1 /* VAX series support for 32-bit ELF
2    Copyright (C) 1993-2020 Free Software Foundation, Inc.
3    Contributed by Matt Thomas <matt@3am-software.com>.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20    MA 02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28 
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static bfd_boolean rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 							 struct bfd_hash_table *,
33 							 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 					 asection *, const Elf_Internal_Rela *);
37 static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
38 						  struct elf_link_hash_entry *);
39 static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
40 static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
41 					     bfd *, asection *, bfd_byte *,
42 					     Elf_Internal_Rela *,
43 					     Elf_Internal_Sym *, asection **);
44 static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
45 						  struct elf_link_hash_entry *,
46 						  Elf_Internal_Sym *);
47 static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
48 						    struct bfd_link_info *);
49 static bfd_vma elf_vax_plt_sym_val (bfd_vma, const asection *,
50 				    const arelent *);
51 
52 static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
53 static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, void *);
54 
55 static reloc_howto_type howto_table[] = {
56   HOWTO (R_VAX_NONE,		/* type */
57 	 0,			/* rightshift */
58 	 3,			/* size (0 = byte, 1 = short, 2 = long) */
59 	 0,			/* bitsize */
60 	 FALSE,			/* pc_relative */
61 	 0,			/* bitpos */
62 	 complain_overflow_dont, /* complain_on_overflow */
63 	 bfd_elf_generic_reloc,	/* special_function */
64 	 "R_VAX_NONE",		/* name */
65 	 FALSE,			/* partial_inplace */
66 	 0,			/* src_mask */
67 	 0x00000000,		/* dst_mask */
68 	 FALSE),		/* pcrel_offset */
69 
70   HOWTO (R_VAX_32,		/* type */
71 	 0,			/* rightshift */
72 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
73 	 32,			/* bitsize */
74 	 FALSE,			/* pc_relative */
75 	 0,			/* bitpos */
76 	 complain_overflow_bitfield, /* complain_on_overflow */
77 	 bfd_elf_generic_reloc,	/* special_function */
78 	 "R_VAX_32",		/* name */
79 	 FALSE,			/* partial_inplace */
80 	 0,			/* src_mask */
81 	 0xffffffff,		/* dst_mask */
82 	 FALSE),		/* pcrel_offset */
83 
84   HOWTO (R_VAX_16,		/* type */
85 	 0,			/* rightshift */
86 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
87 	 16,			/* bitsize */
88 	 FALSE,			/* pc_relative */
89 	 0,			/* bitpos */
90 	 complain_overflow_bitfield, /* complain_on_overflow */
91 	 bfd_elf_generic_reloc,	/* special_function */
92 	 "R_VAX_16",		/* name */
93 	 FALSE,			/* partial_inplace */
94 	 0,			/* src_mask */
95 	 0x0000ffff,		/* dst_mask */
96 	 FALSE),		/* pcrel_offset */
97 
98   HOWTO (R_VAX_8,		/* type */
99 	 0,			/* rightshift */
100 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
101 	 8,			/* bitsize */
102 	 FALSE,			/* pc_relative */
103 	 0,			/* bitpos */
104 	 complain_overflow_bitfield, /* complain_on_overflow */
105 	 bfd_elf_generic_reloc,	/* special_function */
106 	 "R_VAX_8",		/* name */
107 	 FALSE,			/* partial_inplace */
108 	 0,			/* src_mask */
109 	 0x000000ff,		/* dst_mask */
110 	 FALSE),		/* pcrel_offset */
111 
112   HOWTO (R_VAX_PC32,		/* type */
113 	 0,			/* rightshift */
114 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
115 	 32,			/* bitsize */
116 	 TRUE,			/* pc_relative */
117 	 0,			/* bitpos */
118 	 complain_overflow_bitfield, /* complain_on_overflow */
119 	 bfd_elf_generic_reloc,	/* special_function */
120 	 "R_VAX_PC32",		/* name */
121 	 FALSE,			/* partial_inplace */
122 	 0,			/* src_mask */
123 	 0xffffffff,		/* dst_mask */
124 	 TRUE),			/* pcrel_offset */
125 
126   HOWTO (R_VAX_PC16,		/* type */
127 	 0,			/* rightshift */
128 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
129 	 16,			/* bitsize */
130 	 TRUE,			/* pc_relative */
131 	 0,			/* bitpos */
132 	 complain_overflow_signed, /* complain_on_overflow */
133 	 bfd_elf_generic_reloc,	/* special_function */
134 	 "R_VAX_PC16",		/* name */
135 	 FALSE,			/* partial_inplace */
136 	 0,			/* src_mask */
137 	 0x0000ffff,		/* dst_mask */
138 	 TRUE),			/* pcrel_offset */
139 
140   HOWTO (R_VAX_PC8,		/* type */
141 	 0,			/* rightshift */
142 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
143 	 8,			/* bitsize */
144 	 TRUE,			/* pc_relative */
145 	 0,			/* bitpos */
146 	 complain_overflow_signed, /* complain_on_overflow */
147 	 bfd_elf_generic_reloc,	/* special_function */
148 	 "R_VAX_PC8",		/* name */
149 	 FALSE,			/* partial_inplace */
150 	 0,			/* src_mask */
151 	 0x000000ff,		/* dst_mask */
152 	 TRUE),			/* pcrel_offset */
153 
154   HOWTO (R_VAX_GOT32,		/* type */
155 	 0,			/* rightshift */
156 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
157 	 32,			/* bitsize */
158 	 TRUE,			/* pc_relative */
159 	 0,			/* bitpos */
160 	 complain_overflow_bitfield, /* complain_on_overflow */
161 	 bfd_elf_generic_reloc,	/* special_function */
162 	 "R_VAX_GOT32",		/* name */
163 	 FALSE,			/* partial_inplace */
164 	 0,			/* src_mask */
165 	 0xffffffff,		/* dst_mask */
166 	 TRUE),			/* pcrel_offset */
167 
168   EMPTY_HOWTO (-1),
169   EMPTY_HOWTO (-1),
170   EMPTY_HOWTO (-1),
171   EMPTY_HOWTO (-1),
172   EMPTY_HOWTO (-1),
173 
174   HOWTO (R_VAX_PLT32,		/* type */
175 	 0,			/* rightshift */
176 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
177 	 32,			/* bitsize */
178 	 TRUE,			/* pc_relative */
179 	 0,			/* bitpos */
180 	 complain_overflow_bitfield, /* complain_on_overflow */
181 	 bfd_elf_generic_reloc,	/* special_function */
182 	 "R_VAX_PLT32",		/* name */
183 	 FALSE,			/* partial_inplace */
184 	 0,			/* src_mask */
185 	 0xffffffff,		/* dst_mask */
186 	 TRUE),			/* pcrel_offset */
187 
188   EMPTY_HOWTO (-1),
189   EMPTY_HOWTO (-1),
190   EMPTY_HOWTO (-1),
191   EMPTY_HOWTO (-1),
192   EMPTY_HOWTO (-1),
193 
194   HOWTO (R_VAX_COPY,		/* type */
195 	 0,			/* rightshift */
196 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
197 	 0,			/* bitsize */
198 	 FALSE,			/* pc_relative */
199 	 0,			/* bitpos */
200 	 complain_overflow_dont, /* complain_on_overflow */
201 	 bfd_elf_generic_reloc,	/* special_function */
202 	 "R_VAX_COPY",		/* name */
203 	 FALSE,			/* partial_inplace */
204 	 0,			/* src_mask */
205 	 0xffffffff,		/* dst_mask */
206 	 FALSE),		/* pcrel_offset */
207 
208   HOWTO (R_VAX_GLOB_DAT,	/* type */
209 	 0,			/* rightshift */
210 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
211 	 32,			/* bitsize */
212 	 FALSE,			/* pc_relative */
213 	 0,			/* bitpos */
214 	 complain_overflow_dont, /* complain_on_overflow */
215 	 bfd_elf_generic_reloc,	/* special_function */
216 	 "R_VAX_GLOB_DAT",	/* name */
217 	 FALSE,			/* partial_inplace */
218 	 0,			/* src_mask */
219 	 0xffffffff,		/* dst_mask */
220 	 FALSE),		/* pcrel_offset */
221 
222   HOWTO (R_VAX_JMP_SLOT,	/* type */
223 	 0,			/* rightshift */
224 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
225 	 32,			/* bitsize */
226 	 FALSE,			/* pc_relative */
227 	 0,			/* bitpos */
228 	 complain_overflow_dont, /* complain_on_overflow */
229 	 bfd_elf_generic_reloc,	/* special_function */
230 	 "R_VAX_JMP_SLOT",	/* name */
231 	 FALSE,			/* partial_inplace */
232 	 0,			/* src_mask */
233 	 0xffffffff,		/* dst_mask */
234 	 FALSE),		/* pcrel_offset */
235 
236   HOWTO (R_VAX_RELATIVE,	/* type */
237 	 0,			/* rightshift */
238 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
239 	 32,			/* bitsize */
240 	 FALSE,			/* pc_relative */
241 	 0,			/* bitpos */
242 	 complain_overflow_dont, /* complain_on_overflow */
243 	 bfd_elf_generic_reloc,	/* special_function */
244 	 "R_VAX_RELATIVE",	/* name */
245 	 FALSE,			/* partial_inplace */
246 	 0,			/* src_mask */
247 	 0xffffffff,		/* dst_mask */
248 	 FALSE),		/* pcrel_offset */
249 
250   /* GNU extension to record C++ vtable hierarchy */
251   HOWTO (R_VAX_GNU_VTINHERIT,	/* type */
252 	 0,			/* rightshift */
253 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
254 	 0,			/* bitsize */
255 	 FALSE,			/* pc_relative */
256 	 0,			/* bitpos */
257 	 complain_overflow_dont, /* complain_on_overflow */
258 	 NULL,			/* special_function */
259 	 "R_VAX_GNU_VTINHERIT",	/* name */
260 	 FALSE,			/* partial_inplace */
261 	 0,			/* src_mask */
262 	 0,			/* dst_mask */
263 	 FALSE),		/* pcrel_offset */
264 
265   /* GNU extension to record C++ vtable member usage */
266   HOWTO (R_VAX_GNU_VTENTRY,	/* type */
267 	 0,			/* rightshift */
268 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
269 	 0,			/* bitsize */
270 	 FALSE,			/* pc_relative */
271 	 0,			/* bitpos */
272 	 complain_overflow_dont, /* complain_on_overflow */
