1 /* VAX series support for 32-bit ELF
2 Copyright (C) 1993-2022 Free Software Foundation, Inc.
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static bool rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bool elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37 static bool elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39 static bool elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static int elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44 static bool elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47 static bool elf_vax_finish_dynamic_sections (bfd *, struct bfd_link_info *);
48 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
49 const arelent *);
50
51 static bool elf32_vax_set_private_flags (bfd *, flagword);
52 static bool elf32_vax_print_private_bfd_data (bfd *, void *);
53
54 static reloc_howto_type howto_table[] = {
55 HOWTO (R_VAX_NONE, /* type */
56 0, /* rightshift */
57 0, /* size */
58 0, /* bitsize */
59 false, /* pc_relative */
60 0, /* bitpos */
61 complain_overflow_dont, /* complain_on_overflow */
62 bfd_elf_generic_reloc, /* special_function */
63 "R_VAX_NONE", /* name */
64 false, /* partial_inplace */
65 0, /* src_mask */
66 0x00000000, /* dst_mask */
67 false), /* pcrel_offset */
68
69 HOWTO (R_VAX_32, /* type */
70 0, /* rightshift */
71 4, /* size */
72 32, /* bitsize */
73 false, /* pc_relative */
74 0, /* bitpos */
75 complain_overflow_bitfield, /* complain_on_overflow */
76 bfd_elf_generic_reloc, /* special_function */
77 "R_VAX_32", /* name */
78 false, /* partial_inplace */
79 0, /* src_mask */
80 0xffffffff, /* dst_mask */
81 false), /* pcrel_offset */
82
83 HOWTO (R_VAX_16, /* type */
84 0, /* rightshift */
85 2, /* size */
86 16, /* bitsize */
87 false, /* pc_relative */
88 0, /* bitpos */
89 complain_overflow_bitfield, /* complain_on_overflow */
90 bfd_elf_generic_reloc, /* special_function */
91 "R_VAX_16", /* name */
92 false, /* partial_inplace */
93 0, /* src_mask */
94 0x0000ffff, /* dst_mask */
95 false), /* pcrel_offset */
96
97 HOWTO (R_VAX_8, /* type */
98 0, /* rightshift */
99 1, /* size */
100 8, /* bitsize */
101 false, /* pc_relative */
102 0, /* bitpos */
103 complain_overflow_bitfield, /* complain_on_overflow */
104 bfd_elf_generic_reloc, /* special_function */
105 "R_VAX_8", /* name */
106 false, /* partial_inplace */
107 0, /* src_mask */
108 0x000000ff, /* dst_mask */
109 false), /* pcrel_offset */
110
111 HOWTO (R_VAX_PC32, /* type */
112 0, /* rightshift */
113 4, /* size */
114 32, /* bitsize */
115 true, /* pc_relative */
116 0, /* bitpos */
117 complain_overflow_bitfield, /* complain_on_overflow */
118 bfd_elf_generic_reloc, /* special_function */
119 "R_VAX_PC32", /* name */
120 false, /* partial_inplace */
121 0, /* src_mask */
122 0xffffffff, /* dst_mask */
123 true), /* pcrel_offset */
124
125 HOWTO (R_VAX_PC16, /* type */
126 0, /* rightshift */
127 2, /* size */
128 16, /* bitsize */
129 true, /* pc_relative */
130 0, /* bitpos */
131 complain_overflow_signed, /* complain_on_overflow */
132 bfd_elf_generic_reloc, /* special_function */
133 "R_VAX_PC16", /* name */
134 false, /* partial_inplace */
135 0, /* src_mask */
136 0x0000ffff, /* dst_mask */
137 true), /* pcrel_offset */
138
139 HOWTO (R_VAX_PC8, /* type */
140 0, /* rightshift */
141 1, /* size */
142 8, /* bitsize */
143 true, /* pc_relative */
144 0, /* bitpos */
145 complain_overflow_signed, /* complain_on_overflow */
146 bfd_elf_generic_reloc, /* special_function */
147 "R_VAX_PC8", /* name */
148 false, /* partial_inplace */
149 0, /* src_mask */
150 0x000000ff, /* dst_mask */
151 true), /* pcrel_offset */
152
153 HOWTO (R_VAX_GOT32, /* type */
154 0, /* rightshift */
155 4, /* size */
156 32, /* bitsize */
157 true, /* pc_relative */
158 0, /* bitpos */
159 complain_overflow_bitfield, /* complain_on_overflow */
160 bfd_elf_generic_reloc, /* special_function */
161 "R_VAX_GOT32", /* name */
162 false, /* partial_inplace */
163 0, /* src_mask */
164 0xffffffff, /* dst_mask */
165 true), /* pcrel_offset */
166
167 EMPTY_HOWTO (-1),
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172
173 HOWTO (R_VAX_PLT32, /* type */
174 0, /* rightshift */
175 4, /* size */
176 32, /* bitsize */
177 true, /* pc_relative */
178 0, /* bitpos */
179 complain_overflow_bitfield, /* complain_on_overflow */
180 bfd_elf_generic_reloc, /* special_function */
181 "R_VAX_PLT32", /* name */
182 false, /* partial_inplace */
183 0, /* src_mask */
184 0xffffffff, /* dst_mask */
185 true), /* pcrel_offset */
186
187 EMPTY_HOWTO (-1),
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192
193 HOWTO (R_VAX_COPY, /* type */
194 0, /* rightshift */
195 0, /* size */
196 0, /* bitsize */
197 false, /* pc_relative */
198 0, /* bitpos */
199 complain_overflow_dont, /* complain_on_overflow */
200 bfd_elf_generic_reloc, /* special_function */
201 "R_VAX_COPY", /* name */
202 false, /* partial_inplace */
203 0, /* src_mask */
204 0xffffffff, /* dst_mask */
205 false), /* pcrel_offset */
206
207 HOWTO (R_VAX_GLOB_DAT, /* type */
208 0, /* rightshift */
209 4, /* size */
210 32, /* bitsize */
211 false, /* pc_relative */
212 0, /* bitpos */
213 complain_overflow_dont, /* complain_on_overflow */
214 bfd_elf_generic_reloc, /* special_function */
215 "R_VAX_GLOB_DAT", /* name */
216 false, /* partial_inplace */
217 0, /* src_mask */
218 0xffffffff, /* dst_mask */
219 false), /* pcrel_offset */
220
221 HOWTO (R_VAX_JMP_SLOT, /* type */
222 0, /* rightshift */
223 4, /* size */
224 32, /* bitsize */
225 false, /* pc_relative */
226 0, /* bitpos */
227 complain_overflow_dont, /* complain_on_overflow */
228 bfd_elf_generic_reloc, /* special_function */
229 "R_VAX_JMP_SLOT", /* name */
230 false, /* partial_inplace */
231 0, /* src_mask */
232 0xffffffff, /* dst_mask */
233 false), /* pcrel_offset */
234
235 HOWTO (R_VAX_RELATIVE, /* type */
236 0, /* rightshift */
237 4, /* size */
238 32, /* bitsize */
239 false, /* pc_relative */
240 0, /* bitpos */
241 complain_overflow_dont, /* complain_on_overflow */
242 bfd_elf_generic_reloc, /* special_function */
243 "R_VAX_RELATIVE", /* name */
244 false, /* partial_inplace */
245 0, /* src_mask */
246 0xffffffff, /* dst_mask */
247 false), /* pcrel_offset */
248
249 /* GNU extension to record C++ vtable hierarchy */
250 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
251 0, /* rightshift */
252 4, /* size */
253 0, /* bitsize */
254 false, /* pc_relative */
255 0, /* bitpos */
256 complain_overflow_dont, /* complain_on_overflow */
257 NULL, /* special_function */
258 "R_VAX_GNU_VTINHERIT", /* name */
259 false, /* partial_inplace */
260 0, /* src_mask */
261 0, /* dst_mask */
262 false), /* pcrel_offset */
263
264 /* GNU extension to record C++ vtable member usage */
265 HOWTO (R_VAX_GNU_VTENTRY, /* type */
266 0, /* rightshift */
267 4, /* size */
268 0, /* bitsize */
269 false, /* pc_relative */
270 0, /* bitpos */
271 complain_overflow_dont, /* complain_on_overflow */
272 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
273 "R_VAX_GNU_VTENTRY", /* name */
274 false, /* partial_inplace */
275 0, /* src_mask */
276 0, /* dst_mask */
277 false), /* pcrel_offset */
278 };
279
280 static bool
rtype_to_howto(bfd * abfd,arelent * cache_ptr,Elf_Internal_Rela * dst)281 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
282 {
283 unsigned int r_type;
284
285 r_type = ELF32_R_TYPE (dst->r_info);
286 if (r_type >= R_VAX_max)
287 {
288 /* xgettext:c-format */
289 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
290 abfd, r_type);
