2989 lines
97 KiB
C
2989 lines
97 KiB
C
/* BFD back-end for HP PA-RISC ELF files.
|
|
Copyright (C) 1990, 91, 92, 93, 94, 1995 Free Software Foundation, Inc.
|
|
|
|
Written by
|
|
|
|
Center for Software Science
|
|
Department of Computer Science
|
|
University of Utah
|
|
|
|
This file is part of BFD, the Binary File Descriptor library.
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
|
|
|
|
#include "bfd.h"
|
|
#include "sysdep.h"
|
|
#include "bfdlink.h"
|
|
#include "libbfd.h"
|
|
#include "obstack.h"
|
|
#include "elf-bfd.h"
|
|
|
|
/* The internal type of a symbol table extension entry. */
|
|
typedef unsigned long symext_entryS;
|
|
|
|
/* The external type of a symbol table extension entry. */
|
|
#define ELF32_PARISC_SX_SIZE (4)
|
|
#define ELF32_PARISC_SX_GET(bfd, addr) bfd_h_get_32 ((bfd), (addr))
|
|
#define ELF32_PARISC_SX_PUT(bfd, val, addr) \
|
|
bfd_h_put_32 ((bfd), (val), (addr))
|
|
|
|
/* HPPA symbol table extension entry types */
|
|
enum elf32_hppa_symextn_types
|
|
{
|
|
PARISC_SXT_NULL,
|
|
PARISC_SXT_SYMNDX,
|
|
PARISC_SXT_ARG_RELOC,
|
|
};
|
|
|
|
/* These macros compose and decompose the value of a symextn entry:
|
|
|
|
entry_type = ELF32_PARISC_SX_TYPE(word);
|
|
entry_value = ELF32_PARISC_SX_VAL(word);
|
|
word = ELF32_PARISC_SX_WORD(type,val); */
|
|
|
|
#define ELF32_PARISC_SX_TYPE(p) ((p) >> 24)
|
|
#define ELF32_PARISC_SX_VAL(p) ((p) & 0xFFFFFF)
|
|
#define ELF32_PARISC_SX_WORD(type,val) (((type) << 24) + (val & 0xFFFFFF))
|
|
|
|
/* The following was added facilitate implementation of the .hppa_symextn
|
|
section. This section is built after the symbol table is built in the
|
|
elf_write_object_contents routine (called from bfd_close). It is built
|
|
so late because it requires information that is not known until
|
|
the symbol and string table sections have been allocated, and
|
|
the symbol table has been built. */
|
|
|
|
#define SYMEXTN_SECTION_NAME ".PARISC.symext"
|
|
|
|
struct symext_chain
|
|
{
|
|
symext_entryS entry;
|
|
struct symext_chain *next;
|
|
};
|
|
|
|
typedef struct symext_chain symext_chainS;
|
|
|
|
/* We use three different hash tables to hold information for
|
|
linking PA ELF objects.
|
|
|
|
The first is the elf32_hppa_link_hash_table which is derived
|
|
from the standard ELF linker hash table. We use this as a place to
|
|
attach other hash tables and static information.
|
|
|
|
The second is the stub hash table which is derived from the
|
|
base BFD hash table. The stub hash table holds the information
|
|
necessary to build the linker stubs during a link.
|
|
|
|
The last hash table keeps track of argument location information needed
|
|
to build hash tables. Each function with nonzero argument location
|
|
bits will have an entry in this table. */
|
|
|
|
/* Hash table for linker stubs. */
|
|
|
|
struct elf32_hppa_stub_hash_entry
|
|
{
|
|
/* Base hash table entry structure, we can get the name of the stub
|
|
(and thus know exactly what actions it performs) from the base
|
|
hash table entry. */
|
|
struct bfd_hash_entry root;
|
|
|
|
/* Offset of the beginning of this stub. */
|
|
bfd_vma offset;
|
|
|
|
/* Given the symbol's value and its section we can determine its final
|
|
value when building the stubs (so the stub knows where to jump. */
|
|
symvalue target_value;
|
|
asection *target_section;
|
|
};
|
|
|
|
struct elf32_hppa_stub_hash_table
|
|
{
|
|
/* The hash table itself. */
|
|
struct bfd_hash_table root;
|
|
|
|
/* The stub BFD. */
|
|
bfd *stub_bfd;
|
|
|
|
/* Where to place the next stub. */
|
|
bfd_byte *location;
|
|
|
|
/* Current offset in the stub section. */
|
|
unsigned int offset;
|
|
|
|
};
|
|
|
|
/* Hash table for argument location information. */
|
|
|
|
struct elf32_hppa_args_hash_entry
|
|
{
|
|
/* Base hash table entry structure. */
|
|
struct bfd_hash_entry root;
|
|
|
|
/* The argument location bits for this entry. */
|
|
int arg_bits;
|
|
};
|
|
|
|
struct elf32_hppa_args_hash_table
|
|
{
|
|
/* The hash table itself. */
|
|
struct bfd_hash_table root;
|
|
};
|
|
|
|
struct elf32_hppa_link_hash_entry
|
|
{
|
|
struct elf_link_hash_entry root;
|
|
};
|
|
|
|
struct elf32_hppa_link_hash_table
|
|
{
|
|
/* The main hash table. */
|
|
struct elf_link_hash_table root;
|
|
|
|
/* The stub hash table. */
|
|
struct elf32_hppa_stub_hash_table *stub_hash_table;
|
|
|
|
/* The argument relocation bits hash table. */
|
|
struct elf32_hppa_args_hash_table *args_hash_table;
|
|
|
|
/* A count of the number of output symbols. */
|
|
unsigned int output_symbol_count;
|
|
|
|
/* Stuff so we can handle DP relative relocations. */
|
|
long global_value;
|
|
int global_sym_defined;
|
|
};
|
|
|
|
/* FIXME. */
|
|
#define ARGUMENTS 0
|
|
#define RETURN_VALUE 1
|
|
|
|
/* The various argument relocations that may be performed. */
|
|
typedef enum
|
|
{
|
|
/* No relocation. */
|
|
NO,
|
|
/* Relocate 32 bits from GR to FP register. */
|
|
GF,
|
|
/* Relocate 64 bits from a GR pair to FP pair. */
|
|
GD,
|
|
/* Relocate 32 bits from FP to GR. */
|
|
FG,
|
|
/* Relocate 64 bits from FP pair to GR pair. */
|
|
DG,
|
|
} arg_reloc_type;
|
|
|
|
/* What is being relocated (eg which argument or the return value). */
|
|
typedef enum
|
|
{
|
|
ARG0, ARG1, ARG2, ARG3, RET,
|
|
} arg_reloc_location;
|
|
|
|
|
|
/* ELF32/HPPA relocation support
|
|
|
|
This file contains ELF32/HPPA relocation support as specified
|
|
in the Stratus FTX/Golf Object File Format (SED-1762) dated
|
|
February 1994. */
|
|
|
|
#include "elf32-hppa.h"
|
|
#include "hppa_stubs.h"
|
|
|
|
static bfd_reloc_status_type hppa_elf_reloc
|
|
PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
|
|
|
|
static unsigned long hppa_elf_relocate_insn
|
|
PARAMS ((bfd *, asection *, unsigned long, unsigned long, long,
|
|
long, unsigned long, unsigned long, unsigned long));
|
|
|
|
static bfd_reloc_status_type hppa_elf_reloc
|
|
PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd*, char **));
|
|
|
|
static reloc_howto_type * elf_hppa_reloc_type_lookup
|
|
PARAMS ((bfd *, bfd_reloc_code_real_type));
|
|
|
|
static boolean elf32_hppa_set_section_contents
|
|
PARAMS ((bfd *, sec_ptr, PTR, file_ptr, bfd_size_type));
|
|
|
|
static void elf32_hppa_info_to_howto
|
|
PARAMS ((bfd *, arelent *, Elf32_Internal_Rela *));
|
|
|
|
static boolean elf32_hppa_backend_symbol_table_processing
|
|
PARAMS ((bfd *, elf_symbol_type *, unsigned int));
|
|
|
|
static void elf32_hppa_backend_begin_write_processing
|
|
PARAMS ((bfd *, struct bfd_link_info *));
|
|
|
|
static void elf32_hppa_backend_final_write_processing
|
|
PARAMS ((bfd *, boolean));
|
|
|
|
static void add_entry_to_symext_chain
|
|
PARAMS ((bfd *, unsigned int, unsigned int, symext_chainS **,
|
|
symext_chainS **));
|
|
|
|
static void
|
|
elf_hppa_tc_make_sections PARAMS ((bfd *, symext_chainS *));
|
|
|
|
static boolean hppa_elf_is_local_label PARAMS ((bfd *, asymbol *));
|
|
|
|
static boolean elf32_hppa_add_symbol_hook
|
|
PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
|
|
const char **, flagword *, asection **, bfd_vma *));
|
|
|
|
static bfd_reloc_status_type elf32_hppa_bfd_final_link_relocate
|
|
PARAMS ((reloc_howto_type *, bfd *, bfd *, asection *,
|
|
bfd_byte *, bfd_vma, bfd_vma, bfd_vma, struct bfd_link_info *,
|
|
asection *, const char *, int));
|
|
|
|
static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
|
|
PARAMS ((bfd *));
|
|
|
|
static struct bfd_hash_entry *
|
|
elf32_hppa_stub_hash_newfunc
|
|
PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
|
|
|
|
static struct bfd_hash_entry *
|
|
elf32_hppa_args_hash_newfunc
|
|
PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
|
|
|
|
static boolean
|
|
elf32_hppa_relocate_section
|
|
PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
|
|
bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
|
|
|
|
static boolean
|
|
elf32_hppa_stub_hash_table_init
|
|
PARAMS ((struct elf32_hppa_stub_hash_table *, bfd *,
|
|
struct bfd_hash_entry *(*) PARAMS ((struct bfd_hash_entry *,
|
|
struct bfd_hash_table *,
|
|
const char *))));
|
|
|
|
static boolean
|
|
elf32_hppa_build_one_stub PARAMS ((struct bfd_hash_entry *, PTR));
|
|
|
|
static boolean
|
|
elf32_hppa_read_symext_info
|
|
PARAMS ((bfd *, Elf_Internal_Shdr *, struct elf32_hppa_args_hash_table *,
|
|
Elf_Internal_Sym *));
|
|
|
|
static unsigned int elf32_hppa_size_of_stub
|
|
PARAMS ((unsigned int, unsigned int, bfd_vma, bfd_vma, const char *));
|
|
|
|
static boolean elf32_hppa_arg_reloc_needed
|
|
PARAMS ((unsigned int, unsigned int, arg_reloc_type []));
|
|
|
|
static void elf32_hppa_name_of_stub
|
|
PARAMS ((unsigned int, unsigned int, bfd_vma, bfd_vma, char *));
|
|
|
|
static boolean elf32_hppa_size_symext PARAMS ((struct bfd_hash_entry *, PTR));
|
|
|
|
static boolean elf32_hppa_link_output_symbol_hook
|
|
PARAMS ((bfd *, struct bfd_link_info *, const char *,
|
|
Elf_Internal_Sym *, asection *));
|
|
|
|
/* ELF/PA relocation howto entries. */
|
|
|
|
static reloc_howto_type elf_hppa_howto_table[ELF_HOWTO_TABLE_SIZE] =
|
|
{
|
|
{R_PARISC_NONE, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_NONE"},
|
|
/* The values in DIR32 are to placate the check in
|
|
_bfd_stab_section_find_nearest_line. */
|
|
{R_PARISC_DIR32, 0, 2, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR32", false, 0, 0xffffffff, false},
|
|
{R_PARISC_DIR21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR21L"},
|
|
{R_PARISC_DIR17R, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR17R"},
|
|
{R_PARISC_DIR17F, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR17F"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DIR14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DIR14R"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_PCREL21L, 0, 0, 21, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL21L"},
|
|
{R_PARISC_PCREL17R, 0, 0, 17, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL17R"},
|
|
{R_PARISC_PCREL17F, 0, 0, 17, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL17F"},
|
|
{R_PARISC_PCREL17C, 0, 0, 17, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL17C"},
|
|
{R_PARISC_PCREL14R, 0, 0, 14, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL14R"},
|
|
{R_PARISC_PCREL14F, 0, 0, 14, true, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PCREL14F"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DPREL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DPREL21L"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DPREL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DPREL14R"},
|
|
{R_PARISC_DPREL14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DPREL14F"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DLTREL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTREL21L"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DLTREL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTREL14R"},
|
|
{R_PARISC_DLTREL14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTREL14F"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DLTIND21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTIND21L"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DLTIND14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTIND14R"},
|
|
{R_PARISC_DLTIND14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_DLTIND14F"},
|
|
|
|
{R_PARISC_SETBASE, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_SETBASE"},
|
|
{R_PARISC_BASEREL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL32"},
|
|
{R_PARISC_BASEREL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL21L"},
|
|
{R_PARISC_BASEREL17R, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL17R"},
|
|
{R_PARISC_BASEREL17F, 0, 0, 17, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL17F"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_BASEREL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL14R"},
|
|
{R_PARISC_BASEREL14F, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_BASEREL14F"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_TEXTREL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_TEXTREL32"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_DATAREL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_PLABEL32, 0, 0, 32, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLABEL32"},
|
|
{R_PARISC_PLABEL21L, 0, 0, 21, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLABEL21L"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_PLABEL14R, 0, 0, 14, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLABEL14R"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_PLTIND21L, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLTIND21L"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_UNIMPLEMENTED"},
|
|
{R_PARISC_PLTIND14R, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLTIND14R"},
|
|
{R_PARISC_PLTIND14F, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_PLTIND14F"},
|
|
|
|
|
|
{R_PARISC_COPY, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_COPY"},
|
|
{R_PARISC_GLOB_DAT, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_GLOB_DAT"},
|
|
