1 /* VAX series support for 32-bit ELF
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3 2004 Free Software Foundation, Inc.
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
6 This file is part of BFD, the Binary File Descriptor library.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
21
22 #include "bfd.h"
23 #include "sysdep.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28
29 static reloc_howto_type *reloc_type_lookup
30 PARAMS ((bfd *, bfd_reloc_code_real_type));
31 static void rtype_to_howto
32 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
33 static struct bfd_hash_entry *elf_vax_link_hash_newfunc
34 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
35 static struct bfd_link_hash_table *elf_vax_link_hash_table_create
36 PARAMS ((bfd *));
37 static bfd_boolean elf_vax_check_relocs
38 PARAMS ((bfd *, struct bfd_link_info *, asection *,
39 const Elf_Internal_Rela *));
40 static asection *elf_vax_gc_mark_hook
41 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
42 struct elf_link_hash_entry *, Elf_Internal_Sym *));
43 static bfd_boolean elf_vax_gc_sweep_hook
44 PARAMS ((bfd *, struct bfd_link_info *, asection *,
45 const Elf_Internal_Rela *));
46 static bfd_boolean elf_vax_adjust_dynamic_symbol
47 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
48 static bfd_boolean elf_vax_size_dynamic_sections
49 PARAMS ((bfd *, struct bfd_link_info *));
50 static bfd_boolean elf_vax_relocate_section
51 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
52 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
53 static bfd_boolean elf_vax_finish_dynamic_symbol
54 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
55 Elf_Internal_Sym *));
56 static bfd_boolean elf_vax_finish_dynamic_sections
57 PARAMS ((bfd *, struct bfd_link_info *));
58
59 static bfd_boolean elf32_vax_set_private_flags
60 PARAMS ((bfd *, flagword));
61 static bfd_boolean elf32_vax_merge_private_bfd_data
62 PARAMS ((bfd *, bfd *));
63 static bfd_boolean elf32_vax_print_private_bfd_data
64 PARAMS ((bfd *, PTR));
65
66 static reloc_howto_type howto_table[] = {
67 HOWTO (R_VAX_NONE, /* type */
68 0, /* rightshift */
69 0, /* size (0 = byte, 1 = short, 2 = long) */
70 0, /* bitsize */
71 FALSE, /* pc_relative */
72 0, /* bitpos */
73 complain_overflow_dont, /* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_VAX_NONE", /* name */
76 FALSE, /* partial_inplace */
77 0, /* src_mask */
78 0x00000000, /* dst_mask */
79 FALSE), /* pcrel_offset */
80
81 HOWTO (R_VAX_32, /* type */
82 0, /* rightshift */
83 2, /* size (0 = byte, 1 = short, 2 = long) */
84 32, /* bitsize */
85 FALSE, /* pc_relative */
86 0, /* bitpos */
87 complain_overflow_bitfield, /* complain_on_overflow */
88 bfd_elf_generic_reloc, /* special_function */
89 "R_VAX_32", /* name */
90 FALSE, /* partial_inplace */
91 0, /* src_mask */
92 0xffffffff, /* dst_mask */
93 FALSE), /* pcrel_offset */
94
95 HOWTO (R_VAX_16, /* type */
96 0, /* rightshift */
97 1, /* size (0 = byte, 1 = short, 2 = long) */
98 16, /* bitsize */
99 FALSE, /* pc_relative */
100 0, /* bitpos */
101 complain_overflow_bitfield, /* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_VAX_16", /* name */
104 FALSE, /* partial_inplace */
105 0, /* src_mask */
106 0x0000ffff, /* dst_mask */
107 FALSE), /* pcrel_offset */
108
109 HOWTO (R_VAX_8, /* type */
110 0, /* rightshift */
111 0, /* size (0 = byte, 1 = short, 2 = long) */
112 8, /* bitsize */
113 FALSE, /* pc_relative */
114 0, /* bitpos */
115 complain_overflow_bitfield, /* complain_on_overflow */
116 bfd_elf_generic_reloc, /* special_function */
117 "R_VAX_8", /* name */
118 FALSE, /* partial_inplace */
119 0, /* src_mask */
120 0x000000ff, /* dst_mask */
121 FALSE), /* pcrel_offset */
122
123 HOWTO (R_VAX_PC32, /* type */
124 0, /* rightshift */
125 2, /* size (0 = byte, 1 = short, 2 = long) */
126 32, /* bitsize */
127 TRUE, /* pc_relative */
128 0, /* bitpos */
129 complain_overflow_bitfield, /* complain_on_overflow */
130 bfd_elf_generic_reloc, /* special_function */
131 "R_VAX_PC32", /* name */
132 FALSE, /* partial_inplace */
133 0, /* src_mask */
134 0xffffffff, /* dst_mask */
135 TRUE), /* pcrel_offset */
136
137 HOWTO (R_VAX_PC16, /* type */
138 0, /* rightshift */
139 1, /* size (0 = byte, 1 = short, 2 = long) */
140 16, /* bitsize */
141 TRUE, /* pc_relative */
142 0, /* bitpos */
143 complain_overflow_signed, /* complain_on_overflow */
144 bfd_elf_generic_reloc, /* special_function */
145 "R_VAX_PC16", /* name */
146 FALSE, /* partial_inplace */
147 0, /* src_mask */
148 0x0000ffff, /* dst_mask */
149 TRUE), /* pcrel_offset */
150
151 HOWTO (R_VAX_PC8, /* type */
152 0, /* rightshift */
153 0, /* size (0 = byte, 1 = short, 2 = long) */
154 8, /* bitsize */
155 TRUE, /* pc_relative */
156 0, /* bitpos */
157 complain_overflow_signed, /* complain_on_overflow */
158 bfd_elf_generic_reloc, /* special_function */
159 "R_VAX_PC8", /* name */
160 FALSE, /* partial_inplace */
161 0, /* src_mask */
162 0x000000ff, /* dst_mask */
163 TRUE), /* pcrel_offset */
164
165 HOWTO (R_VAX_GOT32, /* type */
166 0, /* rightshift */
167 2, /* size (0 = byte, 1 = short, 2 = long) */
168 32, /* bitsize */
169 TRUE, /* pc_relative */
170 0, /* bitpos */
171 complain_overflow_bitfield, /* complain_on_overflow */
172 bfd_elf_generic_reloc, /* special_function */
173 "R_VAX_GOT32", /* name */
174 FALSE, /* partial_inplace */
175 0, /* src_mask */
176 0xffffffff, /* dst_mask */
177 TRUE), /* pcrel_offset */
178
179 EMPTY_HOWTO (-1),
180 EMPTY_HOWTO (-1),
181 EMPTY_HOWTO (-1),
182 EMPTY_HOWTO (-1),
183 EMPTY_HOWTO (-1),
184
185 HOWTO (R_VAX_PLT32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
189 TRUE, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_VAX_PLT32", /* name */
194 FALSE, /* partial_inplace */
195 0, /* src_mask */
196 0xffffffff, /* dst_mask */
197 TRUE), /* pcrel_offset */
198
199 EMPTY_HOWTO (-1),
200 EMPTY_HOWTO (-1),
201 EMPTY_HOWTO (-1),
202 EMPTY_HOWTO (-1),
203 EMPTY_HOWTO (-1),
204
205 HOWTO (R_VAX_COPY, /* type */
206 0, /* rightshift */
207 0, /* size (0 = byte, 1 = short, 2 = long) */
208 0, /* bitsize */
209 FALSE, /* pc_relative */
210 0, /* bitpos */
211 complain_overflow_dont, /* complain_on_overflow */
212 bfd_elf_generic_reloc, /* special_function */
213 "R_VAX_COPY", /* name */
214 FALSE, /* partial_inplace */
215 0, /* src_mask */
216 0xffffffff, /* dst_mask */
217 FALSE), /* pcrel_offset */
218
219 HOWTO (R_VAX_GLOB_DAT, /* type */
220 0, /* rightshift */
221 2, /* size (0 = byte, 1 = short, 2 = long) */
222 32, /* bitsize */
223 FALSE, /* pc_relative */
224 0, /* bitpos */
225 complain_overflow_dont, /* complain_on_overflow */
226 bfd_elf_generic_reloc, /* special_function */
227 "R_VAX_GLOB_DAT", /* name */
228 FALSE, /* partial_inplace */
229 0, /* src_mask */
230 0xffffffff, /* dst_mask */
231 FALSE), /* pcrel_offset */
232
233 HOWTO (R_VAX_JMP_SLOT, /* type */
234 0, /* rightshift */
235 2, /* size (0 = byte, 1 = short, 2 = long) */
236 32, /* bitsize */
237 FALSE, /* pc_relative */
238 0, /* bitpos */
239 complain_overflow_dont, /* complain_on_overflow */
240 bfd_elf_generic_reloc, /* special_function */
241 "R_VAX_JMP_SLOT", /* name */
242 FALSE, /* partial_inplace */
243 0, /* src_mask */
244 0xffffffff, /* dst_mask */
245 FALSE), /* pcrel_offset */
246
247 HOWTO (R_VAX_RELATIVE, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 32, /* bitsize */
251 FALSE, /* pc_relative */
252 0, /* bitpos */
253 complain_overflow_dont, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_VAX_RELATIVE", /* name */
256 FALSE, /* partial_inplace */
257 0, /* src_mask */
258 0xffffffff, /* dst_mask */
259 FALSE), /* pcrel_offset */
260
261 /* GNU extension to record C++ vtable hierarchy */