273 	 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
274 	 "R_VAX_GNU_VTENTRY",	/* name */
275 	 FALSE,			/* partial_inplace */
276 	 0,			/* src_mask */
277 	 0,			/* dst_mask */
278 	 FALSE),		/* pcrel_offset */
279 };
280 
281 static bfd_boolean
rtype_to_howto(bfd * abfd,arelent * cache_ptr,Elf_Internal_Rela * dst)282 rtype_to_howto (bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst)
283 {
284   unsigned int r_type;
285 
286   r_type = ELF32_R_TYPE (dst->r_info);
287   if (r_type >= R_VAX_max)
288     {
289       /* xgettext:c-format */
290       _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
291 			  abfd, r_type);
292       bfd_set_error (bfd_error_bad_value);
293       return FALSE;
294     }
295   cache_ptr->howto = &howto_table[r_type];
296   return TRUE;
297 }
298 
299 #define elf_info_to_howto rtype_to_howto
300 
301 static const struct
302 {
303   bfd_reloc_code_real_type bfd_val;
304   int elf_val;
305 } reloc_map[] = {
306   { BFD_RELOC_NONE, R_VAX_NONE },
307   { BFD_RELOC_32, R_VAX_32 },
308   { BFD_RELOC_16, R_VAX_16 },
309   { BFD_RELOC_8, R_VAX_8 },
310   { BFD_RELOC_32_PCREL, R_VAX_PC32 },
311   { BFD_RELOC_16_PCREL, R_VAX_PC16 },
312   { BFD_RELOC_8_PCREL, R_VAX_PC8 },
313   { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
314   { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
315   { BFD_RELOC_NONE, R_VAX_COPY },
316   { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
317   { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
318   { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
319   { BFD_RELOC_CTOR, R_VAX_32 },
320   { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
321   { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
322 };
323 
324 static reloc_howto_type *
reloc_type_lookup(bfd * abfd ATTRIBUTE_UNUSED,bfd_reloc_code_real_type code)325 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
326 {
327   unsigned int i;
328   for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
329     {
330       if (reloc_map[i].bfd_val == code)
331 	return &howto_table[reloc_map[i].elf_val];
332     }
333   return 0;
334 }
335 
336 static reloc_howto_type *
reloc_name_lookup(bfd * abfd ATTRIBUTE_UNUSED,const char * r_name)337 reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
338 		   const char *r_name)
339 {
340   unsigned int i;
341 
342   for (i = 0; i < sizeof (howto_table) / sizeof (howto_table[0]); i++)
343     if (howto_table[i].name != NULL
344 	&& strcasecmp (howto_table[i].name, r_name) == 0)
345       return &howto_table[i];
346 
347   return NULL;
348 }
349 
350 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
351 #define bfd_elf32_bfd_reloc_name_lookup reloc_name_lookup
352 #define ELF_ARCH bfd_arch_vax
353 /* end code generated by elf.el */
354 
355 /* Functions for the VAX ELF linker.  */
356 
357 /* The name of the dynamic interpreter.  This is put in the .interp
358    section.  */
359 
360 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
361 
362 /* The size in bytes of an entry in the procedure linkage table.  */
363 
364 #define PLT_ENTRY_SIZE 12
365 
366 /* The first entry in a procedure linkage table looks like this.  See
367    the SVR4 ABI VAX supplement to see how this works.  */
368 
369 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
370 {
371   0xdd, 0xef,		/* pushl l^ */
372   0, 0, 0, 0,		/* offset to .plt.got + 4 */
373   0x17, 0xff,		/* jmp @L^(pc) */
374   0, 0, 0, 0,		/* offset to .plt.got + 8 */
375 };
376 
377 /* Subsequent entries in a procedure linkage table look like this.  */
378 
379 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
380 {
381   0xfc, 0x0f,		/* .word ^M<r11:r2> */
382   0x16, 0xef,		/* jsb L^(pc) */
383   0, 0, 0, 0,		/* replaced with offset to start of .plt  */
384   0, 0, 0, 0,		/* index into .rela.plt */
385 };
386 
387 /* The VAX linker needs to keep track of the number of relocs that it
388    decides to copy in check_relocs for each symbol.  This is so that it
389    can discard PC relative relocs if it doesn't need them when linking
390    with -Bsymbolic.  We store the information in a field extending the
391    regular ELF linker hash table.  */
392 
393 /* This structure keeps track of the number of PC relative relocs we have
394    copied for a given symbol.  */
395 
396 struct elf_vax_pcrel_relocs_copied
397 {
398   /* Next section.  */
399   struct elf_vax_pcrel_relocs_copied *next;
400   /* A section in dynobj.  */
401   asection *section;
402   /* Number of relocs copied in this section.  */
403   bfd_size_type count;
404 };
405 
406 /* VAX ELF linker hash entry.  */
407 
408 struct elf_vax_link_hash_entry
409 {
410   struct elf_link_hash_entry root;
411 
412   /* Number of PC relative relocs copied for this symbol.  */
413   struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
414 
415   bfd_vma got_addend;
416 };
417 
418 /* Declare this now that the above structures are defined.  */
419 
420 static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
421 					   void *);
422 
423 /* Declare this now that the above structures are defined.  */
424 
425 static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
426 						    void *);
427 
428 /* Traverse an VAX ELF linker hash table.  */
429 
430 #define elf_vax_link_hash_traverse(table, func, info)			\
431   (elf_link_hash_traverse						\
432    ((table),								\
433     (bfd_boolean (*) (struct elf_link_hash_entry *, void *)) (func),	\
434     (info)))
435 
436 /* Create an entry in an VAX ELF linker hash table.  */
437 
438 static struct bfd_hash_entry *
elf_vax_link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)439 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
440 			   struct bfd_hash_table *table,
441 			   const char *string)
442 {
443   struct elf_vax_link_hash_entry *ret =
444     (struct elf_vax_link_hash_entry *) entry;
445 
446   /* Allocate the structure if it has not already been allocated by a
447      subclass.  */
448   if (ret == NULL)
449     ret = ((struct elf_vax_link_hash_entry *)
450 	   bfd_hash_allocate (table,
451 			      sizeof (struct elf_vax_link_hash_entry)));
452   if (ret == NULL)
453     return (struct bfd_hash_entry *) ret;
454 
455   /* Call the allocation method of the superclass.  */
456   ret = ((struct elf_vax_link_hash_entry *)
457 	 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
458 				     table, string));
459   if (ret != NULL)
460     {
461       ret->pcrel_relocs_copied = NULL;
462     }
463 
464   return (struct bfd_hash_entry *) ret;
465 }
466 
467 /* Create an VAX ELF linker hash table.  */
468 
469 static struct bfd_link_hash_table *
elf_vax_link_hash_table_create(bfd * abfd)470 elf_vax_link_hash_table_create (bfd *abfd)
471 {
472   struct elf_link_hash_table *ret;
473   bfd_size_type amt = sizeof (struct elf_link_hash_table);
474 
475   ret = bfd_zmalloc (amt);
476   if (ret == NULL)
477     return NULL;
478 
479   if (!_bfd_elf_link_hash_table_init (ret, abfd,
480 				      elf_vax_link_hash_newfunc,
481 				      sizeof (struct elf_vax_link_hash_entry),
482 				      GENERIC_ELF_DATA))
483     {
484       free (ret);
485       return NULL;
486     }
487 
488   return &ret->root;
489 }
490 
491 /* Keep vax-specific flags in the ELF header */
492 static bfd_boolean
elf32_vax_set_private_flags(bfd * abfd,flagword flags)493 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
494 {
495   elf_elfheader (abfd)->e_flags = flags;
496   elf_flags_init (abfd) = TRUE;
497   return TRUE;
498 }
499 
500 /* Copy vax-specific data from one module to another */
501 static bfd_boolean
elf32_vax_copy_private_bfd_data(bfd * ibfd,bfd * obfd)502 elf32_vax_copy_private_bfd_data (bfd *ibfd, bfd *obfd)
503 {
504   flagword in_flags;
505 
506   if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
507       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
508     return TRUE;
509 
510   in_flags = elf_elfheader (ibfd)->e_flags;
511 
512   elf_elfheader (obfd)->e_flags = in_flags;
513   elf_flags_init (obfd) = TRUE;
514 
515   return TRUE;
516 }
517 
518 /* Merge backend specific data from an object file to the output
519    object file when linking.  */
520 static bfd_boolean
elf32_vax_merge_private_bfd_data(bfd * ibfd,struct bfd_link_info * info)521 elf32_vax_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
522 {
523   bfd *obfd = info->output_bfd;
524   flagword in_flags;
525 
526   if (   bfd_get_flavour (ibfd) != bfd_target_elf_flavour
527       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
528     return TRUE;
529 
530   in_flags  = elf_elfheader (ibfd)->e_flags;
531 
532   if (!elf_flags_init (obfd))
533     {
534       elf_flags_init (obfd) = TRUE;
535       elf_elfheader (obfd)->e_flags = in_flags;
536     }
