1 /* VAX series support for 32-bit ELF
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3 2004, 2005, 2006, 2007 Free Software Foundation, Inc.
4 Contributed by Matt Thomas <matt@3am-software.com>.
6 This file is part of BFD, the Binary File Descriptor library.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
29 static reloc_howto_type
*reloc_type_lookup (bfd
*, bfd_reloc_code_real_type
);
30 static void rtype_to_howto (bfd
*, arelent
*, Elf_Internal_Rela
*);
31 static struct bfd_hash_entry
*elf_vax_link_hash_newfunc (struct bfd_hash_entry
*,
32 struct bfd_hash_table
*,
34 static struct bfd_link_hash_table
*elf_vax_link_hash_table_create (bfd
*);
35 static bfd_boolean
elf_vax_check_relocs (bfd
*, struct bfd_link_info
*,
36 asection
*, const Elf_Internal_Rela
*);
37 static bfd_boolean
elf_vax_adjust_dynamic_symbol (struct bfd_link_info
*,
38 struct elf_link_hash_entry
*);
39 static bfd_boolean
elf_vax_size_dynamic_sections (bfd
*, struct bfd_link_info
*);
40 static bfd_boolean
elf_vax_relocate_section (bfd
*, struct bfd_link_info
*,
41 bfd
*, asection
*, bfd_byte
*,
43 Elf_Internal_Sym
*, asection
**);
44 static bfd_boolean
elf_vax_finish_dynamic_symbol (bfd
*, struct bfd_link_info
*,
45 struct elf_link_hash_entry
*,
47 static bfd_boolean
elf_vax_finish_dynamic_sections (bfd
*,
48 struct bfd_link_info
*);
50 static bfd_boolean
elf32_vax_set_private_flags (bfd
*, flagword
);
51 static bfd_boolean
elf32_vax_merge_private_bfd_data (bfd
*, bfd
*);
52 static bfd_boolean
elf32_vax_print_private_bfd_data (bfd
*, PTR
);
54 static reloc_howto_type howto_table
[] = {
55 HOWTO (R_VAX_NONE
, /* type */
57 0, /* size (0 = byte, 1 = short, 2 = long) */
59 FALSE
, /* pc_relative */
61 complain_overflow_dont
, /* complain_on_overflow */
62 bfd_elf_generic_reloc
, /* special_function */
63 "R_VAX_NONE", /* name */
64 FALSE
, /* partial_inplace */
66 0x00000000, /* dst_mask */
67 FALSE
), /* pcrel_offset */
69 HOWTO (R_VAX_32
, /* type */
71 2, /* size (0 = byte, 1 = short, 2 = long) */
73 FALSE
, /* pc_relative */
75 complain_overflow_bitfield
, /* complain_on_overflow */
76 bfd_elf_generic_reloc
, /* special_function */
77 "R_VAX_32", /* name */
78 FALSE
, /* partial_inplace */
80 0xffffffff, /* dst_mask */
81 FALSE
), /* pcrel_offset */
83 HOWTO (R_VAX_16
, /* type */
85 1, /* size (0 = byte, 1 = short, 2 = long) */
87 FALSE
, /* pc_relative */
89 complain_overflow_bitfield
, /* complain_on_overflow */
90 bfd_elf_generic_reloc
, /* special_function */
91 "R_VAX_16", /* name */
92 FALSE
, /* partial_inplace */
94 0x0000ffff, /* dst_mask */
95 FALSE
), /* pcrel_offset */
97 HOWTO (R_VAX_8
, /* type */
99 0, /* size (0 = byte, 1 = short, 2 = long) */
101 FALSE
, /* pc_relative */
103 complain_overflow_bitfield
, /* complain_on_overflow */
104 bfd_elf_generic_reloc
, /* special_function */
105 "R_VAX_8", /* name */
106 FALSE
, /* partial_inplace */
108 0x000000ff, /* dst_mask */
109 FALSE
), /* pcrel_offset */
111 HOWTO (R_VAX_PC32
, /* type */
113 2, /* size (0 = byte, 1 = short, 2 = long) */
115 TRUE
, /* pc_relative */
117 complain_overflow_bitfield
, /* complain_on_overflow */
118 bfd_elf_generic_reloc
, /* special_function */
119 "R_VAX_PC32", /* name */
120 FALSE
, /* partial_inplace */
122 0xffffffff, /* dst_mask */
123 TRUE
), /* pcrel_offset */
125 HOWTO (R_VAX_PC16
, /* type */
127 1, /* size (0 = byte, 1 = short, 2 = long) */
129 TRUE
, /* pc_relative */
131 complain_overflow_signed
, /* complain_on_overflow */
132 bfd_elf_generic_reloc
, /* special_function */
133 "R_VAX_PC16", /* name */
134 FALSE
, /* partial_inplace */
136 0x0000ffff, /* dst_mask */
137 TRUE
), /* pcrel_offset */
139 HOWTO (R_VAX_PC8
, /* type */
141 0, /* size (0 = byte, 1 = short, 2 = long) */
143 TRUE
, /* pc_relative */
145 complain_overflow_signed
, /* complain_on_overflow */
146 bfd_elf_generic_reloc
, /* special_function */
147 "R_VAX_PC8", /* name */
148 FALSE
, /* partial_inplace */
150 0x000000ff, /* dst_mask */
151 TRUE
), /* pcrel_offset */
153 HOWTO (R_VAX_GOT32
, /* type */
155 2, /* size (0 = byte, 1 = short, 2 = long) */
157 TRUE
, /* pc_relative */
159 complain_overflow_bitfield
, /* complain_on_overflow */
160 bfd_elf_generic_reloc
, /* special_function */
161 "R_VAX_GOT32", /* name */
162 FALSE
, /* partial_inplace */
164 0xffffffff, /* dst_mask */
165 TRUE
), /* pcrel_offset */
173 HOWTO (R_VAX_PLT32
, /* type */
175 2, /* size (0 = byte, 1 = short, 2 = long) */
177 TRUE
, /* pc_relative */
179 complain_overflow_bitfield
, /* complain_on_overflow */
180 bfd_elf_generic_reloc
, /* special_function */
181 "R_VAX_PLT32", /* name */
182 FALSE
, /* partial_inplace */
184 0xffffffff, /* dst_mask */
185 TRUE
), /* pcrel_offset */
193 HOWTO (R_VAX_COPY
, /* type */
195 0, /* size (0 = byte, 1 = short, 2 = long) */
197 FALSE
, /* pc_relative */
199 complain_overflow_dont
, /* complain_on_overflow */
200 bfd_elf_generic_reloc
, /* special_function */
201 "R_VAX_COPY", /* name */
202 FALSE
, /* partial_inplace */
204 0xffffffff, /* dst_mask */
205 FALSE
), /* pcrel_offset */
207 HOWTO (R_VAX_GLOB_DAT
, /* type */
209 2, /* size (0 = byte, 1 = short, 2 = long) */
211 FALSE
, /* pc_relative */
213 complain_overflow_dont
, /* complain_on_overflow */
214 bfd_elf_generic_reloc
, /* special_function */
215 "R_VAX_GLOB_DAT", /* name */
216 FALSE
, /* partial_inplace */
218 0xffffffff, /* dst_mask */
219 FALSE
), /* pcrel_offset */
221 HOWTO (R_VAX_JMP_SLOT
, /* type */
223 2, /* size (0 = byte, 1 = short, 2 = long) */
225 FALSE
, /* pc_relative */
227 complain_overflow_dont
, /* complain_on_overflow */
228 bfd_elf_generic_reloc
, /* special_function */
229 "R_VAX_JMP_SLOT", /* name */
230 FALSE
, /* partial_inplace */
232 0xffffffff, /* dst_mask */
233 FALSE
), /* pcrel_offset */
235 HOWTO (R_VAX_RELATIVE
, /* type */
237 2, /* size (0 = byte, 1 = short, 2 = long) */
239 FALSE
, /* pc_relative */
241 complain_overflow_dont
, /* complain_on_overflow */
242 bfd_elf_generic_reloc
, /* special_function */
243 "R_VAX_RELATIVE", /* name */
244 FALSE
, /* partial_inplace */
246 0xffffffff, /* dst_mask */
247 FALSE
), /* pcrel_offset */
249 /* GNU extension to record C++ vtable hierarchy */
250 HOWTO (R_VAX_GNU_VTINHERIT
, /* type */
252 2, /* size (0 = byte, 1 = short, 2 = long) */
254 FALSE
, /* pc_relative */
256 complain_overflow_dont
, /* complain_on_overflow */
257 NULL
, /* special_function */
