xref: /netbsd-src/external/gpl3/binutils.old/dist/bfd/elf32-vax.c (revision e992f068c547fd6e84b3f104dc2340adcc955732)
1 /* VAX series support for 32-bit ELF
2    Copyright (C) 1993-2022 Free Software Foundation, Inc.
3    Contributed by Matt Thomas <matt@3am-software.com>.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20    MA 02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28 
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static bool rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 							 struct bfd_hash_table *,
33 							 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bool elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 				  asection *, const Elf_Internal_Rela *);
37 static bool elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 					   struct elf_link_hash_entry *);
39 static bool elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static int elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 				     bfd *, asection *, bfd_byte *,
42 				     Elf_Internal_Rela *,
43 				     Elf_Internal_Sym *, asection **);
44 static bool elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 					   struct elf_link_hash_entry *,
46 					   Elf_Internal_Sym *);
47 static bool elf_vax_finish_dynamic_sections (bfd *, struct bfd_link_info *);
48 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
49 				    const arelent *);
50 
51 static bool elf32_vax_set_private_flags (bfd *, flagword);
52 static bool elf32_vax_print_private_bfd_data (bfd *, void *);
53 
54 static reloc_howto_type howto_table[] = {
55   HOWTO (R_VAX_NONE,		/* type */
56 	 0,			/* rightshift */
57 	 0,			/* size */
58 	 0,			/* bitsize */
59 	 false,			/* pc_relative */
60 	 0,			/* bitpos */
61 	 complain_overflow_dont, /* complain_on_overflow */
62 	 bfd_elf_generic_reloc,	/* special_function */
63 	 "R_VAX_NONE",		/* name */
64 	 false,			/* partial_inplace */
65 	 0,			/* src_mask */
66 	 0x00000000,		/* dst_mask */
67 	 false),		/* pcrel_offset */
68 
69   HOWTO (R_VAX_32,		/* type */
70 	 0,			/* rightshift */
71 	 4,			/* size */
72 	 32,			/* bitsize */
73 	 false,			/* pc_relative */
74 	 0,			/* bitpos */
75 	 complain_overflow_bitfield, /* complain_on_overflow */
76 	 bfd_elf_generic_reloc,	/* special_function */
77 	 "R_VAX_32",		/* name */
78 	 false,			/* partial_inplace */
79 	 0,			/* src_mask */
80 	 0xffffffff,		/* dst_mask */
81 	 false),		/* pcrel_offset */
82 
83   HOWTO (R_VAX_16,		/* type */
84 	 0,			/* rightshift */
85 	 2,			/* size */
86 	 16,			/* bitsize */
87 	 false,			/* pc_relative */
88 	 0,			/* bitpos */
89 	 complain_overflow_bitfield, /* complain_on_overflow */
90 	 bfd_elf_generic_reloc,	/* special_function */
91 	 "R_VAX_16",		/* name */
92 	 false,			/* partial_inplace */
93 	 0,			/* src_mask */
94 	 0x0000ffff,		/* dst_mask */
95 	 false),		/* pcrel_offset */
96 
97   HOWTO (R_VAX_8,		/* type */
98 	 0,			/* rightshift */
99 	 1,			/* size */
100 	 8,			/* bitsize */
101 	 false,			/* pc_relative */
102 	 0,			/* bitpos */
103 	 complain_overflow_bitfield, /* complain_on_overflow */
104 	 bfd_elf_generic_reloc,	/* special_function */
105 	 "R_VAX_8",		/* name */
106 	 false,			/* partial_inplace */
107 	 0,			/* src_mask */
108 	 0x000000ff,		/* dst_mask */
109 	 false),		/* pcrel_offset */
110 
111   HOWTO (R_VAX_PC32,		/* type */
112 	 0,			/* rightshift */
113 	 4,			/* size */
114 	 32,			/* bitsize */
115 	 true,			/* pc_relative */
116 	 0,			/* bitpos */
117 	 complain_overflow_bitfield, /* complain_on_overflow */
118 	 bfd_elf_generic_reloc,	/* special_function */
119 	 "R_VAX_PC32",		/* name */
120 	 false,			/* partial_inplace */
121 	 0,			/* src_mask */
122 	 0xffffffff,		/* dst_mask */
123 	 true),			/* pcrel_offset */
124 
125   HOWTO (R_VAX_PC16,		/* type */
126 	 0,			/* rightshift */
127 	 2,			/* size */
128 	 16,			/* bitsize */
129 	 true,			/* pc_relative */
130 	 0,			/* bitpos */
131 	 complain_overflow_signed, /* complain_on_overflow */
132 	 bfd_elf_generic_reloc,	/* special_function */
133 	 "R_VAX_PC16",		/* name */
134 	 false,			/* partial_inplace */
135 	 0,			/* src_mask */
136 	 0x0000ffff,		/* dst_mask */
137 	 true),			/* pcrel_offset */
138 
139   HOWTO (R_VAX_PC8,		/* type */
140 	 0,			/* rightshift */
141 	 1,			/* size */
142 	 8,			/* bitsize */
143 	 true,			/* pc_relative */
144 	 0,			/* bitpos */
145 	 complain_overflow_signed, /* complain_on_overflow */
146 	 bfd_elf_generic_reloc,	/* special_function */
147 	 "R_VAX_PC8",		/* name */
148 	 false,			/* partial_inplace */
149 	 0,			/* src_mask */
150 	 0x000000ff,		/* dst_mask */
151 	 true),			/* pcrel_offset */
152 
153   HOWTO (R_VAX_GOT32,		/* type */
154 	 0,			/* rightshift */
155 	 4,			/* size */
156 	 32,			/* bitsize */
157 	 true,			/* pc_relative */
158 	 0,			/* bitpos */
159 	 complain_overflow_bitfield, /* complain_on_overflow */
160 	 bfd_elf_generic_reloc,	/* special_function */
161 	 "R_VAX_GOT32",		/* name */
162 	 false,			/* partial_inplace */
163 	 0,			/* src_mask */
164 	 0xffffffff,		/* dst_mask */
165 	 true),			/* pcrel_offset */
166 
167   EMPTY_HOWTO (-1),
168   EMPTY_HOWTO (-1),
169   EMPTY_HOWTO (-1),
170   EMPTY_HOWTO (-1),
171   EMPTY_HOWTO (-1),
172 
173   HOWTO (R_VAX_PLT32,		/* type */
174 	 0,			/* rightshift */
175 	 4,			/* size */
176 	 32,			/* bitsize */
177 	 true,			/* pc_relative */
178 	 0,			/* bitpos */
179 	 complain_overflow_bitfield, /* complain_on_overflow */
180 	 bfd_elf_generic_reloc,	/* special_function */
181 	 "R_VAX_PLT32",		/* name */
182 	 false,			/* partial_inplace */
183 	 0,			/* src_mask */
184 	 0xffffffff,		/* dst_mask */
185 	 true),			/* pcrel_offset */
186 
187   EMPTY_HOWTO (-1),
188   EMPTY_HOWTO (-1),
189   EMPTY_HOWTO (-1),
190   EMPTY_HOWTO (-1),
191   EMPTY_HOWTO (-1),
192 
193   HOWTO (R_VAX_COPY,		/* type */
194 	 0,			/* rightshift */
195 	 0,			/* size */
196 	 0,			/* bitsize */
197 	 false,			/* pc_relative */
198 	 0,			/* bitpos */
199 	 complain_overflow_dont, /* complain_on_overflow */
200 	 bfd_elf_generic_reloc,	/* special_function */
201 	 "R_VAX_COPY",		/* name */
202 	 false,			/* partial_inplace */
203 	 0,			/* src_mask */
204 	 0xffffffff,		/* dst_mask */
205 	 false),		/* pcrel_offset */
206 
207   HOWTO (R_VAX_GLOB_DAT,	/* type */
208 	 0,			/* rightshift */
209 	 4,			/* size */
210 	 32,			/* bitsize */
211 	 false,			/* pc_relative */
212 	 0,			/* bitpos */
213 	 complain_overflow_dont, /* complain_on_overflow */
214 	 bfd_elf_generic_reloc,	/* special_function */
215 	 "R_VAX_GLOB_DAT",	/* name */
216 	 false,			/* partial_inplace */
217 	 0,			/* src_mask */
218 	 0xffffffff,		/* dst_mask */
219 	 false),		/* pcrel_offset */
220 
221   HOWTO (R_VAX_JMP_SLOT,	/* type */
222 	 0,			/* rightshift */
223 	 4,			/* size */
224 	 32,			/* bitsize */
225 	 false,			/* pc_relative */
226 	 0,			/* bitpos */
227 	 complain_overflow_dont, /* complain_on_overflow */
228 	 bfd_elf_generic_reloc,	/* special_function */
229 	 "R_VAX_JMP_SLOT",	/* name */
230 	 false,			/* partial_inplace */
231 	 0,			/* src_mask */
232 	 0xffffffff,		/* dst_mask */
233 	 false),		/* pcrel_offset */
234 
235   HOWTO (R_VAX_RELATIVE,	/* type */
236 	 0,			/* rightshift */
237 	 4,			/* size */
238 	 32,			/* bitsize */
