1 /* VAX series support for 32-bit ELF
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3 2004, 2005, 2006, 2007 Free Software Foundation, Inc.
4 Contributed by Matt Thomas <matt@3am-software.com>.
6 This file is part of BFD, the Binary File Descriptor library.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
30 static reloc_howto_type
*reloc_type_lookup (bfd
*, bfd_reloc_code_real_type
);
31 static void rtype_to_howto (bfd
*, arelent
*, Elf_Internal_Rela
*);
32 static struct bfd_hash_entry
*elf_vax_link_hash_newfunc (struct bfd_hash_entry
*,
33 struct bfd_hash_table
*,
35 static struct bfd_link_hash_table
*elf_vax_link_hash_table_create (bfd
*);
36 static bfd_boolean
elf_vax_check_relocs (bfd
*, struct bfd_link_info
*,
37 asection
*, const Elf_Internal_Rela
*);
38 static bfd_boolean
elf_vax_adjust_dynamic_symbol (struct bfd_link_info
*,
39 struct elf_link_hash_entry
*);
40 static bfd_boolean
elf_vax_size_dynamic_sections (bfd
*, struct bfd_link_info
*);
41 static bfd_boolean
elf_vax_relocate_section (bfd
*, struct bfd_link_info
*,
42 bfd
*, asection
*, bfd_byte
*,
44 Elf_Internal_Sym
*, asection
**);
45 static bfd_boolean
elf_vax_finish_dynamic_symbol (bfd
*, struct bfd_link_info
*,
46 struct elf_link_hash_entry
*,
48 static bfd_boolean
elf_vax_finish_dynamic_sections (bfd
*,
49 struct bfd_link_info
*);
51 static bfd_boolean
elf32_vax_set_private_flags (bfd
*, flagword
);
52 static bfd_boolean
elf32_vax_merge_private_bfd_data (bfd
*, bfd
*);
53 static bfd_boolean
elf32_vax_print_private_bfd_data (bfd
*, PTR
);
55 static reloc_howto_type howto_table
[] = {
56 HOWTO (R_VAX_NONE
, /* type */
58 0, /* size (0 = byte, 1 = short, 2 = long) */
60 FALSE
, /* pc_relative */
62 complain_overflow_dont
, /* complain_on_overflow */
63 bfd_elf_generic_reloc
, /* special_function */
64 "R_VAX_NONE", /* name */
65 FALSE
, /* partial_inplace */
67 0x00000000, /* dst_mask */
68 FALSE
), /* pcrel_offset */
70 HOWTO (R_VAX_32
, /* type */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
74 FALSE
, /* pc_relative */
76 complain_overflow_bitfield
, /* complain_on_overflow */
77 bfd_elf_generic_reloc
, /* special_function */
78 "R_VAX_32", /* name */
79 FALSE
, /* partial_inplace */
81 0xffffffff, /* dst_mask */
82 FALSE
), /* pcrel_offset */
84 HOWTO (R_VAX_16
, /* type */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
88 FALSE
, /* pc_relative */
90 complain_overflow_bitfield
, /* complain_on_overflow */
91 bfd_elf_generic_reloc
, /* special_function */
92 "R_VAX_16", /* name */
93 FALSE
, /* partial_inplace */
95 0x0000ffff, /* dst_mask */
96 FALSE
), /* pcrel_offset */
98 HOWTO (R_VAX_8
, /* type */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
102 FALSE
, /* pc_relative */
104 complain_overflow_bitfield
, /* complain_on_overflow */
105 bfd_elf_generic_reloc
, /* special_function */
106 "R_VAX_8", /* name */
107 FALSE
, /* partial_inplace */
109 0x000000ff, /* dst_mask */
110 FALSE
), /* pcrel_offset */
112 HOWTO (R_VAX_PC32
, /* type */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
116 TRUE
, /* pc_relative */
118 complain_overflow_bitfield
, /* complain_on_overflow */
119 bfd_elf_generic_reloc
, /* special_function */
120 "R_VAX_PC32", /* name */
121 FALSE
, /* partial_inplace */
123 0xffffffff, /* dst_mask */
124 TRUE
), /* pcrel_offset */
126 HOWTO (R_VAX_PC16
, /* type */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
130 TRUE
, /* pc_relative */
132 complain_overflow_signed
, /* complain_on_overflow */
133 bfd_elf_generic_reloc
, /* special_function */
134 "R_VAX_PC16", /* name */
135 FALSE
, /* partial_inplace */
137 0x0000ffff, /* dst_mask */
138 TRUE
), /* pcrel_offset */
140 HOWTO (R_VAX_PC8
, /* type */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
144 TRUE
, /* pc_relative */
146 complain_overflow_signed
, /* complain_on_overflow */
147 bfd_elf_generic_reloc
, /* special_function */
148 "R_VAX_PC8", /* name */
149 FALSE
, /* partial_inplace */
151 0x000000ff, /* dst_mask */
152 TRUE
), /* pcrel_offset */
154 HOWTO (R_VAX_GOT32
, /* type */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
158 TRUE
, /* pc_relative */
160 complain_overflow_bitfield
, /* complain_on_overflow */
161 bfd_elf_generic_reloc
, /* special_function */
162 "R_VAX_GOT32", /* name */
163 FALSE
, /* partial_inplace */
165 0xffffffff, /* dst_mask */
166 TRUE
), /* pcrel_offset */
174 HOWTO (R_VAX_PLT32
, /* type */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
178 TRUE
, /* pc_relative */
180 complain_overflow_bitfield
, /* complain_on_overflow */
181 bfd_elf_generic_reloc
, /* special_function */
182 "R_VAX_PLT32", /* name */
183 FALSE
, /* partial_inplace */
185 0xffffffff, /* dst_mask */
186 TRUE
), /* pcrel_offset */
194 HOWTO (R_VAX_COPY
, /* type */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
198 FALSE
, /* pc_relative */
200 complain_overflow_dont
, /* complain_on_overflow */
201 bfd_elf_generic_reloc
, /* special_function */
202 "R_VAX_COPY", /* name */
203 FALSE
, /* partial_inplace */
205 0xffffffff, /* dst_mask */
206 FALSE
), /* pcrel_offset */
208 HOWTO (R_VAX_GLOB_DAT
, /* type */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
212 FALSE
, /* pc_relative */
214 complain_overflow_dont
, /* complain_on_overflow */
215 bfd_elf_generic_reloc
, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
217 FALSE
, /* partial_inplace */
219 0xffffffff, /* dst_mask */
220 FALSE
), /* pcrel_offset */
222 HOWTO (R_VAX_JMP_SLOT
, /* type */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
226 FALSE
, /* pc_relative */
228 complain_overflow_dont
, /* complain_on_overflow */
229 bfd_elf_generic_reloc
, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
231 FALSE
, /* partial_inplace */
233 0xffffffff, /* dst_mask */
234 FALSE
), /* pcrel_offset */
236 HOWTO (R_VAX_RELATIVE
, /* type */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
240 FALSE
, /* pc_relative */
242 complain_overflow_dont
, /* complain_on_overflow */
243 bfd_elf_generic_reloc
, /* special_function */
244 "R_VAX_RELATIVE", /* name */
245 FALSE
, /* partial_inplace */
247 0xffffffff, /* dst_mask */
248 FALSE
), /* pcrel_offset */
