Put .dynbss and .rel.bss shortcuts in main elf hash table
[deliverable/binutils-gdb.git] / bfd / elf32-s390.c
1 /* IBM S/390-specific support for 32-bit ELF
2 Copyright (C) 2000-2016 Free Software Foundation, Inc.
3 Contributed by Carl B. Pedersen and Martin Schwidefsky.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29
30 static bfd_reloc_status_type
31 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 asection *, bfd *, char **);
33 static bfd_reloc_status_type
34 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 asection *, bfd *, char **);
36
37 /* The relocation "howto" table. */
38
39 static reloc_howto_type elf_howto_table[] =
40 {
41 HOWTO (R_390_NONE, /* type */
42 0, /* rightshift */
43 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
44 0, /* bitsize */
45 FALSE, /* pc_relative */
46 0, /* bitpos */
47 complain_overflow_dont, /* complain_on_overflow */
48 bfd_elf_generic_reloc, /* special_function */
49 "R_390_NONE", /* name */
50 FALSE, /* partial_inplace */
51 0, /* src_mask */
52 0, /* dst_mask */
53 FALSE), /* pcrel_offset */
54
55 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
56 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
57 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
58 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
59 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
60 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
61 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
63 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
64 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
65 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
66 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
67 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
68 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
69 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
70 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
71 HOWTO(R_390_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
72 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,0xffffffff, FALSE),
73 HOWTO(R_390_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
74 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,0xffffffff, FALSE),
75 HOWTO(R_390_JMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
76 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,0xffffffff, FALSE),
77 HOWTO(R_390_RELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
78 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,0xffffffff, FALSE),
79 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
80 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,0xffffffff, FALSE),
81 HOWTO(R_390_GOTPC, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
82 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,0xffffffff, TRUE),
83 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
84 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
85 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
86 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
87 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
88 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
89 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
90 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
91 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
92 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
93 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
94 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
95 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
96 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,0xffffffff, TRUE),
97 EMPTY_HOWTO (R_390_64), /* Empty entry for R_390_64. */
98 EMPTY_HOWTO (R_390_PC64), /* Empty entry for R_390_PC64. */
99 EMPTY_HOWTO (R_390_GOT64), /* Empty entry for R_390_GOT64. */
100 EMPTY_HOWTO (R_390_PLT64), /* Empty entry for R_390_PLT64. */
101 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
102 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,0xffffffff, TRUE),
103 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
104 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
105 EMPTY_HOWTO (R_390_GOTOFF64), /* Empty entry for R_390_GOTOFF64. */
106 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
107 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
108 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
109 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
110 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
112 EMPTY_HOWTO (R_390_GOTPLT64), /* Empty entry for R_390_GOTPLT64. */
113 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
114 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,0xffffffff, TRUE),
115 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
116 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
117 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
118 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
119 EMPTY_HOWTO (R_390_PLTOFF64), /* Empty entry for R_390_PLTOFF64. */
120 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
121 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
122 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
123 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
124 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
125 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
126 HOWTO(R_390_TLS_GD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_TLS_GD32", FALSE, 0, 0xffffffff, FALSE),
128 EMPTY_HOWTO (R_390_TLS_GD64), /* Empty entry for R_390_TLS_GD64. */
129 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
130 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
131 HOWTO(R_390_TLS_GOTIE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", FALSE, 0, 0xffffffff, FALSE),
133 EMPTY_HOWTO (R_390_TLS_GOTIE64), /* Empty entry for R_390_TLS_GOTIE64. */
134 HOWTO(R_390_TLS_LDM32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
135 bfd_elf_generic_reloc, "R_390_TLS_LDM32", FALSE, 0, 0xffffffff, FALSE),
136 EMPTY_HOWTO (R_390_TLS_LDM64), /* Empty entry for R_390_TLS_LDM64. */
137 HOWTO(R_390_TLS_IE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_IE32", FALSE, 0, 0xffffffff, FALSE),
139 EMPTY_HOWTO (R_390_TLS_IE64), /* Empty entry for R_390_TLS_IE64. */
140 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
141 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, 0xffffffff, TRUE),
142 HOWTO(R_390_TLS_LE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_LE32", FALSE, 0, 0xffffffff, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LE64), /* Empty entry for R_390_TLS_LE64. */
145 HOWTO(R_390_TLS_LDO32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDO32", FALSE, 0, 0xffffffff, FALSE),
147 EMPTY_HOWTO (R_390_TLS_LDO64), /* Empty entry for R_390_TLS_LDO64. */
148 HOWTO(R_390_TLS_DTPMOD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, 0xffffffff, FALSE),
150 HOWTO(R_390_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, 0xffffffff, FALSE),
152 HOWTO(R_390_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
153 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, 0xffffffff, FALSE),
154 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
155 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
156 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
157 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
158 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
159 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
160 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
161 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
162 HOWTO(R_390_IRELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, 0xffffffff, FALSE),
164 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
165 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
166 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
167 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
168 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
169 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
170 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
171 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
172 };
173
174 /* GNU extension to record C++ vtable hierarchy. */
175 static reloc_howto_type elf32_s390_vtinherit_howto =
176 HOWTO (R_390_GNU_VTINHERIT, 0,2,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
177 static reloc_howto_type elf32_s390_vtentry_howto =
178 HOWTO (R_390_GNU_VTENTRY, 0,2,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
179
180 static reloc_howto_type *
181 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 bfd_reloc_code_real_type code)
183 {
184 switch (code)
185 {
186 case BFD_RELOC_NONE:
187 return &elf_howto_table[(int) R_390_NONE];
188 case BFD_RELOC_8:
189 return &elf_howto_table[(int) R_390_8];
190 case BFD_RELOC_390_12:
191 return &elf_howto_table[(int) R_390_12];
192 case BFD_RELOC_16:
193 return &elf_howto_table[(int) R_390_16];
194 case BFD_RELOC_32:
195 return &elf_howto_table[(int) R_390_32];
196 case BFD_RELOC_CTOR:
197 return &elf_howto_table[(int) R_390_32];
198 case BFD_RELOC_32_PCREL:
199 return &elf_howto_table[(int) R_390_PC32];
200 case BFD_RELOC_390_GOT12:
201 return &elf_howto_table[(int) R_390_GOT12];
202 case BFD_RELOC_32_GOT_PCREL:
203 return &elf_howto_table[(int) R_390_GOT32];
204 case BFD_RELOC_390_PLT32:
205 return &elf_howto_table[(int) R_390_PLT32];
206 case BFD_RELOC_390_COPY:
207 return &elf_howto_table[(int) R_390_COPY];
208 case BFD_RELOC_390_GLOB_DAT:
209 return &elf_howto_table[(int) R_390_GLOB_DAT];
210 case BFD_RELOC_390_JMP_SLOT:
211 return &elf_howto_table[(int) R_390_JMP_SLOT];
212 case BFD_RELOC_390_RELATIVE:
213 return &elf_howto_table[(int) R_390_RELATIVE];
214 case BFD_RELOC_32_GOTOFF:
215 return &elf_howto_table[(int) R_390_GOTOFF32];
216 case BFD_RELOC_390_GOTPC:
217 return &elf_howto_table[(int) R_390_GOTPC];
218 case BFD_RELOC_390_GOT16:
219 return &elf_howto_table[(int) R_390_GOT16];
220 case BFD_RELOC_16_PCREL:
221 return &elf_howto_table[(int) R_390_PC16];
222 case BFD_RELOC_390_PC12DBL:
223 return &elf_howto_table[(int) R_390_PC12DBL];
224 case BFD_RELOC_390_PLT12DBL:
225 return &elf_howto_table[(int) R_390_PLT12DBL];
226 case BFD_RELOC_390_PC16DBL:
227 return &elf_howto_table[(int) R_390_PC16DBL];
228 case BFD_RELOC_390_PLT16DBL:
229 return &elf_howto_table[(int) R_390_PLT16DBL];
230 case BFD_RELOC_390_PC24DBL:
231 return &elf_howto_table[(int) R_390_PC24DBL];
232 case BFD_RELOC_390_PLT24DBL:
233 return &elf_howto_table[(int) R_390_PLT24DBL];
234 case BFD_RELOC_390_PC32DBL:
235 return &elf_howto_table[(int) R_390_PC32DBL];
236 case BFD_RELOC_390_PLT32DBL:
237 return &elf_howto_table[(int) R_390_PLT32DBL];
238 case BFD_RELOC_390_GOTPCDBL:
239 return &elf_howto_table[(int) R_390_GOTPCDBL];
240 case BFD_RELOC_390_GOTENT:
241 return &elf_howto_table[(int) R_390_GOTENT];
242 case BFD_RELOC_16_GOTOFF:
243 return &elf_howto_table[(int) R_390_GOTOFF16];
244 case BFD_RELOC_390_GOTPLT12:
245 return &elf_howto_table[(int) R_390_GOTPLT12];
246 case BFD_RELOC_390_GOTPLT16:
247 return &elf_howto_table[(int) R_390_GOTPLT16];
248 case BFD_RELOC_390_GOTPLT32:
249 return &elf_howto_table[(int) R_390_GOTPLT32];
250 case BFD_RELOC_390_GOTPLTENT:
251 return &elf_howto_table[(int) R_390_GOTPLTENT];
252 case BFD_RELOC_390_PLTOFF16:
253 return &elf_howto_table[(int) R_390_PLTOFF16];
254 case BFD_RELOC_390_PLTOFF32:
255 return &elf_howto_table[(int) R_390_PLTOFF32];
256 case BFD_RELOC_390_TLS_LOAD:
257 return &elf_howto_table[(int) R_390_TLS_LOAD];
258 case BFD_RELOC_390_TLS_GDCALL:
259 return &elf_howto_table[(int) R_390_TLS_GDCALL];
260 case BFD_RELOC_390_TLS_LDCALL:
261 return &elf_howto_table[(int) R_390_TLS_LDCALL];
262 case BFD_RELOC_390_TLS_GD32:
263 return &elf_howto_table[(int) R_390_TLS_GD32];
264 case BFD_RELOC_390_TLS_GOTIE12:
265 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266 case BFD_RELOC_390_TLS_GOTIE32:
267 return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268 case BFD_RELOC_390_TLS_LDM32:
269 return &elf_howto_table[(int) R_390_TLS_LDM32];
270 case BFD_RELOC_390_TLS_IE32:
271 return &elf_howto_table[(int) R_390_TLS_IE32];
272 case BFD_RELOC_390_TLS_IEENT:
273 return &elf_howto_table[(int) R_390_TLS_IEENT];
274 case BFD_RELOC_390_TLS_LE32:
275 return &elf_howto_table[(int) R_390_TLS_LE32];
276 case BFD_RELOC_390_TLS_LDO32:
277 return &elf_howto_table[(int) R_390_TLS_LDO32];
278 case BFD_RELOC_390_TLS_DTPMOD:
279 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280 case BFD_RELOC_390_TLS_DTPOFF:
281 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282 case BFD_RELOC_390_TLS_TPOFF:
283 return &elf_howto_table[(int) R_390_TLS_TPOFF];
284 case BFD_RELOC_390_20:
285 return &elf_howto_table[(int) R_390_20];
286 case BFD_RELOC_390_GOT20:
287 return &elf_howto_table[(int) R_390_GOT20];
288 case BFD_RELOC_390_GOTPLT20:
289 return &elf_howto_table[(int) R_390_GOTPLT20];
290 case BFD_RELOC_390_TLS_GOTIE20:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
292 case BFD_RELOC_390_IRELATIVE:
293 return &elf_howto_table[(int) R_390_IRELATIVE];
294 case BFD_RELOC_VTABLE_INHERIT:
295 return &elf32_s390_vtinherit_howto;
296 case BFD_RELOC_VTABLE_ENTRY:
297 return &elf32_s390_vtentry_howto;
298 default:
299 break;
300 }
301 return 0;
302 }
303
304 static reloc_howto_type *
305 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 const char *r_name)
307 {
308 unsigned int i;
309
310 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311 if (elf_howto_table[i].name != NULL
312 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
313 return &elf_howto_table[i];
314
315 if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316 return &elf32_s390_vtinherit_howto;
317 if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318 return &elf32_s390_vtentry_howto;
319
320 return NULL;
321 }
322
323 /* We need to use ELF32_R_TYPE so we have our own copy of this function,
324 and elf32-s390.c has its own copy. */
325
326 static void
327 elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
328 arelent *cache_ptr,
329 Elf_Internal_Rela *dst)
330 {
331 unsigned int r_type = ELF32_R_TYPE(dst->r_info);
332 switch (r_type)
333 {
334 case R_390_GNU_VTINHERIT:
335 cache_ptr->howto = &elf32_s390_vtinherit_howto;
336 break;
337
338 case R_390_GNU_VTENTRY:
339 cache_ptr->howto = &elf32_s390_vtentry_howto;
340 break;
341
342 default:
343 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
344 {
345 /* xgettext:c-format */
346 _bfd_error_handler (_("%B: invalid relocation type %d"),
347 abfd, (int) r_type);
348 r_type = R_390_NONE;
349 }
350 cache_ptr->howto = &elf_howto_table[r_type];
351 }
352 }
353
354 /* A relocation function which doesn't do anything. */
355 static bfd_reloc_status_type
356 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
357 arelent *reloc_entry,
358 asymbol *symbol ATTRIBUTE_UNUSED,
359 void * data ATTRIBUTE_UNUSED,
360 asection *input_section,
361 bfd *output_bfd,
362 char **error_message ATTRIBUTE_UNUSED)
363 {
364 if (output_bfd)
365 reloc_entry->address += input_section->output_offset;
366 return bfd_reloc_ok;
367 }
368
369 /* Handle the large displacement relocs. */
370 static bfd_reloc_status_type
371 s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
372 arelent *reloc_entry,
373 asymbol *symbol,
374 void * data ATTRIBUTE_UNUSED,
375 asection *input_section,
376 bfd *output_bfd,
377 char **error_message ATTRIBUTE_UNUSED)
378 {
379 reloc_howto_type *howto = reloc_entry->howto;
380 bfd_vma relocation;
381 bfd_vma insn;
382
383 if (output_bfd != (bfd *) NULL
384 && (symbol->flags & BSF_SECTION_SYM) == 0
385 && (! howto->partial_inplace
386 || reloc_entry->addend == 0))
387 {
388 reloc_entry->address += input_section->output_offset;
389 return bfd_reloc_ok;
390 }
391
392 if (output_bfd != NULL)
393 return bfd_reloc_continue;
394
395 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
396 return bfd_reloc_outofrange;
397
398 relocation = (symbol->value
399 + symbol->section->output_section->vma
400 + symbol->section->output_offset);
401 relocation += reloc_entry->addend;
402 if (howto->pc_relative)
403 {
404 relocation -= (input_section->output_section->vma
405 + input_section->output_offset);
406 relocation -= reloc_entry->address;
407 }
408
409 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
410 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
411 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
412
413 if ((bfd_signed_vma) relocation < - 0x80000
414 || (bfd_signed_vma) relocation > 0x7ffff)
415 return bfd_reloc_overflow;
416 else
417 return bfd_reloc_ok;
418 }
419
420 static bfd_boolean
421 elf_s390_is_local_label_name (bfd *abfd, const char *name)
422 {
423 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
424 return TRUE;
425
426 return _bfd_elf_is_local_label_name (abfd, name);
427 }
428
429 /* Functions for the 390 ELF linker. */
430
431 /* The name of the dynamic interpreter. This is put in the .interp
432 section. */
433
434 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
435
436 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
437 copying dynamic variables from a shared lib into an app's dynbss
438 section, and instead use a dynamic relocation to point into the
439 shared lib. */
440 #define ELIMINATE_COPY_RELOCS 1
441
442 /* The size in bytes of the first entry in the procedure linkage table. */
443 #define PLT_FIRST_ENTRY_SIZE 32
444 /* The size in bytes of an entry in the procedure linkage table. */
445 #define PLT_ENTRY_SIZE 32
446
447 #define GOT_ENTRY_SIZE 4
448
449 #define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
450
451 /* The first three entries in a procedure linkage table are reserved,
452 and the initial contents are unimportant (we zero them out).
453 Subsequent entries look like this. See the SVR4 ABI 386
454 supplement to see how this works. */
455
456 /* For the s390, simple addr offset can only be 0 - 4096.
457 To use the full 2 GB address space, several instructions
458 are needed to load an address in a register and execute
459 a branch( or just saving the address)
460
461 Furthermore, only r 0 and 1 are free to use!!! */
462
463 /* The first 3 words in the GOT are then reserved.
464 Word 0 is the address of the dynamic table.
465 Word 1 is a pointer to a structure describing the object
466 Word 2 is used to point to the loader entry address.
467
468 The code for position independent PLT entries looks like this:
469
470 r12 holds addr of the current GOT at entry to the PLT
471
472 The GOT holds the address in the PLT to be executed.
473 The loader then gets:
474 24(15) = Pointer to the structure describing the object.
475 28(15) = Offset into rela.plt
476
477 The loader must then find the module where the function is
478 and insert the address in the GOT.
