1 /* VAX series support for 32-bit ELF
2    Copyright 1993, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3    2004, 2005, 2006 Free Software Foundation, Inc.
4    Contributed by Matt Thomas <matt@3am-software.com>.
5 
6    This file is part of BFD, the Binary File Descriptor library.
7 
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 2 of the License, or
11    (at your option) any later version.
12 
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17 
18    You should have received a copy of the GNU General Public License
19    along with this program; if not, write to the Free Software
20    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA.  */
21 
22 #include "bfd.h"
23 #include "sysdep.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/vax.h"
28 
29 static reloc_howto_type *reloc_type_lookup (bfd *, bfd_reloc_code_real_type);
30 static void rtype_to_howto (bfd *, arelent *, Elf_Internal_Rela *);
31 static struct bfd_hash_entry *elf_vax_link_hash_newfunc (struct bfd_hash_entry *,
32 							 struct bfd_hash_table *,
33 							 const char *);
34 static struct bfd_link_hash_table *elf_vax_link_hash_table_create (bfd *);
35 static bfd_boolean elf_vax_check_relocs (bfd *, struct bfd_link_info *,
36 					 asection *, const Elf_Internal_Rela *);
37 static asection *elf_vax_gc_mark_hook (asection *, struct bfd_link_info *,
38 				       Elf_Internal_Rela *,
39 				       struct elf_link_hash_entry *,
40 				       Elf_Internal_Sym *);
41 static bfd_boolean elf_vax_gc_sweep_hook (bfd *, struct bfd_link_info *,
42 					  asection *,
43 					  const Elf_Internal_Rela *);
44 static bfd_boolean elf_vax_adjust_dynamic_symbol (struct bfd_link_info *,
45 						  struct elf_link_hash_entry *);
46 static bfd_boolean elf_vax_size_dynamic_sections (bfd *, struct bfd_link_info *);
47 static bfd_boolean elf_vax_relocate_section (bfd *, struct bfd_link_info *,
48 					     bfd *, asection *, bfd_byte *,
49 					     Elf_Internal_Rela *,
50 					     Elf_Internal_Sym *, asection **);
51 static bfd_boolean elf_vax_finish_dynamic_symbol (bfd *, struct bfd_link_info *,
52 						  struct elf_link_hash_entry *,
53 						  Elf_Internal_Sym *);
54 static bfd_boolean elf_vax_finish_dynamic_sections (bfd *,
55 						    struct bfd_link_info *);
56 
57 static bfd_boolean elf32_vax_set_private_flags (bfd *, flagword);
58 static bfd_boolean elf32_vax_merge_private_bfd_data (bfd *, bfd *);
59 static bfd_boolean elf32_vax_print_private_bfd_data (bfd *, PTR);
60 
61 static reloc_howto_type howto_table[] = {
62   HOWTO (R_VAX_NONE,		/* type */
63 	 0,			/* rightshift */
64 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
65 	 0,			/* bitsize */
66 	 FALSE,			/* pc_relative */
67 	 0,			/* bitpos */
68 	 complain_overflow_dont, /* complain_on_overflow */
69 	 bfd_elf_generic_reloc,	/* special_function */
70 	 "R_VAX_NONE",		/* name */
71 	 FALSE,			/* partial_inplace */
72 	 0,			/* src_mask */
73 	 0x00000000,		/* dst_mask */
74 	 FALSE),		/* pcrel_offset */
75 
76   HOWTO (R_VAX_32,		/* type */
77 	 0,			/* rightshift */
78 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
79 	 32,			/* bitsize */
80 	 FALSE,			/* pc_relative */
81 	 0,			/* bitpos */
82 	 complain_overflow_bitfield, /* complain_on_overflow */
83 	 bfd_elf_generic_reloc,	/* special_function */
84 	 "R_VAX_32",		/* name */
85 	 FALSE,			/* partial_inplace */
86 	 0,			/* src_mask */
87 	 0xffffffff,		/* dst_mask */
88 	 FALSE),		/* pcrel_offset */
89 
90   HOWTO (R_VAX_16,		/* type */
91 	 0,			/* rightshift */
92 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
93 	 16,			/* bitsize */
94 	 FALSE,			/* pc_relative */
95 	 0,			/* bitpos */
96 	 complain_overflow_bitfield, /* complain_on_overflow */
97 	 bfd_elf_generic_reloc,	/* special_function */
98 	 "R_VAX_16",		/* name */
99 	 FALSE,			/* partial_inplace */
100 	 0,			/* src_mask */
101 	 0x0000ffff,		/* dst_mask */
102 	 FALSE),		/* pcrel_offset */
103 
104   HOWTO (R_VAX_8,		/* type */
105 	 0,			/* rightshift */
106 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
107 	 8,			/* bitsize */
108 	 FALSE,			/* pc_relative */
109 	 0,			/* bitpos */
110 	 complain_overflow_bitfield, /* complain_on_overflow */
111 	 bfd_elf_generic_reloc,	/* special_function */
112 	 "R_VAX_8",		/* name */
113 	 FALSE,			/* partial_inplace */
114 	 0,			/* src_mask */
115 	 0x000000ff,		/* dst_mask */
116 	 FALSE),		/* pcrel_offset */
117 
118   HOWTO (R_VAX_PC32,		/* type */
119 	 0,			/* rightshift */
120 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
121 	 32,			/* bitsize */
122 	 TRUE,			/* pc_relative */
123 	 0,			/* bitpos */
124 	 complain_overflow_bitfield, /* complain_on_overflow */
125 	 bfd_elf_generic_reloc,	/* special_function */
126 	 "R_VAX_PC32",		/* name */
127 	 FALSE,			/* partial_inplace */
128 	 0,			/* src_mask */
129 	 0xffffffff,		/* dst_mask */
130 	 TRUE),			/* pcrel_offset */
131 
132   HOWTO (R_VAX_PC16,		/* type */
133 	 0,			/* rightshift */
134 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
135 	 16,			/* bitsize */
136 	 TRUE,			/* pc_relative */
137 	 0,			/* bitpos */
138 	 complain_overflow_signed, /* complain_on_overflow */
139 	 bfd_elf_generic_reloc,	/* special_function */
140 	 "R_VAX_PC16",		/* name */
141 	 FALSE,			/* partial_inplace */
142 	 0,			/* src_mask */
143 	 0x0000ffff,		/* dst_mask */
144 	 TRUE),			/* pcrel_offset */
145 
146   HOWTO (R_VAX_PC8,		/* type */
147 	 0,			/* rightshift */
148 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
149 	 8,			/* bitsize */
150 	 TRUE,			/* pc_relative */
151 	 0,			/* bitpos */
152 	 complain_overflow_signed, /* complain_on_overflow */
153 	 bfd_elf_generic_reloc,	/* special_function */
154 	 "R_VAX_PC8",		/* name */
155 	 FALSE,			/* partial_inplace */
156 	 0,			/* src_mask */
157 	 0x000000ff,		/* dst_mask */
158 	 TRUE),			/* pcrel_offset */
159 
160   HOWTO (R_VAX_GOT32,		/* type */
161 	 0,			/* rightshift */
162 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
163 	 32,			/* bitsize */
164 	 TRUE,			/* pc_relative */
165 	 0,			/* bitpos */
166 	 complain_overflow_bitfield, /* complain_on_overflow */
167 	 bfd_elf_generic_reloc,	/* special_function */
168 	 "R_VAX_GOT32",		/* name */
169 	 FALSE,			/* partial_inplace */
170 	 0,			/* src_mask */
171 	 0xffffffff,		/* dst_mask */
172 	 TRUE),			/* pcrel_offset */
173 
174   EMPTY_HOWTO (-1),
175   EMPTY_HOWTO (-1),
176   EMPTY_HOWTO (-1),
177   EMPTY_HOWTO (-1),
178   EMPTY_HOWTO (-1),
179 
180   HOWTO (R_VAX_PLT32,		/* type */
181 	 0,			/* rightshift */
182 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
183 	 32,			/* bitsize */
184 	 TRUE,			/* pc_relative */
185 	 0,			/* bitpos */
186 	 complain_overflow_bitfield, /* complain_on_overflow */
187 	 bfd_elf_generic_reloc,	/* special_function */
188 	 "R_VAX_PLT32",		/* name */
189 	 FALSE,			/* partial_inplace */
190 	 0,			/* src_mask */
191 	 0xffffffff,		/* dst_mask */
192 	 TRUE),			/* pcrel_offset */
193 
194   EMPTY_HOWTO (-1),
195   EMPTY_HOWTO (-1),
196   EMPTY_HOWTO (-1),
197   EMPTY_HOWTO (-1),
198   EMPTY_HOWTO (-1),
199 
200   HOWTO (R_VAX_COPY,		/* type */
201 	 0,			/* rightshift */
202 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
203 	 0,			/* bitsize */
204 	 FALSE,			/* pc_relative */
205 	 0,			/* bitpos */
206 	 complain_overflow_dont, /* complain_on_overflow */
207 	 bfd_elf_generic_reloc,	/* special_function */
208 	 "R_VAX_COPY",		/* name */
209 	 FALSE,			/* partial_inplace */
210 	 0,			/* src_mask */
211 	 0xffffffff,		/* dst_mask */
212 	 FALSE),		/* pcrel_offset */
213 
214   HOWTO (R_VAX_GLOB_DAT,	/* type */
215 	 0,			/* rightshift */
216 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
217 	 32,			/* bitsize */
218 	 FALSE,			/* pc_relative */
219 	 0,			/* bitpos */
220 	 complain_overflow_dont, /* complain_on_overflow */
221 	 bfd_elf_generic_reloc,	/* special_function */
222 	 "R_VAX_GLOB_DAT",	/* name */
223 	 FALSE,			/* partial_inplace */
224 	 0,			/* src_mask */
225 	 0xffffffff,		/* dst_mask */
226 	 FALSE),		/* pcrel_offset */
227 
228   HOWTO (R_VAX_JMP_SLOT,	/* type */
229 	 0,			/* rightshift */
230 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
231 	 32,			/* bitsize */
232 	 FALSE,			/* pc_relative */
233 	 0,			/* bitpos */
234 	 complain_overflow_dont, /* complain_on_overflow */
235 	 bfd_elf_generic_reloc,	/* special_function */
236 	 "R_VAX_JMP_SLOT",	/* name */
237 	 FALSE,			/* partial_inplace */
238 	 0,			/* src_mask */
239 	 0xffffffff,		/* dst_mask */
240 	 FALSE),		/* pcrel_offset */
241 
242   HOWTO (R_VAX_RELATIVE,	/* type */
243 	 0,			/* rightshift */
244 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
245 	 32,			/* bitsize */
246 	 FALSE,			/* pc_relative */
247 	 0,			/* bitpos */
248 	 complain_overflow_dont, /* complain_on_overflow */
249 	 bfd_elf_generic_reloc,	/* special_function */
250 	 "R_VAX_RELATIVE",	/* name */
