]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-vax.c
Switch sources over to use the GPL version 3
[thirdparty/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
157090f7 3 2004, 2005, 2006, 2007 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
ae9a127f 11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
90ace9e9 22
90ace9e9 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
90ace9e9
JT
25#include "bfdlink.h"
26#include "libbfd.h"
27#include "elf-bfd.h"
28#include "elf/vax.h"
29
ce71b576
NC
30static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
31static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
32static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
33 struct bfd_hash_table *,
34 const char *);
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
36static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
37 asection *, const Elf_Internal_Rela *);
ce71b576
NC
38static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
39 struct elf_link_hash_entry *);
40static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
41static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
42 bfd *, asection *, bfd_byte *,
43 Elf_Internal_Rela *,
44 Elf_Internal_Sym *, asection **);
45static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
46 struct elf_link_hash_entry *,
47 Elf_Internal_Sym *);
48static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
49 struct bfd_link_info *);
50
51static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
52static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
58 0, /* size (0 = byte, 1 = short, 2 = long) */
59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
ce71b576
NC
282rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
283 Elf_Internal_Rela *dst)
90ace9e9
JT
284{
285 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
286 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
287}
288
289#define elf_info_to_howto rtype_to_howto
290
291static const struct
292{
293 bfd_reloc_code_real_type bfd_val;
294 int elf_val;
295} reloc_map[] = {
296 { BFD_RELOC_NONE, R_VAX_NONE },
297 { BFD_RELOC_32, R_VAX_32 },
298 { BFD_RELOC_16, R_VAX_16 },
299 { BFD_RELOC_8, R_VAX_8 },
300 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
301 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
302 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
303 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
304 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
305 { BFD_RELOC_NONE, R_VAX_COPY },
306 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
307 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
308 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
309 { BFD_RELOC_CTOR, R_VAX_32 },
310 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
311 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
312};
313
314static reloc_howto_type *
ce71b576 315reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
316{
317 unsigned int i;
318 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
319 {
320 if (reloc_map[i].bfd_val == code)
321 return &howto_table[reloc_map[i].elf_val];
322 }
323 return 0;
324}
325
157090f7
AM
326static reloc_howto_type *
327reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
328 const char *r_name)
329{
330 unsigned int i;
331
332 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
333 if (howto_table[i].name != NULL
334 && strcasecmp (howto_table[i].name, r_name) == 0)
335 return &howto_table[i];
336
337 return NULL;
338}
339
90ace9e9 340#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 341#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
ce71b576
NC
417static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
418 PTR);
90ace9e9 419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
ce71b576
NC
422static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
423 PTR);
b29635ba 424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
ce71b576 430 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
ce71b576 435#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
436
437/* Create an entry in an VAX ELF linker hash table. */
438
439static struct bfd_hash_entry *
ce71b576
NC
440elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
441 struct bfd_hash_table *table,
442 const char *string)
90ace9e9
JT
443{
444 struct elf_vax_link_hash_entry *ret =
445 (struct elf_vax_link_hash_entry *) entry;
446
447 /* Allocate the structure if it has not already been allocated by a
448 subclass. */
ce71b576 449 if (ret == NULL)
90ace9e9
JT
450 ret = ((struct elf_vax_link_hash_entry *)
451 bfd_hash_allocate (table,
452 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 453 if (ret == NULL)
90ace9e9
JT
454 return (struct bfd_hash_entry *) ret;
455
456 /* Call the allocation method of the superclass. */
457 ret = ((struct elf_vax_link_hash_entry *)
458 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
459 table, string));
ce71b576 460 if (ret != NULL)
90ace9e9
JT
461 {
462 ret->pcrel_relocs_copied = NULL;
463 }
464
465 return (struct bfd_hash_entry *) ret;
466}
467
468/* Create an VAX ELF linker hash table. */
469
470static struct bfd_link_hash_table *
ce71b576 471elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
472{
473 struct elf_vax_link_hash_table *ret;
474 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
475
ce71b576
NC
476 ret = bfd_malloc (amt);
477 if (ret == NULL)
90ace9e9
JT
478 return NULL;
479
66eb6687
AM
480 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
481 elf_vax_link_hash_newfunc,
482 sizeof (struct elf_vax_link_hash_entry)))
90ace9e9
JT
483 {
484 free (ret);
485 return NULL;
486 }
487
488 return &ret->root.root;
489}
490
491/* Keep vax-specific flags in the ELF header */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
494{
495 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
90ace9e9
JT
498}
499
500/* Merge backend specific data from an object file to the output
501 object file when linking. */
b34976b6 502static bfd_boolean
ce71b576 503elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
504{
505 flagword out_flags;
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 510 return TRUE;
90ace9e9
JT
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
513 out_flags = elf_elfheader (obfd)->e_flags;
514
515 if (!elf_flags_init (obfd))
516 {
b34976b6 517 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
518 elf_elfheader (obfd)->e_flags = in_flags;
519 }
520
b34976b6 521 return TRUE;
90ace9e9
JT
522}
523
524/* Display the flags field */
b34976b6 525static bfd_boolean
ce71b576 526elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
527{
528 FILE *file = (FILE *) ptr;
529
530 BFD_ASSERT (abfd != NULL && ptr != NULL);
531
532 /* Print normal ELF private data. */
533 _bfd_elf_print_private_bfd_data (abfd, ptr);
534
535 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
536
537 /* xgettext:c-format */
538 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
539
179d3252 540 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
541 fprintf (file, _(" [nonpic]"));
542
179d3252 543 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
544 fprintf (file, _(" [d-float]"));
545
179d3252 546 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
547 fprintf (file, _(" [g-float]"));
548
549 fputc ('\n', file);
550
b34976b6 551 return TRUE;
90ace9e9
JT
552}
553/* Look through the relocs for a section during the first phase, and
554 allocate space in the global offset table or procedure linkage
