]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-vax.c
Remove spurious whitespace introduced by previous delta.
[thirdparty/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
6f2750fe 2 Copyright (C) 1993-2016 Free Software Foundation, Inc.
90ace9e9
JT
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
90ace9e9 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
90ace9e9 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
90ace9e9 21
90ace9e9 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
90ace9e9
JT
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576
NC
29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
ce71b576
NC
37static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
6db7e006
MR
49static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
ce71b576
NC
51
52static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
2c3fc389 53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
6346d5ca 58 3, /* size (0 = byte, 1 = short, 2 = long) */
90ace9e9 59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
64d29018 282rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
90ace9e9 283{
cd21f5da
NC
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
4eca0228
AM
289 _bfd_error_handler (_("%B: unrecognised VAX reloc number: %d"),
290 abfd, r_type);
cd21f5da
NC
291 bfd_set_error (bfd_error_bad_value);
292 r_type = R_VAX_NONE;
293 }
294 cache_ptr->howto = &howto_table[r_type];
90ace9e9
JT
295}
296
297#define elf_info_to_howto rtype_to_howto
298
299static const struct
300{
301 bfd_reloc_code_real_type bfd_val;
302 int elf_val;
303} reloc_map[] = {
304 { BFD_RELOC_NONE, R_VAX_NONE },
305 { BFD_RELOC_32, R_VAX_32 },
306 { BFD_RELOC_16, R_VAX_16 },
307 { BFD_RELOC_8, R_VAX_8 },
308 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
309 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
310 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
311 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
312 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
313 { BFD_RELOC_NONE, R_VAX_COPY },
314 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
315 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
316 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
317 { BFD_RELOC_CTOR, R_VAX_32 },
318 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
319 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
320};
321
322static reloc_howto_type *
ce71b576 323reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
324{
325 unsigned int i;
326 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
327 {
328 if (reloc_map[i].bfd_val == code)
329 return &howto_table[reloc_map[i].elf_val];
330 }
331 return 0;
332}
333
157090f7
AM
334static reloc_howto_type *
335reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
336 const char *r_name)
337{
338 unsigned int i;
339
340 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
341 if (howto_table[i].name != NULL
342 && strcasecmp (howto_table[i].name, r_name) == 0)
343 return &howto_table[i];
344
345 return NULL;
346}
347
90ace9e9 348#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 349#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
350#define ELF_ARCH bfd_arch_vax
351/* end code generated by elf.el */
90ace9e9
JT
352\f
353/* Functions for the VAX ELF linker. */
354
355/* The name of the dynamic interpreter. This is put in the .interp
356 section. */
357
358#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
359
360/* The size in bytes of an entry in the procedure linkage table. */
361
362#define PLT_ENTRY_SIZE 12
363
364/* The first entry in a procedure linkage table looks like this. See
365 the SVR4 ABI VAX supplement to see how this works. */
366
367static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
368{
369 0xdd, 0xef, /* pushl l^ */
370 0, 0, 0, 0, /* offset to .plt.got + 4 */
371 0x17, 0xff, /* jmp @L^(pc) */
372 0, 0, 0, 0, /* offset to .plt.got + 8 */
373};
374
375/* Subsequent entries in a procedure linkage table look like this. */
376
377static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
378{
6c4fb25a 379 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 380 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
381 0, 0, 0, 0, /* replaced with offset to start of .plt */
382 0, 0, 0, 0, /* index into .rela.plt */
383};
384
385/* The VAX linker needs to keep track of the number of relocs that it
386 decides to copy in check_relocs for each symbol. This is so that it
387 can discard PC relative relocs if it doesn't need them when linking
388 with -Bsymbolic. We store the information in a field extending the
389 regular ELF linker hash table. */
390
391/* This structure keeps track of the number of PC relative relocs we have
392 copied for a given symbol. */
393
394struct elf_vax_pcrel_relocs_copied
395{
396 /* Next section. */
397 struct elf_vax_pcrel_relocs_copied *next;
398 /* A section in dynobj. */
399 asection *section;
400 /* Number of relocs copied in this section. */
401 bfd_size_type count;
402};
403
404/* VAX ELF linker hash entry. */
405
406struct elf_vax_link_hash_entry
407{
408 struct elf_link_hash_entry root;
409
410 /* Number of PC relative relocs copied for this symbol. */
411 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
412
413 bfd_vma got_addend;
414};
415
90ace9e9
JT
416/* Declare this now that the above structures are defined. */
417
ce71b576 418static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 419 void *);
90ace9e9 420
b29635ba
JT
421/* Declare this now that the above structures are defined. */
422
ce71b576 423static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 424 void *);
b29635ba 425
90ace9e9
JT
426/* Traverse an VAX ELF linker hash table. */
427
428#define elf_vax_link_hash_traverse(table, func, info) \
429 (elf_link_hash_traverse \
4dfe6ac6 430 ((table), \
2c3fc389 431 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
432 (info)))
433
90ace9e9
JT
434/* Create an entry in an VAX ELF linker hash table. */
435
436static struct bfd_hash_entry *
ce71b576
NC
437elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
438 struct bfd_hash_table *table,
439 const char *string)
90ace9e9
JT
440{
441 struct elf_vax_link_hash_entry *ret =
442 (struct elf_vax_link_hash_entry *) entry;
443
444 /* Allocate the structure if it has not already been allocated by a
445 subclass. */
ce71b576 446 if (ret == NULL)
90ace9e9
JT
447 ret = ((struct elf_vax_link_hash_entry *)
448 bfd_hash_allocate (table,
449 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 450 if (ret == NULL)
90ace9e9
JT
451 return (struct bfd_hash_entry *) ret;
452
453 /* Call the allocation method of the superclass. */
454 ret = ((struct elf_vax_link_hash_entry *)
455 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
456 table, string));
ce71b576 457 if (ret != NULL)
90ace9e9
JT
458 {
459 ret->pcrel_relocs_copied = NULL;
460 }
461
462 return (struct bfd_hash_entry *) ret;
463}
464
465/* Create an VAX ELF linker hash table. */
466
467static struct bfd_link_hash_table *
ce71b576 468elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 469{
4dfe6ac6
NC
470 struct elf_link_hash_table *ret;
471 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 472
7bf52ea2 473 ret = bfd_zmalloc (amt);
ce71b576 474 if (ret == NULL)
90ace9e9
JT
475 return NULL;
476
4dfe6ac6 477 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 478 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
479 sizeof (struct elf_vax_link_hash_entry),
480 GENERIC_ELF_DATA))
90ace9e9
JT
481 {
482 free (ret);
483 return NULL;
484 }
485
4dfe6ac6 486 return &ret->root;
90ace9e9
JT
487}
488
489/* Keep vax-specific flags in the ELF header */
b34976b6 490static bfd_boolean
ce71b576 491elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
492{
493 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
494 elf_flags_init (abfd) = TRUE;
495 return TRUE;
90ace9e9
JT
496}
497
498/* Merge backend specific data from an object file to the output
499 object file when linking. */
b34976b6 500static bfd_boolean
50e03d47 501elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
90ace9e9 502{
50e03d47 503 bfd *obfd = info->output_bfd;
90ace9e9
JT
504 flagword in_flags;
505
506 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
507 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 508 return TRUE;
90ace9e9
JT
509
510 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
511
512 if (!elf_flags_init (obfd))
513 {
b34976b6 514 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
515 elf_elfheader (obfd)->e_flags = in_flags;
516 }
517
b34976b6 518 return TRUE;
90ace9e9
JT
519}
520
521/* Display the flags field */
b34976b6 522static bfd_boolean
2c3fc389 523elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
524{