251 	 FALSE,			/* partial_inplace */
252 	 0,			/* src_mask */
253 	 0xffffffff,		/* dst_mask */
254 	 FALSE),		/* pcrel_offset */
255 
256   /* GNU extension to record C++ vtable hierarchy */
257   HOWTO (R_VAX_GNU_VTINHERIT,	/* type */
258 	 0,			/* rightshift */
259 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
260 	 0,			/* bitsize */
261 	 FALSE,			/* pc_relative */
262 	 0,			/* bitpos */
263 	 complain_overflow_dont, /* complain_on_overflow */
264 	 NULL,			/* special_function */
265 	 "R_VAX_GNU_VTINHERIT",	/* name */
266 	 FALSE,			/* partial_inplace */
267 	 0,			/* src_mask */
268 	 0,			/* dst_mask */
269 	 FALSE),		/* pcrel_offset */
270 
271   /* GNU extension to record C++ vtable member usage */
272   HOWTO (R_VAX_GNU_VTENTRY,	/* type */
273 	 0,			/* rightshift */
274 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
275 	 0,			/* bitsize */
276 	 FALSE,			/* pc_relative */
277 	 0,			/* bitpos */
278 	 complain_overflow_dont, /* complain_on_overflow */
279 	 _bfd_elf_rel_vtable_reloc_fn, /* special_function */
280 	 "R_VAX_GNU_VTENTRY",	/* name */
281 	 FALSE,			/* partial_inplace */
282 	 0,			/* src_mask */
283 	 0,			/* dst_mask */
284 	 FALSE),		/* pcrel_offset */
285 };
286 
287 static void
288 rtype_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
289 		Elf_Internal_Rela *dst)
290 {
291   BFD_ASSERT (ELF32_R_TYPE(dst->r_info) < (unsigned int) R_VAX_max);
292   cache_ptr->howto = &howto_table[ELF32_R_TYPE(dst->r_info)];
293 }
294 
295 #define elf_info_to_howto rtype_to_howto
296 
297 static const struct
298 {
299   bfd_reloc_code_real_type bfd_val;
300   int elf_val;
301 } reloc_map[] = {
302   { BFD_RELOC_NONE, R_VAX_NONE },
303   { BFD_RELOC_32, R_VAX_32 },
304   { BFD_RELOC_16, R_VAX_16 },
305   { BFD_RELOC_8, R_VAX_8 },
306   { BFD_RELOC_32_PCREL, R_VAX_PC32 },
307   { BFD_RELOC_16_PCREL, R_VAX_PC16 },
308   { BFD_RELOC_8_PCREL, R_VAX_PC8 },
309   { BFD_RELOC_32_GOT_PCREL, R_VAX_GOT32 },
310   { BFD_RELOC_32_PLT_PCREL, R_VAX_PLT32 },
311   { BFD_RELOC_NONE, R_VAX_COPY },
312   { BFD_RELOC_VAX_GLOB_DAT, R_VAX_GLOB_DAT },
313   { BFD_RELOC_VAX_JMP_SLOT, R_VAX_JMP_SLOT },
314   { BFD_RELOC_VAX_RELATIVE, R_VAX_RELATIVE },
315   { BFD_RELOC_CTOR, R_VAX_32 },
316   { BFD_RELOC_VTABLE_INHERIT, R_VAX_GNU_VTINHERIT },
317   { BFD_RELOC_VTABLE_ENTRY, R_VAX_GNU_VTENTRY },
318 };
319 
320 static reloc_howto_type *
321 reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED, bfd_reloc_code_real_type code)
322 {
323   unsigned int i;
324   for (i = 0; i < sizeof (reloc_map) / sizeof (reloc_map[0]); i++)
325     {
326       if (reloc_map[i].bfd_val == code)
327 	return &howto_table[reloc_map[i].elf_val];
328     }
329   return 0;
330 }
331 
332 #define bfd_elf32_bfd_reloc_type_lookup reloc_type_lookup
333 #define ELF_ARCH bfd_arch_vax
334 /* end code generated by elf.el */
335 
336 /* Functions for the VAX ELF linker.  */
337 
338 /* The name of the dynamic interpreter.  This is put in the .interp
339    section.  */
340 
341 #define ELF_DYNAMIC_INTERPRETER "/usr/libexec/ld.elf_so"
342 
343 /* The size in bytes of an entry in the procedure linkage table.  */
344 
345 #define PLT_ENTRY_SIZE 12
346 
347 /* The first entry in a procedure linkage table looks like this.  See
348    the SVR4 ABI VAX supplement to see how this works.  */
349 
350 static const bfd_byte elf_vax_plt0_entry[PLT_ENTRY_SIZE] =
351 {
352   0xdd, 0xef,		/* pushl l^ */
353   0, 0, 0, 0,		/* offset to .plt.got + 4 */
354   0x17, 0xff,		/* jmp @L^(pc) */
355   0, 0, 0, 0,		/* offset to .plt.got + 8 */
356 };
357 
358 /* Subsequent entries in a procedure linkage table look like this.  */
359 
360 static const bfd_byte elf_vax_plt_entry[PLT_ENTRY_SIZE] =
361 {
362   0x40, 0x00,		/* .word ^M<r6> */
363   0x16,	0xef,		/* jsb L^(pc) */
364   0, 0, 0, 0,		/* replaced with offset to start of .plt  */
365   0, 0, 0, 0,		/* index into .rela.plt */
366 };
367 
368 /* The VAX linker needs to keep track of the number of relocs that it
369    decides to copy in check_relocs for each symbol.  This is so that it
370    can discard PC relative relocs if it doesn't need them when linking
371    with -Bsymbolic.  We store the information in a field extending the
372    regular ELF linker hash table.  */
373 
374 /* This structure keeps track of the number of PC relative relocs we have
375    copied for a given symbol.  */
376 
377 struct elf_vax_pcrel_relocs_copied
378 {
379   /* Next section.  */
380   struct elf_vax_pcrel_relocs_copied *next;
381   /* A section in dynobj.  */
382   asection *section;
383   /* Number of relocs copied in this section.  */
384   bfd_size_type count;
385 };
386 
387 /* VAX ELF linker hash entry.  */
388 
389 struct elf_vax_link_hash_entry
390 {
391   struct elf_link_hash_entry root;
392 
393   /* Number of PC relative relocs copied for this symbol.  */
394   struct elf_vax_pcrel_relocs_copied *pcrel_relocs_copied;
395 
396   bfd_vma got_addend;
397 };
398 
399 /* VAX ELF linker hash table.  */
400 
401 struct elf_vax_link_hash_table
402 {
403   struct elf_link_hash_table root;
404 };
405 
406 /* Declare this now that the above structures are defined.  */
407 
408 static bfd_boolean elf_vax_discard_copies (struct elf_vax_link_hash_entry *,
409 					   PTR);
410 
411 /* Declare this now that the above structures are defined.  */
412 
413 static bfd_boolean elf_vax_instantiate_got_entries (struct elf_link_hash_entry *,
414 						    PTR);
415 
416 /* Traverse an VAX ELF linker hash table.  */
417 
418 #define elf_vax_link_hash_traverse(table, func, info)			\
419   (elf_link_hash_traverse						\
420    (&(table)->root,							\
421     (bfd_boolean (*) (struct elf_link_hash_entry *, PTR)) (func),	\
422     (info)))
423 
424 /* Get the VAX ELF linker hash table from a link_info structure.  */
425 
426 #define elf_vax_hash_table(p) ((struct elf_vax_link_hash_table *) (p)->hash)
427 
428 /* Create an entry in an VAX ELF linker hash table.  */
429 
430 static struct bfd_hash_entry *
431 elf_vax_link_hash_newfunc (struct bfd_hash_entry *entry,
432 			   struct bfd_hash_table *table,
433 			   const char *string)
434 {
435   struct elf_vax_link_hash_entry *ret =
436     (struct elf_vax_link_hash_entry *) entry;
437 
438   /* Allocate the structure if it has not already been allocated by a
439      subclass.  */
440   if (ret == NULL)
441     ret = ((struct elf_vax_link_hash_entry *)
442 	   bfd_hash_allocate (table,
443 			      sizeof (struct elf_vax_link_hash_entry)));
444   if (ret == NULL)
445     return (struct bfd_hash_entry *) ret;
446 
447   /* Call the allocation method of the superclass.  */
448   ret = ((struct elf_vax_link_hash_entry *)
449 	 _bfd_elf_link_hash_newfunc ((struct bfd_hash_entry *) ret,
450 				     table, string));
451   if (ret != NULL)
452     {
453       ret->pcrel_relocs_copied = NULL;
454     }
455 
456   return (struct bfd_hash_entry *) ret;
457 }
458 
459 /* Create an VAX ELF linker hash table.  */
460 
461 static struct bfd_link_hash_table *
462 elf_vax_link_hash_table_create (bfd *abfd)
463 {
464   struct elf_vax_link_hash_table *ret;
465   bfd_size_type amt = sizeof (struct elf_vax_link_hash_table);
466 
467   ret = bfd_malloc (amt);
468   if (ret == NULL)
469     return NULL;
470 
471   if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
472 				      elf_vax_link_hash_newfunc,
473 				      sizeof (struct elf_vax_link_hash_entry)))
474     {
475       free (ret);
476       return NULL;
477     }
478 
479   return &ret->root.root;
480 }
481 
482 /* Keep vax-specific flags in the ELF header */
483 static bfd_boolean
484 elf32_vax_set_private_flags (bfd *abfd, flagword flags)
485 {
486   elf_elfheader (abfd)->e_flags = flags;
487   elf_flags_init (abfd) = TRUE;
488   return TRUE;
489 }
490 
491 /* Merge backend specific data from an object file to the output
492    object file when linking.  */
493 static bfd_boolean
494 elf32_vax_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
495 {
496   flagword out_flags;
497   flagword in_flags;
498 
499   if (   bfd_get_flavour (ibfd) != bfd_target_elf_flavour
500       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
501     return TRUE;
502 
503   in_flags  = elf_elfheader (ibfd)->e_flags;
504   out_flags = elf_elfheader (obfd)->e_flags;
505 
506   if (!elf_flags_init (obfd))
507     {
508       elf_flags_init (obfd) = TRUE;
509       elf_elfheader (obfd)->e_flags = in_flags;
510     }
511 
512   return TRUE;
513 }
514 
515 /* Display the flags field */
516 static bfd_boolean
517 elf32_vax_print_private_bfd_data (bfd *abfd, PTR ptr)
518 {
519   FILE *file = (FILE *) ptr;
520 
521   BFD_ASSERT (abfd != NULL && ptr != NULL);
522 
523   /* Print normal ELF private data.  */
524   _bfd_elf_print_private_bfd_data (abfd, ptr);
525 
526   /* Ignore init flag - it may not be set, despite the flags field containing valid data.  */
527 