555 table. */
556
b34976b6 557static bfd_boolean
ce71b576
NC
558elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
559 const Elf_Internal_Rela *relocs)
90ace9e9
JT
560{
561 bfd *dynobj;
562 Elf_Internal_Shdr *symtab_hdr;
563 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
564 const Elf_Internal_Rela *rel;
565 const Elf_Internal_Rela *rel_end;
566 asection *sgot;
567 asection *srelgot;
568 asection *sreloc;
569
1049f94e 570 if (info->relocatable)
b34976b6 571 return TRUE;
90ace9e9
JT
572
573 dynobj = elf_hash_table (info)->dynobj;
574 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
575 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
576
577 sgot = NULL;
578 srelgot = NULL;
579 sreloc = NULL;
580
581 rel_end = relocs + sec->reloc_count;
582 for (rel = relocs; rel < rel_end; rel++)
583 {
584 unsigned long r_symndx;
585 struct elf_link_hash_entry *h;
586
587 r_symndx = ELF32_R_SYM (rel->r_info);
588
589 if (r_symndx < symtab_hdr->sh_info)
590 h = NULL;
591 else
973a3492
L
592 {
593 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
594 while (h->root.type == bfd_link_hash_indirect
595 || h->root.type == bfd_link_hash_warning)
596 h = (struct elf_link_hash_entry *) h->root.u.i.link;
597 }
90ace9e9
JT
598
599 switch (ELF32_R_TYPE (rel->r_info))
600 {
601 case R_VAX_GOT32:
602 if (h != NULL
603 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
604 break;
605
606 /* This symbol requires a global offset table entry. */
607
608 if (dynobj == NULL)
609 {
610 /* Create the .got section. */
611 elf_hash_table (info)->dynobj = dynobj = abfd;
612 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 613 return FALSE;
90ace9e9
JT
614 }
615
616 if (sgot == NULL)
617 {
618 sgot = bfd_get_section_by_name (dynobj, ".got");
619 BFD_ASSERT (sgot != NULL);
620 }
621
622 if (srelgot == NULL
623 && (h != NULL || info->shared))
624 {
625 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
626 if (srelgot == NULL)
627 {
3496cb2a
L
628 srelgot = bfd_make_section_with_flags (dynobj,
629 ".rela.got",
630 (SEC_ALLOC
631 | SEC_LOAD
632 | SEC_HAS_CONTENTS
633 | SEC_IN_MEMORY
634 | SEC_LINKER_CREATED
635 | SEC_READONLY));
90ace9e9 636 if (srelgot == NULL
90ace9e9 637 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 638 return FALSE;
90ace9e9
JT
639 }
640 }
641
642 if (h != NULL)
643 {
644 struct elf_vax_link_hash_entry *eh;
645
646 eh = (struct elf_vax_link_hash_entry *) h;
647 if (h->got.refcount == -1)
648 {
649 h->got.refcount = 1;
650 eh->got_addend = rel->r_addend;
90ace9e9
JT
651 }
652 else
653 {
654 h->got.refcount++;
655 if (eh->got_addend != (bfd_vma) rel->r_addend)
656 (*_bfd_error_handler)
657 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
658 bfd_get_filename (abfd), rel->r_addend,
659 h->root.root.string,
660 eh->got_addend);
cedb70c5 661
90ace9e9
JT
662 }
663 }
664 break;
665
666 case R_VAX_PLT32:
667 /* This symbol requires a procedure linkage table entry. We
668 actually build the entry in adjust_dynamic_symbol,
669 because this might be a case of linking PIC code which is
670 never referenced by a dynamic object, in which case we
671 don't need to generate a procedure linkage table entry
672 after all. */
673
674 /* If this is a local symbol, we resolve it directly without
675 creating a procedure linkage table entry. */
676 if (h == NULL)
677 continue;
678
f5385ebf 679 h->needs_plt = 1;
90ace9e9
JT
680 if (h->plt.refcount == -1)
681 h->plt.refcount = 1;
682 else
683 h->plt.refcount++;
684 break;
685
686 case R_VAX_PC8:
687 case R_VAX_PC16:
688 case R_VAX_PC32:
689 /* If we are creating a shared library and this is not a local
690 symbol, we need to copy the reloc into the shared library.
691 However when linking with -Bsymbolic and this is a global
692 symbol which is defined in an object we are including in the
693 link (i.e., DEF_REGULAR is set), then we can resolve the
694 reloc directly. At this point we have not seen all the input
695 files, so it is possible that DEF_REGULAR is not set now but
696 will be set later (it is never cleared). We account for that
697 possibility below by storing information in the
698 pcrel_relocs_copied field of the hash table entry. */
699 if (!(info->shared
700 && (sec->flags & SEC_ALLOC) != 0
701 && h != NULL
702 && (!info->symbolic
f5385ebf 703 || !h->def_regular)))
90ace9e9
JT
704 {
705 if (h != NULL)
706 {
707 /* Make sure a plt entry is created for this symbol if
708 it turns out to be a function defined by a dynamic
709 object. */
710 if (h->plt.refcount == -1)
711 h->plt.refcount = 1;
712 else
713 h->plt.refcount++;
714 }
715 break;
716 }
717 /* Fall through. */
718 case R_VAX_8:
719 case R_VAX_16:
720 case R_VAX_32:
721 if (h != NULL)
722 {
723 /* Make sure a plt entry is created for this symbol if it
724 turns out to be a function defined by a dynamic object. */
725 if (h->plt.refcount == -1)
726 h->plt.refcount = 1;
727 else
728 h->plt.refcount++;
729 }
730
731 /* If we are creating a shared library, we need to copy the
732 reloc into the shared library. */
733 if (info->shared
734 && (sec->flags & SEC_ALLOC) != 0)
735 {
736 /* When creating a shared object, we must copy these
737 reloc types into the output file. We create a reloc
738 section in dynobj and make room for this reloc. */
739 if (sreloc == NULL)
740 {
741 const char *name;
742
743 name = (bfd_elf_string_from_elf_section
744 (abfd,
745 elf_elfheader (abfd)->e_shstrndx,
746 elf_section_data (sec)->rel_hdr.sh_name));
747 if (name == NULL)
b34976b6 748 return FALSE;
90ace9e9 749
0112cd26 750 BFD_ASSERT (CONST_STRNEQ (name, ".rela")
90ace9e9
JT
751 && strcmp (bfd_get_section_name (abfd, sec),
752 name + 5) == 0);
753
754 sreloc = bfd_get_section_by_name (dynobj, name);
755 if (sreloc == NULL)
756 {
3496cb2a
L
757 sreloc = bfd_make_section_with_flags (dynobj,
758 name,
759 (SEC_ALLOC
760 | SEC_LOAD
761 | SEC_HAS_CONTENTS
762 | SEC_IN_MEMORY
763 | SEC_LINKER_CREATED
764 | SEC_READONLY));
90ace9e9 765 if (sreloc == NULL
90ace9e9 766 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 767 return FALSE;
90ace9e9
JT
768 }
769 if (sec->flags & SEC_READONLY)
770 info->flags |= DF_TEXTREL;
771 }
772
eea6121a 773 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
774
775 /* If we are linking with -Bsymbolic, we count the number of
776 PC relative relocations we have entered for this symbol,
777 so that we can discard them again if the symbol is later
778 defined by a regular object. Note that this function is
19852a2a 779 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
780 which means that h is really a pointer to an
781 elf_vax_link_hash_entry. */
782 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
783 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
784 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
785 && info->symbolic)
786 {
787 struct elf_vax_link_hash_entry *eh;
788 struct elf_vax_pcrel_relocs_copied *p;
789
790 eh = (struct elf_vax_link_hash_entry *) h;
791
792 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
793 if (p->section == sreloc)
794 break;
795
796 if (p == NULL)
797 {
798 p = ((struct elf_vax_pcrel_relocs_copied *)
799 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
800 if (p == NULL)
b34976b6 801 return FALSE;
90ace9e9
JT
802 p->next = eh->pcrel_relocs_copied;
803 eh->pcrel_relocs_copied = p;
804 p->section = sreloc;
805 p->count = 0;
806 }
807
808 ++p->count;
809 }
810 }
811
812 break;
813
814 /* This relocation describes the C++ object vtable hierarchy.