262 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
263 0, /* rightshift */
264 2, /* size (0 = byte, 1 = short, 2 = long) */
265 0, /* bitsize */
266 FALSE, /* pc_relative */
267 0, /* bitpos */
268 complain_overflow_dont, /* complain_on_overflow */
269 NULL, /* special_function */
270 "R_VAX_GNU_VTINHERIT", /* name */
271 FALSE, /* partial_inplace */
272 0, /* src_mask */
273 0, /* dst_mask */
274 FALSE), /* pcrel_offset */
275
276 /* GNU extension to record C++ vtable member usage */
277 HOWTO (R_VAX_GNU_VTENTRY, /* type */
278 0, /* rightshift */
279 2, /* size (0 = byte, 1 = short, 2 = long) */
280 0, /* bitsize */
281 FALSE, /* pc_relative */
282 0, /* bitpos */
283 complain_overflow_dont, /* complain_on_overflow */
284 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
285 "R_VAX_GNU_VTENTRY", /* name */
286 FALSE, /* partial_inplace */
287 0, /* src_mask */
288 0, /* dst_mask */
289 FALSE), /* pcrel_offset */
290 };
291
292 static void
rtype_to_howto(abfd,cache_ptr,dst)293 rtype_to_howto (abfd, cache_ptr, dst)
294 bfd *abfd ATTRIBUTE_UNUSED;
295 arelent *cache_ptr;
296 Elf_Internal_Rela *dst;
297 {
298 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
299 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
300 }
301
302 #define elf_info_to_howto rtype_to_howto
303
304 static const struct
305 {
306 bfd_reloc_code_real_type bfd_val;
307 int elf_val;
308 } reloc_map[] = {
309 { BFD_RELOC_NONE, R_VAX_NONE },
310 { BFD_RELOC_32, R_VAX_32 },
311 { BFD_RELOC_16, R_VAX_16 },
312 { BFD_RELOC_8, R_VAX_8 },
313 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
314 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
315 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
316 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
317 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
318 { BFD_RELOC_NONE, R_VAX_COPY },
319 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
320 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
321 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
322 { BFD_RELOC_CTOR, R_VAX_32 },
323 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
324 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
325 };
326
327 static reloc_howto_type *
reloc_type_lookup(abfd,code)328 reloc_type_lookup (abfd, code)
329 bfd *abfd ATTRIBUTE_UNUSED;
330 bfd_reloc_code_real_type code;
331 {
332 unsigned int i;
333 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
334 {
335 if (reloc_map[i].bfd_val == code)
336 return &howto_table[reloc_map[i].elf_val];
337 }
338 return 0;
339 }
340
341 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
342 #define ELF_ARCH bfd_arch_vax
343 /* end code generated by elf.el */
344
345 /* Functions for the VAX ELF linker. */
346
347 /* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352 /* The size in bytes of an entry in the procedure linkage table. */
353
354 #define PLT_ENTRY_SIZE 12
355
356 /* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360 {
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365 };
366
367 /* Subsequent entries in a procedure linkage table look like this. */
368
369 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370 {
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375 };
376
377 /* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383 /* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386 struct elf_vax_pcrel_relocs_copied
387 {
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394 };
395
396 /* VAX ELF linker hash entry. */
397
398 struct elf_vax_link_hash_entry
399 {
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406 };
407
408 /* VAX ELF linker hash table. */
409
410 struct elf_vax_link_hash_table
411 {
412 struct elf_link_hash_table root;
413 };
414
415 /* Declare this now that the above structures are defined. */
416
417 static bfd_boolean elf_vax_discard_copies
418 PARAMS ((struct elf_vax_link_hash_entry *, PTR));
419
420 /* Declare this now that the above structures are defined. */
421
422 static bfd_boolean elf_vax_instantiate_got_entries
423 PARAMS ((struct elf_link_hash_entry *, PTR));
424
425 /* Traverse an VAX ELF linker hash table. */
426
427 #define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
430 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
431 (info)))
432
433 /* Get the VAX ELF linker hash table from a link_info structure. */
434
435 #define elf_vax_hash_table(p) \
436 ((struct elf_vax_link_hash_table *) (p)->hash)
437
438 /* Create an entry in an VAX ELF linker hash table. */
439
440 static struct bfd_hash_entry *
elf_vax_link_hash_newfunc(entry,table,string)441 elf_vax_link_hash_newfunc (entry, table, string)
442 struct bfd_hash_entry *entry;
443 struct bfd_hash_table *table;
444 const char *string;
445 {
446 struct elf_vax_link_hash_entry *ret =
447 (struct elf_vax_link_hash_entry *) entry;
448
449 /* Allocate the structure if it has not already been allocated by a
450 subclass. */
451 if (ret == (struct elf_vax_link_hash_entry *) NULL)
452 ret = ((struct elf_vax_link_hash_entry *)
453 bfd_hash_allocate (table,
454 sizeof (struct elf_vax_link_hash_entry)));
455 if (ret == (struct elf_vax_link_hash_entry *) NULL)
456 return (struct bfd_hash_entry *) ret;
457
458 /* Call the allocation method of the superclass. */
459 ret = ((struct elf_vax_link_hash_entry *)
460 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
461 table, string));
462 if (ret != (struct elf_vax_link_hash_entry *) NULL)
463 {
464 ret->pcrel_relocs_copied = NULL;
465 }
466
467 return (struct bfd_hash_entry *) ret;
468 }
469
470 /* Create an VAX ELF linker hash table. */
471
472 static struct bfd_link_hash_table *
elf_vax_link_hash_table_create(abfd)473 elf_vax_link_hash_table_create (abfd)
474 bfd *abfd;
475 {
476 struct elf_vax_link_hash_table *ret;
477 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
478
479 ret = (struct elf_vax_link_hash_table *) bfd_malloc (amt);
480 if (ret == (struct elf_vax_link_hash_table *) NULL)
481 return NULL;
482
483 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
484 elf_vax_link_hash_newfunc))
485 {
486 free (ret);
487 return NULL;
488 }
489
490 return &ret->root.root;
491 }
492
493 /* Keep vax-specific flags in the ELF header */
494 static bfd_boolean
elf32_vax_set_private_flags(abfd,flags)495 elf32_vax_set_private_flags (abfd, flags)
496 bfd *abfd;
497 flagword flags;
498 {
499 elf_elfheader (abfd)->e_flags = flags;
500 elf_flags_init (abfd) = TRUE;
501 return TRUE;
502 }
503
504 /* Merge backend specific data from an object file to the output
505 object file when linking. */
506 static bfd_boolean
elf32_vax_merge_private_bfd_data(ibfd,obfd)507 elf32_vax_merge_private_bfd_data (ibfd, obfd)
508 bfd *ibfd;
509 bfd *obfd;
510 {
511 flagword out_flags;
512 flagword in_flags;
513
514 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
515 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
516 return TRUE;
517
518 in_flags = elf_elfheader (ibfd)->e_flags;
519 out_flags = elf_elfheader (obfd)->e_flags;
520
521 if (!elf_flags_init (obfd))
522 {
523 elf_flags_init (obfd) = TRUE;
524 elf_elfheader (obfd)->e_flags = in_flags;
525 }
526
527 return TRUE;
528 }
529
530 /* Display the flags field */
531 static bfd_boolean
elf32_vax_print_private_bfd_data(abfd,ptr)532 elf32_vax_print_private_bfd_data (abfd, ptr)
533 bfd *abfd;
534 PTR ptr;
535 {
536 FILE *file = (FILE *) ptr;
537
538 BFD_ASSERT (abfd != NULL && ptr != NULL);
539
540 /* Print normal ELF private data. */
541 _bfd_elf_print_private_bfd_data (abfd, ptr);
542
543 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
544
545 /* xgettext:c-format */
546 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