525 FILE *file = (FILE *) ptr;
526
527 BFD_ASSERT (abfd != NULL && ptr != NULL);
528
529 /* Print normal ELF private data. */
530 _bfd_elf_print_private_bfd_data (abfd, ptr);
531
532 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
533
534 /* xgettext:c-format */
535 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
536
179d3252 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
538 fprintf (file, _(" [nonpic]"));
539
179d3252 540 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
541 fprintf (file, _(" [d-float]"));
542
179d3252 543 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
544 fprintf (file, _(" [g-float]"));
545
546 fputc ('\n', file);
547
b34976b6 548 return TRUE;
90ace9e9
JT
549}
550/* Look through the relocs for a section during the first phase, and
551 allocate space in the global offset table or procedure linkage
552 table. */
553
b34976b6 554static bfd_boolean
ce71b576
NC
555elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
556 const Elf_Internal_Rela *relocs)
90ace9e9
JT
557{
558 bfd *dynobj;
559 Elf_Internal_Shdr *symtab_hdr;
560 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
561 const Elf_Internal_Rela *rel;
562 const Elf_Internal_Rela *rel_end;
563 asection *sgot;
564 asection *srelgot;
565 asection *sreloc;
566
0e1862bb 567 if (bfd_link_relocatable (info))
b34976b6 568 return TRUE;
90ace9e9
JT
569
570 dynobj = elf_hash_table (info)->dynobj;
571 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
572 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
573
574 sgot = NULL;
575 srelgot = NULL;
576 sreloc = NULL;
577
578 rel_end = relocs + sec->reloc_count;
579 for (rel = relocs; rel < rel_end; rel++)
580 {
581 unsigned long r_symndx;
582 struct elf_link_hash_entry *h;
583
584 r_symndx = ELF32_R_SYM (rel->r_info);
585
586 if (r_symndx < symtab_hdr->sh_info)
587 h = NULL;
588 else
973a3492
L
589 {
590 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
591 while (h->root.type == bfd_link_hash_indirect
592 || h->root.type == bfd_link_hash_warning)
593 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
594
595 /* PR15323, ref flags aren't set for references in the same
596 object. */
597 h->root.non_ir_ref = 1;
973a3492 598 }
90ace9e9
JT
599
600 switch (ELF32_R_TYPE (rel->r_info))
601 {
602 case R_VAX_GOT32:
fe723c87 603 BFD_ASSERT (h != NULL);
90ace9e9 604
7b6021f1
MR
605 /* If this is a local symbol, we resolve it directly without
606 creating a global offset table entry. */
125b5bac
MR
607 if (h->forced_local
608 || h == elf_hash_table (info)->hgot
609 || h == elf_hash_table (info)->hplt)
7b6021f1
MR
610 break;
611
90ace9e9
JT
612 /* This symbol requires a global offset table entry. */
613
614 if (dynobj == NULL)
615 {
616 /* Create the .got section. */
617 elf_hash_table (info)->dynobj = dynobj = abfd;
618 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 619 return FALSE;
90ace9e9
JT
620 }
621
622 if (sgot == NULL)
623 {
3d4d4302 624 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
625 BFD_ASSERT (sgot != NULL);
626 }
627
628 if (srelgot == NULL
0e1862bb 629 && (h != NULL || bfd_link_pic (info)))
90ace9e9 630 {
3d4d4302 631 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
632 if (srelgot == NULL)
633 {
3d4d4302
AM
634 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
635 | SEC_IN_MEMORY | SEC_LINKER_CREATED
636 | SEC_READONLY);
637
638 srelgot = bfd_make_section_anyway_with_flags (dynobj,
639 ".rela.got",
640 flags);
90ace9e9 641 if (srelgot == NULL
90ace9e9 642 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 643 return FALSE;
90ace9e9
JT
644 }
645 }
646
647 if (h != NULL)
648 {
649 struct elf_vax_link_hash_entry *eh;
650
651 eh = (struct elf_vax_link_hash_entry *) h;
652 if (h->got.refcount == -1)
653 {
654 h->got.refcount = 1;
655 eh->got_addend = rel->r_addend;
90ace9e9
JT
656 }
657 else
658 {
659 h->got.refcount++;
660 if (eh->got_addend != (bfd_vma) rel->r_addend)
4eca0228 661 _bfd_error_handler
fe723c87
MT
662 (_("%s: warning: GOT addend of %ld to `%s' does"
663 " not match previous GOT addend of %ld"),
664 bfd_get_filename (abfd), rel->r_addend,
665 h->root.root.string,
666 eh->got_addend);
cedb70c5 667
90ace9e9
JT
668 }
669 }
670 break;
671
672 case R_VAX_PLT32:
673 /* This symbol requires a procedure linkage table entry. We
674 actually build the entry in adjust_dynamic_symbol,
675 because this might be a case of linking PIC code which is
676 never referenced by a dynamic object, in which case we
677 don't need to generate a procedure linkage table entry
678 after all. */
125b5bac 679 BFD_ASSERT (h != NULL);
90ace9e9
JT
680
681 /* If this is a local symbol, we resolve it directly without
682 creating a procedure linkage table entry. */
125b5bac 683 if (h->forced_local)
fe723c87 684 break;
90ace9e9 685
f5385ebf 686 h->needs_plt = 1;
90ace9e9
JT
687 if (h->plt.refcount == -1)
688 h->plt.refcount = 1;
689 else
690 h->plt.refcount++;
691 break;
692
693 case R_VAX_PC8:
694 case R_VAX_PC16:
695 case R_VAX_PC32:
696 /* If we are creating a shared library and this is not a local
697 symbol, we need to copy the reloc into the shared library.
698 However when linking with -Bsymbolic and this is a global
699 symbol which is defined in an object we are including in the
700 link (i.e., DEF_REGULAR is set), then we can resolve the
701 reloc directly. At this point we have not seen all the input
702 files, so it is possible that DEF_REGULAR is not set now but
703 will be set later (it is never cleared). We account for that
704 possibility below by storing information in the
705 pcrel_relocs_copied field of the hash table entry. */
0e1862bb 706 if (!(bfd_link_pic (info)
90ace9e9
JT
707 && (sec->flags & SEC_ALLOC) != 0
708 && h != NULL
709 && (!info->symbolic
f5385ebf 710 || !h->def_regular)))
90ace9e9 711 {
7b6021f1
MR
712 if (h != NULL
713 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
714 && !h->forced_local)
90ace9e9
JT
715 {
716 /* Make sure a plt entry is created for this symbol if
717 it turns out to be a function defined by a dynamic
718 object. */
719 if (h->plt.refcount == -1)
720 h->plt.refcount = 1;
721 else
722 h->plt.refcount++;
723 }
724 break;
725 }
7b6021f1
MR
726 /* If this is a local symbol, we can resolve it directly. */
727 if (h != NULL
728 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
729 || h->forced_local))
fe723c87
MT
730 break;
731
90ace9e9
JT
732 /* Fall through. */
733 case R_VAX_8:
734 case R_VAX_16:
735 case R_VAX_32:
7b6021f1 736 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
737 {
738 /* Make sure a plt entry is created for this symbol if it
739 turns out to be a function defined by a dynamic object. */
740 if (h->plt.refcount == -1)
741 h->plt.refcount = 1;
742 else
743 h->plt.refcount++;
744 }
745
746 /* If we are creating a shared library, we need to copy the
747 reloc into the shared library. */
0e1862bb 748 if (bfd_link_pic (info)
90ace9e9
JT
749 && (sec->flags & SEC_ALLOC) != 0)
750 {
751 /* When creating a shared object, we must copy these
752 reloc types into the output file. We create a reloc
753 section in dynobj and make room for this reloc. */
754 if (sreloc == NULL)
755 {
83bac4b0
NC
756 sreloc = _bfd_elf_make_dynamic_reloc_section
757 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 758
83bac4b0 759 if (sreloc == NULL)
b34976b6 760 return FALSE;
90ace9e9 761
90ace9e9
JT
762 if (sec->flags & SEC_READONLY)
763 info->flags |= DF_TEXTREL;
764 }
765
eea6121a 766 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
767
768 /* If we are linking with -Bsymbolic, we count the number of
769 PC relative relocations we have entered for this symbol,
770 so that we can discard them again if the symbol is later
771 defined by a regular object. Note that this function is
19852a2a 772 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
773 which means that h is really a pointer to an
774 elf_vax_link_hash_entry. */
775 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
776 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
777 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
778 && info->symbolic)
779 {
780 struct elf_vax_link_hash_entry *eh;
781 struct elf_vax_pcrel_relocs_copied *p;
782
783 eh = (struct elf_vax_link_hash_entry *) h;
784
785 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
786 if (p->section == sreloc)
787 break;
788
789 if (p == NULL)
790 {
791 p = ((struct elf_vax_pcrel_relocs_copied *)
792 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
793 if (p == NULL)
b34976b6 794 return FALSE;
90ace9e9
JT
795 p->next = eh->pcrel_relocs_copied;
796 eh->pcrel_relocs_copied = p;
797 p->section = sreloc;
798 p->count = 0;
799 }
800
801 ++p->count;
802 }
803 }
804
805 break;
806
807 /* This relocation describes the C++ object vtable hierarchy.