{R_PARISC_JMP_SLOT, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_JMP_SLOT"},
|
|
{R_PARISC_RELATIVE, 0, 0, 0, false, 0, complain_overflow_bitfield, hppa_elf_reloc, "R_PARISC_RELATIVE"},
|
|
|
|
{R_PARISC_UNIMPLEMENTED, 0, 0, 0, false, 0, complain_overflow_dont, NULL, "R_PARISC_UNIMPLEMENTED"},
|
|
};
|
|
|
|
/* Where (what register type) is an argument comming from? */
|
|
typedef enum
|
|
{
|
|
AR_NO,
|
|
AR_GR,
|
|
AR_FR,
|
|
AR_FU,
|
|
AR_FPDBL1,
|
|
AR_FPDBL2,
|
|
} arg_location;
|
|
|
|
/* Horizontal represents the callee's argument location information,
|
|
vertical represents caller's argument location information. Value at a
|
|
particular X,Y location represents what (if any) argument relocation
|
|
needs to be performed to make caller and callee agree. */
|
|
|
|
static CONST arg_reloc_type arg_mismatches[6][6] =
|
|
{
|
|
{NO, NO, NO, NO, NO, NO},
|
|
{NO, NO, GF, NO, GD, NO},
|
|
{NO, FG, NO, NO, NO, NO},
|
|
{NO, NO, NO, NO, NO, NO},
|
|
{NO, DG, NO, NO, NO, NO},
|
|
{NO, DG, NO, NO, NO, NO},
|
|
};
|
|
|
|
/* Likewise, but reversed for the return value. */
|
|
static CONST arg_reloc_type ret_mismatches[6][6] =
|
|
{
|
|
{NO, NO, NO, NO, NO, NO},
|
|
{NO, NO, FG, NO, DG, NO},
|
|
{NO, GF, NO, NO, NO, NO},
|
|
{NO, NO, NO, NO, NO, NO},
|
|
{NO, GD, NO, NO, NO, NO},
|
|
{NO, GD, NO, NO, NO, NO},
|
|
};
|
|
|
|
/* Misc static crud for symbol extension records. */
|
|
static symext_chainS *symext_rootP;
|
|
static symext_chainS *symext_lastP;
|
|
static bfd_size_type symext_chain_size;
|
|
|
|
/* FIXME: We should be able to try this static variable! */
|
|
static bfd_byte *symextn_contents;
|
|
|
|
|
|
/* For linker stub hash tables. */
|
|
#define elf32_hppa_stub_hash_lookup(table, string, create, copy) \
|
|
((struct elf32_hppa_stub_hash_entry *) \
|
|
bfd_hash_lookup (&(table)->root, (string), (create), (copy)))
|
|
|
|
#define elf32_hppa_stub_hash_traverse(table, func, info) \
|
|
(bfd_hash_traverse \
|
|
(&(table)->root, \
|
|
(boolean (*) PARAMS ((struct bfd_hash_entry *, PTR))) (func), \
|
|
(info)))
|
|
|
|
/* For linker args hash tables. */
|
|
#define elf32_hppa_args_hash_lookup(table, string, create, copy) \
|
|
((struct elf32_hppa_args_hash_entry *) \
|
|
bfd_hash_lookup (&(table)->root, (string), (create), (copy)))
|
|
|
|
#define elf32_hppa_args_hash_traverse(table, func, info) \
|
|
(bfd_hash_traverse \
|
|
(&(table)->root, \
|
|
(boolean (*) PARAMS ((struct bfd_hash_entry *, PTR))) (func), \
|
|
(info)))
|
|
|
|
#define elf32_hppa_args_hash_table_init(table, newfunc) \
|
|
(bfd_hash_table_init \
|
|
(&(table)->root, \
|
|
(struct bfd_hash_entry *(*) PARAMS ((struct bfd_hash_entry *, \
|
|
struct bfd_hash_table *, \
|
|
const char *))) (newfunc)))
|
|
|
|
/* For HPPA linker hash table. */
|
|
|
|
#define elf32_hppa_link_hash_lookup(table, string, create, copy, follow)\
|
|
((struct elf32_hppa_link_hash_entry *) \
|
|
elf_link_hash_lookup (&(table)->root, (string), (create), \
|
|
(copy), (follow)))
|
|
|
|
#define elf32_hppa_link_hash_traverse(table, func, info) \
|
|
(elf_link_hash_traverse \
|
|
(&(table)->root, \
|
|
(boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
|
|
(info)))
|
|
|
|
/* Get the PA ELF linker hash table from a link_info structure. */
|
|
|
|
#define elf32_hppa_hash_table(p) \
|
|
((struct elf32_hppa_link_hash_table *) ((p)->hash))
|
|
|
|
|
|
/* Extract specific argument location bits for WHICH from
|
|
the full argument location in AR. */
|
|
#define EXTRACT_ARBITS(ar, which) ((ar) >> (8 - ((which) * 2))) & 3
|
|
|
|
/* Assorted hash table functions. */
|
|
|
|
/* Initialize an entry in the stub hash table. */
|
|
|
|
static struct bfd_hash_entry *
|
|
elf32_hppa_stub_hash_newfunc (entry, table, string)
|
|
struct bfd_hash_entry *entry;
|
|
struct bfd_hash_table *table;
|
|
const char *string;
|
|
{
|
|
struct elf32_hppa_stub_hash_entry *ret;
|
|
|
|
ret = (struct elf32_hppa_stub_hash_entry *) entry;
|
|
|
|
/* Allocate the structure if it has not already been allocated by a
|
|
subclass. */
|
|
if (ret == NULL)
|
|
ret = ((struct elf32_hppa_stub_hash_entry *)
|
|
bfd_hash_allocate (table,
|
|
sizeof (struct elf32_hppa_stub_hash_entry)));
|
|
if (ret == NULL)
|
|
return NULL;
|
|
|
|
/* Call the allocation method of the superclass. */
|
|
ret = ((struct elf32_hppa_stub_hash_entry *)
|
|
bfd_hash_newfunc ((struct bfd_hash_entry *) ret, table, string));
|
|
|
|
if (ret)
|
|
{
|
|
/* Initialize the local fields. */
|
|
ret->offset = 0;
|
|
ret->target_value = 0;
|
|
ret->target_section = NULL;
|
|
}
|
|
|
|
return (struct bfd_hash_entry *) ret;
|
|
}
|
|
|
|
/* Initialize a stub hash table. */
|
|
|
|
static boolean
|
|
elf32_hppa_stub_hash_table_init (table, stub_bfd, newfunc)
|
|
struct elf32_hppa_stub_hash_table *table;
|
|
bfd *stub_bfd;
|
|
struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *,
|
|
struct bfd_hash_table *,
|
|
const char *));
|
|
{
|
|
table->offset = 0;
|
|
table->location = 0;
|
|
table->stub_bfd = stub_bfd;
|
|
return (bfd_hash_table_init (&table->root, newfunc));
|
|
}
|
|
|
|
/* Initialize an entry in the argument location hash table. */
|
|
|
|
static struct bfd_hash_entry *
|
|
elf32_hppa_args_hash_newfunc (entry, table, string)
|
|
struct bfd_hash_entry *entry;
|
|
struct bfd_hash_table *table;
|
|
const char *string;
|
|
{
|
|
struct elf32_hppa_args_hash_entry *ret;
|
|
|
|
ret = (struct elf32_hppa_args_hash_entry *) entry;
|
|
|
|
/* Allocate the structure if it has not already been allocated by a
|
|
subclass. */
|
|
if (ret == NULL)
|
|
ret = ((struct elf32_hppa_args_hash_entry *)
|
|
bfd_hash_allocate (table,
|
|
sizeof (struct elf32_hppa_args_hash_entry)));
|
|
if (ret == NULL)
|
|
return NULL;
|
|
|
|
/* Call the allocation method of the superclass. */
|
|
ret = ((struct elf32_hppa_args_hash_entry *)
|
|
bfd_hash_newfunc ((struct bfd_hash_entry *) ret, table, string));
|
|
|
|
/* Initialize the local fields. */
|
|
if (ret)
|
|
ret->arg_bits = 0;
|
|
|
|
return (struct bfd_hash_entry *) ret;
|
|
}
|
|
|
|
/* Create the derived linker hash table. The PA ELF port uses the derived
|
|
hash table to keep information specific to the PA ELF linker (without
|
|
using static variables). */
|
|
|
|
static struct bfd_link_hash_table *
|
|
elf32_hppa_link_hash_table_create (abfd)
|
|
bfd *abfd;
|
|
{
|
|
struct elf32_hppa_link_hash_table *ret;
|
|
|
|
ret = ((struct elf32_hppa_link_hash_table *)
|
|
bfd_alloc (abfd, sizeof (struct elf32_hppa_link_hash_table)));
|
|
if (ret == NULL)
|
|
return NULL;
|
|
if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
|
|
_bfd_elf_link_hash_newfunc))
|
|
{
|
|
bfd_release (abfd, ret);
|
|
return NULL;
|
|
}
|
|
ret->stub_hash_table = NULL;
|
|
ret->args_hash_table = NULL;
|
|
ret->output_symbol_count = 0;
|
|
ret->global_value = 0;
|
|
ret->global_sym_defined = 0;
|
|
|
|
return &ret->root.root;
|
|
}
|
|
|
|
/* Relocate the given INSN given the various input parameters.
|
|
|
|
FIXME: endianness and sizeof (long) issues abound here. */
|
|
|
|
static unsigned long
|
|
hppa_elf_relocate_insn (abfd, input_sect, insn, address, sym_value,
|
|
r_addend, r_format, r_field, pcrel)
|
|
bfd *abfd;
|
|
asection *input_sect;
|
|
unsigned long insn;
|
|
unsigned long address;
|
|
long sym_value;
|
|
long r_addend;
|
|
unsigned long r_format;
|
|
unsigned long r_field;
|
|
unsigned long pcrel;
|
|
{
|
|
unsigned char opcode = get_opcode (insn);
|
|
long constant_value;
|
|
|
|
switch (opcode)
|
|
{
|
|
case LDO:
|
|
case LDB:
|
|
case LDH:
|
|
case LDW:
|
|
case LDWM:
|
|
case STB:
|
|
case STH:
|
|
case STW:
|
|
case STWM:
|
|
case COMICLR:
|
|
case SUBI:
|
|
case ADDIT:
|
|
case ADDI:
|
|
case LDIL:
|
|
case ADDIL:
|
|
constant_value = HPPA_R_CONSTANT (r_addend);
|
|
|
|
if (pcrel)
|
|
sym_value -= address;
|
|
|
|
sym_value = hppa_field_adjust (sym_value, constant_value, r_field);
|
|
return hppa_rebuild_insn (abfd, insn, sym_value, r_format);
|
|
|
|
case BL:
|
|
case BE:
|
|
case BLE:
|
|
/* XXX computing constant_value is not needed??? */
|
|
constant_value = assemble_17 ((insn & 0x001f0000) >> 16,
|
|
(insn & 0x00001ffc) >> 2,
|
|
insn & 1);
|
|
|
|
constant_value = (constant_value << 15) >> 15;
|
|
if (pcrel)
|
|
{
|
|
sym_value -=
|
|
address + input_sect->output_offset
|
|
+ input_sect->output_section->vma;
|
|
sym_value = hppa_field_adjust (sym_value, -8, r_field);
|
|
}
|
|
else
|
|
sym_value = hppa_field_adjust (sym_value, constant_value, r_field);
|
|
|
|
return hppa_rebuild_insn (abfd, insn, sym_value >> 2, r_format);
|
|
|
|
default:
|
|
if (opcode == 0)
|
|
{
|
|
constant_value = HPPA_R_CONSTANT (r_addend);
|
|
|
|
if (pcrel)
|
|
sym_value -= address;
|
|
|
|
return hppa_field_adjust (sym_value, constant_value, r_field);
|
|
}
|
|
else
|
|
abort ();
|
|
}
|
|
}
|
|
|
|
/* Relocate an HPPA ELF section. */
|
|
|
|
static boolean
|
|
elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
|
|
contents, relocs, local_syms, local_sections)
|
|
bfd *output_bfd;
|
|
struct bfd_link_info *info;
|
|
bfd *input_bfd;
|
|
asection *input_section;
|
|
bfd_byte *contents;
|
|
Elf_Internal_Rela *relocs;
|
|
Elf_Internal_Sym *local_syms;
|
|
asection **local_sections;
|
|
{
|
|
Elf_Internal_Shdr *symtab_hdr;
|
|
Elf_Internal_Rela *rel;
|
|
Elf_Internal_Rela *relend;
|
|
|
|
symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
|
|
|
|
rel = relocs;
|
|
relend = relocs + input_section->reloc_count;
|
|
for (; rel < relend; rel++)
|
|
{
|
|
int r_type;
|
|
reloc_howto_type *howto;
|
|
unsigned long r_symndx;
|
|
struct elf_link_hash_entry *h;
|
|
Elf_Internal_Sym *sym;
|
|
asection *sym_sec;
|
|
bfd_vma relocation;
|
|
bfd_reloc_status_type r;
|
|
const char *sym_name;
|
|
|
|
r_type = ELF32_R_TYPE (rel->r_info);
|
|
if (r_type < 0 || r_type >= (int) R_PARISC_UNIMPLEMENTED)
|
|
{
|
|
bfd_set_error (bfd_error_bad_value);
|
|
return false;
|
|
}
|
|
howto = elf_hppa_howto_table + r_type;
|
|
|
|
r_symndx = ELF32_R_SYM (rel->r_info);
|
|
|
|
if (info->relocateable)
|
|
{
|
|
/* This is a relocateable link. We don't have to change
|
|
anything, unless the reloc is against a section symbol,
|
|
in which case we have to adjust according to where the
|
|
section symbol winds up in the output section. */
|
|
if (r_symndx < symtab_hdr->sh_info)
|
|
{
|
|
sym = local_syms + r_symndx;
|
|
if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
|
|
{
|
|
sym_sec = local_sections[r_symndx];
|
|
rel->r_addend += sym_sec->output_offset;
|
|
}
|
|
}
|
|
|
|
continue;
|
|
}
|
|
|
|
/* This is a final link. */
|
|
h = NULL;
|
|
sym = NULL;
|
|
sym_sec = NULL;
|
|
if (r_symndx < symtab_hdr->sh_info)
|
|
{
|
|
sym = local_syms + r_symndx;
|
|
sym_sec = local_sections[r_symndx];
|
|
relocation = ((ELF_ST_TYPE (sym->st_info) == STT_SECTION
|
|
? 0 : sym->st_value)
|
|
+ sym_sec->output_offset
|
|
+ sym_sec->output_section->vma);
|
|
}
|
|
else
|
|
{
|
|
long indx;
|
|
|
|
indx = r_symndx - symtab_hdr->sh_info;
|
|
h = elf_sym_hashes (input_bfd)[indx];
|
|
while (h->root.type == bfd_link_hash_indirect
|
|
|| h->root.type == bfd_link_hash_warning)
|
|
h = (struct elf_link_hash_entry *) h->root.u.i.link;
|
|
if (h->root.type == bfd_link_hash_defined
|
|
|| h->root.type == bfd_link_hash_defweak)
|
|
{
|
|
sym_sec = h->root.u.def.section;
|
|
relocation = (h->root.u.def.value
|
|
+ sym_sec->output_offset
|
|
+ sym_sec->output_section->vma);
|
|
}
|
|
else if (h->root.type == bfd_link_hash_undefweak)
|
|
relocation = 0;
|
|
else
|
|
{
|
|
if (!((*info->callbacks->undefined_symbol)
|
|
(info, h->root.root.string, input_bfd,
|
|
input_section, rel->r_offset)))
|
|
return false;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (h != NULL)
|
|
sym_name = h->root.root.string;
|
|
else
|
|
{
|
|
sym_name = bfd_elf_string_from_elf_section (input_bfd,
|
|
symtab_hdr->sh_link,
|
|
sym->st_name);
|
|
if (sym_name == NULL)
|
|
return false;
|
|
if (*sym_name == '\0')
|
|
sym_name = bfd_section_name (input_bfd, sym_sec);
|
|
}
|
|
|
|
/* If args_hash_table is NULL, then we have encountered some
|
|
kind of link error (ex. undefined symbols). Do not try to
|
|
apply any relocations, continue the loop so we can notify
|
|
the user of several errors in a single attempted link. */
|
|
if (elf32_hppa_hash_table (info)->args_hash_table == NULL)
|
|
continue;
|
|
|
|
r = elf32_hppa_bfd_final_link_relocate (howto, input_bfd, output_bfd,
|
|
input_section, contents,
|
|
rel->r_offset, relocation,
|
|
rel->r_addend, info, sym_sec,
|
|
sym_name, h == NULL);
|
|
|
|
if (r != bfd_reloc_ok)
|
|
{
|
|
switch (r)
|
|
{
|
|
/* This can happen for DP relative relocs if $global$ is
|
|
undefined. This is a panic situation so we don't try
|
|
to continue. */
|
|
case bfd_reloc_undefined:
|
|
case bfd_reloc_notsupported:
|
|
if (!((*info->callbacks->undefined_symbol)
|
|
(info, "$global$", input_bfd,
|
|
input_section, rel->r_offset)))
|
|
return false;
|
|
return false;
|
|
case bfd_reloc_dangerous:
|
|
{
|
|
/* We use this return value to indicate that we performed
|
|
a "dangerous" relocation. This doesn't mean we did
|
|
the wrong thing, it just means there may be some cleanup
|
|
that needs to be done here.
