daily update
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
1d7e9d18 3 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
7686d77d 4 Free Software Foundation, Inc.
90ace9e9
JT
5 Contributed by Matt Thomas <matt@3am-software.com>.
6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
90ace9e9 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
90ace9e9 18
ae9a127f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
90ace9e9 23
90ace9e9 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
90ace9e9
JT
26#include "bfdlink.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/vax.h"
30
ce71b576
NC
31static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
32static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
34 struct bfd_hash_table *,
35 const char *);
36static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
37static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
38 asection *, const Elf_Internal_Rela *);
ce71b576
NC
39static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
40 struct elf_link_hash_entry *);
41static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
42static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
43 bfd *, asection *, bfd_byte *,
44 Elf_Internal_Rela *,
45 Elf_Internal_Sym *, asection **);
46static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
47 struct elf_link_hash_entry *,
48 Elf_Internal_Sym *);
49static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
50 struct bfd_link_info *);
6db7e006
MR
51static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
52 const arelent *);
ce71b576
NC
53
54static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
55static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
2c3fc389 56static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
57
58static reloc_howto_type howto_table[] = {
59 HOWTO (R_VAX_NONE, /* type */
60 0, /* rightshift */
61 0, /* size (0 = byte, 1 = short, 2 = long) */
62 0, /* bitsize */
b34976b6 63 FALSE, /* pc_relative */
90ace9e9
JT
64 0, /* bitpos */
65 complain_overflow_dont, /* complain_on_overflow */
66 bfd_elf_generic_reloc, /* special_function */
67 "R_VAX_NONE", /* name */
b34976b6 68 FALSE, /* partial_inplace */
90ace9e9
JT
69 0, /* src_mask */
70 0x00000000, /* dst_mask */
b34976b6 71 FALSE), /* pcrel_offset */
90ace9e9
JT
72
73 HOWTO (R_VAX_32, /* type */
74 0, /* rightshift */
75 2, /* size (0 = byte, 1 = short, 2 = long) */
76 32, /* bitsize */
b34976b6 77 FALSE, /* pc_relative */
90ace9e9
JT
78 0, /* bitpos */
79 complain_overflow_bitfield, /* complain_on_overflow */
80 bfd_elf_generic_reloc, /* special_function */
81 "R_VAX_32", /* name */
b34976b6 82 FALSE, /* partial_inplace */
90ace9e9
JT
83 0, /* src_mask */
84 0xffffffff, /* dst_mask */
b34976b6 85 FALSE), /* pcrel_offset */
90ace9e9
JT
86
87 HOWTO (R_VAX_16, /* type */
88 0, /* rightshift */
89 1, /* size (0 = byte, 1 = short, 2 = long) */
90 16, /* bitsize */
b34976b6 91 FALSE, /* pc_relative */
90ace9e9
JT
92 0, /* bitpos */
93 complain_overflow_bitfield, /* complain_on_overflow */
94 bfd_elf_generic_reloc, /* special_function */
95 "R_VAX_16", /* name */
b34976b6 96 FALSE, /* partial_inplace */
90ace9e9
JT
97 0, /* src_mask */
98 0x0000ffff, /* dst_mask */
b34976b6 99 FALSE), /* pcrel_offset */
90ace9e9
JT
100
101 HOWTO (R_VAX_8, /* type */
102 0, /* rightshift */
103 0, /* size (0 = byte, 1 = short, 2 = long) */
104 8, /* bitsize */
b34976b6 105 FALSE, /* pc_relative */
90ace9e9
JT
106 0, /* bitpos */
107 complain_overflow_bitfield, /* complain_on_overflow */
108 bfd_elf_generic_reloc, /* special_function */
109 "R_VAX_8", /* name */
b34976b6 110 FALSE, /* partial_inplace */
90ace9e9
JT
111 0, /* src_mask */
112 0x000000ff, /* dst_mask */
b34976b6 113 FALSE), /* pcrel_offset */
90ace9e9
JT
114
115 HOWTO (R_VAX_PC32, /* type */
116 0, /* rightshift */
117 2, /* size (0 = byte, 1 = short, 2 = long) */
118 32, /* bitsize */
b34976b6 119 TRUE, /* pc_relative */
90ace9e9
JT
120 0, /* bitpos */
121 complain_overflow_bitfield, /* complain_on_overflow */
122 bfd_elf_generic_reloc, /* special_function */
123 "R_VAX_PC32", /* name */
b34976b6 124 FALSE, /* partial_inplace */
90ace9e9
JT
125 0, /* src_mask */
126 0xffffffff, /* dst_mask */
b34976b6 127 TRUE), /* pcrel_offset */
90ace9e9
JT
128
129 HOWTO (R_VAX_PC16, /* type */
130 0, /* rightshift */
131 1, /* size (0 = byte, 1 = short, 2 = long) */
132 16, /* bitsize */
b34976b6 133 TRUE, /* pc_relative */
90ace9e9
JT
134 0, /* bitpos */
135 complain_overflow_signed, /* complain_on_overflow */
136 bfd_elf_generic_reloc, /* special_function */
137 "R_VAX_PC16", /* name */
b34976b6 138 FALSE, /* partial_inplace */
90ace9e9
JT
139 0, /* src_mask */
140 0x0000ffff, /* dst_mask */
b34976b6 141 TRUE), /* pcrel_offset */
90ace9e9
JT
142
143 HOWTO (R_VAX_PC8, /* type */
144 0, /* rightshift */
145 0, /* size (0 = byte, 1 = short, 2 = long) */
146 8, /* bitsize */
b34976b6 147 TRUE, /* pc_relative */
90ace9e9
JT
148 0, /* bitpos */
149 complain_overflow_signed, /* complain_on_overflow */
150 bfd_elf_generic_reloc, /* special_function */
151 "R_VAX_PC8", /* name */
b34976b6 152 FALSE, /* partial_inplace */
90ace9e9
JT
153 0, /* src_mask */
154 0x000000ff, /* dst_mask */
b34976b6 155 TRUE), /* pcrel_offset */
90ace9e9
JT
156
157 HOWTO (R_VAX_GOT32, /* type */
158 0, /* rightshift */
159 2, /* size (0 = byte, 1 = short, 2 = long) */
160 32, /* bitsize */
b34976b6 161 TRUE, /* pc_relative */
90ace9e9
JT
162 0, /* bitpos */
163 complain_overflow_bitfield, /* complain_on_overflow */
164 bfd_elf_generic_reloc, /* special_function */
165 "R_VAX_GOT32", /* name */
b34976b6 166 FALSE, /* partial_inplace */
90ace9e9
JT
167 0, /* src_mask */
168 0xffffffff, /* dst_mask */
b34976b6 169 TRUE), /* pcrel_offset */
90ace9e9
JT
170
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173 EMPTY_HOWTO (-1),
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176
177 HOWTO (R_VAX_PLT32, /* type */
178 0, /* rightshift */
179 2, /* size (0 = byte, 1 = short, 2 = long) */
180 32, /* bitsize */
b34976b6 181 TRUE, /* pc_relative */
90ace9e9
JT
182 0, /* bitpos */
183 complain_overflow_bitfield, /* complain_on_overflow */
184 bfd_elf_generic_reloc, /* special_function */
185 "R_VAX_PLT32", /* name */
b34976b6 186 FALSE, /* partial_inplace */
90ace9e9
JT
187 0, /* src_mask */
188 0xffffffff, /* dst_mask */
b34976b6 189 TRUE), /* pcrel_offset */
90ace9e9
JT
190
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193 EMPTY_HOWTO (-1),
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196
197 HOWTO (R_VAX_COPY, /* type */
198 0, /* rightshift */
199 0, /* size (0 = byte, 1 = short, 2 = long) */
200 0, /* bitsize */
b34976b6 201 FALSE, /* pc_relative */
90ace9e9
JT
202 0, /* bitpos */
203 complain_overflow_dont, /* complain_on_overflow */
204 bfd_elf_generic_reloc, /* special_function */
205 "R_VAX_COPY", /* name */
b34976b6 206 FALSE, /* partial_inplace */
90ace9e9
JT
207 0, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 FALSE), /* pcrel_offset */
90ace9e9
JT
210
211 HOWTO (R_VAX_GLOB_DAT, /* type */
212 0, /* rightshift */
213 2, /* size (0 = byte, 1 = short, 2 = long) */
214 32, /* bitsize */
b34976b6 215 FALSE, /* pc_relative */
90ace9e9
JT
216 0, /* bitpos */
217 complain_overflow_dont, /* complain_on_overflow */
218 bfd_elf_generic_reloc, /* special_function */
219 "R_VAX_GLOB_DAT", /* name */
b34976b6 220 FALSE, /* partial_inplace */
90ace9e9
JT
221 0, /* src_mask */
222 0xffffffff, /* dst_mask */
b34976b6 223 FALSE), /* pcrel_offset */
90ace9e9
JT
224
225 HOWTO (R_VAX_JMP_SLOT, /* type */
226 0, /* rightshift */
227 2, /* size (0 = byte, 1 = short, 2 = long) */
228 32, /* bitsize */
b34976b6 229 FALSE, /* pc_relative */
90ace9e9
JT
230 0, /* bitpos */
231 complain_overflow_dont, /* complain_on_overflow */
232 bfd_elf_generic_reloc, /* special_function */
233 "R_VAX_JMP_SLOT", /* name */
b34976b6 234 FALSE, /* partial_inplace */
90ace9e9
JT
235 0, /* src_mask */
236 0xffffffff, /* dst_mask */
b34976b6 237 FALSE), /* pcrel_offset */
90ace9e9
JT
238
239 HOWTO (R_VAX_RELATIVE, /* type */
240 0, /* rightshift */
241 2, /* size (0 = byte, 1 = short, 2 = long) */
242 32, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
90ace9e9
JT
244 0, /* bitpos */
245 complain_overflow_dont, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_VAX_RELATIVE", /* name */
b34976b6 248 FALSE, /* partial_inplace */
90ace9e9
JT
249 0, /* src_mask */
250 0xffffffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
90ace9e9
JT
252
253 /* GNU extension to record C++ vtable hierarchy */
254 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
