1 /* VAX series support for 32-bit ELF 2 Copyright (C) 1993-2016 Free Software Foundation, Inc. 3 Contributed by Matt Thomas <matt@3am-software.com>. 4 5 This file is part of BFD, the Binary File Descriptor library. 6 7 This program is free software; you can redistribute it and/or modify 8 it under the terms of the GNU General Public License as published by 9 the Free Software Foundation; either version 3 of the License, or 10 (at your option) any later version. 11 12 This program is distributed in the hope that it will be useful, 13 but WITHOUT ANY WARRANTY; without even the implied warranty of 14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 15 GNU General Public License for more details. 16 17 You should have received a copy of the GNU General Public License 18 along with this program; if not, write to the Free Software 19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, 20 MA 02110-1301, USA. */ 21 22 #include "sysdep.h" 23 #include "bfd.h" 24 #include "bfdlink.h" 25 #include "libbfd.h" 26 #include "elf-bfd.h" 27 #include "elf/vax.h" 28 29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type); 30 static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *); 31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *, 32 struct bfd_hash_table *, 33 const char *); 34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *); 35 static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *, 36 asection *, const Elf_Internal_Rela *); 37 static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *, 38 struct elf_link_hash_entry *); 39 static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *); 40 static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *, 41 bfd *, asection *, bfd_byte *, 42 Elf_Internal_Rela *, 43 Elf_Internal_Sym *, asection **); 44 static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *, 45 struct elf_link_hash_entry *, 46 Elf_Internal_Sym *); 47 static bfd_boolean elf_vax_finish_dynamic_sections (bfd *, 48 struct bfd_link_info *); 49 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *, 50 const arelent *); 51 52 static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword); 53 static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *); 54 static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *); 55 56 static reloc_howto_type howto_table[] = { 57 HOWTO (R_VAX_NONE, /* type */ 58 0, /* rightshift */ 59 3, /* size (0 = byte, 1 = short, 2 = long) */ 60 0, /* bitsize */ 61 FALSE, /* pc_relative */ 62 0, /* bitpos */ 63 complain_overflow_dont, /* complain_on_overflow */ 64 bfd_elf_generic_reloc, /* special_function */ 65 "R_VAX_NONE", /* name */ 66 FALSE, /* partial_inplace */ 67 0, /* src_mask */ 68 0x00000000, /* dst_mask */ 69 FALSE), /* pcrel_offset */ 70 71 HOWTO (R_VAX_32, /* type */ 72 0, /* rightshift */ 73 2, /* size (0 = byte, 1 = short, 2 = long) */ 74 32, /* bitsize */ 75 FALSE, /* pc_relative */ 76 0, /* bitpos */ 77 complain_overflow_bitfield, /* complain_on_overflow */ 78 bfd_elf_generic_reloc, /* special_function */ 79 "R_VAX_32", /* name */ 80 FALSE, /* partial_inplace */ 81 0, /* src_mask */ 82 0xffffffff, /* dst_mask */ 83 FALSE), /* pcrel_offset */ 84 85 HOWTO (R_VAX_16, /* type */ 86 0, /* rightshift */ 87 1, /* size (0 = byte, 1 = short, 2 = long) */ 88 16, /* bitsize */ 89 FALSE, /* pc_relative */ 90 0, /* bitpos */ 91 complain_overflow_bitfield, /* complain_on_overflow */ 92 bfd_elf_generic_reloc, /* special_function */ 93 "R_VAX_16", /* name */ 94 FALSE, /* partial_inplace */ 95 0, /* src_mask */ 96 0x0000ffff, /* dst_mask */ 97 FALSE), /* pcrel_offset */ 98 99 HOWTO (R_VAX_8, /* type */ 100 0, /* rightshift */ 101 0, /* size (0 = byte, 1 = short, 2 = long) */ 102 8, /* bitsize */ 103 FALSE, /* pc_relative */ 104 0, /* bitpos */ 105 complain_overflow_bitfield, /* complain_on_overflow */ 106 bfd_elf_generic_reloc, /* special_function */ 107 "R_VAX_8", /* name */ 108 FALSE, /* partial_inplace */ 109 0, /* src_mask */ 110 0x000000ff, /* dst_mask */ 111 FALSE), /* pcrel_offset */ 112 113 HOWTO (R_VAX_PC32, /* type */ 114 0, /* rightshift */ 115 2, /* size (0 = byte, 1 = short, 2 = long) */ 116 32, /* bitsize */ 117 TRUE, /* pc_relative */ 118 0, /* bitpos */ 119 complain_overflow_bitfield, /* complain_on_overflow */ 120 bfd_elf_generic_reloc, /* special_function */ 121 "R_VAX_PC32", /* name */ 122 FALSE, /* partial_inplace */ 123 0, /* src_mask */ 124 0xffffffff, /* dst_mask */ 125 TRUE), /* pcrel_offset */ 126 127 HOWTO (R_VAX_PC16, /* type */ 128 0, /* rightshift */ 129 1, /* size (0 = byte, 1 = short, 2 = long) */ 130 16, /* bitsize */ 131 TRUE, /* pc_relative */ 132 0, /* bitpos */ 133 complain_overflow_signed, /* complain_on_overflow */ 134 bfd_elf_generic_reloc, /* special_function */ 135 "R_VAX_PC16", /* name */ 136 FALSE, /* partial_inplace */ 137 0, /* src_mask */ 138 0x0000ffff, /* dst_mask */ 139 TRUE), /* pcrel_offset */ 140 141 HOWTO (R_VAX_PC8, /* type */ 142 0, /* rightshift */ 143 0, /* size (0 = byte, 1 = short, 2 = long) */ 144 8, /* bitsize */ 145 TRUE, /* pc_relative */ 146 0, /* bitpos */ 147 complain_overflow_signed, /* complain_on_overflow */ 148 bfd_elf_generic_reloc, /* special_function */ 149 "R_VAX_PC8", /* name */ 150 FALSE, /* partial_inplace */ 151 0, /* src_mask */ 152 0x000000ff, /* dst_mask */ 153 TRUE), /* pcrel_offset */ 154 155 HOWTO (R_VAX_GOT32, /* type */ 156 0, /* rightshift */ 157 2, /* size (0 = byte, 1 = short, 2 = long) */ 158 32, /* bitsize */ 159 TRUE, /* pc_relative */ 160 0, /* bitpos */ 161 complain_overflow_bitfield, /* complain_on_overflow */ 162 bfd_elf_generic_reloc, /* special_function */ 163 "R_VAX_GOT32", /* name */ 164 FALSE, /* partial_inplace */ 165 0, /* src_mask */ 166 0xffffffff, /* dst_mask */ 167 TRUE), /* pcrel_offset */ 168 169 EMPTY_HOWTO (-1), 170 EMPTY_HOWTO (-1), 171 EMPTY_HOWTO (-1), 172 EMPTY_HOWTO (-1), 173 EMPTY_HOWTO (-1), 174 175 HOWTO (R_VAX_PLT32, /* type */ 176 0, /* rightshift */ 177 2, /* size (0 = byte, 1 = short, 2 = long) */ 178 32, /* bitsize */ 179 TRUE, /* pc_relative */ 180 0, /* bitpos */ 181 complain_overflow_bitfield, /* complain_on_overflow */ 182 bfd_elf_generic_reloc, /* special_function */ 183 "R_VAX_PLT32", /* name */ 184 FALSE, /* partial_inplace */ 185 0, /* src_mask */ 186 0xffffffff, /* dst_mask */ 187 TRUE), /* pcrel_offset */ 188 189 EMPTY_HOWTO (-1), 190 EMPTY_HOWTO (-1), 191 EMPTY_HOWTO (-1), 192 EMPTY_HOWTO (-1), 193 EMPTY_HOWTO (-1), 194 195 HOWTO (R_VAX_COPY, /* type */ 196 0, /* rightshift */ 197 0, /* size (0 = byte, 1 = short, 2 = long) */ 198 0, /* bitsize */ 199 FALSE, /* pc_relative */ 200 0, /* bitpos */ 201 complain_overflow_dont, /* complain_on_overflow */ 202 bfd_elf_generic_reloc, /* special_function */ 203 "R_VAX_COPY", /* name */ 204 FALSE, /* partial_inplace */ 205 0, /* src_mask */ 206 0xffffffff, /* dst_mask */ 207 FALSE), /* pcrel_offset */ 208 209 HOWTO (R_VAX_GLOB_DAT, /* type */ 210 0, /* rightshift */ 211 2, /* size (0 = byte, 1 = short, 2 = long) */ 212 32, /* bitsize */ 213 FALSE, /* pc_relative */ 214 0, /* bitpos */ 215 complain_overflow_dont, /* complain_on_overflow */ 216 bfd_elf_generic_reloc, /* special_function */ 217 "R_VAX_GLOB_DAT", /* name */ 218 FALSE, /* partial_inplace */ 219 0, /* src_mask */ 220 0xffffffff, /* dst_mask */ 221 FALSE), /* pcrel_offset */ 222 223 HOWTO (R_VAX_JMP_SLOT, /* type */ 224 0, /* rightshift */ 225 2, /* size (0 = byte, 1 = short, 2 = long) */ 226 32, /* bitsize */ 227 FALSE, /* pc_relative */ 228 0, /* bitpos */ 229 complain_overflow_dont, /* complain_on_overflow */ 230 bfd_elf_generic_reloc, /* special_function */ 231 "R_VAX_JMP_SLOT", /* name */ 232 FALSE, /* partial_inplace */ 233 0, /* src_mask */ 234 0xffffffff, /* dst_mask */ 235 FALSE), /* pcrel_offset */ 236 237 HOWTO (R_VAX_RELATIVE, /* type */ 238 0, /* rightshift */ 239 2, /* size (0 = byte, 1 = short, 2 = long) */ 240 32, /* bitsize */ 241 