xref: /netbsd-src/external/gpl3/gdb/dist/bfd/elf32-hppa.c (revision 4d342c046e3288fb5a1edcd33cfec48c41c80664)
1 /* BFD back-end for HP PA-RISC ELF files.
2    Copyright (C) 1990-2020 Free Software Foundation, Inc.
3 
4    Original code by
5 	Center for Software Science
6 	Department of Computer Science
7 	University of Utah
8    Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9    Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10    TLS support written by Randolph Chung <tausq@debian.org>
11 
12    This file is part of BFD, the Binary File Descriptor library.
13 
14    This program is free software; you can redistribute it and/or modify
15    it under the terms of the GNU General Public License as published by
16    the Free Software Foundation; either version 3 of the License, or
17    (at your option) any later version.
18 
19    This program is distributed in the hope that it will be useful,
20    but WITHOUT ANY WARRANTY; without even the implied warranty of
21    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
22    GNU General Public License for more details.
23 
24    You should have received a copy of the GNU General Public License
25    along with this program; if not, write to the Free Software
26    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27    MA 02110-1301, USA.  */
28 
29 #include "sysdep.h"
30 #include "bfd.h"
31 #include "libbfd.h"
32 #include "elf-bfd.h"
33 #include "elf/hppa.h"
34 #include "libhppa.h"
35 #include "elf32-hppa.h"
36 #define ARCH_SIZE		32
37 #include "elf32-hppa.h"
38 #include "elf-hppa.h"
39 
40 /* In order to gain some understanding of code in this file without
41    knowing all the intricate details of the linker, note the
42    following:
43 
44    Functions named elf32_hppa_* are called by external routines, other
45    functions are only called locally.  elf32_hppa_* functions appear
46    in this file more or less in the order in which they are called
47    from external routines.  eg. elf32_hppa_check_relocs is called
48    early in the link process, elf32_hppa_finish_dynamic_sections is
49    one of the last functions.  */
50 
51 /* We use two hash tables to hold information for linking PA ELF objects.
52 
53    The first is the elf32_hppa_link_hash_table which is derived
54    from the standard ELF linker hash table.  We use this as a place to
55    attach other hash tables and static information.
56 
57    The second is the stub hash table which is derived from the
58    base BFD hash table.  The stub hash table holds the information
59    necessary to build the linker stubs during a link.
60 
61    There are a number of different stubs generated by the linker.
62 
63    Long branch stub:
64    :		ldil LR'X,%r1
65    :		be,n RR'X(%sr4,%r1)
66 
67    PIC long branch stub:
68    :		b,l .+8,%r1
69    :		addil LR'X - ($PIC_pcrel$0 - 4),%r1
70    :		be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
71 
72    Import stub to call shared library routine from normal object file
73    (single sub-space version)
74    :		addil LR'lt_ptr+ltoff,%dp	; get PLT address
75    :		ldo RR'lt_ptr+ltoff(%r1),%r22   ;
76    :		ldw 0(%r22),%r21		; get procedure entry point
77    :		bv %r0(%r21)
78    :		ldw 4(%r22),%r19		; get new dlt value.
79 
80    Import stub to call shared library routine from shared library
81    (single sub-space version)
82    :		addil LR'ltoff,%r19		; get PLT address
83    :		ldo RR'ltoff(%r1),%r22
84    :		ldw 0(%r22),%r21		; get procedure entry point
85    :		bv %r0(%r21)
86    :		ldw 4(%r22),%r19		; get new dlt value.
87 
88    Import stub to call shared library routine from normal object file
89    (multiple sub-space support)
90    :		addil LR'lt_ptr+ltoff,%dp	; get PLT address
91    :		ldo RR'lt_ptr+ltoff(%r1),%r22   ;
92    :		ldw 0(%r22),%r21		; get procedure entry point
93    :		ldsid (%r21),%r1		; get target sid
94    :		ldw 4(%r22),%r19		; get new dlt value.
95    :		mtsp %r1,%sr0
96    :		be 0(%sr0,%r21)			; branch to target
97    :		stw %rp,-24(%sp)		; save rp
98 
99    Import stub to call shared library routine from shared library
100    (multiple sub-space support)
101    :		addil LR'ltoff,%r19		; get PLT address
102    :		ldo RR'ltoff(%r1),%r22
103    :		ldw 0(%r22),%r21		; get procedure entry point
104    :		ldsid (%r21),%r1		; get target sid
105    :		ldw 4(%r22),%r19		; get new dlt value.
106    :		mtsp %r1,%sr0
107    :		be 0(%sr0,%r21)			; branch to target
108    :		stw %rp,-24(%sp)		; save rp
109 
110    Export stub to return from shared lib routine (multiple sub-space support)
111    One of these is created for each exported procedure in a shared
112    library (and stored in the shared lib).  Shared lib routines are
113    called via the first instruction in the export stub so that we can
114    do an inter-space return.  Not required for single sub-space.
115    :		bl,n X,%rp			; trap the return
116    :		nop
117    :		ldw -24(%sp),%rp		; restore the original rp
118    :		ldsid (%rp),%r1
119    :		mtsp %r1,%sr0
120    :		be,n 0(%sr0,%rp)		; inter-space return.  */
121 
122 
123 /* Variable names follow a coding style.
124    Please follow this (Apps Hungarian) style:
125 
126    Structure/Variable			Prefix
127    elf_link_hash_table			"etab"
128    elf_link_hash_entry			"eh"
129 
130    elf32_hppa_link_hash_table		"htab"
131    elf32_hppa_link_hash_entry		"hh"
132 
133    bfd_hash_table			"btab"
134    bfd_hash_entry			"bh"
135 
136    bfd_hash_table containing stubs	"bstab"
137    elf32_hppa_stub_hash_entry		"hsh"
138 
139    Always remember to use GNU Coding Style. */
140 
141 #define PLT_ENTRY_SIZE 8
142 #define GOT_ENTRY_SIZE 4
143 #define LONG_BRANCH_STUB_SIZE 8
144 #define LONG_BRANCH_SHARED_STUB_SIZE 12
145 #define IMPORT_STUB_SIZE 20
146 #define IMPORT_SHARED_STUB_SIZE 32
147 #define EXPORT_STUB_SIZE 24
148 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
149 
150 static const bfd_byte plt_stub[] =
151 {
152   0x0e, 0x80, 0x10, 0x95,  /* 1: ldw	0(%r20),%r21		*/
153   0xea, 0xa0, 0xc0, 0x00,  /*    bv	%r0(%r21)		*/
154   0x0e, 0x88, 0x10, 0x95,  /*    ldw	4(%r20),%r21		*/
155 #define PLT_STUB_ENTRY (3*4)
156   0xea, 0x9f, 0x1f, 0xdd,  /*    b,l	1b,%r20			*/
157   0xd6, 0x80, 0x1c, 0x1e,  /*    depi	0,31,2,%r20		*/
158   0x00, 0xc0, 0xff, 0xee,  /* 9: .word	fixup_func		*/
159   0xde, 0xad, 0xbe, 0xef   /*    .word	fixup_ltp		*/
160 };
161 
162 /* Section name for stubs is the associated section name plus this
163    string.  */
164 #define STUB_SUFFIX ".stub"
165 
166 /* We don't need to copy certain PC- or GP-relative dynamic relocs
167    into a shared object's dynamic section.  All the relocs of the
168    limited class we are interested in, are absolute.  */
169 #ifndef RELATIVE_DYNRELOCS
170 #define RELATIVE_DYNRELOCS 0
171 #define IS_ABSOLUTE_RELOC(r_type) 1
172 #define pc_dynrelocs(hh) 0
173 #endif
174 
175 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
176    copying dynamic variables from a shared lib into an app's dynbss
177    section, and instead use a dynamic relocation to point into the
178    shared lib.  */
179 #define ELIMINATE_COPY_RELOCS 1
180 
181 enum elf32_hppa_stub_type
182 {
183   hppa_stub_long_branch,
184   hppa_stub_long_branch_shared,
185   hppa_stub_import,
186   hppa_stub_import_shared,
187   hppa_stub_export,
188   hppa_stub_none
189 };
190 
191 struct elf32_hppa_stub_hash_entry
192 {
193   /* Base hash table entry structure.  */
194   struct bfd_hash_entry bh_root;
195 
196   /* The stub section.  */
197   asection *stub_sec;
198 
199   /* Offset within stub_sec of the beginning of this stub.  */
200   bfd_vma stub_offset;
201 
202   /* Given the symbol's value and its section we can determine its final
203      value when building the stubs (so the stub knows where to jump.  */
204   bfd_vma target_value;
205   asection *target_section;
206 
207   enum elf32_hppa_stub_type stub_type;
208 
209   /* The symbol table entry, if any, that this was derived from.  */
210   struct elf32_hppa_link_hash_entry *hh;
211 
212   /* Where this stub is being called from, or, in the case of combined
213      stub sections, the first input section in the group.  */
214   asection *id_sec;
215 };
216 
217 enum _tls_type
218   {
219     GOT_UNKNOWN = 0,
220     GOT_NORMAL = 1,
221     GOT_TLS_GD = 2,
222     GOT_TLS_LDM = 4,
223     GOT_TLS_IE = 8
224   };
225 
226 struct elf32_hppa_link_hash_entry
227 {
228   struct elf_link_hash_entry eh;
229 
230   /* A pointer to the most recently used stub hash entry against this
231      symbol.  */
232   struct elf32_hppa_stub_hash_entry *hsh_cache;
233 
234   ENUM_BITFIELD (_tls_type) tls_type : 8;
235 
236   /* Set if this symbol is used by a plabel reloc.  */
237   unsigned int plabel:1;
238 };
239 
240 struct elf32_hppa_link_hash_table
241 {
242   /* The main hash table.  */
243   struct elf_link_hash_table etab;
244 
245   /* The stub hash table.  */
246   struct bfd_hash_table bstab;
247 
248   /* Linker stub bfd.  */
249   bfd *stub_bfd;
250 
251   /* Linker call-backs.  */
252   asection * (*add_stub_section) (const char *, asection *);
253   void (*layout_sections_again) (void);
254 
255   /* Array to keep track of which stub sections have been created, and
256      information on stub grouping.  */
257   struct map_stub
258   {
259     /* This is the section to which stubs in the group will be
260        attached.  */
261     asection *link_sec;
262     /* The stub section.  */
263     asection *stub_sec;
264   } *stub_group;
265 
266   /* Assorted information used by elf32_hppa_size_stubs.  */
267   unsigned int bfd_count;
268   unsigned int top_index;
269   asection **input_list;
270   Elf_Internal_Sym **all_local_syms;
271 
272   /* Used during a final link to store the base of the text and data
273      segments so that we can perform SEGREL relocations.  */
274   bfd_vma text_segment_base;
275   bfd_vma data_segment_base;
276 
277   /* Whether we support multiple sub-spaces for shared libs.  */
278   unsigned int multi_subspace:1;
279 
280   /* Flags set when various size branches are detected.  Used to
281      select suitable defaults for the stub group size.  */
282   unsigned int has_12bit_branch:1;
283   unsigned int has_17bit_branch:1;
284   unsigned int has_22bit_branch:1;
285 
286   /* Set if we need a .plt stub to support lazy dynamic linking.  */
287   unsigned int need_plt_stub:1;
288 
289   /* Data for LDM relocations.  */
290   union
291   {
292     bfd_signed_vma refcount;
293     bfd_vma offset;
294   } tls_ldm_got;
295 };
296 
297 /* Various hash macros and functions.  */
298 #define hppa_link_hash_table(p) \
299   ((is_elf_hash_table ((p)->hash)					\
300     && elf_hash_table_id (elf_hash_table (p)) == HPPA32_ELF_DATA)	\
301    ? (struct elf32_hppa_link_hash_table *) (p)->hash : NULL)
302 
303 #define hppa_elf_hash_entry(ent) \
304   ((struct elf32_hppa_link_hash_entry *)(ent))
305 
306 #define hppa_stub_hash_entry(ent) \
307   ((struct elf32_hppa_stub_hash_entry *)(ent))
308 
309 #define hppa_stub_hash_lookup(table, string, create, copy) \
310   ((struct elf32_hppa_stub_hash_entry *) \
311    bfd_hash_lookup ((table), (string), (create), (copy)))
312 
313 #define hppa_elf_local_got_tls_type(abfd) \
314   ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
315 
316 #define hh_name(hh) \
317   (hh ? hh->eh.root.root.string : "<undef>")
318 
319 #define eh_name(eh) \
320   (eh ? eh->root.root.string : "<undef>")
321 
322 /* Assorted hash table functions.  */
323 
324 /* Initialize an entry in the stub hash table.  */
325 
326 static struct bfd_hash_entry *
327 stub_hash_newfunc (struct bfd_hash_entry *entry,
328 		   struct bfd_hash_table *table,
329 		   const char *string)
330 {
331   /* Allocate the structure if it has not already been allocated by a
332      subclass.  */
333   if (entry == NULL)
334     {
335       entry = bfd_hash_allocate (table,
336 				 sizeof (struct elf32_hppa_stub_hash_entry));
337       if (entry == NULL)
338 	return entry;
339     }
340 
341   /* Call the allocation method of the superclass.  */
342   entry = bfd_hash_newfunc (entry, table, string);
343   if (entry != NULL)
344     {
345       struct elf32_hppa_stub_hash_entry *hsh;
346 
347       /* Initialize the local fields.  */
348       hsh = hppa_stub_hash_entry (entry);
349       hsh->stub_sec = NULL;
350       hsh->stub_offset = 0;
351       hsh->target_value = 0;
352       hsh->target_section = NULL;
353       hsh->stub_type = hppa_stub_long_branch;
354       hsh->hh = NULL;
355       hsh->id_sec = NULL;
356     }
357 
358   return entry;
359 }
360 
361 /* Initialize an entry in the link hash table.  */
362 
363 static struct bfd_hash_entry *
364 hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
365 			struct bfd_hash_table *table,
366 			const char *string)
367 {
368   /* Allocate the structure if it has not already been allocated by a
369      subclass.  */
370   if (entry == NULL)
371     {
372       entry = bfd_hash_allocate (table,
373 				 sizeof (struct elf32_hppa_link_hash_entry));
374       if (entry == NULL)
375 	return entry;
376     }
377 
378   /* Call the allocation method of the superclass.  */
379   entry = _bfd_elf_link_hash_newfunc (entry, table, string);
380   if (entry != NULL)
381     {
382       struct elf32_hppa_link_hash_entry *hh;
383 
384       /* Initialize the local fields.  */
385       hh = hppa_elf_hash_entry (entry);
386       hh->hsh_cache = NULL;
387       hh->plabel = 0;
388       hh->tls_type = GOT_UNKNOWN;
389     }
390 
391   return entry;
392 }
393 
394 /* Free the derived linker hash table.  */
395 
396 static void
397 elf32_hppa_link_hash_table_free (bfd *obfd)
398 {
399   struct elf32_hppa_link_hash_table *htab
400     = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
401 
402   bfd_hash_table_free (&htab->bstab);
403   _bfd_elf_link_hash_table_free (obfd);
404 }
405 
406 /* Create the derived linker hash table.  The PA ELF port uses the derived
407    hash table to keep information specific to the PA ELF linker (without
408    using static variables).  */
409 
410 static struct bfd_link_hash_table *
411 elf32_hppa_link_hash_table_create (bfd *abfd)
412 {
413   struct elf32_hppa_link_hash_table *htab;
414   size_t amt = sizeof (*htab);
415 
416   htab = bfd_zmalloc (amt);
417   if (htab == NULL)
418     return NULL;
419 
420   if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
421 				      sizeof (struct elf32_hppa_link_hash_entry),
422 				      HPPA32_ELF_DATA))
423     {
424       free (htab);
425       return NULL;
426     }
427 
428   /* Init the stub hash table too.  */
429   if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
430 			    sizeof (struct elf32_hppa_stub_hash_entry)))
431     {
432       _bfd_elf_link_hash_table_free (abfd);
433       return NULL;
434     }
435   htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
436   htab->etab.dt_pltgot_required = TRUE;
437 
438   htab->text_segment_base = (bfd_vma) -1;
439   htab->data_segment_base = (bfd_vma) -1;
440   return &htab->etab.root;
441 }
442 
443 /* Initialize the linker stubs BFD so that we can use it for linker
444    created dynamic sections.  */
445 
446 void
447 elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
448 {
449   struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
450 
451   elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
452   htab->etab.dynobj = abfd;
453 }
454 
455 /* Build a name for an entry in the stub hash table.  */
456 
457 static char *
458 hppa_stub_name (const asection *input_section,
459 		const asection *sym_sec,
460 		const struct elf32_hppa_link_hash_entry *hh,
461 		const Elf_Internal_Rela *rela)
462 {
463   char *stub_name;
464   bfd_size_type len;
465 
466   if (hh)
467     {
468       len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
469       stub_name = bfd_malloc (len);
470       if (stub_name != NULL)
471 	sprintf (stub_name, "%08x_%s+%x",
472 		 input_section->id & 0xffffffff,
473 		 hh_name (hh),
474 		 (int) rela->r_addend & 0xffffffff);
475     }
476   else
477     {
478       len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
479       stub_name = bfd_malloc (len);
480       if (stub_name != NULL)
481 	sprintf (stub_name, "%08x_%x:%x+%x",
482 		 input_section->id & 0xffffffff,
483 		 sym_sec->id & 0xffffffff,
484 		 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
485 		 (int) rela->r_addend & 0xffffffff);
486     }
487   return stub_name;
488 }
489 
490 /* Look up an entry in the stub hash.  Stub entries are cached because
491    creating the stub name takes a bit of time.  */
492 
493 static struct elf32_hppa_stub_hash_entry *
494 hppa_get_stub_entry (const asection *input_section,
495 		     const asection *sym_sec,
496 		     struct elf32_hppa_link_hash_entry *hh,
497 		     const Elf_Internal_Rela *rela,
498 		     struct elf32_hppa_link_hash_table *htab)
499 {
500   struct elf32_hppa_stub_hash_entry *hsh_entry;
501   const asection *id_sec;
502 
503   /* If this input section is part of a group of sections sharing one
504      stub section, then use the id of the first section in the group.