255 0, /* rightshift */
256 2, /* size (0 = byte, 1 = short, 2 = long) */
257 0, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
90ace9e9
JT
259 0, /* bitpos */
260 complain_overflow_dont, /* complain_on_overflow */
261 NULL, /* special_function */
262 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 263 FALSE, /* partial_inplace */
90ace9e9
JT
264 0, /* src_mask */
265 0, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
90ace9e9
JT
267
268 /* GNU extension to record C++ vtable member usage */
269 HOWTO (R_VAX_GNU_VTENTRY, /* type */
270 0, /* rightshift */
271 2, /* size (0 = byte, 1 = short, 2 = long) */
272 0, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
90ace9e9
JT
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
277 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 278 FALSE, /* partial_inplace */
90ace9e9
JT
279 0, /* src_mask */
280 0, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
90ace9e9
JT
282};
283
284static void
ce71b576
NC
285rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
286 Elf_Internal_Rela *dst)
90ace9e9
JT
287{
288 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
289 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
290}
291
292#define elf_info_to_howto rtype_to_howto
293
294static const struct
295{
296 bfd_reloc_code_real_type bfd_val;
297 int elf_val;
298} reloc_map[] = {
299 { BFD_RELOC_NONE, R_VAX_NONE },
300 { BFD_RELOC_32, R_VAX_32 },
301 { BFD_RELOC_16, R_VAX_16 },
302 { BFD_RELOC_8, R_VAX_8 },
303 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
304 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
305 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
306 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
307 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
308 { BFD_RELOC_NONE, R_VAX_COPY },
309 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
310 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
311 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
312 { BFD_RELOC_CTOR, R_VAX_32 },
313 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
314 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
315};
316
317static reloc_howto_type *
ce71b576 318reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
319{
320 unsigned int i;
321 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
322 {
323 if (reloc_map[i].bfd_val == code)
324 return &howto_table[reloc_map[i].elf_val];
325 }
326 return 0;
327}
328
157090f7
AM
329static reloc_howto_type *
330reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
331 const char *r_name)
332{
333 unsigned int i;
334
335 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
336 if (howto_table[i].name != NULL
337 && strcasecmp (howto_table[i].name, r_name) == 0)
338 return &howto_table[i];
339
340 return NULL;
341}
342
90ace9e9 343#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 344#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
345#define ELF_ARCH bfd_arch_vax
346/* end code generated by elf.el */
90ace9e9
JT
347\f
348/* Functions for the VAX ELF linker. */
349
350/* The name of the dynamic interpreter. This is put in the .interp
351 section. */
352
353#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
354
355/* The size in bytes of an entry in the procedure linkage table. */
356
357#define PLT_ENTRY_SIZE 12
358
359/* The first entry in a procedure linkage table looks like this. See
360 the SVR4 ABI VAX supplement to see how this works. */
361
362static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
363{
364 0xdd, 0xef, /* pushl l^ */
365 0, 0, 0, 0, /* offset to .plt.got + 4 */
366 0x17, 0xff, /* jmp @L^(pc) */
367 0, 0, 0, 0, /* offset to .plt.got + 8 */
368};
369
370/* Subsequent entries in a procedure linkage table look like this. */
371
372static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
373{
6c4fb25a 374 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 375 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
376 0, 0, 0, 0, /* replaced with offset to start of .plt */
377 0, 0, 0, 0, /* index into .rela.plt */
378};
379
380/* The VAX linker needs to keep track of the number of relocs that it
381 decides to copy in check_relocs for each symbol. This is so that it
382 can discard PC relative relocs if it doesn't need them when linking
383 with -Bsymbolic. We store the information in a field extending the
384 regular ELF linker hash table. */
385
386/* This structure keeps track of the number of PC relative relocs we have
387 copied for a given symbol. */
388
389struct elf_vax_pcrel_relocs_copied
390{
391 /* Next section. */
392 struct elf_vax_pcrel_relocs_copied *next;
393 /* A section in dynobj. */
394 asection *section;
395 /* Number of relocs copied in this section. */
396 bfd_size_type count;
397};
398
399/* VAX ELF linker hash entry. */
400
401struct elf_vax_link_hash_entry
402{
403 struct elf_link_hash_entry root;
404
405 /* Number of PC relative relocs copied for this symbol. */
406 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
407
408 bfd_vma got_addend;
409};
410
90ace9e9
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576 413static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 414 void *);
90ace9e9 415
b29635ba
JT
416/* Declare this now that the above structures are defined. */
417
ce71b576 418static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 419 void *);
b29635ba 420
90ace9e9
JT
421/* Traverse an VAX ELF linker hash table. */
422
423#define elf_vax_link_hash_traverse(table, func, info) \
424 (elf_link_hash_traverse \
4dfe6ac6 425 ((table), \
2c3fc389 426 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
427 (info)))
428
90ace9e9
JT
429/* Create an entry in an VAX ELF linker hash table. */
430
431static struct bfd_hash_entry *
ce71b576
NC
432elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
433 struct bfd_hash_table *table,
434 const char *string)
90ace9e9
JT
435{
436 struct elf_vax_link_hash_entry *ret =
437 (struct elf_vax_link_hash_entry *) entry;
438
439 /* Allocate the structure if it has not already been allocated by a
440 subclass. */
ce71b576 441 if (ret == NULL)
90ace9e9
JT
442 ret = ((struct elf_vax_link_hash_entry *)
443 bfd_hash_allocate (table,
444 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 445 if (ret == NULL)
90ace9e9
JT
446 return (struct bfd_hash_entry *) ret;
447
448 /* Call the allocation method of the superclass. */
449 ret = ((struct elf_vax_link_hash_entry *)
450 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
451 table, string));
ce71b576 452 if (ret != NULL)
90ace9e9
JT
453 {
454 ret->pcrel_relocs_copied = NULL;
455 }
456
457 return (struct bfd_hash_entry *) ret;
458}
459
460/* Create an VAX ELF linker hash table. */
461
462static struct bfd_link_hash_table *
ce71b576 463elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 464{
4dfe6ac6
NC
465 struct elf_link_hash_table *ret;
466 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 467
7bf52ea2 468 ret = bfd_zmalloc (amt);
ce71b576 469 if (ret == NULL)
90ace9e9
JT
470 return NULL;
471
4dfe6ac6 472 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 473 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
474 sizeof (struct elf_vax_link_hash_entry),
475 GENERIC_ELF_DATA))
90ace9e9
JT
476 {
477 free (ret);
478 return NULL;
479 }
480
4dfe6ac6 481 return &ret->root;
90ace9e9
JT
482}
483
484/* Keep vax-specific flags in the ELF header */
b34976b6 485static bfd_boolean
ce71b576 486elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
487{
488 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
489 elf_flags_init (abfd) = TRUE;
490 return TRUE;
90ace9e9
JT
491}
492
493/* Merge backend specific data from an object file to the output
494 object file when linking. */
b34976b6 495static bfd_boolean
ce71b576 496elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9 497{
90ace9e9
JT
498 flagword in_flags;
499
500 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
501 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 502 return TRUE;
90ace9e9
JT
503
504 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
505
506 if (!elf_flags_init (obfd))
507 {
b34976b6 508 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
509 elf_elfheader (obfd)->e_flags = in_flags;
510 }
511
b34976b6 512 return TRUE;
90ace9e9
JT
513}
514
515/* Display the flags field */
b34976b6 516static bfd_boolean
2c3fc389 517elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
518{
519 FILE *file = (FILE *) ptr;
520
521 BFD_ASSERT (abfd != NULL && ptr != NULL);
522
523 /* Print normal ELF private data. */
524 _bfd_elf_print_private_bfd_data (abfd, ptr);
