PR ld/10047
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
83bac4b0 3 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
ae9a127f 11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
90ace9e9 22
90ace9e9 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
90ace9e9
JT
25#include "bfdlink.h"
26#include "libbfd.h"
27#include "elf-bfd.h"
28#include "elf/vax.h"
29
ce71b576
NC
30static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
31static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
32static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
33 struct bfd_hash_table *,
34 const char *);
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
36static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
37 asection *, const Elf_Internal_Rela *);
ce71b576
NC
38static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
39 struct elf_link_hash_entry *);
40static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
41static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
42 bfd *, asection *, bfd_byte *,
43 Elf_Internal_Rela *,
44 Elf_Internal_Sym *, asection **);
45static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
46 struct elf_link_hash_entry *,
47 Elf_Internal_Sym *);
48static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
49 struct bfd_link_info *);
50
51static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
52static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
58 0, /* size (0 = byte, 1 = short, 2 = long) */
59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
ce71b576
NC
282rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
283 Elf_Internal_Rela *dst)
90ace9e9
JT
284{
285 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
286 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
287}
288
289#define elf_info_to_howto rtype_to_howto
290
291static const struct
292{
293 bfd_reloc_code_real_type bfd_val;
294 int elf_val;
295} reloc_map[] = {
296 { BFD_RELOC_NONE, R_VAX_NONE },
297 { BFD_RELOC_32, R_VAX_32 },
298 { BFD_RELOC_16, R_VAX_16 },
299 { BFD_RELOC_8, R_VAX_8 },
300 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
301 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
302 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
303 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
304 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
305 { BFD_RELOC_NONE, R_VAX_COPY },
306 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
307 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
308 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
309 { BFD_RELOC_CTOR, R_VAX_32 },
310 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
311 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
312};
313
314static reloc_howto_type *
ce71b576 315reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
316{
317 unsigned int i;
318 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
319 {
320 if (reloc_map[i].bfd_val == code)
321 return &howto_table[reloc_map[i].elf_val];
322 }
323 return 0;
324}
325
157090f7
AM
326static reloc_howto_type *
327reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
328 const char *r_name)
329{
330 unsigned int i;
331
332 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
333 if (howto_table[i].name != NULL
334 && strcasecmp (howto_table[i].name, r_name) == 0)
335 return &howto_table[i];
336
337 return NULL;
338}
339
90ace9e9 340#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 341#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
ce71b576
NC
417static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
418 PTR);
90ace9e9 419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
ce71b576
NC
422static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
423 PTR);
b29635ba 424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
ce71b576 430 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
ce71b576 435#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
436
437/* Create an entry in an VAX ELF linker hash table. */
438
439static struct bfd_hash_entry *
ce71b576
NC
440elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
441 struct bfd_hash_table *table,
442 const char *string)
90ace9e9
JT
443{
444 struct elf_vax_link_hash_entry *ret =
445 (struct elf_vax_link_hash_entry *) entry;
446
447 /* Allocate the structure if it has not already been allocated by a
448 subclass. */
ce71b576 449 if (ret == NULL)
90ace9e9
JT
450 ret = ((struct elf_vax_link_hash_entry *)
451 bfd_hash_allocate (table,
452 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 453 if (ret == NULL)
90ace9e9
JT
454 return (struct bfd_hash_entry *) ret;
455
456 /* Call the allocation method of the superclass. */
457 ret = ((struct elf_vax_link_hash_entry *)
458 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
459 table, string));
ce71b576 460 if (ret != NULL)
90ace9e9
JT
461 {
462 ret->pcrel_relocs_copied = NULL;
463 }
464
465 return (struct bfd_hash_entry *) ret;
466}
467
468/* Create an VAX ELF linker hash table. */
469
470static struct bfd_link_hash_table *
ce71b576 471elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
472{
473 struct elf_vax_link_hash_table *ret;
474 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
475
ce71b576
NC
476 ret = bfd_malloc (amt);
477 if (ret == NULL)
90ace9e9
JT
478 return NULL;
479
66eb6687
AM
480 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
481 elf_vax_link_hash_newfunc,
482 sizeof (struct elf_vax_link_hash_entry)))
90ace9e9
JT
483 {
484 free (ret);
485 return NULL;
486 }
487
488 return &ret->root.root;
489}
490
491/* Keep vax-specific flags in the ELF header */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
494{
495 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
90ace9e9
JT
498}
499
500/* Merge backend specific data from an object file to the output
501 object file when linking. */
b34976b6 502static bfd_boolean
ce71b576 503elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
504{
505 flagword out_flags;
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 510 return TRUE;
90ace9e9
JT
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
513 out_flags = elf_elfheader (obfd)->e_flags;
514
515 if (!elf_flags_init (obfd))
516 {
b34976b6 517 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
518 elf_elfheader (obfd)->e_flags = in_flags;
519 }
520
b34976b6 521 return TRUE;
90ace9e9
JT
522}
523
524/* Display the flags field */
b34976b6 525static bfd_boolean
ce71b576 526elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
527{
528 FILE *file = (FILE *) ptr;
529
530 BFD_ASSERT (abfd != NULL && ptr != NULL);
531
532 /* Print normal ELF private data. */
533 _bfd_elf_print_private_bfd_data (abfd, ptr);
534
535 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
536
537 /* xgettext:c-format */
538 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
539
179d3252 540 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
541 fprintf (file, _(" [nonpic]"));
542
179d3252 543 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
544 fprintf (file, _(" [d-float]"));
545
179d3252 546 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
547 fprintf (file, _(" [g-float]"));
548
549 fputc ('\n', file);
550
b34976b6 551 return TRUE;
90ace9e9
JT
552}
553/* Look through the relocs for a section during the first phase, and