808 Reconstruct it for later use during GC. */
809 case R_VAX_GNU_VTINHERIT:
c152c796 810 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 811 return FALSE;
90ace9e9
JT
812 break;
813
814 /* This relocation describes which C++ vtable entries are actually
815 used. Record for later use during GC. */
816 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
817 BFD_ASSERT (h != NULL);
818 if (h != NULL
819 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 820 return FALSE;
90ace9e9
JT
821 break;
822
823 default:
824 break;
825 }
826 }
827
b34976b6 828 return TRUE;
90ace9e9
JT
829}
830
831/* Return the section that should be marked against GC for a given
832 relocation. */
833
834static asection *
ce71b576 835elf_vax_gc_mark_hook (asection *sec,
07adf181 836 struct bfd_link_info *info,
ce71b576
NC
837 Elf_Internal_Rela *rel,
838 struct elf_link_hash_entry *h,
839 Elf_Internal_Sym *sym)
90ace9e9
JT
840{
841 if (h != NULL)
07adf181
AM
842 switch (ELF32_R_TYPE (rel->r_info))
843 {
844 case R_VAX_GNU_VTINHERIT:
845 case R_VAX_GNU_VTENTRY:
846 return NULL;
847 }
848
849 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
850}
851
852/* Update the got entry reference counts for the section being removed. */
853
b34976b6 854static bfd_boolean
ce71b576
NC
855elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
856 const Elf_Internal_Rela *relocs)
90ace9e9
JT
857{
858 Elf_Internal_Shdr *symtab_hdr;
859 struct elf_link_hash_entry **sym_hashes;
90ace9e9 860 const Elf_Internal_Rela *rel, *relend;
90ace9e9 861 bfd *dynobj;
90ace9e9 862
0e1862bb 863 if (bfd_link_relocatable (info))
7dda2462
TG
864 return TRUE;
865
90ace9e9
JT
866 dynobj = elf_hash_table (info)->dynobj;
867 if (dynobj == NULL)
b34976b6 868 return TRUE;
90ace9e9 869
babfd660
KH
870 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
871 sym_hashes = elf_sym_hashes (abfd);
872
90ace9e9
JT
873 relend = relocs + sec->reloc_count;
874 for (rel = relocs; rel < relend; rel++)
875 {
babfd660 876 unsigned long r_symndx;
3eb128b2
AM
877 struct elf_link_hash_entry *h = NULL;
878
879 r_symndx = ELF32_R_SYM (rel->r_info);
880 if (r_symndx >= symtab_hdr->sh_info)
881 {
882 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
883 while (h->root.type == bfd_link_hash_indirect
884 || h->root.type == bfd_link_hash_warning)
885 h = (struct elf_link_hash_entry *) h->root.u.i.link;
886 }
babfd660 887
90ace9e9
JT
888 switch (ELF32_R_TYPE (rel->r_info))
889 {
890 case R_VAX_GOT32:
3eb128b2
AM
891 if (h != NULL && h->got.refcount > 0)
892 --h->got.refcount;
90ace9e9
JT
893 break;
894
895 case R_VAX_PLT32:
896 case R_VAX_PC8:
897 case R_VAX_PC16:
898 case R_VAX_PC32:
899 case R_VAX_8:
900 case R_VAX_16:
901 case R_VAX_32:
3eb128b2
AM
902 if (h != NULL && h->plt.refcount > 0)
903 --h->plt.refcount;
90ace9e9
JT
904 break;
905
906 default:
907 break;
908 }
909 }
910
b34976b6 911 return TRUE;
90ace9e9
JT
912}
913
914/* Adjust a symbol defined by a dynamic object and referenced by a
915 regular object. The current definition is in some section of the
916 dynamic object, but we're not including those sections. We have to
917 change the definition to something the rest of the link can
918 understand. */
919
b34976b6 920static bfd_boolean
a0f0eb1e
MR
921elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
922 struct elf_link_hash_entry *h)
90ace9e9
JT
923{
924 bfd *dynobj;
925 asection *s;
90ace9e9
JT
926
927 dynobj = elf_hash_table (info)->dynobj;
928
929 /* Make sure we know what is going on here. */
930 BFD_ASSERT (dynobj != NULL
f5385ebf 931 && (h->needs_plt
f6e332e6 932 || h->u.weakdef != NULL
f5385ebf
AM
933 || (h->def_dynamic
934 && h->ref_regular
935 && !h->def_regular)));
90ace9e9
JT
936
937 /* If this is a function, put it in the procedure linkage table. We
938 will fill in the contents of the procedure linkage table later,
939 when we know the address of the .got section. */
940 if (h->type == STT_FUNC
f5385ebf 941 || h->needs_plt)
90ace9e9 942 {
a22a8039
MR
943 if (h->plt.refcount <= 0
944 || SYMBOL_CALLS_LOCAL (info, h)
945 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
946 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
947 {
948 /* This case can occur if we saw a PLTxx reloc in an input
949 file, but the symbol was never referred to by a dynamic
a22a8039
MR
950 object, or if all references were garbage collected. In
951 such a case, we don't actually need to build a procedure
952 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 953 h->plt.offset = (bfd_vma) -1;
f5385ebf 954 h->needs_plt = 0;
b34976b6 955 return TRUE;
90ace9e9
JT
956 }
957
3d4d4302 958 s = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
959 BFD_ASSERT (s != NULL);
960
961 /* If this is the first .plt entry, make room for the special
962 first entry. */
eea6121a 963 if (s->size == 0)
90ace9e9 964 {
eea6121a 965 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
966 }
967
968 /* If this symbol is not defined in a regular file, and we are
969 not generating a shared library, then set the symbol to this
970 location in the .plt. This is required to make function
971 pointers compare as equal between the normal executable and
972 the shared library. */
0e1862bb 973 if (!bfd_link_pic (info)
f5385ebf 974 && !h->def_regular)
90ace9e9
JT
975 {
976 h->root.u.def.section = s;
eea6121a 977 h->root.u.def.value = s->size;
90ace9e9
JT
978 }
979
eea6121a 980 h->plt.offset = s->size;
90ace9e9
JT
981
982 /* Make room for this entry. */
eea6121a 983 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
984
985 /* We also need to make an entry in the .got.plt section, which
986 will be placed in the .got section by the linker script. */
987
3d4d4302 988 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 989 BFD_ASSERT (s != NULL);
eea6121a 990 s->size += 4;
90ace9e9
JT
991
992 /* We also need to make an entry in the .rela.plt section. */
993
3d4d4302 994 s = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9 995 BFD_ASSERT (s != NULL);
eea6121a 996 s->size += sizeof (Elf32_External_Rela);
90ace9e9 997
b34976b6 998 return TRUE;
90ace9e9
JT
999 }
1000
1001 /* Reinitialize the plt offset now that it is not used as a reference
1002 count any more. */
1003 h->plt.offset = (bfd_vma) -1;
1004
1005 /* If this is a weak symbol, and there is a real definition, the
1006 processor independent code will have arranged for us to see the
1007 real definition first, and we can just use the same value. */
f6e332e6 1008 if (h->u.weakdef != NULL)
90ace9e9 1009 {
f6e332e6
AM
1010 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1011 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1012 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1013 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1014 return TRUE;
90ace9e9
JT
1015 }
1016
1017 /* This is a reference to a symbol defined by a dynamic object which
1018 is not a function. */
1019
1020 /* If we are creating a shared library, we must presume that the
1021 only references to the symbol are via the global offset table.
