* ld-vax-elf/export-class-call.dd: New test.
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
1d7e9d18 3 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
7686d77d 4 Free Software Foundation, Inc.
90ace9e9
JT
5 Contributed by Matt Thomas <matt@3am-software.com>.
6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
90ace9e9 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
90ace9e9 18
ae9a127f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
90ace9e9 23
90ace9e9 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
90ace9e9
JT
26#include "bfdlink.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/vax.h"
30
ce71b576
NC
31static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
32static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
34 struct bfd_hash_table *,
35 const char *);
36static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
37static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
38 asection *, const Elf_Internal_Rela *);
ce71b576
NC
39static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
40 struct elf_link_hash_entry *);
41static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
42static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
43 bfd *, asection *, bfd_byte *,
44 Elf_Internal_Rela *,
45 Elf_Internal_Sym *, asection **);
46static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
47 struct elf_link_hash_entry *,
48 Elf_Internal_Sym *);
49static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
50 struct bfd_link_info *);
6db7e006
MR
51static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
52 const arelent *);
ce71b576
NC
53
54static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
55static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
2c3fc389 56static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
57
58static reloc_howto_type howto_table[] = {
59 HOWTO (R_VAX_NONE, /* type */
60 0, /* rightshift */
61 0, /* size (0 = byte, 1 = short, 2 = long) */
62 0, /* bitsize */
b34976b6 63 FALSE, /* pc_relative */
90ace9e9
JT
64 0, /* bitpos */
65 complain_overflow_dont, /* complain_on_overflow */
66 bfd_elf_generic_reloc, /* special_function */
67 "R_VAX_NONE", /* name */
b34976b6 68 FALSE, /* partial_inplace */
90ace9e9
JT
69 0, /* src_mask */
70 0x00000000, /* dst_mask */
b34976b6 71 FALSE), /* pcrel_offset */
90ace9e9
JT
72
73 HOWTO (R_VAX_32, /* type */
74 0, /* rightshift */
75 2, /* size (0 = byte, 1 = short, 2 = long) */
76 32, /* bitsize */
b34976b6 77 FALSE, /* pc_relative */
90ace9e9
JT
78 0, /* bitpos */
79 complain_overflow_bitfield, /* complain_on_overflow */
80 bfd_elf_generic_reloc, /* special_function */
81 "R_VAX_32", /* name */
b34976b6 82 FALSE, /* partial_inplace */
90ace9e9
JT
83 0, /* src_mask */
84 0xffffffff, /* dst_mask */
b34976b6 85 FALSE), /* pcrel_offset */
90ace9e9
JT
86
87 HOWTO (R_VAX_16, /* type */
88 0, /* rightshift */
89 1, /* size (0 = byte, 1 = short, 2 = long) */
90 16, /* bitsize */
b34976b6 91 FALSE, /* pc_relative */
90ace9e9
JT
92 0, /* bitpos */
93 complain_overflow_bitfield, /* complain_on_overflow */
94 bfd_elf_generic_reloc, /* special_function */
95 "R_VAX_16", /* name */
b34976b6 96 FALSE, /* partial_inplace */
90ace9e9
JT
97 0, /* src_mask */
98 0x0000ffff, /* dst_mask */
b34976b6 99 FALSE), /* pcrel_offset */
90ace9e9
JT
100
101 HOWTO (R_VAX_8, /* type */
102 0, /* rightshift */
103 0, /* size (0 = byte, 1 = short, 2 = long) */
104 8, /* bitsize */
b34976b6 105 FALSE, /* pc_relative */
90ace9e9
JT
106 0, /* bitpos */
107 complain_overflow_bitfield, /* complain_on_overflow */
108 bfd_elf_generic_reloc, /* special_function */
109 "R_VAX_8", /* name */
b34976b6 110 FALSE, /* partial_inplace */
90ace9e9
JT
111 0, /* src_mask */
112 0x000000ff, /* dst_mask */
b34976b6 113 FALSE), /* pcrel_offset */
90ace9e9
JT
114
115 HOWTO (R_VAX_PC32, /* type */
116 0, /* rightshift */
117 2, /* size (0 = byte, 1 = short, 2 = long) */
118 32, /* bitsize */
b34976b6 119 TRUE, /* pc_relative */
90ace9e9
JT
120 0, /* bitpos */
121 complain_overflow_bitfield, /* complain_on_overflow */
122 bfd_elf_generic_reloc, /* special_function */
123 "R_VAX_PC32", /* name */
b34976b6 124 FALSE, /* partial_inplace */
90ace9e9
JT
125 0, /* src_mask */
126 0xffffffff, /* dst_mask */
b34976b6 127 TRUE), /* pcrel_offset */
90ace9e9
JT
128
129 HOWTO (R_VAX_PC16, /* type */
130 0, /* rightshift */
131 1, /* size (0 = byte, 1 = short, 2 = long) */
132 16, /* bitsize */
b34976b6 133 TRUE, /* pc_relative */
90ace9e9
JT
134 0, /* bitpos */
135 complain_overflow_signed, /* complain_on_overflow */
136 bfd_elf_generic_reloc, /* special_function */
137 "R_VAX_PC16", /* name */
b34976b6 138 FALSE, /* partial_inplace */
90ace9e9
JT
139 0, /* src_mask */
140 0x0000ffff, /* dst_mask */
b34976b6 141 TRUE), /* pcrel_offset */
90ace9e9
JT
142
143 HOWTO (R_VAX_PC8, /* type */
144 0, /* rightshift */
145 0, /* size (0 = byte, 1 = short, 2 = long) */
146 8, /* bitsize */
b34976b6 147 TRUE, /* pc_relative */
90ace9e9
JT
148 0, /* bitpos */
149 complain_overflow_signed, /* complain_on_overflow */
150 bfd_elf_generic_reloc, /* special_function */
151 "R_VAX_PC8", /* name */
b34976b6 152 FALSE, /* partial_inplace */
90ace9e9
JT
153 0, /* src_mask */
154 0x000000ff, /* dst_mask */
b34976b6 155 TRUE), /* pcrel_offset */
90ace9e9
JT
156
157 HOWTO (R_VAX_GOT32, /* type */
158 0, /* rightshift */
159 2, /* size (0 = byte, 1 = short, 2 = long) */
160 32, /* bitsize */
b34976b6 161 TRUE, /* pc_relative */
90ace9e9
JT
162 0, /* bitpos */
163 complain_overflow_bitfield, /* complain_on_overflow */
164 bfd_elf_generic_reloc, /* special_function */
165 "R_VAX_GOT32", /* name */
b34976b6 166 FALSE, /* partial_inplace */
90ace9e9
JT
167 0, /* src_mask */
168 0xffffffff, /* dst_mask */
b34976b6 169 TRUE), /* pcrel_offset */
90ace9e9
JT
170
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173 EMPTY_HOWTO (-1),
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176
177 HOWTO (R_VAX_PLT32, /* type */
178 0, /* rightshift */
179 2, /* size (0 = byte, 1 = short, 2 = long) */
180 32, /* bitsize */
b34976b6 181 TRUE, /* pc_relative */
90ace9e9
JT
182 0, /* bitpos */
183 complain_overflow_bitfield, /* complain_on_overflow */
184 bfd_elf_generic_reloc, /* special_function */
185 "R_VAX_PLT32", /* name */
b34976b6 186 FALSE, /* partial_inplace */
90ace9e9
JT
187 0, /* src_mask */
188 0xffffffff, /* dst_mask */
b34976b6 189 TRUE), /* pcrel_offset */
90ace9e9
JT
190
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193 EMPTY_HOWTO (-1),
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196
197 HOWTO (R_VAX_COPY, /* type */
198 0, /* rightshift */
199 0, /* size (0 = byte, 1 = short, 2 = long) */
200 0, /* bitsize */
b34976b6 201 FALSE, /* pc_relative */
90ace9e9
JT
202 0, /* bitpos */
203 complain_overflow_dont, /* complain_on_overflow */
204 bfd_elf_generic_reloc, /* special_function */
205 "R_VAX_COPY", /* name */
b34976b6 206 FALSE, /* partial_inplace */
90ace9e9
JT
207 0, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 FALSE), /* pcrel_offset */
90ace9e9
JT
210
211 HOWTO (R_VAX_GLOB_DAT, /* type */
212 0, /* rightshift */
213 2, /* size (0 = byte, 1 = short, 2 = long) */
214 32, /* bitsize */
b34976b6 215 FALSE, /* pc_relative */
90ace9e9
JT
216 0, /* bitpos */
217 complain_overflow_dont, /* complain_on_overflow */
218 bfd_elf_generic_reloc, /* special_function */
219 "R_VAX_GLOB_DAT", /* name */
b34976b6 220 FALSE, /* partial_inplace */
90ace9e9
JT
221 0, /* src_mask */
222 0xffffffff, /* dst_mask */
b34976b6 223 FALSE), /* pcrel_offset */
90ace9e9
JT
224
225 HOWTO (R_VAX_JMP_SLOT, /* type */
226 0, /* rightshift */
227 2, /* size (0 = byte, 1 = short, 2 = long) */
228 32, /* bitsize */
b34976b6 229 FALSE, /* pc_relative */
90ace9e9
JT
230 0, /* bitpos */
231 complain_overflow_dont, /* complain_on_overflow */
232 bfd_elf_generic_reloc, /* special_function */
233 "R_VAX_JMP_SLOT", /* name */
b34976b6 234 FALSE, /* partial_inplace */
90ace9e9
JT
235 0, /* src_mask */
236 0xffffffff, /* dst_mask */
b34976b6 237 FALSE), /* pcrel_offset */
90ace9e9
JT
238
239 HOWTO (R_VAX_RELATIVE, /* type */
240 0, /* rightshift */
241 2, /* size (0 = byte, 1 = short, 2 = long) */
242 32, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
90ace9e9
JT
244 0, /* bitpos */
245 complain_overflow_dont, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_VAX_RELATIVE", /* name */
b34976b6 248 FALSE, /* partial_inplace */
90ace9e9
JT
249 0, /* src_mask */
250 0xffffffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
90ace9e9
JT
252
253 /* GNU extension to record C++ vtable hierarchy */