FALSE, /* pc_relative */ 242 0, /* bitpos */ 243 complain_overflow_dont, /* complain_on_overflow */ 244 bfd_elf_generic_reloc, /* special_function */ 245 "R_VAX_RELATIVE", /* name */ 246 FALSE, /* partial_inplace */ 247 0, /* src_mask */ 248 0xffffffff, /* dst_mask */ 249 FALSE), /* pcrel_offset */ 250 251 /* GNU extension to record C++ vtable hierarchy */ 252 HOWTO (R_VAX_GNU_VTINHERIT, /* type */ 253 0, /* rightshift */ 254 2, /* size (0 = byte, 1 = short, 2 = long) */ 255 0, /* bitsize */ 256 FALSE, /* pc_relative */ 257 0, /* bitpos */ 258 complain_overflow_dont, /* complain_on_overflow */ 259 NULL, /* special_function */ 260 "R_VAX_GNU_VTINHERIT", /* name */ 261 FALSE, /* partial_inplace */ 262 0, /* src_mask */ 263 0, /* dst_mask */ 264 FALSE), /* pcrel_offset */ 265 266 /* GNU extension to record C++ vtable member usage */ 267 HOWTO (R_VAX_GNU_VTENTRY, /* type */ 268 0, /* rightshift */ 269 2, /* size (0 = byte, 1 = short, 2 = long) */ 270 0, /* bitsize */ 271 FALSE, /* pc_relative */ 272 0, /* bitpos */ 273 complain_overflow_dont, /* complain_on_overflow */ 274 _bfd_elf_rel_vtable_reloc_fn, /* special_function */ 275 "R_VAX_GNU_VTENTRY", /* name */ 276 FALSE, /* partial_inplace */ 277 0, /* src_mask */ 278 0, /* dst_mask */ 279 FALSE), /* pcrel_offset */ 280 }; 281 282 static void 283 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst) 284 { 285 unsigned int r_type; 286 287 r_type = ELF32_R_TYPE (dst->r_info); 288 if (r_type >= R_VAX_max) 289 { 290 (*_bfd_error_handler) (_("%B: unrecognised VAX reloc number: %d"), 291 abfd, r_type); 292 bfd_set_error (bfd_error_bad_value); 293 r_type = R_VAX_NONE; 294 } 295 cache_ptr->howto = &howto_table[r_type]; 296 } 297 298 #define elf_info_to_howto rtype_to_howto 299 300 static const struct 301 { 302 bfd_reloc_code_real_type bfd_val; 303 int elf_val; 304 } reloc_map[] = { 305 { BFD_RELOC_NONE, R_VAX_NONE }, 306 { BFD_RELOC_32, R_VAX_32 }, 307 { BFD_RELOC_16, R_VAX_16 }, 308 { BFD_RELOC_8, R_VAX_8 }, 309 { BFD_RELOC_32_PCREL, R_VAX_PC32 }, 310 { BFD_RELOC_16_PCREL, R_VAX_PC16 }, 311 { BFD_RELOC_8_PCREL, R_VAX_PC8 }, 312 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 }, 313 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 }, 314 { BFD_RELOC_NONE, R_VAX_COPY }, 315 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT }, 316 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT }, 317 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE }, 318 { BFD_RELOC_CTOR, R_VAX_32 }, 319 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT }, 320 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY }, 321 }; 322 323 static reloc_howto_type * 324 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code) 325 { 326 unsigned int i; 327 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++) 328 { 329 if (reloc_map[i].bfd_val == code) 330 return &howto_table[reloc_map[i].elf_val]; 331 } 332 return 0; 333 } 334 335 static reloc_howto_type * 336 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED, 337 const char *r_name) 338 { 339 unsigned int i; 340 341 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++) 342 if (howto_table[i].name != NULL 343 && strcasecmp (howto_table[i].name, r_name) == 0) 344 return &howto_table[i]; 345 346 return NULL; 347 } 348 349 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup 350 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup 351 #define ELF_ARCH bfd_arch_vax 352 /* end code generated by elf.el */ 353 354 /* Functions for the VAX ELF linker. */ 355 356 /* The name of the dynamic interpreter. This is put in the .interp 357 section. */ 358 359 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so" 360 361 /* The size in bytes of an entry in the procedure linkage table. */ 362 363 #define PLT_ENTRY_SIZE 12 364 365 /* The first entry in a procedure linkage table looks like this. See 366 the SVR4 ABI VAX supplement to see how this works. */ 367 368 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] = 369 { 370 0xdd, 0xef, /* pushl l^ */ 371 0, 0, 0, 0, /* offset to .plt.got + 4 */ 372 0x17, 0xff, /* jmp @L^(pc) */ 373 0, 0, 0, 0, /* offset to .plt.got + 8 */ 374 }; 375 376 /* Subsequent entries in a procedure linkage table look like this. */ 377 378 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] = 379 { 380 0xfc, 0x0f, /* .word ^M<r11:r2> */ 381 0x16, 0xef, /* jsb L^(pc) */ 382 0, 0, 0, 0, /* replaced with offset to start of .plt */ 383 0, 0, 0, 0, /* index into .rela.plt */ 384 }; 385 386 /* The VAX linker needs to keep track of the number of relocs that it 387 decides to copy in check_relocs for each symbol. This is so that it 388 can discard PC relative relocs if it doesn't need them when linking 389 with -Bsymbolic. We store the information in a field extending the 390 regular ELF linker hash table. */ 391 392 /* This structure keeps track of the number of PC relative relocs we have 393 copied for a given symbol. */ 394 395 struct elf_vax_pcrel_relocs_copied 396 { 397 /* Next section. */ 398 struct elf_vax_pcrel_relocs_copied *next; 399 /* A section in dynobj. */ 400 asection *section; 401 /* Number of relocs copied in this section. */ 402 bfd_size_type count; 403 }; 404 405 /* VAX ELF linker hash entry. */ 406 407 struct elf_vax_link_hash_entry 408 { 409 struct elf_link_hash_entry root; 410 411 /* Number of PC relative relocs copied for this symbol. */ 412 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied; 413 414 bfd_vma got_addend; 415 }; 416 417 /* Declare this now that the above structures are defined. */ 418 419 static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *, 420 void *); 421 422 /* Declare this now that the above structures are defined. */ 423 424 static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *, 425 void *); 426 427 /* Traverse an VAX ELF linker hash table. */ 428 429 #define elf_vax_link_hash_traverse(table, func, info) \ 430 (elf_link_hash_traverse \ 431 ((table), \ 432 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \ 433 (info))) 434 435 /* Create an entry in an VAX ELF linker hash table. */ 436 437 static struct bfd_hash_entry * 438 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry, 439 struct bfd_hash_table *table, 440 const char *string) 441 { 442 struct elf_vax_link_hash_entry *ret = 443 (struct elf_vax_link_hash_entry *) entry; 444 445 /* Allocate the structure if it has not already been allocated by a 446 subclass. */ 447 if (ret == NULL) 448 ret = ((struct elf_vax_link_hash_entry *) 449 bfd_hash_allocate (table, 450 sizeof (struct elf_vax_link_hash_entry))); 451 if (ret == NULL) 452 return (struct bfd_hash_entry *) ret; 453 454 /* Call the allocation method of the superclass. */ 455 ret = ((struct elf_vax_link_hash_entry *) 456 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret, 457 table, string)); 458 if (ret != NULL) 459 { 460 ret->pcrel_relocs_copied = NULL; 461 } 462 463 return (struct bfd_hash_entry *) ret; 464 } 465 466 /* Create an VAX ELF linker hash table. */ 467 468 static struct bfd_link_hash_table * 469 elf_vax_link_hash_table_create (bfd *abfd) 470 { 471 struct elf_link_hash_table *ret; 472 bfd_size_type amt = sizeof (struct elf_link_hash_table); 473 474 ret = bfd_zmalloc (amt); 475 if (ret == NULL) 476 return NULL; 477 478 if (!