1022 For such cases we need not do anything here; the relocations will
1023 be handled correctly by relocate_section. */
0e1862bb 1024 if (bfd_link_pic (info))
b34976b6 1025 return TRUE;
90ace9e9
JT
1026
1027 /* We must allocate the symbol in our .dynbss section, which will
1028 become part of the .bss section of the executable. There will be
1029 an entry for this symbol in the .dynsym section. The dynamic
1030 object will contain position independent code, so all references
1031 from the dynamic object to this symbol will go through the global
1032 offset table. The dynamic linker will use the .dynsym entry to
1033 determine the address it must put in the global offset table, so
1034 both the dynamic object and the regular object will refer to the
1035 same memory location for the variable. */
1036
3d4d4302 1037 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
1038 BFD_ASSERT (s != NULL);
1039
1040 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1041 copy the initial value out of the dynamic object and into the
1042 runtime process image. We need to remember the offset into the
1043 .rela.bss section we are going to use. */
1d7e9d18 1044 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
1045 {
1046 asection *srel;
1047
3d4d4302 1048 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 1049 BFD_ASSERT (srel != NULL);
eea6121a 1050 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1051 h->needs_copy = 1;
90ace9e9
JT
1052 }
1053
6cabe1ea 1054 return _bfd_elf_adjust_dynamic_copy (info, h, s);
90ace9e9
JT
1055}
1056
fac3d241
MR
1057/* This function is called via elf_link_hash_traverse. It resets GOT
1058 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
1059 will be done. */
1060
1061static bfd_boolean
1062elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
1063 void *infoptr ATTRIBUTE_UNUSED)
1064{
1065 h->got.refcount = -1;
1066 h->plt.refcount = -1;
1067
1068 return TRUE;
1069}
1070
1071/* Discard unused dynamic data if this is a static link. */
1072
1073static bfd_boolean
1074elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1075 struct bfd_link_info *info)
1076{
1077 bfd *dynobj;
1078 asection *s;
1079
1080 dynobj = elf_hash_table (info)->dynobj;
1081
1082 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
1083 {
1084 /* We may have created entries in the .rela.got and .got sections.
1085 However, if we are not creating the dynamic sections, we will
1086 not actually use these entries. Reset the size of .rela.got
49d01bf6 1087 and .got, which will cause them to get stripped from the output
fac3d241
MR
1088 file below. */
1089 s = bfd_get_linker_section (dynobj, ".rela.got");
1090 if (s != NULL)
1091 s->size = 0;
1092 s = bfd_get_linker_section (dynobj, ".got.plt");
1093 if (s != NULL)
1094 s->size = 0;
1095 s = bfd_get_linker_section (dynobj, ".got");
1096 if (s != NULL)
1097 s->size = 0;
1098 }
1099
1100 /* If this is a static link, we need to discard all the got entries we've
1101 recorded. */
1102 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1103 elf_link_hash_traverse (elf_hash_table (info),
1104 elf_vax_discard_got_entries,
1105 info);
1106
1107 return TRUE;
1108}
1109
90ace9e9
JT
1110/* Set the sizes of the dynamic sections. */
1111
b34976b6 1112static bfd_boolean
ce71b576 1113elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1114{
1115 bfd *dynobj;
1116 asection *s;
b34976b6
AM
1117 bfd_boolean plt;
1118 bfd_boolean relocs;
1119 bfd_boolean reltext;
90ace9e9
JT
1120
1121 dynobj = elf_hash_table (info)->dynobj;
1122 BFD_ASSERT (dynobj != NULL);
1123
1124 if (elf_hash_table (info)->dynamic_sections_created)
1125 {
1126 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 1127 if (bfd_link_executable (info) && !info->nointerp)
90ace9e9 1128 {
3d4d4302 1129 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1130 BFD_ASSERT (s != NULL);
eea6121a 1131 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1132 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1133 }
1134 }
90ace9e9
JT
1135
1136 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1137 relative relocs against symbols defined in a regular object. We
1138 allocated space for them in the check_relocs routine, but we will not
1139 fill them in in the relocate_section routine. */
0e1862bb 1140 if (bfd_link_pic (info) && info->symbolic)
4dfe6ac6 1141 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1142 elf_vax_discard_copies,
ce71b576 1143 NULL);
b29635ba 1144
fac3d241
MR
1145 /* If this is a -Bsymbolic shared link, we need to discard all the got
1146 entries we've recorded. Otherwise, we need to instantiate (allocate
1147 space for them). */
b29635ba
JT
1148 elf_link_hash_traverse (elf_hash_table (info),
1149 elf_vax_instantiate_got_entries,
2c3fc389 1150 info);
90ace9e9
JT
1151
1152 /* The check_relocs and adjust_dynamic_symbol entry points have
1153 determined the sizes of the various dynamic sections. Allocate
1154 memory for them. */
b34976b6
AM
1155 plt = FALSE;
1156 relocs = FALSE;
1157 reltext = FALSE;
90ace9e9
JT
1158 for (s = dynobj->sections; s != NULL; s = s->next)
1159 {
1160 const char *name;
90ace9e9
JT
1161
1162 if ((s->flags & SEC_LINKER_CREATED) == 0)
1163 continue;
1164
1165 /* It's OK to base decisions on the section name, because none
1166 of the dynobj section names depend upon the input files. */
1167 name = bfd_get_section_name (dynobj, s);
1168
90ace9e9
JT
1169 if (strcmp (name, ".plt") == 0)
1170 {
c456f082
AM
1171 /* Remember whether there is a PLT. */
1172 plt = s->size != 0;
90ace9e9 1173 }
0112cd26 1174 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1175 {
c456f082 1176 if (s->size != 0)
90ace9e9
JT
1177 {
1178 asection *target;
1179
1180 /* Remember whether there are any reloc sections other
1181 than .rela.plt. */
1182 if (strcmp (name, ".rela.plt") != 0)
1183 {
1184 const char *outname;
1185
b34976b6 1186 relocs = TRUE;
90ace9e9
JT
1187
1188 /* If this relocation section applies to a read only
1189 section, then we probably need a DT_TEXTREL
1190 entry. .rela.plt is actually associated with
1191 .got.plt, which is never readonly. */
1192 outname = bfd_get_section_name (output_bfd,
1193 s->output_section);
1194 target = bfd_get_section_by_name (output_bfd, outname + 5);
1195 if (target != NULL
1196 && (target->flags & SEC_READONLY) != 0
1197 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1198 reltext = TRUE;
90ace9e9
JT
1199 }
1200
1201 /* We use the reloc_count field as a counter if we need
1202 to copy relocs into the output file. */