|
|
|
|
In particular we had to swap the last call insn and its
|
|
delay slot. If the delay slot insn needed a relocation,
|
|
then we'll need to adjust the next relocation entry's
|
|
offset to account for the fact that the insn moved.
|
|
|
|
This hair wouldn't be necessary if we inserted stubs
|
|
between procedures and used a "bl" to get to the stub. */
|
|
if (rel != relend)
|
|
{
|
|
Elf_Internal_Rela *next_rel = rel + 1;
|
|
|
|
if (rel->r_offset + 4 == next_rel->r_offset)
|
|
next_rel->r_offset -= 4;
|
|
}
|
|
break;
|
|
}
|
|
default:
|
|
case bfd_reloc_outofrange:
|
|
case bfd_reloc_overflow:
|
|
{
|
|
if (!((*info->callbacks->reloc_overflow)
|
|
(info, sym_name, howto->name, (bfd_vma) 0,
|
|
input_bfd, input_section, rel->r_offset)))
|
|
return false;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/* Return one (or more) BFD relocations which implement the base
|
|
relocation with modifications based on format and field. */
|
|
|
|
elf32_hppa_reloc_type **
|
|
hppa_elf_gen_reloc_type (abfd, base_type, format, field, ignore, sym)
|
|
bfd *abfd;
|
|
elf32_hppa_reloc_type base_type;
|
|
int format;
|
|
int field;
|
|
int ignore;
|
|
asymbol *sym;
|
|
{
|
|
elf32_hppa_reloc_type *finaltype;
|
|
elf32_hppa_reloc_type **final_types;
|
|
|
|
/* Allocate slots for the BFD relocation. */
|
|
final_types = (elf32_hppa_reloc_type **)
|
|
bfd_alloc_by_size_t (abfd, sizeof (elf32_hppa_reloc_type *) * 2);
|
|
if (final_types == NULL)
|
|
return NULL;
|
|
|
|
/* Allocate space for the relocation itself. */
|
|
finaltype = (elf32_hppa_reloc_type *)
|
|
bfd_alloc_by_size_t (abfd, sizeof (elf32_hppa_reloc_type));
|
|
if (finaltype == NULL)
|
|
return NULL;
|
|
|
|
/* Some reasonable defaults. */
|
|
final_types[0] = finaltype;
|
|
final_types[1] = NULL;
|
|
|
|
#define final_type finaltype[0]
|
|
|
|
final_type = base_type;
|
|
|
|
/* Just a tangle of nested switch statements to deal with the braindamage
|
|
that a different field selector means a completely different relocation
|
|
for PA ELF. */
|
|
switch (base_type)
|
|
{
|
|
case R_HPPA:
|
|
case R_HPPA_ABS_CALL:
|
|
switch (format)
|
|
{
|
|
case 14:
|
|
switch (field)
|
|
{
|
|
case e_rsel:
|
|
case e_rrsel:
|
|
final_type = R_PARISC_DIR14R;
|
|
break;
|
|
case e_rtsel:
|
|
final_type = R_PARISC_DLTREL14R;
|
|
break;
|
|
case e_tsel:
|
|
final_type = R_PARISC_DLTREL14F;
|
|
break;
|
|
case e_rpsel:
|
|
final_type = R_PARISC_PLABEL14R;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
case 17:
|
|
switch (field)
|
|
{
|
|
case e_fsel:
|
|
final_type = R_PARISC_DIR17F;
|
|
break;
|
|
case e_rsel:
|
|
case e_rrsel:
|
|
final_type = R_PARISC_DIR17R;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
case 21:
|
|
switch (field)
|
|
{
|
|
case e_lsel:
|
|
case e_lrsel:
|
|
final_type = R_PARISC_DIR21L;
|
|
break;
|
|
case e_ltsel:
|
|
final_type = R_PARISC_DLTREL21L;
|
|
break;
|
|
case e_lpsel:
|
|
final_type = R_PARISC_PLABEL21L;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
case 32:
|
|
switch (field)
|
|
{
|
|
case e_fsel:
|
|
final_type = R_PARISC_DIR32;
|
|
break;
|
|
case e_psel:
|
|
final_type = R_PARISC_PLABEL32;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
|
|
case R_HPPA_GOTOFF:
|
|
switch (format)
|
|
{
|
|
case 14:
|
|
switch (field)
|
|
{
|
|
case e_rsel:
|
|
case e_rrsel:
|
|
final_type = R_PARISC_DPREL14R;
|
|
break;
|
|
case e_fsel:
|
|
final_type = R_PARISC_DPREL14F;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
case 21:
|
|
switch (field)
|
|
{
|
|
case e_lrsel:
|
|
case e_lsel:
|
|
final_type = R_PARISC_DPREL21L;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
|
|
case R_HPPA_PCREL_CALL:
|
|
switch (format)
|
|
{
|
|
case 14:
|
|
switch (field)
|
|
{
|
|
case e_rsel:
|
|
case e_rrsel:
|
|
final_type = R_PARISC_PCREL14R;
|
|
break;
|
|
case e_fsel:
|
|
final_type = R_PARISC_PCREL14F;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
case 17:
|
|
switch (field)
|
|
{
|
|
case e_rsel:
|
|
case e_rrsel:
|
|
final_type = R_PARISC_PCREL17R;
|
|
break;
|
|
case e_fsel:
|
|
final_type = R_PARISC_PCREL17F;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
case 21:
|
|
switch (field)
|
|
{
|
|
case e_lsel:
|
|
case e_lrsel:
|
|
final_type = R_PARISC_PCREL21L;
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
return NULL;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
return NULL;
|
|
}
|
|
|
|
return final_types;
|
|
}
|
|
|
|
#undef final_type
|
|
|
|
/* Set the contents of a particular section at a particular location. */
|
|
|
|
static boolean
|
|
elf32_hppa_set_section_contents (abfd, section, location, offset, count)
|
|
bfd *abfd;
|
|
sec_ptr section;
|
|
PTR location;
|
|
file_ptr offset;
|
|
bfd_size_type count;
|
|
{
|
|
/* Ignore write requests for the symbol extension section until we've
|
|
had the chance to rebuild it ourselves. */
|
|
if (!strcmp (section->name, ".PARISC.symextn") && !symext_chain_size)
|
|
return true;
|
|
else
|
|
return _bfd_elf_set_section_contents (abfd, section, location,
|
|
offset, count);
|
|
}
|
|
|
|
/* Translate from an elf into field into a howto relocation pointer. */
|
|
|
|
static void
|
|
elf32_hppa_info_to_howto (abfd, cache_ptr, dst)
|
|
bfd *abfd;
|
|
arelent *cache_ptr;
|
|
Elf32_Internal_Rela *dst;
|
|
{
|
|
BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_PARISC_UNIMPLEMENTED);
|
|
cache_ptr->howto = &elf_hppa_howto_table[ELF32_R_TYPE (dst->r_info)];
|
|
}
|
|
|
|
|
|
/* Actually perform a relocation. NOTE this is (mostly) superceeded
|
|
by elf32_hppa_bfd_final_link_relocate which is called by the new
|
|
fast linker. */
|
|
|
|
static bfd_reloc_status_type
|
|
hppa_elf_reloc (abfd, reloc_entry, symbol_in, data, input_section, output_bfd,
|
|
error_message)
|
|
bfd *abfd;
|
|
arelent *reloc_entry;
|
|
asymbol *symbol_in;
|
|
PTR data;
|
|
asection *input_section;
|
|
bfd *output_bfd;
|
|
char **error_message;
|
|
{
|
|
/* It is no longer valid to call hppa_elf_reloc when creating
|
|
a final executable. */
|
|
if (output_bfd)
|
|
{
|
|
reloc_entry->address += input_section->output_offset;
|
|
|
|
/* Work around lossage in generic elf code to write relocations.
