]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf32-vax.c
Don't declare tui_init_win_info
[thirdparty/binutils-gdb.git] / bfd / elf32-vax.c
1 /* VAX series support for 32-bit ELF
2 Copyright (C) 1993-2019 Free Software Foundation, Inc.
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static bfd_boolean rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37 static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39 static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44 static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47 static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
49 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
51
52 static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
53 static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
54
55 static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
58 3, /* size (0 = byte, 1 = short, 2 = long) */
59 0, /* bitsize */
60 FALSE, /* pc_relative */
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
65 FALSE, /* partial_inplace */
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
68 FALSE), /* pcrel_offset */
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
74 FALSE, /* pc_relative */
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
79 FALSE, /* partial_inplace */
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
82 FALSE), /* pcrel_offset */
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
88 FALSE, /* pc_relative */
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
93 FALSE, /* partial_inplace */
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
96 FALSE), /* pcrel_offset */
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
102 FALSE, /* pc_relative */
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
107 FALSE, /* partial_inplace */
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
110 FALSE), /* pcrel_offset */
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
116 TRUE, /* pc_relative */
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
121 FALSE, /* partial_inplace */
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
124 TRUE), /* pcrel_offset */
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
130 TRUE, /* pc_relative */
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
135 FALSE, /* partial_inplace */
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
138 TRUE), /* pcrel_offset */
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
144 TRUE, /* pc_relative */
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
149 FALSE, /* partial_inplace */
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
152 TRUE), /* pcrel_offset */
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
158 TRUE, /* pc_relative */
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
163 FALSE, /* partial_inplace */
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
166 TRUE), /* pcrel_offset */
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
178 TRUE, /* pc_relative */
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
183 FALSE, /* partial_inplace */
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
186 TRUE), /* pcrel_offset */
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
198 FALSE, /* pc_relative */
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
203 FALSE, /* partial_inplace */
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
206 FALSE), /* pcrel_offset */
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
212 FALSE, /* pc_relative */
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
217 FALSE, /* partial_inplace */
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
220 FALSE), /* pcrel_offset */
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
226 FALSE, /* pc_relative */
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
231 FALSE, /* partial_inplace */
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
234 FALSE), /* pcrel_offset */
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
240 FALSE, /* pc_relative */
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
245 FALSE, /* partial_inplace */
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
248 FALSE), /* pcrel_offset */
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
255 FALSE, /* pc_relative */
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
260 FALSE, /* partial_inplace */
261 0, /* src_mask */
262 0, /* dst_mask */
263 FALSE), /* pcrel_offset */
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
270 FALSE, /* pc_relative */
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
275 FALSE, /* partial_inplace */
276 0, /* src_mask */
277 0, /* dst_mask */
278 FALSE), /* pcrel_offset */
279 };
280
281 static bfd_boolean
282 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
283 {
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
289 /* xgettext:c-format */
290 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
291 abfd, r_type);
292 bfd_set_error (bfd_error_bad_value);
293 return FALSE;
294 }
295 cache_ptr->howto = &howto_table[r_type];
296 return TRUE;
297 }
298
299 #define elf_info_to_howto rtype_to_howto
300
301 static const struct
302 {
303 bfd_reloc_code_real_type bfd_val;
304 int elf_val;
305 } reloc_map[] = {
306 { BFD_RELOC_NONE, R_VAX_NONE },
307 { BFD_RELOC_32, R_VAX_32 },
308 { BFD_RELOC_16, R_VAX_16 },
309 { BFD_RELOC_8, R_VAX_8 },
310 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
311 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
312 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
313 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
314 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
315 { BFD_RELOC_NONE, R_VAX_COPY },
316 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
317 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
318 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
319 { BFD_RELOC_CTOR, R_VAX_32 },
320 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
321 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
322 };
323
324 static reloc_howto_type *
325 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
326 {
327 unsigned int i;
328 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
329 {
330 if (reloc_map[i].bfd_val == code)
331 return &howto_table[reloc_map[i].elf_val];
332 }
333 return 0;
334 }
335
336 static reloc_howto_type *
337 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
338 const char *r_name)
339 {
340 unsigned int i;
341
342 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
343 if (howto_table[i].name != NULL
344 && strcasecmp (howto_table[i].name, r_name) == 0)
345 return &howto_table[i];
346
347 return NULL;
348 }
349
350 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
351 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
352 #define ELF_ARCH bfd_arch_vax
353 /* end code generated by elf.el */
354 \f
355 /* Functions for the VAX ELF linker. */
356
357 /* The name of the dynamic interpreter. This is put in the .interp
358 section. */
359
360 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
361
362 /* The size in bytes of an entry in the procedure linkage table. */
363
364 #define PLT_ENTRY_SIZE 12
365
366 /* The first entry in a procedure linkage table looks like this. See
367 the SVR4 ABI VAX supplement to see how this works. */
368
369 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
370 {
371 0xdd, 0xef, /* pushl l^ */
372 0, 0, 0, 0, /* offset to .plt.got + 4 */
373 0x17, 0xff, /* jmp @L^(pc) */
374 0, 0, 0, 0, /* offset to .plt.got + 8 */
375 };
376
377 /* Subsequent entries in a procedure linkage table look like this. */
378
379 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
380 {
381 0xfc, 0x0f, /* .word ^M<r11:r2> */
382 0x16, 0xef, /* jsb L^(pc) */
383 0, 0, 0, 0, /* replaced with offset to start of .plt */
