daily update
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
83bac4b0 3 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
cd123cb7 10 the Free Software Foundation; either version 3 of the License, or
ae9a127f 11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
cd123cb7
NC
20 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
21 MA 02110-1301, USA. */
90ace9e9 22
90ace9e9 23#include "sysdep.h"
3db64b00 24#include "bfd.h"
90ace9e9
JT
25#include "bfdlink.h"
26#include "libbfd.h"
27#include "elf-bfd.h"
28#include "elf/vax.h"
29
ce71b576
NC
30static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
31static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
32static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
33 struct bfd_hash_table *,
34 const char *);
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
36static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
37 asection *, const Elf_Internal_Rela *);
ce71b576
NC
38static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
39 struct elf_link_hash_entry *);
40static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
41static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
42 bfd *, asection *, bfd_byte *,
43 Elf_Internal_Rela *,
44 Elf_Internal_Sym *, asection **);
45static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
46 struct elf_link_hash_entry *,
47 Elf_Internal_Sym *);
48static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
49 struct bfd_link_info *);
50
51static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
52static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
58 0, /* size (0 = byte, 1 = short, 2 = long) */
59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
ce71b576
NC
282rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
283 Elf_Internal_Rela *dst)
90ace9e9
JT
284{
285 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
286 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
287}
288
289#define elf_info_to_howto rtype_to_howto
290
291static const struct
292{
293 bfd_reloc_code_real_type bfd_val;
294 int elf_val;
295} reloc_map[] = {
296 { BFD_RELOC_NONE, R_VAX_NONE },
297 { BFD_RELOC_32, R_VAX_32 },
298 { BFD_RELOC_16, R_VAX_16 },
299 { BFD_RELOC_8, R_VAX_8 },
300 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
301 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
302 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
303 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
304 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
305 { BFD_RELOC_NONE, R_VAX_COPY },
306 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
307 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
308 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
309 { BFD_RELOC_CTOR, R_VAX_32 },
310 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
311 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
312};
313
314static reloc_howto_type *
ce71b576 315reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
316{
317 unsigned int i;
318 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
319 {
320 if (reloc_map[i].bfd_val == code)
321 return &howto_table[reloc_map[i].elf_val];
322 }
323 return 0;
324}
325
157090f7
AM
326static reloc_howto_type *
327reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
328 const char *r_name)
329{
330 unsigned int i;
331
332 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
333 if (howto_table[i].name != NULL
334 && strcasecmp (howto_table[i].name, r_name) == 0)
335 return &howto_table[i];
336
337 return NULL;
338}
339
90ace9e9 340#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 341#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
ce71b576
NC
417static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
418 PTR);
90ace9e9 419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
ce71b576
NC
422static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
423 PTR);
b29635ba 424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
ce71b576 430 (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func), \
90ace9e9
JT
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
ce71b576 435#define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
90ace9e9
JT
436
437/* Create an entry in an VAX ELF linker hash table. */
438
439static struct bfd_hash_entry *
ce71b576
NC
440elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
441 struct bfd_hash_table *table,
442 const char *string)
90ace9e9
JT
443{
444 struct elf_vax_link_hash_entry *ret =
445 (struct elf_vax_link_hash_entry *) entry;
446
447 /* Allocate the structure if it has not already been allocated by a
448 subclass. */
ce71b576 449 if (ret == NULL)
90ace9e9
JT
450 ret = ((struct elf_vax_link_hash_entry *)
451 bfd_hash_allocate (table,
452 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 453 if (ret == NULL)
90ace9e9
JT
454 return (struct bfd_hash_entry *) ret;
455
456 /* Call the allocation method of the superclass. */
457 ret = ((struct elf_vax_link_hash_entry *)
458 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
459 table, string));
ce71b576 460 if (ret != NULL)
90ace9e9
JT
461 {
462 ret->pcrel_relocs_copied = NULL;
463 }
464
465 return (struct bfd_hash_entry *) ret;
466}
467
468/* Create an VAX ELF linker hash table. */
469
470static struct bfd_link_hash_table *
ce71b576 471elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9
JT
472{
473 struct elf_vax_link_hash_table *ret;
474 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
475
ce71b576
NC
476 ret = bfd_malloc (amt);
477 if (ret == NULL)
90ace9e9
JT
478 return NULL;
479
66eb6687
AM
480 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
481 elf_vax_link_hash_newfunc,
482 sizeof (struct elf_vax_link_hash_entry)))
90ace9e9
JT
483 {
484 free (ret);
485 return NULL;
486 }
487
488 return &ret->root.root;
489}
490
491/* Keep vax-specific flags in the ELF header */
b34976b6 492static bfd_boolean
ce71b576 493elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
494{
495 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
496 elf_flags_init (abfd) = TRUE;
497 return TRUE;
90ace9e9
JT
498}
499
500/* Merge backend specific data from an object file to the output
501 object file when linking. */
b34976b6 502static bfd_boolean
ce71b576 503elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
90ace9e9
JT
504{
505 flagword out_flags;
506 flagword in_flags;
507
508 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
509 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 510 return TRUE;
90ace9e9
JT
511
512 in_flags = elf_elfheader (ibfd)->e_flags;
513 out_flags = elf_elfheader (obfd)->e_flags;
514
515 if (!elf_flags_init (obfd))
516 {
b34976b6 517 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
518 elf_elfheader (obfd)->e_flags = in_flags;
519 }
520
b34976b6 521 return TRUE;
90ace9e9
JT
522}
523
524/* Display the flags field */
b34976b6 525static bfd_boolean
ce71b576 526elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
90ace9e9
JT
527{
528 FILE *file = (FILE *) ptr;
529
530 BFD_ASSERT (abfd != NULL && ptr != NULL);
531
532 /* Print normal ELF private data. */
533 _bfd_elf_print_private_bfd_data (abfd, ptr);
534
535 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
536
537 /* xgettext:c-format */
538 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
539
179d3252 540 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
