xref: /netbsd-src/external/gpl3/gdb/dist/bfd/elf32-vax.c (revision 15a984a0d95c8f96abe9717ee6241762c55dc106)
1 /* VAX series support for 32-bit ELF
2    Copyright (C) 1993-2022 Free Software Foundation, Inc.
3    Contributed by Matt Thomas <matt@3am-software.com>.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20    MA 02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28 
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static bool rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 							 struct bfd_hash_table *,
33 							 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bool elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 				  asection *, const Elf_Internal_Rela *);
37 static bool elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 					   struct elf_link_hash_entry *);
39 static bool elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static int elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 				     bfd *, asection *, bfd_byte *,
42 				     Elf_Internal_Rela *,
43 				     Elf_Internal_Sym *, asection **);
44 static bool elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 					   struct elf_link_hash_entry *,
46 					   Elf_Internal_Sym *);
47 static bool elf_vax_finish_dynamic_sections (bfd *, struct bfd_link_info *);
48 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
49 				    const arelent *);
50 
51 static bool elf32_vax_set_private_flags (bfd *, flagword);
52 static bool elf32_vax_print_private_bfd_data (bfd *, void *);
53 
54 static reloc_howto_type howto_table[] = {
55   HOWTO (R_VAX_NONE,		/* type */
56 	 0,			/* rightshift */
57 	 0,			/* size */
58 	 0,			/* bitsize */
59 	 false,			/* pc_relative */
60 	 0,			/* bitpos */
61 	 complain_overflow_dont, /* complain_on_overflow */
62 	 bfd_elf_generic_reloc,	/* special_function */
63 	 "R_VAX_NONE",		/* name */
64 	 false,			/* partial_inplace */
65 	 0,			/* src_mask */
66 	 0x00000000,		/* dst_mask */
67 	 false),		/* pcrel_offset */
68 
69   HOWTO (R_VAX_32,		/* type */
70 	 0,			/* rightshift */
71 	 4,			/* size */
72 	 32,			/* bitsize */
73 	 false,			/* pc_relative */
74 	 0,			/* bitpos */
75 	 complain_overflow_bitfield, /* complain_on_overflow */
76 	 bfd_elf_generic_reloc,	/* special_function */
77 	 "R_VAX_32",		/* name */
78 	 false,			/* partial_inplace */
79 	 0,			/* src_mask */
80 	 0xffffffff,		/* dst_mask */
81 	 false),		/* pcrel_offset */
82 
83   HOWTO (R_VAX_16,		/* type */
84 	 0,			/* rightshift */
85 	 2,			/* size */
86 	 16,			/* bitsize */
87 	 false,			/* pc_relative */
88 	 0,			/* bitpos */
89 	 complain_overflow_bitfield, /* complain_on_overflow */
90 	 bfd_elf_generic_reloc,	/* special_function */
91 	 "R_VAX_16",		/* name */
92 	 false,			/* partial_inplace */
93 	 0,			/* src_mask */
94 	 0x0000ffff,		/* dst_mask */
95 	 false),		/* pcrel_offset */
96 
97   HOWTO (R_VAX_8,		/* type */
98 	 0,			/* rightshift */
99 	 1,			/* size */
100 	 8,			/* bitsize */
101 	 false,			/* pc_relative */
102 	 0,			/* bitpos */
103 	 complain_overflow_bitfield, /* complain_on_overflow */
104 	 bfd_elf_generic_reloc,	/* special_function */
105 	 "R_VAX_8",		/* name */
106 	 false,			/* partial_inplace */
107 	 0,			/* src_mask */
108 	 0x000000ff,		/* dst_mask */
109 	 false),		/* pcrel_offset */
110 
111   HOWTO (R_VAX_PC32,		/* type */
112 	 0,			/* rightshift */
113 	 4,			/* size */
114 	 32,			/* bitsize */
115 	 true,			/* pc_relative */
116 	 0,			/* bitpos */
117 	 complain_overflow_bitfield, /* complain_on_overflow */
118 	 bfd_elf_generic_reloc,	/* special_function */
119 	 "R_VAX_PC32",		/* name */
120 	 false,			/* partial_inplace */
121 	 0,			/* src_mask */
122 	 0xffffffff,		/* dst_mask */
123 	 true),			/* pcrel_offset */
124 
125   HOWTO (R_VAX_PC16,		/* type */
126 	 0,			/* rightshift */
127 	 2,			/* size */
128 	 16,			/* bitsize */
129 	 true,			/* pc_relative */
130 	 0,			/* bitpos */
131 	 complain_overflow_signed, /* complain_on_overflow */
132 	 bfd_elf_generic_reloc,	/* special_function */
133 	 "R_VAX_PC16",		/* name */
134 	 false,			/* partial_inplace */
135 	 0,			/* src_mask */
136 	 0x0000ffff,		/* dst_mask */
137 	 true),			/* pcrel_offset */
138 
139   HOWTO (R_VAX_PC8,		/* type */
140 	 0,			/* rightshift */
141 	 1,			/* size */
142 	 8,			/* bitsize */
143 	 true,			/* pc_relative */
144 	 0,			/* bitpos */
145 	 complain_overflow_signed, /* complain_on_overflow */
146 	 bfd_elf_generic_reloc,	/* special_function */
147 	 "R_VAX_PC8",		/* name */
148 	 false,			/* partial_inplace */
149 	 0,			/* src_mask */
150 	 0x000000ff,		/* dst_mask */
151 	 true),			/* pcrel_offset */
152 
153   HOWTO (R_VAX_GOT32,		/* type */
154 	 0,			/* rightshift */
155 	 4,			/* size */
156 	 32,			/* bitsize */
157 	 true,			/* pc_relative */
158 	 0,			/* bitpos */
159 	 complain_overflow_bitfield, /* complain_on_overflow */
160 	 bfd_elf_generic_reloc,	/* special_function */
161 	 "R_VAX_GOT32",		/* name */
162 	 false,			/* partial_inplace */
163 	 0,			/* src_mask */
164 	 0xffffffff,		/* dst_mask */
165 	 true),			/* pcrel_offset */
166 
167   EMPTY_HOWTO (-1),
168   EMPTY_HOWTO (-1),
169   EMPTY_HOWTO (-1),
170   EMPTY_HOWTO (-1),
171   EMPTY_HOWTO (-1),
172 
173   HOWTO (R_VAX_PLT32,		/* type */
174 	 0,			/* rightshift */
175 	 4,			/* size */
176 	 32,			/* bitsize */
177 	 true,			/* pc_relative */
178 	 0,			/* bitpos */
179 	 complain_overflow_bitfield, /* complain_on_overflow */
180 	 bfd_elf_generic_reloc,	/* special_function */
181 	 "R_VAX_PLT32",		/* name */
182 	 false,			/* partial_inplace */
183 	 0,			/* src_mask */
184 	 0xffffffff,		/* dst_mask */
185 	 true),			/* pcrel_offset */
186 
187   EMPTY_HOWTO (-1),
188   EMPTY_HOWTO (-1),
189   EMPTY_HOWTO (-1),
190   EMPTY_HOWTO (-1),
191   EMPTY_HOWTO (-1),
192 
193   HOWTO (R_VAX_COPY,		/* type */
194 	 0,			/* rightshift */
195 	 0,			/* size */
196 	 0,			/* bitsize */
197 	 false,			/* pc_relative */
198 	 0,			/* bitpos */
199 	 complain_overflow_dont, /* complain_on_overflow */
200 	 bfd_elf_generic_reloc,	/* special_function */
201 	 "R_VAX_COPY",		/* name */
202 	 false,			/* partial_inplace */
203 	 0,			/* src_mask */
204 	 0xffffffff,		/* dst_mask */
205 	 false),		/* pcrel_offset */
206 
207   HOWTO (R_VAX_GLOB_DAT,	/* type */
208 	 0,			/* rightshift */
209 	 4,			/* size */
210 	 32,			/* bitsize */
211 	 false,			/* pc_relative */
212 	 0,			/* bitpos */
213 	 complain_overflow_dont, /* complain_on_overflow */
214 	 bfd_elf_generic_reloc,	/* special_function */
215 	 "R_VAX_GLOB_DAT",	/* name */
216 	 false,			/* partial_inplace */
217 	 0,			/* src_mask */
218 	 0xffffffff,		/* dst_mask */
219 	 false),		/* pcrel_offset */
220 
221   HOWTO (R_VAX_JMP_SLOT,	/* type */
222 	 0,			/* rightshift */
223 	 4,			/* size */
224 	 32,			/* bitsize */
225 	 false,			/* pc_relative */
226 	 0,			/* bitpos */