258 "R_VAX_GNU_VTINHERIT", /* name */
259 FALSE
, /* partial_inplace */
262 FALSE
), /* pcrel_offset */
264 /* GNU extension to record C++ vtable member usage */
265 HOWTO (R_VAX_GNU_VTENTRY
, /* type */
267 2, /* size (0 = byte, 1 = short, 2 = long) */
269 FALSE
, /* pc_relative */
271 complain_overflow_dont
, /* complain_on_overflow */
272 _bfd_elf_rel_vtable_reloc_fn
, /* special_function */
273 "R_VAX_GNU_VTENTRY", /* name */
274 FALSE
, /* partial_inplace */
277 FALSE
), /* pcrel_offset */
281 rtype_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
, arelent
*cache_ptr
,
282 Elf_Internal_Rela
*dst
)
284 BFD_ASSERT (ELF32_R_TYPE(dst
->r_info
) < (unsigned int) R_VAX_max
);
285 cache_ptr
->howto
= &howto_table
[ELF32_R_TYPE(dst
->r_info
)];
288 #define elf_info_to_howto rtype_to_howto
292 bfd_reloc_code_real_type bfd_val
;
295 { BFD_RELOC_NONE
, R_VAX_NONE
},
296 { BFD_RELOC_32
, R_VAX_32
},
297 { BFD_RELOC_16
, R_VAX_16
},
298 { BFD_RELOC_8
, R_VAX_8
},
299 { BFD_RELOC_32_PCREL
, R_VAX_PC32
},
300 { BFD_RELOC_16_PCREL
, R_VAX_PC16
},
301 { BFD_RELOC_8_PCREL
, R_VAX_PC8
},
302 { BFD_RELOC_32_GOT_PCREL
, R_VAX_GOT32
},
303 { BFD_RELOC_32_PLT_PCREL
, R_VAX_PLT32
},
304 { BFD_RELOC_NONE
, R_VAX_COPY
},
305 { BFD_RELOC_VAX_GLOB_DAT
, R_VAX_GLOB_DAT
},
306 { BFD_RELOC_VAX_JMP_SLOT
, R_VAX_JMP_SLOT
},
307 { BFD_RELOC_VAX_RELATIVE
, R_VAX_RELATIVE
},
308 { BFD_RELOC_CTOR
, R_VAX_32
},
309 { BFD_RELOC_VTABLE_INHERIT
, R_VAX_GNU_VTINHERIT
},
310 { BFD_RELOC_VTABLE_ENTRY
, R_VAX_GNU_VTENTRY
},
313 static reloc_howto_type
*
314 reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
, bfd_reloc_code_real_type code
)
317 for (i
= 0; i
< sizeof (reloc_map
) / sizeof (reloc_map
[0]); i
++)
319 if (reloc_map
[i
].bfd_val
== code
)
320 return &howto_table
[reloc_map
[i
].elf_val
];
325 static reloc_howto_type
*
326 reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
331 for (i
= 0; i
< sizeof (howto_table
) / sizeof (howto_table
[0]); i
++)
332 if (howto_table
[i
].name
!= NULL
333 && strcasecmp (howto_table
[i
].name
, r_name
) == 0)
334 return &howto_table
[i
];
339 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
340 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
341 #define ELF_ARCH bfd_arch_vax
342 /* end code generated by elf.el */
344 /* Functions for the VAX ELF linker. */
346 /* The name of the dynamic interpreter. This is put in the .interp
349 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351 /* The size in bytes of an entry in the procedure linkage table. */
353 #define PLT_ENTRY_SIZE 12
355 /* The first entry in a procedure linkage table looks like this. See
356 the SVR4 ABI VAX supplement to see how this works. */
358 static const bfd_byte elf_vax_plt0_entry
[PLT_ENTRY_SIZE
] =
360 0xdd, 0xef, /* pushl l^ */
361 0, 0, 0, 0, /* offset to .plt.got + 4 */
362 0x17, 0xff, /* jmp @L^(pc) */
363 0, 0, 0, 0, /* offset to .plt.got + 8 */
366 /* Subsequent entries in a procedure linkage table look like this. */
368 static const bfd_byte elf_vax_plt_entry
[PLT_ENTRY_SIZE
] =
370 0x40, 0x00, /* .word ^M<r6> */
371 0x16, 0xef, /* jsb L^(pc) */
372 0, 0, 0, 0, /* replaced with offset to start of .plt */
373 0, 0, 0, 0, /* index into .rela.plt */
376 /* The VAX linker needs to keep track of the number of relocs that it
377 decides to copy in check_relocs for each symbol. This is so that it
378 can discard PC relative relocs if it doesn't need them when linking
379 with -Bsymbolic. We store the information in a field extending the
380 regular ELF linker hash table. */
382 /* This structure keeps track of the number of PC relative relocs we have
383 copied for a given symbol. */
385 struct elf_vax_pcrel_relocs_copied
388 struct elf_vax_pcrel_relocs_copied
*next
;
389 /* A section in dynobj. */
391 /* Number of relocs copied in this section. */
395 /* VAX ELF linker hash entry. */
397 struct elf_vax_link_hash_entry
399 struct elf_link_hash_entry root
;
401 /* Number of PC relative relocs copied for this symbol. */
402 struct elf_vax_pcrel_relocs_copied
*pcrel_relocs_copied
;
407 /* VAX ELF linker hash table. */
409 struct elf_vax_link_hash_table
411 struct elf_link_hash_table root
;
414 /* Declare this now that the above structures are defined. */
416 static bfd_boolean
elf_vax_discard_copies (struct elf_vax_link_hash_entry
*,
419 /* Declare this now that the above structures are defined. */
421 static bfd_boolean
elf_vax_instantiate_got_entries (struct elf_link_hash_entry
*,
424 /* Traverse an VAX ELF linker hash table. */
426 #define elf_vax_link_hash_traverse(table, func, info) \
427 (elf_link_hash_traverse \
429 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
432 /* Get the VAX ELF linker hash table from a link_info structure. */
434 #define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
436 /* Create an entry in an VAX ELF linker hash table. */
438 static struct bfd_hash_entry
*
439 elf_vax_link_hash_newfunc (struct bfd_hash_entry
*entry
,
440 struct bfd_hash_table
*table
,
443 struct elf_vax_link_hash_entry
*ret
=
444 (struct elf_vax_link_hash_entry
*) entry
;
446 /* Allocate the structure if it has not already been allocated by a
449 ret
= ((struct elf_vax_link_hash_entry
*)
450 bfd_hash_allocate (table
,
451 sizeof (struct elf_vax_link_hash_entry
)));
453 return (struct bfd_hash_entry
*) ret
;
455 /* Call the allocation method of the superclass. */
456 ret
= ((struct elf_vax_link_hash_entry
*)
457 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry
*) ret
,
461 ret
->pcrel_relocs_copied
= NULL
;
464 return (struct bfd_hash_entry
*) ret
;
467 /* Create an VAX ELF linker hash table. */
469 static struct bfd_link_hash_table
*
470 elf_vax_link_hash_table_create (bfd
*abfd
)
472 struct elf_vax_link_hash_table
*ret
;
473 bfd_size_type amt
= sizeof (struct elf_vax_link_hash_table
);
475 ret
= bfd_malloc (amt
);
479 if (!_bfd_elf_link_hash_table_init (&ret
->root
, abfd
,
480 elf_vax_link_hash_newfunc
,
481 sizeof (struct elf_vax_link_hash_entry
)))
487 return &ret
->root
.root
;
490 /* Keep vax-specific flags in the ELF header */
492 elf32_vax_set_private_flags (bfd
*abfd
, flagword flags
)
494 elf_elfheader (abfd
)->e_flags
= flags
;
495 elf_flags_init (abfd
) = TRUE
;
499 /* Merge backend specific data from an object file to the output
500 object file when linking. */
502 elf32_vax_merge_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
