RISC-V: Don't assume the priv attributes are in order when handling them.
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b3adc24a 2 Copyright (C) 1993-2020 Free Software Foundation, Inc.
90ace9e9
JT
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
90ace9e9 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
90ace9e9 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
90ace9e9 21
90ace9e9 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
90ace9e9
JT
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576 29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
f3185997 30static bfd_boolean rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
ce71b576
NC
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
ce71b576
NC
37static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
6db7e006
MR
49static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
ce71b576
NC
51
52static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
2c3fc389 53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
6346d5ca 58 3, /* size (0 = byte, 1 = short, 2 = long) */
90ace9e9 59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
f3185997 281static bfd_boolean
64d29018 282rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
90ace9e9 283{
cd21f5da
NC
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
695344c0 289 /* xgettext:c-format */
0aa13fee 290 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 291 abfd, r_type);
cd21f5da 292 bfd_set_error (bfd_error_bad_value);
f3185997 293 return FALSE;
cd21f5da
NC
294 }
295 cache_ptr->howto = &howto_table[r_type];
f3185997 296 return TRUE;
90ace9e9
JT
297}
298
299#define elf_info_to_howto rtype_to_howto
300
301static const struct
302{
303 bfd_reloc_code_real_type bfd_val;
304 int elf_val;
305} reloc_map[] = {
306 { BFD_RELOC_NONE, R_VAX_NONE },
307 { BFD_RELOC_32, R_VAX_32 },
308 { BFD_RELOC_16, R_VAX_16 },
309 { BFD_RELOC_8, R_VAX_8 },
310 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
311 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
312 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
313 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
314 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
315 { BFD_RELOC_NONE, R_VAX_COPY },
316 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
317 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
318 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
319 { BFD_RELOC_CTOR, R_VAX_32 },
320 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
321 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
322};
323
324static reloc_howto_type *
ce71b576 325reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
326{
327 unsigned int i;
328 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
329 {
330 if (reloc_map[i].bfd_val == code)
331 return &howto_table[reloc_map[i].elf_val];
332 }
333 return 0;
334}
335
157090f7
AM
336static reloc_howto_type *
337reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
338 const char *r_name)
339{
340 unsigned int i;
341
342 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
343 if (howto_table[i].name != NULL
344 && strcasecmp (howto_table[i].name, r_name) == 0)
345 return &howto_table[i];
346
347 return NULL;
348}
349
90ace9e9 350#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 351#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
352#define ELF_ARCH bfd_arch_vax
353/* end code generated by elf.el */
90ace9e9
JT
354\f
355/* Functions for the VAX ELF linker. */
356
357/* The name of the dynamic interpreter. This is put in the .interp
358 section. */
359
360#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
361
362/* The size in bytes of an entry in the procedure linkage table. */
363
364#define PLT_ENTRY_SIZE 12
365
366/* The first entry in a procedure linkage table looks like this. See
367 the SVR4 ABI VAX supplement to see how this works. */
368
369static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
370{
371 0xdd, 0xef, /* pushl l^ */
372 0, 0, 0, 0, /* offset to .plt.got + 4 */
373 0x17, 0xff, /* jmp @L^(pc) */
374 0, 0, 0, 0, /* offset to .plt.got + 8 */
375};
376
377/* Subsequent entries in a procedure linkage table look like this. */
378
379static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
380{
6c4fb25a 381 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 382 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
383 0, 0, 0, 0, /* replaced with offset to start of .plt */
384 0, 0, 0, 0, /* index into .rela.plt */
385};
386
387/* The VAX linker needs to keep track of the number of relocs that it
388 decides to copy in check_relocs for each symbol. This is so that it
389 can discard PC relative relocs if it doesn't need them when linking
390 with -Bsymbolic. We store the information in a field extending the
391 regular ELF linker hash table. */
392
393/* This structure keeps track of the number of PC relative relocs we have
394 copied for a given symbol. */
395
396struct elf_vax_pcrel_relocs_copied
397{
398 /* Next section. */
399 struct elf_vax_pcrel_relocs_copied *next;
400 /* A section in dynobj. */
401 asection *section;
402 /* Number of relocs copied in this section. */
403 bfd_size_type count;
404};
405
406/* VAX ELF linker hash entry. */
407
408struct elf_vax_link_hash_entry
409{
410 struct elf_link_hash_entry root;
411
412 /* Number of PC relative relocs copied for this symbol. */
413 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
414
415 bfd_vma got_addend;
416};
417
90ace9e9
JT
418/* Declare this now that the above structures are defined. */
419
ce71b576 420static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 421 void *);
90ace9e9 422
b29635ba
JT
423/* Declare this now that the above structures are defined. */
424
ce71b576 425static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 426 void *);
b29635ba 427
90ace9e9
JT
428/* Traverse an VAX ELF linker hash table. */
429
430#define elf_vax_link_hash_traverse(table, func, info) \
431 (elf_link_hash_traverse \
4dfe6ac6 432 ((table), \
2c3fc389 433 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
434 (info)))
435
90ace9e9
JT
436/* Create an entry in an VAX ELF linker hash table. */
437
438static struct bfd_hash_entry *
ce71b576
NC
439elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
440 struct bfd_hash_table *table,
441 const char *string)
90ace9e9
JT
442{
443 struct elf_vax_link_hash_entry *ret =
444 (struct elf_vax_link_hash_entry *) entry;
445
446 /* Allocate the structure if it has not already been allocated by a
447 subclass. */
ce71b576 448 if (ret == NULL)
90ace9e9
JT
449 ret = ((struct elf_vax_link_hash_entry *)
450 bfd_hash_allocate (table,
451 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 452 if (ret == NULL)
90ace9e9
JT
453 return (struct bfd_hash_entry *) ret;
454
455 /* Call the allocation method of the superclass. */
456 ret = ((struct elf_vax_link_hash_entry *)
457 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
458 table, string));
ce71b576 459 if (ret != NULL)
90ace9e9
JT
460 {
461 ret->pcrel_relocs_copied = NULL;
462 }
463
464 return (struct bfd_hash_entry *) ret;
465}
466
467/* Create an VAX ELF linker hash table. */
468
469static struct bfd_link_hash_table *
ce71b576 470elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 471{
4dfe6ac6 472 struct elf_link_hash_table *ret;
986f0783 473 size_t amt = sizeof (struct elf_link_hash_table);
90ace9e9 474
7bf52ea2 475 ret = bfd_zmalloc (amt);
ce71b576 476 if (ret == NULL)
90ace9e9
JT
477 return NULL;
478
4dfe6ac6 479 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 480 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
481 sizeof (struct elf_vax_link_hash_entry),
482 GENERIC_ELF_DATA))
90ace9e9
JT
483 {
484 free (ret);
485 return NULL;
486 }
487
4dfe6ac6 488 return &ret->root;
90ace9e9
JT
489}
490
491/* Keep vax-specific flags in the ELF header */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
494{
495 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
90ace9e9
JT
498}
499
500/* Merge backend specific data from an object file to the output
501 object file when linking. */
b34976b6 502static bfd_boolean
50e03d47 503elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
90ace9e9 504{
50e03d47 505 bfd *obfd = info->output_bfd;
90ace9e9
JT
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 510 return TRUE;
90ace9e9
JT
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
513
514 if (!elf_flags_init (obfd))
515 {