528   /* xgettext:c-format */
529   fprintf (file, _("private flags = %lx:"), elf_elfheader (abfd)->e_flags);
530 
531   if (elf_elfheader (abfd)->e_flags & EF_VAX_NONPIC)
532     fprintf (file, _(" [nonpic]"));
533 
534   if (elf_elfheader (abfd)->e_flags & EF_VAX_DFLOAT)
535     fprintf (file, _(" [d-float]"));
536 
537   if (elf_elfheader (abfd)->e_flags & EF_VAX_GFLOAT)
538     fprintf (file, _(" [g-float]"));
539 
540   fputc ('\n', file);
541 
542   return TRUE;
543 }
544 /* Look through the relocs for a section during the first phase, and
545    allocate space in the global offset table or procedure linkage
546    table.  */
547 
548 static bfd_boolean
549 elf_vax_check_relocs (bfd *abfd, struct bfd_link_info *info, asection *sec,
550 		      const Elf_Internal_Rela *relocs)
551 {
552   bfd *dynobj;
553   Elf_Internal_Shdr *symtab_hdr;
554   struct elf_link_hash_entry **sym_hashes;
555   const Elf_Internal_Rela *rel;
556   const Elf_Internal_Rela *rel_end;
557   asection *sgot;
558   asection *srelgot;
559   asection *sreloc;
560 
561   if (info->relocatable)
562     return TRUE;
563 
564   dynobj = elf_hash_table (info)->dynobj;
565   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
566   sym_hashes = elf_sym_hashes (abfd);
567 
568   sgot = NULL;
569   srelgot = NULL;
570   sreloc = NULL;
571 
572   rel_end = relocs + sec->reloc_count;
573   for (rel = relocs; rel < rel_end; rel++)
574     {
575       unsigned long r_symndx;
576       struct elf_link_hash_entry *h;
577 
578       r_symndx = ELF32_R_SYM (rel->r_info);
579 
580       if (r_symndx < symtab_hdr->sh_info)
581 	h = NULL;
582       else
583 	{
584 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
585 	  while (h->root.type == bfd_link_hash_indirect
586 		 || h->root.type == bfd_link_hash_warning)
587 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
588 	}
589 
590       switch (ELF32_R_TYPE (rel->r_info))
591 	{
592 	case R_VAX_GOT32:
593 	  if (h != NULL
594 	      && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
595 	    break;
596 
597 	  /* This symbol requires a global offset table entry.  */
598 
599 	  if (dynobj == NULL)
600 	    {
601 	      /* Create the .got section.  */
602 	      elf_hash_table (info)->dynobj = dynobj = abfd;
603 	      if (!_bfd_elf_create_got_section (dynobj, info))
604 		return FALSE;
605 	    }
606 
607 	  if (sgot == NULL)
608 	    {
609 	      sgot = bfd_get_section_by_name (dynobj, ".got");
610 	      BFD_ASSERT (sgot != NULL);
611 	    }
612 
613 	  if (srelgot == NULL
614 	      && (h != NULL || info->shared))
615 	    {
616 	      srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
617 	      if (srelgot == NULL)
618 		{
619 		  srelgot = bfd_make_section_with_flags (dynobj,
620 							 ".rela.got",
621 							 (SEC_ALLOC
622 							  | SEC_LOAD
623 							  | SEC_HAS_CONTENTS
624 							  | SEC_IN_MEMORY
625 							  | SEC_LINKER_CREATED
626 							  | SEC_READONLY));
627 		  if (srelgot == NULL
628 		      || !bfd_set_section_alignment (dynobj, srelgot, 2))
629 		    return FALSE;
630 		}
631 	    }
632 
633 	  if (h != NULL)
634 	    {
635 	      struct elf_vax_link_hash_entry *eh;
636 
637 	      eh = (struct elf_vax_link_hash_entry *) h;
638 	      if (h->got.refcount == -1)
639 		{
640 		  h->got.refcount = 1;
641 		  eh->got_addend = rel->r_addend;
642 		}
643 	      else
644 		{
645 		  h->got.refcount++;
646 		  if (eh->got_addend != (bfd_vma) rel->r_addend)
647 		    (*_bfd_error_handler)
648 		      (_("%s: warning: GOT addend of %ld to `%s' does not match previous GOT addend of %ld"),
649 			      bfd_get_filename (abfd), rel->r_addend,
650 			      h->root.root.string,
651 			      eh->got_addend);
652 
653 		}
654 	    }
655 	  break;
656 
657 	case R_VAX_PLT32:
658 	  /* This symbol requires a procedure linkage table entry.  We
659 	     actually build the entry in adjust_dynamic_symbol,
660              because this might be a case of linking PIC code which is
661              never referenced by a dynamic object, in which case we
662              don't need to generate a procedure linkage table entry
663              after all.  */
664 
665 	  /* If this is a local symbol, we resolve it directly without
666 	     creating a procedure linkage table entry.  */
667 	  if (h == NULL)
668 	    continue;
669 
670 	  h->needs_plt = 1;
671 	  if (h->plt.refcount == -1)
672 	    h->plt.refcount = 1;
673 	  else
674 	    h->plt.refcount++;
675 	  break;
676 
677 	case R_VAX_PC8:
678 	case R_VAX_PC16:
679 	case R_VAX_PC32:
680 	  /* If we are creating a shared library and this is not a local
681 	     symbol, we need to copy the reloc into the shared library.
682 	     However when linking with -Bsymbolic and this is a global
683 	     symbol which is defined in an object we are including in the
684 	     link (i.e., DEF_REGULAR is set), then we can resolve the
685 	     reloc directly.  At this point we have not seen all the input
686 	     files, so it is possible that DEF_REGULAR is not set now but
687 	     will be set later (it is never cleared).  We account for that
688 	     possibility below by storing information in the
689 	     pcrel_relocs_copied field of the hash table entry.  */
690 	  if (!(info->shared
691 		&& (sec->flags & SEC_ALLOC) != 0
692 		&& h != NULL
693 		&& (!info->symbolic
694 		    || !h->def_regular)))
695 	    {
696 	      if (h != NULL)
697 		{
698 		  /* Make sure a plt entry is created for this symbol if
699 		     it turns out to be a function defined by a dynamic
700 		     object.  */
701 		  if (h->plt.refcount == -1)
702 		    h->plt.refcount = 1;
703 		  else
704 		    h->plt.refcount++;
705 		}
706 	      break;
707 	    }
708 	  /* Fall through.  */
709 	case R_VAX_8:
710 	case R_VAX_16:
711 	case R_VAX_32:
712 	  if (h != NULL)
713 	    {
714 	      /* Make sure a plt entry is created for this symbol if it
715 		 turns out to be a function defined by a dynamic object.  */
716 	      if (h->plt.refcount == -1)
717 		h->plt.refcount = 1;
718 	      else
719 		h->plt.refcount++;
720 	    }
721 
722 	  /* If we are creating a shared library, we need to copy the
723 	     reloc into the shared library.  */
724 	  if (info->shared
725 	      && (sec->flags & SEC_ALLOC) != 0)
726 	    {
727 	      /* When creating a shared object, we must copy these
728 		 reloc types into the output file.  We create a reloc
729 		 section in dynobj and make room for this reloc.  */
730 	      if (sreloc == NULL)
731 		{
732 		  const char *name;
733 
734 		  name = (bfd_elf_string_from_elf_section
735 			  (abfd,
736 			   elf_elfheader (abfd)->e_shstrndx,
737 			   elf_section_data (sec)->rel_hdr.sh_name));
738 		  if (name == NULL)
739 		    return FALSE;
740 
741 		  BFD_ASSERT (strncmp (name, ".rela", 5) == 0
742 			      && strcmp (bfd_get_section_name (abfd, sec),
743 					 name + 5) == 0);
744 
745 		  sreloc = bfd_get_section_by_name (dynobj, name);
746 		  if (sreloc == NULL)
747 		    {
748 		      sreloc = bfd_make_section_with_flags (dynobj,
749 							    name,
750 							    (SEC_ALLOC
751 							     | SEC_LOAD
752 							     | SEC_HAS_CONTENTS
753 							     | SEC_IN_MEMORY
754 							     | SEC_LINKER_CREATED
755 							     | SEC_READONLY));
756 		      if (sreloc == NULL
757 			  || !bfd_set_section_alignment (dynobj, sreloc, 2))
758 			return FALSE;
759 		    }
760 		  if (sec->flags & SEC_READONLY)
761 		    info->flags |= DF_TEXTREL;
762 		}
763 
764 	      sreloc->size += sizeof (Elf32_External_Rela);
765 
766 	      /* If we are linking with -Bsymbolic, we count the number of
767 		 PC relative relocations we have entered for this symbol,
768 		 so that we can discard them again if the symbol is later
769 		 defined by a regular object.  Note that this function is
770 		 only called if we are using a vaxelf linker hash table,
771 		 which means that h is really a pointer to an
772 		 elf_vax_link_hash_entry.  */
773 	      if ((ELF32_R_TYPE (rel->r_info) == R_VAX_PC8
774 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC16
775 		   || ELF32_R_TYPE (rel->r_info) == R_VAX_PC32)
776 		  && info->symbolic)
777 		{
778 		  struct elf_vax_link_hash_entry *eh;
779 		  struct elf_vax_pcrel_relocs_copied *p;
780 
781 		  eh = (struct elf_vax_link_hash_entry *) h;
782 
783 		  for (p = eh->pcrel_relocs_copied; p != NULL; p = p->next)
784 		    if (p->section == sreloc)
785 		      break;
786 
787 		  if (p == NULL)
788 		    {
789 		      p = ((struct elf_vax_pcrel_relocs_copied *)
790 			   bfd_alloc (dynobj, (bfd_size_type) sizeof *p));
791 		      if (p == NULL)
792 			return FALSE;
793 		      p->next = eh->pcrel_relocs_copied;
794 		      eh->pcrel_relocs_copied = p;
795 		      p->section = sreloc;
796 		      p->count = 0;
797 		    }
798 
799 		  ++p->count;
800 		}
801 	    }
802 
803 	  break;
804 
805 	  /* This relocation describes the C++ object vtable hierarchy.