|
|
(maps different section symbols into the same symbol index). */
|
|
if ((symbol_in->flags & BSF_SECTION_SYM)
|
|
&& symbol_in->section)
|
|
reloc_entry->addend += symbol_in->section->output_offset;
|
|
return bfd_reloc_ok;
|
|
}
|
|
else
|
|
{
|
|
*error_message = (char *) "Unsupported call to hppa_elf_reloc";
|
|
return bfd_reloc_notsupported;
|
|
}
|
|
}
|
|
|
|
/* Actually perform a relocation as part of a final link. This can get
|
|
rather hairy when linker stubs are needed. */
|
|
|
|
static bfd_reloc_status_type
|
|
elf32_hppa_bfd_final_link_relocate (howto, input_bfd, output_bfd,
|
|
input_section, contents, offset, value,
|
|
addend, info, sym_sec, sym_name, is_local)
|
|
reloc_howto_type *howto;
|
|
bfd *input_bfd;
|
|
bfd *output_bfd;
|
|
asection *input_section;
|
|
bfd_byte *contents;
|
|
bfd_vma offset;
|
|
bfd_vma value;
|
|
bfd_vma addend;
|
|
struct bfd_link_info *info;
|
|
asection *sym_sec;
|
|
const char *sym_name;
|
|
int is_local;
|
|
{
|
|
unsigned long insn;
|
|
unsigned long r_type = howto->type;
|
|
unsigned long r_format = howto->bitsize;
|
|
unsigned long r_field = e_fsel;
|
|
bfd_byte *hit_data = contents + offset;
|
|
boolean r_pcrel = howto->pc_relative;
|
|
|
|
insn = bfd_get_32 (input_bfd, hit_data);
|
|
|
|
/* Make sure we have a value for $global$. FIXME isn't this effectively
|
|
just like the gp pointer on MIPS? Can we use those routines for this
|
|
purpose? */
|
|
if (!elf32_hppa_hash_table (info)->global_sym_defined)
|
|
{
|
|
struct elf_link_hash_entry *h;
|
|
asection *sec;
|
|
|
|
h = elf_link_hash_lookup (elf_hash_table (info), "$global$", false,
|
|
false, false);
|
|
|
|
/* If there isn't a $global$, then we're in deep trouble. */
|
|
if (h == NULL)
|
|
return bfd_reloc_notsupported;
|
|
|
|
/* If $global$ isn't a defined symbol, then we're still in deep
|
|
trouble. */
|
|
if (h->root.type != bfd_link_hash_defined)
|
|
return bfd_reloc_undefined;
|
|
|
|
sec = h->root.u.def.section;
|
|
elf32_hppa_hash_table (info)->global_value = (h->root.u.def.value
|
|
+ sec->output_section->vma
|
|
+ sec->output_offset);
|
|
elf32_hppa_hash_table (info)->global_sym_defined = 1;
|
|
}
|
|
|
|
switch (r_type)
|
|
{
|
|
case R_PARISC_NONE:
|
|
break;
|
|
|
|
case R_PARISC_DIR32:
|
|
case R_PARISC_DIR17F:
|
|
case R_PARISC_PCREL17C:
|
|
r_field = e_fsel;
|
|
goto do_basic_type_1;
|
|
case R_PARISC_DIR21L:
|
|
case R_PARISC_PCREL21L:
|
|
r_field = e_lrsel;
|
|
goto do_basic_type_1;
|
|
case R_PARISC_DIR17R:
|
|
case R_PARISC_PCREL17R:
|
|
case R_PARISC_DIR14R:
|
|
case R_PARISC_PCREL14R:
|
|
r_field = e_rrsel;
|
|
goto do_basic_type_1;
|
|
|
|
/* For all the DP relative relocations, we need to examine the symbol's
|
|
section. If it's a code section, then "data pointer relative" makes
|
|
no sense. In that case we don't adjust the "value", and for 21 bit
|
|
addil instructions, we change the source addend register from %dp to
|
|
%r0. */
|
|
case R_PARISC_DPREL21L:
|
|
r_field = e_lrsel;
|
|
if (sym_sec->flags & SEC_CODE)
|
|
{
|
|
if ((insn & 0xfc000000) >> 26 == 0xa
|
|
&& (insn & 0x03e00000) >> 21 == 0x1b)
|
|
insn &= ~0x03e00000;
|
|
}
|
|
else
|
|
value -= elf32_hppa_hash_table (info)->global_value;
|
|
goto do_basic_type_1;
|
|
case R_PARISC_DPREL14R:
|
|
r_field = e_rrsel;
|
|
if ((sym_sec->flags & SEC_CODE) == 0)
|
|
value -= elf32_hppa_hash_table (info)->global_value;
|
|
goto do_basic_type_1;
|
|
case R_PARISC_DPREL14F:
|
|
r_field = e_fsel;
|
|
if ((sym_sec->flags & SEC_CODE) == 0)
|
|
value -= elf32_hppa_hash_table (info)->global_value;
|
|
goto do_basic_type_1;
|
|
|
|
/* These cases are separate as they may involve a lot more work
|
|
to deal with linker stubs. */
|
|
case R_PARISC_PLABEL32:
|
|
case R_PARISC_PLABEL21L:
|
|
case R_PARISC_PLABEL14R:
|
|
case R_PARISC_PCREL17F:
|
|
{
|
|
bfd_vma location;
|
|
unsigned int len, caller_args, callee_args;
|
|
arg_reloc_type arg_reloc_types[5];
|
|
struct elf32_hppa_args_hash_table *args_hash_table;
|
|
struct elf32_hppa_args_hash_entry *args_hash;
|
|
char *new_name, *stub_name;
|
|
|
|
/* Get the field selector right. We'll need it in a minute. */
|
|
if (r_type == R_PARISC_PCREL17F
|
|
|| r_type == R_PARISC_PLABEL32)
|
|
r_field = e_fsel;
|
|
else if (r_type == R_PARISC_PLABEL21L)
|
|
r_field = e_lrsel;
|
|
else if (r_type == R_PARISC_PLABEL14R)
|
|
r_field = e_rrsel;
|
|
|
|
/* Find out where we are and where we're going. */
|
|
location = (offset +
|
|
input_section->output_offset +
|
|
input_section->output_section->vma);
|
|
|
|
/* Now look for the argument relocation bits associated with the
|
|
target. */
|
|
len = strlen (sym_name) + 1;
|
|
if (is_local)
|
|
len += 9;
|
|
new_name = bfd_malloc (len);
|
|
if (!new_name)
|
|
return bfd_reloc_notsupported;
|
|
strcpy (new_name, sym_name);
|
|
|
|
/* Local symbols have unique IDs. */
|
|
if (is_local)
|
|
sprintf (new_name + len - 10, "_%08x", (int)sym_sec);
|
|
|
|
args_hash_table = elf32_hppa_hash_table (info)->args_hash_table;
|
|
|
|
args_hash = elf32_hppa_args_hash_lookup (args_hash_table,
|
|
new_name, false, false);
|
|
if (args_hash == NULL)
|
|
callee_args = 0;
|
|
else
|
|
callee_args = args_hash->arg_bits;
|
|
|
|
/* If this is a CALL relocation, then get the caller's bits
|
|
from the addend. Else use the magic 0x155 value for PLABELS.
|
|
|
|
Also we don't care about the destination (value) for PLABELS. */
|
|
if (r_type == R_PARISC_PCREL17F)
|
|
caller_args = HPPA_R_ARG_RELOC (addend);
|
|
else
|
|
{
|
|
caller_args = 0x155;
|
|
location = value;
|
|
}
|
|
|
|
/* Any kind of linker stub needed? */
|
|
if (((int)(value - location) > 0x3ffff)
|
|
|| ((int)(value - location) < (int)0xfffc0000)
|
|
|| elf32_hppa_arg_reloc_needed (caller_args, callee_args,
|
|
arg_reloc_types))
|
|
{
|
|
struct elf32_hppa_stub_hash_table *stub_hash_table;
|
|
struct elf32_hppa_stub_hash_entry *stub_hash;
|
|
asection *stub_section;
|
|
|
|
/* Build a name for the stub. */
|
|
|
|
len = strlen (new_name);
|
|
len += 23;
|
|
stub_name = bfd_malloc (len);
|
|
if (!stub_name)
|
|
return bfd_reloc_notsupported;
|
|
elf32_hppa_name_of_stub (caller_args, callee_args,
|
|
location, value, stub_name);
|
|
strcat (stub_name, new_name);
|
|
free (new_name);
|
|
|
|
stub_hash_table = elf32_hppa_hash_table (info)->stub_hash_table;
|
|
|
|
stub_hash
|
|
= elf32_hppa_stub_hash_lookup (stub_hash_table, stub_name,
|
|
false, false);
|
|
|
|
/* We're done with that name. */
|
|
free (stub_name);
|
|
|
|
/* The stub BFD only has one section. */
|
|
stub_section = stub_hash_table->stub_bfd->sections;
|
|
|
|
if (stub_hash != NULL)
|
|
{
|
|
|
|
if (r_type == R_PARISC_PCREL17F)
|
|
{
|
|
unsigned long delay_insn;
|
|
unsigned int opcode, rtn_reg, ldo_target_reg, ldo_src_reg;
|
|
|
|
/* We'll need to peek at the next insn. */
|
|
delay_insn = bfd_get_32 (input_bfd, hit_data + 4);
|
|
opcode = get_opcode (delay_insn);
|
|
|
|
/* We also need to know the return register for this
|
|
call. */
|
|
rtn_reg = (insn & 0x03e00000) >> 21;
|
|
|
|
ldo_src_reg = (delay_insn & 0x03e00000) >> 21;
|
|
ldo_target_reg = (delay_insn & 0x001f0000) >> 16;
|
|
|
|
/* Munge up the value and other parameters for
|
|
hppa_elf_relocate_insn. */
|
|
|
|
value = (stub_hash->offset
|
|
+ stub_section->output_offset
|
|
+ stub_section->output_section->vma);
|
|
|
|
r_format = 17;
|
|
r_field = e_fsel;
|
|
r_pcrel = 0;
|
|
addend = 0;
|
|
|
|
/* We need to peek at the delay insn and determine if
|
|
we'll need to swap the branch and its delay insn. */
|
|
if ((insn & 2)
|
|
|| (opcode == LDO
|
|
&& ldo_target_reg == rtn_reg)
|
|
|| (delay_insn == 0x08000240))
|
|
{
|
|
/* No need to swap the branch and its delay slot, but
|
|
we do need to make sure to jump past the return
|
|
pointer update in the stub. */
|
|
value += 4;
|
|
|
|
/* If the delay insn does a return pointer adjustment,
|
|
then we have to make sure it stays valid. */
|
|
if (opcode == LDO
|
|
&& ldo_target_reg == rtn_reg)
|
|
{
|
|
delay_insn &= 0xfc00ffff;
|
|
delay_insn |= ((31 << 21) | (31 << 16));
|
|
bfd_put_32 (input_bfd, delay_insn, hit_data + 4);
|
|
}
|
|
/* Use a BLE to reach the stub. */
|
|
insn = BLE_SR4_R0;
|
|
}
|
|
else
|
|
{
|
|
/* Wonderful, we have to swap the call insn and its
|
|
delay slot. */
|
|
bfd_put_32 (input_bfd, delay_insn, hit_data);
|
|
/* Use a BLE,n to reach the stub. */
|
|
insn = (BLE_SR4_R0 | 0x2);
|
|
bfd_put_32 (input_bfd, insn, hit_data + 4);
|
|
insn = hppa_elf_relocate_insn (input_bfd,
|
|
input_section,
|
|
insn, offset + 4,
|
|
value, addend,
|
|
r_format, r_field,
|
|
r_pcrel);
|
|
/* Update the instruction word. */
|
|
bfd_put_32 (input_bfd, insn, hit_data + 4);
|
|
return bfd_reloc_dangerous;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* PLABEL stuff is easy. */
|
|
|
|
value = (stub_hash->offset
|
|
+ stub_section->output_offset
|
|
+ stub_section->output_section->vma);
|
|
/* We don't need the RP adjustment for PLABELs. */
|
|
value += 4;
|
|
if (r_type == R_PARISC_PLABEL32)
|
|
r_format = 32;
|
|
else if (r_type == R_PARISC_PLABEL21L)
|
|
r_format = 21;
|
|
else if (r_type == R_PARISC_PLABEL14R)
|
|
r_format = 14;
|
|
|
|
r_pcrel = 0;
|
|
addend = 0;
|
|
}
|
|
}
|
|
else
|
|
return bfd_reloc_notsupported;
|
|
}
|
|
goto do_basic_type_1;
|
|
}
|
|
|
|
do_basic_type_1:
|
|
insn = hppa_elf_relocate_insn (input_bfd, input_section, insn,
|
|
offset, value, addend, r_format,
|
|
r_field, r_pcrel);
|
|
break;
|
|
|
|
/* Something we don't know how to handle. */
|
|
default:
|
|
return bfd_reloc_notsupported;
|
|
}
|
|
|
|
/* Update the instruction word. */
|
|
bfd_put_32 (input_bfd, insn, hit_data);
|
|
return (bfd_reloc_ok);
|
|
}
|
|
|
|
/* Return the address of the howto table entry to perform the CODE
|
|
relocation for an ARCH machine. */
|
|
|
|
static reloc_howto_type *
|
|
elf_hppa_reloc_type_lookup (abfd, code)
|
|
bfd *abfd;
|
|
bfd_reloc_code_real_type code;
|
|
{
|
|
if ((int) code < (int) R_PARISC_UNIMPLEMENTED)
|
|
{
|
|
BFD_ASSERT ((int) elf_hppa_howto_table[(int) code].type == (int) code);
|
|
return &elf_hppa_howto_table[(int) code];
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* Return true if SYM represents a local label symbol. */
|
|
|
|
static boolean
|
|
hppa_elf_is_local_label (abfd, sym)
|
|
bfd *abfd;
|
|
asymbol *sym;
|
|
{
|
|
return (sym->name[0] == 'L' && sym->name[1] == '$');
|
|
}
|
|
|
|
/* Do any backend specific processing when beginning to write an object
|
|
file. For PA ELF we need to determine the size of the symbol extension
|
|
section *before* any other output processing happens. */
|
|
|
|
static void
|
|
elf32_hppa_backend_begin_write_processing (abfd, info)
|
|
bfd *abfd;
|
|
struct bfd_link_info *info;
|
|
{
|
|
unsigned int i;
|
|
asection *symextn_sec;
|
|
|
|
/* Size up the symbol extension section. */
|
|
if ((abfd->outsymbols == NULL
|
|
&& info == NULL)
|
|
|| symext_chain_size != 0)
|
|
return;
|
|
|
|
if (info == NULL)
|
|
{
|
|
/* We were not called from the BFD ELF linker code, so we need
|
|
to examine the output BFD's outsymbols.