554 allocate space in the global offset table or procedure linkage
555 table. */
556
b34976b6 557static bfd_boolean
ce71b576
NC
558elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
559 const Elf_Internal_Rela *relocs)
90ace9e9
JT
560{
561 bfd *dynobj;
562 Elf_Internal_Shdr *symtab_hdr;
563 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
564 const Elf_Internal_Rela *rel;
565 const Elf_Internal_Rela *rel_end;
566 asection *sgot;
567 asection *srelgot;
568 asection *sreloc;
569
1049f94e 570 if (info->relocatable)
b34976b6 571 return TRUE;
90ace9e9
JT
572
573 dynobj = elf_hash_table (info)->dynobj;
574 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
575 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
576
577 sgot = NULL;
578 srelgot = NULL;
579 sreloc = NULL;
580
581 rel_end = relocs + sec->reloc_count;
582 for (rel = relocs; rel < rel_end; rel++)
583 {
584 unsigned long r_symndx;
585 struct elf_link_hash_entry *h;
586
587 r_symndx = ELF32_R_SYM (rel->r_info);
588
589 if (r_symndx < symtab_hdr->sh_info)
590 h = NULL;
591 else
973a3492
L
592 {
593 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
594 while (h->root.type == bfd_link_hash_indirect
595 || h->root.type == bfd_link_hash_warning)
596 h = (struct elf_link_hash_entry *) h->root.u.i.link;
597 }
90ace9e9
JT
598
599 switch (ELF32_R_TYPE (rel->r_info))
600 {
601 case R_VAX_GOT32:
fe723c87
MT
602 BFD_ASSERT (h != NULL);
603 if (h->forced_local
604 || h == elf_hash_table (info)->hgot
605 || h == elf_hash_table (info)->hplt)
90ace9e9
JT
606 break;
607
608 /* This symbol requires a global offset table entry. */
609
610 if (dynobj == NULL)
611 {
612 /* Create the .got section. */
613 elf_hash_table (info)->dynobj = dynobj = abfd;
614 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 615 return FALSE;
90ace9e9
JT
616 }
617
618 if (sgot == NULL)
619 {
620 sgot = bfd_get_section_by_name (dynobj, ".got");
621 BFD_ASSERT (sgot != NULL);
622 }
623
624 if (srelgot == NULL
625 && (h != NULL || info->shared))
626 {
627 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
628 if (srelgot == NULL)
629 {
3496cb2a
L
630 srelgot = bfd_make_section_with_flags (dynobj,
631 ".rela.got",
632 (SEC_ALLOC
633 | SEC_LOAD
634 | SEC_HAS_CONTENTS
635 | SEC_IN_MEMORY
636 | SEC_LINKER_CREATED
637 | SEC_READONLY));
90ace9e9 638 if (srelgot == NULL
90ace9e9 639 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 640 return FALSE;
90ace9e9
JT
641 }
642 }
643
644 if (h != NULL)
645 {
646 struct elf_vax_link_hash_entry *eh;
647
648 eh = (struct elf_vax_link_hash_entry *) h;
649 if (h->got.refcount == -1)
650 {
651 h->got.refcount = 1;
652 eh->got_addend = rel->r_addend;
90ace9e9
JT
653 }
654 else
655 {
656 h->got.refcount++;
657 if (eh->got_addend != (bfd_vma) rel->r_addend)
658 (*_bfd_error_handler)
fe723c87
MT
659 (_("%s: warning: GOT addend of %ld to `%s' does"
660 " not match previous GOT addend of %ld"),
661 bfd_get_filename (abfd), rel->r_addend,
662 h->root.root.string,
663 eh->got_addend);
cedb70c5 664
90ace9e9
JT
665 }
666 }
667 break;
668
669 case R_VAX_PLT32:
670 /* This symbol requires a procedure linkage table entry. We
671 actually build the entry in adjust_dynamic_symbol,
672 because this might be a case of linking PIC code which is
673 never referenced by a dynamic object, in which case we
674 don't need to generate a procedure linkage table entry
675 after all. */
676
677 /* If this is a local symbol, we resolve it directly without
678 creating a procedure linkage table entry. */
fe723c87
MT
679 BFD_ASSERT (h != NULL);
680 if (h->forced_local)
681 break;
90ace9e9 682
f5385ebf 683 h->needs_plt = 1;
90ace9e9
JT
684 if (h->plt.refcount == -1)
685 h->plt.refcount = 1;
686 else
687 h->plt.refcount++;
688 break;
689
690 case R_VAX_PC8:
691 case R_VAX_PC16:
692 case R_VAX_PC32:
693 /* If we are creating a shared library and this is not a local
694 symbol, we need to copy the reloc into the shared library.
695 However when linking with -Bsymbolic and this is a global
696 symbol which is defined in an object we are including in the
697 link (i.e., DEF_REGULAR is set), then we can resolve the
698 reloc directly. At this point we have not seen all the input
699 files, so it is possible that DEF_REGULAR is not set now but
700 will be set later (it is never cleared). We account for that
701 possibility below by storing information in the
702 pcrel_relocs_copied field of the hash table entry. */
703 if (!(info->shared
704 && (sec->flags & SEC_ALLOC) != 0
705 && h != NULL
706 && (!info->symbolic
f5385ebf 707 || !h->def_regular)))
90ace9e9 708 {
fe723c87 709 if (h != NULL && !h->forced_local)
90ace9e9
JT
710 {
711 /* Make sure a plt entry is created for this symbol if
712 it turns out to be a function defined by a dynamic
713 object. */
714 if (h->plt.refcount == -1)
715 h->plt.refcount = 1;
716 else
717 h->plt.refcount++;
718 }
719 break;
720 }
fe723c87
MT
721 if (h != NULL && h->forced_local)
722 break;
723
90ace9e9
JT
724 /* Fall through. */
725 case R_VAX_8:
726 case R_VAX_16:
727 case R_VAX_32:
728 if (h != NULL)
729 {
730 /* Make sure a plt entry is created for this symbol if it
731 turns out to be a function defined by a dynamic object. */
732 if (h->plt.refcount == -1)
733 h->plt.refcount = 1;
734 else
735 h->plt.refcount++;
736 }
737
738 /* If we are creating a shared library, we need to copy the
739 reloc into the shared library. */
740 if (info->shared
741 && (sec->flags & SEC_ALLOC) != 0)
742 {
743 /* When creating a shared object, we must copy these
744 reloc types into the output file. We create a reloc
745 section in dynobj and make room for this reloc. */
746 if (sreloc == NULL)
747 {
83bac4b0
NC
748 sreloc = _bfd_elf_make_dynamic_reloc_section
749 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 750
83bac4b0 751 if (sreloc == NULL)
b34976b6 752 return FALSE;
90ace9e9 753
90ace9e9
JT
754 if (sec->flags & SEC_READONLY)
755 info->flags |= DF_TEXTREL;
756 }
757
eea6121a 758 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
759
760 /* If we are linking with -Bsymbolic, we count the number of
761 PC relative relocations we have entered for this symbol,
762 so that we can discard them again if the symbol is later
763 defined by a regular object. Note that this function is
19852a2a 764 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
765 which means that h is really a pointer to an
766 elf_vax_link_hash_entry. */
767 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
768 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
769 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
770 && info->symbolic)
771 {
772 struct elf_vax_link_hash_entry *eh;
773 struct elf_vax_pcrel_relocs_copied *p;
774
775 eh = (struct elf_vax_link_hash_entry *) h;
776
777 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
778 if (p->section == sreloc)
779 break;
780
781 if (p == NULL)
782 {
783 p = ((struct elf_vax_pcrel_relocs_copied *)
784 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
785 if (p == NULL)
b34976b6 786 return FALSE;
90ace9e9
JT
787 p->next = eh->pcrel_relocs_copied;
788 eh->pcrel_relocs_copied = p;
789 p->section = sreloc;
790 p->count = 0;
791 }
792
793 ++p->count;
794 }
795 }
796
797 break;
798
799 /* This relocation describes the C++ object vtable hierarchy.
