* elf32-vax.c (elf_vax_always_size_sections): Correct a comment
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
1d7e9d18 3 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
7686d77d 4 Free Software Foundation, Inc.
90ace9e9
JT
5 Contributed by Matt Thomas <matt@3am-software.com>.
6
ae9a127f 7 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 8
ae9a127f
NC
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
cd123cb7 11 the Free Software Foundation; either version 3 of the License, or
ae9a127f 12 (at your option) any later version.
90ace9e9 13
ae9a127f
NC
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
90ace9e9 18
ae9a127f
NC
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
cd123cb7
NC
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
90ace9e9 23
90ace9e9 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
90ace9e9
JT
26#include "bfdlink.h"
27#include "libbfd.h"
28#include "elf-bfd.h"
29#include "elf/vax.h"
30
ce71b576
NC
31static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
32static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
34 struct bfd_hash_table *,
35 const char *);
36static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
37static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
38 asection *, const Elf_Internal_Rela *);
ce71b576
NC
39static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
40 struct elf_link_hash_entry *);
41static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
42static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
43 bfd *, asection *, bfd_byte *,
44 Elf_Internal_Rela *,
45 Elf_Internal_Sym *, asection **);
46static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
47 struct elf_link_hash_entry *,
48 Elf_Internal_Sym *);
49static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
50 struct bfd_link_info *);
6db7e006
MR
51static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
52 const arelent *);
ce71b576
NC
53
54static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
55static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
2c3fc389 56static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
57
58static reloc_howto_type howto_table[] = {
59 HOWTO (R_VAX_NONE, /* type */
60 0, /* rightshift */
61 0, /* size (0 = byte, 1 = short, 2 = long) */
62 0, /* bitsize */
b34976b6 63 FALSE, /* pc_relative */
90ace9e9
JT
64 0, /* bitpos */
65 complain_overflow_dont, /* complain_on_overflow */
66 bfd_elf_generic_reloc, /* special_function */
67 "R_VAX_NONE", /* name */
b34976b6 68 FALSE, /* partial_inplace */
90ace9e9
JT
69 0, /* src_mask */
70 0x00000000, /* dst_mask */
b34976b6 71 FALSE), /* pcrel_offset */
90ace9e9
JT
72
73 HOWTO (R_VAX_32, /* type */
74 0, /* rightshift */
75 2, /* size (0 = byte, 1 = short, 2 = long) */
76 32, /* bitsize */
b34976b6 77 FALSE, /* pc_relative */
90ace9e9
JT
78 0, /* bitpos */
79 complain_overflow_bitfield, /* complain_on_overflow */
80 bfd_elf_generic_reloc, /* special_function */
81 "R_VAX_32", /* name */
b34976b6 82 FALSE, /* partial_inplace */
90ace9e9
JT
83 0, /* src_mask */
84 0xffffffff, /* dst_mask */
b34976b6 85 FALSE), /* pcrel_offset */
90ace9e9
JT
86
87 HOWTO (R_VAX_16, /* type */
88 0, /* rightshift */
89 1, /* size (0 = byte, 1 = short, 2 = long) */
90 16, /* bitsize */
b34976b6 91 FALSE, /* pc_relative */
90ace9e9
JT
92 0, /* bitpos */
93 complain_overflow_bitfield, /* complain_on_overflow */
94 bfd_elf_generic_reloc, /* special_function */
95 "R_VAX_16", /* name */
b34976b6 96 FALSE, /* partial_inplace */
90ace9e9
JT
97 0, /* src_mask */
98 0x0000ffff, /* dst_mask */
b34976b6 99 FALSE), /* pcrel_offset */
90ace9e9
JT
100
101 HOWTO (R_VAX_8, /* type */
102 0, /* rightshift */
103 0, /* size (0 = byte, 1 = short, 2 = long) */
104 8, /* bitsize */
b34976b6 105 FALSE, /* pc_relative */
90ace9e9
JT
106 0, /* bitpos */
107 complain_overflow_bitfield, /* complain_on_overflow */
108 bfd_elf_generic_reloc, /* special_function */
109 "R_VAX_8", /* name */
b34976b6 110 FALSE, /* partial_inplace */
90ace9e9
JT
111 0, /* src_mask */
112 0x000000ff, /* dst_mask */
b34976b6 113 FALSE), /* pcrel_offset */
90ace9e9
JT
114
115 HOWTO (R_VAX_PC32, /* type */
116 0, /* rightshift */
117 2, /* size (0 = byte, 1 = short, 2 = long) */
118 32, /* bitsize */
b34976b6 119 TRUE, /* pc_relative */
90ace9e9
JT
120 0, /* bitpos */
121 complain_overflow_bitfield, /* complain_on_overflow */
122 bfd_elf_generic_reloc, /* special_function */
123 "R_VAX_PC32", /* name */
b34976b6 124 FALSE, /* partial_inplace */
90ace9e9
JT
125 0, /* src_mask */
126 0xffffffff, /* dst_mask */
b34976b6 127 TRUE), /* pcrel_offset */
90ace9e9
JT
128
129 HOWTO (R_VAX_PC16, /* type */
130 0, /* rightshift */
131 1, /* size (0 = byte, 1 = short, 2 = long) */
132 16, /* bitsize */
b34976b6 133 TRUE, /* pc_relative */
90ace9e9
JT
134 0, /* bitpos */
135 complain_overflow_signed, /* complain_on_overflow */
136 bfd_elf_generic_reloc, /* special_function */
137 "R_VAX_PC16", /* name */
b34976b6 138 FALSE, /* partial_inplace */
90ace9e9
JT
139 0, /* src_mask */
140 0x0000ffff, /* dst_mask */
b34976b6 141 TRUE), /* pcrel_offset */
90ace9e9
JT
142
143 HOWTO (R_VAX_PC8, /* type */
144 0, /* rightshift */
145 0, /* size (0 = byte, 1 = short, 2 = long) */
146 8, /* bitsize */
b34976b6 147 TRUE, /* pc_relative */
90ace9e9
JT
148 0, /* bitpos */
149 complain_overflow_signed, /* complain_on_overflow */
150 bfd_elf_generic_reloc, /* special_function */
151 "R_VAX_PC8", /* name */
b34976b6 152 FALSE, /* partial_inplace */
90ace9e9
JT
153 0, /* src_mask */
154 0x000000ff, /* dst_mask */
b34976b6 155 TRUE), /* pcrel_offset */
90ace9e9
JT
156
157 HOWTO (R_VAX_GOT32, /* type */
158 0, /* rightshift */
159 2, /* size (0 = byte, 1 = short, 2 = long) */
160 32, /* bitsize */
b34976b6 161 TRUE, /* pc_relative */
90ace9e9
JT
162 0, /* bitpos */
163 complain_overflow_bitfield, /* complain_on_overflow */
164 bfd_elf_generic_reloc, /* special_function */
165 "R_VAX_GOT32", /* name */
b34976b6 166 FALSE, /* partial_inplace */
90ace9e9
JT
167 0, /* src_mask */
168 0xffffffff, /* dst_mask */
b34976b6 169 TRUE), /* pcrel_offset */
90ace9e9
JT
170
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173 EMPTY_HOWTO (-1),
174 EMPTY_HOWTO (-1),
175 EMPTY_HOWTO (-1),
176
177 HOWTO (R_VAX_PLT32, /* type */
178 0, /* rightshift */
179 2, /* size (0 = byte, 1 = short, 2 = long) */
180 32, /* bitsize */
b34976b6 181 TRUE, /* pc_relative */
90ace9e9
JT
182 0, /* bitpos */
183 complain_overflow_bitfield, /* complain_on_overflow */
184 bfd_elf_generic_reloc, /* special_function */
185 "R_VAX_PLT32", /* name */
b34976b6 186 FALSE, /* partial_inplace */
90ace9e9
JT
187 0, /* src_mask */
188 0xffffffff, /* dst_mask */
b34976b6 189 TRUE), /* pcrel_offset */
90ace9e9
JT
190
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193 EMPTY_HOWTO (-1),
194 EMPTY_HOWTO (-1),
195 EMPTY_HOWTO (-1),
196
197 HOWTO (R_VAX_COPY, /* type */
198 0, /* rightshift */
199 0, /* size (0 = byte, 1 = short, 2 = long) */
200 0, /* bitsize */
b34976b6 201 FALSE, /* pc_relative */
90ace9e9
JT
202 0, /* bitpos */
203 complain_overflow_dont, /* complain_on_overflow */
204 bfd_elf_generic_reloc, /* special_function */
205 "R_VAX_COPY", /* name */
b34976b6 206 FALSE, /* partial_inplace */
90ace9e9
JT
207 0, /* src_mask */
208 0xffffffff, /* dst_mask */
b34976b6 209 FALSE), /* pcrel_offset */
90ace9e9
JT
210
211 HOWTO (R_VAX_GLOB_DAT, /* type */
212 0, /* rightshift */
213 2, /* size (0 = byte, 1 = short, 2 = long) */
214 32, /* bitsize */
b34976b6 215 FALSE, /* pc_relative */
90ace9e9
JT
216 0, /* bitpos */
217 complain_overflow_dont, /* complain_on_overflow */
218 bfd_elf_generic_reloc, /* special_function */
219 "R_VAX_GLOB_DAT", /* name */
b34976b6 220 FALSE, /* partial_inplace */
90ace9e9
JT
221 0, /* src_mask */
222 0xffffffff, /* dst_mask */
b34976b6 223 FALSE), /* pcrel_offset */
90ace9e9
JT
224
225 HOWTO (R_VAX_JMP_SLOT, /* type */
226 0, /* rightshift */
227 2, /* size (0 = byte, 1 = short, 2 = long) */
228 32, /* bitsize */
b34976b6 229 FALSE, /* pc_relative */
90ace9e9
JT
230 0, /* bitpos */
231 complain_overflow_dont, /* complain_on_overflow */
232 bfd_elf_generic_reloc, /* special_function */
233 "R_VAX_JMP_SLOT", /* name */
b34976b6 234 FALSE, /* partial_inplace */
90ace9e9
JT
235 0, /* src_mask */
236 0xffffffff, /* dst_mask */
b34976b6 237 FALSE), /* pcrel_offset */
90ace9e9
JT
238
239 HOWTO (R_VAX_RELATIVE, /* type */
240 0, /* rightshift */
241 2, /* size (0 = byte, 1 = short, 2 = long) */
242 32, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
90ace9e9
JT
244 0, /* bitpos */
245 complain_overflow_dont, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_VAX_RELATIVE", /* name */
b34976b6 248 FALSE, /* partial_inplace */
90ace9e9
