Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf64-sparc.c
CommitLineData
252b5132 1/* SPARC-specific support for 64-bit ELF
b3adc24a 2 Copyright (C) 1993-2020 Free Software Foundation, Inc.
252b5132 3
ae9a127f 4 This file is part of BFD, the Binary File Descriptor library.
252b5132 5
ae9a127f
NC
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
cd123cb7 8 the Free Software Foundation; either version 3 of the License, or
ae9a127f 9 (at your option) any later version.
252b5132 10
ae9a127f
NC
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
252b5132 15
ae9a127f
NC
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
cd123cb7
NC
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
252b5132 20
252b5132 21#include "sysdep.h"
7a6e0d89 22#include <limits.h>
3db64b00 23#include "bfd.h"
252b5132
RH
24#include "libbfd.h"
25#include "elf-bfd.h"
252b5132 26#include "elf/sparc.h"
40937810 27#include "opcode/sparc.h"
22b75d0a 28#include "elfxx-sparc.h"
252b5132
RH
29
30/* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
31#define MINUS_ONE (~ (bfd_vma) 0)
32
f65054f7
RH
33/* Due to the way how we handle R_SPARC_OLO10, each entry in a SHT_RELA
34 section can represent up to two relocs, we must tell the user to allocate
35 more space. */
435b1e90 36
f65054f7 37static long
22b75d0a 38elf64_sparc_get_reloc_upper_bound (bfd *abfd ATTRIBUTE_UNUSED, asection *sec)
f65054f7 39{
242a1159 40#if SIZEOF_LONG == SIZEOF_INT
7a6e0d89
AM
41 if (sec->reloc_count >= LONG_MAX / 2 / sizeof (arelent *))
42 {
43 bfd_set_error (bfd_error_file_too_big);
44 return -1;
45 }
242a1159 46#endif
f65054f7
RH
47 return (sec->reloc_count * 2 + 1) * sizeof (arelent *);
48}
49
50static long
22b75d0a 51elf64_sparc_get_dynamic_reloc_upper_bound (bfd *abfd)
f65054f7 52{
7a6e0d89
AM
53 long ret = _bfd_elf_get_dynamic_reloc_upper_bound (abfd);
54 if (ret > LONG_MAX / 2)
55 {
56 bfd_set_error (bfd_error_file_too_big);
57 ret = -1;
58 }
59 else if (ret > 0)
60 ret *= 2;
61 return ret;
f65054f7
RH
62}
63
435b1e90 64/* Read relocations for ASECT from REL_HDR. There are RELOC_COUNT of
f65054f7
RH
65 them. We cannot use generic elf routines for this, because R_SPARC_OLO10
66 has secondary addend in ELF64_R_TYPE_DATA. We handle it as two relocations
67 for the same location, R_SPARC_LO10 and R_SPARC_13. */
68
b34976b6 69static bfd_boolean
22b75d0a
DM
70elf64_sparc_slurp_one_reloc_table (bfd *abfd, asection *asect,
71 Elf_Internal_Shdr *rel_hdr,
72 asymbol **symbols, bfd_boolean dynamic)
f65054f7 73{
2c3fc389 74 void * allocated = NULL;
f65054f7
RH
75 bfd_byte *native_relocs;
76 arelent *relent;
77 unsigned int i;
78 int entsize;
79 bfd_size_type count;
80 arelent *relents;
81
2bb3687b
AM
82 if (bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0)
83 return FALSE;
84 allocated = _bfd_malloc_and_read (abfd, rel_hdr->sh_size, rel_hdr->sh_size);
f65054f7 85 if (allocated == NULL)
2bb3687b 86 return FALSE;
f65054f7
RH
87
88 native_relocs = (bfd_byte *) allocated;
89
3e1d7f19 90 relents = asect->relocation + canon_reloc_count (asect);
f65054f7
RH
91
92 entsize = rel_hdr->sh_entsize;
93 BFD_ASSERT (entsize == sizeof (Elf64_External_Rela));
435b1e90 94
f65054f7
RH
95 count = rel_hdr->sh_size / entsize;
96
97 for (i = 0, relent = relents; i < count;
98 i++, relent++, native_relocs += entsize)
99 {
100 Elf_Internal_Rela rela;
22b75d0a 101 unsigned int r_type;
f65054f7 102
947216bf 103 bfd_elf64_swap_reloca_in (abfd, native_relocs, &rela);
f65054f7
RH
104
105 /* The address of an ELF reloc is section relative for an object
106 file, and absolute for an executable file or shared library.