505      Stub names need to include a section id, as there may well be
506      more than one stub used to reach say, printf, and we need to
507      distinguish between them.  */
508   id_sec = htab->stub_group[input_section->id].link_sec;
509   if (id_sec == NULL)
510     return NULL;
511 
512   if (hh != NULL && hh->hsh_cache != NULL
513       && hh->hsh_cache->hh == hh
514       && hh->hsh_cache->id_sec == id_sec)
515     {
516       hsh_entry = hh->hsh_cache;
517     }
518   else
519     {
520       char *stub_name;
521 
522       stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
523       if (stub_name == NULL)
524 	return NULL;
525 
526       hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
527 					  stub_name, FALSE, FALSE);
528       if (hh != NULL)
529 	hh->hsh_cache = hsh_entry;
530 
531       free (stub_name);
532     }
533 
534   return hsh_entry;
535 }
536 
537 /* Add a new stub entry to the stub hash.  Not all fields of the new
538    stub entry are initialised.  */
539 
540 static struct elf32_hppa_stub_hash_entry *
541 hppa_add_stub (const char *stub_name,
542 	       asection *section,
543 	       struct elf32_hppa_link_hash_table *htab)
544 {
545   asection *link_sec;
546   asection *stub_sec;
547   struct elf32_hppa_stub_hash_entry *hsh;
548 
549   link_sec = htab->stub_group[section->id].link_sec;
550   stub_sec = htab->stub_group[section->id].stub_sec;
551   if (stub_sec == NULL)
552     {
553       stub_sec = htab->stub_group[link_sec->id].stub_sec;
554       if (stub_sec == NULL)
555 	{
556 	  size_t namelen;
557 	  bfd_size_type len;
558 	  char *s_name;
559 
560 	  namelen = strlen (link_sec->name);
561 	  len = namelen + sizeof (STUB_SUFFIX);
562 	  s_name = bfd_alloc (htab->stub_bfd, len);
563 	  if (s_name == NULL)
564 	    return NULL;
565 
566 	  memcpy (s_name, link_sec->name, namelen);
567 	  memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
568 	  stub_sec = (*htab->add_stub_section) (s_name, link_sec);
569 	  if (stub_sec == NULL)
570 	    return NULL;
571 	  htab->stub_group[link_sec->id].stub_sec = stub_sec;
572 	}
573       htab->stub_group[section->id].stub_sec = stub_sec;
574     }
575 
576   /* Enter this entry into the linker stub hash table.  */
577   hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
578 				      TRUE, FALSE);
579   if (hsh == NULL)
580     {
581       /* xgettext:c-format */
582       _bfd_error_handler (_("%pB: cannot create stub entry %s"),
583 			  section->owner, stub_name);
584       return NULL;
585     }
586 
587   hsh->stub_sec = stub_sec;
588   hsh->stub_offset = 0;
589   hsh->id_sec = link_sec;
590   return hsh;
591 }
592 
593 /* Determine the type of stub needed, if any, for a call.  */
594 
595 static enum elf32_hppa_stub_type
596 hppa_type_of_stub (asection *input_sec,
597 		   const Elf_Internal_Rela *rela,
598 		   struct elf32_hppa_link_hash_entry *hh,
599 		   bfd_vma destination,
600 		   struct bfd_link_info *info)
601 {
602   bfd_vma location;
603   bfd_vma branch_offset;
604   bfd_vma max_branch_offset;
605   unsigned int r_type;
606 
607   if (hh != NULL
608       && hh->eh.plt.offset != (bfd_vma) -1
609       && hh->eh.dynindx != -1
610       && !hh->plabel
611       && (bfd_link_pic (info)
612 	  || !hh->eh.def_regular
613 	  || hh->eh.root.type == bfd_link_hash_defweak))
614     {
615       /* We need an import stub.  Decide between hppa_stub_import
616 	 and hppa_stub_import_shared later.  */
617       return hppa_stub_import;
618     }
619 
620   if (destination == (bfd_vma) -1)
621     return hppa_stub_none;
622 
623   /* Determine where the call point is.  */
624   location = (input_sec->output_offset
625 	      + input_sec->output_section->vma
626 	      + rela->r_offset);
627 
628   branch_offset = destination - location - 8;
629   r_type = ELF32_R_TYPE (rela->r_info);
630 
631   /* Determine if a long branch stub is needed.  parisc branch offsets
632      are relative to the second instruction past the branch, ie. +8
633      bytes on from the branch instruction location.  The offset is
634      signed and counts in units of 4 bytes.  */
635   if (r_type == (unsigned int) R_PARISC_PCREL17F)
636     max_branch_offset = (1 << (17 - 1)) << 2;
637 
638   else if (r_type == (unsigned int) R_PARISC_PCREL12F)
639     max_branch_offset = (1 << (12 - 1)) << 2;
640 
641   else /* R_PARISC_PCREL22F.  */
642     max_branch_offset = (1 << (22 - 1)) << 2;
643 
644   if (branch_offset + max_branch_offset >= 2*max_branch_offset)
645     return hppa_stub_long_branch;
646 
647   return hppa_stub_none;
648 }
649 
650 /* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
651    IN_ARG contains the link info pointer.  */
652 
653 #define LDIL_R1		0x20200000	/* ldil  LR'XXX,%r1		*/
654 #define BE_SR4_R1	0xe0202002	/* be,n  RR'XXX(%sr4,%r1)	*/
655 
656 #define BL_R1		0xe8200000	/* b,l   .+8,%r1		*/
657 #define ADDIL_R1	0x28200000	/* addil LR'XXX,%r1,%r1		*/
658 #define DEPI_R1		0xd4201c1e	/* depi  0,31,2,%r1		*/
659 
660 #define ADDIL_DP	0x2b600000	/* addil LR'XXX,%dp,%r1		*/
661 #define LDW_R1_R21	0x48350000	/* ldw   RR'XXX(%sr0,%r1),%r21	*/
662 #define BV_R0_R21	0xeaa0c000	/* bv    %r0(%r21)		*/
663 #define LDW_R1_R19	0x48330000	/* ldw   RR'XXX(%sr0,%r1),%r19	*/
664 
665 #define ADDIL_R19	0x2a600000	/* addil LR'XXX,%r19,%r1	*/
666 #define LDW_R1_DP	0x483b0000	/* ldw   RR'XXX(%sr0,%r1),%dp	*/
667 
668 #define LDO_R1_R22	0x34360000	/* ldo   RR'XXX(%r1),%r22	*/
669 #define LDW_R22_R21	0x0ec01095	/* ldw   0(%r22),%r21		*/
670 #define LDW_R22_R19	0x0ec81093	/* ldw   4(%r22),%r19		*/
671 
672 #define LDSID_R21_R1	0x02a010a1	/* ldsid (%sr0,%r21),%r1	*/
673 #define MTSP_R1		0x00011820	/* mtsp  %r1,%sr0		*/
674 #define BE_SR0_R21	0xe2a00000	/* be    0(%sr0,%r21)		*/
675 #define STW_RP		0x6bc23fd1	/* stw   %rp,-24(%sr0,%sp)	*/
676 
677 #define BL22_RP		0xe800a002	/* b,l,n XXX,%rp		*/
678 #define BL_RP		0xe8400002	/* b,l,n XXX,%rp		*/
679 #define NOP		0x08000240	/* nop				*/
680 #define LDW_RP		0x4bc23fd1	/* ldw   -24(%sr0,%sp),%rp	*/
681 #define LDSID_RP_R1	0x004010a1	/* ldsid (%sr0,%rp),%r1		*/
682 #define BE_SR0_RP	0xe0400002	/* be,n  0(%sr0,%rp)		*/
683 
684 #ifndef R19_STUBS
685 #define R19_STUBS 1
686 #endif
687 
688 #if R19_STUBS
689 #define LDW_R1_DLT	LDW_R1_R19
690 #else
691 #define LDW_R1_DLT	LDW_R1_DP
692 #endif
693 
694 static bfd_boolean
695 hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
696 {
697   struct elf32_hppa_stub_hash_entry *hsh;
698   struct bfd_link_info *info;
699   struct elf32_hppa_link_hash_table *htab;
700   asection *stub_sec;
701   bfd *stub_bfd;
702   bfd_byte *loc;
703   bfd_vma sym_value;
704   bfd_vma insn;
705   bfd_vma off;
706   int val;
707   int size;
708 
709   /* Massage our args to the form they really have.  */
710   hsh = hppa_stub_hash_entry (bh);
711   info = (struct bfd_link_info *)in_arg;
712 
713   htab = hppa_link_hash_table (info);
714   if (htab == NULL)
715     return FALSE;
716 
717   stub_sec = hsh->stub_sec;
718 
719   /* Make a note of the offset within the stubs for this entry.  */
720   hsh->stub_offset = stub_sec->size;
721   loc = stub_sec->contents + hsh->stub_offset;
722 
723   stub_bfd = stub_sec->owner;
724 
725   switch (hsh->stub_type)
726     {
727     case hppa_stub_long_branch:
728       /* Fail if the target section could not be assigned to an output
729 	 section.  The user should fix his linker script.  */
730       if (hsh->target_section->output_section == NULL
731 	  && info->non_contiguous_regions)
732 	info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output "
733 				  "section. Retry without "
734 				  "--enable-non-contiguous-regions.\n"),
735 				hsh->target_section);
736 
737       /* Create the long branch.  A long branch is formed with "ldil"
738 	 loading the upper bits of the target address into a register,
739 	 then branching with "be" which adds in the lower bits.
740 	 The "be" has its delay slot nullified.  */
741       sym_value = (hsh->target_value
742 		   + hsh->target_section->output_offset
743 		   + hsh->target_section->output_section->vma);
744 
745       val = hppa_field_adjust (sym_value, 0, e_lrsel);
746       insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
747       bfd_put_32 (stub_bfd, insn, loc);
748 
749       val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
750       insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
751       bfd_put_32 (stub_bfd, insn, loc + 4);
752 
753       size = LONG_BRANCH_STUB_SIZE;
754       break;
755 
756     case hppa_stub_long_branch_shared:
757       /* Fail if the target section could not be assigned to an output
758 	 section.  The user should fix his linker script.  */
759       if (hsh->target_section->output_section == NULL
760 	  && info->non_contiguous_regions)
761 	info->callbacks->einfo (_("%F%P: Could not assign %pA to an output "
762 				  "section. Retry without "
763 				  "--enable-non-contiguous-regions.\n"),
764 				hsh->target_section);
765 
766       /* Branches are relative.  This is where we are going to.  */
767       sym_value = (hsh->target_value
768 		   + hsh->target_section->output_offset
769 		   + hsh->target_section->output_section->vma);
770 
771       /* And this is where we are coming from, more or less.  */
772       sym_value -= (hsh->stub_offset
773 		    + stub_sec->output_offset
774 		    + stub_sec->output_section->vma);
775 
776       bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
777       val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
778       insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
779       bfd_put_32 (stub_bfd, insn, loc + 4);
780 
781       val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
782       insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
783       bfd_put_32 (stub_bfd, insn, loc + 8);
784       size = LONG_BRANCH_SHARED_STUB_SIZE;
785       break;
786 
787     case hppa_stub_import:
788     case hppa_stub_import_shared:
789       off = hsh->hh->eh.plt.offset;
790       if (off >= (bfd_vma) -2)
791 	abort ();
792 
793       off &= ~ (bfd_vma) 1;
794       sym_value = (off
795 		   + htab->etab.splt->output_offset
796 		   + htab->etab.splt->output_section->vma
797 		   - elf_gp (htab->etab.splt->output_section->owner));
798 
799       insn = ADDIL_DP;
800 #if R19_STUBS
801       if (hsh->stub_type == hppa_stub_import_shared)
802 	insn = ADDIL_R19;
803 #endif
804 
805       /* Load function descriptor address into register %r22.  It is
806 	 sometimes needed for lazy binding.  */
807       val = hppa_field_adjust (sym_value, 0, e_lrsel),
808       insn = hppa_rebuild_insn ((int) insn, val, 21);
809       bfd_put_32 (stub_bfd, insn, loc);
810 
811       val = hppa_field_adjust (sym_value, 0, e_rrsel);
812       insn = hppa_rebuild_insn ((int) LDO_R1_R22, val, 14);
813       bfd_put_32 (stub_bfd, insn, loc + 4);
814 
815       bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R21, loc + 8);
816 
817       if (htab->multi_subspace)
818 	{
819 	  bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
820 	  bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19,  loc + 16);
821 	  bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1,      loc + 20);
822 	  bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21,   loc + 24);
823 	  bfd_put_32 (stub_bfd, (bfd_vma) STW_RP,       loc + 28);
824 
825 	  size = IMPORT_SHARED_STUB_SIZE;
826 	}
827       else
828 	{
829 	  bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 12);
830 	  bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
831 
832 	  size = IMPORT_STUB_SIZE;
833 	}
834 
835       break;
836 
837     case hppa_stub_export:
838       /* Fail if the target section could not be assigned to an output
839 	 section.  The user should fix his linker script.  */
840       if (hsh->target_section->output_section == NULL
841 	  && info->non_contiguous_regions)
842 	info->callbacks->einfo (_("%F%P: Could not assign %pA to an output "
843 				  "section. Retry without "
844 				  "--enable-non-contiguous-regions.\n"),
845 				hsh->target_section);
846 
847       /* Branches are relative.  This is where we are going to.  */
848       sym_value = (hsh->target_value
849 		   + hsh->target_section->output_offset
850 		   + hsh->target_section->output_section->vma);
851 
852       /* And this is where we are coming from.  */
853       sym_value -= (hsh->stub_offset
854 		    + stub_sec->output_offset
855 		    + stub_sec->output_section->vma);
856 
857       if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
858 	  && (!htab->has_22bit_branch
859 	      || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
860 	{
861 	  _bfd_error_handler
862 	    /* xgettext:c-format */
863 	    (_("%pB(%pA+%#" PRIx64 "): "
864 	       "cannot reach %s, recompile with -ffunction-sections"),
865 	     hsh->target_section->owner,
866 	     stub_sec,
867 	     (uint64_t) hsh->stub_offset,
868 	     hsh->bh_root.string);
869 	  bfd_set_error (bfd_error_bad_value);
870 	  return FALSE;
871 	}
872 
873       val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
874       if (!htab->has_22bit_branch)
875 	insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
876       else
877 	insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
878       bfd_put_32 (stub_bfd, insn, loc);
879 
880       bfd_put_32 (stub_bfd, (bfd_vma) NOP,	   loc + 4);
881       bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP,      loc + 8);
882       bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
883       bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1,     loc + 16);
884       bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP,   loc + 20);
885 
886       /* Point the function symbol at the stub.  */
887       hsh->hh->eh.root.u.def.section = stub_sec;
888       hsh->hh->eh.root.u.def.value = stub_sec->size;
889 
890       size = EXPORT_STUB_SIZE;
891       break;
892 
893     default:
894       BFD_FAIL ();
895       return FALSE;
896     }
897 
898   stub_sec->size += size;
899   return TRUE;
900 }
901 
902 #undef LDIL_R1
903 #undef BE_SR4_R1
904 #undef BL_R1
905 #undef ADDIL_R1
906 #undef DEPI_R1
907 #undef LDW_R1_R21
908 #undef LDW_R1_DLT
909 #undef LDW_R1_R19
910 #undef ADDIL_R19
911 #undef LDW_R1_DP
912 #undef LDSID_R21_R1
913 #undef MTSP_R1
914 #undef BE_SR0_R21
915 #undef STW_RP
916 #undef BV_R0_R21
917 #undef BL_RP
918 #undef NOP
919 #undef LDW_RP
920 #undef LDSID_RP_R1
921 #undef BE_SR0_RP
922 
923 /* As above, but don't actually build the stub.  Just bump offset so
924    we know stub section sizes.  */
925 
926 static bfd_boolean
927 hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
928 {
929   struct elf32_hppa_stub_hash_entry *hsh;
930   struct elf32_hppa_link_hash_table *htab;
931   int size;
932 
933   /* Massage our args to the form they really have.  */
934   hsh = hppa_stub_hash_entry (bh);
935   htab = in_arg;
936 
937   if (hsh->stub_type == hppa_stub_long_branch)
938     size = LONG_BRANCH_STUB_SIZE;
939   else if (hsh->stub_type == hppa_stub_long_branch_shared)
940     size = LONG_BRANCH_SHARED_STUB_SIZE;
941   else if (hsh->stub_type == hppa_stub_export)
942     size = EXPORT_STUB_SIZE;
943   else /* hppa_stub_import or hppa_stub_import_shared.  */
944     {
945       if (htab->multi_subspace)
946 	size = IMPORT_SHARED_STUB_SIZE;
947       else
948 	size = IMPORT_STUB_SIZE;
949     }
950 
951   hsh->stub_sec->size += size;
952   return TRUE;
953 }
954 
955 /* Return nonzero if ABFD represents an HPPA ELF32 file.
956    Additionally we set the default architecture and machine.  */
957 
958 static bfd_boolean
959 elf32_hppa_object_p (bfd *abfd)
960 {
961   Elf_Internal_Ehdr * i_ehdrp;
962   unsigned int flags;
963 
964   i_ehdrp = elf_elfheader (abfd);
965   if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
966     {
967       /* GCC on hppa-linux produces binaries with OSABI=GNU,
968 	 but the kernel produces corefiles with OSABI=SysV.  */
969       if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
970 	  i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
971 	return FALSE;
972     }
973   else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
974     {
975       /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
976 	 but the kernel produces corefiles with OSABI=SysV.  */
977       if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
978 	  i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
979 	return FALSE;
980     }
981   else
982     {
983       if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
984 	return FALSE;
985     }
986 
987   flags = i_ehdrp->e_flags;
988   switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
989     {
990     case EFA_PARISC_1_0:
991       return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
992     case EFA_PARISC_1_1:
993       return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
994     case EFA_PARISC_2_0:
995       return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
996     case EFA_PARISC_2_0 | EF_PARISC_WIDE:
997       return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
998     }
999   return TRUE;
1000 }
1001 
1002 /* Create the .plt and .got sections, and set up our hash table
1003    short-cuts to various dynamic sections.  */
1004 
1005 static bfd_boolean
1006 elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1007 {
1008   struct elf32_hppa_link_hash_table *htab;
1009   struct elf_link_hash_entry *eh;
1010 
1011   /* Don't try to create the .plt and .got twice.  */
1012   htab = hppa_link_hash_table (info);
1013   if (htab == NULL)
1014     return FALSE;
1015   if (htab->etab.splt != NULL)
1016     return TRUE;
1017 
1018   /* Call the generic code to do most of the work.  */
1019   if (! _bfd_elf_create_dynamic_sections (abfd, info))
1020     return FALSE;
1021 
1022   /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1023      application, because __canonicalize_funcptr_for_compare needs it.  */
1024   eh = elf_hash_table (info)->hgot;
1025   eh->forced_local = 0;
1026   eh->other = STV_DEFAULT;
1027   return bfd_elf_link_record_dynamic_symbol (info, eh);
1028 }
1029 
1030 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
1031 
1032 static void
1033 elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
1034 				 struct elf_link_hash_entry *eh_dir,
1035 				 struct elf_link_hash_entry *eh_ind)
1036 {
1037   struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
1038 
1039   hh_dir = hppa_elf_hash_entry (eh_dir);
1040   hh_ind = hppa_elf_hash_entry (eh_ind);
1041 
1042   if (eh_ind->root.type == bfd_link_hash_indirect)
1043     {
1044       hh_dir->plabel |= hh_ind->plabel;
1045       hh_dir->tls_type |= hh_ind->tls_type;
1046       hh_ind->tls_type = GOT_UNKNOWN;
1047     }
1048 
1049   _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
1050 }
1051 
1052 static int
1053 elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1054 				int r_type, int is_local ATTRIBUTE_UNUSED)
1055 {
1056   /* For now we don't support linker optimizations.  */
1057   return r_type;
1058 }
1059 
1060 /* Return a pointer to the local GOT, PLT and TLS reference counts
1061    for ABFD.  Returns NULL if the storage allocation fails.  */
1062 
1063 static bfd_signed_vma *
1064 hppa32_elf_local_refcounts (bfd *abfd)
1065 {
1066   Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1067   bfd_signed_vma *local_refcounts;
1068 
1069   local_refcounts = elf_local_got_refcounts (abfd);
1070   if (local_refcounts == NULL)
1071     {
1072       bfd_size_type size;
1073 
1074       /* Allocate space for local GOT and PLT reference
1075 	 counts.  Done this way to save polluting elf_obj_tdata
1076 	 with another target specific pointer.  */
1077       size = symtab_hdr->sh_info;
1078       size *= 2 * sizeof (bfd_signed_vma);
1079       /* Add in space to store the local GOT TLS types.  */
1080       size += symtab_hdr->sh_info;
1081       local_refcounts = bfd_zalloc (abfd, size);
1082       if (local_refcounts == NULL)
1083 	return NULL;
1084       elf_local_got_refcounts (abfd) = local_refcounts;
1085       memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1086 	      symtab_hdr->sh_info);
1087     }
1088   return local_refcounts;
1089 }
1090 
1091 
1092 /* Look through the relocs for a section during the first phase, and
1093    calculate needed space in the global offset table, procedure linkage
1094    table, and dynamic reloc sections.  At this point we haven't
1095    necessarily read all the input files.  */
1096 
1097 static bfd_boolean
1098 elf32_hppa_check_relocs (bfd *abfd,
1099 			 struct bfd_link_info *info,
1100 			 asection *sec,
1101 			 const Elf_Internal_Rela *relocs)
1102 {
1103   Elf_Internal_Shdr *symtab_hdr;
1104   struct elf_link_hash_entry **eh_syms;
1105   const Elf_Internal_Rela *rela;
1106   const Elf_Internal_Rela *rela_end;
1107   struct elf32_hppa_link_hash_table *htab;
1108   asection *sreloc;
1109 
1110   if (bfd_link_relocatable (info))
1111     return TRUE;
1112 
1113   htab = hppa_link_hash_table (info);
1114   if (htab == NULL)
1115     return FALSE;
1116   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1117   eh_syms = elf_sym_hashes (abfd);
1118   sreloc = NULL;
1119 
1120   rela_end = relocs + sec->reloc_count;
1121   for (rela = relocs; rela < rela_end; rela++)
1122     {
1123       enum {
1124 	NEED_GOT = 1,
1125 	NEED_PLT = 2,
1126 	NEED_DYNREL = 4,
1127 	PLT_PLABEL = 8
1128       };
1129 
1130       unsigned int r_symndx, r_type;
1131       struct elf32_hppa_link_hash_entry *hh;
1132       int need_entry = 0;
1133 
1134       r_symndx = ELF32_R_SYM (rela->r_info);
1135 
1136       if (r_symndx < symtab_hdr->sh_info)
1137 	hh = NULL;
1138       else
1139 	{
1140 	  hh =  hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
1141 	  while (hh->eh.root.type == bfd_link_hash_indirect
1142 		 || hh->eh.root.type == bfd_link_hash_warning)
1143 	    hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
1144 	}
1145 
1146       r_type = ELF32_R_TYPE (rela->r_info);
1147       r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
1148 
1149       switch (r_type)
1150 	{
1151 	case R_PARISC_DLTIND14F:
1152 	case R_PARISC_DLTIND14R:
1153 	case R_PARISC_DLTIND21L:
1154 	  /* This symbol requires a global offset table entry.  */
1155 	  need_entry = NEED_GOT;
1156 	  break;
1157 
1158 	case R_PARISC_PLABEL14R: /* "Official" procedure labels.  */
1159 	case R_PARISC_PLABEL21L:
1160 	case R_PARISC_PLABEL32:
1161 	  /* If the addend is non-zero, we break badly.  */
1162 	  if (rela->r_addend != 0)
1163 	    abort ();
1164 
1165 	  /* If we are creating a shared library, then we need to
1166 	     create a PLT entry for all PLABELs, because PLABELs with
1167 	     local symbols may be passed via a pointer to another
1168 	     object.  Additionally, output a dynamic relocation
1169 	     pointing to the PLT entry.
