]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-vax.c
2005-06-20 H.J. Lu <hongjiu.lu@intel.com>
[thirdparty/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3eb128b2 3 2004, 2005 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
3e110533 20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
90ace9e9
JT
21
22#include "bfd.h"
23#include "sysdep.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576
NC
29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
37static asection *elf_vax_gc_mark_hook (asection *, struct bfd_link_info *,
38 Elf_Internal_Rela *,
39 struct elf_link_hash_entry *,
40 Elf_Internal_Sym *);
41static bfd_boolean elf_vax_gc_sweep_hook (bfd *, struct bfd_link_info *,
42 asection *,
43 const Elf_Internal_Rela *);
44static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
45 struct elf_link_hash_entry *);
46static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
47static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
48 bfd *, asection *, bfd_byte *,
49 Elf_Internal_Rela *,
50 Elf_Internal_Sym *, asection **);
51static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
52 struct elf_link_hash_entry *,
53 Elf_Internal_Sym *);
54static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
55 struct bfd_link_info *);
56
57static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
58static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
59static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
60
61static reloc_howto_type howto_table[] = {
62 HOWTO (R_VAX_NONE, /* type */
63 0, /* rightshift */
64 0, /* size (0 = byte, 1 = short, 2 = long) */
65 0, /* bitsize */
b34976b6 66 FALSE, /* pc_relative */
90ace9e9
JT
67 0, /* bitpos */
68 complain_overflow_dont, /* complain_on_overflow */
69 bfd_elf_generic_reloc, /* special_function */
70 "R_VAX_NONE", /* name */
b34976b6 71 FALSE, /* partial_inplace */
90ace9e9
JT
72 0, /* src_mask */
73 0x00000000, /* dst_mask */
b34976b6 74 FALSE), /* pcrel_offset */
90ace9e9
JT
75
76 HOWTO (R_VAX_32, /* type */
77 0, /* rightshift */
78 2, /* size (0 = byte, 1 = short, 2 = long) */
79 32, /* bitsize */
b34976b6 80 FALSE, /* pc_relative */
90ace9e9
JT
81 0, /* bitpos */
82 complain_overflow_bitfield, /* complain_on_overflow */
83 bfd_elf_generic_reloc, /* special_function */
84 "R_VAX_32", /* name */
b34976b6 85 FALSE, /* partial_inplace */
90ace9e9
JT
86 0, /* src_mask */
87 0xffffffff, /* dst_mask */
b34976b6 88 FALSE), /* pcrel_offset */
90ace9e9
JT
89
90 HOWTO (R_VAX_16, /* type */
91 0, /* rightshift */
92 1, /* size (0 = byte, 1 = short, 2 = long) */
93 16, /* bitsize */
b34976b6 94 FALSE, /* pc_relative */
90ace9e9
JT
95 0, /* bitpos */
96 complain_overflow_bitfield, /* complain_on_overflow */
97 bfd_elf_generic_reloc, /* special_function */
98 "R_VAX_16", /* name */
b34976b6 99 FALSE, /* partial_inplace */
90ace9e9
JT
100 0, /* src_mask */
101 0x0000ffff, /* dst_mask */
b34976b6 102 FALSE), /* pcrel_offset */
90ace9e9
JT
103
104 HOWTO (R_VAX_8, /* type */
105 0, /* rightshift */
106 0, /* size (0 = byte, 1 = short, 2 = long) */
107 8, /* bitsize */
b34976b6 108 FALSE, /* pc_relative */
90ace9e9
JT
109 0, /* bitpos */
110 complain_overflow_bitfield, /* complain_on_overflow */
111 bfd_elf_generic_reloc, /* special_function */
112 "R_VAX_8", /* name */
b34976b6 113 FALSE, /* partial_inplace */
90ace9e9
JT
114 0, /* src_mask */
115 0x000000ff, /* dst_mask */
b34976b6 116 FALSE), /* pcrel_offset */
90ace9e9
JT
117
118 HOWTO (R_VAX_PC32, /* type */
119 0, /* rightshift */
120 2, /* size (0 = byte, 1 = short, 2 = long) */
121 32, /* bitsize */
b34976b6 122 TRUE, /* pc_relative */
90ace9e9
JT
123 0, /* bitpos */
124 complain_overflow_bitfield, /* complain_on_overflow */
125 bfd_elf_generic_reloc, /* special_function */
126 "R_VAX_PC32", /* name */
b34976b6 127 FALSE, /* partial_inplace */
90ace9e9
JT
128 0, /* src_mask */
129 0xffffffff, /* dst_mask */
b34976b6 130 TRUE), /* pcrel_offset */
90ace9e9
JT
131
132 HOWTO (R_VAX_PC16, /* type */
133 0, /* rightshift */
134 1, /* size (0 = byte, 1 = short, 2 = long) */
135 16, /* bitsize */
b34976b6 136 TRUE, /* pc_relative */
90ace9e9
JT
137 0, /* bitpos */
138 complain_overflow_signed, /* complain_on_overflow */
139 bfd_elf_generic_reloc, /* special_function */
140 "R_VAX_PC16", /* name */
b34976b6 141 FALSE, /* partial_inplace */
90ace9e9
JT
142 0, /* src_mask */
143 0x0000ffff, /* dst_mask */
b34976b6 144 TRUE), /* pcrel_offset */
90ace9e9
JT
145
146 HOWTO (R_VAX_PC8, /* type */
147 0, /* rightshift */
148 0, /* size (0 = byte, 1 = short, 2 = long) */
149 8, /* bitsize */
b34976b6 150 TRUE, /* pc_relative */
90ace9e9
JT
151 0, /* bitpos */
152 complain_overflow_signed, /* complain_on_overflow */
153 bfd_elf_generic_reloc, /* special_function */
154 "R_VAX_PC8", /* name */
b34976b6 155 FALSE, /* partial_inplace */
90ace9e9
JT
156 0, /* src_mask */
157 0x000000ff, /* dst_mask */
b34976b6 158 TRUE), /* pcrel_offset */
90ace9e9
JT
159
160 HOWTO (R_VAX_GOT32, /* type */
161 0, /* rightshift */
162 2, /* size (0 = byte, 1 = short, 2 = long) */
163 32, /* bitsize */
b34976b6 164 TRUE, /* pc_relative */
90ace9e9
JT
165 0, /* bitpos */
166 complain_overflow_bitfield, /* complain_on_overflow */
167 bfd_elf_generic_reloc, /* special_function */
168 "R_VAX_GOT32", /* name */
b34976b6 169 FALSE, /* partial_inplace */
90ace9e9
JT
170 0, /* src_mask */
171 0xffffffff, /* dst_mask */
b34976b6 172 TRUE), /* pcrel_offset */
90ace9e9
JT
173
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176 EMPTY_HOWTO (-1),
177 EMPTY_HOWTO (-1),
178 EMPTY_HOWTO (-1),
179
180 HOWTO (R_VAX_PLT32, /* type */
181 0, /* rightshift */
182 2, /* size (0 = byte, 1 = short, 2 = long) */
183 32, /* bitsize */
b34976b6 184 TRUE, /* pc_relative */
90ace9e9
JT
185 0, /* bitpos */
186 complain_overflow_bitfield, /* complain_on_overflow */
187 bfd_elf_generic_reloc, /* special_function */
188 "R_VAX_PLT32", /* name */
b34976b6 189 FALSE, /* partial_inplace */
90ace9e9
JT
190 0, /* src_mask */
191 0xffffffff, /* dst_mask */
b34976b6 192 TRUE), /* pcrel_offset */
90ace9e9
JT
193
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196 EMPTY_HOWTO (-1),
197 EMPTY_HOWTO (-1),
198 EMPTY_HOWTO (-1),
199
200 HOWTO (R_VAX_COPY, /* type */
201 0, /* rightshift */
202 0, /* size (0 = byte, 1 = short, 2 = long) */
203 0, /* bitsize */
b34976b6 204 FALSE, /* pc_relative */
90ace9e9
JT
205 0, /* bitpos */
206 complain_overflow_dont, /* complain_on_overflow */
207 bfd_elf_generic_reloc, /* special_function */
208 "R_VAX_COPY", /* name */
b34976b6 209 FALSE, /* partial_inplace */
90ace9e9
JT
210 0, /* src_mask */
211 0xffffffff, /* dst_mask */
b34976b6 212 FALSE), /* pcrel_offset */
90ace9e9
JT
213
214 HOWTO (R_VAX_GLOB_DAT, /* type */
215 0, /* rightshift */
216 2, /* size (0 = byte, 1 = short, 2 = long) */
217 32, /* bitsize */
b34976b6 218 FALSE, /* pc_relative */
90ace9e9
JT
219 0, /* bitpos */
220 complain_overflow_dont, /* complain_on_overflow */
221 bfd_elf_generic_reloc, /* special_function */
222 "R_VAX_GLOB_DAT", /* name */
b34976b6 223 FALSE, /* partial_inplace */
90ace9e9
JT
224 0, /* src_mask */
225 0xffffffff, /* dst_mask */
b34976b6 226 FALSE), /* pcrel_offset */
90ace9e9
JT
227
228 HOWTO (R_VAX_JMP_SLOT, /* type */
229 0, /* rightshift */
230 2, /* size (0 = byte, 1 = short, 2 = long) */
231 32, /* bitsize */
b34976b6 232 FALSE, /* pc_relative */
90ace9e9
JT
233 0, /* bitpos */
234 complain_overflow_dont, /* complain_on_overflow */
235 bfd_elf_generic_reloc, /* special_function */
236 "R_VAX_JMP_SLOT", /* name */
b34976b6 237 FALSE, /* partial_inplace */
90ace9e9
JT
238 0, /* src_mask */
239 0xffffffff, /* dst_mask */
b34976b6 240 FALSE), /* pcrel_offset */
90ace9e9
JT
241
242 HOWTO (R_VAX_RELATIVE, /* type */
243 0, /* rightshift */
244 2, /* size (0 = byte, 1 = short, 2 = long) */
245 32, /* bitsize */
b34976b6 246 FALSE, /* pc_relative */
90ace9e9
JT
247 0, /* bitpos */
248 complain_overflow_dont, /* complain_on_overflow */
249 bfd_elf_generic_reloc, /* special_function */
250 "R_VAX_RELATIVE", /* name */
b34976b6 251 FALSE, /* partial_inplace */
90ace9e9
JT
252 0, /* src_mask */
253 0xffffffff, /* dst_mask */
b34976b6 254 FALSE), /* pcrel_offset */
90ace9e9