547
548 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
549 fprintf (file, _(" [nonpic]"));
550
551 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
552 fprintf (file, _(" [d-float]"));
553
554 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
555 fprintf (file, _(" [g-float]"));
556
557 fputc ('\n', file);
558
559 return TRUE;
560 }
561 /* Look through the relocs for a section during the first phase, and
562 allocate space in the global offset table or procedure linkage
563 table. */
564
565 static bfd_boolean
elf_vax_check_relocs(abfd,info,sec,relocs)566 elf_vax_check_relocs (abfd, info, sec, relocs)
567 bfd *abfd;
568 struct bfd_link_info *info;
569 asection *sec;
570 const Elf_Internal_Rela *relocs;
571 {
572 bfd *dynobj;
573 Elf_Internal_Shdr *symtab_hdr;
574 struct elf_link_hash_entry **sym_hashes;
575 const Elf_Internal_Rela *rel;
576 const Elf_Internal_Rela *rel_end;
577 asection *sgot;
578 asection *srelgot;
579 asection *sreloc;
580
581 if (info->relocatable)
582 return TRUE;
583
584 dynobj = elf_hash_table (info)->dynobj;
585 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
586 sym_hashes = elf_sym_hashes (abfd);
587
588 sgot = NULL;
589 srelgot = NULL;
590 sreloc = NULL;
591
592 rel_end = relocs + sec->reloc_count;
593 for (rel = relocs; rel < rel_end; rel++)
594 {
595 unsigned long r_symndx;
596 struct elf_link_hash_entry *h;
597
598 r_symndx = ELF32_R_SYM (rel->r_info);
599
600 if (r_symndx < symtab_hdr->sh_info)
601 h = NULL;
602 else
603 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
604
605 switch (ELF32_R_TYPE (rel->r_info))
606 {
607 case R_VAX_GOT32:
608 if (h != NULL
609 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
610 break;
611
612 /* This symbol requires a global offset table entry. */
613
614 if (dynobj == NULL)
615 {
616 /* Create the .got section. */
617 elf_hash_table (info)->dynobj = dynobj = abfd;
618 if (!_bfd_elf_create_got_section (dynobj, info))
619 return FALSE;
620 }
621
622 if (sgot == NULL)
623 {
624 sgot = bfd_get_section_by_name (dynobj, ".got");
625 BFD_ASSERT (sgot != NULL);
626 }
627
628 if (srelgot == NULL
629 && (h != NULL || info->shared))
630 {
631 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
632 if (srelgot == NULL)
633 {
634 srelgot = bfd_make_section (dynobj, ".rela.got");
635 if (srelgot == NULL
636 || !bfd_set_section_flags (dynobj, srelgot,
637 (SEC_ALLOC
638 | SEC_LOAD
639 | SEC_HAS_CONTENTS
640 | SEC_IN_MEMORY
641 | SEC_LINKER_CREATED
642 | SEC_READONLY))
643 || !bfd_set_section_alignment (dynobj, srelgot, 2))
644 return FALSE;
645 }
646 }
647
648 if (h != NULL)
649 {
650 struct elf_vax_link_hash_entry *eh;
651
652 eh = (struct elf_vax_link_hash_entry *) h;
653 if (h->got.refcount == -1)
654 {
655 h->got.refcount = 1;
656 eh->got_addend = rel->r_addend;
657 }
658 else
659 {
660 h->got.refcount++;
661 if (eh->got_addend != (bfd_vma) rel->r_addend)
662 (*_bfd_error_handler)
663 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
664 bfd_get_filename (abfd), rel->r_addend,
665 h->root.root.string,
666 eh->got_addend);
667
668 }
669 }
670 break;
671
672 case R_VAX_PLT32:
673 /* This symbol requires a procedure linkage table entry. We
674 actually build the entry in adjust_dynamic_symbol,
675 because this might be a case of linking PIC code which is
676 never referenced by a dynamic object, in which case we
677 don't need to generate a procedure linkage table entry
678 after all. */
679
680 /* If this is a local symbol, we resolve it directly without
681 creating a procedure linkage table entry. */
682 if (h == NULL)
683 continue;
684
685 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
686 if (h->plt.refcount == -1)
687 h->plt.refcount = 1;
688 else
689 h->plt.refcount++;
690 break;
691
692 case R_VAX_PC8:
693 case R_VAX_PC16:
694 case R_VAX_PC32:
695 /* If we are creating a shared library and this is not a local
696 symbol, we need to copy the reloc into the shared library.
697 However when linking with -Bsymbolic and this is a global
698 symbol which is defined in an object we are including in the
699 link (i.e., DEF_REGULAR is set), then we can resolve the
700 reloc directly. At this point we have not seen all the input
701 files, so it is possible that DEF_REGULAR is not set now but
702 will be set later (it is never cleared). We account for that
703 possibility below by storing information in the
704 pcrel_relocs_copied field of the hash table entry. */
705 if (!(info->shared
706 && (sec->flags & SEC_ALLOC) != 0
707 && h != NULL
708 && (!info->symbolic
709 || (h->elf_link_hash_flags
710 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
711 {
712 if (h != NULL)
713 {
714 /* Make sure a plt entry is created for this symbol if
715 it turns out to be a function defined by a dynamic
716 object. */
717 if (h->plt.refcount == -1)
718 h->plt.refcount = 1;
719 else
720 h->plt.refcount++;
721 }
722 break;
723 }
724 /* Fall through. */
725 case R_VAX_8:
726 case R_VAX_16:
727 case R_VAX_32:
728 if (h != NULL)
729 {
730 /* Make sure a plt entry is created for this symbol if it
731 turns out to be a function defined by a dynamic object. */
732 if (h->plt.refcount == -1)
733 h->plt.refcount = 1;
734 else
735 h->plt.refcount++;
736 }
737
738 /* If we are creating a shared library, we need to copy the
739 reloc into the shared library. */
740 if (info->shared
741 && (sec->flags & SEC_ALLOC) != 0)
742 {
743 /* When creating a shared object, we must copy these
744 reloc types into the output file. We create a reloc
745 section in dynobj and make room for this reloc. */
746 if (sreloc == NULL)
747 {
748 const char *name;
749
750 name = (bfd_elf_string_from_elf_section
751 (abfd,
752 elf_elfheader (abfd)->e_shstrndx,
753 elf_section_data (sec)->rel_hdr.sh_name));
754 if (name == NULL)
755 return FALSE;
756
757 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
758 && strcmp (bfd_get_section_name (abfd, sec),
759 name + 5) == 0);
760
761 sreloc = bfd_get_section_by_name (dynobj, name);
762 if (sreloc == NULL)
763 {
764 sreloc = bfd_make_section (dynobj, name);
765 if (sreloc == NULL
766 || !bfd_set_section_flags (dynobj, sreloc,
767 (SEC_ALLOC
768 | SEC_LOAD
769 | SEC_HAS_CONTENTS
770 | SEC_IN_MEMORY
771 | SEC_LINKER_CREATED
772 | SEC_READONLY))
773 || !bfd_set_section_alignment (dynobj, sreloc, 2))
774 return FALSE;
775 }
776 if (sec->flags & SEC_READONLY)
777 info->flags |= DF_TEXTREL;
778 }
779
780 sreloc->_raw_size += sizeof (Elf32_External_Rela);
781
782 /* If we are linking with -Bsymbolic, we count the number of
783 PC relative relocations we have entered for this symbol,
784 so that we can discard them again if the symbol is later
785 defined by a regular object. Note that this function is
786 only called if we are using a vaxelf linker hash table,
787 which means that h is really a pointer to an
788 elf_vax_link_hash_entry. */
789 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
790 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
791 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
792 && info->symbolic)
793 {
794 struct elf_vax_link_hash_entry *eh;
795 struct elf_vax_pcrel_relocs_copied *p;
796
797 eh = (struct elf_vax_link_hash_entry *) h;
798
799 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
800 if (p->section == sreloc)
801 break;
802
803 if (p == NULL)
804 {
805 p = ((struct elf_vax_pcrel_relocs_copied *)
806 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
807 if (p == NULL)
808 return FALSE;
809 p->next = eh->pcrel_relocs_copied;
810 eh->pcrel_relocs_copied = p;
811 p->section = sreloc;
812 p->count = 0;
813 }
814
815 ++p->count;
816 }
817 }
818
819 break;
820
821 /* This relocation describes the C++ object vtable hierarchy.
