bfd/
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
83bac4b0 3 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
ae9a127f 11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
90ace9e9 22
90ace9e9 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
90ace9e9
JT
25#include "bfdlink.h"
26#include "libbfd.h"
27#include "elf-bfd.h"
28#include "elf/vax.h"
29
ce71b576
NC
30static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
31static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
32static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
33 struct bfd_hash_table *,
34 const char *);
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
36static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
37 asection *, const Elf_Internal_Rela *);
ce71b576
NC
38static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
39 struct elf_link_hash_entry *);
40static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
41static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
42 bfd *, asection *, bfd_byte *,
43 Elf_Internal_Rela *,
44 Elf_Internal_Sym *, asection **);
45static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
46 struct elf_link_hash_entry *,
47 Elf_Internal_Sym *);
48static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
49 struct bfd_link_info *);
50
51static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
52static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
58 0, /* size (0 = byte, 1 = short, 2 = long) */
59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
ce71b576
NC
282rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
283 Elf_Internal_Rela *dst)
90ace9e9
JT
284{
285 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
286 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
287}
288
289#define elf_info_to_howto rtype_to_howto
290
291static const struct
292{
293 bfd_reloc_code_real_type bfd_val;
294 int elf_val;
295} reloc_map[] = {
296 { BFD_RELOC_NONE, R_VAX_NONE },
297 { BFD_RELOC_32, R_VAX_32 },
298 { BFD_RELOC_16, R_VAX_16 },
299 { BFD_RELOC_8, R_VAX_8 },
300 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
301 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
302 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
303 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
304 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
305 { BFD_RELOC_NONE, R_VAX_COPY },
306 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
307 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
308 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
309 { BFD_RELOC_CTOR, R_VAX_32 },
310 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
311 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
312};
313
314static reloc_howto_type *
ce71b576 315reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
316{
317 unsigned int i;
318 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
319 {
320 if (reloc_map[i].bfd_val == code)
321 return &howto_table[reloc_map[i].elf_val];
322 }
323 return 0;
324}
325
157090f7
AM
326static reloc_howto_type *
327reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
328 const char *r_name)
329{
330 unsigned int i;
331
332 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
333 if (howto_table[i].name != NULL
334 && strcasecmp (howto_table[i].name, r_name) == 0)
335 return &howto_table[i];
336
337 return NULL;
338}
339
90ace9e9 340#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 341#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
6c4fb25a 371 0xfc, 0x0f, /* .word ^M<r11:r2> */
90ace9e9
JT
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
ce71b576
NC
417static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
418 PTR);
90ace9e9 419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
ce71b576
NC
422static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
423 PTR);
b29635ba 424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
ce71b576 430 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
ce71b576 435#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
436
437/* Create an entry in an VAX ELF linker hash table. */
438
439static struct bfd_hash_entry *
ce71b576
NC
440elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
441 struct bfd_hash_table *table,
442 const char *string)
90ace9e9
JT
443{
444 struct elf_vax_link_hash_entry *ret =
445 (struct elf_vax_link_hash_entry *) entry;
446
447 /* Allocate the structure if it has not already been allocated by a
448 subclass. */
ce71b576 449 if (ret == NULL)
90ace9e9
JT
450 ret = ((struct elf_vax_link_hash_entry *)
451 bfd_hash_allocate (table,
452 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 453 if (ret == NULL)
90ace9e9
JT
454 return (struct bfd_hash_entry *) ret;
455
456 /* Call the allocation method of the superclass. */
457 ret = ((struct elf_vax_link_hash_entry *)
458 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
459 table, string));
ce71b576 460 if (ret != NULL)
90ace9e9
JT
461 {
462 ret->pcrel_relocs_copied = NULL;
463 }
464
465 return (struct bfd_hash_entry *) ret;
466}
467
468/* Create an VAX ELF linker hash table. */
469
470static struct bfd_link_hash_table *
ce71b576 471elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
472{
473 struct elf_vax_link_hash_table *ret;
474 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
475
ce71b576
NC
476 ret = bfd_malloc (amt);
477 if (ret == NULL)
90ace9e9
JT
478 return NULL;
479
66eb6687
AM
480 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
481 elf_vax_link_hash_newfunc,
482 sizeof (struct elf_vax_link_hash_entry)))
90ace9e9
JT
483 {
484 free (ret);
485 return NULL;
486 }
487
488 return &ret->root.root;
489}
490
491/* Keep vax-specific flags in the ELF header */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
494{
495 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
90ace9e9
JT
498}
499
500/* Merge backend specific data from an object file to the output
501 object file when linking. */
b34976b6 502static bfd_boolean
ce71b576 503elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
504{
505 flagword out_flags;
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 510 return TRUE;
90ace9e9
JT
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
513 out_flags = elf_elfheader (obfd)->e_flags;
514
515 if (!elf_flags_init (obfd))
516 {
b34976b6 517 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
518 elf_elfheader (obfd)->e_flags = in_flags;
519 }
520
b34976b6 521 return TRUE;
90ace9e9
JT
522}
523
524/* Display the flags field */
b34976b6 525static bfd_boolean
ce71b576 526elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
527{
528 FILE *file = (FILE *) ptr;
529
530 BFD_ASSERT (abfd != NULL && ptr != NULL);
531
532 /* Print normal ELF private data. */
533 _bfd_elf_print_private_bfd_data (abfd, ptr);
534
535 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
536
537 /* xgettext:c-format */
538 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
539
179d3252 540 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
541 fprintf (file, _(" [nonpic]"));
542
179d3252 543 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
544 fprintf (file, _(" [d-float]"));
545
179d3252 546 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
547 fprintf (file, _(" [g-float]"));
548
549 fputc ('\n', file);
550
b34976b6 551 return TRUE;
90ace9e9
JT
552}
553/* Look through the relocs for a section during the first phase, and
554 allocate space in the global offset table or procedure linkage
555 table. */
556
b34976b6 557static bfd_boolean
ce71b576
NC
558elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
