bfd/
[deliverable/binutils-gdb.git] / bfd / elf32-vax.c
CommitLineData
90ace9e9 1/* VAX series support for 32-bit ELF
b2a8e766 2 Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3eb128b2 3 2004, 2005 Free Software Foundation, Inc.
90ace9e9
JT
4 Contributed by Matt Thomas <matt@3am-software.com>.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
90ace9e9 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
90ace9e9 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
90ace9e9 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
53e09e0a 20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02110-1301, USA. */
90ace9e9
JT
21
22#include "bfd.h"
23#include "sysdep.h"
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
27#include "elf/vax.h"
28
29static reloc_howto_type *reloc_type_lookup
30 PARAMS ((bfd *, bfd_reloc_code_real_type));
31static void rtype_to_howto
947216bf 32 PARAMS ((bfd *, arelent *, Elf_Internal_Rela *));
90ace9e9
JT
33static struct bfd_hash_entry *elf_vax_link_hash_newfunc
34 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
35static struct bfd_link_hash_table *elf_vax_link_hash_table_create
36 PARAMS ((bfd *));
b34976b6 37static bfd_boolean elf_vax_check_relocs
90ace9e9
JT
38 PARAMS ((bfd *, struct bfd_link_info *, asection *,
39 const Elf_Internal_Rela *));
40static asection *elf_vax_gc_mark_hook
1e2f5b6e 41 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
90ace9e9 42 struct elf_link_hash_entry *, Elf_Internal_Sym *));
b34976b6 43static bfd_boolean elf_vax_gc_sweep_hook
90ace9e9
JT
44 PARAMS ((bfd *, struct bfd_link_info *, asection *,
45 const Elf_Internal_Rela *));
b34976b6 46static bfd_boolean elf_vax_adjust_dynamic_symbol
90ace9e9 47 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
b34976b6 48static bfd_boolean elf_vax_size_dynamic_sections
90ace9e9 49 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 50static bfd_boolean elf_vax_relocate_section
90ace9e9
JT
51 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
52 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
b34976b6 53static bfd_boolean elf_vax_finish_dynamic_symbol
90ace9e9
JT
54 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
55 Elf_Internal_Sym *));
b34976b6 56static bfd_boolean elf_vax_finish_dynamic_sections
90ace9e9
JT
57 PARAMS ((bfd *, struct bfd_link_info *));
58
b34976b6 59static bfd_boolean elf32_vax_set_private_flags
90ace9e9 60 PARAMS ((bfd *, flagword));
b34976b6 61static bfd_boolean elf32_vax_merge_private_bfd_data
90ace9e9 62 PARAMS ((bfd *, bfd *));
b34976b6 63static bfd_boolean elf32_vax_print_private_bfd_data
90ace9e9
JT
64 PARAMS ((bfd *, PTR));
65
66static reloc_howto_type howto_table[] = {
67 HOWTO (R_VAX_NONE, /* type */
68 0, /* rightshift */
69 0, /* size (0 = byte, 1 = short, 2 = long) */
70 0, /* bitsize */
b34976b6 71 FALSE, /* pc_relative */
90ace9e9
JT
72 0, /* bitpos */
73 complain_overflow_dont, /* complain_on_overflow */
74 bfd_elf_generic_reloc, /* special_function */
75 "R_VAX_NONE", /* name */
b34976b6 76 FALSE, /* partial_inplace */
90ace9e9
JT
77 0, /* src_mask */
78 0x00000000, /* dst_mask */
b34976b6 79 FALSE), /* pcrel_offset */
90ace9e9
JT
80
81 HOWTO (R_VAX_32, /* type */
82 0, /* rightshift */
83 2, /* size (0 = byte, 1 = short, 2 = long) */
84 32, /* bitsize */
b34976b6 85 FALSE, /* pc_relative */
90ace9e9
JT
86 0, /* bitpos */
87 complain_overflow_bitfield, /* complain_on_overflow */
88 bfd_elf_generic_reloc, /* special_function */
89 "R_VAX_32", /* name */
b34976b6 90 FALSE, /* partial_inplace */
90ace9e9
JT
91 0, /* src_mask */
92 0xffffffff, /* dst_mask */
b34976b6 93 FALSE), /* pcrel_offset */
90ace9e9
JT
94
95 HOWTO (R_VAX_16, /* type */
96 0, /* rightshift */
97 1, /* size (0 = byte, 1 = short, 2 = long) */
98 16, /* bitsize */
b34976b6 99 FALSE, /* pc_relative */
90ace9e9
JT
100 0, /* bitpos */
101 complain_overflow_bitfield, /* complain_on_overflow */
102 bfd_elf_generic_reloc, /* special_function */
103 "R_VAX_16", /* name */
b34976b6 104 FALSE, /* partial_inplace */
90ace9e9
JT
105 0, /* src_mask */
106 0x0000ffff, /* dst_mask */
b34976b6 107 FALSE), /* pcrel_offset */
90ace9e9
JT
108
109 HOWTO (R_VAX_8, /* type */
110 0, /* rightshift */
111 0, /* size (0 = byte, 1 = short, 2 = long) */
112 8, /* bitsize */
b34976b6 113 FALSE, /* pc_relative */
90ace9e9
JT
114 0, /* bitpos */
115 complain_overflow_bitfield, /* complain_on_overflow */
116 bfd_elf_generic_reloc, /* special_function */
117 "R_VAX_8", /* name */
b34976b6 118 FALSE, /* partial_inplace */
90ace9e9
JT
119 0, /* src_mask */
120 0x000000ff, /* dst_mask */
b34976b6 121 FALSE), /* pcrel_offset */
90ace9e9
JT
122
123 HOWTO (R_VAX_PC32, /* type */
124 0, /* rightshift */
125 2, /* size (0 = byte, 1 = short, 2 = long) */
126 32, /* bitsize */
b34976b6 127 TRUE, /* pc_relative */
90ace9e9
JT
128 0, /* bitpos */
129 complain_overflow_bitfield, /* complain_on_overflow */
130 bfd_elf_generic_reloc, /* special_function */
131 "R_VAX_PC32", /* name */
b34976b6 132 FALSE, /* partial_inplace */
90ace9e9
JT
133 0, /* src_mask */
134 0xffffffff, /* dst_mask */
b34976b6 135 TRUE), /* pcrel_offset */
90ace9e9
JT
136
137 HOWTO (R_VAX_PC16, /* type */
138 0, /* rightshift */
139 1, /* size (0 = byte, 1 = short, 2 = long) */
140 16, /* bitsize */
b34976b6 141 TRUE, /* pc_relative */
90ace9e9
JT
142 0, /* bitpos */
143 complain_overflow_signed, /* complain_on_overflow */
144 bfd_elf_generic_reloc, /* special_function */
145 "R_VAX_PC16", /* name */
b34976b6 146 FALSE, /* partial_inplace */
90ace9e9
JT
147 0, /* src_mask */
148 0x0000ffff, /* dst_mask */
b34976b6 149 TRUE), /* pcrel_offset */
90ace9e9
JT
150
151 HOWTO (R_VAX_PC8, /* type */
152 0, /* rightshift */
153 0, /* size (0 = byte, 1 = short, 2 = long) */
154 8, /* bitsize */
b34976b6 155 TRUE, /* pc_relative */
90ace9e9
JT
156 0, /* bitpos */
157 complain_overflow_signed, /* complain_on_overflow */
158 bfd_elf_generic_reloc, /* special_function */
159 "R_VAX_PC8", /* name */
b34976b6 160 FALSE, /* partial_inplace */
90ace9e9
JT
161 0, /* src_mask */
162 0x000000ff, /* dst_mask */
b34976b6 163 TRUE), /* pcrel_offset */
90ace9e9
JT
164
165 HOWTO (R_VAX_GOT32, /* type */
166 0, /* rightshift */
167 2, /* size (0 = byte, 1 = short, 2 = long) */
168 32, /* bitsize */
b34976b6 169 TRUE, /* pc_relative */
90ace9e9
JT
170 0, /* bitpos */
171 complain_overflow_bitfield, /* complain_on_overflow */
172 bfd_elf_generic_reloc, /* special_function */
173 "R_VAX_GOT32", /* name */
b34976b6 174 FALSE, /* partial_inplace */
90ace9e9
JT
175 0, /* src_mask */
176 0xffffffff, /* dst_mask */
b34976b6 177 TRUE), /* pcrel_offset */
90ace9e9
JT
178
179 EMPTY_HOWTO (-1),
180 EMPTY_HOWTO (-1),
181 EMPTY_HOWTO (-1),
182 EMPTY_HOWTO (-1),
183 EMPTY_HOWTO (-1),
184
185 HOWTO (R_VAX_PLT32, /* type */
186 0, /* rightshift */
187 2, /* size (0 = byte, 1 = short, 2 = long) */
188 32, /* bitsize */
b34976b6 189 TRUE, /* pc_relative */
90ace9e9
JT
190 0, /* bitpos */
191 complain_overflow_bitfield, /* complain_on_overflow */
192 bfd_elf_generic_reloc, /* special_function */
193 "R_VAX_PLT32", /* name */
b34976b6 194 FALSE, /* partial_inplace */
90ace9e9
JT
195 0, /* src_mask */
196 0xffffffff, /* dst_mask */
b34976b6 197 TRUE), /* pcrel_offset */
90ace9e9
JT
198
199 EMPTY_HOWTO (-1),
200 EMPTY_HOWTO (-1),
201 EMPTY_HOWTO (-1),
202 EMPTY_HOWTO (-1),
203 EMPTY_HOWTO (-1),
204
205 HOWTO (R_VAX_COPY, /* type */
206 0, /* rightshift */
207 0, /* size (0 = byte, 1 = short, 2 = long) */
208 0, /* bitsize */
b34976b6 209 FALSE, /* pc_relative */
90ace9e9
JT
210 0, /* bitpos */
211 complain_overflow_dont, /* complain_on_overflow */
212 bfd_elf_generic_reloc, /* special_function */
213 "R_VAX_COPY", /* name */
b34976b6 214 FALSE, /* partial_inplace */
90ace9e9
JT
215 0, /* src_mask */
216 0xffffffff, /* dst_mask */
b34976b6 217 FALSE), /* pcrel_offset */
90ace9e9
JT
218
219 HOWTO (R_VAX_GLOB_DAT, /* type */
220 0, /* rightshift */
221 2, /* size (0 = byte, 1 = short, 2 = long) */
222 32, /* bitsize */
b34976b6 223 FALSE, /* pc_relative */
90ace9e9
JT
224 0, /* bitpos */
225 complain_overflow_dont, /* complain_on_overflow */
226 bfd_elf_generic_reloc, /* special_function */
227 "R_VAX_GLOB_DAT", /* name */
b34976b6 228 FALSE, /* partial_inplace */
90ace9e9
JT
229 0, /* src_mask */
230 0xffffffff, /* dst_mask */
b34976b6 231 FALSE), /* pcrel_offset */
90ace9e9
JT
232
233 HOWTO (R_VAX_JMP_SLOT, /* type */
234 0, /* rightshift */
235 2, /* size (0 = byte, 1 = short, 2 = long) */
236 32, /* bitsize */
b34976b6 237 FALSE, /* pc_relative */
90ace9e9
JT
238 0, /* bitpos */
239 complain_overflow_dont, /* complain_on_overflow */
240 bfd_elf_generic_reloc, /* special_function */
241 "R_VAX_JMP_SLOT", /* name */
b34976b6 242 FALSE, /* partial_inplace */
90ace9e9