822 Reconstruct it for later use during GC. */
823 case R_VAX_GNU_VTINHERIT:
824 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
825 return FALSE;
826 break;
827
828 /* This relocation describes which C++ vtable entries are actually
829 used. Record for later use during GC. */
830 case R_VAX_GNU_VTENTRY:
831 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
832 return FALSE;
833 break;
834
835 default:
836 break;
837 }
838 }
839
840 return TRUE;
841 }
842
843 /* Return the section that should be marked against GC for a given
844 relocation. */
845
846 static asection *
elf_vax_gc_mark_hook(sec,info,rel,h,sym)847 elf_vax_gc_mark_hook (sec, info, rel, h, sym)
848 asection *sec;
849 struct bfd_link_info *info ATTRIBUTE_UNUSED;
850 Elf_Internal_Rela *rel;
851 struct elf_link_hash_entry *h;
852 Elf_Internal_Sym *sym;
853 {
854 if (h != NULL)
855 {
856 switch (ELF32_R_TYPE (rel->r_info))
857 {
858 case R_VAX_GNU_VTINHERIT:
859 case R_VAX_GNU_VTENTRY:
860 break;
861
862 default:
863 switch (h->root.type)
864 {
865 default:
866 break;
867
868 case bfd_link_hash_defined:
869 case bfd_link_hash_defweak:
870 return h->root.u.def.section;
871
872 case bfd_link_hash_common:
873 return h->root.u.c.p->section;
874 }
875 }
876 }
877 else
878 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
879
880 return NULL;
881 }
882
883 /* Update the got entry reference counts for the section being removed. */
884
885 static bfd_boolean
elf_vax_gc_sweep_hook(abfd,info,sec,relocs)886 elf_vax_gc_sweep_hook (abfd, info, sec, relocs)
887 bfd *abfd;
888 struct bfd_link_info *info;
889 asection *sec;
890 const Elf_Internal_Rela *relocs;
891 {
892 Elf_Internal_Shdr *symtab_hdr;
893 struct elf_link_hash_entry **sym_hashes;
894 const Elf_Internal_Rela *rel, *relend;
895 bfd *dynobj;
896
897 dynobj = elf_hash_table (info)->dynobj;
898 if (dynobj == NULL)
899 return TRUE;
900
901 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
902 sym_hashes = elf_sym_hashes (abfd);
903
904 relend = relocs + sec->reloc_count;
905 for (rel = relocs; rel < relend; rel++)
906 {
907 unsigned long r_symndx;
908 struct elf_link_hash_entry *h;
909
910 switch (ELF32_R_TYPE (rel->r_info))
911 {
912 case R_VAX_GOT32:
913 r_symndx = ELF32_R_SYM (rel->r_info);
914 if (r_symndx >= symtab_hdr->sh_info)
915 {
916 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
917 if (h->got.refcount > 0)
918 --h->got.refcount;
919 }
920 break;
921
922 case R_VAX_PLT32:
923 case R_VAX_PC8:
924 case R_VAX_PC16:
925 case R_VAX_PC32:
926 case R_VAX_8:
927 case R_VAX_16:
928 case R_VAX_32:
929 r_symndx = ELF32_R_SYM (rel->r_info);
930 if (r_symndx >= symtab_hdr->sh_info)
931 {
932 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
933 if (h->plt.refcount > 0)
934 --h->plt.refcount;
935 }
936 break;
937
938 default:
939 break;
940 }
941 }
942
943 return TRUE;
944 }
945
946 /* Adjust a symbol defined by a dynamic object and referenced by a
947 regular object. The current definition is in some section of the
948 dynamic object, but we're not including those sections. We have to
949 change the definition to something the rest of the link can
950 understand. */
951
952 static bfd_boolean
elf_vax_adjust_dynamic_symbol(info,h)953 elf_vax_adjust_dynamic_symbol (info, h)
954 struct bfd_link_info *info;
955 struct elf_link_hash_entry *h;
956 {
957 bfd *dynobj;
958 asection *s;
959 unsigned int power_of_two;
960
961 dynobj = elf_hash_table (info)->dynobj;
962
963 /* Make sure we know what is going on here. */
964 BFD_ASSERT (dynobj != NULL
965 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
966 || h->weakdef != NULL
967 || ((h->elf_link_hash_flags
968 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
969 && (h->elf_link_hash_flags
970 & ELF_LINK_HASH_REF_REGULAR) != 0
971 && (h->elf_link_hash_flags
972 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
973
974 /* If this is a function, put it in the procedure linkage table. We
975 will fill in the contents of the procedure linkage table later,
976 when we know the address of the .got section. */
977 if (h->type == STT_FUNC
978 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
979 {
980 if (! info->shared
981 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
982 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0
983 /* We must always create the plt entry if it was referenced
984 by a PLTxxO relocation. In this case we already recorded
985 it as a dynamic symbol. */
986 && h->dynindx == -1)
987 {
988 /* This case can occur if we saw a PLTxx reloc in an input
989 file, but the symbol was never referred to by a dynamic
990 object. In such a case, we don't actually need to build
991 a procedure linkage table, and we can just do a PCxx
992 reloc instead. */
993 BFD_ASSERT ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0);
994 h->plt.offset = (bfd_vma) -1;
995 return TRUE;
996 }
997
998 /* GC may have rendered this entry unused. */
999 if (h->plt.refcount <= 0)
1000 {
1001 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1002 h->plt.offset = (bfd_vma) -1;
1003 return TRUE;
1004 }
1005
1006 /* Make sure this symbol is output as a dynamic symbol. */
1007 if (h->dynindx == -1)
1008 {
1009 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1010 return FALSE;
1011 }
1012
1013 s = bfd_get_section_by_name (dynobj, ".plt");
1014 BFD_ASSERT (s != NULL);
1015
1016 /* If this is the first .plt entry, make room for the special
1017 first entry. */
1018 if (s->_raw_size == 0)
1019 {
1020 s->_raw_size += PLT_ENTRY_SIZE;
1021 }
1022
1023 /* If this symbol is not defined in a regular file, and we are
1024 not generating a shared library, then set the symbol to this
1025 location in the .plt. This is required to make function
1026 pointers compare as equal between the normal executable and
1027 the shared library. */
1028 if (!info->shared
1029 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1030 {
1031 h->root.u.def.section = s;
1032 h->root.u.def.value = s->_raw_size;
1033 }
1034
1035 h->plt.offset = s->_raw_size;
1036
1037 /* Make room for this entry. */
1038 s->_raw_size += PLT_ENTRY_SIZE;
1039
1040 /* We also need to make an entry in the .got.plt section, which
1041 will be placed in the .got section by the linker script. */
1042
1043 s = bfd_get_section_by_name (dynobj, ".got.plt");
1044 BFD_ASSERT (s != NULL);
1045 s->_raw_size += 4;
1046
1047 /* We also need to make an entry in the .rela.plt section. */
1048
1049 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1050 BFD_ASSERT (s != NULL);
1051 s->_raw_size += sizeof (Elf32_External_Rela);
1052
1053 return TRUE;
1054 }
1055
1056 /* Reinitialize the plt offset now that it is not used as a reference
1057 count any more. */
1058 h->plt.offset = (bfd_vma) -1;
1059
1060 /* If this is a weak symbol, and there is a real definition, the
1061 processor independent code will have arranged for us to see the
1062 real definition first, and we can just use the same value. */
1063 if (h->weakdef != NULL)
1064 {
1065 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1066 || h->weakdef->root.type == bfd_link_hash_defweak);
1067 h->root.u.def.section = h->weakdef->root.u.def.section;
1068 h->root.u.def.value = h->weakdef->root.u.def.value;
1069 return TRUE;
1070 }
1071
1072 /* This is a reference to a symbol defined by a dynamic object which
1073 is not a function. */
1074
1075 /* If we are creating a shared library, we must presume that the
1076 only references to the symbol are via the global offset table.
