diff options
author | Richard Henderson <rth@redhat.com> | 1999-05-03 07:29:06 +0000 |
---|---|---|
committer | Richard Henderson <rth@redhat.com> | 1999-05-03 07:29:06 +0000 |
commit | 860acaebec6b57ce27e244cc02a58e6651a4b6c3 (patch) | |
tree | eff5420756a4bd56b40b74c2b828b261f327610b /bfd/elf32-hppa.c | |
parent | f9c53ad2d7cb541cbe821d645b90437ac063e5db (diff) | |
download | gdb-860acaebec6b57ce27e244cc02a58e6651a4b6c3.tar.gz |
Initial revision
Diffstat (limited to 'bfd/elf32-hppa.c')
-rw-r--r-- | bfd/elf32-hppa.c | 2988 |
1 files changed, 2988 insertions, 0 deletions
diff --git a/bfd/elf32-hppa.c b/bfd/elf32-hppa.c new file mode 100644 index 00000000000..6bd7f67a0ab --- /dev/null +++ b/bfd/elf32-hppa.c @@ -0,0 +1,2988 @@ +/* BFD back-end for HP PA-RISC ELF files. + Copyright (C) 1990, 91, 92, 93, 94, 95, 96, 1997 + Free Software Foundation, Inc. + + Written by + + Center for Software Science + Department of Computer Science + University of Utah + +This file is part of BFD, the Binary File Descriptor library. + +This program is free software; you can redistribute it and/or modify +it under the terms of the GNU General Public License as published by +the Free Software Foundation; either version 2 of the License, or +(at your option) any later version. + +This program is distributed in the hope that it will be useful, +but WITHOUT ANY WARRANTY; without even the implied warranty of +MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +GNU General Public License for more details. + +You should have received a copy of the GNU General Public License +along with this program; if not, write to the Free Software +Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ + +#include "bfd.h" +#include "sysdep.h" +#include "bfdlink.h" +#include "libbfd.h" +#include "elf-bfd.h" + +/* The internal type of a symbol table extension entry. */ +typedef unsigned long symext_entryS; + +/* The external type of a symbol table extension entry. */ +#define ELF32_PARISC_SX_SIZE (4) +#define ELF32_PARISC_SX_GET(bfd, addr) bfd_h_get_32 ((bfd), (addr)) +#define ELF32_PARISC_SX_PUT(bfd, val, addr) \ + bfd_h_put_32 ((bfd), (val), (addr)) + +/* HPPA symbol table extension entry types */ +enum elf32_hppa_symextn_types +{ + PARISC_SXT_NULL, + PARISC_SXT_SYMNDX, + PARISC_SXT_ARG_RELOC, +}; + +/* These macros compose and decompose the value of a symextn entry: + + entry_type = ELF32_PARISC_SX_TYPE(word); + entry_value = ELF32_PARISC_SX_VAL(word); + word = ELF32_PARISC_SX_WORD(type,val); */ + +#define ELF32_PARISC_SX_TYPE(p) ((p) >> 24) +#define ELF32_PARISC_SX_VAL(p) ((p) & 0xFFFFFF) +#define ELF32_PARISC_SX_WORD(type,val) (((type) << 24) + (val & 0xFFFFFF)) + +/* The following was added facilitate implementation of the .hppa_symextn + section. This section is built after the symbol table is built in the + elf_write_object_contents routine (called from bfd_close). It is built + so late because it requires information that is not known until + the symbol and string table sections have been allocated, and + the symbol table has been built. */ + +#define SYMEXTN_SECTION_NAME ".PARISC.symext" + +struct symext_chain + { + symext_entryS entry; + struct symext_chain *next; + }; + +typedef struct symext_chain symext_chainS; + +/* We use three different hash tables to hold information for + linking PA ELF objects. + + The first is the elf32_hppa_link_hash_table which is derived + from the standard ELF linker hash table. We use this as a place to + attach other hash tables and static information. + + The second is the stub hash table which is derived from the + base BFD hash table. The stub hash table holds the information + necessary to build the linker stubs during a link. + + The last hash table keeps track of argument location information needed + to build hash tables. Each function with nonzero argument location + bits will have an entry in this table. */ + +/* Hash table for linker stubs. */ + +struct elf32_hppa_stub_hash_entry +{ + /* Base hash table entry structure, we can get the name of the stub + (and thus know exactly what actions it performs) from the base + hash table entry. */ + struct bfd_hash_entry root; + + /* Offset of the beginning of this stub. */ + bfd_vma offset; + + /* Given the symbol's value and its section we can determine its final + value when building the stubs (so the stub knows where to jump. */ + symvalue target_value; + asection *target_section; +}; + +struct elf32_hppa_stub_hash_table +{ + /* The hash table itself. */ + struct bfd_hash_table root; + + /* The stub BFD. */ + bfd *stub_bfd; + + /* Where to place the next stub. */ + bfd_byte *location; + + /* Current offset in the stub section. */ + unsigned int offset; + +}; + +/* Hash table for argument location information. */ + +struct elf32_hppa_args_hash_entry +{ + /* Base hash table entry structure. */ + struct bfd_hash_entry root; + + /* The argument location bits for this entry. */ + int arg_bits; +}; + +struct elf32_hppa_args_hash_table +{ + /* The hash table itself. */ + struct bfd_hash_table root; +}; + +struct elf32_hppa_link_hash_entry +{ + struct elf_link_hash_entry root; +}; + +struct elf32_hppa_link_hash_table +{ + /* The main hash table. */ + struct elf_link_hash_table root; + + /* The stub hash table. */ + struct elf32_hppa_stub_hash_table *stub_hash_table; + + /* The argument relocation bits hash table. */ + struct elf32_hppa_args_hash_table *args_hash_table; + + /* A count of the number of output symbols. */ + unsigned int output_symbol_count; + + /* Stuff so we can handle DP relative relocations. */ + long global_value; + int global_sym_defined; +}; + +/* FIXME. */ +#define ARGUMENTS 0 +#define RETURN_VALUE 1 + +/* The various argument relocations that may be performed. */ +typedef enum +{ + /* No relocation. */ + NO, + /* Relocate 32 bits from GR to FP register. */ + GF, + /* Relocate 64 bits from a GR pair to FP pair. */ + GD, + /* Relocate 32 bits from FP to GR. */ + FG, + /* Relocate 64 bits from FP pair to GR pair. */ + DG, +} arg_reloc_type; + +/* What is being relocated (eg which argument or the return value). */ +typedef enum +{ + ARG0, ARG1, ARG2, ARG3, RET, +} arg_reloc_location; + + +/* ELF32/HPPA relocation support + + This file contains ELF32/HPPA relocation support as specified + in the Stratus FTX/Golf Object File Format (SED-1762) dated + February 1994. */ + +#include "elf32-hppa.h" +#include "hppa_stubs.h" + +static bfd_reloc_status_type hppa_elf_reloc + PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **)); + +static unsigned long hppa_elf_relocate_insn + PARAMS ((bfd *, asection *, unsigned long, unsigned long, long, + long, unsigned long, unsigned long, unsigned long)); + +static bfd_reloc_status_type hppa_elf_reloc + PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd*, char **)); + +static reloc_howto_type * elf_hppa_reloc_type_lookup + PARAMS ((bfd *, bfd_reloc_code_real_type)); + +static boolean elf32_hppa_set_section_contents + PARAMS ((bfd *, sec_ptr, PTR, file_ptr, bfd_size_type)); + +static void elf32_hppa_info_to_howto + PARAMS ((bfd *, arelent *, Elf32_Internal_Rela *)); + +static boolean elf32_hppa_backend_symbol_table_processing + PARAMS ((bfd *, elf_symbol_type *, unsigned int)); + +static void elf32_hppa_backend_begin_write_processing + PARAMS ((bfd *, struct bfd_link_info *)); + +static void elf32_hppa_backend_final_write_processing + PARAMS ((bfd *, boolean)); + +static void add_entry_to_symext_chain + PARAMS ((bfd *, unsigned int, unsigned int, symext_chainS **, + symext_chainS **)); + +static void +elf_hppa_tc_make_sections PARAMS ((bfd *, symext_chainS *)); + +static boolean hppa_elf_is_local_label_name PARAMS ((bfd *, const char *)); + +static boolean elf32_hppa_add_symbol_hook + PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *, + const char **, flagword *, asection **, bfd_vma *)); + +static bfd_reloc_status_type elf32_hppa_bfd_final_link_relocate + PARAMS ((reloc_howto_type *, bfd *, bfd *, asection *, + bfd_byte *, bfd_vma, bfd_vma, bfd_vma, struct bfd_link_info *, + asection *, const char *, int)); + +static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create + PARAMS ((bfd *)); + +static struct bfd_hash_entry * +elf32_hppa_stub_hash_newfunc + PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *)); + +static struct bfd_hash_entry * +elf32_hppa_args_hash_newfunc + PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *)); + +static boolean +elf32_hppa_relocate_section + PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, + bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **)); + +static boolean +elf32_hppa_stub_hash_table_init + PARAMS ((struct elf32_hppa_stub_hash_table *, bfd *, + struct bfd_hash_entry *(*) PARAMS ((struct bfd_hash_entry *, + struct bfd_hash_table *, + const char *)))); + +static boolean +elf32_hppa_build_one_stub PARAMS ((struct bfd_hash_entry *, PTR)); + +static boolean +elf32_hppa_read_symext_info + PARAMS ((bfd *, Elf_Internal_Shdr *, struct elf32_hppa_args_hash_table *, + Elf_Internal_Sym *)); + +static unsigned int elf32_hppa_size_of_stub + PARAMS ((unsigned int, unsigned int, bfd_vma, bfd_vma, const char *)); + +static boolean elf32_hppa_arg_reloc_needed + PARAMS ((unsigned int, unsigned int, arg_reloc_type [])); + +static void elf32_hppa_name_of_stub + PARAMS ((unsigned int, unsigned int, bfd_vma, bfd_vma, char *)); + +static boolean elf32_hppa_size_symext PARAMS ((struct bfd_hash_entry *, PTR)); + +static boolean elf32_hppa_link_output_symbol_hook + PARAMS ((bfd *, struct bfd_link_info *, const char *, + Elf_Internal_Sym *, asection *)); + +/* ELF/PA relocation howto entries. */ + +static reloc_howto_type elf_hppa_howto_table[ELF_HOWTO_TABLE_SIZE] = +{ + {R_PARISC_NONE, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_NONE"}, + /* The values in DIR32 are to placate the check in + _bfd_stab_section_find_nearest_line. */ + {R_PARISC_DIR32, 0, 2, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR32", false, 0, 0xffffffff, false}, + {R_PARISC_DIR21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR21L"}, + {R_PARISC_DIR17R, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR17R"}, + {R_PARISC_DIR17F, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR17F"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DIR14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR14R"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_PCREL21L, 