1 /* VAX series support for 32-bit ELF
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3 2004, 2005, 2006 Free Software Foundation, Inc.
6 This file is part of BFD, the Binary File Descriptor library.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37 static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39 static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
43 Elf_Internal_Sym *, asection **);
44 static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
47 static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
50 static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
51 static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
52 static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
54 static reloc_howto_type howto_table[] = {
55 HOWTO (R_VAX_NONE, /* type */
57 0, /* size (0 = byte, 1 = short, 2 = long) */
59 FALSE, /* pc_relative */
61 complain_overflow_dont, /* complain_on_overflow */
62 bfd_elf_generic_reloc, /* special_function */
63 "R_VAX_NONE", /* name */
64 FALSE, /* partial_inplace */
66 0x00000000, /* dst_mask */
67 FALSE), /* pcrel_offset */
69 HOWTO (R_VAX_32, /* type */
71 2, /* size (0 = byte, 1 = short, 2 = long) */
73 FALSE, /* pc_relative */
75 complain_overflow_bitfield, /* complain_on_overflow */
76 bfd_elf_generic_reloc, /* special_function */
77 "R_VAX_32", /* name */
78 FALSE, /* partial_inplace */
80 0xffffffff, /* dst_mask */
81 FALSE), /* pcrel_offset */
83 HOWTO (R_VAX_16, /* type */
85 1, /* size (0 = byte, 1 = short, 2 = long) */
87 FALSE, /* pc_relative */
89 complain_overflow_bitfield, /* complain_on_overflow */
90 bfd_elf_generic_reloc, /* special_function */
91 "R_VAX_16", /* name */
92 FALSE, /* partial_inplace */
94 0x0000ffff, /* dst_mask */
95 FALSE), /* pcrel_offset */
97 HOWTO (R_VAX_8, /* type */
99 0, /* size (0 = byte, 1 = short, 2 = long) */
101 FALSE, /* pc_relative */
103 complain_overflow_bitfield, /* complain_on_overflow */
104 bfd_elf_generic_reloc, /* special_function */
105 "R_VAX_8", /* name */
106 FALSE, /* partial_inplace */
108 0x000000ff, /* dst_mask */
109 FALSE), /* pcrel_offset */
111 HOWTO (R_VAX_PC32, /* type */
113 2, /* size (0 = byte, 1 = short, 2 = long) */
115 TRUE, /* pc_relative */
117 complain_overflow_bitfield, /* complain_on_overflow */
118 bfd_elf_generic_reloc, /* special_function */
119 "R_VAX_PC32", /* name */
120 FALSE, /* partial_inplace */
122 0xffffffff, /* dst_mask */
123 TRUE), /* pcrel_offset */
125 HOWTO (R_VAX_PC16, /* type */
127 1, /* size (0 = byte, 1 = short, 2 = long) */
129 TRUE, /* pc_relative */
131 complain_overflow_signed, /* complain_on_overflow */
132 bfd_elf_generic_reloc, /* special_function */
133 "R_VAX_PC16", /* name */
134 FALSE, /* partial_inplace */
136 0x0000ffff, /* dst_mask */
137 TRUE), /* pcrel_offset */
139 HOWTO (R_VAX_PC8, /* type */
141 0, /* size (0 = byte, 1 = short, 2 = long) */
143 TRUE, /* pc_relative */
145 complain_overflow_signed, /* complain_on_overflow */
146 bfd_elf_generic_reloc, /* special_function */
147 "R_VAX_PC8", /* name */
148 FALSE, /* partial_inplace */
150 0x000000ff, /* dst_mask */
151 TRUE), /* pcrel_offset */
153 HOWTO (R_VAX_GOT32, /* type */
155 2, /* size (0 = byte, 1 = short, 2 = long) */
157 TRUE, /* pc_relative */
159 complain_overflow_bitfield, /* complain_on_overflow */
160 bfd_elf_generic_reloc, /* special_function */
161 "R_VAX_GOT32", /* name */
162 FALSE, /* partial_inplace */
164 0xffffffff, /* dst_mask */
165 TRUE), /* pcrel_offset */
173 HOWTO (R_VAX_PLT32, /* type */
175 2, /* size (0 = byte, 1 = short, 2 = long) */
177 TRUE, /* pc_relative */
179 complain_overflow_bitfield, /* complain_on_overflow */
180 bfd_elf_generic_reloc, /* special_function */
181 "R_VAX_PLT32", /* name */
182 FALSE, /* partial_inplace */
184 0xffffffff, /* dst_mask */
185 TRUE), /* pcrel_offset */
193 HOWTO (R_VAX_COPY, /* type */
195 0, /* size (0 = byte, 1 = short, 2 = long) */
197 FALSE, /* pc_relative */
199 complain_overflow_dont, /* complain_on_overflow */
200 bfd_elf_generic_reloc, /* special_function */
201 "R_VAX_COPY", /* name */
202 FALSE, /* partial_inplace */
204 0xffffffff, /* dst_mask */
205 FALSE), /* pcrel_offset */
207 HOWTO (R_VAX_GLOB_DAT, /* type */
209 2, /* size (0 = byte, 1 = short, 2 = long) */
211 FALSE, /* pc_relative */
213 complain_overflow_dont, /* complain_on_overflow */
214 bfd_elf_generic_reloc, /* special_function */
215 "R_VAX_GLOB_DAT", /* name */
216 FALSE, /* partial_inplace */
218 0xffffffff, /* dst_mask */
219 FALSE), /* pcrel_offset */
221 HOWTO (R_VAX_JMP_SLOT, /* type */
223 2, /* size (0 = byte, 1 = short, 2 = long) */
225 FALSE, /* pc_relative */
227 complain_overflow_dont, /* complain_on_overflow */
228 bfd_elf_generic_reloc, /* special_function */
229 "R_VAX_JMP_SLOT", /* name */
230 FALSE, /* partial_inplace */
232 0xffffffff, /* dst_mask */
233 FALSE), /* pcrel_offset */
235 HOWTO (R_VAX_RELATIVE, /* type */
237 2, /* size (0 = byte, 1 = short, 2 = long) */
239 FALSE, /* pc_relative */
241 complain_overflow_dont, /* complain_on_overflow */
242 bfd_elf_generic_reloc, /* special_function */
243 "R_VAX_RELATIVE", /* name */
244 FALSE, /* partial_inplace */
246 0xffffffff, /* dst_mask */
247 FALSE), /* pcrel_offset */
249 /* GNU extension to record C++ vtable hierarchy */
250 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 2, /* size (0 = byte, 1 = short, 2 = long) */
254 FALSE, /* pc_relative */
256 complain_overflow_dont, /* complain_on_overflow */
257 NULL, /* special_function */
258 "R_VAX_GNU_VTINHERIT", /* name */
259 FALSE, /* partial_inplace */
262 FALSE), /* pcrel_offset */
264 /* GNU extension to record C++ vtable member usage */
265 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 2, /* size (0 = byte, 1 = short, 2 = long) */
269 FALSE, /* pc_relative */
271 complain_overflow_dont, /* complain_on_overflow */
