL, 0))
2373 return FALSE;
2374 }
2375
2376 if (relocs)
2377 {
2378 if (!add_dynamic_entry (DT_RELA, 0)
2379 || !add_dynamic_entry (DT_RELASZ, 0)
2380 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
2381 return FALSE;
2382
2383 /* If any dynamic relocs apply to a read-only section,
2384 then we need a DT_TEXTREL entry. */
2385 if ((info->flags & DF_TEXTREL) == 0)
2386 elf_link_hash_traverse (&htab->etab, maybe_set_textrel, info);
2387
2388 if ((info->flags & DF_TEXTREL) != 0)
2389 {
2390 if (!add_dynamic_entry (DT_TEXTREL, 0))
2391 return FALSE;
2392 }
2393 }
2394 }
2395 #undef add_dynamic_entry
2396
2397 return TRUE;
2398 }
2399
2400 /* External entry points for sizing and building linker stubs. */
2401
2402 /* Set up various things so that we can make a list of input sections
2403 for each output section included in the link. Returns -1 on error,
2404 0 when no stubs will be needed, and 1 on success. */
2405
2406 int
2407 elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
2408 {
2409 bfd *input_bfd;
2410 unsigned int bfd_count;
2411 unsigned int top_id, top_index;
2412 asection *section;
2413 asection **input_list, **list;
2414 bfd_size_type amt;
2415 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2416
2417 if (htab == NULL)
2418 return -1;
2419
2420 /* Count the number of input BFDs and find the top input section id. */
2421 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
2422 input_bfd != NULL;
2423 input_bfd = input_bfd->link.next)
2424 {
2425 bfd_count += 1;
2426 for (section = input_bfd->sections;
2427 section != NULL;
2428 section = section->next)
2429 {
2430 if (top_id < section->id)
2431 top_id = section->id;
2432 }
2433 }
2434 htab->bfd_count = bfd_count;
2435
2436 amt = sizeof (struct map_stub) * (top_id + 1);
2437 htab->stub_group = bfd_zmalloc (amt);
2438 if (htab->stub_group == NULL)
2439 return -1;
2440
2441 /* We can't use output_bfd->section_count here to find the top output
2442 section index as some sections may have been removed, and
2443 strip_excluded_output_sections doesn't renumber the indices. */
2444 for (section = output_bfd->sections, top_index = 0;
2445 section != NULL;
2446 section = section->next)
2447 {
2448 if (top_index < section->index)
2449 top_index = section->index;
2450 }
2451
2452 htab->top_index = top_index;
2453 amt = sizeof (asection *) * (top_index + 1);
2454 input_list = bfd_malloc (amt);
2455 htab->input_list = input_list;
2456 if (input_list == NULL)
2457 return -1;
2458
2459 /* For sections we aren't interested in, mark their entries with a
2460 value we can check later. */
2461 list = input_list + top_index;
2462 do
2463 *list = bfd_abs_section_ptr;
2464 while (list-- != input_list);
2465
2466 for (section = output_bfd->sections;
2467 section != NULL;
2468 section = section->next)
2469 {
2470 if ((section->flags & SEC_CODE) != 0)
2471 input_list[section->index] = NULL;
2472 }
2473
2474 return 1;
2475 }
2476
2477 /* The linker repeatedly calls this function for each input section,
2478 in the order that input sections are linked into output sections.
2479 Build lists of input sections to determine groupings between which
2480 we may insert linker stubs. */
2481
2482 void
2483 elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
2484 {
2485 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2486
2487 if (htab == NULL)
2488 return;
2489
2490 if (isec->output_section->index <= htab->top_index)
2491 {
2492 asection **list = htab->input_list + isec->output_section->index;
2493 if (*list != bfd_abs_section_ptr)
2494 {
2495 /* Steal the link_sec pointer for our list. */
2496 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
2497 /* This happens to make the list in reverse order,
2498 which is what we want. */
2499 PREV_SEC (isec) = *list;
2500 *list = isec;
2501 }
2502 }
2503 }
2504
2505 /* See whether we can group stub sections together. Grouping stub
2506 sections may result in fewer stubs. More importantly, we need to
2507 put all .init* and .fini* stubs at the beginning of the .init or
2508 .fini output sections respectively, because glibc splits the
2509 _init and _fini functions into multiple parts. Putting a stub in
2510 the middle of a function is not a good idea. */
2511
2512 static void
2513 group_sections (struct elf32_hppa_link_hash_table *htab,
2514 bfd_size_type stub_group_size,
2515 bfd_boolean stubs_always_before_branch)
2516 {
2517 asection **list = htab->input_list + htab->top_index;
2518 do
2519 {
2520 asection *tail = *list;
2521 if (tail == bfd_abs_section_ptr)
2522 continue;
2523 while (tail != NULL)
2524 {
2525 asection *curr;
2526 asection *prev;
2527 bfd_size_type total;
2528 bfd_boolean big_sec;
2529
2530 curr = tail;
2531 total = tail->size;
2532 big_sec = total >= stub_group_size;
2533
2534 while ((prev = PREV_SEC (curr)) != NULL
2535 && ((total += curr->output_offset - prev->output_offset)
2536 < stub_group_size))
2537 curr = prev;
2538
2539 /* OK, the size from the start of CURR to the end is less
2540 than 240000 bytes and thus can be handled by one stub
2541 section. (or the tail section is itself larger than
2542 240000 bytes, in which case we may be toast.)
2543 We should really be keeping track of the total size of
2544 stubs added here, as stubs contribute to the final output
2545 section size. That's a little tricky, and this way will
2546 only break if stubs added total more than 22144 bytes, or
2547 2768 long branch stubs. It seems unlikely for more than
2548 2768 different functions to be called, especially from
2549 code only 240000 bytes long. This limit used to be
2550 250000, but c++ code tends to generate lots of little
2551 functions, and sometimes violated the assumption. */
2552 do
2553 {
2554 prev = PREV_SEC (tail);
2555 /* Set up this stub group. */
2556 htab->stub_group[tail->id].link_sec = curr;
2557 }
2558 while (tail != curr && (tail = prev) != NULL);
2559
2560 /* But wait, there's more! Input sections up to 240000
2561 bytes before the stub section can be handled by it too.
2562 Don't do this if we have a really large section after the
2563 stubs, as adding more stubs increases the chance that
2564 branches may not reach into the stub section. */
2565 if (!stubs_always_before_branch && !big_sec)
2566 {
2567 total = 0;
2568 while (prev != NULL
2569 && ((total += tail->output_offset - prev->output_offset)
2570 < stub_group_size))
2571 {
2572 tail = prev;
2573 prev = PREV_SEC (tail);
2574 htab->stub_group[tail->id].link_sec = curr;
2575 }
2576 }
2577 tail = prev;
2578 }
2579 }
2580 while (list-- != htab->input_list);
2581 free (htab->input_list);
2582 #undef PREV_SEC
2583 }
2584
2585 /* Read in all local syms for all input bfds, and create hash entries
2586 for export stubs if we are building a multi-subspace shared lib.
2587 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2588
2589 static int
2590 get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
2591 {
2592 unsigned int bfd_indx;
2593 Elf_Internal_Sym *local_syms, **all_local_syms;
2594 int stub_changed = 0;
2595 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2596
2597 if (htab == NULL)
2598 return -1;
2599
2600 /* We want to read in symbol extension records only once. To do this
2601 we need to read in the local symbols in parallel and save them for
2602 later use; so hold pointers to the local symbols in an array. */
2603 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
2604 all_local_syms = bfd_zmalloc (amt);
2605 htab->all_local_syms = all_local_syms;
2606 if (all_local_syms == NULL)
2607 return -1;
2608
2609 /* Walk over all the input BFDs, swapping in local symbols.