1170 
1171 	     For executables, the original 32-bit ABI allowed two
1172 	     different styles of PLABELs (function pointers):  For
1173 	     global functions, the PLABEL word points into the .plt
1174 	     two bytes past a (function address, gp) pair, and for
1175 	     local functions the PLABEL points directly at the
1176 	     function.  The magic +2 for the first type allows us to
1177 	     differentiate between the two.  As you can imagine, this
1178 	     is a real pain when it comes to generating code to call
1179 	     functions indirectly or to compare function pointers.
1180 	     We avoid the mess by always pointing a PLABEL into the
1181 	     .plt, even for local functions.  */
1182 	  need_entry = PLT_PLABEL | NEED_PLT;
1183 	  if (bfd_link_pic (info))
1184 	    need_entry |= NEED_DYNREL;
1185 	  break;
1186 
1187 	case R_PARISC_PCREL12F:
1188 	  htab->has_12bit_branch = 1;
1189 	  goto branch_common;
1190 
1191 	case R_PARISC_PCREL17C:
1192 	case R_PARISC_PCREL17F:
1193 	  htab->has_17bit_branch = 1;
1194 	  goto branch_common;
1195 
1196 	case R_PARISC_PCREL22F:
1197 	  htab->has_22bit_branch = 1;
1198 	branch_common:
1199 	  /* Function calls might need to go through the .plt, and
1200 	     might require long branch stubs.  */
1201 	  if (hh == NULL)
1202 	    {
1203 	      /* We know local syms won't need a .plt entry, and if
1204 		 they need a long branch stub we can't guarantee that
1205 		 we can reach the stub.  So just flag an error later
1206 		 if we're doing a shared link and find we need a long
1207 		 branch stub.  */
1208 	      continue;
1209 	    }
1210 	  else
1211 	    {
1212 	      /* Global symbols will need a .plt entry if they remain
1213 		 global, and in most cases won't need a long branch
1214 		 stub.  Unfortunately, we have to cater for the case
1215 		 where a symbol is forced local by versioning, or due
1216 		 to symbolic linking, and we lose the .plt entry.  */
1217 	      need_entry = NEED_PLT;
1218 	      if (hh->eh.type == STT_PARISC_MILLI)
1219 		need_entry = 0;
1220 	    }
1221 	  break;
1222 
1223 	case R_PARISC_SEGBASE:  /* Used to set segment base.  */
1224 	case R_PARISC_SEGREL32: /* Relative reloc, used for unwind.  */
1225 	case R_PARISC_PCREL14F: /* PC relative load/store.  */
1226 	case R_PARISC_PCREL14R:
1227 	case R_PARISC_PCREL17R: /* External branches.  */
1228 	case R_PARISC_PCREL21L: /* As above, and for load/store too.  */
1229 	case R_PARISC_PCREL32:
1230 	  /* We don't need to propagate the relocation if linking a
1231 	     shared object since these are section relative.  */
1232 	  continue;
1233 
1234 	case R_PARISC_DPREL14F: /* Used for gp rel data load/store.  */
1235 	case R_PARISC_DPREL14R:
1236 	case R_PARISC_DPREL21L:
1237 	  if (bfd_link_pic (info))
1238 	    {
1239 	      _bfd_error_handler
1240 		/* xgettext:c-format */
1241 		(_("%pB: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1242 		 abfd,
1243 		 elf_hppa_howto_table[r_type].name);
1244 	      bfd_set_error (bfd_error_bad_value);
1245 	      return FALSE;
1246 	    }
1247 	  /* Fall through.  */
1248 
1249 	case R_PARISC_DIR17F: /* Used for external branches.  */
1250 	case R_PARISC_DIR17R:
1251 	case R_PARISC_DIR14F: /* Used for load/store from absolute locn.  */
1252 	case R_PARISC_DIR14R:
1253 	case R_PARISC_DIR21L: /* As above, and for ext branches too.  */
1254 	case R_PARISC_DIR32: /* .word relocs.  */
1255 	  /* We may want to output a dynamic relocation later.  */
1256 	  need_entry = NEED_DYNREL;
1257 	  break;
1258 
1259 	  /* This relocation describes the C++ object vtable hierarchy.
1260 	     Reconstruct it for later use during GC.  */
1261 	case R_PARISC_GNU_VTINHERIT:
1262 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
1263 	    return FALSE;
1264 	  continue;
1265 
1266 	  /* This relocation describes which C++ vtable entries are actually
1267 	     used.  Record for later use during GC.  */
1268 	case R_PARISC_GNU_VTENTRY:
1269 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
1270 	    return FALSE;
1271 	  continue;
1272 
1273 	case R_PARISC_TLS_GD21L:
1274 	case R_PARISC_TLS_GD14R:
1275 	case R_PARISC_TLS_LDM21L:
1276 	case R_PARISC_TLS_LDM14R:
1277 	  need_entry = NEED_GOT;
1278 	  break;
1279 
1280 	case R_PARISC_TLS_IE21L:
1281 	case R_PARISC_TLS_IE14R:
1282 	  if (bfd_link_dll (info))
1283 	    info->flags |= DF_STATIC_TLS;
1284 	  need_entry = NEED_GOT;
1285 	  break;
1286 
1287 	default:
1288 	  continue;
1289 	}
1290 
1291       /* Now carry out our orders.  */
1292       if (need_entry & NEED_GOT)
1293 	{
1294 	  int tls_type = GOT_NORMAL;
1295 
1296 	  switch (r_type)
1297 	    {
1298 	    default:
1299 	      break;
1300 	    case R_PARISC_TLS_GD21L:
1301 	    case R_PARISC_TLS_GD14R:
1302 	      tls_type = GOT_TLS_GD;
1303 	      break;
1304 	    case R_PARISC_TLS_LDM21L:
1305 	    case R_PARISC_TLS_LDM14R:
1306 	      tls_type = GOT_TLS_LDM;
1307 	      break;
1308 	    case R_PARISC_TLS_IE21L:
1309 	    case R_PARISC_TLS_IE14R:
1310 	      tls_type = GOT_TLS_IE;
1311 	      break;
1312 	    }
1313 
1314 	  /* Allocate space for a GOT entry, as well as a dynamic
1315 	     relocation for this entry.  */
1316 	  if (htab->etab.sgot == NULL)
1317 	    {
1318 	      if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
1319 		return FALSE;
1320 	    }
1321 
1322 	  if (hh != NULL)
1323 	    {
1324 	      if (tls_type == GOT_TLS_LDM)
1325 		htab->tls_ldm_got.refcount += 1;
1326 	      else
1327 		hh->eh.got.refcount += 1;
1328 	      hh->tls_type |= tls_type;
1329 	    }
1330 	  else
1331 	    {
1332 	      bfd_signed_vma *local_got_refcounts;
1333 
1334 	      /* This is a global offset table entry for a local symbol.  */
1335 	      local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1336 	      if (local_got_refcounts == NULL)
1337 		return FALSE;
1338 	      if (tls_type == GOT_TLS_LDM)
1339 		htab->tls_ldm_got.refcount += 1;
1340 	      else
1341 		local_got_refcounts[r_symndx] += 1;
1342 
1343 	      hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
1344 	    }
1345 	}
1346 
1347       if (need_entry & NEED_PLT)
1348 	{
1349 	  /* If we are creating a shared library, and this is a reloc
1350 	     against a weak symbol or a global symbol in a dynamic
1351 	     object, then we will be creating an import stub and a
1352 	     .plt entry for the symbol.  Similarly, on a normal link
1353 	     to symbols defined in a dynamic object we'll need the
1354 	     import stub and a .plt entry.  We don't know yet whether
1355 	     the symbol is defined or not, so make an entry anyway and
1356 	     clean up later in adjust_dynamic_symbol.  */
1357 	  if ((sec->flags & SEC_ALLOC) != 0)
1358 	    {
1359 	      if (hh != NULL)
1360 		{
1361 		  hh->eh.needs_plt = 1;
1362 		  hh->eh.plt.refcount += 1;
1363 
1364 		  /* If this .plt entry is for a plabel, mark it so
1365 		     that adjust_dynamic_symbol will keep the entry
1366 		     even if it appears to be local.  */
1367 		  if (need_entry & PLT_PLABEL)
1368 		    hh->plabel = 1;
1369 		}
1370 	      else if (need_entry & PLT_PLABEL)
1371 		{
1372 		  bfd_signed_vma *local_got_refcounts;
1373 		  bfd_signed_vma *local_plt_refcounts;
1374 
1375 		  local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1376 		  if (local_got_refcounts == NULL)
1377 		    return FALSE;
1378 		  local_plt_refcounts = (local_got_refcounts
1379 					 + symtab_hdr->sh_info);
1380 		  local_plt_refcounts[r_symndx] += 1;
1381 		}
1382 	    }
1383 	}
1384 
1385       if ((need_entry & NEED_DYNREL) != 0
1386 	  && (sec->flags & SEC_ALLOC) != 0)
1387 	{
1388 	  /* Flag this symbol as having a non-got, non-plt reference
1389 	     so that we generate copy relocs if it turns out to be
1390 	     dynamic.  */
1391 	  if (hh != NULL)
1392 	    hh->eh.non_got_ref = 1;
1393 
1394 	  /* If we are creating a shared library then we need to copy
1395 	     the reloc into the shared library.  However, if we are
1396 	     linking with -Bsymbolic, we need only copy absolute
1397 	     relocs or relocs against symbols that are not defined in
1398 	     an object we are including in the link.  PC- or DP- or
1399 	     DLT-relative relocs against any local sym or global sym
1400 	     with DEF_REGULAR set, can be discarded.  At this point we
1401 	     have not seen all the input files, so it is possible that
1402 	     DEF_REGULAR is not set now but will be set later (it is
1403 	     never cleared).  We account for that possibility below by
1404 	     storing information in the dyn_relocs field of the
1405 	     hash table entry.
1406 
1407 	     A similar situation to the -Bsymbolic case occurs when
1408 	     creating shared libraries and symbol visibility changes
1409 	     render the symbol local.
1410 
1411 	     As it turns out, all the relocs we will be creating here
1412 	     are absolute, so we cannot remove them on -Bsymbolic
1413 	     links or visibility changes anyway.  A STUB_REL reloc
1414 	     is absolute too, as in that case it is the reloc in the
1415 	     stub we will be creating, rather than copying the PCREL
1416 	     reloc in the branch.
1417 
1418 	     If on the other hand, we are creating an executable, we
1419 	     may need to keep relocations for symbols satisfied by a
1420 	     dynamic library if we manage to avoid copy relocs for the
1421 	     symbol.  */
1422 	  if ((bfd_link_pic (info)
1423 	       && (IS_ABSOLUTE_RELOC (r_type)
1424 		   || (hh != NULL
1425 		       && (!SYMBOLIC_BIND (info, &hh->eh)
1426 			   || hh->eh.root.type == bfd_link_hash_defweak
1427 			   || !hh->eh.def_regular))))
1428 	      || (ELIMINATE_COPY_RELOCS
1429 		  && !bfd_link_pic (info)
1430 		  && hh != NULL
1431 		  && (hh->eh.root.type == bfd_link_hash_defweak
1432 		      || !hh->eh.def_regular)))
1433 	    {
1434 	      struct elf_dyn_relocs *hdh_p;
1435 	      struct elf_dyn_relocs **hdh_head;
1436 
1437 	      /* Create a reloc section in dynobj and make room for
1438 		 this reloc.  */
1439 	      if (sreloc == NULL)
1440 		{
1441 		  sreloc = _bfd_elf_make_dynamic_reloc_section
1442 		    (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
1443 
1444 		  if (sreloc == NULL)
1445 		    {
1446 		      bfd_set_error (bfd_error_bad_value);
1447 		      return FALSE;
1448 		    }
1449 		}
1450 
1451 	      /* If this is a global symbol, we count the number of
1452 		 relocations we need for this symbol.  */
1453 	      if (hh != NULL)
1454 		{
1455 		  hdh_head = &hh->eh.dyn_relocs;
1456 		}
1457 	      else
1458 		{
1459 		  /* Track dynamic relocs needed for local syms too.
1460 		     We really need local syms available to do this
1461 		     easily.  Oh well.  */
1462 		  asection *sr;
1463 		  void *vpp;
1464 		  Elf_Internal_Sym *isym;
1465 
1466 		  isym = bfd_sym_from_r_symndx (&htab->etab.sym_cache,
1467 						abfd, r_symndx);
1468 		  if (isym == NULL)
1469 		    return FALSE;
1470 
1471 		  sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1472 		  if (sr == NULL)
1473 		    sr = sec;
1474 
1475 		  vpp = &elf_section_data (sr)->local_dynrel;
1476 		  hdh_head = (struct elf_dyn_relocs **) vpp;
1477 		}
1478 
1479 	      hdh_p = *hdh_head;
1480 	      if (hdh_p == NULL || hdh_p->sec != sec)
1481 		{
1482 		  hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
1483 		  if (hdh_p == NULL)
1484 		    return FALSE;
1485 		  hdh_p->next = *hdh_head;
1486 		  *hdh_head = hdh_p;
1487 		  hdh_p->sec = sec;
1488 		  hdh_p->count = 0;
1489 #if RELATIVE_DYNRELOCS
1490 		  hdh_p->pc_count = 0;
1491 #endif
1492 		}
1493 
1494 	      hdh_p->count += 1;
1495 #if RELATIVE_DYNRELOCS
1496 	      if (!IS_ABSOLUTE_RELOC (rtype))
1497 		hdh_p->pc_count += 1;
1498 #endif
1499 	    }
1500 	}
1501     }
1502 
1503   return TRUE;
1504 }
1505 
1506 /* Return the section that should be marked against garbage collection
1507    for a given relocation.  */
1508 
1509 static asection *
1510 elf32_hppa_gc_mark_hook (asection *sec,
1511 			 struct bfd_link_info *info,
1512 			 Elf_Internal_Rela *rela,
1513 			 struct elf_link_hash_entry *hh,
1514 			 Elf_Internal_Sym *sym)
1515 {
1516   if (hh != NULL)
1517     switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1518       {
1519       case R_PARISC_GNU_VTINHERIT:
1520       case R_PARISC_GNU_VTENTRY:
1521 	return NULL;
1522       }
1523 
1524   return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
1525 }
1526 
1527 /* Support for core dump NOTE sections.  */
1528 
1529 static bfd_boolean
1530 elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1531 {
1532   int offset;
1533   size_t size;
1534 
1535   switch (note->descsz)
1536     {
1537       default:
1538 	return FALSE;
1539 
1540       case 396:		/* Linux/hppa */
1541 	/* pr_cursig */
1542 	elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1543 
1544 	/* pr_pid */
1545 	elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
1546 
1547 	/* pr_reg */
1548 	offset = 72;
1549 	size = 320;
1550 
1551 	break;
1552     }
1553 
1554   /* Make a ".reg/999" section.  */
1555   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1556 					  size, note->descpos + offset);
1557 }
1558 
1559 static bfd_boolean
1560 elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1561 {
1562   switch (note->descsz)
1563     {
1564       default:
1565 	return FALSE;
1566 
1567       case 124:		/* Linux/hppa elf_prpsinfo.  */
1568 	elf_tdata (abfd)->core->program
1569 	  = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
1570 	elf_tdata (abfd)->core->command
1571 	  = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1572     }
1573 
1574   /* Note that for some reason, a spurious space is tacked
1575      onto the end of the args in some (at least one anyway)
1576      implementations, so strip it off if it exists.  */
1577   {
1578     char *command = elf_tdata (abfd)->core->command;
1579     int n = strlen (command);
1580 
1581     if (0 < n && command[n - 1] == ' ')
1582       command[n - 1] = '\0';
1583   }
1584 
1585   return TRUE;
1586 }
1587 
1588 /* Our own version of hide_symbol, so that we can keep plt entries for
1589    plabels.  */
1590 
1591 static void
1592 elf32_hppa_hide_symbol (struct bfd_link_info *info,
1593 			struct elf_link_hash_entry *eh,
1594 			bfd_boolean force_local)
1595 {
1596   if (force_local)
1597     {
1598       eh->forced_local = 1;
1599       if (eh->dynindx != -1)
1600 	{
1601 	  eh->dynindx = -1;
1602 	  _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1603 				  eh->dynstr_index);
1604 	}
1605 
1606       /* PR 16082: Remove version information from hidden symbol.  */
1607       eh->verinfo.verdef = NULL;
1608       eh->verinfo.vertree = NULL;
1609     }
1610 
1611   /* STT_GNU_IFUNC symbol must go through PLT.  */
1612   if (! hppa_elf_hash_entry (eh)->plabel
1613       && eh->type != STT_GNU_IFUNC)
1614     {
1615       eh->needs_plt = 0;
1616       eh->plt = elf_hash_table (info)->init_plt_offset;
1617     }
1618 }
1619 
1620 /* Return true if we have dynamic relocs against H or any of its weak
1621    aliases, that apply to read-only sections.  Cannot be used after
1622    size_dynamic_sections.  */
1623 
1624 static bfd_boolean
1625 alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1626 {
1627   struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1628   do
1629     {
1630       if (_bfd_elf_readonly_dynrelocs (&hh->eh))
1631 	return TRUE;
1632       hh = hppa_elf_hash_entry (hh->eh.u.alias);
1633     } while (hh != NULL && &hh->eh != eh);
1634 
1635   return FALSE;
1636 }
1637 
1638 /* Adjust a symbol defined by a dynamic object and referenced by a
1639    regular object.  The current definition is in some section of the
1640    dynamic object, but we're not including those sections.  We have to
1641    change the definition to something the rest of the link can
1642    understand.  */
1643 
1644 static bfd_boolean
1645 elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
1646 				  struct elf_link_hash_entry *eh)
1647 {
1648   struct elf32_hppa_link_hash_table *htab;
1649   asection *sec, *srel;
1650 
1651   /* If this is a function, put it in the procedure linkage table.  We
1652      will fill in the contents of the procedure linkage table later.  */
1653   if (eh->type == STT_FUNC
1654       || eh->needs_plt)
1655     {
1656       bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, eh)
1657 			   || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
1658       /* Discard dyn_relocs when non-pic if we've decided that a
1659 	 function symbol is local.  */
1660       if (!bfd_link_pic (info) && local)
1661 	eh->dyn_relocs = NULL;
1662 
1663       /* If the symbol is used by a plabel, we must allocate a PLT slot.
