Enable the Dot Product extension by default for Armv8.4-a.
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
2571583a 2 Copyright (C) 1993-2017 Free Software Foundation, Inc.
90ace9e9
JT
3 Contributed by Matt Thomas <matt@3am-software.com>.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
90ace9e9 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
90ace9e9 16
ae9a127f
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
cd123cb7
NC
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
90ace9e9 21
90ace9e9 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
90ace9e9
JT
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
ce71b576
NC
29static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 struct bfd_hash_table *,
33 const char *);
34static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 asection *, const Elf_Internal_Rela *);
ce71b576
NC
37static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 struct elf_link_hash_entry *);
39static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 bfd *, asection *, bfd_byte *,
42 Elf_Internal_Rela *,
43 Elf_Internal_Sym *, asection **);
44static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 struct elf_link_hash_entry *,
46 Elf_Internal_Sym *);
47static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 struct bfd_link_info *);
6db7e006
MR
49static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 const arelent *);
ce71b576
NC
51
52static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
2c3fc389 53static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
90ace9e9
JT
54
55static reloc_howto_type howto_table[] = {
56 HOWTO (R_VAX_NONE, /* type */
57 0, /* rightshift */
6346d5ca 58 3, /* size (0 = byte, 1 = short, 2 = long) */
90ace9e9 59 0, /* bitsize */
b34976b6 60 FALSE, /* pc_relative */
90ace9e9
JT
61 0, /* bitpos */
62 complain_overflow_dont, /* complain_on_overflow */
63 bfd_elf_generic_reloc, /* special_function */
64 "R_VAX_NONE", /* name */
b34976b6 65 FALSE, /* partial_inplace */
90ace9e9
JT
66 0, /* src_mask */
67 0x00000000, /* dst_mask */
b34976b6 68 FALSE), /* pcrel_offset */
90ace9e9
JT
69
70 HOWTO (R_VAX_32, /* type */
71 0, /* rightshift */
72 2, /* size (0 = byte, 1 = short, 2 = long) */
73 32, /* bitsize */
b34976b6 74 FALSE, /* pc_relative */
90ace9e9
JT
75 0, /* bitpos */
76 complain_overflow_bitfield, /* complain_on_overflow */
77 bfd_elf_generic_reloc, /* special_function */
78 "R_VAX_32", /* name */
b34976b6 79 FALSE, /* partial_inplace */
90ace9e9
JT
80 0, /* src_mask */
81 0xffffffff, /* dst_mask */
b34976b6 82 FALSE), /* pcrel_offset */
90ace9e9
JT
83
84 HOWTO (R_VAX_16, /* type */
85 0, /* rightshift */
86 1, /* size (0 = byte, 1 = short, 2 = long) */
87 16, /* bitsize */
b34976b6 88 FALSE, /* pc_relative */
90ace9e9
JT
89 0, /* bitpos */
90 complain_overflow_bitfield, /* complain_on_overflow */
91 bfd_elf_generic_reloc, /* special_function */
92 "R_VAX_16", /* name */
b34976b6 93 FALSE, /* partial_inplace */
90ace9e9
JT
94 0, /* src_mask */
95 0x0000ffff, /* dst_mask */
b34976b6 96 FALSE), /* pcrel_offset */
90ace9e9
JT
97
98 HOWTO (R_VAX_8, /* type */
99 0, /* rightshift */
100 0, /* size (0 = byte, 1 = short, 2 = long) */
101 8, /* bitsize */
b34976b6 102 FALSE, /* pc_relative */
90ace9e9
JT
103 0, /* bitpos */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_VAX_8", /* name */
b34976b6 107 FALSE, /* partial_inplace */
90ace9e9
JT
108 0, /* src_mask */
109 0x000000ff, /* dst_mask */
b34976b6 110 FALSE), /* pcrel_offset */
90ace9e9
JT
111
112 HOWTO (R_VAX_PC32, /* type */
113 0, /* rightshift */
114 2, /* size (0 = byte, 1 = short, 2 = long) */
115 32, /* bitsize */
b34976b6 116 TRUE, /* pc_relative */
90ace9e9
JT
117 0, /* bitpos */
118 complain_overflow_bitfield, /* complain_on_overflow */
119 bfd_elf_generic_reloc, /* special_function */
120 "R_VAX_PC32", /* name */
b34976b6 121 FALSE, /* partial_inplace */
90ace9e9
JT
122 0, /* src_mask */
123 0xffffffff, /* dst_mask */
b34976b6 124 TRUE), /* pcrel_offset */
90ace9e9
JT
125
126 HOWTO (R_VAX_PC16, /* type */
127 0, /* rightshift */
128 1, /* size (0 = byte, 1 = short, 2 = long) */
129 16, /* bitsize */
b34976b6 130 TRUE, /* pc_relative */
90ace9e9
JT
131 0, /* bitpos */
132 complain_overflow_signed, /* complain_on_overflow */
133 bfd_elf_generic_reloc, /* special_function */
134 "R_VAX_PC16", /* name */
b34976b6 135 FALSE, /* partial_inplace */
90ace9e9
JT
136 0, /* src_mask */
137 0x0000ffff, /* dst_mask */
b34976b6 138 TRUE), /* pcrel_offset */
90ace9e9
JT
139
140 HOWTO (R_VAX_PC8, /* type */
141 0, /* rightshift */
142 0, /* size (0 = byte, 1 = short, 2 = long) */
143 8, /* bitsize */
b34976b6 144 TRUE, /* pc_relative */
90ace9e9
JT
145 0, /* bitpos */
146 complain_overflow_signed, /* complain_on_overflow */
147 bfd_elf_generic_reloc, /* special_function */
148 "R_VAX_PC8", /* name */
b34976b6 149 FALSE, /* partial_inplace */
90ace9e9
JT
150 0, /* src_mask */
151 0x000000ff, /* dst_mask */
b34976b6 152 TRUE), /* pcrel_offset */
90ace9e9
JT
153
154 HOWTO (R_VAX_GOT32, /* type */
155 0, /* rightshift */
156 2, /* size (0 = byte, 1 = short, 2 = long) */
157 32, /* bitsize */
b34976b6 158 TRUE, /* pc_relative */
90ace9e9
JT
159 0, /* bitpos */
160 complain_overflow_bitfield, /* complain_on_overflow */
161 bfd_elf_generic_reloc, /* special_function */
162 "R_VAX_GOT32", /* name */
b34976b6 163 FALSE, /* partial_inplace */
90ace9e9
JT
164 0, /* src_mask */
165 0xffffffff, /* dst_mask */
b34976b6 166 TRUE), /* pcrel_offset */
90ace9e9
JT
167
168 EMPTY_HOWTO (-1),
169 EMPTY_HOWTO (-1),
170 EMPTY_HOWTO (-1),
171 EMPTY_HOWTO (-1),
172 EMPTY_HOWTO (-1),
173
174 HOWTO (R_VAX_PLT32, /* type */
175 0, /* rightshift */
176 2, /* size (0 = byte, 1 = short, 2 = long) */
177 32, /* bitsize */
b34976b6 178 TRUE, /* pc_relative */
90ace9e9
JT
179 0, /* bitpos */
180 complain_overflow_bitfield, /* complain_on_overflow */
181 bfd_elf_generic_reloc, /* special_function */
182 "R_VAX_PLT32", /* name */
b34976b6 183 FALSE, /* partial_inplace */
90ace9e9
JT
184 0, /* src_mask */
185 0xffffffff, /* dst_mask */
b34976b6 186 TRUE), /* pcrel_offset */
90ace9e9
JT
187
188 EMPTY_HOWTO (-1),
189 EMPTY_HOWTO (-1),
190 EMPTY_HOWTO (-1),
191 EMPTY_HOWTO (-1),
192 EMPTY_HOWTO (-1),
193
194 HOWTO (R_VAX_COPY, /* type */
195 0, /* rightshift */
196 0, /* size (0 = byte, 1 = short, 2 = long) */
197 0, /* bitsize */
b34976b6 198 FALSE, /* pc_relative */
90ace9e9
JT
199 0, /* bitpos */
200 complain_overflow_dont, /* complain_on_overflow */
201 bfd_elf_generic_reloc, /* special_function */
202 "R_VAX_COPY", /* name */
b34976b6 203 FALSE, /* partial_inplace */
90ace9e9
JT
204 0, /* src_mask */
205 0xffffffff, /* dst_mask */
b34976b6 206 FALSE), /* pcrel_offset */
90ace9e9
JT
207
208 HOWTO (R_VAX_GLOB_DAT, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
90ace9e9
JT
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_VAX_GLOB_DAT", /* name */
b34976b6 217 FALSE, /* partial_inplace */
90ace9e9
JT
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
90ace9e9
JT
221
222 HOWTO (R_VAX_JMP_SLOT, /* type */
223 0, /* rightshift */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
225 32, /* bitsize */
b34976b6 226 FALSE, /* pc_relative */
90ace9e9
JT
227 0, /* bitpos */
228 complain_overflow_dont, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_VAX_JMP_SLOT", /* name */
b34976b6 231 FALSE, /* partial_inplace */
90ace9e9
JT
232 0, /* src_mask */
233 0xffffffff, /* dst_mask */
b34976b6 234 FALSE), /* pcrel_offset */
90ace9e9
JT
235
236 HOWTO (R_VAX_RELATIVE, /* type */
237 0, /* rightshift */
238 2, /* size (0 = byte, 1 = short, 2 = long) */
239 32, /* bitsize */
b34976b6 240 FALSE, /* pc_relative */
90ace9e9
JT
241 0, /* bitpos */
242 complain_overflow_dont, /* complain_on_overflow */
243 bfd_elf_generic_reloc, /* special_function */
244 "R_VAX_RELATIVE", /* name */
b34976b6 245 FALSE, /* partial_inplace */
90ace9e9
JT
246 0, /* src_mask */
247 0xffffffff, /* dst_mask */
b34976b6 248 FALSE), /* pcrel_offset */
90ace9e9
JT
249
250 /* GNU extension to record C++ vtable hierarchy */
251 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
252 0, /* rightshift */
253 2, /* size (0 = byte, 1 = short, 2 = long) */
254 0, /* bitsize */