479
480 Note: 390 can only address +- 64 K relative.
481 We check if offset > 65536, then make a relative branch -64xxx
482 back to a previous defined branch
483
484 PLT1: BASR 1,0 # 2 bytes
485 L 1,22(1) # 4 bytes Load offset in GOT in r 1
486 L 1,(1,12) # 4 bytes Load address from GOT in r1
487 BCR 15,1 # 2 bytes Jump to address
488 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
489 L 1,14(1) # 4 bytes Load offset in symol table in r1
490 BRC 15,-x # 4 bytes Jump to start of PLT
491 .word 0 # 2 bytes filler
492 .long ? # 4 bytes offset in GOT
493 .long ? # 4 bytes offset into rela.plt
494
495 This was the general case. There are two additional, optimizes PLT
496 definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
497 First the one for GOT offsets < 4096:
498
499 PLT1: L 1,<offset>(12) # 4 bytes Load address from GOT in R1
500 BCR 15,1 # 2 bytes Jump to address
501 .word 0,0,0 # 6 bytes filler
502 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
503 L 1,14(1) # 4 bytes Load offset in rela.plt in r1
504 BRC 15,-x # 4 bytes Jump to start of PLT
505 .word 0,0,0 # 6 bytes filler
506 .long ? # 4 bytes offset into rela.plt
507
508 Second the one for GOT offsets < 32768:
509
510 PLT1: LHI 1,<offset> # 4 bytes Load offset in GOT to r1
511 L 1,(1,12) # 4 bytes Load address from GOT to r1
512 BCR 15,1 # 2 bytes Jump to address
513 .word 0 # 2 bytes filler
514 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
515 L 1,14(1) # 4 bytes Load offset in rela.plt in r1
516 BRC 15,-x # 4 bytes Jump to start of PLT
517 .word 0,0,0 # 6 bytes filler
518 .long ? # 4 bytes offset into rela.plt
519
520 Total = 32 bytes per PLT entry
521
522 The code for static build PLT entries looks like this:
523
524 PLT1: BASR 1,0 # 2 bytes
525 L 1,22(1) # 4 bytes Load address of GOT entry
526 L 1,0(0,1) # 4 bytes Load address from GOT in r1
527 BCR 15,1 # 2 bytes Jump to address
528 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
529 L 1,14(1) # 4 bytes Load offset in symbol table in r1
530 BRC 15,-x # 4 bytes Jump to start of PLT
531 .word 0 # 2 bytes filler
532 .long ? # 4 bytes address of GOT entry
533 .long ? # 4 bytes offset into rela.plt */
534
535 static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
536 {
537 0x0d, 0x10, /* basr %r1,%r0 */
538 0x58, 0x10, 0x10, 0x16, /* l %r1,22(%r1) */
539 0x58, 0x10, 0x10, 0x00, /* l %r1,0(%r1) */
540 0x07, 0xf1, /* br %r1 */
541 0x0d, 0x10, /* basr %r1,%r0 */
542 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
543 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
544 0x00, 0x00, /* padding */
545 0x00, 0x00, 0x00, 0x00, /* GOT offset */
546 0x00, 0x00, 0x00, 0x00 /* rela.plt offset */
547 };
548
549 /* Generic PLT pic entry. */
550 static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
551 {
552 0x0d, 0x10, /* basr %r1,%r0 */
553 0x58, 0x10, 0x10, 0x16, /* l %r1,22(%r1) */
554 0x58, 0x11, 0xc0, 0x00, /* l %r1,0(%r1,%r12) */
555 0x07, 0xf1, /* br %r1 */
556 0x0d, 0x10, /* basr %r1,%r0 */
557 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
558 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
559 0x00, 0x00, /* padding */
560 0x00, 0x00, 0x00, 0x00, /* GOT offset */
561 0x00, 0x00, 0x00, 0x00 /* rela.plt offset */
562 };
563
564 /* Optimized PLT pic entry for GOT offset < 4k. xx will be replaced
565 when generating the PLT slot with the GOT offset. */
566 static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
567 {
568 0x58, 0x10, 0xc0, 0x00, /* l %r1,xx(%r12) */
569 0x07, 0xf1, /* br %r1 */
570 0x00, 0x00, 0x00, 0x00, /* padding */
571 0x00, 0x00,
572 0x0d, 0x10, /* basr %r1,%r0 */
573 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
574 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
575 0x00, 0x00, 0x00, 0x00,
576 0x00, 0x00, 0x00, 0x00
577 };
578
579 /* Optimized PLT pic entry for GOT offset < 32k. xx will be replaced
580 when generating the PLT slot with the GOT offset. */
581 static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
582 {
583 0xa7, 0x18, 0x00, 0x00, /* lhi %r1,xx */
584 0x58, 0x11, 0xc0, 0x00, /* l %r1,0(%r1,%r12) */
585 0x07, 0xf1, /* br %r1 */
586 0x00, 0x00,
587 0x0d, 0x10, /* basr %r1,%r0 */
588 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
589 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
590 0x00, 0x00, 0x00, 0x00,
591 0x00, 0x00, 0x00, 0x00,
592 0x00, 0x00
593 };
594
595 /* The first PLT entry pushes the offset into the rela.plt
596 from R1 onto the stack at 8(15) and the loader object info
597 at 12(15), loads the loader address in R1 and jumps to it. */
598
599 /* The first entry in the PLT for PIC code:
600
601 PLT0:
602 ST 1,28(15) # R1 has offset into rela.plt
603 L 1,4(12) # Get loader ino(object struct address)
604 ST 1,24(15) # Store address
605 L 1,8(12) # Entry address of loader in R1
606 BR 1 # Jump to loader
607
608 The first entry in the PLT for static code:
609
610 PLT0:
611 ST 1,28(15) # R1 has offset into rela.plt
612 BASR 1,0
613 L 1,18(0,1) # Get address of GOT
614 MVC 24(4,15),4(1) # Move loader ino to stack
615 L 1,8(1) # Get address of loader
616 BR 1 # Jump to loader
617 .word 0 # filler
618 .long got # address of GOT */
619
620 static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
621 {
622 0x50, 0x10, 0xf0, 0x1c, /* st %r1,28(%r15) */
623 0x0d, 0x10, /* basr %r1,%r0 */
624 0x58, 0x10, 0x10, 0x12, /* l %r1,18(%r1) */
625 0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04, /* mvc 24(4,%r15),4(%r1) */
626 0x58, 0x10, 0x10, 0x08, /* l %r1,8(%r1) */
627 0x07, 0xf1, /* br %r1 */
628 0x00, 0x00, 0x00, 0x00,
629 0x00, 0x00, 0x00, 0x00,
630 0x00, 0x00
631 };
632
633 static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
634 {
635 0x50, 0x10, 0xf0, 0x1c, /* st %r1,28(%r15) */
636 0x58, 0x10, 0xc0, 0x04, /* l %r1,4(%r12) */
637 0x50, 0x10, 0xf0, 0x18, /* st %r1,24(%r15) */
638 0x58, 0x10, 0xc0, 0x08, /* l %r1,8(%r12) */
639 0x07, 0xf1, /* br %r1 */
640 0x00, 0x00, 0x00, 0x00,
641 0x00, 0x00, 0x00, 0x00,
642 0x00, 0x00, 0x00, 0x00,
643 0x00, 0x00
644 };
645
646
647 /* s390 ELF linker hash entry. */
648
649 struct elf_s390_link_hash_entry
650 {
651 struct elf_link_hash_entry elf;
652
653 /* Track dynamic relocs copied for this symbol. */
654 struct elf_dyn_relocs *dyn_relocs;
655
656 /* Number of GOTPLT references for a function. */
657 bfd_signed_vma gotplt_refcount;
658
659 #define GOT_UNKNOWN 0
660 #define GOT_NORMAL 1
661 #define GOT_TLS_GD 2
662 #define GOT_TLS_IE 3
663 #define GOT_TLS_IE_NLT 4
664 unsigned char tls_type;
665
666 /* For pointer equality reasons we might need to change the symbol
667 type from STT_GNU_IFUNC to STT_FUNC together with its value and
668 section entry. So after alloc_dynrelocs only these values should
669 be used. In order to check whether a symbol is IFUNC use
670 s390_is_ifunc_symbol_p. */
671 bfd_vma ifunc_resolver_address;
672 asection *ifunc_resolver_section;
673 };
674
675 #define elf_s390_hash_entry(ent) \
676 ((struct elf_s390_link_hash_entry *)(ent))
677
678 /* This structure represents an entry in the local PLT list needed for
679 local IFUNC symbols. */
680 struct plt_entry
681 {
682 /* The section of the local symbol.
683 Set in relocate_section and used in finish_dynamic_sections. */
684 asection *sec;
685
686 union
687 {
688 bfd_signed_vma refcount;
689 bfd_vma offset;
690 } plt;
691 };
692
693 /* NOTE: Keep this structure in sync with
694 the one declared in elf64-s390.c. */
695 struct elf_s390_obj_tdata
696 {
697 struct elf_obj_tdata root;
698
699 /* A local PLT is needed for ifunc symbols. */
700 struct plt_entry *local_plt;
701
702 /* TLS type for each local got entry. */
703 char *local_got_tls_type;
704 };
705
706 #define elf_s390_tdata(abfd) \
707 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
708
709 #define elf_s390_local_plt(abfd) \
710 (elf_s390_tdata (abfd)->local_plt)
711
712 #define elf_s390_local_got_tls_type(abfd) \
713 (elf_s390_tdata (abfd)->local_got_tls_type)
714
715 #define is_s390_elf(bfd) \
716 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
717 && elf_tdata (bfd) != NULL \
718 && elf_object_id (bfd) == S390_ELF_DATA)
719
720 static bfd_boolean
721 elf_s390_mkobject (bfd *abfd)
722 {
723 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
724 S390_ELF_DATA);
725 }
726
727 static bfd_boolean
728 elf_s390_object_p (bfd *abfd)
729 {
730 /* Set the right machine number for an s390 elf32 file. */
731 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
732 }
733
734 /* s390 ELF linker hash table. */
735
736 struct elf_s390_link_hash_table
737 {
738 struct elf_link_hash_table elf;
739
740 /* Short-cuts to get to dynamic linker sections. */
741 asection *irelifunc;
742
743 union
744 {
745 bfd_signed_vma refcount;
746 bfd_vma offset;
747 } tls_ldm_got;
748
749 /* Small local sym cache. */
750 struct sym_cache sym_cache;
751 };
752
753 /* Get the s390 ELF linker hash table from a link_info structure. */
754
755 #define elf_s390_hash_table(p) \
756 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
757 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
758
759 #undef ELF64
760 #include "elf-s390-common.c"
761
762 /* Create an entry in an s390 ELF linker hash table. */
763
764 static struct bfd_hash_entry *
765 link_hash_newfunc (struct bfd_hash_entry *entry,
766 struct bfd_hash_table *table,
767 const char *string)
768 {
769 /* Allocate the structure if it has not already been allocated by a
770 subclass. */
771 if (entry == NULL)
772 {
773 entry = bfd_hash_allocate (table,
774 sizeof (struct elf_s390_link_hash_entry));
775 if (entry == NULL)
776 return entry;
777 }
778
779 /* Call the allocation method of the superclass. */
780 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
781 if (entry != NULL)
782 {
783 struct elf_s390_link_hash_entry *eh;
784
785 eh = (struct elf_s390_link_hash_entry *) entry;
786 eh->dyn_relocs = NULL;
787 eh->gotplt_refcount = 0;
788 eh->tls_type = GOT_UNKNOWN;
789 eh->ifunc_resolver_address = 0;
790 eh->ifunc_resolver_section = NULL;
791 }
792
793 return entry;
794 }
795
796 /* Create an s390 ELF linker hash table. */
797
798 static struct bfd_link_hash_table *
799 elf_s390_link_hash_table_create (bfd *abfd)
800 {
801 struct elf_s390_link_hash_table *ret;
802 bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
803
804 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
805 if (ret == NULL)
806 return NULL;
807
808 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
809 sizeof (struct elf_s390_link_hash_entry),
810 S390_ELF_DATA))
811 {
812 free (ret);
813 return NULL;
814 }
815
816 return &ret->elf.root;
817 }
818
819 /* Copy the extra info we tack onto an elf_link_hash_entry. */
820
821 static void
822 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
823 struct elf_link_hash_entry *dir,
824 struct elf_link_hash_entry *ind)
825 {
826 struct elf_s390_link_hash_entry *edir, *eind;
827
828 edir = (struct elf_s390_link_hash_entry *) dir;
829 eind = (struct elf_s390_link_hash_entry *) ind;
830
831 if (eind->dyn_relocs != NULL)
832 {
833 if (edir->dyn_relocs != NULL)
834 {
835 struct elf_dyn_relocs **pp;
836 struct elf_dyn_relocs *p;
837
838 /* Add reloc counts against the indirect sym to the direct sym
839 list. Merge any entries against the same section. */
840 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
841 {
842 struct elf_dyn_relocs *q;
843
844 for (q = edir->dyn_relocs; q != NULL; q = q->next)
845 if (q->sec == p->sec)
846 {
847 q->pc_count += p->pc_count;
848 q->count += p->count;
849 *pp = p->next;
850 break;
851 }
852 if (q == NULL)
853 pp = &p->next;
854 }
855 *pp = edir->dyn_relocs;
856 }
857
858 edir->dyn_relocs = eind->dyn_relocs;
859 eind->dyn_relocs = NULL;
860 }
861
862 if (ind->root.type == bfd_link_hash_indirect
863 && dir->got.refcount <= 0)
864 {
865 edir->tls_type = eind->tls_type;
866 eind->tls_type = GOT_UNKNOWN;
867 }
868
869 if (ELIMINATE_COPY_RELOCS
870 && ind->root.type != bfd_link_hash_indirect
871 && dir->dynamic_adjusted)
872 {
873 /* If called to transfer flags for a weakdef during processing
874 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
875 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
876 dir->ref_dynamic |= ind->ref_dynamic;
877 dir->ref_regular |= ind->ref_regular;
878 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
879 dir->needs_plt |= ind->needs_plt;
880 }
881 else
882 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
883 }
884
885 static int
886 elf_s390_tls_transition (struct bfd_link_info *info,
887 int r_type,
888 int is_local)
889 {
890 if (bfd_link_pic (info))
891 return r_type;
892
893 switch (r_type)
894 {
895 case R_390_TLS_GD32:
896 case R_390_TLS_IE32:
897 if (is_local)
898 return R_390_TLS_LE32;
899 return R_390_TLS_IE32;
900 case R_390_TLS_GOTIE32:
901 if (is_local)
902 return R_390_TLS_LE32;
903 return R_390_TLS_GOTIE32;
904 case R_390_TLS_LDM32:
905 return R_390_TLS_LE32;
906 }
907
908 return r_type;
909 }
910
911 /* Look through the relocs for a section during the first phase, and
912 allocate space in the global offset table or procedure linkage
913 table. */
914
915 static bfd_boolean
916 elf_s390_check_relocs (bfd *abfd,
917 struct bfd_link_info *info,
918 asection *sec,
919 const Elf_Internal_Rela *relocs)
920 {
921 struct elf_s390_link_hash_table *htab;
922 Elf_Internal_Shdr *symtab_hdr;
923 struct elf_link_hash_entry **sym_hashes;
924 const Elf_Internal_Rela *rel;
925 const Elf_Internal_Rela *rel_end;
926 asection *sreloc;
927 bfd_signed_vma *local_got_refcounts;
928 int tls_type, old_tls_type;
929 Elf_Internal_Sym *isym;
930
931 if (bfd_link_relocatable (info))
932 return TRUE;
933
934 BFD_ASSERT (is_s390_elf (abfd));
935
936 htab = elf_s390_hash_table (info);
937 symtab_hdr = &elf_symtab_hdr (abfd);
938 sym_hashes = elf_sym_hashes (abfd);
939 local_got_refcounts = elf_local_got_refcounts (abfd);
940
941 sreloc = NULL;
942
943 rel_end = relocs + sec->reloc_count;
944 for (rel = relocs; rel < rel_end; rel++)
945 {
946 unsigned int r_type;
947 unsigned long r_symndx;
948 struct elf_link_hash_entry *h;
949
950 r_symndx = ELF32_R_SYM (rel->r_info);
951
952 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
953 {
954 /* xgettext:c-format */
955 _bfd_error_handler (_("%B: bad symbol index: %d"),
956 abfd, r_symndx);
957 return FALSE;
958 }
959
960 if (r_symndx < symtab_hdr->sh_info)
961 {
962 /* A local symbol. */
963 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
964 abfd, r_symndx);
965 if (isym == NULL)
966 return FALSE;
967
968 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
969 {
970 struct plt_entry *plt;
971
972 if (htab->elf.dynobj == NULL)
973 htab->elf.dynobj = abfd;
974
975 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
976 return FALSE;
977
978 if (local_got_refcounts == NULL)
979 {
980 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
981 return FALSE;
982 local_got_refcounts = elf_local_got_refcounts (abfd);
983 }
984 plt = elf_s390_local_plt (abfd);
985 plt[r_symndx].plt.refcount++;
986 }
987 h = NULL;
988 }
989 else
990 {
991 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
992 while (h->root.type == bfd_link_hash_indirect
993 || h->root.type == bfd_link_hash_warning)
994 h = (struct elf_link_hash_entry *) h->root.u.i.link;
995
996 /* PR15323, ref flags aren't set for references in the same
997 object. */
998 h->root.non_ir_ref = 1;
999 }
1000
1001 /* Create got section and local_got_refcounts array if they
1002 are needed. */
1003 r_type = elf_s390_tls_transition (info,
1004 ELF32_R_TYPE (rel->r_info),
1005 h == NULL);
1006 switch (r_type)
1007 {
1008 case R_390_GOT12:
1009 case R_390_GOT16:
1010 case R_390_GOT20:
1011 case R_390_GOT32:
1012 case R_390_GOTENT:
1013 case R_390_GOTPLT12:
1014 case R_390_GOTPLT16:
1015 case R_390_GOTPLT20:
1016 case R_390_GOTPLT32:
1017 case R_390_GOTPLTENT:
1018 case R_390_TLS_GD32:
1019 case R_390_TLS_GOTIE12:
1020 case R_390_TLS_GOTIE20:
1021 case R_390_TLS_GOTIE32:
1022 case R_390_TLS_IEENT:
1023 case R_390_TLS_IE32:
1024 case R_390_TLS_LDM32:
1025 if (h == NULL
1026 && local_got_refcounts == NULL)
1027 {
1028 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
1029 return FALSE;
1030 local_got_refcounts = elf_local_got_refcounts (abfd);
1031 }
1032 /* Fall through. */
1033 case R_390_GOTOFF16:
1034 case R_390_GOTOFF32:
1035 case R_390_GOTPC:
1036 case R_390_GOTPCDBL:
1037 if (htab->elf.sgot == NULL)
1038 {
1039 if (htab->elf.dynobj == NULL)
1040 htab->elf.dynobj = abfd;
1041 if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
1042 return FALSE;
1043 }
1044 }
