1 /* VAX series support for 32-bit ELF
2 Copyright (C) 1993-2020 Free Software Foundation, Inc.
3 Contributed by Matt Thomas <matt@3am-software.com>.
5 This file is part of BFD, the Binary File Descriptor library.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
29 static reloc_howto_type
*reloc_type_lookup (bfd
*, bfd_reloc_code_real_type
);
30 static bfd_boolean
rtype_to_howto (bfd
*, arelent
*, Elf_Internal_Rela
*);
31 static struct bfd_hash_entry
*elf_vax_link_hash_newfunc (struct bfd_hash_entry
*,
32 struct bfd_hash_table
*,
34 static struct bfd_link_hash_table
*elf_vax_link_hash_table_create (bfd
*);
35 static bfd_boolean
elf_vax_check_relocs (bfd
*, struct bfd_link_info
*,
36 asection
*, const Elf_Internal_Rela
*);
37 static bfd_boolean
elf_vax_adjust_dynamic_symbol (struct bfd_link_info
*,
38 struct elf_link_hash_entry
*);
39 static bfd_boolean
elf_vax_size_dynamic_sections (bfd
*, struct bfd_link_info
*);
40 static bfd_boolean
elf_vax_relocate_section (bfd
*, struct bfd_link_info
*,
41 bfd
*, asection
*, bfd_byte
*,
43 Elf_Internal_Sym
*, asection
**);
44 static bfd_boolean
elf_vax_finish_dynamic_symbol (bfd
*, struct bfd_link_info
*,
45 struct elf_link_hash_entry
*,
47 static bfd_boolean
elf_vax_finish_dynamic_sections (bfd
*,
48 struct bfd_link_info
*);
49 static bfd_vma
elf_vax_plt_sym_val (bfd_vma
, const asection
*,
52 static bfd_boolean
elf32_vax_set_private_flags (bfd
*, flagword
);
53 static bfd_boolean
elf32_vax_print_private_bfd_data (bfd
*, void *);
55 static reloc_howto_type howto_table
[] = {
56 HOWTO (R_VAX_NONE
, /* type */
58 3, /* size (0 = byte, 1 = short, 2 = long) */
60 FALSE
, /* pc_relative */
62 complain_overflow_dont
, /* complain_on_overflow */
63 bfd_elf_generic_reloc
, /* special_function */
64 "R_VAX_NONE", /* name */
65 FALSE
, /* partial_inplace */
67 0x00000000, /* dst_mask */
68 FALSE
), /* pcrel_offset */
70 HOWTO (R_VAX_32
, /* type */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
74 FALSE
, /* pc_relative */
76 complain_overflow_bitfield
, /* complain_on_overflow */
77 bfd_elf_generic_reloc
, /* special_function */
78 "R_VAX_32", /* name */
79 FALSE
, /* partial_inplace */
81 0xffffffff, /* dst_mask */
82 FALSE
), /* pcrel_offset */
84 HOWTO (R_VAX_16
, /* type */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
88 FALSE
, /* pc_relative */
90 complain_overflow_bitfield
, /* complain_on_overflow */
91 bfd_elf_generic_reloc
, /* special_function */
92 "R_VAX_16", /* name */
93 FALSE
, /* partial_inplace */
95 0x0000ffff, /* dst_mask */
96 FALSE
), /* pcrel_offset */
98 HOWTO (R_VAX_8
, /* type */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
102 FALSE
, /* pc_relative */
104 complain_overflow_bitfield
, /* complain_on_overflow */
105 bfd_elf_generic_reloc
, /* special_function */
106 "R_VAX_8", /* name */
107 FALSE
, /* partial_inplace */
109 0x000000ff, /* dst_mask */
110 FALSE
), /* pcrel_offset */
112 HOWTO (R_VAX_PC32
, /* type */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
116 TRUE
, /* pc_relative */
118 complain_overflow_bitfield
, /* complain_on_overflow */
119 bfd_elf_generic_reloc
, /* special_function */
120 "R_VAX_PC32", /* name */
121 FALSE
, /* partial_inplace */
123 0xffffffff, /* dst_mask */
124 TRUE
), /* pcrel_offset */
126 HOWTO (R_VAX_PC16
, /* type */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
130 TRUE
, /* pc_relative */
132 complain_overflow_signed
, /* complain_on_overflow */
133 bfd_elf_generic_reloc
, /* special_function */
134 "R_VAX_PC16", /* name */
135 FALSE
, /* partial_inplace */
137 0x0000ffff, /* dst_mask */
138 TRUE
), /* pcrel_offset */
140 HOWTO (R_VAX_PC8
, /* type */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
144 TRUE
, /* pc_relative */
146 complain_overflow_signed
, /* complain_on_overflow */
147 bfd_elf_generic_reloc
, /* special_function */
148 "R_VAX_PC8", /* name */
149 FALSE
, /* partial_inplace */
151 0x000000ff, /* dst_mask */
152 TRUE
), /* pcrel_offset */
154 HOWTO (R_VAX_GOT32
, /* type */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
158 TRUE
, /* pc_relative */
160 complain_overflow_bitfield
, /* complain_on_overflow */
161 bfd_elf_generic_reloc
, /* special_function */
162 "R_VAX_GOT32", /* name */
163 FALSE
, /* partial_inplace */
165 0xffffffff, /* dst_mask */
166 TRUE
), /* pcrel_offset */
174 HOWTO (R_VAX_PLT32
, /* type */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
178 TRUE
, /* pc_relative */
180 complain_overflow_bitfield
, /* complain_on_overflow */
181 bfd_elf_generic_reloc
, /* special_function */
182 "R_VAX_PLT32", /* name */
183 FALSE
, /* partial_inplace */
185 0xffffffff, /* dst_mask */
186 TRUE
), /* pcrel_offset */
194 HOWTO (R_VAX_COPY
, /* type */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
198 FALSE
, /* pc_relative */
200 complain_overflow_dont
, /* complain_on_overflow */
201 bfd_elf_generic_reloc
, /* special_function */
202 "R_VAX_COPY", /* name */
203 FALSE
, /* partial_inplace */
205 0xffffffff, /* dst_mask */
206 FALSE
), /* pcrel_offset */
208 HOWTO (R_VAX_GLOB_DAT
, /* type */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
212 FALSE
, /* pc_relative */
214 complain_overflow_dont
, /* complain_on_overflow */
215 bfd_elf_generic_reloc
, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
217 FALSE
, /* partial_inplace */
219 0xffffffff, /* dst_mask */
220 FALSE
), /* pcrel_offset */
222 HOWTO (R_VAX_JMP_SLOT
, /* type */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
226 FALSE
, /* pc_relative */
228 complain_overflow_dont
, /* complain_on_overflow */
229 bfd_elf_generic_reloc
, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
231 FALSE
, /* partial_inplace */
233 0xffffffff, /* dst_mask */
234 FALSE
), /* pcrel_offset */
236 HOWTO (R_VAX_RELATIVE
, /* type */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
240 FALSE
, /* pc_relative */
242 complain_overflow_dont
, /* complain_on_overflow */
243 bfd_elf_generic_reloc
, /* special_function */
244 "R_VAX_RELATIVE", /* name */
245 FALSE
, /* partial_inplace */
247 0xffffffff, /* dst_mask */
248 FALSE
), /* pcrel_offset */
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT
, /* type */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
255 FALSE
, /* pc_relative */
257 complain_overflow_dont
, /* complain_on_overflow */
258 NULL
, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
260 FALSE
, /* partial_inplace */
263 FALSE
), /* pcrel_offset */
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY
, /* type */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
270 FALSE
, /* pc_relative */
272 complain_overflow_dont
, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn
, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
275 FALSE
, /* partial_inplace */
278 FALSE
), /* pcrel_offset */
282 rtype_to_howto (bfd
*abfd
, arelent
*cache_ptr
, Elf_Internal_Rela
*dst
)
286 r_type
= ELF32_R_TYPE (dst
->r_info
);
287 if (r_type
>= R_VAX_max
)
289 /* xgettext:c-format */
290 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
292 bfd_set_error (bfd_error_bad_value
);
295 cache_ptr
->howto
= &howto_table
[r_type
];
299 #define elf_info_to_howto rtype_to_howto
303 bfd_reloc_code_real_type bfd_val
;
306 { BFD_RELOC_NONE
, R_VAX_NONE
},
307 { BFD_RELOC_32
, R_VAX_32
},
308 { BFD_RELOC_16
, R_VAX_16
},
309 { BFD_RELOC_8
, R_VAX_8
},
310 { BFD_RELOC_32_PCREL
, R_VAX_PC32
},
311 { BFD_RELOC_16_PCREL
, R_VAX_PC16
},
312 { BFD_RELOC_8_PCREL
, R_VAX_PC8
},
313 { BFD_RELOC_32_GOT_PCREL
, R_VAX_GOT32
},
314 { BFD_RELOC_32_PLT_PCREL
, R_VAX_PLT32
},
315 { BFD_RELOC_NONE
, R_VAX_COPY
},
316 { BFD_RELOC_VAX_GLOB_DAT
, R_VAX_GLOB_DAT
},
317 { BFD_RELOC_VAX_JMP_SLOT
, R_VAX_JMP_SLOT
},
318 { BFD_RELOC_VAX_RELATIVE
, R_VAX_RELATIVE
},
319 { BFD_RELOC_CTOR
, R_VAX_32
},
320 { BFD_RELOC_VTABLE_INHERIT
, R_VAX_GNU_VTINHERIT
},
321 { BFD_RELOC_VTABLE_ENTRY
, R_VAX_GNU_VTENTRY
},
324 static reloc_howto_type
*
325 reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
, bfd_reloc_code_real_type code
)
328 for (i
= 0; i
< sizeof (reloc_map
) / sizeof (reloc_map
[0]); i
++)
330 if (reloc_map
[i
].bfd_val
== code
)
331 return &howto_table
[reloc_map
[i
].elf_val
];
336 static reloc_howto_type
*
337 reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
342 for (i
= 0; i
< sizeof (howto_table
) / sizeof (howto_table
[0]); i
++)
343 if (howto_table
[i
].name
!= NULL
344 && strcasecmp (howto_table
[i
].name
, r_name
) == 0)
345 return &howto_table
[i
];
350 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
351 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
352 #define ELF_ARCH bfd_arch_vax
353 /* end code generated by elf.el */
355 /* Functions for the VAX ELF linker. */
357 /* The name of the dynamic interpreter. This is put in the .interp
360 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
362 /* The size in bytes of an entry in the procedure linkage table. */
364 #define PLT_ENTRY_SIZE 12
366 /* The first entry in a procedure linkage table looks like this. See
367 the SVR4 ABI VAX supplement to see how this works. */
369 static const bfd_byte elf_vax_plt0_entry
[PLT_ENTRY_SIZE
] =
371 0xdd, 0xef, /* pushl l^ */
372 0, 0, 0, 0, /* offset to .plt.got + 4 */
373 0x17, 0xff, /* jmp @L^(pc) */
374 0, 0, 0, 0, /* offset to .plt.got + 8 */
377 /* Subsequent entries in a procedure linkage table look like this. */
379 static const bfd_byte elf_vax_plt_entry
[PLT_ENTRY_SIZE
] =
381 0xfc, 0x0f, /* .word ^M<r11:r2> */
382 0x16, 0xef, /* jsb L^(pc) */
383 0, 0, 0, 0, /* replaced with offset to start of .plt */
384 0, 0, 0, 0, /* index into .rela.plt */
387 /* The VAX linker needs to keep track of the number of relocs that it
388 decides to copy in check_relocs for each symbol. This is so that it
389 can discard PC relative relocs if it doesn't need them when linking
390 with -Bsymbolic. We store the information in a field extending the
391 regular ELF linker hash table. */
393 /* This structure keeps track of the number of PC relative relocs we have
394 copied for a given symbol. */
396 struct elf_vax_pcrel_relocs_copied
399 struct elf_vax_pcrel_relocs_copied
*next
;
400 /* A section in dynobj. */
402 /* Number of relocs copied in this section. */
406 /* VAX ELF linker hash entry. */
408 struct elf_vax_link_hash_entry
410 struct elf_link_hash_entry root
;
412 /* Number of PC relative relocs copied for this symbol. */
413 struct elf_vax_pcrel_relocs_copied
*pcrel_relocs_copied
;
418 /* Declare this now that the above structures are defined. */
420 static bfd_boolean
elf_vax_discard_copies (struct elf_vax_link_hash_entry
*,
423 /* Declare this now that the above structures are defined. */
425 static bfd_boolean
elf_vax_instantiate_got_entries (struct elf_link_hash_entry
*,
428 /* Traverse an VAX ELF linker hash table. */
430 #define elf_vax_link_hash_traverse(table, func, info) \
431 (elf_link_hash_traverse \
433 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
436 /* Create an entry in an VAX ELF linker hash table. */
438 static struct bfd_hash_entry
*
439 elf_vax_link_hash_newfunc (struct bfd_hash_entry
*entry
,
440 struct bfd_hash_table
*table
,
443 struct elf_vax_link_hash_entry
*ret
=
444 (struct elf_vax_link_hash_entry
*) entry
;
446 /* Allocate the structure if it has not already been allocated by a
449 ret
= ((struct elf_vax_link_hash_entry
*)
450 bfd_hash_allocate (table
,
451 sizeof (struct elf_vax_link_hash_entry
)));
453 return (struct bfd_hash_entry
*) ret
;
455 /* Call the allocation method of the superclass. */
456 ret
= ((struct elf_vax_link_hash_entry
*)
457 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry
*) ret
,
461 ret
->pcrel_relocs_copied
= NULL
;
464 return (struct bfd_hash_entry
*) ret
;
467 /* Create an VAX ELF linker hash table. */
469 static struct bfd_link_hash_table
*
470 elf_vax_link_hash_table_create (bfd
*abfd
)
472 struct elf_link_hash_table
*ret
;
473 size_t amt
= sizeof (struct elf_link_hash_table
);
475 ret
= bfd_zmalloc (amt
);
479 if (!_bfd_elf_link_hash_table_init (ret
, abfd
,
480 elf_vax_link_hash_newfunc
,
481 sizeof (struct elf_vax_link_hash_entry
),
491 /* Keep vax-specific flags in the ELF header */
493 elf32_vax_set_private_flags (bfd
*abfd
, flagword flags
)
495 elf_elfheader (abfd
)->e_flags
= flags
;
496 elf_flags_init (abfd
) = TRUE
;
500 /* Merge backend specific data from an object file to the output
501 object file when linking. */
503 elf32_vax_merge_private_bfd_data (bfd
*ibfd
, struct bfd_link_info
*info
)
505 bfd
*obfd
= info
->output_bfd
;
508 if ( bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
512 in_flags
= elf_elfheader (ibfd
)->e_flags
;
514 if (!elf_flags_init (obfd