107 The address of a normal BFD reloc is always section relative,
108 and the address of a dynamic reloc is absolute.. */
109 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || dynamic)
110 relent->address = rela.r_offset;
111 else
112 relent->address = rela.r_offset - asect->vma;
113
8410d65b 114 if (ELF64_R_SYM (rela.r_info) == STN_UNDEF)
f65054f7 115 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
8410d65b 116 else if (/* PR 17512: file: 996185f8. */
4b24dd1a
AM
117 ELF64_R_SYM (rela.r_info) > (dynamic
118 ? bfd_get_dynamic_symcount (abfd)
119 : bfd_get_symcount (abfd)))
120 {
121 _bfd_error_handler
8410d65b
JM
122 /* xgettext:c-format */
123 (_("%pB(%pA): relocation %d has invalid symbol index %ld"),
124 abfd, asect, i, (long) ELF64_R_SYM (rela.r_info));
125 bfd_set_error (bfd_error_bad_value);
126 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
4b24dd1a 127 }
f65054f7
RH
128 else
129 {
130 asymbol **ps, *s;
131
132 ps = symbols + ELF64_R_SYM (rela.r_info) - 1;
133 s = *ps;
134
135 /* Canonicalize ELF section symbols. FIXME: Why? */
136 if ((s->flags & BSF_SECTION_SYM) == 0)
137 relent->sym_ptr_ptr = ps;
138 else
139 relent->sym_ptr_ptr = s->section->symbol_ptr_ptr;
140 }
141
142 relent->addend = rela.r_addend;
143
22b75d0a
DM
144 r_type = ELF64_R_TYPE_ID (rela.r_info);
145 if (r_type == R_SPARC_OLO10)
f65054f7 146 {
0aa13fee 147 relent->howto = _bfd_sparc_elf_info_to_howto_ptr (abfd, R_SPARC_LO10);
f65054f7
RH
148 relent[1].address = relent->address;
149 relent++;
150 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
151 relent->addend = ELF64_R_TYPE_DATA (rela.r_info);
0aa13fee 152 relent->howto = _bfd_sparc_elf_info_to_howto_ptr (abfd, R_SPARC_13);
f65054f7
RH
153 }
154 else
f3185997
NC
155 {
156 relent->howto = _bfd_sparc_elf_info_to_howto_ptr (abfd, r_type);
157 if (relent->howto == NULL)
158 goto error_return;
159 }
f65054f7
RH
160 }
161
3e1d7f19 162 canon_reloc_count (asect) += relent - relents;
f65054f7
RH
163
164 if (allocated != NULL)
165 free (allocated);
166
b34976b6 167 return TRUE;
f65054f7
RH
168
169 error_return:
170 if (allocated != NULL)
171 free (allocated);
b34976b6 172 return FALSE;
f65054f7
RH
173}
174
175/* Read in and swap the external relocs. */
176
b34976b6 177static bfd_boolean
22b75d0a
DM
178elf64_sparc_slurp_reloc_table (bfd *abfd, asection *asect,
179 asymbol **symbols, bfd_boolean dynamic)
f65054f7
RH
180{
181 struct bfd_elf_section_data * const d = elf_section_data (asect);
182 Elf_Internal_Shdr *rel_hdr;
183 Elf_Internal_Shdr *rel_hdr2;
dc810e39 184 bfd_size_type amt;
f65054f7
RH
185
186 if (asect->relocation != NULL)
b34976b6 187 return TRUE;
f65054f7
RH
188
189 if (! dynamic)
190 {
191 if ((asect->flags & SEC_RELOC) == 0
192 || asect->reloc_count == 0)
b34976b6 193 return TRUE;
f65054f7 194
d4730f92
BS
195 rel_hdr = d->rel.hdr;
196 rel_hdr2 = d->rela.hdr;
f65054f7 197
d4730f92 198 BFD_ASSERT ((rel_hdr && asect->rel_filepos == rel_hdr->sh_offset)
f65054f7
RH
199 || (rel_hdr2 && asect->rel_filepos == rel_hdr2->sh_offset));
200 }
201 else
202 {
203 /* Note that ASECT->RELOC_COUNT tends not to be accurate in this
204 case because relocations against this section may use the
205 dynamic symbol table, and in that case bfd_section_from_shdr
206 in elf.c does not update the RELOC_COUNT. */
eea6121a 207 if (asect->size == 0)
b34976b6 208 return TRUE;
f65054f7
RH
209
210 rel_hdr = &d->this_hdr;
d9bc7a44 211 asect->reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
f65054f7
RH
212 rel_hdr2 = NULL;
213 }
214
dc810e39
AM
215 amt = asect->reloc_count;
216 amt *= 2 * sizeof (arelent);
217 asect->relocation = (arelent *) bfd_alloc (abfd, amt);
f65054f7 218 if (asect->relocation == NULL)
b34976b6 219 return FALSE;
f65054f7 220
22b75d0a 221 /* The elf64_sparc_slurp_one_reloc_table routine increments
3e1d7f19
JJ
222 canon_reloc_count. */
223 canon_reloc_count (asect) = 0;
435b1e90 224
d4730f92
BS
225 if (rel_hdr
226 && !elf64_sparc_slurp_one_reloc_table (abfd, asect, rel_hdr, symbols,
227 dynamic))
b34976b6 228 return FALSE;
435b1e90
KH
229
230 if (rel_hdr2
22b75d0a 231 && !elf64_sparc_slurp_one_reloc_table (abfd, asect, rel_hdr2, symbols,
f65054f7 232 dynamic))
b34976b6 233 return FALSE;
f65054f7 234
b34976b6 235 return TRUE;
f65054f7
RH
236}
237
3e1d7f19
JJ
238/* Canonicalize the relocs. */
239
240static long
22b75d0a
DM
