Set no file contents PT_LOAD p_offset to first page
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
82704155 2 Copyright (C) 1993-2019 Free Software Foundation, Inc.
90ace9e9
JT
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
90ace9e9 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
90ace9e9 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
90ace9e9 21
90ace9e9 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
90ace9e9
JT
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576 29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
f3185997 30static bfd_boolean rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
ce71b576
NC
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
ce71b576
NC
37static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
6db7e006
MR
49static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
ce71b576
NC
51
52static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
2c3fc389 53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
6346d5ca 58 3, /* size (0 = byte, 1 = short, 2 = long) */
90ace9e9 59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
f3185997 281static bfd_boolean
64d29018 282rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
90ace9e9 283{
cd21f5da
NC
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
695344c0 289 /* xgettext:c-format */
0aa13fee 290 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 291 abfd, r_type);
cd21f5da 292 bfd_set_error (bfd_error_bad_value);
f3185997 293 return FALSE;
cd21f5da
NC
294 }
295 cache_ptr->howto = &howto_table[r_type];
f3185997 296 return TRUE;
90ace9e9
JT
297}
298
299#define elf_info_to_howto rtype_to_howto
300
301static const struct
302{
303 bfd_reloc_code_real_type bfd_val;
304 int elf_val;
305} reloc_map[] = {
306 { BFD_RELOC_NONE, R_VAX_NONE },
307 { BFD_RELOC_32, R_VAX_32 },
308 { BFD_RELOC_16, R_VAX_16 },
309 { BFD_RELOC_8, R_VAX_8 },
310 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
311 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
312 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
313 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
314 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
315 { BFD_RELOC_NONE, R_VAX_COPY },
316 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
317 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
318 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
319 { BFD_RELOC_CTOR, R_VAX_32 },
320 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
321 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
322};
323
324static reloc_howto_type *
ce71b576 325reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
326{
327 unsigned int i;
328 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
329 {
330 if (reloc_map[i].bfd_val == code)
331 return &howto_table[reloc_map[i].elf_val];
332 }
333 return 0;
334}
335
157090f7
AM
336static reloc_howto_type *
337reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
338 const char *r_name)
339{
340 unsigned int i;
341
342 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
343 if (howto_table[i].name != NULL
344 && strcasecmp (howto_table[i].name, r_name) == 0)
345 return &howto_table[i];
346
347 return NULL;
348}
349
90ace9e9 350#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 351#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
352#define ELF_ARCH bfd_arch_vax
353/* end code generated by elf.el */
90ace9e9
JT
354\f
355/* Functions for the VAX ELF linker. */
356
357/* The name of the dynamic interpreter. This is put in the .interp
358 section. */
359
360#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
361
362/* The size in bytes of an entry in the procedure linkage table. */
363
364#define PLT_ENTRY_SIZE 12
365
366/* The first entry in a procedure linkage table looks like this. See
367 the SVR4 ABI VAX supplement to see how this works. */
368
369static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
370{
371 0xdd, 0xef, /* pushl l^ */
372 0, 0, 0, 0, /* offset to .plt.got + 4 */
373 0x17, 0xff, /* jmp @L^(pc) */
374 0, 0, 0, 0, /* offset to .plt.got + 8 */
375};
376
377/* Subsequent entries in a procedure linkage table look like this. */
378
379static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
380{
6c4fb25a 381 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 382 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
383 0, 0, 0, 0, /* replaced with offset to start of .plt */
384 0, 0, 0, 0, /* index into .rela.plt */
385};
386
387/* The VAX linker needs to keep track of the number of relocs that it
388 decides to copy in check_relocs for each symbol. This is so that it
389 can discard PC relative relocs if it doesn't need them when linking
390 with -Bsymbolic. We store the information in a field extending the
391 regular ELF linker hash table. */
392
393/* This structure keeps track of the number of PC relative relocs we have
394 copied for a given symbol. */
395
396struct elf_vax_pcrel_relocs_copied
397{
398 /* Next section. */
399 struct elf_vax_pcrel_relocs_copied *next;
400 /* A section in dynobj. */
401 asection *section;
402 /* Number of relocs copied in this section. */
403 bfd_size_type count;
404};
405
406/* VAX ELF linker hash entry. */
407
408struct elf_vax_link_hash_entry
409{
410 struct elf_link_hash_entry root;
411
412 /* Number of PC relative relocs copied for this symbol. */
413 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
414
415 bfd_vma got_addend;
416};
417
90ace9e9
JT
418/* Declare this now that the above structures are defined. */
419
ce71b576 420static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 421 void *);
90ace9e9 422
b29635ba
JT
423/* Declare this now that the above structures are defined. */
424
ce71b576 425static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 426 void *);
b29635ba 427
90ace9e9
JT
428/* Traverse an VAX ELF linker hash table. */
429
430#define elf_vax_link_hash_traverse(table, func, info) \
431 (elf_link_hash_traverse \
4dfe6ac6 432 ((table), \
2c3fc389 433 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
434 (info)))
435
90ace9e9
JT
436/* Create an entry in an VAX ELF linker hash table. */
437
438static struct bfd_hash_entry *
ce71b576
NC
439elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
440 struct bfd_hash_table *table,
441 const char *string)
90ace9e9
JT
442{
443 struct elf_vax_link_hash_entry *ret =
444 (struct elf_vax_link_hash_entry *) entry;
445
446 /* Allocate the structure if it has not already been allocated by a
447 subclass. */
ce71b576 448 if (ret == NULL)
90ace9e9
JT
449 ret = ((struct elf_vax_link_hash_entry *)
450 bfd_hash_allocate (table,
451 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 452 if (ret == NULL)
90ace9e9
JT
453 return (struct bfd_hash_entry *) ret;
454
455 /* Call the allocation method of the superclass. */
456 ret = ((struct elf_vax_link_hash_entry *)
457 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
458 table, string));
ce71b576 459 if (ret != NULL)
90ace9e9
JT
460 {
461 ret->pcrel_relocs_copied = NULL;
462 }
463
464 return (struct bfd_hash_entry *) ret;
465}
466
467/* Create an VAX ELF linker hash table. */
468
469static struct bfd_link_hash_table *
ce71b576 470elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 471{
4dfe6ac6
NC
472 struct elf_link_hash_table *ret;
473 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 474
7bf52ea2 475 ret = bfd_zmalloc (amt);
ce71b576 476 if (ret == NULL)
90ace9e9
JT
477 return NULL;
478
4dfe6ac6 479 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 480 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
481 sizeof (struct elf_vax_link_hash_entry),
482 GENERIC_ELF_DATA))
90ace9e9
JT
483 {
484 free (ret);
485 return NULL;
486 }
487
4dfe6ac6 488 return &ret->root;
90ace9e9
JT
489}
490
491/* Keep vax-specific flags in the ELF header */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
494{
495 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
90ace9e9
JT
498}
499
500/* Merge backend specific data from an object file to the output
501 object file when linking. */
b34976b6 502static bfd_boolean
50e03d47 503elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
90ace9e9 504{
50e03d47 505 bfd *obfd = info->output_bfd;
90ace9e9
JT
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 510 return TRUE;
90ace9e9
JT