800 Reconstruct it for later use during GC. */
801 case R_VAX_GNU_VTINHERIT:
c152c796 802 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 803 return FALSE;
90ace9e9
JT
804 break;
805
806 /* This relocation describes which C++ vtable entries are actually
807 used. Record for later use during GC. */
808 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
809 BFD_ASSERT (h != NULL);
810 if (h != NULL
811 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 812 return FALSE;
90ace9e9
JT
813 break;
814
815 default:
816 break;
817 }
818 }
819
b34976b6 820 return TRUE;
90ace9e9
JT
821}
822
823/* Return the section that should be marked against GC for a given
824 relocation. */
825
826static asection *
ce71b576 827elf_vax_gc_mark_hook (asection *sec,
07adf181 828 struct bfd_link_info *info,
ce71b576
NC
829 Elf_Internal_Rela *rel,
830 struct elf_link_hash_entry *h,
831 Elf_Internal_Sym *sym)
90ace9e9
JT
832{
833 if (h != NULL)
07adf181
AM
834 switch (ELF32_R_TYPE (rel->r_info))
835 {
836 case R_VAX_GNU_VTINHERIT:
837 case R_VAX_GNU_VTENTRY:
838 return NULL;
839 }
840
841 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
842}
843
844/* Update the got entry reference counts for the section being removed. */
845
b34976b6 846static bfd_boolean
ce71b576
NC
847elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
848 const Elf_Internal_Rela *relocs)
90ace9e9
JT
849{
850 Elf_Internal_Shdr *symtab_hdr;
851 struct elf_link_hash_entry **sym_hashes;
90ace9e9 852 const Elf_Internal_Rela *rel, *relend;
90ace9e9 853 bfd *dynobj;
90ace9e9 854
7dda2462
TG
855 if (info->relocatable)
856 return TRUE;
857
90ace9e9
JT
858 dynobj = elf_hash_table (info)->dynobj;
859 if (dynobj == NULL)
b34976b6 860 return TRUE;
90ace9e9 861
babfd660
KH
862 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
863 sym_hashes = elf_sym_hashes (abfd);
864
90ace9e9
JT
865 relend = relocs + sec->reloc_count;
866 for (rel = relocs; rel < relend; rel++)
867 {
babfd660 868 unsigned long r_symndx;
3eb128b2
AM
869 struct elf_link_hash_entry *h = NULL;
870
871 r_symndx = ELF32_R_SYM (rel->r_info);
872 if (r_symndx >= symtab_hdr->sh_info)
873 {
874 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
875 while (h->root.type == bfd_link_hash_indirect
876 || h->root.type == bfd_link_hash_warning)
877 h = (struct elf_link_hash_entry *) h->root.u.i.link;
878 }
babfd660 879
90ace9e9
JT
880 switch (ELF32_R_TYPE (rel->r_info))
881 {
882 case R_VAX_GOT32:
3eb128b2
AM
883 if (h != NULL && h->got.refcount > 0)
884 --h->got.refcount;
90ace9e9
JT
885 break;
886
887 case R_VAX_PLT32:
888 case R_VAX_PC8:
889 case R_VAX_PC16:
890 case R_VAX_PC32:
891 case R_VAX_8:
892 case R_VAX_16:
893 case R_VAX_32:
3eb128b2
AM
894 if (h != NULL && h->plt.refcount > 0)
895 --h->plt.refcount;
90ace9e9
JT
896 break;
897
898 default:
899 break;
900 }
901 }
902
b34976b6 903 return TRUE;
90ace9e9
JT
904}
905
906/* Adjust a symbol defined by a dynamic object and referenced by a
907 regular object. The current definition is in some section of the
908 dynamic object, but we're not including those sections. We have to
909 change the definition to something the rest of the link can
910 understand. */
911
b34976b6 912static bfd_boolean
90ace9e9
JT
913elf_vax_adjust_dynamic_symbol (info, h)
914 struct bfd_link_info *info;
915 struct elf_link_hash_entry *h;
916{
917 bfd *dynobj;
918 asection *s;
90ace9e9
JT
919
920 dynobj = elf_hash_table (info)->dynobj;
921
922 /* Make sure we know what is going on here. */
923 BFD_ASSERT (dynobj != NULL
f5385ebf 924 && (h->needs_plt
f6e332e6 925 || h->u.weakdef != NULL
f5385ebf
AM
926 || (h->def_dynamic
927 && h->ref_regular
928 && !h->def_regular)));
90ace9e9
JT
929
930 /* If this is a function, put it in the procedure linkage table. We
931 will fill in the contents of the procedure linkage table later,
932 when we know the address of the .got section. */
933 if (h->type == STT_FUNC
f5385ebf 934 || h->needs_plt)
90ace9e9
JT
935 {
936 if (! info->shared
f5385ebf
AM
937 && !h->def_dynamic
938 && !h->ref_dynamic
90ace9e9
JT
939 /* We must always create the plt entry if it was referenced
940 by a PLTxxO relocation. In this case we already recorded
941 it as a dynamic symbol. */
942 && h->dynindx == -1)
943 {
944 /* This case can occur if we saw a PLTxx reloc in an input
945 file, but the symbol was never referred to by a dynamic
946 object. In such a case, we don't actually need to build
947 a procedure linkage table, and we can just do a PCxx
948 reloc instead. */
f5385ebf 949 BFD_ASSERT (h->needs_plt);
90ace9e9 950 h->plt.offset = (bfd_vma) -1;
b34976b6 951 return TRUE;
90ace9e9
JT
952 }
953
954 /* GC may have rendered this entry unused. */
955 if (h->plt.refcount <= 0)
956 {
f5385ebf 957 h->needs_plt = 0;
90ace9e9 958 h->plt.offset = (bfd_vma) -1;
b34976b6 959 return TRUE;
90ace9e9
JT
960 }
961
962 /* Make sure this symbol is output as a dynamic symbol. */
963 if (h->dynindx == -1)
964 {
c152c796 965 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 966 return FALSE;
90ace9e9
JT
967 }
968
969 s = bfd_get_section_by_name (dynobj, ".plt");
970 BFD_ASSERT (s != NULL);
971
972 /* If this is the first .plt entry, make room for the special
973 first entry. */
eea6121a 974 if (s->size == 0)
90ace9e9 975 {
eea6121a 976 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
977 }
978
979 /* If this symbol is not defined in a regular file, and we are
980 not generating a shared library, then set the symbol to this
981 location in the .plt. This is required to make function
982 pointers compare as equal between the normal executable and
983 the shared library. */
984 if (!info->shared
f5385ebf 985 && !h->def_regular)
90ace9e9
JT
986 {
987 h->root.u.def.section = s;
eea6121a 988 h->root.u.def.value = s->size;
90ace9e9
JT
989 }
990
eea6121a 991 h->plt.offset = s->size;
90ace9e9
JT
992
993 /* Make room for this entry. */
eea6121a 994 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
995
996 /* We also need to make an entry in the .got.plt section, which
997 will be placed in the .got section by the linker script. */
998
999 s = bfd_get_section_by_name (dynobj, ".got.plt");
1000 BFD_ASSERT (s != NULL);
eea6121a 1001 s->size += 4;
90ace9e9
JT
1002
1003 /* We also need to make an entry in the .rela.plt section. */
1004
1005 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1006 BFD_ASSERT (s != NULL);
eea6121a 1007 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1008
b34976b6 1009 return TRUE;
90ace9e9
JT
1010 }
1011
1012 /* Reinitialize the plt offset now that it is not used as a reference
1013 count any more. */
1014 h->plt.offset = (bfd_vma) -1;
1015
1016 /* If this is a weak symbol, and there is a real definition, the
1017 processor independent code will have arranged for us to see the
1018 real definition first, and we can just use the same value. */
f6e332e6 1019 if (h->u.weakdef != NULL)
90ace9e9 1020 {
f6e332e6
AM
1021 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1022 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1023 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1024 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1025 return TRUE;
90ace9e9
JT
1026 }
1027
1028 /* This is a reference to a symbol defined by a dynamic object which
1029 is not a function. */
1030
1031 /* If we are creating a shared library, we must presume that the
1032 only references to the symbol are via the global offset table.