241elf64_sparc_canonicalize_reloc (bfd *abfd, sec_ptr section,
242 arelent **relptr, asymbol **symbols)
3e1d7f19
JJ
243{
244 arelent *tblptr;
245 unsigned int i;
9c5bfbb7 246 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3e1d7f19
JJ
247
248 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
249 return -1;
250
251 tblptr = section->relocation;
252 for (i = 0; i < canon_reloc_count (section); i++)
253 *relptr++ = tblptr++;
254
255 *relptr = NULL;
256
257 return canon_reloc_count (section);
258}
259
260
f65054f7
RH
261/* Canonicalize the dynamic relocation entries. Note that we return
262 the dynamic relocations as a single block, although they are
263 actually associated with particular sections; the interface, which
264 was designed for SunOS style shared libraries, expects that there
265 is only one set of dynamic relocs. Any section that was actually
266 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses
267 the dynamic symbol table, is considered to be a dynamic reloc
268 section. */
269
270static long
22b75d0a
DM
271elf64_sparc_canonicalize_dynamic_reloc (bfd *abfd, arelent **storage,
272 asymbol **syms)
f65054f7
RH
273{
274 asection *s;
275 long ret;
276
277 if (elf_dynsymtab (abfd) == 0)
278 {
279 bfd_set_error (bfd_error_invalid_operation);
280 return -1;
281 }
282
283 ret = 0;
284 for (s = abfd->sections; s != NULL; s = s->next)
285 {
286 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
287 && (elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
288 {
289 arelent *p;
290 long count, i;
291
22b75d0a 292 if (! elf64_sparc_slurp_reloc_table (abfd, s, syms, TRUE))
f65054f7 293 return -1;
3e1d7f19 294 count = canon_reloc_count (s);
f65054f7
RH
295 p = s->relocation;
296 for (i = 0; i < count; i++)
297 *storage++ = p++;
298 ret += count;
299 }
300 }
301
302 *storage = NULL;
303
304 return ret;
305}
306
db84b98a
JM
307/* Install a new set of internal relocs. */
308
309static void
310elf64_sparc_set_reloc (bfd *abfd ATTRIBUTE_UNUSED,
07d6d2b8
AM
311 asection *asect,
312 arelent **location,
313 unsigned int count)
db84b98a
JM
314{
315 asect->orelocation = location;
316 canon_reloc_count (asect) = count;
317}
318
f65054f7
RH
319/* Write out the relocs. */
320
321static void
2c3fc389 322elf64_sparc_write_relocs (bfd *abfd, asection *sec, void * data)
f65054f7 323{
b34976b6 324 bfd_boolean *failedp = (bfd_boolean *) data;
f65054f7 325 Elf_Internal_Shdr *rela_hdr;
22b75d0a 326 bfd_vma addr_offset;
37fb6db1 327 Elf64_External_Rela *outbound_relocas, *src_rela;
f65054f7
RH
328 unsigned int idx, count;
329 asymbol *last_sym = 0;
330 int last_sym_idx = 0;
331
332 /* If we have already failed, don't do anything. */
333 if (*failedp)
334 return;
335
336 if ((sec->flags & SEC_RELOC) == 0)
337 return;
338
339 /* The linker backend writes the relocs out itself, and sets the
340 reloc_count field to zero to inhibit writing them here. Also,
341 sometimes the SEC_RELOC flag gets set even when there aren't any
342 relocs. */
db84b98a 343 if (canon_reloc_count (sec) == 0)
f65054f7
RH
344 return;
345
346 /* We can combine two relocs that refer to the same address
347 into R_SPARC_OLO10 if first one is R_SPARC_LO10 and the
348 latter is R_SPARC_13 with no associated symbol. */
349 count = 0;
db84b98a 350 for (idx = 0; idx < canon_reloc_count (sec); idx++)
f65054f7
RH
351 {
352 bfd_vma addr;
f65054f7
RH
353
354 ++count;
355
356 addr = sec->orelocation[idx]->address;
357 if (sec->orelocation[idx]->howto->type == R_SPARC_LO10
db84b98a 358 && idx < canon_reloc_count (sec) - 1)
f65054f7
RH
359 {
360 arelent *r = sec->orelocation[idx + 1];
361
362 if (r->howto->type == R_SPARC_13
363 && r->address == addr
364 && bfd_is_abs_section ((*r->sym_ptr_ptr)->section)
365 && (*r->sym_ptr_ptr)->value == 0)
366 ++idx;
367 }
368 }
369
d4730f92 370 rela_hdr = elf_section_data (sec)->rela.hdr;
f65054f7
RH
371
372 rela_hdr->sh_size = rela_hdr->sh_entsize * count;
2c3fc389 373 rela_hdr->contents = bfd_alloc (abfd, rela_hdr->sh_size);
f65054f7
RH
374 if (rela_hdr->contents == NULL)
375 {
b34976b6 376 *failedp = TRUE;
f65054f7
RH
377 return;
378 }
379
380 /* Figure out whether the relocations are RELA or REL relocations. */
381 if (rela_hdr->sh_type != SHT_RELA)
382 abort ();
383
22b75d0a
DM
384 /* The address of an ELF reloc is section relative for an object
385 file, and absolute for an executable file or shared library.