b34976b6 516 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
517 elf_elfheader (obfd)->e_flags = in_flags;
518 }
519
b34976b6 520 return TRUE;
90ace9e9
JT
521}
522
523/* Display the flags field */
b34976b6 524static bfd_boolean
2c3fc389 525elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
526{
527 FILE *file = (FILE *) ptr;
528
529 BFD_ASSERT (abfd != NULL && ptr != NULL);
530
531 /* Print normal ELF private data. */
532 _bfd_elf_print_private_bfd_data (abfd, ptr);
533
534 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
535
536 /* xgettext:c-format */
537 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
538
179d3252 539 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
540 fprintf (file, _(" [nonpic]"));
541
179d3252 542 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
543 fprintf (file, _(" [d-float]"));
544
179d3252 545 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
546 fprintf (file, _(" [g-float]"));
547
548 fputc ('\n', file);
549
b34976b6 550 return TRUE;
90ace9e9
JT
551}
552/* Look through the relocs for a section during the first phase, and
553 allocate space in the global offset table or procedure linkage
554 table. */
555
b34976b6 556static bfd_boolean
ce71b576
NC
557elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
558 const Elf_Internal_Rela *relocs)
90ace9e9
JT
559{
560 bfd *dynobj;
561 Elf_Internal_Shdr *symtab_hdr;
562 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
563 const Elf_Internal_Rela *rel;
564 const Elf_Internal_Rela *rel_end;
90ace9e9
JT
565 asection *sreloc;
566
0e1862bb 567 if (bfd_link_relocatable (info))
b34976b6 568 return TRUE;
90ace9e9
JT
569
570 dynobj = elf_hash_table (info)->dynobj;
571 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
572 sym_hashes = elf_sym_hashes (abfd);
90ace9e9 573
90ace9e9
JT
574 sreloc = NULL;
575
576 rel_end = relocs + sec->reloc_count;
577 for (rel = relocs; rel < rel_end; rel++)
578 {
579 unsigned long r_symndx;
580 struct elf_link_hash_entry *h;
581
582 r_symndx = ELF32_R_SYM (rel->r_info);
583
584 if (r_symndx < symtab_hdr->sh_info)
585 h = NULL;
586 else
973a3492
L
587 {
588 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
589 while (h->root.type == bfd_link_hash_indirect
590 || h->root.type == bfd_link_hash_warning)
591 h = (struct elf_link_hash_entry *) h->root.u.i.link;
592 }
90ace9e9
JT
593
594 switch (ELF32_R_TYPE (rel->r_info))
595 {
596 case R_VAX_GOT32:
fe723c87 597 BFD_ASSERT (h != NULL);
90ace9e9 598
7b6021f1
MR
599 /* If this is a local symbol, we resolve it directly without
600 creating a global offset table entry. */
125b5bac
MR
601 if (h->forced_local
602 || h == elf_hash_table (info)->hgot
603 || h == elf_hash_table (info)->hplt)
7b6021f1
MR
604 break;
605
90ace9e9
JT
606 /* This symbol requires a global offset table entry. */
607
608 if (dynobj == NULL)
609 {
610 /* Create the .got section. */
611 elf_hash_table (info)->dynobj = dynobj = abfd;
612 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 613 return FALSE;
90ace9e9
JT
614 }
615
90ace9e9
JT
616 if (h != NULL)
617 {
618 struct elf_vax_link_hash_entry *eh;
619
620 eh = (struct elf_vax_link_hash_entry *) h;
621 if (h->got.refcount == -1)
622 {
623 h->got.refcount = 1;
624 eh->got_addend = rel->r_addend;
90ace9e9
JT
625 }
626 else
627 {
628 h->got.refcount++;
629 if (eh->got_addend != (bfd_vma) rel->r_addend)
4eca0228 630 _bfd_error_handler
695344c0 631 /* xgettext:c-format */
2dcf00ce
AM
632 (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
633 " not match previous GOT addend of %" PRId64),
634 abfd, (int64_t) rel->r_addend, h->root.root.string,
635 (int64_t) eh->got_addend);
cedb70c5 636
90ace9e9
JT
637 }
638 }
639 break;
640
641 case R_VAX_PLT32:
642 /* This symbol requires a procedure linkage table entry. We
643 actually build the entry in adjust_dynamic_symbol,
07d6d2b8
AM
644 because this might be a case of linking PIC code which is
645 never referenced by a dynamic object, in which case we
646 don't need to generate a procedure linkage table entry
647 after all. */
125b5bac 648 BFD_ASSERT (h != NULL);
90ace9e9
JT
649
650 /* If this is a local symbol, we resolve it directly without
651 creating a procedure linkage table entry. */
125b5bac 652 if (h->forced_local)
fe723c87 653 break;
90ace9e9 654
f5385ebf 655 h->needs_plt = 1;
90ace9e9
JT
656 if (h->plt.refcount == -1)
657 h->plt.refcount = 1;
658 else
659 h->plt.refcount++;
660 break;
661
662 case R_VAX_PC8:
663 case R_VAX_PC16:
664 case R_VAX_PC32:
665 /* If we are creating a shared library and this is not a local
666 symbol, we need to copy the reloc into the shared library.
667 However when linking with -Bsymbolic and this is a global
668 symbol which is defined in an object we are including in the
669 link (i.e., DEF_REGULAR is set), then we can resolve the
670 reloc directly. At this point we have not seen all the input
671 files, so it is possible that DEF_REGULAR is not set now but
672 will be set later (it is never cleared). We account for that
673 possibility below by storing information in the
674 pcrel_relocs_copied field of the hash table entry. */
0e1862bb 675 if (!(bfd_link_pic (info)
90ace9e9
JT
676 && (sec->flags & SEC_ALLOC) != 0
677 && h != NULL
678 && (!info->symbolic
f5385ebf 679 || !h->def_regular)))
90ace9e9 680 {
7b6021f1
MR
681 if (h != NULL
682 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
683 && !h->forced_local)
90ace9e9
JT
684 {
685 /* Make sure a plt entry is created for this symbol if
686 it turns out to be a function defined by a dynamic
687 object. */
688 if (h->plt.refcount == -1)
689 h->plt.refcount = 1;
690 else
691 h->plt.refcount++;
692 }
693 break;
694 }
7b6021f1
MR
695 /* If this is a local symbol, we can resolve it directly. */
696 if (h != NULL
697 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
698 || h->forced_local))
fe723c87
MT
699 break;
700
90ace9e9
JT
701 /* Fall through. */
702 case R_VAX_8:
703 case R_VAX_16:
704 case R_VAX_32:
7b6021f1 705 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
706 {
707 /* Make sure a plt entry is created for this symbol if it
708 turns out to be a function defined by a dynamic object. */
709 if (h->plt.refcount == -1)
710 h->plt.refcount = 1;
711 else
712 h->plt.refcount++;
713 }
714
c4b126b8
L
715 /* Non-GOT reference may need a copy reloc in executable or
716 a dynamic reloc in shared library. */
717 if (h != NULL)
718 h->non_got_ref = 1;
719
90ace9e9
JT
720 /* If we are creating a shared library, we need to copy the
721 reloc into the shared library. */
0e1862bb 722 if (bfd_link_pic (info)
90ace9e9
JT
723 && (sec->flags & SEC_ALLOC) != 0)
724 {
725 /* When creating a shared object, we must copy these
726 reloc types into the output file. We create a reloc
727 section in dynobj and make room for this reloc. */
728 if (sreloc == NULL)
729 {
83bac4b0
NC
730 sreloc = _bfd_elf_make_dynamic_reloc_section
731 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 732
83bac4b0 733 if (sreloc == NULL)
b34976b6 734 return FALSE;
90ace9e9 735
90ace9e9
JT
736 if (sec->flags & SEC_READONLY)
737 info->flags |= DF_TEXTREL;
738 }
739
eea6121a 740 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
741
742 /* If we are linking with -Bsymbolic, we count the number of
743 PC relative relocations we have entered for this symbol,
744 so that we can discard them again if the symbol is later
745 defined by a regular object. Note that this function is
19852a2a 746 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
747 which means that h is really a pointer to an
748 elf_vax_link_hash_entry. */
749 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
750 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
751 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
752 && info->symbolic)
753 {
754 struct elf_vax_link_hash_entry *eh;
755 struct elf_vax_pcrel_relocs_copied *p;
756
757 eh = (struct elf_vax_link_hash_entry *) h;
758
759 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
760 if (p->section == sreloc)
761 break;
762
763 if (p == NULL)
764 {
765 p = ((struct elf_vax_pcrel_relocs_copied *)
766 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
767 if (p == NULL)
b34976b6 768 return FALSE;
90ace9e9
JT
769 p->next = eh->pcrel_relocs_copied;
770 eh->pcrel_relocs_copied = p;
771 p->section = sreloc;
772 p->count = 0;
773 }
774
775 ++p->count;
776 }
777 }
778
779 break;
780
781 /* This relocation describes the C++ object vtable hierarchy.