541 fprintf (file, _(" [nonpic]"));
542
179d3252 543 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
544 fprintf (file, _(" [d-float]"));
545
179d3252 546 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
547 fprintf (file, _(" [g-float]"));
548
549 fputc ('\n', file);
550
b34976b6 551 return TRUE;
90ace9e9
JT
552}
553/* Look through the relocs for a section during the first phase, and
554 allocate space in the global offset table or procedure linkage
555 table. */
556
b34976b6 557static bfd_boolean
ce71b576
NC
558elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
559 const Elf_Internal_Rela *relocs)
90ace9e9
JT
560{
561 bfd *dynobj;
562 Elf_Internal_Shdr *symtab_hdr;
563 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
564 const Elf_Internal_Rela *rel;
565 const Elf_Internal_Rela *rel_end;
566 asection *sgot;
567 asection *srelgot;
568 asection *sreloc;
569
1049f94e 570 if (info->relocatable)
b34976b6 571 return TRUE;
90ace9e9
JT
572
573 dynobj = elf_hash_table (info)->dynobj;
574 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
575 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
576
577 sgot = NULL;
578 srelgot = NULL;
579 sreloc = NULL;
580
581 rel_end = relocs + sec->reloc_count;
582 for (rel = relocs; rel < rel_end; rel++)
583 {
584 unsigned long r_symndx;
585 struct elf_link_hash_entry *h;
586
587 r_symndx = ELF32_R_SYM (rel->r_info);
588
589 if (r_symndx < symtab_hdr->sh_info)
590 h = NULL;
591 else
973a3492
L
592 {
593 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
594 while (h->root.type == bfd_link_hash_indirect
595 || h->root.type == bfd_link_hash_warning)
596 h = (struct elf_link_hash_entry *) h->root.u.i.link;
597 }
90ace9e9
JT
598
599 switch (ELF32_R_TYPE (rel->r_info))
600 {
601 case R_VAX_GOT32:
602 if (h != NULL
603 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
604 break;
605
606 /* This symbol requires a global offset table entry. */
607
608 if (dynobj == NULL)
609 {
610 /* Create the .got section. */
611 elf_hash_table (info)->dynobj = dynobj = abfd;
612 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 613 return FALSE;
90ace9e9
JT
614 }
615
616 if (sgot == NULL)
617 {
618 sgot = bfd_get_section_by_name (dynobj, ".got");
619 BFD_ASSERT (sgot != NULL);
620 }
621
622 if (srelgot == NULL
623 && (h != NULL || info->shared))
624 {
625 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
626 if (srelgot == NULL)
627 {
3496cb2a
L
628 srelgot = bfd_make_section_with_flags (dynobj,
629 ".rela.got",
630 (SEC_ALLOC
631 | SEC_LOAD
632 | SEC_HAS_CONTENTS
633 | SEC_IN_MEMORY
634 | SEC_LINKER_CREATED
635 | SEC_READONLY));
90ace9e9 636 if (srelgot == NULL
90ace9e9 637 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 638 return FALSE;
90ace9e9
JT
639 }
640 }
641
642 if (h != NULL)
643 {
644 struct elf_vax_link_hash_entry *eh;
645
646 eh = (struct elf_vax_link_hash_entry *) h;
647 if (h->got.refcount == -1)
648 {
649 h->got.refcount = 1;
650 eh->got_addend = rel->r_addend;
90ace9e9
JT
651 }
652 else
653 {
654 h->got.refcount++;
655 if (eh->got_addend != (bfd_vma) rel->r_addend)
656 (*_bfd_error_handler)
657 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
658 bfd_get_filename (abfd), rel->r_addend,
659 h->root.root.string,
660 eh->got_addend);
cedb70c5 661
90ace9e9
JT
662 }
663 }
664 break;
665
666 case R_VAX_PLT32:
667 /* This symbol requires a procedure linkage table entry. We
668 actually build the entry in adjust_dynamic_symbol,
669 because this might be a case of linking PIC code which is
670 never referenced by a dynamic object, in which case we
671 don't need to generate a procedure linkage table entry
672 after all. */
673
674 /* If this is a local symbol, we resolve it directly without
675 creating a procedure linkage table entry. */
676 if (h == NULL)
677 continue;
678
f5385ebf 679 h->needs_plt = 1;
90ace9e9
JT
680 if (h->plt.refcount == -1)
681 h->plt.refcount = 1;
682 else
683 h->plt.refcount++;
684 break;
685
686 case R_VAX_PC8:
687 case R_VAX_PC16:
688 case R_VAX_PC32:
689 /* If we are creating a shared library and this is not a local
690 symbol, we need to copy the reloc into the shared library.
691 However when linking with -Bsymbolic and this is a global
692 symbol which is defined in an object we are including in the
693 link (i.e., DEF_REGULAR is set), then we can resolve the
694 reloc directly. At this point we have not seen all the input
695 files, so it is possible that DEF_REGULAR is not set now but
696 will be set later (it is never cleared). We account for that
697 possibility below by storing information in the
698 pcrel_relocs_copied field of the hash table entry. */
699 if (!(info->shared
700 && (sec->flags & SEC_ALLOC) != 0
701 && h != NULL
702 && (!info->symbolic
f5385ebf 703 || !h->def_regular)))
90ace9e9
JT
704 {
705 if (h != NULL)
706 {
707 /* Make sure a plt entry is created for this symbol if
708 it turns out to be a function defined by a dynamic
709 object. */
710 if (h->plt.refcount == -1)
711 h->plt.refcount = 1;
712 else
713 h->plt.refcount++;
714 }
715 break;
716 }
717 /* Fall through. */
718 case R_VAX_8:
719 case R_VAX_16:
720 case R_VAX_32:
721 if (h != NULL)
722 {
723 /* Make sure a plt entry is created for this symbol if it
724 turns out to be a function defined by a dynamic object. */
725 if (h->plt.refcount == -1)
726 h->plt.refcount = 1;
727 else
728 h->plt.refcount++;
729 }
730
731 /* If we are creating a shared library, we need to copy the
732 reloc into the shared library. */
733 if (info->shared
734 && (sec->flags & SEC_ALLOC) != 0)
735 {
736 /* When creating a shared object, we must copy these
737 reloc types into the output file. We create a reloc
738 section in dynobj and make room for this reloc. */
739 if (sreloc == NULL)
740 {
83bac4b0
NC
741 sreloc = _bfd_elf_make_dynamic_reloc_section
742 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 743
83bac4b0 744 if (sreloc == NULL)
b34976b6 745 return FALSE;
90ace9e9 746
90ace9e9
JT
747 if (sec->flags & SEC_READONLY)
748 info->flags |= DF_TEXTREL;
749 }
750
eea6121a 751 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
752
753 /* If we are linking with -Bsymbolic, we count the number of
754 PC relative relocations we have entered for this symbol,
755 so that we can discard them again if the symbol is later
756 defined by a regular object. Note that this function is
19852a2a 757 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
758 which means that h is really a pointer to an
759 elf_vax_link_hash_entry. */
760 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
761 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
762 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
763 && info->symbolic)
764 {
765 struct elf_vax_link_hash_entry *eh;
766 struct elf_vax_pcrel_relocs_copied *p;
767
768 eh = (struct elf_vax_link_hash_entry *) h;
769
770 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
771 if (p->section == sreloc)
772 break;
773
774 if (p == NULL)
775 {
776 p = ((struct elf_vax_pcrel_relocs_copied *)
777 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
778 if (p == NULL)
b34976b6 779 return FALSE;
90ace9e9
JT
780 p->next = eh->pcrel_relocs_copied;
781 eh->pcrel_relocs_copied = p;
782 p->section = sreloc;
783 p->count = 0;
784 }
785
786 ++p->count;
787 }
788 }
789
790 break;
791
792 /* This relocation describes the C++ object vtable hierarchy.
