Coverage Report

Created: 2023-08-28 06:25

/src/binutils-gdb/bfd/elf32-vax.c
Line
Count
Source (jump to first uncovered line)
1
/* VAX series support for 32-bit ELF
2
   Copyright (C) 1993-2023 Free Software Foundation, Inc.
3
   Contributed by Matt Thomas <matt@3am-software.com>.
4
5
   This file is part of BFD, the Binary File Descriptor library.
6
7
   This program is free software; you can redistribute it and/or modify
8
   it under the terms of the GNU General Public License as published by
9
   the Free Software Foundation; either version 3 of the License, or
10
   (at your option) any later version.
11
12
   This program is distributed in the hope that it will be useful,
13
   but WITHOUT ANY WARRANTY; without even the implied warranty of
14
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15
   GNU General Public License for more details.
16
17
   You should have received a copy of the GNU General Public License
18
   along with this program; if not, write to the Free Software
19
   Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20
   MA 02110-1301, USA.  */
21
22
#include "sysdep.h"
23
#include "bfd.h"
24
#include "bfdlink.h"
25
#include "libbfd.h"
26
#include "elf-bfd.h"
27
#include "elf/vax.h"
28
29
static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30
static bool rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31
static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32
               struct bfd_hash_table *,
33
               const char *);
34
static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35
static bool elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36
          asection *, const Elf_Internal_Rela *);
37
static bool elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38
             struct elf_link_hash_entry *);
39
static bool elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40
static int elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41
             bfd *, asection *, bfd_byte *,
42
             Elf_Internal_Rela *,
43
             Elf_Internal_Sym *, asection **);
44
static bool elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45
             struct elf_link_hash_entry *,
46
             Elf_Internal_Sym *);
47
static bool elf_vax_finish_dynamic_sections (bfd *, struct bfd_link_info *);
48
static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
49
            const arelent *);
50
51
static bool elf32_vax_set_private_flags (bfd *, flagword);
52
static bool elf32_vax_print_private_bfd_data (bfd *, void *);
53
54
static reloc_howto_type howto_table[] = {
55
  HOWTO (R_VAX_NONE,    /* type */
56
   0,     /* rightshift */
57
   0,     /* size */
58
   0,     /* bitsize */
59
   false,     /* pc_relative */
60
   0,     /* bitpos */
61
   complain_overflow_dont, /* complain_on_overflow */
62
   bfd_elf_generic_reloc, /* special_function */
63
   "R_VAX_NONE",    /* name */
64
   false,     /* partial_inplace */
65
   0,     /* src_mask */
66
   0x00000000,    /* dst_mask */
67
   false),    /* pcrel_offset */
68
69
  HOWTO (R_VAX_32,    /* type */
70
   0,     /* rightshift */
71
   4,     /* size */
72
   32,      /* bitsize */
73
   false,     /* pc_relative */
74
   0,     /* bitpos */
75
   complain_overflow_bitfield, /* complain_on_overflow */
76
   bfd_elf_generic_reloc, /* special_function */
77
   "R_VAX_32",    /* name */
78
   false,     /* partial_inplace */
79
   0,     /* src_mask */
80
   0xffffffff,    /* dst_mask */
81
   false),    /* pcrel_offset */
82
83
  HOWTO (R_VAX_16,    /* type */
84
   0,     /* rightshift */
85
   2,     /* size */
86
   16,      /* bitsize */
87
   false,     /* pc_relative */
88
   0,     /* bitpos */
89
   complain_overflow_bitfield, /* complain_on_overflow */
90
   bfd_elf_generic_reloc, /* special_function */
91
   "R_VAX_16",    /* name */
92
   false,     /* partial_inplace */
93
   0,     /* src_mask */
94
   0x0000ffff,    /* dst_mask */
95
   false),    /* pcrel_offset */
96
97
  HOWTO (R_VAX_8,   /* type */
98
   0,     /* rightshift */
99
   1,     /* size */
100
   8,     /* bitsize */
101
   false,     /* pc_relative */
102
   0,     /* bitpos */
103
   complain_overflow_bitfield, /* complain_on_overflow */
104
   bfd_elf_generic_reloc, /* special_function */
105
   "R_VAX_8",   /* name */
106
   false,     /* partial_inplace */
107
   0,     /* src_mask */
108
   0x000000ff,    /* dst_mask */
109
   false),    /* pcrel_offset */
110
111
  HOWTO (R_VAX_PC32,    /* type */
112
   0,     /* rightshift */
113
   4,     /* size */
114
   32,      /* bitsize */
115
   true,      /* pc_relative */
116
   0,     /* bitpos */
117
   complain_overflow_bitfield, /* complain_on_overflow */
118
   bfd_elf_generic_reloc, /* special_function */
119
   "R_VAX_PC32",    /* name */
120
   false,     /* partial_inplace */
121
   0,     /* src_mask */
122
   0xffffffff,    /* dst_mask */
123
   true),     /* pcrel_offset */
124
125
  HOWTO (R_VAX_PC16,    /* type */
126
   0,     /* rightshift */
127
   2,     /* size */
128
   16,      /* bitsize */
129
   true,      /* pc_relative */
130
   0,     /* bitpos */
131
   complain_overflow_signed, /* complain_on_overflow */
132
   bfd_elf_generic_reloc, /* special_function */
133
   "R_VAX_PC16",    /* name */
134
   false,     /* partial_inplace */
135
   0,     /* src_mask */
136
   0x0000ffff,    /* dst_mask */
137
   true),     /* pcrel_offset */
138
139
  HOWTO (R_VAX_PC8,   /* type */
140
   0,     /* rightshift */
141
   1,     /* size */
142
   8,     /* bitsize */
143
   true,      /* pc_relative */
144
   0,     /* bitpos */
145
   complain_overflow_signed, /* complain_on_overflow */
146
   bfd_elf_generic_reloc, /* special_function */
147
   "R_VAX_PC8",   /* name */
148
   false,     /* partial_inplace */
149
   0,     /* src_mask */
150
   0x000000ff,    /* dst_mask */
151
   true),     /* pcrel_offset */
152
153
  HOWTO (R_VAX_GOT32,   /* type */
154
   0,     /* rightshift */
155
   4,     /* size */
156
   32,      /* bitsize */
157
   true,      /* pc_relative */
158
   0,     /* bitpos */
159
   complain_overflow_bitfield, /* complain_on_overflow */
160
   bfd_elf_generic_reloc, /* special_function */
161
   "R_VAX_GOT32",   /* name */
162
   false,     /* partial_inplace */
163
   0,     /* src_mask */
164
   0xffffffff,    /* dst_mask */
165
   true),     /* pcrel_offset */
166
167
  EMPTY_HOWTO (-1),
168
  EMPTY_HOWTO (-1),
169
  EMPTY_HOWTO (-1),
170
  EMPTY_HOWTO (-1),
171
  EMPTY_HOWTO (-1),
172
173
  HOWTO (R_VAX_PLT32,   /* type */
174
   0,     /* rightshift */
175
   4,     /* size */
176
   32,      /* bitsize */
177
   true,      /* pc_relative */
178
   0,     /* bitpos */
179
   complain_overflow_bitfield, /* complain_on_overflow */
180
   bfd_elf_generic_reloc, /* special_function */
181
   "R_VAX_PLT32",   /* name */
182
   false,     /* partial_inplace */
183
   0,     /* src_mask */
184
   0xffffffff,    /* dst_mask */
185
   true),     /* pcrel_offset */
186
187
  EMPTY_HOWTO (-1),
188
  EMPTY_HOWTO (-1),
189
  EMPTY_HOWTO (-1),
190
  EMPTY_HOWTO (-1),
191
  EMPTY_HOWTO (-1),
192
193
  HOWTO (R_VAX_COPY,    /* type */
194
   0,     /* rightshift */
195
   0,     /* size */
196
   0,     /* bitsize */
197
   false,     /* pc_relative */
198
   0,     /* bitpos */
199
   complain_overflow_dont, /* complain_on_overflow */
200
   bfd_elf_generic_reloc, /* special_function */
201
   "R_VAX_COPY",    /* name */
202
   false,     /* partial_inplace */
203
   0,     /* src_mask */
204
   0xffffffff,    /* dst_mask */
205
   false),    /* pcrel_offset */
206
207
  HOWTO (R_VAX_GLOB_DAT,  /* type */
208
   0,     /* rightshift */
209
   4,     /* size */
210
   32,      /* bitsize */
211
   false,     /* pc_relative */
212
   0,     /* bitpos */
213
   complain_overflow_dont, /* complain_on_overflow */
214
   bfd_elf_generic_reloc, /* special_function */
215
   "R_VAX_GLOB_DAT",  /* name */
216
   false,     /* partial_inplace */
217
   0,     /* src_mask */
218
   0xffffffff,    /* dst_mask */
219
   false),    /* pcrel_offset */
220
221
  HOWTO (R_VAX_JMP_SLOT,  /* type */
222
   0,     /* rightshift */
223
   4,     /* size */
224
   32,      /* bitsize */
225
   false,     /* pc_relative */
226
   0,     /* bitpos */
227
   complain_overflow_dont, /* complain_on_overflow */
228
   bfd_elf_generic_reloc, /* special_function */
229
   "R_VAX_JMP_SLOT",  /* name */
230
   false,     /* partial_inplace */
231
   0,     /* src_mask */
232
   0xffffffff,    /* dst_mask */
233
   false),    /* pcrel_offset */
234
235
  HOWTO (R_VAX_RELATIVE,  /* type */
236
   0,     /* rightshift */
237
   4,     /* size */
238
   32,      /* bitsize */
239
   false,     /* pc_relative */
240
   0,     /* bitpos */
241
   complain_overflow_dont, /* complain_on_overflow */
242
   bfd_elf_generic_reloc, /* special_function */
243
   "R_VAX_RELATIVE",  /* name */
244
   false,     /* partial_inplace */
245
   0,     /* src_mask */
246
   0xffffffff,    /* dst_mask */
