2016-08-26 Thomas Preud'homme <thomas.preudhomme@arm.com>
[deliverable/binutils-gdb.git] / bfd / elf64-s390.c
1 /* IBM S/390-specific support for 64-bit ELF
2 Copyright (C) 2000-2016 Free Software Foundation, Inc.
3 Contributed Martin Schwidefsky (schwidefsky@de.ibm.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29
30 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
31 from smaller values. Start with zero, widen, *then* decrement. */
32 #define MINUS_ONE (((bfd_vma)0) - 1)
33
34 static bfd_reloc_status_type
35 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
36 asection *, bfd *, char **);
37 static bfd_reloc_status_type
38 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
39 asection *, bfd *, char **);
40
41 /* The relocation "howto" table. */
42 static reloc_howto_type elf_howto_table[] =
43 {
44 HOWTO (R_390_NONE, /* type */
45 0, /* rightshift */
46 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
47 0, /* bitsize */
48 FALSE, /* pc_relative */
49 0, /* bitpos */
50 complain_overflow_dont, /* complain_on_overflow */
51 bfd_elf_generic_reloc, /* special_function */
52 "R_390_NONE", /* name */
53 FALSE, /* partial_inplace */
54 0, /* src_mask */
55 0, /* dst_mask */
56 FALSE), /* pcrel_offset */
57
58 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
60 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
61 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
62 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
63 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
64 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
65 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
66 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
67 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
68 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
69 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
70 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
71 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
72 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
73 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
74 HOWTO(R_390_COPY, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
75 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,MINUS_ONE, FALSE),
76 HOWTO(R_390_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
77 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,MINUS_ONE, FALSE),
78 HOWTO(R_390_JMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
79 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,MINUS_ONE, FALSE),
80 HOWTO(R_390_RELATIVE, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
81 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,MINUS_ONE, FALSE),
82 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,MINUS_ONE, FALSE),
84 HOWTO(R_390_GOTPC, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,MINUS_ONE, TRUE),
86 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
88 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
89 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
90 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
91 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
92 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
93 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
94 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
95 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
96 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
97 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
98 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
99 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,MINUS_ONE, TRUE),
100 HOWTO(R_390_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
101 bfd_elf_generic_reloc, "R_390_64", FALSE, 0,MINUS_ONE, FALSE),
102 HOWTO(R_390_PC64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
103 bfd_elf_generic_reloc, "R_390_PC64", FALSE, 0,MINUS_ONE, TRUE),
104 HOWTO(R_390_GOT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
105 bfd_elf_generic_reloc, "R_390_GOT64", FALSE, 0,MINUS_ONE, FALSE),
106 HOWTO(R_390_PLT64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
107 bfd_elf_generic_reloc, "R_390_PLT64", FALSE, 0,MINUS_ONE, TRUE),
108 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
109 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,MINUS_ONE, TRUE),
110 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
112 HOWTO(R_390_GOTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
113 bfd_elf_generic_reloc, "R_390_GOTOFF64", FALSE, 0,MINUS_ONE, FALSE),
114 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
116 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
117 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
118 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
119 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
120 HOWTO(R_390_GOTPLT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
121 bfd_elf_generic_reloc, "R_390_GOTPLT64", FALSE, 0,MINUS_ONE, FALSE),
122 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
123 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,MINUS_ONE, TRUE),
124 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
125 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
126 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
128 HOWTO(R_390_PLTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
129 bfd_elf_generic_reloc, "R_390_PLTOFF64", FALSE, 0,MINUS_ONE, FALSE),
130 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
131 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
132 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
133 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
134 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
135 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
136 EMPTY_HOWTO (R_390_TLS_GD32), /* Empty entry for R_390_TLS_GD32. */
137 HOWTO(R_390_TLS_GD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_GD64", FALSE, 0, MINUS_ONE, FALSE),
139 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
140 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
141 EMPTY_HOWTO (R_390_TLS_GOTIE32), /* Empty entry for R_390_TLS_GOTIE32. */
142 HOWTO(R_390_TLS_GOTIE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_GOTIE64", FALSE, 0, MINUS_ONE, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LDM32), /* Empty entry for R_390_TLS_LDM32. */
145 HOWTO(R_390_TLS_LDM64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDM64", FALSE, 0, MINUS_ONE, FALSE),
147 EMPTY_HOWTO (R_390_TLS_IE32), /* Empty entry for R_390_TLS_IE32. */
148 HOWTO(R_390_TLS_IE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_IE64", FALSE, 0, MINUS_ONE, FALSE),
150 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, MINUS_ONE, TRUE),
152 EMPTY_HOWTO (R_390_TLS_LE32), /* Empty entry for R_390_TLS_LE32. */
153 HOWTO(R_390_TLS_LE64, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
154 bfd_elf_generic_reloc, "R_390_TLS_LE64", FALSE, 0, MINUS_ONE, FALSE),
155 EMPTY_HOWTO (R_390_TLS_LDO32), /* Empty entry for R_390_TLS_LDO32. */
156 HOWTO(R_390_TLS_LDO64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
157 bfd_elf_generic_reloc, "R_390_TLS_LDO64", FALSE, 0, MINUS_ONE, FALSE),
158 HOWTO(R_390_TLS_DTPMOD, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
159 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, MINUS_ONE, FALSE),
160 HOWTO(R_390_TLS_DTPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
161 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, MINUS_ONE, FALSE),
162 HOWTO(R_390_TLS_TPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, MINUS_ONE, FALSE),
164 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
165 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
166 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
167 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
168 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
169 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
170 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
171 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
172 HOWTO(R_390_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
173 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, MINUS_ONE, FALSE),
174 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
175 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
176 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
177 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
178 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
179 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
180 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
181 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
182 };
183
184 /* GNU extension to record C++ vtable hierarchy. */
185 static reloc_howto_type elf64_s390_vtinherit_howto =
186 HOWTO (R_390_GNU_VTINHERIT, 0,4,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
187 static reloc_howto_type elf64_s390_vtentry_howto =
188 HOWTO (R_390_GNU_VTENTRY, 0,4,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
189
190 static reloc_howto_type *
191 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
192 bfd_reloc_code_real_type code)
193 {
194 switch (code)
195 {
196 case BFD_RELOC_NONE:
197 return &elf_howto_table[(int) R_390_NONE];
198 case BFD_RELOC_8:
199 return &elf_howto_table[(int) R_390_8];
200 case BFD_RELOC_390_12:
201 return &elf_howto_table[(int) R_390_12];
202 case BFD_RELOC_16:
203 return &elf_howto_table[(int) R_390_16];
204 case BFD_RELOC_32:
205 return &elf_howto_table[(int) R_390_32];
206 case BFD_RELOC_CTOR:
207 return &elf_howto_table[(int) R_390_32];
208 case BFD_RELOC_32_PCREL:
209 return &elf_howto_table[(int) R_390_PC32];
210 case BFD_RELOC_390_GOT12:
211 return &elf_howto_table[(int) R_390_GOT12];
212 case BFD_RELOC_32_GOT_PCREL:
213 return &elf_howto_table[(int) R_390_GOT32];
214 case BFD_RELOC_390_PLT32:
215 return &elf_howto_table[(int) R_390_PLT32];
216 case BFD_RELOC_390_COPY:
217 return &elf_howto_table[(int) R_390_COPY];
218 case BFD_RELOC_390_GLOB_DAT:
219 return &elf_howto_table[(int) R_390_GLOB_DAT];
220 case BFD_RELOC_390_JMP_SLOT:
221 return &elf_howto_table[(int) R_390_JMP_SLOT];
222 case BFD_RELOC_390_RELATIVE:
223 return &elf_howto_table[(int) R_390_RELATIVE];
224 case BFD_RELOC_32_GOTOFF:
225 return &elf_howto_table[(int) R_390_GOTOFF32];
226 case BFD_RELOC_390_GOTPC:
227 return &elf_howto_table[(int) R_390_GOTPC];
228 case BFD_RELOC_390_GOT16:
229 return &elf_howto_table[(int) R_390_GOT16];
230 case BFD_RELOC_16_PCREL:
231 return &elf_howto_table[(int) R_390_PC16];
232 case BFD_RELOC_390_PC12DBL:
233 return &elf_howto_table[(int) R_390_PC12DBL];
234 case BFD_RELOC_390_PLT12DBL:
235 return &elf_howto_table[(int) R_390_PLT12DBL];
236 case BFD_RELOC_390_PC16DBL:
237 return &elf_howto_table[(int) R_390_PC16DBL];
238 case BFD_RELOC_390_PLT16DBL:
239 return &elf_howto_table[(int) R_390_PLT16DBL];
240 case BFD_RELOC_390_PC24DBL:
241 return &elf_howto_table[(int) R_390_PC24DBL];
242 case BFD_RELOC_390_PLT24DBL:
243 return &elf_howto_table[(int) R_390_PLT24DBL];
244 case BFD_RELOC_390_PC32DBL:
245 return &elf_howto_table[(int) R_390_PC32DBL];
246 case BFD_RELOC_390_PLT32DBL:
247 return &elf_howto_table[(int) R_390_PLT32DBL];
248 case BFD_RELOC_390_GOTPCDBL:
249 return &elf_howto_table[(int) R_390_GOTPCDBL];
250 case BFD_RELOC_64:
251 return &elf_howto_table[(int) R_390_64];
252 case BFD_RELOC_64_PCREL:
253 return &elf_howto_table[(int) R_390_PC64];
254 case BFD_RELOC_390_GOT64:
255 return &elf_howto_table[(int) R_390_GOT64];
256 case BFD_RELOC_390_PLT64:
257 return &elf_howto_table[(int) R_390_PLT64];
258 case BFD_RELOC_390_GOTENT:
259 return &elf_howto_table[(int) R_390_GOTENT];
260 case BFD_RELOC_16_GOTOFF:
261 return &elf_howto_table[(int) R_390_GOTOFF16];
262 case BFD_RELOC_390_GOTOFF64:
263 return &elf_howto_table[(int) R_390_GOTOFF64];
264 case BFD_RELOC_390_GOTPLT12:
265 return &elf_howto_table[(int) R_390_GOTPLT12];
266 case BFD_RELOC_390_GOTPLT16:
267 return &elf_howto_table[(int) R_390_GOTPLT16];
268 case BFD_RELOC_390_GOTPLT32:
269 return &elf_howto_table[(int) R_390_GOTPLT32];
270 case BFD_RELOC_390_GOTPLT64:
271 return &elf_howto_table[(int) R_390_GOTPLT64];
272 case BFD_RELOC_390_GOTPLTENT:
273 return &elf_howto_table[(int) R_390_GOTPLTENT];
274 case BFD_RELOC_390_PLTOFF16:
275 return &elf_howto_table[(int) R_390_PLTOFF16];
276 case BFD_RELOC_390_PLTOFF32:
277 return &elf_howto_table[(int) R_390_PLTOFF32];
278 case BFD_RELOC_390_PLTOFF64:
279 return &elf_howto_table[(int) R_390_PLTOFF64];
280 case BFD_RELOC_390_TLS_LOAD:
281 return &elf_howto_table[(int) R_390_TLS_LOAD];
282 case BFD_RELOC_390_TLS_GDCALL:
283 return &elf_howto_table[(int) R_390_TLS_GDCALL];
284 case BFD_RELOC_390_TLS_LDCALL:
285 return &elf_howto_table[(int) R_390_TLS_LDCALL];
286 case BFD_RELOC_390_TLS_GD64:
287 return &elf_howto_table[(int) R_390_TLS_GD64];
288 case BFD_RELOC_390_TLS_GOTIE12:
289 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
290 case BFD_RELOC_390_TLS_GOTIE64:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE64];
292 case BFD_RELOC_390_TLS_LDM64:
293 return &elf_howto_table[(int) R_390_TLS_LDM64];
294 case BFD_RELOC_390_TLS_IE64:
295 return &elf_howto_table[(int) R_390_TLS_IE64];
296 case BFD_RELOC_390_TLS_IEENT:
297 return &elf_howto_table[(int) R_390_TLS_IEENT];
298 case BFD_RELOC_390_TLS_LE64:
299 return &elf_howto_table[(int) R_390_TLS_LE64];
300 case BFD_RELOC_390_TLS_LDO64:
301 return &elf_howto_table[(int) R_390_TLS_LDO64];
302 case BFD_RELOC_390_TLS_DTPMOD:
303 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
304 case BFD_RELOC_390_TLS_DTPOFF:
305 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
306 case BFD_RELOC_390_TLS_TPOFF:
307 return &elf_howto_table[(int) R_390_TLS_TPOFF];
308 case BFD_RELOC_390_20:
309 return &elf_howto_table[(int) R_390_20];
310 case BFD_RELOC_390_GOT20:
311 return &elf_howto_table[(int) R_390_GOT20];
312 case BFD_RELOC_390_GOTPLT20:
313 return &elf_howto_table[(int) R_390_GOTPLT20];
314 case BFD_RELOC_390_TLS_GOTIE20:
315 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
316 case BFD_RELOC_390_IRELATIVE:
317 return &elf_howto_table[(int) R_390_IRELATIVE];
318 case BFD_RELOC_VTABLE_INHERIT:
319 return &elf64_s390_vtinherit_howto;
320 case BFD_RELOC_VTABLE_ENTRY:
321 return &elf64_s390_vtentry_howto;
322 default:
323 break;
324 }
325 return 0;
326 }
327
328 static reloc_howto_type *
329 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
330 const char *r_name)
331 {
332 unsigned int i;
333
334 for (i = 0;
335 i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]);
336 i++)
337 if (elf_howto_table[i].name != NULL
338 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
339 return &elf_howto_table[i];
340
341 if (strcasecmp (elf64_s390_vtinherit_howto.name, r_name) == 0)
342 return &elf64_s390_vtinherit_howto;
343 if (strcasecmp (elf64_s390_vtentry_howto.name, r_name) == 0)
344 return &elf64_s390_vtentry_howto;
345
346 return NULL;
347 }
348
349 /* We need to use ELF64_R_TYPE so we have our own copy of this function,
350 and elf64-s390.c has its own copy. */
351
352 static void
353 elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
354 arelent *cache_ptr,
355 Elf_Internal_Rela *dst)
356 {
357 unsigned int r_type = ELF64_R_TYPE(dst->r_info);
358 switch (r_type)
359 {
360 case R_390_GNU_VTINHERIT:
361 cache_ptr->howto = &elf64_s390_vtinherit_howto;
362 break;
363
364 case R_390_GNU_VTENTRY:
365 cache_ptr->howto = &elf64_s390_vtentry_howto;
366 break;
367
368 default:
369 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
370 {
371 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
372 abfd, (int) r_type);
373 r_type = R_390_NONE;
374 }
375 cache_ptr->howto = &elf_howto_table[r_type];
376 }
377 }
378
379 /* A relocation function which doesn't do anything. */
380 static bfd_reloc_status_type
381 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
382 arelent *reloc_entry,
383 asymbol *symbol ATTRIBUTE_UNUSED,
384 void * data ATTRIBUTE_UNUSED,
385 asection *input_section,
386 bfd *output_bfd,
387 char **error_message ATTRIBUTE_UNUSED)
388 {
389 if (output_bfd)
390 reloc_entry->address += input_section->output_offset;
391 return bfd_reloc_ok;
392 }
393
394 /* Handle the large displacement relocs. */
395 static bfd_reloc_status_type
396 s390_elf_ldisp_reloc (bfd *abfd,
397 arelent *reloc_entry,
398 asymbol *symbol,
399 void * data,
400 asection *input_section,
401 bfd *output_bfd,
402 char **error_message ATTRIBUTE_UNUSED)
403 {
404 reloc_howto_type *howto = reloc_entry->howto;
405 bfd_vma relocation;
406 bfd_vma insn;
407
408 if (output_bfd != (bfd *) NULL
409 && (symbol->flags & BSF_SECTION_SYM) == 0
410 && (! howto->partial_inplace
411 || reloc_entry->addend == 0))
412 {
413 reloc_entry->address += input_section->output_offset;
414 return bfd_reloc_ok;
415 }
416 if (output_bfd != NULL)
417 return bfd_reloc_continue;
418
419 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
420 return bfd_reloc_outofrange;
421
422 relocation = (symbol->value
423 + symbol->section->output_section->vma
424 + symbol->section->output_offset);
425 relocation += reloc_entry->addend;
426 if (howto->pc_relative)
427 {
428 relocation -= (input_section->output_section->vma
429 + input_section->output_offset);
430 relocation -= reloc_entry->address;
431 }
432
433 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
434 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
435 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
436
437 if ((bfd_signed_vma) relocation < - 0x80000
438 || (bfd_signed_vma) relocation > 0x7ffff)
439 return bfd_reloc_overflow;
440 else
441 return bfd_reloc_ok;
442 }
443
444 static bfd_boolean
445 elf_s390_is_local_label_name (bfd *abfd, const char *name)
446 {
447 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
448 return TRUE;
449
450 return _bfd_elf_is_local_label_name (abfd, name);
451 }
452
453 /* Functions for the 390 ELF linker. */
454
455 /* The name of the dynamic interpreter. This is put in the .interp
456 section. */
457
458 #define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
459
460 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
461 copying dynamic variables from a shared lib into an app's dynbss
462 section, and instead use a dynamic relocation to point into the
463 shared lib. */
464 #define ELIMINATE_COPY_RELOCS 1
465
466 /* The size in bytes of the first entry in the procedure linkage table. */
467 #define PLT_FIRST_ENTRY_SIZE 32
468 /* The size in bytes of an entry in the procedure linkage table. */
469 #define PLT_ENTRY_SIZE 32
470
471 #define GOT_ENTRY_SIZE 8
472
473 #define RELA_ENTRY_SIZE sizeof (Elf64_External_Rela)
474
475 /* The first three entries in a procedure linkage table are reserved,
476 and the initial contents are unimportant (we zero them out).
477 Subsequent entries look like this. See the SVR4 ABI 386
478 supplement to see how this works. */
479
480 /* For the s390, simple addr offset can only be 0 - 4096.
481 To use the full 16777216 TB address space, several instructions
482 are needed to load an address in a register and execute
483 a branch( or just saving the address)
484
485 Furthermore, only r 0 and 1 are free to use!!! */
486
487 /* The first 3 words in the GOT are then reserved.
488 Word 0 is the address of the dynamic table.
489 Word 1 is a pointer to a structure describing the object
490 Word 2 is used to point to the loader entry address.
491
492 The code for PLT entries looks like this:
493
494 The GOT holds the address in the PLT to be executed.
495 The loader then gets:
496 48(15) = Pointer to the structure describing the object.
497 56(15) = Offset in symbol table
498 The loader must then find the module where the function is
499 and insert the address in the GOT.
500
501 PLT1: LARL 1,<fn>@GOTENT # 6 bytes Load address of GOT entry in r1
502 LG 1,0(1) # 6 bytes Load address from GOT in r1
503 BCR 15,1 # 2 bytes Jump to address
504 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
505 LGF 1,12(1) # 6 bytes Load offset in symbl table in r1
506 BRCL 15,-x # 6 bytes Jump to start of PLT
507 .long ? # 4 bytes offset into .rela.plt
508
509 Total = 32 bytes per PLT entry
510 Fixup at offset 2: relative address to GOT entry
511 Fixup at offset 22: relative branch to PLT0
512 Fixup at offset 28: 32 bit offset into .rela.plt
513
514 A 32 bit offset into the symbol table is enough. It allows for
515 .rela.plt sections up to a size of 2 gigabyte. A single dynamic
516 object (the main program, any shared library) is limited to 4GB in
517 size. Having a .rela.plt of 2GB would already make the .plt
518 section bigger than 8GB. */
519
520 static const bfd_byte elf_s390x_plt_entry[PLT_ENTRY_SIZE] =
521 {
522 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
523 0xe3, 0x10, 0x10, 0x00, 0x00, 0x04, /* lg %r1,0(%r1) */
524 0x07, 0xf1, /* br %r1 */
525 0x0d, 0x10, /* basr %r1,%r0 */
526 0xe3, 0x10, 0x10, 0x0c, 0x00, 0x14, /* lgf %r1,12(%r1) */
527 0xc0, 0xf4, 0x00, 0x00, 0x00, 0x00, /* jg first plt */
528 0x00, 0x00, 0x00, 0x00 /* .long 0x00000000 */
529 };
530
531 /* The first PLT entry pushes the offset into the symbol table
532 from R1 onto the stack at 56(15) and the loader object info
533 at 48(15), loads the loader address in R1 and jumps to it. */
534
535 /* The first entry in the PLT:
536
537 PLT0:
538 STG 1,56(15) # r1 contains the offset into the symbol table
539 LARL 1,_GLOBAL_OFFSET_TABLE # load address of global offset table
540 MVC 48(8,15),8(1) # move loader ino (object struct address) to stack
541 LG 1,16(1) # get entry address of loader
542 BCR 15,1 # jump to loader
543
544 Fixup at offset 8: relative address to start of GOT. */
545
546 static const bfd_byte elf_s390x_first_plt_entry[PLT_FIRST_ENTRY_SIZE] =
547 {
548 0xe3, 0x10, 0xf0, 0x38, 0x00, 0x24, /* stg %r1,56(%r15) */
549 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
550 0xd2, 0x07, 0xf0, 0x30, 0x10, 0x08, /* mvc 48(8,%r15),8(%r1) */
551 0xe3, 0x10, 0x10, 0x10, 0x00, 0x04, /* lg %r1,16(%r1) */
552 0x07, 0xf1, /* br %r1 */
553 0x07, 0x00, /* nopr %r0 */
554 0x07, 0x00, /* nopr %r0 */
555 0x07, 0x00 /* nopr %r0 */
556 };
557
558
559 /* s390 ELF linker hash entry. */
560
561 struct elf_s390_link_hash_entry
562 {
563 struct elf_link_hash_entry elf;
564
565 /* Track dynamic relocs copied for this symbol. */
566 struct elf_dyn_relocs *dyn_relocs;
567
568 /* Number of GOTPLT references for a function. */
569 bfd_signed_vma gotplt_refcount;
570
571 #define GOT_UNKNOWN 0
572 #define GOT_NORMAL 1
573 #define GOT_TLS_GD 2
574 #define GOT_TLS_IE 3
575 #define GOT_TLS_IE_NLT 3
576 unsigned char tls_type;
577
578 /* For pointer equality reasons we might need to change the symbol
579 type from STT_GNU_IFUNC to STT_FUNC together with its value and
580 section entry. So after alloc_dynrelocs only these values should
581 be used. In order to check whether a symbol is IFUNC use
582 s390_is_ifunc_symbol_p. */
583 bfd_vma ifunc_resolver_address;
584 asection *ifunc_resolver_section;
585 };
586
587 #define elf_s390_hash_entry(ent) \
588 ((struct elf_s390_link_hash_entry *)(ent))
589
590 /* This structure represents an entry in the local PLT list needed for
591 local IFUNC symbols. */
592 struct plt_entry
593 {
594 /* The section of the local symbol.