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
513
514 if (!elf_flags_init (obfd))
515 {
b34976b6 516 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
517 elf_elfheader (obfd)->e_flags = in_flags;
518 }
519
b34976b6 520 return TRUE;
90ace9e9
JT
521}
522
523/* Display the flags field */
b34976b6 524static bfd_boolean
2c3fc389 525elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
526{
527 FILE *file = (FILE *) ptr;
528
529 BFD_ASSERT (abfd != NULL && ptr != NULL);
530
531 /* Print normal ELF private data. */
532 _bfd_elf_print_private_bfd_data (abfd, ptr);
533
534 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
535
536 /* xgettext:c-format */
537 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
538
179d3252 539 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
540 fprintf (file, _(" [nonpic]"));
541
179d3252 542 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
543 fprintf (file, _(" [d-float]"));
544
179d3252 545 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
546 fprintf (file, _(" [g-float]"));
547
548 fputc ('\n', file);
549
b34976b6 550 return TRUE;
90ace9e9
JT
551}
552/* Look through the relocs for a section during the first phase, and
553 allocate space in the global offset table or procedure linkage
554 table. */
555
b34976b6 556static bfd_boolean
ce71b576
NC
557elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
558 const Elf_Internal_Rela *relocs)
90ace9e9
JT
559{
560 bfd *dynobj;
561 Elf_Internal_Shdr *symtab_hdr;
562 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
563 const Elf_Internal_Rela *rel;
564 const Elf_Internal_Rela *rel_end;
90ace9e9
JT
565 asection *sreloc;
566
0e1862bb 567 if (bfd_link_relocatable (info))
b34976b6 568 return TRUE;
90ace9e9
JT
569
570 dynobj = elf_hash_table (info)->dynobj;
571 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
572 sym_hashes = elf_sym_hashes (abfd);
90ace9e9 573
90ace9e9
JT
574 sreloc = NULL;
575
576 rel_end = relocs + sec->reloc_count;
577 for (rel = relocs; rel < rel_end; rel++)
578 {
579 unsigned long r_symndx;
580 struct elf_link_hash_entry *h;
581
582 r_symndx = ELF32_R_SYM (rel->r_info);
583
584 if (r_symndx < symtab_hdr->sh_info)
585 h = NULL;
586 else
973a3492
L
587 {
588 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
589 while (h->root.type == bfd_link_hash_indirect
590 || h->root.type == bfd_link_hash_warning)
591 h = (struct elf_link_hash_entry *) h->root.u.i.link;
592 }
90ace9e9
JT
593
594 switch (ELF32_R_TYPE (rel->r_info))
595 {
596 case R_VAX_GOT32:
fe723c87 597 BFD_ASSERT (h != NULL);
90ace9e9 598
7b6021f1
MR
599 /* If this is a local symbol, we resolve it directly without
600 creating a global offset table entry. */
125b5bac
MR
601 if (h->forced_local
602 || h == elf_hash_table (info)->hgot
603 || h == elf_hash_table (info)->hplt)
7b6021f1
MR
604 break;
605
90ace9e9
JT
606 /* This symbol requires a global offset table entry. */
607
608 if (dynobj == NULL)
609 {
610 /* Create the .got section. */
611 elf_hash_table (info)->dynobj = dynobj = abfd;
612 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 613 return FALSE;
90ace9e9
JT
614 }
615
90ace9e9
JT
616 if (h != NULL)
617 {
618 struct elf_vax_link_hash_entry *eh;
619
620 eh = (struct elf_vax_link_hash_entry *) h;
621 if (h->got.refcount == -1)
622 {
623 h->got.refcount = 1;
624 eh->got_addend = rel->r_addend;
90ace9e9
JT
625 }
626 else
627 {
628 h->got.refcount++;
629 if (eh->got_addend != (bfd_vma) rel->r_addend)
4eca0228 630 _bfd_error_handler
695344c0 631 /* xgettext:c-format */
2dcf00ce
AM
632 (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
633 " not match previous GOT addend of %" PRId64),
634 abfd, (int64_t) rel->r_addend, h->root.root.string,
635 (int64_t) eh->got_addend);
cedb70c5 636
90ace9e9
JT
637 }
638 }
639 break;
640
641 case R_VAX_PLT32:
642 /* This symbol requires a procedure linkage table entry. We
643 actually build the entry in adjust_dynamic_symbol,
07d6d2b8
AM
644 because this might be a case of linking PIC code which is
645 never referenced by a dynamic object, in which case we
646 don't need to generate a procedure linkage table entry
647 after all. */
125b5bac 648 BFD_ASSERT (h != NULL);
90ace9e9
JT
649
650 /* If this is a local symbol, we resolve it directly without
651 creating a procedure linkage table entry. */
125b5bac 652 if (h->forced_local)
fe723c87 653 break;
90ace9e9 654
f5385ebf 655 h->needs_plt = 1;
90ace9e9
JT
656 if (h->plt.refcount == -1)
657 h->plt.refcount = 1;
658 else
659 h->plt.refcount++;
660 break;
661
662 case R_VAX_PC8:
663 case R_VAX_PC16:
664 case R_VAX_PC32:
665 /* If we are creating a shared library and this is not a local
666 symbol, we need to copy the reloc into the shared library.
667 However when linking with -Bsymbolic and this is a global
668 symbol which is defined in an object we are including in the
669 link (i.e., DEF_REGULAR is set), then we can resolve the
670 reloc directly. At this point we have not seen all the input
671 files, so it is possible that DEF_REGULAR is not set now but
672 will be set later (it is never cleared). We account for that
673 possibility below by storing information in the
674 pcrel_relocs_copied field of the hash table entry. */
0e1862bb 675 if (!(bfd_link_pic (info)
90ace9e9
JT
676 && (sec->flags & SEC_ALLOC) != 0
677 && h != NULL
678 && (!info->symbolic
f5385ebf 679 || !h->def_regular)))
90ace9e9 680 {
7b6021f1
MR
681 if (h != NULL
682 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
683 && !h->forced_local)
90ace9e9
JT
684 {
685 /* Make sure a plt entry is created for this symbol if
686 it turns out to be a function defined by a dynamic
687 object. */
688 if (h->plt.refcount == -1)
689 h->plt.refcount = 1;
690 else
691 h->plt.refcount++;
692 }
693 break;
694 }
7b6021f1
MR
695 /* If this is a local symbol, we can resolve it directly. */
696 if (h != NULL
697 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
698 || h->forced_local))
fe723c87
MT
699 break;
700
90ace9e9
JT
701 /* Fall through. */
702 case R_VAX_8:
703 case R_VAX_16:
704 case R_VAX_32:
7b6021f1 705 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
706 {
707 /* Make sure a plt entry is created for this symbol if it
708 turns out to be a function defined by a dynamic object. */
709 if (h->plt.refcount == -1)
710 h->plt.refcount = 1;
711 else
712 h->plt.refcount++;
713 }
714
715 /* If we are creating a shared library, we need to copy the
716 reloc into the shared library. */
0e1862bb 717 if (bfd_link_pic (info)
90ace9e9
JT
718 && (sec->flags & SEC_ALLOC) != 0)
719 {
720 /* When creating a shared object, we must copy these
721 reloc types into the output file. We create a reloc
722 section in dynobj and make room for this reloc. */
723 if (sreloc == NULL)
724 {
83bac4b0
NC
725 sreloc = _bfd_elf_make_dynamic_reloc_section
726 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 727
83bac4b0 728 if (sreloc == NULL)
b34976b6 729 return FALSE;
90ace9e9 730
90ace9e9
JT
731 if (sec->flags & SEC_READONLY)
732 info->flags |= DF_TEXTREL;
733 }
734
eea6121a 735 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
736
737 /* If we are linking with -Bsymbolic, we count the number of
738 PC relative relocations we have entered for this symbol,
739 so that we can discard them again if the symbol is later
740 defined by a regular object. Note that this function is
19852a2a 741 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
742 which means that h is really a pointer to an
743 elf_vax_link_hash_entry. */
744 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
745 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
746 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
747 && info->symbolic)
748 {
749 struct elf_vax_link_hash_entry *eh;
750 struct elf_vax_pcrel_relocs_copied *p;
751
752 eh = (struct elf_vax_link_hash_entry *) h;
753
754 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
755 if (p->section == sreloc)
756 break;
757
758 if (p == NULL)
759 {
760 p = ((struct elf_vax_pcrel_relocs_copied *)
761 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
762 if (p == NULL)
b34976b6 763 return FALSE;
90ace9e9
JT
764 p->next = eh->pcrel_relocs_copied;
765 eh->pcrel_relocs_copied = p;
766 p->section = sreloc;
767 p->count = 0;
768 }
769
770 ++p->count;
771 }
772 }
773
774 break;
775
776 /* This relocation describes the C++ object vtable hierarchy.