272 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
273 "R_VAX_GNU_VTENTRY", /* name */
274 FALSE, /* partial_inplace */
277 FALSE), /* pcrel_offset */
281 rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
282 Elf_Internal_Rela *dst)
284 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
285 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
288 #define elf_info_to_howto rtype_to_howto
292 bfd_reloc_code_real_type bfd_val;
295 { BFD_RELOC_NONE, R_VAX_NONE },
296 { BFD_RELOC_32, R_VAX_32 },
297 { BFD_RELOC_16, R_VAX_16 },
298 { BFD_RELOC_8, R_VAX_8 },
299 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
300 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
301 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
302 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
303 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
304 { BFD_RELOC_NONE, R_VAX_COPY },
305 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
306 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
307 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
308 { BFD_RELOC_CTOR, R_VAX_32 },
309 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
310 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
313 static reloc_howto_type *
314 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
317 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
319 if (reloc_map[i].bfd_val == code)
320 return &howto_table[reloc_map[i].elf_val];
325 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
326 #define ELF_ARCH bfd_arch_vax
327 /* end code generated by elf.el */
329 /* Functions for the VAX ELF linker. */
331 /* The name of the dynamic interpreter. This is put in the .interp
334 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
336 /* The size in bytes of an entry in the procedure linkage table. */
338 #define PLT_ENTRY_SIZE 12
340 /* The first entry in a procedure linkage table looks like this. See
341 the SVR4 ABI VAX supplement to see how this works. */
343 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
345 0xdd, 0xef, /* pushl l^ */
346 0, 0, 0, 0, /* offset to .plt.got + 4 */
347 0x17, 0xff, /* jmp @L^(pc) */
348 0, 0, 0, 0, /* offset to .plt.got + 8 */
351 /* Subsequent entries in a procedure linkage table look like this. */
353 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
355 0x40, 0x00, /* .word ^M<r6> */
356 0x16, 0xef, /* jsb L^(pc) */
357 0, 0, 0, 0, /* replaced with offset to start of .plt */
358 0, 0, 0, 0, /* index into .rela.plt */
361 /* The VAX linker needs to keep track of the number of relocs that it
362 decides to copy in check_relocs for each symbol. This is so that it
363 can discard PC relative relocs if it doesn't need them when linking
364 with -Bsymbolic. We store the information in a field extending the
365 regular ELF linker hash table. */
367 /* This structure keeps track of the number of PC relative relocs we have
368 copied for a given symbol. */
370 struct elf_vax_pcrel_relocs_copied
373 struct elf_vax_pcrel_relocs_copied *next;
374 /* A section in dynobj. */
376 /* Number of relocs copied in this section. */
380 /* VAX ELF linker hash entry. */
382 struct elf_vax_link_hash_entry
384 struct elf_link_hash_entry root;
386 /* Number of PC relative relocs copied for this symbol. */
387 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
392 /* VAX ELF linker hash table. */
394 struct elf_vax_link_hash_table
396 struct elf_link_hash_table root;
399 /* Declare this now that the above structures are defined. */
401 static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
404 /* Declare this now that the above structures are defined. */
406 static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
409 /* Traverse an VAX ELF linker hash table. */
411 #define elf_vax_link_hash_traverse(table, func, info) \
412 (elf_link_hash_traverse \
414 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
417 /* Get the VAX ELF linker hash table from a link_info structure. */
419 #define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
421 /* Create an entry in an VAX ELF linker hash table. */
423 static struct bfd_hash_entry *
424 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
425 struct bfd_hash_table *table,
428 struct elf_vax_link_hash_entry *ret =
429 (struct elf_vax_link_hash_entry *) entry;
431 /* Allocate the structure if it has not already been allocated by a
434 ret = ((struct elf_vax_link_hash_entry *)
435 bfd_hash_allocate (table,
436 sizeof (struct elf_vax_link_hash_entry)));
438 return (struct bfd_hash_entry *) ret;
440 /* Call the allocation method of the superclass. */
441 ret = ((struct elf_vax_link_hash_entry *)
442 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
446 ret->pcrel_relocs_copied = NULL;
449 return (struct bfd_hash_entry *) ret;
452 /* Create an VAX ELF linker hash table. */
454 static struct bfd_link_hash_table *
455 elf_vax_link_hash_table_create (bfd *abfd)
457 struct elf_vax_link_hash_table *ret;
458 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
460 ret = bfd_malloc (amt);
464 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
465 elf_vax_link_hash_newfunc,
466 sizeof (struct elf_vax_link_hash_entry)))
472 return &ret->root.root;
475 /* Keep vax-specific flags in the ELF header */
477 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
479 elf_elfheader (abfd)->e_flags = flags;
480 elf_flags_init (abfd) = TRUE;
484 /* Merge backend specific data from an object file to the output
485 object file when linking. */
487 elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
492 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
493 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
496 in_flags = elf_elfheader (ibfd)->e_flags;
497 out_flags = elf_elfheader (obfd)->e_flags;
499 if (!elf_flags_init (obfd))
501 elf_flags_init (obfd) = TRUE;
502 elf_elfheader (obfd)->e_flags = in_flags;