793 Reconstruct it for later use during GC. */
794 case R_VAX_GNU_VTINHERIT:
c152c796 795 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 796 return FALSE;
90ace9e9
JT
797 break;
798
799 /* This relocation describes which C++ vtable entries are actually
800 used. Record for later use during GC. */
801 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
802 BFD_ASSERT (h != NULL);
803 if (h != NULL
804 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 805 return FALSE;
90ace9e9
JT
806 break;
807
808 default:
809 break;
810 }
811 }
812
b34976b6 813 return TRUE;
90ace9e9
JT
814}
815
816/* Return the section that should be marked against GC for a given
817 relocation. */
818
819static asection *
ce71b576 820elf_vax_gc_mark_hook (asection *sec,
07adf181 821 struct bfd_link_info *info,
ce71b576
NC
822 Elf_Internal_Rela *rel,
823 struct elf_link_hash_entry *h,
824 Elf_Internal_Sym *sym)
90ace9e9
JT
825{
826 if (h != NULL)
07adf181
AM
827 switch (ELF32_R_TYPE (rel->r_info))
828 {
829 case R_VAX_GNU_VTINHERIT:
830 case R_VAX_GNU_VTENTRY:
831 return NULL;
832 }
833
834 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
835}
836
837/* Update the got entry reference counts for the section being removed. */
838
b34976b6 839static bfd_boolean
ce71b576
NC
840elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
841 const Elf_Internal_Rela *relocs)
90ace9e9
JT
842{
843 Elf_Internal_Shdr *symtab_hdr;
844 struct elf_link_hash_entry **sym_hashes;
90ace9e9 845 const Elf_Internal_Rela *rel, *relend;
90ace9e9 846 bfd *dynobj;
90ace9e9 847
7dda2462
TG
848 if (info->relocatable)
849 return TRUE;
850
90ace9e9
JT
851 dynobj = elf_hash_table (info)->dynobj;
852 if (dynobj == NULL)
b34976b6 853 return TRUE;
90ace9e9 854
babfd660
KH
855 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
856 sym_hashes = elf_sym_hashes (abfd);
857
90ace9e9
JT
858 relend = relocs + sec->reloc_count;
859 for (rel = relocs; rel < relend; rel++)
860 {
babfd660 861 unsigned long r_symndx;
3eb128b2
AM
862 struct elf_link_hash_entry *h = NULL;
863
864 r_symndx = ELF32_R_SYM (rel->r_info);
865 if (r_symndx >= symtab_hdr->sh_info)
866 {
867 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
868 while (h->root.type == bfd_link_hash_indirect
869 || h->root.type == bfd_link_hash_warning)
870 h = (struct elf_link_hash_entry *) h->root.u.i.link;
871 }
babfd660 872
90ace9e9
JT
873 switch (ELF32_R_TYPE (rel->r_info))
874 {
875 case R_VAX_GOT32:
3eb128b2
AM
876 if (h != NULL && h->got.refcount > 0)
877 --h->got.refcount;
90ace9e9
JT
878 break;
879
880 case R_VAX_PLT32:
881 case R_VAX_PC8:
882 case R_VAX_PC16:
883 case R_VAX_PC32:
884 case R_VAX_8:
885 case R_VAX_16:
886 case R_VAX_32:
3eb128b2
AM
887 if (h != NULL && h->plt.refcount > 0)
888 --h->plt.refcount;
90ace9e9
JT
889 break;
890
891 default:
892 break;
893 }
894 }
895
b34976b6 896 return TRUE;
90ace9e9
JT
897}
898
899/* Adjust a symbol defined by a dynamic object and referenced by a
900 regular object. The current definition is in some section of the
901 dynamic object, but we're not including those sections. We have to
902 change the definition to something the rest of the link can
903 understand. */
904
b34976b6 905static bfd_boolean
90ace9e9
JT
906elf_vax_adjust_dynamic_symbol (info, h)
907 struct bfd_link_info *info;
908 struct elf_link_hash_entry *h;
909{
910 bfd *dynobj;
911 asection *s;
90ace9e9
JT
912
913 dynobj = elf_hash_table (info)->dynobj;
914
915 /* Make sure we know what is going on here. */
916 BFD_ASSERT (dynobj != NULL
f5385ebf 917 && (h->needs_plt
f6e332e6 918 || h->u.weakdef != NULL
f5385ebf
AM
919 || (h->def_dynamic
920 && h->ref_regular
921 && !h->def_regular)));
90ace9e9
JT
922
923 /* If this is a function, put it in the procedure linkage table. We
924 will fill in the contents of the procedure linkage table later,
925 when we know the address of the .got section. */
926 if (h->type == STT_FUNC
f5385ebf 927 || h->needs_plt)
90ace9e9
JT
928 {
929 if (! info->shared
f5385ebf
AM
930 && !h->def_dynamic
931 && !h->ref_dynamic
90ace9e9
JT
932 /* We must always create the plt entry if it was referenced
933 by a PLTxxO relocation. In this case we already recorded
934 it as a dynamic symbol. */
935 && h->dynindx == -1)
936 {
937 /* This case can occur if we saw a PLTxx reloc in an input
938 file, but the symbol was never referred to by a dynamic
939 object. In such a case, we don't actually need to build
940 a procedure linkage table, and we can just do a PCxx
941 reloc instead. */
f5385ebf 942 BFD_ASSERT (h->needs_plt);
90ace9e9 943 h->plt.offset = (bfd_vma) -1;
b34976b6 944 return TRUE;
90ace9e9
JT
945 }
946
947 /* GC may have rendered this entry unused. */
948 if (h->plt.refcount <= 0)
949 {
f5385ebf 950 h->needs_plt = 0;
90ace9e9 951 h->plt.offset = (bfd_vma) -1;
b34976b6 952 return TRUE;
90ace9e9
JT
953 }
954
955 /* Make sure this symbol is output as a dynamic symbol. */
956 if (h->dynindx == -1)
957 {
c152c796 958 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 959 return FALSE;
90ace9e9
JT
960 }
961
962 s = bfd_get_section_by_name (dynobj, ".plt");
963 BFD_ASSERT (s != NULL);
964
965 /* If this is the first .plt entry, make room for the special
966 first entry. */
eea6121a 967 if (s->size == 0)
90ace9e9 968 {
eea6121a 969 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
970 }
971
972 /* If this symbol is not defined in a regular file, and we are
973 not generating a shared library, then set the symbol to this
974 location in the .plt. This is required to make function
975 pointers compare as equal between the normal executable and
976 the shared library. */
977 if (!info->shared
f5385ebf 978 && !h->def_regular)
90ace9e9
JT
979 {
980 h->root.u.def.section = s;
eea6121a 981 h->root.u.def.value = s->size;
90ace9e9
JT
982 }
983
eea6121a 984 h->plt.offset = s->size;
90ace9e9
JT
985
986 /* Make room for this entry. */
eea6121a 987 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
988
989 /* We also need to make an entry in the .got.plt section, which
990 will be placed in the .got section by the linker script. */
991
992 s = bfd_get_section_by_name (dynobj, ".got.plt");
993 BFD_ASSERT (s != NULL);
eea6121a 994 s->size += 4;
90ace9e9
JT
995
996 /* We also need to make an entry in the .rela.plt section. */
997
998 s = bfd_get_section_by_name (dynobj, ".rela.plt");
999 BFD_ASSERT (s != NULL);
eea6121a 1000 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1001
b34976b6 1002 return TRUE;
90ace9e9
JT
1003 }
1004
1005 /* Reinitialize the plt offset now that it is not used as a reference
1006 count any more. */
1007 h->plt.offset = (bfd_vma) -1;
1008
1009 /* If this is a weak symbol, and there is a real definition, the
1010 processor independent code will have arranged for us to see the
1011 real definition first, and we can just use the same value. */
f6e332e6 1012 if (h->u.weakdef != NULL)
90ace9e9 1013 {
f6e332e6
AM
1014 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1015 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1016 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1017 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1018 return TRUE;
90ace9e9
JT
1019 }
1020
1021 /* This is a reference to a symbol defined by a dynamic object which
1022 is not a function. */
1023
1024 /* If we are creating a shared library, we must presume that the
1025 only references to the symbol are via the global offset table.