JT
255
256 /* GNU extension to record C++ vtable hierarchy */
257 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
258 0, /* rightshift */
259 2, /* size (0 = byte, 1 = short, 2 = long) */
260 0, /* bitsize */
b34976b6 261 FALSE, /* pc_relative */
90ace9e9
JT
262 0, /* bitpos */
263 complain_overflow_dont, /* complain_on_overflow */
264 NULL, /* special_function */
265 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 266 FALSE, /* partial_inplace */
90ace9e9
JT
267 0, /* src_mask */
268 0, /* dst_mask */
b34976b6 269 FALSE), /* pcrel_offset */
90ace9e9
JT
270
271 /* GNU extension to record C++ vtable member usage */
272 HOWTO (R_VAX_GNU_VTENTRY, /* type */
273 0, /* rightshift */
274 2, /* size (0 = byte, 1 = short, 2 = long) */
275 0, /* bitsize */
b34976b6 276 FALSE, /* pc_relative */
90ace9e9
JT
277 0, /* bitpos */
278 complain_overflow_dont, /* complain_on_overflow */
279 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
280 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 281 FALSE, /* partial_inplace */
90ace9e9
JT
282 0, /* src_mask */
283 0, /* dst_mask */
b34976b6 284 FALSE), /* pcrel_offset */
90ace9e9
JT
285};
286
287static void
ce71b576
NC
288rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
289 Elf_Internal_Rela *dst)
90ace9e9
JT
290{
291 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
292 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
293}
294
295#define elf_info_to_howto rtype_to_howto
296
297static const struct
298{
299 bfd_reloc_code_real_type bfd_val;
300 int elf_val;
301} reloc_map[] = {
302 { BFD_RELOC_NONE, R_VAX_NONE },
303 { BFD_RELOC_32, R_VAX_32 },
304 { BFD_RELOC_16, R_VAX_16 },
305 { BFD_RELOC_8, R_VAX_8 },
306 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
307 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
308 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
309 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
310 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
311 { BFD_RELOC_NONE, R_VAX_COPY },
312 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
313 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
314 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
315 { BFD_RELOC_CTOR, R_VAX_32 },
316 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
317 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
318};
319
320static reloc_howto_type *
ce71b576 321reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
322{
323 unsigned int i;
324 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
325 {
326 if (reloc_map[i].bfd_val == code)
327 return &howto_table[reloc_map[i].elf_val];
328 }
329 return 0;
330}
331
332#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
333#define ELF_ARCH bfd_arch_vax
334/* end code generated by elf.el */
90ace9e9
JT
335\f
336/* Functions for the VAX ELF linker. */
337
338/* The name of the dynamic interpreter. This is put in the .interp
339 section. */
340
341#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
342
343/* The size in bytes of an entry in the procedure linkage table. */
344
345#define PLT_ENTRY_SIZE 12
346
347/* The first entry in a procedure linkage table looks like this. See
348 the SVR4 ABI VAX supplement to see how this works. */
349
350static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
351{
352 0xdd, 0xef, /* pushl l^ */
353 0, 0, 0, 0, /* offset to .plt.got + 4 */
354 0x17, 0xff, /* jmp @L^(pc) */
355 0, 0, 0, 0, /* offset to .plt.got + 8 */
356};
357
358/* Subsequent entries in a procedure linkage table look like this. */
359
360static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
361{
362 0x40, 0x00, /* .word ^M<r6> */
363 0x16, 0xef, /* jsb L^(pc) */
364 0, 0, 0, 0, /* replaced with offset to start of .plt */
365 0, 0, 0, 0, /* index into .rela.plt */
366};
367
368/* The VAX linker needs to keep track of the number of relocs that it
369 decides to copy in check_relocs for each symbol. This is so that it
370 can discard PC relative relocs if it doesn't need them when linking
371 with -Bsymbolic. We store the information in a field extending the
372 regular ELF linker hash table. */
373
374/* This structure keeps track of the number of PC relative relocs we have
375 copied for a given symbol. */
376
377struct elf_vax_pcrel_relocs_copied
378{
379 /* Next section. */
380 struct elf_vax_pcrel_relocs_copied *next;
381 /* A section in dynobj. */
382 asection *section;
383 /* Number of relocs copied in this section. */
384 bfd_size_type count;
385};
386
387/* VAX ELF linker hash entry. */
388
389struct elf_vax_link_hash_entry
390{
391 struct elf_link_hash_entry root;
392
393 /* Number of PC relative relocs copied for this symbol. */
394 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
395
396 bfd_vma got_addend;
397};
398
399/* VAX ELF linker hash table. */
400
401struct elf_vax_link_hash_table
402{
403 struct elf_link_hash_table root;
404};
405
406/* Declare this now that the above structures are defined. */
407
ce71b576
NC
408static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
409 PTR);
90ace9e9 410
b29635ba
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576
NC
413static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
414 PTR);
b29635ba 415
90ace9e9
JT
416/* Traverse an VAX ELF linker hash table. */
417
418#define elf_vax_link_hash_traverse(table, func, info) \
419 (elf_link_hash_traverse \
420 (&(table)->root, \
ce71b576 421 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
422 (info)))
423
424/* Get the VAX ELF linker hash table from a link_info structure. */
425
ce71b576 426#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
427
428/* Create an entry in an VAX ELF linker hash table. */
429
430static struct bfd_hash_entry *
ce71b576
NC
431elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
432 struct bfd_hash_table *table,
433 const char *string)
90ace9e9
JT
434{
435 struct elf_vax_link_hash_entry *ret =
436 (struct elf_vax_link_hash_entry *) entry;
437
438 /* Allocate the structure if it has not already been allocated by a
439 subclass. */
ce71b576 440 if (ret == NULL)
90ace9e9
JT
441 ret = ((struct elf_vax_link_hash_entry *)
442 bfd_hash_allocate (table,
443 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 444 if (ret == NULL)
90ace9e9
JT
445 return (struct bfd_hash_entry *) ret;
446
447 /* Call the allocation method of the superclass. */
448 ret = ((struct elf_vax_link_hash_entry *)
449 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
450 table, string));
ce71b576 451 if (ret != NULL)
90ace9e9
JT
452 {
453 ret->pcrel_relocs_copied = NULL;
454 }
455
456 return (struct bfd_hash_entry *) ret;
457}
458
459/* Create an VAX ELF linker hash table. */
460
461static struct bfd_link_hash_table *
ce71b576 462elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
463{
464 struct elf_vax_link_hash_table *ret;
465 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
466
ce71b576
NC
467 ret = bfd_malloc (amt);
468 if (ret == NULL)
90ace9e9
JT
469 return NULL;
470
471 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
472 elf_vax_link_hash_newfunc))
473 {
474 free (ret);
475 return NULL;
476 }
477
478 return &ret->root.root;
479}
480
481/* Keep vax-specific flags in the ELF header */
b34976b6 482static bfd_boolean
ce71b576 483elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
484{
485 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
486 elf_flags_init (abfd) = TRUE;
487 return TRUE;
90ace9e9
JT
488}
489
490/* Merge backend specific data from an object file to the output
491 object file when linking. */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
494{
495 flagword out_flags;
496 flagword in_flags;
497
498 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
499 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 500 return TRUE;
90ace9e9
JT
501
502 in_flags = elf_elfheader (ibfd)->e_flags;
503 out_flags = elf_elfheader (obfd)->e_flags;
504
505 if (!elf_flags_init (obfd))
506 {
b34976b6 507 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
508 elf_elfheader (obfd)->e_flags = in_flags;
509 }
510
b34976b6 511 return TRUE;
90ace9e9
JT
512}
513
514/* Display the flags field */
b34976b6 515static bfd_boolean
