ELF: Consolidate readonly_dynrelocs
[deliverable/binutils-gdb.git] / bfd / elf64-s390.c
1 /* IBM S/390-specific support for 64-bit ELF
2 Copyright (C) 2000-2020 Free Software Foundation, Inc.
3 Contributed Martin Schwidefsky (schwidefsky@de.ibm.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include "elf-s390.h"
29 #include <stdarg.h>
30
31 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
32 from smaller values. Start with zero, widen, *then* decrement. */
33 #define MINUS_ONE (((bfd_vma)0) - 1)
34
35 static bfd_reloc_status_type
36 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
37 asection *, bfd *, char **);
38 static bfd_reloc_status_type
39 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
40 asection *, bfd *, char **);
41
42 /* The relocation "howto" table. */
43 static reloc_howto_type elf_howto_table[] =
44 {
45 HOWTO (R_390_NONE, /* type */
46 0, /* rightshift */
47 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
48 0, /* bitsize */
49 FALSE, /* pc_relative */
50 0, /* bitpos */
51 complain_overflow_dont, /* complain_on_overflow */
52 bfd_elf_generic_reloc, /* special_function */
53 "R_390_NONE", /* name */
54 FALSE, /* partial_inplace */
55 0, /* src_mask */
56 0, /* dst_mask */
57 FALSE), /* pcrel_offset */
58
59 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
60 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
61 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
62 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
63 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
64 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
65 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
66 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
67 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
68 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
69 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
70 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
71 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
72 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
73 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
74 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
75 HOWTO(R_390_COPY, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
76 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,MINUS_ONE, FALSE),
77 HOWTO(R_390_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
78 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,MINUS_ONE, FALSE),
79 HOWTO(R_390_JMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
80 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,MINUS_ONE, FALSE),
81 HOWTO(R_390_RELATIVE, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
82 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,MINUS_ONE, FALSE),
83 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
84 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,MINUS_ONE, FALSE),
85 HOWTO(R_390_GOTPC, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
86 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,MINUS_ONE, TRUE),
87 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
88 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
89 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
90 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
91 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
92 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
93 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
94 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
95 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
96 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
97 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
98 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
99 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
100 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,MINUS_ONE, TRUE),
101 HOWTO(R_390_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
102 bfd_elf_generic_reloc, "R_390_64", FALSE, 0,MINUS_ONE, FALSE),
103 HOWTO(R_390_PC64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
104 bfd_elf_generic_reloc, "R_390_PC64", FALSE, 0,MINUS_ONE, TRUE),
105 HOWTO(R_390_GOT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
106 bfd_elf_generic_reloc, "R_390_GOT64", FALSE, 0,MINUS_ONE, FALSE),
107 HOWTO(R_390_PLT64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
108 bfd_elf_generic_reloc, "R_390_PLT64", FALSE, 0,MINUS_ONE, TRUE),
109 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
110 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,MINUS_ONE, TRUE),
111 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
112 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
113 HOWTO(R_390_GOTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
114 bfd_elf_generic_reloc, "R_390_GOTOFF64", FALSE, 0,MINUS_ONE, FALSE),
115 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
116 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
117 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
118 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
119 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
120 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
121 HOWTO(R_390_GOTPLT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
122 bfd_elf_generic_reloc, "R_390_GOTPLT64", FALSE, 0,MINUS_ONE, FALSE),
123 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
124 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,MINUS_ONE, TRUE),
125 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
126 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
127 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
128 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
129 HOWTO(R_390_PLTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
130 bfd_elf_generic_reloc, "R_390_PLTOFF64", FALSE, 0,MINUS_ONE, FALSE),
131 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
132 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
133 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
134 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
135 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
136 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
137 EMPTY_HOWTO (R_390_TLS_GD32), /* Empty entry for R_390_TLS_GD32. */
138 HOWTO(R_390_TLS_GD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
139 bfd_elf_generic_reloc, "R_390_TLS_GD64", FALSE, 0, MINUS_ONE, FALSE),
140 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
141 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
142 EMPTY_HOWTO (R_390_TLS_GOTIE32), /* Empty entry for R_390_TLS_GOTIE32. */
143 HOWTO(R_390_TLS_GOTIE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
144 bfd_elf_generic_reloc, "R_390_TLS_GOTIE64", FALSE, 0, MINUS_ONE, FALSE),
145 EMPTY_HOWTO (R_390_TLS_LDM32), /* Empty entry for R_390_TLS_LDM32. */
146 HOWTO(R_390_TLS_LDM64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
147 bfd_elf_generic_reloc, "R_390_TLS_LDM64", FALSE, 0, MINUS_ONE, FALSE),
148 EMPTY_HOWTO (R_390_TLS_IE32), /* Empty entry for R_390_TLS_IE32. */
149 HOWTO(R_390_TLS_IE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
150 bfd_elf_generic_reloc, "R_390_TLS_IE64", FALSE, 0, MINUS_ONE, FALSE),
151 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
152 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, MINUS_ONE, TRUE),
153 EMPTY_HOWTO (R_390_TLS_LE32), /* Empty entry for R_390_TLS_LE32. */
154 HOWTO(R_390_TLS_LE64, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
155 bfd_elf_generic_reloc, "R_390_TLS_LE64", FALSE, 0, MINUS_ONE, FALSE),
156 EMPTY_HOWTO (R_390_TLS_LDO32), /* Empty entry for R_390_TLS_LDO32. */
157 HOWTO(R_390_TLS_LDO64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
158 bfd_elf_generic_reloc, "R_390_TLS_LDO64", FALSE, 0, MINUS_ONE, FALSE),
159 HOWTO(R_390_TLS_DTPMOD, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
160 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, MINUS_ONE, FALSE),
161 HOWTO(R_390_TLS_DTPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
162 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, MINUS_ONE, FALSE),
163 HOWTO(R_390_TLS_TPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
164 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, MINUS_ONE, FALSE),
165 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
166 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
167 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
168 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
169 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
170 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
171 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
172 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
173 HOWTO(R_390_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
174 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, MINUS_ONE, FALSE),
175 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
176 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
177 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
178 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
179 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
180 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
181 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
182 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
183 };
184
185 /* GNU extension to record C++ vtable hierarchy. */
186 static reloc_howto_type elf64_s390_vtinherit_howto =
187 HOWTO (R_390_GNU_VTINHERIT, 0,4,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
188 static reloc_howto_type elf64_s390_vtentry_howto =
189 HOWTO (R_390_GNU_VTENTRY, 0,4,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
190
191 static reloc_howto_type *
192 elf_s390_reloc_type_lookup (bfd *abfd,
193 bfd_reloc_code_real_type code)
194 {
195 switch (code)
196 {
197 case BFD_RELOC_NONE:
198 return &elf_howto_table[(int) R_390_NONE];
199 case BFD_RELOC_8:
200 return &elf_howto_table[(int) R_390_8];
201 case BFD_RELOC_390_12:
202 return &elf_howto_table[(int) R_390_12];
203 case BFD_RELOC_16:
204 return &elf_howto_table[(int) R_390_16];
205 case BFD_RELOC_32:
206 return &elf_howto_table[(int) R_390_32];
207 case BFD_RELOC_CTOR:
208 return &elf_howto_table[(int) R_390_32];
209 case BFD_RELOC_32_PCREL:
210 return &elf_howto_table[(int) R_390_PC32];
211 case BFD_RELOC_390_GOT12:
212 return &elf_howto_table[(int) R_390_GOT12];
213 case BFD_RELOC_32_GOT_PCREL:
214 return &elf_howto_table[(int) R_390_GOT32];
215 case BFD_RELOC_390_PLT32:
216 return &elf_howto_table[(int) R_390_PLT32];
217 case BFD_RELOC_390_COPY:
218 return &elf_howto_table[(int) R_390_COPY];
219 case BFD_RELOC_390_GLOB_DAT:
220 return &elf_howto_table[(int) R_390_GLOB_DAT];
221 case BFD_RELOC_390_JMP_SLOT:
222 return &elf_howto_table[(int) R_390_JMP_SLOT];
223 case BFD_RELOC_390_RELATIVE:
224 return &elf_howto_table[(int) R_390_RELATIVE];
225 case BFD_RELOC_32_GOTOFF:
226 return &elf_howto_table[(int) R_390_GOTOFF32];
227 case BFD_RELOC_390_GOTPC:
228 return &elf_howto_table[(int) R_390_GOTPC];
229 case BFD_RELOC_390_GOT16:
230 return &elf_howto_table[(int) R_390_GOT16];
231 case BFD_RELOC_16_PCREL:
232 return &elf_howto_table[(int) R_390_PC16];
233 case BFD_RELOC_390_PC12DBL:
234 return &elf_howto_table[(int) R_390_PC12DBL];
235 case BFD_RELOC_390_PLT12DBL:
236 return &elf_howto_table[(int) R_390_PLT12DBL];
237 case BFD_RELOC_390_PC16DBL:
238 return &elf_howto_table[(int) R_390_PC16DBL];
239 case BFD_RELOC_390_PLT16DBL:
240 return &elf_howto_table[(int) R_390_PLT16DBL];
241 case BFD_RELOC_390_PC24DBL:
242 return &elf_howto_table[(int) R_390_PC24DBL];
243 case BFD_RELOC_390_PLT24DBL:
244 return &elf_howto_table[(int) R_390_PLT24DBL];
245 case BFD_RELOC_390_PC32DBL:
246 return &elf_howto_table[(int) R_390_PC32DBL];
247 case BFD_RELOC_390_PLT32DBL:
248 return &elf_howto_table[(int) R_390_PLT32DBL];
249 case BFD_RELOC_390_GOTPCDBL:
250 return &elf_howto_table[(int) R_390_GOTPCDBL];
251 case BFD_RELOC_64:
252 return &elf_howto_table[(int) R_390_64];
253 case BFD_RELOC_64_PCREL:
254 return &elf_howto_table[(int) R_390_PC64];
255 case BFD_RELOC_390_GOT64:
256 return &elf_howto_table[(int) R_390_GOT64];
257 case BFD_RELOC_390_PLT64:
258 return &elf_howto_table[(int) R_390_PLT64];
259 case BFD_RELOC_390_GOTENT:
260 return &elf_howto_table[(int) R_390_GOTENT];
261 case BFD_RELOC_16_GOTOFF:
262 return &elf_howto_table[(int) R_390_GOTOFF16];
263 case BFD_RELOC_390_GOTOFF64:
264 return &elf_howto_table[(int) R_390_GOTOFF64];
265 case BFD_RELOC_390_GOTPLT12:
266 return &elf_howto_table[(int) R_390_GOTPLT12];
267 case BFD_RELOC_390_GOTPLT16:
268 return &elf_howto_table[(int) R_390_GOTPLT16];
269 case BFD_RELOC_390_GOTPLT32:
270 return &elf_howto_table[(int) R_390_GOTPLT32];
271 case BFD_RELOC_390_GOTPLT64:
272 return &elf_howto_table[(int) R_390_GOTPLT64];
273 case BFD_RELOC_390_GOTPLTENT:
274 return &elf_howto_table[(int) R_390_GOTPLTENT];
275 case BFD_RELOC_390_PLTOFF16:
276 return &elf_howto_table[(int) R_390_PLTOFF16];
277 case BFD_RELOC_390_PLTOFF32:
278 return &elf_howto_table[(int) R_390_PLTOFF32];
279 case BFD_RELOC_390_PLTOFF64:
280 return &elf_howto_table[(int) R_390_PLTOFF64];
281 case BFD_RELOC_390_TLS_LOAD:
282 return &elf_howto_table[(int) R_390_TLS_LOAD];
283 case BFD_RELOC_390_TLS_GDCALL:
284 return &elf_howto_table[(int) R_390_TLS_GDCALL];
285 case BFD_RELOC_390_TLS_LDCALL:
286 return &elf_howto_table[(int) R_390_TLS_LDCALL];
287 case BFD_RELOC_390_TLS_GD64:
288 return &elf_howto_table[(int) R_390_TLS_GD64];
289 case BFD_RELOC_390_TLS_GOTIE12:
290 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
291 case BFD_RELOC_390_TLS_GOTIE64:
292 return &elf_howto_table[(int) R_390_TLS_GOTIE64];
293 case BFD_RELOC_390_TLS_LDM64:
294 return &elf_howto_table[(int) R_390_TLS_LDM64];
295 case BFD_RELOC_390_TLS_IE64:
296 return &elf_howto_table[(int) R_390_TLS_IE64];
297 case BFD_RELOC_390_TLS_IEENT:
298 return &elf_howto_table[(int) R_390_TLS_IEENT];
299 case BFD_RELOC_390_TLS_LE64:
300 return &elf_howto_table[(int) R_390_TLS_LE64];
301 case BFD_RELOC_390_TLS_LDO64:
302 return &elf_howto_table[(int) R_390_TLS_LDO64];
303 case BFD_RELOC_390_TLS_DTPMOD:
304 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
305 case BFD_RELOC_390_TLS_DTPOFF:
306 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
307 case BFD_RELOC_390_TLS_TPOFF:
308 return &elf_howto_table[(int) R_390_TLS_TPOFF];
309 case BFD_RELOC_390_20:
310 return &elf_howto_table[(int) R_390_20];
311 case BFD_RELOC_390_GOT20:
312 return &elf_howto_table[(int) R_390_GOT20];
313 case BFD_RELOC_390_GOTPLT20:
314 return &elf_howto_table[(int) R_390_GOTPLT20];
315 case BFD_RELOC_390_TLS_GOTIE20:
316 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
317 case BFD_RELOC_390_IRELATIVE:
318 return &elf_howto_table[(int) R_390_IRELATIVE];
319 case BFD_RELOC_VTABLE_INHERIT:
320 return &elf64_s390_vtinherit_howto;
321 case BFD_RELOC_VTABLE_ENTRY:
322 return &elf64_s390_vtentry_howto;
323 default:
324 break;
325 }
326
327 /* xgettext:c-format */
328 _bfd_error_handler (_("%pB: unsupported relocation type %#x"), abfd, (int) code);
329 bfd_set_error (bfd_error_bad_value);
330 return NULL;
331 }
332
333 static reloc_howto_type *
334 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
335 const char *r_name)
336 {
337 unsigned int i;
338
339 for (i = 0;
340 i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]);
341 i++)
342 if (elf_howto_table[i].name != NULL
343 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
344 return &elf_howto_table[i];
345
346 if (strcasecmp (elf64_s390_vtinherit_howto.name, r_name) == 0)
347 return &elf64_s390_vtinherit_howto;
348 if (strcasecmp (elf64_s390_vtentry_howto.name, r_name) == 0)
349 return &elf64_s390_vtentry_howto;
350
351 return NULL;
352 }
353
354 /* We need to use ELF64_R_TYPE so we have our own copy of this function,
355 and elf64-s390.c has its own copy. */
356
357 static bfd_boolean
358 elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
359 arelent *cache_ptr,
360 Elf_Internal_Rela *dst)
361 {
362 unsigned int r_type = ELF64_R_TYPE(dst->r_info);
363
364 switch (r_type)
365 {
366 case R_390_GNU_VTINHERIT:
367 cache_ptr->howto = &elf64_s390_vtinherit_howto;
368 break;
369
370 case R_390_GNU_VTENTRY:
371 cache_ptr->howto = &elf64_s390_vtentry_howto;
372 break;
373
374 default:
375 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
376 {
377 /* xgettext:c-format */
378 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
379 abfd, r_type);
380 bfd_set_error (bfd_error_bad_value);
381 return FALSE;
382 }
383 cache_ptr->howto = &elf_howto_table[r_type];
384 }
385 return TRUE;
386 }
387
388 /* A relocation function which doesn't do anything. */
389 static bfd_reloc_status_type
390 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
391 arelent *reloc_entry,
392 asymbol *symbol ATTRIBUTE_UNUSED,
393 void * data ATTRIBUTE_UNUSED,
394 asection *input_section,
395 bfd *output_bfd,
396 char **error_message ATTRIBUTE_UNUSED)
397 {
398 if (output_bfd)
399 reloc_entry->address += input_section->output_offset;
400 return bfd_reloc_ok;
401 }
402
403 /* Handle the large displacement relocs. */
404 static bfd_reloc_status_type
405 s390_elf_ldisp_reloc (bfd *abfd,
406 arelent *reloc_entry,
407 asymbol *symbol,
408 void * data,
409 asection *input_section,
410 bfd *output_bfd,
411 char **error_message ATTRIBUTE_UNUSED)
412 {
413 reloc_howto_type *howto = reloc_entry->howto;
414 bfd_vma relocation;
415 bfd_vma insn;
416
417 if (output_bfd != (bfd *) NULL
418 && (symbol->flags & BSF_SECTION_SYM) == 0
419 && (! howto->partial_inplace
420 || reloc_entry->addend == 0))
421 {
422 reloc_entry->address += input_section->output_offset;
423 return bfd_reloc_ok;
424 }
425 if (output_bfd != NULL)
426 return bfd_reloc_continue;
427
428 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
429 return bfd_reloc_outofrange;
430
431 relocation = (symbol->value
432 + symbol->section->output_section->vma
433 + symbol->section->output_offset);
434 relocation += reloc_entry->addend;
435 if (howto->pc_relative)
436 {
437 relocation -= (input_section->output_section->vma
438 + input_section->output_offset);
439 relocation -= reloc_entry->address;
440 }
441
442 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
443 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
444 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
445
446 if ((bfd_signed_vma) relocation < - 0x80000
447 || (bfd_signed_vma) relocation > 0x7ffff)
448 return bfd_reloc_overflow;
449 else
450 return bfd_reloc_ok;
451 }
452
453 static bfd_boolean
454 elf_s390_is_local_label_name (bfd *abfd, const char *name)
455 {
456 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
457 return TRUE;
458
459 return _bfd_elf_is_local_label_name (abfd, name);
460 }
461
462 /* Functions for the 390 ELF linker. */
463
464 /* The name of the dynamic interpreter. This is put in the .interp
465 section. */
466
467 #define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
468
469 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
470 copying dynamic variables from a shared lib into an app's dynbss
471 section, and instead use a dynamic relocation to point into the
472 shared lib. */
473 #define ELIMINATE_COPY_RELOCS 1
474
475 /* The size in bytes of the first entry in the procedure linkage table. */
476 #define PLT_FIRST_ENTRY_SIZE 32
477 /* The size in bytes of an entry in the procedure linkage table. */
478 #define PLT_ENTRY_SIZE 32
479
480 #define GOT_ENTRY_SIZE 8
481
482 #define RELA_ENTRY_SIZE sizeof (Elf64_External_Rela)
483
484 /* The first three entries in a global offset table are reserved,
485 and the initial contents are unimportant (we zero them out).