1026 For such cases we need not do anything here; the relocations will
1027 be handled correctly by relocate_section. */
1028 if (info->shared)
b34976b6 1029 return TRUE;
90ace9e9 1030
909272ee
AM
1031 if (h->size == 0)
1032 {
1033 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1034 h->root.root.string);
1035 return TRUE;
1036 }
1037
90ace9e9
JT
1038 /* We must allocate the symbol in our .dynbss section, which will
1039 become part of the .bss section of the executable. There will be
1040 an entry for this symbol in the .dynsym section. The dynamic
1041 object will contain position independent code, so all references
1042 from the dynamic object to this symbol will go through the global
1043 offset table. The dynamic linker will use the .dynsym entry to
1044 determine the address it must put in the global offset table, so
1045 both the dynamic object and the regular object will refer to the
1046 same memory location for the variable. */
1047
1048 s = bfd_get_section_by_name (dynobj, ".dynbss");
1049 BFD_ASSERT (s != NULL);
1050
1051 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1052 copy the initial value out of the dynamic object and into the
1053 runtime process image. We need to remember the offset into the
1054 .rela.bss section we are going to use. */
1055 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1056 {
1057 asection *srel;
1058
1059 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1060 BFD_ASSERT (srel != NULL);
eea6121a 1061 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1062 h->needs_copy = 1;
90ace9e9
JT
1063 }
1064
027297b7 1065 return _bfd_elf_adjust_dynamic_copy (h, s);
90ace9e9
JT
1066}
1067
1068/* Set the sizes of the dynamic sections. */
1069
b34976b6 1070static bfd_boolean
ce71b576 1071elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1072{
1073 bfd *dynobj;
1074 asection *s;
b34976b6
AM
1075 bfd_boolean plt;
1076 bfd_boolean relocs;
1077 bfd_boolean reltext;
90ace9e9
JT
1078
1079 dynobj = elf_hash_table (info)->dynobj;
1080 BFD_ASSERT (dynobj != NULL);
1081
1082 if (elf_hash_table (info)->dynamic_sections_created)
1083 {
1084 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1085 if (info->executable)
90ace9e9
JT
1086 {
1087 s = bfd_get_section_by_name (dynobj, ".interp");
1088 BFD_ASSERT (s != NULL);
eea6121a 1089 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1090 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1091 }
1092 }
1093 else
1094 {
1095 /* We may have created entries in the .rela.got and .got sections.
1096 However, if we are not creating the dynamic sections, we will
1097 not actually use these entries. Reset the size of .rela.got
1098 and .got, which will cause it to get stripped from the output
1099 file below. */
1100 s = bfd_get_section_by_name (dynobj, ".rela.got");
1101 if (s != NULL)
eea6121a 1102 s->size = 0;
90ace9e9
JT
1103 s = bfd_get_section_by_name (dynobj, ".got.plt");
1104 if (s != NULL)
eea6121a 1105 s->size = 0;
90ace9e9
JT
1106 s = bfd_get_section_by_name (dynobj, ".got");
1107 if (s != NULL)
eea6121a 1108 s->size = 0;
90ace9e9
JT
1109 }
1110
1111 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1112 relative relocs against symbols defined in a regular object. We
1113 allocated space for them in the check_relocs routine, but we will not
1114 fill them in in the relocate_section routine. */
1115 if (info->shared && info->symbolic)
1116 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba 1117 elf_vax_discard_copies,
ce71b576 1118 NULL);
b29635ba 1119
b34976b6 1120 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1121 discard all the got entries we've recorded. Otherwise, we need to
1122 instantiate (allocate space for them). */
1123 elf_link_hash_traverse (elf_hash_table (info),
1124 elf_vax_instantiate_got_entries,
1125 (PTR) info);
90ace9e9
JT
1126
1127 /* The check_relocs and adjust_dynamic_symbol entry points have
1128 determined the sizes of the various dynamic sections. Allocate
1129 memory for them. */
b34976b6
AM
1130 plt = FALSE;
1131 relocs = FALSE;
1132 reltext = FALSE;
90ace9e9
JT
1133 for (s = dynobj->sections; s != NULL; s = s->next)
1134 {
1135 const char *name;
90ace9e9
JT
1136
1137 if ((s->flags & SEC_LINKER_CREATED) == 0)
1138 continue;
1139
1140 /* It's OK to base decisions on the section name, because none
1141 of the dynobj section names depend upon the input files. */
1142 name = bfd_get_section_name (dynobj, s);
1143
90ace9e9
JT
1144 if (strcmp (name, ".plt") == 0)
1145 {
c456f082
AM
1146 /* Remember whether there is a PLT. */
1147 plt = s->size != 0;
90ace9e9 1148 }
0112cd26 1149 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1150 {
c456f082 1151 if (s->size != 0)
90ace9e9
JT
1152 {
1153 asection *target;
1154
1155 /* Remember whether there are any reloc sections other
1156 than .rela.plt. */
1157 if (strcmp (name, ".rela.plt") != 0)
1158 {
1159 const char *outname;
1160
b34976b6 1161 relocs = TRUE;
90ace9e9
JT
1162
1163 /* If this relocation section applies to a read only
1164 section, then we probably need a DT_TEXTREL
1165 entry. .rela.plt is actually associated with
1166 .got.plt, which is never readonly. */
1167 outname = bfd_get_section_name (output_bfd,
1168 s->output_section);
1169 target = bfd_get_section_by_name (output_bfd, outname + 5);
1170 if (target != NULL
1171 && (target->flags & SEC_READONLY) != 0
1172 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1173 reltext = TRUE;
90ace9e9
JT
1174 }
1175
1176 /* We use the reloc_count field as a counter if we need
1177 to copy relocs into the output file. */
1178 s->reloc_count = 0;
1179 }
1180 }
0112cd26 1181 else if (! CONST_STRNEQ (name, ".got")
c456f082 1182 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1183 {
1184 /* It's not one of our sections, so don't allocate space. */
1185 continue;
1186 }
1187
c456f082 1188 if (s->size == 0)
90ace9e9 1189 {
c456f082
AM
1190 /* If we don't need this section, strip it from the
1191 output file. This is mostly to handle .rela.bss and
1192 .rela.plt. We must create both sections in
1193 create_dynamic_sections, because they must be created
1194 before the linker maps input sections to output
1195 sections. The linker does that before
1196 adjust_dynamic_symbol is called, and it is that
1197 function which decides whether anything needs to go
1198 into these sections. */
8423293d 1199 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1200 continue;
1201 }
1202
c456f082
AM
