]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-vax.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3eb128b2 3 2004, 2005 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
90ace9e9
JT
21
22#include "bfd.h"
23#include "sysdep.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576
NC
29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37static asection *elf_vax_gc_mark_hook (asection *, struct bfd_link_info *,
38 Elf_Internal_Rela *,
39 struct elf_link_hash_entry *,
40 Elf_Internal_Sym *);
41static bfd_boolean elf_vax_gc_sweep_hook (bfd *, struct bfd_link_info *,
42 asection *,
43 const Elf_Internal_Rela *);
44static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
45 struct elf_link_hash_entry *);
46static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
47static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
48 bfd *, asection *, bfd_byte *,
49 Elf_Internal_Rela *,
50 Elf_Internal_Sym *, asection **);
51static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
52 struct elf_link_hash_entry *,
53 Elf_Internal_Sym *);
54static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
55 struct bfd_link_info *);
56
57static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
58static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
59static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
60
61static reloc_howto_type howto_table[] = {
62 HOWTO (R_VAX_NONE, /* type */
63 0, /* rightshift */
64 0, /* size (0 = byte, 1 = short, 2 = long) */
65 0, /* bitsize */
b34976b6 66 FALSE, /* pc_relative */
90ace9e9
JT
67 0, /* bitpos */
68 complain_overflow_dont, /* complain_on_overflow */
69 bfd_elf_generic_reloc, /* special_function */
70 "R_VAX_NONE", /* name */
b34976b6 71 FALSE, /* partial_inplace */
90ace9e9
JT
72 0, /* src_mask */
73 0x00000000, /* dst_mask */
b34976b6 74 FALSE), /* pcrel_offset */
90ace9e9
JT
75
76 HOWTO (R_VAX_32, /* type */
77 0, /* rightshift */
78 2, /* size (0 = byte, 1 = short, 2 = long) */
79 32, /* bitsize */
b34976b6 80 FALSE, /* pc_relative */
90ace9e9
JT
81 0, /* bitpos */
82 complain_overflow_bitfield, /* complain_on_overflow */
83 bfd_elf_generic_reloc, /* special_function */
84 "R_VAX_32", /* name */
b34976b6 85 FALSE, /* partial_inplace */
90ace9e9
JT
86 0, /* src_mask */
87 0xffffffff, /* dst_mask */
b34976b6 88 FALSE), /* pcrel_offset */
90ace9e9
JT
89
90 HOWTO (R_VAX_16, /* type */
91 0, /* rightshift */
92 1, /* size (0 = byte, 1 = short, 2 = long) */
93 16, /* bitsize */
b34976b6 94 FALSE, /* pc_relative */
90ace9e9
JT
95 0, /* bitpos */
96 complain_overflow_bitfield, /* complain_on_overflow */
97 bfd_elf_generic_reloc, /* special_function */
98 "R_VAX_16", /* name */
b34976b6 99 FALSE, /* partial_inplace */
90ace9e9
JT
100 0, /* src_mask */
101 0x0000ffff, /* dst_mask */
b34976b6 102 FALSE), /* pcrel_offset */
90ace9e9
JT
103
104 HOWTO (R_VAX_8, /* type */
105 0, /* rightshift */
106 0, /* size (0 = byte, 1 = short, 2 = long) */
107 8, /* bitsize */
b34976b6 108 FALSE, /* pc_relative */
90ace9e9
JT
109 0, /* bitpos */
110 complain_overflow_bitfield, /* complain_on_overflow */
111 bfd_elf_generic_reloc, /* special_function */
112 "R_VAX_8", /* name */
b34976b6 113 FALSE, /* partial_inplace */
90ace9e9
JT
114 0, /* src_mask */
115 0x000000ff, /* dst_mask */
b34976b6 116 FALSE), /* pcrel_offset */
90ace9e9
JT
117
118 HOWTO (R_VAX_PC32, /* type */
119 0, /* rightshift */
120 2, /* size (0 = byte, 1 = short, 2 = long) */
121 32, /* bitsize */
b34976b6 122 TRUE, /* pc_relative */
90ace9e9
JT
123 0, /* bitpos */
124 complain_overflow_bitfield, /* complain_on_overflow */
125 bfd_elf_generic_reloc, /* special_function */
126 "R_VAX_PC32", /* name */
b34976b6 127 FALSE, /* partial_inplace */
90ace9e9
JT
128 0, /* src_mask */
129 0xffffffff, /* dst_mask */
b34976b6 130 TRUE), /* pcrel_offset */
90ace9e9
JT
131
132 HOWTO (R_VAX_PC16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 TRUE, /* pc_relative */
90ace9e9
JT
137 0, /* bitpos */
138 complain_overflow_signed, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_VAX_PC16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
90ace9e9
JT
142 0, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 TRUE), /* pcrel_offset */
90ace9e9
JT
145
146 HOWTO (R_VAX_PC8, /* type */
147 0, /* rightshift */
148 0, /* size (0 = byte, 1 = short, 2 = long) */
149 8, /* bitsize */
b34976b6 150 TRUE, /* pc_relative */
90ace9e9
JT
151 0, /* bitpos */
152 complain_overflow_signed, /* complain_on_overflow */
153 bfd_elf_generic_reloc, /* special_function */
154 "R_VAX_PC8", /* name */
b34976b6 155 FALSE, /* partial_inplace */
90ace9e9
JT
156 0, /* src_mask */
157 0x000000ff, /* dst_mask */
b34976b6 158 TRUE), /* pcrel_offset */
90ace9e9
JT
159
160 HOWTO (R_VAX_GOT32, /* type */
161 0, /* rightshift */
162 2, /* size (0 = byte, 1 = short, 2 = long) */
163 32, /* bitsize */
b34976b6 164 TRUE, /* pc_relative */
90ace9e9
JT
165 0, /* bitpos */
166 complain_overflow_bitfield, /* complain_on_overflow */
167 bfd_elf_generic_reloc, /* special_function */
168 "R_VAX_GOT32", /* name */
b34976b6 169 FALSE, /* partial_inplace */
90ace9e9
JT
170 0, /* src_mask */
171 0xffffffff, /* dst_mask */
b34976b6 172 TRUE), /* pcrel_offset */
90ace9e9
JT
173
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176 EMPTY_HOWTO (-1),
177 EMPTY_HOWTO (-1),
178 EMPTY_HOWTO (-1),
179
180 HOWTO (R_VAX_PLT32, /* type */
181 0, /* rightshift */
182 2, /* size (0 = byte, 1 = short, 2 = long) */
183 32, /* bitsize */
b34976b6 184 TRUE, /* pc_relative */
90ace9e9
JT
185 0, /* bitpos */
186 complain_overflow_bitfield, /* complain_on_overflow */
187 bfd_elf_generic_reloc, /* special_function */
188 "R_VAX_PLT32", /* name */
b34976b6 189 FALSE, /* partial_inplace */
90ace9e9
JT
190 0, /* src_mask */
191 0xffffffff, /* dst_mask */
b34976b6 192 TRUE), /* pcrel_offset */
90ace9e9
JT
193
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196 EMPTY_HOWTO (-1),
197 EMPTY_HOWTO (-1),
198 EMPTY_HOWTO (-1),
199
200 HOWTO (R_VAX_COPY, /* type */
201 0, /* rightshift */
202 0, /* size (0 = byte, 1 = short, 2 = long) */
203 0, /* bitsize */
b34976b6 204 FALSE, /* pc_relative */
90ace9e9
JT
205 0, /* bitpos */
206 complain_overflow_dont, /* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_VAX_COPY", /* name */
b34976b6 209 FALSE, /* partial_inplace */
90ace9e9
JT
210 0, /* src_mask */
211 0xffffffff, /* dst_mask */
b34976b6 212 FALSE), /* pcrel_offset */
90ace9e9
JT
213
214 HOWTO (R_VAX_GLOB_DAT, /* type */
215 0, /* rightshift */
216 2, /* size (0 = byte, 1 = short, 2 = long) */
217 32, /* bitsize */
b34976b6 218 FALSE, /* pc_relative */
90ace9e9
JT
219 0, /* bitpos */
220 complain_overflow_dont, /* complain_on_overflow */
221 bfd_elf_generic_reloc, /* special_function */
222 "R_VAX_GLOB_DAT", /* name */
b34976b6 223 FALSE, /* partial_inplace */
90ace9e9
JT
224 0, /* src_mask */
225 0xffffffff, /* dst_mask */
b34976b6 226 FALSE), /* pcrel_offset */
90ace9e9
JT
227
228 HOWTO (R_VAX_JMP_SLOT, /* type */
229 0, /* rightshift */
230 2, /* size (0 = byte, 1 = short, 2 = long) */
231 32, /* bitsize */
b34976b6 232 FALSE, /* pc_relative */
90ace9e9
JT
233 0, /* bitpos */
234 complain_overflow_dont, /* complain_on_overflow */
235 bfd_elf_generic_reloc, /* special_function */
236 "R_VAX_JMP_SLOT", /* name */
b34976b6 237 FALSE, /* partial_inplace */
90ace9e9
JT
238 0, /* src_mask */
239 0xffffffff, /* dst_mask */
b34976b6 240 FALSE), /* pcrel_offset */
90ace9e9
JT
241
242 HOWTO (R_VAX_RELATIVE, /* type */
243 0, /* rightshift */
244 2, /* size (0 = byte, 1 = short, 2 = long) */
245 32, /* bitsize */
b34976b6 246 FALSE, /* pc_relative */
90ace9e9
JT
247 0, /* bitpos */
248 complain_overflow_dont, /* complain_on_overflow */
249 bfd_elf_generic_reloc, /* special_function */
250 "R_VAX_RELATIVE", /* name */
b34976b6 251 FALSE, /* partial_inplace */
90ace9e9
JT
252 0, /* src_mask */
253 0xffffffff, /* dst_mask */
b34976b6 254 FALSE), /* pcrel_offset */
90ace9e9
JT
255
256 /* GNU extension to record C++ vtable hierarchy */
257 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
258 0, /* rightshift */
259 2, /* size (0 = byte, 1 = short, 2 = long) */
260 0, /* bitsize */
b34976b6 261 FALSE, /* pc_relative */