247
   false),    /* pcrel_offset */
248
249
  /* GNU extension to record C++ vtable hierarchy */
250
  HOWTO (R_VAX_GNU_VTINHERIT, /* type */
251
   0,     /* rightshift */
252
   4,     /* size */
253
   0,     /* bitsize */
254
   false,     /* pc_relative */
255
   0,     /* bitpos */
256
   complain_overflow_dont, /* complain_on_overflow */
257
   NULL,      /* special_function */
258
   "R_VAX_GNU_VTINHERIT", /* name */
259
   false,     /* partial_inplace */
260
   0,     /* src_mask */
261
   0,     /* dst_mask */
262
   false),    /* pcrel_offset */
263
264
  /* GNU extension to record C++ vtable member usage */
265
  HOWTO (R_VAX_GNU_VTENTRY, /* type */
266
   0,     /* rightshift */
267
   4,     /* size */
268
   0,     /* bitsize */
269
   false,     /* pc_relative */
270
   0,     /* bitpos */
271
   complain_overflow_dont, /* complain_on_overflow */
272
   _bfd_elf_rel_vtable_reloc_fn, /* special_function */
273
   "R_VAX_GNU_VTENTRY", /* name */
274
   false,     /* partial_inplace */
275
   0,     /* src_mask */
276
   0,     /* dst_mask */
277
   false),    /* pcrel_offset */
278
};
279
280
static bool
281
rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
282
0
{
283
0
  unsigned int r_type;
284
285
0
  r_type = ELF32_R_TYPE (dst->r_info);
286
0
  if (r_type >= R_VAX_max)
287
0
    {
288
      /* xgettext:c-format */
289
0
      _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
290
0
        abfd, r_type);
291
0
      bfd_set_error (bfd_error_bad_value);
292
0
      return false;
293
0
    }
294
0
  cache_ptr->howto = &howto_table[r_type];
295
0
  return true;
296
0
}
297
298
#define elf_info_to_howto rtype_to_howto
299
300
static const struct
301
{
302
  bfd_reloc_code_real_type bfd_val;
303
  int elf_val;
304
} reloc_map[] = {
305
  { BFD_RELOC_NONE, R_VAX_NONE },
306
  { BFD_RELOC_32, R_VAX_32 },
307
  { BFD_RELOC_16, R_VAX_16 },
308
  { BFD_RELOC_8, R_VAX_8 },
309
  { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310
  { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311
  { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312
  { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313
  { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314
  { BFD_RELOC_NONE, R_VAX_COPY },
315
  { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316
  { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317
  { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318
  { BFD_RELOC_CTOR, R_VAX_32 },
319
  { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320
  { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321
};
322
323
static reloc_howto_type *
324
reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
325
0
{
326
0
  unsigned int i;
327
0
  for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328
0
    {
329
0
      if (reloc_map[i].bfd_val == code)
330
0
  return &howto_table[reloc_map[i].elf_val];
331
0
    }
332
0
  return 0;
333
0
}
334
335
static reloc_howto_type *
336
reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337
       const char *r_name)
338
0
{
339
0
  unsigned int i;
340
341
0
  for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342
0
    if (howto_table[i].name != NULL
343
0
  && strcasecmp (howto_table[i].name, r_name) == 0)
344
0
      return &howto_table[i];
345
346
0
  return NULL;
347
0
}
348
349
#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
350
#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
351
#define ELF_ARCH bfd_arch_vax
352
/* end code generated by elf.el */
353

354
/* Functions for the VAX ELF linker.  */
355
356
/* The name of the dynamic interpreter.  This is put in the .interp
357
   section.  */
358
359
0
#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360
361
/* The size in bytes of an entry in the procedure linkage table.  */
362
363
0
#define PLT_ENTRY_SIZE 12
364
365
/* The first entry in a procedure linkage table looks like this.  See
366
   the SVR4 ABI VAX supplement to see how this works.  */
367
368
static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369
{
370
  0xdd, 0xef,   /* pushl l^ */
371
  0, 0, 0, 0,   /* offset to .plt.got + 4 */
372
  0x17, 0xff,   /* jmp @L^(pc) */
373
  0, 0, 0, 0,   /* offset to .plt.got + 8 */
374
};
375
376
/* Subsequent entries in a procedure linkage table look like this.  */
377
378
static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379
{
380
  0xfc, 0x0f,   /* .word ^M<r11:r2> */
381
  0x16, 0xef,   /* jsb L^(pc) */
382
  0, 0, 0, 0,   /* replaced with offset to start of .plt  */
383
  0, 0, 0, 0,   /* index into .rela.plt */
384
};
385
386
/* The VAX linker needs to keep track of the number of relocs that it
387
   decides to copy in check_relocs for each symbol.  This is so that it
388
   can discard PC relative relocs if it doesn't need them when linking
389
   with -Bsymbolic.  We store the information in a field extending the
390
   regular ELF linker hash table.  */
391
392
/* This structure keeps track of the number of PC relative relocs we have
393
   copied for a given symbol.  */
394
395
struct elf_vax_pcrel_relocs_copied
396
{
397
  /* Next section.  */
398
  struct elf_vax_pcrel_relocs_copied *next;
399
  /* A section in dynobj.  */
400
  asection *section;
401
  /* Number of relocs copied in this section.  */
402
  bfd_size_type count;
403
};
404
405
/* VAX ELF linker hash entry.  */
406
407
struct elf_vax_link_hash_entry
408
{
409
  struct elf_link_hash_entry root;
410
411
  /* Number of PC relative relocs copied for this symbol.  */
412
  struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413
414
  bfd_vma got_addend;
415
};
416
417
/* Declare this now that the above structures are defined.  */
418
419
static bool elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
420
            void *);
421
422
/* Declare this now that the above structures are defined.  */
423
424
static bool elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
425
               void *);
426
427
/* Traverse an VAX ELF linker hash table.  */
428
429
#define elf_vax_link_hash_traverse(table, func, info)     \
430
0
  (elf_link_hash_traverse           \
431
0
   ((table),                \
432
0
    (bool (*) (struct elf_link_hash_entry *, void *)) (func),   \
433
0
    (info)))
434
435
/* Create an entry in an VAX ELF linker hash table.  */
436
437
static struct bfd_hash_entry *
438
elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439
         struct bfd_hash_table *table,
440
         const char *string)
441
0
{
442
0
  struct elf_vax_link_hash_entry *ret =
443
0
    (struct elf_vax_link_hash_entry *) entry;
444
445
  /* Allocate the structure if it has not already been allocated by a
446
     subclass.  */
447
0
  if (ret == NULL)
448
0
    ret = ((struct elf_vax_link_hash_entry *)
449
0
     bfd_hash_allocate (table,
450
0
            sizeof (struct elf_vax_link_hash_entry)));
451
0
  if (ret == NULL)
452
0
    return (struct bfd_hash_entry *) ret;
453
454
  /* Call the allocation method of the superclass.  */
455
0
  ret = ((struct elf_vax_link_hash_entry *)
456
0
   _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457
0
             table, string));
458
0
  if (ret != NULL)
459
0
    {
460
0
      ret->pcrel_relocs_copied = NULL;
461
0
    }
462
463
0
  return (struct bfd_hash_entry *) ret;
464
0
}
465
466
/* Create an VAX ELF linker hash table.  */
467
468
static struct bfd_link_hash_table *
469
elf_vax_link_hash_table_create (bfd *abfd)
470
0
{
471
0
  struct elf_link_hash_table *ret;
472
0
  size_t amt = sizeof (struct elf_link_hash_table);
473
474
0
  ret = bfd_zmalloc (amt);
475
0
  if (ret == NULL)
476
0
    return NULL;
477
478
0
  if (!_bfd_elf_link_hash_table_init (ret, abfd,
479
0
              elf_vax_link_hash_newfunc,
480
0
              sizeof (struct elf_vax_link_hash_entry),
481
0
              GENERIC_ELF_DATA))
482
0
    {
483
0
      free (ret);
484
0
      return NULL;
485
0
    }
486
487
0
  return &ret->root;
488
0
}
489
490
/* Keep vax-specific flags in the ELF header */
491
static bool
492
elf32_vax_set_private_flags (bfd *abfd, flagword flags)
493
0
{
494
0
  elf_elfheader (abfd)->e_flags = flags;
495
0
  elf_flags_init (abfd) = true;
496
0
  return true;
497
0
}
498
499
/* Merge backend specific data from an object file to the output
500
   object file when linking.  */
501
static bool
502
elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
503
0
{
504
0
  bfd *obfd = info->output_bfd;
505
0
  flagword in_flags;
506
507
0
  if (   bfd_get_flavour (ibfd) != bfd_target_elf_flavour
508
0
      || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
509
0
    return true;
510
511
0
  in_flags  = elf_elfheader (ibfd)->e_flags;
512
513
0
  if (!elf_flags_init (obfd))
514
0
    {
515
0
      elf_flags_init (obfd) = true;
516
0
      elf_elfheader (obfd)->e_flags = in_flags;
517
0
    }
518
519
0
  return true;
520
0
}
521
522
/* Display the flags field */
523
static bool
524
elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