1664 	 The refcounts are not reliable when it has been hidden since
1665 	 hide_symbol can be called before the plabel flag is set.  */
1666       if (hppa_elf_hash_entry (eh)->plabel)
1667 	eh->plt.refcount = 1;
1668 
1669       /* Note that unlike some other backends, the refcount is not
1670 	 incremented for a non-call (and non-plabel) function reference.  */
1671       else if (eh->plt.refcount <= 0
1672 	       || local)
1673 	{
1674 	  /* The .plt entry is not needed when:
1675 	     a) Garbage collection has removed all references to the
1676 	     symbol, or
1677 	     b) We know for certain the symbol is defined in this
1678 	     object, and it's not a weak definition, nor is the symbol
1679 	     used by a plabel relocation.  Either this object is the
1680 	     application or we are doing a shared symbolic link.  */
1681 	  eh->plt.offset = (bfd_vma) -1;
1682 	  eh->needs_plt = 0;
1683 	}
1684 
1685       /* Unlike other targets, elf32-hppa.c does not define a function
1686 	 symbol in a non-pic executable on PLT stub code, so we don't
1687 	 have a local definition in that case.  ie. dyn_relocs can't
1688 	 be discarded.  */
1689 
1690       /* Function symbols can't have copy relocs.  */
1691       return TRUE;
1692     }
1693   else
1694     eh->plt.offset = (bfd_vma) -1;
1695 
1696   htab = hppa_link_hash_table (info);
1697   if (htab == NULL)
1698     return FALSE;
1699 
1700   /* If this is a weak symbol, and there is a real definition, the
1701      processor independent code will have arranged for us to see the
1702      real definition first, and we can just use the same value.  */
1703   if (eh->is_weakalias)
1704     {
1705       struct elf_link_hash_entry *def = weakdef (eh);
1706       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1707       eh->root.u.def.section = def->root.u.def.section;
1708       eh->root.u.def.value = def->root.u.def.value;
1709       if (def->root.u.def.section == htab->etab.sdynbss
1710 	  || def->root.u.def.section == htab->etab.sdynrelro)
1711 	eh->dyn_relocs = NULL;
1712       return TRUE;
1713     }
1714 
1715   /* This is a reference to a symbol defined by a dynamic object which
1716      is not a function.  */
1717 
1718   /* If we are creating a shared library, we must presume that the
1719      only references to the symbol are via the global offset table.
1720      For such cases we need not do anything here; the relocations will
1721      be handled correctly by relocate_section.  */
1722   if (bfd_link_pic (info))
1723     return TRUE;
1724 
1725   /* If there are no references to this symbol that do not use the
1726      GOT, we don't need to generate a copy reloc.  */
1727   if (!eh->non_got_ref)
1728     return TRUE;
1729 
1730   /* If -z nocopyreloc was given, we won't generate them either.  */
1731   if (info->nocopyreloc)
1732     return TRUE;
1733 
1734   /* If we don't find any dynamic relocs in read-only sections, then
1735      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
1736   if (ELIMINATE_COPY_RELOCS
1737       && !alias_readonly_dynrelocs (eh))
1738     return TRUE;
1739 
1740   /* We must allocate the symbol in our .dynbss section, which will
1741      become part of the .bss section of the executable.  There will be
1742      an entry for this symbol in the .dynsym section.  The dynamic
1743      object will contain position independent code, so all references
1744      from the dynamic object to this symbol will go through the global
1745      offset table.  The dynamic linker will use the .dynsym entry to
1746      determine the address it must put in the global offset table, so
1747      both the dynamic object and the regular object will refer to the
1748      same memory location for the variable.  */
1749   if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1750     {
1751       sec = htab->etab.sdynrelro;
1752       srel = htab->etab.sreldynrelro;
1753     }
1754   else
1755     {
1756       sec = htab->etab.sdynbss;
1757       srel = htab->etab.srelbss;
1758     }
1759   if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
1760     {
1761       /* We must generate a COPY reloc to tell the dynamic linker to
1762 	 copy the initial value out of the dynamic object and into the
1763 	 runtime process image.  */
1764       srel->size += sizeof (Elf32_External_Rela);
1765       eh->needs_copy = 1;
1766     }
1767 
1768   /* We no longer want dyn_relocs.  */
1769   eh->dyn_relocs = NULL;
1770   return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
1771 }
1772 
1773 /* If EH is undefined, make it dynamic if that makes sense.  */
1774 
1775 static bfd_boolean
1776 ensure_undef_dynamic (struct bfd_link_info *info,
1777 		      struct elf_link_hash_entry *eh)
1778 {
1779   struct elf_link_hash_table *htab = elf_hash_table (info);
1780 
1781   if (htab->dynamic_sections_created
1782       && (eh->root.type == bfd_link_hash_undefweak
1783 	  || eh->root.type == bfd_link_hash_undefined)
1784       && eh->dynindx == -1
1785       && !eh->forced_local
1786       && eh->type != STT_PARISC_MILLI
1787       && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
1788       && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1789     return bfd_elf_link_record_dynamic_symbol (info, eh);
1790   return TRUE;
1791 }
1792 
1793 /* Allocate space in the .plt for entries that won't have relocations.
1794    ie. plabel entries.  */
1795 
1796 static bfd_boolean
1797 allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
1798 {
1799   struct bfd_link_info *info;
1800   struct elf32_hppa_link_hash_table *htab;
1801   struct elf32_hppa_link_hash_entry *hh;
1802   asection *sec;
1803 
1804   if (eh->root.type == bfd_link_hash_indirect)
1805     return TRUE;
1806 
1807   info = (struct bfd_link_info *) inf;
1808   hh = hppa_elf_hash_entry (eh);
1809   htab = hppa_link_hash_table (info);
1810   if (htab == NULL)
1811     return FALSE;
1812 
1813   if (htab->etab.dynamic_sections_created
1814       && eh->plt.refcount > 0)
1815     {
1816       if (!ensure_undef_dynamic (info, eh))
1817 	return FALSE;
1818 
1819       if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
1820 	{
1821 	  /* Allocate these later.  From this point on, h->plabel
1822 	     means that the plt entry is only used by a plabel.
1823 	     We'll be using a normal plt entry for this symbol, so
1824 	     clear the plabel indicator.  */
1825 
1826 	  hh->plabel = 0;
1827 	}
1828       else if (hh->plabel)
1829 	{
1830 	  /* Make an entry in the .plt section for plabel references
1831 	     that won't have a .plt entry for other reasons.  */
1832 	  sec = htab->etab.splt;
1833 	  eh->plt.offset = sec->size;
1834 	  sec->size += PLT_ENTRY_SIZE;
1835 	  if (bfd_link_pic (info))
1836 	    htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1837 	}
1838       else
1839 	{
1840 	  /* No .plt entry needed.  */
1841 	  eh->plt.offset = (bfd_vma) -1;
1842 	  eh->needs_plt = 0;
1843 	}
1844     }
1845   else
1846     {
1847       eh->plt.offset = (bfd_vma) -1;
1848       eh->needs_plt = 0;
1849     }
1850 
1851   return TRUE;
1852 }
1853 
1854 /* Calculate size of GOT entries for symbol given its TLS_TYPE.  */
1855 
1856 static inline unsigned int
1857 got_entries_needed (int tls_type)
1858 {
1859   unsigned int need = 0;
1860 
1861   if ((tls_type & GOT_NORMAL) != 0)
1862     need += GOT_ENTRY_SIZE;
1863   if ((tls_type & GOT_TLS_GD) != 0)
1864     need += GOT_ENTRY_SIZE * 2;
1865   if ((tls_type & GOT_TLS_IE) != 0)
1866     need += GOT_ENTRY_SIZE;
1867   return need;
1868 }
1869 
1870 /* Calculate size of relocs needed for symbol given its TLS_TYPE and
1871    NEEDed GOT entries.  TPREL_KNOWN says a TPREL offset can be
1872    calculated at link time.  DTPREL_KNOWN says the same for a DTPREL
1873    offset.  */
1874 
1875 static inline unsigned int
1876 got_relocs_needed (int tls_type, unsigned int need,
1877 		   bfd_boolean dtprel_known, bfd_boolean tprel_known)
1878 {
1879   /* All the entries we allocated need relocs.
1880      Except for GD and IE with local symbols.  */
1881   if ((tls_type & GOT_TLS_GD) != 0 && dtprel_known)
1882     need -= GOT_ENTRY_SIZE;
1883   if ((tls_type & GOT_TLS_IE) != 0 && tprel_known)
1884     need -= GOT_ENTRY_SIZE;
1885   return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1886 }
1887 
1888 /* Allocate space in .plt, .got and associated reloc sections for
1889    global syms.  */
1890 
1891 static bfd_boolean
1892 allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
1893 {
1894   struct bfd_link_info *info;
1895   struct elf32_hppa_link_hash_table *htab;
1896   asection *sec;
1897   struct elf32_hppa_link_hash_entry *hh;
1898   struct elf_dyn_relocs *hdh_p;
1899 
1900   if (eh->root.type == bfd_link_hash_indirect)
1901     return TRUE;
1902 
1903   info = inf;
1904   htab = hppa_link_hash_table (info);
1905   if (htab == NULL)
1906     return FALSE;
1907 
1908   hh = hppa_elf_hash_entry (eh);
1909 
1910   if (htab->etab.dynamic_sections_created
1911       && eh->plt.offset != (bfd_vma) -1
1912       && !hh->plabel
1913       && eh->plt.refcount > 0)
1914     {
1915       /* Make an entry in the .plt section.  */
1916       sec = htab->etab.splt;
1917       eh->plt.offset = sec->size;
1918       sec->size += PLT_ENTRY_SIZE;
1919 
1920       /* We also need to make an entry in the .rela.plt section.  */
1921       htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1922       htab->need_plt_stub = 1;
1923     }
1924 
1925   if (eh->got.refcount > 0)
1926     {
1927       unsigned int need;
1928 
1929       if (!ensure_undef_dynamic (info, eh))
1930 	return FALSE;
1931 
1932       sec = htab->etab.sgot;
1933       eh->got.offset = sec->size;
1934       need = got_entries_needed (hh->tls_type);
1935       sec->size += need;
1936       if (htab->etab.dynamic_sections_created
1937 	  && (bfd_link_dll (info)
1938 	      || (bfd_link_pic (info) && (hh->tls_type & GOT_NORMAL) != 0)
1939 	      || (eh->dynindx != -1
1940 		  && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1941 	  && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1942 	{
1943 	  bfd_boolean local = SYMBOL_REFERENCES_LOCAL (info, eh);
1944 	  htab->etab.srelgot->size
1945 	    += got_relocs_needed (hh->tls_type, need, local,
1946 				  local && bfd_link_executable (info));
1947 	}
1948     }
1949   else
1950     eh->got.offset = (bfd_vma) -1;
1951 
1952   /* If no dynamic sections we can't have dynamic relocs.  */
1953   if (!htab->etab.dynamic_sections_created)
1954     eh->dyn_relocs = NULL;
1955 
1956   /* Discard relocs on undefined syms with non-default visibility.  */
1957   else if ((eh->root.type == bfd_link_hash_undefined
1958 	    && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
1959 	   || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1960     eh->dyn_relocs = NULL;
1961 
1962   if (eh->dyn_relocs == NULL)
1963     return TRUE;
1964 
1965   /* If this is a -Bsymbolic shared link, then we need to discard all
1966      space allocated for dynamic pc-relative relocs against symbols
1967      defined in a regular object.  For the normal shared case, discard
1968      space for relocs that have become local due to symbol visibility
1969      changes.  */
1970   if (bfd_link_pic (info))
1971     {
1972 #if RELATIVE_DYNRELOCS
1973       if (SYMBOL_CALLS_LOCAL (info, eh))
1974 	{
1975 	  struct elf_dyn_relocs **hdh_pp;
1976 
1977 	  for (hdh_pp = &eh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
1978 	    {
1979 	      hdh_p->count -= hdh_p->pc_count;
1980 	      hdh_p->pc_count = 0;
1981 	      if (hdh_p->count == 0)
1982 		*hdh_pp = hdh_p->next;
1983 	      else
1984 		hdh_pp = &hdh_p->next;
1985 	    }
1986 	}
1987 #endif
1988 
1989       if (eh->dyn_relocs != NULL)
1990 	{
1991 	  if (!ensure_undef_dynamic (info, eh))
1992 	    return FALSE;
1993 	}
1994     }
1995   else if (ELIMINATE_COPY_RELOCS)
1996     {
1997       /* For the non-shared case, discard space for relocs against
1998 	 symbols which turn out to need copy relocs or are not
1999 	 dynamic.  */
2000 
2001       if (eh->dynamic_adjusted
2002 	  && !eh->def_regular
2003 	  && !ELF_COMMON_DEF_P (eh))
2004 	{
2005 	  if (!ensure_undef_dynamic (info, eh))
2006 	    return FALSE;
2007 
2008 	  if (eh->dynindx == -1)
2009 	    eh->dyn_relocs = NULL;
2010 	}
2011       else
2012 	eh->dyn_relocs = NULL;
2013     }
2014 
2015   /* Finally, allocate space.  */
2016   for (hdh_p = eh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
2017     {
2018       asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2019       sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
2020     }
2021 
2022   return TRUE;
2023 }
2024 
2025 /* This function is called via elf_link_hash_traverse to force
2026    millicode symbols local so they do not end up as globals in the
2027    dynamic symbol table.  We ought to be able to do this in
2028    adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2029    for all dynamic symbols.  Arguably, this is a bug in
2030    elf_adjust_dynamic_symbol.  */
2031 
2032 static bfd_boolean
2033 clobber_millicode_symbols (struct elf_link_hash_entry *eh,
2034 			   struct bfd_link_info *info)
2035 {
2036   if (eh->type == STT_PARISC_MILLI
2037       && !eh->forced_local)
2038     {
2039       elf32_hppa_hide_symbol (info, eh, TRUE);
2040     }
2041   return TRUE;
2042 }
2043 
2044 /* Set the sizes of the dynamic sections.  */
2045 
2046 static bfd_boolean
2047 elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2048 				  struct bfd_link_info *info)
2049 {
2050   struct elf32_hppa_link_hash_table *htab;
2051   bfd *dynobj;
2052   bfd *ibfd;
2053   asection *sec;
2054   bfd_boolean relocs;
2055 
2056   htab = hppa_link_hash_table (info);
2057   if (htab == NULL)
2058     return FALSE;
2059 
2060   dynobj = htab->etab.dynobj;
2061   if (dynobj == NULL)
2062     abort ();
2063 
2064   if (htab->etab.dynamic_sections_created)
2065     {
2066       /* Set the contents of the .interp section to the interpreter.  */
2067       if (bfd_link_executable (info) && !info->nointerp)
2068 	{
2069 	  sec = bfd_get_linker_section (dynobj, ".interp");
2070 	  if (sec == NULL)
2071 	    abort ();
2072 	  sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2073 	  sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2074 	}
2075 
2076       /* Force millicode symbols local.  */
2077       elf_link_hash_traverse (&htab->etab,
2078 			      clobber_millicode_symbols,
2079 			      info);
2080     }
2081 
2082   /* Set up .got and .plt offsets for local syms, and space for local
2083      dynamic relocs.  */
2084   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2085     {
2086       bfd_signed_vma *local_got;
2087       bfd_signed_vma *end_local_got;
2088       bfd_signed_vma *local_plt;
2089       bfd_signed_vma *end_local_plt;
2090       bfd_size_type locsymcount;
2091       Elf_Internal_Shdr *symtab_hdr;
2092       asection *srel;
2093       char *local_tls_type;
2094 
2095       if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2096 	continue;
2097 
2098       for (sec = ibfd->sections; sec != NULL; sec = sec->next)
2099 	{
2100 	  struct elf_dyn_relocs *hdh_p;
2101 
2102 	  for (hdh_p = ((struct elf_dyn_relocs *)
2103 		    elf_section_data (sec)->local_dynrel);
2104 	       hdh_p != NULL;
2105 	       hdh_p = hdh_p->next)
2106 	    {
2107 	      if (!bfd_is_abs_section (hdh_p->sec)
2108 		  && bfd_is_abs_section (hdh_p->sec->output_section))
2109 		{
2110 		  /* Input section has been discarded, either because
2111 		     it is a copy of a linkonce section or due to
2112 		     linker script /DISCARD/, so we'll be discarding
2113 		     the relocs too.  */
2114 		}
2115 	      else if (hdh_p->count != 0)
2116 		{
2117 		  srel = elf_section_data (hdh_p->sec)->sreloc;
2118 		  srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2119 		  if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
2120 		    info->flags |= DF_TEXTREL;
2121 		}
2122 	    }
2123 	}
2124 
2125       local_got = elf_local_got_refcounts (ibfd);
2126       if (!local_got)
2127 	continue;
2128 
2129       symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2130       locsymcount = symtab_hdr->sh_info;
2131       end_local_got = local_got + locsymcount;
2132       local_tls_type = hppa_elf_local_got_tls_type (ibfd);
2133       sec = htab->etab.sgot;
2134       srel = htab->etab.srelgot;
2135       for (; local_got < end_local_got; ++local_got)
2136 	{
2137 	  if (*local_got > 0)
2138 	    {
2139 	      unsigned int need;
2140 
2141 	      *local_got = sec->size;
2142 	      need = got_entries_needed (*local_tls_type);
2143 	      sec->size += need;
2144 	      if (bfd_link_dll (info)
2145 		  || (bfd_link_pic (info)
2146 		      && (*local_tls_type & GOT_NORMAL) != 0))
2147 		htab->etab.srelgot->size
2148 		  += got_relocs_needed (*local_tls_type, need, TRUE,
2149 					bfd_link_executable (info));
2150 	    }
2151 	  else
2152 	    *local_got = (bfd_vma) -1;
2153 
2154 	  ++local_tls_type;
2155 	}
2156 
2157       local_plt = end_local_got;
2158       end_local_plt = local_plt + locsymcount;
2159       if (! htab->etab.dynamic_sections_created)
2160 	{
2161 	  /* Won't be used, but be safe.  */
2162 	  for (; local_plt < end_local_plt; ++local_plt)
2163 	    *local_plt = (bfd_vma) -1;
2164 	}
2165       else
2166 	{
2167 	  sec = htab->etab.splt;
2168 	  srel = htab->etab.srelplt;
2169 	  for (; local_plt < end_local_plt; ++local_plt)
2170 	    {
2171 	      if (*local_plt > 0)
2172 		{
2173 		  *local_plt = sec->size;
2174 		  sec->size += PLT_ENTRY_SIZE;
2175 		  if (bfd_link_pic (info))
2176 		    srel->size += sizeof (Elf32_External_Rela);
2177 		}
2178 	      else
2179 		*local_plt = (bfd_vma) -1;
2180 	    }
2181 	}
2182     }
2183 
2184   if (htab->tls_ldm_got.refcount > 0)
2185     {
2186       /* Allocate 2 got entries and 1 dynamic reloc for
2187 	 R_PARISC_TLS_DTPMOD32 relocs.  */
2188       htab->tls_ldm_got.offset = htab->etab.sgot->size;
2189       htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2190       htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2191     }
2192   else
2193     htab->tls_ldm_got.offset = -1;
2194 
2195   /* Do all the .plt entries without relocs first.  The dynamic linker
2196      uses the last .plt reloc to find the end of the .plt (and hence
2197      the start of the .got) for lazy linking.  */
2198   elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
2199 
2200   /* Allocate global sym .plt and .got entries, and space for global
2201      sym dynamic relocs.  */
2202   elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
2203 
2204   /* The check_relocs and adjust_dynamic_symbol entry points have
2205      determined the sizes of the various dynamic sections.  Allocate
2206      memory for them.  */
2207   relocs = FALSE;
2208   for (sec = dynobj->sections; sec != NULL; sec = sec->next)
2209     {
2210       if ((sec->flags & SEC_LINKER_CREATED) == 0)
2211 	continue;
2212 
2213       if (sec == htab->etab.splt)
2214 	{
2215 	  if (htab->need_plt_stub)
2216 	    {
2217 	      /* Make space for the plt stub at the end of the .plt
2218 		 section.  We want this stub right at the end, up
2219 		 against the .got section.  */
2220 	      int gotalign = bfd_section_alignment (htab->etab.sgot);
2221 	      int pltalign = bfd_section_alignment (sec);
2222 	      int align = gotalign > 3 ? gotalign : 3;
2223 	      bfd_size_type mask;
2224 
2225 	      if (align > pltalign)
2226 		bfd_set_section_alignment (sec, align);
2227 	      mask = ((bfd_size_type) 1 << gotalign) - 1;
2228 	      sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
2229 	    }
2230 	}
2231       else if (sec == htab->etab.sgot
2232 	       || sec == htab->etab.sdynbss
2233 	       || sec == htab->etab.sdynrelro)
2234 	;
2235       else if (CONST_STRNEQ (bfd_section_name (sec), ".rela"))
2236 	{
2237 	  if (sec->size != 0)
2238 	    {
2239 	      /* Remember whether there are any reloc sections other
2240 		 than .rela.plt.  */
2241 	      if (sec != htab->etab.srelplt)
2242 		relocs = TRUE;
2243 
2244 	      /* We use the reloc_count field as a counter if we need
2245 		 to copy relocs into the output file.  */
2246 	      sec->reloc_count = 0;
2247 	    }
2248 	}
2249       else
2250 	{
2251 	  /* It's not one of our sections, so don't allocate space.  */
2252 	  continue;
2253 	}
2254 
2255       if (sec->size == 0)
2256 	{
2257 	  /* If we don't need this section, strip it from the
2258 	     output file.  This is mostly to handle .rela.bss and
2259 	     .rela.plt.  We must create both sections in
2260 	     create_dynamic_sections, because they must be created
2261 	     before the linker maps input sections to output
2262 	     sections.  The linker does that before
2263 	     adjust_dynamic_symbol is called, and it is that
2264 	     function which decides whether anything needs to go
2265 	     into these sections.  */
2266 	  sec->flags |= SEC_EXCLUDE;
2267 	  continue;
2268 	}
2269 
2270       if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2271 	continue;
2272 
2273       /* Allocate memory for the section contents.  Zero it, because
2274 	 we may not fill in all the reloc sections.  */
2275       sec->contents = bfd_zalloc (dynobj, sec->size);
2276       if (sec->contents == NULL)
2277 	return FALSE;
2278     }
2279 
2280   return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
2281 }
2282 
2283 /* External entry points for sizing and building linker stubs.  */
2284 
2285 /* Set up various things so that we can make a list of input sections
2286    for each output section included in the link.  Returns -1 on error,
2287    0 when no stubs will be needed, and 1 on success.  */
2288 
2289 int
2290 elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
2291 {
2292   bfd *input_bfd;
2293   unsigned int bfd_count;
2294   unsigned int top_id, top_index;
2295   asection *section;
2296   asection **input_list, **list;
2297   size_t amt;
2298   struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2299 
2300   if (htab == NULL)
2301     return -1;
2302 
2303   /* Count the number of input BFDs and find the top input section id.  */
2304   for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
2305        input_bfd != NULL;
2306        input_bfd = input_bfd->link.next)
2307     {
2308       bfd_count += 1;
2309       for (section = input_bfd->sections;
2310 	   section != NULL;
2311 	   section = section->next)
2312 	{
2313 	  if (top_id < section->id)
2314 	    top_id = section->id;
2315 	}
2316     }
2317   htab->bfd_count = bfd_count;
2318 
2319   amt = sizeof (struct map_stub) * (top_id + 1);
2320   htab->stub_group = bfd_zmalloc (amt);
2321   if (htab->stub_group == NULL)
2322     return -1;
2323 
2324   /* We can't use output_bfd->section_count here to find the top output
2325      section index as some sections may have been removed, and
2326      strip_excluded_output_sections doesn't renumber the indices.  */
2327   for (section = output_bfd->sections, top_index = 0;
2328        section != NULL;
2329        section = section->next)
2330     {
2331       if (top_index < section->index)
2332 	top_index = section->index;
2333     }
2334 
2335   htab->top_index = top_index;
2336   amt = sizeof (asection *) * (top_index + 1);
2337   input_list = bfd_malloc (amt);
2338   htab->input_list = input_list;
2339   if (input_list == NULL)
2340     return -1;
2341 
2342   /* For sections we aren't interested in, mark their entries with a
2343      value we can check later.  */
2344   list = input_list + top_index;
2345   do
2346     *list = bfd_abs_section_ptr;
2347   while (list-- != input_list);
2348 
2349   for (section = output_bfd->sections;
2350        section != NULL;
2351        section = section->next)
2352     {
2353       if ((section->flags & SEC_CODE) != 0)
2354 	input_list[section->index] = NULL;
2355     }
2356 
2357   return 1;
2358 }
2359 
2360 /* The linker repeatedly calls this function for each input section,
2361    in the order that input sections are linked into output sections.