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT
, /* type */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
255 FALSE
, /* pc_relative */
257 complain_overflow_dont
, /* complain_on_overflow */
258 NULL
, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
260 FALSE
, /* partial_inplace */
263 FALSE
), /* pcrel_offset */
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY
, /* type */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
270 FALSE
, /* pc_relative */
272 complain_overflow_dont
, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn
, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
275 FALSE
, /* partial_inplace */
278 FALSE
), /* pcrel_offset */
282 rtype_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
, arelent
*cache_ptr
,
283 Elf_Internal_Rela
*dst
)
285 BFD_ASSERT (ELF32_R_TYPE(dst
->r_info
) < (unsigned int) R_VAX_max
);
286 cache_ptr
->howto
= &howto_table
[ELF32_R_TYPE(dst
->r_info
)];
289 #define elf_info_to_howto rtype_to_howto
293 bfd_reloc_code_real_type bfd_val
;
296 { BFD_RELOC_NONE
, R_VAX_NONE
},
297 { BFD_RELOC_32
, R_VAX_32
},
298 { BFD_RELOC_16
, R_VAX_16
},
299 { BFD_RELOC_8
, R_VAX_8
},
300 { BFD_RELOC_32_PCREL
, R_VAX_PC32
},
301 { BFD_RELOC_16_PCREL
, R_VAX_PC16
},
302 { BFD_RELOC_8_PCREL
, R_VAX_PC8
},
303 { BFD_RELOC_32_GOT_PCREL
, R_VAX_GOT32
},
304 { BFD_RELOC_32_PLT_PCREL
, R_VAX_PLT32
},
305 { BFD_RELOC_NONE
, R_VAX_COPY
},
306 { BFD_RELOC_VAX_GLOB_DAT
, R_VAX_GLOB_DAT
},
307 { BFD_RELOC_VAX_JMP_SLOT
, R_VAX_JMP_SLOT
},
308 { BFD_RELOC_VAX_RELATIVE
, R_VAX_RELATIVE
},
309 { BFD_RELOC_CTOR
, R_VAX_32
},
310 { BFD_RELOC_VTABLE_INHERIT
, R_VAX_GNU_VTINHERIT
},
311 { BFD_RELOC_VTABLE_ENTRY
, R_VAX_GNU_VTENTRY
},
314 static reloc_howto_type
*
315 reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
, bfd_reloc_code_real_type code
)
318 for (i
= 0; i
< sizeof (reloc_map
) / sizeof (reloc_map
[0]); i
++)
320 if (reloc_map
[i
].bfd_val
== code
)
321 return &howto_table
[reloc_map
[i
].elf_val
];
326 static reloc_howto_type
*
327 reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
332 for (i
= 0; i
< sizeof (howto_table
) / sizeof (howto_table
[0]); i
++)
333 if (howto_table
[i
].name
!= NULL
334 && strcasecmp (howto_table
[i
].name
, r_name
) == 0)
335 return &howto_table
[i
];
340 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
341 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
342 #define ELF_ARCH bfd_arch_vax
343 /* end code generated by elf.el */
345 /* Functions for the VAX ELF linker. */
347 /* The name of the dynamic interpreter. This is put in the .interp
350 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
352 /* The size in bytes of an entry in the procedure linkage table. */
354 #define PLT_ENTRY_SIZE 12
356 /* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
359 static const bfd_byte elf_vax_plt0_entry
[PLT_ENTRY_SIZE
] =
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
367 /* Subsequent entries in a procedure linkage table look like this. */
369 static const bfd_byte elf_vax_plt_entry
[PLT_ENTRY_SIZE
] =
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
377 /* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
383 /* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
386 struct elf_vax_pcrel_relocs_copied
389 struct elf_vax_pcrel_relocs_copied
*next
;
390 /* A section in dynobj. */
392 /* Number of relocs copied in this section. */
396 /* VAX ELF linker hash entry. */
398 struct elf_vax_link_hash_entry
400 struct elf_link_hash_entry root
;
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied
*pcrel_relocs_copied
;
408 /* VAX ELF linker hash table. */
410 struct elf_vax_link_hash_table
412 struct elf_link_hash_table root
;
415 /* Declare this now that the above structures are defined. */
417 static bfd_boolean
elf_vax_discard_copies (struct elf_vax_link_hash_entry
*,
420 /* Declare this now that the above structures are defined. */
422 static bfd_boolean
elf_vax_instantiate_got_entries (struct elf_link_hash_entry
*,
425 /* Traverse an VAX ELF linker hash table. */
427 #define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
430 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
433 /* Get the VAX ELF linker hash table from a link_info structure. */
435 #define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
437 /* Create an entry in an VAX ELF linker hash table. */
439 static struct bfd_hash_entry
*
440 elf_vax_link_hash_newfunc (struct bfd_hash_entry
*entry
,
441 struct bfd_hash_table
*table
,
444 struct elf_vax_link_hash_entry
*ret
=
445 (struct elf_vax_link_hash_entry
*) entry
;
447 /* Allocate the structure if it has not already been allocated by a
450 ret
= ((struct elf_vax_link_hash_entry
*)
451 bfd_hash_allocate (table
,
452 sizeof (struct elf_vax_link_hash_entry
)));
454 return (struct bfd_hash_entry
*) ret
;
456 /* Call the allocation method of the superclass. */
457 ret
= ((struct elf_vax_link_hash_entry
*)
458 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry
*) ret
,
462 ret
->pcrel_relocs_copied
= NULL
;
465 return (struct bfd_hash_entry
*) ret
;
468 /* Create an VAX ELF linker hash table. */
470 static struct bfd_link_hash_table
*
471 elf_vax_link_hash_table_create (bfd
*abfd
)
473 struct elf_vax_link_hash_table
*ret
;
474 bfd_size_type amt
= sizeof (struct elf_vax_link_hash_table
);
476 ret
= bfd_malloc (amt
);
480 if (!_bfd_elf_link_hash_table_init (&ret
->root
, abfd
,
481 elf_vax_link_hash_newfunc
,
482 sizeof (struct elf_vax_link_hash_entry
)))
488 return &ret
->root
.root
;
491 /* Keep vax-specific flags in the ELF header */
493 elf32_vax_set_private_flags (bfd
*abfd
, flagword flags
)
495 elf_elfheader (abfd
)->e_flags
= flags
;
496 elf_flags_init (abfd
) = TRUE
;
500 /* Merge backend specific data from an object file to the output
501 object file when linking. */
503 elf32_vax_merge_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
508 if ( bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
512 in_flags
= elf_elfheader (ibfd
)->e_flags
;
513 out_flags
= elf_elfheader (obfd
)->e_flags
;
515 if (!elf_flags_init (obfd
))
517 elf_flags_init (obfd
) = TRUE