782 Reconstruct it for later use during GC. */
783 case R_VAX_GNU_VTINHERIT:
c152c796 784 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 785 return FALSE;
90ace9e9
JT
786 break;
787
788 /* This relocation describes which C++ vtable entries are actually
789 used. Record for later use during GC. */
790 case R_VAX_GNU_VTENTRY:
a0ea3a14 791 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 792 return FALSE;
90ace9e9
JT
793 break;
794
795 default:
796 break;
797 }
798 }
799
b34976b6 800 return TRUE;
90ace9e9
JT
801}
802
803/* Return the section that should be marked against GC for a given
804 relocation. */
805
806static asection *
ce71b576 807elf_vax_gc_mark_hook (asection *sec,
07adf181 808 struct bfd_link_info *info,
ce71b576
NC
809 Elf_Internal_Rela *rel,
810 struct elf_link_hash_entry *h,
811 Elf_Internal_Sym *sym)
90ace9e9
JT
812{
813 if (h != NULL)
07adf181
AM
814 switch (ELF32_R_TYPE (rel->r_info))
815 {
816 case R_VAX_GNU_VTINHERIT:
817 case R_VAX_GNU_VTENTRY:
818 return NULL;
819 }
820
821 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
822}
823
90ace9e9
JT
824/* Adjust a symbol defined by a dynamic object and referenced by a
825 regular object. The current definition is in some section of the
826 dynamic object, but we're not including those sections. We have to
827 change the definition to something the rest of the link can
828 understand. */
829
b34976b6 830static bfd_boolean
a0f0eb1e
MR
831elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
832 struct elf_link_hash_entry *h)
90ace9e9
JT
833{
834 bfd *dynobj;
835 asection *s;
90ace9e9
JT
836
837 dynobj = elf_hash_table (info)->dynobj;
838
839 /* Make sure we know what is going on here. */
840 BFD_ASSERT (dynobj != NULL
f5385ebf 841 && (h->needs_plt
60d67dc8 842 || h->is_weakalias
f5385ebf
AM
843 || (h->def_dynamic
844 && h->ref_regular
845 && !h->def_regular)));
90ace9e9
JT
846
847 /* If this is a function, put it in the procedure linkage table. We
848 will fill in the contents of the procedure linkage table later,
849 when we know the address of the .got section. */
850 if (h->type == STT_FUNC
f5385ebf 851 || h->needs_plt)
90ace9e9 852 {
a22a8039
MR
853 if (h->plt.refcount <= 0
854 || SYMBOL_CALLS_LOCAL (info, h)
855 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
856 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
857 {
858 /* This case can occur if we saw a PLTxx reloc in an input
859 file, but the symbol was never referred to by a dynamic
a22a8039
MR
860 object, or if all references were garbage collected. In
861 such a case, we don't actually need to build a procedure
862 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 863 h->plt.offset = (bfd_vma) -1;
f5385ebf 864 h->needs_plt = 0;
b34976b6 865 return TRUE;
90ace9e9
JT
866 }
867
ce558b89 868 s = elf_hash_table (info)->splt;
90ace9e9
JT
869 BFD_ASSERT (s != NULL);
870
871 /* If this is the first .plt entry, make room for the special
872 first entry. */
eea6121a 873 if (s->size == 0)
90ace9e9 874 {
eea6121a 875 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
876 }
877
878 /* If this symbol is not defined in a regular file, and we are
879 not generating a shared library, then set the symbol to this
880 location in the .plt. This is required to make function
881 pointers compare as equal between the normal executable and
882 the shared library. */
0e1862bb 883 if (!bfd_link_pic (info)
f5385ebf 884 && !h->def_regular)
90ace9e9
JT
885 {
886 h->root.u.def.section = s;
eea6121a 887 h->root.u.def.value = s->size;
90ace9e9
JT
888 }
889
eea6121a 890 h->plt.offset = s->size;
90ace9e9
JT
891
892 /* Make room for this entry. */
eea6121a 893 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
894
895 /* We also need to make an entry in the .got.plt section, which
896 will be placed in the .got section by the linker script. */
897
ce558b89 898 s = elf_hash_table (info)->sgotplt;
90ace9e9 899 BFD_ASSERT (s != NULL);
eea6121a 900 s->size += 4;
90ace9e9
JT
901
902 /* We also need to make an entry in the .rela.plt section. */
903
ce558b89 904 s = elf_hash_table (info)->srelplt;
90ace9e9 905 BFD_ASSERT (s != NULL);
eea6121a 906 s->size += sizeof (Elf32_External_Rela);
90ace9e9 907
b34976b6 908 return TRUE;
90ace9e9
JT
909 }
910
911 /* Reinitialize the plt offset now that it is not used as a reference
912 count any more. */
913 h->plt.offset = (bfd_vma) -1;
914
915 /* If this is a weak symbol, and there is a real definition, the
916 processor independent code will have arranged for us to see the
917 real definition first, and we can just use the same value. */
60d67dc8 918 if (h->is_weakalias)
90ace9e9 919 {
60d67dc8
AM
920 struct elf_link_hash_entry *def = weakdef (h);
921 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
922 h->root.u.def.section = def->root.u.def.section;
923 h->root.u.def.value = def->root.u.def.value;
b34976b6 924 return TRUE;
90ace9e9
JT
925 }
926
927 /* This is a reference to a symbol defined by a dynamic object which
928 is not a function. */
929
930 /* If we are creating a shared library, we must presume that the
931 only references to the symbol are via the global offset table.