1045
1046 if (h != NULL)
1047 {
1048 if (htab->elf.dynobj == NULL)
1049 htab->elf.dynobj = abfd;
1050 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1051 return FALSE;
1052
1053 /* Make sure an IFUNC symbol defined in a non-shared object
1054 always gets a PLT slot. */
1055 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1056 {
1057 /* The symbol is called by the dynamic loader in order
1058 to resolve the relocation. So it is in fact also
1059 referenced. */
1060 h->ref_regular = 1;
1061 h->needs_plt = 1;
1062 }
1063 }
1064 switch (r_type)
1065 {
1066 case R_390_GOTPC:
1067 case R_390_GOTPCDBL:
1068 /* These relocs do not need a GOT slot. They just load the
1069 GOT pointer itself or address something else relative to
1070 the GOT. Since the GOT pointer has been set up above we
1071 are done. */
1072 break;
1073 case R_390_GOTOFF16:
1074 case R_390_GOTOFF32:
1075 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1076 break;
1077 /* Fall through. */
1078
1079 case R_390_PLT12DBL:
1080 case R_390_PLT16DBL:
1081 case R_390_PLT24DBL:
1082 case R_390_PLT32DBL:
1083 case R_390_PLT32:
1084 case R_390_PLTOFF16:
1085 case R_390_PLTOFF32:
1086 /* This symbol requires a procedure linkage table entry. We
1087 actually build the entry in adjust_dynamic_symbol,
1088 because this might be a case of linking PIC code which is
1089 never referenced by a dynamic object, in which case we
1090 don't need to generate a procedure linkage table entry
1091 after all. */
1092
1093 /* If this is a local symbol, we resolve it directly without
1094 creating a procedure linkage table entry. */
1095 if (h != NULL)
1096 {
1097 h->needs_plt = 1;
1098 h->plt.refcount += 1;
1099 }
1100 break;
1101
1102 case R_390_GOTPLT12:
1103 case R_390_GOTPLT16:
1104 case R_390_GOTPLT20:
1105 case R_390_GOTPLT32:
1106 case R_390_GOTPLTENT:
1107 /* This symbol requires either a procedure linkage table entry
1108 or an entry in the local got. We actually build the entry
1109 in adjust_dynamic_symbol because whether this is really a
1110 global reference can change and with it the fact if we have
1111 to create a plt entry or a local got entry. To be able to
1112 make a once global symbol a local one we have to keep track
1113 of the number of gotplt references that exist for this
1114 symbol. */
1115 if (h != NULL)
1116 {
1117 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1118 h->needs_plt = 1;
1119 h->plt.refcount += 1;
1120 }
1121 else
1122 local_got_refcounts[r_symndx] += 1;
1123 break;
1124
1125 case R_390_TLS_LDM32:
1126 htab->tls_ldm_got.refcount += 1;
1127 break;
1128
1129 case R_390_TLS_IE32:
1130 case R_390_TLS_GOTIE12:
1131 case R_390_TLS_GOTIE20:
1132 case R_390_TLS_GOTIE32:
1133 case R_390_TLS_IEENT:
1134 if (bfd_link_pic (info))
1135 info->flags |= DF_STATIC_TLS;
1136 /* Fall through. */
1137
1138 case R_390_GOT12:
1139 case R_390_GOT16:
1140 case R_390_GOT20:
1141 case R_390_GOT32:
1142 case R_390_GOTENT:
1143 case R_390_TLS_GD32:
1144 /* This symbol requires a global offset table entry. */
1145 switch (r_type)
1146 {
1147 default:
1148 case R_390_GOT12:
1149 case R_390_GOT16:
1150 case R_390_GOT20:
1151 case R_390_GOT32:
1152 case R_390_GOTENT:
1153 tls_type = GOT_NORMAL;
1154 break;
1155 case R_390_TLS_GD32:
1156 tls_type = GOT_TLS_GD;
1157 break;
1158 case R_390_TLS_IE32:
1159 case R_390_TLS_GOTIE32:
1160 tls_type = GOT_TLS_IE;
1161 break;
1162 case R_390_TLS_GOTIE12:
1163 case R_390_TLS_GOTIE20:
1164 case R_390_TLS_IEENT:
1165 tls_type = GOT_TLS_IE_NLT;
1166 break;
1167 }
1168
1169 if (h != NULL)
1170 {
1171 h->got.refcount += 1;
1172 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1173 }
1174 else
1175 {
1176 local_got_refcounts[r_symndx] += 1;
1177 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1178 }
1179 /* If a TLS symbol is accessed using IE at least once,
1180 there is no point to use dynamic model for it. */
1181 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1182 {
1183 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1184 {
1185 _bfd_error_handler
1186 /* xgettext:c-format */
1187 (_("%B: `%s' accessed both as normal and thread local symbol"),
1188 abfd, h->root.root.string);
1189 return FALSE;
1190 }
1191 if (old_tls_type > tls_type)
1192 tls_type = old_tls_type;
1193 }
1194
1195 if (old_tls_type != tls_type)
1196 {
1197 if (h != NULL)
1198 elf_s390_hash_entry (h)->tls_type = tls_type;
1199 else
1200 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1201 }
1202
1203 if (r_type != R_390_TLS_IE32)
1204 break;
1205 /* Fall through. */
1206
1207 case R_390_TLS_LE32:
1208 /* For static linking and executables this reloc will be
1209 calculated at linktime otherwise a TLS_TPOFF runtime
1210 reloc will be generated. */
1211 if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
1212 break;
1213
1214 if (!bfd_link_pic (info))
1215 break;
1216 info->flags |= DF_STATIC_TLS;
1217 /* Fall through. */
1218
1219 case R_390_8:
1220 case R_390_16:
1221 case R_390_32:
1222 case R_390_PC16:
1223 case R_390_PC12DBL:
1224 case R_390_PC16DBL:
1225 case R_390_PC24DBL:
1226 case R_390_PC32DBL:
1227 case R_390_PC32:
1228 if (h != NULL && bfd_link_executable (info))
1229 {
1230 /* If this reloc is in a read-only section, we might
1231 need a copy reloc. We can't check reliably at this
1232 stage whether the section is read-only, as input
1233 sections have not yet been mapped to output sections.
1234 Tentatively set the flag for now, and correct in
1235 adjust_dynamic_symbol. */
1236 h->non_got_ref = 1;
1237
1238 if (!bfd_link_pic (info))
1239 {
1240 /* We may need a .plt entry if the function this reloc
1241 refers to is in a shared lib. */
1242 h->plt.refcount += 1;
1243 }
1244 }
1245
1246 /* If we are creating a shared library, and this is a reloc
1247 against a global symbol, or a non PC relative reloc
1248 against a local symbol, then we need to copy the reloc
1249 into the shared library. However, if we are linking with
1250 -Bsymbolic, we do not need to copy a reloc against a
1251 global symbol which is defined in an object we are
1252 including in the link (i.e., DEF_REGULAR is set). At
1253 this point we have not seen all the input files, so it is
1254 possible that DEF_REGULAR is not set now but will be set
1255 later (it is never cleared). In case of a weak definition,
1256 DEF_REGULAR may be cleared later by a strong definition in
1257 a shared library. We account for that possibility below by
1258 storing information in the relocs_copied field of the hash
1259 table entry. A similar situation occurs when creating
1260 shared libraries and symbol visibility changes render the
1261 symbol local.
1262
1263 If on the other hand, we are creating an executable, we
1264 may need to keep relocations for symbols satisfied by a
1265 dynamic library if we manage to avoid copy relocs for the
1266 symbol. */
1267 if ((bfd_link_pic (info)
1268 && (sec->flags & SEC_ALLOC) != 0
1269 && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
1270 && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
1271 && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
1272 && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
1273 && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
1274 && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1275 || (h != NULL
1276 && (! SYMBOLIC_BIND (info, h)
1277 || h->root.type == bfd_link_hash_defweak
1278 || !h->def_regular))))
1279 || (ELIMINATE_COPY_RELOCS
1280 && !bfd_link_pic (info)
1281 && (sec->flags & SEC_ALLOC) != 0
1282 && h != NULL
1283 && (h->root.type == bfd_link_hash_defweak
1284 || !h->def_regular)))
1285 {
1286 struct elf_dyn_relocs *p;
1287 struct elf_dyn_relocs **head;
1288
1289 /* We must copy these reloc types into the output file.
1290 Create a reloc section in dynobj and make room for
1291 this reloc. */
1292 if (sreloc == NULL)
1293 {
1294 if (htab->elf.dynobj == NULL)
1295 htab->elf.dynobj = abfd;
1296
1297 sreloc = _bfd_elf_make_dynamic_reloc_section
1298 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
1299
1300 if (sreloc == NULL)
1301 return FALSE;
1302 }
1303
1304 /* If this is a global symbol, we count the number of
1305 relocations we need for this symbol. */
1306 if (h != NULL)
1307 {
1308 head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
1309 }
1310 else
1311 {
1312 /* Track dynamic relocs needed for local syms too.
1313 We really need local syms available to do this
1314 easily. Oh well. */
1315 asection *s;
1316 void *vpp;
1317
1318 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1319 abfd, r_symndx);
1320 if (isym == NULL)
1321 return FALSE;
1322
1323 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1324 if (s == NULL)
1325 s = sec;
1326
1327 vpp = &elf_section_data (s)->local_dynrel;
1328 head = (struct elf_dyn_relocs **) vpp;
1329 }
1330
1331 p = *head;
1332 if (p == NULL || p->sec != sec)
1333 {
1334 bfd_size_type amt = sizeof *p;
1335
1336 p = ((struct elf_dyn_relocs *)
1337 bfd_alloc (htab->elf.dynobj, amt));
1338 if (p == NULL)
1339 return FALSE;
1340 p->next = *head;
1341 *head = p;
1342 p->sec = sec;
1343 p->count = 0;
1344 p->pc_count = 0;
1345 }
1346
1347 p->count += 1;
1348 if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
1349 || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
1350 || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
1351 || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
1352 || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
1353 || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1354 p->pc_count += 1;
1355 }
1356 break;
1357
1358 /* This relocation describes the C++ object vtable hierarchy.
1359 Reconstruct it for later use during GC. */
1360 case R_390_GNU_VTINHERIT:
1361 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1362 return FALSE;
1363 break;
1364
1365 /* This relocation describes which C++ vtable entries are actually
1366 used. Record for later use during GC. */
1367 case R_390_GNU_VTENTRY:
1368 BFD_ASSERT (h != NULL);
1369 if (h != NULL
1370 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1371 return FALSE;
1372 break;
1373
1374 default:
1375 break;
1376 }
1377 }
1378
1379 return TRUE;
1380 }
1381
1382 /* Return the section that should be marked against GC for a given
1383 relocation. */
1384
1385 static asection *
1386 elf_s390_gc_mark_hook (asection *sec,
1387 struct bfd_link_info *info,
1388 Elf_Internal_Rela *rel,
1389 struct elf_link_hash_entry *h,
1390 Elf_Internal_Sym *sym)
1391 {
1392 if (h != NULL)
1393 switch (ELF32_R_TYPE (rel->r_info))
1394 {
1395 case R_390_GNU_VTINHERIT:
1396 case R_390_GNU_VTENTRY:
1397 return NULL;
1398 }
1399 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1400
1401 }
1402
1403 /* Update the got entry reference counts for the section being removed. */
1404
1405 static bfd_boolean
1406 elf_s390_gc_sweep_hook (bfd *abfd,
1407 struct bfd_link_info *info,
1408 asection *sec,
1409 const Elf_Internal_Rela *relocs)
1410 {
1411 struct elf_s390_link_hash_table *htab;
1412 Elf_Internal_Shdr *symtab_hdr;
1413 struct elf_link_hash_entry **sym_hashes;
1414 bfd_signed_vma *local_got_refcounts;
1415 const Elf_Internal_Rela *rel, *relend;
1416
1417 if (bfd_link_relocatable (info))
1418 return TRUE;
1419
1420 htab = elf_s390_hash_table (info);
1421 if (htab == NULL)
1422 return FALSE;
1423
1424 elf_section_data (sec)->local_dynrel = NULL;
1425
1426 symtab_hdr = &elf_symtab_hdr (abfd);
1427 sym_hashes = elf_sym_hashes (abfd);
1428 local_got_refcounts = elf_local_got_refcounts (abfd);
1429
1430 relend = relocs + sec->reloc_count;
1431 for (rel = relocs; rel < relend; rel++)
1432 {
1433 unsigned long r_symndx;
1434 unsigned int r_type;
1435 struct elf_link_hash_entry *h = NULL;
1436
1437 r_symndx = ELF32_R_SYM (rel->r_info);
1438 if (r_symndx >= symtab_hdr->sh_info)
1439 {
1440 struct elf_s390_link_hash_entry *eh;
1441 struct elf_dyn_relocs **pp;
1442 struct elf_dyn_relocs *p;
1443
1444 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1445 while (h->root.type == bfd_link_hash_indirect
1446 || h->root.type == bfd_link_hash_warning)
1447 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1448 eh = (struct elf_s390_link_hash_entry *) h;
1449
1450 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1451 if (p->sec == sec)
1452 {
1453 /* Everything must go for SEC. */
1454 *pp = p->next;
1455 break;
1456 }
1457 }
1458 else
1459 {
1460 Elf_Internal_Sym *isym;
1461
1462 /* A local symbol. */
1463 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1464 abfd, r_symndx);
1465 if (isym == NULL)
1466 return FALSE;
1467
1468 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1469 {
1470 struct plt_entry *plt = elf_s390_local_plt (abfd);
1471 if (plt[r_symndx].plt.refcount > 0)
1472 plt[r_symndx].plt.refcount--;
1473 }
1474 }
1475
1476 r_type = ELF32_R_TYPE (rel->r_info);
1477 r_type = elf_s390_tls_transition (info, r_type, h != NULL);
1478 switch (r_type)
1479 {
1480 case R_390_TLS_LDM32:
1481 if (elf_s390_hash_table (info)->tls_ldm_got.refcount > 0)
1482 elf_s390_hash_table (info)->tls_ldm_got.refcount -= 1;
1483 break;
1484
1485 case R_390_GOTOFF16:
1486 case R_390_GOTOFF32:
1487 if (h != NULL && s390_is_ifunc_symbol_p (h) && h->def_regular)
1488 {
1489 h->plt.refcount--;
1490 break;
1491 }
1492
1493 case R_390_GOTPC:
1494 case R_390_GOTPCDBL:
1495 break;
1496
1497 case R_390_TLS_GD32:
1498 case R_390_TLS_IE32:
1499 case R_390_TLS_GOTIE12:
1500 case R_390_TLS_GOTIE20:
1501 case R_390_TLS_GOTIE32:
1502 case R_390_TLS_IEENT:
1503 case R_390_GOT12:
1504 case R_390_GOT16:
1505 case R_390_GOT20:
1506 case R_390_GOT32:
1507 case R_390_GOTENT:
1508 if (h != NULL)
1509 {
1510 if (h->got.refcount > 0)
1511 h->got.refcount -= 1;
1512 }
1513 else if (local_got_refcounts != NULL)
1514 {
1515 if (local_got_refcounts[r_symndx] > 0)
1516 local_got_refcounts[r_symndx] -= 1;
1517 }
1518 break;
1519
1520 case R_390_8:
1521 case R_390_12:
1522 case R_390_16:
1523 case R_390_20:
1524 case R_390_32:
1525 case R_390_PC16:
1526 case R_390_PC12DBL:
1527 case R_390_PC16DBL:
1528 case R_390_PC24DBL:
1529 case R_390_PC32DBL:
1530 case R_390_PC32:
1531 if (bfd_link_pic (info))
1532 break;
1533 /* Fall through. */
1534
1535 case R_390_PLT12DBL:
1536 case R_390_PLT16DBL:
1537 case R_390_PLT24DBL:
1538 case R_390_PLT32DBL:
1539 case R_390_PLT32:
1540 case R_390_PLTOFF16:
1541 case R_390_PLTOFF32:
1542 if (h != NULL)
1543 {
1544 if (h->plt.refcount > 0)
1545 h->plt.refcount -= 1;
1546 }
1547 break;
1548
1549 case R_390_GOTPLT12:
1550 case R_390_GOTPLT16:
1551 case R_390_GOTPLT20:
1552 case R_390_GOTPLT32:
1553 case R_390_GOTPLTENT:
1554 if (h != NULL)
1555 {
1556 if (h->plt.refcount > 0)
1557 {
1558 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount--;
1559 h->plt.refcount -= 1;
1560 }
1561 }
1562 else if (local_got_refcounts != NULL)
1563 {
1564 if (local_got_refcounts[r_symndx] > 0)
1565 local_got_refcounts[r_symndx] -= 1;
1566 }
1567 break;
1568
1569 default:
1570 break;
1571 }
1572 }
1573
1574 return TRUE;
1575 }
1576
1577 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1578 entry but we found we will not create any. Called when we find we will
1579 not have any PLT for this symbol, by for example
1580 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1581 or elf_s390_size_dynamic_sections if no dynamic sections will be
1582 created (we're only linking static objects). */
1583
1584 static void
1585 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1586 {
1587 if (h->elf.root.type == bfd_link_hash_warning)
1588 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1589
1590 if (h->gotplt_refcount <= 0)
1591 return;
1592
1593 /* We simply add the number of gotplt references to the number
1594 * of got references for this symbol. */
1595 h->elf.got.refcount += h->gotplt_refcount;
1596 h->gotplt_refcount = -1;
1597 }
1598
1599 /* Adjust a symbol defined by a dynamic object and referenced by a
1600 regular object. The current definition is in some section of the
1601 dynamic object, but we're not including those sections. We have to
1602 change the definition to something the rest of the link can
1603 understand. */
1604
1605 static bfd_boolean
1606 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1607 struct elf_link_hash_entry *h)
1608 {
1609 struct elf_s390_link_hash_table *htab;
1610 asection *s;
1611
1612 /* STT_GNU_IFUNC symbol must go through PLT. */
1613 if (s390_is_ifunc_symbol_p (h))
1614 {
1615 /* All local STT_GNU_IFUNC references must be treated as local
1616 calls via local PLT. */
1617 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1618 {