1077 For such cases we need not do anything here; the relocations will
1078 be handled correctly by relocate_section. */
1079 if (info->shared)
1080 return TRUE;
1081
1082 /* We must allocate the symbol in our .dynbss section, which will
1083 become part of the .bss section of the executable. There will be
1084 an entry for this symbol in the .dynsym section. The dynamic
1085 object will contain position independent code, so all references
1086 from the dynamic object to this symbol will go through the global
1087 offset table. The dynamic linker will use the .dynsym entry to
1088 determine the address it must put in the global offset table, so
1089 both the dynamic object and the regular object will refer to the
1090 same memory location for the variable. */
1091
1092 s = bfd_get_section_by_name (dynobj, ".dynbss");
1093 BFD_ASSERT (s != NULL);
1094
1095 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1096 copy the initial value out of the dynamic object and into the
1097 runtime process image. We need to remember the offset into the
1098 .rela.bss section we are going to use. */
1099 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1100 {
1101 asection *srel;
1102
1103 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1104 BFD_ASSERT (srel != NULL);
1105 srel->_raw_size += sizeof (Elf32_External_Rela);
1106 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1107 }
1108
1109 /* We need to figure out the alignment required for this symbol. I
1110 have no idea how ELF linkers handle this. */
1111 power_of_two = bfd_log2 (h->size);
1112 if (power_of_two > 3)
1113 power_of_two = 3;
1114
1115 /* Apply the required alignment. */
1116 s->_raw_size = BFD_ALIGN (s->_raw_size,
1117 (bfd_size_type) (1 << power_of_two));
1118 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1119 {
1120 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
1121 return FALSE;
1122 }
1123
1124 /* Define the symbol as being at this point in the section. */
1125 h->root.u.def.section = s;
1126 h->root.u.def.value = s->_raw_size;
1127
1128 /* Increment the section size to make room for the symbol. */
1129 s->_raw_size += h->size;
1130
1131 return TRUE;
1132 }
1133
1134 /* Set the sizes of the dynamic sections. */
1135
1136 static bfd_boolean
elf_vax_size_dynamic_sections(output_bfd,info)1137 elf_vax_size_dynamic_sections (output_bfd, info)
1138 bfd *output_bfd;
1139 struct bfd_link_info *info;
1140 {
1141 bfd *dynobj;
1142 asection *s;
1143 bfd_boolean plt;
1144 bfd_boolean relocs;
1145 bfd_boolean reltext;
1146
1147 dynobj = elf_hash_table (info)->dynobj;
1148 BFD_ASSERT (dynobj != NULL);
1149
1150 if (elf_hash_table (info)->dynamic_sections_created)
1151 {
1152 /* Set the contents of the .interp section to the interpreter. */
1153 if (info->executable && !info->static_link)
1154 {
1155 s = bfd_get_section_by_name (dynobj, ".interp");
1156 BFD_ASSERT (s != NULL);
1157 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1158 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1159 }
1160 }
1161 else
1162 {
1163 /* We may have created entries in the .rela.got and .got sections.
1164 However, if we are not creating the dynamic sections, we will
1165 not actually use these entries. Reset the size of .rela.got
1166 and .got, which will cause it to get stripped from the output
1167 file below. */
1168 s = bfd_get_section_by_name (dynobj, ".rela.got");
1169 if (s != NULL)
1170 s->_raw_size = 0;
1171 s = bfd_get_section_by_name (dynobj, ".got.plt");
1172 if (s != NULL)
1173 s->_raw_size = 0;
1174 s = bfd_get_section_by_name (dynobj, ".got");
1175 if (s != NULL)
1176 s->_raw_size = 0;
1177 }
1178
1179 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1180 relative relocs against symbols defined in a regular object. We
1181 allocated space for them in the check_relocs routine, but we will not
1182 fill them in in the relocate_section routine. */
1183 if (info->shared && info->symbolic)
1184 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
1185 elf_vax_discard_copies,
1186 (PTR) NULL);
1187
1188 /* If this is a -Bsymbolic shared link or a static link, we need to
1189 discard all the got entries we've recorded. Otherwise, we need to
1190 instantiate (allocate space for them). */
1191 elf_link_hash_traverse (elf_hash_table (info),
1192 elf_vax_instantiate_got_entries,
1193 (PTR) info);
1194
1195 /* The check_relocs and adjust_dynamic_symbol entry points have
1196 determined the sizes of the various dynamic sections. Allocate
1197 memory for them. */
1198 plt = FALSE;
1199 relocs = FALSE;
1200 reltext = FALSE;
1201 for (s = dynobj->sections; s != NULL; s = s->next)
1202 {
1203 const char *name;
1204 bfd_boolean strip;
1205
1206 if ((s->flags & SEC_LINKER_CREATED) == 0)
1207 continue;
1208
1209 /* It's OK to base decisions on the section name, because none
1210 of the dynobj section names depend upon the input files. */
1211 name = bfd_get_section_name (dynobj, s);
1212
1213 strip = FALSE;
1214
1215 if (strcmp (name, ".plt") == 0)
1216 {
1217 if (s->_raw_size == 0)
1218 {
1219 /* Strip this section if we don't need it; see the
1220 comment below. */
1221 strip = TRUE;
1222 }
1223 else
1224 {
1225 /* Remember whether there is a PLT. */
1226 plt = TRUE;
1227 }
1228 }
1229 else if (strncmp (name, ".rela", 5) == 0)
1230 {
1231 if (s->_raw_size == 0)
1232 {
1233 /* If we don't need this section, strip it from the
1234 output file. This is mostly to handle .rela.bss and
1235 .rela.plt. We must create both sections in
1236 create_dynamic_sections, because they must be created
1237 before the linker maps input sections to output
1238 sections. The linker does that before
1239 adjust_dynamic_symbol is called, and it is that
1240 function which decides whether anything needs to go
1241 into these sections. */
1242 strip = TRUE;
1243 }
1244 else
1245 {
1246 asection *target;
1247
1248 /* Remember whether there are any reloc sections other
1249 than .rela.plt. */
1250 if (strcmp (name, ".rela.plt") != 0)
1251 {
1252 const char *outname;
1253
1254 relocs = TRUE;
1255
1256 /* If this relocation section applies to a read only
1257 section, then we probably need a DT_TEXTREL
1258 entry. .rela.plt is actually associated with
1259 .got.plt, which is never readonly. */
1260 outname = bfd_get_section_name (output_bfd,
1261 s->output_section);
1262 target = bfd_get_section_by_name (output_bfd, outname + 5);
1263 if (target != NULL
1264 && (target->flags & SEC_READONLY) != 0
1265 && (target->flags & SEC_ALLOC) != 0)
1266 reltext = TRUE;
1267 }
1268
1269 /* We use the reloc_count field as a counter if we need
1270 to copy relocs into the output file. */
1271 s->reloc_count = 0;
1272 }
1273 }
1274 else if (strncmp (name, ".got", 4) != 0)
1275 {
1276 /* It's not one of our sections, so don't allocate space. */
1277 continue;
1278 }
1279
1280 if (strip)
1281 {
1282 _bfd_strip_section_from_output (info, s);
1283 continue;
1284 }
1285
1286 /* Allocate memory for the section contents. */
1287 /* FIXME: This should be a call to bfd_alloc not bfd_zalloc.
1288 Unused entries should be reclaimed before the section's contents
1289 are written out, but at the moment this does not happen. Thus in
1290 order to prevent writing out garbage, we initialise the section's
1291 contents to zero. */
1292 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
1293 if (s->contents == NULL && s->_raw_size != 0)
1294 return FALSE;
1295 }
1296
1297 if (elf_hash_table (info)->dynamic_sections_created)
1298 {
1299 /* Add some entries to the .dynamic section. We fill in the
1300 values later, in elf_vax_finish_dynamic_sections, but we
1301 must add the entries now so that we get the correct size for
1302 the .dynamic section. The DT_DEBUG entry is filled in by the
1303 dynamic linker and used by the debugger. */
1304 #define add_dynamic_entry(TAG, VAL) \
1305 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1306
1307 if (!info->shared)
1308 {
1309 if (!add_dynamic_entry (DT_DEBUG, 0))
1310 return FALSE;
1311 }
1312
1313 if (plt)
1314 {
1315 if (!add_dynamic_entry (DT_PLTGOT, 0)
1316 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1317 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1318 || !add_dynamic_entry (DT_JMPREL, 0))
1319 return FALSE;
1320 }
1321
1322 if (relocs)
1323 {
1324 if (!add_dynamic_entry (DT_RELA, 0)
1325 || !add_dynamic_entry (DT_RELASZ, 0)
1326 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1327 return FALSE;
1328 }
1329
1330 if (reltext || (info->flags & DF_TEXTREL) != 0)
1331 {
1332 if (!add_dynamic_entry (DT_TEXTREL, 0))
1333 return FALSE;
1334 }
1335 }
1336 #undef add_dynamic_entry
1337
1338 return TRUE;
1339 }
1340
1341 /* This function is called via elf_vax_link_hash_traverse if we are
1342 creating a shared object with -Bsymbolic. It discards the space
1343 allocated to copy PC relative relocs against symbols which are defined
1344 in regular objects. We allocated space for them in the check_relocs