90ace9e9
JT
262 0, /* bitpos */
263 complain_overflow_dont, /* complain_on_overflow */
264 NULL, /* special_function */
265 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 266 FALSE, /* partial_inplace */
90ace9e9
JT
267 0, /* src_mask */
268 0, /* dst_mask */
b34976b6 269 FALSE), /* pcrel_offset */
90ace9e9
JT
270
271 /* GNU extension to record C++ vtable member usage */
272 HOWTO (R_VAX_GNU_VTENTRY, /* type */
273 0, /* rightshift */
274 2, /* size (0 = byte, 1 = short, 2 = long) */
275 0, /* bitsize */
b34976b6 276 FALSE, /* pc_relative */
90ace9e9
JT
277 0, /* bitpos */
278 complain_overflow_dont, /* complain_on_overflow */
279 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
280 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 281 FALSE, /* partial_inplace */
90ace9e9
JT
282 0, /* src_mask */
283 0, /* dst_mask */
b34976b6 284 FALSE), /* pcrel_offset */
90ace9e9
JT
285};
286
287static void
ce71b576
NC
288rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
289 Elf_Internal_Rela *dst)
90ace9e9
JT
290{
291 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
292 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
293}
294
295#define elf_info_to_howto rtype_to_howto
296
297static const struct
298{
299 bfd_reloc_code_real_type bfd_val;
300 int elf_val;
301} reloc_map[] = {
302 { BFD_RELOC_NONE, R_VAX_NONE },
303 { BFD_RELOC_32, R_VAX_32 },
304 { BFD_RELOC_16, R_VAX_16 },
305 { BFD_RELOC_8, R_VAX_8 },
306 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
307 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
308 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
309 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
310 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
311 { BFD_RELOC_NONE, R_VAX_COPY },
312 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
313 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
314 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
315 { BFD_RELOC_CTOR, R_VAX_32 },
316 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
317 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
318};
319
320static reloc_howto_type *
ce71b576 321reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
322{
323 unsigned int i;
324 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
325 {
326 if (reloc_map[i].bfd_val == code)
327 return &howto_table[reloc_map[i].elf_val];
328 }
329 return 0;
330}
331
332#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
333#define ELF_ARCH bfd_arch_vax
334/* end code generated by elf.el */
90ace9e9
JT
335\f
336/* Functions for the VAX ELF linker. */
337
338/* The name of the dynamic interpreter. This is put in the .interp
339 section. */
340
341#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
342
343/* The size in bytes of an entry in the procedure linkage table. */
344
345#define PLT_ENTRY_SIZE 12
346
347/* The first entry in a procedure linkage table looks like this. See
348 the SVR4 ABI VAX supplement to see how this works. */
349
350static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
351{
352 0xdd, 0xef, /* pushl l^ */
353 0, 0, 0, 0, /* offset to .plt.got + 4 */
354 0x17, 0xff, /* jmp @L^(pc) */
355 0, 0, 0, 0, /* offset to .plt.got + 8 */
356};
357
358/* Subsequent entries in a procedure linkage table look like this. */
359
360static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
361{
362 0x40, 0x00, /* .word ^M<r6> */
363 0x16, 0xef, /* jsb L^(pc) */
364 0, 0, 0, 0, /* replaced with offset to start of .plt */
365 0, 0, 0, 0, /* index into .rela.plt */
366};
367
368/* The VAX linker needs to keep track of the number of relocs that it
369 decides to copy in check_relocs for each symbol. This is so that it
370 can discard PC relative relocs if it doesn't need them when linking
371 with -Bsymbolic. We store the information in a field extending the
372 regular ELF linker hash table. */
373
374/* This structure keeps track of the number of PC relative relocs we have
375 copied for a given symbol. */
376
377struct elf_vax_pcrel_relocs_copied
378{
379 /* Next section. */
380 struct elf_vax_pcrel_relocs_copied *next;
381 /* A section in dynobj. */
382 asection *section;
383 /* Number of relocs copied in this section. */
384 bfd_size_type count;
385};
386
387/* VAX ELF linker hash entry. */
388
389struct elf_vax_link_hash_entry
390{
391 struct elf_link_hash_entry root;
392
393 /* Number of PC relative relocs copied for this symbol. */
394 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
395
396 bfd_vma got_addend;
397};
398
399/* VAX ELF linker hash table. */
400
401struct elf_vax_link_hash_table
402{
403 struct elf_link_hash_table root;
404};
405
406/* Declare this now that the above structures are defined. */
407
ce71b576
NC
408static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
409 PTR);
90ace9e9 410
b29635ba
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576
NC
413static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
414 PTR);
b29635ba 415
90ace9e9
JT
416/* Traverse an VAX ELF linker hash table. */
417
418#define elf_vax_link_hash_traverse(table, func, info) \
419 (elf_link_hash_traverse \
420 (&(table)->root, \
ce71b576 421 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
422 (info)))
423
424/* Get the VAX ELF linker hash table from a link_info structure. */
425
ce71b576 426#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
427
428/* Create an entry in an VAX ELF linker hash table. */
429
430static struct bfd_hash_entry *
ce71b576
NC
431elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
432 struct bfd_hash_table *table,
433 const char *string)
90ace9e9
JT
434{
435 struct elf_vax_link_hash_entry *ret =
436 (struct elf_vax_link_hash_entry *) entry;
437
438 /* Allocate the structure if it has not already been allocated by a
439 subclass. */
ce71b576 440 if (ret == NULL)
90ace9e9
JT
441 ret = ((struct elf_vax_link_hash_entry *)
442 bfd_hash_allocate (table,
443 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 444 if (ret == NULL)
90ace9e9
JT
445 return (struct bfd_hash_entry *) ret;
446
447 /* Call the allocation method of the superclass. */
448 ret = ((struct elf_vax_link_hash_entry *)
449 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
450 table, string));
ce71b576 451 if (ret != NULL)
90ace9e9
JT
452 {
453 ret->pcrel_relocs_copied = NULL;
454 }
455
456 return (struct bfd_hash_entry *) ret;
457}
458
459/* Create an VAX ELF linker hash table. */
460
461static struct bfd_link_hash_table *
ce71b576 462elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
463{
464 struct elf_vax_link_hash_table *ret;
465 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
466
ce71b576
NC
467 ret = bfd_malloc (amt);
468 if (ret == NULL)
90ace9e9
JT
469 return NULL;
470
471 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
472 elf_vax_link_hash_newfunc))
473 {
474 free (ret);
475 return NULL;
476 }
477
478 return &ret->root.root;
479}
480
481/* Keep vax-specific flags in the ELF header */
b34976b6 482static bfd_boolean
ce71b576 483elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
484{
485 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
486 elf_flags_init (abfd) = TRUE;
487 return TRUE;
90ace9e9
JT
488}
489
490/* Merge backend specific data from an object file to the output
491 object file when linking. */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
494{
495 flagword out_flags;
496 flagword in_flags;
497
498 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
499 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 500 return TRUE;
90ace9e9
JT
501
502 in_flags = elf_elfheader (ibfd)->e_flags;
503 out_flags = elf_elfheader (obfd)->e_flags;
504
505 if (!elf_flags_init (obfd))
506 {
b34976b6 507 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
508 elf_elfheader (obfd)->e_flags = in_flags;
509 }
510
b34976b6 511 return TRUE;
90ace9e9
JT
512}
513
514/* Display the flags field */
b34976b6 515static bfd_boolean
ce71b576 516elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
517{
518 FILE *file = (FILE *) ptr;
519
520 BFD_ASSERT (abfd != NULL && ptr != NULL);
521
522 /* Print normal ELF private data. */
523 _bfd_elf_print_private_bfd_data (abfd, ptr);
