* Makefile.tpl (top level bootstrap support): Remove now-unneeded
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766
AM
2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3 2004 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
90ace9e9
JT
21
22#include "bfd.h"
23#include "sysdep.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
29static reloc_howto_type *reloc_type_lookup
30 PARAMS ((bfd *, bfd_reloc_code_real_type));
31static void rtype_to_howto
947216bf 32 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
90ace9e9
JT
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc
34 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create
36 PARAMS ((bfd *));
b34976b6 37static bfd_boolean elf_vax_check_relocs
90ace9e9
JT
38 PARAMS ((bfd *, struct bfd_link_info *, asection *,
39 const Elf_Internal_Rela *));
40static asection *elf_vax_gc_mark_hook
1e2f5b6e 41 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
90ace9e9 42 struct elf_link_hash_entry *, Elf_Internal_Sym *));
b34976b6 43static bfd_boolean elf_vax_gc_sweep_hook
90ace9e9
JT
44 PARAMS ((bfd *, struct bfd_link_info *, asection *,
45 const Elf_Internal_Rela *));
b34976b6 46static bfd_boolean elf_vax_adjust_dynamic_symbol
90ace9e9 47 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 48static bfd_boolean elf_vax_size_dynamic_sections
90ace9e9 49 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 50static bfd_boolean elf_vax_relocate_section
90ace9e9
JT
51 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
52 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
b34976b6 53static bfd_boolean elf_vax_finish_dynamic_symbol
90ace9e9
JT
54 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
55 Elf_Internal_Sym *));
b34976b6 56static bfd_boolean elf_vax_finish_dynamic_sections
90ace9e9
JT
57 PARAMS ((bfd *, struct bfd_link_info *));
58
b34976b6 59static bfd_boolean elf32_vax_set_private_flags
90ace9e9 60 PARAMS ((bfd *, flagword));
b34976b6 61static bfd_boolean elf32_vax_merge_private_bfd_data
90ace9e9 62 PARAMS ((bfd *, bfd *));
b34976b6 63static bfd_boolean elf32_vax_print_private_bfd_data
90ace9e9
JT
64 PARAMS ((bfd *, PTR));
65
66static reloc_howto_type howto_table[] = {
67 HOWTO (R_VAX_NONE, /* type */
68 0, /* rightshift */
69 0, /* size (0 = byte, 1 = short, 2 = long) */
70 0, /* bitsize */
b34976b6 71 FALSE, /* pc_relative */
90ace9e9
JT
72 0, /* bitpos */
73 complain_overflow_dont, /* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_VAX_NONE", /* name */
b34976b6 76 FALSE, /* partial_inplace */
90ace9e9
JT
77 0, /* src_mask */
78 0x00000000, /* dst_mask */
b34976b6 79 FALSE), /* pcrel_offset */
90ace9e9
JT
80
81 HOWTO (R_VAX_32, /* type */
82 0, /* rightshift */
83 2, /* size (0 = byte, 1 = short, 2 = long) */
84 32, /* bitsize */
b34976b6 85 FALSE, /* pc_relative */
90ace9e9
JT
86 0, /* bitpos */
87 complain_overflow_bitfield, /* complain_on_overflow */
88 bfd_elf_generic_reloc, /* special_function */
89 "R_VAX_32", /* name */
b34976b6 90 FALSE, /* partial_inplace */
90ace9e9
JT
91 0, /* src_mask */
92 0xffffffff, /* dst_mask */
b34976b6 93 FALSE), /* pcrel_offset */
90ace9e9
JT
94
95 HOWTO (R_VAX_16, /* type */
96 0, /* rightshift */
97 1, /* size (0 = byte, 1 = short, 2 = long) */
98 16, /* bitsize */
b34976b6 99 FALSE, /* pc_relative */
90ace9e9
JT
100 0, /* bitpos */
101 complain_overflow_bitfield, /* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_VAX_16", /* name */
b34976b6 104 FALSE, /* partial_inplace */
90ace9e9
JT
105 0, /* src_mask */
106 0x0000ffff, /* dst_mask */
b34976b6 107 FALSE), /* pcrel_offset */
90ace9e9
JT
108
109 HOWTO (R_VAX_8, /* type */
110 0, /* rightshift */
111 0, /* size (0 = byte, 1 = short, 2 = long) */
112 8, /* bitsize */
b34976b6 113 FALSE, /* pc_relative */
90ace9e9
JT
114 0, /* bitpos */
115 complain_overflow_bitfield, /* complain_on_overflow */
116 bfd_elf_generic_reloc, /* special_function */
117 "R_VAX_8", /* name */
b34976b6 118 FALSE, /* partial_inplace */
90ace9e9
JT
119 0, /* src_mask */
120 0x000000ff, /* dst_mask */
b34976b6 121 FALSE), /* pcrel_offset */
90ace9e9
JT
122
123 HOWTO (R_VAX_PC32, /* type */
124 0, /* rightshift */
125 2, /* size (0 = byte, 1 = short, 2 = long) */
126 32, /* bitsize */
b34976b6 127 TRUE, /* pc_relative */
90ace9e9
JT
128 0, /* bitpos */
129 complain_overflow_bitfield, /* complain_on_overflow */
130 bfd_elf_generic_reloc, /* special_function */
131 "R_VAX_PC32", /* name */
b34976b6 132 FALSE, /* partial_inplace */
90ace9e9
JT
133 0, /* src_mask */
134 0xffffffff, /* dst_mask */
b34976b6 135 TRUE), /* pcrel_offset */
90ace9e9
JT
136
137 HOWTO (R_VAX_PC16, /* type */
138 0, /* rightshift */
139 1, /* size (0 = byte, 1 = short, 2 = long) */
140 16, /* bitsize */
b34976b6 141 TRUE, /* pc_relative */
90ace9e9
JT
142 0, /* bitpos */
143 complain_overflow_signed, /* complain_on_overflow */
144 bfd_elf_generic_reloc, /* special_function */
145 "R_VAX_PC16", /* name */
b34976b6 146 FALSE, /* partial_inplace */
90ace9e9
JT
147 0, /* src_mask */
148 0x0000ffff, /* dst_mask */
b34976b6 149 TRUE), /* pcrel_offset */
90ace9e9
JT
150
151 HOWTO (R_VAX_PC8, /* type */
152 0, /* rightshift */
153 0, /* size (0 = byte, 1 = short, 2 = long) */
154 8, /* bitsize */
b34976b6 155 TRUE, /* pc_relative */
90ace9e9
JT
156 0, /* bitpos */
157 complain_overflow_signed, /* complain_on_overflow */
158 bfd_elf_generic_reloc, /* special_function */
159 "R_VAX_PC8", /* name */
b34976b6 160 FALSE, /* partial_inplace */
90ace9e9
JT
161 0, /* src_mask */
162 0x000000ff, /* dst_mask */
b34976b6 163 TRUE), /* pcrel_offset */
90ace9e9
JT
164
165 HOWTO (R_VAX_GOT32, /* type */
166 0, /* rightshift */
167 2, /* size (0 = byte, 1 = short, 2 = long) */
168 32, /* bitsize */
b34976b6 169 TRUE, /* pc_relative */
90ace9e9
JT
170 0, /* bitpos */
171 complain_overflow_bitfield, /* complain_on_overflow */
172 bfd_elf_generic_reloc, /* special_function */
173 "R_VAX_GOT32", /* name */
b34976b6 174 FALSE, /* partial_inplace */
90ace9e9
JT
175 0, /* src_mask */
176 0xffffffff, /* dst_mask */
b34976b6 177 TRUE), /* pcrel_offset */
90ace9e9
JT
178
179 EMPTY_HOWTO (-1),
180 EMPTY_HOWTO (-1),
181 EMPTY_HOWTO (-1),
182 EMPTY_HOWTO (-1),
183 EMPTY_HOWTO (-1),
184
185 HOWTO (R_VAX_PLT32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
b34976b6 189 TRUE, /* pc_relative */
90ace9e9
JT
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_VAX_PLT32", /* name */
b34976b6 194 FALSE, /* partial_inplace */
90ace9e9
JT
195 0, /* src_mask */
196 0xffffffff, /* dst_mask */
b34976b6 197 TRUE), /* pcrel_offset */
90ace9e9
JT
198
199 EMPTY_HOWTO (-1),
200 EMPTY_HOWTO (-1),
201 EMPTY_HOWTO (-1),
202 EMPTY_HOWTO (-1),
203 EMPTY_HOWTO (-1),
204
205 HOWTO (R_VAX_COPY, /* type */
206 0, /* rightshift */
207 0, /* size (0 = byte, 1 = short, 2 = long) */
208 0, /* bitsize */
b34976b6 209 FALSE, /* pc_relative */
90ace9e9
JT
210 0, /* bitpos */
211 complain_overflow_dont, /* complain_on_overflow */
212 bfd_elf_generic_reloc, /* special_function */
213 "R_VAX_COPY", /* name */
b34976b6 214 FALSE, /* partial_inplace */
90ace9e9
JT
215 0, /* src_mask */
216 0xffffffff, /* dst_mask */
b34976b6 217 FALSE), /* pcrel_offset */
90ace9e9
JT
218
219 HOWTO (R_VAX_GLOB_DAT, /* type */
220 0, /* rightshift */
221 2, /* size (0 = byte, 1 = short, 2 = long) */
222 32, /* bitsize */
b34976b6 223 FALSE, /* pc_relative */
90ace9e9
JT
224 0, /* bitpos */
225 complain_overflow_dont, /* complain_on_overflow */
226 bfd_elf_generic_reloc, /* special_function */
227 "R_VAX_GLOB_DAT", /* name */
b34976b6 228 FALSE, /* partial_inplace */
90ace9e9
JT
229 0, /* src_mask */
230 0xffffffff, /* dst_mask */
b34976b6 231 FALSE), /* pcrel_offset */
90ace9e9
JT
232