227 	 complain_overflow_dont, /* complain_on_overflow */
228 	 bfd_elf_generic_reloc,	/* special_function */
229 	 "R_VAX_JMP_SLOT",	/* name */
230 	 false,			/* partial_inplace */
231 	 0,			/* src_mask */
232 	 0xffffffff,		/* dst_mask */
233 	 false),		/* pcrel_offset */
234 
235   HOWTO (R_VAX_RELATIVE,	/* type */
236 	 0,			/* rightshift */
237 	 4,			/* size */
238 	 32,			/* bitsize */
239 	 false,			/* pc_relative */
240 	 0,			/* bitpos */
241 	 complain_overflow_dont, /* complain_on_overflow */
242 	 bfd_elf_generic_reloc,	/* special_function */
243 	 "R_VAX_RELATIVE",	/* name */
244 	 false,			/* partial_inplace */
245 	 0,			/* src_mask */
246 	 0xffffffff,		/* dst_mask */
247 	 false),		/* pcrel_offset */
248 
249   /* GNU extension to record C++ vtable hierarchy */
250   HOWTO (R_VAX_GNU_VTINHERIT,	/* type */
251 	 0,			/* rightshift */
252 	 4,			/* size */
253 	 0,			/* bitsize */
254 	 false,			/* pc_relative */
255 	 0,			/* bitpos */
256 	 complain_overflow_dont, /* complain_on_overflow */
257 	 NULL,			/* special_function */
258 	 "R_VAX_GNU_VTINHERIT",	/* name */
259 	 false,			/* partial_inplace */
260 	 0,			/* src_mask */
261 	 0,			/* dst_mask */
262 	 false),		/* pcrel_offset */
263 
264   /* GNU extension to record C++ vtable member usage */
265   HOWTO (R_VAX_GNU_VTENTRY,	/* type */
266 	 0,			/* rightshift */
267 	 4,			/* size */
268 	 0,			/* bitsize */
269 	 false,			/* pc_relative */
270 	 0,			/* bitpos */
271 	 complain_overflow_dont, /* complain_on_overflow */
272 	 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
273 	 "R_VAX_GNU_VTENTRY",	/* name */
274 	 false,			/* partial_inplace */
275 	 0,			/* src_mask */
276 	 0,			/* dst_mask */
277 	 false),		/* pcrel_offset */
278 };
279 
280 static bool
281 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
282 {
283   unsigned int r_type;
284 
285   r_type = ELF32_R_TYPE (dst->r_info);
286   if (r_type >= R_VAX_max)
287     {
288       /* xgettext:c-format */
289       _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
290 			  abfd, r_type);
291       bfd_set_error (bfd_error_bad_value);
292       return false;
293     }
294   cache_ptr->howto = &howto_table[r_type];
295   return true;
296 }
297 
298 #define elf_info_to_howto rtype_to_howto
299 
300 static const struct
301 {
302   bfd_reloc_code_real_type bfd_val;
303   int elf_val;
304 } reloc_map[] = {
305   { BFD_RELOC_NONE, R_VAX_NONE },
306   { BFD_RELOC_32, R_VAX_32 },
307   { BFD_RELOC_16, R_VAX_16 },
308   { BFD_RELOC_8, R_VAX_8 },
309   { BFD_RELOC_32_PCREL, R_VAX_PC32 },
310   { BFD_RELOC_16_PCREL, R_VAX_PC16 },
311   { BFD_RELOC_8_PCREL, R_VAX_PC8 },
312   { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
313   { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
314   { BFD_RELOC_NONE, R_VAX_COPY },
315   { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
316   { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
317   { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
318   { BFD_RELOC_CTOR, R_VAX_32 },
319   { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
320   { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
321 };
322 
323 static reloc_howto_type *
324 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
325 {
326   unsigned int i;
327   for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
328     {
329       if (reloc_map[i].bfd_val == code)
330 	return &howto_table[reloc_map[i].elf_val];
331     }
332   return 0;
333 }
334 
335 static reloc_howto_type *
336 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
337 		   const char *r_name)
338 {
339   unsigned int i;
340 
341   for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
342     if (howto_table[i].name != NULL
343 	&& strcasecmp (howto_table[i].name, r_name) == 0)
344       return &howto_table[i];
345 
346   return NULL;
347 }
348 
349 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
350 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
351 #define ELF_ARCH bfd_arch_vax
352 /* end code generated by elf.el */
353 
354 /* Functions for the VAX ELF linker.  */
355 
356 /* The name of the dynamic interpreter.  This is put in the .interp
357    section.  */
358 
359 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
360 
361 /* The size in bytes of an entry in the procedure linkage table.  */
362 
363 #define PLT_ENTRY_SIZE 12
364 
365 /* The first entry in a procedure linkage table looks like this.  See
366    the SVR4 ABI VAX supplement to see how this works.  */
367 
368 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
369 {
370   0xdd, 0xef,		/* pushl l^ */
371   0, 0, 0, 0,		/* offset to .plt.got + 4 */
372   0x17, 0xff,		/* jmp @L^(pc) */
373   0, 0, 0, 0,		/* offset to .plt.got + 8 */
374 };
375 
376 /* Subsequent entries in a procedure linkage table look like this.  */
377 
378 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
379 {
380   0xfc, 0x0f,		/* .word ^M<r11:r2> */
381   0x16, 0xef,		/* jsb L^(pc) */
382   0, 0, 0, 0,		/* replaced with offset to start of .plt  */
383   0, 0, 0, 0,		/* index into .rela.plt */
384 };
385 
386 /* The VAX linker needs to keep track of the number of relocs that it
387    decides to copy in check_relocs for each symbol.  This is so that it
388    can discard PC relative relocs if it doesn't need them when linking
389    with -Bsymbolic.  We store the information in a field extending the
390    regular ELF linker hash table.  */
391 
392 /* This structure keeps track of the number of PC relative relocs we have
393    copied for a given symbol.  */
394 
395 struct elf_vax_pcrel_relocs_copied
396 {
397   /* Next section.  */
398   struct elf_vax_pcrel_relocs_copied *next;
399   /* A section in dynobj.  */
400   asection *section;
401   /* Number of relocs copied in this section.  */
402   bfd_size_type count;
403 };
404 
405 /* VAX ELF linker hash entry.  */
406 
407 struct elf_vax_link_hash_entry
408 {
409   struct elf_link_hash_entry root;
410 
411   /* Number of PC relative relocs copied for this symbol.  */
412   struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
413 
414   bfd_vma got_addend;
415 };
416 
417 /* Declare this now that the above structures are defined.  */
418 
419 static bool elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
420 				    void *);
421 
422 /* Declare this now that the above structures are defined.  */
423 
424 static bool elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
425 					     void *);
426 
427 /* Traverse an VAX ELF linker hash table.  */
428 
429 #define elf_vax_link_hash_traverse(table, func, info)			\
430   (elf_link_hash_traverse						\
431    ((table),								\
432     (bool (*) (struct elf_link_hash_entry *, void *)) (func),		\
433     (info)))
434 
435 /* Create an entry in an VAX ELF linker hash table.  */
436 
437 static struct bfd_hash_entry *
