Use %pI, %pR, %pS, %pT in place of %I, %R, %S and %T.
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
219d1afa 2 Copyright (C) 1993-2018 Free Software Foundation, Inc.
90ace9e9
JT
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
90ace9e9 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
90ace9e9 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
90ace9e9 21
90ace9e9 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
90ace9e9
JT
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576
NC
29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
ce71b576
NC
37static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
6db7e006
MR
49static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
ce71b576
NC
51
52static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
2c3fc389 53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
6346d5ca 58 3, /* size (0 = byte, 1 = short, 2 = long) */
90ace9e9 59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
64d29018 282rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
90ace9e9 283{
cd21f5da
NC
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
695344c0 289 /* xgettext:c-format */
871b3ab2 290 _bfd_error_handler (_("%pB: unrecognised VAX reloc number: %d"),
4eca0228 291 abfd, r_type);
cd21f5da
NC
292 bfd_set_error (bfd_error_bad_value);
293 r_type = R_VAX_NONE;
294 }
295 cache_ptr->howto = &howto_table[r_type];
90ace9e9
JT
296}
297
298#define elf_info_to_howto rtype_to_howto
299
300static const struct
301{
302 bfd_reloc_code_real_type bfd_val;
303 int elf_val;
304} reloc_map[] = {
305 { BFD_RELOC_NONE, R_VAX_NONE },
306 { BFD_RELOC_32, R_VAX_32 },
307 { BFD_RELOC_16, R_VAX_16 },
308 { BFD_RELOC_8, R_VAX_8 },
309 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314 { BFD_RELOC_NONE, R_VAX_COPY },
315 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318 { BFD_RELOC_CTOR, R_VAX_32 },
319 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321};
322
323static reloc_howto_type *
ce71b576 324reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
325{
326 unsigned int i;
327 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328 {
329 if (reloc_map[i].bfd_val == code)
330 return &howto_table[reloc_map[i].elf_val];
331 }
332 return 0;
333}
334
157090f7
AM
335static reloc_howto_type *
336reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337 const char *r_name)
338{
339 unsigned int i;
340
341 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342 if (howto_table[i].name != NULL
343 && strcasecmp (howto_table[i].name, r_name) == 0)
344 return &howto_table[i];
345
346 return NULL;
347}
348
90ace9e9 349#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 350#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
351#define ELF_ARCH bfd_arch_vax
352/* end code generated by elf.el */
90ace9e9
JT
353\f
354/* Functions for the VAX ELF linker. */
355
356/* The name of the dynamic interpreter. This is put in the .interp
357 section. */
358
359#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360
361/* The size in bytes of an entry in the procedure linkage table. */
362
363#define PLT_ENTRY_SIZE 12
364
365/* The first entry in a procedure linkage table looks like this. See
366 the SVR4 ABI VAX supplement to see how this works. */
367
368static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369{
370 0xdd, 0xef, /* pushl l^ */
371 0, 0, 0, 0, /* offset to .plt.got + 4 */
372 0x17, 0xff, /* jmp @L^(pc) */
373 0, 0, 0, 0, /* offset to .plt.got + 8 */
374};
375
376/* Subsequent entries in a procedure linkage table look like this. */
377
378static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379{
6c4fb25a 380 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 381 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
382 0, 0, 0, 0, /* replaced with offset to start of .plt */
383 0, 0, 0, 0, /* index into .rela.plt */
384};
385
386/* The VAX linker needs to keep track of the number of relocs that it
387 decides to copy in check_relocs for each symbol. This is so that it
388 can discard PC relative relocs if it doesn't need them when linking
389 with -Bsymbolic. We store the information in a field extending the
390 regular ELF linker hash table. */
391
392/* This structure keeps track of the number of PC relative relocs we have
393 copied for a given symbol. */
394
395struct elf_vax_pcrel_relocs_copied
396{
397 /* Next section. */
398 struct elf_vax_pcrel_relocs_copied *next;
399 /* A section in dynobj. */
400 asection *section;
401 /* Number of relocs copied in this section. */
402 bfd_size_type count;
403};
404
405/* VAX ELF linker hash entry. */
406
407struct elf_vax_link_hash_entry
408{
409 struct elf_link_hash_entry root;
410
411 /* Number of PC relative relocs copied for this symbol. */
412 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413
414 bfd_vma got_addend;
415};
416
90ace9e9
JT
417/* Declare this now that the above structures are defined. */
418
ce71b576 419static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 420 void *);
90ace9e9 421
b29635ba
JT
422/* Declare this now that the above structures are defined. */
423
ce71b576 424static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 425 void *);
b29635ba 426
90ace9e9
JT
427/* Traverse an VAX ELF linker hash table. */
428
429#define elf_vax_link_hash_traverse(table, func, info) \
430 (elf_link_hash_traverse \
4dfe6ac6 431 ((table), \
2c3fc389 432 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
433 (info)))
434
90ace9e9
JT
435/* Create an entry in an VAX ELF linker hash table. */
436
437static struct bfd_hash_entry *
ce71b576
NC
438elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439 struct bfd_hash_table *table,
440 const char *string)
90ace9e9
JT
441{
442 struct elf_vax_link_hash_entry *ret =
443 (struct elf_vax_link_hash_entry *) entry;
444
445 /* Allocate the structure if it has not already been allocated by a
446 subclass. */
ce71b576 447 if (ret == NULL)
90ace9e9
JT
448 ret = ((struct elf_vax_link_hash_entry *)
449 bfd_hash_allocate (table,
450 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 451 if (ret == NULL)
90ace9e9
JT
452 return (struct bfd_hash_entry *) ret;
453
454 /* Call the allocation method of the superclass. */
455 ret = ((struct elf_vax_link_hash_entry *)
456 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457 table, string));
ce71b576 458 if (ret != NULL)
90ace9e9
JT
459 {
460 ret->pcrel_relocs_copied = NULL;
461 }
462
463 return (struct bfd_hash_entry *) ret;
464}
465
466/* Create an VAX ELF linker hash table. */
467
468static struct bfd_link_hash_table *
ce71b576 469elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 470{
4dfe6ac6
NC
471 struct elf_link_hash_table *ret;
472 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 473
7bf52ea2 474 ret = bfd_zmalloc (amt);
ce71b576 475 if (ret == NULL)
90ace9e9
JT
476 return NULL;
477
4dfe6ac6 478 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 479 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
480 sizeof (struct elf_vax_link_hash_entry),
481 GENERIC_ELF_DATA))
90ace9e9
JT
482 {
483 free (ret);
484 return NULL;
485 }
486
4dfe6ac6 487 return &ret->root;
90ace9e9
JT
488}
489
490/* Keep vax-specific flags in the ELF header */
b34976b6 491static bfd_boolean
ce71b576 492elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
493{
494 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
495 elf_flags_init (abfd) = TRUE;
496 return TRUE;
90ace9e9
JT
497}
498
499/* Merge backend specific data from an object file to the output
500 object file when linking. */
b34976b6 501static bfd_boolean
50e03d47 502elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
90ace9e9 503{
50e03d47 504 bfd *obfd = info->output_bfd;
90ace9e9
JT
505 flagword in_flags;
506
507 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
508 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 509 return TRUE;
90ace9e9
JT
510
511 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
512
513 if (!elf_flags_init (obfd))
514 {
b34976b6 515 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
516 elf_elfheader (obfd)->e_flags = in_flags;
517 }
518