486 Subsequent entries look like this. See the SVR4 ABI 386
487 supplement to see how this works. */
488
489 /* For the s390, simple addr offset can only be 0 - 4096.
490 To use the full 16777216 TB address space, several instructions
491 are needed to load an address in a register and execute
492 a branch( or just saving the address)
493
494 Furthermore, only r 0 and 1 are free to use!!! */
495
496 /* The first 3 words in the GOT are then reserved.
497 Word 0 is the address of the dynamic table.
498 Word 1 is a pointer to a structure describing the object
499 Word 2 is used to point to the loader entry address.
500
501 The code for PLT entries looks like this:
502
503 The GOT holds the address in the PLT to be executed.
504 The loader then gets:
505 48(15) = Pointer to the structure describing the object.
506 56(15) = Offset in symbol table
507 The loader must then find the module where the function is
508 and insert the address in the GOT.
509
510 PLT1: LARL 1,<fn>@GOTENT # 6 bytes Load address of GOT entry in r1
511 LG 1,0(1) # 6 bytes Load address from GOT in r1
512 BCR 15,1 # 2 bytes Jump to address
513 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
514 LGF 1,12(1) # 6 bytes Load rela.plt offset into r1
515 BRCL 15,-x # 6 bytes Jump to first PLT entry
516 .long ? # 4 bytes offset into .rela.plt
517
518 Total = 32 bytes per PLT entry
519 Fixup at offset 2: relative address to GOT entry
520 Fixup at offset 22: relative branch to PLT0
521 Fixup at offset 28: 32 bit offset into .rela.plt
522
523 A 32 bit offset into the symbol table is enough. It allows for
524 .rela.plt sections up to a size of 2 gigabyte. A single dynamic
525 object (the main program, any shared library) is limited to 4GB in
526 size. Having a .rela.plt of 2GB would already make the .plt
527 section bigger than 8GB. */
528
529 static const bfd_byte elf_s390x_plt_entry[PLT_ENTRY_SIZE] =
530 {
531 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
532 0xe3, 0x10, 0x10, 0x00, 0x00, 0x04, /* lg %r1,0(%r1) */
533 0x07, 0xf1, /* br %r1 */
534 0x0d, 0x10, /* basr %r1,%r0 */
535 0xe3, 0x10, 0x10, 0x0c, 0x00, 0x14, /* lgf %r1,12(%r1) */
536 0xc0, 0xf4, 0x00, 0x00, 0x00, 0x00, /* jg first plt */
537 0x00, 0x00, 0x00, 0x00 /* .long 0x00000000 */
538 };
539
540 /* The first PLT entry pushes the offset into the symbol table
541 from R1 onto the stack at 56(15) and the loader object info
542 at 48(15), loads the loader address in R1 and jumps to it. */
543
544 /* The first entry in the PLT:
545
546 PLT0:
547 STG 1,56(15) # r1 contains the offset into the symbol table
548 LARL 1,_GLOBAL_OFFSET_TABLE # load address of global offset table
549 MVC 48(8,15),8(1) # move loader ino (object struct address) to stack
550 LG 1,16(1) # get entry address of loader
551 BCR 15,1 # jump to loader
552
553 Fixup at offset 8: relative address to start of GOT. */
554
555 static const bfd_byte elf_s390x_first_plt_entry[PLT_FIRST_ENTRY_SIZE] =
556 {
557 0xe3, 0x10, 0xf0, 0x38, 0x00, 0x24, /* stg %r1,56(%r15) */
558 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
559 0xd2, 0x07, 0xf0, 0x30, 0x10, 0x08, /* mvc 48(8,%r15),8(%r1) */
560 0xe3, 0x10, 0x10, 0x10, 0x00, 0x04, /* lg %r1,16(%r1) */
561 0x07, 0xf1, /* br %r1 */
562 0x07, 0x00, /* nopr %r0 */
563 0x07, 0x00, /* nopr %r0 */
564 0x07, 0x00 /* nopr %r0 */
565 };
566
567
568 /* s390 ELF linker hash entry. */
569
570 struct elf_s390_link_hash_entry
571 {
572 struct elf_link_hash_entry elf;
573
574 /* Number of GOTPLT references for a function. */
575 bfd_signed_vma gotplt_refcount;
576
577 #define GOT_UNKNOWN 0
578 #define GOT_NORMAL 1
579 #define GOT_TLS_GD 2
580 #define GOT_TLS_IE 3
581 #define GOT_TLS_IE_NLT 3
582 unsigned char tls_type;
583
584 /* For pointer equality reasons we might need to change the symbol
585 type from STT_GNU_IFUNC to STT_FUNC together with its value and
586 section entry. So after alloc_dynrelocs only these values should
587 be used. In order to check whether a symbol is IFUNC use
588 s390_is_ifunc_symbol_p. */
589 bfd_vma ifunc_resolver_address;
590 asection *ifunc_resolver_section;
591 };
592
593 #define elf_s390_hash_entry(ent) \
594 ((struct elf_s390_link_hash_entry *)(ent))
595
596 /* This structure represents an entry in the local PLT list needed for
597 local IFUNC symbols. */
598 struct plt_entry
599 {
600 /* The section of the local symbol.
601 Set in relocate_section and used in finish_dynamic_sections. */
602 asection *sec;
603
604 union
605 {
606 bfd_signed_vma refcount;
607 bfd_vma offset;
608 } plt;
609 };
610
611 /* NOTE: Keep this structure in sync with
612 the one declared in elf32-s390.c. */
613 struct elf_s390_obj_tdata
614 {
615 struct elf_obj_tdata root;
616
617 /* A local PLT is needed for ifunc symbols. */
618 struct plt_entry *local_plt;
619
620 /* TLS type for each local got entry. */
621 char *local_got_tls_type;
622 };
623
624 #define elf_s390_tdata(abfd) \
625 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
626
627 #define elf_s390_local_plt(abfd) \
628 (elf_s390_tdata (abfd)->local_plt)
629
630 #define elf_s390_local_got_tls_type(abfd) \
631 (elf_s390_tdata (abfd)->local_got_tls_type)
632
633 #define is_s390_elf(bfd) \
634 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
635 && elf_tdata (bfd) != NULL \
636 && elf_object_id (bfd) == S390_ELF_DATA)
637
638 static bfd_boolean
639 elf_s390_mkobject (bfd *abfd)
640 {
641 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
642 S390_ELF_DATA);
643 }
644
645 static bfd_boolean
646 elf_s390_object_p (bfd *abfd)
647 {
648 /* Set the right machine number for an s390 elf32 file. */
649 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_64);
650 }
651
652 /* s390 ELF linker hash table. */
653
654 struct elf_s390_link_hash_table
655 {
656 struct elf_link_hash_table elf;
657
658 /* Short-cuts to get to dynamic linker sections. */
659 asection *irelifunc;
660
661 union {
662 bfd_signed_vma refcount;
663 bfd_vma offset;
664 } tls_ldm_got;
665
666 /* Small local sym cache. */
667 struct sym_cache sym_cache;
668
669 /* Options passed from the linker. */
670 struct s390_elf_params *params;
671 };
672
673 /* Get the s390 ELF linker hash table from a link_info structure. */
674
675 #define elf_s390_hash_table(p) \
676 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
677 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
678
679 #define ELF64 1
680 #include "elf-s390-common.c"
681
682 /* Create an entry in an s390 ELF linker hash table. */
683
684 static struct bfd_hash_entry *
685 link_hash_newfunc (struct bfd_hash_entry *entry,
686 struct bfd_hash_table *table,
687 const char *string)
688 {
689 /* Allocate the structure if it has not already been allocated by a
690 subclass. */
691 if (entry == NULL)
692 {
693 entry = bfd_hash_allocate (table,
694 sizeof (struct elf_s390_link_hash_entry));
695 if (entry == NULL)
696 return entry;
697 }
698
699 /* Call the allocation method of the superclass. */
700 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
701 if (entry != NULL)
702 {
703 struct elf_s390_link_hash_entry *eh;
704
705 eh = (struct elf_s390_link_hash_entry *) entry;
706 eh->gotplt_refcount = 0;
707 eh->tls_type = GOT_UNKNOWN;
708 eh->ifunc_resolver_address = 0;
709 eh->ifunc_resolver_section = NULL;
710 }
711
712 return entry;
713 }
714
715 /* Create an s390 ELF linker hash table. */
716
717 static struct bfd_link_hash_table *
718 elf_s390_link_hash_table_create (bfd *abfd)
719 {
720 struct elf_s390_link_hash_table *ret;
721 size_t amt = sizeof (struct elf_s390_link_hash_table);
722
723 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
724 if (ret == NULL)
725 return NULL;
726
727 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
728 sizeof (struct elf_s390_link_hash_entry),
729 S390_ELF_DATA))
730 {
731 free (ret);
732 return NULL;
733 }
734
735 return &ret->elf.root;
736 }
737
738 /* Copy the extra info we tack onto an elf_link_hash_entry. */
739
740 static void
741 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
742 struct elf_link_hash_entry *dir,
743 struct elf_link_hash_entry *ind)
744 {
745 struct elf_s390_link_hash_entry *edir, *eind;
746
747 edir = (struct elf_s390_link_hash_entry *) dir;
748 eind = (struct elf_s390_link_hash_entry *) ind;
749
750 if (ind->dyn_relocs != NULL)
751 {
752 if (dir->dyn_relocs != NULL)
753 {
754 struct elf_dyn_relocs **pp;
755 struct elf_dyn_relocs *p;
756
757 /* Add reloc counts against the indirect sym to the direct sym
758 list. Merge any entries against the same section. */
759 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
760 {
761 struct elf_dyn_relocs *q;
762
763 for (q = dir->dyn_relocs; q != NULL; q = q->next)
764 if (q->sec == p->sec)
765 {
766 q->pc_count += p->pc_count;
767 q->count += p->count;
768 *pp = p->next;
769 break;
770 }
771 if (q == NULL)
772 pp = &p->next;
773 }
774 *pp = dir->dyn_relocs;
775 }
776
777 dir->dyn_relocs = ind->dyn_relocs;
778 ind->dyn_relocs = NULL;
779 }
780
781 if (ind->root.type == bfd_link_hash_indirect
782 && dir->got.refcount <= 0)
783 {
784 edir->tls_type = eind->tls_type;
785 eind->tls_type = GOT_UNKNOWN;
786 }
787
788 if (ELIMINATE_COPY_RELOCS
789 && ind->root.type != bfd_link_hash_indirect
790 && dir->dynamic_adjusted)
791 {
792 /* If called to transfer flags for a weakdef during processing
793 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
794 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
795 if (dir->versioned != versioned_hidden)
796 dir->ref_dynamic |= ind->ref_dynamic;
797 dir->ref_regular |= ind->ref_regular;
798 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
799 dir->needs_plt |= ind->needs_plt;
800 }
801 else
802 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
803 }
804
805 static int
806 elf_s390_tls_transition (struct bfd_link_info *info,
807 int r_type,
808 int is_local)
809 {
810 if (bfd_link_pic (info))
811 return r_type;
812
813 switch (r_type)
814 {
815 case R_390_TLS_GD64:
816 case R_390_TLS_IE64:
817 if (is_local)
818 return R_390_TLS_LE64;
819 return R_390_TLS_IE64;
820 case R_390_TLS_GOTIE64:
821 if (is_local)
822 return R_390_TLS_LE64;
823 return R_390_TLS_GOTIE64;
824 case R_390_TLS_LDM64:
825 return R_390_TLS_LE64;
826 }
827
828 return r_type;
829 }
830
831 /* Look through the relocs for a section during the first phase, and
832 allocate space in the global offset table or procedure linkage
833 table. */
834
835 static bfd_boolean
836 elf_s390_check_relocs (bfd *abfd,
837 struct bfd_link_info *info,
838 asection *sec,
839 const Elf_Internal_Rela *relocs)
840 {
841 struct elf_s390_link_hash_table *htab;
842 Elf_Internal_Shdr *symtab_hdr;
843 struct elf_link_hash_entry **sym_hashes;
844 const Elf_Internal_Rela *rel;
845 const Elf_Internal_Rela *rel_end;
846 asection *sreloc;
847 bfd_signed_vma *local_got_refcounts;
848 int tls_type, old_tls_type;
849
850 if (bfd_link_relocatable (info))
851 return TRUE;
852
853 BFD_ASSERT (is_s390_elf (abfd));
854
855 htab = elf_s390_hash_table (info);
856 if (htab == NULL)
857 return FALSE;
858
859 symtab_hdr = &elf_symtab_hdr (abfd);
860 sym_hashes = elf_sym_hashes (abfd);
861 local_got_refcounts = elf_local_got_refcounts (abfd);
862
863 sreloc = NULL;
864
865 rel_end = relocs + sec->reloc_count;
866 for (rel = relocs; rel < rel_end; rel++)
867 {
868 unsigned int r_type;
869 unsigned int r_symndx;
870 struct elf_link_hash_entry *h;
871 Elf_Internal_Sym *isym;
872
873 r_symndx = ELF64_R_SYM (rel->r_info);
874
875 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
876 {
877 /* xgettext:c-format */
878 _bfd_error_handler (_("%pB: bad symbol index: %d"),
879 abfd, r_symndx);
880 return FALSE;
881 }
882
883 if (r_symndx < symtab_hdr->sh_info)
884 {
885 /* A local symbol. */
886 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
887 abfd, r_symndx);
888 if (isym == NULL)
889 return FALSE;
890
891 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
892 {
893 struct plt_entry *plt;
894
895 if (htab->elf.dynobj == NULL)
896 htab->elf.dynobj = abfd;
897
898 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
899 return FALSE;
900
901 if (local_got_refcounts == NULL)
902 {
903 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
904 return FALSE;
905 local_got_refcounts = elf_local_got_refcounts (abfd);
906 }
907 plt = elf_s390_local_plt (abfd);
908 plt[r_symndx].plt.refcount++;
909 }
910 h = NULL;
911 }
912 else
913 {
914 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
915 while (h->root.type == bfd_link_hash_indirect
916 || h->root.type == bfd_link_hash_warning)
917 h = (struct elf_link_hash_entry *) h->root.u.i.link;
918 }
919
920 /* Create got section and local_got_refcounts array if they
921 are needed. */
922 r_type = elf_s390_tls_transition (info,
923 ELF64_R_TYPE (rel->r_info),
924 h == NULL);
925 switch (r_type)
926 {
927 case R_390_GOT12:
928 case R_390_GOT16:
929 case R_390_GOT20:
930 case R_390_GOT32:
931 case R_390_GOT64:
932 case R_390_GOTENT:
933 case R_390_GOTPLT12:
934 case R_390_GOTPLT16:
935 case R_390_GOTPLT20:
936 case R_390_GOTPLT32:
937 case R_390_GOTPLT64:
938 case R_390_GOTPLTENT:
939 case R_390_TLS_GD64:
940 case R_390_TLS_GOTIE12:
941 case R_390_TLS_GOTIE20:
942 case R_390_TLS_GOTIE64:
943 case R_390_TLS_IEENT:
944 case R_390_TLS_IE64:
945 case R_390_TLS_LDM64:
946 if (h == NULL
947 && local_got_refcounts == NULL)
948 {
949 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
950 return FALSE;
951 local_got_refcounts = elf_local_got_refcounts (abfd);
952 }
953
954 /* Fall through. */
955 case R_390_GOTOFF16:
956 case R_390_GOTOFF32:
957 case R_390_GOTOFF64:
958 case R_390_GOTPC:
959 case R_390_GOTPCDBL:
960 if (htab->elf.sgot == NULL)
961 {
962 if (htab->elf.dynobj == NULL)
963 htab->elf.dynobj = abfd;
964 if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
965 return FALSE;
966 }
967 }
968
969 if (h != NULL)
970 {
971 if (htab->elf.dynobj == NULL)
972 htab->elf.dynobj = abfd;
973 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
974 return FALSE;
975
976 /* Make sure an IFUNC symbol defined in a non-shared object
977 always gets a PLT slot. */
978 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
979 {
980 /* The symbol is called by the dynamic loader in order
981 to resolve the relocation. So it is in fact also
982 referenced. */
983 h->ref_regular = 1;
984 h->needs_plt = 1;
985 }
986 }
987
988 switch (r_type)
989 {
990 case R_390_GOTPC:
991 case R_390_GOTPCDBL:
992 /* These relocs do not need a GOT slot. They just load the
993 GOT pointer itself or address something else relative to
994 the GOT. Since the GOT pointer has been set up above we
995 are done. */
996 break;
997 case R_390_GOTOFF16:
998 case R_390_GOTOFF32:
999 case R_390_GOTOFF64:
1000 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1001 break;
1002 /* Fall through. */
1003
1004 case R_390_PLT12DBL:
1005 case R_390_PLT16DBL:
1006 case R_390_PLT24DBL:
1007 case R_390_PLT32:
1008 case R_390_PLT32DBL:
1009 case R_390_PLT64:
1010 case R_390_PLTOFF16:
1011 case R_390_PLTOFF32:
1012 case R_390_PLTOFF64:
1013 /* This symbol requires a procedure linkage table entry. We
1014 actually build the entry in adjust_dynamic_symbol,
1015 because this might be a case of linking PIC code which is
1016 never referenced by a dynamic object, in which case we
1017 don't need to generate a procedure linkage table entry
1018 after all. */
1019
1020 /* If this is a local symbol, we resolve it directly without
1021 creating a procedure linkage table entry. */
1022 if (h != NULL)
1023 {
1024 h->needs_plt = 1;
1025 h->plt.refcount += 1;
1026 }
1027 break;
1028
1029 case R_390_GOTPLT12:
1030 case R_390_GOTPLT16:
1031 case R_390_GOTPLT20:
1032 case R_390_GOTPLT32:
1033 case R_390_GOTPLT64:
1034 case R_390_GOTPLTENT:
1035 /* This symbol requires either a procedure linkage table entry
1036 or an entry in the local got. We actually build the entry
1037 in adjust_dynamic_symbol because whether this is really a
1038 global reference can change and with it the fact if we have
1039 to create a plt entry or a local got entry. To be able to
1040 make a once global symbol a local one we have to keep track
1041 of the number of gotplt references that exist for this
1042 symbol. */
1043 if (h != NULL)
1044 {
1045 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1046 h->needs_plt = 1;
1047 h->plt.refcount += 1;
1048 }
1049 else
1050 local_got_refcounts[r_symndx] += 1;
1051 break;
1052
1053 case R_390_TLS_LDM64:
1054 htab->tls_ldm_got.refcount += 1;
1055 break;
1056
1057 case R_390_TLS_IE64:
1058 case R_390_TLS_GOTIE12:
1059 case R_390_TLS_GOTIE20:
1060 case R_390_TLS_GOTIE64:
1061 case R_390_TLS_IEENT:
1062 if (bfd_link_pic (info))
1063 info->flags |= DF_STATIC_TLS;
1064 /* Fall through */
1065
1066 case R_390_GOT12:
1067 case R_390_GOT16:
1068 case R_390_GOT20:
1069 case R_390_GOT32:
1070 case R_390_GOT64:
1071 case R_390_GOTENT:
1072 case R_390_TLS_GD64:
1073 /* This symbol requires a global offset table entry. */
1074 switch (r_type)
1075 {
1076 default:
1077 case R_390_GOT12:
1078 case R_390_GOT16:
1079 case R_390_GOT20:
1080 case R_390_GOT32:
1081 case R_390_GOTENT:
1082 tls_type = GOT_NORMAL;
1083 break;
1084 case R_390_TLS_GD64:
1085 tls_type = GOT_TLS_GD;
1086 break;
1087 case R_390_TLS_IE64:
1088 case R_390_TLS_GOTIE64:
1089 tls_type = GOT_TLS_IE;
1090 break;
1091 case R_390_TLS_GOTIE12:
1092 case R_390_TLS_GOTIE20:
1093 case R_390_TLS_IEENT:
1094 tls_type = GOT_TLS_IE_NLT;
1095 break;
1096 }
1097
1098 if (h != NULL)
1099 {
1100 h->got.refcount += 1;
1101 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1102 }
1103 else
1104 {
1105 local_got_refcounts[r_symndx] += 1;
1106 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1107 }
1108 /* If a TLS symbol is accessed using IE at least once,
1109 there is no point to use dynamic model for it. */
1110 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1111 {
1112 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1113 {
1114 _bfd_error_handler
1115 /* xgettext:c-format */
1116 (_("%pB: `%s' accessed both as normal and thread local symbol"),
1117 abfd, h->root.root.string);
1118 return FALSE;
1119 }
1120 if (old_tls_type > tls_type)
1121 tls_type = old_tls_type;
1122 }
1123
1124 if (old_tls_type != tls_type)
1125 {
1126 if (h != NULL)
1127 elf_s390_hash_entry (h)->tls_type = tls_type;
1128 else
1129 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1130 }
1131
1132 if (r_type != R_390_TLS_IE64)
1133 break;
1134 /* Fall through */
1135
1136 case R_390_TLS_LE64:
1137 /* For static linking and executables this reloc will be
1138 calculated at linktime otherwise a TLS_TPOFF runtime
1139 reloc will be generated. */
1140 if (r_type == R_390_TLS_LE64 && bfd_link_pie (info))
1141 break;
1142
1143 if (!bfd_link_pic (info))
1144 break;
1145 info->flags |= DF_STATIC_TLS;
1146 /* Fall through */
1147
1148 case R_390_8:
1149 case R_390_16:
1150 case R_390_32:
1151 case R_390_64:
1152 case R_390_PC12DBL:
1153 case R_390_PC16:
1154 case R_390_PC16DBL:
1155 case R_390_PC24DBL:
1156 case R_390_PC32:
1157 case R_390_PC32DBL:
1158 case R_390_PC64:
1159 if (h != NULL && bfd_link_executable (info))
1160 {
1161 /* If this reloc is in a read-only section, we might
1162 need a copy reloc. We can't check reliably at this
1163 stage whether the section is read-only, as input
1164 sections have not yet been mapped to output sections.
1165 Tentatively set the flag for now, and correct in
1166 adjust_dynamic_symbol. */
1167 h->non_got_ref = 1;
1168
1169 if (!bfd_link_pic (info))
1170 {
1171 /* We may need a .plt entry if the function this reloc
1172 refers to is in a shared lib. */
1173 h->plt.refcount += 1;
1174 }
1175 }
1176
1177 /* If we are creating a shared library, and this is a reloc
1178 against a global symbol, or a non PC relative reloc
1179 against a local symbol, then we need to copy the reloc
1180 into the shared library. However, if we are linking with
1181 -Bsymbolic, we do not need to copy a reloc against a
1182 global symbol which is defined in an object we are
1183 including in the link (i.e., DEF_REGULAR is set). At
1184 this point we have not seen all the input files, so it is
1185 possible that DEF_REGULAR is not set now but will be set
1186 later (it is never cleared). In case of a weak definition,
1187 DEF_REGULAR may be cleared later by a strong definition in
1188 a shared library. We account for that possibility below by
1189 storing information in the relocs_copied field of the hash
1190 table entry. A similar situation occurs when creating
1191 shared libraries and symbol visibility changes render the
1192 symbol local.
1193
1194 If on the other hand, we are creating an executable, we
1195 may need to keep relocations for symbols satisfied by a
1196 dynamic library if we manage to avoid copy relocs for the
1197 symbol. */
1198 if ((bfd_link_pic (info)
1199 && (sec->flags & SEC_ALLOC) != 0
1200 && ((ELF64_R_TYPE (rel->r_info) != R_390_PC16
1201 && ELF64_R_TYPE (rel->r_info) != R_390_PC12DBL
1202 && ELF64_R_TYPE (rel->r_info) != R_390_PC16DBL
1203 && ELF64_R_TYPE (rel->r_info) != R_390_PC24DBL
1204 && ELF64_R_TYPE (rel->r_info) != R_390_PC32
1205 && ELF64_R_TYPE (rel->r_info) != R_390_PC32DBL
1206 && ELF64_R_TYPE (rel->r_info) != R_390_PC64)
1207 || (h != NULL
1208 && (! SYMBOLIC_BIND (info, h)
1209 || h->root.type == bfd_link_hash_defweak
1210 || !h->def_regular))))
1211 || (ELIMINATE_COPY_RELOCS
1212 && !bfd_link_pic (info)
1213 && (sec->flags & SEC_ALLOC) != 0
1214 && h != NULL
1215 && (h->root.type == bfd_link_hash_defweak
1216 || !h->def_regular)))
1217 {
1218 struct elf_dyn_relocs *p;
1219 struct elf_dyn_relocs **head;
1220
1221 /* We must copy these reloc types into the output file.
1222 Create a reloc section in dynobj and make room for
1223 this reloc. */
1224 if (sreloc == NULL)
1225 {
1226 if (htab->elf.dynobj == NULL)
1227 htab->elf.dynobj = abfd;
1228
1229 sreloc = _bfd_elf_make_dynamic_reloc_section
1230 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
1231
1232 if (sreloc == NULL)
1233 return FALSE;
1234 }
1235
1236 /* If this is a global symbol, we count the number of
1237 relocations we need for this symbol. */
1238 if (h != NULL)
1239 {
1240 head = &h->dyn_relocs;
1241 }
1242 else
1243 {
1244 /* Track dynamic relocs needed for local syms too.
1245 We really need local syms available to do this
1246 easily. Oh well. */
1247 asection *s;
1248 void *vpp;
1249
1250 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1251 abfd, r_symndx);
1252 if (isym == NULL)
1253 return FALSE;
1254
1255 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1256 if (s == NULL)
1257 s = sec;
1258
1259 vpp = &elf_section_data (s)->local_dynrel;
1260 head = (struct elf_dyn_relocs **) vpp;
1261 }
1262
1263 p = *head;
1264 if (p == NULL || p->sec != sec)
1265 {
1266 size_t amt = sizeof *p;
1267 p = ((struct elf_dyn_relocs *)
1268 bfd_alloc (htab->elf.dynobj, amt));
1269 if (p == NULL)
1270 return FALSE;
1271 p->next = *head;
1272 *head = p;
1273 p->sec = sec;
1274 p->count = 0;
1275 p->pc_count = 0;
1276 }
1277
1278 p->count += 1;
1279 if (ELF64_R_TYPE (rel->r_info) == R_390_PC16
1280 || ELF64_R_TYPE (rel->r_info) == R_390_PC12DBL
1281 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1282 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1283 || ELF64_R_TYPE (rel->r_info) == R_390_PC32
1284 || ELF64_R_TYPE (rel->r_info) == R_390_PC32DBL
1285 || ELF64_R_TYPE (rel->r_info) == R_390_PC64)
1286 p->pc_count += 1;
1287 }
1288 break;
1289
1290 /* This relocation describes the C++ object vtable hierarchy.
1291 Reconstruct it for later use during GC. */
1292 case R_390_GNU_VTINHERIT:
1293 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1294 return FALSE;
1295 break;
1296
1297 /* This relocation describes which C++ vtable entries are actually
1298 used. Record for later use during GC. */
1299 case R_390_GNU_VTENTRY:
1300 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1301 return FALSE;
1302 break;
1303
1304 default:
1305 break;
1306 }
1307 }
1308
1309 return TRUE;
1310 }
1311
1312 /* Return the section that should be marked against GC for a given
1313 relocation. */
1314
1315 static asection *
1316 elf_s390_gc_mark_hook (asection *sec,
1317 struct bfd_link_info *info,
1318 Elf_Internal_Rela *rel,
1319 struct elf_link_hash_entry *h,
1320 Elf_Internal_Sym *sym)
1321 {
1322 if (h != NULL)
1323 switch (ELF64_R_TYPE (rel->r_info))
1324 {
1325 case R_390_GNU_VTINHERIT:
1326 case R_390_GNU_VTENTRY:
1327 return NULL;
1328 }
1329
1330 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1331 }
1332
1333 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1334 entry but we found we will not create any. Called when we find we will
1335 not have any PLT for this symbol, by for example
1336 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1337 or elf_s390_size_dynamic_sections if no dynamic sections will be
1338 created (we're only linking static objects). */
1339
1340 static void
1341 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1342 {
1343 if (h->elf.root.type == bfd_link_hash_warning)
1344 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1345
1346 if (h->gotplt_refcount <= 0)
1347 return;
1348
1349 /* We simply add the number of gotplt references to the number
1350 * of got references for this symbol. */
1351 h->elf.got.refcount += h->gotplt_refcount;
1352 h->gotplt_refcount = -1;
1353 }
1354
1355 /* Adjust a symbol defined by a dynamic object and referenced by a
1356 regular object. The current definition is in some section of the
1357 dynamic object, but we're not including those sections. We have to
1358 change the definition to something the rest of the link can
1359 understand. */
1360
1361 static bfd_boolean
1362 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1363 struct elf_link_hash_entry *h)
1364 {
1365 struct elf_s390_link_hash_table *htab;
1366 asection *s, *srel;
1367
1368 /* STT_GNU_IFUNC symbol must go through PLT. */
1369 if (s390_is_ifunc_symbol_p (h))
1370 {
1371 /* All local STT_GNU_IFUNC references must be treated as local
1372 calls via local PLT. */
1373 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1374 {
1375 bfd_size_type pc_count = 0, count = 0;
1376 struct elf_dyn_relocs **pp;
1377 struct elf_dyn_relocs *p;
1378
1379 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1380 {
1381 pc_count += p->pc_count;
1382 p->count -= p->pc_count;
1383 p->pc_count = 0;
1384 count += p->count;
1385 if (p->count == 0)
1386 *pp = p->next;
1387 else
1388 pp = &p->next;
1389 }
1390
1391 if (pc_count || count)
1392 {
1393 h->needs_plt = 1;
1394 h->non_got_ref = 1;
1395 if (h->plt.refcount <= 0)
1396 h->plt.refcount = 1;
1397 else
1398 h->plt.refcount += 1;
1399 }
1400 }
1401
1402 if (h->plt.refcount <= 0)
1403 {
1404 h->plt.offset = (bfd_vma) -1;
1405 h->needs_plt = 0;
1406 }
1407 return TRUE;
1408 }
1409
1410 /* If this is a function, put it in the procedure linkage table. We
1411 will fill in the contents of the procedure linkage table later
1412 (although we could actually do it here). */
1413 if (h->type == STT_FUNC
1414 || h->needs_plt)
1415 {
1416 if (h->plt.refcount <= 0
1417 || SYMBOL_CALLS_LOCAL (info, h)
1418 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1419 {
1420 /* This case can occur if we saw a PLT32 reloc in an input
1421 file, but the symbol was never referred to by a dynamic
1422 object, or if all references were garbage collected. In
1423 such a case, we don't actually need to build a procedure
1424 linkage table, and we can just do a PC32 reloc instead. */
1425 h->plt.offset = (bfd_vma) -1;
1426 h->needs_plt = 0;
1427 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1428 }
1429
1430 return TRUE;
1431 }
1432 else
1433 /* It's possible that we incorrectly decided a .plt reloc was
1434 needed for an R_390_PC32 reloc to a non-function sym in
1435 check_relocs. We can't decide accurately between function and
1436 non-function syms in check-relocs; Objects loaded later in
1437 the link may change h->type. So fix it now. */
1438 h->plt.offset = (bfd_vma) -1;
1439
1440 /* If this is a weak symbol, and there is a real definition, the
1441 processor independent code will have arranged for us to see the
1442 real definition first, and we can just use the same value. */
1443 if (h->is_weakalias)
1444 {
1445 struct elf_link_hash_entry *def = weakdef (h);
1446 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1447 h->root.u.def.section = def->root.u.def.section;
1448 h->root.u.def.value = def->root.u.def.value;
1449 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1450 h->non_got_ref = def->non_got_ref;
1451 return TRUE;
1452 }
1453
1454 /* This is a reference to a symbol defined by a dynamic object which
1455 is not a function. */
1456
1457 /* If we are creating a shared library, we must presume that the
1458 only references to the symbol are via the global offset table.