2610 If we are creating a shared library, create hash entries for the
2611 export stubs. */
2612 for (bfd_indx = 0;
2613 input_bfd != NULL;
2614 input_bfd = input_bfd->link.next, bfd_indx++)
2615 {
2616 Elf_Internal_Shdr *symtab_hdr;
2617
2618 /* We'll need the symbol table in a second. */
2619 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2620 if (symtab_hdr->sh_info == 0)
2621 continue;
2622
2623 /* We need an array of the local symbols attached to the input bfd. */
2624 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
2625 if (local_syms == NULL)
2626 {
2627 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2628 symtab_hdr->sh_info, 0,
2629 NULL, NULL, NULL);
2630 /* Cache them for elf_link_input_bfd. */
2631 symtab_hdr->contents = (unsigned char *) local_syms;
2632 }
2633 if (local_syms == NULL)
2634 return -1;
2635
2636 all_local_syms[bfd_indx] = local_syms;
2637
2638 if (bfd_link_pic (info) && htab->multi_subspace)
2639 {
2640 struct elf_link_hash_entry **eh_syms;
2641 struct elf_link_hash_entry **eh_symend;
2642 unsigned int symcount;
2643
2644 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2645 - symtab_hdr->sh_info);
2646 eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2647 eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
2648
2649 /* Look through the global syms for functions; We need to
2650 build export stubs for all globally visible functions. */
2651 for (; eh_syms < eh_symend; eh_syms++)
2652 {
2653 struct elf32_hppa_link_hash_entry *hh;
2654
2655 hh = hppa_elf_hash_entry (*eh_syms);
2656
2657 while (hh->eh.root.type == bfd_link_hash_indirect
2658 || hh->eh.root.type == bfd_link_hash_warning)
2659 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2660
2661 /* At this point in the link, undefined syms have been
2662 resolved, so we need to check that the symbol was
2663 defined in this BFD. */
2664 if ((hh->eh.root.type == bfd_link_hash_defined
2665 || hh->eh.root.type == bfd_link_hash_defweak)
2666 && hh->eh.type == STT_FUNC
2667 && hh->eh.root.u.def.section->output_section != NULL
2668 && (hh->eh.root.u.def.section->output_section->owner
2669 == output_bfd)
2670 && hh->eh.root.u.def.section->owner == input_bfd
2671 && hh->eh.def_regular
2672 && !hh->eh.forced_local
2673 && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
2674 {
2675 asection *sec;
2676 const char *stub_name;
2677 struct elf32_hppa_stub_hash_entry *hsh;
2678
2679 sec = hh->eh.root.u.def.section;
2680 stub_name = hh_name (hh);
2681 hsh = hppa_stub_hash_lookup (&htab->bstab,
2682 stub_name,
2683 FALSE, FALSE);
2684 if (hsh == NULL)
2685 {
2686 hsh = hppa_add_stub (stub_name, sec, htab);
2687 if (!hsh)
2688 return -1;
2689
2690 hsh->target_value = hh->eh.root.u.def.value;
2691 hsh->target_section = hh->eh.root.u.def.section;
2692 hsh->stub_type = hppa_stub_export;
2693 hsh->hh = hh;
2694 stub_changed = 1;
2695 }
2696 else
2697 {
2698 /* xgettext:c-format */
2699 _bfd_error_handler (_("%B: duplicate export stub %s"),
2700 input_bfd, stub_name);
2701 }
2702 }
2703 }
2704 }
2705 }
2706
2707 return stub_changed;
2708 }
2709
2710 /* Determine and set the size of the stub section for a final link.
2711
2712 The basic idea here is to examine all the relocations looking for
2713 PC-relative calls to a target that is unreachable with a "bl"
2714 instruction. */
2715
2716 bfd_boolean
2717 elf32_hppa_size_stubs
2718 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2719 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2720 asection * (*add_stub_section) (const char *, asection *),
2721 void (*layout_sections_again) (void))
2722 {
2723 bfd_size_type stub_group_size;
2724 bfd_boolean stubs_always_before_branch;
2725 bfd_boolean stub_changed;
2726 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2727
2728 if (htab == NULL)
2729 return FALSE;
2730
2731 /* Stash our params away. */
2732 htab->stub_bfd = stub_bfd;
2733 htab->multi_subspace = multi_subspace;
2734 htab->add_stub_section = add_stub_section;
2735 htab->layout_sections_again = layout_sections_again;
2736 stubs_always_before_branch = group_size < 0;
2737 if (group_size < 0)
2738 stub_group_size = -group_size;
2739 else
2740 stub_group_size = group_size;
2741 if (stub_group_size == 1)
2742 {
2743 /* Default values. */
2744 if (stubs_always_before_branch)
2745 {
2746 stub_group_size = 7680000;
2747 if (htab->has_17bit_branch || htab->multi_subspace)
2748 stub_group_size = 240000;
2749 if (htab->has_12bit_branch)
2750 stub_group_size = 7500;
2751 }
2752 else
2753 {
2754 stub_group_size = 6971392;
2755 if (htab->has_17bit_branch || htab->multi_subspace)
2756 stub_group_size = 217856;
2757 if (htab->has_12bit_branch)
2758 stub_group_size = 6808;
2759 }
2760 }
2761
2762 group_sections (htab, stub_group_size, stubs_always_before_branch);
2763
2764 switch (get_local_syms (output_bfd, info->input_bfds, info))
2765 {
2766 default:
2767 if (htab->all_local_syms)
2768 goto error_ret_free_local;
2769 return FALSE;
2770
2771 case 0:
2772 stub_changed = FALSE;
2773 break;
2774
2775 case 1:
2776 stub_changed = TRUE;
2777 break;
2778 }
2779
2780 while (1)
2781 {
2782 bfd *input_bfd;
2783 unsigned int bfd_indx;
2784 asection *stub_sec;
2785
2786 for (input_bfd = info->input_bfds, bfd_indx = 0;
2787 input_bfd != NULL;
2788 input_bfd = input_bfd->link.next, bfd_indx++)
2789 {
2790 Elf_Internal_Shdr *symtab_hdr;
2791 asection *section;
2792 Elf_Internal_Sym *local_syms;
2793
2794 /* We'll need the symbol table in a second. */
2795 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2796 if (symtab_hdr->sh_info == 0)
2797 continue;
2798
2799 local_syms = htab->all_local_syms[bfd_indx];
2800
2801 /* Walk over each section attached to the input bfd. */
2802 for (section = input_bfd->sections;
2803 section != NULL;
2804 section = section->next)
2805 {
2806 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2807
2808 /* If there aren't any relocs, then there's nothing more
2809 to do. */
2810 if ((section->flags & SEC_RELOC) == 0
2811 || section->reloc_count == 0)
2812 continue;
2813
2814 /* If this section is a link-once section that will be
2815 discarded, then don't create any stubs. */
2816 if (section->output_section == NULL
2817 || section->output_section->owner != output_bfd)
2818 continue;
2819
2820 /* Get the relocs. */
2821 internal_relocs
2822 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
2823 info->keep_memory);
2824 if (internal_relocs == NULL)
2825 goto error_ret_free_local;
2826
2827 /* Now examine each relocation. */
2828 irela = internal_relocs;
2829 irelaend = irela + section->reloc_count;
2830 for (; irela < irelaend; irela++)
2831 {
2832 unsigned int r_type, r_indx;
2833 enum elf32_hppa_stub_type stub_type;
2834 struct elf32_hppa_stub_hash_entry *hsh;
2835 asection *sym_sec;
2836 bfd_vma sym_value;
2837 bfd_vma destination;
2838 struct elf32_hppa_link_hash_entry *hh;
2839 char *stub_name;
2840 const asection *id_sec;
2841
2842 r_type = ELF32_R_TYPE (irela->r_info);
2843 r_indx = ELF32_R_SYM (irela->r_info);
2844
2845 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2846 {
2847 bfd_set_error (bfd_error_bad_value);
2848 error_ret_free_internal:
2849 if (elf_section_data (section)->relocs == NULL)
2850 free (internal_relocs);
2851 goto error_ret_free_local;
2852 }
2853
2854 /* Only look for stubs on call instructions. */
2855 if (r_type != (unsigned int) R_PARISC_PCREL12F
2856 && r_type != (unsigned int) R_PARISC_PCREL17F
2857 && r_type != (unsigned int) R_PARISC_PCREL22F)
2858 continue;
2859
2860 /* Now determine the call target, its name, value,
2861 section. */
2862 sym_sec = NULL;
2863 sym_value = 0;
2864 destination = 0;
2865 hh = NULL;
2866 if (r_indx < symtab_hdr->sh_info)
2867 {
2868 /* It's a local symbol. */
2869 Elf_Internal_Sym *sym;
2870 Elf_Internal_Shdr *hdr;
2871 unsigned int shndx;
2872
2873 sym = local_syms + r_indx;
2874 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2875 sym_value = sym->st_value;
2876 shndx = sym->st_shndx;
2877 if (shndx < elf_numsections (input_bfd))
2878 {
2879 hdr = elf_elfsections (input_bfd)[shndx];
2880 sym_sec = hdr->bfd_section;
2881 destination = (sym_value + irela->r_addend
2882 + sym_sec->output_offset
2883 + sym_sec->output_section->vma);
2884 }
2885 }
2886 else
2887 {
2888 /* It's an external symbol. */
2889 int e_indx;
2890
2891 e_indx = r_indx - symtab_hdr->sh_info;
2892 hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
2893
2894 while (hh->eh.root.type == bfd_link_hash_indirect
2895 || hh->eh.root.type == bfd_link_hash_warning)
2896 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2897
2898 if (hh->eh.root.type == bfd_link_hash_defined
2899 || hh->eh.root.type == bfd_link_hash_defweak)
2900 {
2901 sym_sec = hh->eh.root.u.def.section;
2902 sym_value = hh->eh.root.u.def.value;
2903 if (sym_sec->output_section != NULL)
2904 destination = (sym_value + irela->r_addend
2905 + sym_sec->output_offset
2906 + sym_sec->output_section->vma);
2907 }
2908 else if (hh->eh.root.type == bfd_link_hash_undefweak)