384 0, 0, 0, 0, /* index into .rela.plt */
385 };
386
387 /* The VAX linker needs to keep track of the number of relocs that it
388 decides to copy in check_relocs for each symbol. This is so that it
389 can discard PC relative relocs if it doesn't need them when linking
390 with -Bsymbolic. We store the information in a field extending the
391 regular ELF linker hash table. */
392
393 /* This structure keeps track of the number of PC relative relocs we have
394 copied for a given symbol. */
395
396 struct elf_vax_pcrel_relocs_copied
397 {
398 /* Next section. */
399 struct elf_vax_pcrel_relocs_copied *next;
400 /* A section in dynobj. */
401 asection *section;
402 /* Number of relocs copied in this section. */
403 bfd_size_type count;
404 };
405
406 /* VAX ELF linker hash entry. */
407
408 struct elf_vax_link_hash_entry
409 {
410 struct elf_link_hash_entry root;
411
412 /* Number of PC relative relocs copied for this symbol. */
413 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
414
415 bfd_vma got_addend;
416 };
417
418 /* Declare this now that the above structures are defined. */
419
420 static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
421 void *);
422
423 /* Declare this now that the above structures are defined. */
424
425 static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
426 void *);
427
428 /* Traverse an VAX ELF linker hash table. */
429
430 #define elf_vax_link_hash_traverse(table, func, info) \
431 (elf_link_hash_traverse \
432 ((table), \
433 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
434 (info)))
435
436 /* Create an entry in an VAX ELF linker hash table. */
437
438 static struct bfd_hash_entry *
439 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
440 struct bfd_hash_table *table,
441 const char *string)
442 {
443 struct elf_vax_link_hash_entry *ret =
444 (struct elf_vax_link_hash_entry *) entry;
445
446 /* Allocate the structure if it has not already been allocated by a
447 subclass. */
448 if (ret == NULL)
449 ret = ((struct elf_vax_link_hash_entry *)
450 bfd_hash_allocate (table,
451 sizeof (struct elf_vax_link_hash_entry)));
452 if (ret == NULL)
453 return (struct bfd_hash_entry *) ret;
454
455 /* Call the allocation method of the superclass. */
456 ret = ((struct elf_vax_link_hash_entry *)
457 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
458 table, string));
459 if (ret != NULL)
460 {
461 ret->pcrel_relocs_copied = NULL;
462 }
463
464 return (struct bfd_hash_entry *) ret;
465 }
466
467 /* Create an VAX ELF linker hash table. */
468
469 static struct bfd_link_hash_table *
470 elf_vax_link_hash_table_create (bfd *abfd)
471 {
472 struct elf_link_hash_table *ret;
473 bfd_size_type amt = sizeof (struct elf_link_hash_table);
474
475 ret = bfd_zmalloc (amt);
476 if (ret == NULL)
477 return NULL;
478
479 if (!_bfd_elf_link_hash_table_init (ret, abfd,
480 elf_vax_link_hash_newfunc,
481 sizeof (struct elf_vax_link_hash_entry),
482 GENERIC_ELF_DATA))
483 {
484 free (ret);
485 return NULL;
486 }
487
488 return &ret->root;
489 }
490
491 /* Keep vax-specific flags in the ELF header */
492 static bfd_boolean
493 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
494 {
495 elf_elfheader (abfd)->e_flags = flags;
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
498 }
499
500 /* Merge backend specific data from an object file to the output
501 object file when linking. */
502 static bfd_boolean
503 elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
504 {
505 bfd *obfd = info->output_bfd;
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
510 return TRUE;
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
513
514 if (!elf_flags_init (obfd))
515 {
516 elf_flags_init (obfd) = TRUE;
517 elf_elfheader (obfd)->e_flags = in_flags;
518 }
519
520 return TRUE;
521 }
522
523 /* Display the flags field */
524 static bfd_boolean
525 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
526 {
527 FILE *file = (FILE *) ptr;
528
529 BFD_ASSERT (abfd != NULL && ptr != NULL);
530
531 /* Print normal ELF private data. */
532 _bfd_elf_print_private_bfd_data (abfd, ptr);
533
534 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
535
536 /* xgettext:c-format */
537 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
538
539 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
540 fprintf (file, _(" [nonpic]"));
541
542 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
543 fprintf (file, _(" [d-float]"));
544
545 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
546 fprintf (file, _(" [g-float]"));
547
548 fputc ('\n', file);
549
550 return TRUE;
551 }
552 /* Look through the relocs for a section during the first phase, and
553 allocate space in the global offset table or procedure linkage
554 table. */
555
556 static bfd_boolean
557 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
558 const Elf_Internal_Rela *relocs)
559 {
560 bfd *dynobj;
561 Elf_Internal_Shdr *symtab_hdr;
562 struct elf_link_hash_entry **sym_hashes;
563 const Elf_Internal_Rela *rel;
564 const Elf_Internal_Rela *rel_end;
565 asection *sreloc;
566
567 if (bfd_link_relocatable (info))
568 return TRUE;
569
570 dynobj = elf_hash_table (info)->dynobj;
571 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
572 sym_hashes = elf_sym_hashes (abfd);
573
574 sreloc = NULL;
575
576 rel_end = relocs + sec->reloc_count;
577 for (rel = relocs; rel < rel_end; rel++)
578 {
579 unsigned long r_symndx;
580 struct elf_link_hash_entry *h;
581
582 r_symndx = ELF32_R_SYM (rel->r_info);
583
584 if (r_symndx < symtab_hdr->sh_info)
585 h = NULL;
586 else
587 {
588 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
589 while (h->root.type == bfd_link_hash_indirect
590 || h->root.type == bfd_link_hash_warning)
591 h = (struct elf_link_hash_entry *) h->root.u.i.link;
592 }
593
594 switch (ELF32_R_TYPE (rel->r_info))
595 {
596 case R_VAX_GOT32:
597 BFD_ASSERT (h != NULL);
598
599 /* If this is a local symbol, we resolve it directly without
600 creating a global offset table entry. */
601 if (h->forced_local
602 || h == elf_hash_table (info)->hgot
603 || h == elf_hash_table (info)->hplt)
604 break;
605
606 /* This symbol requires a global offset table entry. */
607
608 if (dynobj == NULL)
609 {
610 /* Create the .got section. */
611 elf_hash_table (info)->dynobj = dynobj = abfd;
612 if (!_bfd_elf_create_got_section (dynobj, info))
613 return FALSE;
614 }
615
616 if (h != NULL)
617 {
618 struct elf_vax_link_hash_entry *eh;
619
620 eh = (struct elf_vax_link_hash_entry *) h;
621 if (h->got.refcount == -1)
622 {
623 h->got.refcount = 1;
624 eh->got_addend = rel->r_addend;
625 }
626 else
627 {
628 h->got.refcount++;
629 if (eh->got_addend != (bfd_vma) rel->r_addend)
630 _bfd_error_handler
631 /* xgettext:c-format */
632 (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
633 " not match previous GOT addend of %" PRId64),
634 abfd, (int64_t) rel->r_addend, h->root.root.string,
635 (int64_t) eh->got_addend);
636
637 }
638 }
639 break;
640
641 case R_VAX_PLT32:
642 /* This symbol requires a procedure linkage table entry. We
643 actually build the entry in adjust_dynamic_symbol,
644 because this might be a case of linking PIC code which is
645 never referenced by a dynamic object, in which case we
646 don't need to generate a procedure linkage table entry
647 after all. */
648 BFD_ASSERT (h != NULL);
649
650 /* If this is a local symbol, we resolve it directly without
651 creating a procedure linkage table entry. */
652 if (h->forced_local)
653 break;
654
655 h->needs_plt = 1;
656 if (h->plt.refcount == -1)
657 h->plt.refcount = 1;
658 else
659 h->plt.refcount++;
660 break;
661
662 case R_VAX_PC8:
663 case R_VAX_PC16:
664 case R_VAX_PC32:
665 /* If we are creating a shared library and this is not a local
666 symbol, we need to copy the reloc into the shared library.
