ELF: Move dyn_relocs to struct elf_link_hash_entry
[deliverable/binutils-gdb.git] / bfd / elf32-s390.c
1 /* IBM S/390-specific support for 32-bit ELF
2 Copyright (C) 2000-2020 Free Software Foundation, Inc.
3 Contributed by Carl B. Pedersen and Martin Schwidefsky.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29
30 static bfd_reloc_status_type
31 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 asection *, bfd *, char **);
33 static bfd_reloc_status_type
34 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 asection *, bfd *, char **);
36
37 /* The relocation "howto" table. */
38
39 static reloc_howto_type elf_howto_table[] =
40 {
41 HOWTO (R_390_NONE, /* type */
42 0, /* rightshift */
43 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
44 0, /* bitsize */
45 FALSE, /* pc_relative */
46 0, /* bitpos */
47 complain_overflow_dont, /* complain_on_overflow */
48 bfd_elf_generic_reloc, /* special_function */
49 "R_390_NONE", /* name */
50 FALSE, /* partial_inplace */
51 0, /* src_mask */
52 0, /* dst_mask */
53 FALSE), /* pcrel_offset */
54
55 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
56 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
57 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
58 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
59 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
60 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
61 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
63 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
64 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
65 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
66 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
67 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
68 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
69 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
70 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
71 HOWTO(R_390_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
72 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,0xffffffff, FALSE),
73 HOWTO(R_390_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
74 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,0xffffffff, FALSE),
75 HOWTO(R_390_JMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
76 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,0xffffffff, FALSE),
77 HOWTO(R_390_RELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
78 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,0xffffffff, FALSE),
79 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
80 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,0xffffffff, FALSE),
81 HOWTO(R_390_GOTPC, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
82 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,0xffffffff, TRUE),
83 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
84 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
85 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
86 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
87 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
88 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
89 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
90 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
91 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
92 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
93 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
94 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
95 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
96 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,0xffffffff, TRUE),
97 EMPTY_HOWTO (R_390_64), /* Empty entry for R_390_64. */
98 EMPTY_HOWTO (R_390_PC64), /* Empty entry for R_390_PC64. */
99 EMPTY_HOWTO (R_390_GOT64), /* Empty entry for R_390_GOT64. */
100 EMPTY_HOWTO (R_390_PLT64), /* Empty entry for R_390_PLT64. */
101 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
102 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,0xffffffff, TRUE),
103 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
104 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
105 EMPTY_HOWTO (R_390_GOTOFF64), /* Empty entry for R_390_GOTOFF64. */
106 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
107 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
108 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
109 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
110 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
112 EMPTY_HOWTO (R_390_GOTPLT64), /* Empty entry for R_390_GOTPLT64. */
113 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
114 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,0xffffffff, TRUE),
115 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
116 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
117 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
118 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
119 EMPTY_HOWTO (R_390_PLTOFF64), /* Empty entry for R_390_PLTOFF64. */
120 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
121 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
122 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
123 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
124 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
125 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
126 HOWTO(R_390_TLS_GD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_TLS_GD32", FALSE, 0, 0xffffffff, FALSE),
128 EMPTY_HOWTO (R_390_TLS_GD64), /* Empty entry for R_390_TLS_GD64. */
129 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
130 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
131 HOWTO(R_390_TLS_GOTIE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", FALSE, 0, 0xffffffff, FALSE),
133 EMPTY_HOWTO (R_390_TLS_GOTIE64), /* Empty entry for R_390_TLS_GOTIE64. */
134 HOWTO(R_390_TLS_LDM32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
135 bfd_elf_generic_reloc, "R_390_TLS_LDM32", FALSE, 0, 0xffffffff, FALSE),
136 EMPTY_HOWTO (R_390_TLS_LDM64), /* Empty entry for R_390_TLS_LDM64. */
137 HOWTO(R_390_TLS_IE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_IE32", FALSE, 0, 0xffffffff, FALSE),
139 EMPTY_HOWTO (R_390_TLS_IE64), /* Empty entry for R_390_TLS_IE64. */
140 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
141 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, 0xffffffff, TRUE),
142 HOWTO(R_390_TLS_LE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_LE32", FALSE, 0, 0xffffffff, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LE64), /* Empty entry for R_390_TLS_LE64. */
145 HOWTO(R_390_TLS_LDO32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDO32", FALSE, 0, 0xffffffff, FALSE),
147 EMPTY_HOWTO (R_390_TLS_LDO64), /* Empty entry for R_390_TLS_LDO64. */
148 HOWTO(R_390_TLS_DTPMOD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, 0xffffffff, FALSE),
150 HOWTO(R_390_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, 0xffffffff, FALSE),
152 HOWTO(R_390_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
153 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, 0xffffffff, FALSE),
154 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
155 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
156 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
157 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
158 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
159 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
160 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
161 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
162 HOWTO(R_390_IRELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, 0xffffffff, FALSE),
164 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
165 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
166 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
167 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
168 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
169 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
170 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
171 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
172 };
173
174 /* GNU extension to record C++ vtable hierarchy. */
175 static reloc_howto_type elf32_s390_vtinherit_howto =
176 HOWTO (R_390_GNU_VTINHERIT, 0,2,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
177 static reloc_howto_type elf32_s390_vtentry_howto =
178 HOWTO (R_390_GNU_VTENTRY, 0,2,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
179
180 static reloc_howto_type *
181 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 bfd_reloc_code_real_type code)
183 {
184 switch (code)
185 {
186 case BFD_RELOC_NONE:
187 return &elf_howto_table[(int) R_390_NONE];
188 case BFD_RELOC_8:
189 return &elf_howto_table[(int) R_390_8];
190 case BFD_RELOC_390_12:
191 return &elf_howto_table[(int) R_390_12];
192 case BFD_RELOC_16:
193 return &elf_howto_table[(int) R_390_16];
194 case BFD_RELOC_32:
195 return &elf_howto_table[(int) R_390_32];
196 case BFD_RELOC_CTOR:
197 return &elf_howto_table[(int) R_390_32];
198 case BFD_RELOC_32_PCREL:
199 return &elf_howto_table[(int) R_390_PC32];
200 case BFD_RELOC_390_GOT12:
201 return &elf_howto_table[(int) R_390_GOT12];
202 case BFD_RELOC_32_GOT_PCREL:
203 return &elf_howto_table[(int) R_390_GOT32];
204 case BFD_RELOC_390_PLT32:
205 return &elf_howto_table[(int) R_390_PLT32];
206 case BFD_RELOC_390_COPY:
207 return &elf_howto_table[(int) R_390_COPY];
208 case BFD_RELOC_390_GLOB_DAT:
209 return &elf_howto_table[(int) R_390_GLOB_DAT];
210 case BFD_RELOC_390_JMP_SLOT:
211 return &elf_howto_table[(int) R_390_JMP_SLOT];
212 case BFD_RELOC_390_RELATIVE:
213 return &elf_howto_table[(int) R_390_RELATIVE];
214 case BFD_RELOC_32_GOTOFF:
215 return &elf_howto_table[(int) R_390_GOTOFF32];
216 case BFD_RELOC_390_GOTPC:
217 return &elf_howto_table[(int) R_390_GOTPC];
218 case BFD_RELOC_390_GOT16:
219 return &elf_howto_table[(int) R_390_GOT16];
220 case BFD_RELOC_16_PCREL:
221 return &elf_howto_table[(int) R_390_PC16];
222 case BFD_RELOC_390_PC12DBL:
223 return &elf_howto_table[(int) R_390_PC12DBL];
224 case BFD_RELOC_390_PLT12DBL:
225 return &elf_howto_table[(int) R_390_PLT12DBL];
226 case BFD_RELOC_390_PC16DBL:
227 return &elf_howto_table[(int) R_390_PC16DBL];
228 case BFD_RELOC_390_PLT16DBL:
229 return &elf_howto_table[(int) R_390_PLT16DBL];
230 case BFD_RELOC_390_PC24DBL:
231 return &elf_howto_table[(int) R_390_PC24DBL];
232 case BFD_RELOC_390_PLT24DBL:
233 return &elf_howto_table[(int) R_390_PLT24DBL];
234 case BFD_RELOC_390_PC32DBL:
235 return &elf_howto_table[(int) R_390_PC32DBL];
236 case BFD_RELOC_390_PLT32DBL:
237 return &elf_howto_table[(int) R_390_PLT32DBL];
238 case BFD_RELOC_390_GOTPCDBL:
239 return &elf_howto_table[(int) R_390_GOTPCDBL];
240 case BFD_RELOC_390_GOTENT:
241 return &elf_howto_table[(int) R_390_GOTENT];
242 case BFD_RELOC_16_GOTOFF:
243 return &elf_howto_table[(int) R_390_GOTOFF16];
244 case BFD_RELOC_390_GOTPLT12:
245 return &elf_howto_table[(int) R_390_GOTPLT12];
246 case BFD_RELOC_390_GOTPLT16:
247 return &elf_howto_table[(int) R_390_GOTPLT16];
248 case BFD_RELOC_390_GOTPLT32:
249 return &elf_howto_table[(int) R_390_GOTPLT32];
250 case BFD_RELOC_390_GOTPLTENT:
251 return &elf_howto_table[(int) R_390_GOTPLTENT];
252 case BFD_RELOC_390_PLTOFF16:
253 return &elf_howto_table[(int) R_390_PLTOFF16];
254 case BFD_RELOC_390_PLTOFF32:
255 return &elf_howto_table[(int) R_390_PLTOFF32];
256 case BFD_RELOC_390_TLS_LOAD:
257 return &elf_howto_table[(int) R_390_TLS_LOAD];
258 case BFD_RELOC_390_TLS_GDCALL:
259 return &elf_howto_table[(int) R_390_TLS_GDCALL];
260 case BFD_RELOC_390_TLS_LDCALL:
261 return &elf_howto_table[(int) R_390_TLS_LDCALL];
262 case BFD_RELOC_390_TLS_GD32:
263 return &elf_howto_table[(int) R_390_TLS_GD32];
264 case BFD_RELOC_390_TLS_GOTIE12:
265 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266 case BFD_RELOC_390_TLS_GOTIE32:
267 return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268 case BFD_RELOC_390_TLS_LDM32:
269 return &elf_howto_table[(int) R_390_TLS_LDM32];
270 case BFD_RELOC_390_TLS_IE32:
271 return &elf_howto_table[(int) R_390_TLS_IE32];
272 case BFD_RELOC_390_TLS_IEENT:
273 return &elf_howto_table[(int) R_390_TLS_IEENT];
274 case BFD_RELOC_390_TLS_LE32:
275 return &elf_howto_table[(int) R_390_TLS_LE32];
276 case BFD_RELOC_390_TLS_LDO32:
277 return &elf_howto_table[(int) R_390_TLS_LDO32];
278 case BFD_RELOC_390_TLS_DTPMOD:
279 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280 case BFD_RELOC_390_TLS_DTPOFF:
281 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282 case BFD_RELOC_390_TLS_TPOFF:
283 return &elf_howto_table[(int) R_390_TLS_TPOFF];
284 case BFD_RELOC_390_20:
285 return &elf_howto_table[(int) R_390_20];
286 case BFD_RELOC_390_GOT20:
287 return &elf_howto_table[(int) R_390_GOT20];
288 case BFD_RELOC_390_GOTPLT20:
289 return &elf_howto_table[(int) R_390_GOTPLT20];
290 case BFD_RELOC_390_TLS_GOTIE20:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
292 case BFD_RELOC_390_IRELATIVE:
293 return &elf_howto_table[(int) R_390_IRELATIVE];
294 case BFD_RELOC_VTABLE_INHERIT:
295 return &elf32_s390_vtinherit_howto;
296 case BFD_RELOC_VTABLE_ENTRY:
297 return &elf32_s390_vtentry_howto;
298 default:
299 break;
300 }
301 return 0;
302 }
303
304 static reloc_howto_type *
305 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 const char *r_name)
307 {
308 unsigned int i;
309
310 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311 if (elf_howto_table[i].name != NULL
312 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
313 return &elf_howto_table[i];
314
315 if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316 return &elf32_s390_vtinherit_howto;
317 if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318 return &elf32_s390_vtentry_howto;
319
320 return NULL;
321 }
322
323 /* We need to use ELF32_R_TYPE so we have our own copy of this function,
324 and elf32-s390.c has its own copy. */
325
326 static bfd_boolean
327 elf_s390_info_to_howto (bfd *abfd,
328 arelent *cache_ptr,
329 Elf_Internal_Rela *dst)
330 {
331 unsigned int r_type = ELF32_R_TYPE(dst->r_info);
332
333 switch (r_type)
334 {
335 case R_390_GNU_VTINHERIT:
336 cache_ptr->howto = &elf32_s390_vtinherit_howto;
337 break;
338
339 case R_390_GNU_VTENTRY:
340 cache_ptr->howto = &elf32_s390_vtentry_howto;
341 break;
342
343 default:
344 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
345 {
346 /* xgettext:c-format */
347 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
348 abfd, r_type);
349 bfd_set_error (bfd_error_bad_value);
350 return FALSE;
351 }
352 cache_ptr->howto = &elf_howto_table[r_type];
353 }
354
355 return TRUE;
356 }
357
358 /* A relocation function which doesn't do anything. */
359 static bfd_reloc_status_type
360 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
361 arelent *reloc_entry,
362 asymbol *symbol ATTRIBUTE_UNUSED,
363 void * data ATTRIBUTE_UNUSED,
364 asection *input_section,
365 bfd *output_bfd,
366 char **error_message ATTRIBUTE_UNUSED)
367 {
368 if (output_bfd)
369 reloc_entry->address += input_section->output_offset;
370 return bfd_reloc_ok;
371 }
372
373 /* Handle the large displacement relocs. */
374 static bfd_reloc_status_type
375 s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
376 arelent *reloc_entry,
377 asymbol *symbol,
378 void * data ATTRIBUTE_UNUSED,
379 asection *input_section,
380 bfd *output_bfd,
381 char **error_message ATTRIBUTE_UNUSED)
382 {
383 reloc_howto_type *howto = reloc_entry->howto;
384 bfd_vma relocation;
385 bfd_vma insn;
386
387 if (output_bfd != (bfd *) NULL
388 && (symbol->flags & BSF_SECTION_SYM) == 0
389 && (! howto->partial_inplace
390 || reloc_entry->addend == 0))
391 {
392 reloc_entry->address += input_section->output_offset;
393 return bfd_reloc_ok;
394 }
395
396 if (output_bfd != NULL)
397 return bfd_reloc_continue;
398
399 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
400 return bfd_reloc_outofrange;
401
402 relocation = (symbol->value
403 + symbol->section->output_section->vma
404 + symbol->section->output_offset);
405 relocation += reloc_entry->addend;
406 if (howto->pc_relative)
407 {
408 relocation -= (input_section->output_section->vma
409 + input_section->output_offset);
410 relocation -= reloc_entry->address;
411 }
412
413 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
414 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
415 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
416
417 if ((bfd_signed_vma) relocation < - 0x80000
418 || (bfd_signed_vma) relocation > 0x7ffff)
419 return bfd_reloc_overflow;
420 else
421 return bfd_reloc_ok;
422 }
423
424 static bfd_boolean
425 elf_s390_is_local_label_name (bfd *abfd, const char *name)
426 {
427 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
428 return TRUE;
429
430 return _bfd_elf_is_local_label_name (abfd, name);
431 }
432
433 /* Functions for the 390 ELF linker. */
434
435 /* The name of the dynamic interpreter. This is put in the .interp
436 section. */
437
438 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
439
440 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
441 copying dynamic variables from a shared lib into an app's dynbss
442 section, and instead use a dynamic relocation to point into the
443 shared lib. */
444 #define ELIMINATE_COPY_RELOCS 1
445
446 /* The size in bytes of the first entry in the procedure linkage table. */
447 #define PLT_FIRST_ENTRY_SIZE 32
448 /* The size in bytes of an entry in the procedure linkage table. */
449 #define PLT_ENTRY_SIZE 32
450
451 #define GOT_ENTRY_SIZE 4
452
453 #define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
454
455 /* The first three entries in a procedure linkage table are reserved,
456 and the initial contents are unimportant (we zero them out).
457 Subsequent entries look like this. See the SVR4 ABI 386
458 supplement to see how this works. */
459
460 /* For the s390, simple addr offset can only be 0 - 4096.
461 To use the full 2 GB address space, several instructions
462 are needed to load an address in a register and execute
463 a branch( or just saving the address)
464
465 Furthermore, only r 0 and 1 are free to use!!! */
466
467 /* The first 3 words in the GOT are then reserved.
