unrecognized/unsupported reloc message
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
1 /* VAX series support for 32-bit ELF
2 Copyright (C) 1993-2018 Free Software Foundation, Inc.
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37 static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39 static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44 static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47 static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
49 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
51
52 static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
53 static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
54
55 static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
58 3, /* size (0 = byte, 1 = short, 2 = long) */
59 0, /* bitsize */
60 FALSE, /* pc_relative */
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
65 FALSE, /* partial_inplace */
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
68 FALSE), /* pcrel_offset */
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
74 FALSE, /* pc_relative */
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
79 FALSE, /* partial_inplace */
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
82 FALSE), /* pcrel_offset */
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
88 FALSE, /* pc_relative */
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
93 FALSE, /* partial_inplace */
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
96 FALSE), /* pcrel_offset */
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
102 FALSE, /* pc_relative */
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
107 FALSE, /* partial_inplace */
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
110 FALSE), /* pcrel_offset */
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
116 TRUE, /* pc_relative */
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
121 FALSE, /* partial_inplace */
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
124 TRUE), /* pcrel_offset */
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
130 TRUE, /* pc_relative */
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
135 FALSE, /* partial_inplace */
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
138 TRUE), /* pcrel_offset */
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
144 TRUE, /* pc_relative */
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
149 FALSE, /* partial_inplace */
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
152 TRUE), /* pcrel_offset */
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
158 TRUE, /* pc_relative */
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
163 FALSE, /* partial_inplace */
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
166 TRUE), /* pcrel_offset */
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
178 TRUE, /* pc_relative */
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
183 FALSE, /* partial_inplace */
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
186 TRUE), /* pcrel_offset */
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
198 FALSE, /* pc_relative */
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
203 FALSE, /* partial_inplace */
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
206 FALSE), /* pcrel_offset */
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
212 FALSE, /* pc_relative */
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
217 FALSE, /* partial_inplace */
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
220 FALSE), /* pcrel_offset */
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
226 FALSE, /* pc_relative */
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
231 FALSE, /* partial_inplace */
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
234 FALSE), /* pcrel_offset */
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
240 FALSE, /* pc_relative */
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
245 FALSE, /* partial_inplace */
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
248 FALSE), /* pcrel_offset */
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
255 FALSE, /* pc_relative */
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
260 FALSE, /* partial_inplace */
261 0, /* src_mask */
262 0, /* dst_mask */
263 FALSE), /* pcrel_offset */
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
270 FALSE, /* pc_relative */
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
275 FALSE, /* partial_inplace */
276 0, /* src_mask */
277 0, /* dst_mask */
278 FALSE), /* pcrel_offset */
279 };
280
281 static void
282 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
283 {
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
289 /* xgettext:c-format */
290 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
291 abfd, r_type);
292 bfd_set_error (bfd_error_bad_value);
293 r_type = R_VAX_NONE;
294 }
295 cache_ptr->howto = &howto_table[r_type];
296 }
297
298 #define elf_info_to_howto rtype_to_howto
299
300 static const struct
301 {
302 bfd_reloc_code_real_type bfd_val;
303 int elf_val;
304 } reloc_map[] = {
305 { BFD_RELOC_NONE, R_VAX_NONE },
306 { BFD_RELOC_32, R_VAX_32 },
307 { BFD_RELOC_16, R_VAX_16 },
308 { BFD_RELOC_8, R_VAX_8 },
309 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314 { BFD_RELOC_NONE, R_VAX_COPY },
315 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318 { BFD_RELOC_CTOR, R_VAX_32 },
319 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321 };
322
323 static reloc_howto_type *
324 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
325 {
326 unsigned int i;
327 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328 {
329 if (reloc_map[i].bfd_val == code)
330 return &howto_table[reloc_map[i].elf_val];
331 }
332 return 0;
333 }
334
335 static reloc_howto_type *
336 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337 const char *r_name)
338 {
339 unsigned int i;
340
341 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342 if (howto_table[i].name != NULL
343 && strcasecmp (howto_table[i].name, r_name) == 0)
344 return &howto_table[i];
345
346 return NULL;
347 }
348
349 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
350 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
351 #define ELF_ARCH bfd_arch_vax
352 /* end code generated by elf.el */
353 \f
354 /* Functions for the VAX ELF linker. */
355
356 /* The name of the dynamic interpreter. This is put in the .interp
357 section. */
358
359 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360
361 /* The size in bytes of an entry in the procedure linkage table. */
362
363 #define PLT_ENTRY_SIZE 12
364
365 /* The first entry in a procedure linkage table looks like this. See
366 the SVR4 ABI VAX supplement to see how this works. */
367
368 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369 {
370 0xdd, 0xef, /* pushl l^ */
371 0, 0, 0, 0, /* offset to .plt.got + 4 */
372 0x17, 0xff, /* jmp @L^(pc) */
373 0, 0, 0, 0, /* offset to .plt.got + 8 */
374 };
375
376 /* Subsequent entries in a procedure linkage table look like this. */
377
378 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379 {
380 0xfc, 0x0f, /* .word ^M<r11:r2> */
381 0x16, 0xef, /* jsb L^(pc) */
382 0, 0, 0, 0, /* replaced with offset to start of .plt */
383 0, 0, 0, 0, /* index into .rela.plt */
384 };
385
386 /* The VAX linker needs to keep track of the number of relocs that it
387 decides to copy in check_relocs for each symbol. This is so that it
388 can discard PC relative relocs if it doesn't need them when linking
389 with -Bsymbolic. We store the information in a field extending the
