2002-11-30 Nathanael Nerode <neroden@gcc.gnu.org>
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9
JT
1/* VAX series support for 32-bit ELF
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002
3 Free Software Foundation, Inc.
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
6This file is part of BFD, the Binary File Descriptor library.
7
8This program is free software; you can redistribute it and/or modify
9it under the terms of the GNU General Public License as published by
10the Free Software Foundation; either version 2 of the License, or
11(at your option) any later version.
12
13This program is distributed in the hope that it will be useful,
14but WITHOUT ANY WARRANTY; without even the implied warranty of
15MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16GNU General Public License for more details.
17
18You should have received a copy of the GNU General Public License
19along with this program; if not, write to the Free Software
20Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
21
22#include "bfd.h"
23#include "sysdep.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
29static reloc_howto_type *reloc_type_lookup
30 PARAMS ((bfd *, bfd_reloc_code_real_type));
31static void rtype_to_howto
947216bf 32 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
90ace9e9
JT
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc
34 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create
36 PARAMS ((bfd *));
37static boolean elf_vax_check_relocs
38 PARAMS ((bfd *, struct bfd_link_info *, asection *,
39 const Elf_Internal_Rela *));
40static asection *elf_vax_gc_mark_hook
1e2f5b6e 41 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
90ace9e9
JT
42 struct elf_link_hash_entry *, Elf_Internal_Sym *));
43static boolean elf_vax_gc_sweep_hook
44 PARAMS ((bfd *, struct bfd_link_info *, asection *,
45 const Elf_Internal_Rela *));
46static boolean elf_vax_adjust_dynamic_symbol
47 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
48static boolean elf_vax_size_dynamic_sections
49 PARAMS ((bfd *, struct bfd_link_info *));
50static boolean elf_vax_relocate_section
51 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
52 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
53static boolean elf_vax_finish_dynamic_symbol
54 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
55 Elf_Internal_Sym *));
56static boolean elf_vax_finish_dynamic_sections
57 PARAMS ((bfd *, struct bfd_link_info *));
58
59static boolean elf32_vax_set_private_flags
60 PARAMS ((bfd *, flagword));
61static boolean elf32_vax_merge_private_bfd_data
62 PARAMS ((bfd *, bfd *));
63static boolean elf32_vax_print_private_bfd_data
64 PARAMS ((bfd *, PTR));
65
66static reloc_howto_type howto_table[] = {
67 HOWTO (R_VAX_NONE, /* type */
68 0, /* rightshift */
69 0, /* size (0 = byte, 1 = short, 2 = long) */
70 0, /* bitsize */
71 false, /* pc_relative */
72 0, /* bitpos */
73 complain_overflow_dont, /* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_VAX_NONE", /* name */
76 false, /* partial_inplace */
77 0, /* src_mask */
78 0x00000000, /* dst_mask */
79 false), /* pcrel_offset */
80
81 HOWTO (R_VAX_32, /* type */
82 0, /* rightshift */
83 2, /* size (0 = byte, 1 = short, 2 = long) */
84 32, /* bitsize */
85 false, /* pc_relative */
86 0, /* bitpos */
87 complain_overflow_bitfield, /* complain_on_overflow */
88 bfd_elf_generic_reloc, /* special_function */
89 "R_VAX_32", /* name */
90 false, /* partial_inplace */
91 0, /* src_mask */
92 0xffffffff, /* dst_mask */
93 false), /* pcrel_offset */
94
95 HOWTO (R_VAX_16, /* type */
96 0, /* rightshift */
97 1, /* size (0 = byte, 1 = short, 2 = long) */
98 16, /* bitsize */
99 false, /* pc_relative */
100 0, /* bitpos */
101 complain_overflow_bitfield, /* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_VAX_16", /* name */
104 false, /* partial_inplace */
105 0, /* src_mask */
106 0x0000ffff, /* dst_mask */
107 false), /* pcrel_offset */
108
109 HOWTO (R_VAX_8, /* type */
110 0, /* rightshift */
111 0, /* size (0 = byte, 1 = short, 2 = long) */
112 8, /* bitsize */
113 false, /* pc_relative */
114 0, /* bitpos */
115 complain_overflow_bitfield, /* complain_on_overflow */
116 bfd_elf_generic_reloc, /* special_function */
117 "R_VAX_8", /* name */
118 false, /* partial_inplace */
119 0, /* src_mask */
120 0x000000ff, /* dst_mask */
121 false), /* pcrel_offset */
122
123 HOWTO (R_VAX_PC32, /* type */
124 0, /* rightshift */
125 2, /* size (0 = byte, 1 = short, 2 = long) */
126 32, /* bitsize */
127 true, /* pc_relative */
128 0, /* bitpos */
129 complain_overflow_bitfield, /* complain_on_overflow */
130 bfd_elf_generic_reloc, /* special_function */
131 "R_VAX_PC32", /* name */
132 false, /* partial_inplace */
133 0, /* src_mask */
134 0xffffffff, /* dst_mask */
135 true), /* pcrel_offset */
136
137 HOWTO (R_VAX_PC16, /* type */
138 0, /* rightshift */
139 1, /* size (0 = byte, 1 = short, 2 = long) */
140 16, /* bitsize */
141 true, /* pc_relative */
142 0, /* bitpos */
143 complain_overflow_signed, /* complain_on_overflow */
144 bfd_elf_generic_reloc, /* special_function */
145 "R_VAX_PC16", /* name */
146 false, /* partial_inplace */
147 0, /* src_mask */
148 0x0000ffff, /* dst_mask */
149 true), /* pcrel_offset */
150
151 HOWTO (R_VAX_PC8, /* type */
152 0, /* rightshift */
153 0, /* size (0 = byte, 1 = short, 2 = long) */
154 8, /* bitsize */
155 true, /* pc_relative */
156 0, /* bitpos */
157 complain_overflow_signed, /* complain_on_overflow */
158 bfd_elf_generic_reloc, /* special_function */
159 "R_VAX_PC8", /* name */
160 false, /* partial_inplace */
161 0, /* src_mask */
162 0x000000ff, /* dst_mask */
163 true), /* pcrel_offset */
164
165 HOWTO (R_VAX_GOT32, /* type */
166 0, /* rightshift */
167 2, /* size (0 = byte, 1 = short, 2 = long) */
168 32, /* bitsize */
169 true, /* pc_relative */
170 0, /* bitpos */
171 complain_overflow_bitfield, /* complain_on_overflow */
172 bfd_elf_generic_reloc, /* special_function */
173 "R_VAX_GOT32", /* name */
174 false, /* partial_inplace */
175 0, /* src_mask */
176 0xffffffff, /* dst_mask */
177 true), /* pcrel_offset */
178
179 EMPTY_HOWTO (-1),
180 EMPTY_HOWTO (-1),
181 EMPTY_HOWTO (-1),
182 EMPTY_HOWTO (-1),
183 EMPTY_HOWTO (-1),
184
185 HOWTO (R_VAX_PLT32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
189 true, /* pc_relative */
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_VAX_PLT32", /* name */
194 false, /* partial_inplace */
195 0, /* src_mask */
196 0xffffffff, /* dst_mask */
197 true), /* pcrel_offset */
198
199 EMPTY_HOWTO (-1),
200 EMPTY_HOWTO (-1),
201 EMPTY_HOWTO (-1),
202 EMPTY_HOWTO (-1),
203 EMPTY_HOWTO (-1),
204
205 HOWTO (R_VAX_COPY, /* type */
206 0, /* rightshift */
207 0, /* size (0 = byte, 1 = short, 2 = long) */
208 0, /* bitsize */
209 false, /* pc_relative */
210 0, /* bitpos */
211 complain_overflow_dont, /* complain_on_overflow */
212 bfd_elf_generic_reloc, /* special_function */
213 "R_VAX_COPY", /* name */
214 false, /* partial_inplace */
215 0, /* src_mask */
216 0xffffffff, /* dst_mask */
217 false), /* pcrel_offset */
218
219 HOWTO (R_VAX_GLOB_DAT, /* type */
220 0, /* rightshift */
221 2, /* size (0 = byte, 1 = short, 2 = long) */
222 32, /* bitsize */
223 false, /* pc_relative */
224 0, /* bitpos */
225 complain_overflow_dont, /* complain_on_overflow */
226 bfd_elf_generic_reloc, /* special_function */