233 HOWTO (R_VAX_JMP_SLOT, /* type */
234 0, /* rightshift */
235 2, /* size (0 = byte, 1 = short, 2 = long) */
236 32, /* bitsize */
b34976b6 237 FALSE, /* pc_relative */
90ace9e9
JT
238 0, /* bitpos */
239 complain_overflow_dont, /* complain_on_overflow */
240 bfd_elf_generic_reloc, /* special_function */
241 "R_VAX_JMP_SLOT", /* name */
b34976b6 242 FALSE, /* partial_inplace */
90ace9e9
JT
243 0, /* src_mask */
244 0xffffffff, /* dst_mask */
b34976b6 245 FALSE), /* pcrel_offset */
90ace9e9
JT
246
247 HOWTO (R_VAX_RELATIVE, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 32, /* bitsize */
b34976b6 251 FALSE, /* pc_relative */
90ace9e9
JT
252 0, /* bitpos */
253 complain_overflow_dont, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_VAX_RELATIVE", /* name */
b34976b6 256 FALSE, /* partial_inplace */
90ace9e9
JT
257 0, /* src_mask */
258 0xffffffff, /* dst_mask */
b34976b6 259 FALSE), /* pcrel_offset */
90ace9e9
JT
260
261 /* GNU extension to record C++ vtable hierarchy */
262 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
263 0, /* rightshift */
264 2, /* size (0 = byte, 1 = short, 2 = long) */
265 0, /* bitsize */
b34976b6 266 FALSE, /* pc_relative */
90ace9e9
JT
267 0, /* bitpos */
268 complain_overflow_dont, /* complain_on_overflow */
269 NULL, /* special_function */
270 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 271 FALSE, /* partial_inplace */
90ace9e9
JT
272 0, /* src_mask */
273 0, /* dst_mask */
b34976b6 274 FALSE), /* pcrel_offset */
90ace9e9
JT
275
276 /* GNU extension to record C++ vtable member usage */
277 HOWTO (R_VAX_GNU_VTENTRY, /* type */
278 0, /* rightshift */
279 2, /* size (0 = byte, 1 = short, 2 = long) */
280 0, /* bitsize */
b34976b6 281 FALSE, /* pc_relative */
90ace9e9
JT
282 0, /* bitpos */
283 complain_overflow_dont, /* complain_on_overflow */
284 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
285 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 286 FALSE, /* partial_inplace */
90ace9e9
JT
287 0, /* src_mask */
288 0, /* dst_mask */
b34976b6 289 FALSE), /* pcrel_offset */
90ace9e9
JT
290};
291
292static void
293rtype_to_howto (abfd, cache_ptr, dst)
294 bfd *abfd ATTRIBUTE_UNUSED;
295 arelent *cache_ptr;
296 Elf_Internal_Rela *dst;
297{
298 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
299 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
300}
301
302#define elf_info_to_howto rtype_to_howto
303
304static const struct
305{
306 bfd_reloc_code_real_type bfd_val;
307 int elf_val;
308} reloc_map[] = {
309 { BFD_RELOC_NONE, R_VAX_NONE },
310 { BFD_RELOC_32, R_VAX_32 },
311 { BFD_RELOC_16, R_VAX_16 },
312 { BFD_RELOC_8, R_VAX_8 },
313 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
314 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
315 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
316 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
317 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
318 { BFD_RELOC_NONE, R_VAX_COPY },
319 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
320 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
321 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
322 { BFD_RELOC_CTOR, R_VAX_32 },
323 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
324 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
325};
326
327static reloc_howto_type *
328reloc_type_lookup (abfd, code)
329 bfd *abfd ATTRIBUTE_UNUSED;
330 bfd_reloc_code_real_type code;
331{
332 unsigned int i;
333 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
334 {
335 if (reloc_map[i].bfd_val == code)
336 return &howto_table[reloc_map[i].elf_val];
337 }
338 return 0;
339}
340
341#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
b34976b6 417static bfd_boolean elf_vax_discard_copies
90ace9e9
JT
418 PARAMS ((struct elf_vax_link_hash_entry *, PTR));
419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
b34976b6 422static bfd_boolean elf_vax_instantiate_got_entries
b29635ba
JT
423 PARAMS ((struct elf_link_hash_entry *, PTR));
424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
b34976b6 430 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
90ace9e9
JT
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
435#define elf_vax_hash_table(p) \
436 ((struct elf_vax_link_hash_table *) (p)->hash)
437
438/* Create an entry in an VAX ELF linker hash table. */
439
440static struct bfd_hash_entry *
441elf_vax_link_hash_newfunc (entry, table, string)
442 struct bfd_hash_entry *entry;
443 struct bfd_hash_table *table;
444 const char *string;
445{
446 struct elf_vax_link_hash_entry *ret =
447 (struct elf_vax_link_hash_entry *) entry;
448
449 /* Allocate the structure if it has not already been allocated by a
450 subclass. */
451 if (ret == (struct elf_vax_link_hash_entry *) NULL)
452 ret = ((struct elf_vax_link_hash_entry *)
453 bfd_hash_allocate (table,
454 sizeof (struct elf_vax_link_hash_entry)));
455 if (ret == (struct elf_vax_link_hash_entry *) NULL)
456 return (struct bfd_hash_entry *) ret;
457
458 /* Call the allocation method of the superclass. */
459 ret = ((struct elf_vax_link_hash_entry *)
460 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
461 table, string));
462 if (ret != (struct elf_vax_link_hash_entry *) NULL)
463 {
464 ret->pcrel_relocs_copied = NULL;
465 }
466
467 return (struct bfd_hash_entry *) ret;
468}
469
470/* Create an VAX ELF linker hash table. */
471
472static struct bfd_link_hash_table *
473elf_vax_link_hash_table_create (abfd)
474 bfd *abfd;
475{
476 struct elf_vax_link_hash_table *ret;
477 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
478
479 ret = (struct elf_vax_link_hash_table *) bfd_malloc (amt);
480 if (ret == (struct elf_vax_link_hash_table *) NULL)
481 return NULL;
482
483 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
484 elf_vax_link_hash_newfunc))
485 {
486 free (ret);
487 return NULL;
488 }
489
490 return &ret->root.root;
491}
492
493/* Keep vax-specific flags in the ELF header */
b34976b6 494static bfd_boolean
90ace9e9
JT
495elf32_vax_set_private_flags (abfd, flags)
496 bfd *abfd;
497 flagword flags;
498{
499 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
500 elf_flags_init (abfd) = TRUE;
501 return TRUE;
90ace9e9
JT
502}
503
504/* Merge backend specific data from an object file to the output
505 object file when linking. */
b34976b6 506static bfd_boolean
90ace9e9
JT
507elf32_vax_merge_private_bfd_data (ibfd, obfd)
508 bfd *ibfd;
509 bfd *obfd;
510{
511 flagword out_flags;
512 flagword in_flags;
513
514 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
515 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 516 return TRUE;
90ace9e9
JT
517
518 in_flags = elf_elfheader (ibfd)->e_flags;
519 out_flags = elf_elfheader (obfd)->e_flags;
520
521 if (!elf_flags_init (obfd))
522 {
b34976b6 523 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
524 elf_elfheader (obfd)->e_flags = in_flags;
525 }
526
b34976b6 527 return TRUE;
90ace9e9
JT
528}
529
530/* Display the flags field */
b34976b6 531static bfd_boolean
90ace9e9
JT
532elf32_vax_print_private_bfd_data (abfd, ptr)
533 bfd *abfd;
534 PTR ptr;
535{
536 FILE *file = (FILE *) ptr;
537
538 BFD_ASSERT (abfd != NULL && ptr != NULL);
539
540 /* Print normal ELF private data. */
541 _bfd_elf_print_private_bfd_data (abfd, ptr);
542
543 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
544
545 /* xgettext:c-format */
546 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
547
179d3252 548 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
549 fprintf (file, _(" [nonpic]"));
550
179d3252 551 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
552 fprintf (file, _(" [d-float]"));
553