390 regular ELF linker hash table. */
391
392 /* This structure keeps track of the number of PC relative relocs we have
393 copied for a given symbol. */
394
395 struct elf_vax_pcrel_relocs_copied
396 {
397 /* Next section. */
398 struct elf_vax_pcrel_relocs_copied *next;
399 /* A section in dynobj. */
400 asection *section;
401 /* Number of relocs copied in this section. */
402 bfd_size_type count;
403 };
404
405 /* VAX ELF linker hash entry. */
406
407 struct elf_vax_link_hash_entry
408 {
409 struct elf_link_hash_entry root;
410
411 /* Number of PC relative relocs copied for this symbol. */
412 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413
414 bfd_vma got_addend;
415 };
416
417 /* Declare this now that the above structures are defined. */
418
419 static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
420 void *);
421
422 /* Declare this now that the above structures are defined. */
423
424 static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
425 void *);
426
427 /* Traverse an VAX ELF linker hash table. */
428
429 #define elf_vax_link_hash_traverse(table, func, info) \
430 (elf_link_hash_traverse \
431 ((table), \
432 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
433 (info)))
434
435 /* Create an entry in an VAX ELF linker hash table. */
436
437 static struct bfd_hash_entry *
438 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439 struct bfd_hash_table *table,
440 const char *string)
441 {
442 struct elf_vax_link_hash_entry *ret =
443 (struct elf_vax_link_hash_entry *) entry;
444
445 /* Allocate the structure if it has not already been allocated by a
446 subclass. */
447 if (ret == NULL)
448 ret = ((struct elf_vax_link_hash_entry *)
449 bfd_hash_allocate (table,
450 sizeof (struct elf_vax_link_hash_entry)));
451 if (ret == NULL)
452 return (struct bfd_hash_entry *) ret;
453
454 /* Call the allocation method of the superclass. */
455 ret = ((struct elf_vax_link_hash_entry *)
456 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457 table, string));
458 if (ret != NULL)
459 {
460 ret->pcrel_relocs_copied = NULL;
461 }
462
463 return (struct bfd_hash_entry *) ret;
464 }
465
466 /* Create an VAX ELF linker hash table. */
467
468 static struct bfd_link_hash_table *
469 elf_vax_link_hash_table_create (bfd *abfd)
470 {
471 struct elf_link_hash_table *ret;
472 bfd_size_type amt = sizeof (struct elf_link_hash_table);
473
474 ret = bfd_zmalloc (amt);
475 if (ret == NULL)
476 return NULL;
477
478 if (!_bfd_elf_link_hash_table_init (ret, abfd,
479 elf_vax_link_hash_newfunc,
480 sizeof (struct elf_vax_link_hash_entry),
481 GENERIC_ELF_DATA))
482 {
483 free (ret);
484 return NULL;
485 }
486
487 return &ret->root;
488 }
489
490 /* Keep vax-specific flags in the ELF header */
491 static bfd_boolean
492 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
493 {
494 elf_elfheader (abfd)->e_flags = flags;
495 elf_flags_init (abfd) = TRUE;
496 return TRUE;
497 }
498
499 /* Merge backend specific data from an object file to the output
500 object file when linking. */
501 static bfd_boolean
502 elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
503 {
504 bfd *obfd = info->output_bfd;
505 flagword in_flags;
506
507 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
508 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
509 return TRUE;
510
511 in_flags = elf_elfheader (ibfd)->e_flags;
512
513 if (!elf_flags_init (obfd))
514 {
515 elf_flags_init (obfd) = TRUE;
516 elf_elfheader (obfd)->e_flags = in_flags;
517 }
518
519 return TRUE;
520 }
521
522 /* Display the flags field */
523 static bfd_boolean
524 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
525 {
526 FILE *file = (FILE *) ptr;
527
528 BFD_ASSERT (abfd != NULL && ptr != NULL);
529
530 /* Print normal ELF private data. */
531 _bfd_elf_print_private_bfd_data (abfd, ptr);
532
533 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
534
535 /* xgettext:c-format */
536 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
537
538 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
539 fprintf (file, _(" [nonpic]"));
540
541 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
542 fprintf (file, _(" [d-float]"));
543
544 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
545 fprintf (file, _(" [g-float]"));
546
547 fputc ('\n', file);
548
549 return TRUE;
550 }
551 /* Look through the relocs for a section during the first phase, and
552 allocate space in the global offset table or procedure linkage
553 table. */
554
555 static bfd_boolean
556 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
557 const Elf_Internal_Rela *relocs)
558 {
559 bfd *dynobj;
560 Elf_Internal_Shdr *symtab_hdr;
561 struct elf_link_hash_entry **sym_hashes;
562 const Elf_Internal_Rela *rel;
563 const Elf_Internal_Rela *rel_end;
564 asection *sreloc;
565
566 if (bfd_link_relocatable (info))
567 return TRUE;
568
569 dynobj = elf_hash_table (info)->dynobj;
570 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
571 sym_hashes = elf_sym_hashes (abfd);
572
573 sreloc = NULL;
574
575 rel_end = relocs + sec->reloc_count;
576 for (rel = relocs; rel < rel_end; rel++)
577 {
578 unsigned long r_symndx;
579 struct elf_link_hash_entry *h;
580
581 r_symndx = ELF32_R_SYM (rel->r_info);
582
583 if (r_symndx < symtab_hdr->sh_info)
584 h = NULL;
585 else
586 {
587 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
588 while (h->root.type == bfd_link_hash_indirect
589 || h->root.type == bfd_link_hash_warning)
590 h = (struct elf_link_hash_entry *) h->root.u.i.link;
591 }
592
593 switch (ELF32_R_TYPE (rel->r_info))
594 {
595 case R_VAX_GOT32:
596 BFD_ASSERT (h != NULL);
597
598 /* If this is a local symbol, we resolve it directly without
599 creating a global offset table entry. */
600 if (h->forced_local
601 || h == elf_hash_table (info)->hgot
602 || h == elf_hash_table (info)->hplt)
603 break;
604
605 /* This symbol requires a global offset table entry. */
606
607 if (dynobj == NULL)
608 {
609 /* Create the .got section. */
610 elf_hash_table (info)->dynobj = dynobj = abfd;
611 if (!_bfd_elf_create_got_section (dynobj, info))
612 return FALSE;
613 }
614
615 if (h != NULL)
616 {
617 struct elf_vax_link_hash_entry *eh;
618
619 eh = (struct elf_vax_link_hash_entry *) h;
620 if (h->got.refcount == -1)
621 {
622 h->got.refcount = 1;
623 eh->got_addend = rel->r_addend;
624 }
625 else
626 {
627 h->got.refcount++;
628 if (eh->got_addend != (bfd_vma) rel->r_addend)
629 _bfd_error_handler
630 /* xgettext:c-format */
631 (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
632 " not match previous GOT addend of %" PRId64),
633 abfd, (int64_t) rel->r_addend, h->root.root.string,
634 (int64_t) eh->got_addend);
635
636 }
637 }
638 break;
639
640 case R_VAX_PLT32:
641 /* This symbol requires a procedure linkage table entry. We
642 actually build the entry in adjust_dynamic_symbol,
643 because this might be a case of linking PIC code which is
644 never referenced by a dynamic object, in which case we
645 don't need to generate a procedure linkage table entry
646 after all. */
647 BFD_ASSERT (h != NULL);
648
649 /* If this is a local symbol, we resolve it directly without
650 creating a procedure linkage table entry. */
651 if (h->forced_local)
652 break;
653
654 h->needs_plt = 1;
655 if (h->plt.refcount == -1)
656 h->plt.refcount = 1;
657 else
658 h->plt.refcount++;
659 break;
660
661 case R_VAX_PC8:
662 case R_VAX_PC16:
663 case R_VAX_PC32:
664 /* If we are creating a shared library and this is not a local
665 symbol, we need to copy the reloc into the shared library.