1459 For such cases we need not do anything here; the relocations will
1460 be handled correctly by relocate_section. */
1461 if (bfd_link_pic (info))
1462 return TRUE;
1463
1464 /* If there are no references to this symbol that do not use the
1465 GOT, we don't need to generate a copy reloc. */
1466 if (!h->non_got_ref)
1467 return TRUE;
1468
1469 /* If -z nocopyreloc was given, we won't generate them either. */
1470 if (info->nocopyreloc)
1471 {
1472 h->non_got_ref = 0;
1473 return TRUE;
1474 }
1475
1476 /* If we don't find any dynamic relocs in read-only sections, then
1477 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1478 if (ELIMINATE_COPY_RELOCS && !_bfd_elf_readonly_dynrelocs (h))
1479 {
1480 h->non_got_ref = 0;
1481 return TRUE;
1482 }
1483
1484 /* We must allocate the symbol in our .dynbss section, which will
1485 become part of the .bss section of the executable. There will be
1486 an entry for this symbol in the .dynsym section. The dynamic
1487 object will contain position independent code, so all references
1488 from the dynamic object to this symbol will go through the global
1489 offset table. The dynamic linker will use the .dynsym entry to
1490 determine the address it must put in the global offset table, so
1491 both the dynamic object and the regular object will refer to the
1492 same memory location for the variable. */
1493
1494 htab = elf_s390_hash_table (info);
1495 if (htab == NULL)
1496 return FALSE;
1497
1498 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1499 copy the initial value out of the dynamic object and into the
1500 runtime process image. */
1501 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1502 {
1503 s = htab->elf.sdynrelro;
1504 srel = htab->elf.sreldynrelro;
1505 }
1506 else
1507 {
1508 s = htab->elf.sdynbss;
1509 srel = htab->elf.srelbss;
1510 }
1511 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1512 {
1513 srel->size += sizeof (Elf64_External_Rela);
1514 h->needs_copy = 1;
1515 }
1516
1517 return _bfd_elf_adjust_dynamic_copy (info, h, s);
1518 }
1519
1520 /* Allocate space in .plt, .got and associated reloc sections for
1521 dynamic relocs. */
1522
1523 static bfd_boolean
1524 allocate_dynrelocs (struct elf_link_hash_entry *h,
1525 void * inf)
1526 {
1527 struct bfd_link_info *info;
1528 struct elf_s390_link_hash_table *htab;
1529 struct elf_dyn_relocs *p;
1530
1531 if (h->root.type == bfd_link_hash_indirect)
1532 return TRUE;
1533
1534 info = (struct bfd_link_info *) inf;
1535 htab = elf_s390_hash_table (info);
1536 if (htab == NULL)
1537 return FALSE;
1538
1539 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1540 here if it is defined and referenced in a non-shared object. */
1541 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1542 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1543 else if (htab->elf.dynamic_sections_created
1544 && h->plt.refcount > 0)
1545 {
1546 /* Make sure this symbol is output as a dynamic symbol.
1547 Undefined weak syms won't yet be marked as dynamic. */
1548 if (h->dynindx == -1
1549 && !h->forced_local)
1550 {
1551 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1552 return FALSE;
1553 }
1554
1555 if (bfd_link_pic (info)
1556 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1557 {
1558 asection *s = htab->elf.splt;
1559
1560 /* If this is the first .plt entry, make room for the special
1561 first entry. */
1562 if (s->size == 0)
1563 s->size += PLT_FIRST_ENTRY_SIZE;
1564
1565 h->plt.offset = s->size;
1566
1567 /* If this symbol is not defined in a regular file, and we are
1568 not generating a shared library, then set the symbol to this
1569 location in the .plt. This is required to make function
1570 pointers compare as equal between the normal executable and
1571 the shared library. */
1572 if (! bfd_link_pic (info)
1573 && !h->def_regular)
1574 {
1575 h->root.u.def.section = s;
1576 h->root.u.def.value = h->plt.offset;
1577 }
1578
1579 /* Make room for this entry. */
1580 s->size += PLT_ENTRY_SIZE;
1581
1582 /* We also need to make an entry in the .got.plt section. */
1583 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1584
1585 /* We also need to make an entry in the .rela.plt section. */
1586 htab->elf.srelplt->size += sizeof (Elf64_External_Rela);
1587 }
1588 else
1589 {
1590 h->plt.offset = (bfd_vma) -1;
1591 h->needs_plt = 0;
1592 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1593 }
1594 }
1595 else
1596 {
1597 h->plt.offset = (bfd_vma) -1;
1598 h->needs_plt = 0;
1599 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1600 }
1601
1602 /* If R_390_TLS_{IE64,GOTIE64,GOTIE12,IEENT} symbol is now local to
1603 the binary, we can optimize a bit. IE64 and GOTIE64 get converted
1604 to R_390_TLS_LE64 requiring no TLS entry. For GOTIE12 and IEENT
1605 we can save the dynamic TLS relocation. */
1606 if (h->got.refcount > 0
1607 && !bfd_link_pic (info)
1608 && h->dynindx == -1
1609 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1610 {
1611 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1612 /* For the GOTIE access without a literal pool entry the offset has
1613 to be stored somewhere. The immediate value in the instruction
1614 is not bit enough so the value is stored in the got. */
1615 {
1616 h->got.offset = htab->elf.sgot->size;
1617 htab->elf.sgot->size += GOT_ENTRY_SIZE;
1618 }
1619 else
1620 h->got.offset = (bfd_vma) -1;
1621 }
1622 else if (h->got.refcount > 0)
1623 {
1624 asection *s;
1625 bfd_boolean dyn;
1626 int tls_type = elf_s390_hash_entry(h)->tls_type;
1627
1628 /* Make sure this symbol is output as a dynamic symbol.
1629 Undefined weak syms won't yet be marked as dynamic. */
1630 if (h->dynindx == -1
1631 && !h->forced_local)
1632 {
1633 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1634 return FALSE;
1635 }
1636
1637 s = htab->elf.sgot;
1638 h->got.offset = s->size;
1639 s->size += GOT_ENTRY_SIZE;
1640 /* R_390_TLS_GD64 needs 2 consecutive GOT slots. */
1641 if (tls_type == GOT_TLS_GD)
1642 s->size += GOT_ENTRY_SIZE;
1643 dyn = htab->elf.dynamic_sections_created;
1644 /* R_390_TLS_IE64 needs one dynamic relocation,
1645 R_390_TLS_GD64 needs one if local symbol and two if global. */
1646 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1647 || tls_type >= GOT_TLS_IE)
1648 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1649 else if (tls_type == GOT_TLS_GD)
1650 htab->elf.srelgot->size += 2 * sizeof (Elf64_External_Rela);
1651 else if (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
1652 && (bfd_link_pic (info)
1653 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1654 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1655 }
1656 else
1657 h->got.offset = (bfd_vma) -1;
1658
1659 if (h->dyn_relocs == NULL)
1660 return TRUE;
1661
1662 /* In the shared -Bsymbolic case, discard space allocated for
1663 dynamic pc-relative relocs against symbols which turn out to be
1664 defined in regular objects. For the normal shared case, discard
1665 space for pc-relative relocs that have become local due to symbol
1666 visibility changes. */
1667
1668 if (bfd_link_pic (info))
1669 {
1670 if (SYMBOL_CALLS_LOCAL (info, h))
1671 {
1672 struct elf_dyn_relocs **pp;
1673
1674 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1675 {
1676 p->count -= p->pc_count;
1677 p->pc_count = 0;
1678 if (p->count == 0)
1679 *pp = p->next;
1680 else
1681 pp = &p->next;
1682 }
1683 }
1684
1685 /* Also discard relocs on undefined weak syms with non-default
1686 visibility. */
1687 if (h->dyn_relocs != NULL
1688 && h->root.type == bfd_link_hash_undefweak)
1689 {
1690 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1691 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1692 h->dyn_relocs = NULL;
1693
1694 /* Make sure undefined weak symbols are output as a dynamic
1695 symbol in PIEs. */
1696 else if (h->dynindx == -1
1697 && !h->forced_local)
1698 {
1699 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1700 return FALSE;
1701 }
1702 }
1703 }
1704 else if (ELIMINATE_COPY_RELOCS)
1705 {
1706 /* For the non-shared case, discard space for relocs against
1707 symbols which turn out to need copy relocs or are not
1708 dynamic. */
1709
1710 if (!h->non_got_ref
1711 && ((h->def_dynamic
1712 && !h->def_regular)
1713 || (htab->elf.dynamic_sections_created
1714 && (h->root.type == bfd_link_hash_undefweak
1715 || h->root.type == bfd_link_hash_undefined))))
1716 {
1717 /* Make sure this symbol is output as a dynamic symbol.
1718 Undefined weak syms won't yet be marked as dynamic. */
1719 if (h->dynindx == -1
1720 && !h->forced_local)
1721 {
1722 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1723 return FALSE;
1724 }
1725
1726 /* If that succeeded, we know we'll be keeping all the
1727 relocs. */
1728 if (h->dynindx != -1)
1729 goto keep;
1730 }
1731
1732 h->dyn_relocs = NULL;
1733
1734 keep: ;
1735 }
1736
1737 /* Finally, allocate space. */
1738 for (p = h->dyn_relocs; p != NULL; p = p->next)
1739 {
1740 asection *sreloc = elf_section_data (p->sec)->sreloc;
1741 sreloc->size += p->count * sizeof (Elf64_External_Rela);
1742 }
1743
1744 return TRUE;
1745 }
1746
1747 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
1748 read-only sections. */
1749
1750 static bfd_boolean
1751 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
1752 {
1753 asection *sec;
1754
1755 if (h->root.type == bfd_link_hash_indirect)
1756 return TRUE;
1757
1758 sec = _bfd_elf_readonly_dynrelocs (h);
1759 if (sec != NULL)
1760 {
1761 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
1762
1763 info->flags |= DF_TEXTREL;
1764 info->callbacks->minfo
1765 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
1766 sec->owner, h->root.root.string, sec);
1767
1768 /* Not an error, just cut short the traversal. */
1769 return FALSE;
1770 }
1771 return TRUE;
1772 }
1773
1774 /* Set the sizes of the dynamic sections. */
1775
1776 static bfd_boolean
1777 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1778 struct bfd_link_info *info)
1779 {
1780 struct elf_s390_link_hash_table *htab;
1781 bfd *dynobj;
1782 asection *s;
1783 bfd_boolean relocs;
1784 bfd *ibfd;
1785
1786 htab = elf_s390_hash_table (info);
1787 if (htab == NULL)
1788 return FALSE;
1789
1790 dynobj = htab->elf.dynobj;
1791 if (dynobj == NULL)
1792 abort ();
1793
1794 if (htab->elf.dynamic_sections_created)
1795 {
1796 /* Set the contents of the .interp section to the interpreter. */
1797 if (bfd_link_executable (info) && !info->nointerp)
1798 {
1799 s = bfd_get_linker_section (dynobj, ".interp");
1800 if (s == NULL)
1801 abort ();
1802 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1803 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1804 }
1805 }
1806
1807 if (htab->elf.sgot && s390_gotplt_after_got_p (info))
1808 {
1809 /* _bfd_elf_create_got_section adds the got header size always
1810 to .got.plt but we need it in .got if this section comes
1811 first. */
1812 htab->elf.sgot->size += 3 * GOT_ENTRY_SIZE;
1813 htab->elf.sgotplt->size -= 3 * GOT_ENTRY_SIZE;
1814
1815 /* Make the _GLOBAL_OFFSET_TABLE_ symbol point to the .got
1816 instead of .got.plt. */
1817 htab->elf.hgot->root.u.def.section = htab->elf.sgot;
1818 htab->elf.hgot->root.u.def.value = 0;
1819 }
1820
1821 /* Set up .got offsets for local syms, and space for local dynamic
1822 relocs. */
1823 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1824 {
1825 bfd_signed_vma *local_got;
1826 bfd_signed_vma *end_local_got;
1827 char *local_tls_type;
1828 bfd_size_type locsymcount;
1829 Elf_Internal_Shdr *symtab_hdr;
1830 asection *srela;
1831 struct plt_entry *local_plt;
1832 unsigned int i;
1833
1834 if (! is_s390_elf (ibfd))
1835 continue;
1836
1837 for (s = ibfd->sections; s != NULL; s = s->next)
1838 {
1839 struct elf_dyn_relocs *p;
1840
1841 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1842 {
1843 if (!bfd_is_abs_section (p->sec)
1844 && bfd_is_abs_section (p->sec->output_section))
1845 {
1846 /* Input section has been discarded, either because
1847 it is a copy of a linkonce section or due to
1848 linker script /DISCARD/, so we'll be discarding
1849 the relocs too. */
1850 }
1851 else if (p->count != 0)
1852 {
1853 srela = elf_section_data (p->sec)->sreloc;
1854 srela->size += p->count * sizeof (Elf64_External_Rela);
1855 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1856 info->flags |= DF_TEXTREL;
1857 }
1858 }
1859 }
1860
1861 local_got = elf_local_got_refcounts (ibfd);
1862 if (!local_got)
1863 continue;
1864
1865 symtab_hdr = &elf_symtab_hdr (ibfd);
1866 locsymcount = symtab_hdr->sh_info;
1867 end_local_got = local_got + locsymcount;
1868 local_tls_type = elf_s390_local_got_tls_type (ibfd);
1869 s = htab->elf.sgot;
1870 srela = htab->elf.srelgot;
1871 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1872 {
1873 if (*local_got > 0)
1874 {
1875 *local_got = s->size;
1876 s->size += GOT_ENTRY_SIZE;
1877 if (*local_tls_type == GOT_TLS_GD)
1878 s->size += GOT_ENTRY_SIZE;
1879 if (bfd_link_pic (info))
1880 srela->size += sizeof (Elf64_External_Rela);
1881 }
1882 else
1883 *local_got = (bfd_vma) -1;
1884 }
1885
1886 local_plt = elf_s390_local_plt (ibfd);
1887 for (i = 0; i < symtab_hdr->sh_info; i++)
1888 {
1889 if (local_plt[i].plt.refcount > 0)
1890 {
1891 local_plt[i].plt.offset = htab->elf.iplt->size;
1892 htab->elf.iplt->size += PLT_ENTRY_SIZE;
1893 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1894 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
1895 }
1896 else
1897 local_plt[i].plt.offset = (bfd_vma) -1;
1898 }
1899 }
1900
1901 if (htab->tls_ldm_got.refcount > 0)
1902 {
1903 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM64
1904 relocs. */
1905 htab->tls_ldm_got.offset = htab->elf.sgot->size;
1906 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1907 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1908 }
1909 else
1910 htab->tls_ldm_got.offset = -1;
1911
1912 /* Allocate global sym .plt and .got entries, and space for global
1913 sym dynamic relocs. */
1914 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1915
1916 /* We now have determined the sizes of the various dynamic sections.
1917 Allocate memory for them. */
1918 relocs = FALSE;
1919 for (s = dynobj->sections; s != NULL; s = s->next)
1920 {
1921 if ((s->flags & SEC_LINKER_CREATED) == 0)
1922 continue;
1923
1924 if (s == htab->elf.splt
1925 || s == htab->elf.sgot
1926 || s == htab->elf.sgotplt
1927 || s == htab->elf.sdynbss
1928 || s == htab->elf.sdynrelro
1929 || s == htab->elf.iplt
1930 || s == htab->elf.igotplt
1931 || s == htab->irelifunc)
1932 {
1933 /* Strip this section if we don't need it; see the
1934 comment below. */
1935 }
1936 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
1937 {
1938 if (s->size != 0 && s != htab->elf.srelplt)
1939 relocs = TRUE;
1940
1941 /* We use the reloc_count field as a counter if we need
1942 to copy relocs into the output file. */
1943 s->reloc_count = 0;
1944 }
1945 else
1946 {
1947 /* It's not one of our sections, so don't allocate space. */
1948 continue;
1949 }
1950
1951 if (s->size == 0)
1952 {
1953 /* If we don't need this section, strip it from the
1954 output file. This is to handle .rela.bss and
1955 .rela.plt. We must create it in
1956 create_dynamic_sections, because it must be created
1957 before the linker maps input sections to output
1958 sections. The linker does that before
1959 adjust_dynamic_symbol is called, and it is that
1960 function which decides whether anything needs to go
1961 into these sections. */
1962
1963 s->flags |= SEC_EXCLUDE;
1964 continue;
1965 }
1966
1967 if ((s->flags & SEC_HAS_CONTENTS) == 0)
1968 continue;
1969
1970 /* Allocate memory for the section contents. We use bfd_zalloc
1971 here in case unused entries are not reclaimed before the
1972 section's contents are written out. This should not happen,
1973 but this way if it does, we get a R_390_NONE reloc instead
1974 of garbage. */
1975 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1976 if (s->contents == NULL)
1977 return FALSE;
1978 }
1979
1980 if (htab->elf.dynamic_sections_created)
1981 {
1982 /* Add some entries to the .dynamic section. We fill in the
1983 values later, in elf_s390_finish_dynamic_sections, but we
1984 must add the entries now so that we get the correct size for
1985 the .dynamic section. The DT_DEBUG entry is filled in by the
1986 dynamic linker and used by the debugger. */
1987 #define add_dynamic_entry(TAG, VAL) \
1988 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
1989
1990 if (bfd_link_executable (info))
1991 {
1992 if (!add_dynamic_entry (DT_DEBUG, 0))
1993 return FALSE;
1994 }
1995
1996 if (htab->elf.splt->size != 0)
1997 {
1998 if (!add_dynamic_entry (DT_PLTGOT, 0)
1999 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2000 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2001 || !add_dynamic_entry (DT_JMPREL, 0))
2002 return FALSE;
2003 }
2004
2005 if (relocs)
2006 {
2007 if (!add_dynamic_entry (DT_RELA, 0)
2008 || !add_dynamic_entry (DT_RELASZ, 0)
2009 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2010 return FALSE;
2011
2012 /* If any dynamic relocs apply to a read-only section,
2013 then we need a DT_TEXTREL entry. */
2014 if ((info->flags & DF_TEXTREL) == 0)
2015 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
2016
2017 if ((info->flags & DF_TEXTREL) != 0)
2018 {
2019 if (!add_dynamic_entry (DT_TEXTREL, 0))
2020 return FALSE;
2021 }
2022 }
2023 }
2024 #undef add_dynamic_entry
2025
2026 return TRUE;
2027 }
2028
2029 /* Return the base VMA address which should be subtracted from real addresses
2030 when resolving @dtpoff relocation.