;
518 elf_elfheader (obfd
)->e_flags
= in_flags
;
524 /* Display the flags field */
526 elf32_vax_print_private_bfd_data (bfd
*abfd
, PTR ptr
)
528 FILE *file
= (FILE *) ptr
;
530 BFD_ASSERT (abfd
!= NULL
&& ptr
!= NULL
);
532 /* Print normal ELF private data. */
533 _bfd_elf_print_private_bfd_data (abfd
, ptr
);
535 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
537 /* xgettext:c-format */
538 fprintf (file
, _("private flags = %lx:"), elf_elfheader (abfd
)->e_flags
);
540 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_NONPIC
)
541 fprintf (file
, _(" [nonpic]"));
543 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_DFLOAT
)
544 fprintf (file
, _(" [d-float]"));
546 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_GFLOAT
)
547 fprintf (file
, _(" [g-float]"));
553 /* Look through the relocs for a section during the first phase, and
554 allocate space in the global offset table or procedure linkage
558 elf_vax_check_relocs (bfd
*abfd
, struct bfd_link_info
*info
, asection
*sec
,
559 const Elf_Internal_Rela
*relocs
)
562 Elf_Internal_Shdr
*symtab_hdr
;
563 struct elf_link_hash_entry
**sym_hashes
;
564 const Elf_Internal_Rela
*rel
;
565 const Elf_Internal_Rela
*rel_end
;
570 if (info
->relocatable
)
573 dynobj
= elf_hash_table (info
)->dynobj
;
574 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
575 sym_hashes
= elf_sym_hashes (abfd
);
581 rel_end
= relocs
+ sec
->reloc_count
;
582 for (rel
= relocs
; rel
< rel_end
; rel
++)
584 unsigned long r_symndx
;
585 struct elf_link_hash_entry
*h
;
587 r_symndx
= ELF32_R_SYM (rel
->r_info
);
589 if (r_symndx
< symtab_hdr
->sh_info
)
593 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
594 while (h
->root
.type
== bfd_link_hash_indirect
595 || h
->root
.type
== bfd_link_hash_warning
)
596 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
599 switch (ELF32_R_TYPE (rel
->r_info
))
603 && strcmp (h
->root
.root
.string
, "_GLOBAL_OFFSET_TABLE_") == 0)
606 /* This symbol requires a global offset table entry. */
610 /* Create the .got section. */
611 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
612 if (!_bfd_elf_create_got_section (dynobj
, info
))
618 sgot
= bfd_get_section_by_name (dynobj
, ".got");
619 BFD_ASSERT (sgot
!= NULL
);
623 && (h
!= NULL
|| info
->shared
))
625 srelgot
= bfd_get_section_by_name (dynobj
, ".rela.got");
628 srelgot
= bfd_make_section_with_flags (dynobj
,
637 || !bfd_set_section_alignment (dynobj
, srelgot
, 2))
644 struct elf_vax_link_hash_entry
*eh
;
646 eh
= (struct elf_vax_link_hash_entry
*) h
;
647 if (h
->got
.refcount
== -1)
650 eh
->got_addend
= rel
->r_addend
;
655 if (eh
->got_addend
!= (bfd_vma
) rel
->r_addend
)
656 (*_bfd_error_handler
)
657 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
658 bfd_get_filename (abfd
), rel
->r_addend
,
667 /* This symbol requires a procedure linkage table entry. We
668 actually build the entry in adjust_dynamic_symbol,
669 because this might be a case of linking PIC code which is
670 never referenced by a dynamic object, in which case we
671 don't need to generate a procedure linkage table entry
674 /* If this is a local symbol, we resolve it directly without
675 creating a procedure linkage table entry. */
680 if (h
->plt
.refcount
== -1)
689 /* If we are creating a shared library and this is not a local
690 symbol, we need to copy the reloc into the shared library.
691 However when linking with -Bsymbolic and this is a global
692 symbol which is defined in an object we are including in the
693 link (i.e., DEF_REGULAR is set), then we can resolve the
694 reloc directly. At this point we have not seen all the input
695 files, so it is possible that DEF_REGULAR is not set now but
696 will be set later (it is never cleared). We account for that
697 possibility below by storing information in the
698 pcrel_relocs_copied field of the hash table entry. */
700 && (sec
->flags
& SEC_ALLOC
) != 0
703 || !h
->def_regular
)))
707 /* Make sure a plt entry is created for this symbol if
708 it turns out to be a function defined by a dynamic
710 if (h
->plt
.refcount
== -1)
723 /* Make sure a plt entry is created for this symbol if it
724 turns out to be a function defined by a dynamic object. */
725 if (h
->plt
.refcount
== -1)
731 /* If we are creating a shared library, we need to copy the
732 reloc into the shared library. */
734 && (sec
->flags
& SEC_ALLOC
) != 0)
736 /* When creating a shared object, we must copy these
737 reloc types into the output file. We create a reloc
738 section in dynobj and make room for this reloc. */
743 name
= (bfd_elf_string_from_elf_section
745 elf_elfheader (abfd
)->e_shstrndx
,
746 elf_section_data (sec
)->rel_hdr
.sh_name
));
750 BFD_ASSERT (CONST_STRNEQ (name
, ".rela")
751 && strcmp (bfd_get_section_name (abfd
, sec
),
754 sreloc
= bfd_get_section_by_name (dynobj
, name
);
757 sreloc
= bfd_make_section_with_flags (dynobj
,
766 || !bfd_set_section_alignment (dynobj
, sreloc
, 2))
769 if (sec
->flags
& SEC_READONLY
)
770 info
->flags
|= DF_TEXTREL
;
773 sreloc
->size
+= sizeof (Elf32_External_Rela
);
775 /* If we are linking with -Bsymbolic, we count the number of
776 PC relative relocations we have entered for this symbol,
777 so that we can discard them again if the symbol is later
778 defined by a regular object. Note that this function is
779 only called if we are using a vaxelf linker hash table,
780 which means that h is really a pointer to an
781 elf_vax_link_hash_entry. */
782 if ((ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC8
783 || ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC16
784 || ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC32
)
787 struct elf_vax_link_hash_entry
*eh
;
788 struct elf_vax_pcrel_relocs_copied
*p
;
790 eh
= (struct elf_vax_link_hash_entry
*) h
;
792 for (p
= eh
->pcrel_relocs_copied
; p
!= NULL
; p
= p
->next
)
793 if (p
->section
== sreloc
)
798 p
= ((struct elf_vax_pcrel_relocs_copied
*)
799 bfd_alloc (dynobj
, (bfd_size_type
) sizeof *p
));
802 p
->next
= eh
->pcrel_relocs_copied
;
803 eh
->pcrel_relocs_copied
= p
;
814 /* This relocation describes the C++ object vtable hierarchy.