667 However when linking with -Bsymbolic and this is a global
668 symbol which is defined in an object we are including in the
669 link (i.e., DEF_REGULAR is set), then we can resolve the
670 reloc directly. At this point we have not seen all the input
671 files, so it is possible that DEF_REGULAR is not set now but
672 will be set later (it is never cleared). We account for that
673 possibility below by storing information in the
674 pcrel_relocs_copied field of the hash table entry. */
675 if (!(bfd_link_pic (info)
676 && (sec->flags & SEC_ALLOC) != 0
677 && h != NULL
678 && (!info->symbolic
679 || !h->def_regular)))
680 {
681 if (h != NULL
682 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
683 && !h->forced_local)
684 {
685 /* Make sure a plt entry is created for this symbol if
686 it turns out to be a function defined by a dynamic
687 object. */
688 if (h->plt.refcount == -1)
689 h->plt.refcount = 1;
690 else
691 h->plt.refcount++;
692 }
693 break;
694 }
695 /* If this is a local symbol, we can resolve it directly. */
696 if (h != NULL
697 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
698 || h->forced_local))
699 break;
700
701 /* Fall through. */
702 case R_VAX_8:
703 case R_VAX_16:
704 case R_VAX_32:
705 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
706 {
707 /* Make sure a plt entry is created for this symbol if it
708 turns out to be a function defined by a dynamic object. */
709 if (h->plt.refcount == -1)
710 h->plt.refcount = 1;
711 else
712 h->plt.refcount++;
713 }
714
715 /* If we are creating a shared library, we need to copy the
716 reloc into the shared library. */
717 if (bfd_link_pic (info)
718 && (sec->flags & SEC_ALLOC) != 0)
719 {
720 /* When creating a shared object, we must copy these
721 reloc types into the output file. We create a reloc
722 section in dynobj and make room for this reloc. */
723 if (sreloc == NULL)
724 {
725 sreloc = _bfd_elf_make_dynamic_reloc_section
726 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
727
728 if (sreloc == NULL)
729 return FALSE;
730
731 if (sec->flags & SEC_READONLY)
732 info->flags |= DF_TEXTREL;
733 }
734
735 sreloc->size += sizeof (Elf32_External_Rela);
736
737 /* If we are linking with -Bsymbolic, we count the number of
738 PC relative relocations we have entered for this symbol,
739 so that we can discard them again if the symbol is later
740 defined by a regular object. Note that this function is
741 only called if we are using a vaxelf linker hash table,
742 which means that h is really a pointer to an
743 elf_vax_link_hash_entry. */
744 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
745 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
746 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
747 && info->symbolic)
748 {
749 struct elf_vax_link_hash_entry *eh;
750 struct elf_vax_pcrel_relocs_copied *p;
751
752 eh = (struct elf_vax_link_hash_entry *) h;
753
754 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
755 if (p->section == sreloc)
756 break;
757
758 if (p == NULL)
759 {
760 p = ((struct elf_vax_pcrel_relocs_copied *)
761 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
762 if (p == NULL)
763 return FALSE;
764 p->next = eh->pcrel_relocs_copied;
765 eh->pcrel_relocs_copied = p;
766 p->section = sreloc;
767 p->count = 0;
768 }
769
770 ++p->count;
771 }
772 }
773
774 break;
775
776 /* This relocation describes the C++ object vtable hierarchy.
777 Reconstruct it for later use during GC. */
778 case R_VAX_GNU_VTINHERIT:
779 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
780 return FALSE;
781 break;
782
783 /* This relocation describes which C++ vtable entries are actually
784 used. Record for later use during GC. */
785 case R_VAX_GNU_VTENTRY:
786 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
787 return FALSE;
788 break;
789
790 default:
791 break;
792 }
793 }
794
795 return TRUE;
796 }
797
798 /* Return the section that should be marked against GC for a given
799 relocation. */
800
801 static asection *
802 elf_vax_gc_mark_hook (asection *sec,
803 struct bfd_link_info *info,
804 Elf_Internal_Rela *rel,
805 struct elf_link_hash_entry *h,
806 Elf_Internal_Sym *sym)
807 {
808 if (h != NULL)
809 switch (ELF32_R_TYPE (rel->r_info))
810 {
811 case R_VAX_GNU_VTINHERIT:
812 case R_VAX_GNU_VTENTRY:
813 return NULL;
814 }
815
816 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
817 }
818
819 /* Adjust a symbol defined by a dynamic object and referenced by a
820 regular object. The current definition is in some section of the
821 dynamic object, but we're not including those sections. We have to
822 change the definition to something the rest of the link can
823 understand. */
824
825 static bfd_boolean
826 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
827 struct elf_link_hash_entry *h)
828 {
829 bfd *dynobj;
830 asection *s;
831
832 dynobj = elf_hash_table (info)->dynobj;
833
834 /* Make sure we know what is going on here. */
835 BFD_ASSERT (dynobj != NULL
836 && (h->needs_plt
837 || h->is_weakalias
838 || (h->def_dynamic
839 && h->ref_regular
840 && !h->def_regular)));
841
842 /* If this is a function, put it in the procedure linkage table. We
843 will fill in the contents of the procedure linkage table later,
844 when we know the address of the .got section. */
845 if (h->type == STT_FUNC
846 || h->needs_plt)
847 {
848 if (h->plt.refcount <= 0
849 || SYMBOL_CALLS_LOCAL (info, h)
850 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
851 && h->root.type == bfd_link_hash_undefweak))
852 {
853 /* This case can occur if we saw a PLTxx reloc in an input
854 file, but the symbol was never referred to by a dynamic
855 object, or if all references were garbage collected. In
856 such a case, we don't actually need to build a procedure
857 linkage table, and we can just do a PCxx reloc instead. */
858 h->plt.offset = (bfd_vma) -1;
859 h->needs_plt = 0;
860 return TRUE;
861 }
862
863 s = elf_hash_table (info)->splt;
864 BFD_ASSERT (s != NULL);
865
866 /* If this is the first .plt entry, make room for the special
867 first entry. */
868 if (s->size == 0)
869 {
870 s->size += PLT_ENTRY_SIZE;
871 }
872
873 /* If this symbol is not defined in a regular file, and we are
874 not generating a shared library, then set the symbol to this
875 location in the .plt. This is required to make function
876 pointers compare as equal between the normal executable and
877 the shared library. */
878 if (!bfd_link_pic (info)
879 && !h->def_regular)
880 {
881 h->root.u.def.section = s;
882 h->root.u.def.value = s->size;
883 }
884
885 h->plt.offset = s->size;
886
887 /* Make room for this entry. */
888 s->size += PLT_ENTRY_SIZE;
889
890 /* We also need to make an entry in the .got.plt section, which
891 will be placed in the .got section by the linker script. */
892
893 s = elf_hash_table (info)->sgotplt;
894 BFD_ASSERT (s != NULL);
895 s->size += 4;
896
897 /* We also need to make an entry in the .rela.plt section. */
898
899 s = elf_hash_table (info)->srelplt;
900 BFD_ASSERT (s != NULL);
901 s->size += sizeof (Elf32_External_Rela);
902
903 return TRUE;
904 }
905
906 /* Reinitialize the plt offset now that it is not used as a reference
907 count any more. */
908 h->plt.offset = (bfd_vma) -1;
909
910 /* If this is a weak symbol, and there is a real definition, the
911 processor independent code will have arranged for us to see the
912 real definition first, and we can just use the same value. */
913 if (h->is_weakalias)
914 {
915 struct elf_link_hash_entry *def = weakdef (h);
916 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
917 h->root.u.def.section = def->root.u.def.section;
918 h->root.u.def.value = def->root.u.def.value;
919 return TRUE;
920 }
921
922 /* This is a reference to a symbol defined by a dynamic object which
923 is not a function. */
924
925 /* If we are creating a shared library, we must presume that the
926 only references to the symbol are via the global offset table.