b34976b6 255 FALSE, /* pc_relative */
90ace9e9
JT
256 0, /* bitpos */
257 complain_overflow_dont, /* complain_on_overflow */
258 NULL, /* special_function */
259 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 260 FALSE, /* partial_inplace */
90ace9e9
JT
261 0, /* src_mask */
262 0, /* dst_mask */
b34976b6 263 FALSE), /* pcrel_offset */
90ace9e9
JT
264
265 /* GNU extension to record C++ vtable member usage */
266 HOWTO (R_VAX_GNU_VTENTRY, /* type */
267 0, /* rightshift */
268 2, /* size (0 = byte, 1 = short, 2 = long) */
269 0, /* bitsize */
b34976b6 270 FALSE, /* pc_relative */
90ace9e9
JT
271 0, /* bitpos */
272 complain_overflow_dont, /* complain_on_overflow */
273 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 275 FALSE, /* partial_inplace */
90ace9e9
JT
276 0, /* src_mask */
277 0, /* dst_mask */
b34976b6 278 FALSE), /* pcrel_offset */
90ace9e9
JT
279};
280
281static void
64d29018 282rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
90ace9e9 283{
cd21f5da
NC
284 unsigned int r_type;
285
286 r_type = ELF32_R_TYPE (dst->r_info);
287 if (r_type >= R_VAX_max)
288 {
695344c0 289 /* xgettext:c-format */
4eca0228
AM
290 _bfd_error_handler (_("%B: unrecognised VAX reloc number: %d"),
291 abfd, r_type);
cd21f5da
NC
292 bfd_set_error (bfd_error_bad_value);
293 r_type = R_VAX_NONE;
294 }
295 cache_ptr->howto = &howto_table[r_type];
90ace9e9
JT
296}
297
298#define elf_info_to_howto rtype_to_howto
299
300static const struct
301{
302 bfd_reloc_code_real_type bfd_val;
303 int elf_val;
304} reloc_map[] = {
305 { BFD_RELOC_NONE, R_VAX_NONE },
306 { BFD_RELOC_32, R_VAX_32 },
307 { BFD_RELOC_16, R_VAX_16 },
308 { BFD_RELOC_8, R_VAX_8 },
309 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314 { BFD_RELOC_NONE, R_VAX_COPY },
315 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318 { BFD_RELOC_CTOR, R_VAX_32 },
319 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321};
322
323static reloc_howto_type *
ce71b576 324reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
90ace9e9
JT
325{
326 unsigned int i;
327 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328 {
329 if (reloc_map[i].bfd_val == code)
330 return &howto_table[reloc_map[i].elf_val];
331 }
332 return 0;
333}
334
157090f7
AM
335static reloc_howto_type *
336reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337 const char *r_name)
338{
339 unsigned int i;
340
341 for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342 if (howto_table[i].name != NULL
343 && strcasecmp (howto_table[i].name, r_name) == 0)
344 return &howto_table[i];
345
346 return NULL;
347}
348
90ace9e9 349#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
157090f7 350#define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
90ace9e9
JT
351#define ELF_ARCH bfd_arch_vax
352/* end code generated by elf.el */
90ace9e9
JT
353\f
354/* Functions for the VAX ELF linker. */
355
356/* The name of the dynamic interpreter. This is put in the .interp
357 section. */
358
359#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360
361/* The size in bytes of an entry in the procedure linkage table. */
362
363#define PLT_ENTRY_SIZE 12
364
365/* The first entry in a procedure linkage table looks like this. See
366 the SVR4 ABI VAX supplement to see how this works. */
367
368static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369{
370 0xdd, 0xef, /* pushl l^ */
371 0, 0, 0, 0, /* offset to .plt.got + 4 */
372 0x17, 0xff, /* jmp @L^(pc) */
373 0, 0, 0, 0, /* offset to .plt.got + 8 */
374};
375
376/* Subsequent entries in a procedure linkage table look like this. */
377
378static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379{
6c4fb25a 380 0xfc, 0x0f, /* .word ^M<r11:r2> */
71f136d6 381 0x16, 0xef, /* jsb L^(pc) */
90ace9e9
JT
382 0, 0, 0, 0, /* replaced with offset to start of .plt */
383 0, 0, 0, 0, /* index into .rela.plt */
384};
385
386/* The VAX linker needs to keep track of the number of relocs that it
387 decides to copy in check_relocs for each symbol. This is so that it
388 can discard PC relative relocs if it doesn't need them when linking
389 with -Bsymbolic. We store the information in a field extending the
390 regular ELF linker hash table. */
391
392/* This structure keeps track of the number of PC relative relocs we have
393 copied for a given symbol. */
394
395struct elf_vax_pcrel_relocs_copied
396{
397 /* Next section. */
398 struct elf_vax_pcrel_relocs_copied *next;
399 /* A section in dynobj. */
400 asection *section;
401 /* Number of relocs copied in this section. */
402 bfd_size_type count;
403};
404
405/* VAX ELF linker hash entry. */
406
407struct elf_vax_link_hash_entry
408{
409 struct elf_link_hash_entry root;
410
411 /* Number of PC relative relocs copied for this symbol. */
412 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413
414 bfd_vma got_addend;
415};
416
90ace9e9
JT
417/* Declare this now that the above structures are defined. */
418
ce71b576 419static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
4dfe6ac6 420 void *);
90ace9e9 421
b29635ba
JT
422/* Declare this now that the above structures are defined. */
423
ce71b576 424static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
4dfe6ac6 425 void *);
b29635ba 426
90ace9e9
JT
427/* Traverse an VAX ELF linker hash table. */
428
429#define elf_vax_link_hash_traverse(table, func, info) \
430 (elf_link_hash_traverse \
4dfe6ac6 431 ((table), \
2c3fc389 432 (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func), \
90ace9e9
JT
433 (info)))
434
90ace9e9
JT
435/* Create an entry in an VAX ELF linker hash table. */
436
437static struct bfd_hash_entry *
ce71b576
NC
438elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439 struct bfd_hash_table *table,
440 const char *string)
90ace9e9
JT
441{
442 struct elf_vax_link_hash_entry *ret =
443 (struct elf_vax_link_hash_entry *) entry;
444
445 /* Allocate the structure if it has not already been allocated by a
446 subclass. */
ce71b576 447 if (ret == NULL)
90ace9e9
JT
448 ret = ((struct elf_vax_link_hash_entry *)
449 bfd_hash_allocate (table,
450 sizeof (struct elf_vax_link_hash_entry)));
ce71b576 451 if (ret == NULL)
90ace9e9
JT
452 return (struct bfd_hash_entry *) ret;
453
454 /* Call the allocation method of the superclass. */
455 ret = ((struct elf_vax_link_hash_entry *)
456 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457 table, string));
ce71b576 458 if (ret != NULL)
90ace9e9
JT
459 {
460 ret->pcrel_relocs_copied = NULL;
461 }
462
463 return (struct bfd_hash_entry *) ret;
464}
465
466/* Create an VAX ELF linker hash table. */
467
468static struct bfd_link_hash_table *
ce71b576 469elf_vax_link_hash_table_create (bfd *abfd)
90ace9e9 470{
4dfe6ac6
NC
471 struct elf_link_hash_table *ret;
472 bfd_size_type amt = sizeof (struct elf_link_hash_table);
90ace9e9 473
7bf52ea2 474 ret = bfd_zmalloc (amt);
ce71b576 475 if (ret == NULL)
90ace9e9
JT
476 return NULL;
477
4dfe6ac6 478 if (!_bfd_elf_link_hash_table_init (ret, abfd,
66eb6687 479 elf_vax_link_hash_newfunc,
4dfe6ac6
NC
480 sizeof (struct elf_vax_link_hash_entry),
481 GENERIC_ELF_DATA))
90ace9e9
JT
482 {
483 free (ret);
484 return NULL;
485 }
486
4dfe6ac6 487 return &ret->root;
90ace9e9
JT
488}
489
490/* Keep vax-specific flags in the ELF header */
b34976b6 491static bfd_boolean
ce71b576 492elf32_vax_set_private_flags (bfd *abfd, flagword flags)
90ace9e9
JT
493{
494 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
495 elf_flags_init (abfd) = TRUE;
496 return TRUE;
90ace9e9
JT
497}
498
499/* Merge backend specific data from an object file to the output
500 object file when linking. */
b34976b6 501static bfd_boolean
50e03d47 502elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
90ace9e9 503{
50e03d47 504 bfd *obfd = info->output_bfd;
90ace9e9
JT
505 flagword in_flags;
506
507 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
508 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 509 return TRUE;
90ace9e9
JT
510
511 in_flags = elf_elfheader (ibfd)->e_flags;
90ace9e9
JT
512
513 if (!elf_flags_init (obfd))
514 {
b34976b6 515 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
516 elf_elfheader (obfd)->e_flags = in_flags;
517 }
518
b34976b6 519 return TRUE;
90ace9e9
JT
520}
521
522/* Display the flags field */