JT
243 0, /* src_mask */
244 0xffffffff, /* dst_mask */
b34976b6 245 FALSE), /* pcrel_offset */
90ace9e9
JT
246
247 HOWTO (R_VAX_RELATIVE, /* type */
248 0, /* rightshift */
249 2, /* size (0 = byte, 1 = short, 2 = long) */
250 32, /* bitsize */
b34976b6 251 FALSE, /* pc_relative */
90ace9e9
JT
252 0, /* bitpos */
253 complain_overflow_dont, /* complain_on_overflow */
254 bfd_elf_generic_reloc, /* special_function */
255 "R_VAX_RELATIVE", /* name */
b34976b6 256 FALSE, /* partial_inplace */
90ace9e9
JT
257 0, /* src_mask */
258 0xffffffff, /* dst_mask */
b34976b6 259 FALSE), /* pcrel_offset */
90ace9e9
JT
260
261 /* GNU extension to record C++ vtable hierarchy */
262 HOWTO (R_VAX_GNU_VTINHERIT, /* type */
263 0, /* rightshift */
264 2, /* size (0 = byte, 1 = short, 2 = long) */
265 0, /* bitsize */
b34976b6 266 FALSE, /* pc_relative */
90ace9e9
JT
267 0, /* bitpos */
268 complain_overflow_dont, /* complain_on_overflow */
269 NULL, /* special_function */
270 "R_VAX_GNU_VTINHERIT", /* name */
b34976b6 271 FALSE, /* partial_inplace */
90ace9e9
JT
272 0, /* src_mask */
273 0, /* dst_mask */
b34976b6 274 FALSE), /* pcrel_offset */
90ace9e9
JT
275
276 /* GNU extension to record C++ vtable member usage */
277 HOWTO (R_VAX_GNU_VTENTRY, /* type */
278 0, /* rightshift */
279 2, /* size (0 = byte, 1 = short, 2 = long) */
280 0, /* bitsize */
b34976b6 281 FALSE, /* pc_relative */
90ace9e9
JT
282 0, /* bitpos */
283 complain_overflow_dont, /* complain_on_overflow */
284 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
285 "R_VAX_GNU_VTENTRY", /* name */
b34976b6 286 FALSE, /* partial_inplace */
90ace9e9
JT
287 0, /* src_mask */
288 0, /* dst_mask */
b34976b6 289 FALSE), /* pcrel_offset */
90ace9e9
JT
290};
291
292static void
293rtype_to_howto (abfd, cache_ptr, dst)
294 bfd *abfd ATTRIBUTE_UNUSED;
295 arelent *cache_ptr;
296 Elf_Internal_Rela *dst;
297{
298 BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
299 cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
300}
301
302#define elf_info_to_howto rtype_to_howto
303
304static const struct
305{
306 bfd_reloc_code_real_type bfd_val;
307 int elf_val;
308} reloc_map[] = {
309 { BFD_RELOC_NONE, R_VAX_NONE },
310 { BFD_RELOC_32, R_VAX_32 },
311 { BFD_RELOC_16, R_VAX_16 },
312 { BFD_RELOC_8, R_VAX_8 },
313 { BFD_RELOC_32_PCREL, R_VAX_PC32 },
314 { BFD_RELOC_16_PCREL, R_VAX_PC16 },
315 { BFD_RELOC_8_PCREL, R_VAX_PC8 },
316 { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
317 { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
318 { BFD_RELOC_NONE, R_VAX_COPY },
319 { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
320 { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
321 { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
322 { BFD_RELOC_CTOR, R_VAX_32 },
323 { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
324 { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
325};
326
327static reloc_howto_type *
328reloc_type_lookup (abfd, code)
329 bfd *abfd ATTRIBUTE_UNUSED;
330 bfd_reloc_code_real_type code;
331{
332 unsigned int i;
333 for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
334 {
335 if (reloc_map[i].bfd_val == code)
336 return &howto_table[reloc_map[i].elf_val];
337 }
338 return 0;
339}
340
341#define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
342#define ELF_ARCH bfd_arch_vax
343/* end code generated by elf.el */
90ace9e9
JT
344\f
345/* Functions for the VAX ELF linker. */
346
347/* The name of the dynamic interpreter. This is put in the .interp
348 section. */
349
350#define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
351
352/* The size in bytes of an entry in the procedure linkage table. */
353
354#define PLT_ENTRY_SIZE 12
355
356/* The first entry in a procedure linkage table looks like this. See
357 the SVR4 ABI VAX supplement to see how this works. */
358
359static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
360{
361 0xdd, 0xef, /* pushl l^ */
362 0, 0, 0, 0, /* offset to .plt.got + 4 */
363 0x17, 0xff, /* jmp @L^(pc) */
364 0, 0, 0, 0, /* offset to .plt.got + 8 */
365};
366
367/* Subsequent entries in a procedure linkage table look like this. */
368
369static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
370{
371 0x40, 0x00, /* .word ^M<r6> */
372 0x16, 0xef, /* jsb L^(pc) */
373 0, 0, 0, 0, /* replaced with offset to start of .plt */
374 0, 0, 0, 0, /* index into .rela.plt */
375};
376
377/* The VAX linker needs to keep track of the number of relocs that it
378 decides to copy in check_relocs for each symbol. This is so that it
379 can discard PC relative relocs if it doesn't need them when linking
380 with -Bsymbolic. We store the information in a field extending the
381 regular ELF linker hash table. */
382
383/* This structure keeps track of the number of PC relative relocs we have
384 copied for a given symbol. */
385
386struct elf_vax_pcrel_relocs_copied
387{
388 /* Next section. */
389 struct elf_vax_pcrel_relocs_copied *next;
390 /* A section in dynobj. */
391 asection *section;
392 /* Number of relocs copied in this section. */
393 bfd_size_type count;
394};
395
396/* VAX ELF linker hash entry. */
397
398struct elf_vax_link_hash_entry
399{
400 struct elf_link_hash_entry root;
401
402 /* Number of PC relative relocs copied for this symbol. */
403 struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
404
405 bfd_vma got_addend;
406};
407
408/* VAX ELF linker hash table. */
409
410struct elf_vax_link_hash_table
411{
412 struct elf_link_hash_table root;
413};
414
415/* Declare this now that the above structures are defined. */
416
b34976b6 417static bfd_boolean elf_vax_discard_copies
90ace9e9
JT
418 PARAMS ((struct elf_vax_link_hash_entry *, PTR));
419
b29635ba
JT
420/* Declare this now that the above structures are defined. */
421
b34976b6 422static bfd_boolean elf_vax_instantiate_got_entries
b29635ba
JT
423 PARAMS ((struct elf_link_hash_entry *, PTR));
424
90ace9e9
JT
425/* Traverse an VAX ELF linker hash table. */
426
427#define elf_vax_link_hash_traverse(table, func, info) \
428 (elf_link_hash_traverse \
429 (&(table)->root, \
b34976b6 430 (bfd_boolean (*) PARAMS ((struct elf_link_hash_entry *, PTR))) (func), \
90ace9e9
JT
431 (info)))
432
433/* Get the VAX ELF linker hash table from a link_info structure. */
434
435#define elf_vax_hash_table(p) \
436 ((struct elf_vax_link_hash_table *) (p)->hash)
437
438/* Create an entry in an VAX ELF linker hash table. */
439
440static struct bfd_hash_entry *
441elf_vax_link_hash_newfunc (entry, table, string)
442 struct bfd_hash_entry *entry;
443 struct bfd_hash_table *table;
444 const char *string;
445{
446 struct elf_vax_link_hash_entry *ret =
447 (struct elf_vax_link_hash_entry *) entry;
448
449 /* Allocate the structure if it has not already been allocated by a
450 subclass. */
451 if (ret == (struct elf_vax_link_hash_entry *) NULL)
452 ret = ((struct elf_vax_link_hash_entry *)
453 bfd_hash_allocate (table,
454 sizeof (struct elf_vax_link_hash_entry)));
455 if (ret == (struct elf_vax_link_hash_entry *) NULL)
456 return (struct bfd_hash_entry *) ret;
457
458 /* Call the allocation method of the superclass. */
459 ret = ((struct elf_vax_link_hash_entry *)
460 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
461 table, string));
462 if (ret != (struct elf_vax_link_hash_entry *) NULL)
463 {
464 ret->pcrel_relocs_copied = NULL;
465 }
466
467 return (struct bfd_hash_entry *) ret;
468}
469
470/* Create an VAX ELF linker hash table. */
471
472static struct bfd_link_hash_table *
473elf_vax_link_hash_table_create (abfd)
474 bfd *abfd;
475{
476 struct elf_vax_link_hash_table *ret;
477 bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
478
479 ret = (struct elf_vax_link_hash_table *) bfd_malloc (amt);
480 if (ret == (struct elf_vax_link_hash_table *) NULL)
481 return NULL;
482
483 if (! _bfd_elf_link_hash_table_init (&ret->root, abfd,
484 elf_vax_link_hash_newfunc))
485 {
486 free (ret);
487 return NULL;
488 }
489
490 return &ret->root.root;
491}
492
493/* Keep vax-specific flags in the ELF header */
b34976b6 494static bfd_boolean
90ace9e9
JT
495elf32_vax_set_private_flags (abfd, flags)
496 bfd *abfd;
497 flagword flags;
498{
499 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
500 elf_flags_init (abfd) = TRUE;
501 return TRUE;
90ace9e9
JT
502}
503
504/* Merge backend specific data from an object file to the output
505 object file when linking. */
b34976b6 506static bfd_boolean
90ace9e9
JT
507elf32_vax_merge_private_bfd_data (ibfd, obfd)
508 bfd *ibfd;
509 bfd *obfd;
510{
511 flagword out_flags;
512 flagword in_flags;
513
514 if ( bfd_get_flavour (ibfd) != bfd_target_elf_flavour
515 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 516 return TRUE;
90ace9e9
JT
517