559 const Elf_Internal_Rela *relocs)
90ace9e9
JT
560{
561 bfd *dynobj;
562 Elf_Internal_Shdr *symtab_hdr;
563 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
564 const Elf_Internal_Rela *rel;
565 const Elf_Internal_Rela *rel_end;
566 asection *sgot;
567 asection *srelgot;
568 asection *sreloc;
569
1049f94e 570 if (info->relocatable)
b34976b6 571 return TRUE;
90ace9e9
JT
572
573 dynobj = elf_hash_table (info)->dynobj;
574 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
575 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
576
577 sgot = NULL;
578 srelgot = NULL;
579 sreloc = NULL;
580
581 rel_end = relocs + sec->reloc_count;
582 for (rel = relocs; rel < rel_end; rel++)
583 {
584 unsigned long r_symndx;
585 struct elf_link_hash_entry *h;
586
587 r_symndx = ELF32_R_SYM (rel->r_info);
588
589 if (r_symndx < symtab_hdr->sh_info)
590 h = NULL;
591 else
973a3492
L
592 {
593 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
594 while (h->root.type == bfd_link_hash_indirect
595 || h->root.type == bfd_link_hash_warning)
596 h = (struct elf_link_hash_entry *) h->root.u.i.link;
597 }
90ace9e9
JT
598
599 switch (ELF32_R_TYPE (rel->r_info))
600 {
601 case R_VAX_GOT32:
fe723c87
MT
602 BFD_ASSERT (h != NULL);
603 if (h->forced_local
604 || h == elf_hash_table (info)->hgot
605 || h == elf_hash_table (info)->hplt)
90ace9e9
JT
606 break;
607
7b6021f1
MR
608 /* If this is a local symbol, we resolve it directly without
609 creating a global offset table entry. */
610 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
611 break;
612
90ace9e9
JT
613 /* This symbol requires a global offset table entry. */
614
615 if (dynobj == NULL)
616 {
617 /* Create the .got section. */
618 elf_hash_table (info)->dynobj = dynobj = abfd;
619 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 620 return FALSE;
90ace9e9
JT
621 }
622
623 if (sgot == NULL)
624 {
625 sgot = bfd_get_section_by_name (dynobj, ".got");
626 BFD_ASSERT (sgot != NULL);
627 }
628
629 if (srelgot == NULL
630 && (h != NULL || info->shared))
631 {
632 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
633 if (srelgot == NULL)
634 {
3496cb2a
L
635 srelgot = bfd_make_section_with_flags (dynobj,
636 ".rela.got",
637 (SEC_ALLOC
638 | SEC_LOAD
639 | SEC_HAS_CONTENTS
640 | SEC_IN_MEMORY
641 | SEC_LINKER_CREATED
642 | SEC_READONLY));
90ace9e9 643 if (srelgot == NULL
90ace9e9 644 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 645 return FALSE;
90ace9e9
JT
646 }
647 }
648
649 if (h != NULL)
650 {
651 struct elf_vax_link_hash_entry *eh;
652
653 eh = (struct elf_vax_link_hash_entry *) h;
654 if (h->got.refcount == -1)
655 {
656 h->got.refcount = 1;
657 eh->got_addend = rel->r_addend;
90ace9e9
JT
658 }
659 else
660 {
661 h->got.refcount++;
662 if (eh->got_addend != (bfd_vma) rel->r_addend)
663 (*_bfd_error_handler)
fe723c87
MT
664 (_("%s: warning: GOT addend of %ld to `%s' does"
665 " not match previous GOT addend of %ld"),
666 bfd_get_filename (abfd), rel->r_addend,
667 h->root.root.string,
668 eh->got_addend);
cedb70c5 669
90ace9e9
JT
670 }
671 }
672 break;
673
674 case R_VAX_PLT32:
675 /* This symbol requires a procedure linkage table entry. We
676 actually build the entry in adjust_dynamic_symbol,
677 because this might be a case of linking PIC code which is
678 never referenced by a dynamic object, in which case we
679 don't need to generate a procedure linkage table entry
680 after all. */
681
682 /* If this is a local symbol, we resolve it directly without
683 creating a procedure linkage table entry. */
fe723c87 684 BFD_ASSERT (h != NULL);
7b6021f1 685 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || h->forced_local)
fe723c87 686 break;
90ace9e9 687
f5385ebf 688 h->needs_plt = 1;
90ace9e9
JT
689 if (h->plt.refcount == -1)
690 h->plt.refcount = 1;
691 else
692 h->plt.refcount++;
693 break;
694
695 case R_VAX_PC8:
696 case R_VAX_PC16:
697 case R_VAX_PC32:
698 /* If we are creating a shared library and this is not a local
699 symbol, we need to copy the reloc into the shared library.
700 However when linking with -Bsymbolic and this is a global
701 symbol which is defined in an object we are including in the
702 link (i.e., DEF_REGULAR is set), then we can resolve the
703 reloc directly. At this point we have not seen all the input
704 files, so it is possible that DEF_REGULAR is not set now but
705 will be set later (it is never cleared). We account for that
706 possibility below by storing information in the
707 pcrel_relocs_copied field of the hash table entry. */
708 if (!(info->shared
709 && (sec->flags & SEC_ALLOC) != 0
710 && h != NULL
711 && (!info->symbolic
f5385ebf 712 || !h->def_regular)))
90ace9e9 713 {
7b6021f1
MR
714 if (h != NULL
715 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
716 && !h->forced_local)
90ace9e9
JT
717 {
718 /* Make sure a plt entry is created for this symbol if
719 it turns out to be a function defined by a dynamic
720 object. */
721 if (h->plt.refcount == -1)
722 h->plt.refcount = 1;
723 else
724 h->plt.refcount++;
725 }
726 break;
727 }
7b6021f1
MR
728 /* If this is a local symbol, we can resolve it directly. */
729 if (h != NULL
730 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
731 || h->forced_local))
fe723c87
MT
732 break;
733
90ace9e9
JT
734 /* Fall through. */
735 case R_VAX_8:
736 case R_VAX_16:
737 case R_VAX_32:
7b6021f1 738 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
739 {
740 /* Make sure a plt entry is created for this symbol if it
741 turns out to be a function defined by a dynamic object. */
742 if (h->plt.refcount == -1)
743 h->plt.refcount = 1;
744 else
745 h->plt.refcount++;
746 }
747
748 /* If we are creating a shared library, we need to copy the
749 reloc into the shared library. */
750 if (info->shared
751 && (sec->flags & SEC_ALLOC) != 0)
752 {
753 /* When creating a shared object, we must copy these
754 reloc types into the output file. We create a reloc
755 section in dynobj and make room for this reloc. */
756 if (sreloc == NULL)
757 {
83bac4b0
NC
758 sreloc = _bfd_elf_make_dynamic_reloc_section
759 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 760
83bac4b0 761 if (sreloc == NULL)
b34976b6 762 return FALSE;
90ace9e9 763
90ace9e9
JT
764 if (sec->flags & SEC_READONLY)
765 info->flags |= DF_TEXTREL;
766 }
767
eea6121a 768 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
769
770 /* If we are linking with -Bsymbolic, we count the number of
771 PC relative relocations we have entered for this symbol,
772 so that we can discard them again if the symbol is later
773 defined by a regular object. Note that this function is
19852a2a 774 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
775 which means that h is really a pointer to an
776 elf_vax_link_hash_entry. */
777 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
778 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
779 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
780 && info->symbolic)
781 {
782 struct elf_vax_link_hash_entry *eh;
783 struct elf_vax_pcrel_relocs_copied *p;
784
785 eh = (struct elf_vax_link_hash_entry *) h;
786
787 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
788 if (p->section == sreloc)
789 break;
790
791 if (p == NULL)
792 {
793 p = ((struct elf_vax_pcrel_relocs_copied *)
794 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
795 if (p == NULL)
b34976b6 796 return FALSE;
90ace9e9
JT
797 p->next = eh->pcrel_relocs_copied;
798 eh->pcrel_relocs_copied = p;
799 p->section = sreloc;
800 p->count = 0;
801 }
802
803 ++p->count;
804 }
805 }
806
807 break;
808
809 /* This relocation describes the C++ object vtable hierarchy.