666 However when linking with -Bsymbolic and this is a global
667 symbol which is defined in an object we are including in the
668 link (i.e., DEF_REGULAR is set), then we can resolve the
669 reloc directly. At this point we have not seen all the input
670 files, so it is possible that DEF_REGULAR is not set now but
671 will be set later (it is never cleared). We account for that
672 possibility below by storing information in the
673 pcrel_relocs_copied field of the hash table entry. */
674 if (!(bfd_link_pic (info)
675 && (sec->flags & SEC_ALLOC) != 0
676 && h != NULL
677 && (!info->symbolic
678 || !h->def_regular)))
679 {
680 if (h != NULL
681 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
682 && !h->forced_local)
683 {
684 /* Make sure a plt entry is created for this symbol if
685 it turns out to be a function defined by a dynamic
686 object. */
687 if (h->plt.refcount == -1)
688 h->plt.refcount = 1;
689 else
690 h->plt.refcount++;
691 }
692 break;
693 }
694 /* If this is a local symbol, we can resolve it directly. */
695 if (h != NULL
696 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
697 || h->forced_local))
698 break;
699
700 /* Fall through. */
701 case R_VAX_8:
702 case R_VAX_16:
703 case R_VAX_32:
704 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
705 {
706 /* Make sure a plt entry is created for this symbol if it
707 turns out to be a function defined by a dynamic object. */
708 if (h->plt.refcount == -1)
709 h->plt.refcount = 1;
710 else
711 h->plt.refcount++;
712 }
713
714 /* If we are creating a shared library, we need to copy the
715 reloc into the shared library. */
716 if (bfd_link_pic (info)
717 && (sec->flags & SEC_ALLOC) != 0)
718 {
719 /* When creating a shared object, we must copy these
720 reloc types into the output file. We create a reloc
721 section in dynobj and make room for this reloc. */
722 if (sreloc == NULL)
723 {
724 sreloc = _bfd_elf_make_dynamic_reloc_section
725 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
726
727 if (sreloc == NULL)
728 return FALSE;
729
730 if (sec->flags & SEC_READONLY)
731 info->flags |= DF_TEXTREL;
732 }
733
734 sreloc->size += sizeof (Elf32_External_Rela);
735
736 /* If we are linking with -Bsymbolic, we count the number of
737 PC relative relocations we have entered for this symbol,
738 so that we can discard them again if the symbol is later
739 defined by a regular object. Note that this function is
740 only called if we are using a vaxelf linker hash table,
741 which means that h is really a pointer to an
742 elf_vax_link_hash_entry. */
743 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
744 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
745 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
746 && info->symbolic)
747 {
748 struct elf_vax_link_hash_entry *eh;
749 struct elf_vax_pcrel_relocs_copied *p;
750
751 eh = (struct elf_vax_link_hash_entry *) h;
752
753 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
754 if (p->section == sreloc)
755 break;
756
757 if (p == NULL)
758 {
759 p = ((struct elf_vax_pcrel_relocs_copied *)
760 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
761 if (p == NULL)
762 return FALSE;
763 p->next = eh->pcrel_relocs_copied;
764 eh->pcrel_relocs_copied = p;
765 p->section = sreloc;
766 p->count = 0;
767 }
768
769 ++p->count;
770 }
771 }
772
773 break;
774
775 /* This relocation describes the C++ object vtable hierarchy.
776 Reconstruct it for later use during GC. */
777 case R_VAX_GNU_VTINHERIT:
778 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
779 return FALSE;
780 break;
781
782 /* This relocation describes which C++ vtable entries are actually
783 used. Record for later use during GC. */
784 case R_VAX_GNU_VTENTRY:
785 BFD_ASSERT (h != NULL);
786 if (h != NULL
787 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
788 return FALSE;
789 break;
790
791 default:
792 break;
793 }
794 }
795
796 return TRUE;
797 }
798
799 /* Return the section that should be marked against GC for a given
800 relocation. */
801
802 static asection *
803 elf_vax_gc_mark_hook (asection *sec,
804 struct bfd_link_info *info,
805 Elf_Internal_Rela *rel,
806 struct elf_link_hash_entry *h,
807 Elf_Internal_Sym *sym)
808 {
809 if (h != NULL)
810 switch (ELF32_R_TYPE (rel->r_info))
811 {
812 case R_VAX_GNU_VTINHERIT:
813 case R_VAX_GNU_VTENTRY:
814 return NULL;
815 }
816
817 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
818 }
819
820 /* Adjust a symbol defined by a dynamic object and referenced by a
821 regular object. The current definition is in some section of the
822 dynamic object, but we're not including those sections. We have to
823 change the definition to something the rest of the link can
824 understand. */
825
826 static bfd_boolean
827 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
828 struct elf_link_hash_entry *h)
829 {
830 bfd *dynobj;
831 asection *s;
832
833 dynobj = elf_hash_table (info)->dynobj;
834
835 /* Make sure we know what is going on here. */
836 BFD_ASSERT (dynobj != NULL
837 && (h->needs_plt
838 || h->is_weakalias
839 || (h->def_dynamic
840 && h->ref_regular
841 && !h->def_regular)));
842
843 /* If this is a function, put it in the procedure linkage table. We
844 will fill in the contents of the procedure linkage table later,
845 when we know the address of the .got section. */
846 if (h->type == STT_FUNC
847 || h->needs_plt)
848 {
849 if (h->plt.refcount <= 0
850 || SYMBOL_CALLS_LOCAL (info, h)
851 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
852 && h->root.type == bfd_link_hash_undefweak))
853 {
854 /* This case can occur if we saw a PLTxx reloc in an input
855 file, but the symbol was never referred to by a dynamic
856 object, or if all references were garbage collected. In
857 such a case, we don't actually need to build a procedure
858 linkage table, and we can just do a PCxx reloc instead. */
859 h->plt.offset = (bfd_vma) -1;
860 h->needs_plt = 0;
861 return TRUE;
862 }
863
864 s = elf_hash_table (info)->splt;
865 BFD_ASSERT (s != NULL);
866
867 /* If this is the first .plt entry, make room for the special
868 first entry. */
869 if (s->size == 0)
870 {
871 s->size += PLT_ENTRY_SIZE;
872 }
873
874 /* If this symbol is not defined in a regular file, and we are
875 not generating a shared library, then set the symbol to this
876 location in the .plt. This is required to make function
877 pointers compare as equal between the normal executable and
878 the shared library. */
879 if (!bfd_link_pic (info)
880 && !h->def_regular)
881 {
882 h->root.u.def.section = s;
883 h->root.u.def.value = s->size;
884 }
885
886 h->plt.offset = s->size;
887
888 /* Make room for this entry. */
889 s->size += PLT_ENTRY_SIZE;
890
891 /* We also need to make an entry in the .got.plt section, which
892 will be placed in the .got section by the linker script. */
893
894 s = elf_hash_table (info)->sgotplt;
895 BFD_ASSERT (s != NULL);
896 s->size += 4;
897
898 /* We also need to make an entry in the .rela.plt section. */
899
900 s = elf_hash_table (info)->srelplt;
901 BFD_ASSERT (s != NULL);
902 s->size += sizeof (Elf32_External_Rela);
903
904 return TRUE;
905 }
906
907 /* Reinitialize the plt offset now that it is not used as a reference
908 count any more. */
909 h->plt.offset = (bfd_vma) -1;
910
911 /* If this is a weak symbol, and there is a real definition, the
912 processor independent code will have arranged for us to see the
913 real definition first, and we can just use the same value. */
914 if (h->is_weakalias)
915 {
916 struct elf_link_hash_entry *def = weakdef (h);
917 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
918 h->root.u.def.section = def->root.u.def.section;
919 h->root.u.def.value = def->root.u.def.value;
920 return TRUE;
921 }
922
923 /* This is a reference to a symbol defined by a dynamic object which
924 is not a function. */
925
926 /* If we are creating a shared library, we must presume that the
927 only references to the symbol are via the global offset table.