806 	     Reconstruct it for later use during GC.  */
807 	case R_VAX_GNU_VTINHERIT:
808 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
809 	    return FALSE;
810 	  break;
811 
812 	  /* This relocation describes which C++ vtable entries are actually
813 	     used.  Record for later use during GC.  */
814 	case R_VAX_GNU_VTENTRY:
815 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
816 	    return FALSE;
817 	  break;
818 
819 	default:
820 	  break;
821 	}
822     }
823 
824   return TRUE;
825 }
826 
827 /* Return the section that should be marked against GC for a given
828    relocation.  */
829 
830 static asection *
831 elf_vax_gc_mark_hook (asection *sec,
832 		      struct bfd_link_info *info ATTRIBUTE_UNUSED,
833 		      Elf_Internal_Rela *rel,
834 		      struct elf_link_hash_entry *h,
835 		      Elf_Internal_Sym *sym)
836 {
837   if (h != NULL)
838     {
839       switch (ELF32_R_TYPE (rel->r_info))
840 	{
841 	case R_VAX_GNU_VTINHERIT:
842 	case R_VAX_GNU_VTENTRY:
843 	  break;
844 
845 	default:
846 	  switch (h->root.type)
847 	    {
848 	    default:
849 	      break;
850 
851 	    case bfd_link_hash_defined:
852 	    case bfd_link_hash_defweak:
853 	      return h->root.u.def.section;
854 
855 	    case bfd_link_hash_common:
856 	      return h->root.u.c.p->section;
857 	    }
858 	}
859     }
860   else
861     return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
862 
863   return NULL;
864 }
865 
866 /* Update the got entry reference counts for the section being removed.  */
867 
868 static bfd_boolean
869 elf_vax_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info, asection *sec,
870 		       const Elf_Internal_Rela *relocs)
871 {
872   Elf_Internal_Shdr *symtab_hdr;
873   struct elf_link_hash_entry **sym_hashes;
874   const Elf_Internal_Rela *rel, *relend;
875   bfd *dynobj;
876 
877   dynobj = elf_hash_table (info)->dynobj;
878   if (dynobj == NULL)
879     return TRUE;
880 
881   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
882   sym_hashes = elf_sym_hashes (abfd);
883 
884   relend = relocs + sec->reloc_count;
885   for (rel = relocs; rel < relend; rel++)
886     {
887       unsigned long r_symndx;
888       struct elf_link_hash_entry *h = NULL;
889 
890       r_symndx = ELF32_R_SYM (rel->r_info);
891       if (r_symndx >= symtab_hdr->sh_info)
892 	{
893 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
894 	  while (h->root.type == bfd_link_hash_indirect
895 		 || h->root.type == bfd_link_hash_warning)
896 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
897 	}
898 
899       switch (ELF32_R_TYPE (rel->r_info))
900 	{
901 	case R_VAX_GOT32:
902 	  if (h != NULL && h->got.refcount > 0)
903 	    --h->got.refcount;
904 	  break;
905 
906 	case R_VAX_PLT32:
907 	case R_VAX_PC8:
908 	case R_VAX_PC16:
909 	case R_VAX_PC32:
910 	case R_VAX_8:
911 	case R_VAX_16:
912 	case R_VAX_32:
913 	  if (h != NULL && h->plt.refcount > 0)
914 	    --h->plt.refcount;
915 	  break;
916 
917 	default:
918 	  break;
919 	}
920     }
921 
922   return TRUE;
923 }
924 
925 /* Adjust a symbol defined by a dynamic object and referenced by a
926    regular object.  The current definition is in some section of the
927    dynamic object, but we're not including those sections.  We have to
928    change the definition to something the rest of the link can
929    understand.  */
930 
931 static bfd_boolean
932 elf_vax_adjust_dynamic_symbol (info, h)
933      struct bfd_link_info *info;
934      struct elf_link_hash_entry *h;
935 {
936   bfd *dynobj;
937   asection *s;
938   unsigned int power_of_two;
939 
940   dynobj = elf_hash_table (info)->dynobj;
941 
942   /* Make sure we know what is going on here.  */
943   BFD_ASSERT (dynobj != NULL
944 	      && (h->needs_plt
945 		  || h->u.weakdef != NULL
946 		  || (h->def_dynamic
947 		      && h->ref_regular
948 		      && !h->def_regular)));
949 
950   /* If this is a function, put it in the procedure linkage table.  We
951      will fill in the contents of the procedure linkage table later,
952      when we know the address of the .got section.  */
953   if (h->type == STT_FUNC
954       || h->needs_plt)
955     {
956       if (! info->shared
957 	  && !h->def_dynamic
958 	  && !h->ref_dynamic
959 	  /* We must always create the plt entry if it was referenced
960 	     by a PLTxxO relocation.  In this case we already recorded
961 	     it as a dynamic symbol.  */
962 	  && h->dynindx == -1)
963 	{
964 	  /* This case can occur if we saw a PLTxx reloc in an input
965 	     file, but the symbol was never referred to by a dynamic
966 	     object.  In such a case, we don't actually need to build
967 	     a procedure linkage table, and we can just do a PCxx
968 	     reloc instead.  */
969 	  BFD_ASSERT (h->needs_plt);
970 	  h->plt.offset = (bfd_vma) -1;
971 	  return TRUE;
972 	}
973 
974       /* GC may have rendered this entry unused.  */
975       if (h->plt.refcount <= 0)
976 	{
977 	  h->needs_plt = 0;
978 	  h->plt.offset = (bfd_vma) -1;
979 	  return TRUE;
980 	}
981 
982       /* Make sure this symbol is output as a dynamic symbol.  */
983       if (h->dynindx == -1)
984 	{
985 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
986 	    return FALSE;
987 	}
988 
989       s = bfd_get_section_by_name (dynobj, ".plt");
990       BFD_ASSERT (s != NULL);
991 
992       /* If this is the first .plt entry, make room for the special
993 	 first entry.  */
994       if (s->size == 0)
995 	{
996 	  s->size += PLT_ENTRY_SIZE;
997 	}
998 
999       /* If this symbol is not defined in a regular file, and we are
1000 	 not generating a shared library, then set the symbol to this
1001 	 location in the .plt.  This is required to make function
1002 	 pointers compare as equal between the normal executable and
1003 	 the shared library.  */
1004       if (!info->shared
1005 	  && !h->def_regular)
1006 	{
1007 	  h->root.u.def.section = s;
1008 	  h->root.u.def.value = s->size;
1009 	}
1010 
1011       h->plt.offset = s->size;
1012 
1013       /* Make room for this entry.  */
1014       s->size += PLT_ENTRY_SIZE;
1015 
1016       /* We also need to make an entry in the .got.plt section, which
1017 	 will be placed in the .got section by the linker script.  */
1018 
1019       s = bfd_get_section_by_name (dynobj, ".got.plt");
1020       BFD_ASSERT (s != NULL);
1021       s->size += 4;
1022 
1023       /* We also need to make an entry in the .rela.plt section.  */
1024 
1025       s = bfd_get_section_by_name (dynobj, ".rela.plt");
1026       BFD_ASSERT (s != NULL);
1027       s->size += sizeof (Elf32_External_Rela);
1028 
1029       return TRUE;
1030     }
1031 
1032   /* Reinitialize the plt offset now that it is not used as a reference
1033      count any more.  */
1034   h->plt.offset = (bfd_vma) -1;
1035 
1036   /* If this is a weak symbol, and there is a real definition, the
1037      processor independent code will have arranged for us to see the
1038      real definition first, and we can just use the same value.  */
1039   if (h->u.weakdef != NULL)
1040     {
1041       BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1042 		  || h->u.weakdef->root.type == bfd_link_hash_defweak);
1043       h->root.u.def.section = h->u.weakdef->root.u.def.section;
1044       h->root.u.def.value = h->u.weakdef->root.u.def.value;
1045       return TRUE;
1046     }
1047 
1048   /* This is a reference to a symbol defined by a dynamic object which
1049      is not a function.  */
1050 
1051   /* If we are creating a shared library, we must presume that the
1052      only references to the symbol are via the global offset table.