386 The address of a BFD reloc is always section relative. */
387 addr_offset = 0;
388 if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
389 addr_offset = sec->vma;
390
435b1e90 391 /* orelocation has the data, reloc_count has the count... */
f65054f7 392 outbound_relocas = (Elf64_External_Rela *) rela_hdr->contents;
37fb6db1 393 src_rela = outbound_relocas;
f65054f7 394
db84b98a 395 for (idx = 0; idx < canon_reloc_count (sec); idx++)
f65054f7
RH
396 {
397 Elf_Internal_Rela dst_rela;
f65054f7
RH
398 arelent *ptr;
399 asymbol *sym;
400 int n;
401
402 ptr = sec->orelocation[idx];
f65054f7
RH
403 sym = *ptr->sym_ptr_ptr;
404 if (sym == last_sym)
405 n = last_sym_idx;
406 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
407 n = STN_UNDEF;
408 else
409 {
410 last_sym = sym;
411 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
412 if (n < 0)
413 {
b34976b6 414 *failedp = TRUE;
f65054f7
RH
415 return;
416 }
417 last_sym_idx = n;
418 }
419
420 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
421 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
422 && ! _bfd_elf_validate_reloc (abfd, ptr))
423 {
b34976b6 424 *failedp = TRUE;
f65054f7
RH
425 return;
426 }
427
428 if (ptr->howto->type == R_SPARC_LO10
db84b98a 429 && idx < canon_reloc_count (sec) - 1)
f65054f7
RH
430 {
431 arelent *r = sec->orelocation[idx + 1];
432
433 if (r->howto->type == R_SPARC_13
434 && r->address == ptr->address
435 && bfd_is_abs_section ((*r->sym_ptr_ptr)->section)
436 && (*r->sym_ptr_ptr)->value == 0)
437 {
438 idx++;
439 dst_rela.r_info
440 = ELF64_R_INFO (n, ELF64_R_TYPE_INFO (r->addend,
441 R_SPARC_OLO10));
442 }
443 else
444 dst_rela.r_info = ELF64_R_INFO (n, R_SPARC_LO10);
445 }
446 else
447 dst_rela.r_info = ELF64_R_INFO (n, ptr->howto->type);
448
22b75d0a 449 dst_rela.r_offset = ptr->address + addr_offset;
f65054f7 450 dst_rela.r_addend = ptr->addend;
22b75d0a 451
947216bf 452 bfd_elf64_swap_reloca_out (abfd, &dst_rela, (bfd_byte *) src_rela);
37fb6db1 453 ++src_rela;
f65054f7 454 }
252b5132 455}
587ff49e 456\f
22b75d0a
DM
457/* Hook called by the linker routine which adds symbols from an object
458 file. We use it for STT_REGISTER symbols. */
40937810 459
22b75d0a
DM
460static bfd_boolean
461elf64_sparc_add_symbol_hook (bfd *abfd, struct bfd_link_info *info,
462 Elf_Internal_Sym *sym, const char **namep,
463 flagword *flagsp ATTRIBUTE_UNUSED,
464 asection **secp ATTRIBUTE_UNUSED,
465 bfd_vma *valp ATTRIBUTE_UNUSED)
40937810 466{
22b75d0a 467 static const char *const stt_types[] = { "NOTYPE", "OBJECT", "FUNCTION" };
40937810 468
22b75d0a
DM
469 if (ELF_ST_TYPE (sym->st_info) == STT_REGISTER)
470 {
471 int reg;
472 struct _bfd_sparc_elf_app_reg *p;
40937810 473
22b75d0a
DM
474 reg = (int)sym->st_value;
475 switch (reg & ~1)
476 {
477 case 2: reg -= 2; break;
478 case 6: reg -= 4; break;
479 default:
4eca0228 480 _bfd_error_handler
38f14ab8 481 (_("%pB: only registers %%g[2367] can be declared using STT_REGISTER"),
07d6d2b8 482 abfd);
22b75d0a
DM
483 return FALSE;
484 }
40937810 485
f13a99db 486 if (info->output_bfd->xvec != abfd->xvec
22b75d0a 487 || (abfd->flags & DYNAMIC) != 0)
07d6d2b8 488 {
22b75d0a
DM
489 /* STT_REGISTER only works when linking an elf64_sparc object.
490 If STT_REGISTER comes from a dynamic object, don't put it into
491 the output bfd. The dynamic linker will recheck it. */
492 *namep = NULL;
493 return TRUE;
07d6d2b8 494 }
40937810 495
22b75d0a 496 p = _bfd_sparc_elf_hash_table(info)->app_regs + reg;
40937810 497
22b75d0a
DM
498 if (p->name != NULL && strcmp (p->name, *namep))
499 {
4eca0228 500 _bfd_error_handler
695344c0 501 /* xgettext:c-format */
38f14ab8 502 (_("register %%g%d used incompatibly: %s in %pB,"
871b3ab2 503 " previously %s in %pB"),
c08bb8dd
AM
504 (int) sym->st_value, **namep ? *namep : "#scratch", abfd,
505 *p->name ? p->name : "#scratch", p->abfd);
22b75d0a
DM
506 return FALSE;
507 }
40937810 508
22b75d0a
DM
509 if (p->name == NULL)
510 {
511 if (**namep)
512 {
513 struct elf_link_hash_entry *h;
40937810 514
22b75d0a
DM
515 h = (struct elf_link_hash_entry *)
516 bfd_link_hash_lookup (info->hash, *namep, FALSE, FALSE, FALSE);
40937810 517
22b75d0a