239 	 false,			/* pc_relative */
240 	 0,			/* bitpos */
241 	 complain_overflow_dont, /* complain_on_overflow */
242 	 bfd_elf_generic_reloc,	/* special_function */
243 	 "R_VAX_RELATIVE",	/* name */
244 	 false,			/* partial_inplace */
245 	 0,			/* src_mask */
246 	 0xffffffff,		/* dst_mask */
247 	 false),		/* pcrel_offset */
248 
249   /* GNU extension to record C++ vtable hierarchy */
250   HOWTO (R_VAX_GNU_VTINHERIT,	/* type */
251 	 0,			/* rightshift */
252 	 4,			/* size */
253 	 0,			/* bitsize */
254 	 false,			/* pc_relative */
255 	 0,			/* bitpos */
256 	 complain_overflow_dont, /* complain_on_overflow */
257 	 NULL,			/* special_function */
258 	 "R_VAX_GNU_VTINHERIT",	/* name */
259 	 false,			/* partial_inplace */
260 	 0,			/* src_mask */
261 	 0,			/* dst_mask */
262 	 false),		/* pcrel_offset */
263 
264   /* GNU extension to record C++ vtable member usage */
265   HOWTO (R_VAX_GNU_VTENTRY,	/* type */
266 	 0,			/* rightshift */
267 	 4,			/* size */
268 	 0,			/* bitsize */
269 	 false,			/* pc_relative */
270 	 0,			/* bitpos */
271 	 complain_overflow_dont, /* complain_on_overflow */
272 	 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
273 	 "R_VAX_GNU_VTENTRY",	/* name */
274 	 false,			/* partial_inplace */
275 	 0,			/* src_mask */
276 	 0,			/* dst_mask */
277 	 false),		/* pcrel_offset */
278 };
279 
280 static bool
rtype_to_howto(bfd * abfd,arelent * cache_ptr,Elf_Internal_Rela * dst)281 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
282 {
283   unsigned int r_type;
284 
285   r_type = ELF32_R_TYPE (dst->r_info);
286   if (r_type >= R_VAX_max)
287     {
288       /* xgettext:c-format */
289       _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
290 			  abfd, r_type);
291       bfd_set_error (bfd_error_bad_value);
292       return false;
293     }
294   cache_ptr->howto = &howto_table[r_type];
295   return true;
296 }
297 
298 #define elf_info_to_howto rtype_to_howto
299 
300 static const struct
301 {
302   bfd_reloc_code_real_type bfd_val;
303   int elf_val;
304 } reloc_map[] = {
305   { BFD_RELOC_NONE, R_VAX_NONE },
306   { BFD_RELOC_32, R_VAX_32 },
307   { BFD_RELOC_16, R_VAX_16 },
308   { BFD_RELOC_8, R_VAX_8 },
309   { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310   { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311   { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312   { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313   { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314   { BFD_RELOC_NONE, R_VAX_COPY },
315   { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316   { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317   { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318   { BFD_RELOC_CTOR, R_VAX_32 },
319   { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320   { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321 };
322 
323 static reloc_howto_type *
reloc_type_lookup(bfd * abfd ATTRIBUTE_UNUSED,bfd_reloc_code_real_type code)324 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
325 {
326   unsigned int i;
327   for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328     {
329       if (reloc_map[i].bfd_val == code)
330 	return &howto_table[reloc_map[i].elf_val];
331     }
332   return 0;
333 }
334 
335 static reloc_howto_type *
reloc_name_lookup(bfd * abfd ATTRIBUTE_UNUSED,const char * r_name)336 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337 		   const char *r_name)
338 {
339   unsigned int i;
340 
341   for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342     if (howto_table[i].name != NULL
343 	&& strcasecmp (howto_table[i].name, r_name) == 0)
344       return &howto_table[i];
345 
346   return NULL;
347 }
348 
349 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
350 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
351 #define ELF_ARCH bfd_arch_vax
352 /* end code generated by elf.el */
353 
354 /* Functions for the VAX ELF linker.  */
355 
356 /* The name of the dynamic interpreter.  This is put in the .interp
357    section.  */
358 
359 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360 
361 /* The size in bytes of an entry in the procedure linkage table.  */
362 
363 #define PLT_ENTRY_SIZE 12
364 
365 /* The first entry in a procedure linkage table looks like this.  See
366    the SVR4 ABI VAX supplement to see how this works.  */
367 
368 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369 {
370   0xdd, 0xef,		/* pushl l^ */
371   0, 0, 0, 0,		/* offset to .plt.got + 4 */
372   0x17, 0xff,		/* jmp @L^(pc) */
373   0, 0, 0, 0,		/* offset to .plt.got + 8 */
374 };
375 
376 /* Subsequent entries in a procedure linkage table look like this.  */
377 
378 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379 {
380   0xfc, 0x0f,		/* .word ^M<r11:r2> */
381   0x16, 0xef,		/* jsb L^(pc) */
382   0, 0, 0, 0,		/* replaced with offset to start of .plt  */
383   0, 0, 0, 0,		/* index into .rela.plt */
384 };
385 
386 /* The VAX linker needs to keep track of the number of relocs that it
387    decides to copy in check_relocs for each symbol.  This is so that it
388    can discard PC relative relocs if it doesn't need them when linking
389    with -Bsymbolic.  We store the information in a field extending the
390    regular ELF linker hash table.  */
391 
392 /* This structure keeps track of the number of PC relative relocs we have
393    copied for a given symbol.  */
394 
395 struct elf_vax_pcrel_relocs_copied
396 {
397   /* Next section.  */
398   struct elf_vax_pcrel_relocs_copied *next;
399   /* A section in dynobj.  */
400   asection *section;
401   /* Number of relocs copied in this section.  */
402   bfd_size_type count;
403 };
404 
405 /* VAX ELF linker hash entry.  */
406 
407 struct elf_vax_link_hash_entry
408 {
409   struct elf_link_hash_entry root;
410 
411   /* Number of PC relative relocs copied for this symbol.  */
412   struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413 
414   bfd_vma got_addend;
415 };
416 
417 /* Declare this now that the above structures are defined.  */
418 
419 static bool elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
420 				    void *);
421 
422 /* Declare this now that the above structures are defined.  */
423 
424 static bool elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
425 					     void *);
426 
427 /* Traverse an VAX ELF linker hash table.  */
428 
429 #define elf_vax_link_hash_traverse(table, func, info)			\
430   (elf_link_hash_traverse						\
431    ((table),								\
432     (bool (*) (struct elf_link_hash_entry *, void *)) (func),		\
433     (info)))
434 
435 /* Create an entry in an VAX ELF linker hash table.  */
436 
437 static struct bfd_hash_entry *
elf_vax_link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)438 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439 			   struct bfd_hash_table *table,
440 			   const char *string)
441 {
442   struct elf_vax_link_hash_entry *ret =
443     (struct elf_vax_link_hash_entry *) entry;
444 
445   /* Allocate the structure if it has not already been allocated by a
446      subclass.  */
447   if (ret == NULL)
448     ret = ((struct elf_vax_link_hash_entry *)
449 	   bfd_hash_allocate (table,
450 			      sizeof (struct elf_vax_link_hash_entry)));