291 bfd_set_error (bfd_error_bad_value);
292 return false;
293 }
294 cache_ptr->howto = &howto_table[r_type];
295 return true;
296 }
297
298 #define elf_info_to_howto rtype_to_howto
299
300 static const struct
301 {
302 bfd_reloc_code_real_type bfd_val;
303 int elf_val;
304 } reloc_map[] = {
305 { BFD_RELOC_NONE, R_VAX_NONE },
306 { BFD_RELOC_32, R_VAX_32 },
307 { BFD_RELOC_16, R_VAX_16 },
308 { BFD_RELOC_8, R_VAX_8 },
309 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314 { BFD_RELOC_NONE, R_VAX_COPY },
315 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318 { BFD_RELOC_CTOR, R_VAX_32 },
319 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321 };
322
323 static reloc_howto_type *
reloc_type_lookup(bfd * abfd ATTRIBUTE_UNUSED,bfd_reloc_code_real_type code)324 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
325 {
326 unsigned int i;
327 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328 {
329 if (reloc_map[i].bfd_val == code)
330 return &howto_table[reloc_map[i].elf_val];
331 }
332 return 0;
333 }
334
335 static reloc_howto_type *
reloc_name_lookup(bfd * abfd ATTRIBUTE_UNUSED,const char * r_name)336 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337 const char *r_name)
338 {
339 unsigned int i;
340
341 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342 if (howto_table[i].name != NULL
343 && strcasecmp (howto_table[i].name, r_name) == 0)
344 return &howto_table[i];
345
346 return NULL;
347 }
348
349 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
350 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
351 #define ELF_ARCH bfd_arch_vax
352 /* end code generated by elf.el */
353
354 /* Functions for the VAX ELF linker. */
355
356 /* The name of the dynamic interpreter. This is put in the .interp
357 section. */
358
359 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360
361 /* The size in bytes of an entry in the procedure linkage table. */
362
363 #define PLT_ENTRY_SIZE 12
364
365 /* The first entry in a procedure linkage table looks like this. See
366 the SVR4 ABI VAX supplement to see how this works. */
367
368 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369 {
370 0xdd, 0xef, /* pushl l^ */
371 0, 0, 0, 0, /* offset to .plt.got + 4 */
372 0x17, 0xff, /* jmp @L^(pc) */
373 0, 0, 0, 0, /* offset to .plt.got + 8 */
374 };
375
376 /* Subsequent entries in a procedure linkage table look like this. */
377
378 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379 {
380 0xfc, 0x0f, /* .word ^M<r11:r2> */
381 0x16, 0xef, /* jsb L^(pc) */
382 0, 0, 0, 0, /* replaced with offset to start of .plt */
383 0, 0, 0, 0, /* index into .rela.plt */
384 };
385
386 /* The VAX linker needs to keep track of the number of relocs that it
387 decides to copy in check_relocs for each symbol. This is so that it
388 can discard PC relative relocs if it doesn't need them when linking
389 with -Bsymbolic. We store the information in a field extending the
390 regular ELF linker hash table. */
391
392 /* This structure keeps track of the number of PC relative relocs we have
393 copied for a given symbol. */
394
395 struct elf_vax_pcrel_relocs_copied
396 {
397 /* Next section. */
398 struct elf_vax_pcrel_relocs_copied *next;
399 /* A section in dynobj. */
400 asection *section;
401 /* Number of relocs copied in this section. */
402 bfd_size_type count;
403 };
404
405 /* VAX ELF linker hash entry. */
406
407 struct elf_vax_link_hash_entry
408 {
409 struct elf_link_hash_entry root;
410
411 /* Number of PC relative relocs copied for this symbol. */
412 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413
414 bfd_vma got_addend;
415 };
416
417 /* Declare this now that the above structures are defined. */
418
419 static bool elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
420 void *);
421
422 /* Declare this now that the above structures are defined. */
423
424 static bool elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
425 void *);
426
427 /* Traverse an VAX ELF linker hash table. */
428
429 #define elf_vax_link_hash_traverse(table, func, info) \
430 (elf_link_hash_traverse \
431 ((table), \
432 (bool (*) (struct elf_link_hash_entry *, void *)) (func), \
433 (info)))
434
435 /* Create an entry in an VAX ELF linker hash table. */
436
437 static struct bfd_hash_entry *
elf_vax_link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)438 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439 struct bfd_hash_table *table,
440 const char *string)
441 {
442 struct elf_vax_link_hash_entry *ret =
443 (struct elf_vax_link_hash_entry *) entry;
444
445 /* Allocate the structure if it has not already been allocated by a
446 subclass. */
447 if (ret == NULL)
448 ret = ((struct elf_vax_link_hash_entry *)
449 bfd_hash_allocate (table,
450 sizeof (struct elf_vax_link_hash_entry)));
451 if (ret == NULL)
452 return (struct bfd_hash_entry *) ret;
453
454 /* Call the allocation method of the superclass. */
455 ret = ((struct elf_vax_link_hash_entry *)
456 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457 table, string));
458 if (ret != NULL)
459 {
460 ret->pcrel_relocs_copied = NULL;
461 }
462
463 return (struct bfd_hash_entry *) ret;
464 }
465
466 /* Create an VAX ELF linker hash table. */
467
468 static struct bfd_link_hash_table *
elf_vax_link_hash_table_create(bfd * abfd)469 elf_vax_link_hash_table_create (bfd *abfd)
470 {
471 struct elf_link_hash_table *ret;
472 size_t amt = sizeof (struct elf_link_hash_table);
473
474 ret = bfd_zmalloc (amt);
475 if (ret == NULL)
476 return NULL;
477
478 if (!_bfd_elf_link_hash_table_init (ret, abfd,
479 elf_vax_link_hash_newfunc,
480 sizeof (struct elf_vax_link_hash_entry),
481 GENERIC_ELF_DATA))
482 {
483 free (ret);
484 return NULL;
485 }
486
487 return &ret->root;
488 }
489
490 /* Keep vax-specific flags in the ELF header */
491 static bool
elf32_vax_set_private_flags(bfd * abfd,flagword flags)492 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
493 {
494 elf_elfheader (abfd)->e_flags = flags;
495 elf_flags_init (abfd) = true;
496 return true;
497 }
498
499 /* Copy vax-specific data from one module to another */
500 static bool
elf32_vax_copy_private_bfd_data(bfd * ibfd,bfd * obfd)501 elf32_vax_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
502 {
503 flagword in_flags;
504
505 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
506 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
507 return true;
508
509 in_flags = elf_elfheader (ibfd)->e_flags;
510
511 elf_elfheader (obfd)->e_flags = in_flags;
512 elf_flags_init (obfd) = true;
513
514 return true;
515 }
516
517 /* Merge backend specific data from an object file to the output
518 object file when linking. */
519 static bool
elf32_vax_merge_private_bfd_data(bfd * ibfd,struct bfd_link_info * info)520 elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
521 {
522 bfd *obfd = info->output_bfd;
523 flagword in_flags;
524
525 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
526 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
527 return true;
528
529 in_flags = elf_elfheader (ibfd)->e_flags;
530
531 if (!elf_flags_init (obfd))
532 {
533 elf_flags_init (obfd) = true;
534 elf_elfheader (obfd)->e_flags = in_flags;
535 }
536
537 return true;
538 }
539
540 /* Display the flags field */
541 static bool
elf32_vax_print_private_bfd_data(bfd * abfd,void * ptr)542 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
543 {
544 FILE *file = (FILE *) ptr;
545
546 BFD_ASSERT (abfd != NULL && ptr != NULL);
547
548 /* Print normal ELF private data. */
549 _bfd_elf_print_private_bfd_data (abfd, ptr);