537 
538   return TRUE;
539 }
540 
541 /* Display the flags field */
542 static bfd_boolean
elf32_vax_print_private_bfd_data(bfd * abfd,void * ptr)543 elf32_vax_print_private_bfd_data (bfd *abfd, void * ptr)
544 {
545   FILE *file = (FILE *) ptr;
546 
547   BFD_ASSERT (abfd != NULL && ptr != NULL);
548 
549   /* Print normal ELF private data.  */
550   _bfd_elf_print_private_bfd_data (abfd, ptr);
551 
552   /* Ignore init flag - it may not be set, despite the flags field containing valid data.  */
553 
554   /* xgettext:c-format */
555   fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
556 
557   if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
558     fprintf (file, _(" [nonpic]"));
559 
560   if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
561     fprintf (file, _(" [d-float]"));
562 
563   if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
564     fprintf (file, _(" [g-float]"));
565 
566   fputc ('\n', file);
567 
568   return TRUE;
569 }
570 /* Look through the relocs for a section during the first phase, and
571    allocate space in the global offset table or procedure linkage
572    table.  */
573 
574 static bfd_boolean
elf_vax_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)575 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
576 		      const Elf_Internal_Rela *relocs)
577 {
578   bfd *dynobj;
579   Elf_Internal_Shdr *symtab_hdr;
580   struct elf_link_hash_entry **sym_hashes;
581   const Elf_Internal_Rela *rel;
582   const Elf_Internal_Rela *rel_end;
583   asection *sreloc;
584 
585   if (bfd_link_relocatable (info))
586     return TRUE;
587 
588   dynobj = elf_hash_table (info)->dynobj;
589   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
590   sym_hashes = elf_sym_hashes (abfd);
591 
592   sreloc = NULL;
593 
594   rel_end = relocs + sec->reloc_count;
595   for (rel = relocs; rel < rel_end; rel++)
596     {
597       unsigned long r_symndx;
598       struct elf_link_hash_entry *h;
599 
600       r_symndx = ELF32_R_SYM (rel->r_info);
601 
602       if (r_symndx < symtab_hdr->sh_info)
603 	h = NULL;
604       else
605 	{
606 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
607 	  while (h->root.type == bfd_link_hash_indirect
608 		 || h->root.type == bfd_link_hash_warning)
609 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
610 	}
611 
612       switch (ELF32_R_TYPE (rel->r_info))
613 	{
614 	case R_VAX_GOT32:
615 	  BFD_ASSERT (h != NULL);
616 
617 	  /* If this is a local symbol, we resolve it directly without
618 	     creating a global offset table entry.  */
619 	  if (h->forced_local
620 	      || h == elf_hash_table (info)->hgot
621 	      || h == elf_hash_table (info)->hplt)
622 	    break;
623 
624 	  /* This symbol requires a global offset table entry.  */
625 
626 	  if (dynobj == NULL)
627 	    {
628 	      /* Create the .got section.  */
629 	      elf_hash_table (info)->dynobj = dynobj = abfd;
630 	      if (!_bfd_elf_create_got_section (dynobj, info))
631 		return FALSE;
632 	    }
633 
634 	  if (h != NULL)
635 	    {
636 	      struct elf_vax_link_hash_entry *eh;
637 
638 	      eh = (struct elf_vax_link_hash_entry *) h;
639 	      if (h->got.refcount == -1)
640 		{
641 		  h->got.refcount = 1;
642 		  eh->got_addend = rel->r_addend;
643 		}
644 	      else
645 		{
646 		  h->got.refcount++;
647 		  if (eh->got_addend != (bfd_vma) rel->r_addend)
648 		    _bfd_error_handler
649 		      /* xgettext:c-format */
650 		      (_("%pB: warning: GOT addend of %" PRId64 " to `%s' does"
651 			 " not match previous GOT addend of %" PRId64),
652 			 abfd, (int64_t) rel->r_addend, h->root.root.string,
653 			 (int64_t) eh->got_addend);
654 
655 		}
656 	    }
657 	  break;
658 
659 	case R_VAX_PLT32:
660 	  /* This symbol requires a procedure linkage table entry.  We
661 	     actually build the entry in adjust_dynamic_symbol,
662 	     because this might be a case of linking PIC code which is
663 	     never referenced by a dynamic object, in which case we
664 	     don't need to generate a procedure linkage table entry
665 	     after all.  */
666 	  BFD_ASSERT (h != NULL);
667 
668 	  /* If this is a local symbol, we resolve it directly without
669 	     creating a procedure linkage table entry.  */
670 	  if (h->forced_local)
671 	    break;
672 
673 	  h->needs_plt = 1;
674 	  if (h->plt.refcount == -1)
675 	    h->plt.refcount = 1;
676 	  else
677 	    h->plt.refcount++;
678 	  break;
679 
680 	case R_VAX_PC8:
681 	case R_VAX_PC16:
682 	case R_VAX_PC32:
683 	  /* If we are creating a shared library and this is not a local
684 	     symbol, we need to copy the reloc into the shared library.
685 	     However when linking with -Bsymbolic and this is a global
686 	     symbol which is defined in an object we are including in the
687 	     link (i.e., DEF_REGULAR is set), then we can resolve the
688 	     reloc directly.  At this point we have not seen all the input
689 	     files, so it is possible that DEF_REGULAR is not set now but
690 	     will be set later (it is never cleared).  We account for that
691 	     possibility below by storing information in the
692 	     pcrel_relocs_copied field of the hash table entry.  */
693 	  if (!(bfd_link_pic (info)
694 		&& (sec->flags & SEC_ALLOC) != 0
695 		&& h != NULL
696 		&& (!info->symbolic
697 		    || !h->def_regular)))
698 	    {
699 	      if (h != NULL
700 		  && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
701 		  && !h->forced_local)
702 		{
703 		  /* Make sure a plt entry is created for this symbol if
704 		     it turns out to be a function defined by a dynamic
705 		     object.  */
706 		  if (h->plt.refcount == -1)
707 		    h->plt.refcount = 1;
708 		  else
709 		    h->plt.refcount++;
710 		}
711 	      break;
712 	    }
713 	  /* If this is a local symbol, we can resolve it directly.  */
714 	  if (h != NULL
715 	      && (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
716 		  || h->forced_local))
717 	    break;
718 
719 	  /* Fall through.  */
720 	case R_VAX_8:
721 	case R_VAX_16:
722 	case R_VAX_32:
723 	  if (h != NULL && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
724 	    {
725 	      /* Make sure a plt entry is created for this symbol if it
726 		 turns out to be a function defined by a dynamic object.  */
727 	      if (h->plt.refcount == -1)
728 		h->plt.refcount = 1;
729 	      else
730 		h->plt.refcount++;
731 	    }
732 
733 	  /* If we are creating a shared library, we need to copy the
734 	     reloc into the shared library.  */
735 	  if (bfd_link_pic (info)
736 	      && (sec->flags & SEC_ALLOC) != 0)
737 	    {
738 	      /* When creating a shared object, we must copy these
739 		 reloc types into the output file.  We create a reloc
740 		 section in dynobj and make room for this reloc.  */
741 	      if (sreloc == NULL)
742 		{
743 		  sreloc = _bfd_elf_make_dynamic_reloc_section
744 		    (sec, dynobj, 2, abfd, /*rela?*/ TRUE);
745 
746 		  if (sreloc == NULL)
747 		    return FALSE;
748 
749 		  if (sec->flags & SEC_READONLY)
750 		    {
751 			if (info->warn_shared_textrel)
752 			  (*_bfd_error_handler)
753 			    (_("warning: dynamic relocation to `%s' in readonly section `%s'"),
754 			     h ? h->root.root.string : "?", sec->name);
755 			info->flags |= DF_TEXTREL;
756 		    }
757 		}
758 
759 	      sreloc->size += sizeof (Elf32_External_Rela);
760 
761 	      /* If we are linking with -Bsymbolic, we count the number of
762 		 PC relative relocations we have entered for this symbol,
763 		 so that we can discard them again if the symbol is later
764 		 defined by a regular object.  Note that this function is
765 		 only called if we are using a vaxelf linker hash table,
766 		 which means that h is really a pointer to an
767 		 elf_vax_link_hash_entry.  */
768 	      if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
769 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
770 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
771 		  && info->symbolic)
772 		{
773 		  struct elf_vax_link_hash_entry *eh;
774 		  struct elf_vax_pcrel_relocs_copied *p;
775 
776 		  eh = (struct elf_vax_link_hash_entry *) h;
777 
778 		  for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
779 		    if (p->section == sreloc)
780 		      break;
781 
782 		  if (p == NULL)
783 		    {
784 		      p = ((struct elf_vax_pcrel_relocs_copied *)
785 			   bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
786 		      if (p == NULL)
787 			return FALSE;
788 		      p->next = eh->pcrel_relocs_copied;
789 		      eh->pcrel_relocs_copied = p;
790 		      p->section = sreloc;
791 		      p->count = 0;
792 		    }
793 
794 		  ++p->count;
795 		}
796 	    }
797 
798 	  break;
799 
800 	  /* This relocation describes the C++ object vtable hierarchy.