2362    Build lists of input sections to determine groupings between which
2363    we may insert linker stubs.  */
2364 
2365 void
2366 elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
2367 {
2368   struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2369 
2370   if (htab == NULL)
2371     return;
2372 
2373   if (isec->output_section->index <= htab->top_index)
2374     {
2375       asection **list = htab->input_list + isec->output_section->index;
2376       if (*list != bfd_abs_section_ptr)
2377 	{
2378 	  /* Steal the link_sec pointer for our list.  */
2379 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
2380 	  /* This happens to make the list in reverse order,
2381 	     which is what we want.  */
2382 	  PREV_SEC (isec) = *list;
2383 	  *list = isec;
2384 	}
2385     }
2386 }
2387 
2388 /* See whether we can group stub sections together.  Grouping stub
2389    sections may result in fewer stubs.  More importantly, we need to
2390    put all .init* and .fini* stubs at the beginning of the .init or
2391    .fini output sections respectively, because glibc splits the
2392    _init and _fini functions into multiple parts.  Putting a stub in
2393    the middle of a function is not a good idea.  */
2394 
2395 static void
2396 group_sections (struct elf32_hppa_link_hash_table *htab,
2397 		bfd_size_type stub_group_size,
2398 		bfd_boolean stubs_always_before_branch)
2399 {
2400   asection **list = htab->input_list + htab->top_index;
2401   do
2402     {
2403       asection *tail = *list;
2404       if (tail == bfd_abs_section_ptr)
2405 	continue;
2406       while (tail != NULL)
2407 	{
2408 	  asection *curr;
2409 	  asection *prev;
2410 	  bfd_size_type total;
2411 	  bfd_boolean big_sec;
2412 
2413 	  curr = tail;
2414 	  total = tail->size;
2415 	  big_sec = total >= stub_group_size;
2416 
2417 	  while ((prev = PREV_SEC (curr)) != NULL
2418 		 && ((total += curr->output_offset - prev->output_offset)
2419 		     < stub_group_size))
2420 	    curr = prev;
2421 
2422 	  /* OK, the size from the start of CURR to the end is less
2423 	     than 240000 bytes and thus can be handled by one stub
2424 	     section.  (or the tail section is itself larger than
2425 	     240000 bytes, in which case we may be toast.)
2426 	     We should really be keeping track of the total size of
2427 	     stubs added here, as stubs contribute to the final output
2428 	     section size.  That's a little tricky, and this way will
2429 	     only break if stubs added total more than 22144 bytes, or
2430 	     2768 long branch stubs.  It seems unlikely for more than
2431 	     2768 different functions to be called, especially from
2432 	     code only 240000 bytes long.  This limit used to be
2433 	     250000, but c++ code tends to generate lots of little
2434 	     functions, and sometimes violated the assumption.  */
2435 	  do
2436 	    {
2437 	      prev = PREV_SEC (tail);
2438 	      /* Set up this stub group.  */
2439 	      htab->stub_group[tail->id].link_sec = curr;
2440 	    }
2441 	  while (tail != curr && (tail = prev) != NULL);
2442 
2443 	  /* But wait, there's more!  Input sections up to 240000
2444 	     bytes before the stub section can be handled by it too.
2445 	     Don't do this if we have a really large section after the
2446 	     stubs, as adding more stubs increases the chance that
2447 	     branches may not reach into the stub section.  */
2448 	  if (!stubs_always_before_branch && !big_sec)
2449 	    {
2450 	      total = 0;
2451 	      while (prev != NULL
2452 		     && ((total += tail->output_offset - prev->output_offset)
2453 			 < stub_group_size))
2454 		{
2455 		  tail = prev;
2456 		  prev = PREV_SEC (tail);
2457 		  htab->stub_group[tail->id].link_sec = curr;
2458 		}
2459 	    }
2460 	  tail = prev;
2461 	}
2462     }
2463   while (list-- != htab->input_list);
2464   free (htab->input_list);
2465 #undef PREV_SEC
2466 }
2467 
2468 /* Read in all local syms for all input bfds, and create hash entries
2469    for export stubs if we are building a multi-subspace shared lib.
2470    Returns -1 on error, 1 if export stubs created, 0 otherwise.  */
2471 
2472 static int
2473 get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
2474 {
2475   unsigned int bfd_indx;
2476   Elf_Internal_Sym *local_syms, **all_local_syms;
2477   int stub_changed = 0;
2478   struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2479 
2480   if (htab == NULL)
2481     return -1;
2482 
2483   /* We want to read in symbol extension records only once.  To do this
2484      we need to read in the local symbols in parallel and save them for
2485      later use; so hold pointers to the local symbols in an array.  */
2486   size_t amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
2487   all_local_syms = bfd_zmalloc (amt);
2488   htab->all_local_syms = all_local_syms;
2489   if (all_local_syms == NULL)
2490     return -1;
2491 
2492   /* Walk over all the input BFDs, swapping in local symbols.
2493      If we are creating a shared library, create hash entries for the
2494      export stubs.  */
2495   for (bfd_indx = 0;
2496        input_bfd != NULL;
2497        input_bfd = input_bfd->link.next, bfd_indx++)
2498     {
2499       Elf_Internal_Shdr *symtab_hdr;
2500 
2501       /* We'll need the symbol table in a second.  */
2502       symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2503       if (symtab_hdr->sh_info == 0)
2504 	continue;
2505 
2506       /* We need an array of the local symbols attached to the input bfd.  */
2507       local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
2508       if (local_syms == NULL)
2509 	{
2510 	  local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2511 					     symtab_hdr->sh_info, 0,
2512 					     NULL, NULL, NULL);
2513 	  /* Cache them for elf_link_input_bfd.  */
2514 	  symtab_hdr->contents = (unsigned char *) local_syms;
2515 	}
2516       if (local_syms == NULL)
2517 	return -1;
2518 
2519       all_local_syms[bfd_indx] = local_syms;
2520 
2521       if (bfd_link_pic (info) && htab->multi_subspace)
2522 	{
2523 	  struct elf_link_hash_entry **eh_syms;
2524 	  struct elf_link_hash_entry **eh_symend;
2525 	  unsigned int symcount;
2526 
2527 	  symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2528 		      - symtab_hdr->sh_info);
2529 	  eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2530 	  eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
2531 
2532 	  /* Look through the global syms for functions;  We need to
2533 	     build export stubs for all globally visible functions.  */
2534 	  for (; eh_syms < eh_symend; eh_syms++)
2535 	    {
2536 	      struct elf32_hppa_link_hash_entry *hh;
2537 
2538 	      hh = hppa_elf_hash_entry (*eh_syms);
2539 
2540 	      while (hh->eh.root.type == bfd_link_hash_indirect
2541 		     || hh->eh.root.type == bfd_link_hash_warning)
2542 		   hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2543 
2544 	      /* At this point in the link, undefined syms have been
2545 		 resolved, so we need to check that the symbol was
2546 		 defined in this BFD.  */
2547 	      if ((hh->eh.root.type == bfd_link_hash_defined
2548 		   || hh->eh.root.type == bfd_link_hash_defweak)
2549 		  && hh->eh.type == STT_FUNC
2550 		  && hh->eh.root.u.def.section->output_section != NULL
2551 		  && (hh->eh.root.u.def.section->output_section->owner
2552 		      == output_bfd)
2553 		  && hh->eh.root.u.def.section->owner == input_bfd
2554 		  && hh->eh.def_regular
2555 		  && !hh->eh.forced_local
2556 		  && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
2557 		{
2558 		  asection *sec;
2559 		  const char *stub_name;
2560 		  struct elf32_hppa_stub_hash_entry *hsh;
2561 
2562 		  sec = hh->eh.root.u.def.section;
2563 		  stub_name = hh_name (hh);
2564 		  hsh = hppa_stub_hash_lookup (&htab->bstab,
2565 						      stub_name,
2566 						      FALSE, FALSE);
2567 		  if (hsh == NULL)
2568 		    {
2569 		      hsh = hppa_add_stub (stub_name, sec, htab);
2570 		      if (!hsh)
2571 			return -1;
2572 
2573 		      hsh->target_value = hh->eh.root.u.def.value;
2574 		      hsh->target_section = hh->eh.root.u.def.section;
2575 		      hsh->stub_type = hppa_stub_export;
2576 		      hsh->hh = hh;
2577 		      stub_changed = 1;
2578 		    }
2579 		  else
2580 		    {
2581 		      /* xgettext:c-format */
2582 		      _bfd_error_handler (_("%pB: duplicate export stub %s"),
2583 					  input_bfd, stub_name);
2584 		    }
2585 		}
2586 	    }
2587 	}
2588     }
2589 
2590   return stub_changed;
2591 }
2592 
2593 /* Determine and set the size of the stub section for a final link.
2594 
2595    The basic idea here is to examine all the relocations looking for
2596    PC-relative calls to a target that is unreachable with a "bl"
2597    instruction.  */
2598 
2599 bfd_boolean
2600 elf32_hppa_size_stubs
2601   (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2602    bfd_boolean multi_subspace, bfd_signed_vma group_size,
2603    asection * (*add_stub_section) (const char *, asection *),
2604    void (*layout_sections_again) (void))
2605 {
2606   bfd_size_type stub_group_size;
2607   bfd_boolean stubs_always_before_branch;
2608   bfd_boolean stub_changed;
2609   struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2610 
2611   if (htab == NULL)
2612     return FALSE;
2613 
2614   /* Stash our params away.  */
2615   htab->stub_bfd = stub_bfd;
2616   htab->multi_subspace = multi_subspace;
2617   htab->add_stub_section = add_stub_section;
2618   htab->layout_sections_again = layout_sections_again;
2619   stubs_always_before_branch = group_size < 0;
2620   if (group_size < 0)
2621     stub_group_size = -group_size;
2622   else
2623     stub_group_size = group_size;
2624   if (stub_group_size == 1)
2625     {
2626       /* Default values.  */
2627       if (stubs_always_before_branch)
2628 	{
2629 	  stub_group_size = 7680000;
2630 	  if (htab->has_17bit_branch || htab->multi_subspace)
2631 	    stub_group_size = 240000;
2632 	  if (htab->has_12bit_branch)
2633 	    stub_group_size = 7500;
2634 	}
2635       else
2636 	{
2637 	  stub_group_size = 6971392;
2638 	  if (htab->has_17bit_branch || htab->multi_subspace)
2639 	    stub_group_size = 217856;
2640 	  if (htab->has_12bit_branch)
2641 	    stub_group_size = 6808;
2642 	}
2643     }
2644 
2645   group_sections (htab, stub_group_size, stubs_always_before_branch);
2646 
2647   switch (get_local_syms (output_bfd, info->input_bfds, info))
2648     {
2649     default:
2650       if (htab->all_local_syms)
2651 	goto error_ret_free_local;
2652       return FALSE;
2653 
2654     case 0:
2655       stub_changed = FALSE;
2656       break;
2657 
2658     case 1:
2659       stub_changed = TRUE;
2660       break;
2661     }
2662 
2663   while (1)
2664     {
2665       bfd *input_bfd;
2666       unsigned int bfd_indx;
2667       asection *stub_sec;
2668 
2669       for (input_bfd = info->input_bfds, bfd_indx = 0;
2670 	   input_bfd != NULL;
2671 	   input_bfd = input_bfd->link.next, bfd_indx++)
2672 	{
2673 	  Elf_Internal_Shdr *symtab_hdr;
2674 	  asection *section;
2675 	  Elf_Internal_Sym *local_syms;
2676 
2677 	  /* We'll need the symbol table in a second.  */
2678 	  symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2679 	  if (symtab_hdr->sh_info == 0)
2680 	    continue;
2681 
2682 	  local_syms = htab->all_local_syms[bfd_indx];
2683 
2684 	  /* Walk over each section attached to the input bfd.  */
2685 	  for (section = input_bfd->sections;
2686 	       section != NULL;
2687 	       section = section->next)
2688 	    {
2689 	      Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2690 
2691 	      /* If there aren't any relocs, then there's nothing more
2692 		 to do.  */
2693 	      if ((section->flags & SEC_RELOC) == 0
2694 		  || (section->flags & SEC_ALLOC) == 0
2695 		  || (section->flags & SEC_LOAD) == 0
2696 		  || (section->flags & SEC_CODE) == 0
2697 		  || section->reloc_count == 0)
2698 		continue;
2699 
2700 	      /* If this section is a link-once section that will be
2701 		 discarded, then don't create any stubs.  */
2702 	      if (section->output_section == NULL
2703 		  || section->output_section->owner != output_bfd)
2704 		continue;
2705 
2706 	      /* Get the relocs.  */
2707 	      internal_relocs
2708 		= _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
2709 					     info->keep_memory);
2710 	      if (internal_relocs == NULL)
2711 		goto error_ret_free_local;
2712 
2713 	      /* Now examine each relocation.  */
2714 	      irela = internal_relocs;
2715 	      irelaend = irela + section->reloc_count;
2716 	      for (; irela < irelaend; irela++)
2717 		{
2718 		  unsigned int r_type, r_indx;
2719 		  enum elf32_hppa_stub_type stub_type;
2720 		  struct elf32_hppa_stub_hash_entry *hsh;
2721 		  asection *sym_sec;
2722 		  bfd_vma sym_value;
2723 		  bfd_vma destination;
2724 		  struct elf32_hppa_link_hash_entry *hh;
2725 		  char *stub_name;
2726 		  const asection *id_sec;
2727 
2728 		  r_type = ELF32_R_TYPE (irela->r_info);
2729 		  r_indx = ELF32_R_SYM (irela->r_info);
2730 
2731 		  if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2732 		    {
2733 		      bfd_set_error (bfd_error_bad_value);
2734 		    error_ret_free_internal:
2735 		      if (elf_section_data (section)->relocs == NULL)
2736 			free (internal_relocs);
2737 		      goto error_ret_free_local;
2738 		    }
2739 
2740 		  /* Only look for stubs on call instructions.  */
2741 		  if (r_type != (unsigned int) R_PARISC_PCREL12F
2742 		      && r_type != (unsigned int) R_PARISC_PCREL17F
2743 		      && r_type != (unsigned int) R_PARISC_PCREL22F)
2744 		    continue;
2745 
2746 		  /* Now determine the call target, its name, value,
2747 		     section.  */
2748 		  sym_sec = NULL;
2749 		  sym_value = 0;
2750 		  destination = -1;
2751 		  hh = NULL;
2752 		  if (r_indx < symtab_hdr->sh_info)
2753 		    {
2754 		      /* It's a local symbol.  */
2755 		      Elf_Internal_Sym *sym;
2756 		      Elf_Internal_Shdr *hdr;
2757 		      unsigned int shndx;
2758 
2759 		      sym = local_syms + r_indx;
2760 		      if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2761 			sym_value = sym->st_value;
2762 		      shndx = sym->st_shndx;
2763 		      if (shndx < elf_numsections (input_bfd))
2764 			{
2765 			  hdr = elf_elfsections (input_bfd)[shndx];
2766 			  sym_sec = hdr->bfd_section;
2767 			  destination = (sym_value + irela->r_addend
2768 					 + sym_sec->output_offset
2769 					 + sym_sec->output_section->vma);
2770 			}
2771 		    }
2772 		  else
2773 		    {
2774 		      /* It's an external symbol.  */
2775 		      int e_indx;
2776 
2777 		      e_indx = r_indx - symtab_hdr->sh_info;
2778 		      hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
2779 
2780 		      while (hh->eh.root.type == bfd_link_hash_indirect
2781 			     || hh->eh.root.type == bfd_link_hash_warning)
2782 			hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2783 
2784 		      if (hh->eh.root.type == bfd_link_hash_defined
2785 			  || hh->eh.root.type == bfd_link_hash_defweak)
2786 			{
2787 			  sym_sec = hh->eh.root.u.def.section;
2788 			  sym_value = hh->eh.root.u.def.value;
2789 			  if (sym_sec->output_section != NULL)
2790 			    destination = (sym_value + irela->r_addend
2791 					   + sym_sec->output_offset
2792 					   + sym_sec->output_section->vma);
2793 			}
2794 		      else if (hh->eh.root.type == bfd_link_hash_undefweak)
2795 			{
2796 			  if (! bfd_link_pic (info))
2797 			    continue;
2798 			}
2799 		      else if (hh->eh.root.type == bfd_link_hash_undefined)
2800 			{
2801 			  if (! (info->unresolved_syms_in_objects == RM_IGNORE
2802 				 && (ELF_ST_VISIBILITY (hh->eh.other)
2803 				     == STV_DEFAULT)
2804 				 && hh->eh.type != STT_PARISC_MILLI))
2805 			    continue;
2806 			}
2807 		      else
2808 			{
2809 			  bfd_set_error (bfd_error_bad_value);
2810 			  goto error_ret_free_internal;
2811 			}
2812 		    }
2813 
2814 		  /* Determine what (if any) linker stub is needed.  */
2815 		  stub_type = hppa_type_of_stub (section, irela, hh,
2816 						 destination, info);
2817 		  if (stub_type == hppa_stub_none)
2818 		    continue;
2819 
2820 		  /* Support for grouping stub sections.  */
2821 		  id_sec = htab->stub_group[section->id].link_sec;
2822 
2823 		  /* Get the name of this stub.  */
2824 		  stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
2825 		  if (!stub_name)
2826 		    goto error_ret_free_internal;
2827 
2828 		  hsh = hppa_stub_hash_lookup (&htab->bstab,
2829 						      stub_name,
2830 						      FALSE, FALSE);
2831 		  if (hsh != NULL)
2832 		    {
2833 		      /* The proper stub has already been created.  */
2834 		      free (stub_name);
2835 		      continue;
2836 		    }
2837 
2838 		  hsh = hppa_add_stub (stub_name, section, htab);
2839 		  if (hsh == NULL)
2840 		    {
2841 		      free (stub_name);
2842 		      goto error_ret_free_internal;
2843 		    }
2844 
2845 		  hsh->target_value = sym_value;
2846 		  hsh->target_section = sym_sec;
2847 		  hsh->stub_type = stub_type;
2848 		  if (bfd_link_pic (info))
2849 		    {
2850 		      if (stub_type == hppa_stub_import)
2851 			hsh->stub_type = hppa_stub_import_shared;
2852 		      else if (stub_type == hppa_stub_long_branch)
2853 			hsh->stub_type = hppa_stub_long_branch_shared;
2854 		    }
2855 		  hsh->hh = hh;
2856 		  stub_changed = TRUE;
2857 		}
2858 
2859 	      /* We're done with the internal relocs, free them.  */
2860 	      if (elf_section_data (section)->relocs == NULL)
2861 		free (internal_relocs);
2862 	    }
2863 	}
2864 
2865       if (!stub_changed)
2866 	break;
2867 
2868       /* OK, we've added some stubs.  Find out the new size of the
2869 	 stub sections.  */
2870       for (stub_sec = htab->stub_bfd->sections;
2871 	   stub_sec != NULL;
2872 	   stub_sec = stub_sec->next)