932 For such cases we need not do anything here; the relocations will
933 be handled correctly by relocate_section. */
0e1862bb 934 if (bfd_link_pic (info))
b34976b6 935 return TRUE;
90ace9e9 936
c4b126b8
L
937 /* If there are no references to this symbol that do not use the
938 GOT relocation, we don't need to generate a copy reloc. */
939 if (!h->non_got_ref)
940 return TRUE;
941
90ace9e9
JT
942 /* We must allocate the symbol in our .dynbss section, which will
943 become part of the .bss section of the executable. There will be
944 an entry for this symbol in the .dynsym section. The dynamic
945 object will contain position independent code, so all references
946 from the dynamic object to this symbol will go through the global
947 offset table. The dynamic linker will use the .dynsym entry to
948 determine the address it must put in the global offset table, so
949 both the dynamic object and the regular object will refer to the
950 same memory location for the variable. */
951
3d4d4302 952 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
953 BFD_ASSERT (s != NULL);
954
955 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
956 copy the initial value out of the dynamic object and into the
957 runtime process image. We need to remember the offset into the
958 .rela.bss section we are going to use. */
1d7e9d18 959 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
960 {
961 asection *srel;
962
3d4d4302 963 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 964 BFD_ASSERT (srel != NULL);
eea6121a 965 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 966 h->needs_copy = 1;
90ace9e9
JT
967 }
968
6cabe1ea 969 return _bfd_elf_adjust_dynamic_copy (info, h, s);
90ace9e9
JT
970}
971
fac3d241
MR
972/* This function is called via elf_link_hash_traverse. It resets GOT
973 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
974 will be done. */
975
976static bfd_boolean
977elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
978 void *infoptr ATTRIBUTE_UNUSED)
979{
980 h->got.refcount = -1;
981 h->plt.refcount = -1;
982
983 return TRUE;
984}
985
986/* Discard unused dynamic data if this is a static link. */
987
988static bfd_boolean
989elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
990 struct bfd_link_info *info)
991{
992 bfd *dynobj;
993 asection *s;
994
995 dynobj = elf_hash_table (info)->dynobj;
996
997 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
998 {
999 /* We may have created entries in the .rela.got and .got sections.
1000 However, if we are not creating the dynamic sections, we will
1001 not actually use these entries. Reset the size of .rela.got
49d01bf6 1002 and .got, which will cause them to get stripped from the output
fac3d241 1003 file below. */
ce558b89 1004 s = elf_hash_table (info)->srelgot;
fac3d241
MR
1005 if (s != NULL)
1006 s->size = 0;
ce558b89 1007 s = elf_hash_table (info)->sgotplt;
fac3d241
MR
1008 if (s != NULL)
1009 s->size = 0;
ce558b89 1010 s = elf_hash_table (info)->sgot;
fac3d241
MR
1011 if (s != NULL)
1012 s->size = 0;
1013 }
1014
1015 /* If this is a static link, we need to discard all the got entries we've
1016 recorded. */
1017 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1018 elf_link_hash_traverse (elf_hash_table (info),
1019 elf_vax_discard_got_entries,
1020 info);
1021
1022 return TRUE;
1023}
1024
90ace9e9
JT
1025/* Set the sizes of the dynamic sections. */
1026
b34976b6 1027static bfd_boolean
ce71b576 1028elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1029{
1030 bfd *dynobj;
1031 asection *s;
b34976b6
AM
1032 bfd_boolean plt;
1033 bfd_boolean relocs;
1034 bfd_boolean reltext;
90ace9e9
JT
1035
1036 dynobj = elf_hash_table (info)->dynobj;
1037 BFD_ASSERT (dynobj != NULL);
1038
1039 if (elf_hash_table (info)->dynamic_sections_created)
1040 {
1041 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 1042 if (bfd_link_executable (info) && !info->nointerp)
90ace9e9 1043 {
3d4d4302 1044 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1045 BFD_ASSERT (s != NULL);
eea6121a 1046 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1047 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1048 }
1049 }
90ace9e9
JT
1050
1051 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1052 relative relocs against symbols defined in a regular object. We
1053 allocated space for them in the check_relocs routine, but we will not
1054 fill them in in the relocate_section routine. */
0e1862bb 1055 if (bfd_link_pic (info) && info->symbolic)
4dfe6ac6 1056 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1057 elf_vax_discard_copies,
ce71b576 1058 NULL);
b29635ba 1059
fac3d241
MR
1060 /* If this is a -Bsymbolic shared link, we need to discard all the got
1061 entries we've recorded. Otherwise, we need to instantiate (allocate
1062 space for them). */
b29635ba
JT
1063 elf_link_hash_traverse (elf_hash_table (info),
1064 elf_vax_instantiate_got_entries,
2c3fc389 1065 info);
90ace9e9
JT
1066
1067 /* The check_relocs and adjust_dynamic_symbol entry points have
1068 determined the sizes of the various dynamic sections. Allocate
1069 memory for them. */
b34976b6
AM
1070 plt = FALSE;
1071 relocs = FALSE;
1072 reltext = FALSE;
90ace9e9
JT
1073 for (s = dynobj->sections; s != NULL; s = s->next)
1074 {
1075 const char *name;
90ace9e9
JT
1076
1077 if ((s->flags & SEC_LINKER_CREATED) == 0)
1078 continue;
1079
1080 /* It's OK to base decisions on the section name, because none
1081 of the dynobj section names depend upon the input files. */
fd361982 1082 name = bfd_section_name (s);
90ace9e9 1083
90ace9e9
JT
1084 if (strcmp (name, ".plt") == 0)
1085 {
c456f082
AM
1086 /* Remember whether there is a PLT. */
1087 plt = s->size != 0;
90ace9e9 1088 }
0112cd26 1089 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1090 {
c456f082 1091 if (s->size != 0)
90ace9e9
JT
1092 {
1093 asection *target;
1094
1095 /* Remember whether there are any reloc sections other
07d6d2b8 1096 than .rela.plt. */
90ace9e9
JT
1097 if (strcmp (name, ".rela.plt") != 0)
1098 {
1099 const char *outname;
1100
b34976b6 1101 relocs = TRUE;
90ace9e9
JT
1102
1103 /* If this relocation section applies to a read only
1104 section, then we probably need a DT_TEXTREL
1105 entry. .rela.plt is actually associated with
1106 .got.plt, which is never readonly. */
fd361982 1107 outname = bfd_section_name (s->output_section);
90ace9e9
JT
1108 target = bfd_get_section_by_name (output_bfd, outname + 5);
1109 if (target != NULL
1110 && (target->flags & SEC_READONLY) != 0