1203 s->reloc_count = 0;
1204 }
1205 }
0112cd26 1206 else if (! CONST_STRNEQ (name, ".got")
c456f082 1207 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1208 {
1209 /* It's not one of our sections, so don't allocate space. */
1210 continue;
1211 }
1212
c456f082 1213 if (s->size == 0)
90ace9e9 1214 {
c456f082
AM
1215 /* If we don't need this section, strip it from the
1216 output file. This is mostly to handle .rela.bss and
1217 .rela.plt. We must create both sections in
1218 create_dynamic_sections, because they must be created
1219 before the linker maps input sections to output
1220 sections. The linker does that before
1221 adjust_dynamic_symbol is called, and it is that
1222 function which decides whether anything needs to go
1223 into these sections. */
8423293d 1224 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1225 continue;
1226 }
1227
c456f082
AM
1228 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1229 continue;
1230
90ace9e9 1231 /* Allocate memory for the section contents. */
eb9a5ecf 1232 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 1233 if (s->contents == NULL)
b34976b6 1234 return FALSE;
90ace9e9
JT
1235 }
1236
1237 if (elf_hash_table (info)->dynamic_sections_created)
1238 {
1239 /* Add some entries to the .dynamic section. We fill in the
1240 values later, in elf_vax_finish_dynamic_sections, but we
1241 must add the entries now so that we get the correct size for
1242 the .dynamic section. The DT_DEBUG entry is filled in by the
1243 dynamic linker and used by the debugger. */
1244#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1245 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9 1246
0e1862bb 1247 if (!bfd_link_pic (info))
90ace9e9
JT
1248 {
1249 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1250 return FALSE;
90ace9e9
JT
1251 }
1252
1253 if (plt)
1254 {
1255 if (!add_dynamic_entry (DT_PLTGOT, 0)
1256 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1257 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1258 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1259 return FALSE;
90ace9e9
JT
1260 }
1261
1262 if (relocs)
1263 {
1264 if (!add_dynamic_entry (DT_RELA, 0)
1265 || !add_dynamic_entry (DT_RELASZ, 0)
1266 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1267 return FALSE;
90ace9e9
JT
1268 }
1269
1270 if (reltext || (info->flags & DF_TEXTREL) != 0)
1271 {
1272 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1273 return FALSE;
90ace9e9
JT
1274 }
1275 }
1276#undef add_dynamic_entry
1277
b34976b6 1278 return TRUE;
90ace9e9
JT
1279}
1280
1281/* This function is called via elf_vax_link_hash_traverse if we are
1282 creating a shared object with -Bsymbolic. It discards the space
1283 allocated to copy PC relative relocs against symbols which are defined
1284 in regular objects. We allocated space for them in the check_relocs
1285 routine, but we won't fill them in in the relocate_section routine. */
1286
b34976b6 1287static bfd_boolean
ce71b576 1288elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1289 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1290{
1291 struct elf_vax_pcrel_relocs_copied *s;
1292
90ace9e9 1293 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1294 if (!h->root.def_regular)
b34976b6 1295 return TRUE;
90ace9e9
JT
1296
1297 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1298 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1299
b34976b6 1300 return TRUE;
90ace9e9
JT
1301}
1302
fac3d241
MR
1303/* This function is called via elf_link_hash_traverse. It looks for
1304 entries that have GOT or PLT (.GOT) references. If creating a shared
1305 object with -Bsymbolic, or the symbol has been forced local, then it
1306 resets the reference count back to -1 so normal PC32 relocation will
1307 be done. Otherwise space in the .got and .rela.got will be reserved
1308 for the symbol. */
b29635ba 1309
b34976b6 1310static bfd_boolean
2c3fc389 1311elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1312{
1313 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1314 bfd *dynobj;
1315 asection *sgot;
1316 asection *srelgot;
b34976b6 1317
b29635ba
JT
1318 /* We don't care about non-GOT (and non-PLT) entries. */
1319 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1320 return TRUE;
b29635ba
JT
1321
1322 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1323 BFD_ASSERT (dynobj != NULL);
b29635ba 1324
3d4d4302
AM
1325 sgot = bfd_get_linker_section (dynobj, ".got");
1326 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
b29635ba 1327
125b5bac 1328 if (SYMBOL_REFERENCES_LOCAL (info, h))
b29635ba 1329 {
8be65dd3
MR
1330 h->got.refcount = -1;
1331 h->plt.refcount = -1;
b29635ba
JT
1332 }
1333 else if (h->got.refcount > 0)
1334 {
1335 /* Make sure this symbol is output as a dynamic symbol. */
1336 if (h->dynindx == -1)
1337 {
c152c796 1338 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1339 return FALSE;
b29635ba
JT
1340 }
1341
1342 /* Allocate space in the .got and .rela.got sections. */
125b5bac
MR
1343 sgot->size += 4;
1344 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1345 }
1346
b34976b6 1347 return TRUE;
b29635ba
JT
1348}
1349
90ace9e9
JT
1350/* Relocate an VAX ELF section. */
1351
b34976b6 1352static bfd_boolean
ce71b576
NC
1353elf_vax_relocate_section (bfd *output_bfd,
1354 struct bfd_link_info *info,
1355 bfd *input_bfd,
1356 asection *input_section,
1357 bfd_byte *contents,
1358 Elf_Internal_Rela *relocs,
1359 Elf_Internal_Sym *local_syms,
1360 asection **local_sections)
90ace9e9
JT
1361{
1362 bfd *dynobj;
1363 Elf_Internal_Shdr *symtab_hdr;
1364 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1365 bfd_vma plt_index;
1366 bfd_vma got_offset;
1367 asection *sgot;
1368 asection *splt;
1369 asection *sgotplt;
1370 asection *sreloc;
1371 Elf_Internal_Rela *rel;
1372 Elf_Internal_Rela *relend;
1373
1374 dynobj = elf_hash_table (info)->dynobj;
1375 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1376 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1377
1378 sgot = NULL;
1379 splt = NULL;
1380 sgotplt = NULL;
1381 sreloc = NULL;
1382
1383 rel = relocs;
1384 relend = relocs + input_section->reloc_count;
1385 for (; rel < relend; rel++)
1386 {
1387 int r_type;
1388 reloc_howto_type *howto;
1389 unsigned long r_symndx;
1390 struct elf_link_hash_entry *h;
1391 Elf_Internal_Sym *sym;
1392 asection *sec;
1393 bfd_vma relocation;
1394 bfd_reloc_status_type r;
1395
1396 r_type = ELF32_R_TYPE (rel->r_info);
1397 if (r_type < 0 || r_type >= (int) R_VAX_max)