810 Reconstruct it for later use during GC. */
811 case R_VAX_GNU_VTINHERIT:
c152c796 812 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 813 return FALSE;
90ace9e9
JT
814 break;
815
816 /* This relocation describes which C++ vtable entries are actually
817 used. Record for later use during GC. */
818 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
819 BFD_ASSERT (h != NULL);
820 if (h != NULL
821 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 822 return FALSE;
90ace9e9
JT
823 break;
824
825 default:
826 break;
827 }
828 }
829
b34976b6 830 return TRUE;
90ace9e9
JT
831}
832
833/* Return the section that should be marked against GC for a given
834 relocation. */
835
836static asection *
ce71b576 837elf_vax_gc_mark_hook (asection *sec,
07adf181 838 struct bfd_link_info *info,
ce71b576
NC
839 Elf_Internal_Rela *rel,
840 struct elf_link_hash_entry *h,
841 Elf_Internal_Sym *sym)
90ace9e9
JT
842{
843 if (h != NULL)
07adf181
AM
844 switch (ELF32_R_TYPE (rel->r_info))
845 {
846 case R_VAX_GNU_VTINHERIT:
847 case R_VAX_GNU_VTENTRY:
848 return NULL;
849 }
850
851 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
852}
853
854/* Update the got entry reference counts for the section being removed. */
855
b34976b6 856static bfd_boolean
ce71b576
NC
857elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
858 const Elf_Internal_Rela *relocs)
90ace9e9
JT
859{
860 Elf_Internal_Shdr *symtab_hdr;
861 struct elf_link_hash_entry **sym_hashes;
90ace9e9 862 const Elf_Internal_Rela *rel, *relend;
90ace9e9 863 bfd *dynobj;
90ace9e9 864
7dda2462
TG
865 if (info->relocatable)
866 return TRUE;
867
90ace9e9
JT
868 dynobj = elf_hash_table (info)->dynobj;
869 if (dynobj == NULL)
b34976b6 870 return TRUE;
90ace9e9 871
babfd660
KH
872 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
873 sym_hashes = elf_sym_hashes (abfd);
874
90ace9e9
JT
875 relend = relocs + sec->reloc_count;
876 for (rel = relocs; rel < relend; rel++)
877 {
babfd660 878 unsigned long r_symndx;
3eb128b2
AM
879 struct elf_link_hash_entry *h = NULL;
880
881 r_symndx = ELF32_R_SYM (rel->r_info);
882 if (r_symndx >= symtab_hdr->sh_info)
883 {
884 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
885 while (h->root.type == bfd_link_hash_indirect
886 || h->root.type == bfd_link_hash_warning)
887 h = (struct elf_link_hash_entry *) h->root.u.i.link;
888 }
babfd660 889
90ace9e9
JT
890 switch (ELF32_R_TYPE (rel->r_info))
891 {
892 case R_VAX_GOT32:
3eb128b2
AM
893 if (h != NULL && h->got.refcount > 0)
894 --h->got.refcount;
90ace9e9
JT
895 break;
896
897 case R_VAX_PLT32:
898 case R_VAX_PC8:
899 case R_VAX_PC16:
900 case R_VAX_PC32:
901 case R_VAX_8:
902 case R_VAX_16:
903 case R_VAX_32:
3eb128b2
AM
904 if (h != NULL && h->plt.refcount > 0)
905 --h->plt.refcount;
90ace9e9
JT
906 break;
907
908 default:
909 break;
910 }
911 }
912
b34976b6 913 return TRUE;
90ace9e9
JT
914}
915
916/* Adjust a symbol defined by a dynamic object and referenced by a
917 regular object. The current definition is in some section of the
918 dynamic object, but we're not including those sections. We have to
919 change the definition to something the rest of the link can
920 understand. */
921
b34976b6 922static bfd_boolean
90ace9e9
JT
923elf_vax_adjust_dynamic_symbol (info, h)
924 struct bfd_link_info *info;
925 struct elf_link_hash_entry *h;
926{
927 bfd *dynobj;
928 asection *s;
90ace9e9
JT
929
930 dynobj = elf_hash_table (info)->dynobj;
931
932 /* Make sure we know what is going on here. */
933 BFD_ASSERT (dynobj != NULL
f5385ebf 934 && (h->needs_plt
f6e332e6 935 || h->u.weakdef != NULL
f5385ebf
AM
936 || (h->def_dynamic
937 && h->ref_regular
938 && !h->def_regular)));
90ace9e9
JT
939
940 /* If this is a function, put it in the procedure linkage table. We
941 will fill in the contents of the procedure linkage table later,
942 when we know the address of the .got section. */
943 if (h->type == STT_FUNC
f5385ebf 944 || h->needs_plt)
90ace9e9
JT
945 {
946 if (! info->shared
f5385ebf
AM
947 && !h->def_dynamic
948 && !h->ref_dynamic
90ace9e9
JT
949 /* We must always create the plt entry if it was referenced
950 by a PLTxxO relocation. In this case we already recorded
951 it as a dynamic symbol. */
952 && h->dynindx == -1)
953 {
954 /* This case can occur if we saw a PLTxx reloc in an input
955 file, but the symbol was never referred to by a dynamic
956 object. In such a case, we don't actually need to build
957 a procedure linkage table, and we can just do a PCxx
958 reloc instead. */
f5385ebf 959 BFD_ASSERT (h->needs_plt);
90ace9e9 960 h->plt.offset = (bfd_vma) -1;
b34976b6 961 return TRUE;
90ace9e9
JT
962 }
963
964 /* GC may have rendered this entry unused. */
965 if (h->plt.refcount <= 0)
966 {
f5385ebf 967 h->needs_plt = 0;
90ace9e9 968 h->plt.offset = (bfd_vma) -1;
b34976b6 969 return TRUE;
90ace9e9
JT
970 }
971
972 /* Make sure this symbol is output as a dynamic symbol. */
973 if (h->dynindx == -1)
974 {
c152c796 975 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 976 return FALSE;
90ace9e9
JT
977 }
978
979 s = bfd_get_section_by_name (dynobj, ".plt");
980 BFD_ASSERT (s != NULL);
981
982 /* If this is the first .plt entry, make room for the special
983 first entry. */
eea6121a 984 if (s->size == 0)
90ace9e9 985 {
eea6121a 986 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
987 }
988
989 /* If this symbol is not defined in a regular file, and we are
990 not generating a shared library, then set the symbol to this
991 location in the .plt. This is required to make function
992 pointers compare as equal between the normal executable and
993 the shared library. */
994 if (!info->shared
f5385ebf 995 && !h->def_regular)
90ace9e9
JT
996 {
997 h->root.u.def.section = s;
eea6121a 998 h->root.u.def.value = s->size;
90ace9e9
JT
999 }
1000
eea6121a 1001 h->plt.offset = s->size;
90ace9e9
JT
1002
1003 /* Make room for this entry. */
eea6121a 1004 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1005
1006 /* We also need to make an entry in the .got.plt section, which
1007 will be placed in the .got section by the linker script. */
1008
1009 s = bfd_get_section_by_name (dynobj, ".got.plt");
1010 BFD_ASSERT (s != NULL);
eea6121a 1011 s->size += 4;
90ace9e9
JT
1012
1013 /* We also need to make an entry in the .rela.plt section. */
1014
1015 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1016 BFD_ASSERT (s != NULL);
eea6121a 1017 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1018
b34976b6 1019 return TRUE;
90ace9e9
JT
1020 }
1021
1022 /* Reinitialize the plt offset now that it is not used as a reference
1023 count any more. */
1024 h->plt.offset = (bfd_vma) -1;
1025
1026 /* If this is a weak symbol, and there is a real definition, the
1027 processor independent code will have arranged for us to see the
1028 real definition first, and we can just use the same value. */
f6e332e6 1029 if (h->u.weakdef != NULL)
90ace9e9 1030 {
f6e332e6
AM
1031 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1032 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1033 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1034 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1035 return TRUE;
90ace9e9
JT
1036 }
1037
1038 /* This is a reference to a symbol defined by a dynamic object which
1039 is not a function. */
1040
1041 /* If we are creating a shared library, we must presume that the
1042 only references to the symbol are via the global offset table.