468 Word 0 is the address of the dynamic table.
469 Word 1 is a pointer to a structure describing the object
470 Word 2 is used to point to the loader entry address.
471
472 The code for position independent PLT entries looks like this:
473
474 r12 holds addr of the current GOT at entry to the PLT
475
476 The GOT holds the address in the PLT to be executed.
477 The loader then gets:
478 24(15) = Pointer to the structure describing the object.
479 28(15) = Offset into rela.plt
480
481 The loader must then find the module where the function is
482 and insert the address in the GOT.
483
484 Note: 390 can only address +- 64 K relative.
485 We check if offset > 65536, then make a relative branch -64xxx
486 back to a previous defined branch
487
488 PLT1: BASR 1,0 # 2 bytes
489 L 1,22(1) # 4 bytes Load offset in GOT in r 1
490 L 1,(1,12) # 4 bytes Load address from GOT in r1
491 BCR 15,1 # 2 bytes Jump to address
492 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
493 L 1,14(1) # 4 bytes Load offset in symol table in r1
494 BRC 15,-x # 4 bytes Jump to start of PLT
495 .word 0 # 2 bytes filler
496 .long ? # 4 bytes offset in GOT
497 .long ? # 4 bytes offset into rela.plt
498
499 This was the general case. There are two additional, optimizes PLT
500 definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
501 First the one for GOT offsets < 4096:
502
503 PLT1: L 1,<offset>(12) # 4 bytes Load address from GOT in R1
504 BCR 15,1 # 2 bytes Jump to address
505 .word 0,0,0 # 6 bytes filler
506 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
507 L 1,14(1) # 4 bytes Load offset in rela.plt in r1
508 BRC 15,-x # 4 bytes Jump to start of PLT
509 .word 0,0,0 # 6 bytes filler
510 .long ? # 4 bytes offset into rela.plt
511
512 Second the one for GOT offsets < 32768:
513
514 PLT1: LHI 1,<offset> # 4 bytes Load offset in GOT to r1
515 L 1,(1,12) # 4 bytes Load address from GOT to r1
516 BCR 15,1 # 2 bytes Jump to address
517 .word 0 # 2 bytes filler
518 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
519 L 1,14(1) # 4 bytes Load offset in rela.plt in r1
520 BRC 15,-x # 4 bytes Jump to start of PLT
521 .word 0,0,0 # 6 bytes filler
522 .long ? # 4 bytes offset into rela.plt
523
524 Total = 32 bytes per PLT entry
525
526 The code for static build PLT entries looks like this:
527
528 PLT1: BASR 1,0 # 2 bytes
529 L 1,22(1) # 4 bytes Load address of GOT entry
530 L 1,0(0,1) # 4 bytes Load address from GOT in r1
531 BCR 15,1 # 2 bytes Jump to address
532 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
533 L 1,14(1) # 4 bytes Load offset in symbol table in r1
534 BRC 15,-x # 4 bytes Jump to start of PLT
535 .word 0 # 2 bytes filler
536 .long ? # 4 bytes address of GOT entry
537 .long ? # 4 bytes offset into rela.plt */
538
539 static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
540 {
541 0x0d, 0x10, /* basr %r1,%r0 */
542 0x58, 0x10, 0x10, 0x16, /* l %r1,22(%r1) */
543 0x58, 0x10, 0x10, 0x00, /* l %r1,0(%r1) */
544 0x07, 0xf1, /* br %r1 */
545 0x0d, 0x10, /* basr %r1,%r0 */
546 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
547 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
548 0x00, 0x00, /* padding */
549 0x00, 0x00, 0x00, 0x00, /* GOT offset */
550 0x00, 0x00, 0x00, 0x00 /* rela.plt offset */
551 };
552
553 /* Generic PLT pic entry. */
554 static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
555 {
556 0x0d, 0x10, /* basr %r1,%r0 */
557 0x58, 0x10, 0x10, 0x16, /* l %r1,22(%r1) */
558 0x58, 0x11, 0xc0, 0x00, /* l %r1,0(%r1,%r12) */
559 0x07, 0xf1, /* br %r1 */
560 0x0d, 0x10, /* basr %r1,%r0 */
561 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
562 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
563 0x00, 0x00, /* padding */
564 0x00, 0x00, 0x00, 0x00, /* GOT offset */
565 0x00, 0x00, 0x00, 0x00 /* rela.plt offset */
566 };
567
568 /* Optimized PLT pic entry for GOT offset < 4k. xx will be replaced
569 when generating the PLT slot with the GOT offset. */
570 static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
571 {
572 0x58, 0x10, 0xc0, 0x00, /* l %r1,xx(%r12) */
573 0x07, 0xf1, /* br %r1 */
574 0x00, 0x00, 0x00, 0x00, /* padding */
575 0x00, 0x00,
576 0x0d, 0x10, /* basr %r1,%r0 */
577 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
578 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
579 0x00, 0x00, 0x00, 0x00,
580 0x00, 0x00, 0x00, 0x00
581 };
582
583 /* Optimized PLT pic entry for GOT offset < 32k. xx will be replaced
584 when generating the PLT slot with the GOT offset. */
585 static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
586 {
587 0xa7, 0x18, 0x00, 0x00, /* lhi %r1,xx */
588 0x58, 0x11, 0xc0, 0x00, /* l %r1,0(%r1,%r12) */
589 0x07, 0xf1, /* br %r1 */
590 0x00, 0x00,
591 0x0d, 0x10, /* basr %r1,%r0 */
592 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
593 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
594 0x00, 0x00, 0x00, 0x00,
595 0x00, 0x00, 0x00, 0x00,
596 0x00, 0x00
597 };
598
599 /* The first PLT entry pushes the offset into the rela.plt
600 from R1 onto the stack at 8(15) and the loader object info
601 at 12(15), loads the loader address in R1 and jumps to it. */
602
603 /* The first entry in the PLT for PIC code:
604
605 PLT0:
606 ST 1,28(15) # R1 has offset into rela.plt
607 L 1,4(12) # Get loader ino(object struct address)
608 ST 1,24(15) # Store address
609 L 1,8(12) # Entry address of loader in R1
610 BR 1 # Jump to loader
611
612 The first entry in the PLT for static code:
613
614 PLT0:
615 ST 1,28(15) # R1 has offset into rela.plt
616 BASR 1,0
617 L 1,18(0,1) # Get address of GOT
618 MVC 24(4,15),4(1) # Move loader ino to stack
619 L 1,8(1) # Get address of loader
620 BR 1 # Jump to loader
621 .word 0 # filler
622 .long got # address of GOT */
623
624 static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
625 {
626 0x50, 0x10, 0xf0, 0x1c, /* st %r1,28(%r15) */
627 0x0d, 0x10, /* basr %r1,%r0 */
628 0x58, 0x10, 0x10, 0x12, /* l %r1,18(%r1) */
629 0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04, /* mvc 24(4,%r15),4(%r1) */
630 0x58, 0x10, 0x10, 0x08, /* l %r1,8(%r1) */
631 0x07, 0xf1, /* br %r1 */
632 0x00, 0x00, 0x00, 0x00,
633 0x00, 0x00, 0x00, 0x00,
634 0x00, 0x00
635 };
636
637 static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
638 {
639 0x50, 0x10, 0xf0, 0x1c, /* st %r1,28(%r15) */
640 0x58, 0x10, 0xc0, 0x04, /* l %r1,4(%r12) */
641 0x50, 0x10, 0xf0, 0x18, /* st %r1,24(%r15) */
642 0x58, 0x10, 0xc0, 0x08, /* l %r1,8(%r12) */
643 0x07, 0xf1, /* br %r1 */
644 0x00, 0x00, 0x00, 0x00,
645 0x00, 0x00, 0x00, 0x00,
646 0x00, 0x00, 0x00, 0x00,
647 0x00, 0x00
648 };
649
650
651 /* s390 ELF linker hash entry. */
652
653 struct elf_s390_link_hash_entry
654 {
655 struct elf_link_hash_entry elf;
656
657 /* Number of GOTPLT references for a function. */
658 bfd_signed_vma gotplt_refcount;
659
660 #define GOT_UNKNOWN 0
661 #define GOT_NORMAL 1
662 #define GOT_TLS_GD 2
663 #define GOT_TLS_IE 3
664 #define GOT_TLS_IE_NLT 4
665 unsigned char tls_type;
666
667 /* For pointer equality reasons we might need to change the symbol
668 type from STT_GNU_IFUNC to STT_FUNC together with its value and
669 section entry. So after alloc_dynrelocs only these values should
670 be used. In order to check whether a symbol is IFUNC use
671 s390_is_ifunc_symbol_p. */
672 bfd_vma ifunc_resolver_address;
673 asection *ifunc_resolver_section;
674 };
675
676 #define elf_s390_hash_entry(ent) \
677 ((struct elf_s390_link_hash_entry *)(ent))
678
679 /* This structure represents an entry in the local PLT list needed for
680 local IFUNC symbols. */
681 struct plt_entry
682 {
683 /* The section of the local symbol.
684 Set in relocate_section and used in finish_dynamic_sections. */
685 asection *sec;
686
687 union
688 {
689 bfd_signed_vma refcount;
690 bfd_vma offset;
691 } plt;
692 };
693
694 /* NOTE: Keep this structure in sync with
695 the one declared in elf64-s390.c. */
696 struct elf_s390_obj_tdata
697 {
698 struct elf_obj_tdata root;
699
700 /* A local PLT is needed for ifunc symbols. */
701 struct plt_entry *local_plt;
702
703 /* TLS type for each local got entry. */
704 char *local_got_tls_type;
705 };
706
707 #define elf_s390_tdata(abfd) \
708 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
709
710 #define elf_s390_local_plt(abfd) \
711 (elf_s390_tdata (abfd)->local_plt)
712
713 #define elf_s390_local_got_tls_type(abfd) \
714 (elf_s390_tdata (abfd)->local_got_tls_type)
715
716 #define is_s390_elf(bfd) \
717 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
718 && elf_tdata (bfd) != NULL \
719 && elf_object_id (bfd) == S390_ELF_DATA)
720
721 static bfd_boolean
722 elf_s390_mkobject (bfd *abfd)
723 {
724 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
725 S390_ELF_DATA);
726 }
727
728 static bfd_boolean
729 elf_s390_object_p (bfd *abfd)
730 {
731 /* Set the right machine number for an s390 elf32 file. */
732 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
733 }
734
735 /* s390 ELF linker hash table. */
736
737 struct elf_s390_link_hash_table
738 {
739 struct elf_link_hash_table elf;
740
741 /* Short-cuts to get to dynamic linker sections. */
742 asection *irelifunc;
743
744 union
745 {
746 bfd_signed_vma refcount;
747 bfd_vma offset;
748 } tls_ldm_got;
749
750 /* Small local sym cache. */
751 struct sym_cache sym_cache;
752 };
753
754 /* Get the s390 ELF linker hash table from a link_info structure. */
755
756 #define elf_s390_hash_table(p) \
757 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
758 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
759
760 #undef ELF64
761 #include "elf-s390-common.c"
762
763 /* Create an entry in an s390 ELF linker hash table. */
764
765 static struct bfd_hash_entry *
766 link_hash_newfunc (struct bfd_hash_entry *entry,
767 struct bfd_hash_table *table,
768 const char *string)
769 {
770 /* Allocate the structure if it has not already been allocated by a
771 subclass. */
772 if (entry == NULL)
773 {
774 entry = bfd_hash_allocate (table,
775 sizeof (struct elf_s390_link_hash_entry));
776 if (entry == NULL)
777 return entry;
778 }
779
780 /* Call the allocation method of the superclass. */
781 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
782 if (entry != NULL)
783 {
784 struct elf_s390_link_hash_entry *eh;
785
786 eh = (struct elf_s390_link_hash_entry *) entry;
787 eh->gotplt_refcount = 0;
788 eh->tls_type = GOT_UNKNOWN;
789 eh->ifunc_resolver_address = 0;
790 eh->ifunc_resolver_section = NULL;
791 }
792
793 return entry;
794 }
795
796 /* Create an s390 ELF linker hash table. */
797
798 static struct bfd_link_hash_table *
799 elf_s390_link_hash_table_create (bfd *abfd)
800 {
801 struct elf_s390_link_hash_table *ret;
802 size_t amt = sizeof (struct elf_s390_link_hash_table);
803
804 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
805 if (ret == NULL)
806 return NULL;
807
808 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
809 sizeof (struct elf_s390_link_hash_entry),
810 S390_ELF_DATA))
811 {
812 free (ret);
813 return NULL;
814 }
815
816 return &ret->elf.root;
817 }
818
819 /* Copy the extra info we tack onto an elf_link_hash_entry. */
820
821 static void
822 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
823 struct elf_link_hash_entry *dir,
824 struct elf_link_hash_entry *ind)
825 {
826 struct elf_s390_link_hash_entry *edir, *eind;
827
828 edir = (struct elf_s390_link_hash_entry *) dir;
829 eind = (struct elf_s390_link_hash_entry *) ind;
830
831 if (ind->dyn_relocs != NULL)
832 {
833 if (dir->dyn_relocs != NULL)
834 {
835 struct elf_dyn_relocs **pp;
836 struct elf_dyn_relocs *p;
837
838 /* Add reloc counts against the indirect sym to the direct sym
839 list. Merge any entries against the same section. */
840 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
841 {
842 struct elf_dyn_relocs *q;
843
844 for (q = dir->dyn_relocs; q != NULL; q = q->next)
845 if (q->sec == p->sec)
846 {
847 q->pc_count += p->pc_count;
848 q->count += p->count;
849 *pp = p->next;
850 break;
851 }
852 if (q == NULL)
853 pp = &p->next;
854 }
855 *pp = dir->dyn_relocs;
856 }
857
858 dir->dyn_relocs = ind->dyn_relocs;
859 ind->dyn_relocs = NULL;
860 }
861
862 if (ind->root.type == bfd_link_hash_indirect
863 && dir->got.refcount <= 0)
864 {
865 edir->tls_type = eind->tls_type;
866 eind->tls_type = GOT_UNKNOWN;
867 }
868
869 if (ELIMINATE_COPY_RELOCS
870 && ind->root.type != bfd_link_hash_indirect
871 && dir->dynamic_adjusted)
872 {
873 /* If called to transfer flags for a weakdef during processing
874 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
875 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
876 if (dir->versioned != versioned_hidden)
877 dir->ref_dynamic |= ind->ref_dynamic;
878 dir->ref_regular |= ind->ref_regular;
879 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
880 dir->needs_plt |= ind->needs_plt;
881 }
882 else
883 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
884 }
885
886 static int
887 elf_s390_tls_transition (struct bfd_link_info *info,
888 int r_type,
889 int is_local)
890 {
891 if (bfd_link_pic (info))
892 return r_type;
893
894 switch (r_type)
895 {
896 case R_390_TLS_GD32:
897 case R_390_TLS_IE32:
898 if (is_local)
899 return R_390_TLS_LE32;
900 return R_390_TLS_IE32;
901 case R_390_TLS_GOTIE32:
902 if (is_local)
903 return R_390_TLS_LE32;
904 return R_390_TLS_GOTIE32;
905 case R_390_TLS_LDM32:
906 return R_390_TLS_LE32;
907 }
908
909 return r_type;
910 }
911
912 /* Look through the relocs for a section during the first phase, and
913 allocate space in the global offset table or procedure linkage
914 table. */
915
916 static bfd_boolean
917 elf_s390_check_relocs (bfd *abfd,
918 struct bfd_link_info *info,
919 asection *sec,
920 const Elf_Internal_Rela *relocs)
921 {
922 struct elf_s390_link_hash_table *htab;
923 Elf_Internal_Shdr *symtab_hdr;
924 struct elf_link_hash_entry **sym_hashes;
925 const Elf_Internal_Rela *rel;
926 const Elf_Internal_Rela *rel_end;
927 asection *sreloc;
928 bfd_signed_vma *local_got_refcounts;
929 int tls_type, old_tls_type;
930 Elf_Internal_Sym *isym;
931
932 if (bfd_link_relocatable (info))
933 return TRUE;
934
935 BFD_ASSERT (is_s390_elf (abfd));
936
937 htab = elf_s390_hash_table (info);
938 symtab_hdr = &elf_symtab_hdr (abfd);
939 sym_hashes = elf_sym_hashes (abfd);
940 local_got_refcounts = elf_local_got_refcounts (abfd);
941
942 sreloc = NULL;
943
944 rel_end = relocs + sec->reloc_count;
945 for (rel = relocs; rel < rel_end; rel++)
946 {
947 unsigned int r_type;
948 unsigned int r_symndx;
949 struct elf_link_hash_entry *h;
950
951 r_symndx = ELF32_R_SYM (rel->r_info);
952
953 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
954 {
955 /* xgettext:c-format */
956 _bfd_error_handler (_("%pB: bad symbol index: %d"),
957 abfd, r_symndx);
958 return FALSE;
959 }
960
961 if (r_symndx < symtab_hdr->sh_info)
962 {
963 /* A local symbol. */
964 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
965 abfd, r_symndx);
966 if (isym == NULL)
967 return FALSE;
968
969 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
970 {
971 struct plt_entry *plt;
972
973 if (htab->elf.dynobj == NULL)
974 htab->elf.dynobj = abfd;
975
976 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
977 return FALSE;
978
979 if (local_got_refcounts == NULL)
980 {
981 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
982 return FALSE;
983 local_got_refcounts = elf_local_got_refcounts (abfd);
984 }
985 plt = elf_s390_local_plt (abfd);
986 plt[r_symndx].plt.refcount++;
987 }
988 h = NULL;
989 }
990 else
991 {
992 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
993 while (h->root.type == bfd_link_hash_indirect
994 || h->root.type == bfd_link_hash_warning)
995 h = (struct elf_link_hash_entry *) h->root.u.i.link;
996 }
997
998 /* Create got section and local_got_refcounts array if they
999 are needed. */
1000 r_type = elf_s390_tls_transition (info,
1001 ELF32_R_TYPE (rel->r_info),
1002 h == NULL);
1003 switch (r_type)
1004 {
1005 case R_390_GOT12:
1006 case R_390_GOT16:
1007 case R_390_GOT20:
1008 case R_390_GOT32:
1009 case R_390_GOTENT:
1010 case R_390_GOTPLT12:
1011 case R_390_GOTPLT16:
1012 case R_390_GOTPLT20:
1013 case R_390_GOTPLT32:
1014 case R_390_GOTPLTENT:
1015 case R_390_TLS_GD32:
1016 case R_390_TLS_GOTIE12:
1017 case R_390_TLS_GOTIE20:
1018 case R_390_TLS_GOTIE32:
1019 case R_390_TLS_IEENT:
1020 case R_390_TLS_IE32:
1021 case R_390_TLS_LDM32:
1022 if (h == NULL
1023 && local_got_refcounts == NULL)
1024 {
1025 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
1026 return FALSE;
1027 local_got_refcounts = elf_local_got_refcounts (abfd);
1028 }
1029 /* Fall through. */
1030 case R_390_GOTOFF16:
1031 case R_390_GOTOFF32:
1032 case R_390_GOTPC:
1033 case R_390_GOTPCDBL:
1034 if (htab->elf.sgot == NULL)
1035 {
1036 if (htab->elf.dynobj == NULL)
1037 htab->elf.dynobj = abfd;
1038 if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
1039 return FALSE;
1040 }
1041 }
1042
1043 if (h != NULL)
1044 {
1045 if (htab->elf.dynobj == NULL)
1046 htab->elf.dynobj = abfd;
1047 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1048 return FALSE;
1049
1050 /* Make sure an IFUNC symbol defined in a non-shared object
1051 always gets a PLT slot. */
1052 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1053 {
1054 /* The symbol is called by the dynamic loader in order
1055 to resolve the relocation. So it is in fact also
1056 referenced. */
1057 h->ref_regular = 1;
1058 h->needs_plt = 1;
1059 }
1060 }
1061 switch (r_type)
1062 {
1063 case R_390_GOTPC:
1064 case R_390_GOTPCDBL:
1065 /* These relocs do not need a GOT slot. They just load the
1066 GOT pointer itself or address something else relative to
1067 the GOT. Since the GOT pointer has been set up above we
1068 are done. */
1069 break;
1070 case R_390_GOTOFF16:
1071 case R_390_GOTOFF32:
1072 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1073 break;
1074 /* Fall through. */
1075
1076 case R_390_PLT12DBL:
1077 case R_390_PLT16DBL:
1078 case R_390_PLT24DBL:
1079 case R_390_PLT32DBL:
1080 case R_390_PLT32:
1081 case R_390_PLTOFF16:
1082 case R_390_PLTOFF32:
1083 /* This symbol requires a procedure linkage table entry. We
1084 actually build the entry in adjust_dynamic_symbol,
1085 because this might be a case of linking PIC code which is
1086 never referenced by a dynamic object, in which case we
1087 don't need to generate a procedure linkage table entry
1088 after all. */
1089
1090 /* If this is a local symbol, we resolve it directly without
1091 creating a procedure linkage table entry. */
1092 if (h != NULL)
1093 {
1094 h->needs_plt = 1;
1095 h->plt.refcount += 1;
1096 }
1097 break;
1098
1099 case R_390_GOTPLT12:
1100 case R_390_GOTPLT16:
1101 case R_390_GOTPLT20:
1102 case R_390_GOTPLT32:
1103 case R_390_GOTPLTENT:
1104 /* This symbol requires either a procedure linkage table entry
1105 or an entry in the local got. We actually build the entry
1106 in adjust_dynamic_symbol because whether this is really a
1107 global reference can change and with it the fact if we have
1108 to create a plt entry or a local got entry. To be able to
1109 make a once global symbol a local one we have to keep track
1110 of the number of gotplt references that exist for this
1111 symbol. */
1112 if (h != NULL)
1113 {
1114 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1115 h->needs_plt = 1;
1116 h->plt.refcount += 1;
1117 }
1118 else
1119 local_got_refcounts[r_symndx] += 1;
1120 break;
1121
1122 case R_390_TLS_LDM32:
1123 htab->tls_ldm_got.refcount += 1;
1124 break;
1125
1126 case R_390_TLS_IE32:
1127 case R_390_TLS_GOTIE12:
1128 case R_390_TLS_GOTIE20:
1129 case R_390_TLS_GOTIE32:
1130 case R_390_TLS_IEENT:
1131 if (bfd_link_pic (info))
1132 info->flags |= DF_STATIC_TLS;
1133 /* Fall through. */
1134
1135 case R_390_GOT12:
1136 case R_390_GOT16:
1137 case R_390_GOT20:
1138 case R_390_GOT32:
1139 case R_390_GOTENT:
1140 case R_390_TLS_GD32:
1141 /* This symbol requires a global offset table entry. */
1142 switch (r_type)
1143 {
1144 default:
1145 case R_390_GOT12:
1146 case R_390_GOT16:
1147 case R_390_GOT20:
1148 case R_390_GOT32:
1149 case R_390_GOTENT:
1150 tls_type = GOT_NORMAL;
1151 break;
1152 case R_390_TLS_GD32:
1153 tls_type = GOT_TLS_GD;
1154 break;
1155 case R_390_TLS_IE32:
1156 case R_390_TLS_GOTIE32:
1157 tls_type = GOT_TLS_IE;
1158 break;
1159 case R_390_TLS_GOTIE12:
1160 case R_390_TLS_GOTIE20:
1161 case R_390_TLS_IEENT:
1162 tls_type = GOT_TLS_IE_NLT;
1163 break;
1164 }
1165
1166 if (h != NULL)
1167 {
1168 h->got.refcount += 1;
1169 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1170 }
1171 else
1172 {
1173 local_got_refcounts[r_symndx] += 1;
1174 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1175 }
1176 /* If a TLS symbol is accessed using IE at least once,
1177 there is no point to use dynamic model for it. */
1178 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1179 {
1180 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1181 {
1182 _bfd_error_handler
1183 /* xgettext:c-format */
1184 (_("%pB: `%s' accessed both as normal and thread local symbol"),
1185 abfd, h->root.root.string);
1186 return FALSE;
1187 }
1188 if (old_tls_type > tls_type)
1189 tls_type = old_tls_type;
1190 }
1191
1192 if (old_tls_type != tls_type)
1193 {
1194 if (h != NULL)
1195 elf_s390_hash_entry (h)->tls_type = tls_type;
1196 else
1197 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1198 }
1199
1200 if (r_type != R_390_TLS_IE32)
1201 break;
1202 /* Fall through. */
1203
1204 case R_390_TLS_LE32:
1205 /* For static linking and executables this reloc will be
1206 calculated at linktime otherwise a TLS_TPOFF runtime
1207 reloc will be generated. */
1208 if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
1209 break;
1210
1211 if (!bfd_link_pic (info))
1212 break;
1213 info->flags |= DF_STATIC_TLS;
1214 /* Fall through. */
1215
1216 case R_390_8:
1217 case R_390_16:
1218 case R_390_32:
1219 case R_390_PC16:
1220 case R_390_PC12DBL:
1221 case R_390_PC16DBL:
1222 case R_390_PC24DBL:
1223 case R_390_PC32DBL:
1224 case R_390_PC32:
1225 if (h != NULL && bfd_link_executable (info))
1226 {
1227 /* If this reloc is in a read-only section, we might
1228 need a copy reloc. We can't check reliably at this
1229 stage whether the section is read-only, as input
1230 sections have not yet been mapped to output sections.
1231 Tentatively set the flag for now, and correct in
1232 adjust_dynamic_symbol. */
1233 h->non_got_ref = 1;
1234
1235 if (!bfd_link_pic (info))
1236 {
1237 /* We may need a .plt entry if the function this reloc
1238 refers to is in a shared lib. */
1239 h->plt.refcount += 1;
1240 }
1241 }
1242
1243 /* If we are creating a shared library, and this is a reloc
1244 against a global symbol, or a non PC relative reloc
1245 against a local symbol, then we need to copy the reloc
1246 into the shared library. However, if we are linking with
1247 -Bsymbolic, we do not need to copy a reloc against a
1248 global symbol which is defined in an object we are
1249 including in the link (i.e., DEF_REGULAR is set). At
1250 this point we have not seen all the input files, so it is
1251 possible that DEF_REGULAR is not set now but will be set
1252 later (it is never cleared). In case of a weak definition,
1253 DEF_REGULAR may be cleared later by a strong definition in
1254 a shared library. We account for that possibility below by
1255 storing information in the relocs_copied field of the hash
1256 table entry. A similar situation occurs when creating
1257 shared libraries and symbol visibility changes render the
1258 symbol local.
1259
1260 If on the other hand, we are creating an executable, we
1261 may need to keep relocations for symbols satisfied by a
1262 dynamic library if we manage to avoid copy relocs for the
1263 symbol. */
1264 if ((bfd_link_pic (info)
1265 && (sec->flags & SEC_ALLOC) != 0
1266 && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
1267 && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
1268 && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
1269 && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
1270 && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
1271 && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1272 || (h != NULL
1273 && (! SYMBOLIC_BIND (info, h)
1274 || h->root.type == bfd_link_hash_defweak
1275 || !h->def_regular))))
1276 || (ELIMINATE_COPY_RELOCS
1277 && !bfd_link_pic (info)
1278 && (sec->flags & SEC_ALLOC) != 0
1279 && h != NULL
1280 && (h->root.type == bfd_link_hash_defweak
1281 || !h->def_regular)))
1282 {
1283 struct elf_dyn_relocs *p;
1284 struct elf_dyn_relocs **head;
1285
1286 /* We must copy these reloc types into the output file.
1287 Create a reloc section in dynobj and make room for
1288 this reloc. */
1289 if (sreloc == NULL)
1290 {
1291 if (htab->elf.dynobj == NULL)
1292 htab->elf.dynobj = abfd;
1293
1294 sreloc = _bfd_elf_make_dynamic_reloc_section
1295 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
1296
1297 if (sreloc == NULL)
1298 return FALSE;
1299 }
1300
1301 /* If this is a global symbol, we count the number of
1302 relocations we need for this symbol. */
1303 if (h != NULL)
1304 {
1305 head = &h->dyn_relocs;
1306 }
1307 else
1308 {
1309 /* Track dynamic relocs needed for local syms too.
1310 We really need local syms available to do this
1311 easily. Oh well. */
1312 asection *s;
1313 void *vpp;
1314
1315 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1316 abfd, r_symndx);
1317 if (isym == NULL)
1318 return FALSE;
1319
1320 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1321 if (s == NULL)
1322 s = sec;
1323
1324 vpp = &elf_section_data (s)->local_dynrel;
1325 head = (struct elf_dyn_relocs **) vpp;
1326 }
1327
1328 p = *head;
1329 if (p == NULL || p->sec != sec)
1330 {
1331 size_t amt = sizeof *p;
1332
1333 p = ((struct elf_dyn_relocs *)
1334 bfd_alloc (htab->elf.dynobj, amt));
1335 if (p == NULL)
1336 return FALSE;
1337 p->next = *head;
1338 *head = p;
1339 p->sec = sec;
1340 p->count = 0;
1341 p->pc_count = 0;
1342 }
1343
1344 p->count += 1;
1345 if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
1346 || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
1347 || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
1348 || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
1349 || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
1350 || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1351 p->pc_count += 1;
1352 }
1353 break;
1354
1355 /* This relocation describes the C++ object vtable hierarchy.
1356 Reconstruct it for later use during GC. */
1357 case R_390_GNU_VTINHERIT:
1358 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1359 return FALSE;
1360 break;
1361
1362 /* This relocation describes which C++ vtable entries are actually
1363 used. Record for later use during GC. */
1364 case R_390_GNU_VTENTRY:
1365 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1366 return FALSE;
1367 break;
1368
1369 default:
1370 break;
1371 }
1372 }
1373
1374 return TRUE;
1375 }
1376
1377 /* Return the section that should be marked against GC for a given
1378 relocation. */
1379
1380 static asection *
1381 elf_s390_gc_mark_hook (asection *sec,
1382 struct bfd_link_info *info,
1383 Elf_Internal_Rela *rel,
1384 struct elf_link_hash_entry *h,
1385 Elf_Internal_Sym *sym)
1386 {
1387 if (h != NULL)
1388 switch (ELF32_R_TYPE (rel->r_info))
1389 {
1390 case R_390_GNU_VTINHERIT:
1391 case R_390_GNU_VTENTRY:
1392 return NULL;
1393 }
1394 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1395
1396 }
1397
1398 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1399 entry but we found we will not create any. Called when we find we will
1400 not have any PLT for this symbol, by for example
1401 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1402 or elf_s390_size_dynamic_sections if no dynamic sections will be
1403 created (we're only linking static objects). */
1404
1405 static void
1406 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1407 {
1408 if (h->elf.root.type == bfd_link_hash_warning)
1409 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1410
1411 if (h->gotplt_refcount <= 0)
1412 return;
1413
1414 /* We simply add the number of gotplt references to the number
1415 * of got references for this symbol. */
1416 h->elf.got.refcount += h->gotplt_refcount;
1417 h->gotplt_refcount = -1;
1418 }
1419
1420 /* Find dynamic relocs for H that apply to read-only sections. */
1421
1422 static asection *
1423 readonly_dynrelocs (struct elf_link_hash_entry *h)
1424 {
1425 struct elf_dyn_relocs *p;
1426
1427 for (p = h->dyn_relocs; p != NULL; p = p->next)
1428 {
1429 asection *s = p->sec->output_section;
1430
1431 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1432 return p->sec;
1433 }
1434 return NULL;
1435 }
1436
1437 /* Adjust a symbol defined by a dynamic object and referenced by a
1438 regular object. The current definition is in some section of the
1439 dynamic object, but we're not including those sections. We have to
1440 change the definition to something the rest of the link can
1441 understand. */
1442
1443 static bfd_boolean
1444 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1445 struct elf_link_hash_entry *h)
1446 {
1447 struct elf_s390_link_hash_table *htab;
1448 asection *s, *srel;
1449
1450 /* STT_GNU_IFUNC symbol must go through PLT. */
1451 if (s390_is_ifunc_symbol_p (h))
1452 {
1453 /* All local STT_GNU_IFUNC references must be treated as local
1454 calls via local PLT. */
1455 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1456 {
1457 bfd_size_type pc_count = 0, count = 0;
1458 struct elf_dyn_relocs **pp;
1459 struct elf_dyn_relocs *p;
1460
1461 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1462 {
1463 pc_count += p->pc_count;
1464 p->count -= p->pc_count;
1465 p->pc_count = 0;
1466 count += p->count;
1467 if (p->count == 0)
1468 *pp = p->next;
1469 else
1470 pp = &p->next;
1471 }
1472
1473 if (pc_count || count)
1474 {
1475 h->needs_plt = 1;
1476 h->non_got_ref = 1;
1477 if (h->plt.refcount <= 0)
1478 h->plt.refcount = 1;
1479 else
1480 h->plt.refcount += 1;
1481 }
1482 }
1483
1484 if (h->plt.refcount <= 0)
1485 {
1486 h->plt.offset = (bfd_vma) -1;
1487 h->needs_plt = 0;
1488 }
1489 return TRUE;
1490 }
1491
1492 /* If this is a function, put it in the procedure linkage table. We
1493 will fill in the contents of the procedure linkage table later
1494 (although we could actually do it here). */
1495 if (h->type == STT_FUNC
1496 || h->needs_plt)
1497 {
1498 if (h->plt.refcount <= 0
1499 || SYMBOL_CALLS_LOCAL (info, h)
1500 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1501 && h->root.type != bfd_link_hash_undefweak))
1502 {
1503 /* This case can occur if we saw a PLT32 reloc in an input
1504 file, but the symbol was never referred to by a dynamic
1505 object, or if all references were garbage collected. In
1506 such a case, we don't actually need to build a procedure
1507 linkage table, and we can just do a PC32 reloc instead. */
1508 h->plt.offset = (bfd_vma) -1;
1509 h->needs_plt = 0;
1510 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1511 }
1512
1513 return TRUE;
1514 }
1515 else
1516 /* It's possible that we incorrectly decided a .plt reloc was
1517 needed for an R_390_PC32 reloc to a non-function sym in
1518 check_relocs. We can't decide accurately between function and
1519 non-function syms in check-relocs; Objects loaded later in
1520 the link may change h->type. So fix it now. */
1521 h->plt.offset = (bfd_vma) -1;
1522
1523 /* If this is a weak symbol, and there is a real definition, the
1524 processor independent code will have arranged for us to see the
1525 real definition first, and we can just use the same value. */
1526 if (h->is_weakalias)
1527 {
1528 struct elf_link_hash_entry *def = weakdef (h);
1529 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1530 h->root.u.def.section = def->root.u.def.section;
1531 h->root.u.def.value = def->root.u.def.value;
1532 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1533 h->non_got_ref = def->non_got_ref;
1534 return TRUE;
1535 }
1536
1537 /* This is a reference to a symbol defined by a dynamic object which
1538 is not a function. */
1539
1540 /* If we are creating a shared library, we must presume that the
1541 only references to the symbol are via the global offset table.