777 Reconstruct it for later use during GC. */
778 case R_VAX_GNU_VTINHERIT:
c152c796 779 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 780 return FALSE;
90ace9e9
JT
781 break;
782
783 /* This relocation describes which C++ vtable entries are actually
784 used. Record for later use during GC. */
785 case R_VAX_GNU_VTENTRY:
a0ea3a14 786 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 787 return FALSE;
90ace9e9
JT
788 break;
789
790 default:
791 break;
792 }
793 }
794
b34976b6 795 return TRUE;
90ace9e9
JT
796}
797
798/* Return the section that should be marked against GC for a given
799 relocation. */
800
801static asection *
ce71b576 802elf_vax_gc_mark_hook (asection *sec,
07adf181 803 struct bfd_link_info *info,
ce71b576
NC
804 Elf_Internal_Rela *rel,
805 struct elf_link_hash_entry *h,
806 Elf_Internal_Sym *sym)
90ace9e9
JT
807{
808 if (h != NULL)
07adf181
AM
809 switch (ELF32_R_TYPE (rel->r_info))
810 {
811 case R_VAX_GNU_VTINHERIT:
812 case R_VAX_GNU_VTENTRY:
813 return NULL;
814 }
815
816 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
817}
818
90ace9e9
JT
819/* Adjust a symbol defined by a dynamic object and referenced by a
820 regular object. The current definition is in some section of the
821 dynamic object, but we're not including those sections. We have to
822 change the definition to something the rest of the link can
823 understand. */
824
b34976b6 825static bfd_boolean
a0f0eb1e
MR
826elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
827 struct elf_link_hash_entry *h)
90ace9e9
JT
828{
829 bfd *dynobj;
830 asection *s;
90ace9e9
JT
831
832 dynobj = elf_hash_table (info)->dynobj;
833
834 /* Make sure we know what is going on here. */
835 BFD_ASSERT (dynobj != NULL
f5385ebf 836 && (h->needs_plt
60d67dc8 837 || h->is_weakalias
f5385ebf
AM
838 || (h->def_dynamic
839 && h->ref_regular
840 && !h->def_regular)));
90ace9e9
JT
841
842 /* If this is a function, put it in the procedure linkage table. We
843 will fill in the contents of the procedure linkage table later,
844 when we know the address of the .got section. */
845 if (h->type == STT_FUNC
f5385ebf 846 || h->needs_plt)
90ace9e9 847 {
a22a8039
MR
848 if (h->plt.refcount <= 0
849 || SYMBOL_CALLS_LOCAL (info, h)
850 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
851 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
852 {
853 /* This case can occur if we saw a PLTxx reloc in an input
854 file, but the symbol was never referred to by a dynamic
a22a8039
MR
855 object, or if all references were garbage collected. In
856 such a case, we don't actually need to build a procedure
857 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 858 h->plt.offset = (bfd_vma) -1;
f5385ebf 859 h->needs_plt = 0;
b34976b6 860 return TRUE;
90ace9e9
JT
861 }
862
ce558b89 863 s = elf_hash_table (info)->splt;
90ace9e9
JT
864 BFD_ASSERT (s != NULL);
865
866 /* If this is the first .plt entry, make room for the special
867 first entry. */
eea6121a 868 if (s->size == 0)
90ace9e9 869 {
eea6121a 870 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
871 }
872
873 /* If this symbol is not defined in a regular file, and we are
874 not generating a shared library, then set the symbol to this
875 location in the .plt. This is required to make function
876 pointers compare as equal between the normal executable and
877 the shared library. */
0e1862bb 878 if (!bfd_link_pic (info)
f5385ebf 879 && !h->def_regular)
90ace9e9
JT
880 {
881 h->root.u.def.section = s;
eea6121a 882 h->root.u.def.value = s->size;
90ace9e9
JT
883 }
884
eea6121a 885 h->plt.offset = s->size;
90ace9e9
JT
886
887 /* Make room for this entry. */
eea6121a 888 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
889
890 /* We also need to make an entry in the .got.plt section, which
891 will be placed in the .got section by the linker script. */
892
ce558b89 893 s = elf_hash_table (info)->sgotplt;
90ace9e9 894 BFD_ASSERT (s != NULL);
eea6121a 895 s->size += 4;
90ace9e9
JT
896
897 /* We also need to make an entry in the .rela.plt section. */
898
ce558b89 899 s = elf_hash_table (info)->srelplt;
90ace9e9 900 BFD_ASSERT (s != NULL);
eea6121a 901 s->size += sizeof (Elf32_External_Rela);
90ace9e9 902
b34976b6 903 return TRUE;
90ace9e9
JT
904 }
905
906 /* Reinitialize the plt offset now that it is not used as a reference
907 count any more. */
908 h->plt.offset = (bfd_vma) -1;
909
910 /* If this is a weak symbol, and there is a real definition, the
911 processor independent code will have arranged for us to see the
912 real definition first, and we can just use the same value. */
60d67dc8 913 if (h->is_weakalias)
90ace9e9 914 {
60d67dc8
AM
915 struct elf_link_hash_entry *def = weakdef (h);
916 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
917 h->root.u.def.section = def->root.u.def.section;
918 h->root.u.def.value = def->root.u.def.value;
b34976b6 919 return TRUE;
90ace9e9
JT
920 }
921
922 /* This is a reference to a symbol defined by a dynamic object which
923 is not a function. */
924
925 /* If we are creating a shared library, we must presume that the
926 only references to the symbol are via the global offset table.