815 Reconstruct it for later use during GC. */
816 case R_VAX_GNU_VTINHERIT:
c152c796 817 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 818 return FALSE;
90ace9e9
JT
819 break;
820
821 /* This relocation describes which C++ vtable entries are actually
822 used. Record for later use during GC. */
823 case R_VAX_GNU_VTENTRY:
c152c796 824 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 825 return FALSE;
90ace9e9
JT
826 break;
827
828 default:
829 break;
830 }
831 }
832
b34976b6 833 return TRUE;
90ace9e9
JT
834}
835
836/* Return the section that should be marked against GC for a given
837 relocation. */
838
839static asection *
ce71b576 840elf_vax_gc_mark_hook (asection *sec,
07adf181 841 struct bfd_link_info *info,
ce71b576
NC
842 Elf_Internal_Rela *rel,
843 struct elf_link_hash_entry *h,
844 Elf_Internal_Sym *sym)
90ace9e9
JT
845{
846 if (h != NULL)
07adf181
AM
847 switch (ELF32_R_TYPE (rel->r_info))
848 {
849 case R_VAX_GNU_VTINHERIT:
850 case R_VAX_GNU_VTENTRY:
851 return NULL;
852 }
853
854 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
855}
856
857/* Update the got entry reference counts for the section being removed. */
858
b34976b6 859static bfd_boolean
ce71b576
NC
860elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
861 const Elf_Internal_Rela *relocs)
90ace9e9
JT
862{
863 Elf_Internal_Shdr *symtab_hdr;
864 struct elf_link_hash_entry **sym_hashes;
90ace9e9 865 const Elf_Internal_Rela *rel, *relend;
90ace9e9 866 bfd *dynobj;
90ace9e9 867
90ace9e9
JT
868 dynobj = elf_hash_table (info)->dynobj;
869 if (dynobj == NULL)
b34976b6 870 return TRUE;
90ace9e9 871
babfd660
KH
872 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
873 sym_hashes = elf_sym_hashes (abfd);
874
90ace9e9
JT
875 relend = relocs + sec->reloc_count;
876 for (rel = relocs; rel < relend; rel++)
877 {
babfd660 878 unsigned long r_symndx;
3eb128b2
AM
879 struct elf_link_hash_entry *h = NULL;
880
881 r_symndx = ELF32_R_SYM (rel->r_info);
882 if (r_symndx >= symtab_hdr->sh_info)
883 {
884 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
885 while (h->root.type == bfd_link_hash_indirect
886 || h->root.type == bfd_link_hash_warning)
887 h = (struct elf_link_hash_entry *) h->root.u.i.link;
888 }
babfd660 889
90ace9e9
JT
890 switch (ELF32_R_TYPE (rel->r_info))
891 {
892 case R_VAX_GOT32:
3eb128b2
AM
893 if (h != NULL && h->got.refcount > 0)
894 --h->got.refcount;
90ace9e9
JT
895 break;
896
897 case R_VAX_PLT32:
898 case R_VAX_PC8:
899 case R_VAX_PC16:
900 case R_VAX_PC32:
901 case R_VAX_8:
902 case R_VAX_16:
903 case R_VAX_32:
3eb128b2
AM
904 if (h != NULL && h->plt.refcount > 0)
905 --h->plt.refcount;
90ace9e9
JT
906 break;
907
908 default:
909 break;
910 }
911 }
912
b34976b6 913 return TRUE;
90ace9e9
JT
914}
915
916/* Adjust a symbol defined by a dynamic object and referenced by a
917 regular object. The current definition is in some section of the
918 dynamic object, but we're not including those sections. We have to
919 change the definition to something the rest of the link can
920 understand. */
921
b34976b6 922static bfd_boolean
90ace9e9
JT
923elf_vax_adjust_dynamic_symbol (info, h)
924 struct bfd_link_info *info;
925 struct elf_link_hash_entry *h;
926{
927 bfd *dynobj;
928 asection *s;
90ace9e9
JT
929
930 dynobj = elf_hash_table (info)->dynobj;
931
932 /* Make sure we know what is going on here. */
933 BFD_ASSERT (dynobj != NULL
f5385ebf 934 && (h->needs_plt
f6e332e6 935 || h->u.weakdef != NULL
f5385ebf
AM
936 || (h->def_dynamic
937 && h->ref_regular
938 && !h->def_regular)));
90ace9e9
JT
939
940 /* If this is a function, put it in the procedure linkage table. We
941 will fill in the contents of the procedure linkage table later,
942 when we know the address of the .got section. */
943 if (h->type == STT_FUNC
f5385ebf 944 || h->needs_plt)
90ace9e9
JT
945 {
946 if (! info->shared
f5385ebf
AM
947 && !h->def_dynamic
948 && !h->ref_dynamic
90ace9e9
JT
949 /* We must always create the plt entry if it was referenced
950 by a PLTxxO relocation. In this case we already recorded
951 it as a dynamic symbol. */
952 && h->dynindx == -1)
953 {
954 /* This case can occur if we saw a PLTxx reloc in an input
955 file, but the symbol was never referred to by a dynamic
956 object. In such a case, we don't actually need to build
957 a procedure linkage table, and we can just do a PCxx
958 reloc instead. */
f5385ebf 959 BFD_ASSERT (h->needs_plt);
90ace9e9 960 h->plt.offset = (bfd_vma) -1;
b34976b6 961 return TRUE;
90ace9e9
JT
962 }
963
964 /* GC may have rendered this entry unused. */
965 if (h->plt.refcount <= 0)
966 {
f5385ebf 967 h->needs_plt = 0;
90ace9e9 968 h->plt.offset = (bfd_vma) -1;
b34976b6 969 return TRUE;
90ace9e9
JT
970 }
971
972 /* Make sure this symbol is output as a dynamic symbol. */
973 if (h->dynindx == -1)
974 {
c152c796 975 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 976 return FALSE;
90ace9e9
JT
977 }
978
979 s = bfd_get_section_by_name (dynobj, ".plt");
980 BFD_ASSERT (s != NULL);
981
982 /* If this is the first .plt entry, make room for the special
983 first entry. */
eea6121a 984 if (s->size == 0)
90ace9e9 985 {
eea6121a 986 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
987 }
988
989 /* If this symbol is not defined in a regular file, and we are
990 not generating a shared library, then set the symbol to this
991 location in the .plt. This is required to make function
992 pointers compare as equal between the normal executable and
993 the shared library. */
994 if (!info->shared
f5385ebf 995 && !h->def_regular)
90ace9e9
JT
996 {
997 h->root.u.def.section = s;
eea6121a 998 h->root.u.def.value = s->size;
90ace9e9
JT
999 }
1000
eea6121a 1001 h->plt.offset = s->size;
90ace9e9
JT
1002
1003 /* Make room for this entry. */
eea6121a 1004 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1005
1006 /* We also need to make an entry in the .got.plt section, which
1007 will be placed in the .got section by the linker script. */
1008
1009 s = bfd_get_section_by_name (dynobj, ".got.plt");
1010 BFD_ASSERT (s != NULL);
eea6121a 1011 s->size += 4;
90ace9e9
JT
1012
1013 /* We also need to make an entry in the .rela.plt section. */
1014
1015 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1016 BFD_ASSERT (s != NULL);
eea6121a 1017 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1018
b34976b6 1019 return TRUE;
90ace9e9
JT
1020 }
1021
1022 /* Reinitialize the plt offset now that it is not used as a reference
1023 count any more. */
1024 h->plt.offset = (bfd_vma) -1;
1025
1026 /* If this is a weak symbol, and there is a real definition, the
1027 processor independent code will have arranged for us to see the
1028 real definition first, and we can just use the same value. */
f6e332e6 1029 if (h->u.weakdef != NULL)
90ace9e9 1030 {
f6e332e6
AM
1031 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1032 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1033 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1034 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1035 return TRUE;
90ace9e9
JT
1036 }
1037
1038 /* This is a reference to a symbol defined by a dynamic object which
1039 is not a function. */
1040
1041 /* If we are creating a shared library, we must presume that the
1042 only references to the symbol are via the global offset table.