1043 For such cases we need not do anything here; the relocations will
1044 be handled correctly by relocate_section. */
1045 if (info->shared)
b34976b6 1046 return TRUE;
90ace9e9 1047
909272ee
AM
1048 if (h->size == 0)
1049 {
1050 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1051 h->root.root.string);
1052 return TRUE;
1053 }
1054
90ace9e9
JT
1055 /* We must allocate the symbol in our .dynbss section, which will
1056 become part of the .bss section of the executable. There will be
1057 an entry for this symbol in the .dynsym section. The dynamic
1058 object will contain position independent code, so all references
1059 from the dynamic object to this symbol will go through the global
1060 offset table. The dynamic linker will use the .dynsym entry to
1061 determine the address it must put in the global offset table, so
1062 both the dynamic object and the regular object will refer to the
1063 same memory location for the variable. */
1064
1065 s = bfd_get_section_by_name (dynobj, ".dynbss");
1066 BFD_ASSERT (s != NULL);
1067
1068 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1069 copy the initial value out of the dynamic object and into the
1070 runtime process image. We need to remember the offset into the
1071 .rela.bss section we are going to use. */
1072 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1073 {
1074 asection *srel;
1075
1076 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1077 BFD_ASSERT (srel != NULL);
eea6121a 1078 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1079 h->needs_copy = 1;
90ace9e9
JT
1080 }
1081
027297b7 1082 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1083}
1084
1085/* Set the sizes of the dynamic sections. */
1086
b34976b6 1087static bfd_boolean
ce71b576 1088elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1089{
1090 bfd *dynobj;
1091 asection *s;
b34976b6
AM
1092 bfd_boolean plt;
1093 bfd_boolean relocs;
1094 bfd_boolean reltext;
90ace9e9
JT
1095
1096 dynobj = elf_hash_table (info)->dynobj;
1097 BFD_ASSERT (dynobj != NULL);
1098
1099 if (elf_hash_table (info)->dynamic_sections_created)
1100 {
1101 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1102 if (info->executable)
90ace9e9
JT
1103 {
1104 s = bfd_get_section_by_name (dynobj, ".interp");
1105 BFD_ASSERT (s != NULL);
eea6121a 1106 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1107 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1108 }
1109 }
1110 else
1111 {
1112 /* We may have created entries in the .rela.got and .got sections.
1113 However, if we are not creating the dynamic sections, we will
1114 not actually use these entries. Reset the size of .rela.got
1115 and .got, which will cause it to get stripped from the output
1116 file below. */
1117 s = bfd_get_section_by_name (dynobj, ".rela.got");
1118 if (s != NULL)
eea6121a 1119 s->size = 0;
90ace9e9
JT
1120 s = bfd_get_section_by_name (dynobj, ".got.plt");
1121 if (s != NULL)
eea6121a 1122 s->size = 0;
90ace9e9
JT
1123 s = bfd_get_section_by_name (dynobj, ".got");
1124 if (s != NULL)
eea6121a 1125 s->size = 0;
90ace9e9
JT
1126 }
1127
1128 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1129 relative relocs against symbols defined in a regular object. We
1130 allocated space for them in the check_relocs routine, but we will not
1131 fill them in in the relocate_section routine. */
1132 if (info->shared && info->symbolic)
1133 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1134 elf_vax_discard_copies,
ce71b576 1135 NULL);
b29635ba 1136
b34976b6 1137 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1138 discard all the got entries we've recorded. Otherwise, we need to
1139 instantiate (allocate space for them). */
1140 elf_link_hash_traverse (elf_hash_table (info),
1141 elf_vax_instantiate_got_entries,
1142 (PTR) info);
90ace9e9
JT
1143
1144 /* The check_relocs and adjust_dynamic_symbol entry points have
1145 determined the sizes of the various dynamic sections. Allocate
1146 memory for them. */
b34976b6
AM
1147 plt = FALSE;
1148 relocs = FALSE;
1149 reltext = FALSE;
90ace9e9
JT
1150 for (s = dynobj->sections; s != NULL; s = s->next)
1151 {
1152 const char *name;
90ace9e9
JT
1153
1154 if ((s->flags & SEC_LINKER_CREATED) == 0)
1155 continue;
1156
1157 /* It's OK to base decisions on the section name, because none
1158 of the dynobj section names depend upon the input files. */
1159 name = bfd_get_section_name (dynobj, s);
1160
90ace9e9
JT
1161 if (strcmp (name, ".plt") == 0)
1162 {
c456f082
AM
1163 /* Remember whether there is a PLT. */
1164 plt = s->size != 0;
90ace9e9 1165 }
0112cd26 1166 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1167 {
c456f082 1168 if (s->size != 0)
90ace9e9
JT
1169 {
1170 asection *target;
1171
1172 /* Remember whether there are any reloc sections other
1173 than .rela.plt. */
1174 if (strcmp (name, ".rela.plt") != 0)
1175 {
1176 const char *outname;
1177
b34976b6 1178 relocs = TRUE;
90ace9e9
JT
1179
1180 /* If this relocation section applies to a read only
1181 section, then we probably need a DT_TEXTREL
1182 entry. .rela.plt is actually associated with
1183 .got.plt, which is never readonly. */
1184 outname = bfd_get_section_name (output_bfd,
1185 s->output_section);
1186 target = bfd_get_section_by_name (output_bfd, outname + 5);
1187 if (target != NULL
1188 && (target->flags & SEC_READONLY) != 0
1189 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1190 reltext = TRUE;
90ace9e9
JT
1191 }
1192
1193 /* We use the reloc_count field as a counter if we need
1194 to copy relocs into the output file. */
1195 s->reloc_count = 0;
1196 }
1197 }
0112cd26 1198 else if (! CONST_STRNEQ (name, ".got")
c456f082 1199 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1200 {
1201 /* It's not one of our sections, so don't allocate space. */
1202 continue;
1203 }
1204
c456f082 1205 if (s->size == 0)
90ace9e9 1206 {
c456f082
AM
1207 /* If we don't need this section, strip it from the
1208 output file. This is mostly to handle .rela.bss and
1209 .rela.plt. We must create both sections in
1210 create_dynamic_sections, because they must be created
1211 before the linker maps input sections to output
1212 sections. The linker does that before
1213 adjust_dynamic_symbol is called, and it is that
1214 function which decides whether anything needs to go
1215 into these sections. */
8423293d 1216 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1217 continue;
1218 }
1219
c456f082
AM
1220 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1221 continue;
1222
90ace9e9 1223 /* Allocate memory for the section contents. */
eea6121a 1224 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1225 if (s->contents == NULL)
b34976b6 1226 return FALSE;
90ace9e9
JT