1345 routine, but we won't fill them in in the relocate_section routine. */
1346
1347 static bfd_boolean
elf_vax_discard_copies(h,ignore)1348 elf_vax_discard_copies (h, ignore)
1349 struct elf_vax_link_hash_entry *h;
1350 PTR ignore ATTRIBUTE_UNUSED;
1351 {
1352 struct elf_vax_pcrel_relocs_copied *s;
1353
1354 if (h->root.root.type == bfd_link_hash_warning)
1355 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1356
1357 /* We only discard relocs for symbols defined in a regular object. */
1358 if ((h->root.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1359 return TRUE;
1360
1361 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1362 s->section->_raw_size -= s->count * sizeof (Elf32_External_Rela);
1363
1364 return TRUE;
1365 }
1366
1367 /* This function is called via elf_link_hash_traverse. It looks for entries
1368 that have GOT or PLT (.GOT) references. If creating a static object or a
1369 shared object with -Bsymbolic, it resets the reference count back to 0
1370 and sets the offset to -1 so normal PC32 relocation will be done. If
1371 creating a shared object or executable, space in the .got and .rela.got
1372 will be reserved for the symbol. */
1373
1374 static bfd_boolean
elf_vax_instantiate_got_entries(h,infoptr)1375 elf_vax_instantiate_got_entries (h, infoptr)
1376 struct elf_link_hash_entry *h;
1377 PTR infoptr;
1378 {
1379 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1380 bfd *dynobj;
1381 asection *sgot;
1382 asection *srelgot;
1383
1384 /* We don't care about non-GOT (and non-PLT) entries. */
1385 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1386 return TRUE;
1387
1388 dynobj = elf_hash_table (info)->dynobj;
1389 if (dynobj == NULL)
1390 return TRUE;
1391
1392 sgot = bfd_get_section_by_name (dynobj, ".got");
1393 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1394
1395 if (!elf_hash_table (info)->dynamic_sections_created
1396 || (info->shared && info->symbolic))
1397 {
1398 h->got.refcount = 0;
1399 h->got.offset = (bfd_vma) -1;
1400 h->plt.refcount = 0;
1401 h->plt.offset = (bfd_vma) -1;
1402 }
1403 else if (h->got.refcount > 0)
1404 {
1405 /* Make sure this symbol is output as a dynamic symbol. */
1406 if (h->dynindx == -1)
1407 {
1408 if (!bfd_elf_link_record_dynamic_symbol (info, h))
1409 return FALSE;
1410 }
1411
1412 /* Allocate space in the .got and .rela.got sections. */
1413 sgot->_raw_size += 4;
1414 srelgot->_raw_size += sizeof (Elf32_External_Rela);
1415 }
1416
1417 return TRUE;
1418 }
1419
1420 /* Relocate an VAX ELF section. */
1421
1422 static bfd_boolean
elf_vax_relocate_section(output_bfd,info,input_bfd,input_section,contents,relocs,local_syms,local_sections)1423 elf_vax_relocate_section (output_bfd, info, input_bfd, input_section,
1424 contents, relocs, local_syms, local_sections)
1425 bfd *output_bfd;
1426 struct bfd_link_info *info;
1427 bfd *input_bfd;
1428 asection *input_section;
1429 bfd_byte *contents;
1430 Elf_Internal_Rela *relocs;
1431 Elf_Internal_Sym *local_syms;
1432 asection **local_sections;
1433 {
1434 bfd *dynobj;
1435 Elf_Internal_Shdr *symtab_hdr;
1436 struct elf_link_hash_entry **sym_hashes;
1437 bfd_vma *local_got_offsets;
1438 bfd_vma plt_index;
1439 bfd_vma got_offset;
1440 asection *sgot;
1441 asection *splt;
1442 asection *sgotplt;
1443 asection *sreloc;
1444 Elf_Internal_Rela *rel;
1445 Elf_Internal_Rela *relend;
1446
1447 if (info->relocatable)
1448 return TRUE;
1449
1450 dynobj = elf_hash_table (info)->dynobj;
1451 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1452 sym_hashes = elf_sym_hashes (input_bfd);
1453 local_got_offsets = elf_local_got_offsets (input_bfd);
1454
1455 sgot = NULL;
1456 splt = NULL;
1457 sgotplt = NULL;
1458 sreloc = NULL;
1459
1460 rel = relocs;
1461 relend = relocs + input_section->reloc_count;
1462 for (; rel < relend; rel++)
1463 {
1464 int r_type;
1465 reloc_howto_type *howto;
1466 unsigned long r_symndx;
1467 struct elf_link_hash_entry *h;
1468 Elf_Internal_Sym *sym;
1469 asection *sec;
1470 bfd_vma relocation;
1471 bfd_reloc_status_type r;
1472
1473 r_type = ELF32_R_TYPE (rel->r_info);
1474 if (r_type < 0 || r_type >= (int) R_VAX_max)
1475 {
1476 bfd_set_error (bfd_error_bad_value);
1477 return FALSE;
1478 }
1479 howto = howto_table + r_type;
1480
1481 /* This is a final link. */
1482 r_symndx = ELF32_R_SYM (rel->r_info);
1483 h = NULL;
1484 sym = NULL;
1485 sec = NULL;
1486 if (r_symndx < symtab_hdr->sh_info)
1487 {
1488 sym = local_syms + r_symndx;
1489 sec = local_sections[r_symndx];
1490 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1491 }
1492 else
1493 {
1494 bfd_boolean unresolved_reloc;
1495 bfd_boolean warned;
1496
1497 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1498 r_symndx, symtab_hdr, sym_hashes,
1499 h, sec, relocation,
1500 unresolved_reloc, warned);
1501
1502 if ((h->root.type == bfd_link_hash_defined
1503 || h->root.type == bfd_link_hash_defweak)
1504 && ((r_type == R_VAX_PLT32
1505 && h->plt.offset != (bfd_vma) -1
1506 && elf_hash_table (info)->dynamic_sections_created)
1507 || (r_type == R_VAX_GOT32
1508 && strcmp (h->root.root.string,
1509 "_GLOBAL_OFFSET_TABLE_") != 0
1510 && elf_hash_table (info)->dynamic_sections_created
1511 && (! info->shared
1512 || (! info->symbolic && h->dynindx != -1)
1513 || (h->elf_link_hash_flags
1514 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1515 || (info->shared
1516 && ((! info->symbolic && h->dynindx != -1)
1517 || (h->elf_link_hash_flags
1518 & ELF_LINK_HASH_DEF_REGULAR) == 0)
1519 && ((input_section->flags & SEC_ALLOC) != 0
1520 /* DWARF will emit R_VAX_32 relocations in its
1521 sections against symbols defined externally
1522 in shared libraries. We can't do anything
1523 with them here. */
1524
1525 || ((input_section->flags & SEC_DEBUGGING) != 0
1526 && (h->elf_link_hash_flags
1527 & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
1528 && (r_type == R_VAX_8
1529 || r_type == R_VAX_16
1530 || r_type == R_VAX_32
1531 || r_type == R_VAX_PC8
1532 || r_type == R_VAX_PC16
1533 || r_type == R_VAX_PC32))))
1534 /* In these cases, we don't need the relocation
1535 value. We check specially because in some
1536 obscure cases sec->output_section will be NULL. */
1537 relocation = 0;
1538 }
1539
1540 switch (r_type)
1541 {
1542 case R_VAX_GOT32:
1543 /* Relocation is to the address of the entry for this symbol
1544 in the global offset table. */
1545 if (h == NULL || h->got.offset == (bfd_vma) -1)
1546 break;
1547
1548 /* Relocation is the offset of the entry for this symbol in
1549 the global offset table. */
1550
1551 {
1552 bfd_vma off;
1553
1554 if (sgot == NULL)
1555 {
1556 sgot = bfd_get_section_by_name (dynobj, ".got");
1557 BFD_ASSERT (sgot != NULL);
1558 }
1559
1560 BFD_ASSERT (h != NULL);
1561 off = h->got.offset;
1562 BFD_ASSERT (off != (bfd_vma) -1);
1563 BFD_ASSERT (off < sgot->_raw_size);
1564
1565 if (info->shared
1566 && h->dynindx == -1
1567 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1568 {
1569 /* The symbol was forced to be local
1570 because of a version file.. We must initialize
1571 this entry in the global offset table. Since
1572 the offset must always be a multiple of 4, we
1573 use the least significant bit to record whether
1574 we have initialized it already.
1575
1576 When doing a dynamic link, we create a .rela.got
1577 relocation entry to initialize the value. This
1578 is done in the finish_dynamic_symbol routine. */
1579 if ((off & 1) != 0)
1580 off &= ~1;
1581 else
1582 {
1583 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1584 sgot->contents + off);
1585 h->got.offset |= 1;
1586 }
1587 } else {
1588 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1589 }
1590
1591 relocation = sgot->output_offset + off;
1592 /* The GOT relocation uses the addend. */
1593 rel->r_addend = 0;
1594
1595 /* Change the reference to be indirect. */
1596 contents[rel->r_offset - 1] |= 0x10;
1597 relocation += sgot->output_section->vma;
1598 }
1599 break;
1600
1601 case R_VAX_PLT32:
1602 /* Relocation is to the entry for this symbol in the
1603 procedure linkage table. */
1604
1605 /* Resolve a PLTxx reloc against a local symbol directly,
1606 without using the procedure linkage table. */
1607 if (h == NULL)
1608 break;
1609
1610 if (h->plt.offset == (bfd_vma) -1
1611 || !elf_hash_table (info)->dynamic_sections_created)
1612 {
1613 /* We didn't make a PLT entry for this symbol. This
1614 happens when statically linking PIC code, or when
1615 using -Bsymbolic. */
1616 break;
1617 }
1618
1619 if (splt == NULL)
1620 {
1621 splt = bfd_get_section_by_name (dynobj, ".plt");
1622 BFD_ASSERT (splt != NULL);
1623 }
1624
1625 if (sgotplt == NULL)
1626 {
1627 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1628 BFD_ASSERT (splt != NULL);
1629 }
1630
1631 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1632
1633 /* Get the offset into the .got table of the entry that
1634 corresponds to this function. Each .got entry is 4 bytes.
