]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-vax.c
PR 2434
[thirdparty/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
66eb6687 3 2004, 2005, 2006 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
90ace9e9
JT
21
22#include "bfd.h"
23#include "sysdep.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576
NC
29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37static asection *elf_vax_gc_mark_hook (asection *, struct bfd_link_info *,
38 Elf_Internal_Rela *,
39 struct elf_link_hash_entry *,
40 Elf_Internal_Sym *);
41static bfd_boolean elf_vax_gc_sweep_hook (bfd *, struct bfd_link_info *,
42 asection *,
43 const Elf_Internal_Rela *);
44static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
45 struct elf_link_hash_entry *);
46static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
47static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
48 bfd *, asection *, bfd_byte *,
49 Elf_Internal_Rela *,
50 Elf_Internal_Sym *, asection **);
51static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
52 struct elf_link_hash_entry *,
53 Elf_Internal_Sym *);
54static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
55 struct bfd_link_info *);
56
57static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
58static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
59static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
60
61static reloc_howto_type howto_table[] = {
62 HOWTO (R_VAX_NONE, /* type */
63 0, /* rightshift */
64 0, /* size (0 = byte, 1 = short, 2 = long) */
65 0, /* bitsize */
b34976b6 66 FALSE, /* pc_relative */
90ace9e9
JT
67 0, /* bitpos */
68 complain_overflow_dont, /* complain_on_overflow */
69 bfd_elf_generic_reloc, /* special_function */
70 "R_VAX_NONE", /* name */
b34976b6 71 FALSE, /* partial_inplace */
90ace9e9
JT
72 0, /* src_mask */
73 0x00000000, /* dst_mask */
b34976b6 74 FALSE), /* pcrel_offset */
90ace9e9
JT
75
76 HOWTO (R_VAX_32, /* type */
77 0, /* rightshift */
78 2, /* size (0 = byte, 1 = short, 2 = long) */
79 32, /* bitsize */
b34976b6 80 FALSE, /* pc_relative */
90ace9e9
JT
81 0, /* bitpos */
82 complain_overflow_bitfield, /* complain_on_overflow */
83 bfd_elf_generic_reloc, /* special_function */
84 "R_VAX_32", /* name */
b34976b6 85 FALSE, /* partial_inplace */
90ace9e9
JT
86 0, /* src_mask */
87 0xffffffff, /* dst_mask */
b34976b6 88 FALSE), /* pcrel_offset */
90ace9e9
JT
89
90 HOWTO (R_VAX_16, /* type */
91 0, /* rightshift */
92 1, /* size (0 = byte, 1 = short, 2 = long) */
93 16, /* bitsize */
b34976b6 94 FALSE, /* pc_relative */
90ace9e9
JT
95 0, /* bitpos */
96 complain_overflow_bitfield, /* complain_on_overflow */
97 bfd_elf_generic_reloc, /* special_function */
98 "R_VAX_16", /* name */
b34976b6 99 FALSE, /* partial_inplace */
90ace9e9
JT
100 0, /* src_mask */
101 0x0000ffff, /* dst_mask */
b34976b6 102 FALSE), /* pcrel_offset */
90ace9e9
JT
103
104 HOWTO (R_VAX_8, /* type */
105 0, /* rightshift */
106 0, /* size (0 = byte, 1 = short, 2 = long) */
107 8, /* bitsize */
b34976b6 108 FALSE, /* pc_relative */
90ace9e9
JT
109 0, /* bitpos */
110 complain_overflow_bitfield, /* complain_on_overflow */
111 bfd_elf_generic_reloc, /* special_function */
112 "R_VAX_8", /* name */
b34976b6 113 FALSE, /* partial_inplace */
90ace9e9
JT
114 0, /* src_mask */
115 0x000000ff, /* dst_mask */
b34976b6 116 FALSE), /* pcrel_offset */
90ace9e9
JT
117
118 HOWTO (R_VAX_PC32, /* type */
119 0, /* rightshift */
120 2, /* size (0 = byte, 1 = short, 2 = long) */
121 32, /* bitsize */
b34976b6 122 TRUE, /* pc_relative */
90ace9e9
JT
123 0, /* bitpos */
124 complain_overflow_bitfield, /* complain_on_overflow */
125 bfd_elf_generic_reloc, /* special_function */
126 "R_VAX_PC32", /* name */
b34976b6 127 FALSE, /* partial_inplace */
90ace9e9
JT
128 0, /* src_mask */
129 0xffffffff, /* dst_mask */
b34976b6 130 TRUE), /* pcrel_offset */
90ace9e9
JT
131
132 HOWTO (R_VAX_PC16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 TRUE, /* pc_relative */
90ace9e9
JT
137 0, /* bitpos */
138 complain_overflow_signed, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_VAX_PC16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
90ace9e9
JT
142 0, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 TRUE), /* pcrel_offset */
90ace9e9
JT
145
146 HOWTO (R_VAX_PC8, /* type */
147 0, /* rightshift */
148 0, /* size (0 = byte, 1 = short, 2 = long) */
149 8, /* bitsize */
b34976b6 150 TRUE, /* pc_relative */
90ace9e9
JT
151 0, /* bitpos */
152 complain_overflow_signed, /* complain_on_overflow */
153 bfd_elf_generic_reloc, /* special_function */
154 "R_VAX_PC8", /* name */
b34976b6 155 FALSE, /* partial_inplace */
90ace9e9
JT
156 0, /* src_mask */
157 0x000000ff, /* dst_mask */
b34976b6 158 TRUE), /* pcrel_offset */
90ace9e9
JT
159
160 HOWTO (R_VAX_GOT32, /* type */
161 0, /* rightshift */
162 2, /* size (0 = byte, 1 = short, 2 = long) */
163 32, /* bitsize */
b34976b6 164 TRUE, /* pc_relative */
90ace9e9
JT
165 0, /* bitpos */
166 complain_overflow_bitfield, /* complain_on_overflow */
167 bfd_elf_generic_reloc, /* special_function */
168 "R_VAX_GOT32", /* name */
b34976b6 169 FALSE, /* partial_inplace */
90ace9e9
JT
170 0, /* src_mask */
171 0xffffffff, /* dst_mask */
b34976b6 172 TRUE), /* pcrel_offset */
90ace9e9
JT
173
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176 EMPTY_HOWTO (-1),
177 EMPTY_HOWTO (-1),
178 EMPTY_HOWTO (-1),
179
180 HOWTO (R_VAX_PLT32, /* type */
181 0, /* rightshift */
182 2, /* size (0 = byte, 1 = short, 2 = long) */
183 32, /* bitsize */
b34976b6 184 TRUE, /* pc_relative */
90ace9e9
JT
185 0, /* bitpos */
186 complain_overflow_bitfield, /* complain_on_overflow */
187 bfd_elf_generic_reloc, /* special_function */
188 "R_VAX_PLT32", /* name */
b34976b6 189 FALSE, /* partial_inplace */
90ace9e9
JT
190 0, /* src_mask */
191 0xffffffff, /* dst_mask */
b34976b6 192 TRUE), /* pcrel_offset */
90ace9e9
JT
193
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196 EMPTY_HOWTO (-1),
197 EMPTY_HOWTO (-1),
198 EMPTY_HOWTO (-1),
199
200 HOWTO (R_VAX_COPY, /* type */
201 0, /* rightshift */
202 0, /* size (0 = byte, 1 = short, 2 = long) */
203 0, /* bitsize */
b34976b6 204 FALSE, /* pc_relative */
90ace9e9
JT
205 0, /* bitpos */
206 complain_overflow_dont, /* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_VAX_COPY", /* name */
b34976b6 209 FALSE, /* partial_inplace */
90ace9e9
JT
210 0, /* src_mask */
211 0xffffffff, /* dst_mask */
b34976b6 212 FALSE), /* pcrel_offset */
90ace9e9
JT
213
214 HOWTO (R_VAX_GLOB_DAT, /* type */
215 0, /* rightshift */
216 2, /* size (0 = byte, 1 = short, 2 = long) */
217 32, /* bitsize */
b34976b6 218 FALSE, /* pc_relative */
90ace9e9
JT
219 0, /* bitpos */
220 complain_overflow_dont, /* complain_on_overflow */
221 bfd_elf_generic_reloc, /* special_function */
222 "R_VAX_GLOB_DAT", /* name */
b34976b6 223 FALSE, /* partial_inplace */
90ace9e9
JT
224 0, /* src_mask */
225 0xffffffff, /* dst_mask */
b34976b6 226 FALSE), /* pcrel_offset */
90ace9e9
JT
227
228 HOWTO (R_VAX_JMP_SLOT, /* type */
229 0, /* rightshift */
230 2, /* size (0 = byte, 1 = short, 2 = long) */
231 32, /* bitsize */
b34976b6 232 FALSE, /* pc_relative */
90ace9e9
JT
233 0, /* bitpos */
234 complain_overflow_dont, /* complain_on_overflow */
235 bfd_elf_generic_reloc, /* special_function */
236 "R_VAX_JMP_SLOT", /* name */
b34976b6 237 FALSE, /* partial_inplace */
90ace9e9
JT
238 0, /* src_mask */
239 0xffffffff, /* dst_mask */
b34976b6 240 FALSE), /* pcrel_offset */
90ace9e9
JT
241
242 HOWTO (R_VAX_RELATIVE, /* type */
243 0, /* rightshift */
244 2, /* size (0 = byte, 1 = short, 2 = long) */
245 32, /* bitsize */
b34976b6 246 FALSE, /* pc_relative */
90ace9e9
JT
247 0, /* bitpos */
248 complain_overflow_dont, /* complain_on_overflow */
249 bfd_elf_generic_reloc, /* special_function */
250 "R_VAX_RELATIVE", /* name */
b34976b6 251 FALSE, /* partial_inplace */
90ace9e9
JT
252 0, /* src_mask */
253 0xffffffff, /* dst_mask */
b34976b6 254 FALSE), /* pcrel_offset */
90ace9e9
JT
255
256 /* GNU extension to record C++ vtable hierarchy */
257 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
258 0, /* rightshift */
259 2, /* size (0 = byte, 1 = short, 2 = long) */
260 0, /* bitsize */
b34976b6 261 FALSE, /* pc_relative */