525
526 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
527
528 /* xgettext:c-format */
529 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
530
179d3252 531 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
532 fprintf (file, _(" [nonpic]"));
533
179d3252 534 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
535 fprintf (file, _(" [d-float]"));
536
179d3252 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
538 fprintf (file, _(" [g-float]"));
539
540 fputc ('\n', file);
541
b34976b6 542 return TRUE;
90ace9e9
JT
543}
544/* Look through the relocs for a section during the first phase, and
545 allocate space in the global offset table or procedure linkage
546 table. */
547
b34976b6 548static bfd_boolean
ce71b576
NC
549elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
550 const Elf_Internal_Rela *relocs)
90ace9e9
JT
551{
552 bfd *dynobj;
553 Elf_Internal_Shdr *symtab_hdr;
554 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
555 const Elf_Internal_Rela *rel;
556 const Elf_Internal_Rela *rel_end;
557 asection *sgot;
558 asection *srelgot;
559 asection *sreloc;
560
1049f94e 561 if (info->relocatable)
b34976b6 562 return TRUE;
90ace9e9
JT
563
564 dynobj = elf_hash_table (info)->dynobj;
565 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
566 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
567
568 sgot = NULL;
569 srelgot = NULL;
570 sreloc = NULL;
571
572 rel_end = relocs + sec->reloc_count;
573 for (rel = relocs; rel < rel_end; rel++)
574 {
575 unsigned long r_symndx;
576 struct elf_link_hash_entry *h;
577
578 r_symndx = ELF32_R_SYM (rel->r_info);
579
580 if (r_symndx < symtab_hdr->sh_info)
581 h = NULL;
582 else
973a3492
L
583 {
584 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
585 while (h->root.type == bfd_link_hash_indirect
586 || h->root.type == bfd_link_hash_warning)
587 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
588
589 /* PR15323, ref flags aren't set for references in the same
590 object. */
591 h->root.non_ir_ref = 1;
973a3492 592 }
90ace9e9
JT
593
594 switch (ELF32_R_TYPE (rel->r_info))
595 {
596 case R_VAX_GOT32:
fe723c87
MT
597 BFD_ASSERT (h != NULL);
598 if (h->forced_local
599 || h == elf_hash_table (info)->hgot
600 || h == elf_hash_table (info)->hplt)
90ace9e9
JT
601 break;
602
7b6021f1
MR
603 /* If this is a local symbol, we resolve it directly without
604 creating a global offset table entry. */
605 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
606 break;
607
90ace9e9
JT
608 /* This symbol requires a global offset table entry. */
609
610 if (dynobj == NULL)
611 {
612 /* Create the .got section. */
613 elf_hash_table (info)->dynobj = dynobj = abfd;
614 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 615 return FALSE;
90ace9e9
JT
616 }
617
618 if (sgot == NULL)
619 {
3d4d4302 620 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
621 BFD_ASSERT (sgot != NULL);
622 }
623
624 if (srelgot == NULL
625 && (h != NULL || info->shared))
626 {
3d4d4302 627 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
628 if (srelgot == NULL)
629 {
3d4d4302
AM
630 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
631 | SEC_IN_MEMORY | SEC_LINKER_CREATED
632 | SEC_READONLY);
633
634 srelgot = bfd_make_section_anyway_with_flags (dynobj,
635 ".rela.got",
636 flags);
90ace9e9 637 if (srelgot == NULL
90ace9e9 638 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 639 return FALSE;
90ace9e9
JT
640 }
641 }
642
643 if (h != NULL)
644 {
645 struct elf_vax_link_hash_entry *eh;
646
647 eh = (struct elf_vax_link_hash_entry *) h;
648 if (h->got.refcount == -1)
649 {
650 h->got.refcount = 1;
651 eh->got_addend = rel->r_addend;
90ace9e9
JT
652 }
653 else
654 {
655 h->got.refcount++;
656 if (eh->got_addend != (bfd_vma) rel->r_addend)
657 (*_bfd_error_handler)
fe723c87
MT
658 (_("%s: warning: GOT addend of %ld to `%s' does"
659 " not match previous GOT addend of %ld"),
660 bfd_get_filename (abfd), rel->r_addend,
661 h->root.root.string,
662 eh->got_addend);
cedb70c5 663
90ace9e9
JT
664 }
665 }
666 break;
667
668 case R_VAX_PLT32:
669 /* This symbol requires a procedure linkage table entry. We
670 actually build the entry in adjust_dynamic_symbol,
671 because this might be a case of linking PIC code which is
672 never referenced by a dynamic object, in which case we
673 don't need to generate a procedure linkage table entry
674 after all. */
675
676 /* If this is a local symbol, we resolve it directly without
677 creating a procedure linkage table entry. */
fe723c87 678 BFD_ASSERT (h != NULL);
7b6021f1 679 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || h->forced_local)
fe723c87 680 break;
90ace9e9 681
f5385ebf 682 h->needs_plt = 1;
90ace9e9
JT
683 if (h->plt.refcount == -1)
684 h->plt.refcount = 1;
685 else
686 h->plt.refcount++;
687 break;
688
689 case R_VAX_PC8:
690 case R_VAX_PC16:
691 case R_VAX_PC32:
692 /* If we are creating a shared library and this is not a local
693 symbol, we need to copy the reloc into the shared library.
694 However when linking with -Bsymbolic and this is a global
695 symbol which is defined in an object we are including in the
696 link (i.e., DEF_REGULAR is set), then we can resolve the
697 reloc directly. At this point we have not seen all the input
698 files, so it is possible that DEF_REGULAR is not set now but
699 will be set later (it is never cleared). We account for that
700 possibility below by storing information in the
701 pcrel_relocs_copied field of the hash table entry. */
702 if (!(info->shared
703 && (sec->flags & SEC_ALLOC) != 0
704 && h != NULL
705 && (!info->symbolic
f5385ebf 706 || !h->def_regular)))
90ace9e9 707 {
7b6021f1
MR
708 if (h != NULL
709 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
710 && !h->forced_local)
90ace9e9
JT
711 {
712 /* Make sure a plt entry is created for this symbol if
713 it turns out to be a function defined by a dynamic
714 object. */
715 if (h->plt.refcount == -1)
716 h->plt.refcount = 1;
717 else
718 h->plt.refcount++;
719 }
720 break;
721 }
7b6021f1
MR
722 /* If this is a local symbol, we can resolve it directly. */
723 if (h != NULL
724 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
725 || h->forced_local))
fe723c87
MT
726 break;
727
90ace9e9
JT
728 /* Fall through. */
729 case R_VAX_8:
730 case R_VAX_16:
731 case R_VAX_32:
7b6021f1 732 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
733 {
734 /* Make sure a plt entry is created for this symbol if it
735 turns out to be a function defined by a dynamic object. */
736 if (h->plt.refcount == -1)
737 h->plt.refcount = 1;
738 else
739 h->plt.refcount++;
740 }
741
742 /* If we are creating a shared library, we need to copy the
743 reloc into the shared library. */
744 if (info->shared
745 && (sec->flags & SEC_ALLOC) != 0)
746 {
747 /* When creating a shared object, we must copy these
748 reloc types into the output file. We create a reloc
749 section in dynobj and make room for this reloc. */
750 if (sreloc == NULL)
751 {
83bac4b0
NC
752 sreloc = _bfd_elf_make_dynamic_reloc_section
753 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 754
83bac4b0 755 if (sreloc == NULL)
b34976b6 756 return FALSE;
90ace9e9 757
90ace9e9
JT
758 if (sec->flags & SEC_READONLY)
759 info->flags |= DF_TEXTREL;
760 }
761
eea6121a 762 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
763
764 /* If we are linking with -Bsymbolic, we count the number of
765 PC relative relocations we have entered for this symbol,
766 so that we can discard them again if the symbol is later
767 defined by a regular object. Note that this function is
19852a2a 768 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
769 which means that h is really a pointer to an
770 elf_vax_link_hash_entry. */
771 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
772 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
773 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
774 && info->symbolic)
775 {
776 struct elf_vax_link_hash_entry *eh;
777 struct elf_vax_pcrel_relocs_copied *p;
778
779 eh = (struct elf_vax_link_hash_entry *) h;
780
781 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
782 if (p->section == sreloc)
783 break;
784
785 if (p == NULL)
786 {
787 p = ((struct elf_vax_pcrel_relocs_copied *)
788 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
789 if (p == NULL)
b34976b6 790 return FALSE;
90ace9e9
JT
791 p->next = eh->pcrel_relocs_copied;
792 eh->pcrel_relocs_copied = p;
793 p->section = sreloc;
794 p->count = 0;
795 }
796
797 ++p->count;
798 }
799 }
800
801 break;
802
803 /* This relocation describes the C++ object vtable hierarchy.
