1 /* SPARC-specific support for 64-bit ELF
2 Copyright 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002,
3 2003 Free Software Foundation, Inc.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
25 #include "opcode/sparc.h"
27 /* This is defined if one wants to build upward compatible binaries
28 with the original sparc64-elf toolchain. The support is kept in for
29 now but is turned off by default. dje 970930 */
30 /*#define SPARC64_OLD_RELOCS*/
32 #include "elf/sparc.h"
34 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value. */
35 #define MINUS_ONE (~ (bfd_vma) 0)
37 static struct bfd_link_hash_table * sparc64_elf_bfd_link_hash_table_create
39 static bfd_reloc_status_type init_insn_reloc
40 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *,
41 bfd *, bfd_vma *, bfd_vma *));
42 static reloc_howto_type *sparc64_elf_reloc_type_lookup
43 PARAMS ((bfd *, bfd_reloc_code_real_type));
44 static void sparc64_elf_info_to_howto
45 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
47 static void sparc64_elf_build_plt
48 PARAMS ((bfd *, unsigned char *, int));
49 static bfd_vma sparc64_elf_plt_entry_offset
51 static bfd_vma sparc64_elf_plt_ptr_offset
52 PARAMS ((bfd_vma, bfd_vma));
54 static bfd_boolean sparc64_elf_check_relocs
55 PARAMS ((bfd *, struct bfd_link_info *, asection *sec,
56 const Elf_Internal_Rela *));
57 static bfd_boolean sparc64_elf_adjust_dynamic_symbol
58 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
59 static bfd_boolean sparc64_elf_size_dynamic_sections
60 PARAMS ((bfd *, struct bfd_link_info *));
61 static int sparc64_elf_get_symbol_type
62 PARAMS (( Elf_Internal_Sym *, int));
63 static bfd_boolean sparc64_elf_add_symbol_hook
64 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
65 const char **, flagword *, asection **, bfd_vma *));
66 static bfd_boolean sparc64_elf_output_arch_syms
67 PARAMS ((bfd *, struct bfd_link_info *, PTR,
68 bfd_boolean (*) (PTR, const char *, Elf_Internal_Sym *, asection *)));
69 static void sparc64_elf_symbol_processing
70 PARAMS ((bfd *, asymbol *));
72 static bfd_boolean sparc64_elf_merge_private_bfd_data
73 PARAMS ((bfd *, bfd *));
75 static bfd_boolean sparc64_elf_fake_sections
76 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
78 static const char *sparc64_elf_print_symbol_all
79 PARAMS ((bfd *, PTR, asymbol *));
80 static bfd_boolean sparc64_elf_new_section_hook
81 PARAMS ((bfd *, asection *));
82 static bfd_boolean sparc64_elf_relax_section
83 PARAMS ((bfd *, asection *, struct bfd_link_info *, bfd_boolean *));
84 static bfd_boolean sparc64_elf_relocate_section
85 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
86 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
87 static bfd_boolean sparc64_elf_finish_dynamic_symbol
88 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
90 static bfd_boolean sparc64_elf_finish_dynamic_sections
91 PARAMS ((bfd *, struct bfd_link_info *));
92 static bfd_boolean sparc64_elf_object_p PARAMS ((bfd *));
93 static long sparc64_elf_get_reloc_upper_bound PARAMS ((bfd *, asection *));
94 static long sparc64_elf_get_dynamic_reloc_upper_bound PARAMS ((bfd *));
95 static bfd_boolean sparc64_elf_slurp_one_reloc_table
96 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, asymbol **, bfd_boolean));
97 static bfd_boolean sparc64_elf_slurp_reloc_table
98 PARAMS ((bfd *, asection *, asymbol **, bfd_boolean));
99 static long sparc64_elf_canonicalize_reloc
100 PARAMS ((bfd *, asection *, arelent **, asymbol **));
101 static long sparc64_elf_canonicalize_dynamic_reloc
102 PARAMS ((bfd *, arelent **, asymbol **));
103 static void sparc64_elf_write_relocs PARAMS ((bfd *, asection *, PTR));
104 static enum elf_reloc_type_class sparc64_elf_reloc_type_class
105 PARAMS ((const Elf_Internal_Rela *));
107 /* The relocation "howto" table. */
109 static bfd_reloc_status_type sparc_elf_notsup_reloc
110 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
111 static bfd_reloc_status_type sparc_elf_wdisp16_reloc
112 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
113 static bfd_reloc_status_type sparc_elf_hix22_reloc
114 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
115 static bfd_reloc_status_type sparc_elf_lox10_reloc
116 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
118 static reloc_howto_type sparc64_elf_howto_table[] =
120 HOWTO(R_SPARC_NONE, 0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_NONE", FALSE,0,0x00000000,TRUE),
121 HOWTO(R_SPARC_8, 0,0, 8,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_8", FALSE,0,0x000000ff,TRUE),
122 HOWTO(R_SPARC_16, 0,1,16,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_16", FALSE,0,0x0000ffff,TRUE),
123 HOWTO(R_SPARC_32, 0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_32", FALSE,0,0xffffffff,TRUE),
124 HOWTO(R_SPARC_DISP8, 0,0, 8,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP8", FALSE,0,0x000000ff,TRUE),
125 HOWTO(R_SPARC_DISP16, 0,1,16,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP16", FALSE,0,0x0000ffff,TRUE),
126 HOWTO(R_SPARC_DISP32, 0,2,32,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP32", FALSE,0,0xffffffff,TRUE),
127 HOWTO(R_SPARC_WDISP30, 2,2,30,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WDISP30", FALSE,0,0x3fffffff,TRUE),
128 HOWTO(R_SPARC_WDISP22, 2,2,22,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WDISP22", FALSE,0,0x003fffff,TRUE),
129 HOWTO(R_SPARC_HI22, 10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_HI22", FALSE,0,0x003fffff,TRUE),
130 HOWTO(R_SPARC_22, 0,2,22,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_22", FALSE,0,0x003fffff,TRUE),
131 HOWTO(R_SPARC_13, 0,2,13,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_13", FALSE,0,0x00001fff,TRUE),
132 HOWTO(R_SPARC_LO10, 0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_LO10", FALSE,0,0x000003ff,TRUE),
133 HOWTO(R_SPARC_GOT10, 0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_GOT10", FALSE,0,0x000003ff,TRUE),
134 HOWTO(R_SPARC_GOT13, 0,2,13,FALSE,0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_GOT13", FALSE,0,0x00001fff,TRUE),
135 HOWTO(R_SPARC_GOT22, 10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_GOT22", FALSE,0,0x003fffff,TRUE),
136 HOWTO(R_SPARC_PC10, 0,2,10,TRUE, 0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_PC10", FALSE,0,0x000003ff,TRUE),
137 HOWTO(R_SPARC_PC22, 10,2,22,TRUE, 0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_PC22", FALSE,0,0x003fffff,TRUE),
138 HOWTO(R_SPARC_WPLT30, 2,2,30,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WPLT30", FALSE,0,0x3fffffff,TRUE),
139 HOWTO(R_SPARC_COPY, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_COPY", FALSE,0,0x00000000,TRUE),
140 HOWTO(R_SPARC_GLOB_DAT, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_GLOB_DAT",FALSE,0,0x00000000,TRUE),
141 HOWTO(R_SPARC_JMP_SLOT, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_JMP_SLOT",FALSE,0,0x00000000,TRUE),
142 HOWTO(R_SPARC_RELATIVE, 0,0,00,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_RELATIVE",FALSE,0,0x00000000,TRUE),
143 HOWTO(R_SPARC_UA32, 0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_UA32", FALSE,0,0xffffffff,TRUE),
144 #ifndef SPARC64_OLD_RELOCS
145 HOWTO(R_SPARC_PLT32, 0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_PLT32", FALSE,0,0xffffffff,TRUE),
146 /* These aren't implemented yet. */
147 HOWTO(R_SPARC_HIPLT22, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_HIPLT22", FALSE,0,0x00000000,TRUE),
148 HOWTO(R_SPARC_LOPLT10, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_LOPLT10", FALSE,0,0x00000000,TRUE),
149 HOWTO(R_SPARC_PCPLT32, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_PCPLT32", FALSE,0,0x00000000,TRUE),
150 HOWTO(R_SPARC_PCPLT22, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_PCPLT22", FALSE,0,0x00000000,TRUE),
151 HOWTO(R_SPARC_PCPLT10, 0,0,00,FALSE,0,complain_overflow_dont, sparc_elf_notsup_reloc, "R_SPARC_PCPLT10", FALSE,0,0x00000000,TRUE),
153 HOWTO(R_SPARC_10, 0,2,10,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_10", FALSE,0,0x000003ff,TRUE),
154 HOWTO(R_SPARC_11, 0,2,11,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_11", FALSE,0,0x000007ff,TRUE),
155 HOWTO(R_SPARC_64, 0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_64", FALSE,0,MINUS_ONE, TRUE),
156 HOWTO(R_SPARC_OLO10, 0,2,13,FALSE,0,complain_overflow_signed, sparc_elf_notsup_reloc, "R_SPARC_OLO10", FALSE,0,0x00001fff,TRUE),
157 HOWTO(R_SPARC_HH22, 42,2,22,FALSE,0,complain_overflow_unsigned,bfd_elf_generic_reloc, "R_SPARC_HH22", FALSE,0,0x003fffff,TRUE),
158 HOWTO(R_SPARC_HM10, 32,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_HM10", FALSE,0,0x000003ff,TRUE),
159 HOWTO(R_SPARC_LM22, 10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_LM22", FALSE,0,0x003fffff,TRUE),
160 HOWTO(R_SPARC_PC_HH22, 42,2,22,TRUE, 0,complain_overflow_unsigned,bfd_elf_generic_reloc, "R_SPARC_PC_HH22", FALSE,0,0x003fffff,TRUE),
161 HOWTO(R_SPARC_PC_HM10, 32,2,10,TRUE, 0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_PC_HM10", FALSE,0,0x000003ff,TRUE),
162 HOWTO(R_SPARC_PC_LM22, 10,2,22,TRUE, 0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_PC_LM22", FALSE,0,0x003fffff,TRUE),
163 HOWTO(R_SPARC_WDISP16, 2,2,16,TRUE, 0,complain_overflow_signed, sparc_elf_wdisp16_reloc,"R_SPARC_WDISP16", FALSE,0,0x00000000,TRUE),
164 HOWTO(R_SPARC_WDISP19, 2,2,19,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_WDISP19", FALSE,0,0x0007ffff,TRUE),
165 HOWTO(R_SPARC_UNUSED_42, 0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_UNUSED_42",FALSE,0,0x00000000,TRUE),
166 HOWTO(R_SPARC_7, 0,2, 7,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_7", FALSE,0,0x0000007f,TRUE),
167 HOWTO(R_SPARC_5, 0,2, 5,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_5", FALSE,0,0x0000001f,TRUE),
168 HOWTO(R_SPARC_6, 0,2, 6,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_6", FALSE,0,0x0000003f,TRUE),
169 HOWTO(R_SPARC_DISP64, 0,4,64,TRUE, 0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_DISP64", FALSE,0,MINUS_ONE, TRUE),
170 HOWTO(R_SPARC_PLT64, 0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_PLT64", FALSE,0,MINUS_ONE, TRUE),
171 HOWTO(R_SPARC_HIX22, 0,4, 0,FALSE,0,complain_overflow_bitfield,sparc_elf_hix22_reloc, "R_SPARC_HIX22", FALSE,0,MINUS_ONE, FALSE),
172 HOWTO(R_SPARC_LOX10, 0,4, 0,FALSE,0,complain_overflow_dont, sparc_elf_lox10_reloc, "R_SPARC_LOX10", FALSE,0,MINUS_ONE, FALSE),