927 For such cases we need not do anything here; the relocations will
928 be handled correctly by relocate_section. */
0e1862bb 929 if (bfd_link_pic (info))
b34976b6 930 return TRUE;
90ace9e9
JT
931
932 /* We must allocate the symbol in our .dynbss section, which will
933 become part of the .bss section of the executable. There will be
934 an entry for this symbol in the .dynsym section. The dynamic
935 object will contain position independent code, so all references
936 from the dynamic object to this symbol will go through the global
937 offset table. The dynamic linker will use the .dynsym entry to
938 determine the address it must put in the global offset table, so
939 both the dynamic object and the regular object will refer to the
940 same memory location for the variable. */
941
3d4d4302 942 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
943 BFD_ASSERT (s != NULL);
944
945 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
946 copy the initial value out of the dynamic object and into the
947 runtime process image. We need to remember the offset into the
948 .rela.bss section we are going to use. */
1d7e9d18 949 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
950 {
951 asection *srel;
952
3d4d4302 953 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 954 BFD_ASSERT (srel != NULL);
eea6121a 955 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 956 h->needs_copy = 1;
90ace9e9
JT
957 }
958
6cabe1ea 959 return _bfd_elf_adjust_dynamic_copy (info, h, s);
90ace9e9
JT
960}
961
fac3d241
MR
962/* This function is called via elf_link_hash_traverse. It resets GOT
963 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
964 will be done. */
965
966static bfd_boolean
967elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
968 void *infoptr ATTRIBUTE_UNUSED)
969{
970 h->got.refcount = -1;
971 h->plt.refcount = -1;
972
973 return TRUE;
974}
975
976/* Discard unused dynamic data if this is a static link. */
977
978static bfd_boolean
979elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
980 struct bfd_link_info *info)
981{
982 bfd *dynobj;
983 asection *s;
984
985 dynobj = elf_hash_table (info)->dynobj;
986
987 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
988 {
989 /* We may have created entries in the .rela.got and .got sections.
990 However, if we are not creating the dynamic sections, we will
991 not actually use these entries. Reset the size of .rela.got
49d01bf6 992 and .got, which will cause them to get stripped from the output
fac3d241 993 file below. */
ce558b89 994 s = elf_hash_table (info)->srelgot;
fac3d241
MR
995 if (s != NULL)
996 s->size = 0;
ce558b89 997 s = elf_hash_table (info)->sgotplt;
fac3d241
MR
998 if (s != NULL)
999 s->size = 0;
ce558b89 1000 s = elf_hash_table (info)->sgot;
fac3d241
MR
1001 if (s != NULL)
1002 s->size = 0;
1003 }
1004
1005 /* If this is a static link, we need to discard all the got entries we've
1006 recorded. */
1007 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1008 elf_link_hash_traverse (elf_hash_table (info),
1009 elf_vax_discard_got_entries,
1010 info);
1011
1012 return TRUE;
1013}
1014
90ace9e9
JT
1015/* Set the sizes of the dynamic sections. */
1016
b34976b6 1017static bfd_boolean
ce71b576 1018elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1019{
1020 bfd *dynobj;
1021 asection *s;
b34976b6
AM
1022 bfd_boolean plt;
1023 bfd_boolean relocs;
1024 bfd_boolean reltext;
90ace9e9
JT
1025
1026 dynobj = elf_hash_table (info)->dynobj;
1027 BFD_ASSERT (dynobj != NULL);
1028
1029 if (elf_hash_table (info)->dynamic_sections_created)
1030 {
1031 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 1032 if (bfd_link_executable (info) && !info->nointerp)
90ace9e9 1033 {
3d4d4302 1034 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1035 BFD_ASSERT (s != NULL);
eea6121a 1036 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1037 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1038 }
1039 }
90ace9e9
JT
1040
1041 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1042 relative relocs against symbols defined in a regular object. We
1043 allocated space for them in the check_relocs routine, but we will not
1044 fill them in in the relocate_section routine. */
0e1862bb 1045 if (bfd_link_pic (info) && info->symbolic)
4dfe6ac6 1046 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1047 elf_vax_discard_copies,
ce71b576 1048 NULL);
b29635ba 1049
fac3d241
MR
1050 /* If this is a -Bsymbolic shared link, we need to discard all the got
1051 entries we've recorded. Otherwise, we need to instantiate (allocate
1052 space for them). */
b29635ba
JT
1053 elf_link_hash_traverse (elf_hash_table (info),
1054 elf_vax_instantiate_got_entries,
2c3fc389 1055 info);
90ace9e9
JT
1056
1057 /* The check_relocs and adjust_dynamic_symbol entry points have
1058 determined the sizes of the various dynamic sections. Allocate
1059 memory for them. */
b34976b6
AM
1060 plt = FALSE;
1061 relocs = FALSE;
1062 reltext = FALSE;
90ace9e9
JT
1063 for (s = dynobj->sections; s != NULL; s = s->next)
1064 {
1065 const char *name;
90ace9e9
JT
1066
1067 if ((s->flags & SEC_LINKER_CREATED) == 0)
1068 continue;
1069
1070 /* It's OK to base decisions on the section name, because none
1071 of the dynobj section names depend upon the input files. */
fd361982 1072 name = bfd_section_name (s);
90ace9e9 1073
90ace9e9
JT
1074 if (strcmp (name, ".plt") == 0)
1075 {
c456f082
AM
1076 /* Remember whether there is a PLT. */
1077 plt = s->size != 0;
90ace9e9 1078 }
0112cd26 1079 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1080 {
c456f082 1081 if (s->size != 0)
90ace9e9
JT
1082 {
1083 asection *target;
1084
1085 /* Remember whether there are any reloc sections other
07d6d2b8 1086 than .rela.plt. */
90ace9e9
JT
1087 if (strcmp (name, ".rela.plt") != 0)
1088 {
1089 const char *outname;
1090
b34976b6 1091 relocs = TRUE;
90ace9e9
JT
1092
1093 /* If this relocation section applies to a read only
1094 section, then we probably need a DT_TEXTREL
1095 entry. .rela.plt is actually associated with
1096 .got.plt, which is never readonly. */
fd361982 1097 outname = bfd_section_name (s->output_section);
90ace9e9
JT
1098 target = bfd_get_section_by_name (output_bfd, outname + 5);
1099 if (target != NULL
1100 && (target->flags & SEC_READONLY) != 0
1101 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1102 reltext = TRUE;
90ace9e9
JT
1103 }
1104
1105 /* We use the reloc_count field as a counter if we need
1106 to copy relocs into the output file. */
1107 s->reloc_count = 0;
1108 }
1109 }
0112cd26 1110 else if (! CONST_STRNEQ (name, ".got")
c456f082 1111 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1112 {
1113 /* It's not one of our sections, so don't allocate space. */
1114 continue;
1115 }
1116
c456f082 1117 if (s->size == 0)
90ace9e9 1118 {
c456f082
AM
1119 /* If we don't need this section, strip it from the
1120 output file. This is mostly to handle .rela.bss and
1121 .rela.plt. We must create both sections in
1122 create_dynamic_sections, because they must be created
1123 before the linker maps input sections to output
1124 sections. The linker does that before
1125 adjust_dynamic_symbol is called, and it is that
1126 function which decides whether anything needs to go
1127 into these sections. */
8423293d 1128 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1129 continue;
1130 }
1131
c456f082
AM
1132 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1133 continue;
1134
90ace9e9 1135 /* Allocate memory for the section contents. */
eb9a5ecf 1136 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 1137 if (s->contents == NULL)
b34976b6 1138 return FALSE;
90ace9e9
JT
1139 }
1140
1141 if (elf_hash_table (info)->dynamic_sections_created)
1142 {