438 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
439 			   struct bfd_hash_table *table,
440 			   const char *string)
441 {
442   struct elf_vax_link_hash_entry *ret =
443     (struct elf_vax_link_hash_entry *) entry;
444 
445   /* Allocate the structure if it has not already been allocated by a
446      subclass.  */
447   if (ret == NULL)
448     ret = ((struct elf_vax_link_hash_entry *)
449 	   bfd_hash_allocate (table,
450 			      sizeof (struct elf_vax_link_hash_entry)));
451   if (ret == NULL)
452     return (struct bfd_hash_entry *) ret;
453 
454   /* Call the allocation method of the superclass.  */
455   ret = ((struct elf_vax_link_hash_entry *)
456 	 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
457 				     table, string));
458   if (ret != NULL)
459     {
460       ret->pcrel_relocs_copied = NULL;
461     }
462 
463   return (struct bfd_hash_entry *) ret;
464 }
465 
466 /* Create an VAX ELF linker hash table.  */
467 
468 static struct bfd_link_hash_table *
469 elf_vax_link_hash_table_create (bfd *abfd)
470 {
471   struct elf_link_hash_table *ret;
472   size_t amt = sizeof (struct elf_link_hash_table);
473 
474   ret = bfd_zmalloc (amt);
475   if (ret == NULL)
476     return NULL;
477 
478   if (!_bfd_elf_link_hash_table_init (ret, abfd,
479 				      elf_vax_link_hash_newfunc,
480 				      sizeof (struct elf_vax_link_hash_entry),
481 				      GENERIC_ELF_DATA))
482     {
483       free (ret);
484       return NULL;
485     }
486 
487   return &ret->root;
488 }
489 
490 /* Keep vax-specific flags in the ELF header */
491 static bool
492 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
493 {
494   elf_elfheader (abfd)->e_flags = flags;
495   elf_flags_init (abfd) = true;
496   return true;
497 }
498 
499 /* Merge backend specific data from an object file to the output
500    object file when linking.  */
501 static bool
502 elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
503 {
504   bfd *obfd = info->output_bfd;
505   flagword in_flags;
506 
507   if (   bfd_get_flavour (ibfd) != bfd_target_elf_flavour
508       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
509     return true;
510 
511   in_flags  = elf_elfheader (ibfd)->e_flags;
512 
513   if (!elf_flags_init (obfd))
514     {
515       elf_flags_init (obfd) = true;
516       elf_elfheader (obfd)->e_flags = in_flags;
517     }
518 
519   return true;
520 }
521 
522 /* Display the flags field */
523 static bool
524 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
525 {
526   FILE *file = (FILE *) ptr;
527 
528   BFD_ASSERT (abfd != NULL && ptr != NULL);
529 
530   /* Print normal ELF private data.  */
531   _bfd_elf_print_private_bfd_data (abfd, ptr);
532 
533   /* Ignore init flag - it may not be set, despite the flags field containing valid data.  */
534 
535   /* xgettext:c-format */
536   fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
537 
538   if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
539     fprintf (file, _(" [nonpic]"));
540 
541   if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
542     fprintf (file, _(" [d-float]"));
543 
544   if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
545     fprintf (file, _(" [g-float]"));
546 
547   fputc ('\n', file);
548 
549   return true;
550 }
551 /* Look through the relocs for a section during the first phase, and
552    allocate space in the global offset table or procedure linkage
553    table.  */
554 
555 static bool
556 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
557 		      const Elf_Internal_Rela *relocs)
558 {
559   bfd *dynobj;
560   Elf_Internal_Shdr *symtab_hdr;
561   struct elf_link_hash_entry **sym_hashes;
562   const Elf_Internal_Rela *rel;
563   const Elf_Internal_Rela *rel_end;
564   asection *sreloc;
565 
566   if (bfd_link_relocatable (info))
567     return true;
568 
569   dynobj = elf_hash_table (info)->dynobj;
570   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
571   sym_hashes = elf_sym_hashes (abfd);
572 
573   sreloc = NULL;
574 
575   rel_end = relocs + sec->reloc_count;
576   for (rel = relocs; rel < rel_end; rel++)
577     {
578       unsigned long r_symndx;
579       struct elf_link_hash_entry *h;
580 
581       r_symndx = ELF32_R_SYM (rel->r_info);
582 
583       if (r_symndx < symtab_hdr->sh_info)
584 	h = NULL;
585       else
586 	{
587 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
588 	  while (h->root.type == bfd_link_hash_indirect
589 		 || h->root.type == bfd_link_hash_warning)
590 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
591 	}
592 
593       switch (ELF32_R_TYPE (rel->r_info))
594 	{
595 	case R_VAX_GOT32:
596 	  BFD_ASSERT (h != NULL);
597 
598 	  /* If this is a local symbol, we resolve it directly without
599 	     creating a global offset table entry.  */
600 	  if (SYMBOL_REFERENCES_LOCAL (info, h)
601 	      || h == elf_hash_table (info)->hgot
602 	      || h == elf_hash_table (info)->hplt)
603 	    break;
604 
605 	  /* This symbol requires a global offset table entry.  */
606 
607 	  if (dynobj == NULL)
608 	    {
609 	      /* Create the .got section.  */
610 	      elf_hash_table (info)->dynobj = dynobj = abfd;
611 	      if (!_bfd_elf_create_got_section (dynobj, info))
612 		return false;
613 	    }
614 
615 	  if (h != NULL)
616 	    {
617 	      struct elf_vax_link_hash_entry *eh;
618 
619 	      eh = (struct elf_vax_link_hash_entry *) h;
620 	      if (h->got.refcount == -1)
621 		{
622 		  h->got.refcount = 1;
623 		  eh->got_addend = rel->r_addend;
624 		}
625 	      else
626 		{
627 		  h->got.refcount++;
628 		  if (eh->got_addend != (bfd_vma) rel->r_addend)
629 		    _bfd_error_handler
630 		      /* xgettext:c-format */
631 		      (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
632 			 " not match previous GOT addend of %" PRId64),
633 			 abfd, (int64_t) rel->r_addend, h->root.root.string,
634 			 (int64_t) eh->got_addend);
635 
636 		}
637 	    }
638 	  break;
639 
640 	case R_VAX_PLT32:
641 	  /* This symbol requires a procedure linkage table entry.  We
642 	     actually build the entry in adjust_dynamic_symbol,
643 	     because this might be a case of linking PIC code which is
644 	     never referenced by a dynamic object, in which case we
645 	     don't need to generate a procedure linkage table entry
646 	     after all.  */
647 	  BFD_ASSERT (h != NULL);
648 
649 	  /* If this is a local symbol, we resolve it directly without
650 	     creating a procedure linkage table entry.  */
651 	  if (h->forced_local)
652 	    break;
653 
654 	  h->needs_plt = 1;
655 	  if (h->plt.refcount == -1)
656 	    h->plt.refcount = 1;
657 	  else
658 	    h->plt.refcount++;
659 	  break;
660 
661 	case R_VAX_PC8:
662 	case R_VAX_PC16:
663 	case R_VAX_PC32:
664 	  /* If we are creating a shared library and this is not a local
665 	     symbol, we need to copy the reloc into the shared library.