b34976b6 523static bfd_boolean
2c3fc389 524elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
90ace9e9
JT
525{
526 FILE *file = (FILE *) ptr;
527
528 BFD_ASSERT (abfd != NULL && ptr != NULL);
529
530 /* Print normal ELF private data. */
531 _bfd_elf_print_private_bfd_data (abfd, ptr);
532
533 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
534
535 /* xgettext:c-format */
536 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
537
179d3252 538 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
539 fprintf (file, _(" [nonpic]"));
540
179d3252 541 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
542 fprintf (file, _(" [d-float]"));
543
179d3252 544 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
545 fprintf (file, _(" [g-float]"));
546
547 fputc ('\n', file);
548
b34976b6 549 return TRUE;
90ace9e9
JT
550}
551/* Look through the relocs for a section during the first phase, and
552 allocate space in the global offset table or procedure linkage
553 table. */
554
b34976b6 555static bfd_boolean
ce71b576
NC
556elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
557 const Elf_Internal_Rela *relocs)
90ace9e9
JT
558{
559 bfd *dynobj;
560 Elf_Internal_Shdr *symtab_hdr;
561 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
562 const Elf_Internal_Rela *rel;
563 const Elf_Internal_Rela *rel_end;
90ace9e9
JT
564 asection *sreloc;
565
0e1862bb 566 if (bfd_link_relocatable (info))
b34976b6 567 return TRUE;
90ace9e9
JT
568
569 dynobj = elf_hash_table (info)->dynobj;
570 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
571 sym_hashes = elf_sym_hashes (abfd);
90ace9e9 572
90ace9e9
JT
573 sreloc = NULL;
574
575 rel_end = relocs + sec->reloc_count;
576 for (rel = relocs; rel < rel_end; rel++)
577 {
578 unsigned long r_symndx;
579 struct elf_link_hash_entry *h;
580
581 r_symndx = ELF32_R_SYM (rel->r_info);
582
583 if (r_symndx < symtab_hdr->sh_info)
584 h = NULL;
585 else
973a3492
L
586 {
587 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
588 while (h->root.type == bfd_link_hash_indirect
589 || h->root.type == bfd_link_hash_warning)
590 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
591
592 /* PR15323, ref flags aren't set for references in the same
593 object. */
bc4e12de 594 h->root.non_ir_ref_regular = 1;
973a3492 595 }
90ace9e9
JT
596
597 switch (ELF32_R_TYPE (rel->r_info))
598 {
599 case R_VAX_GOT32:
fe723c87 600 BFD_ASSERT (h != NULL);
90ace9e9 601
7b6021f1
MR
602 /* If this is a local symbol, we resolve it directly without
603 creating a global offset table entry. */
125b5bac
MR
604 if (h->forced_local
605 || h == elf_hash_table (info)->hgot
606 || h == elf_hash_table (info)->hplt)
7b6021f1
MR
607 break;
608
90ace9e9
JT
609 /* This symbol requires a global offset table entry. */
610
611 if (dynobj == NULL)
612 {
613 /* Create the .got section. */
614 elf_hash_table (info)->dynobj = dynobj = abfd;
615 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 616 return FALSE;
90ace9e9
JT
617 }
618
90ace9e9
JT
619 if (h != NULL)
620 {
621 struct elf_vax_link_hash_entry *eh;
622
623 eh = (struct elf_vax_link_hash_entry *) h;
624 if (h->got.refcount == -1)
625 {
626 h->got.refcount = 1;
627 eh->got_addend = rel->r_addend;
90ace9e9
JT
628 }
629 else
630 {
631 h->got.refcount++;
632 if (eh->got_addend != (bfd_vma) rel->r_addend)
4eca0228 633 _bfd_error_handler
695344c0 634 /* xgettext:c-format */
d42c267e
AM
635 (_("%B: warning: GOT addend of %Ld to `%s' does"
636 " not match previous GOT addend of %Ld"),
dae82561 637 abfd, rel->r_addend, h->root.root.string,
fe723c87 638 eh->got_addend);
cedb70c5 639
90ace9e9
JT
640 }
641 }
642 break;
643
644 case R_VAX_PLT32:
645 /* This symbol requires a procedure linkage table entry. We
646 actually build the entry in adjust_dynamic_symbol,
647 because this might be a case of linking PIC code which is
648 never referenced by a dynamic object, in which case we
649 don't need to generate a procedure linkage table entry
650 after all. */
125b5bac 651 BFD_ASSERT (h != NULL);
90ace9e9
JT
652
653 /* If this is a local symbol, we resolve it directly without
654 creating a procedure linkage table entry. */
125b5bac 655 if (h->forced_local)
fe723c87 656 break;
90ace9e9 657
f5385ebf 658 h->needs_plt = 1;
90ace9e9
JT
659 if (h->plt.refcount == -1)
660 h->plt.refcount = 1;
661 else
662 h->plt.refcount++;
663 break;
664
665 case R_VAX_PC8:
666 case R_VAX_PC16:
667 case R_VAX_PC32:
668 /* If we are creating a shared library and this is not a local
669 symbol, we need to copy the reloc into the shared library.
670 However when linking with -Bsymbolic and this is a global
671 symbol which is defined in an object we are including in the
672 link (i.e., DEF_REGULAR is set), then we can resolve the
673 reloc directly. At this point we have not seen all the input
674 files, so it is possible that DEF_REGULAR is not set now but
675 will be set later (it is never cleared). We account for that
676 possibility below by storing information in the
677 pcrel_relocs_copied field of the hash table entry. */
0e1862bb 678 if (!(bfd_link_pic (info)
90ace9e9
JT
679 && (sec->flags & SEC_ALLOC) != 0
680 && h != NULL
681 && (!info->symbolic
f5385ebf 682 || !h->def_regular)))
90ace9e9 683 {
7b6021f1
MR
684 if (h != NULL
685 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
686 && !h->forced_local)
90ace9e9
JT
687 {
688 /* Make sure a plt entry is created for this symbol if
689 it turns out to be a function defined by a dynamic
690 object. */
691 if (h->plt.refcount == -1)
692 h->plt.refcount = 1;
693 else
694 h->plt.refcount++;
695 }
696 break;
697 }
7b6021f1
MR
698 /* If this is a local symbol, we can resolve it directly. */
699 if (h != NULL
700 && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
701 || h->forced_local))
fe723c87
MT
702 break;
703
90ace9e9
JT
704 /* Fall through. */
705 case R_VAX_8:
706 case R_VAX_16:
707 case R_VAX_32:
7b6021f1 708 if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
90ace9e9
JT
709 {
710 /* Make sure a plt entry is created for this symbol if it
711 turns out to be a function defined by a dynamic object. */
712 if (h->plt.refcount == -1)
713 h->plt.refcount = 1;
714 else
715 h->plt.refcount++;
716 }
717
718 /* If we are creating a shared library, we need to copy the
719 reloc into the shared library. */
0e1862bb 720 if (bfd_link_pic (info)
90ace9e9
JT
721 && (sec->flags & SEC_ALLOC) != 0)
722 {
723 /* When creating a shared object, we must copy these
724 reloc types into the output file. We create a reloc
725 section in dynobj and make room for this reloc. */
726 if (sreloc == NULL)
727 {
83bac4b0
NC
728 sreloc = _bfd_elf_make_dynamic_reloc_section
729 (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
90ace9e9 730
83bac4b0 731 if (sreloc == NULL)
b34976b6 732 return FALSE;
90ace9e9 733
90ace9e9
JT
734 if (sec->flags & SEC_READONLY)
735 info->flags |= DF_TEXTREL;
736 }
737
eea6121a 738 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
739
740 /* If we are linking with -Bsymbolic, we count the number of
741 PC relative relocations we have entered for this symbol,
742 so that we can discard them again if the symbol is later
743 defined by a regular object. Note that this function is
19852a2a 744 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
745 which means that h is really a pointer to an
746 elf_vax_link_hash_entry. */
747 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
ce71b576
NC
748 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
749 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
90ace9e9
JT
750 && info->symbolic)
751 {
752 struct elf_vax_link_hash_entry *eh;
753 struct elf_vax_pcrel_relocs_copied *p;
754
755 eh = (struct elf_vax_link_hash_entry *) h;
756
757 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
758 if (p->section == sreloc)
759 break;
760
761 if (p == NULL)
762 {
763 p = ((struct elf_vax_pcrel_relocs_copied *)
764 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
765 if (p == NULL)
b34976b6 766 return FALSE;
90ace9e9
JT
767 p->next = eh->pcrel_relocs_copied;
768 eh->pcrel_relocs_copied = p;
769 p->section = sreloc;
770 p->count = 0;
771 }
772
773 ++p->count;
774 }
775 }
776
777 break;
778
779 /* This relocation describes the C++ object vtable hierarchy.
