Correct spelling of "relocatable".
[deliverable/binutils-gdb.git] / bfd / elf64-sparc.c
CommitLineData
252b5132 1/* SPARC-specific support for 64-bit ELF
f0abc2a1
AM
2 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002,
3 2003 Free Software Foundation, Inc.
252b5132 4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
20
21#include "bfd.h"
22#include "sysdep.h"
23#include "libbfd.h"
24#include "elf-bfd.h"
f7775d95 25#include "opcode/sparc.h"
252b5132
RH
26
27/* This is defined if one wants to build upward compatible binaries
28 with the original sparc64-elf toolchain. The support is kept in for
29 now but is turned off by default. dje 970930 */
30/*#define SPARC64_OLD_RELOCS*/
31
32#include "elf/sparc.h"
33
34/* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
35#define MINUS_ONE (~ (bfd_vma) 0)
36
587ff49e 37static struct bfd_link_hash_table * sparc64_elf_bfd_link_hash_table_create
99c79b2e
AJ
38 PARAMS ((bfd *));
39static bfd_reloc_status_type init_insn_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *,
41 bfd *, bfd_vma *, bfd_vma *));
252b5132
RH
42static reloc_howto_type *sparc64_elf_reloc_type_lookup
43 PARAMS ((bfd *, bfd_reloc_code_real_type));
44static void sparc64_elf_info_to_howto
45 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
46
47static void sparc64_elf_build_plt
99c79b2e 48 PARAMS ((bfd *, unsigned char *, int));
252b5132 49static bfd_vma sparc64_elf_plt_entry_offset
dc810e39 50 PARAMS ((bfd_vma));
252b5132 51static bfd_vma sparc64_elf_plt_ptr_offset
dc810e39 52 PARAMS ((bfd_vma, bfd_vma));
252b5132 53
b34976b6 54static bfd_boolean sparc64_elf_check_relocs
99c79b2e
AJ
55 PARAMS ((bfd *, struct bfd_link_info *, asection *sec,
56 const Elf_Internal_Rela *));
b34976b6 57static bfd_boolean sparc64_elf_adjust_dynamic_symbol
99c79b2e 58 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 59static bfd_boolean sparc64_elf_size_dynamic_sections
99c79b2e 60 PARAMS ((bfd *, struct bfd_link_info *));
587ff49e
RH
61static int sparc64_elf_get_symbol_type
62 PARAMS (( Elf_Internal_Sym *, int));
b34976b6 63static bfd_boolean sparc64_elf_add_symbol_hook
587ff49e 64 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
99c79b2e 65 const char **, flagword *, asection **, bfd_vma *));
b34976b6 66static bfd_boolean sparc64_elf_output_arch_syms
5d964dfa 67 PARAMS ((bfd *, struct bfd_link_info *, PTR,
b34976b6 68 bfd_boolean (*) (PTR, const char *, Elf_Internal_Sym *, asection *)));
587ff49e
RH
69static void sparc64_elf_symbol_processing
70 PARAMS ((bfd *, asymbol *));
252b5132 71
b34976b6 72static bfd_boolean sparc64_elf_merge_private_bfd_data
252b5132
RH
73 PARAMS ((bfd *, bfd *));
74
b34976b6 75static bfd_boolean sparc64_elf_fake_sections
947216bf 76 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
0594c12d 77
99c79b2e
AJ
78static const char *sparc64_elf_print_symbol_all
79 PARAMS ((bfd *, PTR, asymbol *));
f0abc2a1
AM
80static bfd_boolean sparc64_elf_new_section_hook
81 PARAMS ((bfd *, asection *));
b34976b6
AM
82static bfd_boolean sparc64_elf_relax_section
83 PARAMS ((bfd *, asection *, struct bfd_link_info *, bfd_boolean *));
84static bfd_boolean sparc64_elf_relocate_section
252b5132
RH
85 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
86 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
b34976b6 87static bfd_boolean sparc64_elf_finish_dynamic_symbol
99c79b2e
AJ
88 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
89 Elf_Internal_Sym *));
b34976b6 90static bfd_boolean sparc64_elf_finish_dynamic_sections
99c79b2e 91 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 92static bfd_boolean sparc64_elf_object_p PARAMS ((bfd *));
f65054f7
RH
93static long sparc64_elf_get_reloc_upper_bound PARAMS ((bfd *, asection *));
94static long sparc64_elf_get_dynamic_reloc_upper_bound PARAMS ((bfd *));
b34976b6
AM
95static bfd_boolean sparc64_elf_slurp_one_reloc_table
96 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, asymbol **, bfd_boolean));
97static bfd_boolean sparc64_elf_slurp_reloc_table
98 PARAMS ((bfd *, asection *, asymbol **, bfd_boolean));
3e1d7f19
JJ
99static long sparc64_elf_canonicalize_reloc
100 PARAMS ((bfd *, asection *, arelent **, asymbol **));
f65054f7
RH
101static long sparc64_elf_canonicalize_dynamic_reloc
102 PARAMS ((bfd *, arelent **, asymbol **));
103static void sparc64_elf_write_relocs PARAMS ((bfd *, asection *, PTR));
f51e552e
AM
104static enum elf_reloc_type_class sparc64_elf_reloc_type_class
105 PARAMS ((const Elf_Internal_Rela *));
252b5132
RH
106\f
107/* The relocation "howto" table. */
108
109static bfd_reloc_status_type sparc_elf_notsup_reloc
110 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
111static bfd_reloc_status_type sparc_elf_wdisp16_reloc
112 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
113static bfd_reloc_status_type sparc_elf_hix22_reloc
114 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
115static bfd_reloc_status_type sparc_elf_lox10_reloc
116 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
117
118static reloc_howto_type sparc64_elf_howto_table[] =
119{
b34976b6
AM
120 HOWTO(R_SPARC_NONE, 0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_NONE", FALSE,0,0x00000000,TRUE),
121 HOWTO(R_SPARC_8, 0,0, 8,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_8", FALSE,0,0x000000ff,TRUE),
122 HOWTO(R_SPARC_16, 0,1,16,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_16", FALSE,0,0x0000ffff,TRUE),
123 HOWTO(R_SPARC_32, 0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_32", FALSE,0,0xffffffff,TRUE),
124 HOWTO(R_SPARC_DISP8, 0,0, 8,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP8", FALSE,0,0x000000ff,TRUE),
125 HOWTO(R_SPARC_DISP16, 0,1,16,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP16", FALSE,0,0x0000ffff,TRUE),
126 HOWTO(R_SPARC_DISP32, 0,2,32,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP32", FALSE,0,0xffffffff,TRUE),
127 HOWTO(R_SPARC_WDISP30, 2,2,30,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WDISP30", FALSE,0,0x3fffffff,TRUE),
128 HOWTO(R_SPARC_WDISP22, 2,2,22,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WDISP22", FALSE,0,0x003fffff,TRUE),
129 HOWTO(R_SPARC_HI22, 10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_HI22", FALSE,0,0x003fffff,TRUE),
130 HOWTO(R_SPARC_22, 0,2,22,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_22", FALSE,0,0x003fffff,TRUE),
131 HOWTO(R_SPARC_13, 0,2,13,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_13", FALSE,0,0x00001fff,TRUE),
132 HOWTO(R_SPARC_LO10, 0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_LO10", FALSE,0,0x000003ff,TRUE),
133 HOWTO(R_SPARC_GOT10, 0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_GOT10", FALSE,0,0x000003ff,TRUE),
134 HOWTO(R_SPARC_GOT13, 0,2,13,FALSE,0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_GOT13", FALSE,0,0x00001fff,TRUE),
135 HOWTO(R_SPARC_GOT22, 10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_GOT22", FALSE,0,0x003fffff,TRUE),
136 HOWTO(R_SPARC_PC10, 0,2,10,TRUE, 0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_PC10", FALSE,0,0x000003ff,TRUE),
137 HOWTO(R_SPARC_PC22, 10,2,22,TRUE, 0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_PC22", FALSE,0,0x003fffff,TRUE),
138 HOWTO(R_SPARC_WPLT30, 2,2,30,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WPLT30", FALSE,0,0x3fffffff,TRUE),
139 HOWTO(R_SPARC_COPY, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_COPY", FALSE,0,0x00000000,TRUE),
140 HOWTO(R_SPARC_GLOB_DAT, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_GLOB_DAT",FALSE,0,0x00000000,TRUE),
141 HOWTO(R_SPARC_JMP_SLOT, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_JMP_SLOT",FALSE,0,0x00000000,TRUE),
142 HOWTO(R_SPARC_RELATIVE, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_RELATIVE",FALSE,0,0x00000000,TRUE),
143 HOWTO(R_SPARC_UA32, 0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_UA32", FALSE,0,0xffffffff,TRUE),
252b5132 144#ifndef SPARC64_OLD_RELOCS
b34976b6 145 HOWTO(R_SPARC_PLT32, 0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_PLT32", FALSE,0,0xffffffff,TRUE),
252b5132 146 /* These aren't implemented yet. */
b34976b6
AM
147 HOWTO(R_SPARC_HIPLT22, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_HIPLT22", FALSE,0,0x00000000,TRUE),
148 HOWTO(R_SPARC_LOPLT10, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_LOPLT10", FALSE,0,0x00000000,TRUE),
149 HOWTO(R_SPARC_PCPLT32, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_PCPLT32", FALSE,0,0x00000000,TRUE),
150 HOWTO(R_SPARC_PCPLT22, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_PCPLT22", FALSE,0,0x00000000,TRUE),
151 HOWTO(R_SPARC_PCPLT10, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_PCPLT10", FALSE,0,0x00000000,TRUE),
252b5132 152#endif
b34976b6
AM
153 HOWTO(R_SPARC_10, 0,2,10,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_10", FALSE,0,0x000003ff,TRUE),
154 HOWTO(R_SPARC_11, 0,2,11,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_11", FALSE,0,0x000007ff,TRUE),
155 HOWTO(R_SPARC_64, 0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_64", FALSE,0,MINUS_ONE, TRUE),
156 HOWTO(R_SPARC_OLO10, 0,2,13,FALSE,0,complain_overflow_signed, sparc_elf_notsup_reloc, "R_SPARC_OLO10", FALSE,0,0x00001fff,TRUE),
157 HOWTO(R_SPARC_HH22, 42,2,22,FALSE,0,complain_overflow_unsigned,bfd_elf_generic_reloc, "R_SPARC_HH22", FALSE,0,0x003fffff,TRUE),
158 HOWTO(R_SPARC_HM10, 32,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_HM10", FALSE,0,0x000003ff,TRUE),
159 HOWTO(R_SPARC_LM22, 10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_LM22", FALSE,0,0x003fffff,TRUE),
160 HOWTO(R_SPARC_PC_HH22, 42,2,22,TRUE, 0,complain_overflow_unsigned,bfd_elf_generic_reloc, "R_SPARC_PC_HH22", FALSE,0,0x003fffff,TRUE),
161 HOWTO(R_SPARC_PC_HM10, 32,2,10,TRUE, 0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_PC_HM10", FALSE,0,0x000003ff,TRUE),
162 HOWTO(R_SPARC_PC_LM22, 10,2,22,TRUE, 0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_PC_LM22", FALSE,0,0x003fffff,TRUE),
163 HOWTO(R_SPARC_WDISP16, 2,2,16,TRUE, 0,complain_overflow_signed, sparc_elf_wdisp16_reloc,"R_SPARC_WDISP16", FALSE,0,0x00000000,TRUE),
164 HOWTO(R_SPARC_WDISP19, 2,2,19,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WDISP19", FALSE,0,0x0007ffff,TRUE),
165 HOWTO(R_SPARC_UNUSED_42, 0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_UNUSED_42",FALSE,0,0x00000000,TRUE),
166 HOWTO(R_SPARC_7, 0,2, 7,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_7", FALSE,0,0x0000007f,TRUE),
167 HOWTO(R_SPARC_5, 0,2, 5,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_5", FALSE,0,0x0000001f,TRUE),
168 HOWTO(R_SPARC_6, 0,2, 6,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_6", FALSE,0,0x0000003f,TRUE),
169 HOWTO(R_SPARC_DISP64, 0,4,64,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP64", FALSE,0,MINUS_ONE, TRUE),
170 HOWTO(R_SPARC_PLT64, 0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_PLT64", FALSE,0,MINUS_ONE, TRUE),
171 HOWTO(R_SPARC_HIX22, 0,4, 0,FALSE,0,complain_overflow_bitfield,sparc_elf_hix22_reloc, "R_SPARC_HIX22", FALSE,0,MINUS_ONE, FALSE),
172 HOWTO(R_SPARC_LOX10, 0,4, 0,FALSE,0,complain_overflow_dont, sparc_elf_lox10_reloc, "R_SPARC_LOX10", FALSE,0,MINUS_ONE, FALSE),
173 HOWTO(R_SPARC_H44, 22,2,22,FALSE,0,complain_overflow_unsigned,bfd_elf_generic_reloc, "R_SPARC_H44", FALSE,0,0x003fffff,FALSE),
174 HOWTO(R_SPARC_M44, 12,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_M44", FALSE,0,0x000003ff,FALSE),
175 HOWTO(R_SPARC_L44, 0,2,13,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_L44", FALSE,0,0x00000fff,FALSE),
176 HOWTO(R_SPARC_REGISTER, 0,4, 0,FALSE,0,complain_overflow_bitfield,sparc_elf_notsup_reloc, "R_SPARC_REGISTER",FALSE,0,MINUS_ONE, FALSE),
177 HOWTO(R_SPARC_UA64, 0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_UA64", FALSE,0,MINUS_ONE, TRUE),
b9734f35
JJ
178 HOWTO(R_SPARC_UA16, 0,1,16,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_UA16", FALSE,0,0x0000ffff,TRUE),
179 HOWTO(R_SPARC_TLS_GD_HI22,10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_HI22",FALSE,0,0x003fffff,TRUE),
180 HOWTO(R_SPARC_TLS_GD_LO10,0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_LO10",FALSE,0,0x000003ff,TRUE),
181 HOWTO(R_SPARC_TLS_GD_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_ADD",FALSE,0,0x00000000,TRUE),
182 HOWTO(R_SPARC_TLS_GD_CALL,2,2,30,TRUE,0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_CALL",FALSE,0,0x3fffffff,TRUE),
183 HOWTO(R_SPARC_TLS_LDM_HI22,10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_HI22",FALSE,0,0x003fffff,TRUE),
184 HOWTO(R_SPARC_TLS_LDM_LO10,0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_LO10",FALSE,0,0x000003ff,TRUE),
185 HOWTO(R_SPARC_TLS_LDM_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_ADD",FALSE,0,0x00000000,TRUE),
186 HOWTO(R_SPARC_TLS_LDM_CALL,2,2,30,TRUE,0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_CALL",FALSE,0,0x3fffffff,TRUE),
187 HOWTO(R_SPARC_TLS_LDO_HIX22,0,2,0,FALSE,0,complain_overflow_bitfield,sparc_elf_hix22_reloc,"R_SPARC_TLS_LDO_HIX22",FALSE,0,0x003fffff, FALSE),
188 HOWTO(R_SPARC_TLS_LDO_LOX10,0,2,0,FALSE,0,complain_overflow_dont, sparc_elf_lox10_reloc, "R_SPARC_TLS_LDO_LOX10",FALSE,0,0x000003ff, FALSE),
189 HOWTO(R_SPARC_TLS_LDO_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDO_ADD",FALSE,0,0x00000000,TRUE),
190 HOWTO(R_SPARC_TLS_IE_HI22,10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_HI22",FALSE,0,0x003fffff,TRUE),
191 HOWTO(R_SPARC_TLS_IE_LO10,0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_LO10",FALSE,0,0x000003ff,TRUE),
192 HOWTO(R_SPARC_TLS_IE_LD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_LD",FALSE,0,0x00000000,TRUE),
193 HOWTO(R_SPARC_TLS_IE_LDX,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_LDX",FALSE,0,0x00000000,TRUE),
194 HOWTO(R_SPARC_TLS_IE_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_ADD",FALSE,0,0x00000000,TRUE),
195 HOWTO(R_SPARC_TLS_LE_HIX22,0,2,0,FALSE,0,complain_overflow_bitfield,sparc_elf_hix22_reloc, "R_SPARC_TLS_LE_HIX22",FALSE,0,0x003fffff, FALSE),
196 HOWTO(R_SPARC_TLS_LE_LOX10,0,2,0,FALSE,0,complain_overflow_dont, sparc_elf_lox10_reloc, "R_SPARC_TLS_LE_LOX10",FALSE,0,0x000003ff, FALSE),
197 HOWTO(R_SPARC_TLS_DTPMOD32,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_DTPMOD32",FALSE,0,0x00000000,TRUE),
198 HOWTO(R_SPARC_TLS_DTPMOD64,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_DTPMOD64",FALSE,0,0x00000000,TRUE),
199 HOWTO(R_SPARC_TLS_DTPOFF32,0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc,"R_SPARC_TLS_DTPOFF32",FALSE,0,0xffffffff,TRUE),
200 HOWTO(R_SPARC_TLS_DTPOFF64,0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc,"R_SPARC_TLS_DTPOFF64",FALSE,0,MINUS_ONE,TRUE),
201 HOWTO(R_SPARC_TLS_TPOFF32,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_TPOFF32",FALSE,0,0x00000000,TRUE),
202 HOWTO(R_SPARC_TLS_TPOFF64,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_TPOFF64",FALSE,0,0x00000000,TRUE)
252b5132
RH
203};
204
205struct elf_reloc_map {
206 bfd_reloc_code_real_type bfd_reloc_val;
207 unsigned char elf_reloc_val;
208};
209
dc810e39 210static const struct elf_reloc_map sparc_reloc_map[] =
252b5132
RH
211{
212 { BFD_RELOC_NONE, R_SPARC_NONE, },
213 { BFD_RELOC_16, R_SPARC_16, },
bd5e6e7e 214 { BFD_RELOC_16_PCREL, R_SPARC_DISP16 },