179d3252 554 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
555 fprintf (file, _(" [g-float]"));
556
557 fputc ('\n', file);
558
b34976b6 559 return TRUE;
90ace9e9
JT
560}
561/* Look through the relocs for a section during the first phase, and
562 allocate space in the global offset table or procedure linkage
563 table. */
564
b34976b6 565static bfd_boolean
90ace9e9
JT
566elf_vax_check_relocs (abfd, info, sec, relocs)
567 bfd *abfd;
568 struct bfd_link_info *info;
569 asection *sec;
570 const Elf_Internal_Rela *relocs;
571{
572 bfd *dynobj;
573 Elf_Internal_Shdr *symtab_hdr;
574 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
575 const Elf_Internal_Rela *rel;
576 const Elf_Internal_Rela *rel_end;
577 asection *sgot;
578 asection *srelgot;
579 asection *sreloc;
580
1049f94e 581 if (info->relocatable)
b34976b6 582 return TRUE;
90ace9e9
JT
583
584 dynobj = elf_hash_table (info)->dynobj;
585 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
586 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
587
588 sgot = NULL;
589 srelgot = NULL;
590 sreloc = NULL;
591
592 rel_end = relocs + sec->reloc_count;
593 for (rel = relocs; rel < rel_end; rel++)
594 {
595 unsigned long r_symndx;
596 struct elf_link_hash_entry *h;
597
598 r_symndx = ELF32_R_SYM (rel->r_info);
599
600 if (r_symndx < symtab_hdr->sh_info)
601 h = NULL;
602 else
603 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
604
605 switch (ELF32_R_TYPE (rel->r_info))
606 {
607 case R_VAX_GOT32:
608 if (h != NULL
609 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
610 break;
611
612 /* This symbol requires a global offset table entry. */
613
614 if (dynobj == NULL)
615 {
616 /* Create the .got section. */
617 elf_hash_table (info)->dynobj = dynobj = abfd;
618 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 619 return FALSE;
90ace9e9
JT
620 }
621
622 if (sgot == NULL)
623 {
624 sgot = bfd_get_section_by_name (dynobj, ".got");
625 BFD_ASSERT (sgot != NULL);
626 }
627
628 if (srelgot == NULL
629 && (h != NULL || info->shared))
630 {
631 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
632 if (srelgot == NULL)
633 {
634 srelgot = bfd_make_section (dynobj, ".rela.got");
635 if (srelgot == NULL
636 || !bfd_set_section_flags (dynobj, srelgot,
637 (SEC_ALLOC
638 | SEC_LOAD
639 | SEC_HAS_CONTENTS
640 | SEC_IN_MEMORY
641 | SEC_LINKER_CREATED
642 | SEC_READONLY))
643 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 644 return FALSE;
90ace9e9
JT
645 }
646 }
647
648 if (h != NULL)
649 {
650 struct elf_vax_link_hash_entry *eh;
651
652 eh = (struct elf_vax_link_hash_entry *) h;
653 if (h->got.refcount == -1)
654 {
655 h->got.refcount = 1;
656 eh->got_addend = rel->r_addend;
90ace9e9
JT
657 }
658 else
659 {
660 h->got.refcount++;
661 if (eh->got_addend != (bfd_vma) rel->r_addend)
662 (*_bfd_error_handler)
663 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
664 bfd_get_filename (abfd), rel->r_addend,
665 h->root.root.string,
666 eh->got_addend);
cedb70c5 667
90ace9e9
JT
668 }
669 }
670 break;
671
672 case R_VAX_PLT32:
673 /* This symbol requires a procedure linkage table entry. We
674 actually build the entry in adjust_dynamic_symbol,
675 because this might be a case of linking PIC code which is
676 never referenced by a dynamic object, in which case we
677 don't need to generate a procedure linkage table entry
678 after all. */
679
680 /* If this is a local symbol, we resolve it directly without
681 creating a procedure linkage table entry. */
682 if (h == NULL)
683 continue;
684
685 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
686 if (h->plt.refcount == -1)
687 h->plt.refcount = 1;
688 else
689 h->plt.refcount++;
690 break;
691
692 case R_VAX_PC8:
693 case R_VAX_PC16:
694 case R_VAX_PC32:
695 /* If we are creating a shared library and this is not a local
696 symbol, we need to copy the reloc into the shared library.
697 However when linking with -Bsymbolic and this is a global
698 symbol which is defined in an object we are including in the
699 link (i.e., DEF_REGULAR is set), then we can resolve the
700 reloc directly. At this point we have not seen all the input
701 files, so it is possible that DEF_REGULAR is not set now but
702 will be set later (it is never cleared). We account for that
703 possibility below by storing information in the
704 pcrel_relocs_copied field of the hash table entry. */
705 if (!(info->shared
706 && (sec->flags & SEC_ALLOC) != 0
707 && h != NULL
708 && (!info->symbolic
709 || (h->elf_link_hash_flags
710 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
711 {
712 if (h != NULL)
713 {
714 /* Make sure a plt entry is created for this symbol if
715 it turns out to be a function defined by a dynamic
716 object. */
717 if (h->plt.refcount == -1)
718 h->plt.refcount = 1;
719 else
720 h->plt.refcount++;
721 }
722 break;
723 }
724 /* Fall through. */
725 case R_VAX_8:
726 case R_VAX_16:
727 case R_VAX_32:
728 if (h != NULL)
729 {
730 /* Make sure a plt entry is created for this symbol if it
731 turns out to be a function defined by a dynamic object. */
732 if (h->plt.refcount == -1)
733 h->plt.refcount = 1;
734 else
735 h->plt.refcount++;
736 }
737
738 /* If we are creating a shared library, we need to copy the
739 reloc into the shared library. */
740 if (info->shared
741 && (sec->flags & SEC_ALLOC) != 0)
742 {
743 /* When creating a shared object, we must copy these
744 reloc types into the output file. We create a reloc
745 section in dynobj and make room for this reloc. */
746 if (sreloc == NULL)
747 {
748 const char *name;
749
750 name = (bfd_elf_string_from_elf_section
751 (abfd,
752 elf_elfheader (abfd)->e_shstrndx,
753 elf_section_data (sec)->rel_hdr.sh_name));
754 if (name == NULL)
b34976b6 755 return FALSE;
90ace9e9
JT
756
757 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
758 && strcmp (bfd_get_section_name (abfd, sec),
759 name + 5) == 0);
760
761 sreloc = bfd_get_section_by_name (dynobj, name);
762 if (sreloc == NULL)
763 {
764 sreloc = bfd_make_section (dynobj, name);
765 if (sreloc == NULL
766 || !bfd_set_section_flags (dynobj, sreloc,
767 (SEC_ALLOC
768 | SEC_LOAD
769 | SEC_HAS_CONTENTS
770 | SEC_IN_MEMORY
771 | SEC_LINKER_CREATED
772 | SEC_READONLY))
773 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 774 return FALSE;
90ace9e9
JT
775 }
776 if (sec->flags & SEC_READONLY)
777 info->flags |= DF_TEXTREL;
778 }
779
780 sreloc->_raw_size += sizeof (Elf32_External_Rela);
781
782 /* If we are linking with -Bsymbolic, we count the number of
783 PC relative relocations we have entered for this symbol,
784 so that we can discard them again if the symbol is later
785 defined by a regular object. Note that this function is
19852a2a 786 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
787 which means that h is really a pointer to an
788 elf_vax_link_hash_entry. */
789 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
790 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
791 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
792 && info->symbolic)
793 {
794 struct elf_vax_link_hash_entry *eh;
795 struct elf_vax_pcrel_relocs_copied *p;
796
797 eh = (struct elf_vax_link_hash_entry *) h;
798
799 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
800 if (p->section == sreloc)
801 break;
802
803 if (p == NULL)
804 {
805 p = ((struct elf_vax_pcrel_relocs_copied *)
806 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
807 if (p == NULL)
b34976b6 808 return FALSE;
90ace9e9
JT
809 p->next = eh->pcrel_relocs_copied;
810 eh->pcrel_relocs_copied = p;
811 p->section = sreloc;
812 p->count = 0;
813 }
814
815 ++p->count;
816 }
817 }
818
819 break;
820
821 /* This relocation describes the C++ object vtable hierarchy.