507 if ( bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
508 || bfd_get_flavour (obfd
) != bfd_target_elf_flavour
)
511 in_flags
= elf_elfheader (ibfd
)->e_flags
;
512 out_flags
= elf_elfheader (obfd
)->e_flags
;
514 if (!elf_flags_init (obfd
))
516 elf_flags_init (obfd
) = TRUE
;
517 elf_elfheader (obfd
)->e_flags
= in_flags
;
523 /* Display the flags field */
525 elf32_vax_print_private_bfd_data (bfd
*abfd
, PTR ptr
)
527 FILE *file
= (FILE *) ptr
;
529 BFD_ASSERT (abfd
!= NULL
&& ptr
!= NULL
);
531 /* Print normal ELF private data. */
532 _bfd_elf_print_private_bfd_data (abfd
, ptr
);
534 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
536 /* xgettext:c-format */
537 fprintf (file
, _("private flags = %lx:"), elf_elfheader (abfd
)->e_flags
);
539 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_NONPIC
)
540 fprintf (file
, _(" [nonpic]"));
542 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_DFLOAT
)
543 fprintf (file
, _(" [d-float]"));
545 if (elf_elfheader (abfd
)->e_flags
& EF_VAX_GFLOAT
)
546 fprintf (file
, _(" [g-float]"));
552 /* Look through the relocs for a section during the first phase, and
553 allocate space in the global offset table or procedure linkage
557 elf_vax_check_relocs (bfd
*abfd
, struct bfd_link_info
*info
, asection
*sec
,
558 const Elf_Internal_Rela
*relocs
)
561 Elf_Internal_Shdr
*symtab_hdr
;
562 struct elf_link_hash_entry
**sym_hashes
;
563 const Elf_Internal_Rela
*rel
;
564 const Elf_Internal_Rela
*rel_end
;
569 if (info
->relocatable
)
572 dynobj
= elf_hash_table (info
)->dynobj
;
573 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
574 sym_hashes
= elf_sym_hashes (abfd
);
580 rel_end
= relocs
+ sec
->reloc_count
;
581 for (rel
= relocs
; rel
< rel_end
; rel
++)
583 unsigned long r_symndx
;
584 struct elf_link_hash_entry
*h
;
586 r_symndx
= ELF32_R_SYM (rel
->r_info
);
588 if (r_symndx
< symtab_hdr
->sh_info
)
592 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
593 while (h
->root
.type
== bfd_link_hash_indirect
594 || h
->root
.type
== bfd_link_hash_warning
)
595 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
598 switch (ELF32_R_TYPE (rel
->r_info
))
602 && strcmp (h
->root
.root
.string
, "_GLOBAL_OFFSET_TABLE_") == 0)
605 /* This symbol requires a global offset table entry. */
609 /* Create the .got section. */
610 elf_hash_table (info
)->dynobj
= dynobj
= abfd
;
611 if (!_bfd_elf_create_got_section (dynobj
, info
))
617 sgot
= bfd_get_section_by_name (dynobj
, ".got");
618 BFD_ASSERT (sgot
!= NULL
);
622 && (h
!= NULL
|| info
->shared
))
624 srelgot
= bfd_get_section_by_name (dynobj
, ".rela.got");
627 srelgot
= bfd_make_section_with_flags (dynobj
,
636 || !bfd_set_section_alignment (dynobj
, srelgot
, 2))
643 struct elf_vax_link_hash_entry
*eh
;
645 eh
= (struct elf_vax_link_hash_entry
*) h
;
646 if (h
->got
.refcount
== -1)
649 eh
->got_addend
= rel
->r_addend
;
654 if (eh
->got_addend
!= (bfd_vma
) rel
->r_addend
)
655 (*_bfd_error_handler
)
656 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
657 bfd_get_filename (abfd
), rel
->r_addend
,
666 /* This symbol requires a procedure linkage table entry. We
667 actually build the entry in adjust_dynamic_symbol,
668 because this might be a case of linking PIC code which is
669 never referenced by a dynamic object, in which case we
670 don't need to generate a procedure linkage table entry
673 /* If this is a local symbol, we resolve it directly without
674 creating a procedure linkage table entry. */
679 if (h
->plt
.refcount
== -1)
688 /* If we are creating a shared library and this is not a local
689 symbol, we need to copy the reloc into the shared library.
690 However when linking with -Bsymbolic and this is a global
691 symbol which is defined in an object we are including in the
692 link (i.e., DEF_REGULAR is set), then we can resolve the
693 reloc directly. At this point we have not seen all the input
694 files, so it is possible that DEF_REGULAR is not set now but
695 will be set later (it is never cleared). We account for that
696 possibility below by storing information in the
697 pcrel_relocs_copied field of the hash table entry. */
699 && (sec
->flags
& SEC_ALLOC
) != 0
702 || !h
->def_regular
)))
706 /* Make sure a plt entry is created for this symbol if
707 it turns out to be a function defined by a dynamic
709 if (h
->plt
.refcount
== -1)
722 /* Make sure a plt entry is created for this symbol if it
723 turns out to be a function defined by a dynamic object. */
724 if (h
->plt
.refcount
== -1)
730 /* If we are creating a shared library, we need to copy the
731 reloc into the shared library. */
733 && (sec
->flags
& SEC_ALLOC
) != 0)
735 /* When creating a shared object, we must copy these
736 reloc types into the output file. We create a reloc
737 section in dynobj and make room for this reloc. */
742 name
= (bfd_elf_string_from_elf_section
744 elf_elfheader (abfd
)->e_shstrndx
,
745 elf_section_data (sec
)->rel_hdr
.sh_name
));
749 BFD_ASSERT (CONST_STRNEQ (name
, ".rela")
750 && strcmp (bfd_get_section_name (abfd
, sec
),
753 sreloc
= bfd_get_section_by_name (dynobj
, name
);
756 sreloc
= bfd_make_section_with_flags (dynobj
,
765 || !bfd_set_section_alignment (dynobj
, sreloc
, 2))
768 if (sec
->flags
& SEC_READONLY
)
769 info
->flags
|= DF_TEXTREL
;
772 sreloc
->size
+= sizeof (Elf32_External_Rela
);
774 /* If we are linking with -Bsymbolic, we count the number of
775 PC relative relocations we have entered for this symbol,
776 so that we can discard them again if the symbol is later
777 defined by a regular object. Note that this function is
778 only called if we are using a vaxelf linker hash table,
779 which means that h is really a pointer to an
780 elf_vax_link_hash_entry. */
781 if ((ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC8
782 || ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC16
783 || ELF32_R_TYPE (rel
->r_info
) == R_VAX_PC32
)
786 struct elf_vax_link_hash_entry
*eh
;
787 struct elf_vax_pcrel_relocs_copied
*p
;
789 eh
= (struct elf_vax_link_hash_entry
*) h
;
791 for (p
= eh
->pcrel_relocs_copied
; p
!= NULL
; p
= p
->next
)
792 if (p
->section
== sreloc
)
797 p
= ((struct elf_vax_pcrel_relocs_copied
*)
798 bfd_alloc (dynobj
, (bfd_size_type
) sizeof *p
));
801 p
->next
= eh
->pcrel_relocs_copied
;
802 eh
->pcrel_relocs_copied
= p
;
813 /* This relocation describes the C++ object vtable hierarchy.