173 HOWTO(R_SPARC_H44, 22,2,22,FALSE,0,complain_overflow_unsigned,bfd_elf_generic_reloc, "R_SPARC_H44", FALSE,0,0x003fffff,FALSE),
174 HOWTO(R_SPARC_M44, 12,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_M44", FALSE,0,0x000003ff,FALSE),
175 HOWTO(R_SPARC_L44, 0,2,13,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_L44", FALSE,0,0x00000fff,FALSE),
176 HOWTO(R_SPARC_REGISTER, 0,4, 0,FALSE,0,complain_overflow_bitfield,sparc_elf_notsup_reloc, "R_SPARC_REGISTER",FALSE,0,MINUS_ONE, FALSE),
177 HOWTO(R_SPARC_UA64, 0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_UA64", FALSE,0,MINUS_ONE, TRUE),
178 HOWTO(R_SPARC_UA16, 0,1,16,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc, "R_SPARC_UA16", FALSE,0,0x0000ffff,TRUE),
179 HOWTO(R_SPARC_TLS_GD_HI22,10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_HI22",FALSE,0,0x003fffff,TRUE),
180 HOWTO(R_SPARC_TLS_GD_LO10,0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_LO10",FALSE,0,0x000003ff,TRUE),
181 HOWTO(R_SPARC_TLS_GD_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_ADD",FALSE,0,0x00000000,TRUE),
182 HOWTO(R_SPARC_TLS_GD_CALL,2,2,30,TRUE,0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_TLS_GD_CALL",FALSE,0,0x3fffffff,TRUE),
183 HOWTO(R_SPARC_TLS_LDM_HI22,10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_HI22",FALSE,0,0x003fffff,TRUE),
184 HOWTO(R_SPARC_TLS_LDM_LO10,0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_LO10",FALSE,0,0x000003ff,TRUE),
185 HOWTO(R_SPARC_TLS_LDM_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_ADD",FALSE,0,0x00000000,TRUE),
186 HOWTO(R_SPARC_TLS_LDM_CALL,2,2,30,TRUE,0,complain_overflow_signed, bfd_elf_generic_reloc, "R_SPARC_TLS_LDM_CALL",FALSE,0,0x3fffffff,TRUE),
187 HOWTO(R_SPARC_TLS_LDO_HIX22,0,2,0,FALSE,0,complain_overflow_bitfield,sparc_elf_hix22_reloc,"R_SPARC_TLS_LDO_HIX22",FALSE,0,0x003fffff, FALSE),
188 HOWTO(R_SPARC_TLS_LDO_LOX10,0,2,0,FALSE,0,complain_overflow_dont, sparc_elf_lox10_reloc, "R_SPARC_TLS_LDO_LOX10",FALSE,0,0x000003ff, FALSE),
189 HOWTO(R_SPARC_TLS_LDO_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_LDO_ADD",FALSE,0,0x00000000,TRUE),
190 HOWTO(R_SPARC_TLS_IE_HI22,10,2,22,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_HI22",FALSE,0,0x003fffff,TRUE),
191 HOWTO(R_SPARC_TLS_IE_LO10,0,2,10,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_LO10",FALSE,0,0x000003ff,TRUE),
192 HOWTO(R_SPARC_TLS_IE_LD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_LD",FALSE,0,0x00000000,TRUE),
193 HOWTO(R_SPARC_TLS_IE_LDX,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_LDX",FALSE,0,0x00000000,TRUE),
194 HOWTO(R_SPARC_TLS_IE_ADD,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_IE_ADD",FALSE,0,0x00000000,TRUE),
195 HOWTO(R_SPARC_TLS_LE_HIX22,0,2,0,FALSE,0,complain_overflow_bitfield,sparc_elf_hix22_reloc, "R_SPARC_TLS_LE_HIX22",FALSE,0,0x003fffff, FALSE),
196 HOWTO(R_SPARC_TLS_LE_LOX10,0,2,0,FALSE,0,complain_overflow_dont, sparc_elf_lox10_reloc, "R_SPARC_TLS_LE_LOX10",FALSE,0,0x000003ff, FALSE),
197 HOWTO(R_SPARC_TLS_DTPMOD32,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_DTPMOD32",FALSE,0,0x00000000,TRUE),
198 HOWTO(R_SPARC_TLS_DTPMOD64,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_DTPMOD64",FALSE,0,0x00000000,TRUE),
199 HOWTO(R_SPARC_TLS_DTPOFF32,0,2,32,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc,"R_SPARC_TLS_DTPOFF32",FALSE,0,0xffffffff,TRUE),
200 HOWTO(R_SPARC_TLS_DTPOFF64,0,4,64,FALSE,0,complain_overflow_bitfield,bfd_elf_generic_reloc,"R_SPARC_TLS_DTPOFF64",FALSE,0,MINUS_ONE,TRUE),
201 HOWTO(R_SPARC_TLS_TPOFF32,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_TPOFF32",FALSE,0,0x00000000,TRUE),
202 HOWTO(R_SPARC_TLS_TPOFF64,0,0, 0,FALSE,0,complain_overflow_dont, bfd_elf_generic_reloc, "R_SPARC_TLS_TPOFF64",FALSE,0,0x00000000,TRUE)
205 struct elf_reloc_map {
206 bfd_reloc_code_real_type bfd_reloc_val;
207 unsigned char elf_reloc_val;
210 static const struct elf_reloc_map sparc_reloc_map[] =
212 { BFD_RELOC_NONE, R_SPARC_NONE, },
213 { BFD_RELOC_16, R_SPARC_16, },
214 { BFD_RELOC_16_PCREL, R_SPARC_DISP16 },
215 { BFD_RELOC_8, R_SPARC_8 },
216 { BFD_RELOC_8_PCREL, R_SPARC_DISP8 },
217 { BFD_RELOC_CTOR, R_SPARC_64 },
218 { BFD_RELOC_32, R_SPARC_32 },
219 { BFD_RELOC_32_PCREL, R_SPARC_DISP32 },
220 { BFD_RELOC_HI22, R_SPARC_HI22 },
221 { BFD_RELOC_LO10, R_SPARC_LO10, },
222 { BFD_RELOC_32_PCREL_S2, R_SPARC_WDISP30 },
223 { BFD_RELOC_64_PCREL, R_SPARC_DISP64 },
224 { BFD_RELOC_SPARC22, R_SPARC_22 },
225 { BFD_RELOC_SPARC13, R_SPARC_13 },
226 { BFD_RELOC_SPARC_GOT10, R_SPARC_GOT10 },
227 { BFD_RELOC_SPARC_GOT13, R_SPARC_GOT13 },
228 { BFD_RELOC_SPARC_GOT22, R_SPARC_GOT22 },
229 { BFD_RELOC_SPARC_PC10, R_SPARC_PC10 },
230 { BFD_RELOC_SPARC_PC22, R_SPARC_PC22 },
231 { BFD_RELOC_SPARC_WPLT30, R_SPARC_WPLT30 },
232 { BFD_RELOC_SPARC_COPY, R_SPARC_COPY },
233 { BFD_RELOC_SPARC_GLOB_DAT, R_SPARC_GLOB_DAT },
234 { BFD_RELOC_SPARC_JMP_SLOT, R_SPARC_JMP_SLOT },
235 { BFD_RELOC_SPARC_RELATIVE, R_SPARC_RELATIVE },
236 { BFD_RELOC_SPARC_WDISP22, R_SPARC_WDISP22 },
237 { BFD_RELOC_SPARC_UA16, R_SPARC_UA16 },
238 { BFD_RELOC_SPARC_UA32, R_SPARC_UA32 },
239 { BFD_RELOC_SPARC_UA64, R_SPARC_UA64 },
240 { BFD_RELOC_SPARC_10, R_SPARC_10 },
241 { BFD_RELOC_SPARC_11, R_SPARC_11 },
242 { BFD_RELOC_SPARC_64, R_SPARC_64 },
243 { BFD_RELOC_SPARC_OLO10, R_SPARC_OLO10 },
244 { BFD_RELOC_SPARC_HH22, R_SPARC_HH22 },
245 { BFD_RELOC_SPARC_HM10, R_SPARC_HM10 },
246 { BFD_RELOC_SPARC_LM22, R_SPARC_LM22 },
247 { BFD_RELOC_SPARC_PC_HH22, R_SPARC_PC_HH22 },
248 { BFD_RELOC_SPARC_PC_HM10, R_SPARC_PC_HM10 },
249 { BFD_RELOC_SPARC_PC_LM22, R_SPARC_PC_LM22 },
250 { BFD_RELOC_SPARC_WDISP16, R_SPARC_WDISP16 },
251 { BFD_RELOC_SPARC_WDISP19, R_SPARC_WDISP19 },
252 { BFD_RELOC_SPARC_7, R_SPARC_7 },
253 { BFD_RELOC_SPARC_5, R_SPARC_5 },
254 { BFD_RELOC_SPARC_6, R_SPARC_6 },
255 { BFD_RELOC_SPARC_DISP64, R_SPARC_DISP64 },
256 { BFD_RELOC_SPARC_TLS_GD_HI22, R_SPARC_TLS_GD_HI22 },
257 { BFD_RELOC_SPARC_TLS_GD_LO10, R_SPARC_TLS_GD_LO10 },
258 { BFD_RELOC_SPARC_TLS_GD_ADD, R_SPARC_TLS_GD_ADD },
259 { BFD_RELOC_SPARC_TLS_GD_CALL, R_SPARC_TLS_GD_CALL },
260 { BFD_RELOC_SPARC_TLS_LDM_HI22, R_SPARC_TLS_LDM_HI22 },
261 { BFD_RELOC_SPARC_TLS_LDM_LO10, R_SPARC_TLS_LDM_LO10 },
262 { BFD_RELOC_SPARC_TLS_LDM_ADD, R_SPARC_TLS_LDM_ADD },
263 { BFD_RELOC_SPARC_TLS_LDM_CALL, R_SPARC_TLS_LDM_CALL },
264 { BFD_RELOC_SPARC_TLS_LDO_HIX22, R_SPARC_TLS_LDO_HIX22 },
265 { BFD_RELOC_SPARC_TLS_LDO_LOX10, R_SPARC_TLS_LDO_LOX10 },
266 { BFD_RELOC_SPARC_TLS_LDO_ADD, R_SPARC_TLS_LDO_ADD },
267 { BFD_RELOC_SPARC_TLS_IE_HI22, R_SPARC_TLS_IE_HI22 },
268 { BFD_RELOC_SPARC_TLS_IE_LO10, R_SPARC_TLS_IE_LO10 },
269 { BFD_RELOC_SPARC_TLS_IE_LD, R_SPARC_TLS_IE_LD },
270 { BFD_RELOC_SPARC_TLS_IE_LDX, R_SPARC_TLS_IE_LDX },
271 { BFD_RELOC_SPARC_TLS_IE_ADD, R_SPARC_TLS_IE_ADD },
272 { BFD_RELOC_SPARC_TLS_LE_HIX22, R_SPARC_TLS_LE_HIX22 },
273 { BFD_RELOC_SPARC_TLS_LE_LOX10, R_SPARC_TLS_LE_LOX10 },
274 { BFD_RELOC_SPARC_TLS_DTPMOD32, R_SPARC_TLS_DTPMOD32 },
275 { BFD_RELOC_SPARC_TLS_DTPMOD64, R_SPARC_TLS_DTPMOD64 },
276 { BFD_RELOC_SPARC_TLS_DTPOFF32, R_SPARC_TLS_DTPOFF32 },
277 { BFD_RELOC_SPARC_TLS_DTPOFF64, R_SPARC_TLS_DTPOFF64 },
278 { BFD_RELOC_SPARC_TLS_TPOFF32, R_SPARC_TLS_TPOFF32 },
279 { BFD_RELOC_SPARC_TLS_TPOFF64, R_SPARC_TLS_TPOFF64 },
280 #ifndef SPARC64_OLD_RELOCS
281 { BFD_RELOC_SPARC_PLT32, R_SPARC_PLT32 },
283 { BFD_RELOC_SPARC_PLT64, R_SPARC_PLT64 },
284 { BFD_RELOC_SPARC_HIX22, R_SPARC_HIX22 },
285 { BFD_RELOC_SPARC_LOX10, R_SPARC_LOX10 },
286 { BFD_RELOC_SPARC_H44, R_SPARC_H44 },
287 { BFD_RELOC_SPARC_M44, R_SPARC_M44 },
288 { BFD_RELOC_SPARC_L44, R_SPARC_L44 },
289 { BFD_RELOC_SPARC_REGISTER, R_SPARC_REGISTER }
292 static reloc_howto_type *
293 sparc64_elf_reloc_type_lookup (abfd, code)
294 bfd *abfd ATTRIBUTE_UNUSED;
295 bfd_reloc_code_real_type code;
298 for (i = 0; i < sizeof (sparc_reloc_map) / sizeof (struct elf_reloc_map); i++)
300 if (sparc_reloc_map[i].bfd_reloc_val == code)
301 return &sparc64_elf_howto_table[(int) sparc_reloc_map[i].elf_reloc_val];
307 sparc64_elf_info_to_howto (abfd, cache_ptr, dst)
308 bfd *abfd ATTRIBUTE_UNUSED;
310 Elf_Internal_Rela *dst;
312 BFD_ASSERT (ELF64_R_TYPE_ID (dst->r_info) < (unsigned int) R_SPARC_max_std);
313 cache_ptr->howto = &sparc64_elf_howto_table[ELF64_R_TYPE_ID (dst->r_info)];
316 struct sparc64_elf_section_data
318 struct bfd_elf_section_data elf;
319 unsigned int do_relax, reloc_count;
322 #define sec_do_relax(sec) \
323 ((struct sparc64_elf_section_data *) elf_section_data (sec))->do_relax
324 #define canon_reloc_count(sec) \
325 ((struct sparc64_elf_section_data *) elf_section_data (sec))->reloc_count
327 /* Due to the way how we handle R_SPARC_OLO10, each entry in a SHT_RELA
328 section can represent up to two relocs, we must tell the user to allocate
332 sparc64_elf_get_reloc_upper_bound (abfd, sec)
333 bfd *abfd ATTRIBUTE_UNUSED;
336 return (sec->reloc_count * 2 + 1) * sizeof (arelent *);
340 sparc64_elf_get_dynamic_reloc_upper_bound (abfd)
343 return _bfd_elf_get_dynamic_reloc_upper_bound (abfd) * 2;
346 /* Read relocations for ASECT from REL_HDR. There are RELOC_COUNT of
347 them. We cannot use generic elf routines for this, because R_SPARC_OLO10
348 has secondary addend in ELF64_R_TYPE_DATA. We handle it as two relocations
349 for the same location, R_SPARC_LO10 and R_SPARC_13. */
352 sparc64_elf_slurp_one_reloc_table (abfd, asect, rel_hdr, symbols, dynamic)
355 Elf_Internal_Shdr *rel_hdr;
359 PTR allocated = NULL;
360 bfd_byte *native_relocs;
367 allocated = (PTR) bfd_malloc (rel_hdr->sh_size);
368 if (allocated == NULL)
371 if (bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0
372 || bfd_bread (allocated, rel_hdr->sh_size, abfd) != rel_hdr->sh_size)
375 native_relocs = (bfd_byte *) allocated;
377 relents = asect->relocation + canon_reloc_count (asect);
379 entsize = rel_hdr->sh_entsize;
380 BFD_ASSERT (entsize == sizeof (Elf64_External_Rela));
382 count = rel_hdr->sh_size / entsize;
384 for (i = 0, relent = relents; i < count;
385 i++, relent++, native_relocs += entsize)
387 Elf_Internal_Rela rela;
389 bfd_elf64_swap_reloca_in (abfd, native_relocs, &rela);
391 /* The address of an ELF reloc is section relative for an object
392 file, and absolute for an executable file or shared library.