451   if (ret == NULL)
452     return (struct bfd_hash_entry *) ret;
453 
454   /* Call the allocation method of the superclass.  */
455   ret = ((struct elf_vax_link_hash_entry *)
456 	 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457 				     table, string));
458   if (ret != NULL)
459     {
460       ret->pcrel_relocs_copied = NULL;
461     }
462 
463   return (struct bfd_hash_entry *) ret;
464 }
465 
466 /* Create an VAX ELF linker hash table.  */
467 
468 static struct bfd_link_hash_table *
elf_vax_link_hash_table_create(bfd * abfd)469 elf_vax_link_hash_table_create (bfd *abfd)
470 {
471   struct elf_link_hash_table *ret;
472   size_t amt = sizeof (struct elf_link_hash_table);
473 
474   ret = bfd_zmalloc (amt);
475   if (ret == NULL)
476     return NULL;
477 
478   if (!_bfd_elf_link_hash_table_init (ret, abfd,
479 				      elf_vax_link_hash_newfunc,
480 				      sizeof (struct elf_vax_link_hash_entry),
481 				      GENERIC_ELF_DATA))
482     {
483       free (ret);
484       return NULL;
485     }
486 
487   return &ret->root;
488 }
489 
490 /* Keep vax-specific flags in the ELF header */
491 static bool
elf32_vax_set_private_flags(bfd * abfd,flagword flags)492 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
493 {
494   elf_elfheader (abfd)->e_flags = flags;
495   elf_flags_init (abfd) = true;
496   return true;
497 }
498 
499 /* Copy vax-specific data from one module to another */
500 static bool
elf32_vax_copy_private_bfd_data(bfd * ibfd,bfd * obfd)501 elf32_vax_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
502 {
503   flagword in_flags;
504 
505   if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
506       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
507     return true;
508 
509   in_flags = elf_elfheader (ibfd)->e_flags;
510 
511   elf_elfheader (obfd)->e_flags = in_flags;
512   elf_flags_init (obfd) = true;
513 
514   return true;
515 }
516 
517 /* Merge backend specific data from an object file to the output
518    object file when linking.  */
519 static bool
elf32_vax_merge_private_bfd_data(bfd * ibfd,struct bfd_link_info * info)520 elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
521 {
522   bfd *obfd = info->output_bfd;
523   flagword in_flags;
524 
525   if (   bfd_get_flavour (ibfd) != bfd_target_elf_flavour
526       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
527     return true;
528 
529   in_flags  = elf_elfheader (ibfd)->e_flags;
530 
531   if (!elf_flags_init (obfd))
532     {
533       elf_flags_init (obfd) = true;
534       elf_elfheader (obfd)->e_flags = in_flags;
535     }
536 
537   return true;
538 }
539 
540 /* Display the flags field */
541 static bool
elf32_vax_print_private_bfd_data(bfd * abfd,void * ptr)542 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
543 {
544   FILE *file = (FILE *) ptr;
545 
546   BFD_ASSERT (abfd != NULL && ptr != NULL);
547 
548   /* Print normal ELF private data.  */
549   _bfd_elf_print_private_bfd_data (abfd, ptr);
550 
551   /* Ignore init flag - it may not be set, despite the flags field containing valid data.  */
552 
553   /* xgettext:c-format */
554   fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
555 
556   if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
557     fprintf (file, _(" [nonpic]"));
558 
559   if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
560     fprintf (file, _(" [d-float]"));
561 
562   if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
563     fprintf (file, _(" [g-float]"));
564 
565   fputc ('\n', file);
566 
567   return true;
568 }
569 /* Look through the relocs for a section during the first phase, and
570    allocate space in the global offset table or procedure linkage
571    table.  */
572 
573 static bool
elf_vax_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)574 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
575 		      const Elf_Internal_Rela *relocs)
576 {
577   bfd *dynobj;
578   Elf_Internal_Shdr *symtab_hdr;
579   struct elf_link_hash_entry **sym_hashes;
580   const Elf_Internal_Rela *rel;
581   const Elf_Internal_Rela *rel_end;
582   asection *sreloc;
583 
584   if (bfd_link_relocatable (info))
585     return true;
586 
587   dynobj = elf_hash_table (info)->dynobj;
588   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
589   sym_hashes = elf_sym_hashes (abfd);
590 
591   sreloc = NULL;
592 
593   rel_end = relocs + sec->reloc_count;
594   for (rel = relocs; rel < rel_end; rel++)
595     {
596       unsigned long r_symndx;
597       struct elf_link_hash_entry *h;
598 
599       r_symndx = ELF32_R_SYM (rel->r_info);
600 
601       if (r_symndx < symtab_hdr->sh_info)
602 	h = NULL;
603       else
604 	{
605 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
606 	  while (h->root.type == bfd_link_hash_indirect
607 		 || h->root.type == bfd_link_hash_warning)
608 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
609 	}
610 
611       switch (ELF32_R_TYPE (rel->r_info))
612 	{
613 	case R_VAX_GOT32:
614 	  BFD_ASSERT (h != NULL);
615 
616 	  /* If this is a local symbol, we resolve it directly without
617 	     creating a global offset table entry.  */
618 	  if (SYMBOL_REFERENCES_LOCAL (info, h)
619 	      || h == elf_hash_table (info)->hgot
620 	      || h == elf_hash_table (info)->hplt)
621 	    break;
622 
623 	  /* This symbol requires a global offset table entry.  */
624 
625 	  if (dynobj == NULL)
626 	    {
627 	      /* Create the .got section.  */
628 	      elf_hash_table (info)->dynobj = dynobj = abfd;
629 	      if (!_bfd_elf_create_got_section (dynobj, info))
630 		return false;
631 	    }
632 
633 	  if (h != NULL)
634 	    {
635 	      struct elf_vax_link_hash_entry *eh;
636 
637 	      eh = (struct elf_vax_link_hash_entry *) h;
638 	      if (h->got.refcount == -1)
639 		{
640 		  h->got.refcount = 1;
641 		  eh->got_addend = rel->r_addend;
642 		}
643 	      else
644 		{
645 		  h->got.refcount++;
646 		  if (eh->got_addend != (bfd_vma) rel->r_addend)
647 		    _bfd_error_handler
648 		      /* xgettext:c-format */
649 		      (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
650 			 " not match previous GOT addend of %" PRId64),
651 			 abfd, (int64_t) rel->r_addend, h->root.root.string,
652 			 (int64_t) eh->got_addend);
653 
654 		}
655 	    }
656 	  break;
657 
658 	case R_VAX_PLT32:
659 	  /* This symbol requires a procedure linkage table entry.  We
660 	     actually build the entry in adjust_dynamic_symbol,
661 	     because this might be a case of linking PIC code which is
662 	     never referenced by a dynamic object, in which case we
663 	     don't need to generate a procedure linkage table entry
664 	     after all.  */
665 	  BFD_ASSERT (h != NULL);
666 
667 	  /* If this is a local symbol, we resolve it directly without
668 	     creating a procedure linkage table entry.  */
669 	  if (h->forced_local)
670 	    break;
671 
672 	  h->needs_plt = 1;
673 	  if (h->plt.refcount == -1)
674 	    h->plt.refcount = 1;
675 	  else
676 	    h->plt.refcount++;
677 	  break;
678 
679 	case R_VAX_PC8:
680 	case R_VAX_PC16:
681 	case R_VAX_PC32:
682 	  /* If we are creating a shared library and this is not a local
683 	     symbol, we need to copy the reloc into the shared library.