b34976b6 519 return TRUE;
90ace9e9
JT
520}
521
522/* Display the flags field */
b34976b6 523static bfd_boolean
2c3fc389 524elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
525{
526 FILE *file = (FILE *) ptr;
527
528 BFD_ASSERT (abfd != NULL && ptr != NULL);
529
530 /* Print normal ELF private data. */
531 _bfd_elf_print_private_bfd_data (abfd, ptr);
532
533 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
534
535 /* xgettext:c-format */
536 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
537
179d3252 538 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
539 fprintf (file, _(" [nonpic]"));
540
179d3252 541 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
542 fprintf (file, _(" [d-float]"));
543
179d3252 544 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
545 fprintf (file, _(" [g-float]"));
546
547 fputc ('\n', file);
548
b34976b6 549 return TRUE;
90ace9e9
JT
550}
551/* Look through the relocs for a section during the first phase, and
552 allocate space in the global offset table or procedure linkage
553 table. */
554
b34976b6 555static bfd_boolean
ce71b576
NC
556elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
557 const Elf_Internal_Rela *relocs)
90ace9e9
JT
558{
559 bfd *dynobj;
560 Elf_Internal_Shdr *symtab_hdr;
561 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
562 const Elf_Internal_Rela *rel;
563 const Elf_Internal_Rela *rel_end;
90ace9e9
JT
564 asection *sreloc;
565
0e1862bb 566 if (bfd_link_relocatable (info))
b34976b6 567 return TRUE;
90ace9e9
JT
568
569 dynobj = elf_hash_table (info)->dynobj;
570 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
571 sym_hashes = elf_sym_hashes (abfd);
90ace9e9 572
90ace9e9
JT
573 sreloc = NULL;
574
575 rel_end = relocs + sec->reloc_count;
576 for (rel = relocs; rel < rel_end; rel++)
577 {
578 unsigned long r_symndx;
579 struct elf_link_hash_entry *h;
580
581 r_symndx = ELF32_R_SYM (rel->r_info);
582
583 if (r_symndx < symtab_hdr->sh_info)
584 h = NULL;
585 else
973a3492
L
586 {
587 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
588 while (h->root.type == bfd_link_hash_indirect
589 || h->root.type == bfd_link_hash_warning)
590 h = (struct elf_link_hash_entry *) h->root.u.i.link;
591 }
90ace9e9
JT
592
593 switch (ELF32_R_TYPE (rel->r_info))
594 {
595 case R_VAX_GOT32:
fe723c87 596 BFD_ASSERT (h != NULL);
90ace9e9 597
7b6021f1
MR
598 /* If this is a local symbol, we resolve it directly without
599 creating a global offset table entry. */
125b5bac
MR
600 if (h->forced_local
601 || h == elf_hash_table (info)->hgot
602 || h == elf_hash_table (info)->hplt)
7b6021f1
MR
603 break;
604
90ace9e9
JT
605 /* This symbol requires a global offset table entry. */
606
607 if (dynobj == NULL)
608 {
609 /* Create the .got section. */
610 elf_hash_table (info)->dynobj = dynobj = abfd;
611 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 612 return FALSE;
90ace9e9
JT
613 }
614
90ace9e9
JT
615 if (h != NULL)
616 {
617 struct elf_vax_link_hash_entry *eh;
618
619 eh = (struct elf_vax_link_hash_entry *) h;
620 if (h->got.refcount == -1)
621 {
622 h->got.refcount = 1;
623 eh->got_addend = rel->r_addend;
90ace9e9
JT
624 }
625 else
626 {
627 h->got.refcount++;
628 if (eh->got_addend != (bfd_vma) rel->r_addend)
4eca0228 629 _bfd_error_handler
695344c0 630 /* xgettext:c-format */
871b3ab2 631 (_("%pB: warning: GOT addend of %Ld to `%s' does"
d42c267e 632 " not match previous GOT addend of %Ld"),
dae82561 633 abfd, rel->r_addend, h->root.root.string,
fe723c87 634 eh->got_addend);
cedb70c5 635
90ace9e9
JT
636 }
637 }
638 break;
639
640 case R_VAX_PLT32:
641 /* This symbol requires a procedure linkage table entry. We
642 actually build the entry in adjust_dynamic_symbol,
07d6d2b8
AM
643 because this might be a case of linking PIC code which is
644 never referenced by a dynamic object, in which case we
645 don't need to generate a procedure linkage table entry
646 after all. */
125b5bac 647 BFD_ASSERT (h != NULL);
90ace9e9
JT
648
649 /* If this is a local symbol, we resolve it directly without
650 creating a procedure linkage table entry. */
125b5bac 651 if (h->forced_local)
fe723c87 652 break;
90ace9e9 653
f5385ebf 654 h->needs_plt = 1;
90ace9e9
JT
655 if (h->plt.refcount == -1)
656 h->plt.refcount = 1;
657 else
658 h->plt.refcount++;
659 break;
660
661 case R_VAX_PC8:
662 case R_VAX_PC16:
663 case R_VAX_PC32:
664 /* If we are creating a shared library and this is not a local
665 symbol, we need to copy the reloc into the shared library.
666 However when linking with -Bsymbolic and this is a global
667 symbol which is defined in an object we are including in the
668 link (i.e., DEF_REGULAR is set), then we can resolve the
669 reloc directly. At this point we have not seen all the input
670 files, so it is possible that DEF_REGULAR is not set now but
671 will be set later (it is never cleared). We account for that
672 possibility below by storing information in the
673 pcrel_relocs_copied field of the hash table entry. */
0e1862bb 674 if (!(bfd_link_pic (info)
90ace9e9
JT
675 && (sec->flags & SEC_ALLOC) != 0
676 && h != NULL
677 && (!info->symbolic
f5385ebf 678 || !h->def_regular)))
90ace9e9 679 {
7b6021f1
MR
680 if (h != NULL
681 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
682 && !h->forced_local)
90ace9e9
JT
683 {
684 /* Make sure a plt entry is created for this symbol if
685 it turns out to be a function defined by a dynamic
686 object. */
687 if (h->plt.refcount == -1)
688 h->plt.refcount = 1;
689 else
690 h->plt.refcount++;
691 }
692 break;
693 }
7b6021f1
MR
694 /* If this is a local symbol, we can resolve it directly. */
695 if (h != NULL
696 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
697 || h->forced_local))
fe723c87
MT
698 break;
699
90ace9e9
JT
700 /* Fall through. */
701 case R_VAX_8:
702 case R_VAX_16:
703 case R_VAX_32:
7b6021f1 704 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
705 {
706 /* Make sure a plt entry is created for this symbol if it
707 turns out to be a function defined by a dynamic object. */
708 if (h->plt.refcount == -1)
709 h->plt.refcount = 1;
710 else
711 h->plt.refcount++;
712 }
713
714 /* If we are creating a shared library, we need to copy the
715 reloc into the shared library. */
0e1862bb 716 if (bfd_link_pic (info)
90ace9e9
JT
717 && (sec->flags & SEC_ALLOC) != 0)
718 {
719 /* When creating a shared object, we must copy these
720 reloc types into the output file. We create a reloc
721 section in dynobj and make room for this reloc. */
722 if (sreloc == NULL)
723 {
83bac4b0
NC
724 sreloc = _bfd_elf_make_dynamic_reloc_section
725 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 726
83bac4b0 727 if (sreloc == NULL)
b34976b6 728 return FALSE;
90ace9e9 729
90ace9e9
JT
730 if (sec->flags & SEC_READONLY)
731 info->flags |= DF_TEXTREL;
732 }
733
eea6121a 734 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
735
736 /* If we are linking with -Bsymbolic, we count the number of
737 PC relative relocations we have entered for this symbol,
738 so that we can discard them again if the symbol is later
739 defined by a regular object. Note that this function is
19852a2a 740 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
741 which means that h is really a pointer to an
742 elf_vax_link_hash_entry. */
743 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
744 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
745 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
746 && info->symbolic)
747 {
748 struct elf_vax_link_hash_entry *eh;
749 struct elf_vax_pcrel_relocs_copied *p;
750
751 eh = (struct elf_vax_link_hash_entry *) h;
752
753 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
754 if (p->section == sreloc)
755 break;
756
757 if (p == NULL)
758 {
759 p = ((struct elf_vax_pcrel_relocs_copied *)
760 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
761 if (p == NULL)
b34976b6 762 return FALSE;
90ace9e9
JT
763 p->next = eh->pcrel_relocs_copied;
764 eh->pcrel_relocs_copied = p;
765 p->section = sreloc;
766 p->count = 0;
767 }
768
769 ++p->count;
770 }
771 }
772
773 break;
774
775 /* This relocation describes the C++ object vtable hierarchy.