595 Set in relocate_section and used in finish_dynamic_sections. */
596 asection *sec;
597
598 union
599 {
600 bfd_signed_vma refcount;
601 bfd_vma offset;
602 } plt;
603 };
604
605 /* NOTE: Keep this structure in sync with
606 the one declared in elf32-s390.c. */
607 struct elf_s390_obj_tdata
608 {
609 struct elf_obj_tdata root;
610
611 /* A local PLT is needed for ifunc symbols. */
612 struct plt_entry *local_plt;
613
614 /* TLS type for each local got entry. */
615 char *local_got_tls_type;
616 };
617
618 #define elf_s390_tdata(abfd) \
619 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
620
621 #define elf_s390_local_plt(abfd) \
622 (elf_s390_tdata (abfd)->local_plt)
623
624 #define elf_s390_local_got_tls_type(abfd) \
625 (elf_s390_tdata (abfd)->local_got_tls_type)
626
627 #define is_s390_elf(bfd) \
628 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
629 && elf_tdata (bfd) != NULL \
630 && elf_object_id (bfd) == S390_ELF_DATA)
631
632 static bfd_boolean
633 elf_s390_mkobject (bfd *abfd)
634 {
635 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
636 S390_ELF_DATA);
637 }
638
639 static bfd_boolean
640 elf_s390_object_p (bfd *abfd)
641 {
642 /* Set the right machine number for an s390 elf32 file. */
643 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_64);
644 }
645
646 /* s390 ELF linker hash table. */
647
648 struct elf_s390_link_hash_table
649 {
650 struct elf_link_hash_table elf;
651
652 /* Short-cuts to get to dynamic linker sections. */
653 asection *sdynbss;
654 asection *srelbss;
655 asection *irelifunc;
656
657 union {
658 bfd_signed_vma refcount;
659 bfd_vma offset;
660 } tls_ldm_got;
661
662 /* Small local sym cache. */
663 struct sym_cache sym_cache;
664 };
665
666 /* Get the s390 ELF linker hash table from a link_info structure. */
667
668 #define elf_s390_hash_table(p) \
669 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
670 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
671
672 #define ELF64 1
673 #include "elf-s390-common.c"
674
675 /* Create an entry in an s390 ELF linker hash table. */
676
677 static struct bfd_hash_entry *
678 link_hash_newfunc (struct bfd_hash_entry *entry,
679 struct bfd_hash_table *table,
680 const char *string)
681 {
682 /* Allocate the structure if it has not already been allocated by a
683 subclass. */
684 if (entry == NULL)
685 {
686 entry = bfd_hash_allocate (table,
687 sizeof (struct elf_s390_link_hash_entry));
688 if (entry == NULL)
689 return entry;
690 }
691
692 /* Call the allocation method of the superclass. */
693 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
694 if (entry != NULL)
695 {
696 struct elf_s390_link_hash_entry *eh;
697
698 eh = (struct elf_s390_link_hash_entry *) entry;
699 eh->dyn_relocs = NULL;
700 eh->gotplt_refcount = 0;
701 eh->tls_type = GOT_UNKNOWN;
702 eh->ifunc_resolver_address = 0;
703 eh->ifunc_resolver_section = NULL;
704 }
705
706 return entry;
707 }
708
709 /* Create an s390 ELF linker hash table. */
710
711 static struct bfd_link_hash_table *
712 elf_s390_link_hash_table_create (bfd *abfd)
713 {
714 struct elf_s390_link_hash_table *ret;
715 bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
716
717 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
718 if (ret == NULL)
719 return NULL;
720
721 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
722 sizeof (struct elf_s390_link_hash_entry),
723 S390_ELF_DATA))
724 {
725 free (ret);
726 return NULL;
727 }
728
729 return &ret->elf.root;
730 }
731
732 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
733 shortcuts to them in our hash table. */
734
735 static bfd_boolean
736 create_got_section (bfd *dynobj,
737 struct bfd_link_info *info)
738 {
739 struct elf_s390_link_hash_table *htab;
740
741 if (! _bfd_elf_create_got_section (dynobj, info))
742 return FALSE;
743
744 htab = elf_s390_hash_table (info);
745 if (htab == NULL)
746 return FALSE;
747
748 htab->elf.sgot = bfd_get_linker_section (dynobj, ".got");
749 htab->elf.sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
750 htab->elf.srelgot = bfd_get_linker_section (dynobj, ".rela.got");
751 if (!htab->elf.sgot || !htab->elf.sgotplt || !htab->elf.srelgot)
752 abort ();
753 return TRUE;
754 }
755
756 /* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
757 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
758 hash table. */
759
760 static bfd_boolean
761 elf_s390_create_dynamic_sections (bfd *dynobj,
762 struct bfd_link_info *info)
763 {
764 struct elf_s390_link_hash_table *htab;
765
766 htab = elf_s390_hash_table (info);
767 if (htab == NULL)
768 return FALSE;
769
770 if (!htab->elf.sgot && !create_got_section (dynobj, info))
771 return FALSE;
772
773 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
774 return FALSE;
775
776 htab->elf.splt = bfd_get_linker_section (dynobj, ".plt");
777 htab->elf.srelplt = bfd_get_linker_section (dynobj, ".rela.plt");
778 htab->sdynbss = bfd_get_linker_section (dynobj, ".dynbss");
779 if (!bfd_link_pic (info))
780 htab->srelbss = bfd_get_linker_section (dynobj, ".rela.bss");
781
782 if (!htab->elf.splt || !htab->elf.srelplt || !htab->sdynbss
783 || (!bfd_link_pic (info) && !htab->srelbss))
784 abort ();
785
786 return TRUE;
787 }
788
789 /* Copy the extra info we tack onto an elf_link_hash_entry. */
790
791 static void
792 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
793 struct elf_link_hash_entry *dir,
794 struct elf_link_hash_entry *ind)
795 {
796 struct elf_s390_link_hash_entry *edir, *eind;
797
798 edir = (struct elf_s390_link_hash_entry *) dir;
799 eind = (struct elf_s390_link_hash_entry *) ind;
800
801 if (eind->dyn_relocs != NULL)
802 {
803 if (edir->dyn_relocs != NULL)
804 {
805 struct elf_dyn_relocs **pp;
806 struct elf_dyn_relocs *p;
807
808 /* Add reloc counts against the indirect sym to the direct sym
809 list. Merge any entries against the same section. */
810 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
811 {
812 struct elf_dyn_relocs *q;
813
814 for (q = edir->dyn_relocs; q != NULL; q = q->next)
815 if (q->sec == p->sec)
816 {
817 q->pc_count += p->pc_count;
818 q->count += p->count;
819 *pp = p->next;
820 break;
821 }
822 if (q == NULL)
823 pp = &p->next;
824 }
825 *pp = edir->dyn_relocs;
826 }
827
828 edir->dyn_relocs = eind->dyn_relocs;
829 eind->dyn_relocs = NULL;
830 }
831
832 if (ind->root.type == bfd_link_hash_indirect
833 && dir->got.refcount <= 0)
834 {
835 edir->tls_type = eind->tls_type;
836 eind->tls_type = GOT_UNKNOWN;
837 }
838
839 if (ELIMINATE_COPY_RELOCS
840 && ind->root.type != bfd_link_hash_indirect
841 && dir->dynamic_adjusted)
842 {
843 /* If called to transfer flags for a weakdef during processing
844 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
845 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
846 dir->ref_dynamic |= ind->ref_dynamic;
847 dir->ref_regular |= ind->ref_regular;
848 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
849 dir->needs_plt |= ind->needs_plt;
850 }
851 else
852 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
853 }
854
855 static int
856 elf_s390_tls_transition (struct bfd_link_info *info,
857 int r_type,
858 int is_local)
859 {
860 if (bfd_link_pic (info))
861 return r_type;
862
863 switch (r_type)
864 {
865 case R_390_TLS_GD64:
866 case R_390_TLS_IE64:
867 if (is_local)
868 return R_390_TLS_LE64;
869 return R_390_TLS_IE64;
870 case R_390_TLS_GOTIE64:
871 if (is_local)
872 return R_390_TLS_LE64;
873 return R_390_TLS_GOTIE64;
874 case R_390_TLS_LDM64:
875 return R_390_TLS_LE64;
876 }
877
878 return r_type;
879 }
880
881 /* Look through the relocs for a section during the first phase, and
882 allocate space in the global offset table or procedure linkage
883 table. */
884
885 static bfd_boolean
886 elf_s390_check_relocs (bfd *abfd,
887 struct bfd_link_info *info,
888 asection *sec,
889 const Elf_Internal_Rela *relocs)
890 {
891 struct elf_s390_link_hash_table *htab;
892 Elf_Internal_Shdr *symtab_hdr;
893 struct elf_link_hash_entry **sym_hashes;
894 const Elf_Internal_Rela *rel;
895 const Elf_Internal_Rela *rel_end;
896 asection *sreloc;
897 bfd_signed_vma *local_got_refcounts;
898 int tls_type, old_tls_type;
899
900 if (bfd_link_relocatable (info))
901 return TRUE;
902
903 BFD_ASSERT (is_s390_elf (abfd));
904
905 htab = elf_s390_hash_table (info);
906 if (htab == NULL)
907 return FALSE;
908
909 symtab_hdr = &elf_symtab_hdr (abfd);
910 sym_hashes = elf_sym_hashes (abfd);
911 local_got_refcounts = elf_local_got_refcounts (abfd);
912
913 sreloc = NULL;
914
915 rel_end = relocs + sec->reloc_count;
916 for (rel = relocs; rel < rel_end; rel++)
917 {
918 unsigned int r_type;
919 unsigned long r_symndx;
920 struct elf_link_hash_entry *h;
921 Elf_Internal_Sym *isym;
922
923 r_symndx = ELF64_R_SYM (rel->r_info);
924
925 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
926 {
927 (*_bfd_error_handler) (_("%B: bad symbol index: %d"),
928 abfd,
929 r_symndx);
930 return FALSE;
931 }
932
933 if (r_symndx < symtab_hdr->sh_info)
934 {
935 /* A local symbol. */
936 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
937 abfd, r_symndx);
938 if (isym == NULL)
939 return FALSE;
940
941 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
942 {
943 struct plt_entry *plt;
944
945 if (htab->elf.dynobj == NULL)
946 htab->elf.dynobj = abfd;
947
948 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
949 return FALSE;
950
951 if (local_got_refcounts == NULL)
952 {
953 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
954 return FALSE;
955 local_got_refcounts = elf_local_got_refcounts (abfd);
956 }
957 plt = elf_s390_local_plt (abfd);
958 plt[r_symndx].plt.refcount++;
959 }
960 h = NULL;
961 }
962 else
963 {
964 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
965 while (h->root.type == bfd_link_hash_indirect
966 || h->root.type == bfd_link_hash_warning)
967 h = (struct elf_link_hash_entry *) h->root.u.i.link;
968
969 /* PR15323, ref flags aren't set for references in the same
970 object. */
971 h->root.non_ir_ref = 1;
972 }
973
974 /* Create got section and local_got_refcounts array if they
975 are needed. */
976 r_type = elf_s390_tls_transition (info,
977 ELF64_R_TYPE (rel->r_info),
978 h == NULL);
979 switch (r_type)
980 {
981 case R_390_GOT12:
982 case R_390_GOT16:
983 case R_390_GOT20:
984 case R_390_GOT32:
985 case R_390_GOT64:
986 case R_390_GOTENT:
987 case R_390_GOTPLT12:
988 case R_390_GOTPLT16:
989 case R_390_GOTPLT20:
990 case R_390_GOTPLT32:
991 case R_390_GOTPLT64:
992 case R_390_GOTPLTENT:
993 case R_390_TLS_GD64:
994 case R_390_TLS_GOTIE12:
995 case R_390_TLS_GOTIE20:
996 case R_390_TLS_GOTIE64:
997 case R_390_TLS_IEENT:
998 case R_390_TLS_IE64:
999 case R_390_TLS_LDM64:
1000 if (h == NULL
1001 && local_got_refcounts == NULL)
1002 {
1003 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
1004 return FALSE;
1005 local_got_refcounts = elf_local_got_refcounts (abfd);
1006 }
1007
1008 /* Fall through. */
1009 case R_390_GOTOFF16:
1010 case R_390_GOTOFF32:
1011 case R_390_GOTOFF64:
1012 case R_390_GOTPC:
1013 case R_390_GOTPCDBL:
1014 if (htab->elf.sgot == NULL)
1015 {
1016 if (htab->elf.dynobj == NULL)
1017 htab->elf.dynobj = abfd;
1018 if (!create_got_section (htab->elf.dynobj, info))
1019 return FALSE;
1020 }
1021 }
1022
1023 if (h != NULL)
1024 {
1025 if (htab->elf.dynobj == NULL)
1026 htab->elf.dynobj = abfd;
1027 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1028 return FALSE;
1029
1030 /* Make sure an IFUNC symbol defined in a non-shared object
1031 always gets a PLT slot. */
1032 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1033 {
1034 /* The symbol is called by the dynamic loader in order
1035 to resolve the relocation. So it is in fact also
1036 referenced. */
1037 h->ref_regular = 1;
1038 h->needs_plt = 1;
1039 }
1040 }
1041
1042 switch (r_type)
1043 {
1044 case R_390_GOTPC:
1045 case R_390_GOTPCDBL:
1046 /* These relocs do not need a GOT slot. They just load the
1047 GOT pointer itself or address something else relative to
1048 the GOT. Since the GOT pointer has been set up above we
1049 are done. */
1050 break;
1051 case R_390_GOTOFF16:
1052 case R_390_GOTOFF32:
1053 case R_390_GOTOFF64:
1054 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1055 break;
1056
1057 case R_390_PLT12DBL:
1058 case R_390_PLT16DBL:
1059 case R_390_PLT24DBL:
1060 case R_390_PLT32:
1061 case R_390_PLT32DBL:
1062 case R_390_PLT64:
1063 case R_390_PLTOFF16:
1064 case R_390_PLTOFF32:
1065 case R_390_PLTOFF64:
1066 /* This symbol requires a procedure linkage table entry. We
1067 actually build the entry in adjust_dynamic_symbol,
1068 because this might be a case of linking PIC code which is
1069 never referenced by a dynamic object, in which case we
1070 don't need to generate a procedure linkage table entry
1071 after all. */
1072
1073 /* If this is a local symbol, we resolve it directly without
1074 creating a procedure linkage table entry. */
1075 if (h != NULL)
1076 {
1077 h->needs_plt = 1;
1078 h->plt.refcount += 1;
1079 }
1080 break;
1081
1082 case R_390_GOTPLT12:
1083 case R_390_GOTPLT16:
1084 case R_390_GOTPLT20:
1085 case R_390_GOTPLT32:
1086 case R_390_GOTPLT64:
1087 case R_390_GOTPLTENT:
1088 /* This symbol requires either a procedure linkage table entry
1089 or an entry in the local got. We actually build the entry
1090 in adjust_dynamic_symbol because whether this is really a
1091 global reference can change and with it the fact if we have
1092 to create a plt entry or a local got entry. To be able to
1093 make a once global symbol a local one we have to keep track
1094 of the number of gotplt references that exist for this
1095 symbol. */
1096 if (h != NULL)
1097 {
1098 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1099 h->needs_plt = 1;
1100 h->plt.refcount += 1;
1101 }
1102 else
1103 local_got_refcounts[r_symndx] += 1;
1104 break;
1105
1106 case R_390_TLS_LDM64:
1107 htab->tls_ldm_got.refcount += 1;
1108 break;
1109
1110 case R_390_TLS_IE64:
1111 case R_390_TLS_GOTIE12:
1112 case R_390_TLS_GOTIE20:
1113 case R_390_TLS_GOTIE64:
1114 case R_390_TLS_IEENT:
1115 if (bfd_link_pic (info))
1116 info->flags |= DF_STATIC_TLS;
1117 /* Fall through */
1118
1119 case R_390_GOT12:
1120 case R_390_GOT16:
1121 case R_390_GOT20:
1122 case R_390_GOT32:
1123 case R_390_GOT64:
1124 case R_390_GOTENT:
1125 case R_390_TLS_GD64:
1126 /* This symbol requires a global offset table entry. */
1127 switch (r_type)
1128 {
1129 default:
1130 case R_390_GOT12:
1131 case R_390_GOT16:
1132 case R_390_GOT20:
1133 case R_390_GOT32:
1134 case R_390_GOTENT:
1135 tls_type = GOT_NORMAL;
1136 break;
1137 case R_390_TLS_GD64:
1138 tls_type = GOT_TLS_GD;
1139 break;
1140 case R_390_TLS_IE64:
1141 case R_390_TLS_GOTIE64:
1142 tls_type = GOT_TLS_IE;
1143 break;
1144 case R_390_TLS_GOTIE12:
1145 case R_390_TLS_GOTIE20:
1146 case R_390_TLS_IEENT:
1147 tls_type = GOT_TLS_IE_NLT;
1148 break;
1149 }
1150
1151 if (h != NULL)
1152 {
1153 h->got.refcount += 1;
1154 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1155 }
1156 else
1157 {
1158 local_got_refcounts[r_symndx] += 1;
1159 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1160 }
1161 /* If a TLS symbol is accessed using IE at least once,
1162 there is no point to use dynamic model for it. */
1163 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1164 {
1165 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1166 {
1167 (*_bfd_error_handler)
1168 (_("%B: `%s' accessed both as normal and thread local symbol"),
1169 abfd, h->root.root.string);
1170 return FALSE;
1171 }
1172 if (old_tls_type > tls_type)
1173 tls_type = old_tls_type;
1174 }
1175
1176 if (old_tls_type != tls_type)
1177 {
1178 if (h != NULL)
1179 elf_s390_hash_entry (h)->tls_type = tls_type;
1180 else
1181 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1182 }
1183
1184 if (r_type != R_390_TLS_IE64)
1185 break;
1186 /* Fall through */
1187
1188 case R_390_TLS_LE64:
1189 /* For static linking and executables this reloc will be
1190 calculated at linktime otherwise a TLS_TPOFF runtime
1191 reloc will be generated. */
1192 if (r_type == R_390_TLS_LE64 && bfd_link_pie (info))
1193 break;
1194
1195 if (!bfd_link_pic (info))
1196 break;
1197 info->flags |= DF_STATIC_TLS;
1198 /* Fall through */
1199
1200 case R_390_8:
1201 case R_390_16:
1202 case R_390_32:
1203 case R_390_64:
1204 case R_390_PC12DBL:
1205 case R_390_PC16:
1206 case R_390_PC16DBL:
1207 case R_390_PC24DBL:
1208 case R_390_PC32:
1209 case R_390_PC32DBL:
1210 case R_390_PC64:
1211 if (h != NULL && bfd_link_executable (info))
1212 {
1213 /* If this reloc is in a read-only section, we might
1214 need a copy reloc. We can't check reliably at this
1215 stage whether the section is read-only, as input
1216 sections have not yet been mapped to output sections.
1217 Tentatively set the flag for now, and correct in
1218 adjust_dynamic_symbol. */
1219 h->non_got_ref = 1;
1220
1221 if (!bfd_link_pic (info))
1222 {
1223 /* We may need a .plt entry if the function this reloc
1224 refers to is in a shared lib. */
1225 h->plt.refcount += 1;
1226 }
1227 }
1228
1229 /* If we are creating a shared library, and this is a reloc
1230 against a global symbol, or a non PC relative reloc
1231 against a local symbol, then we need to copy the reloc
1232 into the shared library. However, if we are linking with
1233 -Bsymbolic, we do not need to copy a reloc against a
1234 global symbol which is defined in an object we are
1235 including in the link (i.e., DEF_REGULAR is set). At
1236 this point we have not seen all the input files, so it is
1237 possible that DEF_REGULAR is not set now but will be set
1238 later (it is never cleared). In case of a weak definition,
1239 DEF_REGULAR may be cleared later by a strong definition in
1240 a shared library. We account for that possibility below by
1241 storing information in the relocs_copied field of the hash
1242 table entry. A similar situation occurs when creating
1243 shared libraries and symbol visibility changes render the
1244 symbol local.
1245
1246 If on the other hand, we are creating an executable, we
1247 may need to keep relocations for symbols satisfied by a
1248 dynamic library if we manage to avoid copy relocs for the
1249 symbol. */
1250 if ((bfd_link_pic (info)
1251 && (sec->flags & SEC_ALLOC) != 0
1252 && ((ELF64_R_TYPE (rel->r_info) != R_390_PC16
1253 && ELF64_R_TYPE (rel->r_info) != R_390_PC12DBL
1254 && ELF64_R_TYPE (rel->r_info) != R_390_PC16DBL
1255 && ELF64_R_TYPE (rel->r_info) != R_390_PC24DBL
1256 && ELF64_R_TYPE (rel->r_info) != R_390_PC32
1257 && ELF64_R_TYPE (rel->r_info) != R_390_PC32DBL
1258 && ELF64_R_TYPE (rel->r_info) != R_390_PC64)
1259 || (h != NULL
1260 && (! SYMBOLIC_BIND (info, h)
1261 || h->root.type == bfd_link_hash_defweak
1262 || !h->def_regular))))
1263 || (ELIMINATE_COPY_RELOCS
1264 && !bfd_link_pic (info)
1265 && (sec->flags & SEC_ALLOC) != 0
1266 && h != NULL
1267 && (h->root.type == bfd_link_hash_defweak
1268 || !h->def_regular)))
1269 {
1270 struct elf_dyn_relocs *p;
1271 struct elf_dyn_relocs **head;
1272
1273 /* We must copy these reloc types into the output file.
1274 Create a reloc section in dynobj and make room for
1275 this reloc. */
1276 if (sreloc == NULL)
1277 {
1278 if (htab->elf.dynobj == NULL)
1279 htab->elf.dynobj = abfd;
1280
1281 sreloc = _bfd_elf_make_dynamic_reloc_section
1282 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
1283
1284 if (sreloc == NULL)
1285 return FALSE;
1286 }
1287
1288 /* If this is a global symbol, we count the number of
1289 relocations we need for this symbol. */
1290 if (h != NULL)
1291 {
1292 head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
1293 }
1294 else
1295 {
1296 /* Track dynamic relocs needed for local syms too.
1297 We really need local syms available to do this
1298 easily. Oh well. */
1299 asection *s;
1300 void *vpp;
1301
1302 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1303 abfd, r_symndx);
1304 if (isym == NULL)
1305 return FALSE;
1306
1307 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1308 if (s == NULL)
1309 s = sec;
1310
1311 vpp = &elf_section_data (s)->local_dynrel;
1312 head = (struct elf_dyn_relocs **) vpp;
1313 }
1314
1315 p = *head;
1316 if (p == NULL || p->sec != sec)
1317 {
1318 bfd_size_type amt = sizeof *p;
1319 p = ((struct elf_dyn_relocs *)
1320 bfd_alloc (htab->elf.dynobj, amt));
1321 if (p == NULL)
1322 return FALSE;
1323 p->next = *head;
1324 *head = p;
1325 p->sec = sec;
1326 p->count = 0;
1327 p->pc_count = 0;
1328 }
1329
1330 p->count += 1;
1331 if (ELF64_R_TYPE (rel->r_info) == R_390_PC16
1332 || ELF64_R_TYPE (rel->r_info) == R_390_PC12DBL
1333 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1334 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1335 || ELF64_R_TYPE (rel->r_info) == R_390_PC32
1336 || ELF64_R_TYPE (rel->r_info) == R_390_PC32DBL
1337 || ELF64_R_TYPE (rel->r_info) == R_390_PC64)
1338 p->pc_count += 1;
1339 }
1340 break;
1341
1342 /* This relocation describes the C++ object vtable hierarchy.