524
525 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
526
527 /* xgettext:c-format */
528 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
529
179d3252 530 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
531 fprintf (file, _(" [nonpic]"));
532
179d3252 533 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
534 fprintf (file, _(" [d-float]"));
535
179d3252 536 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
537 fprintf (file, _(" [g-float]"));
538
539 fputc ('\n', file);
540
b34976b6 541 return TRUE;
90ace9e9
JT
542}
543/* Look through the relocs for a section during the first phase, and
544 allocate space in the global offset table or procedure linkage
545 table. */
546
b34976b6 547static bfd_boolean
ce71b576
NC
548elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
549 const Elf_Internal_Rela *relocs)
90ace9e9
JT
550{
551 bfd *dynobj;
552 Elf_Internal_Shdr *symtab_hdr;
553 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
554 const Elf_Internal_Rela *rel;
555 const Elf_Internal_Rela *rel_end;
556 asection *sgot;
557 asection *srelgot;
558 asection *sreloc;
559
1049f94e 560 if (info->relocatable)
b34976b6 561 return TRUE;
90ace9e9
JT
562
563 dynobj = elf_hash_table (info)->dynobj;
564 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
565 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
566
567 sgot = NULL;
568 srelgot = NULL;
569 sreloc = NULL;
570
571 rel_end = relocs + sec->reloc_count;
572 for (rel = relocs; rel < rel_end; rel++)
573 {
574 unsigned long r_symndx;
575 struct elf_link_hash_entry *h;
576
577 r_symndx = ELF32_R_SYM (rel->r_info);
578
579 if (r_symndx < symtab_hdr->sh_info)
580 h = NULL;
581 else
973a3492
L
582 {
583 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
584 while (h->root.type == bfd_link_hash_indirect
585 || h->root.type == bfd_link_hash_warning)
586 h = (struct elf_link_hash_entry *) h->root.u.i.link;
587 }
90ace9e9
JT
588
589 switch (ELF32_R_TYPE (rel->r_info))
590 {
591 case R_VAX_GOT32:
592 if (h != NULL
593 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
594 break;
595
596 /* This symbol requires a global offset table entry. */
597
598 if (dynobj == NULL)
599 {
600 /* Create the .got section. */
601 elf_hash_table (info)->dynobj = dynobj = abfd;
602 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 603 return FALSE;
90ace9e9
JT
604 }
605
606 if (sgot == NULL)
607 {
608 sgot = bfd_get_section_by_name (dynobj, ".got");
609 BFD_ASSERT (sgot != NULL);
610 }
611
612 if (srelgot == NULL
613 && (h != NULL || info->shared))
614 {
615 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
616 if (srelgot == NULL)
617 {
3496cb2a
L
618 srelgot = bfd_make_section_with_flags (dynobj,
619 ".rela.got",
620 (SEC_ALLOC
621 | SEC_LOAD
622 | SEC_HAS_CONTENTS
623 | SEC_IN_MEMORY
624 | SEC_LINKER_CREATED
625 | SEC_READONLY));
90ace9e9 626 if (srelgot == NULL
90ace9e9 627 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 628 return FALSE;
90ace9e9
JT
629 }
630 }
631
632 if (h != NULL)
633 {
634 struct elf_vax_link_hash_entry *eh;
635
636 eh = (struct elf_vax_link_hash_entry *) h;
637 if (h->got.refcount == -1)
638 {
639 h->got.refcount = 1;
640 eh->got_addend = rel->r_addend;
90ace9e9
JT
641 }
642 else
643 {
644 h->got.refcount++;
645 if (eh->got_addend != (bfd_vma) rel->r_addend)
646 (*_bfd_error_handler)
647 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
648 bfd_get_filename (abfd), rel->r_addend,
649 h->root.root.string,
650 eh->got_addend);
cedb70c5 651
90ace9e9
JT
652 }
653 }
654 break;
655
656 case R_VAX_PLT32:
657 /* This symbol requires a procedure linkage table entry. We
658 actually build the entry in adjust_dynamic_symbol,
659 because this might be a case of linking PIC code which is
660 never referenced by a dynamic object, in which case we
661 don't need to generate a procedure linkage table entry
662 after all. */
663
664 /* If this is a local symbol, we resolve it directly without
665 creating a procedure linkage table entry. */
666 if (h == NULL)
667 continue;
668
f5385ebf 669 h->needs_plt = 1;
90ace9e9
JT
670 if (h->plt.refcount == -1)
671 h->plt.refcount = 1;
672 else
673 h->plt.refcount++;
674 break;
675
676 case R_VAX_PC8:
677 case R_VAX_PC16:
678 case R_VAX_PC32:
679 /* If we are creating a shared library and this is not a local
680 symbol, we need to copy the reloc into the shared library.
681 However when linking with -Bsymbolic and this is a global
682 symbol which is defined in an object we are including in the
683 link (i.e., DEF_REGULAR is set), then we can resolve the
684 reloc directly. At this point we have not seen all the input
685 files, so it is possible that DEF_REGULAR is not set now but
686 will be set later (it is never cleared). We account for that
687 possibility below by storing information in the
688 pcrel_relocs_copied field of the hash table entry. */
689 if (!(info->shared
690 && (sec->flags & SEC_ALLOC) != 0
691 && h != NULL
692 && (!info->symbolic
f5385ebf 693 || !h->def_regular)))
90ace9e9
JT
694 {
695 if (h != NULL)
696 {
697 /* Make sure a plt entry is created for this symbol if
698 it turns out to be a function defined by a dynamic
699 object. */
700 if (h->plt.refcount == -1)
701 h->plt.refcount = 1;
702 else
703 h->plt.refcount++;
704 }
705 break;
706 }
707 /* Fall through. */
708 case R_VAX_8:
709 case R_VAX_16:
710 case R_VAX_32:
711 if (h != NULL)
712 {
713 /* Make sure a plt entry is created for this symbol if it
714 turns out to be a function defined by a dynamic object. */
715 if (h->plt.refcount == -1)
716 h->plt.refcount = 1;
717 else
718 h->plt.refcount++;
719 }
720
721 /* If we are creating a shared library, we need to copy the
722 reloc into the shared library. */
723 if (info->shared
724 && (sec->flags & SEC_ALLOC) != 0)
725 {
726 /* When creating a shared object, we must copy these
727 reloc types into the output file. We create a reloc
728 section in dynobj and make room for this reloc. */
729 if (sreloc == NULL)
730 {
731 const char *name;
732
733 name = (bfd_elf_string_from_elf_section
734 (abfd,
735 elf_elfheader (abfd)->e_shstrndx,
736 elf_section_data (sec)->rel_hdr.sh_name));
737 if (name == NULL)
b34976b6 738 return FALSE;
90ace9e9
JT
739
740 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
741 && strcmp (bfd_get_section_name (abfd, sec),
742 name + 5) == 0);
743
744 sreloc = bfd_get_section_by_name (dynobj, name);
745 if (sreloc == NULL)
746 {
3496cb2a
L
747 sreloc = bfd_make_section_with_flags (dynobj,
748 name,
749 (SEC_ALLOC
750 | SEC_LOAD
751 | SEC_HAS_CONTENTS
752 | SEC_IN_MEMORY
753 | SEC_LINKER_CREATED
754 | SEC_READONLY));
90ace9e9 755 if (sreloc == NULL
90ace9e9 756 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 757 return FALSE;
90ace9e9
JT
758 }
759 if (sec->flags & SEC_READONLY)
760 info->flags |= DF_TEXTREL;
761 }
762
eea6121a 763 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
764
765 /* If we are linking with -Bsymbolic, we count the number of
766 PC relative relocations we have entered for this symbol,
767 so that we can discard them again if the symbol is later
768 defined by a regular object. Note that this function is
19852a2a 769 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
770 which means that h is really a pointer to an
771 elf_vax_link_hash_entry. */
772 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
773 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
774 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
775 && info->symbolic)
776 {
777 struct elf_vax_link_hash_entry *eh;
778 struct elf_vax_pcrel_relocs_copied *p;
779
780 eh = (struct elf_vax_link_hash_entry *) h;
781
782 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
783 if (p->section == sreloc)
784 break;
785
786 if (p == NULL)
787 {
788 p = ((struct elf_vax_pcrel_relocs_copied *)
789 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
790 if (p == NULL)
b34976b6 791 return FALSE;
90ace9e9
JT
792 p->next = eh->pcrel_relocs_copied;
793 eh->pcrel_relocs_copied = p;
794 p->section = sreloc;
795 p->count = 0;
796 }
797
798 ++p->count;
799 }
800 }
801
802 break;
803
804 /* This relocation describes the C++ object vtable hierarchy.