252b5132
RH
215 { BFD_RELOC_8, R_SPARC_8 },
216 { BFD_RELOC_8_PCREL, R_SPARC_DISP8 },
217 { BFD_RELOC_CTOR, R_SPARC_64 },
218 { BFD_RELOC_32, R_SPARC_32 },
219 { BFD_RELOC_32_PCREL, R_SPARC_DISP32 },
220 { BFD_RELOC_HI22, R_SPARC_HI22 },
221 { BFD_RELOC_LO10, R_SPARC_LO10, },
222 { BFD_RELOC_32_PCREL_S2, R_SPARC_WDISP30 },
bd5e6e7e 223 { BFD_RELOC_64_PCREL, R_SPARC_DISP64 },
252b5132
RH
224 { BFD_RELOC_SPARC22, R_SPARC_22 },
225 { BFD_RELOC_SPARC13, R_SPARC_13 },
226 { BFD_RELOC_SPARC_GOT10, R_SPARC_GOT10 },
227 { BFD_RELOC_SPARC_GOT13, R_SPARC_GOT13 },
228 { BFD_RELOC_SPARC_GOT22, R_SPARC_GOT22 },
229 { BFD_RELOC_SPARC_PC10, R_SPARC_PC10 },
230 { BFD_RELOC_SPARC_PC22, R_SPARC_PC22 },
231 { BFD_RELOC_SPARC_WPLT30, R_SPARC_WPLT30 },
232 { BFD_RELOC_SPARC_COPY, R_SPARC_COPY },
233 { BFD_RELOC_SPARC_GLOB_DAT, R_SPARC_GLOB_DAT },
234 { BFD_RELOC_SPARC_JMP_SLOT, R_SPARC_JMP_SLOT },
235 { BFD_RELOC_SPARC_RELATIVE, R_SPARC_RELATIVE },
236 { BFD_RELOC_SPARC_WDISP22, R_SPARC_WDISP22 },
0f2712ed
NC
237 { BFD_RELOC_SPARC_UA16, R_SPARC_UA16 },
238 { BFD_RELOC_SPARC_UA32, R_SPARC_UA32 },
239 { BFD_RELOC_SPARC_UA64, R_SPARC_UA64 },
240 { BFD_RELOC_SPARC_10, R_SPARC_10 },
241 { BFD_RELOC_SPARC_11, R_SPARC_11 },
242 { BFD_RELOC_SPARC_64, R_SPARC_64 },
243 { BFD_RELOC_SPARC_OLO10, R_SPARC_OLO10 },
244 { BFD_RELOC_SPARC_HH22, R_SPARC_HH22 },
245 { BFD_RELOC_SPARC_HM10, R_SPARC_HM10 },
246 { BFD_RELOC_SPARC_LM22, R_SPARC_LM22 },
247 { BFD_RELOC_SPARC_PC_HH22, R_SPARC_PC_HH22 },
248 { BFD_RELOC_SPARC_PC_HM10, R_SPARC_PC_HM10 },
249 { BFD_RELOC_SPARC_PC_LM22, R_SPARC_PC_LM22 },
250 { BFD_RELOC_SPARC_WDISP16, R_SPARC_WDISP16 },
251 { BFD_RELOC_SPARC_WDISP19, R_SPARC_WDISP19 },
252 { BFD_RELOC_SPARC_7, R_SPARC_7 },
253 { BFD_RELOC_SPARC_5, R_SPARC_5 },
254 { BFD_RELOC_SPARC_6, R_SPARC_6 },
255 { BFD_RELOC_SPARC_DISP64, R_SPARC_DISP64 },
b9734f35
JJ
256 { BFD_RELOC_SPARC_TLS_GD_HI22, R_SPARC_TLS_GD_HI22 },
257 { BFD_RELOC_SPARC_TLS_GD_LO10, R_SPARC_TLS_GD_LO10 },
258 { BFD_RELOC_SPARC_TLS_GD_ADD, R_SPARC_TLS_GD_ADD },
259 { BFD_RELOC_SPARC_TLS_GD_CALL, R_SPARC_TLS_GD_CALL },
260 { BFD_RELOC_SPARC_TLS_LDM_HI22, R_SPARC_TLS_LDM_HI22 },
261 { BFD_RELOC_SPARC_TLS_LDM_LO10, R_SPARC_TLS_LDM_LO10 },
262 { BFD_RELOC_SPARC_TLS_LDM_ADD, R_SPARC_TLS_LDM_ADD },
263 { BFD_RELOC_SPARC_TLS_LDM_CALL, R_SPARC_TLS_LDM_CALL },
264 { BFD_RELOC_SPARC_TLS_LDO_HIX22, R_SPARC_TLS_LDO_HIX22 },
265 { BFD_RELOC_SPARC_TLS_LDO_LOX10, R_SPARC_TLS_LDO_LOX10 },
266 { BFD_RELOC_SPARC_TLS_LDO_ADD, R_SPARC_TLS_LDO_ADD },
267 { BFD_RELOC_SPARC_TLS_IE_HI22, R_SPARC_TLS_IE_HI22 },
268 { BFD_RELOC_SPARC_TLS_IE_LO10, R_SPARC_TLS_IE_LO10 },
269 { BFD_RELOC_SPARC_TLS_IE_LD, R_SPARC_TLS_IE_LD },
270 { BFD_RELOC_SPARC_TLS_IE_LDX, R_SPARC_TLS_IE_LDX },
271 { BFD_RELOC_SPARC_TLS_IE_ADD, R_SPARC_TLS_IE_ADD },
272 { BFD_RELOC_SPARC_TLS_LE_HIX22, R_SPARC_TLS_LE_HIX22 },
273 { BFD_RELOC_SPARC_TLS_LE_LOX10, R_SPARC_TLS_LE_LOX10 },
274 { BFD_RELOC_SPARC_TLS_DTPMOD32, R_SPARC_TLS_DTPMOD32 },
275 { BFD_RELOC_SPARC_TLS_DTPMOD64, R_SPARC_TLS_DTPMOD64 },
276 { BFD_RELOC_SPARC_TLS_DTPOFF32, R_SPARC_TLS_DTPOFF32 },
277 { BFD_RELOC_SPARC_TLS_DTPOFF64, R_SPARC_TLS_DTPOFF64 },
278 { BFD_RELOC_SPARC_TLS_TPOFF32, R_SPARC_TLS_TPOFF32 },
279 { BFD_RELOC_SPARC_TLS_TPOFF64, R_SPARC_TLS_TPOFF64 },
bd5e6e7e
JJ
280#ifndef SPARC64_OLD_RELOCS
281 { BFD_RELOC_SPARC_PLT32, R_SPARC_PLT32 },
282#endif
0f2712ed
NC
283 { BFD_RELOC_SPARC_PLT64, R_SPARC_PLT64 },
284 { BFD_RELOC_SPARC_HIX22, R_SPARC_HIX22 },
285 { BFD_RELOC_SPARC_LOX10, R_SPARC_LOX10 },
286 { BFD_RELOC_SPARC_H44, R_SPARC_H44 },
287 { BFD_RELOC_SPARC_M44, R_SPARC_M44 },
288 { BFD_RELOC_SPARC_L44, R_SPARC_L44 },
289 { BFD_RELOC_SPARC_REGISTER, R_SPARC_REGISTER }
252b5132
RH
290};
291
292static reloc_howto_type *
293sparc64_elf_reloc_type_lookup (abfd, code)
6c08d697 294 bfd *abfd ATTRIBUTE_UNUSED;
252b5132
RH
295 bfd_reloc_code_real_type code;
296{
297 unsigned int i;
298 for (i = 0; i < sizeof (sparc_reloc_map) / sizeof (struct elf_reloc_map); i++)
299 {
300 if (sparc_reloc_map[i].bfd_reloc_val == code)
301 return &sparc64_elf_howto_table[(int) sparc_reloc_map[i].elf_reloc_val];
302 }
303 return 0;
304}
305
306static void
307sparc64_elf_info_to_howto (abfd, cache_ptr, dst)
6c08d697 308 bfd *abfd ATTRIBUTE_UNUSED;
252b5132 309 arelent *cache_ptr;
947216bf 310 Elf_Internal_Rela *dst;
252b5132 311{
f65054f7
RH
312 BFD_ASSERT (ELF64_R_TYPE_ID (dst->r_info) < (unsigned int) R_SPARC_max_std);
313 cache_ptr->howto = &sparc64_elf_howto_table[ELF64_R_TYPE_ID (dst->r_info)];
314}
315\f
3e1d7f19
JJ
316struct sparc64_elf_section_data
317{
318 struct bfd_elf_section_data elf;
319 unsigned int do_relax, reloc_count;
320};
321
322#define sec_do_relax(sec) \
323 ((struct sparc64_elf_section_data *) elf_section_data (sec))->do_relax
324#define canon_reloc_count(sec) \
325 ((struct sparc64_elf_section_data *) elf_section_data (sec))->reloc_count
326
f65054f7
RH
327/* Due to the way how we handle R_SPARC_OLO10, each entry in a SHT_RELA
328 section can represent up to two relocs, we must tell the user to allocate
329 more space. */
435b1e90 330
f65054f7
RH
331static long
332sparc64_elf_get_reloc_upper_bound (abfd, sec)
6c08d697 333 bfd *abfd ATTRIBUTE_UNUSED;
f65054f7
RH
334 asection *sec;
335{
336 return (sec->reloc_count * 2 + 1) * sizeof (arelent *);
337}
338
339static long
340sparc64_elf_get_dynamic_reloc_upper_bound (abfd)
341 bfd *abfd;
342{
343 return _bfd_elf_get_dynamic_reloc_upper_bound (abfd) * 2;
344}
345
435b1e90 346/* Read relocations for ASECT from REL_HDR. There are RELOC_COUNT of
f65054f7
RH
347 them. We cannot use generic elf routines for this, because R_SPARC_OLO10
348 has secondary addend in ELF64_R_TYPE_DATA. We handle it as two relocations
349 for the same location, R_SPARC_LO10 and R_SPARC_13. */
350
b34976b6 351static bfd_boolean
f65054f7
RH
352sparc64_elf_slurp_one_reloc_table (abfd, asect, rel_hdr, symbols, dynamic)
353 bfd *abfd;
354 asection *asect;
355 Elf_Internal_Shdr *rel_hdr;
356 asymbol **symbols;
b34976b6 357 bfd_boolean dynamic;
f65054f7 358{
f65054f7
RH
359 PTR allocated = NULL;
360 bfd_byte *native_relocs;
361 arelent *relent;
362 unsigned int i;
363 int entsize;
364 bfd_size_type count;
365 arelent *relents;
366
dc810e39 367 allocated = (PTR) bfd_malloc (rel_hdr->sh_size);
f65054f7
RH
368 if (allocated == NULL)
369 goto error_return;
370
371 if (bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 372 || bfd_bread (allocated, rel_hdr->sh_size, abfd) != rel_hdr->sh_size)
f65054f7
RH
373 goto error_return;
374
375 native_relocs = (bfd_byte *) allocated;
376
3e1d7f19 377 relents = asect->relocation + canon_reloc_count (asect);
f65054f7
RH
378
379 entsize = rel_hdr->sh_entsize;
380 BFD_ASSERT (entsize == sizeof (Elf64_External_Rela));
435b1e90 381
f65054f7
RH
382 count = rel_hdr->sh_size / entsize;
383
384 for (i = 0, relent = relents; i < count;
385 i++, relent++, native_relocs += entsize)
386 {
387 Elf_Internal_Rela rela;
388
947216bf 389 bfd_elf64_swap_reloca_in (abfd, native_relocs, &rela);
f65054f7
RH
390
391 /* The address of an ELF reloc is section relative for an object
392 file, and absolute for an executable file or shared library.
393 The address of a normal BFD reloc is always section relative,
394 and the address of a dynamic reloc is absolute.. */
395 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || dynamic)
396 relent->address = rela.r_offset;
397 else
398 relent->address = rela.r_offset - asect->vma;
399
400 if (ELF64_R_SYM (rela.r_info) == 0)
401 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
402 else
403 {
404 asymbol **ps, *s;
405
406 ps = symbols + ELF64_R_SYM (rela.r_info) - 1;
407 s = *ps;
408
409 /* Canonicalize ELF section symbols. FIXME: Why? */
410 if ((s->flags & BSF_SECTION_SYM) == 0)
411 relent->sym_ptr_ptr = ps;
412 else
413 relent->sym_ptr_ptr = s->section->symbol_ptr_ptr;
414 }
415
416 relent->addend = rela.r_addend;
417
418 BFD_ASSERT (ELF64_R_TYPE_ID (rela.r_info) < (unsigned int) R_SPARC_max_std);
419 if (ELF64_R_TYPE_ID (rela.r_info) == R_SPARC_OLO10)
420 {
421 relent->howto = &sparc64_elf_howto_table[R_SPARC_LO10];
422 relent[1].address = relent->address;
423 relent++;
424 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
425 relent->addend = ELF64_R_TYPE_DATA (rela.r_info);
426 relent->howto = &sparc64_elf_howto_table[R_SPARC_13];
427 }
428 else
429 relent->howto = &sparc64_elf_howto_table[ELF64_R_TYPE_ID (rela.r_info)];
430 }
431
3e1d7f19 432 canon_reloc_count (asect) += relent - relents;
f65054f7
RH
433
434 if (allocated != NULL)
435 free (allocated);
436
b34976b6 437 return TRUE;
f65054f7
RH
438
439 error_return:
440 if (allocated != NULL)
441 free (allocated);
b34976b6 442 return FALSE;
f65054f7
RH
443}
444
445/* Read in and swap the external relocs. */
446
b34976b6 447static bfd_boolean
f65054f7
RH
448sparc64_elf_slurp_reloc_table (abfd, asect, symbols, dynamic)
449 bfd *abfd;
450 asection *asect;
451 asymbol **symbols;
b34976b6 452 bfd_boolean dynamic;
f65054f7
RH
453{
454 struct bfd_elf_section_data * const d = elf_section_data (asect);
455 Elf_Internal_Shdr *rel_hdr;
456 Elf_Internal_Shdr *rel_hdr2;
dc810e39 457 bfd_size_type amt;
f65054f7
RH
458
459 if (asect->relocation != NULL)
b34976b6 460 return TRUE;
f65054f7
RH
461
462 if (! dynamic)
463 {
464 if ((asect->flags & SEC_RELOC) == 0
465 || asect->reloc_count == 0)
b34976b6 466 return TRUE;
f65054f7
RH
467
468 rel_hdr = &d->rel_hdr;
469 rel_hdr2 = d->rel_hdr2;
470
471 BFD_ASSERT (asect->rel_filepos == rel_hdr->sh_offset
472 || (rel_hdr2 && asect->rel_filepos == rel_hdr2->sh_offset));
473 }
474 else
475 {
476 /* Note that ASECT->RELOC_COUNT tends not to be accurate in this
477 case because relocations against this section may use the
478 dynamic symbol table, and in that case bfd_section_from_shdr
479 in elf.c does not update the RELOC_COUNT. */
480 if (asect->_raw_size == 0)
b34976b6 481 return TRUE;
f65054f7
RH
482
483 rel_hdr = &d->this_hdr;
d9bc7a44 484 asect->reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
f65054f7
RH
485 rel_hdr2 = NULL;
486 }
487
dc810e39
AM
488 amt = asect->reloc_count;
489 amt *= 2 * sizeof (arelent);
490 asect->relocation = (arelent *) bfd_alloc (abfd, amt);
f65054f7 491 if (asect->relocation == NULL)
b34976b6 492 return FALSE;
f65054f7 493
3e1d7f19
JJ
494 /* The sparc64_elf_slurp_one_reloc_table routine increments
495 canon_reloc_count. */
496 canon_reloc_count (asect) = 0;
435b1e90 497
f65054f7
RH
498 if (!sparc64_elf_slurp_one_reloc_table (abfd, asect, rel_hdr, symbols,
499 dynamic))
b34976b6 500 return FALSE;
435b1e90
KH
501
502 if (rel_hdr2
f65054f7
RH
503 && !sparc64_elf_slurp_one_reloc_table (abfd, asect, rel_hdr2, symbols,
504 dynamic))
b34976b6 505 return FALSE;
f65054f7 506
b34976b6 507 return TRUE;
f65054f7
RH
508}
509
3e1d7f19
JJ
510/* Canonicalize the relocs. */
511
512static long
513sparc64_elf_canonicalize_reloc (abfd, section, relptr, symbols)
514 bfd *abfd;
515 sec_ptr section;
516 arelent **relptr;
517 asymbol **symbols;
518{
519 arelent *tblptr;
520 unsigned int i;
521 struct elf_backend_data *bed = get_elf_backend_data (abfd);
522
523 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
524 return -1;
525
526 tblptr = section->relocation;
527 for (i = 0; i < canon_reloc_count (section); i++)
528 *relptr++ = tblptr++;
529
530 *relptr = NULL;
531
532 return canon_reloc_count (section);
533}
534
535
f65054f7
RH
536/* Canonicalize the dynamic relocation entries. Note that we return
537 the dynamic relocations as a single block, although they are
538 actually associated with particular sections; the interface, which
539 was designed for SunOS style shared libraries, expects that there
540 is only one set of dynamic relocs. Any section that was actually
541 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses
542 the dynamic symbol table, is considered to be a dynamic reloc
543 section. */
544
545static long
546sparc64_elf_canonicalize_dynamic_reloc (abfd, storage, syms)
547 bfd *abfd;
548 arelent **storage;
549 asymbol **syms;
550{
551 asection *s;
552 long ret;
553
554 if (elf_dynsymtab (abfd) == 0)
555 {
556 bfd_set_error (bfd_error_invalid_operation);
557 return -1;
558 }
559
560 ret = 0;
561 for (s = abfd->sections; s != NULL; s = s->next)
562 {
563 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
564 && (elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
565 {
566 arelent *p;
567 long count, i;
568
b34976b6 569 if (! sparc64_elf_slurp_reloc_table (abfd, s, syms, TRUE))
f65054f7 570 return -1;
3e1d7f19 571 count = canon_reloc_count (s);
f65054f7
RH
572 p = s->relocation;
573 for (i = 0; i < count; i++)
574 *storage++ = p++;
575 ret += count;
576 }
577 }
578
579 *storage = NULL;
580
581 return ret;
582}
583
584/* Write out the relocs. */
585
586static void
587sparc64_elf_write_relocs (abfd, sec, data)
588 bfd *abfd;
589 asection *sec;
590 PTR data;
591{
b34976b6 592 bfd_boolean *failedp = (bfd_boolean *) data;
f65054f7 593 Elf_Internal_Shdr *rela_hdr;
37fb6db1 594 Elf64_External_Rela *outbound_relocas, *src_rela;
f65054f7
RH
595 unsigned int idx, count;
596 asymbol *last_sym = 0;
597 int last_sym_idx = 0;
598
599 /* If we have already failed, don't do anything. */
600 if (*failedp)
601 return;
602
603 if ((sec->flags & SEC_RELOC) == 0)
604 return;
605
606 /* The linker backend writes the relocs out itself, and sets the
607 reloc_count field to zero to inhibit writing them here. Also,
608 sometimes the SEC_RELOC flag gets set even when there aren't any
609 relocs. */
610 if (sec->reloc_count == 0)
611 return;
612
613 /* We can combine two relocs that refer to the same address
614 into R_SPARC_OLO10 if first one is R_SPARC_LO10 and the
615 latter is R_SPARC_13 with no associated symbol. */
616 count = 0;
617 for (idx = 0; idx < sec->reloc_count; idx++)
618 {
619 bfd_vma addr;
f65054f7
RH
620
621 ++count;
622
623 addr = sec->orelocation[idx]->address;
624 if (sec->orelocation[idx]->howto->type == R_SPARC_LO10
625 && idx < sec->reloc_count - 1)
626 {
627 arelent *r = sec->orelocation[idx + 1];
628
629 if (r->howto->type == R_SPARC_13
630 && r->address == addr
631 && bfd_is_abs_section ((*r->sym_ptr_ptr)->section)
632 && (*r->sym_ptr_ptr)->value == 0)
633 ++idx;
634 }
635 }
636
637 rela_hdr = &elf_section_data (sec)->rel_hdr;
638
639 rela_hdr->sh_size = rela_hdr->sh_entsize * count;
640 rela_hdr->contents = (PTR) bfd_alloc (abfd, rela_hdr->sh_size);
641 if (rela_hdr->contents == NULL)
642 {
b34976b6 643 *failedp = TRUE;
f65054f7
RH
644 return;
645 }
646
647 /* Figure out whether the relocations are RELA or REL relocations. */
648 if (rela_hdr->sh_type != SHT_RELA)
649 abort ();
650
435b1e90 651 /* orelocation has the data, reloc_count has the count... */
f65054f7 652 outbound_relocas = (Elf64_External_Rela *) rela_hdr->contents;
37fb6db1 653 src_rela = outbound_relocas;
f65054f7
RH
654
655 for (idx = 0; idx < sec->reloc_count; idx++)
656 {
657 Elf_Internal_Rela dst_rela;
f65054f7
RH
658 arelent *ptr;
659 asymbol *sym;
660 int n;
661
662 ptr = sec->orelocation[idx];
f65054f7
RH
663
664 /* The address of an ELF reloc is section relative for an object
665 file, and absolute for an executable file or shared library.