90ace9e9
JT
262 0, /* bitpos */
263 complain_overflow_dont, /* complain_on_overflow */
264 NULL, /* special_function */
265 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 266 FALSE, /* partial_inplace */
90ace9e9
JT
267 0, /* src_mask */
268 0, /* dst_mask */
b34976b6 269 FALSE), /* pcrel_offset */
90ace9e9
JT
270
271 /* GNU extension to record C++ vtable member usage */
272 HOWTO (R_VAX_GNU_VTENTRY, /* type */
273 0, /* rightshift */
274 2, /* size (0 = byte, 1 = short, 2 = long) */
275 0, /* bitsize */
b34976b6 276 FALSE, /* pc_relative */
90ace9e9
JT
277 0, /* bitpos */
278 complain_overflow_dont, /* complain_on_overflow */
279 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
280 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 281 FALSE, /* partial_inplace */
90ace9e9
JT
282 0, /* src_mask */
283 0, /* dst_mask */
b34976b6 284 FALSE), /* pcrel_offset */
90ace9e9
JT
285};
286
287static void
ce71b576
NC
288rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
289 Elf_Internal_Rela *dst)
90ace9e9
JT
290{
291 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
292 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
293}
294
295#define elf_info_to_howto rtype_to_howto
296
297static const struct
298{
299 bfd_reloc_code_real_type bfd_val;
300 int elf_val;
301} reloc_map[] = {
302 { BFD_RELOC_NONE, R_VAX_NONE },
303 { BFD_RELOC_32, R_VAX_32 },
304 { BFD_RELOC_16, R_VAX_16 },
305 { BFD_RELOC_8, R_VAX_8 },
306 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
307 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
308 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
309 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
310 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
311 { BFD_RELOC_NONE, R_VAX_COPY },
312 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
313 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
314 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
315 { BFD_RELOC_CTOR, R_VAX_32 },
316 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
317 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
318};
319
320static reloc_howto_type *
ce71b576 321reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
322{
323 unsigned int i;
324 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
325 {
326 if (reloc_map[i].bfd_val == code)
327 return &howto_table[reloc_map[i].elf_val];
328 }
329 return 0;
330}
331
332#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
333#define ELF_ARCH bfd_arch_vax
334/* end code generated by elf.el */
90ace9e9
JT
335\f
336/* Functions for the VAX ELF linker. */
337
338/* The name of the dynamic interpreter. This is put in the .interp
339 section. */
340
341#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
342
343/* The size in bytes of an entry in the procedure linkage table. */
344
345#define PLT_ENTRY_SIZE 12
346
347/* The first entry in a procedure linkage table looks like this. See
348 the SVR4 ABI VAX supplement to see how this works. */
349
350static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
351{
352 0xdd, 0xef, /* pushl l^ */
353 0, 0, 0, 0, /* offset to .plt.got + 4 */
354 0x17, 0xff, /* jmp @L^(pc) */
355 0, 0, 0, 0, /* offset to .plt.got + 8 */
356};
357
358/* Subsequent entries in a procedure linkage table look like this. */
359
360static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
361{
362 0x40, 0x00, /* .word ^M<r6> */
363 0x16, 0xef, /* jsb L^(pc) */
364 0, 0, 0, 0, /* replaced with offset to start of .plt */
365 0, 0, 0, 0, /* index into .rela.plt */
366};
367
368/* The VAX linker needs to keep track of the number of relocs that it
369 decides to copy in check_relocs for each symbol. This is so that it
370 can discard PC relative relocs if it doesn't need them when linking
371 with -Bsymbolic. We store the information in a field extending the
372 regular ELF linker hash table. */
373
374/* This structure keeps track of the number of PC relative relocs we have
375 copied for a given symbol. */
376
377struct elf_vax_pcrel_relocs_copied
378{
379 /* Next section. */
380 struct elf_vax_pcrel_relocs_copied *next;
381 /* A section in dynobj. */
382 asection *section;
383 /* Number of relocs copied in this section. */
384 bfd_size_type count;
385};
386
387/* VAX ELF linker hash entry. */
388
389struct elf_vax_link_hash_entry
390{
391 struct elf_link_hash_entry root;
392
393 /* Number of PC relative relocs copied for this symbol. */
394 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
395
396 bfd_vma got_addend;
397};
398
399/* VAX ELF linker hash table. */
400
401struct elf_vax_link_hash_table
402{
403 struct elf_link_hash_table root;
404};
405
406/* Declare this now that the above structures are defined. */
407
ce71b576
NC
408static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
409 PTR);
90ace9e9 410
b29635ba
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576
NC
413static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
414 PTR);
b29635ba 415
90ace9e9
JT
416/* Traverse an VAX ELF linker hash table. */
417
418#define elf_vax_link_hash_traverse(table, func, info) \
419 (elf_link_hash_traverse \
420 (&(table)->root, \
ce71b576 421 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
422 (info)))
423
424/* Get the VAX ELF linker hash table from a link_info structure. */
425
ce71b576 426#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
427
428/* Create an entry in an VAX ELF linker hash table. */
429
430static struct bfd_hash_entry *
ce71b576
NC
431elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
432 struct bfd_hash_table *table,
433 const char *string)
90ace9e9
JT
434{
435 struct elf_vax_link_hash_entry *ret =
436 (struct elf_vax_link_hash_entry *) entry;
437
438 /* Allocate the structure if it has not already been allocated by a
439 subclass. */
ce71b576 440 if (ret == NULL)
90ace9e9
JT
441 ret = ((struct elf_vax_link_hash_entry *)
442 bfd_hash_allocate (table,
443 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 444 if (ret == NULL)
90ace9e9
JT
445 return (struct bfd_hash_entry *) ret;
446
447 /* Call the allocation method of the superclass. */
448 ret = ((struct elf_vax_link_hash_entry *)
449 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
450 table, string));
ce71b576 451 if (ret != NULL)
90ace9e9
JT
452 {
453 ret->pcrel_relocs_copied = NULL;
454 }
455
456 return (struct bfd_hash_entry *) ret;
457}
458
459/* Create an VAX ELF linker hash table. */
460
461static struct bfd_link_hash_table *
ce71b576 462elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
463{
464 struct elf_vax_link_hash_table *ret;
465 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
466
ce71b576
NC
467 ret = bfd_malloc (amt);
468 if (ret == NULL)
90ace9e9
JT
469 return NULL;
470
66eb6687
AM
471 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
472 elf_vax_link_hash_newfunc,
473 sizeof (struct elf_vax_link_hash_entry)))
90ace9e9
JT
474 {
475 free (ret);
476 return NULL;
477 }
478
479 return &ret->root.root;
480}
481
482/* Keep vax-specific flags in the ELF header */
b34976b6 483static bfd_boolean
ce71b576 484elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
485{
486 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
487 elf_flags_init (abfd) = TRUE;
488 return TRUE;
90ace9e9
JT
489}
490
491/* Merge backend specific data from an object file to the output
492 object file when linking. */
b34976b6 493static bfd_boolean
ce71b576 494elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
495{
496 flagword out_flags;
497 flagword in_flags;
498
499 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
500 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 501 return TRUE;
90ace9e9
JT
502
503 in_flags = elf_elfheader (ibfd)->e_flags;
504 out_flags = elf_elfheader (obfd)->e_flags;
505
506 if (!elf_flags_init (obfd))
507 {
b34976b6 508 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
509 elf_elfheader (obfd)->e_flags = in_flags;
510 }
511
b34976b6 512 return TRUE;
90ace9e9
JT
513}
514
515/* Display the flags field */
b34976b6 516static bfd_boolean
ce71b576 517elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
518{
519 FILE *file = (FILE *) ptr;
520
521 BFD_ASSERT (abfd != NULL && ptr != NULL);
522