550
551 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
552
553 /* xgettext:c-format */
554 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
555
556 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
557 fprintf (file, _(" [nonpic]"));
558
559 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
560 fprintf (file, _(" [d-float]"));
561
562 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
563 fprintf (file, _(" [g-float]"));
564
565 fputc ('\n', file);
566
567 return true;
568 }
569 /* Look through the relocs for a section during the first phase, and
570 allocate space in the global offset table or procedure linkage
571 table. */
572
573 static bool
elf_vax_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)574 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
575 const Elf_Internal_Rela *relocs)
576 {
577 bfd *dynobj;
578 Elf_Internal_Shdr *symtab_hdr;
579 struct elf_link_hash_entry **sym_hashes;
580 const Elf_Internal_Rela *rel;
581 const Elf_Internal_Rela *rel_end;
582 asection *sreloc;
583
584 if (bfd_link_relocatable (info))
585 return true;
586
587 dynobj = elf_hash_table (info)->dynobj;
588 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
589 sym_hashes = elf_sym_hashes (abfd);
590
591 sreloc = NULL;
592
593 rel_end = relocs + sec->reloc_count;
594 for (rel = relocs; rel < rel_end; rel++)
595 {
596 unsigned long r_symndx;
597 struct elf_link_hash_entry *h;
598
599 r_symndx = ELF32_R_SYM (rel->r_info);
600
601 if (r_symndx < symtab_hdr->sh_info)
602 h = NULL;
603 else
604 {
605 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
606 while (h->root.type == bfd_link_hash_indirect
607 || h->root.type == bfd_link_hash_warning)
608 h = (struct elf_link_hash_entry *) h->root.u.i.link;
609 }
610
611 switch (ELF32_R_TYPE (rel->r_info))
612 {
613 case R_VAX_GOT32:
614 BFD_ASSERT (h != NULL);
615
616 /* If this is a local symbol, we resolve it directly without
617 creating a global offset table entry. */
618 if (SYMBOL_REFERENCES_LOCAL (info, h)
619 || h == elf_hash_table (info)->hgot
620 || h == elf_hash_table (info)->hplt)
621 break;
622
623 /* This symbol requires a global offset table entry. */
624
625 if (dynobj == NULL)
626 {
627 /* Create the .got section. */
628 elf_hash_table (info)->dynobj = dynobj = abfd;
629 if (!_bfd_elf_create_got_section (dynobj, info))
630 return false;
631 }
632
633 if (h != NULL)
634 {
635 struct elf_vax_link_hash_entry *eh;
636
637 eh = (struct elf_vax_link_hash_entry *) h;
638 if (h->got.refcount == -1)
639 {
640 h->got.refcount = 1;
641 eh->got_addend = rel->r_addend;
642 }
643 else
644 {
645 h->got.refcount++;
646 if (eh->got_addend != (bfd_vma) rel->r_addend)
647 _bfd_error_handler
648 /* xgettext:c-format */
649 (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
650 " not match previous GOT addend of %" PRId64),
651 abfd, (int64_t) rel->r_addend, h->root.root.string,
652 (int64_t) eh->got_addend);
653
654 }
655 }
656 break;
657
658 case R_VAX_PLT32:
659 /* This symbol requires a procedure linkage table entry. We
660 actually build the entry in adjust_dynamic_symbol,
661 because this might be a case of linking PIC code which is
662 never referenced by a dynamic object, in which case we
663 don't need to generate a procedure linkage table entry
664 after all. */
665 BFD_ASSERT (h != NULL);
666
667 /* If this is a local symbol, we resolve it directly without
668 creating a procedure linkage table entry. */
669 if (h->forced_local)
670 break;
671
672 h->needs_plt = 1;
673 if (h->plt.refcount == -1)
674 h->plt.refcount = 1;
675 else
676 h->plt.refcount++;
677 break;
678
679 case R_VAX_PC8:
680 case R_VAX_PC16:
681 case R_VAX_PC32:
682 /* If we are creating a shared library and this is not a local
683 symbol, we need to copy the reloc into the shared library.
684 However when linking with -Bsymbolic and this is a global
685 symbol which is defined in an object we are including in the
686 link (i.e., DEF_REGULAR is set), then we can resolve the
687 reloc directly. At this point we have not seen all the input
688 files, so it is possible that DEF_REGULAR is not set now but
689 will be set later (it is never cleared). We account for that
690 possibility below by storing information in the
691 pcrel_relocs_copied field of the hash table entry. */
692 if (!(bfd_link_pic (info)
693 && (sec->flags & SEC_ALLOC) != 0
694 && h != NULL
695 && (!info->symbolic
696 || !h->def_regular)))
697 {
698 if (h != NULL
699 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
700 && !h->forced_local)
701 {
702 /* Make sure a plt entry is created for this symbol if
703 it turns out to be a function defined by a dynamic
704 object. */
705 if (h->plt.refcount == -1)
706 h->plt.refcount = 1;
707 else
708 h->plt.refcount++;
709 }
710 break;
711 }
712 /* If this is a local symbol, we can resolve it directly. */
713 if (h != NULL
714 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
715 || h->forced_local))
716 break;
717
718 /* Fall through. */
719 case R_VAX_8:
720 case R_VAX_16:
721 case R_VAX_32:
722 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
723 {
724 /* Make sure a plt entry is created for this symbol if it
725 turns out to be a function defined by a dynamic object. */
726 if (h->plt.refcount == -1)
727 h->plt.refcount = 1;
728 else
729 h->plt.refcount++;
730 }
731
732 /* Non-GOT reference may need a copy reloc in executable or
733 a dynamic reloc in shared library. */
734 if (h != NULL)
735 h->non_got_ref = 1;
736
737 /* If we are creating a shared library, we need to copy the
738 reloc into the shared library. */
739 if (bfd_link_pic (info)
740 && (sec->flags & SEC_ALLOC) != 0)
741 {
742 /* When creating a shared object, we must copy these
743 reloc types into the output file. We create a reloc
744 section in dynobj and make room for this reloc. */
745 if (sreloc == NULL)
746 {
747 sreloc = _bfd_elf_make_dynamic_reloc_section
748 (sec, dynobj, 2, abfd, /*rela?*/ true);
749
750 if (sreloc == NULL)
751 return false;
752
753 if (sec->flags & SEC_READONLY)
754 {
755 if (bfd_link_textrel_check(info))
756 (*_bfd_error_handler)
757 (_("warning: dynamic relocation to `%s' in readonly section `%s'"),
758 h ? h->root.root.string : "?", sec->name);
759 info->flags |= DF_TEXTREL;
760 }
761 }
762
763 sreloc->size += sizeof (Elf32_External_Rela);
764
765 /* If we are linking with -Bsymbolic, we count the number of
766 PC relative relocations we have entered for this symbol,
767 so that we can discard them again if the symbol is later
768 defined by a regular object. Note that this function is
769 only called if we are using a vaxelf linker hash table,
770 which means that h is really a pointer to an
771 elf_vax_link_hash_entry. */
772 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
773 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
774 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
775 && info->symbolic)
776 {
777 struct elf_vax_link_hash_entry *eh;
778 struct elf_vax_pcrel_relocs_copied *p;
779
780 eh = (struct elf_vax_link_hash_entry *) h;
781
782 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
783 if (p->section == sreloc)
784 break;
785
786 if (p == NULL)
787 {
788 p = ((struct elf_vax_pcrel_relocs_copied *)
789 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
790 if (p == NULL)
791 return false;
792 p->next = eh->pcrel_relocs_copied;
793 eh->pcrel_relocs_copied = p;
794 p->section = sreloc;
795 p->count = 0;
796 }
797
798 ++p->count;
799 }
800 }
801
802 break;
803
804 /* This relocation describes the C++ object vtable hierarchy.