518 in_flags = elf_elfheader (ibfd)->e_flags;
519 out_flags = elf_elfheader (obfd)->e_flags;
520
521 if (!elf_flags_init (obfd))
522 {
b34976b6 523 elf_flags_init (obfd) = TRUE;
90ace9e9
JT
524 elf_elfheader (obfd)->e_flags = in_flags;
525 }
526
b34976b6 527 return TRUE;
90ace9e9
JT
528}
529
530/* Display the flags field */
b34976b6 531static bfd_boolean
90ace9e9
JT
532elf32_vax_print_private_bfd_data (abfd, ptr)
533 bfd *abfd;
534 PTR ptr;
535{
536 FILE *file = (FILE *) ptr;
537
538 BFD_ASSERT (abfd != NULL && ptr != NULL);
539
540 /* Print normal ELF private data. */
541 _bfd_elf_print_private_bfd_data (abfd, ptr);
542
543 /* Ignore init flag - it may not be set, despite the flags field containing valid data. */
544
545 /* xgettext:c-format */
546 fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
547
179d3252 548 if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
90ace9e9
JT
549 fprintf (file, _(" [nonpic]"));
550
179d3252 551 if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
90ace9e9
JT
552 fprintf (file, _(" [d-float]"));
553
179d3252 554 if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
90ace9e9
JT
555 fprintf (file, _(" [g-float]"));
556
557 fputc ('\n', file);
558
b34976b6 559 return TRUE;
90ace9e9
JT
560}
561/* Look through the relocs for a section during the first phase, and
562 allocate space in the global offset table or procedure linkage
563 table. */
564
b34976b6 565static bfd_boolean
90ace9e9
JT
566elf_vax_check_relocs (abfd, info, sec, relocs)
567 bfd *abfd;
568 struct bfd_link_info *info;
569 asection *sec;
570 const Elf_Internal_Rela *relocs;
571{
572 bfd *dynobj;
573 Elf_Internal_Shdr *symtab_hdr;
574 struct elf_link_hash_entry **sym_hashes;
90ace9e9
JT
575 const Elf_Internal_Rela *rel;
576 const Elf_Internal_Rela *rel_end;
577 asection *sgot;
578 asection *srelgot;
579 asection *sreloc;
580
1049f94e 581 if (info->relocatable)
b34976b6 582 return TRUE;
90ace9e9
JT
583
584 dynobj = elf_hash_table (info)->dynobj;
585 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
586 sym_hashes = elf_sym_hashes (abfd);
90ace9e9
JT
587
588 sgot = NULL;
589 srelgot = NULL;
590 sreloc = NULL;
591
592 rel_end = relocs + sec->reloc_count;
593 for (rel = relocs; rel < rel_end; rel++)
594 {
595 unsigned long r_symndx;
596 struct elf_link_hash_entry *h;
597
598 r_symndx = ELF32_R_SYM (rel->r_info);
599
600 if (r_symndx < symtab_hdr->sh_info)
601 h = NULL;
602 else
603 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
604
605 switch (ELF32_R_TYPE (rel->r_info))
606 {
607 case R_VAX_GOT32:
608 if (h != NULL
609 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
610 break;
611
612 /* This symbol requires a global offset table entry. */
613
614 if (dynobj == NULL)
615 {
616 /* Create the .got section. */
617 elf_hash_table (info)->dynobj = dynobj = abfd;
618 if (!_bfd_elf_create_got_section (dynobj, info))
b34976b6 619 return FALSE;
90ace9e9
JT
620 }
621
622 if (sgot == NULL)
623 {
624 sgot = bfd_get_section_by_name (dynobj, ".got");
625 BFD_ASSERT (sgot != NULL);
626 }
627
628 if (srelgot == NULL
629 && (h != NULL || info->shared))
630 {
631 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
632 if (srelgot == NULL)
633 {
634 srelgot = bfd_make_section (dynobj, ".rela.got");
635 if (srelgot == NULL
636 || !bfd_set_section_flags (dynobj, srelgot,
637 (SEC_ALLOC
638 | SEC_LOAD
639 | SEC_HAS_CONTENTS
640 | SEC_IN_MEMORY
641 | SEC_LINKER_CREATED
642 | SEC_READONLY))
643 || !bfd_set_section_alignment (dynobj, srelgot, 2))
b34976b6 644 return FALSE;
90ace9e9
JT
645 }
646 }
647
648 if (h != NULL)
649 {
650 struct elf_vax_link_hash_entry *eh;
651
652 eh = (struct elf_vax_link_hash_entry *) h;
653 if (h->got.refcount == -1)
654 {
655 h->got.refcount = 1;
656 eh->got_addend = rel->r_addend;
90ace9e9
JT
657 }
658 else
659 {
660 h->got.refcount++;
661 if (eh->got_addend != (bfd_vma) rel->r_addend)
662 (*_bfd_error_handler)
663 (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
664 bfd_get_filename (abfd), rel->r_addend,
665 h->root.root.string,
666 eh->got_addend);
cedb70c5 667
90ace9e9
JT
668 }
669 }
670 break;
671
672 case R_VAX_PLT32:
673 /* This symbol requires a procedure linkage table entry. We
674 actually build the entry in adjust_dynamic_symbol,
675 because this might be a case of linking PIC code which is
676 never referenced by a dynamic object, in which case we
677 don't need to generate a procedure linkage table entry
678 after all. */
679
680 /* If this is a local symbol, we resolve it directly without
681 creating a procedure linkage table entry. */
682 if (h == NULL)
683 continue;
684
f5385ebf 685 h->needs_plt = 1;
90ace9e9
JT
686 if (h->plt.refcount == -1)
687 h->plt.refcount = 1;
688 else
689 h->plt.refcount++;
690 break;
691
692 case R_VAX_PC8:
693 case R_VAX_PC16:
694 case R_VAX_PC32:
695 /* If we are creating a shared library and this is not a local
696 symbol, we need to copy the reloc into the shared library.
697 However when linking with -Bsymbolic and this is a global
698 symbol which is defined in an object we are including in the
699 link (i.e., DEF_REGULAR is set), then we can resolve the
700 reloc directly. At this point we have not seen all the input
701 files, so it is possible that DEF_REGULAR is not set now but
702 will be set later (it is never cleared). We account for that
703 possibility below by storing information in the
704 pcrel_relocs_copied field of the hash table entry. */
705 if (!(info->shared
706 && (sec->flags & SEC_ALLOC) != 0
707 && h != NULL
708 && (!info->symbolic
f5385ebf 709 || !h->def_regular)))
90ace9e9
JT
710 {
711 if (h != NULL)
712 {
713 /* Make sure a plt entry is created for this symbol if
714 it turns out to be a function defined by a dynamic
715 object. */
716 if (h->plt.refcount == -1)
717 h->plt.refcount = 1;
718 else
719 h->plt.refcount++;
720 }
721 break;
722 }
723 /* Fall through. */
724 case R_VAX_8:
725 case R_VAX_16:
726 case R_VAX_32:
727 if (h != NULL)
728 {
729 /* Make sure a plt entry is created for this symbol if it
730 turns out to be a function defined by a dynamic object. */
731 if (h->plt.refcount == -1)
732 h->plt.refcount = 1;
733 else
734 h->plt.refcount++;
735 }
736
737 /* If we are creating a shared library, we need to copy the
738 reloc into the shared library. */
739 if (info->shared
740 && (sec->flags & SEC_ALLOC) != 0)
741 {
742 /* When creating a shared object, we must copy these
743 reloc types into the output file. We create a reloc
744 section in dynobj and make room for this reloc. */
745 if (sreloc == NULL)
746 {
747 const char *name;
748
749 name = (bfd_elf_string_from_elf_section
750 (abfd,
751 elf_elfheader (abfd)->e_shstrndx,
752 elf_section_data (sec)->rel_hdr.sh_name));
753 if (name == NULL)
b34976b6 754 return FALSE;
90ace9e9
JT
755
756 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
757 && strcmp (bfd_get_section_name (abfd, sec),
758 name + 5) == 0);
759
760 sreloc = bfd_get_section_by_name (dynobj, name);
761 if (sreloc == NULL)
762 {
763 sreloc = bfd_make_section (dynobj, name);
764 if (sreloc == NULL
765 || !bfd_set_section_flags (dynobj, sreloc,
766 (SEC_ALLOC
767 | SEC_LOAD
768 | SEC_HAS_CONTENTS
769 | SEC_IN_MEMORY
770 | SEC_LINKER_CREATED
771 | SEC_READONLY))
772 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 773 return FALSE;
90ace9e9
JT
774 }
775 if (sec->flags & SEC_READONLY)
776 info->flags |= DF_TEXTREL;
777 }
778
eea6121a 779 sreloc->size += sizeof (Elf32_External_Rela);
90ace9e9
JT
780
781 /* If we are linking with -Bsymbolic, we count the number of
782 PC relative relocations we have entered for this symbol,
783 so that we can discard them again if the symbol is later
784 defined by a regular object. Note that this function is
19852a2a 785 only called if we are using a vaxelf linker hash table,
90ace9e9
JT
786 which means that h is really a pointer to an
787 elf_vax_link_hash_entry. */
788 if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
789 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
790 || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
791 && info->symbolic)
792 {
793 struct elf_vax_link_hash_entry *eh;
794 struct elf_vax_pcrel_relocs_copied *p;
795
796 eh = (struct elf_vax_link_hash_entry *) h;
797
798 for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
799 if (p->section == sreloc)
800 break;
801
802 if (p == NULL)
803 {
804 p = ((struct elf_vax_pcrel_relocs_copied *)
805 bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
806 if (p == NULL)
b34976b6 807 return FALSE;
90ace9e9
JT
808 p->next = eh->pcrel_relocs_copied;
809 eh->pcrel_relocs_copied = p;
810 p->section = sreloc;
811 p->count = 0;
812 }
813
814 ++p->count;
815 }
816 }
817
818 break;
819
820 /* This relocation describes the C++ object vtable hierarchy.