1542 For such cases we need not do anything here; the relocations will
1543 be handled correctly by relocate_section. */
1544 if (bfd_link_pic (info))
1545 return TRUE;
1546
1547 /* If there are no references to this symbol that do not use the
1548 GOT, we don't need to generate a copy reloc. */
1549 if (!h->non_got_ref)
1550 return TRUE;
1551
1552 /* If -z nocopyreloc was given, we won't generate them either. */
1553 if (info->nocopyreloc)
1554 {
1555 h->non_got_ref = 0;
1556 return TRUE;
1557 }
1558
1559 /* If we don't find any dynamic relocs in read-only sections, then
1560 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1561 if (ELIMINATE_COPY_RELOCS && !readonly_dynrelocs (h))
1562 {
1563 h->non_got_ref = 0;
1564 return TRUE;
1565 }
1566
1567 /* We must allocate the symbol in our .dynbss section, which will
1568 become part of the .bss section of the executable. There will be
1569 an entry for this symbol in the .dynsym section. The dynamic
1570 object will contain position independent code, so all references
1571 from the dynamic object to this symbol will go through the global
1572 offset table. The dynamic linker will use the .dynsym entry to
1573 determine the address it must put in the global offset table, so
1574 both the dynamic object and the regular object will refer to the
1575 same memory location for the variable. */
1576
1577 htab = elf_s390_hash_table (info);
1578
1579 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1580 copy the initial value out of the dynamic object and into the
1581 runtime process image. */
1582 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1583 {
1584 s = htab->elf.sdynrelro;
1585 srel = htab->elf.sreldynrelro;
1586 }
1587 else
1588 {
1589 s = htab->elf.sdynbss;
1590 srel = htab->elf.srelbss;
1591 }
1592 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1593 {
1594 srel->size += sizeof (Elf32_External_Rela);
1595 h->needs_copy = 1;
1596 }
1597
1598 return _bfd_elf_adjust_dynamic_copy (info, h, s);
1599 }
1600
1601 /* Allocate space in .plt, .got and associated reloc sections for
1602 dynamic relocs. */
1603
1604 static bfd_boolean
1605 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1606 {
1607 struct bfd_link_info *info;
1608 struct elf_s390_link_hash_table *htab;
1609 struct elf_dyn_relocs *p;
1610
1611 if (h->root.type == bfd_link_hash_indirect)
1612 return TRUE;
1613
1614 info = (struct bfd_link_info *) inf;
1615 htab = elf_s390_hash_table (info);
1616
1617 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1618 here if it is defined and referenced in a non-shared object. */
1619 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1620 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1621 else if (htab->elf.dynamic_sections_created
1622 && h->plt.refcount > 0)
1623 {
1624 /* Make sure this symbol is output as a dynamic symbol.
1625 Undefined weak syms won't yet be marked as dynamic. */
1626 if (h->dynindx == -1
1627 && !h->forced_local)
1628 {
1629 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1630 return FALSE;
1631 }
1632
1633 if (bfd_link_pic (info)
1634 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1635 {
1636 asection *s = htab->elf.splt;
1637
1638 /* If this is the first .plt entry, make room for the special
1639 first entry. */
1640 if (s->size == 0)
1641 s->size += PLT_FIRST_ENTRY_SIZE;
1642
1643 h->plt.offset = s->size;
1644
1645 /* If this symbol is not defined in a regular file, and we are
1646 not generating a shared library, then set the symbol to this
1647 location in the .plt. This is required to make function
1648 pointers compare as equal between the normal executable and
1649 the shared library. */
1650 if (! bfd_link_pic (info)
1651 && !h->def_regular)
1652 {
1653 h->root.u.def.section = s;
1654 h->root.u.def.value = h->plt.offset;
1655 }
1656
1657 /* Make room for this entry. */
1658 s->size += PLT_ENTRY_SIZE;
1659
1660 /* We also need to make an entry in the .got.plt section, which
1661 will be placed in the .got section by the linker script. */
1662 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1663
1664 /* We also need to make an entry in the .rela.plt section. */
1665 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1666 }
1667 else
1668 {
1669 h->plt.offset = (bfd_vma) -1;
1670 h->needs_plt = 0;
1671 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1672 }
1673 }
1674 else
1675 {
1676 h->plt.offset = (bfd_vma) -1;
1677 h->needs_plt = 0;
1678 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1679 }
1680
1681 /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1682 the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1683 to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1684 we can save the dynamic TLS relocation. */
1685 if (h->got.refcount > 0
1686 && !bfd_link_pic (info)
1687 && h->dynindx == -1
1688 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1689 {
1690 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1691 /* For the GOTIE access without a literal pool entry the offset has
1692 to be stored somewhere. The immediate value in the instruction
1693 is not bit enough so the value is stored in the got. */
1694 {
1695 h->got.offset = htab->elf.sgot->size;
1696 htab->elf.sgot->size += GOT_ENTRY_SIZE;
1697 }
1698 else
1699 h->got.offset = (bfd_vma) -1;
1700 }
1701 else if (h->got.refcount > 0)
1702 {
1703 asection *s;
1704 bfd_boolean dyn;
1705 int tls_type = elf_s390_hash_entry(h)->tls_type;
1706
1707 /* Make sure this symbol is output as a dynamic symbol.
1708 Undefined weak syms won't yet be marked as dynamic. */
1709 if (h->dynindx == -1
1710 && !h->forced_local)
1711 {
1712 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1713 return FALSE;
1714 }
1715
1716 s = htab->elf.sgot;
1717 h->got.offset = s->size;
1718 s->size += GOT_ENTRY_SIZE;
1719 /* R_390_TLS_GD32 needs 2 consecutive GOT slots. */
1720 if (tls_type == GOT_TLS_GD)
1721 s->size += GOT_ENTRY_SIZE;
1722 dyn = htab->elf.dynamic_sections_created;
1723 /* R_390_TLS_IE32 needs one dynamic relocation,
1724 R_390_TLS_GD32 needs one if local symbol and two if global. */
1725 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1726 || tls_type >= GOT_TLS_IE)
1727 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1728 else if (tls_type == GOT_TLS_GD)
1729 htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
1730 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1731 || h->root.type != bfd_link_hash_undefweak)
1732 && (bfd_link_pic (info)
1733 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1734 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1735 }
1736 else
1737 h->got.offset = (bfd_vma) -1;
1738
1739 if (h->dyn_relocs == NULL)
1740 return TRUE;
1741
1742 /* In the shared -Bsymbolic case, discard space allocated for
1743 dynamic pc-relative relocs against symbols which turn out to be
1744 defined in regular objects. For the normal shared case, discard
1745 space for pc-relative relocs that have become local due to symbol
1746 visibility changes. */
1747
1748 if (bfd_link_pic (info))
1749 {
1750 if (SYMBOL_CALLS_LOCAL (info, h))
1751 {
1752 struct elf_dyn_relocs **pp;
1753
1754 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1755 {
1756 p->count -= p->pc_count;
1757 p->pc_count = 0;
1758 if (p->count == 0)
1759 *pp = p->next;
1760 else
1761 pp = &p->next;
1762 }
1763 }
1764
1765 /* Also discard relocs on undefined weak syms with non-default
1766 visibility. */
1767 if (h->dyn_relocs != NULL
1768 && h->root.type == bfd_link_hash_undefweak)
1769 {
1770 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1771 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1772 h->dyn_relocs = NULL;
1773
1774 /* Make sure undefined weak symbols are output as a dynamic
1775 symbol in PIEs. */
1776 else if (h->dynindx == -1
1777 && !h->forced_local)
1778 {
1779 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1780 return FALSE;
1781 }
1782 }
1783 }
1784 else if (ELIMINATE_COPY_RELOCS)
1785 {
1786 /* For the non-shared case, discard space for relocs against
1787 symbols which turn out to need copy relocs or are not
1788 dynamic. */
1789
1790 if (!h->non_got_ref
1791 && ((h->def_dynamic
1792 && !h->def_regular)
1793 || (htab->elf.dynamic_sections_created
1794 && (h->root.type == bfd_link_hash_undefweak
1795 || h->root.type == bfd_link_hash_undefined))))
1796 {
1797 /* Make sure this symbol is output as a dynamic symbol.
1798 Undefined weak syms won't yet be marked as dynamic. */
1799 if (h->dynindx == -1
1800 && !h->forced_local)
1801 {
1802 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1803 return FALSE;
1804 }
1805
1806 /* If that succeeded, we know we'll be keeping all the
1807 relocs. */
1808 if (h->dynindx != -1)
1809 goto keep;
1810 }
1811
1812 h->dyn_relocs = NULL;
1813
1814 keep: ;
1815 }
1816
1817 /* Finally, allocate space. */
1818 for (p = h->dyn_relocs; p != NULL; p = p->next)
1819 {
1820 asection *sreloc = elf_section_data (p->sec)->sreloc;
1821
1822 sreloc->size += p->count * sizeof (Elf32_External_Rela);
1823 }
1824
1825 return TRUE;
1826 }
1827
1828 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
1829 read-only sections. */
1830
1831 static bfd_boolean
1832 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
1833 {
1834 asection *sec;
1835
1836 if (h->root.type == bfd_link_hash_indirect)
1837 return TRUE;
1838
1839 sec = readonly_dynrelocs (h);
1840 if (sec != NULL)
1841 {
1842 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
1843
1844 info->flags |= DF_TEXTREL;
1845 info->callbacks->minfo
1846 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
1847 sec->owner, h->root.root.string, sec);
1848
1849 /* Not an error, just cut short the traversal. */
1850 return FALSE;
1851 }
1852 return TRUE;
1853 }
1854
1855 /* Set the sizes of the dynamic sections. */
1856
1857 static bfd_boolean
1858 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1859 struct bfd_link_info *info)
1860 {
1861 struct elf_s390_link_hash_table *htab;
1862 bfd *dynobj;
1863 asection *s;
1864 bfd_boolean relocs;
1865 bfd *ibfd;
1866
1867 htab = elf_s390_hash_table (info);
1868 dynobj = htab->elf.dynobj;
1869 if (dynobj == NULL)
1870 abort ();
1871
1872 if (htab->elf.dynamic_sections_created)
1873 {
1874 /* Set the contents of the .interp section to the interpreter. */
1875 if (bfd_link_executable (info) && !info->nointerp)
1876 {
1877 s = bfd_get_linker_section (dynobj, ".interp");
1878 if (s == NULL)
1879 abort ();
1880 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1881 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1882 }
1883 }
1884
1885 /* Set up .got offsets for local syms, and space for local dynamic
1886 relocs. */
1887 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1888 {
1889 bfd_signed_vma *local_got;
1890 bfd_signed_vma *end_local_got;
1891 char *local_tls_type;
1892 bfd_size_type locsymcount;
1893 Elf_Internal_Shdr *symtab_hdr;
1894 asection *srela;
1895 struct plt_entry *local_plt;
1896 unsigned int i;
1897
1898 if (! is_s390_elf (ibfd))
1899 continue;
1900
1901 for (s = ibfd->sections; s != NULL; s = s->next)
1902 {
1903 struct elf_dyn_relocs *p;
1904
1905 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1906 {
1907 if (!bfd_is_abs_section (p->sec)
1908 && bfd_is_abs_section (p->sec->output_section))
1909 {
1910 /* Input section has been discarded, either because
1911 it is a copy of a linkonce section or due to
1912 linker script /DISCARD/, so we'll be discarding
1913 the relocs too. */
1914 }
1915 else if (p->count != 0)
1916 {
1917 srela = elf_section_data (p->sec)->sreloc;
1918 srela->size += p->count * sizeof (Elf32_External_Rela);
1919 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1920 info->flags |= DF_TEXTREL;
1921 }
1922 }
1923 }
1924
1925 local_got = elf_local_got_refcounts (ibfd);
1926 if (!local_got)
1927 continue;
1928
1929 symtab_hdr = &elf_symtab_hdr (ibfd);
1930 locsymcount = symtab_hdr->sh_info;
1931 end_local_got = local_got + locsymcount;
1932 local_tls_type = elf_s390_local_got_tls_type (ibfd);
1933 s = htab->elf.sgot;
1934 srela = htab->elf.srelgot;
1935 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1936 {
1937 if (*local_got > 0)
1938 {
1939 *local_got = s->size;
1940 s->size += GOT_ENTRY_SIZE;
1941 if (*local_tls_type == GOT_TLS_GD)
1942 s->size += GOT_ENTRY_SIZE;
1943 if (bfd_link_pic (info))
1944 srela->size += sizeof (Elf32_External_Rela);
1945 }
1946 else
1947 *local_got = (bfd_vma) -1;
1948 }
1949 local_plt = elf_s390_local_plt (ibfd);
1950 for (i = 0; i < symtab_hdr->sh_info; i++)
1951 {
1952 if (local_plt[i].plt.refcount > 0)
1953 {
1954 local_plt[i].plt.offset = htab->elf.iplt->size;
1955 htab->elf.iplt->size += PLT_ENTRY_SIZE;
1956 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1957 htab->elf.irelplt->size += RELA_ENTRY_SIZE;
1958 }
1959 else
1960 local_plt[i].plt.offset = (bfd_vma) -1;
1961 }
1962 }
1963
1964 if (htab->tls_ldm_got.refcount > 0)
1965 {
1966 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
1967 relocs. */
1968 htab->tls_ldm_got.offset = htab->elf.sgot->size;
1969 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1970 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1971 }
1972 else
1973 htab->tls_ldm_got.offset = -1;
1974
1975 /* Allocate global sym .plt and .got entries, and space for global
1976 sym dynamic relocs. */
1977 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1978
1979 /* We now have determined the sizes of the various dynamic sections.