JT
249 0, /* src_mask */
250 0xffffffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
90ace9e9
JT
252
253 /* GNU extension to record C++ vtable hierarchy */
254 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
255 0, /* rightshift */
256 2, /* size (0 = byte, 1 = short, 2 = long) */
257 0, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
90ace9e9
JT
259 0, /* bitpos */
260 complain_overflow_dont, /* complain_on_overflow */
261 NULL, /* special_function */
262 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 263 FALSE, /* partial_inplace */
90ace9e9
JT
264 0, /* src_mask */
265 0, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
90ace9e9
JT
267
268 /* GNU extension to record C++ vtable member usage */
269 HOWTO (R_VAX_GNU_VTENTRY, /* type */
270 0, /* rightshift */
271 2, /* size (0 = byte, 1 = short, 2 = long) */
272 0, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
90ace9e9
JT
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
277 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 278 FALSE, /* partial_inplace */
90ace9e9
JT
279 0, /* src_mask */
280 0, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
90ace9e9
JT
282};
283
284static void
ce71b576
NC
285rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
286 Elf_Internal_Rela *dst)
90ace9e9
JT
287{
288 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
289 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
290}
291
292#define elf_info_to_howto rtype_to_howto
293
294static const struct
295{
296 bfd_reloc_code_real_type bfd_val;
297 int elf_val;
298} reloc_map[] = {
299 { BFD_RELOC_NONE, R_VAX_NONE },
300 { BFD_RELOC_32, R_VAX_32 },
301 { BFD_RELOC_16, R_VAX_16 },
302 { BFD_RELOC_8, R_VAX_8 },
303 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
304 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
305 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
306 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
307 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
308 { BFD_RELOC_NONE, R_VAX_COPY },
309 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
310 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
311 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
312 { BFD_RELOC_CTOR, R_VAX_32 },
313 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
314 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
315};
316
317static reloc_howto_type *
ce71b576 318reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
319{
320 unsigned int i;
321 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
322 {
323 if (reloc_map[i].bfd_val == code)
324 return &howto_table[reloc_map[i].elf_val];
325 }
326 return 0;
327}
328
157090f7
AM
329static reloc_howto_type *
330reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
331 const char *r_name)
332{
333 unsigned int i;
334
335 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
336 if (howto_table[i].name != NULL
337 && strcasecmp (howto_table[i].name, r_name) == 0)
338 return &howto_table[i];
339
340 return NULL;
341}
342
90ace9e9 343#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 344#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
345#define ELF_ARCH bfd_arch_vax
346/* end code generated by elf.el */
90ace9e9
JT
347\f
348/* Functions for the VAX ELF linker. */
349
350/* The name of the dynamic interpreter. This is put in the .interp
351 section. */
352
353#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
354
355/* The size in bytes of an entry in the procedure linkage table. */
356
357#define PLT_ENTRY_SIZE 12
358
359/* The first entry in a procedure linkage table looks like this. See
360 the SVR4 ABI VAX supplement to see how this works. */
361
362static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
363{
364 0xdd, 0xef, /* pushl l^ */
365 0, 0, 0, 0, /* offset to .plt.got + 4 */
366 0x17, 0xff, /* jmp @L^(pc) */
367 0, 0, 0, 0, /* offset to .plt.got + 8 */
368};
369
370/* Subsequent entries in a procedure linkage table look like this. */
371
372static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
373{
6c4fb25a 374 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 375 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
376 0, 0, 0, 0, /* replaced with offset to start of .plt */
377 0, 0, 0, 0, /* index into .rela.plt */
378};
379
380/* The VAX linker needs to keep track of the number of relocs that it
381 decides to copy in check_relocs for each symbol. This is so that it
382 can discard PC relative relocs if it doesn't need them when linking
383 with -Bsymbolic. We store the information in a field extending the
384 regular ELF linker hash table. */
385
386/* This structure keeps track of the number of PC relative relocs we have
387 copied for a given symbol. */
388
389struct elf_vax_pcrel_relocs_copied
390{
391 /* Next section. */
392 struct elf_vax_pcrel_relocs_copied *next;
393 /* A section in dynobj. */
394 asection *section;
395 /* Number of relocs copied in this section. */
396 bfd_size_type count;
397};
398
399/* VAX ELF linker hash entry. */
400
401struct elf_vax_link_hash_entry
402{
403 struct elf_link_hash_entry root;
404
405 /* Number of PC relative relocs copied for this symbol. */
406 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
407
408 bfd_vma got_addend;
409};
410
90ace9e9
JT
411/* Declare this now that the above structures are defined. */
412
ce71b576 413static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 414 void *);
90ace9e9 415
b29635ba
JT
416/* Declare this now that the above structures are defined. */
417
ce71b576 418static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 419 void *);
b29635ba 420
90ace9e9
JT
421/* Traverse an VAX ELF linker hash table. */
422
423#define elf_vax_link_hash_traverse(table, func, info) \
424 (elf_link_hash_traverse \
4dfe6ac6 425 ((table), \
2c3fc389 426 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
427 (info)))
428
90ace9e9
JT
429/* Create an entry in an VAX ELF linker hash table. */
430
431static struct bfd_hash_entry *
ce71b576
NC
432elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
433 struct bfd_hash_table *table,
434 const char *string)
90ace9e9
JT
435{
436 struct elf_vax_link_hash_entry *ret =
437 (struct elf_vax_link_hash_entry *) entry;
438
439 /* Allocate the structure if it has not already been allocated by a
440 subclass. */
ce71b576 441 if (ret == NULL)
90ace9e9
JT
442 ret = ((struct elf_vax_link_hash_entry *)
443 bfd_hash_allocate (table,
444 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 445 if (ret == NULL)
90ace9e9
JT
446 return (struct bfd_hash_entry *) ret;
447
448 /* Call the allocation method of the superclass. */
449 ret = ((struct elf_vax_link_hash_entry *)
450 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
451 table, string));
ce71b576 452 if (ret != NULL)
90ace9e9
JT
453 {
454 ret->pcrel_relocs_copied = NULL;
455 }
456
457 return (struct bfd_hash_entry *) ret;
458}
459
460/* Create an VAX ELF linker hash table. */
461
462static struct bfd_link_hash_table *
ce71b576 463elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 464{
4dfe6ac6
NC
465 struct elf_link_hash_table *ret;
466 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 467
7bf52ea2 468 ret = bfd_zmalloc (amt);
ce71b576 469 if (ret == NULL)
90ace9e9
JT
470 return NULL;
471
4dfe6ac6 472 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 473 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
474 sizeof (struct elf_vax_link_hash_entry),
475 GENERIC_ELF_DATA))
90ace9e9
JT
476 {
477 free (ret);
478 return NULL;
479 }
480
4dfe6ac6 481 return &ret->root;
90ace9e9
JT
482}
483
484/* Keep vax-specific flags in the ELF header */
b34976b6 485static bfd_boolean
ce71b576 486elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
487{
488 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
489 elf_flags_init (abfd) = TRUE;
490 return TRUE;
90ace9e9
JT
491}
492
493/* Merge backend specific data from an object file to the output
494 object file when linking. */
b34976b6 495static bfd_boolean
ce71b576 496elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9 497{
90ace9e9
JT
498 flagword in_flags;
499
500 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
501 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 502 return TRUE;
90ace9e9
JT
503
504 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
505
506 if (!elf_flags_init (obfd))
507 {
b34976b6 508 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
509 elf_elfheader (obfd)->e_flags = in_flags;
510 }
511
b34976b6 512 return TRUE;
90ace9e9
JT
513}
514
515/* Display the flags field */
b34976b6 516static bfd_boolean
2c3fc389 517elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
518{
519 FILE *file = (FILE *) ptr;
520