1111 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1112 reltext = TRUE;
90ace9e9
JT
1113 }
1114
1115 /* We use the reloc_count field as a counter if we need
1116 to copy relocs into the output file. */
1117 s->reloc_count = 0;
1118 }
1119 }
0112cd26 1120 else if (! CONST_STRNEQ (name, ".got")
c456f082 1121 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1122 {
1123 /* It's not one of our sections, so don't allocate space. */
1124 continue;
1125 }
1126
c456f082 1127 if (s->size == 0)
90ace9e9 1128 {
c456f082
AM
1129 /* If we don't need this section, strip it from the
1130 output file. This is mostly to handle .rela.bss and
1131 .rela.plt. We must create both sections in
1132 create_dynamic_sections, because they must be created
1133 before the linker maps input sections to output
1134 sections. The linker does that before
1135 adjust_dynamic_symbol is called, and it is that
1136 function which decides whether anything needs to go
1137 into these sections. */
8423293d 1138 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1139 continue;
1140 }
1141
c456f082
AM
1142 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1143 continue;
1144
90ace9e9 1145 /* Allocate memory for the section contents. */
eb9a5ecf 1146 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 1147 if (s->contents == NULL)
b34976b6 1148 return FALSE;
90ace9e9
JT
1149 }
1150
1151 if (elf_hash_table (info)->dynamic_sections_created)
1152 {
1153 /* Add some entries to the .dynamic section. We fill in the
1154 values later, in elf_vax_finish_dynamic_sections, but we
1155 must add the entries now so that we get the correct size for
1156 the .dynamic section. The DT_DEBUG entry is filled in by the
1157 dynamic linker and used by the debugger. */
1158#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1159 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9 1160
0e1862bb 1161 if (!bfd_link_pic (info))
90ace9e9
JT
1162 {
1163 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1164 return FALSE;
90ace9e9
JT
1165 }
1166
1167 if (plt)
1168 {
1169 if (!add_dynamic_entry (DT_PLTGOT, 0)
1170 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1171 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1172 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1173 return FALSE;
90ace9e9
JT
1174 }
1175
1176 if (relocs)
1177 {
1178 if (!add_dynamic_entry (DT_RELA, 0)
1179 || !add_dynamic_entry (DT_RELASZ, 0)
1180 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1181 return FALSE;
90ace9e9
JT
1182 }
1183
1184 if (reltext || (info->flags & DF_TEXTREL) != 0)
1185 {
1186 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1187 return FALSE;
90ace9e9
JT
1188 }
1189 }
1190#undef add_dynamic_entry
1191
b34976b6 1192 return TRUE;
90ace9e9
JT
1193}
1194
1195/* This function is called via elf_vax_link_hash_traverse if we are
1196 creating a shared object with -Bsymbolic. It discards the space
1197 allocated to copy PC relative relocs against symbols which are defined
1198 in regular objects. We allocated space for them in the check_relocs
1199 routine, but we won't fill them in in the relocate_section routine. */
1200
b34976b6 1201static bfd_boolean
ce71b576 1202elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1203 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1204{
1205 struct elf_vax_pcrel_relocs_copied *s;
1206
90ace9e9 1207 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1208 if (!h->root.def_regular)
b34976b6 1209 return TRUE;
90ace9e9
JT
1210
1211 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1212 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1213
b34976b6 1214 return TRUE;
90ace9e9
JT
1215}
1216
fac3d241
MR
1217/* This function is called via elf_link_hash_traverse. It looks for
1218 entries that have GOT or PLT (.GOT) references. If creating a shared
1219 object with -Bsymbolic, or the symbol has been forced local, then it
1220 resets the reference count back to -1 so normal PC32 relocation will
1221 be done. Otherwise space in the .got and .rela.got will be reserved
1222 for the symbol. */
b29635ba 1223
b34976b6 1224static bfd_boolean
2c3fc389 1225elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1226{
1227 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1228 bfd *dynobj;
1229 asection *sgot;
1230 asection *srelgot;
b34976b6 1231
b29635ba
JT
1232 /* We don't care about non-GOT (and non-PLT) entries. */
1233 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1234 return TRUE;
b29635ba
JT
1235
1236 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1237 BFD_ASSERT (dynobj != NULL);
b29635ba 1238
ce558b89
AM
1239 sgot = elf_hash_table (info)->sgot;
1240 srelgot = elf_hash_table (info)->srelgot;
b29635ba 1241
125b5bac 1242 if (SYMBOL_REFERENCES_LOCAL (info, h))
b29635ba 1243 {
8be65dd3
MR
1244 h->got.refcount = -1;
1245 h->plt.refcount = -1;
b29635ba
JT
1246 }
1247 else if (h->got.refcount > 0)
1248 {
1249 /* Make sure this symbol is output as a dynamic symbol. */
1250 if (h->dynindx == -1)
1251 {
c152c796 1252 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1253 return FALSE;
b29635ba
JT
1254 }
1255
1256 /* Allocate space in the .got and .rela.got sections. */
125b5bac
MR
1257 sgot->size += 4;
1258 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1259 }
1260
b34976b6 1261 return TRUE;
b29635ba
JT
1262}
1263
90ace9e9
JT
1264/* Relocate an VAX ELF section. */
1265
b34976b6 1266static bfd_boolean
ce71b576
NC
1267elf_vax_relocate_section (bfd *output_bfd,
1268 struct bfd_link_info *info,
1269 bfd *input_bfd,
1270 asection *input_section,
1271 bfd_byte *contents,
1272 Elf_Internal_Rela *relocs,
1273 Elf_Internal_Sym *local_syms,
1274 asection **local_sections)
90ace9e9 1275{
90ace9e9
JT
1276 Elf_Internal_Shdr *symtab_hdr;
1277 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1278 bfd_vma plt_index;
1279 bfd_vma got_offset;
1280 asection *sgot;
1281 asection *splt;
1282 asection *sgotplt;
1283 asection *sreloc;
1284 Elf_Internal_Rela *rel;
1285 Elf_Internal_Rela *relend;
1286
90ace9e9
JT
1287 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1288 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1289
1290 sgot = NULL;
1291 splt = NULL;
1292 sgotplt = NULL;
1293 sreloc = NULL;
1294
1295 rel = relocs;
1296 relend = relocs + input_section->reloc_count;
1297 for (; rel < relend; rel++)
1298 {
1299 int r_type;
1300 reloc_howto_type *howto;
1301 unsigned long r_symndx;
1302 struct elf_link_hash_entry *h;
1303 Elf_Internal_Sym *sym;
1304 asection *sec;
1305 bfd_vma relocation;
1306 bfd_reloc_status_type r;
1307