_bfd_elf_link_hash_table_init (ret, abfd, 479 elf_vax_link_hash_newfunc, 480 sizeof (struct elf_vax_link_hash_entry), 481 GENERIC_ELF_DATA)) 482 { 483 free (ret); 484 return NULL; 485 } 486 487 return &ret->root; 488 } 489 490 /* Keep vax-specific flags in the ELF header */ 491 static bfd_boolean 492 elf32_vax_set_private_flags (bfd *abfd, flagword flags) 493 { 494 elf_elfheader (abfd)->e_flags = flags; 495 elf_flags_init (abfd) = TRUE; 496 return TRUE; 497 } 498 499 /* Merge backend specific data from an object file to the output 500 object file when linking. */ 501 static bfd_boolean 502 elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd) 503 { 504 flagword in_flags; 505 506 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour 507 || bfd_get_flavour (obfd) != bfd_target_elf_flavour) 508 return TRUE; 509 510 in_flags = elf_elfheader (ibfd)->e_flags; 511 512 if (!elf_flags_init (obfd)) 513 { 514 elf_flags_init (obfd) = TRUE; 515 elf_elfheader (obfd)->e_flags = in_flags; 516 } 517 518 return TRUE; 519 } 520 521 /* Display the flags field */ 522 static bfd_boolean 523 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr) 524 { 525 FILE *file = (FILE *) ptr; 526 527 BFD_ASSERT (abfd != NULL && ptr != NULL); 528 529 /* Print normal ELF private data. */ 530 _bfd_elf_print_private_bfd_data (abfd, ptr); 531 532 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */ 533 534 /* xgettext:c-format */ 535 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags); 536 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC) 538 fprintf (file, _(" [nonpic]")); 539 540 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT) 541 fprintf (file, _(" [d-float]")); 542 543 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT) 544 fprintf (file, _(" [g-float]")); 545 546 fputc ('\n', file); 547 548 return TRUE; 549 } 550 /* Look through the relocs for a section during the first phase, and 551 allocate space in the global offset table or procedure linkage 552 table. */ 553 554 static bfd_boolean 555 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec, 556 const Elf_Internal_Rela *relocs) 557 { 558 bfd *dynobj; 559 Elf_Internal_Shdr *symtab_hdr; 560 struct elf_link_hash_entry **sym_hashes; 561 const Elf_Internal_Rela *rel; 562 const Elf_Internal_Rela *rel_end; 563 asection *sgot; 564 asection *srelgot; 565 asection *sreloc; 566 567 if (bfd_link_relocatable (info)) 568 return TRUE; 569 570 dynobj = elf_hash_table (info)->dynobj; 571 symtab_hdr = &elf_tdata (abfd)->symtab_hdr; 572 sym_hashes = elf_sym_hashes (abfd); 573 574 sgot = NULL; 575 srelgot = NULL; 576 sreloc = NULL; 577 578 rel_end = relocs + sec->reloc_count; 579 for (rel = relocs; rel < rel_end; rel++) 580 { 581 unsigned long r_symndx; 582 struct elf_link_hash_entry *h; 583 584 r_symndx = ELF32_R_SYM (rel->r_info); 585 586 if (r_symndx < symtab_hdr->sh_info) 587 h = NULL; 588 else 589 { 590 h = sym_hashes[r_symndx - symtab_hdr->sh_info]; 591 while (h->root.type == bfd_link_hash_indirect 592 || h->root.type == bfd_link_hash_warning) 593 h = (struct elf_link_hash_entry *) h->root.u.i.link; 594 595 /* PR15323, ref flags aren't set for references in the same 596 object. */ 597 h->root.non_ir_ref = 1; 598 } 599 600 switch (ELF32_R_TYPE (rel->r_info)) 601 { 602 case R_VAX_GOT32: 603 BFD_ASSERT (h != NULL); 604 605 /* If this is a local symbol, we resolve it directly without 606 creating a global offset table entry. */ 607 if (h->forced_local 608 || h == elf_hash_table (info)->hgot 609 || h == elf_hash_table (info)->hplt) 610 break; 611 612 /* This symbol requires a global offset table entry. */ 613 614 if (dynobj == NULL) 615 { 616 /* Create the .got section. */ 617 elf_hash_table (info)->dynobj = dynobj = abfd; 618 if (!_bfd_elf_create_got_section (dynobj, info)) 619 return FALSE; 620 } 621 622 if (sgot == NULL) 623 { 624 sgot = bfd_get_linker_section (dynobj, ".got"); 625 BFD_ASSERT (sgot != NULL); 626 } 627 628 if (srelgot == NULL 629 && (h != NULL || bfd_link_pic (info))) 630 { 631 srelgot = bfd_get_linker_section (dynobj, ".rela.got"); 632 if (srelgot == NULL) 633 { 634 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS 635 | SEC_IN_MEMORY | SEC_LINKER_CREATED 636 | SEC_READONLY); 637 638 srelgot = bfd_make_section_anyway_with_flags (dynobj, 639 ".rela.got", 640 flags); 641 if (srelgot == NULL 642 || !bfd_set_section_alignment (dynobj, srelgot, 2)) 643 return FALSE; 644 } 645 } 646 647 if (h != NULL) 648 { 649 struct elf_vax_link_hash_entry *eh; 650 651 eh = (struct elf_vax_link_hash_entry *) h; 652 if (h->got.refcount == -1) 653 { 654 h->got.refcount = 1; 655 eh->got_addend = rel->r_addend; 656 } 657 else 658 { 659 h->got.refcount++; 660 if (eh->got_addend != (bfd_vma) rel->r_addend) 661 (*_bfd_error_handler) 662 (_("%s: warning: GOT addend of %ld to `%s' does" 663 " not match previous GOT addend of %ld"), 664 bfd_get_filename (abfd), rel->r_addend, 665 h->root.root.string, 666 eh->got_addend); 667 668 } 669 } 670 break; 671 672 case R_VAX_PLT32: 673 /* This symbol requires a procedure linkage table entry. We 674 actually build the entry in adjust_dynamic_symbol, 675 because this might be a case of linking PIC code which is 676 never referenced by a dynamic object, in which case we 677 don't need to generate a procedure linkage table entry 678 after all. */ 679 BFD_ASSERT (h != NULL); 680 681 /* If this is a local symbol, we resolve it directly without 682 creating a procedure linkage table entry. */ 683 if (h->forced_local) 684 break; 685 686 h->needs_plt = 1; 687 if (h->plt.refcount == -1) 688 h->plt.refcount = 1; 689 else 690 h->plt.refcount++; 691 break; 692 693 case R_VAX_PC8: 694 case R_VAX_PC16: 695 case R_VAX_PC32: 696 /* If we are creating a shared library and this is not a local 697 symbol, we need to copy the reloc into the shared library. 698 However when linking with -Bsymbolic and this is a global 699 symbol which is defined in an object we are including in the 700 link (i.e., DEF_REGULAR is set), then we can resolve the 701 reloc directly. At this point we have not seen all the input 702 files, so it is possible that DEF_REGULAR is not set now but 703 will be set later (it is never cleared). We account for that 704 possibility below by storing information in the 705 pcrel_relocs_copied field of the hash table entry. */ 706 if (!(bfd_link_pic (info) 707 && (sec->flags & SEC_ALLOC) != 0 708 && h != NULL 709 && (!info->symbolic 710 || !h->def_regular))) 711 { 712 if (h != NULL 713 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT 714 && !h->forced_local) 715 { 716 /* Make sure a plt entry is created for this symbol if 717 it turns out to be a function defined by a dynamic 718 object. */ 719 if (h->plt.refcount == -1) 720 h->plt.refcount = 1; 721 else 722 h->plt.refcount++; 723 } 724 break; 725 } 726 /* If this is a local symbol, we can resolve it directly. */ 727 if (h != NULL 728 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT 729 || h->forced_local)) 730 break; 731 732 /* Fall through. */ 733 case R_VAX_8: 734 case R_VAX_16: 735 case R_VAX_32: 736 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT) 737 { 738 /* Make sure a plt entry is created for this symbol if it 739 turns out to be a function defined by a dynamic object. */ 740 if (h->plt.refcount == -1) 741 h->plt.refcount = 1; 742 else 743 h->plt.refcount++; 744 } 745 746 /* If we are creating a shared library, we need to copy the 747 reloc into the shared library. */ 748 if (bfd_link_pic (info) 749 && (sec->flags & SEC_ALLOC) != 0) 750 { 751 /* When creating a shared object, we must copy these 752 reloc types into the output file. We create a reloc 753 section in dynobj and make room for this reloc. */ 754 if (sreloc == NULL) 755 { 756 sreloc = _bfd_elf_make_dynamic_reloc_section 757 (sec, dynobj, 2, abfd, /*rela?