525
0
{
526
0
  FILE *file = (FILE *) ptr;
527
528
0
  BFD_ASSERT (abfd != NULL && ptr != NULL);
529
530
  /* Print normal ELF private data.  */
531
0
  _bfd_elf_print_private_bfd_data (abfd, ptr);
532
533
  /* Ignore init flag - it may not be set, despite the flags field containing valid data.  */
534
535
  /* xgettext:c-format */
536
0
  fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
537
538
0
  if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
539
0
    fprintf (file, _(" [nonpic]"));
540
541
0
  if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
542
0
    fprintf (file, _(" [d-float]"));
543
544
0
  if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
545
0
    fprintf (file, _(" [g-float]"));
546
547
0
  fputc ('\n', file);
548
549
0
  return true;
550
0
}
551
/* Look through the relocs for a section during the first phase, and
552
   allocate space in the global offset table or procedure linkage
553
   table.  */
554
555
static bool
556
elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
557
          const Elf_Internal_Rela *relocs)
558
0
{
559
0
  bfd *dynobj;
560
0
  Elf_Internal_Shdr *symtab_hdr;
561
0
  struct elf_link_hash_entry **sym_hashes;
562
0
  const Elf_Internal_Rela *rel;
563
0
  const Elf_Internal_Rela *rel_end;
564
0
  asection *sreloc;
565
566
0
  if (bfd_link_relocatable (info))
567
0
    return true;
568
569
0
  dynobj = elf_hash_table (info)->dynobj;
570
0
  symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
571
0
  sym_hashes = elf_sym_hashes (abfd);
572
573
0
  sreloc = NULL;
574
575
0
  rel_end = relocs + sec->reloc_count;
576
0
  for (rel = relocs; rel < rel_end; rel++)
577
0
    {
578
0
      unsigned long r_symndx;
579
0
      struct elf_link_hash_entry *h;
580
581
0
      r_symndx = ELF32_R_SYM (rel->r_info);
582
583
0
      if (r_symndx < symtab_hdr->sh_info)
584
0
  h = NULL;
585
0
      else
586
0
  {
587
0
    h = sym_hashes[r_symndx - symtab_hdr->sh_info];
588
0
    while (h->root.type == bfd_link_hash_indirect
589
0
     || h->root.type == bfd_link_hash_warning)
590
0
      h = (struct elf_link_hash_entry *) h->root.u.i.link;
591
0
  }
592
593
0
      switch (ELF32_R_TYPE (rel->r_info))
594
0
  {
595
0
  case R_VAX_GOT32:
596
0
    BFD_ASSERT (h != NULL);
597
598
    /* If this is a local symbol, we resolve it directly without
599
       creating a global offset table entry.  */
600
0
    if (SYMBOL_REFERENCES_LOCAL (info, h)
601
0
        || h == elf_hash_table (info)->hgot
602
0
        || h == elf_hash_table (info)->hplt)
603
0
      break;
604
605
    /* This symbol requires a global offset table entry.  */
606
607
0
    if (dynobj == NULL)
608
0
      {
609
        /* Create the .got section.  */
610
0
        elf_hash_table (info)->dynobj = dynobj = abfd;
611
0
        if (!_bfd_elf_create_got_section (dynobj, info))
612
0
    return false;
613
0
      }
614
615
0
    if (h != NULL)
616
0
      {
617
0
        struct elf_vax_link_hash_entry *eh;
618
619
0
        eh = (struct elf_vax_link_hash_entry *) h;
620
0
        if (h->got.refcount == -1)
621
0
    {
622
0
      h->got.refcount = 1;
623
0
      eh->got_addend = rel->r_addend;
624
0
    }
625
0
        else
626
0
    {
627
0
      h->got.refcount++;
628
0
      if (eh->got_addend != (bfd_vma) rel->r_addend)
629
0
        _bfd_error_handler
630
          /* xgettext:c-format */
631
0
          (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
632
0
       " not match previous GOT addend of %" PRId64),
633
0
       abfd, (int64_t) rel->r_addend, h->root.root.string,
634
0
       (int64_t) eh->got_addend);
635
636
0
    }
637
0
      }
638
0
    break;
639
640
0
  case R_VAX_PLT32:
641
    /* This symbol requires a procedure linkage table entry.  We
642
       actually build the entry in adjust_dynamic_symbol,
643
       because this might be a case of linking PIC code which is
644
       never referenced by a dynamic object, in which case we
645
       don't need to generate a procedure linkage table entry
646
       after all.  */
647
0
    BFD_ASSERT (h != NULL);
648
649
    /* If this is a local symbol, we resolve it directly without
650
       creating a procedure linkage table entry.  */
651
0
    if (h->forced_local)
652
0
      break;
653
654
0
    h->needs_plt = 1;
655
0
    if (h->plt.refcount == -1)
656
0
      h->plt.refcount = 1;
657
0
    else
658
0
      h->plt.refcount++;
659
0
    break;
660
661
0
  case R_VAX_PC8:
662
0
  case R_VAX_PC16:
663
0
  case R_VAX_PC32:
664
    /* If we are creating a shared library and this is not a local
665
       symbol, we need to copy the reloc into the shared library.
666
       However when linking with -Bsymbolic and this is a global
667
       symbol which is defined in an object we are including in the
668
       link (i.e., DEF_REGULAR is set), then we can resolve the
669
       reloc directly.  At this point we have not seen all the input
670
       files, so it is possible that DEF_REGULAR is not set now but
671
       will be set later (it is never cleared).  We account for that
672
       possibility below by storing information in the
673
       pcrel_relocs_copied field of the hash table entry.  */
674
0
    if (!(bfd_link_pic (info)
675
0
    && (sec->flags & SEC_ALLOC) != 0
676
0
    && h != NULL
677
0
    && (!info->symbolic
678
0
        || !h->def_regular)))
679
0
      {
680
0
        if (h != NULL
681
0
      && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
682
0
      && !h->forced_local)
683
0
    {
684
      /* Make sure a plt entry is created for this symbol if
685
         it turns out to be a function defined by a dynamic
686
         object.  */
687
0
      if (h->plt.refcount == -1)
688
0
        h->plt.refcount = 1;
689
0
      else
690
0
        h->plt.refcount++;
691
0
    }
692
0
        break;
693
0
      }
694
    /* If this is a local symbol, we can resolve it directly.  */
695
0
    if (h != NULL
696
0
        && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
697
0
      || h->forced_local))
698
0
      break;
699
700
    /* Fall through.  */
701
0
  case R_VAX_8:
702
0
  case R_VAX_16:
703
0
  case R_VAX_32:
704
0
    if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
705
0
      {
706
        /* Make sure a plt entry is created for this symbol if it
707
     turns out to be a function defined by a dynamic object.  */
708
0
        if (h->plt.refcount == -1)
709
0
    h->plt.refcount = 1;
710
0
        else
711
0
    h->plt.refcount++;
712
0
      }
713
714
    /* Non-GOT reference may need a copy reloc in executable or
715
       a dynamic reloc in shared library.  */
716
0
    if (h != NULL)
717
0
      h->non_got_ref = 1;
718
719
    /* If we are creating a shared library, we need to copy the
720
       reloc into the shared library.  */
721
0
    if (bfd_link_pic (info)
722
0
        && (sec->flags & SEC_ALLOC) != 0)
723
0
      {
724
        /* When creating a shared object, we must copy these
725
     reloc types into the output file.  We create a reloc
726
     section in dynobj and make room for this reloc.  */
727
0
        if (sreloc == NULL)
728
0
    {
729
0
      sreloc = _bfd_elf_make_dynamic_reloc_section
730
0
        (sec, dynobj, 2, abfd, /*rela?*/ true);
731
732
0
      if (sreloc == NULL)
733
0
        return false;
734
735
0
      if (sec->flags & SEC_READONLY)
736
0
        info->flags |= DF_TEXTREL;
737
0
    }
738
739
0
        sreloc->size += sizeof (Elf32_External_Rela);
740
741
        /* If we are linking with -Bsymbolic, we count the number of
742
     PC relative relocations we have entered for this symbol,
743
     so that we can discard them again if the symbol is later
744
     defined by a regular object.  Note that this function is
745
     only called if we are using a vaxelf linker hash table,
746
     which means that h is really a pointer to an
747
     elf_vax_link_hash_entry.  */
748
0
        if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
749
0
       || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
750
0
       || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
751
0
      && info->symbolic)
752
0
    {
753
0
      struct elf_vax_link_hash_entry *eh;
754
0
      struct elf_vax_pcrel_relocs_copied *p;
755
756
0
      eh = (struct elf_vax_link_hash_entry *) h;
757
758
0
      for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
759
0
        if (p->section == sreloc)
760
0
          break;
761
762
0
      if (p == NULL)
763
0
        {
764
0
          p = ((struct elf_vax_pcrel_relocs_copied *)
765
0
         bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
766
0
          if (p == NULL)
767
0
      return false;
768
0
          p->next = eh->pcrel_relocs_copied;
769
0
          eh->pcrel_relocs_copied = p;
770
0
          p->section = sreloc;
771
0
          p->count = 0;
772
0
        }
773
774
0
      ++p->count;
775
0
    }
776
0
      }
777
778
0
    break;
779
780
    /* This relocation describes the C++ object vtable hierarchy.