1619 bfd_size_type pc_count = 0, count = 0;
1620 struct elf_dyn_relocs **pp;
1621 struct elf_s390_link_hash_entry *eh;
1622 struct elf_dyn_relocs *p;
1623
1624 eh = (struct elf_s390_link_hash_entry *) h;
1625 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1626 {
1627 pc_count += p->pc_count;
1628 p->count -= p->pc_count;
1629 p->pc_count = 0;
1630 count += p->count;
1631 if (p->count == 0)
1632 *pp = p->next;
1633 else
1634 pp = &p->next;
1635 }
1636
1637 if (pc_count || count)
1638 {
1639 h->needs_plt = 1;
1640 h->non_got_ref = 1;
1641 if (h->plt.refcount <= 0)
1642 h->plt.refcount = 1;
1643 else
1644 h->plt.refcount += 1;
1645 }
1646 }
1647
1648 if (h->plt.refcount <= 0)
1649 {
1650 h->plt.offset = (bfd_vma) -1;
1651 h->needs_plt = 0;
1652 }
1653 return TRUE;
1654 }
1655
1656 /* If this is a function, put it in the procedure linkage table. We
1657 will fill in the contents of the procedure linkage table later
1658 (although we could actually do it here). */
1659 if (h->type == STT_FUNC
1660 || h->needs_plt)
1661 {
1662 if (h->plt.refcount <= 0
1663 || SYMBOL_CALLS_LOCAL (info, h)
1664 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1665 && h->root.type != bfd_link_hash_undefweak))
1666 {
1667 /* This case can occur if we saw a PLT32 reloc in an input
1668 file, but the symbol was never referred to by a dynamic
1669 object, or if all references were garbage collected. In
1670 such a case, we don't actually need to build a procedure
1671 linkage table, and we can just do a PC32 reloc instead. */
1672 h->plt.offset = (bfd_vma) -1;
1673 h->needs_plt = 0;
1674 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1675 }
1676
1677 return TRUE;
1678 }
1679 else
1680 /* It's possible that we incorrectly decided a .plt reloc was
1681 needed for an R_390_PC32 reloc to a non-function sym in
1682 check_relocs. We can't decide accurately between function and
1683 non-function syms in check-relocs; Objects loaded later in
1684 the link may change h->type. So fix it now. */
1685 h->plt.offset = (bfd_vma) -1;
1686
1687 /* If this is a weak symbol, and there is a real definition, the
1688 processor independent code will have arranged for us to see the
1689 real definition first, and we can just use the same value. */
1690 if (h->u.weakdef != NULL)
1691 {
1692 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1693 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1694 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1695 h->root.u.def.value = h->u.weakdef->root.u.def.value;
1696 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1697 h->non_got_ref = h->u.weakdef->non_got_ref;
1698 return TRUE;
1699 }
1700
1701 /* This is a reference to a symbol defined by a dynamic object which
1702 is not a function. */
1703
1704 /* If we are creating a shared library, we must presume that the
1705 only references to the symbol are via the global offset table.
1706 For such cases we need not do anything here; the relocations will
1707 be handled correctly by relocate_section. */
1708 if (bfd_link_pic (info))
1709 return TRUE;
1710
1711 /* If there are no references to this symbol that do not use the
1712 GOT, we don't need to generate a copy reloc. */
1713 if (!h->non_got_ref)
1714 return TRUE;
1715
1716 /* If -z nocopyreloc was given, we won't generate them either. */
1717 if (info->nocopyreloc)
1718 {
1719 h->non_got_ref = 0;
1720 return TRUE;
1721 }
1722
1723 if (ELIMINATE_COPY_RELOCS)
1724 {
1725 struct elf_s390_link_hash_entry * eh;
1726 struct elf_dyn_relocs *p;
1727
1728 eh = (struct elf_s390_link_hash_entry *) h;
1729 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1730 {
1731 s = p->sec->output_section;
1732 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1733 break;
1734 }
1735
1736 /* If we didn't find any dynamic relocs in read-only sections, then
1737 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1738 if (p == NULL)
1739 {
1740 h->non_got_ref = 0;
1741 return TRUE;
1742 }
1743 }
1744
1745 /* We must allocate the symbol in our .dynbss section, which will
1746 become part of the .bss section of the executable. There will be
1747 an entry for this symbol in the .dynsym section. The dynamic
1748 object will contain position independent code, so all references
1749 from the dynamic object to this symbol will go through the global
1750 offset table. The dynamic linker will use the .dynsym entry to
1751 determine the address it must put in the global offset table, so
1752 both the dynamic object and the regular object will refer to the
1753 same memory location for the variable. */
1754
1755 htab = elf_s390_hash_table (info);
1756
1757 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1758 copy the initial value out of the dynamic object and into the
1759 runtime process image. */
1760 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1761 {
1762 htab->elf.srelbss->size += sizeof (Elf32_External_Rela);
1763 h->needs_copy = 1;
1764 }
1765
1766 s = htab->elf.sdynbss;
1767
1768 return _bfd_elf_adjust_dynamic_copy (info, h, s);
1769 }
1770
1771 /* Allocate space in .plt, .got and associated reloc sections for
1772 dynamic relocs. */
1773
1774 static bfd_boolean
1775 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1776 {
1777 struct bfd_link_info *info;
1778 struct elf_s390_link_hash_table *htab;
1779 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
1780 struct elf_dyn_relocs *p;
1781
1782 if (h->root.type == bfd_link_hash_indirect)
1783 return TRUE;
1784
1785 info = (struct bfd_link_info *) inf;
1786 htab = elf_s390_hash_table (info);
1787
1788 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1789 here if it is defined and referenced in a non-shared object. */
1790 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1791 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1792 else if (htab->elf.dynamic_sections_created
1793 && h->plt.refcount > 0)
1794 {
1795 /* Make sure this symbol is output as a dynamic symbol.
1796 Undefined weak syms won't yet be marked as dynamic. */
1797 if (h->dynindx == -1
1798 && !h->forced_local)
1799 {
1800 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1801 return FALSE;
1802 }
1803
1804 if (bfd_link_pic (info)
1805 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1806 {
1807 asection *s = htab->elf.splt;
1808
1809 /* If this is the first .plt entry, make room for the special
1810 first entry. */
1811 if (s->size == 0)
1812 s->size += PLT_FIRST_ENTRY_SIZE;
1813
1814 h->plt.offset = s->size;
1815
1816 /* If this symbol is not defined in a regular file, and we are
1817 not generating a shared library, then set the symbol to this
1818 location in the .plt. This is required to make function
1819 pointers compare as equal between the normal executable and
1820 the shared library. */
1821 if (! bfd_link_pic (info)
1822 && !h->def_regular)
1823 {
1824 h->root.u.def.section = s;
1825 h->root.u.def.value = h->plt.offset;
1826 }
1827
1828 /* Make room for this entry. */
1829 s->size += PLT_ENTRY_SIZE;
1830
1831 /* We also need to make an entry in the .got.plt section, which
1832 will be placed in the .got section by the linker script. */
1833 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1834
1835 /* We also need to make an entry in the .rela.plt section. */
1836 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1837 }
1838 else
1839 {
1840 h->plt.offset = (bfd_vma) -1;
1841 h->needs_plt = 0;
1842 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1843 }
1844 }
1845 else
1846 {
1847 h->plt.offset = (bfd_vma) -1;
1848 h->needs_plt = 0;
1849 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1850 }
1851
1852 /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1853 the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1854 to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1855 we can save the dynamic TLS relocation. */
1856 if (h->got.refcount > 0
1857 && !bfd_link_pic (info)
1858 && h->dynindx == -1
1859 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1860 {
1861 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1862 /* For the GOTIE access without a literal pool entry the offset has
1863 to be stored somewhere. The immediate value in the instruction
1864 is not bit enough so the value is stored in the got. */
1865 {
1866 h->got.offset = htab->elf.sgot->size;
1867 htab->elf.sgot->size += GOT_ENTRY_SIZE;
1868 }
1869 else
1870 h->got.offset = (bfd_vma) -1;
1871 }
1872 else if (h->got.refcount > 0)
1873 {
1874 asection *s;
1875 bfd_boolean dyn;
1876 int tls_type = elf_s390_hash_entry(h)->tls_type;
1877
1878 /* Make sure this symbol is output as a dynamic symbol.
1879 Undefined weak syms won't yet be marked as dynamic. */
1880 if (h->dynindx == -1
1881 && !h->forced_local)
1882 {
1883 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1884 return FALSE;
1885 }
1886
1887 s = htab->elf.sgot;
1888 h->got.offset = s->size;
1889 s->size += GOT_ENTRY_SIZE;
1890 /* R_390_TLS_GD32 needs 2 consecutive GOT slots. */
1891 if (tls_type == GOT_TLS_GD)
1892 s->size += GOT_ENTRY_SIZE;
1893 dyn = htab->elf.dynamic_sections_created;
1894 /* R_390_TLS_IE32 needs one dynamic relocation,
1895 R_390_TLS_GD32 needs one if local symbol and two if global. */
1896 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1897 || tls_type >= GOT_TLS_IE)
1898 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1899 else if (tls_type == GOT_TLS_GD)
1900 htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
1901 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1902 || h->root.type != bfd_link_hash_undefweak)
1903 && (bfd_link_pic (info)
1904 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1905 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1906 }
1907 else
1908 h->got.offset = (bfd_vma) -1;
1909
1910 if (eh->dyn_relocs == NULL)
1911 return TRUE;
1912
1913 /* In the shared -Bsymbolic case, discard space allocated for
1914 dynamic pc-relative relocs against symbols which turn out to be
1915 defined in regular objects. For the normal shared case, discard
1916 space for pc-relative relocs that have become local due to symbol
1917 visibility changes. */
1918
1919 if (bfd_link_pic (info))
1920 {
1921 if (SYMBOL_CALLS_LOCAL (info, h))
1922 {
1923 struct elf_dyn_relocs **pp;
1924
1925 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1926 {
1927 p->count -= p->pc_count;
1928 p->pc_count = 0;
1929 if (p->count == 0)
1930 *pp = p->next;
1931 else
1932 pp = &p->next;
1933 }
1934 }
1935
1936 /* Also discard relocs on undefined weak syms with non-default
1937 visibility. */
1938 if (eh->dyn_relocs != NULL
1939 && h->root.type == bfd_link_hash_undefweak)
1940 {
1941 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1942 eh->dyn_relocs = NULL;
1943
1944 /* Make sure undefined weak symbols are output as a dynamic
1945 symbol in PIEs. */
1946 else if (h->dynindx == -1
1947 && !h->forced_local)
1948 {
1949 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1950 return FALSE;
1951 }
1952 }
1953 }
1954 else if (ELIMINATE_COPY_RELOCS)
1955 {
1956 /* For the non-shared case, discard space for relocs against
1957 symbols which turn out to need copy relocs or are not
1958 dynamic. */
1959
1960 if (!h->non_got_ref
1961 && ((h->def_dynamic
1962 && !h->def_regular)
1963 || (htab->elf.dynamic_sections_created
1964 && (h->root.type == bfd_link_hash_undefweak
1965 || h->root.type == bfd_link_hash_undefined))))
1966 {
1967 /* Make sure this symbol is output as a dynamic symbol.
1968 Undefined weak syms won't yet be marked as dynamic. */
1969 if (h->dynindx == -1
1970 && !h->forced_local)
1971 {
1972 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1973 return FALSE;
1974 }
1975
1976 /* If that succeeded, we know we'll be keeping all the
1977 relocs. */
1978 if (h->dynindx != -1)
1979 goto keep;
1980 }
1981
1982 eh->dyn_relocs = NULL;
1983
1984 keep: ;
1985 }
1986
1987 /* Finally, allocate space. */
1988 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1989 {
1990 asection *sreloc = elf_section_data (p->sec)->sreloc;
1991
1992 sreloc->size += p->count * sizeof (Elf32_External_Rela);
1993 }
1994
1995 return TRUE;
1996 }
1997
1998 /* Find any dynamic relocs that apply to read-only sections. */
1999
2000 static bfd_boolean
2001 readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
2002 {
2003 struct elf_s390_link_hash_entry *eh;
2004 struct elf_dyn_relocs *p;
2005
2006 eh = (struct elf_s390_link_hash_entry *) h;
2007 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2008 {
2009 asection *s = p->sec->output_section;
2010
2011 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2012 {
2013 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2014
2015 info->flags |= DF_TEXTREL;
2016
2017 /* Not an error, just cut short the traversal. */
2018 return FALSE;
2019 }
2020 }
2021 return TRUE;
2022 }
2023
2024 /* Set the sizes of the dynamic sections. */
2025
2026 static bfd_boolean
2027 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2028 struct bfd_link_info *info)
2029 {
2030 struct elf_s390_link_hash_table *htab;
2031 bfd *dynobj;
2032 asection *s;
2033 bfd_boolean relocs;
2034 bfd *ibfd;
2035
2036 htab = elf_s390_hash_table (info);
2037 dynobj = htab->elf.dynobj;
2038 if (dynobj == NULL)
2039 abort ();
2040
2041 if (htab->elf.dynamic_sections_created)
2042 {
2043 /* Set the contents of the .interp section to the interpreter. */
2044 if (bfd_link_executable (info) && !info->nointerp)
2045 {
2046 s = bfd_get_linker_section (dynobj, ".interp");
2047 if (s == NULL)
2048 abort ();
2049 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2050 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2051 }
2052 }
2053
2054 /* Set up .got offsets for local syms, and space for local dynamic
2055 relocs. */
2056 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2057 {
2058 bfd_signed_vma *local_got;
2059 bfd_signed_vma *end_local_got;
2060 char *local_tls_type;
2061 bfd_size_type locsymcount;
2062 Elf_Internal_Shdr *symtab_hdr;
2063 asection *srela;
2064 struct plt_entry *local_plt;
2065 unsigned int i;
2066
2067 if (! is_s390_elf (ibfd))
2068 continue;
2069
2070 for (s = ibfd->sections; s != NULL; s = s->next)
2071 {
2072 struct elf_dyn_relocs *p;
2073
2074 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
2075 {
2076 if (!bfd_is_abs_section (p->sec)
2077 && bfd_is_abs_section (p->sec->output_section))
2078 {
2079 /* Input section has been discarded, either because
2080 it is a copy of a linkonce section or due to
2081 linker script /DISCARD/, so we'll be discarding
2082 the relocs too. */
2083 }
2084 else if (p->count != 0)
2085 {
2086 srela = elf_section_data (p->sec)->sreloc;
2087 srela->size += p->count * sizeof (Elf32_External_Rela);
2088 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2089 info->flags |= DF_TEXTREL;
2090 }
2091 }
2092 }
2093
2094 local_got = elf_local_got_refcounts (ibfd);
2095 if (!local_got)
2096 continue;
2097
2098 symtab_hdr = &elf_symtab_hdr (ibfd);
2099 locsymcount = symtab_hdr->sh_info;
2100 end_local_got = local_got + locsymcount;
2101 local_tls_type = elf_s390_local_got_tls_type (ibfd);
2102 s = htab->elf.sgot;
2103 srela = htab->elf.srelgot;
2104 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
2105 {
2106 if (*local_got > 0)
2107 {
2108 *local_got = s->size;
2109 s->size += GOT_ENTRY_SIZE;
2110 if (*local_tls_type == GOT_TLS_GD)
2111 s->size += GOT_ENTRY_SIZE;
2112 if (bfd_link_pic (info))
2113 srela->size += sizeof (Elf32_External_Rela);
2114 }
2115 else
2116 *local_got = (bfd_vma) -1;
2117 }
2118 local_plt = elf_s390_local_plt (ibfd);
2119 for (i = 0; i < symtab_hdr->sh_info; i++)
2120 {
2121 if (local_plt[i].plt.refcount > 0)
2122 {
2123 local_plt[i].plt.offset = htab->elf.iplt->size;
2124 htab->elf.iplt->size += PLT_ENTRY_SIZE;
2125 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
2126 htab->elf.irelplt->size += RELA_ENTRY_SIZE;
2127 }
2128 else
2129 local_plt[i].plt.offset = (bfd_vma) -1;
2130 }
2131 }
2132
2133 if (htab->tls_ldm_got.refcount > 0)
2134 {
2135 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
2136 relocs. */
2137 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2138 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
2139 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
2140 }
2141 else
2142 htab->tls_ldm_got.offset = -1;
2143
2144 /* Allocate global sym .plt and .got entries, and space for global
2145 sym dynamic relocs. */
2146 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
2147
2148 /* We now have determined the sizes of the various dynamic sections.