1343 Reconstruct it for later use during GC. */
1344 case R_390_GNU_VTINHERIT:
1345 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1346 return FALSE;
1347 break;
1348
1349 /* This relocation describes which C++ vtable entries are actually
1350 used. Record for later use during GC. */
1351 case R_390_GNU_VTENTRY:
1352 BFD_ASSERT (h != NULL);
1353 if (h != NULL
1354 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1355 return FALSE;
1356 break;
1357
1358 default:
1359 break;
1360 }
1361 }
1362
1363 return TRUE;
1364 }
1365
1366 /* Return the section that should be marked against GC for a given
1367 relocation. */
1368
1369 static asection *
1370 elf_s390_gc_mark_hook (asection *sec,
1371 struct bfd_link_info *info,
1372 Elf_Internal_Rela *rel,
1373 struct elf_link_hash_entry *h,
1374 Elf_Internal_Sym *sym)
1375 {
1376 if (h != NULL)
1377 switch (ELF64_R_TYPE (rel->r_info))
1378 {
1379 case R_390_GNU_VTINHERIT:
1380 case R_390_GNU_VTENTRY:
1381 return NULL;
1382 }
1383
1384 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1385 }
1386
1387 /* Update the got entry reference counts for the section being removed. */
1388
1389 static bfd_boolean
1390 elf_s390_gc_sweep_hook (bfd *abfd,
1391 struct bfd_link_info *info,
1392 asection *sec,
1393 const Elf_Internal_Rela *relocs)
1394 {
1395 struct elf_s390_link_hash_table *htab;
1396 Elf_Internal_Shdr *symtab_hdr;
1397 struct elf_link_hash_entry **sym_hashes;
1398 bfd_signed_vma *local_got_refcounts;
1399 const Elf_Internal_Rela *rel, *relend;
1400
1401 if (bfd_link_relocatable (info))
1402 return TRUE;
1403
1404 htab = elf_s390_hash_table (info);
1405 if (htab == NULL)
1406 return FALSE;
1407
1408 elf_section_data (sec)->local_dynrel = NULL;
1409
1410 symtab_hdr = &elf_symtab_hdr (abfd);
1411 sym_hashes = elf_sym_hashes (abfd);
1412 local_got_refcounts = elf_local_got_refcounts (abfd);
1413
1414 relend = relocs + sec->reloc_count;
1415 for (rel = relocs; rel < relend; rel++)
1416 {
1417 unsigned long r_symndx;
1418 unsigned int r_type;
1419 struct elf_link_hash_entry *h = NULL;
1420
1421 r_symndx = ELF64_R_SYM (rel->r_info);
1422 if (r_symndx >= symtab_hdr->sh_info)
1423 {
1424 struct elf_s390_link_hash_entry *eh;
1425 struct elf_dyn_relocs **pp;
1426 struct elf_dyn_relocs *p;
1427
1428 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1429 while (h->root.type == bfd_link_hash_indirect
1430 || h->root.type == bfd_link_hash_warning)
1431 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1432 eh = (struct elf_s390_link_hash_entry *) h;
1433
1434 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1435 if (p->sec == sec)
1436 {
1437 /* Everything must go for SEC. */
1438 *pp = p->next;
1439 break;
1440 }
1441 }
1442 else
1443 {
1444 Elf_Internal_Sym *isym;
1445
1446 /* A local symbol. */
1447 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1448 abfd, r_symndx);
1449 if (isym == NULL)
1450 return FALSE;
1451
1452 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1453 {
1454 struct plt_entry *plt = elf_s390_local_plt (abfd);
1455 if (plt[r_symndx].plt.refcount > 0)
1456 plt[r_symndx].plt.refcount--;
1457 }
1458 }
1459
1460 r_type = ELF64_R_TYPE (rel->r_info);
1461 r_type = elf_s390_tls_transition (info, r_type, h != NULL);
1462 switch (r_type)
1463 {
1464 case R_390_TLS_LDM64:
1465 if (htab->tls_ldm_got.refcount > 0)
1466 htab->tls_ldm_got.refcount -= 1;
1467 break;
1468 case R_390_GOTOFF16:
1469 case R_390_GOTOFF32:
1470 case R_390_GOTOFF64:
1471 if (h != NULL && s390_is_ifunc_symbol_p (h) && h->def_regular)
1472 {
1473 h->plt.refcount--;
1474 break;
1475 }
1476
1477 case R_390_GOTPC:
1478 case R_390_GOTPCDBL:
1479 break;
1480
1481 case R_390_TLS_GD64:
1482 case R_390_TLS_IE64:
1483 case R_390_TLS_GOTIE12:
1484 case R_390_TLS_GOTIE20:
1485 case R_390_TLS_GOTIE64:
1486 case R_390_TLS_IEENT:
1487 case R_390_GOT12:
1488 case R_390_GOT16:
1489 case R_390_GOT20:
1490 case R_390_GOT32:
1491 case R_390_GOT64:
1492 case R_390_GOTENT:
1493 if (h != NULL)
1494 {
1495 if (h->got.refcount > 0)
1496 h->got.refcount -= 1;
1497 }
1498 else if (local_got_refcounts != NULL)
1499 {
1500 if (local_got_refcounts[r_symndx] > 0)
1501 local_got_refcounts[r_symndx] -= 1;
1502 }
1503 break;
1504
1505 case R_390_8:
1506 case R_390_12:
1507 case R_390_16:
1508 case R_390_20:
1509 case R_390_32:
1510 case R_390_64:
1511 case R_390_PC16:
1512 case R_390_PC12DBL:
1513 case R_390_PC16DBL:
1514 case R_390_PC24DBL:
1515 case R_390_PC32:
1516 case R_390_PC32DBL:
1517 case R_390_PC64:
1518 if (bfd_link_pic (info))
1519 break;
1520 /* Fall through */
1521
1522 case R_390_PLT12DBL:
1523 case R_390_PLT16DBL:
1524 case R_390_PLT24DBL:
1525 case R_390_PLT32:
1526 case R_390_PLT32DBL:
1527 case R_390_PLT64:
1528 case R_390_PLTOFF16:
1529 case R_390_PLTOFF32:
1530 case R_390_PLTOFF64:
1531 if (h != NULL)
1532 {
1533 if (h->plt.refcount > 0)
1534 h->plt.refcount -= 1;
1535 }
1536 break;
1537
1538 case R_390_GOTPLT12:
1539 case R_390_GOTPLT16:
1540 case R_390_GOTPLT20:
1541 case R_390_GOTPLT32:
1542 case R_390_GOTPLT64:
1543 case R_390_GOTPLTENT:
1544 if (h != NULL)
1545 {
1546 if (h->plt.refcount > 0)
1547 {
1548 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount--;
1549 h->plt.refcount -= 1;
1550 }
1551 }
1552 else if (local_got_refcounts != NULL)
1553 {
1554 if (local_got_refcounts[r_symndx] > 0)
1555 local_got_refcounts[r_symndx] -= 1;
1556 }
1557 break;
1558
1559 default:
1560 break;
1561 }
1562 }
1563
1564 return TRUE;
1565 }
1566
1567 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1568 entry but we found we will not create any. Called when we find we will
1569 not have any PLT for this symbol, by for example
1570 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1571 or elf_s390_size_dynamic_sections if no dynamic sections will be
1572 created (we're only linking static objects). */
1573
1574 static void
1575 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1576 {
1577 if (h->elf.root.type == bfd_link_hash_warning)
1578 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1579
1580 if (h->gotplt_refcount <= 0)
1581 return;
1582
1583 /* We simply add the number of gotplt references to the number
1584 * of got references for this symbol. */
1585 h->elf.got.refcount += h->gotplt_refcount;
1586 h->gotplt_refcount = -1;
1587 }
1588
1589 /* Adjust a symbol defined by a dynamic object and referenced by a
1590 regular object. The current definition is in some section of the
1591 dynamic object, but we're not including those sections. We have to
1592 change the definition to something the rest of the link can
1593 understand. */
1594
1595 static bfd_boolean
1596 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1597 struct elf_link_hash_entry *h)
1598 {
1599 struct elf_s390_link_hash_table *htab;
1600 asection *s;
1601
1602 /* STT_GNU_IFUNC symbol must go through PLT. */
1603 if (s390_is_ifunc_symbol_p (h))
1604 {
1605 /* All local STT_GNU_IFUNC references must be treated as local
1606 calls via local PLT. */
1607 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1608 {
1609 bfd_size_type pc_count = 0, count = 0;
1610 struct elf_dyn_relocs **pp;
1611 struct elf_s390_link_hash_entry *eh;
1612 struct elf_dyn_relocs *p;
1613
1614 eh = (struct elf_s390_link_hash_entry *) h;
1615 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1616 {
1617 pc_count += p->pc_count;
1618 p->count -= p->pc_count;
1619 p->pc_count = 0;
1620 count += p->count;
1621 if (p->count == 0)
1622 *pp = p->next;
1623 else
1624 pp = &p->next;
1625 }
1626
1627 if (pc_count || count)
1628 {
1629 h->needs_plt = 1;
1630 h->non_got_ref = 1;
1631 if (h->plt.refcount <= 0)
1632 h->plt.refcount = 1;
1633 else
1634 h->plt.refcount += 1;
1635 }
1636 }
1637
1638 if (h->plt.refcount <= 0)
1639 {
1640 h->plt.offset = (bfd_vma) -1;
1641 h->needs_plt = 0;
1642 }
1643 return TRUE;
1644 }
1645
1646 /* If this is a function, put it in the procedure linkage table. We
1647 will fill in the contents of the procedure linkage table later
1648 (although we could actually do it here). */
1649 if (h->type == STT_FUNC
1650 || h->needs_plt)
1651 {
1652 if (h->plt.refcount <= 0
1653 || SYMBOL_CALLS_LOCAL (info, h)
1654 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1655 && h->root.type == bfd_link_hash_undefweak))
1656 {
1657 /* This case can occur if we saw a PLT32 reloc in an input
1658 file, but the symbol was never referred to by a dynamic
1659 object, or if all references were garbage collected. In
1660 such a case, we don't actually need to build a procedure
1661 linkage table, and we can just do a PC32 reloc instead. */
1662 h->plt.offset = (bfd_vma) -1;
1663 h->needs_plt = 0;
1664 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1665 }
1666
1667 return TRUE;
1668 }
1669 else
1670 /* It's possible that we incorrectly decided a .plt reloc was
1671 needed for an R_390_PC32 reloc to a non-function sym in
1672 check_relocs. We can't decide accurately between function and
1673 non-function syms in check-relocs; Objects loaded later in
1674 the link may change h->type. So fix it now. */
1675 h->plt.offset = (bfd_vma) -1;
1676
1677 /* If this is a weak symbol, and there is a real definition, the
1678 processor independent code will have arranged for us to see the
1679 real definition first, and we can just use the same value. */
1680 if (h->u.weakdef != NULL)
1681 {
1682 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1683 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1684 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1685 h->root.u.def.value = h->u.weakdef->root.u.def.value;
1686 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1687 h->non_got_ref = h->u.weakdef->non_got_ref;
1688 return TRUE;
1689 }
1690
1691 /* This is a reference to a symbol defined by a dynamic object which
1692 is not a function. */
1693
1694 /* If we are creating a shared library, we must presume that the
1695 only references to the symbol are via the global offset table.
1696 For such cases we need not do anything here; the relocations will
1697 be handled correctly by relocate_section. */
1698 if (bfd_link_pic (info))
1699 return TRUE;
1700
1701 /* If there are no references to this symbol that do not use the
1702 GOT, we don't need to generate a copy reloc. */
1703 if (!h->non_got_ref)
1704 return TRUE;
1705
1706 /* If -z nocopyreloc was given, we won't generate them either. */
1707 if (info->nocopyreloc)
1708 {
1709 h->non_got_ref = 0;
1710 return TRUE;
1711 }
1712
1713 if (ELIMINATE_COPY_RELOCS)
1714 {
1715 struct elf_s390_link_hash_entry * eh;
1716 struct elf_dyn_relocs *p;
1717
1718 eh = (struct elf_s390_link_hash_entry *) h;
1719 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1720 {
1721 s = p->sec->output_section;
1722 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1723 break;
1724 }
1725
1726 /* If we didn't find any dynamic relocs in read-only sections, then
1727 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1728 if (p == NULL)
1729 {
1730 h->non_got_ref = 0;
1731 return TRUE;
1732 }
1733 }
1734
1735 /* We must allocate the symbol in our .dynbss section, which will
1736 become part of the .bss section of the executable. There will be
1737 an entry for this symbol in the .dynsym section. The dynamic
1738 object will contain position independent code, so all references
1739 from the dynamic object to this symbol will go through the global
1740 offset table. The dynamic linker will use the .dynsym entry to
1741 determine the address it must put in the global offset table, so
1742 both the dynamic object and the regular object will refer to the
1743 same memory location for the variable. */
1744
1745 htab = elf_s390_hash_table (info);
1746 if (htab == NULL)
1747 return FALSE;
1748
1749 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1750 copy the initial value out of the dynamic object and into the
1751 runtime process image. */
1752 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1753 {
1754 htab->srelbss->size += sizeof (Elf64_External_Rela);
1755 h->needs_copy = 1;
1756 }
1757
1758 s = htab->sdynbss;
1759
1760 return _bfd_elf_adjust_dynamic_copy (info, h, s);
1761 }
1762
1763 /* Allocate space in .plt, .got and associated reloc sections for
1764 dynamic relocs. */
1765
1766 static bfd_boolean
1767 allocate_dynrelocs (struct elf_link_hash_entry *h,
1768 void * inf)
1769 {
1770 struct bfd_link_info *info;
1771 struct elf_s390_link_hash_table *htab;
1772 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
1773 struct elf_dyn_relocs *p;
1774
1775 if (h->root.type == bfd_link_hash_indirect)
1776 return TRUE;
1777
1778 info = (struct bfd_link_info *) inf;
1779 htab = elf_s390_hash_table (info);
1780 if (htab == NULL)
1781 return FALSE;
1782
1783 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1784 here if it is defined and referenced in a non-shared object. */
1785 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1786 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1787 else if (htab->elf.dynamic_sections_created
1788 && h->plt.refcount > 0)
1789 {
1790 /* Make sure this symbol is output as a dynamic symbol.