508 /* Display the flags field */
510 elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
512 FILE *file = (FILE *) ptr;
514 BFD_ASSERT (abfd != NULL && ptr != NULL);
516 /* Print normal ELF private data. */
517 _bfd_elf_print_private_bfd_data (abfd, ptr);
519 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
521 /* xgettext:c-format */
522 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
524 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
525 fprintf (file, _(" [nonpic]"));
527 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
528 fprintf (file, _(" [d-float]"));
530 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
531 fprintf (file, _(" [g-float]"));
537 /* Look through the relocs for a section during the first phase, and
538 allocate space in the global offset table or procedure linkage
542 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
543 const Elf_Internal_Rela *relocs)
546 Elf_Internal_Shdr *symtab_hdr;
547 struct elf_link_hash_entry **sym_hashes;
548 const Elf_Internal_Rela *rel;
549 const Elf_Internal_Rela *rel_end;
554 if (info->relocatable)
557 dynobj = elf_hash_table (info)->dynobj;
558 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
559 sym_hashes = elf_sym_hashes (abfd);
565 rel_end = relocs + sec->reloc_count;
566 for (rel = relocs; rel < rel_end; rel++)
568 unsigned long r_symndx;
569 struct elf_link_hash_entry *h;
571 r_symndx = ELF32_R_SYM (rel->r_info);
573 if (r_symndx < symtab_hdr->sh_info)
577 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
578 while (h->root.type == bfd_link_hash_indirect
579 || h->root.type == bfd_link_hash_warning)
580 h = (struct elf_link_hash_entry *) h->root.u.i.link;
583 switch (ELF32_R_TYPE (rel->r_info))
587 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
590 /* This symbol requires a global offset table entry. */
594 /* Create the .got section. */
595 elf_hash_table (info)->dynobj = dynobj = abfd;
596 if (!_bfd_elf_create_got_section (dynobj, info))
602 sgot = bfd_get_section_by_name (dynobj, ".got");
603 BFD_ASSERT (sgot != NULL);
607 && (h != NULL || info->shared))
609 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
612 srelgot = bfd_make_section_with_flags (dynobj,
621 || !bfd_set_section_alignment (dynobj, srelgot, 2))
628 struct elf_vax_link_hash_entry *eh;
630 eh = (struct elf_vax_link_hash_entry *) h;
631 if (h->got.refcount == -1)
634 eh->got_addend = rel->r_addend;
639 if (eh->got_addend != (bfd_vma) rel->r_addend)
640 (*_bfd_error_handler)
641 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
642 bfd_get_filename (abfd), rel->r_addend,
651 /* This symbol requires a procedure linkage table entry. We
652 actually build the entry in adjust_dynamic_symbol,
653 because this might be a case of linking PIC code which is
654 never referenced by a dynamic object, in which case we
655 don't need to generate a procedure linkage table entry
658 /* If this is a local symbol, we resolve it directly without
659 creating a procedure linkage table entry. */
664 if (h->plt.refcount == -1)
673 /* If we are creating a shared library and this is not a local
674 symbol, we need to copy the reloc into the shared library.
675 However when linking with -Bsymbolic and this is a global
676 symbol which is defined in an object we are including in the
677 link (i.e., DEF_REGULAR is set), then we can resolve the
678 reloc directly. At this point we have not seen all the input
679 files, so it is possible that DEF_REGULAR is not set now but
680 will be set later (it is never cleared). We account for that
681 possibility below by storing information in the
682 pcrel_relocs_copied field of the hash table entry. */
684 && (sec->flags & SEC_ALLOC) != 0
687 || !h->def_regular)))
691 /* Make sure a plt entry is created for this symbol if
692 it turns out to be a function defined by a dynamic
694 if (h->plt.refcount == -1)
707 /* Make sure a plt entry is created for this symbol if it
708 turns out to be a function defined by a dynamic object. */
709 if (h->plt.refcount == -1)
715 /* If we are creating a shared library, we need to copy the
716 reloc into the shared library. */
718 && (sec->flags & SEC_ALLOC) != 0)
720 /* When creating a shared object, we must copy these
721 reloc types into the output file. We create a reloc
722 section in dynobj and make room for this reloc. */
727 name = (bfd_elf_string_from_elf_section
729 elf_elfheader (abfd)->e_shstrndx,
730 elf_section_data (sec)->rel_hdr.sh_name));
734 BFD_ASSERT (CONST_STRNEQ (name, ".rela")
735 && strcmp (bfd_get_section_name (abfd, sec),
738 sreloc = bfd_get_section_by_name (dynobj, name);
741 sreloc = bfd_make_section_with_flags (dynobj,
750 || !bfd_set_section_alignment (dynobj, sreloc, 2))
753 if (sec->flags & SEC_READONLY)
754 info->flags |= DF_TEXTREL;
757 sreloc->size += sizeof (Elf32_External_Rela);
759 /* If we are linking with -Bsymbolic, we count the number of
760 PC relative relocations we have entered for this symbol,
761 so that we can discard them again if the symbol is later
762 defined by a regular object. Note that this function is
763 only called if we are using a vaxelf linker hash table,
764 which means that h is really a pointer to an
765 elf_vax_link_hash_entry. */
766 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
767 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
768 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
771 struct elf_vax_link_hash_entry *eh;
772 struct elf_vax_pcrel_relocs_copied *p;
774 eh = (struct elf_vax_link_hash_entry *) h;
776 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
777 if (p->section == sreloc)
782 p = ((struct elf_vax_pcrel_relocs_copied *)
783 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
786 p->next = eh->pcrel_relocs_copied;
787 eh->pcrel_relocs_copied = p;
798 /* This relocation describes the C++ object vtable hierarchy.