1635 The first two are reserved. */
1636 got_offset = (plt_index + 3) * 4;
1637
1638 /* We want the relocate to point into the .got.plt instead
1639 of the plt itself. */
1640 relocation = (sgotplt->output_section->vma
1641 + sgotplt->output_offset
1642 + got_offset);
1643 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1644 if (rel->r_addend == 2)
1645 {
1646 h->plt.offset |= 1;
1647 }
1648 else if (rel->r_addend != 0)
1649 (*_bfd_error_handler)
1650 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1651 bfd_get_filename (input_bfd), rel->r_addend,
1652 h->root.root.string,
1653 bfd_get_section_name (input_bfd, input_section));
1654 rel->r_addend = 0;
1655
1656 break;
1657
1658 case R_VAX_PC8:
1659 case R_VAX_PC16:
1660 case R_VAX_PC32:
1661 if (h == NULL)
1662 break;
1663 /* Fall through. */
1664 case R_VAX_8:
1665 case R_VAX_16:
1666 case R_VAX_32:
1667 if (info->shared
1668 && r_symndx != 0
1669 && (input_section->flags & SEC_ALLOC) != 0
1670 && ((r_type != R_VAX_PC8
1671 && r_type != R_VAX_PC16
1672 && r_type != R_VAX_PC32)
1673 || (!info->symbolic
1674 || (h->elf_link_hash_flags
1675 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
1676 {
1677 Elf_Internal_Rela outrel;
1678 bfd_byte *loc;
1679 bfd_boolean skip, relocate;
1680
1681 /* When generating a shared object, these relocations
1682 are copied into the output file to be resolved at run
1683 time. */
1684 if (sreloc == NULL)
1685 {
1686 const char *name;
1687
1688 name = (bfd_elf_string_from_elf_section
1689 (input_bfd,
1690 elf_elfheader (input_bfd)->e_shstrndx,
1691 elf_section_data (input_section)->rel_hdr.sh_name));
1692 if (name == NULL)
1693 return FALSE;
1694
1695 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1696 && strcmp (bfd_get_section_name (input_bfd,
1697 input_section),
1698 name + 5) == 0);
1699
1700 sreloc = bfd_get_section_by_name (dynobj, name);
1701 BFD_ASSERT (sreloc != NULL);
1702 }
1703
1704 skip = FALSE;
1705 relocate = FALSE;
1706
1707 outrel.r_offset =
1708 _bfd_elf_section_offset (output_bfd, info, input_section,
1709 rel->r_offset);
1710 if (outrel.r_offset == (bfd_vma) -1)
1711 skip = TRUE;
1712 if (outrel.r_offset == (bfd_vma) -2)
1713 skip = TRUE, relocate = TRUE;
1714 outrel.r_offset += (input_section->output_section->vma
1715 + input_section->output_offset);
1716
1717 if (skip)
1718 memset (&outrel, 0, sizeof outrel);
1719 /* h->dynindx may be -1 if the symbol was marked to
1720 become local. */
1721 else if (h != NULL
1722 && ((! info->symbolic && h->dynindx != -1)
1723 || (h->elf_link_hash_flags
1724 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1725 {
1726 BFD_ASSERT (h->dynindx != -1);
1727 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1728 outrel.r_addend = relocation + rel->r_addend;
1729 }
1730 else
1731 {
1732 if (r_type == R_VAX_32)
1733 {
1734 relocate = TRUE;
1735 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1736 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1737 &contents[rel->r_offset]) == 0);
1738 outrel.r_addend = relocation + rel->r_addend;
1739 }
1740 else
1741 {
1742 long indx;
1743
1744 if (bfd_is_abs_section (sec))
1745 indx = 0;
1746 else if (sec == NULL || sec->owner == NULL)
1747 {
1748 bfd_set_error (bfd_error_bad_value);
1749 return FALSE;
1750 }
1751 else
1752 {
1753 asection *osec;
1754
1755 osec = sec->output_section;
1756 indx = elf_section_data (osec)->dynindx;
1757 BFD_ASSERT (indx > 0);
1758 }
1759
1760 outrel.r_info = ELF32_R_INFO (indx, r_type);
1761 outrel.r_addend = relocation + rel->r_addend;
1762 }
1763 }
1764
1765 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
1766 ".text") != 0 ||
1767 (info->shared
1768 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1769 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1770 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1771 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1772 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1773 {
1774 if (h != NULL)
1775 (*_bfd_error_handler)
1776 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1777 bfd_get_filename (input_bfd), howto->name,
1778 h->root.root.string,
1779 bfd_get_section_name (input_bfd, input_section));
1780 else
1781 (*_bfd_error_handler)
1782 (_("%s: warning: %s relocation to 0x%x from %s section"),
1783 bfd_get_filename (input_bfd), howto->name,
1784 outrel.r_addend,
1785 bfd_get_section_name (input_bfd, input_section));
1786 }
1787 loc = sreloc->contents;
1788 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1789 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1790
1791 /* This reloc will be computed at runtime, so there's no
1792 need to do anything now, except for R_VAX_32
1793 relocations that have been turned into
1794 R_VAX_RELATIVE. */
1795 if (!relocate)
1796 continue;
1797 }
1798
1799 break;
1800
1801 case R_VAX_GNU_VTINHERIT:
1802 case R_VAX_GNU_VTENTRY:
1803 /* These are no-ops in the end. */
1804 continue;
1805
1806 default:
1807 break;
1808 }
1809
1810 /* VAX PCREL relocations are from the end of relocation, not the start.
1811 So subtract the difference from the relocation amount since we can't
1812 add it to the offset. */
1813 if (howto->pc_relative && howto->pcrel_offset)
1814 relocation -= bfd_get_reloc_size(howto);
1815
1816 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1817 contents, rel->r_offset,
1818 relocation, rel->r_addend);
1819
1820 if (r != bfd_reloc_ok)
1821 {
1822 switch (r)
1823 {
1824 default:
1825 case bfd_reloc_outofrange:
1826 abort ();
1827 case bfd_reloc_overflow:
1828 {
1829 const char *name;
1830
1831 if (h != NULL)
1832 name = h->root.root.string;
1833 else
1834 {
1835 name = bfd_elf_string_from_elf_section (input_bfd,
1836 symtab_hdr->sh_link,
1837 sym->st_name);
1838 if (name == NULL)
1839 return FALSE;
1840 if (*name == '\0')
1841 name = bfd_section_name (input_bfd, sec);
1842 }
1843 if (!(info->callbacks->reloc_overflow
1844 (info, name, howto->name, (bfd_vma) 0,
1845 input_bfd, input_section, rel->r_offset)))
1846 return FALSE;
1847 }
1848 break;
1849 }
1850 }
1851 }
1852
1853 return TRUE;
1854 }
1855
1856 /* Finish up dynamic symbol handling. We set the contents of various
1857 dynamic sections here. */
1858
1859 static bfd_boolean
elf_vax_finish_dynamic_symbol(output_bfd,info,h,sym)1860 elf_vax_finish_dynamic_symbol (output_bfd, info, h, sym)
1861 bfd *output_bfd;
1862 struct bfd_link_info *info;
1863 struct elf_link_hash_entry *h;
1864 Elf_Internal_Sym *sym;
1865 {
1866 bfd *dynobj;
1867
1868 dynobj = elf_hash_table (info)->dynobj;
1869
1870 if (h->plt.offset != (bfd_vma) -1)
1871 {
1872 asection *splt;
1873 asection *sgot;
1874 asection *srela;
1875 bfd_vma plt_index;
1876 bfd_vma got_offset;
1877 bfd_vma addend;
1878 Elf_Internal_Rela rela;
1879 bfd_byte *loc;
1880
1881 /* This symbol has an entry in the procedure linkage table. Set
1882 it up. */
1883 BFD_ASSERT (h->dynindx != -1);
1884
1885 splt = bfd_get_section_by_name (dynobj, ".plt");
1886 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1887 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1888 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1889
1890 addend = 2 * (h->plt.offset & 1);
1891 h->plt.offset &= ~1;
1892
1893 /* Get the index in the procedure linkage table which
1894 corresponds to this symbol. This is the index of this symbol
1895 in all the symbols for which we are making plt entries. The
1896 first entry in the procedure linkage table is reserved. */
1897 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1898
1899 /* Get the offset into the .got table of the entry that
1900 corresponds to this function. Each .got entry is 4 bytes.