805 Reconstruct it for later use during GC. */
806 case R_VAX_GNU_VTINHERIT:
c152c796 807 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 808 return FALSE;
90ace9e9
JT
809 break;
810
811 /* This relocation describes which C++ vtable entries are actually
812 used. Record for later use during GC. */
813 case R_VAX_GNU_VTENTRY:
c152c796 814 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 815 return FALSE;
90ace9e9
JT
816 break;
817
818 default:
819 break;
820 }
821 }
822
b34976b6 823 return TRUE;
90ace9e9
JT
824}
825
826/* Return the section that should be marked against GC for a given
827 relocation. */
828
829static asection *
ce71b576
NC
830elf_vax_gc_mark_hook (asection *sec,
831 struct bfd_link_info *info ATTRIBUTE_UNUSED,
832 Elf_Internal_Rela *rel,
833 struct elf_link_hash_entry *h,
834 Elf_Internal_Sym *sym)
90ace9e9
JT
835{
836 if (h != NULL)
837 {
838 switch (ELF32_R_TYPE (rel->r_info))
839 {
840 case R_VAX_GNU_VTINHERIT:
841 case R_VAX_GNU_VTENTRY:
842 break;
843
844 default:
845 switch (h->root.type)
846 {
847 default:
848 break;
849
850 case bfd_link_hash_defined:
851 case bfd_link_hash_defweak:
852 return h->root.u.def.section;
853
854 case bfd_link_hash_common:
855 return h->root.u.c.p->section;
856 }
857 }
858 }
859 else
1e2f5b6e 860 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
90ace9e9
JT
861
862 return NULL;
863}
864
865/* Update the got entry reference counts for the section being removed. */
866
b34976b6 867static bfd_boolean
ce71b576
NC
868elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
869 const Elf_Internal_Rela *relocs)
90ace9e9
JT
870{
871 Elf_Internal_Shdr *symtab_hdr;
872 struct elf_link_hash_entry **sym_hashes;
90ace9e9 873 const Elf_Internal_Rela *rel, *relend;
90ace9e9 874 bfd *dynobj;
90ace9e9 875
90ace9e9
JT
876 dynobj = elf_hash_table (info)->dynobj;
877 if (dynobj == NULL)
b34976b6 878 return TRUE;
90ace9e9 879
babfd660
KH
880 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
881 sym_hashes = elf_sym_hashes (abfd);
882
90ace9e9
JT
883 relend = relocs + sec->reloc_count;
884 for (rel = relocs; rel < relend; rel++)
885 {
babfd660 886 unsigned long r_symndx;
3eb128b2
AM
887 struct elf_link_hash_entry *h = NULL;
888
889 r_symndx = ELF32_R_SYM (rel->r_info);
890 if (r_symndx >= symtab_hdr->sh_info)
891 {
892 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
893 while (h->root.type == bfd_link_hash_indirect
894 || h->root.type == bfd_link_hash_warning)
895 h = (struct elf_link_hash_entry *) h->root.u.i.link;
896 }
babfd660 897
90ace9e9
JT
898 switch (ELF32_R_TYPE (rel->r_info))
899 {
900 case R_VAX_GOT32:
3eb128b2
AM
901 if (h != NULL && h->got.refcount > 0)
902 --h->got.refcount;
90ace9e9
JT
903 break;
904
905 case R_VAX_PLT32:
906 case R_VAX_PC8:
907 case R_VAX_PC16:
908 case R_VAX_PC32:
909 case R_VAX_8:
910 case R_VAX_16:
911 case R_VAX_32:
3eb128b2
AM
912 if (h != NULL && h->plt.refcount > 0)
913 --h->plt.refcount;
90ace9e9
JT
914 break;
915
916 default:
917 break;
918 }
919 }
920
b34976b6 921 return TRUE;
90ace9e9
JT
922}
923
924/* Adjust a symbol defined by a dynamic object and referenced by a
925 regular object. The current definition is in some section of the
926 dynamic object, but we're not including those sections. We have to
927 change the definition to something the rest of the link can
928 understand. */
929
b34976b6 930static bfd_boolean
90ace9e9
JT
931elf_vax_adjust_dynamic_symbol (info, h)
932 struct bfd_link_info *info;
933 struct elf_link_hash_entry *h;
934{
935 bfd *dynobj;
936 asection *s;
937 unsigned int power_of_two;
938
939 dynobj = elf_hash_table (info)->dynobj;
940
941 /* Make sure we know what is going on here. */
942 BFD_ASSERT (dynobj != NULL
f5385ebf 943 && (h->needs_plt
f6e332e6 944 || h->u.weakdef != NULL
f5385ebf
AM
945 || (h->def_dynamic
946 && h->ref_regular
947 && !h->def_regular)));
90ace9e9
JT
948
949 /* If this is a function, put it in the procedure linkage table. We
950 will fill in the contents of the procedure linkage table later,
951 when we know the address of the .got section. */
952 if (h->type == STT_FUNC
f5385ebf 953 || h->needs_plt)
90ace9e9
JT
954 {
955 if (! info->shared
f5385ebf
AM
956 && !h->def_dynamic
957 && !h->ref_dynamic
90ace9e9
JT
958 /* We must always create the plt entry if it was referenced
959 by a PLTxxO relocation. In this case we already recorded
960 it as a dynamic symbol. */
961 && h->dynindx == -1)
962 {
963 /* This case can occur if we saw a PLTxx reloc in an input
964 file, but the symbol was never referred to by a dynamic
965 object. In such a case, we don't actually need to build
966 a procedure linkage table, and we can just do a PCxx
967 reloc instead. */
f5385ebf 968 BFD_ASSERT (h->needs_plt);
90ace9e9 969 h->plt.offset = (bfd_vma) -1;
b34976b6 970 return TRUE;
90ace9e9
JT
971 }
972
973 /* GC may have rendered this entry unused. */
974 if (h->plt.refcount <= 0)
975 {
f5385ebf 976 h->needs_plt = 0;
90ace9e9 977 h->plt.offset = (bfd_vma) -1;
b34976b6 978 return TRUE;
90ace9e9
JT
979 }
980
981 /* Make sure this symbol is output as a dynamic symbol. */
982 if (h->dynindx == -1)
983 {
c152c796 984 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 985 return FALSE;
90ace9e9
JT
986 }
987
988 s = bfd_get_section_by_name (dynobj, ".plt");
989 BFD_ASSERT (s != NULL);
990
991 /* If this is the first .plt entry, make room for the special
992 first entry. */
eea6121a 993 if (s->size == 0)
90ace9e9 994 {
eea6121a 995 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
996 }
997
998 /* If this symbol is not defined in a regular file, and we are
999 not generating a shared library, then set the symbol to this
1000 location in the .plt. This is required to make function
1001 pointers compare as equal between the normal executable and
1002 the shared library. */
1003 if (!info->shared
f5385ebf 1004 && !h->def_regular)
90ace9e9
JT
1005 {
1006 h->root.u.def.section = s;
eea6121a 1007 h->root.u.def.value = s->size;
90ace9e9
JT
1008 }
1009
eea6121a 1010 h->plt.offset = s->size;
90ace9e9
JT
1011
1012 /* Make room for this entry. */
eea6121a 1013 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1014
1015 /* We also need to make an entry in the .got.plt section, which
1016 will be placed in the .got section by the linker script. */
1017
1018 s = bfd_get_section_by_name (dynobj, ".got.plt");
1019 BFD_ASSERT (s != NULL);
eea6121a 1020 s->size += 4;
90ace9e9
JT
1021
1022 /* We also need to make an entry in the .rela.plt section. */
1023
1024 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1025 BFD_ASSERT (s != NULL);
eea6121a 1026 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1027
b34976b6 1028 return TRUE;
90ace9e9
JT
1029 }
1030
1031 /* Reinitialize the plt offset now that it is not used as a reference
1032 count any more. */
1033 h->plt.offset = (bfd_vma) -1;
1034
1035 /* If this is a weak symbol, and there is a real definition, the
1036 processor independent code will have arranged for us to see the
1037 real definition first, and we can just use the same value. */
f6e332e6 1038 if (h->u.weakdef != NULL)
90ace9e9 1039 {
f6e332e6
AM
1040 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1041 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1042 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1043 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1044 return TRUE;
90ace9e9
JT
1045 }
1046
1047 /* This is a reference to a symbol defined by a dynamic object which
1048 is not a function. */
1049
1050 /* If we are creating a shared library, we must presume that the
1051 only references to the symbol are via the global offset table.