666 The address of a BFD reloc is always section relative. */
667 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
668 dst_rela.r_offset = ptr->address;
669 else
670 dst_rela.r_offset = ptr->address + sec->vma;
671
672 sym = *ptr->sym_ptr_ptr;
673 if (sym == last_sym)
674 n = last_sym_idx;
675 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
676 n = STN_UNDEF;
677 else
678 {
679 last_sym = sym;
680 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
681 if (n < 0)
682 {
b34976b6 683 *failedp = TRUE;
f65054f7
RH
684 return;
685 }
686 last_sym_idx = n;
687 }
688
689 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
690 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
691 && ! _bfd_elf_validate_reloc (abfd, ptr))
692 {
b34976b6 693 *failedp = TRUE;
f65054f7
RH
694 return;
695 }
696
697 if (ptr->howto->type == R_SPARC_LO10
698 && idx < sec->reloc_count - 1)
699 {
700 arelent *r = sec->orelocation[idx + 1];
701
702 if (r->howto->type == R_SPARC_13
703 && r->address == ptr->address
704 && bfd_is_abs_section ((*r->sym_ptr_ptr)->section)
705 && (*r->sym_ptr_ptr)->value == 0)
706 {
707 idx++;
708 dst_rela.r_info
709 = ELF64_R_INFO (n, ELF64_R_TYPE_INFO (r->addend,
710 R_SPARC_OLO10));
711 }
712 else
713 dst_rela.r_info = ELF64_R_INFO (n, R_SPARC_LO10);
714 }
715 else
716 dst_rela.r_info = ELF64_R_INFO (n, ptr->howto->type);
717
718 dst_rela.r_addend = ptr->addend;
947216bf 719 bfd_elf64_swap_reloca_out (abfd, &dst_rela, (bfd_byte *) src_rela);
37fb6db1 720 ++src_rela;
f65054f7 721 }
252b5132 722}
587ff49e
RH
723\f
724/* Sparc64 ELF linker hash table. */
725
726struct sparc64_elf_app_reg
727{
728 unsigned char bind;
729 unsigned short shndx;
730 bfd *abfd;
731 char *name;
732};
733
734struct sparc64_elf_link_hash_table
735{
736 struct elf_link_hash_table root;
737
738 struct sparc64_elf_app_reg app_regs [4];
739};
740
741/* Get the Sparc64 ELF linker hash table from a link_info structure. */
742
743#define sparc64_elf_hash_table(p) \
744 ((struct sparc64_elf_link_hash_table *) ((p)->hash))
435b1e90 745
587ff49e
RH
746/* Create a Sparc64 ELF linker hash table. */
747
748static struct bfd_link_hash_table *
749sparc64_elf_bfd_link_hash_table_create (abfd)
750 bfd *abfd;
751{
752 struct sparc64_elf_link_hash_table *ret;
dc810e39 753 bfd_size_type amt = sizeof (struct sparc64_elf_link_hash_table);
587ff49e 754
e2d34d7d 755 ret = (struct sparc64_elf_link_hash_table *) bfd_zmalloc (amt);
587ff49e
RH
756 if (ret == (struct sparc64_elf_link_hash_table *) NULL)
757 return NULL;
758
759 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
760 _bfd_elf_link_hash_newfunc))
761 {
e2d34d7d 762 free (ret);
587ff49e
RH
763 return NULL;
764 }
765
766 return &ret->root.root;
767}
252b5132
RH
768\f
769/* Utility for performing the standard initial work of an instruction
770 relocation.
771 *PRELOCATION will contain the relocated item.
772 *PINSN will contain the instruction from the input stream.
773 If the result is `bfd_reloc_other' the caller can continue with
774 performing the relocation. Otherwise it must stop and return the
775 value to its caller. */
776
777static bfd_reloc_status_type
778init_insn_reloc (abfd,
779 reloc_entry,
780 symbol,
781 data,
782 input_section,
783 output_bfd,
784 prelocation,
785 pinsn)
786 bfd *abfd;
787 arelent *reloc_entry;
788 asymbol *symbol;
789 PTR data;
790 asection *input_section;
791 bfd *output_bfd;
792 bfd_vma *prelocation;
793 bfd_vma *pinsn;
794{
795 bfd_vma relocation;
796 reloc_howto_type *howto = reloc_entry->howto;
797
798 if (output_bfd != (bfd *) NULL
799 && (symbol->flags & BSF_SECTION_SYM) == 0
800 && (! howto->partial_inplace
801 || reloc_entry->addend == 0))
802 {
803 reloc_entry->address += input_section->output_offset;
804 return bfd_reloc_ok;
805 }
806
b34976b6 807 /* This works because partial_inplace is FALSE. */
252b5132
RH
808 if (output_bfd != NULL)
809 return bfd_reloc_continue;
810
811 if (reloc_entry->address > input_section->_cooked_size)
812 return bfd_reloc_outofrange;
813
814 relocation = (symbol->value
815 + symbol->section->output_section->vma
816 + symbol->section->output_offset);
817 relocation += reloc_entry->addend;
818 if (howto->pc_relative)
819 {
820 relocation -= (input_section->output_section->vma
821 + input_section->output_offset);
822 relocation -= reloc_entry->address;
823 }
824
825 *prelocation = relocation;
826 *pinsn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
827 return bfd_reloc_other;
828}
829
830/* For unsupported relocs. */
831
832static bfd_reloc_status_type
833sparc_elf_notsup_reloc (abfd,
834 reloc_entry,
835 symbol,
836 data,
837 input_section,
838 output_bfd,
839 error_message)
6c08d697
JJ
840 bfd *abfd ATTRIBUTE_UNUSED;
841 arelent *reloc_entry ATTRIBUTE_UNUSED;
842 asymbol *symbol ATTRIBUTE_UNUSED;
843 PTR data ATTRIBUTE_UNUSED;
844 asection *input_section ATTRIBUTE_UNUSED;
845 bfd *output_bfd ATTRIBUTE_UNUSED;
846 char **error_message ATTRIBUTE_UNUSED;
252b5132
RH
847{
848 return bfd_reloc_notsupported;
849}
850
851/* Handle the WDISP16 reloc. */
852
853static bfd_reloc_status_type
854sparc_elf_wdisp16_reloc (abfd, reloc_entry, symbol, data, input_section,
855 output_bfd, error_message)
856 bfd *abfd;
857 arelent *reloc_entry;
858 asymbol *symbol;
859 PTR data;
860 asection *input_section;
861 bfd *output_bfd;
6c08d697 862 char **error_message ATTRIBUTE_UNUSED;
252b5132
RH
863{
864 bfd_vma relocation;
865 bfd_vma insn;
866 bfd_reloc_status_type status;
867
868 status = init_insn_reloc (abfd, reloc_entry, symbol, data,
869 input_section, output_bfd, &relocation, &insn);
870 if (status != bfd_reloc_other)
871 return status;
872
dc810e39
AM
873 insn &= ~ (bfd_vma) 0x303fff;
874 insn |= (((relocation >> 2) & 0xc000) << 6) | ((relocation >> 2) & 0x3fff);
252b5132
RH
875 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
876
877 if ((bfd_signed_vma) relocation < - 0x40000
878 || (bfd_signed_vma) relocation > 0x3ffff)
879 return bfd_reloc_overflow;
880 else
881 return bfd_reloc_ok;
882}
883
884/* Handle the HIX22 reloc. */
885
886static bfd_reloc_status_type
887sparc_elf_hix22_reloc (abfd,
888 reloc_entry,
889 symbol,
890 data,
891 input_section,
892 output_bfd,
893 error_message)
894 bfd *abfd;
895 arelent *reloc_entry;
896 asymbol *symbol;
897 PTR data;
898 asection *input_section;
899 bfd *output_bfd;
6c08d697 900 char **error_message ATTRIBUTE_UNUSED;
252b5132
RH
901{
902 bfd_vma relocation;
903 bfd_vma insn;
904 bfd_reloc_status_type status;
905
906 status = init_insn_reloc (abfd, reloc_entry, symbol, data,
907 input_section, output_bfd, &relocation, &insn);
908 if (status != bfd_reloc_other)
909 return status;
910
911 relocation ^= MINUS_ONE;
dc810e39 912 insn = (insn &~ (bfd_vma) 0x3fffff) | ((relocation >> 10) & 0x3fffff);
252b5132
RH
913 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
914
915 if ((relocation & ~ (bfd_vma) 0xffffffff) != 0)
916 return bfd_reloc_overflow;
917 else
918 return bfd_reloc_ok;
919}
920
921/* Handle the LOX10 reloc. */
922
923static bfd_reloc_status_type
924sparc_elf_lox10_reloc (abfd,
925 reloc_entry,
926 symbol,
927 data,
928 input_section,
929 output_bfd,
930 error_message)
931 bfd *abfd;
932 arelent *reloc_entry;
933 asymbol *symbol;
934 PTR data;
935 asection *input_section;
936 bfd *output_bfd;
6c08d697 937 char **error_message ATTRIBUTE_UNUSED;
252b5132
RH
938{
939 bfd_vma relocation;
940 bfd_vma insn;
941 bfd_reloc_status_type status;
942
943 status = init_insn_reloc (abfd, reloc_entry, symbol, data,
944 input_section, output_bfd, &relocation, &insn);
945 if (status != bfd_reloc_other)
946 return status;
947
dc810e39 948 insn = (insn &~ (bfd_vma) 0x1fff) | 0x1c00 | (relocation & 0x3ff);
252b5132
RH
949 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
950
951 return bfd_reloc_ok;
952}
953\f
954/* PLT/GOT stuff */
955
956/* Both the headers and the entries are icache aligned. */
957#define PLT_ENTRY_SIZE 32
958#define PLT_HEADER_SIZE (4 * PLT_ENTRY_SIZE)
959#define LARGE_PLT_THRESHOLD 32768
960#define GOT_RESERVED_ENTRIES 1
961
962#define ELF_DYNAMIC_INTERPRETER "/usr/lib/sparcv9/ld.so.1"
963
252b5132
RH
964/* Fill in the .plt section. */
965
966static void
967sparc64_elf_build_plt (output_bfd, contents, nentries)
968 bfd *output_bfd;
969 unsigned char *contents;
970 int nentries;
971{
972 const unsigned int nop = 0x01000000;
973 int i, j;
435b1e90 974
252b5132
RH
975 /* The first four entries are reserved, and are initially undefined.