393 The address of a normal BFD reloc is always section relative,
394 and the address of a dynamic reloc is absolute.. */
395 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || dynamic)
396 relent->address = rela.r_offset;
398 relent->address = rela.r_offset - asect->vma;
400 if (ELF64_R_SYM (rela.r_info) == 0)
401 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
406 ps = symbols + ELF64_R_SYM (rela.r_info) - 1;
409 /* Canonicalize ELF section symbols. FIXME: Why? */
410 if ((s->flags & BSF_SECTION_SYM) == 0)
411 relent->sym_ptr_ptr = ps;
413 relent->sym_ptr_ptr = s->section->symbol_ptr_ptr;
416 relent->addend = rela.r_addend;
418 BFD_ASSERT (ELF64_R_TYPE_ID (rela.r_info) < (unsigned int) R_SPARC_max_std);
419 if (ELF64_R_TYPE_ID (rela.r_info) == R_SPARC_OLO10)
421 relent->howto = &sparc64_elf_howto_table[R_SPARC_LO10];
422 relent[1].address = relent->address;
424 relent->sym_ptr_ptr = bfd_abs_section_ptr->symbol_ptr_ptr;
425 relent->addend = ELF64_R_TYPE_DATA (rela.r_info);
426 relent->howto = &sparc64_elf_howto_table[R_SPARC_13];
429 relent->howto = &sparc64_elf_howto_table[ELF64_R_TYPE_ID (rela.r_info)];
432 canon_reloc_count (asect) += relent - relents;
434 if (allocated != NULL)
440 if (allocated != NULL)
445 /* Read in and swap the external relocs. */
448 sparc64_elf_slurp_reloc_table (abfd, asect, symbols, dynamic)
454 struct bfd_elf_section_data * const d = elf_section_data (asect);
455 Elf_Internal_Shdr *rel_hdr;
456 Elf_Internal_Shdr *rel_hdr2;
459 if (asect->relocation != NULL)
464 if ((asect->flags & SEC_RELOC) == 0
465 || asect->reloc_count == 0)
468 rel_hdr = &d->rel_hdr;
469 rel_hdr2 = d->rel_hdr2;
471 BFD_ASSERT (asect->rel_filepos == rel_hdr->sh_offset
472 || (rel_hdr2 && asect->rel_filepos == rel_hdr2->sh_offset));
476 /* Note that ASECT->RELOC_COUNT tends not to be accurate in this
477 case because relocations against this section may use the
478 dynamic symbol table, and in that case bfd_section_from_shdr
479 in elf.c does not update the RELOC_COUNT. */
480 if (asect->_raw_size == 0)
483 rel_hdr = &d->this_hdr;
484 asect->reloc_count = NUM_SHDR_ENTRIES (rel_hdr);
488 amt = asect->reloc_count;
489 amt *= 2 * sizeof (arelent);
490 asect->relocation = (arelent *) bfd_alloc (abfd, amt);
491 if (asect->relocation == NULL)
494 /* The sparc64_elf_slurp_one_reloc_table routine increments
495 canon_reloc_count. */
496 canon_reloc_count (asect) = 0;
498 if (!sparc64_elf_slurp_one_reloc_table (abfd, asect, rel_hdr, symbols,
503 && !sparc64_elf_slurp_one_reloc_table (abfd, asect, rel_hdr2, symbols,
510 /* Canonicalize the relocs. */
513 sparc64_elf_canonicalize_reloc (abfd, section, relptr, symbols)
521 struct elf_backend_data *bed = get_elf_backend_data (abfd);
523 if (! bed->s->slurp_reloc_table (abfd, section, symbols, FALSE))
526 tblptr = section->relocation;
527 for (i = 0; i < canon_reloc_count (section); i++)
528 *relptr++ = tblptr++;
532 return canon_reloc_count (section);
536 /* Canonicalize the dynamic relocation entries. Note that we return
537 the dynamic relocations as a single block, although they are
538 actually associated with particular sections; the interface, which
539 was designed for SunOS style shared libraries, expects that there
540 is only one set of dynamic relocs. Any section that was actually
541 installed in the BFD, and has type SHT_REL or SHT_RELA, and uses
542 the dynamic symbol table, is considered to be a dynamic reloc
546 sparc64_elf_canonicalize_dynamic_reloc (abfd, storage, syms)
554 if (elf_dynsymtab (abfd) == 0)
556 bfd_set_error (bfd_error_invalid_operation);
561 for (s = abfd->sections; s != NULL; s = s->next)
563 if (elf_section_data (s)->this_hdr.sh_link == elf_dynsymtab (abfd)
564 && (elf_section_data (s)->this_hdr.sh_type == SHT_RELA))
569 if (! sparc64_elf_slurp_reloc_table (abfd, s, syms, TRUE))
571 count = canon_reloc_count (s);
573 for (i = 0; i < count; i++)
584 /* Write out the relocs. */
587 sparc64_elf_write_relocs (abfd, sec, data)
592 bfd_boolean *failedp = (bfd_boolean *) data;
593 Elf_Internal_Shdr *rela_hdr;
594 Elf64_External_Rela *outbound_relocas, *src_rela;
595 unsigned int idx, count;
596 asymbol *last_sym = 0;
597 int last_sym_idx = 0;
599 /* If we have already failed, don't do anything. */
603 if ((sec->flags & SEC_RELOC) == 0)
606 /* The linker backend writes the relocs out itself, and sets the
607 reloc_count field to zero to inhibit writing them here. Also,
608 sometimes the SEC_RELOC flag gets set even when there aren't any
610 if (sec->reloc_count == 0)
613 /* We can combine two relocs that refer to the same address
614 into R_SPARC_OLO10 if first one is R_SPARC_LO10 and the
615 latter is R_SPARC_13 with no associated symbol. */
617 for (idx = 0; idx < sec->reloc_count; idx++)
623 addr = sec->orelocation[idx]->address;
624 if (sec->orelocation[idx]->howto->type == R_SPARC_LO10
625 && idx < sec->reloc_count - 1)
627 arelent *r = sec->orelocation[idx + 1];
629 if (r->howto->type == R_SPARC_13
630 && r->address == addr
631 && bfd_is_abs_section ((*r->sym_ptr_ptr)->section)
632 && (*r->sym_ptr_ptr)->value == 0)
637 rela_hdr = &elf_section_data (sec)->rel_hdr;
639 rela_hdr->sh_size = rela_hdr->sh_entsize * count;
640 rela_hdr->contents = (PTR) bfd_alloc (abfd, rela_hdr->sh_size);
641 if (rela_hdr->contents == NULL)
647 /* Figure out whether the relocations are RELA or REL relocations. */
648 if (rela_hdr->sh_type != SHT_RELA)
651 /* orelocation has the data, reloc_count has the count... */
652 outbound_relocas = (Elf64_External_Rela *) rela_hdr->contents;
653 src_rela = outbound_relocas;
655 for (idx = 0; idx < sec->reloc_count; idx++)
657 Elf_Internal_Rela dst_rela;
662 ptr = sec->orelocation[idx];
664 /* The address of an ELF reloc is section relative for an object
665 file, and absolute for an executable file or shared library.
666 The address of a BFD reloc is always section relative. */
667 if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0)
668 dst_rela.r_offset = ptr->address;
670 dst_rela.r_offset = ptr->address + sec->vma;
672 sym = *ptr->sym_ptr_ptr;
675 else if (bfd_is_abs_section (sym->section) && sym->value == 0)
680 n = _bfd_elf_symbol_from_bfd_symbol (abfd, &sym);
689 if ((*ptr->sym_ptr_ptr)->the_bfd != NULL
690 && (*ptr->sym_ptr_ptr)->the_bfd->xvec != abfd->xvec
691 && ! _bfd_elf_validate_reloc (abfd, ptr))
697 if (ptr->howto->type == R_SPARC_LO10
698 && idx < sec->reloc_count - 1)
700 arelent *r = sec->orelocation[idx + 1];
702 if (r->howto->type == R_SPARC_13
703 && r->address == ptr->address
704 && bfd_is_abs_section ((*r->sym_ptr_ptr)->section)
705 && (*r->sym_ptr_ptr)->value == 0)
709 = ELF64_R_INFO (n, ELF64_R_TYPE_INFO (r->addend,
713 dst_rela.r_info = ELF64_R_INFO (n, R_SPARC_LO10);
716 dst_rela.r_info = ELF64_R_INFO (n, ptr->howto->type);
718 dst_rela.r_addend = ptr->addend;
719 bfd_elf64_swap_reloca_out (abfd, &dst_rela, (bfd_byte *) src_rela);
724 /* Sparc64 ELF linker hash table. */
726 struct sparc64_elf_app_reg
729 unsigned short shndx;
734 struct sparc64_elf_link_hash_table
736 struct elf_link_hash_table root;
738 struct sparc64_elf_app_reg app_regs [4];
741 /* Get the Sparc64 ELF linker hash table from a link_info structure. */
743 #define sparc64_elf_hash_table(p) \
744 ((struct sparc64_elf_link_hash_table *) ((p)->hash))
746 /* Create a Sparc64 ELF linker hash table. */
748 static struct bfd_link_hash_table *
749 sparc64_elf_bfd_link_hash_table_create (abfd)
752 struct sparc64_elf_link_hash_table *ret;
753 bfd_size_type amt = sizeof (struct sparc64_elf_link_hash_table);
755 ret = (struct sparc64_elf_link_hash_table *) bfd_zmalloc (amt);
756 if (ret == (struct sparc64_elf_link_hash_table *) NULL)
759 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
760 _bfd_elf_link_hash_newfunc))
766 return &ret->root.root;
769 /* Utility for performing the standard initial work of an instruction
771 *PRELOCATION will contain the relocated item.
772 *PINSN will contain the instruction from the input stream.
773 If the result is `bfd_reloc_other' the caller can continue with
774 performing the relocation. Otherwise it must stop and return the
775 value to its caller. */
777 static bfd_reloc_status_type
778 init_insn_reloc (abfd,
787 arelent *reloc_entry;
790 asection *input_section;
792 bfd_vma *prelocation;
796 reloc_howto_type *howto = reloc_entry->howto;
798 if (output_bfd != (bfd *) NULL
799 && (symbol->flags & BSF_SECTION_SYM) == 0
800 && (! howto->partial_inplace
801 || reloc_entry->addend == 0))
803 reloc_entry->address += input_section->output_offset;
807 /* This works because partial_inplace is FALSE. */
808 if (output_bfd != NULL)
809 return bfd_reloc_continue;
811 if (reloc_entry->address > input_section->_cooked_size)
812 return bfd_reloc_outofrange;
814 relocation = (symbol->value
815 + symbol->section->output_section->vma
816 + symbol->section->output_offset);
817 relocation += reloc_entry->addend;
818 if (howto->pc_relative)
820 relocation -= (input_section->output_section->vma
821 + input_section->output_offset);
822 relocation -= reloc_entry->address;
825 *prelocation = relocation;
826 *pinsn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
827 return bfd_reloc_other;
830 /* For unsupported relocs. */
832 static bfd_reloc_status_type
833 sparc_elf_notsup_reloc (abfd,
840 bfd *abfd ATTRIBUTE_UNUSED;
841 arelent *reloc_entry ATTRIBUTE_UNUSED;
842 asymbol *symbol ATTRIBUTE_UNUSED;
843 PTR data ATTRIBUTE_UNUSED;
844 asection *input_section ATTRIBUTE_UNUSED;
845 bfd *output_bfd ATTRIBUTE_UNUSED;
846 char **error_message ATTRIBUTE_UNUSED;
848 return bfd_reloc_notsupported;
851 /* Handle the WDISP16 reloc. */
853 static bfd_reloc_status_type
854 sparc_elf_wdisp16_reloc (abfd, reloc_entry, symbol, data, input_section,
855 output_bfd, error_message)
857 arelent *reloc_entry;
860 asection *input_section;
862 char **error_message ATTRIBUTE_UNUSED;
866 bfd_reloc_status_type status;
868 status = init_insn_reloc (abfd, reloc_entry, symbol, data,
869 input_section, output_bfd, &relocation, &insn);
870 if (status != bfd_reloc_other)
873 insn &= ~ (bfd_vma) 0x303fff;
874 insn |= (((relocation >> 2) & 0xc000) << 6) | ((relocation >> 2) & 0x3fff);
875 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
877 if ((bfd_signed_vma) relocation < - 0x40000
878 || (bfd_signed_vma) relocation > 0x3ffff)
879 return bfd_reloc_overflow;
884 /* Handle the HIX22 reloc. */
886 static bfd_reloc_status_type
887 sparc_elf_hix22_reloc (abfd,
895 arelent *reloc_entry;
898 asection *input_section;
900 char **error_message ATTRIBUTE_UNUSED;
904 bfd_reloc_status_type status;
906 status = init_insn_reloc (abfd, reloc_entry, symbol, data,
907 input_section, output_bfd, &relocation, &insn);
908 if (status != bfd_reloc_other)
911 relocation ^= MINUS_ONE;
912 insn = (insn &~ (bfd_vma) 0x3fffff) | ((relocation >> 10) & 0x3fffff);
913 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
915 if ((relocation & ~ (bfd_vma) 0xffffffff) != 0)
916 return bfd_reloc_overflow;
921 /* Handle the LOX10 reloc. */
923 static bfd_reloc_status_type
924 sparc_elf_lox10_reloc (abfd,
932 arelent *reloc_entry;
935 asection *input_section;
937 char **error_message ATTRIBUTE_UNUSED;
941 bfd_reloc_status_type status;
943 status = init_insn_reloc (abfd, reloc_entry, symbol, data,
944 input_section, output_bfd, &relocation, &insn);
945 if (status != bfd_reloc_other)
948 insn = (insn &~ (bfd_vma) 0x1fff) | 0x1c00 | (relocation & 0x3ff);
949 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
956 /* Both the headers and the entries are icache aligned. */
957 #define PLT_ENTRY_SIZE 32
958 #define PLT_HEADER_SIZE (4 * PLT_ENTRY_SIZE)
959 #define LARGE_PLT_THRESHOLD 32768
960 #define GOT_RESERVED_ENTRIES 1
962 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/sparcv9/ld.so.1"
964 /* Fill in the .plt section. */
967 sparc64_elf_build_plt (output_bfd, contents, nentries)
969 unsigned char *contents;
972 const unsigned int nop = 0x01000000;
975 /* The first four entries are reserved, and are initially undefined.