254 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
255 0, /* rightshift */
256 2, /* size (0 = byte, 1 = short, 2 = long) */
257 0, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
90ace9e9
JT
259 0, /* bitpos */
260 complain_overflow_dont, /* complain_on_overflow */
261 NULL, /* special_function */
262 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 263 FALSE, /* partial_inplace */
90ace9e9
JT
264 0, /* src_mask */
265 0, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
90ace9e9
JT
267
268 /* GNU extension to record C++ vtable member usage */
269 HOWTO (R_VAX_GNU_VTENTRY, /* type */
270 0, /* rightshift */
271 2, /* size (0 = byte, 1 = short, 2 = long) */
272 0, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
90ace9e9
JT
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
277 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 278 FALSE, /* partial_inplace */
90ace9e9
JT
279 0, /* src_mask */
280 0, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
90ace9e9
JT
282};
283
284static void
ce71b576
NC
285rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
286 Elf_Internal_Rela *dst)
90ace9e9
JT
287{
288 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
289 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
290}
291
292#define elf_info_to_howto rtype_to_howto
293
294static const struct
295{
296 bfd_reloc_code_real_type bfd_val;
297 int elf_val;
298} reloc_map[] = {
299 { BFD_RELOC_NONE, R_VAX_NONE },
300 { BFD_RELOC_32, R_VAX_32 },
301 { BFD_RELOC_16, R_VAX_16 },
302 { BFD_RELOC_8, R_VAX_8 },
303 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
304 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
305 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
306 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
307 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
308 { BFD_RELOC_NONE, R_VAX_COPY },
309 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
310 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
311 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
312 { BFD_RELOC_CTOR, R_VAX_32 },
313 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
314 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
315};
316
317static reloc_howto_type *
ce71b576 318reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
319{
320 unsigned int i;
321 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
322 {
323 if (reloc_map[i].bfd_val == code)
324 return &howto_table[reloc_map[i].elf_val];
325 }
326 return 0;
327}
328
157090f7
AM
329static reloc_howto_type *
330reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
331 const char *r_name)
332{
333 unsigned int i;
334
335 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
336 if (howto_table[i].name != NULL
337 && strcasecmp (howto_table[i].name, r_name) == 0)
338 return &howto_table[i];
339
340 return NULL;
341}
342
90ace9e9 343#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 344#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
345#define ELF_ARCH bfd_arch_vax
346/* end code generated by elf.el */
90ace9e9
JT
347\f
348/* Functions for the VAX ELF linker. */
349
350/* The name of the dynamic interpreter. This is put in the .interp
351 section. */
352
353#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
354
355/* The size in bytes of an entry in the procedure linkage table. */
356
357#define PLT_ENTRY_SIZE 12
358
359/* The first entry in a procedure linkage table looks like this. See
360 the SVR4 ABI VAX supplement to see how this works. */
361
362static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
363{
364 0xdd, 0xef, /* pushl l^ */
365 0, 0, 0, 0, /* offset to .plt.got + 4 */
366 0x17, 0xff, /* jmp @L^(pc) */
367 0, 0, 0, 0, /* offset to .plt.got + 8 */
368};
369
370/* Subsequent entries in a procedure linkage table look like this. */
371
372static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
373{
6c4fb25a 374 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 375 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
376 0, 0, 0, 0, /* replaced with offset to start of .plt */
377 0, 0, 0, 0, /* index into .rela.plt */
378};
379
380/* The VAX linker needs to keep track of the number of relocs that it
381 decides to copy in check_relocs for each symbol. This is so that it
382 can discard PC relative relocs if it doesn't need them when linking
383 with -Bsymbolic. We store the information in a field extending the
384 regular ELF linker hash table. */
385
386/* This structure keeps track of the number of PC relative relocs we have
387 copied for a given symbol. */
388
389struct elf_vax_pcrel_relocs_copied
390{
391 /* Next section. */
392 struct elf_vax_pcrel_relocs_copied *next;
393 /* A section in dynobj. */
394 asection *section;
395 /* Number of relocs copied in this section. */
396 bfd_size_type count;
397};
398
399/* VAX ELF linker hash entry. */
400
401struct elf_vax_link_hash_entry
402{
403 struct elf_link_hash_entry root;
404
405 /* Number of PC relative relocs copied for this symbol. */
406 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
407
408 bfd_vma got_addend;
409};
410
90ace9e9
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576 413static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 414 void *);
90ace9e9 415
b29635ba
JT
416/* Declare this now that the above structures are defined. */
417
ce71b576 418static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 419 void *);
b29635ba 420
90ace9e9
JT
421/* Traverse an VAX ELF linker hash table. */
422
423#define elf_vax_link_hash_traverse(table, func, info) \
424 (elf_link_hash_traverse \
4dfe6ac6 425 ((table), \
2c3fc389 426 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
427 (info)))
428
90ace9e9
JT
429/* Create an entry in an VAX ELF linker hash table. */
430
431static struct bfd_hash_entry *
ce71b576
NC
432elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
433 struct bfd_hash_table *table,
434 const char *string)
90ace9e9
JT
435{
436 struct elf_vax_link_hash_entry *ret =
437 (struct elf_vax_link_hash_entry *) entry;
438
439 /* Allocate the structure if it has not already been allocated by a
440 subclass. */
ce71b576 441 if (ret == NULL)
90ace9e9
JT
442 ret = ((struct elf_vax_link_hash_entry *)
443 bfd_hash_allocate (table,
444 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 445 if (ret == NULL)
90ace9e9
JT
446 return (struct bfd_hash_entry *) ret;
447
448 /* Call the allocation method of the superclass. */
449 ret = ((struct elf_vax_link_hash_entry *)
450 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
451 table, string));
ce71b576 452 if (ret != NULL)
90ace9e9
JT
453 {
454 ret->pcrel_relocs_copied = NULL;
455 }
456
457 return (struct bfd_hash_entry *) ret;
458}
459
460/* Create an VAX ELF linker hash table. */
461
462static struct bfd_link_hash_table *
ce71b576 463elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 464{
4dfe6ac6
NC
465 struct elf_link_hash_table *ret;
466 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 467
7bf52ea2 468 ret = bfd_zmalloc (amt);
ce71b576 469 if (ret == NULL)
90ace9e9
JT
470 return NULL;
471
4dfe6ac6 472 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 473 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
474 sizeof (struct elf_vax_link_hash_entry),
475 GENERIC_ELF_DATA))
90ace9e9
JT
476 {
477 free (ret);
478 return NULL;
479 }
480
4dfe6ac6 481 return &ret->root;
90ace9e9
JT
482}
483
484/* Keep vax-specific flags in the ELF header */
b34976b6 485static bfd_boolean
ce71b576 486elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
487{
488 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
489 elf_flags_init (abfd) = TRUE;
490 return TRUE;
90ace9e9
JT
491}
492
493/* Merge backend specific data from an object file to the output
494 object file when linking. */
b34976b6 495static bfd_boolean
ce71b576 496elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9 497{
90ace9e9
JT
498 flagword in_flags;
499
500 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
501 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 502 return TRUE;
90ace9e9
JT
503
504 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
505
506 if (!elf_flags_init (obfd))
507 {
b34976b6 508 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
509 elf_elfheader (obfd)->e_flags = in_flags;
510 }
511
b34976b6 512 return TRUE;
90ace9e9
JT
513}
514
515/* Display the flags field */
b34976b6 516static bfd_boolean
2c3fc389 517elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
518{
519 FILE *file = (FILE *) ptr;
520
521 BFD_ASSERT (abfd != NULL && ptr != NULL);