976 We fill them with `illtrap 0' to force ld.so to do something. */
977
978 for (i = 0; i < PLT_HEADER_SIZE/4; ++i)
dc810e39 979 bfd_put_32 (output_bfd, (bfd_vma) 0, contents+i*4);
252b5132
RH
980
981 /* The first 32768 entries are close enough to plt1 to get there via
982 a straight branch. */
983
984 for (i = 4; i < LARGE_PLT_THRESHOLD && i < nentries; ++i)
985 {
986 unsigned char *entry = contents + i * PLT_ENTRY_SIZE;
987 unsigned int sethi, ba;
988
989 /* sethi (. - plt0), %g1 */
990 sethi = 0x03000000 | (i * PLT_ENTRY_SIZE);
991
a11c78e7
RH
992 /* ba,a,pt %xcc, plt1 */
993 ba = 0x30680000 | (((contents+PLT_ENTRY_SIZE) - (entry+4)) / 4 & 0x7ffff);
252b5132 994
dc810e39
AM
995 bfd_put_32 (output_bfd, (bfd_vma) sethi, entry);
996 bfd_put_32 (output_bfd, (bfd_vma) ba, entry + 4);
997 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 8);
998 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 12);
999 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 16);
1000 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 20);
1001 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 24);
1002 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 28);
252b5132
RH
1003 }
1004
1005 /* Now the tricky bit. Entries 32768 and higher are grouped in blocks of
1006 160: 160 entries and 160 pointers. This is to separate code from data,
1007 which is much friendlier on the cache. */
435b1e90 1008
252b5132
RH
1009 for (; i < nentries; i += 160)
1010 {
1011 int block = (i + 160 <= nentries ? 160 : nentries - i);
1012 for (j = 0; j < block; ++j)
1013 {
1014 unsigned char *entry, *ptr;
1015 unsigned int ldx;
1016
1017 entry = contents + i*PLT_ENTRY_SIZE + j*4*6;
1018 ptr = contents + i*PLT_ENTRY_SIZE + block*4*6 + j*8;
1019
e62de969
JJ
1020 /* ldx [%o7 + ptr - (entry+4)], %g1 */
1021 ldx = 0xc25be000 | ((ptr - (entry+4)) & 0x1fff);
252b5132 1022
dc810e39
AM
1023 /* mov %o7,%g5
1024 call .+8
1025 nop
1026 ldx [%o7+P],%g1
1027 jmpl %o7+%g1,%g1
1028 mov %g5,%o7 */
1029 bfd_put_32 (output_bfd, (bfd_vma) 0x8a10000f, entry);
1030 bfd_put_32 (output_bfd, (bfd_vma) 0x40000002, entry + 4);
1031 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 8);
1032 bfd_put_32 (output_bfd, (bfd_vma) ldx, entry + 12);
1033 bfd_put_32 (output_bfd, (bfd_vma) 0x83c3c001, entry + 16);
1034 bfd_put_32 (output_bfd, (bfd_vma) 0x9e100005, entry + 20);
1035
1036 bfd_put_64 (output_bfd, (bfd_vma) (contents - (entry + 4)), ptr);
252b5132
RH
1037 }
1038 }
1039}
1040
1041/* Return the offset of a particular plt entry within the .plt section. */
1042
1043static bfd_vma
1044sparc64_elf_plt_entry_offset (index)
dc810e39 1045 bfd_vma index;
252b5132 1046{
dc810e39 1047 bfd_vma block, ofs;
252b5132
RH
1048
1049 if (index < LARGE_PLT_THRESHOLD)
1050 return index * PLT_ENTRY_SIZE;
1051
1052 /* See above for details. */
1053
1054 block = (index - LARGE_PLT_THRESHOLD) / 160;
1055 ofs = (index - LARGE_PLT_THRESHOLD) % 160;
1056
dc810e39 1057 return (LARGE_PLT_THRESHOLD + block * 160) * PLT_ENTRY_SIZE + ofs * 6 * 4;
252b5132
RH
1058}
1059
1060static bfd_vma
1061sparc64_elf_plt_ptr_offset (index, max)
dc810e39
AM
1062 bfd_vma index;
1063 bfd_vma max;
252b5132 1064{
dc810e39 1065 bfd_vma block, ofs, last;
252b5132
RH
1066
1067 BFD_ASSERT(index >= LARGE_PLT_THRESHOLD);
1068
1069 /* See above for details. */
1070
dc810e39 1071 block = (((index - LARGE_PLT_THRESHOLD) / 160) * 160) + LARGE_PLT_THRESHOLD;
a11c78e7
RH
1072 ofs = index - block;
1073 if (block + 160 > max)
1074 last = (max - LARGE_PLT_THRESHOLD) % 160;
1075 else
1076 last = 160;
252b5132 1077
a11c78e7 1078 return (block * PLT_ENTRY_SIZE
252b5132
RH
1079 + last * 6*4
1080 + ofs * 8);
1081}
252b5132
RH
1082\f
1083/* Look through the relocs for a section during the first phase, and
1084 allocate space in the global offset table or procedure linkage
1085 table. */
1086
b34976b6 1087static bfd_boolean
252b5132
RH
1088sparc64_elf_check_relocs (abfd, info, sec, relocs)
1089 bfd *abfd;
1090 struct bfd_link_info *info;
1091 asection *sec;
1092 const Elf_Internal_Rela *relocs;
1093{
1094 bfd *dynobj;
1095 Elf_Internal_Shdr *symtab_hdr;
1096 struct elf_link_hash_entry **sym_hashes;
1097 bfd_vma *local_got_offsets;
1098 const Elf_Internal_Rela *rel;
1099 const Elf_Internal_Rela *rel_end;
1100 asection *sgot;
1101 asection *srelgot;
1102 asection *sreloc;
1103
1049f94e 1104 if (info->relocatable || !(sec->flags & SEC_ALLOC))
b34976b6 1105 return TRUE;
252b5132
RH
1106
1107 dynobj = elf_hash_table (info)->dynobj;
1108 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1109 sym_hashes = elf_sym_hashes (abfd);
1110 local_got_offsets = elf_local_got_offsets (abfd);
1111
1112 sgot = NULL;
1113 srelgot = NULL;
1114 sreloc = NULL;
1115
d9bc7a44 1116 rel_end = relocs + NUM_SHDR_ENTRIES (& elf_section_data (sec)->rel_hdr);
252b5132
RH
1117 for (rel = relocs; rel < rel_end; rel++)
1118 {
1119 unsigned long r_symndx;
1120 struct elf_link_hash_entry *h;
1121
1122 r_symndx = ELF64_R_SYM (rel->r_info);
1123 if (r_symndx < symtab_hdr->sh_info)
1124 h = NULL;
1125 else
1126 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1127
f65054f7 1128 switch (ELF64_R_TYPE_ID (rel->r_info))
252b5132
RH
1129 {
1130 case R_SPARC_GOT10:
1131 case R_SPARC_GOT13:
1132 case R_SPARC_GOT22:
1133 /* This symbol requires a global offset table entry. */
1134
1135 if (dynobj == NULL)
1136 {
1137 /* Create the .got section. */
1138 elf_hash_table (info)->dynobj = dynobj = abfd;
1139 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 1140 return FALSE;
252b5132
RH
1141 }
1142
1143 if (sgot == NULL)
1144 {
1145 sgot = bfd_get_section_by_name (dynobj, ".got");
1146 BFD_ASSERT (sgot != NULL);
1147 }
1148
1149 if (srelgot == NULL && (h != NULL || info->shared))
1150 {
1151 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1152 if (srelgot == NULL)
1153 {
1154 srelgot = bfd_make_section (dynobj, ".rela.got");
1155 if (srelgot == NULL
1156 || ! bfd_set_section_flags (dynobj, srelgot,
1157 (SEC_ALLOC
1158 | SEC_LOAD
1159 | SEC_HAS_CONTENTS
1160 | SEC_IN_MEMORY
1161 | SEC_LINKER_CREATED
1162 | SEC_READONLY))
1163 || ! bfd_set_section_alignment (dynobj, srelgot, 3))
b34976b6 1164 return FALSE;
252b5132
RH
1165 }
1166 }
1167
1168 if (h != NULL)
1169 {
1170 if (h->got.offset != (bfd_vma) -1)
1171 {
1172 /* We have already allocated space in the .got. */
1173 break;
1174 }
1175 h->got.offset = sgot->_raw_size;
1176
1177 /* Make sure this symbol is output as a dynamic symbol. */
1178 if (h->dynindx == -1)
1179 {
1180 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
b34976b6 1181 return FALSE;
252b5132
RH
1182 }
1183
1184 srelgot->_raw_size += sizeof (Elf64_External_Rela);
1185 }
1186 else
1187 {
1188 /* This is a global offset table entry for a local
1189 symbol. */
1190 if (local_got_offsets == NULL)
1191 {
dc810e39 1192 bfd_size_type size;
252b5132
RH
1193 register unsigned int i;
1194
dc810e39
AM
1195 size = symtab_hdr->sh_info;
1196 size *= sizeof (bfd_vma);
252b5132
RH
1197 local_got_offsets = (bfd_vma *) bfd_alloc (abfd, size);
1198 if (local_got_offsets == NULL)
b34976b6 1199 return FALSE;
252b5132
RH
1200 elf_local_got_offsets (abfd) = local_got_offsets;
1201 for (i = 0; i < symtab_hdr->sh_info; i++)
1202 local_got_offsets[i] = (bfd_vma) -1;
1203 }
1204 if (local_got_offsets[r_symndx] != (bfd_vma) -1)
1205 {
1206 /* We have already allocated space in the .got. */
1207 break;
1208 }
1209 local_got_offsets[r_symndx] = sgot->_raw_size;
1210
1211 if (info->shared)
1212 {
1213 /* If we are generating a shared object, we need to
1214 output a R_SPARC_RELATIVE reloc so that the
1215 dynamic linker can adjust this GOT entry. */
1216 srelgot->_raw_size += sizeof (Elf64_External_Rela);
1217 }
1218 }
1219
1220 sgot->_raw_size += 8;
1221
1222#if 0
1223 /* Doesn't work for 64-bit -fPIC, since sethi/or builds
1224 unsigned numbers. If we permit ourselves to modify
1225 code so we get sethi/xor, this could work.
1226 Question: do we consider conditionally re-enabling
1227 this for -fpic, once we know about object code models? */
1228 /* If the .got section is more than 0x1000 bytes, we add
1229 0x1000 to the value of _GLOBAL_OFFSET_TABLE_, so that 13
1230 bit relocations have a greater chance of working. */
1231 if (sgot->_raw_size >= 0x1000
1232 && elf_hash_table (info)->hgot->root.u.def.value == 0)
1233 elf_hash_table (info)->hgot->root.u.def.value = 0x1000;
1234#endif
1235
1236 break;
1237
1238 case R_SPARC_WPLT30:
1239 case R_SPARC_PLT32:
1240 case R_SPARC_HIPLT22:
1241 case R_SPARC_LOPLT10:
1242 case R_SPARC_PCPLT32:
1243 case R_SPARC_PCPLT22:
1244 case R_SPARC_PCPLT10:
1245 case R_SPARC_PLT64:
1246 /* This symbol requires a procedure linkage table entry. We
1247 actually build the entry in adjust_dynamic_symbol,
1248 because this might be a case of linking PIC code without
1249 linking in any dynamic objects, in which case we don't
1250 need to generate a procedure linkage table after all. */
1251
1252 if (h == NULL)
1253 {
1254 /* It does not make sense to have a procedure linkage
1255 table entry for a local symbol. */
1256 bfd_set_error (bfd_error_bad_value);
b34976b6 1257 return FALSE;
252b5132
RH
1258 }
1259
1260 /* Make sure this symbol is output as a dynamic symbol. */
1261 if (h->dynindx == -1)
1262 {
1263 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
b34976b6 1264 return FALSE;
252b5132
RH
1265 }
1266
1267 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
bd5e6e7e
JJ
1268 if (ELF64_R_TYPE_ID (rel->r_info) != R_SPARC_PLT32
1269 && ELF64_R_TYPE_ID (rel->r_info) != R_SPARC_PLT64)
1270 break;
1271 /* Fall through. */
252b5132
RH
1272 case R_SPARC_PC10:
1273 case R_SPARC_PC22:
1274 case R_SPARC_PC_HH22:
1275 case R_SPARC_PC_HM10:
1276 case R_SPARC_PC_LM22:
1277 if (h != NULL
1278 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1279 break;
1280 /* Fall through. */
1281 case R_SPARC_DISP8:
1282 case R_SPARC_DISP16:
1283 case R_SPARC_DISP32:
1284 case R_SPARC_DISP64:
1285 case R_SPARC_WDISP30:
1286 case R_SPARC_WDISP22:
1287 case R_SPARC_WDISP19:
1288 case R_SPARC_WDISP16:
1289 if (h == NULL)
1290 break;
1291 /* Fall through. */
1292 case R_SPARC_8:
1293 case R_SPARC_16:
1294 case R_SPARC_32:
1295 case R_SPARC_HI22:
1296 case R_SPARC_22:
1297 case R_SPARC_13:
1298 case R_SPARC_LO10:
1299 case R_SPARC_UA32:
1300 case R_SPARC_10:
1301 case R_SPARC_11:
1302 case R_SPARC_64:
1303 case R_SPARC_OLO10:
1304 case R_SPARC_HH22:
1305 case R_SPARC_HM10:
1306 case R_SPARC_LM22:
1307 case R_SPARC_7:
1308 case R_SPARC_5:
1309 case R_SPARC_6:
1310 case R_SPARC_HIX22:
1311 case R_SPARC_LOX10:
1312 case R_SPARC_H44:
1313 case R_SPARC_M44:
1314 case R_SPARC_L44:
1315 case R_SPARC_UA64:
1316 case R_SPARC_UA16:
1317 /* When creating a shared object, we must copy these relocs
1318 into the output file. We create a reloc section in
435b1e90 1319 dynobj and make room for the reloc.
252b5132
RH
1320
1321 But don't do this for debugging sections -- this shows up
1322 with DWARF2 -- first because they are not loaded, and
1323 second because DWARF sez the debug info is not to be
1324 biased by the load address. */
1325 if (info->shared && (sec->flags & SEC_ALLOC))
1326 {
1327 if (sreloc == NULL)
1328 {
1329 const char *name;
1330
1331 name = (bfd_elf_string_from_elf_section
1332 (abfd,
1333 elf_elfheader (abfd)->e_shstrndx,
1334 elf_section_data (sec)->rel_hdr.sh_name));
1335 if (name == NULL)
b34976b6 1336 return FALSE;
252b5132
RH
1337
1338 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1339 && strcmp (bfd_get_section_name (abfd, sec),
1340 name + 5) == 0);
1341
1342 sreloc = bfd_get_section_by_name (dynobj, name);
1343 if (sreloc == NULL)
1344 {
1345 flagword flags;
1346
1347 sreloc = bfd_make_section (dynobj, name);
1348 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1349 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1350 if ((sec->flags & SEC_ALLOC) != 0)
1351 flags |= SEC_ALLOC | SEC_LOAD;
1352 if (sreloc == NULL
1353 || ! bfd_set_section_flags (dynobj, sreloc, flags)
1354 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
b34976b6 1355 return FALSE;
252b5132 1356 }
db6751f2
JJ
1357 if (sec->flags & SEC_READONLY)
1358 info->flags |= DF_TEXTREL;
252b5132
RH
1359 }
1360
1361 sreloc->_raw_size += sizeof (Elf64_External_Rela);
1362 }
1363 break;
1364
1365 case R_SPARC_REGISTER:
1366 /* Nothing to do. */
1367 break;
1368
1369 default:
435b1e90 1370 (*_bfd_error_handler) (_("%s: check_relocs: unhandled reloc type %d"),
8f615d07 1371 bfd_archive_filename (abfd),
f65054f7 1372 ELF64_R_TYPE_ID (rel->r_info));
b34976b6 1373 return FALSE;
252b5132
RH
1374 }
1375 }
1376
b34976b6 1377 return TRUE;
252b5132
RH
1378}
1379
587ff49e
RH
1380/* Hook called by the linker routine which adds symbols from an object
1381 file. We use it for STT_REGISTER symbols. */
1382
b34976b6 1383static bfd_boolean
587ff49e
RH
1384sparc64_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
1385 bfd *abfd;
1386 struct bfd_link_info *info;
1387 const Elf_Internal_Sym *sym;
1388 const char **namep;
6c08d697
JJ
1389 flagword *flagsp ATTRIBUTE_UNUSED;
1390 asection **secp ATTRIBUTE_UNUSED;
1391 bfd_vma *valp ATTRIBUTE_UNUSED;
587ff49e 1392{
8f615d07 1393 static const char *const stt_types[] = { "NOTYPE", "OBJECT", "FUNCTION" };
587ff49e
RH
1394
1395 if (ELF_ST_TYPE (sym->st_info) == STT_REGISTER)
1396 {
1397 int reg;
1398 struct sparc64_elf_app_reg *p;
435b1e90 1399
587ff49e
RH
1400 reg = (int)sym->st_value;
1401 switch (reg & ~1)
1402 {
1403 case 2: reg -= 2; break;
1404 case 6: reg -= 4; break;
1405 default:
1406 (*_bfd_error_handler)
1407 (_("%s: Only registers %%g[2367] can be declared using STT_REGISTER"),
8f615d07 1408 bfd_archive_filename (abfd));
b34976b6 1409 return FALSE;
587ff49e
RH
1410 }
1411
1412 if (info->hash->creator != abfd->xvec
1413 || (abfd->flags & DYNAMIC) != 0)
1414 {
1415 /* STT_REGISTER only works when linking an elf64_sparc object.