DM
518 if (h != NULL)
519 {
520 unsigned char type = h->type;
40937810 521
22b75d0a
DM
522 if (type > STT_FUNC)
523 type = 0;
4eca0228 524 _bfd_error_handler
695344c0 525 /* xgettext:c-format */
38f14ab8 526 (_("symbol `%s' has differing types: REGISTER in %pB,"
871b3ab2 527 " previously %s in %pB"),
c08bb8dd 528 *namep, abfd, stt_types[type], p->abfd);
22b75d0a
DM
529 return FALSE;
530 }
40937810 531
22b75d0a
DM
532 p->name = bfd_hash_allocate (&info->hash->table,
533 strlen (*namep) + 1);
534 if (!p->name)
535 return FALSE;
40937810 536
22b75d0a
DM
537 strcpy (p->name, *namep);
538 }
539 else
540 p->name = "";
541 p->bind = ELF_ST_BIND (sym->st_info);
542 p->abfd = abfd;
543 p->shndx = sym->st_shndx;
544 }
545 else
546 {
547 if (p->bind == STB_WEAK
548 && ELF_ST_BIND (sym->st_info) == STB_GLOBAL)
549 {
550 p->bind = STB_GLOBAL;
551 p->abfd = abfd;
552 }
553 }
554 *namep = NULL;
555 return TRUE;
556 }
557 else if (*namep && **namep
f13a99db 558 && info->output_bfd->xvec == abfd->xvec)
22b75d0a
DM
559 {
560 int i;
561 struct _bfd_sparc_elf_app_reg *p;
40937810 562
22b75d0a
DM
563 p = _bfd_sparc_elf_hash_table(info)->app_regs;
564 for (i = 0; i < 4; i++, p++)
565 if (p->name != NULL && ! strcmp (p->name, *namep))
566 {
567 unsigned char type = ELF_ST_TYPE (sym->st_info);
40937810 568
22b75d0a
DM
569 if (type > STT_FUNC)
570 type = 0;
4eca0228 571 _bfd_error_handler
695344c0 572 /* xgettext:c-format */
871b3ab2
AM
573 (_("Symbol `%s' has differing types: %s in %pB,"
574 " previously REGISTER in %pB"),
c08bb8dd 575 *namep, stt_types[type], abfd, p->abfd);
22b75d0a
DM
576 return FALSE;
577 }
578 }
40937810
JJ
579 return TRUE;
580}
581
22b75d0a
DM
582/* This function takes care of emitting STT_REGISTER symbols
583 which we cannot easily keep in the symbol hash table. */
587ff49e 584
22b75d0a
DM
585static bfd_boolean
586elf64_sparc_output_arch_syms (bfd *output_bfd ATTRIBUTE_UNUSED,
587 struct bfd_link_info *info,
2c3fc389
NC
588 void * flaginfo,
589 int (*func) (void *, const char *,
6e0b88f1
AM
590 Elf_Internal_Sym *,
591 asection *,
592 struct elf_link_hash_entry *))
587ff49e 593{
22b75d0a
DM
594 int reg;
595 struct _bfd_sparc_elf_app_reg *app_regs =
596 _bfd_sparc_elf_hash_table(info)->app_regs;
597 Elf_Internal_Sym sym;
40937810 598
22b75d0a
DM
599 for (reg = 0; reg < 4; reg++)
600 if (app_regs [reg].name != NULL)
601 {
602 if (info->strip == strip_some
603 && bfd_hash_lookup (info->keep_hash,
604 app_regs [reg].name,
605 FALSE, FALSE) == NULL)
606 continue;
587ff49e 607
22b75d0a
DM
608 sym.st_value = reg < 2 ? reg + 2 : reg + 4;
609 sym.st_size = 0;
610 sym.st_other = 0;
611 sym.st_info = ELF_ST_INFO (app_regs [reg].bind, STT_REGISTER);
612 sym.st_shndx = app_regs [reg].shndx;
35fc36a8 613 sym.st_target_internal = 0;
57402f1e 614 if ((*func) (flaginfo, app_regs [reg].name, &sym,
6e0b88f1
AM
615 sym.st_shndx == SHN_ABS
616 ? bfd_abs_section_ptr : bfd_und_section_ptr,
617 NULL) != 1)
22b75d0a
DM
618 return FALSE;
619 }
435b1e90 620
22b75d0a
DM
621 return TRUE;
622}
40937810 623
22b75d0a
DM
624static int
625elf64_sparc_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
40937810 626{
22b75d0a
DM
627 if (ELF_ST_TYPE (elf_sym->st_info) == STT_REGISTER)
628 return STT_REGISTER;
629 else
630 return type;
40937810
JJ
631}
632
22b75d0a
DM
633/* A STB_GLOBAL,STT_REGISTER symbol should be BSF_GLOBAL
634 even in SHN_UNDEF section. */
587ff49e 635
22b75d0a
DM
636static void
637elf64_sparc_symbol_processing (bfd *abfd ATTRIBUTE_UNUSED, asymbol *asym)
587ff49e 638{
22b75d0a 639 elf_symbol_type *elfsym;
587ff49e 640
22b75d0a
DM
641 elfsym = (elf_symbol_type *) asym;
642 if (elfsym->internal_elf_sym.st_info
643 == ELF_ST_INFO (STB_GLOBAL, STT_REGISTER))
587ff49e 644 {
22b75d0a 645 asym->flags |= BSF_GLOBAL;
587ff49e 646 }
587ff49e 647}
a51a7930 648
22b75d0a
DM
649\f
650/* Functions for dealing with the e_flags field. */
a51a7930 651
22b75d0a
DM
652/* Merge backend specific data from an object file to the output
653 object file when linking. */
a51a7930
EB
654
655static bfd_boolean
50e03d47 656elf64_sparc_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
a51a7930 657{
50e03d47 658 bfd *obfd = info->output_bfd;