))
516 elf_flags_init (obfd
) = TRUE
;
517 elf_elfheader (obfd
)->e_flags
= in_flags
;
523 /* Display the flags field */
525 elf32_vax_print_private_bfd_data (bfd
*abfd
, void * ptr
)
527 FILE *file
= (FILE *) ptr
;
529 BFD_ASSERT (abfd
!= NULL
&& ptr
!= NULL
);
531 /* Print normal ELF private data. */
532 _bfd_elf_print_private_bfd_data (abfd
, ptr
);
534 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
536 /* xgettext:c-format */
537 fprintf (file
, _("private flags = %lx:"), elf_elfheader (abfd
)->e_flags
);
539 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_NONPIC
)
540 fprintf (file
, _(" [nonpic]"));
542 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_DFLOAT
)
543 fprintf (file
, _(" [d-float]"));
545 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_GFLOAT
)
546 fprintf (file
, _(" [g-float]"));
552 /* Look through the relocs for a section during the first phase, and
553 allocate space in the global offset table or procedure linkage
557 elf_vax_check_relocs (bfd
*abfd
, struct bfd_link_info
*info
, asection
*sec
,
558 const Elf_Internal_Rela
*relocs
)
561 Elf_Internal_Shdr
*symtab_hdr
;
562 struct elf_link_hash_entry
**sym_hashes
;
563 const Elf_Internal_Rela
*rel
;
564 const Elf_Internal_Rela
*rel_end
;
567 if (bfd_link_relocatable (info
))
570 dynobj
= elf_hash_table (info
)->dynobj
;
571 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
572 sym_hashes
= elf_sym_hashes (abfd
);
576 rel_end
= relocs
+ sec
->reloc_count
;
577 for (rel
= relocs
; rel
< rel_end
; rel
++)
579 unsigned long r_symndx
;
580 struct elf_link_hash_entry
*h
;
582 r_symndx
= ELF32_R_SYM (rel
->r_info
);
584 if (r_symndx
< symtab_hdr
->sh_info
)
588 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
589 while (h
->root
.type
== bfd_link_hash_indirect
590 || h
->root
.type
== bfd_link_hash_warning
)
591 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
594 switch (ELF32_R_TYPE (rel
->r_info
))
597 BFD_ASSERT (h
!= NULL
);
599 /* If this is a local symbol, we resolve it directly without
600 creating a global offset table entry. */
602 || h
== elf_hash_table (info
)->hgot
603 || h
== elf_hash_table (info
)->hplt
)
606 /* This symbol requires a global offset table entry. */
610 /* Create the .got section. */
611 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
612 if (!_bfd_elf_create_got_section (dynobj
, info
))
618 struct elf_vax_link_hash_entry
*eh
;
620 eh
= (struct elf_vax_link_hash_entry
*) h
;
621 if (h
->got
.refcount
== -1)
624 eh
->got_addend
= rel
->r_addend
;
629 if (eh
->got_addend
!= (bfd_vma
) rel
->r_addend
)
631 /* xgettext:c-format */
632 (_("%pB: warning: GOT addend of %" PRId64
" to `%s' does"
633 " not match previous GOT addend of %" PRId64
),
634 abfd
, (int64_t) rel
->r_addend
, h
->root
.root
.string
,
635 (int64_t) eh
->got_addend
);
642 /* This symbol requires a procedure linkage table entry. We
643 actually build the entry in adjust_dynamic_symbol,
644 because this might be a case of linking PIC code which is
645 never referenced by a dynamic object, in which case we
646 don't need to generate a procedure linkage table entry
648 BFD_ASSERT (h
!= NULL
);
650 /* If this is a local symbol, we resolve it directly without
651 creating a procedure linkage table entry. */
656 if (h
->plt
.refcount
== -1)
665 /* If we are creating a shared library and this is not a local
666 symbol, we need to copy the reloc into the shared library.
667 However when linking with -Bsymbolic and this is a global
668 symbol which is defined in an object we are including in the
669 link (i.e., DEF_REGULAR is set), then we can resolve the
670 reloc directly. At this point we have not seen all the input
671 files, so it is possible that DEF_REGULAR is not set now but
672 will be set later (it is never cleared). We account for that
673 possibility below by storing information in the
674 pcrel_relocs_copied field of the hash table entry. */
675 if (!(bfd_link_pic (info
)
676 && (sec
->flags
& SEC_ALLOC
) != 0
679 || !h
->def_regular
)))
682 && ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
685 /* Make sure a plt entry is created for this symbol if
686 it turns out to be a function defined by a dynamic
688 if (h
->plt
.refcount
== -1)
695 /* If this is a local symbol, we can resolve it directly. */
697 && (ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
705 if (h
!= NULL
&& ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
)
707 /* Make sure a plt entry is created for this symbol if it
708 turns out to be a function defined by a dynamic object. */
709 if (h
->plt
.refcount
== -1)
715 /* Non-GOT reference may need a copy reloc in executable or
716 a dynamic reloc in shared library. */
720 /* If we are creating a shared library, we need to copy the
721 reloc into the shared library. */
722 if (bfd_link_pic (info
)
723 && (sec
->flags
& SEC_ALLOC
) != 0)
725 /* When creating a shared object, we must copy these
726 reloc types into the output file. We create a reloc
727 section in dynobj and make room for this reloc. */
730 sreloc
= _bfd_elf_make_dynamic_reloc_section
731 (sec
, dynobj
, 2, abfd
, /*rela?*/ TRUE
);
736 if (sec
->flags
& SEC_READONLY
)
737 info
->flags
|= DF_TEXTREL
;
740 sreloc
->size
+= sizeof (Elf32_External_Rela
);
742 /* If we are linking with -Bsymbolic, we count the number of
743 PC relative relocations we have entered for this symbol,
744 so that we can discard them again if the symbol is later
745 defined by a regular object. Note that this function is
746 only called if we are using a vaxelf linker hash table,
747 which means that h is really a pointer to an
748 elf_vax_link_hash_entry. */
749 if ((ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC8
750 || ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC16
751 || ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC32
)
754 struct elf_vax_link_hash_entry
*eh
;
755 struct elf_vax_pcrel_relocs_copied
*p
;
757 eh
= (struct elf_vax_link_hash_entry
*) h
;
759 for (p
= eh
->pcrel_relocs_copied
; p
!= NULL
; p
= p
->next
)
760 if (p
->section
== sreloc
)
765 p
= ((struct elf_vax_pcrel_relocs_copied
*)
766 bfd_alloc (dynobj
, (bfd_size_type
) sizeof *p
));
769 p
->next
= eh
->pcrel_relocs_copied
;
770 eh
->pcrel_relocs_copied
= p
;
781 /* This relocation describes the C++ object vtable hierarchy.