976 We fill them with `illtrap 0' to force ld.so to do something. */
978 for (i = 0; i < PLT_HEADER_SIZE/4; ++i)
979 bfd_put_32 (output_bfd, (bfd_vma) 0, contents+i*4);
981 /* The first 32768 entries are close enough to plt1 to get there via
982 a straight branch. */
984 for (i = 4; i < LARGE_PLT_THRESHOLD && i < nentries; ++i)
986 unsigned char *entry = contents + i * PLT_ENTRY_SIZE;
987 unsigned int sethi, ba;
989 /* sethi (. - plt0), %g1 */
990 sethi = 0x03000000 | (i * PLT_ENTRY_SIZE);
992 /* ba,a,pt %xcc, plt1 */
993 ba = 0x30680000 | (((contents+PLT_ENTRY_SIZE) - (entry+4)) / 4 & 0x7ffff);
995 bfd_put_32 (output_bfd, (bfd_vma) sethi, entry);
996 bfd_put_32 (output_bfd, (bfd_vma) ba, entry + 4);
997 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 8);
998 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 12);
999 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 16);
1000 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 20);
1001 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 24);
1002 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 28);
1005 /* Now the tricky bit. Entries 32768 and higher are grouped in blocks of
1006 160: 160 entries and 160 pointers. This is to separate code from data,
1007 which is much friendlier on the cache. */
1009 for (; i < nentries; i += 160)
1011 int block = (i + 160 <= nentries ? 160 : nentries - i);
1012 for (j = 0; j < block; ++j)
1014 unsigned char *entry, *ptr;
1017 entry = contents + i*PLT_ENTRY_SIZE + j*4*6;
1018 ptr = contents + i*PLT_ENTRY_SIZE + block*4*6 + j*8;
1020 /* ldx [%o7 + ptr - (entry+4)], %g1 */
1021 ldx = 0xc25be000 | ((ptr - (entry+4)) & 0x1fff);
1029 bfd_put_32 (output_bfd, (bfd_vma) 0x8a10000f, entry);
1030 bfd_put_32 (output_bfd, (bfd_vma) 0x40000002, entry + 4);
1031 bfd_put_32 (output_bfd, (bfd_vma) nop, entry + 8);
1032 bfd_put_32 (output_bfd, (bfd_vma) ldx, entry + 12);
1033 bfd_put_32 (output_bfd, (bfd_vma) 0x83c3c001, entry + 16);
1034 bfd_put_32 (output_bfd, (bfd_vma) 0x9e100005, entry + 20);
1036 bfd_put_64 (output_bfd, (bfd_vma) (contents - (entry + 4)), ptr);
1041 /* Return the offset of a particular plt entry within the .plt section. */
1044 sparc64_elf_plt_entry_offset (index)
1049 if (index < LARGE_PLT_THRESHOLD)
1050 return index * PLT_ENTRY_SIZE;
1052 /* See above for details. */
1054 block = (index - LARGE_PLT_THRESHOLD) / 160;
1055 ofs = (index - LARGE_PLT_THRESHOLD) % 160;
1057 return (LARGE_PLT_THRESHOLD + block * 160) * PLT_ENTRY_SIZE + ofs * 6 * 4;
1061 sparc64_elf_plt_ptr_offset (index, max)
1065 bfd_vma block, ofs, last;
1067 BFD_ASSERT(index >= LARGE_PLT_THRESHOLD);
1069 /* See above for details. */
1071 block = (((index - LARGE_PLT_THRESHOLD) / 160) * 160) + LARGE_PLT_THRESHOLD;
1072 ofs = index - block;
1073 if (block + 160 > max)
1074 last = (max - LARGE_PLT_THRESHOLD) % 160;
1078 return (block * PLT_ENTRY_SIZE
1083 /* Look through the relocs for a section during the first phase, and
1084 allocate space in the global offset table or procedure linkage
1088 sparc64_elf_check_relocs (abfd, info, sec, relocs)
1090 struct bfd_link_info *info;
1092 const Elf_Internal_Rela *relocs;
1095 Elf_Internal_Shdr *symtab_hdr;
1096 struct elf_link_hash_entry **sym_hashes;
1097 bfd_vma *local_got_offsets;
1098 const Elf_Internal_Rela *rel;
1099 const Elf_Internal_Rela *rel_end;
1104 if (info->relocateable || !(sec->flags & SEC_ALLOC))
1107 dynobj = elf_hash_table (info)->dynobj;
1108 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1109 sym_hashes = elf_sym_hashes (abfd);
1110 local_got_offsets = elf_local_got_offsets (abfd);
1116 rel_end = relocs + NUM_SHDR_ENTRIES (& elf_section_data (sec)->rel_hdr);
1117 for (rel = relocs; rel < rel_end; rel++)
1119 unsigned long r_symndx;
1120 struct elf_link_hash_entry *h;
1122 r_symndx = ELF64_R_SYM (rel->r_info);
1123 if (r_symndx < symtab_hdr->sh_info)
1126 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1128 switch (ELF64_R_TYPE_ID (rel->r_info))
1133 /* This symbol requires a global offset table entry. */
1137 /* Create the .got section. */
1138 elf_hash_table (info)->dynobj = dynobj = abfd;
1139 if (! _bfd_elf_create_got_section (dynobj, info))
1145 sgot = bfd_get_section_by_name (dynobj, ".got");
1146 BFD_ASSERT (sgot != NULL);
1149 if (srelgot == NULL && (h != NULL || info->shared))
1151 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1152 if (srelgot == NULL)
1154 srelgot = bfd_make_section (dynobj, ".rela.got");
1156 || ! bfd_set_section_flags (dynobj, srelgot,
1161 | SEC_LINKER_CREATED
1163 || ! bfd_set_section_alignment (dynobj, srelgot, 3))
1170 if (h->got.offset != (bfd_vma) -1)
1172 /* We have already allocated space in the .got. */
1175 h->got.offset = sgot->_raw_size;
1177 /* Make sure this symbol is output as a dynamic symbol. */
1178 if (h->dynindx == -1)
1180 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
1184 srelgot->_raw_size += sizeof (Elf64_External_Rela);
1188 /* This is a global offset table entry for a local
1190 if (local_got_offsets == NULL)
1193 register unsigned int i;
1195 size = symtab_hdr->sh_info;
1196 size *= sizeof (bfd_vma);
1197 local_got_offsets = (bfd_vma *) bfd_alloc (abfd, size);
1198 if (local_got_offsets == NULL)
1200 elf_local_got_offsets (abfd) = local_got_offsets;
1201 for (i = 0; i < symtab_hdr->sh_info; i++)
1202 local_got_offsets[i] = (bfd_vma) -1;
1204 if (local_got_offsets[r_symndx] != (bfd_vma) -1)
1206 /* We have already allocated space in the .got. */
1209 local_got_offsets[r_symndx] = sgot->_raw_size;
1213 /* If we are generating a shared object, we need to
1214 output a R_SPARC_RELATIVE reloc so that the
1215 dynamic linker can adjust this GOT entry. */
1216 srelgot->_raw_size += sizeof (Elf64_External_Rela);
1220 sgot->_raw_size += 8;
1223 /* Doesn't work for 64-bit -fPIC, since sethi/or builds
1224 unsigned numbers. If we permit ourselves to modify
1225 code so we get sethi/xor, this could work.
1226 Question: do we consider conditionally re-enabling
1227 this for -fpic, once we know about object code models? */
1228 /* If the .got section is more than 0x1000 bytes, we add
1229 0x1000 to the value of _GLOBAL_OFFSET_TABLE_, so that 13
1230 bit relocations have a greater chance of working. */
1231 if (sgot->_raw_size >= 0x1000
1232 && elf_hash_table (info)->hgot->root.u.def.value == 0)
1233 elf_hash_table (info)->hgot->root.u.def.value = 0x1000;
1238 case R_SPARC_WPLT30:
1240 case R_SPARC_HIPLT22:
1241 case R_SPARC_LOPLT10:
1242 case R_SPARC_PCPLT32:
1243 case R_SPARC_PCPLT22:
1244 case R_SPARC_PCPLT10:
1246 /* This symbol requires a procedure linkage table entry. We
1247 actually build the entry in adjust_dynamic_symbol,
1248 because this might be a case of linking PIC code without
1249 linking in any dynamic objects, in which case we don't
1250 need to generate a procedure linkage table after all. */
1254 /* It does not make sense to have a procedure linkage
1255 table entry for a local symbol. */
1256 bfd_set_error (bfd_error_bad_value);
1260 /* Make sure this symbol is output as a dynamic symbol. */
1261 if (h->dynindx == -1)
1263 if (! bfd_elf64_link_record_dynamic_symbol (info, h))
1267 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1268 if (ELF64_R_TYPE_ID (rel->r_info) != R_SPARC_PLT32
1269 && ELF64_R_TYPE_ID (rel->r_info) != R_SPARC_PLT64)
1274 case R_SPARC_PC_HH22:
1275 case R_SPARC_PC_HM10:
1276 case R_SPARC_PC_LM22:
1278 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1282 case R_SPARC_DISP16:
1283 case R_SPARC_DISP32:
1284 case R_SPARC_DISP64:
1285 case R_SPARC_WDISP30:
1286 case R_SPARC_WDISP22:
1287 case R_SPARC_WDISP19:
1288 case R_SPARC_WDISP16:
1317 /* When creating a shared object, we must copy these relocs
1318 into the output file. We create a reloc section in
1319 dynobj and make room for the reloc.
1321 But don't do this for debugging sections -- this shows up
1322 with DWARF2 -- first because they are not loaded, and
1323 second because DWARF sez the debug info is not to be
1324 biased by the load address. */
1325 if (info->shared && (sec->flags & SEC_ALLOC))
1331 name = (bfd_elf_string_from_elf_section
1333 elf_elfheader (abfd)->e_shstrndx,
1334 elf_section_data (sec)->rel_hdr.sh_name));
1338 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1339 && strcmp (bfd_get_section_name (abfd, sec),
1342 sreloc = bfd_get_section_by_name (dynobj, name);
1347 sreloc = bfd_make_section (dynobj, name);
1348 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1349 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1350 if ((sec->flags & SEC_ALLOC) != 0)
1351 flags |= SEC_ALLOC | SEC_LOAD;
1353 || ! bfd_set_section_flags (dynobj, sreloc, flags)
1354 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
1357 if (sec->flags & SEC_READONLY)
1358 info->flags |= DF_TEXTREL;
1361 sreloc->_raw_size += sizeof (Elf64_External_Rela);
1365 case R_SPARC_REGISTER:
1366 /* Nothing to do. */
1370 (*_bfd_error_handler) (_("%s: check_relocs: unhandled reloc type %d"),
1371 bfd_archive_filename (abfd),
1372 ELF64_R_TYPE_ID (rel->r_info));
1380 /* Hook called by the linker routine which adds symbols from an object
1381 file. We use it for STT_REGISTER symbols. */
1384 sparc64_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
1386 struct bfd_link_info *info;
1387 const Elf_Internal_Sym *sym;
1389 flagword *flagsp ATTRIBUTE_UNUSED;
1390 asection **secp ATTRIBUTE_UNUSED;
1391 bfd_vma *valp ATTRIBUTE_UNUSED;
1393 static const char *const stt_types[] = { "NOTYPE", "OBJECT", "FUNCTION" };
1395 if (ELF_ST_TYPE (sym->st_info) == STT_REGISTER)
1398 struct sparc64_elf_app_reg *p;
1400 reg = (int)sym->st_value;
1403 case 2: reg -= 2; break;
1404 case 6: reg -= 4; break;
1406 (*_bfd_error_handler)
1407 (_("%s: Only registers %%g[2367] can be declared using STT_REGISTER"),
1408 bfd_archive_filename (abfd));
1412 if (info->hash->creator != abfd->xvec
1413 || (abfd->flags & DYNAMIC) != 0)
1415 /* STT_REGISTER only works when linking an elf64_sparc object.