227 "R_VAX_GLOB_DAT", /* name */
228 false, /* partial_inplace */
229 0, /* src_mask */
230 0xffffffff, /* dst_mask */
231 false), /* pcrel_offset */
232
233 HOWTO (R_VAX_JMP_SLOT, /* type */
234 0, /* rightshift */
235 2, /* size (0 = byte, 1 = short, 2 = long) */
236 32, /* bitsize */
237 false, /* pc_relative */
238 0, /* bitpos */
239 complain_overflow_dont, /* complain_on_overflow */
240 bfd_elf_generic_reloc, /* special_function */
241 "R_VAX_JMP_SLOT", /* name */
242 false, /* partial_inplace */
243 0, /* src_mask */
244 0xffffffff, /* dst_mask */
245 false), /* pcrel_offset */
246
247 HOWTO (R_VAX_RELATIVE, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 32, /* bitsize */
251 false, /* pc_relative */
252 0, /* bitpos */
253 complain_overflow_dont, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_VAX_RELATIVE", /* name */
256 false, /* partial_inplace */
257 0, /* src_mask */
258 0xffffffff, /* dst_mask */
259 false), /* pcrel_offset */
260
261 /* GNU extension to record C++ vtable hierarchy */
262 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
263 0, /* rightshift */
264 2, /* size (0 = byte, 1 = short, 2 = long) */
265 0, /* bitsize */
266 false, /* pc_relative */
267 0, /* bitpos */
268 complain_overflow_dont, /* complain_on_overflow */
269 NULL, /* special_function */
270 "R_VAX_GNU_VTINHERIT", /* name */
271 false, /* partial_inplace */
272 0, /* src_mask */
273 0, /* dst_mask */
274 false), /* pcrel_offset */
275
276 /* GNU extension to record C++ vtable member usage */
277 HOWTO (R_VAX_GNU_VTENTRY, /* type */
278 0, /* rightshift */
279 2, /* size (0 = byte, 1 = short, 2 = long) */
280 0, /* bitsize */
281 false, /* pc_relative */
282 0, /* bitpos */
283 complain_overflow_dont, /* complain_on_overflow */
284 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
285 "R_VAX_GNU_VTENTRY", /* name */
286 false, /* partial_inplace */
287 0, /* src_mask */
288 0, /* dst_mask */
289 false), /* pcrel_offset */
290};
291
292static void
293rtype_to_howto (abfd, cache_ptr, dst)
294 bfd *abfd ATTRIBUTE_UNUSED;
295 arelent *cache_ptr;
296 Elf_Internal_Rela *dst;
297{
298 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
299 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
300}
301
302#define elf_info_to_howto rtype_to_howto
303
304static const struct
305{
306 bfd_reloc_code_real_type bfd_val;
307 int elf_val;
308} reloc_map[] = {
309 { BFD_RELOC_NONE, R_VAX_NONE },
310 { BFD_RELOC_32, R_VAX_32 },
311 { BFD_RELOC_16, R_VAX_16 },
312 { BFD_RELOC_8, R_VAX_8 },
313 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
314 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
315 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
316 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
317 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
318 { BFD_RELOC_NONE, R_VAX_COPY },
319 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
320 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
321 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
322 { BFD_RELOC_CTOR, R_VAX_32 },
323 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
324 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
325};
326
327static reloc_howto_type *
328reloc_type_lookup (abfd, code)
329 bfd *abfd ATTRIBUTE_UNUSED;
330 bfd_reloc_code_real_type code;
331{
332 unsigned int i;
333 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
334 {
335 if (reloc_map[i].bfd_val == code)
336 return &howto_table[reloc_map[i].elf_val];
337 }
338 return 0;
339}
340
341#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
417static boolean elf_vax_discard_copies
418 PARAMS ((struct elf_vax_link_hash_entry *, PTR));
419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
422static boolean elf_vax_instantiate_got_entries
423 PARAMS ((struct elf_link_hash_entry *, PTR));
424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
430 (boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
435#define elf_vax_hash_table(p) \
436 ((struct elf_vax_link_hash_table *) (p)->hash)
437
438/* Create an entry in an VAX ELF linker hash table. */
439
440static struct bfd_hash_entry *
441elf_vax_link_hash_newfunc (entry, table, string)
442 struct bfd_hash_entry *entry;
443 struct bfd_hash_table *table;
444 const char *string;
445{
446 struct elf_vax_link_hash_entry *ret =
447 (struct elf_vax_link_hash_entry *) entry;
448
449 /* Allocate the structure if it has not already been allocated by a
450 subclass. */
451 if (ret == (struct elf_vax_link_hash_entry *) NULL)
452 ret = ((struct elf_vax_link_hash_entry *)
453 bfd_hash_allocate (table,
454 sizeof (struct elf_vax_link_hash_entry)));
455 if (ret == (struct elf_vax_link_hash_entry *) NULL)
456 return (struct bfd_hash_entry *) ret;
457
458 /* Call the allocation method of the superclass. */
459 ret = ((struct elf_vax_link_hash_entry *)
460 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
461 table, string));
462 if (ret != (struct elf_vax_link_hash_entry *) NULL)
463 {
464 ret->pcrel_relocs_copied = NULL;
465 }
466
467 return (struct bfd_hash_entry *) ret;
468}
469
470/* Create an VAX ELF linker hash table. */
471
472static struct bfd_link_hash_table *
473elf_vax_link_hash_table_create (abfd)
474 bfd *abfd;
475{
476 struct elf_vax_link_hash_table *ret;
477 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
478
479 ret = (struct elf_vax_link_hash_table *) bfd_malloc (amt);
480 if (ret == (struct elf_vax_link_hash_table *) NULL)
481 return NULL;
482
483 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
484 elf_vax_link_hash_newfunc))
485 {
486 free (ret);
487 return NULL;
488 }
489
490 return &ret->root.root;
491}
492
493/* Keep vax-specific flags in the ELF header */
494static boolean
495elf32_vax_set_private_flags (abfd, flags)
496 bfd *abfd;
497 flagword flags;
498{
499 elf_elfheader (abfd)->e_flags = flags;
500 elf_flags_init (abfd) = true;
501 return true;
502}
503
504/* Merge backend specific data from an object file to the output
505 object file when linking. */
506static boolean
507elf32_vax_merge_private_bfd_data (ibfd, obfd)
508 bfd *ibfd;
509 bfd *obfd;
510{
511 flagword out_flags;
512 flagword in_flags;
513
514 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
515 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
516 return true;
517
518 in_flags = elf_elfheader (ibfd)->e_flags;
519 out_flags = elf_elfheader (obfd)->e_flags;
520
521 if (!elf_flags_init (obfd))
522 {
523 elf_flags_init (obfd) = true;
524 elf_elfheader (obfd)->e_flags = in_flags;
525 }
526
527 return true;
528}
529
530/* Display the flags field */
531static boolean
532elf32_vax_print_private_bfd_data (abfd, ptr)
533 bfd *abfd;
534 PTR ptr;
535{
536 FILE *file = (FILE *) ptr;
537
538 BFD_ASSERT (abfd != NULL && ptr != NULL);
539
540 /* Print normal ELF private data. */
541 _bfd_elf_print_private_bfd_data (abfd, ptr);
542
543 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
544
545 /* xgettext:c-format */
546 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
547
179d3252 548 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
549 fprintf (file, _(" [nonpic]"));
550
179d3252 551 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
552 fprintf (file, _(" [d-float]"));
553
179d3252 554 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
555 fprintf (file, _(" [g-float]"));
556
557 fputc ('\n', file);
558
559 return true;