523 /* Print normal ELF private data. */
524 _bfd_elf_print_private_bfd_data (abfd, ptr);
525
526 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
527
528 /* xgettext:c-format */
529 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
530
179d3252 531 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
532 fprintf (file, _(" [nonpic]"));
533
179d3252 534 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
535 fprintf (file, _(" [d-float]"));
536
179d3252 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
538 fprintf (file, _(" [g-float]"));
539
540 fputc ('\n', file);
541
b34976b6 542 return TRUE;
90ace9e9
JT
543}
544/* Look through the relocs for a section during the first phase, and
545 allocate space in the global offset table or procedure linkage
546 table. */
547
b34976b6 548static bfd_boolean
ce71b576
NC
549elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
550 const Elf_Internal_Rela *relocs)
90ace9e9
JT
551{
552 bfd *dynobj;
553 Elf_Internal_Shdr *symtab_hdr;
554 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
555 const Elf_Internal_Rela *rel;
556 const Elf_Internal_Rela *rel_end;
557 asection *sgot;
558 asection *srelgot;
559 asection *sreloc;
560
1049f94e 561 if (info->relocatable)
b34976b6 562 return TRUE;
90ace9e9
JT
563
564 dynobj = elf_hash_table (info)->dynobj;
565 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
566 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
567
568 sgot = NULL;
569 srelgot = NULL;
570 sreloc = NULL;
571
572 rel_end = relocs + sec->reloc_count;
573 for (rel = relocs; rel < rel_end; rel++)
574 {
575 unsigned long r_symndx;
576 struct elf_link_hash_entry *h;
577
578 r_symndx = ELF32_R_SYM (rel->r_info);
579
580 if (r_symndx < symtab_hdr->sh_info)
581 h = NULL;
582 else
973a3492
L
583 {
584 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
585 while (h->root.type == bfd_link_hash_indirect
586 || h->root.type == bfd_link_hash_warning)
587 h = (struct elf_link_hash_entry *) h->root.u.i.link;
588 }
90ace9e9
JT
589
590 switch (ELF32_R_TYPE (rel->r_info))
591 {
592 case R_VAX_GOT32:
593 if (h != NULL
594 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
595 break;
596
597 /* This symbol requires a global offset table entry. */
598
599 if (dynobj == NULL)
600 {
601 /* Create the .got section. */
602 elf_hash_table (info)->dynobj = dynobj = abfd;
603 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 604 return FALSE;
90ace9e9
JT
605 }
606
607 if (sgot == NULL)
608 {
609 sgot = bfd_get_section_by_name (dynobj, ".got");
610 BFD_ASSERT (sgot != NULL);
611 }
612
613 if (srelgot == NULL
614 && (h != NULL || info->shared))
615 {
616 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
617 if (srelgot == NULL)
618 {
3496cb2a
L
619 srelgot = bfd_make_section_with_flags (dynobj,
620 ".rela.got",
621 (SEC_ALLOC
622 | SEC_LOAD
623 | SEC_HAS_CONTENTS
624 | SEC_IN_MEMORY
625 | SEC_LINKER_CREATED
626 | SEC_READONLY));
90ace9e9 627 if (srelgot == NULL
90ace9e9 628 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 629 return FALSE;
90ace9e9
JT
630 }
631 }
632
633 if (h != NULL)
634 {
635 struct elf_vax_link_hash_entry *eh;
636
637 eh = (struct elf_vax_link_hash_entry *) h;
638 if (h->got.refcount == -1)
639 {
640 h->got.refcount = 1;
641 eh->got_addend = rel->r_addend;
90ace9e9
JT
642 }
643 else
644 {
645 h->got.refcount++;
646 if (eh->got_addend != (bfd_vma) rel->r_addend)
647 (*_bfd_error_handler)
648 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
649 bfd_get_filename (abfd), rel->r_addend,
650 h->root.root.string,
651 eh->got_addend);
cedb70c5 652
90ace9e9
JT
653 }
654 }
655 break;
656
657 case R_VAX_PLT32:
658 /* This symbol requires a procedure linkage table entry. We
659 actually build the entry in adjust_dynamic_symbol,
660 because this might be a case of linking PIC code which is
661 never referenced by a dynamic object, in which case we
662 don't need to generate a procedure linkage table entry
663 after all. */
664
665 /* If this is a local symbol, we resolve it directly without
666 creating a procedure linkage table entry. */
667 if (h == NULL)
668 continue;
669
f5385ebf 670 h->needs_plt = 1;
90ace9e9
JT
671 if (h->plt.refcount == -1)
672 h->plt.refcount = 1;
673 else
674 h->plt.refcount++;
675 break;
676
677 case R_VAX_PC8:
678 case R_VAX_PC16:
679 case R_VAX_PC32:
680 /* If we are creating a shared library and this is not a local
681 symbol, we need to copy the reloc into the shared library.
682 However when linking with -Bsymbolic and this is a global
683 symbol which is defined in an object we are including in the
684 link (i.e., DEF_REGULAR is set), then we can resolve the
685 reloc directly. At this point we have not seen all the input
686 files, so it is possible that DEF_REGULAR is not set now but
687 will be set later (it is never cleared). We account for that
688 possibility below by storing information in the
689 pcrel_relocs_copied field of the hash table entry. */
690 if (!(info->shared
691 && (sec->flags & SEC_ALLOC) != 0
692 && h != NULL
693 && (!info->symbolic
f5385ebf 694 || !h->def_regular)))
90ace9e9
JT
695 {
696 if (h != NULL)
697 {
698 /* Make sure a plt entry is created for this symbol if
699 it turns out to be a function defined by a dynamic
700 object. */
701 if (h->plt.refcount == -1)
702 h->plt.refcount = 1;
703 else
704 h->plt.refcount++;
705 }
706 break;
707 }
708 /* Fall through. */
709 case R_VAX_8:
710 case R_VAX_16:
711 case R_VAX_32:
712 if (h != NULL)
713 {
714 /* Make sure a plt entry is created for this symbol if it
715 turns out to be a function defined by a dynamic object. */
716 if (h->plt.refcount == -1)
717 h->plt.refcount = 1;
718 else
719 h->plt.refcount++;
720 }
721
722 /* If we are creating a shared library, we need to copy the
723 reloc into the shared library. */
724 if (info->shared
725 && (sec->flags & SEC_ALLOC) != 0)
726 {
727 /* When creating a shared object, we must copy these
728 reloc types into the output file. We create a reloc
729 section in dynobj and make room for this reloc. */
730 if (sreloc == NULL)
731 {
732 const char *name;
733
734 name = (bfd_elf_string_from_elf_section
735 (abfd,
736 elf_elfheader (abfd)->e_shstrndx,
737 elf_section_data (sec)->rel_hdr.sh_name));
738 if (name == NULL)
b34976b6 739 return FALSE;
90ace9e9
JT
740
741 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
742 && strcmp (bfd_get_section_name (abfd, sec),
743 name + 5) == 0);
744
745 sreloc = bfd_get_section_by_name (dynobj, name);
746 if (sreloc == NULL)
747 {
3496cb2a
L
748 sreloc = bfd_make_section_with_flags (dynobj,
749 name,
750 (SEC_ALLOC
751 | SEC_LOAD
752 | SEC_HAS_CONTENTS
753 | SEC_IN_MEMORY
754 | SEC_LINKER_CREATED
755 | SEC_READONLY));
90ace9e9 756 if (sreloc == NULL
90ace9e9 757 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 758 return FALSE;
90ace9e9
JT
759 }
760 if (sec->flags & SEC_READONLY)
761 info->flags |= DF_TEXTREL;
762 }
763
eea6121a 764 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
765
766 /* If we are linking with -Bsymbolic, we count the number of
767 PC relative relocations we have entered for this symbol,
768 so that we can discard them again if the symbol is later
769 defined by a regular object. Note that this function is
19852a2a 770 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
771 which means that h is really a pointer to an
772 elf_vax_link_hash_entry. */
773 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
774 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
775 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
776 && info->symbolic)
777 {
778 struct elf_vax_link_hash_entry *eh;
779 struct elf_vax_pcrel_relocs_copied *p;
780
781 eh = (struct elf_vax_link_hash_entry *) h;
782
783 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
784 if (p->section == sreloc)
785 break;
786
787 if (p == NULL)
788 {
789 p = ((struct elf_vax_pcrel_relocs_copied *)
790 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
791 if (p == NULL)
b34976b6 792 return FALSE;
90ace9e9
JT
793 p->next = eh->pcrel_relocs_copied;
794 eh->pcrel_relocs_copied = p;
795 p->section = sreloc;
796 p->count = 0;
797 }
798
799 ++p->count;
800 }
801 }
802
803 break;
804
805 /* This relocation describes the C++ object vtable hierarchy.