*/ TRUE); 758 759 if (sreloc == NULL) 760 return FALSE; 761 762 if (sec->flags & SEC_READONLY) 763 info->flags |= DF_TEXTREL; 764 } 765 766 sreloc->size += sizeof (Elf32_External_Rela); 767 768 /* If we are linking with -Bsymbolic, we count the number of 769 PC relative relocations we have entered for this symbol, 770 so that we can discard them again if the symbol is later 771 defined by a regular object. Note that this function is 772 only called if we are using a vaxelf linker hash table, 773 which means that h is really a pointer to an 774 elf_vax_link_hash_entry. */ 775 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8 776 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16 777 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32) 778 && info->symbolic) 779 { 780 struct elf_vax_link_hash_entry *eh; 781 struct elf_vax_pcrel_relocs_copied *p; 782 783 eh = (struct elf_vax_link_hash_entry *) h; 784 785 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next) 786 if (p->section == sreloc) 787 break; 788 789 if (p == NULL) 790 { 791 p = ((struct elf_vax_pcrel_relocs_copied *) 792 bfd_alloc (dynobj, (bfd_size_type) sizeof *p)); 793 if (p == NULL) 794 return FALSE; 795 p->next = eh->pcrel_relocs_copied; 796 eh->pcrel_relocs_copied = p; 797 p->section = sreloc; 798 p->count = 0; 799 } 800 801 ++p->count; 802 } 803 } 804 805 break; 806 807 /* This relocation describes the C++ object vtable hierarchy. 808 Reconstruct it for later use during GC. */ 809 case R_VAX_GNU_VTINHERIT: 810 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset)) 811 return FALSE; 812 break; 813 814 /* This relocation describes which C++ vtable entries are actually 815 used. Record for later use during GC. */ 816 case R_VAX_GNU_VTENTRY: 817 BFD_ASSERT (h != NULL); 818 if (h != NULL 819 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend)) 820 return FALSE; 821 break; 822 823 default: 824 break; 825 } 826 } 827 828 return TRUE; 829 } 830 831 /* Return the section that should be marked against GC for a given 832 relocation. */ 833 834 static asection * 835 elf_vax_gc_mark_hook (asection *sec, 836 struct bfd_link_info *info, 837 Elf_Internal_Rela *rel, 838 struct elf_link_hash_entry *h, 839 Elf_Internal_Sym *sym) 840 { 841 if (h != NULL) 842 switch (ELF32_R_TYPE (rel->r_info)) 843 { 844 case R_VAX_GNU_VTINHERIT: 845 case R_VAX_GNU_VTENTRY: 846 return NULL; 847 } 848 849 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym); 850 } 851 852 /* Update the got entry reference counts for the section being removed. */ 853 854 static bfd_boolean 855 elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec, 856 const Elf_Internal_Rela *relocs) 857 { 858 Elf_Internal_Shdr *symtab_hdr; 859 struct elf_link_hash_entry **sym_hashes; 860 const Elf_Internal_Rela *rel, *relend; 861 bfd *dynobj; 862 863 if (bfd_link_relocatable (info)) 864 return TRUE; 865 866 dynobj = elf_hash_table (info)->dynobj; 867 if (dynobj == NULL) 868 return TRUE; 869 870 symtab_hdr = &elf_tdata (abfd)->symtab_hdr; 871 sym_hashes = elf_sym_hashes (abfd); 872 873 relend = relocs + sec->reloc_count; 874 for (rel = relocs; rel < relend; rel++) 875 { 876 unsigned long r_symndx; 877 struct elf_link_hash_entry *h = NULL; 878 879 r_symndx = ELF32_R_SYM (rel->r_info); 880 if (r_symndx >= symtab_hdr->sh_info) 881 { 882 h = sym_hashes[r_symndx - symtab_hdr->sh_info]; 883 while (h->root.type == bfd_link_hash_indirect 884 || h->root.type == bfd_link_hash_warning) 885 h = (struct elf_link_hash_entry *) h->root.u.i.link; 886 } 887 888 switch (ELF32_R_TYPE (rel->r_info)) 889 { 890 case R_VAX_GOT32: 891 if (h != NULL && h->got.refcount > 0) 892 --h->got.refcount; 893 break; 894 895 case R_VAX_PLT32: 896 case R_VAX_PC8: 897 case R_VAX_PC16: 898 case R_VAX_PC32: 899 case R_VAX_8: 900 case R_VAX_16: 901 case R_VAX_32: 902 if (h != NULL && h->plt.refcount > 0) 903 --h->plt.refcount; 904 break; 905 906 default: 907 break; 908 } 909 } 910 911 return TRUE; 912 } 913 914 /* Adjust a symbol defined by a dynamic object and referenced by a 915 regular object. The current definition is in some section of the 916 dynamic object, but we're not including those sections. We have to 917 change the definition to something the rest of the link can 918 understand. */ 919 920 static bfd_boolean 921 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info, 922 struct elf_link_hash_entry *h) 923 { 924 bfd *dynobj; 925 asection *s; 926 927 dynobj = elf_hash_table (info)->dynobj; 928 929 /* Make sure we know what is going on here. */ 930 BFD_ASSERT (dynobj != NULL 931 && (h->needs_plt 932 || h->u.weakdef != NULL 933 || (h->def_dynamic 934 && h->ref_regular 935 && !h->def_regular))); 936 937 /* If this is a function, put it in the procedure linkage table. We 938 will fill in the contents of the procedure linkage table later, 939 when we know the address of the .got section. */ 940 if (h->type == STT_FUNC 941 || h->needs_plt) 942 { 943 if (h->plt.refcount <= 0 944 || SYMBOL_CALLS_LOCAL (info, h) 945 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT 946 && h->root.type == bfd_link_hash_undefweak)) 947 { 948 /* This case can occur if we saw a PLTxx reloc in an input 949 file, but the symbol was never referred to by a dynamic 950 object, or if all references were garbage collected. In 951 such a case, we don't actually need to build a procedure 952 linkage table, and we can just do a PCxx reloc instead. */ 953 h->plt.offset = (bfd_vma) -1; 954 h->needs_plt = 0; 955 return TRUE; 956 } 957 958 s = bfd_get_linker_section (dynobj, ".plt"); 959 BFD_ASSERT (s != NULL); 960 961 /* If this is the first .plt entry, make room for the special 962 first entry. */ 963 if (s->size == 0) 964 { 965 s->size += PLT_ENTRY_SIZE; 966 } 967 968 /* If this symbol is not defined in a regular file, and we are 969 not generating a shared library, then set the symbol to this 970 location in the .plt. This is required to make function 971 pointers compare as equal between the normal executable and 972 the shared library. */ 973 if (!bfd_link_pic (info) 974 && !h->def_regular) 975 { 976 h->root.u.def.section = s; 977 h->root.u.def.value = s->size; 978 } 979 980 h->plt.offset = s->size; 981 982 /* Make room for this entry. */ 983 s->size += PLT_ENTRY_SIZE; 984 985 /* We also need to make an entry in the .got.plt section, which 986 will be placed in the .got section by the linker script. */ 987 988 s = bfd_get_linker_section (dynobj, ".got.plt"); 989 BFD_ASSERT (s != NULL); 990 s->size += 4; 991 992 /* We also need to make an entry in the .rela.plt section. */ 993 994 s = bfd_get_linker_section (dynobj, ".rela.plt"); 995 BFD_ASSERT (s != NULL); 996 s->size += sizeof (Elf32_External_Rela); 997 998 return TRUE; 999 } 1000 1001 /* Reinitialize the plt offset now that it is not used as a reference 1002 count any more. */ 1003 h->plt.offset = (bfd_vma) -1; 1004 1005 /* If this is a weak symbol, and there is a real definition, the 1006 processor independent code will have arranged for us to see the 1007 real definition first, and we can just use the same value. */ 1008 if (h->u.weakdef != NULL) 1009 { 1010 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined 1011 || h->u.weakdef->root.type == bfd_link_hash_defweak); 1012 h->root.u.def.section = h->u.weakdef->root.u.def.section; 1013 h->root.u.def.value = h->u.weakdef->root.u.def.value; 1014 return TRUE; 1015 } 1016 1017 /* This is a reference to a symbol defined by a dynamic object which 1018 is not a function. */ 1019 1020 /* If we are creating a shared library, we must presume that the 1021 only references to the symbol are via the global offset table. 