1053      For such cases we need not do anything here; the relocations will
1054      be handled correctly by relocate_section.  */
1055   if (info->shared)
1056     return TRUE;
1057 
1058   if (h->size == 0)
1059     {
1060       (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
1061 			     h->root.root.string);
1062       return TRUE;
1063     }
1064 
1065   /* We must allocate the symbol in our .dynbss section, which will
1066      become part of the .bss section of the executable.  There will be
1067      an entry for this symbol in the .dynsym section.  The dynamic
1068      object will contain position independent code, so all references
1069      from the dynamic object to this symbol will go through the global
1070      offset table.  The dynamic linker will use the .dynsym entry to
1071      determine the address it must put in the global offset table, so
1072      both the dynamic object and the regular object will refer to the
1073      same memory location for the variable.  */
1074 
1075   s = bfd_get_section_by_name (dynobj, ".dynbss");
1076   BFD_ASSERT (s != NULL);
1077 
1078   /* We must generate a R_VAX_COPY reloc to tell the dynamic linker to
1079      copy the initial value out of the dynamic object and into the
1080      runtime process image.  We need to remember the offset into the
1081      .rela.bss section we are going to use.  */
1082   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1083     {
1084       asection *srel;
1085 
1086       srel = bfd_get_section_by_name (dynobj, ".rela.bss");
1087       BFD_ASSERT (srel != NULL);
1088       srel->size += sizeof (Elf32_External_Rela);
1089       h->needs_copy = 1;
1090     }
1091 
1092   /* We need to figure out the alignment required for this symbol.  I
1093      have no idea how ELF linkers handle this.  */
1094   power_of_two = bfd_log2 (h->size);
1095   if (power_of_two > 3)
1096     power_of_two = 3;
1097 
1098   /* Apply the required alignment.  */
1099   s->size = BFD_ALIGN (s->size, (bfd_size_type) (1 << power_of_two));
1100   if (power_of_two > bfd_get_section_alignment (dynobj, s))
1101     {
1102       if (!bfd_set_section_alignment (dynobj, s, power_of_two))
1103 	return FALSE;
1104     }
1105 
1106   /* Define the symbol as being at this point in the section.  */
1107   h->root.u.def.section = s;
1108   h->root.u.def.value = s->size;
1109 
1110   /* Increment the section size to make room for the symbol.  */
1111   s->size += h->size;
1112 
1113   return TRUE;
1114 }
1115 
1116 /* Set the sizes of the dynamic sections.  */
1117 
1118 static bfd_boolean
1119 elf_vax_size_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1120 {
1121   bfd *dynobj;
1122   asection *s;
1123   bfd_boolean plt;
1124   bfd_boolean relocs;
1125   bfd_boolean reltext;
1126 
1127   dynobj = elf_hash_table (info)->dynobj;
1128   BFD_ASSERT (dynobj != NULL);
1129 
1130   if (elf_hash_table (info)->dynamic_sections_created)
1131     {
1132       /* Set the contents of the .interp section to the interpreter.  */
1133       if (info->executable && !info->static_link)
1134 	{
1135 	  s = bfd_get_section_by_name (dynobj, ".interp");
1136 	  BFD_ASSERT (s != NULL);
1137 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1138 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1139 	}
1140     }
1141   else
1142     {
1143       /* We may have created entries in the .rela.got and .got sections.
1144 	 However, if we are not creating the dynamic sections, we will
1145 	 not actually use these entries.  Reset the size of .rela.got
1146 	 and .got, which will cause it to get stripped from the output
1147 	 file below.  */
1148       s = bfd_get_section_by_name (dynobj, ".rela.got");
1149       if (s != NULL)
1150 	s->size = 0;
1151       s = bfd_get_section_by_name (dynobj, ".got.plt");
1152       if (s != NULL)
1153 	s->size = 0;
1154       s = bfd_get_section_by_name (dynobj, ".got");
1155       if (s != NULL)
1156 	s->size = 0;
1157     }
1158 
1159   /* If this is a -Bsymbolic shared link, then we need to discard all PC
1160      relative relocs against symbols defined in a regular object.  We
1161      allocated space for them in the check_relocs routine, but we will not
1162      fill them in in the relocate_section routine.  */
1163   if (info->shared && info->symbolic)
1164     elf_vax_link_hash_traverse (elf_vax_hash_table (info),
1165 				elf_vax_discard_copies,
1166 				NULL);
1167 
1168   /* If this is a -Bsymbolic shared link or a static link, we need to
1169      discard all the got entries we've recorded.  Otherwise, we need to
1170      instantiate (allocate space for them).  */
1171   elf_link_hash_traverse (elf_hash_table (info),
1172 			  elf_vax_instantiate_got_entries,
1173 			  (PTR) info);
1174 
1175   /* The check_relocs and adjust_dynamic_symbol entry points have
1176      determined the sizes of the various dynamic sections.  Allocate
1177      memory for them.  */
1178   plt = FALSE;
1179   relocs = FALSE;
1180   reltext = FALSE;
1181   for (s = dynobj->sections; s != NULL; s = s->next)
1182     {
1183       const char *name;
1184 
1185       if ((s->flags & SEC_LINKER_CREATED) == 0)
1186 	continue;
1187 
1188       /* It's OK to base decisions on the section name, because none
1189 	 of the dynobj section names depend upon the input files.  */
1190       name = bfd_get_section_name (dynobj, s);
1191 
1192       if (strcmp (name, ".plt") == 0)
1193 	{
1194 	  /* Remember whether there is a PLT.  */
1195 	  plt = s->size != 0;
1196 	}
1197       else if (strncmp (name, ".rela", 5) == 0)
1198 	{
1199 	  if (s->size != 0)
1200 	    {
1201 	      asection *target;
1202 
1203 	      /* Remember whether there are any reloc sections other
1204                  than .rela.plt.  */
1205 	      if (strcmp (name, ".rela.plt") != 0)
1206 		{
1207 		  const char *outname;
1208 
1209 		  relocs = TRUE;
1210 
1211 		  /* If this relocation section applies to a read only
1212 		     section, then we probably need a DT_TEXTREL
1213 		     entry.  .rela.plt is actually associated with
1214 		     .got.plt, which is never readonly.  */
1215 		  outname = bfd_get_section_name (output_bfd,
1216 						  s->output_section);
1217 		  target = bfd_get_section_by_name (output_bfd, outname + 5);
1218 		  if (target != NULL
1219 		      && (target->flags & SEC_READONLY) != 0
1220 		      && (target->flags & SEC_ALLOC) != 0)
1221 		    reltext = TRUE;
1222 		}
1223 
1224 	      /* We use the reloc_count field as a counter if we need
1225 		 to copy relocs into the output file.  */
1226 	      s->reloc_count = 0;
1227 	    }
1228 	}
1229       else if (strncmp (name, ".got", 4) != 0
1230 	       && strcmp (name, ".dynbss") != 0)
1231 	{
1232 	  /* It's not one of our sections, so don't allocate space.  */
1233 	  continue;
1234 	}
1235 
1236       if (s->size == 0)
1237 	{
1238 	  /* If we don't need this section, strip it from the
1239 	     output file.  This is mostly to handle .rela.bss and
1240 	     .rela.plt.  We must create both sections in
1241 	     create_dynamic_sections, because they must be created
1242 	     before the linker maps input sections to output
1243 	     sections.  The linker does that before
1244 	     adjust_dynamic_symbol is called, and it is that
1245 	     function which decides whether anything needs to go
1246 	     into these sections.  */
1247 	  s->flags |= SEC_EXCLUDE;
1248 	  continue;
1249 	}
1250 
1251       if ((s->flags & SEC_HAS_CONTENTS) == 0)
1252 	continue;
1253 
1254       /* Allocate memory for the section contents.  */
1255       s->contents = (bfd_byte *) bfd_alloc (dynobj, s->size);
1256       if (s->contents == NULL)
1257 	return FALSE;
1258     }
1259 
1260   if (elf_hash_table (info)->dynamic_sections_created)
1261     {
1262       /* Add some entries to the .dynamic section.  We fill in the
1263 	 values later, in elf_vax_finish_dynamic_sections, but we
1264 	 must add the entries now so that we get the correct size for
1265 	 the .dynamic section.  The DT_DEBUG entry is filled in by the
1266 	 dynamic linker and used by the debugger.  */
1267 #define add_dynamic_entry(TAG, VAL) \
1268   _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1269 
1270       if (!info->shared)
1271 	{
1272 	  if (!add_dynamic_entry (DT_DEBUG, 0))
1273 	    return FALSE;
1274 	}
1275 
1276       if (plt)
1277 	{
1278 	  if (!add_dynamic_entry (DT_PLTGOT, 0)
1279 	      || !add_dynamic_entry (DT_PLTRELSZ, 0)
1280 	      || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1281 	      || !add_dynamic_entry (DT_JMPREL, 0))
1282 	    return FALSE;
1283 	}
1284 
1285       if (relocs)
1286 	{
1287 	  if (!add_dynamic_entry (DT_RELA, 0)
1288 	      || !add_dynamic_entry (DT_RELASZ, 0)
1289 	      || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
1290 	    return FALSE;
1291 	}
1292 
1293       if (reltext || (info->flags & DF_TEXTREL) != 0)
1294 	{
1295 	  if (!add_dynamic_entry (DT_TEXTREL, 0))
1296 	    return FALSE;
1297 	}
1298     }
1299 #undef add_dynamic_entry
1300 
1301   return TRUE;
1302 }
1303 
1304 /* This function is called via elf_vax_link_hash_traverse if we are
1305    creating a shared object with -Bsymbolic.  It discards the space
1306    allocated to copy PC relative relocs against symbols which are defined
1307    in regular objects.  We allocated space for them in the check_relocs