1043 For such cases we need not do anything here; the relocations will
1044 be handled correctly by relocate_section. */
1045 if (info->shared)
b34976b6 1046 return TRUE;
90ace9e9 1047
909272ee
AM
1048 if (h->size == 0)
1049 {
1050 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1051 h->root.root.string);
1052 return TRUE;
1053 }
1054
90ace9e9
JT
1055 /* We must allocate the symbol in our .dynbss section, which will
1056 become part of the .bss section of the executable. There will be
1057 an entry for this symbol in the .dynsym section. The dynamic
1058 object will contain position independent code, so all references
1059 from the dynamic object to this symbol will go through the global
1060 offset table. The dynamic linker will use the .dynsym entry to
1061 determine the address it must put in the global offset table, so
1062 both the dynamic object and the regular object will refer to the
1063 same memory location for the variable. */
1064
1065 s = bfd_get_section_by_name (dynobj, ".dynbss");
1066 BFD_ASSERT (s != NULL);
1067
1068 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1069 copy the initial value out of the dynamic object and into the
1070 runtime process image. We need to remember the offset into the
1071 .rela.bss section we are going to use. */
1072 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1073 {
1074 asection *srel;
1075
1076 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1077 BFD_ASSERT (srel != NULL);
eea6121a 1078 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1079 h->needs_copy = 1;
90ace9e9
JT
1080 }
1081
027297b7 1082 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1083}
1084
1085/* Set the sizes of the dynamic sections. */
1086
b34976b6 1087static bfd_boolean
ce71b576 1088elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1089{
1090 bfd *dynobj;
1091 asection *s;
b34976b6
AM
1092 bfd_boolean plt;
1093 bfd_boolean relocs;
1094 bfd_boolean reltext;
90ace9e9
JT
1095
1096 dynobj = elf_hash_table (info)->dynobj;
1097 BFD_ASSERT (dynobj != NULL);
1098
1099 if (elf_hash_table (info)->dynamic_sections_created)
1100 {
1101 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1102 if (info->executable)
90ace9e9
JT
1103 {
1104 s = bfd_get_section_by_name (dynobj, ".interp");
1105 BFD_ASSERT (s != NULL);
eea6121a 1106 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1107 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1108 }
1109 }
1110 else
1111 {
1112 /* We may have created entries in the .rela.got and .got sections.
1113 However, if we are not creating the dynamic sections, we will
1114 not actually use these entries. Reset the size of .rela.got
1115 and .got, which will cause it to get stripped from the output
1116 file below. */
1117 s = bfd_get_section_by_name (dynobj, ".rela.got");
1118 if (s != NULL)
eea6121a 1119 s->size = 0;
90ace9e9
JT
1120 s = bfd_get_section_by_name (dynobj, ".got.plt");
1121 if (s != NULL)
eea6121a 1122 s->size = 0;
90ace9e9
JT
1123 s = bfd_get_section_by_name (dynobj, ".got");
1124 if (s != NULL)
eea6121a 1125 s->size = 0;
90ace9e9
JT
1126 }
1127
1128 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1129 relative relocs against symbols defined in a regular object. We
1130 allocated space for them in the check_relocs routine, but we will not
1131 fill them in in the relocate_section routine. */
1132 if (info->shared && info->symbolic)
1133 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1134 elf_vax_discard_copies,
ce71b576 1135 NULL);
b29635ba 1136
b34976b6 1137 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1138 discard all the got entries we've recorded. Otherwise, we need to
1139 instantiate (allocate space for them). */
1140 elf_link_hash_traverse (elf_hash_table (info),
1141 elf_vax_instantiate_got_entries,
1142 (PTR) info);
90ace9e9
JT
1143
1144 /* The check_relocs and adjust_dynamic_symbol entry points have
1145 determined the sizes of the various dynamic sections. Allocate
1146 memory for them. */
b34976b6
AM
1147 plt = FALSE;
1148 relocs = FALSE;
1149 reltext = FALSE;
90ace9e9
JT
1150 for (s = dynobj->sections; s != NULL; s = s->next)
1151 {
1152 const char *name;
90ace9e9
JT
1153
1154 if ((s->flags & SEC_LINKER_CREATED) == 0)
1155 continue;
1156
1157 /* It's OK to base decisions on the section name, because none
1158 of the dynobj section names depend upon the input files. */
1159 name = bfd_get_section_name (dynobj, s);
1160
90ace9e9
JT
1161 if (strcmp (name, ".plt") == 0)
1162 {
c456f082
AM
1163 /* Remember whether there is a PLT. */
1164 plt = s->size != 0;
90ace9e9 1165 }
0112cd26 1166 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1167 {
c456f082 1168 if (s->size != 0)
90ace9e9
JT
1169 {
1170 asection *target;
1171
1172 /* Remember whether there are any reloc sections other
1173 than .rela.plt. */
1174 if (strcmp (name, ".rela.plt") != 0)
1175 {
1176 const char *outname;
1177
b34976b6 1178 relocs = TRUE;
90ace9e9
JT
1179
1180 /* If this relocation section applies to a read only
1181 section, then we probably need a DT_TEXTREL
1182 entry. .rela.plt is actually associated with
1183 .got.plt, which is never readonly. */
1184 outname = bfd_get_section_name (output_bfd,
1185 s->output_section);
1186 target = bfd_get_section_by_name (output_bfd, outname + 5);
1187 if (target != NULL
1188 && (target->flags & SEC_READONLY) != 0
1189 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1190 reltext = TRUE;
90ace9e9
JT
1191 }
1192
1193 /* We use the reloc_count field as a counter if we need
1194 to copy relocs into the output file. */
1195 s->reloc_count = 0;
1196 }
1197 }
0112cd26 1198 else if (! CONST_STRNEQ (name, ".got")
c456f082 1199 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1200 {
1201 /* It's not one of our sections, so don't allocate space. */
1202 continue;
1203 }
1204
c456f082 1205 if (s->size == 0)
90ace9e9 1206 {
c456f082
AM
1207 /* If we don't need this section, strip it from the
1208 output file. This is mostly to handle .rela.bss and
1209 .rela.plt. We must create both sections in
1210 create_dynamic_sections, because they must be created
1211 before the linker maps input sections to output
1212 sections. The linker does that before
1213 adjust_dynamic_symbol is called, and it is that
1214 function which decides whether anything needs to go
1215 into these sections. */
8423293d 1216 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1217 continue;
1218 }
1219
c456f082
AM
1220 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1221 continue;
1222