782 Reconstruct it for later use during GC. */
783 case R_VAX_GNU_VTINHERIT
:
784 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
788 /* This relocation describes which C++ vtable entries are actually
789 used. Record for later use during GC. */
790 case R_VAX_GNU_VTENTRY
:
791 if (!bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
803 /* Return the section that should be marked against GC for a given
807 elf_vax_gc_mark_hook (asection
*sec
,
808 struct bfd_link_info
*info
,
809 Elf_Internal_Rela
*rel
,
810 struct elf_link_hash_entry
*h
,
811 Elf_Internal_Sym
*sym
)
814 switch (ELF32_R_TYPE (rel
->r_info
))
816 case R_VAX_GNU_VTINHERIT
:
817 case R_VAX_GNU_VTENTRY
:
821 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
824 /* Adjust a symbol defined by a dynamic object and referenced by a
825 regular object. The current definition is in some section of the
826 dynamic object, but we're not including those sections. We have to
827 change the definition to something the rest of the link can
831 elf_vax_adjust_dynamic_symbol (struct bfd_link_info
*info
,
832 struct elf_link_hash_entry
*h
)
837 dynobj
= elf_hash_table (info
)->dynobj
;
839 /* Make sure we know what is going on here. */
840 BFD_ASSERT (dynobj
!= NULL
845 && !h
->def_regular
)));
847 /* If this is a function, put it in the procedure linkage table. We
848 will fill in the contents of the procedure linkage table later,
849 when we know the address of the .got section. */
850 if (h
->type
== STT_FUNC
853 if (h
->plt
.refcount
<= 0
854 || SYMBOL_CALLS_LOCAL (info
, h
)
855 || (ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
856 && h
->root
.type
== bfd_link_hash_undefweak
))
858 /* This case can occur if we saw a PLTxx reloc in an input
859 file, but the symbol was never referred to by a dynamic
860 object, or if all references were garbage collected. In
861 such a case, we don't actually need to build a procedure
862 linkage table, and we can just do a PCxx reloc instead. */
863 h
->plt
.offset
= (bfd_vma
) -1;
868 s
= elf_hash_table (info
)->splt
;
869 BFD_ASSERT (s
!= NULL
);
871 /* If this is the first .plt entry, make room for the special
875 s
->size
+= PLT_ENTRY_SIZE
;
878 /* If this symbol is not defined in a regular file, and we are
879 not generating a shared library, then set the symbol to this
880 location in the .plt. This is required to make function
881 pointers compare as equal between the normal executable and
882 the shared library. */
883 if (!bfd_link_pic (info
)
886 h
->root
.u
.def
.section
= s
;
887 h
->root
.u
.def
.value
= s
->size
;
890 h
->plt
.offset
= s
->size
;
892 /* Make room for this entry. */
893 s
->size
+= PLT_ENTRY_SIZE
;
895 /* We also need to make an entry in the .got.plt section, which
896 will be placed in the .got section by the linker script. */
898 s
= elf_hash_table (info
)->sgotplt
;
899 BFD_ASSERT (s
!= NULL
);
902 /* We also need to make an entry in the .rela.plt section. */
904 s
= elf_hash_table (info
)->srelplt
;
905 BFD_ASSERT (s
!= NULL
);
906 s
->size
+= sizeof (Elf32_External_Rela
);
911 /* Reinitialize the plt offset now that it is not used as a reference
913 h
->plt
.offset
= (bfd_vma
) -1;
915 /* If this is a weak symbol, and there is a real definition, the
916 processor independent code will have arranged for us to see the
917 real definition first, and we can just use the same value. */
920 struct elf_link_hash_entry
*def
= weakdef (h
);
921 BFD_ASSERT (def
->root
.type
== bfd_link_hash_defined
);
922 h
->root
.u
.def
.section
= def
->root
.u
.def
.section
;
923 h
->root
.u
.def
.value
= def
->root
.u
.def
.value
;
927 /* This is a reference to a symbol defined by a dynamic object which
928 is not a function. */
930 /* If we are creating a shared library, we must presume that the
931 only references to the symbol are via the global offset table.
932 For such cases we need not do anything here; the relocations will
933 be handled correctly by relocate_section. */
934 if (bfd_link_pic (info
))
937 /* If there are no references to this symbol that do not use the
938 GOT relocation, we don't need to generate a copy reloc. */
942 /* We must allocate the symbol in our .dynbss section, which will
943 become part of the .bss section of the executable. There will be
944 an entry for this symbol in the .dynsym section. The dynamic
945 object will contain position independent code, so all references
946 from the dynamic object to this symbol will go through the global
947 offset table. The dynamic linker will use the .dynsym entry to
948 determine the address it must put in the global offset table, so
949 both the dynamic object and the regular object will refer to the
950 same memory location for the variable. */
952 s
= bfd_get_linker_section (dynobj
, ".dynbss");
953 BFD_ASSERT (s
!= NULL
);
955 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
956 copy the initial value out of the dynamic object and into the
957 runtime process image. We need to remember the offset into the
958 .rela.bss section we are going to use. */
959 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0 && h
->size
!= 0)
963 srel
= bfd_get_linker_section (dynobj
, ".rela.bss");
964 BFD_ASSERT (srel
!= NULL
);
965 srel
->size
+= sizeof (Elf32_External_Rela
);
969 return _bfd_elf_adjust_dynamic_copy (info
, h
, s
);
972 /* This function is called via elf_link_hash_traverse. It resets GOT
973 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
977 elf_vax_discard_got_entries (struct elf_link_hash_entry
*h
,
978 void *infoptr ATTRIBUTE_UNUSED
)
980 h
->got
.refcount
= -1;
981 h
->plt
.refcount
= -1;
986 /* Discard unused dynamic data if this is a static link. */
989 elf_vax_always_size_sections (bfd
*output_bfd ATTRIBUTE_UNUSED
,
990 struct bfd_link_info
*info
)
995 dynobj
= elf_hash_table (info
)->dynobj
;
997 if (dynobj
&& !elf_hash_table (info
)->dynamic_sections_created
)
999 /* We may have created entries in the .rela.got and .got sections.