521 BFD_ASSERT (abfd != NULL && ptr != NULL);
522
523 /* Print normal ELF private data. */
524 _bfd_elf_print_private_bfd_data (abfd, ptr);
525
526 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
527
528 /* xgettext:c-format */
529 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
530
179d3252 531 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
532 fprintf (file, _(" [nonpic]"));
533
179d3252 534 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
535 fprintf (file, _(" [d-float]"));
536
179d3252 537 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
538 fprintf (file, _(" [g-float]"));
539
540 fputc ('\n', file);
541
b34976b6 542 return TRUE;
90ace9e9
JT
543}
544/* Look through the relocs for a section during the first phase, and
545 allocate space in the global offset table or procedure linkage
546 table. */
547
b34976b6 548static bfd_boolean
ce71b576
NC
549elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
550 const Elf_Internal_Rela *relocs)
90ace9e9
JT
551{
552 bfd *dynobj;
553 Elf_Internal_Shdr *symtab_hdr;
554 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
555 const Elf_Internal_Rela *rel;
556 const Elf_Internal_Rela *rel_end;
557 asection *sgot;
558 asection *srelgot;
559 asection *sreloc;
560
1049f94e 561 if (info->relocatable)
b34976b6 562 return TRUE;
90ace9e9
JT
563
564 dynobj = elf_hash_table (info)->dynobj;
565 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
566 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
567
568 sgot = NULL;
569 srelgot = NULL;
570 sreloc = NULL;
571
572 rel_end = relocs + sec->reloc_count;
573 for (rel = relocs; rel < rel_end; rel++)
574 {
575 unsigned long r_symndx;
576 struct elf_link_hash_entry *h;
577
578 r_symndx = ELF32_R_SYM (rel->r_info);
579
580 if (r_symndx < symtab_hdr->sh_info)
581 h = NULL;
582 else
973a3492
L
583 {
584 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
585 while (h->root.type == bfd_link_hash_indirect
586 || h->root.type == bfd_link_hash_warning)
587 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
588
589 /* PR15323, ref flags aren't set for references in the same
590 object. */
591 h->root.non_ir_ref = 1;
973a3492 592 }
90ace9e9
JT
593
594 switch (ELF32_R_TYPE (rel->r_info))
595 {
596 case R_VAX_GOT32:
fe723c87
MT
597 BFD_ASSERT (h != NULL);
598 if (h->forced_local
599 || h == elf_hash_table (info)->hgot
600 || h == elf_hash_table (info)->hplt)
90ace9e9
JT
601 break;
602
7b6021f1
MR
603 /* If this is a local symbol, we resolve it directly without
604 creating a global offset table entry. */
605 if (h == NULL || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
606 break;
607
90ace9e9
JT
608 /* This symbol requires a global offset table entry. */
609
610 if (dynobj == NULL)
611 {
612 /* Create the .got section. */
613 elf_hash_table (info)->dynobj = dynobj = abfd;
614 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 615 return FALSE;
90ace9e9
JT
616 }
617
618 if (sgot == NULL)
619 {
3d4d4302 620 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
621 BFD_ASSERT (sgot != NULL);
622 }
623
624 if (srelgot == NULL
625 && (h != NULL || info->shared))
626 {
3d4d4302 627 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
628 if (srelgot == NULL)
629 {
3d4d4302
AM
630 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
631 | SEC_IN_MEMORY | SEC_LINKER_CREATED
632 | SEC_READONLY);
633
634 srelgot = bfd_make_section_anyway_with_flags (dynobj,
635 ".rela.got",
636 flags);
90ace9e9 637 if (srelgot == NULL
90ace9e9 638 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 639 return FALSE;
90ace9e9
JT
640 }
641 }
642
643 if (h != NULL)
644 {
645 struct elf_vax_link_hash_entry *eh;
646
647 eh = (struct elf_vax_link_hash_entry *) h;
648 if (h->got.refcount == -1)
649 {
650 h->got.refcount = 1;
651 eh->got_addend = rel->r_addend;
90ace9e9
JT
652 }
653 else
654 {
655 h->got.refcount++;
656 if (eh->got_addend != (bfd_vma) rel->r_addend)
657 (*_bfd_error_handler)
fe723c87
MT
658 (_("%s: warning: GOT addend of %ld to `%s' does"
659 " not match previous GOT addend of %ld"),
660 bfd_get_filename (abfd), rel->r_addend,
661 h->root.root.string,
662 eh->got_addend);
cedb70c5 663
90ace9e9
JT
664 }
665 }
666 break;
667
668 case R_VAX_PLT32:
669 /* This symbol requires a procedure linkage table entry. We
670 actually build the entry in adjust_dynamic_symbol,
671 because this might be a case of linking PIC code which is
672 never referenced by a dynamic object, in which case we
673 don't need to generate a procedure linkage table entry
674 after all. */
675
676 /* If this is a local symbol, we resolve it directly without
677 creating a procedure linkage table entry. */
fe723c87 678 BFD_ASSERT (h != NULL);
7b6021f1 679 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT || h->forced_local)
fe723c87 680 break;
90ace9e9 681
f5385ebf 682 h->needs_plt = 1;
90ace9e9
JT
683 if (h->plt.refcount == -1)
684 h->plt.refcount = 1;
685 else
686 h->plt.refcount++;
687 break;
688
689 case R_VAX_PC8:
690 case R_VAX_PC16:
691 case R_VAX_PC32:
692 /* If we are creating a shared library and this is not a local
693 symbol, we need to copy the reloc into the shared library.
694 However when linking with -Bsymbolic and this is a global
695 symbol which is defined in an object we are including in the
696 link (i.e., DEF_REGULAR is set), then we can resolve the
697 reloc directly. At this point we have not seen all the input
698 files, so it is possible that DEF_REGULAR is not set now but
699 will be set later (it is never cleared). We account for that
700 possibility below by storing information in the
701 pcrel_relocs_copied field of the hash table entry. */
702 if (!(info->shared
703 && (sec->flags & SEC_ALLOC) != 0
704 && h != NULL
705 && (!info->symbolic
f5385ebf 706 || !h->def_regular)))
90ace9e9 707 {
7b6021f1
MR
708 if (h != NULL
709 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
710 && !h->forced_local)
90ace9e9
JT
711 {
712 /* Make sure a plt entry is created for this symbol if
713 it turns out to be a function defined by a dynamic
714 object. */
715 if (h->plt.refcount == -1)
716 h->plt.refcount = 1;
717 else
718 h->plt.refcount++;
719 }
720 break;
721 }
7b6021f1
MR
722 /* If this is a local symbol, we can resolve it directly. */
723 if (h != NULL
724 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
725 || h->forced_local))
fe723c87
MT
726 break;
727
90ace9e9
JT
728 /* Fall through. */
729 case R_VAX_8:
730 case R_VAX_16:
731 case R_VAX_32:
7b6021f1 732 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
733 {
734 /* Make sure a plt entry is created for this symbol if it
735 turns out to be a function defined by a dynamic object. */
736 if (h->plt.refcount == -1)
737 h->plt.refcount = 1;
738 else
739 h->plt.refcount++;
740 }
741
742 /* If we are creating a shared library, we need to copy the
743 reloc into the shared library. */
744 if (info->shared
745 && (sec->flags & SEC_ALLOC) != 0)
746 {
747 /* When creating a shared object, we must copy these
748 reloc types into the output file. We create a reloc
749 section in dynobj and make room for this reloc. */
750 if (sreloc == NULL)
751 {
83bac4b0
NC
752 sreloc = _bfd_elf_make_dynamic_reloc_section
753 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 754
83bac4b0 755 if (sreloc == NULL)
b34976b6 756 return FALSE;
90ace9e9 757
90ace9e9
JT
758 if (sec->flags & SEC_READONLY)
759 info->flags |= DF_TEXTREL;
760 }
761
eea6121a 762 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
763
764 /* If we are linking with -Bsymbolic, we count the number of
765 PC relative relocations we have entered for this symbol,
766 so that we can discard them again if the symbol is later
767 defined by a regular object. Note that this function is
19852a2a 768 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
769 which means that h is really a pointer to an
770 elf_vax_link_hash_entry. */
771 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
772 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
773 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
774 && info->symbolic)
775 {
776 struct elf_vax_link_hash_entry *eh;
777 struct elf_vax_pcrel_relocs_copied *p;
778
779 eh = (struct elf_vax_link_hash_entry *) h;
780
781 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
782 if (p->section == sreloc)
783 break;
784
785 if (p == NULL)
786 {
787 p = ((struct elf_vax_pcrel_relocs_copied *)
788 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
789 if (p == NULL)
b34976b6 790 return FALSE;
90ace9e9
JT
791 p->next = eh->pcrel_relocs_copied;
792 eh->pcrel_relocs_copied = p;
793 p->section = sreloc;
794 p->count = 0;
795 }
796
797 ++p->count;
798 }
799 }
800
801 break;
802
803 /* This relocation describes the C++ object vtable hierarchy.