1033 For such cases we need not do anything here; the relocations will
1034 be handled correctly by relocate_section. */
1035 if (info->shared)
b34976b6 1036 return TRUE;
90ace9e9 1037
909272ee
AM
1038 if (h->size == 0)
1039 {
1040 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1041 h->root.root.string);
1042 return TRUE;
1043 }
1044
90ace9e9
JT
1045 /* We must allocate the symbol in our .dynbss section, which will
1046 become part of the .bss section of the executable. There will be
1047 an entry for this symbol in the .dynsym section. The dynamic
1048 object will contain position independent code, so all references
1049 from the dynamic object to this symbol will go through the global
1050 offset table. The dynamic linker will use the .dynsym entry to
1051 determine the address it must put in the global offset table, so
1052 both the dynamic object and the regular object will refer to the
1053 same memory location for the variable. */
1054
1055 s = bfd_get_section_by_name (dynobj, ".dynbss");
1056 BFD_ASSERT (s != NULL);
1057
1058 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1059 copy the initial value out of the dynamic object and into the
1060 runtime process image. We need to remember the offset into the
1061 .rela.bss section we are going to use. */
1062 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1063 {
1064 asection *srel;
1065
1066 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1067 BFD_ASSERT (srel != NULL);
eea6121a 1068 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1069 h->needs_copy = 1;
90ace9e9
JT
1070 }
1071
027297b7 1072 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1073}
1074
1075/* Set the sizes of the dynamic sections. */
1076
b34976b6 1077static bfd_boolean
ce71b576 1078elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1079{
1080 bfd *dynobj;
1081 asection *s;
b34976b6
AM
1082 bfd_boolean plt;
1083 bfd_boolean relocs;
1084 bfd_boolean reltext;
90ace9e9
JT
1085
1086 dynobj = elf_hash_table (info)->dynobj;
1087 BFD_ASSERT (dynobj != NULL);
1088
1089 if (elf_hash_table (info)->dynamic_sections_created)
1090 {
1091 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1092 if (info->executable)
90ace9e9
JT
1093 {
1094 s = bfd_get_section_by_name (dynobj, ".interp");
1095 BFD_ASSERT (s != NULL);
eea6121a 1096 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1097 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1098 }
1099 }
1100 else
1101 {
1102 /* We may have created entries in the .rela.got and .got sections.
1103 However, if we are not creating the dynamic sections, we will
1104 not actually use these entries. Reset the size of .rela.got
1105 and .got, which will cause it to get stripped from the output
1106 file below. */
1107 s = bfd_get_section_by_name (dynobj, ".rela.got");
1108 if (s != NULL)
eea6121a 1109 s->size = 0;
90ace9e9
JT
1110 s = bfd_get_section_by_name (dynobj, ".got.plt");
1111 if (s != NULL)
eea6121a 1112 s->size = 0;
90ace9e9
JT
1113 s = bfd_get_section_by_name (dynobj, ".got");
1114 if (s != NULL)
eea6121a 1115 s->size = 0;
90ace9e9
JT
1116 }
1117
1118 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1119 relative relocs against symbols defined in a regular object. We
1120 allocated space for them in the check_relocs routine, but we will not
1121 fill them in in the relocate_section routine. */
1122 if (info->shared && info->symbolic)
1123 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1124 elf_vax_discard_copies,
ce71b576 1125 NULL);
b29635ba 1126
b34976b6 1127 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1128 discard all the got entries we've recorded. Otherwise, we need to
1129 instantiate (allocate space for them). */
1130 elf_link_hash_traverse (elf_hash_table (info),
1131 elf_vax_instantiate_got_entries,
1132 (PTR) info);
90ace9e9
JT
1133
1134 /* The check_relocs and adjust_dynamic_symbol entry points have
1135 determined the sizes of the various dynamic sections. Allocate
1136 memory for them. */
b34976b6
AM
1137 plt = FALSE;
1138 relocs = FALSE;
1139 reltext = FALSE;
90ace9e9
JT
1140 for (s = dynobj->sections; s != NULL; s = s->next)
1141 {
1142 const char *name;
90ace9e9
JT
1143
1144 if ((s->flags & SEC_LINKER_CREATED) == 0)
1145 continue;
1146
1147 /* It's OK to base decisions on the section name, because none
1148 of the dynobj section names depend upon the input files. */
1149 name = bfd_get_section_name (dynobj, s);
1150
90ace9e9
JT
1151 if (strcmp (name, ".plt") == 0)
1152 {
c456f082
AM
1153 /* Remember whether there is a PLT. */
1154 plt = s->size != 0;
90ace9e9 1155 }
0112cd26 1156 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1157 {
c456f082 1158 if (s->size != 0)
90ace9e9
JT
1159 {
1160 asection *target;
1161
1162 /* Remember whether there are any reloc sections other
1163 than .rela.plt. */
1164 if (strcmp (name, ".rela.plt") != 0)
1165 {
1166 const char *outname;
1167
b34976b6 1168 relocs = TRUE;
90ace9e9
JT
1169
1170 /* If this relocation section applies to a read only
1171 section, then we probably need a DT_TEXTREL
1172 entry. .rela.plt is actually associated with
1173 .got.plt, which is never readonly. */
1174 outname = bfd_get_section_name (output_bfd,
1175 s->output_section);
1176 target = bfd_get_section_by_name (output_bfd, outname + 5);
1177 if (target != NULL
1178 && (target->flags & SEC_READONLY) != 0
1179 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1180 reltext = TRUE;
90ace9e9
JT
1181 }
1182
1183 /* We use the reloc_count field as a counter if we need
1184 to copy relocs into the output file. */
1185 s->reloc_count = 0;
1186 }
1187 }
0112cd26 1188 else if (! CONST_STRNEQ (name, ".got")
c456f082 1189 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1190 {
1191 /* It's not one of our sections, so don't allocate space. */
1192 continue;
1193 }
1194
c456f082 1195 if (s->size == 0)
90ace9e9 1196 {
c456f082
AM
1197 /* If we don't need this section, strip it from the
1198 output file. This is mostly to handle .rela.bss and
1199 .rela.plt. We must create both sections in
1200 create_dynamic_sections, because they must be created
1201 before the linker maps input sections to output
1202 sections. The linker does that before
1203 adjust_dynamic_symbol is called, and it is that
1204 function which decides whether anything needs to go
1205 into these sections. */
8423293d 1206 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1207 continue;
1208 }
1209
c456f082
AM