1000 However, if we are not creating the dynamic sections, we will
1001 not actually use these entries. Reset the size of .rela.got
1002 and .got, which will cause them to get stripped from the output
1004 s
= elf_hash_table (info
)->srelgot
;
1007 s
= elf_hash_table (info
)->sgotplt
;
1010 s
= elf_hash_table (info
)->sgot
;
1015 /* If this is a static link, we need to discard all the got entries we've
1017 if (!dynobj
|| !elf_hash_table (info
)->dynamic_sections_created
)
1018 elf_link_hash_traverse (elf_hash_table (info
),
1019 elf_vax_discard_got_entries
,
1025 /* Set the sizes of the dynamic sections. */
1028 elf_vax_size_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
1034 bfd_boolean reltext
;
1036 dynobj
= elf_hash_table (info
)->dynobj
;
1037 BFD_ASSERT (dynobj
!= NULL
);
1039 if (elf_hash_table (info
)->dynamic_sections_created
)
1041 /* Set the contents of the .interp section to the interpreter. */
1042 if (bfd_link_executable (info
) && !info
->nointerp
)
1044 s
= bfd_get_linker_section (dynobj
, ".interp");
1045 BFD_ASSERT (s
!= NULL
);
1046 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
1047 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
1051 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1052 relative relocs against symbols defined in a regular object. We
1053 allocated space for them in the check_relocs routine, but we will not
1054 fill them in in the relocate_section routine. */
1055 if (bfd_link_pic (info
) && info
->symbolic
)
1056 elf_vax_link_hash_traverse (elf_hash_table (info
),
1057 elf_vax_discard_copies
,
1060 /* If this is a -Bsymbolic shared link, we need to discard all the got
1061 entries we've recorded. Otherwise, we need to instantiate (allocate
1063 elf_link_hash_traverse (elf_hash_table (info
),
1064 elf_vax_instantiate_got_entries
,
1067 /* The check_relocs and adjust_dynamic_symbol entry points have
1068 determined the sizes of the various dynamic sections. Allocate
1073 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
1077 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
1080 /* It's OK to base decisions on the section name, because none
1081 of the dynobj section names depend upon the input files. */
1082 name
= bfd_section_name (s
);
1084 if (strcmp (name
, ".plt") == 0)
1086 /* Remember whether there is a PLT. */
1089 else if (CONST_STRNEQ (name
, ".rela"))
1095 /* Remember whether there are any reloc sections other
1097 if (strcmp (name
, ".rela.plt") != 0)
1099 const char *outname
;
1103 /* If this relocation section applies to a read only
1104 section, then we probably need a DT_TEXTREL
1105 entry. .rela.plt is actually associated with
1106 .got.plt, which is never readonly. */
1107 outname
= bfd_section_name (s
->output_section
);
1108 target
= bfd_get_section_by_name (output_bfd
, outname
+ 5);
1110 && (target
->flags
& SEC_READONLY
) != 0
1111 && (target
->flags
& SEC_ALLOC
) != 0)
1115 /* We use the reloc_count field as a counter if we need
1116 to copy relocs into the output file. */
1120 else if (! CONST_STRNEQ (name
, ".got")
1121 && strcmp (name
, ".dynbss") != 0)
1123 /* It's not one of our sections, so don't allocate space. */
1129 /* If we don't need this section, strip it from the
1130 output file. This is mostly to handle .rela.bss and
1131 .rela.plt. We must create both sections in
1132 create_dynamic_sections, because they must be created
1133 before the linker maps input sections to output
1134 sections. The linker does that before
1135 adjust_dynamic_symbol is called, and it is that
1136 function which decides whether anything needs to go
1137 into these sections. */
1138 s
->flags
|= SEC_EXCLUDE
;
1142 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
1145 /* Allocate memory for the section contents. */
1146 s
->contents
= (bfd_byte
*) bfd_zalloc (dynobj
, s
->size
);
1147 if (s
->contents
== NULL
)
1151 if (elf_hash_table (info
)->dynamic_sections_created
)
1153 /* Add some entries to the .dynamic section. We fill in the
1154 values later, in elf_vax_finish_dynamic_sections, but we
1155 must add the entries now so that we get the correct size for
1156 the .dynamic section. The DT_DEBUG entry is filled in by the
1157 dynamic linker and used by the debugger. */
1158 #define add_dynamic_entry(TAG, VAL) \
1159 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1161 if (!bfd_link_pic (info
))
1163 if (!add_dynamic_entry (DT_DEBUG
, 0))
1169 if (!add_dynamic_entry (DT_PLTGOT
, 0)
1170 || !add_dynamic_entry (DT_PLTRELSZ
, 0)
1171 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
1172 || !add_dynamic_entry (DT_JMPREL
, 0))
1178 if (!add_dynamic_entry (DT_RELA
, 0)
1179 || !add_dynamic_entry (DT_RELASZ
, 0)
1180 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf32_External_Rela
)))
1184 if (reltext
|| (info
->flags
& DF_TEXTREL
) != 0)
1186 if (!add_dynamic_entry (DT_TEXTREL
, 0))
1190 #undef add_dynamic_entry
1195 /* This function is called via elf_vax_link_hash_traverse if we are
1196 creating a shared object with -Bsymbolic. It discards the space
1197 allocated to copy PC relative relocs against symbols which are defined
1198 in regular objects. We allocated space for them in the check_relocs
1199 routine, but we won't fill them in in the relocate_section routine. */
1202 elf_vax_discard_copies (struct elf_vax_link_hash_entry
*h
,
1203 void * ignore ATTRIBUTE_UNUSED
)
1205 struct elf_vax_pcrel_relocs_copied
*s
;
1207 /* We only discard relocs for symbols defined in a regular object. */
1208 if (!h
->root
.def_regular