1416 If STT_REGISTER comes from a dynamic object, don't put it into
1417 the output bfd. The dynamic linker will recheck it. */
1418 *namep = NULL;
b34976b6 1419 return TRUE;
587ff49e
RH
1420 }
1421
1422 p = sparc64_elf_hash_table(info)->app_regs + reg;
1423
1424 if (p->name != NULL && strcmp (p->name, *namep))
1425 {
1426 (*_bfd_error_handler)
ca09e32b 1427 (_("Register %%g%d used incompatibly: %s in %s, previously %s in %s"),
8f615d07 1428 (int) sym->st_value,
ca09e32b 1429 **namep ? *namep : "#scratch", bfd_archive_filename (abfd),
8f615d07 1430 *p->name ? p->name : "#scratch", bfd_archive_filename (p->abfd));
b34976b6 1431 return FALSE;
587ff49e
RH
1432 }
1433
1434 if (p->name == NULL)
1435 {
1436 if (**namep)
1437 {
1438 struct elf_link_hash_entry *h;
435b1e90 1439
587ff49e 1440 h = (struct elf_link_hash_entry *)
b34976b6 1441 bfd_link_hash_lookup (info->hash, *namep, FALSE, FALSE, FALSE);
587ff49e
RH
1442
1443 if (h != NULL)
1444 {
1445 unsigned char type = h->type;
1446
8f615d07
AM
1447 if (type > STT_FUNC)
1448 type = 0;
1449 (*_bfd_error_handler)
ca09e32b
NC
1450 (_("Symbol `%s' has differing types: REGISTER in %s, previously %s in %s"),
1451 *namep, bfd_archive_filename (abfd),
8f615d07 1452 stt_types[type], bfd_archive_filename (p->abfd));
b34976b6 1453 return FALSE;
587ff49e
RH
1454 }
1455
1456 p->name = bfd_hash_allocate (&info->hash->table,
1457 strlen (*namep) + 1);
1458 if (!p->name)
b34976b6 1459 return FALSE;
587ff49e
RH
1460
1461 strcpy (p->name, *namep);
1462 }
1463 else
1464 p->name = "";
1465 p->bind = ELF_ST_BIND (sym->st_info);
1466 p->abfd = abfd;
1467 p->shndx = sym->st_shndx;
1468 }
1469 else
1470 {
1471 if (p->bind == STB_WEAK
1472 && ELF_ST_BIND (sym->st_info) == STB_GLOBAL)
1473 {
1474 p->bind = STB_GLOBAL;
1475 p->abfd = abfd;
1476 }
1477 }
1478 *namep = NULL;
b34976b6 1479 return TRUE;
587ff49e 1480 }
4ab82700 1481 else if (*namep && **namep
986b7daa 1482 && info->hash->creator == abfd->xvec)
587ff49e
RH
1483 {
1484 int i;
1485 struct sparc64_elf_app_reg *p;
1486
1487 p = sparc64_elf_hash_table(info)->app_regs;
1488 for (i = 0; i < 4; i++, p++)
1489 if (p->name != NULL && ! strcmp (p->name, *namep))
1490 {
1491 unsigned char type = ELF_ST_TYPE (sym->st_info);
1492
8f615d07
AM
1493 if (type > STT_FUNC)
1494 type = 0;
1495 (*_bfd_error_handler)
ca09e32b
NC
1496 (_("Symbol `%s' has differing types: %s in %s, previously REGISTER in %s"),
1497 *namep, stt_types[type], bfd_archive_filename (abfd),
1498 bfd_archive_filename (p->abfd));
b34976b6 1499 return FALSE;
587ff49e
RH
1500 }
1501 }
b34976b6 1502 return TRUE;
587ff49e
RH
1503}
1504
1505/* This function takes care of emiting STT_REGISTER symbols
1506 which we cannot easily keep in the symbol hash table. */
1507
b34976b6 1508static bfd_boolean
587ff49e 1509sparc64_elf_output_arch_syms (output_bfd, info, finfo, func)
6c08d697 1510 bfd *output_bfd ATTRIBUTE_UNUSED;
587ff49e
RH
1511 struct bfd_link_info *info;
1512 PTR finfo;
b34976b6
AM
1513 bfd_boolean (*func)
1514 PARAMS ((PTR, const char *, Elf_Internal_Sym *, asection *));
587ff49e
RH
1515{
1516 int reg;
1517 struct sparc64_elf_app_reg *app_regs =
1518 sparc64_elf_hash_table(info)->app_regs;
1519 Elf_Internal_Sym sym;
1520
1521 /* We arranged in size_dynamic_sections to put the STT_REGISTER entries
1522 at the end of the dynlocal list, so they came at the end of the local
1523 symbols in the symtab. Except that they aren't STB_LOCAL, so we need
1524 to back up symtab->sh_info. */
1525 if (elf_hash_table (info)->dynlocal)
1526 {
1fa0ddb3
RH
1527 bfd * dynobj = elf_hash_table (info)->dynobj;
1528 asection *dynsymsec = bfd_get_section_by_name (dynobj, ".dynsym");
587ff49e
RH
1529 struct elf_link_local_dynamic_entry *e;
1530
1531 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
1532 if (e->input_indx == -1)
1533 break;
1534 if (e)
1535 {
1536 elf_section_data (dynsymsec->output_section)->this_hdr.sh_info
1537 = e->dynindx;
1538 }
1539 }
1540
1541 if (info->strip == strip_all)
b34976b6 1542 return TRUE;
587ff49e
RH
1543
1544 for (reg = 0; reg < 4; reg++)
1545 if (app_regs [reg].name != NULL)
1546 {
1547 if (info->strip == strip_some
1548 && bfd_hash_lookup (info->keep_hash,
1549 app_regs [reg].name,
b34976b6 1550 FALSE, FALSE) == NULL)
587ff49e
RH
1551 continue;
1552
1553 sym.st_value = reg < 2 ? reg + 2 : reg + 4;
1554 sym.st_size = 0;
1555 sym.st_other = 0;
1556 sym.st_info = ELF_ST_INFO (app_regs [reg].bind, STT_REGISTER);
1557 sym.st_shndx = app_regs [reg].shndx;
1558 if (! (*func) (finfo, app_regs [reg].name, &sym,
1559 sym.st_shndx == SHN_ABS
1560 ? bfd_abs_section_ptr : bfd_und_section_ptr))
b34976b6 1561 return FALSE;
587ff49e
RH
1562 }
1563
b34976b6 1564 return TRUE;
587ff49e
RH
1565}
1566
1567static int
1568sparc64_elf_get_symbol_type (elf_sym, type)
1569 Elf_Internal_Sym * elf_sym;
1570 int type;
1571{
1572 if (ELF_ST_TYPE (elf_sym->st_info) == STT_REGISTER)
1573 return STT_REGISTER;
1574 else
1575 return type;
1576}
1577
1578/* A STB_GLOBAL,STT_REGISTER symbol should be BSF_GLOBAL
1579 even in SHN_UNDEF section. */
1580
1581static void
1582sparc64_elf_symbol_processing (abfd, asym)
6c08d697 1583 bfd *abfd ATTRIBUTE_UNUSED;
587ff49e
RH
1584 asymbol *asym;
1585{
1586 elf_symbol_type *elfsym;
1587
1588 elfsym = (elf_symbol_type *) asym;
1589 if (elfsym->internal_elf_sym.st_info
1590 == ELF_ST_INFO (STB_GLOBAL, STT_REGISTER))
1591 {
1592 asym->flags |= BSF_GLOBAL;
1593 }
1594}
1595
252b5132
RH
1596/* Adjust a symbol defined by a dynamic object and referenced by a
1597 regular object. The current definition is in some section of the
1598 dynamic object, but we're not including those sections. We have to
1599 change the definition to something the rest of the link can
1600 understand. */
1601
b34976b6 1602static bfd_boolean
252b5132
RH
1603sparc64_elf_adjust_dynamic_symbol (info, h)
1604 struct bfd_link_info *info;
1605 struct elf_link_hash_entry *h;
1606{
1607 bfd *dynobj;
1608 asection *s;
1609 unsigned int power_of_two;
1610
1611 dynobj = elf_hash_table (info)->dynobj;
1612
1613 /* Make sure we know what is going on here. */
1614 BFD_ASSERT (dynobj != NULL
1615 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
1616 || h->weakdef != NULL
1617 || ((h->elf_link_hash_flags
1618 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1619 && (h->elf_link_hash_flags
1620 & ELF_LINK_HASH_REF_REGULAR) != 0
1621 && (h->elf_link_hash_flags
1622 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
1623
1624 /* If this is a function, put it in the procedure linkage table. We
1625 will fill in the contents of the procedure linkage table later
1626 (although we could actually do it here). The STT_NOTYPE
1627 condition is a hack specifically for the Oracle libraries
1628 delivered for Solaris; for some inexplicable reason, they define
1629 some of their functions as STT_NOTYPE when they really should be
1630 STT_FUNC. */
1631 if (h->type == STT_FUNC
1632 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
1633 || (h->type == STT_NOTYPE
1634 && (h->root.type == bfd_link_hash_defined
1635 || h->root.type == bfd_link_hash_defweak)
1636 && (h->root.u.def.section->flags & SEC_CODE) != 0))
1637 {
1638 if (! elf_hash_table (info)->dynamic_sections_created)
1639 {
1640 /* This case can occur if we saw a WPLT30 reloc in an input
1641 file, but none of the input files were dynamic objects.
1642 In such a case, we don't actually need to build a
1643 procedure linkage table, and we can just do a WDISP30
1644 reloc instead. */
1645 BFD_ASSERT ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0);
b34976b6 1646 return TRUE;
252b5132
RH
1647 }
1648
1649 s = bfd_get_section_by_name (dynobj, ".plt");
1650 BFD_ASSERT (s != NULL);
1651
1652 /* The first four bit in .plt is reserved. */
1653 if (s->_raw_size == 0)
1654 s->_raw_size = PLT_HEADER_SIZE;
1655
7c319a27
AM
1656 /* To simplify matters later, just store the plt index here. */
1657 h->plt.offset = s->_raw_size / PLT_ENTRY_SIZE;
1658
252b5132
RH
1659 /* If this symbol is not defined in a regular file, and we are
1660 not generating a shared library, then set the symbol to this
1661 location in the .plt. This is required to make function
1662 pointers compare as equal between the normal executable and
1663 the shared library. */
1664 if (! info->shared
1665 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1666 {
1667 h->root.u.def.section = s;
7c319a27 1668 h->root.u.def.value = sparc64_elf_plt_entry_offset (h->plt.offset);
252b5132
RH
1669 }
1670
252b5132
RH
1671 /* Make room for this entry. */
1672 s->_raw_size += PLT_ENTRY_SIZE;
1673
1674 /* We also need to make an entry in the .rela.plt section. */
1675
1676 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1677 BFD_ASSERT (s != NULL);
1678
252b5132
RH
1679 s->_raw_size += sizeof (Elf64_External_Rela);
1680
1681 /* The procedure linkage table size is bounded by the magnitude
1682 of the offset we can describe in the entry. */
1683 if (s->_raw_size >= (bfd_vma)1 << 32)
1684 {
1685 bfd_set_error (bfd_error_bad_value);
b34976b6 1686 return FALSE;
252b5132
RH
1687 }
1688
b34976b6 1689 return TRUE;
252b5132
RH
1690 }
1691
1692 /* If this is a weak symbol, and there is a real definition, the
1693 processor independent code will have arranged for us to see the
1694 real definition first, and we can just use the same value. */
1695 if (h->weakdef != NULL)
1696 {
1697 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1698 || h->weakdef->root.type == bfd_link_hash_defweak);
1699 h->root.u.def.section = h->weakdef->root.u.def.section;
1700 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 1701 return TRUE;
252b5132
RH
1702 }
1703
1704 /* This is a reference to a symbol defined by a dynamic object which
1705 is not a function. */
1706
1707 /* If we are creating a shared library, we must presume that the
1708 only references to the symbol are via the global offset table.
1709 For such cases we need not do anything here; the relocations will
1710 be handled correctly by relocate_section. */
1711 if (info->shared)
b34976b6 1712 return TRUE;
252b5132
RH
1713
1714 /* We must allocate the symbol in our .dynbss section, which will
1715 become part of the .bss section of the executable. There will be
1716 an entry for this symbol in the .dynsym section. The dynamic
1717 object will contain position independent code, so all references
1718 from the dynamic object to this symbol will go through the global
1719 offset table. The dynamic linker will use the .dynsym entry to
1720 determine the address it must put in the global offset table, so
1721 both the dynamic object and the regular object will refer to the
1722 same memory location for the variable. */
1723
1724 s = bfd_get_section_by_name (dynobj, ".dynbss");
1725 BFD_ASSERT (s != NULL);
1726
1727 /* We must generate a R_SPARC_COPY reloc to tell the dynamic linker
1728 to copy the initial value out of the dynamic object and into the
1729 runtime process image. We need to remember the offset into the
1730 .rel.bss section we are going to use. */
1731 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1732 {
1733 asection *srel;
1734
1735 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1736 BFD_ASSERT (srel != NULL);
1737 srel->_raw_size += sizeof (Elf64_External_Rela);
1738 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1739 }
1740
1741 /* We need to figure out the alignment required for this symbol. I
1742 have no idea how ELF linkers handle this. 16-bytes is the size
1743 of the largest type that requires hard alignment -- long double. */
1744 power_of_two = bfd_log2 (h->size);
1745 if (power_of_two > 4)
1746 power_of_two = 4;
1747
1748 /* Apply the required alignment. */
1749 s->_raw_size = BFD_ALIGN (s->_raw_size,
1750 (bfd_size_type) (1 << power_of_two));
1751 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1752 {
1753 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 1754 return FALSE;
252b5132
RH
1755 }
1756
1757 /* Define the symbol as being at this point in the section. */
1758 h->root.u.def.section = s;
1759 h->root.u.def.value = s->_raw_size;
1760
1761 /* Increment the section size to make room for the symbol. */
1762 s->_raw_size += h->size;
1763
b34976b6 1764 return TRUE;
252b5132
RH
1765}
1766
1767/* Set the sizes of the dynamic sections. */
1768
b34976b6 1769static bfd_boolean
252b5132
RH
1770sparc64_elf_size_dynamic_sections (output_bfd, info)
1771 bfd *output_bfd;
1772 struct bfd_link_info *info;
1773{
1774 bfd *dynobj;
1775 asection *s;
b34976b6 1776 bfd_boolean relplt;
252b5132
RH
1777
1778 dynobj = elf_hash_table (info)->dynobj;
1779 BFD_ASSERT (dynobj != NULL);
1780
1781 if (elf_hash_table (info)->dynamic_sections_created)
1782 {
1783 /* Set the contents of the .interp section to the interpreter. */
36af4a4e 1784 if (info->executable)
252b5132
RH
1785 {
1786 s = bfd_get_section_by_name (dynobj, ".interp");
1787 BFD_ASSERT (s != NULL);
1788 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1789 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1790 }
1791 }
1792 else
1793 {
1794 /* We may have created entries in the .rela.got section.
1795 However, if we are not creating the dynamic sections, we will
1796 not actually use these entries. Reset the size of .rela.got,
1797 which will cause it to get stripped from the output file
1798 below. */
1799 s = bfd_get_section_by_name (dynobj, ".rela.got");
1800 if (s != NULL)
1801 s->_raw_size = 0;
1802 }
1803
1804 /* The check_relocs and adjust_dynamic_symbol entry points have
1805 determined the sizes of the various dynamic sections. Allocate
1806 memory for them. */
b34976b6 1807 relplt = FALSE;
252b5132
RH
1808 for (s = dynobj->sections; s != NULL; s = s->next)
1809 {
1810 const char *name;
b34976b6 1811 bfd_boolean strip;
252b5132
RH
1812
1813 if ((s->flags & SEC_LINKER_CREATED) == 0)
1814 continue;
1815
1816 /* It's OK to base decisions on the section name, because none
1817 of the dynobj section names depend upon the input files. */
1818 name = bfd_get_section_name (dynobj, s);
1819
b34976b6 1820 strip = FALSE;
252b5132
RH
1821
1822 if (strncmp (name, ".rela", 5) == 0)
1823 {
1824 if (s->_raw_size == 0)
1825 {
1826 /* If we don't need this section, strip it from the
1827 output file. This is to handle .rela.bss and
1828 .rel.plt. We must create it in
1829 create_dynamic_sections, because it must be created
1830 before the linker maps input sections to output
1831 sections. The linker does that before
1832 adjust_dynamic_symbol is called, and it is that
1833 function which decides whether anything needs to go
1834 into these sections. */
b34976b6 1835 strip = TRUE;
252b5132
RH
1836 }
1837 else
1838 {
252b5132 1839 if (strcmp (name, ".rela.plt") == 0)
b34976b6 1840 relplt = TRUE;
252b5132
RH
1841
1842 /* We use the reloc_count field as a counter if we need
1843 to copy relocs into the output file. */
1844 s->reloc_count = 0;
1845 }
1846 }
1847 else if (strcmp (name, ".plt") != 0
1848 && strncmp (name, ".got", 4) != 0)
1849 {
1850 /* It's not one of our sections, so don't allocate space. */
1851 continue;
1852 }
1853
1854 if (strip)
1855 {
7f8d5fc9 1856 _bfd_strip_section_from_output (info, s);
252b5132
RH
1857 continue;
1858 }
1859
1860 /* Allocate memory for the section contents. Zero the memory
1861 for the benefit of .rela.plt, which has 4 unused entries
1862 at the beginning, and we don't want garbage. */
1863 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
1864 if (s->contents == NULL && s->_raw_size != 0)
b34976b6 1865 return FALSE;
252b5132
RH
1866 }
1867
1868 if (elf_hash_table (info)->dynamic_sections_created)
1869 {
1870 /* Add some entries to the .dynamic section. We fill in the
1871 values later, in sparc64_elf_finish_dynamic_sections, but we
1872 must add the entries now so that we get the correct size for
1873 the .dynamic section. The DT_DEBUG entry is filled in by the
1874 dynamic linker and used by the debugger. */
dc810e39
AM
1875#define add_dynamic_entry(TAG, VAL) \
1876 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1877
587ff49e
RH
1878 int reg;
1879 struct sparc64_elf_app_reg * app_regs;
350836e3 1880 struct elf_strtab_hash *dynstr;
587ff49e
RH
1881 struct elf_link_hash_table *eht = elf_hash_table (info);
1882
36af4a4e 1883 if (info->executable)
252b5132 1884 {
dc810e39 1885 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1886 return FALSE;
252b5132
RH
1887 }
1888
1889 if (relplt)
1890 {
dc810e39
AM