1791 Undefined weak syms won't yet be marked as dynamic. */
1792 if (h->dynindx == -1
1793 && !h->forced_local)
1794 {
1795 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1796 return FALSE;
1797 }
1798
1799 if (bfd_link_pic (info)
1800 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1801 {
1802 asection *s = htab->elf.splt;
1803
1804 /* If this is the first .plt entry, make room for the special
1805 first entry. */
1806 if (s->size == 0)
1807 s->size += PLT_FIRST_ENTRY_SIZE;
1808
1809 h->plt.offset = s->size;
1810
1811 /* If this symbol is not defined in a regular file, and we are
1812 not generating a shared library, then set the symbol to this
1813 location in the .plt. This is required to make function
1814 pointers compare as equal between the normal executable and
1815 the shared library. */
1816 if (! bfd_link_pic (info)
1817 && !h->def_regular)
1818 {
1819 h->root.u.def.section = s;
1820 h->root.u.def.value = h->plt.offset;
1821 }
1822
1823 /* Make room for this entry. */
1824 s->size += PLT_ENTRY_SIZE;
1825
1826 /* We also need to make an entry in the .got.plt section, which
1827 will be placed in the .got section by the linker script. */
1828 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1829
1830 /* We also need to make an entry in the .rela.plt section. */
1831 htab->elf.srelplt->size += sizeof (Elf64_External_Rela);
1832 }
1833 else
1834 {
1835 h->plt.offset = (bfd_vma) -1;
1836 h->needs_plt = 0;
1837 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1838 }
1839 }
1840 else
1841 {
1842 h->plt.offset = (bfd_vma) -1;
1843 h->needs_plt = 0;
1844 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1845 }
1846
1847 /* If R_390_TLS_{IE64,GOTIE64,GOTIE12,IEENT} symbol is now local to
1848 the binary, we can optimize a bit. IE64 and GOTIE64 get converted
1849 to R_390_TLS_LE64 requiring no TLS entry. For GOTIE12 and IEENT
1850 we can save the dynamic TLS relocation. */
1851 if (h->got.refcount > 0
1852 && !bfd_link_pic (info)
1853 && h->dynindx == -1
1854 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1855 {
1856 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1857 /* For the GOTIE access without a literal pool entry the offset has
1858 to be stored somewhere. The immediate value in the instruction
1859 is not bit enough so the value is stored in the got. */
1860 {
1861 h->got.offset = htab->elf.sgot->size;
1862 htab->elf.sgot->size += GOT_ENTRY_SIZE;
1863 }
1864 else
1865 h->got.offset = (bfd_vma) -1;
1866 }
1867 else if (h->got.refcount > 0)
1868 {
1869 asection *s;
1870 bfd_boolean dyn;
1871 int tls_type = elf_s390_hash_entry(h)->tls_type;
1872
1873 /* Make sure this symbol is output as a dynamic symbol.
1874 Undefined weak syms won't yet be marked as dynamic. */
1875 if (h->dynindx == -1
1876 && !h->forced_local)
1877 {
1878 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1879 return FALSE;
1880 }
1881
1882 s = htab->elf.sgot;
1883 h->got.offset = s->size;
1884 s->size += GOT_ENTRY_SIZE;
1885 /* R_390_TLS_GD64 needs 2 consecutive GOT slots. */
1886 if (tls_type == GOT_TLS_GD)
1887 s->size += GOT_ENTRY_SIZE;
1888 dyn = htab->elf.dynamic_sections_created;
1889 /* R_390_TLS_IE64 needs one dynamic relocation,
1890 R_390_TLS_GD64 needs one if local symbol and two if global. */
1891 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1892 || tls_type >= GOT_TLS_IE)
1893 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1894 else if (tls_type == GOT_TLS_GD)
1895 htab->elf.srelgot->size += 2 * sizeof (Elf64_External_Rela);
1896 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1897 || h->root.type != bfd_link_hash_undefweak)
1898 && (bfd_link_pic (info)
1899 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1900 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1901 }
1902 else
1903 h->got.offset = (bfd_vma) -1;
1904
1905 if (eh->dyn_relocs == NULL)
1906 return TRUE;
1907
1908 /* In the shared -Bsymbolic case, discard space allocated for
1909 dynamic pc-relative relocs against symbols which turn out to be
1910 defined in regular objects. For the normal shared case, discard
1911 space for pc-relative relocs that have become local due to symbol
1912 visibility changes. */
1913
1914 if (bfd_link_pic (info))
1915 {
1916 if (SYMBOL_CALLS_LOCAL (info, h))
1917 {
1918 struct elf_dyn_relocs **pp;
1919
1920 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1921 {
1922 p->count -= p->pc_count;
1923 p->pc_count = 0;
1924 if (p->count == 0)
1925 *pp = p->next;
1926 else
1927 pp = &p->next;
1928 }
1929 }
1930
1931 /* Also discard relocs on undefined weak syms with non-default
1932 visibility. */
1933 if (eh->dyn_relocs != NULL
1934 && h->root.type == bfd_link_hash_undefweak)
1935 {
1936 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1937 eh->dyn_relocs = NULL;
1938
1939 /* Make sure undefined weak symbols are output as a dynamic
1940 symbol in PIEs. */
1941 else if (h->dynindx == -1
1942 && !h->forced_local)
1943 {
1944 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1945 return FALSE;
1946 }
1947 }
1948 }
1949 else if (ELIMINATE_COPY_RELOCS)
1950 {
1951 /* For the non-shared case, discard space for relocs against
1952 symbols which turn out to need copy relocs or are not
1953 dynamic. */
1954
1955 if (!h->non_got_ref
1956 && ((h->def_dynamic
1957 && !h->def_regular)
1958 || (htab->elf.dynamic_sections_created
1959 && (h->root.type == bfd_link_hash_undefweak
1960 || h->root.type == bfd_link_hash_undefined))))
1961 {
1962 /* Make sure this symbol is output as a dynamic symbol.
1963 Undefined weak syms won't yet be marked as dynamic. */
1964 if (h->dynindx == -1
1965 && !h->forced_local)
1966 {
1967 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1968 return FALSE;
1969 }
1970
1971 /* If that succeeded, we know we'll be keeping all the
1972 relocs. */
1973 if (h->dynindx != -1)
1974 goto keep;
1975 }
1976
1977 eh->dyn_relocs = NULL;
1978
1979 keep: ;
1980 }
1981
1982 /* Finally, allocate space. */
1983 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1984 {
1985 asection *sreloc = elf_section_data (p->sec)->sreloc;
1986 sreloc->size += p->count * sizeof (Elf64_External_Rela);
1987 }
1988
1989 return TRUE;
1990 }
1991
1992 /* Find any dynamic relocs that apply to read-only sections. */
1993
1994 static bfd_boolean
1995 readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1996 {
1997 struct elf_s390_link_hash_entry *eh;
1998 struct elf_dyn_relocs *p;
1999
2000 eh = (struct elf_s390_link_hash_entry *) h;
2001 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2002 {
2003 asection *s = p->sec->output_section;
2004
2005 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2006 {
2007 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2008
2009 info->flags |= DF_TEXTREL;
2010
2011 /* Not an error, just cut short the traversal. */
2012 return FALSE;
2013 }
2014 }
2015 return TRUE;
2016 }
2017
2018 /* Set the sizes of the dynamic sections. */
2019
2020 static bfd_boolean
2021 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2022 struct bfd_link_info *info)
2023 {
2024 struct elf_s390_link_hash_table *htab;
2025 bfd *dynobj;
2026 asection *s;
2027 bfd_boolean relocs;
2028 bfd *ibfd;
2029
2030 htab = elf_s390_hash_table (info);
2031 if (htab == NULL)
2032 return FALSE;
2033
2034 dynobj = htab->elf.dynobj;
2035 if (dynobj == NULL)
2036 abort ();
2037
2038 if (htab->elf.dynamic_sections_created)
2039 {
2040 /* Set the contents of the .interp section to the interpreter. */
2041 if (bfd_link_executable (info) && !info->nointerp)
2042 {
2043 s = bfd_get_linker_section (dynobj, ".interp");
2044 if (s == NULL)
2045 abort ();
2046 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
2047 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2048 }
2049 }
2050
2051 /* Set up .got offsets for local syms, and space for local dynamic
2052 relocs. */
2053 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2054 {
2055 bfd_signed_vma *local_got;
2056 bfd_signed_vma *end_local_got;
2057 char *local_tls_type;
2058 bfd_size_type locsymcount;
2059 Elf_Internal_Shdr *symtab_hdr;
2060 asection *srela;
2061 struct plt_entry *local_plt;
2062 unsigned int i;
2063
2064 if (! is_s390_elf (ibfd))
2065 continue;
2066
2067 for (s = ibfd->sections; s != NULL; s = s->next)
2068 {
2069 struct elf_dyn_relocs *p;
2070
2071 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
2072 {
2073 if (!bfd_is_abs_section (p->sec)
2074 && bfd_is_abs_section (p->sec->output_section))
2075 {
2076 /* Input section has been discarded, either because
2077 it is a copy of a linkonce section or due to
2078 linker script /DISCARD/, so we'll be discarding
2079 the relocs too. */
2080 }
2081 else if (p->count != 0)
2082 {
2083 srela = elf_section_data (p->sec)->sreloc;
2084 srela->size += p->count * sizeof (Elf64_External_Rela);
2085 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2086 info->flags |= DF_TEXTREL;
2087 }
2088 }
2089 }
2090
2091 local_got = elf_local_got_refcounts (ibfd);
2092 if (!local_got)
2093 continue;
2094
2095 symtab_hdr = &elf_symtab_hdr (ibfd);
2096 locsymcount = symtab_hdr->sh_info;
2097 end_local_got = local_got + locsymcount;
2098 local_tls_type = elf_s390_local_got_tls_type (ibfd);
2099 s = htab->elf.sgot;
2100 srela = htab->elf.srelgot;
2101 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
2102 {
2103 if (*local_got > 0)
2104 {
2105 *local_got = s->size;
2106 s->size += GOT_ENTRY_SIZE;
2107 if (*local_tls_type == GOT_TLS_GD)
2108 s->size += GOT_ENTRY_SIZE;
2109 if (bfd_link_pic (info))
2110 srela->size += sizeof (Elf64_External_Rela);
2111 }
2112 else
2113 *local_got = (bfd_vma) -1;
2114 }
2115
2116 local_plt = elf_s390_local_plt (ibfd);
2117 for (i = 0; i < symtab_hdr->sh_info; i++)
2118 {
2119 if (local_plt[i].plt.refcount > 0)
2120 {
2121 local_plt[i].plt.offset = htab->elf.iplt->size;
2122 htab->elf.iplt->size += PLT_ENTRY_SIZE;
2123 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
2124 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
2125 }
2126 else
2127 local_plt[i].plt.offset = (bfd_vma) -1;
2128 }
2129 }
2130
2131 if (htab->tls_ldm_got.refcount > 0)
2132 {
2133 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM64
2134 relocs. */
2135 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2136 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
2137 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
2138 }
2139 else
2140 htab->tls_ldm_got.offset = -1;
2141
2142 /* Allocate global sym .plt and .got entries, and space for global
2143 sym dynamic relocs. */
2144 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
2145
2146 /* We now have determined the sizes of the various dynamic sections.