1022 For such cases we need not do anything here; the relocations will 1023 be handled correctly by relocate_section. */ 1024 if (bfd_link_pic (info)) 1025 return TRUE; 1026 1027 /* We must allocate the symbol in our .dynbss section, which will 1028 become part of the .bss section of the executable. There will be 1029 an entry for this symbol in the .dynsym section. The dynamic 1030 object will contain position independent code, so all references 1031 from the dynamic object to this symbol will go through the global 1032 offset table. The dynamic linker will use the .dynsym entry to 1033 determine the address it must put in the global offset table, so 1034 both the dynamic object and the regular object will refer to the 1035 same memory location for the variable. */ 1036 1037 s = bfd_get_linker_section (dynobj, ".dynbss"); 1038 BFD_ASSERT (s != NULL); 1039 1040 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to 1041 copy the initial value out of the dynamic object and into the 1042 runtime process image. We need to remember the offset into the 1043 .rela.bss section we are going to use. */ 1044 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0) 1045 { 1046 asection *srel; 1047 1048 srel = bfd_get_linker_section (dynobj, ".rela.bss"); 1049 BFD_ASSERT (srel != NULL); 1050 srel->size += sizeof (Elf32_External_Rela); 1051 h->needs_copy = 1; 1052 } 1053 1054 return _bfd_elf_adjust_dynamic_copy (info, h, s); 1055 } 1056 1057 /* This function is called via elf_link_hash_traverse. It resets GOT 1058 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation 1059 will be done. */ 1060 1061 static bfd_boolean 1062 elf_vax_discard_got_entries (struct elf_link_hash_entry *h, 1063 void *infoptr ATTRIBUTE_UNUSED) 1064 { 1065 h->got.refcount = -1; 1066 h->plt.refcount = -1; 1067 1068 return TRUE; 1069 } 1070 1071 /* Discard unused dynamic data if this is a static link. */ 1072 1073 static bfd_boolean 1074 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED, 1075 struct bfd_link_info *info) 1076 { 1077 bfd *dynobj; 1078 asection *s; 1079 1080 dynobj = elf_hash_table (info)->dynobj; 1081 1082 if (dynobj && !elf_hash_table (info)->dynamic_sections_created) 1083 { 1084 /* We may have created entries in the .rela.got and .got sections. 1085 However, if we are not creating the dynamic sections, we will 1086 not actually use these entries. Reset the size of .rela.got 1087 and .got, which will cause them to get stripped from the output 1088 file below. */ 1089 s = bfd_get_linker_section (dynobj, ".rela.got"); 1090 if (s != NULL) 1091 s->size = 0; 1092 s = bfd_get_linker_section (dynobj, ".got.plt"); 1093 if (s != NULL) 1094 s->size = 0; 1095 s = bfd_get_linker_section (dynobj, ".got"); 1096 if (s != NULL) 1097 s->size = 0; 1098 } 1099 1100 /* If this is a static link, we need to discard all the got entries we've 1101 recorded. */ 1102 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created) 1103 elf_link_hash_traverse (elf_hash_table (info), 1104 elf_vax_discard_got_entries, 1105 info); 1106 1107 return TRUE; 1108 } 1109 1110 /* Set the sizes of the dynamic sections. */ 1111 1112 static bfd_boolean 1113 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info) 1114 { 1115 bfd *dynobj; 1116 asection *s; 1117 bfd_boolean plt; 1118 bfd_boolean relocs; 1119 bfd_boolean reltext; 1120 1121 dynobj = elf_hash_table (info)->dynobj; 1122 BFD_ASSERT (dynobj != NULL); 1123 1124 if (elf_hash_table (info)->dynamic_sections_created) 1125 { 1126 /* Set the contents of the .interp section to the interpreter. */ 1127 if (bfd_link_executable (info) && !info->nointerp) 1128 { 1129 s = bfd_get_linker_section (dynobj, ".interp"); 1130 BFD_ASSERT (s != NULL); 1131 s->size = sizeof ELF_DYNAMIC_INTERPRETER; 1132 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER; 1133 } 1134 } 1135 1136 /* If this is a -Bsymbolic shared link, then we need to discard all PC 1137 relative relocs against symbols defined in a regular object. We 1138 allocated space for them in the check_relocs routine, but we will not 1139 fill them in in the relocate_section routine. */ 1140 if (bfd_link_pic (info) && info->symbolic) 1141 elf_vax_link_hash_traverse (elf_hash_table (info), 1142 elf_vax_discard_copies, 1143 NULL); 1144 1145 /* If this is a -Bsymbolic shared link, we need to discard all the got 1146 entries we've recorded. Otherwise, we need to instantiate (allocate 1147 space for them). */ 1148 elf_link_hash_traverse (elf_hash_table (info), 1149 elf_vax_instantiate_got_entries, 1150 info); 1151 1152 /* The check_relocs and adjust_dynamic_symbol entry points have 1153 determined the sizes of the various dynamic sections. Allocate 1154 memory for them. */ 1155 plt = FALSE; 1156 relocs = FALSE; 1157 reltext = FALSE; 1158 for (s = dynobj->sections; s != NULL; s = s->next) 1159 { 1160 const char *name; 1161 1162 if ((s->flags & SEC_LINKER_CREATED) == 0) 1163 continue; 1164 1165 /* It's OK to base decisions on the section name, because none 1166 of the dynobj section names depend upon the input files. */ 1167 name = bfd_get_section_name (dynobj, s); 1168 1169 if (strcmp (name, ".plt") == 0) 1170 { 1171 /* Remember whether there is a PLT. */ 1172 plt = s->size != 0; 1173 } 1174 else if (CONST_STRNEQ (name, ".rela")) 1175 { 1176 if (s->size != 0) 1177 { 1178 asection *target; 1179 1180 /* Remember whether there are any reloc sections other 1181 than .rela.plt. */ 1182 if (strcmp (name, ".rela.plt") != 0) 1183 { 1184 const char *outname; 1185 1186 relocs = TRUE; 1187 1188 /* If this relocation section applies to a read only 1189 section, then we probably need a DT_TEXTREL 1190 entry. .rela.plt is actually associated with 1191 .got.plt, which is never readonly. */ 1192 outname = bfd_get_section_name (output_bfd, 1193 s->output_section); 1194 target = bfd_get_section_by_name (output_bfd, outname + 5); 1195 if (target != NULL 1196 && (target->flags & SEC_READONLY) != 0 1197 && (target->flags & SEC_ALLOC) != 0) 1198 reltext = TRUE; 1199 } 1200 1201 /* We use the reloc_count field as a counter if we need 1202 to copy relocs into the output file. */ 1203 s->reloc_count = 0; 1204 } 1205 } 1206 else if (! CONST_STRNEQ (name, ".got") 1207 && strcmp (name, ".dynbss") != 0) 1208 { 1209 /* It's not one of our sections, so don't allocate space. */ 1210 continue; 1211 } 1212 1213 if (s->size == 0) 1214 { 1215 /* If we don't need this section, strip it from the 1216 output file. This is mostly to handle .rela.bss and 1217 .rela.plt. We must create both sections in 1218 create_dynamic_sections, because they must be created 1219 before the linker maps input sections to output 1220 sections. The linker does that before 1221 adjust_dynamic_symbol is called, and it is that 1222 function which decides whether anything needs to go 1223 into these sections. */ 1224 s->flags |= SEC_EXCLUDE; 1225 continue; 1226 } 1227 1228 if ((s->flags & SEC_HAS_CONTENTS) == 0) 1229 continue; 1230 1231 /* Allocate memory for the section contents. */ 1232 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size); 1233 if (s->contents == NULL) 1234 return FALSE; 1235 } 1236 1237 if (elf_hash_table (info)->dynamic_sections_created) 1238 { 1239 /* Add some entries to the .dynamic section. We fill in the 1240 values later, in elf_vax_finish_dynamic_sections, but we 1241 must add the entries now so that we get the correct size for 1242 the .dynamic section. The DT_DEBUG entry is filled in by the 1243 dynamic linker and used by the debugger. */ 1244 #define add_dynamic_entry(TAG, VAL) \ 1245 _bfd_elf_add_dynamic_entry (info, TAG, VAL) 1246 1247 if (!bfd_link_pic (info)) 1248 { 1249 if (!add_dynamic_entry (DT_DEBUG, 0)) 1250 return FALSE; 1251 } 1252 1253 if (plt) 1254 { 1255 if (!add_dynamic_entry (DT_PLTGOT, 0) 1256 || !add_dynamic_entry (DT_PLTRELSZ, 0) 1257 || !add_dynamic_entry (DT_PLTREL, DT_RELA) 1258 || !add_dynamic_entry (DT_JMPREL, 0)) 1259 return FALSE; 1260 } 1261 1262 if (relocs) 1263 { 1264 if (!add_dynamic_entry (DT_RELA, 0) 1265 || !add_dynamic_entry (DT_RELASZ, 0) 1266 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela))) 1267 return FALSE; 1268 } 1269 1270 if (reltext || (info->flags & DF_TEXTREL) != 0) 1271 { 1272 if (!add_dynamic_entry (DT_TEXTREL, 0)) 1273 return FALSE; 1274 } 1275 } 1276 #undef add_dynamic_entry 1277 1278 return TRUE; 1279 } 1280 1281 /* This function is called via elf_vax_link_hash_traverse if we are 1282 creating a shared object with -Bsymbolic. It discards the space 1283 allocated to copy PC relative relocs against symbols which are defined 1284 in regular objects. We allocated space for them in the check_relocs 1285 routine, but we won't fill them in in the relocate_section routine. */ 1286 1287 static bfd_boolean 1288 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h, 1289 void * ignore ATTRIBUTE_UNUSED) 1290 { 1291 struct elf_vax_pcrel_relocs_copied *s; 1292 1293 /* We only discard relocs for symbols defined in a regular object. */ 1294 if (!h->root.def_regular) 1295 return TRUE; 1296 1297 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next) 1298 s->section->size -= s->count * sizeof (Elf32_External_Rela); 1299 1300 return TRUE; 1301 } 1302 1303 /* This function is called via elf_link_hash_traverse. It looks for 1304 entries that have GOT or PLT (.GOT) references. If creating a shared 1305 object with -Bsymbolic, or the symbol has been forced local, then it 1306 resets the reference count back to -1 so normal PC32 relocation will 1307 be done. Otherwise space in the .got and .rela.got will be reserved 1308 for the symbol. */ 1309 1310 static bfd_boolean 1311 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr) 1312 { 1313 struct bfd_link_info *info = (struct bfd_link_info *) infoptr; 1314 bfd *dynobj; 1315 asection *sgot; 1316 asection *srelgot; 1317 1318 /* We don't care about non-GOT (and non-PLT) entries. */ 1319 if (h->got.refcount <= 0 && h->plt.refcount <= 0) 1320 return TRUE; 1321 1322 dynobj = elf_hash_table (info)->dynobj; 1323 BFD_ASSERT (dynobj != NULL); 1324 1325 sgot = bfd_get_linker_section (dynobj, ".got"); 1326 srelgot = bfd_get_linker_section (dynobj, ".rela.got"); 1327 1328 if (SYMBOL_REFERENCES_LOCAL (info, h)) 1329 { 1330 h->got.refcount = -1; 1331 h->plt.refcount = -1; 1332 } 1333 else if (h->got.refcount > 0) 1334 { 1335 /* Make sure this symbol is output as a dynamic symbol. */ 1336 if (h->dynindx == -1) 1337 { 1338 if (!bfd_elf_link_record_dynamic_symbol (info, h)) 1339 return FALSE; 1340 } 1341 1342 /* Allocate space in the .got and .rela.got sections. */ 1343 sgot->size += 4; 1344 srelgot->size += sizeof (Elf32_External_Rela); 1345 } 1346 1347 return TRUE; 1348 } 1349 1350 /* Relocate an VAX ELF section. */ 1351 1352 static bfd_boolean 1353 elf_vax_relocate_section (bfd *output_bfd, 1354 struct bfd_link_info *info, 1355 bfd *input_bfd, 1356 asection *input_section, 1357 bfd_byte *contents, 1358 Elf_Internal_Rela *relocs, 1359 Elf_Internal_Sym *local_syms, 1360 asection **local_sections) 1361 { 1362 bfd *dynobj; 1363 Elf_Internal_Shdr *symtab_hdr; 1364 struct elf_link_hash_entry **sym_hashes; 1365 bfd_vma plt_index; 1366 bfd_vma got_offset; 1367 asection *sgot; 1368 asection *splt; 1369 asection *sgotplt; 1370 asection *sreloc; 1371 Elf_Internal_Rela *rel; 1372 Elf_Internal_Rela *relend; 1373 1374 dynobj = elf_hash_table (info)->dynobj; 1375 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr; 1376 sym_hashes = elf_sym_hashes (input_bfd); 1377 1378 sgot = NULL; 1379 splt = NULL; 1380 sgotplt = NULL; 1381 sreloc = NULL; 1382 1383 rel = relocs; 1384 relend = relocs + input_section->reloc_count; 1385 for (; rel < relend; rel++) 1386 { 1387 int r_type; 1388 reloc_howto_type *howto; 1389 unsigned long r_symndx; 1390 struct elf_link_hash_entry *h; 1391 Elf_Internal_Sym *sym; 1392 asection *sec; 1393 bfd_vma relocation; 1394 bfd_reloc_status_type r; 1395 1396 r_type = ELF32_R_TYPE (rel->r_info); 1397 if (r_type < 0 || r_type >= (int) R_VAX_max) 1398 { 1399 bfd_set_error (bfd_error_bad_value); 1400 return FALSE; 1401 } 1402 howto = howto_table + r_type; 1403 1404 r_symndx = ELF32_R_SYM (rel->r_info); 1405 h = NULL; 1406 sym = NULL; 1407 sec = NULL; 1408 if (r_symndx < symtab_hdr->sh_info) 1409 { 1410 sym = local_syms + r_symndx; 1411 sec = local_sections[r_symndx]; 1412 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel); 1413 } 1414 else 1415 { 1416 bfd_boolean unresolved_reloc; 1417 bfd_boolean warned, ignored; 1418 1419 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel, 1420 r_symndx, symtab_hdr, sym_hashes, 1421 h, sec, relocation, 1422 unresolved_reloc, warned, ignored); 1423 1424 if ((h->root.type == bfd_link_hash_defined 1425 || h->root.type == bfd_link_hash_defweak) 1426 && ((r_type == R_VAX_PLT32 1427 && h->plt.offset != (bfd_vma) -1 1428 && !h->forced_local 1429 && elf_hash_table (info)->dynamic_sections_created) 1430 || (r_type == R_VAX_GOT32 1431 && h->got.offset != (bfd_vma) -1 1432 && !h->forced_local 1433 && elf_hash_table (info)->dynamic_sections_created 1434 && (! bfd_link_pic (info) 1435 || (! info->symbolic && h->dynindx != -1) 1436 || !h->def_regular)) 1437 || (bfd_link_pic (info) 1438 && ((! info->symbolic && h->dynindx != -1) 1439 || !h->def_regular) 1440 && ((input_section->flags & SEC_ALLOC) != 0 1441 /* DWARF will emit R_VAX_32 relocations in its 1442 sections against symbols defined externally 1443 in shared libraries. We can't do anything 1444 with them here. */ 1445 1446 || ((input_section->flags & SEC_DEBUGGING) != 0 1447 && h->def_dynamic)) 1448 && (r_type == R_VAX_8 1449 || r_type == R_VAX_16 1450 || r_type == R_VAX_32)))) 1451 /* In these cases, we don't need the relocation 1452 value. We check specially because in some 1453 obscure cases sec->output_section will be NULL. */ 1454 relocation = 0; 1455 } 1456 1457 if (sec != NULL && discarded_section (sec)) 1458 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section, 1459 rel, 1, relend, howto, 0, contents); 1460 1461 if (bfd_link_relocatable (info)) 1462 continue; 1463 1464 switch (r_type) 1465 { 1466 case R_VAX_GOT32: 1467 /* Relocation is to the address of the entry for this symbol 1468 in the global offset table. */ 1469 1470 /* Resolve a GOTxx reloc against a local symbol directly, 1471 without using the global offset table. */ 1472 if (h == NULL 1473 || h->got.offset == (bfd_vma) -1) 1474 break; 1475 1476 { 1477 bfd_vma off; 1478 1479 if (sgot == NULL) 1480 { 1481 sgot = bfd_get_linker_section (dynobj, ".got"); 1482 BFD_ASSERT (sgot != NULL); 1483 } 1484 1485 off = h->got.offset; 1486 BFD_ASSERT (off < sgot->size); 1487 1488 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off); 1489 1490 relocation = sgot->output_offset + off; 1491 /* The GOT relocation uses the addend. */ 1492 rel->r_addend = 0; 1493 1494 /* Change the reference to be indirect. */ 1495 contents[rel->r_offset - 1] |= 0x10; 1496 relocation += sgot->output_section->vma; 1497 } 1498 break; 1499 1500 case R_VAX_PC32: 1501 /* If we are creating an executable and the function this 1502 reloc refers to is in a shared lib, then we made a PLT 1503 entry for this symbol and need to handle the reloc like 1504 a PLT reloc. */ 1505 if (bfd_link_pic (info)) 1506 goto r_vax_pc32_shared; 1507 /* Fall through. */ 1508 case R_VAX_PLT32: 1509 /* Relocation is to the entry for this symbol in the 1510 procedure linkage table. */ 1511 1512 /* Resolve a PLTxx reloc against a local symbol directly, 1513 without using the procedure linkage table. */ 1514 if (h == NULL 1515 || h->plt.offset == (bfd_vma) -1) 1516 break; 1517 1518 if (splt == NULL) 1519 { 1520 splt = bfd_get_linker_section (dynobj, ".plt"); 1521 BFD_ASSERT (splt != NULL); 1522 } 1523 1524 if (sgotplt == NULL) 1525 { 1526 sgotplt = bfd_get_linker_section (dynobj, ".got.plt"); 1527 BFD_ASSERT (sgotplt != NULL); 1528 } 1529 1530 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1; 1531 1532 /* Get the offset into the .got table of the entry that 1533 corresponds to this function. Each .got entry is 4 bytes. 