1203 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1204 continue;
1205
90ace9e9 1206 /* Allocate memory for the section contents. */
eea6121a 1207 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
c456f082 1208 if (s->contents == NULL)
b34976b6 1209 return FALSE;
90ace9e9
JT
1210 }
1211
1212 if (elf_hash_table (info)->dynamic_sections_created)
1213 {
1214 /* Add some entries to the .dynamic section. We fill in the
1215 values later, in elf_vax_finish_dynamic_sections, but we
1216 must add the entries now so that we get the correct size for
1217 the .dynamic section. The DT_DEBUG entry is filled in by the
1218 dynamic linker and used by the debugger. */
1219#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1220 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1221
1222 if (!info->shared)
1223 {
1224 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1225 return FALSE;
90ace9e9
JT
1226 }
1227
1228 if (plt)
1229 {
1230 if (!add_dynamic_entry (DT_PLTGOT, 0)
1231 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1232 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1233 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1234 return FALSE;
90ace9e9
JT
1235 }
1236
1237 if (relocs)
1238 {
1239 if (!add_dynamic_entry (DT_RELA, 0)
1240 || !add_dynamic_entry (DT_RELASZ, 0)
1241 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1242 return FALSE;
90ace9e9
JT
1243 }
1244
1245 if (reltext || (info->flags & DF_TEXTREL) != 0)
1246 {
1247 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1248 return FALSE;
90ace9e9
JT
1249 }
1250 }
1251#undef add_dynamic_entry
1252
b34976b6 1253 return TRUE;
90ace9e9
JT
1254}
1255
1256/* This function is called via elf_vax_link_hash_traverse if we are
1257 creating a shared object with -Bsymbolic. It discards the space
1258 allocated to copy PC relative relocs against symbols which are defined
1259 in regular objects. We allocated space for them in the check_relocs
1260 routine, but we won't fill them in in the relocate_section routine. */
1261
b34976b6 1262static bfd_boolean
ce71b576
NC
1263elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1264 PTR ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1265{
1266 struct elf_vax_pcrel_relocs_copied *s;
1267
1268 if (h->root.root.type == bfd_link_hash_warning)
1269 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1270
1271 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1272 if (!h->root.def_regular)
b34976b6 1273 return TRUE;
90ace9e9
JT
1274
1275 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1276 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1277
b34976b6 1278 return TRUE;
90ace9e9
JT
1279}
1280
b29635ba
JT
1281/* This function is called via elf_link_hash_traverse. It looks for entries
1282 that have GOT or PLT (.GOT) references. If creating a static object or a
1283 shared object with -Bsymbolic, it resets the reference count back to 0
1284 and sets the offset to -1 so normal PC32 relocation will be done. If
1285 creating a shared object or executable, space in the .got and .rela.got
1286 will be reserved for the symbol. */
1287
b34976b6 1288static bfd_boolean
ce71b576 1289elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
b29635ba
JT
1290{
1291 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1292 bfd *dynobj;
1293 asection *sgot;
1294 asection *srelgot;
b34976b6 1295
b29635ba
JT
1296 /* We don't care about non-GOT (and non-PLT) entries. */
1297 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1298 return TRUE;
b29635ba
JT
1299
1300 dynobj = elf_hash_table (info)->dynobj;
1301 if (dynobj == NULL)
b34976b6 1302 return TRUE;
b29635ba
JT
1303
1304 sgot = bfd_get_section_by_name (dynobj, ".got");
1305 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1306
1307 if (!elf_hash_table (info)->dynamic_sections_created
1308 || (info->shared && info->symbolic))
1309 {
1310 h->got.refcount = 0;
1311 h->got.offset = (bfd_vma) -1;
1312 h->plt.refcount = 0;
1313 h->plt.offset = (bfd_vma) -1;
1314 }
1315 else if (h->got.refcount > 0)
1316 {
1317 /* Make sure this symbol is output as a dynamic symbol. */
1318 if (h->dynindx == -1)
1319 {
c152c796 1320 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1321 return FALSE;
b29635ba
JT
1322 }
1323
1324 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1325 sgot->size += 4;
1326 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1327 }
1328
b34976b6 1329 return TRUE;
b29635ba
JT
1330}
1331
90ace9e9
JT
1332/* Relocate an VAX ELF section. */
1333
b34976b6 1334static bfd_boolean
ce71b576
NC
1335elf_vax_relocate_section (bfd *output_bfd,
1336 struct bfd_link_info *info,
1337 bfd *input_bfd,
1338 asection *input_section,
1339 bfd_byte *contents,
1340 Elf_Internal_Rela *relocs,
1341 Elf_Internal_Sym *local_syms,
1342 asection **local_sections)
90ace9e9
JT
1343{
1344 bfd *dynobj;
1345 Elf_Internal_Shdr *symtab_hdr;
1346 struct elf_link_hash_entry **sym_hashes;
1347 bfd_vma *local_got_offsets;
1348 bfd_vma plt_index;
1349 bfd_vma got_offset;
1350 asection *sgot;
1351 asection *splt;
1352 asection *sgotplt;
1353 asection *sreloc;
1354 Elf_Internal_Rela *rel;
1355 Elf_Internal_Rela *relend;
1356
1357 dynobj = elf_hash_table (info)->dynobj;
1358 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1359 sym_hashes = elf_sym_hashes (input_bfd);
1360 local_got_offsets = elf_local_got_offsets (input_bfd);
1361
1362 sgot = NULL;
1363 splt = NULL;
1364 sgotplt = NULL;
1365 sreloc = NULL;
1366
1367 rel = relocs;
1368 relend = relocs + input_section->reloc_count;
1369 for (; rel < relend; rel++)
1370 {
1371 int r_type;
1372 reloc_howto_type *howto;
1373 unsigned long r_symndx;
1374 struct elf_link_hash_entry *h;
1375 Elf_Internal_Sym *sym;
1376 asection *sec;
1377 bfd_vma relocation;
1378 bfd_reloc_status_type r;
1379
1380 r_type = ELF32_R_TYPE (rel->r_info);
1381 if (r_type < 0 || r_type >= (int) R_VAX_max)
1382 {
1383 bfd_set_error (bfd_error_bad_value);
b34976b6 1384 return FALSE;
90ace9e9
JT
1385 }
1386 howto = howto_table + r_type;
1387
f0fe0e16 1388 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1389 h = NULL;
1390 sym = NULL;
1391 sec = NULL;
1392 if (r_symndx < symtab_hdr->sh_info)
1393 {
1394 sym = local_syms + r_symndx;
1395 sec = local_sections[r_symndx];
8517fae7 1396 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1397 }
1398 else
1399 {
560e09e9
NC
1400 bfd_boolean unresolved_reloc;
1401 bfd_boolean warned;
1402
b2a8e766
AM