776 Reconstruct it for later use during GC. */
777 case R_VAX_GNU_VTINHERIT:
c152c796 778 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 779 return FALSE;
90ace9e9
JT
780 break;
781
782 /* This relocation describes which C++ vtable entries are actually
783 used. Record for later use during GC. */
784 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
785 BFD_ASSERT (h != NULL);
786 if (h != NULL
787 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 788 return FALSE;
90ace9e9
JT
789 break;
790
791 default:
792 break;
793 }
794 }
795
b34976b6 796 return TRUE;
90ace9e9
JT
797}
798
799/* Return the section that should be marked against GC for a given
800 relocation. */
801
802static asection *
ce71b576 803elf_vax_gc_mark_hook (asection *sec,
07adf181 804 struct bfd_link_info *info,
ce71b576
NC
805 Elf_Internal_Rela *rel,
806 struct elf_link_hash_entry *h,
807 Elf_Internal_Sym *sym)
90ace9e9
JT
808{
809 if (h != NULL)
07adf181
AM
810 switch (ELF32_R_TYPE (rel->r_info))
811 {
812 case R_VAX_GNU_VTINHERIT:
813 case R_VAX_GNU_VTENTRY:
814 return NULL;
815 }
816
817 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
818}
819
90ace9e9
JT
820/* Adjust a symbol defined by a dynamic object and referenced by a
821 regular object. The current definition is in some section of the
822 dynamic object, but we're not including those sections. We have to
823 change the definition to something the rest of the link can
824 understand. */
825
b34976b6 826static bfd_boolean
a0f0eb1e
MR
827elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
828 struct elf_link_hash_entry *h)
90ace9e9
JT
829{
830 bfd *dynobj;
831 asection *s;
90ace9e9
JT
832
833 dynobj = elf_hash_table (info)->dynobj;
834
835 /* Make sure we know what is going on here. */
836 BFD_ASSERT (dynobj != NULL
f5385ebf 837 && (h->needs_plt
60d67dc8 838 || h->is_weakalias
f5385ebf
AM
839 || (h->def_dynamic
840 && h->ref_regular
841 && !h->def_regular)));
90ace9e9
JT
842
843 /* If this is a function, put it in the procedure linkage table. We
844 will fill in the contents of the procedure linkage table later,
845 when we know the address of the .got section. */
846 if (h->type == STT_FUNC
f5385ebf 847 || h->needs_plt)
90ace9e9 848 {
a22a8039
MR
849 if (h->plt.refcount <= 0
850 || SYMBOL_CALLS_LOCAL (info, h)
851 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
852 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
853 {
854 /* This case can occur if we saw a PLTxx reloc in an input
855 file, but the symbol was never referred to by a dynamic
a22a8039
MR
856 object, or if all references were garbage collected. In
857 such a case, we don't actually need to build a procedure
858 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 859 h->plt.offset = (bfd_vma) -1;
f5385ebf 860 h->needs_plt = 0;
b34976b6 861 return TRUE;
90ace9e9
JT
862 }
863
ce558b89 864 s = elf_hash_table (info)->splt;
90ace9e9
JT
865 BFD_ASSERT (s != NULL);
866
867 /* If this is the first .plt entry, make room for the special
868 first entry. */
eea6121a 869 if (s->size == 0)
90ace9e9 870 {
eea6121a 871 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
872 }
873
874 /* If this symbol is not defined in a regular file, and we are
875 not generating a shared library, then set the symbol to this
876 location in the .plt. This is required to make function
877 pointers compare as equal between the normal executable and
878 the shared library. */
0e1862bb 879 if (!bfd_link_pic (info)
f5385ebf 880 && !h->def_regular)
90ace9e9
JT
881 {
882 h->root.u.def.section = s;
eea6121a 883 h->root.u.def.value = s->size;
90ace9e9
JT
884 }
885
eea6121a 886 h->plt.offset = s->size;
90ace9e9
JT
887
888 /* Make room for this entry. */
eea6121a 889 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
890
891 /* We also need to make an entry in the .got.plt section, which
892 will be placed in the .got section by the linker script. */
893
ce558b89 894 s = elf_hash_table (info)->sgotplt;
90ace9e9 895 BFD_ASSERT (s != NULL);
eea6121a 896 s->size += 4;
90ace9e9
JT
897
898 /* We also need to make an entry in the .rela.plt section. */
899
ce558b89 900 s = elf_hash_table (info)->srelplt;
90ace9e9 901 BFD_ASSERT (s != NULL);
eea6121a 902 s->size += sizeof (Elf32_External_Rela);
90ace9e9 903
b34976b6 904 return TRUE;
90ace9e9
JT
905 }
906
907 /* Reinitialize the plt offset now that it is not used as a reference
908 count any more. */
909 h->plt.offset = (bfd_vma) -1;
910
911 /* If this is a weak symbol, and there is a real definition, the
912 processor independent code will have arranged for us to see the
913 real definition first, and we can just use the same value. */
60d67dc8 914 if (h->is_weakalias)
90ace9e9 915 {
60d67dc8
AM
916 struct elf_link_hash_entry *def = weakdef (h);
917 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
918 h->root.u.def.section = def->root.u.def.section;
919 h->root.u.def.value = def->root.u.def.value;
b34976b6 920 return TRUE;
90ace9e9
JT
921 }
922
923 /* This is a reference to a symbol defined by a dynamic object which
924 is not a function. */
925
926 /* If we are creating a shared library, we must presume that the
927 only references to the symbol are via the global offset table.