560}
561/* Look through the relocs for a section during the first phase, and
562 allocate space in the global offset table or procedure linkage
563 table. */
564
565static boolean
566elf_vax_check_relocs (abfd, info, sec, relocs)
567 bfd *abfd;
568 struct bfd_link_info *info;
569 asection *sec;
570 const Elf_Internal_Rela *relocs;
571{
572 bfd *dynobj;
573 Elf_Internal_Shdr *symtab_hdr;
574 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
575 const Elf_Internal_Rela *rel;
576 const Elf_Internal_Rela *rel_end;
577 asection *sgot;
578 asection *srelgot;
579 asection *sreloc;
580
581 if (info->relocateable)
582 return true;
583
584 dynobj = elf_hash_table (info)->dynobj;
585 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
586 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
587
588 sgot = NULL;
589 srelgot = NULL;
590 sreloc = NULL;
591
592 rel_end = relocs + sec->reloc_count;
593 for (rel = relocs; rel < rel_end; rel++)
594 {
595 unsigned long r_symndx;
596 struct elf_link_hash_entry *h;
597
598 r_symndx = ELF32_R_SYM (rel->r_info);
599
600 if (r_symndx < symtab_hdr->sh_info)
601 h = NULL;
602 else
603 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
604
605 switch (ELF32_R_TYPE (rel->r_info))
606 {
607 case R_VAX_GOT32:
608 if (h != NULL
609 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
610 break;
611
612 /* This symbol requires a global offset table entry. */
613
614 if (dynobj == NULL)
615 {
616 /* Create the .got section. */
617 elf_hash_table (info)->dynobj = dynobj = abfd;
618 if (!_bfd_elf_create_got_section (dynobj, info))
619 return false;
620 }
621
622 if (sgot == NULL)
623 {
624 sgot = bfd_get_section_by_name (dynobj, ".got");
625 BFD_ASSERT (sgot != NULL);
626 }
627
628 if (srelgot == NULL
629 && (h != NULL || info->shared))
630 {
631 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
632 if (srelgot == NULL)
633 {
634 srelgot = bfd_make_section (dynobj, ".rela.got");
635 if (srelgot == NULL
636 || !bfd_set_section_flags (dynobj, srelgot,
637 (SEC_ALLOC
638 | SEC_LOAD
639 | SEC_HAS_CONTENTS
640 | SEC_IN_MEMORY
641 | SEC_LINKER_CREATED
642 | SEC_READONLY))
643 || !bfd_set_section_alignment (dynobj, srelgot, 2))
644 return false;
645 }
646 }
647
648 if (h != NULL)
649 {
650 struct elf_vax_link_hash_entry *eh;
651
652 eh = (struct elf_vax_link_hash_entry *) h;
653 if (h->got.refcount == -1)
654 {
655 h->got.refcount = 1;
656 eh->got_addend = rel->r_addend;
90ace9e9
JT
657 }
658 else
659 {
660 h->got.refcount++;
661 if (eh->got_addend != (bfd_vma) rel->r_addend)
662 (*_bfd_error_handler)
663 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
664 bfd_get_filename (abfd), rel->r_addend,
665 h->root.root.string,
666 eh->got_addend);
cedb70c5 667
90ace9e9
JT
668 }
669 }
670 break;
671
672 case R_VAX_PLT32:
673 /* This symbol requires a procedure linkage table entry. We
674 actually build the entry in adjust_dynamic_symbol,
675 because this might be a case of linking PIC code which is
676 never referenced by a dynamic object, in which case we
677 don't need to generate a procedure linkage table entry
678 after all. */
679
680 /* If this is a local symbol, we resolve it directly without
681 creating a procedure linkage table entry. */
682 if (h == NULL)
683 continue;
684
685 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
686 if (h->plt.refcount == -1)
687 h->plt.refcount = 1;
688 else
689 h->plt.refcount++;
690 break;
691
692 case R_VAX_PC8:
693 case R_VAX_PC16:
694 case R_VAX_PC32:
695 /* If we are creating a shared library and this is not a local
696 symbol, we need to copy the reloc into the shared library.
697 However when linking with -Bsymbolic and this is a global
698 symbol which is defined in an object we are including in the
699 link (i.e., DEF_REGULAR is set), then we can resolve the
700 reloc directly. At this point we have not seen all the input
701 files, so it is possible that DEF_REGULAR is not set now but
702 will be set later (it is never cleared). We account for that
703 possibility below by storing information in the
704 pcrel_relocs_copied field of the hash table entry. */
705 if (!(info->shared
706 && (sec->flags & SEC_ALLOC) != 0
707 && h != NULL
708 && (!info->symbolic
709 || (h->elf_link_hash_flags
710 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
711 {
712 if (h != NULL)
713 {
714 /* Make sure a plt entry is created for this symbol if
715 it turns out to be a function defined by a dynamic
716 object. */
717 if (h->plt.refcount == -1)
718 h->plt.refcount = 1;
719 else
720 h->plt.refcount++;
721 }
722 break;
723 }
724 /* Fall through. */
725 case R_VAX_8:
726 case R_VAX_16:
727 case R_VAX_32:
728 if (h != NULL)
729 {
730 /* Make sure a plt entry is created for this symbol if it
731 turns out to be a function defined by a dynamic object. */
732 if (h->plt.refcount == -1)
733 h->plt.refcount = 1;
734 else
735 h->plt.refcount++;
736 }
737
738 /* If we are creating a shared library, we need to copy the
739 reloc into the shared library. */
740 if (info->shared
741 && (sec->flags & SEC_ALLOC) != 0)
742 {
743 /* When creating a shared object, we must copy these
744 reloc types into the output file. We create a reloc
745 section in dynobj and make room for this reloc. */
746 if (sreloc == NULL)
747 {
748 const char *name;
749
750 name = (bfd_elf_string_from_elf_section
751 (abfd,
752 elf_elfheader (abfd)->e_shstrndx,
753 elf_section_data (sec)->rel_hdr.sh_name));
754 if (name == NULL)
755 return false;
756
757 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
758 && strcmp (bfd_get_section_name (abfd, sec),
759 name + 5) == 0);
760
761 sreloc = bfd_get_section_by_name (dynobj, name);
762 if (sreloc == NULL)
763 {
764 sreloc = bfd_make_section (dynobj, name);
765 if (sreloc == NULL
766 || !bfd_set_section_flags (dynobj, sreloc,
767 (SEC_ALLOC
768 | SEC_LOAD
769 | SEC_HAS_CONTENTS
770 | SEC_IN_MEMORY
771 | SEC_LINKER_CREATED
772 | SEC_READONLY))
773 || !bfd_set_section_alignment (dynobj, sreloc, 2))
774 return false;
775 }
776 if (sec->flags & SEC_READONLY)
777 info->flags |= DF_TEXTREL;
778 }
779
780 sreloc->_raw_size += sizeof (Elf32_External_Rela);
781
782 /* If we are linking with -Bsymbolic, we count the number of
783 PC relative relocations we have entered for this symbol,
784 so that we can discard them again if the symbol is later
785 defined by a regular object. Note that this function is
786 only called if we are using an vaxelf linker hash table,
787 which means that h is really a pointer to an
788 elf_vax_link_hash_entry. */
789 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
790 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
791 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
792 && info->symbolic)
793 {
794 struct elf_vax_link_hash_entry *eh;
795 struct elf_vax_pcrel_relocs_copied *p;
796
797 eh = (struct elf_vax_link_hash_entry *) h;
798
799 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
800 if (p->section == sreloc)
801 break;
802
803 if (p == NULL)
804 {
805 p = ((struct elf_vax_pcrel_relocs_copied *)
806 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
807 if (p == NULL)
808 return false;
809 p->next = eh->pcrel_relocs_copied;
810 eh->pcrel_relocs_copied = p;
811 p->section = sreloc;
812 p->count = 0;
813 }
814
815 ++p->count;
816 }
817 }
818
819 break;
820
821 /* This relocation describes the C++ object vtable hierarchy.