806 Reconstruct it for later use during GC. */
807 case R_VAX_GNU_VTINHERIT:
c152c796 808 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 809 return FALSE;
90ace9e9
JT
810 break;
811
812 /* This relocation describes which C++ vtable entries are actually
813 used. Record for later use during GC. */
814 case R_VAX_GNU_VTENTRY:
c152c796 815 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 816 return FALSE;
90ace9e9
JT
817 break;
818
819 default:
820 break;
821 }
822 }
823
b34976b6 824 return TRUE;
90ace9e9
JT
825}
826
827/* Return the section that should be marked against GC for a given
828 relocation. */
829
830static asection *
ce71b576
NC
831elf_vax_gc_mark_hook (asection *sec,
832 struct bfd_link_info *info ATTRIBUTE_UNUSED,
833 Elf_Internal_Rela *rel,
834 struct elf_link_hash_entry *h,
835 Elf_Internal_Sym *sym)
90ace9e9
JT
836{
837 if (h != NULL)
838 {
839 switch (ELF32_R_TYPE (rel->r_info))
840 {
841 case R_VAX_GNU_VTINHERIT:
842 case R_VAX_GNU_VTENTRY:
843 break;
844
845 default:
846 switch (h->root.type)
847 {
848 default:
849 break;
850
851 case bfd_link_hash_defined:
852 case bfd_link_hash_defweak:
853 return h->root.u.def.section;
854
855 case bfd_link_hash_common:
856 return h->root.u.c.p->section;
857 }
858 }
859 }
860 else
1e2f5b6e 861 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
90ace9e9
JT
862
863 return NULL;
864}
865
866/* Update the got entry reference counts for the section being removed. */
867
b34976b6 868static bfd_boolean
ce71b576
NC
869elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
870 const Elf_Internal_Rela *relocs)
90ace9e9
JT
871{
872 Elf_Internal_Shdr *symtab_hdr;
873 struct elf_link_hash_entry **sym_hashes;
90ace9e9 874 const Elf_Internal_Rela *rel, *relend;
90ace9e9 875 bfd *dynobj;
90ace9e9 876
90ace9e9
JT
877 dynobj = elf_hash_table (info)->dynobj;
878 if (dynobj == NULL)
b34976b6 879 return TRUE;
90ace9e9 880
babfd660
KH
881 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
882 sym_hashes = elf_sym_hashes (abfd);
883
90ace9e9
JT
884 relend = relocs + sec->reloc_count;
885 for (rel = relocs; rel < relend; rel++)
886 {
babfd660 887 unsigned long r_symndx;
3eb128b2
AM
888 struct elf_link_hash_entry *h = NULL;
889
890 r_symndx = ELF32_R_SYM (rel->r_info);
891 if (r_symndx >= symtab_hdr->sh_info)
892 {
893 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
894 while (h->root.type == bfd_link_hash_indirect
895 || h->root.type == bfd_link_hash_warning)
896 h = (struct elf_link_hash_entry *) h->root.u.i.link;
897 }
babfd660 898
90ace9e9
JT
899 switch (ELF32_R_TYPE (rel->r_info))
900 {
901 case R_VAX_GOT32:
3eb128b2
AM
902 if (h != NULL && h->got.refcount > 0)
903 --h->got.refcount;
90ace9e9
JT
904 break;
905
906 case R_VAX_PLT32:
907 case R_VAX_PC8:
908 case R_VAX_PC16:
909 case R_VAX_PC32:
910 case R_VAX_8:
911 case R_VAX_16:
912 case R_VAX_32:
3eb128b2
AM
913 if (h != NULL && h->plt.refcount > 0)
914 --h->plt.refcount;
90ace9e9
JT
915 break;
916
917 default:
918 break;
919 }
920 }
921
b34976b6 922 return TRUE;
90ace9e9
JT
923}
924
925/* Adjust a symbol defined by a dynamic object and referenced by a
926 regular object. The current definition is in some section of the
927 dynamic object, but we're not including those sections. We have to
928 change the definition to something the rest of the link can
929 understand. */
930
b34976b6 931static bfd_boolean
90ace9e9
JT
932elf_vax_adjust_dynamic_symbol (info, h)
933 struct bfd_link_info *info;
934 struct elf_link_hash_entry *h;
935{
936 bfd *dynobj;
937 asection *s;
938 unsigned int power_of_two;
939
940 dynobj = elf_hash_table (info)->dynobj;
941
942 /* Make sure we know what is going on here. */
943 BFD_ASSERT (dynobj != NULL
f5385ebf 944 && (h->needs_plt
f6e332e6 945 || h->u.weakdef != NULL
f5385ebf
AM
946 || (h->def_dynamic
947 && h->ref_regular
948 && !h->def_regular)));
90ace9e9
JT
949
950 /* If this is a function, put it in the procedure linkage table. We
951 will fill in the contents of the procedure linkage table later,
952 when we know the address of the .got section. */
953 if (h->type == STT_FUNC
f5385ebf 954 || h->needs_plt)
90ace9e9
JT
955 {
956 if (! info->shared
f5385ebf
AM
957 && !h->def_dynamic
958 && !h->ref_dynamic
90ace9e9
JT
959 /* We must always create the plt entry if it was referenced
960 by a PLTxxO relocation. In this case we already recorded
961 it as a dynamic symbol. */
962 && h->dynindx == -1)
963 {
964 /* This case can occur if we saw a PLTxx reloc in an input
965 file, but the symbol was never referred to by a dynamic
966 object. In such a case, we don't actually need to build
967 a procedure linkage table, and we can just do a PCxx
968 reloc instead. */
f5385ebf 969 BFD_ASSERT (h->needs_plt);
90ace9e9 970 h->plt.offset = (bfd_vma) -1;
b34976b6 971 return TRUE;
90ace9e9
JT
972 }
973
974 /* GC may have rendered this entry unused. */
975 if (h->plt.refcount <= 0)
976 {
f5385ebf 977 h->needs_plt = 0;
90ace9e9 978 h->plt.offset = (bfd_vma) -1;
b34976b6 979 return TRUE;
90ace9e9
JT
980 }
981
982 /* Make sure this symbol is output as a dynamic symbol. */
983 if (h->dynindx == -1)
984 {
c152c796 985 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 986 return FALSE;
90ace9e9
JT
987 }
988
989 s = bfd_get_section_by_name (dynobj, ".plt");
990 BFD_ASSERT (s != NULL);
991
992 /* If this is the first .plt entry, make room for the special
993 first entry. */
eea6121a 994 if (s->size == 0)
90ace9e9 995 {
eea6121a 996 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
997 }
998
999 /* If this symbol is not defined in a regular file, and we are
1000 not generating a shared library, then set the symbol to this
1001 location in the .plt. This is required to make function
1002 pointers compare as equal between the normal executable and
1003 the shared library. */
1004 if (!info->shared
f5385ebf 1005 && !h->def_regular)
90ace9e9
JT
1006 {
1007 h->root.u.def.section = s;
eea6121a 1008 h->root.u.def.value = s->size;
90ace9e9
JT
1009 }
1010
eea6121a 1011 h->plt.offset = s->size;
90ace9e9
JT
1012
1013 /* Make room for this entry. */
eea6121a 1014 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1015
1016 /* We also need to make an entry in the .got.plt section, which
1017 will be placed in the .got section by the linker script. */
1018
1019 s = bfd_get_section_by_name (dynobj, ".got.plt");
1020 BFD_ASSERT (s != NULL);
eea6121a 1021 s->size += 4;
90ace9e9
JT
1022
1023 /* We also need to make an entry in the .rela.plt section. */
1024
1025 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1026 BFD_ASSERT (s != NULL);
eea6121a 1027 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1028
b34976b6 1029 return TRUE;
90ace9e9
JT
1030 }
1031
1032 /* Reinitialize the plt offset now that it is not used as a reference
1033 count any more. */
1034 h->plt.offset = (bfd_vma) -1;
1035
1036 /* If this is a weak symbol, and there is a real definition, the
1037 processor independent code will have arranged for us to see the
1038 real definition first, and we can just use the same value. */
f6e332e6 1039 if (h->u.weakdef != NULL)
90ace9e9 1040 {
f6e332e6
AM
1041 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1042 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1043 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1044 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1045 return TRUE;
90ace9e9
JT
1046 }
1047
1048 /* This is a reference to a symbol defined by a dynamic object which
1049 is not a function. */
1050
1051 /* If we are creating a shared library, we must presume that the
1052 only references to the symbol are via the global offset table.