815 Reconstruct it for later use during GC. */
816 case R_VAX_GNU_VTINHERIT
:
817 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
821 /* This relocation describes which C++ vtable entries are actually
822 used. Record for later use during GC. */
823 case R_VAX_GNU_VTENTRY
:
824 BFD_ASSERT (h
!= NULL
);
826 && !bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
838 /* Return the section that should be marked against GC for a given
842 elf_vax_gc_mark_hook (asection
*sec
,
843 struct bfd_link_info
*info
,
844 Elf_Internal_Rela
*rel
,
845 struct elf_link_hash_entry
*h
,
846 Elf_Internal_Sym
*sym
)
849 switch (ELF32_R_TYPE (rel
->r_info
))
851 case R_VAX_GNU_VTINHERIT
:
852 case R_VAX_GNU_VTENTRY
:
856 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
859 /* Update the got entry reference counts for the section being removed. */
862 elf_vax_gc_sweep_hook (bfd
*abfd
, struct bfd_link_info
*info
, asection
*sec
,
863 const Elf_Internal_Rela
*relocs
)
865 Elf_Internal_Shdr
*symtab_hdr
;
866 struct elf_link_hash_entry
**sym_hashes
;
867 const Elf_Internal_Rela
*rel
, *relend
;
870 dynobj
= elf_hash_table (info
)->dynobj
;
874 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
875 sym_hashes
= elf_sym_hashes (abfd
);
877 relend
= relocs
+ sec
->reloc_count
;
878 for (rel
= relocs
; rel
< relend
; rel
++)
880 unsigned long r_symndx
;
881 struct elf_link_hash_entry
*h
= NULL
;
883 r_symndx
= ELF32_R_SYM (rel
->r_info
);
884 if (r_symndx
>= symtab_hdr
->sh_info
)
886 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
887 while (h
->root
.type
== bfd_link_hash_indirect
888 || h
->root
.type
== bfd_link_hash_warning
)
889 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
892 switch (ELF32_R_TYPE (rel
->r_info
))
895 if (h
!= NULL
&& h
->got
.refcount
> 0)
906 if (h
!= NULL
&& h
->plt
.refcount
> 0)
918 /* Adjust a symbol defined by a dynamic object and referenced by a
919 regular object. The current definition is in some section of the
920 dynamic object, but we're not including those sections. We have to
921 change the definition to something the rest of the link can
925 elf_vax_adjust_dynamic_symbol (info
, h
)
926 struct bfd_link_info
*info
;
927 struct elf_link_hash_entry
*h
;
932 dynobj
= elf_hash_table (info
)->dynobj
;
934 /* Make sure we know what is going on here. */
935 BFD_ASSERT (dynobj
!= NULL
937 || h
->u
.weakdef
!= NULL
940 && !h
->def_regular
)));
942 /* If this is a function, put it in the procedure linkage table. We
943 will fill in the contents of the procedure linkage table later,
944 when we know the address of the .got section. */
945 if (h
->type
== STT_FUNC
951 /* We must always create the plt entry if it was referenced
952 by a PLTxxO relocation. In this case we already recorded
953 it as a dynamic symbol. */
956 /* This case can occur if we saw a PLTxx reloc in an input
957 file, but the symbol was never referred to by a dynamic
958 object. In such a case, we don't actually need to build
959 a procedure linkage table, and we can just do a PCxx
961 BFD_ASSERT (h
->needs_plt
);
962 h
->plt
.offset
= (bfd_vma
) -1;
966 /* GC may have rendered this entry unused. */
967 if (h
->plt
.refcount
<= 0)
970 h
->plt
.offset
= (bfd_vma
) -1;
974 /* Make sure this symbol is output as a dynamic symbol. */
975 if (h
->dynindx
== -1)
977 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
981 s
= bfd_get_section_by_name (dynobj
, ".plt");
982 BFD_ASSERT (s
!= NULL
);
984 /* If this is the first .plt entry, make room for the special
988 s
->size
+= PLT_ENTRY_SIZE
;
991 /* If this symbol is not defined in a regular file, and we are
992 not generating a shared library, then set the symbol to this
993 location in the .plt. This is required to make function
994 pointers compare as equal between the normal executable and
995 the shared library. */
999 h
->root
.u
.def
.section
= s
;
1000 h
->root
.u
.def
.value
= s
->size
;
1003 h
->plt
.offset
= s
->size
;
1005 /* Make room for this entry. */
1006 s
->size
+= PLT_ENTRY_SIZE
;
1008 /* We also need to make an entry in the .got.plt section, which
1009 will be placed in the .got section by the linker script. */
1011 s
= bfd_get_section_by_name (dynobj
, ".got.plt");
1012 BFD_ASSERT (s
!= NULL
);
1015 /* We also need to make an entry in the .rela.plt section. */
1017 s
= bfd_get_section_by_name (dynobj
, ".rela.plt");
1018 BFD_ASSERT (s
!= NULL
);
1019 s
->size
+= sizeof (Elf32_External_Rela
);
1024 /* Reinitialize the plt offset now that it is not used as a reference
1026 h
->plt
.offset
= (bfd_vma
) -1;
1028 /* If this is a weak symbol, and there is a real definition, the
1029 processor independent code will have arranged for us to see the
1030 real definition first, and we can just use the same value. */
1031 if (h
->u
.weakdef
!= NULL
)
1033 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
1034 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
1035 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
1036 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
1040 /* This is a reference to a symbol defined by a dynamic object which
1041 is not a function. */
1043 /* If we are creating a shared library, we must presume that the
1044 only references to the symbol are via the global offset table.
1045 For such cases we need not do anything here; the relocations will
1046 be handled correctly by relocate_section. */
1052 (*_bfd_error_handler
) (_("dynamic variable `%s' is zero size"),
1053 h
->root
.root
.string
);
1057 /* We must allocate the symbol in our .dynbss section, which will
1058 become part of the .bss section of the executable. There will be
1059 an entry for this symbol in the .dynsym section. The dynamic
1060 object will contain position independent code, so all references
1061 from the dynamic object to this symbol will go through the global
1062 offset table. The dynamic linker will use the .dynsym entry to
1063 determine the address it must put in the global offset table, so
1064 both the dynamic object and the regular object will refer to the
1065 same memory location for the variable. */
1067 s
= bfd_get_section_by_name (dynobj
, ".dynbss");
1068 BFD_ASSERT (s
!= NULL
);
1070 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1071 copy the initial value out of the dynamic object and into the
1072 runtime process image. We need to remember the offset into the
1073 .rela.bss section we are going to use. */
1074 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0)
1078 srel
= bfd_get_section_by_name (dynobj
, ".rela.bss");
1079 BFD_ASSERT (srel
!= NULL
);
1080 srel
->size
+= sizeof (Elf32_External_Rela
);
1084 return _bfd_elf_adjust_dynamic_copy (h
, s
);
1087 /* Set the sizes of the dynamic sections. */
1090 elf_vax_size_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
1096 bfd_boolean reltext
;
1098 dynobj
= elf_hash_table (info
)->dynobj
;
1099 BFD_ASSERT (dynobj
!= NULL
);
1101 if (elf_hash_table (info
)->dynamic_sections_created
)
1103 /* Set the contents of the .interp section to the interpreter. */
1104 if (info
->executable
)
1106 s
= bfd_get_section_by_name (dynobj
, ".interp");
1107 BFD_ASSERT (s
!= NULL
);
1108 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
1109 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
1114 /* We may have created entries in the .rela.got and .got sections.