822 Reconstruct it for later use during GC. */
823 case R_VAX_GNU_VTINHERIT:
824 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
825 return false;
826 break;
827
828 /* This relocation describes which C++ vtable entries are actually
829 used. Record for later use during GC. */
830 case R_VAX_GNU_VTENTRY:
831 if (!_bfd_elf32_gc_record_vtentry (abfd, sec, h, rel->r_addend))
832 return false;
833 break;
834
835 default:
836 break;
837 }
838 }
839
840 return true;
841}
842
843/* Return the section that should be marked against GC for a given
844 relocation. */
845
846static asection *
1e2f5b6e
AM
847elf_vax_gc_mark_hook (sec, info, rel, h, sym)
848 asection *sec;
90ace9e9
JT
849 struct bfd_link_info *info ATTRIBUTE_UNUSED;
850 Elf_Internal_Rela *rel;
851 struct elf_link_hash_entry *h;
852 Elf_Internal_Sym *sym;
853{
854 if (h != NULL)
855 {
856 switch (ELF32_R_TYPE (rel->r_info))
857 {
858 case R_VAX_GNU_VTINHERIT:
859 case R_VAX_GNU_VTENTRY:
860 break;
861
862 default:
863 switch (h->root.type)
864 {
865 default:
866 break;
867
868 case bfd_link_hash_defined:
869 case bfd_link_hash_defweak:
870 return h->root.u.def.section;
871
872 case bfd_link_hash_common:
873 return h->root.u.c.p->section;
874 }
875 }
876 }
877 else
1e2f5b6e 878 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
90ace9e9
JT
879
880 return NULL;
881}
882
883/* Update the got entry reference counts for the section being removed. */
884
885static boolean
886elf_vax_gc_sweep_hook (abfd, info, sec, relocs)
887 bfd *abfd;
888 struct bfd_link_info *info;
889 asection *sec;
890 const Elf_Internal_Rela *relocs;
891{
892 Elf_Internal_Shdr *symtab_hdr;
893 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
894 const Elf_Internal_Rela *rel, *relend;
895 unsigned long r_symndx;
896 struct elf_link_hash_entry *h;
897 bfd *dynobj;
90ace9e9
JT
898
899 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
900 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
901
902 dynobj = elf_hash_table (info)->dynobj;
903 if (dynobj == NULL)
904 return true;
905
90ace9e9
JT
906 relend = relocs + sec->reloc_count;
907 for (rel = relocs; rel < relend; rel++)
908 {
909 switch (ELF32_R_TYPE (rel->r_info))
910 {
911 case R_VAX_GOT32:
912 r_symndx = ELF32_R_SYM (rel->r_info);
913 if (r_symndx >= symtab_hdr->sh_info)
914 {
915 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
916 if (h->got.refcount > 0)
b29635ba 917 --h->got.refcount;
90ace9e9
JT
918 }
919 break;
920
921 case R_VAX_PLT32:
922 case R_VAX_PC8:
923 case R_VAX_PC16:
924 case R_VAX_PC32:
925 case R_VAX_8:
926 case R_VAX_16:
927 case R_VAX_32:
928 r_symndx = ELF32_R_SYM (rel->r_info);
929 if (r_symndx >= symtab_hdr->sh_info)
930 {
931 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
932 if (h->plt.refcount > 0)
933 --h->plt.refcount;
934 }
935 break;
936
937 default:
938 break;
939 }
940 }
941
942 return true;
943}
944
945/* Adjust a symbol defined by a dynamic object and referenced by a
946 regular object. The current definition is in some section of the
947 dynamic object, but we're not including those sections. We have to
948 change the definition to something the rest of the link can
949 understand. */
950
951static boolean
952elf_vax_adjust_dynamic_symbol (info, h)
953 struct bfd_link_info *info;
954 struct elf_link_hash_entry *h;
955{
956 bfd *dynobj;
957 asection *s;
958 unsigned int power_of_two;
959
960 dynobj = elf_hash_table (info)->dynobj;
961
962 /* Make sure we know what is going on here. */
963 BFD_ASSERT (dynobj != NULL
964 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
965 || h->weakdef != NULL
966 || ((h->elf_link_hash_flags
967 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
968 && (h->elf_link_hash_flags
969 & ELF_LINK_HASH_REF_REGULAR) != 0
970 && (h->elf_link_hash_flags
971 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
972
973 /* If this is a function, put it in the procedure linkage table. We
974 will fill in the contents of the procedure linkage table later,
975 when we know the address of the .got section. */
976 if (h->type == STT_FUNC
977 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
978 {
979 if (! info->shared
980 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
981 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0
982 /* We must always create the plt entry if it was referenced
983 by a PLTxxO relocation. In this case we already recorded
984 it as a dynamic symbol. */
985 && h->dynindx == -1)
986 {
987 /* This case can occur if we saw a PLTxx reloc in an input
988 file, but the symbol was never referred to by a dynamic
989 object. In such a case, we don't actually need to build
990 a procedure linkage table, and we can just do a PCxx
991 reloc instead. */
992 BFD_ASSERT ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0);
993 h->plt.offset = (bfd_vma) -1;
994 return true;
995 }
996
997 /* GC may have rendered this entry unused. */
998 if (h->plt.refcount <= 0)
999 {
1000 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1001 h->plt.offset = (bfd_vma) -1;
1002 return true;
1003 }
1004
1005 /* Make sure this symbol is output as a dynamic symbol. */
1006 if (h->dynindx == -1)
1007 {
1008 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
1009 return false;
1010 }
1011
1012 s = bfd_get_section_by_name (dynobj, ".plt");
1013 BFD_ASSERT (s != NULL);
1014
1015 /* If this is the first .plt entry, make room for the special
1016 first entry. */
1017 if (s->_raw_size == 0)
1018 {
1019 s->_raw_size += PLT_ENTRY_SIZE;
1020 }
1021
1022 /* If this symbol is not defined in a regular file, and we are
1023 not generating a shared library, then set the symbol to this
1024 location in the .plt. This is required to make function
1025 pointers compare as equal between the normal executable and
1026 the shared library. */
1027 if (!info->shared
1028 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1029 {
1030 h->root.u.def.section = s;
1031 h->root.u.def.value = s->_raw_size;
1032 }
1033
1034 h->plt.offset = s->_raw_size;
1035
1036 /* Make room for this entry. */
1037 s->_raw_size += PLT_ENTRY_SIZE;
1038
1039 /* We also need to make an entry in the .got.plt section, which
1040 will be placed in the .got section by the linker script. */
1041
1042 s = bfd_get_section_by_name (dynobj, ".got.plt");
1043 BFD_ASSERT (s != NULL);
1044 s->_raw_size += 4;
1045
1046 /* We also need to make an entry in the .rela.plt section. */
1047
1048 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1049 BFD_ASSERT (s != NULL);
1050 s->_raw_size += sizeof (Elf32_External_Rela);
1051
1052 return true;
1053 }
1054
1055 /* Reinitialize the plt offset now that it is not used as a reference
1056 count any more. */
1057 h->plt.offset = (bfd_vma) -1;
1058
1059 /* If this is a weak symbol, and there is a real definition, the
1060 processor independent code will have arranged for us to see the
1061 real definition first, and we can just use the same value. */
1062 if (h->weakdef != NULL)
1063 {
1064 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1065 || h->weakdef->root.type == bfd_link_hash_defweak);
1066 h->root.u.def.section = h->weakdef->root.u.def.section;
1067 h->root.u.def.value = h->weakdef->root.u.def.value;
1068 return true;
1069 }
1070
1071 /* This is a reference to a symbol defined by a dynamic object which
1072 is not a function. */
1073
1074 /* If we are creating a shared library, we must presume that the
1075 only references to the symbol are via the global offset table.
1076 For such cases we need not do anything here; the relocations will
1077 be handled correctly by relocate_section. */
1078 if (info->shared)
1079 return true;
1080
1081 /* We must allocate the symbol in our .dynbss section, which will
1082 become part of the .bss section of the executable. There will be
1083 an entry for this symbol in the .dynsym section. The dynamic
1084 object will contain position independent code, so all references
1085 from the dynamic object to this symbol will go through the global
1086 offset table. The dynamic linker will use the .dynsym entry to
1087 determine the address it must put in the global offset table, so
1088 both the dynamic object and the regular object will refer to the
1089 same memory location for the variable. */
1090
1091 s = bfd_get_section_by_name (dynobj, ".dynbss");
1092 BFD_ASSERT (s != NULL);
1093
1094 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1095 copy the initial value out of the dynamic object and into the
1096 runtime process image. We need to remember the offset into the
1097 .rela.bss section we are going to use. */
1098 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1099 {
1100 asection *srel;
1101
1102 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1103 BFD_ASSERT (srel != NULL);
1104 srel->_raw_size += sizeof (Elf32_External_Rela);
1105 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1106 }
1107
1108 /* We need to figure out the alignment required for this symbol. I
1109 have no idea how ELF linkers handle this. */
1110 power_of_two = bfd_log2 (h->size);
1111 if (power_of_two > 3)
1112 power_of_two = 3;
1113
1114 /* Apply the required alignment. */
1115 s->_raw_size = BFD_ALIGN (s->_raw_size,
1116 (bfd_size_type) (1 << power_of_two));
1117 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1118 {
1119 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
1120 return false;
1121 }
1122
1123 /* Define the symbol as being at this point in the section. */
1124 h->root.u.def.section = s;
1125 h->root.u.def.value = s->_raw_size;
1126
1127 /* Increment the section size to make room for the symbol. */
1128 s->_raw_size += h->size;
1129
1130 return true;
1131}
1132
1133/* Set the sizes of the dynamic sections. */
1134
1135static boolean
1136elf_vax_size_dynamic_sections (output_bfd, info)
1137 bfd *output_bfd;
1138 struct bfd_link_info *info;
1139{
1140 bfd *dynobj;
1141 asection *s;
1142 boolean plt;
1143 boolean relocs;
1144 boolean reltext;
1145
1146 dynobj = elf_hash_table (info)->dynobj;
1147 BFD_ASSERT (dynobj != NULL);
1148
1149 if (elf_hash_table (info)->dynamic_sections_created)
1150 {
1151 /* Set the contents of the .interp section to the interpreter. */
1152 if (!info->shared)
1153 {
1154 s = bfd_get_section_by_name (dynobj, ".interp");
1155 BFD_ASSERT (s != NULL);
1156 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1157 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1158 }
1159 }
1160 else
1161 {
1162 /* We may have created entries in the .rela.got and .got sections.