2147 Allocate memory for them. */
2148 relocs = FALSE;
2149 for (s = dynobj->sections; s != NULL; s = s->next)
2150 {
2151 if ((s->flags & SEC_LINKER_CREATED) == 0)
2152 continue;
2153
2154 if (s == htab->elf.splt
2155 || s == htab->elf.sgot
2156 || s == htab->elf.sgotplt
2157 || s == htab->sdynbss
2158 || s == htab->elf.iplt
2159 || s == htab->elf.igotplt
2160 || s == htab->irelifunc)
2161 {
2162 /* Strip this section if we don't need it; see the
2163 comment below. */
2164 }
2165 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2166 {
2167 if (s->size != 0 && s != htab->elf.srelplt)
2168 relocs = TRUE;
2169
2170 /* We use the reloc_count field as a counter if we need
2171 to copy relocs into the output file. */
2172 s->reloc_count = 0;
2173 }
2174 else
2175 {
2176 /* It's not one of our sections, so don't allocate space. */
2177 continue;
2178 }
2179
2180 if (s->size == 0)
2181 {
2182 /* If we don't need this section, strip it from the
2183 output file. This is to handle .rela.bss and
2184 .rela.plt. We must create it in
2185 create_dynamic_sections, because it must be created
2186 before the linker maps input sections to output
2187 sections. The linker does that before
2188 adjust_dynamic_symbol is called, and it is that
2189 function which decides whether anything needs to go
2190 into these sections. */
2191
2192 s->flags |= SEC_EXCLUDE;
2193 continue;
2194 }
2195
2196 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2197 continue;
2198
2199 /* Allocate memory for the section contents. We use bfd_zalloc
2200 here in case unused entries are not reclaimed before the
2201 section's contents are written out. This should not happen,
2202 but this way if it does, we get a R_390_NONE reloc instead
2203 of garbage. */
2204 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2205 if (s->contents == NULL)
2206 return FALSE;
2207 }
2208
2209 if (htab->elf.dynamic_sections_created)
2210 {
2211 /* Add some entries to the .dynamic section. We fill in the
2212 values later, in elf_s390_finish_dynamic_sections, but we
2213 must add the entries now so that we get the correct size for
2214 the .dynamic section. The DT_DEBUG entry is filled in by the
2215 dynamic linker and used by the debugger. */
2216 #define add_dynamic_entry(TAG, VAL) \
2217 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2218
2219 if (bfd_link_executable (info))
2220 {
2221 if (!add_dynamic_entry (DT_DEBUG, 0))
2222 return FALSE;
2223 }
2224
2225 if (htab->elf.splt->size != 0)
2226 {
2227 if (!add_dynamic_entry (DT_PLTGOT, 0)
2228 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2229 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2230 || !add_dynamic_entry (DT_JMPREL, 0))
2231 return FALSE;
2232 }
2233
2234 if (relocs)
2235 {
2236 if (!add_dynamic_entry (DT_RELA, 0)
2237 || !add_dynamic_entry (DT_RELASZ, 0)
2238 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2239 return FALSE;
2240
2241 /* If any dynamic relocs apply to a read-only section,
2242 then we need a DT_TEXTREL entry. */
2243 if ((info->flags & DF_TEXTREL) == 0)
2244 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2245 info);
2246
2247 if ((info->flags & DF_TEXTREL) != 0)
2248 {
2249 if (!add_dynamic_entry (DT_TEXTREL, 0))
2250 return FALSE;
2251 }
2252 }
2253 }
2254 #undef add_dynamic_entry
2255
2256 return TRUE;
2257 }
2258
2259 /* Return the base VMA address which should be subtracted from real addresses
2260 when resolving @dtpoff relocation.
2261 This is PT_TLS segment p_vaddr. */
2262
2263 static bfd_vma
2264 dtpoff_base (struct bfd_link_info *info)
2265 {
2266 /* If tls_sec is NULL, we should have signalled an error already. */
2267 if (elf_hash_table (info)->tls_sec == NULL)
2268 return 0;
2269 return elf_hash_table (info)->tls_sec->vma;
2270 }
2271
2272 /* Return the relocation value for @tpoff relocation
2273 if STT_TLS virtual address is ADDRESS. */
2274
2275 static bfd_vma
2276 tpoff (struct bfd_link_info *info, bfd_vma address)
2277 {
2278 struct elf_link_hash_table *htab = elf_hash_table (info);
2279
2280 /* If tls_sec is NULL, we should have signalled an error already. */
2281 if (htab->tls_sec == NULL)
2282 return 0;
2283 return htab->tls_size + htab->tls_sec->vma - address;
2284 }
2285
2286 /* Complain if TLS instruction relocation is against an invalid
2287 instruction. */
2288
2289 static void
2290 invalid_tls_insn (bfd *input_bfd,
2291 asection *input_section,
2292 Elf_Internal_Rela *rel)
2293 {
2294 reloc_howto_type *howto;
2295
2296 howto = elf_howto_table + ELF64_R_TYPE (rel->r_info);
2297 (*_bfd_error_handler)
2298 (_("%B(%A+0x%lx): invalid instruction for TLS relocation %s"),
2299 input_bfd,
2300 input_section,
2301 (long) rel->r_offset,
2302 howto->name);
2303 bfd_set_error (bfd_error_bad_value);
2304 }
2305
2306 /* Relocate a 390 ELF section. */
2307
2308 static bfd_boolean
2309 elf_s390_relocate_section (bfd *output_bfd,
2310 struct bfd_link_info *info,
2311 bfd *input_bfd,
2312 asection *input_section,
2313 bfd_byte *contents,
2314 Elf_Internal_Rela *relocs,
2315 Elf_Internal_Sym *local_syms,
2316 asection **local_sections)
2317 {
2318 struct elf_s390_link_hash_table *htab;
2319 Elf_Internal_Shdr *symtab_hdr;
2320 struct elf_link_hash_entry **sym_hashes;
2321 bfd_vma *local_got_offsets;
2322 Elf_Internal_Rela *rel;
2323 Elf_Internal_Rela *relend;
2324
2325 BFD_ASSERT (is_s390_elf (input_bfd));
2326
2327 htab = elf_s390_hash_table (info);
2328 if (htab == NULL)
2329 return FALSE;
2330
2331 symtab_hdr = &elf_symtab_hdr (input_bfd);
2332 sym_hashes = elf_sym_hashes (input_bfd);
2333 local_got_offsets = elf_local_got_offsets (input_bfd);
2334
2335 rel = relocs;
2336 relend = relocs + input_section->reloc_count;
2337 for (; rel < relend; rel++)
2338 {
2339 unsigned int r_type;
2340 reloc_howto_type *howto;
2341 unsigned long r_symndx;
2342 struct elf_link_hash_entry *h;
2343 Elf_Internal_Sym *sym;
2344 asection *sec;
2345 bfd_vma off;
2346 bfd_vma relocation;
2347 bfd_boolean unresolved_reloc;
2348 bfd_reloc_status_type r;
2349 int tls_type;
2350 asection *base_got = htab->elf.sgot;
2351
2352 r_type = ELF64_R_TYPE (rel->r_info);
2353 if (r_type == (int) R_390_GNU_VTINHERIT
2354 || r_type == (int) R_390_GNU_VTENTRY)
2355 continue;
2356 if (r_type >= (int) R_390_max)
2357 {
2358 bfd_set_error (bfd_error_bad_value);
2359 return FALSE;
2360 }
2361
2362 howto = elf_howto_table + r_type;
2363 r_symndx = ELF64_R_SYM (rel->r_info);
2364
2365 h = NULL;
2366 sym = NULL;
2367 sec = NULL;
2368 unresolved_reloc = FALSE;
2369 if (r_symndx < symtab_hdr->sh_info)
2370 {
2371 sym = local_syms + r_symndx;
2372 sec = local_sections[r_symndx];
2373
2374 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2375 {
2376 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2377 if (local_plt == NULL)
2378 return FALSE;
2379
2380 /* Address of the PLT slot. */
2381 relocation = (htab->elf.iplt->output_section->vma
2382 + htab->elf.iplt->output_offset
2383 + local_plt[r_symndx].plt.offset);
2384
2385 switch (r_type)
2386 {
2387 case R_390_PLTOFF16:
2388 case R_390_PLTOFF32:
2389 case R_390_PLTOFF64:
2390 relocation -= htab->elf.sgot->output_section->vma;
2391 break;
2392 case R_390_GOTPLT12:
2393 case R_390_GOTPLT16:
2394 case R_390_GOTPLT20:
2395 case R_390_GOTPLT32:
2396 case R_390_GOTPLT64:
2397 case R_390_GOTPLTENT:
2398 case R_390_GOT12:
2399 case R_390_GOT16:
2400 case R_390_GOT20:
2401 case R_390_GOT32:
2402 case R_390_GOT64:
2403 case R_390_GOTENT:
2404 {
2405 /* Write the PLT slot address into the GOT slot. */
2406 bfd_put_64 (output_bfd, relocation,
2407 htab->elf.sgot->contents +
2408 local_got_offsets[r_symndx]);
2409 relocation = (local_got_offsets[r_symndx] +
2410 htab->elf.sgot->output_offset);
2411
2412 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2413 relocation += htab->elf.sgot->output_section->vma;
2414 break;
2415 }
2416 default:
2417 break;
2418 }
2419 /* The output section is needed later in
2420 finish_dynamic_section when creating the dynamic
2421 relocation. */
2422 local_plt[r_symndx].sec = sec;
2423 goto do_relocation;
2424 }
2425 else
2426 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2427 }
2428 else
2429 {
2430 bfd_boolean warned ATTRIBUTE_UNUSED;
2431 bfd_boolean ignored ATTRIBUTE_UNUSED;
2432
2433 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2434 r_symndx, symtab_hdr, sym_hashes,
2435 h, sec, relocation,
2436 unresolved_reloc, warned, ignored);
2437 }
2438
2439 if (sec != NULL && discarded_section (sec))
2440 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2441 rel, 1, relend, howto, 0, contents);
2442
2443 if (bfd_link_relocatable (info))
2444 continue;
2445
2446 switch (r_type)
2447 {
2448 case R_390_GOTPLT12:
2449 case R_390_GOTPLT16:
2450 case R_390_GOTPLT20:
2451 case R_390_GOTPLT32:
2452 case R_390_GOTPLT64:
2453 case R_390_GOTPLTENT:
2454 /* There are three cases for a GOTPLT relocation. 1) The
2455 relocation is against the jump slot entry of a plt that
2456 will get emitted to the output file. 2) The relocation
2457 is against the jump slot of a plt entry that has been
2458 removed. elf_s390_adjust_gotplt has created a GOT entry
2459 as replacement. 3) The relocation is against a local symbol.
2460 Cases 2) and 3) are the same as the GOT relocation code
2461 so we just have to test for case 1 and fall through for
2462 the other two. */
2463 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2464 {
2465 bfd_vma plt_index;
2466
2467 if (s390_is_ifunc_symbol_p (h))
2468 {
2469 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2470 relocation = (plt_index * GOT_ENTRY_SIZE +
2471 htab->elf.igotplt->output_offset);
2472 if (r_type == R_390_GOTPLTENT)
2473 relocation += htab->elf.igotplt->output_section->vma;
2474 }
2475 else
2476 {
2477 /* Calc. index no.
2478 Current offset - size first entry / entry size. */
2479 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2480 PLT_ENTRY_SIZE;
2481
2482 /* Offset in GOT is PLT index plus GOT headers(3)
2483 times 8, addr & GOT addr. */
2484 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2485 if (r_type == R_390_GOTPLTENT)
2486 relocation += htab->elf.sgot->output_section->vma;
2487 }
2488 unresolved_reloc = FALSE;
2489 break;
2490 }
2491 /* Fall through. */
2492
2493 case R_390_GOT12:
2494 case R_390_GOT16:
2495 case R_390_GOT20:
2496 case R_390_GOT32:
2497 case R_390_GOT64:
2498 case R_390_GOTENT:
2499 /* Relocation is to the entry for this symbol in the global
2500 offset table. */
2501 if (base_got == NULL)
2502 abort ();
2503
2504 if (h != NULL)
2505 {
2506 bfd_boolean dyn;
2507
2508 off = h->got.offset;
2509 dyn = htab->elf.dynamic_sections_created;
2510
2511 if (s390_is_ifunc_symbol_p (h))
2512 {
2513 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2514 if (off == (bfd_vma)-1)
2515 {
2516 /* No explicit GOT usage so redirect to the
2517 got.iplt slot. */
2518 base_got = htab->elf.igotplt;
2519 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2520 }
2521 else
2522 {
2523 /* Explicit GOT slots must contain the address
2524 of the PLT slot. This will be handled in
2525 finish_dynamic_symbol. */
2526 }
2527 }
2528 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2529 bfd_link_pic (info),
2530 h)
2531 || (bfd_link_pic (info)
2532 && SYMBOL_REFERENCES_LOCAL (info, h))
2533 || (ELF_ST_VISIBILITY (h->other)
2534 && h->root.type == bfd_link_hash_undefweak))
2535 {
2536 /* This is actually a static link, or it is a
2537 -Bsymbolic link and the symbol is defined
2538 locally, or the symbol was forced to be local
2539 because of a version file. We must initialize
2540 this entry in the global offset table. Since the
2541 offset must always be a multiple of 2, we use the
2542 least significant bit to record whether we have
2543 initialized it already.