|
|
|
|
Note we can not build the symbol extensions now as the symbol
|
|
map hasn't been set up. */
|
|
for (i = 0; i < abfd->symcount; i++)
|
|
{
|
|
elf_symbol_type *symbol = (elf_symbol_type *)abfd->outsymbols[i];
|
|
|
|
/* Only functions ever need an entry in the symbol extension
|
|
section. */
|
|
if (!(symbol->symbol.flags & BSF_FUNCTION))
|
|
continue;
|
|
|
|
/* And only if they specify the locations of their arguments. */
|
|
if (symbol->tc_data.hppa_arg_reloc == 0)
|
|
continue;
|
|
|
|
/* Yup. This function symbol needs an entry. */
|
|
symext_chain_size += 2 * ELF32_PARISC_SX_SIZE;
|
|
}
|
|
}
|
|
else if (info->relocateable == true)
|
|
{
|
|
struct elf32_hppa_args_hash_table *table;
|
|
table = elf32_hppa_hash_table (info)->args_hash_table;
|
|
|
|
/* Determine the size of the symbol extension section. */
|
|
elf32_hppa_args_hash_traverse (table,
|
|
elf32_hppa_size_symext,
|
|
&symext_chain_size);
|
|
}
|
|
|
|
/* Now create the section and set its size. We'll fill in the
|
|
contents later. */
|
|
symextn_sec = bfd_get_section_by_name (abfd, SYMEXTN_SECTION_NAME);
|
|
if (symextn_sec == NULL)
|
|
symextn_sec = bfd_make_section (abfd, SYMEXTN_SECTION_NAME);
|
|
|
|
bfd_set_section_flags (abfd, symextn_sec,
|
|
SEC_LOAD | SEC_HAS_CONTENTS | SEC_DATA);
|
|
symextn_sec->output_section = symextn_sec;
|
|
symextn_sec->output_offset = 0;
|
|
bfd_set_section_alignment (abfd, symextn_sec, 2);
|
|
bfd_set_section_size (abfd, symextn_sec, symext_chain_size);
|
|
}
|
|
|
|
/* Called for each entry in the args location hash table. For each
|
|
entry we bump the size pointer by 2 records (16 bytes). */
|
|
|
|
static boolean
|
|
elf32_hppa_size_symext (gen_entry, in_args)
|
|
struct bfd_hash_entry *gen_entry;
|
|
PTR in_args;
|
|
{
|
|
bfd_size_type *sizep = (bfd_size_type *)in_args;
|
|
|
|
*sizep += 2 * ELF32_PARISC_SX_SIZE;
|
|
return true;
|
|
}
|
|
|
|
/* Backend routine called by the linker for each output symbol.
|
|
|
|
For PA ELF we use this opportunity to add an appropriate entry
|
|
to the symbol extension chain for function symbols. */
|
|
|
|
static boolean
|
|
elf32_hppa_link_output_symbol_hook (abfd, info, name, sym, section)
|
|
bfd *abfd;
|
|
struct bfd_link_info *info;
|
|
const char *name;
|
|
Elf_Internal_Sym *sym;
|
|
asection *section;
|
|
{
|
|
char *new_name;
|
|
unsigned int len, index;
|
|
struct elf32_hppa_args_hash_table *args_hash_table;
|
|
struct elf32_hppa_args_hash_entry *args_hash;
|
|
|
|
/* If the args hash table is NULL, then we've encountered an error
|
|
of some sorts (for example, an undefined symbol). In that case
|
|
we've got nothing else to do.
|
|
|
|
NOTE: elf_link_output_symbol will abort if we return false here! */
|
|
if (elf32_hppa_hash_table (info)->args_hash_table == NULL)
|
|
return true;
|
|
|
|
index = elf32_hppa_hash_table (info)->output_symbol_count++;
|
|
|
|
/* We need to look up this symbol in the args hash table to see if
|
|
it has argument relocation bits. */
|
|
if (ELF_ST_TYPE (sym->st_info) != STT_FUNC)
|
|
return true;
|
|
|
|
/* We know it's a function symbol of some kind. */
|
|
len = strlen (name) + 1;
|
|
if (ELF_ST_BIND (sym->st_info) == STB_LOCAL)
|
|
len += 9;
|
|
|
|
new_name = bfd_malloc (len);
|
|
if (new_name == NULL)
|
|
return false;
|
|
|
|
strcpy (new_name, name);
|
|
if (ELF_ST_BIND (sym->st_info) == STB_LOCAL)
|
|
sprintf (new_name + len - 10, "_%08x", (int)section);
|
|
|
|
/* Now that we have the unique name, we can look it up in the
|
|
args hash table. */
|
|
args_hash_table = elf32_hppa_hash_table (info)->args_hash_table;
|
|
args_hash = elf32_hppa_args_hash_lookup (args_hash_table, new_name,
|
|
false, false);
|
|
free (new_name);
|
|
if (args_hash == NULL)
|
|
return true;
|
|
|
|
/* We know this symbol has arg reloc bits. */
|
|
add_entry_to_symext_chain (abfd, args_hash->arg_bits,
|
|
index, &symext_rootP, &symext_lastP);
|
|
return true;
|
|
}
|
|
|
|
/* Perform any processing needed late in the object file writing process.
|
|
For PA ELF we build and set the contents of the symbol extension
|
|
section. */
|
|
|
|
static void
|
|
elf32_hppa_backend_final_write_processing (abfd, linker)
|
|
bfd *abfd;
|
|
boolean linker;
|
|
{
|
|
asection *symextn_sec;
|
|
unsigned int i;
|
|
|
|
/* Now build the symbol extension section. */
|
|
if (symext_chain_size == 0)
|
|
return;
|
|
|
|
if (! linker)
|
|
{
|
|
/* We were not called from the backend linker, so we still need
|
|
to build the symbol extension chain.
|
|
|
|
Look at each symbol, adding the appropriate information to the
|
|
symbol extension section list as necessary. */
|
|
for (i = 0; i < abfd->symcount; i++)
|
|
{
|
|
elf_symbol_type *symbol = (elf_symbol_type *) abfd->outsymbols[i];
|
|
|
|
/* Only functions ever need an entry in the symbol extension
|
|
section. */
|
|
if (!(symbol->symbol.flags & BSF_FUNCTION))
|
|
continue;
|
|
|
|
/* And only if they specify the locations of their arguments. */
|
|
if (symbol->tc_data.hppa_arg_reloc == 0)
|
|
continue;
|
|
|
|
/* Add this symbol's information to the chain. */
|
|
add_entry_to_symext_chain (abfd, symbol->tc_data.hppa_arg_reloc,
|
|
symbol->symbol.udata.i, &symext_rootP,
|
|
&symext_lastP);
|
|
}
|
|
}
|
|
|
|
/* Now fill in the contents of the symbol extension section. */
|
|
elf_hppa_tc_make_sections (abfd, symext_rootP);
|
|
|
|
/* And attach that as the section's contents. */
|
|
symextn_sec = bfd_get_section_by_name (abfd, SYMEXTN_SECTION_NAME);
|
|
if (symextn_sec == (asection *) 0)
|
|
abort();
|
|
|
|
symextn_sec->contents = (void *)symextn_contents;
|
|
|
|
bfd_set_section_contents (abfd, symextn_sec, symextn_sec->contents,
|
|
symextn_sec->output_offset, symextn_sec->_raw_size);
|
|
}
|
|
|
|
/* Update the symbol extention chain to include the symbol pointed to
|
|
by SYMBOLP if SYMBOLP is a function symbol. Used internally and by GAS. */
|
|
|
|
static void
|
|
add_entry_to_symext_chain (abfd, arg_reloc, sym_idx, symext_root, symext_last)
|
|
bfd *abfd;
|
|
unsigned int arg_reloc;
|
|
unsigned int sym_idx;
|
|
symext_chainS **symext_root;
|
|
symext_chainS **symext_last;
|
|
{
|
|
symext_chainS *symextP;
|
|
|
|
/* Allocate memory and initialize this entry. */
|
|
symextP = (symext_chainS *) bfd_alloc (abfd, sizeof (symext_chainS) * 2);
|
|
if (!symextP)
|
|
abort(); /* FIXME */
|
|
|
|
symextP[0].entry = ELF32_PARISC_SX_WORD (PARISC_SXT_SYMNDX, sym_idx);
|
|
symextP[0].next = &symextP[1];
|
|
|
|
symextP[1].entry = ELF32_PARISC_SX_WORD (PARISC_SXT_ARG_RELOC, arg_reloc);
|
|
symextP[1].next = NULL;
|
|
|
|
/* Now update the chain itself so it can be walked later to build
|
|
the symbol extension section. */
|
|
if (*symext_root == NULL)
|
|
{
|
|
*symext_root = &symextP[0];
|
|
*symext_last = &symextP[1];
|
|
}
|
|
else
|
|
{
|
|
(*symext_last)->next = &symextP[0];
|
|
*symext_last = &symextP[1];
|
|
}
|
|
}
|
|
|
|
/* Build the symbol extension section. */
|
|
|
|
static void
|
|
elf_hppa_tc_make_sections (abfd, symext_root)
|
|
bfd *abfd;
|
|
symext_chainS *symext_root;
|
|
{
|
|
symext_chainS *symextP;
|
|
unsigned int i;
|
|
asection *symextn_sec;
|
|
|
|
symextn_sec = bfd_get_section_by_name (abfd, SYMEXTN_SECTION_NAME);
|
|
|
|
/* Grab some memory for the contents of the symbol extension section
|
|
itself. */
|
|
symextn_contents = (bfd_byte *) bfd_zalloc (abfd,
|
|
symextn_sec->_raw_size);
|
|
if (!symextn_contents)
|
|
abort(); /* FIXME */
|
|
|
|
/* Fill in the contents of the symbol extension chain. */
|
|
for (i = 0, symextP = symext_root; symextP; symextP = symextP->next, ++i)
|
|
ELF32_PARISC_SX_PUT (abfd, (bfd_vma) symextP->entry,
|
|
symextn_contents + i * ELF32_PARISC_SX_SIZE);
|
|
|
|
return;
|
|
}
|
|
|
|
/* Do some PA ELF specific work after reading in the symbol table.
|
|
In particular attach the argument relocation from the
|
|
symbol extension section to the appropriate symbols. */
|
|
|
|
static boolean
|
|
elf32_hppa_backend_symbol_table_processing (abfd, esyms,symcnt)
|
|
bfd *abfd;
|
|
elf_symbol_type *esyms;
|
|
unsigned int symcnt;
|
|
{
|
|
Elf32_Internal_Shdr *symextn_hdr =
|
|
bfd_elf_find_section (abfd, SYMEXTN_SECTION_NAME);
|
|
unsigned int i, current_sym_idx = 0;
|
|
|
|
/* If no symbol extension existed, then all symbol extension information
|
|
is assumed to be zero. */
|
|
if (symextn_hdr == NULL)
|
|
{
|
|
for (i = 0; i < symcnt; i++)
|
|
esyms[i].tc_data.hppa_arg_reloc = 0;
|
|
return (true);
|
|
}
|
|
|
|
/* FIXME: Why not use bfd_get_section_contents here? Also should give
|
|
memory back when we're done. */
|
|
/* Allocate a buffer of the appropriate size for the symextn section. */
|
|
symextn_hdr->contents = bfd_zalloc(abfd,symextn_hdr->sh_size);
|
|
if (!symextn_hdr->contents)
|
|
return false;
|
|
|
|
/* Read in the symextn section. */
|
|
if (bfd_seek (abfd, symextn_hdr->sh_offset, SEEK_SET) == -1)
|
|
return false;
|
|
if (bfd_read ((PTR) symextn_hdr->contents, 1, symextn_hdr->sh_size, abfd)
|
|
!= symextn_hdr->sh_size)
|
|
return false;
|
|
|
|
/* Parse entries in the symbol extension section, updating the symtab
|
|
entries as we go */
|
|
for (i = 0; i < symextn_hdr->sh_size / ELF32_PARISC_SX_SIZE; i++)
|
|
{
|
|
symext_entryS se =
|
|
ELF32_PARISC_SX_GET (abfd,
|
|
((unsigned char *)symextn_hdr->contents
|
|
+ i * ELF32_PARISC_SX_SIZE));
|
|
unsigned int se_value = ELF32_PARISC_SX_VAL (se);
|
|
unsigned int se_type = ELF32_PARISC_SX_TYPE (se);
|
|
|
|
switch (se_type)
|
|
{
|
|
case PARISC_SXT_NULL:
|
|
break;
|
|
|
|
case PARISC_SXT_SYMNDX:
|
|
if (se_value >= symcnt)
|
|
{
|
|
bfd_set_error (bfd_error_bad_value);
|
|
return (false);
|
|
}
|
|
current_sym_idx = se_value - 1;
|
|
break;
|
|
|
|
case PARISC_SXT_ARG_RELOC:
|
|
esyms[current_sym_idx].tc_data.hppa_arg_reloc = se_value;
|
|
break;
|
|
|
|
default:
|
|
bfd_set_error (bfd_error_bad_value);
|
|
return (false);
|
|
}
|
|
}
|
|
return (true);
|
|
}
|
|
|
|
/* Read and attach the symbol extension information for the symbols
|
|
in INPUT_BFD to the argument location hash table. Handle locals
|
|
if DO_LOCALS is true; likewise for globals when DO_GLOBALS is true. */
|
|
|
|
static boolean
|
|
elf32_hppa_read_symext_info (input_bfd, symtab_hdr, args_hash_table, local_syms)
|
|
bfd *input_bfd;
|
|
Elf_Internal_Shdr *symtab_hdr;
|
|
struct elf32_hppa_args_hash_table *args_hash_table;
|
|
Elf_Internal_Sym *local_syms;
|
|
{
|
|
asection *symextn_sec;
|
|
bfd_byte *contents;
|
|
unsigned int i, n_entries, current_index = 0;
|
|
|
|
/* Get the symbol extension section for this BFD. If no section exists
|
|
then there's nothing to do. Likewise if the section exists, but
|
|
has no contents. */
|
|
symextn_sec = bfd_get_section_by_name (input_bfd, SYMEXTN_SECTION_NAME);
|
|
if (symextn_sec == NULL)
|
|
return true;
|
|
|
|
/* Done separately so we can turn off SEC_HAS_CONTENTS (see below). */
|
|
if (symextn_sec->_raw_size == 0)
|
|
{
|
|
symextn_sec->flags &= ~SEC_HAS_CONTENTS;
|
|
return true;
|
|
}
|
|
|
|
contents = (bfd_byte *) bfd_malloc ((size_t) symextn_sec->_raw_size);
|
|
if (contents == NULL)
|
|
return false;
|
|
|
|
/* How gross. We turn off SEC_HAS_CONTENTS for the input symbol extension
|
|
sections to keep the generic ELF/BFD code from trying to do anything
|
|
with them. We have to undo that hack temporarily so that we can read
|
|
in the contents with the generic code. */
|
|
symextn_sec->flags |= SEC_HAS_CONTENTS;
|
|
if (bfd_get_section_contents (input_bfd, symextn_sec, contents,
|
|
0, symextn_sec->_raw_size) == false)
|
|
{
|
|
symextn_sec->flags &= ~SEC_HAS_CONTENTS;
|
|
free (contents);
|
|
return false;
|
|
}
|
|
|
|
/* Gross. Turn off SEC_HAS_CONTENTS for the input symbol extension
|
|
sections (see above). */
|
|
symextn_sec->flags &= ~SEC_HAS_CONTENTS;
|
|
|
|
n_entries = symextn_sec->_raw_size / ELF32_PARISC_SX_SIZE;
|
|
for (i = 0; i < n_entries; i++)
|
|
{
|
|
symext_entryS entry =
|
|
ELF32_PARISC_SX_GET (input_bfd, contents + i * ELF32_PARISC_SX_SIZE);
|
|
unsigned int value = ELF32_PARISC_SX_VAL (entry);
|
|
unsigned int type = ELF32_PARISC_SX_TYPE (entry);
|
|
struct elf32_hppa_args_hash_entry *args_hash;
|
|
|
|
switch (type)
|
|
{
|
|
case PARISC_SXT_NULL:
|
|
break;
|
|
|
|
case PARISC_SXT_SYMNDX:
|
|
if (value >= symtab_hdr->sh_size / sizeof (Elf32_External_Sym))
|
|
{
|
|
bfd_set_error (bfd_error_bad_value);
|
|
free (contents);
|
|
return false;
|
|
}
|
|
current_index = value;
|
|
break;
|
|
|
|
case PARISC_SXT_ARG_RELOC:
|
|
if (current_index < symtab_hdr->sh_info)
|
|
{
|
|
Elf_Internal_Shdr *hdr;
|
|
char *new_name;
|
|
const char *sym_name;
|
|
asection *sym_sec;
|
|
unsigned int len;
|
|
|
|
hdr = elf_elfsections (input_bfd)[local_syms[current_index].st_shndx];
|
|
sym_sec = hdr->bfd_section;
|
|
sym_name = bfd_elf_string_from_elf_section (input_bfd,
|
|
symtab_hdr->sh_link,
|
|
local_syms[current_index].st_name);
|
|
len = strlen (sym_name) + 10;
|
|
new_name = bfd_malloc (len);
|
|
if (new_name == NULL)
|
|
{
|
|
free (contents);
|
|
return false;
|
|
}
|
|
strcpy (new_name, sym_name);
|
|
sprintf (new_name + len - 10, "_%08x", (int)sym_sec);
|
|
|
|
/* This is a global symbol with argument location info.