799 Reconstruct it for later use during GC. */
800 case R_VAX_GNU_VTINHERIT:
801 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
805 /* This relocation describes which C++ vtable entries are actually
806 used. Record for later use during GC. */
807 case R_VAX_GNU_VTENTRY:
808 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
820 /* Return the section that should be marked against GC for a given
824 elf_vax_gc_mark_hook (asection *sec,
825 struct bfd_link_info *info,
826 Elf_Internal_Rela *rel,
827 struct elf_link_hash_entry *h,
828 Elf_Internal_Sym *sym)
831 switch (ELF32_R_TYPE (rel->r_info))
833 case R_VAX_GNU_VTINHERIT:
834 case R_VAX_GNU_VTENTRY:
838 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
841 /* Update the got entry reference counts for the section being removed. */
844 elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
845 const Elf_Internal_Rela *relocs)
847 Elf_Internal_Shdr *symtab_hdr;
848 struct elf_link_hash_entry **sym_hashes;
849 const Elf_Internal_Rela *rel, *relend;
852 dynobj = elf_hash_table (info)->dynobj;
856 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
857 sym_hashes = elf_sym_hashes (abfd);
859 relend = relocs + sec->reloc_count;
860 for (rel = relocs; rel < relend; rel++)
862 unsigned long r_symndx;
863 struct elf_link_hash_entry *h = NULL;
865 r_symndx = ELF32_R_SYM (rel->r_info);
866 if (r_symndx >= symtab_hdr->sh_info)
868 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
869 while (h->root.type == bfd_link_hash_indirect
870 || h->root.type == bfd_link_hash_warning)
871 h = (struct elf_link_hash_entry *) h->root.u.i.link;
874 switch (ELF32_R_TYPE (rel->r_info))
877 if (h != NULL && h->got.refcount > 0)
888 if (h != NULL && h->plt.refcount > 0)
900 /* Adjust a symbol defined by a dynamic object and referenced by a
901 regular object. The current definition is in some section of the
902 dynamic object, but we're not including those sections. We have to
903 change the definition to something the rest of the link can
907 elf_vax_adjust_dynamic_symbol (info, h)
908 struct bfd_link_info *info;
909 struct elf_link_hash_entry *h;
913 unsigned int power_of_two;
915 dynobj = elf_hash_table (info)->dynobj;
917 /* Make sure we know what is going on here. */
918 BFD_ASSERT (dynobj != NULL
920 || h->u.weakdef != NULL
923 && !h->def_regular)));
925 /* If this is a function, put it in the procedure linkage table. We
926 will fill in the contents of the procedure linkage table later,
927 when we know the address of the .got section. */
928 if (h->type == STT_FUNC
934 /* We must always create the plt entry if it was referenced
935 by a PLTxxO relocation. In this case we already recorded
936 it as a dynamic symbol. */
939 /* This case can occur if we saw a PLTxx reloc in an input
940 file, but the symbol was never referred to by a dynamic
941 object. In such a case, we don't actually need to build
942 a procedure linkage table, and we can just do a PCxx
944 BFD_ASSERT (h->needs_plt);
945 h->plt.offset = (bfd_vma) -1;
949 /* GC may have rendered this entry unused. */
950 if (h->plt.refcount <= 0)
953 h->plt.offset = (bfd_vma) -1;
957 /* Make sure this symbol is output as a dynamic symbol. */
958 if (h->dynindx == -1)
960 if (! bfd_elf_link_record_dynamic_symbol (info, h))
964 s = bfd_get_section_by_name (dynobj, ".plt");
965 BFD_ASSERT (s != NULL);
967 /* If this is the first .plt entry, make room for the special
971 s->size += PLT_ENTRY_SIZE;
974 /* If this symbol is not defined in a regular file, and we are
975 not generating a shared library, then set the symbol to this
976 location in the .plt. This is required to make function
977 pointers compare as equal between the normal executable and
978 the shared library. */
982 h->root.u.def.section = s;
983 h->root.u.def.value = s->size;
986 h->plt.offset = s->size;
988 /* Make room for this entry. */
989 s->size += PLT_ENTRY_SIZE;
991 /* We also need to make an entry in the .got.plt section, which
992 will be placed in the .got section by the linker script. */
994 s = bfd_get_section_by_name (dynobj, ".got.plt");
995 BFD_ASSERT (s != NULL);
998 /* We also need to make an entry in the .rela.plt section. */
1000 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1001 BFD_ASSERT (s != NULL);
1002 s->size += sizeof (Elf32_External_Rela);
1007 /* Reinitialize the plt offset now that it is not used as a reference
1009 h->plt.offset = (bfd_vma) -1;
1011 /* If this is a weak symbol, and there is a real definition, the
1012 processor independent code will have arranged for us to see the
1013 real definition first, and we can just use the same value. */
1014 if (h->u.weakdef != NULL)
1016 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1017 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1018 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1019 h->root.u.def.value = h->u.weakdef->root.u.def.value;
1023 /* This is a reference to a symbol defined by a dynamic object which
1024 is not a function. */
1026 /* If we are creating a shared library, we must presume that the
1027 only references to the symbol are via the global offset table.
1028 For such cases we need not do anything here; the relocations will
1029 be handled correctly by relocate_section. */
1035 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1036 h->root.root.string);
1040 /* We must allocate the symbol in our .dynbss section, which will
1041 become part of the .bss section of the executable. There will be
1042 an entry for this symbol in the .dynsym section. The dynamic
1043 object will contain position independent code, so all references
1044 from the dynamic object to this symbol will go through the global
1045 offset table. The dynamic linker will use the .dynsym entry to
1046 determine the address it must put in the global offset table, so
1047 both the dynamic object and the regular object will refer to the
1048 same memory location for the variable. */
1050 s = bfd_get_section_by_name (dynobj, ".dynbss");
1051 BFD_ASSERT (s != NULL);
1053 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1054 copy the initial value out of the dynamic object and into the
1055 runtime process image. We need to remember the offset into the
1056 .rela.bss section we are going to use. */
1057 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1061 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1062 BFD_ASSERT (srel != NULL);
1063 srel->size += sizeof (Elf32_External_Rela);
1067 /* We need to figure out the alignment required for this symbol. I
1068 have no idea how ELF linkers handle this. */
1069 power_of_two = bfd_log2 (h->size);
1070 if (power_of_two > 3)
1073 /* Apply the required alignment. */
1074 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
1075 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1077 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
1081 /* Define the symbol as being at this point in the section. */
1082 h->root.u.def.section = s;
1083 h->root.u.def.value = s->size;
1085 /* Increment the section size to make room for the symbol. */
1091 /* Set the sizes of the dynamic sections. */
1094 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1100 bfd_boolean reltext;
1102 dynobj = elf_hash_table (info)->dynobj;
1103 BFD_ASSERT (dynobj != NULL);
1105 if (elf_hash_table (info)->dynamic_sections_created)
1107 /* Set the contents of the .interp section to the interpreter. */
1108 if (info->executable)
1110 s = bfd_get_section_by_name (dynobj, ".interp");
1111 BFD_ASSERT (s != NULL);
1112 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1113 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1118 /* We may have created entries in the .rela.got and .got sections.