821 Reconstruct it for later use during GC. */
822 case R_VAX_GNU_VTINHERIT:
c152c796 823 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 824 return FALSE;
90ace9e9
JT
825 break;
826
827 /* This relocation describes which C++ vtable entries are actually
828 used. Record for later use during GC. */
829 case R_VAX_GNU_VTENTRY:
c152c796 830 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 831 return FALSE;
90ace9e9
JT
832 break;
833
834 default:
835 break;
836 }
837 }
838
b34976b6 839 return TRUE;
90ace9e9
JT
840}
841
842/* Return the section that should be marked against GC for a given
843 relocation. */
844
845static asection *
1e2f5b6e
AM
846elf_vax_gc_mark_hook (sec, info, rel, h, sym)
847 asection *sec;
90ace9e9
JT
848 struct bfd_link_info *info ATTRIBUTE_UNUSED;
849 Elf_Internal_Rela *rel;
850 struct elf_link_hash_entry *h;
851 Elf_Internal_Sym *sym;
852{
853 if (h != NULL)
854 {
855 switch (ELF32_R_TYPE (rel->r_info))
856 {
857 case R_VAX_GNU_VTINHERIT:
858 case R_VAX_GNU_VTENTRY:
859 break;
860
861 default:
862 switch (h->root.type)
863 {
864 default:
865 break;
866
867 case bfd_link_hash_defined:
868 case bfd_link_hash_defweak:
869 return h->root.u.def.section;
870
871 case bfd_link_hash_common:
872 return h->root.u.c.p->section;
873 }
874 }
875 }
876 else
1e2f5b6e 877 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
90ace9e9
JT
878
879 return NULL;
880}
881
882/* Update the got entry reference counts for the section being removed. */
883
b34976b6 884static bfd_boolean
90ace9e9
JT
885elf_vax_gc_sweep_hook (abfd, info, sec, relocs)
886 bfd *abfd;
887 struct bfd_link_info *info;
888 asection *sec;
889 const Elf_Internal_Rela *relocs;
890{
891 Elf_Internal_Shdr *symtab_hdr;
892 struct elf_link_hash_entry **sym_hashes;
90ace9e9 893 const Elf_Internal_Rela *rel, *relend;
90ace9e9 894 bfd *dynobj;
90ace9e9 895
90ace9e9
JT
896 dynobj = elf_hash_table (info)->dynobj;
897 if (dynobj == NULL)
b34976b6 898 return TRUE;
90ace9e9 899
babfd660
KH
900 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
901 sym_hashes = elf_sym_hashes (abfd);
902
90ace9e9
JT
903 relend = relocs + sec->reloc_count;
904 for (rel = relocs; rel < relend; rel++)
905 {
babfd660 906 unsigned long r_symndx;
3eb128b2
AM
907 struct elf_link_hash_entry *h = NULL;
908
909 r_symndx = ELF32_R_SYM (rel->r_info);
910 if (r_symndx >= symtab_hdr->sh_info)
911 {
912 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
913 while (h->root.type == bfd_link_hash_indirect
914 || h->root.type == bfd_link_hash_warning)
915 h = (struct elf_link_hash_entry *) h->root.u.i.link;
916 }
babfd660 917
90ace9e9
JT
918 switch (ELF32_R_TYPE (rel->r_info))
919 {
920 case R_VAX_GOT32:
3eb128b2
AM
921 if (h != NULL && h->got.refcount > 0)
922 --h->got.refcount;
90ace9e9
JT
923 break;
924
925 case R_VAX_PLT32:
926 case R_VAX_PC8:
927 case R_VAX_PC16:
928 case R_VAX_PC32:
929 case R_VAX_8:
930 case R_VAX_16:
931 case R_VAX_32:
3eb128b2
AM
932 if (h != NULL && h->plt.refcount > 0)
933 --h->plt.refcount;
90ace9e9
JT
934 break;
935
936 default:
937 break;
938 }
939 }
940
b34976b6 941 return TRUE;
90ace9e9
JT
942}
943
944/* Adjust a symbol defined by a dynamic object and referenced by a
945 regular object. The current definition is in some section of the
946 dynamic object, but we're not including those sections. We have to
947 change the definition to something the rest of the link can
948 understand. */
949
b34976b6 950static bfd_boolean
90ace9e9
JT
951elf_vax_adjust_dynamic_symbol (info, h)
952 struct bfd_link_info *info;
953 struct elf_link_hash_entry *h;
954{
955 bfd *dynobj;
956 asection *s;
957 unsigned int power_of_two;
958
959 dynobj = elf_hash_table (info)->dynobj;
960
961 /* Make sure we know what is going on here. */
962 BFD_ASSERT (dynobj != NULL
f5385ebf 963 && (h->needs_plt
f6e332e6 964 || h->u.weakdef != NULL
f5385ebf
AM
965 || (h->def_dynamic
966 && h->ref_regular
967 && !h->def_regular)));
90ace9e9
JT
968
969 /* If this is a function, put it in the procedure linkage table. We
970 will fill in the contents of the procedure linkage table later,
971 when we know the address of the .got section. */
972 if (h->type == STT_FUNC
f5385ebf 973 || h->needs_plt)
90ace9e9
JT
974 {
975 if (! info->shared
f5385ebf
AM
976 && !h->def_dynamic
977 && !h->ref_dynamic
90ace9e9
JT
978 /* We must always create the plt entry if it was referenced
979 by a PLTxxO relocation. In this case we already recorded
980 it as a dynamic symbol. */
981 && h->dynindx == -1)
982 {
983 /* This case can occur if we saw a PLTxx reloc in an input
984 file, but the symbol was never referred to by a dynamic
985 object. In such a case, we don't actually need to build
986 a procedure linkage table, and we can just do a PCxx
987 reloc instead. */
f5385ebf 988 BFD_ASSERT (h->needs_plt);
90ace9e9 989 h->plt.offset = (bfd_vma) -1;
b34976b6 990 return TRUE;
90ace9e9
JT
991 }
992
993 /* GC may have rendered this entry unused. */
994 if (h->plt.refcount <= 0)
995 {
f5385ebf 996 h->needs_plt = 0;
90ace9e9 997 h->plt.offset = (bfd_vma) -1;
b34976b6 998 return TRUE;
90ace9e9
JT
999 }
1000
1001 /* Make sure this symbol is output as a dynamic symbol. */
1002 if (h->dynindx == -1)
1003 {
c152c796 1004 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1005 return FALSE;
90ace9e9
JT
1006 }
1007
1008 s = bfd_get_section_by_name (dynobj, ".plt");
1009 BFD_ASSERT (s != NULL);
1010
1011 /* If this is the first .plt entry, make room for the special
1012 first entry. */
eea6121a 1013 if (s->size == 0)
90ace9e9 1014 {
eea6121a 1015 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1016 }
1017
1018 /* If this symbol is not defined in a regular file, and we are
1019 not generating a shared library, then set the symbol to this
1020 location in the .plt. This is required to make function
1021 pointers compare as equal between the normal executable and
1022 the shared library. */
1023 if (!info->shared
f5385ebf 1024 && !h->def_regular)
90ace9e9
JT
1025 {
1026 h->root.u.def.section = s;
eea6121a 1027 h->root.u.def.value = s->size;
90ace9e9
JT
1028 }
1029
eea6121a 1030 h->plt.offset = s->size;
90ace9e9
JT
1031
1032 /* Make room for this entry. */
eea6121a 1033 s->size += PLT_ENTRY_SIZE;
90ace9e9
JT
1034
1035 /* We also need to make an entry in the .got.plt section, which
1036 will be placed in the .got section by the linker script. */
1037
1038 s = bfd_get_section_by_name (dynobj, ".got.plt");
1039 BFD_ASSERT (s != NULL);
eea6121a 1040 s->size += 4;
90ace9e9
JT
1041
1042 /* We also need to make an entry in the .rela.plt section. */
1043
1044 s = bfd_get_section_by_name (dynobj, ".rela.plt");
1045 BFD_ASSERT (s != NULL);
eea6121a 1046 s->size += sizeof (Elf32_External_Rela);
90ace9e9 1047
b34976b6 1048 return TRUE;
90ace9e9
JT
1049 }
1050
1051 /* Reinitialize the plt offset now that it is not used as a reference
1052 count any more. */
1053 h->plt.offset = (bfd_vma) -1;
1054
1055 /* If this is a weak symbol, and there is a real definition, the
1056 processor independent code will have arranged for us to see the
1057 real definition first, and we can just use the same value. */
f6e332e6 1058 if (h->u.weakdef != NULL)
90ace9e9 1059 {
f6e332e6
AM
1060 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1061 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1062 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1063 h->root.u.def.value = h->u.weakdef->root.u.def.value;
b34976b6 1064 return TRUE;
90ace9e9
JT
1065 }
1066
1067 /* This is a reference to a symbol defined by a dynamic object which
1068 is not a function. */
1069
1070 /* If we are creating a shared library, we must presume that the
1071 only references to the symbol are via the global offset table.