928 For such cases we need not do anything here; the relocations will
929 be handled correctly by relocate_section. */
930 if (bfd_link_pic (info))
931 return TRUE;
932
933 /* We must allocate the symbol in our .dynbss section, which will
934 become part of the .bss section of the executable. There will be
935 an entry for this symbol in the .dynsym section. The dynamic
936 object will contain position independent code, so all references
937 from the dynamic object to this symbol will go through the global
938 offset table. The dynamic linker will use the .dynsym entry to
939 determine the address it must put in the global offset table, so
940 both the dynamic object and the regular object will refer to the
941 same memory location for the variable. */
942
943 s = bfd_get_linker_section (dynobj, ".dynbss");
944 BFD_ASSERT (s != NULL);
945
946 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
947 copy the initial value out of the dynamic object and into the
948 runtime process image. We need to remember the offset into the
949 .rela.bss section we are going to use. */
950 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
951 {
952 asection *srel;
953
954 srel = bfd_get_linker_section (dynobj, ".rela.bss");
955 BFD_ASSERT (srel != NULL);
956 srel->size += sizeof (Elf32_External_Rela);
957 h->needs_copy = 1;
958 }
959
960 return _bfd_elf_adjust_dynamic_copy (info, h, s);
961 }
962
963 /* This function is called via elf_link_hash_traverse. It resets GOT
964 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
965 will be done. */
966
967 static bfd_boolean
968 elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
969 void *infoptr ATTRIBUTE_UNUSED)
970 {
971 h->got.refcount = -1;
972 h->plt.refcount = -1;
973
974 return TRUE;
975 }
976
977 /* Discard unused dynamic data if this is a static link. */
978
979 static bfd_boolean
980 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
981 struct bfd_link_info *info)
982 {
983 bfd *dynobj;
984 asection *s;
985
986 dynobj = elf_hash_table (info)->dynobj;
987
988 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
989 {
990 /* We may have created entries in the .rela.got and .got sections.
991 However, if we are not creating the dynamic sections, we will
992 not actually use these entries. Reset the size of .rela.got
993 and .got, which will cause them to get stripped from the output
994 file below. */
995 s = elf_hash_table (info)->srelgot;
996 if (s != NULL)
997 s->size = 0;
998 s = elf_hash_table (info)->sgotplt;
999 if (s != NULL)
1000 s->size = 0;
1001 s = elf_hash_table (info)->sgot;
1002 if (s != NULL)
1003 s->size = 0;
1004 }
1005
1006 /* If this is a static link, we need to discard all the got entries we've
1007 recorded. */
1008 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1009 elf_link_hash_traverse (elf_hash_table (info),
1010 elf_vax_discard_got_entries,
1011 info);
1012
1013 return TRUE;
1014 }
1015
1016 /* Set the sizes of the dynamic sections. */
1017
1018 static bfd_boolean
1019 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1020 {
1021 bfd *dynobj;
1022 asection *s;
1023 bfd_boolean plt;
1024 bfd_boolean relocs;
1025 bfd_boolean reltext;
1026
1027 dynobj = elf_hash_table (info)->dynobj;
1028 BFD_ASSERT (dynobj != NULL);
1029
1030 if (elf_hash_table (info)->dynamic_sections_created)
1031 {
1032 /* Set the contents of the .interp section to the interpreter. */
1033 if (bfd_link_executable (info) && !info->nointerp)
1034 {
1035 s = bfd_get_linker_section (dynobj, ".interp");
1036 BFD_ASSERT (s != NULL);
1037 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1038 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1039 }
1040 }
1041
1042 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1043 relative relocs against symbols defined in a regular object. We
1044 allocated space for them in the check_relocs routine, but we will not
1045 fill them in in the relocate_section routine. */
1046 if (bfd_link_pic (info) && info->symbolic)
1047 elf_vax_link_hash_traverse (elf_hash_table (info),
1048 elf_vax_discard_copies,
1049 NULL);
1050
1051 /* If this is a -Bsymbolic shared link, we need to discard all the got
1052 entries we've recorded. Otherwise, we need to instantiate (allocate
1053 space for them). */
1054 elf_link_hash_traverse (elf_hash_table (info),
1055 elf_vax_instantiate_got_entries,
1056 info);
1057
1058 /* The check_relocs and adjust_dynamic_symbol entry points have
1059 determined the sizes of the various dynamic sections. Allocate
1060 memory for them. */
1061 plt = FALSE;
1062 relocs = FALSE;
1063 reltext = FALSE;
1064 for (s = dynobj->sections; s != NULL; s = s->next)
1065 {
1066 const char *name;
1067
1068 if ((s->flags & SEC_LINKER_CREATED) == 0)
1069 continue;
1070
1071 /* It's OK to base decisions on the section name, because none
1072 of the dynobj section names depend upon the input files. */
1073 name = bfd_get_section_name (dynobj, s);
1074
1075 if (strcmp (name, ".plt") == 0)
1076 {
1077 /* Remember whether there is a PLT. */
1078 plt = s->size != 0;
1079 }
1080 else if (CONST_STRNEQ (name, ".rela"))
1081 {
1082 if (s->size != 0)
1083 {
1084 asection *target;
1085
1086 /* Remember whether there are any reloc sections other
1087 than .rela.plt. */
1088 if (strcmp (name, ".rela.plt") != 0)
1089 {
1090 const char *outname;
1091
1092 relocs = TRUE;
1093
1094 /* If this relocation section applies to a read only
1095 section, then we probably need a DT_TEXTREL
1096 entry. .rela.plt is actually associated with
1097 .got.plt, which is never readonly. */
1098 outname = bfd_get_section_name (output_bfd,
1099 s->output_section);
1100 target = bfd_get_section_by_name (output_bfd, outname + 5);
1101 if (target != NULL
1102 && (target->flags & SEC_READONLY) != 0