90ace9e9 1223 /* Allocate memory for the section contents. */
eea6121a 1224 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1225 if (s->contents == NULL)
b34976b6 1226 return FALSE;
90ace9e9
JT
1227 }
1228
1229 if (elf_hash_table (info)->dynamic_sections_created)
1230 {
1231 /* Add some entries to the .dynamic section. We fill in the
1232 values later, in elf_vax_finish_dynamic_sections, but we
1233 must add the entries now so that we get the correct size for
1234 the .dynamic section. The DT_DEBUG entry is filled in by the
1235 dynamic linker and used by the debugger. */
1236#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1237 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1238
1239 if (!info->shared)
1240 {
1241 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1242 return FALSE;
90ace9e9
JT
1243 }
1244
1245 if (plt)
1246 {
1247 if (!add_dynamic_entry (DT_PLTGOT, 0)
1248 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1249 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1250 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1251 return FALSE;
90ace9e9
JT
1252 }
1253
1254 if (relocs)
1255 {
1256 if (!add_dynamic_entry (DT_RELA, 0)
1257 || !add_dynamic_entry (DT_RELASZ, 0)
1258 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1259 return FALSE;
90ace9e9
JT
1260 }
1261
1262 if (reltext || (info->flags & DF_TEXTREL) != 0)
1263 {
1264 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1265 return FALSE;
90ace9e9
JT
1266 }
1267 }
1268#undef add_dynamic_entry
1269
b34976b6 1270 return TRUE;
90ace9e9
JT
1271}
1272
1273/* This function is called via elf_vax_link_hash_traverse if we are
1274 creating a shared object with -Bsymbolic. It discards the space
1275 allocated to copy PC relative relocs against symbols which are defined
1276 in regular objects. We allocated space for them in the check_relocs
1277 routine, but we won't fill them in in the relocate_section routine. */
1278
b34976b6 1279static bfd_boolean
ce71b576
NC
1280elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1281 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1282{
1283 struct elf_vax_pcrel_relocs_copied *s;
1284
1285 if (h->root.root.type == bfd_link_hash_warning)
1286 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1287
1288 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1289 if (!h->root.def_regular)
b34976b6 1290 return TRUE;
90ace9e9
JT
1291
1292 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1293 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1294
b34976b6 1295 return TRUE;
90ace9e9
JT
1296}
1297
b29635ba
JT
1298/* This function is called via elf_link_hash_traverse. It looks for entries
1299 that have GOT or PLT (.GOT) references. If creating a static object or a
1300 shared object with -Bsymbolic, it resets the reference count back to 0
1301 and sets the offset to -1 so normal PC32 relocation will be done. If
1302 creating a shared object or executable, space in the .got and .rela.got
1303 will be reserved for the symbol. */
1304
b34976b6 1305static bfd_boolean
ce71b576 1306elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1307{
1308 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1309 bfd *dynobj;
1310 asection *sgot;
1311 asection *srelgot;
b34976b6 1312
b29635ba
JT
1313 /* We don't care about non-GOT (and non-PLT) entries. */
1314 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1315 return TRUE;
b29635ba
JT
1316
1317 dynobj = elf_hash_table (info)->dynobj;
1318 if (dynobj == NULL)
b34976b6 1319 return TRUE;
b29635ba
JT
1320
1321 sgot = bfd_get_section_by_name (dynobj, ".got");
1322 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1323
1324 if (!elf_hash_table (info)->dynamic_sections_created
1325 || (info->shared && info->symbolic))
1326 {
1327 h->got.refcount = 0;
1328 h->got.offset = (bfd_vma) -1;
1329 h->plt.refcount = 0;
1330 h->plt.offset = (bfd_vma) -1;
1331 }
1332 else if (h->got.refcount > 0)
1333 {
1334 /* Make sure this symbol is output as a dynamic symbol. */
1335 if (h->dynindx == -1)
1336 {
c152c796 1337 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1338 return FALSE;
b29635ba
JT
1339 }
1340
1341 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1342 sgot->size += 4;
1343 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1344 }
1345
b34976b6 1346 return TRUE;
b29635ba
JT
1347}
1348
90ace9e9
JT
1349/* Relocate an VAX ELF section. */
1350
b34976b6 1351static bfd_boolean
ce71b576
NC
1352elf_vax_relocate_section (bfd *output_bfd,
1353 struct bfd_link_info *info,
1354 bfd *input_bfd,
1355 asection *input_section,
1356 bfd_byte *contents,
1357 Elf_Internal_Rela *relocs,
1358 Elf_Internal_Sym *local_syms,
1359 asection **local_sections)
90ace9e9
JT
1360{
1361 bfd *dynobj;
1362 Elf_Internal_Shdr *symtab_hdr;
1363 struct elf_link_hash_entry **sym_hashes;
1364 bfd_vma *local_got_offsets;
1365 bfd_vma plt_index;
1366 bfd_vma got_offset;
1367 asection *sgot;
1368 asection *splt;
1369 asection *sgotplt;
1370 asection *sreloc;
1371 Elf_Internal_Rela *rel;
1372 Elf_Internal_Rela *relend;
1373
1374 dynobj = elf_hash_table (info)->dynobj;
1375 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1376 sym_hashes = elf_sym_hashes (input_bfd);
1377 local_got_offsets = elf_local_got_offsets (input_bfd);
1378
1379 sgot = NULL;
1380 splt = NULL;
1381 sgotplt = NULL;
1382 sreloc = NULL;
1383
1384 rel = relocs;
1385 relend = relocs + input_section->reloc_count;
1386 for (; rel < relend; rel++)
1387 {
1388 int r_type;
1389 reloc_howto_type *howto;
1390 unsigned long r_symndx;
1391 struct elf_link_hash_entry *h;
1392 Elf_Internal_Sym *sym;
1393 asection *sec;
1394 bfd_vma relocation;
1395 bfd_reloc_status_type r;
1396
1397 r_type = ELF32_R_TYPE (rel->r_info);
1398 if (r_type < 0 || r_type >= (int) R_VAX_max)
1399 {
1400 bfd_set_error (bfd_error_bad_value);
b34976b6 1401 return FALSE;
90ace9e9
JT
1402 }
1403 howto = howto_table + r_type;
1404
f0fe0e16 1405 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1406 h = NULL;
1407 sym = NULL;
1408 sec = NULL;
1409 if (r_symndx < symtab_hdr->sh_info)
1410 {
1411 sym = local_syms + r_symndx;
1412 sec = local_sections[r_symndx];
8517fae7 1413 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1414 }
1415 else
1416 {
560e09e9
NC
1417 bfd_boolean unresolved_reloc;
1418 bfd_boolean warned;
1419
b2a8e766
AM
1420 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1421 r_symndx, symtab_hdr, sym_hashes,
1422 h, sec, relocation,
1423 unresolved_reloc, warned);
ce71b576 1424