1210 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1211 continue;
1212
90ace9e9 1213 /* Allocate memory for the section contents. */
eea6121a 1214 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1215 if (s->contents == NULL)
b34976b6 1216 return FALSE;
90ace9e9
JT
1217 }
1218
1219 if (elf_hash_table (info)->dynamic_sections_created)
1220 {
1221 /* Add some entries to the .dynamic section. We fill in the
1222 values later, in elf_vax_finish_dynamic_sections, but we
1223 must add the entries now so that we get the correct size for
1224 the .dynamic section. The DT_DEBUG entry is filled in by the
1225 dynamic linker and used by the debugger. */
1226#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1227 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1228
1229 if (!info->shared)
1230 {
1231 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1232 return FALSE;
90ace9e9
JT
1233 }
1234
1235 if (plt)
1236 {
1237 if (!add_dynamic_entry (DT_PLTGOT, 0)
1238 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1239 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1240 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1241 return FALSE;
90ace9e9
JT
1242 }
1243
1244 if (relocs)
1245 {
1246 if (!add_dynamic_entry (DT_RELA, 0)
1247 || !add_dynamic_entry (DT_RELASZ, 0)
1248 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1249 return FALSE;
90ace9e9
JT
1250 }
1251
1252 if (reltext || (info->flags & DF_TEXTREL) != 0)
1253 {
1254 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1255 return FALSE;
90ace9e9
JT
1256 }
1257 }
1258#undef add_dynamic_entry
1259
b34976b6 1260 return TRUE;
90ace9e9
JT
1261}
1262
1263/* This function is called via elf_vax_link_hash_traverse if we are
1264 creating a shared object with -Bsymbolic. It discards the space
1265 allocated to copy PC relative relocs against symbols which are defined
1266 in regular objects. We allocated space for them in the check_relocs
1267 routine, but we won't fill them in in the relocate_section routine. */
1268
b34976b6 1269static bfd_boolean
ce71b576
NC
1270elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1271 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1272{
1273 struct elf_vax_pcrel_relocs_copied *s;
1274
1275 if (h->root.root.type == bfd_link_hash_warning)
1276 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1277
1278 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1279 if (!h->root.def_regular)
b34976b6 1280 return TRUE;
90ace9e9
JT
1281
1282 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1283 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1284
b34976b6 1285 return TRUE;
90ace9e9
JT
1286}
1287
b29635ba
JT
1288/* This function is called via elf_link_hash_traverse. It looks for entries
1289 that have GOT or PLT (.GOT) references. If creating a static object or a
1290 shared object with -Bsymbolic, it resets the reference count back to 0
1291 and sets the offset to -1 so normal PC32 relocation will be done. If
1292 creating a shared object or executable, space in the .got and .rela.got
1293 will be reserved for the symbol. */
1294
b34976b6 1295static bfd_boolean
ce71b576 1296elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1297{
1298 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1299 bfd *dynobj;
1300 asection *sgot;
1301 asection *srelgot;
b34976b6 1302
b29635ba
JT
1303 /* We don't care about non-GOT (and non-PLT) entries. */
1304 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1305 return TRUE;
b29635ba
JT
1306
1307 dynobj = elf_hash_table (info)->dynobj;
1308 if (dynobj == NULL)
b34976b6 1309 return TRUE;
b29635ba
JT
1310
1311 sgot = bfd_get_section_by_name (dynobj, ".got");
1312 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1313
1314 if (!elf_hash_table (info)->dynamic_sections_created
fe723c87
MT
1315 || (info->shared && info->symbolic)
1316 || h->forced_local)
b29635ba
JT
1317 {
1318 h->got.refcount = 0;
1319 h->got.offset = (bfd_vma) -1;
1320 h->plt.refcount = 0;
1321 h->plt.offset = (bfd_vma) -1;
1322 }
1323 else if (h->got.refcount > 0)
1324 {
1325 /* Make sure this symbol is output as a dynamic symbol. */
1326 if (h->dynindx == -1)
1327 {
c152c796 1328 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1329 return FALSE;
b29635ba
JT
1330 }
1331
1332 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1333 sgot->size += 4;
1334 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1335 }
1336
b34976b6 1337 return TRUE;
b29635ba
JT
1338}
1339
90ace9e9
JT
1340/* Relocate an VAX ELF section. */
1341
b34976b6 1342static bfd_boolean
ce71b576
NC
1343elf_vax_relocate_section (bfd *output_bfd,
1344 struct bfd_link_info *info,
1345 bfd *input_bfd,
1346 asection *input_section,
1347 bfd_byte *contents,
1348 Elf_Internal_Rela *relocs,
1349 Elf_Internal_Sym *local_syms,
1350 asection **local_sections)
90ace9e9
JT
1351{
1352 bfd *dynobj;
1353 Elf_Internal_Shdr *symtab_hdr;
1354 struct elf_link_hash_entry **sym_hashes;
1355 bfd_vma *local_got_offsets;
1356 bfd_vma plt_index;
1357 bfd_vma got_offset;
1358 asection *sgot;
1359 asection *splt;
1360 asection *sgotplt;
1361 asection *sreloc;
1362 Elf_Internal_Rela *rel;
1363 Elf_Internal_Rela *relend;
1364
1365 dynobj = elf_hash_table (info)->dynobj;
1366 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1367 sym_hashes = elf_sym_hashes (input_bfd);
1368 local_got_offsets = elf_local_got_offsets (input_bfd);
1369
1370 sgot = NULL;
1371 splt = NULL;
1372 sgotplt = NULL;
1373 sreloc = NULL;
1374
1375 rel = relocs;
1376 relend = relocs + input_section->reloc_count;
1377 for (; rel < relend; rel++)
1378 {
1379 int r_type;
1380 reloc_howto_type *howto;
1381 unsigned long r_symndx;
1382 struct elf_link_hash_entry *h;
1383 Elf_Internal_Sym *sym;
1384 asection *sec;
1385 bfd_vma relocation;
1386 bfd_reloc_status_type r;
1387
1388 r_type = ELF32_R_TYPE (rel->r_info);
1389 if (r_type < 0 || r_type >= (int) R_VAX_max)
1390 {
1391 bfd_set_error (bfd_error_bad_value);
b34976b6 1392 return FALSE;
90ace9e9
JT
1393 }
1394 howto = howto_table + r_type;
1395
f0fe0e16 1396 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1397 h = NULL;
1398 sym = NULL;
1399 sec = NULL;
1400 if (r_symndx < symtab_hdr->sh_info)
1401 {
1402 sym = local_syms + r_symndx;
1403 sec = local_sections[r_symndx];
8517fae7 1404 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1405 }
1406 else
1407 {
560e09e9
NC
1408 bfd_boolean unresolved_reloc;
1409 bfd_boolean warned;
1410
b2a8e766
AM