2149 Allocate memory for them. */
2150 relocs = FALSE;
2151 for (s = dynobj->sections; s != NULL; s = s->next)
2152 {
2153 if ((s->flags & SEC_LINKER_CREATED) == 0)
2154 continue;
2155
2156 if (s == htab->elf.splt
2157 || s == htab->elf.sgot
2158 || s == htab->elf.sgotplt
2159 || s == htab->elf.sdynbss
2160 || s == htab->elf.iplt
2161 || s == htab->elf.igotplt
2162 || s == htab->irelifunc)
2163 {
2164 /* Strip this section if we don't need it; see the
2165 comment below. */
2166 }
2167 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2168 {
2169 if (s->size != 0)
2170 relocs = TRUE;
2171
2172 /* We use the reloc_count field as a counter if we need
2173 to copy relocs into the output file. */
2174 s->reloc_count = 0;
2175 }
2176 else
2177 {
2178 /* It's not one of our sections, so don't allocate space. */
2179 continue;
2180 }
2181
2182 if (s->size == 0)
2183 {
2184 /* If we don't need this section, strip it from the
2185 output file. This is to handle .rela.bss and
2186 .rela.plt. We must create it in
2187 create_dynamic_sections, because it must be created
2188 before the linker maps input sections to output
2189 sections. The linker does that before
2190 adjust_dynamic_symbol is called, and it is that
2191 function which decides whether anything needs to go
2192 into these sections. */
2193
2194 s->flags |= SEC_EXCLUDE;
2195 continue;
2196 }
2197
2198 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2199 continue;
2200
2201 /* Allocate memory for the section contents. We use bfd_zalloc
2202 here in case unused entries are not reclaimed before the
2203 section's contents are written out. This should not happen,
2204 but this way if it does, we get a R_390_NONE reloc instead
2205 of garbage. */
2206 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2207 if (s->contents == NULL)
2208 return FALSE;
2209 }
2210
2211 if (htab->elf.dynamic_sections_created)
2212 {
2213 /* Add some entries to the .dynamic section. We fill in the
2214 values later, in elf_s390_finish_dynamic_sections, but we
2215 must add the entries now so that we get the correct size for
2216 the .dynamic section. The DT_DEBUG entry is filled in by the
2217 dynamic linker and used by the debugger. */
2218 #define add_dynamic_entry(TAG, VAL) \
2219 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2220
2221 if (bfd_link_executable (info))
2222 {
2223 if (!add_dynamic_entry (DT_DEBUG, 0))
2224 return FALSE;
2225 }
2226
2227 if (htab->elf.splt->size != 0)
2228 {
2229 if (!add_dynamic_entry (DT_PLTGOT, 0)
2230 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2231 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2232 || !add_dynamic_entry (DT_JMPREL, 0))
2233 return FALSE;
2234 }
2235
2236 if (relocs)
2237 {
2238 if (!add_dynamic_entry (DT_RELA, 0)
2239 || !add_dynamic_entry (DT_RELASZ, 0)
2240 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
2241 return FALSE;
2242
2243 /* If any dynamic relocs apply to a read-only section,
2244 then we need a DT_TEXTREL entry. */
2245 if ((info->flags & DF_TEXTREL) == 0)
2246 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
2247
2248 if ((info->flags & DF_TEXTREL) != 0)
2249 {
2250 if (!add_dynamic_entry (DT_TEXTREL, 0))
2251 return FALSE;
2252 }
2253 }
2254 }
2255 #undef add_dynamic_entry
2256
2257 return TRUE;
2258 }
2259
2260 /* Return the base VMA address which should be subtracted from real addresses
2261 when resolving @dtpoff relocation.
2262 This is PT_TLS segment p_vaddr. */
2263
2264 static bfd_vma
2265 dtpoff_base (struct bfd_link_info *info)
2266 {
2267 /* If tls_sec is NULL, we should have signalled an error already. */
2268 if (elf_hash_table (info)->tls_sec == NULL)
2269 return 0;
2270 return elf_hash_table (info)->tls_sec->vma;
2271 }
2272
2273 /* Return the relocation value for @tpoff relocation
2274 if STT_TLS virtual address is ADDRESS. */
2275
2276 static bfd_vma
2277 tpoff (struct bfd_link_info *info, bfd_vma address)
2278 {
2279 struct elf_link_hash_table *htab = elf_hash_table (info);
2280
2281 /* If tls_sec is NULL, we should have signalled an error already. */
2282 if (htab->tls_sec == NULL)
2283 return 0;
2284 return htab->tls_size + htab->tls_sec->vma - address;
2285 }
2286
2287 /* Complain if TLS instruction relocation is against an invalid
2288 instruction. */
2289
2290 static void
2291 invalid_tls_insn (bfd *input_bfd,
2292 asection *input_section,
2293 Elf_Internal_Rela *rel)
2294 {
2295 reloc_howto_type *howto;
2296
2297 howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
2298 _bfd_error_handler
2299 /* xgettext:c-format */
2300 (_("%B(%A+0x%lx): invalid instruction for TLS relocation %s"),
2301 input_bfd,
2302 input_section,
2303 (long) rel->r_offset,
2304 howto->name);
2305 bfd_set_error (bfd_error_bad_value);
2306 }
2307
2308 /* Relocate a 390 ELF section. */
2309
2310 static bfd_boolean
2311 elf_s390_relocate_section (bfd *output_bfd,
2312 struct bfd_link_info *info,
2313 bfd *input_bfd,
2314 asection *input_section,
2315 bfd_byte *contents,
2316 Elf_Internal_Rela *relocs,
2317 Elf_Internal_Sym *local_syms,
2318 asection **local_sections)
2319 {
2320 struct elf_s390_link_hash_table *htab;
2321 Elf_Internal_Shdr *symtab_hdr;
2322 struct elf_link_hash_entry **sym_hashes;
2323 bfd_vma *local_got_offsets;
2324 Elf_Internal_Rela *rel;
2325 Elf_Internal_Rela *relend;
2326
2327 BFD_ASSERT (is_s390_elf (input_bfd));
2328
2329 htab = elf_s390_hash_table (info);
2330 symtab_hdr = &elf_symtab_hdr (input_bfd);
2331 sym_hashes = elf_sym_hashes (input_bfd);
2332 local_got_offsets = elf_local_got_offsets (input_bfd);
2333
2334 rel = relocs;
2335 relend = relocs + input_section->reloc_count;
2336 for (; rel < relend; rel++)
2337 {
2338 unsigned int r_type;
2339 reloc_howto_type *howto;
2340 unsigned long r_symndx;
2341 struct elf_link_hash_entry *h;
2342 Elf_Internal_Sym *sym;
2343 asection *sec;
2344 bfd_vma off;
2345 bfd_vma relocation;
2346 bfd_boolean unresolved_reloc;
2347 bfd_reloc_status_type r;
2348 int tls_type;
2349 asection *base_got = htab->elf.sgot;
2350
2351 r_type = ELF32_R_TYPE (rel->r_info);
2352 if (r_type == (int) R_390_GNU_VTINHERIT
2353 || r_type == (int) R_390_GNU_VTENTRY)
2354 continue;
2355 if (r_type >= (int) R_390_max)
2356 {
2357 bfd_set_error (bfd_error_bad_value);
2358 return FALSE;
2359 }
2360
2361 howto = elf_howto_table + r_type;
2362 r_symndx = ELF32_R_SYM (rel->r_info);
2363
2364 h = NULL;
2365 sym = NULL;
2366 sec = NULL;
2367 unresolved_reloc = FALSE;
2368 if (r_symndx < symtab_hdr->sh_info)
2369 {
2370 sym = local_syms + r_symndx;
2371 sec = local_sections[r_symndx];
2372 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2373 {
2374 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2375 if (local_plt == NULL)
2376 return FALSE;
2377
2378 /* Address of the PLT slot. */
2379 relocation = (htab->elf.iplt->output_section->vma
2380 + htab->elf.iplt->output_offset
2381 + local_plt[r_symndx].plt.offset);
2382
2383 switch (r_type)
2384 {
2385 case R_390_PLTOFF16:
2386 case R_390_PLTOFF32:
2387 relocation -= htab->elf.sgot->output_section->vma;
2388 break;
2389 case R_390_GOTPLT12:
2390 case R_390_GOTPLT16:
2391 case R_390_GOTPLT20:
2392 case R_390_GOTPLT32:
2393 case R_390_GOTPLTENT:
2394 case R_390_GOT12:
2395 case R_390_GOT16:
2396 case R_390_GOT20:
2397 case R_390_GOT32:
2398 case R_390_GOTENT:
2399 {
2400 /* Write the PLT slot address into the GOT slot. */
2401 bfd_put_32 (output_bfd, relocation,
2402 htab->elf.sgot->contents +
2403 local_got_offsets[r_symndx]);
2404 relocation = (local_got_offsets[r_symndx] +
2405 htab->elf.sgot->output_offset);
2406
2407 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2408 relocation += htab->elf.sgot->output_section->vma;
2409 break;
2410 }
2411 default:
2412 break;
2413 }
2414 /* The output section is needed later in
2415 finish_dynamic_section when creating the dynamic
2416 relocation. */
2417 local_plt[r_symndx].sec = sec;
2418 goto do_relocation;
2419 }
2420 else
2421 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2422 }
2423 else
2424 {
2425 bfd_boolean warned ATTRIBUTE_UNUSED;
2426 bfd_boolean ignored ATTRIBUTE_UNUSED;
2427
2428 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2429 r_symndx, symtab_hdr, sym_hashes,
2430 h, sec, relocation,
2431 unresolved_reloc, warned, ignored);
2432 }
2433
2434 if (sec != NULL && discarded_section (sec))
2435 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2436 rel, 1, relend, howto, 0, contents);
2437
2438 if (bfd_link_relocatable (info))
2439 continue;
2440
2441 switch (r_type)
2442 {
2443 case R_390_GOTPLT12:
2444 case R_390_GOTPLT16:
2445 case R_390_GOTPLT20:
2446 case R_390_GOTPLT32:
2447 case R_390_GOTPLTENT:
2448 /* There are three cases for a GOTPLT relocation. 1) The
2449 relocation is against the jump slot entry of a plt that
2450 will get emitted to the output file. 2) The relocation
2451 is against the jump slot of a plt entry that has been
2452 removed. elf_s390_adjust_gotplt has created a GOT entry
2453 as replacement. 3) The relocation is against a local symbol.
2454 Cases 2) and 3) are the same as the GOT relocation code
2455 so we just have to test for case 1 and fall through for
2456 the other two. */
2457 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2458 {
2459 bfd_vma plt_index;
2460
2461 if (s390_is_ifunc_symbol_p (h))
2462 {
2463 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2464 relocation = (plt_index * GOT_ENTRY_SIZE +
2465 htab->elf.igotplt->output_offset);
2466 if (r_type == R_390_GOTPLTENT)
2467 relocation += htab->elf.igotplt->output_section->vma;
2468 }
2469 else
2470 {
2471 /* Calc. index no.
2472 Current offset - size first entry / entry size. */
2473 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2474 PLT_ENTRY_SIZE;
2475
2476 /* Offset in GOT is PLT index plus GOT headers(3)
2477 times 4, addr & GOT addr. */
2478 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2479 if (r_type == R_390_GOTPLTENT)
2480 relocation += htab->elf.sgot->output_section->vma;
2481 }
2482 unresolved_reloc = FALSE;
2483
2484 }
2485 /* Fall through. */
2486
2487 case R_390_GOT12:
2488 case R_390_GOT16:
2489 case R_390_GOT20:
2490 case R_390_GOT32:
2491 case R_390_GOTENT:
2492 /* Relocation is to the entry for this symbol in the global
2493 offset table. */
2494 if (base_got == NULL)
2495 abort ();
2496
2497 if (h != NULL)
2498 {
2499 bfd_boolean dyn;
2500
2501 off = h->got.offset;
2502 dyn = htab->elf.dynamic_sections_created;
2503
2504 if (s390_is_ifunc_symbol_p (h))
2505 {
2506 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2507 if (off == (bfd_vma)-1)
2508 {
2509 /* No explicit GOT usage so redirect to the
2510 got.iplt slot. */
2511 base_got = htab->elf.igotplt;
2512 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2513 }
2514 else
2515 {
2516 /* Explicit GOT slots must contain the address
2517 of the PLT slot. This will be handled in
2518 finish_dynamic_symbol. */
2519 }
2520 }
2521 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2522 bfd_link_pic (info),
2523 h)
2524 || (bfd_link_pic (info)
2525 && SYMBOL_REFERENCES_LOCAL (info, h))
2526 || (ELF_ST_VISIBILITY (h->other)
2527 && h->root.type == bfd_link_hash_undefweak))
2528
2529 {
2530 /* This is actually a static link, or it is a
2531 -Bsymbolic link and the symbol is defined
2532 locally, or the symbol was forced to be local
2533 because of a version file. We must initialize
2534 this entry in the global offset table. Since the
2535 offset must always be a multiple of 2, we use the
2536 least significant bit to record whether we have
2537 initialized it already.