522
523 /* Print normal ELF private data. */
524 _bfd_elf_print_private_bfd_data (abfd, ptr);
525
526 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
527
528 /* xgettext:c-format */
529 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
530
179d3252 531 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
532 fprintf (file, _(" [nonpic]"));
533
179d3252 534 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
535 fprintf (file, _(" [d-float]"));
536
179d3252 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
538 fprintf (file, _(" [g-float]"));
539
540 fputc ('\n', file);
541
b34976b6 542 return TRUE;
90ace9e9
JT
543}
544/* Look through the relocs for a section during the first phase, and
545 allocate space in the global offset table or procedure linkage
546 table. */
547
b34976b6 548static bfd_boolean
ce71b576
NC
549elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
550 const Elf_Internal_Rela *relocs)
90ace9e9
JT
551{
552 bfd *dynobj;
553 Elf_Internal_Shdr *symtab_hdr;
554 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
555 const Elf_Internal_Rela *rel;
556 const Elf_Internal_Rela *rel_end;
557 asection *sgot;
558 asection *srelgot;
559 asection *sreloc;
560
1049f94e 561 if (info->relocatable)
b34976b6 562 return TRUE;
90ace9e9
JT
563
564 dynobj = elf_hash_table (info)->dynobj;
565 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
566 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
567
568 sgot = NULL;
569 srelgot = NULL;
570 sreloc = NULL;
571
572 rel_end = relocs + sec->reloc_count;
573 for (rel = relocs; rel < rel_end; rel++)
574 {
575 unsigned long r_symndx;
576 struct elf_link_hash_entry *h;
577
578 r_symndx = ELF32_R_SYM (rel->r_info);
579
580 if (r_symndx < symtab_hdr->sh_info)
581 h = NULL;
582 else
973a3492
L
583 {
584 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
585 while (h->root.type == bfd_link_hash_indirect
586 || h->root.type == bfd_link_hash_warning)
587 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
588
589 /* PR15323, ref flags aren't set for references in the same
590 object. */
591 h->root.non_ir_ref = 1;
973a3492 592 }
90ace9e9
JT
593
594 switch (ELF32_R_TYPE (rel->r_info))
595 {
596 case R_VAX_GOT32:
fe723c87 597 BFD_ASSERT (h != NULL);
90ace9e9 598
7b6021f1
MR
599 /* If this is a local symbol, we resolve it directly without
600 creating a global offset table entry. */
125b5bac
MR
601 if (h->forced_local
602 || h == elf_hash_table (info)->hgot
603 || h == elf_hash_table (info)->hplt)
7b6021f1
MR
604 break;
605
90ace9e9
JT
606 /* This symbol requires a global offset table entry. */
607
608 if (dynobj == NULL)
609 {
610 /* Create the .got section. */
611 elf_hash_table (info)->dynobj = dynobj = abfd;
612 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 613 return FALSE;
90ace9e9
JT
614 }
615
616 if (sgot == NULL)
617 {
3d4d4302 618 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
619 BFD_ASSERT (sgot != NULL);
620 }
621
622 if (srelgot == NULL
623 && (h != NULL || info->shared))
624 {
3d4d4302 625 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
626 if (srelgot == NULL)
627 {
3d4d4302
AM
628 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
629 | SEC_IN_MEMORY | SEC_LINKER_CREATED
630 | SEC_READONLY);
631
632 srelgot = bfd_make_section_anyway_with_flags (dynobj,
633 ".rela.got",
634 flags);
90ace9e9 635 if (srelgot == NULL
90ace9e9 636 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 637 return FALSE;
90ace9e9
JT
638 }
639 }
640
641 if (h != NULL)
642 {
643 struct elf_vax_link_hash_entry *eh;
644
645 eh = (struct elf_vax_link_hash_entry *) h;
646 if (h->got.refcount == -1)
647 {
648 h->got.refcount = 1;
649 eh->got_addend = rel->r_addend;
90ace9e9
JT
650 }
651 else
652 {
653 h->got.refcount++;
654 if (eh->got_addend != (bfd_vma) rel->r_addend)
655 (*_bfd_error_handler)
fe723c87
MT
656 (_("%s: warning: GOT addend of %ld to `%s' does"
657 " not match previous GOT addend of %ld"),
658 bfd_get_filename (abfd), rel->r_addend,
659 h->root.root.string,
660 eh->got_addend);
cedb70c5 661
90ace9e9
JT
662 }
663 }
664 break;
665
666 case R_VAX_PLT32:
667 /* This symbol requires a procedure linkage table entry. We
668 actually build the entry in adjust_dynamic_symbol,
669 because this might be a case of linking PIC code which is
670 never referenced by a dynamic object, in which case we
671 don't need to generate a procedure linkage table entry
672 after all. */
125b5bac 673 BFD_ASSERT (h != NULL);
90ace9e9
JT
674
675 /* If this is a local symbol, we resolve it directly without
676 creating a procedure linkage table entry. */
125b5bac 677 if (h->forced_local)
fe723c87 678 break;
90ace9e9 679
f5385ebf 680 h->needs_plt = 1;
90ace9e9
JT
681 if (h->plt.refcount == -1)
682 h->plt.refcount = 1;
683 else
684 h->plt.refcount++;
685 break;
686
687 case R_VAX_PC8:
688 case R_VAX_PC16:
689 case R_VAX_PC32:
690 /* If we are creating a shared library and this is not a local
691 symbol, we need to copy the reloc into the shared library.
692 However when linking with -Bsymbolic and this is a global
693 symbol which is defined in an object we are including in the
694 link (i.e., DEF_REGULAR is set), then we can resolve the
695 reloc directly. At this point we have not seen all the input
696 files, so it is possible that DEF_REGULAR is not set now but
697 will be set later (it is never cleared). We account for that
698 possibility below by storing information in the
699 pcrel_relocs_copied field of the hash table entry. */
700 if (!(info->shared
701 && (sec->flags & SEC_ALLOC) != 0
702 && h != NULL
703 && (!info->symbolic
f5385ebf 704 || !h->def_regular)))
90ace9e9 705 {
7b6021f1
MR
706 if (h != NULL
707 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
708 && !h->forced_local)
90ace9e9
JT
709 {
710 /* Make sure a plt entry is created for this symbol if
711 it turns out to be a function defined by a dynamic
712 object. */
713 if (h->plt.refcount == -1)
714 h->plt.refcount = 1;
715 else
716 h->plt.refcount++;
717 }
718 break;
719 }
7b6021f1
MR
720 /* If this is a local symbol, we can resolve it directly. */
721 if (h != NULL
722 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
723 || h->forced_local))
fe723c87
MT
724 break;
725
90ace9e9
JT
726 /* Fall through. */
727 case R_VAX_8:
728 case R_VAX_16:
729 case R_VAX_32:
7b6021f1 730 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
731 {
732 /* Make sure a plt entry is created for this symbol if it
733 turns out to be a function defined by a dynamic object. */
734 if (h->plt.refcount == -1)
735 h->plt.refcount = 1;
736 else
737 h->plt.refcount++;
738 }
739
740 /* If we are creating a shared library, we need to copy the
741 reloc into the shared library. */
742 if (info->shared
743 && (sec->flags & SEC_ALLOC) != 0)
744 {
745 /* When creating a shared object, we must copy these
746 reloc types into the output file. We create a reloc
747 section in dynobj and make room for this reloc. */
748 if (sreloc == NULL)
749 {
83bac4b0
NC
750 sreloc = _bfd_elf_make_dynamic_reloc_section
751 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 752
83bac4b0 753 if (sreloc == NULL)
b34976b6 754 return FALSE;
90ace9e9 755
90ace9e9
JT
756 if (sec->flags & SEC_READONLY)
757 info->flags |= DF_TEXTREL;
758 }
759
eea6121a 760 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
761
762 /* If we are linking with -Bsymbolic, we count the number of
763 PC relative relocations we have entered for this symbol,
764 so that we can discard them again if the symbol is later
765 defined by a regular object. Note that this function is
19852a2a 766 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
767 which means that h is really a pointer to an
768 elf_vax_link_hash_entry. */
769 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
770 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
771 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
772 && info->symbolic)
773 {
774 struct elf_vax_link_hash_entry *eh;
775 struct elf_vax_pcrel_relocs_copied *p;
776
777 eh = (struct elf_vax_link_hash_entry *) h;
778
779 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
780 if (p->section == sreloc)
781 break;
782
783 if (p == NULL)
784 {
785 p = ((struct elf_vax_pcrel_relocs_copied *)
786 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
787 if (p == NULL)
b34976b6 788 return FALSE;
90ace9e9
JT
789 p->next = eh->pcrel_relocs_copied;
790 eh->pcrel_relocs_copied = p;
791 p->section = sreloc;
792 p->count = 0;
793 }
794
795 ++p->count;
796 }
797 }
798
799 break;
800
801 /* This relocation describes the C++ object vtable hierarchy.