1103 && (target->flags & SEC_ALLOC) != 0)
1104 reltext = TRUE;
1105 }
1106
1107 /* We use the reloc_count field as a counter if we need
1108 to copy relocs into the output file. */
1109 s->reloc_count = 0;
1110 }
1111 }
1112 else if (! CONST_STRNEQ (name, ".got")
1113 && strcmp (name, ".dynbss") != 0)
1114 {
1115 /* It's not one of our sections, so don't allocate space. */
1116 continue;
1117 }
1118
1119 if (s->size == 0)
1120 {
1121 /* If we don't need this section, strip it from the
1122 output file. This is mostly to handle .rela.bss and
1123 .rela.plt. We must create both sections in
1124 create_dynamic_sections, because they must be created
1125 before the linker maps input sections to output
1126 sections. The linker does that before
1127 adjust_dynamic_symbol is called, and it is that
1128 function which decides whether anything needs to go
1129 into these sections. */
1130 s->flags |= SEC_EXCLUDE;
1131 continue;
1132 }
1133
1134 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1135 continue;
1136
1137 /* Allocate memory for the section contents. */
1138 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1139 if (s->contents == NULL)
1140 return FALSE;
1141 }
1142
1143 if (elf_hash_table (info)->dynamic_sections_created)
1144 {
1145 /* Add some entries to the .dynamic section. We fill in the
1146 values later, in elf_vax_finish_dynamic_sections, but we
1147 must add the entries now so that we get the correct size for
1148 the .dynamic section. The DT_DEBUG entry is filled in by the
1149 dynamic linker and used by the debugger. */
1150 #define add_dynamic_entry(TAG, VAL) \
1151 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1152
1153 if (!bfd_link_pic (info))
1154 {
1155 if (!add_dynamic_entry (DT_DEBUG, 0))
1156 return FALSE;
1157 }
1158
1159 if (plt)
1160 {
1161 if (!add_dynamic_entry (DT_PLTGOT, 0)
1162 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1163 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1164 || !add_dynamic_entry (DT_JMPREL, 0))
1165 return FALSE;
1166 }
1167
1168 if (relocs)
1169 {
1170 if (!add_dynamic_entry (DT_RELA, 0)
1171 || !add_dynamic_entry (DT_RELASZ, 0)
1172 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1173 return FALSE;
1174 }
1175
1176 if (reltext || (info->flags & DF_TEXTREL) != 0)
1177 {
1178 if (!add_dynamic_entry (DT_TEXTREL, 0))
1179 return FALSE;
1180 }
1181 }
1182 #undef add_dynamic_entry
1183
1184 return TRUE;
1185 }
1186
1187 /* This function is called via elf_vax_link_hash_traverse if we are
1188 creating a shared object with -Bsymbolic. It discards the space
1189 allocated to copy PC relative relocs against symbols which are defined
1190 in regular objects. We allocated space for them in the check_relocs
1191 routine, but we won't fill them in in the relocate_section routine. */
1192
1193 static bfd_boolean
1194 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1195 void * ignore ATTRIBUTE_UNUSED)
1196 {
1197 struct elf_vax_pcrel_relocs_copied *s;
1198
1199 /* We only discard relocs for symbols defined in a regular object. */
1200 if (!h->root.def_regular)
1201 return TRUE;
1202
1203 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1204 s->section->size -= s->count * sizeof (Elf32_External_Rela);
1205
1206 return TRUE;
1207 }
1208
1209 /* This function is called via elf_link_hash_traverse. It looks for
1210 entries that have GOT or PLT (.GOT) references. If creating a shared
1211 object with -Bsymbolic, or the symbol has been forced local, then it
1212 resets the reference count back to -1 so normal PC32 relocation will
1213 be done. Otherwise space in the .got and .rela.got will be reserved
1214 for the symbol. */
1215
1216 static bfd_boolean
1217 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1218 {
1219 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1220 bfd *dynobj;
1221 asection *sgot;
1222 asection *srelgot;
1223
1224 /* We don't care about non-GOT (and non-PLT) entries. */
1225 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1226 return TRUE;
1227
1228 dynobj = elf_hash_table (info)->dynobj;
1229 BFD_ASSERT (dynobj != NULL);
1230
1231 sgot = elf_hash_table (info)->sgot;
1232 srelgot = elf_hash_table (info)->srelgot;
1233
1234 if (SYMBOL_REFERENCES_LOCAL (info, h))
1235 {
1236 h->got.refcount = -1;
1237 h->plt.refcount = -1;
1238 }
1239 else if (h->got.refcount > 0)
1240 {
1241 /* Make sure this symbol is output as a dynamic symbol. */
1242 if (h->dynindx == -1)
1243 {
1244 if (!bfd_elf_link_record_dynamic_symbol (info, h))
1245 return FALSE;
1246 }
1247
1248 /* Allocate space in the .got and .rela.got sections. */
1249 sgot->size += 4;
1250 srelgot->size += sizeof (Elf32_External_Rela);
1251 }
1252
1253 return TRUE;
1254 }
1255
1256 /* Relocate an VAX ELF section. */
1257
1258 static bfd_boolean
1259 elf_vax_relocate_section (bfd *output_bfd,
1260 struct bfd_link_info *info,
1261 bfd *input_bfd,
1262 asection *input_section,
1263 bfd_byte *contents,
1264 Elf_Internal_Rela *relocs,
1265 Elf_Internal_Sym *local_syms,
1266 asection **local_sections)
1267 {
1268 Elf_Internal_Shdr *symtab_hdr;
1269 struct elf_link_hash_entry **sym_hashes;
1270 bfd_vma plt_index;
1271 bfd_vma got_offset;
1272 asection *sgot;
1273 asection *splt;
1274 asection *sgotplt;
1275 asection *sreloc;
1276 Elf_Internal_Rela *rel;
1277 Elf_Internal_Rela *relend;
1278
1279 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1280 sym_hashes = elf_sym_hashes (input_bfd);
1281
1282 sgot = NULL;
1283 splt = NULL;
1284 sgotplt = NULL;
1285 sreloc = NULL;
1286
1287 rel = relocs;
1288 relend = relocs + input_section->reloc_count;
1289 for (; rel < relend; rel++)
1290 {
1291 int r_type;
1292 reloc_howto_type *howto;
1293 unsigned long r_symndx;
1294 struct elf_link_hash_entry *h;
1295 Elf_Internal_Sym *sym;
1296 asection *sec;