822 Reconstruct it for later use during GC. */
823 case R_VAX_GNU_VTINHERIT:
824 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 825 return FALSE;
90ace9e9
JT
826 break;
827
828 /* This relocation describes which C++ vtable entries are actually
829 used. Record for later use during GC. */
830 case R_VAX_GNU_VTENTRY:
831 if (!_bfd_elf32_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 832 return FALSE;
90ace9e9
JT
833 break;
834
835 default:
836 break;
837 }
838 }
839
b34976b6 840 return TRUE;
90ace9e9
JT
841}
842
843/* Return the section that should be marked against GC for a given
844 relocation. */
845
846static asection *
1e2f5b6e
AM
847elf_vax_gc_mark_hook (sec, info, rel, h, sym)
848 asection *sec;
90ace9e9
JT
849 struct bfd_link_info *info ATTRIBUTE_UNUSED;
850 Elf_Internal_Rela *rel;
851 struct elf_link_hash_entry *h;
852 Elf_Internal_Sym *sym;
853{
854 if (h != NULL)
855 {
856 switch (ELF32_R_TYPE (rel->r_info))
857 {
858 case R_VAX_GNU_VTINHERIT:
859 case R_VAX_GNU_VTENTRY:
860 break;
861
862 default:
863 switch (h->root.type)
864 {
865 default:
866 break;
867
868 case bfd_link_hash_defined:
869 case bfd_link_hash_defweak:
870 return h->root.u.def.section;
871
872 case bfd_link_hash_common:
873 return h->root.u.c.p->section;
874 }
875 }
876 }
877 else
1e2f5b6e 878 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
90ace9e9
JT
879
880 return NULL;
881}
882
883/* Update the got entry reference counts for the section being removed. */
884
b34976b6 885static bfd_boolean
90ace9e9
JT
886elf_vax_gc_sweep_hook (abfd, info, sec, relocs)
887 bfd *abfd;
888 struct bfd_link_info *info;
889 asection *sec;
890 const Elf_Internal_Rela *relocs;
891{
892 Elf_Internal_Shdr *symtab_hdr;
893 struct elf_link_hash_entry **sym_hashes;
90ace9e9 894 const Elf_Internal_Rela *rel, *relend;
90ace9e9 895 bfd *dynobj;
90ace9e9 896
90ace9e9
JT
897 dynobj = elf_hash_table (info)->dynobj;
898 if (dynobj == NULL)
b34976b6 899 return TRUE;
90ace9e9 900
babfd660
KH
901 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
902 sym_hashes = elf_sym_hashes (abfd);
903
90ace9e9
JT
904 relend = relocs + sec->reloc_count;
905 for (rel = relocs; rel < relend; rel++)
906 {
babfd660
KH
907 unsigned long r_symndx;
908 struct elf_link_hash_entry *h;
909
90ace9e9
JT
910 switch (ELF32_R_TYPE (rel->r_info))
911 {
912 case R_VAX_GOT32:
913 r_symndx = ELF32_R_SYM (rel->r_info);
914 if (r_symndx >= symtab_hdr->sh_info)
915 {
916 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
917 if (h->got.refcount > 0)
b29635ba 918 --h->got.refcount;
90ace9e9
JT
919 }
920 break;
921
922 case R_VAX_PLT32:
923 case R_VAX_PC8:
924 case R_VAX_PC16:
925 case R_VAX_PC32:
926 case R_VAX_8:
927 case R_VAX_16:
928 case R_VAX_32:
929 r_symndx = ELF32_R_SYM (rel->r_info);
930 if (r_symndx >= symtab_hdr->sh_info)
931 {
932 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
933 if (h->plt.refcount > 0)
934 --h->plt.refcount;
935 }
936 break;
937
938 default:
939 break;
940 }
941 }
942
b34976b6 943 return TRUE;
90ace9e9
JT
944}
945
946/* Adjust a symbol defined by a dynamic object and referenced by a
947 regular object. The current definition is in some section of the
948 dynamic object, but we're not including those sections. We have to
949 change the definition to something the rest of the link can
950 understand. */
951
b34976b6 952static bfd_boolean
90ace9e9
JT
953elf_vax_adjust_dynamic_symbol (info, h)
954 struct bfd_link_info *info;
955 struct elf_link_hash_entry *h;
956{
957 bfd *dynobj;
958 asection *s;
959 unsigned int power_of_two;
960
961 dynobj = elf_hash_table (info)->dynobj;
962
963 /* Make sure we know what is going on here. */
964 BFD_ASSERT (dynobj != NULL
965 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
966 || h->weakdef != NULL
967 || ((h->elf_link_hash_flags
968 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
969 && (h->elf_link_hash_flags
970 & ELF_LINK_HASH_REF_REGULAR) != 0
971 && (h->elf_link_hash_flags
972 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
973
974 /* If this is a function, put it in the procedure linkage table. We
975 will fill in the contents of the procedure linkage table later,
976 when we know the address of the .got section. */
977 if (h->type == STT_FUNC
978 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
979 {
980 if (! info->shared
981 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
982 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) == 0
983 /* We must always create the plt entry if it was referenced
984 by a PLTxxO relocation. In this case we already recorded
985 it as a dynamic symbol. */
986 && h->dynindx == -1)
987 {
988 /* This case can occur if we saw a PLTxx reloc in an input
989 file, but the symbol was never referred to by a dynamic
990 object. In such a case, we don't actually need to build
991 a procedure linkage table, and we can just do a PCxx
992 reloc instead. */
993 BFD_ASSERT ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0);
994 h->plt.offset = (bfd_vma) -1;
b34976b6 995 return TRUE;
90ace9e9
JT
996 }
997
998 /* GC may have rendered this entry unused. */
999 if (h->plt.refcount <= 0)
1000 {
1001 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1002 h->plt.offset = (bfd_vma) -1;
b34976b6 1003 return TRUE;
90ace9e9
JT
1004 }
1005
1006 /* Make sure this symbol is output as a dynamic symbol. */
1007 if (h->dynindx == -1)
1008 {
1009 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1010 return FALSE;
90ace9e9
JT
1011 }
1012
1013 s = bfd_get_section_by_name (dynobj, ".plt");
1014 BFD_ASSERT (s != NULL);
1015
1016 /* If this is the first .plt entry, make room for the special
1017 first entry. */
1018 if (s->_raw_size == 0)
1019 {
1020 s->_raw_size += PLT_ENTRY_SIZE;
1021 }
1022
1023 /* If this symbol is not defined in a regular file, and we are
1024 not generating a shared library, then set the symbol to this
1025 location in the .plt. This is required to make function
1026 pointers compare as equal between the normal executable and
1027 the shared library. */
1028 if (!info->shared
1029 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1030 {
1031 h->root.u.def.section = s;
1032 h->root.u.def.value = s->_raw_size;
1033 }
1034
1035 h->plt.offset = s->_raw_size;
1036
1037 /* Make room for this entry. */
1038 s->_raw_size += PLT_ENTRY_SIZE;
1039
1040 /* We also need to make an entry in the .got.plt section, which
1041 will be placed in the .got section by the linker script. */
1042
1043 s = bfd_get_section_by_name (dynobj, ".got.plt");
1044 BFD_ASSERT (s != NULL);
1045 s->_raw_size += 4;
1046
1047 /* We also need to make an entry in the .rela.plt section. */
1048
1049 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1050 BFD_ASSERT (s != NULL);
1051 s->_raw_size += sizeof (Elf32_External_Rela);
1052
b34976b6 1053 return TRUE;
90ace9e9
JT
1054 }
1055
1056 /* Reinitialize the plt offset now that it is not used as a reference
1057 count any more. */
1058 h->plt.offset = (bfd_vma) -1;
1059
1060 /* If this is a weak symbol, and there is a real definition, the
1061 processor independent code will have arranged for us to see the
1062 real definition first, and we can just use the same value. */
1063 if (h->weakdef != NULL)
1064 {
1065 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1066 || h->weakdef->root.type == bfd_link_hash_defweak);
1067 h->root.u.def.section = h->weakdef->root.u.def.section;
1068 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 1069 return TRUE;
90ace9e9
JT
1070 }
1071
1072 /* This is a reference to a symbol defined by a dynamic object which
1073 is not a function. */
1074
1075 /* If we are creating a shared library, we must presume that the
1076 only references to the symbol are via the global offset table.