1308 r_type = ELF32_R_TYPE (rel->r_info);
1309 if (r_type < 0 || r_type >= (int) R_VAX_max)
1310 {
1311 bfd_set_error (bfd_error_bad_value);
b34976b6 1312 return FALSE;
90ace9e9
JT
1313 }
1314 howto = howto_table + r_type;
1315
f0fe0e16 1316 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1317 h = NULL;
1318 sym = NULL;
1319 sec = NULL;
1320 if (r_symndx < symtab_hdr->sh_info)
1321 {
1322 sym = local_syms + r_symndx;
1323 sec = local_sections[r_symndx];
8517fae7 1324 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1325 }
1326 else
1327 {
560e09e9 1328 bfd_boolean unresolved_reloc;
62d887d4 1329 bfd_boolean warned, ignored;
560e09e9 1330
b2a8e766
AM
1331 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1332 r_symndx, symtab_hdr, sym_hashes,
1333 h, sec, relocation,
62d887d4 1334 unresolved_reloc, warned, ignored);
ce71b576 1335
560e09e9 1336 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1337 || h->root.type == bfd_link_hash_defweak)
560e09e9 1338 && ((r_type == R_VAX_PLT32
90ace9e9 1339 && h->plt.offset != (bfd_vma) -1
fe723c87 1340 && !h->forced_local
90ace9e9
JT
1341 && elf_hash_table (info)->dynamic_sections_created)
1342 || (r_type == R_VAX_GOT32
fe723c87
MT
1343 && h->got.offset != (bfd_vma) -1
1344 && !h->forced_local
90ace9e9 1345 && elf_hash_table (info)->dynamic_sections_created
0e1862bb 1346 && (! bfd_link_pic (info)
90ace9e9 1347 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1348 || !h->def_regular))
0e1862bb 1349 || (bfd_link_pic (info)
90ace9e9 1350 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1351 || !h->def_regular)
90ace9e9
JT
1352 && ((input_section->flags & SEC_ALLOC) != 0
1353 /* DWARF will emit R_VAX_32 relocations in its
1354 sections against symbols defined externally
1355 in shared libraries. We can't do anything
1356 with them here. */
1357
1358 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1359 && h->def_dynamic))
90ace9e9
JT
1360 && (r_type == R_VAX_8
1361 || r_type == R_VAX_16
fe723c87 1362 || r_type == R_VAX_32))))
560e09e9
NC
1363 /* In these cases, we don't need the relocation
1364 value. We check specially because in some
1365 obscure cases sec->output_section will be NULL. */
90ace9e9 1366 relocation = 0;
90ace9e9
JT
1367 }
1368
dbaa2011 1369 if (sec != NULL && discarded_section (sec))
e4067dbb 1370 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1371 rel, 1, relend, howto, 0, contents);
ab96bf03 1372
0e1862bb 1373 if (bfd_link_relocatable (info))
ab96bf03
AM
1374 continue;
1375
90ace9e9
JT
1376 switch (r_type)
1377 {
1378 case R_VAX_GOT32:
1379 /* Relocation is to the address of the entry for this symbol
1380 in the global offset table. */
125b5bac
MR
1381
1382 /* Resolve a GOTxx reloc against a local symbol directly,
1383 without using the global offset table. */
7b6021f1 1384 if (h == NULL
125b5bac 1385 || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1386 break;
1387
90ace9e9
JT
1388 {
1389 bfd_vma off;
1390
ce558b89
AM
1391 sgot = elf_hash_table (info)->sgot;
1392 BFD_ASSERT (sgot != NULL);
90ace9e9 1393
90ace9e9 1394 off = h->got.offset;
eea6121a 1395 BFD_ASSERT (off < sgot->size);
90ace9e9 1396
125b5bac 1397 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
90ace9e9
JT
1398
1399 relocation = sgot->output_offset + off;
b29635ba 1400 /* The GOT relocation uses the addend. */
90ace9e9
JT
1401 rel->r_addend = 0;
1402
b29635ba
JT
1403 /* Change the reference to be indirect. */
1404 contents[rel->r_offset - 1] |= 0x10;
1405 relocation += sgot->output_section->vma;
90ace9e9
JT
1406 }
1407 break;
1408
04981bc1
MR
1409 case R_VAX_PC32:
1410 /* If we are creating an executable and the function this
1411 reloc refers to is in a shared lib, then we made a PLT
1412 entry for this symbol and need to handle the reloc like
1413 a PLT reloc. */
0e1862bb 1414 if (bfd_link_pic (info))
04981bc1
MR
1415 goto r_vax_pc32_shared;
1416 /* Fall through. */
90ace9e9
JT
1417 case R_VAX_PLT32:
1418 /* Relocation is to the entry for this symbol in the
1419 procedure linkage table. */
1420
1421 /* Resolve a PLTxx reloc against a local symbol directly,
1422 without using the procedure linkage table. */
7b6021f1 1423 if (h == NULL
125b5bac 1424 || h->plt.offset == (bfd_vma) -1)
90ace9e9
JT
1425 break;
1426
ce558b89
AM
1427 splt = elf_hash_table (info)->splt;
1428 BFD_ASSERT (splt != NULL);
90ace9e9 1429
ce558b89
AM
1430 sgotplt = elf_hash_table (info)->sgotplt;
1431 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1432
1433 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1434
1435 /* Get the offset into the .got table of the entry that
1436 corresponds to this function. Each .got entry is 4 bytes.
1437 The first two are reserved. */
1438 got_offset = (plt_index + 3) * 4;
1439
9e86195c 1440 /* We want the relocation to point into the .got.plt instead
cedb70c5 1441 of the plt itself. */
90ace9e9
JT
1442 relocation = (sgotplt->output_section->vma
1443 + sgotplt->output_offset
1444 + got_offset);
1445 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1446 if (rel->r_addend == 2)
1447 {
1448 h->plt.offset |= 1;
1449 }
1450 else if (rel->r_addend != 0)
4eca0228 1451 _bfd_error_handler
695344c0 1452 /* xgettext:c-format */
2dcf00ce 1453 (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
871b3ab2 1454 " from %pA section ignored"),
2dcf00ce
AM
1455 input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1456 input_section);
90ace9e9
JT
1457 rel->r_addend = 0;
1458
1459 break;
1460
1461 case R_VAX_PC8:
1462 case R_VAX_PC16:
04981bc1 1463 r_vax_pc32_shared:
7b6021f1
MR
1464 if (h == NULL
1465 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1466 || h->forced_local)
90ace9e9
JT
1467 break;
1468 /* Fall through. */
1469 case R_VAX_8:
1470 case R_VAX_16:
1471 case R_VAX_32:
0e1862bb 1472 if (bfd_link_pic (info)
cf35638d 1473 && r_symndx != STN_UNDEF
90ace9e9
JT
1474 && (input_section->flags & SEC_ALLOC) != 0
1475 && ((r_type != R_VAX_PC8
1476 && r_type != R_VAX_PC16
1477 && r_type != R_VAX_PC32)
da6bcfca
MT
1478 || ((input_section->flags & SEC_CODE)
1479 && (!info->symbolic
1480 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1481 {
1482 Elf_Internal_Rela outrel;
947216bf 1483 bfd_byte *loc;
b34976b6 1484 bfd_boolean skip, relocate;
90ace9e9
JT
1485
1486 /* When generating a shared object, these relocations
1487 are copied into the output file to be resolved at run
1488 time. */
90ace9e9
JT
1489 if (sreloc == NULL)
1490 {
83bac4b0
NC
1491 sreloc = _bfd_elf_get_dynamic_reloc_section
1492 (input_bfd, input_section, /*rela?*/ TRUE);