)
1211 for (s
= h
->pcrel_relocs_copied
; s
!= NULL
; s
= s
->next
)
1212 s
->section
->size
-= s
->count
* sizeof (Elf32_External_Rela
);
1217 /* This function is called via elf_link_hash_traverse. It looks for
1218 entries that have GOT or PLT (.GOT) references. If creating a shared
1219 object with -Bsymbolic, or the symbol has been forced local, then it
1220 resets the reference count back to -1 so normal PC32 relocation will
1221 be done. Otherwise space in the .got and .rela.got will be reserved
1225 elf_vax_instantiate_got_entries (struct elf_link_hash_entry
*h
, void * infoptr
)
1227 struct bfd_link_info
*info
= (struct bfd_link_info
*) infoptr
;
1232 /* We don't care about non-GOT (and non-PLT) entries. */
1233 if (h
->got
.refcount
<= 0 && h
->plt
.refcount
<= 0)
1236 dynobj
= elf_hash_table (info
)->dynobj
;
1237 BFD_ASSERT (dynobj
!= NULL
);
1239 sgot
= elf_hash_table (info
)->sgot
;
1240 srelgot
= elf_hash_table (info
)->srelgot
;
1242 if (SYMBOL_REFERENCES_LOCAL (info
, h
))
1244 h
->got
.refcount
= -1;
1245 h
->plt
.refcount
= -1;
1247 else if (h
->got
.refcount
> 0)
1249 /* Make sure this symbol is output as a dynamic symbol. */
1250 if (h
->dynindx
== -1)
1252 if (!bfd_elf_link_record_dynamic_symbol (info
, h
))
1256 /* Allocate space in the .got and .rela.got sections. */
1258 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1264 /* Relocate an VAX ELF section. */
1267 elf_vax_relocate_section (bfd
*output_bfd
,
1268 struct bfd_link_info
*info
,
1270 asection
*input_section
,
1272 Elf_Internal_Rela
*relocs
,
1273 Elf_Internal_Sym
*local_syms
,
1274 asection
**local_sections
)
1276 Elf_Internal_Shdr
*symtab_hdr
;
1277 struct elf_link_hash_entry
**sym_hashes
;
1284 Elf_Internal_Rela
*rel
;
1285 Elf_Internal_Rela
*relend
;
1287 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
1288 sym_hashes
= elf_sym_hashes (input_bfd
);
1296 relend
= relocs
+ input_section
->reloc_count
;
1297 for (; rel
< relend
; rel
++)
1300 reloc_howto_type
*howto
;
1301 unsigned long r_symndx
;
1302 struct elf_link_hash_entry
*h
;
1303 Elf_Internal_Sym
*sym
;
1306 bfd_reloc_status_type r
;
1308 r_type
= ELF32_R_TYPE (rel
->r_info
);
1309 if (r_type
< 0 || r_type
>= (int) R_VAX_max
)
1311 bfd_set_error (bfd_error_bad_value
);
1314 howto
= howto_table
+ r_type
;
1316 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1320 if (r_symndx
< symtab_hdr
->sh_info
)
1322 sym
= local_syms
+ r_symndx
;
1323 sec
= local_sections
[r_symndx
];
1324 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
1328 bfd_boolean unresolved_reloc
;
1329 bfd_boolean warned
, ignored
;
1331 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
1332 r_symndx
, symtab_hdr
, sym_hashes
,
1334 unresolved_reloc
, warned
, ignored
);
1336 if ((h
->root
.type
== bfd_link_hash_defined
1337 || h
->root
.type
== bfd_link_hash_defweak
)
1338 && ((r_type
== R_VAX_PLT32
1339 && h
->plt
.offset
!= (bfd_vma
) -1
1341 && elf_hash_table (info
)->dynamic_sections_created
)
1342 || (r_type
== R_VAX_GOT32
1343 && h
->got
.offset
!= (bfd_vma
) -1
1345 && elf_hash_table (info
)->dynamic_sections_created
1346 && (! bfd_link_pic (info
)
1347 || (! info
->symbolic
&& h
->dynindx
!= -1)
1348 || !h
->def_regular
))
1349 || (bfd_link_pic (info
)
1350 && ((! info
->symbolic
&& h
->dynindx
!= -1)
1352 && ((input_section
->flags
& SEC_ALLOC
) != 0
1353 /* DWARF will emit R_VAX_32 relocations in its
1354 sections against symbols defined externally
1355 in shared libraries. We can't do anything
1358 || ((input_section
->flags
& SEC_DEBUGGING
) != 0
1360 && (r_type
== R_VAX_8
1361 || r_type
== R_VAX_16
1362 || r_type
== R_VAX_32
))))
1363 /* In these cases, we don't need the relocation
1364 value. We check specially because in some
1365 obscure cases sec->output_section will be NULL. */
1369 if (sec
!= NULL
&& discarded_section (sec
))
1370 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
1371 rel
, 1, relend
, howto
, 0, contents
);
1373 if (bfd_link_relocatable (info
))
1379 /* Relocation is to the address of the entry for this symbol
1380 in the global offset table. */
1382 /* Resolve a GOTxx reloc against a local symbol directly,
1383 without using the global offset table. */
1385 || h
->got
.offset
== (bfd_vma
) -1)
1391 sgot
= elf_hash_table (info
)->sgot
;
1392 BFD_ASSERT (sgot
!= NULL
);
1394 off
= h
->got
.offset
;
1395 BFD_ASSERT (off
< sgot
->size
);
1397 bfd_put_32 (output_bfd
, rel
->r_addend
, sgot
->contents
+ off
);
1399 relocation
= sgot
->output_offset
+ off
;
1400 /* The GOT relocation uses the addend. */
1403 /* Change the reference to be indirect. */
1404 contents
[rel
->r_offset
- 1] |= 0x10;
1405 relocation
+= sgot
->output_section
->vma
;
1410 /* If we are creating an executable and the function this
1411 reloc refers to is in a shared lib, then we made a PLT
1412 entry for this symbol and need to handle the reloc like
1414 if (bfd_link_pic (info
))
1415 goto r_vax_pc32_shared
;
1418 /* Relocation is to the entry for this symbol in the
1419 procedure linkage table. */
1421 /* Resolve a PLTxx reloc against a local symbol directly,
1422 without using the procedure linkage table. */
1424 || h
->plt
.offset
== (bfd_vma
) -1)
1427 splt
= elf_hash_table (info
)->splt
;
1428 BFD_ASSERT (splt
!= NULL
);
1430 sgotplt
= elf_hash_table (info
)->sgotplt
;
1431 BFD_ASSERT (sgotplt
!= NULL
);
1433 plt_index
= h
->plt
.offset
/ PLT_ENTRY_SIZE
- 1;
1435 /* Get the offset into the .got table of the entry that
1436 corresponds to this function. Each .got entry is 4 bytes.