1072 For such cases we need not do anything here; the relocations will
1073 be handled correctly by relocate_section. */
1074 if (info->shared)
b34976b6 1075 return TRUE;
90ace9e9
JT
1076
1077 /* We must allocate the symbol in our .dynbss section, which will
1078 become part of the .bss section of the executable. There will be
1079 an entry for this symbol in the .dynsym section. The dynamic
1080 object will contain position independent code, so all references
1081 from the dynamic object to this symbol will go through the global
1082 offset table. The dynamic linker will use the .dynsym entry to
1083 determine the address it must put in the global offset table, so
1084 both the dynamic object and the regular object will refer to the
1085 same memory location for the variable. */
1086
1087 s = bfd_get_section_by_name (dynobj, ".dynbss");
1088 BFD_ASSERT (s != NULL);
1089
1090 /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1091 copy the initial value out of the dynamic object and into the
1092 runtime process image. We need to remember the offset into the
1093 .rela.bss section we are going to use. */
1094 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1095 {
1096 asection *srel;
1097
1098 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1099 BFD_ASSERT (srel != NULL);
eea6121a 1100 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1101 h->needs_copy = 1;
90ace9e9
JT
1102 }
1103
1104 /* We need to figure out the alignment required for this symbol. I
1105 have no idea how ELF linkers handle this. */
1106 power_of_two = bfd_log2 (h->size);
1107 if (power_of_two > 3)
1108 power_of_two = 3;
1109
1110 /* Apply the required alignment. */
eea6121a 1111 s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
90ace9e9
JT
1112 if (power_of_two > bfd_get_section_alignment (dynobj, s))
1113 {
1114 if (!bfd_set_section_alignment (dynobj, s, power_of_two))
b34976b6 1115 return FALSE;
90ace9e9
JT
1116 }
1117
1118 /* Define the symbol as being at this point in the section. */
1119 h->root.u.def.section = s;
eea6121a 1120 h->root.u.def.value = s->size;
90ace9e9
JT
1121
1122 /* Increment the section size to make room for the symbol. */
eea6121a 1123 s->size += h->size;
90ace9e9 1124
b34976b6 1125 return TRUE;
90ace9e9
JT
1126}
1127
1128/* Set the sizes of the dynamic sections. */
1129
b34976b6 1130static bfd_boolean
90ace9e9
JT
1131elf_vax_size_dynamic_sections (output_bfd, info)
1132 bfd *output_bfd;
1133 struct bfd_link_info *info;
1134{
1135 bfd *dynobj;
1136 asection *s;
b34976b6
AM
1137 bfd_boolean plt;
1138 bfd_boolean relocs;
1139 bfd_boolean reltext;
90ace9e9
JT
1140
1141 dynobj = elf_hash_table (info)->dynobj;
1142 BFD_ASSERT (dynobj != NULL);
1143
1144 if (elf_hash_table (info)->dynamic_sections_created)
1145 {
1146 /* Set the contents of the .interp section to the interpreter. */
893c4fe2 1147 if (info->executable)
90ace9e9
JT
1148 {
1149 s = bfd_get_section_by_name (dynobj, ".interp");
1150 BFD_ASSERT (s != NULL);
eea6121a 1151 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
90ace9e9
JT
1152 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1153 }
1154 }
1155 else
1156 {
1157 /* We may have created entries in the .rela.got and .got sections.
1158 However, if we are not creating the dynamic sections, we will
1159 not actually use these entries. Reset the size of .rela.got
1160 and .got, which will cause it to get stripped from the output
1161 file below. */
1162 s = bfd_get_section_by_name (dynobj, ".rela.got");
1163 if (s != NULL)
eea6121a 1164 s->size = 0;
90ace9e9
JT
1165 s = bfd_get_section_by_name (dynobj, ".got.plt");
1166 if (s != NULL)
eea6121a 1167 s->size = 0;
90ace9e9
JT
1168 s = bfd_get_section_by_name (dynobj, ".got");
1169 if (s != NULL)
eea6121a 1170 s->size = 0;
90ace9e9
JT
1171 }
1172
1173 /* If this is a -Bsymbolic shared link, then we need to discard all PC
1174 relative relocs against symbols defined in a regular object. We
1175 allocated space for them in the check_relocs routine, but we will not
1176 fill them in in the relocate_section routine. */
1177 if (info->shared && info->symbolic)
1178 elf_vax_link_hash_traverse (elf_vax_hash_table (info),
b29635ba
JT
1179 elf_vax_discard_copies,
1180 (PTR) NULL);
1181
b34976b6 1182 /* If this is a -Bsymbolic shared link or a static link, we need to
b29635ba
JT
1183 discard all the got entries we've recorded. Otherwise, we need to
1184 instantiate (allocate space for them). */
1185 elf_link_hash_traverse (elf_hash_table (info),
1186 elf_vax_instantiate_got_entries,
1187 (PTR) info);
90ace9e9
JT
1188
1189 /* The check_relocs and adjust_dynamic_symbol entry points have
1190 determined the sizes of the various dynamic sections. Allocate
1191 memory for them. */
b34976b6
AM
1192 plt = FALSE;
1193 relocs = FALSE;
1194 reltext = FALSE;
90ace9e9
JT
1195 for (s = dynobj->sections; s != NULL; s = s->next)
1196 {
1197 const char *name;
b34976b6 1198 bfd_boolean strip;
90ace9e9
JT
1199
1200 if ((s->flags & SEC_LINKER_CREATED) == 0)
1201 continue;
1202
1203 /* It's OK to base decisions on the section name, because none
1204 of the dynobj section names depend upon the input files. */
1205 name = bfd_get_section_name (dynobj, s);
1206
b34976b6 1207 strip = FALSE;
90ace9e9
JT
1208
1209 if (strcmp (name, ".plt") == 0)
1210 {
eea6121a 1211 if (s->size == 0)
90ace9e9
JT
1212 {
1213 /* Strip this section if we don't need it; see the
1214 comment below. */
b34976b6 1215 strip = TRUE;
90ace9e9
JT
1216 }
1217 else
1218 {
1219 /* Remember whether there is a PLT. */
b34976b6 1220 plt = TRUE;
90ace9e9
JT
1221 }
1222 }
1223 else if (strncmp (name, ".rela", 5) == 0)
1224 {
eea6121a 1225 if (s->size == 0)
90ace9e9
JT
1226 {
1227 /* If we don't need this section, strip it from the
1228 output file. This is mostly to handle .rela.bss and
1229 .rela.plt. We must create both sections in
1230 create_dynamic_sections, because they must be created
1231 before the linker maps input sections to output
1232 sections. The linker does that before
1233 adjust_dynamic_symbol is called, and it is that
1234 function which decides whether anything needs to go
1235 into these sections. */
b34976b6 1236 strip = TRUE;
90ace9e9
JT
1237 }
1238 else
1239 {
1240 asection *target;
1241
1242 /* Remember whether there are any reloc sections other
1243 than .rela.plt. */
1244 if (strcmp (name, ".rela.plt") != 0)
1245 {
1246 const char *outname;
1247
b34976b6 1248 relocs = TRUE;
90ace9e9
JT
1249
1250 /* If this relocation section applies to a read only
1251 section, then we probably need a DT_TEXTREL
1252 entry. .rela.plt is actually associated with
1253 .got.plt, which is never readonly. */
1254 outname = bfd_get_section_name (output_bfd,
1255 s->output_section);
1256 target = bfd_get_section_by_name (output_bfd, outname + 5);
1257 if (target != NULL
1258 && (target->flags & SEC_READONLY) != 0
1259 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1260 reltext = TRUE;
90ace9e9
JT
1261 }
1262
1263 /* We use the reloc_count field as a counter if we need
1264 to copy relocs into the output file. */
1265 s->reloc_count = 0;
1266 }
1267 }
624f0b25 1268 else if (strncmp (name, ".got", 4) != 0)
90ace9e9
JT
1269 {
1270 /* It's not one of our sections, so don't allocate space. */
1271 continue;
1272 }
1273
1274 if (strip)
1275 {
8423293d 1276 s->flags |= SEC_EXCLUDE;
90ace9e9
JT
1277 continue;
1278 }
1279
1280 /* Allocate memory for the section contents. */
eea6121a
AM
1281 s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
1282 if (s->contents == NULL && s->size != 0)
b34976b6 1283 return FALSE;
90ace9e9
JT
1284 }
1285
1286 if (elf_hash_table (info)->dynamic_sections_created)
1287 {
1288 /* Add some entries to the .dynamic section. We fill in the
1289 values later, in elf_vax_finish_dynamic_sections, but we
1290 must add the entries now so that we get the correct size for
1291 the .dynamic section. The DT_DEBUG entry is filled in by the
1292 dynamic linker and used by the debugger. */
1293#define add_dynamic_entry(TAG, VAL) \
5a580b3a 1294 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
90ace9e9
JT
1295
1296 if (!info->shared)
1297 {
1298 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 1299 return FALSE;
90ace9e9
JT
1300 }
1301
1302 if (plt)
1303 {
1304 if (!add_dynamic_entry (DT_PLTGOT, 0)
1305 || !add_dynamic_entry (DT_PLTRELSZ, 0)