1891 if (!add_dynamic_entry (DT_PLTGOT, 0)
1892 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1893 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1894 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1895 return FALSE;
252b5132
RH
1896 }
1897
dc810e39
AM
1898 if (!add_dynamic_entry (DT_RELA, 0)
1899 || !add_dynamic_entry (DT_RELASZ, 0)
1900 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 1901 return FALSE;
252b5132 1902
db6751f2 1903 if (info->flags & DF_TEXTREL)
252b5132 1904 {
dc810e39 1905 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1906 return FALSE;
252b5132 1907 }
587ff49e
RH
1908
1909 /* Add dynamic STT_REGISTER symbols and corresponding DT_SPARC_REGISTER
1910 entries if needed. */
1911 app_regs = sparc64_elf_hash_table (info)->app_regs;
1912 dynstr = eht->dynstr;
1913
1914 for (reg = 0; reg < 4; reg++)
1915 if (app_regs [reg].name != NULL)
1916 {
1917 struct elf_link_local_dynamic_entry *entry, *e;
435b1e90 1918
dc810e39 1919 if (!add_dynamic_entry (DT_SPARC_REGISTER, 0))
b34976b6 1920 return FALSE;
587ff49e
RH
1921
1922 entry = (struct elf_link_local_dynamic_entry *)
1923 bfd_hash_allocate (&info->hash->table, sizeof (*entry));
1924 if (entry == NULL)
b34976b6 1925 return FALSE;
587ff49e
RH
1926
1927 /* We cheat here a little bit: the symbol will not be local, so we
1928 put it at the end of the dynlocal linked list. We will fix it
1929 later on, as we have to fix other fields anyway. */
1930 entry->isym.st_value = reg < 2 ? reg + 2 : reg + 4;
1931 entry->isym.st_size = 0;
1932 if (*app_regs [reg].name != '\0')
1933 entry->isym.st_name
b34976b6 1934 = _bfd_elf_strtab_add (dynstr, app_regs[reg].name, FALSE);
587ff49e
RH
1935 else
1936 entry->isym.st_name = 0;
1937 entry->isym.st_other = 0;
1938 entry->isym.st_info = ELF_ST_INFO (app_regs [reg].bind,
1939 STT_REGISTER);
1940 entry->isym.st_shndx = app_regs [reg].shndx;
1941 entry->next = NULL;
1942 entry->input_bfd = output_bfd;
1943 entry->input_indx = -1;
1944
1945 if (eht->dynlocal == NULL)
1946 eht->dynlocal = entry;
1947 else
1948 {
1949 for (e = eht->dynlocal; e->next; e = e->next)
1950 ;
1951 e->next = entry;
1952 }
1953 eht->dynsymcount++;
1954 }
252b5132 1955 }
dc810e39 1956#undef add_dynamic_entry
252b5132 1957
b34976b6 1958 return TRUE;
252b5132 1959}
252b5132 1960\f
f0abc2a1
AM
1961static bfd_boolean
1962sparc64_elf_new_section_hook (abfd, sec)
1963 bfd *abfd;
1964 asection *sec;
1965{
1966 struct sparc64_elf_section_data *sdata;
1967 bfd_size_type amt = sizeof (*sdata);
1968
1969 sdata = (struct sparc64_elf_section_data *) bfd_zalloc (abfd, amt);
1970 if (sdata == NULL)
1971 return FALSE;
1972 sec->used_by_bfd = (PTR) sdata;
1973
1974 return _bfd_elf_new_section_hook (abfd, sec);
1975}
f7775d95 1976
b34976b6 1977static bfd_boolean
f7775d95
JJ
1978sparc64_elf_relax_section (abfd, section, link_info, again)
1979 bfd *abfd ATTRIBUTE_UNUSED;
1980 asection *section ATTRIBUTE_UNUSED;
1981 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
b34976b6 1982 bfd_boolean *again;
f7775d95 1983{
b34976b6 1984 *again = FALSE;
f0abc2a1 1985 sec_do_relax (section) = 1;
b34976b6 1986 return TRUE;
f7775d95
JJ
1987}
1988\f
e36f7d53
RH
1989/* This is the condition under which finish_dynamic_symbol will be called
1990 from elflink.h. If elflink.h doesn't call our finish_dynamic_symbol
1991 routine, we'll need to do something about initializing any .plt and
1992 .got entries in relocate_section. */
1993#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1994 ((DYN) \
1995 && ((INFO)->shared \
1996 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1997 && ((H)->dynindx != -1 \
1998 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1999
252b5132
RH
2000/* Relocate a SPARC64 ELF section. */
2001
b34976b6 2002static bfd_boolean
252b5132
RH
2003sparc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
2004 contents, relocs, local_syms, local_sections)
2005 bfd *output_bfd;
2006 struct bfd_link_info *info;
2007 bfd *input_bfd;
2008 asection *input_section;
2009 bfd_byte *contents;
2010 Elf_Internal_Rela *relocs;
2011 Elf_Internal_Sym *local_syms;
2012 asection **local_sections;
2013{
2014 bfd *dynobj;
2015 Elf_Internal_Shdr *symtab_hdr;
2016 struct elf_link_hash_entry **sym_hashes;
2017 bfd_vma *local_got_offsets;
2018 bfd_vma got_base;
2019 asection *sgot;
2020 asection *splt;
2021 asection *sreloc;
2022 Elf_Internal_Rela *rel;
2023 Elf_Internal_Rela *relend;
2024
1049f94e 2025 if (info->relocatable)
b34976b6 2026 return TRUE;
f0fe0e16 2027
252b5132
RH
2028 dynobj = elf_hash_table (info)->dynobj;
2029 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2030 sym_hashes = elf_sym_hashes (input_bfd);
2031 local_got_offsets = elf_local_got_offsets (input_bfd);
2032
2033 if (elf_hash_table(info)->hgot == NULL)
2034 got_base = 0;
2035 else
2036 got_base = elf_hash_table (info)->hgot->root.u.def.value;
2037
2038 sgot = splt = sreloc = NULL;
2039
2040 rel = relocs;
e90fdc1a 2041 relend = relocs + NUM_SHDR_ENTRIES (& elf_section_data (input_section)->rel_hdr);
252b5132
RH
2042 for (; rel < relend; rel++)
2043 {
2044 int r_type;
2045 reloc_howto_type *howto;
6c08d697 2046 unsigned long r_symndx;
252b5132
RH
2047 struct elf_link_hash_entry *h;
2048 Elf_Internal_Sym *sym;
2049 asection *sec;
e36f7d53 2050 bfd_vma relocation, off;
252b5132 2051 bfd_reloc_status_type r;
b34976b6
AM
2052 bfd_boolean is_plt = FALSE;
2053 bfd_boolean unresolved_reloc;
252b5132 2054
f65054f7 2055 r_type = ELF64_R_TYPE_ID (rel->r_info);
60dac299 2056 if (r_type < 0 || r_type >= (int) R_SPARC_max_std)
252b5132
RH
2057 {
2058 bfd_set_error (bfd_error_bad_value);
b34976b6 2059 return FALSE;
252b5132
RH
2060 }
2061 howto = sparc64_elf_howto_table + r_type;
2062
252b5132 2063 /* This is a final link. */
f0fe0e16 2064 r_symndx = ELF64_R_SYM (rel->r_info);
252b5132
RH
2065 h = NULL;
2066 sym = NULL;
2067 sec = NULL;
b34976b6 2068 unresolved_reloc = FALSE;
252b5132
RH
2069 if (r_symndx < symtab_hdr->sh_info)
2070 {
2071 sym = local_syms + r_symndx;
2072 sec = local_sections[r_symndx];
f8df10f4 2073 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
252b5132
RH
2074 }
2075 else
2076 {
2077 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2078 while (h->root.type == bfd_link_hash_indirect
2079 || h->root.type == bfd_link_hash_warning)
2080 h = (struct elf_link_hash_entry *) h->root.u.i.link;
e36f7d53
RH
2081
2082 relocation = 0;
252b5132
RH
2083 if (h->root.type == bfd_link_hash_defined
2084 || h->root.type == bfd_link_hash_defweak)
2085 {
252b5132 2086 sec = h->root.u.def.section;
e36f7d53
RH
2087 if (sec->output_section == NULL)
2088 /* Set a flag that will be cleared later if we find a
2089 relocation value for this symbol. output_section
2090 is typically NULL for symbols satisfied by a shared
2091 library. */
b34976b6 2092 unresolved_reloc = TRUE;
252b5132 2093 else
e36f7d53
RH
2094 relocation = (h->root.u.def.value
2095 + sec->output_section->vma
2096 + sec->output_offset);
252b5132
RH
2097 }
2098 else if (h->root.type == bfd_link_hash_undefweak)
e36f7d53 2099 ;
671bae9c 2100 else if (info->shared
3a27a730
L
2101 && !info->no_undefined
2102 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
e36f7d53 2103 ;
252b5132
RH
2104 else
2105 {
2106 if (! ((*info->callbacks->undefined_symbol)
2107 (info, h->root.root.string, input_bfd,
5cc7c785 2108 input_section, rel->r_offset,
3a27a730
L
2109 (!info->shared || info->no_undefined
2110 || ELF_ST_VISIBILITY (h->other)))))
b34976b6 2111 return FALSE;
be040dbb
JJ
2112
2113 /* To avoid generating warning messages about truncated
2114 relocations, set the relocation's address to be the same as
2115 the start of this section. */
be040dbb
JJ
2116 if (input_section->output_section != NULL)
2117 relocation = input_section->output_section->vma;
2118 else
2119 relocation = 0;
252b5132
RH
2120 }
2121 }
2122
e36f7d53 2123 do_dynreloc:
252b5132
RH
2124 /* When generating a shared object, these relocations are copied
2125 into the output file to be resolved at run time. */
ec338859 2126 if (info->shared && r_symndx != 0 && (input_section->flags & SEC_ALLOC))
252b5132
RH
2127 {
2128 switch (r_type)
2129 {
2130 case R_SPARC_PC10:
2131 case R_SPARC_PC22:
2132 case R_SPARC_PC_HH22:
2133 case R_SPARC_PC_HM10:
2134 case R_SPARC_PC_LM22:
2135 if (h != NULL
2136 && !strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_"))
2137 break;
2138 /* Fall through. */
2139 case R_SPARC_DISP8:
2140 case R_SPARC_DISP16:
2141 case R_SPARC_DISP32:
b88a866a 2142 case R_SPARC_DISP64:
252b5132
RH
2143 case R_SPARC_WDISP30:
2144 case R_SPARC_WDISP22:
2145 case R_SPARC_WDISP19:
2146 case R_SPARC_WDISP16:
252b5132
RH
2147 if (h == NULL)
2148 break;
2149 /* Fall through. */
2150 case R_SPARC_8:
2151 case R_SPARC_16:
2152 case R_SPARC_32:
2153 case R_SPARC_HI22:
2154 case R_SPARC_22:
2155 case R_SPARC_13:
2156 case R_SPARC_LO10:
2157 case R_SPARC_UA32:
2158 case R_SPARC_10:
2159 case R_SPARC_11:
2160 case R_SPARC_64:
2161 case R_SPARC_OLO10:
2162 case R_SPARC_HH22:
2163 case R_SPARC_HM10:
2164 case R_SPARC_LM22:
2165 case R_SPARC_7:
2166 case R_SPARC_5:
2167 case R_SPARC_6:
2168 case R_SPARC_HIX22:
2169 case R_SPARC_LOX10:
2170 case R_SPARC_H44:
2171 case R_SPARC_M44:
2172 case R_SPARC_L44:
2173 case R_SPARC_UA64:
2174 case R_SPARC_UA16:
2175 {
2176 Elf_Internal_Rela outrel;
947216bf 2177 bfd_byte *loc;
b34976b6 2178 bfd_boolean skip, relocate;
252b5132
RH
2179
2180 if (sreloc == NULL)
2181 {
2182 const char *name =
2183 (bfd_elf_string_from_elf_section
2184 (input_bfd,
2185 elf_elfheader (input_bfd)->e_shstrndx,
2186 elf_section_data (input_section)->rel_hdr.sh_name));
2187
2188 if (name == NULL)
b34976b6 2189 return FALSE;
252b5132
RH
2190
2191 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
2192 && strcmp (bfd_get_section_name(input_bfd,
2193 input_section),
2194 name + 5) == 0);
2195
2196 sreloc = bfd_get_section_by_name (dynobj, name);
2197 BFD_ASSERT (sreloc != NULL);
2198 }
2199
b34976b6
AM
2200 skip = FALSE;
2201 relocate = FALSE;
252b5132 2202
c629eae0
JJ
2203 outrel.r_offset =
2204 _bfd_elf_section_offset (output_bfd, info, input_section,
2205 rel->r_offset);
2206 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2207 skip = TRUE;
0bb2d96a 2208 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2209 skip = TRUE, relocate = TRUE;
252b5132
RH
2210
2211 outrel.r_offset += (input_section->output_section->vma
2212 + input_section->output_offset);
2213
2214 /* Optimize unaligned reloc usage now that we know where
2215 it finally resides. */
2216 switch (r_type)
2217 {
2218 case R_SPARC_16:
2219 if (outrel.r_offset & 1) r_type = R_SPARC_UA16;
2220 break;
2221 case R_SPARC_UA16:
2222 if (!(outrel.r_offset & 1)) r_type = R_SPARC_16;
2223 break;
2224 case R_SPARC_32:
2225 if (outrel.r_offset & 3) r_type = R_SPARC_UA32;
2226 break;
2227 case R_SPARC_UA32:
2228 if (!(outrel.r_offset & 3)) r_type = R_SPARC_32;
2229 break;
2230 case R_SPARC_64:
2231 if (outrel.r_offset & 7) r_type = R_SPARC_UA64;
2232 break;
2233 case R_SPARC_UA64:
2234 if (!(outrel.r_offset & 7)) r_type = R_SPARC_64;
2235 break;
b88a866a
JJ
2236 case R_SPARC_DISP8:
2237 case R_SPARC_DISP16:
2238 case R_SPARC_DISP32:
2239 case R_SPARC_DISP64:
2240 /* If the symbol is not dynamic, we should not keep
2241 a dynamic relocation. But an .rela.* slot has been
2242 allocated for it, output R_SPARC_NONE.
2243 FIXME: Add code tracking needed dynamic relocs as
2244 e.g. i386 has. */
2245 if (h->dynindx == -1)
b34976b6 2246 skip = TRUE, relocate = TRUE;
b88a866a 2247 break;
252b5132
RH
2248 }
2249
2250 if (skip)
2251 memset (&outrel, 0, sizeof outrel);
2252 /* h->dynindx may be -1 if the symbol was marked to
2253 become local. */
bd5e6e7e 2254 else if (h != NULL && ! is_plt
252b5132
RH
2255 && ((! info->symbolic && h->dynindx != -1)
2256 || (h->elf_link_hash_flags
2257 & ELF_LINK_HASH_DEF_REGULAR) == 0))
2258 {
2259 BFD_ASSERT (h->dynindx != -1);
f65054f7
RH
2260 outrel.r_info
2261 = ELF64_R_INFO (h->dynindx,
2262 ELF64_R_TYPE_INFO (
2263 ELF64_R_TYPE_DATA (rel->r_info),
2264 r_type));
252b5132
RH
2265 outrel.r_addend = rel->r_addend;
2266 }
2267 else
2268 {
dad62816 2269 outrel.r_addend = relocation + rel->r_addend;
252b5132 2270 if (r_type == R_SPARC_64)
dad62816 2271 outrel.r_info = ELF64_R_INFO (0, R_SPARC_RELATIVE);
252b5132
RH
2272 else
2273 {
2274 long indx;
2275
bd5e6e7e
JJ
2276 if (is_plt)
2277 sec = splt;
2278 else if (h == NULL)
252b5132
RH
2279 sec = local_sections[r_symndx];
2280 else
2281 {
2282 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2283 || (h->root.type
2284 == bfd_link_hash_defweak));
2285 sec = h->root.u.def.section;
2286 }
2287 if (sec != NULL && bfd_is_abs_section (sec))
2288 indx = 0;
2289 else if (sec == NULL || sec->owner == NULL)
2290 {
2291 bfd_set_error (bfd_error_bad_value);
b34976b6 2292 return FALSE;
252b5132
RH
2293 }
2294 else
2295 {
2296 asection *osec;
2297
2298 osec = sec->output_section;
2299 indx = elf_section_data (osec)->dynindx;
2300
dad62816
AM
2301 /* We are turning this relocation into one
2302 against a section symbol, so subtract out
2303 the output section's address but not the
2304 offset of the input section in the output
2305 section. */
2306 outrel.r_addend -= osec->vma;
2307
252b5132
RH
2308 /* FIXME: we really should be able to link non-pic
2309 shared libraries. */
2310 if (indx == 0)
2311 {
2312 BFD_FAIL ();
2313 (*_bfd_error_handler)
2314 (_("%s: probably compiled without -fPIC?"),
8f615d07 2315 bfd_archive_filename (input_bfd));
252b5132 2316 bfd_set_error (bfd_error_bad_value);
b34976b6 2317 return FALSE;
252b5132
RH
2318 }
2319 }
2320
f65054f7
RH
2321 outrel.r_info
2322 = ELF64_R_INFO (indx,
2323 ELF64_R_TYPE_INFO (
2324 ELF64_R_TYPE_DATA (rel->r_info),
2325 r_type));
252b5132
RH
2326 }
2327 }
2328
947216bf
AM
2329 loc = sreloc->contents;
2330 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2331 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132
RH
2332
2333 /* This reloc will be computed at runtime, so there's no
20278fa3 2334 need to do anything now. */
0bb2d96a
JJ
2335 if (! relocate)
2336 continue;
252b5132
RH
2337 }
2338 break;
2339 }
2340 }
2341
2342 switch (r_type)
2343 {
2344 case R_SPARC_GOT10:
2345 case R_SPARC_GOT13:
2346 case R_SPARC_GOT22:
2347 /* Relocation is to the entry for this symbol in the global
2348 offset table. */
2349 if (sgot == NULL)
2350 {
2351 sgot = bfd_get_section_by_name (dynobj, ".got");
2352 BFD_ASSERT (sgot != NULL);
2353 }
2354
2355 if (h != NULL)
2356 {
b34976b6 2357 bfd_boolean dyn;
e36f7d53
RH
2358
2359 off = h->got.offset;
252b5132 2360 BFD_ASSERT (off != (bfd_vma) -1);
e36f7d53 2361 dyn = elf_hash_table (info)->dynamic_sections_created;
252b5132 2362
e36f7d53 2363 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
252b5132 2364 || (info->shared
e36f7d53
RH
2365 && (info->symbolic
2366 || h->dynindx == -1
2367 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
2368 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
252b5132
RH
2369 {
2370 /* This is actually a static link, or it is a -Bsymbolic
2371 link and the symbol is defined locally, or the symbol
2372 was forced to be local because of a version file. We
2373 must initialize this entry in the global offset table.
2374 Since the offset must always be a multiple of 8, we
2375 use the least significant bit to record whether we
2376 have initialized it already.
2377
2378 When doing a dynamic link, we create a .rela.got
2379 relocation entry to initialize the value. This is
2380 done in the finish_dynamic_symbol routine. */
2381
2382 if ((off & 1) != 0)
2383 off &= ~1;
2384 else
2385 {
2386 bfd_put_64 (output_bfd, relocation,
2387 sgot->contents + off);
2388 h->got.offset |= 1;
2389 }
2390 }
e36f7d53 2391 else
b34976b6 2392 unresolved_reloc = FALSE;
252b5132
RH
2393 }
2394 else
2395 {
252b5132
RH
2396 BFD_ASSERT (local_got_offsets != NULL);
2397 off = local_got_offsets[r_symndx];
2398 BFD_ASSERT (off != (bfd_vma) -1);
2399
2400 /* The offset must always be a multiple of 8. We use
2401 the least significant bit to record whether we have
2402 already processed this entry. */
2403 if ((off & 1) != 0)
2404 off &= ~1;
2405 else
2406 {
252b5132
RH
2407 local_got_offsets[r_symndx] |= 1;
2408
2409 if (info->shared)
2410 {
947216bf 2411 asection *s;
252b5132 2412 Elf_Internal_Rela outrel;
947216bf 2413 bfd_byte *loc;
252b5132 2414
ea5fbc67
GK
2415 /* The Solaris 2.7 64-bit linker adds the contents
2416 of the location to the value of the reloc.