928 For such cases we need not do anything here; the relocations will
929 be handled correctly by relocate_section. */
0e1862bb 930 if (bfd_link_pic (info))
b34976b6 931 return TRUE;
90ace9e9
JT
932
933 /* We must allocate the symbol in our .dynbss section, which will
934 become part of the .bss section of the executable. There will be
935 an entry for this symbol in the .dynsym section. The dynamic
936 object will contain position independent code, so all references
937 from the dynamic object to this symbol will go through the global
938 offset table. The dynamic linker will use the .dynsym entry to
939 determine the address it must put in the global offset table, so
940 both the dynamic object and the regular object will refer to the
941 same memory location for the variable. */
942
3d4d4302 943 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
944 BFD_ASSERT (s != NULL);
945
946 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
947 copy the initial value out of the dynamic object and into the
948 runtime process image. We need to remember the offset into the
949 .rela.bss section we are going to use. */
1d7e9d18 950 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
951 {
952 asection *srel;
953
3d4d4302 954 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 955 BFD_ASSERT (srel != NULL);
eea6121a 956 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 957 h->needs_copy = 1;
90ace9e9
JT
958 }
959
6cabe1ea 960 return _bfd_elf_adjust_dynamic_copy (info, h, s);
90ace9e9
JT
961}
962
fac3d241
MR
963/* This function is called via elf_link_hash_traverse. It resets GOT
964 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
965 will be done. */
966
967static bfd_boolean
968elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
969 void *infoptr ATTRIBUTE_UNUSED)
970{
971 h->got.refcount = -1;
972 h->plt.refcount = -1;
973
974 return TRUE;
975}
976
977/* Discard unused dynamic data if this is a static link. */
978
979static bfd_boolean
980elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
981 struct bfd_link_info *info)
982{
983 bfd *dynobj;
984 asection *s;
985
986 dynobj = elf_hash_table (info)->dynobj;
987
988 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
989 {
990 /* We may have created entries in the .rela.got and .got sections.
991 However, if we are not creating the dynamic sections, we will
992 not actually use these entries. Reset the size of .rela.got
49d01bf6 993 and .got, which will cause them to get stripped from the output
fac3d241 994 file below. */
ce558b89 995 s = elf_hash_table (info)->srelgot;
fac3d241
MR
996 if (s != NULL)
997 s->size = 0;
ce558b89 998 s = elf_hash_table (info)->sgotplt;
fac3d241
MR
999 if (s != NULL)
1000 s->size = 0;
ce558b89 1001 s = elf_hash_table (info)->sgot;
fac3d241
MR
1002 if (s != NULL)
1003 s->size = 0;
1004 }
1005
1006 /* If this is a static link, we need to discard all the got entries we've
1007 recorded. */
1008 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1009 elf_link_hash_traverse (elf_hash_table (info),
1010 elf_vax_discard_got_entries,
1011 info);
1012
1013 return TRUE;
1014}
1015
90ace9e9
JT
1016/* Set the sizes of the dynamic sections. */
1017
b34976b6 1018static bfd_boolean
ce71b576 1019elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1020{
1021 bfd *dynobj;
1022 asection *s;
b34976b6
AM
1023 bfd_boolean plt;
1024 bfd_boolean relocs;
1025 bfd_boolean reltext;
90ace9e9
JT
1026
1027 dynobj = elf_hash_table (info)->dynobj;
1028 BFD_ASSERT (dynobj != NULL);
1029
1030 if (elf_hash_table (info)->dynamic_sections_created)
1031 {
1032 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 1033 if (bfd_link_executable (info) && !info->nointerp)
90ace9e9 1034 {
3d4d4302 1035 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1036 BFD_ASSERT (s != NULL);
eea6121a 1037 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1038 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1039 }
1040 }
90ace9e9
JT
1041
1042 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1043 relative relocs against symbols defined in a regular object. We
1044 allocated space for them in the check_relocs routine, but we will not
1045 fill them in in the relocate_section routine. */
0e1862bb 1046 if (bfd_link_pic (info) && info->symbolic)
4dfe6ac6 1047 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1048 elf_vax_discard_copies,
ce71b576 1049 NULL);
b29635ba 1050
fac3d241
MR
1051 /* If this is a -Bsymbolic shared link, we need to discard all the got
1052 entries we've recorded. Otherwise, we need to instantiate (allocate
1053 space for them). */
b29635ba
JT
1054 elf_link_hash_traverse (elf_hash_table (info),
1055 elf_vax_instantiate_got_entries,
2c3fc389 1056 info);
90ace9e9
JT
1057
1058 /* The check_relocs and adjust_dynamic_symbol entry points have
1059 determined the sizes of the various dynamic sections. Allocate
1060 memory for them. */
b34976b6
AM
1061 plt = FALSE;
1062 relocs = FALSE;
1063 reltext = FALSE;
90ace9e9
JT
1064 for (s = dynobj->sections; s != NULL; s = s->next)
1065 {
1066 const char *name;
90ace9e9
JT
1067
1068 if ((s->flags & SEC_LINKER_CREATED) == 0)
1069 continue;
1070
1071 /* It's OK to base decisions on the section name, because none
1072 of the dynobj section names depend upon the input files. */
1073 name = bfd_get_section_name (dynobj, s);
1074
90ace9e9
JT
1075 if (strcmp (name, ".plt") == 0)
1076 {
c456f082
AM
1077 /* Remember whether there is a PLT. */
1078 plt = s->size != 0;
90ace9e9 1079 }
0112cd26 1080 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1081 {
c456f082 1082 if (s->size != 0)
90ace9e9
JT
1083 {
1084 asection *target;
1085
1086 /* Remember whether there are any reloc sections other
07d6d2b8 1087 than .rela.plt. */
90ace9e9
JT
1088 if (strcmp (name, ".rela.plt") != 0)
1089 {
1090 const char *outname;
1091
b34976b6 1092 relocs = TRUE;
90ace9e9
JT
1093
1094 /* If this relocation section applies to a read only
1095 section, then we probably need a DT_TEXTREL
1096 entry. .rela.plt is actually associated with
1097 .got.plt, which is never readonly. */
1098 outname = bfd_get_section_name (output_bfd,
1099 s->output_section);
1100 target = bfd_get_section_by_name (output_bfd, outname + 5);
1101 if (target != NULL
1102 && (target->flags & SEC_READONLY) != 0
1103 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1104 reltext = TRUE;
90ace9e9
JT
1105 }
1106
1107 /* We use the reloc_count field as a counter if we need
1108 to copy relocs into the output file. */
1109 s->reloc_count = 0;
1110 }
1111 }
0112cd26 1112 else if (! CONST_STRNEQ (name, ".got")
c456f082 1113 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1114 {
1115 /* It's not one of our sections, so don't allocate space. */
1116 continue;
1117 }
1118
c456f082 1119 if (s->size == 0)
90ace9e9 1120 {
c456f082
AM
1121 /* If we don't need this section, strip it from the
1122 output file. This is mostly to handle .rela.bss and
1123 .rela.plt. We must create both sections in
1124 create_dynamic_sections, because they must be created
1125 before the linker maps input sections to output
1126 sections. The linker does that before
1127 adjust_dynamic_symbol is called, and it is that
1128 function which decides whether anything needs to go
1129 into these sections. */
8423293d 1130 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1131 continue;
1132 }
1133
c456f082
AM
1134 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1135 continue;
1136
90ace9e9 1137 /* Allocate memory for the section contents. */
eb9a5ecf 1138 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 1139 if (s->contents == NULL)
b34976b6 1140 return FALSE;
90ace9e9
JT
1141 }
1142
1143 if (elf_hash_table (info)->dynamic_sections_created)
1144 {