1115 However, if we are not creating the dynamic sections, we will
1116 not actually use these entries. Reset the size of .rela.got
1117 and .got, which will cause it to get stripped from the output
1119 s
= bfd_get_section_by_name (dynobj
, ".rela.got");
1122 s
= bfd_get_section_by_name (dynobj
, ".got.plt");
1125 s
= bfd_get_section_by_name (dynobj
, ".got");
1130 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1131 relative relocs against symbols defined in a regular object. We
1132 allocated space for them in the check_relocs routine, but we will not
1133 fill them in in the relocate_section routine. */
1134 if (info
->shared
&& info
->symbolic
)
1135 elf_vax_link_hash_traverse (elf_vax_hash_table (info
),
1136 elf_vax_discard_copies
,
1139 /* If this is a -Bsymbolic shared link or a static link, we need to
1140 discard all the got entries we've recorded. Otherwise, we need to
1141 instantiate (allocate space for them). */
1142 elf_link_hash_traverse (elf_hash_table (info
),
1143 elf_vax_instantiate_got_entries
,
1146 /* The check_relocs and adjust_dynamic_symbol entry points have
1147 determined the sizes of the various dynamic sections. Allocate
1152 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
1156 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
1159 /* It's OK to base decisions on the section name, because none
1160 of the dynobj section names depend upon the input files. */
1161 name
= bfd_get_section_name (dynobj
, s
);
1163 if (strcmp (name
, ".plt") == 0)
1165 /* Remember whether there is a PLT. */
1168 else if (CONST_STRNEQ (name
, ".rela"))
1174 /* Remember whether there are any reloc sections other
1176 if (strcmp (name
, ".rela.plt") != 0)
1178 const char *outname
;
1182 /* If this relocation section applies to a read only
1183 section, then we probably need a DT_TEXTREL
1184 entry. .rela.plt is actually associated with
1185 .got.plt, which is never readonly. */
1186 outname
= bfd_get_section_name (output_bfd
,
1188 target
= bfd_get_section_by_name (output_bfd
, outname
+ 5);
1190 && (target
->flags
& SEC_READONLY
) != 0
1191 && (target
->flags
& SEC_ALLOC
) != 0)
1195 /* We use the reloc_count field as a counter if we need
1196 to copy relocs into the output file. */
1200 else if (! CONST_STRNEQ (name
, ".got")
1201 && strcmp (name
, ".dynbss") != 0)
1203 /* It's not one of our sections, so don't allocate space. */
1209 /* If we don't need this section, strip it from the
1210 output file. This is mostly to handle .rela.bss and
1211 .rela.plt. We must create both sections in
1212 create_dynamic_sections, because they must be created
1213 before the linker maps input sections to output
1214 sections. The linker does that before
1215 adjust_dynamic_symbol is called, and it is that
1216 function which decides whether anything needs to go
1217 into these sections. */
1218 s
->flags
|= SEC_EXCLUDE
;
1222 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
1225 /* Allocate memory for the section contents. */
1226 s
->contents
= (bfd_byte
*) bfd_alloc (dynobj
, s
->size
);
1227 if (s
->contents
== NULL
)
1231 if (elf_hash_table (info
)->dynamic_sections_created
)
1233 /* Add some entries to the .dynamic section. We fill in the
1234 values later, in elf_vax_finish_dynamic_sections, but we
1235 must add the entries now so that we get the correct size for
1236 the .dynamic section. The DT_DEBUG entry is filled in by the
1237 dynamic linker and used by the debugger. */
1238 #define add_dynamic_entry(TAG, VAL) \
1239 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1243 if (!add_dynamic_entry (DT_DEBUG
, 0))
1249 if (!add_dynamic_entry (DT_PLTGOT
, 0)
1250 || !add_dynamic_entry (DT_PLTRELSZ
, 0)
1251 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
1252 || !add_dynamic_entry (DT_JMPREL
, 0))
1258 if (!add_dynamic_entry (DT_RELA
, 0)
1259 || !add_dynamic_entry (DT_RELASZ
, 0)
1260 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf32_External_Rela
)))
1264 if (reltext
|| (info
->flags
& DF_TEXTREL
) != 0)
1266 if (!add_dynamic_entry (DT_TEXTREL
, 0))
1270 #undef add_dynamic_entry
1275 /* This function is called via elf_vax_link_hash_traverse if we are
1276 creating a shared object with -Bsymbolic. It discards the space
1277 allocated to copy PC relative relocs against symbols which are defined
1278 in regular objects. We allocated space for them in the check_relocs
1279 routine, but we won't fill them in in the relocate_section routine. */
1282 elf_vax_discard_copies (struct elf_vax_link_hash_entry
*h
,
1283 PTR ignore ATTRIBUTE_UNUSED
)
1285 struct elf_vax_pcrel_relocs_copied
*s
;
1287 if (h
->root
.root
.type
== bfd_link_hash_warning
)
1288 h
= (struct elf_vax_link_hash_entry
*) h
->root
.root
.u
.i
.link
;
1290 /* We only discard relocs for symbols defined in a regular object. */
1291 if (!h
->root
.def_regular
)
1294 for (s
= h
->pcrel_relocs_copied
; s
!= NULL
; s
= s
->next
)
1295 s
->section
->size
-= s
->count
* sizeof (Elf32_External_Rela
);
1300 /* This function is called via elf_link_hash_traverse. It looks for entries
1301 that have GOT or PLT (.GOT) references. If creating a static object or a
1302 shared object with -Bsymbolic, it resets the reference count back to 0
1303 and sets the offset to -1 so normal PC32 relocation will be done. If
1304 creating a shared object or executable, space in the .got and .rela.got
1305 will be reserved for the symbol. */
1308 elf_vax_instantiate_got_entries (struct elf_link_hash_entry
*h
, PTR infoptr
)
1310 struct bfd_link_info
*info
= (struct bfd_link_info
*) infoptr
;
1315 /* We don't care about non-GOT (and non-PLT) entries. */
1316 if (h
->got
.refcount
<= 0 && h
->plt
.refcount
<= 0)
1319 dynobj
= elf_hash_table (info
)->dynobj
;
1323 sgot