1119 However, if we are not creating the dynamic sections, we will
1120 not actually use these entries. Reset the size of .rela.got
1121 and .got, which will cause it to get stripped from the output
1123 s = bfd_get_section_by_name (dynobj, ".rela.got");
1126 s = bfd_get_section_by_name (dynobj, ".got.plt");
1129 s = bfd_get_section_by_name (dynobj, ".got");
1134 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1135 relative relocs against symbols defined in a regular object. We
1136 allocated space for them in the check_relocs routine, but we will not
1137 fill them in in the relocate_section routine. */
1138 if (info->shared && info->symbolic)
1139 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
1140 elf_vax_discard_copies,
1143 /* If this is a -Bsymbolic shared link or a static link, we need to
1144 discard all the got entries we've recorded. Otherwise, we need to
1145 instantiate (allocate space for them). */
1146 elf_link_hash_traverse (elf_hash_table (info),
1147 elf_vax_instantiate_got_entries,
1150 /* The check_relocs and adjust_dynamic_symbol entry points have
1151 determined the sizes of the various dynamic sections. Allocate
1156 for (s = dynobj->sections; s != NULL; s = s->next)
1160 if ((s->flags & SEC_LINKER_CREATED) == 0)
1163 /* It's OK to base decisions on the section name, because none
1164 of the dynobj section names depend upon the input files. */
1165 name = bfd_get_section_name (dynobj, s);
1167 if (strcmp (name, ".plt") == 0)
1169 /* Remember whether there is a PLT. */
1172 else if (CONST_STRNEQ (name, ".rela"))
1178 /* Remember whether there are any reloc sections other
1180 if (strcmp (name, ".rela.plt") != 0)
1182 const char *outname;
1186 /* If this relocation section applies to a read only
1187 section, then we probably need a DT_TEXTREL
1188 entry. .rela.plt is actually associated with
1189 .got.plt, which is never readonly. */
1190 outname = bfd_get_section_name (output_bfd,
1192 target = bfd_get_section_by_name (output_bfd, outname + 5);
1194 && (target->flags & SEC_READONLY) != 0
1195 && (target->flags & SEC_ALLOC) != 0)
1199 /* We use the reloc_count field as a counter if we need
1200 to copy relocs into the output file. */
1204 else if (! CONST_STRNEQ (name, ".got")
1205 && strcmp (name, ".dynbss") != 0)
1207 /* It's not one of our sections, so don't allocate space. */
1213 /* If we don't need this section, strip it from the
1214 output file. This is mostly to handle .rela.bss and
1215 .rela.plt. We must create both sections in
1216 create_dynamic_sections, because they must be created
1217 before the linker maps input sections to output
1218 sections. The linker does that before
1219 adjust_dynamic_symbol is called, and it is that
1220 function which decides whether anything needs to go
1221 into these sections. */
1222 s->flags |= SEC_EXCLUDE;
1226 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1229 /* Allocate memory for the section contents. */
1230 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
1231 if (s->contents == NULL)
1235 if (elf_hash_table (info)->dynamic_sections_created)
1237 /* Add some entries to the .dynamic section. We fill in the
1238 values later, in elf_vax_finish_dynamic_sections, but we
1239 must add the entries now so that we get the correct size for
1240 the .dynamic section. The DT_DEBUG entry is filled in by the
1241 dynamic linker and used by the debugger. */
1242 #define add_dynamic_entry(TAG, VAL) \
1243 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1247 if (!add_dynamic_entry (DT_DEBUG, 0))
1253 if (!add_dynamic_entry (DT_PLTGOT, 0)
1254 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1255 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1256 || !add_dynamic_entry (DT_JMPREL, 0))
1262 if (!add_dynamic_entry (DT_RELA, 0)
1263 || !add_dynamic_entry (DT_RELASZ, 0)
1264 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1268 if (reltext || (info->flags & DF_TEXTREL) != 0)
1270 if (!add_dynamic_entry (DT_TEXTREL, 0))
1274 #undef add_dynamic_entry
1279 /* This function is called via elf_vax_link_hash_traverse if we are
1280 creating a shared object with -Bsymbolic. It discards the space
1281 allocated to copy PC relative relocs against symbols which are defined
1282 in regular objects. We allocated space for them in the check_relocs
1283 routine, but we won't fill them in in the relocate_section routine. */
1286 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1287 PTR ignore ATTRIBUTE_UNUSED)
1289 struct elf_vax_pcrel_relocs_copied *s;
1291 if (h->root.root.type == bfd_link_hash_warning)
1292 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1294 /* We only discard relocs for symbols defined in a regular object. */
1295 if (!h->root.def_regular)
1298 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1299 s->section->size -= s->count * sizeof (Elf32_External_Rela);
1304 /* This function is called via elf_link_hash_traverse. It looks for entries
1305 that have GOT or PLT (.GOT) references. If creating a static object or a
1306 shared object with -Bsymbolic, it resets the reference count back to 0
1307 and sets the offset to -1 so normal PC32 relocation will be done. If
1308 creating a shared object or executable, space in the .got and .rela.got
1309 will be reserved for the symbol. */
1312 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
1314 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1319 /* We don't care about non-GOT (and non-PLT) entries. */
1320 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1323 dynobj = elf_hash_table (info)->dynobj;