ce71b576 516elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
517{
518 FILE *file = (FILE *) ptr;
519
520 BFD_ASSERT (abfd != NULL && ptr != NULL);
521
522 /* Print normal ELF private data. */
523 _bfd_elf_print_private_bfd_data (abfd, ptr);
524
525 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
526
527 /* xgettext:c-format */
528 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
529
179d3252 530 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
531 fprintf (file, _(" [nonpic]"));
532
179d3252 533 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
534 fprintf (file, _(" [d-float]"));
535
179d3252 536 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
537 fprintf (file, _(" [g-float]"));
538
539 fputc ('\n', file);
540
b34976b6 541 return TRUE;
90ace9e9
JT
542}
543/* Look through the relocs for a section during the first phase, and
544 allocate space in the global offset table or procedure linkage
545 table. */
546
b34976b6 547static bfd_boolean
ce71b576
NC
548elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
549 const Elf_Internal_Rela *relocs)
90ace9e9
JT
550{
551 bfd *dynobj;
552 Elf_Internal_Shdr *symtab_hdr;
553 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
554 const Elf_Internal_Rela *rel;
555 const Elf_Internal_Rela *rel_end;
556 asection *sgot;
557 asection *srelgot;
558 asection *sreloc;
559
1049f94e 560 if (info->relocatable)
b34976b6 561 return TRUE;
90ace9e9
JT
562
563 dynobj = elf_hash_table (info)->dynobj;
564 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
565 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
566
567 sgot = NULL;
568 srelgot = NULL;
569 sreloc = NULL;
570
571 rel_end = relocs + sec->reloc_count;
572 for (rel = relocs; rel < rel_end; rel++)
573 {
574 unsigned long r_symndx;
575 struct elf_link_hash_entry *h;
576
577 r_symndx = ELF32_R_SYM (rel->r_info);
578
579 if (r_symndx < symtab_hdr->sh_info)
580 h = NULL;
581 else
582 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
583
584 switch (ELF32_R_TYPE (rel->r_info))
585 {
586 case R_VAX_GOT32:
587 if (h != NULL
588 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
589 break;
590
591 /* This symbol requires a global offset table entry. */
592
593 if (dynobj == NULL)
594 {
595 /* Create the .got section. */
596 elf_hash_table (info)->dynobj = dynobj = abfd;
597 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 598 return FALSE;
90ace9e9
JT
599 }
600
601 if (sgot == NULL)
602 {
603 sgot = bfd_get_section_by_name (dynobj, ".got");
604 BFD_ASSERT (sgot != NULL);
605 }
606
607 if (srelgot == NULL
608 && (h != NULL || info->shared))
609 {
610 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
611 if (srelgot == NULL)
612 {
3496cb2a
L
613 srelgot = bfd_make_section_with_flags (dynobj,
614 ".rela.got",
615 (SEC_ALLOC
616 | SEC_LOAD
617 | SEC_HAS_CONTENTS
618 | SEC_IN_MEMORY
619 | SEC_LINKER_CREATED
620 | SEC_READONLY));
90ace9e9 621 if (srelgot == NULL
90ace9e9 622 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 623 return FALSE;
90ace9e9
JT
624 }
625 }
626
627 if (h != NULL)
628 {
629 struct elf_vax_link_hash_entry *eh;
630
631 eh = (struct elf_vax_link_hash_entry *) h;
632 if (h->got.refcount == -1)
633 {
634 h->got.refcount = 1;
635 eh->got_addend = rel->r_addend;
90ace9e9
JT
636 }
637 else
638 {
639 h->got.refcount++;
640 if (eh->got_addend != (bfd_vma) rel->r_addend)
641 (*_bfd_error_handler)
642 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
643 bfd_get_filename (abfd), rel->r_addend,
644 h->root.root.string,
645 eh->got_addend);
cedb70c5 646
90ace9e9
JT
647 }
648 }
649 break;
650
651 case R_VAX_PLT32:
652 /* This symbol requires a procedure linkage table entry. We
653 actually build the entry in adjust_dynamic_symbol,
654 because this might be a case of linking PIC code which is
655 never referenced by a dynamic object, in which case we
656 don't need to generate a procedure linkage table entry
657 after all. */
658
659 /* If this is a local symbol, we resolve it directly without
660 creating a procedure linkage table entry. */
661 if (h == NULL)
662 continue;
663
f5385ebf 664 h->needs_plt = 1;
90ace9e9
JT
665 if (h->plt.refcount == -1)
666 h->plt.refcount = 1;
667 else
668 h->plt.refcount++;
669 break;
670
671 case R_VAX_PC8:
672 case R_VAX_PC16:
673 case R_VAX_PC32:
674 /* If we are creating a shared library and this is not a local
675 symbol, we need to copy the reloc into the shared library.
676 However when linking with -Bsymbolic and this is a global
677 symbol which is defined in an object we are including in the
678 link (i.e., DEF_REGULAR is set), then we can resolve the
679 reloc directly. At this point we have not seen all the input
680 files, so it is possible that DEF_REGULAR is not set now but
681 will be set later (it is never cleared). We account for that
682 possibility below by storing information in the
683 pcrel_relocs_copied field of the hash table entry. */
684 if (!(info->shared
685 && (sec->flags & SEC_ALLOC) != 0
686 && h != NULL
687 && (!info->symbolic
f5385ebf 688 || !h->def_regular)))
90ace9e9
JT
689 {
690 if (h != NULL)
691 {
692 /* Make sure a plt entry is created for this symbol if
693 it turns out to be a function defined by a dynamic
694 object. */
695 if (h->plt.refcount == -1)
696 h->plt.refcount = 1;
697 else
698 h->plt.refcount++;
699 }
700 break;
701 }
702 /* Fall through. */
703 case R_VAX_8:
704 case R_VAX_16:
705 case R_VAX_32:
706 if (h != NULL)
707 {
708 /* Make sure a plt entry is created for this symbol if it
709 turns out to be a function defined by a dynamic object. */
710 if (h->plt.refcount == -1)
711 h->plt.refcount = 1;
712 else
713 h->plt.refcount++;
714 }
715
716 /* If we are creating a shared library, we need to copy the
717 reloc into the shared library. */
718 if (info->shared
719 && (sec->flags & SEC_ALLOC) != 0)
720 {
721 /* When creating a shared object, we must copy these
722 reloc types into the output file. We create a reloc
723 section in dynobj and make room for this reloc. */
724 if (sreloc == NULL)
725 {
726 const char *name;
727
728 name = (bfd_elf_string_from_elf_section
729 (abfd,
730 elf_elfheader (abfd)->e_shstrndx,
731 elf_section_data (sec)->rel_hdr.sh_name));
732 if (name == NULL)
b34976b6 733 return FALSE;
90ace9e9
JT
734
735 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
736 && strcmp (bfd_get_section_name (abfd, sec),
737 name + 5) == 0);
738
739 sreloc = bfd_get_section_by_name (dynobj, name);
740 if (sreloc == NULL)
741 {
3496cb2a
L
742 sreloc = bfd_make_section_with_flags (dynobj,
743 name,
744 (SEC_ALLOC
745 | SEC_LOAD
746 | SEC_HAS_CONTENTS
747 | SEC_IN_MEMORY
748 | SEC_LINKER_CREATED
749 | SEC_READONLY));
90ace9e9 750 if (sreloc == NULL
90ace9e9 751 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 752 return FALSE;
90ace9e9
JT
753 }
754 if (sec->flags & SEC_READONLY)
755 info->flags |= DF_TEXTREL;
756 }
757
eea6121a 758 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
759
760 /* If we are linking with -Bsymbolic, we count the number of
761 PC relative relocations we have entered for this symbol,
762 so that we can discard them again if the symbol is later
763 defined by a regular object. Note that this function is
19852a2a 764 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
765 which means that h is really a pointer to an
766 elf_vax_link_hash_entry. */
767 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
768 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
769 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
770 && info->symbolic)
771 {
772 struct elf_vax_link_hash_entry *eh;
773 struct elf_vax_pcrel_relocs_copied *p;
774
775 eh = (struct elf_vax_link_hash_entry *) h;
776
777 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
778 if (p->section == sreloc)
779 break;
780
781 if (p == NULL)
782 {
783 p = ((struct elf_vax_pcrel_relocs_copied *)
784 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
785 if (p == NULL)
b34976b6 786 return FALSE;
90ace9e9
JT
787 p->next = eh->pcrel_relocs_copied;
788 eh->pcrel_relocs_copied = p;
789 p->section = sreloc;
790 p->count = 0;
791 }
792
793 ++p->count;
794 }
795 }
796
797 break;
798
799 /* This relocation describes the C++ object vtable hierarchy.