927 For such cases we need not do anything here; the relocations will
928 be handled correctly by relocate_section. */
929 if (bfd_link_pic (info))
930 return TRUE;
931
932 /* We must allocate the symbol in our .dynbss section, which will
933 become part of the .bss section of the executable. There will be
934 an entry for this symbol in the .dynsym section. The dynamic
935 object will contain position independent code, so all references
936 from the dynamic object to this symbol will go through the global
937 offset table. The dynamic linker will use the .dynsym entry to
938 determine the address it must put in the global offset table, so
939 both the dynamic object and the regular object will refer to the
940 same memory location for the variable. */
941
942 s = bfd_get_linker_section (dynobj, ".dynbss");
943 BFD_ASSERT (s != NULL);
944
945 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
946 copy the initial value out of the dynamic object and into the
947 runtime process image. We need to remember the offset into the
948 .rela.bss section we are going to use. */
949 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
950 {
951 asection *srel;
952
953 srel = bfd_get_linker_section (dynobj, ".rela.bss");
954 BFD_ASSERT (srel != NULL);
955 srel->size += sizeof (Elf32_External_Rela);
956 h->needs_copy = 1;
957 }
958
959 return _bfd_elf_adjust_dynamic_copy (info, h, s);
960 }
961
962 /* This function is called via elf_link_hash_traverse. It resets GOT
963 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
964 will be done. */
965
966 static bfd_boolean
967 elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
968 void *infoptr ATTRIBUTE_UNUSED)
969 {
970 h->got.refcount = -1;
971 h->plt.refcount = -1;
972
973 return TRUE;
974 }
975
976 /* Discard unused dynamic data if this is a static link. */
977
978 static bfd_boolean
979 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
980 struct bfd_link_info *info)
981 {
982 bfd *dynobj;
983 asection *s;
984
985 dynobj = elf_hash_table (info)->dynobj;
986
987 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
988 {
989 /* We may have created entries in the .rela.got and .got sections.
990 However, if we are not creating the dynamic sections, we will
991 not actually use these entries. Reset the size of .rela.got
992 and .got, which will cause them to get stripped from the output
993 file below. */
994 s = elf_hash_table (info)->srelgot;
995 if (s != NULL)
996 s->size = 0;
997 s = elf_hash_table (info)->sgotplt;
998 if (s != NULL)
999 s->size = 0;
1000 s = elf_hash_table (info)->sgot;
1001 if (s != NULL)
1002 s->size = 0;
1003 }
1004
1005 /* If this is a static link, we need to discard all the got entries we've
1006 recorded. */
1007 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1008 elf_link_hash_traverse (elf_hash_table (info),
1009 elf_vax_discard_got_entries,
1010 info);
1011
1012 return TRUE;
1013 }
1014
1015 /* Set the sizes of the dynamic sections. */
1016
1017 static bfd_boolean
1018 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1019 {
1020 bfd *dynobj;
1021 asection *s;
1022 bfd_boolean plt;
1023 bfd_boolean relocs;
1024 bfd_boolean reltext;
1025
1026 dynobj = elf_hash_table (info)->dynobj;
1027 BFD_ASSERT (dynobj != NULL);
1028
1029 if (elf_hash_table (info)->dynamic_sections_created)
1030 {
1031 /* Set the contents of the .interp section to the interpreter. */
1032 if (bfd_link_executable (info) && !info->nointerp)
1033 {
1034 s = bfd_get_linker_section (dynobj, ".interp");
1035 BFD_ASSERT (s != NULL);
1036 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1037 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1038 }
1039 }
1040
1041 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1042 relative relocs against symbols defined in a regular object. We
1043 allocated space for them in the check_relocs routine, but we will not
1044 fill them in in the relocate_section routine. */
1045 if (bfd_link_pic (info) && info->symbolic)
1046 elf_vax_link_hash_traverse (elf_hash_table (info),
1047 elf_vax_discard_copies,
1048 NULL);
1049
1050 /* If this is a -Bsymbolic shared link, we need to discard all the got
1051 entries we've recorded. Otherwise, we need to instantiate (allocate
1052 space for them). */
1053 elf_link_hash_traverse (elf_hash_table (info),
1054 elf_vax_instantiate_got_entries,
1055 info);
1056
1057 /* The check_relocs and adjust_dynamic_symbol entry points have
1058 determined the sizes of the various dynamic sections. Allocate
1059 memory for them. */
1060 plt = FALSE;
1061 relocs = FALSE;
1062 reltext = FALSE;
1063 for (s = dynobj->sections; s != NULL; s = s->next)
1064 {
1065 const char *name;
1066
1067 if ((s->flags & SEC_LINKER_CREATED) == 0)
1068 continue;
1069
1070 /* It's OK to base decisions on the section name, because none
1071 of the dynobj section names depend upon the input files. */
1072 name = bfd_get_section_name (dynobj, s);
1073
1074 if (strcmp (name, ".plt") == 0)
1075 {
1076 /* Remember whether there is a PLT. */
1077 plt = s->size != 0;
1078 }
1079 else if (CONST_STRNEQ (name, ".rela"))
1080 {
1081 if (s->size != 0)
1082 {
1083 asection *target;
1084
1085 /* Remember whether there are any reloc sections other
1086 than .rela.plt. */
1087 if (strcmp (name, ".rela.plt") != 0)
1088 {
1089 const char *outname;
1090
1091 relocs = TRUE;
1092
1093 /* If this relocation section applies to a read only
1094 section, then we probably need a DT_TEXTREL
1095 entry. .rela.plt is actually associated with
1096 .got.plt, which is never readonly. */
1097 outname = bfd_get_section_name (output_bfd,
1098 s->output_section);
1099 target = bfd_get_section_by_name (output_bfd, outname + 5);
1100 if (target != NULL
1101 && (target->flags & SEC_READONLY) != 0