684 	     However when linking with -Bsymbolic and this is a global
685 	     symbol which is defined in an object we are including in the
686 	     link (i.e., DEF_REGULAR is set), then we can resolve the
687 	     reloc directly.  At this point we have not seen all the input
688 	     files, so it is possible that DEF_REGULAR is not set now but
689 	     will be set later (it is never cleared).  We account for that
690 	     possibility below by storing information in the
691 	     pcrel_relocs_copied field of the hash table entry.  */
692 	  if (!(bfd_link_pic (info)
693 		&& (sec->flags & SEC_ALLOC) != 0
694 		&& h != NULL
695 		&& (!info->symbolic
696 		    || !h->def_regular)))
697 	    {
698 	      if (h != NULL
699 		  && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
700 		  && !h->forced_local)
701 		{
702 		  /* Make sure a plt entry is created for this symbol if
703 		     it turns out to be a function defined by a dynamic
704 		     object.  */
705 		  if (h->plt.refcount == -1)
706 		    h->plt.refcount = 1;
707 		  else
708 		    h->plt.refcount++;
709 		}
710 	      break;
711 	    }
712 	  /* If this is a local symbol, we can resolve it directly.  */
713 	  if (h != NULL
714 	      && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
715 		  || h->forced_local))
716 	    break;
717 
718 	  /* Fall through.  */
719 	case R_VAX_8:
720 	case R_VAX_16:
721 	case R_VAX_32:
722 	  if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
723 	    {
724 	      /* Make sure a plt entry is created for this symbol if it
725 		 turns out to be a function defined by a dynamic object.  */
726 	      if (h->plt.refcount == -1)
727 		h->plt.refcount = 1;
728 	      else
729 		h->plt.refcount++;
730 	    }
731 
732 	  /* Non-GOT reference may need a copy reloc in executable or
733 	     a dynamic reloc in shared library.  */
734 	  if (h != NULL)
735 	    h->non_got_ref = 1;
736 
737 	  /* If we are creating a shared library, we need to copy the
738 	     reloc into the shared library.  */
739 	  if (bfd_link_pic (info)
740 	      && (sec->flags & SEC_ALLOC) != 0)
741 	    {
742 	      /* When creating a shared object, we must copy these
743 		 reloc types into the output file.  We create a reloc
744 		 section in dynobj and make room for this reloc.  */
745 	      if (sreloc == NULL)
746 		{
747 		  sreloc = _bfd_elf_make_dynamic_reloc_section
748 		    (sec, dynobj, 2, abfd, /*rela?*/ true);
749 
750 		  if (sreloc == NULL)
751 		    return false;
752 
753 		  if (sec->flags & SEC_READONLY)
754 		    {
755 			if (bfd_link_textrel_check(info))
756 			  (*_bfd_error_handler)
757 			    (_("warning: dynamic relocation to `%s' in readonly section `%s'"),
758 			     h ? h->root.root.string : "?", sec->name);
759 			info->flags |= DF_TEXTREL;
760 		    }
761 		}
762 
763 	      sreloc->size += sizeof (Elf32_External_Rela);
764 
765 	      /* If we are linking with -Bsymbolic, we count the number of
766 		 PC relative relocations we have entered for this symbol,
767 		 so that we can discard them again if the symbol is later
768 		 defined by a regular object.  Note that this function is
769 		 only called if we are using a vaxelf linker hash table,
770 		 which means that h is really a pointer to an
771 		 elf_vax_link_hash_entry.  */
772 	      if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
773 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
774 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
775 		  && info->symbolic)
776 		{
777 		  struct elf_vax_link_hash_entry *eh;
778 		  struct elf_vax_pcrel_relocs_copied *p;
779 
780 		  eh = (struct elf_vax_link_hash_entry *) h;
781 
782 		  for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
783 		    if (p->section == sreloc)
784 		      break;
785 
786 		  if (p == NULL)
787 		    {
788 		      p = ((struct elf_vax_pcrel_relocs_copied *)
789 			   bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
790 		      if (p == NULL)
791 			return false;
792 		      p->next = eh->pcrel_relocs_copied;
793 		      eh->pcrel_relocs_copied = p;
794 		      p->section = sreloc;
795 		      p->count = 0;
796 		    }
797 
798 		  ++p->count;
799 		}
800 	    }
801 
802 	  break;
803 
804 	  /* This relocation describes the C++ object vtable hierarchy.
805 	     Reconstruct it for later use during GC.  */
806 	case R_VAX_GNU_VTINHERIT:
807 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
808 	    return false;
809 	  break;
810 
811 	  /* This relocation describes which C++ vtable entries are actually
812 	     used.  Record for later use during GC.  */
813 	case R_VAX_GNU_VTENTRY:
814 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
815 	    return false;
816 	  break;
817 
818 	default:
819 	  break;
820 	}
821     }
822 
823   return true;
824 }
825 
826 /* Return the section that should be marked against GC for a given
827    relocation.  */
828 
829 static asection *
elf_vax_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)830 elf_vax_gc_mark_hook (asection *sec,
831 		      struct bfd_link_info *info,
832 		      Elf_Internal_Rela *rel,
833 		      struct elf_link_hash_entry *h,
834 		      Elf_Internal_Sym *sym)
835 {
836   if (h != NULL)
837     switch (ELF32_R_TYPE (rel->r_info))
838       {
839       case R_VAX_GNU_VTINHERIT:
840       case R_VAX_GNU_VTENTRY:
841 	return NULL;
842       }
843 
844   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
845 }
846 
847 /* Adjust a symbol defined by a dynamic object and referenced by a
848    regular object.  The current definition is in some section of the
849    dynamic object, but we're not including those sections.  We have to
850    change the definition to something the rest of the link can
851    understand.  */
852 
853 static bool
elf_vax_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)854 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
855 			       struct elf_link_hash_entry *h)
856 {
857   bfd *dynobj;
858   asection *s;
859 
860   dynobj = elf_hash_table (info)->dynobj;
861 
862   /* Make sure we know what is going on here.  */
863   BFD_ASSERT (dynobj != NULL
864 	      && (h->needs_plt
865 		  || h->type == STT_GNU_IFUNC
866 		  || h->is_weakalias
867 		  || (h->def_dynamic
868 		      && h->ref_regular
869 		      && !h->def_regular)));
870 
871   /* If this is a function, put it in the procedure linkage table.  We
872      will fill in the contents of the procedure linkage table later,
873      when we know the address of the .got section.  */
874   if ((h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
875       || h->needs_plt)
876     {
877       if (h->plt.refcount <= 0
878 	  || SYMBOL_CALLS_LOCAL (info, h)
879 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
880 	      && h->root.type == bfd_link_hash_undefweak))
881 	{
882 	  /* This case can occur if we saw a PLTxx reloc in an input
883 	     file, but the symbol was never referred to by a dynamic
884 	     object, or if all references were garbage collected.  In
885 	     such a case, we don't actually need to build a procedure
886 	     linkage table, and we can just do a PCxx reloc instead.  */
887 	  h->plt.offset = (bfd_vma) -1;
888 	  h->needs_plt = 0;
889 	  return true;
890 	}
891 
892       s = elf_hash_table (info)->splt;
893       BFD_ASSERT (s != NULL);
894 
895       /* If this is the first .plt entry, make room for the special
896 	 first entry.  */
897       if (s->size == 0)
898 	{
899 	  s->size += PLT_ENTRY_SIZE;
900 	}
901 
902       /* If this symbol is not defined in a regular file, and we are
903 	 not generating a shared library, then set the symbol to this
904 	 location in the .plt.  This is required to make function
905 	 pointers compare as equal between the normal executable and
906 	 the shared library.  */
907       if (!bfd_link_pic (info)
908 	  && !h->def_regular)
909 	{
910 	  h->root.u.def.section = s;
911 	  h->root.u.def.value = s->size;
912 	}
913 
914       h->plt.offset = s->size;
915 
916       /* Make room for this entry.  */
917       s->size += PLT_ENTRY_SIZE;
918 
919       /* We also need to make an entry in the .got.plt section, which
920 	 will be placed in the .got section by the linker script.  */
921 
922       s = elf_hash_table (info)->sgotplt;
923       BFD_ASSERT (s != NULL);
924       s->size += 4;
925 
926       /* We also need to make an entry in the .rela.plt section.  */
927 
928       s = elf_hash_table (info)->srelplt;
929       BFD_ASSERT (s != NULL);
930       s->size += sizeof (Elf32_External_Rela);
931 
932       return true;
933     }
934 
935   /* Reinitialize the plt offset now that it is not used as a reference
936      count any more.  */
937   h->plt.offset = (bfd_vma) -1;
938 
939   /* If this is a weak symbol, and there is a real definition, the
940      processor independent code will have arranged for us to see the
941      real definition first, and we can just use the same value.  */
942   if (h->is_weakalias)
943     {
944       struct elf_link_hash_entry *def = weakdef (h);
945       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
946       h->root.u.def.section = def->root.u.def.section;
947       h->root.u.def.value = def->root.u.def.value;
948       return true;
949     }
950 
951   /* This is a reference to a symbol defined by a dynamic object which
952      is not a function.  */
953 
954   /* If we are creating a shared library, we must presume that the
955      only references to the symbol are via the global offset table.
956      For such cases we need not do anything here; the relocations will
957      be handled correctly by relocate_section.  */
958   if (bfd_link_pic (info))
959     return true;
960 
961   /* If there are no references to this symbol that do not use the
962      GOT relocation, we don't need to generate a copy reloc.  */
963   if (!h->non_got_ref)
964     return true;
965 
966   /* We must allocate the symbol in our .dynbss section, which will
967      become part of the .bss section of the executable.  There will be
968      an entry for this symbol in the .dynsym section.  The dynamic
969      object will contain position independent code, so all references
970      from the dynamic object to this symbol will go through the global
971      offset table.  The dynamic linker will use the .dynsym entry to
972      determine the address it must put in the global offset table, so
973      both the dynamic object and the regular object will refer to the
974      same memory location for the variable.  */
975 
976   s = bfd_get_linker_section (dynobj, ".dynbss");
977   BFD_ASSERT (s != NULL);
978 
979   /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
980      copy the initial value out of the dynamic object and into the
981      runtime process image.  We need to remember the offset into the
982      .rela.bss section we are going to use.  */
983   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
984     {
985       asection *srel;
986 
987       srel = bfd_get_linker_section (dynobj, ".rela.bss");
988       BFD_ASSERT (srel != NULL);
989       srel->size += sizeof (Elf32_External_Rela);
990       h->needs_copy = 1;
991     }
992 
993   return _bfd_elf_adjust_dynamic_copy (info, h, s);
994 }
995 
996 /* This function is called via elf_link_hash_traverse.  It resets GOT
997    and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
998    will be done.  */
999 
1000 static bool
elf_vax_discard_got_entries(struct elf_link_hash_entry * h,void * infoptr ATTRIBUTE_UNUSED)1001 elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
1002 			     void *infoptr ATTRIBUTE_UNUSED)
1003 {
1004   h->got.refcount = -1;
1005   h->plt.refcount = -1;
1006 
1007   return true;
1008 }
1009 
1010 /* Discard unused dynamic data if this is a static link.  */
1011 
1012 static bool
elf_vax_always_size_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)1013 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1014 			      struct bfd_link_info *info)
1015 {
1016   bfd *dynobj;
1017   asection *s;
1018 
1019   dynobj = elf_hash_table (info)->dynobj;
1020 
1021   if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
1022     {
1023       /* We may have created entries in the .rela.got and .got sections.