1053 For such cases we need not do anything here; the relocations will
1054 be handled correctly by relocate_section. */
1055 if (info->shared)
b34976b6 1056 return TRUE;
90ace9e9 1057
909272ee
AM
1058 if (h->size == 0)
1059 {
1060 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1061 h->root.root.string);
1062 return TRUE;
1063 }
1064
90ace9e9
JT
1065 /* We must allocate the symbol in our .dynbss section, which will
1066 become part of the .bss section of the executable. There will be
1067 an entry for this symbol in the .dynsym section. The dynamic
1068 object will contain position independent code, so all references
1069 from the dynamic object to this symbol will go through the global
1070 offset table. The dynamic linker will use the .dynsym entry to
1071 determine the address it must put in the global offset table, so
1072 both the dynamic object and the regular object will refer to the
1073 same memory location for the variable. */
1074
1075 s = bfd_get_section_by_name (dynobj, ".dynbss");
1076 BFD_ASSERT (s != NULL);
1077
1078 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1079 copy the initial value out of the dynamic object and into the
1080 runtime process image. We need to remember the offset into the
1081 .rela.bss section we are going to use. */
1082 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1083 {
1084 asection *srel;
1085
1086 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1087 BFD_ASSERT (srel != NULL);
eea6121a 1088 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1089 h->needs_copy = 1;
90ace9e9
JT
1090 }
1091
1092 /* We need to figure out the alignment required for this symbol. I
1093 have no idea how ELF linkers handle this. */
1094 power_of_two = bfd_log2 (h->size);
1095 if (power_of_two > 3)
1096 power_of_two = 3;
1097
1098 /* Apply the required alignment. */
eea6121a 1099 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
90ace9e9
JT
1100 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1101 {
1102 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 1103 return FALSE;
90ace9e9
JT
1104 }
1105
1106 /* Define the symbol as being at this point in the section. */
1107 h->root.u.def.section = s;
eea6121a 1108 h->root.u.def.value = s->size;
90ace9e9
JT
1109
1110 /* Increment the section size to make room for the symbol. */
eea6121a 1111 s->size += h->size;
90ace9e9 1112
b34976b6 1113 return TRUE;
90ace9e9
JT
1114}
1115
1116/* Set the sizes of the dynamic sections. */
1117
b34976b6 1118static bfd_boolean
ce71b576 1119elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1120{
1121 bfd *dynobj;
1122 asection *s;
b34976b6
AM
1123 bfd_boolean plt;
1124 bfd_boolean relocs;
1125 bfd_boolean reltext;
90ace9e9
JT
1126
1127 dynobj = elf_hash_table (info)->dynobj;
1128 BFD_ASSERT (dynobj != NULL);
1129
1130 if (elf_hash_table (info)->dynamic_sections_created)
1131 {
1132 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1133 if (info->executable)
90ace9e9
JT
1134 {
1135 s = bfd_get_section_by_name (dynobj, ".interp");
1136 BFD_ASSERT (s != NULL);
eea6121a 1137 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1138 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1139 }
1140 }
1141 else
1142 {
1143 /* We may have created entries in the .rela.got and .got sections.
1144 However, if we are not creating the dynamic sections, we will
1145 not actually use these entries. Reset the size of .rela.got
1146 and .got, which will cause it to get stripped from the output
1147 file below. */
1148 s = bfd_get_section_by_name (dynobj, ".rela.got");
1149 if (s != NULL)
eea6121a 1150 s->size = 0;
90ace9e9
JT
1151 s = bfd_get_section_by_name (dynobj, ".got.plt");
1152 if (s != NULL)
eea6121a 1153 s->size = 0;
90ace9e9
JT
1154 s = bfd_get_section_by_name (dynobj, ".got");
1155 if (s != NULL)
eea6121a 1156 s->size = 0;
90ace9e9
JT
1157 }
1158
1159 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1160 relative relocs against symbols defined in a regular object. We
1161 allocated space for them in the check_relocs routine, but we will not
1162 fill them in in the relocate_section routine. */
1163 if (info->shared && info->symbolic)
1164 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1165 elf_vax_discard_copies,
ce71b576 1166 NULL);
b29635ba 1167
b34976b6 1168 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1169 discard all the got entries we've recorded. Otherwise, we need to
1170 instantiate (allocate space for them). */
1171 elf_link_hash_traverse (elf_hash_table (info),
1172 elf_vax_instantiate_got_entries,
1173 (PTR) info);
90ace9e9
JT
1174
1175 /* The check_relocs and adjust_dynamic_symbol entry points have
1176 determined the sizes of the various dynamic sections. Allocate
1177 memory for them. */
b34976b6
AM
1178 plt = FALSE;
1179 relocs = FALSE;
1180 reltext = FALSE;
90ace9e9
JT
1181 for (s = dynobj->sections; s != NULL; s = s->next)
1182 {
1183 const char *name;
90ace9e9
JT
1184
1185 if ((s->flags & SEC_LINKER_CREATED) == 0)
1186 continue;
1187
1188 /* It's OK to base decisions on the section name, because none
1189 of the dynobj section names depend upon the input files. */
1190 name = bfd_get_section_name (dynobj, s);
1191
90ace9e9
JT
1192 if (strcmp (name, ".plt") == 0)
1193 {
c456f082
AM
1194 /* Remember whether there is a PLT. */
1195 plt = s->size != 0;
90ace9e9
JT
1196 }
1197 else if (strncmp (name, ".rela", 5) == 0)
1198 {
c456f082 1199 if (s->size != 0)
90ace9e9
JT
1200 {
1201 asection *target;
1202
1203 /* Remember whether there are any reloc sections other
1204 than .rela.plt. */
1205 if (strcmp (name, ".rela.plt") != 0)
1206 {
1207 const char *outname;
1208
b34976b6 1209 relocs = TRUE;
90ace9e9
JT
1210
1211 /* If this relocation section applies to a read only
1212 section, then we probably need a DT_TEXTREL
1213 entry. .rela.plt is actually associated with
1214 .got.plt, which is never readonly. */
1215 outname = bfd_get_section_name (output_bfd,
1216 s->output_section);
1217 target = bfd_get_section_by_name (output_bfd, outname + 5);
1218 if (target != NULL
1219 && (target->flags & SEC_READONLY) != 0
1220 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1221 reltext = TRUE;
90ace9e9
JT
1222 }
1223
1224 /* We use the reloc_count field as a counter if we need
1225 to copy relocs into the output file. */
1226 s->reloc_count = 0;
1227 }
1228 }
c456f082
AM
1229 else if (strncmp (name, ".got", 4) != 0
1230 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1231 {
1232 /* It's not one of our sections, so don't allocate space. */
1233 continue;
1234 }
1235
c456f082 1236 if (s->size == 0)
90ace9e9 1237 {
c456f082
AM
1238 /* If we don't need this section, strip it from the
1239 output file. This is mostly to handle .rela.bss and
1240 .rela.plt. We must create both sections in
1241 create_dynamic_sections, because they must be created
1242 before the linker maps input sections to output
1243 sections. The linker does that before
1244 adjust_dynamic_symbol is called, and it is that
1245 function which decides whether anything needs to go
1246 into these sections. */
8423293d 1247 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1248 continue;
1249 }
1250
c456f082
AM
1251 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1252 continue;
1253
90ace9e9 1254 /* Allocate memory for the section contents. */
eea6121a 1255 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1256 if (s->contents == NULL)
b34976b6 1257 return FALSE;
90ace9e9
JT
1258 }
1259
1260 if (elf_hash_table (info)->dynamic_sections_created)
1261 {
1262 /* Add some entries to the .dynamic section. We fill in the
1263 values later, in elf_vax_finish_dynamic_sections, but we
1264 must add the entries now so that we get the correct size for
1265 the .dynamic section. The DT_DEBUG entry is filled in by the
1266 dynamic linker and used by the debugger. */
1267#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1268 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1269
1270 if (!info->shared)
1271 {
1272 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1273 return FALSE;
90ace9e9
JT
1274 }
1275
1276 if (plt)
1277 {
1278 if (!add_dynamic_entry (DT_PLTGOT, 0)
1279 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1280 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1281 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1282 return FALSE;
90ace9e9
JT
1283 }
1284
1285 if (relocs)
1286 {
1287 if (!add_dynamic_entry (DT_RELA, 0)
1288 || !add_dynamic_entry (DT_RELASZ, 0)
1289 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1290 return FALSE;
90ace9e9
JT
1291 }
1292
1293 if (reltext || (info->flags & DF_TEXTREL) != 0)
1294 {
1295 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1296 return FALSE;
90ace9e9
JT
1297 }
1298 }
1299#undef add_dynamic_entry
1300
b34976b6 1301 return TRUE;
90ace9e9
JT
1302}
1303
1304/* This function is called via elf_vax_link_hash_traverse if we are
1305 creating a shared object with -Bsymbolic. It discards the space
1306 allocated to copy PC relative relocs against symbols which are defined