|
|
We need to enter it into the hash table. */
|
|
args_hash = elf32_hppa_args_hash_lookup (args_hash_table,
|
|
new_name, true,
|
|
true);
|
|
free (new_name);
|
|
if (args_hash == NULL)
|
|
{
|
|
free (contents);
|
|
return false;
|
|
}
|
|
args_hash->arg_bits = value;
|
|
break;
|
|
}
|
|
else if (current_index >= symtab_hdr->sh_info)
|
|
{
|
|
struct elf_link_hash_entry *h;
|
|
|
|
current_index -= symtab_hdr->sh_info;
|
|
h = elf_sym_hashes(input_bfd)[current_index];
|
|
/* This is a global symbol with argument location
|
|
information. We need to enter it into the hash table. */
|
|
args_hash = elf32_hppa_args_hash_lookup (args_hash_table,
|
|
h->root.root.string,
|
|
true, true);
|
|
if (args_hash == NULL)
|
|
{
|
|
bfd_set_error (bfd_error_bad_value);
|
|
free (contents);
|
|
return false;
|
|
}
|
|
args_hash->arg_bits = value;
|
|
break;
|
|
}
|
|
else
|
|
break;
|
|
|
|
default:
|
|
bfd_set_error (bfd_error_bad_value);
|
|
free (contents);
|
|
return false;
|
|
}
|
|
}
|
|
free (contents);
|
|
return true;
|
|
}
|
|
|
|
/* Undo the generic ELF code's subtraction of section->vma from the
|
|
value of each external symbol. */
|
|
|
|
static boolean
|
|
elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
|
|
bfd *abfd;
|
|
struct bfd_link_info *info;
|
|
const Elf_Internal_Sym *sym;
|
|
const char **namep;
|
|
flagword *flagsp;
|
|
asection **secp;
|
|
bfd_vma *valp;
|
|
{
|
|
*valp += (*secp)->vma;
|
|
return true;
|
|
}
|
|
|
|
/* Determine the name of the stub needed to perform a call assuming the
|
|
argument relocation bits for caller and callee are in CALLER and CALLEE
|
|
for a call from LOCATION to DESTINATION. Copy the name into STUB_NAME. */
|
|
|
|
static void
|
|
elf32_hppa_name_of_stub (caller, callee, location, destination, stub_name)
|
|
unsigned int caller, callee;
|
|
bfd_vma location, destination;
|
|
char *stub_name;
|
|
{
|
|
arg_reloc_type arg_reloc_types[5];
|
|
|
|
if (elf32_hppa_arg_reloc_needed (caller, callee, arg_reloc_types))
|
|
{
|
|
arg_reloc_location i;
|
|
/* Fill in the basic template. */
|
|
strcpy (stub_name, "__XX_XX_XX_XX_XX_stub_");
|
|
|
|
/* Now fix the specifics. */
|
|
for (i = ARG0; i <= RET; i++)
|
|
switch (arg_reloc_types[i])
|
|
{
|
|
case NO:
|
|
stub_name[3 * i + 2] = 'N';
|
|
stub_name[3 * i + 3] = 'O';
|
|
break;
|
|
case GF:
|
|
stub_name[3 * i + 2] = 'G';
|
|
stub_name[3 * i + 3] = 'F';
|
|
break;
|
|
case FG:
|
|
stub_name[3 * i + 2] = 'F';
|
|
stub_name[3 * i + 3] = 'G';
|
|
break;
|
|
case GD:
|
|
stub_name[3 * i + 2] = 'G';
|
|
stub_name[3 * i + 3] = 'D';
|
|
break;
|
|
case DG:
|
|
stub_name[3 * i + 2] = 'D';
|
|
stub_name[3 * i + 3] = 'G';
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
strcpy (stub_name, "_____long_branch_stub_");
|
|
}
|
|
|
|
/* Determine if an argument relocation stub is needed to perform a
|
|
call assuming the argument relocation bits for caller and callee
|
|
are in CALLER and CALLEE. Place the type of relocations (if any)
|
|
into stub_types_p. */
|
|
|
|
static boolean
|
|
elf32_hppa_arg_reloc_needed (caller, callee, stub_types)
|
|
unsigned int caller, callee;
|
|
arg_reloc_type stub_types[5];
|
|
{
|
|
/* Special case for no relocations. */
|
|
if (caller == 0 || callee == 0)
|
|
return 0;
|
|
else
|
|
{
|
|
arg_location caller_loc[5];
|
|
arg_location callee_loc[5];
|
|
|
|
/* Extract the location information for the argument and return
|
|
value on both the caller and callee sides. */
|
|
caller_loc[ARG0] = EXTRACT_ARBITS (caller, ARG0);
|
|
callee_loc[ARG0] = EXTRACT_ARBITS (callee, ARG0);
|
|
caller_loc[ARG1] = EXTRACT_ARBITS (caller, ARG1);
|
|
callee_loc[ARG1] = EXTRACT_ARBITS (callee, ARG1);
|
|
caller_loc[ARG2] = EXTRACT_ARBITS (caller, ARG2);
|
|
callee_loc[ARG2] = EXTRACT_ARBITS (callee, ARG2);
|
|
caller_loc[ARG3] = EXTRACT_ARBITS (caller, ARG3);
|
|
callee_loc[ARG3] = EXTRACT_ARBITS (callee, ARG3);
|
|
caller_loc[RET] = EXTRACT_ARBITS (caller, RET);
|
|
callee_loc[RET] = EXTRACT_ARBITS (callee, RET);
|
|
|
|
/* Check some special combinations. This is necessary to
|
|
deal with double precision FP arguments. */
|
|
if (caller_loc[ARG0] == AR_FU || caller_loc[ARG1] == AR_FU)
|
|
{
|
|
caller_loc[ARG0] = AR_FPDBL1;
|
|
caller_loc[ARG1] = AR_NO;
|
|
}
|
|
if (caller_loc[ARG2] == AR_FU || caller_loc[ARG3] == AR_FU)
|
|
{
|
|
caller_loc[ARG2] = AR_FPDBL2;
|
|
caller_loc[ARG3] = AR_NO;
|
|
}
|
|
if (callee_loc[ARG0] == AR_FU || callee_loc[ARG1] == AR_FU)
|
|
{
|
|
callee_loc[ARG0] = AR_FPDBL1;
|
|
callee_loc[ARG1] = AR_NO;
|
|
}
|
|
if (callee_loc[ARG2] == AR_FU || callee_loc[ARG3] == AR_FU)
|
|
{
|
|
callee_loc[ARG2] = AR_FPDBL2;
|
|
callee_loc[ARG3] = AR_NO;
|
|
}
|
|
|
|
/* Now look up any relocation needed for each argument and the
|
|
return value. */
|
|
stub_types[ARG0] = arg_mismatches[caller_loc[ARG0]][callee_loc[ARG0]];
|
|
stub_types[ARG1] = arg_mismatches[caller_loc[ARG1]][callee_loc[ARG1]];
|
|
stub_types[ARG2] = arg_mismatches[caller_loc[ARG2]][callee_loc[ARG2]];
|
|
stub_types[ARG3] = arg_mismatches[caller_loc[ARG3]][callee_loc[ARG3]];
|
|
stub_types[RET] = ret_mismatches[caller_loc[RET]][callee_loc[RET]];
|
|
|
|
return (stub_types[ARG0] != NO
|
|
|| stub_types[ARG1] != NO
|
|
|| stub_types[ARG2] != NO
|
|
|| stub_types[ARG3] != NO
|
|
|| stub_types[RET] != NO);
|
|
}
|
|
}
|
|
|
|
/* Compute the size of the stub needed to call from LOCATION to DESTINATION
|
|
(a function named SYM_NAME), with argument relocation bits CALLER and
|
|
CALLEE. Return zero if no stub is needed to perform such a call. */
|
|
|
|
static unsigned int
|
|
elf32_hppa_size_of_stub (callee, caller, location, destination, sym_name)
|
|
unsigned int callee, caller;
|
|
bfd_vma location, destination;
|
|
const char *sym_name;
|
|
{
|
|
arg_reloc_type arg_reloc_types[5];
|
|
|
|
/* Determine if a long branch or argument relocation stub is needed.
|
|
If an argument relocation stub is needed, the relocation will be
|
|
stored into arg_reloc_types. */
|
|
if (!(((int)(location - destination) > 0x3ffff)
|
|
|| ((int)(location - destination) < (int)0xfffc0000)
|
|
|| elf32_hppa_arg_reloc_needed (caller, callee, arg_reloc_types)))
|
|
return 0;
|
|
|
|
/* Some kind of stub is needed. Determine how big it needs to be.