= bfd_get_section_by_name (dynobj
, ".got");
1324 srelgot
= bfd_get_section_by_name (dynobj
, ".rela.got");
1326 if (!elf_hash_table (info
)->dynamic_sections_created
1327 || (info
->shared
&& info
->symbolic
))
1329 h
->got
.refcount
= 0;
1330 h
->got
.offset
= (bfd_vma
) -1;
1331 h
->plt
.refcount
= 0;
1332 h
->plt
.offset
= (bfd_vma
) -1;
1334 else if (h
->got
.refcount
> 0)
1336 /* Make sure this symbol is output as a dynamic symbol. */
1337 if (h
->dynindx
== -1)
1339 if (!bfd_elf_link_record_dynamic_symbol (info
, h
))
1343 /* Allocate space in the .got and .rela.got sections. */
1345 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1351 /* Relocate an VAX ELF section. */
1354 elf_vax_relocate_section (bfd
*output_bfd
,
1355 struct bfd_link_info
*info
,
1357 asection
*input_section
,
1359 Elf_Internal_Rela
*relocs
,
1360 Elf_Internal_Sym
*local_syms
,
1361 asection
**local_sections
)
1364 Elf_Internal_Shdr
*symtab_hdr
;
1365 struct elf_link_hash_entry
**sym_hashes
;
1366 bfd_vma
*local_got_offsets
;
1373 Elf_Internal_Rela
*rel
;
1374 Elf_Internal_Rela
*relend
;
1376 dynobj
= elf_hash_table (info
)->dynobj
;
1377 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
1378 sym_hashes
= elf_sym_hashes (input_bfd
);
1379 local_got_offsets
= elf_local_got_offsets (input_bfd
);
1387 relend
= relocs
+ input_section
->reloc_count
;
1388 for (; rel
< relend
; rel
++)
1391 reloc_howto_type
*howto
;
1392 unsigned long r_symndx
;
1393 struct elf_link_hash_entry
*h
;
1394 Elf_Internal_Sym
*sym
;
1397 bfd_reloc_status_type r
;
1399 r_type
= ELF32_R_TYPE (rel
->r_info
);
1400 if (r_type
< 0 || r_type
>= (int) R_VAX_max
)
1402 bfd_set_error (bfd_error_bad_value
);
1405 howto
= howto_table
+ r_type
;
1407 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1411 if (r_symndx
< symtab_hdr
->sh_info
)
1413 sym
= local_syms
+ r_symndx
;
1414 sec
= local_sections
[r_symndx
];
1415 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
1419 bfd_boolean unresolved_reloc
;
1422 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
1423 r_symndx
, symtab_hdr
, sym_hashes
,
1425 unresolved_reloc
, warned
);
1427 if ((h
->root
.type
== bfd_link_hash_defined
1428 || h
->root
.type
== bfd_link_hash_defweak
)
1429 && ((r_type
== R_VAX_PLT32
1430 && h
->plt
.offset
!= (bfd_vma
) -1
1431 && elf_hash_table (info
)->dynamic_sections_created
)
1432 || (r_type
== R_VAX_GOT32
1433 && strcmp (h
->root
.root
.string
,
1434 "_GLOBAL_OFFSET_TABLE_") != 0
1435 && elf_hash_table (info
)->dynamic_sections_created
1437 || (! info
->symbolic
&& h
->dynindx
!= -1)
1438 || !h
->def_regular
))
1440 && ((! info
->symbolic
&& h
->dynindx
!= -1)
1442 && ((input_section
->flags
& SEC_ALLOC
) != 0
1443 /* DWARF will emit R_VAX_32 relocations in its
1444 sections against symbols defined externally
1445 in shared libraries. We can't do anything
1448 || ((input_section
->flags
& SEC_DEBUGGING
) != 0
1450 && (r_type
== R_VAX_8
1451 || r_type
== R_VAX_16
1452 || r_type
== R_VAX_32
1453 || r_type
== R_VAX_PC8
1454 || r_type
== R_VAX_PC16
1455 || r_type
== R_VAX_PC32
))))
1456 /* In these cases, we don't need the relocation
1457 value. We check specially because in some
1458 obscure cases sec->output_section will be NULL. */
1462 if (sec
!= NULL
&& elf_discarded_section (sec
))
1464 /* For relocs against symbols from removed linkonce sections,
1465 or sections discarded by a linker script, we just want the
1466 section contents zeroed. Avoid any special processing. */
1467 _bfd_clear_contents (howto
, input_bfd
, contents
+ rel
->r_offset
);
1473 if (info
->relocatable
)
1479 /* Relocation is to the address of the entry for this symbol
1480 in the global offset table. */
1481 if (h
== NULL
|| h
->got
.offset
== (bfd_vma
) -1)
1484 /* Relocation is the offset of the entry for this symbol in
1485 the global offset table. */
1492 sgot
= bfd_get_section_by_name (dynobj
, ".got");
1493 BFD_ASSERT (sgot
!= NULL
);
1496 BFD_ASSERT (h
!= NULL
);
1497 off
= h
->got
.offset
;
1498 BFD_ASSERT (off
!= (bfd_vma
) -1);
1499 BFD_ASSERT (off
< sgot
->size
);
1505 /* The symbol was forced to be local
1506 because of a version file.. We must initialize
1507 this entry in the global offset table. Since
1508 the offset must always be a multiple of 4, we
1509 use the least significant bit to record whether
1510 we have initialized it already.
1512 When doing a dynamic link, we create a .rela.got
1513 relocation entry to initialize the value. This
1514 is done in the finish_dynamic_symbol routine. */
1519 bfd_put_32 (output_bfd
, relocation
+ rel
->r_addend
,
1520 sgot
->contents
+ off
);
1524 bfd_put_32 (output_bfd
, rel
->r_addend
, sgot
->contents
+ off
);
1527 relocation
= sgot
->output_offset
+ off
;
1528 /* The GOT relocation uses the addend. */
1531 /* Change the reference to be indirect. */
1532 contents
[rel
->r_offset
- 1] |= 0x10;
1533 relocation
+= sgot
->output_section
->vma
;
1538 /* Relocation is to the entry for this symbol in the
1539 procedure linkage table. */
1541 /* Resolve a PLTxx reloc against a local symbol directly,
1542 without using the procedure linkage table. */
1546 if (h
->plt
.offset
== (bfd_vma
) -1
1547 || !elf_hash_table (info
)->dynamic_sections_created
)
1549 /* We didn't make a PLT entry for this symbol. This
1550 happens when statically linking PIC code, or when
1551 using -Bsymbolic. */
1557 splt
= bfd_get_section_by_name (dynobj
, ".plt");
1558 BFD_ASSERT (splt
!= NULL
);
1561 if (sgotplt
== NULL
)
1563 sgotplt
= bfd_get_section_by_name (dynobj
, ".got.plt");
1564 BFD_ASSERT (splt
!= NULL
);
1567 plt_index
= h
->plt
.offset
/ PLT_ENTRY_SIZE
- 1;
1569 /* Get the offset into the .got table of the entry that
1570 corresponds to this function. Each .got entry is 4 bytes.