666 	     However when linking with -Bsymbolic and this is a global
667 	     symbol which is defined in an object we are including in the
668 	     link (i.e., DEF_REGULAR is set), then we can resolve the
669 	     reloc directly.  At this point we have not seen all the input
670 	     files, so it is possible that DEF_REGULAR is not set now but
671 	     will be set later (it is never cleared).  We account for that
672 	     possibility below by storing information in the
673 	     pcrel_relocs_copied field of the hash table entry.  */
674 	  if (!(bfd_link_pic (info)
675 		&& (sec->flags & SEC_ALLOC) != 0
676 		&& h != NULL
677 		&& (!info->symbolic
678 		    || !h->def_regular)))
679 	    {
680 	      if (h != NULL
681 		  && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
682 		  && !h->forced_local)
683 		{
684 		  /* Make sure a plt entry is created for this symbol if
685 		     it turns out to be a function defined by a dynamic
686 		     object.  */
687 		  if (h->plt.refcount == -1)
688 		    h->plt.refcount = 1;
689 		  else
690 		    h->plt.refcount++;
691 		}
692 	      break;
693 	    }
694 	  /* If this is a local symbol, we can resolve it directly.  */
695 	  if (h != NULL
696 	      && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
697 		  || h->forced_local))
698 	    break;
699 
700 	  /* Fall through.  */
701 	case R_VAX_8:
702 	case R_VAX_16:
703 	case R_VAX_32:
704 	  if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
705 	    {
706 	      /* Make sure a plt entry is created for this symbol if it
707 		 turns out to be a function defined by a dynamic object.  */
708 	      if (h->plt.refcount == -1)
709 		h->plt.refcount = 1;
710 	      else
711 		h->plt.refcount++;
712 	    }
713 
714 	  /* Non-GOT reference may need a copy reloc in executable or
715 	     a dynamic reloc in shared library.  */
716 	  if (h != NULL)
717 	    h->non_got_ref = 1;
718 
719 	  /* If we are creating a shared library, we need to copy the
720 	     reloc into the shared library.  */
721 	  if (bfd_link_pic (info)
722 	      && (sec->flags & SEC_ALLOC) != 0)
723 	    {
724 	      /* When creating a shared object, we must copy these
725 		 reloc types into the output file.  We create a reloc
726 		 section in dynobj and make room for this reloc.  */
727 	      if (sreloc == NULL)
728 		{
729 		  sreloc = _bfd_elf_make_dynamic_reloc_section
730 		    (sec, dynobj, 2, abfd, /*rela?*/ true);
731 
732 		  if (sreloc == NULL)
733 		    return false;
734 
735 		  if (sec->flags & SEC_READONLY)
736 		    info->flags |= DF_TEXTREL;
737 		}
738 
739 	      sreloc->size += sizeof (Elf32_External_Rela);
740 
741 	      /* If we are linking with -Bsymbolic, we count the number of
742 		 PC relative relocations we have entered for this symbol,
743 		 so that we can discard them again if the symbol is later
744 		 defined by a regular object.  Note that this function is
745 		 only called if we are using a vaxelf linker hash table,
746 		 which means that h is really a pointer to an
747 		 elf_vax_link_hash_entry.  */
748 	      if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
749 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
750 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
751 		  && info->symbolic)
752 		{
753 		  struct elf_vax_link_hash_entry *eh;
754 		  struct elf_vax_pcrel_relocs_copied *p;
755 
756 		  eh = (struct elf_vax_link_hash_entry *) h;
757 
758 		  for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
759 		    if (p->section == sreloc)
760 		      break;
761 
762 		  if (p == NULL)
763 		    {
764 		      p = ((struct elf_vax_pcrel_relocs_copied *)
765 			   bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
766 		      if (p == NULL)
767 			return false;
768 		      p->next = eh->pcrel_relocs_copied;
769 		      eh->pcrel_relocs_copied = p;
770 		      p->section = sreloc;
771 		      p->count = 0;
772 		    }
773 
774 		  ++p->count;
775 		}
776 	    }
777 
778 	  break;
779 
780 	  /* This relocation describes the C++ object vtable hierarchy.
781 	     Reconstruct it for later use during GC.  */
782 	case R_VAX_GNU_VTINHERIT:
783 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
784 	    return false;
785 	  break;
786 
787 	  /* This relocation describes which C++ vtable entries are actually
788 	     used.  Record for later use during GC.  */
789 	case R_VAX_GNU_VTENTRY:
790 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
791 	    return false;
792 	  break;
793 
794 	default:
795 	  break;
796 	}
797     }
798 
799   return true;
800 }
801 
802 /* Return the section that should be marked against GC for a given
803    relocation.  */
804 
805 static asection *
806 elf_vax_gc_mark_hook (asection *sec,
807 		      struct bfd_link_info *info,
808 		      Elf_Internal_Rela *rel,
809 		      struct elf_link_hash_entry *h,
810 		      Elf_Internal_Sym *sym)
811 {
812   if (h != NULL)
813     switch (ELF32_R_TYPE (rel->r_info))
814       {
815       case R_VAX_GNU_VTINHERIT:
816       case R_VAX_GNU_VTENTRY:
817 	return NULL;
818       }
819 
820   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
821 }
822 
823 /* Adjust a symbol defined by a dynamic object and referenced by a
824    regular object.  The current definition is in some section of the
825    dynamic object, but we're not including those sections.  We have to
826    change the definition to something the rest of the link can
827    understand.  */
828 
829 static bool
830 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
831 			       struct elf_link_hash_entry *h)
832 {
833   bfd *dynobj;
834   asection *s;
835 
836   dynobj = elf_hash_table (info)->dynobj;
837 
838   /* Make sure we know what is going on here.  */
839   BFD_ASSERT (dynobj != NULL
840 	      && (h->needs_plt
841 		  || h->is_weakalias
842 		  || (h->def_dynamic
843 		      && h->ref_regular
844 		      && !h->def_regular)));
845 
846   /* If this is a function, put it in the procedure linkage table.  We
847      will fill in the contents of the procedure linkage table later,
848      when we know the address of the .got section.  */
849   if (h->type == STT_FUNC
850       || h->needs_plt)
851     {
852       if (h->plt.refcount <= 0
853 	  || SYMBOL_CALLS_LOCAL (info, h)
854 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
855 	      && h->root.type == bfd_link_hash_undefweak))
856 	{
857 	  /* This case can occur if we saw a PLTxx reloc in an input
858 	     file, but the symbol was never referred to by a dynamic
859 	     object, or if all references were garbage collected.  In
860 	     such a case, we don't actually need to build a procedure
861 	     linkage table, and we can just do a PCxx reloc instead.  */
862 	  h->plt.offset = (bfd_vma) -1;
863 	  h->needs_plt = 0;
864 	  return true;
865 	}
866 
867       s = elf_hash_table (info)->splt;
868       BFD_ASSERT (s != NULL);
869 
870       /* If this is the first .plt entry, make room for the special
871 	 first entry.  */
872       if (s->size == 0)
873 	{
874 	  s->size += PLT_ENTRY_SIZE;
875 	}
876 
877       /* If this symbol is not defined in a regular file, and we are
878 	 not generating a shared library, then set the symbol to this
879 	 location in the .plt.  This is required to make function
880 	 pointers compare as equal between the normal executable and
881 	 the shared library.  */
882       if (!bfd_link_pic (info)
883 	  && !h->def_regular)
884 	{
885 	  h->root.u.def.section = s;
886 	  h->root.u.def.value = s->size;
887 	}
888 
889       h->plt.offset = s->size;
890 
891       /* Make room for this entry.  */
892       s->size += PLT_ENTRY_SIZE;
893 
894       /* We also need to make an entry in the .got.plt section, which
895 	 will be placed in the .got section by the linker script.  */
896 
897       s = elf_hash_table (info)->sgotplt;
898       BFD_ASSERT (s != NULL);
899       s->size += 4;
900 
901       /* We also need to make an entry in the .rela.plt section.  */
902 
903       s = elf_hash_table (info)->srelplt;
904       BFD_ASSERT (s != NULL);
905       s->size += sizeof (Elf32_External_Rela);
906 
907       return true;
908     }
909 
910   /* Reinitialize the plt offset now that it is not used as a reference
911      count any more.  */
912   h->plt.offset = (bfd_vma) -1;
913 
914   /* If this is a weak symbol, and there is a real definition, the
915      processor independent code will have arranged for us to see the
916      real definition first, and we can just use the same value.  */
917   if (h->is_weakalias)
918     {
919       struct elf_link_hash_entry *def = weakdef (h);
920       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
921       h->root.u.def.section = def->root.u.def.section;
922       h->root.u.def.value = def->root.u.def.value;
923       return true;
924     }
925 
926   /* This is a reference to a symbol defined by a dynamic object which
927      is not a function.  */
928 
929   /* If we are creating a shared library, we must presume that the
930      only references to the symbol are via the global offset table.
931      For such cases we need not do anything here; the relocations will
932      be handled correctly by relocate_section.  */
933   if (bfd_link_pic (info))
934     return true;
935 
936   /* If there are no references to this symbol that do not use the
937      GOT relocation, we don't need to generate a copy reloc.  */
938   if (!h->non_got_ref)
939     return true;
940 
941   /* We must allocate the symbol in our .dynbss section, which will
942      become part of the .bss section of the executable.  There will be
943      an entry for this symbol in the .dynsym section.  The dynamic
944      object will contain position independent code, so all references
945      from the dynamic object to this symbol will go through the global
946      offset table.  The dynamic linker will use the .dynsym entry to
947      determine the address it must put in the global offset table, so
948      both the dynamic object and the regular object will refer to the
949      same memory location for the variable.  */
950 
951   s = bfd_get_linker_section (dynobj, ".dynbss");
952   BFD_ASSERT (s != NULL);
953 
954   /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
955      copy the initial value out of the dynamic object and into the
956      runtime process image.  We need to remember the offset into the
957      .rela.bss section we are going to use.  */
958   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
959     {
960       asection *srel;
961 
962       srel = bfd_get_linker_section (dynobj, ".rela.bss");
963       BFD_ASSERT (srel != NULL);
964       srel->size += sizeof (Elf32_External_Rela);
965       h->needs_copy = 1;
966     }
967 
968   return _bfd_elf_adjust_dynamic_copy (info, h, s);
969 }
970 
971 /* This function is called via elf_link_hash_traverse.  It resets GOT
972    and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
973    will be done.  */
974 
975 static bool
976 elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
977 			     void *infoptr ATTRIBUTE_UNUSED)
978 {
979   h->got.refcount = -1;
980   h->plt.refcount = -1;
981 
982   return true;
983 }
984 
985 /* Discard unused dynamic data if this is a static link.  */
986 
987 static bool
988 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
989 			      struct bfd_link_info *info)
990 {
991   bfd *dynobj;
992   asection *s;
993 
994   dynobj = elf_hash_table (info)->dynobj;
995 
996   if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
997     {
998       /* We may have created entries in the .rela.got and .got sections.