560e09e9 1425 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1426 || h->root.type == bfd_link_hash_defweak)
560e09e9 1427 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1428 && h->plt.offset != (bfd_vma) -1
1429 && elf_hash_table (info)->dynamic_sections_created)
1430 || (r_type == R_VAX_GOT32
1431 && strcmp (h->root.root.string,
1432 "_GLOBAL_OFFSET_TABLE_") != 0
1433 && elf_hash_table (info)->dynamic_sections_created
1434 && (! info->shared
1435 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1436 || !h->def_regular))
90ace9e9
JT
1437 || (info->shared
1438 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1439 || !h->def_regular)
90ace9e9
JT
1440 && ((input_section->flags & SEC_ALLOC) != 0
1441 /* DWARF will emit R_VAX_32 relocations in its
1442 sections against symbols defined externally
1443 in shared libraries. We can't do anything
1444 with them here. */
1445
1446 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1447 && h->def_dynamic))
90ace9e9
JT
1448 && (r_type == R_VAX_8
1449 || r_type == R_VAX_16
1450 || r_type == R_VAX_32
1451 || r_type == R_VAX_PC8
1452 || r_type == R_VAX_PC16
560e09e9
NC
1453 || r_type == R_VAX_PC32))))
1454 /* In these cases, we don't need the relocation
1455 value. We check specially because in some
1456 obscure cases sec->output_section will be NULL. */
90ace9e9 1457 relocation = 0;
90ace9e9
JT
1458 }
1459
ab96bf03
AM
1460 if (sec != NULL && elf_discarded_section (sec))
1461 {
1462 /* For relocs against symbols from removed linkonce sections,
1463 or sections discarded by a linker script, we just want the
1464 section contents zeroed. Avoid any special processing. */
1465 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1466 rel->r_info = 0;
1467 rel->r_addend = 0;
1468 continue;
1469 }
1470
1471 if (info->relocatable)
1472 continue;
1473
90ace9e9
JT
1474 switch (r_type)
1475 {
1476 case R_VAX_GOT32:
1477 /* Relocation is to the address of the entry for this symbol
1478 in the global offset table. */
b29635ba 1479 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1480 break;
1481
1482 /* Relocation is the offset of the entry for this symbol in
1483 the global offset table. */
1484
1485 {
1486 bfd_vma off;
1487
90ace9e9
JT
1488 if (sgot == NULL)
1489 {
1490 sgot = bfd_get_section_by_name (dynobj, ".got");
1491 BFD_ASSERT (sgot != NULL);
1492 }
1493
1494 BFD_ASSERT (h != NULL);
1495 off = h->got.offset;
1496 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1497 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1498
1499 if (info->shared
1500 && h->dynindx == -1
f5385ebf 1501 && h->def_regular)
90ace9e9
JT
1502 {
1503 /* The symbol was forced to be local
1504 because of a version file.. We must initialize
1505 this entry in the global offset table. Since
1506 the offset must always be a multiple of 4, we
1507 use the least significant bit to record whether
1508 we have initialized it already.
1509
1510 When doing a dynamic link, we create a .rela.got
1511 relocation entry to initialize the value. This
1512 is done in the finish_dynamic_symbol routine. */
1513 if ((off & 1) != 0)
1514 off &= ~1;
1515 else
1516 {
1517 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1518 sgot->contents + off);
1519 h->got.offset |= 1;
1520 }
1521 } else {
1522 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1523 }
1524
1525 relocation = sgot->output_offset + off;
b29635ba 1526 /* The GOT relocation uses the addend. */
90ace9e9
JT
1527 rel->r_addend = 0;
1528
b29635ba
JT
1529 /* Change the reference to be indirect. */
1530 contents[rel->r_offset - 1] |= 0x10;
1531 relocation += sgot->output_section->vma;
90ace9e9
JT
1532 }
1533 break;
1534
1535 case R_VAX_PLT32:
1536 /* Relocation is to the entry for this symbol in the
1537 procedure linkage table. */
1538
1539 /* Resolve a PLTxx reloc against a local symbol directly,
1540 without using the procedure linkage table. */
1541 if (h == NULL)
1542 break;
1543
1544 if (h->plt.offset == (bfd_vma) -1
1545 || !elf_hash_table (info)->dynamic_sections_created)
1546 {
1547 /* We didn't make a PLT entry for this symbol. This
1548 happens when statically linking PIC code, or when
1549 using -Bsymbolic. */
1550 break;
1551 }
1552
1553 if (splt == NULL)
1554 {
1555 splt = bfd_get_section_by_name (dynobj, ".plt");
1556 BFD_ASSERT (splt != NULL);
1557 }
1558
1559 if (sgotplt == NULL)
1560 {
1561 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1562 BFD_ASSERT (splt != NULL);
1563 }
1564
1565 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1566
1567 /* Get the offset into the .got table of the entry that
1568 corresponds to this function. Each .got entry is 4 bytes.
1569 The first two are reserved. */
1570 got_offset = (plt_index + 3) * 4;
1571
1572 /* We want the relocate to point into the .got.plt instead
cedb70c5 1573 of the plt itself. */
90ace9e9
JT
1574 relocation = (sgotplt->output_section->vma
1575 + sgotplt->output_offset
1576 + got_offset);
1577 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1578 if (rel->r_addend == 2)
1579 {
1580 h->plt.offset |= 1;
1581 }
1582 else if (rel->r_addend != 0)
1583 (*_bfd_error_handler)
1584 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1585 bfd_get_filename (input_bfd), rel->r_addend,
1586 h->root.root.string,
1587 bfd_get_section_name (input_bfd, input_section));
1588 rel->r_addend = 0;
1589
1590 break;
1591
1592 case R_VAX_PC8:
1593 case R_VAX_PC16:
1594 case R_VAX_PC32:
1595 if (h == NULL)
1596 break;
1597 /* Fall through. */
1598 case R_VAX_8:
1599 case R_VAX_16:
1600 case R_VAX_32:
1601 if (info->shared
1602 && r_symndx != 0
1603 && (input_section->flags & SEC_ALLOC) != 0
1604 && ((r_type != R_VAX_PC8
1605 && r_type != R_VAX_PC16
1606 && r_type != R_VAX_PC32)
da6bcfca
MT
1607 || ((input_section->flags & SEC_CODE)
1608 && (!info->symbolic
1609 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1610 {
1611 Elf_Internal_Rela outrel;
947216bf 1612 bfd_byte *loc;
b34976b6 1613 bfd_boolean skip, relocate;
90ace9e9
JT
1614
1615 /* When generating a shared object, these relocations
1616 are copied into the output file to be resolved at run
1617 time. */
90ace9e9
JT
1618 if (sreloc == NULL)
1619 {
1620 const char *name;
1621
1622 name = (bfd_elf_string_from_elf_section
1623 (input_bfd,
1624 elf_elfheader (input_bfd)->e_shstrndx,
1625 elf_section_data (input_section)->rel_hdr.sh_name));
1626 if (name == NULL)
b34976b6 1627 return FALSE;
90ace9e9 1628
0112cd26 1629 BFD_ASSERT (CONST_STRNEQ (name, ".rela")
90ace9e9
JT
1630 && strcmp (bfd_get_section_name (input_bfd,
1631 input_section),