2538
2539 When doing a dynamic link, we create a .rel.got
2540 relocation entry to initialize the value. This
2541 is done in the finish_dynamic_symbol routine. */
2542 if ((off & 1) != 0)
2543 off &= ~1;
2544 else
2545 {
2546 bfd_put_32 (output_bfd, relocation,
2547 base_got->contents + off);
2548 h->got.offset |= 1;
2549 }
2550
2551 if ((h->def_regular
2552 && bfd_link_pic (info)
2553 && SYMBOL_REFERENCES_LOCAL (info, h))
2554 /* lrl rx,sym@GOTENT -> larl rx, sym */
2555 && ((r_type == R_390_GOTENT
2556 && (bfd_get_16 (input_bfd,
2557 contents + rel->r_offset - 2)
2558 & 0xff0f) == 0xc40d)
2559 /* ly rx, sym@GOT(r12) -> larl rx, sym */
2560 || (r_type == R_390_GOT20
2561 && (bfd_get_32 (input_bfd,
2562 contents + rel->r_offset - 2)
2563 & 0xff00f000) == 0xe300c000
2564 && bfd_get_8 (input_bfd,
2565 contents + rel->r_offset + 3) == 0x58)))
2566 {
2567 unsigned short new_insn =
2568 (0xc000 | (bfd_get_8 (input_bfd,
2569 contents + rel->r_offset - 1) & 0xf0));
2570 bfd_put_16 (output_bfd, new_insn,
2571 contents + rel->r_offset - 2);
2572 r_type = R_390_PC32DBL;
2573 rel->r_addend = 2;
2574 howto = elf_howto_table + r_type;
2575 relocation = h->root.u.def.value
2576 + h->root.u.def.section->output_section->vma
2577 + h->root.u.def.section->output_offset;
2578 goto do_relocation;
2579 }
2580 }
2581 else
2582 unresolved_reloc = FALSE;
2583 }
2584 else
2585 {
2586 if (local_got_offsets == NULL)
2587 abort ();
2588
2589 off = local_got_offsets[r_symndx];
2590
2591 /* The offset must always be a multiple of 4. We use
2592 the least significant bit to record whether we have
2593 already generated the necessary reloc. */
2594 if ((off & 1) != 0)
2595 off &= ~1;
2596 else
2597 {
2598 bfd_put_32 (output_bfd, relocation,
2599 htab->elf.sgot->contents + off);
2600
2601 if (bfd_link_pic (info))
2602 {
2603 asection *srelgot;
2604 Elf_Internal_Rela outrel;
2605 bfd_byte *loc;
2606
2607 srelgot = htab->elf.srelgot;
2608 if (srelgot == NULL)
2609 abort ();
2610
2611 outrel.r_offset = (htab->elf.sgot->output_section->vma
2612 + htab->elf.sgot->output_offset
2613 + off);
2614 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2615 outrel.r_addend = relocation;
2616 loc = srelgot->contents;
2617 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2618 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2619 }
2620
2621 local_got_offsets[r_symndx] |= 1;
2622 }
2623 }
2624
2625 if (off >= (bfd_vma) -2)
2626 abort ();
2627
2628 relocation = base_got->output_offset + off;
2629
2630 /* For @GOTENT the relocation is against the offset between
2631 the instruction and the symbols entry in the GOT and not
2632 between the start of the GOT and the symbols entry. We
2633 add the vma of the GOT to get the correct value. */
2634 if ( r_type == R_390_GOTENT
2635 || r_type == R_390_GOTPLTENT)
2636 relocation += base_got->output_section->vma;
2637
2638 break;
2639
2640 case R_390_GOTOFF16:
2641 case R_390_GOTOFF32:
2642 /* Relocation is relative to the start of the global offset
2643 table. */
2644
2645 if (h != NULL
2646 && s390_is_ifunc_symbol_p (h)
2647 && h->def_regular
2648 && !bfd_link_executable (info))
2649 {
2650 relocation = (htab->elf.iplt->output_section->vma
2651 + htab->elf.iplt->output_offset
2652 + h->plt.offset
2653 - htab->elf.sgot->output_section->vma);
2654 goto do_relocation;
2655 }
2656
2657 /* Note that sgot->output_offset is not involved in this
2658 calculation. We always want the start of .got. If we
2659 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2660 permitted by the ABI, we might have to change this
2661 calculation. */
2662 relocation -= htab->elf.sgot->output_section->vma;
2663 break;
2664
2665 case R_390_GOTPC:
2666 case R_390_GOTPCDBL:
2667 /* Use global offset table as symbol value. */
2668 relocation = htab->elf.sgot->output_section->vma;
2669 unresolved_reloc = FALSE;
2670 break;
2671
2672 case R_390_PLT12DBL:
2673 case R_390_PLT16DBL:
2674 case R_390_PLT24DBL:
2675 case R_390_PLT32DBL:
2676 case R_390_PLT32:
2677 /* Relocation is to the entry for this symbol in the
2678 procedure linkage table. */
2679
2680 /* Resolve a PLT32 reloc against a local symbol directly,
2681 without using the procedure linkage table. */
2682 if (h == NULL)
2683 break;
2684
2685 if (h->plt.offset == (bfd_vma) -1
2686 || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
2687 {
2688 /* We didn't make a PLT entry for this symbol. This
2689 happens when statically linking PIC code, or when
2690 using -Bsymbolic. */
2691 break;
2692 }
2693
2694 if (s390_is_ifunc_symbol_p (h))
2695 relocation = (htab->elf.iplt->output_section->vma
2696 + htab->elf.iplt->output_offset
2697 + h->plt.offset);
2698 else
2699 relocation = (htab->elf.splt->output_section->vma
2700 + htab->elf.splt->output_offset
2701 + h->plt.offset);
2702 unresolved_reloc = FALSE;
2703 break;
2704
2705 case R_390_PLTOFF16:
2706 case R_390_PLTOFF32:
2707 /* Relocation is to the entry for this symbol in the
2708 procedure linkage table relative to the start of the GOT. */
2709
2710 /* For local symbols or if we didn't make a PLT entry for
2711 this symbol resolve the symbol directly. */
2712 if (h == NULL
2713 || h->plt.offset == (bfd_vma) -1
2714 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2715 {
2716 relocation -= htab->elf.sgot->output_section->vma;
2717 break;
2718 }
2719
2720 if (s390_is_ifunc_symbol_p (h))
2721 relocation = (htab->elf.iplt->output_section->vma
2722 + htab->elf.iplt->output_offset
2723 + h->plt.offset
2724 - htab->elf.sgot->output_section->vma);
2725 else
2726 relocation = (htab->elf.splt->output_section->vma
2727 + htab->elf.splt->output_offset
2728 + h->plt.offset
2729 - htab->elf.sgot->output_section->vma);
2730 unresolved_reloc = FALSE;
2731 break;
2732
2733 case R_390_PC16:
2734 case R_390_PC12DBL:
2735 case R_390_PC16DBL:
2736 case R_390_PC24DBL:
2737 case R_390_PC32DBL:
2738 case R_390_PC32:
2739 if (h != NULL
2740 && s390_is_ifunc_symbol_p (h)
2741 && h->def_regular
2742 && !bfd_link_executable (info))
2743 {
2744 /* This will not work our if the function does not
2745 happen to set up the GOT pointer for some other
2746 reason. 31 bit PLT entries require r12 to hold the
2747 GOT pointer.
2748 FIXME: Implement an errorcheck.
2749 NOTE: It will work when brasl is not available
2750 (e.g. with -m31 -march=g5) since a local function
2751 call then does use GOTOFF which implies r12 being set
2752 up. */
2753 relocation = (htab->elf.iplt->output_section->vma
2754 + htab->elf.iplt->output_offset
2755 + h ->plt.offset);
2756 goto do_relocation;
2757 }
2758 /* Fall through. */
2759
2760 case R_390_8:
2761 case R_390_16:
2762 case R_390_32:
2763 if (h != NULL
2764 && s390_is_ifunc_symbol_p (h)
2765 && h->def_regular)
2766 {
2767 if (!bfd_link_pic (info) || !h->non_got_ref)
2768 {
2769 /* For a non-shared object STT_GNU_IFUNC symbol must
2770 go through PLT. */
2771 relocation = (htab->elf.iplt->output_section->vma
2772 + htab->elf.iplt->output_offset
2773 + h ->plt.offset);
2774 goto do_relocation;
2775 }
2776 else
2777 {
2778 /* For shared objects a runtime relocation is needed. */
2779
2780 Elf_Internal_Rela outrel;
2781 asection *sreloc;
2782
2783 /* Need a dynamic relocation to get the real function
2784 address. */
2785 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2786 info,
2787 input_section,
2788 rel->r_offset);
2789 if (outrel.r_offset == (bfd_vma) -1
2790 || outrel.r_offset == (bfd_vma) -2)
2791 abort ();
2792
2793 outrel.r_offset += (input_section->output_section->vma
2794 + input_section->output_offset);
2795
2796 if (h->dynindx == -1
2797 || h->forced_local
2798 || bfd_link_executable (info))
2799 {
2800 /* This symbol is resolved locally. */
2801 outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2802 outrel.r_addend = (h->root.u.def.value
2803 + h->root.u.def.section->output_section->vma
2804 + h->root.u.def.section->output_offset);
2805 }
2806 else
2807 {
2808 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2809 outrel.r_addend = 0;
2810 }
2811
2812 sreloc = htab->elf.irelifunc;
2813 elf_append_rela (output_bfd, sreloc, &outrel);
2814
2815 /* If this reloc is against an external symbol, we
2816 do not want to fiddle with the addend. Otherwise,
2817 we need to include the symbol value so that it
2818 becomes an addend for the dynamic reloc. For an
2819 internal symbol, we have updated addend. */
2820 continue;
2821 }
2822 }
2823
2824 if ((input_section->flags & SEC_ALLOC) == 0)
2825 break;
2826
2827 if ((bfd_link_pic (info)
2828 && (h == NULL
2829 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2830 || h->root.type != bfd_link_hash_undefweak)
2831 && ((r_type != R_390_PC16
2832 && r_type != R_390_PC12DBL
2833 && r_type != R_390_PC16DBL
2834 && r_type != R_390_PC24DBL
2835 && r_type != R_390_PC32DBL
2836 && r_type != R_390_PC32)
2837 || !SYMBOL_CALLS_LOCAL (info, h)))
2838 || (ELIMINATE_COPY_RELOCS
2839 && !bfd_link_pic (info)
2840 && h != NULL
2841 && h->dynindx != -1
2842 && !h->non_got_ref
2843 && ((h->def_dynamic
2844 && !h->def_regular)
2845 || h->root.type == bfd_link_hash_undefweak
2846 || h->root.type == bfd_link_hash_undefined)))
2847 {
2848 Elf_Internal_Rela outrel;
2849 bfd_boolean skip, relocate;
2850 asection *sreloc;
2851 bfd_byte *loc;
2852
2853 /* When generating a shared object, these relocations
2854 are copied into the output file to be resolved at run
2855 time. */
2856
2857 skip = FALSE;
2858 relocate = FALSE;
2859
2860 outrel.r_offset =
2861 _bfd_elf_section_offset (output_bfd, info, input_section,
2862 rel->r_offset);
2863 if (outrel.r_offset == (bfd_vma) -1)
2864 skip = TRUE;
2865 else if (outrel.r_offset == (bfd_vma) -2)
2866 skip = TRUE, relocate = TRUE;
2867 outrel.r_offset += (input_section->output_section->vma
2868 + input_section->output_offset);
2869
2870 if (skip)
2871 memset (&outrel, 0, sizeof outrel);
2872 else if (h != NULL
2873 && h->dynindx != -1
2874 && (r_type == R_390_PC16
2875 || r_type == R_390_PC12DBL
2876 || r_type == R_390_PC16DBL
2877 || r_type == R_390_PC24DBL
2878 || r_type == R_390_PC32DBL
2879 || r_type == R_390_PC32
2880 || !bfd_link_pic (info)
2881 || !SYMBOLIC_BIND (info, h)
2882 || !h->def_regular))
2883 {
2884 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2885 outrel.r_addend = rel->r_addend;
2886 }
2887 else
2888 {
2889 /* This symbol is local, or marked to become local. */
2890 outrel.r_addend = relocation + rel->r_addend;
2891 if (r_type == R_390_32)
2892 {
2893 relocate = TRUE;
2894 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2895 }
2896 else
2897 {
2898 long sindx;
2899
2900 if (bfd_is_abs_section (sec))
2901 sindx = 0;
2902 else if (sec == NULL || sec->owner == NULL)
2903 {
2904 bfd_set_error(bfd_error_bad_value);
2905 return FALSE;
2906 }
2907 else
2908 {
2909 asection *osec;
2910
2911 osec = sec->output_section;
2912 sindx = elf_section_data (osec)->dynindx;
2913 if (sindx == 0)
2914 {
2915 osec = htab->elf.text_index_section;
2916 sindx = elf_section_data (osec)->dynindx;
2917 }
2918 BFD_ASSERT (sindx != 0);
2919
2920 /* We are turning this relocation into one
2921 against a section symbol, so subtract out
2922 the output section's address but not the
2923 offset of the input section in the output
2924 section. */
2925 outrel.r_addend -= osec->vma;
2926 }
2927 outrel.r_info = ELF32_R_INFO (sindx, r_type);
2928 }
2929 }
2930
2931 sreloc = elf_section_data (input_section)->sreloc;
2932 if (sreloc == NULL)
2933 abort ();
2934
2935 loc = sreloc->contents;
2936 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2937 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2938
2939 /* If this reloc is against an external symbol, we do
2940 not want to fiddle with the addend. Otherwise, we
2941 need to include the symbol value so that it becomes
2942 an addend for the dynamic reloc. */
2943 if (! relocate)
2944 continue;
2945 }
2946 break;
2947
2948 /* Relocations for tls literal pool entries. */
2949 case R_390_TLS_IE32:
2950 if (bfd_link_pic (info))
2951 {
2952 Elf_Internal_Rela outrel;
2953 asection *sreloc;
2954 bfd_byte *loc;
2955
2956 outrel.r_offset = rel->r_offset
2957 + input_section->output_section->vma
2958 + input_section->output_offset;
2959 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2960 sreloc = elf_section_data (input_section)->sreloc;
2961 if (sreloc == NULL)
2962 abort ();
2963 loc = sreloc->contents;
2964 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2965 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2966 }
2967 /* Fall through. */
2968
2969 case R_390_TLS_GD32:
2970 case R_390_TLS_GOTIE32:
2971 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2972 tls_type = GOT_UNKNOWN;
2973 if (h == NULL && local_got_offsets)
2974 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2975 else if (h != NULL)
2976 {
2977 tls_type = elf_s390_hash_entry(h)->tls_type;
2978 if (!bfd_link_pic (info)
2979 && h->dynindx == -1
2980 && tls_type >= GOT_TLS_IE)
2981 r_type = R_390_TLS_LE32;
2982 }
2983 if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2984 r_type = R_390_TLS_IE32;
2985
2986 if (r_type == R_390_TLS_LE32)
2987 {
2988 /* This relocation gets optimized away by the local exec
2989 access optimization. */
2990 BFD_ASSERT (! unresolved_reloc);
2991 bfd_put_32 (output_bfd, -tpoff (info, relocation),
2992 contents + rel->r_offset);
2993 continue;
2994 }
2995
2996 if (htab->elf.sgot == NULL)
2997 abort ();
2998
2999 if (h != NULL)
3000 off = h->got.offset;
3001 else
3002 {
3003 if (local_got_offsets == NULL)
3004 abort ();
3005
3006 off = local_got_offsets[r_symndx];
3007 }
3008
3009 emit_tls_relocs:
3010
3011 if ((off & 1) != 0)
3012 off &= ~1;
3013 else
3014 {
3015 Elf_Internal_Rela outrel;
3016 bfd_byte *loc;
3017 int dr_type, indx;
3018
3019 if (htab->elf.srelgot == NULL)
3020 abort ();
3021
3022 outrel.r_offset = (htab->elf.sgot->output_section->vma
3023 + htab->elf.sgot->output_offset + off);
3024
3025 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3026 if (r_type == R_390_TLS_GD32)
3027 dr_type = R_390_TLS_DTPMOD;
3028 else
3029 dr_type = R_390_TLS_TPOFF;
3030 if (dr_type == R_390_TLS_TPOFF && indx == 0)
3031 outrel.r_addend = relocation - dtpoff_base (info);
3032 else
3033 outrel.r_addend = 0;
3034 outrel.r_info = ELF32_R_INFO (indx, dr_type);
3035 loc = htab->elf.srelgot->contents;
3036 loc += htab->elf.srelgot->reloc_count++
3037 * sizeof (Elf32_External_Rela);
3038 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3039
3040 if (r_type == R_390_TLS_GD32)
3041 {
3042 if (indx == 0)
3043 {
3044 BFD_ASSERT (! unresolved_reloc);
3045 bfd_put_32 (output_bfd,
3046 relocation - dtpoff_base (info),
3047 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3048 }
3049 else
3050 {
3051 outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
3052 outrel.r_offset += GOT_ENTRY_SIZE;
3053 outrel.r_addend = 0;
3054 htab->elf.srelgot->reloc_count++;
3055 loc += sizeof (Elf32_External_Rela);
3056 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3057 }
3058 }
3059
3060 if (h != NULL)
3061 h->got.offset |= 1;
3062 else
3063 local_got_offsets[r_symndx] |= 1;
3064 }
3065
3066 if (off >= (bfd_vma) -2)
3067 abort ();
3068 if (r_type == ELF32_R_TYPE (rel->r_info))
3069 {
3070 relocation = htab->elf.sgot->output_offset + off;
3071 if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
3072 relocation += htab->elf.sgot->output_section->vma;
3073 unresolved_reloc = FALSE;
3074 }
3075 else
3076 {
3077 bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
3078 contents + rel->r_offset);
3079 continue;
3080 }
3081 break;
3082
3083 case R_390_TLS_GOTIE12:
3084 case R_390_TLS_GOTIE20:
3085 case R_390_TLS_IEENT:
3086 if (h == NULL)
3087 {
3088 if (local_got_offsets == NULL)
3089 abort();
3090 off = local_got_offsets[r_symndx];
3091 if (bfd_link_pic (info))
3092 goto emit_tls_relocs;
3093 }
3094 else
3095 {
3096 off = h->got.offset;
3097 tls_type = elf_s390_hash_entry(h)->tls_type;
3098 if (bfd_link_pic (info)
3099 || h->dynindx != -1
3100 || tls_type < GOT_TLS_IE)
3101 goto emit_tls_relocs;
3102 }
3103
3104 if (htab->elf.sgot == NULL)
3105 abort ();
3106
3107 BFD_ASSERT (! unresolved_reloc);
3108 bfd_put_32 (output_bfd, -tpoff (info, relocation),
3109 htab->elf.sgot->contents + off);
3110 relocation = htab->elf.sgot->output_offset + off;
3111 if (r_type == R_390_TLS_IEENT)
3112 relocation += htab->elf.sgot->output_section->vma;
3113 unresolved_reloc = FALSE;
3114 break;
3115
3116 case R_390_TLS_LDM32:
3117 if (! bfd_link_pic (info))
3118 /* The literal pool entry this relocation refers to gets ignored
3119 by the optimized code of the local exec model. Do nothing
3120 and the value will turn out zero. */
3121 continue;
3122
3123 if (htab->elf.sgot == NULL)
3124 abort ();
3125
3126 off = htab->tls_ldm_got.offset;
3127 if (off & 1)
3128 off &= ~1;
3129 else
3130 {
3131 Elf_Internal_Rela outrel;
3132 bfd_byte *loc;
3133
3134 if (htab->elf.srelgot == NULL)
3135 abort ();
3136
3137 outrel.r_offset = (htab->elf.sgot->output_section->vma
3138 + htab->elf.sgot->output_offset + off);
3139
3140 bfd_put_32 (output_bfd, 0,
3141 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3142 outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
3143 outrel.r_addend = 0;
3144 loc = htab->elf.srelgot->contents;
3145 loc += htab->elf.srelgot->reloc_count++
3146 * sizeof (Elf32_External_Rela);
3147 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3148 htab->tls_ldm_got.offset |= 1;
3149 }
3150 relocation = htab->elf.sgot->output_offset + off;
3151 unresolved_reloc = FALSE;
3152 break;
3153
3154 case R_390_TLS_LE32:
3155 if (bfd_link_dll (info))
3156 {
3157 /* Linking a shared library with non-fpic code requires
3158 a R_390_TLS_TPOFF relocation. */
3159 Elf_Internal_Rela outrel;
3160 asection *sreloc;
3161 bfd_byte *loc;
3162 int indx;
3163
3164 outrel.r_offset = rel->r_offset
3165 + input_section->output_section->vma
3166 + input_section->output_offset;
3167 if (h != NULL && h->dynindx != -1)
3168 indx = h->dynindx;
3169 else
3170 indx = 0;
3171 outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
3172 if (indx == 0)
3173 outrel.r_addend = relocation - dtpoff_base (info);
3174 else
3175 outrel.r_addend = 0;
3176 sreloc = elf_section_data (input_section)->sreloc;
3177 if (sreloc == NULL)
3178 abort ();
3179 loc = sreloc->contents;
3180 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3181 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3182 }
3183 else
3184 {
3185 BFD_ASSERT (! unresolved_reloc);
3186 bfd_put_32 (output_bfd, -tpoff (info, relocation),
3187 contents + rel->r_offset);
3188 }
3189 continue;
3190
3191 case R_390_TLS_LDO32:
3192 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
3193 relocation -= dtpoff_base (info);
3194 else
3195 /* When converting LDO to LE, we must negate. */
3196 relocation = -tpoff (info, relocation);
3197 break;
3198
3199 /* Relocations for tls instructions. */
3200 case R_390_TLS_LOAD:
3201 case R_390_TLS_GDCALL:
3202 case R_390_TLS_LDCALL:
3203 tls_type = GOT_UNKNOWN;
3204 if (h == NULL && local_got_offsets)
3205 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3206 else if (h != NULL)
3207 tls_type = elf_s390_hash_entry(h)->tls_type;
3208
3209 if (tls_type == GOT_TLS_GD)
3210 continue;
3211
3212 if (r_type == R_390_TLS_LOAD)
3213 {
3214 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3215 {
3216 /* IE->LE transition. Four valid cases:
3217 l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0
3218 l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0
3219 l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
3220 l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3221 unsigned int insn, ry;
3222
3223 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3224 ry = 0;
3225 if ((insn & 0xff00f000) == 0x58000000)
3226 /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0 */
3227 ry = (insn & 0x000f0000);
3228 else if ((insn & 0xff0f0000) == 0x58000000)
3229 /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0 */
3230 ry = (insn & 0x0000f000) << 4;
3231 else if ((insn & 0xff00f000) == 0x5800c000)
3232 /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0 */
3233 ry = (insn & 0x000f0000);
3234 else if ((insn & 0xff0f0000) == 0x580c0000)
3235 /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3236 ry = (insn & 0x0000f000) << 4;
3237 else
3238 invalid_tls_insn (input_bfd, input_section, rel);
3239 insn = 0x18000700 | (insn & 0x00f00000) | ry;
3240 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3241 }
3242 }
3243 else if (r_type == R_390_TLS_GDCALL)
3244 {
3245 unsigned int insn;
3246
3247 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3248 if ((insn & 0xff000fff) != 0x4d000000 &&
3249 (insn & 0xffff0000) != 0xc0e50000 &&
3250 (insn & 0xff000000) != 0x0d000000)
3251 invalid_tls_insn (input_bfd, input_section, rel);
3252 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3253 {
3254 if ((insn & 0xff000000) == 0x0d000000)
3255 {
3256 /* GD->LE transition.