1437 The first two are reserved. */
1438 got_offset
= (plt_index
+ 3) * 4;
1440 /* We want the relocation to point into the .got.plt instead
1441 of the plt itself. */
1442 relocation
= (sgotplt
->output_section
->vma
1443 + sgotplt
->output_offset
1445 contents
[rel
->r_offset
-1] |= 0x10; /* make indirect */
1446 if (rel
->r_addend
== 2)
1450 else if (rel
->r_addend
!= 0)
1452 /* xgettext:c-format */
1453 (_("%pB: warning: PLT addend of %" PRId64
" to `%s'"
1454 " from %pA section ignored"),
1455 input_bfd
, (int64_t) rel
->r_addend
, h
->root
.root
.string
,
1465 || ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
1472 if (bfd_link_pic (info
)
1473 && r_symndx
!= STN_UNDEF
1474 && (input_section
->flags
& SEC_ALLOC
) != 0
1475 && ((r_type
!= R_VAX_PC8
1476 && r_type
!= R_VAX_PC16
1477 && r_type
!= R_VAX_PC32
)
1478 || ((input_section
->flags
& SEC_CODE
)
1480 || (!h
->def_regular
&& h
->type
!= STT_SECTION
)))))
1482 Elf_Internal_Rela outrel
;
1484 bfd_boolean skip
, relocate
;
1486 /* When generating a shared object, these relocations
1487 are copied into the output file to be resolved at run
1491 sreloc
= _bfd_elf_get_dynamic_reloc_section
1492 (input_bfd
, input_section
, /*rela?*/ TRUE
);
1501 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
1503 if (outrel
.r_offset
== (bfd_vma
) -1)
1505 if (outrel
.r_offset
== (bfd_vma
) -2)
1506 skip
= TRUE
, relocate
= TRUE
;
1507 outrel
.r_offset
+= (input_section
->output_section
->vma
1508 + input_section
->output_offset
);
1511 memset (&outrel
, 0, sizeof outrel
);
1512 /* h->dynindx may be -1 if the symbol was marked to
1515 && ((! info
->symbolic
&& h
->dynindx
!= -1)
1516 || !h
->def_regular
))
1518 BFD_ASSERT (h
->dynindx
!= -1);
1519 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, r_type
);
1520 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1524 if (r_type
== R_VAX_32
)
1527 outrel
.r_info
= ELF32_R_INFO (0, R_VAX_RELATIVE
);
1528 BFD_ASSERT (bfd_get_signed_32 (input_bfd
,
1529 &contents
[rel
->r_offset
]) == 0);
1530 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1536 if (bfd_is_abs_section (sec
))
1538 else if (sec
== NULL
|| sec
->owner
== NULL
)
1540 bfd_set_error (bfd_error_bad_value
);
1547 /* We are turning this relocation into one
1548 against a section symbol. It would be
1549 proper to subtract the symbol's value,
1550 osec->vma, from the emitted reloc addend,
1551 but ld.so expects buggy relocs. */
1552 osec
= sec
->output_section
;
1553 indx
= elf_section_data (osec
)->dynindx
;
1556 struct elf_link_hash_table
*htab
;
1557 htab
= elf_hash_table (info
);
1558 osec
= htab
->text_index_section
;
1559 indx
= elf_section_data (osec
)->dynindx
;
1561 BFD_ASSERT (indx
!= 0);
1564 outrel
.r_info
= ELF32_R_INFO (indx
, r_type
);
1565 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1569 if ((input_section
->flags
& SEC_CODE
) != 0
1570 || (ELF32_R_TYPE (outrel
.r_info
) != R_VAX_32
1571 && ELF32_R_TYPE (outrel
.r_info
) != R_VAX_RELATIVE
1572 && ELF32_R_TYPE (outrel
.r_info
) != R_VAX_COPY
1573 && ELF32_R_TYPE (outrel
.r_info
) != R_VAX_JMP_SLOT
1574 && ELF32_R_TYPE (outrel
.r_info
) != R_VAX_GLOB_DAT
))
1578 /* xgettext:c-format */
1579 (_("%pB: warning: %s relocation against symbol `%s'"
1580 " from %pA section"),
1581 input_bfd
, howto
->name
, h
->root
.root
.string
,
1585 /* xgettext:c-format */
1586 (_("%pB: warning: %s relocation to %#" PRIx64
1587 " from %pA section"),
1588 input_bfd
, howto
->name
, (uint64_t) outrel
.r_addend
,
1591 loc
= sreloc
->contents
;
1592 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1593 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
1595 /* This reloc will be computed at runtime, so there's no
1596 need to do anything now, except for R_VAX_32
1597 relocations that have been turned into
1605 case R_VAX_GNU_VTINHERIT
:
1606 case R_VAX_GNU_VTENTRY
:
1607 /* These are no-ops in the end. */
1614 /* VAX PCREL relocations are from the end of relocation, not the start.
1615 So subtract the difference from the relocation amount since we can't
1616 add it to the offset. */
1617 if (howto
->pc_relative
&& howto
->pcrel_offset
)
1618 relocation
-= bfd_get_reloc_size(howto
);
1620 r
= _bfd_final_link_relocate (howto
, input_bfd
, input_section
,
1621 contents
, rel
->r_offset
,
1622 relocation
, rel
->r_addend
);
1624 if (r
!= bfd_reloc_ok
)
1629 case bfd_reloc_outofrange
:
1631 case bfd_reloc_overflow
:
1639 name
= bfd_elf_string_from_elf_section (input_bfd
,
1640 symtab_hdr
->sh_link
,
1645 name
= bfd_section_name (sec
);
1647 info
->callbacks
->reloc_overflow
1648 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
1649 (bfd_vma
) 0, input_bfd
, input_section
, rel
->r_offset
);
1659 /* Finish up dynamic symbol handling. We set the contents of various
1660 dynamic sections here. */
1663 elf_vax_finish_dynamic_symbol (bfd
*output_bfd
, struct bfd_link_info
*info
,
1664 struct elf_link_hash_entry
*h
,
1665 Elf_Internal_Sym
*sym
)
1669 dynobj
= elf_hash_table (info
)->dynobj
;
1671 if (h
->plt
.offset
!= (bfd_vma
) -1)
1679 Elf_Internal_Rela rela
;
1682 /* This symbol has an entry in the procedure linkage table. Set
1684 BFD_ASSERT (h
->dynindx
!= -1);
1686 splt
= elf_hash_table (info
)->splt
;
1687 sgot
= elf_hash_table (info
)->sgotplt
;
1688 srela
= elf_hash_table (info
)->srelplt
;
1689 BFD_ASSERT (splt
!= NULL
&& sgot
!= NULL
&& srela
!= NULL
);
1691 addend
= 2 * (h
->plt
.offset
& 1);
1692 h
->plt
.offset
&= ~1;
1694 /* Get the index in the procedure linkage table which
1695 corresponds to this symbol. This is the index of this symbol
1696 in all the symbols for which we are making plt entries. The
1697 first entry in the procedure linkage table is reserved. */
1698 plt_index
= h
->plt
.offset
/ PLT_ENTRY_SIZE
- 1;
1700 /* Get the offset into the .got table of the entry that
1701 corresponds to this function. Each .got entry is 4 bytes.