1632 name + 5) == 0);
1633
1634 sreloc = bfd_get_section_by_name (dynobj, name);
1635 BFD_ASSERT (sreloc != NULL);
1636 }
1637
b34976b6
AM
1638 skip = FALSE;
1639 relocate = FALSE;
90ace9e9
JT
1640
1641 outrel.r_offset =
1642 _bfd_elf_section_offset (output_bfd, info, input_section,
1643 rel->r_offset);
1644 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1645 skip = TRUE;
90ace9e9 1646 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1647 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1648 outrel.r_offset += (input_section->output_section->vma
1649 + input_section->output_offset);
1650
1651 if (skip)
1652 memset (&outrel, 0, sizeof outrel);
1653 /* h->dynindx may be -1 if the symbol was marked to
1654 become local. */
1655 else if (h != NULL
1656 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1657 || !h->def_regular))
90ace9e9
JT
1658 {
1659 BFD_ASSERT (h->dynindx != -1);
1660 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1661 outrel.r_addend = relocation + rel->r_addend;
1662 }
1663 else
1664 {
1665 if (r_type == R_VAX_32)
1666 {
b34976b6 1667 relocate = TRUE;
90ace9e9
JT
1668 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1669 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1670 &contents[rel->r_offset]) == 0);
1671 outrel.r_addend = relocation + rel->r_addend;
1672 }
1673 else
1674 {
1675 long indx;
1676
8517fae7 1677 if (bfd_is_abs_section (sec))
90ace9e9
JT
1678 indx = 0;
1679 else if (sec == NULL || sec->owner == NULL)
1680 {
1681 bfd_set_error (bfd_error_bad_value);
b34976b6 1682 return FALSE;
90ace9e9
JT
1683 }
1684 else
1685 {
1686 asection *osec;
1687
74541ad4
AM
1688 /* We are turning this relocation into one
1689 against a section symbol. It would be
1690 proper to subtract the symbol's value,
1691 osec->vma, from the emitted reloc addend,
1692 but ld.so expects buggy relocs. */
90ace9e9
JT
1693 osec = sec->output_section;
1694 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1695 if (indx == 0)
1696 {
1697 struct elf_link_hash_table *htab;
1698 htab = elf_hash_table (info);
1699 osec = htab->text_index_section;
1700 indx = elf_section_data (osec)->dynindx;
1701 }
1702 BFD_ASSERT (indx != 0);
90ace9e9
JT
1703 }
1704
1705 outrel.r_info = ELF32_R_INFO (indx, r_type);
1706 outrel.r_addend = relocation + rel->r_addend;
1707 }
1708 }
1709
1710 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1711 ".text") != 0 ||
90ace9e9
JT
1712 (info->shared
1713 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1714 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1715 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1716 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1717 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1718 {
1719 if (h != NULL)
1720 (*_bfd_error_handler)
1721 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1722 bfd_get_filename (input_bfd), howto->name,
1723 h->root.root.string,
1724 bfd_get_section_name (input_bfd, input_section));
1725 else
1726 (*_bfd_error_handler)
1727 (_("%s: warning: %s relocation to 0x%x from %s section"),
1728 bfd_get_filename (input_bfd), howto->name,
1729 outrel.r_addend,
1730 bfd_get_section_name (input_bfd, input_section));
1731 }
947216bf
AM
1732 loc = sreloc->contents;
1733 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1734 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1735
1736 /* This reloc will be computed at runtime, so there's no
1737 need to do anything now, except for R_VAX_32
1738 relocations that have been turned into
1739 R_VAX_RELATIVE. */
1740 if (!relocate)
1741 continue;
1742 }
1743
1744 break;
1745
1746 case R_VAX_GNU_VTINHERIT:
1747 case R_VAX_GNU_VTENTRY:
1748 /* These are no-ops in the end. */
1749 continue;
1750
1751 default:
1752 break;
1753 }
1754
b34976b6 1755 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1756 So subtract the difference from the relocation amount since we can't
1757 add it to the offset. */
90ace9e9 1758 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1759 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1760
1761 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1762 contents, rel->r_offset,
1763 relocation, rel->r_addend);
1764
1765 if (r != bfd_reloc_ok)
1766 {
1767 switch (r)
1768 {
1769 default:
1770 case bfd_reloc_outofrange:
1771 abort ();
1772 case bfd_reloc_overflow:
1773 {
1774 const char *name;
1775
1776 if (h != NULL)
dfeffb9f 1777 name = NULL;
90ace9e9
JT
1778 else
1779 {
1780 name = bfd_elf_string_from_elf_section (input_bfd,
1781 symtab_hdr->sh_link,
1782 sym->st_name);
1783 if (name == NULL)
b34976b6 1784 return FALSE;
90ace9e9
JT
1785 if (*name == '\0')
1786 name = bfd_section_name (input_bfd, sec);
1787 }
1788 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1789 (info, (h ? &h->root : NULL), name, howto->name,
1790 (bfd_vma) 0, input_bfd, input_section,
1791 rel->r_offset)))
b34976b6 1792 return FALSE;
90ace9e9
JT
1793 }
1794 break;
1795 }
1796 }
1797 }
1798
b34976b6 1799 return TRUE;
90ace9e9
JT
1800}
1801
1802/* Finish up dynamic symbol handling. We set the contents of various
1803 dynamic sections here. */
1804
b34976b6 1805static bfd_boolean
ce71b576
NC
1806elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1807 struct elf_link_hash_entry *h,
1808 Elf_Internal_Sym *sym)
90ace9e9
JT
1809{
1810 bfd *dynobj;
1811
1812 dynobj = elf_hash_table (info)->dynobj;
1813
1814 if (h->plt.offset != (bfd_vma) -1)
1815 {
1816 asection *splt;
1817 asection *sgot;
1818 asection *srela;
1819 bfd_vma plt_index;
1820 bfd_vma got_offset;
1821 bfd_vma addend;
1822 Elf_Internal_Rela rela;
947216bf 1823 bfd_byte *loc;
90ace9e9
JT
1824
1825 /* This symbol has an entry in the procedure linkage table. Set
1826 it up. */
90ace9e9
JT
1827 BFD_ASSERT (h->dynindx != -1);
1828
1829 splt = bfd_get_section_by_name (dynobj, ".plt");
1830 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1831 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1832 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1833
1834 addend = 2 * (h->plt.offset & 1);
1835 h->plt.offset &= ~1;
1836
1837 /* Get the index in the procedure linkage table which
1838 corresponds to this symbol. This is the index of this symbol
1839 in all the symbols for which we are making plt entries. The
1840 first entry in the procedure linkage table is reserved. */
1841 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1842
1843 /* Get the offset into the .got table of the entry that
1844 corresponds to this function. Each .got entry is 4 bytes.