780 Reconstruct it for later use during GC. */
781 case R_VAX_GNU_VTINHERIT:
c152c796 782 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 783 return FALSE;
90ace9e9
JT
784 break;
785
786 /* This relocation describes which C++ vtable entries are actually
787 used. Record for later use during GC. */
788 case R_VAX_GNU_VTENTRY:
d17e0c6e
JB
789 BFD_ASSERT (h != NULL);
790 if (h != NULL
791 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 792 return FALSE;
90ace9e9
JT
793 break;
794
795 default:
796 break;
797 }
798 }
799
b34976b6 800 return TRUE;
90ace9e9
JT
801}
802
803/* Return the section that should be marked against GC for a given
804 relocation. */
805
806static asection *
ce71b576 807elf_vax_gc_mark_hook (asection *sec,
07adf181 808 struct bfd_link_info *info,
ce71b576
NC
809 Elf_Internal_Rela *rel,
810 struct elf_link_hash_entry *h,
811 Elf_Internal_Sym *sym)
90ace9e9
JT
812{
813 if (h != NULL)
07adf181
AM
814 switch (ELF32_R_TYPE (rel->r_info))
815 {
816 case R_VAX_GNU_VTINHERIT:
817 case R_VAX_GNU_VTENTRY:
818 return NULL;
819 }
820
821 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
90ace9e9
JT
822}
823
90ace9e9
JT
824/* Adjust a symbol defined by a dynamic object and referenced by a
825 regular object. The current definition is in some section of the
826 dynamic object, but we're not including those sections. We have to
827 change the definition to something the rest of the link can
828 understand. */
829
b34976b6 830static bfd_boolean
a0f0eb1e
MR
831elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
832 struct elf_link_hash_entry *h)
90ace9e9
JT
833{
834 bfd *dynobj;
835 asection *s;
90ace9e9
JT
836
837 dynobj = elf_hash_table (info)->dynobj;
838
839 /* Make sure we know what is going on here. */
840 BFD_ASSERT (dynobj != NULL
f5385ebf 841 && (h->needs_plt
f6e332e6 842 || h->u.weakdef != NULL
f5385ebf
AM
843 || (h->def_dynamic
844 && h->ref_regular
845 && !h->def_regular)));
90ace9e9
JT
846
847 /* If this is a function, put it in the procedure linkage table. We
848 will fill in the contents of the procedure linkage table later,
849 when we know the address of the .got section. */
850 if (h->type == STT_FUNC
f5385ebf 851 || h->needs_plt)
90ace9e9 852 {
a22a8039
MR
853 if (h->plt.refcount <= 0
854 || SYMBOL_CALLS_LOCAL (info, h)
855 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
856 && h->root.type == bfd_link_hash_undefweak))
90ace9e9
JT
857 {
858 /* This case can occur if we saw a PLTxx reloc in an input
859 file, but the symbol was never referred to by a dynamic
a22a8039
MR
860 object, or if all references were garbage collected. In
861 such a case, we don't actually need to build a procedure
862 linkage table, and we can just do a PCxx reloc instead. */
90ace9e9 863 h->plt.offset = (bfd_vma) -1;
f5385ebf 864 h->needs_plt = 0;
b34976b6 865 return TRUE;
90ace9e9
JT
866 }
867
ce558b89 868 s = elf_hash_table (info)->splt;
90ace9e9
JT
869 BFD_ASSERT (s != NULL);
870
871 /* If this is the first .plt entry, make room for the special
872 first entry. */
eea6121a 873 if (s->size == 0)
90ace9e9 874 {
eea6121a 875 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
876 }
877
878 /* If this symbol is not defined in a regular file, and we are
879 not generating a shared library, then set the symbol to this
880 location in the .plt. This is required to make function
881 pointers compare as equal between the normal executable and
882 the shared library. */
0e1862bb 883 if (!bfd_link_pic (info)
f5385ebf 884 && !h->def_regular)
90ace9e9
JT
885 {
886 h->root.u.def.section = s;
eea6121a 887 h->root.u.def.value = s->size;
90ace9e9
JT
888 }
889
eea6121a 890 h->plt.offset = s->size;
90ace9e9
JT
891
892 /* Make room for this entry. */
eea6121a 893 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
894
895 /* We also need to make an entry in the .got.plt section, which
896 will be placed in the .got section by the linker script. */
897
ce558b89 898 s = elf_hash_table (info)->sgotplt;
90ace9e9 899 BFD_ASSERT (s != NULL);
eea6121a 900 s->size += 4;
90ace9e9
JT
901
902 /* We also need to make an entry in the .rela.plt section. */
903
ce558b89 904 s = elf_hash_table (info)->srelplt;
90ace9e9 905 BFD_ASSERT (s != NULL);
eea6121a 906 s->size += sizeof (Elf32_External_Rela);
90ace9e9 907
b34976b6 908 return TRUE;
90ace9e9
JT
909 }
910
911 /* Reinitialize the plt offset now that it is not used as a reference
912 count any more. */
913 h->plt.offset = (bfd_vma) -1;
914
915 /* If this is a weak symbol, and there is a real definition, the
916 processor independent code will have arranged for us to see the
917 real definition first, and we can just use the same value. */
f6e332e6 918 if (h->u.weakdef != NULL)
90ace9e9 919 {
f6e332e6
AM
920 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
921 || h->u.weakdef->root.type == bfd_link_hash_defweak);
922 h->root.u.def.section = h->u.weakdef->root.u.def.section;
923 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 924 return TRUE;
90ace9e9
JT
925 }
926
927 /* This is a reference to a symbol defined by a dynamic object which
928 is not a function. */
929
930 /* If we are creating a shared library, we must presume that the
931 only references to the symbol are via the global offset table.
932 For such cases we need not do anything here; the relocations will
933 be handled correctly by relocate_section. */
0e1862bb 934 if (bfd_link_pic (info))
b34976b6 935 return TRUE;
90ace9e9
JT
936
937 /* We must allocate the symbol in our .dynbss section, which will
938 become part of the .bss section of the executable. There will be
939 an entry for this symbol in the .dynsym section. The dynamic
940 object will contain position independent code, so all references
941 from the dynamic object to this symbol will go through the global
942 offset table. The dynamic linker will use the .dynsym entry to
943 determine the address it must put in the global offset table, so
944 both the dynamic object and the regular object will refer to the
945 same memory location for the variable. */
946
3d4d4302 947 s = bfd_get_linker_section (dynobj, ".dynbss");
90ace9e9
JT
948 BFD_ASSERT (s != NULL);
949
950 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
951 copy the initial value out of the dynamic object and into the
952 runtime process image. We need to remember the offset into the
953 .rela.bss section we are going to use. */
1d7e9d18 954 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
90ace9e9
JT
955 {
956 asection *srel;
957
3d4d4302 958 srel = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9 959 BFD_ASSERT (srel != NULL);
eea6121a 960 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 961 h->needs_copy = 1;
90ace9e9
JT
962 }
963
6cabe1ea 964 return _bfd_elf_adjust_dynamic_copy (info, h, s);
90ace9e9
JT
965}
966
fac3d241
MR
967/* This function is called via elf_link_hash_traverse. It resets GOT
968 and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
969 will be done. */
970
971static bfd_boolean
972elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
973 void *infoptr ATTRIBUTE_UNUSED)
974{
975 h->got.refcount = -1;
976 h->plt.refcount = -1;
977
978 return TRUE;
979}
980
981/* Discard unused dynamic data if this is a static link. */
982
983static bfd_boolean
984elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
985 struct bfd_link_info *info)
986{
987 bfd *dynobj;
988 asection *s;
989
990 dynobj = elf_hash_table (info)->dynobj;
991
992 if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
993 {
994 /* We may have created entries in the .rela.got and .got sections.