1416 If STT_REGISTER comes from a dynamic object, don't put it into
1417 the output bfd. The dynamic linker will recheck it. */
1422 p = sparc64_elf_hash_table(info)->app_regs + reg;
1424 if (p->name != NULL && strcmp (p->name, *namep))
1426 (*_bfd_error_handler)
1427 (_("Register %%g%d used incompatibly: %s in %s, previously %s in %s"),
1428 (int) sym->st_value,
1429 **namep ? *namep : "#scratch", bfd_archive_filename (abfd),
1430 *p->name ? p->name : "#scratch", bfd_archive_filename (p->abfd));
1434 if (p->name == NULL)
1438 struct elf_link_hash_entry *h;
1440 h = (struct elf_link_hash_entry *)
1441 bfd_link_hash_lookup (info->hash, *namep, FALSE, FALSE, FALSE);
1445 unsigned char type = h->type;
1447 if (type > STT_FUNC)
1449 (*_bfd_error_handler)
1450 (_("Symbol `%s' has differing types: REGISTER in %s, previously %s in %s"),
1451 *namep, bfd_archive_filename (abfd),
1452 stt_types[type], bfd_archive_filename (p->abfd));
1456 p->name = bfd_hash_allocate (&info->hash->table,
1457 strlen (*namep) + 1);
1461 strcpy (p->name, *namep);
1465 p->bind = ELF_ST_BIND (sym->st_info);
1467 p->shndx = sym->st_shndx;
1471 if (p->bind == STB_WEAK
1472 && ELF_ST_BIND (sym->st_info) == STB_GLOBAL)
1474 p->bind = STB_GLOBAL;
1481 else if (*namep && **namep
1482 && info->hash->creator == abfd->xvec)
1485 struct sparc64_elf_app_reg *p;
1487 p = sparc64_elf_hash_table(info)->app_regs;
1488 for (i = 0; i < 4; i++, p++)
1489 if (p->name != NULL && ! strcmp (p->name, *namep))
1491 unsigned char type = ELF_ST_TYPE (sym->st_info);
1493 if (type > STT_FUNC)
1495 (*_bfd_error_handler)
1496 (_("Symbol `%s' has differing types: %s in %s, previously REGISTER in %s"),
1497 *namep, stt_types[type], bfd_archive_filename (abfd),
1498 bfd_archive_filename (p->abfd));
1505 /* This function takes care of emiting STT_REGISTER symbols
1506 which we cannot easily keep in the symbol hash table. */
1509 sparc64_elf_output_arch_syms (output_bfd, info, finfo, func)
1510 bfd *output_bfd ATTRIBUTE_UNUSED;
1511 struct bfd_link_info *info;
1514 PARAMS ((PTR, const char *, Elf_Internal_Sym *, asection *));
1517 struct sparc64_elf_app_reg *app_regs =
1518 sparc64_elf_hash_table(info)->app_regs;
1519 Elf_Internal_Sym sym;
1521 /* We arranged in size_dynamic_sections to put the STT_REGISTER entries
1522 at the end of the dynlocal list, so they came at the end of the local
1523 symbols in the symtab. Except that they aren't STB_LOCAL, so we need
1524 to back up symtab->sh_info. */
1525 if (elf_hash_table (info)->dynlocal)
1527 bfd * dynobj = elf_hash_table (info)->dynobj;
1528 asection *dynsymsec = bfd_get_section_by_name (dynobj, ".dynsym");
1529 struct elf_link_local_dynamic_entry *e;
1531 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
1532 if (e->input_indx == -1)
1536 elf_section_data (dynsymsec->output_section)->this_hdr.sh_info
1541 if (info->strip == strip_all)
1544 for (reg = 0; reg < 4; reg++)
1545 if (app_regs [reg].name != NULL)
1547 if (info->strip == strip_some
1548 && bfd_hash_lookup (info->keep_hash,
1549 app_regs [reg].name,
1550 FALSE, FALSE) == NULL)
1553 sym.st_value = reg < 2 ? reg + 2 : reg + 4;
1556 sym.st_info = ELF_ST_INFO (app_regs [reg].bind, STT_REGISTER);
1557 sym.st_shndx = app_regs [reg].shndx;
1558 if (! (*func) (finfo, app_regs [reg].name, &sym,
1559 sym.st_shndx == SHN_ABS
1560 ? bfd_abs_section_ptr : bfd_und_section_ptr))
1568 sparc64_elf_get_symbol_type (elf_sym, type)
1569 Elf_Internal_Sym * elf_sym;
1572 if (ELF_ST_TYPE (elf_sym->st_info) == STT_REGISTER)
1573 return STT_REGISTER;
1578 /* A STB_GLOBAL,STT_REGISTER symbol should be BSF_GLOBAL
1579 even in SHN_UNDEF section. */
1582 sparc64_elf_symbol_processing (abfd, asym)
1583 bfd *abfd ATTRIBUTE_UNUSED;
1586 elf_symbol_type *elfsym;
1588 elfsym = (elf_symbol_type *) asym;
1589 if (elfsym->internal_elf_sym.st_info
1590 == ELF_ST_INFO (STB_GLOBAL, STT_REGISTER))
1592 asym->flags |= BSF_GLOBAL;
1596 /* Adjust a symbol defined by a dynamic object and referenced by a
1597 regular object. The current definition is in some section of the
1598 dynamic object, but we're not including those sections. We have to
1599 change the definition to something the rest of the link can
1603 sparc64_elf_adjust_dynamic_symbol (info, h)
1604 struct bfd_link_info *info;
1605 struct elf_link_hash_entry *h;
1609 unsigned int power_of_two;
1611 dynobj = elf_hash_table (info)->dynobj;
1613 /* Make sure we know what is going on here. */
1614 BFD_ASSERT (dynobj != NULL
1615 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
1616 || h->weakdef != NULL
1617 || ((h->elf_link_hash_flags
1618 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
1619 && (h->elf_link_hash_flags
1620 & ELF_LINK_HASH_REF_REGULAR) != 0
1621 && (h->elf_link_hash_flags
1622 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
1624 /* If this is a function, put it in the procedure linkage table. We
1625 will fill in the contents of the procedure linkage table later
1626 (although we could actually do it here). The STT_NOTYPE
1627 condition is a hack specifically for the Oracle libraries
1628 delivered for Solaris; for some inexplicable reason, they define
1629 some of their functions as STT_NOTYPE when they really should be
1631 if (h->type == STT_FUNC
1632 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
1633 || (h->type == STT_NOTYPE
1634 && (h->root.type == bfd_link_hash_defined
1635 || h->root.type == bfd_link_hash_defweak)
1636 && (h->root.u.def.section->flags & SEC_CODE) != 0))
1638 if (! elf_hash_table (info)->dynamic_sections_created)
1640 /* This case can occur if we saw a WPLT30 reloc in an input
1641 file, but none of the input files were dynamic objects.
1642 In such a case, we don't actually need to build a
1643 procedure linkage table, and we can just do a WDISP30
1645 BFD_ASSERT ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0);
1649 s = bfd_get_section_by_name (dynobj, ".plt");
1650 BFD_ASSERT (s != NULL);
1652 /* The first four bit in .plt is reserved. */
1653 if (s->_raw_size == 0)
1654 s->_raw_size = PLT_HEADER_SIZE;
1656 /* To simplify matters later, just store the plt index here. */
1657 h->plt.offset = s->_raw_size / PLT_ENTRY_SIZE;
1659 /* If this symbol is not defined in a regular file, and we are
1660 not generating a shared library, then set the symbol to this
1661 location in the .plt. This is required to make function
1662 pointers compare as equal between the normal executable and
1663 the shared library. */
1665 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1667 h->root.u.def.section = s;
1668 h->root.u.def.value = sparc64_elf_plt_entry_offset (h->plt.offset);
1671 /* Make room for this entry. */
1672 s->_raw_size += PLT_ENTRY_SIZE;
1674 /* We also need to make an entry in the .rela.plt section. */
1676 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1677 BFD_ASSERT (s != NULL);
1679 s->_raw_size += sizeof (Elf64_External_Rela);
1681 /* The procedure linkage table size is bounded by the magnitude
1682 of the offset we can describe in the entry. */
1683 if (s->_raw_size >= (bfd_vma)1 << 32)
1685 bfd_set_error (bfd_error_bad_value);
1692 /* If this is a weak symbol, and there is a real definition, the
1693 processor independent code will have arranged for us to see the
1694 real definition first, and we can just use the same value. */
1695 if (h->weakdef != NULL)
1697 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1698 || h->weakdef->root.type == bfd_link_hash_defweak);
1699 h->root.u.def.section = h->weakdef->root.u.def.section;
1700 h->root.u.def.value = h->weakdef->root.u.def.value;
1704 /* This is a reference to a symbol defined by a dynamic object which
1705 is not a function. */
1707 /* If we are creating a shared library, we must presume that the
1708 only references to the symbol are via the global offset table.
1709 For such cases we need not do anything here; the relocations will
1710 be handled correctly by relocate_section. */
1714 /* We must allocate the symbol in our .dynbss section, which will
1715 become part of the .bss section of the executable. There will be
1716 an entry for this symbol in the .dynsym section. The dynamic
1717 object will contain position independent code, so all references
1718 from the dynamic object to this symbol will go through the global
1719 offset table. The dynamic linker will use the .dynsym entry to
1720 determine the address it must put in the global offset table, so
1721 both the dynamic object and the regular object will refer to the
1722 same memory location for the variable. */
1724 s = bfd_get_section_by_name (dynobj, ".dynbss");
1725 BFD_ASSERT (s != NULL);
1727 /* We must generate a R_SPARC_COPY reloc to tell the dynamic linker
1728 to copy the initial value out of the dynamic object and into the
1729 runtime process image. We need to remember the offset into the
1730 .rel.bss section we are going to use. */
1731 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1735 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1736 BFD_ASSERT (srel != NULL);
1737 srel->_raw_size += sizeof (Elf64_External_Rela);
1738 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1741 /* We need to figure out the alignment required for this symbol. I
1742 have no idea how ELF linkers handle this. 16-bytes is the size
1743 of the largest type that requires hard alignment -- long double. */
1744 power_of_two = bfd_log2 (h->size);
1745 if (power_of_two > 4)
1748 /* Apply the required alignment. */
1749 s->_raw_size = BFD_ALIGN (s->_raw_size,
1750 (bfd_size_type) (1 << power_of_two));
1751 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1753 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
1757 /* Define the symbol as being at this point in the section. */
1758 h->root.u.def.section = s;
1759 h->root.u.def.value = s->_raw_size;
1761 /* Increment the section size to make room for the symbol. */
1762 s->_raw_size += h->size;
1767 /* Set the sizes of the dynamic sections. */
1770 sparc64_elf_size_dynamic_sections (output_bfd, info)
1772 struct bfd_link_info *info;
1778 dynobj = elf_hash_table (info)->dynobj;
1779 BFD_ASSERT (dynobj != NULL);
1781 if (elf_hash_table (info)->dynamic_sections_created)
1783 /* Set the contents of the .interp section to the interpreter. */
1784 if (info->executable)
1786 s = bfd_get_section_by_name (dynobj, ".interp");
1787 BFD_ASSERT (s != NULL);
1788 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1789 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1794 /* We may have created entries in the .rela.got section.