1403 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1404 r_symndx, symtab_hdr, sym_hashes,
1405 h, sec, relocation,
1406 unresolved_reloc, warned);
ce71b576 1407
560e09e9 1408 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1409 || h->root.type == bfd_link_hash_defweak)
560e09e9 1410 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1411 && h->plt.offset != (bfd_vma) -1
1412 && elf_hash_table (info)->dynamic_sections_created)
1413 || (r_type == R_VAX_GOT32
1414 && strcmp (h->root.root.string,
1415 "_GLOBAL_OFFSET_TABLE_") != 0
1416 && elf_hash_table (info)->dynamic_sections_created
1417 && (! info->shared
1418 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1419 || !h->def_regular))
90ace9e9
JT
1420 || (info->shared
1421 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1422 || !h->def_regular)
90ace9e9
JT
1423 && ((input_section->flags & SEC_ALLOC) != 0
1424 /* DWARF will emit R_VAX_32 relocations in its
1425 sections against symbols defined externally
1426 in shared libraries. We can't do anything
1427 with them here. */
1428
1429 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1430 && h->def_dynamic))
90ace9e9
JT
1431 && (r_type == R_VAX_8
1432 || r_type == R_VAX_16
1433 || r_type == R_VAX_32
1434 || r_type == R_VAX_PC8
1435 || r_type == R_VAX_PC16
560e09e9
NC
1436 || r_type == R_VAX_PC32))))
1437 /* In these cases, we don't need the relocation
1438 value. We check specially because in some
1439 obscure cases sec->output_section will be NULL. */
90ace9e9 1440 relocation = 0;
90ace9e9
JT
1441 }
1442
ab96bf03
AM
1443 if (sec != NULL && elf_discarded_section (sec))
1444 {
1445 /* For relocs against symbols from removed linkonce sections,
1446 or sections discarded by a linker script, we just want the
1447 section contents zeroed. Avoid any special processing. */
1448 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
1449 rel->r_info = 0;
1450 rel->r_addend = 0;
1451 continue;
1452 }
1453
1454 if (info->relocatable)
1455 continue;
1456
90ace9e9
JT
1457 switch (r_type)
1458 {
1459 case R_VAX_GOT32:
1460 /* Relocation is to the address of the entry for this symbol
1461 in the global offset table. */
b29635ba 1462 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1463 break;
1464
1465 /* Relocation is the offset of the entry for this symbol in
1466 the global offset table. */
1467
1468 {
1469 bfd_vma off;
1470
90ace9e9
JT
1471 if (sgot == NULL)
1472 {
1473 sgot = bfd_get_section_by_name (dynobj, ".got");
1474 BFD_ASSERT (sgot != NULL);
1475 }
1476
1477 BFD_ASSERT (h != NULL);
1478 off = h->got.offset;
1479 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1480 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1481
1482 if (info->shared
1483 && h->dynindx == -1
f5385ebf 1484 && h->def_regular)
90ace9e9
JT
1485 {
1486 /* The symbol was forced to be local
1487 because of a version file.. We must initialize
1488 this entry in the global offset table. Since
1489 the offset must always be a multiple of 4, we
1490 use the least significant bit to record whether
1491 we have initialized it already.
1492
1493 When doing a dynamic link, we create a .rela.got
1494 relocation entry to initialize the value. This
1495 is done in the finish_dynamic_symbol routine. */
1496 if ((off & 1) != 0)
1497 off &= ~1;
1498 else
1499 {
1500 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1501 sgot->contents + off);
1502 h->got.offset |= 1;
1503 }
1504 } else {
1505 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1506 }
1507
1508 relocation = sgot->output_offset + off;
b29635ba 1509 /* The GOT relocation uses the addend. */
90ace9e9
JT
1510 rel->r_addend = 0;
1511
b29635ba
JT
1512 /* Change the reference to be indirect. */
1513 contents[rel->r_offset - 1] |= 0x10;
1514 relocation += sgot->output_section->vma;
90ace9e9
JT
1515 }
1516 break;
1517
1518 case R_VAX_PLT32:
1519 /* Relocation is to the entry for this symbol in the
1520 procedure linkage table. */
1521
1522 /* Resolve a PLTxx reloc against a local symbol directly,
1523 without using the procedure linkage table. */
1524 if (h == NULL)
1525 break;
1526
1527 if (h->plt.offset == (bfd_vma) -1
1528 || !elf_hash_table (info)->dynamic_sections_created)
1529 {
1530 /* We didn't make a PLT entry for this symbol. This
1531 happens when statically linking PIC code, or when
1532 using -Bsymbolic. */
1533 break;
1534 }
1535
1536 if (splt == NULL)
1537 {
1538 splt = bfd_get_section_by_name (dynobj, ".plt");
1539 BFD_ASSERT (splt != NULL);
1540 }
1541
1542 if (sgotplt == NULL)
1543 {
1544 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1545 BFD_ASSERT (splt != NULL);
1546 }
1547
1548 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1549
1550 /* Get the offset into the .got table of the entry that
1551 corresponds to this function. Each .got entry is 4 bytes.
1552 The first two are reserved. */
1553 got_offset = (plt_index + 3) * 4;
1554
1555 /* We want the relocate to point into the .got.plt instead
cedb70c5 1556 of the plt itself. */
90ace9e9
JT
1557 relocation = (sgotplt->output_section->vma
1558 + sgotplt->output_offset
1559 + got_offset);
1560 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1561 if (rel->r_addend == 2)
1562 {
1563 h->plt.offset |= 1;
1564 }
1565 else if (rel->r_addend != 0)
1566 (*_bfd_error_handler)
1567 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1568 bfd_get_filename (input_bfd), rel->r_addend,
1569 h->root.root.string,
1570 bfd_get_section_name (input_bfd, input_section));
1571 rel->r_addend = 0;
1572
1573 break;
1574
1575 case R_VAX_PC8:
1576 case R_VAX_PC16:
1577 case R_VAX_PC32:
1578 if (h == NULL)
1579 break;
1580 /* Fall through. */
1581 case R_VAX_8:
1582 case R_VAX_16:
1583 case R_VAX_32:
1584 if (info->shared
1585 && r_symndx != 0
1586 && (input_section->flags & SEC_ALLOC) != 0
1587 && ((r_type != R_VAX_PC8
1588 && r_type != R_VAX_PC16
1589 && r_type != R_VAX_PC32)
da6bcfca
MT
1590 || ((input_section->flags & SEC_CODE)
1591 && (!info->symbolic
1592 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1593 {
1594 Elf_Internal_Rela outrel;
947216bf 1595 bfd_byte *loc;
b34976b6 1596 bfd_boolean skip, relocate;
90ace9e9
JT
1597
1598 /* When generating a shared object, these relocations
1599 are copied into the output file to be resolved at run
1600 time. */
90ace9e9
JT
1601 if (sreloc == NULL)
1602 {
83bac4b0
NC
1603 sreloc = _bfd_elf_get_dynamic_reloc_section
1604 (input_bfd, input_section, /*rela?*/ TRUE);
1605 if (sreloc == NULL)