2031 This is PT_TLS segment p_vaddr. */
2032
2033 static bfd_vma
2034 dtpoff_base (struct bfd_link_info *info)
2035 {
2036 /* If tls_sec is NULL, we should have signalled an error already. */
2037 if (elf_hash_table (info)->tls_sec == NULL)
2038 return 0;
2039 return elf_hash_table (info)->tls_sec->vma;
2040 }
2041
2042 /* Return the relocation value for @tpoff relocation
2043 if STT_TLS virtual address is ADDRESS. */
2044
2045 static bfd_vma
2046 tpoff (struct bfd_link_info *info, bfd_vma address)
2047 {
2048 struct elf_link_hash_table *htab = elf_hash_table (info);
2049
2050 /* If tls_sec is NULL, we should have signalled an error already. */
2051 if (htab->tls_sec == NULL)
2052 return 0;
2053 return htab->tls_size + htab->tls_sec->vma - address;
2054 }
2055
2056 /* Complain if TLS instruction relocation is against an invalid
2057 instruction. */
2058
2059 static void
2060 invalid_tls_insn (bfd *input_bfd,
2061 asection *input_section,
2062 Elf_Internal_Rela *rel)
2063 {
2064 reloc_howto_type *howto;
2065
2066 howto = elf_howto_table + ELF64_R_TYPE (rel->r_info);
2067 _bfd_error_handler
2068 /* xgettext:c-format */
2069 (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
2070 input_bfd,
2071 input_section,
2072 (uint64_t) rel->r_offset,
2073 howto->name);
2074 bfd_set_error (bfd_error_bad_value);
2075 }
2076
2077 /* Relocate a 390 ELF section. */
2078
2079 static bfd_boolean
2080 elf_s390_relocate_section (bfd *output_bfd,
2081 struct bfd_link_info *info,
2082 bfd *input_bfd,
2083 asection *input_section,
2084 bfd_byte *contents,
2085 Elf_Internal_Rela *relocs,
2086 Elf_Internal_Sym *local_syms,
2087 asection **local_sections)
2088 {
2089 struct elf_s390_link_hash_table *htab;
2090 Elf_Internal_Shdr *symtab_hdr;
2091 struct elf_link_hash_entry **sym_hashes;
2092 bfd_vma *local_got_offsets;
2093 Elf_Internal_Rela *rel;
2094 Elf_Internal_Rela *relend;
2095
2096 if (!is_s390_elf (input_bfd))
2097 {
2098 bfd_set_error (bfd_error_wrong_format);
2099 return FALSE;
2100 }
2101
2102 htab = elf_s390_hash_table (info);
2103 if (htab == NULL)
2104 return FALSE;
2105
2106 symtab_hdr = &elf_symtab_hdr (input_bfd);
2107 sym_hashes = elf_sym_hashes (input_bfd);
2108 local_got_offsets = elf_local_got_offsets (input_bfd);
2109
2110 rel = relocs;
2111 relend = relocs + input_section->reloc_count;
2112 for (; rel < relend; rel++)
2113 {
2114 unsigned int r_type;
2115 reloc_howto_type *howto;
2116 unsigned long r_symndx;
2117 struct elf_link_hash_entry *h;
2118 Elf_Internal_Sym *sym;
2119 asection *sec;
2120 bfd_vma off;
2121 bfd_vma relocation;
2122 bfd_boolean unresolved_reloc;
2123 bfd_reloc_status_type r;
2124 int tls_type;
2125 bfd_boolean resolved_to_zero;
2126
2127 r_type = ELF64_R_TYPE (rel->r_info);
2128 if (r_type == (int) R_390_GNU_VTINHERIT
2129 || r_type == (int) R_390_GNU_VTENTRY)
2130 continue;
2131 if (r_type >= (int) R_390_max)
2132 {
2133 bfd_set_error (bfd_error_bad_value);
2134 return FALSE;
2135 }
2136
2137 howto = elf_howto_table + r_type;
2138 r_symndx = ELF64_R_SYM (rel->r_info);
2139
2140 h = NULL;
2141 sym = NULL;
2142 sec = NULL;
2143 unresolved_reloc = FALSE;
2144 if (r_symndx < symtab_hdr->sh_info)
2145 {
2146 sym = local_syms + r_symndx;
2147 sec = local_sections[r_symndx];
2148
2149 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2150 {
2151 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2152 if (local_plt == NULL)
2153 return FALSE;
2154
2155 /* Address of the PLT slot. */
2156 relocation = (htab->elf.iplt->output_section->vma
2157 + htab->elf.iplt->output_offset
2158 + local_plt[r_symndx].plt.offset);
2159
2160 switch (r_type)
2161 {
2162 case R_390_PLTOFF16:
2163 case R_390_PLTOFF32:
2164 case R_390_PLTOFF64:
2165 relocation -= s390_got_pointer (info);
2166 break;
2167 case R_390_GOTPLT12:
2168 case R_390_GOTPLT16:
2169 case R_390_GOTPLT20:
2170 case R_390_GOTPLT32:
2171 case R_390_GOTPLT64:
2172 case R_390_GOTPLTENT:
2173 case R_390_GOT12:
2174 case R_390_GOT16:
2175 case R_390_GOT20:
2176 case R_390_GOT32:
2177 case R_390_GOT64:
2178 case R_390_GOTENT:
2179 {
2180 /* Write the PLT slot address into the GOT slot. */
2181 bfd_put_64 (output_bfd, relocation,
2182 htab->elf.sgot->contents +
2183 local_got_offsets[r_symndx]);
2184 relocation = (local_got_offsets[r_symndx] +
2185 s390_got_offset (info));
2186
2187 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2188 relocation += s390_got_pointer (info);
2189 break;
2190 }
2191 default:
2192 break;
2193 }
2194 /* The output section is needed later in
2195 finish_dynamic_section when creating the dynamic
2196 relocation. */
2197 local_plt[r_symndx].sec = sec;
2198 goto do_relocation;
2199 }
2200 else
2201 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2202 }
2203 else
2204 {
2205 bfd_boolean warned ATTRIBUTE_UNUSED;
2206 bfd_boolean ignored ATTRIBUTE_UNUSED;
2207
2208 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2209 r_symndx, symtab_hdr, sym_hashes,
2210 h, sec, relocation,
2211 unresolved_reloc, warned, ignored);
2212 }
2213
2214 if (sec != NULL && discarded_section (sec))
2215 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2216 rel, 1, relend, howto, 0, contents);
2217
2218 if (bfd_link_relocatable (info))
2219 continue;
2220
2221 resolved_to_zero = (h != NULL
2222 && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2223
2224 switch (r_type)
2225 {
2226 case R_390_GOTPLT12:
2227 case R_390_GOTPLT16:
2228 case R_390_GOTPLT20:
2229 case R_390_GOTPLT32:
2230 case R_390_GOTPLT64:
2231 case R_390_GOTPLTENT:
2232 /* There are three cases for a GOTPLT relocation. 1) The
2233 relocation is against the jump slot entry of a plt that
2234 will get emitted to the output file. 2) The relocation
2235 is against the jump slot of a plt entry that has been
2236 removed. elf_s390_adjust_gotplt has created a GOT entry
2237 as replacement. 3) The relocation is against a local symbol.
2238 Cases 2) and 3) are the same as the GOT relocation code
2239 so we just have to test for case 1 and fall through for
2240 the other two. */
2241 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2242 {
2243 bfd_vma plt_index;
2244
2245 if (s390_is_ifunc_symbol_p (h))
2246 {
2247 /* Entry indices of .iplt and .igot.plt match
2248 1:1. No magic PLT first entry here. */
2249 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2250 relocation = (plt_index * GOT_ENTRY_SIZE
2251 + s390_gotplt_offset (info)
2252 + htab->elf.igotplt->output_offset);
2253 }
2254 else
2255 {
2256 plt_index = ((h->plt.offset - PLT_FIRST_ENTRY_SIZE)
2257 / PLT_ENTRY_SIZE);
2258
2259 relocation = (plt_index * GOT_ENTRY_SIZE
2260 + s390_gotplt_offset (info));
2261 }
2262 if (r_type == R_390_GOTPLTENT)
2263 relocation += s390_got_pointer (info);
2264 unresolved_reloc = FALSE;
2265 break;
2266 }
2267 /* Fall through. */
2268
2269 case R_390_GOT12:
2270 case R_390_GOT16:
2271 case R_390_GOT20:
2272 case R_390_GOT32:
2273 case R_390_GOT64:
2274 case R_390_GOTENT:
2275 /* Relocation is to the entry for this symbol in the global
2276 offset table. */
2277 if (htab->elf.sgot == NULL)
2278 abort ();
2279
2280 if (h != NULL)
2281 {
2282 bfd_boolean dyn;
2283
2284 off = h->got.offset;
2285 dyn = htab->elf.dynamic_sections_created;
2286
2287 if (s390_is_ifunc_symbol_p (h))
2288 {
2289 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2290 if (off == (bfd_vma)-1)
2291 {
2292 /* No explicit GOT usage so redirect to the
2293 got.iplt slot. */
2294 relocation = (s390_gotplt_offset (info)
2295 + htab->elf.igotplt->output_offset
2296 + (h->plt.offset / PLT_ENTRY_SIZE
2297 * GOT_ENTRY_SIZE));
2298
2299 /* For @GOTENT the relocation is against the offset between
2300 the instruction and the symbols entry in the GOT and not
2301 between the start of the GOT and the symbols entry. We
2302 add the vma of the GOT to get the correct value. */
2303 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2304 relocation += s390_got_pointer (info);
2305
2306 break;
2307 }
2308 else
2309 {
2310 /* Explicit GOT slots must contain the address
2311 of the PLT slot. This will be handled in
2312 finish_dynamic_symbol. */
2313 }
2314 }
2315 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2316 bfd_link_pic (info),
2317 h)
2318 || (bfd_link_pic (info)
2319 && SYMBOL_REFERENCES_LOCAL (info, h))
2320 || resolved_to_zero)
2321 {
2322 Elf_Internal_Sym *isym;
2323 asection *sym_sec;
2324
2325 /* This is actually a static link, or it is a
2326 -Bsymbolic link and the symbol is defined
2327 locally, or the symbol was forced to be local
2328 because of a version file. We must initialize
2329 this entry in the global offset table. Since the
2330 offset must always be a multiple of 2, we use the
2331 least significant bit to record whether we have
2332 initialized it already.
2333
2334 When doing a dynamic link, we create a .rel.got
2335 relocation entry to initialize the value. This
2336 is done in the finish_dynamic_symbol routine. */
2337 if ((off & 1) != 0)
2338 off &= ~1;
2339 else
2340 {
2341 bfd_put_64 (output_bfd, relocation,
2342 htab->elf.sgot->contents + off);
2343 h->got.offset |= 1;
2344 }
2345
2346 /* When turning a GOT slot dereference into a direct
2347 reference using larl we have to make sure that
2348 the symbol is 1. properly aligned and 2. it is no
2349 ABS symbol or will become one. */
2350 if ((h->def_regular
2351 && bfd_link_pic (info)
2352 && SYMBOL_REFERENCES_LOCAL (info, h))
2353 /* lgrl rx,sym@GOTENT -> larl rx, sym */
2354 && ((r_type == R_390_GOTENT
2355 && (bfd_get_16 (input_bfd,
2356 contents + rel->r_offset - 2)
2357 & 0xff0f) == 0xc408)
2358 /* lg rx, sym@GOT(r12) -> larl rx, sym */
2359 || (r_type == R_390_GOT20
2360 && (bfd_get_32 (input_bfd,
2361 contents + rel->r_offset - 2)
2362 & 0xff00f000) == 0xe300c000
2363 && bfd_get_8 (input_bfd,
2364 contents + rel->r_offset + 3) == 0x04))
2365 && (isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2366 input_bfd, r_symndx))
2367 && isym->st_shndx != SHN_ABS
2368 && h != htab->elf.hdynamic
2369 && h != htab->elf.hgot
2370 && h != htab->elf.hplt
2371 && !(isym->st_value & 1)
2372 && (sym_sec = bfd_section_from_elf_index (input_bfd,
2373 isym->st_shndx))
2374 && sym_sec->alignment_power)
2375 {
2376 unsigned short new_insn =
2377 (0xc000 | (bfd_get_8 (input_bfd,
2378 contents + rel->r_offset - 1) & 0xf0));
2379 bfd_put_16 (output_bfd, new_insn,
2380 contents + rel->r_offset - 2);
2381 r_type = R_390_PC32DBL;
2382 rel->r_addend = 2;
2383 howto = elf_howto_table + r_type;
2384 relocation = h->root.u.def.value
2385 + h->root.u.def.section->output_section->vma
2386 + h->root.u.def.section->output_offset;
2387 goto do_relocation;
2388 }
2389 }
2390 else
2391 unresolved_reloc = FALSE;
2392 }
2393 else
2394 {
2395 if (local_got_offsets == NULL)
2396 abort ();
2397
2398 off = local_got_offsets[r_symndx];
2399
2400 /* The offset must always be a multiple of 8. We use
2401 the least significant bit to record whether we have
2402 already generated the necessary reloc. */
2403 if ((off & 1) != 0)
2404 off &= ~1;
2405 else
2406 {
2407 bfd_put_64 (output_bfd, relocation,
2408 htab->elf.sgot->contents + off);
2409
2410 if (bfd_link_pic (info))
2411 {
2412 asection *s;
2413 Elf_Internal_Rela outrel;
2414 bfd_byte *loc;
2415
2416 s = htab->elf.srelgot;
2417 if (s == NULL)
2418 abort ();
2419
2420 outrel.r_offset = (htab->elf.sgot->output_section->vma
2421 + htab->elf.sgot->output_offset
2422 + off);
2423 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2424 outrel.r_addend = relocation;
2425 loc = s->contents;
2426 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2427 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2428 }
2429
2430 local_got_offsets[r_symndx] |= 1;
2431 }
2432 }
2433
2434 if (off >= (bfd_vma) -2)
2435 abort ();
2436
2437 relocation = s390_got_offset (info) + off;
2438
2439 /* For @GOTENT the relocation is against the offset between
2440 the instruction and the symbols entry in the GOT and not
2441 between the start of the GOT and the symbols entry. We
2442 add the vma of the GOT to get the correct value. */
2443 if ( r_type == R_390_GOTENT
2444 || r_type == R_390_GOTPLTENT)
2445 relocation += s390_got_pointer (info);
2446
2447 break;
2448
2449 case R_390_GOTOFF16:
2450 case R_390_GOTOFF32:
2451 case R_390_GOTOFF64:
2452 /* Relocation is relative to the start of the global offset
2453 table. */
2454
2455 if (h != NULL
2456 && s390_is_ifunc_symbol_p (h)
2457 && h->def_regular
2458 && !bfd_link_executable (info))
2459 {
2460 relocation = (htab->elf.iplt->output_section->vma
2461 + htab->elf.iplt->output_offset
2462 + h->plt.offset
2463 - s390_got_pointer (info));
2464 goto do_relocation;
2465 }
2466
2467 relocation -= s390_got_pointer (info);
2468 break;
2469
2470 case R_390_GOTPC:
2471 case R_390_GOTPCDBL:
2472 /* Use global offset table as symbol value. */
2473 relocation = s390_got_pointer (info);
2474 unresolved_reloc = FALSE;
2475 break;
2476
2477 case R_390_PLT12DBL:
2478 case R_390_PLT16DBL:
2479 case R_390_PLT24DBL:
2480 case R_390_PLT32:
2481 case R_390_PLT32DBL:
2482 case R_390_PLT64:
2483 /* Relocation is to the entry for this symbol in the
2484 procedure linkage table. */
2485
2486 /* Resolve a PLT32 reloc against a local symbol directly,
2487 without using the procedure linkage table. */
2488 if (h == NULL)
2489 break;
2490
2491 if (h->plt.offset == (bfd_vma) -1
2492 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2493 {
2494 /* We didn't make a PLT entry for this symbol. This
2495 happens when statically linking PIC code, or when
2496 using -Bsymbolic. */
2497 break;
2498 }
2499 if (s390_is_ifunc_symbol_p (h))
2500 relocation = (htab->elf.iplt->output_section->vma
2501 + htab->elf.iplt->output_offset
2502 + h->plt.offset);
2503 else
2504 relocation = (htab->elf.splt->output_section->vma
2505 + htab->elf.splt->output_offset
2506 + h->plt.offset);
2507 unresolved_reloc = FALSE;
2508 break;
2509
2510 case R_390_PLTOFF16:
2511 case R_390_PLTOFF32:
2512 case R_390_PLTOFF64:
2513 /* Relocation is to the entry for this symbol in the
2514 procedure linkage table relative to the start of the GOT. */
2515
2516 /* For local symbols or if we didn't make a PLT entry for
2517 this symbol resolve the symbol directly. */
2518 if (h == NULL
2519 || h->plt.offset == (bfd_vma) -1
2520 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2521 {
2522 relocation -= s390_got_pointer (info);
2523 break;
2524 }
2525
2526 if (s390_is_ifunc_symbol_p (h))
2527 relocation = (htab->elf.iplt->output_section->vma
2528 + htab->elf.iplt->output_offset
2529 + h->plt.offset
2530 - s390_got_pointer (info));
2531 else
2532 relocation = (htab->elf.splt->output_section->vma
2533 + htab->elf.splt->output_offset
2534 + h->plt.offset
2535 - s390_got_pointer (info));
2536 unresolved_reloc = FALSE;
2537 break;
2538
2539 case R_390_PC16:
2540 case R_390_PC12DBL:
2541 case R_390_PC16DBL:
2542 case R_390_PC24DBL:
2543 case R_390_PC32:
2544 case R_390_PC32DBL:
2545 case R_390_PC64:
2546 if (h != NULL
2547 && bfd_link_pie (info)
2548 && !h->def_regular)
2549 {
2550 _bfd_error_handler (_("%pB: `%s' non-PLT reloc for symbol defined "
2551 "in shared library and accessed "
2552 "from executable "
2553 "(rebuild file with -fPIC ?)"),