1145 /* Add some entries to the .dynamic section. We fill in the
1146 values later, in elf_vax_finish_dynamic_sections, but we
1147 must add the entries now so that we get the correct size for
1148 the .dynamic section. The DT_DEBUG entry is filled in by the
1149 dynamic linker and used by the debugger. */
1150#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1151 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9 1152
0e1862bb 1153 if (!bfd_link_pic (info))
90ace9e9
JT
1154 {
1155 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1156 return FALSE;
90ace9e9
JT
1157 }
1158
1159 if (plt)
1160 {
1161 if (!add_dynamic_entry (DT_PLTGOT, 0)
1162 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1163 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1164 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1165 return FALSE;
90ace9e9
JT
1166 }
1167
1168 if (relocs)
1169 {
1170 if (!add_dynamic_entry (DT_RELA, 0)
1171 || !add_dynamic_entry (DT_RELASZ, 0)
1172 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1173 return FALSE;
90ace9e9
JT
1174 }
1175
1176 if (reltext || (info->flags & DF_TEXTREL) != 0)
1177 {
1178 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1179 return FALSE;
90ace9e9
JT
1180 }
1181 }
1182#undef add_dynamic_entry
1183
b34976b6 1184 return TRUE;
90ace9e9
JT
1185}
1186
1187/* This function is called via elf_vax_link_hash_traverse if we are
1188 creating a shared object with -Bsymbolic. It discards the space
1189 allocated to copy PC relative relocs against symbols which are defined
1190 in regular objects. We allocated space for them in the check_relocs
1191 routine, but we won't fill them in in the relocate_section routine. */
1192
b34976b6 1193static bfd_boolean
ce71b576 1194elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1195 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1196{
1197 struct elf_vax_pcrel_relocs_copied *s;
1198
90ace9e9 1199 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1200 if (!h->root.def_regular)
b34976b6 1201 return TRUE;
90ace9e9
JT
1202
1203 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1204 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1205
b34976b6 1206 return TRUE;
90ace9e9
JT
1207}
1208
fac3d241
MR
1209/* This function is called via elf_link_hash_traverse. It looks for
1210 entries that have GOT or PLT (.GOT) references. If creating a shared
1211 object with -Bsymbolic, or the symbol has been forced local, then it
1212 resets the reference count back to -1 so normal PC32 relocation will
1213 be done. Otherwise space in the .got and .rela.got will be reserved
1214 for the symbol. */
b29635ba 1215
b34976b6 1216static bfd_boolean
2c3fc389 1217elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1218{
1219 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1220 bfd *dynobj;
1221 asection *sgot;
1222 asection *srelgot;
b34976b6 1223
b29635ba
JT
1224 /* We don't care about non-GOT (and non-PLT) entries. */
1225 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1226 return TRUE;
b29635ba
JT
1227
1228 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1229 BFD_ASSERT (dynobj != NULL);
b29635ba 1230
ce558b89
AM
1231 sgot = elf_hash_table (info)->sgot;
1232 srelgot = elf_hash_table (info)->srelgot;
b29635ba 1233
125b5bac 1234 if (SYMBOL_REFERENCES_LOCAL (info, h))
b29635ba 1235 {
8be65dd3
MR
1236 h->got.refcount = -1;
1237 h->plt.refcount = -1;
b29635ba
JT
1238 }
1239 else if (h->got.refcount > 0)
1240 {
1241 /* Make sure this symbol is output as a dynamic symbol. */
1242 if (h->dynindx == -1)
1243 {
c152c796 1244 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1245 return FALSE;
b29635ba
JT
1246 }
1247
1248 /* Allocate space in the .got and .rela.got sections. */
125b5bac
MR
1249 sgot->size += 4;
1250 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1251 }
1252
b34976b6 1253 return TRUE;
b29635ba
JT
1254}
1255
90ace9e9
JT
1256/* Relocate an VAX ELF section. */
1257
b34976b6 1258static bfd_boolean
ce71b576
NC
1259elf_vax_relocate_section (bfd *output_bfd,
1260 struct bfd_link_info *info,
1261 bfd *input_bfd,
1262 asection *input_section,
1263 bfd_byte *contents,
1264 Elf_Internal_Rela *relocs,
1265 Elf_Internal_Sym *local_syms,
1266 asection **local_sections)
90ace9e9 1267{
90ace9e9
JT
1268 Elf_Internal_Shdr *symtab_hdr;
1269 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1270 bfd_vma plt_index;
1271 bfd_vma got_offset;
1272 asection *sgot;
1273 asection *splt;
1274 asection *sgotplt;
1275 asection *sreloc;
1276 Elf_Internal_Rela *rel;
1277 Elf_Internal_Rela *relend;
1278
90ace9e9
JT
1279 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1280 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1281
1282 sgot = NULL;
1283 splt = NULL;
1284 sgotplt = NULL;
1285 sreloc = NULL;
1286
1287 rel = relocs;
1288 relend = relocs + input_section->reloc_count;
1289 for (; rel < relend; rel++)
1290 {
1291 int r_type;
1292 reloc_howto_type *howto;
1293 unsigned long r_symndx;
1294 struct elf_link_hash_entry *h;
1295 Elf_Internal_Sym *sym;
1296 asection *sec;
1297 bfd_vma relocation;
1298 bfd_reloc_status_type r;
1299
1300 r_type = ELF32_R_TYPE (rel->r_info);
1301 if (r_type < 0 || r_type >= (int) R_VAX_max)
1302 {
1303 bfd_set_error (bfd_error_bad_value);
b34976b6 1304 return FALSE;
90ace9e9
JT
1305 }
1306 howto = howto_table + r_type;
1307
f0fe0e16 1308 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1309 h = NULL;
1310 sym = NULL;
1311 sec = NULL;
1312 if (r_symndx < symtab_hdr->sh_info)
1313 {
1314 sym = local_syms + r_symndx;
1315 sec = local_sections[r_symndx];
8517fae7 1316 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1317 }
1318 else
1319 {
560e09e9 1320 bfd_boolean unresolved_reloc;
62d887d4 1321 bfd_boolean warned, ignored;
560e09e9 1322
b2a8e766
AM
1323 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1324 r_symndx, symtab_hdr, sym_hashes,
1325 h, sec, relocation,
62d887d4 1326 unresolved_reloc, warned, ignored);
ce71b576 1327
560e09e9 1328 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1329 || h->root.type == bfd_link_hash_defweak)
560e09e9 1330 && ((r_type == R_VAX_PLT32
90ace9e9 1331 && h->plt.offset != (bfd_vma) -1
fe723c87 1332 && !h->forced_local
90ace9e9
JT
1333 && elf_hash_table (info)->dynamic_sections_created)
1334 || (r_type == R_VAX_GOT32
fe723c87
MT
1335 && h->got.offset != (bfd_vma) -1
1336 && !h->forced_local
90ace9e9 1337 && elf_hash_table (info)->dynamic_sections_created
0e1862bb 1338 && (! bfd_link_pic (info)
90ace9e9 1339 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1340 || !h->def_regular))
0e1862bb 1341 || (bfd_link_pic (info)
90ace9e9 1342 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1343 || !h->def_regular)
90ace9e9
JT
1344 && ((input_section->flags & SEC_ALLOC) != 0
1345 /* DWARF will emit R_VAX_32 relocations in its
1346 sections against symbols defined externally
1347 in shared libraries. We can't do anything
1348 with them here. */
1349
1350 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1351 && h->def_dynamic))
90ace9e9
JT
1352 && (r_type == R_VAX_8
1353 || r_type == R_VAX_16
fe723c87 1354 || r_type == R_VAX_32))))
560e09e9
NC
1355 /* In these cases, we don't need the relocation
1356 value. We check specially because in some
1357 obscure cases sec->output_section will be NULL. */
90ace9e9 1358 relocation = 0;
90ace9e9
JT
1359 }
1360
dbaa2011 1361 if (sec != NULL && discarded_section (sec))
e4067dbb 1362 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1363 rel, 1, relend, howto, 0, contents);
ab96bf03 1364
0e1862bb 1365 if (bfd_link_relocatable (info))
ab96bf03
AM
1366 continue;
1367
90ace9e9
JT
1368 switch (r_type)
1369 {
1370 case R_VAX_GOT32:
1371 /* Relocation is to the address of the entry for this symbol