2873 	if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
2874 	  stub_sec->size = 0;
2875 
2876       bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
2877 
2878       /* Ask the linker to do its stuff.  */
2879       (*htab->layout_sections_again) ();
2880       stub_changed = FALSE;
2881     }
2882 
2883   free (htab->all_local_syms);
2884   return TRUE;
2885 
2886  error_ret_free_local:
2887   free (htab->all_local_syms);
2888   return FALSE;
2889 }
2890 
2891 /* For a final link, this function is called after we have sized the
2892    stubs to provide a value for __gp.  */
2893 
2894 bfd_boolean
2895 elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
2896 {
2897   struct bfd_link_hash_entry *h;
2898   asection *sec = NULL;
2899   bfd_vma gp_val = 0;
2900 
2901   h = bfd_link_hash_lookup (info->hash, "$global$", FALSE, FALSE, FALSE);
2902 
2903   if (h != NULL
2904       && (h->type == bfd_link_hash_defined
2905 	  || h->type == bfd_link_hash_defweak))
2906     {
2907       gp_val = h->u.def.value;
2908       sec = h->u.def.section;
2909     }
2910   else
2911     {
2912       asection *splt = bfd_get_section_by_name (abfd, ".plt");
2913       asection *sgot = bfd_get_section_by_name (abfd, ".got");
2914 
2915       /* Choose to point our LTP at, in this order, one of .plt, .got,
2916 	 or .data, if these sections exist.  In the case of choosing
2917 	 .plt try to make the LTP ideal for addressing anywhere in the
2918 	 .plt or .got with a 14 bit signed offset.  Typically, the end
2919 	 of the .plt is the start of the .got, so choose .plt + 0x2000
2920 	 if either the .plt or .got is larger than 0x2000.  If both
2921 	 the .plt and .got are smaller than 0x2000, choose the end of
2922 	 the .plt section.  */
2923       sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
2924 	  ? NULL : splt;
2925       if (sec != NULL)
2926 	{
2927 	  gp_val = sec->size;
2928 	  if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
2929 	    {
2930 	      gp_val = 0x2000;
2931 	    }
2932 	}
2933       else
2934 	{
2935 	  sec = sgot;
2936 	  if (sec != NULL)
2937 	    {
2938 	      if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
2939 		{
2940 		  /* We know we don't have a .plt.  If .got is large,
2941 		     offset our LTP.  */
2942 		  if (sec->size > 0x2000)
2943 		    gp_val = 0x2000;
2944 		}
2945 	    }
2946 	  else
2947 	    {
2948 	      /* No .plt or .got.  Who cares what the LTP is?  */
2949 	      sec = bfd_get_section_by_name (abfd, ".data");
2950 	    }
2951 	}
2952 
2953       if (h != NULL)
2954 	{
2955 	  h->type = bfd_link_hash_defined;
2956 	  h->u.def.value = gp_val;
2957 	  if (sec != NULL)
2958 	    h->u.def.section = sec;
2959 	  else
2960 	    h->u.def.section = bfd_abs_section_ptr;
2961 	}
2962     }
2963 
2964   if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
2965     {
2966       if (sec != NULL && sec->output_section != NULL)
2967 	gp_val += sec->output_section->vma + sec->output_offset;
2968 
2969       elf_gp (abfd) = gp_val;
2970     }
2971   return TRUE;
2972 }
2973 
2974 /* Build all the stubs associated with the current output file.  The
2975    stubs are kept in a hash table attached to the main linker hash
2976    table.  We also set up the .plt entries for statically linked PIC
2977    functions here.  This function is called via hppaelf_finish in the
2978    linker.  */
2979 
2980 bfd_boolean
2981 elf32_hppa_build_stubs (struct bfd_link_info *info)
2982 {
2983   asection *stub_sec;
2984   struct bfd_hash_table *table;
2985   struct elf32_hppa_link_hash_table *htab;
2986 
2987   htab = hppa_link_hash_table (info);
2988   if (htab == NULL)
2989     return FALSE;
2990 
2991   for (stub_sec = htab->stub_bfd->sections;
2992        stub_sec != NULL;
2993        stub_sec = stub_sec->next)
2994     if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
2995 	&& stub_sec->size != 0)
2996       {
2997 	/* Allocate memory to hold the linker stubs.  */
2998 	stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
2999 	if (stub_sec->contents == NULL)
3000 	  return FALSE;
3001 	stub_sec->size = 0;
3002       }
3003 
3004   /* Build the stubs as directed by the stub hash table.  */
3005   table = &htab->bstab;
3006   bfd_hash_traverse (table, hppa_build_one_stub, info);
3007 
3008   return TRUE;
3009 }
3010 
3011 /* Return the base vma address which should be subtracted from the real
3012    address when resolving a dtpoff relocation.
3013    This is PT_TLS segment p_vaddr.  */
3014 
3015 static bfd_vma
3016 dtpoff_base (struct bfd_link_info *info)
3017 {
3018   /* If tls_sec is NULL, we should have signalled an error already.  */
3019   if (elf_hash_table (info)->tls_sec == NULL)
3020     return 0;
3021   return elf_hash_table (info)->tls_sec->vma;
3022 }
3023 
3024 /* Return the relocation value for R_PARISC_TLS_TPOFF*..  */
3025 
3026 static bfd_vma
3027 tpoff (struct bfd_link_info *info, bfd_vma address)
3028 {
3029   struct elf_link_hash_table *htab = elf_hash_table (info);
3030 
3031   /* If tls_sec is NULL, we should have signalled an error already.  */
3032   if (htab->tls_sec == NULL)
3033     return 0;
3034   /* hppa TLS ABI is variant I and static TLS block start just after
3035      tcbhead structure which has 2 pointer fields.  */
3036   return (address - htab->tls_sec->vma
3037 	  + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3038 }
3039 
3040 /* Perform a final link.  */
3041 
3042 static bfd_boolean
3043 elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
3044 {
3045   struct stat buf;
3046 
3047   /* Invoke the regular ELF linker to do all the work.  */
3048   if (!bfd_elf_final_link (abfd, info))
3049     return FALSE;
3050 
3051   /* If we're producing a final executable, sort the contents of the
3052      unwind section.  */
3053   if (bfd_link_relocatable (info))
3054     return TRUE;
3055 
3056   /* Do not attempt to sort non-regular files.  This is here
3057      especially for configure scripts and kernel builds which run
3058      tests with "ld [...] -o /dev/null".  */
3059   if (stat (bfd_get_filename (abfd), &buf) != 0
3060       || !S_ISREG(buf.st_mode))
3061     return TRUE;
3062 
3063   return elf_hppa_sort_unwind (abfd);
3064 }
3065 
3066 /* Record the lowest address for the data and text segments.  */
3067 
3068 static void
3069 hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
3070 {
3071   struct elf32_hppa_link_hash_table *htab;
3072 
3073   htab = (struct elf32_hppa_link_hash_table*) data;
3074   if (htab == NULL)
3075     return;
3076 
3077   if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3078     {
3079       bfd_vma value;
3080       Elf_Internal_Phdr *p;
3081 
3082       p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3083       BFD_ASSERT (p != NULL);
3084       value = p->p_vaddr;
3085 
3086       if ((section->flags & SEC_READONLY) != 0)
3087 	{
3088 	  if (value < htab->text_segment_base)
3089 	    htab->text_segment_base = value;
3090 	}
3091       else
3092 	{
3093 	  if (value < htab->data_segment_base)
3094 	    htab->data_segment_base = value;
3095 	}
3096     }
3097 }
3098 
3099 /* Perform a relocation as part of a final link.  */
3100 
3101 static bfd_reloc_status_type
3102 final_link_relocate (asection *input_section,
3103 		     bfd_byte *contents,
3104 		     const Elf_Internal_Rela *rela,
3105 		     bfd_vma value,
3106 		     struct elf32_hppa_link_hash_table *htab,
3107 		     asection *sym_sec,
3108 		     struct elf32_hppa_link_hash_entry *hh,
3109 		     struct bfd_link_info *info)
3110 {
3111   unsigned int insn;
3112   unsigned int r_type = ELF32_R_TYPE (rela->r_info);
3113   unsigned int orig_r_type = r_type;
3114   reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3115   int r_format = howto->bitsize;
3116   enum hppa_reloc_field_selector_type_alt r_field;
3117   bfd *input_bfd = input_section->owner;
3118   bfd_vma offset = rela->r_offset;
3119   bfd_vma max_branch_offset = 0;
3120   bfd_byte *hit_data = contents + offset;
3121   bfd_signed_vma addend = rela->r_addend;
3122   bfd_vma location;
3123   struct elf32_hppa_stub_hash_entry *hsh = NULL;
3124   int val;
3125 
3126   if (r_type == R_PARISC_NONE)
3127     return bfd_reloc_ok;
3128 
3129   insn = bfd_get_32 (input_bfd, hit_data);
3130 
3131   /* Find out where we are and where we're going.  */
3132   location = (offset +
3133 	      input_section->output_offset +
3134 	      input_section->output_section->vma);
3135 
3136   /* If we are not building a shared library, convert DLTIND relocs to
3137      DPREL relocs.  */
3138   if (!bfd_link_pic (info))
3139     {
3140       switch (r_type)
3141 	{
3142 	  case R_PARISC_DLTIND21L:
3143 	  case R_PARISC_TLS_GD21L:
3144 	  case R_PARISC_TLS_LDM21L:
3145 	  case R_PARISC_TLS_IE21L:
3146 	    r_type = R_PARISC_DPREL21L;
3147 	    break;
3148 
3149 	  case R_PARISC_DLTIND14R:
3150 	  case R_PARISC_TLS_GD14R:
3151 	  case R_PARISC_TLS_LDM14R:
3152 	  case R_PARISC_TLS_IE14R:
3153 	    r_type = R_PARISC_DPREL14R;
3154 	    break;
3155 
3156 	  case R_PARISC_DLTIND14F:
3157 	    r_type = R_PARISC_DPREL14F;
3158 	    break;
3159 	}
3160     }
3161 
3162   switch (r_type)
3163     {
3164     case R_PARISC_PCREL12F:
3165     case R_PARISC_PCREL17F:
3166     case R_PARISC_PCREL22F:
3167       /* If this call should go via the plt, find the import stub in
3168 	 the stub hash.  */
3169       if (sym_sec == NULL
3170 	  || sym_sec->output_section == NULL
3171 	  || (hh != NULL
3172 	      && hh->eh.plt.offset != (bfd_vma) -1
3173 	      && hh->eh.dynindx != -1
3174 	      && !hh->plabel
3175 	      && (bfd_link_pic (info)
3176 		  || !hh->eh.def_regular
3177 		  || hh->eh.root.type == bfd_link_hash_defweak)))
3178 	{
3179 	  hsh = hppa_get_stub_entry (input_section, sym_sec,
3180 				     hh, rela, htab);
3181 	  if (hsh != NULL)
3182 	    {
3183 	      value = (hsh->stub_offset
3184 		       + hsh->stub_sec->output_offset
3185 		       + hsh->stub_sec->output_section->vma);
3186 	      addend = 0;
3187 	    }
3188 	  else if (sym_sec == NULL && hh != NULL
3189 		   && hh->eh.root.type == bfd_link_hash_undefweak)
3190 	    {
3191 	      /* It's OK if undefined weak.  Calls to undefined weak
3192 		 symbols behave as if the "called" function
3193 		 immediately returns.  We can thus call to a weak
3194 		 function without first checking whether the function
3195 		 is defined.  */
3196 	      value = location;
3197 	      addend = 8;
3198 	    }
3199 	  else
3200 	    return bfd_reloc_undefined;
3201 	}
3202       /* Fall thru.  */
3203 
3204     case R_PARISC_PCREL21L:
3205     case R_PARISC_PCREL17C:
3206     case R_PARISC_PCREL17R:
3207     case R_PARISC_PCREL14R:
3208     case R_PARISC_PCREL14F:
3209     case R_PARISC_PCREL32:
3210       /* Make it a pc relative offset.  */
3211       value -= location;
3212       addend -= 8;
3213       break;
3214 
3215     case R_PARISC_DPREL21L:
3216     case R_PARISC_DPREL14R:
3217     case R_PARISC_DPREL14F:
3218       /* Convert instructions that use the linkage table pointer (r19) to
3219 	 instructions that use the global data pointer (dp).  This is the
3220 	 most efficient way of using PIC code in an incomplete executable,
3221 	 but the user must follow the standard runtime conventions for
3222 	 accessing data for this to work.  */
3223       if (orig_r_type != r_type)
3224 	{
3225 	  if (r_type == R_PARISC_DPREL21L)
3226 	    {
3227 	      /* GCC sometimes uses a register other than r19 for the
3228 		 operation, so we must convert any addil instruction
3229 		 that uses this relocation.  */
3230 	      if ((insn & 0xfc000000) == OP_ADDIL << 26)
3231 		insn = ADDIL_DP;
3232 	      else
3233 		/* We must have a ldil instruction.  It's too hard to find
3234 		   and convert the associated add instruction, so issue an
3235 		   error.  */
3236 		_bfd_error_handler
3237 		  /* xgettext:c-format */
3238 		  (_("%pB(%pA+%#" PRIx64 "): %s fixup for insn %#x "
3239 		     "is not supported in a non-shared link"),
3240 		   input_bfd,
3241 		   input_section,
3242 		   (uint64_t) offset,
3243 		   howto->name,
3244 		   insn);
3245 	    }
3246 	  else if (r_type == R_PARISC_DPREL14F)
3247 	    {
3248 	      /* This must be a format 1 load/store.  Change the base
3249 		 register to dp.  */
3250 	      insn = (insn & 0xfc1ffff) | (27 << 21);
3251 	    }
3252 	}
3253 
3254       /* For all the DP relative relocations, we need to examine the symbol's
3255 	 section.  If it has no section or if it's a code section, then
3256 	 "data pointer relative" makes no sense.  In that case we don't
3257 	 adjust the "value", and for 21 bit addil instructions, we change the
3258 	 source addend register from %dp to %r0.  This situation commonly
3259 	 arises for undefined weak symbols and when a variable's "constness"
3260 	 is declared differently from the way the variable is defined.  For
3261 	 instance: "extern int foo" with foo defined as "const int foo".  */
3262       if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
3263 	{
3264 	  if ((insn & ((0x3fu << 26) | (0x1f << 21)))
3265 	      == ((OP_ADDIL << 26) | (27 << 21)))
3266 	    {
3267 	      insn &= ~ (0x1f << 21);
3268 	    }
3269 	  /* Now try to make things easy for the dynamic linker.  */
3270 
3271 	  break;
3272 	}
3273       /* Fall thru.  */
3274 
3275     case R_PARISC_DLTIND21L:
3276     case R_PARISC_DLTIND14R:
3277     case R_PARISC_DLTIND14F:
3278     case R_PARISC_TLS_GD21L:
3279     case R_PARISC_TLS_LDM21L:
3280     case R_PARISC_TLS_IE21L:
3281     case R_PARISC_TLS_GD14R:
3282     case R_PARISC_TLS_LDM14R:
3283     case R_PARISC_TLS_IE14R:
3284       value -= elf_gp (input_section->output_section->owner);
3285       break;
3286 
3287     case R_PARISC_SEGREL32:
3288       if ((sym_sec->flags & SEC_CODE) != 0)
3289 	value -= htab->text_segment_base;
3290       else
3291 	value -= htab->data_segment_base;
3292       break;
3293 
3294     default:
3295       break;
3296     }
3297 
3298   switch (r_type)
3299     {
3300     case R_PARISC_DIR32:
3301     case R_PARISC_DIR14F:
3302     case R_PARISC_DIR17F:
3303     case R_PARISC_PCREL17C:
3304     case R_PARISC_PCREL14F:
3305     case R_PARISC_PCREL32:
3306     case R_PARISC_DPREL14F:
3307     case R_PARISC_PLABEL32:
3308     case R_PARISC_DLTIND14F:
3309     case R_PARISC_SEGBASE:
3310     case R_PARISC_SEGREL32:
3311     case R_PARISC_TLS_DTPMOD32:
3312     case R_PARISC_TLS_DTPOFF32:
3313     case R_PARISC_TLS_TPREL32:
3314       r_field = e_fsel;
3315       break;
3316 
3317     case R_PARISC_DLTIND21L:
3318     case R_PARISC_PCREL21L:
3319     case R_PARISC_PLABEL21L:
3320       r_field = e_lsel;
3321       break;
3322 
3323     case R_PARISC_DIR21L:
3324     case R_PARISC_DPREL21L:
3325     case R_PARISC_TLS_GD21L:
3326     case R_PARISC_TLS_LDM21L:
3327     case R_PARISC_TLS_LDO21L:
3328     case R_PARISC_TLS_IE21L:
3329     case R_PARISC_TLS_LE21L:
3330       r_field = e_lrsel;
3331       break;
3332 
3333     case R_PARISC_PCREL17R:
3334     case R_PARISC_PCREL14R:
3335     case R_PARISC_PLABEL14R:
3336     case R_PARISC_DLTIND14R:
3337       r_field = e_rsel;
3338       break;
3339 
3340     case R_PARISC_DIR17R:
3341     case R_PARISC_DIR14R:
3342     case R_PARISC_DPREL14R:
3343     case R_PARISC_TLS_GD14R:
3344     case R_PARISC_TLS_LDM14R:
3345     case R_PARISC_TLS_LDO14R:
3346     case R_PARISC_TLS_IE14R:
3347     case R_PARISC_TLS_LE14R:
3348       r_field = e_rrsel;
3349       break;
3350 
3351     case R_PARISC_PCREL12F:
3352     case R_PARISC_PCREL17F:
3353     case R_PARISC_PCREL22F:
3354       r_field = e_fsel;
3355 
3356       if (r_type == (unsigned int) R_PARISC_PCREL17F)
3357 	{
3358 	  max_branch_offset = (1 << (17-1)) << 2;
3359 	}
3360       else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3361 	{
3362 	  max_branch_offset = (1 << (12-1)) << 2;
3363 	}
3364       else
3365 	{
3366 	  max_branch_offset = (1 << (22-1)) << 2;
3367 	}
3368 
3369       /* sym_sec is NULL on undefined weak syms or when shared on
3370 	 undefined syms.  We've already checked for a stub for the
3371 	 shared undefined case.  */
3372       if (sym_sec == NULL)
3373 	break;
3374 
3375       /* If the branch is out of reach, then redirect the
3376 	 call to the local stub for this function.  */
3377       if (value + addend + max_branch_offset >= 2*max_branch_offset)
3378 	{
3379 	  hsh = hppa_get_stub_entry (input_section, sym_sec,
3380 				     hh, rela, htab);
3381 	  if (hsh == NULL)
3382 	    return bfd_reloc_undefined;
3383 
3384 	  /* Munge up the value and addend so that we call the stub
3385 	     rather than the procedure directly.  */
3386 	  value = (hsh->stub_offset
3387 		   + hsh->stub_sec->output_offset
3388 		   + hsh->stub_sec->output_section->vma
3389 		   - location);
3390 	  addend = -8;
3391 	}
3392       break;
3393 
3394     /* Something we don't know how to handle.  */
3395     default:
3396       return bfd_reloc_notsupported;
3397     }
3398 
3399   /* Make sure we can reach the stub.  */
3400   if (max_branch_offset != 0
3401       && value + addend + max_branch_offset >= 2*max_branch_offset)
3402     {
3403       _bfd_error_handler
3404 	/* xgettext:c-format */
3405 	(_("%pB(%pA+%#" PRIx64 "): cannot reach %s, "
3406 	   "recompile with -ffunction-sections"),
3407 	 input_bfd,
3408 	 input_section,
3409 	 (uint64_t) offset,
3410 	 hsh->bh_root.string);
3411       bfd_set_error (bfd_error_bad_value);
3412       return bfd_reloc_notsupported;
3413     }
3414 
3415   val = hppa_field_adjust (value, addend, r_field);
3416 
3417   switch (r_type)
3418     {
3419     case R_PARISC_PCREL12F:
3420     case R_PARISC_PCREL17C:
3421     case R_PARISC_PCREL17F:
3422     case R_PARISC_PCREL17R:
3423     case R_PARISC_PCREL22F:
3424     case R_PARISC_DIR17F:
3425     case R_PARISC_DIR17R:
3426       /* This is a branch.  Divide the offset by four.