1398 {
1399 bfd_set_error (bfd_error_bad_value);
b34976b6 1400 return FALSE;
90ace9e9
JT
1401 }
1402 howto = howto_table + r_type;
1403
f0fe0e16 1404 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1405 h = NULL;
1406 sym = NULL;
1407 sec = NULL;
1408 if (r_symndx < symtab_hdr->sh_info)
1409 {
1410 sym = local_syms + r_symndx;
1411 sec = local_sections[r_symndx];
8517fae7 1412 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1413 }
1414 else
1415 {
560e09e9 1416 bfd_boolean unresolved_reloc;
62d887d4 1417 bfd_boolean warned, ignored;
560e09e9 1418
b2a8e766
AM
1419 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1420 r_symndx, symtab_hdr, sym_hashes,
1421 h, sec, relocation,
62d887d4 1422 unresolved_reloc, warned, ignored);
ce71b576 1423
560e09e9 1424 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1425 || h->root.type == bfd_link_hash_defweak)
560e09e9 1426 && ((r_type == R_VAX_PLT32
90ace9e9 1427 && h->plt.offset != (bfd_vma) -1
fe723c87 1428 && !h->forced_local
90ace9e9
JT
1429 && elf_hash_table (info)->dynamic_sections_created)
1430 || (r_type == R_VAX_GOT32
fe723c87
MT
1431 && h->got.offset != (bfd_vma) -1
1432 && !h->forced_local
90ace9e9 1433 && elf_hash_table (info)->dynamic_sections_created
0e1862bb 1434 && (! bfd_link_pic (info)
90ace9e9 1435 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1436 || !h->def_regular))
0e1862bb 1437 || (bfd_link_pic (info)
90ace9e9 1438 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1439 || !h->def_regular)
90ace9e9
JT
1440 && ((input_section->flags & SEC_ALLOC) != 0
1441 /* DWARF will emit R_VAX_32 relocations in its
1442 sections against symbols defined externally
1443 in shared libraries. We can't do anything
1444 with them here. */
1445
1446 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1447 && h->def_dynamic))
90ace9e9
JT
1448 && (r_type == R_VAX_8
1449 || r_type == R_VAX_16
fe723c87 1450 || r_type == R_VAX_32))))
560e09e9
NC
1451 /* In these cases, we don't need the relocation
1452 value. We check specially because in some
1453 obscure cases sec->output_section will be NULL. */
90ace9e9 1454 relocation = 0;
90ace9e9
JT
1455 }
1456
dbaa2011 1457 if (sec != NULL && discarded_section (sec))
e4067dbb 1458 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1459 rel, 1, relend, howto, 0, contents);
ab96bf03 1460
0e1862bb 1461 if (bfd_link_relocatable (info))
ab96bf03
AM
1462 continue;
1463
90ace9e9
JT
1464 switch (r_type)
1465 {
1466 case R_VAX_GOT32:
1467 /* Relocation is to the address of the entry for this symbol
1468 in the global offset table. */
125b5bac
MR
1469
1470 /* Resolve a GOTxx reloc against a local symbol directly,
1471 without using the global offset table. */
7b6021f1 1472 if (h == NULL
125b5bac 1473 || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1474 break;
1475
90ace9e9
JT
1476 {
1477 bfd_vma off;
1478
90ace9e9
JT
1479 if (sgot == NULL)
1480 {
3d4d4302 1481 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
1482 BFD_ASSERT (sgot != NULL);
1483 }
1484
90ace9e9 1485 off = h->got.offset;
eea6121a 1486 BFD_ASSERT (off < sgot->size);
90ace9e9 1487
125b5bac 1488 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
90ace9e9
JT
1489
1490 relocation = sgot->output_offset + off;
b29635ba 1491 /* The GOT relocation uses the addend. */
90ace9e9
JT
1492 rel->r_addend = 0;
1493
b29635ba
JT
1494 /* Change the reference to be indirect. */
1495 contents[rel->r_offset - 1] |= 0x10;
1496 relocation += sgot->output_section->vma;
90ace9e9
JT
1497 }
1498 break;
1499
04981bc1
MR
1500 case R_VAX_PC32:
1501 /* If we are creating an executable and the function this
1502 reloc refers to is in a shared lib, then we made a PLT
1503 entry for this symbol and need to handle the reloc like
1504 a PLT reloc. */
0e1862bb 1505 if (bfd_link_pic (info))
04981bc1
MR
1506 goto r_vax_pc32_shared;
1507 /* Fall through. */
90ace9e9
JT
1508 case R_VAX_PLT32:
1509 /* Relocation is to the entry for this symbol in the
1510 procedure linkage table. */
1511
1512 /* Resolve a PLTxx reloc against a local symbol directly,
1513 without using the procedure linkage table. */
7b6021f1 1514 if (h == NULL
125b5bac 1515 || h->plt.offset == (bfd_vma) -1)
90ace9e9
JT
1516 break;
1517
90ace9e9
JT
1518 if (splt == NULL)
1519 {
3d4d4302 1520 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1521 BFD_ASSERT (splt != NULL);
1522 }
1523
1524 if (sgotplt == NULL)
1525 {
3d4d4302 1526 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
d76b263e 1527 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1528 }
1529
1530 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1531
1532 /* Get the offset into the .got table of the entry that
1533 corresponds to this function. Each .got entry is 4 bytes.
1534 The first two are reserved. */
1535 got_offset = (plt_index + 3) * 4;
1536
9e86195c 1537 /* We want the relocation to point into the .got.plt instead
cedb70c5 1538 of the plt itself. */
90ace9e9
JT
1539 relocation = (sgotplt->output_section->vma
1540 + sgotplt->output_offset
1541 + got_offset);
1542 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1543 if (rel->r_addend == 2)
1544 {
1545 h->plt.offset |= 1;
1546 }
1547 else if (rel->r_addend != 0)
4eca0228 1548 _bfd_error_handler
90ace9e9
JT
1549 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1550 bfd_get_filename (input_bfd), rel->r_addend,
1551 h->root.root.string,
1552 bfd_get_section_name (input_bfd, input_section));
1553 rel->r_addend = 0;
1554
1555 break;
1556
1557 case R_VAX_PC8:
1558 case R_VAX_PC16:
04981bc1 1559 r_vax_pc32_shared:
7b6021f1
MR
1560 if (h == NULL
1561 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1562 || h->forced_local)
90ace9e9
JT
1563 break;
1564 /* Fall through. */
1565 case R_VAX_8:
1566 case R_VAX_16:
1567 case R_VAX_32:
0e1862bb 1568 if (bfd_link_pic (info)
cf35638d 1569 && r_symndx != STN_UNDEF
90ace9e9
JT
1570 && (input_section->flags & SEC_ALLOC) != 0
1571 && ((r_type != R_VAX_PC8
1572 && r_type != R_VAX_PC16
1573 && r_type != R_VAX_PC32)
da6bcfca
MT
1574 || ((input_section->flags & SEC_CODE)
1575 && (!info->symbolic
1576 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1577 {
1578 Elf_Internal_Rela outrel;
947216bf 1579 bfd_byte *loc;
b34976b6 1580 bfd_boolean skip, relocate;
90ace9e9
JT
1581
1582 /* When generating a shared object, these relocations
1583 are copied into the output file to be resolved at run
1584 time. */
90ace9e9
JT
1585 if (sreloc == NULL)
1586 {
83bac4b0
NC
1587 sreloc = _bfd_elf_get_dynamic_reloc_section