0, 0, 21, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL21L"}, + {R_PARISC_PCREL17R, 0, 0, 17, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL17R"}, + {R_PARISC_PCREL17F, 0, 0, 17, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL17F"}, + {R_PARISC_PCREL17C, 0, 0, 17, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL17C"}, + {R_PARISC_PCREL14R, 0, 0, 14, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL14R"}, + {R_PARISC_PCREL14F, 0, 0, 14, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL14F"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DPREL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DPREL21L"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DPREL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DPREL14R"}, + {R_PARISC_DPREL14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DPREL14F"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DLTREL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTREL21L"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DLTREL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTREL14R"}, + {R_PARISC_DLTREL14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTREL14F"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DLTIND21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTIND21L"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DLTIND14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTIND14R"}, + {R_PARISC_DLTIND14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTIND14F"}, + + {R_PARISC_SETBASE, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_SETBASE"}, + {R_PARISC_BASEREL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL32"}, + {R_PARISC_BASEREL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL21L"}, + {R_PARISC_BASEREL17R, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL17R"}, + {R_PARISC_BASEREL17F, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL17F"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_BASEREL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL14R"}, + {R_PARISC_BASEREL14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL14F"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_TEXTREL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_TEXTREL32"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_DATAREL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_PLABEL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLABEL32"}, + {R_PARISC_PLABEL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLABEL21L"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_PLABEL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLABEL14R"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_PLTIND21L, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLTIND21L"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"}, + {R_PARISC_PLTIND14R, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLTIND14R"}, + {R_PARISC_PLTIND14F, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLTIND14F"}, + + + {R_PARISC_COPY, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_COPY"}, + {R_PARISC_GLOB_DAT, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_GLOB_DAT"}, + {R_PARISC_JMP_SLOT, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_JMP_SLOT"}, + {R_PARISC_RELATIVE, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_RELATIVE"}, + + {R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_dont, NULL, "R_PARISC_UNIMPLEMENTED"}, +}; + +/* Where (what register type) is an argument comming from? */ +typedef enum +{ + AR_NO, + AR_GR, + AR_FR, + AR_FU, + AR_FPDBL1, + AR_FPDBL2, +} arg_location; + +/* Horizontal represents the callee's argument location information, + vertical represents caller's argument location information. Value at a + particular X,Y location represents what (if any) argument relocation + needs to be performed to make caller and callee agree. */ + +static CONST arg_reloc_type arg_mismatches[6][6] = +{ + {NO, NO, NO, NO, NO, NO}, + {NO, NO, GF, NO, GD, NO}, + {NO, FG, NO, NO, NO, NO}, + {NO, NO, NO, NO, NO, NO}, + {NO, DG, NO, NO, NO, NO}, + {NO, DG, NO, NO, NO, NO}, +}; + +/* Likewise, but reversed for the return value. */ +static CONST arg_reloc_type ret_mismatches[6][6] = +{ + {NO, NO, NO, NO, NO, NO}, + {NO, NO, FG, NO, DG, NO}, + {NO, GF, NO, NO, NO, NO}, + {NO, NO, NO, NO, NO, NO}, + {NO, GD, NO, NO, NO, NO}, + {NO, GD, NO, NO, NO, NO}, +}; + +/* Misc static crud for symbol extension records. */ +static symext_chainS *symext_rootP; +static symext_chainS *symext_lastP; +static bfd_size_type symext_chain_size; + +/* FIXME: We should be able to try this static variable! */ +static bfd_byte *symextn_contents; + + +/* For linker stub hash tables. */ +#define elf32_hppa_stub_hash_lookup(table, string, create, copy) \ + ((struct elf32_hppa_stub_hash_entry *) \ + bfd_hash_lookup (&(table)->root, (string), (create), (copy))) + +#define elf32_hppa_stub_hash_traverse(table, func, info) \ + (bfd_hash_traverse \ + (&(table)->root, \ + (boolean (*) PARAMS ((struct bfd_hash_entry *, PTR))) (func), \ + (info))) + +/* For linker args hash tables. */ +#define elf32_hppa_args_hash_lookup(table, string, create, copy) \ + ((struct elf32_hppa_args_hash_entry *) \ + bfd_hash_lookup (&(table)->root, (string), (create), (copy))) + +#define elf32_hppa_args_hash_traverse(table, func, info) \ + (bfd_hash_traverse \ + (&(table)->root, \ + (boolean (*) PARAMS ((struct bfd_hash_entry *, PTR))) (func), \ + (info))) + +#define elf32_hppa_args_hash_table_init(table, newfunc) \ + (bfd_hash_table_init \ + (&(table)->root, \ + (struct bfd_hash_entry *(*) PARAMS ((struct bfd_hash_entry *, \ + struct bfd_hash_table *, \ + const char *))) (newfunc))) + +/* For HPPA linker hash table. */ + +#define elf32_hppa_link_hash_lookup(table, string, create, copy, follow)\ + ((struct elf32_hppa_link_hash_entry *) \ + elf_link_hash_lookup (&(table)->root, (string), (create), \ + (copy), (follow))) + +#define elf32_hppa_link_hash_traverse(table, func, info) \ + (elf_link_hash_traverse \ + (&(table)->root, \ + (boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \ + (info))) + +/* Get the PA ELF linker hash table from a link_info structure. */ + +#define elf32_hppa_hash_table(p) \ + ((struct elf32_hppa_link_hash_table *) ((p)->hash)) + + +/* Extract specific argument location bits for WHICH from + the full argument location in AR. */ +#define EXTRACT_ARBITS(ar, which) ((ar) >> (8 - ((which) * 2))) & 3 + +/* Assorted hash table functions. */ + +/* Initialize an entry in the stub hash table. */ + +static struct bfd_hash_entry * +elf32_hppa_stub_hash_newfunc (entry, table, string) + struct bfd_hash_entry *entry; + struct bfd_hash_table *table; + const char *string; +{ + struct elf32_hppa_stub_hash_entry *ret; + + ret = (struct elf32_hppa_stub_hash_entry *) entry; + + /* Allocate the structure if it has not already been allocated by a + subclass. */ + if (ret == NULL) + ret = ((struct elf32_hppa_stub_hash_entry *) + bfd_hash_allocate (table, + sizeof (struct elf32_hppa_stub_hash_entry))); + if (ret == NULL) + return NULL; + + /* Call the allocation method of the superclass. */ + ret = ((struct elf32_hppa_stub_hash_entry *) + bfd_hash_newfunc ((struct bfd_hash_entry *) ret, table, string)); + + if (ret) + { + /* Initialize the local fields. */ + ret->offset = 0; + ret->target_value = 0; + ret->target_section = NULL; + } + + return (struct bfd_hash_entry *) ret; +} + +/* Initialize a stub hash table. */ + +static boolean +elf32_hppa_stub_hash_table_init (table, stub_bfd, newfunc) + struct elf32_hppa_stub_hash_table *table; + bfd *stub_bfd; + struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *, + struct bfd_hash_table *, + const char *)); +{ + table->offset = 0; + table->location = 0; + table->stub_bfd = stub_bfd; + return (bfd_hash_table_init (&table->root, newfunc)); +} + +/* Initialize an entry in the argument location hash table. */ + +static struct bfd_hash_entry * +elf32_hppa_args_hash_newfunc (entry, table, string) + struct bfd_hash_entry *entry; + struct bfd_hash_table *table; + const char *string; +{ + struct elf32_hppa_args_hash_entry *ret; + + ret = (struct elf32_hppa_args_hash_entry *) entry; + + /* Allocate the structure if it has not already been allocated by a + subclass. */ + if (ret == NULL) + ret = ((struct elf32_hppa_args_hash_entry *) + bfd_hash_allocate (table, + sizeof (struct elf32_hppa_args_hash_entry))); + if (ret == NULL) + return NULL; + + /* Call the allocation method of the superclass. */ + ret = ((struct elf32_hppa_args_hash_entry *) + bfd_hash_newfunc ((struct bfd_hash_entry *) ret, table, string)); + + /* Initialize the local fields. */ + if (ret) + ret->arg_bits = 0; + + return (struct bfd_hash_entry *) ret; +} + +/* Create the derived linker hash table. The PA ELF port uses the derived + hash table to keep information specific to the PA ELF linker (without + using static variables). */ + +static struct bfd_link_hash_table * +elf32_hppa_link_hash_table_create (abfd) + bfd *abfd; +{ + struct elf32_hppa_link_hash_table *ret; + + ret = ((struct elf32_hppa_link_hash_table *) + bfd_alloc (abfd, sizeof (struct elf32_hppa_link_hash_table))); + if (ret == NULL) + return NULL; + if (!