1227 }
1228
1229 if (elf_hash_table (info)->dynamic_sections_created)
1230 {
1231 /* Add some entries to the .dynamic section. We fill in the
1232 values later, in elf_vax_finish_dynamic_sections, but we
1233 must add the entries now so that we get the correct size for
1234 the .dynamic section. The DT_DEBUG entry is filled in by the
1235 dynamic linker and used by the debugger. */
1236#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1237 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1238
1239 if (!info->shared)
1240 {
1241 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1242 return FALSE;
90ace9e9
JT
1243 }
1244
1245 if (plt)
1246 {
1247 if (!add_dynamic_entry (DT_PLTGOT, 0)
1248 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1249 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1250 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1251 return FALSE;
90ace9e9
JT
1252 }
1253
1254 if (relocs)
1255 {
1256 if (!add_dynamic_entry (DT_RELA, 0)
1257 || !add_dynamic_entry (DT_RELASZ, 0)
1258 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1259 return FALSE;
90ace9e9
JT
1260 }
1261
1262 if (reltext || (info->flags & DF_TEXTREL) != 0)
1263 {
1264 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1265 return FALSE;
90ace9e9
JT
1266 }
1267 }
1268#undef add_dynamic_entry
1269
b34976b6 1270 return TRUE;
90ace9e9
JT
1271}
1272
1273/* This function is called via elf_vax_link_hash_traverse if we are
1274 creating a shared object with -Bsymbolic. It discards the space
1275 allocated to copy PC relative relocs against symbols which are defined
1276 in regular objects. We allocated space for them in the check_relocs
1277 routine, but we won't fill them in in the relocate_section routine. */
1278
b34976b6 1279static bfd_boolean
ce71b576
NC
1280elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1281 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1282{
1283 struct elf_vax_pcrel_relocs_copied *s;
1284
1285 if (h->root.root.type == bfd_link_hash_warning)
1286 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1287
1288 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1289 if (!h->root.def_regular)
b34976b6 1290 return TRUE;
90ace9e9
JT
1291
1292 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1293 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1294
b34976b6 1295 return TRUE;
90ace9e9
JT
1296}
1297
b29635ba
JT
1298/* This function is called via elf_link_hash_traverse. It looks for entries
1299 that have GOT or PLT (.GOT) references. If creating a static object or a
1300 shared object with -Bsymbolic, it resets the reference count back to 0
1301 and sets the offset to -1 so normal PC32 relocation will be done. If
1302 creating a shared object or executable, space in the .got and .rela.got
1303 will be reserved for the symbol. */
1304
b34976b6 1305static bfd_boolean
ce71b576 1306elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1307{
1308 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1309 bfd *dynobj;
1310 asection *sgot;
1311 asection *srelgot;
b34976b6 1312
b29635ba
JT
1313 /* We don't care about non-GOT (and non-PLT) entries. */
1314 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1315 return TRUE;
b29635ba
JT
1316
1317 dynobj = elf_hash_table (info)->dynobj;
1318 if (dynobj == NULL)
b34976b6 1319 return TRUE;
b29635ba
JT
1320
1321 sgot = bfd_get_section_by_name (dynobj, ".got");
1322 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1323
1324 if (!elf_hash_table (info)->dynamic_sections_created
fe723c87
MT
1325 || (info->shared && info->symbolic)
1326 || h->forced_local)
b29635ba
JT
1327 {
1328 h->got.refcount = 0;
1329 h->got.offset = (bfd_vma) -1;
1330 h->plt.refcount = 0;
1331 h->plt.offset = (bfd_vma) -1;
1332 }
1333 else if (h->got.refcount > 0)
1334 {
886815b2
MR
1335 bfd_boolean dyn;
1336
b29635ba
JT
1337 /* Make sure this symbol is output as a dynamic symbol. */
1338 if (h->dynindx == -1)
1339 {
c152c796 1340 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1341 return FALSE;
b29635ba
JT
1342 }
1343
886815b2 1344 dyn = elf_hash_table (info)->dynamic_sections_created;
b29635ba 1345 /* Allocate space in the .got and .rela.got sections. */
886815b2
MR
1346 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1347 && (info->shared
1348 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1349 {
1350 sgot->size += 4;
1351 srelgot->size += sizeof (Elf32_External_Rela);
1352 }
b29635ba
JT
1353 }
1354
b34976b6 1355 return TRUE;
b29635ba
JT
1356}
1357
90ace9e9
JT
1358/* Relocate an VAX ELF section. */
1359
b34976b6 1360static bfd_boolean
ce71b576
NC
1361elf_vax_relocate_section (bfd *output_bfd,
1362 struct bfd_link_info *info,
1363 bfd *input_bfd,
1364 asection *input_section,
1365 bfd_byte *contents,
1366 Elf_Internal_Rela *relocs,
1367 Elf_Internal_Sym *local_syms,
1368 asection **local_sections)
90ace9e9
JT
1369{
1370 bfd *dynobj;
1371 Elf_Internal_Shdr *symtab_hdr;
1372 struct elf_link_hash_entry **sym_hashes;
1373 bfd_vma *local_got_offsets;
1374 bfd_vma plt_index;
1375 bfd_vma got_offset;
1376 asection *sgot;
1377 asection *splt;
1378 asection *sgotplt;
1379 asection *sreloc;
1380 Elf_Internal_Rela *rel;
1381 Elf_Internal_Rela *relend;
1382
1383 dynobj = elf_hash_table (info)->dynobj;
1384 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1385 sym_hashes = elf_sym_hashes (input_bfd);
1386 local_got_offsets = elf_local_got_offsets (input_bfd);
1387
1388 sgot = NULL;
1389 splt = NULL;
1390 sgotplt = NULL;
1391 sreloc = NULL;
1392
1393 rel = relocs;
1394 relend = relocs + input_section->reloc_count;
1395 for (; rel < relend; rel++)
1396 {
1397 int r_type;
1398 reloc_howto_type *howto;
1399 unsigned long r_symndx;
1400 struct elf_link_hash_entry *h;
1401 Elf_Internal_Sym *sym;
1402 asection *sec;
1403 bfd_vma relocation;
1404 bfd_reloc_status_type r;
1405
1406 r_type = ELF32_R_TYPE (rel->r_info);
1407 if (r_type < 0 || r_type >= (int) R_VAX_max)
1408 {
1409 bfd_set_error (bfd_error_bad_value);
b34976b6 1410 return FALSE;
90ace9e9
JT
1411 }
1412 howto = howto_table + r_type;
1413
f0fe0e16 1414 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1415 h = NULL;
1416 sym = NULL;
1417 sec = NULL;
1418 if (r_symndx < symtab_hdr->sh_info)
1419 {
1420 sym = local_syms + r_symndx;
1421 sec = local_sections[r_symndx];
8517fae7 1422 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1423 }
1424 else
1425 {
560e09e9
NC
1426 bfd_boolean unresolved_reloc;
1427 bfd_boolean warned;
1428
b2a8e766
AM
1429 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1430 r_symndx, symtab_hdr, sym_hashes,
1431 h, sec, relocation,
1432 unresolved_reloc, warned);
ce71b576 1433
560e09e9 1434 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1435 || h->root.type == bfd_link_hash_defweak)