999 	 However, if we are not creating the dynamic sections, we will
1000 	 not actually use these entries.  Reset the size of .rela.got
1001 	 and .got, which will cause them to get stripped from the output
1002 	 file below.  */
1003       s = elf_hash_table (info)->srelgot;
1004       if (s != NULL)
1005 	s->size = 0;
1006       s = elf_hash_table (info)->sgotplt;
1007       if (s != NULL)
1008 	s->size = 0;
1009       s = elf_hash_table (info)->sgot;
1010       if (s != NULL)
1011 	s->size = 0;
1012     }
1013 
1014   /* If this is a static link, we need to discard all the got entries we've
1015      recorded.  */
1016   if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1017     elf_link_hash_traverse (elf_hash_table (info),
1018 			    elf_vax_discard_got_entries,
1019 			    info);
1020 
1021   return true;
1022 }
1023 
1024 /* Set the sizes of the dynamic sections.  */
1025 
1026 static bool
1027 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1028 {
1029   bfd *dynobj;
1030   asection *s;
1031   bool relocs;
1032 
1033   dynobj = elf_hash_table (info)->dynobj;
1034   BFD_ASSERT (dynobj != NULL);
1035 
1036   if (elf_hash_table (info)->dynamic_sections_created)
1037     {
1038       /* Set the contents of the .interp section to the interpreter.  */
1039       if (bfd_link_executable (info) && !info->nointerp)
1040 	{
1041 	  s = bfd_get_linker_section (dynobj, ".interp");
1042 	  BFD_ASSERT (s != NULL);
1043 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1044 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1045 	}
1046     }
1047 
1048   /* If this is a -Bsymbolic shared link, then we need to discard all PC
1049      relative relocs against symbols defined in a regular object.  We
1050      allocated space for them in the check_relocs routine, but we will not
1051      fill them in in the relocate_section routine.  */
1052   if (bfd_link_pic (info) && info->symbolic)
1053     elf_vax_link_hash_traverse (elf_hash_table (info),
1054 				elf_vax_discard_copies,
1055 				NULL);
1056 
1057   /* If this is a -Bsymbolic shared link, we need to discard all the got
1058      entries we've recorded.  Otherwise, we need to instantiate (allocate
1059      space for them).  */
1060   elf_link_hash_traverse (elf_hash_table (info),
1061 			  elf_vax_instantiate_got_entries,
1062 			  info);
1063 
1064   /* The check_relocs and adjust_dynamic_symbol entry points have
1065      determined the sizes of the various dynamic sections.  Allocate
1066      memory for them.  */
1067   relocs = false;
1068   for (s = dynobj->sections; s != NULL; s = s->next)
1069     {
1070       const char *name;
1071 
1072       if ((s->flags & SEC_LINKER_CREATED) == 0)
1073 	continue;
1074 
1075       /* It's OK to base decisions on the section name, because none
1076 	 of the dynobj section names depend upon the input files.  */
1077       name = bfd_section_name (s);
1078 
1079       if (strcmp (name, ".plt") == 0)
1080 	{
1081 	  /* Remember whether there is a PLT.  */
1082 	  ;
1083 	}
1084       else if (startswith (name, ".rela"))
1085 	{
1086 	  if (s->size != 0)
1087 	    {
1088 	      if (strcmp (name, ".rela.plt") != 0)
1089 		relocs = true;
1090 
1091 	      /* We use the reloc_count field as a counter if we need
1092 		 to copy relocs into the output file.  */
1093 	      s->reloc_count = 0;
1094 	    }
1095 	}
1096       else if (! startswith (name, ".got")
1097 	       && strcmp (name, ".dynbss") != 0)
1098 	{
1099 	  /* It's not one of our sections, so don't allocate space.  */
1100 	  continue;
1101 	}
1102 
1103       if (s->size == 0)
1104 	{
1105 	  /* If we don't need this section, strip it from the
1106 	     output file.  This is mostly to handle .rela.bss and
1107 	     .rela.plt.  We must create both sections in
1108 	     create_dynamic_sections, because they must be created
1109 	     before the linker maps input sections to output
1110 	     sections.  The linker does that before
1111 	     adjust_dynamic_symbol is called, and it is that
1112 	     function which decides whether anything needs to go
1113 	     into these sections.  */
1114 	  s->flags |= SEC_EXCLUDE;
1115 	  continue;
1116 	}
1117 
1118       if ((s->flags & SEC_HAS_CONTENTS) == 0)
1119 	continue;
1120 
1121       /* Allocate memory for the section contents.  */
1122       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1123       if (s->contents == NULL)
1124 	return false;
1125     }
1126 
1127   return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
1128 }
1129 
1130 /* This function is called via elf_vax_link_hash_traverse if we are
1131    creating a shared object with -Bsymbolic.  It discards the space
1132    allocated to copy PC relative relocs against symbols which are defined
1133    in regular objects.  We allocated space for them in the check_relocs
1134    routine, but we won't fill them in in the relocate_section routine.  */
1135 
1136 static bool
1137 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1138 			void * ignore ATTRIBUTE_UNUSED)
1139 {
1140   struct elf_vax_pcrel_relocs_copied *s;
1141 
1142   /* We only discard relocs for symbols defined in a regular object.  */
1143   if (!h->root.def_regular)
1144     return true;
1145 
1146   for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1147     s->section->size -= s->count * sizeof (Elf32_External_Rela);
1148 
1149   return true;
1150 }
1151 
1152 /* This function is called via elf_link_hash_traverse.  It looks for
1153    entries that have GOT or PLT (.GOT) references.  If creating a shared
1154    object with -Bsymbolic, or the symbol has been forced local, then it
1155    resets the reference count back to -1 so normal PC32 relocation will
1156    be done.  Otherwise space in the .got and .rela.got will be reserved
1157    for the symbol.  */
1158 
1159 static bool
1160 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1161 {
1162   struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1163   bfd *dynobj;
1164   asection *sgot;
1165   asection *srelgot;
1166 
1167   /* We don't care about non-GOT (and non-PLT) entries.  */
1168   if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1169     return true;
1170 
1171   dynobj = elf_hash_table (info)->dynobj;
1172   BFD_ASSERT (dynobj != NULL);
1173 
1174   sgot = elf_hash_table (info)->sgot;
1175   srelgot = elf_hash_table (info)->srelgot;