800 Reconstruct it for later use during GC. */
801 case R_VAX_GNU_VTINHERIT:
c152c796 802 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 803 return FALSE;
90ace9e9
JT
804 break;
805
806 /* This relocation describes which C++ vtable entries are actually
807 used. Record for later use during GC. */
808 case R_VAX_GNU_VTENTRY:
c152c796 809 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 810 return FALSE;
90ace9e9
JT
811 break;
812
813 default:
814 break;
815 }
816 }
817
b34976b6 818 return TRUE;
90ace9e9
JT
819}
820
821/* Return the section that should be marked against GC for a given
822 relocation. */
823
824static asection *
ce71b576
NC
825elf_vax_gc_mark_hook (asection *sec,
826 struct bfd_link_info *info ATTRIBUTE_UNUSED,
827 Elf_Internal_Rela *rel,
828 struct elf_link_hash_entry *h,
829 Elf_Internal_Sym *sym)
90ace9e9
JT
830{
831 if (h != NULL)
832 {
833 switch (ELF32_R_TYPE (rel->r_info))
834 {
835 case R_VAX_GNU_VTINHERIT:
836 case R_VAX_GNU_VTENTRY:
837 break;
838
839 default:
840 switch (h->root.type)
841 {
842 default:
843 break;
844
845 case bfd_link_hash_defined:
846 case bfd_link_hash_defweak:
847 return h->root.u.def.section;
848
849 case bfd_link_hash_common:
850 return h->root.u.c.p->section;
851 }
852 }
853 }
854 else
1e2f5b6e 855 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
90ace9e9
JT
856
857 return NULL;
858}
859
860/* Update the got entry reference counts for the section being removed. */
861
b34976b6 862static bfd_boolean
ce71b576
NC
863elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
864 const Elf_Internal_Rela *relocs)
90ace9e9
JT
865{
866 Elf_Internal_Shdr *symtab_hdr;
867 struct elf_link_hash_entry **sym_hashes;
90ace9e9 868 const Elf_Internal_Rela *rel, *relend;
90ace9e9 869 bfd *dynobj;
90ace9e9 870
90ace9e9
JT
871 dynobj = elf_hash_table (info)->dynobj;
872 if (dynobj == NULL)
b34976b6 873 return TRUE;
90ace9e9 874
babfd660
KH
875 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
876 sym_hashes = elf_sym_hashes (abfd);
877
90ace9e9
JT
878 relend = relocs + sec->reloc_count;
879 for (rel = relocs; rel < relend; rel++)
880 {
babfd660 881 unsigned long r_symndx;
3eb128b2
AM
882 struct elf_link_hash_entry *h = NULL;
883
884 r_symndx = ELF32_R_SYM (rel->r_info);
885 if (r_symndx >= symtab_hdr->sh_info)
886 {
887 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
888 while (h->root.type == bfd_link_hash_indirect
889 || h->root.type == bfd_link_hash_warning)
890 h = (struct elf_link_hash_entry *) h->root.u.i.link;
891 }
babfd660 892
90ace9e9
JT
893 switch (ELF32_R_TYPE (rel->r_info))
894 {
895 case R_VAX_GOT32:
3eb128b2
AM
896 if (h != NULL && h->got.refcount > 0)
897 --h->got.refcount;
90ace9e9
JT
898 break;
899
900 case R_VAX_PLT32:
901 case R_VAX_PC8:
902 case R_VAX_PC16:
903 case R_VAX_PC32:
904 case R_VAX_8:
905 case R_VAX_16:
906 case R_VAX_32:
3eb128b2
AM
907 if (h != NULL && h->plt.refcount > 0)
908 --h->plt.refcount;
90ace9e9
JT
909 break;
910
911 default:
912 break;
913 }
914 }
915
b34976b6 916 return TRUE;
90ace9e9
JT
917}
918
919/* Adjust a symbol defined by a dynamic object and referenced by a
920 regular object. The current definition is in some section of the
921 dynamic object, but we're not including those sections. We have to
922 change the definition to something the rest of the link can
923 understand. */
924
b34976b6 925static bfd_boolean
90ace9e9
JT
926elf_vax_adjust_dynamic_symbol (info, h)
927 struct bfd_link_info *info;
928 struct elf_link_hash_entry *h;
929{
930 bfd *dynobj;
931 asection *s;
932 unsigned int power_of_two;
933
934 dynobj = elf_hash_table (info)->dynobj;
935
936 /* Make sure we know what is going on here. */
937 BFD_ASSERT (dynobj != NULL
f5385ebf 938 && (h->needs_plt
f6e332e6 939 || h->u.weakdef != NULL
f5385ebf
AM
940 || (h->def_dynamic
941 && h->ref_regular
942 && !h->def_regular)));
90ace9e9
JT
943
944 /* If this is a function, put it in the procedure linkage table. We
945 will fill in the contents of the procedure linkage table later,
946 when we know the address of the .got section. */
947 if (h->type == STT_FUNC
f5385ebf 948 || h->needs_plt)
90ace9e9
JT
949 {
950 if (! info->shared
f5385ebf
AM
951 && !h->def_dynamic
952 && !h->ref_dynamic
90ace9e9
JT
953 /* We must always create the plt entry if it was referenced
954 by a PLTxxO relocation. In this case we already recorded
955 it as a dynamic symbol. */
956 && h->dynindx == -1)
957 {
958 /* This case can occur if we saw a PLTxx reloc in an input
959 file, but the symbol was never referred to by a dynamic
960 object. In such a case, we don't actually need to build
961 a procedure linkage table, and we can just do a PCxx
962 reloc instead. */
f5385ebf 963 BFD_ASSERT (h->needs_plt);
90ace9e9 964 h->plt.offset = (bfd_vma) -1;
b34976b6 965 return TRUE;
90ace9e9
JT
966 }
967
968 /* GC may have rendered this entry unused. */
969 if (h->plt.refcount <= 0)
970 {
f5385ebf 971 h->needs_plt = 0;
90ace9e9 972 h->plt.offset = (bfd_vma) -1;
b34976b6 973 return TRUE;
90ace9e9
JT
974 }
975
976 /* Make sure this symbol is output as a dynamic symbol. */
977 if (h->dynindx == -1)
978 {
c152c796 979 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 980 return FALSE;
90ace9e9
JT
981 }
982
983 s = bfd_get_section_by_name (dynobj, ".plt");
984 BFD_ASSERT (s != NULL);
985
986 /* If this is the first .plt entry, make room for the special
987 first entry. */
eea6121a 988 if (s->size == 0)
90ace9e9 989 {
eea6121a 990 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
991 }
992
993 /* If this symbol is not defined in a regular file, and we are
994 not generating a shared library, then set the symbol to this
995 location in the .plt. This is required to make function
996 pointers compare as equal between the normal executable and
997 the shared library. */
998 if (!info->shared
f5385ebf 999 && !h->def_regular)
90ace9e9
JT
1000 {
1001 h->root.u.def.section = s;
eea6121a 1002 h->root.u.def.value = s->size;
90ace9e9
JT
1003 }
1004
eea6121a 1005 h->plt.offset = s->size;
90ace9e9
JT
1006
1007 /* Make room for this entry. */
eea6121a 1008 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1009
1010 /* We also need to make an entry in the .got.plt section, which
1011 will be placed in the .got section by the linker script. */
1012
1013 s = bfd_get_section_by_name (dynobj, ".got.plt");
1014 BFD_ASSERT (s != NULL);
eea6121a 1015 s->size += 4;
90ace9e9
JT
1016
1017 /* We also need to make an entry in the .rela.plt section. */
1018
1019 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1020 BFD_ASSERT (s != NULL);
eea6121a 1021 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1022
b34976b6 1023 return TRUE;
90ace9e9
JT
1024 }
1025
1026 /* Reinitialize the plt offset now that it is not used as a reference
1027 count any more. */
1028 h->plt.offset = (bfd_vma) -1;
1029
1030 /* If this is a weak symbol, and there is a real definition, the
1031 processor independent code will have arranged for us to see the
1032 real definition first, and we can just use the same value. */
f6e332e6 1033 if (h->u.weakdef != NULL)
90ace9e9 1034 {
f6e332e6
AM
1035 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1036 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1037 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1038 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1039 return TRUE;
90ace9e9
JT
1040 }
1041
1042 /* This is a reference to a symbol defined by a dynamic object which
1043 is not a function. */
1044
1045 /* If we are creating a shared library, we must presume that the
1046 only references to the symbol are via the global offset table.