1571 The first two are reserved. */
1572 got_offset
= (plt_index
+ 3) * 4;
1574 /* We want the relocate to point into the .got.plt instead
1575 of the plt itself. */
1576 relocation
= (sgotplt
->output_section
->vma
1577 + sgotplt
->output_offset
1579 contents
[rel
->r_offset
-1] |= 0x10; /* make indirect */
1580 if (rel
->r_addend
== 2)
1584 else if (rel
->r_addend
!= 0)
1585 (*_bfd_error_handler
)
1586 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1587 bfd_get_filename (input_bfd
), rel
->r_addend
,
1588 h
->root
.root
.string
,
1589 bfd_get_section_name (input_bfd
, input_section
));
1605 && (input_section
->flags
& SEC_ALLOC
) != 0
1606 && ((r_type
!= R_VAX_PC8
1607 && r_type
!= R_VAX_PC16
1608 && r_type
!= R_VAX_PC32
)
1609 || ((input_section
->flags
& SEC_CODE
)
1611 || (!h
->def_regular
&& h
->type
!= STT_SECTION
)))))
1613 Elf_Internal_Rela outrel
;
1615 bfd_boolean skip
, relocate
;
1617 /* When generating a shared object, these relocations
1618 are copied into the output file to be resolved at run
1624 name
= (bfd_elf_string_from_elf_section
1626 elf_elfheader (input_bfd
)->e_shstrndx
,
1627 elf_section_data (input_section
)->rel_hdr
.sh_name
));
1631 BFD_ASSERT (CONST_STRNEQ (name
, ".rela")
1632 && strcmp (bfd_get_section_name (input_bfd
,
1636 sreloc
= bfd_get_section_by_name (dynobj
, name
);
1637 BFD_ASSERT (sreloc
!= NULL
);
1644 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
1646 if (outrel
.r_offset
== (bfd_vma
) -1)
1648 if (outrel
.r_offset
== (bfd_vma
) -2)
1649 skip
= TRUE
, relocate
= TRUE
;
1650 outrel
.r_offset
+= (input_section
->output_section
->vma
1651 + input_section
->output_offset
);
1654 memset (&outrel
, 0, sizeof outrel
);
1655 /* h->dynindx may be -1 if the symbol was marked to
1658 && ((! info
->symbolic
&& h
->dynindx
!= -1)
1659 || !h
->def_regular
))
1661 BFD_ASSERT (h
->dynindx
!= -1);
1662 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, r_type
);
1663 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1667 if (r_type
== R_VAX_32
)
1670 outrel
.r_info
= ELF32_R_INFO (0, R_VAX_RELATIVE
);
1671 BFD_ASSERT (bfd_get_signed_32 (input_bfd
,
1672 &contents
[rel
->r_offset
]) == 0);
1673 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1679 if (bfd_is_abs_section (sec
))
1681 else if (sec
== NULL
|| sec
->owner
== NULL
)
1683 bfd_set_error (bfd_error_bad_value
);
1690 /* We are turning this relocation into one
1691 against a section symbol. It would be
1692 proper to subtract the symbol's value,
1693 osec->vma, from the emitted reloc addend,
1694 but ld.so expects buggy relocs. */
1695 osec
= sec
->output_section
;
1696 indx
= elf_section_data (osec
)->dynindx
;
1699 struct elf_link_hash_table
*htab
;
1700 htab
= elf_hash_table (info
);
1701 osec
= htab
->text_index_section
;
1702 indx
= elf_section_data (osec
)->dynindx
;
1704 BFD_ASSERT (indx
!= 0);
1707 outrel
.r_info
= ELF32_R_INFO (indx
, r_type
);
1708 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1712 if (!strcmp (bfd_get_section_name (input_bfd
, input_section
),
1715 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_32
1716 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_RELATIVE
1717 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_COPY
1718 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_JMP_SLOT
1719 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_GLOB_DAT
))
1722 (*_bfd_error_handler
)
1723 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1724 bfd_get_filename (input_bfd
), howto
->name
,
1725 h
->root
.root
.string
,
1726 bfd_get_section_name (input_bfd
, input_section
));
1728 (*_bfd_error_handler
)
1729 (_("%s: warning: %s relocation to 0x%x from %s section"),
1730 bfd_get_filename (input_bfd
), howto
->name
,
1732 bfd_get_section_name (input_bfd
, input_section
));
1734 loc
= sreloc
->contents
;
1735 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1736 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
1738 /* This reloc will be computed at runtime, so there's no
1739 need to do anything now, except for R_VAX_32
1740 relocations that have been turned into
1748 case R_VAX_GNU_VTINHERIT
:
1749 case R_VAX_GNU_VTENTRY
:
1750 /* These are no-ops in the end. */
1757 /* VAX PCREL relocations are from the end of relocation, not the start.
1758 So subtract the difference from the relocation amount since we can't
1759 add it to the offset. */
1760 if (howto
->pc_relative
&& howto
->pcrel_offset
)
1761 relocation
-= bfd_get_reloc_size(howto
);
1763 r
= _bfd_final_link_relocate (howto
, input_bfd
, input_section
,
1764 contents
, rel
->r_offset
,
1765 relocation
, rel
->r_addend
);
1767 if (r
!= bfd_reloc_ok
)
1772 case bfd_reloc_outofrange
:
1774 case bfd_reloc_overflow
:
1782 name
= bfd_elf_string_from_elf_section (input_bfd
,
1783 symtab_hdr
->sh_link
,
1788 name
= bfd_section_name (input_bfd
, sec
);
1790 if (!(info
->callbacks
->reloc_overflow
1791 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
1792 (bfd_vma
) 0, input_bfd
, input_section
,
1804 /* Finish up dynamic symbol handling. We set the contents of various
1805 dynamic sections here. */
1808 elf_vax_finish_dynamic_symbol (bfd
*output_bfd
, struct bfd_link_info
*info
,
1809 struct elf_link_hash_entry
*h
,
1810 Elf_Internal_Sym
*sym
)
1814 dynobj
= elf_hash_table (info
)->dynobj
;
1816 if (h
->plt
.offset
!= (bfd_vma
) -1)
1824 Elf_Internal_Rela rela
;
1827 /* This symbol has an entry in the procedure linkage table. Set
1829 BFD_ASSERT (h
->dynindx
!= -1);
1831 splt
= bfd_get_section_by_name (dynobj
, ".plt");
1832 sgot
= bfd_get_section_by_name (dynobj
, ".got.plt");
1833 srela
= bfd_get_section_by_name (dynobj
, ".rela.plt");
1834 BFD_ASSERT (splt
!= NULL
&& sgot
!= NULL
&& srela
!= NULL
);
1836 addend
= 2 * (h
->plt
.offset
& 1);
1837 h
->plt
.offset
&= ~1;
1839 /* Get the index in the procedure linkage table which
1840 corresponds to this symbol. This is the index of this symbol
1841 in all the symbols for which we are making plt entries. The
1842 first entry in the procedure linkage table is reserved. */
1843 plt_index
= h
->plt
.offset
/ PLT_ENTRY_SIZE
- 1;
1845 /* Get the offset into the .got table of the entry that
1846 corresponds to this function. Each .got entry is 4 bytes.