995 However, if we are not creating the dynamic sections, we will
996 not actually use these entries. Reset the size of .rela.got
49d01bf6 997 and .got, which will cause them to get stripped from the output
fac3d241 998 file below. */
ce558b89 999 s = elf_hash_table (info)->srelgot;
fac3d241
MR
1000 if (s != NULL)
1001 s->size = 0;
ce558b89 1002 s = elf_hash_table (info)->sgotplt;
fac3d241
MR
1003 if (s != NULL)
1004 s->size = 0;
ce558b89 1005 s = elf_hash_table (info)->sgot;
fac3d241
MR
1006 if (s != NULL)
1007 s->size = 0;
1008 }
1009
1010 /* If this is a static link, we need to discard all the got entries we've
1011 recorded. */
1012 if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1013 elf_link_hash_traverse (elf_hash_table (info),
1014 elf_vax_discard_got_entries,
1015 info);
1016
1017 return TRUE;
1018}
1019
90ace9e9
JT
1020/* Set the sizes of the dynamic sections. */
1021
b34976b6 1022static bfd_boolean
ce71b576 1023elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1024{
1025 bfd *dynobj;
1026 asection *s;
b34976b6
AM
1027 bfd_boolean plt;
1028 bfd_boolean relocs;
1029 bfd_boolean reltext;
90ace9e9
JT
1030
1031 dynobj = elf_hash_table (info)->dynobj;
1032 BFD_ASSERT (dynobj != NULL);
1033
1034 if (elf_hash_table (info)->dynamic_sections_created)
1035 {
1036 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 1037 if (bfd_link_executable (info) && !info->nointerp)
90ace9e9 1038 {
3d4d4302 1039 s = bfd_get_linker_section (dynobj, ".interp");
90ace9e9 1040 BFD_ASSERT (s != NULL);
eea6121a 1041 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1042 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1043 }
1044 }
90ace9e9
JT
1045
1046 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1047 relative relocs against symbols defined in a regular object. We
1048 allocated space for them in the check_relocs routine, but we will not
1049 fill them in in the relocate_section routine. */
0e1862bb 1050 if (bfd_link_pic (info) && info->symbolic)
4dfe6ac6 1051 elf_vax_link_hash_traverse (elf_hash_table (info),
b29635ba 1052 elf_vax_discard_copies,
ce71b576 1053 NULL);
b29635ba 1054
fac3d241
MR
1055 /* If this is a -Bsymbolic shared link, we need to discard all the got
1056 entries we've recorded. Otherwise, we need to instantiate (allocate
1057 space for them). */
b29635ba
JT
1058 elf_link_hash_traverse (elf_hash_table (info),
1059 elf_vax_instantiate_got_entries,
2c3fc389 1060 info);
90ace9e9
JT
1061
1062 /* The check_relocs and adjust_dynamic_symbol entry points have
1063 determined the sizes of the various dynamic sections. Allocate
1064 memory for them. */
b34976b6
AM
1065 plt = FALSE;
1066 relocs = FALSE;
1067 reltext = FALSE;
90ace9e9
JT
1068 for (s = dynobj->sections; s != NULL; s = s->next)
1069 {
1070 const char *name;
90ace9e9
JT
1071
1072 if ((s->flags & SEC_LINKER_CREATED) == 0)
1073 continue;
1074
1075 /* It's OK to base decisions on the section name, because none
1076 of the dynobj section names depend upon the input files. */
1077 name = bfd_get_section_name (dynobj, s);
1078
90ace9e9
JT
1079 if (strcmp (name, ".plt") == 0)
1080 {
c456f082
AM
1081 /* Remember whether there is a PLT. */
1082 plt = s->size != 0;
90ace9e9 1083 }
0112cd26 1084 else if (CONST_STRNEQ (name, ".rela"))
90ace9e9 1085 {
c456f082 1086 if (s->size != 0)
90ace9e9
JT
1087 {
1088 asection *target;
1089
1090 /* Remember whether there are any reloc sections other
1091 than .rela.plt. */
1092 if (strcmp (name, ".rela.plt") != 0)
1093 {
1094 const char *outname;
1095
b34976b6 1096 relocs = TRUE;
90ace9e9
JT
1097
1098 /* If this relocation section applies to a read only
1099 section, then we probably need a DT_TEXTREL
1100 entry. .rela.plt is actually associated with
1101 .got.plt, which is never readonly. */
1102 outname = bfd_get_section_name (output_bfd,
1103 s->output_section);
1104 target = bfd_get_section_by_name (output_bfd, outname + 5);
1105 if (target != NULL
1106 && (target->flags & SEC_READONLY) != 0
1107 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1108 reltext = TRUE;
90ace9e9
JT
1109 }
1110
1111 /* We use the reloc_count field as a counter if we need
1112 to copy relocs into the output file. */
1113 s->reloc_count = 0;
1114 }
1115 }
0112cd26 1116 else if (! CONST_STRNEQ (name, ".got")
c456f082 1117 && strcmp (name, ".dynbss") != 0)
90ace9e9
JT
1118 {
1119 /* It's not one of our sections, so don't allocate space. */
1120 continue;
1121 }
1122
c456f082 1123 if (s->size == 0)
90ace9e9 1124 {
c456f082
AM
1125 /* If we don't need this section, strip it from the
1126 output file. This is mostly to handle .rela.bss and
1127 .rela.plt. We must create both sections in
1128 create_dynamic_sections, because they must be created
1129 before the linker maps input sections to output
1130 sections. The linker does that before
1131 adjust_dynamic_symbol is called, and it is that
1132 function which decides whether anything needs to go
1133 into these sections. */
8423293d 1134 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1135 continue;
1136 }
1137
c456f082
AM
1138 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1139 continue;
1140
90ace9e9 1141 /* Allocate memory for the section contents. */
eb9a5ecf 1142 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
c456f082 1143 if (s->contents == NULL)
b34976b6 1144 return FALSE;
90ace9e9
JT
1145 }
1146
1147 if (elf_hash_table (info)->dynamic_sections_created)
1148 {
1149 /* Add some entries to the .dynamic section. We fill in the
1150 values later, in elf_vax_finish_dynamic_sections, but we
1151 must add the entries now so that we get the correct size for
1152 the .dynamic section. The DT_DEBUG entry is filled in by the
1153 dynamic linker and used by the debugger. */
1154#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1155 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9 1156
0e1862bb 1157 if (!bfd_link_pic (info))
90ace9e9
JT
1158 {
1159 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1160 return FALSE;
90ace9e9
JT
1161 }
1162
1163 if (plt)
1164 {
1165 if (!add_dynamic_entry (DT_PLTGOT, 0)
1166 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1167 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1168 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1169 return FALSE;
90ace9e9
JT
1170 }
1171
1172 if (relocs)
1173 {
1174 if (!add_dynamic_entry (DT_RELA, 0)
1175 || !add_dynamic_entry (DT_RELASZ, 0)
1176 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1177 return FALSE;
90ace9e9
JT
1178 }
1179
1180 if (reltext || (info->flags & DF_TEXTREL) != 0)
1181 {
1182 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1183 return FALSE;
90ace9e9
JT
1184 }
1185 }
1186#undef add_dynamic_entry
1187
b34976b6 1188 return TRUE;
90ace9e9
JT
1189}
1190
1191/* This function is called via elf_vax_link_hash_traverse if we are
1192 creating a shared object with -Bsymbolic. It discards the space
1193 allocated to copy PC relative relocs against symbols which are defined
1194 in regular objects. We allocated space for them in the check_relocs
1195 routine, but we won't fill them in in the relocate_section routine. */
1196
b34976b6 1197static bfd_boolean
ce71b576 1198elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
2c3fc389 1199 void * ignore ATTRIBUTE_UNUSED)
90ace9e9
JT
1200{
1201 struct elf_vax_pcrel_relocs_copied *s;
1202
90ace9e9 1203 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1204 if (!h->root.def_regular)
b34976b6 1205 return TRUE;
90ace9e9
JT
1206
1207 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1208 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1209