1047 For such cases we need not do anything here; the relocations will
1048 be handled correctly by relocate_section. */
1049 if (info->shared)
b34976b6 1050 return TRUE;
90ace9e9
JT
1051
1052 /* We must allocate the symbol in our .dynbss section, which will
1053 become part of the .bss section of the executable. There will be
1054 an entry for this symbol in the .dynsym section. The dynamic
1055 object will contain position independent code, so all references
1056 from the dynamic object to this symbol will go through the global
1057 offset table. The dynamic linker will use the .dynsym entry to
1058 determine the address it must put in the global offset table, so
1059 both the dynamic object and the regular object will refer to the
1060 same memory location for the variable. */
1061
1062 s = bfd_get_section_by_name (dynobj, ".dynbss");
1063 BFD_ASSERT (s != NULL);
1064
1065 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1066 copy the initial value out of the dynamic object and into the
1067 runtime process image. We need to remember the offset into the
1068 .rela.bss section we are going to use. */
1069 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1070 {
1071 asection *srel;
1072
1073 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1074 BFD_ASSERT (srel != NULL);
eea6121a 1075 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1076 h->needs_copy = 1;
90ace9e9
JT
1077 }
1078
1079 /* We need to figure out the alignment required for this symbol. I
1080 have no idea how ELF linkers handle this. */
1081 power_of_two = bfd_log2 (h->size);
1082 if (power_of_two > 3)
1083 power_of_two = 3;
1084
1085 /* Apply the required alignment. */
eea6121a 1086 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
90ace9e9
JT
1087 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1088 {
1089 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 1090 return FALSE;
90ace9e9
JT
1091 }
1092
1093 /* Define the symbol as being at this point in the section. */
1094 h->root.u.def.section = s;
eea6121a 1095 h->root.u.def.value = s->size;
90ace9e9
JT
1096
1097 /* Increment the section size to make room for the symbol. */
eea6121a 1098 s->size += h->size;
90ace9e9 1099
b34976b6 1100 return TRUE;
90ace9e9
JT
1101}
1102
1103/* Set the sizes of the dynamic sections. */
1104
b34976b6 1105static bfd_boolean
ce71b576 1106elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1107{
1108 bfd *dynobj;
1109 asection *s;
b34976b6
AM
1110 bfd_boolean plt;
1111 bfd_boolean relocs;
1112 bfd_boolean reltext;
90ace9e9
JT
1113
1114 dynobj = elf_hash_table (info)->dynobj;
1115 BFD_ASSERT (dynobj != NULL);
1116
1117 if (elf_hash_table (info)->dynamic_sections_created)
1118 {
1119 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1120 if (info->executable)
90ace9e9
JT
1121 {
1122 s = bfd_get_section_by_name (dynobj, ".interp");
1123 BFD_ASSERT (s != NULL);
eea6121a 1124 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1125 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1126 }
1127 }
1128 else
1129 {
1130 /* We may have created entries in the .rela.got and .got sections.
1131 However, if we are not creating the dynamic sections, we will
1132 not actually use these entries. Reset the size of .rela.got
1133 and .got, which will cause it to get stripped from the output
1134 file below. */
1135 s = bfd_get_section_by_name (dynobj, ".rela.got");
1136 if (s != NULL)
eea6121a 1137 s->size = 0;
90ace9e9
JT
1138 s = bfd_get_section_by_name (dynobj, ".got.plt");
1139 if (s != NULL)
eea6121a 1140 s->size = 0;
90ace9e9
JT
1141 s = bfd_get_section_by_name (dynobj, ".got");
1142 if (s != NULL)
eea6121a 1143 s->size = 0;
90ace9e9
JT
1144 }
1145
1146 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1147 relative relocs against symbols defined in a regular object. We
1148 allocated space for them in the check_relocs routine, but we will not
1149 fill them in in the relocate_section routine. */
1150 if (info->shared && info->symbolic)
1151 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1152 elf_vax_discard_copies,
ce71b576 1153 NULL);
b29635ba 1154
b34976b6 1155 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1156 discard all the got entries we've recorded. Otherwise, we need to
1157 instantiate (allocate space for them). */
1158 elf_link_hash_traverse (elf_hash_table (info),
1159 elf_vax_instantiate_got_entries,
1160 (PTR) info);
90ace9e9
JT
1161
1162 /* The check_relocs and adjust_dynamic_symbol entry points have
1163 determined the sizes of the various dynamic sections. Allocate
1164 memory for them. */
b34976b6
AM
1165 plt = FALSE;
1166 relocs = FALSE;
1167 reltext = FALSE;
90ace9e9
JT
1168 for (s = dynobj->sections; s != NULL; s = s->next)
1169 {
1170 const char *name;
b34976b6 1171 bfd_boolean strip;
90ace9e9
JT
1172
1173 if ((s->flags & SEC_LINKER_CREATED) == 0)
1174 continue;
1175
1176 /* It's OK to base decisions on the section name, because none
1177 of the dynobj section names depend upon the input files. */
1178 name = bfd_get_section_name (dynobj, s);
1179
b34976b6 1180 strip = FALSE;
90ace9e9
JT
1181
1182 if (strcmp (name, ".plt") == 0)
1183 {
eea6121a 1184 if (s->size == 0)
90ace9e9
JT
1185 {
1186 /* Strip this section if we don't need it; see the
1187 comment below. */
b34976b6 1188 strip = TRUE;
90ace9e9
JT
1189 }
1190 else
1191 {
1192 /* Remember whether there is a PLT. */
b34976b6 1193 plt = TRUE;
90ace9e9
JT
1194 }
1195 }
1196 else if (strncmp (name, ".rela", 5) == 0)
1197 {
eea6121a 1198 if (s->size == 0)
90ace9e9
JT
1199 {
1200 /* If we don't need this section, strip it from the
1201 output file. This is mostly to handle .rela.bss and
1202 .rela.plt. We must create both sections in
1203 create_dynamic_sections, because they must be created
1204 before the linker maps input sections to output
1205 sections. The linker does that before
1206 adjust_dynamic_symbol is called, and it is that
1207 function which decides whether anything needs to go
1208 into these sections. */
b34976b6 1209 strip = TRUE;
90ace9e9
JT
1210 }
1211 else
1212 {
1213 asection *target;
1214
1215 /* Remember whether there are any reloc sections other
1216 than .rela.plt. */
1217 if (strcmp (name, ".rela.plt") != 0)
1218 {
1219 const char *outname;
1220
b34976b6 1221 relocs = TRUE;
90ace9e9
JT
1222
1223 /* If this relocation section applies to a read only
1224 section, then we probably need a DT_TEXTREL
1225 entry. .rela.plt is actually associated with
1226 .got.plt, which is never readonly. */
1227 outname = bfd_get_section_name (output_bfd,
1228 s->output_section);
1229 target = bfd_get_section_by_name (output_bfd, outname + 5);
1230 if (target != NULL
1231 && (target->flags & SEC_READONLY) != 0
1232 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1233 reltext = TRUE;
90ace9e9
JT
1234 }
1235
1236 /* We use the reloc_count field as a counter if we need
1237 to copy relocs into the output file. */
1238 s->reloc_count = 0;
1239 }
1240 }
624f0b25 1241 else if (strncmp (name, ".got", 4) != 0)
90ace9e9
JT
1242 {
1243 /* It's not one of our sections, so don't allocate space. */
1244 continue;
1245 }
1246
1247 if (strip)
1248 {
8423293d 1249 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1250 continue;
1251 }
1252
1253 /* Allocate memory for the section contents. */
eea6121a
AM
1254 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
1255 if (s->contents == NULL && s->size != 0)
b34976b6 1256 return FALSE;
90ace9e9
JT
1257 }
1258
1259 if (elf_hash_table (info)->dynamic_sections_created)
1260 {
1261 /* Add some entries to the .dynamic section. We fill in the
1262 values later, in elf_vax_finish_dynamic_sections, but we
1263 must add the entries now so that we get the correct size for
1264 the .dynamic section. The DT_DEBUG entry is filled in by the
1265 dynamic linker and used by the debugger. */
1266#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1267 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1268
1269 if (!info->shared)
1270 {
1271 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1272 return FALSE;
90ace9e9
JT
1273 }
1274
1275 if (plt)
1276 {
1277 if (!add_dynamic_entry (DT_PLTGOT, 0)
1278 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1279 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1280 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1281 return FALSE;
90ace9e9
JT
1282 }
1283
1284 if (relocs)
1285 {
1286 if (!add_dynamic_entry (DT_RELA, 0)
1287 || !add_dynamic_entry (DT_RELASZ, 0)
1288 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1289 return FALSE;
90ace9e9
JT
1290 }
1291
1292 if (reltext || (info->flags & DF_TEXTREL) != 0)
1293 {
1294 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1295 return FALSE;
90ace9e9
JT
1296 }
1297 }
1298#undef add_dynamic_entry
1299
b34976b6 1300 return TRUE;
90ace9e9
JT
1301}
1302
1303/* This function is called via elf_vax_link_hash_traverse if we are
1304 creating a shared object with -Bsymbolic. It discards the space
1305 allocated to copy PC relative relocs against symbols which are defined