2909 {
2910 if (! bfd_link_pic (info))
2911 continue;
2912 }
2913 else if (hh->eh.root.type == bfd_link_hash_undefined)
2914 {
2915 if (! (info->unresolved_syms_in_objects == RM_IGNORE
2916 && (ELF_ST_VISIBILITY (hh->eh.other)
2917 == STV_DEFAULT)
2918 && hh->eh.type != STT_PARISC_MILLI))
2919 continue;
2920 }
2921 else
2922 {
2923 bfd_set_error (bfd_error_bad_value);
2924 goto error_ret_free_internal;
2925 }
2926 }
2927
2928 /* Determine what (if any) linker stub is needed. */
2929 stub_type = hppa_type_of_stub (section, irela, hh,
2930 destination, info);
2931 if (stub_type == hppa_stub_none)
2932 continue;
2933
2934 /* Support for grouping stub sections. */
2935 id_sec = htab->stub_group[section->id].link_sec;
2936
2937 /* Get the name of this stub. */
2938 stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
2939 if (!stub_name)
2940 goto error_ret_free_internal;
2941
2942 hsh = hppa_stub_hash_lookup (&htab->bstab,
2943 stub_name,
2944 FALSE, FALSE);
2945 if (hsh != NULL)
2946 {
2947 /* The proper stub has already been created. */
2948 free (stub_name);
2949 continue;
2950 }
2951
2952 hsh = hppa_add_stub (stub_name, section, htab);
2953 if (hsh == NULL)
2954 {
2955 free (stub_name);
2956 goto error_ret_free_internal;
2957 }
2958
2959 hsh->target_value = sym_value;
2960 hsh->target_section = sym_sec;
2961 hsh->stub_type = stub_type;
2962 if (bfd_link_pic (info))
2963 {
2964 if (stub_type == hppa_stub_import)
2965 hsh->stub_type = hppa_stub_import_shared;
2966 else if (stub_type == hppa_stub_long_branch)
2967 hsh->stub_type = hppa_stub_long_branch_shared;
2968 }
2969 hsh->hh = hh;
2970 stub_changed = TRUE;
2971 }
2972
2973 /* We're done with the internal relocs, free them. */
2974 if (elf_section_data (section)->relocs == NULL)
2975 free (internal_relocs);
2976 }
2977 }
2978
2979 if (!stub_changed)
2980 break;
2981
2982 /* OK, we've added some stubs. Find out the new size of the
2983 stub sections. */
2984 for (stub_sec = htab->stub_bfd->sections;
2985 stub_sec != NULL;
2986 stub_sec = stub_sec->next)
2987 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
2988 stub_sec->size = 0;
2989
2990 bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
2991
2992 /* Ask the linker to do its stuff. */
2993 (*htab->layout_sections_again) ();
2994 stub_changed = FALSE;
2995 }
2996
2997 free (htab->all_local_syms);
2998 return TRUE;
2999
3000 error_ret_free_local:
3001 free (htab->all_local_syms);
3002 return FALSE;
3003 }
3004
3005 /* For a final link, this function is called after we have sized the
3006 stubs to provide a value for __gp. */
3007
3008 bfd_boolean
3009 elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
3010 {
3011 struct bfd_link_hash_entry *h;
3012 asection *sec = NULL;
3013 bfd_vma gp_val = 0;
3014
3015 h = bfd_link_hash_lookup (info->hash, "$global$", FALSE, FALSE, FALSE);
3016
3017 if (h != NULL
3018 && (h->type == bfd_link_hash_defined
3019 || h->type == bfd_link_hash_defweak))
3020 {
3021 gp_val = h->u.def.value;
3022 sec = h->u.def.section;
3023 }
3024 else
3025 {
3026 asection *splt = bfd_get_section_by_name (abfd, ".plt");
3027 asection *sgot = bfd_get_section_by_name (abfd, ".got");
3028
3029 /* Choose to point our LTP at, in this order, one of .plt, .got,
3030 or .data, if these sections exist. In the case of choosing
3031 .plt try to make the LTP ideal for addressing anywhere in the
3032 .plt or .got with a 14 bit signed offset. Typically, the end
3033 of the .plt is the start of the .got, so choose .plt + 0x2000
3034 if either the .plt or .got is larger than 0x2000. If both
3035 the .plt and .got are smaller than 0x2000, choose the end of
3036 the .plt section. */
3037 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
3038 ? NULL : splt;
3039 if (sec != NULL)
3040 {
3041 gp_val = sec->size;
3042 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
3043 {
3044 gp_val = 0x2000;
3045 }
3046 }
3047 else
3048 {
3049 sec = sgot;
3050 if (sec != NULL)
3051 {
3052 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
3053 {
3054 /* We know we don't have a .plt. If .got is large,
3055 offset our LTP. */
3056 if (sec->size > 0x2000)
3057 gp_val = 0x2000;
3058 }
3059 }
3060 else
3061 {
3062 /* No .plt or .got. Who cares what the LTP is? */
3063 sec = bfd_get_section_by_name (abfd, ".data");
3064 }
3065 }
3066
3067 if (h != NULL)
3068 {
3069 h->type = bfd_link_hash_defined;
3070 h->u.def.value = gp_val;
3071 if (sec != NULL)
3072 h->u.def.section = sec;
3073 else
3074 h->u.def.section = bfd_abs_section_ptr;
3075 }
3076 }
3077
3078 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
3079 {
3080 if (sec != NULL && sec->output_section != NULL)
3081 gp_val += sec->output_section->vma + sec->output_offset;
3082
3083 elf_gp (abfd) = gp_val;
3084 }
3085 return TRUE;
3086 }
3087
3088 /* Build all the stubs associated with the current output file. The
3089 stubs are kept in a hash table attached to the main linker hash
3090 table. We also set up the .plt entries for statically linked PIC
3091 functions here. This function is called via hppaelf_finish in the
3092 linker. */
3093
3094 bfd_boolean
3095 elf32_hppa_build_stubs (struct bfd_link_info *info)
3096 {
3097 asection *stub_sec;
3098 struct bfd_hash_table *table;
3099 struct elf32_hppa_link_hash_table *htab;
3100
3101 htab = hppa_link_hash_table (info);
3102 if (htab == NULL)
3103 return FALSE;
3104
3105 for (stub_sec = htab->stub_bfd->sections;
3106 stub_sec != NULL;
3107 stub_sec = stub_sec->next)
3108 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
3109 && stub_sec->size != 0)
3110 {
3111 /* Allocate memory to hold the linker stubs. */
3112 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
3113 if (stub_sec->contents == NULL)
3114 return FALSE;
3115 stub_sec->size = 0;
3116 }
3117
3118 /* Build the stubs as directed by the stub hash table. */
3119 table = &htab->bstab;
3120 bfd_hash_traverse (table, hppa_build_one_stub, info);
3121
3122 return TRUE;
3123 }
3124
3125 /* Return the base vma address which should be subtracted from the real
3126 address when resolving a dtpoff relocation.
3127 This is PT_TLS segment p_vaddr. */
3128
3129 static bfd_vma
3130 dtpoff_base (struct bfd_link_info *info)
3131 {
3132 /* If tls_sec is NULL, we should have signalled an error already. */
3133 if (elf_hash_table (info)->tls_sec == NULL)
3134 return 0;
3135 return elf_hash_table (info)->tls_sec->vma;
3136 }
3137
3138 /* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3139
3140 static bfd_vma
3141 tpoff (struct bfd_link_info *info, bfd_vma address)
3142 {
3143 struct elf_link_hash_table *htab = elf_hash_table (info);
3144
3145 /* If tls_sec is NULL, we should have signalled an error already. */
3146 if (htab->tls_sec == NULL)
3147 return 0;
3148 /* hppa TLS ABI is variant I and static TLS block start just after
3149 tcbhead structure which has 2 pointer fields. */
3150 return (address - htab->tls_sec->vma
3151 + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3152 }
3153
3154 /* Perform a final link. */
3155
3156 static bfd_boolean
3157 elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
3158 {
3159 struct stat buf;
3160
3161 /* Invoke the regular ELF linker to do all the work. */
3162 if (!bfd_elf_final_link (abfd, info))
3163 return FALSE;
3164
3165 /* If we're producing a final executable, sort the contents of the
3166 unwind section. */
3167 if (bfd_link_relocatable (info))
3168 return TRUE;
3169
3170 /* Do not attempt to sort non-regular files. This is here
3171 especially for configure scripts and kernel builds which run
3172 tests with "ld [...] -o /dev/null". */
3173 if (stat (abfd->filename, &buf) != 0
3174 || !S_ISREG(buf.st_mode))
3175 return TRUE;
3176
3177 return elf_hppa_sort_unwind (abfd);
3178 }
3179
3180 /* Record the lowest address for the data and text segments. */
3181
3182 static void
3183 hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
3184 {
3185 struct elf32_hppa_link_hash_table *htab;
3186
3187 htab = (struct elf32_hppa_link_hash_table*) data;
3188 if (htab == NULL)
3189 return;
3190
3191 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3192 {
3193 bfd_vma value;
3194 Elf_Internal_Phdr *p;
3195
3196 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3197 BFD_ASSERT (p != NULL);
3198 value = p->p_vaddr;
3199
3200 if ((section->flags & SEC_READONLY) != 0)
3201 {
3202 if (value < htab->text_segment_base)
3203 htab->text_segment_base = value;
3204 }
3205 else
3206 {
3207 if (value < htab->data_segment_base)
3208 htab->data_segment_base = value;
3209 }
3210 }
3211 }
3212
3213 /* Perform a relocation as part of a final link. */
3214
3215 static bfd_reloc_status_type
3216 final_link_relocate (asection *input_section,
3217 bfd_byte *contents,
3218 const Elf_Internal_Rela *rela,
3219 bfd_vma value,
3220 struct elf32_hppa_link_hash_table *htab,
3221 asection *sym_sec,
3222 struct elf32_hppa_link_hash_entry *hh,
3223 struct bfd_link_info *info)
3224 {
3225 int insn;
3226 unsigned int r_type = ELF32_R_TYPE (rela->r_info);