1372 in the global offset table. */
125b5bac
MR
1373
1374 /* Resolve a GOTxx reloc against a local symbol directly,
1375 without using the global offset table. */
7b6021f1 1376 if (h == NULL
125b5bac 1377 || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1378 break;
1379
90ace9e9
JT
1380 {
1381 bfd_vma off;
1382
ce558b89
AM
1383 sgot = elf_hash_table (info)->sgot;
1384 BFD_ASSERT (sgot != NULL);
90ace9e9 1385
90ace9e9 1386 off = h->got.offset;
eea6121a 1387 BFD_ASSERT (off < sgot->size);
90ace9e9 1388
125b5bac 1389 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
90ace9e9
JT
1390
1391 relocation = sgot->output_offset + off;
b29635ba 1392 /* The GOT relocation uses the addend. */
90ace9e9
JT
1393 rel->r_addend = 0;
1394
b29635ba
JT
1395 /* Change the reference to be indirect. */
1396 contents[rel->r_offset - 1] |= 0x10;
1397 relocation += sgot->output_section->vma;
90ace9e9
JT
1398 }
1399 break;
1400
04981bc1
MR
1401 case R_VAX_PC32:
1402 /* If we are creating an executable and the function this
1403 reloc refers to is in a shared lib, then we made a PLT
1404 entry for this symbol and need to handle the reloc like
1405 a PLT reloc. */
0e1862bb 1406 if (bfd_link_pic (info))
04981bc1
MR
1407 goto r_vax_pc32_shared;
1408 /* Fall through. */
90ace9e9
JT
1409 case R_VAX_PLT32:
1410 /* Relocation is to the entry for this symbol in the
1411 procedure linkage table. */
1412
1413 /* Resolve a PLTxx reloc against a local symbol directly,
1414 without using the procedure linkage table. */
7b6021f1 1415 if (h == NULL
125b5bac 1416 || h->plt.offset == (bfd_vma) -1)
90ace9e9
JT
1417 break;
1418
ce558b89
AM
1419 splt = elf_hash_table (info)->splt;
1420 BFD_ASSERT (splt != NULL);
90ace9e9 1421
ce558b89
AM
1422 sgotplt = elf_hash_table (info)->sgotplt;
1423 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1424
1425 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1426
1427 /* Get the offset into the .got table of the entry that
1428 corresponds to this function. Each .got entry is 4 bytes.
1429 The first two are reserved. */
1430 got_offset = (plt_index + 3) * 4;
1431
9e86195c 1432 /* We want the relocation to point into the .got.plt instead
cedb70c5 1433 of the plt itself. */
90ace9e9
JT
1434 relocation = (sgotplt->output_section->vma
1435 + sgotplt->output_offset
1436 + got_offset);
1437 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1438 if (rel->r_addend == 2)
1439 {
1440 h->plt.offset |= 1;
1441 }
1442 else if (rel->r_addend != 0)
4eca0228 1443 _bfd_error_handler
695344c0 1444 /* xgettext:c-format */
871b3ab2
AM
1445 (_("%pB: warning: PLT addend of %Ld to `%s'"
1446 " from %pA section ignored"),
dae82561 1447 input_bfd, rel->r_addend, h->root.root.string, input_section);
90ace9e9
JT
1448 rel->r_addend = 0;
1449
1450 break;
1451
1452 case R_VAX_PC8:
1453 case R_VAX_PC16:
04981bc1 1454 r_vax_pc32_shared:
7b6021f1
MR
1455 if (h == NULL
1456 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1457 || h->forced_local)
90ace9e9
JT
1458 break;
1459 /* Fall through. */
1460 case R_VAX_8:
1461 case R_VAX_16:
1462 case R_VAX_32:
0e1862bb 1463 if (bfd_link_pic (info)
cf35638d 1464 && r_symndx != STN_UNDEF
90ace9e9
JT
1465 && (input_section->flags & SEC_ALLOC) != 0
1466 && ((r_type != R_VAX_PC8
1467 && r_type != R_VAX_PC16
1468 && r_type != R_VAX_PC32)
da6bcfca
MT
1469 || ((input_section->flags & SEC_CODE)
1470 && (!info->symbolic
1471 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1472 {
1473 Elf_Internal_Rela outrel;
947216bf 1474 bfd_byte *loc;
b34976b6 1475 bfd_boolean skip, relocate;
90ace9e9
JT
1476
1477 /* When generating a shared object, these relocations
1478 are copied into the output file to be resolved at run
1479 time. */
90ace9e9
JT
1480 if (sreloc == NULL)
1481 {
83bac4b0
NC
1482 sreloc = _bfd_elf_get_dynamic_reloc_section
1483 (input_bfd, input_section, /*rela?*/ TRUE);
1484 if (sreloc == NULL)
b34976b6 1485 return FALSE;
90ace9e9
JT
1486 }
1487
b34976b6
AM
1488 skip = FALSE;
1489 relocate = FALSE;
90ace9e9
JT
1490
1491 outrel.r_offset =
1492 _bfd_elf_section_offset (output_bfd, info, input_section,
1493 rel->r_offset);
1494 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1495 skip = TRUE;
90ace9e9 1496 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1497 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1498 outrel.r_offset += (input_section->output_section->vma
1499 + input_section->output_offset);
1500
1501 if (skip)
1502 memset (&outrel, 0, sizeof outrel);
1503 /* h->dynindx may be -1 if the symbol was marked to
07d6d2b8 1504 become local. */
90ace9e9
JT
1505 else if (h != NULL
1506 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1507 || !h->def_regular))
90ace9e9
JT
1508 {
1509 BFD_ASSERT (h->dynindx != -1);
1510 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1511 outrel.r_addend = relocation + rel->r_addend;
1512 }
1513 else
1514 {
1515 if (r_type == R_VAX_32)
1516 {
b34976b6 1517 relocate = TRUE;
90ace9e9
JT
1518 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1519 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1520 &contents[rel->r_offset]) == 0);
1521 outrel.r_addend = relocation + rel->r_addend;
1522 }
1523 else
1524 {
1525 long indx;
1526
8517fae7 1527 if (bfd_is_abs_section (sec))
90ace9e9
JT
1528 indx = 0;
1529 else if (sec == NULL || sec->owner == NULL)
1530 {
1531 bfd_set_error (bfd_error_bad_value);
b34976b6 1532 return FALSE;
90ace9e9
JT
1533 }
1534 else
1535 {
1536 asection *osec;
1537
74541ad4
AM
1538 /* We are turning this relocation into one
1539 against a section symbol. It would be
1540 proper to subtract the symbol's value,
1541 osec->vma, from the emitted reloc addend,
1542 but ld.so expects buggy relocs. */
90ace9e9
JT
1543 osec = sec->output_section;
1544 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1545 if (indx == 0)
1546 {
1547 struct elf_link_hash_table *htab;
1548 htab = elf_hash_table (info);
1549 osec = htab->text_index_section;
1550 indx = elf_section_data (osec)->dynindx;
1551 }
1552 BFD_ASSERT (indx != 0);
90ace9e9
JT
1553 }
1554
1555 outrel.r_info = ELF32_R_INFO (indx, r_type);
1556 outrel.r_addend = relocation + rel->r_addend;
1557 }
1558 }
1559
ddd74d3c 1560 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1561 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1562 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1563 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1564 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1565 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1566 {
1567 if (h != NULL)
4eca0228 1568 _bfd_error_handler
695344c0 1569 /* xgettext:c-format */
871b3ab2
AM
1570 (_("%pB: warning: %s relocation against symbol `%s'"
1571 " from %pA section"),
dae82561
AM
1572 input_bfd, howto->name, h->root.root.string,
1573 input_section);
90ace9e9 1574 else
4eca0228 1575 _bfd_error_handler
695344c0 1576 /* xgettext:c-format */
871b3ab2 1577 (_("%pB: warning: %s relocation to %#Lx from %pA section"),
dae82561
AM
1578 input_bfd, howto->name, outrel.r_addend,
1579 input_section);
90ace9e9 1580 }
947216bf
AM
1581 loc = sreloc->contents;
1582 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1583 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1584
1585 /* This reloc will be computed at runtime, so there's no
07d6d2b8
AM
1586 need to do anything now, except for R_VAX_32
1587 relocations that have been turned into
1588 R_VAX_RELATIVE. */
90ace9e9
JT
1589 if (!relocate)
1590 continue;
1591 }
1592
1593 break;
1594
1595 case R_VAX_GNU_VTINHERIT:
1596 case R_VAX_GNU_VTENTRY:
1597 /* These are no-ops in the end. */
1598 continue;
1599
1600 default:
1601 break;
1602 }
1603
b34976b6 1604 /* VAX PCREL relocations are from the end of relocation, not the start.