1306 in regular objects. We allocated space for them in the check_relocs
1307 routine, but we won't fill them in in the relocate_section routine. */
1308
b34976b6 1309static bfd_boolean
ce71b576
NC
1310elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1311 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1312{
1313 struct elf_vax_pcrel_relocs_copied *s;
1314
1315 if (h->root.root.type == bfd_link_hash_warning)
1316 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1317
1318 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1319 if (!h->root.def_regular)
b34976b6 1320 return TRUE;
90ace9e9
JT
1321
1322 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1323 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1324
b34976b6 1325 return TRUE;
90ace9e9
JT
1326}
1327
b29635ba
JT
1328/* This function is called via elf_link_hash_traverse. It looks for entries
1329 that have GOT or PLT (.GOT) references. If creating a static object or a
1330 shared object with -Bsymbolic, it resets the reference count back to 0
1331 and sets the offset to -1 so normal PC32 relocation will be done. If
1332 creating a shared object or executable, space in the .got and .rela.got
1333 will be reserved for the symbol. */
1334
b34976b6 1335static bfd_boolean
ce71b576 1336elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1337{
1338 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1339 bfd *dynobj;
1340 asection *sgot;
1341 asection *srelgot;
b34976b6 1342
b29635ba
JT
1343 /* We don't care about non-GOT (and non-PLT) entries. */
1344 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1345 return TRUE;
b29635ba
JT
1346
1347 dynobj = elf_hash_table (info)->dynobj;
1348 if (dynobj == NULL)
b34976b6 1349 return TRUE;
b29635ba
JT
1350
1351 sgot = bfd_get_section_by_name (dynobj, ".got");
1352 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1353
1354 if (!elf_hash_table (info)->dynamic_sections_created
1355 || (info->shared && info->symbolic))
1356 {
1357 h->got.refcount = 0;
1358 h->got.offset = (bfd_vma) -1;
1359 h->plt.refcount = 0;
1360 h->plt.offset = (bfd_vma) -1;
1361 }
1362 else if (h->got.refcount > 0)
1363 {
1364 /* Make sure this symbol is output as a dynamic symbol. */
1365 if (h->dynindx == -1)
1366 {
c152c796 1367 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1368 return FALSE;
b29635ba
JT
1369 }
1370
1371 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1372 sgot->size += 4;
1373 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1374 }
1375
b34976b6 1376 return TRUE;
b29635ba
JT
1377}
1378
90ace9e9
JT
1379/* Relocate an VAX ELF section. */
1380
b34976b6 1381static bfd_boolean
ce71b576
NC
1382elf_vax_relocate_section (bfd *output_bfd,
1383 struct bfd_link_info *info,
1384 bfd *input_bfd,
1385 asection *input_section,
1386 bfd_byte *contents,
1387 Elf_Internal_Rela *relocs,
1388 Elf_Internal_Sym *local_syms,
1389 asection **local_sections)
90ace9e9
JT
1390{
1391 bfd *dynobj;
1392 Elf_Internal_Shdr *symtab_hdr;
1393 struct elf_link_hash_entry **sym_hashes;
1394 bfd_vma *local_got_offsets;
1395 bfd_vma plt_index;
1396 bfd_vma got_offset;
1397 asection *sgot;
1398 asection *splt;
1399 asection *sgotplt;
1400 asection *sreloc;
1401 Elf_Internal_Rela *rel;
1402 Elf_Internal_Rela *relend;
1403
1049f94e 1404 if (info->relocatable)
b34976b6 1405 return TRUE;
f0fe0e16 1406
90ace9e9
JT
1407 dynobj = elf_hash_table (info)->dynobj;
1408 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1409 sym_hashes = elf_sym_hashes (input_bfd);
1410 local_got_offsets = elf_local_got_offsets (input_bfd);
1411
1412 sgot = NULL;
1413 splt = NULL;
1414 sgotplt = NULL;
1415 sreloc = NULL;
1416
1417 rel = relocs;
1418 relend = relocs + input_section->reloc_count;
1419 for (; rel < relend; rel++)
1420 {
1421 int r_type;
1422 reloc_howto_type *howto;
1423 unsigned long r_symndx;
1424 struct elf_link_hash_entry *h;
1425 Elf_Internal_Sym *sym;
1426 asection *sec;
1427 bfd_vma relocation;
1428 bfd_reloc_status_type r;
1429
1430 r_type = ELF32_R_TYPE (rel->r_info);
1431 if (r_type < 0 || r_type >= (int) R_VAX_max)
1432 {
1433 bfd_set_error (bfd_error_bad_value);
b34976b6 1434 return FALSE;
90ace9e9
JT
1435 }
1436 howto = howto_table + r_type;
1437
90ace9e9 1438 /* This is a final link. */
f0fe0e16 1439 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1440 h = NULL;
1441 sym = NULL;
1442 sec = NULL;
1443 if (r_symndx < symtab_hdr->sh_info)
1444 {
1445 sym = local_syms + r_symndx;
1446 sec = local_sections[r_symndx];
8517fae7 1447 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1448 }
1449 else
1450 {
560e09e9
NC
1451 bfd_boolean unresolved_reloc;
1452 bfd_boolean warned;
1453
b2a8e766
AM
1454 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1455 r_symndx, symtab_hdr, sym_hashes,
1456 h, sec, relocation,
1457 unresolved_reloc, warned);
ce71b576 1458
560e09e9 1459 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1460 || h->root.type == bfd_link_hash_defweak)
560e09e9 1461 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1462 && h->plt.offset != (bfd_vma) -1
1463 && elf_hash_table (info)->dynamic_sections_created)
1464 || (r_type == R_VAX_GOT32
1465 && strcmp (h->root.root.string,
1466 "_GLOBAL_OFFSET_TABLE_") != 0
1467 && elf_hash_table (info)->dynamic_sections_created
1468 && (! info->shared
1469 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1470 || !h->def_regular))
90ace9e9
JT
1471 || (info->shared
1472 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1473 || !h->def_regular)
90ace9e9
JT
1474 && ((input_section->flags & SEC_ALLOC) != 0
1475 /* DWARF will emit R_VAX_32 relocations in its
1476 sections against symbols defined externally
1477 in shared libraries. We can't do anything
1478 with them here. */
1479
1480 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1481 && h->def_dynamic))
90ace9e9
JT
1482 && (r_type == R_VAX_8
1483 || r_type == R_VAX_16
1484 || r_type == R_VAX_32
1485 || r_type == R_VAX_PC8
1486 || r_type == R_VAX_PC16
560e09e9
NC
1487 || r_type == R_VAX_PC32))))
1488 /* In these cases, we don't need the relocation
1489 value. We check specially because in some
1490 obscure cases sec->output_section will be NULL. */
90ace9e9 1491 relocation = 0;
90ace9e9
JT
1492 }
1493
1494 switch (r_type)
1495 {
1496 case R_VAX_GOT32:
1497 /* Relocation is to the address of the entry for this symbol
1498 in the global offset table. */
b29635ba 1499 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1500 break;
1501
1502 /* Relocation is the offset of the entry for this symbol in
1503 the global offset table. */
1504
1505 {
1506 bfd_vma off;
1507
90ace9e9
JT
1508 if (sgot == NULL)
1509 {
1510 sgot = bfd_get_section_by_name (dynobj, ".got");
1511 BFD_ASSERT (sgot != NULL);
1512 }
1513
1514 BFD_ASSERT (h != NULL);
1515 off = h->got.offset;
1516 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1517 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1518
1519 if (info->shared
1520 && h->dynindx == -1
f5385ebf 1521 && h->def_regular)
90ace9e9
JT
1522 {
1523 /* The symbol was forced to be local
1524 because of a version file.. We must initialize
1525 this entry in the global offset table. Since
1526 the offset must always be a multiple of 4, we
1527 use the least significant bit to record whether
1528 we have initialized it already.
1529
1530 When doing a dynamic link, we create a .rela.got
1531 relocation entry to initialize the value. This
1532 is done in the finish_dynamic_symbol routine. */
1533 if ((off & 1) != 0)
1534 off &= ~1;
1535 else
1536 {
1537 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1538 sgot->contents + off);
1539 h->got.offset |= 1;
1540 }
1541 } else {
1542 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1543 }
1544
1545 relocation = sgot->output_offset + off;
b29635ba 1546 /* The GOT relocation uses the addend. */
90ace9e9
JT
1547 rel->r_addend = 0;
1548
b29635ba
JT
1549 /* Change the reference to be indirect. */
1550 contents[rel->r_offset - 1] |= 0x10;
1551 relocation += sgot->output_section->vma;
90ace9e9
JT
1552 }
1553 break;
1554
1555 case R_VAX_PLT32:
1556 /* Relocation is to the entry for this symbol in the
1557 procedure linkage table. */
1558
1559 /* Resolve a PLTxx reloc against a local symbol directly,
1560 without using the procedure linkage table. */
1561 if (h == NULL)
1562 break;
1563
1564 if (h->plt.offset == (bfd_vma) -1
1565 || !elf_hash_table (info)->dynamic_sections_created)
1566 {
1567 /* We didn't make a PLT entry for this symbol. This
1568 happens when statically linking PIC code, or when
1569 using -Bsymbolic. */
1570 break;
1571 }
1572
1573 if (splt == NULL)
1574 {
1575 splt = bfd_get_section_by_name (dynobj, ".plt");
1576 BFD_ASSERT (splt != NULL);
1577 }
1578
1579 if (sgotplt == NULL)
1580 {
1581 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1582 BFD_ASSERT (splt != NULL);
1583 }
1584
1585 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1586
1587 /* Get the offset into the .got table of the entry that
1588 corresponds to this function. Each .got entry is 4 bytes.