1411 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1412 r_symndx, symtab_hdr, sym_hashes,
1413 h, sec, relocation,
1414 unresolved_reloc, warned);
ce71b576 1415
560e09e9 1416 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1417 || h->root.type == bfd_link_hash_defweak)
560e09e9 1418 && ((r_type == R_VAX_PLT32
90ace9e9 1419 && h->plt.offset != (bfd_vma) -1
fe723c87 1420 && !h->forced_local
90ace9e9
JT
1421 && elf_hash_table (info)->dynamic_sections_created)
1422 || (r_type == R_VAX_GOT32
fe723c87
MT
1423 && h->got.offset != (bfd_vma) -1
1424 && !h->forced_local
90ace9e9
JT
1425 && elf_hash_table (info)->dynamic_sections_created
1426 && (! info->shared
1427 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1428 || !h->def_regular))
90ace9e9
JT
1429 || (info->shared
1430 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1431 || !h->def_regular)
90ace9e9
JT
1432 && ((input_section->flags & SEC_ALLOC) != 0
1433 /* DWARF will emit R_VAX_32 relocations in its
1434 sections against symbols defined externally
1435 in shared libraries. We can't do anything
1436 with them here. */
1437
1438 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1439 && h->def_dynamic))
90ace9e9
JT
1440 && (r_type == R_VAX_8
1441 || r_type == R_VAX_16
fe723c87 1442 || r_type == R_VAX_32))))
560e09e9
NC
1443 /* In these cases, we don't need the relocation
1444 value. We check specially because in some
1445 obscure cases sec->output_section will be NULL. */
90ace9e9 1446 relocation = 0;
90ace9e9
JT
1447 }
1448
ab96bf03
AM
1449 if (sec != NULL && elf_discarded_section (sec))
1450 {
1451 /* For relocs against symbols from removed linkonce sections,
1452 or sections discarded by a linker script, we just want the
1453 section contents zeroed. Avoid any special processing. */
1454 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1455 rel->r_info = 0;
1456 rel->r_addend = 0;
1457 continue;
1458 }
1459
1460 if (info->relocatable)
1461 continue;
1462
90ace9e9
JT
1463 switch (r_type)
1464 {
1465 case R_VAX_GOT32:
1466 /* Relocation is to the address of the entry for this symbol
1467 in the global offset table. */
fe723c87 1468 if (h == NULL || h->got.offset == (bfd_vma) -1 || h->forced_local)
90ace9e9
JT
1469 break;
1470
1471 /* Relocation is the offset of the entry for this symbol in
1472 the global offset table. */
1473
1474 {
1475 bfd_vma off;
1476
90ace9e9
JT
1477 if (sgot == NULL)
1478 {
1479 sgot = bfd_get_section_by_name (dynobj, ".got");
1480 BFD_ASSERT (sgot != NULL);
1481 }
1482
1483 BFD_ASSERT (h != NULL);
1484 off = h->got.offset;
1485 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1486 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1487
1488 if (info->shared
1489 && h->dynindx == -1
f5385ebf 1490 && h->def_regular)
90ace9e9
JT
1491 {
1492 /* The symbol was forced to be local
1493 because of a version file.. We must initialize
1494 this entry in the global offset table. Since
1495 the offset must always be a multiple of 4, we
1496 use the least significant bit to record whether
1497 we have initialized it already.
1498
1499 When doing a dynamic link, we create a .rela.got
1500 relocation entry to initialize the value. This
1501 is done in the finish_dynamic_symbol routine. */
1502 if ((off & 1) != 0)
1503 off &= ~1;
1504 else
1505 {
1506 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1507 sgot->contents + off);
1508 h->got.offset |= 1;
1509 }
1510 } else {
1511 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1512 }
1513
1514 relocation = sgot->output_offset + off;
b29635ba 1515 /* The GOT relocation uses the addend. */
90ace9e9
JT
1516 rel->r_addend = 0;
1517
b29635ba
JT
1518 /* Change the reference to be indirect. */
1519 contents[rel->r_offset - 1] |= 0x10;
1520 relocation += sgot->output_section->vma;
90ace9e9
JT
1521 }
1522 break;
1523
1524 case R_VAX_PLT32:
1525 /* Relocation is to the entry for this symbol in the
1526 procedure linkage table. */
1527
1528 /* Resolve a PLTxx reloc against a local symbol directly,
1529 without using the procedure linkage table. */
fe723c87 1530 if (h == NULL || h->forced_local)
90ace9e9
JT
1531 break;
1532
1533 if (h->plt.offset == (bfd_vma) -1
1534 || !elf_hash_table (info)->dynamic_sections_created)
1535 {
1536 /* We didn't make a PLT entry for this symbol. This
1537 happens when statically linking PIC code, or when
1538 using -Bsymbolic. */
1539 break;
1540 }
1541
1542 if (splt == NULL)
1543 {
1544 splt = bfd_get_section_by_name (dynobj, ".plt");
1545 BFD_ASSERT (splt != NULL);
1546 }
1547
1548 if (sgotplt == NULL)
1549 {
1550 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1551 BFD_ASSERT (splt != NULL);
1552 }
1553
1554 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1555
1556 /* Get the offset into the .got table of the entry that
1557 corresponds to this function. Each .got entry is 4 bytes.
1558 The first two are reserved. */
1559 got_offset = (plt_index + 3) * 4;
1560
1561 /* We want the relocate to point into the .got.plt instead
cedb70c5 1562 of the plt itself. */
90ace9e9
JT
1563 relocation = (sgotplt->output_section->vma
1564 + sgotplt->output_offset
1565 + got_offset);
1566 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1567 if (rel->r_addend == 2)
1568 {
1569 h->plt.offset |= 1;
1570 }
1571 else if (rel->r_addend != 0)
1572 (*_bfd_error_handler)
1573 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1574 bfd_get_filename (input_bfd), rel->r_addend,
1575 h->root.root.string,
1576 bfd_get_section_name (input_bfd, input_section));
1577 rel->r_addend = 0;
1578
1579 break;
1580
1581 case R_VAX_PC8:
1582 case R_VAX_PC16:
1583 case R_VAX_PC32:
fe723c87 1584 if (h == NULL || h->forced_local)
90ace9e9
JT
1585 break;
1586 /* Fall through. */
1587 case R_VAX_8:
1588 case R_VAX_16:
1589 case R_VAX_32:
1590 if (info->shared
1591 && r_symndx != 0
1592 && (input_section->flags & SEC_ALLOC) != 0
1593 && ((r_type != R_VAX_PC8
1594 && r_type != R_VAX_PC16
1595 && r_type != R_VAX_PC32)
da6bcfca
MT
1596 || ((input_section->flags & SEC_CODE)
1597 && (!info->symbolic
1598 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1599 {
1600 Elf_Internal_Rela outrel;
947216bf 1601 bfd_byte *loc;
b34976b6 1602 bfd_boolean skip, relocate;
90ace9e9
JT
1603
1604 /* When generating a shared object, these relocations
1605 are copied into the output file to be resolved at run
1606 time. */
90ace9e9
JT
1607 if (sreloc == NULL)
1608 {
83bac4b0
NC
1609 sreloc = _bfd_elf_get_dynamic_reloc_section
1610 (input_bfd, input_section, /*rela?*/ TRUE);