_bfd_elf_link_hash_table_init (&ret->root, abfd, + _bfd_elf_link_hash_newfunc)) + { + bfd_release (abfd, ret); + return NULL; + } + ret->stub_hash_table = NULL; + ret->args_hash_table = NULL; + ret->output_symbol_count = 0; + ret->global_value = 0; + ret->global_sym_defined = 0; + + return &ret->root.root; +} + +/* Relocate the given INSN given the various input parameters. + + FIXME: endianness and sizeof (long) issues abound here. */ + +static unsigned long +hppa_elf_relocate_insn (abfd, input_sect, insn, address, sym_value, + r_addend, r_format, r_field, pcrel) + bfd *abfd; + asection *input_sect; + unsigned long insn; + unsigned long address; + long sym_value; + long r_addend; + unsigned long r_format; + unsigned long r_field; + unsigned long pcrel; +{ + unsigned char opcode = get_opcode (insn); + long constant_value; + + switch (opcode) + { + case LDO: + case LDB: + case LDH: + case LDW: + case LDWM: + case STB: + case STH: + case STW: + case STWM: + case COMICLR: + case SUBI: + case ADDIT: + case ADDI: + case LDIL: + case ADDIL: + constant_value = HPPA_R_CONSTANT (r_addend); + + if (pcrel) + sym_value -= address; + + sym_value = hppa_field_adjust (sym_value, constant_value, r_field); + return hppa_rebuild_insn (abfd, insn, sym_value, r_format); + + case BL: + case BE: + case BLE: + /* XXX computing constant_value is not needed??? */ + constant_value = assemble_17 ((insn & 0x001f0000) >> 16, + (insn & 0x00001ffc) >> 2, + insn & 1); + + constant_value = (constant_value << 15) >> 15; + if (pcrel) + { + sym_value -= + address + input_sect->output_offset + + input_sect->output_section->vma; + sym_value = hppa_field_adjust (sym_value, -8, r_field); + } + else + sym_value = hppa_field_adjust (sym_value, constant_value, r_field); + + return hppa_rebuild_insn (abfd, insn, sym_value >> 2, r_format); + + default: + if (opcode == 0) + { + constant_value = HPPA_R_CONSTANT (r_addend); + + if (pcrel) + sym_value -= address; + + return hppa_field_adjust (sym_value, constant_value, r_field); + } + else + abort (); + } +} + +/* Relocate an HPPA ELF section. */ + +static boolean +elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section, + contents, relocs, local_syms, local_sections) + bfd *output_bfd; + struct bfd_link_info *info; + bfd *input_bfd; + asection *input_section; + bfd_byte *contents; + Elf_Internal_Rela *relocs; + Elf_Internal_Sym *local_syms; + asection **local_sections; +{ + Elf_Internal_Shdr *symtab_hdr; + Elf_Internal_Rela *rel; + Elf_Internal_Rela *relend; + + symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr; + + rel = relocs; + relend = relocs + input_section->reloc_count; + for (; rel < relend; rel++) + { + int r_type; + reloc_howto_type *howto; + unsigned long r_symndx; + struct elf_link_hash_entry *h; + Elf_Internal_Sym *sym; + asection *sym_sec; + bfd_vma relocation; + bfd_reloc_status_type r; + const char *sym_name; + + r_type = ELF32_R_TYPE (rel->r_info); + if (r_type < 0 || r_type >= (int) R_PARISC_UNIMPLEMENTED) + { + bfd_set_error (bfd_error_bad_value); + return false; + } + howto = elf_hppa_howto_table + r_type; + + r_symndx = ELF32_R_SYM (rel->r_info); + + if (info->relocateable) + { + /* This is a relocateable link. We don't have to change + anything, unless the reloc is against a section symbol, + in which case we have to adjust according to where the + section symbol winds up in the output section. */ + if (r_symndx < symtab_hdr->sh_info) + { + sym = local_syms + r_symndx; + if (ELF_ST_TYPE (sym->st_info) == STT_SECTION) + { + sym_sec = local_sections[r_symndx]; + rel->r_addend += sym_sec->output_offset; + } + } + + continue; + } + + /* This is a final link. */ + h = NULL; + sym = NULL; + sym_sec = NULL; + if (r_symndx < symtab_hdr->sh_info) + { + sym = local_syms + r_symndx; + sym_sec = local_sections[r_symndx]; + relocation = ((ELF_ST_TYPE (sym->st_info) == STT_SECTION + ? 0 : sym->st_value) + + sym_sec->output_offset + + sym_sec->output_section->vma); + } + else + { + long indx; + + indx = r_symndx - symtab_hdr->sh_info; + h = elf_sym_hashes (input_bfd)[indx]; + while (h->root.type == bfd_link_hash_indirect + || h->root.type == bfd_link_hash_warning) + h = (struct elf_link_hash_entry *) h->root.u.i.link; + if (h->root.type == bfd_link_hash_defined + || h->root.type == bfd_link_hash_defweak) + { + sym_sec = h->root.u.def.section; + relocation = (h->root.u.def.value + + sym_sec->output_offset + + sym_sec->output_section->vma); + } + else if (h->root.type == bfd_link_hash_undefweak) + relocation = 0; + else + { + if (!((*info->callbacks->undefined_symbol) + (info, h->root.root.string, input_bfd, + input_section, rel->r_offset))) + return false; + break; + } + } + + if (h != NULL) + sym_name = h->root.root.string; + else + { + sym_name = bfd_elf_string_from_elf_section (input_bfd, + symtab_hdr->sh_link, + sym->st_name); + if (sym_name == NULL) + return false; + if (*sym_name == '\0') + sym_name = bfd_section_name (input_bfd, sym_sec); + } + + /* If args_hash_table is NULL, then we have encountered some + kind of link error (ex. undefined symbols). Do not try to + apply any relocations, continue the loop so we can notify + the user of several errors in a single attempted link. */ + if (elf32_hppa_hash_table (info)->args_hash_table == NULL) + continue; + + r = elf32_hppa_bfd_final_link_relocate (howto, input_bfd, output_bfd, + input_section, contents, + rel->r_offset, relocation, + rel->r_addend, info, sym_sec, + sym_name, h == NULL); + + if (r != bfd_reloc_ok) + { + switch (r) + { + /* This can happen for DP relative relocs if $global$ is + undefined. This is a panic situation so we don't try + to continue. */ + case bfd_reloc_undefined: + case bfd_reloc_notsupported: + if (!((*info->callbacks->undefined_symbol) + (info, "$global$", input_bfd, + input_section, rel->r_offset))) + return false; + return false; + case bfd_reloc_dangerous: + { + /* We use this return value to indicate that we performed + a "dangerous" relocation. This doesn't mean we did + the wrong thing, it just means there may be some cleanup + that needs to be done here. + + In particular we had to swap the last call insn and its + delay slot. If the delay slot insn needed a relocation, + then we'll need to adjust the next relocation entry's + offset to account for the fact that the insn moved. + + This hair wouldn't be necessary if we inserted stubs + between procedures and used a "bl" to get to the stub. */ + if (rel != relend) + { + Elf_Internal_Rela *next_rel = rel + 1; + + if (rel->r_offset + 4 == next_rel->r_offset) + next_rel->r_offset -= 4; + } + break; + } + default: + case bfd_reloc_outofrange: + case bfd_reloc_overflow: + { + if (!((*info->callbacks->reloc_overflow) + (info, sym_name, howto->name, (bfd_vma) 0, + input_bfd, input_section, rel->r_offset))) + return false; + } + break; + } + } + } + + return true; +} + +/* Return one (or more) BFD relocations which implement the base + relocation with modifications based on format and field. */ + +elf32_hppa_reloc_type ** +hppa_elf_gen_reloc_type (abfd, base_type, format, field, ignore, sym) + bfd *abfd; + elf32_hppa_reloc_type base_type; + int format; + int field; + int ignore; + asymbol *sym; +{ + elf32_hppa_reloc_type *finaltype; + elf32_hppa_reloc_type **final_types; + + /* Allocate slots for the BFD relocation. */ + final_types = ((elf32_hppa_reloc_type **) + bfd_alloc (abfd, sizeof (elf32_hppa_reloc_type *) * 2)); + if (final_types == NULL) + return NULL; + + /* Allocate space for the relocation itself. */ + finaltype = ((elf32_hppa_reloc_type *) + bfd_alloc (abfd, sizeof (elf32_hppa_reloc_type))); + if (finaltype == NULL) + return NULL; + + /* Some reasonable defaults. */ + final_types[0] = finaltype; + final_types[1] = NULL; + +#define final_type finaltype[0] + + final_type = base_type; + + /* Just a tangle of nested switch statements to deal with the braindamage + that a different field selector means a completely different relocation + for PA ELF. */ + switch (base_type) + { + case R_HPPA: + case R_HPPA_ABS_CALL: + switch (format) + { + case 14: + switch (field) + { + case e_rsel: + case e_rrsel: + final_type = R_PARISC_DIR14R; + break; + case e_rtsel: + final_type = R_PARISC_DLTREL14R; + break; + case e_tsel: + final_type = R_PARISC_DLTREL14F; + break; + case e_rpsel: + final_type = R_PARISC_PLABEL14R; + break; + default: + return NULL; + } + break; + + case 17: + switch (field) + { + case e_fsel: + final_type = R_PARISC_DIR17F; + break; + case e_rsel: + case e_rrsel: + final_type = R_PARISC_DIR17R; + break; + default: + return NULL; + } + break; + + case 21: + switch (field) + { + case e_lsel: + case e_lrsel: + final_type = R_PARISC_DIR21L; + break; + case e_ltsel: + final_type = R_PARISC_DLTREL21L; + break; + case e_lpsel: + final_type = R_PARISC_PLABEL21L; + break; + default: + return NULL; + } + break; + + case 32: + switch (field) + { + case e_fsel: + final_type = R_PARISC_DIR32; + break; + case e_psel: + final_type = R_PARISC_PLABEL32; + break; + default: + return NULL; + } + break; + + default: + return NULL; + } + break; + + + case R_HPPA_GOTOFF: + switch (format) + { + case 14: + switch (field) + { + case e_rsel: + case e_rrsel: + final_type = R_PARISC_DPREL14R; + break; + case e_fsel: + final_type = R_PARISC_DPREL14F; + break; + default: + return NULL; + } + break; + + case 21: + switch (field) + { + case e_lrsel: + case e_lsel: + final_type = R_PARISC_DPREL21L; + break; + default: + return NULL; + } + break; + + default: + return NULL; + } + break; + + + case R_HPPA_PCREL_CALL: + switch (format) + { + case 14: + switch (field) + { + case e_rsel: + case e_rrsel: + final_type = R_PARISC_PCREL14R; + break; + case e_fsel: + final_type = R_PARISC_PCREL14F; + break; + default: + return NULL; + } + break; + + case 17: + switch (field) + { + case e_rsel: + case e_rrsel: + final_type = R_PARISC_PCREL17R; + break; + case e_fsel: + final_type = R_PARISC_PCREL17F; + break; + default: + return NULL; + } + break; + + case 21: + switch (field) + { + case e_lsel: + case e_lrsel: + final_type = R_PARISC_PCREL21L; + break; + default: + return NULL; + } + break; + + default: + return NULL; + } + break; + + default: + return NULL; + } + + return final_types; +} + +#undef final_type + +/* Set the contents of a particular section at a particular location. */ + +static boolean +elf32_hppa_set_section_contents (abfd, section, location, offset, count) + bfd *abfd; + sec_ptr section; + PTR location; + file_ptr offset; + bfd_size_type count; +{ + /* Ignore write requests for the symbol extension section until we've + had the chance to rebuild it ourselves. */ + if (!strcmp (section->name, ".PARISC.symextn") && !symext_chain_size) + return true; + else + return _bfd_elf_set_section_contents (abfd, section, location, + offset, count); +} + +/* Translate from an elf into field into a howto relocation pointer. */ + +static void +elf32_hppa_info_to_howto (abfd, cache_ptr, dst) + bfd *abfd; + arelent *cache_ptr; + Elf32_Internal_Rela *dst; +{ + BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_PARISC_UNIMPLEMENTED); + cache_ptr->howto = &elf_hppa_howto_table[ELF32_R_TYPE (dst->r_info)]; +} + + +/* Actually