3257 basr rx, ry -> nopr r7 */
3258 insn = 0x07070000 | (insn & 0xffff);
3259 }
3260 else if ((insn & 0xff000000) == 0x4d000000)
3261 {
3262 /* GD->LE transition.
3263 bas %r14,0(%rx,%r13) -> bc 0,0 */
3264 insn = 0x47000000;
3265 }
3266 else
3267 {
3268 /* GD->LE transition.
3269 brasl %r14,_tls_get_offset@plt -> brcl 0,. */
3270 insn = 0xc0040000;
3271 bfd_put_16 (output_bfd, 0x0000,
3272 contents + rel->r_offset + 4);
3273 }
3274 }
3275 else
3276 {
3277 /* If basr is used in the pic case to invoke
3278 _tls_get_offset, something went wrong before. */
3279 if ((insn & 0xff000000) == 0x0d000000)
3280 invalid_tls_insn (input_bfd, input_section, rel);
3281
3282 if ((insn & 0xff000000) == 0x4d000000)
3283 {
3284 /* GD->IE transition.
3285 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12) */
3286 insn = 0x5822c000;
3287 }
3288 else
3289 {
3290 /* GD->IE transition.
3291 brasl %r14,__tls_get_addr@plt ->
3292 l %r2,0(%r2,%r12) ; bcr 0,0 */
3293 insn = 0x5822c000;
3294 bfd_put_16 (output_bfd, 0x0700,
3295 contents + rel->r_offset + 4);
3296 }
3297 }
3298 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3299 }
3300 else if (r_type == R_390_TLS_LDCALL)
3301 {
3302 if (!bfd_link_pic (info))
3303 {
3304 unsigned int insn;
3305
3306 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3307 if ((insn & 0xff000fff) != 0x4d000000 &&
3308 (insn & 0xffff0000) != 0xc0e50000 &&
3309 (insn & 0xff000000) != 0x0d000000)
3310 invalid_tls_insn (input_bfd, input_section, rel);
3311
3312 if ((insn & 0xff000000) == 0x0d000000)
3313 {
3314 /* LD->LE transition.
3315 basr rx, ry -> nopr r7 */
3316 insn = 0x07070000 | (insn & 0xffff);
3317 }
3318 else if ((insn & 0xff000000) == 0x4d000000)
3319 {
3320 /* LD->LE transition.
3321 bas %r14,0(%rx,%r13) -> bc 0,0 */
3322 insn = 0x47000000;
3323 }
3324 else
3325 {
3326 /* LD->LE transition.
3327 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
3328 insn = 0xc0040000;
3329 bfd_put_16 (output_bfd, 0x0000,
3330 contents + rel->r_offset + 4);
3331 }
3332 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3333 }
3334 }
3335 continue;
3336
3337 default:
3338 break;
3339 }
3340
3341 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3342 because such sections are not SEC_ALLOC and thus ld.so will
3343 not process them. */
3344 if (unresolved_reloc
3345 && !((input_section->flags & SEC_DEBUGGING) != 0
3346 && h->def_dynamic)
3347 && _bfd_elf_section_offset (output_bfd, info, input_section,
3348 rel->r_offset) != (bfd_vma) -1)
3349 _bfd_error_handler
3350 /* xgettext:c-format */
3351 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3352 input_bfd,
3353 input_section,
3354 (long) rel->r_offset,
3355 howto->name,
3356 h->root.root.string);
3357
3358 do_relocation:
3359
3360 /* When applying a 24 bit reloc we need to start one byte
3361 earlier. Otherwise the 32 bit get/put bfd operations might
3362 access a byte after the actual section. */
3363 if (r_type == R_390_PC24DBL
3364 || r_type == R_390_PLT24DBL)
3365 rel->r_offset--;
3366
3367 if (r_type == R_390_20
3368 || r_type == R_390_GOT20
3369 || r_type == R_390_GOTPLT20
3370 || r_type == R_390_TLS_GOTIE20)
3371 {
3372 relocation += rel->r_addend;
3373 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3374 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3375 contents, rel->r_offset,
3376 relocation, 0);
3377 }
3378 else
3379 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3380 contents, rel->r_offset,
3381 relocation, rel->r_addend);
3382
3383 if (r != bfd_reloc_ok)
3384 {
3385 const char *name;
3386
3387 if (h != NULL)
3388 name = h->root.root.string;
3389 else
3390 {
3391 name = bfd_elf_string_from_elf_section (input_bfd,
3392 symtab_hdr->sh_link,
3393 sym->st_name);
3394 if (name == NULL)
3395 return FALSE;
3396 if (*name == '\0')
3397 name = bfd_section_name (input_bfd, sec);
3398 }
3399
3400 if (r == bfd_reloc_overflow)
3401 (*info->callbacks->reloc_overflow)
3402 (info, (h ? &h->root : NULL), name, howto->name,
3403 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3404 else
3405 {
3406 _bfd_error_handler
3407 /* xgettext:c-format */
3408 (_("%B(%A+0x%lx): reloc against `%s': error %d"),
3409 input_bfd, input_section,
3410 (long) rel->r_offset, name, (int) r);
3411 return FALSE;
3412 }
3413 }
3414 }
3415
3416 return TRUE;
3417 }
3418
3419 /* Generate the PLT slots together with the dynamic relocations needed
3420 for IFUNC symbols. */
3421
3422 static void
3423 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3424 struct bfd_link_info *info,
3425 struct elf_link_hash_entry *h,
3426 struct elf_s390_link_hash_table *htab,
3427 bfd_vma iplt_offset,
3428 bfd_vma resolver_address)
3429 {
3430 bfd_vma iplt_index;
3431 bfd_vma got_offset;
3432 bfd_vma igotiplt_offset;
3433 Elf_Internal_Rela rela;
3434 bfd_byte *loc;
3435 asection *plt, *gotplt, *relplt;
3436 bfd_vma relative_offset;
3437
3438 if (htab->elf.iplt == NULL
3439 || htab->elf.igotplt == NULL
3440 || htab->elf.irelplt == NULL)
3441 abort ();
3442
3443 gotplt = htab->elf.igotplt;
3444 relplt = htab->elf.irelplt;
3445
3446 /* Index of the PLT slot within iplt section. */
3447 iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3448 plt = htab->elf.iplt;
3449 /* Offset into the igot.plt section. */
3450 igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3451 /* Offset into the got section. */
3452 got_offset = igotiplt_offset + gotplt->output_offset;
3453
3454 /* S390 uses halfwords for relative branch calc! */
3455 relative_offset = - (plt->output_offset +
3456 (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
3457 /* If offset is > 32768, branch to a previous branch
3458 390 can only handle +-64 K jumps. */
3459 if ( -32768 > (int) relative_offset )
3460 relative_offset
3461 = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3462
3463 /* Fill in the entry in the procedure linkage table. */
3464 if (!bfd_link_pic (info))
3465 {
3466 memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3467 PLT_ENTRY_SIZE);
3468
3469 /* Adjust jump to the first plt entry. */
3470 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3471 plt->contents + iplt_offset + 20);
3472
3473 /* Push the GOT offset field. */
3474 bfd_put_32 (output_bfd,
3475 (gotplt->output_section->vma
3476 + got_offset),
3477 plt->contents + iplt_offset + 24);
3478 }
3479 else if (got_offset < 4096)
3480 {
3481 /* The GOT offset is small enough to be used directly as
3482 displacement. */
3483 memcpy (plt->contents + iplt_offset,
3484 elf_s390_plt_pic12_entry,
3485 PLT_ENTRY_SIZE);
3486
3487 /* Put in the GOT offset as displacement value. The 0xc000
3488 value comes from the first word of the plt entry. Look
3489 at the elf_s390_plt_pic16_entry content. */
3490 bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3491 plt->contents + iplt_offset + 2);
3492
3493 /* Adjust the jump to the first plt entry. */
3494 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3495 plt->contents + iplt_offset + 20);
3496 }
3497 else if (got_offset < 32768)
3498 {
3499 /* The GOT offset is too big for a displacement but small
3500 enough to be a signed 16 bit immediate value as it can be
3501 used in an lhi instruction. */
3502 memcpy (plt->contents + iplt_offset,
3503 elf_s390_plt_pic16_entry,
3504 PLT_ENTRY_SIZE);
3505
3506 /* Put in the GOT offset for the lhi instruction. */
3507 bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3508 plt->contents + iplt_offset + 2);
3509
3510 /* Adjust the jump to the first plt entry. */
3511 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3512 plt->contents + iplt_offset + 20);
3513 }
3514 else
3515 {
3516 memcpy (plt->contents + iplt_offset,
3517 elf_s390_plt_pic_entry,
3518 PLT_ENTRY_SIZE);
3519
3520 /* Adjust the jump to the first plt entry. */
3521 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3522 plt->contents + iplt_offset + 20);
3523
3524 /* Push the GOT offset field. */
3525 bfd_put_32 (output_bfd, got_offset,
3526 plt->contents + iplt_offset + 24);
3527 }
3528 /* Insert offset into reloc. table here. */
3529 bfd_put_32 (output_bfd, relplt->output_offset +
3530 iplt_index * RELA_ENTRY_SIZE,
3531 plt->contents + iplt_offset + 28);
3532
3533 /* Fill in the entry in the global offset table.
3534 Points to instruction after GOT offset. */
3535 bfd_put_32 (output_bfd,
3536 (plt->output_section->vma
3537 + plt->output_offset
3538 + iplt_offset
3539 + 12),
3540 gotplt->contents + igotiplt_offset);
3541
3542 /* Fill in the entry in the .rela.plt section. */
3543 rela.r_offset = gotplt->output_section->vma + got_offset;
3544
3545 if (!h
3546 || h->dynindx == -1
3547 || ((bfd_link_executable (info)
3548 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3549 && h->def_regular))
3550 {
3551 /* The symbol can be locally resolved. */
3552 rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3553 rela.r_addend = resolver_address;
3554 }
3555 else
3556 {
3557 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3558 rela.r_addend = 0;
3559 }
3560
3561 loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3562 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3563 }
3564
3565 /* Finish up dynamic symbol handling. We set the contents of various
3566 dynamic sections here. */
3567
3568 static bfd_boolean
3569 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3570 struct bfd_link_info *info,
3571 struct elf_link_hash_entry *h,
3572 Elf_Internal_Sym *sym)
3573 {
3574 struct elf_s390_link_hash_table *htab;
3575 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3576
3577 htab = elf_s390_hash_table (info);
3578
3579 if (h->plt.offset != (bfd_vma) -1)
3580 {
3581 bfd_vma plt_index;
3582 bfd_vma got_offset;
3583 Elf_Internal_Rela rela;
3584 bfd_byte *loc;
3585 bfd_vma relative_offset;
3586
3587 /* This symbol has an entry in the procedure linkage table. Set
3588 it up. */
3589 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3590 {
3591 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3592 htab, h->plt.offset,
3593 eh->ifunc_resolver_address +
3594 eh->ifunc_resolver_section->output_offset +
3595 eh->ifunc_resolver_section->output_section->vma);
3596 /* Do not return yet. Handling of explicit GOT slots of
3597 IFUNC symbols is below. */
3598 }
3599 else
3600 {
3601 if (h->dynindx == -1
3602 || htab->elf.splt == NULL
3603 || htab->elf.sgotplt == NULL
3604 || htab->elf.srelplt == NULL)
3605 abort ();
3606
3607 /* Calc. index no.