1163 However, if we are not creating the dynamic sections, we will
1164 not actually use these entries. Reset the size of .rela.got
1165 and .got, which will cause it to get stripped from the output
1166 file below. */
1167 s = bfd_get_section_by_name (dynobj, ".rela.got");
1168 if (s != NULL)
1169 s->_raw_size = 0;
1170 s = bfd_get_section_by_name (dynobj, ".got.plt");
1171 if (s != NULL)
1172 s->_raw_size = 0;
1173 s = bfd_get_section_by_name (dynobj, ".got");
1174 if (s != NULL)
1175 s->_raw_size = 0;
1176 }
1177
1178 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1179 relative relocs against symbols defined in a regular object. We
1180 allocated space for them in the check_relocs routine, but we will not
1181 fill them in in the relocate_section routine. */
1182 if (info->shared && info->symbolic)
1183 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba
JT
1184 elf_vax_discard_copies,
1185 (PTR) NULL);
1186
1187 /* If this is a -Bsymbolic shared link or a static link, we need to
1188 discard all the got entries we've recorded. Otherwise, we need to
1189 instantiate (allocate space for them). */
1190 elf_link_hash_traverse (elf_hash_table (info),
1191 elf_vax_instantiate_got_entries,
1192 (PTR) info);
90ace9e9
JT
1193
1194 /* The check_relocs and adjust_dynamic_symbol entry points have
1195 determined the sizes of the various dynamic sections. Allocate
1196 memory for them. */
1197 plt = false;
1198 relocs = false;
1199 reltext = false;
1200 for (s = dynobj->sections; s != NULL; s = s->next)
1201 {
1202 const char *name;
1203 boolean strip;
1204
1205 if ((s->flags & SEC_LINKER_CREATED) == 0)
1206 continue;
1207
1208 /* It's OK to base decisions on the section name, because none
1209 of the dynobj section names depend upon the input files. */
1210 name = bfd_get_section_name (dynobj, s);
1211
1212 strip = false;
1213
1214 if (strcmp (name, ".plt") == 0)
1215 {
1216 if (s->_raw_size == 0)
1217 {
1218 /* Strip this section if we don't need it; see the
1219 comment below. */
1220 strip = true;
1221 }
1222 else
1223 {
1224 /* Remember whether there is a PLT. */
1225 plt = true;
1226 }
1227 }
1228 else if (strncmp (name, ".rela", 5) == 0)
1229 {
1230 if (s->_raw_size == 0)
1231 {
1232 /* If we don't need this section, strip it from the
1233 output file. This is mostly to handle .rela.bss and
1234 .rela.plt. We must create both sections in
1235 create_dynamic_sections, because they must be created
1236 before the linker maps input sections to output
1237 sections. The linker does that before
1238 adjust_dynamic_symbol is called, and it is that
1239 function which decides whether anything needs to go
1240 into these sections. */
1241 strip = true;
1242 }
1243 else
1244 {
1245 asection *target;
1246
1247 /* Remember whether there are any reloc sections other
1248 than .rela.plt. */
1249 if (strcmp (name, ".rela.plt") != 0)
1250 {
1251 const char *outname;
1252
1253 relocs = true;
1254
1255 /* If this relocation section applies to a read only
1256 section, then we probably need a DT_TEXTREL
1257 entry. .rela.plt is actually associated with
1258 .got.plt, which is never readonly. */
1259 outname = bfd_get_section_name (output_bfd,
1260 s->output_section);
1261 target = bfd_get_section_by_name (output_bfd, outname + 5);
1262 if (target != NULL
1263 && (target->flags & SEC_READONLY) != 0
1264 && (target->flags & SEC_ALLOC) != 0)
1265 reltext = true;
1266 }
1267
1268 /* We use the reloc_count field as a counter if we need
1269 to copy relocs into the output file. */
1270 s->reloc_count = 0;
1271 }
1272 }
624f0b25 1273 else if (strncmp (name, ".got", 4) != 0)
90ace9e9
JT
1274 {
1275 /* It's not one of our sections, so don't allocate space. */
1276 continue;
1277 }
1278
1279 if (strip)
1280 {
1281 _bfd_strip_section_from_output (info, s);
1282 continue;
1283 }
1284
1285 /* Allocate memory for the section contents. */
1286 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->_raw_size);
1287 if (s->contents == NULL && s->_raw_size != 0)
1288 return false;
1289 }
1290
1291 if (elf_hash_table (info)->dynamic_sections_created)
1292 {
1293 /* Add some entries to the .dynamic section. We fill in the
1294 values later, in elf_vax_finish_dynamic_sections, but we
1295 must add the entries now so that we get the correct size for
1296 the .dynamic section. The DT_DEBUG entry is filled in by the
1297 dynamic linker and used by the debugger. */
1298#define add_dynamic_entry(TAG, VAL) \
1299 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1300
1301 if (!info->shared)
1302 {
1303 if (!add_dynamic_entry (DT_DEBUG, 0))
1304 return false;
1305 }
1306
1307 if (plt)
1308 {
1309 if (!add_dynamic_entry (DT_PLTGOT, 0)
1310 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1311 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1312 || !add_dynamic_entry (DT_JMPREL, 0))
1313 return false;
1314 }
1315
1316 if (relocs)
1317 {
1318 if (!add_dynamic_entry (DT_RELA, 0)
1319 || !add_dynamic_entry (DT_RELASZ, 0)
1320 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1321 return false;
1322 }
1323
1324 if (reltext || (info->flags & DF_TEXTREL) != 0)
1325 {
1326 if (!add_dynamic_entry (DT_TEXTREL, 0))
1327 return false;
1328 }
1329 }
1330#undef add_dynamic_entry
1331
1332 return true;
1333}
1334
1335/* This function is called via elf_vax_link_hash_traverse if we are
1336 creating a shared object with -Bsymbolic. It discards the space
1337 allocated to copy PC relative relocs against symbols which are defined
1338 in regular objects. We allocated space for them in the check_relocs
1339 routine, but we won't fill them in in the relocate_section routine. */
1340
1341/*ARGSUSED*/
1342static boolean
1343elf_vax_discard_copies (h, ignore)
1344 struct elf_vax_link_hash_entry *h;
1345 PTR ignore ATTRIBUTE_UNUSED;
1346{
1347 struct elf_vax_pcrel_relocs_copied *s;
1348
1349 if (h->root.root.type == bfd_link_hash_warning)
1350 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1351
1352 /* We only discard relocs for symbols defined in a regular object. */
1353 if ((h->root.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1354 return true;
1355
1356 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1357 s->section->_raw_size -= s->count * sizeof (Elf32_External_Rela);
1358
1359 return true;
1360}
1361
b29635ba
JT
1362/* This function is called via elf_link_hash_traverse. It looks for entries
1363 that have GOT or PLT (.GOT) references. If creating a static object or a
1364 shared object with -Bsymbolic, it resets the reference count back to 0
1365 and sets the offset to -1 so normal PC32 relocation will be done. If
1366 creating a shared object or executable, space in the .got and .rela.got
1367 will be reserved for the symbol. */
1368
1369/*ARGSUSED*/
1370static boolean
1371elf_vax_instantiate_got_entries (h, infoptr)
1372 struct elf_link_hash_entry *h;
1373 PTR infoptr;
1374{
1375 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1376 bfd *dynobj;
1377 asection *sgot;
1378 asection *srelgot;
1379
1380 /* We don't care about non-GOT (and non-PLT) entries. */
1381 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1382 return true;
1383
1384 dynobj = elf_hash_table (info)->dynobj;
1385 if (dynobj == NULL)
1386 return true;
1387
1388 sgot = bfd_get_section_by_name (dynobj, ".got");
1389 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1390
1391 if (!elf_hash_table (info)->dynamic_sections_created
1392 || (info->shared && info->symbolic))
1393 {
1394 h->got.refcount = 0;
1395 h->got.offset = (bfd_vma) -1;
1396 h->plt.refcount = 0;
1397 h->plt.offset = (bfd_vma) -1;
1398 }