22b75d0a
DM
659 bfd_boolean error;
660 flagword new_flags, old_flags;
661 int new_mm, old_mm;
40937810 662
22b75d0a
DM
663 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
664 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
665 return TRUE;
40937810 666
22b75d0a
DM
667 new_flags = elf_elfheader (ibfd)->e_flags;
668 old_flags = elf_elfheader (obfd)->e_flags;
40937810 669
22b75d0a
DM
670 if (!elf_flags_init (obfd)) /* First call, no flags set */
671 {
672 elf_flags_init (obfd) = TRUE;
673 elf_elfheader (obfd)->e_flags = new_flags;
674 }
40937810 675
22b75d0a
DM
676 else if (new_flags == old_flags) /* Compatible flags are ok */
677 ;
40937810 678
07d6d2b8 679 else /* Incompatible flags */
40937810 680 {
22b75d0a 681 error = FALSE;
40937810 682
22b75d0a
DM
683#define EF_SPARC_ISA_EXTENSIONS \
684 (EF_SPARC_SUN_US1 | EF_SPARC_SUN_US3 | EF_SPARC_HAL_R1)
19f7b010 685
37fb6db1
ILT
686 if ((ibfd->flags & DYNAMIC) != 0)
687 {
688 /* We don't want dynamic objects memory ordering and
689 architecture to have any role. That's what dynamic linker
690 should do. */
19f7b010 691 new_flags &= ~(EF_SPARCV9_MM | EF_SPARC_ISA_EXTENSIONS);
6c08d697 692 new_flags |= (old_flags
19f7b010 693 & (EF_SPARCV9_MM | EF_SPARC_ISA_EXTENSIONS));
37fb6db1
ILT
694 }
695 else
696 {
697 /* Choose the highest architecture requirements. */
19f7b010
JJ
698 old_flags |= (new_flags & EF_SPARC_ISA_EXTENSIONS);
699 new_flags |= (old_flags & EF_SPARC_ISA_EXTENSIONS);
700 if ((old_flags & (EF_SPARC_SUN_US1 | EF_SPARC_SUN_US3))
701 && (old_flags & EF_SPARC_HAL_R1))
37fb6db1 702 {
b34976b6 703 error = TRUE;
4eca0228 704 _bfd_error_handler
871b3ab2 705 (_("%pB: linking UltraSPARC specific with HAL specific code"),
d003868e 706 ibfd);
37fb6db1
ILT
707 }
708 /* Choose the most restrictive memory ordering. */
709 old_mm = (old_flags & EF_SPARCV9_MM);
710 new_mm = (new_flags & EF_SPARCV9_MM);
711 old_flags &= ~EF_SPARCV9_MM;
712 new_flags &= ~EF_SPARCV9_MM;
713 if (new_mm < old_mm)
714 old_mm = new_mm;
715 old_flags |= old_mm;
716 new_flags |= old_mm;
717 }
252b5132
RH
718
719 /* Warn about any other mismatches */
720 if (new_flags != old_flags)
07d6d2b8
AM
721 {
722 error = TRUE;
4eca0228 723 _bfd_error_handler
695344c0 724 /* xgettext:c-format */
871b3ab2 725 (_("%pB: uses different e_flags (%#x) fields than previous modules (%#x)"),
07d6d2b8
AM
726 ibfd, new_flags, old_flags);
727 }
252b5132
RH
728
729 elf_elfheader (obfd)->e_flags = old_flags;
730
731 if (error)
07d6d2b8
AM
732 {
733 bfd_set_error (bfd_error_bad_value);
734 return FALSE;
735 }
252b5132 736 }
50e03d47 737 return _bfd_sparc_elf_merge_private_bfd_data (ibfd, info);
252b5132 738}
0594c12d
AM
739
740/* MARCO: Set the correct entry size for the .stab section. */
741
b34976b6 742static bfd_boolean
22b75d0a
DM
743elf64_sparc_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
744 Elf_Internal_Shdr *hdr ATTRIBUTE_UNUSED,
745 asection *sec)
0594c12d
AM
746{
747 const char *name;
748
fd361982 749 name = bfd_section_name (sec);
0594c12d
AM
750
751 if (strcmp (name, ".stab") == 0)
752 {
753 /* Even in the 64bit case the stab entries are only 12 bytes long. */
754 elf_section_data (sec)->this_hdr.sh_entsize = 12;
755 }
b34976b6
AM
756
757 return TRUE;
0594c12d 758}
587ff49e
RH
759\f
760/* Print a STT_REGISTER symbol to file FILE. */
252b5132 761
587ff49e 762static const char *
2c3fc389 763elf64_sparc_print_symbol_all (bfd *abfd ATTRIBUTE_UNUSED, void * filep,
22b75d0a 764 asymbol *symbol)
587ff49e
RH
765{
766 FILE *file = (FILE *) filep;
767 int reg, type;
435b1e90 768
587ff49e
RH
769 if (ELF_ST_TYPE (((elf_symbol_type *) symbol)->internal_elf_sym.st_info)
770 != STT_REGISTER)
771 return NULL;
772
773 reg = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
774 type = symbol->flags;
775 fprintf (file, "REG_%c%c%11s%c%c R", "GOLI" [reg / 8], '0' + (reg & 7), "",
776 ((type & BSF_LOCAL)
777 ? (type & BSF_GLOBAL) ? '!' : 'l'
07d6d2b8
AM
778 : (type & BSF_GLOBAL) ? 'g' : ' '),
779 (type & BSF_WEAK) ? 'w' : ' ');
587ff49e
RH
780 if (symbol->name == NULL || symbol->name [0] == '\0')
781 return "#scratch";
782 else
783 return symbol->name;
784}
252b5132 785\f