|
|
First check for argument relocation stubs as they also handle
|
|
long calls. Then check for long calls to millicode and finally
|
|
the normal long calls. */
|
|
if (arg_reloc_types[ARG0] != NO
|
|
|| arg_reloc_types[ARG1] != NO
|
|
|| arg_reloc_types[ARG2] != NO
|
|
|| arg_reloc_types[ARG3] != NO
|
|
|| arg_reloc_types[RET] != NO)
|
|
{
|
|
/* Some kind of argument relocation stub is needed. */
|
|
unsigned int len = 16;
|
|
arg_reloc_location i;
|
|
|
|
/* Each GR or FG relocation takes 2 insns, each GD or DG
|
|
relocation takes 3 insns. Plus 4 more insns for the
|
|
RP adjustment, ldil & (be | ble) and copy. */
|
|
for (i = ARG0; i <= RET; i++)
|
|
switch (arg_reloc_types[i])
|
|
{
|
|
case GF:
|
|
case FG:
|
|
len += 8;
|
|
break;
|
|
|
|
case GD:
|
|
case DG:
|
|
len += 12;
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/* Extra instructions are needed if we're relocating a return value. */
|
|
if (arg_reloc_types[RET] != NO)
|
|
len += 12;
|
|
|
|
return len;
|
|
}
|
|
else if (!strncmp ("$$", sym_name, 2)
|
|
&& strcmp ("$$dyncall", sym_name))
|
|
return 12;
|
|
else
|
|
return 16;
|
|
}
|
|
|
|
/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
|
|
IN_ARGS contains the stub BFD and link info pointers. */
|
|
|
|
static boolean
|
|
elf32_hppa_build_one_stub (gen_entry, in_args)
|
|
struct bfd_hash_entry *gen_entry;
|
|
PTR in_args;
|
|
{
|
|
void **args = (void **)in_args;
|
|
bfd *stub_bfd = (bfd *)args[0];
|
|
struct bfd_link_info *info = (struct bfd_link_info *)args[1];
|
|
struct elf32_hppa_stub_hash_entry *entry;
|
|
struct elf32_hppa_stub_hash_table *stub_hash_table;
|
|
bfd_byte *loc;
|
|
symvalue sym_value;
|
|
const char *sym_name;
|
|
|
|
/* Initialize pointers to the stub hash table, the particular entry we
|
|
are building a stub for, and where (in memory) we should place the stub
|
|
instructions. */
|
|
entry = (struct elf32_hppa_stub_hash_entry *)gen_entry;
|
|
stub_hash_table = elf32_hppa_hash_table(info)->stub_hash_table;
|
|
loc = stub_hash_table->location;
|
|
|
|
/* Make a note of the offset within the stubs for this entry. */
|
|
entry->offset = stub_hash_table->offset;
|
|
|
|
/* The symbol's name starts at offset 22. */
|
|
sym_name = entry->root.string + 22;
|
|
|
|
sym_value = (entry->target_value
|
|
+ entry->target_section->output_offset
|
|
+ entry->target_section->output_section->vma);
|
|
|
|
if (strncmp ("_____long_branch_stub_", entry->root.string, 22))
|
|
{
|
|
/* This must be an argument or return value relocation stub. */
|
|
unsigned long insn;
|
|
arg_reloc_location i;
|
|
bfd_byte *begin_loc = loc;
|
|
|
|
/* First the return pointer adjustment. Depending on exact calling
|
|
sequence this instruction may be skipped. */
|
|
bfd_put_32 (stub_bfd, LDO_M4_R31_R31, loc);
|
|
loc += 4;
|
|
|
|
/* If we are relocating a return value, then we're going to have
|
|
to return into the stub. So we have to save off the user's
|
|
return pointer into the stack at RP'. */
|
|
if (strncmp (entry->root.string + 14, "NO", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, STW_R31_M8R30, loc);
|
|
loc += 4;
|
|
}
|
|
|
|
/* Iterate over the argument relocations, emitting instructions
|
|
to move them around as necessary. */
|
|
for (i = ARG0; i <= ARG3; i++)
|
|
{
|
|
if (!strncmp (entry->root.string + 3 * i + 2, "GF", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, STW_ARG_M16R30 | ((26 - i) << 16), loc);
|
|
bfd_put_32 (stub_bfd, FLDW_M16R30_FARG | (4 + i), loc + 4);
|
|
loc += 8;
|
|
}
|
|
else if (!strncmp (entry->root.string + 3 * i + 2, "FG", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, FSTW_FARG_M16R30 | (4 + i), loc);
|
|
bfd_put_32 (stub_bfd, LDW_M16R30_ARG | ((26 - i) << 16), loc + 4);
|
|
loc += 8;
|
|
}
|
|
else if (!strncmp (entry->root.string + 3 * i + 2, "GD", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, STW_ARG_M12R30 | ((26 - i) << 16), loc);
|
|
bfd_put_32 (stub_bfd, STW_ARG_M16R30 | ((25 - i) << 16), loc + 4);
|
|
bfd_put_32 (stub_bfd, FLDD_M16R30_FARG | (5 + i), loc + 8);
|
|
loc += 12;
|
|
}
|
|
else if (!strncmp (entry->root.string + 3 * i + 2, "DG", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, FSTD_FARG_M16R30 | (5 + i), loc);
|
|
bfd_put_32 (stub_bfd, LDW_M12R30_ARG | ((26 - i) << 16), loc + 4);
|
|
bfd_put_32 (stub_bfd, LDW_M16R30_ARG | ((25 - i) << 16), loc + 8);
|
|
loc += 12;
|
|
}
|
|
}
|
|
|
|
/* Load the high bits of the target address into %r1. */
|
|
insn = hppa_rebuild_insn (stub_bfd, LDIL_R1,
|
|
hppa_field_adjust (sym_value, 0, e_lrsel), 21);
|
|
bfd_put_32 (stub_bfd, insn, loc);
|
|
loc += 4;
|
|
|
|
/* If we are relocating a return value, then we're going to have
|
|
to return into the stub, then perform the return value relocation. */
|
|
if (strncmp (entry->root.string + 14, "NO", 2))
|
|
{
|
|
/* To return to the stub we "ble" to the target and copy the return
|
|
pointer from %r31 into %r2. */
|
|
insn = hppa_rebuild_insn (stub_bfd,
|
|
BLE_SR4_R1,
|
|
hppa_field_adjust (sym_value, 0,
|
|
e_rrsel) >> 2,
|
|
17);
|
|
bfd_put_32 (stub_bfd, insn, loc);
|
|
bfd_put_32 (stub_bfd, COPY_R31_R2, loc + 4);
|
|
|
|
/* Reload the return pointer for our caller from the stack. */
|
|
bfd_put_32 (stub_bfd, LDW_M8R30_R31, loc + 8);
|
|
loc += 12;
|
|
|
|
/* Perform the return value relocation. */
|
|
if (!strncmp (entry->root.string + 14, "GF", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, STW_ARG_M16R30 | (28 << 16), loc);
|
|
bfd_put_32 (stub_bfd, FLDW_M16R30_FARG | 4, loc + 4);
|
|
loc += 8;
|
|
}
|
|
else if (!strncmp (entry->root.string + 14, "FG", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, FSTW_FARG_M16R30 | 4, loc);
|
|
bfd_put_32 (stub_bfd, LDW_M16R30_ARG | (28 << 16), loc + 4);
|
|
loc += 8;
|
|
}
|
|
else if (!strncmp (entry->root.string + 2, "GD", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, STW_ARG_M12R30 | (28 << 16), loc);
|
|
bfd_put_32 (stub_bfd, STW_ARG_M16R30 | (29 << 16), loc + 4);
|
|
bfd_put_32 (stub_bfd, FLDD_M16R30_FARG | 4, loc + 8);
|
|
loc += 12;
|
|
}
|
|
else if (!strncmp (entry->root.string + 2, "DG", 2))
|
|
{
|
|
bfd_put_32 (stub_bfd, FSTD_FARG_M16R30 | 4, loc);
|
|
bfd_put_32 (stub_bfd, LDW_M12R30_ARG | (28 << 16), loc + 4);
|
|
bfd_put_32 (stub_bfd, LDW_M16R30_ARG | (29 << 16), loc + 8);
|
|
loc += 12;
|
|
}
|
|
/* Branch back to the user's code now. */
|
|
bfd_put_32 (stub_bfd, BV_N_0_R31, loc);
|
|
loc += 4;
|
|
}
|
|
else
|
|
{
|
|
/* No return value relocation, so we can simply "be" to the
|
|
target and copy out return pointer into %r2. */
|
|
insn = hppa_rebuild_insn (stub_bfd, BE_SR4_R1,
|
|
hppa_field_adjust (sym_value, 0,
|
|
e_rrsel) >> 2, 17);
|
|
bfd_put_32 (stub_bfd, insn, loc);
|
|
bfd_put_32 (stub_bfd, COPY_R31_R2, loc + 4);
|
|
loc += 8;
|
|
}
|
|
|
|
/* Update the location and offsets. */
|
|
stub_hash_table->location += (loc - begin_loc);
|
|
stub_hash_table->offset += (loc - begin_loc);
|
|
}
|
|
else
|
|
{
|
|
/* Create one of two variant long branch stubs. One for $$dyncall and
|
|
normal calls, the other for calls to millicode. */
|
|
unsigned long insn;
|
|
int millicode_call = 0;
|
|
|
|
if (!strncmp ("$$", sym_name, 2) && strcmp ("$$dyncall", sym_name))
|
|
millicode_call = 1;
|
|
|
|
/* First the return pointer adjustment. Depending on exact calling
|
|
sequence this instruction may be skipped. */
|
|
bfd_put_32 (stub_bfd, LDO_M4_R31_R31, loc);
|
|
|
|
/* The next two instructions are the long branch itself. A long branch
|
|
is formed with "ldil" loading the upper bits of the target address
|
|
into a register, then branching with "be" which adds in the lower bits.
|
|
Long branches to millicode nullify the delay slot of the "be". */
|
|
insn = hppa_rebuild_insn (stub_bfd, LDIL_R1,
|
|
hppa_field_adjust (sym_value, 0, e_lrsel), 21);
|
|
bfd_put_32 (stub_bfd, insn, loc + 4);
|
|
insn = hppa_rebuild_insn (stub_bfd, BE_SR4_R1 | (millicode_call ? 2 : 0),
|
|
hppa_field_adjust (sym_value, 0, e_rrsel) >> 2,
|
|
17);
|
|
bfd_put_32 (stub_bfd, insn, loc + 8);
|
|
|
|
if (!millicode_call)
|
|
{
|
|
/* The sequence to call this stub places the return pointer into %r31,
|
|
the final target expects the return pointer in %r2, so copy the
|
|
return pointer into the proper register. */
|
|
bfd_put_32 (stub_bfd, COPY_R31_R2, loc + 12);
|
|
|
|
/* Update the location and offsets. */
|
|
stub_hash_table->location += 16;
|
|
stub_hash_table->offset += 16;
|
|
}
|
|
else
|
|
{
|
|
/* Update the location and offsets. */
|
|
stub_hash_table->location += 12;
|
|
stub_hash_table->offset += 12;
|
|
}
|
|
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* External entry points for sizing and building linker stubs. */
|
|
|
|
/* Build all the stubs associated with the current output file. The
|
|
stubs are kept in a hash table attached to the main linker hash
|
|
table. This is called via hppaelf_finish in the linker. */
|
|
|
|
boolean
|
|
elf32_hppa_build_stubs (stub_bfd, info)
|
|
bfd *stub_bfd;
|
|
struct bfd_link_info *info;
|
|
{
|
|
/* The stub BFD only has one section. */
|
|
asection *stub_sec = stub_bfd->sections;
|
|
struct elf32_hppa_stub_hash_table *table;
|
|
unsigned int size;
|
|
void *args[2];
|
|
|
|
/* So we can pass both the BFD for the stubs and the link info
|
|
structure to the routine which actually builds stubs. */
|
|
args[0] = stub_bfd;
|
|
args[1] = info;
|
|
|
|
/* Allocate memory to hold the linker stubs. */
|
|
size = bfd_section_size (stub_bfd, stub_sec);
|
|
stub_sec->contents = (unsigned char *) bfd_zalloc (stub_bfd, size);
|
|
if (stub_sec->contents == NULL)
|
|
return false;
|
|
table = elf32_hppa_hash_table(info)->stub_hash_table;
|
|
table->location = stub_sec->contents;
|
|
|
|
/* Build the stubs as directed by the stub hash table. */
|
|
elf32_hppa_stub_hash_traverse (table, elf32_hppa_build_one_stub, args);
|
|
|
|
return true;
|
|
}
|
|
|
|
/* Determine and set the size of the stub section for a final link.
|
|
|
|
The basic idea here is to examine all the relocations looking for
|
|
PC-relative calls to a target that is unreachable with a "bl"
|
|
instruction or calls where the caller and callee disagree on the
|
|
location of their arguments or return value. */
|
|
|
|
boolean
|
|
elf32_hppa_size_stubs (stub_bfd, output_bfd, link_info)
|
|
bfd *stub_bfd;
|
|
bfd *output_bfd;
|
|
struct bfd_link_info *link_info;
|
|
{
|
|
bfd *input_bfd;
|
|
asection *section, *stub_sec = 0;
|
|
Elf_Internal_Shdr *symtab_hdr;
|
|
Elf_Internal_Sym *local_syms, *isym, **all_local_syms;
|
|
Elf32_External_Sym *ext_syms, *esym;
|
|
unsigned int i, index, bfd_count = 0;
|
|
struct elf32_hppa_stub_hash_table *stub_hash_table = 0;
|
|
struct elf32_hppa_args_hash_table *args_hash_table = 0;
|
|
|
|
/* Create and initialize the stub hash table. */
|
|
stub_hash_table = ((struct elf32_hppa_stub_hash_table *)
|
|
bfd_malloc (sizeof (struct elf32_hppa_stub_hash_table)));
|
|
if (!stub_hash_table)
|
|
goto error_return;
|
|
|
|
if (!elf32_hppa_stub_hash_table_init (stub_hash_table, stub_bfd,
|
|
elf32_hppa_stub_hash_newfunc))
|
|
goto error_return;
|
|
|
|
/* Likewise for the argument location hash table. */
|
|
args_hash_table = ((struct elf32_hppa_args_hash_table *)
|
|
bfd_malloc (sizeof (struct elf32_hppa_args_hash_table)));
|
|
if (!args_hash_table)
|
|
goto error_return;
|
|
|
|
if (!elf32_hppa_args_hash_table_init (args_hash_table,
|
|
elf32_hppa_args_hash_newfunc))
|
|
goto error_return;
|
|
|
|
/* Attach the hash tables to the main hash table. */
|
|
elf32_hppa_hash_table(link_info)->stub_hash_table = stub_hash_table;
|
|
elf32_hppa_hash_table(link_info)->args_hash_table = args_hash_table;
|
|
|
|
/* Count the number of input BFDs. */
|
|
for (input_bfd = link_info->input_bfds;
|
|
input_bfd != NULL;
|
|
input_bfd = input_bfd->link_next)
|
|
bfd_count++;
|
|
|
|
/* We want to read in symbol extension records only once. To do this
|
|
we need to read in the local symbols in parallel and save them for
|
|
later use; so hold pointers to the local symbols in an array. */
|
|
all_local_syms
|
|
= (Elf_Internal_Sym **) bfd_malloc (sizeof (Elf_Internal_Sym *)
|
|
* bfd_count);
|
|
if (all_local_syms == NULL)
|
|
goto error_return;
|
|
memset (all_local_syms, 0, sizeof (Elf_Internal_Sym *) * bfd_count);
|
|
|
|
/* Walk over all the input BFDs adding entries to the args hash table
|
|
for all the external functions. */
|
|
for (input_bfd = link_info->input_bfds, index = 0;
|
|
input_bfd != NULL;
|
|
input_bfd = input_bfd->link_next, index++)
|
|
{
|
|
/* We'll need the symbol table in a second. */
|
|
symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
|
|
if (symtab_hdr->sh_info == 0)
|
|
continue;
|
|
|
|
/* We need an array of the local symbols attached to the input bfd.