1306 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1307 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1308 return FALSE;
90ace9e9
JT
1309 }
1310
1311 if (relocs)
1312 {
1313 if (!add_dynamic_entry (DT_RELA, 0)
1314 || !add_dynamic_entry (DT_RELASZ, 0)
1315 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 1316 return FALSE;
90ace9e9
JT
1317 }
1318
1319 if (reltext || (info->flags & DF_TEXTREL) != 0)
1320 {
1321 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1322 return FALSE;
90ace9e9
JT
1323 }
1324 }
1325#undef add_dynamic_entry
1326
b34976b6 1327 return TRUE;
90ace9e9
JT
1328}
1329
1330/* This function is called via elf_vax_link_hash_traverse if we are
1331 creating a shared object with -Bsymbolic. It discards the space
1332 allocated to copy PC relative relocs against symbols which are defined
1333 in regular objects. We allocated space for them in the check_relocs
1334 routine, but we won't fill them in in the relocate_section routine. */
1335
b34976b6 1336static bfd_boolean
90ace9e9
JT
1337elf_vax_discard_copies (h, ignore)
1338 struct elf_vax_link_hash_entry *h;
1339 PTR ignore ATTRIBUTE_UNUSED;
1340{
1341 struct elf_vax_pcrel_relocs_copied *s;
1342
1343 if (h->root.root.type == bfd_link_hash_warning)
1344 h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1345
1346 /* We only discard relocs for symbols defined in a regular object. */
f5385ebf 1347 if (!h->root.def_regular)
b34976b6 1348 return TRUE;
90ace9e9
JT
1349
1350 for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
eea6121a 1351 s->section->size -= s->count * sizeof (Elf32_External_Rela);
90ace9e9 1352
b34976b6 1353 return TRUE;
90ace9e9
JT
1354}
1355
b29635ba
JT
1356/* This function is called via elf_link_hash_traverse. It looks for entries
1357 that have GOT or PLT (.GOT) references. If creating a static object or a
1358 shared object with -Bsymbolic, it resets the reference count back to 0
1359 and sets the offset to -1 so normal PC32 relocation will be done. If
1360 creating a shared object or executable, space in the .got and .rela.got
1361 will be reserved for the symbol. */
1362
b34976b6 1363static bfd_boolean
b29635ba
JT
1364elf_vax_instantiate_got_entries (h, infoptr)
1365 struct elf_link_hash_entry *h;
1366 PTR infoptr;
1367{
1368 struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1369 bfd *dynobj;
1370 asection *sgot;
1371 asection *srelgot;
b34976b6 1372
b29635ba
JT
1373 /* We don't care about non-GOT (and non-PLT) entries. */
1374 if (h->got.refcount <= 0 && h->plt.refcount <= 0)
b34976b6 1375 return TRUE;
b29635ba
JT
1376
1377 dynobj = elf_hash_table (info)->dynobj;
1378 if (dynobj == NULL)
b34976b6 1379 return TRUE;
b29635ba
JT
1380
1381 sgot = bfd_get_section_by_name (dynobj, ".got");
1382 srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1383
1384 if (!elf_hash_table (info)->dynamic_sections_created
1385 || (info->shared && info->symbolic))
1386 {
1387 h->got.refcount = 0;
1388 h->got.offset = (bfd_vma) -1;
1389 h->plt.refcount = 0;
1390 h->plt.offset = (bfd_vma) -1;
1391 }
1392 else if (h->got.refcount > 0)
1393 {
1394 /* Make sure this symbol is output as a dynamic symbol. */
1395 if (h->dynindx == -1)
1396 {
c152c796 1397 if (!bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1398 return FALSE;
b29635ba
JT
1399 }
1400
1401 /* Allocate space in the .got and .rela.got sections. */
eea6121a
AM
1402 sgot->size += 4;
1403 srelgot->size += sizeof (Elf32_External_Rela);
b29635ba
JT
1404 }
1405
b34976b6 1406 return TRUE;
b29635ba
JT
1407}
1408
90ace9e9
JT
1409/* Relocate an VAX ELF section. */
1410
b34976b6 1411static bfd_boolean
90ace9e9
JT
1412elf_vax_relocate_section (output_bfd, info, input_bfd, input_section,
1413 contents, relocs, local_syms, local_sections)
1414 bfd *output_bfd;
1415 struct bfd_link_info *info;
1416 bfd *input_bfd;
1417 asection *input_section;
1418 bfd_byte *contents;
1419 Elf_Internal_Rela *relocs;
1420 Elf_Internal_Sym *local_syms;
1421 asection **local_sections;
1422{
1423 bfd *dynobj;
1424 Elf_Internal_Shdr *symtab_hdr;
1425 struct elf_link_hash_entry **sym_hashes;
1426 bfd_vma *local_got_offsets;
1427 bfd_vma plt_index;
1428 bfd_vma got_offset;
1429 asection *sgot;
1430 asection *splt;
1431 asection *sgotplt;
1432 asection *sreloc;
1433 Elf_Internal_Rela *rel;
1434 Elf_Internal_Rela *relend;
1435
1049f94e 1436 if (info->relocatable)
b34976b6 1437 return TRUE;
f0fe0e16 1438
90ace9e9
JT
1439 dynobj = elf_hash_table (info)->dynobj;
1440 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1441 sym_hashes = elf_sym_hashes (input_bfd);
1442 local_got_offsets = elf_local_got_offsets (input_bfd);
1443
1444 sgot = NULL;
1445 splt = NULL;
1446 sgotplt = NULL;
1447 sreloc = NULL;
1448
1449 rel = relocs;
1450 relend = relocs + input_section->reloc_count;
1451 for (; rel < relend; rel++)
1452 {
1453 int r_type;
1454 reloc_howto_type *howto;
1455 unsigned long r_symndx;
1456 struct elf_link_hash_entry *h;
1457 Elf_Internal_Sym *sym;
1458 asection *sec;
1459 bfd_vma relocation;
1460 bfd_reloc_status_type r;
1461
1462 r_type = ELF32_R_TYPE (rel->r_info);
1463 if (r_type < 0 || r_type >= (int) R_VAX_max)
1464 {
1465 bfd_set_error (bfd_error_bad_value);
b34976b6 1466 return FALSE;
90ace9e9
JT
1467 }
1468 howto = howto_table + r_type;
1469
90ace9e9 1470 /* This is a final link. */
f0fe0e16 1471 r_symndx = ELF32_R_SYM (rel->r_info);
90ace9e9
JT
1472 h = NULL;
1473 sym = NULL;
1474 sec = NULL;
1475 if (r_symndx < symtab_hdr->sh_info)
1476 {
1477 sym = local_syms + r_symndx;
1478 sec = local_sections[r_symndx];
8517fae7 1479 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
90ace9e9
JT
1480 }
1481 else
1482 {
560e09e9
NC
1483 bfd_boolean unresolved_reloc;
1484 bfd_boolean warned;
1485
b2a8e766
AM
1486 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1487 r_symndx, symtab_hdr, sym_hashes,
1488 h, sec, relocation,
1489 unresolved_reloc, warned);
560e09e9
NC
1490
1491 if ((h->root.type == bfd_link_hash_defined
90ace9e9 1492 || h->root.type == bfd_link_hash_defweak)
560e09e9 1493 && ((r_type == R_VAX_PLT32
90ace9e9
JT
1494 && h->plt.offset != (bfd_vma) -1
1495 && elf_hash_table (info)->dynamic_sections_created)
1496 || (r_type == R_VAX_GOT32
1497 && strcmp (h->root.root.string,
1498 "_GLOBAL_OFFSET_TABLE_") != 0
1499 && elf_hash_table (info)->dynamic_sections_created
1500 && (! info->shared
1501 || (! info->symbolic && h->dynindx != -1)
f5385ebf 1502 || !h->def_regular))
90ace9e9
JT
1503 || (info->shared
1504 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1505 || !h->def_regular)
90ace9e9
JT
1506 && ((input_section->flags & SEC_ALLOC) != 0
1507 /* DWARF will emit R_VAX_32 relocations in its
1508 sections against symbols defined externally
1509 in shared libraries. We can't do anything
1510 with them here. */
1511
1512 || ((input_section->flags & SEC_DEBUGGING) != 0
f5385ebf 1513 && h->def_dynamic))
90ace9e9
JT
1514 && (r_type == R_VAX_8
1515 || r_type == R_VAX_16
1516 || r_type == R_VAX_32
1517 || r_type == R_VAX_PC8
1518 || r_type == R_VAX_PC16
560e09e9
NC
1519 || r_type == R_VAX_PC32))))
1520 /* In these cases, we don't need the relocation
1521 value. We check specially because in some
1522 obscure cases sec->output_section will be NULL. */
90ace9e9 1523 relocation = 0;
90ace9e9
JT
1524 }
1525
1526 switch (r_type)
1527 {
1528 case R_VAX_GOT32:
1529 /* Relocation is to the address of the entry for this symbol
1530 in the global offset table. */
b29635ba 1531 if (h == NULL || h->got.offset == (bfd_vma) -1)
90ace9e9
JT
1532 break;
1533
1534 /* Relocation is the offset of the entry for this symbol in
1535 the global offset table. */
1536
1537 {
1538 bfd_vma off;
1539
90ace9e9
JT
1540 if (sgot == NULL)
1541 {
1542 sgot = bfd_get_section_by_name (dynobj, ".got");
1543 BFD_ASSERT (sgot != NULL);
1544 }
1545
1546 BFD_ASSERT (h != NULL);
1547 off = h->got.offset;
1548 BFD_ASSERT (off != (bfd_vma) -1);
eea6121a 1549 BFD_ASSERT (off < sgot->size);
90ace9e9
JT
1550
1551 if (info->shared
1552 && h->dynindx == -1
f5385ebf 1553 && h->def_regular)
90ace9e9
JT
1554 {
1555 /* The symbol was forced to be local
1556 because of a version file.. We must initialize
1557 this entry in the global offset table. Since
1558 the offset must always be a multiple of 4, we
1559 use the least significant bit to record whether
1560 we have initialized it already.