1901 The first two are reserved. */
1902 got_offset = (plt_index + 3) * 4;
1903
1904 /* Fill in the entry in the procedure linkage table. */
1905 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1906 PLT_ENTRY_SIZE);
1907
1908 /* The offset is relative to the first extension word. */
1909 bfd_put_32 (output_bfd,
1910 -(h->plt.offset + 8),
1911 splt->contents + h->plt.offset + 4);
1912
1913 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1914 splt->contents + h->plt.offset + 8);
1915
1916 /* Fill in the entry in the global offset table. */
1917 bfd_put_32 (output_bfd,
1918 (splt->output_section->vma
1919 + splt->output_offset
1920 + h->plt.offset) + addend,
1921 sgot->contents + got_offset);
1922
1923 /* Fill in the entry in the .rela.plt section. */
1924 rela.r_offset = (sgot->output_section->vma
1925 + sgot->output_offset
1926 + got_offset);
1927 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1928 rela.r_addend = addend;
1929 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1930 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1931
1932 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1933 {
1934 /* Mark the symbol as undefined, rather than as defined in
1935 the .plt section. Leave the value alone. */
1936 sym->st_shndx = SHN_UNDEF;
1937 }
1938 }
1939
1940 if (h->got.offset != (bfd_vma) -1)
1941 {
1942 asection *sgot;
1943 asection *srela;
1944 Elf_Internal_Rela rela;
1945 bfd_byte *loc;
1946
1947 /* This symbol has an entry in the global offset table. Set it
1948 up. */
1949 sgot = bfd_get_section_by_name (dynobj, ".got");
1950 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1951 BFD_ASSERT (sgot != NULL && srela != NULL);
1952
1953 rela.r_offset = (sgot->output_section->vma
1954 + sgot->output_offset
1955 + (h->got.offset &~ 1));
1956
1957 /* If the symbol was forced to be local because of a version file
1958 locally we just want to emit a RELATIVE reloc. The entry in
1959 the global offset table will already have been initialized in
1960 the relocate_section function. */
1961 if (info->shared
1962 && h->dynindx == -1
1963 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1964 {
1965 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1966 }
1967 else
1968 {
1969 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1970 }
1971 rela.r_addend = bfd_get_signed_32 (output_bfd,
1972 (sgot->contents
1973 + (h->got.offset & ~1)));
1974
1975 loc = srela->contents;
1976 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1977 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1978 }
1979
1980 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
1981 {
1982 asection *s;
1983 Elf_Internal_Rela rela;
1984 bfd_byte *loc;
1985
1986 /* This symbol needs a copy reloc. Set it up. */
1987 BFD_ASSERT (h->dynindx != -1
1988 && (h->root.type == bfd_link_hash_defined
1989 || h->root.type == bfd_link_hash_defweak));
1990
1991 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1992 ".rela.bss");
1993 BFD_ASSERT (s != NULL);
1994
1995 rela.r_offset = (h->root.u.def.value
1996 + h->root.u.def.section->output_section->vma
1997 + h->root.u.def.section->output_offset);
1998 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1999 rela.r_addend = 0;
2000 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2001 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
2002 }
2003
2004 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2005 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2006 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2007 sym->st_shndx = SHN_ABS;
2008
2009 return TRUE;
2010 }
2011
2012 /* Finish up the dynamic sections. */
2013
2014 static bfd_boolean
elf_vax_finish_dynamic_sections(output_bfd,info)2015 elf_vax_finish_dynamic_sections (output_bfd, info)
2016 bfd *output_bfd;
2017 struct bfd_link_info *info;
2018 {
2019 bfd *dynobj;
2020 asection *sgot;
2021 asection *sdyn;
2022
2023 dynobj = elf_hash_table (info)->dynobj;
2024
2025 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2026 BFD_ASSERT (sgot != NULL);
2027 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2028
2029 if (elf_hash_table (info)->dynamic_sections_created)
2030 {
2031 asection *splt;
2032 Elf32_External_Dyn *dyncon, *dynconend;
2033
2034 splt = bfd_get_section_by_name (dynobj, ".plt");
2035 BFD_ASSERT (splt != NULL && sdyn != NULL);
2036
2037 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2038 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2039 for (; dyncon < dynconend; dyncon++)
2040 {
2041 Elf_Internal_Dyn dyn;
2042 const char *name;
2043 asection *s;
2044
2045 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2046
2047 switch (dyn.d_tag)
2048 {
2049 default:
2050 break;
2051
2052 case DT_PLTGOT:
2053 name = ".got";
2054 goto get_vma;
2055 case DT_JMPREL:
2056 name = ".rela.plt";
2057 get_vma:
2058 s = bfd_get_section_by_name (output_bfd, name);
2059 BFD_ASSERT (s != NULL);
2060 dyn.d_un.d_ptr = s->vma;
2061 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2062 break;
2063
2064 case DT_PLTRELSZ:
2065 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2066 BFD_ASSERT (s != NULL);
2067 if (s->_cooked_size != 0)
2068 dyn.d_un.d_val = s->_cooked_size;
2069 else
2070 dyn.d_un.d_val = s->_raw_size;
2071 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2072 break;
2073
2074 case DT_RELASZ:
2075 /* The procedure linkage table relocs (DT_JMPREL) should
2076 not be included in the overall relocs (DT_RELA).
2077 Therefore, we override the DT_RELASZ entry here to
2078 make it not include the JMPREL relocs. Since the
2079 linker script arranges for .rela.plt to follow all
2080 other relocation sections, we don't have to worry
2081 about changing the DT_RELA entry. */
2082 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2083 if (s != NULL)
2084 {
2085 if (s->_cooked_size != 0)
2086 dyn.d_un.d_val -= s->_cooked_size;
2087 else
2088 dyn.d_un.d_val -= s->_raw_size;
2089 }
2090 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2091 break;
2092 }
2093 }
2094
2095 /* Fill in the first entry in the procedure linkage table. */
2096 if (splt->_raw_size > 0)
2097 {
2098 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2099 bfd_put_32 (output_bfd,
2100 (sgot->output_section->vma
2101 + sgot->output_offset + 4
2102 - (splt->output_section->vma + 6)),
2103 splt->contents + 2);
2104 bfd_put_32 (output_bfd,
2105 (sgot->output_section->vma
2106 + sgot->output_offset + 8
2107 - (splt->output_section->vma + 12)),
2108 splt->contents + 8);
2109 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2110 = PLT_ENTRY_SIZE;
2111 }
2112 }
2113
2114 /* Fill in the first three entries in the global offset table. */
2115 if (sgot->_raw_size > 0)
2116 {
2117 if (sdyn == NULL)
2118 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2119 else
2120 bfd_put_32 (output_bfd,
2121 sdyn->output_section->vma + sdyn->output_offset,
2122 sgot->contents);
2123 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2124 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2125 }
2126
2127 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2128
2129 return TRUE;
2130 }
2131
2132 #define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2133 #define TARGET_LITTLE_NAME "elf32-vax"
2134 #define ELF_MACHINE_CODE EM_VAX
2135 #define ELF_MAXPAGESIZE 0x1000
2136
2137 #define elf_backend_create_dynamic_sections \
2138 _bfd_elf_create_dynamic_sections
2139 #define bfd_elf32_bfd_link_hash_table_create \
2140 elf_vax_link_hash_table_create
2141 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
2142
2143 #define elf_backend_check_relocs elf_vax_check_relocs
2144 #define elf_backend_adjust_dynamic_symbol \
2145 elf_vax_adjust_dynamic_symbol
2146 #define elf_backend_size_dynamic_sections \
2147 elf_vax_size_dynamic_sections
2148 #define elf_backend_relocate_section elf_vax_relocate_section
2149 #define elf_backend_finish_dynamic_symbol \
2150 elf_vax_finish_dynamic_symbol
2151 #define elf_backend_finish_dynamic_sections \
2152 elf_vax_finish_dynamic_sections
2153 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2154 #define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2155 #define bfd_elf32_bfd_merge_private_bfd_data \
2156 elf32_vax_merge_private_bfd_data
2157 #define bfd_elf32_bfd_set_private_flags \
2158 elf32_vax_set_private_flags
2159 #define bfd_elf32_bfd_print_private_bfd_data \
2160 elf32_vax_print_private_bfd_data
2161
2162 #define elf_backend_can_gc_sections 1
2163 #define elf_backend_want_got_plt 1
2164 #define elf_backend_plt_readonly 1
2165 #define elf_backend_want_plt_sym 0
2166 #define elf_backend_got_header_size 16
2167 #define elf_backend_rela_normal 1
2168
2169 #include "elf32-target.h"
2170