805 Reconstruct it for later use during GC. */
806 case R_VAX_GNU_VTINHERIT:
807 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
808 return false;
809 break;
810
811 /* This relocation describes which C++ vtable entries are actually
812 used. Record for later use during GC. */
813 case R_VAX_GNU_VTENTRY:
814 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
815 return false;
816 break;
817
818 default:
819 break;
820 }
821 }
822
823 return true;
824 }
825
826 /* Return the section that should be marked against GC for a given
827 relocation. */
828
829 static asection *
elf_vax_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)830 elf_vax_gc_mark_hook (asection *sec,
831 struct bfd_link_info *info,
832 Elf_Internal_Rela *rel,
833 struct elf_link_hash_entry *h,
834 Elf_Internal_Sym *sym)
835 {
836 if (h != NULL)
837 switch (ELF32_R_TYPE (rel->r_info))
838 {
839 case R_VAX_GNU_VTINHERIT:
840 case R_VAX_GNU_VTENTRY:
841 return NULL;
842 }
843
844 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
845 }
846
847 /* Adjust a symbol defined by a dynamic object and referenced by a
848 regular object. The current definition is in some section of the
849 dynamic object, but we're not including those sections. We have to
850 change the definition to something the rest of the link can
851 understand. */
852
853 static bool
elf_vax_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)854 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
855 struct elf_link_hash_entry *h)
856 {
857 bfd *dynobj;
858 asection *s;
859
860 dynobj = elf_hash_table (info)->dynobj;
861
862 /* Make sure we know what is going on here. */
863 BFD_ASSERT (dynobj != NULL
864 && (h->needs_plt
865 || h->type == STT_GNU_IFUNC
866 || h->is_weakalias
867 || (h->def_dynamic
868 && h->ref_regular
869 && !h->def_regular)));
870
871 /* If this is a function, put it in the procedure linkage table. We
872 will fill in the contents of the procedure linkage table later,
873 when we know the address of the .got section. */
874 if ((h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
875 || h->needs_plt)
876 {
877 if (h->plt.refcount <= 0
878 || SYMBOL_CALLS_LOCAL (info, h)
879 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
880 && h->root.type == bfd_link_hash_undefweak))
881 {
882 /* This case can occur if we saw a PLTxx reloc in an input
883 file, but the symbol was never referred to by a dynamic
884 object, or if all references were garbage collected. In
885 such a case, we don't actually need to build a procedure
886 linkage table, and we can just do a PCxx reloc instead. */
887 h->plt.offset = (bfd_vma) -1;
888 h->needs_plt = 0;
889 return true;
890 }
891
892 s = elf_hash_table (info)->splt;
893 BFD_ASSERT (s != NULL);
894
895 /* If this is the first .plt entry, make room for the special
896 first entry. */
897 if (s->size == 0)
898 {
899 s->size += PLT_ENTRY_SIZE;
900 }
901
902 /* If this symbol is not defined in a regular file, and we are
903 not generating a shared library, then set the symbol to this
904 location in the .plt. This is required to make function
905 pointers compare as equal between the normal executable and
906 the shared library. */
907 if (!bfd_link_pic (info)
908 && !h->def_regular)
909 {
910 h->root.u.def.section = s;
911 h->root.u.def.value = s->size;
912 }
913
914 h->plt.offset = s->size;
915
916 /* Make room for this entry. */
917 s->size += PLT_ENTRY_SIZE;
918
919 /* We also need to make an entry in the .got.plt section, which
920 will be placed in the .got section by the linker script. */
921
922 s = elf_hash_table (info)->sgotplt;
923 BFD_ASSERT (s != NULL);
924 s->size += 4;
925
926 /* We also need to make an entry in the .rela.plt section. */
927
928 s = elf_hash_table (info)->srelplt;
929 BFD_ASSERT (s != NULL);
930 s->size += sizeof (Elf32_External_Rela);
931
932 return true;
933 }
934
935 /* Reinitialize the plt offset now that it is not used as a reference
936 count any more. */
937 h->plt.offset = (bfd_vma) -1;
938
939 /* If this is a weak symbol, and there is a real definition, the
940 processor independent code will have arranged for us to see the
941 real definition first, and we can just use the same value. */
942 if (h->is_weakalias)
943 {
944 struct elf_link_hash_entry *def = weakdef (h);
945 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
946 h->root.u.def.section = def->root.u.def.section;
947 h->root.u.def.value = def->root.u.def.value;
948 return true;
949 }
950
951 /* This is a reference to a symbol defined by a dynamic object which
952 is not a function. */
953
954 /* If we are creating a shared library, we must presume that the
955 only references to the symbol are via the global offset table.
956 For such cases we need not do anything here; the relocations will
957 be handled correctly by relocate_section. */
958 if (bfd_link_pic (info))
959 return true;
960
961 /* If there are no references to this symbol that do not use the
962 GOT relocation, we don't need to generate a copy reloc. */
963 if (!h->non_got_ref)
964 return true;
965
966 /* We must allocate the symbol in our .dynbss section, which will
967 become part of the .bss section of the executable. There will be
968 an entry for this symbol in the .dynsym section. The dynamic
969 object will contain position independent code, so all references
970 from the dynamic object to this symbol will go through the global
971 offset table. The dynamic linker will use the .dynsym entry to
972 determine the address it must put in the global offset table, so
973 both the dynamic object and the regular object will refer to the
974 same memory location for the variable. */
975
976 s = bfd_get_linker_section (dynobj, ".dynbss");
977 BFD_ASSERT (s != NULL);
978
979 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
980 copy the initial value out of the dynamic object and into the
981 runtime process image. We need to remember the offset into the
982 .rela.bss section we are going to use. */
983 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
984 {
985 asection *srel;
986
987 srel = bfd_get_linker_section (dynobj, ".rela.bss");
988 BFD_ASSERT (srel != NULL);
989 srel->size += sizeof (Elf32_External_Rela);
990 h->needs_copy = 1;
991 }
992
993 return _bfd_elf_adjust_dynamic_copy (info, h, s);
994 }
995
996 /* This function is called via elf_link_hash_traverse. It resets GOT
997 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
998 will be done. */
999
1000 static bool
elf_vax_discard_got_entries(struct elf_link_hash_entry * h,void * infoptr ATTRIBUTE_UNUSED)1001 elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
1002 void *infoptr ATTRIBUTE_UNUSED)
1003 {
1004 h->got.refcount = -1;
1005 h->plt.refcount = -1;
1006
1007 return true;
1008 }
1009
1010 /* Discard unused dynamic data if this is a static link. */
1011
1012 static bool
elf_vax_always_size_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)1013 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1014 struct bfd_link_info *info)
1015 {
1016 bfd *dynobj;
1017 asection *s;
1018
1019 dynobj = elf_hash_table (info)->dynobj;
1020
1021 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
1022 {
1023 /* We may have created entries in the .rela.got and .got sections.