1176 
1177   if (SYMBOL_REFERENCES_LOCAL (info, h))
1178     {
1179       h->got.refcount = -1;
1180       h->plt.refcount = -1;
1181     }
1182   else if (h->got.refcount > 0)
1183     {
1184       /* Make sure this symbol is output as a dynamic symbol.  */
1185       if (h->dynindx == -1)
1186 	{
1187 	  if (!bfd_elf_link_record_dynamic_symbol (info, h))
1188 	    return false;
1189 	}
1190 
1191       /* Allocate space in the .got and .rela.got sections.  */
1192       sgot->size += 4;
1193       srelgot->size += sizeof (Elf32_External_Rela);
1194     }
1195 
1196   return true;
1197 }
1198 
1199 /* Relocate an VAX ELF section.  */
1200 
1201 static int
1202 elf_vax_relocate_section (bfd *output_bfd,
1203 			  struct bfd_link_info *info,
1204 			  bfd *input_bfd,
1205 			  asection *input_section,
1206 			  bfd_byte *contents,
1207 			  Elf_Internal_Rela *relocs,
1208 			  Elf_Internal_Sym *local_syms,
1209 			  asection **local_sections)
1210 {
1211   Elf_Internal_Shdr *symtab_hdr;
1212   struct elf_link_hash_entry **sym_hashes;
1213   bfd_vma plt_index;
1214   bfd_vma got_offset;
1215   asection *sgot;
1216   asection *splt;
1217   asection *sgotplt;
1218   asection *sreloc;
1219   Elf_Internal_Rela *rel;
1220   Elf_Internal_Rela *relend;
1221 
1222   symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1223   sym_hashes = elf_sym_hashes (input_bfd);
1224 
1225   sgot = NULL;
1226   splt = NULL;
1227   sgotplt = NULL;
1228   sreloc = NULL;
1229 
1230   rel = relocs;
1231   relend = relocs + input_section->reloc_count;
1232   for (; rel < relend; rel++)
1233     {
1234       int r_type;
1235       reloc_howto_type *howto;
1236       unsigned long r_symndx;
1237       struct elf_link_hash_entry *h;
1238       Elf_Internal_Sym *sym;
1239       asection *sec;
1240       bfd_vma relocation;
1241       bfd_reloc_status_type r;
1242 
1243       r_type = ELF32_R_TYPE (rel->r_info);
1244       if (r_type < 0 || r_type >= (int) R_VAX_max)
1245 	{
1246 	  bfd_set_error (bfd_error_bad_value);
1247 	  return false;
1248 	}
1249       howto = howto_table + r_type;
1250 
1251       r_symndx = ELF32_R_SYM (rel->r_info);
1252       h = NULL;
1253       sym = NULL;
1254       sec = NULL;
1255       if (r_symndx < symtab_hdr->sh_info)
1256 	{
1257 	  sym = local_syms + r_symndx;
1258 	  sec = local_sections[r_symndx];
1259 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1260 	}
1261       else
1262 	{
1263 	  bool unresolved_reloc;
1264 	  bool warned, ignored;
1265 
1266 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1267 				   r_symndx, symtab_hdr, sym_hashes,
1268 				   h, sec, relocation,
1269 				   unresolved_reloc, warned, ignored);
1270 
1271 	  if ((h->root.type == bfd_link_hash_defined
1272 	      || h->root.type == bfd_link_hash_defweak)
1273 	      && ((r_type == R_VAX_PLT32
1274 		   && h->plt.offset != (bfd_vma) -1
1275 		   && !h->forced_local
1276 		   && elf_hash_table (info)->dynamic_sections_created)
1277 		  || (r_type == R_VAX_GOT32
1278 		      && h->got.offset != (bfd_vma) -1
1279 		      && !h->forced_local
1280 		      && elf_hash_table (info)->dynamic_sections_created
1281 		      && (! bfd_link_pic (info)
1282 			  || (! info->symbolic && h->dynindx != -1)
1283 			  || !h->def_regular))
1284 		  || (bfd_link_pic (info)
1285 		      && ((! info->symbolic && h->dynindx != -1)
1286 			  || !h->def_regular)
1287 		      && ((input_section->flags & SEC_ALLOC) != 0
1288 			  /* DWARF will emit R_VAX_32 relocations in its
1289 			     sections against symbols defined externally
1290 			     in shared libraries.  We can't do anything
1291 			     with them here.  */
1292 
1293 			  || ((input_section->flags & SEC_DEBUGGING) != 0
1294 			      && h->def_dynamic))
1295 		      && (r_type == R_VAX_8
1296 			  || r_type == R_VAX_16
1297 			  || r_type == R_VAX_32))))
1298 	    /* In these cases, we don't need the relocation
1299 	       value.  We check specially because in some
1300 	       obscure cases sec->output_section will be NULL.  */
1301 	    relocation = 0;
1302 	}
1303 
1304       if (sec != NULL && discarded_section (sec))
1305 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1306 					 rel, 1, relend, howto, 0, contents);
1307 
1308       if (bfd_link_relocatable (info))
1309 	continue;
1310 
1311       switch (r_type)
1312 	{
1313 	case R_VAX_GOT32:
1314 	  /* Relocation is to the address of the entry for this symbol
1315 	     in the global offset table.  */
1316 
1317 	  /* Resolve a GOTxx reloc against a local symbol directly,
1318 	     without using the global offset table.  */
1319 	  if (h == NULL
1320 	      || h->got.offset == (bfd_vma) -1)
1321 	    break;
1322 
1323 	  {
1324 	    bfd_vma off;
1325 
1326 	    sgot = elf_hash_table (info)->sgot;
1327 	    BFD_ASSERT (sgot != NULL);
1328 
1329 	    off = h->got.offset;
1330 	    BFD_ASSERT (off < sgot->size);
1331 
1332 	    bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1333 
1334 	    relocation = sgot->output_offset + off;
1335 	    /* The GOT relocation uses the addend.  */
1336 	    rel->r_addend = 0;
1337 
1338 	    /* Change the reference to be indirect.  */
1339 	    contents[rel->r_offset - 1] |= 0x10;
1340 	    relocation += sgot->output_section->vma;
1341 	  }
1342 	  break;
1343 
1344 	case R_VAX_PC32:
1345 	  /* If we are creating an executable and the function this
1346 	     reloc refers to is in a shared lib, then we made a PLT
1347 	     entry for this symbol and need to handle the reloc like
1348 	     a PLT reloc.  */
1349 	  if (bfd_link_pic (info))
1350 	     goto r_vax_pc32_shared;
1351 	  /* Fall through.  */
1352 	case R_VAX_PLT32:
1353 	  /* Relocation is to the entry for this symbol in the
1354 	     procedure linkage table.  */
1355 
1356 	  /* Resolve a PLTxx reloc against a local symbol directly,
1357 	     without using the procedure linkage table.  */
1358 	  if (h == NULL
1359 	      || h->plt.offset == (bfd_vma) -1)
1360 	    break;
1361 
1362 	  splt = elf_hash_table (info)->splt;
1363 	  BFD_ASSERT (splt != NULL);
1364 
1365 	  sgotplt = elf_hash_table (info)->sgotplt;
1366 	  BFD_ASSERT (sgotplt != NULL);
1367 
1368 	  plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1369 
1370 	  /* Get the offset into the .got table of the entry that
1371 	     corresponds to this function.  Each .got entry is 4 bytes.