801 	     Reconstruct it for later use during GC.  */
802 	case R_VAX_GNU_VTINHERIT:
803 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
804 	    return FALSE;
805 	  break;
806 
807 	  /* This relocation describes which C++ vtable entries are actually
808 	     used.  Record for later use during GC.  */
809 	case R_VAX_GNU_VTENTRY:
810 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
811 	    return FALSE;
812 	  break;
813 
814 	default:
815 	  break;
816 	}
817     }
818 
819   return TRUE;
820 }
821 
822 /* Return the section that should be marked against GC for a given
823    relocation.  */
824 
825 static asection *
elf_vax_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)826 elf_vax_gc_mark_hook (asection *sec,
827 		      struct bfd_link_info *info,
828 		      Elf_Internal_Rela *rel,
829 		      struct elf_link_hash_entry *h,
830 		      Elf_Internal_Sym *sym)
831 {
832   if (h != NULL)
833     switch (ELF32_R_TYPE (rel->r_info))
834       {
835       case R_VAX_GNU_VTINHERIT:
836       case R_VAX_GNU_VTENTRY:
837 	return NULL;
838       }
839 
840   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
841 }
842 
843 /* Adjust a symbol defined by a dynamic object and referenced by a
844    regular object.  The current definition is in some section of the
845    dynamic object, but we're not including those sections.  We have to
846    change the definition to something the rest of the link can
847    understand.  */
848 
849 static bfd_boolean
elf_vax_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)850 elf_vax_adjust_dynamic_symbol (struct bfd_link_info *info,
851 			       struct elf_link_hash_entry *h)
852 {
853   bfd *dynobj;
854   asection *s;
855 
856   dynobj = elf_hash_table (info)->dynobj;
857 
858   /* Make sure we know what is going on here.  */
859   BFD_ASSERT (dynobj != NULL
860 	      && (h->needs_plt
861 		  || h->type == STT_GNU_IFUNC
862 		  || h->is_weakalias
863 		  || (h->def_dynamic
864 		      && h->ref_regular
865 		      && !h->def_regular)));
866 
867   /* If this is a function, put it in the procedure linkage table.  We
868      will fill in the contents of the procedure linkage table later,
869      when we know the address of the .got section.  */
870   if ((h->type == STT_FUNC || h->type == STT_GNU_IFUNC)
871       || h->needs_plt)
872     {
873       if (h->plt.refcount <= 0
874 	  || SYMBOL_CALLS_LOCAL (info, h)
875 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
876 	      && h->root.type == bfd_link_hash_undefweak))
877 	{
878 	  /* This case can occur if we saw a PLTxx reloc in an input
879 	     file, but the symbol was never referred to by a dynamic
880 	     object, or if all references were garbage collected.  In
881 	     such a case, we don't actually need to build a procedure
882 	     linkage table, and we can just do a PCxx reloc instead.  */
883 	  h->plt.offset = (bfd_vma) -1;
884 	  h->needs_plt = 0;
885 	  return TRUE;
886 	}
887 
888       s = elf_hash_table (info)->splt;
889       BFD_ASSERT (s != NULL);
890 
891       /* If this is the first .plt entry, make room for the special
892 	 first entry.  */
893       if (s->size == 0)
894 	{
895 	  s->size += PLT_ENTRY_SIZE;
896 	}
897 
898       /* If this symbol is not defined in a regular file, and we are
899 	 not generating a shared library, then set the symbol to this
900 	 location in the .plt.  This is required to make function
901 	 pointers compare as equal between the normal executable and
902 	 the shared library.  */
903       if (!bfd_link_pic (info)
904 	  && !h->def_regular)
905 	{
906 	  h->root.u.def.section = s;
907 	  h->root.u.def.value = s->size;
908 	}
909 
910       h->plt.offset = s->size;
911 
912       /* Make room for this entry.  */
913       s->size += PLT_ENTRY_SIZE;
914 
915       /* We also need to make an entry in the .got.plt section, which
916 	 will be placed in the .got section by the linker script.  */
917 
918       s = elf_hash_table (info)->sgotplt;
919       BFD_ASSERT (s != NULL);
920       s->size += 4;
921 
922       /* We also need to make an entry in the .rela.plt section.  */
923 
924       s = elf_hash_table (info)->srelplt;
925       BFD_ASSERT (s != NULL);
926       s->size += sizeof (Elf32_External_Rela);
927 
928       return TRUE;
929     }
930 
931   /* Reinitialize the plt offset now that it is not used as a reference
932      count any more.  */
933   h->plt.offset = (bfd_vma) -1;
934 
935   /* If this is a weak symbol, and there is a real definition, the
936      processor independent code will have arranged for us to see the
937      real definition first, and we can just use the same value.  */
938   if (h->is_weakalias)
939     {
940       struct elf_link_hash_entry *def = weakdef (h);
941       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
942       h->root.u.def.section = def->root.u.def.section;
943       h->root.u.def.value = def->root.u.def.value;
944       return TRUE;
945     }
946 
947   /* This is a reference to a symbol defined by a dynamic object which
948      is not a function.  */
949 
950   /* If we are creating a shared library, we must presume that the
951      only references to the symbol are via the global offset table.
952      For such cases we need not do anything here; the relocations will
953      be handled correctly by relocate_section.  */
954   if (bfd_link_pic (info))
955     return TRUE;
956 
957   /* We must allocate the symbol in our .dynbss section, which will
958      become part of the .bss section of the executable.  There will be
959      an entry for this symbol in the .dynsym section.  The dynamic
960      object will contain position independent code, so all references
961      from the dynamic object to this symbol will go through the global
962      offset table.  The dynamic linker will use the .dynsym entry to
963      determine the address it must put in the global offset table, so
964      both the dynamic object and the regular object will refer to the
965      same memory location for the variable.  */
966 
967   s = bfd_get_linker_section (dynobj, ".dynbss");
968   BFD_ASSERT (s != NULL);
969 
970   /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
971      copy the initial value out of the dynamic object and into the
972      runtime process image.  We need to remember the offset into the
973      .rela.bss section we are going to use.  */
974   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
975     {
976       asection *srel;
977 
978       srel = bfd_get_linker_section (dynobj, ".rela.bss");
979       BFD_ASSERT (srel != NULL);
980       srel->size += sizeof (Elf32_External_Rela);
981       h->needs_copy = 1;
982     }
983 
984   return _bfd_elf_adjust_dynamic_copy (info, h, s);
985 }
986 
987 /* This function is called via elf_link_hash_traverse.  It resets GOT
988    and PLT (.GOT) reference counts back to -1 so normal PC32 relocation
989    will be done.  */
990 
991 static bfd_boolean
elf_vax_discard_got_entries(struct elf_link_hash_entry * h,void * infoptr ATTRIBUTE_UNUSED)992 elf_vax_discard_got_entries (struct elf_link_hash_entry *h,
993 			     void *infoptr ATTRIBUTE_UNUSED)
994 {
995   h->got.refcount = -1;
996   h->plt.refcount = -1;
997 
998   return TRUE;
999 }
1000 
1001 /* Discard unused dynamic data if this is a static link.  */
1002 
1003 static bfd_boolean
elf_vax_always_size_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)1004 elf_vax_always_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1005 			      struct bfd_link_info *info)
1006 {
1007   bfd *dynobj;
1008   asection *s;
1009 
1010   dynobj = elf_hash_table (info)->dynobj;
1011 
1012   if (dynobj && !elf_hash_table (info)->dynamic_sections_created)
1013     {
1014       /* We may have created entries in the .rela.got and .got sections.