1024 However, if we are not creating the dynamic sections, we will
1025 not actually use these entries. Reset the size of .rela.got
1026 and .got, which will cause them to get stripped from the output
1027 file below. */
1028 s = elf_hash_table (info)->srelgot;
1029 if (s != NULL)
1030 s->size = 0;
1031 s = elf_hash_table (info)->sgotplt;
1032 if (s != NULL)
1033 s->size = 0;
1034 s = elf_hash_table (info)->sgot;
1035 if (s != NULL)
1036 s->size = 0;
1037 }
1038
1039 /* If this is a static link, we need to discard all the got entries we've
1040 recorded. */
1041 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1042 elf_link_hash_traverse (elf_hash_table (info),
1043 elf_vax_discard_got_entries,
1044 info);
1045
1046 return true;
1047 }
1048
1049 /* Set the sizes of the dynamic sections. */
1050
1051 static bool
elf_vax_size_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)1052 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1053 {
1054 bfd *dynobj;
1055 asection *s;
1056 bool relocs;
1057
1058 dynobj = elf_hash_table (info)->dynobj;
1059 BFD_ASSERT (dynobj != NULL);
1060
1061 if (elf_hash_table (info)->dynamic_sections_created)
1062 {
1063 /* Set the contents of the .interp section to the interpreter. */
1064 if (bfd_link_executable (info) && !info->nointerp)
1065 {
1066 s = bfd_get_linker_section (dynobj, ".interp");
1067 BFD_ASSERT (s != NULL);
1068 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1069 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1070 }
1071 }
1072
1073 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1074 relative relocs against symbols defined in a regular object. We
1075 allocated space for them in the check_relocs routine, but we will not
1076 fill them in in the relocate_section routine. */
1077 if (bfd_link_pic (info) && info->symbolic)
1078 elf_vax_link_hash_traverse (elf_hash_table (info),
1079 elf_vax_discard_copies,
1080 NULL);
1081
1082 /* If this is a -Bsymbolic shared link, we need to discard all the got
1083 entries we've recorded. Otherwise, we need to instantiate (allocate
1084 space for them). */
1085 elf_link_hash_traverse (elf_hash_table (info),
1086 elf_vax_instantiate_got_entries,
1087 info);
1088
1089 /* The check_relocs and adjust_dynamic_symbol entry points have
1090 determined the sizes of the various dynamic sections. Allocate
1091 memory for them. */
1092 relocs = false;
1093 for (s = dynobj->sections; s != NULL; s = s->next)
1094 {
1095 const char *name;
1096
1097 if ((s->flags & SEC_LINKER_CREATED) == 0)
1098 continue;
1099
1100 /* It's OK to base decisions on the section name, because none
1101 of the dynobj section names depend upon the input files. */
1102 name = bfd_section_name (s);
1103
1104 if (strcmp (name, ".plt") == 0)
1105 {
1106 /* Remember whether there is a PLT. */
1107 ;
1108 }
1109 else if (startswith (name, ".rela"))
1110 {
1111 if (s->size != 0)
1112 {
1113 if (strcmp (name, ".rela.plt") != 0)
1114 relocs = true;
1115
1116 /* We use the reloc_count field as a counter if we need
1117 to copy relocs into the output file. */
1118 s->reloc_count = 0;
1119 }
1120 }
1121 else if (! startswith (name, ".got")
1122 && strcmp (name, ".dynbss") != 0)
1123 {
1124 /* It's not one of our sections, so don't allocate space. */
1125 continue;
1126 }
1127
1128 if (s->size == 0)
1129 {
1130 /* If we don't need this section, strip it from the
1131 output file. This is mostly to handle .rela.bss and
1132 .rela.plt. We must create both sections in
1133 create_dynamic_sections, because they must be created
1134 before the linker maps input sections to output
1135 sections. The linker does that before
1136 adjust_dynamic_symbol is called, and it is that
1137 function which decides whether anything needs to go
1138 into these sections. */
1139 s->flags |= SEC_EXCLUDE;
1140 continue;
1141 }
1142
1143 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1144 continue;
1145
1146 /* Allocate memory for the section contents. */
1147 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1148 if (s->contents == NULL)
1149 return false;
1150 }
1151
1152 return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
1153 }
1154
1155 /* This function is called via elf_vax_link_hash_traverse if we are
1156 creating a shared object with -Bsymbolic. It discards the space
1157 allocated to copy PC relative relocs against symbols which are defined
1158 in regular objects. We allocated space for them in the check_relocs
1159 routine, but we won't fill them in in the relocate_section routine. */
1160
1161 static bool
elf_vax_discard_copies(struct elf_vax_link_hash_entry * h,void * ignore ATTRIBUTE_UNUSED)1162 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1163 void * ignore ATTRIBUTE_UNUSED)
1164 {
1165 struct elf_vax_pcrel_relocs_copied *s;
1166
1167 /* We only discard relocs for symbols defined in a regular object. */
1168 if (!h->root.def_regular)
1169 return true;
1170
1171 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1172 s->section->size -= s->count * sizeof (Elf32_External_Rela);
1173
1174 return true;
1175 }
1176
1177 /* This function is called via elf_link_hash_traverse. It looks for
1178 entries that have GOT or PLT (.GOT) references. If creating a shared
1179 object with -Bsymbolic, or the symbol has been forced local, then it
1180 resets the reference count back to -1 so normal PC32 relocation will
1181 be done. Otherwise space in the .got and .rela.got will be reserved
1182 for the symbol. */
1183
1184 static bool
elf_vax_instantiate_got_entries(struct elf_link_hash_entry * h,void * infoptr)1185 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1186 {
1187 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1188 bfd *dynobj;
1189 asection *sgot;
1190 asection *srelgot;
1191
1192 /* We don't care about non-GOT (and non-PLT) entries. */
1193 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1194 return true;
1195
1196 dynobj = elf_hash_table (info)->dynobj;