2417 Note this is different behaviour to the
2418 32-bit linker, which both adds the contents
2419 and ignores the addend. So clear the location. */
dc810e39
AM
2420 bfd_put_64 (output_bfd, (bfd_vma) 0,
2421 sgot->contents + off);
435b1e90 2422
252b5132
RH
2423 /* We need to generate a R_SPARC_RELATIVE reloc
2424 for the dynamic linker. */
947216bf
AM
2425 s = bfd_get_section_by_name(dynobj, ".rela.got");
2426 BFD_ASSERT (s != NULL);
252b5132
RH
2427
2428 outrel.r_offset = (sgot->output_section->vma
2429 + sgot->output_offset
2430 + off);
2431 outrel.r_info = ELF64_R_INFO (0, R_SPARC_RELATIVE);
2432 outrel.r_addend = relocation;
947216bf
AM
2433 loc = s->contents;
2434 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2435 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 2436 }
ea5fbc67
GK
2437 else
2438 bfd_put_64 (output_bfd, relocation, sgot->contents + off);
252b5132 2439 }
252b5132 2440 }
e36f7d53 2441 relocation = sgot->output_offset + off - got_base;
252b5132
RH
2442 goto do_default;
2443
2444 case R_SPARC_WPLT30:
2445 case R_SPARC_PLT32:
2446 case R_SPARC_HIPLT22:
2447 case R_SPARC_LOPLT10:
2448 case R_SPARC_PCPLT32:
2449 case R_SPARC_PCPLT22:
2450 case R_SPARC_PCPLT10:
2451 case R_SPARC_PLT64:
2452 /* Relocation is to the entry for this symbol in the
2453 procedure linkage table. */
2454 BFD_ASSERT (h != NULL);
2455
2456 if (h->plt.offset == (bfd_vma) -1)
2457 {
2458 /* We didn't make a PLT entry for this symbol. This
2459 happens when statically linking PIC code, or when
2460 using -Bsymbolic. */
2461 goto do_default;
2462 }
2463
2464 if (splt == NULL)
2465 {
2466 splt = bfd_get_section_by_name (dynobj, ".plt");
2467 BFD_ASSERT (splt != NULL);
2468 }
2469
2470 relocation = (splt->output_section->vma
2471 + splt->output_offset
2472 + sparc64_elf_plt_entry_offset (h->plt.offset));
b34976b6 2473 unresolved_reloc = FALSE;
f7775d95
JJ
2474 if (r_type == R_SPARC_WPLT30)
2475 goto do_wplt30;
bd5e6e7e
JJ
2476 if (r_type == R_SPARC_PLT32 || r_type == R_SPARC_PLT64)
2477 {
2478 r_type = r_type == R_SPARC_PLT32 ? R_SPARC_32 : R_SPARC_64;
b34976b6 2479 is_plt = TRUE;
bd5e6e7e
JJ
2480 goto do_dynreloc;
2481 }
252b5132
RH
2482 goto do_default;
2483
2484 case R_SPARC_OLO10:
2485 {
2486 bfd_vma x;
2487
2488 relocation += rel->r_addend;
2489 relocation = (relocation & 0x3ff) + ELF64_R_TYPE_DATA (rel->r_info);
2490
2491 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
dc810e39 2492 x = (x & ~(bfd_vma) 0x1fff) | (relocation & 0x1fff);
252b5132
RH
2493 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2494
2495 r = bfd_check_overflow (howto->complain_on_overflow,
2496 howto->bitsize, howto->rightshift,
2497 bfd_arch_bits_per_address (input_bfd),
2498 relocation);
2499 }
2500 break;
2501
2502 case R_SPARC_WDISP16:
2503 {
2504 bfd_vma x;
2505
2506 relocation += rel->r_addend;
2507 /* Adjust for pc-relative-ness. */
2508 relocation -= (input_section->output_section->vma
2509 + input_section->output_offset);
2510 relocation -= rel->r_offset;
2511
2512 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
dc810e39
AM
2513 x &= ~(bfd_vma) 0x303fff;
2514 x |= ((((relocation >> 2) & 0xc000) << 6)
2515 | ((relocation >> 2) & 0x3fff));
252b5132
RH
2516 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2517
2518 r = bfd_check_overflow (howto->complain_on_overflow,
2519 howto->bitsize, howto->rightshift,
2520 bfd_arch_bits_per_address (input_bfd),
2521 relocation);
2522 }
2523 break;
2524
2525 case R_SPARC_HIX22:
2526 {
2527 bfd_vma x;
2528
2529 relocation += rel->r_addend;
2530 relocation = relocation ^ MINUS_ONE;
2531
2532 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
dc810e39 2533 x = (x & ~(bfd_vma) 0x3fffff) | ((relocation >> 10) & 0x3fffff);
252b5132
RH
2534 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2535
2536 r = bfd_check_overflow (howto->complain_on_overflow,
2537 howto->bitsize, howto->rightshift,
2538 bfd_arch_bits_per_address (input_bfd),
2539 relocation);
2540 }
2541 break;
2542
2543 case R_SPARC_LOX10:
2544 {
2545 bfd_vma x;
2546
2547 relocation += rel->r_addend;
2548 relocation = (relocation & 0x3ff) | 0x1c00;
2549
2550 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
dc810e39 2551 x = (x & ~(bfd_vma) 0x1fff) | relocation;
252b5132
RH
2552 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2553
2554 r = bfd_reloc_ok;
2555 }
2556 break;
2557
f7775d95
JJ
2558 case R_SPARC_WDISP30:
2559 do_wplt30:
f0abc2a1 2560 if (sec_do_relax (input_section)
f7775d95
JJ
2561 && rel->r_offset + 4 < input_section->_raw_size)
2562 {
2563#define G0 0
2564#define O7 15
2565#define XCC (2 << 20)
2566#define COND(x) (((x)&0xf)<<25)
2567#define CONDA COND(0x8)
2568#define INSN_BPA (F2(0,1) | CONDA | BPRED | XCC)
2569#define INSN_BA (F2(0,2) | CONDA)
2570#define INSN_OR F3(2, 0x2, 0)
2571#define INSN_NOP F2(0,4)
2572
2573 bfd_vma x, y;
2574
2575 /* If the instruction is a call with either:
2576 restore
2577 arithmetic instruction with rd == %o7
2578 where rs1 != %o7 and rs2 if it is register != %o7
2579 then we can optimize if the call destination is near
2580 by changing the call into a branch always. */
2581 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
2582 y = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
2583 if ((x & OP(~0)) == OP(1) && (y & OP(~0)) == OP(2))
2584 {
2585 if (((y & OP3(~0)) == OP3(0x3d) /* restore */
2586 || ((y & OP3(0x28)) == 0 /* arithmetic */
2587 && (y & RD(~0)) == RD(O7)))
2588 && (y & RS1(~0)) != RS1(O7)
2589 && ((y & F3I(~0))
2590 || (y & RS2(~0)) != RS2(O7)))
2591 {
2592 bfd_vma reloc;
2593
2594 reloc = relocation + rel->r_addend - rel->r_offset;
2595 reloc -= (input_section->output_section->vma
2596 + input_section->output_offset);
2597 if (reloc & 3)
2598 goto do_default;
2599
2600 /* Ensure the branch fits into simm22. */
2601 if ((reloc & ~(bfd_vma)0x7fffff)
2602 && ((reloc | 0x7fffff) != MINUS_ONE))
2603 goto do_default;
2604 reloc >>= 2;
2605
2606 /* Check whether it fits into simm19. */
2607 if ((reloc & 0x3c0000) == 0
2608 || (reloc & 0x3c0000) == 0x3c0000)
2609 x = INSN_BPA | (reloc & 0x7ffff); /* ba,pt %xcc */
2610 else
2611 x = INSN_BA | (reloc & 0x3fffff); /* ba */
2612 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2613 r = bfd_reloc_ok;
2614 if (rel->r_offset >= 4
2615 && (y & (0xffffffff ^ RS1(~0)))
2616 == (INSN_OR | RD(O7) | RS2(G0)))
2617 {
2618 bfd_vma z;
2619 unsigned int reg;
2620
2621 z = bfd_get_32 (input_bfd,
2622 contents + rel->r_offset - 4);
2623 if ((z & (0xffffffff ^ RD(~0)))
2624 != (INSN_OR | RS1(O7) | RS2(G0)))
2625 break;
2626
2627 /* The sequence was
2628 or %o7, %g0, %rN
2629 call foo
2630 or %rN, %g0, %o7
2631
2632 If call foo was replaced with ba, replace
2633 or %rN, %g0, %o7 with nop. */
2634
2635 reg = (y & RS1(~0)) >> 14;
2636 if (reg != ((z & RD(~0)) >> 25)
2637 || reg == G0 || reg == O7)
2638 break;
2639
dc810e39 2640 bfd_put_32 (input_bfd, (bfd_vma) INSN_NOP,
f7775d95
JJ
2641 contents + rel->r_offset + 4);
2642 }
2643 break;
2644 }
2645 }
2646 }
ae9a127f 2647 /* Fall through. */
f7775d95 2648
252b5132
RH
2649 default:
2650 do_default:
2651 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
2652 contents, rel->r_offset,
2653 relocation, rel->r_addend);
2654 break;
2655 }
2656
239e1f3a
AM
2657 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2658 because such sections are not SEC_ALLOC and thus ld.so will
2659 not process them. */
e36f7d53 2660 if (unresolved_reloc
239e1f3a 2661 && !((input_section->flags & SEC_DEBUGGING) != 0
e36f7d53
RH
2662 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
2663 (*_bfd_error_handler)
2664 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
2665 bfd_archive_filename (input_bfd),
2666 bfd_get_section_name (input_bfd, input_section),
2667 (long) rel->r_offset,
2668 h->root.root.string);
2669
252b5132
RH
2670 switch (r)
2671 {
2672 case bfd_reloc_ok:
2673 break;
2674
2675 default:
2676 case bfd_reloc_outofrange:
2677 abort ();
2678
2679 case bfd_reloc_overflow:
2680 {
2681 const char *name;
2682
6361c4c9
AO
2683 /* The Solaris native linker silently disregards
2684 overflows. We don't, but this breaks stabs debugging
2685 info, whose relocations are only 32-bits wide. Ignore
99eb2ac8 2686 overflows for discarded entries. */
83615de0 2687 if ((r_type == R_SPARC_32 || r_type == R_SPARC_DISP32)
99eb2ac8
AM
2688 && _bfd_elf_section_offset (output_bfd, info, input_section,
2689 rel->r_offset) == (bfd_vma) -1)
6361c4c9
AO
2690 break;
2691
252b5132
RH
2692 if (h != NULL)
2693 {
2694 if (h->root.type == bfd_link_hash_undefweak
2695 && howto->pc_relative)
2696 {
2697 /* Assume this is a call protected by other code that
2698 detect the symbol is undefined. If this is the case,
435b1e90 2699 we can safely ignore the overflow. If not, the
252b5132
RH
2700 program is hosed anyway, and a little warning isn't
2701 going to help. */
2702 break;
2703 }
435b1e90 2704
252b5132
RH
2705 name = h->root.root.string;
2706 }
2707 else
2708 {
2709 name = (bfd_elf_string_from_elf_section
2710 (input_bfd,
2711 symtab_hdr->sh_link,
2712 sym->st_name));
2713 if (name == NULL)
b34976b6 2714 return FALSE;
252b5132
RH
2715 if (*name == '\0')
2716 name = bfd_section_name (input_bfd, sec);
2717 }
2718 if (! ((*info->callbacks->reloc_overflow)
2719 (info, name, howto->name, (bfd_vma) 0,
2720 input_bfd, input_section, rel->r_offset)))
b34976b6 2721 return FALSE;
252b5132
RH
2722 }
2723 break;
2724 }
2725 }
2726
b34976b6 2727 return TRUE;
252b5132
RH
2728}
2729
2730/* Finish up dynamic symbol handling. We set the contents of various
2731 dynamic sections here. */
2732
b34976b6 2733static bfd_boolean
252b5132
RH
2734sparc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
2735 bfd *output_bfd;
2736 struct bfd_link_info *info;
2737 struct elf_link_hash_entry *h;
2738 Elf_Internal_Sym *sym;
2739{
2740 bfd *dynobj;
2741
2742 dynobj = elf_hash_table (info)->dynobj;
2743
2744 if (h->plt.offset != (bfd_vma) -1)
2745 {
2746 asection *splt;
2747 asection *srela;
2748 Elf_Internal_Rela rela;
947216bf 2749 bfd_byte *loc;
252b5132 2750
435b1e90 2751 /* This symbol has an entry in the PLT. Set it up. */
252b5132
RH
2752
2753 BFD_ASSERT (h->dynindx != -1);
2754
2755 splt = bfd_get_section_by_name (dynobj, ".plt");
2756 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2757 BFD_ASSERT (splt != NULL && srela != NULL);
2758
2759 /* Fill in the entry in the .rela.plt section. */
2760
2761 if (h->plt.offset < LARGE_PLT_THRESHOLD)
2762 {
2763 rela.r_offset = sparc64_elf_plt_entry_offset (h->plt.offset);
2764 rela.r_addend = 0;
2765 }
2766 else
2767 {
dc810e39 2768 bfd_vma max = splt->_raw_size / PLT_ENTRY_SIZE;
252b5132 2769 rela.r_offset = sparc64_elf_plt_ptr_offset (h->plt.offset, max);
a11c78e7
RH
2770 rela.r_addend = -(sparc64_elf_plt_entry_offset (h->plt.offset) + 4)
2771 -(splt->output_section->vma + splt->output_offset);
252b5132
RH
2772 }
2773 rela.r_offset += (splt->output_section->vma + splt->output_offset);
2774 rela.r_info = ELF64_R_INFO (h->dynindx, R_SPARC_JMP_SLOT);
2775
be040dbb
JJ
2776 /* Adjust for the first 4 reserved elements in the .plt section
2777 when setting the offset in the .rela.plt section.
2778 Sun forgot to read their own ABI and copied elf32-sparc behaviour,
2779 thus .plt[4] has corresponding .rela.plt[0] and so on. */
2780
947216bf
AM
2781 loc = srela->contents;
2782 loc += (h->plt.offset - 4) * sizeof (Elf64_External_Rela);
2783 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
252b5132
RH
2784
2785 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2786 {
2787 /* Mark the symbol as undefined, rather than as defined in
2788 the .plt section. Leave the value alone. */
2789 sym->st_shndx = SHN_UNDEF;
8701c1bc
JJ
2790 /* If the symbol is weak, we do need to clear the value.
2791 Otherwise, the PLT entry would provide a definition for
2792 the symbol even if the symbol wasn't defined anywhere,
2793 and so the symbol would never be NULL. */
2794 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK)
2795 == 0)
2796 sym->st_value = 0;
252b5132
RH
2797 }
2798 }
2799
2800 if (h->got.offset != (bfd_vma) -1)
2801 {
2802 asection *sgot;
2803 asection *srela;
2804 Elf_Internal_Rela rela;
947216bf 2805 bfd_byte *loc;
252b5132
RH
2806
2807 /* This symbol has an entry in the GOT. Set it up. */
2808
2809 sgot = bfd_get_section_by_name (dynobj, ".got");
2810 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2811 BFD_ASSERT (sgot != NULL && srela != NULL);
2812
2813 rela.r_offset = (sgot->output_section->vma
2814 + sgot->output_offset
dc810e39 2815 + (h->got.offset &~ (bfd_vma) 1));
252b5132
RH
2816
2817 /* If this is a -Bsymbolic link, and the symbol is defined
2818 locally, we just want to emit a RELATIVE reloc. Likewise if
2819 the symbol was forced to be local because of a version file.