1102 && (target->flags & SEC_ALLOC) != 0)
1103 reltext = TRUE;
1104 }
1105
1106 /* We use the reloc_count field as a counter if we need
1107 to copy relocs into the output file. */
1108 s->reloc_count = 0;
1109 }
1110 }
1111 else if (! CONST_STRNEQ (name, ".got")
1112 && strcmp (name, ".dynbss") != 0)
1113 {
1114 /* It's not one of our sections, so don't allocate space. */
1115 continue;
1116 }
1117
1118 if (s->size == 0)
1119 {
1120 /* If we don't need this section, strip it from the
1121 output file. This is mostly to handle .rela.bss and
1122 .rela.plt. We must create both sections in
1123 create_dynamic_sections, because they must be created
1124 before the linker maps input sections to output
1125 sections. The linker does that before
1126 adjust_dynamic_symbol is called, and it is that
1127 function which decides whether anything needs to go
1128 into these sections. */
1129 s->flags |= SEC_EXCLUDE;
1130 continue;
1131 }
1132
1133 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1134 continue;
1135
1136 /* Allocate memory for the section contents. */
1137 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1138 if (s->contents == NULL)
1139 return FALSE;
1140 }
1141
1142 if (elf_hash_table (info)->dynamic_sections_created)
1143 {
1144 /* Add some entries to the .dynamic section. We fill in the
1145 values later, in elf_vax_finish_dynamic_sections, but we
1146 must add the entries now so that we get the correct size for
1147 the .dynamic section. The DT_DEBUG entry is filled in by the
1148 dynamic linker and used by the debugger. */
1149 #define add_dynamic_entry(TAG, VAL) \
1150 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1151
1152 if (!bfd_link_pic (info))
1153 {
1154 if (!add_dynamic_entry (DT_DEBUG, 0))
1155 return FALSE;
1156 }
1157
1158 if (plt)
1159 {
1160 if (!add_dynamic_entry (DT_PLTGOT, 0)
1161 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1162 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1163 || !add_dynamic_entry (DT_JMPREL, 0))
1164 return FALSE;
1165 }
1166
1167 if (relocs)
1168 {
1169 if (!add_dynamic_entry (DT_RELA, 0)
1170 || !add_dynamic_entry (DT_RELASZ, 0)
1171 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1172 return FALSE;
1173 }
1174
1175 if (reltext || (info->flags & DF_TEXTREL) != 0)
1176 {
1177 if (!add_dynamic_entry (DT_TEXTREL, 0))
1178 return FALSE;
1179 }
1180 }
1181 #undef add_dynamic_entry
1182
1183 return TRUE;
1184 }
1185
1186 /* This function is called via elf_vax_link_hash_traverse if we are
1187 creating a shared object with -Bsymbolic. It discards the space
1188 allocated to copy PC relative relocs against symbols which are defined
1189 in regular objects. We allocated space for them in the check_relocs
1190 routine, but we won't fill them in in the relocate_section routine. */
1191
1192 static bfd_boolean
1193 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1194 void * ignore ATTRIBUTE_UNUSED)
1195 {
1196 struct elf_vax_pcrel_relocs_copied *s;
1197
1198 /* We only discard relocs for symbols defined in a regular object. */
1199 if (!h->root.def_regular)
1200 return TRUE;
1201
1202 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1203 s->section->size -= s->count * sizeof (Elf32_External_Rela);
1204
1205 return TRUE;
1206 }
1207
1208 /* This function is called via elf_link_hash_traverse. It looks for
1209 entries that have GOT or PLT (.GOT) references. If creating a shared
1210 object with -Bsymbolic, or the symbol has been forced local, then it
1211 resets the reference count back to -1 so normal PC32 relocation will
1212 be done. Otherwise space in the .got and .rela.got will be reserved
1213 for the symbol. */
1214
1215 static bfd_boolean
1216 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1217 {
1218 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1219 bfd *dynobj;
1220 asection *sgot;
1221 asection *srelgot;
1222
1223 /* We don't care about non-GOT (and non-PLT) entries. */
1224 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1225 return TRUE;
1226
1227 dynobj = elf_hash_table (info)->dynobj;
1228 BFD_ASSERT (dynobj != NULL);
1229
1230 sgot = elf_hash_table (info)->sgot;
1231 srelgot = elf_hash_table (info)->srelgot;
1232
1233 if (SYMBOL_REFERENCES_LOCAL (info, h))
1234 {
1235 h->got.refcount = -1;
1236 h->plt.refcount = -1;
1237 }
1238 else if (h->got.refcount > 0)
1239 {
1240 /* Make sure this symbol is output as a dynamic symbol. */
1241 if (h->dynindx == -1)
1242 {
1243 if (!bfd_elf_link_record_dynamic_symbol (info, h))
1244 return FALSE;
1245 }
1246
1247 /* Allocate space in the .got and .rela.got sections. */
1248 sgot->size += 4;
1249 srelgot->size += sizeof (Elf32_External_Rela);
1250 }
1251
1252 return TRUE;
1253 }
1254
1255 /* Relocate an VAX ELF section. */
1256
1257 static bfd_boolean
1258 elf_vax_relocate_section (bfd *output_bfd,
1259 struct bfd_link_info *info,
1260 bfd *input_bfd,
1261 asection *input_section,
1262 bfd_byte *contents,
1263 Elf_Internal_Rela *relocs,
1264 Elf_Internal_Sym *local_syms,
1265 asection **local_sections)
1266 {
1267 Elf_Internal_Shdr *symtab_hdr;
1268 struct elf_link_hash_entry **sym_hashes;
1269 bfd_vma plt_index;
1270 bfd_vma got_offset;
1271 asection *sgot;
1272 asection *splt;
1273 asection *sgotplt;
1274 asection *sreloc;
1275 Elf_Internal_Rela *rel;
1276 Elf_Internal_Rela *relend;
1277
1278 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1279 sym_hashes = elf_sym_hashes (input_bfd);
1280
1281 sgot = NULL;
1282 splt = NULL;
1283 sgotplt = NULL;
1284 sreloc = NULL;
1285
1286 rel = relocs;
1287 relend = relocs + input_section->reloc_count;
1288 for (; rel < relend; rel++)
1289 {
1290 int r_type;
1291 reloc_howto_type *howto;
1292 unsigned long r_symndx;
1293 struct elf_link_hash_entry *h;
1294 Elf_Internal_Sym *sym;
1295 asection *sec;