1795 However, if we are not creating the dynamic sections, we will
1796 not actually use these entries. Reset the size of .rela.got,
1797 which will cause it to get stripped from the output file
1799 s = bfd_get_section_by_name (dynobj, ".rela.got");
1804 /* The check_relocs and adjust_dynamic_symbol entry points have
1805 determined the sizes of the various dynamic sections. Allocate
1808 for (s = dynobj->sections; s != NULL; s = s->next)
1813 if ((s->flags & SEC_LINKER_CREATED) == 0)
1816 /* It's OK to base decisions on the section name, because none
1817 of the dynobj section names depend upon the input files. */
1818 name = bfd_get_section_name (dynobj, s);
1822 if (strncmp (name, ".rela", 5) == 0)
1824 if (s->_raw_size == 0)
1826 /* If we don't need this section, strip it from the
1827 output file. This is to handle .rela.bss and
1828 .rel.plt. We must create it in
1829 create_dynamic_sections, because it must be created
1830 before the linker maps input sections to output
1831 sections. The linker does that before
1832 adjust_dynamic_symbol is called, and it is that
1833 function which decides whether anything needs to go
1834 into these sections. */
1839 if (strcmp (name, ".rela.plt") == 0)
1842 /* We use the reloc_count field as a counter if we need
1843 to copy relocs into the output file. */
1847 else if (strcmp (name, ".plt") != 0
1848 && strncmp (name, ".got", 4) != 0)
1850 /* It's not one of our sections, so don't allocate space. */
1856 _bfd_strip_section_from_output (info, s);
1860 /* Allocate memory for the section contents. Zero the memory
1861 for the benefit of .rela.plt, which has 4 unused entries
1862 at the beginning, and we don't want garbage. */
1863 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
1864 if (s->contents == NULL && s->_raw_size != 0)
1868 if (elf_hash_table (info)->dynamic_sections_created)
1870 /* Add some entries to the .dynamic section. We fill in the
1871 values later, in sparc64_elf_finish_dynamic_sections, but we
1872 must add the entries now so that we get the correct size for
1873 the .dynamic section. The DT_DEBUG entry is filled in by the
1874 dynamic linker and used by the debugger. */
1875 #define add_dynamic_entry(TAG, VAL) \
1876 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1879 struct sparc64_elf_app_reg * app_regs;
1880 struct elf_strtab_hash *dynstr;
1881 struct elf_link_hash_table *eht = elf_hash_table (info);
1883 if (info->executable)
1885 if (!add_dynamic_entry (DT_DEBUG, 0))
1891 if (!add_dynamic_entry (DT_PLTGOT, 0)
1892 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1893 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1894 || !add_dynamic_entry (DT_JMPREL, 0))
1898 if (!add_dynamic_entry (DT_RELA, 0)
1899 || !add_dynamic_entry (DT_RELASZ, 0)
1900 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
1903 if (info->flags & DF_TEXTREL)
1905 if (!add_dynamic_entry (DT_TEXTREL, 0))
1909 /* Add dynamic STT_REGISTER symbols and corresponding DT_SPARC_REGISTER
1910 entries if needed. */
1911 app_regs = sparc64_elf_hash_table (info)->app_regs;
1912 dynstr = eht->dynstr;
1914 for (reg = 0; reg < 4; reg++)
1915 if (app_regs [reg].name != NULL)
1917 struct elf_link_local_dynamic_entry *entry, *e;
1919 if (!add_dynamic_entry (DT_SPARC_REGISTER, 0))
1922 entry = (struct elf_link_local_dynamic_entry *)
1923 bfd_hash_allocate (&info->hash->table, sizeof (*entry));
1927 /* We cheat here a little bit: the symbol will not be local, so we
1928 put it at the end of the dynlocal linked list. We will fix it
1929 later on, as we have to fix other fields anyway. */
1930 entry->isym.st_value = reg < 2 ? reg + 2 : reg + 4;
1931 entry->isym.st_size = 0;
1932 if (*app_regs [reg].name != '\0')
1934 = _bfd_elf_strtab_add (dynstr, app_regs[reg].name, FALSE);
1936 entry->isym.st_name = 0;
1937 entry->isym.st_other = 0;
1938 entry->isym.st_info = ELF_ST_INFO (app_regs [reg].bind,
1940 entry->isym.st_shndx = app_regs [reg].shndx;
1942 entry->input_bfd = output_bfd;
1943 entry->input_indx = -1;
1945 if (eht->dynlocal == NULL)
1946 eht->dynlocal = entry;
1949 for (e = eht->dynlocal; e->next; e = e->next)
1956 #undef add_dynamic_entry
1962 sparc64_elf_new_section_hook (abfd, sec)
1966 struct sparc64_elf_section_data *sdata;
1967 bfd_size_type amt = sizeof (*sdata);
1969 sdata = (struct sparc64_elf_section_data *) bfd_zalloc (abfd, amt);
1972 sec->used_by_bfd = (PTR) sdata;
1974 return _bfd_elf_new_section_hook (abfd, sec);
1978 sparc64_elf_relax_section (abfd, section, link_info, again)
1979 bfd *abfd ATTRIBUTE_UNUSED;
1980 asection *section ATTRIBUTE_UNUSED;
1981 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
1985 sec_do_relax (section) = 1;
1989 /* This is the condition under which finish_dynamic_symbol will be called
1990 from elflink.h. If elflink.h doesn't call our finish_dynamic_symbol
1991 routine, we'll need to do something about initializing any .plt and
1992 .got entries in relocate_section. */
1993 #define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1995 && ((INFO)->shared \
1996 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1997 && ((H)->dynindx != -1 \
1998 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
2000 /* Relocate a SPARC64 ELF section. */
2003 sparc64_elf_relocate_section (output_bfd, info, input_bfd, input_section,
2004 contents, relocs, local_syms, local_sections)
2006 struct bfd_link_info *info;
2008 asection *input_section;
2010 Elf_Internal_Rela *relocs;
2011 Elf_Internal_Sym *local_syms;
2012 asection **local_sections;
2015 Elf_Internal_Shdr *symtab_hdr;
2016 struct elf_link_hash_entry **sym_hashes;
2017 bfd_vma *local_got_offsets;
2022 Elf_Internal_Rela *rel;
2023 Elf_Internal_Rela *relend;
2025 if (info->relocateable)
2028 dynobj = elf_hash_table (info)->dynobj;
2029 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2030 sym_hashes = elf_sym_hashes (input_bfd);
2031 local_got_offsets = elf_local_got_offsets (input_bfd);
2033 if (elf_hash_table(info)->hgot == NULL)
2036 got_base = elf_hash_table (info)->hgot->root.u.def.value;
2038 sgot = splt = sreloc = NULL;
2041 relend = relocs + NUM_SHDR_ENTRIES (& elf_section_data (input_section)->rel_hdr);
2042 for (; rel < relend; rel++)
2045 reloc_howto_type *howto;
2046 unsigned long r_symndx;
2047 struct elf_link_hash_entry *h;
2048 Elf_Internal_Sym *sym;
2050 bfd_vma relocation, off;
2051 bfd_reloc_status_type r;
2052 bfd_boolean is_plt = FALSE;
2053 bfd_boolean unresolved_reloc;
2055 r_type = ELF64_R_TYPE_ID (rel->r_info);
2056 if (r_type < 0 || r_type >= (int) R_SPARC_max_std)
2058 bfd_set_error (bfd_error_bad_value);
2061 howto = sparc64_elf_howto_table + r_type;
2063 /* This is a final link. */
2064 r_symndx = ELF64_R_SYM (rel->r_info);
2068 unresolved_reloc = FALSE;
2069 if (r_symndx < symtab_hdr->sh_info)
2071 sym = local_syms + r_symndx;
2072 sec = local_sections[r_symndx];
2073 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
2077 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2078 while (h->root.type == bfd_link_hash_indirect
2079 || h->root.type == bfd_link_hash_warning)
2080 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2083 if (h->root.type == bfd_link_hash_defined
2084 || h->root.type == bfd_link_hash_defweak)
2086 sec = h->root.u.def.section;
2087 if (sec->output_section == NULL)
2088 /* Set a flag that will be cleared later if we find a
2089 relocation value for this symbol. output_section
2090 is typically NULL for symbols satisfied by a shared
2092 unresolved_reloc = TRUE;
2094 relocation = (h->root.u.def.value
2095 + sec->output_section->vma
2096 + sec->output_offset);
2098 else if (h->root.type == bfd_link_hash_undefweak)
2100 else if (info->shared
2101 && !info->no_undefined
2102 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
2106 if (! ((*info->callbacks->undefined_symbol)
2107 (info, h->root.root.string, input_bfd,
2108 input_section, rel->r_offset,
2109 (!info->shared || info->no_undefined
2110 || ELF_ST_VISIBILITY (h->other)))))
2113 /* To avoid generating warning messages about truncated
2114 relocations, set the relocation's address to be the same as
2115 the start of this section. */
2116 if (input_section->output_section != NULL)
2117 relocation = input_section->output_section->vma;
2124 /* When generating a shared object, these relocations are copied
2125 into the output file to be resolved at run time. */
2126 if (info->shared && r_symndx != 0 && (input_section->flags & SEC_ALLOC))
2132 case R_SPARC_PC_HH22:
2133 case R_SPARC_PC_HM10:
2134 case R_SPARC_PC_LM22:
2136 && !strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_"))
2140 case R_SPARC_DISP16:
2141 case R_SPARC_DISP32:
2142 case R_SPARC_DISP64:
2143 case R_SPARC_WDISP30:
2144 case R_SPARC_WDISP22:
2145 case R_SPARC_WDISP19:
2146 case R_SPARC_WDISP16:
2176 Elf_Internal_Rela outrel;
2178 bfd_boolean skip, relocate;
2183 (bfd_elf_string_from_elf_section
2185 elf_elfheader (input_bfd)->e_shstrndx,
2186 elf_section_data (input_section)->rel_hdr.sh_name));
2191 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
2192 && strcmp (bfd_get_section_name(input_bfd,
2196 sreloc = bfd_get_section_by_name (dynobj, name);
2197 BFD_ASSERT (sreloc != NULL);
2204 _bfd_elf_section_offset (output_bfd, info, input_section,
2206 if (outrel.r_offset == (bfd_vma) -1)
2208 else if (outrel.r_offset == (bfd_vma) -2)
2209 skip = TRUE, relocate = TRUE;
2211 outrel.r_offset += (input_section->output_section->vma
2212 + input_section->output_offset);
2214 /* Optimize unaligned reloc usage now that we know where
2215 it finally resides. */
2219 if (outrel.r_offset & 1) r_type = R_SPARC_UA16;
2222 if (!(outrel.r_offset & 1)) r_type = R_SPARC_16;
2225 if (outrel.r_offset & 3) r_type = R_SPARC_UA32;
2228 if (!(outrel.r_offset & 3)) r_type = R_SPARC_32;
2231 if (outrel.r_offset & 7) r_type = R_SPARC_UA64;
2234 if (!(outrel.r_offset & 7)) r_type = R_SPARC_64;
2237 case R_SPARC_DISP16:
2238 case R_SPARC_DISP32:
2239 case R_SPARC_DISP64:
2240 /* If the symbol is not dynamic, we should not keep
2241 a dynamic relocation. But an .rela.* slot has been
2242 allocated for it, output R_SPARC_NONE.
2243 FIXME: Add code tracking needed dynamic relocs as
2245 if (h->dynindx == -1)
2246 skip = TRUE, relocate = TRUE;
2251 memset (&outrel, 0, sizeof outrel);
2252 /* h->dynindx may be -1 if the symbol was marked to
2254 else if (h != NULL && ! is_plt
2255 && ((! info->symbolic && h->dynindx != -1)
2256 || (h->elf_link_hash_flags
2257 & ELF_LINK_HASH_DEF_REGULAR) == 0))
2259 BFD_ASSERT (h->dynindx != -1);
2261 = ELF64_R_INFO (h->dynindx,
2263 ELF64_R_TYPE_DATA (rel->r_info),
2265 outrel.r_addend = rel->r_addend;
2269 outrel.r_addend = relocation + rel->r_addend;
2270 if (r_type == R_SPARC_64)
2271 outrel.r_info = ELF64_R_INFO (0, R_SPARC_RELATIVE);
2279 sec = local_sections[r_symndx];
2282 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2284 == bfd_link_hash_defweak));
2285 sec = h->root.u.def.section;
2287 if (sec != NULL && bfd_is_abs_section (sec))
2289 else if (sec == NULL || sec->owner == NULL)
2291 bfd_set_error (bfd_error_bad_value);
2298 osec = sec->output_section;
2299 indx = elf_section_data (osec)->dynindx;
2301 /* We are turning this relocation into one
2302 against a section symbol, so subtract out
2303 the output section's address but not the
2304 offset of the input section in the output
2306 outrel.r_addend -= osec->vma;
2308 /* FIXME: we really should be able to link non-pic
2309 shared libraries. */
2313 (*_bfd_error_handler)
2314 (_("%s: probably compiled without -fPIC?"),
2315 bfd_archive_filename (input_bfd));
2316 bfd_set_error (bfd_error_bad_value);
2322 = ELF64_R_INFO (indx,
2324 ELF64_R_TYPE_DATA (rel->r_info),
2329 loc = sreloc->contents;
2330 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2331 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2333 /* This reloc will be computed at runtime, so there's no
2334 need to do anything now. */
2347 /* Relocation is to the entry for this symbol in the global
2351 sgot = bfd_get_section_by_name (dynobj, ".got");
2352 BFD_ASSERT (sgot != NULL);
2359 off = h->got.offset;
2360 BFD_ASSERT (off != (bfd_vma) -1);
2361 dyn = elf_hash_table (info)->dynamic_sections_created;
2363 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
2367 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL))
2368 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
2370 /* This is actually a static link, or it is a -Bsymbolic
2371 link and the symbol is defined locally, or the symbol
2372 was forced to be local because of a version file. We
2373 must initialize this entry in the global offset table.
2374 Since the offset must always be a multiple of 8, we
2375 use the least significant bit to record whether we
2376 have initialized it already.