3427 	 Note that we need to decide whether it's a branch or
3428 	 otherwise by inspecting the reloc.  Inspecting insn won't
3429 	 work as insn might be from a .word directive.  */
3430       val >>= 2;
3431       break;
3432 
3433     default:
3434       break;
3435     }
3436 
3437   insn = hppa_rebuild_insn (insn, val, r_format);
3438 
3439   /* Update the instruction word.  */
3440   bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
3441   return bfd_reloc_ok;
3442 }
3443 
3444 /* Relocate an HPPA ELF section.  */
3445 
3446 static bfd_boolean
3447 elf32_hppa_relocate_section (bfd *output_bfd,
3448 			     struct bfd_link_info *info,
3449 			     bfd *input_bfd,
3450 			     asection *input_section,
3451 			     bfd_byte *contents,
3452 			     Elf_Internal_Rela *relocs,
3453 			     Elf_Internal_Sym *local_syms,
3454 			     asection **local_sections)
3455 {
3456   bfd_vma *local_got_offsets;
3457   struct elf32_hppa_link_hash_table *htab;
3458   Elf_Internal_Shdr *symtab_hdr;
3459   Elf_Internal_Rela *rela;
3460   Elf_Internal_Rela *relend;
3461 
3462   symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3463 
3464   htab = hppa_link_hash_table (info);
3465   if (htab == NULL)
3466     return FALSE;
3467 
3468   local_got_offsets = elf_local_got_offsets (input_bfd);
3469 
3470   rela = relocs;
3471   relend = relocs + input_section->reloc_count;
3472   for (; rela < relend; rela++)
3473     {
3474       unsigned int r_type;
3475       reloc_howto_type *howto;
3476       unsigned int r_symndx;
3477       struct elf32_hppa_link_hash_entry *hh;
3478       Elf_Internal_Sym *sym;
3479       asection *sym_sec;
3480       bfd_vma relocation;
3481       bfd_reloc_status_type rstatus;
3482       const char *sym_name;
3483       bfd_boolean plabel;
3484       bfd_boolean warned_undef;
3485 
3486       r_type = ELF32_R_TYPE (rela->r_info);
3487       if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3488 	{
3489 	  bfd_set_error (bfd_error_bad_value);
3490 	  return FALSE;
3491 	}
3492       if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3493 	  || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3494 	continue;
3495 
3496       r_symndx = ELF32_R_SYM (rela->r_info);
3497       hh = NULL;
3498       sym = NULL;
3499       sym_sec = NULL;
3500       warned_undef = FALSE;
3501       if (r_symndx < symtab_hdr->sh_info)
3502 	{
3503 	  /* This is a local symbol, h defaults to NULL.  */
3504 	  sym = local_syms + r_symndx;
3505 	  sym_sec = local_sections[r_symndx];
3506 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
3507 	}
3508       else
3509 	{
3510 	  struct elf_link_hash_entry *eh;
3511 	  bfd_boolean unresolved_reloc, ignored;
3512 	  struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
3513 
3514 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
3515 				   r_symndx, symtab_hdr, sym_hashes,
3516 				   eh, sym_sec, relocation,
3517 				   unresolved_reloc, warned_undef,
3518 				   ignored);
3519 
3520 	  if (!bfd_link_relocatable (info)
3521 	      && relocation == 0
3522 	      && eh->root.type != bfd_link_hash_defined
3523 	      && eh->root.type != bfd_link_hash_defweak
3524 	      && eh->root.type != bfd_link_hash_undefweak)
3525 	    {
3526 	      if (info->unresolved_syms_in_objects == RM_IGNORE
3527 		  && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3528 		  && eh->type == STT_PARISC_MILLI)
3529 		{
3530 		  (*info->callbacks->undefined_symbol)
3531 		    (info, eh_name (eh), input_bfd,
3532 		     input_section, rela->r_offset, FALSE);
3533 		  warned_undef = TRUE;
3534 		}
3535 	    }
3536 	  hh = hppa_elf_hash_entry (eh);
3537 	}
3538 
3539       if (sym_sec != NULL && discarded_section (sym_sec))
3540 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
3541 					 rela, 1, relend,
3542 					 elf_hppa_howto_table + r_type, 0,
3543 					 contents);
3544 
3545       if (bfd_link_relocatable (info))
3546 	continue;
3547 
3548       /* Do any required modifications to the relocation value, and
3549 	 determine what types of dynamic info we need to output, if
3550 	 any.  */
3551       plabel = 0;
3552       switch (r_type)
3553 	{
3554 	case R_PARISC_DLTIND14F:
3555 	case R_PARISC_DLTIND14R:
3556 	case R_PARISC_DLTIND21L:
3557 	  {
3558 	    bfd_vma off;
3559 	    bfd_boolean do_got = FALSE;
3560 	    bfd_boolean reloc = bfd_link_pic (info);
3561 
3562 	    /* Relocation is to the entry for this symbol in the
3563 	       global offset table.  */
3564 	    if (hh != NULL)
3565 	      {
3566 		bfd_boolean dyn;
3567 
3568 		off = hh->eh.got.offset;
3569 		dyn = htab->etab.dynamic_sections_created;
3570 		reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3571 			 && (reloc
3572 			     || (hh->eh.dynindx != -1
3573 				 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3574 		if (!reloc
3575 		    || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3576 							 bfd_link_pic (info),
3577 							 &hh->eh))
3578 		  {
3579 		    /* If we aren't going to call finish_dynamic_symbol,
3580 		       then we need to handle initialisation of the .got
3581 		       entry and create needed relocs here.  Since the
3582 		       offset must always be a multiple of 4, we use the
3583 		       least significant bit to record whether we have
3584 		       initialised it already.  */
3585 		    if ((off & 1) != 0)
3586 		      off &= ~1;
3587 		    else
3588 		      {
3589 			hh->eh.got.offset |= 1;
3590 			do_got = TRUE;
3591 		      }
3592 		  }
3593 	      }
3594 	    else
3595 	      {
3596 		/* Local symbol case.  */
3597 		if (local_got_offsets == NULL)
3598 		  abort ();
3599 
3600 		off = local_got_offsets[r_symndx];
3601 
3602 		/* The offset must always be a multiple of 4.  We use
3603 		   the least significant bit to record whether we have
3604 		   already generated the necessary reloc.  */
3605 		if ((off & 1) != 0)
3606 		  off &= ~1;
3607 		else
3608 		  {
3609 		    local_got_offsets[r_symndx] |= 1;
3610 		    do_got = TRUE;
3611 		  }
3612 	      }
3613 
3614 	    if (do_got)
3615 	      {
3616 		if (reloc)
3617 		  {
3618 		    /* Output a dynamic relocation for this GOT entry.
3619 		       In this case it is relative to the base of the
3620 		       object because the symbol index is zero.  */
3621 		    Elf_Internal_Rela outrel;
3622 		    bfd_byte *loc;
3623 		    asection *sec = htab->etab.srelgot;
3624 
3625 		    outrel.r_offset = (off
3626 				       + htab->etab.sgot->output_offset
3627 				       + htab->etab.sgot->output_section->vma);
3628 		    outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3629 		    outrel.r_addend = relocation;
3630 		    loc = sec->contents;
3631 		    loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
3632 		    bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3633 		  }
3634 		else
3635 		  bfd_put_32 (output_bfd, relocation,
3636 			      htab->etab.sgot->contents + off);
3637 	      }
3638 
3639 	    if (off >= (bfd_vma) -2)
3640 	      abort ();
3641 
3642 	    /* Add the base of the GOT to the relocation value.  */
3643 	    relocation = (off
3644 			  + htab->etab.sgot->output_offset
3645 			  + htab->etab.sgot->output_section->vma);
3646 	  }
3647 	  break;
3648 
3649 	case R_PARISC_SEGREL32:
3650 	  /* If this is the first SEGREL relocation, then initialize
3651 	     the segment base values.  */
3652 	  if (htab->text_segment_base == (bfd_vma) -1)
3653 	    bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
3654 	  break;
3655 
3656 	case R_PARISC_PLABEL14R:
3657 	case R_PARISC_PLABEL21L:
3658 	case R_PARISC_PLABEL32:
3659 	  if (htab->etab.dynamic_sections_created)
3660 	    {
3661 	      bfd_vma off;
3662 	      bfd_boolean do_plt = 0;
3663 	      /* If we have a global symbol with a PLT slot, then
3664 		 redirect this relocation to it.  */
3665 	      if (hh != NULL)
3666 		{
3667 		  off = hh->eh.plt.offset;
3668 		  if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3669 							 bfd_link_pic (info),
3670 							 &hh->eh))
3671 		    {
3672 		      /* In a non-shared link, adjust_dynamic_symbol
3673 			 isn't called for symbols forced local.  We
3674 			 need to write out the plt entry here.  */
3675 		      if ((off & 1) != 0)
3676 			off &= ~1;
3677 		      else
3678 			{
3679 			  hh->eh.plt.offset |= 1;
3680 			  do_plt = 1;
3681 			}
3682 		    }
3683 		}
3684 	      else
3685 		{
3686 		  bfd_vma *local_plt_offsets;
3687 
3688 		  if (local_got_offsets == NULL)
3689 		    abort ();
3690 
3691 		  local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3692 		  off = local_plt_offsets[r_symndx];
3693 
3694 		  /* As for the local .got entry case, we use the last
3695 		     bit to record whether we've already initialised
3696 		     this local .plt entry.  */
3697 		  if ((off & 1) != 0)
3698 		    off &= ~1;
3699 		  else
3700 		    {
3701 		      local_plt_offsets[r_symndx] |= 1;
3702 		      do_plt = 1;
3703 		    }
3704 		}
3705 
3706 	      if (do_plt)
3707 		{
3708 		  if (bfd_link_pic (info))
3709 		    {
3710 		      /* Output a dynamic IPLT relocation for this
3711 			 PLT entry.  */
3712 		      Elf_Internal_Rela outrel;
3713 		      bfd_byte *loc;
3714 		      asection *s = htab->etab.srelplt;
3715 
3716 		      outrel.r_offset = (off
3717 					 + htab->etab.splt->output_offset
3718 					 + htab->etab.splt->output_section->vma);
3719 		      outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3720 		      outrel.r_addend = relocation;
3721 		      loc = s->contents;
3722 		      loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
3723 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3724 		    }
3725 		  else
3726 		    {
3727 		      bfd_put_32 (output_bfd,
3728 				  relocation,
3729 				  htab->etab.splt->contents + off);
3730 		      bfd_put_32 (output_bfd,
3731 				  elf_gp (htab->etab.splt->output_section->owner),
3732 				  htab->etab.splt->contents + off + 4);
3733 		    }
3734 		}
3735 
3736 	      if (off >= (bfd_vma) -2)
3737 		abort ();
3738 
3739 	      /* PLABELs contain function pointers.  Relocation is to
3740 		 the entry for the function in the .plt.  The magic +2
3741 		 offset signals to $$dyncall that the function pointer
3742 		 is in the .plt and thus has a gp pointer too.
3743 		 Exception:  Undefined PLABELs should have a value of
3744 		 zero.  */
3745 	      if (hh == NULL
3746 		  || (hh->eh.root.type != bfd_link_hash_undefweak
3747 		      && hh->eh.root.type != bfd_link_hash_undefined))
3748 		{
3749 		  relocation = (off
3750 				+ htab->etab.splt->output_offset
3751 				+ htab->etab.splt->output_section->vma
3752 				+ 2);
3753 		}
3754 	      plabel = 1;
3755 	    }
3756 	  /* Fall through.  */
3757 
3758 	case R_PARISC_DIR17F:
3759 	case R_PARISC_DIR17R:
3760 	case R_PARISC_DIR14F:
3761 	case R_PARISC_DIR14R:
3762 	case R_PARISC_DIR21L:
3763 	case R_PARISC_DPREL14F:
3764 	case R_PARISC_DPREL14R:
3765 	case R_PARISC_DPREL21L:
3766 	case R_PARISC_DIR32:
3767 	  if ((input_section->flags & SEC_ALLOC) == 0)
3768 	    break;
3769 
3770 	  if (bfd_link_pic (info)
3771 	      ? ((hh == NULL
3772 		  || hh->eh.dyn_relocs != NULL)
3773 		 && ((hh != NULL && pc_dynrelocs (hh))
3774 		     || IS_ABSOLUTE_RELOC (r_type)))
3775 	      : (hh != NULL
3776 		 && hh->eh.dyn_relocs != NULL))
3777 	    {
3778 	      Elf_Internal_Rela outrel;
3779 	      bfd_boolean skip;
3780 	      asection *sreloc;
3781 	      bfd_byte *loc;
3782 
3783 	      /* When generating a shared object, these relocations
3784 		 are copied into the output file to be resolved at run
3785 		 time.  */
3786 
3787 	      outrel.r_addend = rela->r_addend;
3788 	      outrel.r_offset =
3789 		_bfd_elf_section_offset (output_bfd, info, input_section,
3790 					 rela->r_offset);
3791 	      skip = (outrel.r_offset == (bfd_vma) -1
3792 		      || outrel.r_offset == (bfd_vma) -2);
3793 	      outrel.r_offset += (input_section->output_offset
3794 				  + input_section->output_section->vma);
3795 
3796 	      if (skip)
3797 		{
3798 		  memset (&outrel, 0, sizeof (outrel));
3799 		}
3800 	      else if (hh != NULL
3801 		       && hh->eh.dynindx != -1
3802 		       && (plabel
3803 			   || !IS_ABSOLUTE_RELOC (r_type)
3804 			   || !bfd_link_pic (info)
3805 			   || !SYMBOLIC_BIND (info, &hh->eh)
3806 			   || !hh->eh.def_regular))
3807 		{
3808 		  outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
3809 		}
3810 	      else /* It's a local symbol, or one marked to become local.  */
3811 		{
3812 		  int indx = 0;
3813 
3814 		  /* Add the absolute offset of the symbol.  */
3815 		  outrel.r_addend += relocation;
3816 
3817 		  /* Global plabels need to be processed by the
3818 		     dynamic linker so that functions have at most one
3819 		     fptr.  For this reason, we need to differentiate
3820 		     between global and local plabels, which we do by
3821 		     providing the function symbol for a global plabel
3822 		     reloc, and no symbol for local plabels.  */
3823 		  if (! plabel
3824 		      && sym_sec != NULL
3825 		      && sym_sec->output_section != NULL
3826 		      && ! bfd_is_abs_section (sym_sec))
3827 		    {
3828 		      asection *osec;
3829 
3830 		      osec = sym_sec->output_section;
3831 		      indx = elf_section_data (osec)->dynindx;
3832 		      if (indx == 0)
3833 			{
3834 			  osec = htab->etab.text_index_section;
3835 			  indx = elf_section_data (osec)->dynindx;
3836 			}
3837 		      BFD_ASSERT (indx != 0);
3838 
3839 		      /* We are turning this relocation into one
3840 			 against a section symbol, so subtract out the
3841 			 output section's address but not the offset
3842 			 of the input section in the output section.  */
3843 		      outrel.r_addend -= osec->vma;
3844 		    }
3845 
3846 		  outrel.r_info = ELF32_R_INFO (indx, r_type);
3847 		}
3848 	      sreloc = elf_section_data (input_section)->sreloc;
3849 	      if (sreloc == NULL)
3850 		abort ();
3851 
3852 	      loc = sreloc->contents;
3853 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3854 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3855 	    }
3856 	  break;
3857 
3858 	case R_PARISC_TLS_LDM21L:
3859 	case R_PARISC_TLS_LDM14R:
3860 	  {
3861 	    bfd_vma off;
3862 
3863 	    off = htab->tls_ldm_got.offset;
3864 	    if (off & 1)
3865 	      off &= ~1;
3866 	    else
3867 	      {
3868 		Elf_Internal_Rela outrel;
3869 		bfd_byte *loc;
3870 
3871 		outrel.r_offset = (off
3872 				   + htab->etab.sgot->output_section->vma
3873 				   + htab->etab.sgot->output_offset);
3874 		outrel.r_addend = 0;
3875 		outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
3876 		loc = htab->etab.srelgot->contents;
3877 		loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3878 
3879 		bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3880 		htab->tls_ldm_got.offset |= 1;
3881 	      }
3882 
3883 	    /* Add the base of the GOT to the relocation value.  */
3884 	    relocation = (off
3885 			  + htab->etab.sgot->output_offset
3886 			  + htab->etab.sgot->output_section->vma);
3887 
3888 	    break;
3889 	  }
3890 
3891 	case R_PARISC_TLS_LDO21L:
3892 	case R_PARISC_TLS_LDO14R:
3893 	  relocation -= dtpoff_base (info);
3894 	  break;
3895 
3896 	case R_PARISC_TLS_GD21L:
3897 	case R_PARISC_TLS_GD14R:
3898 	case R_PARISC_TLS_IE21L:
3899 	case R_PARISC_TLS_IE14R:
3900 	  {
3901 	    bfd_vma off;
3902 	    int indx;
3903 	    char tls_type;
3904 
3905 	    indx = 0;
3906 	    if (hh != NULL)
3907 	      {
3908 		if (!htab->etab.dynamic_sections_created
3909 		    || hh->eh.dynindx == -1
3910 		    || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
3911 		    || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
3912 		  /* This is actually a static link, or it is a
3913 		     -Bsymbolic link and the symbol is defined
3914 		     locally, or the symbol was forced to be local
3915 		     because of a version file.  */
3916 		  ;
3917 		else
3918 		  indx = hh->eh.dynindx;
3919 		off = hh->eh.got.offset;
3920 		tls_type = hh->tls_type;
3921 	      }
3922 	    else
3923 	      {
3924 		off = local_got_offsets[r_symndx];
3925 		tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
3926 	      }
3927 
3928 	    if (tls_type == GOT_UNKNOWN)
3929 	      abort ();
3930 
3931 	    if ((off & 1) != 0)
3932 	      off &= ~1;
3933 	    else
3934 	      {
3935 		bfd_boolean need_relocs = FALSE;
3936 		Elf_Internal_Rela outrel;
3937 		bfd_byte *loc = NULL;
3938 		int cur_off = off;
3939 
3940 		/* The GOT entries have not been initialized yet.  Do it
3941 		   now, and emit any relocations.  If both an IE GOT and a
3942 		   GD GOT are necessary, we emit the GD first.  */
3943 
3944 		if (indx != 0
3945 		    || (bfd_link_dll (info)
3946 			&& (hh == NULL
3947 			    || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
3948 		  {
3949 		    need_relocs = TRUE;
3950 		    loc = htab->etab.srelgot->contents;
3951 		    loc += (htab->etab.srelgot->reloc_count
3952 			    * sizeof (Elf32_External_Rela));
3953 		  }
3954 
3955 		if (tls_type & GOT_TLS_GD)
3956 		  {
3957 		    if (need_relocs)
3958 		      {
3959 			outrel.r_offset
3960 			  = (cur_off
3961 			     + htab->etab.sgot->output_section->vma
3962 			     + htab->etab.sgot->output_offset);
3963 			outrel.r_info
3964 			  = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
3965 			outrel.r_addend = 0;
3966 			bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3967 			htab->etab.srelgot->reloc_count++;
3968 			loc += sizeof (Elf32_External_Rela);
3969 			bfd_put_32 (output_bfd, 0,
3970 				    htab->etab.sgot->contents + cur_off);
3971 		      }
3972 		    else
3973 		      /* If we are not emitting relocations for a
3974 			 general dynamic reference, then we must be in a
3975 			 static link or an executable link with the
3976 			 symbol binding locally.  Mark it as belonging
3977 			 to module 1, the executable.  */
3978 		      bfd_put_32 (output_bfd, 1,
3979 				  htab->etab.sgot->contents + cur_off);
3980 
3981 		    if (indx != 0)