802 Reconstruct it for later use during GC. */
803 case R_VAX_GNU_VTINHERIT:
c152c796 804 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 805 return FALSE;
90ace9e9
JT
806 break;
807
808 /* This relocation describes which C++ vtable entries are actually
809 used. Record for later use during GC. */
810 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
811 BFD_ASSERT (h != NULL);
812 if (h != NULL
813 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 814 return FALSE;
90ace9e9
JT
815 break;
816
817 default:
818 break;
819 }
820 }
821
b34976b6 822 return TRUE;
90ace9e9
JT
823}
824
825/* Return the section that should be marked against GC for a given
826 relocation. */
827
828static asection *
ce71b576 829elf_vax_gc_mark_hook (asection *sec,
07adf181 830 struct bfd_link_info *info,
ce71b576
NC
831 Elf_Internal_Rela *rel,
832 struct elf_link_hash_entry *h,
833 Elf_Internal_Sym *sym)
90ace9e9
JT
834{
835 if (h != NULL)
07adf181
AM
836 switch (ELF32_R_TYPE (rel->r_info))
837 {
838 case R_VAX_GNU_VTINHERIT:
839 case R_VAX_GNU_VTENTRY:
840 return NULL;
841 }
842
843 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
844}
845
846/* Update the got entry reference counts for the section being removed. */
847
b34976b6 848static bfd_boolean
ce71b576
NC
849elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
850 const Elf_Internal_Rela *relocs)
90ace9e9
JT
851{
852 Elf_Internal_Shdr *symtab_hdr;
853 struct elf_link_hash_entry **sym_hashes;
90ace9e9 854 const Elf_Internal_Rela *rel, *relend;
90ace9e9 855 bfd *dynobj;
90ace9e9 856
7dda2462
TG
857 if (info->relocatable)
858 return TRUE;
859
90ace9e9
JT
860 dynobj = elf_hash_table (info)->dynobj;
861 if (dynobj == NULL)
b34976b6 862 return TRUE;
90ace9e9 863
babfd660
KH
864 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
865 sym_hashes = elf_sym_hashes (abfd);
866
90ace9e9
JT
867 relend = relocs + sec->reloc_count;
868 for (rel = relocs; rel < relend; rel++)
869 {
babfd660 870 unsigned long r_symndx;
3eb128b2
AM
871 struct elf_link_hash_entry *h = NULL;
872
873 r_symndx = ELF32_R_SYM (rel->r_info);
874 if (r_symndx >= symtab_hdr->sh_info)
875 {
876 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
877 while (h->root.type == bfd_link_hash_indirect
878 || h->root.type == bfd_link_hash_warning)
879 h = (struct elf_link_hash_entry *) h->root.u.i.link;
880 }
babfd660 881
90ace9e9
JT
882 switch (ELF32_R_TYPE (rel->r_info))
883 {
884 case R_VAX_GOT32:
3eb128b2
AM
885 if (h != NULL && h->got.refcount > 0)
886 --h->got.refcount;
90ace9e9
JT
887 break;
888
889 case R_VAX_PLT32:
890 case R_VAX_PC8:
891 case R_VAX_PC16:
892 case R_VAX_PC32:
893 case R_VAX_8:
894 case R_VAX_16:
895 case R_VAX_32:
3eb128b2
AM
896 if (h != NULL && h->plt.refcount > 0)
897 --h->plt.refcount;
90ace9e9
JT
898 break;
899
900 default:
901 break;
902 }
903 }
904
b34976b6 905 return TRUE;
90ace9e9
JT
906}
907
908/* Adjust a symbol defined by a dynamic object and referenced by a
909 regular object. The current definition is in some section of the
910 dynamic object, but we're not including those sections. We have to
911 change the definition to something the rest of the link can
912 understand. */
913
b34976b6 914static bfd_boolean
a0f0eb1e
MR
915elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
916 struct elf_link_hash_entry *h)
90ace9e9
JT
917{
918 bfd *dynobj;
919 asection *s;
90ace9e9
JT
920
921 dynobj = elf_hash_table (info)->dynobj;
922
923 /* Make sure we know what is going on here. */
924 BFD_ASSERT (dynobj != NULL
f5385ebf 925 && (h->needs_plt
f6e332e6 926 || h->u.weakdef != NULL
f5385ebf
AM
927 || (h->def_dynamic
928 && h->ref_regular
929 && !h->def_regular)));
90ace9e9
JT
930
931 /* If this is a function, put it in the procedure linkage table. We
932 will fill in the contents of the procedure linkage table later,
933 when we know the address of the .got section. */
934 if (h->type == STT_FUNC
f5385ebf 935 || h->needs_plt)
90ace9e9 936 {
a22a8039
MR
937 if (h->plt.refcount <= 0
938 || SYMBOL_CALLS_LOCAL (info, h)
939 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
940 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
941 {
942 /* This case can occur if we saw a PLTxx reloc in an input
943 file, but the symbol was never referred to by a dynamic
a22a8039
MR
944 object, or if all references were garbage collected. In
945 such a case, we don't actually need to build a procedure
946 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 947 h->plt.offset = (bfd_vma) -1;
f5385ebf 948 h->needs_plt = 0;
b34976b6 949 return TRUE;
90ace9e9
JT
950 }
951
3d4d4302 952 s = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
953 BFD_ASSERT (s != NULL);
954
955 /* If this is the first .plt entry, make room for the special
956 first entry. */
eea6121a 957 if (s->size == 0)
90ace9e9 958 {
eea6121a 959 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
960 }
961
962 /* If this symbol is not defined in a regular file, and we are
963 not generating a shared library, then set the symbol to this
964 location in the .plt. This is required to make function
965 pointers compare as equal between the normal executable and
966 the shared library. */
967 if (!info->shared
f5385ebf 968 && !h->def_regular)
90ace9e9
JT
969 {
970 h->root.u.def.section = s;
eea6121a 971 h->root.u.def.value = s->size;
90ace9e9
JT
972 }
973
eea6121a 974 h->plt.offset = s->size;
90ace9e9
JT
975
976 /* Make room for this entry. */
eea6121a 977 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
978
979 /* We also need to make an entry in the .got.plt section, which
980 will be placed in the .got section by the linker script. */
981
3d4d4302 982 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 983 BFD_ASSERT (s != NULL);
eea6121a 984 s->size += 4;
90ace9e9
JT
985
986 /* We also need to make an entry in the .rela.plt section. */
987
3d4d4302 988 s = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9 989 BFD_ASSERT (s != NULL);
eea6121a 990 s->size += sizeof (Elf32_External_Rela);
90ace9e9 991
b34976b6 992 return TRUE;
90ace9e9
JT
993 }
994
995 /* Reinitialize the plt offset now that it is not used as a reference
996 count any more. */
997 h->plt.offset = (bfd_vma) -1;
998
999 /* If this is a weak symbol, and there is a real definition, the
1000 processor independent code will have arranged for us to see the
1001 real definition first, and we can just use the same value. */
f6e332e6 1002 if (h->u.weakdef != NULL)
90ace9e9 1003 {
f6e332e6
AM
1004 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1005 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1006 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1007 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1008 return TRUE;
90ace9e9
JT
1009 }
1010
1011 /* This is a reference to a symbol defined by a dynamic object which
1012 is not a function. */
1013
1014 /* If we are creating a shared library, we must presume that the
1015 only references to the symbol are via the global offset table.
1016 For such cases we need not do anything here; the relocations will
1017 be handled correctly by relocate_section. */
1018 if (info->shared)
b34976b6 1019 return TRUE;
90ace9e9
JT
1020
1021 /* We must allocate the symbol in our .dynbss section, which will
1022 become part of the .bss section of the executable. There will be
1023 an entry for this symbol in the .dynsym section. The dynamic
1024 object will contain position independent code, so all references
1025 from the dynamic object to this symbol will go through the global
1026 offset table. The dynamic linker will use the .dynsym entry to
1027 determine the address it must put in the global offset table, so
1028 both the dynamic object and the regular object will refer to the
1029 same memory location for the variable. */
1030
3d4d4302 1031 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
1032 BFD_ASSERT (s != NULL);
1033
1034 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1035 copy the initial value out of the dynamic object and into the
1036 runtime process image. We need to remember the offset into the
1037 .rela.bss section we are going to use. */
1d7e9d18 1038 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
1039 {
1040 asection *srel;
1041
3d4d4302 1042 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 1043 BFD_ASSERT (srel != NULL);
eea6121a 1044 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1045 h->needs_copy = 1;
90ace9e9
JT
1046 }
1047
027297b7 1048 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1049}
1050
fac3d241
MR
1051/* This function is called via elf_link_hash_traverse. It resets GOT
1052 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
1053 will be done. */
1054
1055static bfd_boolean
1056elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
1057 void *infoptr ATTRIBUTE_UNUSED)
1058{
1059 h->got.refcount = -1;
1060 h->plt.refcount = -1;
1061
1062 return TRUE;
1063}
1064
1065/* Discard unused dynamic data if this is a static link. */
1066
1067static bfd_boolean
1068elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1069 struct bfd_link_info *info)
1070{
1071 bfd *dynobj;
1072 asection *s;
1073
1074 dynobj = elf_hash_table (info)->dynobj;
1075
1076 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
1077 {
1078 /* We may have created entries in the .rela.got and .got sections.