1399 else if (h->got.refcount > 0)
1400 {
1401 /* Make sure this symbol is output as a dynamic symbol. */
1402 if (h->dynindx == -1)
1403 {
1404 if (!bfd_elf32_link_record_dynamic_symbol (info, h))
1405 return false;
1406 }
1407
1408 /* Allocate space in the .got and .rela.got sections. */
1409 sgot->_raw_size += 4;
1410 srelgot->_raw_size += sizeof (Elf32_External_Rela);
1411 }
1412
1413 return true;
1414}
1415
90ace9e9
JT
1416/* Relocate an VAX ELF section. */
1417
1418static boolean
1419elf_vax_relocate_section (output_bfd, info, input_bfd, input_section,
1420 contents, relocs, local_syms, local_sections)
1421 bfd *output_bfd;
1422 struct bfd_link_info *info;
1423 bfd *input_bfd;
1424 asection *input_section;
1425 bfd_byte *contents;
1426 Elf_Internal_Rela *relocs;
1427 Elf_Internal_Sym *local_syms;
1428 asection **local_sections;
1429{
1430 bfd *dynobj;
1431 Elf_Internal_Shdr *symtab_hdr;
1432 struct elf_link_hash_entry **sym_hashes;
1433 bfd_vma *local_got_offsets;
1434 bfd_vma plt_index;
1435 bfd_vma got_offset;
1436 asection *sgot;
1437 asection *splt;
1438 asection *sgotplt;
1439 asection *sreloc;
1440 Elf_Internal_Rela *rel;
1441 Elf_Internal_Rela *relend;
1442
f0fe0e16
AM
1443 if (info->relocateable)
1444 return true;
1445
90ace9e9
JT
1446 dynobj = elf_hash_table (info)->dynobj;
1447 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1448 sym_hashes = elf_sym_hashes (input_bfd);
1449 local_got_offsets = elf_local_got_offsets (input_bfd);
1450
1451 sgot = NULL;
1452 splt = NULL;
1453 sgotplt = NULL;
1454 sreloc = NULL;
1455
1456 rel = relocs;
1457 relend = relocs + input_section->reloc_count;
1458 for (; rel < relend; rel++)
1459 {
1460 int r_type;
1461 reloc_howto_type *howto;
1462 unsigned long r_symndx;
1463 struct elf_link_hash_entry *h;
1464 Elf_Internal_Sym *sym;
1465 asection *sec;
1466 bfd_vma relocation;
1467 bfd_reloc_status_type r;
1468
1469 r_type = ELF32_R_TYPE (rel->r_info);
1470 if (r_type < 0 || r_type >= (int) R_VAX_max)
1471 {
1472 bfd_set_error (bfd_error_bad_value);
1473 return false;
1474 }
1475 howto = howto_table + r_type;
1476
90ace9e9 1477 /* This is a final link. */
f0fe0e16 1478 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1479 h = NULL;
1480 sym = NULL;
1481 sec = NULL;
1482 if (r_symndx < symtab_hdr->sh_info)
1483 {
1484 sym = local_syms + r_symndx;
1485 sec = local_sections[r_symndx];
1486 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
1487 }
1488 else
1489 {
1490 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1491 while (h->root.type == bfd_link_hash_indirect
1492 || h->root.type == bfd_link_hash_warning)
1493 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1494 if (h->root.type == bfd_link_hash_defined
1495 || h->root.type == bfd_link_hash_defweak)
1496 {
1497 sec = h->root.u.def.section;
1498 if ((r_type == R_VAX_PLT32
1499 && h->plt.offset != (bfd_vma) -1
1500 && elf_hash_table (info)->dynamic_sections_created)
1501 || (r_type == R_VAX_GOT32
1502 && strcmp (h->root.root.string,
1503 "_GLOBAL_OFFSET_TABLE_") != 0
1504 && elf_hash_table (info)->dynamic_sections_created
1505 && (! info->shared
1506 || (! info->symbolic && h->dynindx != -1)
1507 || (h->elf_link_hash_flags
1508 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1509 || (info->shared
1510 && ((! info->symbolic && h->dynindx != -1)
1511 || (h->elf_link_hash_flags
1512 & ELF_LINK_HASH_DEF_REGULAR) == 0)
1513 && ((input_section->flags & SEC_ALLOC) != 0
1514 /* DWARF will emit R_VAX_32 relocations in its
1515 sections against symbols defined externally
1516 in shared libraries. We can't do anything
1517 with them here. */
1518
1519 || ((input_section->flags & SEC_DEBUGGING) != 0
1520 && (h->elf_link_hash_flags
1521 & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
1522 && (r_type == R_VAX_8
1523 || r_type == R_VAX_16
1524 || r_type == R_VAX_32
1525 || r_type == R_VAX_PC8
1526 || r_type == R_VAX_PC16
1527 || r_type == R_VAX_PC32)))
1528 {
1529 /* In these cases, we don't need the relocation
1530 value. We check specially because in some
1531 obscure cases sec->output_section will be NULL. */
1532 relocation = 0;
1533 }
1534 else
1535 relocation = (h->root.u.def.value
1536 + sec->output_section->vma
1537 + sec->output_offset);
1538 }
1539 else if (h->root.type == bfd_link_hash_undefweak)
1540 relocation = 0;
1541 else if (info->shared
1542 && (!info->symbolic || info->allow_shlib_undefined)
1543 && !info->no_undefined
1544 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
1545 relocation = 0;
1546 else
1547 {
1548 if (!(info->callbacks->undefined_symbol
1549 (info, h->root.root.string, input_bfd,
1550 input_section, rel->r_offset,
1551 (!info->shared || info->no_undefined
1552 || ELF_ST_VISIBILITY (h->other)))))
1553 return false;
1554 relocation = 0;
1555 }
1556 }
1557
1558 switch (r_type)
1559 {
1560 case R_VAX_GOT32:
1561 /* Relocation is to the address of the entry for this symbol
1562 in the global offset table. */
b29635ba 1563 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1564 break;
1565
1566 /* Relocation is the offset of the entry for this symbol in
1567 the global offset table. */
1568
1569 {
1570 bfd_vma off;
1571
90ace9e9
JT
1572 if (sgot == NULL)
1573 {
1574 sgot = bfd_get_section_by_name (dynobj, ".got");
1575 BFD_ASSERT (sgot != NULL);
1576 }
1577
1578 BFD_ASSERT (h != NULL);
1579 off = h->got.offset;
1580 BFD_ASSERT (off != (bfd_vma) -1);
b29635ba 1581 BFD_ASSERT (off < sgot->_raw_size);
90ace9e9
JT
1582
1583 if (info->shared
1584 && h->dynindx == -1
1585 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1586 {
1587 /* The symbol was forced to be local
1588 because of a version file.. We must initialize
1589 this entry in the global offset table. Since
1590 the offset must always be a multiple of 4, we
1591 use the least significant bit to record whether
1592 we have initialized it already.
1593
1594 When doing a dynamic link, we create a .rela.got
1595 relocation entry to initialize the value. This
1596 is done in the finish_dynamic_symbol routine. */
1597 if ((off & 1) != 0)
1598 off &= ~1;
1599 else
1600 {
1601 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1602 sgot->contents + off);
1603 h->got.offset |= 1;
1604 }
1605 } else {
1606 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1607 }
1608
1609 relocation = sgot->output_offset + off;
b29635ba 1610 /* The GOT relocation uses the addend. */
90ace9e9
JT
1611 rel->r_addend = 0;
1612
b29635ba
JT
1613 /* Change the reference to be indirect. */
1614 contents[rel->r_offset - 1] |= 0x10;
1615 relocation += sgot->output_section->vma;
90ace9e9
JT
1616 }
1617 break;
1618
1619 case R_VAX_PLT32:
1620 /* Relocation is to the entry for this symbol in the
1621 procedure linkage table. */
1622
1623 /* Resolve a PLTxx reloc against a local symbol directly,
1624 without using the procedure linkage table. */
1625 if (h == NULL)
1626 break;
1627
1628 if (h->plt.offset == (bfd_vma) -1
1629 || !elf_hash_table (info)->dynamic_sections_created)
1630 {
1631 /* We didn't make a PLT entry for this symbol. This
1632 happens when statically linking PIC code, or when
1633 using -Bsymbolic. */
1634 break;
1635 }
1636
1637 if (splt == NULL)
1638 {
1639 splt = bfd_get_section_by_name (dynobj, ".plt");
1640 BFD_ASSERT (splt != NULL);
1641 }
1642
1643 if (sgotplt == NULL)
1644 {
1645 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1646 BFD_ASSERT (splt != NULL);
1647 }
1648
1649 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1650
1651 /* Get the offset into the .got table of the entry that
1652 corresponds to this function. Each .got entry is 4 bytes.