1980 Allocate memory for them. */
1981 relocs = FALSE;
1982 for (s = dynobj->sections; s != NULL; s = s->next)
1983 {
1984 if ((s->flags & SEC_LINKER_CREATED) == 0)
1985 continue;
1986
1987 if (s == htab->elf.splt
1988 || s == htab->elf.sgot
1989 || s == htab->elf.sgotplt
1990 || s == htab->elf.sdynbss
1991 || s == htab->elf.sdynrelro
1992 || s == htab->elf.iplt
1993 || s == htab->elf.igotplt
1994 || s == htab->irelifunc)
1995 {
1996 /* Strip this section if we don't need it; see the
1997 comment below. */
1998 }
1999 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
2000 {
2001 if (s->size != 0)
2002 relocs = TRUE;
2003
2004 /* We use the reloc_count field as a counter if we need
2005 to copy relocs into the output file. */
2006 s->reloc_count = 0;
2007 }
2008 else
2009 {
2010 /* It's not one of our sections, so don't allocate space. */
2011 continue;
2012 }
2013
2014 if (s->size == 0)
2015 {
2016 /* If we don't need this section, strip it from the
2017 output file. This is to handle .rela.bss and
2018 .rela.plt. We must create it in
2019 create_dynamic_sections, because it must be created
2020 before the linker maps input sections to output
2021 sections. The linker does that before
2022 adjust_dynamic_symbol is called, and it is that
2023 function which decides whether anything needs to go
2024 into these sections. */
2025
2026 s->flags |= SEC_EXCLUDE;
2027 continue;
2028 }
2029
2030 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2031 continue;
2032
2033 /* Allocate memory for the section contents. We use bfd_zalloc
2034 here in case unused entries are not reclaimed before the
2035 section's contents are written out. This should not happen,
2036 but this way if it does, we get a R_390_NONE reloc instead
2037 of garbage. */
2038 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2039 if (s->contents == NULL)
2040 return FALSE;
2041 }
2042
2043 if (htab->elf.dynamic_sections_created)
2044 {
2045 /* Add some entries to the .dynamic section. We fill in the
2046 values later, in elf_s390_finish_dynamic_sections, but we
2047 must add the entries now so that we get the correct size for
2048 the .dynamic section. The DT_DEBUG entry is filled in by the
2049 dynamic linker and used by the debugger. */
2050 #define add_dynamic_entry(TAG, VAL) \
2051 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2052
2053 if (bfd_link_executable (info))
2054 {
2055 if (!add_dynamic_entry (DT_DEBUG, 0))
2056 return FALSE;
2057 }
2058
2059 if (htab->elf.splt->size != 0)
2060 {
2061 if (!add_dynamic_entry (DT_PLTGOT, 0)
2062 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2063 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2064 || !add_dynamic_entry (DT_JMPREL, 0))
2065 return FALSE;
2066 }
2067
2068 if (relocs)
2069 {
2070 if (!add_dynamic_entry (DT_RELA, 0)
2071 || !add_dynamic_entry (DT_RELASZ, 0)
2072 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
2073 return FALSE;
2074
2075 /* If any dynamic relocs apply to a read-only section,
2076 then we need a DT_TEXTREL entry. */
2077 if ((info->flags & DF_TEXTREL) == 0)
2078 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
2079
2080 if ((info->flags & DF_TEXTREL) != 0)
2081 {
2082 if (!add_dynamic_entry (DT_TEXTREL, 0))
2083 return FALSE;
2084 }
2085 }
2086 }
2087 #undef add_dynamic_entry
2088
2089 return TRUE;
2090 }
2091
2092 /* Return the base VMA address which should be subtracted from real addresses
2093 when resolving @dtpoff relocation.
2094 This is PT_TLS segment p_vaddr. */
2095
2096 static bfd_vma
2097 dtpoff_base (struct bfd_link_info *info)
2098 {
2099 /* If tls_sec is NULL, we should have signalled an error already. */
2100 if (elf_hash_table (info)->tls_sec == NULL)
2101 return 0;
2102 return elf_hash_table (info)->tls_sec->vma;
2103 }
2104
2105 /* Return the relocation value for @tpoff relocation
2106 if STT_TLS virtual address is ADDRESS. */
2107
2108 static bfd_vma
2109 tpoff (struct bfd_link_info *info, bfd_vma address)
2110 {
2111 struct elf_link_hash_table *htab = elf_hash_table (info);
2112
2113 /* If tls_sec is NULL, we should have signalled an error already. */
2114 if (htab->tls_sec == NULL)
2115 return 0;
2116 return htab->tls_size + htab->tls_sec->vma - address;
2117 }
2118
2119 /* Complain if TLS instruction relocation is against an invalid
2120 instruction. */
2121
2122 static void
2123 invalid_tls_insn (bfd *input_bfd,
2124 asection *input_section,
2125 Elf_Internal_Rela *rel)
2126 {
2127 reloc_howto_type *howto;
2128
2129 howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
2130 _bfd_error_handler
2131 /* xgettext:c-format */
2132 (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
2133 input_bfd,
2134 input_section,
2135 (uint64_t) rel->r_offset,
2136 howto->name);
2137 bfd_set_error (bfd_error_bad_value);
2138 }
2139
2140 /* Relocate a 390 ELF section. */
2141
2142 static bfd_boolean
2143 elf_s390_relocate_section (bfd *output_bfd,
2144 struct bfd_link_info *info,
2145 bfd *input_bfd,
2146 asection *input_section,
2147 bfd_byte *contents,
2148 Elf_Internal_Rela *relocs,
2149 Elf_Internal_Sym *local_syms,
2150 asection **local_sections)
2151 {
2152 struct elf_s390_link_hash_table *htab;
2153 Elf_Internal_Shdr *symtab_hdr;
2154 struct elf_link_hash_entry **sym_hashes;
2155 bfd_vma *local_got_offsets;
2156 Elf_Internal_Rela *rel;
2157 Elf_Internal_Rela *relend;
2158
2159 if (!is_s390_elf (input_bfd))
2160 {
2161 bfd_set_error (bfd_error_wrong_format);
2162 return FALSE;
2163 }
2164
2165 htab = elf_s390_hash_table (info);
2166 symtab_hdr = &elf_symtab_hdr (input_bfd);
2167 sym_hashes = elf_sym_hashes (input_bfd);
2168 local_got_offsets = elf_local_got_offsets (input_bfd);
2169
2170 rel = relocs;
2171 relend = relocs + input_section->reloc_count;
2172 for (; rel < relend; rel++)
2173 {
2174 unsigned int r_type;
2175 reloc_howto_type *howto;
2176 unsigned long r_symndx;
2177 struct elf_link_hash_entry *h;
2178 Elf_Internal_Sym *sym;
2179 asection *sec;
2180 bfd_vma off;
2181 bfd_vma relocation;
2182 bfd_boolean unresolved_reloc;
2183 bfd_reloc_status_type r;
2184 int tls_type;
2185 asection *base_got = htab->elf.sgot;
2186 bfd_boolean resolved_to_zero;
2187
2188 r_type = ELF32_R_TYPE (rel->r_info);
2189 if (r_type == (int) R_390_GNU_VTINHERIT
2190 || r_type == (int) R_390_GNU_VTENTRY)
2191 continue;
2192 if (r_type >= (int) R_390_max)
2193 {
2194 bfd_set_error (bfd_error_bad_value);
2195 return FALSE;
2196 }
2197
2198 howto = elf_howto_table + r_type;
2199 r_symndx = ELF32_R_SYM (rel->r_info);
2200
2201 h = NULL;
2202 sym = NULL;
2203 sec = NULL;
2204 unresolved_reloc = FALSE;
2205 if (r_symndx < symtab_hdr->sh_info)
2206 {
2207 sym = local_syms + r_symndx;
2208 sec = local_sections[r_symndx];
2209 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2210 {
2211 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2212 if (local_plt == NULL)
2213 return FALSE;
2214
2215 /* Address of the PLT slot. */
2216 relocation = (htab->elf.iplt->output_section->vma
2217 + htab->elf.iplt->output_offset
2218 + local_plt[r_symndx].plt.offset);
2219
2220 switch (r_type)
2221 {
2222 case R_390_PLTOFF16:
2223 case R_390_PLTOFF32:
2224 relocation -= htab->elf.sgot->output_section->vma;
2225 break;
2226 case R_390_GOTPLT12:
2227 case R_390_GOTPLT16:
2228 case R_390_GOTPLT20:
2229 case R_390_GOTPLT32:
2230 case R_390_GOTPLTENT:
2231 case R_390_GOT12:
2232 case R_390_GOT16:
2233 case R_390_GOT20:
2234 case R_390_GOT32:
2235 case R_390_GOTENT:
2236 {
2237 /* Write the PLT slot address into the GOT slot. */
2238 bfd_put_32 (output_bfd, relocation,
2239 htab->elf.sgot->contents +
2240 local_got_offsets[r_symndx]);
2241 relocation = (local_got_offsets[r_symndx] +
2242 htab->elf.sgot->output_offset);
2243
2244 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2245 relocation += htab->elf.sgot->output_section->vma;
2246 break;
2247 }
2248 default:
2249 break;
2250 }
2251 /* The output section is needed later in
2252 finish_dynamic_section when creating the dynamic
2253 relocation. */
2254 local_plt[r_symndx].sec = sec;
2255 goto do_relocation;
2256 }
2257 else
2258 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2259 }
2260 else
2261 {
2262 bfd_boolean warned ATTRIBUTE_UNUSED;
2263 bfd_boolean ignored ATTRIBUTE_UNUSED;
2264
2265 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2266 r_symndx, symtab_hdr, sym_hashes,
2267 h, sec, relocation,
2268 unresolved_reloc, warned, ignored);
2269 }
2270
2271 if (sec != NULL && discarded_section (sec))
2272 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2273 rel, 1, relend, howto, 0, contents);
2274
2275 if (bfd_link_relocatable (info))
2276 continue;
2277
2278 resolved_to_zero = (h != NULL
2279 && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2280
2281 switch (r_type)
2282 {
2283 case R_390_GOTPLT12:
2284 case R_390_GOTPLT16:
2285 case R_390_GOTPLT20:
2286 case R_390_GOTPLT32:
2287 case R_390_GOTPLTENT:
2288 /* There are three cases for a GOTPLT relocation. 1) The
2289 relocation is against the jump slot entry of a plt that
2290 will get emitted to the output file. 2) The relocation
2291 is against the jump slot of a plt entry that has been
2292 removed. elf_s390_adjust_gotplt has created a GOT entry
2293 as replacement. 3) The relocation is against a local symbol.
2294 Cases 2) and 3) are the same as the GOT relocation code
2295 so we just have to test for case 1 and fall through for
2296 the other two. */
2297 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2298 {
2299 bfd_vma plt_index;
2300
2301 if (s390_is_ifunc_symbol_p (h))
2302 {
2303 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2304 relocation = (plt_index * GOT_ENTRY_SIZE +
2305 htab->elf.igotplt->output_offset);
2306 if (r_type == R_390_GOTPLTENT)
2307 relocation += htab->elf.igotplt->output_section->vma;
2308 }
2309 else
2310 {
2311 /* Calc. index no.
2312 Current offset - size first entry / entry size. */
2313 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2314 PLT_ENTRY_SIZE;
2315
2316 /* Offset in GOT is PLT index plus GOT headers(3)
2317 times 4, addr & GOT addr. */
2318 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2319 if (r_type == R_390_GOTPLTENT)
2320 relocation += htab->elf.sgot->output_section->vma;
2321 }
2322 unresolved_reloc = FALSE;
2323
2324 }
2325 /* Fall through. */
2326
2327 case R_390_GOT12:
2328 case R_390_GOT16:
2329 case R_390_GOT20:
2330 case R_390_GOT32:
2331 case R_390_GOTENT:
2332 /* Relocation is to the entry for this symbol in the global
2333 offset table. */
2334 if (base_got == NULL)
2335 abort ();
2336
2337 if (h != NULL)
2338 {
2339 bfd_boolean dyn;
2340
2341 off = h->got.offset;
2342 dyn = htab->elf.dynamic_sections_created;
2343
2344 if (s390_is_ifunc_symbol_p (h))
2345 {
2346 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2347 if (off == (bfd_vma)-1)
2348 {
2349 /* No explicit GOT usage so redirect to the
2350 got.iplt slot. */
2351 base_got = htab->elf.igotplt;
2352 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2353 }
2354 else
2355 {
2356 /* Explicit GOT slots must contain the address
2357 of the PLT slot. This will be handled in
2358 finish_dynamic_symbol. */
2359 }
2360 }
2361 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2362 bfd_link_pic (info),
2363 h)
2364 || (bfd_link_pic (info)
2365 && SYMBOL_REFERENCES_LOCAL (info, h))
2366 || (ELF_ST_VISIBILITY (h->other)
2367 && h->root.type == bfd_link_hash_undefweak))
2368
2369 {
2370 /* This is actually a static link, or it is a
2371 -Bsymbolic link and the symbol is defined
2372 locally, or the symbol was forced to be local
2373 because of a version file. We must initialize
2374 this entry in the global offset table. Since the
2375 offset must always be a multiple of 2, we use the
2376 least significant bit to record whether we have
2377 initialized it already.
2378
2379 When doing a dynamic link, we create a .rel.got
2380 relocation entry to initialize the value. This
2381 is done in the finish_dynamic_symbol routine. */
2382 if ((off & 1) != 0)
2383 off &= ~1;
2384 else
2385 {
2386 bfd_put_32 (output_bfd, relocation,
2387 base_got->contents + off);
2388 h->got.offset |= 1;
2389 }
2390
2391 if ((h->def_regular
2392 && bfd_link_pic (info)
2393 && SYMBOL_REFERENCES_LOCAL (info, h))
2394 /* lrl rx,sym@GOTENT -> larl rx, sym */
2395 && ((r_type == R_390_GOTENT
2396 && (bfd_get_16 (input_bfd,
2397 contents + rel->r_offset - 2)
2398 & 0xff0f) == 0xc40d)
2399 /* ly rx, sym@GOT(r12) -> larl rx, sym */
2400 || (r_type == R_390_GOT20
2401 && (bfd_get_32 (input_bfd,
2402 contents + rel->r_offset - 2)
2403 & 0xff00f000) == 0xe300c000
2404 && bfd_get_8 (input_bfd,
2405 contents + rel->r_offset + 3) == 0x58)))
2406 {
2407 unsigned short new_insn =
2408 (0xc000 | (bfd_get_8 (input_bfd,
2409 contents + rel->r_offset - 1) & 0xf0));
2410 bfd_put_16 (output_bfd, new_insn,
2411 contents + rel->r_offset - 2);
2412 r_type = R_390_PC32DBL;
2413 rel->r_addend = 2;
2414 howto = elf_howto_table + r_type;
2415 relocation = h->root.u.def.value
2416 + h->root.u.def.section->output_section->vma
2417 + h->root.u.def.section->output_offset;
2418 goto do_relocation;
2419 }
2420 }
2421 else
2422 unresolved_reloc = FALSE;
2423 }
2424 else
2425 {
2426 if (local_got_offsets == NULL)
2427 abort ();
2428
2429 off = local_got_offsets[r_symndx];
2430
2431 /* The offset must always be a multiple of 4. We use
2432 the least significant bit to record whether we have
2433 already generated the necessary reloc. */
2434 if ((off & 1) != 0)
2435 off &= ~1;
2436 else
2437 {
2438 bfd_put_32 (output_bfd, relocation,
2439 htab->elf.sgot->contents + off);
2440
2441 if (bfd_link_pic (info))
2442 {
2443 asection *srelgot;
2444 Elf_Internal_Rela outrel;
2445 bfd_byte *loc;
2446
2447 srelgot = htab->elf.srelgot;
2448 if (srelgot == NULL)
2449 abort ();
2450
2451 outrel.r_offset = (htab->elf.sgot->output_section->vma
2452 + htab->elf.sgot->output_offset
2453 + off);
2454 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2455 outrel.r_addend = relocation;
2456 loc = srelgot->contents;
2457 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2458 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2459 }
2460
2461 local_got_offsets[r_symndx] |= 1;
2462 }
2463 }
2464
2465 if (off >= (bfd_vma) -2)
2466 abort ();
2467
2468 relocation = base_got->output_offset + off;
2469
2470 /* For @GOTENT the relocation is against the offset between
2471 the instruction and the symbols entry in the GOT and not
2472 between the start of the GOT and the symbols entry. We
2473 add the vma of the GOT to get the correct value. */
2474 if ( r_type == R_390_GOTENT
2475 || r_type == R_390_GOTPLTENT)
2476 relocation += base_got->output_section->vma;
2477
2478 break;
2479
2480 case R_390_GOTOFF16:
2481 case R_390_GOTOFF32:
2482 /* Relocation is relative to the start of the global offset
2483 table. */
2484
2485 if (h != NULL
2486 && s390_is_ifunc_symbol_p (h)
2487 && h->def_regular
2488 && !bfd_link_executable (info))
2489 {
2490 relocation = (htab->elf.iplt->output_section->vma
2491 + htab->elf.iplt->output_offset
2492 + h->plt.offset
2493 - htab->elf.sgot->output_section->vma);
2494 goto do_relocation;
2495 }
2496
2497 /* Note that sgot->output_offset is not involved in this
2498 calculation. We always want the start of .got. If we
2499 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2500 permitted by the ABI, we might have to change this
2501 calculation. */
2502 relocation -= htab->elf.sgot->output_section->vma;
2503 break;
2504
2505 case R_390_GOTPC:
2506 case R_390_GOTPCDBL:
2507 /* Use global offset table as symbol value. */
2508 relocation = htab->elf.sgot->output_section->vma;
2509 unresolved_reloc = FALSE;
2510 break;
2511
2512 case R_390_PLT12DBL:
2513 case R_390_PLT16DBL:
2514 case R_390_PLT24DBL:
2515 case R_390_PLT32DBL:
2516 case R_390_PLT32:
2517 /* Relocation is to the entry for this symbol in the
2518 procedure linkage table. */
2519
2520 /* Resolve a PLT32 reloc against a local symbol directly,
2521 without using the procedure linkage table. */
2522 if (h == NULL)
2523 break;
2524
2525 if (h->plt.offset == (bfd_vma) -1
2526 || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
2527 {
2528 /* We didn't make a PLT entry for this symbol. This
2529 happens when statically linking PIC code, or when
2530 using -Bsymbolic. */
2531 break;
2532 }
2533
2534 if (s390_is_ifunc_symbol_p (h))
2535 relocation = (htab->elf.iplt->output_section->vma
2536 + htab->elf.iplt->output_offset
2537 + h->plt.offset);
2538 else
2539 relocation = (htab->elf.splt->output_section->vma
2540 + htab->elf.splt->output_offset
2541 + h->plt.offset);
2542 unresolved_reloc = FALSE;
2543 break;
2544
2545 case R_390_PLTOFF16:
2546 case R_390_PLTOFF32:
2547 /* Relocation is to the entry for this symbol in the
2548 procedure linkage table relative to the start of the GOT. */
2549
2550 /* For local symbols or if we didn't make a PLT entry for
2551 this symbol resolve the symbol directly. */
2552 if (h == NULL
2553 || h->plt.offset == (bfd_vma) -1
2554 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2555 {
2556 relocation -= htab->elf.sgot->output_section->vma;
2557 break;
2558 }
2559
2560 if (s390_is_ifunc_symbol_p (h))
2561 relocation = (htab->elf.iplt->output_section->vma
2562 + htab->elf.iplt->output_offset
2563 + h->plt.offset
2564 - htab->elf.sgot->output_section->vma);
2565 else
2566 relocation = (htab->elf.splt->output_section->vma
2567 + htab->elf.splt->output_offset
2568 + h->plt.offset
2569 - htab->elf.sgot->output_section->vma);
2570 unresolved_reloc = FALSE;
2571 break;
2572
2573 case R_390_PC16:
2574 case R_390_PC12DBL:
2575 case R_390_PC16DBL:
2576 case R_390_PC24DBL:
2577 case R_390_PC32DBL:
2578 case R_390_PC32:
2579 if (h != NULL
2580 && s390_is_ifunc_symbol_p (h)
2581 && h->def_regular
2582 && !bfd_link_executable (info))