2554 input_bfd, h->root.root.string);
2555 bfd_set_error (bfd_error_bad_value);
2556 return FALSE;
2557 }
2558 /* The target of these relocs are instruction operands
2559 residing in read-only sections. We cannot emit a runtime
2560 reloc for it. */
2561 if (h != NULL
2562 && s390_is_ifunc_symbol_p (h)
2563 && h->def_regular
2564 && bfd_link_pic (info))
2565 {
2566 relocation = (htab->elf.iplt->output_section->vma
2567 + htab->elf.iplt->output_offset
2568 + h->plt.offset);
2569 goto do_relocation;
2570 }
2571 /* Fall through. */
2572
2573 case R_390_8:
2574 case R_390_16:
2575 case R_390_32:
2576 case R_390_64:
2577
2578 if ((input_section->flags & SEC_ALLOC) == 0)
2579 break;
2580
2581 if (h != NULL
2582 && s390_is_ifunc_symbol_p (h)
2583 && h->def_regular)
2584 {
2585 if (!bfd_link_pic (info))
2586 {
2587 /* For a non-shared object the symbol will not
2588 change. Hence we can write the address of the
2589 target IPLT slot now. */
2590 relocation = (htab->elf.iplt->output_section->vma
2591 + htab->elf.iplt->output_offset
2592 + h ->plt.offset);
2593 goto do_relocation;
2594 }
2595 else
2596 {
2597 /* For shared objects a runtime relocation is needed. */
2598
2599 Elf_Internal_Rela outrel;
2600 asection *sreloc;
2601
2602 /* Need a dynamic relocation to get the real function
2603 address. */
2604 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2605 info,
2606 input_section,
2607 rel->r_offset);
2608 if (outrel.r_offset == (bfd_vma) -1
2609 || outrel.r_offset == (bfd_vma) -2)
2610 abort ();
2611
2612 outrel.r_offset += (input_section->output_section->vma
2613 + input_section->output_offset);
2614
2615 if (h->dynindx == -1
2616 || h->forced_local
2617 || bfd_link_executable (info))
2618 {
2619 /* This symbol is resolved locally. */
2620 outrel.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
2621 outrel.r_addend = (h->root.u.def.value
2622 + h->root.u.def.section->output_section->vma
2623 + h->root.u.def.section->output_offset);
2624 }
2625 else
2626 {
2627 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2628 outrel.r_addend = 0;
2629 }
2630
2631 sreloc = htab->elf.irelifunc;
2632 elf_append_rela (output_bfd, sreloc, &outrel);
2633
2634 /* If this reloc is against an external symbol, we
2635 do not want to fiddle with the addend. Otherwise,
2636 we need to include the symbol value so that it
2637 becomes an addend for the dynamic reloc. For an
2638 internal symbol, we have updated addend. */
2639 continue;
2640 }
2641 }
2642
2643 if ((bfd_link_pic (info)
2644 && (h == NULL
2645 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2646 && !resolved_to_zero)
2647 || h->root.type != bfd_link_hash_undefweak)
2648 && ((r_type != R_390_PC16
2649 && r_type != R_390_PC12DBL
2650 && r_type != R_390_PC16DBL
2651 && r_type != R_390_PC24DBL
2652 && r_type != R_390_PC32
2653 && r_type != R_390_PC32DBL
2654 && r_type != R_390_PC64)
2655 || !SYMBOL_CALLS_LOCAL (info, h)))
2656 || (ELIMINATE_COPY_RELOCS
2657 && !bfd_link_pic (info)
2658 && h != NULL
2659 && h->dynindx != -1
2660 && !h->non_got_ref
2661 && ((h->def_dynamic
2662 && !h->def_regular)
2663 || h->root.type == bfd_link_hash_undefweak
2664 || h->root.type == bfd_link_hash_undefined)))
2665 {
2666 Elf_Internal_Rela outrel;
2667 bfd_boolean skip, relocate;
2668 asection *sreloc;
2669 bfd_byte *loc;
2670
2671 /* When generating a shared object, these relocations
2672 are copied into the output file to be resolved at run
2673 time. */
2674 skip = FALSE;
2675 relocate = FALSE;
2676
2677 outrel.r_offset =
2678 _bfd_elf_section_offset (output_bfd, info, input_section,
2679 rel->r_offset);
2680 if (outrel.r_offset == (bfd_vma) -1)
2681 skip = TRUE;
2682 else if (outrel.r_offset == (bfd_vma) -2)
2683 skip = TRUE, relocate = TRUE;
2684
2685 outrel.r_offset += (input_section->output_section->vma
2686 + input_section->output_offset);
2687
2688 if (skip)
2689 memset (&outrel, 0, sizeof outrel);
2690 else if (h != NULL
2691 && h->dynindx != -1
2692 && (r_type == R_390_PC16
2693 || r_type == R_390_PC12DBL
2694 || r_type == R_390_PC16DBL
2695 || r_type == R_390_PC24DBL
2696 || r_type == R_390_PC32
2697 || r_type == R_390_PC32DBL
2698 || r_type == R_390_PC64
2699 || !bfd_link_pic (info)
2700 || !SYMBOLIC_BIND (info, h)
2701 || !h->def_regular))
2702 {
2703 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2704 outrel.r_addend = rel->r_addend;
2705 }
2706 else
2707 {
2708 /* This symbol is local, or marked to become local. */
2709 outrel.r_addend = relocation + rel->r_addend;
2710 if (r_type == R_390_64)
2711 {
2712 relocate = TRUE;
2713 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2714 }
2715 else
2716 {
2717 long sindx;
2718
2719 if (bfd_is_abs_section (sec))
2720 sindx = 0;
2721 else if (sec == NULL || sec->owner == NULL)
2722 {
2723 bfd_set_error(bfd_error_bad_value);
2724 return FALSE;
2725 }
2726 else
2727 {
2728 asection *osec;
2729
2730 osec = sec->output_section;
2731 sindx = elf_section_data (osec)->dynindx;
2732
2733 if (sindx == 0)
2734 {
2735 osec = htab->elf.text_index_section;
2736 sindx = elf_section_data (osec)->dynindx;
2737 }
2738 BFD_ASSERT (sindx != 0);
2739
2740 /* We are turning this relocation into one
2741 against a section symbol, so subtract out
2742 the output section's address but not the
2743 offset of the input section in the output
2744 section. */
2745 outrel.r_addend -= osec->vma;
2746 }
2747 outrel.r_info = ELF64_R_INFO (sindx, r_type);
2748 }
2749 }
2750
2751 sreloc = elf_section_data (input_section)->sreloc;
2752 if (sreloc == NULL)
2753 abort ();
2754
2755 loc = sreloc->contents;
2756 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2757 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2758
2759 /* If this reloc is against an external symbol, we do
2760 not want to fiddle with the addend. Otherwise, we
2761 need to include the symbol value so that it becomes
2762 an addend for the dynamic reloc. */
2763 if (! relocate)
2764 continue;
2765 }
2766
2767 break;
2768
2769 /* Relocations for tls literal pool entries. */
2770 case R_390_TLS_IE64:
2771 if (bfd_link_pic (info))
2772 {
2773 Elf_Internal_Rela outrel;
2774 asection *sreloc;
2775 bfd_byte *loc;
2776
2777 outrel.r_offset = rel->r_offset
2778 + input_section->output_section->vma
2779 + input_section->output_offset;
2780 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2781 sreloc = elf_section_data (input_section)->sreloc;
2782 if (sreloc == NULL)
2783 abort ();
2784 loc = sreloc->contents;
2785 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2786 bfd_elf64_swap_reloc_out (output_bfd, &outrel, loc);
2787 }
2788 /* Fall through. */
2789
2790 case R_390_TLS_GD64:
2791 case R_390_TLS_GOTIE64:
2792 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2793 tls_type = GOT_UNKNOWN;
2794 if (h == NULL && local_got_offsets)
2795 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2796 else if (h != NULL)
2797 {
2798 tls_type = elf_s390_hash_entry(h)->tls_type;
2799 if (!bfd_link_pic (info) && h->dynindx == -1 && tls_type >= GOT_TLS_IE)
2800 r_type = R_390_TLS_LE64;
2801 }
2802 if (r_type == R_390_TLS_GD64 && tls_type >= GOT_TLS_IE)
2803 r_type = R_390_TLS_IE64;
2804
2805 if (r_type == R_390_TLS_LE64)
2806 {
2807 /* This relocation gets optimized away by the local exec
2808 access optimization. */
2809 BFD_ASSERT (! unresolved_reloc);
2810 bfd_put_64 (output_bfd, -tpoff (info, relocation),
2811 contents + rel->r_offset);
2812 continue;
2813 }
2814
2815 if (htab->elf.sgot == NULL)
2816 abort ();
2817
2818 if (h != NULL)
2819 off = h->got.offset;
2820 else
2821 {
2822 if (local_got_offsets == NULL)
2823 abort ();
2824
2825 off = local_got_offsets[r_symndx];
2826 }
2827
2828 emit_tls_relocs:
2829
2830 if ((off & 1) != 0)
2831 off &= ~1;
2832 else
2833 {
2834 Elf_Internal_Rela outrel;
2835 bfd_byte *loc;
2836 int dr_type, indx;
2837
2838 if (htab->elf.srelgot == NULL)
2839 abort ();
2840
2841 outrel.r_offset = (htab->elf.sgot->output_section->vma
2842 + htab->elf.sgot->output_offset + off);
2843
2844 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2845 if (r_type == R_390_TLS_GD64)
2846 dr_type = R_390_TLS_DTPMOD;
2847 else
2848 dr_type = R_390_TLS_TPOFF;
2849 if (dr_type == R_390_TLS_TPOFF && indx == 0)
2850 outrel.r_addend = relocation - dtpoff_base (info);
2851 else
2852 outrel.r_addend = 0;
2853 outrel.r_info = ELF64_R_INFO (indx, dr_type);
2854 loc = htab->elf.srelgot->contents;
2855 loc += htab->elf.srelgot->reloc_count++
2856 * sizeof (Elf64_External_Rela);
2857 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2858
2859 if (r_type == R_390_TLS_GD64)
2860 {
2861 if (indx == 0)
2862 {
2863 BFD_ASSERT (! unresolved_reloc);
2864 bfd_put_64 (output_bfd,
2865 relocation - dtpoff_base (info),
2866 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2867 }
2868 else
2869 {
2870 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_DTPOFF);
2871 outrel.r_offset += GOT_ENTRY_SIZE;
2872 outrel.r_addend = 0;
2873 htab->elf.srelgot->reloc_count++;
2874 loc += sizeof (Elf64_External_Rela);
2875 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2876 }
2877 }
2878
2879 if (h != NULL)
2880 h->got.offset |= 1;
2881 else
2882 local_got_offsets[r_symndx] |= 1;
2883 }
2884
2885 if (off >= (bfd_vma) -2)
2886 abort ();
2887 if (r_type == ELF64_R_TYPE (rel->r_info))
2888 {
2889 relocation = htab->elf.sgot->output_offset + off;
2890 if (r_type == R_390_TLS_IE64 || r_type == R_390_TLS_IEENT)
2891 relocation += htab->elf.sgot->output_section->vma;
2892 unresolved_reloc = FALSE;
2893 }
2894 else
2895 {
2896 bfd_put_64 (output_bfd, htab->elf.sgot->output_offset + off,
2897 contents + rel->r_offset);
2898 continue;
2899 }
2900 break;
2901
2902 case R_390_TLS_GOTIE12:
2903 case R_390_TLS_GOTIE20:
2904 case R_390_TLS_IEENT:
2905 if (h == NULL)
2906 {
2907 if (local_got_offsets == NULL)
2908 abort();
2909 off = local_got_offsets[r_symndx];
2910 if (bfd_link_pic (info))
2911 goto emit_tls_relocs;
2912 }
2913 else
2914 {
2915 off = h->got.offset;
2916 tls_type = elf_s390_hash_entry(h)->tls_type;
2917 if (bfd_link_pic (info) || h->dynindx != -1 || tls_type < GOT_TLS_IE)
2918 goto emit_tls_relocs;
2919 }
2920
2921 if (htab->elf.sgot == NULL)
2922 abort ();
2923
2924 BFD_ASSERT (! unresolved_reloc);
2925 bfd_put_64 (output_bfd, -tpoff (info, relocation),
2926 htab->elf.sgot->contents + off);
2927 relocation = htab->elf.sgot->output_offset + off;
2928 if (r_type == R_390_TLS_IEENT)
2929 relocation += htab->elf.sgot->output_section->vma;
2930 unresolved_reloc = FALSE;
2931 break;
2932
2933 case R_390_TLS_LDM64:
2934 if (! bfd_link_pic (info))
2935 /* The literal pool entry this relocation refers to gets ignored
2936 by the optimized code of the local exec model. Do nothing
2937 and the value will turn out zero. */
2938 continue;
2939
2940 if (htab->elf.sgot == NULL)
2941 abort ();
2942
2943 off = htab->tls_ldm_got.offset;
2944 if (off & 1)
2945 off &= ~1;
2946 else
2947 {
2948 Elf_Internal_Rela outrel;
2949 bfd_byte *loc;
2950
2951 if (htab->elf.srelgot == NULL)
2952 abort ();
2953
2954 outrel.r_offset = (htab->elf.sgot->output_section->vma
2955 + htab->elf.sgot->output_offset + off);
2956
2957 bfd_put_64 (output_bfd, 0,
2958 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2959 outrel.r_info = ELF64_R_INFO (0, R_390_TLS_DTPMOD);
2960 outrel.r_addend = 0;
2961 loc = htab->elf.srelgot->contents;
2962 loc += htab->elf.srelgot->reloc_count++
2963 * sizeof (Elf64_External_Rela);
2964 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2965 htab->tls_ldm_got.offset |= 1;
2966 }
2967 relocation = htab->elf.sgot->output_offset + off;
2968 unresolved_reloc = FALSE;
2969 break;
2970
2971 case R_390_TLS_LE64:
2972 if (bfd_link_dll (info))
2973 {
2974 /* Linking a shared library with non-fpic code requires
2975 a R_390_TLS_TPOFF relocation. */
2976 Elf_Internal_Rela outrel;
2977 asection *sreloc;
2978 bfd_byte *loc;
2979 int indx;
2980
2981 outrel.r_offset = rel->r_offset
2982 + input_section->output_section->vma
2983 + input_section->output_offset;
2984 if (h != NULL && h->dynindx != -1)
2985 indx = h->dynindx;
2986 else
2987 indx = 0;
2988 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_TPOFF);
2989 if (indx == 0)
2990 outrel.r_addend = relocation - dtpoff_base (info);
2991 else
2992 outrel.r_addend = 0;
2993 sreloc = elf_section_data (input_section)->sreloc;
2994 if (sreloc == NULL)
2995 abort ();
2996 loc = sreloc->contents;
2997 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2998 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2999 }
3000 else
3001 {
3002 BFD_ASSERT (! unresolved_reloc);
3003 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3004 contents + rel->r_offset);
3005 }
3006 continue;
3007
3008 case R_390_TLS_LDO64:
3009 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
3010 relocation -= dtpoff_base (info);
3011 else
3012 /* When converting LDO to LE, we must negate. */
3013 relocation = -tpoff (info, relocation);
3014 break;
3015
3016 /* Relocations for tls instructions. */
3017 case R_390_TLS_LOAD:
3018 case R_390_TLS_GDCALL:
3019 case R_390_TLS_LDCALL:
3020 tls_type = GOT_UNKNOWN;
3021 if (h == NULL && local_got_offsets)
3022 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3023 else if (h != NULL)
3024 tls_type = elf_s390_hash_entry(h)->tls_type;
3025
3026 if (tls_type == GOT_TLS_GD)
3027 continue;
3028
3029 if (r_type == R_390_TLS_LOAD)
3030 {
3031 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3032 {
3033 /* IE->LE transition. Four valid cases:
3034 lg %rx,(0,%ry) -> sllg %rx,%ry,0
3035 lg %rx,(%ry,0) -> sllg %rx,%ry,0
3036 lg %rx,(%ry,%r12) -> sllg %rx,%ry,0
3037 lg %rx,(%r12,%ry) -> sllg %rx,%ry,0 */
3038 unsigned int insn0, insn1, ry;
3039
3040 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3041 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3042 if (insn1 != 0x0004)
3043 {
3044 invalid_tls_insn (input_bfd, input_section, rel);
3045 return FALSE;
3046 }
3047 if ((insn0 & 0xff00f000) == 0xe3000000)
3048 /* lg %rx,0(%ry,0) -> sllg %rx,%ry,0 */
3049 ry = (insn0 & 0x000f0000);
3050 else if ((insn0 & 0xff0f0000) == 0xe3000000)
3051 /* lg %rx,0(0,%ry) -> sllg %rx,%ry,0 */
3052 ry = (insn0 & 0x0000f000) << 4;
3053 else if ((insn0 & 0xff00f000) == 0xe300c000)
3054 /* lg %rx,0(%ry,%r12) -> sllg %rx,%ry,0 */
3055 ry = (insn0 & 0x000f0000);
3056 else if ((insn0 & 0xff0f0000) == 0xe30c0000)
3057 /* lg %rx,0(%r12,%ry) -> sllg %rx,%ry,0 */
3058 ry = (insn0 & 0x0000f000) << 4;
3059 else
3060 {
3061 invalid_tls_insn (input_bfd, input_section, rel);
3062 return FALSE;
3063 }
3064 insn0 = 0xeb000000 | (insn0 & 0x00f00000) | ry;
3065 insn1 = 0x000d;
3066 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3067 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3068 }
3069 }
3070 else if (r_type == R_390_TLS_GDCALL)
3071 {
3072 unsigned int insn0, insn1;
3073
3074 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3075 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3076 if ((insn0 & 0xffff0000) != 0xc0e50000)
3077 {
3078 invalid_tls_insn (input_bfd, input_section, rel);
3079 return FALSE;
3080 }
3081 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3082 {
3083 /* GD->LE transition.