1052 For such cases we need not do anything here; the relocations will
1053 be handled correctly by relocate_section. */
1054 if (info->shared)
b34976b6 1055 return TRUE;
90ace9e9 1056
909272ee
AM
1057 if (h->size == 0)
1058 {
1059 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1060 h->root.root.string);
1061 return TRUE;
1062 }
1063
90ace9e9
JT
1064 /* We must allocate the symbol in our .dynbss section, which will
1065 become part of the .bss section of the executable. There will be
1066 an entry for this symbol in the .dynsym section. The dynamic
1067 object will contain position independent code, so all references
1068 from the dynamic object to this symbol will go through the global
1069 offset table. The dynamic linker will use the .dynsym entry to
1070 determine the address it must put in the global offset table, so
1071 both the dynamic object and the regular object will refer to the
1072 same memory location for the variable. */
1073
1074 s = bfd_get_section_by_name (dynobj, ".dynbss");
1075 BFD_ASSERT (s != NULL);
1076
1077 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1078 copy the initial value out of the dynamic object and into the
1079 runtime process image. We need to remember the offset into the
1080 .rela.bss section we are going to use. */
1081 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1082 {
1083 asection *srel;
1084
1085 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1086 BFD_ASSERT (srel != NULL);
eea6121a 1087 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1088 h->needs_copy = 1;
90ace9e9
JT
1089 }
1090
1091 /* We need to figure out the alignment required for this symbol. I
1092 have no idea how ELF linkers handle this. */
1093 power_of_two = bfd_log2 (h->size);
1094 if (power_of_two > 3)
1095 power_of_two = 3;
1096
1097 /* Apply the required alignment. */
eea6121a 1098 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
90ace9e9
JT
1099 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1100 {
1101 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 1102 return FALSE;
90ace9e9
JT
1103 }
1104
1105 /* Define the symbol as being at this point in the section. */
1106 h->root.u.def.section = s;
eea6121a 1107 h->root.u.def.value = s->size;
90ace9e9
JT
1108
1109 /* Increment the section size to make room for the symbol. */
eea6121a 1110 s->size += h->size;
90ace9e9 1111
b34976b6 1112 return TRUE;
90ace9e9
JT
1113}
1114
1115/* Set the sizes of the dynamic sections. */
1116
b34976b6 1117static bfd_boolean
ce71b576 1118elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1119{
1120 bfd *dynobj;
1121 asection *s;
b34976b6
AM
1122 bfd_boolean plt;
1123 bfd_boolean relocs;
1124 bfd_boolean reltext;
90ace9e9
JT
1125
1126 dynobj = elf_hash_table (info)->dynobj;
1127 BFD_ASSERT (dynobj != NULL);
1128
1129 if (elf_hash_table (info)->dynamic_sections_created)
1130 {
1131 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1132 if (info->executable)
90ace9e9
JT
1133 {
1134 s = bfd_get_section_by_name (dynobj, ".interp");
1135 BFD_ASSERT (s != NULL);
eea6121a 1136 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1137 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1138 }
1139 }
1140 else
1141 {
1142 /* We may have created entries in the .rela.got and .got sections.
1143 However, if we are not creating the dynamic sections, we will
1144 not actually use these entries. Reset the size of .rela.got
1145 and .got, which will cause it to get stripped from the output
1146 file below. */
1147 s = bfd_get_section_by_name (dynobj, ".rela.got");
1148 if (s != NULL)
eea6121a 1149 s->size = 0;
90ace9e9
JT
1150 s = bfd_get_section_by_name (dynobj, ".got.plt");
1151 if (s != NULL)
eea6121a 1152 s->size = 0;
90ace9e9
JT
1153 s = bfd_get_section_by_name (dynobj, ".got");
1154 if (s != NULL)
eea6121a 1155 s->size = 0;
90ace9e9
JT
1156 }
1157
1158 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1159 relative relocs against symbols defined in a regular object. We
1160 allocated space for them in the check_relocs routine, but we will not
1161 fill them in in the relocate_section routine. */
1162 if (info->shared && info->symbolic)
1163 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1164 elf_vax_discard_copies,
ce71b576 1165 NULL);
b29635ba 1166
b34976b6 1167 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1168 discard all the got entries we've recorded. Otherwise, we need to
1169 instantiate (allocate space for them). */
1170 elf_link_hash_traverse (elf_hash_table (info),
1171 elf_vax_instantiate_got_entries,
1172 (PTR) info);
90ace9e9
JT
1173
1174 /* The check_relocs and adjust_dynamic_symbol entry points have
1175 determined the sizes of the various dynamic sections. Allocate
1176 memory for them. */
b34976b6
AM
1177 plt = FALSE;
1178 relocs = FALSE;
1179 reltext = FALSE;
90ace9e9
JT
1180 for (s = dynobj->sections; s != NULL; s = s->next)
1181 {
1182 const char *name;
90ace9e9
JT
1183
1184 if ((s->flags & SEC_LINKER_CREATED) == 0)
1185 continue;
1186
1187 /* It's OK to base decisions on the section name, because none
1188 of the dynobj section names depend upon the input files. */
1189 name = bfd_get_section_name (dynobj, s);
1190
90ace9e9
JT
1191 if (strcmp (name, ".plt") == 0)
1192 {
c456f082
AM
1193 /* Remember whether there is a PLT. */
1194 plt = s->size != 0;
90ace9e9
JT
1195 }
1196 else if (strncmp (name, ".rela", 5) == 0)
1197 {
c456f082 1198 if (s->size != 0)
90ace9e9
JT
1199 {
1200 asection *target;
1201
1202 /* Remember whether there are any reloc sections other
1203 than .rela.plt. */
1204 if (strcmp (name, ".rela.plt") != 0)
1205 {
1206 const char *outname;
1207
b34976b6 1208 relocs = TRUE;
90ace9e9
JT
1209
1210 /* If this relocation section applies to a read only
1211 section, then we probably need a DT_TEXTREL
1212 entry. .rela.plt is actually associated with
1213 .got.plt, which is never readonly. */
1214 outname = bfd_get_section_name (output_bfd,
1215 s->output_section);
1216 target = bfd_get_section_by_name (output_bfd, outname + 5);
1217 if (target != NULL
1218 && (target->flags & SEC_READONLY) != 0
1219 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1220 reltext = TRUE;
90ace9e9
JT
1221 }
1222
1223 /* We use the reloc_count field as a counter if we need
1224 to copy relocs into the output file. */
1225 s->reloc_count = 0;
1226 }
1227 }
c456f082
AM
1228 else if (strncmp (name, ".got", 4) != 0
1229 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1230 {
1231 /* It's not one of our sections, so don't allocate space. */
1232 continue;
1233 }
1234
c456f082 1235 if (s->size == 0)
90ace9e9 1236 {
c456f082
AM
1237 /* If we don't need this section, strip it from the
1238 output file. This is mostly to handle .rela.bss and
1239 .rela.plt. We must create both sections in
1240 create_dynamic_sections, because they must be created
1241 before the linker maps input sections to output
1242 sections. The linker does that before
1243 adjust_dynamic_symbol is called, and it is that
1244 function which decides whether anything needs to go
1245 into these sections. */
8423293d 1246 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1247 continue;
1248 }
1249
c456f082
AM
1250 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1251 continue;
1252
90ace9e9 1253 /* Allocate memory for the section contents. */
eea6121a 1254 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1255 if (s->contents == NULL)
b34976b6 1256 return FALSE;
90ace9e9
JT
1257 }
1258
1259 if (elf_hash_table (info)->dynamic_sections_created)
1260 {
1261 /* Add some entries to the .dynamic section. We fill in the
1262 values later, in elf_vax_finish_dynamic_sections, but we
1263 must add the entries now so that we get the correct size for
1264 the .dynamic section. The DT_DEBUG entry is filled in by the
1265 dynamic linker and used by the debugger. */
1266#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1267 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1268
1269 if (!info->shared)
1270 {
1271 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1272 return FALSE;
90ace9e9
JT
1273 }
1274
1275 if (plt)
1276 {
1277 if (!add_dynamic_entry (DT_PLTGOT, 0)
1278 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1279 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1280 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1281 return FALSE;
90ace9e9
JT
1282 }
1283
1284 if (relocs)
1285 {
1286 if (!add_dynamic_entry (DT_RELA, 0)
1287 || !add_dynamic_entry (DT_RELASZ, 0)
1288 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1289 return FALSE;
90ace9e9
JT
1290 }
1291
1292 if (reltext || (info->flags & DF_TEXTREL) != 0)
1293 {
1294 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1295 return FALSE;
90ace9e9
JT
1296 }
1297 }
1298#undef add_dynamic_entry
1299
b34976b6 1300 return TRUE;
90ace9e9
JT
1301}
1302
1303/* This function is called via elf_vax_link_hash_traverse if we are
1304 creating a shared object with -Bsymbolic. It discards the space
1305 allocated to copy PC relative relocs against symbols which are defined