560e09e9 1436 && ((r_type == R_VAX_PLT32
90ace9e9 1437 && h->plt.offset != (bfd_vma) -1
fe723c87 1438 && !h->forced_local
90ace9e9
JT
1439 && elf_hash_table (info)->dynamic_sections_created)
1440 || (r_type == R_VAX_GOT32
fe723c87
MT
1441 && h->got.offset != (bfd_vma) -1
1442 && !h->forced_local
90ace9e9
JT
1443 && elf_hash_table (info)->dynamic_sections_created
1444 && (! info->shared
1445 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1446 || !h->def_regular))
90ace9e9
JT
1447 || (info->shared
1448 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1449 || !h->def_regular)
90ace9e9
JT
1450 && ((input_section->flags & SEC_ALLOC) != 0
1451 /* DWARF will emit R_VAX_32 relocations in its
1452 sections against symbols defined externally
1453 in shared libraries. We can't do anything
1454 with them here. */
1455
1456 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1457 && h->def_dynamic))
90ace9e9
JT
1458 && (r_type == R_VAX_8
1459 || r_type == R_VAX_16
fe723c87 1460 || r_type == R_VAX_32))))
560e09e9
NC
1461 /* In these cases, we don't need the relocation
1462 value. We check specially because in some
1463 obscure cases sec->output_section will be NULL. */
90ace9e9 1464 relocation = 0;
90ace9e9
JT
1465 }
1466
ab96bf03
AM
1467 if (sec != NULL && elf_discarded_section (sec))
1468 {
1469 /* For relocs against symbols from removed linkonce sections,
1470 or sections discarded by a linker script, we just want the
1471 section contents zeroed. Avoid any special processing. */
1472 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1473 rel->r_info = 0;
1474 rel->r_addend = 0;
1475 continue;
1476 }
1477
1478 if (info->relocatable)
1479 continue;
1480
90ace9e9
JT
1481 switch (r_type)
1482 {
1483 case R_VAX_GOT32:
1484 /* Relocation is to the address of the entry for this symbol
1485 in the global offset table. */
7b6021f1
MR
1486 if (h == NULL
1487 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1488 || h->got.offset == (bfd_vma) -1
1489 || h->forced_local)
90ace9e9
JT
1490 break;
1491
1492 /* Relocation is the offset of the entry for this symbol in
1493 the global offset table. */
1494
1495 {
886815b2 1496 bfd_boolean dyn;
90ace9e9
JT
1497 bfd_vma off;
1498
90ace9e9
JT
1499 if (sgot == NULL)
1500 {
1501 sgot = bfd_get_section_by_name (dynobj, ".got");
1502 BFD_ASSERT (sgot != NULL);
1503 }
1504
1505 BFD_ASSERT (h != NULL);
1506 off = h->got.offset;
1507 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1508 BFD_ASSERT (off < sgot->size);
90ace9e9 1509
886815b2
MR
1510 dyn = elf_hash_table (info)->dynamic_sections_created;
1511 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
1512 || (info->shared
1513 && SYMBOL_REFERENCES_LOCAL (info, h)))
90ace9e9
JT
1514 {
1515 /* The symbol was forced to be local
1516 because of a version file.. We must initialize
1517 this entry in the global offset table. Since
1518 the offset must always be a multiple of 4, we
1519 use the least significant bit to record whether
1520 we have initialized it already.
1521
1522 When doing a dynamic link, we create a .rela.got
1523 relocation entry to initialize the value. This
1524 is done in the finish_dynamic_symbol routine. */
1525 if ((off & 1) != 0)
1526 off &= ~1;
1527 else
1528 {
1529 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1530 sgot->contents + off);
1531 h->got.offset |= 1;
1532 }
1533 } else {
1534 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1535 }
1536
1537 relocation = sgot->output_offset + off;
b29635ba 1538 /* The GOT relocation uses the addend. */
90ace9e9
JT
1539 rel->r_addend = 0;
1540
b29635ba
JT
1541 /* Change the reference to be indirect. */
1542 contents[rel->r_offset - 1] |= 0x10;
1543 relocation += sgot->output_section->vma;
90ace9e9
JT
1544 }
1545 break;
1546
04981bc1
MR
1547 case R_VAX_PC32:
1548 /* If we are creating an executable and the function this
1549 reloc refers to is in a shared lib, then we made a PLT
1550 entry for this symbol and need to handle the reloc like
1551 a PLT reloc. */
1552 if (info->shared)
1553 goto r_vax_pc32_shared;
1554 /* Fall through. */
90ace9e9
JT
1555 case R_VAX_PLT32:
1556 /* Relocation is to the entry for this symbol in the
1557 procedure linkage table. */
1558
1559 /* Resolve a PLTxx reloc against a local symbol directly,
1560 without using the procedure linkage table. */
7b6021f1
MR
1561 if (h == NULL
1562 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1563 || h->forced_local)
90ace9e9
JT
1564 break;
1565
1566 if (h->plt.offset == (bfd_vma) -1
1567 || !elf_hash_table (info)->dynamic_sections_created)
1568 {
1569 /* We didn't make a PLT entry for this symbol. This
1570 happens when statically linking PIC code, or when
1571 using -Bsymbolic. */
1572 break;
1573 }
1574
1575 if (splt == NULL)
1576 {
1577 splt = bfd_get_section_by_name (dynobj, ".plt");
1578 BFD_ASSERT (splt != NULL);
1579 }
1580
1581 if (sgotplt == NULL)
1582 {
1583 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1584 BFD_ASSERT (splt != NULL);
1585 }
1586
1587 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1588
1589 /* Get the offset into the .got table of the entry that
1590 corresponds to this function. Each .got entry is 4 bytes.
1591 The first two are reserved. */
1592 got_offset = (plt_index + 3) * 4;
1593
1594 /* We want the relocate to point into the .got.plt instead
cedb70c5 1595 of the plt itself. */
90ace9e9
JT
1596 relocation = (sgotplt->output_section->vma
1597 + sgotplt->output_offset
1598 + got_offset);
1599 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1600 if (rel->r_addend == 2)
1601 {
1602 h->plt.offset |= 1;
1603 }
1604 else if (rel->r_addend != 0)
1605 (*_bfd_error_handler)
1606 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1607 bfd_get_filename (input_bfd), rel->r_addend,
1608 h->root.root.string,
1609 bfd_get_section_name (input_bfd, input_section));
1610 rel->r_addend = 0;
1611
1612 break;
1613
1614 case R_VAX_PC8:
1615 case R_VAX_PC16:
04981bc1 1616 r_vax_pc32_shared:
7b6021f1
MR
1617 if (h == NULL
1618 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1619 || h->forced_local)
90ace9e9
JT
1620 break;
1621 /* Fall through. */
1622 case R_VAX_8:
1623 case R_VAX_16:
1624 case R_VAX_32:
1625 if (info->shared
1626 && r_symndx != 0
1627 && (input_section->flags & SEC_ALLOC) != 0
1628 && ((r_type != R_VAX_PC8
1629 && r_type != R_VAX_PC16
1630 && r_type != R_VAX_PC32)
da6bcfca
MT
1631 || ((input_section->flags & SEC_CODE)
1632 && (!info->symbolic
1633 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1634 {
1635 Elf_Internal_Rela outrel;
947216bf 1636 bfd_byte *loc;
b34976b6 1637 bfd_boolean skip, relocate;
90ace9e9
JT
1638
1639 /* When generating a shared object, these relocations