804 Reconstruct it for later use during GC. */
805 case R_VAX_GNU_VTINHERIT:
c152c796 806 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 807 return FALSE;
90ace9e9
JT
808 break;
809
810 /* This relocation describes which C++ vtable entries are actually
811 used. Record for later use during GC. */
812 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
813 BFD_ASSERT (h != NULL);
814 if (h != NULL
815 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 816 return FALSE;
90ace9e9
JT
817 break;
818
819 default:
820 break;
821 }
822 }
823
b34976b6 824 return TRUE;
90ace9e9
JT
825}
826
827/* Return the section that should be marked against GC for a given
828 relocation. */
829
830static asection *
ce71b576 831elf_vax_gc_mark_hook (asection *sec,
07adf181 832 struct bfd_link_info *info,
ce71b576
NC
833 Elf_Internal_Rela *rel,
834 struct elf_link_hash_entry *h,
835 Elf_Internal_Sym *sym)
90ace9e9
JT
836{
837 if (h != NULL)
07adf181
AM
838 switch (ELF32_R_TYPE (rel->r_info))
839 {
840 case R_VAX_GNU_VTINHERIT:
841 case R_VAX_GNU_VTENTRY:
842 return NULL;
843 }
844
845 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
846}
847
848/* Update the got entry reference counts for the section being removed. */
849
b34976b6 850static bfd_boolean
ce71b576
NC
851elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
852 const Elf_Internal_Rela *relocs)
90ace9e9
JT
853{
854 Elf_Internal_Shdr *symtab_hdr;
855 struct elf_link_hash_entry **sym_hashes;
90ace9e9 856 const Elf_Internal_Rela *rel, *relend;
90ace9e9 857 bfd *dynobj;
90ace9e9 858
7dda2462
TG
859 if (info->relocatable)
860 return TRUE;
861
90ace9e9
JT
862 dynobj = elf_hash_table (info)->dynobj;
863 if (dynobj == NULL)
b34976b6 864 return TRUE;
90ace9e9 865
babfd660
KH
866 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
867 sym_hashes = elf_sym_hashes (abfd);
868
90ace9e9
JT
869 relend = relocs + sec->reloc_count;
870 for (rel = relocs; rel < relend; rel++)
871 {
babfd660 872 unsigned long r_symndx;
3eb128b2
AM
873 struct elf_link_hash_entry *h = NULL;
874
875 r_symndx = ELF32_R_SYM (rel->r_info);
876 if (r_symndx >= symtab_hdr->sh_info)
877 {
878 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
879 while (h->root.type == bfd_link_hash_indirect
880 || h->root.type == bfd_link_hash_warning)
881 h = (struct elf_link_hash_entry *) h->root.u.i.link;
882 }
babfd660 883
90ace9e9
JT
884 switch (ELF32_R_TYPE (rel->r_info))
885 {
886 case R_VAX_GOT32:
3eb128b2
AM
887 if (h != NULL && h->got.refcount > 0)
888 --h->got.refcount;
90ace9e9
JT
889 break;
890
891 case R_VAX_PLT32:
892 case R_VAX_PC8:
893 case R_VAX_PC16:
894 case R_VAX_PC32:
895 case R_VAX_8:
896 case R_VAX_16:
897 case R_VAX_32:
3eb128b2
AM
898 if (h != NULL && h->plt.refcount > 0)
899 --h->plt.refcount;
90ace9e9
JT
900 break;
901
902 default:
903 break;
904 }
905 }
906
b34976b6 907 return TRUE;
90ace9e9
JT
908}
909
910/* Adjust a symbol defined by a dynamic object and referenced by a
911 regular object. The current definition is in some section of the
912 dynamic object, but we're not including those sections. We have to
913 change the definition to something the rest of the link can
914 understand. */
915
b34976b6 916static bfd_boolean
90ace9e9
JT
917elf_vax_adjust_dynamic_symbol (info, h)
918 struct bfd_link_info *info;
919 struct elf_link_hash_entry *h;
920{
921 bfd *dynobj;
922 asection *s;
90ace9e9
JT
923
924 dynobj = elf_hash_table (info)->dynobj;
925
926 /* Make sure we know what is going on here. */
927 BFD_ASSERT (dynobj != NULL
f5385ebf 928 && (h->needs_plt
f6e332e6 929 || h->u.weakdef != NULL
f5385ebf
AM
930 || (h->def_dynamic
931 && h->ref_regular
932 && !h->def_regular)));
90ace9e9
JT
933
934 /* If this is a function, put it in the procedure linkage table. We
935 will fill in the contents of the procedure linkage table later,
936 when we know the address of the .got section. */
937 if (h->type == STT_FUNC
f5385ebf 938 || h->needs_plt)
90ace9e9 939 {
a22a8039
MR
940 if (h->plt.refcount <= 0
941 || SYMBOL_CALLS_LOCAL (info, h)
942 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
943 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
944 {
945 /* This case can occur if we saw a PLTxx reloc in an input
946 file, but the symbol was never referred to by a dynamic
a22a8039
MR
947 object, or if all references were garbage collected. In
948 such a case, we don't actually need to build a procedure
949 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 950 h->plt.offset = (bfd_vma) -1;
f5385ebf 951 h->needs_plt = 0;
b34976b6 952 return TRUE;
90ace9e9
JT
953 }
954
3d4d4302 955 s = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
956 BFD_ASSERT (s != NULL);
957
958 /* If this is the first .plt entry, make room for the special
959 first entry. */
eea6121a 960 if (s->size == 0)
90ace9e9 961 {
eea6121a 962 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
963 }
964
965 /* If this symbol is not defined in a regular file, and we are
966 not generating a shared library, then set the symbol to this
967 location in the .plt. This is required to make function
968 pointers compare as equal between the normal executable and
969 the shared library. */
970 if (!info->shared
f5385ebf 971 && !h->def_regular)
90ace9e9
JT
972 {
973 h->root.u.def.section = s;
eea6121a 974 h->root.u.def.value = s->size;
90ace9e9
JT
975 }
976
eea6121a 977 h->plt.offset = s->size;
90ace9e9
JT
978
979 /* Make room for this entry. */
eea6121a 980 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
981
982 /* We also need to make an entry in the .got.plt section, which
983 will be placed in the .got section by the linker script. */
984
3d4d4302 985 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 986 BFD_ASSERT (s != NULL);
eea6121a 987 s->size += 4;
90ace9e9
JT
988
989 /* We also need to make an entry in the .rela.plt section. */
990
3d4d4302 991 s = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9 992 BFD_ASSERT (s != NULL);
eea6121a 993 s->size += sizeof (Elf32_External_Rela);
90ace9e9 994
b34976b6 995 return TRUE;
90ace9e9
JT
996 }
997
998 /* Reinitialize the plt offset now that it is not used as a reference
999 count any more. */
1000 h->plt.offset = (bfd_vma) -1;
1001
1002 /* If this is a weak symbol, and there is a real definition, the
1003 processor independent code will have arranged for us to see the
1004 real definition first, and we can just use the same value. */
f6e332e6 1005 if (h->u.weakdef != NULL)
90ace9e9 1006 {
f6e332e6
AM
1007 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1008 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1009 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1010 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1011 return TRUE;
90ace9e9
JT
1012 }
1013
1014 /* This is a reference to a symbol defined by a dynamic object which
1015 is not a function. */
1016
1017 /* If we are creating a shared library, we must presume that the
1018 only references to the symbol are via the global offset table.
1019 For such cases we need not do anything here; the relocations will
1020 be handled correctly by relocate_section. */
1021 if (info->shared)
b34976b6 1022 return TRUE;
90ace9e9
JT
1023
1024 /* We must allocate the symbol in our .dynbss section, which will
1025 become part of the .bss section of the executable. There will be
1026 an entry for this symbol in the .dynsym section. The dynamic
1027 object will contain position independent code, so all references
1028 from the dynamic object to this symbol will go through the global
1029 offset table. The dynamic linker will use the .dynsym entry to
1030 determine the address it must put in the global offset table, so
1031 both the dynamic object and the regular object will refer to the
1032 same memory location for the variable. */
1033
3d4d4302 1034 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
1035 BFD_ASSERT (s != NULL);
1036
1037 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1038 copy the initial value out of the dynamic object and into the
1039 runtime process image. We need to remember the offset into the
1040 .rela.bss section we are going to use. */
1d7e9d18 1041 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
1042 {
1043 asection *srel;
1044
3d4d4302 1045 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 1046 BFD_ASSERT (srel != NULL);
eea6121a 1047 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1048 h->needs_copy = 1;
90ace9e9
JT
1049 }
1050
027297b7 1051 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1052}
1053
1054/* Set the sizes of the dynamic sections. */
1055
b34976b6 1056static bfd_boolean
ce71b576 1057elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1058{
1059 bfd *dynobj;
1060 asection *s;
b34976b6
AM
1061 bfd_boolean plt;
1062 bfd_boolean relocs;
1063 bfd_boolean reltext;
90ace9e9
JT
1064
1065 dynobj = elf_hash_table (info)->dynobj;
1066 BFD_ASSERT (dynobj != NULL);
1067
1068 if (elf_hash_table (info)->dynamic_sections_created)
1069 {
1070 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1071 if (info->executable)
90ace9e9 1072 {
3d4d4302 1073 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1074 BFD_ASSERT (s != NULL);
eea6121a 1075 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1076 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1077 }
1078 }
1079 else
1080 {
1081 /* We may have created entries in the .rela.got and .got sections.