1077 For such cases we need not do anything here; the relocations will
1078 be handled correctly by relocate_section. */
1079 if (info->shared)
b34976b6 1080 return TRUE;
90ace9e9
JT
1081
1082 /* We must allocate the symbol in our .dynbss section, which will
1083 become part of the .bss section of the executable. There will be
1084 an entry for this symbol in the .dynsym section. The dynamic
1085 object will contain position independent code, so all references
1086 from the dynamic object to this symbol will go through the global
1087 offset table. The dynamic linker will use the .dynsym entry to
1088 determine the address it must put in the global offset table, so
1089 both the dynamic object and the regular object will refer to the
1090 same memory location for the variable. */
1091
1092 s = bfd_get_section_by_name (dynobj, ".dynbss");
1093 BFD_ASSERT (s != NULL);
1094
1095 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1096 copy the initial value out of the dynamic object and into the
1097 runtime process image. We need to remember the offset into the
1098 .rela.bss section we are going to use. */
1099 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1100 {
1101 asection *srel;
1102
1103 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1104 BFD_ASSERT (srel != NULL);
1105 srel->_raw_size += sizeof (Elf32_External_Rela);
1106 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
1107 }
1108
1109 /* We need to figure out the alignment required for this symbol. I
1110 have no idea how ELF linkers handle this. */
1111 power_of_two = bfd_log2 (h->size);
1112 if (power_of_two > 3)
1113 power_of_two = 3;
1114
1115 /* Apply the required alignment. */
1116 s->_raw_size = BFD_ALIGN (s->_raw_size,
1117 (bfd_size_type) (1 << power_of_two));
1118 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1119 {
1120 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 1121 return FALSE;
90ace9e9
JT
1122 }
1123
1124 /* Define the symbol as being at this point in the section. */
1125 h->root.u.def.section = s;
1126 h->root.u.def.value = s->_raw_size;
1127
1128 /* Increment the section size to make room for the symbol. */
1129 s->_raw_size += h->size;
1130
b34976b6 1131 return TRUE;
90ace9e9
JT
1132}
1133
1134/* Set the sizes of the dynamic sections. */
1135
b34976b6 1136static bfd_boolean
90ace9e9
JT
1137elf_vax_size_dynamic_sections (output_bfd, info)
1138 bfd *output_bfd;
1139 struct bfd_link_info *info;
1140{
1141 bfd *dynobj;
1142 asection *s;
b34976b6
AM
1143 bfd_boolean plt;
1144 bfd_boolean relocs;
1145 bfd_boolean reltext;
90ace9e9
JT
1146
1147 dynobj = elf_hash_table (info)->dynobj;
1148 BFD_ASSERT (dynobj != NULL);
1149
1150 if (elf_hash_table (info)->dynamic_sections_created)
1151 {
1152 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1153 if (info->executable)
90ace9e9
JT
1154 {
1155 s = bfd_get_section_by_name (dynobj, ".interp");
1156 BFD_ASSERT (s != NULL);
1157 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1158 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1159 }
1160 }
1161 else
1162 {
1163 /* We may have created entries in the .rela.got and .got sections.
1164 However, if we are not creating the dynamic sections, we will
1165 not actually use these entries. Reset the size of .rela.got
1166 and .got, which will cause it to get stripped from the output
1167 file below. */
1168 s = bfd_get_section_by_name (dynobj, ".rela.got");
1169 if (s != NULL)
1170 s->_raw_size = 0;
1171 s = bfd_get_section_by_name (dynobj, ".got.plt");
1172 if (s != NULL)
1173 s->_raw_size = 0;
1174 s = bfd_get_section_by_name (dynobj, ".got");
1175 if (s != NULL)
1176 s->_raw_size = 0;
1177 }
1178
1179 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1180 relative relocs against symbols defined in a regular object. We
1181 allocated space for them in the check_relocs routine, but we will not
1182 fill them in in the relocate_section routine. */
1183 if (info->shared && info->symbolic)
1184 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba
JT
1185 elf_vax_discard_copies,
1186 (PTR) NULL);
1187
b34976b6 1188 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1189 discard all the got entries we've recorded. Otherwise, we need to
1190 instantiate (allocate space for them). */
1191 elf_link_hash_traverse (elf_hash_table (info),
1192 elf_vax_instantiate_got_entries,
1193 (PTR) info);
90ace9e9
JT
1194
1195 /* The check_relocs and adjust_dynamic_symbol entry points have
1196 determined the sizes of the various dynamic sections. Allocate
1197 memory for them. */
b34976b6
AM
1198 plt = FALSE;
1199 relocs = FALSE;
1200 reltext = FALSE;
90ace9e9
JT
1201 for (s = dynobj->sections; s != NULL; s = s->next)
1202 {
1203 const char *name;
b34976b6 1204 bfd_boolean strip;
90ace9e9
JT
1205
1206 if ((s->flags & SEC_LINKER_CREATED) == 0)
1207 continue;
1208
1209 /* It's OK to base decisions on the section name, because none
1210 of the dynobj section names depend upon the input files. */
1211 name = bfd_get_section_name (dynobj, s);
1212
b34976b6 1213 strip = FALSE;
90ace9e9
JT
1214
1215 if (strcmp (name, ".plt") == 0)
1216 {
1217 if (s->_raw_size == 0)
1218 {
1219 /* Strip this section if we don't need it; see the
1220 comment below. */
b34976b6 1221 strip = TRUE;
90ace9e9
JT
1222 }
1223 else
1224 {
1225 /* Remember whether there is a PLT. */
b34976b6 1226 plt = TRUE;
90ace9e9
JT
1227 }
1228 }
1229 else if (strncmp (name, ".rela", 5) == 0)
1230 {
1231 if (s->_raw_size == 0)
1232 {
1233 /* If we don't need this section, strip it from the
1234 output file. This is mostly to handle .rela.bss and
1235 .rela.plt. We must create both sections in
1236 create_dynamic_sections, because they must be created
1237 before the linker maps input sections to output
1238 sections. The linker does that before
1239 adjust_dynamic_symbol is called, and it is that
1240 function which decides whether anything needs to go
1241 into these sections. */
b34976b6 1242 strip = TRUE;
90ace9e9
JT
1243 }
1244 else
1245 {
1246 asection *target;
1247
1248 /* Remember whether there are any reloc sections other
1249 than .rela.plt. */
1250 if (strcmp (name, ".rela.plt") != 0)
1251 {
1252 const char *outname;
1253
b34976b6 1254 relocs = TRUE;
90ace9e9
JT
1255
1256 /* If this relocation section applies to a read only
1257 section, then we probably need a DT_TEXTREL
1258 entry. .rela.plt is actually associated with
1259 .got.plt, which is never readonly. */
1260 outname = bfd_get_section_name (output_bfd,
1261 s->output_section);
1262 target = bfd_get_section_by_name (output_bfd, outname + 5);
1263 if (target != NULL
1264 && (target->flags & SEC_READONLY) != 0
1265 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1266 reltext = TRUE;
90ace9e9
JT
1267 }
1268
1269 /* We use the reloc_count field as a counter if we need
1270 to copy relocs into the output file. */
1271 s->reloc_count = 0;
1272 }
1273 }
624f0b25 1274 else if (strncmp (name, ".got", 4) != 0)
90ace9e9
JT
1275 {
1276 /* It's not one of our sections, so don't allocate space. */
1277 continue;
1278 }
1279
1280 if (strip)
1281 {
1282 _bfd_strip_section_from_output (info, s);
1283 continue;
1284 }
1285
1286 /* Allocate memory for the section contents. */
1287 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->_raw_size);
1288 if (s->contents == NULL && s->_raw_size != 0)
b34976b6 1289 return FALSE;
90ace9e9
JT
1290 }
1291
1292 if (elf_hash_table (info)->dynamic_sections_created)
1293 {
1294 /* Add some entries to the .dynamic section. We fill in the
1295 values later, in elf_vax_finish_dynamic_sections, but we
1296 must add the entries now so that we get the correct size for
1297 the .dynamic section. The DT_DEBUG entry is filled in by the
1298 dynamic linker and used by the debugger. */
1299#define add_dynamic_entry(TAG, VAL) \
1300 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1301
1302 if (!info->shared)
1303 {
1304 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1305 return FALSE;
90ace9e9
JT
1306 }
1307
1308 if (plt)
1309 {
1310 if (!add_dynamic_entry (DT_PLTGOT, 0)
1311 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1312 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1313 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1314 return FALSE;
90ace9e9
JT
1315 }
1316
1317 if (relocs)
1318 {
1319 if (!add_dynamic_entry (DT_RELA, 0)
1320 || !add_dynamic_entry (DT_RELASZ, 0)
1321 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1322 return FALSE;
90ace9e9
JT
1323 }
1324
1325 if (reltext || (info->flags & DF_TEXTREL) != 0)
1326 {
1327 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1328 return FALSE;
90ace9e9
JT
1329 }
1330 }
1331#undef add_dynamic_entry
1332
b34976b6 1333 return TRUE;
90ace9e9
JT
1334}
1335
1336/* This function is called via elf_vax_link_hash_traverse if we are
1337 creating a shared object with -Bsymbolic. It discards the space
1338 allocated to copy PC relative relocs against symbols which are defined
1339 in regular objects. We allocated space for them in the check_relocs
1340 routine, but we won't fill them in in the relocate_section routine. */
1341
b34976b6 1342static bfd_boolean
90ace9e9
JT