1024 	 However, if we are not creating the dynamic sections, we will
1025 	 not actually use these entries.  Reset the size of .rela.got
1026 	 and .got, which will cause them to get stripped from the output
1027 	 file below.  */
1028       s = elf_hash_table (info)->srelgot;
1029       if (s != NULL)
1030 	s->size = 0;
1031       s = elf_hash_table (info)->sgotplt;
1032       if (s != NULL)
1033 	s->size = 0;
1034       s = elf_hash_table (info)->sgot;
1035       if (s != NULL)
1036 	s->size = 0;
1037     }
1038 
1039   /* If this is a static link, we need to discard all the got entries we've
1040      recorded.  */
1041   if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1042     elf_link_hash_traverse (elf_hash_table (info),
1043 			    elf_vax_discard_got_entries,
1044 			    info);
1045 
1046   return true;
1047 }
1048 
1049 /* Set the sizes of the dynamic sections.  */
1050 
1051 static bool
elf_vax_size_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)1052 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1053 {
1054   bfd *dynobj;
1055   asection *s;
1056   bool relocs;
1057 
1058   dynobj = elf_hash_table (info)->dynobj;
1059   BFD_ASSERT (dynobj != NULL);
1060 
1061   if (elf_hash_table (info)->dynamic_sections_created)
1062     {
1063       /* Set the contents of the .interp section to the interpreter.  */
1064       if (bfd_link_executable (info) && !info->nointerp)
1065 	{
1066 	  s = bfd_get_linker_section (dynobj, ".interp");
1067 	  BFD_ASSERT (s != NULL);
1068 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1069 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1070 	}
1071     }
1072 
1073   /* If this is a -Bsymbolic shared link, then we need to discard all PC
1074      relative relocs against symbols defined in a regular object.  We
1075      allocated space for them in the check_relocs routine, but we will not
1076      fill them in in the relocate_section routine.  */
1077   if (bfd_link_pic (info) && info->symbolic)
1078     elf_vax_link_hash_traverse (elf_hash_table (info),
1079 				elf_vax_discard_copies,
1080 				NULL);
1081 
1082   /* If this is a -Bsymbolic shared link, we need to discard all the got
1083      entries we've recorded.  Otherwise, we need to instantiate (allocate
1084      space for them).  */
1085   elf_link_hash_traverse (elf_hash_table (info),
1086 			  elf_vax_instantiate_got_entries,
1087 			  info);
1088 
1089   /* The check_relocs and adjust_dynamic_symbol entry points have
1090      determined the sizes of the various dynamic sections.  Allocate
1091      memory for them.  */
1092   relocs = false;
1093   for (s = dynobj->sections; s != NULL; s = s->next)
1094     {
1095       const char *name;
1096 
1097       if ((s->flags & SEC_LINKER_CREATED) == 0)
1098 	continue;
1099 
1100       /* It's OK to base decisions on the section name, because none
1101 	 of the dynobj section names depend upon the input files.  */
1102       name = bfd_section_name (s);
1103 
1104       if (strcmp (name, ".plt") == 0)
1105 	{
1106 	  /* Remember whether there is a PLT.  */
1107 	  ;
1108 	}
1109       else if (startswith (name, ".rela"))
1110 	{
1111 	  if (s->size != 0)
1112 	    {
1113 	      if (strcmp (name, ".rela.plt") != 0)
1114 		relocs = true;
1115 
1116 	      /* We use the reloc_count field as a counter if we need
1117 		 to copy relocs into the output file.  */
1118 	      s->reloc_count = 0;
1119 	    }
1120 	}
1121       else if (! startswith (name, ".got")
1122 	       && strcmp (name, ".dynbss") != 0)
1123 	{
1124 	  /* It's not one of our sections, so don't allocate space.  */
1125 	  continue;
1126 	}
1127 
1128       if (s->size == 0)
1129 	{
1130 	  /* If we don't need this section, strip it from the
1131 	     output file.  This is mostly to handle .rela.bss and
1132 	     .rela.plt.  We must create both sections in
1133 	     create_dynamic_sections, because they must be created
1134 	     before the linker maps input sections to output
1135 	     sections.  The linker does that before
1136 	     adjust_dynamic_symbol is called, and it is that
1137 	     function which decides whether anything needs to go
1138 	     into these sections.  */
1139 	  s->flags |= SEC_EXCLUDE;
1140 	  continue;
1141 	}
1142 
1143       if ((s->flags & SEC_HAS_CONTENTS) == 0)
1144 	continue;
1145 
1146       /* Allocate memory for the section contents.  */
1147       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1148       if (s->contents == NULL)
1149 	return false;
1150     }
1151 
1152   return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
1153 }
1154 
1155 /* This function is called via elf_vax_link_hash_traverse if we are
1156    creating a shared object with -Bsymbolic.  It discards the space
1157    allocated to copy PC relative relocs against symbols which are defined
1158    in regular objects.  We allocated space for them in the check_relocs
1159    routine, but we won't fill them in in the relocate_section routine.  */
1160 
1161 static bool
elf_vax_discard_copies(struct elf_vax_link_hash_entry * h,void * ignore ATTRIBUTE_UNUSED)1162 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1163 			void * ignore ATTRIBUTE_UNUSED)
1164 {
1165   struct elf_vax_pcrel_relocs_copied *s;
1166 
1167   /* We only discard relocs for symbols defined in a regular object.  */
1168   if (!h->root.def_regular)
1169     return true;
1170 
1171   for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1172     s->section->size -= s->count * sizeof (Elf32_External_Rela);
1173 
1174   return true;
1175 }
1176 
1177 /* This function is called via elf_link_hash_traverse.  It looks for
1178    entries that have GOT or PLT (.GOT) references.  If creating a shared
1179    object with -Bsymbolic, or the symbol has been forced local, then it
1180    resets the reference count back to -1 so normal PC32 relocation will
1181    be done.  Otherwise space in the .got and .rela.got will be reserved
1182    for the symbol.  */
1183 
1184 static bool
elf_vax_instantiate_got_entries(struct elf_link_hash_entry * h,void * infoptr)1185 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1186 {
1187   struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1188   bfd *dynobj;
1189   asection *sgot;
1190   asection *srelgot;
1191 
1192   /* We don't care about non-GOT (and non-PLT) entries.  */
1193   if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1194     return true;
1195 
1196   dynobj = elf_hash_table (info)->dynobj;
1197   BFD_ASSERT (dynobj != NULL);
1198 
1199   sgot = elf_hash_table (info)->sgot;
1200   srelgot = elf_hash_table (info)->srelgot;