781
       Reconstruct it for later use during GC.  */
782
0
  case R_VAX_GNU_VTINHERIT:
783
0
    if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
784
0
      return false;
785
0
    break;
786
787
    /* This relocation describes which C++ vtable entries are actually
788
       used.  Record for later use during GC.  */
789
0
  case R_VAX_GNU_VTENTRY:
790
0
    if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
791
0
      return false;
792
0
    break;
793
794
0
  default:
795
0
    break;
796
0
  }
797
0
    }
798
799
0
  return true;
800
0
}
801
802
/* Return the section that should be marked against GC for a given
803
   relocation.  */
804
805
static asection *
806
elf_vax_gc_mark_hook (asection *sec,
807
          struct bfd_link_info *info,
808
          Elf_Internal_Rela *rel,
809
          struct elf_link_hash_entry *h,
810
          Elf_Internal_Sym *sym)
811
0
{
812
0
  if (h != NULL)
813
0
    switch (ELF32_R_TYPE (rel->r_info))
814
0
      {
815
0
      case R_VAX_GNU_VTINHERIT:
816
0
      case R_VAX_GNU_VTENTRY:
817
0
  return NULL;
818
0
      }
819
820
0
  return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
821
0
}
822
823
/* Adjust a symbol defined by a dynamic object and referenced by a
824
   regular object.  The current definition is in some section of the
825
   dynamic object, but we're not including those sections.  We have to
826
   change the definition to something the rest of the link can
827
   understand.  */
828
829
static bool
830
elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
831
             struct elf_link_hash_entry *h)
832
0
{
833
0
  bfd *dynobj;
834
0
  asection *s;
835
836
0
  dynobj = elf_hash_table (info)->dynobj;
837
838
  /* Make sure we know what is going on here.  */
839
0
  BFD_ASSERT (dynobj != NULL
840
0
        && (h->needs_plt
841
0
      || h->is_weakalias
842
0
      || (h->def_dynamic
843
0
          && h->ref_regular
844
0
          && !h->def_regular)));
845
846
  /* If this is a function, put it in the procedure linkage table.  We
847
     will fill in the contents of the procedure linkage table later,
848
     when we know the address of the .got section.  */
849
0
  if (h->type == STT_FUNC
850
0
      || h->needs_plt)
851
0
    {
852
0
      if (h->plt.refcount <= 0
853
0
    || SYMBOL_CALLS_LOCAL (info, h)
854
0
    || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
855
0
        && h->root.type == bfd_link_hash_undefweak))
856
0
  {
857
    /* This case can occur if we saw a PLTxx reloc in an input
858
       file, but the symbol was never referred to by a dynamic
859
       object, or if all references were garbage collected.  In
860
       such a case, we don't actually need to build a procedure
861
       linkage table, and we can just do a PCxx reloc instead.  */
862
0
    h->plt.offset = (bfd_vma) -1;
863
0
    h->needs_plt = 0;
864
0
    return true;
865
0
  }
866
867
0
      s = elf_hash_table (info)->splt;
868
0
      BFD_ASSERT (s != NULL);
869
870
      /* If this is the first .plt entry, make room for the special
871
   first entry.  */
872
0
      if (s->size == 0)
873
0
  {
874
0
    s->size += PLT_ENTRY_SIZE;
875
0
  }
876
877
      /* If this symbol is not defined in a regular file, and we are
878
   not generating a shared library, then set the symbol to this
879
   location in the .plt.  This is required to make function
880
   pointers compare as equal between the normal executable and
881
   the shared library.  */
882
0
      if (!bfd_link_pic (info)
883
0
    && !h->def_regular)
884
0
  {
885
0
    h->root.u.def.section = s;
886
0
    h->root.u.def.value = s->size;
887
0
  }
888
889
0
      h->plt.offset = s->size;
890
891
      /* Make room for this entry.  */
892
0
      s->size += PLT_ENTRY_SIZE;
893
894
      /* We also need to make an entry in the .got.plt section, which
895
   will be placed in the .got section by the linker script.  */
896
897
0
      s = elf_hash_table (info)->sgotplt;
898
0
      BFD_ASSERT (s != NULL);
899
0
      s->size += 4;
900
901
      /* We also need to make an entry in the .rela.plt section.  */
902
903
0
      s = elf_hash_table (info)->srelplt;
904
0
      BFD_ASSERT (s != NULL);
905
0
      s->size += sizeof (Elf32_External_Rela);
906
907
0
      return true;
908
0
    }
909
910
  /* Reinitialize the plt offset now that it is not used as a reference
911
     count any more.  */
912
0
  h->plt.offset = (bfd_vma) -1;
913
914
  /* If this is a weak symbol, and there is a real definition, the
915
     processor independent code will have arranged for us to see the
916
     real definition first, and we can just use the same value.  */
917
0
  if (h->is_weakalias)
918
0
    {
919
0
      struct elf_link_hash_entry *def = weakdef (h);
920
0
      BFD_ASSERT (def->root.type == bfd_link_hash_defined);
921
0
      h->root.u.def.section = def->root.u.def.section;
922
0
      h->root.u.def.value = def->root.u.def.value;
923
0
      return true;
924
0
    }
925
926
  /* This is a reference to a symbol defined by a dynamic object which
927
     is not a function.  */
928
929
  /* If we are creating a shared library, we must presume that the
930
     only references to the symbol are via the global offset table.
931
     For such cases we need not do anything here; the relocations will
932
     be handled correctly by relocate_section.  */
933
0
  if (bfd_link_pic (info))
934
0
    return true;
935
936
  /* If there are no references to this symbol that do not use the
937
     GOT relocation, we don't need to generate a copy reloc.  */
938
0
  if (!h->non_got_ref)
939
0
    return true;
940
941
  /* We must allocate the symbol in our .dynbss section, which will
942
     become part of the .bss section of the executable.  There will be
943
     an entry for this symbol in the .dynsym section.  The dynamic
944
     object will contain position independent code, so all references
945
     from the dynamic object to this symbol will go through the global
946
     offset table.  The dynamic linker will use the .dynsym entry to
947
     determine the address it must put in the global offset table, so
948
     both the dynamic object and the regular object will refer to the
949
     same memory location for the variable.  */
950
951
0
  s = bfd_get_linker_section (dynobj, ".dynbss");
952
0
  BFD_ASSERT (s != NULL);
953
954
  /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
955
     copy the initial value out of the dynamic object and into the
956
     runtime process image.  We need to remember the offset into the
957
     .rela.bss section we are going to use.  */
958
0
  if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
959
0
    {
960
0
      asection *srel;
961
962
0
      srel = bfd_get_linker_section (dynobj, ".rela.bss");
963
0
      BFD_ASSERT (srel != NULL);
964
0
      srel->size += sizeof (Elf32_External_Rela);
965
0
      h->needs_copy = 1;
966
0
    }
967
968
0
  return _bfd_elf_adjust_dynamic_copy (info, h, s);
969
0
}
970
971
/* This function is called via elf_link_hash_traverse.  It resets GOT
972
   and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
973
   will be done.  */
974
975
static bool
976
elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
977
           void *infoptr ATTRIBUTE_UNUSED)
978
0
{
979
0
  h->got.refcount = -1;
980
0
  h->plt.refcount = -1;
981
982
0
  return true;
983
0
}
984
985
/* Discard unused dynamic data if this is a static link.  */
986
987
static bool
988
elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
989
            struct bfd_link_info *info)
990
0
{
991
0
  bfd *dynobj;
992
0
  asection *s;
993
994
0
  dynobj = elf_hash_table (info)->dynobj;
995
996
0
  if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
997
0
    {
998
      /* We may have created entries in the .rela.got and .got sections.