1343elf_vax_discard_copies (h, ignore)
1344 struct elf_vax_link_hash_entry *h;
1345 PTR ignore ATTRIBUTE_UNUSED;
1346{
1347 struct elf_vax_pcrel_relocs_copied *s;
1348
1349 if (h->root.root.type == bfd_link_hash_warning)
1350 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1351
1352 /* We only discard relocs for symbols defined in a regular object. */
1353 if ((h->root.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
b34976b6 1354 return TRUE;
90ace9e9
JT
1355
1356 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1357 s->section->_raw_size -= s->count * sizeof (Elf32_External_Rela);
1358
b34976b6 1359 return TRUE;
90ace9e9
JT
1360}
1361
b29635ba
JT
1362/* This function is called via elf_link_hash_traverse. It looks for entries
1363 that have GOT or PLT (.GOT) references. If creating a static object or a
1364 shared object with -Bsymbolic, it resets the reference count back to 0
1365 and sets the offset to -1 so normal PC32 relocation will be done. If
1366 creating a shared object or executable, space in the .got and .rela.got
1367 will be reserved for the symbol. */
1368
b34976b6 1369static bfd_boolean
b29635ba
JT
1370elf_vax_instantiate_got_entries (h, infoptr)
1371 struct elf_link_hash_entry *h;
1372 PTR infoptr;
1373{
1374 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1375 bfd *dynobj;
1376 asection *sgot;
1377 asection *srelgot;
b34976b6 1378
b29635ba
JT
1379 /* We don't care about non-GOT (and non-PLT) entries. */
1380 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1381 return TRUE;
b29635ba
JT
1382
1383 dynobj = elf_hash_table (info)->dynobj;
1384 if (dynobj == NULL)
b34976b6 1385 return TRUE;
b29635ba
JT
1386
1387 sgot = bfd_get_section_by_name (dynobj, ".got");
1388 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1389
1390 if (!elf_hash_table (info)->dynamic_sections_created
1391 || (info->shared && info->symbolic))
1392 {
1393 h->got.refcount = 0;
1394 h->got.offset = (bfd_vma) -1;
1395 h->plt.refcount = 0;
1396 h->plt.offset = (bfd_vma) -1;
1397 }
1398 else if (h->got.refcount > 0)
1399 {
1400 /* Make sure this symbol is output as a dynamic symbol. */
1401 if (h->dynindx == -1)
1402 {
1403 if (!bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1404 return FALSE;
b29635ba
JT
1405 }
1406
1407 /* Allocate space in the .got and .rela.got sections. */
1408 sgot->_raw_size += 4;
1409 srelgot->_raw_size += sizeof (Elf32_External_Rela);
1410 }
1411
b34976b6 1412 return TRUE;
b29635ba
JT
1413}
1414
90ace9e9
JT
1415/* Relocate an VAX ELF section. */
1416
b34976b6 1417static bfd_boolean
90ace9e9
JT
1418elf_vax_relocate_section (output_bfd, info, input_bfd, input_section,
1419 contents, relocs, local_syms, local_sections)
1420 bfd *output_bfd;
1421 struct bfd_link_info *info;
1422 bfd *input_bfd;
1423 asection *input_section;
1424 bfd_byte *contents;
1425 Elf_Internal_Rela *relocs;
1426 Elf_Internal_Sym *local_syms;
1427 asection **local_sections;
1428{
1429 bfd *dynobj;
1430 Elf_Internal_Shdr *symtab_hdr;
1431 struct elf_link_hash_entry **sym_hashes;
1432 bfd_vma *local_got_offsets;
1433 bfd_vma plt_index;
1434 bfd_vma got_offset;
1435 asection *sgot;
1436 asection *splt;
1437 asection *sgotplt;
1438 asection *sreloc;
1439 Elf_Internal_Rela *rel;
1440 Elf_Internal_Rela *relend;
1441
1049f94e 1442 if (info->relocatable)
b34976b6 1443 return TRUE;
f0fe0e16 1444
90ace9e9
JT
1445 dynobj = elf_hash_table (info)->dynobj;
1446 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1447 sym_hashes = elf_sym_hashes (input_bfd);
1448 local_got_offsets = elf_local_got_offsets (input_bfd);
1449
1450 sgot = NULL;
1451 splt = NULL;
1452 sgotplt = NULL;
1453 sreloc = NULL;
1454
1455 rel = relocs;
1456 relend = relocs + input_section->reloc_count;
1457 for (; rel < relend; rel++)
1458 {
1459 int r_type;
1460 reloc_howto_type *howto;
1461 unsigned long r_symndx;
1462 struct elf_link_hash_entry *h;
1463 Elf_Internal_Sym *sym;
1464 asection *sec;
1465 bfd_vma relocation;
1466 bfd_reloc_status_type r;
1467
1468 r_type = ELF32_R_TYPE (rel->r_info);
1469 if (r_type < 0 || r_type >= (int) R_VAX_max)
1470 {
1471 bfd_set_error (bfd_error_bad_value);
b34976b6 1472 return FALSE;
90ace9e9
JT
1473 }
1474 howto = howto_table + r_type;
1475
90ace9e9 1476 /* This is a final link. */
f0fe0e16 1477 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1478 h = NULL;
1479 sym = NULL;
1480 sec = NULL;
1481 if (r_symndx < symtab_hdr->sh_info)
1482 {
1483 sym = local_syms + r_symndx;
1484 sec = local_sections[r_symndx];
8517fae7 1485 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1486 }
1487 else
1488 {
560e09e9
NC
1489 bfd_boolean unresolved_reloc;
1490 bfd_boolean warned;
1491
b2a8e766
AM
1492 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1493 r_symndx, symtab_hdr, sym_hashes,
1494 h, sec, relocation,
1495 unresolved_reloc, warned);
560e09e9
NC
1496
1497 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1498 || h->root.type == bfd_link_hash_defweak)
560e09e9 1499 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1500 && h->plt.offset != (bfd_vma) -1
1501 && elf_hash_table (info)->dynamic_sections_created)
1502 || (r_type == R_VAX_GOT32
1503 && strcmp (h->root.root.string,
1504 "_GLOBAL_OFFSET_TABLE_") != 0
1505 && elf_hash_table (info)->dynamic_sections_created
1506 && (! info->shared
1507 || (! info->symbolic && h->dynindx != -1)
1508 || (h->elf_link_hash_flags
1509 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1510 || (info->shared
1511 && ((! info->symbolic && h->dynindx != -1)
1512 || (h->elf_link_hash_flags
1513 & ELF_LINK_HASH_DEF_REGULAR) == 0)
1514 && ((input_section->flags & SEC_ALLOC) != 0
1515 /* DWARF will emit R_VAX_32 relocations in its
1516 sections against symbols defined externally
1517 in shared libraries. We can't do anything
1518 with them here. */
1519
1520 || ((input_section->flags & SEC_DEBUGGING) != 0
1521 && (h->elf_link_hash_flags
1522 & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
1523 && (r_type == R_VAX_8
1524 || r_type == R_VAX_16
1525 || r_type == R_VAX_32
1526 || r_type == R_VAX_PC8
1527 || r_type == R_VAX_PC16
560e09e9
NC
1528 || r_type == R_VAX_PC32))))
1529 /* In these cases, we don't need the relocation
1530 value. We check specially because in some
1531 obscure cases sec->output_section will be NULL. */
90ace9e9 1532 relocation = 0;
90ace9e9
JT
1533 }
1534
1535 switch (r_type)
1536 {
1537 case R_VAX_GOT32:
1538 /* Relocation is to the address of the entry for this symbol
1539 in the global offset table. */
b29635ba 1540 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1541 break;
1542
1543 /* Relocation is the offset of the entry for this symbol in
1544 the global offset table. */
1545
1546 {
1547 bfd_vma off;
1548
90ace9e9
JT
1549 if (sgot == NULL)
1550 {
1551 sgot = bfd_get_section_by_name (dynobj, ".got");
1552 BFD_ASSERT (sgot != NULL);
1553 }
1554
1555 BFD_ASSERT (h != NULL);
1556 off = h->got.offset;
1557 BFD_ASSERT (off != (bfd_vma) -1);
b29635ba 1558 BFD_ASSERT (off < sgot->_raw_size);
90ace9e9
JT
1559
1560 if (info->shared
1561 && h->dynindx == -1
1562 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1563 {
1564 /* The symbol was forced to be local
1565 because of a version file.. We must initialize
1566 this entry in the global offset table. Since
1567 the offset must always be a multiple of 4, we
1568 use the least significant bit to record whether
1569 we have initialized it already.
1570
1571 When doing a dynamic link, we create a .rela.got
1572 relocation entry to initialize the value. This
1573 is done in the finish_dynamic_symbol routine. */
1574 if ((off & 1) != 0)
1575 off &= ~1;
1576 else
1577 {
1578 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1579 sgot->contents + off);
1580 h->got.offset |= 1;
1581 }
1582 } else {
1583 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1584 }
1585
1586 relocation = sgot->output_offset + off;
b29635ba 1587 /* The GOT relocation uses the addend. */
90ace9e9
JT
1588 rel->r_addend = 0;
1589
b29635ba
JT
1590 /* Change the reference to be indirect. */
1591 contents[rel->r_offset - 1] |= 0x10;
1592 relocation += sgot->output_section->vma;
90ace9e9
JT
1593 }
1594 break;
1595
1596 case R_VAX_PLT32:
1597 /* Relocation is to the entry for this symbol in the
1598 procedure linkage table. */
1599
1600 /* Resolve a PLTxx reloc against a local symbol directly,
1601 without using the procedure linkage table. */
1602 if (h == NULL)
1603 break;
1604
1605 if (h->plt.offset == (bfd_vma) -1
1606 || !elf_hash_table (info)->dynamic_sections_created)
1607 {
1608 /* We didn't make a PLT entry for this symbol. This
1609 happens when statically linking PIC code, or when
1610 using -Bsymbolic. */
1611 break;
1612 }
1613
1614 if (splt == NULL)
1615 {
1616 splt = bfd_get_section_by_name (dynobj, ".plt");
1617 BFD_ASSERT (splt != NULL);
1618 }
1619
1620 if (sgotplt == NULL)
1621 {
1622 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1623 BFD_ASSERT (splt != NULL);
1624 }
1625
1626 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1627
1628 /* Get the offset into the .got table of the entry that
1629 corresponds to this function. Each .got entry is 4 bytes.