1561
1562 When doing a dynamic link, we create a .rela.got
1563 relocation entry to initialize the value. This
1564 is done in the finish_dynamic_symbol routine. */
1565 if ((off & 1) != 0)
1566 off &= ~1;
1567 else
1568 {
1569 bfd_put_32 (output_bfd, relocation + rel->r_addend,
1570 sgot->contents + off);
1571 h->got.offset |= 1;
1572 }
1573 } else {
1574 bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1575 }
1576
1577 relocation = sgot->output_offset + off;
b29635ba 1578 /* The GOT relocation uses the addend. */
90ace9e9
JT
1579 rel->r_addend = 0;
1580
b29635ba
JT
1581 /* Change the reference to be indirect. */
1582 contents[rel->r_offset - 1] |= 0x10;
1583 relocation += sgot->output_section->vma;
90ace9e9
JT
1584 }
1585 break;
1586
1587 case R_VAX_PLT32:
1588 /* Relocation is to the entry for this symbol in the
1589 procedure linkage table. */
1590
1591 /* Resolve a PLTxx reloc against a local symbol directly,
1592 without using the procedure linkage table. */
1593 if (h == NULL)
1594 break;
1595
1596 if (h->plt.offset == (bfd_vma) -1
1597 || !elf_hash_table (info)->dynamic_sections_created)
1598 {
1599 /* We didn't make a PLT entry for this symbol. This
1600 happens when statically linking PIC code, or when
1601 using -Bsymbolic. */
1602 break;
1603 }
1604
1605 if (splt == NULL)
1606 {
1607 splt = bfd_get_section_by_name (dynobj, ".plt");
1608 BFD_ASSERT (splt != NULL);
1609 }
1610
1611 if (sgotplt == NULL)
1612 {
1613 sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1614 BFD_ASSERT (splt != NULL);
1615 }
1616
1617 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1618
1619 /* Get the offset into the .got table of the entry that
1620 corresponds to this function. Each .got entry is 4 bytes.
1621 The first two are reserved. */
1622 got_offset = (plt_index + 3) * 4;
1623
1624 /* We want the relocate to point into the .got.plt instead
cedb70c5 1625 of the plt itself. */
90ace9e9
JT
1626 relocation = (sgotplt->output_section->vma
1627 + sgotplt->output_offset
1628 + got_offset);
1629 contents[rel->r_offset-1] |= 0x10; /* make indirect */
1630 if (rel->r_addend == 2)
1631 {
1632 h->plt.offset |= 1;
1633 }
1634 else if (rel->r_addend != 0)
1635 (*_bfd_error_handler)
1636 (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1637 bfd_get_filename (input_bfd), rel->r_addend,
1638 h->root.root.string,
1639 bfd_get_section_name (input_bfd, input_section));
1640 rel->r_addend = 0;
1641
1642 break;
1643
1644 case R_VAX_PC8:
1645 case R_VAX_PC16:
1646 case R_VAX_PC32:
1647 if (h == NULL)
1648 break;
1649 /* Fall through. */
1650 case R_VAX_8:
1651 case R_VAX_16:
1652 case R_VAX_32:
1653 if (info->shared
1654 && r_symndx != 0
1655 && (input_section->flags & SEC_ALLOC) != 0
1656 && ((r_type != R_VAX_PC8
1657 && r_type != R_VAX_PC16
1658 && r_type != R_VAX_PC32)
1659 || (!info->symbolic
f5385ebf 1660 || !h->def_regular)))
90ace9e9
JT
1661 {
1662 Elf_Internal_Rela outrel;
947216bf 1663 bfd_byte *loc;
b34976b6 1664 bfd_boolean skip, relocate;
90ace9e9
JT
1665
1666 /* When generating a shared object, these relocations
1667 are copied into the output file to be resolved at run
1668 time. */
90ace9e9
JT
1669 if (sreloc == NULL)
1670 {
1671 const char *name;
1672
1673 name = (bfd_elf_string_from_elf_section
1674 (input_bfd,
1675 elf_elfheader (input_bfd)->e_shstrndx,
1676 elf_section_data (input_section)->rel_hdr.sh_name));
1677 if (name == NULL)
b34976b6 1678 return FALSE;
90ace9e9
JT
1679
1680 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1681 && strcmp (bfd_get_section_name (input_bfd,
1682 input_section),
1683 name + 5) == 0);
1684
1685 sreloc = bfd_get_section_by_name (dynobj, name);
1686 BFD_ASSERT (sreloc != NULL);
1687 }
1688
b34976b6
AM
1689 skip = FALSE;
1690 relocate = FALSE;
90ace9e9
JT
1691
1692 outrel.r_offset =
1693 _bfd_elf_section_offset (output_bfd, info, input_section,
1694 rel->r_offset);
1695 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 1696 skip = TRUE;
90ace9e9 1697 if (outrel.r_offset == (bfd_vma) -2)
b34976b6 1698 skip = TRUE, relocate = TRUE;
90ace9e9
JT
1699 outrel.r_offset += (input_section->output_section->vma
1700 + input_section->output_offset);
1701
1702 if (skip)
1703 memset (&outrel, 0, sizeof outrel);
1704 /* h->dynindx may be -1 if the symbol was marked to
1705 become local. */
1706 else if (h != NULL
1707 && ((! info->symbolic && h->dynindx != -1)
f5385ebf 1708 || !h->def_regular))
90ace9e9
JT
1709 {
1710 BFD_ASSERT (h->dynindx != -1);
1711 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1712 outrel.r_addend = relocation + rel->r_addend;
1713 }
1714 else
1715 {
1716 if (r_type == R_VAX_32)
1717 {
b34976b6 1718 relocate = TRUE;
90ace9e9
JT
1719 outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1720 BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1721 &contents[rel->r_offset]) == 0);
1722 outrel.r_addend = relocation + rel->r_addend;
1723 }
1724 else
1725 {
1726 long indx;
1727
8517fae7 1728 if (bfd_is_abs_section (sec))
90ace9e9
JT
1729 indx = 0;
1730 else if (sec == NULL || sec->owner == NULL)
1731 {
1732 bfd_set_error (bfd_error_bad_value);
b34976b6 1733 return FALSE;
90ace9e9
JT
1734 }
1735 else
1736 {
1737 asection *osec;
1738
1739 osec = sec->output_section;
1740 indx = elf_section_data (osec)->dynindx;
1741 BFD_ASSERT (indx > 0);
1742 }
1743
1744 outrel.r_info = ELF32_R_INFO (indx, r_type);
1745 outrel.r_addend = relocation + rel->r_addend;
1746 }
1747 }
1748
1749 if (!strcmp (bfd_get_section_name (input_bfd, input_section),
cedb70c5 1750 ".text") != 0 ||
90ace9e9
JT
1751 (info->shared
1752 && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1753 && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1754 && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1755 && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1756 && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1757 {
1758 if (h != NULL)
1759 (*_bfd_error_handler)
1760 (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1761 bfd_get_filename (input_bfd), howto->name,
1762 h->root.root.string,
1763 bfd_get_section_name (input_bfd, input_section));
1764 else
1765 (*_bfd_error_handler)
1766 (_("%s: warning: %s relocation to 0x%x from %s section"),
1767 bfd_get_filename (input_bfd), howto->name,
1768 outrel.r_addend,
1769 bfd_get_section_name (input_bfd, input_section));
1770 }
947216bf
AM
1771 loc = sreloc->contents;
1772 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1773 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
90ace9e9
JT
1774
1775 /* This reloc will be computed at runtime, so there's no
1776 need to do anything now, except for R_VAX_32
1777 relocations that have been turned into
1778 R_VAX_RELATIVE. */
1779 if (!relocate)
1780 continue;
1781 }
1782
1783 break;
1784
1785 case R_VAX_GNU_VTINHERIT:
1786 case R_VAX_GNU_VTENTRY:
1787 /* These are no-ops in the end. */
1788 continue;
1789
1790 default:
1791 break;
1792 }
1793
b34976b6 1794 /* VAX PCREL relocations are from the end of relocation, not the start.
b29635ba
JT
1795 So subtract the difference from the relocation amount since we can't
1796 add it to the offset. */
90ace9e9 1797 if (howto->pc_relative && howto->pcrel_offset)
b29635ba 1798 relocation -= bfd_get_reloc_size(howto);
90ace9e9
JT
1799
1800 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1801 contents, rel->r_offset,
1802 relocation, rel->r_addend);
1803
1804 if (r != bfd_reloc_ok)
1805 {
1806 switch (r)
1807 {
1808 default:
1809 case bfd_reloc_outofrange:
1810 abort ();
1811 case bfd_reloc_overflow:
1812 {
1813 const char *name;
1814
1815 if (h != NULL)
dfeffb9f 1816 name = NULL;
90ace9e9
JT
1817 else
1818 {
1819 name = bfd_elf_string_from_elf_section (input_bfd,
1820 symtab_hdr->sh_link,
1821 sym->st_name);
1822 if (name == NULL)
b34976b6 1823 return FALSE;
90ace9e9
JT
1824 if (*name == '\0')
1825 name = bfd_section_name (input_bfd, sec);
1826 }
1827 if (!(info->callbacks->reloc_overflow
dfeffb9f
L
1828 (info, (h ? &h->root : NULL), name, howto->name,
1829 (bfd_vma) 0, input_bfd, input_section,
1830 rel->r_offset)))
b34976b6 1831 return FALSE;
90ace9e9
JT
1832 }
1833 break;
1834 }
1835 }
1836 }
1837
b34976b6 1838 return TRUE;
90ace9e9
JT
1839}
1840
1841/* Finish up dynamic symbol handling. We set the contents of various
1842 dynamic sections here. */
1843
b34976b6 1844static bfd_boolean
90ace9e9
JT
1845elf_vax_finish_dynamic_symbol (output_bfd, info, h, sym)
1846 bfd *output_bfd;
1847 struct bfd_link_info *info;
1848 struct elf_link_hash_entry *h;
1849 Elf_Internal_Sym *sym;
1850{
1851 bfd *dynobj;
1852
1853 dynobj = elf_hash_table (info)->dynobj;
1854
1855 if (h->plt.offset != (bfd_vma) -1)
1856 {
1857 asection *splt;
1858 asection *sgot;
1859 asection *srela;
1860 bfd_vma plt_index;
1861 bfd_vma got_offset;
1862 bfd_vma addend;
1863 Elf_Internal_Rela rela;
947216bf 1864 bfd_byte *loc;
90ace9e9
JT
1865
1866 /* This symbol has an entry in the procedure linkage table. Set
1867 it up. */
90ace9e9
JT
1868 BFD_ASSERT (h->dynindx != -1);
1869
1870 splt = bfd_get_section_by_name (dynobj, ".plt");
1871 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1872 srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1873 BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1874
1875 addend = 2 * (h->plt.offset & 1);
1876 h->plt.offset &= ~1;
1877
1878 /* Get the index in the procedure linkage table which
1879 corresponds to this symbol. This is the index of this symbol
1880 in all the symbols for which we are making plt entries. The
1881 first entry in the procedure linkage table is reserved. */
1882 plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1883
1884 /* Get the offset into the .got table of the entry that
1885 corresponds to this function. Each .got entry is 4 bytes.