1197 BFD_ASSERT (dynobj != NULL);
1198
1199 sgot = elf_hash_table (info)->sgot;
1200 srelgot = elf_hash_table (info)->srelgot;
1201
1202 if (SYMBOL_REFERENCES_LOCAL (info, h))
1203 {
1204 h->got.refcount = -1;
1205 h->plt.refcount = -1;
1206 }
1207 else if (h->got.refcount > 0)
1208 {
1209 /* Make sure this symbol is output as a dynamic symbol. */
1210 if (h->dynindx == -1)
1211 {
1212 if (!bfd_elf_link_record_dynamic_symbol (info, h))
1213 return false;
1214 }
1215
1216 /* Allocate space in the .got and .rela.got sections. */
1217 if (bfd_link_pic (info) || WILL_CALL_FINISH_DYNAMIC_SYMBOL (
1218 elf_hash_table (info)->dynamic_sections_created, 0, h))
1219 {
1220 sgot->size += 4;
1221 srelgot->size += sizeof (Elf32_External_Rela);
1222 }
1223 }
1224
1225 return true;
1226 }
1227
1228 /* Relocate an VAX ELF section. */
1229
1230 static int
elf_vax_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)1231 elf_vax_relocate_section (bfd *output_bfd,
1232 struct bfd_link_info *info,
1233 bfd *input_bfd,
1234 asection *input_section,
1235 bfd_byte *contents,
1236 Elf_Internal_Rela *relocs,
1237 Elf_Internal_Sym *local_syms,
1238 asection **local_sections)
1239 {
1240 Elf_Internal_Shdr *symtab_hdr;
1241 struct elf_link_hash_entry **sym_hashes;
1242 bfd_vma plt_index;
1243 bfd_vma got_offset;
1244 asection *sgot;
1245 asection *splt;
1246 asection *sgotplt;
1247 asection *sreloc;
1248 Elf_Internal_Rela *rel;
1249 Elf_Internal_Rela *relend;
1250
1251 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1252 sym_hashes = elf_sym_hashes (input_bfd);
1253
1254 sgot = NULL;
1255 splt = NULL;
1256 sgotplt = NULL;
1257 sreloc = NULL;
1258
1259 rel = relocs;
1260 relend = relocs + input_section->reloc_count;
1261 for (; rel < relend; rel++)
1262 {
1263 int r_type;
1264 reloc_howto_type *howto;
1265 unsigned long r_symndx;
1266 struct elf_link_hash_entry *h;
1267 Elf_Internal_Sym *sym;
1268 asection *sec;
1269 bfd_vma relocation;
1270 bfd_reloc_status_type r;
1271
1272 r_type = ELF32_R_TYPE (rel->r_info);
1273 if (r_type < 0 || r_type >= (int) R_VAX_max)
1274 {
1275 bfd_set_error (bfd_error_bad_value);
1276 return false;
1277 }
1278 howto = howto_table + r_type;
1279
1280 r_symndx = ELF32_R_SYM (rel->r_info);
1281 h = NULL;
1282 sym = NULL;
1283 sec = NULL;
1284 if (r_symndx < symtab_hdr->sh_info)
1285 {
1286 sym = local_syms + r_symndx;
1287 sec = local_sections[r_symndx];
1288 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1289 }
1290 else
1291 {
1292 bool unresolved_reloc;
1293 bool warned, ignored;
1294
1295 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1296 r_symndx, symtab_hdr, sym_hashes,
1297 h, sec, relocation,
1298 unresolved_reloc, warned, ignored);
1299
1300 if ((h->root.type == bfd_link_hash_defined
1301 || h->root.type == bfd_link_hash_defweak)
1302 && ((r_type == R_VAX_PLT32
1303 && h->plt.offset != (bfd_vma) -1
1304 && !h->forced_local
1305 && elf_hash_table (info)->dynamic_sections_created)
1306 || (r_type == R_VAX_GOT32
1307 && h->got.offset != (bfd_vma) -1
1308 && !h->forced_local
1309 && elf_hash_table (info)->dynamic_sections_created
1310 && (! bfd_link_pic (info)
1311 || (! info->symbolic && h->dynindx != -1)
1312 || !h->def_regular))
1313 || (bfd_link_pic (info)
1314 && ((! info->symbolic && h->dynindx != -1)
1315 || !h->def_regular)
1316 && ((input_section->flags & SEC_ALLOC) != 0
1317 /* DWARF will emit R_VAX_32 relocations in its
1318 sections against symbols defined externally
1319 in shared libraries. We can't do anything
1320 with them here. */
1321
1322 || ((input_section->flags & SEC_DEBUGGING) != 0
1323 && h->def_dynamic))
1324 && (r_type == R_VAX_8
1325 || r_type == R_VAX_16
1326 || r_type == R_VAX_32))))
1327 /* In these cases, we don't need the relocation
1328 value. We check specially because in some
1329 obscure cases sec->output_section will be NULL. */
1330 relocation = 0;
1331 }
1332
1333 if (sec != NULL && discarded_section (sec))
1334 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1335 rel, 1, relend, howto, 0, contents);
1336
1337 if (bfd_link_relocatable (info))
1338 continue;
1339
1340 switch (r_type)
1341 {
1342 case R_VAX_GOT32:
1343 /* Relocation is to the address of the entry for this symbol
1344 in the global offset table. */
1345
1346 /* Resolve a GOTxx reloc against a local symbol directly,
1347 without using the global offset table. */
1348 if (h == NULL
1349 || h->got.offset == (bfd_vma) -1)
1350 break;
1351
1352 {
1353 bfd_vma off;
1354
1355 sgot = elf_hash_table (info)->sgot;
1356 BFD_ASSERT (sgot != NULL);
1357
1358 off = h->got.offset;
1359 BFD_ASSERT (off < sgot->size);
1360
1361 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1362
1363 relocation = sgot->output_offset + off;
1364 /* The GOT relocation uses the addend. */
1365 rel->r_addend = 0;
1366
1367 /* Change the reference to be indirect. */
1368 contents[rel->r_offset - 1] |= 0x10;
1369 relocation += sgot->output_section->vma;
1370 }
1371 break;
1372
1373 case R_VAX_PC32:
1374 /* If we are creating an executable and the function this
1375 reloc refers to is in a shared lib, then we made a PLT
1376 entry for this symbol and need to handle the reloc like
1377 a PLT reloc. */
1378 if (bfd_link_pic (info))
1379 goto r_vax_pc32_shared;
1380 /* Fall through. */
1381 case R_VAX_PLT32:
1382 /* Relocation is to the entry for this symbol in the
1383 procedure linkage table. */
1384
1385 /* Resolve a PLTxx reloc against a local symbol directly,
1386 without using the procedure linkage table. */
1387 if (h == NULL
1388 || h->plt.offset == (bfd_vma) -1)
1389 break;
1390
1391 splt = elf_hash_table (info)->splt;
1392 BFD_ASSERT (splt != NULL);
1393
1394 sgotplt = elf_hash_table (info)->sgotplt;
1395 BFD_ASSERT (sgotplt != NULL);
1396
1397 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1398
1399 /* Get the offset into the .got table of the entry that
1400 corresponds to this function. Each .got entry is 4 bytes.