1653 The first two are reserved. */
1654 got_offset = (plt_index + 3) * 4;
1655
1656 /* We want the relocate to point into the .got.plt instead
cedb70c5 1657 of the plt itself. */
90ace9e9
JT
1658 relocation = (sgotplt->output_section->vma
1659 + sgotplt->output_offset
1660 + got_offset);
1661 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1662 if (rel->r_addend == 2)
1663 {
1664 h->plt.offset |= 1;
1665 }
1666 else if (rel->r_addend != 0)
1667 (*_bfd_error_handler)
1668 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1669 bfd_get_filename (input_bfd), rel->r_addend,
1670 h->root.root.string,
1671 bfd_get_section_name (input_bfd, input_section));
1672 rel->r_addend = 0;
1673
1674 break;
1675
1676 case R_VAX_PC8:
1677 case R_VAX_PC16:
1678 case R_VAX_PC32:
1679 if (h == NULL)
1680 break;
1681 /* Fall through. */
1682 case R_VAX_8:
1683 case R_VAX_16:
1684 case R_VAX_32:
1685 if (info->shared
1686 && r_symndx != 0
1687 && (input_section->flags & SEC_ALLOC) != 0
1688 && ((r_type != R_VAX_PC8
1689 && r_type != R_VAX_PC16
1690 && r_type != R_VAX_PC32)
1691 || (!info->symbolic
1692 || (h->elf_link_hash_flags
1693 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
1694 {
1695 Elf_Internal_Rela outrel;
947216bf 1696 bfd_byte *loc;
90ace9e9
JT
1697 boolean skip, relocate;
1698
1699 /* When generating a shared object, these relocations
1700 are copied into the output file to be resolved at run
1701 time. */
1702
1703 if (sreloc == NULL)
1704 {
1705 const char *name;
1706
1707 name = (bfd_elf_string_from_elf_section
1708 (input_bfd,
1709 elf_elfheader (input_bfd)->e_shstrndx,
1710 elf_section_data (input_section)->rel_hdr.sh_name));
1711 if (name == NULL)
1712 return false;
1713
1714 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1715 && strcmp (bfd_get_section_name (input_bfd,
1716 input_section),
1717 name + 5) == 0);
1718
1719 sreloc = bfd_get_section_by_name (dynobj, name);
1720 BFD_ASSERT (sreloc != NULL);
1721 }
1722
1723 skip = false;
1724 relocate = false;
1725
1726 outrel.r_offset =
1727 _bfd_elf_section_offset (output_bfd, info, input_section,
1728 rel->r_offset);
1729 if (outrel.r_offset == (bfd_vma) -1)
1730 skip = true;
1731 if (outrel.r_offset == (bfd_vma) -2)
1732 skip = true, relocate = true;
1733 outrel.r_offset += (input_section->output_section->vma
1734 + input_section->output_offset);
1735
1736 if (skip)
1737 memset (&outrel, 0, sizeof outrel);
1738 /* h->dynindx may be -1 if the symbol was marked to
1739 become local. */
1740 else if (h != NULL
1741 && ((! info->symbolic && h->dynindx != -1)
1742 || (h->elf_link_hash_flags
1743 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1744 {
1745 BFD_ASSERT (h->dynindx != -1);
1746 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1747 outrel.r_addend = relocation + rel->r_addend;
1748 }
1749 else
1750 {
1751 if (r_type == R_VAX_32)
1752 {
1753 relocate = true;
1754 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1755 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1756 &contents[rel->r_offset]) == 0);
1757 outrel.r_addend = relocation + rel->r_addend;
1758 }
1759 else
1760 {
1761 long indx;
1762
1763 if (h == NULL)
1764 sec = local_sections[r_symndx];
1765 else
1766 {
1767 BFD_ASSERT (h->root.type == bfd_link_hash_defined
1768 || (h->root.type
1769 == bfd_link_hash_defweak));
1770 sec = h->root.u.def.section;
1771 }
1772 if (sec != NULL && bfd_is_abs_section (sec))
1773 indx = 0;
1774 else if (sec == NULL || sec->owner == NULL)
1775 {
1776 bfd_set_error (bfd_error_bad_value);
1777 return false;
1778 }
1779 else
1780 {
1781 asection *osec;
1782
1783 osec = sec->output_section;
1784 indx = elf_section_data (osec)->dynindx;
1785 BFD_ASSERT (indx > 0);
1786 }
1787
1788 outrel.r_info = ELF32_R_INFO (indx, r_type);
1789 outrel.r_addend = relocation + rel->r_addend;
1790 }
1791 }
1792
1793 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1794 ".text") != 0 ||
90ace9e9
JT
1795 (info->shared
1796 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1797 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1798 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1799 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1800 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1801 {
1802 if (h != NULL)
1803 (*_bfd_error_handler)
1804 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1805 bfd_get_filename (input_bfd), howto->name,
1806 h->root.root.string,
1807 bfd_get_section_name (input_bfd, input_section));
1808 else
1809 (*_bfd_error_handler)
1810 (_("%s: warning: %s relocation to 0x%x from %s section"),
1811 bfd_get_filename (input_bfd), howto->name,
1812 outrel.r_addend,
1813 bfd_get_section_name (input_bfd, input_section));
1814 }
947216bf
AM
1815 loc = sreloc->contents;
1816 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1817 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1818
1819 /* This reloc will be computed at runtime, so there's no
1820 need to do anything now, except for R_VAX_32
1821 relocations that have been turned into
1822 R_VAX_RELATIVE. */
1823 if (!relocate)
1824 continue;
1825 }
1826
1827 break;
1828
1829 case R_VAX_GNU_VTINHERIT:
1830 case R_VAX_GNU_VTENTRY:
1831 /* These are no-ops in the end. */
1832 continue;
1833
1834 default:
1835 break;
1836 }
1837
b29635ba
JT
1838 /* VAX PCREL relocations are from the end of relocation, not the start.
1839 So subtract the difference from the relocation amount since we can't
1840 add it to the offset. */
90ace9e9 1841 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1842 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1843
1844 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1845 contents, rel->r_offset,
1846 relocation, rel->r_addend);
1847
1848 if (r != bfd_reloc_ok)
1849 {
1850 switch (r)
1851 {
1852 default:
1853 case bfd_reloc_outofrange:
1854 abort ();
1855 case bfd_reloc_overflow:
1856 {
1857 const char *name;
1858
1859 if (h != NULL)
1860 name = h->root.root.string;
1861 else
1862 {
1863 name = bfd_elf_string_from_elf_section (input_bfd,
1864 symtab_hdr->sh_link,
1865 sym->st_name);
1866 if (name == NULL)
1867 return false;
1868 if (*name == '\0')
1869 name = bfd_section_name (input_bfd, sec);
1870 }
1871 if (!(info->callbacks->reloc_overflow
1872 (info, name, howto->name, (bfd_vma) 0,
1873 input_bfd, input_section, rel->r_offset)))
1874 return false;
1875 }
1876 break;
1877 }
1878 }
1879 }
1880
1881 return true;
1882}
1883
1884/* Finish up dynamic symbol handling. We set the contents of various
1885 dynamic sections here. */
1886
1887static boolean
1888elf_vax_finish_dynamic_symbol (output_bfd, info, h, sym)
1889 bfd *output_bfd;
1890 struct bfd_link_info *info;
1891 struct elf_link_hash_entry *h;
1892 Elf_Internal_Sym *sym;
1893{
1894 bfd *dynobj;
1895
1896 dynobj = elf_hash_table (info)->dynobj;
1897
1898 if (h->plt.offset != (bfd_vma) -1)
1899 {
1900 asection *splt;
1901 asection *sgot;
1902 asection *srela;
1903 bfd_vma plt_index;
1904 bfd_vma got_offset;
1905 bfd_vma addend;
1906 Elf_Internal_Rela rela;
947216bf 1907 bfd_byte *loc;
90ace9e9
JT
1908
1909 /* This symbol has an entry in the procedure linkage table. Set
1910 it up. */
1911
1912 BFD_ASSERT (h->dynindx != -1);
1913
1914 splt = bfd_get_section_by_name (dynobj, ".plt");
1915 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1916 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1917 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1918
1919 addend = 2 * (h->plt.offset & 1);
1920 h->plt.offset &= ~1;
1921
1922 /* Get the index in the procedure linkage table which
1923 corresponds to this symbol. This is the index of this symbol
1924 in all the symbols for which we are making plt entries. The
1925 first entry in the procedure linkage table is reserved. */
1926 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1927
1928 /* Get the offset into the .got table of the entry that
1929 corresponds to this function. Each .got entry is 4 bytes.