1306 in regular objects. We allocated space for them in the check_relocs
1307 routine, but we won't fill them in in the relocate_section routine. */
1308
b34976b6 1309static bfd_boolean
ce71b576
NC
1310elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1311 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1312{
1313 struct elf_vax_pcrel_relocs_copied *s;
1314
1315 if (h->root.root.type == bfd_link_hash_warning)
1316 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1317
1318 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1319 if (!h->root.def_regular)
b34976b6 1320 return TRUE;
90ace9e9
JT
1321
1322 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1323 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1324
b34976b6 1325 return TRUE;
90ace9e9
JT
1326}
1327
b29635ba
JT
1328/* This function is called via elf_link_hash_traverse. It looks for entries
1329 that have GOT or PLT (.GOT) references. If creating a static object or a
1330 shared object with -Bsymbolic, it resets the reference count back to 0
1331 and sets the offset to -1 so normal PC32 relocation will be done. If
1332 creating a shared object or executable, space in the .got and .rela.got
1333 will be reserved for the symbol. */
1334
b34976b6 1335static bfd_boolean
ce71b576 1336elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1337{
1338 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1339 bfd *dynobj;
1340 asection *sgot;
1341 asection *srelgot;
b34976b6 1342
b29635ba
JT
1343 /* We don't care about non-GOT (and non-PLT) entries. */
1344 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1345 return TRUE;
b29635ba
JT
1346
1347 dynobj = elf_hash_table (info)->dynobj;
1348 if (dynobj == NULL)
b34976b6 1349 return TRUE;
b29635ba
JT
1350
1351 sgot = bfd_get_section_by_name (dynobj, ".got");
1352 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1353
1354 if (!elf_hash_table (info)->dynamic_sections_created
1355 || (info->shared && info->symbolic))
1356 {
1357 h->got.refcount = 0;
1358 h->got.offset = (bfd_vma) -1;
1359 h->plt.refcount = 0;
1360 h->plt.offset = (bfd_vma) -1;
1361 }
1362 else if (h->got.refcount > 0)
1363 {
1364 /* Make sure this symbol is output as a dynamic symbol. */
1365 if (h->dynindx == -1)
1366 {
c152c796 1367 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1368 return FALSE;
b29635ba
JT
1369 }
1370
1371 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1372 sgot->size += 4;
1373 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1374 }
1375
b34976b6 1376 return TRUE;
b29635ba
JT
1377}
1378
90ace9e9
JT
1379/* Relocate an VAX ELF section. */
1380
b34976b6 1381static bfd_boolean
ce71b576
NC
1382elf_vax_relocate_section (bfd *output_bfd,
1383 struct bfd_link_info *info,
1384 bfd *input_bfd,
1385 asection *input_section,
1386 bfd_byte *contents,
1387 Elf_Internal_Rela *relocs,
1388 Elf_Internal_Sym *local_syms,
1389 asection **local_sections)
90ace9e9
JT
1390{
1391 bfd *dynobj;
1392 Elf_Internal_Shdr *symtab_hdr;
1393 struct elf_link_hash_entry **sym_hashes;
1394 bfd_vma *local_got_offsets;
1395 bfd_vma plt_index;
1396 bfd_vma got_offset;
1397 asection *sgot;
1398 asection *splt;
1399 asection *sgotplt;
1400 asection *sreloc;
1401 Elf_Internal_Rela *rel;
1402 Elf_Internal_Rela *relend;
1403
1049f94e 1404 if (info->relocatable)
b34976b6 1405 return TRUE;
f0fe0e16 1406
90ace9e9
JT
1407 dynobj = elf_hash_table (info)->dynobj;
1408 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1409 sym_hashes = elf_sym_hashes (input_bfd);
1410 local_got_offsets = elf_local_got_offsets (input_bfd);
1411
1412 sgot = NULL;
1413 splt = NULL;
1414 sgotplt = NULL;
1415 sreloc = NULL;
1416
1417 rel = relocs;
1418 relend = relocs + input_section->reloc_count;
1419 for (; rel < relend; rel++)
1420 {
1421 int r_type;
1422 reloc_howto_type *howto;
1423 unsigned long r_symndx;
1424 struct elf_link_hash_entry *h;
1425 Elf_Internal_Sym *sym;
1426 asection *sec;
1427 bfd_vma relocation;
1428 bfd_reloc_status_type r;
1429
1430 r_type = ELF32_R_TYPE (rel->r_info);
1431 if (r_type < 0 || r_type >= (int) R_VAX_max)
1432 {
1433 bfd_set_error (bfd_error_bad_value);
b34976b6 1434 return FALSE;
90ace9e9
JT
1435 }
1436 howto = howto_table + r_type;
1437
90ace9e9 1438 /* This is a final link. */
f0fe0e16 1439 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1440 h = NULL;
1441 sym = NULL;
1442 sec = NULL;
1443 if (r_symndx < symtab_hdr->sh_info)
1444 {
1445 sym = local_syms + r_symndx;
1446 sec = local_sections[r_symndx];
8517fae7 1447 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1448 }
1449 else
1450 {
560e09e9
NC
1451 bfd_boolean unresolved_reloc;
1452 bfd_boolean warned;
1453
b2a8e766
AM
1454 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1455 r_symndx, symtab_hdr, sym_hashes,
1456 h, sec, relocation,
1457 unresolved_reloc, warned);
ce71b576 1458
560e09e9 1459 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1460 || h->root.type == bfd_link_hash_defweak)
560e09e9 1461 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1462 && h->plt.offset != (bfd_vma) -1
1463 && elf_hash_table (info)->dynamic_sections_created)
1464 || (r_type == R_VAX_GOT32
1465 && strcmp (h->root.root.string,
1466 "_GLOBAL_OFFSET_TABLE_") != 0
1467 && elf_hash_table (info)->dynamic_sections_created
1468 && (! info->shared
1469 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1470 || !h->def_regular))
90ace9e9
JT
1471 || (info->shared
1472 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1473 || !h->def_regular)
90ace9e9
JT
1474 && ((input_section->flags & SEC_ALLOC) != 0
1475 /* DWARF will emit R_VAX_32 relocations in its
1476 sections against symbols defined externally
1477 in shared libraries. We can't do anything
1478 with them here. */
1479
1480 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1481 && h->def_dynamic))
90ace9e9
JT
1482 && (r_type == R_VAX_8
1483 || r_type == R_VAX_16
1484 || r_type == R_VAX_32
1485 || r_type == R_VAX_PC8
1486 || r_type == R_VAX_PC16
560e09e9
NC
1487 || r_type == R_VAX_PC32))))
1488 /* In these cases, we don't need the relocation
1489 value. We check specially because in some
1490 obscure cases sec->output_section will be NULL. */
90ace9e9 1491 relocation = 0;
90ace9e9
JT
1492 }
1493
1494 switch (r_type)
1495 {
1496 case R_VAX_GOT32:
1497 /* Relocation is to the address of the entry for this symbol
1498 in the global offset table. */
b29635ba 1499 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1500 break;
1501
1502 /* Relocation is the offset of the entry for this symbol in
1503 the global offset table. */
1504
1505 {
1506 bfd_vma off;
1507
90ace9e9
JT
1508 if (sgot == NULL)
1509 {
1510 sgot = bfd_get_section_by_name (dynobj, ".got");
1511 BFD_ASSERT (sgot != NULL);
1512 }
1513
1514 BFD_ASSERT (h != NULL);
1515 off = h->got.offset;
1516 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1517 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1518
1519 if (info->shared
1520 && h->dynindx == -1
f5385ebf 1521 && h->def_regular)
90ace9e9
JT
1522 {
1523 /* The symbol was forced to be local
1524 because of a version file.. We must initialize
1525 this entry in the global offset table. Since
1526 the offset must always be a multiple of 4, we
1527 use the least significant bit to record whether
1528 we have initialized it already.
1529
1530 When doing a dynamic link, we create a .rela.got
1531 relocation entry to initialize the value. This
1532 is done in the finish_dynamic_symbol routine. */
1533 if ((off & 1) != 0)
1534 off &= ~1;
1535 else
1536 {
1537 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1538 sgot->contents + off);
1539 h->got.offset |= 1;
1540 }
1541 } else {
1542 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1543 }
1544
1545 relocation = sgot->output_offset + off;
b29635ba 1546 /* The GOT relocation uses the addend. */
90ace9e9
JT
1547 rel->r_addend = 0;
1548
b29635ba
JT
1549 /* Change the reference to be indirect. */
1550 contents[rel->r_offset - 1] |= 0x10;
1551 relocation += sgot->output_section->vma;
90ace9e9
JT
1552 }
1553 break;
1554
1555 case R_VAX_PLT32:
1556 /* Relocation is to the entry for this symbol in the
1557 procedure linkage table. */
1558
1559 /* Resolve a PLTxx reloc against a local symbol directly,
1560 without using the procedure linkage table. */
1561 if (h == NULL)
1562 break;
1563
1564 if (h->plt.offset == (bfd_vma) -1
1565 || !elf_hash_table (info)->dynamic_sections_created)
1566 {
1567 /* We didn't make a PLT entry for this symbol. This
1568 happens when statically linking PIC code, or when
1569 using -Bsymbolic. */
1570 break;
1571 }
1572
1573 if (splt == NULL)
1574 {
1575 splt = bfd_get_section_by_name (dynobj, ".plt");
1576 BFD_ASSERT (splt != NULL);
1577 }
1578
1579 if (sgotplt == NULL)
1580 {
1581 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1582 BFD_ASSERT (splt != NULL);
1583 }
1584
1585 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1586
1587 /* Get the offset into the .got table of the entry that
1588 corresponds to this function. Each .got entry is 4 bytes.