b34976b6 1210 return TRUE;
90ace9e9
JT
1211}
1212
fac3d241
MR
1213/* This function is called via elf_link_hash_traverse. It looks for
1214 entries that have GOT or PLT (.GOT) references. If creating a shared
1215 object with -Bsymbolic, or the symbol has been forced local, then it
1216 resets the reference count back to -1 so normal PC32 relocation will
1217 be done. Otherwise space in the .got and .rela.got will be reserved
1218 for the symbol. */
b29635ba 1219
b34976b6 1220static bfd_boolean
2c3fc389 1221elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
b29635ba
JT
1222{
1223 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1224 bfd *dynobj;
1225 asection *sgot;
1226 asection *srelgot;
b34976b6 1227
b29635ba
JT
1228 /* We don't care about non-GOT (and non-PLT) entries. */
1229 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1230 return TRUE;
b29635ba
JT
1231
1232 dynobj = elf_hash_table (info)->dynobj;
fac3d241 1233 BFD_ASSERT (dynobj != NULL);
b29635ba 1234
ce558b89
AM
1235 sgot = elf_hash_table (info)->sgot;
1236 srelgot = elf_hash_table (info)->srelgot;
b29635ba 1237
125b5bac 1238 if (SYMBOL_REFERENCES_LOCAL (info, h))
b29635ba 1239 {
8be65dd3
MR
1240 h->got.refcount = -1;
1241 h->plt.refcount = -1;
b29635ba
JT
1242 }
1243 else if (h->got.refcount > 0)
1244 {
1245 /* Make sure this symbol is output as a dynamic symbol. */
1246 if (h->dynindx == -1)
1247 {
c152c796 1248 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1249 return FALSE;
b29635ba
JT
1250 }
1251
1252 /* Allocate space in the .got and .rela.got sections. */
125b5bac
MR
1253 sgot->size += 4;
1254 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1255 }
1256
b34976b6 1257 return TRUE;
b29635ba
JT
1258}
1259
90ace9e9
JT
1260/* Relocate an VAX ELF section. */
1261
b34976b6 1262static bfd_boolean
ce71b576
NC
1263elf_vax_relocate_section (bfd *output_bfd,
1264 struct bfd_link_info *info,
1265 bfd *input_bfd,
1266 asection *input_section,
1267 bfd_byte *contents,
1268 Elf_Internal_Rela *relocs,
1269 Elf_Internal_Sym *local_syms,
1270 asection **local_sections)
90ace9e9 1271{
90ace9e9
JT
1272 Elf_Internal_Shdr *symtab_hdr;
1273 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
1274 bfd_vma plt_index;
1275 bfd_vma got_offset;
1276 asection *sgot;
1277 asection *splt;
1278 asection *sgotplt;
1279 asection *sreloc;
1280 Elf_Internal_Rela *rel;
1281 Elf_Internal_Rela *relend;
1282
90ace9e9
JT
1283 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1284 sym_hashes = elf_sym_hashes (input_bfd);
90ace9e9
JT
1285
1286 sgot = NULL;
1287 splt = NULL;
1288 sgotplt = NULL;
1289 sreloc = NULL;
1290
1291 rel = relocs;
1292 relend = relocs + input_section->reloc_count;
1293 for (; rel < relend; rel++)
1294 {
1295 int r_type;
1296 reloc_howto_type *howto;
1297 unsigned long r_symndx;
1298 struct elf_link_hash_entry *h;
1299 Elf_Internal_Sym *sym;
1300 asection *sec;
1301 bfd_vma relocation;
1302 bfd_reloc_status_type r;
1303
1304 r_type = ELF32_R_TYPE (rel->r_info);
1305 if (r_type < 0 || r_type >= (int) R_VAX_max)
1306 {
1307 bfd_set_error (bfd_error_bad_value);
b34976b6 1308 return FALSE;
90ace9e9
JT
1309 }
1310 howto = howto_table + r_type;
1311
f0fe0e16 1312 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1313 h = NULL;
1314 sym = NULL;
1315 sec = NULL;
1316 if (r_symndx < symtab_hdr->sh_info)
1317 {
1318 sym = local_syms + r_symndx;
1319 sec = local_sections[r_symndx];
8517fae7 1320 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1321 }
1322 else
1323 {
560e09e9 1324 bfd_boolean unresolved_reloc;
62d887d4 1325 bfd_boolean warned, ignored;
560e09e9 1326
b2a8e766
AM
1327 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1328 r_symndx, symtab_hdr, sym_hashes,
1329 h, sec, relocation,
62d887d4 1330 unresolved_reloc, warned, ignored);
ce71b576 1331
560e09e9 1332 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1333 || h->root.type == bfd_link_hash_defweak)
560e09e9 1334 && ((r_type == R_VAX_PLT32
90ace9e9 1335 && h->plt.offset != (bfd_vma) -1
fe723c87 1336 && !h->forced_local
90ace9e9
JT
1337 && elf_hash_table (info)->dynamic_sections_created)
1338 || (r_type == R_VAX_GOT32
fe723c87
MT
1339 && h->got.offset != (bfd_vma) -1
1340 && !h->forced_local
90ace9e9 1341 && elf_hash_table (info)->dynamic_sections_created
0e1862bb 1342 && (! bfd_link_pic (info)
90ace9e9 1343 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1344 || !h->def_regular))
0e1862bb 1345 || (bfd_link_pic (info)
90ace9e9 1346 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1347 || !h->def_regular)
90ace9e9
JT
1348 && ((input_section->flags & SEC_ALLOC) != 0
1349 /* DWARF will emit R_VAX_32 relocations in its
1350 sections against symbols defined externally
1351 in shared libraries. We can't do anything
1352 with them here. */
1353
1354 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1355 && h->def_dynamic))
90ace9e9
JT
1356 && (r_type == R_VAX_8
1357 || r_type == R_VAX_16
fe723c87 1358 || r_type == R_VAX_32))))
560e09e9
NC
1359 /* In these cases, we don't need the relocation
1360 value. We check specially because in some
1361 obscure cases sec->output_section will be NULL. */
90ace9e9 1362 relocation = 0;
90ace9e9
JT
1363 }
1364
dbaa2011 1365 if (sec != NULL && discarded_section (sec))
e4067dbb 1366 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 1367 rel, 1, relend, howto, 0, contents);
ab96bf03 1368
0e1862bb 1369 if (bfd_link_relocatable (info))
ab96bf03
AM
1370 continue;
1371
90ace9e9
JT
1372 switch (r_type)
1373 {
1374 case R_VAX_GOT32:
1375 /* Relocation is to the address of the entry for this symbol
1376 in the global offset table. */
125b5bac
MR
1377
1378 /* Resolve a GOTxx reloc against a local symbol directly,
1379 without using the global offset table. */
7b6021f1 1380 if (h == NULL
125b5bac 1381 || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1382 break;
1383
90ace9e9
JT
1384 {
1385 bfd_vma off;
1386
ce558b89
AM
1387 sgot = elf_hash_table (info)->sgot;
1388 BFD_ASSERT (sgot != NULL);
90ace9e9 1389
90ace9e9 1390 off = h->got.offset;
eea6121a 1391 BFD_ASSERT (off < sgot->size);
90ace9e9 1392
125b5bac 1393 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
90ace9e9
JT
1394
1395 relocation = sgot->output_offset + off;
b29635ba 1396 /* The GOT relocation uses the addend. */
90ace9e9
JT
1397 rel->r_addend = 0;
1398
b29635ba
JT
1399 /* Change the reference to be indirect. */
1400 contents[rel->r_offset - 1] |= 0x10;
1401 relocation += sgot->output_section->vma;
90ace9e9
JT
1402 }
1403 break;
1404
04981bc1
MR
1405 case R_VAX_PC32:
1406 /* If we are creating an executable and the function this
1407 reloc refers to is in a shared lib, then we made a PLT
1408 entry for this symbol and need to handle the reloc like
1409 a PLT reloc. */
0e1862bb 1410 if (bfd_link_pic (info))
04981bc1
MR
1411 goto r_vax_pc32_shared;
1412 /* Fall through. */
90ace9e9
JT
1413 case R_VAX_PLT32:
1414 /* Relocation is to the entry for this symbol in the
1415 procedure linkage table. */
1416
1417 /* Resolve a PLTxx reloc against a local symbol directly,
1418 without using the procedure linkage table. */
7b6021f1 1419 if (h == NULL
125b5bac 1420 || h->plt.offset == (bfd_vma) -1)
90ace9e9
JT
1421 break;
1422
ce558b89
AM
1423 splt = elf_hash_table (info)->splt;
1424 BFD_ASSERT (splt != NULL);
90ace9e9 1425
ce558b89
AM
1426 sgotplt = elf_hash_table (info)->sgotplt;
1427 BFD_ASSERT (sgotplt != NULL);
90ace9e9
JT
1428
1429 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1430
1431 /* Get the offset into the .got table of the entry that
1432 corresponds to this function. Each .got entry is 4 bytes.