1296 bfd_vma relocation;
1297 bfd_reloc_status_type r;
1298
1299 r_type = ELF32_R_TYPE (rel->r_info);
1300 if (r_type < 0 || r_type >= (int) R_VAX_max)
1301 {
1302 bfd_set_error (bfd_error_bad_value);
1303 return FALSE;
1304 }
1305 howto = howto_table + r_type;
1306
1307 r_symndx = ELF32_R_SYM (rel->r_info);
1308 h = NULL;
1309 sym = NULL;
1310 sec = NULL;
1311 if (r_symndx < symtab_hdr->sh_info)
1312 {
1313 sym = local_syms + r_symndx;
1314 sec = local_sections[r_symndx];
1315 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1316 }
1317 else
1318 {
1319 bfd_boolean unresolved_reloc;
1320 bfd_boolean warned, ignored;
1321
1322 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1323 r_symndx, symtab_hdr, sym_hashes,
1324 h, sec, relocation,
1325 unresolved_reloc, warned, ignored);
1326
1327 if ((h->root.type == bfd_link_hash_defined
1328 || h->root.type == bfd_link_hash_defweak)
1329 && ((r_type == R_VAX_PLT32
1330 && h->plt.offset != (bfd_vma) -1
1331 && !h->forced_local
1332 && elf_hash_table (info)->dynamic_sections_created)
1333 || (r_type == R_VAX_GOT32
1334 && h->got.offset != (bfd_vma) -1
1335 && !h->forced_local
1336 && elf_hash_table (info)->dynamic_sections_created
1337 && (! bfd_link_pic (info)
1338 || (! info->symbolic && h->dynindx != -1)
1339 || !h->def_regular))
1340 || (bfd_link_pic (info)
1341 && ((! info->symbolic && h->dynindx != -1)
1342 || !h->def_regular)
1343 && ((input_section->flags & SEC_ALLOC) != 0
1344 /* DWARF will emit R_VAX_32 relocations in its
1345 sections against symbols defined externally
1346 in shared libraries. We can't do anything
1347 with them here. */
1348
1349 || ((input_section->flags & SEC_DEBUGGING) != 0
1350 && h->def_dynamic))
1351 && (r_type == R_VAX_8
1352 || r_type == R_VAX_16
1353 || r_type == R_VAX_32))))
1354 /* In these cases, we don't need the relocation
1355 value. We check specially because in some
1356 obscure cases sec->output_section will be NULL. */
1357 relocation = 0;
1358 }
1359
1360 if (sec != NULL && discarded_section (sec))
1361 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1362 rel, 1, relend, howto, 0, contents);
1363
1364 if (bfd_link_relocatable (info))
1365 continue;
1366
1367 switch (r_type)
1368 {
1369 case R_VAX_GOT32:
1370 /* Relocation is to the address of the entry for this symbol
1371 in the global offset table. */
1372
1373 /* Resolve a GOTxx reloc against a local symbol directly,
1374 without using the global offset table. */
1375 if (h == NULL
1376 || h->got.offset == (bfd_vma) -1)
1377 break;
1378
1379 {
1380 bfd_vma off;
1381
1382 sgot = elf_hash_table (info)->sgot;
1383 BFD_ASSERT (sgot != NULL);
1384
1385 off = h->got.offset;
1386 BFD_ASSERT (off < sgot->size);
1387
1388 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1389
1390 relocation = sgot->output_offset + off;
1391 /* The GOT relocation uses the addend. */
1392 rel->r_addend = 0;
1393
1394 /* Change the reference to be indirect. */
1395 contents[rel->r_offset - 1] |= 0x10;
1396 relocation += sgot->output_section->vma;
1397 }
1398 break;
1399
1400 case R_VAX_PC32:
1401 /* If we are creating an executable and the function this
1402 reloc refers to is in a shared lib, then we made a PLT
1403 entry for this symbol and need to handle the reloc like
1404 a PLT reloc. */
1405 if (bfd_link_pic (info))
1406 goto r_vax_pc32_shared;
1407 /* Fall through. */
1408 case R_VAX_PLT32:
1409 /* Relocation is to the entry for this symbol in the
1410 procedure linkage table. */
1411
1412 /* Resolve a PLTxx reloc against a local symbol directly,
1413 without using the procedure linkage table. */
1414 if (h == NULL
1415 || h->plt.offset == (bfd_vma) -1)
1416 break;
1417
1418 splt = elf_hash_table (info)->splt;
1419 BFD_ASSERT (splt != NULL);
1420
1421 sgotplt = elf_hash_table (info)->sgotplt;
1422 BFD_ASSERT (sgotplt != NULL);
1423
1424 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1425
1426 /* Get the offset into the .got table of the entry that
1427 corresponds to this function. Each .got entry is 4 bytes.
1428 The first two are reserved. */
1429 got_offset = (plt_index + 3) * 4;
1430
1431 /* We want the relocation to point into the .got.plt instead
1432 of the plt itself. */
1433 relocation = (sgotplt->output_section->vma
1434 + sgotplt->output_offset
1435 + got_offset);
1436 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1437 if (rel->r_addend == 2)
1438 {
1439 h->plt.offset |= 1;
1440 }
1441 else if (rel->r_addend != 0)
1442 _bfd_error_handler
1443 /* xgettext:c-format */
1444 (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1445 " from %pA section ignored"),
1446 input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1447 input_section);
1448 rel->r_addend = 0;
1449
1450 break;
1451
1452 case R_VAX_PC8:
1453 case R_VAX_PC16:
1454 r_vax_pc32_shared:
1455 if (h == NULL
1456 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1457 || h->forced_local)
1458 break;
1459 /* Fall through. */
1460 case R_VAX_8:
1461 case R_VAX_16:
1462 case R_VAX_32:
1463 if (bfd_link_pic (info)
1464 && r_symndx != STN_UNDEF
1465 && (input_section->flags & SEC_ALLOC) != 0
1466 && ((r_type != R_VAX_PC8
1467 && r_type != R_VAX_PC16
1468 && r_type != R_VAX_PC32)
1469 || ((input_section->flags & SEC_CODE)
1470 && (!info->symbolic
1471 || (!h->def_regular && h->type != STT_SECTION)))))
1472 {
1473 Elf_Internal_Rela outrel;
1474 bfd_byte *loc;
1475 bfd_boolean skip, relocate;
1476
1477 /* When generating a shared object, these relocations
1478 are copied into the output file to be resolved at run
1479 time. */
1480 if (sreloc == NULL)
1481 {
1482 sreloc = _bfd_elf_get_dynamic_reloc_section
1483 (input_bfd, input_section, /*rela?*/ TRUE);
1484 if (sreloc == NULL)
1485 return FALSE;
1486 }
1487
1488 skip = FALSE;
1489 relocate = FALSE;
1490