1308    routine, but we won't fill them in in the relocate_section routine.  */
1309 
1310 static bfd_boolean
1311 elf_vax_discard_copies (struct elf_vax_link_hash_entry *h,
1312 			PTR ignore ATTRIBUTE_UNUSED)
1313 {
1314   struct elf_vax_pcrel_relocs_copied *s;
1315 
1316   if (h->root.root.type == bfd_link_hash_warning)
1317     h = (struct elf_vax_link_hash_entry *) h->root.root.u.i.link;
1318 
1319   /* We only discard relocs for symbols defined in a regular object.  */
1320   if (!h->root.def_regular)
1321     return TRUE;
1322 
1323   for (s = h->pcrel_relocs_copied; s != NULL; s = s->next)
1324     s->section->size -= s->count * sizeof (Elf32_External_Rela);
1325 
1326   return TRUE;
1327 }
1328 
1329 /* This function is called via elf_link_hash_traverse.  It looks for entries
1330    that have GOT or PLT (.GOT) references.  If creating a static object or a
1331    shared object with -Bsymbolic, it resets the reference count back to 0
1332    and sets the offset to -1 so normal PC32 relocation will be done.  If
1333    creating a shared object or executable, space in the .got and .rela.got
1334    will be reserved for the symbol.  */
1335 
1336 static bfd_boolean
1337 elf_vax_instantiate_got_entries (struct elf_link_hash_entry *h, PTR infoptr)
1338 {
1339   struct bfd_link_info *info = (struct bfd_link_info *) infoptr;
1340   bfd *dynobj;
1341   asection *sgot;
1342   asection *srelgot;
1343 
1344   /* We don't care about non-GOT (and non-PLT) entries.  */
1345   if (h->got.refcount <= 0 && h->plt.refcount <= 0)
1346     return TRUE;
1347 
1348   dynobj = elf_hash_table (info)->dynobj;
1349   if (dynobj == NULL)
1350     return TRUE;
1351 
1352   sgot = bfd_get_section_by_name (dynobj, ".got");
1353   srelgot = bfd_get_section_by_name (dynobj, ".rela.got");
1354 
1355   if (!elf_hash_table (info)->dynamic_sections_created
1356       || (info->shared && info->symbolic))
1357     {
1358       h->got.refcount = 0;
1359       h->got.offset = (bfd_vma) -1;
1360       h->plt.refcount = 0;
1361       h->plt.offset = (bfd_vma) -1;
1362     }
1363   else if (h->got.refcount > 0)
1364     {
1365       /* Make sure this symbol is output as a dynamic symbol.  */
1366       if (h->dynindx == -1)
1367 	{
1368 	  if (!bfd_elf_link_record_dynamic_symbol (info, h))
1369 	    return FALSE;
1370 	}
1371 
1372       /* Allocate space in the .got and .rela.got sections.  */
1373       sgot->size += 4;
1374       srelgot->size += sizeof (Elf32_External_Rela);
1375     }
1376 
1377   return TRUE;
1378 }
1379 
1380 /* Relocate an VAX ELF section.  */
1381 
1382 static bfd_boolean
1383 elf_vax_relocate_section (bfd *output_bfd,
1384 			  struct bfd_link_info *info,
1385 			  bfd *input_bfd,
1386 			  asection *input_section,
1387 			  bfd_byte *contents,
1388 			  Elf_Internal_Rela *relocs,
1389 			  Elf_Internal_Sym *local_syms,
1390 			  asection **local_sections)
1391 {
1392   bfd *dynobj;
1393   Elf_Internal_Shdr *symtab_hdr;
1394   struct elf_link_hash_entry **sym_hashes;
1395   bfd_vma *local_got_offsets;
1396   bfd_vma plt_index;
1397   bfd_vma got_offset;
1398   asection *sgot;
1399   asection *splt;
1400   asection *sgotplt;
1401   asection *sreloc;
1402   Elf_Internal_Rela *rel;
1403   Elf_Internal_Rela *relend;
1404 
1405   if (info->relocatable)
1406     return TRUE;
1407 
1408   dynobj = elf_hash_table (info)->dynobj;
1409   symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1410   sym_hashes = elf_sym_hashes (input_bfd);
1411   local_got_offsets = elf_local_got_offsets (input_bfd);
1412 
1413   sgot = NULL;
1414   splt = NULL;
1415   sgotplt = NULL;
1416   sreloc = NULL;
1417 
1418   rel = relocs;
1419   relend = relocs + input_section->reloc_count;
1420   for (; rel < relend; rel++)
1421     {
1422       int r_type;
1423       reloc_howto_type *howto;
1424       unsigned long r_symndx;
1425       struct elf_link_hash_entry *h;
1426       Elf_Internal_Sym *sym;
1427       asection *sec;
1428       bfd_vma relocation;
1429       bfd_reloc_status_type r;
1430 
1431       r_type = ELF32_R_TYPE (rel->r_info);
1432       if (r_type < 0 || r_type >= (int) R_VAX_max)
1433 	{
1434 	  bfd_set_error (bfd_error_bad_value);
1435 	  return FALSE;
1436 	}
1437       howto = howto_table + r_type;
1438 
1439       /* This is a final link.  */
1440       r_symndx = ELF32_R_SYM (rel->r_info);
1441       h = NULL;
1442       sym = NULL;
1443       sec = NULL;
1444       if (r_symndx < symtab_hdr->sh_info)
1445 	{
1446 	  sym = local_syms + r_symndx;
1447 	  sec = local_sections[r_symndx];
1448 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
1449 	}
1450       else
1451 	{
1452 	  bfd_boolean unresolved_reloc;
1453 	  bfd_boolean warned;
1454 
1455 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
1456 				   r_symndx, symtab_hdr, sym_hashes,
1457 				   h, sec, relocation,
1458 				   unresolved_reloc, warned);
1459 
1460 	  if ((h->root.type == bfd_link_hash_defined
1461 	      || h->root.type == bfd_link_hash_defweak)
1462 	      && ((r_type == R_VAX_PLT32
1463 		   && h->plt.offset != (bfd_vma) -1
1464 		   && elf_hash_table (info)->dynamic_sections_created)
1465 		  || (r_type == R_VAX_GOT32
1466 		      && strcmp (h->root.root.string,
1467 				 "_GLOBAL_OFFSET_TABLE_") != 0
1468 		      && elf_hash_table (info)->dynamic_sections_created
1469 		      && (! info->shared
1470 			  || (! info->symbolic && h->dynindx != -1)
1471 			  || !h->def_regular))
1472 		  || (info->shared
1473 		      && ((! info->symbolic && h->dynindx != -1)
1474 			  || !h->def_regular)
1475 		      && ((input_section->flags & SEC_ALLOC) != 0
1476 			  /* DWARF will emit R_VAX_32 relocations in its
1477 			     sections against symbols defined externally
1478 			     in shared libraries.  We can't do anything
1479 			     with them here.  */
1480 
1481 			  || ((input_section->flags & SEC_DEBUGGING) != 0
1482 			      && h->def_dynamic))
1483 		      && (r_type == R_VAX_8
1484 			  || r_type == R_VAX_16
1485 			  || r_type == R_VAX_32
1486 			  || r_type == R_VAX_PC8
1487 			  || r_type == R_VAX_PC16
1488 			  || r_type == R_VAX_PC32))))
1489 	    /* In these cases, we don't need the relocation
1490 	       value.  We check specially because in some
1491 	       obscure cases sec->output_section will be NULL.  */
1492 	    relocation = 0;
1493 	}
1494 
1495       switch (r_type)
1496 	{
1497 	case R_VAX_GOT32:
1498 	  /* Relocation is to the address of the entry for this symbol
1499 	     in the global offset table.  */
1500 	  if (h == NULL || h->got.offset == (bfd_vma) -1)
1501 	    break;
1502 
1503 	  /* Relocation is the offset of the entry for this symbol in
1504 	     the global offset table.  */
1505 
1506 	  {
1507 	    bfd_vma off;
1508 
1509 	    if (sgot == NULL)
1510 	      {
1511 		sgot = bfd_get_section_by_name (dynobj, ".got");
1512 		BFD_ASSERT (sgot != NULL);
1513 	      }
1514 
1515 	    BFD_ASSERT (h != NULL);
1516 	    off = h->got.offset;
1517 	    BFD_ASSERT (off != (bfd_vma) -1);
1518 	    BFD_ASSERT (off < sgot->size);
1519 
1520 	    if (info->shared
1521 		&& h->dynindx == -1
1522 		&& h->def_regular)
1523 	      {
1524 		/* The symbol was forced to be local
1525 		   because of a version file..  We must initialize
1526 		   this entry in the global offset table.  Since
1527 		   the offset must always be a multiple of 4, we
1528 		   use the least significant bit to record whether
1529 		   we have initialized it already.
1530 
1531 		   When doing a dynamic link, we create a .rela.got
1532 		   relocation entry to initialize the value.  This
1533 		   is done in the finish_dynamic_symbol routine.  */
1534 		if ((off & 1) != 0)
1535 		  off &= ~1;
1536 		else
1537 		  {
1538 		    bfd_put_32 (output_bfd, relocation + rel->r_addend,
1539 				sgot->contents + off);
1540 		    h->got.offset |= 1;
1541 		  }
1542 	      } else {
1543 		bfd_put_32 (output_bfd, rel->r_addend, sgot->contents + off);
1544 	      }
1545 
1546 	    relocation = sgot->output_offset + off;
1547 	    /* The GOT relocation uses the addend.  */
1548 	    rel->r_addend = 0;
1549 
1550 	    /* Change the reference to be indirect.  */
1551 	    contents[rel->r_offset - 1] |= 0x10;
1552 	    relocation += sgot->output_section->vma;
1553 	  }
1554 	  break;
1555 
1556 	case R_VAX_PLT32:
1557 	  /* Relocation is to the entry for this symbol in the
1558 	     procedure linkage table.  */
1559 
1560 	  /* Resolve a PLTxx reloc against a local symbol directly,
1561 	     without using the procedure linkage table.  */
1562 	  if (h == NULL)
1563 	    break;
1564 
1565 	  if (h->plt.offset == (bfd_vma) -1
1566 	      || !elf_hash_table (info)->dynamic_sections_created)
1567 	    {
1568 	      /* We didn't make a PLT entry for this symbol.  This
1569 		 happens when statically linking PIC code, or when
1570 		 using -Bsymbolic.  */
1571 	      break;
1572 	    }
1573 
1574 	  if (splt == NULL)
1575 	    {
1576 	      splt = bfd_get_section_by_name (dynobj, ".plt");
1577 	      BFD_ASSERT (splt != NULL);
1578 	    }
1579 
1580 	  if (sgotplt == NULL)
1581 	    {
1582 	      sgotplt = bfd_get_section_by_name (dynobj, ".got.plt");
1583 	      BFD_ASSERT (splt != NULL);
1584 	    }
1585 
1586 	  plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1587 
1588 	  /* Get the offset into the .got table of the entry that
1589 	     corresponds to this function.  Each .got entry is 4 bytes.