1589 The first two are reserved. */
1590 got_offset = (plt_index + 3) * 4;
1591
1592 /* We want the relocate to point into the .got.plt instead
cedb70c5 1593 of the plt itself. */
90ace9e9
JT
1594 relocation = (sgotplt->output_section->vma
1595 + sgotplt->output_offset
1596 + got_offset);
1597 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1598 if (rel->r_addend == 2)
1599 {
1600 h->plt.offset |= 1;
1601 }
1602 else if (rel->r_addend != 0)
1603 (*_bfd_error_handler)
1604 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1605 bfd_get_filename (input_bfd), rel->r_addend,
1606 h->root.root.string,
1607 bfd_get_section_name (input_bfd, input_section));
1608 rel->r_addend = 0;
1609
1610 break;
1611
1612 case R_VAX_PC8:
1613 case R_VAX_PC16:
1614 case R_VAX_PC32:
1615 if (h == NULL)
1616 break;
1617 /* Fall through. */
1618 case R_VAX_8:
1619 case R_VAX_16:
1620 case R_VAX_32:
1621 if (info->shared
1622 && r_symndx != 0
1623 && (input_section->flags & SEC_ALLOC) != 0
1624 && ((r_type != R_VAX_PC8
1625 && r_type != R_VAX_PC16
1626 && r_type != R_VAX_PC32)
1627 || (!info->symbolic
f5385ebf 1628 || !h->def_regular)))
90ace9e9
JT
1629 {
1630 Elf_Internal_Rela outrel;
947216bf 1631 bfd_byte *loc;
b34976b6 1632 bfd_boolean skip, relocate;
90ace9e9
JT
1633
1634 /* When generating a shared object, these relocations
1635 are copied into the output file to be resolved at run
1636 time. */
90ace9e9
JT
1637 if (sreloc == NULL)
1638 {
1639 const char *name;
1640
1641 name = (bfd_elf_string_from_elf_section
1642 (input_bfd,
1643 elf_elfheader (input_bfd)->e_shstrndx,
1644 elf_section_data (input_section)->rel_hdr.sh_name));
1645 if (name == NULL)
b34976b6 1646 return FALSE;
90ace9e9
JT
1647
1648 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1649 && strcmp (bfd_get_section_name (input_bfd,
1650 input_section),
1651 name + 5) == 0);
1652
1653 sreloc = bfd_get_section_by_name (dynobj, name);
1654 BFD_ASSERT (sreloc != NULL);
1655 }
1656
b34976b6
AM
1657 skip = FALSE;
1658 relocate = FALSE;
90ace9e9
JT
1659
1660 outrel.r_offset =
1661 _bfd_elf_section_offset (output_bfd, info, input_section,
1662 rel->r_offset);
1663 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1664 skip = TRUE;
90ace9e9 1665 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1666 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1667 outrel.r_offset += (input_section->output_section->vma
1668 + input_section->output_offset);
1669
1670 if (skip)
1671 memset (&outrel, 0, sizeof outrel);
1672 /* h->dynindx may be -1 if the symbol was marked to
1673 become local. */
1674 else if (h != NULL
1675 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1676 || !h->def_regular))
90ace9e9
JT
1677 {
1678 BFD_ASSERT (h->dynindx != -1);
1679 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1680 outrel.r_addend = relocation + rel->r_addend;
1681 }
1682 else
1683 {
1684 if (r_type == R_VAX_32)
1685 {
b34976b6 1686 relocate = TRUE;
90ace9e9
JT
1687 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1688 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1689 &contents[rel->r_offset]) == 0);
1690 outrel.r_addend = relocation + rel->r_addend;
1691 }
1692 else
1693 {
1694 long indx;
1695
8517fae7 1696 if (bfd_is_abs_section (sec))
90ace9e9
JT
1697 indx = 0;
1698 else if (sec == NULL || sec->owner == NULL)
1699 {
1700 bfd_set_error (bfd_error_bad_value);
b34976b6 1701 return FALSE;
90ace9e9
JT
1702 }
1703 else
1704 {
1705 asection *osec;
1706
1707 osec = sec->output_section;
1708 indx = elf_section_data (osec)->dynindx;
1709 BFD_ASSERT (indx > 0);
1710 }
1711
1712 outrel.r_info = ELF32_R_INFO (indx, r_type);
1713 outrel.r_addend = relocation + rel->r_addend;
1714 }
1715 }
1716
1717 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1718 ".text") != 0 ||
90ace9e9
JT
1719 (info->shared
1720 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1721 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1722 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1723 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1724 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1725 {
1726 if (h != NULL)
1727 (*_bfd_error_handler)
1728 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1729 bfd_get_filename (input_bfd), howto->name,
1730 h->root.root.string,
1731 bfd_get_section_name (input_bfd, input_section));
1732 else
1733 (*_bfd_error_handler)
1734 (_("%s: warning: %s relocation to 0x%x from %s section"),
1735 bfd_get_filename (input_bfd), howto->name,
1736 outrel.r_addend,
1737 bfd_get_section_name (input_bfd, input_section));
1738 }
947216bf
AM
1739 loc = sreloc->contents;
1740 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1741 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1742
1743 /* This reloc will be computed at runtime, so there's no
1744 need to do anything now, except for R_VAX_32
1745 relocations that have been turned into
1746 R_VAX_RELATIVE. */
1747 if (!relocate)
1748 continue;
1749 }
1750
1751 break;
1752
1753 case R_VAX_GNU_VTINHERIT:
1754 case R_VAX_GNU_VTENTRY:
1755 /* These are no-ops in the end. */
1756 continue;
1757
1758 default:
1759 break;
1760 }
1761
b34976b6 1762 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1763 So subtract the difference from the relocation amount since we can't
1764 add it to the offset. */
90ace9e9 1765 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1766 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1767
1768 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1769 contents, rel->r_offset,
1770 relocation, rel->r_addend);
1771
1772 if (r != bfd_reloc_ok)
1773 {
1774 switch (r)
1775 {
1776 default:
1777 case bfd_reloc_outofrange:
1778 abort ();
1779 case bfd_reloc_overflow:
1780 {
1781 const char *name;
1782
1783 if (h != NULL)
dfeffb9f 1784 name = NULL;
90ace9e9
JT
1785 else
1786 {
1787 name = bfd_elf_string_from_elf_section (input_bfd,
1788 symtab_hdr->sh_link,
1789 sym->st_name);
1790 if (name == NULL)
b34976b6 1791 return FALSE;
90ace9e9
JT
1792 if (*name == '\0')
1793 name = bfd_section_name (input_bfd, sec);
1794 }
1795 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1796 (info, (h ? &h->root : NULL), name, howto->name,
1797 (bfd_vma) 0, input_bfd, input_section,
1798 rel->r_offset)))
b34976b6 1799 return FALSE;
90ace9e9
JT
1800 }
1801 break;
1802 }
1803 }
1804 }
1805
b34976b6 1806 return TRUE;
90ace9e9
JT
1807}
1808
1809/* Finish up dynamic symbol handling. We set the contents of various
1810 dynamic sections here. */
1811
b34976b6 1812static bfd_boolean
ce71b576
NC
1813elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1814 struct elf_link_hash_entry *h,
1815 Elf_Internal_Sym *sym)
90ace9e9
JT
1816{
1817 bfd *dynobj;
1818
1819 dynobj = elf_hash_table (info)->dynobj;
1820
1821 if (h->plt.offset != (bfd_vma) -1)
1822 {
1823 asection *splt;
1824 asection *sgot;
1825 asection *srela;
1826 bfd_vma plt_index;
1827 bfd_vma got_offset;
1828 bfd_vma addend;
1829 Elf_Internal_Rela rela;
947216bf 1830 bfd_byte *loc;
90ace9e9
JT
1831
1832 /* This symbol has an entry in the procedure linkage table. Set
1833 it up. */
90ace9e9
JT
1834 BFD_ASSERT (h->dynindx != -1);
1835
1836 splt = bfd_get_section_by_name (dynobj, ".plt");
1837 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1838 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1839 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1840
1841 addend = 2 * (h->plt.offset & 1);
1842 h->plt.offset &= ~1;
1843
1844 /* Get the index in the procedure linkage table which
1845 corresponds to this symbol. This is the index of this symbol
1846 in all the symbols for which we are making plt entries. The
1847 first entry in the procedure linkage table is reserved. */
1848 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1849
1850 /* Get the offset into the .got table of the entry that
1851 corresponds to this function. Each .got entry is 4 bytes.