2378 When doing a dynamic link, we create a .rela.got
2379 relocation entry to initialize the value. This is
2380 done in the finish_dynamic_symbol routine. */
2386 bfd_put_64 (output_bfd, relocation,
2387 sgot->contents + off);
2392 unresolved_reloc = FALSE;
2396 BFD_ASSERT (local_got_offsets != NULL);
2397 off = local_got_offsets[r_symndx];
2398 BFD_ASSERT (off != (bfd_vma) -1);
2400 /* The offset must always be a multiple of 8. We use
2401 the least significant bit to record whether we have
2402 already processed this entry. */
2407 local_got_offsets[r_symndx] |= 1;
2412 Elf_Internal_Rela outrel;
2415 /* The Solaris 2.7 64-bit linker adds the contents
2416 of the location to the value of the reloc.
2417 Note this is different behaviour to the
2418 32-bit linker, which both adds the contents
2419 and ignores the addend. So clear the location. */
2420 bfd_put_64 (output_bfd, (bfd_vma) 0,
2421 sgot->contents + off);
2423 /* We need to generate a R_SPARC_RELATIVE reloc
2424 for the dynamic linker. */
2425 s = bfd_get_section_by_name(dynobj, ".rela.got");
2426 BFD_ASSERT (s != NULL);
2428 outrel.r_offset = (sgot->output_section->vma
2429 + sgot->output_offset
2431 outrel.r_info = ELF64_R_INFO (0, R_SPARC_RELATIVE);
2432 outrel.r_addend = relocation;
2434 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2435 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2438 bfd_put_64 (output_bfd, relocation, sgot->contents + off);
2441 relocation = sgot->output_offset + off - got_base;
2444 case R_SPARC_WPLT30:
2446 case R_SPARC_HIPLT22:
2447 case R_SPARC_LOPLT10:
2448 case R_SPARC_PCPLT32:
2449 case R_SPARC_PCPLT22:
2450 case R_SPARC_PCPLT10:
2452 /* Relocation is to the entry for this symbol in the
2453 procedure linkage table. */
2454 BFD_ASSERT (h != NULL);
2456 if (h->plt.offset == (bfd_vma) -1)
2458 /* We didn't make a PLT entry for this symbol. This
2459 happens when statically linking PIC code, or when
2460 using -Bsymbolic. */
2466 splt = bfd_get_section_by_name (dynobj, ".plt");
2467 BFD_ASSERT (splt != NULL);
2470 relocation = (splt->output_section->vma
2471 + splt->output_offset
2472 + sparc64_elf_plt_entry_offset (h->plt.offset));
2473 unresolved_reloc = FALSE;
2474 if (r_type == R_SPARC_WPLT30)
2476 if (r_type == R_SPARC_PLT32 || r_type == R_SPARC_PLT64)
2478 r_type = r_type == R_SPARC_PLT32 ? R_SPARC_32 : R_SPARC_64;
2488 relocation += rel->r_addend;
2489 relocation = (relocation & 0x3ff) + ELF64_R_TYPE_DATA (rel->r_info);
2491 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
2492 x = (x & ~(bfd_vma) 0x1fff) | (relocation & 0x1fff);
2493 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2495 r = bfd_check_overflow (howto->complain_on_overflow,
2496 howto->bitsize, howto->rightshift,
2497 bfd_arch_bits_per_address (input_bfd),
2502 case R_SPARC_WDISP16:
2506 relocation += rel->r_addend;
2507 /* Adjust for pc-relative-ness. */
2508 relocation -= (input_section->output_section->vma
2509 + input_section->output_offset);
2510 relocation -= rel->r_offset;
2512 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
2513 x &= ~(bfd_vma) 0x303fff;
2514 x |= ((((relocation >> 2) & 0xc000) << 6)
2515 | ((relocation >> 2) & 0x3fff));
2516 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2518 r = bfd_check_overflow (howto->complain_on_overflow,
2519 howto->bitsize, howto->rightshift,
2520 bfd_arch_bits_per_address (input_bfd),
2529 relocation += rel->r_addend;
2530 relocation = relocation ^ MINUS_ONE;
2532 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
2533 x = (x & ~(bfd_vma) 0x3fffff) | ((relocation >> 10) & 0x3fffff);
2534 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2536 r = bfd_check_overflow (howto->complain_on_overflow,
2537 howto->bitsize, howto->rightshift,
2538 bfd_arch_bits_per_address (input_bfd),
2547 relocation += rel->r_addend;
2548 relocation = (relocation & 0x3ff) | 0x1c00;
2550 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
2551 x = (x & ~(bfd_vma) 0x1fff) | relocation;
2552 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2558 case R_SPARC_WDISP30:
2560 if (sec_do_relax (input_section)
2561 && rel->r_offset + 4 < input_section->_raw_size)
2565 #define XCC (2 << 20)
2566 #define COND(x) (((x)&0xf)<<25)
2567 #define CONDA COND(0x8)
2568 #define INSN_BPA (F2(0,1) | CONDA | BPRED | XCC)
2569 #define INSN_BA (F2(0,2) | CONDA)
2570 #define INSN_OR F3(2, 0x2, 0)
2571 #define INSN_NOP F2(0,4)
2575 /* If the instruction is a call with either:
2577 arithmetic instruction with rd == %o7
2578 where rs1 != %o7 and rs2 if it is register != %o7
2579 then we can optimize if the call destination is near
2580 by changing the call into a branch always. */
2581 x = bfd_get_32 (input_bfd, contents + rel->r_offset);
2582 y = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
2583 if ((x & OP(~0)) == OP(1) && (y & OP(~0)) == OP(2))
2585 if (((y & OP3(~0)) == OP3(0x3d) /* restore */
2586 || ((y & OP3(0x28)) == 0 /* arithmetic */
2587 && (y & RD(~0)) == RD(O7)))
2588 && (y & RS1(~0)) != RS1(O7)
2590 || (y & RS2(~0)) != RS2(O7)))
2594 reloc = relocation + rel->r_addend - rel->r_offset;
2595 reloc -= (input_section->output_section->vma
2596 + input_section->output_offset);
2600 /* Ensure the branch fits into simm22. */
2601 if ((reloc & ~(bfd_vma)0x7fffff)
2602 && ((reloc | 0x7fffff) != MINUS_ONE))
2606 /* Check whether it fits into simm19. */
2607 if ((reloc & 0x3c0000) == 0
2608 || (reloc & 0x3c0000) == 0x3c0000)
2609 x = INSN_BPA | (reloc & 0x7ffff); /* ba,pt %xcc */
2611 x = INSN_BA | (reloc & 0x3fffff); /* ba */
2612 bfd_put_32 (input_bfd, x, contents + rel->r_offset);
2614 if (rel->r_offset >= 4
2615 && (y & (0xffffffff ^ RS1(~0)))
2616 == (INSN_OR | RD(O7) | RS2(G0)))
2621 z = bfd_get_32 (input_bfd,
2622 contents + rel->r_offset - 4);
2623 if ((z & (0xffffffff ^ RD(~0)))
2624 != (INSN_OR | RS1(O7) | RS2(G0)))
2632 If call foo was replaced with ba, replace
2633 or %rN, %g0, %o7 with nop. */
2635 reg = (y & RS1(~0)) >> 14;
2636 if (reg != ((z & RD(~0)) >> 25)
2637 || reg == G0 || reg == O7)
2640 bfd_put_32 (input_bfd, (bfd_vma) INSN_NOP,
2641 contents + rel->r_offset + 4);
2651 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
2652 contents, rel->r_offset,
2653 relocation, rel->r_addend);
2657 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
2658 because such sections are not SEC_ALLOC and thus ld.so will
2659 not process them. */
2660 if (unresolved_reloc
2661 && !((input_section->flags & SEC_DEBUGGING) != 0
2662 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
2663 (*_bfd_error_handler)
2664 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
2665 bfd_archive_filename (input_bfd),
2666 bfd_get_section_name (input_bfd, input_section),
2667 (long) rel->r_offset,
2668 h->root.root.string);
2676 case bfd_reloc_outofrange:
2679 case bfd_reloc_overflow:
2683 /* The Solaris native linker silently disregards
2684 overflows. We don't, but this breaks stabs debugging
2685 info, whose relocations are only 32-bits wide. Ignore
2686 overflows for discarded entries. */
2687 if ((r_type == R_SPARC_32 || r_type == R_SPARC_DISP32)
2688 && _bfd_elf_section_offset (output_bfd, info, input_section,
2689 rel->r_offset) == (bfd_vma) -1)
2694 if (h->root.type == bfd_link_hash_undefweak
2695 && howto->pc_relative)
2697 /* Assume this is a call protected by other code that
2698 detect the symbol is undefined. If this is the case,
2699 we can safely ignore the overflow. If not, the
2700 program is hosed anyway, and a little warning isn't
2705 name = h->root.root.string;
2709 name = (bfd_elf_string_from_elf_section
2711 symtab_hdr->sh_link,
2716 name = bfd_section_name (input_bfd, sec);
2718 if (! ((*info->callbacks->reloc_overflow)
2719 (info, name, howto->name, (bfd_vma) 0,
2720 input_bfd, input_section, rel->r_offset)))
2730 /* Finish up dynamic symbol handling. We set the contents of various
2731 dynamic sections here. */
2734 sparc64_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
2736 struct bfd_link_info *info;
2737 struct elf_link_hash_entry *h;
2738 Elf_Internal_Sym *sym;
2742 dynobj = elf_hash_table (info)->dynobj;
2744 if (h->plt.offset != (bfd_vma) -1)
2748 Elf_Internal_Rela rela;
2751 /* This symbol has an entry in the PLT. Set it up. */
2753 BFD_ASSERT (h->dynindx != -1);
2755 splt = bfd_get_section_by_name (dynobj, ".plt");
2756 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
2757 BFD_ASSERT (splt != NULL && srela != NULL);
2759 /* Fill in the entry in the .rela.plt section. */
2761 if (h->plt.offset < LARGE_PLT_THRESHOLD)
2763 rela.r_offset = sparc64_elf_plt_entry_offset (h->plt.offset);
2768 bfd_vma max = splt->_raw_size / PLT_ENTRY_SIZE;
2769 rela.r_offset = sparc64_elf_plt_ptr_offset (h->plt.offset, max);
2770 rela.r_addend = -(sparc64_elf_plt_entry_offset (h->plt.offset) + 4)
2771 -(splt->output_section->vma + splt->output_offset);
2773 rela.r_offset += (splt->output_section->vma + splt->output_offset);
2774 rela.r_info = ELF64_R_INFO (h->dynindx, R_SPARC_JMP_SLOT);
2776 /* Adjust for the first 4 reserved elements in the .plt section
2777 when setting the offset in the .rela.plt section.
2778 Sun forgot to read their own ABI and copied elf32-sparc behaviour,
2779 thus .plt[4] has corresponding .rela.plt[0] and so on. */
2781 loc = srela->contents;
2782 loc += (h->plt.offset - 4) * sizeof (Elf64_External_Rela);
2783 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2785 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2787 /* Mark the symbol as undefined, rather than as defined in
2788 the .plt section. Leave the value alone. */
2789 sym->st_shndx = SHN_UNDEF;
2790 /* If the symbol is weak, we do need to clear the value.
2791 Otherwise, the PLT entry would provide a definition for
2792 the symbol even if the symbol wasn't defined anywhere,
2793 and so the symbol would never be NULL. */
2794 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK)
2800 if (h->got.offset != (bfd_vma) -1)
2804 Elf_Internal_Rela rela;
2807 /* This symbol has an entry in the GOT. Set it up. */
2809 sgot = bfd_get_section_by_name (dynobj, ".got");
2810 srela = bfd_get_section_by_name (dynobj, ".rela.got");
2811 BFD_ASSERT (sgot != NULL && srela != NULL);
2813 rela.r_offset = (sgot->output_section->vma
2814 + sgot->output_offset
2815 + (h->got.offset &~ (bfd_vma) 1));
2817 /* If this is a -Bsymbolic link, and the symbol is defined
2818 locally, we just want to emit a RELATIVE reloc. Likewise if
2819 the symbol was forced to be local because of a version file.