1372 	     The first two are reserved.  */
1373 	  got_offset = (plt_index + 3) * 4;
1374 
1375 	  /* We want the relocation to point into the .got.plt instead
1376 	     of the plt itself.  */
1377 	  relocation = (sgotplt->output_section->vma
1378 			+ sgotplt->output_offset
1379 			+ got_offset);
1380 	  contents[rel->r_offset-1] |= 0x10; /* make indirect */
1381 	  if (rel->r_addend == 2)
1382 	    {
1383 	      h->plt.offset |= 1;
1384 	    }
1385 	  else if (rel->r_addend != 0)
1386 	    _bfd_error_handler
1387 	      /* xgettext:c-format */
1388 	      (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1389 		 " from %pA section ignored"),
1390 	       input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1391 	       input_section);
1392 	  rel->r_addend = 0;
1393 
1394 	  break;
1395 
1396 	case R_VAX_PC8:
1397 	case R_VAX_PC16:
1398 	r_vax_pc32_shared:
1399 	  if (h == NULL
1400 	      || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1401 	      || h->forced_local)
1402 	    break;
1403 	  /* Fall through.  */
1404 	case R_VAX_8:
1405 	case R_VAX_16:
1406 	case R_VAX_32:
1407 	  if (bfd_link_pic (info)
1408 	      && r_symndx != STN_UNDEF
1409 	      && (input_section->flags & SEC_ALLOC) != 0
1410 	      && ((r_type != R_VAX_PC8
1411 		   && r_type != R_VAX_PC16
1412 		   && r_type != R_VAX_PC32)
1413 		  || ((input_section->flags & SEC_CODE)
1414 		      && (!info->symbolic
1415 			  || (!h->def_regular && h->type != STT_SECTION)))))
1416 	    {
1417 	      Elf_Internal_Rela outrel;
1418 	      bfd_byte *loc;
1419 	      bool skip, relocate;
1420 
1421 	      /* When generating a shared object, these relocations
1422 		 are copied into the output file to be resolved at run
1423 		 time.  */
1424 	      if (sreloc == NULL)
1425 		{
1426 		  sreloc = _bfd_elf_get_dynamic_reloc_section
1427 		    (input_bfd, input_section, /*rela?*/ true);
1428 		  if (sreloc == NULL)
1429 		    return false;
1430 		}
1431 
1432 	      skip = false;
1433 	      relocate = false;
1434 
1435 	      outrel.r_offset =
1436 		_bfd_elf_section_offset (output_bfd, info, input_section,
1437 					 rel->r_offset);
1438 	      if (outrel.r_offset == (bfd_vma) -1)
1439 		skip = true;
1440 	      if (outrel.r_offset == (bfd_vma) -2)
1441 		skip = true, relocate = true;
1442 	      outrel.r_offset += (input_section->output_section->vma
1443 				  + input_section->output_offset);
1444 
1445 	      if (skip)
1446 		  memset (&outrel, 0, sizeof outrel);
1447 	      /* h->dynindx may be -1 if the symbol was marked to
1448 		 become local.  */
1449 	      else if (h != NULL
1450 		       && ((! info->symbolic && h->dynindx != -1)
1451 			   || !h->def_regular))
1452 		{
1453 		  BFD_ASSERT (h->dynindx != -1);
1454 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1455 		  outrel.r_addend = relocation + rel->r_addend;
1456 		}
1457 	      else
1458 		{
1459 		  if (r_type == R_VAX_32)
1460 		    {
1461 		      relocate = true;
1462 		      outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1463 		      BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1464 						     &contents[rel->r_offset]) == 0);
1465 		      outrel.r_addend = relocation + rel->r_addend;
1466 		    }
1467 		  else
1468 		    {
1469 		      long indx;
1470 
1471 		      if (bfd_is_abs_section (sec))
1472 			indx = 0;
1473 		      else if (sec == NULL || sec->owner == NULL)
1474 			{
1475 			  bfd_set_error (bfd_error_bad_value);
1476 			  return false;
1477 			}
1478 		      else
1479 			{
1480 			  asection *osec;
1481 
1482 			  /* We are turning this relocation into one
1483 			     against a section symbol.  It would be
1484 			     proper to subtract the symbol's value,
1485 			     osec->vma, from the emitted reloc addend,
1486 			     but ld.so expects buggy relocs.  */
1487 			  osec = sec->output_section;
1488 			  indx = elf_section_data (osec)->dynindx;
1489 			  if (indx == 0)
1490 			    {
1491 			      struct elf_link_hash_table *htab;
1492 			      htab = elf_hash_table (info);
1493 			      osec = htab->text_index_section;
1494 			      indx = elf_section_data (osec)->dynindx;
1495 			    }
1496 			  BFD_ASSERT (indx != 0);
1497 			}
1498 
1499 		      outrel.r_info = ELF32_R_INFO (indx, r_type);
1500 		      outrel.r_addend = relocation + rel->r_addend;
1501 		    }
1502 		}
1503 
1504 	      if ((input_section->flags & SEC_CODE) != 0
1505 		  || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1506 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1507 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1508 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1509 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1510 		{
1511 		  if (h != NULL)
1512 		    _bfd_error_handler
1513 		      /* xgettext:c-format */
1514 		      (_("%pB: warning: %s relocation against symbol `%s'"
1515 			 " from %pA section"),
1516 		      input_bfd, howto->name, h->root.root.string,
1517 		      input_section);
1518 		  else
1519 		    _bfd_error_handler
1520 		      /* xgettext:c-format */
1521 		      (_("%pB: warning: %s relocation to %#" PRIx64
1522 			 " from %pA section"),
1523 		      input_bfd, howto->name, (uint64_t) outrel.r_addend,
1524 		      input_section);
1525 		}
1526 	      loc = sreloc->contents;
1527 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1528 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1529 
1530 	      /* This reloc will be computed at runtime, so there's no
1531 		 need to do anything now, except for R_VAX_32
1532 		 relocations that have been turned into
1533 		 R_VAX_RELATIVE.  */
1534 	      if (!relocate)
1535 		continue;
1536 	    }
1537 
1538 	  break;
1539 
1540 	case R_VAX_GNU_VTINHERIT:
1541 	case R_VAX_GNU_VTENTRY:
1542 	  /* These are no-ops in the end.  */
1543 	  continue;
1544 
1545 	default:
1546 	  break;
1547 	}
1548 
1549       /* VAX PCREL relocations are from the end of relocation, not the start.
1550 	 So subtract the difference from the relocation amount since we can't
1551 	 add it to the offset.  */
1552       if (howto->pc_relative && howto->pcrel_offset)
1553 	relocation -= bfd_get_reloc_size(howto);
1554 
1555       r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1556 				    contents, rel->r_offset,
1557 				    relocation, rel->r_addend);
1558 
1559       if (r != bfd_reloc_ok)
1560 	{
1561 	  switch (r)
1562 	    {
1563 	    default:
1564 	    case bfd_reloc_outofrange:
1565 	      abort ();
1566 	    case bfd_reloc_overflow:
1567 	      {
1568 		const char *name;
1569 
1570 		if (h != NULL)
1571 		  name = NULL;
1572 		else
1573 		  {
1574 		    name = bfd_elf_string_from_elf_section (input_bfd,
1575 							    symtab_hdr->sh_link,
1576 							    sym->st_name);
1577 		    if (name == NULL)
1578 		      return false;
1579 		    if (*name == '\0')
1580 		      name = bfd_section_name (sec);
1581 		  }
1582 		info->callbacks->reloc_overflow
1583 		  (info, (h ? &h->root : NULL), name, howto->name,
1584 		   (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1585 	      }
1586 	      break;
1587 	    }
1588 	}
1589     }
1590 
1591   return true;
1592 }
1593 
1594 /* Finish up dynamic symbol handling.  We set the contents of various
1595    dynamic sections here.  */
1596 
1597 static bool
1598 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1599 			       struct elf_link_hash_entry *h,
1600 			       Elf_Internal_Sym *sym)
1601 {
1602   bfd *dynobj;
1603 
1604   dynobj = elf_hash_table (info)->dynobj;
1605 
1606   if (h->plt.offset != (bfd_vma) -1)
1607     {
1608       asection *splt;
1609       asection *sgot;
1610       asection *srela;
1611       bfd_vma plt_index;
1612       bfd_vma got_offset;
1613       bfd_vma addend;
1614       Elf_Internal_Rela rela;
1615       bfd_byte *loc;
1616 
1617       /* This symbol has an entry in the procedure linkage table.  Set
1618 	 it up.  */
1619       BFD_ASSERT (h->dynindx != -1);
1620 
1621       splt = elf_hash_table (info)->splt;
1622       sgot = elf_hash_table (info)->sgotplt;
1623       srela = elf_hash_table (info)->srelplt;
1624       BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1625 
1626       addend = 2 * (h->plt.offset & 1);
1627       h->plt.offset &= ~1;
1628 
1629       /* Get the index in the procedure linkage table which
1630 	 corresponds to this symbol.  This is the index of this symbol
1631 	 in all the symbols for which we are making plt entries.  The
1632 	 first entry in the procedure linkage table is reserved.  */
1633       plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1634 
1635       /* Get the offset into the .got table of the entry that
1636 	 corresponds to this function.  Each .got entry is 4 bytes.