1640 are copied into the output file to be resolved at run
1641 time. */
90ace9e9
JT
1642 if (sreloc == NULL)
1643 {
83bac4b0
NC
1644 sreloc = _bfd_elf_get_dynamic_reloc_section
1645 (input_bfd, input_section, /*rela?*/ TRUE);
1646 if (sreloc == NULL)
b34976b6 1647 return FALSE;
90ace9e9
JT
1648 }
1649
b34976b6
AM
1650 skip = FALSE;
1651 relocate = FALSE;
90ace9e9
JT
1652
1653 outrel.r_offset =
1654 _bfd_elf_section_offset (output_bfd, info, input_section,
1655 rel->r_offset);
1656 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1657 skip = TRUE;
90ace9e9 1658 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1659 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1660 outrel.r_offset += (input_section->output_section->vma
1661 + input_section->output_offset);
1662
1663 if (skip)
1664 memset (&outrel, 0, sizeof outrel);
1665 /* h->dynindx may be -1 if the symbol was marked to
1666 become local. */
1667 else if (h != NULL
1668 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1669 || !h->def_regular))
90ace9e9
JT
1670 {
1671 BFD_ASSERT (h->dynindx != -1);
1672 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1673 outrel.r_addend = relocation + rel->r_addend;
1674 }
1675 else
1676 {
1677 if (r_type == R_VAX_32)
1678 {
b34976b6 1679 relocate = TRUE;
90ace9e9
JT
1680 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1681 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1682 &contents[rel->r_offset]) == 0);
1683 outrel.r_addend = relocation + rel->r_addend;
1684 }
1685 else
1686 {
1687 long indx;
1688
8517fae7 1689 if (bfd_is_abs_section (sec))
90ace9e9
JT
1690 indx = 0;
1691 else if (sec == NULL || sec->owner == NULL)
1692 {
1693 bfd_set_error (bfd_error_bad_value);
b34976b6 1694 return FALSE;
90ace9e9
JT
1695 }
1696 else
1697 {
1698 asection *osec;
1699
74541ad4
AM
1700 /* We are turning this relocation into one
1701 against a section symbol. It would be
1702 proper to subtract the symbol's value,
1703 osec->vma, from the emitted reloc addend,
1704 but ld.so expects buggy relocs. */
90ace9e9
JT
1705 osec = sec->output_section;
1706 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1707 if (indx == 0)
1708 {
1709 struct elf_link_hash_table *htab;
1710 htab = elf_hash_table (info);
1711 osec = htab->text_index_section;
1712 indx = elf_section_data (osec)->dynindx;
1713 }
1714 BFD_ASSERT (indx != 0);
90ace9e9
JT
1715 }
1716
1717 outrel.r_info = ELF32_R_INFO (indx, r_type);
1718 outrel.r_addend = relocation + rel->r_addend;
1719 }
1720 }
1721
1722 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1723 ".text") != 0 ||
90ace9e9
JT
1724 (info->shared
1725 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1726 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1727 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1728 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1729 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1730 {
1731 if (h != NULL)
1732 (*_bfd_error_handler)
1733 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1734 bfd_get_filename (input_bfd), howto->name,
1735 h->root.root.string,
1736 bfd_get_section_name (input_bfd, input_section));
1737 else
1738 (*_bfd_error_handler)
1739 (_("%s: warning: %s relocation to 0x%x from %s section"),
1740 bfd_get_filename (input_bfd), howto->name,
1741 outrel.r_addend,
1742 bfd_get_section_name (input_bfd, input_section));
1743 }
947216bf
AM
1744 loc = sreloc->contents;
1745 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1746 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1747
1748 /* This reloc will be computed at runtime, so there's no
1749 need to do anything now, except for R_VAX_32
1750 relocations that have been turned into
1751 R_VAX_RELATIVE. */
1752 if (!relocate)
1753 continue;
1754 }
1755
1756 break;
1757
1758 case R_VAX_GNU_VTINHERIT:
1759 case R_VAX_GNU_VTENTRY:
1760 /* These are no-ops in the end. */
1761 continue;
1762
1763 default:
1764 break;
1765 }
1766
b34976b6 1767 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1768 So subtract the difference from the relocation amount since we can't
1769 add it to the offset. */
90ace9e9 1770 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1771 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1772
1773 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1774 contents, rel->r_offset,
1775 relocation, rel->r_addend);
1776
1777 if (r != bfd_reloc_ok)
1778 {
1779 switch (r)
1780 {
1781 default:
1782 case bfd_reloc_outofrange:
1783 abort ();
1784 case bfd_reloc_overflow:
1785 {
1786 const char *name;
1787
1788 if (h != NULL)
dfeffb9f 1789 name = NULL;
90ace9e9
JT
1790 else
1791 {
1792 name = bfd_elf_string_from_elf_section (input_bfd,
1793 symtab_hdr->sh_link,
1794 sym->st_name);
1795 if (name == NULL)
b34976b6 1796 return FALSE;
90ace9e9
JT
1797 if (*name == '\0')
1798 name = bfd_section_name (input_bfd, sec);
1799 }
1800 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1801 (info, (h ? &h->root : NULL), name, howto->name,
1802 (bfd_vma) 0, input_bfd, input_section,
1803 rel->r_offset)))
b34976b6 1804 return FALSE;
90ace9e9
JT
1805 }
1806 break;
1807 }
1808 }
1809 }
1810
b34976b6 1811 return TRUE;
90ace9e9
JT
1812}
1813
1814/* Finish up dynamic symbol handling. We set the contents of various
1815 dynamic sections here. */
1816
b34976b6 1817static bfd_boolean
ce71b576
NC
1818elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1819 struct elf_link_hash_entry *h,
1820 Elf_Internal_Sym *sym)
90ace9e9
JT
1821{
1822 bfd *dynobj;
1823
1824 dynobj = elf_hash_table (info)->dynobj;
1825
1826 if (h->plt.offset != (bfd_vma) -1)
1827 {
1828 asection *splt;
1829 asection *sgot;
1830 asection *srela;
1831 bfd_vma plt_index;
1832 bfd_vma got_offset;
1833 bfd_vma addend;
1834 Elf_Internal_Rela rela;
947216bf 1835 bfd_byte *loc;
90ace9e9
JT
1836
1837 /* This symbol has an entry in the procedure linkage table. Set
1838 it up. */
90ace9e9
JT
1839 BFD_ASSERT (h->dynindx != -1);
1840
1841 splt = bfd_get_section_by_name (dynobj, ".plt");
1842 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1843 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1844 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1845
1846 addend = 2 * (h->plt.offset & 1);
1847 h->plt.offset &= ~1;
1848
1849 /* Get the index in the procedure linkage table which
1850 corresponds to this symbol. This is the index of this symbol
1851 in all the symbols for which we are making plt entries. The
1852 first entry in the procedure linkage table is reserved. */
1853 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1854
1855 /* Get the offset into the .got table of the entry that
1856 corresponds to this function. Each .got entry is 4 bytes.