07d6d2b8
AM
1605 So subtract the difference from the relocation amount since we can't
1606 add it to the offset. */
90ace9e9 1607 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1608 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1609
1610 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1611 contents, rel->r_offset,
1612 relocation, rel->r_addend);
1613
1614 if (r != bfd_reloc_ok)
1615 {
1616 switch (r)
1617 {
1618 default:
1619 case bfd_reloc_outofrange:
1620 abort ();
1621 case bfd_reloc_overflow:
1622 {
1623 const char *name;
1624
1625 if (h != NULL)
dfeffb9f 1626 name = NULL;
90ace9e9
JT
1627 else
1628 {
1629 name = bfd_elf_string_from_elf_section (input_bfd,
1630 symtab_hdr->sh_link,
1631 sym->st_name);
1632 if (name == NULL)
b34976b6 1633 return FALSE;
90ace9e9
JT
1634 if (*name == '\0')
1635 name = bfd_section_name (input_bfd, sec);
1636 }
1a72702b
AM
1637 info->callbacks->reloc_overflow
1638 (info, (h ? &h->root : NULL), name, howto->name,
1639 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
90ace9e9
JT
1640 }
1641 break;
1642 }
1643 }
1644 }
1645
b34976b6 1646 return TRUE;
90ace9e9
JT
1647}
1648
1649/* Finish up dynamic symbol handling. We set the contents of various
1650 dynamic sections here. */
1651
b34976b6 1652static bfd_boolean
ce71b576
NC
1653elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1654 struct elf_link_hash_entry *h,
1655 Elf_Internal_Sym *sym)
90ace9e9
JT
1656{
1657 bfd *dynobj;
1658
1659 dynobj = elf_hash_table (info)->dynobj;
1660
1661 if (h->plt.offset != (bfd_vma) -1)
1662 {
1663 asection *splt;
1664 asection *sgot;
1665 asection *srela;
1666 bfd_vma plt_index;
1667 bfd_vma got_offset;
1668 bfd_vma addend;
1669 Elf_Internal_Rela rela;
947216bf 1670 bfd_byte *loc;
90ace9e9
JT
1671
1672 /* This symbol has an entry in the procedure linkage table. Set
1673 it up. */
90ace9e9
JT
1674 BFD_ASSERT (h->dynindx != -1);
1675
ce558b89
AM
1676 splt = elf_hash_table (info)->splt;
1677 sgot = elf_hash_table (info)->sgotplt;
1678 srela = elf_hash_table (info)->srelplt;
90ace9e9
JT
1679 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1680
1681 addend = 2 * (h->plt.offset & 1);
1682 h->plt.offset &= ~1;
1683
1684 /* Get the index in the procedure linkage table which
1685 corresponds to this symbol. This is the index of this symbol
1686 in all the symbols for which we are making plt entries. The
1687 first entry in the procedure linkage table is reserved. */
1688 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1689
1690 /* Get the offset into the .got table of the entry that
1691 corresponds to this function. Each .got entry is 4 bytes.