1015 	 However, if we are not creating the dynamic sections, we will
1016 	 not actually use these entries.  Reset the size of .rela.got
1017 	 and .got, which will cause them to get stripped from the output
1018 	 file below.  */
1019       s = elf_hash_table (info)->srelgot;
1020       if (s != NULL)
1021 	s->size = 0;
1022       s = elf_hash_table (info)->sgotplt;
1023       if (s != NULL)
1024 	s->size = 0;
1025       s = elf_hash_table (info)->sgot;
1026       if (s != NULL)
1027 	s->size = 0;
1028     }
1029 
1030   /* If this is a static link, we need to discard all the got entries we've
1031      recorded.  */
1032   if (!dynobj || !elf_hash_table (info)->dynamic_sections_created)
1033     elf_link_hash_traverse (elf_hash_table (info),
1034 			    elf_vax_discard_got_entries,
1035 			    info);
1036 
1037   return TRUE;
1038 }
1039 
1040 /* Set the sizes of the dynamic sections.  */
1041 
1042 static bfd_boolean
elf_vax_size_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)1043 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1044 {
1045   bfd *dynobj;
1046   asection *s;
1047   bfd_boolean plt;
1048   bfd_boolean relocs;
1049   bfd_boolean reltext;
1050 
1051   dynobj = elf_hash_table (info)->dynobj;
1052   BFD_ASSERT (dynobj != NULL);
1053 
1054   if (elf_hash_table (info)->dynamic_sections_created)
1055     {
1056       /* Set the contents of the .interp section to the interpreter.  */
1057       if (bfd_link_executable (info) && !info->nointerp)
1058 	{
1059 	  s = bfd_get_linker_section (dynobj, ".interp");
1060 	  BFD_ASSERT (s != NULL);
1061 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1062 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1063 	}
1064     }
1065 
1066   /* If this is a -Bsymbolic shared link, then we need to discard all PC
1067      relative relocs against symbols defined in a regular object.  We
1068      allocated space for them in the check_relocs routine, but we will not
1069      fill them in in the relocate_section routine.  */
1070   if (bfd_link_pic (info) && info->symbolic)
1071     elf_vax_link_hash_traverse (elf_hash_table (info),
1072 				elf_vax_discard_copies,
1073 				NULL);
1074 
1075   /* If this is a -Bsymbolic shared link, we need to discard all the got
1076      entries we've recorded.  Otherwise, we need to instantiate (allocate
1077      space for them).  */
1078   elf_link_hash_traverse (elf_hash_table (info),
1079 			  elf_vax_instantiate_got_entries,
1080 			  info);
1081 
1082   /* The check_relocs and adjust_dynamic_symbol entry points have
1083      determined the sizes of the various dynamic sections.  Allocate
1084      memory for them.  */
1085   plt = FALSE;
1086   relocs = FALSE;
1087   reltext = FALSE;
1088   for (s = dynobj->sections; s != NULL; s = s->next)
1089     {
1090       const char *name;
1091 
1092       if ((s->flags & SEC_LINKER_CREATED) == 0)
1093 	continue;
1094 
1095       /* It's OK to base decisions on the section name, because none
1096 	 of the dynobj section names depend upon the input files.  */
1097       name = bfd_section_name (s);
1098 
1099       if (strcmp (name, ".plt") == 0)
1100 	{
1101 	  /* Remember whether there is a PLT.  */
1102 	  plt = s->size != 0;
1103 	}
1104       else if (CONST_STRNEQ (name, ".rela"))
1105 	{
1106 	  if (s->size != 0)
1107 	    {
1108 	      asection *target;
1109 
1110 	      /* Remember whether there are any reloc sections other
1111 		 than .rela.plt.  */
1112 	      if (strcmp (name, ".rela.plt") != 0)
1113 		{
1114 		  const char *outname;
1115 
1116 		  relocs = TRUE;
1117 
1118 		  /* If this relocation section applies to a read only
1119 		     section, then we probably need a DT_TEXTREL
1120 		     entry.  .rela.plt is actually associated with
1121 		     .got.plt, which is never readonly.  */
1122 		  outname = bfd_section_name (s->output_section);
1123 		  target = bfd_get_section_by_name (output_bfd, outname + 5);
1124 		  if (target != NULL
1125 		      && (target->flags & SEC_READONLY) != 0
1126 		      && (target->flags & SEC_ALLOC) != 0)
1127 		    reltext = TRUE;
1128 		}
1129 
1130 	      /* We use the reloc_count field as a counter if we need
1131 		 to copy relocs into the output file.  */
1132 	      s->reloc_count = 0;
1133 	    }
1134 	}
1135       else if (! CONST_STRNEQ (name, ".got")
1136 	       && strcmp (name, ".dynbss") != 0)
1137 	{
1138 	  /* It's not one of our sections, so don't allocate space.  */
1139 	  continue;
1140 	}
1141 
1142       if (s->size == 0)
1143 	{
1144 	  /* If we don't need this section, strip it from the
1145 	     output file.  This is mostly to handle .rela.bss and
1146 	     .rela.plt.  We must create both sections in
1147 	     create_dynamic_sections, because they must be created
1148 	     before the linker maps input sections to output
1149 	     sections.  The linker does that before
1150 	     adjust_dynamic_symbol is called, and it is that
1151 	     function which decides whether anything needs to go
1152 	     into these sections.  */
1153 	  s->flags |= SEC_EXCLUDE;
1154 	  continue;
1155 	}
1156 
1157       if ((s->flags & SEC_HAS_CONTENTS) == 0)
1158 	continue;
1159 
1160       /* Allocate memory for the section contents.  */
1161       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1162       if (s->contents == NULL)
1163 	return FALSE;
1164     }
1165 
1166   if (elf_hash_table (info)->dynamic_sections_created)
1167     {
1168       /* Add some entries to the .dynamic section.  We fill in the
1169 	 values later, in elf_vax_finish_dynamic_sections, but we
1170 	 must add the entries now so that we get the correct size for
1171 	 the .dynamic section.  The DT_DEBUG entry is filled in by the
1172 	 dynamic linker and used by the debugger.  */
1173 #define add_dynamic_entry(TAG, VAL) \
1174   _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1175 
1176       if (!bfd_link_pic (info))
1177 	{
1178 	  if (!add_dynamic_entry (DT_DEBUG, 0))
1179 	    return FALSE;
1180 	}
1181 
1182       if (plt)
1183 	{
1184 	  if (!add_dynamic_entry (DT_PLTGOT, 0)
1185 	      || !add_dynamic_entry (DT_PLTRELSZ, 0)
1186 	      || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1187 	      || !add_dynamic_entry (DT_JMPREL, 0))
1188 	    return FALSE;
1189 	}
1190 
1191       if (relocs)
1192 	{
1193 	  if (!add_dynamic_entry (DT_RELA, 0)
1194 	      || !add_dynamic_entry (DT_RELASZ, 0)
1195 	      || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1196 	    return FALSE;
1197 	}
1198 
1199       if (reltext || (info->flags & DF_TEXTREL) != 0)
1200 	{
1201 	  if (!add_dynamic_entry (DT_TEXTREL, 0))
1202 	    return FALSE;
1203 	}
1204     }
1205 #undef add_dynamic_entry
1206 
1207   return TRUE;
1208 }
1209 
1210 /* This function is called via elf_vax_link_hash_traverse if we are
1211    creating a shared object with -Bsymbolic.  It discards the space
1212    allocated to copy PC relative relocs against symbols which are defined
1213    in regular objects.  We allocated space for them in the check_relocs
1214    routine, but we won't fill them in in the relocate_section routine.  */
1215 
1216 static bfd_boolean
elf_vax_discard_copies(struct elf_vax_link_hash_entry * h,void * ignore ATTRIBUTE_UNUSED)1217 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1218 			void * ignore ATTRIBUTE_UNUSED)
1219 {
1220   struct elf_vax_pcrel_relocs_copied *s;
1221 
1222   /* We only discard relocs for symbols defined in a regular object.  */
1223   if (!h->root.def_regular)
1224     return TRUE;
1225 
1226   for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1227     s->section->size -= s->count * sizeof (Elf32_External_Rela);
1228 
1229   return TRUE;