3608 Current offset - size first entry / entry size. */
3609 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3610
3611 /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3612 addr & GOT addr. */
3613 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3614
3615 /* S390 uses halfwords for relative branch calc! */
3616 relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3617 (PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3618 /* If offset is > 32768, branch to a previous branch
3619 390 can only handle +-64 K jumps. */
3620 if ( -32768 > (int) relative_offset )
3621 relative_offset
3622 = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3623
3624 /* Fill in the entry in the procedure linkage table. */
3625 if (!bfd_link_pic (info))
3626 {
3627 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3628 PLT_ENTRY_SIZE);
3629
3630 /* Adjust jump to the first plt entry. */
3631 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3632 htab->elf.splt->contents + h->plt.offset + 20);
3633
3634 /* Push the GOT offset field. */
3635 bfd_put_32 (output_bfd,
3636 (htab->elf.sgotplt->output_section->vma
3637 + htab->elf.sgotplt->output_offset
3638 + got_offset),
3639 htab->elf.splt->contents + h->plt.offset + 24);
3640 }
3641 else if (got_offset < 4096)
3642 {
3643 /* The GOT offset is small enough to be used directly as
3644 displacement. */
3645 memcpy (htab->elf.splt->contents + h->plt.offset,
3646 elf_s390_plt_pic12_entry,
3647 PLT_ENTRY_SIZE);
3648
3649 /* Put in the GOT offset as displacement value. The 0xc000
3650 value comes from the first word of the plt entry. Look
3651 at the elf_s390_plt_pic12_entry content. */
3652 bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3653 htab->elf.splt->contents + h->plt.offset + 2);
3654
3655 /* Adjust the jump to the first plt entry. */
3656 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3657 htab->elf.splt->contents + h->plt.offset + 20);
3658 }
3659 else if (got_offset < 32768)
3660 {
3661 /* The GOT offset is too big for a displacement but small
3662 enough to be a signed 16 bit immediate value as it can be
3663 used in an lhi instruction. */
3664 memcpy (htab->elf.splt->contents + h->plt.offset,
3665 elf_s390_plt_pic16_entry,
3666 PLT_ENTRY_SIZE);
3667
3668 /* Put in the GOT offset for the lhi instruction. */
3669 bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3670 htab->elf.splt->contents + h->plt.offset + 2);
3671
3672 /* Adjust the jump to the first plt entry. */
3673 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3674 htab->elf.splt->contents + h->plt.offset + 20);
3675 }
3676 else
3677 {
3678 memcpy (htab->elf.splt->contents + h->plt.offset,
3679 elf_s390_plt_pic_entry,
3680 PLT_ENTRY_SIZE);
3681
3682 /* Adjust the jump to the first plt entry. */
3683 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3684 htab->elf.splt->contents + h->plt.offset + 20);
3685
3686 /* Push the GOT offset field. */
3687 bfd_put_32 (output_bfd, got_offset,
3688 htab->elf.splt->contents + h->plt.offset + 24);
3689 }
3690 /* Insert offset into reloc. table here. */
3691 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3692 htab->elf.splt->contents + h->plt.offset + 28);
3693
3694 /* Fill in the entry in the global offset table.
3695 Points to instruction after GOT offset. */
3696 bfd_put_32 (output_bfd,
3697 (htab->elf.splt->output_section->vma
3698 + htab->elf.splt->output_offset
3699 + h->plt.offset
3700 + 12),
3701 htab->elf.sgotplt->contents + got_offset);
3702
3703 /* Fill in the entry in the .rela.plt section. */
3704 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3705 + htab->elf.sgotplt->output_offset
3706 + got_offset);
3707 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3708 rela.r_addend = 0;
3709 loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3710 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3711
3712 if (!h->def_regular)
3713 {
3714 /* Mark the symbol as undefined, rather than as defined in
3715 the .plt section. Leave the value alone. This is a clue
3716 for the dynamic linker, to make function pointer
3717 comparisons work between an application and shared
3718 library. */
3719 sym->st_shndx = SHN_UNDEF;
3720 }
3721 }
3722 }
3723
3724 if (h->got.offset != (bfd_vma) -1
3725 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3726 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3727 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3728 {
3729 Elf_Internal_Rela rela;
3730 bfd_byte *loc;
3731
3732 /* This symbol has an entry in the global offset table. Set it
3733 up. */
3734
3735 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3736 abort ();
3737
3738 rela.r_offset = (htab->elf.sgot->output_section->vma
3739 + htab->elf.sgot->output_offset
3740 + (h->got.offset &~ (bfd_vma) 1));
3741
3742 /* If this is a static link, or it is a -Bsymbolic link and the
3743 symbol is defined locally or was forced to be local because
3744 of a version file, we just want to emit a RELATIVE reloc.
3745 The entry in the global offset table will already have been
3746 initialized in the relocate_section function. */
3747 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3748 {
3749 if (bfd_link_pic (info))
3750 {
3751 /* An explicit GOT slot usage needs GLOB_DAT. If the
3752 symbol references local the implicit got.iplt slot
3753 will be used and the IRELATIVE reloc has been created
3754 above. */
3755 goto do_glob_dat;
3756 }
3757 else
3758 {
3759 /* For non-shared objects explicit GOT slots must be
3760 filled with the PLT slot address for pointer
3761 equality reasons. */
3762 bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3763 + htab->elf.iplt->output_offset
3764 + h->plt.offset),
3765 htab->elf.sgot->contents + h->got.offset);
3766 return TRUE;
3767 }
3768 }
3769 else if (bfd_link_pic (info)
3770 && SYMBOL_REFERENCES_LOCAL (info, h))
3771 {
3772 /* If this is a static link, or it is a -Bsymbolic link and
3773 the symbol is defined locally or was forced to be local
3774 because of a version file, we just want to emit a
3775 RELATIVE reloc. The entry in the global offset table
3776 will already have been initialized in the
3777 relocate_section function. */
3778 if (!h->def_regular)
3779 return FALSE;
3780 BFD_ASSERT((h->got.offset & 1) != 0);
3781 rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3782 rela.r_addend = (h->root.u.def.value
3783 + h->root.u.def.section->output_section->vma
3784 + h->root.u.def.section->output_offset);
3785 }
3786 else
3787 {
3788 BFD_ASSERT((h->got.offset & 1) == 0);
3789 do_glob_dat:
3790 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3791 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
3792 rela.r_addend = 0;
3793 }
3794
3795 loc = htab->elf.srelgot->contents;
3796 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3797 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3798 }
3799
3800 if (h->needs_copy)
3801 {
3802 Elf_Internal_Rela rela;
3803 bfd_byte *loc;
3804
3805 /* This symbols needs a copy reloc. Set it up. */
3806
3807 if (h->dynindx == -1
3808 || (h->root.type != bfd_link_hash_defined
3809 && h->root.type != bfd_link_hash_defweak)
3810 || htab->elf.srelbss == NULL)
3811 abort ();
3812
3813 rela.r_offset = (h->root.u.def.value
3814 + h->root.u.def.section->output_section->vma
3815 + h->root.u.def.section->output_offset);
3816 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3817 rela.r_addend = 0;
3818 loc = htab->elf.srelbss->contents;
3819 loc += htab->elf.srelbss->reloc_count++ * sizeof (Elf32_External_Rela);
3820 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3821 }
3822
3823 /* Mark some specially defined symbols as absolute. */
3824 if (h == htab->elf.hdynamic
3825 || h == htab->elf.hgot
3826 || h == htab->elf.hplt)
3827 sym->st_shndx = SHN_ABS;
3828
3829 return TRUE;
3830 }
3831
3832 /* Used to decide how to sort relocs in an optimal manner for the
3833 dynamic linker, before writing them out. */
3834
3835 static enum elf_reloc_type_class
3836 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3837 const asection *rel_sec ATTRIBUTE_UNUSED,
3838 const Elf_Internal_Rela *rela)
3839 {
3840 bfd *abfd = info->output_bfd;
3841 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3842 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3843 unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3844 Elf_Internal_Sym sym;
3845
3846 if (htab->elf.dynsym == NULL
3847 || !bed->s->swap_symbol_in (abfd,
3848 (htab->elf.dynsym->contents
3849 + r_symndx * bed->s->sizeof_sym),
3850 0, &sym))
3851 abort ();
3852
3853 /* Check relocation against STT_GNU_IFUNC symbol. */
3854 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3855 return reloc_class_ifunc;
3856
3857 switch ((int) ELF32_R_TYPE (rela->r_info))
3858 {
3859 case R_390_RELATIVE:
3860 return reloc_class_relative;
3861 case R_390_JMP_SLOT:
3862 return reloc_class_plt;
3863 case R_390_COPY:
3864 return reloc_class_copy;
3865 default:
3866 return reloc_class_normal;
3867 }
3868 }
3869
3870 /* Finish up the dynamic sections. */
3871
3872 static bfd_boolean
3873 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3874 struct bfd_link_info *info)
3875 {
3876 struct elf_s390_link_hash_table *htab;
3877 bfd *dynobj;
3878 asection *sdyn;
3879 bfd *ibfd;
3880 unsigned int i;
3881
3882 htab = elf_s390_hash_table (info);
3883 dynobj = htab->elf.dynobj;
3884 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3885
3886 if (htab->elf.dynamic_sections_created)
3887 {
3888 Elf32_External_Dyn *dyncon, *dynconend;
3889
3890 if (sdyn == NULL || htab->elf.sgot == NULL)
3891 abort ();
3892
3893 dyncon = (Elf32_External_Dyn *) sdyn->contents;
3894 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3895 for (; dyncon < dynconend; dyncon++)
3896 {
3897 Elf_Internal_Dyn dyn;
3898 asection *s;
3899
3900 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3901
3902 switch (dyn.d_tag)
3903 {
3904 default:
3905 continue;
3906
3907 case DT_PLTGOT:
3908 s = htab->elf.sgotplt;
3909 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3910 break;
3911
3912 case DT_JMPREL:
3913 s = htab->elf.srelplt;
3914 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3915 break;
3916
3917 case DT_PLTRELSZ:
3918 dyn.d_un.d_val = htab->elf.srelplt->size + htab->elf.irelplt->size;
3919 break;
3920 }
3921
3922 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3923 }
3924
3925 /* Fill in the special first entry in the procedure linkage table. */
3926 if (htab->elf.splt && htab->elf.splt->size > 0)
3927 {
3928 memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
3929 if (bfd_link_pic (info))
3930 {
3931 memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
3932 PLT_FIRST_ENTRY_SIZE);
3933 }
3934 else
3935 {
3936 memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
3937 PLT_FIRST_ENTRY_SIZE);
3938 bfd_put_32 (output_bfd,
3939 htab->elf.sgotplt->output_section->vma
3940 + htab->elf.sgotplt->output_offset,
3941 htab->elf.splt->contents + 24);
3942 }
3943 elf_section_data (htab->elf.splt->output_section)
3944 ->this_hdr.sh_entsize = 4;
3945 }
3946
3947 }
3948
3949 if (htab->elf.sgotplt)
3950 {
3951 /* Fill in the first three entries in the global offset table. */
3952 if (htab->elf.sgotplt->size > 0)
3953 {
3954 bfd_put_32 (output_bfd,
3955 (sdyn == NULL ? (bfd_vma) 0
3956 : sdyn->output_section->vma + sdyn->output_offset),
3957 htab->elf.sgotplt->contents);
3958 /* One entry for shared object struct ptr. */
3959 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
3960 /* One entry for _dl_runtime_resolve. */
3961 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3962 }
3963
3964 elf_section_data (htab->elf.sgotplt->output_section)
3965 ->this_hdr.sh_entsize = 4;
3966 }
3967 /* Finish dynamic symbol for local IFUNC symbols. */
3968 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3969 {
3970 struct plt_entry *local_plt;
3971 Elf_Internal_Sym *isym;
3972 Elf_Internal_Shdr *symtab_hdr;
3973
3974 symtab_hdr = &elf_symtab_hdr (ibfd);
3975
3976 local_plt = elf_s390_local_plt (ibfd);
3977 if (local_plt != NULL)
3978 for (i = 0; i < symtab_hdr->sh_info; i++)
3979 {
3980 if (local_plt[i].plt.offset != (bfd_vma) -1)
3981 {
3982 asection *sec = local_plt[i].sec;
3983 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3984 if (isym == NULL)
3985 return FALSE;
3986
3987 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3988 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3989 local_plt[i].plt.offset,
3990 isym->st_value
3991 + sec->output_section->vma
3992 + sec->output_offset);
3993
3994 }
3995 }
3996 }
3997 return TRUE;
3998 }
3999 \f
4000 /* Support for core dump NOTE sections. */
4001
4002 static bfd_boolean
4003 elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
4004 {
4005 int offset;
4006 unsigned int size;
4007
4008 switch (note->descsz)
4009 {
4010 default:
4011 return FALSE;
4012
4013 case 224: /* S/390 Linux. */
4014 /* pr_cursig */
4015 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
4016
4017 /* pr_pid */
4018 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
4019
4020 /* pr_reg */
4021 offset = 72;
4022 size = 144;
4023 break;
4024 }
4025
4026 /* Make a ".reg/999" section. */
4027 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
4028 size, note->descpos + offset);
4029 }
4030
4031 static bfd_boolean
4032 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
4033 {
4034 switch (note->descsz)
4035 {
4036 default:
4037 return FALSE;
4038
4039 case 124: /* sizeof(struct elf_prpsinfo) on s390 */
4040 elf_tdata (abfd)->core->pid
4041 = bfd_get_32 (abfd, note->descdata + 12);
4042 elf_tdata (abfd)->core->program
4043 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
4044 elf_tdata (abfd)->core->command
4045 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
4046 break;
4047 }
4048
4049 /* Note that for some reason, a spurious space is tacked
4050 onto the end of the args in some (at least one anyway)
4051 implementations, so strip it off if it exists. */
4052
4053 {
4054 char *command = elf_tdata (abfd)->core->command;
4055 int n = strlen (command);
4056
4057 if (0 < n && command[n - 1] == ' ')
4058 command[n - 1] = '\0';
4059 }
4060
4061 return TRUE;
4062 }
4063
4064 static char *
4065 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
4066 int note_type, ...)
4067 {
4068 va_list ap;
4069
4070 switch (note_type)
4071 {
4072 default:
4073 return NULL;
4074
4075 case NT_PRPSINFO:
4076 {
4077 char data[124] = { 0 };
4078 const char *fname, *psargs;
4079
4080 va_start (ap, note_type);
4081 fname = va_arg (ap, const char *);
4082 psargs = va_arg (ap, const char *);
4083 va_end (ap);
4084
4085 strncpy (data + 28, fname, 16);
4086 strncpy (data + 44, psargs, 80);
4087 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
4088 &data, sizeof (data));
4089 }
4090
4091 case NT_PRSTATUS:
4092 {
4093 char data[224] = { 0 };
4094 long pid;
4095 int cursig;
4096 const void *gregs;
4097
4098 va_start (ap, note_type);
4099 pid = va_arg (ap, long);
4100 cursig = va_arg (ap, int);
4101 gregs = va_arg (ap, const void *);
4102 va_end (ap);
4103
4104 bfd_put_16 (abfd, cursig, data + 12);
4105 bfd_put_32 (abfd, pid, data + 24);
4106 memcpy (data + 72, gregs, 144);
4107 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
4108 &data, sizeof (data));
4109 }
4110 }
4111 /* NOTREACHED */
4112 }
4113 \f
4114 /* Return address for Ith PLT stub in section PLT, for relocation REL
4115 or (bfd_vma) -1 if it should not be included. */
4116
4117 static bfd_vma
4118 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
4119 const arelent *rel ATTRIBUTE_UNUSED)
4120 {
4121 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
4122 }
4123
4124 /* Merge backend specific data from an object file to the output
4125 object file when linking. */
4126
4127 static bfd_boolean
4128 elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
4129 {
4130 bfd *obfd = info->output_bfd;
4131
4132 if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
4133 return TRUE;
4134
4135 if (!elf_s390_merge_obj_attributes (ibfd, info))
4136 return FALSE;
4137
4138 elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
4139 return TRUE;
4140 }
4141
4142
4143 #define TARGET_BIG_SYM s390_elf32_vec
4144 #define TARGET_BIG_NAME "elf32-s390"
4145 #define ELF_ARCH bfd_arch_s390
4146 #define ELF_TARGET_ID S390_ELF_DATA
4147 #define ELF_MACHINE_CODE EM_S390
4148 #define ELF_MACHINE_ALT1 EM_S390_OLD
4149 #define ELF_MAXPAGESIZE 0x1000
4150
4151 #define elf_backend_can_gc_sections 1
4152 #define elf_backend_can_refcount 1
4153 #define elf_backend_want_got_plt 1
4154 #define elf_backend_plt_readonly 1
4155 #define elf_backend_want_plt_sym 0
4156 #define elf_backend_got_header_size 12
4157 #define elf_backend_rela_normal 1
4158
4159 #define elf_info_to_howto elf_s390_info_to_howto
4160
4161 #define bfd_elf32_bfd_is_local_label_name elf_s390_is_local_label_name
4162 #define bfd_elf32_bfd_link_hash_table_create elf_s390_link_hash_table_create
4163 #define bfd_elf32_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
4164 #define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4165
4166 #define bfd_elf32_bfd_merge_private_bfd_data elf32_s390_merge_private_bfd_data
4167
4168 #define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
4169 #define elf_backend_check_relocs elf_s390_check_relocs
4170 #define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
4171 #define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
4172 #define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4173 #define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
4174 #define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
4175 #define elf_backend_gc_sweep_hook elf_s390_gc_sweep_hook
4176 #define elf_backend_reloc_type_class elf_s390_reloc_type_class
4177 #define elf_backend_relocate_section elf_s390_relocate_section
4178 #define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
4179 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4180 #define elf_backend_grok_prstatus elf_s390_grok_prstatus
4181 #define elf_backend_grok_psinfo elf_s390_grok_psinfo
4182 #define elf_backend_write_core_note elf_s390_write_core_note
4183 #define elf_backend_plt_sym_val elf_s390_plt_sym_val
4184 #define elf_backend_add_symbol_hook elf_s390_add_symbol_hook
4185 #define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
4186
4187 #define bfd_elf32_mkobject elf_s390_mkobject
4188 #define elf_backend_object_p elf_s390_object_p
4189
4190 #include "elf32-target.h"
This page took 0.121352 seconds and 4 git commands to generate.