1079 However, if we are not creating the dynamic sections, we will
1080 not actually use these entries. Reset the size of .rela.got
49d01bf6 1081 and .got, which will cause them to get stripped from the output
fac3d241
MR
1082 file below. */
1083 s = bfd_get_linker_section (dynobj, ".rela.got");
1084 if (s != NULL)
1085 s->size = 0;
1086 s = bfd_get_linker_section (dynobj, ".got.plt");
1087 if (s != NULL)
1088 s->size = 0;
1089 s = bfd_get_linker_section (dynobj, ".got");
1090 if (s != NULL)
1091 s->size = 0;
1092 }
1093
1094 /* If this is a static link, we need to discard all the got entries we've
1095 recorded. */
1096 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1097 elf_link_hash_traverse (elf_hash_table (info),
1098 elf_vax_discard_got_entries,
1099 info);
1100
1101 return TRUE;
1102}
1103
90ace9e9
JT
1104/* Set the sizes of the dynamic sections. */
1105
b34976b6 1106static bfd_boolean
ce71b576 1107elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1108{
1109 bfd *dynobj;
1110 asection *s;
b34976b6
AM
1111 bfd_boolean plt;
1112 bfd_boolean relocs;
1113 bfd_boolean reltext;
90ace9e9
JT
1114
1115 dynobj = elf_hash_table (info)->dynobj;
1116 BFD_ASSERT (dynobj != NULL);
1117
1118 if (elf_hash_table (info)->dynamic_sections_created)
1119 {
1120 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1121 if (info->executable)
90ace9e9 1122 {
3d4d4302 1123 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1124 BFD_ASSERT (s != NULL);
eea6121a 1125 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1126 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1127 }
1128 }
90ace9e9
JT
1129
1130 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1131 relative relocs against symbols defined in a regular object. We
1132 allocated space for them in the check_relocs routine, but we will not
1133 fill them in in the relocate_section routine. */
1134 if (info->shared && info->symbolic)
4dfe6ac6 1135 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1136 elf_vax_discard_copies,
ce71b576 1137 NULL);
b29635ba 1138
fac3d241
MR
1139 /* If this is a -Bsymbolic shared link, we need to discard all the got
1140 entries we've recorded. Otherwise, we need to instantiate (allocate
1141 space for them). */
b29635ba
JT
1142 elf_link_hash_traverse (elf_hash_table (info),
1143 elf_vax_instantiate_got_entries,
2c3fc389 1144 info);
90ace9e9
JT
1145
1146 /* The check_relocs and adjust_dynamic_symbol entry points have
1147 determined the sizes of the various dynamic sections. Allocate
1148 memory for them. */
b34976b6
AM
1149 plt = FALSE;
1150 relocs = FALSE;
1151 reltext = FALSE;
90ace9e9
JT
1152 for (s = dynobj->sections; s != NULL; s = s->next)
1153 {
1154 const char *name;
90ace9e9
JT
1155
1156 if ((s->flags & SEC_LINKER_CREATED) == 0)
1157 continue;
1158
1159 /* It's OK to base decisions on the section name, because none
1160 of the dynobj section names depend upon the input files. */
1161 name = bfd_get_section_name (dynobj, s);
1162
90ace9e9
JT
1163 if (strcmp (name, ".plt") == 0)
1164 {
c456f082
AM
1165 /* Remember whether there is a PLT. */
1166 plt = s->size != 0;
90ace9e9 1167 }
0112cd26 1168 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1169 {
c456f082 1170 if (s->size != 0)
90ace9e9
JT
1171 {
1172 asection *target;
1173
1174 /* Remember whether there are any reloc sections other
1175 than .rela.plt. */
1176 if (strcmp (name, ".rela.plt") != 0)
1177 {
1178 const char *outname;
1179
b34976b6 1180 relocs = TRUE;
90ace9e9
JT
1181
1182 /* If this relocation section applies to a read only
1183 section, then we probably need a DT_TEXTREL
1184 entry. .rela.plt is actually associated with
1185 .got.plt, which is never readonly. */
1186 outname = bfd_get_section_name (output_bfd,
1187 s->output_section);
1188 target = bfd_get_section_by_name (output_bfd, outname + 5);
1189 if (target != NULL
1190 && (target->flags & SEC_READONLY) != 0
1191 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1192 reltext = TRUE;
90ace9e9
JT
1193 }
1194
1195 /* We use the reloc_count field as a counter if we need
1196 to copy relocs into the output file. */
1197 s->reloc_count = 0;
1198 }
1199 }
0112cd26 1200 else if (! CONST_STRNEQ (name, ".got")
c456f082 1201 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1202 {
1203 /* It's not one of our sections, so don't allocate space. */
1204 continue;
1205 }
1206
c456f082 1207 if (s->size == 0)
90ace9e9 1208 {
c456f082
AM
1209 /* If we don't need this section, strip it from the
1210 output file. This is mostly to handle .rela.bss and
1211 .rela.plt. We must create both sections in
1212 create_dynamic_sections, because they must be created
1213 before the linker maps input sections to output
1214 sections. The linker does that before
1215 adjust_dynamic_symbol is called, and it is that
1216 function which decides whether anything needs to go
1217 into these sections. */
8423293d 1218 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1219 continue;
1220 }
1221
c456f082
AM
1222 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1223 continue;
1224
90ace9e9 1225 /* Allocate memory for the section contents. */
eea6121a 1226 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1227 if (s->contents == NULL)
b34976b6 1228 return FALSE;
90ace9e9
JT
1229 }
1230
1231 if (elf_hash_table (info)->dynamic_sections_created)
1232 {
1233 /* Add some entries to the .dynamic section. We fill in the
1234 values later, in elf_vax_finish_dynamic_sections, but we
1235 must add the entries now so that we get the correct size for
1236 the .dynamic section. The DT_DEBUG entry is filled in by the
1237 dynamic linker and used by the debugger. */
1238#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1239 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1240
1241 if (!info->shared)
1242 {
1243 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1244 return FALSE;
90ace9e9
JT
1245 }
1246
1247 if (plt)
1248 {
1249 if (!add_dynamic_entry (DT_PLTGOT, 0)
1250 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1251 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1252 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1253 return FALSE;
90ace9e9
JT
1254 }
1255
1256 if (relocs)
1257 {
1258 if (!add_dynamic_entry (DT_RELA, 0)
1259 || !add_dynamic_entry (DT_RELASZ, 0)
1260 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1261 return FALSE;
90ace9e9
JT
1262 }
1263
1264 if (reltext || (info->flags & DF_TEXTREL) != 0)
1265 {
1266 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1267 return FALSE;
90ace9e9
JT
1268 }
1269 }
1270#undef add_dynamic_entry
1271
b34976b6 1272 return TRUE;
90ace9e9
JT
1273}
1274
1275/* This function is called via elf_vax_link_hash_traverse if we are
1276 creating a shared object with -Bsymbolic. It discards the space
1277 allocated to copy PC relative relocs against symbols which are defined
1278 in regular objects. We allocated space for them in the check_relocs
1279 routine, but we won't fill them in in the relocate_section routine. */
1280
b34976b6 1281static bfd_boolean
ce71b576 1282elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1283 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1284{
1285 struct elf_vax_pcrel_relocs_copied *s;
1286
90ace9e9 1287 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1288 if (!h->root.def_regular)
b34976b6 1289 return TRUE;
90ace9e9
JT
1290
1291 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1292 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1293
b34976b6 1294 return TRUE;
90ace9e9
JT
1295}
1296
fac3d241
MR
1297/* This function is called via elf_link_hash_traverse. It looks for