1847 The first two are reserved. */
1848 got_offset
= (plt_index
+ 3) * 4;
1850 /* Fill in the entry in the procedure linkage table. */
1851 memcpy (splt
->contents
+ h
->plt
.offset
, elf_vax_plt_entry
,
1854 /* The offset is relative to the first extension word. */
1855 bfd_put_32 (output_bfd
,
1856 -(h
->plt
.offset
+ 8),
1857 splt
->contents
+ h
->plt
.offset
+ 4);
1859 bfd_put_32 (output_bfd
, plt_index
* sizeof (Elf32_External_Rela
),
1860 splt
->contents
+ h
->plt
.offset
+ 8);
1862 /* Fill in the entry in the global offset table. */
1863 bfd_put_32 (output_bfd
,
1864 (splt
->output_section
->vma
1865 + splt
->output_offset
1866 + h
->plt
.offset
) + addend
,
1867 sgot
->contents
+ got_offset
);
1869 /* Fill in the entry in the .rela.plt section. */
1870 rela
.r_offset
= (sgot
->output_section
->vma
1871 + sgot
->output_offset
1873 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_JMP_SLOT
);
1874 rela
.r_addend
= addend
;
1875 loc
= srela
->contents
+ plt_index
* sizeof (Elf32_External_Rela
);
1876 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1878 if (!h
->def_regular
)
1880 /* Mark the symbol as undefined, rather than as defined in
1881 the .plt section. Leave the value alone. */
1882 sym
->st_shndx
= SHN_UNDEF
;
1886 if (h
->got
.offset
!= (bfd_vma
) -1)
1890 Elf_Internal_Rela rela
;
1893 /* This symbol has an entry in the global offset table. Set it
1895 sgot
= bfd_get_section_by_name (dynobj
, ".got");
1896 srela
= bfd_get_section_by_name (dynobj
, ".rela.got");
1897 BFD_ASSERT (sgot
!= NULL
&& srela
!= NULL
);
1899 rela
.r_offset
= (sgot
->output_section
->vma
1900 + sgot
->output_offset
1901 + (h
->got
.offset
&~ 1));
1903 /* If the symbol was forced to be local because of a version file
1904 locally we just want to emit a RELATIVE reloc. The entry in
1905 the global offset table will already have been initialized in
1906 the relocate_section function. */
1911 rela
.r_info
= ELF32_R_INFO (0, R_VAX_RELATIVE
);
1915 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_GLOB_DAT
);
1917 rela
.r_addend
= bfd_get_signed_32 (output_bfd
,
1919 + (h
->got
.offset
& ~1)));
1921 loc
= srela
->contents
;
1922 loc
+= srela
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1923 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1929 Elf_Internal_Rela rela
;
1932 /* This symbol needs a copy reloc. Set it up. */
1933 BFD_ASSERT (h
->dynindx
!= -1
1934 && (h
->root
.type
== bfd_link_hash_defined
1935 || h
->root
.type
== bfd_link_hash_defweak
));
1937 s
= bfd_get_section_by_name (h
->root
.u
.def
.section
->owner
,
1939 BFD_ASSERT (s
!= NULL
);
1941 rela
.r_offset
= (h
->root
.u
.def
.value
1942 + h
->root
.u
.def
.section
->output_section
->vma
1943 + h
->root
.u
.def
.section
->output_offset
);
1944 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_COPY
);
1946 loc
= s
->contents
+ s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1947 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1950 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1951 if (strcmp (h
->root
.root
.string
, "_DYNAMIC") == 0
1952 || h
== elf_hash_table (info
)->hgot
)
1953 sym
->st_shndx
= SHN_ABS
;
1958 /* Finish up the dynamic sections. */
1961 elf_vax_finish_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
1967 dynobj
= elf_hash_table (info
)->dynobj
;
1969 sgot
= bfd_get_section_by_name (dynobj
, ".got.plt");
1970 BFD_ASSERT (sgot
!= NULL
);
1971 sdyn
= bfd_get_section_by_name (dynobj
, ".dynamic");
1973 if (elf_hash_table (info
)->dynamic_sections_created
)
1976 Elf32_External_Dyn
*dyncon
, *dynconend
;
1978 splt
= bfd_get_section_by_name (dynobj
, ".plt");
1979 BFD_ASSERT (splt
!= NULL
&& sdyn
!= NULL
);
1981 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
1982 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
1983 for (; dyncon
< dynconend
; dyncon
++)
1985 Elf_Internal_Dyn dyn
;
1989 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
2002 s
= bfd_get_section_by_name (output_bfd
, name
);
2003 BFD_ASSERT (s
!= NULL
);
2004 dyn
.d_un
.d_ptr
= s
->vma
;
2005 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
2009 s
= bfd_get_section_by_name (output_bfd
, ".rela.plt");
2010 BFD_ASSERT (s
!= NULL
);
2011 dyn
.d_un
.d_val
= s
->size
;
2012 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
2016 /* The procedure linkage table relocs (DT_JMPREL) should
2017 not be included in the overall relocs (DT_RELA).
2018 Therefore, we override the DT_RELASZ entry here to
2019 make it not include the JMPREL relocs. Since the
2020 linker script arranges for .rela.plt to follow all
2021 other relocation sections, we don't have to worry
2022 about changing the DT_RELA entry. */
2023 s
= bfd_get_section_by_name (output_bfd
, ".rela.plt");
2025 dyn
.d_un
.d_val
-= s
->size
;
2026 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
2031 /* Fill in the first entry in the procedure linkage table. */
2034 memcpy (splt
->contents
, elf_vax_plt0_entry
, PLT_ENTRY_SIZE
);
2035 bfd_put_32 (output_bfd
,
2036 (sgot
->output_section
->vma
2037 + sgot
->output_offset
+ 4
2038 - (splt
->output_section
->vma
+ 6)),
2039 splt
->contents
+ 2);
2040 bfd_put_32 (output_bfd
,
2041 (sgot
->output_section
->vma
2042 + sgot
->output_offset
+ 8
2043 - (splt
->output_section
->vma
+ 12)),
2044 splt
->contents
+ 8);
2045 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
2050 /* Fill in the first three entries in the global offset table. */
2054 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
);
2056 bfd_put_32 (output_bfd
,
2057 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
2059 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 4);
2060 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 8);
2063 elf_section_data (sgot
->output_section
)->this_hdr
.sh_entsize
= 4;
2068 #define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2069 #define TARGET_LITTLE_NAME "elf32-vax"
2070 #define ELF_MACHINE_CODE EM_VAX
2071 #define ELF_MAXPAGESIZE 0x1000
2073 #define elf_backend_create_dynamic_sections \
2074 _bfd_elf_create_dynamic_sections
2075 #define bfd_elf32_bfd_link_hash_table_create \
2076 elf_vax_link_hash_table_create
2077 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
2079 #define elf_backend_check_relocs elf_vax_check_relocs
2080 #define elf_backend_adjust_dynamic_symbol \
2081 elf_vax_adjust_dynamic_symbol
2082 #define elf_backend_size_dynamic_sections \
2083 elf_vax_size_dynamic_sections
2084 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
2085 #define elf_backend_relocate_section elf_vax_relocate_section
2086 #define elf_backend_finish_dynamic_symbol \
2087 elf_vax_finish_dynamic_symbol
2088 #define elf_backend_finish_dynamic_sections \
2089 elf_vax_finish_dynamic_sections
2090 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2091 #define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2092 #define bfd_elf32_bfd_merge_private_bfd_data \
2093 elf32_vax_merge_private_bfd_data
2094 #define bfd_elf32_bfd_set_private_flags \
2095 elf32_vax_set_private_flags
2096 #define bfd_elf32_bfd_print_private_bfd_data \
2097 elf32_vax_print_private_bfd_data
2099 #define elf_backend_can_gc_sections 1
2100 #define elf_backend_want_got_plt 1
2101 #define elf_backend_plt_readonly 1
2102 #define elf_backend_want_plt_sym 0
2103 #define elf_backend_got_header_size 16
2104 #define elf_backend_rela_normal 1
2106 #include "elf32-target.h"