1143 /* Add some entries to the .dynamic section. We fill in the
1144 values later, in elf_vax_finish_dynamic_sections, but we
1145 must add the entries now so that we get the correct size for
1146 the .dynamic section. The DT_DEBUG entry is filled in by the
1147 dynamic linker and used by the debugger. */
1148#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1149 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9 1150
0e1862bb 1151 if (!bfd_link_pic (info))
90ace9e9
JT
1152 {
1153 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1154 return FALSE;
90ace9e9
JT
1155 }
1156
1157 if (plt)
1158 {
1159 if (!add_dynamic_entry (DT_PLTGOT, 0)
1160 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1161 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1162 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1163 return FALSE;
90ace9e9
JT
1164 }
1165
1166 if (relocs)
1167 {
1168 if (!add_dynamic_entry (DT_RELA, 0)
1169 || !add_dynamic_entry (DT_RELASZ, 0)
1170 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1171 return FALSE;
90ace9e9
JT
1172 }
1173
1174 if (reltext || (info->flags & DF_TEXTREL) != 0)
1175 {
1176 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1177 return FALSE;
90ace9e9
JT
1178 }
1179 }
1180#undef add_dynamic_entry
1181
b34976b6 1182 return TRUE;
90ace9e9
JT
1183}
1184
1185/* This function is called via elf_vax_link_hash_traverse if we are
1186 creating a shared object with -Bsymbolic. It discards the space
1187 allocated to copy PC relative relocs against symbols which are defined
1188 in regular objects. We allocated space for them in the check_relocs
1189 routine, but we won't fill them in in the relocate_section routine. */
1190
b34976b6 1191static bfd_boolean
ce71b576 1192elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1193 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1194{
1195 struct elf_vax_pcrel_relocs_copied *s;
1196
90ace9e9 1197 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1198 if (!h->root.def_regular)
b34976b6 1199 return TRUE;
90ace9e9
JT
1200
1201 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1202 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1203
b34976b6 1204 return TRUE;
90ace9e9
JT
1205}
1206
fac3d241
MR
1207/* This function is called via elf_link_hash_traverse. It looks for
1208 entries that have GOT or PLT (.GOT) references. If creating a shared
1209 object with -Bsymbolic, or the symbol has been forced local, then it
1210 resets the reference count back to -1 so normal PC32 relocation will
1211 be done. Otherwise space in the .got and .rela.got will be reserved
1212 for the symbol. */
b29635ba 1213
b34976b6 1214static bfd_boolean
2c3fc389 1215elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1216{
1217 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1218 bfd *dynobj;
1219 asection *sgot;
1220 asection *srelgot;
b34976b6 1221
b29635ba
JT
1222 /* We don't care about non-GOT (and non-PLT) entries. */
1223 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1224 return TRUE;
b29635ba
JT
1225
1226 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1227 BFD_ASSERT (dynobj != NULL);
b29635ba 1228
ce558b89
AM
1229 sgot = elf_hash_table (info)->sgot;
1230 srelgot = elf_hash_table (info)->srelgot;
b29635ba 1231
125b5bac 1232 if (SYMBOL_REFERENCES_LOCAL (info, h))
b29635ba 1233 {
8be65dd3
MR
1234 h->got.refcount = -1;
1235 h->plt.refcount = -1;
b29635ba
JT
1236 }
1237 else if (h->got.refcount > 0)
1238 {
1239 /* Make sure this symbol is output as a dynamic symbol. */
1240 if (h->dynindx == -1)
1241 {
c152c796 1242 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1243 return FALSE;
b29635ba
JT
1244 }
1245
1246 /* Allocate space in the .got and .rela.got sections. */
125b5bac
MR
1247 sgot->size += 4;
1248 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1249 }
1250
b34976b6 1251 return TRUE;
b29635ba
JT
1252}
1253
90ace9e9
JT
1254/* Relocate an VAX ELF section. */
1255
b34976b6 1256static bfd_boolean
ce71b576
NC
1257elf_vax_relocate_section (bfd *output_bfd,
1258 struct bfd_link_info *info,
1259 bfd *input_bfd,
1260 asection *input_section,
1261 bfd_byte *contents,
1262 Elf_Internal_Rela *relocs,
1263 Elf_Internal_Sym *local_syms,
1264 asection **local_sections)
90ace9e9 1265{
90ace9e9
JT
1266 Elf_Internal_Shdr *symtab_hdr;
1267 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1268 bfd_vma plt_index;
1269 bfd_vma got_offset;
1270 asection *sgot;
1271 asection *splt;
1272 asection *sgotplt;
1273 asection *sreloc;
1274 Elf_Internal_Rela *rel;
1275 Elf_Internal_Rela *relend;
1276
90ace9e9
JT
1277 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1278 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1279
1280 sgot = NULL;
1281 splt = NULL;
1282 sgotplt = NULL;
1283 sreloc = NULL;
1284
1285 rel = relocs;
1286 relend = relocs + input_section->reloc_count;
1287 for (; rel < relend; rel++)
1288 {
1289 int r_type;
1290 reloc_howto_type *howto;
1291 unsigned long r_symndx;
1292 struct elf_link_hash_entry *h;
1293 Elf_Internal_Sym *sym;
1294 asection *sec;
1295 bfd_vma relocation;
1296 bfd_reloc_status_type r;
1297
1298 r_type = ELF32_R_TYPE (rel->r_info);
1299 if (r_type < 0 || r_type >= (int) R_VAX_max)
1300 {
1301 bfd_set_error (bfd_error_bad_value);
b34976b6 1302 return FALSE;
90ace9e9
JT
1303 }
1304 howto = howto_table + r_type;
1305
f0fe0e16 1306 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1307 h = NULL;
1308 sym = NULL;
1309 sec = NULL;
1310 if (r_symndx < symtab_hdr->sh_info)
1311 {
1312 sym = local_syms + r_symndx;
1313 sec = local_sections[r_symndx];
8517fae7 1314 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1315 }
1316 else
1317 {
560e09e9 1318 bfd_boolean unresolved_reloc;
62d887d4 1319 bfd_boolean warned, ignored;
560e09e9 1320
b2a8e766
AM
1321 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1322 r_symndx, symtab_hdr, sym_hashes,
1323 h, sec, relocation,
62d887d4 1324 unresolved_reloc, warned, ignored);
ce71b576 1325
560e09e9 1326 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1327 || h->root.type == bfd_link_hash_defweak)
560e09e9 1328 && ((r_type == R_VAX_PLT32
90ace9e9 1329 && h->plt.offset != (bfd_vma) -1
fe723c87 1330 && !h->forced_local
90ace9e9
JT
1331 && elf_hash_table (info)->dynamic_sections_created)
1332 || (r_type == R_VAX_GOT32
fe723c87
MT
1333 && h->got.offset != (bfd_vma) -1
1334 && !h->forced_local
90ace9e9 1335 && elf_hash_table (info)->dynamic_sections_created
0e1862bb 1336 && (! bfd_link_pic (info)
90ace9e9 1337 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1338 || !h->def_regular))
0e1862bb 1339 || (bfd_link_pic (info)
90ace9e9 1340 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1341 || !h->def_regular)
90ace9e9
JT
1342 && ((input_section->flags & SEC_ALLOC) != 0
1343 /* DWARF will emit R_VAX_32 relocations in its
1344 sections against symbols defined externally
1345 in shared libraries. We can't do anything
1346 with them here. */
1347
1348 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1349 && h->def_dynamic))
90ace9e9
JT
1350 && (r_type == R_VAX_8
1351 || r_type == R_VAX_16
fe723c87 1352 || r_type == R_VAX_32))))
560e09e9
NC
1353 /* In these cases, we don't need the relocation
1354 value. We check specially because in some
1355 obscure cases sec->output_section will be NULL. */
90ace9e9 1356 relocation = 0;
90ace9e9
JT
1357 }
1358
dbaa2011 1359 if (sec != NULL && discarded_section (sec))
e4067dbb 1360 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1361 rel, 1, relend, howto, 0, contents);
ab96bf03 1362
0e1862bb 1363 if (bfd_link_relocatable (info))
ab96bf03
AM
1364 continue;
1365
90ace9e9
JT
1366 switch (r_type)
1367 {
1368 case R_VAX_GOT32:
1369 /* Relocation is to the address of the entry for this symbol
1370 in the global offset table. */