1298 entries that have GOT or PLT (.GOT) references. If creating a shared
1299 object with -Bsymbolic, or the symbol has been forced local, then it
1300 resets the reference count back to -1 so normal PC32 relocation will
1301 be done. Otherwise space in the .got and .rela.got will be reserved
1302 for the symbol. */
b29635ba 1303
b34976b6 1304static bfd_boolean
2c3fc389 1305elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1306{
1307 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1308 bfd *dynobj;
1309 asection *sgot;
1310 asection *srelgot;
b34976b6 1311
b29635ba
JT
1312 /* We don't care about non-GOT (and non-PLT) entries. */
1313 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1314 return TRUE;
b29635ba
JT
1315
1316 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1317 BFD_ASSERT (dynobj != NULL);
b29635ba 1318
3d4d4302
AM
1319 sgot = bfd_get_linker_section (dynobj, ".got");
1320 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
b29635ba 1321
125b5bac 1322 if (SYMBOL_REFERENCES_LOCAL (info, h))
b29635ba 1323 {
8be65dd3
MR
1324 h->got.refcount = -1;
1325 h->plt.refcount = -1;
b29635ba
JT
1326 }
1327 else if (h->got.refcount > 0)
1328 {
1329 /* Make sure this symbol is output as a dynamic symbol. */
1330 if (h->dynindx == -1)
1331 {
c152c796 1332 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1333 return FALSE;
b29635ba
JT
1334 }
1335
1336 /* Allocate space in the .got and .rela.got sections. */
125b5bac
MR
1337 sgot->size += 4;
1338 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1339 }
1340
b34976b6 1341 return TRUE;
b29635ba
JT
1342}
1343
90ace9e9
JT
1344/* Relocate an VAX ELF section. */
1345
b34976b6 1346static bfd_boolean
ce71b576
NC
1347elf_vax_relocate_section (bfd *output_bfd,
1348 struct bfd_link_info *info,
1349 bfd *input_bfd,
1350 asection *input_section,
1351 bfd_byte *contents,
1352 Elf_Internal_Rela *relocs,
1353 Elf_Internal_Sym *local_syms,
1354 asection **local_sections)
90ace9e9
JT
1355{
1356 bfd *dynobj;
1357 Elf_Internal_Shdr *symtab_hdr;
1358 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1359 bfd_vma plt_index;
1360 bfd_vma got_offset;
1361 asection *sgot;
1362 asection *splt;
1363 asection *sgotplt;
1364 asection *sreloc;
1365 Elf_Internal_Rela *rel;
1366 Elf_Internal_Rela *relend;
1367
1368 dynobj = elf_hash_table (info)->dynobj;
1369 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1370 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1371
1372 sgot = NULL;
1373 splt = NULL;
1374 sgotplt = NULL;
1375 sreloc = NULL;
1376
1377 rel = relocs;
1378 relend = relocs + input_section->reloc_count;
1379 for (; rel < relend; rel++)
1380 {
1381 int r_type;
1382 reloc_howto_type *howto;
1383 unsigned long r_symndx;
1384 struct elf_link_hash_entry *h;
1385 Elf_Internal_Sym *sym;
1386 asection *sec;
1387 bfd_vma relocation;
1388 bfd_reloc_status_type r;
1389
1390 r_type = ELF32_R_TYPE (rel->r_info);
1391 if (r_type < 0 || r_type >= (int) R_VAX_max)
1392 {
1393 bfd_set_error (bfd_error_bad_value);
b34976b6 1394 return FALSE;
90ace9e9
JT
1395 }
1396 howto = howto_table + r_type;
1397
f0fe0e16 1398 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1399 h = NULL;
1400 sym = NULL;
1401 sec = NULL;
1402 if (r_symndx < symtab_hdr->sh_info)
1403 {
1404 sym = local_syms + r_symndx;
1405 sec = local_sections[r_symndx];
8517fae7 1406 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1407 }
1408 else
1409 {
560e09e9
NC
1410 bfd_boolean unresolved_reloc;
1411 bfd_boolean warned;
1412
b2a8e766
AM
1413 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1414 r_symndx, symtab_hdr, sym_hashes,
1415 h, sec, relocation,
1416 unresolved_reloc, warned);
ce71b576 1417
560e09e9 1418 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1419 || h->root.type == bfd_link_hash_defweak)
560e09e9 1420 && ((r_type == R_VAX_PLT32
90ace9e9 1421 && h->plt.offset != (bfd_vma) -1
fe723c87 1422 && !h->forced_local
90ace9e9
JT
1423 && elf_hash_table (info)->dynamic_sections_created)
1424 || (r_type == R_VAX_GOT32
fe723c87
MT
1425 && h->got.offset != (bfd_vma) -1
1426 && !h->forced_local
90ace9e9
JT
1427 && elf_hash_table (info)->dynamic_sections_created
1428 && (! info->shared
1429 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1430 || !h->def_regular))
90ace9e9
JT
1431 || (info->shared
1432 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1433 || !h->def_regular)
90ace9e9
JT
1434 && ((input_section->flags & SEC_ALLOC) != 0
1435 /* DWARF will emit R_VAX_32 relocations in its
1436 sections against symbols defined externally
1437 in shared libraries. We can't do anything
1438 with them here. */
1439
1440 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1441 && h->def_dynamic))
90ace9e9
JT
1442 && (r_type == R_VAX_8
1443 || r_type == R_VAX_16
fe723c87 1444 || r_type == R_VAX_32))))
560e09e9
NC
1445 /* In these cases, we don't need the relocation
1446 value. We check specially because in some
1447 obscure cases sec->output_section will be NULL. */
90ace9e9 1448 relocation = 0;
90ace9e9
JT
1449 }
1450
dbaa2011 1451 if (sec != NULL && discarded_section (sec))
e4067dbb 1452 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1453 rel, 1, relend, howto, 0, contents);
ab96bf03
AM
1454
1455 if (info->relocatable)
1456 continue;
1457
90ace9e9
JT
1458 switch (r_type)
1459 {
1460 case R_VAX_GOT32:
1461 /* Relocation is to the address of the entry for this symbol
1462 in the global offset table. */
125b5bac
MR
1463
1464 /* Resolve a GOTxx reloc against a local symbol directly,
1465 without using the global offset table. */
7b6021f1 1466 if (h == NULL
125b5bac 1467 || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1468 break;
1469
90ace9e9
JT
1470 {
1471 bfd_vma off;
1472
90ace9e9
JT
1473 if (sgot == NULL)
1474 {
3d4d4302 1475 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
1476 BFD_ASSERT (sgot != NULL);
1477 }
1478
90ace9e9 1479 off = h->got.offset;
eea6121a 1480 BFD_ASSERT (off < sgot->size);
90ace9e9 1481
125b5bac 1482 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
90ace9e9
JT
1483
1484 relocation = sgot->output_offset + off;
b29635ba 1485 /* The GOT relocation uses the addend. */
90ace9e9
JT
1486 rel->r_addend = 0;
1487
b29635ba
JT
1488 /* Change the reference to be indirect. */
1489 contents[rel->r_offset - 1] |= 0x10;
1490 relocation += sgot->output_section->vma;
90ace9e9
JT
1491 }
1492 break;
1493
04981bc1
MR
1494 case R_VAX_PC32:
1495 /* If we are creating an executable and the function this
1496 reloc refers to is in a shared lib, then we made a PLT
1497 entry for this symbol and need to handle the reloc like
1498 a PLT reloc. */
1499 if (info->shared)
1500 goto r_vax_pc32_shared;
1501 /* Fall through. */
90ace9e9
JT
1502 case R_VAX_PLT32:
1503 /* Relocation is to the entry for this symbol in the
1504 procedure linkage table. */
1505
1506 /* Resolve a PLTxx reloc against a local symbol directly,
1507 without using the procedure linkage table. */
7b6021f1 1508 if (h == NULL
125b5bac 1509 || h->plt.offset == (bfd_vma) -1)
90ace9e9
JT
1510 break;
1511
90ace9e9
JT
1512 if (splt == NULL)
1513 {
3d4d4302 1514 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1515 BFD_ASSERT (splt != NULL);
1516 }
1517
1518 if (sgotplt == NULL)
1519 {
3d4d4302 1520 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
d76b263e 1521 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1522 }
1523
1524 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1525
1526 /* Get the offset into the .got table of the entry that
1527 corresponds to this function. Each .got entry is 4 bytes.