1491 outrel.r_offset =
1492 _bfd_elf_section_offset (output_bfd, info, input_section,
1493 rel->r_offset);
1494 if (outrel.r_offset == (bfd_vma) -1)
1495 skip = TRUE;
1496 if (outrel.r_offset == (bfd_vma) -2)
1497 skip = TRUE, relocate = TRUE;
1498 outrel.r_offset += (input_section->output_section->vma
1499 + input_section->output_offset);
1500
1501 if (skip)
1502 memset (&outrel, 0, sizeof outrel);
1503 /* h->dynindx may be -1 if the symbol was marked to
1504 become local. */
1505 else if (h != NULL
1506 && ((! info->symbolic && h->dynindx != -1)
1507 || !h->def_regular))
1508 {
1509 BFD_ASSERT (h->dynindx != -1);
1510 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1511 outrel.r_addend = relocation + rel->r_addend;
1512 }
1513 else
1514 {
1515 if (r_type == R_VAX_32)
1516 {
1517 relocate = TRUE;
1518 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1519 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1520 &contents[rel->r_offset]) == 0);
1521 outrel.r_addend = relocation + rel->r_addend;
1522 }
1523 else
1524 {
1525 long indx;
1526
1527 if (bfd_is_abs_section (sec))
1528 indx = 0;
1529 else if (sec == NULL || sec->owner == NULL)
1530 {
1531 bfd_set_error (bfd_error_bad_value);
1532 return FALSE;
1533 }
1534 else
1535 {
1536 asection *osec;
1537
1538 /* We are turning this relocation into one
1539 against a section symbol. It would be
1540 proper to subtract the symbol's value,
1541 osec->vma, from the emitted reloc addend,
1542 but ld.so expects buggy relocs. */
1543 osec = sec->output_section;
1544 indx = elf_section_data (osec)->dynindx;
1545 if (indx == 0)
1546 {
1547 struct elf_link_hash_table *htab;
1548 htab = elf_hash_table (info);
1549 osec = htab->text_index_section;
1550 indx = elf_section_data (osec)->dynindx;
1551 }
1552 BFD_ASSERT (indx != 0);
1553 }
1554
1555 outrel.r_info = ELF32_R_INFO (indx, r_type);
1556 outrel.r_addend = relocation + rel->r_addend;
1557 }
1558 }
1559
1560 if ((input_section->flags & SEC_CODE) != 0
1561 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1562 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1563 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1564 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1565 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1566 {
1567 if (h != NULL)
1568 _bfd_error_handler
1569 /* xgettext:c-format */
1570 (_("%pB: warning: %s relocation against symbol `%s'"
1571 " from %pA section"),
1572 input_bfd, howto->name, h->root.root.string,
1573 input_section);
1574 else
1575 _bfd_error_handler
1576 /* xgettext:c-format */
1577 (_("%pB: warning: %s relocation to %#" PRIx64
1578 " from %pA section"),
1579 input_bfd, howto->name, (uint64_t) outrel.r_addend,
1580 input_section);
1581 }
1582 loc = sreloc->contents;
1583 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1584 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1585
1586 /* This reloc will be computed at runtime, so there's no
1587 need to do anything now, except for R_VAX_32
1588 relocations that have been turned into
1589 R_VAX_RELATIVE. */
1590 if (!relocate)
1591 continue;
1592 }
1593
1594 break;
1595
1596 case R_VAX_GNU_VTINHERIT:
1597 case R_VAX_GNU_VTENTRY:
1598 /* These are no-ops in the end. */
1599 continue;
1600
1601 default:
1602 break;
1603 }
1604
1605 /* VAX PCREL relocations are from the end of relocation, not the start.
1606 So subtract the difference from the relocation amount since we can't
1607 add it to the offset. */
1608 if (howto->pc_relative && howto->pcrel_offset)
1609 relocation -= bfd_get_reloc_size(howto);
1610
1611 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1612 contents, rel->r_offset,
1613 relocation, rel->r_addend);
1614
1615 if (r != bfd_reloc_ok)
1616 {
1617 switch (r)
1618 {
1619 default:
1620 case bfd_reloc_outofrange:
1621 abort ();
1622 case bfd_reloc_overflow:
1623 {
1624 const char *name;
1625
1626 if (h != NULL)
1627 name = NULL;
1628 else
1629 {
1630 name = bfd_elf_string_from_elf_section (input_bfd,
1631 symtab_hdr->sh_link,
1632 sym->st_name);
1633 if (name == NULL)
1634 return FALSE;
1635 if (*name == '\0')
1636 name = bfd_section_name (input_bfd, sec);
1637 }
1638 info->callbacks->reloc_overflow
1639 (info, (h ? &h->root : NULL), name, howto->name,
1640 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1641 }
1642 break;
1643 }
1644 }
1645 }
1646
1647 return TRUE;
1648 }
1649
1650 /* Finish up dynamic symbol handling. We set the contents of various
1651 dynamic sections here. */
1652
1653 static bfd_boolean
1654 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1655 struct elf_link_hash_entry *h,
1656 Elf_Internal_Sym *sym)
1657 {
1658 bfd *dynobj;
1659
1660 dynobj = elf_hash_table (info)->dynobj;
1661
1662 if (h->plt.offset != (bfd_vma) -1)
1663 {
1664 asection *splt;
1665 asection *sgot;
1666 asection *srela;
1667 bfd_vma plt_index;
1668 bfd_vma got_offset;
1669 bfd_vma addend;
1670 Elf_Internal_Rela rela;
1671 bfd_byte *loc;
1672
1673 /* This symbol has an entry in the procedure linkage table. Set
1674 it up. */
1675 BFD_ASSERT (h->dynindx != -1);
1676
1677 splt = elf_hash_table (info)->splt;
1678 sgot = elf_hash_table (info)->sgotplt;
1679 srela = elf_hash_table (info)->srelplt;
1680 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1681
1682 addend = 2 * (h->plt.offset & 1);
1683 h->plt.offset &= ~1;
1684
1685 /* Get the index in the procedure linkage table which
1686 corresponds to this symbol. This is the index of this symbol
1687 in all the symbols for which we are making plt entries. The
1688 first entry in the procedure linkage table is reserved. */
1689 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1690
1691 /* Get the offset into the .got table of the entry that
1692 corresponds to this function. Each .got entry is 4 bytes.