1930 The first two are reserved. */
1931 got_offset = (plt_index + 3) * 4;
1932
1933 /* Fill in the entry in the procedure linkage table. */
1934 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1935 PLT_ENTRY_SIZE);
1936
1937 /* The offset is relative to the first extension word. */
1938 bfd_put_32 (output_bfd,
1939 -(h->plt.offset + 8),
1940 splt->contents + h->plt.offset + 4);
1941
1942 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1943 splt->contents + h->plt.offset + 8);
1944
1945 /* Fill in the entry in the global offset table. */
1946 bfd_put_32 (output_bfd,
1947 (splt->output_section->vma
1948 + splt->output_offset
1949 + h->plt.offset) + addend,
1950 sgot->contents + got_offset);
1951
1952 /* Fill in the entry in the .rela.plt section. */
1953 rela.r_offset = (sgot->output_section->vma
1954 + sgot->output_offset
1955 + got_offset);
1956 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1957 rela.r_addend = addend;
947216bf
AM
1958 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1959 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1960
1961 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1962 {
1963 /* Mark the symbol as undefined, rather than as defined in
1964 the .plt section. Leave the value alone. */
1965 sym->st_shndx = SHN_UNDEF;
1966 }
1967 }
1968
1969 if (h->got.offset != (bfd_vma) -1)
1970 {
1971 asection *sgot;
1972 asection *srela;
1973 Elf_Internal_Rela rela;
947216bf 1974 bfd_byte *loc;
90ace9e9
JT
1975
1976 /* This symbol has an entry in the global offset table. Set it
1977 up. */
1978
1979 sgot = bfd_get_section_by_name (dynobj, ".got");
1980 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1981 BFD_ASSERT (sgot != NULL && srela != NULL);
1982
1983 rela.r_offset = (sgot->output_section->vma
1984 + sgot->output_offset
1985 + (h->got.offset &~ 1));
1986
1987 /* If the symbol was forced to be local because of a version file
1988 locally we just want to emit a RELATIVE reloc. The entry in
1989 the global offset table will already have been initialized in
1990 the relocate_section function. */
1991 if (info->shared
1992 && h->dynindx == -1
1993 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1994 {
1995 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1996 }
1997 else
1998 {
1999 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
2000 }
2001 rela.r_addend = bfd_get_signed_32 (output_bfd,
2002 (sgot->contents
2003 + (h->got.offset & ~1)));
2004
947216bf
AM
2005 loc = srela->contents;
2006 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
2007 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
2008 }
2009
2010 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
2011 {
2012 asection *s;
2013 Elf_Internal_Rela rela;
947216bf 2014 bfd_byte *loc;
90ace9e9
JT
2015
2016 /* This symbol needs a copy reloc. Set it up. */
2017
2018 BFD_ASSERT (h->dynindx != -1
2019 && (h->root.type == bfd_link_hash_defined
2020 || h->root.type == bfd_link_hash_defweak));
2021
2022 s = bfd_get_section_by_name (h->root.u.def.section->owner,
2023 ".rela.bss");
2024 BFD_ASSERT (s != NULL);
2025
2026 rela.r_offset = (h->root.u.def.value
2027 + h->root.u.def.section->output_section->vma
2028 + h->root.u.def.section->output_offset);
2029 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
2030 rela.r_addend = 0;
947216bf
AM
2031 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
2032 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
2033 }
2034
2035 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2036 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2037 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2038 sym->st_shndx = SHN_ABS;
2039
2040 return true;
2041}
2042
2043/* Finish up the dynamic sections. */
2044
2045static boolean
2046elf_vax_finish_dynamic_sections (output_bfd, info)
2047 bfd *output_bfd;
2048 struct bfd_link_info *info;
2049{
2050 bfd *dynobj;
2051 asection *sgot;
2052 asection *sdyn;
2053
2054 dynobj = elf_hash_table (info)->dynobj;
2055
2056 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2057 BFD_ASSERT (sgot != NULL);
2058 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2059
2060 if (elf_hash_table (info)->dynamic_sections_created)
2061 {
2062 asection *splt;
2063 Elf32_External_Dyn *dyncon, *dynconend;
2064
2065 splt = bfd_get_section_by_name (dynobj, ".plt");
2066 BFD_ASSERT (splt != NULL && sdyn != NULL);
2067
2068 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2069 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2070 for (; dyncon < dynconend; dyncon++)
2071 {
2072 Elf_Internal_Dyn dyn;
2073 const char *name;
2074 asection *s;
2075
2076 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2077
2078 switch (dyn.d_tag)
2079 {
2080 default:
2081 break;
2082
2083 case DT_PLTGOT:
2084 name = ".got";
2085 goto get_vma;
2086 case DT_JMPREL:
2087 name = ".rela.plt";
2088 get_vma:
2089 s = bfd_get_section_by_name (output_bfd, name);
2090 BFD_ASSERT (s != NULL);
2091 dyn.d_un.d_ptr = s->vma;
2092 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2093 break;
2094
2095 case DT_PLTRELSZ:
2096 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2097 BFD_ASSERT (s != NULL);
2098 if (s->_cooked_size != 0)
2099 dyn.d_un.d_val = s->_cooked_size;
2100 else
2101 dyn.d_un.d_val = s->_raw_size;
2102 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2103 break;
2104
2105 case DT_RELASZ:
2106 /* The procedure linkage table relocs (DT_JMPREL) should
2107 not be included in the overall relocs (DT_RELA).
2108 Therefore, we override the DT_RELASZ entry here to
2109 make it not include the JMPREL relocs. Since the
2110 linker script arranges for .rela.plt to follow all
2111 other relocation sections, we don't have to worry
2112 about changing the DT_RELA entry. */
2113 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2114 if (s != NULL)
2115 {
2116 if (s->_cooked_size != 0)
2117 dyn.d_un.d_val -= s->_cooked_size;
2118 else
2119 dyn.d_un.d_val -= s->_raw_size;
2120 }
2121 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2122 break;
2123 }
2124 }
2125
2126 /* Fill in the first entry in the procedure linkage table. */
2127 if (splt->_raw_size > 0)
2128 {
2129 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2130 bfd_put_32 (output_bfd,
2131 (sgot->output_section->vma
2132 + sgot->output_offset + 4
2133 - (splt->output_section->vma + 6)),
2134 splt->contents + 2);
2135 bfd_put_32 (output_bfd,
2136 (sgot->output_section->vma
2137 + sgot->output_offset + 8
2138 - (splt->output_section->vma + 12)),
2139 splt->contents + 8);
cedb70c5 2140 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2141 = PLT_ENTRY_SIZE;
2142 }
2143 }
2144
2145 /* Fill in the first three entries in the global offset table. */
2146 if (sgot->_raw_size > 0)
2147 {
2148 if (sdyn == NULL)
2149 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2150 else
2151 bfd_put_32 (output_bfd,
2152 sdyn->output_section->vma + sdyn->output_offset,
2153 sgot->contents);
2154 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2155 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2156 }
2157
2158 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2159
2160 return true;
2161}
2162
2163#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2164#define TARGET_LITTLE_NAME "elf32-vax"
2165#define ELF_MACHINE_CODE EM_VAX
2166#define ELF_MAXPAGESIZE 0x1000
2167
2168#define elf_backend_create_dynamic_sections \
2169 _bfd_elf_create_dynamic_sections
2170#define bfd_elf32_bfd_link_hash_table_create \
2171 elf_vax_link_hash_table_create
2172#define bfd_elf32_bfd_final_link _bfd_elf32_gc_common_final_link
2173
2174#define elf_backend_check_relocs elf_vax_check_relocs
2175#define elf_backend_adjust_dynamic_symbol \
2176 elf_vax_adjust_dynamic_symbol
2177#define elf_backend_size_dynamic_sections \
2178 elf_vax_size_dynamic_sections
2179#define elf_backend_relocate_section elf_vax_relocate_section
2180#define elf_backend_finish_dynamic_symbol \
2181 elf_vax_finish_dynamic_symbol
2182#define elf_backend_finish_dynamic_sections \
2183 elf_vax_finish_dynamic_sections
2184#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2185#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2186#define bfd_elf32_bfd_merge_private_bfd_data \
2187 elf32_vax_merge_private_bfd_data
2188#define bfd_elf32_bfd_set_private_flags \
2189 elf32_vax_set_private_flags
2190#define bfd_elf32_bfd_print_private_bfd_data \
2191 elf32_vax_print_private_bfd_data
2192
2193#define elf_backend_can_gc_sections 1
2194#define elf_backend_want_got_plt 1
2195#define elf_backend_plt_readonly 1
2196#define elf_backend_want_plt_sym 0
2197#define elf_backend_got_header_size 16
f0fe0e16 2198#define elf_backend_rela_normal 1
90ace9e9
JT
2199
2200#include "elf32-target.h"
This page took 0.143598 seconds and 4 git commands to generate.