804 Reconstruct it for later use during GC. */
805 case R_VAX_GNU_VTINHERIT:
c152c796 806 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 807 return FALSE;
90ace9e9
JT
808 break;
809
810 /* This relocation describes which C++ vtable entries are actually
811 used. Record for later use during GC. */
812 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
813 BFD_ASSERT (h != NULL);
814 if (h != NULL
815 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 816 return FALSE;
90ace9e9
JT
817 break;
818
819 default:
820 break;
821 }
822 }
823
b34976b6 824 return TRUE;
90ace9e9
JT
825}
826
827/* Return the section that should be marked against GC for a given
828 relocation. */
829
830static asection *
ce71b576 831elf_vax_gc_mark_hook (asection *sec,
07adf181 832 struct bfd_link_info *info,
ce71b576
NC
833 Elf_Internal_Rela *rel,
834 struct elf_link_hash_entry *h,
835 Elf_Internal_Sym *sym)
90ace9e9
JT
836{
837 if (h != NULL)
07adf181
AM
838 switch (ELF32_R_TYPE (rel->r_info))
839 {
840 case R_VAX_GNU_VTINHERIT:
841 case R_VAX_GNU_VTENTRY:
842 return NULL;
843 }
844
845 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
846}
847
848/* Update the got entry reference counts for the section being removed. */
849
b34976b6 850static bfd_boolean
ce71b576
NC
851elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
852 const Elf_Internal_Rela *relocs)
90ace9e9
JT
853{
854 Elf_Internal_Shdr *symtab_hdr;
855 struct elf_link_hash_entry **sym_hashes;
90ace9e9 856 const Elf_Internal_Rela *rel, *relend;
90ace9e9 857 bfd *dynobj;
90ace9e9 858
7dda2462
TG
859 if (info->relocatable)
860 return TRUE;
861
90ace9e9
JT
862 dynobj = elf_hash_table (info)->dynobj;
863 if (dynobj == NULL)
b34976b6 864 return TRUE;
90ace9e9 865
babfd660
KH
866 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
867 sym_hashes = elf_sym_hashes (abfd);
868
90ace9e9
JT
869 relend = relocs + sec->reloc_count;
870 for (rel = relocs; rel < relend; rel++)
871 {
babfd660 872 unsigned long r_symndx;
3eb128b2
AM
873 struct elf_link_hash_entry *h = NULL;
874
875 r_symndx = ELF32_R_SYM (rel->r_info);
876 if (r_symndx >= symtab_hdr->sh_info)
877 {
878 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
879 while (h->root.type == bfd_link_hash_indirect
880 || h->root.type == bfd_link_hash_warning)
881 h = (struct elf_link_hash_entry *) h->root.u.i.link;
882 }
babfd660 883
90ace9e9
JT
884 switch (ELF32_R_TYPE (rel->r_info))
885 {
886 case R_VAX_GOT32:
3eb128b2
AM
887 if (h != NULL && h->got.refcount > 0)
888 --h->got.refcount;
90ace9e9
JT
889 break;
890
891 case R_VAX_PLT32:
892 case R_VAX_PC8:
893 case R_VAX_PC16:
894 case R_VAX_PC32:
895 case R_VAX_8:
896 case R_VAX_16:
897 case R_VAX_32:
3eb128b2
AM
898 if (h != NULL && h->plt.refcount > 0)
899 --h->plt.refcount;
90ace9e9
JT
900 break;
901
902 default:
903 break;
904 }
905 }
906
b34976b6 907 return TRUE;
90ace9e9
JT
908}
909
910/* Adjust a symbol defined by a dynamic object and referenced by a
911 regular object. The current definition is in some section of the
912 dynamic object, but we're not including those sections. We have to
913 change the definition to something the rest of the link can
914 understand. */
915
b34976b6 916static bfd_boolean
a0f0eb1e
MR
917elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
918 struct elf_link_hash_entry *h)
90ace9e9
JT
919{
920 bfd *dynobj;
921 asection *s;
90ace9e9
JT
922
923 dynobj = elf_hash_table (info)->dynobj;
924
925 /* Make sure we know what is going on here. */
926 BFD_ASSERT (dynobj != NULL
f5385ebf 927 && (h->needs_plt
f6e332e6 928 || h->u.weakdef != NULL
f5385ebf
AM
929 || (h->def_dynamic
930 && h->ref_regular
931 && !h->def_regular)));
90ace9e9
JT
932
933 /* If this is a function, put it in the procedure linkage table. We
934 will fill in the contents of the procedure linkage table later,
935 when we know the address of the .got section. */
936 if (h->type == STT_FUNC
f5385ebf 937 || h->needs_plt)
90ace9e9 938 {
a22a8039
MR
939 if (h->plt.refcount <= 0
940 || SYMBOL_CALLS_LOCAL (info, h)
941 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
942 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
943 {
944 /* This case can occur if we saw a PLTxx reloc in an input
945 file, but the symbol was never referred to by a dynamic
a22a8039
MR
946 object, or if all references were garbage collected. In
947 such a case, we don't actually need to build a procedure
948 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 949 h->plt.offset = (bfd_vma) -1;
f5385ebf 950 h->needs_plt = 0;
b34976b6 951 return TRUE;
90ace9e9
JT
952 }
953
3d4d4302 954 s = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
955 BFD_ASSERT (s != NULL);
956
957 /* If this is the first .plt entry, make room for the special
958 first entry. */
eea6121a 959 if (s->size == 0)
90ace9e9 960 {
eea6121a 961 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
962 }
963
964 /* If this symbol is not defined in a regular file, and we are
965 not generating a shared library, then set the symbol to this
966 location in the .plt. This is required to make function
967 pointers compare as equal between the normal executable and
968 the shared library. */
969 if (!info->shared
f5385ebf 970 && !h->def_regular)
90ace9e9
JT
971 {
972 h->root.u.def.section = s;
eea6121a 973 h->root.u.def.value = s->size;
90ace9e9
JT
974 }
975
eea6121a 976 h->plt.offset = s->size;
90ace9e9
JT
977
978 /* Make room for this entry. */
eea6121a 979 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
980
981 /* We also need to make an entry in the .got.plt section, which
982 will be placed in the .got section by the linker script. */
983
3d4d4302 984 s = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 985 BFD_ASSERT (s != NULL);
eea6121a 986 s->size += 4;
90ace9e9
JT
987
988 /* We also need to make an entry in the .rela.plt section. */
989
3d4d4302 990 s = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9 991 BFD_ASSERT (s != NULL);
eea6121a 992 s->size += sizeof (Elf32_External_Rela);
90ace9e9 993
b34976b6 994 return TRUE;
90ace9e9
JT
995 }
996
997 /* Reinitialize the plt offset now that it is not used as a reference
998 count any more. */
999 h->plt.offset = (bfd_vma) -1;
1000
1001 /* If this is a weak symbol, and there is a real definition, the
1002 processor independent code will have arranged for us to see the
1003 real definition first, and we can just use the same value. */
f6e332e6 1004 if (h->u.weakdef != NULL)
90ace9e9 1005 {
f6e332e6
AM
1006 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1007 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1008 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1009 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1010 return TRUE;
90ace9e9
JT
1011 }
1012
1013 /* This is a reference to a symbol defined by a dynamic object which
1014 is not a function. */
1015
1016 /* If we are creating a shared library, we must presume that the
1017 only references to the symbol are via the global offset table.
1018 For such cases we need not do anything here; the relocations will
1019 be handled correctly by relocate_section. */
1020 if (info->shared)
b34976b6 1021 return TRUE;
90ace9e9
JT
1022
1023 /* We must allocate the symbol in our .dynbss section, which will
1024 become part of the .bss section of the executable. There will be
1025 an entry for this symbol in the .dynsym section. The dynamic
1026 object will contain position independent code, so all references
1027 from the dynamic object to this symbol will go through the global
1028 offset table. The dynamic linker will use the .dynsym entry to
1029 determine the address it must put in the global offset table, so
1030 both the dynamic object and the regular object will refer to the
1031 same memory location for the variable. */
1032
3d4d4302 1033 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
1034 BFD_ASSERT (s != NULL);
1035
1036 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1037 copy the initial value out of the dynamic object and into the
1038 runtime process image. We need to remember the offset into the
1039 .rela.bss section we are going to use. */
1d7e9d18 1040 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
1041 {
1042 asection *srel;
1043
3d4d4302 1044 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 1045 BFD_ASSERT (srel != NULL);
eea6121a 1046 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1047 h->needs_copy = 1;
90ace9e9
JT
1048 }
1049
027297b7 1050 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1051}
1052
fac3d241
MR
1053/* This function is called via elf_link_hash_traverse. It resets GOT
1054 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
1055 will be done. */
1056
1057static bfd_boolean
1058elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
1059 void *infoptr ATTRIBUTE_UNUSED)
1060{
1061 h->got.refcount = -1;
1062 h->plt.refcount = -1;
1063
1064 return TRUE;
1065}
1066
1067/* Discard unused dynamic data if this is a static link. */
1068
1069static bfd_boolean
1070elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1071 struct bfd_link_info *info)
1072{
1073 bfd *dynobj;
1074 asection *s;
1075
1076 dynobj = elf_hash_table (info)->dynobj;
1077
1078 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
1079 {
1080 /* We may have created entries in the .rela.got and .got sections.