1327 sgot = bfd_get_section_by_name (dynobj, ".got");
1328 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1330 if (!elf_hash_table (info)->dynamic_sections_created
1331 || (info->shared && info->symbolic))
1333 h->got.refcount = 0;
1334 h->got.offset = (bfd_vma) -1;
1335 h->plt.refcount = 0;
1336 h->plt.offset = (bfd_vma) -1;
1338 else if (h->got.refcount > 0)
1340 /* Make sure this symbol is output as a dynamic symbol. */
1341 if (h->dynindx == -1)
1343 if (!bfd_elf_link_record_dynamic_symbol (info, h))
1347 /* Allocate space in the .got and .rela.got sections. */
1349 srelgot->size += sizeof (Elf32_External_Rela);
1355 /* Relocate an VAX ELF section. */
1358 elf_vax_relocate_section (bfd *output_bfd,
1359 struct bfd_link_info *info,
1361 asection *input_section,
1363 Elf_Internal_Rela *relocs,
1364 Elf_Internal_Sym *local_syms,
1365 asection **local_sections)
1368 Elf_Internal_Shdr *symtab_hdr;
1369 struct elf_link_hash_entry **sym_hashes;
1370 bfd_vma *local_got_offsets;
1377 Elf_Internal_Rela *rel;
1378 Elf_Internal_Rela *relend;
1380 dynobj = elf_hash_table (info)->dynobj;
1381 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1382 sym_hashes = elf_sym_hashes (input_bfd);
1383 local_got_offsets = elf_local_got_offsets (input_bfd);
1391 relend = relocs + input_section->reloc_count;
1392 for (; rel < relend; rel++)
1395 reloc_howto_type *howto;
1396 unsigned long r_symndx;
1397 struct elf_link_hash_entry *h;
1398 Elf_Internal_Sym *sym;
1401 bfd_reloc_status_type r;
1403 r_type = ELF32_R_TYPE (rel->r_info);
1404 if (r_type < 0 || r_type >= (int) R_VAX_max)
1406 bfd_set_error (bfd_error_bad_value);
1409 howto = howto_table + r_type;
1411 r_symndx = ELF32_R_SYM (rel->r_info);
1415 if (r_symndx < symtab_hdr->sh_info)
1417 sym = local_syms + r_symndx;
1418 sec = local_sections[r_symndx];
1419 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1423 bfd_boolean unresolved_reloc;
1426 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1427 r_symndx, symtab_hdr, sym_hashes,
1429 unresolved_reloc, warned);
1431 if ((h->root.type == bfd_link_hash_defined
1432 || h->root.type == bfd_link_hash_defweak)
1433 && ((r_type == R_VAX_PLT32
1434 && h->plt.offset != (bfd_vma) -1
1435 && elf_hash_table (info)->dynamic_sections_created)
1436 || (r_type == R_VAX_GOT32
1437 && strcmp (h->root.root.string,
1438 "_GLOBAL_OFFSET_TABLE_") != 0
1439 && elf_hash_table (info)->dynamic_sections_created
1441 || (! info->symbolic && h->dynindx != -1)
1442 || !h->def_regular))
1444 && ((! info->symbolic && h->dynindx != -1)
1446 && ((input_section->flags & SEC_ALLOC) != 0
1447 /* DWARF will emit R_VAX_32 relocations in its
1448 sections against symbols defined externally
1449 in shared libraries. We can't do anything
1452 || ((input_section->flags & SEC_DEBUGGING) != 0
1454 && (r_type == R_VAX_8
1455 || r_type == R_VAX_16
1456 || r_type == R_VAX_32
1457 || r_type == R_VAX_PC8
1458 || r_type == R_VAX_PC16
1459 || r_type == R_VAX_PC32))))
1460 /* In these cases, we don't need the relocation
1461 value. We check specially because in some
1462 obscure cases sec->output_section will be NULL. */
1466 if (sec != NULL && elf_discarded_section (sec))
1468 /* For relocs against symbols from removed linkonce sections,
1469 or sections discarded by a linker script, we just want the
1470 section contents zeroed. Avoid any special processing. */
1471 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1477 if (info->relocatable)
1483 /* Relocation is to the address of the entry for this symbol
1484 in the global offset table. */
1485 if (h == NULL || h->got.offset == (bfd_vma) -1)
1488 /* Relocation is the offset of the entry for this symbol in
1489 the global offset table. */
1496 sgot = bfd_get_section_by_name (dynobj, ".got");
1497 BFD_ASSERT (sgot != NULL);
1500 BFD_ASSERT (h != NULL);
1501 off = h->got.offset;
1502 BFD_ASSERT (off != (bfd_vma) -1);
1503 BFD_ASSERT (off < sgot->size);
1509 /* The symbol was forced to be local
1510 because of a version file.. We must initialize
1511 this entry in the global offset table. Since
1512 the offset must always be a multiple of 4, we
1513 use the least significant bit to record whether
1514 we have initialized it already.
1516 When doing a dynamic link, we create a .rela.got
1517 relocation entry to initialize the value. This
1518 is done in the finish_dynamic_symbol routine. */
1523 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1524 sgot->contents + off);
1528 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1531 relocation = sgot->output_offset + off;
1532 /* The GOT relocation uses the addend. */
1535 /* Change the reference to be indirect. */
1536 contents[rel->r_offset - 1] |= 0x10;
1537 relocation += sgot->output_section->vma;
1542 /* Relocation is to the entry for this symbol in the
1543 procedure linkage table. */
1545 /* Resolve a PLTxx reloc against a local symbol directly,
1546 without using the procedure linkage table. */
1550 if (h->plt.offset == (bfd_vma) -1
1551 || !elf_hash_table (info)->dynamic_sections_created)
1553 /* We didn't make a PLT entry for this symbol. This
1554 happens when statically linking PIC code, or when
1555 using -Bsymbolic. */
1561 splt = bfd_get_section_by_name (dynobj, ".plt");
1562 BFD_ASSERT (splt != NULL);
1565 if (sgotplt == NULL)
1567 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1568 BFD_ASSERT (splt != NULL);
1571 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1573 /* Get the offset into the .got table of the entry that
1574 corresponds to this function. Each .got entry is 4 bytes.