1693 The first two are reserved. */
1694 got_offset = (plt_index + 3) * 4;
1695
1696 /* Fill in the entry in the procedure linkage table. */
1697 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1698 PLT_ENTRY_SIZE);
1699
1700 /* The offset is relative to the first extension word. */
1701 bfd_put_32 (output_bfd,
1702 -(h->plt.offset + 8),
1703 splt->contents + h->plt.offset + 4);
1704
1705 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1706 splt->contents + h->plt.offset + 8);
1707
1708 /* Fill in the entry in the global offset table. */
1709 bfd_put_32 (output_bfd,
1710 (splt->output_section->vma
1711 + splt->output_offset
1712 + h->plt.offset) + addend,
1713 sgot->contents + got_offset);
1714
1715 /* Fill in the entry in the .rela.plt section. */
1716 rela.r_offset = (sgot->output_section->vma
1717 + sgot->output_offset
1718 + got_offset);
1719 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1720 rela.r_addend = addend;
1721 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1722 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1723
1724 if (!h->def_regular)
1725 {
1726 /* Mark the symbol as undefined, rather than as defined in
1727 the .plt section. Leave the value alone. */
1728 sym->st_shndx = SHN_UNDEF;
1729 }
1730 }
1731
1732 if (h->got.offset != (bfd_vma) -1)
1733 {
1734 asection *sgot;
1735 asection *srela;
1736 Elf_Internal_Rela rela;
1737 bfd_byte *loc;
1738
1739 /* This symbol has an entry in the global offset table. Set it
1740 up. */
1741 sgot = elf_hash_table (info)->sgot;
1742 srela = elf_hash_table (info)->srelgot;
1743 BFD_ASSERT (sgot != NULL && srela != NULL);
1744
1745 rela.r_offset = (sgot->output_section->vma
1746 + sgot->output_offset
1747 + h->got.offset);
1748 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1749 rela.r_addend = bfd_get_signed_32 (output_bfd,
1750 sgot->contents + h->got.offset);
1751
1752 loc = srela->contents;
1753 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1754 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1755 }
1756
1757 if (h->needs_copy)
1758 {
1759 asection *s;
1760 Elf_Internal_Rela rela;
1761 bfd_byte *loc;
1762
1763 /* This symbol needs a copy reloc. Set it up. */
1764 BFD_ASSERT (h->dynindx != -1
1765 && (h->root.type == bfd_link_hash_defined
1766 || h->root.type == bfd_link_hash_defweak));
1767
1768 s = bfd_get_linker_section (dynobj, ".rela.bss");
1769 BFD_ASSERT (s != NULL);
1770
1771 rela.r_offset = (h->root.u.def.value
1772 + h->root.u.def.section->output_section->vma
1773 + h->root.u.def.section->output_offset);
1774 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1775 rela.r_addend = 0;
1776 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1777 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1778 }
1779
1780 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1781 if (h == elf_hash_table (info)->hdynamic
1782 || h == elf_hash_table (info)->hgot)
1783 sym->st_shndx = SHN_ABS;
1784
1785 return TRUE;
1786 }
1787
1788 /* Finish up the dynamic sections. */
1789
1790 static bfd_boolean
1791 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1792 {
1793 bfd *dynobj;
1794 asection *sgot;
1795 asection *sdyn;
1796
1797 dynobj = elf_hash_table (info)->dynobj;
1798
1799 sgot = elf_hash_table (info)->sgotplt;
1800 BFD_ASSERT (sgot != NULL);
1801 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1802
1803 if (elf_hash_table (info)->dynamic_sections_created)
1804 {
1805 asection *splt;
1806 Elf32_External_Dyn *dyncon, *dynconend;
1807
1808 splt = elf_hash_table (info)->splt;
1809 BFD_ASSERT (splt != NULL && sdyn != NULL);
1810
1811 dyncon = (Elf32_External_Dyn *) sdyn->contents;
1812 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1813 for (; dyncon < dynconend; dyncon++)
1814 {
1815 Elf_Internal_Dyn dyn;
1816 asection *s;
1817
1818 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1819
1820 switch (dyn.d_tag)
1821 {
1822 default:
1823 break;
1824
1825 case DT_PLTGOT:
1826 s = elf_hash_table (info)->sgotplt;
1827 goto get_vma;
1828 case DT_JMPREL:
1829 s = elf_hash_table (info)->srelplt;
1830 get_vma:
1831 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1832 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1833 break;
1834
1835 case DT_PLTRELSZ:
1836 s = elf_hash_table (info)->srelplt;
1837 dyn.d_un.d_val = s->size;
1838 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1839 break;
1840 }
1841 }
1842
1843 /* Fill in the first entry in the procedure linkage table. */
1844 if (splt->size > 0)
1845 {
1846 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1847 bfd_put_32 (output_bfd,
1848 (sgot->output_section->vma
1849 + sgot->output_offset + 4
1850 - (splt->output_section->vma + 6)),
1851 splt->contents + 2);
1852 bfd_put_32 (output_bfd,
1853 (sgot->output_section->vma
1854 + sgot->output_offset + 8
1855 - (splt->output_section->vma + 12)),
1856 splt->contents + 8);
1857 elf_section_data (splt->output_section)->this_hdr.sh_entsize
1858 = PLT_ENTRY_SIZE;
1859 }
1860 }
1861
1862 /* Fill in the first three entries in the global offset table. */
1863 if (sgot->size > 0)
1864 {
1865 if (sdyn == NULL)
1866 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1867 else
1868 bfd_put_32 (output_bfd,
1869 sdyn->output_section->vma + sdyn->output_offset,
1870 sgot->contents);
1871 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1872 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1873 }
1874
1875 if (elf_section_data (sgot->output_section) != NULL)
1876 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1877
1878 return TRUE;
1879 }
1880
1881 static enum elf_reloc_type_class
1882 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1883 const asection *rel_sec ATTRIBUTE_UNUSED,
1884 const Elf_Internal_Rela *rela)
1885 {
1886 switch ((int) ELF32_R_TYPE (rela->r_info))
1887 {
1888 case R_VAX_RELATIVE:
1889 return reloc_class_relative;
1890 case R_VAX_JMP_SLOT:
1891 return reloc_class_plt;
1892 case R_VAX_COPY:
1893 return reloc_class_copy;
1894 default:
1895 return reloc_class_normal;
1896 }
1897 }
1898
1899 static bfd_vma
1900 elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1901 const arelent *rel ATTRIBUTE_UNUSED)
1902 {
1903 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1904 }
1905
1906 #define TARGET_LITTLE_SYM vax_elf32_vec
1907 #define TARGET_LITTLE_NAME "elf32-vax"
1908 #define ELF_MACHINE_CODE EM_VAX
1909 #define ELF_MAXPAGESIZE 0x1000
1910
1911 #define elf_backend_create_dynamic_sections \
1912 _bfd_elf_create_dynamic_sections
1913 #define bfd_elf32_bfd_link_hash_table_create \
1914 elf_vax_link_hash_table_create
1915 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
1916
1917 #define elf_backend_check_relocs elf_vax_check_relocs
1918 #define elf_backend_adjust_dynamic_symbol \
1919 elf_vax_adjust_dynamic_symbol
1920 #define elf_backend_always_size_sections \
1921 elf_vax_always_size_sections
1922 #define elf_backend_size_dynamic_sections \
1923 elf_vax_size_dynamic_sections
1924 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
1925 #define elf_backend_relocate_section elf_vax_relocate_section
1926 #define elf_backend_finish_dynamic_symbol \
1927 elf_vax_finish_dynamic_symbol
1928 #define elf_backend_finish_dynamic_sections \
1929 elf_vax_finish_dynamic_sections
1930 #define elf_backend_reloc_type_class elf_vax_reloc_type_class
1931 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
1932 #define elf_backend_plt_sym_val elf_vax_plt_sym_val
1933 #define bfd_elf32_bfd_merge_private_bfd_data \
1934 elf32_vax_merge_private_bfd_data
1935 #define bfd_elf32_bfd_set_private_flags \
1936 elf32_vax_set_private_flags
1937 #define bfd_elf32_bfd_print_private_bfd_data \
1938 elf32_vax_print_private_bfd_data
1939
1940 #define elf_backend_can_gc_sections 1
1941 #define elf_backend_want_got_plt 1
1942 #define elf_backend_plt_readonly 1
1943 #define elf_backend_want_plt_sym 0
1944 #define elf_backend_got_header_size 16
1945 #define elf_backend_rela_normal 1
1946 #define elf_backend_dtrel_excludes_plt 1
1947
1948 #include "elf32-target.h"