1230 }
1231 
1232 /* This function is called via elf_link_hash_traverse.  It looks for
1233    entries that have GOT or PLT (.GOT) references.  If creating a shared
1234    object with -Bsymbolic, or the symbol has been forced local, then it
1235    resets the reference count back to -1 so normal PC32 relocation will
1236    be done.  Otherwise space in the .got and .rela.got will be reserved
1237    for the symbol.  */
1238 
1239 static bfd_boolean
elf_vax_instantiate_got_entries(struct elf_link_hash_entry * h,void * infoptr)1240 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, void * infoptr)
1241 {
1242   struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1243   bfd *dynobj;
1244   asection *sgot;
1245   asection *srelgot;
1246 
1247   /* We don't care about non-GOT (and non-PLT) entries.  */
1248   if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1249     return TRUE;
1250 
1251   dynobj = elf_hash_table (info)->dynobj;
1252   BFD_ASSERT (dynobj != NULL);
1253 
1254   sgot = elf_hash_table (info)->sgot;
1255   srelgot = elf_hash_table (info)->srelgot;
1256 
1257   if (SYMBOL_REFERENCES_LOCAL (info, h))
1258     {
1259       h->got.refcount = -1;
1260       h->plt.refcount = -1;
1261     }
1262   else if (h->got.refcount > 0)
1263     {
1264       /* Make sure this symbol is output as a dynamic symbol.  */
1265       if (h->dynindx == -1)
1266 	{
1267 	  if (!bfd_elf_link_record_dynamic_symbol (info, h))
1268 	    return FALSE;
1269 	}
1270 
1271       /* Allocate space in the .got and .rela.got sections.  */
1272       if (bfd_link_pic (info) || WILL_CALL_FINISH_DYNAMIC_SYMBOL (
1273           elf_hash_table (info)->dynamic_sections_created, 0, h))
1274 	{
1275 	  sgot->size += 4;
1276 	  srelgot->size += sizeof (Elf32_External_Rela);
1277 	}
1278     }
1279 
1280   return TRUE;
1281 }
1282 
1283 /* Relocate an VAX ELF section.  */
1284 
1285 static bfd_boolean
elf_vax_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)1286 elf_vax_relocate_section (bfd *output_bfd,
1287 			  struct bfd_link_info *info,
1288 			  bfd *input_bfd,
1289 			  asection *input_section,
1290 			  bfd_byte *contents,
1291 			  Elf_Internal_Rela *relocs,
1292 			  Elf_Internal_Sym *local_syms,
1293 			  asection **local_sections)
1294 {
1295   Elf_Internal_Shdr *symtab_hdr;
1296   struct elf_link_hash_entry **sym_hashes;
1297   bfd_vma plt_index;
1298   bfd_vma got_offset;
1299   asection *sgot;
1300   asection *splt;
1301   asection *sgotplt;
1302   asection *sreloc;
1303   Elf_Internal_Rela *rel;
1304   Elf_Internal_Rela *relend;
1305 
1306   symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1307   sym_hashes = elf_sym_hashes (input_bfd);
1308 
1309   sgot = NULL;
1310   splt = NULL;
1311   sgotplt = NULL;
1312   sreloc = NULL;
1313 
1314   rel = relocs;
1315   relend = relocs + input_section->reloc_count;
1316   for (; rel < relend; rel++)
1317     {
1318       int r_type;
1319       reloc_howto_type *howto;
1320       unsigned long r_symndx;
1321       struct elf_link_hash_entry *h;
1322       Elf_Internal_Sym *sym;
1323       asection *sec;
1324       bfd_vma relocation;
1325       bfd_reloc_status_type r;
1326 
1327       r_type = ELF32_R_TYPE (rel->r_info);
1328       if (r_type < 0 || r_type >= (int) R_VAX_max)
1329 	{
1330 	  bfd_set_error (bfd_error_bad_value);
1331 	  return FALSE;
1332 	}
1333       howto = howto_table + r_type;
1334 
1335       r_symndx = ELF32_R_SYM (rel->r_info);
1336       h = NULL;
1337       sym = NULL;
1338       sec = NULL;
1339       if (r_symndx < symtab_hdr->sh_info)
1340 	{
1341 	  sym = local_syms + r_symndx;
1342 	  sec = local_sections[r_symndx];
1343 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1344 	}
1345       else
1346 	{
1347 	  bfd_boolean unresolved_reloc;
1348 	  bfd_boolean warned, ignored;
1349 
1350 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1351 				   r_symndx, symtab_hdr, sym_hashes,
1352 				   h, sec, relocation,
1353 				   unresolved_reloc, warned, ignored);
1354 
1355 	  if ((h->root.type == bfd_link_hash_defined
1356 	      || h->root.type == bfd_link_hash_defweak)
1357 	      && ((r_type == R_VAX_PLT32
1358 		   && h->plt.offset != (bfd_vma) -1
1359 		   && !h->forced_local
1360 		   && elf_hash_table (info)->dynamic_sections_created)
1361 		  || (r_type == R_VAX_GOT32
1362 		      && h->got.offset != (bfd_vma) -1
1363 		      && !h->forced_local
1364 		      && elf_hash_table (info)->dynamic_sections_created
1365 		      && (! bfd_link_pic (info)
1366 			  || (! info->symbolic && h->dynindx != -1)
1367 			  || !h->def_regular))
1368 		  || (bfd_link_pic (info)
1369 		      && ((! info->symbolic && h->dynindx != -1)
1370 			  || !h->def_regular)
1371 		      && ((input_section->flags & SEC_ALLOC) != 0
1372 			  /* DWARF will emit R_VAX_32 relocations in its
1373 			     sections against symbols defined externally
1374 			     in shared libraries.  We can't do anything
1375 			     with them here.  */
1376 
1377 			  || ((input_section->flags & SEC_DEBUGGING) != 0
1378 			      && h->def_dynamic))
1379 		      && (r_type == R_VAX_8
1380 			  || r_type == R_VAX_16
1381 			  || r_type == R_VAX_32))))
1382 	    /* In these cases, we don't need the relocation
1383 	       value.  We check specially because in some
1384 	       obscure cases sec->output_section will be NULL.  */
1385 	    relocation = 0;
1386 	}
1387 
1388       if (sec != NULL && discarded_section (sec))
1389 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1390 					 rel, 1, relend, howto, 0, contents);
1391 
1392       if (bfd_link_relocatable (info))
1393 	continue;
1394 
1395       switch (r_type)
1396 	{
1397 	case R_VAX_GOT32:
1398 	  /* Relocation is to the address of the entry for this symbol
1399 	     in the global offset table.  */
1400 
1401 	  /* Resolve a GOTxx reloc against a local symbol directly,
1402 	     without using the global offset table.  */
1403 	  if (h == NULL
1404 	      || h->got.offset == (bfd_vma) -1)
1405 	    break;
1406 
1407 	  {
1408 	    bfd_vma off;
1409 
1410 	    sgot = elf_hash_table (info)->sgot;
1411 	    BFD_ASSERT (sgot != NULL);
1412 
1413 	    off = h->got.offset;
1414 	    BFD_ASSERT (off < sgot->size);
1415 
1416 	    bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1417 
1418 	    relocation = sgot->output_offset + off;
1419 	    /* The GOT relocation uses the addend.  */
1420 	    rel->r_addend = 0;
1421 
1422 	    /* Change the reference to be indirect.  */
1423 	    contents[rel->r_offset - 1] |= 0x10;
1424 	    relocation += sgot->output_section->vma;
1425 	  }
1426 	  break;
1427 
1428 	case R_VAX_PC32:
1429 	  /* If we are creating an executable and the function this
1430 	     reloc refers to is in a shared lib, then we made a PLT
1431 	     entry for this symbol and need to handle the reloc like
1432 	     a PLT reloc.  */
1433 	  if (bfd_link_pic (info))
1434 	     goto r_vax_pc32_shared;
1435 	  /* Fall through.  */
1436 	case R_VAX_PLT32:
1437 	  /* Relocation is to the entry for this symbol in the
1438 	     procedure linkage table.  */
1439 
1440 	  /* Resolve a PLTxx reloc against a local symbol directly,
1441 	     without using the procedure linkage table.  */
1442 	  if (h == NULL
1443 	      || h->plt.offset == (bfd_vma) -1)
1444 	    break;
1445 
1446 	  splt = elf_hash_table (info)->splt;
1447 	  BFD_ASSERT (splt != NULL);
1448 
1449 	  sgotplt = elf_hash_table (info)->sgotplt;
1450 	  BFD_ASSERT (sgotplt != NULL);
1451 
1452 	  plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1453 
1454 	  /* Get the offset into the .got table of the entry that
1455 	     corresponds to this function.  Each .got entry is 4 bytes.