1493 if (sreloc == NULL)
b34976b6 1494 return FALSE;
90ace9e9
JT
1495 }
1496
b34976b6
AM
1497 skip = FALSE;
1498 relocate = FALSE;
90ace9e9
JT
1499
1500 outrel.r_offset =
1501 _bfd_elf_section_offset (output_bfd, info, input_section,
1502 rel->r_offset);
1503 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1504 skip = TRUE;
90ace9e9 1505 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1506 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1507 outrel.r_offset += (input_section->output_section->vma
1508 + input_section->output_offset);
1509
1510 if (skip)
1511 memset (&outrel, 0, sizeof outrel);
1512 /* h->dynindx may be -1 if the symbol was marked to
07d6d2b8 1513 become local. */
90ace9e9
JT
1514 else if (h != NULL
1515 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1516 || !h->def_regular))
90ace9e9
JT
1517 {
1518 BFD_ASSERT (h->dynindx != -1);
1519 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1520 outrel.r_addend = relocation + rel->r_addend;
1521 }
1522 else
1523 {
1524 if (r_type == R_VAX_32)
1525 {
b34976b6 1526 relocate = TRUE;
90ace9e9
JT
1527 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1528 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1529 &contents[rel->r_offset]) == 0);
1530 outrel.r_addend = relocation + rel->r_addend;
1531 }
1532 else
1533 {
1534 long indx;
1535
8517fae7 1536 if (bfd_is_abs_section (sec))
90ace9e9
JT
1537 indx = 0;
1538 else if (sec == NULL || sec->owner == NULL)
1539 {
1540 bfd_set_error (bfd_error_bad_value);
b34976b6 1541 return FALSE;
90ace9e9
JT
1542 }
1543 else
1544 {
1545 asection *osec;
1546
74541ad4
AM
1547 /* We are turning this relocation into one
1548 against a section symbol. It would be
1549 proper to subtract the symbol's value,
1550 osec->vma, from the emitted reloc addend,
1551 but ld.so expects buggy relocs. */
90ace9e9
JT
1552 osec = sec->output_section;
1553 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1554 if (indx == 0)
1555 {
1556 struct elf_link_hash_table *htab;
1557 htab = elf_hash_table (info);
1558 osec = htab->text_index_section;
1559 indx = elf_section_data (osec)->dynindx;
1560 }
1561 BFD_ASSERT (indx != 0);
90ace9e9
JT
1562 }
1563
1564 outrel.r_info = ELF32_R_INFO (indx, r_type);
1565 outrel.r_addend = relocation + rel->r_addend;
1566 }
1567 }
1568
ddd74d3c 1569 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1570 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1571 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1572 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1573 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1574 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1575 {
1576 if (h != NULL)
4eca0228 1577 _bfd_error_handler
695344c0 1578 /* xgettext:c-format */
871b3ab2
AM
1579 (_("%pB: warning: %s relocation against symbol `%s'"
1580 " from %pA section"),
dae82561
AM
1581 input_bfd, howto->name, h->root.root.string,
1582 input_section);
90ace9e9 1583 else
4eca0228 1584 _bfd_error_handler
695344c0 1585 /* xgettext:c-format */
2dcf00ce
AM
1586 (_("%pB: warning: %s relocation to %#" PRIx64
1587 " from %pA section"),
1588 input_bfd, howto->name, (uint64_t) outrel.r_addend,
dae82561 1589 input_section);
90ace9e9 1590 }
947216bf
AM
1591 loc = sreloc->contents;
1592 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1593 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1594
1595 /* This reloc will be computed at runtime, so there's no
07d6d2b8
AM
1596 need to do anything now, except for R_VAX_32
1597 relocations that have been turned into
1598 R_VAX_RELATIVE. */
90ace9e9
JT
1599 if (!relocate)
1600 continue;
1601 }
1602
1603 break;
1604
1605 case R_VAX_GNU_VTINHERIT:
1606 case R_VAX_GNU_VTENTRY:
1607 /* These are no-ops in the end. */
1608 continue;
1609
1610 default:
1611 break;
1612 }
1613
b34976b6 1614 /* VAX PCREL relocations are from the end of relocation, not the start.
07d6d2b8
AM
1615 So subtract the difference from the relocation amount since we can't
1616 add it to the offset. */
90ace9e9 1617 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1618 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1619
1620 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1621 contents, rel->r_offset,
1622 relocation, rel->r_addend);
1623
1624 if (r != bfd_reloc_ok)
1625 {
1626 switch (r)
1627 {
1628 default:
1629 case bfd_reloc_outofrange:
1630 abort ();
1631 case bfd_reloc_overflow:
1632 {
1633 const char *name;
1634
1635 if (h != NULL)
dfeffb9f 1636 name = NULL;
90ace9e9
JT
1637 else
1638 {
1639 name = bfd_elf_string_from_elf_section (input_bfd,
1640 symtab_hdr->sh_link,
1641 sym->st_name);
1642 if (name == NULL)
b34976b6 1643 return FALSE;
90ace9e9 1644 if (*name == '\0')
fd361982 1645 name = bfd_section_name (sec);
90ace9e9 1646 }
1a72702b
AM
1647 info->callbacks->reloc_overflow
1648 (info, (h ? &h->root : NULL), name, howto->name,
1649 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
90ace9e9
JT
1650 }
1651 break;
1652 }
1653 }
1654 }
1655
b34976b6 1656 return TRUE;
90ace9e9
JT
1657}
1658
1659/* Finish up dynamic symbol handling. We set the contents of various
1660 dynamic sections here. */
1661
b34976b6 1662static bfd_boolean
ce71b576
NC
1663elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1664 struct elf_link_hash_entry *h,
1665 Elf_Internal_Sym *sym)
90ace9e9
JT
1666{
1667 bfd *dynobj;
1668
1669 dynobj = elf_hash_table (info)->dynobj;
1670
1671 if (h->plt.offset != (bfd_vma) -1)
1672 {
1673 asection *splt;
1674 asection *sgot;
1675 asection *srela;
1676 bfd_vma plt_index;
1677 bfd_vma got_offset;
1678 bfd_vma addend;
1679 Elf_Internal_Rela rela;
947216bf 1680 bfd_byte *loc;
90ace9e9
JT
1681
1682 /* This symbol has an entry in the procedure linkage table. Set
1683 it up. */
90ace9e9
JT
1684 BFD_ASSERT (h->dynindx != -1);
1685
ce558b89
AM
1686 splt = elf_hash_table (info)->splt;
1687 sgot = elf_hash_table (info)->sgotplt;
1688 srela = elf_hash_table (info)->srelplt;
90ace9e9
JT
1689 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1690
1691 addend = 2 * (h->plt.offset & 1);
1692 h->plt.offset &= ~1;
1693
1694 /* Get the index in the procedure linkage table which
1695 corresponds to this symbol. This is the index of this symbol
1696 in all the symbols for which we are making plt entries. The
1697 first entry in the procedure linkage table is reserved. */
1698 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1699
1700 /* Get the offset into the .got table of the entry that
1701 corresponds to this function. Each .got entry is 4 bytes.