1307 in regular objects. We allocated space for them in the check_relocs
1308 routine, but we won't fill them in in the relocate_section routine. */
1309
b34976b6 1310static bfd_boolean
ce71b576
NC
1311elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1312 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1313{
1314 struct elf_vax_pcrel_relocs_copied *s;
1315
1316 if (h->root.root.type == bfd_link_hash_warning)
1317 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1318
1319 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1320 if (!h->root.def_regular)
b34976b6 1321 return TRUE;
90ace9e9
JT
1322
1323 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1324 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1325
b34976b6 1326 return TRUE;
90ace9e9
JT
1327}
1328
b29635ba
JT
1329/* This function is called via elf_link_hash_traverse. It looks for entries
1330 that have GOT or PLT (.GOT) references. If creating a static object or a
1331 shared object with -Bsymbolic, it resets the reference count back to 0
1332 and sets the offset to -1 so normal PC32 relocation will be done. If
1333 creating a shared object or executable, space in the .got and .rela.got
1334 will be reserved for the symbol. */
1335
b34976b6 1336static bfd_boolean
ce71b576 1337elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1338{
1339 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1340 bfd *dynobj;
1341 asection *sgot;
1342 asection *srelgot;
b34976b6 1343
b29635ba
JT
1344 /* We don't care about non-GOT (and non-PLT) entries. */
1345 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1346 return TRUE;
b29635ba
JT
1347
1348 dynobj = elf_hash_table (info)->dynobj;
1349 if (dynobj == NULL)
b34976b6 1350 return TRUE;
b29635ba
JT
1351
1352 sgot = bfd_get_section_by_name (dynobj, ".got");
1353 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1354
1355 if (!elf_hash_table (info)->dynamic_sections_created
1356 || (info->shared && info->symbolic))
1357 {
1358 h->got.refcount = 0;
1359 h->got.offset = (bfd_vma) -1;
1360 h->plt.refcount = 0;
1361 h->plt.offset = (bfd_vma) -1;
1362 }
1363 else if (h->got.refcount > 0)
1364 {
1365 /* Make sure this symbol is output as a dynamic symbol. */
1366 if (h->dynindx == -1)
1367 {
c152c796 1368 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1369 return FALSE;
b29635ba
JT
1370 }
1371
1372 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1373 sgot->size += 4;
1374 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1375 }
1376
b34976b6 1377 return TRUE;
b29635ba
JT
1378}
1379
90ace9e9
JT
1380/* Relocate an VAX ELF section. */
1381
b34976b6 1382static bfd_boolean
ce71b576
NC
1383elf_vax_relocate_section (bfd *output_bfd,
1384 struct bfd_link_info *info,
1385 bfd *input_bfd,
1386 asection *input_section,
1387 bfd_byte *contents,
1388 Elf_Internal_Rela *relocs,
1389 Elf_Internal_Sym *local_syms,
1390 asection **local_sections)
90ace9e9
JT
1391{
1392 bfd *dynobj;
1393 Elf_Internal_Shdr *symtab_hdr;
1394 struct elf_link_hash_entry **sym_hashes;
1395 bfd_vma *local_got_offsets;
1396 bfd_vma plt_index;
1397 bfd_vma got_offset;
1398 asection *sgot;
1399 asection *splt;
1400 asection *sgotplt;
1401 asection *sreloc;
1402 Elf_Internal_Rela *rel;
1403 Elf_Internal_Rela *relend;
1404
1049f94e 1405 if (info->relocatable)
b34976b6 1406 return TRUE;
f0fe0e16 1407
90ace9e9
JT
1408 dynobj = elf_hash_table (info)->dynobj;
1409 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1410 sym_hashes = elf_sym_hashes (input_bfd);
1411 local_got_offsets = elf_local_got_offsets (input_bfd);
1412
1413 sgot = NULL;
1414 splt = NULL;
1415 sgotplt = NULL;
1416 sreloc = NULL;
1417
1418 rel = relocs;
1419 relend = relocs + input_section->reloc_count;
1420 for (; rel < relend; rel++)
1421 {
1422 int r_type;
1423 reloc_howto_type *howto;
1424 unsigned long r_symndx;
1425 struct elf_link_hash_entry *h;
1426 Elf_Internal_Sym *sym;
1427 asection *sec;
1428 bfd_vma relocation;
1429 bfd_reloc_status_type r;
1430
1431 r_type = ELF32_R_TYPE (rel->r_info);
1432 if (r_type < 0 || r_type >= (int) R_VAX_max)
1433 {
1434 bfd_set_error (bfd_error_bad_value);
b34976b6 1435 return FALSE;
90ace9e9
JT
1436 }
1437 howto = howto_table + r_type;
1438
90ace9e9 1439 /* This is a final link. */
f0fe0e16 1440 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1441 h = NULL;
1442 sym = NULL;
1443 sec = NULL;
1444 if (r_symndx < symtab_hdr->sh_info)
1445 {
1446 sym = local_syms + r_symndx;
1447 sec = local_sections[r_symndx];
8517fae7 1448 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1449 }
1450 else
1451 {
560e09e9
NC
1452 bfd_boolean unresolved_reloc;
1453 bfd_boolean warned;
1454
b2a8e766
AM
1455 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1456 r_symndx, symtab_hdr, sym_hashes,
1457 h, sec, relocation,
1458 unresolved_reloc, warned);
ce71b576 1459
560e09e9 1460 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1461 || h->root.type == bfd_link_hash_defweak)
560e09e9 1462 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1463 && h->plt.offset != (bfd_vma) -1
1464 && elf_hash_table (info)->dynamic_sections_created)
1465 || (r_type == R_VAX_GOT32
1466 && strcmp (h->root.root.string,
1467 "_GLOBAL_OFFSET_TABLE_") != 0
1468 && elf_hash_table (info)->dynamic_sections_created
1469 && (! info->shared
1470 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1471 || !h->def_regular))
90ace9e9
JT
1472 || (info->shared
1473 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1474 || !h->def_regular)
90ace9e9
JT
1475 && ((input_section->flags & SEC_ALLOC) != 0
1476 /* DWARF will emit R_VAX_32 relocations in its
1477 sections against symbols defined externally
1478 in shared libraries. We can't do anything
1479 with them here. */
1480
1481 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1482 && h->def_dynamic))
90ace9e9
JT
1483 && (r_type == R_VAX_8
1484 || r_type == R_VAX_16
1485 || r_type == R_VAX_32
1486 || r_type == R_VAX_PC8
1487 || r_type == R_VAX_PC16
560e09e9
NC
1488 || r_type == R_VAX_PC32))))
1489 /* In these cases, we don't need the relocation
1490 value. We check specially because in some
1491 obscure cases sec->output_section will be NULL. */
90ace9e9 1492 relocation = 0;
90ace9e9
JT
1493 }
1494
1495 switch (r_type)
1496 {
1497 case R_VAX_GOT32:
1498 /* Relocation is to the address of the entry for this symbol
1499 in the global offset table. */
b29635ba 1500 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1501 break;
1502
1503 /* Relocation is the offset of the entry for this symbol in
1504 the global offset table. */
1505
1506 {
1507 bfd_vma off;
1508
90ace9e9
JT
1509 if (sgot == NULL)
1510 {
1511 sgot = bfd_get_section_by_name (dynobj, ".got");
1512 BFD_ASSERT (sgot != NULL);
1513 }
1514
1515 BFD_ASSERT (h != NULL);
1516 off = h->got.offset;
1517 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1518 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1519
1520 if (info->shared
1521 && h->dynindx == -1
f5385ebf 1522 && h->def_regular)
90ace9e9
JT
1523 {
1524 /* The symbol was forced to be local
1525 because of a version file.. We must initialize
1526 this entry in the global offset table. Since
1527 the offset must always be a multiple of 4, we
1528 use the least significant bit to record whether
1529 we have initialized it already.
1530
1531 When doing a dynamic link, we create a .rela.got
1532 relocation entry to initialize the value. This
1533 is done in the finish_dynamic_symbol routine. */
1534 if ((off & 1) != 0)
1535 off &= ~1;
1536 else
1537 {
1538 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1539 sgot->contents + off);
1540 h->got.offset |= 1;
1541 }
1542 } else {
1543 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1544 }
1545
1546 relocation = sgot->output_offset + off;
b29635ba 1547 /* The GOT relocation uses the addend. */
90ace9e9
JT
1548 rel->r_addend = 0;
1549
b29635ba
JT
1550 /* Change the reference to be indirect. */
1551 contents[rel->r_offset - 1] |= 0x10;
1552 relocation += sgot->output_section->vma;
90ace9e9
JT
1553 }
1554 break;
1555
1556 case R_VAX_PLT32:
1557 /* Relocation is to the entry for this symbol in the
1558 procedure linkage table. */
1559
1560 /* Resolve a PLTxx reloc against a local symbol directly,
1561 without using the procedure linkage table. */
1562 if (h == NULL)
1563 break;
1564
1565 if (h->plt.offset == (bfd_vma) -1
1566 || !elf_hash_table (info)->dynamic_sections_created)
1567 {
1568 /* We didn't make a PLT entry for this symbol. This
1569 happens when statically linking PIC code, or when
1570 using -Bsymbolic. */
1571 break;
1572 }
1573
1574 if (splt == NULL)
1575 {
1576 splt = bfd_get_section_by_name (dynobj, ".plt");
1577 BFD_ASSERT (splt != NULL);
1578 }
1579
1580 if (sgotplt == NULL)
1581 {
1582 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1583 BFD_ASSERT (splt != NULL);
1584 }
1585
1586 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1587
1588 /* Get the offset into the .got table of the entry that
1589 corresponds to this function. Each .got entry is 4 bytes.