1590 	     The first two are reserved.  */
1591 	  got_offset = (plt_index + 3) * 4;
1592 
1593 	  /* We want the relocate to point into the .got.plt instead
1594 	     of the plt itself.  */
1595 	  relocation = (sgotplt->output_section->vma
1596 			+ sgotplt->output_offset
1597 			+ got_offset);
1598 	  contents[rel->r_offset-1] |= 0x10; /* make indirect */
1599 	  if (rel->r_addend == 2)
1600 	    {
1601 	      h->plt.offset |= 1;
1602 	    }
1603 	  else if (rel->r_addend != 0)
1604 	    (*_bfd_error_handler)
1605 	      (_("%s: warning: PLT addend of %d to `%s' from %s section ignored"),
1606 		      bfd_get_filename (input_bfd), rel->r_addend,
1607 		      h->root.root.string,
1608 		      bfd_get_section_name (input_bfd, input_section));
1609 	  rel->r_addend = 0;
1610 
1611 	  break;
1612 
1613 	case R_VAX_PC8:
1614 	case R_VAX_PC16:
1615 	case R_VAX_PC32:
1616 	  if (h == NULL)
1617 	    break;
1618 	  /* Fall through.  */
1619 	case R_VAX_8:
1620 	case R_VAX_16:
1621 	case R_VAX_32:
1622 	  if (info->shared
1623 	      && r_symndx != 0
1624 	      && (input_section->flags & SEC_ALLOC) != 0
1625 	      && ((r_type != R_VAX_PC8
1626 		   && r_type != R_VAX_PC16
1627 		   && r_type != R_VAX_PC32)
1628 		  || (!info->symbolic
1629 		      || !h->def_regular)))
1630 	    {
1631 	      Elf_Internal_Rela outrel;
1632 	      bfd_byte *loc;
1633 	      bfd_boolean skip, relocate;
1634 
1635 	      /* When generating a shared object, these relocations
1636 		 are copied into the output file to be resolved at run
1637 		 time.  */
1638 	      if (sreloc == NULL)
1639 		{
1640 		  const char *name;
1641 
1642 		  name = (bfd_elf_string_from_elf_section
1643 			  (input_bfd,
1644 			   elf_elfheader (input_bfd)->e_shstrndx,
1645 			   elf_section_data (input_section)->rel_hdr.sh_name));
1646 		  if (name == NULL)
1647 		    return FALSE;
1648 
1649 		  BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1650 			      && strcmp (bfd_get_section_name (input_bfd,
1651 							       input_section),
1652 					 name + 5) == 0);
1653 
1654 		  sreloc = bfd_get_section_by_name (dynobj, name);
1655 		  BFD_ASSERT (sreloc != NULL);
1656 		}
1657 
1658 	      skip = FALSE;
1659 	      relocate = FALSE;
1660 
1661 	      outrel.r_offset =
1662 		_bfd_elf_section_offset (output_bfd, info, input_section,
1663 					 rel->r_offset);
1664 	      if (outrel.r_offset == (bfd_vma) -1)
1665 		skip = TRUE;
1666 	      if (outrel.r_offset == (bfd_vma) -2)
1667 		skip = TRUE, relocate = TRUE;
1668 	      outrel.r_offset += (input_section->output_section->vma
1669 				  + input_section->output_offset);
1670 
1671 	      if (skip)
1672 		  memset (&outrel, 0, sizeof outrel);
1673 	      /* h->dynindx may be -1 if the symbol was marked to
1674                  become local.  */
1675 	      else if (h != NULL
1676 		       && ((! info->symbolic && h->dynindx != -1)
1677 			   || !h->def_regular))
1678 		{
1679 		  BFD_ASSERT (h->dynindx != -1);
1680 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1681 		  outrel.r_addend = relocation + rel->r_addend;
1682 		}
1683 	      else
1684 		{
1685 		  if (r_type == R_VAX_32)
1686 		    {
1687 		      relocate = TRUE;
1688 		      outrel.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1689 		      BFD_ASSERT (bfd_get_signed_32 (input_bfd,
1690 						     &contents[rel->r_offset]) == 0);
1691 		      outrel.r_addend = relocation + rel->r_addend;
1692 		    }
1693 		  else
1694 		    {
1695 		      long indx;
1696 
1697 		      if (bfd_is_abs_section (sec))
1698 			indx = 0;
1699 		      else if (sec == NULL || sec->owner == NULL)
1700 			{
1701 			  bfd_set_error (bfd_error_bad_value);
1702 			  return FALSE;
1703 			}
1704 		      else
1705 			{
1706 			  asection *osec;
1707 
1708 			  osec = sec->output_section;
1709 			  indx = elf_section_data (osec)->dynindx;
1710 			  BFD_ASSERT (indx > 0);
1711 			}
1712 
1713 		      outrel.r_info = ELF32_R_INFO (indx, r_type);
1714 		      outrel.r_addend = relocation + rel->r_addend;
1715 		    }
1716 		}
1717 
1718 	      if (!strcmp (bfd_get_section_name (input_bfd, input_section),
1719 			   ".text") != 0 ||
1720 		  (info->shared
1721 		   && ELF32_R_TYPE(outrel.r_info) != R_VAX_32
1722 		   && ELF32_R_TYPE(outrel.r_info) != R_VAX_RELATIVE
1723 		   && ELF32_R_TYPE(outrel.r_info) != R_VAX_COPY
1724 		   && ELF32_R_TYPE(outrel.r_info) != R_VAX_JMP_SLOT
1725 		   && ELF32_R_TYPE(outrel.r_info) != R_VAX_GLOB_DAT))
1726 		{
1727 		  if (h != NULL)
1728 		    (*_bfd_error_handler)
1729 		      (_("%s: warning: %s relocation against symbol `%s' from %s section"),
1730 		      bfd_get_filename (input_bfd), howto->name,
1731 		      h->root.root.string,
1732 		      bfd_get_section_name (input_bfd, input_section));
1733 		  else
1734 		    (*_bfd_error_handler)
1735 		      (_("%s: warning: %s relocation to 0x%x from %s section"),
1736 		      bfd_get_filename (input_bfd), howto->name,
1737 		      outrel.r_addend,
1738 		      bfd_get_section_name (input_bfd, input_section));
1739 		}
1740 	      loc = sreloc->contents;
1741 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1742 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1743 
1744 	      /* This reloc will be computed at runtime, so there's no
1745                  need to do anything now, except for R_VAX_32
1746                  relocations that have been turned into
1747                  R_VAX_RELATIVE.  */
1748 	      if (!relocate)
1749 		continue;
1750 	    }
1751 
1752 	  break;
1753 
1754 	case R_VAX_GNU_VTINHERIT:
1755 	case R_VAX_GNU_VTENTRY:
1756 	  /* These are no-ops in the end.  */
1757 	  continue;
1758 
1759 	default:
1760 	  break;
1761 	}
1762 
1763       /* VAX PCREL relocations are from the end of relocation, not the start.
1764          So subtract the difference from the relocation amount since we can't
1765          add it to the offset.  */
1766       if (howto->pc_relative && howto->pcrel_offset)
1767 	relocation -= bfd_get_reloc_size(howto);
1768 
1769       r = _bfd_final_link_relocate (howto, input_bfd, input_section,
1770 				    contents, rel->r_offset,
1771 				    relocation, rel->r_addend);
1772 
1773       if (r != bfd_reloc_ok)
1774 	{
1775 	  switch (r)
1776 	    {
1777 	    default:
1778 	    case bfd_reloc_outofrange:
1779 	      abort ();
1780 	    case bfd_reloc_overflow:
1781 	      {
1782 		const char *name;
1783 
1784 		if (h != NULL)
1785 		  name = NULL;
1786 		else
1787 		  {
1788 		    name = bfd_elf_string_from_elf_section (input_bfd,
1789 							    symtab_hdr->sh_link,
1790 							    sym->st_name);
1791 		    if (name == NULL)
1792 		      return FALSE;
1793 		    if (*name == '\0')
1794 		      name = bfd_section_name (input_bfd, sec);
1795 		  }
1796 		if (!(info->callbacks->reloc_overflow
1797 		      (info, (h ? &h->root : NULL), name, howto->name,
1798 		       (bfd_vma) 0, input_bfd, input_section,
1799 		       rel->r_offset)))
1800 		  return FALSE;
1801 	      }
1802 	      break;
1803 	    }
1804 	}
1805     }
1806 
1807   return TRUE;
1808 }
1809 
1810 /* Finish up dynamic symbol handling.  We set the contents of various
1811    dynamic sections here.  */
1812 
1813 static bfd_boolean
1814 elf_vax_finish_dynamic_symbol (bfd *output_bfd, struct bfd_link_info *info,
1815 			       struct elf_link_hash_entry *h,
1816 			       Elf_Internal_Sym *sym)
1817 {
1818   bfd *dynobj;
1819 
1820   dynobj = elf_hash_table (info)->dynobj;
1821 
1822   if (h->plt.offset != (bfd_vma) -1)
1823     {
1824       asection *splt;
1825       asection *sgot;
1826       asection *srela;
1827       bfd_vma plt_index;
1828       bfd_vma got_offset;
1829       bfd_vma addend;
1830       Elf_Internal_Rela rela;
1831       bfd_byte *loc;
1832 
1833       /* This symbol has an entry in the procedure linkage table.  Set
1834 	 it up.  */
1835       BFD_ASSERT (h->dynindx != -1);
1836 
1837       splt = bfd_get_section_by_name (dynobj, ".plt");
1838       sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1839       srela = bfd_get_section_by_name (dynobj, ".rela.plt");
1840       BFD_ASSERT (splt != NULL && sgot != NULL && srela != NULL);
1841 
1842       addend = 2 * (h->plt.offset & 1);
1843       h->plt.offset &= ~1;
1844 
1845       /* Get the index in the procedure linkage table which
1846 	 corresponds to this symbol.  This is the index of this symbol
1847 	 in all the symbols for which we are making plt entries.  The
1848 	 first entry in the procedure linkage table is reserved.  */
1849       plt_index = h->plt.offset / PLT_ENTRY_SIZE - 1;
1850 
1851       /* Get the offset into the .got table of the entry that
1852 	 corresponds to this function.  Each .got entry is 4 bytes.