125b5bac
MR
1371
1372 /* Resolve a GOTxx reloc against a local symbol directly,
1373 without using the global offset table. */
7b6021f1 1374 if (h == NULL
125b5bac 1375 || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1376 break;
1377
90ace9e9
JT
1378 {
1379 bfd_vma off;
1380
ce558b89
AM
1381 sgot = elf_hash_table (info)->sgot;
1382 BFD_ASSERT (sgot != NULL);
90ace9e9 1383
90ace9e9 1384 off = h->got.offset;
eea6121a 1385 BFD_ASSERT (off < sgot->size);
90ace9e9 1386
125b5bac 1387 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
90ace9e9
JT
1388
1389 relocation = sgot->output_offset + off;
b29635ba 1390 /* The GOT relocation uses the addend. */
90ace9e9
JT
1391 rel->r_addend = 0;
1392
b29635ba
JT
1393 /* Change the reference to be indirect. */
1394 contents[rel->r_offset - 1] |= 0x10;
1395 relocation += sgot->output_section->vma;
90ace9e9
JT
1396 }
1397 break;
1398
04981bc1
MR
1399 case R_VAX_PC32:
1400 /* If we are creating an executable and the function this
1401 reloc refers to is in a shared lib, then we made a PLT
1402 entry for this symbol and need to handle the reloc like
1403 a PLT reloc. */
0e1862bb 1404 if (bfd_link_pic (info))
04981bc1
MR
1405 goto r_vax_pc32_shared;
1406 /* Fall through. */
90ace9e9
JT
1407 case R_VAX_PLT32:
1408 /* Relocation is to the entry for this symbol in the
1409 procedure linkage table. */
1410
1411 /* Resolve a PLTxx reloc against a local symbol directly,
1412 without using the procedure linkage table. */
7b6021f1 1413 if (h == NULL
125b5bac 1414 || h->plt.offset == (bfd_vma) -1)
90ace9e9
JT
1415 break;
1416
ce558b89
AM
1417 splt = elf_hash_table (info)->splt;
1418 BFD_ASSERT (splt != NULL);
90ace9e9 1419
ce558b89
AM
1420 sgotplt = elf_hash_table (info)->sgotplt;
1421 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1422
1423 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1424
1425 /* Get the offset into the .got table of the entry that
1426 corresponds to this function. Each .got entry is 4 bytes.
1427 The first two are reserved. */
1428 got_offset = (plt_index + 3) * 4;
1429
9e86195c 1430 /* We want the relocation to point into the .got.plt instead
cedb70c5 1431 of the plt itself. */
90ace9e9
JT
1432 relocation = (sgotplt->output_section->vma
1433 + sgotplt->output_offset
1434 + got_offset);
1435 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1436 if (rel->r_addend == 2)
1437 {
1438 h->plt.offset |= 1;
1439 }
1440 else if (rel->r_addend != 0)
4eca0228 1441 _bfd_error_handler
695344c0 1442 /* xgettext:c-format */
2dcf00ce 1443 (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
871b3ab2 1444 " from %pA section ignored"),
2dcf00ce
AM
1445 input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1446 input_section);
90ace9e9
JT
1447 rel->r_addend = 0;
1448
1449 break;
1450
1451 case R_VAX_PC8:
1452 case R_VAX_PC16:
04981bc1 1453 r_vax_pc32_shared:
7b6021f1
MR
1454 if (h == NULL
1455 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1456 || h->forced_local)
90ace9e9
JT
1457 break;
1458 /* Fall through. */
1459 case R_VAX_8:
1460 case R_VAX_16:
1461 case R_VAX_32:
0e1862bb 1462 if (bfd_link_pic (info)
cf35638d 1463 && r_symndx != STN_UNDEF
90ace9e9
JT
1464 && (input_section->flags & SEC_ALLOC) != 0
1465 && ((r_type != R_VAX_PC8
1466 && r_type != R_VAX_PC16
1467 && r_type != R_VAX_PC32)
da6bcfca
MT
1468 || ((input_section->flags & SEC_CODE)
1469 && (!info->symbolic
1470 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1471 {
1472 Elf_Internal_Rela outrel;
947216bf 1473 bfd_byte *loc;
b34976b6 1474 bfd_boolean skip, relocate;
90ace9e9
JT
1475
1476 /* When generating a shared object, these relocations
1477 are copied into the output file to be resolved at run
1478 time. */
90ace9e9
JT
1479 if (sreloc == NULL)
1480 {
83bac4b0
NC
1481 sreloc = _bfd_elf_get_dynamic_reloc_section
1482 (input_bfd, input_section, /*rela?*/ TRUE);
1483 if (sreloc == NULL)
b34976b6 1484 return FALSE;
90ace9e9
JT
1485 }
1486
b34976b6
AM
1487 skip = FALSE;
1488 relocate = FALSE;
90ace9e9
JT
1489
1490 outrel.r_offset =
1491 _bfd_elf_section_offset (output_bfd, info, input_section,
1492 rel->r_offset);
1493 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1494 skip = TRUE;
90ace9e9 1495 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1496 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1497 outrel.r_offset += (input_section->output_section->vma
1498 + input_section->output_offset);
1499
1500 if (skip)
1501 memset (&outrel, 0, sizeof outrel);
1502 /* h->dynindx may be -1 if the symbol was marked to
07d6d2b8 1503 become local. */
90ace9e9
JT
1504 else if (h != NULL
1505 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1506 || !h->def_regular))
90ace9e9
JT
1507 {
1508 BFD_ASSERT (h->dynindx != -1);
1509 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1510 outrel.r_addend = relocation + rel->r_addend;
1511 }
1512 else
1513 {
1514 if (r_type == R_VAX_32)
1515 {
b34976b6 1516 relocate = TRUE;
90ace9e9
JT
1517 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1518 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1519 &contents[rel->r_offset]) == 0);
1520 outrel.r_addend = relocation + rel->r_addend;
1521 }
1522 else
1523 {
1524 long indx;
1525
8517fae7 1526 if (bfd_is_abs_section (sec))
90ace9e9
JT
1527 indx = 0;
1528 else if (sec == NULL || sec->owner == NULL)
1529 {
1530 bfd_set_error (bfd_error_bad_value);
b34976b6 1531 return FALSE;
90ace9e9
JT
1532 }
1533 else
1534 {
1535 asection *osec;
1536
74541ad4
AM
1537 /* We are turning this relocation into one
1538 against a section symbol. It would be
1539 proper to subtract the symbol's value,
1540 osec->vma, from the emitted reloc addend,
1541 but ld.so expects buggy relocs. */
90ace9e9
JT
1542 osec = sec->output_section;
1543 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1544 if (indx == 0)
1545 {
1546 struct elf_link_hash_table *htab;
1547 htab = elf_hash_table (info);
1548 osec = htab->text_index_section;
1549 indx = elf_section_data (osec)->dynindx;
1550 }
1551 BFD_ASSERT (indx != 0);
90ace9e9
JT
1552 }
1553
1554 outrel.r_info = ELF32_R_INFO (indx, r_type);
1555 outrel.r_addend = relocation + rel->r_addend;
1556 }
1557 }
1558
ddd74d3c 1559 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1560 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1561 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1562 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1563 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1564 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1565 {
1566 if (h != NULL)
4eca0228 1567 _bfd_error_handler
695344c0 1568 /* xgettext:c-format */
871b3ab2
AM
1569 (_("%pB: warning: %s relocation against symbol `%s'"
1570 " from %pA section"),
dae82561
AM
1571 input_bfd, howto->name, h->root.root.string,
1572 input_section);
90ace9e9 1573 else
4eca0228 1574 _bfd_error_handler
695344c0 1575 /* xgettext:c-format */
2dcf00ce
AM
1576 (_("%pB: warning: %s relocation to %#" PRIx64
1577 " from %pA section"),
1578 input_bfd, howto->name, (uint64_t) outrel.r_addend,
dae82561 1579 input_section);
90ace9e9 1580 }
947216bf
AM
1581 loc = sreloc->contents;
1582 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1583 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1584
1585 /* This reloc will be computed at runtime, so there's no
07d6d2b8
AM
1586 need to do anything now, except for R_VAX_32
1587 relocations that have been turned into
1588 R_VAX_RELATIVE. */
90ace9e9
JT
1589 if (!relocate)
1590 continue;
1591 }
1592
1593 break;
1594
1595 case R_VAX_GNU_VTINHERIT:
1596 case R_VAX_GNU_VTENTRY:
1597 /* These are no-ops in the end. */
1598 continue;
1599
1600 default:
1601 break;
1602 }
1603
b34976b6 1604 /* VAX PCREL relocations are from the end of relocation, not the start.