1456 	     The first two are reserved.  */
1457 	  got_offset = (plt_index + 3) * 4;
1458 
1459 	  /* We want the relocation to point into the .got.plt instead
1460 	     of the plt itself.  */
1461 	  relocation = (sgotplt->output_section->vma
1462 			+ sgotplt->output_offset
1463 			+ got_offset);
1464 	  contents[rel->r_offset-1] |= 0x10; /* make indirect */
1465 	  if (rel->r_addend == 2)
1466 	    {
1467 	      h->plt.offset |= 1;
1468 	    }
1469 	  else if (rel->r_addend != 0)
1470 	    _bfd_error_handler
1471 	      /* xgettext:c-format */
1472 	      (_("%pB: warning: PLT addend of %" PRId64 " to `%s'"
1473 		 " from %pA section ignored"),
1474 	       input_bfd, (int64_t) rel->r_addend, h->root.root.string,
1475 	       input_section);
1476 	  rel->r_addend = 0;
1477 
1478 	  break;
1479 
1480 	case R_VAX_PC8:
1481 	case R_VAX_PC16:
1482 	r_vax_pc32_shared:
1483 	  if (h == NULL
1484 	      || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1485 	      || h->forced_local)
1486 	    break;
1487 	  /* Fall through.  */
1488 	case R_VAX_8:
1489 	case R_VAX_16:
1490 	case R_VAX_32:
1491 	  if (bfd_link_pic (info)
1492 	      && r_symndx != STN_UNDEF
1493 	      && (input_section->flags & SEC_ALLOC) != 0
1494 	      && ((r_type != R_VAX_PC8
1495 		   && r_type != R_VAX_PC16
1496 		   && r_type != R_VAX_PC32)
1497 		  || ((input_section->flags & SEC_CODE)
1498 		      && (!info->symbolic
1499 			  || (!h->def_regular && h->type != STT_SECTION)))))
1500 	    {
1501 	      Elf_Internal_Rela outrel;
1502 	      bfd_byte *loc;
1503 	      bfd_boolean skip, relocate;
1504 
1505 	      /* When generating a shared object, these relocations
1506 		 are copied into the output file to be resolved at run
1507 		 time.  */
1508 	      if (sreloc == NULL)
1509 		{
1510 		  sreloc = _bfd_elf_get_dynamic_reloc_section
1511 		    (input_bfd, input_section, /*rela?*/ TRUE);
1512 		  if (sreloc == NULL)
1513 		    return FALSE;
1514 		}
1515 
1516 	      skip = FALSE;
1517 	      relocate = FALSE;
1518 
1519 	      outrel.r_offset =
1520 		_bfd_elf_section_offset (output_bfd, info, input_section,
1521 					 rel->r_offset);
1522 	      if (outrel.r_offset == (bfd_vma) -1)
1523 		skip = TRUE;
1524 	      if (outrel.r_offset == (bfd_vma) -2)
1525 		skip = TRUE, relocate = TRUE;
1526 	      outrel.r_offset += (input_section->output_section->vma
1527 				  + input_section->output_offset);
1528 
1529 	      if (skip)
1530 		  memset (&outrel, 0, sizeof outrel);
1531 	      /* h->dynindx may be -1 if the symbol was marked to
1532 		 become local.  */
1533 	      else if (h != NULL
1534 		       && ((! info->symbolic && h->dynindx != -1)
1535 			   || !h->def_regular))
1536 		{
1537 		  BFD_ASSERT (h->dynindx != -1);
1538 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1539 		  outrel.r_addend = relocation + rel->r_addend;
1540 		}
1541 	      else
1542 		{
1543 		  if (r_type == R_VAX_32)
1544 		    {
1545 		      relocate = TRUE;
1546 		      outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1547 		      outrel.r_addend = bfd_get_signed_32(input_bfd,
1548 							 &contents[rel->r_offset])
1549 					+ relocation + rel->r_addend;
1550 		    }
1551 		  else
1552 		    {
1553 		      long indx;
1554 
1555 		      if (bfd_is_abs_section (sec))
1556 			indx = 0;
1557 		      else if (sec == NULL || sec->owner == NULL)
1558 			{
1559 			  bfd_set_error (bfd_error_bad_value);
1560 			  return FALSE;
1561 			}
1562 		      else
1563 			{
1564 			  asection *osec;
1565 
1566 			  /* We are turning this relocation into one
1567 			     against a section symbol.  It would be
1568 			     proper to subtract the symbol's value,
1569 			     osec->vma, from the emitted reloc addend,
1570 			     but ld.so expects buggy relocs.  */
1571 			  osec = sec->output_section;
1572 			  indx = elf_section_data (osec)->dynindx;
1573 			  if (indx == 0)
1574 			    {
1575 			      struct elf_link_hash_table *htab;
1576 			      htab = elf_hash_table (info);
1577 			      osec = htab->text_index_section;
1578 			      indx = elf_section_data (osec)->dynindx;
1579 			    }
1580 			  BFD_ASSERT (indx != 0);
1581 			}
1582 
1583 		      outrel.r_info = ELF32_R_INFO (indx, r_type);
1584 		      outrel.r_addend = relocation + rel->r_addend;
1585 		    }
1586 		}
1587 
1588 	      if (input_section->flags & SEC_CODE)
1589 		 info->flags |= DF_TEXTREL;
1590 
1591 	      if ((input_section->flags & SEC_CODE) != 0
1592 		  || (ELF32_R_TYPE (outrel.r_info) != R_VAX_32
1593 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_RELATIVE
1594 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_COPY
1595 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_JMP_SLOT
1596 		      && ELF32_R_TYPE (outrel.r_info) != R_VAX_GLOB_DAT))
1597 		{
1598 		  if (h != NULL)
1599 		    _bfd_error_handler
1600 		      /* xgettext:c-format */
1601 		      (_("%pB: warning: %s relocation against symbol `%s'"
1602 			 " from %pA section"),
1603 		      input_bfd, howto->name, h->root.root.string,
1604 		      input_section);
1605 		  else
1606 		    _bfd_error_handler
1607 		      /* xgettext:c-format */
1608 		      (_("%pB: warning: %s relocation to %#" PRIx64
1609 			 " from %pA section"),
1610 		      input_bfd, howto->name, (uint64_t) outrel.r_addend,
1611 		      input_section);
1612 		}
1613 	      loc = sreloc->contents;
1614 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1615 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1616 
1617 	      /* This reloc will be computed at runtime, so there's no
1618 		 need to do anything now, except for R_VAX_32
1619 		 relocations that have been turned into
1620 		 R_VAX_RELATIVE.  */
1621 	      if (!relocate)
1622 		continue;
1623 	    }
1624 
1625 	  break;
1626 
1627 	case R_VAX_GNU_VTINHERIT:
1628 	case R_VAX_GNU_VTENTRY:
1629 	  /* These are no-ops in the end.  */
1630 	  continue;
1631 
1632 	default:
1633 	  break;
1634 	}
1635 
1636       /* VAX PCREL relocations are from the end of relocation, not the start.
1637 	 So subtract the difference from the relocation amount since we can't
1638 	 add it to the offset.  */
1639       if (howto->pc_relative && howto->pcrel_offset)
1640 	relocation -= bfd_get_reloc_size(howto);
1641 
1642       r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1643 				    contents, rel->r_offset,
1644 				    relocation, rel->r_addend);
1645 
1646       if (r != bfd_reloc_ok)
1647 	{
1648 	  switch (r)
1649 	    {
1650 	    default:
1651 	    case bfd_reloc_outofrange:
1652 	      abort ();
1653 	    case bfd_reloc_overflow:
1654 	      {
1655 		const char *name;
1656 
1657 		if (h != NULL)
1658 		  name = NULL;
1659 		else
1660 		  {
1661 		    name = bfd_elf_string_from_elf_section (input_bfd,
1662 							    symtab_hdr->sh_link,
1663 							    sym->st_name);
1664 		    if (name == NULL)
1665 		      return FALSE;
1666 		    if (*name == '\0')
1667 		      name = bfd_section_name (sec);
1668 		  }
1669 		info->callbacks->reloc_overflow
1670 		  (info, (h ? &h->root : NULL), name, howto->name,
1671 		   (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
1672 	      }
1673 	      break;
1674 	    }
1675 	}
1676     }
1677 
1678   return TRUE;
1679 }
1680 
1681 /* Finish up dynamic symbol handling.  We set the contents of various
1682    dynamic sections here.  */
1683 
1684 static bfd_boolean
elf_vax_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)1685 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1686 			       struct elf_link_hash_entry *h,
1687 			       Elf_Internal_Sym *sym)
1688 {
1689   bfd *dynobj;
1690 
1691   dynobj = elf_hash_table (info)->dynobj;
1692 
1693   if (h->plt.offset != (bfd_vma) -1)
1694     {
1695       asection *splt;
1696       asection *sgot;
1697       asection *srela;
1698       bfd_vma plt_index;
1699       bfd_vma got_offset;
1700       bfd_vma addend;
1701       Elf_Internal_Rela rela;
1702       bfd_byte *loc;
1703 
1704       /* This symbol has an entry in the procedure linkage table.  Set
1705 	 it up.  */
1706       BFD_ASSERT (h->dynindx != -1);
1707 
1708       splt = elf_hash_table (info)->splt;
1709       sgot = elf_hash_table (info)->sgotplt;
1710       srela = elf_hash_table (info)->srelplt;
1711       BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1712 
1713       addend = 2 * (h->plt.offset & 1);
1714       h->plt.offset &= ~1;
1715 
1716       /* Get the index in the procedure linkage table which
1717 	 corresponds to this symbol.  This is the index of this symbol
1718 	 in all the symbols for which we are making plt entries.  The
1719 	 first entry in the procedure linkage table is reserved.  */
1720       plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1721 
1722       /* Get the offset into the .got table of the entry that
1723 	 corresponds to this function.  Each .got entry is 4 bytes.