1528 The first two are reserved. */
1529 got_offset = (plt_index + 3) * 4;
1530
9e86195c 1531 /* We want the relocation to point into the .got.plt instead
cedb70c5 1532 of the plt itself. */
90ace9e9
JT
1533 relocation = (sgotplt->output_section->vma
1534 + sgotplt->output_offset
1535 + got_offset);
1536 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1537 if (rel->r_addend == 2)
1538 {
1539 h->plt.offset |= 1;
1540 }
1541 else if (rel->r_addend != 0)
1542 (*_bfd_error_handler)
1543 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1544 bfd_get_filename (input_bfd), rel->r_addend,
1545 h->root.root.string,
1546 bfd_get_section_name (input_bfd, input_section));
1547 rel->r_addend = 0;
1548
1549 break;
1550
1551 case R_VAX_PC8:
1552 case R_VAX_PC16:
04981bc1 1553 r_vax_pc32_shared:
7b6021f1
MR
1554 if (h == NULL
1555 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1556 || h->forced_local)
90ace9e9
JT
1557 break;
1558 /* Fall through. */
1559 case R_VAX_8:
1560 case R_VAX_16:
1561 case R_VAX_32:
1562 if (info->shared
cf35638d 1563 && r_symndx != STN_UNDEF
90ace9e9
JT
1564 && (input_section->flags & SEC_ALLOC) != 0
1565 && ((r_type != R_VAX_PC8
1566 && r_type != R_VAX_PC16
1567 && r_type != R_VAX_PC32)
da6bcfca
MT
1568 || ((input_section->flags & SEC_CODE)
1569 && (!info->symbolic
1570 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1571 {
1572 Elf_Internal_Rela outrel;
947216bf 1573 bfd_byte *loc;
b34976b6 1574 bfd_boolean skip, relocate;
90ace9e9
JT
1575
1576 /* When generating a shared object, these relocations
1577 are copied into the output file to be resolved at run
1578 time. */
90ace9e9
JT
1579 if (sreloc == NULL)
1580 {
83bac4b0
NC
1581 sreloc = _bfd_elf_get_dynamic_reloc_section
1582 (input_bfd, input_section, /*rela?*/ TRUE);
1583 if (sreloc == NULL)
b34976b6 1584 return FALSE;
90ace9e9
JT
1585 }
1586
b34976b6
AM
1587 skip = FALSE;
1588 relocate = FALSE;
90ace9e9
JT
1589
1590 outrel.r_offset =
1591 _bfd_elf_section_offset (output_bfd, info, input_section,
1592 rel->r_offset);
1593 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1594 skip = TRUE;
90ace9e9 1595 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1596 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1597 outrel.r_offset += (input_section->output_section->vma
1598 + input_section->output_offset);
1599
1600 if (skip)
1601 memset (&outrel, 0, sizeof outrel);
1602 /* h->dynindx may be -1 if the symbol was marked to
1603 become local. */
1604 else if (h != NULL
1605 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1606 || !h->def_regular))
90ace9e9
JT
1607 {
1608 BFD_ASSERT (h->dynindx != -1);
1609 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1610 outrel.r_addend = relocation + rel->r_addend;
1611 }
1612 else
1613 {
1614 if (r_type == R_VAX_32)
1615 {
b34976b6 1616 relocate = TRUE;
90ace9e9
JT
1617 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1618 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1619 &contents[rel->r_offset]) == 0);
1620 outrel.r_addend = relocation + rel->r_addend;
1621 }
1622 else
1623 {
1624 long indx;
1625
8517fae7 1626 if (bfd_is_abs_section (sec))
90ace9e9
JT
1627 indx = 0;
1628 else if (sec == NULL || sec->owner == NULL)
1629 {
1630 bfd_set_error (bfd_error_bad_value);
b34976b6 1631 return FALSE;
90ace9e9
JT
1632 }
1633 else
1634 {
1635 asection *osec;
1636
74541ad4
AM
1637 /* We are turning this relocation into one
1638 against a section symbol. It would be
1639 proper to subtract the symbol's value,
1640 osec->vma, from the emitted reloc addend,
1641 but ld.so expects buggy relocs. */
90ace9e9
JT
1642 osec = sec->output_section;
1643 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1644 if (indx == 0)
1645 {
1646 struct elf_link_hash_table *htab;
1647 htab = elf_hash_table (info);
1648 osec = htab->text_index_section;
1649 indx = elf_section_data (osec)->dynindx;
1650 }
1651 BFD_ASSERT (indx != 0);
90ace9e9
JT
1652 }
1653
1654 outrel.r_info = ELF32_R_INFO (indx, r_type);
1655 outrel.r_addend = relocation + rel->r_addend;
1656 }
1657 }
1658
ddd74d3c 1659 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1660 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1661 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1662 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1663 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1664 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1665 {
1666 if (h != NULL)
1667 (*_bfd_error_handler)
1668 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1669 bfd_get_filename (input_bfd), howto->name,
1670 h->root.root.string,
1671 bfd_get_section_name (input_bfd, input_section));
1672 else
1673 (*_bfd_error_handler)
1674 (_("%s: warning: %s relocation to 0x%x from %s section"),
1675 bfd_get_filename (input_bfd), howto->name,
1676 outrel.r_addend,
1677 bfd_get_section_name (input_bfd, input_section));
1678 }
947216bf
AM
1679 loc = sreloc->contents;
1680 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1681 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1682
1683 /* This reloc will be computed at runtime, so there's no
1684 need to do anything now, except for R_VAX_32
1685 relocations that have been turned into
1686 R_VAX_RELATIVE. */
1687 if (!relocate)
1688 continue;
1689 }
1690
1691 break;
1692
1693 case R_VAX_GNU_VTINHERIT:
1694 case R_VAX_GNU_VTENTRY:
1695 /* These are no-ops in the end. */
1696 continue;
1697
1698 default:
1699 break;
1700 }
1701
b34976b6 1702 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1703 So subtract the difference from the relocation amount since we can't
1704 add it to the offset. */
90ace9e9 1705 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1706 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1707
1708 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1709 contents, rel->r_offset,
1710 relocation, rel->r_addend);
1711
1712 if (r != bfd_reloc_ok)
1713 {
1714 switch (r)
1715 {
1716 default:
1717 case bfd_reloc_outofrange:
1718 abort ();
1719 case bfd_reloc_overflow:
1720 {
1721 const char *name;
1722
1723 if (h != NULL)
dfeffb9f 1724 name = NULL;
90ace9e9
JT
1725 else
1726 {
1727 name = bfd_elf_string_from_elf_section (input_bfd,
1728 symtab_hdr->sh_link,
1729 sym->st_name);
1730 if (name == NULL)
b34976b6 1731 return FALSE;
90ace9e9
JT
1732 if (*name == '\0')
1733 name = bfd_section_name (input_bfd, sec);
1734 }
1735 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1736 (info, (h ? &h->root : NULL), name, howto->name,
1737 (bfd_vma) 0, input_bfd, input_section,
1738 rel->r_offset)))
b34976b6 1739 return FALSE;
90ace9e9
JT
1740 }
1741 break;
1742 }
1743 }
1744 }
1745
b34976b6 1746 return TRUE;
90ace9e9
JT
1747}
1748
1749/* Finish up dynamic symbol handling. We set the contents of various
1750 dynamic sections here. */
1751
b34976b6 1752static bfd_boolean
ce71b576
NC
1753elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1754 struct elf_link_hash_entry *h,
1755 Elf_Internal_Sym *sym)
90ace9e9
JT
1756{
1757 bfd *dynobj;
1758
1759 dynobj = elf_hash_table (info)->dynobj;
1760
1761 if (h->plt.offset != (bfd_vma) -1)
1762 {
1763 asection *splt;
1764 asection *sgot;
1765 asection *srela;
1766 bfd_vma plt_index;
1767 bfd_vma got_offset;
1768 bfd_vma addend;
1769 Elf_Internal_Rela rela;
947216bf 1770 bfd_byte *loc;
90ace9e9
JT
1771
1772 /* This symbol has an entry in the procedure linkage table. Set
1773 it up. */
90ace9e9
JT
1774 BFD_ASSERT (h->dynindx != -1);
1775
3d4d4302
AM
1776 splt = bfd_get_linker_section (dynobj, ".plt");
1777 sgot = bfd_get_linker_section (dynobj, ".got.plt");
1778 srela = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9
JT
1779 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1780
1781 addend = 2 * (h->plt.offset & 1);
1782 h->plt.offset &= ~1;
1783
1784 /* Get the index in the procedure linkage table which
1785 corresponds to this symbol. This is the index of this symbol
1786 in all the symbols for which we are making plt entries. The
1787 first entry in the procedure linkage table is reserved. */
1788 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1789
1790 /* Get the offset into the .got table of the entry that
1791 corresponds to this function. Each .got entry is 4 bytes.