|
|
Unfortunately, we're going to have to read & swap them in. */
|
|
local_syms
|
|
= (Elf_Internal_Sym *) bfd_malloc (symtab_hdr->sh_info
|
|
* sizeof (Elf_Internal_Sym));
|
|
if (local_syms == NULL)
|
|
{
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
all_local_syms[index] = local_syms;
|
|
|
|
ext_syms
|
|
= (Elf32_External_Sym *) bfd_malloc (symtab_hdr->sh_info
|
|
* sizeof (Elf32_External_Sym));
|
|
if (ext_syms == NULL)
|
|
{
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
|
|
|| bfd_read (ext_syms, 1,
|
|
(symtab_hdr->sh_info
|
|
* sizeof (Elf32_External_Sym)), input_bfd)
|
|
!= (symtab_hdr->sh_info * sizeof (Elf32_External_Sym)))
|
|
{
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
free (ext_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
/* Swap the local symbols in. */
|
|
isym = local_syms;
|
|
esym = ext_syms;
|
|
for (i = 0; i < symtab_hdr->sh_info; i++, esym++, isym++)
|
|
bfd_elf32_swap_symbol_in (input_bfd, esym, isym);
|
|
|
|
/* Now we can free the external symbols. */
|
|
free (ext_syms);
|
|
|
|
if (elf32_hppa_read_symext_info (input_bfd, symtab_hdr, args_hash_table,
|
|
local_syms) == false)
|
|
{
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
}
|
|
|
|
/* Magic as we know the stub bfd only has one section. */
|
|
stub_sec = stub_bfd->sections;
|
|
|
|
/* If generating a relocateable output file, then we don't
|
|
have to examine the relocs. */
|
|
if (link_info->relocateable)
|
|
{
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
return true;
|
|
}
|
|
|
|
/* Now that we have argument location information for all the global
|
|
functions we can start looking for stubs. */
|
|
for (input_bfd = link_info->input_bfds, index = 0;
|
|
input_bfd != NULL;
|
|
input_bfd = input_bfd->link_next, index++)
|
|
{
|
|
/* We'll need the symbol table in a second. */
|
|
symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
|
|
if (symtab_hdr->sh_info == 0)
|
|
continue;
|
|
|
|
local_syms = all_local_syms[index];
|
|
|
|
/* Walk over each section attached to the input bfd. */
|
|
for (section = input_bfd->sections;
|
|
section != NULL;
|
|
section = section->next)
|
|
{
|
|
Elf_Internal_Shdr *input_rel_hdr;
|
|
Elf32_External_Rela *external_relocs, *erelaend, *erela;
|
|
Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
|
|
|
|
/* If there aren't any relocs, then there's nothing to do. */
|
|
if ((section->flags & SEC_RELOC) == 0
|
|
|| section->reloc_count == 0)
|
|
continue;
|
|
|
|
/* Allocate space for the external relocations. */
|
|
external_relocs
|
|
= ((Elf32_External_Rela *)
|
|
bfd_malloc (section->reloc_count
|
|
* sizeof (Elf32_External_Rela)));
|
|
if (external_relocs == NULL)
|
|
{
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
/* Likewise for the internal relocations. */
|
|
internal_relocs
|
|
= ((Elf_Internal_Rela *)
|
|
bfd_malloc (section->reloc_count * sizeof (Elf_Internal_Rela)));
|
|
if (internal_relocs == NULL)
|
|
{
|
|
free (external_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
/* Read in the external relocs. */
|
|
input_rel_hdr = &elf_section_data (section)->rel_hdr;
|
|
if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
|
|
|| bfd_read (external_relocs, 1, input_rel_hdr->sh_size,
|
|
input_bfd) != input_rel_hdr->sh_size)
|
|
{
|
|
free (external_relocs);
|
|
free (internal_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
/* Swap in the relocs. */
|
|
erela = external_relocs;
|
|
erelaend = erela + section->reloc_count;
|
|
irela = internal_relocs;
|
|
for (; erela < erelaend; erela++, irela++)
|
|
bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
|
|
|
|
/* We're done with the external relocs, free them. */
|
|
free (external_relocs);
|
|
|
|
/* Now examine each relocation. */
|
|
irela = internal_relocs;
|
|
irelaend = irela + section->reloc_count;
|
|
for (; irela < irelaend; irela++)
|
|
{
|
|
long r_type, callee_args, caller_args, size_of_stub;
|
|
unsigned long r_index;
|
|
struct elf_link_hash_entry *hash;
|
|
struct elf32_hppa_stub_hash_entry *stub_hash;
|
|
struct elf32_hppa_args_hash_entry *args_hash;
|
|
Elf_Internal_Sym *sym;
|
|
asection *sym_sec;
|
|
const char *sym_name;
|
|
symvalue sym_value;
|
|
bfd_vma location, destination;
|
|
char *new_name = NULL;
|
|
|
|
r_type = ELF32_R_TYPE (irela->r_info);
|
|
r_index = ELF32_R_SYM (irela->r_info);
|
|
|
|
if (r_type < 0 || r_type >= (int) R_PARISC_UNIMPLEMENTED)
|
|
{
|
|
bfd_set_error (bfd_error_bad_value);
|
|
free (internal_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
/* Only look for stubs on call instructions or plabel
|
|
references. */
|
|
if (r_type != R_PARISC_PCREL17F
|
|
&& r_type != R_PARISC_PLABEL32
|
|
&& r_type != R_PARISC_PLABEL21L
|
|
&& r_type != R_PARISC_PLABEL14R)
|
|
continue;
|
|
|
|
/* Now determine the call target, its name, value, section
|
|
and argument relocation bits. */
|
|
hash = NULL;
|
|
sym = NULL;
|
|
sym_sec = NULL;
|
|
if (r_index < symtab_hdr->sh_info)
|
|
{
|
|
/* It's a local symbol. */
|
|
Elf_Internal_Shdr *hdr;
|
|
|
|
sym = local_syms + r_index;
|
|
hdr = elf_elfsections (input_bfd)[sym->st_shndx];
|
|
sym_sec = hdr->bfd_section;
|
|
sym_name = bfd_elf_string_from_elf_section (input_bfd,
|
|
symtab_hdr->sh_link,
|
|
sym->st_name);
|
|
sym_value = (ELF_ST_TYPE (sym->st_info) == STT_SECTION
|
|
? 0 : sym->st_value);
|
|
destination = (sym_value
|
|
+ sym_sec->output_offset
|
|
+ sym_sec->output_section->vma);
|
|
|
|
/* Tack on an ID so we can uniquely identify this local
|
|
symbol in the stub or arg info hash tables. */
|
|
new_name = bfd_malloc (strlen (sym_name) + 10);
|
|
if (new_name == 0)
|
|
{
|
|
free (internal_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
sprintf (new_name, "%s_%08x", sym_name, (int)sym_sec);
|
|
sym_name = new_name;
|
|
}
|
|
else
|
|
{
|
|
/* It's an external symbol. */
|
|
long index;
|
|
|
|
index = r_index - symtab_hdr->sh_info;
|
|
hash = elf_sym_hashes (input_bfd)[index];
|
|
if (hash->root.type == bfd_link_hash_defined
|
|
|| hash->root.type == bfd_link_hash_defweak)
|
|
{
|
|
sym_sec = hash->root.u.def.section;
|
|
sym_name = hash->root.root.string;
|
|
sym_value = hash->root.u.def.value;
|
|
destination = (sym_value
|
|
+ sym_sec->output_offset
|
|
+ sym_sec->output_section->vma);
|
|
}
|
|
else
|
|
{
|
|
bfd_set_error (bfd_error_bad_value);
|
|
free (internal_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
}
|
|
|
|
args_hash = elf32_hppa_args_hash_lookup (args_hash_table,
|
|
sym_name, false, false);
|
|
|
|
/* Get both caller and callee argument information. */
|
|
if (args_hash == NULL)
|
|
callee_args = 0;
|
|
else
|
|
callee_args = args_hash->arg_bits;
|
|
|
|
/* For calls get the caller's bits from the addend of
|
|
the call relocation. For PLABELS the caller's bits
|
|
are assumed to have all args & return values in general
|
|
registers (0x155). */
|
|
if (r_type == R_PARISC_PCREL17F)
|
|
caller_args = HPPA_R_ARG_RELOC (irela->r_addend);
|
|
else
|
|
caller_args = 0x155;
|
|
|
|
/* Now determine where the call point is. */
|
|
location = (section->output_offset
|
|
+ section->output_section->vma
|
|
+ irela->r_offset);
|
|
|
|
/* We only care about the destination for PCREL function
|
|
calls (eg. we don't care for PLABELS). */
|
|
if (r_type != R_PARISC_PCREL17F)
|
|
location = destination;
|
|
|
|
/* Determine what (if any) linker stub is needed and its
|
|
size (in bytes). */
|
|
size_of_stub = elf32_hppa_size_of_stub (callee_args,
|
|
caller_args,
|
|
location,
|
|
destination,
|
|
sym_name);
|
|
if (size_of_stub != 0)
|
|
{
|
|
char *stub_name;
|
|
unsigned int len;
|
|
|
|
/* Get the name of this stub. */
|
|
len = strlen (sym_name);
|
|
len += 23;
|
|
|
|
stub_name = bfd_malloc (len);
|
|
if (!stub_name)
|
|
{
|
|
/* Because sym_name was mallocd above for local
|
|
symbols. */
|
|
if (r_index < symtab_hdr->sh_info)
|
|
free (new_name);
|
|
|
|
free (internal_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
elf32_hppa_name_of_stub (caller_args, callee_args,
|
|
location, destination, stub_name);
|
|
strcat (stub_name + 22, sym_name);
|
|
|
|
/* Because sym_name was malloced above for local symbols. */
|
|
if (r_index < symtab_hdr->sh_info)
|
|
free (new_name);
|
|
|
|
stub_hash
|
|
= elf32_hppa_stub_hash_lookup (stub_hash_table, stub_name,
|
|
false, false);
|
|
if (stub_hash != NULL)
|
|
{
|
|
/* The proper stub has already been created, nothing
|
|
else to do. */
|
|
free (stub_name);
|
|
}
|
|
else
|
|
{
|
|
bfd_set_section_size (stub_bfd, stub_sec,
|
|
(bfd_section_size (stub_bfd,
|
|
stub_sec)
|
|
+ size_of_stub));
|
|
|
|
/* Enter this entry into the linker stub hash table. */
|
|
stub_hash
|
|
= elf32_hppa_stub_hash_lookup (stub_hash_table,
|
|
stub_name, true, true);
|
|
if (stub_hash == NULL)
|
|
{
|
|
free (stub_name);
|
|
free (internal_relocs);
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
goto error_return;
|
|
}
|
|
|
|
/* We'll need these to determine the address that the
|
|
stub will branch to. */
|
|
stub_hash->target_value = sym_value;
|
|
stub_hash->target_section = sym_sec;
|
|
}
|
|
free (stub_name);
|
|
}
|
|
}
|
|
/* We're done with the internal relocs, free them. */
|
|
free (internal_relocs);
|
|
}
|
|
}
|
|
/* We're done with the local symbols, free them. */
|
|
for (i = 0; i < bfd_count; i++)
|
|
if (all_local_syms[i])
|
|
free (all_local_syms[i]);
|
|
free (all_local_syms);
|
|
return true;
|
|
|
|
error_return:
|
|
/* Return gracefully, avoiding dangling references to the hash tables. */
|
|
if (stub_hash_table)
|
|
{
|
|
elf32_hppa_hash_table(link_info)->stub_hash_table = NULL;
|
|
free (stub_hash_table);
|
|
}
|
|
if (args_hash_table)
|
|
{
|
|
elf32_hppa_hash_table(link_info)->args_hash_table = NULL;
|
|
free (args_hash_table);
|
|
}
|
|
/* Set the size of the stub section to zero since we're never going
|
|
to create them. Avoids losing when we try to get its contents
|
|
too. */
|
|
bfd_set_section_size (stub_bfd, stub_sec, 0);
|
|
return false;
|
|
}
|
|
|
|
/* Misc BFD support code. */
|
|
#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
|
|
#define bfd_elf32_bfd_is_local_label hppa_elf_is_local_label
|
|
|
|
/* Symbol extension stuff. */
|
|
#define bfd_elf32_set_section_contents elf32_hppa_set_section_contents
|
|
#define elf_info_to_howto elf32_hppa_info_to_howto
|
|
#define elf_backend_symbol_table_processing \
|
|
elf32_hppa_backend_symbol_table_processing
|
|
#define elf_backend_begin_write_processing \
|
|
elf32_hppa_backend_begin_write_processing
|
|
#define elf_backend_final_write_processing \
|
|
elf32_hppa_backend_final_write_processing
|
|
|
|
/* Stuff for the BFD linker. */
|
|
#define elf_backend_relocate_section elf32_hppa_relocate_section
|
|
#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
|
|
#define elf_backend_link_output_symbol_hook \
|
|
elf32_hppa_link_output_symbol_hook
|
|
#define bfd_elf32_bfd_link_hash_table_create \
|
|
elf32_hppa_link_hash_table_create
|
|
|
|
#define TARGET_BIG_SYM bfd_elf32_hppa_vec
|
|
#define TARGET_BIG_NAME "elf32-hppa"
|
|
#define ELF_ARCH bfd_arch_hppa
|
|
#define ELF_MACHINE_CODE EM_PARISC
|
|
#define ELF_MAXPAGESIZE 0x1000
|
|
|
|
#include "elf32-target.h"
|