1082 However, if we are not creating the dynamic sections, we will
1083 not actually use these entries. Reset the size of .rela.got
1084 and .got, which will cause it to get stripped from the output
1085 file below. */
3d4d4302 1086 s = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9 1087 if (s != NULL)
eea6121a 1088 s->size = 0;
3d4d4302 1089 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1090 if (s != NULL)
eea6121a 1091 s->size = 0;
3d4d4302 1092 s = bfd_get_linker_section (dynobj, ".got");
90ace9e9 1093 if (s != NULL)
eea6121a 1094 s->size = 0;
90ace9e9
JT
1095 }
1096
1097 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1098 relative relocs against symbols defined in a regular object. We
1099 allocated space for them in the check_relocs routine, but we will not
1100 fill them in in the relocate_section routine. */
1101 if (info->shared && info->symbolic)
4dfe6ac6 1102 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1103 elf_vax_discard_copies,
ce71b576 1104 NULL);
b29635ba 1105
b34976b6 1106 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1107 discard all the got entries we've recorded. Otherwise, we need to
1108 instantiate (allocate space for them). */
1109 elf_link_hash_traverse (elf_hash_table (info),
1110 elf_vax_instantiate_got_entries,
2c3fc389 1111 info);
90ace9e9
JT
1112
1113 /* The check_relocs and adjust_dynamic_symbol entry points have
1114 determined the sizes of the various dynamic sections. Allocate
1115 memory for them. */
b34976b6
AM
1116 plt = FALSE;
1117 relocs = FALSE;
1118 reltext = FALSE;
90ace9e9
JT
1119 for (s = dynobj->sections; s != NULL; s = s->next)
1120 {
1121 const char *name;
90ace9e9
JT
1122
1123 if ((s->flags & SEC_LINKER_CREATED) == 0)
1124 continue;
1125
1126 /* It's OK to base decisions on the section name, because none
1127 of the dynobj section names depend upon the input files. */
1128 name = bfd_get_section_name (dynobj, s);
1129
90ace9e9
JT
1130 if (strcmp (name, ".plt") == 0)
1131 {
c456f082
AM
1132 /* Remember whether there is a PLT. */
1133 plt = s->size != 0;
90ace9e9 1134 }
0112cd26 1135 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1136 {
c456f082 1137 if (s->size != 0)
90ace9e9
JT
1138 {
1139 asection *target;
1140
1141 /* Remember whether there are any reloc sections other
1142 than .rela.plt. */
1143 if (strcmp (name, ".rela.plt") != 0)
1144 {
1145 const char *outname;
1146
b34976b6 1147 relocs = TRUE;
90ace9e9
JT
1148
1149 /* If this relocation section applies to a read only
1150 section, then we probably need a DT_TEXTREL
1151 entry. .rela.plt is actually associated with
1152 .got.plt, which is never readonly. */
1153 outname = bfd_get_section_name (output_bfd,
1154 s->output_section);
1155 target = bfd_get_section_by_name (output_bfd, outname + 5);
1156 if (target != NULL
1157 && (target->flags & SEC_READONLY) != 0
1158 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1159 reltext = TRUE;
90ace9e9
JT
1160 }
1161
1162 /* We use the reloc_count field as a counter if we need
1163 to copy relocs into the output file. */
1164 s->reloc_count = 0;
1165 }
1166 }
0112cd26 1167 else if (! CONST_STRNEQ (name, ".got")
c456f082 1168 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1169 {
1170 /* It's not one of our sections, so don't allocate space. */
1171 continue;
1172 }
1173
c456f082 1174 if (s->size == 0)
90ace9e9 1175 {
c456f082
AM
1176 /* If we don't need this section, strip it from the
1177 output file. This is mostly to handle .rela.bss and
1178 .rela.plt. We must create both sections in
1179 create_dynamic_sections, because they must be created
1180 before the linker maps input sections to output
1181 sections. The linker does that before
1182 adjust_dynamic_symbol is called, and it is that
1183 function which decides whether anything needs to go
1184 into these sections. */
8423293d 1185 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1186 continue;
1187 }
1188
c456f082
AM
1189 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1190 continue;
1191
90ace9e9 1192 /* Allocate memory for the section contents. */
eea6121a 1193 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1194 if (s->contents == NULL)
b34976b6 1195 return FALSE;
90ace9e9
JT
1196 }
1197
1198 if (elf_hash_table (info)->dynamic_sections_created)
1199 {
1200 /* Add some entries to the .dynamic section. We fill in the
1201 values later, in elf_vax_finish_dynamic_sections, but we
1202 must add the entries now so that we get the correct size for
1203 the .dynamic section. The DT_DEBUG entry is filled in by the
1204 dynamic linker and used by the debugger. */
1205#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1206 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1207
1208 if (!info->shared)
1209 {
1210 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1211 return FALSE;
90ace9e9
JT
1212 }
1213
1214 if (plt)
1215 {
1216 if (!add_dynamic_entry (DT_PLTGOT, 0)
1217 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1218 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1219 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1220 return FALSE;
90ace9e9
JT
1221 }
1222
1223 if (relocs)
1224 {
1225 if (!add_dynamic_entry (DT_RELA, 0)
1226 || !add_dynamic_entry (DT_RELASZ, 0)
1227 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1228 return FALSE;
90ace9e9
JT
1229 }
1230
1231 if (reltext || (info->flags & DF_TEXTREL) != 0)
1232 {
1233 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1234 return FALSE;
90ace9e9
JT
1235 }
1236 }
1237#undef add_dynamic_entry
1238
b34976b6 1239 return TRUE;
90ace9e9
JT
1240}
1241
1242/* This function is called via elf_vax_link_hash_traverse if we are
1243 creating a shared object with -Bsymbolic. It discards the space
1244 allocated to copy PC relative relocs against symbols which are defined
1245 in regular objects. We allocated space for them in the check_relocs
1246 routine, but we won't fill them in in the relocate_section routine. */
1247
b34976b6 1248static bfd_boolean
ce71b576 1249elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1250 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1251{
1252 struct elf_vax_pcrel_relocs_copied *s;
1253
90ace9e9 1254 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1255 if (!h->root.def_regular)
b34976b6 1256 return TRUE;
90ace9e9
JT
1257
1258 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1259 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1260
b34976b6 1261 return TRUE;
90ace9e9
JT
1262}
1263
b29635ba
JT
1264/* This function is called via elf_link_hash_traverse. It looks for entries
1265 that have GOT or PLT (.GOT) references. If creating a static object or a
1266 shared object with -Bsymbolic, it resets the reference count back to 0
1267 and sets the offset to -1 so normal PC32 relocation will be done. If
1268 creating a shared object or executable, space in the .got and .rela.got
1269 will be reserved for the symbol. */
1270
b34976b6 1271static bfd_boolean
2c3fc389 1272elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1273{
1274 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1275 bfd *dynobj;
1276 asection *sgot;
1277 asection *srelgot;
b34976b6 1278
b29635ba
JT
1279 /* We don't care about non-GOT (and non-PLT) entries. */
1280 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1281 return TRUE;
b29635ba
JT
1282
1283 dynobj = elf_hash_table (info)->dynobj;
1284 if (dynobj == NULL)
b34976b6 1285 return TRUE;
b29635ba 1286
3d4d4302
AM
1287 sgot = bfd_get_linker_section (dynobj, ".got");
1288 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
b29635ba
JT
1289
1290 if (!elf_hash_table (info)->dynamic_sections_created
fe723c87
MT
1291 || (info->shared && info->symbolic)
1292 || h->forced_local)
b29635ba
JT
1293 {
1294 h->got.refcount = 0;
1295 h->got.offset = (bfd_vma) -1;
1296 h->plt.refcount = 0;
1297 h->plt.offset = (bfd_vma) -1;
1298 }
1299 else if (h->got.refcount > 0)
1300 {
886815b2