1589 The first two are reserved. */
1590 got_offset = (plt_index + 3) * 4;
1591
1592 /* We want the relocate to point into the .got.plt instead
cedb70c5 1593 of the plt itself. */
90ace9e9
JT
1594 relocation = (sgotplt->output_section->vma
1595 + sgotplt->output_offset
1596 + got_offset);
1597 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1598 if (rel->r_addend == 2)
1599 {
1600 h->plt.offset |= 1;
1601 }
1602 else if (rel->r_addend != 0)
1603 (*_bfd_error_handler)
1604 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1605 bfd_get_filename (input_bfd), rel->r_addend,
1606 h->root.root.string,
1607 bfd_get_section_name (input_bfd, input_section));
1608 rel->r_addend = 0;
1609
1610 break;
1611
1612 case R_VAX_PC8:
1613 case R_VAX_PC16:
1614 case R_VAX_PC32:
1615 if (h == NULL)
1616 break;
1617 /* Fall through. */
1618 case R_VAX_8:
1619 case R_VAX_16:
1620 case R_VAX_32:
1621 if (info->shared
1622 && r_symndx != 0
1623 && (input_section->flags & SEC_ALLOC) != 0
1624 && ((r_type != R_VAX_PC8
1625 && r_type != R_VAX_PC16
1626 && r_type != R_VAX_PC32)
1627 || (!info->symbolic
f5385ebf 1628 || !h->def_regular)))
90ace9e9
JT
1629 {
1630 Elf_Internal_Rela outrel;
947216bf 1631 bfd_byte *loc;
b34976b6 1632 bfd_boolean skip, relocate;
90ace9e9
JT
1633
1634 /* When generating a shared object, these relocations
1635 are copied into the output file to be resolved at run
1636 time. */
90ace9e9
JT
1637 if (sreloc == NULL)
1638 {
1639 const char *name;
1640
1641 name = (bfd_elf_string_from_elf_section
1642 (input_bfd,
1643 elf_elfheader (input_bfd)->e_shstrndx,
1644 elf_section_data (input_section)->rel_hdr.sh_name));
1645 if (name == NULL)
b34976b6 1646 return FALSE;
90ace9e9
JT
1647
1648 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1649 && strcmp (bfd_get_section_name (input_bfd,
1650 input_section),
1651 name + 5) == 0);
1652
1653 sreloc = bfd_get_section_by_name (dynobj, name);
1654 BFD_ASSERT (sreloc != NULL);
1655 }
1656
b34976b6
AM
1657 skip = FALSE;
1658 relocate = FALSE;
90ace9e9
JT
1659
1660 outrel.r_offset =
1661 _bfd_elf_section_offset (output_bfd, info, input_section,
1662 rel->r_offset);
1663 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1664 skip = TRUE;
90ace9e9 1665 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1666 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1667 outrel.r_offset += (input_section->output_section->vma
1668 + input_section->output_offset);
1669
1670 if (skip)
1671 memset (&outrel, 0, sizeof outrel);
1672 /* h->dynindx may be -1 if the symbol was marked to
1673 become local. */
1674 else if (h != NULL
1675 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1676 || !h->def_regular))
90ace9e9
JT
1677 {
1678 BFD_ASSERT (h->dynindx != -1);
1679 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1680 outrel.r_addend = relocation + rel->r_addend;
1681 }
1682 else
1683 {
1684 if (r_type == R_VAX_32)
1685 {
b34976b6 1686 relocate = TRUE;
90ace9e9
JT
1687 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1688 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1689 &contents[rel->r_offset]) == 0);
1690 outrel.r_addend = relocation + rel->r_addend;
1691 }
1692 else
1693 {
1694 long indx;
1695
8517fae7 1696 if (bfd_is_abs_section (sec))
90ace9e9
JT
1697 indx = 0;
1698 else if (sec == NULL || sec->owner == NULL)
1699 {
1700 bfd_set_error (bfd_error_bad_value);
b34976b6 1701 return FALSE;
90ace9e9
JT
1702 }
1703 else
1704 {
1705 asection *osec;
1706
1707 osec = sec->output_section;
1708 indx = elf_section_data (osec)->dynindx;
1709 BFD_ASSERT (indx > 0);
1710 }
1711
1712 outrel.r_info = ELF32_R_INFO (indx, r_type);
1713 outrel.r_addend = relocation + rel->r_addend;
1714 }
1715 }
1716
1717 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1718 ".text") != 0 ||
90ace9e9
JT
1719 (info->shared
1720 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1721 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1722 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1723 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1724 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1725 {
1726 if (h != NULL)
1727 (*_bfd_error_handler)
1728 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1729 bfd_get_filename (input_bfd), howto->name,
1730 h->root.root.string,
1731 bfd_get_section_name (input_bfd, input_section));
1732 else
1733 (*_bfd_error_handler)
1734 (_("%s: warning: %s relocation to 0x%x from %s section"),
1735 bfd_get_filename (input_bfd), howto->name,
1736 outrel.r_addend,
1737 bfd_get_section_name (input_bfd, input_section));
1738 }
947216bf
AM
1739 loc = sreloc->contents;
1740 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1741 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1742
1743 /* This reloc will be computed at runtime, so there's no
1744 need to do anything now, except for R_VAX_32
1745 relocations that have been turned into
1746 R_VAX_RELATIVE. */
1747 if (!relocate)
1748 continue;
1749 }
1750
1751 break;
1752
1753 case R_VAX_GNU_VTINHERIT:
1754 case R_VAX_GNU_VTENTRY:
1755 /* These are no-ops in the end. */
1756 continue;
1757
1758 default:
1759 break;
1760 }
1761
b34976b6 1762 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1763 So subtract the difference from the relocation amount since we can't
1764 add it to the offset. */
90ace9e9 1765 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1766 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1767
1768 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1769 contents, rel->r_offset,
1770 relocation, rel->r_addend);
1771
1772 if (r != bfd_reloc_ok)
1773 {
1774 switch (r)
1775 {
1776 default:
1777 case bfd_reloc_outofrange:
1778 abort ();
1779 case bfd_reloc_overflow:
1780 {
1781 const char *name;
1782
1783 if (h != NULL)
dfeffb9f 1784 name = NULL;
90ace9e9
JT
1785 else
1786 {
1787 name = bfd_elf_string_from_elf_section (input_bfd,
1788 symtab_hdr->sh_link,
1789 sym->st_name);
1790 if (name == NULL)
b34976b6 1791 return FALSE;
90ace9e9
JT
1792 if (*name == '\0')
1793 name = bfd_section_name (input_bfd, sec);
1794 }
1795 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1796 (info, (h ? &h->root : NULL), name, howto->name,
1797 (bfd_vma) 0, input_bfd, input_section,
1798 rel->r_offset)))
b34976b6 1799 return FALSE;
90ace9e9
JT
1800 }
1801 break;
1802 }
1803 }
1804 }
1805
b34976b6 1806 return TRUE;
90ace9e9
JT
1807}
1808
1809/* Finish up dynamic symbol handling. We set the contents of various
1810 dynamic sections here. */
1811
b34976b6 1812static bfd_boolean
ce71b576
NC
1813elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1814 struct elf_link_hash_entry *h,
1815 Elf_Internal_Sym *sym)
90ace9e9
JT
1816{
1817 bfd *dynobj;
1818
1819 dynobj = elf_hash_table (info)->dynobj;
1820
1821 if (h->plt.offset != (bfd_vma) -1)
1822 {
1823 asection *splt;
1824 asection *sgot;
1825 asection *srela;
1826 bfd_vma plt_index;
1827 bfd_vma got_offset;
1828 bfd_vma addend;
1829 Elf_Internal_Rela rela;
947216bf 1830 bfd_byte *loc;
90ace9e9
JT
1831
1832 /* This symbol has an entry in the procedure linkage table. Set
1833 it up. */
90ace9e9
JT
1834 BFD_ASSERT (h->dynindx != -1);
1835
1836 splt = bfd_get_section_by_name (dynobj, ".plt");
1837 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1838 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1839 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1840
1841 addend = 2 * (h->plt.offset & 1);
1842 h->plt.offset &= ~1;
1843
1844 /* Get the index in the procedure linkage table which
1845 corresponds to this symbol. This is the index of this symbol
1846 in all the symbols for which we are making plt entries. The
1847 first entry in the procedure linkage table is reserved. */
1848 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1849
1850 /* Get the offset into the .got table of the entry that
1851 corresponds to this function. Each .got entry is 4 bytes.