07d6d2b8
AM
1605 So subtract the difference from the relocation amount since we can't
1606 add it to the offset. */
90ace9e9 1607 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1608 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1609
1610 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1611 contents, rel->r_offset,
1612 relocation, rel->r_addend);
1613
1614 if (r != bfd_reloc_ok)
1615 {
1616 switch (r)
1617 {
1618 default:
1619 case bfd_reloc_outofrange:
1620 abort ();
1621 case bfd_reloc_overflow:
1622 {
1623 const char *name;
1624
1625 if (h != NULL)
dfeffb9f 1626 name = NULL;
90ace9e9
JT
1627 else
1628 {
1629 name = bfd_elf_string_from_elf_section (input_bfd,
1630 symtab_hdr->sh_link,
1631 sym->st_name);
1632 if (name == NULL)
b34976b6 1633 return FALSE;
90ace9e9 1634 if (*name == '\0')
fd361982 1635 name = bfd_section_name (sec);
90ace9e9 1636 }
1a72702b
AM
1637 info->callbacks->reloc_overflow
1638 (info, (h ? &h->root : NULL), name, howto->name,
1639 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
90ace9e9
JT
1640 }
1641 break;
1642 }
1643 }
1644 }
1645
b34976b6 1646 return TRUE;
90ace9e9
JT
1647}
1648
1649/* Finish up dynamic symbol handling. We set the contents of various
1650 dynamic sections here. */
1651
b34976b6 1652static bfd_boolean
ce71b576
NC
1653elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1654 struct elf_link_hash_entry *h,
1655 Elf_Internal_Sym *sym)
90ace9e9
JT
1656{
1657 bfd *dynobj;
1658
1659 dynobj = elf_hash_table (info)->dynobj;
1660
1661 if (h->plt.offset != (bfd_vma) -1)
1662 {
1663 asection *splt;
1664 asection *sgot;
1665 asection *srela;
1666 bfd_vma plt_index;
1667 bfd_vma got_offset;
1668 bfd_vma addend;
1669 Elf_Internal_Rela rela;
947216bf 1670 bfd_byte *loc;
90ace9e9
JT
1671
1672 /* This symbol has an entry in the procedure linkage table. Set
1673 it up. */
90ace9e9
JT
1674 BFD_ASSERT (h->dynindx != -1);
1675
ce558b89
AM
1676 splt = elf_hash_table (info)->splt;
1677 sgot = elf_hash_table (info)->sgotplt;
1678 srela = elf_hash_table (info)->srelplt;
90ace9e9
JT
1679 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1680
1681 addend = 2 * (h->plt.offset & 1);
1682 h->plt.offset &= ~1;
1683
1684 /* Get the index in the procedure linkage table which
1685 corresponds to this symbol. This is the index of this symbol
1686 in all the symbols for which we are making plt entries. The
1687 first entry in the procedure linkage table is reserved. */
1688 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1689
1690 /* Get the offset into the .got table of the entry that
1691 corresponds to this function. Each .got entry is 4 bytes.
1692 The first two are reserved. */
1693 got_offset = (plt_index + 3) * 4;
1694
1695 /* Fill in the entry in the procedure linkage table. */
1696 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
07d6d2b8 1697 PLT_ENTRY_SIZE);
90ace9e9
JT
1698
1699 /* The offset is relative to the first extension word. */
1700 bfd_put_32 (output_bfd,
1701 -(h->plt.offset + 8),
1702 splt->contents + h->plt.offset + 4);
1703
1704 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1705 splt->contents + h->plt.offset + 8);
1706
1707 /* Fill in the entry in the global offset table. */
1708 bfd_put_32 (output_bfd,
1709 (splt->output_section->vma
1710 + splt->output_offset
1711 + h->plt.offset) + addend,
1712 sgot->contents + got_offset);
1713
1714 /* Fill in the entry in the .rela.plt section. */
1715 rela.r_offset = (sgot->output_section->vma
1716 + sgot->output_offset
1717 + got_offset);
1718 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1719 rela.r_addend = addend;
947216bf
AM
1720 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1721 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1722
f5385ebf 1723 if (!h->def_regular)
90ace9e9
JT
1724 {
1725 /* Mark the symbol as undefined, rather than as defined in
1726 the .plt section. Leave the value alone. */
1727 sym->st_shndx = SHN_UNDEF;
1728 }
1729 }
1730
1731 if (h->got.offset != (bfd_vma) -1)
1732 {
1733 asection *sgot;
1734 asection *srela;
1735 Elf_Internal_Rela rela;
947216bf 1736 bfd_byte *loc;
90ace9e9
JT
1737
1738 /* This symbol has an entry in the global offset table. Set it
1739 up. */
ce558b89
AM
1740 sgot = elf_hash_table (info)->sgot;
1741 srela = elf_hash_table (info)->srelgot;
90ace9e9
JT
1742 BFD_ASSERT (sgot != NULL && srela != NULL);
1743
1744 rela.r_offset = (sgot->output_section->vma
1745 + sgot->output_offset
125b5bac
MR
1746 + h->got.offset);
1747 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
90ace9e9 1748 rela.r_addend = bfd_get_signed_32 (output_bfd,
125b5bac 1749 sgot->contents + h->got.offset);
90ace9e9 1750
947216bf
AM
1751 loc = srela->contents;
1752 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1753 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1754 }
1755
f5385ebf 1756 if (h->needs_copy)
90ace9e9
JT
1757 {
1758 asection *s;
1759 Elf_Internal_Rela rela;
947216bf 1760 bfd_byte *loc;
90ace9e9
JT
1761
1762 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1763 BFD_ASSERT (h->dynindx != -1
1764 && (h->root.type == bfd_link_hash_defined
1765 || h->root.type == bfd_link_hash_defweak));
1766
3d4d4302 1767 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1768 BFD_ASSERT (s != NULL);
1769
1770 rela.r_offset = (h->root.u.def.value
1771 + h->root.u.def.section->output_section->vma
1772 + h->root.u.def.section->output_offset);
1773 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1774 rela.r_addend = 0;
947216bf
AM
1775 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1776 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1777 }
1778
1779 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1780 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1781 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1782 sym->st_shndx = SHN_ABS;