1081 However, if we are not creating the dynamic sections, we will
1082 not actually use these entries. Reset the size of .rela.got
49d01bf6 1083 and .got, which will cause them to get stripped from the output
fac3d241
MR
1084 file below. */
1085 s = bfd_get_linker_section (dynobj, ".rela.got");
1086 if (s != NULL)
1087 s->size = 0;
1088 s = bfd_get_linker_section (dynobj, ".got.plt");
1089 if (s != NULL)
1090 s->size = 0;
1091 s = bfd_get_linker_section (dynobj, ".got");
1092 if (s != NULL)
1093 s->size = 0;
1094 }
1095
1096 /* If this is a static link, we need to discard all the got entries we've
1097 recorded. */
1098 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1099 elf_link_hash_traverse (elf_hash_table (info),
1100 elf_vax_discard_got_entries,
1101 info);
1102
1103 return TRUE;
1104}
1105
90ace9e9
JT
1106/* Set the sizes of the dynamic sections. */
1107
b34976b6 1108static bfd_boolean
ce71b576 1109elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1110{
1111 bfd *dynobj;
1112 asection *s;
b34976b6
AM
1113 bfd_boolean plt;
1114 bfd_boolean relocs;
1115 bfd_boolean reltext;
90ace9e9
JT
1116
1117 dynobj = elf_hash_table (info)->dynobj;
1118 BFD_ASSERT (dynobj != NULL);
1119
1120 if (elf_hash_table (info)->dynamic_sections_created)
1121 {
1122 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1123 if (info->executable)
90ace9e9 1124 {
3d4d4302 1125 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1126 BFD_ASSERT (s != NULL);
eea6121a 1127 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1128 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1129 }
1130 }
90ace9e9
JT
1131
1132 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1133 relative relocs against symbols defined in a regular object. We
1134 allocated space for them in the check_relocs routine, but we will not
1135 fill them in in the relocate_section routine. */
1136 if (info->shared && info->symbolic)
4dfe6ac6 1137 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1138 elf_vax_discard_copies,
ce71b576 1139 NULL);
b29635ba 1140
fac3d241
MR
1141 /* If this is a -Bsymbolic shared link, we need to discard all the got
1142 entries we've recorded. Otherwise, we need to instantiate (allocate
1143 space for them). */
b29635ba
JT
1144 elf_link_hash_traverse (elf_hash_table (info),
1145 elf_vax_instantiate_got_entries,
2c3fc389 1146 info);
90ace9e9
JT
1147
1148 /* The check_relocs and adjust_dynamic_symbol entry points have
1149 determined the sizes of the various dynamic sections. Allocate
1150 memory for them. */
b34976b6
AM
1151 plt = FALSE;
1152 relocs = FALSE;
1153 reltext = FALSE;
90ace9e9
JT
1154 for (s = dynobj->sections; s != NULL; s = s->next)
1155 {
1156 const char *name;
90ace9e9
JT
1157
1158 if ((s->flags & SEC_LINKER_CREATED) == 0)
1159 continue;
1160
1161 /* It's OK to base decisions on the section name, because none
1162 of the dynobj section names depend upon the input files. */
1163 name = bfd_get_section_name (dynobj, s);
1164
90ace9e9
JT
1165 if (strcmp (name, ".plt") == 0)
1166 {
c456f082
AM
1167 /* Remember whether there is a PLT. */
1168 plt = s->size != 0;
90ace9e9 1169 }
0112cd26 1170 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1171 {
c456f082 1172 if (s->size != 0)
90ace9e9
JT
1173 {
1174 asection *target;
1175
1176 /* Remember whether there are any reloc sections other
1177 than .rela.plt. */
1178 if (strcmp (name, ".rela.plt") != 0)
1179 {
1180 const char *outname;
1181
b34976b6 1182 relocs = TRUE;
90ace9e9
JT
1183
1184 /* If this relocation section applies to a read only
1185 section, then we probably need a DT_TEXTREL
1186 entry. .rela.plt is actually associated with
1187 .got.plt, which is never readonly. */
1188 outname = bfd_get_section_name (output_bfd,
1189 s->output_section);
1190 target = bfd_get_section_by_name (output_bfd, outname + 5);
1191 if (target != NULL
1192 && (target->flags & SEC_READONLY) != 0
1193 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1194 reltext = TRUE;
90ace9e9
JT
1195 }
1196
1197 /* We use the reloc_count field as a counter if we need
1198 to copy relocs into the output file. */
1199 s->reloc_count = 0;
1200 }
1201 }
0112cd26 1202 else if (! CONST_STRNEQ (name, ".got")
c456f082 1203 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1204 {
1205 /* It's not one of our sections, so don't allocate space. */
1206 continue;
1207 }
1208
c456f082 1209 if (s->size == 0)
90ace9e9 1210 {
c456f082
AM
1211 /* If we don't need this section, strip it from the
1212 output file. This is mostly to handle .rela.bss and
1213 .rela.plt. We must create both sections in
1214 create_dynamic_sections, because they must be created
1215 before the linker maps input sections to output
1216 sections. The linker does that before
1217 adjust_dynamic_symbol is called, and it is that
1218 function which decides whether anything needs to go
1219 into these sections. */
8423293d 1220 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1221 continue;
1222 }
1223
c456f082
AM
1224 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1225 continue;
1226
90ace9e9 1227 /* Allocate memory for the section contents. */
eea6121a 1228 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1229 if (s->contents == NULL)
b34976b6 1230 return FALSE;
90ace9e9
JT
1231 }
1232
1233 if (elf_hash_table (info)->dynamic_sections_created)
1234 {
1235 /* Add some entries to the .dynamic section. We fill in the
1236 values later, in elf_vax_finish_dynamic_sections, but we
1237 must add the entries now so that we get the correct size for
1238 the .dynamic section. The DT_DEBUG entry is filled in by the
1239 dynamic linker and used by the debugger. */
1240#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1241 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1242
1243 if (!info->shared)
1244 {
1245 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1246 return FALSE;
90ace9e9
JT
1247 }
1248
1249 if (plt)
1250 {
1251 if (!add_dynamic_entry (DT_PLTGOT, 0)
1252 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1253 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1254 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1255 return FALSE;
90ace9e9
JT
1256 }
1257
1258 if (relocs)
1259 {
1260 if (!add_dynamic_entry (DT_RELA, 0)
1261 || !add_dynamic_entry (DT_RELASZ, 0)
1262 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1263 return FALSE;
90ace9e9
JT
1264 }
1265
1266 if (reltext || (info->flags & DF_TEXTREL) != 0)
1267 {
1268 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1269 return FALSE;
90ace9e9
JT
1270 }
1271 }
1272#undef add_dynamic_entry
1273
b34976b6 1274 return TRUE;
90ace9e9
JT
1275}
1276
1277/* This function is called via elf_vax_link_hash_traverse if we are
1278 creating a shared object with -Bsymbolic. It discards the space
1279 allocated to copy PC relative relocs against symbols which are defined
1280 in regular objects. We allocated space for them in the check_relocs
1281 routine, but we won't fill them in in the relocate_section routine. */
1282
b34976b6 1283static bfd_boolean
ce71b576 1284elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1285 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1286{
1287 struct elf_vax_pcrel_relocs_copied *s;
1288
90ace9e9 1289 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1290 if (!h->root.def_regular)
b34976b6 1291 return TRUE;
90ace9e9
JT
1292
1293 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1294 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1295
b34976b6 1296 return TRUE;
90ace9e9
JT
1297}
1298
fac3d241
MR
1299/* This function is called via elf_link_hash_traverse. It looks for
1300 entries that have GOT or PLT (.GOT) references. If creating a shared
1301 object with -Bsymbolic, or the symbol has been forced local, then it
1302 resets the reference count back to -1 so normal PC32 relocation will
1303 be done. Otherwise space in the .got and .rela.got will be reserved
1304 for the symbol. */
b29635ba 1305
b34976b6 1306static bfd_boolean
2c3fc389 1307elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1308{
1309 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1310 bfd *dynobj;
1311 asection *sgot;
1312 asection *srelgot;
b34976b6 1313
b29635ba
JT
1314 /* We don't care about non-GOT (and non-PLT) entries. */
1315 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1316 return TRUE;
b29635ba
JT
1317