814 Reconstruct it for later use during GC. */
815 case R_VAX_GNU_VTINHERIT
:
816 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
820 /* This relocation describes which C++ vtable entries are actually
821 used. Record for later use during GC. */
822 case R_VAX_GNU_VTENTRY
:
823 if (!bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
835 /* Return the section that should be marked against GC for a given
839 elf_vax_gc_mark_hook (asection
*sec
,
840 struct bfd_link_info
*info
,
841 Elf_Internal_Rela
*rel
,
842 struct elf_link_hash_entry
*h
,
843 Elf_Internal_Sym
*sym
)
846 switch (ELF32_R_TYPE (rel
->r_info
))
848 case R_VAX_GNU_VTINHERIT
:
849 case R_VAX_GNU_VTENTRY
:
853 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
856 /* Update the got entry reference counts for the section being removed. */
859 elf_vax_gc_sweep_hook (bfd
*abfd
, struct bfd_link_info
*info
, asection
*sec
,
860 const Elf_Internal_Rela
*relocs
)
862 Elf_Internal_Shdr
*symtab_hdr
;
863 struct elf_link_hash_entry
**sym_hashes
;
864 const Elf_Internal_Rela
*rel
, *relend
;
867 dynobj
= elf_hash_table (info
)->dynobj
;
871 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
872 sym_hashes
= elf_sym_hashes (abfd
);
874 relend
= relocs
+ sec
->reloc_count
;
875 for (rel
= relocs
; rel
< relend
; rel
++)
877 unsigned long r_symndx
;
878 struct elf_link_hash_entry
*h
= NULL
;
880 r_symndx
= ELF32_R_SYM (rel
->r_info
);
881 if (r_symndx
>= symtab_hdr
->sh_info
)
883 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
884 while (h
->root
.type
== bfd_link_hash_indirect
885 || h
->root
.type
== bfd_link_hash_warning
)
886 h
= (struct elf_link_hash_entry
*) h
->root
.u
.i
.link
;
889 switch (ELF32_R_TYPE (rel
->r_info
))
892 if (h
!= NULL
&& h
->got
.refcount
> 0)
903 if (h
!= NULL
&& h
->plt
.refcount
> 0)
915 /* Adjust a symbol defined by a dynamic object and referenced by a
916 regular object. The current definition is in some section of the
917 dynamic object, but we're not including those sections. We have to
918 change the definition to something the rest of the link can
922 elf_vax_adjust_dynamic_symbol (info
, h
)
923 struct bfd_link_info
*info
;
924 struct elf_link_hash_entry
*h
;
929 dynobj
= elf_hash_table (info
)->dynobj
;
931 /* Make sure we know what is going on here. */
932 BFD_ASSERT (dynobj
!= NULL
934 || h
->u
.weakdef
!= NULL
937 && !h
->def_regular
)));
939 /* If this is a function, put it in the procedure linkage table. We
940 will fill in the contents of the procedure linkage table later,
941 when we know the address of the .got section. */
942 if (h
->type
== STT_FUNC
948 /* We must always create the plt entry if it was referenced
949 by a PLTxxO relocation. In this case we already recorded
950 it as a dynamic symbol. */
953 /* This case can occur if we saw a PLTxx reloc in an input
954 file, but the symbol was never referred to by a dynamic
955 object. In such a case, we don't actually need to build
956 a procedure linkage table, and we can just do a PCxx
958 BFD_ASSERT (h
->needs_plt
);
959 h
->plt
.offset
= (bfd_vma
) -1;
963 /* GC may have rendered this entry unused. */
964 if (h
->plt
.refcount
<= 0)
967 h
->plt
.offset
= (bfd_vma
) -1;
971 /* Make sure this symbol is output as a dynamic symbol. */
972 if (h
->dynindx
== -1)
974 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
978 s
= bfd_get_section_by_name (dynobj
, ".plt");
979 BFD_ASSERT (s
!= NULL
);
981 /* If this is the first .plt entry, make room for the special
985 s
->size
+= PLT_ENTRY_SIZE
;
988 /* If this symbol is not defined in a regular file, and we are
989 not generating a shared library, then set the symbol to this
990 location in the .plt. This is required to make function
991 pointers compare as equal between the normal executable and
992 the shared library. */
996 h
->root
.u
.def
.section
= s
;
997 h
->root
.u
.def
.value
= s
->size
;
1000 h
->plt
.offset
= s
->size
;
1002 /* Make room for this entry. */
1003 s
->size
+= PLT_ENTRY_SIZE
;
1005 /* We also need to make an entry in the .got.plt section, which
1006 will be placed in the .got section by the linker script. */
1008 s
= bfd_get_section_by_name (dynobj
, ".got.plt");
1009 BFD_ASSERT (s
!= NULL
);
1012 /* We also need to make an entry in the .rela.plt section. */
1014 s
= bfd_get_section_by_name (dynobj
, ".rela.plt");
1015 BFD_ASSERT (s
!= NULL
);
1016 s
->size
+= sizeof (Elf32_External_Rela
);
1021 /* Reinitialize the plt offset now that it is not used as a reference
1023 h
->plt
.offset
= (bfd_vma
) -1;
1025 /* If this is a weak symbol, and there is a real definition, the
1026 processor independent code will have arranged for us to see the
1027 real definition first, and we can just use the same value. */
1028 if (h
->u
.weakdef
!= NULL
)
1030 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
1031 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
1032 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
1033 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
1037 /* This is a reference to a symbol defined by a dynamic object which
1038 is not a function. */
1040 /* If we are creating a shared library, we must presume that the
1041 only references to the symbol are via the global offset table.