1724 	 The first two are reserved.  */
1725       got_offset = (plt_index + 3) * 4;
1726 
1727       /* Fill in the entry in the procedure linkage table.  */
1728       memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1729 		  PLT_ENTRY_SIZE);
1730 
1731       /* The offset is relative to the first extension word.  */
1732       bfd_put_32 (output_bfd,
1733 		  -(h->plt.offset + 8),
1734 		  splt->contents + h->plt.offset + 4);
1735 
1736       bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1737 		  splt->contents + h->plt.offset + 8);
1738 
1739       /* Fill in the entry in the global offset table.  */
1740       bfd_put_32 (output_bfd,
1741 		  (splt->output_section->vma
1742 		   + splt->output_offset
1743 		   + h->plt.offset) + addend,
1744 		  sgot->contents + got_offset);
1745 
1746       /* Fill in the entry in the .rela.plt section.  */
1747       rela.r_offset = (sgot->output_section->vma
1748 		       + sgot->output_offset
1749 		       + got_offset);
1750       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1751       rela.r_addend = addend;
1752       loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1753       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1754 
1755       if (!h->def_regular)
1756 	{
1757 	  /* Mark the symbol as undefined, rather than as defined in
1758 	     the .plt section.  Leave the value alone.  */
1759 	  sym->st_shndx = SHN_UNDEF;
1760 	}
1761     }
1762 
1763   if (h->got.offset != (bfd_vma) -1)
1764     {
1765       asection *sgot;
1766       asection *srela;
1767       Elf_Internal_Rela rela;
1768       bfd_byte *loc;
1769 
1770       /* This symbol has an entry in the global offset table.  Set it
1771 	 up.  */
1772       sgot = elf_hash_table (info)->sgot;
1773       srela = elf_hash_table (info)->srelgot;
1774       BFD_ASSERT (sgot != NULL && srela != NULL);
1775 
1776       rela.r_offset = (sgot->output_section->vma
1777 		       + sgot->output_offset
1778 		       + h->got.offset);
1779       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1780       rela.r_addend = bfd_get_signed_32 (output_bfd,
1781 					 sgot->contents + h->got.offset);
1782 
1783       loc = srela->contents;
1784       loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1785       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1786     }
1787 
1788   if (h->needs_copy)
1789     {
1790       asection *s;
1791       Elf_Internal_Rela rela;
1792       bfd_byte *loc;
1793 
1794       /* This symbol needs a copy reloc.  Set it up.  */
1795       BFD_ASSERT (h->dynindx != -1
1796 		  && (h->root.type == bfd_link_hash_defined
1797 		      || h->root.type == bfd_link_hash_defweak));
1798 
1799       s = bfd_get_linker_section (dynobj, ".rela.bss");
1800       BFD_ASSERT (s != NULL);
1801 
1802       rela.r_offset = (h->root.u.def.value
1803 		       + h->root.u.def.section->output_section->vma
1804 		       + h->root.u.def.section->output_offset);
1805       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1806       rela.r_addend = 0;
1807       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1808       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1809     }
1810 
1811   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
1812   if (h == elf_hash_table (info)->hdynamic
1813       || h == elf_hash_table (info)->hgot)
1814     sym->st_shndx = SHN_ABS;
1815 
1816   return TRUE;
1817 }
1818 
1819 /* Finish up the dynamic sections.  */
1820 
1821 static bfd_boolean
elf_vax_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)1822 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1823 {
1824   bfd *dynobj;
1825   asection *sgot;
1826   asection *sdyn;
1827 
1828   dynobj = elf_hash_table (info)->dynobj;
1829 
1830   sgot = elf_hash_table (info)->sgotplt;
1831   BFD_ASSERT (sgot != NULL);
1832   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
1833 
1834   if (elf_hash_table (info)->dynamic_sections_created)
1835     {
1836       asection *splt;
1837       Elf32_External_Dyn *dyncon, *dynconend;
1838 
1839       splt = elf_hash_table (info)->splt;
1840       BFD_ASSERT (splt != NULL && sdyn != NULL);
1841 
1842       dyncon = (Elf32_External_Dyn *) sdyn->contents;
1843       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1844       for (; dyncon < dynconend; dyncon++)
1845 	{
1846 	  Elf_Internal_Dyn dyn;
1847 	  asection *s;
1848 
1849 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1850 
1851 	  switch (dyn.d_tag)
1852 	    {
1853 	    default:
1854 	      break;
1855 
1856 	    case DT_PLTGOT:
1857 	      s = elf_hash_table (info)->sgotplt;
1858 	      goto get_vma;
1859 	    case DT_JMPREL:
1860 	      s = elf_hash_table (info)->srelplt;
1861 	    get_vma:
1862 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
1863 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1864 	      break;
1865 
1866 	    case DT_PLTRELSZ:
1867 	      s = elf_hash_table (info)->srelplt;
1868 	      dyn.d_un.d_val = s->size;
1869 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1870 	      break;
1871 	    }
1872 	}
1873 
1874       /* Fill in the first entry in the procedure linkage table.  */
1875       if (splt->size > 0)
1876 	{
1877 	  memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
1878 	  bfd_put_32 (output_bfd,
1879 			  (sgot->output_section->vma
1880 			   + sgot->output_offset + 4
1881 			   - (splt->output_section->vma + 6)),
1882 			  splt->contents + 2);
1883 	  bfd_put_32 (output_bfd,
1884 			  (sgot->output_section->vma
1885 			   + sgot->output_offset + 8
1886 			   - (splt->output_section->vma + 12)),
1887 			  splt->contents + 8);
1888 	  elf_section_data (splt->output_section)->this_hdr.sh_entsize
1889 	   = PLT_ENTRY_SIZE;
1890 	}
1891     }
1892 
1893   /* Fill in the first three entries in the global offset table.  */
1894   if (sgot->size > 0)
1895     {
1896       if (sdyn == NULL)
1897 	bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
1898       else
1899 	bfd_put_32 (output_bfd,
1900 		    sdyn->output_section->vma + sdyn->output_offset,
1901 		    sgot->contents);
1902       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
1903       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
1904     }
1905 
1906   if (elf_section_data (sgot->output_section) != NULL)
1907     elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1908 
1909   return TRUE;
1910 }
1911 
1912 static enum elf_reloc_type_class
elf_vax_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)1913 elf_vax_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
1914 			  const asection *rel_sec ATTRIBUTE_UNUSED,
1915 			  const Elf_Internal_Rela *rela)
1916 {
1917   switch ((int) ELF32_R_TYPE (rela->r_info))
1918     {
1919     case R_VAX_RELATIVE:
1920       return reloc_class_relative;
1921     case R_VAX_JMP_SLOT:
1922       return reloc_class_plt;
1923     case R_VAX_COPY:
1924       return reloc_class_copy;
1925     default:
1926       return reloc_class_normal;
1927     }
1928 }
1929 
1930 static bfd_vma
elf_vax_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)1931 elf_vax_plt_sym_val (bfd_vma i, const asection *plt,
1932 		     const arelent *rel ATTRIBUTE_UNUSED)
1933 {
1934   return plt->vma + (i + 1) * PLT_ENTRY_SIZE;
1935 }
1936 
1937 #define TARGET_LITTLE_SYM		vax_elf32_vec
1938 #define TARGET_LITTLE_NAME		"elf32-vax"
1939 #define ELF_MACHINE_CODE		EM_VAX
1940 #define ELF_MAXPAGESIZE			0x10000
1941 
1942 #define elf_backend_create_dynamic_sections \
1943 					_bfd_elf_create_dynamic_sections
1944 #define bfd_elf32_bfd_link_hash_table_create \
1945 					elf_vax_link_hash_table_create
1946 #define bfd_elf32_bfd_copy_private_bfd_data \
1947 					elf32_vax_copy_private_bfd_data
1948 
1949 #define bfd_elf32_bfd_final_link	bfd_elf_gc_common_final_link
1950 
1951 #define elf_backend_check_relocs	elf_vax_check_relocs
1952 #define elf_backend_adjust_dynamic_symbol \
1953 					elf_vax_adjust_dynamic_symbol
1954 #define elf_backend_always_size_sections \
1955 					elf_vax_always_size_sections
1956 #define elf_backend_size_dynamic_sections \
1957 					elf_vax_size_dynamic_sections
1958 #define elf_backend_init_index_section	_bfd_elf_init_1_index_section
1959 #define elf_backend_relocate_section	elf_vax_relocate_section
1960 #define elf_backend_finish_dynamic_symbol \
1961 					elf_vax_finish_dynamic_symbol
1962 #define elf_backend_finish_dynamic_sections \
1963 					elf_vax_finish_dynamic_sections
1964 #define elf_backend_reloc_type_class	elf_vax_reloc_type_class
1965 #define elf_backend_gc_mark_hook	elf_vax_gc_mark_hook
1966 #define elf_backend_plt_sym_val		elf_vax_plt_sym_val
1967 #define bfd_elf32_bfd_merge_private_bfd_data \
1968 					elf32_vax_merge_private_bfd_data
1969 #define bfd_elf32_bfd_set_private_flags \
1970 					elf32_vax_set_private_flags
1971 #define bfd_elf32_bfd_print_private_bfd_data \
1972 					elf32_vax_print_private_bfd_data
1973 
1974 #define elf_backend_can_gc_sections	1
1975 #define elf_backend_want_got_plt	1
1976 #define elf_backend_plt_readonly	1
1977 #define elf_backend_want_plt_sym	0
1978 #define elf_backend_got_header_size	16
1979 #define elf_backend_rela_normal		1
1980 #define elf_backend_dtrel_excludes_plt	1
1981 
1982 #include "elf32-target.h"
1983