1318 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1319 BFD_ASSERT (dynobj != NULL);
b29635ba 1320
3d4d4302
AM
1321 sgot = bfd_get_linker_section (dynobj, ".got");
1322 srelgot = bfd_get_linker_section (dynobj, ".rela.got");
b29635ba 1323
fac3d241 1324 if ((info->shared && info->symbolic)
fe723c87 1325 || h->forced_local)
b29635ba 1326 {
8be65dd3
MR
1327 h->got.refcount = -1;
1328 h->plt.refcount = -1;
b29635ba
JT
1329 }
1330 else if (h->got.refcount > 0)
1331 {
886815b2
MR
1332 bfd_boolean dyn;
1333
b29635ba
JT
1334 /* Make sure this symbol is output as a dynamic symbol. */
1335 if (h->dynindx == -1)
1336 {
c152c796 1337 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1338 return FALSE;
b29635ba
JT
1339 }
1340
886815b2 1341 dyn = elf_hash_table (info)->dynamic_sections_created;
b29635ba 1342 /* Allocate space in the .got and .rela.got sections. */
886815b2
MR
1343 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1344 && (info->shared
1345 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1346 {
1347 sgot->size += 4;
1348 srelgot->size += sizeof (Elf32_External_Rela);
1349 }
b29635ba
JT
1350 }
1351
b34976b6 1352 return TRUE;
b29635ba
JT
1353}
1354
90ace9e9
JT
1355/* Relocate an VAX ELF section. */
1356
b34976b6 1357static bfd_boolean
ce71b576
NC
1358elf_vax_relocate_section (bfd *output_bfd,
1359 struct bfd_link_info *info,
1360 bfd *input_bfd,
1361 asection *input_section,
1362 bfd_byte *contents,
1363 Elf_Internal_Rela *relocs,
1364 Elf_Internal_Sym *local_syms,
1365 asection **local_sections)
90ace9e9
JT
1366{
1367 bfd *dynobj;
1368 Elf_Internal_Shdr *symtab_hdr;
1369 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1370 bfd_vma plt_index;
1371 bfd_vma got_offset;
1372 asection *sgot;
1373 asection *splt;
1374 asection *sgotplt;
1375 asection *sreloc;
1376 Elf_Internal_Rela *rel;
1377 Elf_Internal_Rela *relend;
1378
1379 dynobj = elf_hash_table (info)->dynobj;
1380 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1381 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1382
1383 sgot = NULL;
1384 splt = NULL;
1385 sgotplt = NULL;
1386 sreloc = NULL;
1387
1388 rel = relocs;
1389 relend = relocs + input_section->reloc_count;
1390 for (; rel < relend; rel++)
1391 {
1392 int r_type;
1393 reloc_howto_type *howto;
1394 unsigned long r_symndx;
1395 struct elf_link_hash_entry *h;
1396 Elf_Internal_Sym *sym;
1397 asection *sec;
1398 bfd_vma relocation;
1399 bfd_reloc_status_type r;
1400
1401 r_type = ELF32_R_TYPE (rel->r_info);
1402 if (r_type < 0 || r_type >= (int) R_VAX_max)
1403 {
1404 bfd_set_error (bfd_error_bad_value);
b34976b6 1405 return FALSE;
90ace9e9
JT
1406 }
1407 howto = howto_table + r_type;
1408
f0fe0e16 1409 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1410 h = NULL;
1411 sym = NULL;
1412 sec = NULL;
1413 if (r_symndx < symtab_hdr->sh_info)
1414 {
1415 sym = local_syms + r_symndx;
1416 sec = local_sections[r_symndx];
8517fae7 1417 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1418 }
1419 else
1420 {
560e09e9
NC
1421 bfd_boolean unresolved_reloc;
1422 bfd_boolean warned;
1423
b2a8e766
AM
1424 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1425 r_symndx, symtab_hdr, sym_hashes,
1426 h, sec, relocation,
1427 unresolved_reloc, warned);
ce71b576 1428
560e09e9 1429 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1430 || h->root.type == bfd_link_hash_defweak)
560e09e9 1431 && ((r_type == R_VAX_PLT32
90ace9e9 1432 && h->plt.offset != (bfd_vma) -1
fe723c87 1433 && !h->forced_local
90ace9e9
JT
1434 && elf_hash_table (info)->dynamic_sections_created)
1435 || (r_type == R_VAX_GOT32
fe723c87
MT
1436 && h->got.offset != (bfd_vma) -1
1437 && !h->forced_local
90ace9e9
JT
1438 && elf_hash_table (info)->dynamic_sections_created
1439 && (! info->shared
1440 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1441 || !h->def_regular))
90ace9e9
JT
1442 || (info->shared
1443 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1444 || !h->def_regular)
90ace9e9
JT
1445 && ((input_section->flags & SEC_ALLOC) != 0
1446 /* DWARF will emit R_VAX_32 relocations in its
1447 sections against symbols defined externally
1448 in shared libraries. We can't do anything
1449 with them here. */
1450
1451 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1452 && h->def_dynamic))
90ace9e9
JT
1453 && (r_type == R_VAX_8
1454 || r_type == R_VAX_16
fe723c87 1455 || r_type == R_VAX_32))))
560e09e9
NC
1456 /* In these cases, we don't need the relocation
1457 value. We check specially because in some
1458 obscure cases sec->output_section will be NULL. */
90ace9e9 1459 relocation = 0;
90ace9e9
JT
1460 }
1461
dbaa2011 1462 if (sec != NULL && discarded_section (sec))
e4067dbb 1463 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1464 rel, 1, relend, howto, 0, contents);
ab96bf03
AM
1465
1466 if (info->relocatable)
1467 continue;
1468
90ace9e9
JT
1469 switch (r_type)
1470 {
1471 case R_VAX_GOT32:
1472 /* Relocation is to the address of the entry for this symbol
1473 in the global offset table. */
7b6021f1
MR
1474 if (h == NULL
1475 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1476 || h->got.offset == (bfd_vma) -1
1477 || h->forced_local)
90ace9e9
JT
1478 break;
1479
1480 /* Relocation is the offset of the entry for this symbol in
1481 the global offset table. */
1482
1483 {
886815b2 1484 bfd_boolean dyn;
90ace9e9
JT
1485 bfd_vma off;
1486
90ace9e9
JT
1487 if (sgot == NULL)
1488 {
3d4d4302 1489 sgot = bfd_get_linker_section (dynobj, ".got");
90ace9e9
JT
1490 BFD_ASSERT (sgot != NULL);
1491 }
1492
1493 BFD_ASSERT (h != NULL);
1494 off = h->got.offset;
1495 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1496 BFD_ASSERT (off < sgot->size);
90ace9e9 1497
886815b2
MR
1498 dyn = elf_hash_table (info)->dynamic_sections_created;
1499 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
1500 || (info->shared
1501 && SYMBOL_REFERENCES_LOCAL (info, h)))
90ace9e9
JT
1502 {
1503 /* The symbol was forced to be local
1504 because of a version file.. We must initialize
1505 this entry in the global offset table. Since
1506 the offset must always be a multiple of 4, we
1507 use the least significant bit to record whether
1508 we have initialized it already.
1509
1510 When doing a dynamic link, we create a .rela.got
1511 relocation entry to initialize the value. This
1512 is done in the finish_dynamic_symbol routine. */
1513 if ((off & 1) != 0)
1514 off &= ~1;
1515 else
1516 {
1517 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1518 sgot->contents + off);
1519 h->got.offset |= 1;
1520 }
1521 } else {
1522 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1523 }
1524
1525 relocation = sgot->output_offset + off;
b29635ba 1526 /* The GOT relocation uses the addend. */
90ace9e9
JT
1527 rel->r_addend = 0;
1528
b29635ba
JT
1529 /* Change the reference to be indirect. */
1530 contents[rel->r_offset - 1] |= 0x10;
1531 relocation += sgot->output_section->vma;
90ace9e9
JT
1532 }
1533 break;
1534
04981bc1
MR
1535 case R_VAX_PC32:
1536 /* If we are creating an executable and the function this
1537 reloc refers to is in a shared lib, then we made a PLT
1538 entry for this symbol and need to handle the reloc like
1539 a PLT reloc. */
1540 if (info->shared)
1541 goto r_vax_pc32_shared;
1542 /* Fall through. */
90ace9e9
JT
1543 case R_VAX_PLT32:
1544 /* Relocation is to the entry for this symbol in the
1545 procedure linkage table. */
1546
1547 /* Resolve a PLTxx reloc against a local symbol directly,
1548 without using the procedure linkage table. */
7b6021f1
MR
1549 if (h == NULL
1550 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1551 || h->forced_local)
90ace9e9
JT
1552 break;
1553
1554 if (h->plt.offset == (bfd_vma) -1
1555 || !elf_hash_table (info)->dynamic_sections_created)
1556 {
1557 /* We didn't make a PLT entry for this symbol. This
1558 happens when statically linking PIC code, or when
1559 using -Bsymbolic. */
1560 break;
1561 }
1562
1563 if (splt == NULL)
1564 {
3d4d4302 1565 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1566 BFD_ASSERT (splt != NULL);
1567 }
1568
1569 if (sgotplt == NULL)
1570 {
3d4d4302 1571 sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
d76b263e 1572 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1573 }
1574
1575 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1576
1577 /* Get the offset into the .got table of the entry that
1578 corresponds to this function. Each .got entry is 4 bytes.