1611 if (sreloc == NULL)
b34976b6 1612 return FALSE;
90ace9e9
JT
1613 }
1614
b34976b6
AM
1615 skip = FALSE;
1616 relocate = FALSE;
90ace9e9
JT
1617
1618 outrel.r_offset =
1619 _bfd_elf_section_offset (output_bfd, info, input_section,
1620 rel->r_offset);
1621 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1622 skip = TRUE;
90ace9e9 1623 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1624 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1625 outrel.r_offset += (input_section->output_section->vma
1626 + input_section->output_offset);
1627
1628 if (skip)
1629 memset (&outrel, 0, sizeof outrel);
1630 /* h->dynindx may be -1 if the symbol was marked to
1631 become local. */
1632 else if (h != NULL
1633 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1634 || !h->def_regular))
90ace9e9
JT
1635 {
1636 BFD_ASSERT (h->dynindx != -1);
1637 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1638 outrel.r_addend = relocation + rel->r_addend;
1639 }
1640 else
1641 {
1642 if (r_type == R_VAX_32)
1643 {
b34976b6 1644 relocate = TRUE;
90ace9e9
JT
1645 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1646 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1647 &contents[rel->r_offset]) == 0);
1648 outrel.r_addend = relocation + rel->r_addend;
1649 }
1650 else
1651 {
1652 long indx;
1653
8517fae7 1654 if (bfd_is_abs_section (sec))
90ace9e9
JT
1655 indx = 0;
1656 else if (sec == NULL || sec->owner == NULL)
1657 {
1658 bfd_set_error (bfd_error_bad_value);
b34976b6 1659 return FALSE;
90ace9e9
JT
1660 }
1661 else
1662 {
1663 asection *osec;
1664
74541ad4
AM
1665 /* We are turning this relocation into one
1666 against a section symbol. It would be
1667 proper to subtract the symbol's value,
1668 osec->vma, from the emitted reloc addend,
1669 but ld.so expects buggy relocs. */
90ace9e9
JT
1670 osec = sec->output_section;
1671 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1672 if (indx == 0)
1673 {
1674 struct elf_link_hash_table *htab;
1675 htab = elf_hash_table (info);
1676 osec = htab->text_index_section;
1677 indx = elf_section_data (osec)->dynindx;
1678 }
1679 BFD_ASSERT (indx != 0);
90ace9e9
JT
1680 }
1681
1682 outrel.r_info = ELF32_R_INFO (indx, r_type);
1683 outrel.r_addend = relocation + rel->r_addend;
1684 }
1685 }
1686
1687 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1688 ".text") != 0 ||
90ace9e9
JT
1689 (info->shared
1690 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1691 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1692 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1693 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1694 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1695 {
1696 if (h != NULL)
1697 (*_bfd_error_handler)
1698 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1699 bfd_get_filename (input_bfd), howto->name,
1700 h->root.root.string,
1701 bfd_get_section_name (input_bfd, input_section));
1702 else
1703 (*_bfd_error_handler)
1704 (_("%s: warning: %s relocation to 0x%x from %s section"),
1705 bfd_get_filename (input_bfd), howto->name,
1706 outrel.r_addend,
1707 bfd_get_section_name (input_bfd, input_section));
1708 }
947216bf
AM
1709 loc = sreloc->contents;
1710 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1711 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1712
1713 /* This reloc will be computed at runtime, so there's no
1714 need to do anything now, except for R_VAX_32
1715 relocations that have been turned into
1716 R_VAX_RELATIVE. */
1717 if (!relocate)
1718 continue;
1719 }
1720
1721 break;
1722
1723 case R_VAX_GNU_VTINHERIT:
1724 case R_VAX_GNU_VTENTRY:
1725 /* These are no-ops in the end. */
1726 continue;
1727
1728 default:
1729 break;
1730 }
1731
b34976b6 1732 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1733 So subtract the difference from the relocation amount since we can't
1734 add it to the offset. */
90ace9e9 1735 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1736 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1737
1738 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1739 contents, rel->r_offset,
1740 relocation, rel->r_addend);
1741
1742 if (r != bfd_reloc_ok)
1743 {
1744 switch (r)
1745 {
1746 default:
1747 case bfd_reloc_outofrange:
1748 abort ();
1749 case bfd_reloc_overflow:
1750 {
1751 const char *name;
1752
1753 if (h != NULL)
dfeffb9f 1754 name = NULL;
90ace9e9
JT
1755 else
1756 {
1757 name = bfd_elf_string_from_elf_section (input_bfd,
1758 symtab_hdr->sh_link,
1759 sym->st_name);
1760 if (name == NULL)
b34976b6 1761 return FALSE;
90ace9e9
JT
1762 if (*name == '\0')
1763 name = bfd_section_name (input_bfd, sec);
1764 }
1765 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1766 (info, (h ? &h->root : NULL), name, howto->name,
1767 (bfd_vma) 0, input_bfd, input_section,
1768 rel->r_offset)))
b34976b6 1769 return FALSE;
90ace9e9
JT
1770 }
1771 break;
1772 }
1773 }
1774 }
1775
b34976b6 1776 return TRUE;
90ace9e9
JT
1777}
1778
1779/* Finish up dynamic symbol handling. We set the contents of various
1780 dynamic sections here. */
1781
b34976b6 1782static bfd_boolean
ce71b576
NC
1783elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1784 struct elf_link_hash_entry *h,
1785 Elf_Internal_Sym *sym)
90ace9e9
JT
1786{
1787 bfd *dynobj;
1788
1789 dynobj = elf_hash_table (info)->dynobj;
1790
1791 if (h->plt.offset != (bfd_vma) -1)
1792 {
1793 asection *splt;
1794 asection *sgot;
1795 asection *srela;
1796 bfd_vma plt_index;
1797 bfd_vma got_offset;
1798 bfd_vma addend;
1799 Elf_Internal_Rela rela;
947216bf 1800 bfd_byte *loc;
90ace9e9
JT
1801
1802 /* This symbol has an entry in the procedure linkage table. Set
1803 it up. */
90ace9e9
JT
1804 BFD_ASSERT (h->dynindx != -1);
1805
1806 splt = bfd_get_section_by_name (dynobj, ".plt");
1807 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1808 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1809 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1810
1811 addend = 2 * (h->plt.offset & 1);
1812 h->plt.offset &= ~1;
1813
1814 /* Get the index in the procedure linkage table which
1815 corresponds to this symbol. This is the index of this symbol
1816 in all the symbols for which we are making plt entries. The
1817 first entry in the procedure linkage table is reserved. */
1818 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1819
1820 /* Get the offset into the .got table of the entry that
1821 corresponds to this function. Each .got entry is 4 bytes.