1692 The first two are reserved. */
1693 got_offset = (plt_index + 3) * 4;
1694
1695 /* Fill in the entry in the procedure linkage table. */
1696 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
07d6d2b8 1697 PLT_ENTRY_SIZE);
90ace9e9
JT
1698
1699 /* The offset is relative to the first extension word. */
1700 bfd_put_32 (output_bfd,
1701 -(h->plt.offset + 8),
1702 splt->contents + h->plt.offset + 4);
1703
1704 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1705 splt->contents + h->plt.offset + 8);
1706
1707 /* Fill in the entry in the global offset table. */
1708 bfd_put_32 (output_bfd,
1709 (splt->output_section->vma
1710 + splt->output_offset
1711 + h->plt.offset) + addend,
1712 sgot->contents + got_offset);
1713
1714 /* Fill in the entry in the .rela.plt section. */
1715 rela.r_offset = (sgot->output_section->vma
1716 + sgot->output_offset
1717 + got_offset);
1718 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1719 rela.r_addend = addend;
947216bf
AM
1720 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1721 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1722
f5385ebf 1723 if (!h->def_regular)
90ace9e9
JT
1724 {
1725 /* Mark the symbol as undefined, rather than as defined in
1726 the .plt section. Leave the value alone. */
1727 sym->st_shndx = SHN_UNDEF;
1728 }
1729 }
1730
1731 if (h->got.offset != (bfd_vma) -1)
1732 {
1733 asection *sgot;
1734 asection *srela;
1735 Elf_Internal_Rela rela;
947216bf 1736 bfd_byte *loc;
90ace9e9
JT
1737
1738 /* This symbol has an entry in the global offset table. Set it
1739 up. */
ce558b89
AM
1740 sgot = elf_hash_table (info)->sgot;
1741 srela = elf_hash_table (info)->srelgot;
90ace9e9
JT
1742 BFD_ASSERT (sgot != NULL && srela != NULL);
1743
1744 rela.r_offset = (sgot->output_section->vma
1745 + sgot->output_offset
125b5bac
MR
1746 + h->got.offset);
1747 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
90ace9e9 1748 rela.r_addend = bfd_get_signed_32 (output_bfd,
125b5bac 1749 sgot->contents + h->got.offset);
90ace9e9 1750
947216bf
AM
1751 loc = srela->contents;
1752 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1753 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1754 }
1755
f5385ebf 1756 if (h->needs_copy)
90ace9e9
JT
1757 {
1758 asection *s;
1759 Elf_Internal_Rela rela;
947216bf 1760 bfd_byte *loc;
90ace9e9
JT
1761
1762 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1763 BFD_ASSERT (h->dynindx != -1
1764 && (h->root.type == bfd_link_hash_defined
1765 || h->root.type == bfd_link_hash_defweak));
1766
3d4d4302 1767 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1768 BFD_ASSERT (s != NULL);
1769
1770 rela.r_offset = (h->root.u.def.value
1771 + h->root.u.def.section->output_section->vma
1772 + h->root.u.def.section->output_offset);
1773 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1774 rela.r_addend = 0;
947216bf
AM
1775 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1776 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1777 }
1778
1779 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1780 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1781 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1782 sym->st_shndx = SHN_ABS;
1783
b34976b6 1784 return TRUE;
90ace9e9
JT
1785}
1786
1787/* Finish up the dynamic sections. */
1788
b34976b6 1789static bfd_boolean
ce71b576 1790elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1791{
1792 bfd *dynobj;
1793 asection *sgot;
1794 asection *sdyn;
1795
1796 dynobj = elf_hash_table (info)->dynobj;
1797
ce558b89 1798 sgot = elf_hash_table (info)->sgotplt;
90ace9e9 1799 BFD_ASSERT (sgot != NULL);
3d4d4302 1800 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1801
1802 if (elf_hash_table (info)->dynamic_sections_created)
1803 {
1804 asection *splt;
1805 Elf32_External_Dyn *dyncon, *dynconend;
1806
ce558b89 1807 splt = elf_hash_table (info)->splt;
90ace9e9
JT
1808 BFD_ASSERT (splt != NULL && sdyn != NULL);
1809
1810 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1811 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1812 for (; dyncon < dynconend; dyncon++)
1813 {
1814 Elf_Internal_Dyn dyn;
90ace9e9
JT
1815 asection *s;
1816
1817 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1818
1819 switch (dyn.d_tag)
1820 {
1821 default:
1822 break;
1823
1824 case DT_PLTGOT:
ce558b89 1825 s = elf_hash_table (info)->sgotplt;
90ace9e9
JT
1826 goto get_vma;
1827 case DT_JMPREL:
ce558b89 1828 s = elf_hash_table (info)->srelplt;
90ace9e9 1829 get_vma:
4ade44b7 1830 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
90ace9e9
JT
1831 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1832 break;
1833
1834 case DT_PLTRELSZ:
ce558b89 1835 s = elf_hash_table (info)->srelplt;
eea6121a 1836 dyn.d_un.d_val = s->size;
90ace9e9
JT
1837 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1838 break;
90ace9e9
JT
1839 }
1840 }
1841
1842 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1843 if (splt->size > 0)
90ace9e9
JT
1844 {
1845 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1846 bfd_put_32 (output_bfd,
07d6d2b8
AM
1847 (sgot->output_section->vma
1848 + sgot->output_offset + 4
1849 - (splt->output_section->vma + 6)),
1850 splt->contents + 2);
90ace9e9 1851 bfd_put_32 (output_bfd,
07d6d2b8
AM
1852 (sgot->output_section->vma
1853 + sgot->output_offset + 8
1854 - (splt->output_section->vma + 12)),
1855 splt->contents + 8);
1856 elf_section_data (splt->output_section)->this_hdr.sh_entsize
1857 = PLT_ENTRY_SIZE;
90ace9e9
JT
1858 }
1859 }
1860
1861 /* Fill in the first three entries in the global offset table. */
eea6121a 1862 if (sgot->size > 0)
90ace9e9
JT
1863 {
1864 if (sdyn == NULL)
1865 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1866 else
1867 bfd_put_32 (output_bfd,
1868 sdyn->output_section->vma + sdyn->output_offset,
1869 sgot->contents);
1870 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1871 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1872 }
1873
f6518c48
MR
1874 if (elf_section_data (sgot->output_section) != NULL)
1875 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
90ace9e9 1876
b34976b6 1877 return TRUE;
90ace9e9
JT
1878}
1879
9b90d8fd 1880static enum elf_reloc_type_class
7e612e98
AM
1881elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1882 const asection *rel_sec ATTRIBUTE_UNUSED,
1883 const Elf_Internal_Rela *rela)
9b90d8fd
MR
1884{
1885 switch ((int) ELF32_R_TYPE (rela->r_info))
1886 {
1887 case R_VAX_RELATIVE:
1888 return reloc_class_relative;
1889 case R_VAX_JMP_SLOT:
1890 return reloc_class_plt;
1891 case R_VAX_COPY:
1892 return reloc_class_copy;
1893 default:
1894 return reloc_class_normal;
1895 }
1896}
1897
6db7e006
MR
1898static bfd_vma
1899elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1900 const arelent *rel ATTRIBUTE_UNUSED)
1901{
1902 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1903}
1904
6d00b590 1905#define TARGET_LITTLE_SYM vax_elf32_vec
90ace9e9
JT
1906#define TARGET_LITTLE_NAME "elf32-vax"
1907#define ELF_MACHINE_CODE EM_VAX
1908#define ELF_MAXPAGESIZE 0x1000
1909
1910#define elf_backend_create_dynamic_sections \
1911 _bfd_elf_create_dynamic_sections
1912#define bfd_elf32_bfd_link_hash_table_create \
1913 elf_vax_link_hash_table_create
c152c796 1914#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
1915
1916#define elf_backend_check_relocs elf_vax_check_relocs
1917#define elf_backend_adjust_dynamic_symbol \
1918 elf_vax_adjust_dynamic_symbol
fac3d241
MR
1919#define elf_backend_always_size_sections \
1920 elf_vax_always_size_sections
90ace9e9
JT
1921#define elf_backend_size_dynamic_sections \
1922 elf_vax_size_dynamic_sections
74541ad4 1923#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
1924#define elf_backend_relocate_section elf_vax_relocate_section
1925#define elf_backend_finish_dynamic_symbol \
1926 elf_vax_finish_dynamic_symbol
1927#define elf_backend_finish_dynamic_sections \
1928 elf_vax_finish_dynamic_sections
9b90d8fd 1929#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9 1930#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
6db7e006 1931#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9 1932#define bfd_elf32_bfd_merge_private_bfd_data \
07d6d2b8 1933 elf32_vax_merge_private_bfd_data
90ace9e9 1934#define bfd_elf32_bfd_set_private_flags \
07d6d2b8 1935 elf32_vax_set_private_flags
90ace9e9 1936#define bfd_elf32_bfd_print_private_bfd_data \
07d6d2b8 1937 elf32_vax_print_private_bfd_data
90ace9e9
JT
1938
1939#define elf_backend_can_gc_sections 1
1940#define elf_backend_want_got_plt 1
1941#define elf_backend_plt_readonly 1
1942#define elf_backend_want_plt_sym 0
1943#define elf_backend_got_header_size 16
f0fe0e16 1944#define elf_backend_rela_normal 1
64f52338 1945#define elf_backend_dtrel_excludes_plt 1
90ace9e9
JT
1946
1947#include "elf32-target.h"
This page took 0.946599 seconds and 4 git commands to generate.