1852 The first two are reserved. */
1853 got_offset = (plt_index + 3) * 4;
1854
1855 /* Fill in the entry in the procedure linkage table. */
1856 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1857 PLT_ENTRY_SIZE);
1858
1859 /* The offset is relative to the first extension word. */
1860 bfd_put_32 (output_bfd,
1861 -(h->plt.offset + 8),
1862 splt->contents + h->plt.offset + 4);
1863
1864 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1865 splt->contents + h->plt.offset + 8);
1866
1867 /* Fill in the entry in the global offset table. */
1868 bfd_put_32 (output_bfd,
1869 (splt->output_section->vma
1870 + splt->output_offset
1871 + h->plt.offset) + addend,
1872 sgot->contents + got_offset);
1873
1874 /* Fill in the entry in the .rela.plt section. */
1875 rela.r_offset = (sgot->output_section->vma
1876 + sgot->output_offset
1877 + got_offset);
1878 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1879 rela.r_addend = addend;
947216bf
AM
1880 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1881 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1882
f5385ebf 1883 if (!h->def_regular)
90ace9e9
JT
1884 {
1885 /* Mark the symbol as undefined, rather than as defined in
1886 the .plt section. Leave the value alone. */
1887 sym->st_shndx = SHN_UNDEF;
1888 }
1889 }
1890
1891 if (h->got.offset != (bfd_vma) -1)
1892 {
1893 asection *sgot;
1894 asection *srela;
1895 Elf_Internal_Rela rela;
947216bf 1896 bfd_byte *loc;
90ace9e9
JT
1897
1898 /* This symbol has an entry in the global offset table. Set it
1899 up. */
90ace9e9
JT
1900 sgot = bfd_get_section_by_name (dynobj, ".got");
1901 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1902 BFD_ASSERT (sgot != NULL && srela != NULL);
1903
1904 rela.r_offset = (sgot->output_section->vma
1905 + sgot->output_offset
1906 + (h->got.offset &~ 1));
1907
1908 /* If the symbol was forced to be local because of a version file
1909 locally we just want to emit a RELATIVE reloc. The entry in
1910 the global offset table will already have been initialized in
1911 the relocate_section function. */
1912 if (info->shared
1913 && h->dynindx == -1
f5385ebf 1914 && h->def_regular)
90ace9e9
JT
1915 {
1916 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1917 }
1918 else
1919 {
1920 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1921 }
1922 rela.r_addend = bfd_get_signed_32 (output_bfd,
1923 (sgot->contents
1924 + (h->got.offset & ~1)));
1925
947216bf
AM
1926 loc = srela->contents;
1927 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1928 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1929 }
1930
f5385ebf 1931 if (h->needs_copy)
90ace9e9
JT
1932 {
1933 asection *s;
1934 Elf_Internal_Rela rela;
947216bf 1935 bfd_byte *loc;
90ace9e9
JT
1936
1937 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1938 BFD_ASSERT (h->dynindx != -1
1939 && (h->root.type == bfd_link_hash_defined
1940 || h->root.type == bfd_link_hash_defweak));
1941
1942 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1943 ".rela.bss");
1944 BFD_ASSERT (s != NULL);
1945
1946 rela.r_offset = (h->root.u.def.value
1947 + h->root.u.def.section->output_section->vma
1948 + h->root.u.def.section->output_offset);
1949 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1950 rela.r_addend = 0;
947216bf
AM
1951 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1952 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1953 }
1954
1955 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1956 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
1957 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1958 sym->st_shndx = SHN_ABS;
1959
b34976b6 1960 return TRUE;
90ace9e9
JT
1961}
1962
1963/* Finish up the dynamic sections. */
1964
b34976b6 1965static bfd_boolean
ce71b576 1966elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1967{
1968 bfd *dynobj;
1969 asection *sgot;
1970 asection *sdyn;
1971
1972 dynobj = elf_hash_table (info)->dynobj;
1973
1974 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1975 BFD_ASSERT (sgot != NULL);
1976 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1977
1978 if (elf_hash_table (info)->dynamic_sections_created)
1979 {
1980 asection *splt;
1981 Elf32_External_Dyn *dyncon, *dynconend;
1982
1983 splt = bfd_get_section_by_name (dynobj, ".plt");
1984 BFD_ASSERT (splt != NULL && sdyn != NULL);
1985
1986 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1987 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1988 for (; dyncon < dynconend; dyncon++)
1989 {
1990 Elf_Internal_Dyn dyn;
1991 const char *name;
1992 asection *s;
1993
1994 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1995
1996 switch (dyn.d_tag)
1997 {
1998 default:
1999 break;
2000
2001 case DT_PLTGOT:
2002 name = ".got";
2003 goto get_vma;
2004 case DT_JMPREL:
2005 name = ".rela.plt";
2006 get_vma:
2007 s = bfd_get_section_by_name (output_bfd, name);
2008 BFD_ASSERT (s != NULL);
2009 dyn.d_un.d_ptr = s->vma;
2010 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2011 break;
2012
2013 case DT_PLTRELSZ:
2014 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2015 BFD_ASSERT (s != NULL);
eea6121a 2016 dyn.d_un.d_val = s->size;
90ace9e9
JT
2017 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2018 break;
2019
2020 case DT_RELASZ:
2021 /* The procedure linkage table relocs (DT_JMPREL) should
2022 not be included in the overall relocs (DT_RELA).
2023 Therefore, we override the DT_RELASZ entry here to
2024 make it not include the JMPREL relocs. Since the
2025 linker script arranges for .rela.plt to follow all
2026 other relocation sections, we don't have to worry
2027 about changing the DT_RELA entry. */
2028 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2029 if (s != NULL)
eea6121a 2030 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2031 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2032 break;
2033 }
2034 }
2035
2036 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2037 if (splt->size > 0)
90ace9e9
JT
2038 {
2039 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2040 bfd_put_32 (output_bfd,
2041 (sgot->output_section->vma
2042 + sgot->output_offset + 4
2043 - (splt->output_section->vma + 6)),
2044 splt->contents + 2);
2045 bfd_put_32 (output_bfd,
2046 (sgot->output_section->vma
2047 + sgot->output_offset + 8
2048 - (splt->output_section->vma + 12)),
2049 splt->contents + 8);
cedb70c5 2050 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2051 = PLT_ENTRY_SIZE;
2052 }
2053 }
2054
2055 /* Fill in the first three entries in the global offset table. */
eea6121a 2056 if (sgot->size > 0)
90ace9e9
JT
2057 {
2058 if (sdyn == NULL)
2059 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2060 else
2061 bfd_put_32 (output_bfd,
2062 sdyn->output_section->vma + sdyn->output_offset,
2063 sgot->contents);
2064 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2065 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2066 }
2067
2068 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2069
b34976b6 2070 return TRUE;
90ace9e9
JT
2071}
2072
2073#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2074#define TARGET_LITTLE_NAME "elf32-vax"
2075#define ELF_MACHINE_CODE EM_VAX
2076#define ELF_MAXPAGESIZE 0x1000
2077
2078#define elf_backend_create_dynamic_sections \
2079 _bfd_elf_create_dynamic_sections
2080#define bfd_elf32_bfd_link_hash_table_create \
2081 elf_vax_link_hash_table_create
c152c796 2082#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2083
2084#define elf_backend_check_relocs elf_vax_check_relocs
2085#define elf_backend_adjust_dynamic_symbol \
2086 elf_vax_adjust_dynamic_symbol
2087#define elf_backend_size_dynamic_sections \
2088 elf_vax_size_dynamic_sections
2089#define elf_backend_relocate_section elf_vax_relocate_section
2090#define elf_backend_finish_dynamic_symbol \
2091 elf_vax_finish_dynamic_symbol
2092#define elf_backend_finish_dynamic_sections \
2093 elf_vax_finish_dynamic_sections
2094#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2095#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2096#define bfd_elf32_bfd_merge_private_bfd_data \
2097 elf32_vax_merge_private_bfd_data
2098#define bfd_elf32_bfd_set_private_flags \
2099 elf32_vax_set_private_flags
2100#define bfd_elf32_bfd_print_private_bfd_data \
2101 elf32_vax_print_private_bfd_data
2102
2103#define elf_backend_can_gc_sections 1
2104#define elf_backend_want_got_plt 1
2105#define elf_backend_plt_readonly 1
2106#define elf_backend_want_plt_sym 0
2107#define elf_backend_got_header_size 16
f0fe0e16 2108#define elf_backend_rela_normal 1
90ace9e9
JT
2109
2110#include "elf32-target.h"