2820 The entry in the global offset table will already have been
2821 initialized in the relocate_section function. */
2823 && (info->symbolic || h->dynindx == -1)
2824 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
2826 asection *sec = h->root.u.def.section;
2827 rela.r_info = ELF64_R_INFO (0, R_SPARC_RELATIVE);
2828 rela.r_addend = (h->root.u.def.value
2829 + sec->output_section->vma
2830 + sec->output_offset);
2834 rela.r_info = ELF64_R_INFO (h->dynindx, R_SPARC_GLOB_DAT);
2838 bfd_put_64 (output_bfd, (bfd_vma) 0,
2839 sgot->contents + (h->got.offset &~ (bfd_vma) 1));
2840 loc = srela->contents;
2841 loc += srela->reloc_count++ * sizeof (Elf64_External_Rela);
2842 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2845 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
2848 Elf_Internal_Rela rela;
2851 /* This symbols needs a copy reloc. Set it up. */
2852 BFD_ASSERT (h->dynindx != -1);
2854 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2856 BFD_ASSERT (s != NULL);
2858 rela.r_offset = (h->root.u.def.value
2859 + h->root.u.def.section->output_section->vma
2860 + h->root.u.def.section->output_offset);
2861 rela.r_info = ELF64_R_INFO (h->dynindx, R_SPARC_COPY);
2863 loc = s->contents + s->reloc_count++ * sizeof (Elf64_External_Rela);
2864 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
2867 /* Mark some specially defined symbols as absolute. */
2868 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2869 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
2870 || strcmp (h->root.root.string, "_PROCEDURE_LINKAGE_TABLE_") == 0)
2871 sym->st_shndx = SHN_ABS;
2876 /* Finish up the dynamic sections. */
2879 sparc64_elf_finish_dynamic_sections (output_bfd, info)
2881 struct bfd_link_info *info;
2884 int stt_regidx = -1;
2888 dynobj = elf_hash_table (info)->dynobj;
2890 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2892 if (elf_hash_table (info)->dynamic_sections_created)
2895 Elf64_External_Dyn *dyncon, *dynconend;
2897 splt = bfd_get_section_by_name (dynobj, ".plt");
2898 BFD_ASSERT (splt != NULL && sdyn != NULL);
2900 dyncon = (Elf64_External_Dyn *) sdyn->contents;
2901 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2902 for (; dyncon < dynconend; dyncon++)
2904 Elf_Internal_Dyn dyn;
2908 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
2912 case DT_PLTGOT: name = ".plt"; size = FALSE; break;
2913 case DT_PLTRELSZ: name = ".rela.plt"; size = TRUE; break;
2914 case DT_JMPREL: name = ".rela.plt"; size = FALSE; break;
2915 case DT_SPARC_REGISTER:
2916 if (stt_regidx == -1)
2919 _bfd_elf_link_lookup_local_dynindx (info, output_bfd, -1);
2920 if (stt_regidx == -1)
2923 dyn.d_un.d_val = stt_regidx++;
2924 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2926 default: name = NULL; size = FALSE; break;
2933 s = bfd_get_section_by_name (output_bfd, name);
2939 dyn.d_un.d_ptr = s->vma;
2942 if (s->_cooked_size != 0)
2943 dyn.d_un.d_val = s->_cooked_size;
2945 dyn.d_un.d_val = s->_raw_size;
2948 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2952 /* Initialize the contents of the .plt section. */
2953 if (splt->_raw_size > 0)
2954 sparc64_elf_build_plt (output_bfd, splt->contents,
2955 (int) (splt->_raw_size / PLT_ENTRY_SIZE));
2957 elf_section_data (splt->output_section)->this_hdr.sh_entsize =
2961 /* Set the first entry in the global offset table to the address of
2962 the dynamic section. */
2963 sgot = bfd_get_section_by_name (dynobj, ".got");
2964 BFD_ASSERT (sgot != NULL);
2965 if (sgot->_raw_size > 0)
2968 bfd_put_64 (output_bfd, (bfd_vma) 0, sgot->contents);
2970 bfd_put_64 (output_bfd,
2971 sdyn->output_section->vma + sdyn->output_offset,
2975 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 8;
2980 static enum elf_reloc_type_class
2981 sparc64_elf_reloc_type_class (rela)
2982 const Elf_Internal_Rela *rela;
2984 switch ((int) ELF64_R_TYPE (rela->r_info))
2986 case R_SPARC_RELATIVE:
2987 return reloc_class_relative;
2988 case R_SPARC_JMP_SLOT:
2989 return reloc_class_plt;
2991 return reloc_class_copy;
2993 return reloc_class_normal;
2997 /* Functions for dealing with the e_flags field. */
2999 /* Merge backend specific data from an object file to the output
3000 object file when linking. */
3003 sparc64_elf_merge_private_bfd_data (ibfd, obfd)
3008 flagword new_flags, old_flags;
3011 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
3012 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
3015 new_flags = elf_elfheader (ibfd)->e_flags;
3016 old_flags = elf_elfheader (obfd)->e_flags;
3018 if (!elf_flags_init (obfd)) /* First call, no flags set */
3020 elf_flags_init (obfd) = TRUE;
3021 elf_elfheader (obfd)->e_flags = new_flags;
3024 else if (new_flags == old_flags) /* Compatible flags are ok */
3027 else /* Incompatible flags */
3031 #define EF_SPARC_ISA_EXTENSIONS \
3032 (EF_SPARC_SUN_US1 | EF_SPARC_SUN_US3 | EF_SPARC_HAL_R1)
3034 if ((ibfd->flags & DYNAMIC) != 0)
3036 /* We don't want dynamic objects memory ordering and
3037 architecture to have any role. That's what dynamic linker
3039 new_flags &= ~(EF_SPARCV9_MM | EF_SPARC_ISA_EXTENSIONS);
3040 new_flags |= (old_flags
3041 & (EF_SPARCV9_MM | EF_SPARC_ISA_EXTENSIONS));
3045 /* Choose the highest architecture requirements. */
3046 old_flags |= (new_flags & EF_SPARC_ISA_EXTENSIONS);
3047 new_flags |= (old_flags & EF_SPARC_ISA_EXTENSIONS);
3048 if ((old_flags & (EF_SPARC_SUN_US1 | EF_SPARC_SUN_US3))
3049 && (old_flags & EF_SPARC_HAL_R1))
3052 (*_bfd_error_handler)
3053 (_("%s: linking UltraSPARC specific with HAL specific code"),
3054 bfd_archive_filename (ibfd));
3056 /* Choose the most restrictive memory ordering. */
3057 old_mm = (old_flags & EF_SPARCV9_MM);
3058 new_mm = (new_flags & EF_SPARCV9_MM);
3059 old_flags &= ~EF_SPARCV9_MM;
3060 new_flags &= ~EF_SPARCV9_MM;
3061 if (new_mm < old_mm)
3063 old_flags |= old_mm;
3064 new_flags |= old_mm;
3067 /* Warn about any other mismatches */
3068 if (new_flags != old_flags)
3071 (*_bfd_error_handler)
3072 (_("%s: uses different e_flags (0x%lx) fields than previous modules (0x%lx)"),
3073 bfd_archive_filename (ibfd), (long) new_flags, (long) old_flags);
3076 elf_elfheader (obfd)->e_flags = old_flags;
3080 bfd_set_error (bfd_error_bad_value);
3087 /* MARCO: Set the correct entry size for the .stab section. */
3090 sparc64_elf_fake_sections (abfd, hdr, sec)
3091 bfd *abfd ATTRIBUTE_UNUSED;
3092 Elf_Internal_Shdr *hdr ATTRIBUTE_UNUSED;
3097 name = bfd_get_section_name (abfd, sec);
3099 if (strcmp (name, ".stab") == 0)
3101 /* Even in the 64bit case the stab entries are only 12 bytes long. */
3102 elf_section_data (sec)->this_hdr.sh_entsize = 12;
3108 /* Print a STT_REGISTER symbol to file FILE. */
3111 sparc64_elf_print_symbol_all (abfd, filep, symbol)
3112 bfd *abfd ATTRIBUTE_UNUSED;
3116 FILE *file = (FILE *) filep;
3119 if (ELF_ST_TYPE (((elf_symbol_type *) symbol)->internal_elf_sym.st_info)
3123 reg = ((elf_symbol_type *) symbol)->internal_elf_sym.st_value;
3124 type = symbol->flags;
3125 fprintf (file, "REG_%c%c%11s%c%c R", "GOLI" [reg / 8], '0' + (reg & 7), "",
3127 ? (type & BSF_GLOBAL) ? '!' : 'l'
3128 : (type & BSF_GLOBAL) ? 'g' : ' '),
3129 (type & BSF_WEAK) ? 'w' : ' ');
3130 if (symbol->name == NULL || symbol->name [0] == '\0')
3133 return symbol->name;
3136 /* Set the right machine number for a SPARC64 ELF file. */
3139 sparc64_elf_object_p (abfd)
3142 unsigned long mach = bfd_mach_sparc_v9;
3144 if (elf_elfheader (abfd)->e_flags & EF_SPARC_SUN_US3)
3145 mach = bfd_mach_sparc_v9b;
3146 else if (elf_elfheader (abfd)->e_flags & EF_SPARC_SUN_US1)
3147 mach = bfd_mach_sparc_v9a;
3148 return bfd_default_set_arch_mach (abfd, bfd_arch_sparc, mach);
3151 /* Relocations in the 64 bit SPARC ELF ABI are more complex than in
3152 standard ELF, because R_SPARC_OLO10 has secondary addend in
3153 ELF64_R_TYPE_DATA field. This structure is used to redirect the
3154 relocation handling routines. */
3156 const struct elf_size_info sparc64_elf_size_info =
3158 sizeof (Elf64_External_Ehdr),
3159 sizeof (Elf64_External_Phdr),
3160 sizeof (Elf64_External_Shdr),
3161 sizeof (Elf64_External_Rel),
3162 sizeof (Elf64_External_Rela),
3163 sizeof (Elf64_External_Sym),
3164 sizeof (Elf64_External_Dyn),
3165 sizeof (Elf_External_Note),
3166 4, /* hash-table entry size. */
3167 /* Internal relocations per external relocations.
3168 For link purposes we use just 1 internal per
3169 1 external, for assembly and slurp symbol table
3172 64, /* arch_size. */
3173 3, /* log_file_align. */
3176 bfd_elf64_write_out_phdrs,
3177 bfd_elf64_write_shdrs_and_ehdr,
3178 sparc64_elf_write_relocs,
3179 bfd_elf64_swap_symbol_in,
3180 bfd_elf64_swap_symbol_out,
3181 sparc64_elf_slurp_reloc_table,
3182 bfd_elf64_slurp_symbol_table,
3183 bfd_elf64_swap_dyn_in,
3184 bfd_elf64_swap_dyn_out,
3185 bfd_elf64_swap_reloc_in,
3186 bfd_elf64_swap_reloc_out,
3187 bfd_elf64_swap_reloca_in,
3188 bfd_elf64_swap_reloca_out
3191 #define TARGET_BIG_SYM bfd_elf64_sparc_vec
3192 #define TARGET_BIG_NAME "elf64-sparc"
3193 #define ELF_ARCH bfd_arch_sparc
3194 #define ELF_MAXPAGESIZE 0x100000
3196 /* This is the official ABI value. */
3197 #define ELF_MACHINE_CODE EM_SPARCV9
3199 /* This is the value that we used before the ABI was released. */
3200 #define ELF_MACHINE_ALT1 EM_OLD_SPARCV9
3202 #define bfd_elf64_bfd_link_hash_table_create \
3203 sparc64_elf_bfd_link_hash_table_create
3205 #define elf_info_to_howto \
3206 sparc64_elf_info_to_howto
3207 #define bfd_elf64_get_reloc_upper_bound \
3208 sparc64_elf_get_reloc_upper_bound
3209 #define bfd_elf64_get_dynamic_reloc_upper_bound \
3210 sparc64_elf_get_dynamic_reloc_upper_bound
3211 #define bfd_elf64_canonicalize_reloc \
3212 sparc64_elf_canonicalize_reloc
3213 #define bfd_elf64_canonicalize_dynamic_reloc \
3214 sparc64_elf_canonicalize_dynamic_reloc
3215 #define bfd_elf64_bfd_reloc_type_lookup \
3216 sparc64_elf_reloc_type_lookup
3217 #define bfd_elf64_bfd_relax_section \
3218 sparc64_elf_relax_section
3219 #define bfd_elf64_new_section_hook \
3220 sparc64_elf_new_section_hook
3222 #define elf_backend_create_dynamic_sections \
3223 _bfd_elf_create_dynamic_sections
3224 #define elf_backend_add_symbol_hook \
3225 sparc64_elf_add_symbol_hook
3226 #define elf_backend_get_symbol_type \
3227 sparc64_elf_get_symbol_type
3228 #define elf_backend_symbol_processing \
3229 sparc64_elf_symbol_processing
3230 #define elf_backend_check_relocs \
3231 sparc64_elf_check_relocs
3232 #define elf_backend_adjust_dynamic_symbol \
3233 sparc64_elf_adjust_dynamic_symbol
3234 #define elf_backend_size_dynamic_sections \
3235 sparc64_elf_size_dynamic_sections
3236 #define elf_backend_relocate_section \
3237 sparc64_elf_relocate_section
3238 #define elf_backend_finish_dynamic_symbol \
3239 sparc64_elf_finish_dynamic_symbol
3240 #define elf_backend_finish_dynamic_sections \
3241 sparc64_elf_finish_dynamic_sections
3242 #define elf_backend_print_symbol_all \
3243 sparc64_elf_print_symbol_all
3244 #define elf_backend_output_arch_syms \
3245 sparc64_elf_output_arch_syms
3246 #define bfd_elf64_bfd_merge_private_bfd_data \
3247 sparc64_elf_merge_private_bfd_data
3248 #define elf_backend_fake_sections \
3249 sparc64_elf_fake_sections
3251 #define elf_backend_size_info \
3252 sparc64_elf_size_info
3253 #define elf_backend_object_p \
3254 sparc64_elf_object_p
3255 #define elf_backend_reloc_type_class \
3256 sparc64_elf_reloc_type_class
3258 #define elf_backend_want_got_plt 0
3259 #define elf_backend_plt_readonly 0
3260 #define elf_backend_want_plt_sym 1
3261 #define elf_backend_rela_normal 1
3263 /* Section 5.2.4 of the ABI specifies a 256-byte boundary for the table. */
3264 #define elf_backend_plt_alignment 8
3266 #define elf_backend_got_header_size 8
3267 #define elf_backend_plt_header_size PLT_HEADER_SIZE
3269 #include "elf64-target.h"