MR
1301 bfd_boolean dyn;
1302
b29635ba
JT
1303 /* Make sure this symbol is output as a dynamic symbol. */
1304 if (h->dynindx == -1)
1305 {
c152c796 1306 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1307 return FALSE;
b29635ba
JT
1308 }
1309
886815b2 1310 dyn = elf_hash_table (info)->dynamic_sections_created;
b29635ba 1311 /* Allocate space in the .got and .rela.got sections. */
886815b2
MR
1312 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1313 && (info->shared
1314 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1315 {
1316 sgot->size += 4;
1317 srelgot->size += sizeof (Elf32_External_Rela);
1318 }
b29635ba
JT
1319 }
1320
b34976b6 1321 return TRUE;
b29635ba
JT
1322}
1323
90ace9e9
JT
1324/* Relocate an VAX ELF section. */
1325
b34976b6 1326static bfd_boolean
ce71b576
NC
1327elf_vax_relocate_section (bfd *output_bfd,
1328 struct bfd_link_info *info,
1329 bfd *input_bfd,
1330 asection *input_section,
1331 bfd_byte *contents,
1332 Elf_Internal_Rela *relocs,
1333 Elf_Internal_Sym *local_syms,
1334 asection **local_sections)
90ace9e9
JT
1335{
1336 bfd *dynobj;
1337 Elf_Internal_Shdr *symtab_hdr;
1338 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1339 bfd_vma plt_index;
1340 bfd_vma got_offset;
1341 asection *sgot;
1342 asection *splt;
1343 asection *sgotplt;
1344 asection *sreloc;
1345 Elf_Internal_Rela *rel;
1346 Elf_Internal_Rela *relend;
1347
1348 dynobj = elf_hash_table (info)->dynobj;
1349 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1350 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1351
1352 sgot = NULL;
1353 splt = NULL;
1354 sgotplt = NULL;
1355 sreloc = NULL;
1356
1357 rel = relocs;
1358 relend = relocs + input_section->reloc_count;
1359 for (; rel < relend; rel++)
1360 {
1361 int r_type;
1362 reloc_howto_type *howto;
1363 unsigned long r_symndx;
1364 struct elf_link_hash_entry *h;
1365 Elf_Internal_Sym *sym;
1366 asection *sec;
1367 bfd_vma relocation;
1368 bfd_reloc_status_type r;
1369
1370 r_type = ELF32_R_TYPE (rel->r_info);
1371 if (r_type < 0 || r_type >= (int) R_VAX_max)
1372 {
1373 bfd_set_error (bfd_error_bad_value);
b34976b6 1374 return FALSE;
90ace9e9
JT
1375 }
1376 howto = howto_table + r_type;
1377
f0fe0e16 1378 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1379 h = NULL;
1380 sym = NULL;
1381 sec = NULL;
1382 if (r_symndx < symtab_hdr->sh_info)
1383 {
1384 sym = local_syms + r_symndx;
1385 sec = local_sections[r_symndx];
8517fae7 1386 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1387 }
1388 else
1389 {
560e09e9
NC
1390 bfd_boolean unresolved_reloc;
1391 bfd_boolean warned;
1392
b2a8e766
AM
1393 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1394 r_symndx, symtab_hdr, sym_hashes,
1395 h, sec, relocation,
1396 unresolved_reloc, warned);
ce71b576 1397
560e09e9 1398 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1399 || h->root.type == bfd_link_hash_defweak)
560e09e9 1400 && ((r_type == R_VAX_PLT32
90ace9e9 1401 && h->plt.offset != (bfd_vma) -1
fe723c87 1402 && !h->forced_local
90ace9e9
JT
1403 && elf_hash_table (info)->dynamic_sections_created)
1404 || (r_type == R_VAX_GOT32
fe723c87
MT
1405 && h->got.offset != (bfd_vma) -1
1406 && !h->forced_local
90ace9e9
JT
1407 && elf_hash_table (info)->dynamic_sections_created
1408 && (! info->shared
1409 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1410 || !h->def_regular))
90ace9e9
JT
1411 || (info->shared
1412 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1413 || !h->def_regular)
90ace9e9
JT
1414 && ((input_section->flags & SEC_ALLOC) != 0
1415 /* DWARF will emit R_VAX_32 relocations in its
1416 sections against symbols defined externally
1417 in shared libraries. We can't do anything
1418 with them here. */
1419
1420 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1421 && h->def_dynamic))
90ace9e9
JT
1422 && (r_type == R_VAX_8
1423 || r_type == R_VAX_16
fe723c87 1424 || r_type == R_VAX_32))))
560e09e9
NC
1425 /* In these cases, we don't need the relocation
1426 value. We check specially because in some
1427 obscure cases sec->output_section will be NULL. */
90ace9e9 1428 relocation = 0;
90ace9e9
JT
1429 }
1430
dbaa2011 1431 if (sec != NULL && discarded_section (sec))
e4067dbb 1432 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1433 rel, 1, relend, howto, 0, contents);
ab96bf03
AM
1434
1435 if (info->relocatable)
1436 continue;
1437
90ace9e9
JT
1438 switch (r_type)
1439 {
1440 case R_VAX_GOT32:
1441 /* Relocation is to the address of the entry for this symbol
1442 in the global offset table. */
7b6021f1
MR
1443 if (h == NULL
1444 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1445 || h->got.offset == (bfd_vma) -1
1446 || h->forced_local)
90ace9e9
JT
1447 break;
1448
1449 /* Relocation is the offset of the entry for this symbol in
1450 the global offset table. */
1451
1452 {
886815b2 1453 bfd_boolean dyn;
90ace9e9
JT
1454 bfd_vma off;
1455
90ace9e9
JT
1456 if (sgot == NULL)
1457 {
3d4d4302 1458 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
1459 BFD_ASSERT (sgot != NULL);
1460 }
1461
1462 BFD_ASSERT (h != NULL);
1463 off = h->got.offset;
1464 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1465 BFD_ASSERT (off < sgot->size);
90ace9e9 1466
886815b2
MR
1467 dyn = elf_hash_table (info)->dynamic_sections_created;
1468 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
1469 || (info->shared
1470 && SYMBOL_REFERENCES_LOCAL (info, h)))
90ace9e9
JT
1471 {
1472 /* The symbol was forced to be local
1473 because of a version file.. We must initialize
1474 this entry in the global offset table. Since
1475 the offset must always be a multiple of 4, we
1476 use the least significant bit to record whether
1477 we have initialized it already.
1478
1479 When doing a dynamic link, we create a .rela.got
1480 relocation entry to initialize the value. This
1481 is done in the finish_dynamic_symbol routine. */
1482 if ((off & 1) != 0)
1483 off &= ~1;
1484 else
1485 {
1486 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1487 sgot->contents + off);
1488 h->got.offset |= 1;
1489 }
1490 } else {
1491 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1492 }
1493
1494 relocation = sgot->output_offset + off;
b29635ba 1495 /* The GOT relocation uses the addend. */
90ace9e9
JT
1496 rel->r_addend = 0;
1497
b29635ba
JT
1498 /* Change the reference to be indirect. */
1499 contents[rel->r_offset - 1] |= 0x10;
1500 relocation += sgot->output_section->vma;
90ace9e9
JT
1501 }
1502 break;
1503
04981bc1
MR
1504 case R_VAX_PC32:
1505 /* If we are creating an executable and the function this
1506 reloc refers to is in a shared lib, then we made a PLT
1507 entry for this symbol and need to handle the reloc like
1508 a PLT reloc. */
1509 if (info->shared)
1510 goto r_vax_pc32_shared;
1511 /* Fall through. */
90ace9e9
JT
1512 case R_VAX_PLT32:
1513 /* Relocation is to the entry for this symbol in the
1514 procedure linkage table. */
1515
1516 /* Resolve a PLTxx reloc against a local symbol directly,
1517 without using the procedure linkage table. */
7b6021f1
MR
1518 if (h == NULL
1519 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1520 || h->forced_local)
90ace9e9
JT
1521 break;
1522
1523 if (h->plt.offset == (bfd_vma) -1
1524 || !elf_hash_table (info)->dynamic_sections_created)
1525 {
1526 /* We didn't make a PLT entry for this symbol. This
1527 happens when statically linking PIC code, or when
1528 using -Bsymbolic. */
1529 break;
1530 }
1531
1532 if (splt == NULL)
1533 {
3d4d4302 1534 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1535 BFD_ASSERT (splt != NULL);
1536 }
1537
1538 if (sgotplt == NULL)
1539 {
3d4d4302 1540 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
d76b263e 1541 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1542 }
1543
1544 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1545
1546 /* Get the offset into the .got table of the entry that
1547 corresponds to this function. Each .got entry is 4 bytes.