1852 The first two are reserved. */
1853 got_offset = (plt_index + 3) * 4;
1854
1855 /* Fill in the entry in the procedure linkage table. */
1856 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1857 PLT_ENTRY_SIZE);
1858
1859 /* The offset is relative to the first extension word. */
1860 bfd_put_32 (output_bfd,
1861 -(h->plt.offset + 8),
1862 splt->contents + h->plt.offset + 4);
1863
1864 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1865 splt->contents + h->plt.offset + 8);
1866
1867 /* Fill in the entry in the global offset table. */
1868 bfd_put_32 (output_bfd,
1869 (splt->output_section->vma
1870 + splt->output_offset
1871 + h->plt.offset) + addend,
1872 sgot->contents + got_offset);
1873
1874 /* Fill in the entry in the .rela.plt section. */
1875 rela.r_offset = (sgot->output_section->vma
1876 + sgot->output_offset
1877 + got_offset);
1878 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1879 rela.r_addend = addend;
947216bf
AM
1880 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1881 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1882
f5385ebf 1883 if (!h->def_regular)
90ace9e9
JT
1884 {
1885 /* Mark the symbol as undefined, rather than as defined in
1886 the .plt section. Leave the value alone. */
1887 sym->st_shndx = SHN_UNDEF;
1888 }
1889 }
1890
1891 if (h->got.offset != (bfd_vma) -1)
1892 {
1893 asection *sgot;
1894 asection *srela;
1895 Elf_Internal_Rela rela;
947216bf 1896 bfd_byte *loc;
90ace9e9
JT
1897
1898 /* This symbol has an entry in the global offset table. Set it
1899 up. */
90ace9e9
JT
1900 sgot = bfd_get_section_by_name (dynobj, ".got");
1901 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1902 BFD_ASSERT (sgot != NULL && srela != NULL);
1903
1904 rela.r_offset = (sgot->output_section->vma
1905 + sgot->output_offset
1906 + (h->got.offset &~ 1));
1907
1908 /* If the symbol was forced to be local because of a version file
1909 locally we just want to emit a RELATIVE reloc. The entry in
1910 the global offset table will already have been initialized in
1911 the relocate_section function. */
1912 if (info->shared
1913 && h->dynindx == -1
f5385ebf 1914 && h->def_regular)
90ace9e9
JT
1915 {
1916 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1917 }
1918 else
1919 {
1920 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1921 }
1922 rela.r_addend = bfd_get_signed_32 (output_bfd,
1923 (sgot->contents
1924 + (h->got.offset & ~1)));
1925
947216bf
AM
1926 loc = srela->contents;
1927 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1928 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1929 }
1930
f5385ebf 1931 if (h->needs_copy)
90ace9e9
JT
1932 {
1933 asection *s;
1934 Elf_Internal_Rela rela;
947216bf 1935 bfd_byte *loc;
90ace9e9
JT
1936
1937 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1938 BFD_ASSERT (h->dynindx != -1
1939 && (h->root.type == bfd_link_hash_defined
1940 || h->root.type == bfd_link_hash_defweak));
1941
1942 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1943 ".rela.bss");
1944 BFD_ASSERT (s != NULL);
1945
1946 rela.r_offset = (h->root.u.def.value
1947 + h->root.u.def.section->output_section->vma
1948 + h->root.u.def.section->output_offset);
1949 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1950 rela.r_addend = 0;
947216bf
AM
1951 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1952 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1953 }
1954
1955 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1956 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1957 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1958 sym->st_shndx = SHN_ABS;
1959
b34976b6 1960 return TRUE;
90ace9e9
JT
1961}
1962
1963/* Finish up the dynamic sections. */
1964
b34976b6 1965static bfd_boolean
ce71b576 1966elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1967{
1968 bfd *dynobj;
1969 asection *sgot;
1970 asection *sdyn;
1971
1972 dynobj = elf_hash_table (info)->dynobj;
1973
1974 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1975 BFD_ASSERT (sgot != NULL);
1976 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1977
1978 if (elf_hash_table (info)->dynamic_sections_created)
1979 {
1980 asection *splt;
1981 Elf32_External_Dyn *dyncon, *dynconend;
1982
1983 splt = bfd_get_section_by_name (dynobj, ".plt");
1984 BFD_ASSERT (splt != NULL && sdyn != NULL);
1985
1986 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1987 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1988 for (; dyncon < dynconend; dyncon++)
1989 {
1990 Elf_Internal_Dyn dyn;
1991 const char *name;
1992 asection *s;
1993
1994 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1995
1996 switch (dyn.d_tag)
1997 {
1998 default:
1999 break;
2000
2001 case DT_PLTGOT:
2002 name = ".got";
2003 goto get_vma;
2004 case DT_JMPREL:
2005 name = ".rela.plt";
2006 get_vma:
2007 s = bfd_get_section_by_name (output_bfd, name);
2008 BFD_ASSERT (s != NULL);
2009 dyn.d_un.d_ptr = s->vma;
2010 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2011 break;
2012
2013 case DT_PLTRELSZ:
2014 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2015 BFD_ASSERT (s != NULL);
eea6121a 2016 dyn.d_un.d_val = s->size;
90ace9e9
JT
2017 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2018 break;
2019
2020 case DT_RELASZ:
2021 /* The procedure linkage table relocs (DT_JMPREL) should
2022 not be included in the overall relocs (DT_RELA).
2023 Therefore, we override the DT_RELASZ entry here to
2024 make it not include the JMPREL relocs. Since the
2025 linker script arranges for .rela.plt to follow all
2026 other relocation sections, we don't have to worry
2027 about changing the DT_RELA entry. */
2028 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2029 if (s != NULL)
eea6121a 2030 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2031 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2032 break;
2033 }
2034 }
2035
2036 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2037 if (splt->size > 0)
90ace9e9
JT
2038 {
2039 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2040 bfd_put_32 (output_bfd,
2041 (sgot->output_section->vma
2042 + sgot->output_offset + 4
2043 - (splt->output_section->vma + 6)),
2044 splt->contents + 2);
2045 bfd_put_32 (output_bfd,
2046 (sgot->output_section->vma
2047 + sgot->output_offset + 8
2048 - (splt->output_section->vma + 12)),
2049 splt->contents + 8);
cedb70c5 2050 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2051 = PLT_ENTRY_SIZE;
2052 }
2053 }
2054
2055 /* Fill in the first three entries in the global offset table. */
eea6121a 2056 if (sgot->size > 0)
90ace9e9
JT
2057 {
2058 if (sdyn == NULL)
2059 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2060 else
2061 bfd_put_32 (output_bfd,
2062 sdyn->output_section->vma + sdyn->output_offset,
2063 sgot->contents);
2064 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2065 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2066 }
2067
2068 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2069
b34976b6 2070 return TRUE;
90ace9e9
JT
2071}
2072
2073#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2074#define TARGET_LITTLE_NAME "elf32-vax"
2075#define ELF_MACHINE_CODE EM_VAX
2076#define ELF_MAXPAGESIZE 0x1000
2077
2078#define elf_backend_create_dynamic_sections \
2079 _bfd_elf_create_dynamic_sections
2080#define bfd_elf32_bfd_link_hash_table_create \
2081 elf_vax_link_hash_table_create
c152c796 2082#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2083
2084#define elf_backend_check_relocs elf_vax_check_relocs
2085#define elf_backend_adjust_dynamic_symbol \
2086 elf_vax_adjust_dynamic_symbol
2087#define elf_backend_size_dynamic_sections \
2088 elf_vax_size_dynamic_sections
2089#define elf_backend_relocate_section elf_vax_relocate_section
2090#define elf_backend_finish_dynamic_symbol \
2091 elf_vax_finish_dynamic_symbol
2092#define elf_backend_finish_dynamic_sections \
2093 elf_vax_finish_dynamic_sections
2094#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2095#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2096#define bfd_elf32_bfd_merge_private_bfd_data \
2097 elf32_vax_merge_private_bfd_data
2098#define bfd_elf32_bfd_set_private_flags \
2099 elf32_vax_set_private_flags
2100#define bfd_elf32_bfd_print_private_bfd_data \
2101 elf32_vax_print_private_bfd_data
2102
2103#define elf_backend_can_gc_sections 1
2104#define elf_backend_want_got_plt 1
2105#define elf_backend_plt_readonly 1
2106#define elf_backend_want_plt_sym 0
2107#define elf_backend_got_header_size 16
f0fe0e16 2108#define elf_backend_rela_normal 1
90ace9e9
JT
2109
2110#include "elf32-target.h"