1822 The first two are reserved. */
1823 got_offset = (plt_index + 3) * 4;
1824
1825 /* Fill in the entry in the procedure linkage table. */
1826 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1827 PLT_ENTRY_SIZE);
1828
1829 /* The offset is relative to the first extension word. */
1830 bfd_put_32 (output_bfd,
1831 -(h->plt.offset + 8),
1832 splt->contents + h->plt.offset + 4);
1833
1834 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1835 splt->contents + h->plt.offset + 8);
1836
1837 /* Fill in the entry in the global offset table. */
1838 bfd_put_32 (output_bfd,
1839 (splt->output_section->vma
1840 + splt->output_offset
1841 + h->plt.offset) + addend,
1842 sgot->contents + got_offset);
1843
1844 /* Fill in the entry in the .rela.plt section. */
1845 rela.r_offset = (sgot->output_section->vma
1846 + sgot->output_offset
1847 + got_offset);
1848 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1849 rela.r_addend = addend;
947216bf
AM
1850 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1851 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1852
f5385ebf 1853 if (!h->def_regular)
90ace9e9
JT
1854 {
1855 /* Mark the symbol as undefined, rather than as defined in
1856 the .plt section. Leave the value alone. */
1857 sym->st_shndx = SHN_UNDEF;
1858 }
1859 }
1860
1861 if (h->got.offset != (bfd_vma) -1)
1862 {
1863 asection *sgot;
1864 asection *srela;
1865 Elf_Internal_Rela rela;
947216bf 1866 bfd_byte *loc;
90ace9e9
JT
1867
1868 /* This symbol has an entry in the global offset table. Set it
1869 up. */
90ace9e9
JT
1870 sgot = bfd_get_section_by_name (dynobj, ".got");
1871 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1872 BFD_ASSERT (sgot != NULL && srela != NULL);
1873
1874 rela.r_offset = (sgot->output_section->vma
1875 + sgot->output_offset
1876 + (h->got.offset &~ 1));
1877
1878 /* If the symbol was forced to be local because of a version file
1879 locally we just want to emit a RELATIVE reloc. The entry in
1880 the global offset table will already have been initialized in
1881 the relocate_section function. */
1882 if (info->shared
1883 && h->dynindx == -1
f5385ebf 1884 && h->def_regular)
90ace9e9
JT
1885 {
1886 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1887 }
1888 else
1889 {
1890 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1891 }
1892 rela.r_addend = bfd_get_signed_32 (output_bfd,
1893 (sgot->contents
1894 + (h->got.offset & ~1)));
1895
947216bf
AM
1896 loc = srela->contents;
1897 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1898 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1899 }
1900
f5385ebf 1901 if (h->needs_copy)
90ace9e9
JT
1902 {
1903 asection *s;
1904 Elf_Internal_Rela rela;
947216bf 1905 bfd_byte *loc;
90ace9e9
JT
1906
1907 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1908 BFD_ASSERT (h->dynindx != -1
1909 && (h->root.type == bfd_link_hash_defined
1910 || h->root.type == bfd_link_hash_defweak));
1911
1912 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1913 ".rela.bss");
1914 BFD_ASSERT (s != NULL);
1915
1916 rela.r_offset = (h->root.u.def.value
1917 + h->root.u.def.section->output_section->vma
1918 + h->root.u.def.section->output_offset);
1919 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1920 rela.r_addend = 0;
947216bf
AM
1921 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1922 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1923 }
1924
1925 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1926 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1927 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1928 sym->st_shndx = SHN_ABS;
1929
b34976b6 1930 return TRUE;
90ace9e9
JT
1931}
1932
1933/* Finish up the dynamic sections. */
1934
b34976b6 1935static bfd_boolean
ce71b576 1936elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1937{
1938 bfd *dynobj;
1939 asection *sgot;
1940 asection *sdyn;
1941
1942 dynobj = elf_hash_table (info)->dynobj;
1943
1944 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1945 BFD_ASSERT (sgot != NULL);
1946 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1947
1948 if (elf_hash_table (info)->dynamic_sections_created)
1949 {
1950 asection *splt;
1951 Elf32_External_Dyn *dyncon, *dynconend;
1952
1953 splt = bfd_get_section_by_name (dynobj, ".plt");
1954 BFD_ASSERT (splt != NULL && sdyn != NULL);
1955
1956 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1957 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1958 for (; dyncon < dynconend; dyncon++)
1959 {
1960 Elf_Internal_Dyn dyn;
1961 const char *name;
1962 asection *s;
1963
1964 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1965
1966 switch (dyn.d_tag)
1967 {
1968 default:
1969 break;
1970
1971 case DT_PLTGOT:
1972 name = ".got";
1973 goto get_vma;
1974 case DT_JMPREL:
1975 name = ".rela.plt";
1976 get_vma:
1977 s = bfd_get_section_by_name (output_bfd, name);
1978 BFD_ASSERT (s != NULL);
1979 dyn.d_un.d_ptr = s->vma;
1980 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1981 break;
1982
1983 case DT_PLTRELSZ:
1984 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1985 BFD_ASSERT (s != NULL);
eea6121a 1986 dyn.d_un.d_val = s->size;
90ace9e9
JT
1987 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1988 break;
1989
1990 case DT_RELASZ:
1991 /* The procedure linkage table relocs (DT_JMPREL) should
1992 not be included in the overall relocs (DT_RELA).
1993 Therefore, we override the DT_RELASZ entry here to
1994 make it not include the JMPREL relocs. Since the
1995 linker script arranges for .rela.plt to follow all
1996 other relocation sections, we don't have to worry
1997 about changing the DT_RELA entry. */
1998 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1999 if (s != NULL)
eea6121a 2000 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2001 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2002 break;
2003 }
2004 }
2005
2006 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2007 if (splt->size > 0)
90ace9e9
JT
2008 {
2009 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2010 bfd_put_32 (output_bfd,
2011 (sgot->output_section->vma
2012 + sgot->output_offset + 4
2013 - (splt->output_section->vma + 6)),
2014 splt->contents + 2);
2015 bfd_put_32 (output_bfd,
2016 (sgot->output_section->vma
2017 + sgot->output_offset + 8
2018 - (splt->output_section->vma + 12)),
2019 splt->contents + 8);
cedb70c5 2020 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2021 = PLT_ENTRY_SIZE;
2022 }
2023 }
2024
2025 /* Fill in the first three entries in the global offset table. */
eea6121a 2026 if (sgot->size > 0)
90ace9e9
JT
2027 {
2028 if (sdyn == NULL)
2029 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2030 else
2031 bfd_put_32 (output_bfd,
2032 sdyn->output_section->vma + sdyn->output_offset,
2033 sgot->contents);
2034 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2035 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2036 }
2037
2038 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2039
b34976b6 2040 return TRUE;
90ace9e9
JT
2041}
2042
2043#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2044#define TARGET_LITTLE_NAME "elf32-vax"
2045#define ELF_MACHINE_CODE EM_VAX
2046#define ELF_MAXPAGESIZE 0x1000
2047
2048#define elf_backend_create_dynamic_sections \
2049 _bfd_elf_create_dynamic_sections
2050#define bfd_elf32_bfd_link_hash_table_create \
2051 elf_vax_link_hash_table_create
c152c796 2052#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2053
2054#define elf_backend_check_relocs elf_vax_check_relocs
2055#define elf_backend_adjust_dynamic_symbol \
2056 elf_vax_adjust_dynamic_symbol
2057#define elf_backend_size_dynamic_sections \
2058 elf_vax_size_dynamic_sections
74541ad4 2059#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2060#define elf_backend_relocate_section elf_vax_relocate_section
2061#define elf_backend_finish_dynamic_symbol \
2062 elf_vax_finish_dynamic_symbol
2063#define elf_backend_finish_dynamic_sections \
2064 elf_vax_finish_dynamic_sections
2065#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2066#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2067#define bfd_elf32_bfd_merge_private_bfd_data \
2068 elf32_vax_merge_private_bfd_data
2069#define bfd_elf32_bfd_set_private_flags \
2070 elf32_vax_set_private_flags
2071#define bfd_elf32_bfd_print_private_bfd_data \
2072 elf32_vax_print_private_bfd_data
2073
2074#define elf_backend_can_gc_sections 1
2075#define elf_backend_want_got_plt 1
2076#define elf_backend_plt_readonly 1
2077#define elf_backend_want_plt_sym 0
2078#define elf_backend_got_header_size 16
f0fe0e16 2079#define elf_backend_rela_normal 1
90ace9e9
JT
2080
2081#include "elf32-target.h"
This page took 0.445321 seconds and 4 git commands to generate.