1401 The first two are reserved. */
1402 got_offset = (plt_index + 3) * 4;
1403
1404 /* We want the relocation to point into the .got.plt instead
1405 of the plt itself. */
1406 relocation = (sgotplt->output_section->vma
1407 + sgotplt->output_offset
1408 + got_offset);
1409 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1410 if (rel->r_addend == 2)
1411 {
1412 h->plt.offset |= 1;
1413 }
1414 else if (rel->r_addend != 0)
1415 _bfd_error_handler
1416 /* xgettext:c-format */
1417 (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1418 " from %pA section ignored"),
1419 input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1420 input_section);
1421 rel->r_addend = 0;
1422
1423 break;
1424
1425 case R_VAX_PC8:
1426 case R_VAX_PC16:
1427 r_vax_pc32_shared:
1428 if (h == NULL
1429 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1430 || h->forced_local)
1431 break;
1432 /* Fall through. */
1433 case R_VAX_8:
1434 case R_VAX_16:
1435 case R_VAX_32:
1436 if (bfd_link_pic (info)
1437 && r_symndx != STN_UNDEF
1438 && (input_section->flags & SEC_ALLOC) != 0
1439 && ((r_type != R_VAX_PC8
1440 && r_type != R_VAX_PC16
1441 && r_type != R_VAX_PC32)
1442 || ((input_section->flags & SEC_CODE)
1443 && (!info->symbolic
1444 || (!h->def_regular && h->type != STT_SECTION)))))
1445 {
1446 Elf_Internal_Rela outrel;
1447 bfd_byte *loc;
1448 bool skip, relocate;
1449
1450 /* When generating a shared object, these relocations
1451 are copied into the output file to be resolved at run
1452 time. */
1453 if (sreloc == NULL)
1454 {
1455 sreloc = _bfd_elf_get_dynamic_reloc_section
1456 (input_bfd, input_section, /*rela?*/ true);
1457 if (sreloc == NULL)
1458 return false;
1459 }
1460
1461 skip = false;
1462 relocate = false;
1463
1464 outrel.r_offset =
1465 _bfd_elf_section_offset (output_bfd, info, input_section,
1466 rel->r_offset);
1467 if (outrel.r_offset == (bfd_vma) -1)
1468 skip = true;
1469 if (outrel.r_offset == (bfd_vma) -2)
1470 skip = true, relocate = true;
1471 outrel.r_offset += (input_section->output_section->vma
1472 + input_section->output_offset);
1473
1474 if (skip)
1475 memset (&outrel, 0, sizeof outrel);
1476 /* h->dynindx may be -1 if the symbol was marked to
1477 become local. */
1478 else if (h != NULL
1479 && ((! info->symbolic && h->dynindx != -1)
1480 || !h->def_regular))
1481 {
1482 BFD_ASSERT (h->dynindx != -1);
1483 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1484 outrel.r_addend = relocation + rel->r_addend;
1485 }
1486 else
1487 {
1488 if (r_type == R_VAX_32)
1489 {
1490 relocate = true;
1491 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1492 outrel.r_addend = bfd_get_signed_32(input_bfd,
1493 &contents[rel->r_offset])
1494 + relocation + rel->r_addend;
1495 }
1496 else
1497 {
1498 long indx;
1499
1500 if (bfd_is_abs_section (sec))
1501 indx = 0;
1502 else if (sec == NULL || sec->owner == NULL)
1503 {
1504 bfd_set_error (bfd_error_bad_value);
1505 return false;
1506 }
1507 else
1508 {
1509 asection *osec;
1510
1511 /* We are turning this relocation into one
1512 against a section symbol. It would be
1513 proper to subtract the symbol's value,
1514 osec->vma, from the emitted reloc addend,
1515 but ld.so expects buggy relocs. */
1516 osec = sec->output_section;
1517 indx = elf_section_data (osec)->dynindx;
1518 if (indx == 0)
1519 {
1520 struct elf_link_hash_table *htab;
1521 htab = elf_hash_table (info);
1522 osec = htab->text_index_section;
1523 indx = elf_section_data (osec)->dynindx;
1524 }
1525 BFD_ASSERT (indx != 0);
1526 }
1527
1528 outrel.r_info = ELF32_R_INFO (indx, r_type);
1529 outrel.r_addend = relocation + rel->r_addend;
1530 }
1531 }
1532
1533 if (input_section->flags & SEC_CODE)
1534 info->flags |= DF_TEXTREL;
1535
1536 if ((input_section->flags & SEC_CODE) != 0
1537 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1538 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1539 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1540 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1541 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1542 {
1543 if (h != NULL)
1544 _bfd_error_handler
1545 /* xgettext:c-format */
1546 (_("%pB: warning: %s relocation against symbol `%s'"
1547 " from %pA section"),
1548 input_bfd, howto->name, h->root.root.string,
1549 input_section);
1550 else
1551 _bfd_error_handler
1552 /* xgettext:c-format */
1553 (_("%pB: warning: %s relocation to %#" PRIx64
1554 " from %pA section"),
1555 input_bfd, howto->name, (uint64_t) outrel.r_addend,
1556 input_section);
1557 }
1558 loc = sreloc->contents;
1559 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1560 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1561
1562 /* This reloc will be computed at runtime, so there's no
1563 need to do anything now, except for R_VAX_32
1564 relocations that have been turned into
1565 R_VAX_RELATIVE. */
1566 if (!relocate)
1567 continue;
1568 }
1569
1570 break;
1571
1572 case R_VAX_GNU_VTINHERIT:
1573 case R_VAX_GNU_VTENTRY:
1574 /* These are no-ops in the end. */
1575 continue;
1576
1577 default:
1578 break;
1579 }
1580
1581 /* VAX PCREL relocations are from the end of relocation, not the start.
1582 So subtract the difference from the relocation amount since we can't
1583 add it to the offset. */
1584 if (howto->pc_relative && howto->pcrel_offset)
1585 relocation -= bfd_get_reloc_size(howto);
1586
1587 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1588 contents, rel->r_offset,
1589 relocation, rel->r_addend);
1590
1591 if (r != bfd_reloc_ok)
1592 {
1593 switch (r)
1594 {
1595 default:
1596 case bfd_reloc_outofrange:
1597 abort ();
1598 case bfd_reloc_overflow:
1599 {
1600 const char *name;
1601
1602 if (h != NULL)
1603 name = NULL;
1604 else
1605 {
1606 name = bfd_elf_string_from_elf_section (input_bfd,
1607 symtab_hdr->sh_link,
1608 sym->st_name);
1609 if (name == NULL)
1610 return false;
1611 if (*name == '\0')
1612 name = bfd_section_name (sec);
1613 }
1614 info->callbacks->reloc_overflow
1615 (info, (h ? &h->root : NULL), name, howto->name,
1616 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1617 }
1618 break;
1619 }
1620 }
1621 }
1622
1623 return true;
1624 }
1625
1626 /* Finish up dynamic symbol handling. We set the contents of various
1627 dynamic sections here. */
1628
1629 static bool
elf_vax_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)1630 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1631 struct elf_link_hash_entry *h,
1632 Elf_Internal_Sym *sym)
1633 {
1634 bfd *dynobj;
1635
1636 dynobj = elf_hash_table (info)->dynobj;
1637
1638 if (h->plt.offset != (bfd_vma) -1)
1639 {
1640 asection *splt;
1641 asection *sgot;
1642 asection *srela;
1643 bfd_vma plt_index;
1644 bfd_vma got_offset;
1645 bfd_vma addend;
1646 Elf_Internal_Rela rela;
1647 bfd_byte *loc;
1648
1649 /* This symbol has an entry in the procedure linkage table. Set
1650 it up. */
1651 BFD_ASSERT (h->dynindx != -1);
1652
1653 splt = elf_hash_table (info)->splt;
1654 sgot = elf_hash_table (info)->sgotplt;
1655 srela = elf_hash_table (info)->srelplt;
1656 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1657
1658 addend = 2 * (h->plt.offset & 1);
1659 h->plt.offset &= ~1;
1660
1661 /* Get the index in the procedure linkage table which
1662 corresponds to this symbol. This is the index of this symbol
1663 in all the symbols for which we are making plt entries. The
1664 first entry in the procedure linkage table is reserved. */
1665 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1666
1667 /* Get the offset into the .got table of the entry that
1668 corresponds to this function. Each .got entry is 4 bytes.