1590 The first two are reserved. */
1591 got_offset = (plt_index + 3) * 4;
1592
1593 /* We want the relocate to point into the .got.plt instead
cedb70c5 1594 of the plt itself. */
90ace9e9
JT
1595 relocation = (sgotplt->output_section->vma
1596 + sgotplt->output_offset
1597 + got_offset);
1598 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1599 if (rel->r_addend == 2)
1600 {
1601 h->plt.offset |= 1;
1602 }
1603 else if (rel->r_addend != 0)
1604 (*_bfd_error_handler)
1605 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1606 bfd_get_filename (input_bfd), rel->r_addend,
1607 h->root.root.string,
1608 bfd_get_section_name (input_bfd, input_section));
1609 rel->r_addend = 0;
1610
1611 break;
1612
1613 case R_VAX_PC8:
1614 case R_VAX_PC16:
1615 case R_VAX_PC32:
1616 if (h == NULL)
1617 break;
1618 /* Fall through. */
1619 case R_VAX_8:
1620 case R_VAX_16:
1621 case R_VAX_32:
1622 if (info->shared
1623 && r_symndx != 0
1624 && (input_section->flags & SEC_ALLOC) != 0
1625 && ((r_type != R_VAX_PC8
1626 && r_type != R_VAX_PC16
1627 && r_type != R_VAX_PC32)
1628 || (!info->symbolic
f5385ebf 1629 || !h->def_regular)))
90ace9e9
JT
1630 {
1631 Elf_Internal_Rela outrel;
947216bf 1632 bfd_byte *loc;
b34976b6 1633 bfd_boolean skip, relocate;
90ace9e9
JT
1634
1635 /* When generating a shared object, these relocations
1636 are copied into the output file to be resolved at run
1637 time. */
90ace9e9
JT
1638 if (sreloc == NULL)
1639 {
1640 const char *name;
1641
1642 name = (bfd_elf_string_from_elf_section
1643 (input_bfd,
1644 elf_elfheader (input_bfd)->e_shstrndx,
1645 elf_section_data (input_section)->rel_hdr.sh_name));
1646 if (name == NULL)
b34976b6 1647 return FALSE;
90ace9e9
JT
1648
1649 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1650 && strcmp (bfd_get_section_name (input_bfd,
1651 input_section),
1652 name + 5) == 0);
1653
1654 sreloc = bfd_get_section_by_name (dynobj, name);
1655 BFD_ASSERT (sreloc != NULL);
1656 }
1657
b34976b6
AM
1658 skip = FALSE;
1659 relocate = FALSE;
90ace9e9
JT
1660
1661 outrel.r_offset =
1662 _bfd_elf_section_offset (output_bfd, info, input_section,
1663 rel->r_offset);
1664 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1665 skip = TRUE;
90ace9e9 1666 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1667 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1668 outrel.r_offset += (input_section->output_section->vma
1669 + input_section->output_offset);
1670
1671 if (skip)
1672 memset (&outrel, 0, sizeof outrel);
1673 /* h->dynindx may be -1 if the symbol was marked to
1674 become local. */
1675 else if (h != NULL
1676 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1677 || !h->def_regular))
90ace9e9
JT
1678 {
1679 BFD_ASSERT (h->dynindx != -1);
1680 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1681 outrel.r_addend = relocation + rel->r_addend;
1682 }
1683 else
1684 {
1685 if (r_type == R_VAX_32)
1686 {
b34976b6 1687 relocate = TRUE;
90ace9e9
JT
1688 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1689 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1690 &contents[rel->r_offset]) == 0);
1691 outrel.r_addend = relocation + rel->r_addend;
1692 }
1693 else
1694 {
1695 long indx;
1696
8517fae7 1697 if (bfd_is_abs_section (sec))
90ace9e9
JT
1698 indx = 0;
1699 else if (sec == NULL || sec->owner == NULL)
1700 {
1701 bfd_set_error (bfd_error_bad_value);
b34976b6 1702 return FALSE;
90ace9e9
JT
1703 }
1704 else
1705 {
1706 asection *osec;
1707
1708 osec = sec->output_section;
1709 indx = elf_section_data (osec)->dynindx;
1710 BFD_ASSERT (indx > 0);
1711 }
1712
1713 outrel.r_info = ELF32_R_INFO (indx, r_type);
1714 outrel.r_addend = relocation + rel->r_addend;
1715 }
1716 }
1717
1718 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1719 ".text") != 0 ||
90ace9e9
JT
1720 (info->shared
1721 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1722 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1723 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1724 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1725 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1726 {
1727 if (h != NULL)
1728 (*_bfd_error_handler)
1729 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1730 bfd_get_filename (input_bfd), howto->name,
1731 h->root.root.string,
1732 bfd_get_section_name (input_bfd, input_section));
1733 else
1734 (*_bfd_error_handler)
1735 (_("%s: warning: %s relocation to 0x%x from %s section"),
1736 bfd_get_filename (input_bfd), howto->name,
1737 outrel.r_addend,
1738 bfd_get_section_name (input_bfd, input_section));
1739 }
947216bf
AM
1740 loc = sreloc->contents;
1741 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1742 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1743
1744 /* This reloc will be computed at runtime, so there's no
1745 need to do anything now, except for R_VAX_32
1746 relocations that have been turned into
1747 R_VAX_RELATIVE. */
1748 if (!relocate)
1749 continue;
1750 }
1751
1752 break;
1753
1754 case R_VAX_GNU_VTINHERIT:
1755 case R_VAX_GNU_VTENTRY:
1756 /* These are no-ops in the end. */
1757 continue;
1758
1759 default:
1760 break;
1761 }
1762
b34976b6 1763 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1764 So subtract the difference from the relocation amount since we can't
1765 add it to the offset. */
90ace9e9 1766 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1767 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1768
1769 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1770 contents, rel->r_offset,
1771 relocation, rel->r_addend);
1772
1773 if (r != bfd_reloc_ok)
1774 {
1775 switch (r)
1776 {
1777 default:
1778 case bfd_reloc_outofrange:
1779 abort ();
1780 case bfd_reloc_overflow:
1781 {
1782 const char *name;
1783
1784 if (h != NULL)
dfeffb9f 1785 name = NULL;
90ace9e9
JT
1786 else
1787 {
1788 name = bfd_elf_string_from_elf_section (input_bfd,
1789 symtab_hdr->sh_link,
1790 sym->st_name);
1791 if (name == NULL)
b34976b6 1792 return FALSE;
90ace9e9
JT
1793 if (*name == '\0')
1794 name = bfd_section_name (input_bfd, sec);
1795 }
1796 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1797 (info, (h ? &h->root : NULL), name, howto->name,
1798 (bfd_vma) 0, input_bfd, input_section,
1799 rel->r_offset)))
b34976b6 1800 return FALSE;
90ace9e9
JT
1801 }
1802 break;
1803 }
1804 }
1805 }
1806
b34976b6 1807 return TRUE;
90ace9e9
JT
1808}
1809
1810/* Finish up dynamic symbol handling. We set the contents of various
1811 dynamic sections here. */
1812
b34976b6 1813static bfd_boolean
ce71b576
NC
1814elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1815 struct elf_link_hash_entry *h,
1816 Elf_Internal_Sym *sym)
90ace9e9
JT
1817{
1818 bfd *dynobj;
1819
1820 dynobj = elf_hash_table (info)->dynobj;
1821
1822 if (h->plt.offset != (bfd_vma) -1)
1823 {
1824 asection *splt;
1825 asection *sgot;
1826 asection *srela;
1827 bfd_vma plt_index;
1828 bfd_vma got_offset;
1829 bfd_vma addend;
1830 Elf_Internal_Rela rela;
947216bf 1831 bfd_byte *loc;
90ace9e9
JT
1832
1833 /* This symbol has an entry in the procedure linkage table. Set
1834 it up. */
90ace9e9
JT
1835 BFD_ASSERT (h->dynindx != -1);
1836
1837 splt = bfd_get_section_by_name (dynobj, ".plt");
1838 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1839 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1840 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1841
1842 addend = 2 * (h->plt.offset & 1);
1843 h->plt.offset &= ~1;
1844
1845 /* Get the index in the procedure linkage table which
1846 corresponds to this symbol. This is the index of this symbol
1847 in all the symbols for which we are making plt entries. The
1848 first entry in the procedure linkage table is reserved. */
1849 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1850
1851 /* Get the offset into the .got table of the entry that
1852 corresponds to this function. Each .got entry is 4 bytes.