1534 The first two are reserved. */ 1535 got_offset = (plt_index + 3) * 4; 1536 1537 /* We want the relocation to point into the .got.plt instead 1538 of the plt itself. */ 1539 relocation = (sgotplt->output_section->vma 1540 + sgotplt->output_offset 1541 + got_offset); 1542 contents[rel->r_offset-1] |= 0x10; /* make indirect */ 1543 if (rel->r_addend == 2) 1544 { 1545 h->plt.offset |= 1; 1546 } 1547 else if (rel->r_addend != 0) 1548 (*_bfd_error_handler) 1549 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"), 1550 bfd_get_filename (input_bfd), rel->r_addend, 1551 h->root.root.string, 1552 bfd_get_section_name (input_bfd, input_section)); 1553 rel->r_addend = 0; 1554 1555 break; 1556 1557 case R_VAX_PC8: 1558 case R_VAX_PC16: 1559 r_vax_pc32_shared: 1560 if (h == NULL 1561 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT 1562 || h->forced_local) 1563 break; 1564 /* Fall through. */ 1565 case R_VAX_8: 1566 case R_VAX_16: 1567 case R_VAX_32: 1568 if (bfd_link_pic (info) 1569 && r_symndx != STN_UNDEF 1570 && (input_section->flags & SEC_ALLOC) != 0 1571 && ((r_type != R_VAX_PC8 1572 && r_type != R_VAX_PC16 1573 && r_type != R_VAX_PC32) 1574 || ((input_section->flags & SEC_CODE) 1575 && (!info->symbolic 1576 || (!h->def_regular && h->type != STT_SECTION))))) 1577 { 1578 Elf_Internal_Rela outrel; 1579 bfd_byte *loc; 1580 bfd_boolean skip, relocate; 1581 1582 /* When generating a shared object, these relocations 1583 are copied into the output file to be resolved at run 1584 time. */ 1585 if (sreloc == NULL) 1586 { 1587 sreloc = _bfd_elf_get_dynamic_reloc_section 1588 (input_bfd, input_section, /*rela?*/ TRUE); 1589 if (sreloc == NULL) 1590 return FALSE; 1591 } 1592 1593 skip = FALSE; 1594 relocate = FALSE; 1595 1596 outrel.r_offset = 1597 _bfd_elf_section_offset (output_bfd, info, input_section, 1598 rel->r_offset); 1599 if (outrel.r_offset == (bfd_vma) -1) 1600 skip = TRUE; 1601 if (outrel.r_offset == (bfd_vma) -2) 1602 skip = TRUE, relocate = TRUE; 1603 outrel.r_offset += (input_section->output_section->vma 1604 + input_section->output_offset); 1605 1606 if (skip) 1607 memset (&outrel, 0, sizeof outrel); 1608 /* h->dynindx may be -1 if the symbol was marked to 1609 become local. */ 1610 else if (h != NULL 1611 && ((! info->symbolic && h->dynindx != -1) 1612 || !h->def_regular)) 1613 { 1614 BFD_ASSERT (h->dynindx != -1); 1615 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type); 1616 outrel.r_addend = relocation + rel->r_addend; 1617 } 1618 else 1619 { 1620 if (r_type == R_VAX_32) 1621 { 1622 relocate = TRUE; 1623 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE); 1624 BFD_ASSERT (bfd_get_signed_32 (input_bfd, 1625 &contents[rel->r_offset]) == 0); 1626 outrel.r_addend = relocation + rel->r_addend; 1627 } 1628 else 1629 { 1630 long indx; 1631 1632 if (bfd_is_abs_section (sec)) 1633 indx = 0; 1634 else if (sec == NULL || sec->owner == NULL) 1635 { 1636 bfd_set_error (bfd_error_bad_value); 1637 return FALSE; 1638 } 1639 else 1640 { 1641 asection *osec; 1642 1643 /* We are turning this relocation into one 1644 against a section symbol. It would be 1645 proper to subtract the symbol's value, 1646 osec->vma, from the emitted reloc addend, 1647 but ld.so expects buggy relocs. */ 1648 osec = sec->output_section; 1649 indx = elf_section_data (osec)->dynindx; 1650 if (indx == 0) 1651 { 1652 struct elf_link_hash_table *htab; 1653 htab = elf_hash_table (info); 1654 osec = htab->text_index_section; 1655 indx = elf_section_data (osec)->dynindx; 1656 } 1657 BFD_ASSERT (indx != 0); 1658 } 1659 1660 outrel.r_info = ELF32_R_INFO (indx, r_type); 1661 outrel.r_addend = relocation + rel->r_addend; 1662 } 1663 } 1664 1665 if ((input_section->flags & SEC_CODE) != 0 1666 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32 1667 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE 1668 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY 1669 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT 1670 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT)) 1671 { 1672 if (h != NULL) 1673 (*_bfd_error_handler) 1674 (_("%s: warning: %s relocation against symbol `%s' from %s section"), 1675 bfd_get_filename (input_bfd), howto->name, 1676 h->root.root.string, 1677 bfd_get_section_name (input_bfd, input_section)); 1678 else 1679 (*_bfd_error_handler) 1680 (_("%s: warning: %s relocation to 0x%x from %s section"), 1681 bfd_get_filename (input_bfd), howto->name, 1682 outrel.r_addend, 1683 bfd_get_section_name (input_bfd, input_section)); 1684 } 1685 loc = sreloc->contents; 1686 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela); 1687 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc); 1688 1689 /* This reloc will be computed at runtime, so there's no 1690 need to do anything now, except for R_VAX_32 1691 relocations that have been turned into 1692 R_VAX_RELATIVE. */ 1693 if (!relocate) 1694 continue; 1695 } 1696 1697 break; 1698 1699 case R_VAX_GNU_VTINHERIT: 1700 case R_VAX_GNU_VTENTRY: 1701 /* These are no-ops in the end. */ 1702 continue; 1703 1704 default: 1705 break; 1706 } 1707 1708 /* VAX PCREL relocations are from the end of relocation, not the start. 1709 So subtract the difference from the relocation amount since we can't 1710 add it to the offset. */ 1711 if (howto->pc_relative && howto->pcrel_offset) 1712 relocation -= bfd_get_reloc_size(howto); 1713 1714 r = _bfd_final_link_relocate (howto, input_bfd, input_section, 1715 contents, rel->r_offset, 1716 relocation, rel->r_addend); 1717 1718 if (r != bfd_reloc_ok) 1719 { 1720 switch (r) 1721 { 1722 default: 1723 case bfd_reloc_outofrange: 1724 abort (); 1725 case bfd_reloc_overflow: 1726 { 1727 const char *name; 1728 1729 if (h != NULL) 1730 name = NULL; 1731 else 1732 { 1733 name = bfd_elf_string_from_elf_section (input_bfd, 1734 symtab_hdr->sh_link, 1735 sym->st_name); 1736 if (name == NULL) 1737 return FALSE; 1738 if (*name == '\0') 1739 name = bfd_section_name (input_bfd, sec); 1740 } 1741 info->callbacks->reloc_overflow 1742 (info, (h ? &h->root : NULL), name, howto->name, 1743 (bfd_vma) 0, input_bfd, input_section, rel->r_offset); 1744 } 1745 break; 1746 } 1747 } 1748 } 1749 1750 return TRUE; 1751 } 1752 1753 /* Finish up dynamic symbol handling. We set the contents of various 1754 dynamic sections here. */ 1755 1756 static bfd_boolean 1757 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info, 1758 struct elf_link_hash_entry *h, 1759 Elf_Internal_Sym *sym) 1760 { 1761 bfd *dynobj; 1762 1763 dynobj = elf_hash_table (info)->dynobj; 1764 1765 if (h->plt.offset != (bfd_vma) -1) 1766 { 1767 asection *splt; 1768 asection *sgot; 1769 asection *srela; 1770 bfd_vma plt_index; 1771 bfd_vma got_offset; 1772 bfd_vma addend; 1773 Elf_Internal_Rela rela; 1774 bfd_byte *loc; 1775 1776 /* This symbol has an entry in the procedure linkage table. Set 1777 it up. */ 1778 BFD_ASSERT (h->dynindx != -1); 1779 1780 splt = bfd_get_linker_section (dynobj, ".plt"); 1781 sgot = bfd_get_linker_section (dynobj, ".got.plt"); 1782 srela = bfd_get_linker_section (dynobj, ".rela.plt"); 1783 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL); 1784 1785 addend = 2 * (h->plt.offset & 1); 1786 h->plt.offset &= ~1; 1787 1788 /* Get the index in the procedure linkage table which 1789 corresponds to this symbol. This is the index of this symbol 1790 in all the symbols for which we are making plt entries. The 1791 first entry in the procedure linkage table is reserved. */ 1792 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1; 1793 1794 /* Get the offset into the .got table of the entry that 1795 corresponds to this function. Each .got entry is 4 bytes. 