1783
b34976b6 1784 return TRUE;
90ace9e9
JT
1785}
1786
1787/* Finish up the dynamic sections. */
1788
b34976b6 1789static bfd_boolean
ce71b576 1790elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1791{
1792 bfd *dynobj;
1793 asection *sgot;
1794 asection *sdyn;
1795
1796 dynobj = elf_hash_table (info)->dynobj;
1797
ce558b89 1798 sgot = elf_hash_table (info)->sgotplt;
90ace9e9 1799 BFD_ASSERT (sgot != NULL);
3d4d4302 1800 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1801
1802 if (elf_hash_table (info)->dynamic_sections_created)
1803 {
1804 asection *splt;
1805 Elf32_External_Dyn *dyncon, *dynconend;
1806
ce558b89 1807 splt = elf_hash_table (info)->splt;
90ace9e9
JT
1808 BFD_ASSERT (splt != NULL && sdyn != NULL);
1809
1810 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1811 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1812 for (; dyncon < dynconend; dyncon++)
1813 {
1814 Elf_Internal_Dyn dyn;
90ace9e9
JT
1815 asection *s;
1816
1817 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1818
1819 switch (dyn.d_tag)
1820 {
1821 default:
1822 break;
1823
1824 case DT_PLTGOT:
ce558b89 1825 s = elf_hash_table (info)->sgotplt;
90ace9e9
JT
1826 goto get_vma;
1827 case DT_JMPREL:
ce558b89 1828 s = elf_hash_table (info)->srelplt;
90ace9e9 1829 get_vma:
4ade44b7 1830 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
90ace9e9
JT
1831 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1832 break;
1833
1834 case DT_PLTRELSZ:
ce558b89 1835 s = elf_hash_table (info)->srelplt;
eea6121a 1836 dyn.d_un.d_val = s->size;
90ace9e9
JT
1837 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1838 break;
90ace9e9
JT
1839 }
1840 }
1841
1842 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1843 if (splt->size > 0)
90ace9e9
JT
1844 {
1845 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1846 bfd_put_32 (output_bfd,
07d6d2b8
AM
1847 (sgot->output_section->vma
1848 + sgot->output_offset + 4
1849 - (splt->output_section->vma + 6)),
1850 splt->contents + 2);
90ace9e9 1851 bfd_put_32 (output_bfd,
07d6d2b8
AM
1852 (sgot->output_section->vma
1853 + sgot->output_offset + 8
1854 - (splt->output_section->vma + 12)),
1855 splt->contents + 8);
1856 elf_section_data (splt->output_section)->this_hdr.sh_entsize
1857 = PLT_ENTRY_SIZE;
90ace9e9
JT
1858 }
1859 }
1860
1861 /* Fill in the first three entries in the global offset table. */
eea6121a 1862 if (sgot->size > 0)
90ace9e9
JT
1863 {
1864 if (sdyn == NULL)
1865 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1866 else
1867 bfd_put_32 (output_bfd,
1868 sdyn->output_section->vma + sdyn->output_offset,
1869 sgot->contents);
1870 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1871 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1872 }
1873
f6518c48
MR
1874 if (elf_section_data (sgot->output_section) != NULL)
1875 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
90ace9e9 1876
b34976b6 1877 return TRUE;
90ace9e9
JT
1878}
1879
9b90d8fd 1880static enum elf_reloc_type_class
7e612e98
AM
1881elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1882 const asection *rel_sec ATTRIBUTE_UNUSED,
1883 const Elf_Internal_Rela *rela)
9b90d8fd
MR
1884{
1885 switch ((int) ELF32_R_TYPE (rela->r_info))
1886 {
1887 case R_VAX_RELATIVE:
1888 return reloc_class_relative;
1889 case R_VAX_JMP_SLOT:
1890 return reloc_class_plt;
1891 case R_VAX_COPY:
1892 return reloc_class_copy;
1893 default:
1894 return reloc_class_normal;
1895 }
1896}
1897
6db7e006
MR
1898static bfd_vma
1899elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1900 const arelent *rel ATTRIBUTE_UNUSED)
1901{
1902 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1903}
1904
6d00b590 1905#define TARGET_LITTLE_SYM vax_elf32_vec
90ace9e9
JT
1906#define TARGET_LITTLE_NAME "elf32-vax"
1907#define ELF_MACHINE_CODE EM_VAX
1908#define ELF_MAXPAGESIZE 0x1000
1909
1910#define elf_backend_create_dynamic_sections \
1911 _bfd_elf_create_dynamic_sections
1912#define bfd_elf32_bfd_link_hash_table_create \
1913 elf_vax_link_hash_table_create
c152c796 1914#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
1915
1916#define elf_backend_check_relocs elf_vax_check_relocs
1917#define elf_backend_adjust_dynamic_symbol \
1918 elf_vax_adjust_dynamic_symbol
fac3d241
MR
1919#define elf_backend_always_size_sections \
1920 elf_vax_always_size_sections
90ace9e9
JT
1921#define elf_backend_size_dynamic_sections \
1922 elf_vax_size_dynamic_sections
74541ad4 1923#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
1924#define elf_backend_relocate_section elf_vax_relocate_section
1925#define elf_backend_finish_dynamic_symbol \
1926 elf_vax_finish_dynamic_symbol
1927#define elf_backend_finish_dynamic_sections \
1928 elf_vax_finish_dynamic_sections
9b90d8fd 1929#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9 1930#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
6db7e006 1931#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9 1932#define bfd_elf32_bfd_merge_private_bfd_data \
07d6d2b8 1933 elf32_vax_merge_private_bfd_data
90ace9e9 1934#define bfd_elf32_bfd_set_private_flags \
07d6d2b8 1935 elf32_vax_set_private_flags
90ace9e9 1936#define bfd_elf32_bfd_print_private_bfd_data \
07d6d2b8 1937 elf32_vax_print_private_bfd_data
90ace9e9
JT
1938
1939#define elf_backend_can_gc_sections 1
1940#define elf_backend_want_got_plt 1
1941#define elf_backend_plt_readonly 1
1942#define elf_backend_want_plt_sym 0
1943#define elf_backend_got_header_size 16
f0fe0e16 1944#define elf_backend_rela_normal 1
64f52338 1945#define elf_backend_dtrel_excludes_plt 1
90ace9e9
JT
1946
1947#include "elf32-target.h"
This page took 1.15461 seconds and 4 git commands to generate.