999
   However, if we are not creating the dynamic sections, we will
1000
   not actually use these entries.  Reset the size of .rela.got
1001
   and .got, which will cause them to get stripped from the output
1002
   file below.  */
1003
0
      s = elf_hash_table (info)->srelgot;
1004
0
      if (s != NULL)
1005
0
  s->size = 0;
1006
0
      s = elf_hash_table (info)->sgotplt;
1007
0
      if (s != NULL)
1008
0
  s->size = 0;
1009
0
      s = elf_hash_table (info)->sgot;
1010
0
      if (s != NULL)
1011
0
  s->size = 0;
1012
0
    }
1013
1014
  /* If this is a static link, we need to discard all the got entries we've
1015
     recorded.  */
1016
0
  if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1017
0
    elf_link_hash_traverse (elf_hash_table (info),
1018
0
          elf_vax_discard_got_entries,
1019
0
          info);
1020
1021
0
  return true;
1022
0
}
1023
1024
/* Set the sizes of the dynamic sections.  */
1025
1026
static bool
1027
elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1028
0
{
1029
0
  bfd *dynobj;
1030
0
  asection *s;
1031
0
  bool relocs;
1032
1033
0
  dynobj = elf_hash_table (info)->dynobj;
1034
0
  BFD_ASSERT (dynobj != NULL);
1035
1036
0
  if (elf_hash_table (info)->dynamic_sections_created)
1037
0
    {
1038
      /* Set the contents of the .interp section to the interpreter.  */
1039
0
      if (bfd_link_executable (info) && !info->nointerp)
1040
0
  {
1041
0
    s = bfd_get_linker_section (dynobj, ".interp");
1042
0
    BFD_ASSERT (s != NULL);
1043
0
    s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1044
0
    s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1045
0
  }
1046
0
    }
1047
1048
  /* If this is a -Bsymbolic shared link, then we need to discard all PC
1049
     relative relocs against symbols defined in a regular object.  We
1050
     allocated space for them in the check_relocs routine, but we will not
1051
     fill them in in the relocate_section routine.  */
1052
0
  if (bfd_link_pic (info) && info->symbolic)
1053
0
    elf_vax_link_hash_traverse (elf_hash_table (info),
1054
0
        elf_vax_discard_copies,
1055
0
        NULL);
1056
1057
  /* If this is a -Bsymbolic shared link, we need to discard all the got
1058
     entries we've recorded.  Otherwise, we need to instantiate (allocate
1059
     space for them).  */
1060
0
  elf_link_hash_traverse (elf_hash_table (info),
1061
0
        elf_vax_instantiate_got_entries,
1062
0
        info);
1063
1064
  /* The check_relocs and adjust_dynamic_symbol entry points have
1065
     determined the sizes of the various dynamic sections.  Allocate
1066
     memory for them.  */
1067
0
  relocs = false;
1068
0
  for (s = dynobj->sections; s != NULL; s = s->next)
1069
0
    {
1070
0
      const char *name;
1071
1072
0
      if ((s->flags & SEC_LINKER_CREATED) == 0)
1073
0
  continue;
1074
1075
      /* It's OK to base decisions on the section name, because none
1076
   of the dynobj section names depend upon the input files.  */
1077
0
      name = bfd_section_name (s);
1078
1079
0
      if (strcmp (name, ".plt") == 0)
1080
0
  {
1081
    /* Remember whether there is a PLT.  */
1082
0
    ;
1083
0
  }
1084
0
      else if (startswith (name, ".rela"))
1085
0
  {
1086
0
    if (s->size != 0)
1087
0
      {
1088
0
        if (strcmp (name, ".rela.plt") != 0)
1089
0
    relocs = true;
1090
1091
        /* We use the reloc_count field as a counter if we need
1092
     to copy relocs into the output file.  */
1093
0
        s->reloc_count = 0;
1094
0
      }
1095
0
  }
1096
0
      else if (! startswith (name, ".got")
1097
0
         && strcmp (name, ".dynbss") != 0)
1098
0
  {
1099
    /* It's not one of our sections, so don't allocate space.  */
1100
0
    continue;
1101
0
  }
1102
1103
0
      if (s->size == 0)
1104
0
  {
1105
    /* If we don't need this section, strip it from the
1106
       output file.  This is mostly to handle .rela.bss and
1107
       .rela.plt.  We must create both sections in
1108
       create_dynamic_sections, because they must be created
1109
       before the linker maps input sections to output
1110
       sections.  The linker does that before
1111
       adjust_dynamic_symbol is called, and it is that
1112
       function which decides whether anything needs to go
1113
       into these sections.  */
1114
0
    s->flags |= SEC_EXCLUDE;
1115
0
    continue;
1116
0
  }
1117
1118
0
      if ((s->flags & SEC_HAS_CONTENTS) == 0)
1119
0
  continue;
1120
1121
      /* Allocate memory for the section contents.  */
1122
0
      s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1123
0
      if (s->contents == NULL)
1124
0
  return false;
1125
0
    }
1126
1127
0
  return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
1128
0
}
1129
1130
/* This function is called via elf_vax_link_hash_traverse if we are
1131
   creating a shared object with -Bsymbolic.  It discards the space
1132
   allocated to copy PC relative relocs against symbols which are defined
1133
   in regular objects.  We allocated space for them in the check_relocs
1134
   routine, but we won't fill them in in the relocate_section routine.  */
1135
1136
static bool
1137
elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1138
      void * ignore ATTRIBUTE_UNUSED)
1139
0
{
1140
0
  struct elf_vax_pcrel_relocs_copied *s;
1141
1142
  /* We only discard relocs for symbols defined in a regular object.  */
1143
0
  if (!h->root.def_regular)
1144
0
    return true;
1145
1146
0
  for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1147
0
    s->section->size -= s->count * sizeof (Elf32_External_Rela);
1148
1149
0
  return true;
1150
0
}
1151
1152
/* This function is called via elf_link_hash_traverse.  It looks for
1153
   entries that have GOT or PLT (.GOT) references.  If creating a shared
1154
   object with -Bsymbolic, or the symbol has been forced local, then it
1155
   resets the reference count back to -1 so normal PC32 relocation will
1156
   be done.  Otherwise space in the .got and .rela.got will be reserved
1157
   for the symbol.  */
1158
1159
static bool
1160
elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1161
0
{
1162
0
  struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1163
0
  bfd *dynobj;
1164
0
  asection *sgot;
1165
0
  asection *srelgot;
1166
1167
  /* We don't care about non-GOT (and non-PLT) entries.  */
1168
0
  if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1169
0
    return true;
1170
1171
0
  dynobj = elf_hash_table (info)->dynobj;
1172
0
  BFD_ASSERT (dynobj != NULL);
1173
1174
0
  sgot = elf_hash_table (info)->sgot;
1175
0
  srelgot = elf_hash_table (info)->srelgot;
1176
1177
0
  if (SYMBOL_REFERENCES_LOCAL (info, h))
1178
0
    {
1179