1792 The first two are reserved. */
1793 got_offset = (plt_index + 3) * 4;
1794
1795 /* Fill in the entry in the procedure linkage table. */
1796 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1797 PLT_ENTRY_SIZE);
1798
1799 /* The offset is relative to the first extension word. */
1800 bfd_put_32 (output_bfd,
1801 -(h->plt.offset + 8),
1802 splt->contents + h->plt.offset + 4);
1803
1804 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1805 splt->contents + h->plt.offset + 8);
1806
1807 /* Fill in the entry in the global offset table. */
1808 bfd_put_32 (output_bfd,
1809 (splt->output_section->vma
1810 + splt->output_offset
1811 + h->plt.offset) + addend,
1812 sgot->contents + got_offset);
1813
1814 /* Fill in the entry in the .rela.plt section. */
1815 rela.r_offset = (sgot->output_section->vma
1816 + sgot->output_offset
1817 + got_offset);
1818 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1819 rela.r_addend = addend;
947216bf
AM
1820 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1821 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1822
f5385ebf 1823 if (!h->def_regular)
90ace9e9
JT
1824 {
1825 /* Mark the symbol as undefined, rather than as defined in
1826 the .plt section. Leave the value alone. */
1827 sym->st_shndx = SHN_UNDEF;
1828 }
1829 }
1830
1831 if (h->got.offset != (bfd_vma) -1)
1832 {
1833 asection *sgot;
1834 asection *srela;
1835 Elf_Internal_Rela rela;
947216bf 1836 bfd_byte *loc;
90ace9e9
JT
1837
1838 /* This symbol has an entry in the global offset table. Set it
1839 up. */
3d4d4302
AM
1840 sgot = bfd_get_linker_section (dynobj, ".got");
1841 srela = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
1842 BFD_ASSERT (sgot != NULL && srela != NULL);
1843
1844 rela.r_offset = (sgot->output_section->vma
1845 + sgot->output_offset
125b5bac
MR
1846 + h->got.offset);
1847 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
90ace9e9 1848 rela.r_addend = bfd_get_signed_32 (output_bfd,
125b5bac 1849 sgot->contents + h->got.offset);
90ace9e9 1850
947216bf
AM
1851 loc = srela->contents;
1852 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1853 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1854 }
1855
f5385ebf 1856 if (h->needs_copy)
90ace9e9
JT
1857 {
1858 asection *s;
1859 Elf_Internal_Rela rela;
947216bf 1860 bfd_byte *loc;
90ace9e9
JT
1861
1862 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1863 BFD_ASSERT (h->dynindx != -1
1864 && (h->root.type == bfd_link_hash_defined
1865 || h->root.type == bfd_link_hash_defweak));
1866
3d4d4302 1867 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1868 BFD_ASSERT (s != NULL);
1869
1870 rela.r_offset = (h->root.u.def.value
1871 + h->root.u.def.section->output_section->vma
1872 + h->root.u.def.section->output_offset);
1873 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1874 rela.r_addend = 0;
947216bf
AM
1875 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1876 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1877 }
1878
1879 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1880 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1881 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1882 sym->st_shndx = SHN_ABS;
1883
b34976b6 1884 return TRUE;
90ace9e9
JT
1885}
1886
1887/* Finish up the dynamic sections. */
1888
b34976b6 1889static bfd_boolean
ce71b576 1890elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1891{
1892 bfd *dynobj;
1893 asection *sgot;
1894 asection *sdyn;
1895
1896 dynobj = elf_hash_table (info)->dynobj;
1897
3d4d4302 1898 sgot = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1899 BFD_ASSERT (sgot != NULL);
3d4d4302 1900 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1901
1902 if (elf_hash_table (info)->dynamic_sections_created)
1903 {
1904 asection *splt;
1905 Elf32_External_Dyn *dyncon, *dynconend;
1906
3d4d4302 1907 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1908 BFD_ASSERT (splt != NULL && sdyn != NULL);
1909
1910 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1911 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1912 for (; dyncon < dynconend; dyncon++)
1913 {
1914 Elf_Internal_Dyn dyn;
1915 const char *name;
1916 asection *s;
1917
1918 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1919
1920 switch (dyn.d_tag)
1921 {
1922 default:
1923 break;
1924
1925 case DT_PLTGOT:
1926 name = ".got";
1927 goto get_vma;
1928 case DT_JMPREL:
1929 name = ".rela.plt";
1930 get_vma:
1931 s = bfd_get_section_by_name (output_bfd, name);
1932 BFD_ASSERT (s != NULL);
1933 dyn.d_un.d_ptr = s->vma;
1934 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1935 break;
1936
1937 case DT_PLTRELSZ:
1938 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1939 BFD_ASSERT (s != NULL);
eea6121a 1940 dyn.d_un.d_val = s->size;
90ace9e9
JT
1941 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1942 break;
1943
1944 case DT_RELASZ:
1945 /* The procedure linkage table relocs (DT_JMPREL) should
1946 not be included in the overall relocs (DT_RELA).
1947 Therefore, we override the DT_RELASZ entry here to
1948 make it not include the JMPREL relocs. Since the
1949 linker script arranges for .rela.plt to follow all
1950 other relocation sections, we don't have to worry
1951 about changing the DT_RELA entry. */
1952 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1953 if (s != NULL)
eea6121a 1954 dyn.d_un.d_val -= s->size;
90ace9e9
JT
1955 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1956 break;
1957 }
1958 }
1959
1960 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1961 if (splt->size > 0)
90ace9e9
JT
1962 {
1963 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1964 bfd_put_32 (output_bfd,
1965 (sgot->output_section->vma
1966 + sgot->output_offset + 4
1967 - (splt->output_section->vma + 6)),
1968 splt->contents + 2);
1969 bfd_put_32 (output_bfd,
1970 (sgot->output_section->vma
1971 + sgot->output_offset + 8
1972 - (splt->output_section->vma + 12)),
1973 splt->contents + 8);
cedb70c5 1974 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
1975 = PLT_ENTRY_SIZE;
1976 }
1977 }
1978
1979 /* Fill in the first three entries in the global offset table. */
eea6121a 1980 if (sgot->size > 0)
90ace9e9
JT
1981 {
1982 if (sdyn == NULL)
1983 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1984 else
1985 bfd_put_32 (output_bfd,
1986 sdyn->output_section->vma + sdyn->output_offset,
1987 sgot->contents);
1988 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1989 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1990 }
1991
1992 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1993
b34976b6 1994 return TRUE;
90ace9e9
JT
1995}
1996
9b90d8fd 1997static enum elf_reloc_type_class
7e612e98
AM
1998elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1999 const asection *rel_sec ATTRIBUTE_UNUSED,
2000 const Elf_Internal_Rela *rela)
9b90d8fd
MR
2001{
2002 switch ((int) ELF32_R_TYPE (rela->r_info))
2003 {
2004 case R_VAX_RELATIVE:
2005 return reloc_class_relative;
2006 case R_VAX_JMP_SLOT:
2007 return reloc_class_plt;
2008 case R_VAX_COPY:
2009 return reloc_class_copy;
2010 default:
2011 return reloc_class_normal;
2012 }
2013}
2014
6db7e006
MR
2015static bfd_vma
2016elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
2017 const arelent *rel ATTRIBUTE_UNUSED)
2018{
2019 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
2020}
2021
90ace9e9
JT
2022#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2023#define TARGET_LITTLE_NAME "elf32-vax"
2024#define ELF_MACHINE_CODE EM_VAX
2025#define ELF_MAXPAGESIZE 0x1000
2026
2027#define elf_backend_create_dynamic_sections \
2028 _bfd_elf_create_dynamic_sections
2029#define bfd_elf32_bfd_link_hash_table_create \
2030 elf_vax_link_hash_table_create
c152c796 2031#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2032
2033#define elf_backend_check_relocs elf_vax_check_relocs
2034#define elf_backend_adjust_dynamic_symbol \
2035 elf_vax_adjust_dynamic_symbol
fac3d241
MR
2036#define elf_backend_always_size_sections \
2037 elf_vax_always_size_sections
90ace9e9
JT
2038#define elf_backend_size_dynamic_sections \
2039 elf_vax_size_dynamic_sections
74541ad4 2040#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2041#define elf_backend_relocate_section elf_vax_relocate_section
2042#define elf_backend_finish_dynamic_symbol \
2043 elf_vax_finish_dynamic_symbol
2044#define elf_backend_finish_dynamic_sections \
2045 elf_vax_finish_dynamic_sections
9b90d8fd 2046#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9
JT
2047#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2048#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
6db7e006 2049#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9
JT
2050#define bfd_elf32_bfd_merge_private_bfd_data \
2051 elf32_vax_merge_private_bfd_data
2052#define bfd_elf32_bfd_set_private_flags \
2053 elf32_vax_set_private_flags
2054#define bfd_elf32_bfd_print_private_bfd_data \
2055 elf32_vax_print_private_bfd_data
2056
2057#define elf_backend_can_gc_sections 1
2058#define elf_backend_want_got_plt 1
2059#define elf_backend_plt_readonly 1
2060#define elf_backend_want_plt_sym 0
2061#define elf_backend_got_header_size 16
f0fe0e16 2062#define elf_backend_rela_normal 1
90ace9e9
JT
2063
2064#include "elf32-target.h"
This page took 0.864781 seconds and 4 git commands to generate.