1575 The first two are reserved. */
1576 got_offset = (plt_index + 3) * 4;
1578 /* We want the relocate to point into the .got.plt instead
1579 of the plt itself. */
1580 relocation = (sgotplt->output_section->vma
1581 + sgotplt->output_offset
1583 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1584 if (rel->r_addend == 2)
1588 else if (rel->r_addend != 0)
1589 (*_bfd_error_handler)
1590 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1591 bfd_get_filename (input_bfd), rel->r_addend,
1592 h->root.root.string,
1593 bfd_get_section_name (input_bfd, input_section));
1609 && (input_section->flags & SEC_ALLOC) != 0
1610 && ((r_type != R_VAX_PC8
1611 && r_type != R_VAX_PC16
1612 && r_type != R_VAX_PC32)
1614 || !h->def_regular)))
1616 Elf_Internal_Rela outrel;
1618 bfd_boolean skip, relocate;
1620 /* When generating a shared object, these relocations
1621 are copied into the output file to be resolved at run
1627 name = (bfd_elf_string_from_elf_section
1629 elf_elfheader (input_bfd)->e_shstrndx,
1630 elf_section_data (input_section)->rel_hdr.sh_name));
1634 BFD_ASSERT (CONST_STRNEQ (name, ".rela")
1635 && strcmp (bfd_get_section_name (input_bfd,
1639 sreloc = bfd_get_section_by_name (dynobj, name);
1640 BFD_ASSERT (sreloc != NULL);
1647 _bfd_elf_section_offset (output_bfd, info, input_section,
1649 if (outrel.r_offset == (bfd_vma) -1)
1651 if (outrel.r_offset == (bfd_vma) -2)
1652 skip = TRUE, relocate = TRUE;
1653 outrel.r_offset += (input_section->output_section->vma
1654 + input_section->output_offset);
1657 memset (&outrel, 0, sizeof outrel);
1658 /* h->dynindx may be -1 if the symbol was marked to
1661 && ((! info->symbolic && h->dynindx != -1)
1662 || !h->def_regular))
1664 BFD_ASSERT (h->dynindx != -1);
1665 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1666 outrel.r_addend = relocation + rel->r_addend;
1670 if (r_type == R_VAX_32)
1673 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1674 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1675 &contents[rel->r_offset]) == 0);
1676 outrel.r_addend = relocation + rel->r_addend;
1682 if (bfd_is_abs_section (sec))
1684 else if (sec == NULL || sec->owner == NULL)
1686 bfd_set_error (bfd_error_bad_value);
1693 /* We are turning this relocation into one
1694 against a section symbol. It would be
1695 proper to subtract the symbol's value,
1696 osec->vma, from the emitted reloc addend,
1697 but ld.so expects buggy relocs. */
1698 osec = sec->output_section;
1699 indx = elf_section_data (osec)->dynindx;
1702 struct elf_link_hash_table *htab;
1703 htab = elf_hash_table (info);
1704 osec = htab->text_index_section;
1705 indx = elf_section_data (osec)->dynindx;
1707 BFD_ASSERT (indx != 0);
1710 outrel.r_info = ELF32_R_INFO (indx, r_type);
1711 outrel.r_addend = relocation + rel->r_addend;
1715 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
1718 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1719 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1720 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1721 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1722 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1725 (*_bfd_error_handler)
1726 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1727 bfd_get_filename (input_bfd), howto->name,
1728 h->root.root.string,
1729 bfd_get_section_name (input_bfd, input_section));
1731 (*_bfd_error_handler)
1732 (_("%s: warning: %s relocation to 0x%x from %s section"),
1733 bfd_get_filename (input_bfd), howto->name,
1735 bfd_get_section_name (input_bfd, input_section));
1737 loc = sreloc->contents;
1738 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1739 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1741 /* This reloc will be computed at runtime, so there's no
1742 need to do anything now, except for R_VAX_32
1743 relocations that have been turned into
1751 case R_VAX_GNU_VTINHERIT:
1752 case R_VAX_GNU_VTENTRY:
1753 /* These are no-ops in the end. */
1760 /* VAX PCREL relocations are from the end of relocation, not the start.
1761 So subtract the difference from the relocation amount since we can't
1762 add it to the offset. */
1763 if (howto->pc_relative && howto->pcrel_offset)
1764 relocation -= bfd_get_reloc_size(howto);
1766 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1767 contents, rel->r_offset,
1768 relocation, rel->r_addend);
1770 if (r != bfd_reloc_ok)
1775 case bfd_reloc_outofrange:
1777 case bfd_reloc_overflow:
1785 name = bfd_elf_string_from_elf_section (input_bfd,
1786 symtab_hdr->sh_link,
1791 name = bfd_section_name (input_bfd, sec);
1793 if (!(info->callbacks->reloc_overflow
1794 (info, (h ? &h->root : NULL), name, howto->name,
1795 (bfd_vma) 0, input_bfd, input_section,
1807 /* Finish up dynamic symbol handling. We set the contents of various
1808 dynamic sections here. */
1811 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1812 struct elf_link_hash_entry *h,
1813 Elf_Internal_Sym *sym)
1817 dynobj = elf_hash_table (info)->dynobj;
1819 if (h->plt.offset != (bfd_vma) -1)
1827 Elf_Internal_Rela rela;
1830 /* This symbol has an entry in the procedure linkage table. Set
1832 BFD_ASSERT (h->dynindx != -1);
1834 splt = bfd_get_section_by_name (dynobj, ".plt");
1835 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1836 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1837 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1839 addend = 2 * (h->plt.offset & 1);
1840 h->plt.offset &= ~1;
1842 /* Get the index in the procedure linkage table which
1843 corresponds to this symbol. This is the index of this symbol
1844 in all the symbols for which we are making plt entries. The
1845 first entry in the procedure linkage table is reserved. */
1846 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1848 /* Get the offset into the .got table of the entry that
1849 corresponds to this function. Each .got entry is 4 bytes.