1637 	 The first two are reserved.  */
1638       got_offset = (plt_index + 3) * 4;
1639 
1640       /* Fill in the entry in the procedure linkage table.  */
1641       memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1642 		  PLT_ENTRY_SIZE);
1643 
1644       /* The offset is relative to the first extension word.  */
1645       bfd_put_32 (output_bfd,
1646 		  -(h->plt.offset + 8),
1647 		  splt->contents + h->plt.offset + 4);
1648 
1649       bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1650 		  splt->contents + h->plt.offset + 8);
1651 
1652       /* Fill in the entry in the global offset table.  */
1653       bfd_put_32 (output_bfd,
1654 		  (splt->output_section->vma
1655 		   + splt->output_offset
1656 		   + h->plt.offset) + addend,
1657 		  sgot->contents + got_offset);
1658 
1659       /* Fill in the entry in the .rela.plt section.  */
1660       rela.r_offset = (sgot->output_section->vma
1661 		       + sgot->output_offset
1662 		       + got_offset);
1663       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1664       rela.r_addend = addend;
1665       loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1666       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1667 
1668       if (!h->def_regular)
1669 	{
1670 	  /* Mark the symbol as undefined, rather than as defined in
1671 	     the .plt section.  Leave the value alone.  */
1672 	  sym->st_shndx = SHN_UNDEF;
1673 	}
1674     }
1675 
1676   if (h->got.offset != (bfd_vma) -1)
1677     {
1678       asection *sgot;
1679       asection *srela;
1680       Elf_Internal_Rela rela;
1681       bfd_byte *loc;
1682 
1683       /* This symbol has an entry in the global offset table.  Set it
1684 	 up.  */
1685       sgot = elf_hash_table (info)->sgot;
1686       srela = elf_hash_table (info)->srelgot;
1687       BFD_ASSERT (sgot != NULL && srela != NULL);
1688 
1689       rela.r_offset = (sgot->output_section->vma
1690 		       + sgot->output_offset
1691 		       + h->got.offset);
1692       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1693       rela.r_addend = bfd_get_signed_32 (output_bfd,
1694 					 sgot->contents + h->got.offset);
1695 
1696       loc = srela->contents;
1697       loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1698       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1699     }
1700 
1701   if (h->needs_copy)
1702     {
1703       asection *s;
1704       Elf_Internal_Rela rela;
1705       bfd_byte *loc;
1706 
1707       /* This symbol needs a copy reloc.  Set it up.  */
1708       BFD_ASSERT (h->dynindx != -1
1709 		  && (h->root.type == bfd_link_hash_defined
1710 		      || h->root.type == bfd_link_hash_defweak));
1711 
1712       s = bfd_get_linker_section (dynobj, ".rela.bss");
1713       BFD_ASSERT (s != NULL);
1714 
1715       rela.r_offset = (h->root.u.def.value
1716 		       + h->root.u.def.section->output_section->vma
1717 		       + h->root.u.def.section->output_offset);
1718       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1719       rela.r_addend = 0;
1720       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1721       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1722     }
1723 
1724   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
1725   if (h == elf_hash_table (info)->hdynamic
1726       || h == elf_hash_table (info)->hgot)
1727     sym->st_shndx = SHN_ABS;
1728 
1729   return true;
1730 }
1731 
1732 /* Finish up the dynamic sections.  */
1733 
1734 static bool
1735 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1736 {
1737   bfd *dynobj;
1738   asection *sgot;
1739   asection *sdyn;
1740 
1741   dynobj = elf_hash_table (info)->dynobj;
1742 
1743   sgot = elf_hash_table (info)->sgotplt;
1744   BFD_ASSERT (sgot != NULL);
1745   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1746 
1747   if (elf_hash_table (info)->dynamic_sections_created)
1748     {
1749       asection *splt;
1750       Elf32_External_Dyn *dyncon, *dynconend;
1751 
1752       splt = elf_hash_table (info)->splt;
1753       BFD_ASSERT (splt != NULL && sdyn != NULL);
1754 
1755       dyncon = (Elf32_External_Dyn *) sdyn->contents;
1756       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1757       for (; dyncon < dynconend; dyncon++)
1758 	{
1759 	  Elf_Internal_Dyn dyn;
1760 	  asection *s;
1761 
1762 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1763 
1764 	  switch (dyn.d_tag)
1765 	    {
1766 	    default:
1767 	      break;
1768 
1769 	    case DT_PLTGOT:
1770 	      s = elf_hash_table (info)->sgotplt;
1771 	      goto get_vma;
1772 	    case DT_JMPREL:
1773 	      s = elf_hash_table (info)->srelplt;
1774 	    get_vma:
1775 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1776 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1777 	      break;
1778 
1779 	    case DT_PLTRELSZ:
1780 	      s = elf_hash_table (info)->srelplt;
1781 	      dyn.d_un.d_val = s->size;
1782 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1783 	      break;
1784 	    }
1785 	}
1786 
1787       /* Fill in the first entry in the procedure linkage table.  */
1788       if (splt->size > 0)
1789 	{
1790 	  memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1791 	  bfd_put_32 (output_bfd,
1792 			  (sgot->output_section->vma
1793 			   + sgot->output_offset + 4
1794 			   - (splt->output_section->vma + 6)),
1795 			  splt->contents + 2);
1796 	  bfd_put_32 (output_bfd,
1797 			  (sgot->output_section->vma
1798 			   + sgot->output_offset + 8
1799 			   - (splt->output_section->vma + 12)),
1800 			  splt->contents + 8);
1801 	  elf_section_data (splt->output_section)->this_hdr.sh_entsize
1802 	   = PLT_ENTRY_SIZE;
1803 	}
1804     }
1805 
1806   /* Fill in the first three entries in the global offset table.  */
1807   if (sgot->size > 0)
1808     {
1809       if (sdyn == NULL)
1810 	bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1811       else
1812 	bfd_put_32 (output_bfd,
1813 		    sdyn->output_section->vma + sdyn->output_offset,
1814 		    sgot->contents);
1815       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1816       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1817     }
1818 
1819   if (elf_section_data (sgot->output_section) != NULL)
1820     elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1821 
1822   return true;
1823 }
1824 
1825 static enum elf_reloc_type_class
1826 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1827 			  const asection *rel_sec ATTRIBUTE_UNUSED,
1828 			  const Elf_Internal_Rela *rela)
1829 {
1830   switch ((int) ELF32_R_TYPE (rela->r_info))
1831     {
1832     case R_VAX_RELATIVE:
1833       return reloc_class_relative;
1834     case R_VAX_JMP_SLOT:
1835       return reloc_class_plt;
1836     case R_VAX_COPY:
1837       return reloc_class_copy;
1838     default:
1839       return reloc_class_normal;
1840     }
1841 }
1842 
1843 static bfd_vma
1844 elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1845 		     const arelent *rel ATTRIBUTE_UNUSED)
1846 {
1847   return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1848 }
1849 
1850 #define TARGET_LITTLE_SYM		vax_elf32_vec
1851 #define TARGET_LITTLE_NAME		"elf32-vax"
1852 #define ELF_MACHINE_CODE		EM_VAX
1853 #define ELF_MAXPAGESIZE			0x1000
1854 
1855 #define elf_backend_create_dynamic_sections \
1856 					_bfd_elf_create_dynamic_sections
1857 #define bfd_elf32_bfd_link_hash_table_create \
1858 					elf_vax_link_hash_table_create
1859 #define bfd_elf32_bfd_final_link	bfd_elf_gc_common_final_link
1860 
1861 #define elf_backend_check_relocs	elf_vax_check_relocs
1862 #define elf_backend_adjust_dynamic_symbol \
1863 					elf_vax_adjust_dynamic_symbol
1864 #define elf_backend_always_size_sections \
1865 					elf_vax_always_size_sections
1866 #define elf_backend_size_dynamic_sections \
1867 					elf_vax_size_dynamic_sections
1868 #define elf_backend_init_index_section	_bfd_elf_init_1_index_section
1869 #define elf_backend_relocate_section	elf_vax_relocate_section
1870 #define elf_backend_finish_dynamic_symbol \
1871 					elf_vax_finish_dynamic_symbol
1872 #define elf_backend_finish_dynamic_sections \
1873 					elf_vax_finish_dynamic_sections
1874 #define elf_backend_reloc_type_class	elf_vax_reloc_type_class
1875 #define elf_backend_gc_mark_hook	elf_vax_gc_mark_hook
1876 #define elf_backend_plt_sym_val		elf_vax_plt_sym_val
1877 #define bfd_elf32_bfd_merge_private_bfd_data \
1878 					elf32_vax_merge_private_bfd_data
1879 #define bfd_elf32_bfd_set_private_flags \
1880 					elf32_vax_set_private_flags
1881 #define bfd_elf32_bfd_print_private_bfd_data \
1882 					elf32_vax_print_private_bfd_data
1883 
1884 #define elf_backend_can_gc_sections	1
1885 #define elf_backend_want_got_plt	1
1886 #define elf_backend_plt_readonly	1
1887 #define elf_backend_want_plt_sym	0
1888 #define elf_backend_got_header_size	16
1889 #define elf_backend_rela_normal		1
1890 #define elf_backend_dtrel_excludes_plt	1
1891 
1892 #include "elf32-target.h"
1893