b34976b6 1606 return FALSE;
90ace9e9
JT
1607 }
1608
b34976b6
AM
1609 skip = FALSE;
1610 relocate = FALSE;
90ace9e9
JT
1611
1612 outrel.r_offset =
1613 _bfd_elf_section_offset (output_bfd, info, input_section,
1614 rel->r_offset);
1615 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1616 skip = TRUE;
90ace9e9 1617 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1618 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1619 outrel.r_offset += (input_section->output_section->vma
1620 + input_section->output_offset);
1621
1622 if (skip)
1623 memset (&outrel, 0, sizeof outrel);
1624 /* h->dynindx may be -1 if the symbol was marked to
1625 become local. */
1626 else if (h != NULL
1627 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1628 || !h->def_regular))
90ace9e9
JT
1629 {
1630 BFD_ASSERT (h->dynindx != -1);
1631 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1632 outrel.r_addend = relocation + rel->r_addend;
1633 }
1634 else
1635 {
1636 if (r_type == R_VAX_32)
1637 {
b34976b6 1638 relocate = TRUE;
90ace9e9
JT
1639 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1640 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1641 &contents[rel->r_offset]) == 0);
1642 outrel.r_addend = relocation + rel->r_addend;
1643 }
1644 else
1645 {
1646 long indx;
1647
8517fae7 1648 if (bfd_is_abs_section (sec))
90ace9e9
JT
1649 indx = 0;
1650 else if (sec == NULL || sec->owner == NULL)
1651 {
1652 bfd_set_error (bfd_error_bad_value);
b34976b6 1653 return FALSE;
90ace9e9
JT
1654 }
1655 else
1656 {
1657 asection *osec;
1658
74541ad4
AM
1659 /* We are turning this relocation into one
1660 against a section symbol. It would be
1661 proper to subtract the symbol's value,
1662 osec->vma, from the emitted reloc addend,
1663 but ld.so expects buggy relocs. */
90ace9e9
JT
1664 osec = sec->output_section;
1665 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1666 if (indx == 0)
1667 {
1668 struct elf_link_hash_table *htab;
1669 htab = elf_hash_table (info);
1670 osec = htab->text_index_section;
1671 indx = elf_section_data (osec)->dynindx;
1672 }
1673 BFD_ASSERT (indx != 0);
90ace9e9
JT
1674 }
1675
1676 outrel.r_info = ELF32_R_INFO (indx, r_type);
1677 outrel.r_addend = relocation + rel->r_addend;
1678 }
1679 }
1680
1681 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1682 ".text") != 0 ||
90ace9e9
JT
1683 (info->shared
1684 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1685 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1686 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1687 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1688 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1689 {
1690 if (h != NULL)
1691 (*_bfd_error_handler)
1692 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1693 bfd_get_filename (input_bfd), howto->name,
1694 h->root.root.string,
1695 bfd_get_section_name (input_bfd, input_section));
1696 else
1697 (*_bfd_error_handler)
1698 (_("%s: warning: %s relocation to 0x%x from %s section"),
1699 bfd_get_filename (input_bfd), howto->name,
1700 outrel.r_addend,
1701 bfd_get_section_name (input_bfd, input_section));
1702 }
947216bf
AM
1703 loc = sreloc->contents;
1704 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1705 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1706
1707 /* This reloc will be computed at runtime, so there's no
1708 need to do anything now, except for R_VAX_32
1709 relocations that have been turned into
1710 R_VAX_RELATIVE. */
1711 if (!relocate)
1712 continue;
1713 }
1714
1715 break;
1716
1717 case R_VAX_GNU_VTINHERIT:
1718 case R_VAX_GNU_VTENTRY:
1719 /* These are no-ops in the end. */
1720 continue;
1721
1722 default:
1723 break;
1724 }
1725
b34976b6 1726 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1727 So subtract the difference from the relocation amount since we can't
1728 add it to the offset. */
90ace9e9 1729 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1730 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1731
1732 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1733 contents, rel->r_offset,
1734 relocation, rel->r_addend);
1735
1736 if (r != bfd_reloc_ok)
1737 {
1738 switch (r)
1739 {
1740 default:
1741 case bfd_reloc_outofrange:
1742 abort ();
1743 case bfd_reloc_overflow:
1744 {
1745 const char *name;
1746
1747 if (h != NULL)
dfeffb9f 1748 name = NULL;
90ace9e9
JT
1749 else
1750 {
1751 name = bfd_elf_string_from_elf_section (input_bfd,
1752 symtab_hdr->sh_link,
1753 sym->st_name);
1754 if (name == NULL)
b34976b6 1755 return FALSE;
90ace9e9
JT
1756 if (*name == '\0')
1757 name = bfd_section_name (input_bfd, sec);
1758 }
1759 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1760 (info, (h ? &h->root : NULL), name, howto->name,
1761 (bfd_vma) 0, input_bfd, input_section,
1762 rel->r_offset)))
b34976b6 1763 return FALSE;
90ace9e9
JT
1764 }
1765 break;
1766 }
1767 }
1768 }
1769
b34976b6 1770 return TRUE;
90ace9e9
JT
1771}
1772
1773/* Finish up dynamic symbol handling. We set the contents of various
1774 dynamic sections here. */
1775
b34976b6 1776static bfd_boolean
ce71b576
NC
1777elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1778 struct elf_link_hash_entry *h,
1779 Elf_Internal_Sym *sym)
90ace9e9
JT
1780{
1781 bfd *dynobj;
1782
1783 dynobj = elf_hash_table (info)->dynobj;
1784
1785 if (h->plt.offset != (bfd_vma) -1)
1786 {
1787 asection *splt;
1788 asection *sgot;
1789 asection *srela;
1790 bfd_vma plt_index;
1791 bfd_vma got_offset;
1792 bfd_vma addend;
1793 Elf_Internal_Rela rela;
947216bf 1794 bfd_byte *loc;
90ace9e9
JT
1795
1796 /* This symbol has an entry in the procedure linkage table. Set
1797 it up. */
90ace9e9
JT
1798 BFD_ASSERT (h->dynindx != -1);
1799
1800 splt = bfd_get_section_by_name (dynobj, ".plt");
1801 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1802 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1803 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1804
1805 addend = 2 * (h->plt.offset & 1);
1806 h->plt.offset &= ~1;
1807
1808 /* Get the index in the procedure linkage table which
1809 corresponds to this symbol. This is the index of this symbol
1810 in all the symbols for which we are making plt entries. The
1811 first entry in the procedure linkage table is reserved. */
1812 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1813
1814 /* Get the offset into the .got table of the entry that
1815 corresponds to this function. Each .got entry is 4 bytes.