1853 The first two are reserved. */
1854 got_offset = (plt_index + 3) * 4;
1855
1856 /* Fill in the entry in the procedure linkage table. */
1857 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1858 PLT_ENTRY_SIZE);
1859
1860 /* The offset is relative to the first extension word. */
1861 bfd_put_32 (output_bfd,
1862 -(h->plt.offset + 8),
1863 splt->contents + h->plt.offset + 4);
1864
1865 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1866 splt->contents + h->plt.offset + 8);
1867
1868 /* Fill in the entry in the global offset table. */
1869 bfd_put_32 (output_bfd,
1870 (splt->output_section->vma
1871 + splt->output_offset
1872 + h->plt.offset) + addend,
1873 sgot->contents + got_offset);
1874
1875 /* Fill in the entry in the .rela.plt section. */
1876 rela.r_offset = (sgot->output_section->vma
1877 + sgot->output_offset
1878 + got_offset);
1879 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1880 rela.r_addend = addend;
947216bf
AM
1881 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1882 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1883
f5385ebf 1884 if (!h->def_regular)
90ace9e9
JT
1885 {
1886 /* Mark the symbol as undefined, rather than as defined in
1887 the .plt section. Leave the value alone. */
1888 sym->st_shndx = SHN_UNDEF;
1889 }
1890 }
1891
1892 if (h->got.offset != (bfd_vma) -1)
1893 {
1894 asection *sgot;
1895 asection *srela;
1896 Elf_Internal_Rela rela;
947216bf 1897 bfd_byte *loc;
90ace9e9
JT
1898
1899 /* This symbol has an entry in the global offset table. Set it
1900 up. */
90ace9e9
JT
1901 sgot = bfd_get_section_by_name (dynobj, ".got");
1902 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1903 BFD_ASSERT (sgot != NULL && srela != NULL);
1904
1905 rela.r_offset = (sgot->output_section->vma
1906 + sgot->output_offset
1907 + (h->got.offset &~ 1));
1908
1909 /* If the symbol was forced to be local because of a version file
1910 locally we just want to emit a RELATIVE reloc. The entry in
1911 the global offset table will already have been initialized in
1912 the relocate_section function. */
1913 if (info->shared
1914 && h->dynindx == -1
f5385ebf 1915 && h->def_regular)
90ace9e9
JT
1916 {
1917 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1918 }
1919 else
1920 {
1921 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1922 }
1923 rela.r_addend = bfd_get_signed_32 (output_bfd,
1924 (sgot->contents
1925 + (h->got.offset & ~1)));
1926
947216bf
AM
1927 loc = srela->contents;
1928 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1929 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1930 }
1931
f5385ebf 1932 if (h->needs_copy)
90ace9e9
JT
1933 {
1934 asection *s;
1935 Elf_Internal_Rela rela;
947216bf 1936 bfd_byte *loc;
90ace9e9
JT
1937
1938 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1939 BFD_ASSERT (h->dynindx != -1
1940 && (h->root.type == bfd_link_hash_defined
1941 || h->root.type == bfd_link_hash_defweak));
1942
1943 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1944 ".rela.bss");
1945 BFD_ASSERT (s != NULL);
1946
1947 rela.r_offset = (h->root.u.def.value
1948 + h->root.u.def.section->output_section->vma
1949 + h->root.u.def.section->output_offset);
1950 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1951 rela.r_addend = 0;
947216bf
AM
1952 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1953 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1954 }
1955
1956 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1957 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1958 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1959 sym->st_shndx = SHN_ABS;
1960
b34976b6 1961 return TRUE;
90ace9e9
JT
1962}
1963
1964/* Finish up the dynamic sections. */
1965
b34976b6 1966static bfd_boolean
ce71b576 1967elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1968{
1969 bfd *dynobj;
1970 asection *sgot;
1971 asection *sdyn;
1972
1973 dynobj = elf_hash_table (info)->dynobj;
1974
1975 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1976 BFD_ASSERT (sgot != NULL);
1977 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1978
1979 if (elf_hash_table (info)->dynamic_sections_created)
1980 {
1981 asection *splt;
1982 Elf32_External_Dyn *dyncon, *dynconend;
1983
1984 splt = bfd_get_section_by_name (dynobj, ".plt");
1985 BFD_ASSERT (splt != NULL && sdyn != NULL);
1986
1987 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1988 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1989 for (; dyncon < dynconend; dyncon++)
1990 {
1991 Elf_Internal_Dyn dyn;
1992 const char *name;
1993 asection *s;
1994
1995 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1996
1997 switch (dyn.d_tag)
1998 {
1999 default:
2000 break;
2001
2002 case DT_PLTGOT:
2003 name = ".got";
2004 goto get_vma;
2005 case DT_JMPREL:
2006 name = ".rela.plt";
2007 get_vma:
2008 s = bfd_get_section_by_name (output_bfd, name);
2009 BFD_ASSERT (s != NULL);
2010 dyn.d_un.d_ptr = s->vma;
2011 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2012 break;
2013
2014 case DT_PLTRELSZ:
2015 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2016 BFD_ASSERT (s != NULL);
eea6121a 2017 dyn.d_un.d_val = s->size;
90ace9e9
JT
2018 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2019 break;
2020
2021 case DT_RELASZ:
2022 /* The procedure linkage table relocs (DT_JMPREL) should
2023 not be included in the overall relocs (DT_RELA).
2024 Therefore, we override the DT_RELASZ entry here to
2025 make it not include the JMPREL relocs. Since the
2026 linker script arranges for .rela.plt to follow all
2027 other relocation sections, we don't have to worry
2028 about changing the DT_RELA entry. */
2029 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2030 if (s != NULL)
eea6121a 2031 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2032 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2033 break;
2034 }
2035 }
2036
2037 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2038 if (splt->size > 0)
90ace9e9
JT
2039 {
2040 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2041 bfd_put_32 (output_bfd,
2042 (sgot->output_section->vma
2043 + sgot->output_offset + 4
2044 - (splt->output_section->vma + 6)),
2045 splt->contents + 2);
2046 bfd_put_32 (output_bfd,
2047 (sgot->output_section->vma
2048 + sgot->output_offset + 8
2049 - (splt->output_section->vma + 12)),
2050 splt->contents + 8);
cedb70c5 2051 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2052 = PLT_ENTRY_SIZE;
2053 }
2054 }
2055
2056 /* Fill in the first three entries in the global offset table. */
eea6121a 2057 if (sgot->size > 0)
90ace9e9
JT
2058 {
2059 if (sdyn == NULL)
2060 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2061 else
2062 bfd_put_32 (output_bfd,
2063 sdyn->output_section->vma + sdyn->output_offset,
2064 sgot->contents);
2065 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2066 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2067 }
2068
2069 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2070
b34976b6 2071 return TRUE;
90ace9e9
JT
2072}
2073
2074#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2075#define TARGET_LITTLE_NAME "elf32-vax"
2076#define ELF_MACHINE_CODE EM_VAX
2077#define ELF_MAXPAGESIZE 0x1000
2078
2079#define elf_backend_create_dynamic_sections \
2080 _bfd_elf_create_dynamic_sections
2081#define bfd_elf32_bfd_link_hash_table_create \
2082 elf_vax_link_hash_table_create
c152c796 2083#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2084
2085#define elf_backend_check_relocs elf_vax_check_relocs
2086#define elf_backend_adjust_dynamic_symbol \
2087 elf_vax_adjust_dynamic_symbol
2088#define elf_backend_size_dynamic_sections \
2089 elf_vax_size_dynamic_sections
2090#define elf_backend_relocate_section elf_vax_relocate_section
2091#define elf_backend_finish_dynamic_symbol \
2092 elf_vax_finish_dynamic_symbol
2093#define elf_backend_finish_dynamic_sections \
2094 elf_vax_finish_dynamic_sections
2095#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2096#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2097#define bfd_elf32_bfd_merge_private_bfd_data \
2098 elf32_vax_merge_private_bfd_data
2099#define bfd_elf32_bfd_set_private_flags \
2100 elf32_vax_set_private_flags
2101#define bfd_elf32_bfd_print_private_bfd_data \
2102 elf32_vax_print_private_bfd_data
2103
2104#define elf_backend_can_gc_sections 1
2105#define elf_backend_want_got_plt 1
2106#define elf_backend_plt_readonly 1
2107#define elf_backend_want_plt_sym 0
2108#define elf_backend_got_header_size 16
f0fe0e16 2109#define elf_backend_rela_normal 1
90ace9e9
JT
2110
2111#include "elf32-target.h"