1845 The first two are reserved. */
1846 got_offset = (plt_index + 3) * 4;
1847
1848 /* Fill in the entry in the procedure linkage table. */
1849 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1850 PLT_ENTRY_SIZE);
1851
1852 /* The offset is relative to the first extension word. */
1853 bfd_put_32 (output_bfd,
1854 -(h->plt.offset + 8),
1855 splt->contents + h->plt.offset + 4);
1856
1857 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1858 splt->contents + h->plt.offset + 8);
1859
1860 /* Fill in the entry in the global offset table. */
1861 bfd_put_32 (output_bfd,
1862 (splt->output_section->vma
1863 + splt->output_offset
1864 + h->plt.offset) + addend,
1865 sgot->contents + got_offset);
1866
1867 /* Fill in the entry in the .rela.plt section. */
1868 rela.r_offset = (sgot->output_section->vma
1869 + sgot->output_offset
1870 + got_offset);
1871 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1872 rela.r_addend = addend;
947216bf
AM
1873 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1874 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1875
f5385ebf 1876 if (!h->def_regular)
90ace9e9
JT
1877 {
1878 /* Mark the symbol as undefined, rather than as defined in
1879 the .plt section. Leave the value alone. */
1880 sym->st_shndx = SHN_UNDEF;
1881 }
1882 }
1883
1884 if (h->got.offset != (bfd_vma) -1)
1885 {
1886 asection *sgot;
1887 asection *srela;
1888 Elf_Internal_Rela rela;
947216bf 1889 bfd_byte *loc;
90ace9e9
JT
1890
1891 /* This symbol has an entry in the global offset table. Set it
1892 up. */
90ace9e9
JT
1893 sgot = bfd_get_section_by_name (dynobj, ".got");
1894 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1895 BFD_ASSERT (sgot != NULL && srela != NULL);
1896
1897 rela.r_offset = (sgot->output_section->vma
1898 + sgot->output_offset
1899 + (h->got.offset &~ 1));
1900
1901 /* If the symbol was forced to be local because of a version file
1902 locally we just want to emit a RELATIVE reloc. The entry in
1903 the global offset table will already have been initialized in
1904 the relocate_section function. */
1905 if (info->shared
1906 && h->dynindx == -1
f5385ebf 1907 && h->def_regular)
90ace9e9
JT
1908 {
1909 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1910 }
1911 else
1912 {
1913 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1914 }
1915 rela.r_addend = bfd_get_signed_32 (output_bfd,
1916 (sgot->contents
1917 + (h->got.offset & ~1)));
1918
947216bf
AM
1919 loc = srela->contents;
1920 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1921 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1922 }
1923
f5385ebf 1924 if (h->needs_copy)
90ace9e9
JT
1925 {
1926 asection *s;
1927 Elf_Internal_Rela rela;
947216bf 1928 bfd_byte *loc;
90ace9e9
JT
1929
1930 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1931 BFD_ASSERT (h->dynindx != -1
1932 && (h->root.type == bfd_link_hash_defined
1933 || h->root.type == bfd_link_hash_defweak));
1934
1935 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1936 ".rela.bss");
1937 BFD_ASSERT (s != NULL);
1938
1939 rela.r_offset = (h->root.u.def.value
1940 + h->root.u.def.section->output_section->vma
1941 + h->root.u.def.section->output_offset);
1942 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1943 rela.r_addend = 0;
947216bf
AM
1944 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1945 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1946 }
1947
1948 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1949 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1950 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1951 sym->st_shndx = SHN_ABS;
1952
b34976b6 1953 return TRUE;
90ace9e9
JT
1954}
1955
1956/* Finish up the dynamic sections. */
1957
b34976b6 1958static bfd_boolean
ce71b576 1959elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1960{
1961 bfd *dynobj;
1962 asection *sgot;
1963 asection *sdyn;
1964
1965 dynobj = elf_hash_table (info)->dynobj;
1966
1967 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1968 BFD_ASSERT (sgot != NULL);
1969 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1970
1971 if (elf_hash_table (info)->dynamic_sections_created)
1972 {
1973 asection *splt;
1974 Elf32_External_Dyn *dyncon, *dynconend;
1975
1976 splt = bfd_get_section_by_name (dynobj, ".plt");
1977 BFD_ASSERT (splt != NULL && sdyn != NULL);
1978
1979 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1980 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1981 for (; dyncon < dynconend; dyncon++)
1982 {
1983 Elf_Internal_Dyn dyn;
1984 const char *name;
1985 asection *s;
1986
1987 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1988
1989 switch (dyn.d_tag)
1990 {
1991 default:
1992 break;
1993
1994 case DT_PLTGOT:
1995 name = ".got";
1996 goto get_vma;
1997 case DT_JMPREL:
1998 name = ".rela.plt";
1999 get_vma:
2000 s = bfd_get_section_by_name (output_bfd, name);
2001 BFD_ASSERT (s != NULL);
2002 dyn.d_un.d_ptr = s->vma;
2003 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2004 break;
2005
2006 case DT_PLTRELSZ:
2007 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2008 BFD_ASSERT (s != NULL);
eea6121a 2009 dyn.d_un.d_val = s->size;
90ace9e9
JT
2010 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2011 break;
2012
2013 case DT_RELASZ:
2014 /* The procedure linkage table relocs (DT_JMPREL) should
2015 not be included in the overall relocs (DT_RELA).
2016 Therefore, we override the DT_RELASZ entry here to
2017 make it not include the JMPREL relocs. Since the
2018 linker script arranges for .rela.plt to follow all
2019 other relocation sections, we don't have to worry
2020 about changing the DT_RELA entry. */
2021 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2022 if (s != NULL)
eea6121a 2023 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2024 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2025 break;
2026 }
2027 }
2028
2029 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2030 if (splt->size > 0)
90ace9e9
JT
2031 {
2032 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2033 bfd_put_32 (output_bfd,
2034 (sgot->output_section->vma
2035 + sgot->output_offset + 4
2036 - (splt->output_section->vma + 6)),
2037 splt->contents + 2);
2038 bfd_put_32 (output_bfd,
2039 (sgot->output_section->vma
2040 + sgot->output_offset + 8
2041 - (splt->output_section->vma + 12)),
2042 splt->contents + 8);
cedb70c5 2043 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2044 = PLT_ENTRY_SIZE;
2045 }
2046 }
2047
2048 /* Fill in the first three entries in the global offset table. */
eea6121a 2049 if (sgot->size > 0)
90ace9e9
JT
2050 {
2051 if (sdyn == NULL)
2052 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2053 else
2054 bfd_put_32 (output_bfd,
2055 sdyn->output_section->vma + sdyn->output_offset,
2056 sgot->contents);
2057 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2058 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2059 }
2060
2061 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2062
b34976b6 2063 return TRUE;
90ace9e9
JT
2064}
2065
2066#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2067#define TARGET_LITTLE_NAME "elf32-vax"
2068#define ELF_MACHINE_CODE EM_VAX
2069#define ELF_MAXPAGESIZE 0x1000
2070
2071#define elf_backend_create_dynamic_sections \
2072 _bfd_elf_create_dynamic_sections
2073#define bfd_elf32_bfd_link_hash_table_create \
2074 elf_vax_link_hash_table_create
c152c796 2075#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2076
2077#define elf_backend_check_relocs elf_vax_check_relocs
2078#define elf_backend_adjust_dynamic_symbol \
2079 elf_vax_adjust_dynamic_symbol
2080#define elf_backend_size_dynamic_sections \
2081 elf_vax_size_dynamic_sections
74541ad4 2082#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2083#define elf_backend_relocate_section elf_vax_relocate_section
2084#define elf_backend_finish_dynamic_symbol \
2085 elf_vax_finish_dynamic_symbol
2086#define elf_backend_finish_dynamic_sections \
2087 elf_vax_finish_dynamic_sections
2088#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2089#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2090#define bfd_elf32_bfd_merge_private_bfd_data \
2091 elf32_vax_merge_private_bfd_data
2092#define bfd_elf32_bfd_set_private_flags \
2093 elf32_vax_set_private_flags
2094#define bfd_elf32_bfd_print_private_bfd_data \
2095 elf32_vax_print_private_bfd_data
2096
2097#define elf_backend_can_gc_sections 1
2098#define elf_backend_want_got_plt 1
2099#define elf_backend_plt_readonly 1
2100#define elf_backend_want_plt_sym 0
2101#define elf_backend_got_header_size 16
f0fe0e16 2102#define elf_backend_rela_normal 1
90ace9e9
JT
2103
2104#include "elf32-target.h"