0
      h->got.refcount = -1;
1180
0
      h->plt.refcount = -1;
1181
0
    }
1182
0
  else if (h->got.refcount > 0)
1183
0
    {
1184
      /* Make sure this symbol is output as a dynamic symbol.  */
1185
0
      if (h->dynindx == -1)
1186
0
  {
1187
0
    if (!bfd_elf_link_record_dynamic_symbol (info, h))
1188
0
      return false;
1189
0
  }
1190
1191
      /* Allocate space in the .got and .rela.got sections.  */
1192
0
      sgot->size += 4;
1193
0
      srelgot->size += sizeof (Elf32_External_Rela);
1194
0
    }
1195
1196
0
  return true;
1197
0
}
1198
1199
/* Relocate an VAX ELF section.  */
1200
1201
static int
1202
elf_vax_relocate_section (bfd *output_bfd,
1203
        struct bfd_link_info *info,
1204
        bfd *input_bfd,
1205
        asection *input_section,
1206
        bfd_byte *contents,
1207
        Elf_Internal_Rela *relocs,
1208
        Elf_Internal_Sym *local_syms,
1209
        asection **local_sections)
1210
0
{
1211
0
  Elf_Internal_Shdr *symtab_hdr;
1212
0
  struct elf_link_hash_entry **sym_hashes;
1213
0
  bfd_vma plt_index;
1214
0
  bfd_vma got_offset;
1215
0
  asection *sgot;
1216
0
  asection *splt;
1217
0
  asection *sgotplt;
1218
0
  asection *sreloc;
1219
0
  Elf_Internal_Rela *rel;
1220
0
  Elf_Internal_Rela *relend;
1221
1222
0
  symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1223
0
  sym_hashes = elf_sym_hashes (input_bfd);
1224
1225
0
  sgot = NULL;
1226
0
  splt = NULL;
1227
0
  sgotplt = NULL;
1228
0
  sreloc = NULL;
1229
1230
0
  rel = relocs;
1231
0
  relend = relocs + input_section->reloc_count;
1232
0
  for (; rel < relend; rel++)
1233
0
    {
1234
0
      int r_type;
1235
0
      reloc_howto_type *howto;
1236
0
      unsigned long r_symndx;
1237
0
      struct elf_link_hash_entry *h;
1238
0
      Elf_Internal_Sym *sym;
1239
0
      asection *sec;
1240
0
      bfd_vma relocation;
1241
0
      bfd_reloc_status_type r;
1242
1243
0
      r_type = ELF32_R_TYPE (rel->r_info);
1244
0
      if (r_type < 0 || r_type >= (int) R_VAX_max)
1245
0
  {
1246
0
    bfd_set_error (bfd_error_bad_value);
1247
0
    return false;
1248
0
  }
1249
0
      howto = howto_table + r_type;
1250
1251
0
      r_symndx = ELF32_R_SYM (rel->r_info);
1252
0
      h = NULL;
1253
0
      sym = NULL;
1254
0
      sec = NULL;
1255
0
      if (r_symndx < symtab_hdr->sh_info)
1256
0
  {
1257
0
    sym = local_syms + r_symndx;
1258
0
    sec = local_sections[r_symndx];
1259
0
    relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1260
0
  }
1261
0
      else
1262
0
  {
1263
0
    bool unresolved_reloc;
1264
0
    bool warned, ignored;
1265
1266
0
    RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1267
0
           r_symndx, symtab_hdr, sym_hashes,
1268
0
           h, sec, relocation,
1269
0
           unresolved_reloc, warned, ignored);
1270
1271
0
    if ((h->root.type == bfd_link_hash_defined
1272
0
        || h->root.type == bfd_link_hash_defweak)
1273
0
        && ((r_type == R_VAX_PLT32
1274
0
       && h->plt.offset != (bfd_vma) -1
1275
0
       && !h->forced_local
1276
0
       && elf_hash_table (info)->dynamic_sections_created)
1277
0
      || (r_type == R_VAX_GOT32
1278
0
          && h->got.offset != (bfd_vma) -1
1279
0
          && !h->forced_local
1280
0
          && elf_hash_table (info)->dynamic_sections_created
1281
0
          && (! bfd_link_pic (info)
1282
0
        || (! info->symbolic && h->dynindx != -1)
1283
0
        || !h->def_regular))
1284
0
      || (bfd_link_pic (info)
1285
0
          && ((! info->symbolic && h->dynindx != -1)
1286
0
        || !h->def_regular)
1287
0
          && ((input_section->flags & SEC_ALLOC) != 0
1288
        /* DWARF will emit R_VAX_32 relocations in its
1289
           sections against symbols defined externally
1290
           in shared libraries.  We can't do anything
1291
           with them here.  */
1292
1293
0
        || ((input_section->flags & SEC_DEBUGGING) != 0
1294
0
            && h->def_dynamic))
1295
0
          && (r_type == R_VAX_8
1296
0
        || r_type == R_VAX_16
1297
0
        || r_type == R_VAX_32))))
1298
      /* In these cases, we don't need the relocation
1299
         value.  We check specially because in some
1300
         obscure cases sec->output_section will be NULL.  */
1301
0
      relocation = 0;
1302
0
  }
1303
1304
0
      if (sec != NULL && discarded_section (sec))
1305
0
  RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1306
0
           rel, 1, relend, howto, 0, contents);
1307
1308
0
      if (bfd_link_relocatable (info))
1309
0
  continue;
1310
1311
0
      switch (r_type)
1312
0
  {
1313
0
  case R_VAX_GOT32:
1314
    /* Relocation is to the address of the entry for this symbol
1315
       in the global offset table.  */
1316
1317
    /* Resolve a GOTxx reloc against a local symbol directly,
1318
       without using the global offset table.  */
1319
0
    if (h == NULL
1320
0
        || h->got.offset == (bfd_vma) -1)
1321
0
      break;
1322
1323
0
    {
1324
0
      bfd_vma off;
1325
1326
0
      sgot = elf_hash_table (info)->sgot;
1327
0
      BFD_ASSERT (sgot != NULL);
1328
1329
0
      off = h->got.offset;
1330
0
      BFD_ASSERT (off < sgot->size);
1331
1332
0
      bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1333
1334
0
      relocation = sgot->output_offset + off;
1335
      /* The GOT relocation uses the addend.  */
1336
0
      rel->r_addend = 0;
1337
1338
      /* Change the reference to be indirect.  */
1339
0
      contents[rel->r_offset - 1] |= 0x10;
1340
0
      relocation += sgot->output_section->vma;
1341
0
    }
1342
0
    break;
1343
1344
0
  case R_VAX_PC32:
1345
    /* If we are creating an executable and the function this
1346
       reloc refers to is in a shared lib, then we made a PLT
1347
       entry for this symbol and need to handle the reloc like
1348
       a PLT reloc.  */
1349
0
    if (bfd_link_pic (info))
1350
0
       goto r_vax_pc32_shared;
1351
    /* Fall through.  */
1352
0
  case R_VAX_PLT32:
1353
    /* Relocation is to the entry for this symbol in the
1354
       procedure linkage table.  */
1355
1356
    /* Resolve a PLTxx reloc against a local symbol directly,
1357
       without using the procedure linkage table.  */
1358
0
    if (h == NULL
1359
0
        || h->plt.offset == (bfd_vma) -1)
1360
0
      break;
1361
1362
0
    splt = elf_hash_table (info)->splt;
1363
0
    BFD_ASSERT (splt != NULL);
1364
1365
0
    sgotplt = elf_hash_table (info)->sgotplt;
1366
0
    BFD_ASSERT (sgotplt != NULL);
1367
1368
0
    plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1369
1370
    /* Get the offset into the .got table of the entry that
1371
       corresponds to this function.  Each .got entry is 4 bytes.