1297 bfd_vma relocation;
1298 bfd_reloc_status_type r;
1299
1300 r_type = ELF32_R_TYPE (rel->r_info);
1301 if (r_type < 0 || r_type >= (int) R_VAX_max)
1302 {
1303 bfd_set_error (bfd_error_bad_value);
1304 return FALSE;
1305 }
1306 howto = howto_table + r_type;
1307
1308 r_symndx = ELF32_R_SYM (rel->r_info);
1309 h = NULL;
1310 sym = NULL;
1311 sec = NULL;
1312 if (r_symndx < symtab_hdr->sh_info)
1313 {
1314 sym = local_syms + r_symndx;
1315 sec = local_sections[r_symndx];
1316 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1317 }
1318 else
1319 {
1320 bfd_boolean unresolved_reloc;
1321 bfd_boolean warned, ignored;
1322
1323 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1324 r_symndx, symtab_hdr, sym_hashes,
1325 h, sec, relocation,
1326 unresolved_reloc, warned, ignored);
1327
1328 if ((h->root.type == bfd_link_hash_defined
1329 || h->root.type == bfd_link_hash_defweak)
1330 && ((r_type == R_VAX_PLT32
1331 && h->plt.offset != (bfd_vma) -1
1332 && !h->forced_local
1333 && elf_hash_table (info)->dynamic_sections_created)
1334 || (r_type == R_VAX_GOT32
1335 && h->got.offset != (bfd_vma) -1
1336 && !h->forced_local
1337 && elf_hash_table (info)->dynamic_sections_created
1338 && (! bfd_link_pic (info)
1339 || (! info->symbolic && h->dynindx != -1)
1340 || !h->def_regular))
1341 || (bfd_link_pic (info)
1342 && ((! info->symbolic && h->dynindx != -1)
1343 || !h->def_regular)
1344 && ((input_section->flags & SEC_ALLOC) != 0
1345 /* DWARF will emit R_VAX_32 relocations in its
1346 sections against symbols defined externally
1347 in shared libraries. We can't do anything
1348 with them here. */
1349
1350 || ((input_section->flags & SEC_DEBUGGING) != 0
1351 && h->def_dynamic))
1352 && (r_type == R_VAX_8
1353 || r_type == R_VAX_16
1354 || r_type == R_VAX_32))))
1355 /* In these cases, we don't need the relocation
1356 value. We check specially because in some
1357 obscure cases sec->output_section will be NULL. */
1358 relocation = 0;
1359 }
1360
1361 if (sec != NULL && discarded_section (sec))
1362 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1363 rel, 1, relend, howto, 0, contents);
1364
1365 if (bfd_link_relocatable (info))
1366 continue;
1367
1368 switch (r_type)
1369 {
1370 case R_VAX_GOT32:
1371 /* Relocation is to the address of the entry for this symbol
1372 in the global offset table. */
1373
1374 /* Resolve a GOTxx reloc against a local symbol directly,
1375 without using the global offset table. */
1376 if (h == NULL
1377 || h->got.offset == (bfd_vma) -1)
1378 break;
1379
1380 {
1381 bfd_vma off;
1382
1383 sgot = elf_hash_table (info)->sgot;
1384 BFD_ASSERT (sgot != NULL);
1385
1386 off = h->got.offset;
1387 BFD_ASSERT (off < sgot->size);
1388
1389 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1390
1391 relocation = sgot->output_offset + off;
1392 /* The GOT relocation uses the addend. */
1393 rel->r_addend = 0;
1394
1395 /* Change the reference to be indirect. */
1396 contents[rel->r_offset - 1] |= 0x10;
1397 relocation += sgot->output_section->vma;
1398 }
1399 break;
1400
1401 case R_VAX_PC32:
1402 /* If we are creating an executable and the function this
1403 reloc refers to is in a shared lib, then we made a PLT
1404 entry for this symbol and need to handle the reloc like
1405 a PLT reloc. */
1406 if (bfd_link_pic (info))
1407 goto r_vax_pc32_shared;
1408 /* Fall through. */
1409 case R_VAX_PLT32:
1410 /* Relocation is to the entry for this symbol in the
1411 procedure linkage table. */
1412
1413 /* Resolve a PLTxx reloc against a local symbol directly,
1414 without using the procedure linkage table. */
1415 if (h == NULL
1416 || h->plt.offset == (bfd_vma) -1)
1417 break;
1418
1419 splt = elf_hash_table (info)->splt;
1420 BFD_ASSERT (splt != NULL);
1421
1422 sgotplt = elf_hash_table (info)->sgotplt;
1423 BFD_ASSERT (sgotplt != NULL);
1424
1425 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1426
1427 /* Get the offset into the .got table of the entry that
1428 corresponds to this function. Each .got entry is 4 bytes.
1429 The first two are reserved. */
1430 got_offset = (plt_index + 3) * 4;
1431
1432 /* We want the relocation to point into the .got.plt instead
1433 of the plt itself. */
1434 relocation = (sgotplt->output_section->vma
1435 + sgotplt->output_offset
1436 + got_offset);
1437 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1438 if (rel->r_addend == 2)
1439 {
1440 h->plt.offset |= 1;
1441 }
1442 else if (rel->r_addend != 0)
1443 _bfd_error_handler
1444 /* xgettext:c-format */
1445 (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1446 " from %pA section ignored"),
1447 input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1448 input_section);
1449 rel->r_addend = 0;
1450
1451 break;
1452
1453 case R_VAX_PC8:
1454 case R_VAX_PC16:
1455 r_vax_pc32_shared:
1456 if (h == NULL
1457 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1458 || h->forced_local)
1459 break;
1460 /* Fall through. */
1461 case R_VAX_8:
1462 case R_VAX_16:
1463 case R_VAX_32:
1464 if (bfd_link_pic (info)
1465 && r_symndx != STN_UNDEF
1466 && (input_section->flags & SEC_ALLOC) != 0
1467 && ((r_type != R_VAX_PC8
1468 && r_type != R_VAX_PC16
1469 && r_type != R_VAX_PC32)
1470 || ((input_section->flags & SEC_CODE)
1471 && (!info->symbolic
1472 || (!h->def_regular && h->type != STT_SECTION)))))
1473 {
1474 Elf_Internal_Rela outrel;
1475 bfd_byte *loc;
1476 bfd_boolean skip, relocate;
1477
1478 /* When generating a shared object, these relocations
1479 are copied into the output file to be resolved at run
1480 time. */
1481 if (sreloc == NULL)
1482 {
1483 sreloc = _bfd_elf_get_dynamic_reloc_section
1484 (input_bfd, input_section, /*rela?*/ TRUE);
1485 if (sreloc == NULL)
1486 return FALSE;
1487 }
1488
1489 skip = FALSE;
1490 relocate = FALSE;
1491