3084 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3085 insn0 = 0xc0040000;
3086 insn1 = 0x0000;
3087 }
3088 else
3089 {
3090 /* GD->IE transition.
3091 brasl %r14,__tls_get_addr@plt -> lg %r2,0(%r2,%r12) */
3092 insn0 = 0xe322c000;
3093 insn1 = 0x0004;
3094 }
3095 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3096 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3097 }
3098 else if (r_type == R_390_TLS_LDCALL)
3099 {
3100 if (!bfd_link_pic (info))
3101 {
3102 unsigned int insn0, insn1;
3103
3104 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3105 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3106 if ((insn0 & 0xffff0000) != 0xc0e50000)
3107 {
3108 invalid_tls_insn (input_bfd, input_section, rel);
3109 return FALSE;
3110 }
3111 /* LD->LE transition.
3112 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3113 insn0 = 0xc0040000;
3114 insn1 = 0x0000;
3115 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3116 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3117 }
3118 }
3119 continue;
3120
3121 default:
3122 break;
3123 }
3124
3125 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3126 because such sections are not SEC_ALLOC and thus ld.so will
3127 not process them. */
3128 if (unresolved_reloc
3129 && !((input_section->flags & SEC_DEBUGGING) != 0
3130 && h->def_dynamic)
3131 && _bfd_elf_section_offset (output_bfd, info, input_section,
3132 rel->r_offset) != (bfd_vma) -1)
3133 _bfd_error_handler
3134 /* xgettext:c-format */
3135 (_("%pB(%pA+%#" PRIx64 "): "
3136 "unresolvable %s relocation against symbol `%s'"),
3137 input_bfd,
3138 input_section,
3139 (uint64_t) rel->r_offset,
3140 howto->name,
3141 h->root.root.string);
3142
3143 do_relocation:
3144
3145 /* When applying a 24 bit reloc we need to start one byte
3146 earlier. Otherwise the 32 bit get/put bfd operations might
3147 access a byte after the actual section. */
3148 if (r_type == R_390_PC24DBL
3149 || r_type == R_390_PLT24DBL)
3150 rel->r_offset--;
3151
3152 if (r_type == R_390_20
3153 || r_type == R_390_GOT20
3154 || r_type == R_390_GOTPLT20
3155 || r_type == R_390_TLS_GOTIE20)
3156 {
3157 relocation += rel->r_addend;
3158 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3159 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3160 contents, rel->r_offset,
3161 relocation, 0);
3162 }
3163 else
3164 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3165 contents, rel->r_offset,
3166 relocation, rel->r_addend);
3167
3168 if (r != bfd_reloc_ok)
3169 {
3170 const char *name;
3171
3172 if (h != NULL)
3173 name = h->root.root.string;
3174 else
3175 {
3176 name = bfd_elf_string_from_elf_section (input_bfd,
3177 symtab_hdr->sh_link,
3178 sym->st_name);
3179 if (name == NULL)
3180 return FALSE;
3181 if (*name == '\0')
3182 name = bfd_section_name (sec);
3183 }
3184
3185 if (r == bfd_reloc_overflow)
3186 (*info->callbacks->reloc_overflow)
3187 (info, (h ? &h->root : NULL), name, howto->name,
3188 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3189 else
3190 {
3191 _bfd_error_handler
3192 /* xgettext:c-format */
3193 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3194 input_bfd, input_section,
3195 (uint64_t) rel->r_offset, name, (int) r);
3196 return FALSE;
3197 }
3198 }
3199 }
3200
3201 return TRUE;
3202 }
3203
3204 /* Generate the PLT slots together with the dynamic relocations needed
3205 for IFUNC symbols. */
3206
3207 static void
3208 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3209 struct bfd_link_info *info,
3210 struct elf_link_hash_entry *h,
3211 struct elf_s390_link_hash_table *htab,
3212 bfd_vma plt_offset,
3213 bfd_vma resolver_address)
3214 {
3215 bfd_vma plt_index;
3216 bfd_vma got_offset;
3217 Elf_Internal_Rela rela;
3218 bfd_byte *loc;
3219 asection *plt, *gotplt, *relplt;
3220
3221 if (htab->elf.iplt == NULL
3222 || htab->elf.igotplt == NULL
3223 || htab->elf.irelplt == NULL)
3224 abort ();
3225
3226 /* Index of the PLT slot within iplt section. */
3227 plt_index = plt_offset / PLT_ENTRY_SIZE;
3228 plt = htab->elf.iplt;
3229 /* Offset into the igot.plt section. */
3230 got_offset = plt_index * GOT_ENTRY_SIZE;
3231 gotplt = htab->elf.igotplt;
3232 relplt = htab->elf.irelplt;
3233
3234 /* Fill in the blueprint of a PLT. */
3235 memcpy (plt->contents + plt_offset, elf_s390x_plt_entry,
3236 PLT_ENTRY_SIZE);
3237
3238 /* Fixup the relative address to the GOT entry */
3239 bfd_put_32 (output_bfd,
3240 (gotplt->output_section->vma +
3241 gotplt->output_offset + got_offset
3242 - (plt->output_section->vma +
3243 plt->output_offset +
3244 plt_offset))/2,
3245 plt->contents + plt_offset + 2);
3246 /* Fixup the relative branch to PLT 0 */
3247 bfd_put_32 (output_bfd, - (plt->output_offset +
3248 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3249 plt->contents + plt_offset + 24);
3250 /* Fixup offset into .rela.plt section. */
3251 bfd_put_32 (output_bfd, relplt->output_offset +
3252 plt_index * sizeof (Elf64_External_Rela),
3253 plt->contents + plt_offset + 28);
3254
3255 /* Fill in the entry in the global offset table.
3256 Points to instruction after GOT offset. */
3257 bfd_put_64 (output_bfd,
3258 (plt->output_section->vma
3259 + plt->output_offset
3260 + plt_offset
3261 + 14),
3262 gotplt->contents + got_offset);
3263
3264 /* Fill in the entry in the .rela.plt section. */
3265 rela.r_offset = (gotplt->output_section->vma
3266 + gotplt->output_offset
3267 + got_offset);
3268
3269 if (!h
3270 || h->dynindx == -1
3271 || ((bfd_link_executable (info)
3272 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3273 && h->def_regular))
3274 {
3275 /* The symbol can be locally resolved. */
3276 rela.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
3277 rela.r_addend = resolver_address;
3278 }
3279 else
3280 {
3281 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3282 rela.r_addend = 0;
3283 }
3284
3285 loc = relplt->contents + plt_index * sizeof (Elf64_External_Rela);
3286 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3287 }
3288
3289
3290 /* Finish up dynamic symbol handling. We set the contents of various
3291 dynamic sections here. */
3292
3293 static bfd_boolean
3294 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3295 struct bfd_link_info *info,
3296 struct elf_link_hash_entry *h,
3297 Elf_Internal_Sym *sym)
3298 {
3299 struct elf_s390_link_hash_table *htab;
3300 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3301
3302 htab = elf_s390_hash_table (info);
3303 if (htab == NULL)
3304 return FALSE;
3305
3306 if (h->plt.offset != (bfd_vma) -1)
3307 {
3308 bfd_vma plt_index;
3309 bfd_vma gotplt_offset;
3310 Elf_Internal_Rela rela;
3311 bfd_byte *loc;
3312
3313 /* This symbol has an entry in the procedure linkage table. Set
3314 it up. */
3315 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3316 {
3317 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3318 htab, h->plt.offset,
3319 eh->ifunc_resolver_address +
3320 eh->ifunc_resolver_section->output_offset +
3321 eh->ifunc_resolver_section->output_section->vma);
3322
3323 /* Do not return yet. Handling of explicit GOT slots of
3324 IFUNC symbols is below. */
3325 }
3326 else
3327 {
3328 if (h->dynindx == -1
3329 || htab->elf.splt == NULL
3330 || htab->elf.sgotplt == NULL
3331 || htab->elf.srelplt == NULL)
3332 abort ();
3333
3334 /* Calc. index no.
3335 Current offset - size first entry / entry size. */
3336 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3337
3338 /* The slots in the .got.plt correspond to the PLT slots in
3339 the same order. */
3340 gotplt_offset = plt_index * GOT_ENTRY_SIZE;
3341
3342 /* If .got.plt comes first it needs to contain the 3 header
3343 entries. */
3344 if (!s390_gotplt_after_got_p (info))
3345 gotplt_offset += 3 * GOT_ENTRY_SIZE;
3346
3347 /* Fill in the blueprint of a PLT. */
3348 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390x_plt_entry,
3349 PLT_ENTRY_SIZE);
3350
3351 /* The first instruction in the PLT entry is a LARL loading
3352 the address of the GOT slot. We write the 4 byte
3353 immediate operand of the LARL instruction here. */
3354 bfd_put_32 (output_bfd,
3355 (htab->elf.sgotplt->output_section->vma +
3356 htab->elf.sgotplt->output_offset + gotplt_offset
3357 - (htab->elf.splt->output_section->vma +
3358 htab->elf.splt->output_offset +
3359 h->plt.offset))/2,
3360 htab->elf.splt->contents + h->plt.offset + 2);
3361 /* Fixup the relative branch to PLT 0 */
3362 bfd_put_32 (output_bfd, - (PLT_FIRST_ENTRY_SIZE +
3363 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3364 htab->elf.splt->contents + h->plt.offset + 24);
3365 /* Fixup offset into .rela.plt section. */
3366 bfd_put_32 (output_bfd, plt_index * sizeof (Elf64_External_Rela),
3367 htab->elf.splt->contents + h->plt.offset + 28);
3368
3369 /* Fill in the entry in the global offset table.
3370 Points to instruction after GOT offset. */
3371 bfd_put_64 (output_bfd,
3372 (htab->elf.splt->output_section->vma
3373 + htab->elf.splt->output_offset
3374 + h->plt.offset
3375 + 14),
3376 htab->elf.sgotplt->contents + gotplt_offset);
3377
3378 /* Fill in the entry in the .rela.plt section. */
3379 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3380 + htab->elf.sgotplt->output_offset
3381 + gotplt_offset);
3382 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3383 rela.r_addend = 0;
3384 loc = htab->elf.srelplt->contents + plt_index *
3385 sizeof (Elf64_External_Rela);
3386 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3387
3388 if (!h->def_regular)
3389 {
3390 /* Mark the symbol as undefined, rather than as defined in
3391 the .plt section. Leave the value alone. This is a clue
3392 for the dynamic linker, to make function pointer
3393 comparisons work between an application and shared
3394 library. */
3395 sym->st_shndx = SHN_UNDEF;
3396 }
3397 }
3398 }
3399
3400 if (h->got.offset != (bfd_vma) -1
3401 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3402 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3403 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3404 {
3405 Elf_Internal_Rela rela;
3406 bfd_byte *loc;
3407
3408 /* This symbol has an entry in the global offset table. Set it
3409 up. */
3410 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3411 abort ();
3412
3413 rela.r_offset = (htab->elf.sgot->output_section->vma
3414 + htab->elf.sgot->output_offset
3415 + (h->got.offset &~ (bfd_vma) 1));
3416
3417 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3418 {
3419 if (bfd_link_pic (info))
3420 {
3421 /* An explicit GOT slot usage needs GLOB_DAT. If the
3422 symbol references local the implicit got.iplt slot
3423 will be used and the IRELATIVE reloc has been created
3424 above. */
3425 goto do_glob_dat;
3426 }
3427 else
3428 {
3429 /* For non-shared objects explicit GOT slots must be
3430 filled with the PLT slot address for pointer
3431 equality reasons. */
3432 bfd_put_64 (output_bfd, (htab->elf.iplt->output_section->vma
3433 + htab->elf.iplt->output_offset
3434 + h->plt.offset),
3435 htab->elf.sgot->contents + h->got.offset);
3436 return TRUE;
3437 }
3438 }
3439 else if (bfd_link_pic (info)
3440 && SYMBOL_REFERENCES_LOCAL (info, h))
3441 {
3442 if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
3443 return TRUE;
3444
3445 /* If this is a static link, or it is a -Bsymbolic link and
3446 the symbol is defined locally or was forced to be local
3447 because of a version file, we just want to emit a
3448 RELATIVE reloc. The entry in the global offset table
3449 will already have been initialized in the
3450 relocate_section function. */
3451 if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
3452 return FALSE;
3453 BFD_ASSERT((h->got.offset & 1) != 0);
3454 rela.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
3455 rela.r_addend = (h->root.u.def.value
3456 + h->root.u.def.section->output_section->vma
3457 + h->root.u.def.section->output_offset);
3458 }
3459 else
3460 {
3461 BFD_ASSERT((h->got.offset & 1) == 0);
3462 do_glob_dat:
3463 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3464 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_GLOB_DAT);
3465 rela.r_addend = 0;
3466 }
3467
3468 loc = htab->elf.srelgot->contents;
3469 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
3470 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3471 }
3472
3473 if (h->needs_copy)
3474 {
3475 Elf_Internal_Rela rela;
3476 asection *s;
3477 bfd_byte *loc;
3478
3479 /* This symbols needs a copy reloc. Set it up. */
3480
3481 if (h->dynindx == -1
3482 || (h->root.type != bfd_link_hash_defined
3483 && h->root.type != bfd_link_hash_defweak)
3484 || htab->elf.srelbss == NULL)
3485 abort ();
3486
3487 rela.r_offset = (h->root.u.def.value
3488 + h->root.u.def.section->output_section->vma
3489 + h->root.u.def.section->output_offset);
3490 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_COPY);
3491 rela.r_addend = 0;
3492 if (h->root.u.def.section == htab->elf.sdynrelro)
3493 s = htab->elf.sreldynrelro;
3494 else
3495 s = htab->elf.srelbss;
3496 loc = s->contents + s->reloc_count++ * sizeof (Elf64_External_Rela);
3497 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3498 }
3499
3500 /* Mark some specially defined symbols as absolute. */
3501 if (h == htab->elf.hdynamic
3502 || h == htab->elf.hgot
3503 || h == htab->elf.hplt)
3504 sym->st_shndx = SHN_ABS;
3505
3506 return TRUE;
3507 }
3508
3509 /* Used to decide how to sort relocs in an optimal manner for the
3510 dynamic linker, before writing them out. */
3511
3512 static enum elf_reloc_type_class
3513 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3514 const asection *rel_sec ATTRIBUTE_UNUSED,
3515 const Elf_Internal_Rela *rela)
3516 {
3517 bfd *abfd = info->output_bfd;
3518 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3519 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3520 unsigned long r_symndx = ELF64_R_SYM (rela->r_info);
3521 Elf_Internal_Sym sym;
3522
3523 if (htab->elf.dynsym == NULL
3524 || !bed->s->swap_symbol_in (abfd,
3525 (htab->elf.dynsym->contents
3526 + r_symndx * bed->s->sizeof_sym),
3527 0, &sym))
3528 abort ();
3529
3530 /* Check relocation against STT_GNU_IFUNC symbol. */
3531 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3532 return reloc_class_ifunc;
3533
3534 switch ((int) ELF64_R_TYPE (rela->r_info))
3535 {
3536 case R_390_RELATIVE:
3537 return reloc_class_relative;
3538 case R_390_JMP_SLOT:
3539 return reloc_class_plt;
3540 case R_390_COPY:
3541 return reloc_class_copy;
3542 default:
3543 return reloc_class_normal;
3544 }
3545 }
3546
3547 /* Finish up the dynamic sections. */
3548
3549 static bfd_boolean
3550 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3551 struct bfd_link_info *info)
3552 {
3553 struct elf_s390_link_hash_table *htab;
3554 bfd *dynobj;
3555 asection *sdyn;
3556 bfd *ibfd;
3557 unsigned int i;
3558
3559 htab = elf_s390_hash_table (info);
3560 if (htab == NULL)
3561 return FALSE;
3562
3563 dynobj = htab->elf.dynobj;
3564 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3565
3566 if (htab->elf.dynamic_sections_created)
3567 {
3568 Elf64_External_Dyn *dyncon, *dynconend;
3569
3570 if (sdyn == NULL || htab->elf.sgot == NULL)
3571 abort ();
3572
3573 dyncon = (Elf64_External_Dyn *) sdyn->contents;
3574 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
3575 for (; dyncon < dynconend; dyncon++)
3576 {
3577 Elf_Internal_Dyn dyn;
3578 asection *s;
3579
3580 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
3581
3582 switch (dyn.d_tag)
3583 {
3584 default:
3585 continue;
3586
3587 case DT_PLTGOT:
3588 /* DT_PLTGOT matches _GLOBAL_OFFSET_TABLE_ */
3589 dyn.d_un.d_ptr = s390_got_pointer (info);
3590 break;
3591
3592 case DT_JMPREL:
3593 s = htab->elf.srelplt;
3594 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3595 break;
3596
3597 case DT_PLTRELSZ:
3598 dyn.d_un.d_val = htab->elf.srelplt->size;
3599 if (htab->elf.irelplt)
3600 dyn.d_un.d_val += htab->elf.irelplt->size;
3601 break;
3602
3603 case DT_RELASZ:
3604 /* The procedure linkage table relocs (DT_JMPREL) should
3605 not be included in the overall relocs (DT_RELA).