b2abe1bd
EB
786/* Used to decide how to sort relocs in an optimal manner for the
787 dynamic linker, before writing them out. */
788
40937810 789static enum elf_reloc_type_class
b2abe1bd 790elf64_sparc_reloc_type_class (const struct bfd_link_info *info,
7e612e98
AM
791 const asection *rel_sec ATTRIBUTE_UNUSED,
792 const Elf_Internal_Rela *rela)
40937810 793{
b2abe1bd
EB
794 bfd *abfd = info->output_bfd;
795 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
796 struct _bfd_sparc_elf_link_hash_table *htab
797 = _bfd_sparc_elf_hash_table (info);
798 BFD_ASSERT (htab != NULL);
799
800 if (htab->elf.dynsym != NULL
801 && htab->elf.dynsym->contents != NULL)
802 {
803 /* Check relocation against STT_GNU_IFUNC symbol if there are
804 dynamic symbols. */
805 unsigned long r_symndx = htab->r_symndx (rela->r_info);
806 if (r_symndx != STN_UNDEF)
807 {
808 Elf_Internal_Sym sym;
809 if (!bed->s->swap_symbol_in (abfd,
810 (htab->elf.dynsym->contents
811 + r_symndx * bed->s->sizeof_sym),
812 0, &sym))
813 abort ();
814
815 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
816 return reloc_class_ifunc;
817 }
818 }
819
40937810
JJ
820 switch ((int) ELF64_R_TYPE (rela->r_info))
821 {
b2abe1bd
EB
822 case R_SPARC_IRELATIVE:
823 return reloc_class_ifunc;
40937810
JJ
824 case R_SPARC_RELATIVE:
825 return reloc_class_relative;
826 case R_SPARC_JMP_SLOT:
827 return reloc_class_plt;
828 case R_SPARC_COPY:
829 return reloc_class_copy;
830 default:
831 return reloc_class_normal;
832 }
833}
834
f65054f7
RH
835/* Relocations in the 64 bit SPARC ELF ABI are more complex than in
836 standard ELF, because R_SPARC_OLO10 has secondary addend in
837 ELF64_R_TYPE_DATA field. This structure is used to redirect the
838 relocation handling routines. */
839
22b75d0a 840const struct elf_size_info elf64_sparc_size_info =
f65054f7
RH
841{
842 sizeof (Elf64_External_Ehdr),
843 sizeof (Elf64_External_Phdr),
844 sizeof (Elf64_External_Shdr),
845 sizeof (Elf64_External_Rel),
846 sizeof (Elf64_External_Rela),
847 sizeof (Elf64_External_Sym),
848 sizeof (Elf64_External_Dyn),
849 sizeof (Elf_External_Note),
ae9a127f
NC
850 4, /* hash-table entry size. */
851 /* Internal relocations per external relocations.
f65054f7
RH
852 For link purposes we use just 1 internal per
853 1 external, for assembly and slurp symbol table
435b1e90 854 we use 2. */
f65054f7 855 1,
ae9a127f 856 64, /* arch_size. */
45d6a902 857 3, /* log_file_align. */
f65054f7
RH
858 ELFCLASS64,
859 EV_CURRENT,
860 bfd_elf64_write_out_phdrs,
861 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 862 bfd_elf64_checksum_contents,
22b75d0a 863 elf64_sparc_write_relocs,
73ff0d56 864 bfd_elf64_swap_symbol_in,
f65054f7 865 bfd_elf64_swap_symbol_out,
22b75d0a 866 elf64_sparc_slurp_reloc_table,
f65054f7
RH
867 bfd_elf64_slurp_symbol_table,
868 bfd_elf64_swap_dyn_in,
869 bfd_elf64_swap_dyn_out,
947216bf
AM
870 bfd_elf64_swap_reloc_in,
871 bfd_elf64_swap_reloc_out,
872 bfd_elf64_swap_reloca_in,
873 bfd_elf64_swap_reloca_out
f65054f7
RH
874};
875
6d00b590 876#define TARGET_BIG_SYM sparc_elf64_vec
252b5132
RH
877#define TARGET_BIG_NAME "elf64-sparc"
878#define ELF_ARCH bfd_arch_sparc
879#define ELF_MAXPAGESIZE 0x100000
24718e3b 880#define ELF_COMMONPAGESIZE 0x2000
252b5132
RH
881
882/* This is the official ABI value. */
883#define ELF_MACHINE_CODE EM_SPARCV9
884
885/* This is the value that we used before the ABI was released. */
886#define ELF_MACHINE_ALT1 EM_OLD_SPARCV9
887
22b75d0a
DM
888#define elf_backend_reloc_type_class \
889 elf64_sparc_reloc_type_class
f65054f7 890#define bfd_elf64_get_reloc_upper_bound \
22b75d0a 891 elf64_sparc_get_reloc_upper_bound
f65054f7 892#define bfd_elf64_get_dynamic_reloc_upper_bound \
22b75d0a 893 elf64_sparc_get_dynamic_reloc_upper_bound
3e1d7f19 894#define bfd_elf64_canonicalize_reloc \
22b75d0a 895 elf64_sparc_canonicalize_reloc
f65054f7 896#define bfd_elf64_canonicalize_dynamic_reloc \
22b75d0a 897 elf64_sparc_canonicalize_dynamic_reloc
db84b98a
JM
898#define bfd_elf64_set_reloc \
899 elf64_sparc_set_reloc
22b75d0a
DM
900#define elf_backend_add_symbol_hook \
901 elf64_sparc_add_symbol_hook
902#define elf_backend_get_symbol_type \