1588 (input_bfd, input_section, /*rela?*/ TRUE);
1589 if (sreloc == NULL)
b34976b6 1590 return FALSE;
90ace9e9
JT
1591 }
1592
b34976b6
AM
1593 skip = FALSE;
1594 relocate = FALSE;
90ace9e9
JT
1595
1596 outrel.r_offset =
1597 _bfd_elf_section_offset (output_bfd, info, input_section,
1598 rel->r_offset);
1599 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1600 skip = TRUE;
90ace9e9 1601 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1602 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1603 outrel.r_offset += (input_section->output_section->vma
1604 + input_section->output_offset);
1605
1606 if (skip)
1607 memset (&outrel, 0, sizeof outrel);
1608 /* h->dynindx may be -1 if the symbol was marked to
1609 become local. */
1610 else if (h != NULL
1611 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1612 || !h->def_regular))
90ace9e9
JT
1613 {
1614 BFD_ASSERT (h->dynindx != -1);
1615 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1616 outrel.r_addend = relocation + rel->r_addend;
1617 }
1618 else
1619 {
1620 if (r_type == R_VAX_32)
1621 {
b34976b6 1622 relocate = TRUE;
90ace9e9
JT
1623 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1624 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1625 &contents[rel->r_offset]) == 0);
1626 outrel.r_addend = relocation + rel->r_addend;
1627 }
1628 else
1629 {
1630 long indx;
1631
8517fae7 1632 if (bfd_is_abs_section (sec))
90ace9e9
JT
1633 indx = 0;
1634 else if (sec == NULL || sec->owner == NULL)
1635 {
1636 bfd_set_error (bfd_error_bad_value);
b34976b6 1637 return FALSE;
90ace9e9
JT
1638 }
1639 else
1640 {
1641 asection *osec;
1642
74541ad4
AM
1643 /* We are turning this relocation into one
1644 against a section symbol. It would be
1645 proper to subtract the symbol's value,
1646 osec->vma, from the emitted reloc addend,
1647 but ld.so expects buggy relocs. */
90ace9e9
JT
1648 osec = sec->output_section;
1649 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1650 if (indx == 0)
1651 {
1652 struct elf_link_hash_table *htab;
1653 htab = elf_hash_table (info);
1654 osec = htab->text_index_section;
1655 indx = elf_section_data (osec)->dynindx;
1656 }
1657 BFD_ASSERT (indx != 0);
90ace9e9
JT
1658 }
1659
1660 outrel.r_info = ELF32_R_INFO (indx, r_type);
1661 outrel.r_addend = relocation + rel->r_addend;
1662 }
1663 }
1664
ddd74d3c 1665 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1666 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1667 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1668 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1669 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1670 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1671 {
1672 if (h != NULL)
4eca0228 1673 _bfd_error_handler
90ace9e9
JT
1674 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1675 bfd_get_filename (input_bfd), howto->name,
1676 h->root.root.string,
1677 bfd_get_section_name (input_bfd, input_section));
1678 else
4eca0228 1679 _bfd_error_handler
90ace9e9
JT
1680 (_("%s: warning: %s relocation to 0x%x from %s section"),
1681 bfd_get_filename (input_bfd), howto->name,
1682 outrel.r_addend,
1683 bfd_get_section_name (input_bfd, input_section));
1684 }
947216bf
AM
1685 loc = sreloc->contents;
1686 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1687 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1688
1689 /* This reloc will be computed at runtime, so there's no
1690 need to do anything now, except for R_VAX_32
1691 relocations that have been turned into
1692 R_VAX_RELATIVE. */
1693 if (!relocate)
1694 continue;
1695 }
1696
1697 break;
1698
1699 case R_VAX_GNU_VTINHERIT:
1700 case R_VAX_GNU_VTENTRY:
1701 /* These are no-ops in the end. */
1702 continue;
1703
1704 default:
1705 break;
1706 }
1707
b34976b6 1708 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1709 So subtract the difference from the relocation amount since we can't
1710 add it to the offset. */
90ace9e9 1711 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1712 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1713
1714 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1715 contents, rel->r_offset,
1716 relocation, rel->r_addend);
1717
1718 if (r != bfd_reloc_ok)
1719 {
1720 switch (r)
1721 {
1722 default:
1723 case bfd_reloc_outofrange:
1724 abort ();
1725 case bfd_reloc_overflow:
1726 {
1727 const char *name;
1728
1729 if (h != NULL)
dfeffb9f 1730 name = NULL;
90ace9e9
JT
1731 else
1732 {
1733 name = bfd_elf_string_from_elf_section (input_bfd,
1734 symtab_hdr->sh_link,
1735 sym->st_name);
1736 if (name == NULL)
b34976b6 1737 return FALSE;
90ace9e9
JT
1738 if (*name == '\0')
1739 name = bfd_section_name (input_bfd, sec);
1740 }
1a72702b
AM
1741 info->callbacks->reloc_overflow
1742 (info, (h ? &h->root : NULL), name, howto->name,
1743 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
90ace9e9
JT
1744 }
1745 break;
1746 }
1747 }
1748 }
1749
b34976b6 1750 return TRUE;
90ace9e9
JT
1751}
1752
1753/* Finish up dynamic symbol handling. We set the contents of various
1754 dynamic sections here. */
1755
b34976b6 1756static bfd_boolean
ce71b576
NC
1757elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1758 struct elf_link_hash_entry *h,
1759 Elf_Internal_Sym *sym)
90ace9e9
JT
1760{
1761 bfd *dynobj;
1762
1763 dynobj = elf_hash_table (info)->dynobj;
1764
1765 if (h->plt.offset != (bfd_vma) -1)
1766 {
1767 asection *splt;
1768 asection *sgot;
1769 asection *srela;
1770 bfd_vma plt_index;
1771 bfd_vma got_offset;
1772 bfd_vma addend;
1773 Elf_Internal_Rela rela;
947216bf 1774 bfd_byte *loc;
90ace9e9
JT
1775
1776 /* This symbol has an entry in the procedure linkage table. Set
1777 it up. */
90ace9e9
JT
1778 BFD_ASSERT (h->dynindx != -1);
1779
3d4d4302
AM
1780 splt = bfd_get_linker_section (dynobj, ".plt");
1781 sgot = bfd_get_linker_section (dynobj, ".got.plt");
1782 srela = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9
JT
1783 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1784
1785 addend = 2 * (h->plt.offset & 1);
1786 h->plt.offset &= ~1;
1787
1788 /* Get the index in the procedure linkage table which
1789 corresponds to this symbol. This is the index of this symbol
1790 in all the symbols for which we are making plt entries. The
1791 first entry in the procedure linkage table is reserved. */
1792 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1793
1794 /* Get the offset into the .got table of the entry that
1795 corresponds to this function. Each .got entry is 4 bytes.