1433 The first two are reserved. */
1434 got_offset = (plt_index + 3) * 4;
1435
9e86195c 1436 /* We want the relocation to point into the .got.plt instead
cedb70c5 1437 of the plt itself. */
90ace9e9
JT
1438 relocation = (sgotplt->output_section->vma
1439 + sgotplt->output_offset
1440 + got_offset);
1441 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1442 if (rel->r_addend == 2)
1443 {
1444 h->plt.offset |= 1;
1445 }
1446 else if (rel->r_addend != 0)
4eca0228 1447 _bfd_error_handler
695344c0 1448 /* xgettext:c-format */
d42c267e 1449 (_("%B: warning: PLT addend of %Ld to `%s'"
dae82561
AM
1450 " from %A section ignored"),
1451 input_bfd, rel->r_addend, h->root.root.string, input_section);
90ace9e9
JT
1452 rel->r_addend = 0;
1453
1454 break;
1455
1456 case R_VAX_PC8:
1457 case R_VAX_PC16:
04981bc1 1458 r_vax_pc32_shared:
7b6021f1
MR
1459 if (h == NULL
1460 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1461 || h->forced_local)
90ace9e9
JT
1462 break;
1463 /* Fall through. */
1464 case R_VAX_8:
1465 case R_VAX_16:
1466 case R_VAX_32:
0e1862bb 1467 if (bfd_link_pic (info)
cf35638d 1468 && r_symndx != STN_UNDEF
90ace9e9
JT
1469 && (input_section->flags & SEC_ALLOC) != 0
1470 && ((r_type != R_VAX_PC8
1471 && r_type != R_VAX_PC16
1472 && r_type != R_VAX_PC32)
da6bcfca
MT
1473 || ((input_section->flags & SEC_CODE)
1474 && (!info->symbolic
1475 || (!h->def_regular && h->type != STT_SECTION)))))
90ace9e9
JT
1476 {
1477 Elf_Internal_Rela outrel;
947216bf 1478 bfd_byte *loc;
b34976b6 1479 bfd_boolean skip, relocate;
90ace9e9
JT
1480
1481 /* When generating a shared object, these relocations
1482 are copied into the output file to be resolved at run
1483 time. */
90ace9e9
JT
1484 if (sreloc == NULL)
1485 {
83bac4b0
NC
1486 sreloc = _bfd_elf_get_dynamic_reloc_section
1487 (input_bfd, input_section, /*rela?*/ TRUE);
1488 if (sreloc == NULL)
b34976b6 1489 return FALSE;
90ace9e9
JT
1490 }
1491
b34976b6
AM
1492 skip = FALSE;
1493 relocate = FALSE;
90ace9e9
JT
1494
1495 outrel.r_offset =
1496 _bfd_elf_section_offset (output_bfd, info, input_section,
1497 rel->r_offset);
1498 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1499 skip = TRUE;
90ace9e9 1500 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1501 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1502 outrel.r_offset += (input_section->output_section->vma
1503 + input_section->output_offset);
1504
1505 if (skip)
1506 memset (&outrel, 0, sizeof outrel);
1507 /* h->dynindx may be -1 if the symbol was marked to
1508 become local. */
1509 else if (h != NULL
1510 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1511 || !h->def_regular))
90ace9e9
JT
1512 {
1513 BFD_ASSERT (h->dynindx != -1);
1514 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1515 outrel.r_addend = relocation + rel->r_addend;
1516 }
1517 else
1518 {
1519 if (r_type == R_VAX_32)
1520 {
b34976b6 1521 relocate = TRUE;
90ace9e9
JT
1522 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1523 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1524 &contents[rel->r_offset]) == 0);
1525 outrel.r_addend = relocation + rel->r_addend;
1526 }
1527 else
1528 {
1529 long indx;
1530
8517fae7 1531 if (bfd_is_abs_section (sec))
90ace9e9
JT
1532 indx = 0;
1533 else if (sec == NULL || sec->owner == NULL)
1534 {
1535 bfd_set_error (bfd_error_bad_value);
b34976b6 1536 return FALSE;
90ace9e9
JT
1537 }
1538 else
1539 {
1540 asection *osec;
1541
74541ad4
AM
1542 /* We are turning this relocation into one
1543 against a section symbol. It would be
1544 proper to subtract the symbol's value,
1545 osec->vma, from the emitted reloc addend,
1546 but ld.so expects buggy relocs. */
90ace9e9
JT
1547 osec = sec->output_section;
1548 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
1549 if (indx == 0)
1550 {
1551 struct elf_link_hash_table *htab;
1552 htab = elf_hash_table (info);
1553 osec = htab->text_index_section;
1554 indx = elf_section_data (osec)->dynindx;
1555 }
1556 BFD_ASSERT (indx != 0);
90ace9e9
JT
1557 }
1558
1559 outrel.r_info = ELF32_R_INFO (indx, r_type);
1560 outrel.r_addend = relocation + rel->r_addend;
1561 }
1562 }
1563
ddd74d3c 1564 if ((input_section->flags & SEC_CODE) != 0
751c1fe7 1565 || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
ddd74d3c
MR
1566 && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1567 && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1568 && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1569 && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
90ace9e9
JT
1570 {
1571 if (h != NULL)
4eca0228 1572 _bfd_error_handler
695344c0 1573 /* xgettext:c-format */
dae82561
AM
1574 (_("%B: warning: %s relocation against symbol `%s'"
1575 " from %A section"),
1576 input_bfd, howto->name, h->root.root.string,
1577 input_section);
90ace9e9 1578 else
4eca0228 1579 _bfd_error_handler
695344c0 1580 /* xgettext:c-format */
d42c267e 1581 (_("%B: warning: %s relocation to %#Lx from %A section"),
dae82561
AM
1582 input_bfd, howto->name, outrel.r_addend,
1583 input_section);
90ace9e9 1584 }
947216bf
AM
1585 loc = sreloc->contents;
1586 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1587 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1588
1589 /* This reloc will be computed at runtime, so there's no
1590 need to do anything now, except for R_VAX_32
1591 relocations that have been turned into
1592 R_VAX_RELATIVE. */
1593 if (!relocate)
1594 continue;
1595 }
1596
1597 break;
1598
1599 case R_VAX_GNU_VTINHERIT:
1600 case R_VAX_GNU_VTENTRY:
1601 /* These are no-ops in the end. */
1602 continue;
1603
1604 default:
1605 break;
1606 }
1607
b34976b6 1608 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1609 So subtract the difference from the relocation amount since we can't
1610 add it to the offset. */
90ace9e9 1611 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1612 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1613
1614 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1615 contents, rel->r_offset,
1616 relocation, rel->r_addend);
1617
1618 if (r != bfd_reloc_ok)
1619 {
1620 switch (r)
1621 {
1622 default:
1623 case bfd_reloc_outofrange:
1624 abort ();
1625 case bfd_reloc_overflow:
1626 {
1627 const char *name;
1628
1629 if (h != NULL)
dfeffb9f 1630 name = NULL;
90ace9e9
JT
1631 else
1632 {
1633 name = bfd_elf_string_from_elf_section (input_bfd,
1634 symtab_hdr->sh_link,
1635 sym->st_name);
1636 if (name == NULL)
b34976b6 1637 return FALSE;
90ace9e9
JT
1638 if (*name == '\0')
1639 name = bfd_section_name (input_bfd, sec);
1640 }
1a72702b
AM
1641 info->callbacks->reloc_overflow
1642 (info, (h ? &h->root : NULL), name, howto->name,
1643 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
90ace9e9
JT
1644 }
1645 break;
1646 }
1647 }
1648 }
1649
b34976b6 1650 return TRUE;
90ace9e9
JT
1651}
1652
1653/* Finish up dynamic symbol handling. We set the contents of various
1654 dynamic sections here. */
1655
b34976b6 1656static bfd_boolean
ce71b576
NC
1657elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1658 struct elf_link_hash_entry *h,
1659 Elf_Internal_Sym *sym)
90ace9e9
JT
1660{
1661 bfd *dynobj;
1662
1663 dynobj = elf_hash_table (info)->dynobj;
1664
1665 if (h->plt.offset != (bfd_vma) -1)
1666 {
1667 asection *splt;
1668 asection *sgot;
1669 asection *srela;
1670 bfd_vma plt_index;
1671 bfd_vma got_offset;
1672 bfd_vma addend;
1673 Elf_Internal_Rela rela;
947216bf 1674 bfd_byte *loc;
90ace9e9
JT
1675
1676 /* This symbol has an entry in the procedure linkage table. Set
1677 it up. */
90ace9e9
JT
1678 BFD_ASSERT (h->dynindx != -1);
1679
ce558b89
AM
1680 splt = elf_hash_table (info)->splt;
1681 sgot = elf_hash_table (info)->sgotplt;
1682 srela = elf_hash_table (info)->srelplt;
90ace9e9
JT
1683 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1684
1685 addend = 2 * (h->plt.offset & 1);
1686 h->plt.offset &= ~1;
1687
1688 /* Get the index in the procedure linkage table which
1689 corresponds to this symbol. This is the index of this symbol
1690 in all the symbols for which we are making plt entries. The
1691 first entry in the procedure linkage table is reserved. */
1692 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1693
1694 /* Get the offset into the .got table of the entry that
1695 corresponds to this function. Each .got entry is 4 bytes.