3227 unsigned int orig_r_type = r_type;
3228 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3229 int r_format = howto->bitsize;
3230 enum hppa_reloc_field_selector_type_alt r_field;
3231 bfd *input_bfd = input_section->owner;
3232 bfd_vma offset = rela->r_offset;
3233 bfd_vma max_branch_offset = 0;
3234 bfd_byte *hit_data = contents + offset;
3235 bfd_signed_vma addend = rela->r_addend;
3236 bfd_vma location;
3237 struct elf32_hppa_stub_hash_entry *hsh = NULL;
3238 int val;
3239
3240 if (r_type == R_PARISC_NONE)
3241 return bfd_reloc_ok;
3242
3243 insn = bfd_get_32 (input_bfd, hit_data);
3244
3245 /* Find out where we are and where we're going. */
3246 location = (offset +
3247 input_section->output_offset +
3248 input_section->output_section->vma);
3249
3250 /* If we are not building a shared library, convert DLTIND relocs to
3251 DPREL relocs. */
3252 if (!bfd_link_pic (info))
3253 {
3254 switch (r_type)
3255 {
3256 case R_PARISC_DLTIND21L:
3257 case R_PARISC_TLS_GD21L:
3258 case R_PARISC_TLS_LDM21L:
3259 case R_PARISC_TLS_IE21L:
3260 r_type = R_PARISC_DPREL21L;
3261 break;
3262
3263 case R_PARISC_DLTIND14R:
3264 case R_PARISC_TLS_GD14R:
3265 case R_PARISC_TLS_LDM14R:
3266 case R_PARISC_TLS_IE14R:
3267 r_type = R_PARISC_DPREL14R;
3268 break;
3269
3270 case R_PARISC_DLTIND14F:
3271 r_type = R_PARISC_DPREL14F;
3272 break;
3273 }
3274 }
3275
3276 switch (r_type)
3277 {
3278 case R_PARISC_PCREL12F:
3279 case R_PARISC_PCREL17F:
3280 case R_PARISC_PCREL22F:
3281 /* If this call should go via the plt, find the import stub in
3282 the stub hash. */
3283 if (sym_sec == NULL
3284 || sym_sec->output_section == NULL
3285 || (hh != NULL
3286 && hh->eh.plt.offset != (bfd_vma) -1
3287 && hh->eh.dynindx != -1
3288 && !hh->plabel
3289 && (bfd_link_pic (info)
3290 || !hh->eh.def_regular
3291 || hh->eh.root.type == bfd_link_hash_defweak)))
3292 {
3293 hsh = hppa_get_stub_entry (input_section, sym_sec,
3294 hh, rela, htab);
3295 if (hsh != NULL)
3296 {
3297 value = (hsh->stub_offset
3298 + hsh->stub_sec->output_offset
3299 + hsh->stub_sec->output_section->vma);
3300 addend = 0;
3301 }
3302 else if (sym_sec == NULL && hh != NULL
3303 && hh->eh.root.type == bfd_link_hash_undefweak)
3304 {
3305 /* It's OK if undefined weak. Calls to undefined weak
3306 symbols behave as if the "called" function
3307 immediately returns. We can thus call to a weak
3308 function without first checking whether the function
3309 is defined. */
3310 value = location;
3311 addend = 8;
3312 }
3313 else
3314 return bfd_reloc_undefined;
3315 }
3316 /* Fall thru. */
3317
3318 case R_PARISC_PCREL21L:
3319 case R_PARISC_PCREL17C:
3320 case R_PARISC_PCREL17R:
3321 case R_PARISC_PCREL14R:
3322 case R_PARISC_PCREL14F:
3323 case R_PARISC_PCREL32:
3324 /* Make it a pc relative offset. */
3325 value -= location;
3326 addend -= 8;
3327 break;
3328
3329 case R_PARISC_DPREL21L:
3330 case R_PARISC_DPREL14R:
3331 case R_PARISC_DPREL14F:
3332 /* Convert instructions that use the linkage table pointer (r19) to
3333 instructions that use the global data pointer (dp). This is the
3334 most efficient way of using PIC code in an incomplete executable,
3335 but the user must follow the standard runtime conventions for
3336 accessing data for this to work. */
3337 if (orig_r_type != r_type)
3338 {
3339 if (r_type == R_PARISC_DPREL21L)
3340 {
3341 /* GCC sometimes uses a register other than r19 for the
3342 operation, so we must convert any addil instruction
3343 that uses this relocation. */
3344 if ((insn & 0xfc000000) == ((int) OP_ADDIL << 26))
3345 insn = ADDIL_DP;
3346 else
3347 /* We must have a ldil instruction. It's too hard to find
3348 and convert the associated add instruction, so issue an
3349 error. */
3350 _bfd_error_handler
3351 /* xgettext:c-format */
3352 (_("%B(%A+%#Lx): %s fixup for insn %#x is not supported in a non-shared link"),
3353 input_bfd,
3354 input_section,
3355 offset,
3356 howto->name,
3357 insn);
3358 }
3359 else if (r_type == R_PARISC_DPREL14F)
3360 {
3361 /* This must be a format 1 load/store. Change the base
3362 register to dp. */
3363 insn = (insn & 0xfc1ffff) | (27 << 21);
3364 }
3365 }
3366
3367 /* For all the DP relative relocations, we need to examine the symbol's
3368 section. If it has no section or if it's a code section, then
3369 "data pointer relative" makes no sense. In that case we don't
3370 adjust the "value", and for 21 bit addil instructions, we change the
3371 source addend register from %dp to %r0. This situation commonly
3372 arises for undefined weak symbols and when a variable's "constness"
3373 is declared differently from the way the variable is defined. For
3374 instance: "extern int foo" with foo defined as "const int foo". */
3375 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
3376 {
3377 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3378 == (((int) OP_ADDIL << 26) | (27 << 21)))
3379 {
3380 insn &= ~ (0x1f << 21);
3381 }
3382 /* Now try to make things easy for the dynamic linker. */
3383
3384 break;
3385 }
3386 /* Fall thru. */
3387
3388 case R_PARISC_DLTIND21L:
3389 case R_PARISC_DLTIND14R:
3390 case R_PARISC_DLTIND14F:
3391 case R_PARISC_TLS_GD21L:
3392 case R_PARISC_TLS_LDM21L:
3393 case R_PARISC_TLS_IE21L:
3394 case R_PARISC_TLS_GD14R:
3395 case R_PARISC_TLS_LDM14R:
3396 case R_PARISC_TLS_IE14R:
3397 value -= elf_gp (input_section->output_section->owner);
3398 break;
3399
3400 case R_PARISC_SEGREL32:
3401 if ((sym_sec->flags & SEC_CODE) != 0)
3402 value -= htab->text_segment_base;
3403 else
3404 value -= htab->data_segment_base;
3405 break;
3406
3407 default:
3408 break;
3409 }
3410
3411 switch (r_type)
3412 {
3413 case R_PARISC_DIR32:
3414 case R_PARISC_DIR14F:
3415 case R_PARISC_DIR17F:
3416 case R_PARISC_PCREL17C:
3417 case R_PARISC_PCREL14F:
3418 case R_PARISC_PCREL32:
3419 case R_PARISC_DPREL14F:
3420 case R_PARISC_PLABEL32:
3421 case R_PARISC_DLTIND14F:
3422 case R_PARISC_SEGBASE:
3423 case R_PARISC_SEGREL32:
3424 case R_PARISC_TLS_DTPMOD32:
3425 case R_PARISC_TLS_DTPOFF32:
3426 case R_PARISC_TLS_TPREL32:
3427 r_field = e_fsel;
3428 break;
3429
3430 case R_PARISC_DLTIND21L:
3431 case R_PARISC_PCREL21L:
3432 case R_PARISC_PLABEL21L:
3433 r_field = e_lsel;
3434 break;
3435
3436 case R_PARISC_DIR21L:
3437 case R_PARISC_DPREL21L:
3438 case R_PARISC_TLS_GD21L:
3439 case R_PARISC_TLS_LDM21L:
3440 case R_PARISC_TLS_LDO21L:
3441 case R_PARISC_TLS_IE21L:
3442 case R_PARISC_TLS_LE21L:
3443 r_field = e_lrsel;
3444 break;
3445
3446 case R_PARISC_PCREL17R:
3447 case R_PARISC_PCREL14R:
3448 case R_PARISC_PLABEL14R:
3449 case R_PARISC_DLTIND14R:
3450 r_field = e_rsel;
3451 break;
3452
3453 case R_PARISC_DIR17R:
3454 case R_PARISC_DIR14R:
3455 case R_PARISC_DPREL14R:
3456 case R_PARISC_TLS_GD14R:
3457 case R_PARISC_TLS_LDM14R:
3458 case R_PARISC_TLS_LDO14R:
3459 case R_PARISC_TLS_IE14R:
3460 case R_PARISC_TLS_LE14R:
3461 r_field = e_rrsel;
3462 break;
3463
3464 case R_PARISC_PCREL12F:
3465 case R_PARISC_PCREL17F:
3466 case R_PARISC_PCREL22F:
3467 r_field = e_fsel;
3468
3469 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3470 {
3471 max_branch_offset = (1 << (17-1)) << 2;
3472 }
3473 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3474 {
3475 max_branch_offset = (1 << (12-1)) << 2;
3476 }
3477 else
3478 {
3479 max_branch_offset = (1 << (22-1)) << 2;
3480 }
3481
3482 /* sym_sec is NULL on undefined weak syms or when shared on
3483 undefined syms. We've already checked for a stub for the
3484 shared undefined case. */
3485 if (sym_sec == NULL)
3486 break;
3487
3488 /* If the branch is out of reach, then redirect the
3489 call to the local stub for this function. */
3490 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3491 {
3492 hsh = hppa_get_stub_entry (input_section, sym_sec,
3493 hh, rela, htab);
3494 if (hsh == NULL)
3495 return bfd_reloc_undefined;
3496
3497 /* Munge up the value and addend so that we call the stub
3498 rather than the procedure directly. */
3499 value = (hsh->stub_offset
3500 + hsh->stub_sec->output_offset
3501 + hsh->stub_sec->output_section->vma
3502 - location);
3503 addend = -8;
3504 }
3505 break;
3506
3507 /* Something we don't know how to handle. */
3508 default:
3509 return bfd_reloc_notsupported;
3510 }
3511
3512 /* Make sure we can reach the stub. */
3513 if (max_branch_offset != 0
3514 && value + addend + max_branch_offset >= 2*max_branch_offset)
3515 {
3516 _bfd_error_handler
3517 /* xgettext:c-format */
3518 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
3519 input_bfd,
3520 input_section,
3521 offset,
3522 hsh->bh_root.string);
3523 bfd_set_error (bfd_error_bad_value);
3524 return bfd_reloc_notsupported;
3525 }
3526
3527 val = hppa_field_adjust (value, addend, r_field);
3528
3529 switch (r_type)
3530 {
3531 case R_PARISC_PCREL12F:
3532 case R_PARISC_PCREL17C:
3533 case R_PARISC_PCREL17F:
3534 case R_PARISC_PCREL17R:
3535 case R_PARISC_PCREL22F:
3536 case R_PARISC_DIR17F:
3537 case R_PARISC_DIR17R:
3538 /* This is a branch. Divide the offset by four.