1042 For such cases we need not do anything here; the relocations will
1043 be handled correctly by relocate_section. */
1049 (*_bfd_error_handler
) (_("dynamic variable `%s' is zero size"),
1050 h
->root
.root
.string
);
1054 /* We must allocate the symbol in our .dynbss section, which will
1055 become part of the .bss section of the executable. There will be
1056 an entry for this symbol in the .dynsym section. The dynamic
1057 object will contain position independent code, so all references
1058 from the dynamic object to this symbol will go through the global
1059 offset table. The dynamic linker will use the .dynsym entry to
1060 determine the address it must put in the global offset table, so
1061 both the dynamic object and the regular object will refer to the
1062 same memory location for the variable. */
1064 s
= bfd_get_section_by_name (dynobj
, ".dynbss");
1065 BFD_ASSERT (s
!= NULL
);
1067 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1068 copy the initial value out of the dynamic object and into the
1069 runtime process image. We need to remember the offset into the
1070 .rela.bss section we are going to use. */
1071 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0)
1075 srel
= bfd_get_section_by_name (dynobj
, ".rela.bss");
1076 BFD_ASSERT (srel
!= NULL
);
1077 srel
->size
+= sizeof (Elf32_External_Rela
);
1081 return _bfd_elf_adjust_dynamic_copy (h
, s
);
1084 /* Set the sizes of the dynamic sections. */
1087 elf_vax_size_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
1093 bfd_boolean reltext
;
1095 dynobj
= elf_hash_table (info
)->dynobj
;
1096 BFD_ASSERT (dynobj
!= NULL
);
1098 if (elf_hash_table (info
)->dynamic_sections_created
)
1100 /* Set the contents of the .interp section to the interpreter. */
1101 if (info
->executable
)
1103 s
= bfd_get_section_by_name (dynobj
, ".interp");
1104 BFD_ASSERT (s
!= NULL
);
1105 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
1106 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
1111 /* We may have created entries in the .rela.got and .got sections.
1112 However, if we are not creating the dynamic sections, we will
1113 not actually use these entries. Reset the size of .rela.got
1114 and .got, which will cause it to get stripped from the output
1116 s
= bfd_get_section_by_name (dynobj
, ".rela.got");
1119 s
= bfd_get_section_by_name (dynobj
, ".got.plt");
1122 s
= bfd_get_section_by_name (dynobj
, ".got");
1127 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1128 relative relocs against symbols defined in a regular object. We
1129 allocated space for them in the check_relocs routine, but we will not
1130 fill them in in the relocate_section routine. */
1131 if (info
->shared
&& info
->symbolic
)
1132 elf_vax_link_hash_traverse (elf_vax_hash_table (info
),
1133 elf_vax_discard_copies
,
1136 /* If this is a -Bsymbolic shared link or a static link, we need to
1137 discard all the got entries we've recorded. Otherwise, we need to
1138 instantiate (allocate space for them). */
1139 elf_link_hash_traverse (elf_hash_table (info
),
1140 elf_vax_instantiate_got_entries
,
1143 /* The check_relocs and adjust_dynamic_symbol entry points have
1144 determined the sizes of the various dynamic sections. Allocate
1149 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
1153 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
1156 /* It's OK to base decisions on the section name, because none
1157 of the dynobj section names depend upon the input files. */
1158 name
= bfd_get_section_name (dynobj
, s
);
1160 if (strcmp (name
, ".plt") == 0)
1162 /* Remember whether there is a PLT. */
1165 else if (CONST_STRNEQ (name
, ".rela"))
1171 /* Remember whether there are any reloc sections other
1173 if (strcmp (name
, ".rela.plt") != 0)
1175 const char *outname
;
1179 /* If this relocation section applies to a read only
1180 section, then we probably need a DT_TEXTREL
1181 entry. .rela.plt is actually associated with
1182 .got.plt, which is never readonly. */
1183 outname
= bfd_get_section_name (output_bfd
,
1185 target
= bfd_get_section_by_name (output_bfd
, outname
+ 5);
1187 && (target
->flags
& SEC_READONLY
) != 0
1188 && (target
->flags
& SEC_ALLOC
) != 0)
1192 /* We use the reloc_count field as a counter if we need
1193 to copy relocs into the output file. */
1197 else if (! CONST_STRNEQ (name
, ".got")
1198 && strcmp (name
, ".dynbss") != 0)
1200 /* It's not one of our sections, so don't allocate space. */
1206 /* If we don't need this section, strip it from the
1207 output file. This is mostly to handle .rela.bss and
1208 .rela.plt. We must create both sections in
1209 create_dynamic_sections, because they must be created
1210 before the linker maps input sections to output
1211 sections. The linker does that before
1212 adjust_dynamic_symbol is called, and it is that
1213 function which decides whether anything needs to go
1214 into these sections. */
1215 s
->flags
|= SEC_EXCLUDE
;
1219 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
1222 /* Allocate memory for the section contents. */
1223 s
->contents
= (bfd_byte
*) bfd_alloc (dynobj
, s
->size
);
1224 if (s
->contents
== NULL
)
1228 if (elf_hash_table (info
)->dynamic_sections_created
)
1230 /* Add some entries to the .dynamic section. We fill in the
1231 values later, in elf_vax_finish_dynamic_sections, but we
1232 must add the entries now so that we get the correct size for
1233 the .dynamic section. The DT_DEBUG entry is filled in by the
1234 dynamic linker and used by the debugger. */
1235 #define add_dynamic_entry(TAG, VAL) \
1236 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1240 if (!add_dynamic_entry (DT_DEBUG
, 0))
1246 if (!add_dynamic_entry (DT_PLTGOT
, 0)
1247 || !add_dynamic_entry (DT_PLTRELSZ
, 0)
1248 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
1249 || !add_dynamic_entry (DT_JMPREL
, 0))
1255 if (!add_dynamic_entry (DT_RELA
, 0)
1256 || !add_dynamic_entry (DT_RELASZ
, 0)
1257 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf32_External_Rela
)))
1261 if (reltext
|| (info
->flags
& DF_TEXTREL
) != 0)
1263 if (!add_dynamic_entry (DT_TEXTREL
, 0))
1267 #undef add_dynamic_entry
1272 /* This function is called via elf_vax_link_hash_traverse if we are
1273 creating a shared object with -Bsymbolic. It discards the space
1274 allocated to copy PC relative relocs against symbols which are defined
1275 in regular objects. We allocated space for them in the check_relocs
1276 routine, but we won't fill them in in the relocate_section routine. */
1279 elf_vax_discard_copies (struct elf_vax_link_hash_entry
*h
,
1280 PTR ignore ATTRIBUTE_UNUSED
)
1282 struct elf_vax_pcrel_relocs_copied
*s
;
1284 if (h
->root
.root
.type
== bfd_link_hash_warning
)
1285 h
= (struct elf_vax_link_hash_entry