1850 The first two are reserved. */
1851 got_offset = (plt_index + 3) * 4;
1853 /* Fill in the entry in the procedure linkage table. */
1854 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1857 /* The offset is relative to the first extension word. */
1858 bfd_put_32 (output_bfd,
1859 -(h->plt.offset + 8),
1860 splt->contents + h->plt.offset + 4);
1862 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1863 splt->contents + h->plt.offset + 8);
1865 /* Fill in the entry in the global offset table. */
1866 bfd_put_32 (output_bfd,
1867 (splt->output_section->vma
1868 + splt->output_offset
1869 + h->plt.offset) + addend,
1870 sgot->contents + got_offset);
1872 /* Fill in the entry in the .rela.plt section. */
1873 rela.r_offset = (sgot->output_section->vma
1874 + sgot->output_offset
1876 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1877 rela.r_addend = addend;
1878 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1879 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1881 if (!h->def_regular)
1883 /* Mark the symbol as undefined, rather than as defined in
1884 the .plt section. Leave the value alone. */
1885 sym->st_shndx = SHN_UNDEF;
1889 if (h->got.offset != (bfd_vma) -1)
1893 Elf_Internal_Rela rela;
1896 /* This symbol has an entry in the global offset table. Set it
1898 sgot = bfd_get_section_by_name (dynobj, ".got");
1899 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1900 BFD_ASSERT (sgot != NULL && srela != NULL);
1902 rela.r_offset = (sgot->output_section->vma
1903 + sgot->output_offset
1904 + (h->got.offset &~ 1));
1906 /* If the symbol was forced to be local because of a version file
1907 locally we just want to emit a RELATIVE reloc. The entry in
1908 the global offset table will already have been initialized in
1909 the relocate_section function. */
1914 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1918 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1920 rela.r_addend = bfd_get_signed_32 (output_bfd,
1922 + (h->got.offset & ~1)));
1924 loc = srela->contents;
1925 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1926 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1932 Elf_Internal_Rela rela;
1935 /* This symbol needs a copy reloc. Set it up. */
1936 BFD_ASSERT (h->dynindx != -1
1937 && (h->root.type == bfd_link_hash_defined
1938 || h->root.type == bfd_link_hash_defweak));
1940 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1942 BFD_ASSERT (s != NULL);
1944 rela.r_offset = (h->root.u.def.value
1945 + h->root.u.def.section->output_section->vma
1946 + h->root.u.def.section->output_offset);
1947 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1949 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1950 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1953 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1954 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
1955 || h == elf_hash_table (info)->hgot)
1956 sym->st_shndx = SHN_ABS;
1961 /* Finish up the dynamic sections. */
1964 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1970 dynobj = elf_hash_table (info)->dynobj;
1972 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1973 BFD_ASSERT (sgot != NULL);
1974 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1976 if (elf_hash_table (info)->dynamic_sections_created)
1979 Elf32_External_Dyn *dyncon, *dynconend;
1981 splt = bfd_get_section_by_name (dynobj, ".plt");
1982 BFD_ASSERT (splt != NULL && sdyn != NULL);
1984 dyncon = (Elf32_External_Dyn *) sdyn->contents;
1985 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1986 for (; dyncon < dynconend; dyncon++)
1988 Elf_Internal_Dyn dyn;
1992 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2005 s = bfd_get_section_by_name (output_bfd, name);
2006 BFD_ASSERT (s != NULL);
2007 dyn.d_un.d_ptr = s->vma;
2008 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2012 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2013 BFD_ASSERT (s != NULL);
2014 dyn.d_un.d_val = s->size;
2015 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2019 /* The procedure linkage table relocs (DT_JMPREL) should
2020 not be included in the overall relocs (DT_RELA).
2021 Therefore, we override the DT_RELASZ entry here to
2022 make it not include the JMPREL relocs. Since the
2023 linker script arranges for .rela.plt to follow all
2024 other relocation sections, we don't have to worry
2025 about changing the DT_RELA entry. */
2026 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2028 dyn.d_un.d_val -= s->size;
2029 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2034 /* Fill in the first entry in the procedure linkage table. */
2037 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2038 bfd_put_32 (output_bfd,
2039 (sgot->output_section->vma
2040 + sgot->output_offset + 4
2041 - (splt->output_section->vma + 6)),
2042 splt->contents + 2);
2043 bfd_put_32 (output_bfd,
2044 (sgot->output_section->vma
2045 + sgot->output_offset + 8
2046 - (splt->output_section->vma + 12)),
2047 splt->contents + 8);
2048 elf_section_data (splt->output_section)->this_hdr.sh_entsize
2053 /* Fill in the first three entries in the global offset table. */
2057 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2059 bfd_put_32 (output_bfd,
2060 sdyn->output_section->vma + sdyn->output_offset,
2062 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2063 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2066 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2071 #define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2072 #define TARGET_LITTLE_NAME "elf32-vax"
2073 #define ELF_MACHINE_CODE EM_VAX
2074 #define ELF_MAXPAGESIZE 0x1000
2076 #define elf_backend_create_dynamic_sections \
2077 _bfd_elf_create_dynamic_sections
2078 #define bfd_elf32_bfd_link_hash_table_create \
2079 elf_vax_link_hash_table_create
2080 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
2082 #define elf_backend_check_relocs elf_vax_check_relocs
2083 #define elf_backend_adjust_dynamic_symbol \
2084 elf_vax_adjust_dynamic_symbol
2085 #define elf_backend_size_dynamic_sections \
2086 elf_vax_size_dynamic_sections
2087 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
2088 #define elf_backend_relocate_section elf_vax_relocate_section
2089 #define elf_backend_finish_dynamic_symbol \
2090 elf_vax_finish_dynamic_symbol
2091 #define elf_backend_finish_dynamic_sections \
2092 elf_vax_finish_dynamic_sections
2093 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2094 #define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2095 #define bfd_elf32_bfd_merge_private_bfd_data \
2096 elf32_vax_merge_private_bfd_data
2097 #define bfd_elf32_bfd_set_private_flags \
2098 elf32_vax_set_private_flags
2099 #define bfd_elf32_bfd_print_private_bfd_data \
2100 elf32_vax_print_private_bfd_data
2102 #define elf_backend_can_gc_sections 1
2103 #define elf_backend_want_got_plt 1
2104 #define elf_backend_plt_readonly 1
2105 #define elf_backend_want_plt_sym 0
2106 #define elf_backend_got_header_size 16
2107 #define elf_backend_rela_normal 1
2109 #include "elf32-target.h"