3539 Note that we need to decide whether it's a branch or
3540 otherwise by inspecting the reloc. Inspecting insn won't
3541 work as insn might be from a .word directive. */
3542 val >>= 2;
3543 break;
3544
3545 default:
3546 break;
3547 }
3548
3549 insn = hppa_rebuild_insn (insn, val, r_format);
3550
3551 /* Update the instruction word. */
3552 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
3553 return bfd_reloc_ok;
3554 }
3555
3556 /* Relocate an HPPA ELF section. */
3557
3558 static bfd_boolean
3559 elf32_hppa_relocate_section (bfd *output_bfd,
3560 struct bfd_link_info *info,
3561 bfd *input_bfd,
3562 asection *input_section,
3563 bfd_byte *contents,
3564 Elf_Internal_Rela *relocs,
3565 Elf_Internal_Sym *local_syms,
3566 asection **local_sections)
3567 {
3568 bfd_vma *local_got_offsets;
3569 struct elf32_hppa_link_hash_table *htab;
3570 Elf_Internal_Shdr *symtab_hdr;
3571 Elf_Internal_Rela *rela;
3572 Elf_Internal_Rela *relend;
3573
3574 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3575
3576 htab = hppa_link_hash_table (info);
3577 if (htab == NULL)
3578 return FALSE;
3579
3580 local_got_offsets = elf_local_got_offsets (input_bfd);
3581
3582 rela = relocs;
3583 relend = relocs + input_section->reloc_count;
3584 for (; rela < relend; rela++)
3585 {
3586 unsigned int r_type;
3587 reloc_howto_type *howto;
3588 unsigned int r_symndx;
3589 struct elf32_hppa_link_hash_entry *hh;
3590 Elf_Internal_Sym *sym;
3591 asection *sym_sec;
3592 bfd_vma relocation;
3593 bfd_reloc_status_type rstatus;
3594 const char *sym_name;
3595 bfd_boolean plabel;
3596 bfd_boolean warned_undef;
3597
3598 r_type = ELF32_R_TYPE (rela->r_info);
3599 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3600 {
3601 bfd_set_error (bfd_error_bad_value);
3602 return FALSE;
3603 }
3604 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3605 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3606 continue;
3607
3608 r_symndx = ELF32_R_SYM (rela->r_info);
3609 hh = NULL;
3610 sym = NULL;
3611 sym_sec = NULL;
3612 warned_undef = FALSE;
3613 if (r_symndx < symtab_hdr->sh_info)
3614 {
3615 /* This is a local symbol, h defaults to NULL. */
3616 sym = local_syms + r_symndx;
3617 sym_sec = local_sections[r_symndx];
3618 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
3619 }
3620 else
3621 {
3622 struct elf_link_hash_entry *eh;
3623 bfd_boolean unresolved_reloc, ignored;
3624 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
3625
3626 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
3627 r_symndx, symtab_hdr, sym_hashes,
3628 eh, sym_sec, relocation,
3629 unresolved_reloc, warned_undef,
3630 ignored);
3631
3632 if (!bfd_link_relocatable (info)
3633 && relocation == 0
3634 && eh->root.type != bfd_link_hash_defined
3635 && eh->root.type != bfd_link_hash_defweak
3636 && eh->root.type != bfd_link_hash_undefweak)
3637 {
3638 if (info->unresolved_syms_in_objects == RM_IGNORE
3639 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3640 && eh->type == STT_PARISC_MILLI)
3641 {
3642 (*info->callbacks->undefined_symbol)
3643 (info, eh_name (eh), input_bfd,
3644 input_section, rela->r_offset, FALSE);
3645 warned_undef = TRUE;
3646 }
3647 }
3648 hh = hppa_elf_hash_entry (eh);
3649 }
3650
3651 if (sym_sec != NULL && discarded_section (sym_sec))
3652 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
3653 rela, 1, relend,
3654 elf_hppa_howto_table + r_type, 0,
3655 contents);
3656
3657 if (bfd_link_relocatable (info))
3658 continue;
3659
3660 /* Do any required modifications to the relocation value, and
3661 determine what types of dynamic info we need to output, if
3662 any. */
3663 plabel = 0;
3664 switch (r_type)
3665 {
3666 case R_PARISC_DLTIND14F:
3667 case R_PARISC_DLTIND14R:
3668 case R_PARISC_DLTIND21L:
3669 {
3670 bfd_vma off;
3671 bfd_boolean do_got = FALSE;
3672 bfd_boolean reloc = bfd_link_pic (info);
3673
3674 /* Relocation is to the entry for this symbol in the
3675 global offset table. */
3676 if (hh != NULL)
3677 {
3678 bfd_boolean dyn;
3679
3680 off = hh->eh.got.offset;
3681 dyn = htab->etab.dynamic_sections_created;
3682 reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3683 && (reloc
3684 || (hh->eh.dynindx != -1
3685 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3686 if (!reloc
3687 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3688 bfd_link_pic (info),
3689 &hh->eh))
3690 {
3691 /* If we aren't going to call finish_dynamic_symbol,
3692 then we need to handle initialisation of the .got
3693 entry and create needed relocs here. Since the
3694 offset must always be a multiple of 4, we use the
3695 least significant bit to record whether we have
3696 initialised it already. */
3697 if ((off & 1) != 0)
3698 off &= ~1;
3699 else
3700 {
3701 hh->eh.got.offset |= 1;
3702 do_got = TRUE;
3703 }
3704 }
3705 }
3706 else
3707 {
3708 /* Local symbol case. */
3709 if (local_got_offsets == NULL)
3710 abort ();
3711
3712 off = local_got_offsets[r_symndx];
3713
3714 /* The offset must always be a multiple of 4. We use
3715 the least significant bit to record whether we have
3716 already generated the necessary reloc. */
3717 if ((off & 1) != 0)
3718 off &= ~1;
3719 else
3720 {
3721 local_got_offsets[r_symndx] |= 1;
3722 do_got = TRUE;
3723 }
3724 }
3725
3726 if (do_got)
3727 {
3728 if (reloc)
3729 {
3730 /* Output a dynamic relocation for this GOT entry.