1579 The first two are reserved. */
1580 got_offset = (plt_index + 3) * 4;
1581
9e86195c 1582 /* We want the relocation to point into the .got.plt instead
cedb70c5 1583 of the plt itself. */
90ace9e9
JT
1584 relocation = (sgotplt->output_section->vma
1585 + sgotplt->output_offset
1586 + got_offset);
1587 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1588 if (rel->r_addend == 2)
1589 {
1590 h->plt.offset |= 1;
1591 }
1592 else if (rel->r_addend != 0)
1593 (*_bfd_error_handler)
1594 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1595 bfd_get_filename (input_bfd), rel->r_addend,
1596 h->root.root.string,
1597 bfd_get_section_name (input_bfd, input_section));
1598 rel->r_addend = 0;
1599
1600 break;
1601
1602 case R_VAX_PC8:
1603 case R_VAX_PC16:
04981bc1 1604 r_vax_pc32_shared:
7b6021f1
MR
1605 if (h == NULL
1606 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1607 || h->forced_local)
90ace9e9
JT
1608 break;
1609 /* Fall through. */
1610 case R_VAX_8:
1611 case R_VAX_16:
1612 case R_VAX_32:
1613 if (info->shared
cf35638d 1614 && r_symndx != STN_UNDEF
90ace9e9
JT
1615 && (input_section->flags & SEC_ALLOC) != 0
1616 && ((r_type != R_VAX_PC8
1617 && r_type != R_VAX_PC16
1618 && r_type != R_VAX_PC32)
da6bcfca
MT
1619 || ((input_section->flags & SEC_CODE)
1620 && (!info->symbolic
1621 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1622 {
1623 Elf_Internal_Rela outrel;
947216bf 1624 bfd_byte *loc;
b34976b6 1625 bfd_boolean skip, relocate;
90ace9e9
JT
1626
1627 /* When generating a shared object, these relocations
1628 are copied into the output file to be resolved at run
1629 time. */
90ace9e9
JT
1630 if (sreloc == NULL)
1631 {
83bac4b0
NC
1632 sreloc = _bfd_elf_get_dynamic_reloc_section
1633 (input_bfd, input_section, /*rela?*/ TRUE);
1634 if (sreloc == NULL)
b34976b6 1635 return FALSE;
90ace9e9
JT
1636 }
1637
b34976b6
AM
1638 skip = FALSE;
1639 relocate = FALSE;
90ace9e9
JT
1640
1641 outrel.r_offset =
1642 _bfd_elf_section_offset (output_bfd, info, input_section,
1643 rel->r_offset);
1644 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1645 skip = TRUE;
90ace9e9 1646 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1647 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1648 outrel.r_offset += (input_section->output_section->vma
1649 + input_section->output_offset);
1650
1651 if (skip)
1652 memset (&outrel, 0, sizeof outrel);
1653 /* h->dynindx may be -1 if the symbol was marked to
1654 become local. */
1655 else if (h != NULL
1656 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1657 || !h->def_regular))
90ace9e9
JT
1658 {
1659 BFD_ASSERT (h->dynindx != -1);
1660 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1661 outrel.r_addend = relocation + rel->r_addend;
1662 }
1663 else
1664 {
1665 if (r_type == R_VAX_32)
1666 {
b34976b6 1667 relocate = TRUE;
90ace9e9
JT
1668 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1669 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1670 &contents[rel->r_offset]) == 0);
1671 outrel.r_addend = relocation + rel->r_addend;
1672 }
1673 else
1674 {
1675 long indx;
1676
8517fae7 1677 if (bfd_is_abs_section (sec))
90ace9e9
JT
1678 indx = 0;
1679 else if (sec == NULL || sec->owner == NULL)
1680 {
1681 bfd_set_error (bfd_error_bad_value);
b34976b6 1682 return FALSE;
90ace9e9
JT
1683 }
1684 else
1685 {
1686 asection *osec;
1687
74541ad4
AM
1688 /* We are turning this relocation into one
1689 against a section symbol. It would be
1690 proper to subtract the symbol's value,
1691 osec->vma, from the emitted reloc addend,
1692 but ld.so expects buggy relocs. */
90ace9e9
JT
1693 osec = sec->output_section;
1694 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1695 if (indx == 0)
1696 {
1697 struct elf_link_hash_table *htab;
1698 htab = elf_hash_table (info);
1699 osec = htab->text_index_section;
1700 indx = elf_section_data (osec)->dynindx;
1701 }
1702 BFD_ASSERT (indx != 0);
90ace9e9
JT
1703 }
1704
1705 outrel.r_info = ELF32_R_INFO (indx, r_type);
1706 outrel.r_addend = relocation + rel->r_addend;
1707 }
1708 }
1709
ddd74d3c 1710 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1711 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1712 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1713 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1714 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1715 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1716 {
1717 if (h != NULL)
1718 (*_bfd_error_handler)
1719 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1720 bfd_get_filename (input_bfd), howto->name,
1721 h->root.root.string,
1722 bfd_get_section_name (input_bfd, input_section));
1723 else
1724 (*_bfd_error_handler)
1725 (_("%s: warning: %s relocation to 0x%x from %s section"),
1726 bfd_get_filename (input_bfd), howto->name,
1727 outrel.r_addend,
1728 bfd_get_section_name (input_bfd, input_section));
1729 }
947216bf
AM
1730 loc = sreloc->contents;
1731 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1732 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1733
1734 /* This reloc will be computed at runtime, so there's no
1735 need to do anything now, except for R_VAX_32
1736 relocations that have been turned into
1737 R_VAX_RELATIVE. */
1738 if (!relocate)
1739 continue;
1740 }
1741
1742 break;
1743
1744 case R_VAX_GNU_VTINHERIT:
1745 case R_VAX_GNU_VTENTRY:
1746 /* These are no-ops in the end. */
1747 continue;
1748
1749 default:
1750 break;
1751 }
1752
b34976b6 1753 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1754 So subtract the difference from the relocation amount since we can't
1755 add it to the offset. */
90ace9e9 1756 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1757 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1758
1759 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1760 contents, rel->r_offset,
1761 relocation, rel->r_addend);
1762
1763 if (r != bfd_reloc_ok)
1764 {
1765 switch (r)
1766 {
1767 default:
1768 case bfd_reloc_outofrange:
1769 abort ();
1770 case bfd_reloc_overflow:
1771 {
1772 const char *name;
1773
1774 if (h != NULL)
dfeffb9f 1775 name = NULL;
90ace9e9
JT
1776 else
1777 {
1778 name = bfd_elf_string_from_elf_section (input_bfd,
1779 symtab_hdr->sh_link,
1780 sym->st_name);
1781 if (name == NULL)
b34976b6 1782 return FALSE;
90ace9e9
JT
1783 if (*name == '\0')
1784 name = bfd_section_name (input_bfd, sec);
1785 }
1786 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1787 (info, (h ? &h->root : NULL), name, howto->name,
1788 (bfd_vma) 0, input_bfd, input_section,
1789 rel->r_offset)))
b34976b6 1790 return FALSE;
90ace9e9
JT
1791 }
1792 break;
1793 }
1794 }
1795 }
1796
b34976b6 1797 return TRUE;
90ace9e9
JT
1798}
1799
1800/* Finish up dynamic symbol handling. We set the contents of various
1801 dynamic sections here. */
1802
b34976b6 1803static bfd_boolean
ce71b576
NC
1804elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1805 struct elf_link_hash_entry *h,
1806 Elf_Internal_Sym *sym)
90ace9e9
JT
1807{
1808 bfd *dynobj;
1809
1810 dynobj = elf_hash_table (info)->dynobj;
1811
1812 if (h->plt.offset != (bfd_vma) -1)
1813 {
1814 asection *splt;
1815 asection *sgot;
1816 asection *srela;
1817 bfd_vma plt_index;
1818 bfd_vma got_offset;
1819 bfd_vma addend;
1820 Elf_Internal_Rela rela;
947216bf 1821 bfd_byte *loc;
90ace9e9
JT
1822
1823 /* This symbol has an entry in the procedure linkage table. Set
1824 it up. */
90ace9e9
JT
1825 BFD_ASSERT (h->dynindx != -1);
1826
3d4d4302
AM
1827 splt = bfd_get_linker_section (dynobj, ".plt");
1828 sgot = bfd_get_linker_section (dynobj, ".got.plt");
1829 srela = bfd_get_linker_section (dynobj, ".rela.plt");
90ace9e9
JT
1830 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1831
1832 addend = 2 * (h->plt.offset & 1);
1833 h->plt.offset &= ~1;
1834
1835 /* Get the index in the procedure linkage table which
1836 corresponds to this symbol. This is the index of this symbol
1837 in all the symbols for which we are making plt entries. The
1838 first entry in the procedure linkage table is reserved. */
1839 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1840
1841 /* Get the offset into the .got table of the entry that
1842 corresponds to this function. Each .got entry is 4 bytes.