3606 Therefore, we override the DT_RELASZ entry here to
3607 make it not include the JMPREL relocs. Since the
3608 linker script arranges for .rela.plt to follow all
3609 other relocation sections, we don't have to worry
3610 about changing the DT_RELA entry. */
3611 dyn.d_un.d_val -= htab->elf.srelplt->size;
3612 if (htab->elf.irelplt)
3613 dyn.d_un.d_val -= htab->elf.irelplt->size;
3614 break;
3615 }
3616
3617 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
3618 }
3619
3620 /* Fill in the special first entry in the procedure linkage table. */
3621 if (htab->elf.splt && htab->elf.splt->size > 0)
3622 {
3623 /* fill in blueprint for plt 0 entry */
3624 memcpy (htab->elf.splt->contents, elf_s390x_first_plt_entry,
3625 PLT_FIRST_ENTRY_SIZE);
3626 /* The second instruction in the first PLT entry is a LARL
3627 loading the GOT pointer. Fill in the LARL immediate
3628 address. */
3629 bfd_put_32 (output_bfd,
3630 (s390_got_pointer (info)
3631 - htab->elf.splt->output_section->vma
3632 - htab->elf.splt->output_offset - 6)/2,
3633 htab->elf.splt->contents + 8);
3634 }
3635 if (elf_section_data (htab->elf.splt->output_section) != NULL)
3636 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
3637 = PLT_ENTRY_SIZE;
3638 }
3639
3640 if (htab->elf.hgot && htab->elf.hgot->root.u.def.section)
3641 {
3642 /* Fill in the first three entries in the global offset table. */
3643 if (htab->elf.hgot->root.u.def.section->size > 0)
3644 {
3645 bfd_put_64 (output_bfd,
3646 (sdyn == NULL ? (bfd_vma) 0
3647 : sdyn->output_section->vma + sdyn->output_offset),
3648 htab->elf.hgot->root.u.def.section->contents);
3649 /* One entry for shared object struct ptr. */
3650 bfd_put_64 (output_bfd, (bfd_vma) 0,
3651 htab->elf.hgot->root.u.def.section->contents + 8);
3652 /* One entry for _dl_runtime_resolve. */
3653 bfd_put_64 (output_bfd, (bfd_vma) 0,
3654 htab->elf.hgot->root.u.def.section->contents + 16);
3655 }
3656 elf_section_data (htab->elf.sgot->output_section)
3657 ->this_hdr.sh_entsize = 8;
3658 }
3659
3660 /* Finish dynamic symbol for local IFUNC symbols. */
3661 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3662 {
3663 struct plt_entry *local_plt;
3664 Elf_Internal_Sym *isym;
3665 Elf_Internal_Shdr *symtab_hdr;
3666
3667 symtab_hdr = &elf_symtab_hdr (ibfd);
3668
3669 if (!is_s390_elf (ibfd))
3670 continue;
3671
3672 local_plt = elf_s390_local_plt (ibfd);
3673 if (local_plt != NULL)
3674 for (i = 0; i < symtab_hdr->sh_info; i++)
3675 {
3676 if (local_plt[i].plt.offset != (bfd_vma) -1)
3677 {
3678 asection *sec = local_plt[i].sec;
3679 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3680 if (isym == NULL)
3681 return FALSE;
3682
3683 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3684 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3685 local_plt[i].plt.offset,
3686 isym->st_value
3687 + sec->output_section->vma
3688 + sec->output_offset);
3689
3690 }
3691 }
3692 }
3693
3694 return TRUE;
3695 }
3696 \f
3697 /* Support for core dump NOTE sections. */
3698
3699 static bfd_boolean
3700 elf_s390_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3701 {
3702 int offset;
3703 size_t size;
3704
3705 switch (note->descsz)
3706 {
3707 default:
3708 return FALSE;
3709
3710 case 336: /* sizeof(struct elf_prstatus) on s390x */
3711 /* pr_cursig */
3712 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3713
3714 /* pr_pid */
3715 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
3716
3717 /* pr_reg */
3718 offset = 112;
3719 size = 216;
3720 break;
3721 }
3722
3723 /* Make a ".reg/999" section. */
3724 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3725 size, note->descpos + offset);
3726 }
3727
3728 static bfd_boolean
3729 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3730 {
3731 switch (note->descsz)
3732 {
3733 default:
3734 return FALSE;
3735
3736 case 136: /* sizeof(struct elf_prpsinfo) on s390x */
3737 elf_tdata (abfd)->core->pid
3738 = bfd_get_32 (abfd, note->descdata + 24);
3739 elf_tdata (abfd)->core->program
3740 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
3741 elf_tdata (abfd)->core->command
3742 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3743 }
3744
3745 /* Note that for some reason, a spurious space is tacked
3746 onto the end of the args in some (at least one anyway)
3747 implementations, so strip it off if it exists. */
3748
3749 {
3750 char *command = elf_tdata (abfd)->core->command;
3751 int n = strlen (command);
3752
3753 if (0 < n && command[n - 1] == ' ')
3754 command[n - 1] = '\0';
3755 }
3756
3757 return TRUE;
3758 }
3759
3760 static char *
3761 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3762 int note_type, ...)
3763 {
3764 va_list ap;
3765
3766 switch (note_type)
3767 {
3768 default:
3769 return NULL;
3770
3771 case NT_PRPSINFO:
3772 {
3773 char data[136] ATTRIBUTE_NONSTRING = { 0 };
3774 const char *fname, *psargs;
3775
3776 va_start (ap, note_type);
3777 fname = va_arg (ap, const char *);
3778 psargs = va_arg (ap, const char *);
3779 va_end (ap);
3780
3781 strncpy (data + 40, fname, 16);
3782 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3783 DIAGNOSTIC_PUSH;
3784 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
3785 -Wstringop-truncation:
3786 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3787 */
3788 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3789 #endif
3790 strncpy (data + 56, psargs, 80);
3791 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3792 DIAGNOSTIC_POP;
3793 #endif
3794 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3795 &data, sizeof (data));
3796 }
3797
3798 case NT_PRSTATUS:
3799 {
3800 char data[336] = { 0 };
3801 long pid;
3802 int cursig;
3803 const void *gregs;
3804
3805 va_start (ap, note_type);
3806 pid = va_arg (ap, long);
3807 cursig = va_arg (ap, int);
3808 gregs = va_arg (ap, const void *);
3809 va_end (ap);
3810
3811 bfd_put_16 (abfd, cursig, data + 12);
3812 bfd_put_32 (abfd, pid, data + 32);
3813 memcpy (data + 112, gregs, 216);
3814 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3815 &data, sizeof (data));
3816 }
3817 }
3818 /* NOTREACHED */
3819 }
3820 \f
3821 /* Return address for Ith PLT stub in section PLT, for relocation REL
3822 or (bfd_vma) -1 if it should not be included. */
3823
3824 static bfd_vma
3825 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3826 const arelent *rel ATTRIBUTE_UNUSED)
3827 {
3828 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3829 }
3830
3831 /* Merge backend specific data from an object file to the output
3832 object file when linking. */
3833
3834 static bfd_boolean
3835 elf64_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3836 {
3837 if (!is_s390_elf (ibfd) || !is_s390_elf (info->output_bfd))
3838 return TRUE;
3839
3840 return elf_s390_merge_obj_attributes (ibfd, info);
3841 }
3842
3843 /* We may add a PT_S390_PGSTE program header. */
3844
3845 static int
3846 elf_s390_additional_program_headers (bfd *abfd ATTRIBUTE_UNUSED,
3847 struct bfd_link_info *info)
3848 {
3849 struct elf_s390_link_hash_table *htab;
3850
3851 if (info)
3852 {
3853 htab = elf_s390_hash_table (info);
3854 if (htab)
3855 return htab->params->pgste;
3856 }
3857 return 0;
3858 }
3859
3860
3861 /* Add the PT_S390_PGSTE program header. */
3862
3863 static bfd_boolean
3864 elf_s390_modify_segment_map (bfd *abfd, struct bfd_link_info *info)
3865 {
3866 struct elf_s390_link_hash_table *htab;
3867 struct elf_segment_map *m, *pm = NULL;
3868
3869 if (!abfd || !info)
3870 return TRUE;
3871
3872 htab = elf_s390_hash_table (info);
3873 if (!htab || !htab->params->pgste)
3874 return TRUE;
3875
3876 /* If there is already a PT_S390_PGSTE header, avoid adding
3877 another. */
3878 m = elf_seg_map (abfd);
3879 while (m && m->p_type != PT_S390_PGSTE)
3880 {
3881 pm = m;
3882 m = m->next;
3883 }
3884
3885 if (m)
3886 return TRUE;
3887
3888 m = (struct elf_segment_map *)
3889 bfd_zalloc (abfd, sizeof (struct elf_segment_map));
3890 if (m == NULL)
3891 return FALSE;
3892 m->p_type = PT_S390_PGSTE;
3893 m->count = 0;
3894 m->next = NULL;
3895 if (pm)
3896 pm->next = m;
3897
3898 return TRUE;
3899 }
3900
3901 bfd_boolean
3902 bfd_elf_s390_set_options (struct bfd_link_info *info,
3903 struct s390_elf_params *params)
3904 {
3905 struct elf_s390_link_hash_table *htab;
3906
3907 if (info)
3908 {
3909 htab = elf_s390_hash_table (info);
3910 if (htab)
3911 htab->params = params;
3912 }
3913
3914 return TRUE;
3915 }
3916
3917
3918 /* Why was the hash table entry size definition changed from
3919 ARCH_SIZE/8 to 4? This breaks the 64 bit dynamic linker and
3920 this is the only reason for the s390_elf64_size_info structure. */
3921
3922 const struct elf_size_info s390_elf64_size_info =
3923 {
3924 sizeof (Elf64_External_Ehdr),
3925 sizeof (Elf64_External_Phdr),
3926 sizeof (Elf64_External_Shdr),
3927 sizeof (Elf64_External_Rel),
3928 sizeof (Elf64_External_Rela),
3929 sizeof (Elf64_External_Sym),
3930 sizeof (Elf64_External_Dyn),
3931 sizeof (Elf_External_Note),
3932 8, /* hash-table entry size. */
3933 1, /* internal relocations per external relocations. */
3934 64, /* arch_size. */
3935 3, /* log_file_align. */
3936 ELFCLASS64, EV_CURRENT,
3937 bfd_elf64_write_out_phdrs,
3938 bfd_elf64_write_shdrs_and_ehdr,
3939 bfd_elf64_checksum_contents,
3940 bfd_elf64_write_relocs,
3941 bfd_elf64_swap_symbol_in,
3942 bfd_elf64_swap_symbol_out,
3943 bfd_elf64_slurp_reloc_table,
3944 bfd_elf64_slurp_symbol_table,
3945 bfd_elf64_swap_dyn_in,
3946 bfd_elf64_swap_dyn_out,
3947 bfd_elf64_swap_reloc_in,
3948 bfd_elf64_swap_reloc_out,
3949 bfd_elf64_swap_reloca_in,
3950 bfd_elf64_swap_reloca_out
3951 };
3952
3953 #define TARGET_BIG_SYM s390_elf64_vec
3954 #define TARGET_BIG_NAME "elf64-s390"
3955 #define ELF_ARCH bfd_arch_s390
3956 #define ELF_TARGET_ID S390_ELF_DATA
3957 #define ELF_MACHINE_CODE EM_S390
3958 #define ELF_MACHINE_ALT1 EM_S390_OLD
3959 #define ELF_MAXPAGESIZE 0x1000
3960
3961 #define elf_backend_size_info s390_elf64_size_info
3962
3963 #define elf_backend_can_gc_sections 1
3964 #define elf_backend_can_refcount 1
3965 #define elf_backend_want_got_plt 1
3966 #define elf_backend_plt_readonly 1
3967 #define elf_backend_want_plt_sym 0
3968 #define elf_backend_got_header_size 24
3969 #define elf_backend_want_dynrelro 1
3970 #define elf_backend_rela_normal 1
3971
3972 #define elf_info_to_howto elf_s390_info_to_howto
3973
3974 #define bfd_elf64_bfd_is_local_label_name elf_s390_is_local_label_name
3975 #define bfd_elf64_bfd_link_hash_table_create elf_s390_link_hash_table_create
3976 #define bfd_elf64_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
3977 #define bfd_elf64_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
3978 #define bfd_elf64_bfd_merge_private_bfd_data elf64_s390_merge_private_bfd_data
3979
3980 #define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
3981 #define elf_backend_check_relocs elf_s390_check_relocs
3982 #define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
3983 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
3984 #define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
3985 #define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
3986 #define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
3987 #define elf_backend_reloc_type_class elf_s390_reloc_type_class
3988 #define elf_backend_relocate_section elf_s390_relocate_section
3989 #define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
3990 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
3991 #define elf_backend_grok_prstatus elf_s390_grok_prstatus
3992 #define elf_backend_grok_psinfo elf_s390_grok_psinfo
3993 #define elf_backend_write_core_note elf_s390_write_core_note
3994 #define elf_backend_plt_sym_val elf_s390_plt_sym_val
3995 #define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
3996 #define elf_backend_additional_program_headers elf_s390_additional_program_headers
3997 #define elf_backend_modify_segment_map elf_s390_modify_segment_map
3998
3999 #define bfd_elf64_mkobject elf_s390_mkobject
4000 #define elf_backend_object_p elf_s390_object_p
4001
4002 #include "elf64-target.h"
This page took 0.118127 seconds and 4 git commands to generate.