1857 The first two are reserved. */
1858 got_offset = (plt_index + 3) * 4;
1859
1860 /* Fill in the entry in the procedure linkage table. */
1861 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1862 PLT_ENTRY_SIZE);
1863
1864 /* The offset is relative to the first extension word. */
1865 bfd_put_32 (output_bfd,
1866 -(h->plt.offset + 8),
1867 splt->contents + h->plt.offset + 4);
1868
1869 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1870 splt->contents + h->plt.offset + 8);
1871
1872 /* Fill in the entry in the global offset table. */
1873 bfd_put_32 (output_bfd,
1874 (splt->output_section->vma
1875 + splt->output_offset
1876 + h->plt.offset) + addend,
1877 sgot->contents + got_offset);
1878
1879 /* Fill in the entry in the .rela.plt section. */
1880 rela.r_offset = (sgot->output_section->vma
1881 + sgot->output_offset
1882 + got_offset);
1883 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1884 rela.r_addend = addend;
947216bf
AM
1885 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1886 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1887
f5385ebf 1888 if (!h->def_regular)
90ace9e9
JT
1889 {
1890 /* Mark the symbol as undefined, rather than as defined in
1891 the .plt section. Leave the value alone. */
1892 sym->st_shndx = SHN_UNDEF;
1893 }
1894 }
1895
1896 if (h->got.offset != (bfd_vma) -1)
1897 {
1898 asection *sgot;
1899 asection *srela;
1900 Elf_Internal_Rela rela;
947216bf 1901 bfd_byte *loc;
90ace9e9
JT
1902
1903 /* This symbol has an entry in the global offset table. Set it
1904 up. */
90ace9e9
JT
1905 sgot = bfd_get_section_by_name (dynobj, ".got");
1906 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1907 BFD_ASSERT (sgot != NULL && srela != NULL);
1908
1909 rela.r_offset = (sgot->output_section->vma
1910 + sgot->output_offset
1911 + (h->got.offset &~ 1));
1912
1913 /* If the symbol was forced to be local because of a version file
1914 locally we just want to emit a RELATIVE reloc. The entry in
1915 the global offset table will already have been initialized in
1916 the relocate_section function. */
1917 if (info->shared
1918 && h->dynindx == -1
f5385ebf 1919 && h->def_regular)
90ace9e9
JT
1920 {
1921 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1922 }
1923 else
1924 {
1925 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1926 }
1927 rela.r_addend = bfd_get_signed_32 (output_bfd,
1928 (sgot->contents
1929 + (h->got.offset & ~1)));
1930
947216bf
AM
1931 loc = srela->contents;
1932 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1933 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1934 }
1935
f5385ebf 1936 if (h->needs_copy)
90ace9e9
JT
1937 {
1938 asection *s;
1939 Elf_Internal_Rela rela;
947216bf 1940 bfd_byte *loc;
90ace9e9
JT
1941
1942 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1943 BFD_ASSERT (h->dynindx != -1
1944 && (h->root.type == bfd_link_hash_defined
1945 || h->root.type == bfd_link_hash_defweak));
1946
1947 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1948 ".rela.bss");
1949 BFD_ASSERT (s != NULL);
1950
1951 rela.r_offset = (h->root.u.def.value
1952 + h->root.u.def.section->output_section->vma
1953 + h->root.u.def.section->output_offset);
1954 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1955 rela.r_addend = 0;
947216bf
AM
1956 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1957 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1958 }
1959
1960 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1961 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1962 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1963 sym->st_shndx = SHN_ABS;
1964
b34976b6 1965 return TRUE;
90ace9e9
JT
1966}
1967
1968/* Finish up the dynamic sections. */
1969
b34976b6 1970static bfd_boolean
ce71b576 1971elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1972{
1973 bfd *dynobj;
1974 asection *sgot;
1975 asection *sdyn;
1976
1977 dynobj = elf_hash_table (info)->dynobj;
1978
1979 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1980 BFD_ASSERT (sgot != NULL);
1981 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1982
1983 if (elf_hash_table (info)->dynamic_sections_created)
1984 {
1985 asection *splt;
1986 Elf32_External_Dyn *dyncon, *dynconend;
1987
1988 splt = bfd_get_section_by_name (dynobj, ".plt");
1989 BFD_ASSERT (splt != NULL && sdyn != NULL);
1990
1991 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1992 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1993 for (; dyncon < dynconend; dyncon++)
1994 {
1995 Elf_Internal_Dyn dyn;
1996 const char *name;
1997 asection *s;
1998
1999 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2000
2001 switch (dyn.d_tag)
2002 {
2003 default:
2004 break;
2005
2006 case DT_PLTGOT:
2007 name = ".got";
2008 goto get_vma;
2009 case DT_JMPREL:
2010 name = ".rela.plt";
2011 get_vma:
2012 s = bfd_get_section_by_name (output_bfd, name);
2013 BFD_ASSERT (s != NULL);
2014 dyn.d_un.d_ptr = s->vma;
2015 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2016 break;
2017
2018 case DT_PLTRELSZ:
2019 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2020 BFD_ASSERT (s != NULL);
eea6121a 2021 dyn.d_un.d_val = s->size;
90ace9e9
JT
2022 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2023 break;
2024
2025 case DT_RELASZ:
2026 /* The procedure linkage table relocs (DT_JMPREL) should
2027 not be included in the overall relocs (DT_RELA).
2028 Therefore, we override the DT_RELASZ entry here to
2029 make it not include the JMPREL relocs. Since the
2030 linker script arranges for .rela.plt to follow all
2031 other relocation sections, we don't have to worry
2032 about changing the DT_RELA entry. */
2033 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2034 if (s != NULL)
eea6121a 2035 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2036 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2037 break;
2038 }
2039 }
2040
2041 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2042 if (splt->size > 0)
90ace9e9
JT
2043 {
2044 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2045 bfd_put_32 (output_bfd,
2046 (sgot->output_section->vma
2047 + sgot->output_offset + 4
2048 - (splt->output_section->vma + 6)),
2049 splt->contents + 2);
2050 bfd_put_32 (output_bfd,
2051 (sgot->output_section->vma
2052 + sgot->output_offset + 8
2053 - (splt->output_section->vma + 12)),
2054 splt->contents + 8);
cedb70c5 2055 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2056 = PLT_ENTRY_SIZE;
2057 }
2058 }
2059
2060 /* Fill in the first three entries in the global offset table. */
eea6121a 2061 if (sgot->size > 0)
90ace9e9
JT
2062 {
2063 if (sdyn == NULL)
2064 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2065 else
2066 bfd_put_32 (output_bfd,
2067 sdyn->output_section->vma + sdyn->output_offset,
2068 sgot->contents);
2069 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2070 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2071 }
2072
2073 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2074
b34976b6 2075 return TRUE;
90ace9e9
JT
2076}
2077
2078#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2079#define TARGET_LITTLE_NAME "elf32-vax"
2080#define ELF_MACHINE_CODE EM_VAX
2081#define ELF_MAXPAGESIZE 0x1000
2082
2083#define elf_backend_create_dynamic_sections \
2084 _bfd_elf_create_dynamic_sections
2085#define bfd_elf32_bfd_link_hash_table_create \
2086 elf_vax_link_hash_table_create
c152c796 2087#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2088
2089#define elf_backend_check_relocs elf_vax_check_relocs
2090#define elf_backend_adjust_dynamic_symbol \
2091 elf_vax_adjust_dynamic_symbol
2092#define elf_backend_size_dynamic_sections \
2093 elf_vax_size_dynamic_sections
74541ad4 2094#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2095#define elf_backend_relocate_section elf_vax_relocate_section
2096#define elf_backend_finish_dynamic_symbol \
2097 elf_vax_finish_dynamic_symbol
2098#define elf_backend_finish_dynamic_sections \
2099 elf_vax_finish_dynamic_sections
2100#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2101#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2102#define bfd_elf32_bfd_merge_private_bfd_data \
2103 elf32_vax_merge_private_bfd_data
2104#define bfd_elf32_bfd_set_private_flags \
2105 elf32_vax_set_private_flags
2106#define bfd_elf32_bfd_print_private_bfd_data \
2107 elf32_vax_print_private_bfd_data
2108
2109#define elf_backend_can_gc_sections 1
2110#define elf_backend_want_got_plt 1
2111#define elf_backend_plt_readonly 1
2112#define elf_backend_want_plt_sym 0
2113#define elf_backend_got_header_size 16
f0fe0e16 2114#define elf_backend_rela_normal 1
90ace9e9
JT
2115
2116#include "elf32-target.h"
This page took 0.527831 seconds and 4 git commands to generate.