perform a relocation. NOTE this is (mostly) superceeded + by elf32_hppa_bfd_final_link_relocate which is called by the new + fast linker. */ + +static bfd_reloc_status_type +hppa_elf_reloc (abfd, reloc_entry, symbol_in, data, input_section, output_bfd, + error_message) + bfd *abfd; + arelent *reloc_entry; + asymbol *symbol_in; + PTR data; + asection *input_section; + bfd *output_bfd; + char **error_message; +{ + /* It is no longer valid to call hppa_elf_reloc when creating + a final executable. */ + if (output_bfd) + { + reloc_entry->address += input_section->output_offset; + + /* Work around lossage in generic elf code to write relocations. + (maps different section symbols into the same symbol index). */ + if ((symbol_in->flags & BSF_SECTION_SYM) + && symbol_in->section) + reloc_entry->addend += symbol_in->section->output_offset; + return bfd_reloc_ok; + } + else + { + *error_message = (char *) _("Unsupported call to hppa_elf_reloc"); + return bfd_reloc_notsupported; + } +} + +/* Actually perform a relocation as part of a final link. This can get + rather hairy when linker stubs are needed. */ + +static bfd_reloc_status_type +elf32_hppa_bfd_final_link_relocate (howto, input_bfd, output_bfd, + input_section, contents, offset, value, + addend, info, sym_sec, sym_name, is_local) + reloc_howto_type *howto; + bfd *input_bfd; + bfd *output_bfd; + asection *input_section; + bfd_byte *contents; + bfd_vma offset; + bfd_vma value; + bfd_vma addend; + struct bfd_link_info *info; + asection *sym_sec; + const char *sym_name; + int is_local; +{ + unsigned long insn; + unsigned long r_type = howto->type; + unsigned long r_format = howto->bitsize; + unsigned long r_field = e_fsel; + bfd_byte *hit_data = contents + offset; + boolean r_pcrel = howto->pc_relative; + + insn = bfd_get_32 (input_bfd, hit_data); + + /* Make sure we have a value for $global$. FIXME isn't this effectively + just like the gp pointer on MIPS? Can we use those routines for this + purpose? */ + if (!elf32_hppa_hash_table (info)->global_sym_defined) + { + struct elf_link_hash_entry *h; + asection *sec; + + h = elf_link_hash_lookup (elf_hash_table (info), "$global$", false, + false, false); + + /* If there isn't a $global$, then we're in deep trouble. */ + if (h == NULL) + return bfd_reloc_notsupported; + + /* If $global$ isn't a defined symbol, then we're still in deep + trouble. */ + if (h->root.type != bfd_link_hash_defined) + return bfd_reloc_undefined; + + sec = h->root.u.def.section; + elf32_hppa_hash_table (info)->global_value = (h->root.u.def.value + + sec->output_section->vma + + sec->output_offset); + elf32_hppa_hash_table (info)->global_sym_defined = 1; + } + + switch (r_type) + { + case R_PARISC_NONE: + break; + + case R_PARISC_DIR32: + case R_PARISC_DIR17F: + case R_PARISC_PCREL17C: + r_field = e_fsel; + goto do_basic_type_1; + case R_PARISC_DIR21L: + case R_PARISC_PCREL21L: + r_field = e_lrsel; + goto do_basic_type_1; + case R_PARISC_DIR17R: + case R_PARISC_PCREL17R: + case R_PARISC_DIR14R: + case R_PARISC_PCREL14R: + r_field = e_rrsel; + goto do_basic_type_1; + + /* For all the DP relative relocations, we need to examine the symbol's + section. If it's a code section, then "data pointer relative" makes + no sense. In that case we don't adjust the "value", and for 21 bit + addil instructions, we change the source addend register from %dp to + %r0. */ + case R_PARISC_DPREL21L: + r_field = e_lrsel; + if (sym_sec->flags & SEC_CODE) + { + if ((insn & 0xfc000000) >> 26 == 0xa + && (insn & 0x03e00000) >> 21 == 0x1b) + insn &= ~0x03e00000; + } + else + value -= elf32_hppa_hash_table (info)->global_value; + goto do_basic_type_1; + case R_PARISC_DPREL14R: + r_field = e_rrsel; + if ((sym_sec->flags & SEC_CODE) == 0) + value -= elf32_hppa_hash_table (info)->global_value; + goto do_basic_type_1; + case R_PARISC_DPREL14F: + r_field = e_fsel; + if ((sym_sec->flags & SEC_CODE) == 0) + value -= elf32_hppa_hash_table (info)->global_value; + goto do_basic_type_1; + + /* These cases are separate as they may involve a lot more work + to deal with linker stubs. */ + case R_PARISC_PLABEL32: + case R_PARISC_PLABEL21L: + case R_PARISC_PLABEL14R: + case R_PARISC_PCREL17F: + { + bfd_vma location; + unsigned int len, caller_args, callee_args; + arg_reloc_type arg_reloc_types[5]; + struct elf32_hppa_args_hash_table *args_hash_table; + struct elf32_hppa_args_hash_entry *args_hash; + char *new_name, *stub_name; + + /* Get the field selector right. We'll need it in a minute. */ + if (r_type == R_PARISC_PCREL17F + || r_type == R_PARISC_PLABEL32) + r_field = e_fsel; + else if (r_type == R_PARISC_PLABEL21L) + r_field = e_lrsel; + else if (r_type == R_PARISC_PLABEL14R) + r_field = e_rrsel; + + /* Find out where we are and where we're going. */ + location = (offset + + input_section->output_offset + + input_section->output_section->vma); + + /* Now look for the argument relocation bits associated with the + target. */ + len = strlen (sym_name) + 1; + if (is_local) + len += 9; + new_name = bfd_malloc (len); + if (!new_name) + return bfd_reloc_notsupported; + strcpy (new_name, sym_name); + + /* Local symbols have unique IDs. */ + if (is_local) + sprintf (new_name + len - 10, "_%08x", (int)sym_sec); + + args_hash_table = elf32_hppa_hash_table (info)->args_hash_table; + + args_hash = elf32_hppa_args_hash_lookup (args_hash_table, + new_name, false, false); + if (args_hash == NULL) + callee_args = 0; + else + callee_args = args_hash->arg_bits; + + /* If this is a CALL relocation, then get the caller's bits + from the addend. Else use the magic 0x155 value for PLABELS. + + Also we don't care about the destination (value) for PLABELS. */ + if (r_type == R_PARISC_PCREL17F) + caller_args = HPPA_R_ARG_RELOC (addend); + else + { + caller_args = 0x155; + location = value; + } + + /* Any kind of linker stub needed? */ + if (((int)(value - location) > 0x3ffff) + || ((int)(value - location) < (int)0xfffc0000) + || elf32_hppa_arg_reloc_needed (caller_args, callee_args, + arg_reloc_types)) + { + struct elf32_hppa_stub_hash_table *stub_hash_table; + struct elf32_hppa_stub_hash_entry *stub_hash; + asection *stub_section; + + /* Build a name for the stub. */ + + len = strlen (new_name); + len += 23; + stub_name = bfd_malloc (len); + if (!stub_name) + return bfd_reloc_notsupported; + elf32_hppa_name_of_stub (caller_args, callee_args, + location, value, stub_name); + strcat (stub_name, new_name); + free (new_name); + + stub_hash_table = elf32_hppa_hash_table (info)->stub_hash_table; + + stub_hash + = elf32_hppa_stub_hash_lookup (stub_hash_table, stub_name, + false, false); + + /* We're done with that name. */ + free (stub_name); + + /* The stub BFD only has one section. */ + stub_section = stub_hash_table->stub_bfd->sections; + + if (stub_hash != NULL) + { + + if (r_type == R_PARISC_PCREL17F) + { + unsigned long delay_insn; + unsigned int opcode, rtn_reg, ldo_target_reg, ldo_src_reg; + + /* We'll need to peek at the next insn. */ + delay_insn = bfd_get_32 (input_bfd, hit_data + 4); + opcode = get_opcode (delay_insn); + + /* We also need to know the return register for this + call. */ + rtn_reg = (insn & 0x03e00000) >> 21; + + ldo_src_reg = (delay_insn & 0x03e00000) >> 21; + ldo_target_reg = (delay_insn & 0x001f0000) >> 16; + + /* Munge up the value and other parameters for + hppa_elf_relocate_insn. */ + + value = (stub_hash->offset + + stub_section->output_offset + + stub_section->output_section->vma); + + r_format = 17; + r_field = e_fsel; + r_pcrel = 0; + addend = 0; + + /* We need to peek at the delay insn and determine if + we'll need to swap the branch and its delay insn. */ + if ((insn & 2) + || (opcode == LDO + && ldo_target_reg == rtn_reg) + || (delay_insn == 0x08000240)) + { + /* No need to swap the branch and its delay slot, but + we do need to make sure to jump past the return + pointer update in the stub. */ + value += 4; + + /* If the delay insn does a return pointer adjustment, + then we have to make sure it stays valid. */ + if (opcode == LDO + && ldo_target_reg == rtn_reg) + { + delay_insn &= 0xfc00ffff; + delay_insn |= ((31 << 21) | (31 << 16)); + bfd_put_32 (input_bfd, delay_insn, hit_data + 4); + } + /* Use a BLE to reach the stub. */ + insn = BLE_SR4_R0; + } + else + { + /* Wonderful, we have to swap the call insn and its + delay slot. */ + bfd_put_32 (input_bfd, delay_insn, hit_data); + /* Use a BLE,n to reach the stub. */ + insn = (BLE_SR4_R0 | 0x2); + bfd_put_32 (input_bfd, insn, hit_data + 4); + insn = hppa_elf_relocate_insn (input_bfd, + input_section, + insn, offset + 4, + value, addend, + r_format, r_field, + r_pcrel); + /* Update the instruction word. */ + bfd_put_32 (input_bfd, insn, hit_data + 4); + return bfd_reloc_dangerous; + } + } + else + { + /* PLABEL stuff is easy. */ + + value = (stub_hash->offset + + stub_section->output_offset + + stub_section->output_section->vma); + /* We don't need the RP adjustment for PLABELs. */ + value += 4; + if (r_type == R_PARISC_PLABEL32) + r_format = 32; + else if (r_type == R_PARISC_PLABEL21L) + r_format = 21; + else if (r_type == R_PARISC_PLABEL14R) + r_format = 14; + + r_pcrel = 0; + addend = 0; + } + } + else + return bfd_reloc_notsupported; + } + goto do_basic_type_1; + } + +do_basic_type_1: + insn = hppa_elf_relocate_insn (input_bfd, input_section, insn, + offset, value, addend, r_format, + r_field, r_pcrel); + break; + + /* Something we don't know how to handle. */ + default: + return bfd_reloc_notsupported; + } + + /* Update the instruction word. */ + bfd_put_32 (input_bfd, insn, hit_data); + return (bfd_reloc_ok); +} + +/* Return the address of the howto table entry to perform the CODE + relocation for an ARCH machine. */ + +static reloc_howto_type * +elf_hppa_reloc_type_lookup (abfd, code) + bfd *abfd; + bfd_reloc_code_real_type code; +{ + if ((int) code < (int) R_PARISC_UNIMPLEMENTED) + { + BFD_ASSERT ((int) elf_hppa_howto_table[(int) code].type == (int) code); + return &elf_hppa_howto_table[(int) code]; + } + return NULL; +} + +/* Return true if SYM represents a local label symbol. */ + +static boolean +hppa_elf_is_local_label_name (abfd, name) + bfd *abfd; + const char *name; +{ + return (name[0] == 'L' && name[1] == '$'); +} + +/* Do any backend specific processing when beginning to write an object + file. For PA ELF we need to determine the size of the symbol extension + section *before* any other output processing happens. */ + +static void +elf32_hppa_backend_begin_write_processing (abfd, info) + bfd *abfd; + struct bfd_link_info *info; +{ + unsigned int i; + asection *symextn_sec; + + /* Size up the symbol extension section. */ + if ((abfd->outsymbols == NULL + && info == NULL) + || symext_chain_size != 0) + return; + + if (info == NULL) + { + /* We were not called from the BFD ELF linker code, so we need + to examine the output BFD's outsymbols. + + Note we can not build the symbol extensions now as the symbol + map hasn't been set up. */ + for (i = 0; i < abfd->symcount; i++) + { + elf_symbol_type *symbol = (elf_symbol_type *)abfd->outsymbols[i]; + + /* Only functions ever need an entry in the symbol extension + section. */ + if (!