1843 The first two are reserved. */
1844 got_offset = (plt_index + 3) * 4;
1845
1846 /* Fill in the entry in the procedure linkage table. */
1847 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1848 PLT_ENTRY_SIZE);
1849
1850 /* The offset is relative to the first extension word. */
1851 bfd_put_32 (output_bfd,
1852 -(h->plt.offset + 8),
1853 splt->contents + h->plt.offset + 4);
1854
1855 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1856 splt->contents + h->plt.offset + 8);
1857
1858 /* Fill in the entry in the global offset table. */
1859 bfd_put_32 (output_bfd,
1860 (splt->output_section->vma
1861 + splt->output_offset
1862 + h->plt.offset) + addend,
1863 sgot->contents + got_offset);
1864
1865 /* Fill in the entry in the .rela.plt section. */
1866 rela.r_offset = (sgot->output_section->vma
1867 + sgot->output_offset
1868 + got_offset);
1869 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1870 rela.r_addend = addend;
947216bf
AM
1871 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1872 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1873
f5385ebf 1874 if (!h->def_regular)
90ace9e9
JT
1875 {
1876 /* Mark the symbol as undefined, rather than as defined in
1877 the .plt section. Leave the value alone. */
1878 sym->st_shndx = SHN_UNDEF;
1879 }
1880 }
1881
1882 if (h->got.offset != (bfd_vma) -1)
1883 {
1884 asection *sgot;
1885 asection *srela;
1886 Elf_Internal_Rela rela;
947216bf 1887 bfd_byte *loc;
90ace9e9
JT
1888
1889 /* This symbol has an entry in the global offset table. Set it
1890 up. */
3d4d4302
AM
1891 sgot = bfd_get_linker_section (dynobj, ".got");
1892 srela = bfd_get_linker_section (dynobj, ".rela.got");
90ace9e9
JT
1893 BFD_ASSERT (sgot != NULL && srela != NULL);
1894
1895 rela.r_offset = (sgot->output_section->vma
1896 + sgot->output_offset
1897 + (h->got.offset &~ 1));
1898
1899 /* If the symbol was forced to be local because of a version file
1900 locally we just want to emit a RELATIVE reloc. The entry in
1901 the global offset table will already have been initialized in
1902 the relocate_section function. */
1903 if (info->shared
1904 && h->dynindx == -1
f5385ebf 1905 && h->def_regular)
90ace9e9
JT
1906 {
1907 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1908 }
1909 else
1910 {
1911 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1912 }
1913 rela.r_addend = bfd_get_signed_32 (output_bfd,
1914 (sgot->contents
1915 + (h->got.offset & ~1)));
1916
947216bf
AM
1917 loc = srela->contents;
1918 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1919 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1920 }
1921
f5385ebf 1922 if (h->needs_copy)
90ace9e9
JT
1923 {
1924 asection *s;
1925 Elf_Internal_Rela rela;
947216bf 1926 bfd_byte *loc;
90ace9e9
JT
1927
1928 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1929 BFD_ASSERT (h->dynindx != -1
1930 && (h->root.type == bfd_link_hash_defined
1931 || h->root.type == bfd_link_hash_defweak));
1932
3d4d4302 1933 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1934 BFD_ASSERT (s != NULL);
1935
1936 rela.r_offset = (h->root.u.def.value
1937 + h->root.u.def.section->output_section->vma
1938 + h->root.u.def.section->output_offset);
1939 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1940 rela.r_addend = 0;
947216bf
AM
1941 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1942 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1943 }
1944
1945 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1946 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1947 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1948 sym->st_shndx = SHN_ABS;
1949
b34976b6 1950 return TRUE;
90ace9e9
JT
1951}
1952
1953/* Finish up the dynamic sections. */
1954
b34976b6 1955static bfd_boolean
ce71b576 1956elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1957{
1958 bfd *dynobj;
1959 asection *sgot;
1960 asection *sdyn;
1961
1962 dynobj = elf_hash_table (info)->dynobj;
1963
3d4d4302 1964 sgot = bfd_get_linker_section (dynobj, ".got.plt");
90ace9e9 1965 BFD_ASSERT (sgot != NULL);
3d4d4302 1966 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1967
1968 if (elf_hash_table (info)->dynamic_sections_created)
1969 {
1970 asection *splt;
1971 Elf32_External_Dyn *dyncon, *dynconend;
1972
3d4d4302 1973 splt = bfd_get_linker_section (dynobj, ".plt");
90ace9e9
JT
1974 BFD_ASSERT (splt != NULL && sdyn != NULL);
1975
1976 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1977 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1978 for (; dyncon < dynconend; dyncon++)
1979 {
1980 Elf_Internal_Dyn dyn;
1981 const char *name;
1982 asection *s;
1983
1984 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1985
1986 switch (dyn.d_tag)
1987 {
1988 default:
1989 break;
1990
1991 case DT_PLTGOT:
1992 name = ".got";
1993 goto get_vma;
1994 case DT_JMPREL:
1995 name = ".rela.plt";
1996 get_vma:
1997 s = bfd_get_section_by_name (output_bfd, name);
1998 BFD_ASSERT (s != NULL);
1999 dyn.d_un.d_ptr = s->vma;
2000 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2001 break;
2002
2003 case DT_PLTRELSZ:
2004 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2005 BFD_ASSERT (s != NULL);
eea6121a 2006 dyn.d_un.d_val = s->size;
90ace9e9
JT
2007 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2008 break;
2009
2010 case DT_RELASZ:
2011 /* The procedure linkage table relocs (DT_JMPREL) should
2012 not be included in the overall relocs (DT_RELA).
2013 Therefore, we override the DT_RELASZ entry here to
2014 make it not include the JMPREL relocs. Since the
2015 linker script arranges for .rela.plt to follow all
2016 other relocation sections, we don't have to worry
2017 about changing the DT_RELA entry. */
2018 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2019 if (s != NULL)
eea6121a 2020 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2021 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2022 break;
2023 }
2024 }
2025
2026 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2027 if (splt->size > 0)
90ace9e9
JT
2028 {
2029 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2030 bfd_put_32 (output_bfd,
2031 (sgot->output_section->vma
2032 + sgot->output_offset + 4
2033 - (splt->output_section->vma + 6)),
2034 splt->contents + 2);
2035 bfd_put_32 (output_bfd,
2036 (sgot->output_section->vma
2037 + sgot->output_offset + 8
2038 - (splt->output_section->vma + 12)),
2039 splt->contents + 8);
cedb70c5 2040 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2041 = PLT_ENTRY_SIZE;
2042 }
2043 }
2044
2045 /* Fill in the first three entries in the global offset table. */
eea6121a 2046 if (sgot->size > 0)
90ace9e9
JT
2047 {
2048 if (sdyn == NULL)
2049 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2050 else
2051 bfd_put_32 (output_bfd,
2052 sdyn->output_section->vma + sdyn->output_offset,
2053 sgot->contents);
2054 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2055 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2056 }
2057
2058 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2059
b34976b6 2060 return TRUE;
90ace9e9
JT
2061}
2062
9b90d8fd 2063static enum elf_reloc_type_class
7e612e98
AM
2064elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
2065 const asection *rel_sec ATTRIBUTE_UNUSED,
2066 const Elf_Internal_Rela *rela)
9b90d8fd
MR
2067{
2068 switch ((int) ELF32_R_TYPE (rela->r_info))
2069 {
2070 case R_VAX_RELATIVE:
2071 return reloc_class_relative;
2072 case R_VAX_JMP_SLOT:
2073 return reloc_class_plt;
2074 case R_VAX_COPY:
2075 return reloc_class_copy;
2076 default:
2077 return reloc_class_normal;
2078 }
2079}
2080
6db7e006
MR
2081static bfd_vma
2082elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
2083 const arelent *rel ATTRIBUTE_UNUSED)
2084{
2085 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
2086}
2087
90ace9e9
JT
2088#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2089#define TARGET_LITTLE_NAME "elf32-vax"
2090#define ELF_MACHINE_CODE EM_VAX
2091#define ELF_MAXPAGESIZE 0x1000
2092
2093#define elf_backend_create_dynamic_sections \
2094 _bfd_elf_create_dynamic_sections
2095#define bfd_elf32_bfd_link_hash_table_create \
2096 elf_vax_link_hash_table_create
c152c796 2097#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2098
2099#define elf_backend_check_relocs elf_vax_check_relocs
2100#define elf_backend_adjust_dynamic_symbol \
2101 elf_vax_adjust_dynamic_symbol
fac3d241
MR
2102#define elf_backend_always_size_sections \
2103 elf_vax_always_size_sections
90ace9e9
JT
2104#define elf_backend_size_dynamic_sections \
2105 elf_vax_size_dynamic_sections
74541ad4 2106#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2107#define elf_backend_relocate_section elf_vax_relocate_section
2108#define elf_backend_finish_dynamic_symbol \
2109 elf_vax_finish_dynamic_symbol
2110#define elf_backend_finish_dynamic_sections \
2111 elf_vax_finish_dynamic_sections
9b90d8fd 2112#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9
JT
2113#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2114#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
6db7e006 2115#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9
JT
2116#define bfd_elf32_bfd_merge_private_bfd_data \
2117 elf32_vax_merge_private_bfd_data
2118#define bfd_elf32_bfd_set_private_flags \
2119 elf32_vax_set_private_flags
2120#define bfd_elf32_bfd_print_private_bfd_data \
2121 elf32_vax_print_private_bfd_data
2122
2123#define elf_backend_can_gc_sections 1
2124#define elf_backend_want_got_plt 1
2125#define elf_backend_plt_readonly 1
2126#define elf_backend_want_plt_sym 0
2127#define elf_backend_got_header_size 16
f0fe0e16 2128#define elf_backend_rela_normal 1
90ace9e9
JT
2129
2130#include "elf32-target.h"
This page took 0.705954 seconds and 4 git commands to generate.