1372
       The first two are reserved.  */
1373
0
    got_offset = (plt_index + 3) * 4;
1374
1375
    /* We want the relocation to point into the .got.plt instead
1376
       of the plt itself.  */
1377
0
    relocation = (sgotplt->output_section->vma
1378
0
      + sgotplt->output_offset
1379
0
      + got_offset);
1380
0
    contents[rel->r_offset-1] |= 0x10; /* make indirect */
1381
0
    if (rel->r_addend == 2)
1382
0
      {
1383
0
        h->plt.offset |= 1;
1384
0
      }
1385
0
    else if (rel->r_addend != 0)
1386
0
      _bfd_error_handler
1387
        /* xgettext:c-format */
1388
0
        (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1389
0
     " from %pA section ignored"),
1390
0
         input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1391
0
         input_section);
1392
0
    rel->r_addend = 0;
1393
1394
0
    break;
1395
1396
0
  case R_VAX_PC8:
1397
0
  case R_VAX_PC16:
1398
0
  r_vax_pc32_shared:
1399
0
    if (h == NULL
1400
0
        || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1401
0
        || h->forced_local)
1402
0
      break;
1403
    /* Fall through.  */
1404
0
  case R_VAX_8:
1405
0
  case R_VAX_16:
1406
0
  case R_VAX_32:
1407
0
    if (bfd_link_pic (info)
1408
0
        && r_symndx != STN_UNDEF
1409
0
        && (input_section->flags & SEC_ALLOC) != 0
1410
0
        && ((r_type != R_VAX_PC8
1411
0
       && r_type != R_VAX_PC16
1412
0
       && r_type != R_VAX_PC32)
1413
0
      || ((input_section->flags & SEC_CODE)
1414
0
          && (!info->symbolic
1415
0
        || (!h->def_regular && h->type != STT_SECTION)))))
1416
0
      {
1417
0
        Elf_Internal_Rela outrel;
1418
0
        bfd_byte *loc;
1419
0
        bool skip, relocate;
1420
1421
        /* When generating a shared object, these relocations
1422
     are copied into the output file to be resolved at run
1423
     time.  */
1424
0
        if (sreloc == NULL)
1425
0
    {
1426
0
      sreloc = _bfd_elf_get_dynamic_reloc_section
1427
0
        (input_bfd, input_section, /*rela?*/ true);
1428
0
      if (sreloc == NULL)
1429
0
        return false;
1430
0
    }
1431
1432
0
        skip = false;
1433
0
        relocate = false;
1434
1435
0
        outrel.r_offset =
1436
0
    _bfd_elf_section_offset (output_bfd, info, input_section,
1437
0
           rel->r_offset);
1438
0
        if (outrel.r_offset == (bfd_vma) -1)
1439
0
    skip = true;
1440
0
        if (outrel.r_offset == (bfd_vma) -2)
1441
0
    skip = true, relocate = true;
1442
0
        outrel.r_offset += (input_section->output_section->vma
1443
0
          + input_section->output_offset);
1444
1445
0
        if (skip)
1446
0
      memset (&outrel, 0, sizeof outrel);
1447
        /* h->dynindx may be -1 if the symbol was marked to
1448
     become local.  */
1449
0
        else if (h != NULL
1450
0
           && ((! info->symbolic && h->dynindx != -1)
1451
0
         || !h->def_regular))
1452
0
    {
1453
0
      BFD_ASSERT (h->dynindx != -1);
1454
0
      outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1455
0
      outrel.r_addend = relocation + rel->r_addend;
1456
0
    }
1457
0
        else
1458
0
    {
1459
0
      if (r_type == R_VAX_32)
1460
0
        {
1461
0
          relocate = true;
1462
0
          outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1463
0
          BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1464
0
                 &contents[rel->r_offset]) == 0);
1465
0
          outrel.r_addend = relocation + rel->r_addend;
1466
0
        }
1467
0
      else
1468
0
        {
1469
0
          long indx;
1470
1471
0
          if (bfd_is_abs_section (sec))
1472
0
      indx = 0;
1473
0
          else if (sec == NULL || sec->owner == NULL)
1474
0
      {
1475
0
        bfd_set_error (bfd_error_bad_value);
1476
0
        return false;
1477
0
      }
1478
0
          else
1479
0
      {
1480
0
        asection *osec;
1481
1482
        /* We are turning this relocation into one
1483
           against a section symbol.  It would be
1484
           proper to subtract the symbol's value,
1485
           osec->vma, from the emitted reloc addend,
1486
           but ld.so expects buggy relocs.  */
1487
0
        osec = sec->output_section;
1488
0
        indx = elf_section_data (osec)->dynindx;
1489
0
        if (indx == 0)
1490
0
          {
1491
0
            struct elf_link_hash_table *htab;
1492
0
            htab = elf_hash_table (info);
1493
0
            osec = htab->text_index_section;
1494
0
            indx = elf_section_data (osec)->dynindx;
1495
0
          }
1496
0
        BFD_ASSERT (indx != 0);
1497
0
      }
1498
1499
0
          outrel.r_info = ELF32_R_INFO (indx, r_type);
1500
0
          outrel.r_addend = relocation + rel->r_addend;
1501
0
        }
1502
0
    }
1503
1504
0
        if ((input_section->flags & SEC_CODE) != 0
1505
0
      || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1506
0
          && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1507
0
          && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1508
0
          && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1509
0
          && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1510
0
    {
1511
0
      if (h != NULL)
1512
0
        _bfd_error_handler
1513
          /* xgettext:c-format */
1514
0
          (_("%pB: warning: %s relocation against symbol `%s'"
1515
0
       " from %pA section"),
1516
0
          input_bfd, howto->name, h->root.root.string,
1517
0
          input_section);
1518
0
      else
1519
0
        _bfd_error_handler
1520
          /* xgettext:c-format */
1521
0
          (_("%pB: warning: %s relocation to %#" PRIx64
1522
0
       " from %pA section"),
1523
0
          input_bfd, howto->name, (uint64_t) outrel.r_addend,
1524
0
          input_section);
1525
0
    }
1526
0
        loc = sreloc->contents;
1527
0
        loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1528
0
        bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1529
1530
        /* This reloc will be computed at runtime, so there's no
1531
     need to do anything now, except for R_VAX_32
1532
     relocations that have been turned into
1533
     R_VAX_RELATIVE.  */
1534
0
        if (!relocate)
1535
0
    continue;
1536
0
      }
1537
1538
0
    break;
1539
1540
0
  case R_VAX_GNU_VTINHERIT:
1541
0
  case R_VAX_GNU_VTENTRY:
1542
    /* These are no-ops in the end.  */
1543
0
    continue;
1544
1545
0
  default:
1546
0
    break;
1547
0
  }
1548
1549
      /* VAX PCREL relocations are from the end of relocation, not the start.
1550
   So subtract the difference from the relocation amount since we can't
1551
   add it to the offset.  */
1552
0
      if (howto->pc_relative && howto->pcrel_offset)
1553
0
  relocation -= bfd_get_reloc_size(howto);
1554
1555
0
      r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1556
0
            contents, rel->r_offset,
1557
0
            relocation, rel->r_addend);
1558
1559
0
      if (r != bfd_reloc_ok)
1560
0
  {
1561
0
    switch (r)
1562
0
      {
1563
0
      default:
1564
0
      case bfd_reloc_outofrange:
1565
0
        abort ();
1566
0
      case bfd_reloc_overflow:
1567
0
        {
1568
0
    const char *name;
1569
1570
0
    if (h != NULL)
1571
0
      name = NULL;
1572
0
    else
1573
0
      {
1574
0
        name = bfd_elf_string_from_elf_section (input_bfd,
1575
0
                  symtab_hdr->sh_link,
1576
0
                  sym->st_name);
1577
0
        if (name == NULL)
1578
0
          return false;
1579
0
        if (*name == '\0')
1580
0
          name = bfd_section_name (sec);
1581
0
      }
1582
0
    info->callbacks->reloc_overflow
1583
0
      (info, (h ? &h->root : NULL), name, howto->name,
1584
0
       (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1585
0
        }
1586
0
        break;
1587
0
      }
1588
0
  }
1589
0
    }
1590
1591
0
  return true;
1592
0
}
1593
1594
/* Finish up dynamic symbol handling.  We set the contents of various
1595
   dynamic sections here.  */
1596
1597
static bool
1598
elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1599
             struct elf_link_hash_entry *h,
1600
             Elf_Internal_Sym *sym)
1601
0
{
1602
0
  bfd *dynobj;
1603
1604
0
  dynobj = elf_hash_table (info)->dynobj;
1605
1606
0
  if (h->plt.offset != (bfd_vma) -1)
1607
0
    {
1608
0
      asection *splt;
1609
0
      asection *sgot;
1610
0
      asection *srela;
1611
0
      bfd_vma plt_index;
1612
0
      bfd_vma got_offset;
1613
0
      bfd_vma addend;
1614
0
      Elf_Internal_Rela rela;
1615
0
      bfd_byte *loc;
1616
1617
      /* This symbol has an entry in the procedure linkage table.  Set
1618
   it up.  */
1619
0
      BFD_ASSERT (h->dynindx != -1);
1620
1621
0
      splt = elf_hash_table (info)->splt;
1622
0
      sgot = elf_hash_table (info)->sgotplt;
1623
0
      srela = elf_hash_table (info)->srelplt;
1624
0
      BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1625
1626
0
      addend = 2 * (h->plt.offset & 1);
1627
0
      h->plt.offset &= ~1;
1628
1629
      /* Get the index in the procedure linkage table which
1630
   corresponds to this symbol.  This is the index of this symbol
1631
   in all the symbols for which we are making plt entries.  The
1632
   first entry in the procedure linkage table is reserved.  */
1633
0
      plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1634
1635
      /* Get the offset into the .got table of the entry that
1636
   corresponds to this function.  Each .got entry is 4 bytes.