1630 The first two are reserved. */
1631 got_offset = (plt_index + 3) * 4;
1632
1633 /* We want the relocate to point into the .got.plt instead
cedb70c5 1634 of the plt itself. */
90ace9e9
JT
1635 relocation = (sgotplt->output_section->vma
1636 + sgotplt->output_offset
1637 + got_offset);
1638 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1639 if (rel->r_addend == 2)
1640 {
1641 h->plt.offset |= 1;
1642 }
1643 else if (rel->r_addend != 0)
1644 (*_bfd_error_handler)
1645 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1646 bfd_get_filename (input_bfd), rel->r_addend,
1647 h->root.root.string,
1648 bfd_get_section_name (input_bfd, input_section));
1649 rel->r_addend = 0;
1650
1651 break;
1652
1653 case R_VAX_PC8:
1654 case R_VAX_PC16:
1655 case R_VAX_PC32:
1656 if (h == NULL)
1657 break;
1658 /* Fall through. */
1659 case R_VAX_8:
1660 case R_VAX_16:
1661 case R_VAX_32:
1662 if (info->shared
1663 && r_symndx != 0
1664 && (input_section->flags & SEC_ALLOC) != 0
1665 && ((r_type != R_VAX_PC8
1666 && r_type != R_VAX_PC16
1667 && r_type != R_VAX_PC32)
1668 || (!info->symbolic
1669 || (h->elf_link_hash_flags
1670 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
1671 {
1672 Elf_Internal_Rela outrel;
947216bf 1673 bfd_byte *loc;
b34976b6 1674 bfd_boolean skip, relocate;
90ace9e9
JT
1675
1676 /* When generating a shared object, these relocations
1677 are copied into the output file to be resolved at run
1678 time. */
90ace9e9
JT
1679 if (sreloc == NULL)
1680 {
1681 const char *name;
1682
1683 name = (bfd_elf_string_from_elf_section
1684 (input_bfd,
1685 elf_elfheader (input_bfd)->e_shstrndx,
1686 elf_section_data (input_section)->rel_hdr.sh_name));
1687 if (name == NULL)
b34976b6 1688 return FALSE;
90ace9e9
JT
1689
1690 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1691 && strcmp (bfd_get_section_name (input_bfd,
1692 input_section),
1693 name + 5) == 0);
1694
1695 sreloc = bfd_get_section_by_name (dynobj, name);
1696 BFD_ASSERT (sreloc != NULL);
1697 }
1698
b34976b6
AM
1699 skip = FALSE;
1700 relocate = FALSE;
90ace9e9
JT
1701
1702 outrel.r_offset =
1703 _bfd_elf_section_offset (output_bfd, info, input_section,
1704 rel->r_offset);
1705 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1706 skip = TRUE;
90ace9e9 1707 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1708 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1709 outrel.r_offset += (input_section->output_section->vma
1710 + input_section->output_offset);
1711
1712 if (skip)
1713 memset (&outrel, 0, sizeof outrel);
1714 /* h->dynindx may be -1 if the symbol was marked to
1715 become local. */
1716 else if (h != NULL
1717 && ((! info->symbolic && h->dynindx != -1)
1718 || (h->elf_link_hash_flags
1719 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1720 {
1721 BFD_ASSERT (h->dynindx != -1);
1722 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1723 outrel.r_addend = relocation + rel->r_addend;
1724 }
1725 else
1726 {
1727 if (r_type == R_VAX_32)
1728 {
b34976b6 1729 relocate = TRUE;
90ace9e9
JT
1730 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1731 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1732 &contents[rel->r_offset]) == 0);
1733 outrel.r_addend = relocation + rel->r_addend;
1734 }
1735 else
1736 {
1737 long indx;
1738
8517fae7 1739 if (bfd_is_abs_section (sec))
90ace9e9
JT
1740 indx = 0;
1741 else if (sec == NULL || sec->owner == NULL)
1742 {
1743 bfd_set_error (bfd_error_bad_value);
b34976b6 1744 return FALSE;
90ace9e9
JT
1745 }
1746 else
1747 {
1748 asection *osec;
1749
1750 osec = sec->output_section;
1751 indx = elf_section_data (osec)->dynindx;
1752 BFD_ASSERT (indx > 0);
1753 }
1754
1755 outrel.r_info = ELF32_R_INFO (indx, r_type);
1756 outrel.r_addend = relocation + rel->r_addend;
1757 }
1758 }
1759
1760 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1761 ".text") != 0 ||
90ace9e9
JT
1762 (info->shared
1763 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1764 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1765 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1766 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1767 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1768 {
1769 if (h != NULL)
1770 (*_bfd_error_handler)
1771 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1772 bfd_get_filename (input_bfd), howto->name,
1773 h->root.root.string,
1774 bfd_get_section_name (input_bfd, input_section));
1775 else
1776 (*_bfd_error_handler)
1777 (_("%s: warning: %s relocation to 0x%x from %s section"),
1778 bfd_get_filename (input_bfd), howto->name,
1779 outrel.r_addend,
1780 bfd_get_section_name (input_bfd, input_section));
1781 }
947216bf
AM
1782 loc = sreloc->contents;
1783 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1784 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1785
1786 /* This reloc will be computed at runtime, so there's no
1787 need to do anything now, except for R_VAX_32
1788 relocations that have been turned into
1789 R_VAX_RELATIVE. */
1790 if (!relocate)
1791 continue;
1792 }
1793
1794 break;
1795
1796 case R_VAX_GNU_VTINHERIT:
1797 case R_VAX_GNU_VTENTRY:
1798 /* These are no-ops in the end. */
1799 continue;
1800
1801 default:
1802 break;
1803 }
1804
b34976b6 1805 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1806 So subtract the difference from the relocation amount since we can't
1807 add it to the offset. */
90ace9e9 1808 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1809 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1810
1811 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1812 contents, rel->r_offset,
1813 relocation, rel->r_addend);
1814
1815 if (r != bfd_reloc_ok)
1816 {
1817 switch (r)
1818 {
1819 default:
1820 case bfd_reloc_outofrange:
1821 abort ();
1822 case bfd_reloc_overflow:
1823 {
1824 const char *name;
1825
1826 if (h != NULL)
1827 name = h->root.root.string;
1828 else
1829 {
1830 name = bfd_elf_string_from_elf_section (input_bfd,
1831 symtab_hdr->sh_link,
1832 sym->st_name);
1833 if (name == NULL)
b34976b6 1834 return FALSE;
90ace9e9
JT
1835 if (*name == '\0')
1836 name = bfd_section_name (input_bfd, sec);
1837 }
1838 if (!(info->callbacks->reloc_overflow
1839 (info, name, howto->name, (bfd_vma) 0,
1840 input_bfd, input_section, rel->r_offset)))
b34976b6 1841 return FALSE;
90ace9e9
JT
1842 }
1843 break;
1844 }
1845 }
1846 }
1847
b34976b6 1848 return TRUE;
90ace9e9
JT
1849}
1850
1851/* Finish up dynamic symbol handling. We set the contents of various
1852 dynamic sections here. */
1853
b34976b6 1854static bfd_boolean
90ace9e9
JT
1855elf_vax_finish_dynamic_symbol (output_bfd, info, h, sym)
1856 bfd *output_bfd;
1857 struct bfd_link_info *info;
1858 struct elf_link_hash_entry *h;
1859 Elf_Internal_Sym *sym;
1860{
1861 bfd *dynobj;
1862
1863 dynobj = elf_hash_table (info)->dynobj;
1864
1865 if (h->plt.offset != (bfd_vma) -1)
1866 {
1867 asection *splt;
1868 asection *sgot;
1869 asection *srela;
1870 bfd_vma plt_index;
1871 bfd_vma got_offset;
1872 bfd_vma addend;
1873 Elf_Internal_Rela rela;
947216bf 1874 bfd_byte *loc;
90ace9e9
JT
1875
1876 /* This symbol has an entry in the procedure linkage table. Set
1877 it up. */
90ace9e9
JT
1878 BFD_ASSERT (h->dynindx != -1);
1879
1880 splt = bfd_get_section_by_name (dynobj, ".plt");
1881 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1882 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1883 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1884
1885 addend = 2 * (h->plt.offset & 1);
1886 h->plt.offset &= ~1;
1887
1888 /* Get the index in the procedure linkage table which
1889 corresponds to this symbol. This is the index of this symbol
1890 in all the symbols for which we are making plt entries. The
1891 first entry in the procedure linkage table is reserved. */
1892 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1893
1894 /* Get the offset into the .got table of the entry that
1895 corresponds to this function. Each .got entry is 4 bytes.