903 elf64_sparc_get_symbol_type
904#define elf_backend_symbol_processing \
905 elf64_sparc_symbol_processing
906#define elf_backend_print_symbol_all \
907 elf64_sparc_print_symbol_all
908#define elf_backend_output_arch_syms \
909 elf64_sparc_output_arch_syms
910#define bfd_elf64_bfd_merge_private_bfd_data \
911 elf64_sparc_merge_private_bfd_data
912#define elf_backend_fake_sections \
913 elf64_sparc_fake_sections
914#define elf_backend_size_info \
915 elf64_sparc_size_info
916
917#define elf_backend_plt_sym_val \
918 _bfd_sparc_elf_plt_sym_val
919#define bfd_elf64_bfd_link_hash_table_create \
920 _bfd_sparc_elf_link_hash_table_create
921#define elf_info_to_howto \
922 _bfd_sparc_elf_info_to_howto
923#define elf_backend_copy_indirect_symbol \
924 _bfd_sparc_elf_copy_indirect_symbol
252b5132 925#define bfd_elf64_bfd_reloc_type_lookup \
22b75d0a 926 _bfd_sparc_elf_reloc_type_lookup
157090f7
AM
927#define bfd_elf64_bfd_reloc_name_lookup \
928 _bfd_sparc_elf_reloc_name_lookup
f7775d95 929#define bfd_elf64_bfd_relax_section \
22b75d0a 930 _bfd_sparc_elf_relax_section
f0abc2a1 931#define bfd_elf64_new_section_hook \
22b75d0a 932 _bfd_sparc_elf_new_section_hook
252b5132
RH
933
934#define elf_backend_create_dynamic_sections \
22b75d0a 935 _bfd_sparc_elf_create_dynamic_sections
13285a1b
AM
936#define elf_backend_relocs_compatible \
937 _bfd_elf_relocs_compatible
252b5132 938#define elf_backend_check_relocs \
22b75d0a 939 _bfd_sparc_elf_check_relocs
252b5132 940#define elf_backend_adjust_dynamic_symbol \
22b75d0a 941 _bfd_sparc_elf_adjust_dynamic_symbol
151e5294 942#define elf_backend_omit_section_dynsym \
22b75d0a 943 _bfd_sparc_elf_omit_section_dynsym
252b5132 944#define elf_backend_size_dynamic_sections \
22b75d0a 945 _bfd_sparc_elf_size_dynamic_sections
252b5132 946#define elf_backend_relocate_section \
22b75d0a 947 _bfd_sparc_elf_relocate_section
252b5132 948#define elf_backend_finish_dynamic_symbol \
22b75d0a 949 _bfd_sparc_elf_finish_dynamic_symbol
252b5132 950#define elf_backend_finish_dynamic_sections \
22b75d0a 951 _bfd_sparc_elf_finish_dynamic_sections
bb1dd176
QZ
952#define elf_backend_fixup_symbol \
953 _bfd_sparc_elf_fixup_symbol
252b5132 954
40937810 955#define bfd_elf64_mkobject \
22b75d0a 956 _bfd_sparc_elf_mkobject
252b5132 957#define elf_backend_object_p \
22b75d0a 958 _bfd_sparc_elf_object_p
40937810 959#define elf_backend_gc_mark_hook \
22b75d0a 960 _bfd_sparc_elf_gc_mark_hook
74541ad4
AM
961#define elf_backend_init_index_section \
962 _bfd_elf_init_1_index_section
252b5132 963
40937810
JJ
964#define elf_backend_can_gc_sections 1
965#define elf_backend_can_refcount 1
252b5132
RH
966#define elf_backend_want_got_plt 0
967#define elf_backend_plt_readonly 0
968#define elf_backend_want_plt_sym 1
40937810 969#define elf_backend_got_header_size 8
5474d94f 970#define elf_backend_want_dynrelro 1
f0fe0e16 971#define elf_backend_rela_normal 1
252b5132
RH
972
973/* Section 5.2.4 of the ABI specifies a 256-byte boundary for the table. */
974#define elf_backend_plt_alignment 8
975
252b5132 976#include "elf64-target.h"
71a75f6f
MF
977
978/* FreeBSD support */
979#undef TARGET_BIG_SYM
6d00b590 980#define TARGET_BIG_SYM sparc_elf64_fbsd_vec
71a75f6f
MF
981#undef TARGET_BIG_NAME
982#define TARGET_BIG_NAME "elf64-sparc-freebsd"
d1036acb
L
983#undef ELF_OSABI
984#define ELF_OSABI ELFOSABI_FREEBSD
71a75f6f 985
71a75f6f
MF
986#undef elf64_bed
987#define elf64_bed elf64_sparc_fbsd_bed
988
989#include "elf64-target.h"
990
1360ba76
RO
991/* Solaris 2. */
992
993#undef TARGET_BIG_SYM
6d00b590 994#define TARGET_BIG_SYM sparc_elf64_sol2_vec
1360ba76
RO
995#undef TARGET_BIG_NAME
996#define TARGET_BIG_NAME "elf64-sparc-sol2"
997
998/* Restore default: we cannot use ELFOSABI_SOLARIS, otherwise ELFOSABI_NONE
999 objects won't be recognized. */
1000#undef ELF_OSABI
1001
1002#undef elf64_bed
1003#define elf64_bed elf64_sparc_sol2_bed
1004
1005/* The 64-bit static TLS arena size is rounded to the nearest 16-byte
1006 boundary. */
1007#undef elf_backend_static_tls_alignment
1008#define elf_backend_static_tls_alignment 16
1009
1010#include "elf64-target.h"
This page took 1.18864 seconds and 4 git commands to generate.