1702 The first two are reserved. */
1703 got_offset = (plt_index + 3) * 4;
1704
1705 /* Fill in the entry in the procedure linkage table. */
1706 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
07d6d2b8 1707 PLT_ENTRY_SIZE);
90ace9e9
JT
1708
1709 /* The offset is relative to the first extension word. */
1710 bfd_put_32 (output_bfd,
1711 -(h->plt.offset + 8),
1712 splt->contents + h->plt.offset + 4);
1713
1714 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1715 splt->contents + h->plt.offset + 8);
1716
1717 /* Fill in the entry in the global offset table. */
1718 bfd_put_32 (output_bfd,
1719 (splt->output_section->vma
1720 + splt->output_offset
1721 + h->plt.offset) + addend,
1722 sgot->contents + got_offset);
1723
1724 /* Fill in the entry in the .rela.plt section. */
1725 rela.r_offset = (sgot->output_section->vma
1726 + sgot->output_offset
1727 + got_offset);
1728 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1729 rela.r_addend = addend;
947216bf
AM
1730 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1731 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1732
f5385ebf 1733 if (!h->def_regular)
90ace9e9
JT
1734 {
1735 /* Mark the symbol as undefined, rather than as defined in
1736 the .plt section. Leave the value alone. */
1737 sym->st_shndx = SHN_UNDEF;
1738 }
1739 }
1740
1741 if (h->got.offset != (bfd_vma) -1)
1742 {
1743 asection *sgot;
1744 asection *srela;
1745 Elf_Internal_Rela rela;
947216bf 1746 bfd_byte *loc;
90ace9e9
JT
1747
1748 /* This symbol has an entry in the global offset table. Set it
1749 up. */
ce558b89
AM
1750 sgot = elf_hash_table (info)->sgot;
1751 srela = elf_hash_table (info)->srelgot;
90ace9e9
JT
1752 BFD_ASSERT (sgot != NULL && srela != NULL);
1753
1754 rela.r_offset = (sgot->output_section->vma
1755 + sgot->output_offset
125b5bac
MR
1756 + h->got.offset);
1757 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
90ace9e9 1758 rela.r_addend = bfd_get_signed_32 (output_bfd,
125b5bac 1759 sgot->contents + h->got.offset);
90ace9e9 1760
947216bf
AM
1761 loc = srela->contents;
1762 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1763 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1764 }
1765
f5385ebf 1766 if (h->needs_copy)
90ace9e9
JT
1767 {
1768 asection *s;
1769 Elf_Internal_Rela rela;
947216bf 1770 bfd_byte *loc;
90ace9e9
JT
1771
1772 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1773 BFD_ASSERT (h->dynindx != -1
1774 && (h->root.type == bfd_link_hash_defined
1775 || h->root.type == bfd_link_hash_defweak));
1776
3d4d4302 1777 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1778 BFD_ASSERT (s != NULL);
1779
1780 rela.r_offset = (h->root.u.def.value
1781 + h->root.u.def.section->output_section->vma
1782 + h->root.u.def.section->output_offset);
1783 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1784 rela.r_addend = 0;
947216bf
AM
1785 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1786 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1787 }
1788
1789 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1790 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1791 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1792 sym->st_shndx = SHN_ABS;
1793
b34976b6 1794 return TRUE;
90ace9e9
JT
1795}
1796
1797/* Finish up the dynamic sections. */
1798
b34976b6 1799static bfd_boolean
ce71b576 1800elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1801{
1802 bfd *dynobj;
1803 asection *sgot;
1804 asection *sdyn;
1805
1806 dynobj = elf_hash_table (info)->dynobj;
1807
ce558b89 1808 sgot = elf_hash_table (info)->sgotplt;
90ace9e9 1809 BFD_ASSERT (sgot != NULL);
3d4d4302 1810 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1811
1812 if (elf_hash_table (info)->dynamic_sections_created)
1813 {
1814 asection *splt;
1815 Elf32_External_Dyn *dyncon, *dynconend;
1816
ce558b89 1817 splt = elf_hash_table (info)->splt;
90ace9e9
JT
1818 BFD_ASSERT (splt != NULL && sdyn != NULL);
1819
1820 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1821 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1822 for (; dyncon < dynconend; dyncon++)
1823 {
1824 Elf_Internal_Dyn dyn;
90ace9e9
JT
1825 asection *s;
1826
1827 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1828
1829 switch (dyn.d_tag)
1830 {
1831 default:
1832 break;
1833
1834 case DT_PLTGOT:
ce558b89 1835 s = elf_hash_table (info)->sgotplt;
90ace9e9
JT
1836 goto get_vma;
1837 case DT_JMPREL:
ce558b89 1838 s = elf_hash_table (info)->srelplt;
90ace9e9 1839 get_vma:
4ade44b7 1840 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
90ace9e9
JT
1841 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1842 break;
1843
1844 case DT_PLTRELSZ:
ce558b89 1845 s = elf_hash_table (info)->srelplt;
eea6121a 1846 dyn.d_un.d_val = s->size;
90ace9e9
JT
1847 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1848 break;
90ace9e9
JT
1849 }
1850 }
1851
1852 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1853 if (splt->size > 0)
90ace9e9
JT
1854 {
1855 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1856 bfd_put_32 (output_bfd,
07d6d2b8
AM
1857 (sgot->output_section->vma
1858 + sgot->output_offset + 4
1859 - (splt->output_section->vma + 6)),
1860 splt->contents + 2);
90ace9e9 1861 bfd_put_32 (output_bfd,
07d6d2b8
AM
1862 (sgot->output_section->vma
1863 + sgot->output_offset + 8
1864 - (splt->output_section->vma + 12)),
1865 splt->contents + 8);
1866 elf_section_data (splt->output_section)->this_hdr.sh_entsize
1867 = PLT_ENTRY_SIZE;
90ace9e9
JT
1868 }
1869 }
1870
1871 /* Fill in the first three entries in the global offset table. */
eea6121a 1872 if (sgot->size > 0)
90ace9e9
JT
1873 {
1874 if (sdyn == NULL)
1875 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1876 else
1877 bfd_put_32 (output_bfd,
1878 sdyn->output_section->vma + sdyn->output_offset,
1879 sgot->contents);
1880 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1881 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1882 }
1883
f6518c48
MR
1884 if (elf_section_data (sgot->output_section) != NULL)
1885 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
90ace9e9 1886
b34976b6 1887 return TRUE;
90ace9e9
JT
1888}
1889
9b90d8fd 1890static enum elf_reloc_type_class
7e612e98
AM
1891elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1892 const asection *rel_sec ATTRIBUTE_UNUSED,
1893 const Elf_Internal_Rela *rela)
9b90d8fd
MR
1894{
1895 switch ((int) ELF32_R_TYPE (rela->r_info))
1896 {
1897 case R_VAX_RELATIVE:
1898 return reloc_class_relative;
1899 case R_VAX_JMP_SLOT:
1900 return reloc_class_plt;
1901 case R_VAX_COPY:
1902 return reloc_class_copy;
1903 default:
1904 return reloc_class_normal;
1905 }
1906}
1907
6db7e006
MR
1908static bfd_vma
1909elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1910 const arelent *rel ATTRIBUTE_UNUSED)
1911{
1912 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1913}
1914
6d00b590 1915#define TARGET_LITTLE_SYM vax_elf32_vec
90ace9e9
JT
1916#define TARGET_LITTLE_NAME "elf32-vax"
1917#define ELF_MACHINE_CODE EM_VAX
1918#define ELF_MAXPAGESIZE 0x1000
1919
1920#define elf_backend_create_dynamic_sections \
1921 _bfd_elf_create_dynamic_sections
1922#define bfd_elf32_bfd_link_hash_table_create \
1923 elf_vax_link_hash_table_create
c152c796 1924#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
1925
1926#define elf_backend_check_relocs elf_vax_check_relocs
1927#define elf_backend_adjust_dynamic_symbol \
1928 elf_vax_adjust_dynamic_symbol
fac3d241
MR
1929#define elf_backend_always_size_sections \
1930 elf_vax_always_size_sections
90ace9e9
JT
1931#define elf_backend_size_dynamic_sections \
1932 elf_vax_size_dynamic_sections
74541ad4 1933#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
1934#define elf_backend_relocate_section elf_vax_relocate_section
1935#define elf_backend_finish_dynamic_symbol \
1936 elf_vax_finish_dynamic_symbol
1937#define elf_backend_finish_dynamic_sections \
1938 elf_vax_finish_dynamic_sections
9b90d8fd 1939#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9 1940#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
6db7e006 1941#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9 1942#define bfd_elf32_bfd_merge_private_bfd_data \
07d6d2b8 1943 elf32_vax_merge_private_bfd_data
90ace9e9 1944#define bfd_elf32_bfd_set_private_flags \
07d6d2b8 1945 elf32_vax_set_private_flags
90ace9e9 1946#define bfd_elf32_bfd_print_private_bfd_data \
07d6d2b8 1947 elf32_vax_print_private_bfd_data
90ace9e9
JT
1948
1949#define elf_backend_can_gc_sections 1
1950#define elf_backend_want_got_plt 1
1951#define elf_backend_plt_readonly 1
1952#define elf_backend_want_plt_sym 0
1953#define elf_backend_got_header_size 16
f0fe0e16 1954#define elf_backend_rela_normal 1
64f52338 1955#define elf_backend_dtrel_excludes_plt 1
90ace9e9
JT
1956
1957#include "elf32-target.h"
This page took 1.774033 seconds and 4 git commands to generate.