1492 outrel.r_offset =
1493 _bfd_elf_section_offset (output_bfd, info, input_section,
1494 rel->r_offset);
1495 if (outrel.r_offset == (bfd_vma) -1)
1496 skip = TRUE;
1497 if (outrel.r_offset == (bfd_vma) -2)
1498 skip = TRUE, relocate = TRUE;
1499 outrel.r_offset += (input_section->output_section->vma
1500 + input_section->output_offset);
1501
1502 if (skip)
1503 memset (&outrel, 0, sizeof outrel);
1504 /* h->dynindx may be -1 if the symbol was marked to
1505 become local. */
1506 else if (h != NULL
1507 && ((! info->symbolic && h->dynindx != -1)
1508 || !h->def_regular))
1509 {
1510 BFD_ASSERT (h->dynindx != -1);
1511 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1512 outrel.r_addend = relocation + rel->r_addend;
1513 }
1514 else
1515 {
1516 if (r_type == R_VAX_32)
1517 {
1518 relocate = TRUE;
1519 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1520 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1521 &contents[rel->r_offset]) == 0);
1522 outrel.r_addend = relocation + rel->r_addend;
1523 }
1524 else
1525 {
1526 long indx;
1527
1528 if (bfd_is_abs_section (sec))
1529 indx = 0;
1530 else if (sec == NULL || sec->owner == NULL)
1531 {
1532 bfd_set_error (bfd_error_bad_value);
1533 return FALSE;
1534 }
1535 else
1536 {
1537 asection *osec;
1538
1539 /* We are turning this relocation into one
1540 against a section symbol. It would be
1541 proper to subtract the symbol's value,
1542 osec->vma, from the emitted reloc addend,
1543 but ld.so expects buggy relocs. */
1544 osec = sec->output_section;
1545 indx = elf_section_data (osec)->dynindx;
1546 if (indx == 0)
1547 {
1548 struct elf_link_hash_table *htab;
1549 htab = elf_hash_table (info);
1550 osec = htab->text_index_section;
1551 indx = elf_section_data (osec)->dynindx;
1552 }
1553 BFD_ASSERT (indx != 0);
1554 }
1555
1556 outrel.r_info = ELF32_R_INFO (indx, r_type);
1557 outrel.r_addend = relocation + rel->r_addend;
1558 }
1559 }
1560
1561 if ((input_section->flags & SEC_CODE) != 0
1562 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1563 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1564 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1565 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1566 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1567 {
1568 if (h != NULL)
1569 _bfd_error_handler
1570 /* xgettext:c-format */
1571 (_("%pB: warning: %s relocation against symbol `%s'"
1572 " from %pA section"),
1573 input_bfd, howto->name, h->root.root.string,
1574 input_section);
1575 else
1576 _bfd_error_handler
1577 /* xgettext:c-format */
1578 (_("%pB: warning: %s relocation to %#" PRIx64
1579 " from %pA section"),
1580 input_bfd, howto->name, (uint64_t) outrel.r_addend,
1581 input_section);
1582 }
1583 loc = sreloc->contents;
1584 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1585 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1586
1587 /* This reloc will be computed at runtime, so there's no
1588 need to do anything now, except for R_VAX_32
1589 relocations that have been turned into
1590 R_VAX_RELATIVE. */
1591 if (!relocate)
1592 continue;
1593 }
1594
1595 break;
1596
1597 case R_VAX_GNU_VTINHERIT:
1598 case R_VAX_GNU_VTENTRY:
1599 /* These are no-ops in the end. */
1600 continue;
1601
1602 default:
1603 break;
1604 }
1605
1606 /* VAX PCREL relocations are from the end of relocation, not the start.
1607 So subtract the difference from the relocation amount since we can't
1608 add it to the offset. */
1609 if (howto->pc_relative && howto->pcrel_offset)
1610 relocation -= bfd_get_reloc_size(howto);
1611
1612 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1613 contents, rel->r_offset,
1614 relocation, rel->r_addend);
1615
1616 if (r != bfd_reloc_ok)
1617 {
1618 switch (r)
1619 {
1620 default:
1621 case bfd_reloc_outofrange:
1622 abort ();
1623 case bfd_reloc_overflow:
1624 {
1625 const char *name;
1626
1627 if (h != NULL)
1628 name = NULL;
1629 else
1630 {
1631 name = bfd_elf_string_from_elf_section (input_bfd,
1632 symtab_hdr->sh_link,
1633 sym->st_name);
1634 if (name == NULL)
1635 return FALSE;
1636 if (*name == '\0')
1637 name = bfd_section_name (input_bfd, sec);
1638 }
1639 info->callbacks->reloc_overflow
1640 (info, (h ? &h->root : NULL), name, howto->name,
1641 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1642 }
1643 break;
1644 }
1645 }
1646 }
1647
1648 return TRUE;
1649 }
1650
1651 /* Finish up dynamic symbol handling. We set the contents of various
1652 dynamic sections here. */
1653
1654 static bfd_boolean
1655 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1656 struct elf_link_hash_entry *h,
1657 Elf_Internal_Sym *sym)
1658 {
1659 bfd *dynobj;
1660
1661 dynobj = elf_hash_table (info)->dynobj;
1662
1663 if (h->plt.offset != (bfd_vma) -1)
1664 {
1665 asection *splt;
1666 asection *sgot;
1667 asection *srela;
1668 bfd_vma plt_index;
1669 bfd_vma got_offset;
1670 bfd_vma addend;
1671 Elf_Internal_Rela rela;
1672 bfd_byte *loc;
1673
1674 /* This symbol has an entry in the procedure linkage table. Set
1675 it up. */
1676 BFD_ASSERT (h->dynindx != -1);
1677
1678 splt = elf_hash_table (info)->splt;
1679 sgot = elf_hash_table (info)->sgotplt;
1680 srela = elf_hash_table (info)->srelplt;
1681 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1682
1683 addend = 2 * (h->plt.offset & 1);
1684 h->plt.offset &= ~1;
1685
1686 /* Get the index in the procedure linkage table which
1687 corresponds to this symbol. This is the index of this symbol
1688 in all the symbols for which we are making plt entries. The
1689 first entry in the procedure linkage table is reserved. */
1690 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1691
1692 /* Get the offset into the .got table of the entry that
1693 corresponds to this function. Each .got entry is 4 bytes.