2583 {
2584 /* This will not work our if the function does not
2585 happen to set up the GOT pointer for some other
2586 reason. 31 bit PLT entries require r12 to hold the
2587 GOT pointer.
2588 FIXME: Implement an errorcheck.
2589 NOTE: It will work when brasl is not available
2590 (e.g. with -m31 -march=g5) since a local function
2591 call then does use GOTOFF which implies r12 being set
2592 up. */
2593 relocation = (htab->elf.iplt->output_section->vma
2594 + htab->elf.iplt->output_offset
2595 + h ->plt.offset);
2596 goto do_relocation;
2597 }
2598 /* Fall through. */
2599
2600 case R_390_8:
2601 case R_390_16:
2602 case R_390_32:
2603 if ((input_section->flags & SEC_ALLOC) == 0)
2604 break;
2605
2606 if (h != NULL
2607 && s390_is_ifunc_symbol_p (h)
2608 && h->def_regular)
2609 {
2610 if (!bfd_link_pic (info))
2611 {
2612 /* For a non-shared object STT_GNU_IFUNC symbol must
2613 go through PLT. */
2614 relocation = (htab->elf.iplt->output_section->vma
2615 + htab->elf.iplt->output_offset
2616 + h ->plt.offset);
2617 goto do_relocation;
2618 }
2619 else
2620 {
2621 /* For shared objects a runtime relocation is needed. */
2622
2623 Elf_Internal_Rela outrel;
2624 asection *sreloc;
2625
2626 /* Need a dynamic relocation to get the real function
2627 address. */
2628 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2629 info,
2630 input_section,
2631 rel->r_offset);
2632 if (outrel.r_offset == (bfd_vma) -1
2633 || outrel.r_offset == (bfd_vma) -2)
2634 abort ();
2635
2636 outrel.r_offset += (input_section->output_section->vma
2637 + input_section->output_offset);
2638
2639 if (h->dynindx == -1
2640 || h->forced_local
2641 || bfd_link_executable (info))
2642 {
2643 /* This symbol is resolved locally. */
2644 outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2645 outrel.r_addend = (h->root.u.def.value
2646 + h->root.u.def.section->output_section->vma
2647 + h->root.u.def.section->output_offset);
2648 }
2649 else
2650 {
2651 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2652 outrel.r_addend = 0;
2653 }
2654
2655 sreloc = htab->elf.irelifunc;
2656 elf_append_rela (output_bfd, sreloc, &outrel);
2657
2658 /* If this reloc is against an external symbol, we
2659 do not want to fiddle with the addend. Otherwise,
2660 we need to include the symbol value so that it
2661 becomes an addend for the dynamic reloc. For an
2662 internal symbol, we have updated addend. */
2663 continue;
2664 }
2665 }
2666
2667 if ((bfd_link_pic (info)
2668 && (h == NULL
2669 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2670 && !resolved_to_zero)
2671 || h->root.type != bfd_link_hash_undefweak)
2672 && ((r_type != R_390_PC16
2673 && r_type != R_390_PC12DBL
2674 && r_type != R_390_PC16DBL
2675 && r_type != R_390_PC24DBL
2676 && r_type != R_390_PC32DBL
2677 && r_type != R_390_PC32)
2678 || !SYMBOL_CALLS_LOCAL (info, h)))
2679 || (ELIMINATE_COPY_RELOCS
2680 && !bfd_link_pic (info)
2681 && h != NULL
2682 && h->dynindx != -1
2683 && !h->non_got_ref
2684 && ((h->def_dynamic
2685 && !h->def_regular)
2686 || h->root.type == bfd_link_hash_undefweak
2687 || h->root.type == bfd_link_hash_undefined)))
2688 {
2689 Elf_Internal_Rela outrel;
2690 bfd_boolean skip, relocate;
2691 asection *sreloc;
2692 bfd_byte *loc;
2693
2694 /* When generating a shared object, these relocations
2695 are copied into the output file to be resolved at run
2696 time. */
2697
2698 skip = FALSE;
2699 relocate = FALSE;
2700
2701 outrel.r_offset =
2702 _bfd_elf_section_offset (output_bfd, info, input_section,
2703 rel->r_offset);
2704 if (outrel.r_offset == (bfd_vma) -1)
2705 skip = TRUE;
2706 else if (outrel.r_offset == (bfd_vma) -2)
2707 skip = TRUE, relocate = TRUE;
2708 outrel.r_offset += (input_section->output_section->vma
2709 + input_section->output_offset);
2710
2711 if (skip)
2712 memset (&outrel, 0, sizeof outrel);
2713 else if (h != NULL
2714 && h->dynindx != -1
2715 && (r_type == R_390_PC16
2716 || r_type == R_390_PC12DBL
2717 || r_type == R_390_PC16DBL
2718 || r_type == R_390_PC24DBL
2719 || r_type == R_390_PC32DBL
2720 || r_type == R_390_PC32
2721 || !bfd_link_pic (info)
2722 || !SYMBOLIC_BIND (info, h)
2723 || !h->def_regular))
2724 {
2725 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2726 outrel.r_addend = rel->r_addend;
2727 }
2728 else
2729 {
2730 /* This symbol is local, or marked to become local. */
2731 outrel.r_addend = relocation + rel->r_addend;
2732 if (r_type == R_390_32)
2733 {
2734 relocate = TRUE;
2735 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2736 }
2737 else
2738 {
2739 long sindx;
2740
2741 if (bfd_is_abs_section (sec))
2742 sindx = 0;
2743 else if (sec == NULL || sec->owner == NULL)
2744 {
2745 bfd_set_error(bfd_error_bad_value);
2746 return FALSE;
2747 }
2748 else
2749 {
2750 asection *osec;
2751
2752 osec = sec->output_section;
2753 sindx = elf_section_data (osec)->dynindx;
2754 if (sindx == 0)
2755 {
2756 osec = htab->elf.text_index_section;
2757 sindx = elf_section_data (osec)->dynindx;
2758 }
2759 BFD_ASSERT (sindx != 0);
2760
2761 /* We are turning this relocation into one
2762 against a section symbol, so subtract out
2763 the output section's address but not the
2764 offset of the input section in the output
2765 section. */
2766 outrel.r_addend -= osec->vma;
2767 }
2768 outrel.r_info = ELF32_R_INFO (sindx, r_type);
2769 }
2770 }
2771
2772 sreloc = elf_section_data (input_section)->sreloc;
2773 if (sreloc == NULL)
2774 abort ();
2775
2776 loc = sreloc->contents;
2777 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2778 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2779
2780 /* If this reloc is against an external symbol, we do
2781 not want to fiddle with the addend. Otherwise, we
2782 need to include the symbol value so that it becomes
2783 an addend for the dynamic reloc. */
2784 if (! relocate)
2785 continue;
2786 }
2787 break;
2788
2789 /* Relocations for tls literal pool entries. */
2790 case R_390_TLS_IE32:
2791 if (bfd_link_pic (info))
2792 {
2793 Elf_Internal_Rela outrel;
2794 asection *sreloc;
2795 bfd_byte *loc;
2796
2797 outrel.r_offset = rel->r_offset
2798 + input_section->output_section->vma
2799 + input_section->output_offset;
2800 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2801 sreloc = elf_section_data (input_section)->sreloc;
2802 if (sreloc == NULL)
2803 abort ();
2804 loc = sreloc->contents;
2805 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2806 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2807 }
2808 /* Fall through. */
2809
2810 case R_390_TLS_GD32:
2811 case R_390_TLS_GOTIE32:
2812 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2813 tls_type = GOT_UNKNOWN;
2814 if (h == NULL && local_got_offsets)
2815 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2816 else if (h != NULL)
2817 {
2818 tls_type = elf_s390_hash_entry(h)->tls_type;
2819 if (!bfd_link_pic (info)
2820 && h->dynindx == -1
2821 && tls_type >= GOT_TLS_IE)
2822 r_type = R_390_TLS_LE32;
2823 }
2824 if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2825 r_type = R_390_TLS_IE32;
2826
2827 if (r_type == R_390_TLS_LE32)
2828 {
2829 /* This relocation gets optimized away by the local exec
2830 access optimization. */
2831 BFD_ASSERT (! unresolved_reloc);
2832 bfd_put_32 (output_bfd, -tpoff (info, relocation),
2833 contents + rel->r_offset);
2834 continue;
2835 }
2836
2837 if (htab->elf.sgot == NULL)
2838 abort ();
2839
2840 if (h != NULL)
2841 off = h->got.offset;
2842 else
2843 {
2844 if (local_got_offsets == NULL)
2845 abort ();
2846
2847 off = local_got_offsets[r_symndx];
2848 }
2849
2850 emit_tls_relocs:
2851
2852 if ((off & 1) != 0)
2853 off &= ~1;
2854 else
2855 {
2856 Elf_Internal_Rela outrel;
2857 bfd_byte *loc;
2858 int dr_type, indx;
2859
2860 if (htab->elf.srelgot == NULL)
2861 abort ();
2862
2863 outrel.r_offset = (htab->elf.sgot->output_section->vma
2864 + htab->elf.sgot->output_offset + off);
2865
2866 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2867 if (r_type == R_390_TLS_GD32)
2868 dr_type = R_390_TLS_DTPMOD;
2869 else
2870 dr_type = R_390_TLS_TPOFF;
2871 if (dr_type == R_390_TLS_TPOFF && indx == 0)
2872 outrel.r_addend = relocation - dtpoff_base (info);
2873 else
2874 outrel.r_addend = 0;
2875 outrel.r_info = ELF32_R_INFO (indx, dr_type);
2876 loc = htab->elf.srelgot->contents;
2877 loc += htab->elf.srelgot->reloc_count++
2878 * sizeof (Elf32_External_Rela);
2879 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2880
2881 if (r_type == R_390_TLS_GD32)
2882 {
2883 if (indx == 0)
2884 {
2885 BFD_ASSERT (! unresolved_reloc);
2886 bfd_put_32 (output_bfd,
2887 relocation - dtpoff_base (info),
2888 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2889 }
2890 else
2891 {
2892 outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
2893 outrel.r_offset += GOT_ENTRY_SIZE;
2894 outrel.r_addend = 0;
2895 htab->elf.srelgot->reloc_count++;
2896 loc += sizeof (Elf32_External_Rela);
2897 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2898 }
2899 }
2900
2901 if (h != NULL)
2902 h->got.offset |= 1;
2903 else
2904 local_got_offsets[r_symndx] |= 1;
2905 }
2906
2907 if (off >= (bfd_vma) -2)
2908 abort ();
2909 if (r_type == ELF32_R_TYPE (rel->r_info))
2910 {
2911 relocation = htab->elf.sgot->output_offset + off;
2912 if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
2913 relocation += htab->elf.sgot->output_section->vma;
2914 unresolved_reloc = FALSE;
2915 }
2916 else
2917 {
2918 bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
2919 contents + rel->r_offset);
2920 continue;
2921 }
2922 break;
2923
2924 case R_390_TLS_GOTIE12:
2925 case R_390_TLS_GOTIE20:
2926 case R_390_TLS_IEENT:
2927 if (h == NULL)
2928 {
2929 if (local_got_offsets == NULL)
2930 abort();
2931 off = local_got_offsets[r_symndx];
2932 if (bfd_link_pic (info))
2933 goto emit_tls_relocs;
2934 }
2935 else
2936 {
2937 off = h->got.offset;
2938 tls_type = elf_s390_hash_entry(h)->tls_type;
2939 if (bfd_link_pic (info)
2940 || h->dynindx != -1
2941 || tls_type < GOT_TLS_IE)
2942 goto emit_tls_relocs;
2943 }
2944
2945 if (htab->elf.sgot == NULL)
2946 abort ();
2947
2948 BFD_ASSERT (! unresolved_reloc);
2949 bfd_put_32 (output_bfd, -tpoff (info, relocation),
2950 htab->elf.sgot->contents + off);
2951 relocation = htab->elf.sgot->output_offset + off;
2952 if (r_type == R_390_TLS_IEENT)
2953 relocation += htab->elf.sgot->output_section->vma;
2954 unresolved_reloc = FALSE;
2955 break;
2956
2957 case R_390_TLS_LDM32:
2958 if (! bfd_link_pic (info))
2959 /* The literal pool entry this relocation refers to gets ignored
2960 by the optimized code of the local exec model. Do nothing
2961 and the value will turn out zero. */
2962 continue;
2963
2964 if (htab->elf.sgot == NULL)
2965 abort ();
2966
2967 off = htab->tls_ldm_got.offset;
2968 if (off & 1)
2969 off &= ~1;
2970 else
2971 {
2972 Elf_Internal_Rela outrel;
2973 bfd_byte *loc;
2974
2975 if (htab->elf.srelgot == NULL)
2976 abort ();
2977
2978 outrel.r_offset = (htab->elf.sgot->output_section->vma
2979 + htab->elf.sgot->output_offset + off);
2980
2981 bfd_put_32 (output_bfd, 0,
2982 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2983 outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
2984 outrel.r_addend = 0;
2985 loc = htab->elf.srelgot->contents;
2986 loc += htab->elf.srelgot->reloc_count++
2987 * sizeof (Elf32_External_Rela);
2988 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2989 htab->tls_ldm_got.offset |= 1;
2990 }
2991 relocation = htab->elf.sgot->output_offset + off;
2992 unresolved_reloc = FALSE;
2993 break;
2994
2995 case R_390_TLS_LE32:
2996 if (bfd_link_dll (info))
2997 {
2998 /* Linking a shared library with non-fpic code requires
2999 a R_390_TLS_TPOFF relocation. */
3000 Elf_Internal_Rela outrel;
3001 asection *sreloc;
3002 bfd_byte *loc;
3003 int indx;
3004
3005 outrel.r_offset = rel->r_offset
3006 + input_section->output_section->vma
3007 + input_section->output_offset;
3008 if (h != NULL && h->dynindx != -1)
3009 indx = h->dynindx;
3010 else
3011 indx = 0;
3012 outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
3013 if (indx == 0)
3014 outrel.r_addend = relocation - dtpoff_base (info);
3015 else
3016 outrel.r_addend = 0;
3017 sreloc = elf_section_data (input_section)->sreloc;
3018 if (sreloc == NULL)
3019 abort ();
3020 loc = sreloc->contents;
3021 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3022 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3023 }
3024 else
3025 {
3026 BFD_ASSERT (! unresolved_reloc);
3027 bfd_put_32 (output_bfd, -tpoff (info, relocation),
3028 contents + rel->r_offset);
3029 }
3030 continue;
3031
3032 case R_390_TLS_LDO32:
3033 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
3034 relocation -= dtpoff_base (info);
3035 else
3036 /* When converting LDO to LE, we must negate. */
3037 relocation = -tpoff (info, relocation);
3038 break;
3039
3040 /* Relocations for tls instructions. */
3041 case R_390_TLS_LOAD:
3042 case R_390_TLS_GDCALL:
3043 case R_390_TLS_LDCALL:
3044 tls_type = GOT_UNKNOWN;
3045 if (h == NULL && local_got_offsets)
3046 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3047 else if (h != NULL)
3048 tls_type = elf_s390_hash_entry(h)->tls_type;
3049
3050 if (tls_type == GOT_TLS_GD)
3051 continue;
3052
3053 if (r_type == R_390_TLS_LOAD)
3054 {
3055 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3056 {
3057 /* IE->LE transition. Four valid cases:
3058 l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0
3059 l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0
3060 l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
3061 l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3062 unsigned int insn, ry;
3063
3064 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3065 if ((insn & 0xff00f000) == 0x58000000)
3066 /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0 */
3067 ry = (insn & 0x000f0000);
3068 else if ((insn & 0xff0f0000) == 0x58000000)
3069 /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0 */
3070 ry = (insn & 0x0000f000) << 4;
3071 else if ((insn & 0xff00f000) == 0x5800c000)
3072 /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0 */
3073 ry = (insn & 0x000f0000);
3074 else if ((insn & 0xff0f0000) == 0x580c0000)
3075 /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3076 ry = (insn & 0x0000f000) << 4;
3077 else
3078 {
3079 invalid_tls_insn (input_bfd, input_section, rel);
3080 return FALSE;
3081 }
3082 insn = 0x18000700 | (insn & 0x00f00000) | ry;
3083 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3084 }
3085 }
3086 else if (r_type == R_390_TLS_GDCALL)
3087 {
3088 unsigned int insn;
3089
3090 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3091 if ((insn & 0xff000fff) != 0x4d000000 &&
3092 (insn & 0xffff0000) != 0xc0e50000 &&
3093 (insn & 0xff000000) != 0x0d000000)
3094 {
3095 invalid_tls_insn (input_bfd, input_section, rel);
3096 return FALSE;
3097 }
3098 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3099 {
3100 if ((insn & 0xff000000) == 0x0d000000)
3101 {
3102 /* GD->LE transition.