1816 The first two are reserved. */
1817 got_offset = (plt_index + 3) * 4;
1818
1819 /* Fill in the entry in the procedure linkage table. */
1820 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1821 PLT_ENTRY_SIZE);
1822
1823 /* The offset is relative to the first extension word. */
1824 bfd_put_32 (output_bfd,
1825 -(h->plt.offset + 8),
1826 splt->contents + h->plt.offset + 4);
1827
1828 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1829 splt->contents + h->plt.offset + 8);
1830
1831 /* Fill in the entry in the global offset table. */
1832 bfd_put_32 (output_bfd,
1833 (splt->output_section->vma
1834 + splt->output_offset
1835 + h->plt.offset) + addend,
1836 sgot->contents + got_offset);
1837
1838 /* Fill in the entry in the .rela.plt section. */
1839 rela.r_offset = (sgot->output_section->vma
1840 + sgot->output_offset
1841 + got_offset);
1842 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1843 rela.r_addend = addend;
947216bf
AM
1844 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1845 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1846
f5385ebf 1847 if (!h->def_regular)
90ace9e9
JT
1848 {
1849 /* Mark the symbol as undefined, rather than as defined in
1850 the .plt section. Leave the value alone. */
1851 sym->st_shndx = SHN_UNDEF;
1852 }
1853 }
1854
1855 if (h->got.offset != (bfd_vma) -1)
1856 {
1857 asection *sgot;
1858 asection *srela;
1859 Elf_Internal_Rela rela;
947216bf 1860 bfd_byte *loc;
90ace9e9
JT
1861
1862 /* This symbol has an entry in the global offset table. Set it
1863 up. */
90ace9e9
JT
1864 sgot = bfd_get_section_by_name (dynobj, ".got");
1865 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1866 BFD_ASSERT (sgot != NULL && srela != NULL);
1867
1868 rela.r_offset = (sgot->output_section->vma
1869 + sgot->output_offset
1870 + (h->got.offset &~ 1));
1871
1872 /* If the symbol was forced to be local because of a version file
1873 locally we just want to emit a RELATIVE reloc. The entry in
1874 the global offset table will already have been initialized in
1875 the relocate_section function. */
1876 if (info->shared
1877 && h->dynindx == -1
f5385ebf 1878 && h->def_regular)
90ace9e9
JT
1879 {
1880 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1881 }
1882 else
1883 {
1884 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1885 }
1886 rela.r_addend = bfd_get_signed_32 (output_bfd,
1887 (sgot->contents
1888 + (h->got.offset & ~1)));
1889
947216bf
AM
1890 loc = srela->contents;
1891 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1892 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1893 }
1894
f5385ebf 1895 if (h->needs_copy)
90ace9e9
JT
1896 {
1897 asection *s;
1898 Elf_Internal_Rela rela;
947216bf 1899 bfd_byte *loc;
90ace9e9
JT
1900
1901 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1902 BFD_ASSERT (h->dynindx != -1
1903 && (h->root.type == bfd_link_hash_defined
1904 || h->root.type == bfd_link_hash_defweak));
1905
1906 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1907 ".rela.bss");
1908 BFD_ASSERT (s != NULL);
1909
1910 rela.r_offset = (h->root.u.def.value
1911 + h->root.u.def.section->output_section->vma
1912 + h->root.u.def.section->output_offset);
1913 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1914 rela.r_addend = 0;
947216bf
AM
1915 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1916 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1917 }
1918
1919 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1920 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
22edb2f1 1921 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1922 sym->st_shndx = SHN_ABS;
1923
b34976b6 1924 return TRUE;
90ace9e9
JT
1925}
1926
1927/* Finish up the dynamic sections. */
1928
b34976b6 1929static bfd_boolean
ce71b576 1930elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1931{
1932 bfd *dynobj;
1933 asection *sgot;
1934 asection *sdyn;
1935
1936 dynobj = elf_hash_table (info)->dynobj;
1937
1938 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1939 BFD_ASSERT (sgot != NULL);
1940 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1941
1942 if (elf_hash_table (info)->dynamic_sections_created)
1943 {
1944 asection *splt;
1945 Elf32_External_Dyn *dyncon, *dynconend;
1946
1947 splt = bfd_get_section_by_name (dynobj, ".plt");
1948 BFD_ASSERT (splt != NULL && sdyn != NULL);
1949
1950 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1951 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1952 for (; dyncon < dynconend; dyncon++)
1953 {
1954 Elf_Internal_Dyn dyn;
1955 const char *name;
1956 asection *s;
1957
1958 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1959
1960 switch (dyn.d_tag)
1961 {
1962 default:
1963 break;
1964
1965 case DT_PLTGOT:
1966 name = ".got";
1967 goto get_vma;
1968 case DT_JMPREL:
1969 name = ".rela.plt";
1970 get_vma:
1971 s = bfd_get_section_by_name (output_bfd, name);
1972 BFD_ASSERT (s != NULL);
1973 dyn.d_un.d_ptr = s->vma;
1974 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1975 break;
1976
1977 case DT_PLTRELSZ:
1978 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1979 BFD_ASSERT (s != NULL);
eea6121a 1980 dyn.d_un.d_val = s->size;
90ace9e9
JT
1981 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1982 break;
1983
1984 case DT_RELASZ:
1985 /* The procedure linkage table relocs (DT_JMPREL) should
1986 not be included in the overall relocs (DT_RELA).
1987 Therefore, we override the DT_RELASZ entry here to
1988 make it not include the JMPREL relocs. Since the
1989 linker script arranges for .rela.plt to follow all
1990 other relocation sections, we don't have to worry
1991 about changing the DT_RELA entry. */
1992 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
1993 if (s != NULL)
eea6121a 1994 dyn.d_un.d_val -= s->size;
90ace9e9
JT
1995 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1996 break;
1997 }
1998 }
1999
2000 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2001 if (splt->size > 0)
90ace9e9
JT
2002 {
2003 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2004 bfd_put_32 (output_bfd,
2005 (sgot->output_section->vma
2006 + sgot->output_offset + 4
2007 - (splt->output_section->vma + 6)),
2008 splt->contents + 2);
2009 bfd_put_32 (output_bfd,
2010 (sgot->output_section->vma
2011 + sgot->output_offset + 8
2012 - (splt->output_section->vma + 12)),
2013 splt->contents + 8);
cedb70c5 2014 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2015 = PLT_ENTRY_SIZE;
2016 }
2017 }
2018
2019 /* Fill in the first three entries in the global offset table. */
eea6121a 2020 if (sgot->size > 0)
90ace9e9
JT
2021 {
2022 if (sdyn == NULL)
2023 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2024 else
2025 bfd_put_32 (output_bfd,
2026 sdyn->output_section->vma + sdyn->output_offset,
2027 sgot->contents);
2028 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2029 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2030 }
2031
2032 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2033
b34976b6 2034 return TRUE;
90ace9e9
JT
2035}
2036
2037#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2038#define TARGET_LITTLE_NAME "elf32-vax"
2039#define ELF_MACHINE_CODE EM_VAX
2040#define ELF_MAXPAGESIZE 0x1000
2041
2042#define elf_backend_create_dynamic_sections \
2043 _bfd_elf_create_dynamic_sections
2044#define bfd_elf32_bfd_link_hash_table_create \
2045 elf_vax_link_hash_table_create
c152c796 2046#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2047
2048#define elf_backend_check_relocs elf_vax_check_relocs
2049#define elf_backend_adjust_dynamic_symbol \
2050 elf_vax_adjust_dynamic_symbol
2051#define elf_backend_size_dynamic_sections \
2052 elf_vax_size_dynamic_sections
74541ad4 2053#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
2054#define elf_backend_relocate_section elf_vax_relocate_section
2055#define elf_backend_finish_dynamic_symbol \
2056 elf_vax_finish_dynamic_symbol
2057#define elf_backend_finish_dynamic_sections \
2058 elf_vax_finish_dynamic_sections
2059#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2060#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2061#define bfd_elf32_bfd_merge_private_bfd_data \
2062 elf32_vax_merge_private_bfd_data
2063#define bfd_elf32_bfd_set_private_flags \
2064 elf32_vax_set_private_flags
2065#define bfd_elf32_bfd_print_private_bfd_data \
2066 elf32_vax_print_private_bfd_data
2067
2068#define elf_backend_can_gc_sections 1
2069#define elf_backend_want_got_plt 1
2070#define elf_backend_plt_readonly 1
2071#define elf_backend_want_plt_sym 0
2072#define elf_backend_got_header_size 16
f0fe0e16 2073#define elf_backend_rela_normal 1
90ace9e9
JT
2074
2075#include "elf32-target.h"
This page took 0.470577 seconds and 4 git commands to generate.