1637
   The first two are reserved.  */
1638
0
      got_offset = (plt_index + 3) * 4;
1639
1640
      /* Fill in the entry in the procedure linkage table.  */
1641
0
      memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1642
0
      PLT_ENTRY_SIZE);
1643
1644
      /* The offset is relative to the first extension word.  */
1645
0
      bfd_put_32 (output_bfd,
1646
0
      -(h->plt.offset + 8),
1647
0
      splt->contents + h->plt.offset + 4);
1648
1649
0
      bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1650
0
      splt->contents + h->plt.offset + 8);
1651
1652
      /* Fill in the entry in the global offset table.  */
1653
0
      bfd_put_32 (output_bfd,
1654
0
      (splt->output_section->vma
1655
0
       + splt->output_offset
1656
0
       + h->plt.offset) + addend,
1657
0
      sgot->contents + got_offset);
1658
1659
      /* Fill in the entry in the .rela.plt section.  */
1660
0
      rela.r_offset = (sgot->output_section->vma
1661
0
           + sgot->output_offset
1662
0
           + got_offset);
1663
0
      rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1664
0
      rela.r_addend = addend;
1665
0
      loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1666
0
      bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1667
1668
0
      if (!h->def_regular)
1669
0
  {
1670
    /* Mark the symbol as undefined, rather than as defined in
1671
       the .plt section.  Leave the value alone.  */
1672
0
    sym->st_shndx = SHN_UNDEF;
1673
0
  }
1674
0
    }
1675
1676
0
  if (h->got.offset != (bfd_vma) -1)
1677
0
    {
1678
0
      asection *sgot;
1679
0
      asection *srela;
1680
0
      Elf_Internal_Rela rela;
1681
0
      bfd_byte *loc;
1682
1683
      /* This symbol has an entry in the global offset table.  Set it
1684
   up.  */
1685
0
      sgot = elf_hash_table (info)->sgot;
1686
0
      srela = elf_hash_table (info)->srelgot;
1687
0
      BFD_ASSERT (sgot != NULL && srela != NULL);
1688
1689
0
      rela.r_offset = (sgot->output_section->vma
1690
0
           + sgot->output_offset
1691
0
           + h->got.offset);
1692
0
      rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1693
0
      rela.r_addend = bfd_get_signed_32 (output_bfd,
1694
0
           sgot->contents + h->got.offset);
1695
1696
0
      loc = srela->contents;
1697
0
      loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1698
0
      bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1699
0
    }
1700
1701
0
  if (h->needs_copy)
1702
0
    {
1703
0
      asection *s;
1704
0
      Elf_Internal_Rela rela;
1705
0
      bfd_byte *loc;
1706
1707
      /* This symbol needs a copy reloc.  Set it up.  */
1708
0
      BFD_ASSERT (h->dynindx != -1
1709
0
      && (h->root.type == bfd_link_hash_defined
1710
0
          || h->root.type == bfd_link_hash_defweak));
1711
1712
0
      s = bfd_get_linker_section (dynobj, ".rela.bss");
1713
0
      BFD_ASSERT (s != NULL);
1714
1715
0
      rela.r_offset = (h->root.u.def.value
1716
0
           + h->root.u.def.section->output_section->vma
1717
0
           + h->root.u.def.section->output_offset);
1718
0
      rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1719
0
      rela.r_addend = 0;
1720
0
      loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1721
0
      bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1722
0
    }
1723
1724
  /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
1725
0
  if (h == elf_hash_table (info)->hdynamic
1726
0
      || h == elf_hash_table (info)->hgot)
1727
0
    sym->st_shndx = SHN_ABS;
1728
1729
0
  return true;
1730
0
}
1731
1732
/* Finish up the dynamic sections.  */
1733
1734
static bool
1735
elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1736
0
{
1737
0
  bfd *dynobj;
1738
0
  asection *sgot;
1739
0
  asection *sdyn;
1740
1741
0
  dynobj = elf_hash_table (info)->dynobj;
1742
1743
0
  sgot = elf_hash_table (info)->sgotplt;
1744
0
  BFD_ASSERT (sgot != NULL);
1745
0
  sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1746
1747
0
  if (elf_hash_table (info)->dynamic_sections_created)
1748
0
    {
1749
0
      asection *splt;
1750
0
      Elf32_External_Dyn *dyncon, *dynconend;
1751
1752
0
      splt = elf_hash_table (info)->splt;
1753
0
      BFD_ASSERT (splt != NULL && sdyn != NULL);
1754
1755
0
      dyncon = (Elf32_External_Dyn *) sdyn->contents;
1756
0
      dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1757
0
      for (; dyncon < dynconend; dyncon++)
1758
0
  {
1759
0
    Elf_Internal_Dyn dyn;
1760
0
    asection *s;
1761
1762
0
    bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1763
1764
0
    switch (dyn.d_tag)
1765
0
      {
1766
0
      default:
1767
0
        break;
1768
1769
0
      case DT_PLTGOT:
1770
0
        s = elf_hash_table (info)->sgotplt;
1771
0
        goto get_vma;
1772
0
      case DT_JMPREL:
1773
0
        s = elf_hash_table (info)->srelplt;
1774
0
      get_vma:
1775
0
        dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1776
0
        bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1777
0
        break;
1778
1779
0
      case DT_PLTRELSZ:
1780
0
        s = elf_hash_table (info)->srelplt;
1781
0
        dyn.d_un.d_val = s->size;
1782
0
        bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1783
0
        break;
1784
0
      }
1785
0
  }
1786
1787
      /* Fill in the first entry in the procedure linkage table.  */
1788
0
      if (splt->size > 0)
1789
0
  {
1790
0
    memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1791
0
    bfd_put_32 (output_bfd,
1792
0
        (sgot->output_section->vma
1793
0
         + sgot->output_offset + 4
1794
0
         - (splt->output_section->vma + 6)),
1795
0
        splt->contents + 2);
1796
0
    bfd_put_32 (output_bfd,
1797
0
        (sgot->output_section->vma
1798
0
         + sgot->output_offset + 8
1799
0
         - (splt->output_section->vma + 12)),
1800
0
        splt->contents + 8);
1801
0
    elf_section_data (splt->output_section)->this_hdr.sh_entsize
1802
0
     = PLT_ENTRY_SIZE;
1803
0
  }
1804
0
    }
1805
1806
  /* Fill in the first three entries in the global offset table.  */
1807
0
  if (sgot->size > 0)
1808
0
    {
1809
0
      if (sdyn == NULL)
1810
0
  bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1811
0
      else
1812
0
  bfd_put_32 (output_bfd,
1813
0
        sdyn->output_section->vma + sdyn->output_offset,
1814
0
        sgot->contents);
1815
0
      bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1816
0
      bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1817
0
    }
1818
1819
0
  if (elf_section_data (sgot->output_section) != NULL)
1820
0
    elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1821
1822
0
  return true;
1823
0
}
1824
1825
static enum elf_reloc_type_class
1826
elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1827
        const asection *rel_sec ATTRIBUTE_UNUSED,
1828
        const Elf_Internal_Rela *rela)
1829
0
{
1830
0
  switch ((int) ELF32_R_TYPE (rela->r_info))
1831
0
    {
1832
0
    case R_VAX_RELATIVE:
1833
0
      return reloc_class_relative;
1834
0
    case R_VAX_JMP_SLOT:
1835
0
      return reloc_class_plt;
1836
0
    case R_VAX_COPY:
1837
0
      return reloc_class_copy;
1838
0
    default:
1839
0
      return reloc_class_normal;
1840
0
    }
1841
0
}
1842
1843
static bfd_vma
1844
elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1845
         const arelent *rel ATTRIBUTE_UNUSED)
1846
0
{
1847
0
  return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1848
0
}
1849
1850
#define TARGET_LITTLE_SYM   vax_elf32_vec
1851
#define TARGET_LITTLE_NAME    "elf32-vax"
1852
#define ELF_MACHINE_CODE    EM_VAX
1853
#define ELF_MAXPAGESIZE     0x1000
1854
1855
#define elf_backend_create_dynamic_sections \
1856
          _bfd_elf_create_dynamic_sections
1857
#define bfd_elf32_bfd_link_hash_table_create \
1858
          elf_vax_link_hash_table_create
1859
#define bfd_elf32_bfd_final_link  bfd_elf_gc_common_final_link
1860
1861
#define elf_backend_check_relocs  elf_vax_check_relocs
1862
#define elf_backend_adjust_dynamic_symbol \
1863
          elf_vax_adjust_dynamic_symbol
1864
#define elf_backend_always_size_sections \
1865
          elf_vax_always_size_sections
1866
#define elf_backend_size_dynamic_sections \
1867
          elf_vax_size_dynamic_sections
1868
#define elf_backend_init_index_section  _bfd_elf_init_1_index_section
1869
#define elf_backend_relocate_section  elf_vax_relocate_section
1870
#define elf_backend_finish_dynamic_symbol \
1871
          elf_vax_finish_dynamic_symbol
1872
#define elf_backend_finish_dynamic_sections \
1873
          elf_vax_finish_dynamic_sections
1874
#define elf_backend_reloc_type_class  elf_vax_reloc_type_class
1875
#define elf_backend_gc_mark_hook  elf_vax_gc_mark_hook
1876
#define elf_backend_plt_sym_val   elf_vax_plt_sym_val
1877
#define bfd_elf32_bfd_merge_private_bfd_data \
1878
          elf32_vax_merge_private_bfd_data
1879
#define bfd_elf32_bfd_set_private_flags \
1880
          elf32_vax_set_private_flags
1881
#define bfd_elf32_bfd_print_private_bfd_data \
1882
          elf32_vax_print_private_bfd_data
1883
1884
#define elf_backend_can_gc_sections 1
1885
#define elf_backend_want_got_plt  1
1886
#define elf_backend_plt_readonly  1
1887
#define elf_backend_want_plt_sym  0
1888
#define elf_backend_got_header_size 16
1889
#define elf_backend_rela_normal   1
1890
#define elf_backend_dtrel_excludes_plt  1
1891
1892
#include "elf32-target.h"