*) h
->root
.root
.u
.i
.link
;
1287 /* We only discard relocs for symbols defined in a regular object. */
1288 if (!h
->root
.def_regular
)
1291 for (s
= h
->pcrel_relocs_copied
; s
!= NULL
; s
= s
->next
)
1292 s
->section
->size
-= s
->count
* sizeof (Elf32_External_Rela
);
1297 /* This function is called via elf_link_hash_traverse. It looks for entries
1298 that have GOT or PLT (.GOT) references. If creating a static object or a
1299 shared object with -Bsymbolic, it resets the reference count back to 0
1300 and sets the offset to -1 so normal PC32 relocation will be done. If
1301 creating a shared object or executable, space in the .got and .rela.got
1302 will be reserved for the symbol. */
1305 elf_vax_instantiate_got_entries (struct elf_link_hash_entry
*h
, PTR infoptr
)
1307 struct bfd_link_info
*info
= (struct bfd_link_info
*) infoptr
;
1312 /* We don't care about non-GOT (and non-PLT) entries. */
1313 if (h
->got
.refcount
<= 0 && h
->plt
.refcount
<= 0)
1316 dynobj
= elf_hash_table (info
)->dynobj
;
1320 sgot
= bfd_get_section_by_name (dynobj
, ".got");
1321 srelgot
= bfd_get_section_by_name (dynobj
, ".rela.got");
1323 if (!elf_hash_table (info
)->dynamic_sections_created
1324 || (info
->shared
&& info
->symbolic
))
1326 h
->got
.refcount
= 0;
1327 h
->got
.offset
= (bfd_vma
) -1;
1328 h
->plt
.refcount
= 0;
1329 h
->plt
.offset
= (bfd_vma
) -1;
1331 else if (h
->got
.refcount
> 0)
1333 /* Make sure this symbol is output as a dynamic symbol. */
1334 if (h
->dynindx
== -1)
1336 if (!bfd_elf_link_record_dynamic_symbol (info
, h
))
1340 /* Allocate space in the .got and .rela.got sections. */
1342 srelgot
->size
+= sizeof (Elf32_External_Rela
);
1348 /* Relocate an VAX ELF section. */
1351 elf_vax_relocate_section (bfd
*output_bfd
,
1352 struct bfd_link_info
*info
,
1354 asection
*input_section
,
1356 Elf_Internal_Rela
*relocs
,
1357 Elf_Internal_Sym
*local_syms
,
1358 asection
**local_sections
)
1361 Elf_Internal_Shdr
*symtab_hdr
;
1362 struct elf_link_hash_entry
**sym_hashes
;
1363 bfd_vma
*local_got_offsets
;
1370 Elf_Internal_Rela
*rel
;
1371 Elf_Internal_Rela
*relend
;
1373 dynobj
= elf_hash_table (info
)->dynobj
;
1374 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
1375 sym_hashes
= elf_sym_hashes (input_bfd
);
1376 local_got_offsets
= elf_local_got_offsets (input_bfd
);
1384 relend
= relocs
+ input_section
->reloc_count
;
1385 for (; rel
< relend
; rel
++)
1388 reloc_howto_type
*howto
;
1389 unsigned long r_symndx
;
1390 struct elf_link_hash_entry
*h
;
1391 Elf_Internal_Sym
*sym
;
1394 bfd_reloc_status_type r
;
1396 r_type
= ELF32_R_TYPE (rel
->r_info
);
1397 if (r_type
< 0 || r_type
>= (int) R_VAX_max
)
1399 bfd_set_error (bfd_error_bad_value
);
1402 howto
= howto_table
+ r_type
;
1404 r_symndx
= ELF32_R_SYM (rel
->r_info
);
1408 if (r_symndx
< symtab_hdr
->sh_info
)
1410 sym
= local_syms
+ r_symndx
;
1411 sec
= local_sections
[r_symndx
];
1412 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
1416 bfd_boolean unresolved_reloc
;
1419 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
1420 r_symndx
, symtab_hdr
, sym_hashes
,
1422 unresolved_reloc
, warned
);
1424 if ((h
->root
.type
== bfd_link_hash_defined
1425 || h
->root
.type
== bfd_link_hash_defweak
)
1426 && ((r_type
== R_VAX_PLT32
1427 && h
->plt
.offset
!= (bfd_vma
) -1
1428 && elf_hash_table (info
)->dynamic_sections_created
)
1429 || (r_type
== R_VAX_GOT32
1430 && strcmp (h
->root
.root
.string
,
1431 "_GLOBAL_OFFSET_TABLE_") != 0
1432 && elf_hash_table (info
)->dynamic_sections_created
1434 || (! info
->symbolic
&& h
->dynindx
!= -1)
1435 || !h
->def_regular
))
1437 && ((! info
->symbolic
&& h
->dynindx
!= -1)
1439 && ((input_section
->flags
& SEC_ALLOC
) != 0
1440 /* DWARF will emit R_VAX_32 relocations in its
1441 sections against symbols defined externally
1442 in shared libraries. We can't do anything
1445 || ((input_section
->flags
& SEC_DEBUGGING
) != 0
1447 && (r_type
== R_VAX_8
1448 || r_type
== R_VAX_16
1449 || r_type
== R_VAX_32
1450 || r_type
== R_VAX_PC8
1451 || r_type
== R_VAX_PC16
1452 || r_type
== R_VAX_PC32
))))
1453 /* In these cases, we don't need the relocation
1454 value. We check specially because in some
1455 obscure cases sec->output_section will be NULL. */
1459 if (sec
!= NULL
&& elf_discarded_section (sec
))
1461 /* For relocs against symbols from removed linkonce sections,
1462 or sections discarded by a linker script, we just want the
1463 section contents zeroed. Avoid any special processing. */
1464 _bfd_clear_contents (howto
, input_bfd
, contents
+ rel
->r_offset
);
1470 if (info
->relocatable
)
1476 /* Relocation is to the address of the entry for this symbol
1477 in the global offset table. */
1478 if (h
== NULL
|| h
->got
.offset
== (bfd_vma
) -1)
1481 /* Relocation is the offset of the entry for this symbol in
1482 the global offset table. */
1489 sgot
= bfd_get_section_by_name (dynobj
, ".got");
1490 BFD_ASSERT (sgot
!= NULL
);
1493 BFD_ASSERT (h
!= NULL
);
1494 off
= h
->got
.offset
;
1495 BFD_ASSERT (off
!= (bfd_vma
) -1);
1496 BFD_ASSERT (off
< sgot
->size
);
1502 /* The symbol was forced to be local
1503 because of a version file.. We must initialize
1504 this entry in the global offset table. Since
1505 the offset must always be a multiple of 4, we
1506 use the least significant bit to record whether
1507 we have initialized it already.
1509 When doing a dynamic link, we create a .rela.got
1510 relocation entry to initialize the value. This
1511 is done in the finish_dynamic_symbol routine. */
1516 bfd_put_32 (output_bfd
, relocation
+ rel
->r_addend
,
1517 sgot
->contents
+ off
);
1521 bfd_put_32 (output_bfd
, rel
->r_addend
, sgot
->contents
+ off
);
1524 relocation
= sgot
->output_offset
+ off
;
1525 /* The GOT relocation uses the addend. */
1528 /* Change the reference to be indirect. */
1529 contents
[rel
->r_offset
- 1] |= 0x10;
1530 relocation
+= sgot
->output_section
->vma
;
1535 /* Relocation is to the entry for this symbol in the
1536 procedure linkage table. */
1538 /* Resolve a PLTxx reloc against a local symbol directly,
1539 without using the procedure linkage table. */
1543 if (h
->plt
.offset
== (bfd_vma
) -1
1544 || !elf_hash_table (info
)->dynamic_sections_created
)
1546 /* We didn't make a PLT entry for this symbol. This
1547 happens when statically linking PIC code, or when
1548 using -Bsymbolic. */
1554 splt
= bfd_get_section_by_name (dynobj
, ".plt");
1555 BFD_ASSERT (splt
!= NULL
);
1558 if (sgotplt
== NULL
)
1560 sgotplt
= bfd_get_section_by_name (dynobj
, ".got.plt");
1561 BFD_ASSERT (splt
!= NULL
);
1564 plt_index
= h
->plt
.offset
/ PLT_ENTRY_SIZE
- 1;
1566 /* Get the offset into the .got table of the entry that
1567 corresponds to this function. Each .got entry is 4 bytes.