1853 	 The first two are reserved.  */
1854       got_offset = (plt_index + 3) * 4;
1855 
1856       /* Fill in the entry in the procedure linkage table.  */
1857       memcpy (splt->contents + h->plt.offset, elf_vax_plt_entry,
1858 	          PLT_ENTRY_SIZE);
1859 
1860       /* The offset is relative to the first extension word.  */
1861       bfd_put_32 (output_bfd,
1862 		  -(h->plt.offset + 8),
1863 		  splt->contents + h->plt.offset + 4);
1864 
1865       bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
1866 		  splt->contents + h->plt.offset + 8);
1867 
1868       /* Fill in the entry in the global offset table.  */
1869       bfd_put_32 (output_bfd,
1870 		  (splt->output_section->vma
1871 		   + splt->output_offset
1872 		   + h->plt.offset) + addend,
1873 		  sgot->contents + got_offset);
1874 
1875       /* Fill in the entry in the .rela.plt section.  */
1876       rela.r_offset = (sgot->output_section->vma
1877 		       + sgot->output_offset
1878 		       + got_offset);
1879       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_JMP_SLOT);
1880       rela.r_addend = addend;
1881       loc = srela->contents + plt_index * sizeof (Elf32_External_Rela);
1882       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1883 
1884       if (!h->def_regular)
1885 	{
1886 	  /* Mark the symbol as undefined, rather than as defined in
1887 	     the .plt section.  Leave the value alone.  */
1888 	  sym->st_shndx = SHN_UNDEF;
1889 	}
1890     }
1891 
1892   if (h->got.offset != (bfd_vma) -1)
1893     {
1894       asection *sgot;
1895       asection *srela;
1896       Elf_Internal_Rela rela;
1897       bfd_byte *loc;
1898 
1899       /* This symbol has an entry in the global offset table.  Set it
1900 	 up.  */
1901       sgot = bfd_get_section_by_name (dynobj, ".got");
1902       srela = bfd_get_section_by_name (dynobj, ".rela.got");
1903       BFD_ASSERT (sgot != NULL && srela != NULL);
1904 
1905       rela.r_offset = (sgot->output_section->vma
1906 		       + sgot->output_offset
1907 		       + (h->got.offset &~ 1));
1908 
1909       /* If the symbol was forced to be local because of a version file
1910 	 locally we just want to emit a RELATIVE reloc.  The entry in
1911 	 the global offset table will already have been initialized in
1912 	 the relocate_section function.  */
1913       if (info->shared
1914 	  && h->dynindx == -1
1915 	  && h->def_regular)
1916 	{
1917 	  rela.r_info = ELF32_R_INFO (0, R_VAX_RELATIVE);
1918 	}
1919       else
1920 	{
1921 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_GLOB_DAT);
1922 	}
1923       rela.r_addend = bfd_get_signed_32 (output_bfd,
1924 					 (sgot->contents
1925 					  + (h->got.offset & ~1)));
1926 
1927       loc = srela->contents;
1928       loc += srela->reloc_count++ * sizeof (Elf32_External_Rela);
1929       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1930     }
1931 
1932   if (h->needs_copy)
1933     {
1934       asection *s;
1935       Elf_Internal_Rela rela;
1936       bfd_byte *loc;
1937 
1938       /* This symbol needs a copy reloc.  Set it up.  */
1939       BFD_ASSERT (h->dynindx != -1
1940 		  && (h->root.type == bfd_link_hash_defined
1941 		      || h->root.type == bfd_link_hash_defweak));
1942 
1943       s = bfd_get_section_by_name (h->root.u.def.section->owner,
1944 				   ".rela.bss");
1945       BFD_ASSERT (s != NULL);
1946 
1947       rela.r_offset = (h->root.u.def.value
1948 		       + h->root.u.def.section->output_section->vma
1949 		       + h->root.u.def.section->output_offset);
1950       rela.r_info = ELF32_R_INFO (h->dynindx, R_VAX_COPY);
1951       rela.r_addend = 0;
1952       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
1953       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
1954     }
1955 
1956   /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute.  */
1957   if (strcmp (h->root.root.string, "_DYNAMIC") == 0
1958       || h == elf_hash_table (info)->hgot)
1959     sym->st_shndx = SHN_ABS;
1960 
1961   return TRUE;
1962 }
1963 
1964 /* Finish up the dynamic sections.  */
1965 
1966 static bfd_boolean
1967 elf_vax_finish_dynamic_sections (bfd *output_bfd, struct bfd_link_info *info)
1968 {
1969   bfd *dynobj;
1970   asection *sgot;
1971   asection *sdyn;
1972 
1973   dynobj = elf_hash_table (info)->dynobj;
1974 
1975   sgot = bfd_get_section_by_name (dynobj, ".got.plt");
1976   BFD_ASSERT (sgot != NULL);
1977   sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1978 
1979   if (elf_hash_table (info)->dynamic_sections_created)
1980     {
1981       asection *splt;
1982       Elf32_External_Dyn *dyncon, *dynconend;
1983 
1984       splt = bfd_get_section_by_name (dynobj, ".plt");
1985       BFD_ASSERT (splt != NULL && sdyn != NULL);
1986 
1987       dyncon = (Elf32_External_Dyn *) sdyn->contents;
1988       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
1989       for (; dyncon < dynconend; dyncon++)
1990 	{
1991 	  Elf_Internal_Dyn dyn;
1992 	  const char *name;
1993 	  asection *s;
1994 
1995 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1996 
1997 	  switch (dyn.d_tag)
1998 	    {
1999 	    default:
2000 	      break;
2001 
2002 	    case DT_PLTGOT:
2003 	      name = ".got";
2004 	      goto get_vma;
2005 	    case DT_JMPREL:
2006 	      name = ".rela.plt";
2007 	    get_vma:
2008 	      s = bfd_get_section_by_name (output_bfd, name);
2009 	      BFD_ASSERT (s != NULL);
2010 	      dyn.d_un.d_ptr = s->vma;
2011 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2012 	      break;
2013 
2014 	    case DT_PLTRELSZ:
2015 	      s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2016 	      BFD_ASSERT (s != NULL);
2017 	      dyn.d_un.d_val = s->size;
2018 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2019 	      break;
2020 
2021 	    case DT_RELASZ:
2022 	      /* The procedure linkage table relocs (DT_JMPREL) should
2023 		 not be included in the overall relocs (DT_RELA).
2024 		 Therefore, we override the DT_RELASZ entry here to
2025 		 make it not include the JMPREL relocs.  Since the
2026 		 linker script arranges for .rela.plt to follow all
2027 		 other relocation sections, we don't have to worry
2028 		 about changing the DT_RELA entry.  */
2029 	      s = bfd_get_section_by_name (output_bfd, ".rela.plt");
2030 	      if (s != NULL)
2031 		dyn.d_un.d_val -= s->size;
2032 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
2033 	      break;
2034 	    }
2035 	}
2036 
2037       /* Fill in the first entry in the procedure linkage table.  */
2038       if (splt->size > 0)
2039 	{
2040 	  memcpy (splt->contents, elf_vax_plt0_entry, PLT_ENTRY_SIZE);
2041 	  bfd_put_32 (output_bfd,
2042 		          (sgot->output_section->vma
2043 		           + sgot->output_offset + 4
2044 		           - (splt->output_section->vma + 6)),
2045 		          splt->contents + 2);
2046 	  bfd_put_32 (output_bfd,
2047 		          (sgot->output_section->vma
2048 		           + sgot->output_offset + 8
2049 		           - (splt->output_section->vma + 12)),
2050 		          splt->contents + 8);
2051           elf_section_data (splt->output_section)->this_hdr.sh_entsize
2052            = PLT_ENTRY_SIZE;
2053 	}
2054     }
2055 
2056   /* Fill in the first three entries in the global offset table.  */
2057   if (sgot->size > 0)
2058     {
2059       if (sdyn == NULL)
2060 	bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents);
2061       else
2062 	bfd_put_32 (output_bfd,
2063 		    sdyn->output_section->vma + sdyn->output_offset,
2064 		    sgot->contents);
2065       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 4);
2066       bfd_put_32 (output_bfd, (bfd_vma) 0, sgot->contents + 8);
2067     }
2068 
2069   elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
2070 
2071   return TRUE;
2072 }
2073 
2074 #define TARGET_LITTLE_SYM		bfd_elf32_vax_vec
2075 #define TARGET_LITTLE_NAME		"elf32-vax"
2076 #define ELF_MACHINE_CODE		EM_VAX
2077 #define ELF_MAXPAGESIZE			0x1000
2078 
2079 #define elf_backend_create_dynamic_sections \
2080 					_bfd_elf_create_dynamic_sections
2081 #define bfd_elf32_bfd_link_hash_table_create \
2082 					elf_vax_link_hash_table_create
2083 #define bfd_elf32_bfd_final_link	bfd_elf_gc_common_final_link
2084 
2085 #define elf_backend_check_relocs	elf_vax_check_relocs
2086 #define elf_backend_adjust_dynamic_symbol \
2087 					elf_vax_adjust_dynamic_symbol
2088 #define elf_backend_size_dynamic_sections \
2089 					elf_vax_size_dynamic_sections
2090 #define elf_backend_relocate_section	elf_vax_relocate_section
2091 #define elf_backend_finish_dynamic_symbol \
2092 					elf_vax_finish_dynamic_symbol
2093 #define elf_backend_finish_dynamic_sections \
2094 					elf_vax_finish_dynamic_sections
2095 #define elf_backend_gc_mark_hook	elf_vax_gc_mark_hook
2096 #define elf_backend_gc_sweep_hook	elf_vax_gc_sweep_hook
2097 #define bfd_elf32_bfd_merge_private_bfd_data \
2098                                         elf32_vax_merge_private_bfd_data
2099 #define bfd_elf32_bfd_set_private_flags \
2100                                         elf32_vax_set_private_flags
2101 #define bfd_elf32_bfd_print_private_bfd_data \
2102                                         elf32_vax_print_private_bfd_data
2103 
2104 #define elf_backend_can_gc_sections	1
2105 #define elf_backend_want_got_plt	1
2106 #define elf_backend_plt_readonly	1
2107 #define elf_backend_want_plt_sym	0
2108 #define elf_backend_got_header_size	16
2109 #define elf_backend_rela_normal		1
2110 
2111 #include "elf32-target.h"
2112