1201 
1202   if (SYMBOL_REFERENCES_LOCAL (info, h))
1203     {
1204       h->got.refcount = -1;
1205       h->plt.refcount = -1;
1206     }
1207   else if (h->got.refcount > 0)
1208     {
1209       /* Make sure this symbol is output as a dynamic symbol.  */
1210       if (h->dynindx == -1)
1211 	{
1212 	  if (!bfd_elf_link_record_dynamic_symbol (info, h))
1213 	    return false;
1214 	}
1215 
1216       /* Allocate space in the .got and .rela.got sections.  */
1217       if (bfd_link_pic (info) || WILL_CALL_FINISH_DYNAMIC_SYMBOL (
1218           elf_hash_table (info)->dynamic_sections_created, 0, h))
1219 	{
1220 	  sgot->size += 4;
1221 	  srelgot->size += sizeof (Elf32_External_Rela);
1222 	}
1223     }
1224 
1225   return true;
1226 }
1227 
1228 /* Relocate an VAX ELF section.  */
1229 
1230 static int
elf_vax_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)1231 elf_vax_relocate_section (bfd *output_bfd,
1232 			  struct bfd_link_info *info,
1233 			  bfd *input_bfd,
1234 			  asection *input_section,
1235 			  bfd_byte *contents,
1236 			  Elf_Internal_Rela *relocs,
1237 			  Elf_Internal_Sym *local_syms,
1238 			  asection **local_sections)
1239 {
1240   Elf_Internal_Shdr *symtab_hdr;
1241   struct elf_link_hash_entry **sym_hashes;
1242   bfd_vma plt_index;
1243   bfd_vma got_offset;
1244   asection *sgot;
1245   asection *splt;
1246   asection *sgotplt;
1247   asection *sreloc;
1248   Elf_Internal_Rela *rel;
1249   Elf_Internal_Rela *relend;
1250 
1251   symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1252   sym_hashes = elf_sym_hashes (input_bfd);
1253 
1254   sgot = NULL;
1255   splt = NULL;
1256   sgotplt = NULL;
1257   sreloc = NULL;
1258 
1259   rel = relocs;
1260   relend = relocs + input_section->reloc_count;
1261   for (; rel < relend; rel++)
1262     {
1263       int r_type;
1264       reloc_howto_type *howto;
1265       unsigned long r_symndx;
1266       struct elf_link_hash_entry *h;
1267       Elf_Internal_Sym *sym;
1268       asection *sec;
1269       bfd_vma relocation;
1270       bfd_reloc_status_type r;
1271 
1272       r_type = ELF32_R_TYPE (rel->r_info);
1273       if (r_type < 0 || r_type >= (int) R_VAX_max)
1274 	{
1275 	  bfd_set_error (bfd_error_bad_value);
1276 	  return false;
1277 	}
1278       howto = howto_table + r_type;
1279 
1280       r_symndx = ELF32_R_SYM (rel->r_info);
1281       h = NULL;
1282       sym = NULL;
1283       sec = NULL;
1284       if (r_symndx < symtab_hdr->sh_info)
1285 	{
1286 	  sym = local_syms + r_symndx;
1287 	  sec = local_sections[r_symndx];
1288 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1289 	}
1290       else
1291 	{
1292 	  bool unresolved_reloc;
1293 	  bool warned, ignored;
1294 
1295 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1296 				   r_symndx, symtab_hdr, sym_hashes,
1297 				   h, sec, relocation,
1298 				   unresolved_reloc, warned, ignored);
1299 
1300 	  if ((h->root.type == bfd_link_hash_defined
1301 	      || h->root.type == bfd_link_hash_defweak)
1302 	      && ((r_type == R_VAX_PLT32
1303 		   && h->plt.offset != (bfd_vma) -1
1304 		   && !h->forced_local
1305 		   && elf_hash_table (info)->dynamic_sections_created)
1306 		  || (r_type == R_VAX_GOT32
1307 		      && h->got.offset != (bfd_vma) -1
1308 		      && !h->forced_local
1309 		      && elf_hash_table (info)->dynamic_sections_created
1310 		      && (! bfd_link_pic (info)
1311 			  || (! info->symbolic && h->dynindx != -1)
1312 			  || !h->def_regular))
1313 		  || (bfd_link_pic (info)
1314 		      && ((! info->symbolic && h->dynindx != -1)
1315 			  || !h->def_regular)
1316 		      && ((input_section->flags & SEC_ALLOC) != 0
1317 			  /* DWARF will emit R_VAX_32 relocations in its
1318 			     sections against symbols defined externally
1319 			     in shared libraries.  We can't do anything
1320 			     with them here.  */
1321 
1322 			  || ((input_section->flags & SEC_DEBUGGING) != 0
1323 			      && h->def_dynamic))
1324 		      && (r_type == R_VAX_8
1325 			  || r_type == R_VAX_16
1326 			  || r_type == R_VAX_32))))
1327 	    /* In these cases, we don't need the relocation
1328 	       value.  We check specially because in some
1329 	       obscure cases sec->output_section will be NULL.  */
1330 	    relocation = 0;
1331 	}
1332 
1333       if (sec != NULL && discarded_section (sec))
1334 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1335 					 rel, 1, relend, howto, 0, contents);
1336 
1337       if (bfd_link_relocatable (info))
1338 	continue;
1339 
1340       switch (r_type)
1341 	{
1342 	case R_VAX_GOT32:
1343 	  /* Relocation is to the address of the entry for this symbol
1344 	     in the global offset table.  */
1345 
1346 	  /* Resolve a GOTxx reloc against a local symbol directly,
1347 	     without using the global offset table.  */
1348 	  if (h == NULL
1349 	      || h->got.offset == (bfd_vma) -1)
1350 	    break;
1351 
1352 	  {
1353 	    bfd_vma off;
1354 
1355 	    sgot = elf_hash_table (info)->sgot;
1356 	    BFD_ASSERT (sgot != NULL);
1357 
1358 	    off = h->got.offset;
1359 	    BFD_ASSERT (off < sgot->size);
1360 
1361 	    bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1362 
1363 	    relocation = sgot->output_offset + off;
1364 	    /* The GOT relocation uses the addend.  */
1365 	    rel->r_addend = 0;
1366 
1367 	    /* Change the reference to be indirect.  */
1368 	    contents[rel->r_offset - 1] |= 0x10;
1369 	    relocation += sgot->output_section->vma;
1370 	  }
1371 	  break;
1372 
1373 	case R_VAX_PC32:
1374 	  /* If we are creating an executable and the function this
1375 	     reloc refers to is in a shared lib, then we made a PLT
1376 	     entry for this symbol and need to handle the reloc like
1377 	     a PLT reloc.  */
1378 	  if (bfd_link_pic (info))
1379 	     goto r_vax_pc32_shared;
1380 	  /* Fall through.  */
1381 	case R_VAX_PLT32:
1382 	  /* Relocation is to the entry for this symbol in the
1383 	     procedure linkage table.  */
1384 
1385 	  /* Resolve a PLTxx reloc against a local symbol directly,
1386 	     without using the procedure linkage table.  */
1387 	  if (h == NULL
1388 	      || h->plt.offset == (bfd_vma) -1)
1389 	    break;
1390 
1391 	  splt = elf_hash_table (info)->splt;
1392 	  BFD_ASSERT (splt != NULL);
1393 
1394 	  sgotplt = elf_hash_table (info)->sgotplt;
1395 	  BFD_ASSERT (sgotplt != NULL);
1396 
1397 	  plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1398 
1399 	  /* Get the offset into the .got table of the entry that
1400 	     corresponds to this function.  Each .got entry is 4 bytes.