3103 basr rx, ry -> nopr r7 */
3104 insn = 0x07070000 | (insn & 0xffff);
3105 }
3106 else if ((insn & 0xff000000) == 0x4d000000)
3107 {
3108 /* GD->LE transition.
3109 bas %r14,0(%rx,%r13) -> bc 0,0 */
3110 insn = 0x47000000;
3111 }
3112 else
3113 {
3114 /* GD->LE transition.
3115 brasl %r14,_tls_get_offset@plt -> brcl 0,. */
3116 insn = 0xc0040000;
3117 bfd_put_16 (output_bfd, 0x0000,
3118 contents + rel->r_offset + 4);
3119 }
3120 }
3121 else
3122 {
3123 /* If basr is used in the pic case to invoke
3124 _tls_get_offset, something went wrong before. */
3125 if ((insn & 0xff000000) == 0x0d000000)
3126 {
3127 invalid_tls_insn (input_bfd, input_section, rel);
3128 return FALSE;
3129 }
3130
3131 if ((insn & 0xff000000) == 0x4d000000)
3132 {
3133 /* GD->IE transition.
3134 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12) */
3135 insn = 0x5822c000;
3136 }
3137 else
3138 {
3139 /* GD->IE transition.
3140 brasl %r14,__tls_get_addr@plt ->
3141 l %r2,0(%r2,%r12) ; bcr 0,0 */
3142 insn = 0x5822c000;
3143 bfd_put_16 (output_bfd, 0x0700,
3144 contents + rel->r_offset + 4);
3145 }
3146 }
3147 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3148 }
3149 else if (r_type == R_390_TLS_LDCALL)
3150 {
3151 if (!bfd_link_pic (info))
3152 {
3153 unsigned int insn;
3154
3155 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3156 if ((insn & 0xff000fff) != 0x4d000000 &&
3157 (insn & 0xffff0000) != 0xc0e50000 &&
3158 (insn & 0xff000000) != 0x0d000000)
3159 {
3160 invalid_tls_insn (input_bfd, input_section, rel);
3161 return FALSE;
3162 }
3163
3164 if ((insn & 0xff000000) == 0x0d000000)
3165 {
3166 /* LD->LE transition.
3167 basr rx, ry -> nopr r7 */
3168 insn = 0x07070000 | (insn & 0xffff);
3169 }
3170 else if ((insn & 0xff000000) == 0x4d000000)
3171 {
3172 /* LD->LE transition.
3173 bas %r14,0(%rx,%r13) -> bc 0,0 */
3174 insn = 0x47000000;
3175 }
3176 else
3177 {
3178 /* LD->LE transition.
3179 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
3180 insn = 0xc0040000;
3181 bfd_put_16 (output_bfd, 0x0000,
3182 contents + rel->r_offset + 4);
3183 }
3184 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3185 }
3186 }
3187 continue;
3188
3189 default:
3190 break;
3191 }
3192
3193 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3194 because such sections are not SEC_ALLOC and thus ld.so will
3195 not process them. */
3196 if (unresolved_reloc
3197 && !((input_section->flags & SEC_DEBUGGING) != 0
3198 && h->def_dynamic)
3199 && _bfd_elf_section_offset (output_bfd, info, input_section,
3200 rel->r_offset) != (bfd_vma) -1)
3201 _bfd_error_handler
3202 /* xgettext:c-format */
3203 (_("%pB(%pA+%#" PRIx64 "): "
3204 "unresolvable %s relocation against symbol `%s'"),
3205 input_bfd,
3206 input_section,
3207 (uint64_t) rel->r_offset,
3208 howto->name,
3209 h->root.root.string);
3210
3211 do_relocation:
3212
3213 /* When applying a 24 bit reloc we need to start one byte
3214 earlier. Otherwise the 32 bit get/put bfd operations might
3215 access a byte after the actual section. */
3216 if (r_type == R_390_PC24DBL
3217 || r_type == R_390_PLT24DBL)
3218 rel->r_offset--;
3219
3220 if (r_type == R_390_20
3221 || r_type == R_390_GOT20
3222 || r_type == R_390_GOTPLT20
3223 || r_type == R_390_TLS_GOTIE20)
3224 {
3225 relocation += rel->r_addend;
3226 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3227 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3228 contents, rel->r_offset,
3229 relocation, 0);
3230 }
3231 else
3232 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3233 contents, rel->r_offset,
3234 relocation, rel->r_addend);
3235
3236 if (r != bfd_reloc_ok)
3237 {
3238 const char *name;
3239
3240 if (h != NULL)
3241 name = h->root.root.string;
3242 else
3243 {
3244 name = bfd_elf_string_from_elf_section (input_bfd,
3245 symtab_hdr->sh_link,
3246 sym->st_name);
3247 if (name == NULL)
3248 return FALSE;
3249 if (*name == '\0')
3250 name = bfd_section_name (sec);
3251 }
3252
3253 if (r == bfd_reloc_overflow)
3254 (*info->callbacks->reloc_overflow)
3255 (info, (h ? &h->root : NULL), name, howto->name,
3256 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3257 else
3258 {
3259 _bfd_error_handler
3260 /* xgettext:c-format */
3261 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3262 input_bfd, input_section,
3263 (uint64_t) rel->r_offset, name, (int) r);
3264 return FALSE;
3265 }
3266 }
3267 }
3268
3269 return TRUE;
3270 }
3271
3272 /* Generate the PLT slots together with the dynamic relocations needed
3273 for IFUNC symbols. */
3274
3275 static void
3276 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3277 struct bfd_link_info *info,
3278 struct elf_link_hash_entry *h,
3279 struct elf_s390_link_hash_table *htab,
3280 bfd_vma iplt_offset,
3281 bfd_vma resolver_address)
3282 {
3283 bfd_vma iplt_index;
3284 bfd_vma got_offset;
3285 bfd_vma igotiplt_offset;
3286 Elf_Internal_Rela rela;
3287 bfd_byte *loc;
3288 asection *plt, *gotplt, *relplt;
3289 bfd_vma relative_offset;
3290
3291 if (htab->elf.iplt == NULL
3292 || htab->elf.igotplt == NULL
3293 || htab->elf.irelplt == NULL)
3294 abort ();
3295
3296 gotplt = htab->elf.igotplt;
3297 relplt = htab->elf.irelplt;
3298
3299 /* Index of the PLT slot within iplt section. */
3300 iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3301 plt = htab->elf.iplt;
3302 /* Offset into the igot.plt section. */
3303 igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3304 /* Offset into the got section. */
3305 got_offset = igotiplt_offset + gotplt->output_offset;
3306
3307 /* S390 uses halfwords for relative branch calc! */
3308 relative_offset = - (plt->output_offset +
3309 (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
3310 /* If offset is > 32768, branch to a previous branch
3311 390 can only handle +-64 K jumps. */
3312 if ( -32768 > (int) relative_offset )
3313 relative_offset
3314 = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3315
3316 /* Fill in the entry in the procedure linkage table. */
3317 if (!bfd_link_pic (info))
3318 {
3319 memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3320 PLT_ENTRY_SIZE);
3321
3322 /* Adjust jump to the first plt entry. */
3323 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3324 plt->contents + iplt_offset + 20);
3325
3326 /* Push the GOT offset field. */
3327 bfd_put_32 (output_bfd,
3328 (gotplt->output_section->vma
3329 + got_offset),
3330 plt->contents + iplt_offset + 24);
3331 }
3332 else if (got_offset < 4096)
3333 {
3334 /* The GOT offset is small enough to be used directly as
3335 displacement. */
3336 memcpy (plt->contents + iplt_offset,
3337 elf_s390_plt_pic12_entry,
3338 PLT_ENTRY_SIZE);
3339
3340 /* Put in the GOT offset as displacement value. The 0xc000
3341 value comes from the first word of the plt entry. Look
3342 at the elf_s390_plt_pic16_entry content. */
3343 bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3344 plt->contents + iplt_offset + 2);
3345
3346 /* Adjust the jump to the first plt entry. */
3347 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3348 plt->contents + iplt_offset + 20);
3349 }
3350 else if (got_offset < 32768)
3351 {
3352 /* The GOT offset is too big for a displacement but small
3353 enough to be a signed 16 bit immediate value as it can be
3354 used in an lhi instruction. */
3355 memcpy (plt->contents + iplt_offset,
3356 elf_s390_plt_pic16_entry,
3357 PLT_ENTRY_SIZE);
3358
3359 /* Put in the GOT offset for the lhi instruction. */
3360 bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3361 plt->contents + iplt_offset + 2);
3362
3363 /* Adjust the jump to the first plt entry. */
3364 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3365 plt->contents + iplt_offset + 20);
3366 }
3367 else
3368 {
3369 memcpy (plt->contents + iplt_offset,
3370 elf_s390_plt_pic_entry,
3371 PLT_ENTRY_SIZE);
3372
3373 /* Adjust the jump to the first plt entry. */
3374 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3375 plt->contents + iplt_offset + 20);
3376
3377 /* Push the GOT offset field. */
3378 bfd_put_32 (output_bfd, got_offset,
3379 plt->contents + iplt_offset + 24);
3380 }
3381 /* Insert offset into reloc. table here. */
3382 bfd_put_32 (output_bfd, relplt->output_offset +
3383 iplt_index * RELA_ENTRY_SIZE,
3384 plt->contents + iplt_offset + 28);
3385
3386 /* Fill in the entry in the global offset table.
3387 Points to instruction after GOT offset. */
3388 bfd_put_32 (output_bfd,
3389 (plt->output_section->vma
3390 + plt->output_offset
3391 + iplt_offset
3392 + 12),
3393 gotplt->contents + igotiplt_offset);
3394
3395 /* Fill in the entry in the .rela.plt section. */
3396 rela.r_offset = gotplt->output_section->vma + got_offset;
3397
3398 if (!h
3399 || h->dynindx == -1
3400 || ((bfd_link_executable (info)
3401 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3402 && h->def_regular))
3403 {
3404 /* The symbol can be locally resolved. */
3405 rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3406 rela.r_addend = resolver_address;
3407 }
3408 else
3409 {
3410 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3411 rela.r_addend = 0;
3412 }
3413
3414 loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3415 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3416 }
3417
3418 /* Finish up dynamic symbol handling. We set the contents of various
3419 dynamic sections here. */
3420
3421 static bfd_boolean
3422 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3423 struct bfd_link_info *info,
3424 struct elf_link_hash_entry *h,
3425 Elf_Internal_Sym *sym)
3426 {
3427 struct elf_s390_link_hash_table *htab;
3428 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3429
3430 htab = elf_s390_hash_table (info);
3431
3432 if (h->plt.offset != (bfd_vma) -1)
3433 {
3434 bfd_vma plt_index;
3435 bfd_vma got_offset;
3436 Elf_Internal_Rela rela;
3437 bfd_byte *loc;
3438 bfd_vma relative_offset;
3439
3440 /* This symbol has an entry in the procedure linkage table. Set
3441 it up. */
3442 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3443 {
3444 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3445 htab, h->plt.offset,
3446 eh->ifunc_resolver_address +
3447 eh->ifunc_resolver_section->output_offset +
3448 eh->ifunc_resolver_section->output_section->vma);
3449 /* Do not return yet. Handling of explicit GOT slots of
3450 IFUNC symbols is below. */
3451 }
3452 else
3453 {
3454 if (h->dynindx == -1
3455 || htab->elf.splt == NULL
3456 || htab->elf.sgotplt == NULL
3457 || htab->elf.srelplt == NULL)
3458 abort ();
3459
3460 /* Calc. index no.
3461 Current offset - size first entry / entry size. */
3462 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3463
3464 /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3465 addr & GOT addr. */
3466 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3467
3468 /* S390 uses halfwords for relative branch calc! */
3469 relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3470 (PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3471 /* If offset is > 32768, branch to a previous branch
3472 390 can only handle +-64 K jumps. */
3473 if ( -32768 > (int) relative_offset )
3474 relative_offset
3475 = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3476
3477 /* Fill in the entry in the procedure linkage table. */
3478 if (!bfd_link_pic (info))
3479 {
3480 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3481 PLT_ENTRY_SIZE);
3482
3483 /* Adjust jump to the first plt entry. */
3484 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3485 htab->elf.splt->contents + h->plt.offset + 20);
3486
3487 /* Push the GOT offset field. */
3488 bfd_put_32 (output_bfd,
3489 (htab->elf.sgotplt->output_section->vma
3490 + htab->elf.sgotplt->output_offset
3491 + got_offset),
3492 htab->elf.splt->contents + h->plt.offset + 24);
3493 }
3494 else if (got_offset < 4096)
3495 {
3496 /* The GOT offset is small enough to be used directly as
3497 displacement. */
3498 memcpy (htab->elf.splt->contents + h->plt.offset,
3499 elf_s390_plt_pic12_entry,
3500 PLT_ENTRY_SIZE);
3501
3502 /* Put in the GOT offset as displacement value. The 0xc000
3503 value comes from the first word of the plt entry. Look
3504 at the elf_s390_plt_pic12_entry content. */
3505 bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3506 htab->elf.splt->contents + h->plt.offset + 2);
3507
3508 /* Adjust the jump to the first plt entry. */
3509 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3510 htab->elf.splt->contents + h->plt.offset + 20);
3511 }
3512 else if (got_offset < 32768)
3513 {
3514 /* The GOT offset is too big for a displacement but small
3515 enough to be a signed 16 bit immediate value as it can be
3516 used in an lhi instruction. */
3517 memcpy (htab->elf.splt->contents + h->plt.offset,
3518 elf_s390_plt_pic16_entry,
3519 PLT_ENTRY_SIZE);
3520
3521 /* Put in the GOT offset for the lhi instruction. */
3522 bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3523 htab->elf.splt->contents + h->plt.offset + 2);
3524
3525 /* Adjust the jump to the first plt entry. */
3526 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3527 htab->elf.splt->contents + h->plt.offset + 20);
3528 }
3529 else
3530 {
3531 memcpy (htab->elf.splt->contents + h->plt.offset,
3532 elf_s390_plt_pic_entry,
3533 PLT_ENTRY_SIZE);
3534
3535 /* Adjust the jump to the first plt entry. */
3536 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3537 htab->elf.splt->contents + h->plt.offset + 20);
3538
3539 /* Push the GOT offset field. */
3540 bfd_put_32 (output_bfd, got_offset,
3541 htab->elf.splt->contents + h->plt.offset + 24);
3542 }
3543 /* Insert offset into reloc. table here. */
3544 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3545 htab->elf.splt->contents + h->plt.offset + 28);
3546
3547 /* Fill in the entry in the global offset table.