1896 The first two are reserved. */
1897 got_offset = (plt_index + 3) * 4;
1898
1899 /* Fill in the entry in the procedure linkage table. */
1900 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1901 PLT_ENTRY_SIZE);
1902
1903 /* The offset is relative to the first extension word. */
1904 bfd_put_32 (output_bfd,
1905 -(h->plt.offset + 8),
1906 splt->contents + h->plt.offset + 4);
1907
1908 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1909 splt->contents + h->plt.offset + 8);
1910
1911 /* Fill in the entry in the global offset table. */
1912 bfd_put_32 (output_bfd,
1913 (splt->output_section->vma
1914 + splt->output_offset
1915 + h->plt.offset) + addend,
1916 sgot->contents + got_offset);
1917
1918 /* Fill in the entry in the .rela.plt section. */
1919 rela.r_offset = (sgot->output_section->vma
1920 + sgot->output_offset
1921 + got_offset);
1922 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1923 rela.r_addend = addend;
947216bf
AM
1924 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1925 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1926
1927 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
1928 {
1929 /* Mark the symbol as undefined, rather than as defined in
1930 the .plt section. Leave the value alone. */
1931 sym->st_shndx = SHN_UNDEF;
1932 }
1933 }
1934
1935 if (h->got.offset != (bfd_vma) -1)
1936 {
1937 asection *sgot;
1938 asection *srela;
1939 Elf_Internal_Rela rela;
947216bf 1940 bfd_byte *loc;
90ace9e9
JT
1941
1942 /* This symbol has an entry in the global offset table. Set it
1943 up. */
90ace9e9
JT
1944 sgot = bfd_get_section_by_name (dynobj, ".got");
1945 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1946 BFD_ASSERT (sgot != NULL && srela != NULL);
1947
1948 rela.r_offset = (sgot->output_section->vma
1949 + sgot->output_offset
1950 + (h->got.offset &~ 1));
1951
1952 /* If the symbol was forced to be local because of a version file
1953 locally we just want to emit a RELATIVE reloc. The entry in
1954 the global offset table will already have been initialized in
1955 the relocate_section function. */
1956 if (info->shared
1957 && h->dynindx == -1
1958 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
1959 {
1960 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1961 }
1962 else
1963 {
1964 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1965 }
1966 rela.r_addend = bfd_get_signed_32 (output_bfd,
1967 (sgot->contents
1968 + (h->got.offset & ~1)));
1969
947216bf
AM
1970 loc = srela->contents;
1971 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1972 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1973 }
1974
1975 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
1976 {
1977 asection *s;
1978 Elf_Internal_Rela rela;
947216bf 1979 bfd_byte *loc;
90ace9e9
JT
1980
1981 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1982 BFD_ASSERT (h->dynindx != -1
1983 && (h->root.type == bfd_link_hash_defined
1984 || h->root.type == bfd_link_hash_defweak));
1985
1986 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1987 ".rela.bss");
1988 BFD_ASSERT (s != NULL);
1989
1990 rela.r_offset = (h->root.u.def.value
1991 + h->root.u.def.section->output_section->vma
1992 + h->root.u.def.section->output_offset);
1993 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1994 rela.r_addend = 0;
947216bf
AM
1995 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1996 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1997 }
1998
1999 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
2000 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
2001 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2002 sym->st_shndx = SHN_ABS;
2003
b34976b6 2004 return TRUE;
90ace9e9
JT
2005}
2006
2007/* Finish up the dynamic sections. */
2008
b34976b6 2009static bfd_boolean
90ace9e9
JT
2010elf_vax_finish_dynamic_sections (output_bfd, info)
2011 bfd *output_bfd;
2012 struct bfd_link_info *info;
2013{
2014 bfd *dynobj;
2015 asection *sgot;
2016 asection *sdyn;
2017
2018 dynobj = elf_hash_table (info)->dynobj;
2019
2020 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2021 BFD_ASSERT (sgot != NULL);
2022 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2023
2024 if (elf_hash_table (info)->dynamic_sections_created)
2025 {
2026 asection *splt;
2027 Elf32_External_Dyn *dyncon, *dynconend;
2028
2029 splt = bfd_get_section_by_name (dynobj, ".plt");
2030 BFD_ASSERT (splt != NULL && sdyn != NULL);
2031
2032 dyncon = (Elf32_External_Dyn *) sdyn->contents;
2033 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2034 for (; dyncon < dynconend; dyncon++)
2035 {
2036 Elf_Internal_Dyn dyn;
2037 const char *name;
2038 asection *s;
2039
2040 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2041
2042 switch (dyn.d_tag)
2043 {
2044 default:
2045 break;
2046
2047 case DT_PLTGOT:
2048 name = ".got";
2049 goto get_vma;
2050 case DT_JMPREL:
2051 name = ".rela.plt";
2052 get_vma:
2053 s = bfd_get_section_by_name (output_bfd, name);
2054 BFD_ASSERT (s != NULL);
2055 dyn.d_un.d_ptr = s->vma;
2056 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2057 break;
2058
2059 case DT_PLTRELSZ:
2060 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2061 BFD_ASSERT (s != NULL);
2062 if (s->_cooked_size != 0)
2063 dyn.d_un.d_val = s->_cooked_size;
2064 else
2065 dyn.d_un.d_val = s->_raw_size;
2066 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2067 break;
2068
2069 case DT_RELASZ:
2070 /* The procedure linkage table relocs (DT_JMPREL) should
2071 not be included in the overall relocs (DT_RELA).
2072 Therefore, we override the DT_RELASZ entry here to
2073 make it not include the JMPREL relocs. Since the
2074 linker script arranges for .rela.plt to follow all
2075 other relocation sections, we don't have to worry
2076 about changing the DT_RELA entry. */
2077 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2078 if (s != NULL)
2079 {
2080 if (s->_cooked_size != 0)
2081 dyn.d_un.d_val -= s->_cooked_size;
2082 else
2083 dyn.d_un.d_val -= s->_raw_size;
2084 }
2085 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2086 break;
2087 }
2088 }
2089
2090 /* Fill in the first entry in the procedure linkage table. */
2091 if (splt->_raw_size > 0)
2092 {
2093 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2094 bfd_put_32 (output_bfd,
2095 (sgot->output_section->vma
2096 + sgot->output_offset + 4
2097 - (splt->output_section->vma + 6)),
2098 splt->contents + 2);
2099 bfd_put_32 (output_bfd,
2100 (sgot->output_section->vma
2101 + sgot->output_offset + 8
2102 - (splt->output_section->vma + 12)),
2103 splt->contents + 8);
cedb70c5 2104 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2105 = PLT_ENTRY_SIZE;
2106 }
2107 }
2108
2109 /* Fill in the first three entries in the global offset table. */
2110 if (sgot->_raw_size > 0)
2111 {
2112 if (sdyn == NULL)
2113 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2114 else
2115 bfd_put_32 (output_bfd,
2116 sdyn->output_section->vma + sdyn->output_offset,
2117 sgot->contents);
2118 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2119 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2120 }
2121
2122 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2123
b34976b6 2124 return TRUE;
90ace9e9
JT
2125}
2126
2127#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2128#define TARGET_LITTLE_NAME "elf32-vax"
2129#define ELF_MACHINE_CODE EM_VAX
2130#define ELF_MAXPAGESIZE 0x1000
2131
2132#define elf_backend_create_dynamic_sections \
2133 _bfd_elf_create_dynamic_sections
2134#define bfd_elf32_bfd_link_hash_table_create \
2135 elf_vax_link_hash_table_create
2136#define bfd_elf32_bfd_final_link _bfd_elf32_gc_common_final_link
2137
2138#define elf_backend_check_relocs elf_vax_check_relocs
2139#define elf_backend_adjust_dynamic_symbol \
2140 elf_vax_adjust_dynamic_symbol
2141#define elf_backend_size_dynamic_sections \
2142 elf_vax_size_dynamic_sections
2143#define elf_backend_relocate_section elf_vax_relocate_section
2144#define elf_backend_finish_dynamic_symbol \
2145 elf_vax_finish_dynamic_symbol
2146#define elf_backend_finish_dynamic_sections \
2147 elf_vax_finish_dynamic_sections
2148#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2149#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2150#define bfd_elf32_bfd_merge_private_bfd_data \
2151 elf32_vax_merge_private_bfd_data
2152#define bfd_elf32_bfd_set_private_flags \
2153 elf32_vax_set_private_flags
2154#define bfd_elf32_bfd_print_private_bfd_data \
2155 elf32_vax_print_private_bfd_data
2156
2157#define elf_backend_can_gc_sections 1
2158#define elf_backend_want_got_plt 1
2159#define elf_backend_plt_readonly 1
2160#define elf_backend_want_plt_sym 0
2161#define elf_backend_got_header_size 16
f0fe0e16 2162#define elf_backend_rela_normal 1
90ace9e9
JT
2163
2164#include "elf32-target.h"
This page took 0.297687 seconds and 4 git commands to generate.