1401 	     The first two are reserved.  */
1402 	  got_offset = (plt_index + 3) * 4;
1403 
1404 	  /* We want the relocation to point into the .got.plt instead
1405 	     of the plt itself.  */
1406 	  relocation = (sgotplt->output_section->vma
1407 			+ sgotplt->output_offset
1408 			+ got_offset);
1409 	  contents[rel->r_offset-1] |= 0x10; /* make indirect */
1410 	  if (rel->r_addend == 2)
1411 	    {
1412 	      h->plt.offset |= 1;
1413 	    }
1414 	  else if (rel->r_addend != 0)
1415 	    _bfd_error_handler
1416 	      /* xgettext:c-format */
1417 	      (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1418 		 " from %pA section ignored"),
1419 	       input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1420 	       input_section);
1421 	  rel->r_addend = 0;
1422 
1423 	  break;
1424 
1425 	case R_VAX_PC8:
1426 	case R_VAX_PC16:
1427 	r_vax_pc32_shared:
1428 	  if (h == NULL
1429 	      || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1430 	      || h->forced_local)
1431 	    break;
1432 	  /* Fall through.  */
1433 	case R_VAX_8:
1434 	case R_VAX_16:
1435 	case R_VAX_32:
1436 	  if (bfd_link_pic (info)
1437 	      && r_symndx != STN_UNDEF
1438 	      && (input_section->flags & SEC_ALLOC) != 0
1439 	      && ((r_type != R_VAX_PC8
1440 		   && r_type != R_VAX_PC16
1441 		   && r_type != R_VAX_PC32)
1442 		  || ((input_section->flags & SEC_CODE)
1443 		      && (!info->symbolic
1444 			  || (!h->def_regular && h->type != STT_SECTION)))))
1445 	    {
1446 	      Elf_Internal_Rela outrel;
1447 	      bfd_byte *loc;
1448 	      bool skip, relocate;
1449 
1450 	      /* When generating a shared object, these relocations
1451 		 are copied into the output file to be resolved at run
1452 		 time.  */
1453 	      if (sreloc == NULL)
1454 		{
1455 		  sreloc = _bfd_elf_get_dynamic_reloc_section
1456 		    (input_bfd, input_section, /*rela?*/ true);
1457 		  if (sreloc == NULL)
1458 		    return false;
1459 		}
1460 
1461 	      skip = false;
1462 	      relocate = false;
1463 
1464 	      outrel.r_offset =
1465 		_bfd_elf_section_offset (output_bfd, info, input_section,
1466 					 rel->r_offset);
1467 	      if (outrel.r_offset == (bfd_vma) -1)
1468 		skip = true;
1469 	      if (outrel.r_offset == (bfd_vma) -2)
1470 		skip = true, relocate = true;
1471 	      outrel.r_offset += (input_section->output_section->vma
1472 				  + input_section->output_offset);
1473 
1474 	      if (skip)
1475 		  memset (&outrel, 0, sizeof outrel);
1476 	      /* h->dynindx may be -1 if the symbol was marked to
1477 		 become local.  */
1478 	      else if (h != NULL
1479 		       && ((! info->symbolic && h->dynindx != -1)
1480 			   || !h->def_regular))
1481 		{
1482 		  BFD_ASSERT (h->dynindx != -1);
1483 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1484 		  outrel.r_addend = relocation + rel->r_addend;
1485 		}
1486 	      else
1487 		{
1488 		  if (r_type == R_VAX_32)
1489 		    {
1490 		      relocate = true;
1491 		      outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1492 		      outrel.r_addend = bfd_get_signed_32(input_bfd,
1493 							 &contents[rel->r_offset])
1494 					+ relocation + rel->r_addend;
1495 		    }
1496 		  else
1497 		    {
1498 		      long indx;
1499 
1500 		      if (bfd_is_abs_section (sec))
1501 			indx = 0;
1502 		      else if (sec == NULL || sec->owner == NULL)
1503 			{
1504 			  bfd_set_error (bfd_error_bad_value);
1505 			  return false;
1506 			}
1507 		      else
1508 			{
1509 			  asection *osec;
1510 
1511 			  /* We are turning this relocation into one
1512 			     against a section symbol.  It would be
1513 			     proper to subtract the symbol's value,
1514 			     osec->vma, from the emitted reloc addend,
1515 			     but ld.so expects buggy relocs.  */
1516 			  osec = sec->output_section;
1517 			  indx = elf_section_data (osec)->dynindx;
1518 			  if (indx == 0)
1519 			    {
1520 			      struct elf_link_hash_table *htab;
1521 			      htab = elf_hash_table (info);
1522 			      osec = htab->text_index_section;
1523 			      indx = elf_section_data (osec)->dynindx;
1524 			    }
1525 			  BFD_ASSERT (indx != 0);
1526 			}
1527 
1528 		      outrel.r_info = ELF32_R_INFO (indx, r_type);
1529 		      outrel.r_addend = relocation + rel->r_addend;
1530 		    }
1531 		}
1532 
1533 	      if (input_section->flags & SEC_CODE)
1534 		 info->flags |= DF_TEXTREL;
1535 
1536 	      if ((input_section->flags & SEC_CODE) != 0
1537 		  || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1538 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1539 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1540 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1541 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1542 		{
1543 		  if (h != NULL)
1544 		    _bfd_error_handler
1545 		      /* xgettext:c-format */
1546 		      (_("%pB: warning: %s relocation against symbol `%s'"
1547 			 " from %pA section"),
1548 		      input_bfd, howto->name, h->root.root.string,
1549 		      input_section);
1550 		  else
1551 		    _bfd_error_handler
1552 		      /* xgettext:c-format */
1553 		      (_("%pB: warning: %s relocation to %#" PRIx64
1554 			 " from %pA section"),
1555 		      input_bfd, howto->name, (uint64_t) outrel.r_addend,
1556 		      input_section);
1557 		}
1558 	      loc = sreloc->contents;
1559 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1560 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1561 
1562 	      /* This reloc will be computed at runtime, so there's no
1563 		 need to do anything now, except for R_VAX_32
1564 		 relocations that have been turned into
1565 		 R_VAX_RELATIVE.  */
1566 	      if (!relocate)
1567 		continue;
1568 	    }
1569 
1570 	  break;
1571 
1572 	case R_VAX_GNU_VTINHERIT:
1573 	case R_VAX_GNU_VTENTRY:
1574 	  /* These are no-ops in the end.  */
1575 	  continue;
1576 
1577 	default:
1578 	  break;
1579 	}
1580 
1581       /* VAX PCREL relocations are from the end of relocation, not the start.
1582 	 So subtract the difference from the relocation amount since we can't
1583 	 add it to the offset.  */
1584       if (howto->pc_relative && howto->pcrel_offset)
1585 	relocation -= bfd_get_reloc_size(howto);
1586 
1587       r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1588 				    contents, rel->r_offset,
1589 				    relocation, rel->r_addend);
1590 
1591       if (r != bfd_reloc_ok)
1592 	{
1593 	  switch (r)
1594 	    {
1595 	    default:
1596 	    case bfd_reloc_outofrange:
1597 	      abort ();
1598 	    case bfd_reloc_overflow:
1599 	      {
1600 		const char *name;
1601 
1602 		if (h != NULL)
1603 		  name = NULL;
1604 		else
1605 		  {
1606 		    name = bfd_elf_string_from_elf_section (input_bfd,
1607 							    symtab_hdr->sh_link,
1608 							    sym->st_name);
1609 		    if (name == NULL)
1610 		      return false;
1611 		    if (*name == '\0')
1612 		      name = bfd_section_name (sec);
1613 		  }
1614 		info->callbacks->reloc_overflow
1615 		  (info, (h ? &h->root : NULL), name, howto->name,
1616 		   (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1617 	      }
1618 	      break;
1619 	    }
1620 	}
1621     }
1622 
1623   return true;
1624 }
1625 
1626 /* Finish up dynamic symbol handling.  We set the contents of various
1627    dynamic sections here.  */
1628 
1629 static bool
elf_vax_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)1630 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1631 			       struct elf_link_hash_entry *h,
1632 			       Elf_Internal_Sym *sym)
1633 {
1634   bfd *dynobj;
1635 
1636   dynobj = elf_hash_table (info)->dynobj;
1637 
1638   if (h->plt.offset != (bfd_vma) -1)
1639     {
1640       asection *splt;
1641       asection *sgot;
1642       asection *srela;
1643       bfd_vma plt_index;
1644       bfd_vma got_offset;
1645       bfd_vma addend;
1646       Elf_Internal_Rela rela;
1647       bfd_byte *loc;
1648 
1649       /* This symbol has an entry in the procedure linkage table.  Set
1650 	 it up.  */
1651       BFD_ASSERT (h->dynindx != -1);
1652 
1653       splt = elf_hash_table (info)->splt;
1654       sgot = elf_hash_table (info)->sgotplt;
1655       srela = elf_hash_table (info)->srelplt;
1656       BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1657 
1658       addend = 2 * (h->plt.offset & 1);
1659       h->plt.offset &= ~1;
1660 
1661       /* Get the index in the procedure linkage table which
1662 	 corresponds to this symbol.  This is the index of this symbol
1663 	 in all the symbols for which we are making plt entries.  The
1664 	 first entry in the procedure linkage table is reserved.  */
1665       plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1666 
1667       /* Get the offset into the .got table of the entry that
1668 	 corresponds to this function.  Each .got entry is 4 bytes.