1568 The first two are reserved. */
1569 got_offset
= (plt_index
+ 3) * 4;
1571 /* We want the relocate to point into the .got.plt instead
1572 of the plt itself. */
1573 relocation
= (sgotplt
->output_section
->vma
1574 + sgotplt
->output_offset
1576 contents
[rel
->r_offset
-1] |= 0x10; /* make indirect */
1577 if (rel
->r_addend
== 2)
1581 else if (rel
->r_addend
!= 0)
1582 (*_bfd_error_handler
)
1583 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1584 bfd_get_filename (input_bfd
), rel
->r_addend
,
1585 h
->root
.root
.string
,
1586 bfd_get_section_name (input_bfd
, input_section
));
1602 && (input_section
->flags
& SEC_ALLOC
) != 0
1603 && ((r_type
!= R_VAX_PC8
1604 && r_type
!= R_VAX_PC16
1605 && r_type
!= R_VAX_PC32
)
1606 || ((input_section
->flags
& SEC_CODE
)
1608 || (!h
->def_regular
&& h
->type
!= STT_SECTION
)))))
1610 Elf_Internal_Rela outrel
;
1612 bfd_boolean skip
, relocate
;
1614 /* When generating a shared object, these relocations
1615 are copied into the output file to be resolved at run
1621 name
= (bfd_elf_string_from_elf_section
1623 elf_elfheader (input_bfd
)->e_shstrndx
,
1624 elf_section_data (input_section
)->rel_hdr
.sh_name
));
1628 BFD_ASSERT (CONST_STRNEQ (name
, ".rela")
1629 && strcmp (bfd_get_section_name (input_bfd
,
1633 sreloc
= bfd_get_section_by_name (dynobj
, name
);
1634 BFD_ASSERT (sreloc
!= NULL
);
1641 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
1643 if (outrel
.r_offset
== (bfd_vma
) -1)
1645 if (outrel
.r_offset
== (bfd_vma
) -2)
1646 skip
= TRUE
, relocate
= TRUE
;
1647 outrel
.r_offset
+= (input_section
->output_section
->vma
1648 + input_section
->output_offset
);
1651 memset (&outrel
, 0, sizeof outrel
);
1652 /* h->dynindx may be -1 if the symbol was marked to
1655 && ((! info
->symbolic
&& h
->dynindx
!= -1)
1656 || !h
->def_regular
))
1658 BFD_ASSERT (h
->dynindx
!= -1);
1659 outrel
.r_info
= ELF32_R_INFO (h
->dynindx
, r_type
);
1660 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1664 if (r_type
== R_VAX_32
)
1667 outrel
.r_info
= ELF32_R_INFO (0, R_VAX_RELATIVE
);
1668 BFD_ASSERT (bfd_get_signed_32 (input_bfd
,
1669 &contents
[rel
->r_offset
]) == 0);
1670 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1676 if (bfd_is_abs_section (sec
))
1678 else if (sec
== NULL
|| sec
->owner
== NULL
)
1680 bfd_set_error (bfd_error_bad_value
);
1687 /* We are turning this relocation into one
1688 against a section symbol. It would be
1689 proper to subtract the symbol's value,
1690 osec->vma, from the emitted reloc addend,
1691 but ld.so expects buggy relocs. */
1692 osec
= sec
->output_section
;
1693 indx
= elf_section_data (osec
)->dynindx
;
1696 struct elf_link_hash_table
*htab
;
1697 htab
= elf_hash_table (info
);
1698 osec
= htab
->text_index_section
;
1699 indx
= elf_section_data (osec
)->dynindx
;
1701 BFD_ASSERT (indx
!= 0);
1704 outrel
.r_info
= ELF32_R_INFO (indx
, r_type
);
1705 outrel
.r_addend
= relocation
+ rel
->r_addend
;
1709 if (!strcmp (bfd_get_section_name (input_bfd
, input_section
),
1712 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_32
1713 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_RELATIVE
1714 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_COPY
1715 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_JMP_SLOT
1716 && ELF32_R_TYPE(outrel
.r_info
) != R_VAX_GLOB_DAT
))
1719 (*_bfd_error_handler
)
1720 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1721 bfd_get_filename (input_bfd
), howto
->name
,
1722 h
->root
.root
.string
,
1723 bfd_get_section_name (input_bfd
, input_section
));
1725 (*_bfd_error_handler
)
1726 (_("%s: warning: %s relocation to 0x%x from %s section"),
1727 bfd_get_filename (input_bfd
), howto
->name
,
1729 bfd_get_section_name (input_bfd
, input_section
));
1731 loc
= sreloc
->contents
;
1732 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1733 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
1735 /* This reloc will be computed at runtime, so there's no
1736 need to do anything now, except for R_VAX_32
1737 relocations that have been turned into
1745 case R_VAX_GNU_VTINHERIT
:
1746 case R_VAX_GNU_VTENTRY
:
1747 /* These are no-ops in the end. */
1754 /* VAX PCREL relocations are from the end of relocation, not the start.
1755 So subtract the difference from the relocation amount since we can't
1756 add it to the offset. */
1757 if (howto
->pc_relative
&& howto
->pcrel_offset
)
1758 relocation
-= bfd_get_reloc_size(howto
);
1760 r
= _bfd_final_link_relocate (howto
, input_bfd
, input_section
,
1761 contents
, rel
->r_offset
,
1762 relocation
, rel
->r_addend
);
1764 if (r
!= bfd_reloc_ok
)
1769 case bfd_reloc_outofrange
:
1771 case bfd_reloc_overflow
:
1779 name
= bfd_elf_string_from_elf_section (input_bfd
,
1780 symtab_hdr
->sh_link
,
1785 name
= bfd_section_name (input_bfd
, sec
);
1787 if (!(info
->callbacks
->reloc_overflow
1788 (info
, (h
? &h
->root
: NULL
), name
, howto
->name
,
1789 (bfd_vma
) 0, input_bfd
, input_section
,
1801 /* Finish up dynamic symbol handling. We set the contents of various
1802 dynamic sections here. */
1805 elf_vax_finish_dynamic_symbol (bfd
*output_bfd
, struct bfd_link_info
*info
,
1806 struct elf_link_hash_entry
*h
,
1807 Elf_Internal_Sym
*sym
)
1811 dynobj
= elf_hash_table (info
)->dynobj
;
1813 if (h
->plt
.offset
!= (bfd_vma
) -1)
1821 Elf_Internal_Rela rela
;
1824 /* This symbol has an entry in the procedure linkage table. Set
1826 BFD_ASSERT (h
->dynindx
!= -1);
1828 splt
= bfd_get_section_by_name (dynobj
, ".plt");
1829 sgot
= bfd_get_section_by_name (dynobj
, ".got.plt");
1830 srela
= bfd_get_section_by_name (dynobj
, ".rela.plt");
1831 BFD_ASSERT (splt
!= NULL
&& sgot
!= NULL
&& srela
!= NULL
);
1833 addend
= 2 * (h
->plt
.offset
& 1);
1834 h
->plt
.offset
&= ~1;
1836 /* Get the index in the procedure linkage table which
1837 corresponds to this symbol. This is the index of this symbol
1838 in all the symbols for which we are making plt entries. The
1839 first entry in the procedure linkage table is reserved. */
1840 plt_index
= h
->plt
.offset
/ PLT_ENTRY_SIZE
- 1;
1842 /* Get the offset into the .got table of the entry that
1843 corresponds to this function. Each .got entry is 4 bytes.