(symbol->symbol.flags & BSF_FUNCTION)) + continue; + + /* And only if they specify the locations of their arguments. */ + if (symbol->tc_data.hppa_arg_reloc == 0) + continue; + + /* Yup. This function symbol needs an entry. */ + symext_chain_size += 2 * ELF32_PARISC_SX_SIZE; + } + } + else if (info->relocateable == true) + { + struct elf32_hppa_args_hash_table *table; + table = elf32_hppa_hash_table (info)->args_hash_table; + + /* Determine the size of the symbol extension section. */ + elf32_hppa_args_hash_traverse (table, + elf32_hppa_size_symext, + &symext_chain_size); + } + + /* Now create the section and set its size. We'll fill in the + contents later. */ + symextn_sec = bfd_get_section_by_name (abfd, SYMEXTN_SECTION_NAME); + if (symextn_sec == NULL) + symextn_sec = bfd_make_section (abfd, SYMEXTN_SECTION_NAME); + + bfd_set_section_flags (abfd, symextn_sec, + SEC_LOAD | SEC_HAS_CONTENTS | SEC_DATA); + symextn_sec->output_section = symextn_sec; + symextn_sec->output_offset = 0; + bfd_set_section_alignment (abfd, symextn_sec, 2); + bfd_set_section_size (abfd, symextn_sec, symext_chain_size); +} + +/* Called for each entry in the args location hash table. For each + entry we bump the size pointer by 2 records (16 bytes). */ + +static boolean +elf32_hppa_size_symext (gen_entry, in_args) + struct bfd_hash_entry *gen_entry; + PTR in_args; +{ + bfd_size_type *sizep = (bfd_size_type *)in_args; + + *sizep += 2 * ELF32_PARISC_SX_SIZE; + return true; +} + +/* Backend routine called by the linker for each output symbol. + + For PA ELF we use this opportunity to add an appropriate entry + to the symbol extension chain for function symbols. */ + +static boolean +elf32_hppa_link_output_symbol_hook (abfd, info, name, sym, section) + bfd *abfd; + struct bfd_link_info *info; + const char *name; + Elf_Internal_Sym *sym; + asection *section; +{ + char *new_name; + unsigned int len, index; + struct elf32_hppa_args_hash_table *args_hash_table; + struct elf32_hppa_args_hash_entry *args_hash; + + /* If the args hash table is NULL, then we've encountered an error + of some sorts (for example, an undefined symbol). In that case + we've got nothing else to do. + + NOTE: elf_link_output_symbol will abort if we return false here! */ + if (elf32_hppa_hash_table (info)->args_hash_table == NULL) + return true; + + index = elf32_hppa_hash_table (info)->output_symbol_count++; + + /* We need to look up this symbol in the args hash table to see if + it has argument relocation bits. */ + if (ELF_ST_TYPE (sym->st_info) != STT_FUNC) + return true; + + /* We know it's a function symbol of some kind. */ + len = strlen (name) + 1; + if (ELF_ST_BIND (sym->st_info) == STB_LOCAL) + len += 9; + + new_name = bfd_malloc (len); + if (new_name == NULL) + return false; + + strcpy (new_name, name); + if (ELF_ST_BIND (sym->st_info) == STB_LOCAL) + sprintf (new_name + len - 10, "_%08x", (int)section); + + /* Now that we have the unique name, we can look it up in the + args hash table. */ + args_hash_table = elf32_hppa_hash_table (info)->args_hash_table; + args_hash = elf32_hppa_args_hash_lookup (args_hash_table, new_name, + false, false); + free (new_name); + if (args_hash == NULL) + return true; + + /* We know this symbol has arg reloc bits. */ + add_entry_to_symext_chain (abfd, args_hash->arg_bits, + index, &symext_rootP, &symext_lastP); + return true; +} + +/* Perform any processing needed late in the object file writing process. + For PA ELF we build and set the contents of the symbol extension + section. */ + +static void +elf32_hppa_backend_final_write_processing (abfd, linker) + bfd *abfd; + boolean linker; +{ + asection *symextn_sec; + unsigned int i; + + /* Now build the symbol extension section. */ + if (symext_chain_size == 0) + return; + + if (! linker) + { + /* We were not called from the backend linker, so we still need + to build the symbol extension chain. + + Look at each symbol, adding the appropriate information to the + symbol extension section list as necessary. */ + for (i = 0; i < abfd->symcount; i++) + { + elf_symbol_type *symbol = (elf_symbol_type *) abfd->outsymbols[i]; + + /* Only functions ever need an entry in the symbol extension + section. */ + if (!(symbol->symbol.flags & BSF_FUNCTION)) + continue; + + /* And only if they specify the locations of their arguments. */ + if (symbol->tc_data.hppa_arg_reloc == 0) + continue; + + /* Add this symbol's information to the chain. */ + add_entry_to_symext_chain (abfd, symbol->tc_data.hppa_arg_reloc, + symbol->symbol.udata.i, &symext_rootP, + &symext_lastP); + } + } + + /* Now fill in the contents of the symbol extension section. */ + elf_hppa_tc_make_sections (abfd, symext_rootP); + + /* And attach that as the section's contents. */ + symextn_sec = bfd_get_section_by_name (abfd, SYMEXTN_SECTION_NAME); + if (symextn_sec == (asection *) 0) + abort(); + + symextn_sec->contents = (void *)symextn_contents; + + bfd_set_section_contents (abfd, symextn_sec, symextn_sec->contents, + symextn_sec->output_offset, symextn_sec->_raw_size); +} + +/* Update the symbol extention chain to include the symbol pointed to + by SYMBOLP if SYMBOLP is a function symbol. Used internally and by GAS. */ + +static void +add_entry_to_symext_chain (abfd, arg_reloc, sym_idx, symext_root, symext_last) + bfd *abfd; + unsigned int arg_reloc; + unsigned int sym_idx; + symext_chainS **symext_root; + symext_chainS **symext_last; +{ + symext_chainS *symextP; + + /* Allocate memory and initialize this entry. */ + symextP = (symext_chainS *) bfd_alloc (abfd, sizeof (symext_chainS) * 2); + if (!symextP) + abort(); /* FIXME */ + + symextP[0].entry = ELF32_PARISC_SX_WORD (PARISC_SXT_SYMNDX, sym_idx); + symextP[0].next = &symextP[1]; + + symextP[1].entry = ELF32_PARISC_SX_WORD (PARISC_SXT_ARG_RELOC, arg_reloc); + symextP[1].next = NULL; + + /* Now update the chain itself so it can be walked later to build + the symbol extension section. */ + if (*symext_root == NULL) + { + *symext_root = &symextP[0]; + *symext_last = &symextP[1]; + } + else + { + (*symext_last)->next = &symextP[0]; + *symext_last = &symextP[1]; + } +} + +/* Build the symbol extension section. */ + +static void +elf_hppa_tc_make_sections (abfd, symext_root) + bfd *abfd; + symext_chainS *symext_root; +{ + symext_chainS *symextP; + unsigned int i; + asection *symextn_sec; + + symextn_sec = bfd_get_section_by_name (abfd, SYMEXTN_SECTION_NAME); + + /* Grab some memory for the contents of the symbol extension section + itself. */ + symextn_contents = (bfd_byte *) bfd_zalloc (abfd, + symextn_sec->_raw_size); + if (!symextn_contents) + abort(); /* FIXME */ + + /* Fill in the contents of the symbol extension chain. */ + for (i = 0, symextP = symext_root; symextP; symextP = symextP->next, ++i) + ELF32_PARISC_SX_PUT (abfd, (bfd_vma) symextP->entry, + symextn_contents + i * ELF32_PARISC_SX_SIZE); + + return; +} + +/* Do some PA ELF specific work after reading in the symbol table. + In particular attach the argument relocation from the + symbol extension section to the appropriate symbols. */ + +static boolean +elf32_hppa_backend_symbol_table_processing (abfd, esyms,symcnt) + bfd *abfd; + elf_symbol_type *esyms; + unsigned int symcnt; +{ + Elf32_Internal_Shdr *symextn_hdr = + bfd_elf_find_section (abfd, SYMEXTN_SECTION_NAME); + unsigned int i, current_sym_idx = 0; + + /* If no symbol extension existed, then all symbol extension information + is assumed to be zero. */ + if (symextn_hdr == NULL) + { + for (i = 0; i < symcnt; i++) + esyms[i].tc_data.hppa_arg_reloc = 0; + return (true); + } + + /* FIXME: Why not use bfd_get_section_contents here? Also should give + memory back when we're done. */ + /* Allocate a buffer of the appropriate size for the symextn section. */ + symextn_hdr->contents = bfd_zalloc(abfd,symextn_hdr->sh_size); + if (!symextn_hdr->contents) + return false; + + /* Read in the symextn section. */ + if (bfd_seek (abfd, symextn_hdr->sh_offset, SEEK_SET) == -1) + return false; + if (bfd_read ((PTR) symextn_hdr->contents, 1, symextn_hdr->sh_size, abfd) + != symextn_hdr->sh_size) + return false; + + /* Parse entries in the symbol extension section, updating the symtab + entries as we go */ + for (i = 0; i < symextn_hdr->sh_size / ELF32_PARISC_SX_SIZE; i++) + { + symext_entryS se = + ELF32_PARISC_SX_GET (abfd, + ((unsigned char *)symextn_hdr->contents + + i * ELF32_PARISC_SX_SIZE)); + unsigned int se_value = ELF32_PARISC_SX_VAL (se); + unsigned int se_type = ELF32_PARISC_SX_TYPE (se); + + switch (se_type) + { + case PARISC_SXT_NULL: + break; + + case PARISC_SXT_SYMNDX: + if (se_value >= symcnt) + { + bfd_set_error (bfd_error_bad_value); + return (false); + } + current_sym_idx = se_value - 1; + break; + + case PARISC_SXT_ARG_RELOC: + esyms[current_sym_idx].tc_data.hppa_arg_reloc = se_value; + break; + + default: + bfd_set_error (bfd_error_bad_value); + return (false); + } + } + return (true); +} + +/* Read and attach the symbol extension information for the symbols + in INPUT_BFD to the argument location hash table. Handle locals + if DO_LOCALS is true; likewise for globals when DO_GLOBALS is true. */ + +static boolean +elf32_hppa_read_symext_info (input_bfd, symtab_hdr, args_hash_table, local_syms) + bfd *input_bfd; + Elf_Internal_Shdr *symtab_hdr; + struct elf32_hppa_args_hash_table *args_hash_table; + Elf_Internal_Sym *local_syms; +{ + asection *symextn_sec; + bfd_byte *contents; + unsigned int i, n_entries, current_index = 0; + + /* Get the symbol extension section for this BFD. If no section exists + then there's nothing to do. Likewise if the section exists, but + has no contents. */ + symextn_sec = bfd_get_section_by_name (input_bfd, SYMEXTN_SECTION_NAME); + if (symextn_sec == NULL) + return true; + + /* Done separately so we can turn off SEC_HAS_CONTENTS (see below). */ + if (symextn_sec->_raw_size == 0) + { + symextn_sec->flags &= ~SEC_HAS_CONTENTS; + return true; + } + + contents = (bfd_byte *) bfd_malloc ((size_t) symextn_sec->_raw_size); + if (contents == NULL) + return false; + + /* How gross. We turn off SEC_HAS_CONTENTS for the input symbol extension + sections to keep the generic ELF/BFD code from trying to do anything + with them. We have to undo that hack temporarily so that we can read + in the contents with the generic code. */ + symextn_sec->flags |= SEC_HAS_CONTENTS; + if (bfd_get_section_contents (input_bfd, symextn_sec, contents, + 0, symextn_sec->_raw_size) == false) + { + symextn_sec->flags &= ~SEC_HAS_CONTENTS; + free (contents); + return false; + } + + /* Gross. Turn off SEC_HAS_CONTENTS for the input symbol extension + sections (see above). */ + symextn_sec->flags &= ~SEC_HAS_CONTENTS; + + n_entries = symextn_sec->_raw_size / ELF32_PARISC_SX_SIZE; + for (i = 0; i < n_entries; i++) + { + symext_entryS entry = + ELF32_PARISC_SX_GET (input_bfd, contents + i * ELF32_PARISC_SX_SIZE); + unsigned int value = ELF32_PARISC_SX_VAL (entry); + unsigned int type = ELF32_PARISC_SX_TYPE (entry); + struct elf32_hppa_args_hash_entry *args_hash; + + switch (type) + { + case PARISC_SXT_NULL: + break; + + case PARISC_SXT_SYMNDX: + if (value >= symtab_hdr->sh_size / sizeof (Elf32_External_Sym)) + { + bfd_set_error (bfd_error_bad_value); + free (contents); + return false; + } + current_index = value; + break; + + case PARISC_SXT_ARG_RELOC: + if (current_index < symtab_hdr->sh_info) + { + Elf_Internal_Shdr *hdr; + char *new_name; + const char *sym_name; + asection *sym_sec; + unsigned int len; + + hdr = elf_elfsections (input_bfd)[local_syms[current_index].st_shndx]; + sym_sec = hdr->bfd_section; + sym_name = bfd_elf_string_from_elf_section (input_bfd, + symtab_hdr->sh_link, + local_syms[current_index].st_name); + len = strlen (sym_name) + 10; + new_name = bfd_malloc (len); + if (new_name == NULL) + { + free (contents); + return false; + } + strcpy (new_name, sym_name); + sprintf (new_name + len - 10, "_%08x", (int)sym_sec); + + /* This is a global symbol with argument location info. + We need to enter it into the hash table. */ + args_hash = elf32_hppa_args_hash_lookup (args_hash_table, + new_name, true, + true); + free (new_name); + if (args_hash == NULL) + { + free (contents); + return false; + } + args_hash->arg_bits = value; + break; + } + else if (current_index >= symtab_hdr->sh_info) + { + struct elf_link_hash_entry *h; + + current_index -= symtab_hdr->sh_info; + h = elf_sym_hashes(input_bfd)[current_index]; + /* This is a global symbol with argument location + information. We need to enter it into the hash table. */ + args_hash = elf32_hppa_args_hash_lookup (args_hash_table, + h->root.root.string, + true, true); + if (args_hash == NULL) + { + bfd_set_error (bfd_error_bad_value); + free (contents); + return false; + } + args_hash->arg_bits = value; + break; + } + else + break; + + default: + bfd_set_error (bfd_error_bad_value); + free (contents); + return false; + } + } + free (contents); + return true; +} + +/* Undo the generic ELF code's subtraction of section->vma from the + value of each external symbol. */ + +static boolean +elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp) + bfd *abfd; + struct bfd_link_info *info; + const Elf_Internal_Sym *sym; + const char **namep; + flagword *flagsp; + asection **secp; + bfd_vma *valp; +{ + *valp += (*secp)->vma; + return true; +} + +/* Determine the name of the stub needed to perform a call assuming the + argument relocation bits for caller and callee are in CALLER and CALLEE + for a call from LOCATION to DESTINATION. Copy the name into STUB_NAME. */ + +static void +elf32_hppa_name_of_stub (caller, callee, location, destination, stub_name) + unsigned int caller, callee; + bfd_vma location, destination; + char *stub_name; +{ + arg_reloc_type arg_reloc_types[5]; + + if (elf32_hppa_arg_reloc_needed (caller, callee, arg_reloc_types)) + { + arg_reloc_location i; + /* Fill in the basic template. */ + strcpy (stub_name, "__XX_XX_XX_XX_XX_stub_"); + + /* Now fix the specifics. */ + for (i = ARG0; i <= RET; i++) + switch (arg_reloc_types[i]) + { + case NO: + stub_name[3 * i + 2] = 'N'; + stub_name[3 * i + 3] = 'O'; + break; + case GF: + stub_name[3 * i + 2] = 'G'; + stub_name[3 * i + 3] = 'F'; + break; + case FG: + stub_name[3 * i + 2] = 'F'; + stub_name[3 * i + 3] = 'G'; + break; + case GD: + stub_name[3 * i + 2] = 'G'; + stub_name[3 * i + 3] = 'D'; + break; + case DG: + stub_name[3 * i + 2] = 'D'; + stub_name[3 * i + 3] = 'G'; + break; + } + } + else + strcpy (stub_name, "_____long_branch_stub_"); +} + +/* Determine if an argument relocation stub is needed to perform a + call assuming the argument relocation bits for caller and callee + are in CALLER and CALLEE. Place the type of relocations (if any) + into stub_types_p. */ + +static boolean +elf32_hppa_arg_reloc_needed (caller, callee, stub_types) + unsigned int caller, callee; + arg_reloc_type stub_types[5]; +{ + /* Special case for no relocations. */ + if (caller == 0 || callee == 0) + return 0; + else + { + arg_location caller_loc[5]; + arg_location callee_loc[5]; + + /* Extract the location information for the argument and return + value on both the caller and callee sides. */ + caller_loc[ARG0] = EXTRACT_ARBITS (caller, ARG0); + callee_loc[ARG0] = EXTRACT_ARBITS (callee, ARG0); + caller_loc[ARG1] = EXTRACT_ARBITS (caller, ARG1); + callee_loc[ARG1] = EXTRACT_ARBITS (callee, ARG1); + caller_loc[ARG2] = EXTRACT_ARBITS (caller, ARG2); + callee_loc[ARG2] = EXTRACT_ARBITS (callee, ARG2); + caller_loc[ARG3] = EXTRACT_ARBITS (caller, ARG3); + callee_loc[ARG3] = EXTRACT_ARBITS (callee, ARG3); + caller_loc[RET] = EXTRACT_ARBITS (caller, RET); + callee_loc[RET] = EXTRACT_ARBITS (callee, RET); + + /* Check some special combinations. This is necessary to + deal with double precision FP arguments. */ + if (caller_loc[ARG0] == AR_FU || caller_loc[ARG1] == AR_FU) + { + caller_loc[ARG0] = AR_FPDBL1; + caller_loc[ARG1] = AR_NO; + } + if (caller_loc[ARG2] == AR_FU || caller_loc[ARG3] == AR_FU) + { + caller_loc[ARG2] = AR_FPDBL2; + caller_loc[ARG3] = AR_NO; + } + if (callee_loc[ARG0] == AR_FU || callee_loc[ARG1] == AR_FU) + { + callee_loc[ARG0] = AR_FPDBL1; + callee_loc[ARG1] = AR_NO; + } + if (callee_loc[ARG2] == AR_FU || callee_loc[ARG3] == AR_FU) + { + callee_loc[ARG2] = AR_FPDBL2; + callee_loc[ARG3] = AR_NO; + } + + /* Now look up any relocation needed for each argument and the + return value. */ + stub_types[ARG0] = arg_mismatches[caller_loc[ARG0]][callee_loc[ARG0]]; + stub_types[ARG1] = arg_mismatches[caller_loc[ARG1]][callee_loc[ARG1]]; + stub_types[ARG2] = arg_mismatches[caller_loc[ARG2]][callee_loc[ARG2]]; + stub_types[ARG3] = arg_mismatches[caller_loc[ARG3]][callee_loc[ARG3]]; + stub_types[RET] = ret_mismatches[caller_loc[RET]][callee_loc[RET]]; + + return (stub_types[ARG0] != NO + || stub_types[ARG1] != NO + || stub_types[ARG2] != NO + || stub_types[ARG3] != NO + || stub_types[RET] != NO); + } +} + +/* Compute the size of the stub needed to call from LOCATION to DESTINATION + (a function named SYM_NAME), with argument relocation bits CALLER and + CALLEE. Return zero if no stub is needed to perform such a call. */ + +static unsigned int +elf32_hppa_size_of_stub (callee, caller, location, destination, sym_name) + unsigned int callee, caller; + bfd_vma location, destination; + const char *sym_name; +{ + arg_reloc_type arg_reloc_types[5]; + + /* Determine if a long branch or argument relocation stub is needed. + If an argument relocation stub is needed, the relocation will be + stored into arg_reloc_types. */ + if (!(((int)(location - destination) > 0x3ffff) + || ((int)(location - destination) < (int)0xfffc0000) + || elf32_hppa_arg_reloc_needed (caller, callee, arg_reloc_types))) + return 0; + + /* Some kind of stub is needed. Determine how big it needs to be. + First check for argument relocation stubs as they also handle + long calls. Then check for long calls to millicode and finally + the normal long calls. */ + if (arg_reloc_types[ARG0] != NO + || arg_reloc_types[ARG1] != NO + || arg_reloc_types[ARG2] != NO + || arg_reloc_types[ARG3] != NO + || arg_reloc_types[RET] != NO) + { + /* Some kind of argument relocation stub is needed. */ + unsigned int len = 16; + arg_reloc_location i; + + /* Each GR or FG relocation takes 2 insns, each GD or DG + relocation takes 3 insns. Plus 4 more insns for the + RP adjustment, ldil & (be | ble) and copy. */ + for (i = ARG0; i <= RET; i++) + switch (arg_reloc_types[i]) + { + case GF: + case FG: + len += 8; + break; + + case GD: + case DG: + len += 12; + break; + + default: + break; + } + + /* Extra instructions are needed if we're relocating a return value. */ + if (arg_reloc_types[RET] != NO) + len += 12; + + return len; + } + else if (!strncmp ("$$", sym_name, 2) + && strcmp ("$$dyncall", sym_name)) + return 12; + else + return 16; +} + +/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY. + IN_ARGS contains the stub BFD and link info pointers. */ + +static boolean +elf32_hppa_build_one_stub (gen_entry, in_args) + struct bfd_hash_entry *gen_entry; + PTR in_args; +{ + void **args = (void **)in_args; + bfd *stub_bfd = (bfd *)args[0]; + struct bfd_link_info *info = (struct bfd_link_info *)args[1]; + struct elf32_hppa_stub_hash_entry *entry; + struct elf32_hppa_stub_hash_table *stub_hash_table; + bfd_byte *loc; + symvalue sym_value; + const char *sym_name; + + /* Initialize pointers to the stub hash table, the particular entry we + are building a stub for, and where (in memory) we should place the stub + instructions. */ + entry = (struct elf32_hppa_stub_hash_entry *)gen_entry; + stub_hash_table = elf32_hppa_hash_table(info)->stub_hash_table; + loc = stub_hash_table->location; + + /* Make a note of the offset within the stubs for this entry. */ + entry->offset = stub_hash_table->offset; + + /* The symbol's name starts at offset 22. */ + sym_name = entry->root.string + 22; + + sym_value = (entry->target_value + + entry->target_section->output_offset + + entry->target_section->output_section->vma); + + if (strncmp ("_____long_branch_stub_", entry->root.string, 22)) + { + /* This must be an argument or return value relocation stub. */ + unsigned long insn; + arg_reloc_location i; + bfd_byte *begin_loc = loc; + + /* First the return pointer adjustment. Depending on exact calling + sequence this instruction may be skipped. */ + bfd_put_32 (stub_bfd, LDO_M4_R31_R31, loc); + loc += 4; + + /* If we are relocating a return value, then we're going to have + to return into the stub. So we have to save off the user's + return pointer into the stack at RP'. */ + if (strncmp (entry->root.string + 14, "NO", 2)) + { + bfd_put_32 (stub_bfd, STW_R31_M8R30, loc); + loc += 4; + } + + /* Iterate over the argument relocations, emitting instructions + to move them around as necessary. */ + for (i = ARG0; i <= ARG3; i++) + { + if (!strncmp (entry->root.string + 3 * i + 2, "GF", 2)) + { + bfd_put_32 (stub_bfd, STW_ARG_M16R30 | ((26 - i) << 16), loc); + bfd_put_32 (stub_bfd, FLDW_M16R30_FARG | (4 + i), loc + 4); + loc += 8; + } + else if (!strncmp (entry->root.string + 3 * i + 2, "FG", 2)) + { + bfd_put_32 (stub_bfd, FSTW_FARG_M16R30 | (4 + i), loc); + bfd_put_32 (stub_bfd, LDW_M16R30_ARG | ((26 - i) << 16), loc + 4); + loc += 8; + } + else if (!strncmp (entry->root.string + 3 * i + 2, "GD", 2)) + { + bfd_put_32 (stub_bfd, STW_ARG_M12R30 | ((26 - i) << 16), loc); + bfd_put_32 (stub_bfd, STW_ARG_M16R30 | ((25 - i) << 16), loc + 4); + bfd_put_32 (stub_bfd, FLDD_M16R30_FARG | (5 + i), loc + 8); + loc += 12; + } + else if (!strncmp (entry->root.string + 3 * i + 2, "DG", 2)) + { + bfd_put_32 (stub_bfd, FSTD_FARG_M16R30 | (5 + i), loc); + bfd_put_32 (stub_bfd, LDW_M12R30_ARG | ((26 - i) << 16), loc + 4); + bfd_put_32 (stub_bfd, LDW_M16R30_ARG | ((25 - i) << 16), loc + 8); + loc += 12; + } + } + + /* Load the high bits of the target address into %r1. */ + insn = hppa_rebuild_insn (stub_bfd, LDIL_R1, + hppa_field_adjust (sym_value, 0, e_lrsel), 21); + bfd_put_32 (stub_bfd, insn, loc); + loc += 4; + + /* If we are relocating a return value, then we're going to have + to return into the stub, then perform the return value relocation. */ + if (strncmp (entry->root.string + 14, "NO", 2)) + { + /* To return to the stub we "ble" to the target and copy the return + pointer from %r31 into %r2. */ + insn = hppa_rebuild_insn (stub_bfd, + BLE_SR4_R1, + hppa_field_adjust (sym_value, 0, + e_rrsel) >> 2, + 17); + bfd_put_32 (stub_bfd, insn, loc); + bfd_put_32 (stub_bfd, COPY_R31_R2, loc + 4); + + /* Reload the return pointer for our caller from the stack. */ + bfd_put_32 (stub_bfd, LDW_M8R30_R31, loc + 8); + loc += 12; + + /* Perform the return value relocation. */ + if (!strncmp (entry->root.string + 14, "GF", 2)) + { + bfd_put_32 (stub_bfd, STW_ARG_M16R30 | (28 << 16), loc); + bfd_put_32 (stub_bfd, FLDW_M16R30_FARG | 4, loc + 4); + loc += 8; + } + else if (!strncmp (entry->root.string + 14, "FG", 2)) + { + bfd_put_32 (stub_bfd, FSTW_FARG_M16R30 | 4, loc); + bfd_put_32 (stub_bfd, LDW_M16R30_ARG | (28 << 16), loc + 4); + loc += 8; + } + else if (!strncmp (entry->root.string + 2, "GD", 2)) + { + bfd_put_32 (stub_bfd, STW_ARG_M12R30 | (28 << 16), loc); + bfd_put_32 (stub_bfd, STW_ARG_M16R30 | (29 << 16), loc + 4); + bfd_put_32 (stub_bfd, FLDD_M16R30_FARG | 4, loc + 8); + loc += 12; + } + else if (!strncmp (entry->root.string + 2, "DG", 2)) + { + bfd_put_32 (stub_bfd, FSTD_FARG_M16R30 | 4, loc); + bfd_put_32 (stub_bfd, LDW_M12R30_ARG | (28 << 16), loc + 4); + bfd_put_32 (stub_bfd, LDW_M16R30_ARG | (29 << 16), loc + 8); + loc += 12; + } + /* Branch back to the user's code now. */ + bfd_put_32 (stub_bfd, BV_N_0_R31, loc); + loc += 4; + } + else + { + /* No return value relocation, so we can simply "be" to the + target and copy out return pointer into %r2. */ + insn = hppa_rebuild_insn (stub_bfd, BE_SR4_R1, + hppa_field_adjust (sym_value, 0, + e_rrsel) >> 2, 17); + bfd_put_32 (stub_bfd, insn, loc); + bfd_put_32 (stub_bfd, COPY_R31_R2, loc + 4); + loc += 8; + } + + /* Update the location and offsets. */ + stub_hash_table->location += (loc - begin_loc); + stub_hash_table->offset += (loc - begin_loc); + } + else + { + /* Create one of two variant long branch stubs. One for $$dyncall and + normal calls, the other for calls to millicode. */ + unsigned long insn; + int millicode_call = 0; + + if (!strncmp ("$$", sym_name, 2) && strcmp ("$$dyncall", sym_name)) + millicode_call = 1; + + /* First the return pointer adjustment. Depending on exact calling + sequence this instruction may be skipped. */ + bfd_put_32 (stub_bfd, LDO_M4_R31_R31, loc); + + /* The next two instructions are the long branch itself. A long branch + is formed with "ldil" loading the upper bits of the target address + into a register, then branching with "be" which adds in the lower bits. + Long branches to millicode nullify the delay slot of the "be". */ + insn = hppa_rebuild_insn (stub_bfd, LDIL_R1, + hppa_field_adjust (sym_value, 0, e_lrsel), 21); + bfd_put_32 (stub_bfd, insn, loc + 4); + insn = hppa_rebuild_insn (stub_bfd, BE_SR4_R1 | (millicode_call ? 2 : 0), + hppa_field_adjust (sym_value, 0, e_rrsel) >> 2, + 17); + bfd_put_32 (stub_bfd, insn, loc + 8); + + if (!millicode_call) + { + /* The sequence to call this stub places the return pointer into %r31, + the final target expects the return pointer in %r2, so copy the + return pointer into the proper register. */ + bfd_put_32 (stub_bfd, COPY_R31_R2, loc + 12); + + /* Update the location and offsets. */ + stub_hash_table->location += 16; + stub_hash_table->offset += 16; + } + else + { + /* Update the location and offsets. */ + stub_hash_table->location += 12; + stub_hash_table->offset += 12; + } + + } + return true; +} + +/* External entry points for sizing and building linker stubs. */ + +/* Build all the stubs associated with the current output file. The + stubs are kept in a hash table attached to the main linker hash + table. This is called via hppaelf_finish in the linker. */ + +boolean +elf32_hppa_build_stubs (stub_bfd, info) + bfd *stub_bfd; + struct bfd_link_info *info; +{ + /* The stub BFD only has one section. */ + asection *stub_sec = stub_bfd->sections; + struct elf32_hppa_stub_hash_table *table; + unsigned int size; + void *args[2]; + + /* So we can pass both the BFD for the stubs and the link info + structure to the routine which actually builds stubs. */ + args[0] = stub_bfd; + args[1] = info; + + /* Allocate memory to hold the linker stubs. */ + size = bfd_section_size (stub_bfd, stub_sec); + stub_sec->contents = (unsigned char *) bfd_zalloc (stub_bfd, size); + if (stub_sec->contents == NULL) + return false; + table = elf32_hppa_hash_table(info)->stub_hash_table; + table->location = stub_sec->contents; + + /* Build the stubs as directed by the stub hash table. */ + elf32_hppa_stub_hash_traverse (table, elf32_hppa_build_one_stub, args); + + return true; +} + +/* Determine and set the size of the stub section for a final link. + + The basic idea here is to examine all the relocations looking for + PC-relative calls to a target that is unreachable with a "bl" + instruction or calls where the caller and callee disagree on the + location of their arguments or return value. */ + +boolean +elf32_hppa_size_stubs (stub_bfd, output_bfd, link_info) + bfd *stub_bfd; + bfd *output_bfd; + struct bfd_link_info *link_info; +{ + bfd *input_bfd; + asection *section, *stub_sec = 0; + Elf_Internal_Shdr *symtab_hdr; + Elf_Internal_Sym *local_syms, *isym, **all_local_syms; + Elf32_External_Sym *ext_syms, *esym; + unsigned int i, index, bfd_count = 0; + struct elf32_hppa_stub_hash_table *stub_hash_table = 0; + struct elf32_hppa_args_hash_table *args_hash_table = 0; + + /* Create and initialize the stub hash table. */ + stub_hash_table = ((struct elf32_hppa_stub_hash_table *) + bfd_malloc (sizeof (struct elf32_hppa_stub_hash_table))); + if (!stub_hash_table) + goto error_return; + + if (!elf32_hppa_stub_hash_table_init (stub_hash_table, stub_bfd, + elf32_hppa_stub_hash_newfunc)) + goto error_return; + + /* Likewise for the argument location hash table. */ + args_hash_table = ((struct elf32_hppa_args_hash_table *) + bfd_malloc (sizeof (struct elf32_hppa_args_hash_table))); + if (!args_hash_table) + goto error_return; + + if (!elf32_hppa_args_hash_table_init (args_hash_table, + elf32_hppa_args_hash_newfunc)) + goto error_return; + + /* Attach the hash tables to the main hash table. */ + elf32_hppa_hash_table(link_info)->stub_hash_table = stub_hash_table; + elf32_hppa_hash_table(link_info)->args_hash_table = args_hash_table; + + /* Count the number of input BFDs. */ + for (input_bfd = link_info->input_bfds; + input_bfd != NULL; + input_bfd = input_bfd->link_next) + bfd_count++; + + /* We want to read in symbol extension records only once. To do this + we need to read in the local symbols in parallel and save them for + later use; so hold pointers to the local symbols in an array. */ + all_local_syms + = (Elf_Internal_Sym **) bfd_malloc (sizeof (Elf_Internal_Sym *) + * bfd_count); + if (all_local_syms == NULL) + goto error_return; + memset (all_local_syms, 0, sizeof (Elf_Internal_Sym *) * bfd_count); + + /* Walk over all the input BFDs adding entries to the args hash table + for all the external functions. */ + for (input_bfd = link_info->input_bfds, index = 0; + input_bfd != NULL; + input_bfd = input_bfd->link_next, index++) + { + /* We'll need the symbol table in a second. */ + symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr; + if (symtab_hdr->sh_info == 0) + continue; + + /* We need an array of the local symbols attached to the input bfd. + Unfortunately, we're going to have to read & swap them in. */ + local_syms + = (Elf_Internal_Sym *) bfd_malloc (symtab_hdr->sh_info + * sizeof (Elf_Internal_Sym)); + if (local_syms == NULL) + { + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + all_local_syms[index] = local_syms; + + ext_syms + = (Elf32_External_Sym *) bfd_malloc (symtab_hdr->sh_info + * sizeof (Elf32_External_Sym)); + if (ext_syms == NULL) + { + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + + if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0 + || bfd_read (ext_syms, 1, + (symtab_hdr->sh_info + * sizeof (Elf32_External_Sym)), input_bfd) + != (symtab_hdr->sh_info * sizeof (Elf32_External_Sym))) + { + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + free (ext_syms); + goto error_return; + } + + /* Swap the local symbols in. */ + isym = local_syms; + esym = ext_syms; + for (i = 0; i < symtab_hdr->sh_info; i++, esym++, isym++) + bfd_elf32_swap_symbol_in (input_bfd, esym, isym); + + /* Now we can free the external symbols. */ + free (ext_syms); + + if (elf32_hppa_read_symext_info (input_bfd, symtab_hdr, args_hash_table, + local_syms) == false) + { + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + } + + /* Magic as we know the stub bfd only has one section. */ + stub_sec = stub_bfd->sections; + + /* If generating a relocateable output file, then we don't + have to examine the relocs. */ + if (link_info->relocateable) + { + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + return true; + } + + /* Now that we have argument location information for all the global + functions we can start looking for stubs. */ + for (input_bfd = link_info->input_bfds, index = 0; + input_bfd != NULL; + input_bfd = input_bfd->link_next, index++) + { + /* We'll need the symbol table in a second. */ + symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr; + if (symtab_hdr->sh_info == 0) + continue; + + local_syms = all_local_syms[index]; + + /* Walk over each section attached to the input bfd. */ + for (section = input_bfd->sections; + section != NULL; + section = section->next) + { + Elf_Internal_Shdr *input_rel_hdr; + Elf32_External_Rela *external_relocs, *erelaend, *erela; + Elf_Internal_Rela *internal_relocs, *irelaend, *irela; + + /* If there aren't any relocs, then there's nothing to do. */ + if ((section->flags & SEC_RELOC) == 0 + || section->reloc_count == 0) + continue; + + /* Allocate space for the external relocations. */ + external_relocs + = ((Elf32_External_Rela *) + bfd_malloc (section->reloc_count + * sizeof (Elf32_External_Rela))); + if (external_relocs == NULL) + { + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + + /* Likewise for the internal relocations. */ + internal_relocs + = ((Elf_Internal_Rela *) + bfd_malloc (section->reloc_count * sizeof (Elf_Internal_Rela))); + if (internal_relocs == NULL) + { + free (external_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + + /* Read in the external relocs. */ + input_rel_hdr = &elf_section_data (section)->rel_hdr; + if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0 + || bfd_read (external_relocs, 1, input_rel_hdr->sh_size, + input_bfd) != input_rel_hdr->sh_size) + { + free (external_relocs); + free (internal_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + + /* Swap in the relocs. */ + erela = external_relocs; + erelaend = erela + section->reloc_count; + irela = internal_relocs; + for (; erela < erelaend; erela++, irela++) + bfd_elf32_swap_reloca_in (input_bfd, erela, irela); + + /* We're done with the external relocs, free them. */ + free (external_relocs); + + /* Now examine each relocation. */ + irela = internal_relocs; + irelaend = irela + section->reloc_count; + for (; irela < irelaend; irela++) + { + long r_type, callee_args, caller_args, size_of_stub; + unsigned long r_index; + struct elf_link_hash_entry *hash; + struct elf32_hppa_stub_hash_entry *stub_hash; + struct elf32_hppa_args_hash_entry *args_hash; + Elf_Internal_Sym *sym; + asection *sym_sec; + const char *sym_name; + symvalue sym_value; + bfd_vma location, destination; + char *new_name = NULL; + + r_type = ELF32_R_TYPE (irela->r_info); + r_index = ELF32_R_SYM (irela->r_info); + + if (r_type < 0 || r_type >= (int) R_PARISC_UNIMPLEMENTED) + { + bfd_set_error (bfd_error_bad_value); + free (internal_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + + /* Only look for stubs on call instructions or plabel + references. */ + if (r_type != R_PARISC_PCREL17F + && r_type != R_PARISC_PLABEL32 + && r_type != R_PARISC_PLABEL21L + && r_type != R_PARISC_PLABEL14R) + continue; + + /* Now determine the call target, its name, value, section + and argument relocation bits. */ + hash = NULL; + sym = NULL; + sym_sec = NULL; + if (r_index < symtab_hdr->sh_info) + { + /* It's a local symbol. */ + Elf_Internal_Shdr *hdr; + + sym = local_syms + r_index; + hdr = elf_elfsections (input_bfd)[sym->st_shndx]; + sym_sec = hdr->bfd_section; + sym_name = bfd_elf_string_from_elf_section (input_bfd, + symtab_hdr->sh_link, + sym->st_name); + sym_value = (ELF_ST_TYPE (sym->st_info) == STT_SECTION + ? 0 : sym->st_value); + destination = (sym_value + + sym_sec->output_offset + + sym_sec->output_section->vma); + + /* Tack on an ID so we can uniquely identify this local + symbol in the stub or arg info hash tables. */ + new_name = bfd_malloc (strlen (sym_name) + 10); + if (new_name == 0) + { + free (internal_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + sprintf (new_name, "%s_%08x", sym_name, (int)sym_sec); + sym_name = new_name; + } + else + { + /* It's an external symbol. */ + long index; + + index = r_index - symtab_hdr->sh_info; + hash = elf_sym_hashes (input_bfd)[index]; + if (hash->root.type == bfd_link_hash_defined + || hash->root.type == bfd_link_hash_defweak) + { + sym_sec = hash->root.u.def.section; + sym_name = hash->root.root.string; + sym_value = hash->root.u.def.value; + destination = (sym_value + + sym_sec->output_offset + + sym_sec->output_section->vma); + } + else + { + bfd_set_error (bfd_error_bad_value); + free (internal_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + } + + args_hash = elf32_hppa_args_hash_lookup (args_hash_table, + sym_name, false, false); + + /* Get both caller and callee argument information. */ + if (args_hash == NULL) + callee_args = 0; + else + callee_args = args_hash->arg_bits; + + /* For calls get the caller's bits from the addend of + the call relocation. For PLABELS the caller's bits + are assumed to have all args & return values in general + registers (0x155). */ + if (r_type == R_PARISC_PCREL17F) + caller_args = HPPA_R_ARG_RELOC (irela->r_addend); + else + caller_args = 0x155; + + /* Now determine where the call point is. */ + location = (section->output_offset + + section->output_section->vma + + irela->r_offset); + + /* We only care about the destination for PCREL function + calls (eg. we don't care for PLABELS). */ + if (r_type != R_PARISC_PCREL17F) + location = destination; + + /* Determine what (if any) linker stub is needed and its + size (in bytes). */ + size_of_stub = elf32_hppa_size_of_stub (callee_args, + caller_args, + location, + destination, + sym_name); + if (size_of_stub != 0) + { + char *stub_name; + unsigned int len; + + /* Get the name of this stub. */ + len = strlen (sym_name); + len += 23; + + stub_name = bfd_malloc (len); + if (!stub_name) + { + /* Because sym_name was mallocd above for local + symbols. */ + if (r_index < symtab_hdr->sh_info) + free (new_name); + + free (internal_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + elf32_hppa_name_of_stub (caller_args, callee_args, + location, destination, stub_name); + strcat (stub_name + 22, sym_name); + + /* Because sym_name was malloced above for local symbols. */ + if (r_index < symtab_hdr->sh_info) + free (new_name); + + stub_hash + = elf32_hppa_stub_hash_lookup (stub_hash_table, stub_name, + false, false); + if (stub_hash != NULL) + { + /* The proper stub has already been created, nothing + else to do. */ + free (stub_name); + } + else + { + bfd_set_section_size (stub_bfd, stub_sec, + (bfd_section_size (stub_bfd, + stub_sec) + + size_of_stub)); + + /* Enter this entry into the linker stub hash table. */ + stub_hash + = elf32_hppa_stub_hash_lookup (stub_hash_table, + stub_name, true, true); + if (stub_hash == NULL) + { + free (stub_name); + free (internal_relocs); + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + goto error_return; + } + + /* We'll need these to determine the address that the + stub will branch to. */ + stub_hash->target_value = sym_value; + stub_hash->target_section = sym_sec; + } + free (stub_name); + } + } + /* We're done with the internal relocs, free them. */ + free (internal_relocs); + } + } + /* We're done with the local symbols, free them. */ + for (i = 0; i < bfd_count; i++) + if (all_local_syms[i]) + free (all_local_syms[i]); + free (all_local_syms); + return true; + +error_return: + /* Return gracefully, avoiding dangling references to the hash tables. */ + if (stub_hash_table) + { + elf32_hppa_hash_table(link_info)->stub_hash_table = NULL; + free (stub_hash_table); + } + if (args_hash_table) + { + elf32_hppa_hash_table(link_info)->args_hash_table = NULL; + free (args_hash_table); + } + /* Set the size of the stub section to zero since we're never going + to create them. Avoids losing when we try to get its contents + too. */ + bfd_set_section_size (stub_bfd, stub_sec, 0); + return false; +} + +/* Misc BFD support code. */ +#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup +#define bfd_elf32_bfd_is_local_label_name hppa_elf_is_local_label_name + +/* Symbol extension stuff. */ +#define bfd_elf32_set_section_contents elf32_hppa_set_section_contents +#define elf_info_to_howto elf32_hppa_info_to_howto +#define elf_backend_symbol_table_processing \ + elf32_hppa_backend_symbol_table_processing +#define elf_backend_begin_write_processing \ + elf32_hppa_backend_begin_write_processing +#define elf_backend_final_write_processing \ + elf32_hppa_backend_final_write_processing + +/* Stuff for the BFD linker. */ +#define elf_backend_relocate_section elf32_hppa_relocate_section +#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook +#define elf_backend_link_output_symbol_hook \ + elf32_hppa_link_output_symbol_hook +#define bfd_elf32_bfd_link_hash_table_create \ + elf32_hppa_link_hash_table_create + +#define TARGET_BIG_SYM bfd_elf32_hppa_vec +#define TARGET_BIG_NAME "elf32-hppa" +#define ELF_ARCH bfd_arch_hppa +#define ELF_MACHINE_CODE EM_PARISC +#define ELF_MAXPAGESIZE 0x1000 + +#include "elf32-target.h" |