1669 	 The first two are reserved.  */
1670       got_offset = (plt_index + 3) * 4;
1671 
1672       /* Fill in the entry in the procedure linkage table.  */
1673       memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1674 		  PLT_ENTRY_SIZE);
1675 
1676       /* The offset is relative to the first extension word.  */
1677       bfd_put_32 (output_bfd,
1678 		  -(h->plt.offset + 8),
1679 		  splt->contents + h->plt.offset + 4);
1680 
1681       bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1682 		  splt->contents + h->plt.offset + 8);
1683 
1684       /* Fill in the entry in the global offset table.  */
1685       bfd_put_32 (output_bfd,
1686 		  (splt->output_section->vma
1687 		   + splt->output_offset
1688 		   + h->plt.offset) + addend,
1689 		  sgot->contents + got_offset);
1690 
1691       /* Fill in the entry in the .rela.plt section.  */
1692       rela.r_offset = (sgot->output_section->vma
1693 		       + sgot->output_offset
1694 		       + got_offset);
1695       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1696       rela.r_addend = addend;
1697       loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1698       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1699 
1700       if (!h->def_regular)
1701 	{
1702 	  /* Mark the symbol as undefined, rather than as defined in
1703 	     the .plt section.  Leave the value alone.  */
1704 	  sym->st_shndx = SHN_UNDEF;
1705 	}
1706     }
1707 
1708   if (h->got.offset != (bfd_vma) -1)
1709     {
1710       asection *sgot;
1711       asection *srela;
1712       Elf_Internal_Rela rela;
1713       bfd_byte *loc;
1714 
1715       /* This symbol has an entry in the global offset table.  Set it
1716 	 up.  */
1717       sgot = elf_hash_table (info)->sgot;
1718       srela = elf_hash_table (info)->srelgot;
1719       BFD_ASSERT (sgot != NULL && srela != NULL);
1720 
1721       rela.r_offset = (sgot->output_section->vma
1722 		       + sgot->output_offset
1723 		       + h->got.offset);
1724       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1725       rela.r_addend = bfd_get_signed_32 (output_bfd,
1726 					 sgot->contents + h->got.offset);
1727 
1728       loc = srela->contents;
1729       loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1730       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1731     }
1732 
1733   if (h->needs_copy)
1734     {
1735       asection *s;
1736       Elf_Internal_Rela rela;
1737       bfd_byte *loc;
1738 
1739       /* This symbol needs a copy reloc.  Set it up.  */
1740       BFD_ASSERT (h->dynindx != -1
1741 		  && (h->root.type == bfd_link_hash_defined
1742 		      || h->root.type == bfd_link_hash_defweak));
1743 
1744       s = bfd_get_linker_section (dynobj, ".rela.bss");
1745       BFD_ASSERT (s != NULL);
1746 
1747       rela.r_offset = (h->root.u.def.value
1748 		       + h->root.u.def.section->output_section->vma
1749 		       + h->root.u.def.section->output_offset);
1750       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1751       rela.r_addend = 0;
1752       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1753       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1754     }
1755 
1756   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
1757   if (h == elf_hash_table (info)->hdynamic
1758       || h == elf_hash_table (info)->hgot)
1759     sym->st_shndx = SHN_ABS;
1760 
1761   return true;
1762 }
1763 
1764 /* Finish up the dynamic sections.  */
1765 
1766 static bool
elf_vax_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)1767 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1768 {
1769   bfd *dynobj;
1770   asection *sgot;
1771   asection *sdyn;
1772 
1773   dynobj = elf_hash_table (info)->dynobj;
1774 
1775   sgot = elf_hash_table (info)->sgotplt;
1776   BFD_ASSERT (sgot != NULL);
1777   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1778 
1779   if (elf_hash_table (info)->dynamic_sections_created)
1780     {
1781       asection *splt;
1782       Elf32_External_Dyn *dyncon, *dynconend;
1783 
1784       splt = elf_hash_table (info)->splt;
1785       BFD_ASSERT (splt != NULL && sdyn != NULL);
1786 
1787       dyncon = (Elf32_External_Dyn *) sdyn->contents;
1788       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1789       for (; dyncon < dynconend; dyncon++)
1790 	{
1791 	  Elf_Internal_Dyn dyn;
1792 	  asection *s;
1793 
1794 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1795 
1796 	  switch (dyn.d_tag)
1797 	    {
1798 	    default:
1799 	      break;
1800 
1801 	    case DT_PLTGOT:
1802 	      s = elf_hash_table (info)->sgotplt;
1803 	      goto get_vma;
1804 	    case DT_JMPREL:
1805 	      s = elf_hash_table (info)->srelplt;
1806 	    get_vma:
1807 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1808 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1809 	      break;
1810 
1811 	    case DT_PLTRELSZ:
1812 	      s = elf_hash_table (info)->srelplt;
1813 	      dyn.d_un.d_val = s->size;
1814 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1815 	      break;
1816 	    }
1817 	}
1818 
1819       /* Fill in the first entry in the procedure linkage table.  */
1820       if (splt->size > 0)
1821 	{
1822 	  memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1823 	  bfd_put_32 (output_bfd,
1824 			  (sgot->output_section->vma
1825 			   + sgot->output_offset + 4
1826 			   - (splt->output_section->vma + 6)),
1827 			  splt->contents + 2);
1828 	  bfd_put_32 (output_bfd,
1829 			  (sgot->output_section->vma
1830 			   + sgot->output_offset + 8
1831 			   - (splt->output_section->vma + 12)),
1832 			  splt->contents + 8);
1833 	  elf_section_data (splt->output_section)->this_hdr.sh_entsize
1834 	   = PLT_ENTRY_SIZE;
1835 	}
1836     }
1837 
1838   /* Fill in the first three entries in the global offset table.  */
1839   if (sgot->size > 0)
1840     {
1841       if (sdyn == NULL)
1842 	bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1843       else
1844 	bfd_put_32 (output_bfd,
1845 		    sdyn->output_section->vma + sdyn->output_offset,
1846 		    sgot->contents);
1847       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1848       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1849     }
1850 
1851   if (elf_section_data (sgot->output_section) != NULL)
1852     elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1853 
1854   return true;
1855 }
1856 
1857 static enum elf_reloc_type_class
elf_vax_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)1858 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1859 			  const asection *rel_sec ATTRIBUTE_UNUSED,
1860 			  const Elf_Internal_Rela *rela)
1861 {
1862   switch ((int) ELF32_R_TYPE (rela->r_info))
1863     {
1864     case R_VAX_RELATIVE:
1865       return reloc_class_relative;
1866     case R_VAX_JMP_SLOT:
1867       return reloc_class_plt;
1868     case R_VAX_COPY:
1869       return reloc_class_copy;
1870     default:
1871       return reloc_class_normal;
1872     }
1873 }
1874 
1875 static bfd_vma
elf_vax_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)1876 elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1877 		     const arelent *rel ATTRIBUTE_UNUSED)
1878 {
1879   return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1880 }
1881 
1882 #define TARGET_LITTLE_SYM		vax_elf32_vec
1883 #define TARGET_LITTLE_NAME		"elf32-vax"
1884 #define ELF_MACHINE_CODE		EM_VAX
1885 #define ELF_MAXPAGESIZE			0x10000
1886 
1887 #define elf_backend_create_dynamic_sections \
1888 					_bfd_elf_create_dynamic_sections
1889 #define bfd_elf32_bfd_link_hash_table_create \
1890 					elf_vax_link_hash_table_create
1891 #define bfd_elf32_bfd_copy_private_bfd_data \
1892 					elf32_vax_copy_private_bfd_data
1893 
1894 #define bfd_elf32_bfd_final_link	bfd_elf_gc_common_final_link
1895 
1896 #define elf_backend_check_relocs	elf_vax_check_relocs
1897 #define elf_backend_adjust_dynamic_symbol \
1898 					elf_vax_adjust_dynamic_symbol
1899 #define elf_backend_always_size_sections \
1900 					elf_vax_always_size_sections
1901 #define elf_backend_size_dynamic_sections \
1902 					elf_vax_size_dynamic_sections
1903 #define elf_backend_init_index_section	_bfd_elf_init_1_index_section
1904 #define elf_backend_relocate_section	elf_vax_relocate_section
1905 #define elf_backend_finish_dynamic_symbol \
1906 					elf_vax_finish_dynamic_symbol
1907 #define elf_backend_finish_dynamic_sections \
1908 					elf_vax_finish_dynamic_sections
1909 #define elf_backend_reloc_type_class	elf_vax_reloc_type_class
1910 #define elf_backend_gc_mark_hook	elf_vax_gc_mark_hook
1911 #define elf_backend_plt_sym_val		elf_vax_plt_sym_val
1912 #define bfd_elf32_bfd_merge_private_bfd_data \
1913 					elf32_vax_merge_private_bfd_data
1914 #define bfd_elf32_bfd_set_private_flags \
1915 					elf32_vax_set_private_flags
1916 #define bfd_elf32_bfd_print_private_bfd_data \
1917 					elf32_vax_print_private_bfd_data
1918 
1919 #define elf_backend_can_gc_sections	1
1920 #define elf_backend_want_got_plt	1
1921 #define elf_backend_plt_readonly	1
1922 #define elf_backend_want_plt_sym	0
1923 #define elf_backend_got_header_size	16
1924 #define elf_backend_rela_normal		1
1925 #define elf_backend_dtrel_excludes_plt	1
1926 
1927 #include "elf32-target.h"
1928