1844 The first two are reserved. */
1845 got_offset
= (plt_index
+ 3) * 4;
1847 /* Fill in the entry in the procedure linkage table. */
1848 memcpy (splt
->contents
+ h
->plt
.offset
, elf_vax_plt_entry
,
1851 /* The offset is relative to the first extension word. */
1852 bfd_put_32 (output_bfd
,
1853 -(h
->plt
.offset
+ 8),
1854 splt
->contents
+ h
->plt
.offset
+ 4);
1856 bfd_put_32 (output_bfd
, plt_index
* sizeof (Elf32_External_Rela
),
1857 splt
->contents
+ h
->plt
.offset
+ 8);
1859 /* Fill in the entry in the global offset table. */
1860 bfd_put_32 (output_bfd
,
1861 (splt
->output_section
->vma
1862 + splt
->output_offset
1863 + h
->plt
.offset
) + addend
,
1864 sgot
->contents
+ got_offset
);
1866 /* Fill in the entry in the .rela.plt section. */
1867 rela
.r_offset
= (sgot
->output_section
->vma
1868 + sgot
->output_offset
1870 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_JMP_SLOT
);
1871 rela
.r_addend
= addend
;
1872 loc
= srela
->contents
+ plt_index
* sizeof (Elf32_External_Rela
);
1873 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1875 if (!h
->def_regular
)
1877 /* Mark the symbol as undefined, rather than as defined in
1878 the .plt section. Leave the value alone. */
1879 sym
->st_shndx
= SHN_UNDEF
;
1883 if (h
->got
.offset
!= (bfd_vma
) -1)
1887 Elf_Internal_Rela rela
;
1890 /* This symbol has an entry in the global offset table. Set it
1892 sgot
= bfd_get_section_by_name (dynobj
, ".got");
1893 srela
= bfd_get_section_by_name (dynobj
, ".rela.got");
1894 BFD_ASSERT (sgot
!= NULL
&& srela
!= NULL
);
1896 rela
.r_offset
= (sgot
->output_section
->vma
1897 + sgot
->output_offset
1898 + (h
->got
.offset
&~ 1));
1900 /* If the symbol was forced to be local because of a version file
1901 locally we just want to emit a RELATIVE reloc. The entry in
1902 the global offset table will already have been initialized in
1903 the relocate_section function. */
1908 rela
.r_info
= ELF32_R_INFO (0, R_VAX_RELATIVE
);
1912 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_GLOB_DAT
);
1914 rela
.r_addend
= bfd_get_signed_32 (output_bfd
,
1916 + (h
->got
.offset
& ~1)));
1918 loc
= srela
->contents
;
1919 loc
+= srela
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1920 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1926 Elf_Internal_Rela rela
;
1929 /* This symbol needs a copy reloc. Set it up. */
1930 BFD_ASSERT (h
->dynindx
!= -1
1931 && (h
->root
.type
== bfd_link_hash_defined
1932 || h
->root
.type
== bfd_link_hash_defweak
));
1934 s
= bfd_get_section_by_name (h
->root
.u
.def
.section
->owner
,
1936 BFD_ASSERT (s
!= NULL
);
1938 rela
.r_offset
= (h
->root
.u
.def
.value
1939 + h
->root
.u
.def
.section
->output_section
->vma
1940 + h
->root
.u
.def
.section
->output_offset
);
1941 rela
.r_info
= ELF32_R_INFO (h
->dynindx
, R_VAX_COPY
);
1943 loc
= s
->contents
+ s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
1944 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
1947 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1948 if (strcmp (h
->root
.root
.string
, "_DYNAMIC") == 0
1949 || h
== elf_hash_table (info
)->hgot
)
1950 sym
->st_shndx
= SHN_ABS
;
1955 /* Finish up the dynamic sections. */
1958 elf_vax_finish_dynamic_sections (bfd
*output_bfd
, struct bfd_link_info
*info
)
1964 dynobj
= elf_hash_table (info
)->dynobj
;
1966 sgot
= bfd_get_section_by_name (dynobj
, ".got.plt");
1967 BFD_ASSERT (sgot
!= NULL
);
1968 sdyn
= bfd_get_section_by_name (dynobj
, ".dynamic");
1970 if (elf_hash_table (info
)->dynamic_sections_created
)
1973 Elf32_External_Dyn
*dyncon
, *dynconend
;
1975 splt
= bfd_get_section_by_name (dynobj
, ".plt");
1976 BFD_ASSERT (splt
!= NULL
&& sdyn
!= NULL
);
1978 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
1979 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
1980 for (; dyncon
< dynconend
; dyncon
++)
1982 Elf_Internal_Dyn dyn
;
1986 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
1999 s
= bfd_get_section_by_name (output_bfd
, name
);
2000 BFD_ASSERT (s
!= NULL
);
2001 dyn
.d_un
.d_ptr
= s
->vma
;
2002 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
2006 s
= bfd_get_section_by_name (output_bfd
, ".rela.plt");
2007 BFD_ASSERT (s
!= NULL
);
2008 dyn
.d_un
.d_val
= s
->size
;
2009 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
2013 /* The procedure linkage table relocs (DT_JMPREL) should
2014 not be included in the overall relocs (DT_RELA).
2015 Therefore, we override the DT_RELASZ entry here to
2016 make it not include the JMPREL relocs. Since the
2017 linker script arranges for .rela.plt to follow all
2018 other relocation sections, we don't have to worry
2019 about changing the DT_RELA entry. */
2020 s
= bfd_get_section_by_name (output_bfd
, ".rela.plt");
2022 dyn
.d_un
.d_val
-= s
->size
;
2023 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
2028 /* Fill in the first entry in the procedure linkage table. */
2031 memcpy (splt
->contents
, elf_vax_plt0_entry
, PLT_ENTRY_SIZE
);
2032 bfd_put_32 (output_bfd
,
2033 (sgot
->output_section
->vma
2034 + sgot
->output_offset
+ 4
2035 - (splt
->output_section
->vma
+ 6)),
2036 splt
->contents
+ 2);
2037 bfd_put_32 (output_bfd
,
2038 (sgot
->output_section
->vma
2039 + sgot
->output_offset
+ 8
2040 - (splt
->output_section
->vma
+ 12)),
2041 splt
->contents
+ 8);
2042 elf_section_data (splt
->output_section
)->this_hdr
.sh_entsize
2047 /* Fill in the first three entries in the global offset table. */
2051 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
);
2053 bfd_put_32 (output_bfd
,
2054 sdyn
->output_section
->vma
+ sdyn
->output_offset
,
2056 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 4);
2057 bfd_put_32 (output_bfd
, (bfd_vma
) 0, sgot
->contents
+ 8);
2060 elf_section_data (sgot
->output_section
)->this_hdr
.sh_entsize
= 4;
2065 #define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2066 #define TARGET_LITTLE_NAME "elf32-vax"
2067 #define ELF_MACHINE_CODE EM_VAX
2068 #define ELF_MAXPAGESIZE 0x1000
2070 #define elf_backend_create_dynamic_sections \
2071 _bfd_elf_create_dynamic_sections
2072 #define bfd_elf32_bfd_link_hash_table_create \
2073 elf_vax_link_hash_table_create
2074 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
2076 #define elf_backend_check_relocs elf_vax_check_relocs
2077 #define elf_backend_adjust_dynamic_symbol \
2078 elf_vax_adjust_dynamic_symbol
2079 #define elf_backend_size_dynamic_sections \
2080 elf_vax_size_dynamic_sections
2081 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
2082 #define elf_backend_relocate_section elf_vax_relocate_section
2083 #define elf_backend_finish_dynamic_symbol \
2084 elf_vax_finish_dynamic_symbol
2085 #define elf_backend_finish_dynamic_sections \
2086 elf_vax_finish_dynamic_sections
2087 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2088 #define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2089 #define bfd_elf32_bfd_merge_private_bfd_data \
2090 elf32_vax_merge_private_bfd_data
2091 #define bfd_elf32_bfd_set_private_flags \
2092 elf32_vax_set_private_flags
2093 #define bfd_elf32_bfd_print_private_bfd_data \
2094 elf32_vax_print_private_bfd_data
2096 #define elf_backend_can_gc_sections 1
2097 #define elf_backend_want_got_plt 1
2098 #define elf_backend_plt_readonly 1
2099 #define elf_backend_want_plt_sym 0
2100 #define elf_backend_got_header_size 16
2101 #define elf_backend_rela_normal 1
2103 #include "elf32-target.h"