1696 The first two are reserved. */
1697 got_offset = (plt_index + 3) * 4;
1698
1699 /* Fill in the entry in the procedure linkage table. */
1700 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1701 PLT_ENTRY_SIZE);
1702
1703 /* The offset is relative to the first extension word. */
1704 bfd_put_32 (output_bfd,
1705 -(h->plt.offset + 8),
1706 splt->contents + h->plt.offset + 4);
1707
1708 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1709 splt->contents + h->plt.offset + 8);
1710
1711 /* Fill in the entry in the global offset table. */
1712 bfd_put_32 (output_bfd,
1713 (splt->output_section->vma
1714 + splt->output_offset
1715 + h->plt.offset) + addend,
1716 sgot->contents + got_offset);
1717
1718 /* Fill in the entry in the .rela.plt section. */
1719 rela.r_offset = (sgot->output_section->vma
1720 + sgot->output_offset
1721 + got_offset);
1722 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1723 rela.r_addend = addend;
947216bf
AM
1724 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1725 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1726
f5385ebf 1727 if (!h->def_regular)
90ace9e9
JT
1728 {
1729 /* Mark the symbol as undefined, rather than as defined in
1730 the .plt section. Leave the value alone. */
1731 sym->st_shndx = SHN_UNDEF;
1732 }
1733 }
1734
1735 if (h->got.offset != (bfd_vma) -1)
1736 {
1737 asection *sgot;
1738 asection *srela;
1739 Elf_Internal_Rela rela;
947216bf 1740 bfd_byte *loc;
90ace9e9
JT
1741
1742 /* This symbol has an entry in the global offset table. Set it
1743 up. */
ce558b89
AM
1744 sgot = elf_hash_table (info)->sgot;
1745 srela = elf_hash_table (info)->srelgot;
90ace9e9
JT
1746 BFD_ASSERT (sgot != NULL && srela != NULL);
1747
1748 rela.r_offset = (sgot->output_section->vma
1749 + sgot->output_offset
125b5bac
MR
1750 + h->got.offset);
1751 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
90ace9e9 1752 rela.r_addend = bfd_get_signed_32 (output_bfd,
125b5bac 1753 sgot->contents + h->got.offset);
90ace9e9 1754
947216bf
AM
1755 loc = srela->contents;
1756 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1757 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1758 }
1759
f5385ebf 1760 if (h->needs_copy)
90ace9e9
JT
1761 {
1762 asection *s;
1763 Elf_Internal_Rela rela;
947216bf 1764 bfd_byte *loc;
90ace9e9
JT
1765
1766 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1767 BFD_ASSERT (h->dynindx != -1
1768 && (h->root.type == bfd_link_hash_defined
1769 || h->root.type == bfd_link_hash_defweak));
1770
3d4d4302 1771 s = bfd_get_linker_section (dynobj, ".rela.bss");
90ace9e9
JT
1772 BFD_ASSERT (s != NULL);
1773
1774 rela.r_offset = (h->root.u.def.value
1775 + h->root.u.def.section->output_section->vma
1776 + h->root.u.def.section->output_offset);
1777 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1778 rela.r_addend = 0;
947216bf
AM
1779 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1780 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1781 }
1782
1783 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 1784 if (h == elf_hash_table (info)->hdynamic
22edb2f1 1785 || h == elf_hash_table (info)->hgot)
90ace9e9
JT
1786 sym->st_shndx = SHN_ABS;
1787
b34976b6 1788 return TRUE;
90ace9e9
JT
1789}
1790
1791/* Finish up the dynamic sections. */
1792
b34976b6 1793static bfd_boolean
ce71b576 1794elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
90ace9e9
JT
1795{
1796 bfd *dynobj;
1797 asection *sgot;
1798 asection *sdyn;
1799
1800 dynobj = elf_hash_table (info)->dynobj;
1801
ce558b89 1802 sgot = elf_hash_table (info)->sgotplt;
90ace9e9 1803 BFD_ASSERT (sgot != NULL);
3d4d4302 1804 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
90ace9e9
JT
1805
1806 if (elf_hash_table (info)->dynamic_sections_created)
1807 {
1808 asection *splt;
1809 Elf32_External_Dyn *dyncon, *dynconend;
1810
ce558b89 1811 splt = elf_hash_table (info)->splt;
90ace9e9
JT
1812 BFD_ASSERT (splt != NULL && sdyn != NULL);
1813
1814 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 1815 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
1816 for (; dyncon < dynconend; dyncon++)
1817 {
1818 Elf_Internal_Dyn dyn;
90ace9e9
JT
1819 asection *s;
1820
1821 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1822
1823 switch (dyn.d_tag)
1824 {
1825 default:
1826 break;
1827
1828 case DT_PLTGOT:
ce558b89 1829 s = elf_hash_table (info)->sgotplt;
90ace9e9
JT
1830 goto get_vma;
1831 case DT_JMPREL:
ce558b89 1832 s = elf_hash_table (info)->srelplt;
90ace9e9 1833 get_vma:
4ade44b7 1834 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
90ace9e9
JT
1835 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1836 break;
1837
1838 case DT_PLTRELSZ:
ce558b89 1839 s = elf_hash_table (info)->srelplt;
eea6121a 1840 dyn.d_un.d_val = s->size;
90ace9e9
JT
1841 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1842 break;
90ace9e9
JT
1843 }
1844 }
1845
1846 /* Fill in the first entry in the procedure linkage table. */
eea6121a 1847 if (splt->size > 0)
90ace9e9
JT
1848 {
1849 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1850 bfd_put_32 (output_bfd,
1851 (sgot->output_section->vma
1852 + sgot->output_offset + 4
1853 - (splt->output_section->vma + 6)),
1854 splt->contents + 2);
1855 bfd_put_32 (output_bfd,
1856 (sgot->output_section->vma
1857 + sgot->output_offset + 8
1858 - (splt->output_section->vma + 12)),
1859 splt->contents + 8);
cedb70c5 1860 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
1861 = PLT_ENTRY_SIZE;
1862 }
1863 }
1864
1865 /* Fill in the first three entries in the global offset table. */
eea6121a 1866 if (sgot->size > 0)
90ace9e9
JT
1867 {
1868 if (sdyn == NULL)
1869 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1870 else
1871 bfd_put_32 (output_bfd,
1872 sdyn->output_section->vma + sdyn->output_offset,
1873 sgot->contents);
1874 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1875 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1876 }
1877
f6518c48
MR
1878 if (elf_section_data (sgot->output_section) != NULL)
1879 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
90ace9e9 1880
b34976b6 1881 return TRUE;
90ace9e9
JT
1882}
1883
9b90d8fd 1884static enum elf_reloc_type_class
7e612e98
AM
1885elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1886 const asection *rel_sec ATTRIBUTE_UNUSED,
1887 const Elf_Internal_Rela *rela)
9b90d8fd
MR
1888{
1889 switch ((int) ELF32_R_TYPE (rela->r_info))
1890 {
1891 case R_VAX_RELATIVE:
1892 return reloc_class_relative;
1893 case R_VAX_JMP_SLOT:
1894 return reloc_class_plt;
1895 case R_VAX_COPY:
1896 return reloc_class_copy;
1897 default:
1898 return reloc_class_normal;
1899 }
1900}
1901
6db7e006
MR
1902static bfd_vma
1903elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1904 const arelent *rel ATTRIBUTE_UNUSED)
1905{
1906 return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1907}
1908
6d00b590 1909#define TARGET_LITTLE_SYM vax_elf32_vec
90ace9e9
JT
1910#define TARGET_LITTLE_NAME "elf32-vax"
1911#define ELF_MACHINE_CODE EM_VAX
1912#define ELF_MAXPAGESIZE 0x1000
1913
1914#define elf_backend_create_dynamic_sections \
1915 _bfd_elf_create_dynamic_sections
1916#define bfd_elf32_bfd_link_hash_table_create \
1917 elf_vax_link_hash_table_create
c152c796 1918#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
1919
1920#define elf_backend_check_relocs elf_vax_check_relocs
1921#define elf_backend_adjust_dynamic_symbol \
1922 elf_vax_adjust_dynamic_symbol
fac3d241
MR
1923#define elf_backend_always_size_sections \
1924 elf_vax_always_size_sections
90ace9e9
JT
1925#define elf_backend_size_dynamic_sections \
1926 elf_vax_size_dynamic_sections
74541ad4 1927#define elf_backend_init_index_section _bfd_elf_init_1_index_section
90ace9e9
JT
1928#define elf_backend_relocate_section elf_vax_relocate_section
1929#define elf_backend_finish_dynamic_symbol \
1930 elf_vax_finish_dynamic_symbol
1931#define elf_backend_finish_dynamic_sections \
1932 elf_vax_finish_dynamic_sections
9b90d8fd 1933#define elf_backend_reloc_type_class elf_vax_reloc_type_class
90ace9e9 1934#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
6db7e006 1935#define elf_backend_plt_sym_val elf_vax_plt_sym_val
90ace9e9
JT
1936#define bfd_elf32_bfd_merge_private_bfd_data \
1937 elf32_vax_merge_private_bfd_data
1938#define bfd_elf32_bfd_set_private_flags \
1939 elf32_vax_set_private_flags
1940#define bfd_elf32_bfd_print_private_bfd_data \
1941 elf32_vax_print_private_bfd_data
1942
1943#define elf_backend_can_gc_sections 1
1944#define elf_backend_want_got_plt 1
1945#define elf_backend_plt_readonly 1
1946#define elf_backend_want_plt_sym 0
1947#define elf_backend_got_header_size 16
f0fe0e16 1948#define elf_backend_rela_normal 1
64f52338 1949#define elf_backend_dtrel_excludes_plt 1
90ace9e9
JT
1950
1951#include "elf32-target.h"
This page took 1.034154 seconds and 4 git commands to generate.