3731 In this case it is relative to the base of the
3732 object because the symbol index is zero. */
3733 Elf_Internal_Rela outrel;
3734 bfd_byte *loc;
3735 asection *sec = htab->etab.srelgot;
3736
3737 outrel.r_offset = (off
3738 + htab->etab.sgot->output_offset
3739 + htab->etab.sgot->output_section->vma);
3740 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3741 outrel.r_addend = relocation;
3742 loc = sec->contents;
3743 loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
3744 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3745 }
3746 else
3747 bfd_put_32 (output_bfd, relocation,
3748 htab->etab.sgot->contents + off);
3749 }
3750
3751 if (off >= (bfd_vma) -2)
3752 abort ();
3753
3754 /* Add the base of the GOT to the relocation value. */
3755 relocation = (off
3756 + htab->etab.sgot->output_offset
3757 + htab->etab.sgot->output_section->vma);
3758 }
3759 break;
3760
3761 case R_PARISC_SEGREL32:
3762 /* If this is the first SEGREL relocation, then initialize
3763 the segment base values. */
3764 if (htab->text_segment_base == (bfd_vma) -1)
3765 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
3766 break;
3767
3768 case R_PARISC_PLABEL14R:
3769 case R_PARISC_PLABEL21L:
3770 case R_PARISC_PLABEL32:
3771 if (htab->etab.dynamic_sections_created)
3772 {
3773 bfd_vma off;
3774 bfd_boolean do_plt = 0;
3775 /* If we have a global symbol with a PLT slot, then
3776 redirect this relocation to it. */
3777 if (hh != NULL)
3778 {
3779 off = hh->eh.plt.offset;
3780 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3781 bfd_link_pic (info),
3782 &hh->eh))
3783 {
3784 /* In a non-shared link, adjust_dynamic_symbol
3785 isn't called for symbols forced local. We
3786 need to write out the plt entry here. */
3787 if ((off & 1) != 0)
3788 off &= ~1;
3789 else
3790 {
3791 hh->eh.plt.offset |= 1;
3792 do_plt = 1;
3793 }
3794 }
3795 }
3796 else
3797 {
3798 bfd_vma *local_plt_offsets;
3799
3800 if (local_got_offsets == NULL)
3801 abort ();
3802
3803 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3804 off = local_plt_offsets[r_symndx];
3805
3806 /* As for the local .got entry case, we use the last
3807 bit to record whether we've already initialised
3808 this local .plt entry. */
3809 if ((off & 1) != 0)
3810 off &= ~1;
3811 else
3812 {
3813 local_plt_offsets[r_symndx] |= 1;
3814 do_plt = 1;
3815 }
3816 }
3817
3818 if (do_plt)
3819 {
3820 if (bfd_link_pic (info))
3821 {
3822 /* Output a dynamic IPLT relocation for this
3823 PLT entry. */
3824 Elf_Internal_Rela outrel;
3825 bfd_byte *loc;
3826 asection *s = htab->etab.srelplt;
3827
3828 outrel.r_offset = (off
3829 + htab->etab.splt->output_offset
3830 + htab->etab.splt->output_section->vma);
3831 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3832 outrel.r_addend = relocation;
3833 loc = s->contents;
3834 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
3835 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3836 }
3837 else
3838 {
3839 bfd_put_32 (output_bfd,
3840 relocation,
3841 htab->etab.splt->contents + off);
3842 bfd_put_32 (output_bfd,
3843 elf_gp (htab->etab.splt->output_section->owner),
3844 htab->etab.splt->contents + off + 4);
3845 }
3846 }
3847
3848 if (off >= (bfd_vma) -2)
3849 abort ();
3850
3851 /* PLABELs contain function pointers. Relocation is to
3852 the entry for the function in the .plt. The magic +2
3853 offset signals to $$dyncall that the function pointer
3854 is in the .plt and thus has a gp pointer too.
3855 Exception: Undefined PLABELs should have a value of
3856 zero. */
3857 if (hh == NULL
3858 || (hh->eh.root.type != bfd_link_hash_undefweak
3859 && hh->eh.root.type != bfd_link_hash_undefined))
3860 {
3861 relocation = (off
3862 + htab->etab.splt->output_offset
3863 + htab->etab.splt->output_section->vma
3864 + 2);
3865 }
3866 plabel = 1;
3867 }
3868 /* Fall through. */
3869
3870 case R_PARISC_DIR17F:
3871 case R_PARISC_DIR17R:
3872 case R_PARISC_DIR14F:
3873 case R_PARISC_DIR14R:
3874 case R_PARISC_DIR21L:
3875 case R_PARISC_DPREL14F:
3876 case R_PARISC_DPREL14R:
3877 case R_PARISC_DPREL21L:
3878 case R_PARISC_DIR32:
3879 if ((input_section->flags & SEC_ALLOC) == 0)
3880 break;
3881
3882 if (bfd_link_pic (info)
3883 ? ((hh == NULL
3884 || hh->dyn_relocs != NULL)
3885 && ((hh != NULL && pc_dynrelocs (hh))
3886 || IS_ABSOLUTE_RELOC (r_type)))
3887 : (hh != NULL
3888 && hh->dyn_relocs != NULL))
3889 {
3890 Elf_Internal_Rela outrel;
3891 bfd_boolean skip;
3892 asection *sreloc;
3893 bfd_byte *loc;
3894
3895 /* When generating a shared object, these relocations
3896 are copied into the output file to be resolved at run
3897 time. */
3898
3899 outrel.r_addend = rela->r_addend;
3900 outrel.r_offset =
3901 _bfd_elf_section_offset (output_bfd, info, input_section,
3902 rela->r_offset);
3903 skip = (outrel.r_offset == (bfd_vma) -1
3904 || outrel.r_offset == (bfd_vma) -2);
3905 outrel.r_offset += (input_section->output_offset
3906 + input_section->output_section->vma);
3907
3908 if (skip)
3909 {
3910 memset (&outrel, 0, sizeof (outrel));
3911 }
3912 else if (hh != NULL
3913 && hh->eh.dynindx != -1
3914 && (plabel
3915 || !IS_ABSOLUTE_RELOC (r_type)
3916 || !bfd_link_pic (info)
3917 || !SYMBOLIC_BIND (info, &hh->eh)
3918 || !hh->eh.def_regular))
3919 {
3920 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
3921 }
3922 else /* It's a local symbol, or one marked to become local. */
3923 {
3924 int indx = 0;
3925
3926 /* Add the absolute offset of the symbol. */
3927 outrel.r_addend += relocation;
3928
3929 /* Global plabels need to be processed by the
3930 dynamic linker so that functions have at most one
3931 fptr. For this reason, we need to differentiate
3932 between global and local plabels, which we do by
3933 providing the function symbol for a global plabel
3934 reloc, and no symbol for local plabels. */
3935 if (! plabel
3936 && sym_sec != NULL
3937 && sym_sec->output_section != NULL
3938 && ! bfd_is_abs_section (sym_sec))
3939 {
3940 asection *osec;
3941
3942 osec = sym_sec->output_section;
3943 indx = elf_section_data (osec)->dynindx;
3944 if (indx == 0)
3945 {
3946 osec = htab->etab.text_index_section;
3947 indx = elf_section_data (osec)->dynindx;
3948 }
3949 BFD_ASSERT (indx != 0);
3950
3951 /* We are turning this relocation into one
3952 against a section symbol, so subtract out the
3953 output section's address but not the offset
3954 of the input section in the output section. */
3955 outrel.r_addend -= osec->vma;
3956 }
3957
3958 outrel.r_info = ELF32_R_INFO (indx, r_type);
3959 }
3960 sreloc = elf_section_data (input_section)->sreloc;
3961 if (sreloc == NULL)
3962 abort ();
3963
3964 loc = sreloc->contents;
3965 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3966 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3967 }
3968 break;
3969
3970 case R_PARISC_TLS_LDM21L:
3971 case R_PARISC_TLS_LDM14R:
3972 {
3973 bfd_vma off;
3974
3975 off = htab->tls_ldm_got.offset;
3976 if (off & 1)
3977 off &= ~1;
3978 else
3979 {
3980 Elf_Internal_Rela outrel;
3981 bfd_byte *loc;
3982
3983 outrel.r_offset = (off
3984 + htab->etab.sgot->output_section->vma
3985 + htab->etab.sgot->output_offset);
3986 outrel.r_addend = 0;
3987 outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
3988 loc = htab->etab.srelgot->contents;
3989 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3990