1548 The first two are reserved. */
1549 got_offset = (plt_index + 3) * 4;
1550
9e86195c 1551 /* We want the relocation to point into the .got.plt instead
cedb70c5 1552 of the plt itself. */
90ace9e9
JT
1553 relocation = (sgotplt->output_section->vma
1554 + sgotplt->output_offset
1555 + got_offset);
1556 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1557 if (rel->r_addend == 2)
1558 {
1559 h->plt.offset |= 1;
1560 }
1561 else if (rel->r_addend != 0)
1562 (*_bfd_error_handler)
1563 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1564 bfd_get_filename (input_bfd), rel->r_addend,
1565 h->root.root.string,
1566 bfd_get_section_name (input_bfd, input_section));
1567 rel->r_addend = 0;
1568
1569 break;
1570
1571 case R_VAX_PC8:
1572 case R_VAX_PC16:
04981bc1 1573 r_vax_pc32_shared:
7b6021f1
MR
1574 if (h == NULL
1575 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1576 || h->forced_local)
90ace9e9
JT
1577 break;
1578 /* Fall through. */
1579 case R_VAX_8:
1580 case R_VAX_16:
1581 case R_VAX_32:
1582 if (info->shared
cf35638d 1583 && r_symndx != STN_UNDEF
90ace9e9
JT
1584 && (input_section->flags & SEC_ALLOC) != 0
1585 && ((r_type != R_VAX_PC8
1586 && r_type != R_VAX_PC16
1587 && r_type != R_VAX_PC32)
da6bcfca
MT
1588 || ((input_section->flags & SEC_CODE)
1589 && (!info->symbolic
1590 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1591 {
1592 Elf_Internal_Rela outrel;
947216bf 1593 bfd_byte *loc;
b34976b6 1594 bfd_boolean skip, relocate;
90ace9e9
JT
1595
1596 /* When generating a shared object, these relocations
1597 are copied into the output file to be resolved at run
1598 time. */
90ace9e9
JT
1599 if (sreloc == NULL)
1600 {
83bac4b0
NC
1601 sreloc = _bfd_elf_get_dynamic_reloc_section
1602 (input_bfd, input_section, /*rela?*/ TRUE);
1603 if (sreloc == NULL)
b34976b6 1604 return FALSE;
90ace9e9
JT
1605 }
1606
b34976b6
AM
1607 skip = FALSE;
1608 relocate = FALSE;
90ace9e9
JT
1609
1610 outrel.r_offset =
1611 _bfd_elf_section_offset (output_bfd, info, input_section,
1612 rel->r_offset);
1613 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1614 skip = TRUE;
90ace9e9 1615 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1616 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1617 outrel.r_offset += (input_section->output_section->vma
1618 + input_section->output_offset);
1619
1620 if (skip)
1621 memset (&outrel, 0, sizeof outrel);
1622 /* h->dynindx may be -1 if the symbol was marked to
1623 become local. */
1624 else if (h != NULL
1625 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1626 || !h->def_regular))
90ace9e9
JT
1627 {
1628 BFD_ASSERT (h->dynindx != -1);
1629 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1630 outrel.r_addend = relocation + rel->r_addend;
1631 }
1632 else
1633 {
1634 if (r_type == R_VAX_32)
1635 {
b34976b6 1636 relocate = TRUE;
90ace9e9
JT
1637 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1638 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1639 &contents[rel->r_offset]) == 0);
1640 outrel.r_addend = relocation + rel->r_addend;
1641 }
1642 else
1643 {
1644 long indx;
1645
8517fae7 1646 if (bfd_is_abs_section (sec))
90ace9e9
JT
1647 indx = 0;
1648 else if (sec == NULL || sec->owner == NULL)
1649 {
1650 bfd_set_error (bfd_error_bad_value);
b34976b6 1651 return FALSE;
90ace9e9
JT
1652 }
1653 else
1654 {
1655 asection *osec;
1656
74541ad4
AM
1657 /* We are turning this relocation into one
1658 against a section symbol. It would be
1659 proper to subtract the symbol's value,
1660 osec->vma, from the emitted reloc addend,
1661 but ld.so expects buggy relocs. */
90ace9e9
JT
1662 osec = sec->output_section;
1663 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1664 if (indx == 0)
1665 {
1666 struct elf_link_hash_table *htab;
1667 htab = elf_hash_table (info);
1668 osec = htab->text_index_section;
1669 indx = elf_section_data (osec)->dynindx;
1670 }
1671 BFD_ASSERT (indx != 0);
90ace9e9
JT
1672 }
1673
1674 outrel.r_info = ELF32_R_INFO (indx, r_type);
1675 outrel.r_addend = relocation + rel->r_addend;
1676 }
1677 }
1678
ddd74d3c 1679 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1680 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1681 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1682 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1683 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1684 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1685 {
1686 if (h != NULL)
1687 (*_bfd_error_handler)
1688 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1689 bfd_get_filename (input_bfd), howto->name,
1690 h->root.root.string,
1691 bfd_get_section_name (input_bfd, input_section));
1692 else
1693 (*_bfd_error_handler)
1694 (_("%s: warning: %s relocation to 0x%x from %s section"),
1695 bfd_get_filename (input_bfd), howto->name,
1696 outrel.r_addend,
1697 bfd_get_section_name (input_bfd, input_section));
1698 }
947216bf
AM
1699 loc = sreloc->contents;
1700 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1701 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1702
1703 /* This reloc will be computed at runtime, so there's no
1704 need to do anything now, except for R_VAX_32
1705 relocations that have been turned into
1706 R_VAX_RELATIVE. */
1707 if (!relocate)
1708 continue;
1709 }
1710
1711 break;
1712
1713 case R_VAX_GNU_VTINHERIT:
1714 case R_VAX_GNU_VTENTRY:
1715 /* These are no-ops in the end. */
1716 continue;
1717
1718 default:
1719 break;
1720 }
1721
b34976b6 1722 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1723 So subtract the difference from the relocation amount since we can't
1724 add it to the offset. */
90ace9e9 1725 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1726 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1727
1728 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1729 contents, rel->r_offset,
1730 relocation, rel->r_addend);
1731
1732 if (r != bfd_reloc_ok)
1733 {
1734 switch (r)
1735 {
1736 default:
1737 case bfd_reloc_outofrange:
1738 abort ();
1739 case bfd_reloc_overflow:
1740 {
1741 const char *name;
1742
1743 if (h != NULL)
dfeffb9f 1744 name = NULL;
90ace9e9
JT
1745 else
1746 {
1747 name = bfd_elf_string_from_elf_section (input_bfd,
1748 symtab_hdr->sh_link,
1749 sym->st_name);
1750 if (name == NULL)
b34976b6 1751 return FALSE;
90ace9e9
JT
1752 if (*name == '\0')
1753 name = bfd_section_name (input_bfd, sec);
1754 }
1755 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1756 (info, (h ? &h->root : NULL), name, howto->name,
1757 (bfd_vma) 0, input_bfd, input_section,
1758 rel->r_offset)))
b34976b6 1759 return FALSE;
90ace9e9
JT
1760 }
1761 break;
1762 }
1763 }
1764 }
1765
b34976b6 1766 return TRUE;
90ace9e9
JT
1767}
1768
1769/* Finish up dynamic symbol handling. We set the contents of various
1770 dynamic sections here. */
1771
b34976b6 1772static bfd_boolean
ce71b576
NC
1773elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1774 struct elf_link_hash_entry *h,
1775 Elf_Internal_Sym *sym)
90ace9e9
JT
1776{
1777 bfd *dynobj;
1778
1779 dynobj = elf_hash_table (info)->dynobj;
1780
1781 if (h->plt.offset != (bfd_vma) -1)
1782 {
1783 asection *splt;
1784 asection *sgot;
1785 asection *srela;
1786 bfd_vma plt_index;
1787 bfd_vma got_offset;
1788 bfd_vma addend;
1789 Elf_Internal_Rela rela;
947216bf 1790 bfd_byte *loc;
90ace9e9
JT
1791
1792 /* This symbol has an entry in the procedure linkage table. Set
1793 it up. */
90ace9e9
JT
1794 BFD_ASSERT (h->dynindx != -1);
1795
3d4d4302
AM
1796 splt = bfd_get_linker_section (dynobj, ".plt");
1797 sgot = bfd_get_linker_section (dynobj, ".got.plt");
1798 srela = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9
JT
1799 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1800
1801 addend = 2 * (h->plt.offset & 1);
1802 h->plt.offset &= ~1;
1803
1804 /* Get the index in the procedure linkage table which
1805 corresponds to this symbol. This is the index of this symbol
1806 in all the symbols for which we are making plt entries. The
1807 first entry in the procedure linkage table is reserved. */
1808 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1809
1810 /* Get the offset into the .got table of the entry that
1811 corresponds to this function. Each .got entry is 4 bytes.