1886 The first two are reserved. */
1887 got_offset = (plt_index + 3) * 4;
1888
1889 /* Fill in the entry in the procedure linkage table. */
1890 memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1891 PLT_ENTRY_SIZE);
1892
1893 /* The offset is relative to the first extension word. */
1894 bfd_put_32 (output_bfd,
1895 -(h->plt.offset + 8),
1896 splt->contents + h->plt.offset + 4);
1897
1898 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1899 splt->contents + h->plt.offset + 8);
1900
1901 /* Fill in the entry in the global offset table. */
1902 bfd_put_32 (output_bfd,
1903 (splt->output_section->vma
1904 + splt->output_offset
1905 + h->plt.offset) + addend,
1906 sgot->contents + got_offset);
1907
1908 /* Fill in the entry in the .rela.plt section. */
1909 rela.r_offset = (sgot->output_section->vma
1910 + sgot->output_offset
1911 + got_offset);
1912 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1913 rela.r_addend = addend;
947216bf
AM
1914 loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1915 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9 1916
f5385ebf 1917 if (!h->def_regular)
90ace9e9
JT
1918 {
1919 /* Mark the symbol as undefined, rather than as defined in
1920 the .plt section. Leave the value alone. */
1921 sym->st_shndx = SHN_UNDEF;
1922 }
1923 }
1924
1925 if (h->got.offset != (bfd_vma) -1)
1926 {
1927 asection *sgot;
1928 asection *srela;
1929 Elf_Internal_Rela rela;
947216bf 1930 bfd_byte *loc;
90ace9e9
JT
1931
1932 /* This symbol has an entry in the global offset table. Set it
1933 up. */
90ace9e9
JT
1934 sgot = bfd_get_section_by_name (dynobj, ".got");
1935 srela = bfd_get_section_by_name (dynobj, ".rela.got");
1936 BFD_ASSERT (sgot != NULL && srela != NULL);
1937
1938 rela.r_offset = (sgot->output_section->vma
1939 + sgot->output_offset
1940 + (h->got.offset &~ 1));
1941
1942 /* If the symbol was forced to be local because of a version file
1943 locally we just want to emit a RELATIVE reloc. The entry in
1944 the global offset table will already have been initialized in
1945 the relocate_section function. */
1946 if (info->shared
1947 && h->dynindx == -1
f5385ebf 1948 && h->def_regular)
90ace9e9
JT
1949 {
1950 rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1951 }
1952 else
1953 {
1954 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1955 }
1956 rela.r_addend = bfd_get_signed_32 (output_bfd,
1957 (sgot->contents
1958 + (h->got.offset & ~1)));
1959
947216bf
AM
1960 loc = srela->contents;
1961 loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1962 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1963 }
1964
f5385ebf 1965 if (h->needs_copy)
90ace9e9
JT
1966 {
1967 asection *s;
1968 Elf_Internal_Rela rela;
947216bf 1969 bfd_byte *loc;
90ace9e9
JT
1970
1971 /* This symbol needs a copy reloc. Set it up. */
90ace9e9
JT
1972 BFD_ASSERT (h->dynindx != -1
1973 && (h->root.type == bfd_link_hash_defined
1974 || h->root.type == bfd_link_hash_defweak));
1975
1976 s = bfd_get_section_by_name (h->root.u.def.section->owner,
1977 ".rela.bss");
1978 BFD_ASSERT (s != NULL);
1979
1980 rela.r_offset = (h->root.u.def.value
1981 + h->root.u.def.section->output_section->vma
1982 + h->root.u.def.section->output_offset);
1983 rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1984 rela.r_addend = 0;
947216bf
AM
1985 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1986 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
90ace9e9
JT
1987 }
1988
1989 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
1990 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
1991 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1992 sym->st_shndx = SHN_ABS;
1993
b34976b6 1994 return TRUE;
90ace9e9
JT
1995}
1996
1997/* Finish up the dynamic sections. */
1998
b34976b6 1999static bfd_boolean
90ace9e9
JT
2000elf_vax_finish_dynamic_sections (output_bfd, info)
2001 bfd *output_bfd;
2002 struct bfd_link_info *info;
2003{
2004 bfd *dynobj;
2005 asection *sgot;
2006 asection *sdyn;
2007
2008 dynobj = elf_hash_table (info)->dynobj;
2009
2010 sgot = bfd_get_section_by_name (dynobj, ".got.plt");
2011 BFD_ASSERT (sgot != NULL);
2012 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2013
2014 if (elf_hash_table (info)->dynamic_sections_created)
2015 {
2016 asection *splt;
2017 Elf32_External_Dyn *dyncon, *dynconend;
2018
2019 splt = bfd_get_section_by_name (dynobj, ".plt");
2020 BFD_ASSERT (splt != NULL && sdyn != NULL);
2021
2022 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 2023 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
90ace9e9
JT
2024 for (; dyncon < dynconend; dyncon++)
2025 {
2026 Elf_Internal_Dyn dyn;
2027 const char *name;
2028 asection *s;
2029
2030 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
2031
2032 switch (dyn.d_tag)
2033 {
2034 default:
2035 break;
2036
2037 case DT_PLTGOT:
2038 name = ".got";
2039 goto get_vma;
2040 case DT_JMPREL:
2041 name = ".rela.plt";
2042 get_vma:
2043 s = bfd_get_section_by_name (output_bfd, name);
2044 BFD_ASSERT (s != NULL);
2045 dyn.d_un.d_ptr = s->vma;
2046 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2047 break;
2048
2049 case DT_PLTRELSZ:
2050 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2051 BFD_ASSERT (s != NULL);
eea6121a 2052 dyn.d_un.d_val = s->size;
90ace9e9
JT
2053 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2054 break;
2055
2056 case DT_RELASZ:
2057 /* The procedure linkage table relocs (DT_JMPREL) should
2058 not be included in the overall relocs (DT_RELA).
2059 Therefore, we override the DT_RELASZ entry here to
2060 make it not include the JMPREL relocs. Since the
2061 linker script arranges for .rela.plt to follow all
2062 other relocation sections, we don't have to worry
2063 about changing the DT_RELA entry. */
2064 s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2065 if (s != NULL)
eea6121a 2066 dyn.d_un.d_val -= s->size;
90ace9e9
JT
2067 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2068 break;
2069 }
2070 }
2071
2072 /* Fill in the first entry in the procedure linkage table. */
eea6121a 2073 if (splt->size > 0)
90ace9e9
JT
2074 {
2075 memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2076 bfd_put_32 (output_bfd,
2077 (sgot->output_section->vma
2078 + sgot->output_offset + 4
2079 - (splt->output_section->vma + 6)),
2080 splt->contents + 2);
2081 bfd_put_32 (output_bfd,
2082 (sgot->output_section->vma
2083 + sgot->output_offset + 8
2084 - (splt->output_section->vma + 12)),
2085 splt->contents + 8);
cedb70c5 2086 elf_section_data (splt->output_section)->this_hdr.sh_entsize
90ace9e9
JT
2087 = PLT_ENTRY_SIZE;
2088 }
2089 }
2090
2091 /* Fill in the first three entries in the global offset table. */
eea6121a 2092 if (sgot->size > 0)
90ace9e9
JT
2093 {
2094 if (sdyn == NULL)
2095 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2096 else
2097 bfd_put_32 (output_bfd,
2098 sdyn->output_section->vma + sdyn->output_offset,
2099 sgot->contents);
2100 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2101 bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2102 }
2103
2104 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2105
b34976b6 2106 return TRUE;
90ace9e9
JT
2107}
2108
2109#define TARGET_LITTLE_SYM bfd_elf32_vax_vec
2110#define TARGET_LITTLE_NAME "elf32-vax"
2111#define ELF_MACHINE_CODE EM_VAX
2112#define ELF_MAXPAGESIZE 0x1000
2113
2114#define elf_backend_create_dynamic_sections \
2115 _bfd_elf_create_dynamic_sections
2116#define bfd_elf32_bfd_link_hash_table_create \
2117 elf_vax_link_hash_table_create
c152c796 2118#define bfd_elf32_bfd_final_link bfd_elf_gc_common_final_link
90ace9e9
JT
2119
2120#define elf_backend_check_relocs elf_vax_check_relocs
2121#define elf_backend_adjust_dynamic_symbol \
2122 elf_vax_adjust_dynamic_symbol
2123#define elf_backend_size_dynamic_sections \
2124 elf_vax_size_dynamic_sections
2125#define elf_backend_relocate_section elf_vax_relocate_section
2126#define elf_backend_finish_dynamic_symbol \
2127 elf_vax_finish_dynamic_symbol
2128#define elf_backend_finish_dynamic_sections \
2129 elf_vax_finish_dynamic_sections
2130#define elf_backend_gc_mark_hook elf_vax_gc_mark_hook
2131#define elf_backend_gc_sweep_hook elf_vax_gc_sweep_hook
2132#define bfd_elf32_bfd_merge_private_bfd_data \
2133 elf32_vax_merge_private_bfd_data
2134#define bfd_elf32_bfd_set_private_flags \
2135 elf32_vax_set_private_flags
2136#define bfd_elf32_bfd_print_private_bfd_data \
2137 elf32_vax_print_private_bfd_data
2138
2139#define elf_backend_can_gc_sections 1
2140#define elf_backend_want_got_plt 1
2141#define elf_backend_plt_readonly 1
2142#define elf_backend_want_plt_sym 0
2143#define elf_backend_got_header_size 16
f0fe0e16 2144#define elf_backend_rela_normal 1
90ace9e9
JT
2145
2146#include "elf32-target.h"
This page took 0.308369 seconds and 4 git commands to generate.