1796 The first two are reserved. */ 1797 got_offset = (plt_index + 3) * 4; 1798 1799 /* Fill in the entry in the procedure linkage table. */ 1800 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry, 1801 PLT_ENTRY_SIZE); 1802 1803 /* The offset is relative to the first extension word. */ 1804 bfd_put_32 (output_bfd, 1805 -(h->plt.offset + 8), 1806 splt->contents + h->plt.offset + 4); 1807 1808 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela), 1809 splt->contents + h->plt.offset + 8); 1810 1811 /* Fill in the entry in the global offset table. */ 1812 bfd_put_32 (output_bfd, 1813 (splt->output_section->vma 1814 + splt->output_offset 1815 + h->plt.offset) + addend, 1816 sgot->contents + got_offset); 1817 1818 /* Fill in the entry in the .rela.plt section. */ 1819 rela.r_offset = (sgot->output_section->vma 1820 + sgot->output_offset 1821 + got_offset); 1822 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT); 1823 rela.r_addend = addend; 1824 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela); 1825 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc); 1826 1827 if (!h->def_regular) 1828 { 1829 /* Mark the symbol as undefined, rather than as defined in 1830 the .plt section. Leave the value alone. */ 1831 sym->st_shndx = SHN_UNDEF; 1832 } 1833 } 1834 1835 if (h->got.offset != (bfd_vma) -1) 1836 { 1837 asection *sgot; 1838 asection *srela; 1839 Elf_Internal_Rela rela; 1840 bfd_byte *loc; 1841 1842 /* This symbol has an entry in the global offset table. Set it 1843 up. */ 1844 sgot = bfd_get_linker_section (dynobj, ".got"); 1845 srela = bfd_get_linker_section (dynobj, ".rela.got"); 1846 BFD_ASSERT (sgot != NULL && srela != NULL); 1847 1848 rela.r_offset = (sgot->output_section->vma 1849 + sgot->output_offset 1850 + h->got.offset); 1851 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT); 1852 rela.r_addend = bfd_get_signed_32 (output_bfd, 1853 sgot->contents + h->got.offset); 1854 1855 loc = srela->contents; 1856 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela); 1857 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc); 1858 } 1859 1860 if (h->needs_copy) 1861 { 1862 asection *s; 1863 Elf_Internal_Rela rela; 1864 bfd_byte *loc; 1865 1866 /* This symbol needs a copy reloc. Set it up. */ 1867 BFD_ASSERT (h->dynindx != -1 1868 && (h->root.type == bfd_link_hash_defined 1869 || h->root.type == bfd_link_hash_defweak)); 1870 1871 s = bfd_get_linker_section (dynobj, ".rela.bss"); 1872 BFD_ASSERT (s != NULL); 1873 1874 rela.r_offset = (h->root.u.def.value 1875 + h->root.u.def.section->output_section->vma 1876 + h->root.u.def.section->output_offset); 1877 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY); 1878 rela.r_addend = 0; 1879 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela); 1880 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc); 1881 } 1882 1883 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */ 1884 if (h == elf_hash_table (info)->hdynamic 1885 || h == elf_hash_table (info)->hgot) 1886 sym->st_shndx = SHN_ABS; 1887 1888 return TRUE; 1889 } 1890 1891 /* Finish up the dynamic sections. */ 1892 1893 static bfd_boolean 1894 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info) 1895 { 1896 bfd *dynobj; 1897 asection *sgot; 1898 asection *sdyn; 1899 1900 dynobj = elf_hash_table (info)->dynobj; 1901 1902 sgot = bfd_get_linker_section (dynobj, ".got.plt"); 1903 BFD_ASSERT (sgot != NULL); 1904 sdyn = bfd_get_linker_section (dynobj, ".dynamic"); 1905 1906 if (elf_hash_table (info)->dynamic_sections_created) 1907 { 1908 asection *splt; 1909 Elf32_External_Dyn *dyncon, *dynconend; 1910 1911 splt = bfd_get_linker_section (dynobj, ".plt"); 1912 BFD_ASSERT (splt != NULL && sdyn != NULL); 1913 1914 dyncon = (Elf32_External_Dyn *) sdyn->contents; 1915 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size); 1916 for (; dyncon < dynconend; dyncon++) 1917 { 1918 Elf_Internal_Dyn dyn; 1919 const char *name; 1920 asection *s; 1921 1922 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn); 1923 1924 switch (dyn.d_tag) 1925 { 1926 default: 1927 break; 1928 1929 case DT_PLTGOT: 1930 name = ".got.plt"; 1931 goto get_vma; 1932 case DT_JMPREL: 1933 name = ".rela.plt"; 1934 get_vma: 1935 s = bfd_get_linker_section (dynobj, name); 1936 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset; 1937 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); 1938 break; 1939 1940 case DT_PLTRELSZ: 1941 s = bfd_get_linker_section (dynobj, ".rela.plt"); 1942 dyn.d_un.d_val = s->size; 1943 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); 1944 break; 1945 1946 case DT_RELASZ: 1947 /* The procedure linkage table relocs (DT_JMPREL) should 1948 not be included in the overall relocs (DT_RELA). 1949 Therefore, we override the DT_RELASZ entry here to 1950 make it not include the JMPREL relocs. Since the 1951 linker script arranges for .rela.plt to follow all 1952 other relocation sections, we don't have to worry 1953 about changing the DT_RELA entry. */ 1954 s = bfd_get_linker_section (dynobj, ".rela.plt"); 1955 if (s != NULL) 1956 dyn.d_un.d_val -= s->size; 1957 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon); 1958 break; 1959 } 1960 } 1961 1962 /* Fill in the first entry in the procedure linkage table. */ 1963 if (splt->size > 0) 1964 { 1965 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE); 1966 bfd_put_32 (output_bfd, 1967 (sgot->output_section->vma 1968 + sgot->output_offset + 4 1969 - (splt->output_section->vma + 6)), 1970 splt->contents + 2); 1971 bfd_put_32 (output_bfd, 1972 (sgot->output_section->vma 1973 + sgot->output_offset + 8 1974 - (splt->output_section->vma + 12)), 1975 splt->contents + 8); 1976 elf_section_data (splt->output_section)->this_hdr.sh_entsize 1977 = PLT_ENTRY_SIZE; 1978 } 1979 } 1980 1981 /* Fill in the first three entries in the global offset table. */ 1982 if (sgot->size > 0) 1983 { 1984 if (sdyn == NULL) 1985 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents); 1986 else 1987 bfd_put_32 (output_bfd, 1988 sdyn->output_section->vma + sdyn->output_offset, 1989 sgot->contents); 1990 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4); 1991 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8); 1992 } 1993 1994 if (elf_section_data (sgot->output_section) != NULL) 1995 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4; 1996 1997 return TRUE; 1998 } 1999 2000 static enum elf_reloc_type_class 2001 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED, 2002 const asection *rel_sec ATTRIBUTE_UNUSED, 2003 const Elf_Internal_Rela *rela) 2004 { 2005 switch ((int) ELF32_R_TYPE (rela->r_info)) 2006 { 2007 case R_VAX_RELATIVE: 2008 return reloc_class_relative; 2009 case R_VAX_JMP_SLOT: 2010 return reloc_class_plt; 2011 case R_VAX_COPY: 2012 return reloc_class_copy; 2013 default: 2014 return reloc_class_normal; 2015 } 2016 } 2017 2018 static bfd_vma 2019 elf_vax_plt_sym_val (bfd_vma i, const asection *plt, 2020 const arelent *rel ATTRIBUTE_UNUSED) 2021 { 2022 return plt->vma + (i + 1) * PLT_ENTRY_SIZE; 2023 } 2024 2025 #define TARGET_LITTLE_SYM vax_elf32_vec 2026 #define TARGET_LITTLE_NAME "elf32-vax" 2027 #define ELF_MACHINE_CODE EM_VAX 2028 #define ELF_MAXPAGESIZE 0x1000 2029 2030 #define elf_backend_create_dynamic_sections \ 2031 _bfd_elf_create_dynamic_sections 2032 #define bfd_elf32_bfd_link_hash_table_create \ 2033 elf_vax_link_hash_table_create 2034 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link 2035 2036 #define elf_backend_check_relocs elf_vax_check_relocs 2037 #define elf_backend_adjust_dynamic_symbol \ 2038 elf_vax_adjust_dynamic_symbol 2039 #define elf_backend_always_size_sections \ 2040 elf_vax_always_size_sections 2041 #define elf_backend_size_dynamic_sections \ 2042 elf_vax_size_dynamic_sections 2043 #define elf_backend_init_index_section _bfd_elf_init_1_index_section 2044 #define elf_backend_relocate_section elf_vax_relocate_section 2045 #define elf_backend_finish_dynamic_symbol \ 2046 elf_vax_finish_dynamic_symbol 2047 #define elf_backend_finish_dynamic_sections \ 2048 elf_vax_finish_dynamic_sections 2049 #define elf_backend_reloc_type_class elf_vax_reloc_type_class 2050 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook 2051 #define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook 2052 #define elf_backend_plt_sym_val elf_vax_plt_sym_val 2053 #define bfd_elf32_bfd_merge_private_bfd_data \ 2054 elf32_vax_merge_private_bfd_data 2055 #define bfd_elf32_bfd_set_private_flags \ 2056 elf32_vax_set_private_flags 2057 #define bfd_elf32_bfd_print_private_bfd_data \ 2058 elf32_vax_print_private_bfd_data 2059 2060 #define elf_backend_can_gc_sections 1 2061 #define elf_backend_want_got_plt 1 2062 #define elf_backend_plt_readonly 1 2063 #define elf_backend_want_plt_sym 0 2064 #define elf_backend_got_header_size 16 2065 #define elf_backend_rela_normal 1 2066 2067 #include "elf32-target.h" 2068