1812 The first two are reserved. */
1813 got_offset = (plt_index + 3) * 4;
1814
1815 /* Fill in the entry in the procedure linkage table. */
1816 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1817 PLT_ENTRY_SIZE);
1818
1819 /* The offset is relative to the first extension word. */
1820 bfd_put_32 (output_bfd,
1821 -(h->plt.offset + 8),
1822 splt->contents + h->plt.offset + 4);
1823
1824 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1825 splt->contents + h->plt.offset + 8);
1826
1827 /* Fill in the entry in the global offset table. */
1828 bfd_put_32 (output_bfd,
1829 (splt->output_section->vma
1830 + splt->output_offset
1831 + h->plt.offset) + addend,
1832 sgot->contents + got_offset);
1833
1834 /* Fill in the entry in the .rela.plt section. */
1835 rela.r_offset = (sgot->output_section->vma
1836 + sgot->output_offset
1837 + got_offset);
1838 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1839 rela.r_addend = addend;
947216bf
AM
1840 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1841 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1842
f5385ebf 1843 if (!h->def_regular)
90ace9e9
JT
1844 {
1845 /* Mark the symbol as undefined, rather than as defined in
1846 the .plt section. Leave the value alone. */
1847 sym->st_shndx = SHN_UNDEF;
1848 }
1849 }
1850
1851 if (h->got.offset != (bfd_vma) -1)
1852 {
1853 asection *sgot;
1854 asection *srela;
1855 Elf_Internal_Rela rela;
947216bf 1856 bfd_byte *loc;
90ace9e9
JT
1857
1858 /* This symbol has an entry in the global offset table. Set it
1859 up. */
3d4d4302
AM
1860 sgot = bfd_get_linker_section (dynobj, ".got");
1861 srela = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
1862 BFD_ASSERT (sgot != NULL && srela != NULL);
1863
1864 rela.r_offset = (sgot->output_section->vma
1865 + sgot->output_offset
1866 + (h->got.offset &~ 1));
1867
1868 /* If the symbol was forced to be local because of a version file
1869 locally we just want to emit a RELATIVE reloc. The entry in
1870 the global offset table will already have been initialized in
1871 the relocate_section function. */
1872 if (info->shared
1873 && h->dynindx == -1
f5385ebf 1874 && h->def_regular)
90ace9e9
JT
1875 {
1876 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1877 }
1878 else
1879 {
1880 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1881 }
1882 rela.r_addend = bfd_get_signed_32 (output_bfd,
1883 (sgot->contents
1884 + (h->got.offset & ~1)));
1885
947216bf
AM
1886 loc = srela->contents;
1887 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1888 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1889 }
1890
f5385ebf 1891 if (h->needs_copy)
90ace9e9
JT
1892 {
1893 asection *s;
1894 Elf_Internal_Rela rela;
947216bf 1895 bfd_byte *loc;
90ace9e9
JT
1896
1897 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1898 BFD_ASSERT (h->dynindx != -1
1899 && (h->root.type == bfd_link_hash_defined
1900 || h->root.type == bfd_link_hash_defweak));
1901
3d4d4302 1902 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1903 BFD_ASSERT (s != NULL);
1904
1905 rela.r_offset = (h->root.u.def.value
1906 + h->root.u.def.section->output_section->vma
1907 + h->root.u.def.section->output_offset);
1908 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1909 rela.r_addend = 0;
947216bf
AM
1910 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1911 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1912 }
1913
1914 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1915 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1916 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1917 sym->st_shndx = SHN_ABS;
1918
b34976b6 1919 return TRUE;
90ace9e9
JT
1920}
1921
1922/* Finish up the dynamic sections. */
1923
b34976b6 1924static bfd_boolean
ce71b576 1925elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1926{
1927 bfd *dynobj;
1928 asection *sgot;
1929 asection *sdyn;
1930
1931 dynobj = elf_hash_table (info)->dynobj;
1932
3d4d4302 1933 sgot = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1934 BFD_ASSERT (sgot != NULL);
3d4d4302 1935 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1936
1937 if (elf_hash_table (info)->dynamic_sections_created)
1938 {
1939 asection *splt;
1940 Elf32_External_Dyn *dyncon, *dynconend;
1941
3d4d4302 1942 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1943 BFD_ASSERT (splt != NULL && sdyn != NULL);
1944
1945 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1946 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1947 for (; dyncon < dynconend; dyncon++)
1948 {
1949 Elf_Internal_Dyn dyn;
1950 const char *name;
1951 asection *s;
1952
1953 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1954
1955 switch (dyn.d_tag)
1956 {
1957 default:
1958 break;
1959
1960 case DT_PLTGOT:
1961 name = ".got";
1962 goto get_vma;
1963 case DT_JMPREL:
1964 name = ".rela.plt";
1965 get_vma:
1966 s = bfd_get_section_by_name (output_bfd, name);
1967 BFD_ASSERT (s != NULL);
1968 dyn.d_un.d_ptr = s->vma;
1969 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1970 break;
1971
1972 case DT_PLTRELSZ:
1973 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1974 BFD_ASSERT (s != NULL);
eea6121a 1975 dyn.d_un.d_val = s->size;
90ace9e9
JT
1976 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1977 break;
1978
1979 case DT_RELASZ:
1980 /* The procedure linkage table relocs (DT_JMPREL) should
1981 not be included in the overall relocs (DT_RELA).
1982 Therefore, we override the DT_RELASZ entry here to
1983 make it not include the JMPREL relocs. Since the
1984 linker script arranges for .rela.plt to follow all
1985 other relocation sections, we don't have to worry
1986 about changing the DT_RELA entry. */
1987 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1988 if (s != NULL)
eea6121a 1989 dyn.d_un.d_val -= s->size;
90ace9e9
JT
1990 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1991 break;
1992 }
1993 }
1994
1995 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1996 if (splt->size > 0)
90ace9e9
JT
1997 {
1998 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1999 bfd_put_32 (output_bfd,
2000 (sgot->output_section->vma
2001 + sgot->output_offset + 4
2002 - (splt->output_section->vma + 6)),
2003 splt->contents + 2);
2004 bfd_put_32 (output_bfd,
2005 (sgot->output_section->vma
2006 + sgot->output_offset + 8
2007 - (splt->output_section->vma + 12)),
2008 splt->contents + 8);
cedb70c5 2009 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2010 = PLT_ENTRY_SIZE;
2011 }
2012 }
2013
2014 /* Fill in the first three entries in the global offset table. */
eea6121a 2015 if (sgot->size > 0)
90ace9e9
JT
2016 {
2017 if (sdyn == NULL)
2018 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2019 else
2020 bfd_put_32 (output_bfd,
2021 sdyn->output_section->vma + sdyn->output_offset,
2022 sgot->contents);
2023 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2024 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2025 }
2026
2027 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2028
b34976b6 2029 return TRUE;
90ace9e9
JT
2030}
2031
9b90d8fd 2032static enum elf_reloc_type_class
7e612e98
AM
2033elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2034 const asection *rel_sec ATTRIBUTE_UNUSED,
2035 const Elf_Internal_Rela *rela)
9b90d8fd
MR
2036{
2037 switch ((int) ELF32_R_TYPE (rela->r_info))
2038 {
2039 case R_VAX_RELATIVE:
2040 return reloc_class_relative;
2041 case R_VAX_JMP_SLOT:
2042 return reloc_class_plt;
2043 case R_VAX_COPY:
2044 return reloc_class_copy;
2045 default:
2046 return reloc_class_normal;
2047 }
2048}
2049
6db7e006
MR
2050static bfd_vma
2051elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
2052 const arelent *rel ATTRIBUTE_UNUSED)
2053{
2054 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
2055}
2056
90ace9e9
JT
2057#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2058#define TARGET_LITTLE_NAME "elf32-vax"
2059#define ELF_MACHINE_CODE EM_VAX
2060#define ELF_MAXPAGESIZE 0x1000
2061
2062#define elf_backend_create_dynamic_sections \
2063 _bfd_elf_create_dynamic_sections
2064#define bfd_elf32_bfd_link_hash_table_create \
2065 elf_vax_link_hash_table_create
c152c796 2066#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2067
2068#define elf_backend_check_relocs elf_vax_check_relocs
2069#define elf_backend_adjust_dynamic_symbol \
2070 elf_vax_adjust_dynamic_symbol
2071#define elf_backend_size_dynamic_sections \
2072 elf_vax_size_dynamic_sections
74541ad4 2073#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2074#define elf_backend_relocate_section elf_vax_relocate_section
2075#define elf_backend_finish_dynamic_symbol \
2076 elf_vax_finish_dynamic_symbol
2077#define elf_backend_finish_dynamic_sections \
2078 elf_vax_finish_dynamic_sections
9b90d8fd 2079#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9
JT
2080#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2081#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
6db7e006 2082#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9
JT
2083#define bfd_elf32_bfd_merge_private_bfd_data \
2084 elf32_vax_merge_private_bfd_data
2085#define bfd_elf32_bfd_set_private_flags \
2086 elf32_vax_set_private_flags
2087#define bfd_elf32_bfd_print_private_bfd_data \
2088 elf32_vax_print_private_bfd_data
2089
2090#define elf_backend_can_gc_sections 1
2091#define elf_backend_want_got_plt 1
2092#define elf_backend_plt_readonly 1
2093#define elf_backend_want_plt_sym 0
2094#define elf_backend_got_header_size 16
f0fe0e16 2095#define elf_backend_rela_normal 1
90ace9e9
JT
2096
2097#include "elf32-target.h"
This page took 0.661827 seconds and 4 git commands to generate.