1694 The first two are reserved. */
1695 got_offset = (plt_index + 3) * 4;
1696
1697 /* Fill in the entry in the procedure linkage table. */
1698 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1699 PLT_ENTRY_SIZE);
1700
1701 /* The offset is relative to the first extension word. */
1702 bfd_put_32 (output_bfd,
1703 -(h->plt.offset + 8),
1704 splt->contents + h->plt.offset + 4);
1705
1706 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1707 splt->contents + h->plt.offset + 8);
1708
1709 /* Fill in the entry in the global offset table. */
1710 bfd_put_32 (output_bfd,
1711 (splt->output_section->vma
1712 + splt->output_offset
1713 + h->plt.offset) + addend,
1714 sgot->contents + got_offset);
1715
1716 /* Fill in the entry in the .rela.plt section. */
1717 rela.r_offset = (sgot->output_section->vma
1718 + sgot->output_offset
1719 + got_offset);
1720 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1721 rela.r_addend = addend;
1722 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1723 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1724
1725 if (!h->def_regular)
1726 {
1727 /* Mark the symbol as undefined, rather than as defined in
1728 the .plt section. Leave the value alone. */
1729 sym->st_shndx = SHN_UNDEF;
1730 }
1731 }
1732
1733 if (h->got.offset != (bfd_vma) -1)
1734 {
1735 asection *sgot;
1736 asection *srela;
1737 Elf_Internal_Rela rela;
1738 bfd_byte *loc;
1739
1740 /* This symbol has an entry in the global offset table. Set it
1741 up. */
1742 sgot = elf_hash_table (info)->sgot;
1743 srela = elf_hash_table (info)->srelgot;
1744 BFD_ASSERT (sgot != NULL && srela != NULL);
1745
1746 rela.r_offset = (sgot->output_section->vma
1747 + sgot->output_offset
1748 + h->got.offset);
1749 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1750 rela.r_addend = bfd_get_signed_32 (output_bfd,
1751 sgot->contents + h->got.offset);
1752
1753 loc = srela->contents;
1754 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1755 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1756 }
1757
1758 if (h->needs_copy)
1759 {
1760 asection *s;
1761 Elf_Internal_Rela rela;
1762 bfd_byte *loc;
1763
1764 /* This symbol needs a copy reloc. Set it up. */
1765 BFD_ASSERT (h->dynindx != -1
1766 && (h->root.type == bfd_link_hash_defined
1767 || h->root.type == bfd_link_hash_defweak));
1768
1769 s = bfd_get_linker_section (dynobj, ".rela.bss");
1770 BFD_ASSERT (s != NULL);
1771
1772 rela.r_offset = (h->root.u.def.value
1773 + h->root.u.def.section->output_section->vma
1774 + h->root.u.def.section->output_offset);
1775 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1776 rela.r_addend = 0;
1777 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1778 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1779 }
1780
1781 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1782 if (h == elf_hash_table (info)->hdynamic
1783 || h == elf_hash_table (info)->hgot)
1784 sym->st_shndx = SHN_ABS;
1785
1786 return TRUE;
1787 }
1788
1789 /* Finish up the dynamic sections. */
1790
1791 static bfd_boolean
1792 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1793 {
1794 bfd *dynobj;
1795 asection *sgot;
1796 asection *sdyn;
1797
1798 dynobj = elf_hash_table (info)->dynobj;
1799
1800 sgot = elf_hash_table (info)->sgotplt;
1801 BFD_ASSERT (sgot != NULL);
1802 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1803
1804 if (elf_hash_table (info)->dynamic_sections_created)
1805 {
1806 asection *splt;
1807 Elf32_External_Dyn *dyncon, *dynconend;
1808
1809 splt = elf_hash_table (info)->splt;
1810 BFD_ASSERT (splt != NULL && sdyn != NULL);
1811
1812 dyncon = (Elf32_External_Dyn *) sdyn->contents;
1813 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1814 for (; dyncon < dynconend; dyncon++)
1815 {
1816 Elf_Internal_Dyn dyn;
1817 asection *s;
1818
1819 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1820
1821 switch (dyn.d_tag)
1822 {
1823 default:
1824 break;
1825
1826 case DT_PLTGOT:
1827 s = elf_hash_table (info)->sgotplt;
1828 goto get_vma;
1829 case DT_JMPREL:
1830 s = elf_hash_table (info)->srelplt;
1831 get_vma:
1832 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1833 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1834 break;
1835
1836 case DT_PLTRELSZ:
1837 s = elf_hash_table (info)->srelplt;
1838 dyn.d_un.d_val = s->size;
1839 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1840 break;
1841 }
1842 }
1843
1844 /* Fill in the first entry in the procedure linkage table. */
1845 if (splt->size > 0)
1846 {
1847 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1848 bfd_put_32 (output_bfd,
1849 (sgot->output_section->vma
1850 + sgot->output_offset + 4
1851 - (splt->output_section->vma + 6)),
1852 splt->contents + 2);
1853 bfd_put_32 (output_bfd,
1854 (sgot->output_section->vma
1855 + sgot->output_offset + 8
1856 - (splt->output_section->vma + 12)),
1857 splt->contents + 8);
1858 elf_section_data (splt->output_section)->this_hdr.sh_entsize
1859 = PLT_ENTRY_SIZE;
1860 }
1861 }
1862
1863 /* Fill in the first three entries in the global offset table. */
1864 if (sgot->size > 0)
1865 {
1866 if (sdyn == NULL)
1867 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1868 else
1869 bfd_put_32 (output_bfd,
1870 sdyn->output_section->vma + sdyn->output_offset,
1871 sgot->contents);
1872 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1873 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1874 }
1875
1876 if (elf_section_data (sgot->output_section) != NULL)
1877 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1878
1879 return TRUE;
1880 }
1881
1882 static enum elf_reloc_type_class
1883 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1884 const asection *rel_sec ATTRIBUTE_UNUSED,
1885 const Elf_Internal_Rela *rela)
1886 {
1887 switch ((int) ELF32_R_TYPE (rela->r_info))
1888 {
1889 case R_VAX_RELATIVE:
1890 return reloc_class_relative;
1891 case R_VAX_JMP_SLOT:
1892 return reloc_class_plt;
1893 case R_VAX_COPY:
1894 return reloc_class_copy;
1895 default:
1896 return reloc_class_normal;
1897 }
1898 }
1899
1900 static bfd_vma
1901 elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1902 const arelent *rel ATTRIBUTE_UNUSED)
1903 {
1904 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1905 }
1906
1907 #define TARGET_LITTLE_SYM vax_elf32_vec
1908 #define TARGET_LITTLE_NAME "elf32-vax"
1909 #define ELF_MACHINE_CODE EM_VAX
1910 #define ELF_MAXPAGESIZE 0x1000
1911
1912 #define elf_backend_create_dynamic_sections \
1913 _bfd_elf_create_dynamic_sections
1914 #define bfd_elf32_bfd_link_hash_table_create \
1915 elf_vax_link_hash_table_create
1916 #define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
1917
1918 #define elf_backend_check_relocs elf_vax_check_relocs
1919 #define elf_backend_adjust_dynamic_symbol \
1920 elf_vax_adjust_dynamic_symbol
1921 #define elf_backend_always_size_sections \
1922 elf_vax_always_size_sections
1923 #define elf_backend_size_dynamic_sections \
1924 elf_vax_size_dynamic_sections
1925 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
1926 #define elf_backend_relocate_section elf_vax_relocate_section
1927 #define elf_backend_finish_dynamic_symbol \
1928 elf_vax_finish_dynamic_symbol
1929 #define elf_backend_finish_dynamic_sections \
1930 elf_vax_finish_dynamic_sections
1931 #define elf_backend_reloc_type_class elf_vax_reloc_type_class
1932 #define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
1933 #define elf_backend_plt_sym_val elf_vax_plt_sym_val
1934 #define bfd_elf32_bfd_merge_private_bfd_data \
1935 elf32_vax_merge_private_bfd_data
1936 #define bfd_elf32_bfd_set_private_flags \
1937 elf32_vax_set_private_flags
1938 #define bfd_elf32_bfd_print_private_bfd_data \
1939 elf32_vax_print_private_bfd_data
1940
1941 #define elf_backend_can_gc_sections 1
1942 #define elf_backend_want_got_plt 1
1943 #define elf_backend_plt_readonly 1
1944 #define elf_backend_want_plt_sym 0
1945 #define elf_backend_got_header_size 16
1946 #define elf_backend_rela_normal 1
1947 #define elf_backend_dtrel_excludes_plt 1
1948
1949 #include "elf32-target.h"
This page took 0.074926 seconds and 5 git commands to generate.