3991 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3992 htab->tls_ldm_got.offset |= 1;
3993 }
3994
3995 /* Add the base of the GOT to the relocation value. */
3996 relocation = (off
3997 + htab->etab.sgot->output_offset
3998 + htab->etab.sgot->output_section->vma);
3999
4000 break;
4001 }
4002
4003 case R_PARISC_TLS_LDO21L:
4004 case R_PARISC_TLS_LDO14R:
4005 relocation -= dtpoff_base (info);
4006 break;
4007
4008 case R_PARISC_TLS_GD21L:
4009 case R_PARISC_TLS_GD14R:
4010 case R_PARISC_TLS_IE21L:
4011 case R_PARISC_TLS_IE14R:
4012 {
4013 bfd_vma off;
4014 int indx;
4015 char tls_type;
4016
4017 indx = 0;
4018 if (hh != NULL)
4019 {
4020 if (!htab->etab.dynamic_sections_created
4021 || hh->eh.dynindx == -1
4022 || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
4023 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
4024 /* This is actually a static link, or it is a
4025 -Bsymbolic link and the symbol is defined
4026 locally, or the symbol was forced to be local
4027 because of a version file. */
4028 ;
4029 else
4030 indx = hh->eh.dynindx;
4031 off = hh->eh.got.offset;
4032 tls_type = hh->tls_type;
4033 }
4034 else
4035 {
4036 off = local_got_offsets[r_symndx];
4037 tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
4038 }
4039
4040 if (tls_type == GOT_UNKNOWN)
4041 abort ();
4042
4043 if ((off & 1) != 0)
4044 off &= ~1;
4045 else
4046 {
4047 bfd_boolean need_relocs = FALSE;
4048 Elf_Internal_Rela outrel;
4049 bfd_byte *loc = NULL;
4050 int cur_off = off;
4051
4052 /* The GOT entries have not been initialized yet. Do it
4053 now, and emit any relocations. If both an IE GOT and a
4054 GD GOT are necessary, we emit the GD first. */
4055
4056 if (indx != 0
4057 || (bfd_link_pic (info)
4058 && (hh == NULL
4059 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
4060 {
4061 need_relocs = TRUE;
4062 loc = htab->etab.srelgot->contents;
4063 loc += (htab->etab.srelgot->reloc_count
4064 * sizeof (Elf32_External_Rela));
4065 }
4066
4067 if (tls_type & GOT_TLS_GD)
4068 {
4069 if (need_relocs)
4070 {
4071 outrel.r_offset
4072 = (cur_off
4073 + htab->etab.sgot->output_section->vma
4074 + htab->etab.sgot->output_offset);
4075 outrel.r_info
4076 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
4077 outrel.r_addend = 0;
4078 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4079 htab->etab.srelgot->reloc_count++;
4080 loc += sizeof (Elf32_External_Rela);
4081 outrel.r_info
4082 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
4083 outrel.r_offset += 4;
4084 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4085 htab->etab.srelgot->reloc_count++;
4086 loc += sizeof (Elf32_External_Rela);
4087 bfd_put_32 (output_bfd, 0,
4088 htab->etab.sgot->contents + cur_off);
4089 bfd_put_32 (output_bfd, 0,
4090 htab->etab.sgot->contents + cur_off + 4);
4091 }
4092 else
4093 {
4094 /* If we are not emitting relocations for a
4095 general dynamic reference, then we must be in a
4096 static link or an executable link with the
4097 symbol binding locally. Mark it as belonging
4098 to module 1, the executable. */
4099 bfd_put_32 (output_bfd, 1,
4100 htab->etab.sgot->contents + cur_off);
4101 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
4102 htab->etab.sgot->contents + cur_off + 4);
4103 }
4104 cur_off += 8;
4105 }
4106
4107 if (tls_type & GOT_TLS_IE)
4108 {
4109 if (need_relocs
4110 && !(bfd_link_executable (info)
4111 && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
4112 {
4113 outrel.r_offset
4114 = (cur_off
4115 + htab->etab.sgot->output_section->vma
4116 + htab->etab.sgot->output_offset);
4117 outrel.r_info = ELF32_R_INFO (indx,
4118 R_PARISC_TLS_TPREL32);
4119 if (indx == 0)
4120 outrel.r_addend = relocation - dtpoff_base (info);
4121 else
4122 outrel.r_addend = 0;
4123 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4124 htab->etab.srelgot->reloc_count++;
4125 loc += sizeof (Elf32_External_Rela);
4126 }
4127 else
4128 bfd_put_32 (output_bfd, tpoff (info, relocation),
4129 htab->etab.sgot->contents + cur_off);
4130 cur_off += 4;
4131 }
4132
4133 if (hh != NULL)
4134 hh->eh.got.offset |= 1;
4135 else
4136 local_got_offsets[r_symndx] |= 1;
4137 }
4138
4139 if ((tls_type & GOT_NORMAL) != 0
4140 && (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4141 {
4142 if (hh != NULL)
4143 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4144 hh_name (hh));
4145 else
4146 {
4147 Elf_Internal_Sym *isym
4148 = bfd_sym_from_r_symndx (&htab->sym_cache,
4149 input_bfd, r_symndx);
4150 if (isym == NULL)
4151 return FALSE;
4152 sym_name
4153 = bfd_elf_string_from_elf_section (input_bfd,
4154 symtab_hdr->sh_link,
4155 isym->st_name);
4156 if (sym_name == NULL)
4157 return FALSE;
4158 if (*sym_name == '\0')
4159 sym_name = bfd_section_name (input_bfd, sym_sec);
4160 _bfd_error_handler
4161 (_("%B:%s has both normal and TLS relocs"),
4162 input_bfd, sym_name);
4163 }
4164 bfd_set_error (bfd_error_bad_value);
4165 return FALSE;
4166 }
4167
4168 if ((tls_type & GOT_TLS_GD)
4169 && r_type != R_PARISC_TLS_GD21L
4170 && r_type != R_PARISC_TLS_GD14R)
4171 off += 2 * GOT_ENTRY_SIZE;
4172
4173 /* Add the base of the GOT to the relocation value. */
4174 relocation = (off
4175 + htab->etab.sgot->output_offset
4176 + htab->etab.sgot->output_section->vma);
4177
4178 break;
4179 }
4180
4181 case R_PARISC_TLS_LE21L:
4182 case R_PARISC_TLS_LE14R:
4183 {
4184 relocation = tpoff (info, relocation);
4185 break;
4186 }
4187 break;
4188
4189 default:
4190 break;
4191 }
4192
4193 rstatus = final_link_relocate (input_section, contents, rela, relocation,
4194 htab, sym_sec, hh, info);
4195
4196 if (rstatus == bfd_reloc_ok)
4197 continue;
4198
4199 if (hh != NULL)
4200 sym_name = hh_name (hh);
4201 else
4202 {
4203 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4204 symtab_hdr->sh_link,
4205 sym->st_name);
4206 if (sym_name == NULL)
4207 return FALSE;
4208 if (*sym_name == '\0')
4209 sym_name = bfd_section_name (input_bfd, sym_sec);
4210 }
4211
4212 howto = elf_hppa_howto_table + r_type;
4213
4214 if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
4215 {
4216 if (rstatus == bfd_reloc_notsupported || !warned_undef)
4217 {
4218 _bfd_error_handler
4219 /* xgettext:c-format */
4220 (_("%B(%A+%#Lx): cannot handle %s for %s"),
4221 input_bfd,
4222 input_section,
4223 rela->r_offset,
4224 howto->name,
4225 sym_name);
4226 bfd_set_error (bfd_error_bad_value);
4227 return FALSE;
4228 }
4229 }
4230 else
4231 (*info->callbacks->reloc_overflow)
4232 (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4233 (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
4234 }
4235
4236 return TRUE;
4237 }
4238
4239 /* Finish up dynamic symbol handling. We set the contents of various
4240 dynamic sections here. */
4241
4242 static bfd_boolean
4243 elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4244 struct bfd_link_info *info,
4245 struct elf_link_hash_entry *eh,
4246 Elf_Internal_Sym *sym)
4247 {
4248 struct elf32_hppa_link_hash_table *htab;
4249 Elf_Internal_Rela rela;
4250 bfd_byte *loc;
4251
4252 htab = hppa_link_hash_table (info);
4253 if (htab == NULL)
4254 return FALSE;
4255
4256 if (eh->plt.offset != (bfd_vma) -1)
4257 {
4258 bfd_vma value;
4259
4260 if (eh->plt.offset & 1)
4261 abort ();
4262
4263 /* This symbol has an entry in the procedure linkage table. Set
4264 it up.