1702 The first two are reserved. */
1703 got_offset
= (plt_index
+ 3) * 4;
1705 /* Fill in the entry in the procedure linkage table. */
1706 memcpy (splt
->contents
+ h
->plt
.offset
, elf_vax_plt_entry
,
1709 /* The offset is relative to the first extension word. */
1710 bfd_put_32 (output_bfd
,
1711 -(h
->plt
.offset
+ 8),
1712 splt
->contents
+ h
->plt
.offset
+ 4);
1714 bfd_put_32 (output_bfd
, plt_index
* sizeof (Elf32_External_Rela
),
1715 splt
->contents
+ h
->plt
.offset
+ 8);
1717 /* Fill in the entry in the global offset table. */
1718 bfd_put_32 (output_bfd
,
1719 (splt
->output_section
->vma
1720 + splt
->output_offset
1721 + h
->plt
.offset
) + addend
,
1722 sgot
->contents
+ got_offset
);
1724 /* Fill in the entry in the .rela.plt section. */
1725 rela
.r_offset
= (sgot
->output_section
->vma
1726 + sgot
->output_offset
1728 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_JMP_SLOT
);
1729 rela
.r_addend
= addend
;
1730 loc
= srela
->contents
+ plt_index
* sizeof (Elf32_External_Rela
);
1731 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1733 if (!h
->def_regular
)
1735 /* Mark the symbol as undefined, rather than as defined in
1736 the .plt section. Leave the value alone. */
1737 sym
->st_shndx
= SHN_UNDEF
;
1741 if (h
->got
.offset
!= (bfd_vma
) -1)
1745 Elf_Internal_Rela rela
;
1748 /* This symbol has an entry in the global offset table. Set it
1750 sgot
= elf_hash_table (info
)->sgot
;
1751 srela
= elf_hash_table (info
)->srelgot
;
1752 BFD_ASSERT (sgot
!= NULL
&& srela
!= NULL
);
1754 rela
.r_offset
= (sgot
->output_section
->vma
1755 + sgot
->output_offset
1757 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_GLOB_DAT
);
1758 rela
.r_addend
= bfd_get_signed_32 (output_bfd
,
1759 sgot
->contents
+ h
->got
.offset
);
1761 loc
= srela
->contents
;
1762 loc
+= srela
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1763 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1769 Elf_Internal_Rela rela
;
1772 /* This symbol needs a copy reloc. Set it up. */
1773 BFD_ASSERT (h
->dynindx
!= -1
1774 && (h
->root
.type
== bfd_link_hash_defined
1775 || h
->root
.type
== bfd_link_hash_defweak
));
1777 s
= bfd_get_linker_section (dynobj
, ".rela.bss");
1778 BFD_ASSERT (s
!= NULL
);
1780 rela
.r_offset
= (h
->root
.u
.def
.value
1781 + h
->root
.u
.def
.section
->output_section
->vma
1782 + h
->root
.u
.def
.section
->output_offset
);
1783 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_COPY
);
1785 loc
= s
->contents
+ s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1786 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1789 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1790 if (h
== elf_hash_table (info
)->hdynamic
1791 || h
== elf_hash_table (info
)->hgot
)
1792 sym
->st_shndx
= SHN_ABS
;
1797 /* Finish up the dynamic sections. */
1800 elf_vax_finish_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
1806 dynobj
= elf_hash_table (info
)->dynobj
;
1808 sgot
= elf_hash_table (info
)->sgotplt
;
1809 BFD_ASSERT (sgot
!= NULL
);
1810 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
1812 if (elf_hash_table (info
)->dynamic_sections_created
)
1815 Elf32_External_Dyn
*dyncon
, *dynconend
;
1817 splt
= elf_hash_table (info
)->splt
;
1818 BFD_ASSERT (splt
!= NULL
&& sdyn
!= NULL
);
1820 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
1821 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
1822 for (; dyncon
< dynconend
; dyncon
++)
1824 Elf_Internal_Dyn dyn
;
1827 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
1835 s
= elf_hash_table (info
)->sgotplt
;
1838 s
= elf_hash_table (info
)->srelplt
;
1840 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
1841 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
1845 s
= elf_hash_table (info
)->srelplt
;
1846 dyn
.d_un
.d_val
= s
->size
;
1847 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
1852 /* Fill in the first entry in the procedure linkage table. */
1855 memcpy (splt
->contents
, elf_vax_plt0_entry
, PLT_ENTRY_SIZE
);
1856 bfd_put_32 (output_bfd
,
1857 (sgot
->output_section
->vma
1858 + sgot
->output_offset
+ 4
1859 - (splt
->output_section
->vma
+ 6)),
1860 splt
->contents
+ 2);
1861 bfd_put_32 (output_bfd
,
1862 (sgot
->output_section
->vma
1863 + sgot
->output_offset
+ 8
1864 - (splt
->output_section
->vma
+ 12)),
1865 splt
->contents
+ 8);
1866 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
1871 /* Fill in the first three entries in the global offset table. */
1875 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
);
1877 bfd_put_32 (output_bfd
,
1878 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
1880 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 4);
1881 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 8);
1884 if (elf_section_data (sgot
->output_section
) != NULL
)
1885 elf_section_data (sgot
->output_section
)->this_hdr
.sh_entsize
= 4;
1890 static enum elf_reloc_type_class
1891 elf_vax_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
1892 const asection
*rel_sec ATTRIBUTE_UNUSED
,
1893 const Elf_Internal_Rela
*rela
)
1895 switch ((int) ELF32_R_TYPE (rela
->r_info
))
1897 case R_VAX_RELATIVE
:
1898 return reloc_class_relative
;
1899 case R_VAX_JMP_SLOT
:
1900 return reloc_class_plt
;
1902 return reloc_class_copy
;
1904 return reloc_class_normal
;
1909 elf_vax_plt_sym_val (bfd_vma i
, const asection
*plt
,
1910 const arelent
*rel ATTRIBUTE_UNUSED
)
1912 return plt
->vma
+ (i
+ 1) * PLT_ENTRY_SIZE
;
1915 #define TARGET_LITTLE_SYM vax_elf32_vec
1916 #define TARGET_LITTLE_NAME "elf32-vax"
1917 #define ELF_MACHINE_CODE EM_VAX
1918 #define ELF_MAXPAGESIZE 0x1000
1920 #define elf_backend_create_dynamic_sections \
1921 _bfd_elf_create_dynamic_sections
1922 #define bfd_elf32_bfd_link_hash_table_create \
1923 elf_vax_link_hash_table_create
1924 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
1926 #define elf_backend_check_relocs elf_vax_check_relocs
1927 #define elf_backend_adjust_dynamic_symbol \
1928 elf_vax_adjust_dynamic_symbol
1929 #define elf_backend_always_size_sections \
1930 elf_vax_always_size_sections
1931 #define elf_backend_size_dynamic_sections \
1932 elf_vax_size_dynamic_sections
1933 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
1934 #define elf_backend_relocate_section elf_vax_relocate_section
1935 #define elf_backend_finish_dynamic_symbol \
1936 elf_vax_finish_dynamic_symbol
1937 #define elf_backend_finish_dynamic_sections \
1938 elf_vax_finish_dynamic_sections
1939 #define elf_backend_reloc_type_class elf_vax_reloc_type_class
1940 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
1941 #define elf_backend_plt_sym_val elf_vax_plt_sym_val
1942 #define bfd_elf32_bfd_merge_private_bfd_data \
1943 elf32_vax_merge_private_bfd_data
1944 #define bfd_elf32_bfd_set_private_flags \
1945 elf32_vax_set_private_flags
1946 #define bfd_elf32_bfd_print_private_bfd_data \
1947 elf32_vax_print_private_bfd_data
1949 #define elf_backend_can_gc_sections 1
1950 #define elf_backend_want_got_plt 1
1951 #define elf_backend_plt_readonly 1
1952 #define elf_backend_want_plt_sym 0
1953 #define elf_backend_got_header_size 16
1954 #define elf_backend_rela_normal 1
1955 #define elf_backend_dtrel_excludes_plt 1
1957 #include "elf32-target.h"