1669 The first two are reserved. */
1670 got_offset = (plt_index + 3) * 4;
1671
1672 /* Fill in the entry in the procedure linkage table. */
1673 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1674 PLT_ENTRY_SIZE);
1675
1676 /* The offset is relative to the first extension word. */
1677 bfd_put_32 (output_bfd,
1678 -(h->plt.offset + 8),
1679 splt->contents + h->plt.offset + 4);
1680
1681 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1682 splt->contents + h->plt.offset + 8);
1683
1684 /* Fill in the entry in the global offset table. */
1685 bfd_put_32 (output_bfd,
1686 (splt->output_section->vma
1687 + splt->output_offset
1688 + h->plt.offset) + addend,
1689 sgot->contents + got_offset);
1690
1691 /* Fill in the entry in the .rela.plt section. */
1692 rela.r_offset = (sgot->output_section->vma
1693 + sgot->output_offset
1694 + got_offset);
1695 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1696 rela.r_addend = addend;
1697 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1698 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1699
1700 if (!h->def_regular)
1701 {
1702 /* Mark the symbol as undefined, rather than as defined in
1703 the .plt section. Leave the value alone. */
1704 sym->st_shndx = SHN_UNDEF;
1705 }
1706 }
1707
1708 if (h->got.offset != (bfd_vma) -1)
1709 {
1710 asection *sgot;
1711 asection *srela;
1712 Elf_Internal_Rela rela;
1713 bfd_byte *loc;
1714
1715 /* This symbol has an entry in the global offset table. Set it
1716 up. */
1717 sgot = elf_hash_table (info)->sgot;
1718 srela = elf_hash_table (info)->srelgot;
1719 BFD_ASSERT (sgot != NULL && srela != NULL);
1720
1721 rela.r_offset = (sgot->output_section->vma
1722 + sgot->output_offset
1723 + h->got.offset);
1724 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1725 rela.r_addend = bfd_get_signed_32 (output_bfd,
1726 sgot->contents + h->got.offset);
1727
1728 loc = srela->contents;
1729 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1730 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1731 }
1732
1733 if (h->needs_copy)
1734 {
1735 asection *s;
1736 Elf_Internal_Rela rela;
1737 bfd_byte *loc;
1738
1739 /* This symbol needs a copy reloc. Set it up. */
1740 BFD_ASSERT (h->dynindx != -1
1741 && (h->root.type == bfd_link_hash_defined
1742 || h->root.type == bfd_link_hash_defweak));
1743
1744 s = bfd_get_linker_section (dynobj, ".rela.bss");
1745 BFD_ASSERT (s != NULL);
1746
1747 rela.r_offset = (h->root.u.def.value
1748 + h->root.u.def.section->output_section->vma
1749 + h->root.u.def.section->output_offset);
1750 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1751 rela.r_addend = 0;
1752 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1753 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1754 }
1755
1756 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1757 if (h == elf_hash_table (info)->hdynamic
1758 || h == elf_hash_table (info)->hgot)
1759 sym->st_shndx = SHN_ABS;
1760
1761 return true;
1762 }
1763
1764 /* Finish up the dynamic sections. */
1765
1766 static bool
elf_vax_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)1767 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1768 {
1769 bfd *dynobj;
1770 asection *sgot;
1771 asection *sdyn;
1772
1773 dynobj = elf_hash_table (info)->dynobj;
1774
1775 sgot = elf_hash_table (info)->sgotplt;
1776 BFD_ASSERT (sgot != NULL);
1777 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1778
1779 if (elf_hash_table (info)->dynamic_sections_created)
1780 {
1781 asection *splt;
1782 Elf32_External_Dyn *dyncon, *dynconend;
1783
1784 splt = elf_hash_table (info)->splt;
1785 BFD_ASSERT (splt != NULL && sdyn != NULL);
1786
1787 dyncon = (Elf32_External_Dyn *) sdyn->contents;
1788 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1789 for (; dyncon < dynconend; dyncon++)
1790 {
1791 Elf_Internal_Dyn dyn;
1792 asection *s;
1793
1794 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1795
1796 switch (dyn.d_tag)
1797 {
1798 default:
1799 break;
1800
1801 case DT_PLTGOT:
1802 s = elf_hash_table (info)->sgotplt;
1803 goto get_vma;
1804 case DT_JMPREL:
1805 s = elf_hash_table (info)->srelplt;
1806 get_vma:
1807 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1808 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1809 break;
1810
1811 case DT_PLTRELSZ:
1812 s = elf_hash_table (info)->srelplt;
1813 dyn.d_un.d_val = s->size;
1814 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1815 break;
1816 }
1817 }
1818
1819 /* Fill in the first entry in the procedure linkage table. */
1820 if (splt->size > 0)
1821 {
1822 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1823 bfd_put_32 (output_bfd,
1824 (sgot->output_section->vma
1825 + sgot->output_offset + 4
1826 - (splt->output_section->vma + 6)),
1827 splt->contents + 2);
1828 bfd_put_32 (output_bfd,
1829 (sgot->output_section->vma
1830 + sgot->output_offset + 8
1831 - (splt->output_section->vma + 12)),
1832 splt->contents + 8);
1833 elf_section_data (splt->output_section)->this_hdr.sh_entsize
1834 = PLT_ENTRY_SIZE;
1835 }
1836 }
1837
1838 /* Fill in the first three entries in the global offset table. */
1839 if (sgot->size > 0)
1840 {
1841 if (sdyn == NULL)
1842 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1843 else
1844 bfd_put_32 (output_bfd,
1845 sdyn->output_section->vma + sdyn->output_offset,
1846 sgot->contents);
1847 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1848 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1849 }
1850
1851 if (elf_section_data (sgot->output_section) != NULL)
1852 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1853
1854 return true;
1855 }
1856
1857 static enum elf_reloc_type_class
elf_vax_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)1858 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1859 const asection *rel_sec ATTRIBUTE_UNUSED,
1860 const Elf_Internal_Rela *rela)
1861 {
1862 switch ((int) ELF32_R_TYPE (rela->r_info))
1863 {
1864 case R_VAX_RELATIVE:
1865 return reloc_class_relative;
1866 case R_VAX_JMP_SLOT:
1867 return reloc_class_plt;
1868 case R_VAX_COPY:
1869 return reloc_class_copy;
1870 default:
1871 return reloc_class_normal;
1872 }
1873 }
1874
1875 static bfd_vma
elf_vax_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)1876 elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1877 const arelent *rel ATTRIBUTE_UNUSED)
1878 {
1879 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1880 }
1881
1882 #define TARGET_LITTLE_SYM vax_elf32_vec
1883 #define TARGET_LITTLE_NAME "elf32-vax"
1884 #define ELF_MACHINE_CODE EM_VAX
1885 #define ELF_MAXPAGESIZE 0x10000
1886
1887 #define elf_backend_create_dynamic_sections \
1888 _bfd_elf_create_dynamic_sections
1889 #define bfd_elf32_bfd_link_hash_table_create \
1890 elf_vax_link_hash_table_create
1891 #define bfd_elf32_bfd_copy_private_bfd_data \
1892 elf32_vax_copy_private_bfd_data
1893
1894 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
1895
1896 #define elf_backend_check_relocs elf_vax_check_relocs
1897 #define elf_backend_adjust_dynamic_symbol \
1898 elf_vax_adjust_dynamic_symbol
1899 #define elf_backend_always_size_sections \
1900 elf_vax_always_size_sections
1901 #define elf_backend_size_dynamic_sections \
1902 elf_vax_size_dynamic_sections
1903 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
1904 #define elf_backend_relocate_section elf_vax_relocate_section
1905 #define elf_backend_finish_dynamic_symbol \
1906 elf_vax_finish_dynamic_symbol
1907 #define elf_backend_finish_dynamic_sections \
1908 elf_vax_finish_dynamic_sections
1909 #define elf_backend_reloc_type_class elf_vax_reloc_type_class
1910 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
1911 #define elf_backend_plt_sym_val elf_vax_plt_sym_val
1912 #define bfd_elf32_bfd_merge_private_bfd_data \
1913 elf32_vax_merge_private_bfd_data
1914 #define bfd_elf32_bfd_set_private_flags \
1915 elf32_vax_set_private_flags
1916 #define bfd_elf32_bfd_print_private_bfd_data \
1917 elf32_vax_print_private_bfd_data
1918
1919 #define elf_backend_can_gc_sections 1
1920 #define elf_backend_want_got_plt 1
1921 #define elf_backend_plt_readonly 1
1922 #define elf_backend_want_plt_sym 0
1923 #define elf_backend_got_header_size 16
1924 #define elf_backend_rela_normal 1
1925 #define elf_backend_dtrel_excludes_plt 1
1926
1927 #include "elf32-target.h"
1928