3982 		      {
3983 			outrel.r_info
3984 			  = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
3985 			outrel.r_offset += 4;
3986 			bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3987 			htab->etab.srelgot->reloc_count++;
3988 			loc += sizeof (Elf32_External_Rela);
3989 			bfd_put_32 (output_bfd, 0,
3990 				    htab->etab.sgot->contents + cur_off + 4);
3991 		      }
3992 		    else
3993 		      bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
3994 				  htab->etab.sgot->contents + cur_off + 4);
3995 		    cur_off += 8;
3996 		  }
3997 
3998 		if (tls_type & GOT_TLS_IE)
3999 		  {
4000 		    if (need_relocs
4001 			&& !(bfd_link_executable (info)
4002 			     && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
4003 		      {
4004 			outrel.r_offset
4005 			  = (cur_off
4006 			     + htab->etab.sgot->output_section->vma
4007 			     + htab->etab.sgot->output_offset);
4008 			outrel.r_info = ELF32_R_INFO (indx,
4009 						      R_PARISC_TLS_TPREL32);
4010 			if (indx == 0)
4011 			  outrel.r_addend = relocation - dtpoff_base (info);
4012 			else
4013 			  outrel.r_addend = 0;
4014 			bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4015 			htab->etab.srelgot->reloc_count++;
4016 			loc += sizeof (Elf32_External_Rela);
4017 		      }
4018 		    else
4019 		      bfd_put_32 (output_bfd, tpoff (info, relocation),
4020 				  htab->etab.sgot->contents + cur_off);
4021 		    cur_off += 4;
4022 		  }
4023 
4024 		if (hh != NULL)
4025 		  hh->eh.got.offset |= 1;
4026 		else
4027 		  local_got_offsets[r_symndx] |= 1;
4028 	      }
4029 
4030 	    if ((tls_type & GOT_NORMAL) != 0
4031 		&& (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4032 	      {
4033 		if (hh != NULL)
4034 		  _bfd_error_handler (_("%s has both normal and TLS relocs"),
4035 				      hh_name (hh));
4036 		else
4037 		  {
4038 		    Elf_Internal_Sym *isym
4039 		      = bfd_sym_from_r_symndx (&htab->etab.sym_cache,
4040 					       input_bfd, r_symndx);
4041 		    if (isym == NULL)
4042 		      return FALSE;
4043 		    sym_name
4044 		      = bfd_elf_string_from_elf_section (input_bfd,
4045 							 symtab_hdr->sh_link,
4046 							 isym->st_name);
4047 		    if (sym_name == NULL)
4048 		      return FALSE;
4049 		    if (*sym_name == '\0')
4050 		      sym_name = bfd_section_name (sym_sec);
4051 		    _bfd_error_handler
4052 		      (_("%pB:%s has both normal and TLS relocs"),
4053 		       input_bfd, sym_name);
4054 		  }
4055 		bfd_set_error (bfd_error_bad_value);
4056 		return FALSE;
4057 	      }
4058 
4059 	    if ((tls_type & GOT_TLS_GD)
4060 		&& r_type != R_PARISC_TLS_GD21L
4061 		&& r_type != R_PARISC_TLS_GD14R)
4062 	      off += 2 * GOT_ENTRY_SIZE;
4063 
4064 	    /* Add the base of the GOT to the relocation value.  */
4065 	    relocation = (off
4066 			  + htab->etab.sgot->output_offset
4067 			  + htab->etab.sgot->output_section->vma);
4068 
4069 	    break;
4070 	  }
4071 
4072 	case R_PARISC_TLS_LE21L:
4073 	case R_PARISC_TLS_LE14R:
4074 	  {
4075 	    relocation = tpoff (info, relocation);
4076 	    break;
4077 	  }
4078 	  break;
4079 
4080 	default:
4081 	  break;
4082 	}
4083 
4084       rstatus = final_link_relocate (input_section, contents, rela, relocation,
4085 			       htab, sym_sec, hh, info);
4086 
4087       if (rstatus == bfd_reloc_ok)
4088 	continue;
4089 
4090       if (hh != NULL)
4091 	sym_name = hh_name (hh);
4092       else
4093 	{
4094 	  sym_name = bfd_elf_string_from_elf_section (input_bfd,
4095 						      symtab_hdr->sh_link,
4096 						      sym->st_name);
4097 	  if (sym_name == NULL)
4098 	    return FALSE;
4099 	  if (*sym_name == '\0')
4100 	    sym_name = bfd_section_name (sym_sec);
4101 	}
4102 
4103       howto = elf_hppa_howto_table + r_type;
4104 
4105       if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
4106 	{
4107 	  if (rstatus == bfd_reloc_notsupported || !warned_undef)
4108 	    {
4109 	      _bfd_error_handler
4110 		/* xgettext:c-format */
4111 		(_("%pB(%pA+%#" PRIx64 "): cannot handle %s for %s"),
4112 		 input_bfd,
4113 		 input_section,
4114 		 (uint64_t) rela->r_offset,
4115 		 howto->name,
4116 		 sym_name);
4117 	      bfd_set_error (bfd_error_bad_value);
4118 	      return FALSE;
4119 	    }
4120 	}
4121       else
4122 	(*info->callbacks->reloc_overflow)
4123 	  (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4124 	   (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
4125     }
4126 
4127   return TRUE;
4128 }
4129 
4130 /* Finish up dynamic symbol handling.  We set the contents of various
4131    dynamic sections here.  */
4132 
4133 static bfd_boolean
4134 elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4135 				  struct bfd_link_info *info,
4136 				  struct elf_link_hash_entry *eh,
4137 				  Elf_Internal_Sym *sym)
4138 {
4139   struct elf32_hppa_link_hash_table *htab;
4140   Elf_Internal_Rela rela;
4141   bfd_byte *loc;
4142 
4143   htab = hppa_link_hash_table (info);
4144   if (htab == NULL)
4145     return FALSE;
4146 
4147   if (eh->plt.offset != (bfd_vma) -1)
4148     {
4149       bfd_vma value;
4150 
4151       if (eh->plt.offset & 1)
4152 	abort ();
4153 
4154       /* This symbol has an entry in the procedure linkage table.  Set
4155 	 it up.
4156 
4157 	 The format of a plt entry is
4158 	 <funcaddr>
4159 	 <__gp>
4160       */
4161       value = 0;
4162       if (eh->root.type == bfd_link_hash_defined
4163 	  || eh->root.type == bfd_link_hash_defweak)
4164 	{
4165 	  value = eh->root.u.def.value;
4166 	  if (eh->root.u.def.section->output_section != NULL)
4167 	    value += (eh->root.u.def.section->output_offset
4168 		      + eh->root.u.def.section->output_section->vma);
4169 	}
4170 
4171       /* Create a dynamic IPLT relocation for this entry.  */
4172       rela.r_offset = (eh->plt.offset
4173 		      + htab->etab.splt->output_offset
4174 		      + htab->etab.splt->output_section->vma);
4175       if (eh->dynindx != -1)
4176 	{
4177 	  rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4178 	  rela.r_addend = 0;
4179 	}
4180       else
4181 	{
4182 	  /* This symbol has been marked to become local, and is
4183 	     used by a plabel so must be kept in the .plt.  */
4184 	  rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4185 	  rela.r_addend = value;
4186 	}
4187 
4188       loc = htab->etab.srelplt->contents;
4189       loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4190       bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
4191 
4192       if (!eh->def_regular)
4193 	{
4194 	  /* Mark the symbol as undefined, rather than as defined in
4195 	     the .plt section.  Leave the value alone.  */
4196 	  sym->st_shndx = SHN_UNDEF;
4197 	}
4198     }
4199 
4200   if (eh->got.offset != (bfd_vma) -1
4201       && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
4202       && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
4203     {
4204       bfd_boolean is_dyn = (eh->dynindx != -1
4205 			    && !SYMBOL_REFERENCES_LOCAL (info, eh));
4206 
4207       if (is_dyn || bfd_link_pic (info))
4208 	{
4209 	  /* This symbol has an entry in the global offset table.  Set
4210 	     it up.  */
4211 
4212 	  rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4213 			   + htab->etab.sgot->output_offset
4214 			   + htab->etab.sgot->output_section->vma);
4215 
4216 	  /* If this is a -Bsymbolic link and the symbol is defined
4217 	     locally or was forced to be local because of a version
4218 	     file, we just want to emit a RELATIVE reloc.  The entry
4219 	     in the global offset table will already have been
4220 	     initialized in the relocate_section function.  */
4221 	  if (!is_dyn)
4222 	    {
4223 	      rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4224 	      rela.r_addend = (eh->root.u.def.value
4225 			       + eh->root.u.def.section->output_offset
4226 			       + eh->root.u.def.section->output_section->vma);
4227 	    }
4228 	  else
4229 	    {
4230 	      if ((eh->got.offset & 1) != 0)
4231 		abort ();
4232 
4233 	      bfd_put_32 (output_bfd, 0,
4234 			  htab->etab.sgot->contents + (eh->got.offset & ~1));
4235 	      rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4236 	      rela.r_addend = 0;
4237 	    }
4238 
4239 	  loc = htab->etab.srelgot->contents;
4240 	  loc += (htab->etab.srelgot->reloc_count++
4241 		  * sizeof (Elf32_External_Rela));
4242 	  bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4243 	}
4244     }
4245 
4246   if (eh->needs_copy)
4247     {
4248       asection *sec;
4249 
4250       /* This symbol needs a copy reloc.  Set it up.  */
4251 
4252       if (! (eh->dynindx != -1
4253 	     && (eh->root.type == bfd_link_hash_defined
4254 		 || eh->root.type == bfd_link_hash_defweak)))
4255 	abort ();
4256 
4257       rela.r_offset = (eh->root.u.def.value
4258 		      + eh->root.u.def.section->output_offset
4259 		      + eh->root.u.def.section->output_section->vma);
4260       rela.r_addend = 0;
4261       rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
4262       if (eh->root.u.def.section == htab->etab.sdynrelro)
4263 	sec = htab->etab.sreldynrelro;
4264       else
4265 	sec = htab->etab.srelbss;
4266       loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4267       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4268     }
4269 
4270   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
4271   if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
4272     {
4273       sym->st_shndx = SHN_ABS;
4274     }
4275 
4276   return TRUE;
4277 }
4278 
4279 /* Used to decide how to sort relocs in an optimal manner for the
4280    dynamic linker, before writing them out.  */
4281 
4282 static enum elf_reloc_type_class
4283 elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4284 			     const asection *rel_sec ATTRIBUTE_UNUSED,
4285 			     const Elf_Internal_Rela *rela)
4286 {
4287   /* Handle TLS relocs first; we don't want them to be marked
4288      relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
4289      check below.  */
4290   switch ((int) ELF32_R_TYPE (rela->r_info))
4291     {
4292       case R_PARISC_TLS_DTPMOD32:
4293       case R_PARISC_TLS_DTPOFF32:
4294       case R_PARISC_TLS_TPREL32:
4295 	return reloc_class_normal;
4296     }
4297 
4298   if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
4299     return reloc_class_relative;
4300 
4301   switch ((int) ELF32_R_TYPE (rela->r_info))
4302     {
4303     case R_PARISC_IPLT:
4304       return reloc_class_plt;
4305     case R_PARISC_COPY:
4306       return reloc_class_copy;
4307     default:
4308       return reloc_class_normal;
4309     }
4310 }
4311 
4312 /* Finish up the dynamic sections.  */
4313 
4314 static bfd_boolean
4315 elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4316 				    struct bfd_link_info *info)
4317 {
4318   bfd *dynobj;
4319   struct elf32_hppa_link_hash_table *htab;
4320   asection *sdyn;
4321   asection * sgot;
4322 
4323   htab = hppa_link_hash_table (info);
4324   if (htab == NULL)
4325     return FALSE;
4326 
4327   dynobj = htab->etab.dynobj;
4328 
4329   sgot = htab->etab.sgot;
4330   /* A broken linker script might have discarded the dynamic sections.
4331      Catch this here so that we do not seg-fault later on.  */
4332   if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4333     return FALSE;
4334 
4335   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4336 
4337   if (htab->etab.dynamic_sections_created)
4338     {
4339       Elf32_External_Dyn *dyncon, *dynconend;
4340 
4341       if (sdyn == NULL)
4342 	abort ();
4343 
4344       dyncon = (Elf32_External_Dyn *) sdyn->contents;
4345       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4346       for (; dyncon < dynconend; dyncon++)
4347 	{
4348 	  Elf_Internal_Dyn dyn;
4349 	  asection *s;
4350 
4351 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4352 
4353 	  switch (dyn.d_tag)
4354 	    {
4355 	    default:
4356 	      continue;
4357 
4358 	    case DT_PLTGOT:
4359 	      /* Use PLTGOT to set the GOT register.  */
4360 	      dyn.d_un.d_ptr = elf_gp (output_bfd);
4361 	      break;
4362 
4363 	    case DT_JMPREL:
4364 	      s = htab->etab.srelplt;
4365 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4366 	      break;
4367 
4368 	    case DT_PLTRELSZ:
4369 	      s = htab->etab.srelplt;
4370 	      dyn.d_un.d_val = s->size;
4371 	      break;
4372 	    }
4373 
4374 	  bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4375 	}
4376     }
4377 
4378   if (sgot != NULL && sgot->size != 0)
4379     {
4380       /* Fill in the first entry in the global offset table.
4381 	 We use it to point to our dynamic section, if we have one.  */
4382       bfd_put_32 (output_bfd,
4383 		  sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
4384 		  sgot->contents);
4385 
4386       /* The second entry is reserved for use by the dynamic linker.  */
4387       memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
4388 
4389       /* Set .got entry size.  */
4390       elf_section_data (sgot->output_section)
4391 	->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
4392     }
4393 
4394   if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
4395     {
4396       /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4397 	 plt stubs and as such the section does not hold a table of fixed-size
4398 	 entries.  */
4399       elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
4400 
4401       if (htab->need_plt_stub)
4402 	{
4403 	  /* Set up the .plt stub.  */
4404 	  memcpy (htab->etab.splt->contents
4405 		  + htab->etab.splt->size - sizeof (plt_stub),
4406 		  plt_stub, sizeof (plt_stub));
4407 
4408 	  if ((htab->etab.splt->output_offset
4409 	       + htab->etab.splt->output_section->vma
4410 	       + htab->etab.splt->size)
4411 	      != (sgot->output_offset
4412 		  + sgot->output_section->vma))
4413 	    {
4414 	      _bfd_error_handler
4415 		(_(".got section not immediately after .plt section"));
4416 	      return FALSE;
4417 	    }
4418 	}
4419     }
4420 
4421   return TRUE;
4422 }
4423 
4424 /* Called when writing out an object file to decide the type of a
4425    symbol.  */
4426 static int
4427 elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
4428 {
4429   if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4430     return STT_PARISC_MILLI;
4431   else
4432     return type;
4433 }
4434 
4435 /* Misc BFD support code.  */
4436 #define bfd_elf32_bfd_is_local_label_name    elf_hppa_is_local_label_name
4437 #define bfd_elf32_bfd_reloc_type_lookup	     elf_hppa_reloc_type_lookup
4438 #define bfd_elf32_bfd_reloc_name_lookup      elf_hppa_reloc_name_lookup
4439 #define elf_info_to_howto		     elf_hppa_info_to_howto
4440 #define elf_info_to_howto_rel		     elf_hppa_info_to_howto_rel
4441 
4442 /* Stuff for the BFD linker.  */
4443 #define bfd_elf32_bfd_final_link	     elf32_hppa_final_link
4444 #define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4445 #define elf_backend_adjust_dynamic_symbol    elf32_hppa_adjust_dynamic_symbol
4446 #define elf_backend_copy_indirect_symbol     elf32_hppa_copy_indirect_symbol
4447 #define elf_backend_check_relocs	     elf32_hppa_check_relocs
4448 #define elf_backend_relocs_compatible	     _bfd_elf_relocs_compatible
4449 #define elf_backend_create_dynamic_sections  elf32_hppa_create_dynamic_sections
4450 #define elf_backend_fake_sections	     elf_hppa_fake_sections
4451 #define elf_backend_relocate_section	     elf32_hppa_relocate_section
4452 #define elf_backend_hide_symbol		     elf32_hppa_hide_symbol
4453 #define elf_backend_finish_dynamic_symbol    elf32_hppa_finish_dynamic_symbol
4454 #define elf_backend_finish_dynamic_sections  elf32_hppa_finish_dynamic_sections
4455 #define elf_backend_size_dynamic_sections    elf32_hppa_size_dynamic_sections
4456 #define elf_backend_init_index_section	     _bfd_elf_init_1_index_section
4457 #define elf_backend_gc_mark_hook	     elf32_hppa_gc_mark_hook
4458 #define elf_backend_grok_prstatus	     elf32_hppa_grok_prstatus
4459 #define elf_backend_grok_psinfo		     elf32_hppa_grok_psinfo
4460 #define elf_backend_object_p		     elf32_hppa_object_p
4461 #define elf_backend_final_write_processing   elf_hppa_final_write_processing
4462 #define elf_backend_get_symbol_type	     elf32_hppa_elf_get_symbol_type
4463 #define elf_backend_reloc_type_class	     elf32_hppa_reloc_type_class
4464 #define elf_backend_action_discarded	     elf_hppa_action_discarded
4465 
4466 #define elf_backend_can_gc_sections	     1
4467 #define elf_backend_can_refcount	     1
4468 #define elf_backend_plt_alignment	     2
4469 #define elf_backend_want_got_plt	     0
4470 #define elf_backend_plt_readonly	     0
4471 #define elf_backend_want_plt_sym	     0
4472 #define elf_backend_got_header_size	     8
4473 #define elf_backend_want_dynrelro	     1
4474 #define elf_backend_rela_normal		     1
4475 #define elf_backend_dtrel_excludes_plt	     1
4476 #define elf_backend_no_page_alias	     1
4477 
4478 #define TARGET_BIG_SYM		hppa_elf32_vec
4479 #define TARGET_BIG_NAME		"elf32-hppa"
4480 #define ELF_ARCH		bfd_arch_hppa
4481 #define ELF_TARGET_ID		HPPA32_ELF_DATA
4482 #define ELF_MACHINE_CODE	EM_PARISC
4483 #define ELF_MAXPAGESIZE		0x1000
4484 #define ELF_OSABI		ELFOSABI_HPUX
4485 #define elf32_bed		elf32_hppa_hpux_bed
4486 
4487 #include "elf32-target.h"
4488 
4489 #undef TARGET_BIG_SYM
4490 #define TARGET_BIG_SYM		hppa_elf32_linux_vec
4491 #undef TARGET_BIG_NAME
4492 #define TARGET_BIG_NAME		"elf32-hppa-linux"
4493 #undef ELF_OSABI
4494 #define ELF_OSABI		ELFOSABI_GNU
4495 #undef elf32_bed
4496 #define elf32_bed		elf32_hppa_linux_bed
4497 
4498 #include "elf32-target.h"
4499 
4500 #undef TARGET_BIG_SYM
4501 #define TARGET_BIG_SYM		hppa_elf32_nbsd_vec
4502 #undef TARGET_BIG_NAME
4503 #define TARGET_BIG_NAME		"elf32-hppa-netbsd"
4504 #undef ELF_OSABI
4505 #define ELF_OSABI		ELFOSABI_NETBSD
4506 #undef elf32_bed
4507 #define elf32_bed		elf32_hppa_netbsd_bed
4508 
4509 #include "elf32-target.h"
4510