1796 The first two are reserved. */
1797 got_offset = (plt_index + 3) * 4;
1798
1799 /* Fill in the entry in the procedure linkage table. */
1800 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1801 PLT_ENTRY_SIZE);
1802
1803 /* The offset is relative to the first extension word. */
1804 bfd_put_32 (output_bfd,
1805 -(h->plt.offset + 8),
1806 splt->contents + h->plt.offset + 4);
1807
1808 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1809 splt->contents + h->plt.offset + 8);
1810
1811 /* Fill in the entry in the global offset table. */
1812 bfd_put_32 (output_bfd,
1813 (splt->output_section->vma
1814 + splt->output_offset
1815 + h->plt.offset) + addend,
1816 sgot->contents + got_offset);
1817
1818 /* Fill in the entry in the .rela.plt section. */
1819 rela.r_offset = (sgot->output_section->vma
1820 + sgot->output_offset
1821 + got_offset);
1822 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1823 rela.r_addend = addend;
947216bf
AM
1824 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1825 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1826
f5385ebf 1827 if (!h->def_regular)
90ace9e9
JT
1828 {
1829 /* Mark the symbol as undefined, rather than as defined in
1830 the .plt section. Leave the value alone. */
1831 sym->st_shndx = SHN_UNDEF;
1832 }
1833 }
1834
1835 if (h->got.offset != (bfd_vma) -1)
1836 {
1837 asection *sgot;
1838 asection *srela;
1839 Elf_Internal_Rela rela;
947216bf 1840 bfd_byte *loc;
90ace9e9
JT
1841
1842 /* This symbol has an entry in the global offset table. Set it
1843 up. */
3d4d4302
AM
1844 sgot = bfd_get_linker_section (dynobj, ".got");
1845 srela = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
1846 BFD_ASSERT (sgot != NULL && srela != NULL);
1847
1848 rela.r_offset = (sgot->output_section->vma
1849 + sgot->output_offset
125b5bac
MR
1850 + h->got.offset);
1851 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
90ace9e9 1852 rela.r_addend = bfd_get_signed_32 (output_bfd,
125b5bac 1853 sgot->contents + h->got.offset);
90ace9e9 1854
947216bf
AM
1855 loc = srela->contents;
1856 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1857 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1858 }
1859
f5385ebf 1860 if (h->needs_copy)
90ace9e9
JT
1861 {
1862 asection *s;
1863 Elf_Internal_Rela rela;
947216bf 1864 bfd_byte *loc;
90ace9e9
JT
1865
1866 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1867 BFD_ASSERT (h->dynindx != -1
1868 && (h->root.type == bfd_link_hash_defined
1869 || h->root.type == bfd_link_hash_defweak));
1870
3d4d4302 1871 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1872 BFD_ASSERT (s != NULL);
1873
1874 rela.r_offset = (h->root.u.def.value
1875 + h->root.u.def.section->output_section->vma
1876 + h->root.u.def.section->output_offset);
1877 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1878 rela.r_addend = 0;
947216bf
AM
1879 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1880 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1881 }
1882
1883 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1884 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1885 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1886 sym->st_shndx = SHN_ABS;
1887
b34976b6 1888 return TRUE;
90ace9e9
JT
1889}
1890
1891/* Finish up the dynamic sections. */
1892
b34976b6 1893static bfd_boolean
ce71b576 1894elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1895{
1896 bfd *dynobj;
1897 asection *sgot;
1898 asection *sdyn;
1899
1900 dynobj = elf_hash_table (info)->dynobj;
1901
3d4d4302 1902 sgot = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1903 BFD_ASSERT (sgot != NULL);
3d4d4302 1904 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1905
1906 if (elf_hash_table (info)->dynamic_sections_created)
1907 {
1908 asection *splt;
1909 Elf32_External_Dyn *dyncon, *dynconend;
1910
3d4d4302 1911 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1912 BFD_ASSERT (splt != NULL && sdyn != NULL);
1913
1914 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1915 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1916 for (; dyncon < dynconend; dyncon++)
1917 {
1918 Elf_Internal_Dyn dyn;
1919 const char *name;
1920 asection *s;
1921
1922 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1923
1924 switch (dyn.d_tag)
1925 {
1926 default:
1927 break;
1928
1929 case DT_PLTGOT:
4ade44b7 1930 name = ".got.plt";
90ace9e9
JT
1931 goto get_vma;
1932 case DT_JMPREL:
1933 name = ".rela.plt";
1934 get_vma:
4ade44b7
AM
1935 s = bfd_get_linker_section (dynobj, name);
1936 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
90ace9e9
JT
1937 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1938 break;
1939
1940 case DT_PLTRELSZ:
4ade44b7 1941 s = bfd_get_linker_section (dynobj, ".rela.plt");
eea6121a 1942 dyn.d_un.d_val = s->size;
90ace9e9
JT
1943 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1944 break;
1945
1946 case DT_RELASZ:
1947 /* The procedure linkage table relocs (DT_JMPREL) should
1948 not be included in the overall relocs (DT_RELA).
1949 Therefore, we override the DT_RELASZ entry here to
1950 make it not include the JMPREL relocs. Since the
1951 linker script arranges for .rela.plt to follow all
1952 other relocation sections, we don't have to worry
1953 about changing the DT_RELA entry. */
4ade44b7 1954 s = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9 1955 if (s != NULL)
eea6121a 1956 dyn.d_un.d_val -= s->size;
90ace9e9
JT
1957 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1958 break;
1959 }
1960 }
1961
1962 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1963 if (splt->size > 0)
90ace9e9
JT
1964 {
1965 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1966 bfd_put_32 (output_bfd,
1967 (sgot->output_section->vma
1968 + sgot->output_offset + 4
1969 - (splt->output_section->vma + 6)),
1970 splt->contents + 2);
1971 bfd_put_32 (output_bfd,
1972 (sgot->output_section->vma
1973 + sgot->output_offset + 8
1974 - (splt->output_section->vma + 12)),
1975 splt->contents + 8);
cedb70c5 1976 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
1977 = PLT_ENTRY_SIZE;
1978 }
1979 }
1980
1981 /* Fill in the first three entries in the global offset table. */
eea6121a 1982 if (sgot->size > 0)
90ace9e9
JT
1983 {
1984 if (sdyn == NULL)
1985 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1986 else
1987 bfd_put_32 (output_bfd,
1988 sdyn->output_section->vma + sdyn->output_offset,
1989 sgot->contents);
1990 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1991 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1992 }
1993
f6518c48
MR
1994 if (elf_section_data (sgot->output_section) != NULL)
1995 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
90ace9e9 1996
b34976b6 1997 return TRUE;
90ace9e9
JT
1998}
1999
9b90d8fd 2000static enum elf_reloc_type_class
7e612e98
AM
2001elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2002 const asection *rel_sec ATTRIBUTE_UNUSED,
2003 const Elf_Internal_Rela *rela)
9b90d8fd
MR
2004{
2005 switch ((int) ELF32_R_TYPE (rela->r_info))
2006 {
2007 case R_VAX_RELATIVE:
2008 return reloc_class_relative;
2009 case R_VAX_JMP_SLOT:
2010 return reloc_class_plt;
2011 case R_VAX_COPY:
2012 return reloc_class_copy;
2013 default:
2014 return reloc_class_normal;
2015 }
2016}
2017
6db7e006
MR
2018static bfd_vma
2019elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
2020 const arelent *rel ATTRIBUTE_UNUSED)
2021{
2022 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
2023}
2024
6d00b590 2025#define TARGET_LITTLE_SYM vax_elf32_vec
90ace9e9
JT
2026#define TARGET_LITTLE_NAME "elf32-vax"
2027#define ELF_MACHINE_CODE EM_VAX
2028#define ELF_MAXPAGESIZE 0x1000
2029
2030#define elf_backend_create_dynamic_sections \
2031 _bfd_elf_create_dynamic_sections
2032#define bfd_elf32_bfd_link_hash_table_create \
2033 elf_vax_link_hash_table_create
c152c796 2034#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2035
2036#define elf_backend_check_relocs elf_vax_check_relocs
2037#define elf_backend_adjust_dynamic_symbol \
2038 elf_vax_adjust_dynamic_symbol
fac3d241
MR
2039#define elf_backend_always_size_sections \
2040 elf_vax_always_size_sections
90ace9e9
JT
2041#define elf_backend_size_dynamic_sections \
2042 elf_vax_size_dynamic_sections
74541ad4 2043#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2044#define elf_backend_relocate_section elf_vax_relocate_section
2045#define elf_backend_finish_dynamic_symbol \
2046 elf_vax_finish_dynamic_symbol
2047#define elf_backend_finish_dynamic_sections \
2048 elf_vax_finish_dynamic_sections
9b90d8fd 2049#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9
JT
2050#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2051#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
6db7e006 2052#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9
JT
2053#define bfd_elf32_bfd_merge_private_bfd_data \
2054 elf32_vax_merge_private_bfd_data
2055#define bfd_elf32_bfd_set_private_flags \
2056 elf32_vax_set_private_flags
2057#define bfd_elf32_bfd_print_private_bfd_data \
2058 elf32_vax_print_private_bfd_data
2059
2060#define elf_backend_can_gc_sections 1
2061#define elf_backend_want_got_plt 1
2062#define elf_backend_plt_readonly 1
2063#define elf_backend_want_plt_sym 0
2064#define elf_backend_got_header_size 16
f0fe0e16 2065#define elf_backend_rela_normal 1
90ace9e9
JT
2066
2067#include "elf32-target.h"