3548 Points to instruction after GOT offset. */
3549 bfd_put_32 (output_bfd,
3550 (htab->elf.splt->output_section->vma
3551 + htab->elf.splt->output_offset
3552 + h->plt.offset
3553 + 12),
3554 htab->elf.sgotplt->contents + got_offset);
3555
3556 /* Fill in the entry in the .rela.plt section. */
3557 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3558 + htab->elf.sgotplt->output_offset
3559 + got_offset);
3560 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3561 rela.r_addend = 0;
3562 loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3563 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3564
3565 if (!h->def_regular)
3566 {
3567 /* Mark the symbol as undefined, rather than as defined in
3568 the .plt section. Leave the value alone. This is a clue
3569 for the dynamic linker, to make function pointer
3570 comparisons work between an application and shared
3571 library. */
3572 sym->st_shndx = SHN_UNDEF;
3573 }
3574 }
3575 }
3576
3577 if (h->got.offset != (bfd_vma) -1
3578 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3579 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3580 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3581 {
3582 Elf_Internal_Rela rela;
3583 bfd_byte *loc;
3584
3585 /* This symbol has an entry in the global offset table. Set it
3586 up. */
3587
3588 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3589 abort ();
3590
3591 rela.r_offset = (htab->elf.sgot->output_section->vma
3592 + htab->elf.sgot->output_offset
3593 + (h->got.offset &~ (bfd_vma) 1));
3594
3595 /* If this is a static link, or it is a -Bsymbolic link and the
3596 symbol is defined locally or was forced to be local because
3597 of a version file, we just want to emit a RELATIVE reloc.
3598 The entry in the global offset table will already have been
3599 initialized in the relocate_section function. */
3600 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3601 {
3602 if (bfd_link_pic (info))
3603 {
3604 /* An explicit GOT slot usage needs GLOB_DAT. If the
3605 symbol references local the implicit got.iplt slot
3606 will be used and the IRELATIVE reloc has been created
3607 above. */
3608 goto do_glob_dat;
3609 }
3610 else
3611 {
3612 /* For non-shared objects explicit GOT slots must be
3613 filled with the PLT slot address for pointer
3614 equality reasons. */
3615 bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3616 + htab->elf.iplt->output_offset
3617 + h->plt.offset),
3618 htab->elf.sgot->contents + h->got.offset);
3619 return TRUE;
3620 }
3621 }
3622 else if (bfd_link_pic (info)
3623 && SYMBOL_REFERENCES_LOCAL (info, h))
3624 {
3625 /* If this is a static link, or it is a -Bsymbolic link and
3626 the symbol is defined locally or was forced to be local
3627 because of a version file, we just want to emit a
3628 RELATIVE reloc. The entry in the global offset table
3629 will already have been initialized in the
3630 relocate_section function. */
3631 if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
3632 return FALSE;
3633 BFD_ASSERT((h->got.offset & 1) != 0);
3634 rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3635 rela.r_addend = (h->root.u.def.value
3636 + h->root.u.def.section->output_section->vma
3637 + h->root.u.def.section->output_offset);
3638 }
3639 else
3640 {
3641 BFD_ASSERT((h->got.offset & 1) == 0);
3642 do_glob_dat:
3643 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3644 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
3645 rela.r_addend = 0;
3646 }
3647
3648 loc = htab->elf.srelgot->contents;
3649 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3650 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3651 }
3652
3653 if (h->needs_copy)
3654 {
3655 Elf_Internal_Rela rela;
3656 asection *s;
3657 bfd_byte *loc;
3658
3659 /* This symbols needs a copy reloc. Set it up. */
3660
3661 if (h->dynindx == -1
3662 || (h->root.type != bfd_link_hash_defined
3663 && h->root.type != bfd_link_hash_defweak)
3664 || htab->elf.srelbss == NULL
3665 || htab->elf.sreldynrelro == NULL)
3666 abort ();
3667
3668 rela.r_offset = (h->root.u.def.value
3669 + h->root.u.def.section->output_section->vma
3670 + h->root.u.def.section->output_offset);
3671 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3672 rela.r_addend = 0;
3673 if (h->root.u.def.section == htab->elf.sdynrelro)
3674 s = htab->elf.sreldynrelro;
3675 else
3676 s = htab->elf.srelbss;
3677 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3678 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3679 }
3680
3681 /* Mark some specially defined symbols as absolute. */
3682 if (h == htab->elf.hdynamic
3683 || h == htab->elf.hgot
3684 || h == htab->elf.hplt)
3685 sym->st_shndx = SHN_ABS;
3686
3687 return TRUE;
3688 }
3689
3690 /* Used to decide how to sort relocs in an optimal manner for the
3691 dynamic linker, before writing them out. */
3692
3693 static enum elf_reloc_type_class
3694 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3695 const asection *rel_sec ATTRIBUTE_UNUSED,
3696 const Elf_Internal_Rela *rela)
3697 {
3698 bfd *abfd = info->output_bfd;
3699 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3700 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3701 unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3702 Elf_Internal_Sym sym;
3703
3704 if (htab->elf.dynsym == NULL
3705 || !bed->s->swap_symbol_in (abfd,
3706 (htab->elf.dynsym->contents
3707 + r_symndx * bed->s->sizeof_sym),
3708 0, &sym))
3709 abort ();
3710
3711 /* Check relocation against STT_GNU_IFUNC symbol. */
3712 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3713 return reloc_class_ifunc;
3714
3715 switch ((int) ELF32_R_TYPE (rela->r_info))
3716 {
3717 case R_390_RELATIVE:
3718 return reloc_class_relative;
3719 case R_390_JMP_SLOT:
3720 return reloc_class_plt;
3721 case R_390_COPY:
3722 return reloc_class_copy;
3723 default:
3724 return reloc_class_normal;
3725 }
3726 }
3727
3728 /* Finish up the dynamic sections. */
3729
3730 static bfd_boolean
3731 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3732 struct bfd_link_info *info)
3733 {
3734 struct elf_s390_link_hash_table *htab;
3735 bfd *dynobj;
3736 asection *sdyn;
3737 bfd *ibfd;
3738 unsigned int i;
3739
3740 htab = elf_s390_hash_table (info);
3741 dynobj = htab->elf.dynobj;
3742 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3743
3744 if (htab->elf.dynamic_sections_created)
3745 {
3746 Elf32_External_Dyn *dyncon, *dynconend;
3747
3748 if (sdyn == NULL || htab->elf.sgot == NULL)
3749 abort ();
3750
3751 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3752 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3753 for (; dyncon < dynconend; dyncon++)
3754 {
3755 Elf_Internal_Dyn dyn;
3756 asection *s;
3757
3758 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3759
3760 switch (dyn.d_tag)
3761 {
3762 default:
3763 continue;
3764
3765 case DT_PLTGOT:
3766 s = htab->elf.sgotplt;
3767 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3768 break;
3769
3770 case DT_JMPREL:
3771 s = htab->elf.srelplt;
3772 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3773 break;
3774
3775 case DT_PLTRELSZ:
3776 dyn.d_un.d_val = htab->elf.srelplt->size;
3777 if (htab->elf.irelplt)
3778 dyn.d_un.d_val += htab->elf.irelplt->size;
3779 break;
3780 }
3781
3782 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3783 }
3784
3785 /* Fill in the special first entry in the procedure linkage table. */
3786 if (htab->elf.splt && htab->elf.splt->size > 0)
3787 {
3788 memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
3789 if (bfd_link_pic (info))
3790 {
3791 memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
3792 PLT_FIRST_ENTRY_SIZE);
3793 }
3794 else
3795 {
3796 memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
3797 PLT_FIRST_ENTRY_SIZE);
3798 bfd_put_32 (output_bfd,
3799 htab->elf.sgotplt->output_section->vma
3800 + htab->elf.sgotplt->output_offset,
3801 htab->elf.splt->contents + 24);
3802 }
3803 elf_section_data (htab->elf.splt->output_section)
3804 ->this_hdr.sh_entsize = 4;
3805 }
3806
3807 }
3808
3809 if (htab->elf.sgotplt)
3810 {
3811 /* Fill in the first three entries in the global offset table. */
3812 if (htab->elf.sgotplt->size > 0)
3813 {
3814 bfd_put_32 (output_bfd,
3815 (sdyn == NULL ? (bfd_vma) 0
3816 : sdyn->output_section->vma + sdyn->output_offset),
3817 htab->elf.sgotplt->contents);
3818 /* One entry for shared object struct ptr. */
3819 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
3820 /* One entry for _dl_runtime_resolve. */
3821 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3822 }
3823
3824 elf_section_data (htab->elf.sgotplt->output_section)
3825 ->this_hdr.sh_entsize = 4;
3826 }
3827 /* Finish dynamic symbol for local IFUNC symbols. */
3828 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3829 {
3830 struct plt_entry *local_plt;
3831 Elf_Internal_Sym *isym;
3832 Elf_Internal_Shdr *symtab_hdr;
3833
3834 symtab_hdr = &elf_symtab_hdr (ibfd);
3835
3836 if (!is_s390_elf (ibfd))
3837 continue;
3838
3839 local_plt = elf_s390_local_plt (ibfd);
3840 if (local_plt != NULL)
3841 for (i = 0; i < symtab_hdr->sh_info; i++)
3842 {
3843 if (local_plt[i].plt.offset != (bfd_vma) -1)
3844 {
3845 asection *sec = local_plt[i].sec;
3846 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3847 if (isym == NULL)
3848 return FALSE;
3849
3850 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3851 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3852 local_plt[i].plt.offset,
3853 isym->st_value
3854 + sec->output_section->vma
3855 + sec->output_offset);
3856
3857 }
3858 }
3859 }
3860 return TRUE;
3861 }
3862 \f
3863 /* Support for core dump NOTE sections. */
3864
3865 static bfd_boolean
3866 elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
3867 {
3868 int offset;
3869 unsigned int size;
3870
3871 switch (note->descsz)
3872 {
3873 default:
3874 return FALSE;
3875
3876 case 224: /* S/390 Linux. */
3877 /* pr_cursig */
3878 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3879
3880 /* pr_pid */
3881 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3882
3883 /* pr_reg */
3884 offset = 72;
3885 size = 144;
3886 break;
3887 }
3888
3889 /* Make a ".reg/999" section. */
3890 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3891 size, note->descpos + offset);
3892 }
3893
3894 static bfd_boolean
3895 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3896 {
3897 switch (note->descsz)
3898 {
3899 default:
3900 return FALSE;
3901
3902 case 124: /* sizeof(struct elf_prpsinfo) on s390 */
3903 elf_tdata (abfd)->core->pid
3904 = bfd_get_32 (abfd, note->descdata + 12);
3905 elf_tdata (abfd)->core->program
3906 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
3907 elf_tdata (abfd)->core->command
3908 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
3909 break;
3910 }
3911
3912 /* Note that for some reason, a spurious space is tacked
3913 onto the end of the args in some (at least one anyway)
3914 implementations, so strip it off if it exists. */
3915
3916 {
3917 char *command = elf_tdata (abfd)->core->command;
3918 int n = strlen (command);
3919
3920 if (0 < n && command[n - 1] == ' ')
3921 command[n - 1] = '\0';
3922 }
3923
3924 return TRUE;
3925 }
3926
3927 static char *
3928 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3929 int note_type, ...)
3930 {
3931 va_list ap;
3932
3933 switch (note_type)
3934 {
3935 default:
3936 return NULL;
3937
3938 case NT_PRPSINFO:
3939 {
3940 char data[124] ATTRIBUTE_NONSTRING = { 0 };
3941 const char *fname, *psargs;
3942
3943 va_start (ap, note_type);
3944 fname = va_arg (ap, const char *);
3945 psargs = va_arg (ap, const char *);
3946 va_end (ap);
3947
3948 strncpy (data + 28, fname, 16);
3949 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3950 DIAGNOSTIC_PUSH;
3951 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
3952 -Wstringop-truncation:
3953 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3954 */
3955 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3956 #endif
3957 strncpy (data + 44, psargs, 80);
3958 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3959 DIAGNOSTIC_POP;
3960 #endif
3961 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3962 &data, sizeof (data));
3963 }
3964
3965 case NT_PRSTATUS:
3966 {
3967 char data[224] = { 0 };
3968 long pid;
3969 int cursig;
3970 const void *gregs;
3971
3972 va_start (ap, note_type);
3973 pid = va_arg (ap, long);
3974 cursig = va_arg (ap, int);
3975 gregs = va_arg (ap, const void *);
3976 va_end (ap);
3977
3978 bfd_put_16 (abfd, cursig, data + 12);
3979 bfd_put_32 (abfd, pid, data + 24);
3980 memcpy (data + 72, gregs, 144);
3981 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3982 &data, sizeof (data));
3983 }
3984 }
3985 /* NOTREACHED */
3986 }
3987 \f
3988 /* Return address for Ith PLT stub in section PLT, for relocation REL
3989 or (bfd_vma) -1 if it should not be included. */
3990
3991 static bfd_vma
3992 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3993 const arelent *rel ATTRIBUTE_UNUSED)
3994 {
3995 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3996 }
3997
3998 /* Merge backend specific data from an object file to the output
3999 object file when linking. */
4000
4001 static bfd_boolean
4002 elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
4003 {
4004 bfd *obfd = info->output_bfd;
4005
4006 if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
4007 return TRUE;
4008
4009 if (!elf_s390_merge_obj_attributes (ibfd, info))
4010 return FALSE;
4011
4012 elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
4013 return TRUE;
4014 }
4015
4016
4017 #define TARGET_BIG_SYM s390_elf32_vec
4018 #define TARGET_BIG_NAME "elf32-s390"
4019 #define ELF_ARCH bfd_arch_s390
4020 #define ELF_TARGET_ID S390_ELF_DATA
4021 #define ELF_MACHINE_CODE EM_S390
4022 #define ELF_MACHINE_ALT1 EM_S390_OLD
4023 #define ELF_MAXPAGESIZE 0x1000
4024
4025 #define elf_backend_can_gc_sections 1
4026 #define elf_backend_can_refcount 1
4027 #define elf_backend_want_got_plt 1
4028 #define elf_backend_plt_readonly 1
4029 #define elf_backend_want_plt_sym 0
4030 #define elf_backend_got_header_size 12
4031 #define elf_backend_want_dynrelro 1
4032 #define elf_backend_rela_normal 1
4033
4034 #define elf_info_to_howto elf_s390_info_to_howto
4035
4036 #define bfd_elf32_bfd_is_local_label_name elf_s390_is_local_label_name
4037 #define bfd_elf32_bfd_link_hash_table_create elf_s390_link_hash_table_create
4038 #define bfd_elf32_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
4039 #define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4040
4041 #define bfd_elf32_bfd_merge_private_bfd_data elf32_s390_merge_private_bfd_data
4042
4043 #define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
4044 #define elf_backend_check_relocs elf_s390_check_relocs
4045 #define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
4046 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
4047 #define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4048 #define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
4049 #define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
4050 #define elf_backend_reloc_type_class elf_s390_reloc_type_class
4051 #define elf_backend_relocate_section elf_s390_relocate_section
4052 #define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
4053 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4054 #define elf_backend_grok_prstatus elf_s390_grok_prstatus
4055 #define elf_backend_grok_psinfo elf_s390_grok_psinfo
4056 #define elf_backend_write_core_note elf_s390_write_core_note
4057 #define elf_backend_plt_sym_val elf_s390_plt_sym_val
4058 #define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
4059
4060 #define bfd_elf32_mkobject elf_s390_mkobject
4061 #define elf_backend_object_p elf_s390_object_p
4062
4063 #define elf_backend_linux_prpsinfo32_ugid16 TRUE
4064
4065 #include "elf32-target.h"
This page took 0.161131 seconds and 4 git commands to generate.