4265
4266 The format of a plt entry is
4267 <funcaddr>
4268 <__gp>
4269 */
4270 value = 0;
4271 if (eh->root.type == bfd_link_hash_defined
4272 || eh->root.type == bfd_link_hash_defweak)
4273 {
4274 value = eh->root.u.def.value;
4275 if (eh->root.u.def.section->output_section != NULL)
4276 value += (eh->root.u.def.section->output_offset
4277 + eh->root.u.def.section->output_section->vma);
4278 }
4279
4280 /* Create a dynamic IPLT relocation for this entry. */
4281 rela.r_offset = (eh->plt.offset
4282 + htab->etab.splt->output_offset
4283 + htab->etab.splt->output_section->vma);
4284 if (eh->dynindx != -1)
4285 {
4286 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4287 rela.r_addend = 0;
4288 }
4289 else
4290 {
4291 /* This symbol has been marked to become local, and is
4292 used by a plabel so must be kept in the .plt. */
4293 rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4294 rela.r_addend = value;
4295 }
4296
4297 loc = htab->etab.srelplt->contents;
4298 loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4299 bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
4300
4301 if (!eh->def_regular)
4302 {
4303 /* Mark the symbol as undefined, rather than as defined in
4304 the .plt section. Leave the value alone. */
4305 sym->st_shndx = SHN_UNDEF;
4306 }
4307 }
4308
4309 if (eh->got.offset != (bfd_vma) -1
4310 && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
4311 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
4312 {
4313 bfd_boolean is_dyn = (eh->dynindx != -1
4314 && !SYMBOL_REFERENCES_LOCAL (info, eh));
4315
4316 if (is_dyn || bfd_link_pic (info))
4317 {
4318 /* This symbol has an entry in the global offset table. Set
4319 it up. */
4320
4321 rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4322 + htab->etab.sgot->output_offset
4323 + htab->etab.sgot->output_section->vma);
4324
4325 /* If this is a -Bsymbolic link and the symbol is defined
4326 locally or was forced to be local because of a version
4327 file, we just want to emit a RELATIVE reloc. The entry
4328 in the global offset table will already have been
4329 initialized in the relocate_section function. */
4330 if (!is_dyn)
4331 {
4332 rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4333 rela.r_addend = (eh->root.u.def.value
4334 + eh->root.u.def.section->output_offset
4335 + eh->root.u.def.section->output_section->vma);
4336 }
4337 else
4338 {
4339 if ((eh->got.offset & 1) != 0)
4340 abort ();
4341
4342 bfd_put_32 (output_bfd, 0,
4343 htab->etab.sgot->contents + (eh->got.offset & ~1));
4344 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4345 rela.r_addend = 0;
4346 }
4347
4348 loc = htab->etab.srelgot->contents;
4349 loc += (htab->etab.srelgot->reloc_count++
4350 * sizeof (Elf32_External_Rela));
4351 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4352 }
4353 }
4354
4355 if (eh->needs_copy)
4356 {
4357 asection *sec;
4358
4359 /* This symbol needs a copy reloc. Set it up. */
4360
4361 if (! (eh->dynindx != -1
4362 && (eh->root.type == bfd_link_hash_defined
4363 || eh->root.type == bfd_link_hash_defweak)))
4364 abort ();
4365
4366 rela.r_offset = (eh->root.u.def.value
4367 + eh->root.u.def.section->output_offset
4368 + eh->root.u.def.section->output_section->vma);
4369 rela.r_addend = 0;
4370 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
4371 if (eh->root.u.def.section == htab->etab.sdynrelro)
4372 sec = htab->etab.sreldynrelro;
4373 else
4374 sec = htab->etab.srelbss;
4375 loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4376 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4377 }
4378
4379 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4380 if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
4381 {
4382 sym->st_shndx = SHN_ABS;
4383 }
4384
4385 return TRUE;
4386 }
4387
4388 /* Used to decide how to sort relocs in an optimal manner for the
4389 dynamic linker, before writing them out. */
4390
4391 static enum elf_reloc_type_class
4392 elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4393 const asection *rel_sec ATTRIBUTE_UNUSED,
4394 const Elf_Internal_Rela *rela)
4395 {
4396 /* Handle TLS relocs first; we don't want them to be marked
4397 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
4398 check below. */
4399 switch ((int) ELF32_R_TYPE (rela->r_info))
4400 {
4401 case R_PARISC_TLS_DTPMOD32:
4402 case R_PARISC_TLS_DTPOFF32:
4403 case R_PARISC_TLS_TPREL32:
4404 return reloc_class_normal;
4405 }
4406
4407 if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
4408 return reloc_class_relative;
4409
4410 switch ((int) ELF32_R_TYPE (rela->r_info))
4411 {
4412 case R_PARISC_IPLT:
4413 return reloc_class_plt;
4414 case R_PARISC_COPY:
4415 return reloc_class_copy;
4416 default:
4417 return reloc_class_normal;
4418 }
4419 }
4420
4421 /* Finish up the dynamic sections. */
4422
4423 static bfd_boolean
4424 elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4425 struct bfd_link_info *info)
4426 {
4427 bfd *dynobj;
4428 struct elf32_hppa_link_hash_table *htab;
4429 asection *sdyn;
4430 asection * sgot;
4431
4432 htab = hppa_link_hash_table (info);
4433 if (htab == NULL)
4434 return FALSE;
4435
4436 dynobj = htab->etab.dynobj;
4437
4438 sgot = htab->etab.sgot;
4439 /* A broken linker script might have discarded the dynamic sections.
4440 Catch this here so that we do not seg-fault later on. */
4441 if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4442 return FALSE;
4443
4444 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4445
4446 if (htab->etab.dynamic_sections_created)
4447 {
4448 Elf32_External_Dyn *dyncon, *dynconend;
4449
4450 if (sdyn == NULL)
4451 abort ();
4452
4453 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4454 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4455 for (; dyncon < dynconend; dyncon++)
4456 {
4457 Elf_Internal_Dyn dyn;
4458 asection *s;
4459
4460 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4461
4462 switch (dyn.d_tag)
4463 {
4464 default:
4465 continue;
4466
4467 case DT_PLTGOT:
4468 /* Use PLTGOT to set the GOT register. */
4469 dyn.d_un.d_ptr = elf_gp (output_bfd);
4470 break;
4471
4472 case DT_JMPREL:
4473 s = htab->etab.srelplt;
4474 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4475 break;
4476
4477 case DT_PLTRELSZ:
4478 s = htab->etab.srelplt;
4479 dyn.d_un.d_val = s->size;
4480 break;
4481 }
4482
4483 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4484 }
4485 }
4486
4487 if (sgot != NULL && sgot->size != 0)
4488 {
4489 /* Fill in the first entry in the global offset table.
4490 We use it to point to our dynamic section, if we have one. */
4491 bfd_put_32 (output_bfd,
4492 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
4493 sgot->contents);
4494
4495 /* The second entry is reserved for use by the dynamic linker. */
4496 memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
4497
4498 /* Set .got entry size. */
4499 elf_section_data (sgot->output_section)
4500 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
4501 }
4502
4503 if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
4504 {
4505 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4506 plt stubs and as such the section does not hold a table of fixed-size
4507 entries. */
4508 elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
4509
4510 if (htab->need_plt_stub)
4511 {
4512 /* Set up the .plt stub. */
4513 memcpy (htab->etab.splt->contents
4514 + htab->etab.splt->size - sizeof (plt_stub),
4515 plt_stub, sizeof (plt_stub));
4516
4517 if ((htab->etab.splt->output_offset
4518 + htab->etab.splt->output_section->vma
4519 + htab->etab.splt->size)
4520 != (sgot->output_offset
4521 + sgot->output_section->vma))
4522 {
4523 _bfd_error_handler
4524 (_(".got section not immediately after .plt section"));
4525 return FALSE;
4526 }
4527 }
4528 }
4529
4530 return TRUE;
4531 }
4532
4533 /* Called when writing out an object file to decide the type of a
4534 symbol. */
4535 static int
4536 elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
4537 {
4538 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4539 return STT_PARISC_MILLI;
4540 else
4541 return type;
4542 }
4543
4544 /* Misc BFD support code. */
4545 #define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4546 #define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4547 #define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
4548 #define elf_info_to_howto elf_hppa_info_to_howto
4549 #define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
4550
4551 /* Stuff for the BFD linker. */
4552 #define bfd_elf32_bfd_final_link elf32_hppa_final_link
4553 #define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4554 #define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
4555 #define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
4556 #define elf_backend_check_relocs elf32_hppa_check_relocs
4557 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4558 #define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4559 #define elf_backend_fake_sections elf_hppa_fake_sections
4560 #define elf_backend_relocate_section elf32_hppa_relocate_section
4561 #define elf_backend_hide_symbol elf32_hppa_hide_symbol
4562 #define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4563 #define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4564 #define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4565 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4566 #define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4567 #define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4568 #define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
4569 #define elf_backend_object_p elf32_hppa_object_p
4570 #define elf_backend_final_write_processing elf_hppa_final_write_processing
4571 #define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
4572 #define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
4573 #define elf_backend_action_discarded elf_hppa_action_discarded
4574
4575 #define elf_backend_can_gc_sections 1
4576 #define elf_backend_can_refcount 1
4577 #define elf_backend_plt_alignment 2
4578 #define elf_backend_want_got_plt 0
4579 #define elf_backend_plt_readonly 0
4580 #define elf_backend_want_plt_sym 0
4581 #define elf_backend_got_header_size 8
4582 #define elf_backend_want_dynrelro 1
4583 #define elf_backend_rela_normal 1
4584 #define elf_backend_dtrel_excludes_plt 1
4585 #define elf_backend_no_page_alias 1
4586
4587 #define TARGET_BIG_SYM hppa_elf32_vec
4588 #define TARGET_BIG_NAME "elf32-hppa"
4589 #define ELF_ARCH bfd_arch_hppa
4590 #define ELF_TARGET_ID HPPA32_ELF_DATA
4591 #define ELF_MACHINE_CODE EM_PARISC
4592 #define ELF_MAXPAGESIZE 0x1000
4593 #define ELF_OSABI ELFOSABI_HPUX
4594 #define elf32_bed elf32_hppa_hpux_bed
4595
4596 #include "elf32-target.h"
4597
4598 #undef TARGET_BIG_SYM
4599 #define TARGET_BIG_SYM hppa_elf32_linux_vec
4600 #undef TARGET_BIG_NAME
4601 #define TARGET_BIG_NAME "elf32-hppa-linux"
4602 #undef ELF_OSABI
4603 #define ELF_OSABI ELFOSABI_GNU
4604 #undef elf32_bed
4605 #define elf32_bed elf32_hppa_linux_bed
4606
4607 #include "elf32-target.h"
4608
4609 #undef TARGET_BIG_SYM
4610 #define TARGET_BIG_SYM hppa_elf32_nbsd_vec
4611 #undef TARGET_BIG_NAME
4612 #define TARGET_BIG_NAME "elf32-hppa-netbsd"
4613 #undef ELF_OSABI
4614 #define ELF_OSABI ELFOSABI_NETBSD
4615 #undef elf32_bed
4616 #define elf32_bed elf32_hppa_netbsd_bed
4617
4618 #include "elf32-target.h"