2820 The entry in the global offset table will already have been
2821 initialized in the relocate_section function. */
2822 if (info->shared
2823 && (info->symbolic || h->dynindx == -1)
2824 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
2825 {
2826 asection *sec = h->root.u.def.section;
2827 rela.r_info = ELF64_R_INFO (0, R_SPARC_RELATIVE);
2828 rela.r_addend = (h->root.u.def.value
2829 + sec->output_section->vma
2830 + sec->output_offset);
2831 }
2832 else
2833 {
252b5132
RH
2834 rela.r_info = ELF64_R_INFO (h->dynindx, R_SPARC_GLOB_DAT);
2835 rela.r_addend = 0;
2836 }
2837
6b3ac709
JJ
2838 bfd_put_64 (output_bfd, (bfd_vma) 0,
2839 sgot->contents + (h->got.offset &~ (bfd_vma) 1));
947216bf
AM
2840 loc = srela->contents;
2841 loc += srela->reloc_count++ * sizeof (Elf64_External_Rela);
2842 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
252b5132
RH
2843 }
2844
2845 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
2846 {
2847 asection *s;
2848 Elf_Internal_Rela rela;
947216bf 2849 bfd_byte *loc;
252b5132
RH
2850
2851 /* This symbols needs a copy reloc. Set it up. */
252b5132
RH
2852 BFD_ASSERT (h->dynindx != -1);
2853
2854 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2855 ".rela.bss");
2856 BFD_ASSERT (s != NULL);
2857
2858 rela.r_offset = (h->root.u.def.value
2859 + h->root.u.def.section->output_section->vma
2860 + h->root.u.def.section->output_offset);
2861 rela.r_info = ELF64_R_INFO (h->dynindx, R_SPARC_COPY);
2862 rela.r_addend = 0;
947216bf
AM
2863 loc = s->contents + s->reloc_count++ * sizeof (Elf64_External_Rela);
2864 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
252b5132
RH
2865 }
2866
2867 /* Mark some specially defined symbols as absolute. */
2868 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2869 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
2870 || strcmp (h->root.root.string, "_PROCEDURE_LINKAGE_TABLE_") == 0)
2871 sym->st_shndx = SHN_ABS;
2872
b34976b6 2873 return TRUE;
252b5132
RH
2874}
2875
2876/* Finish up the dynamic sections. */
2877
b34976b6 2878static bfd_boolean
252b5132
RH
2879sparc64_elf_finish_dynamic_sections (output_bfd, info)
2880 bfd *output_bfd;
2881 struct bfd_link_info *info;
2882{
2883 bfd *dynobj;
587ff49e 2884 int stt_regidx = -1;
252b5132
RH
2885 asection *sdyn;
2886 asection *sgot;
2887
2888 dynobj = elf_hash_table (info)->dynobj;
2889
2890 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2891
2892 if (elf_hash_table (info)->dynamic_sections_created)
2893 {
2894 asection *splt;
2895 Elf64_External_Dyn *dyncon, *dynconend;
2896
2897 splt = bfd_get_section_by_name (dynobj, ".plt");
2898 BFD_ASSERT (splt != NULL && sdyn != NULL);
2899
2900 dyncon = (Elf64_External_Dyn *) sdyn->contents;
2901 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2902 for (; dyncon < dynconend; dyncon++)
2903 {
2904 Elf_Internal_Dyn dyn;
2905 const char *name;
b34976b6 2906 bfd_boolean size;
252b5132
RH
2907
2908 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
2909
2910 switch (dyn.d_tag)
2911 {
b34976b6
AM
2912 case DT_PLTGOT: name = ".plt"; size = FALSE; break;
2913 case DT_PLTRELSZ: name = ".rela.plt"; size = TRUE; break;
2914 case DT_JMPREL: name = ".rela.plt"; size = FALSE; break;
587ff49e
RH
2915 case DT_SPARC_REGISTER:
2916 if (stt_regidx == -1)
2917 {
2918 stt_regidx =
2919 _bfd_elf_link_lookup_local_dynindx (info, output_bfd, -1);
2920 if (stt_regidx == -1)
b34976b6 2921 return FALSE;
587ff49e
RH
2922 }
2923 dyn.d_un.d_val = stt_regidx++;
2924 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2925 /* fallthrough */
b34976b6 2926 default: name = NULL; size = FALSE; break;
252b5132
RH
2927 }
2928
2929 if (name != NULL)
2930 {
2931 asection *s;
2932
2933 s = bfd_get_section_by_name (output_bfd, name);
2934 if (s == NULL)
2935 dyn.d_un.d_val = 0;
2936 else
2937 {
2938 if (! size)
2939 dyn.d_un.d_ptr = s->vma;
2940 else
2941 {
2942 if (s->_cooked_size != 0)
2943 dyn.d_un.d_val = s->_cooked_size;
2944 else
2945 dyn.d_un.d_val = s->_raw_size;
2946 }
2947 }
2948 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2949 }
2950 }
2951
2952 /* Initialize the contents of the .plt section. */
2953 if (splt->_raw_size > 0)
ae9a127f
NC
2954 sparc64_elf_build_plt (output_bfd, splt->contents,
2955 (int) (splt->_raw_size / PLT_ENTRY_SIZE));
252b5132
RH
2956
2957 elf_section_data (splt->output_section)->this_hdr.sh_entsize =
2958 PLT_ENTRY_SIZE;
2959 }
2960
2961 /* Set the first entry in the global offset table to the address of
2962 the dynamic section. */
2963 sgot = bfd_get_section_by_name (dynobj, ".got");
2964 BFD_ASSERT (sgot != NULL);
2965 if (sgot->_raw_size > 0)
2966 {
2967 if (sdyn == NULL)
2968 bfd_put_64 (output_bfd, (bfd_vma) 0, sgot->contents);
2969 else
2970 bfd_put_64 (output_bfd,
2971 sdyn->output_section->vma + sdyn->output_offset,
2972 sgot->contents);
2973 }
2974
2975 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 8;
2976
b34976b6 2977 return TRUE;
252b5132 2978}
db6751f2
JJ
2979
2980static enum elf_reloc_type_class
f51e552e
AM
2981sparc64_elf_reloc_type_class (rela)
2982 const Elf_Internal_Rela *rela;
db6751f2 2983{
f51e552e 2984 switch ((int) ELF64_R_TYPE (rela->r_info))
db6751f2
JJ
2985 {
2986 case R_SPARC_RELATIVE:
2987 return reloc_class_relative;
2988 case R_SPARC_JMP_SLOT:
2989 return reloc_class_plt;
2990 case R_SPARC_COPY:
2991 return reloc_class_copy;
2992 default:
2993 return reloc_class_normal;
2994 }
2995}
252b5132 2996\f
435b1e90 2997/* Functions for dealing with the e_flags field. */
252b5132
RH
2998
2999/* Merge backend specific data from an object file to the output
3000 object file when linking. */
3001
b34976b6 3002static bfd_boolean
252b5132
RH
3003sparc64_elf_merge_private_bfd_data (ibfd, obfd)
3004 bfd *ibfd;
3005 bfd *obfd;
3006{
b34976b6 3007 bfd_boolean error;
252b5132
RH
3008 flagword new_flags, old_flags;
3009 int new_mm, old_mm;
3010
3011 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3012 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 3013 return TRUE;
252b5132
RH
3014
3015 new_flags = elf_elfheader (ibfd)->e_flags;
3016 old_flags = elf_elfheader (obfd)->e_flags;
3017
3018 if (!elf_flags_init (obfd)) /* First call, no flags set */
3019 {
b34976b6 3020 elf_flags_init (obfd) = TRUE;
252b5132
RH
3021 elf_elfheader (obfd)->e_flags = new_flags;
3022 }
435b1e90 3023
252b5132
RH
3024 else if (new_flags == old_flags) /* Compatible flags are ok */
3025 ;
435b1e90 3026
252b5132
RH
3027 else /* Incompatible flags */
3028 {
b34976b6 3029 error = FALSE;
19f7b010
JJ
3030
3031#define EF_SPARC_ISA_EXTENSIONS \
3032 (EF_SPARC_SUN_US1 | EF_SPARC_SUN_US3 | EF_SPARC_HAL_R1)
3033
37fb6db1
ILT
3034 if ((ibfd->flags & DYNAMIC) != 0)
3035 {
3036 /* We don't want dynamic objects memory ordering and
3037 architecture to have any role. That's what dynamic linker
3038 should do. */
19f7b010 3039 new_flags &= ~(EF_SPARCV9_MM | EF_SPARC_ISA_EXTENSIONS);
6c08d697 3040 new_flags |= (old_flags
19f7b010 3041 & (EF_SPARCV9_MM | EF_SPARC_ISA_EXTENSIONS));
37fb6db1
ILT
3042 }
3043 else
3044 {
3045 /* Choose the highest architecture requirements. */
19f7b010
JJ
3046 old_flags |= (new_flags & EF_SPARC_ISA_EXTENSIONS);
3047 new_flags |= (old_flags & EF_SPARC_ISA_EXTENSIONS);
3048 if ((old_flags & (EF_SPARC_SUN_US1 | EF_SPARC_SUN_US3))
3049 && (old_flags & EF_SPARC_HAL_R1))
37fb6db1 3050 {
b34976b6 3051 error = TRUE;
37fb6db1
ILT
3052 (*_bfd_error_handler)
3053 (_("%s: linking UltraSPARC specific with HAL specific code"),
8f615d07 3054 bfd_archive_filename (ibfd));
37fb6db1
ILT
3055 }
3056 /* Choose the most restrictive memory ordering. */
3057 old_mm = (old_flags & EF_SPARCV9_MM);
3058 new_mm = (new_flags & EF_SPARCV9_MM);
3059 old_flags &= ~EF_SPARCV9_MM;
3060 new_flags &= ~EF_SPARCV9_MM;
3061 if (new_mm < old_mm)
3062 old_mm = new_mm;
3063 old_flags |= old_mm;
3064 new_flags |= old_mm;
3065 }
252b5132
RH
3066
3067 /* Warn about any other mismatches */
3068 if (new_flags != old_flags)
3069 {
b34976b6 3070 error = TRUE;
252b5132
RH
3071 (*_bfd_error_handler)
3072 (_("%s: uses different e_flags (0x%lx) fields than previous modules (0x%lx)"),
8f615d07 3073 bfd_archive_filename (ibfd), (long) new_flags, (long) old_flags);
252b5132
RH
3074 }
3075
3076 elf_elfheader (obfd)->e_flags = old_flags;
3077
3078 if (error)
3079 {
3080 bfd_set_error (bfd_error_bad_value);
b34976b6 3081 return FALSE;
252b5132
RH
3082 }
3083 }
b34976b6 3084 return TRUE;
252b5132 3085}
0594c12d
AM
3086
3087/* MARCO: Set the correct entry size for the .stab section. */
3088
b34976b6 3089static bfd_boolean
0594c12d
AM
3090sparc64_elf_fake_sections (abfd, hdr, sec)
3091 bfd *abfd ATTRIBUTE_UNUSED;
947216bf 3092 Elf_Internal_Shdr *hdr ATTRIBUTE_UNUSED;
0594c12d
AM
3093 asection *sec;
3094{
3095 const char *name;
3096
3097 name = bfd_get_section_name (abfd, sec);
3098
3099 if (strcmp (name, ".stab") == 0)
3100 {
3101 /* Even in the 64bit case the stab entries are only 12 bytes long. */
3102 elf_section_data (sec)->this_hdr.sh_entsize = 12;
3103 }
b34976b6
AM
3104
3105 return TRUE;
0594c12d 3106}
587ff49e
RH
3107\f
3108/* Print a STT_REGISTER symbol to file FILE. */
252b5132 3109
587ff49e
RH
3110static const char *
3111sparc64_elf_print_symbol_all (abfd, filep, symbol)
6c08d697 3112 bfd *abfd ATTRIBUTE_UNUSED;
587ff49e
RH
3113 PTR filep;
3114 asymbol *symbol;
3115{
3116 FILE *file = (FILE *) filep;
3117 int reg, type;
435b1e90 3118
587ff49e
RH
3119 if (ELF_ST_TYPE (((elf_symbol_type *) symbol)->internal_elf_sym.st_info)
3120 != STT_REGISTER)
3121 return NULL;
3122
3123 reg = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
3124 type = symbol->flags;
3125 fprintf (file, "REG_%c%c%11s%c%c R", "GOLI" [reg / 8], '0' + (reg & 7), "",
3126 ((type & BSF_LOCAL)
3127 ? (type & BSF_GLOBAL) ? '!' : 'l'
99c79b2e
AJ
3128 : (type & BSF_GLOBAL) ? 'g' : ' '),
3129 (type & BSF_WEAK) ? 'w' : ' ');
587ff49e
RH
3130 if (symbol->name == NULL || symbol->name [0] == '\0')
3131 return "#scratch";
3132 else
3133 return symbol->name;
3134}
252b5132
RH
3135\f
3136/* Set the right machine number for a SPARC64 ELF file. */
3137
b34976b6 3138static bfd_boolean
252b5132
RH
3139sparc64_elf_object_p (abfd)
3140 bfd *abfd;
3141{
3142 unsigned long mach = bfd_mach_sparc_v9;
19f7b010
JJ
3143
3144 if (elf_elfheader (abfd)->e_flags & EF_SPARC_SUN_US3)
3145 mach = bfd_mach_sparc_v9b;
3146 else if (elf_elfheader (abfd)->e_flags & EF_SPARC_SUN_US1)
252b5132
RH
3147 mach = bfd_mach_sparc_v9a;
3148 return bfd_default_set_arch_mach (abfd, bfd_arch_sparc, mach);
3149}
3150
f65054f7
RH
3151/* Relocations in the 64 bit SPARC ELF ABI are more complex than in
3152 standard ELF, because R_SPARC_OLO10 has secondary addend in
3153 ELF64_R_TYPE_DATA field. This structure is used to redirect the
3154 relocation handling routines. */
3155
3156const struct elf_size_info sparc64_elf_size_info =
3157{
3158 sizeof (Elf64_External_Ehdr),
3159 sizeof (Elf64_External_Phdr),
3160 sizeof (Elf64_External_Shdr),
3161 sizeof (Elf64_External_Rel),
3162 sizeof (Elf64_External_Rela),
3163 sizeof (Elf64_External_Sym),
3164 sizeof (Elf64_External_Dyn),
3165 sizeof (Elf_External_Note),
ae9a127f
NC
3166 4, /* hash-table entry size. */
3167 /* Internal relocations per external relocations.
f65054f7
RH
3168 For link purposes we use just 1 internal per
3169 1 external, for assembly and slurp symbol table
435b1e90 3170 we use 2. */
f65054f7 3171 1,
ae9a127f 3172 64, /* arch_size. */
45d6a902 3173 3, /* log_file_align. */
f65054f7
RH
3174 ELFCLASS64,
3175 EV_CURRENT,
3176 bfd_elf64_write_out_phdrs,
3177 bfd_elf64_write_shdrs_and_ehdr,
3178 sparc64_elf_write_relocs,
73ff0d56 3179 bfd_elf64_swap_symbol_in,
f65054f7
RH
3180 bfd_elf64_swap_symbol_out,
3181 sparc64_elf_slurp_reloc_table,
3182 bfd_elf64_slurp_symbol_table,
3183 bfd_elf64_swap_dyn_in,
3184 bfd_elf64_swap_dyn_out,
947216bf
AM
3185 bfd_elf64_swap_reloc_in,
3186 bfd_elf64_swap_reloc_out,
3187 bfd_elf64_swap_reloca_in,
3188 bfd_elf64_swap_reloca_out
f65054f7
RH
3189};
3190
252b5132
RH
3191#define TARGET_BIG_SYM bfd_elf64_sparc_vec
3192#define TARGET_BIG_NAME "elf64-sparc"
3193#define ELF_ARCH bfd_arch_sparc
3194#define ELF_MAXPAGESIZE 0x100000
3195
3196/* This is the official ABI value. */
3197#define ELF_MACHINE_CODE EM_SPARCV9
3198
3199/* This is the value that we used before the ABI was released. */
3200#define ELF_MACHINE_ALT1 EM_OLD_SPARCV9
3201
587ff49e
RH
3202#define bfd_elf64_bfd_link_hash_table_create \
3203 sparc64_elf_bfd_link_hash_table_create
435b1e90 3204
252b5132
RH
3205#define elf_info_to_howto \
3206 sparc64_elf_info_to_howto
f65054f7
RH
3207#define bfd_elf64_get_reloc_upper_bound \
3208 sparc64_elf_get_reloc_upper_bound
3209#define bfd_elf64_get_dynamic_reloc_upper_bound \
3210 sparc64_elf_get_dynamic_reloc_upper_bound
3e1d7f19
JJ
3211#define bfd_elf64_canonicalize_reloc \
3212 sparc64_elf_canonicalize_reloc
f65054f7
RH
3213#define bfd_elf64_canonicalize_dynamic_reloc \
3214 sparc64_elf_canonicalize_dynamic_reloc
252b5132
RH
3215#define bfd_elf64_bfd_reloc_type_lookup \
3216 sparc64_elf_reloc_type_lookup
f7775d95
JJ
3217#define bfd_elf64_bfd_relax_section \
3218 sparc64_elf_relax_section
f0abc2a1
AM
3219#define bfd_elf64_new_section_hook \
3220 sparc64_elf_new_section_hook
252b5132
RH
3221
3222#define elf_backend_create_dynamic_sections \
3223 _bfd_elf_create_dynamic_sections
587ff49e
RH
3224#define elf_backend_add_symbol_hook \
3225 sparc64_elf_add_symbol_hook
3226#define elf_backend_get_symbol_type \
3227 sparc64_elf_get_symbol_type
3228#define elf_backend_symbol_processing \
3229 sparc64_elf_symbol_processing
252b5132
RH
3230#define elf_backend_check_relocs \
3231 sparc64_elf_check_relocs
3232#define elf_backend_adjust_dynamic_symbol \
3233 sparc64_elf_adjust_dynamic_symbol
3234#define elf_backend_size_dynamic_sections \
3235 sparc64_elf_size_dynamic_sections
3236#define elf_backend_relocate_section \
3237 sparc64_elf_relocate_section
3238#define elf_backend_finish_dynamic_symbol \
3239 sparc64_elf_finish_dynamic_symbol
3240#define elf_backend_finish_dynamic_sections \
3241 sparc64_elf_finish_dynamic_sections
587ff49e
RH
3242#define elf_backend_print_symbol_all \
3243 sparc64_elf_print_symbol_all
3244#define elf_backend_output_arch_syms \
3245 sparc64_elf_output_arch_syms
252b5132
RH
3246#define bfd_elf64_bfd_merge_private_bfd_data \
3247 sparc64_elf_merge_private_bfd_data
0594c12d
AM
3248#define elf_backend_fake_sections \
3249 sparc64_elf_fake_sections
252b5132 3250
f65054f7
RH
3251#define elf_backend_size_info \
3252 sparc64_elf_size_info
252b5132
RH
3253#define elf_backend_object_p \
3254 sparc64_elf_object_p
db6751f2
JJ
3255#define elf_backend_reloc_type_class \
3256 sparc64_elf_reloc_type_class
252b5132
RH
3257
3258#define elf_backend_want_got_plt 0
3259#define elf_backend_plt_readonly 0
3260#define elf_backend_want_plt_sym 1
f0fe0e16 3261#define elf_backend_rela_normal 1
252b5132
RH
3262
3263/* Section 5.2.4 of the ABI specifies a 256-byte boundary for the table. */
3264#define elf_backend_plt_alignment 8
3265
3266#define elf_backend_got_header_size 8
3267#define elf_backend_plt_header_size PLT_HEADER_SIZE
3268
3269#include "elf64-target.h"
This page took 0.536547 seconds and 4 git commands to generate.