2544
2545 When doing a dynamic link, we create a .rel.got
2546 relocation entry to initialize the value. This
2547 is done in the finish_dynamic_symbol routine. */
2548 if ((off & 1) != 0)
2549 off &= ~1;
2550 else
2551 {
2552 bfd_put_64 (output_bfd, relocation,
2553 base_got->contents + off);
2554 h->got.offset |= 1;
2555 }
2556
2557 if ((h->def_regular
2558 && bfd_link_pic (info)
2559 && SYMBOL_REFERENCES_LOCAL (info, h))
2560 /* lgrl rx,sym@GOTENT -> larl rx, sym */
2561 && ((r_type == R_390_GOTENT
2562 && (bfd_get_16 (input_bfd,
2563 contents + rel->r_offset - 2)
2564 & 0xff0f) == 0xc408)
2565 /* lg rx, sym@GOT(r12) -> larl rx, sym */
2566 || (r_type == R_390_GOT20
2567 && (bfd_get_32 (input_bfd,
2568 contents + rel->r_offset - 2)
2569 & 0xff00f000) == 0xe300c000
2570 && bfd_get_8 (input_bfd,
2571 contents + rel->r_offset + 3) == 0x04)))
2572
2573 {
2574 unsigned short new_insn =
2575 (0xc000 | (bfd_get_8 (input_bfd,
2576 contents + rel->r_offset - 1) & 0xf0));
2577 bfd_put_16 (output_bfd, new_insn,
2578 contents + rel->r_offset - 2);
2579 r_type = R_390_PC32DBL;
2580 rel->r_addend = 2;
2581 howto = elf_howto_table + r_type;
2582 relocation = h->root.u.def.value
2583 + h->root.u.def.section->output_section->vma
2584 + h->root.u.def.section->output_offset;
2585 goto do_relocation;
2586 }
2587 }
2588 else
2589 unresolved_reloc = FALSE;
2590 }
2591 else
2592 {
2593 if (local_got_offsets == NULL)
2594 abort ();
2595
2596 off = local_got_offsets[r_symndx];
2597
2598 /* The offset must always be a multiple of 8. We use
2599 the least significant bit to record whether we have
2600 already generated the necessary reloc. */
2601 if ((off & 1) != 0)
2602 off &= ~1;
2603 else
2604 {
2605 bfd_put_64 (output_bfd, relocation,
2606 htab->elf.sgot->contents + off);
2607
2608 if (bfd_link_pic (info))
2609 {
2610 asection *s;
2611 Elf_Internal_Rela outrel;
2612 bfd_byte *loc;
2613
2614 s = htab->elf.srelgot;
2615 if (s == NULL)
2616 abort ();
2617
2618 outrel.r_offset = (htab->elf.sgot->output_section->vma
2619 + htab->elf.sgot->output_offset
2620 + off);
2621 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2622 outrel.r_addend = relocation;
2623 loc = s->contents;
2624 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2625 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2626 }
2627
2628 local_got_offsets[r_symndx] |= 1;
2629 }
2630 }
2631
2632 if (off >= (bfd_vma) -2)
2633 abort ();
2634
2635 relocation = base_got->output_offset + off;
2636
2637 /* For @GOTENT the relocation is against the offset between
2638 the instruction and the symbols entry in the GOT and not
2639 between the start of the GOT and the symbols entry. We
2640 add the vma of the GOT to get the correct value. */
2641 if ( r_type == R_390_GOTENT
2642 || r_type == R_390_GOTPLTENT)
2643 relocation += base_got->output_section->vma;
2644
2645 break;
2646
2647 case R_390_GOTOFF16:
2648 case R_390_GOTOFF32:
2649 case R_390_GOTOFF64:
2650 /* Relocation is relative to the start of the global offset
2651 table. */
2652
2653 if (h != NULL
2654 && s390_is_ifunc_symbol_p (h)
2655 && h->def_regular
2656 && !bfd_link_executable (info))
2657 {
2658 relocation = (htab->elf.iplt->output_section->vma
2659 + htab->elf.iplt->output_offset
2660 + h->plt.offset
2661 - htab->elf.sgot->output_section->vma);
2662 goto do_relocation;
2663 }
2664
2665 /* Note that sgot->output_offset is not involved in this
2666 calculation. We always want the start of .got. If we
2667 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2668 permitted by the ABI, we might have to change this
2669 calculation. */
2670 relocation -= htab->elf.sgot->output_section->vma;
2671 break;
2672
2673 case R_390_GOTPC:
2674 case R_390_GOTPCDBL:
2675 /* Use global offset table as symbol value. */
2676 relocation = htab->elf.sgot->output_section->vma;
2677 unresolved_reloc = FALSE;
2678 break;
2679
2680 case R_390_PLT12DBL:
2681 case R_390_PLT16DBL:
2682 case R_390_PLT24DBL:
2683 case R_390_PLT32:
2684 case R_390_PLT32DBL:
2685 case R_390_PLT64:
2686 /* Relocation is to the entry for this symbol in the
2687 procedure linkage table. */
2688
2689 /* Resolve a PLT32 reloc against a local symbol directly,
2690 without using the procedure linkage table. */
2691 if (h == NULL)
2692 break;
2693
2694 if (h->plt.offset == (bfd_vma) -1
2695 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2696 {
2697 /* We didn't make a PLT entry for this symbol. This
2698 happens when statically linking PIC code, or when
2699 using -Bsymbolic. */
2700 break;
2701 }
2702 if (s390_is_ifunc_symbol_p (h))
2703 relocation = (htab->elf.iplt->output_section->vma
2704 + htab->elf.iplt->output_offset
2705 + h->plt.offset);
2706 else
2707 relocation = (htab->elf.splt->output_section->vma
2708 + htab->elf.splt->output_offset
2709 + h->plt.offset);
2710 unresolved_reloc = FALSE;
2711 break;
2712
2713 case R_390_PLTOFF16:
2714 case R_390_PLTOFF32:
2715 case R_390_PLTOFF64:
2716 /* Relocation is to the entry for this symbol in the
2717 procedure linkage table relative to the start of the GOT. */
2718
2719 /* For local symbols or if we didn't make a PLT entry for
2720 this symbol resolve the symbol directly. */
2721 if (h == NULL
2722 || h->plt.offset == (bfd_vma) -1
2723 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2724 {
2725 relocation -= htab->elf.sgot->output_section->vma;
2726 break;
2727 }
2728
2729 if (s390_is_ifunc_symbol_p (h))
2730 relocation = (htab->elf.iplt->output_section->vma
2731 + htab->elf.iplt->output_offset
2732 + h->plt.offset
2733 - htab->elf.sgot->output_section->vma);
2734 else
2735 relocation = (htab->elf.splt->output_section->vma
2736 + htab->elf.splt->output_offset
2737 + h->plt.offset
2738 - htab->elf.sgot->output_section->vma);
2739 unresolved_reloc = FALSE;
2740 break;
2741
2742 case R_390_PC16:
2743 case R_390_PC12DBL:
2744 case R_390_PC16DBL:
2745 case R_390_PC24DBL:
2746 case R_390_PC32:
2747 case R_390_PC32DBL:
2748 case R_390_PC64:
2749 /* The target of these relocs are instruction operands
2750 residing in read-only sections. We cannot emit a runtime
2751 reloc for it. */
2752 if (h != NULL
2753 && s390_is_ifunc_symbol_p (h)
2754 && h->def_regular
2755 && bfd_link_pic (info))
2756 {
2757 relocation = (htab->elf.iplt->output_section->vma
2758 + htab->elf.iplt->output_offset
2759 + h->plt.offset);
2760 goto do_relocation;
2761 }
2762
2763 case R_390_8:
2764 case R_390_16:
2765 case R_390_32:
2766 case R_390_64:
2767
2768 if (h != NULL
2769 && s390_is_ifunc_symbol_p (h)
2770 && h->def_regular)
2771 {
2772 if (!bfd_link_pic (info) || !h->non_got_ref)
2773 {
2774 /* For a non-shared object STT_GNU_IFUNC symbol must
2775 go through PLT. */
2776 relocation = (htab->elf.iplt->output_section->vma
2777 + htab->elf.iplt->output_offset
2778 + h ->plt.offset);
2779 goto do_relocation;
2780 }
2781 else
2782 {
2783 /* For shared objects a runtime relocation is needed. */
2784
2785 Elf_Internal_Rela outrel;
2786 asection *sreloc;
2787
2788 /* Need a dynamic relocation to get the real function
2789 address. */
2790 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2791 info,
2792 input_section,
2793 rel->r_offset);
2794 if (outrel.r_offset == (bfd_vma) -1
2795 || outrel.r_offset == (bfd_vma) -2)
2796 abort ();
2797
2798 outrel.r_offset += (input_section->output_section->vma
2799 + input_section->output_offset);
2800
2801 if (h->dynindx == -1
2802 || h->forced_local
2803 || bfd_link_executable (info))
2804 {
2805 /* This symbol is resolved locally. */
2806 outrel.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
2807 outrel.r_addend = (h->root.u.def.value
2808 + h->root.u.def.section->output_section->vma
2809 + h->root.u.def.section->output_offset);
2810 }
2811 else
2812 {
2813 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2814 outrel.r_addend = 0;
2815 }
2816
2817 sreloc = htab->elf.irelifunc;
2818 elf_append_rela (output_bfd, sreloc, &outrel);
2819
2820 /* If this reloc is against an external symbol, we
2821 do not want to fiddle with the addend. Otherwise,
2822 we need to include the symbol value so that it
2823 becomes an addend for the dynamic reloc. For an
2824 internal symbol, we have updated addend. */
2825 continue;
2826 }
2827 }
2828
2829 if ((input_section->flags & SEC_ALLOC) == 0)
2830 break;
2831
2832 if ((bfd_link_pic (info)
2833 && (h == NULL
2834 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2835 || h->root.type != bfd_link_hash_undefweak)
2836 && ((r_type != R_390_PC16
2837 && r_type != R_390_PC12DBL
2838 && r_type != R_390_PC16DBL
2839 && r_type != R_390_PC24DBL
2840 && r_type != R_390_PC32
2841 && r_type != R_390_PC32DBL
2842 && r_type != R_390_PC64)
2843 || !SYMBOL_CALLS_LOCAL (info, h)))
2844 || (ELIMINATE_COPY_RELOCS
2845 && !bfd_link_pic (info)
2846 && h != NULL
2847 && h->dynindx != -1
2848 && !h->non_got_ref
2849 && ((h->def_dynamic
2850 && !h->def_regular)
2851 || h->root.type == bfd_link_hash_undefweak
2852 || h->root.type == bfd_link_hash_undefined)))
2853 {
2854 Elf_Internal_Rela outrel;
2855 bfd_boolean skip, relocate;
2856 asection *sreloc;
2857 bfd_byte *loc;
2858
2859 /* When generating a shared object, these relocations
2860 are copied into the output file to be resolved at run
2861 time. */
2862 skip = FALSE;
2863 relocate = FALSE;
2864
2865 outrel.r_offset =
2866 _bfd_elf_section_offset (output_bfd, info, input_section,
2867 rel->r_offset);
2868 if (outrel.r_offset == (bfd_vma) -1)
2869 skip = TRUE;
2870 else if (outrel.r_offset == (bfd_vma) -2)
2871 skip = TRUE, relocate = TRUE;
2872
2873 outrel.r_offset += (input_section->output_section->vma
2874 + input_section->output_offset);
2875
2876 if (skip)
2877 memset (&outrel, 0, sizeof outrel);
2878 else if (h != NULL
2879 && h->dynindx != -1
2880 && (r_type == R_390_PC16
2881 || r_type == R_390_PC12DBL
2882 || r_type == R_390_PC16DBL
2883 || r_type == R_390_PC24DBL
2884 || r_type == R_390_PC32
2885 || r_type == R_390_PC32DBL
2886 || r_type == R_390_PC64
2887 || !bfd_link_pic (info)
2888 || !SYMBOLIC_BIND (info, h)
2889 || !h->def_regular))
2890 {
2891 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2892 outrel.r_addend = rel->r_addend;
2893 }
2894 else
2895 {
2896 /* This symbol is local, or marked to become local. */
2897 outrel.r_addend = relocation + rel->r_addend;
2898 if (r_type == R_390_64)
2899 {
2900 relocate = TRUE;
2901 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2902 }
2903 else
2904 {
2905 long sindx;
2906
2907 if (bfd_is_abs_section (sec))
2908 sindx = 0;
2909 else if (sec == NULL || sec->owner == NULL)
2910 {
2911 bfd_set_error(bfd_error_bad_value);
2912 return FALSE;
2913 }
2914 else
2915 {
2916 asection *osec;
2917
2918 osec = sec->output_section;
2919 sindx = elf_section_data (osec)->dynindx;
2920
2921 if (sindx == 0)
2922 {
2923 osec = htab->elf.text_index_section;
2924 sindx = elf_section_data (osec)->dynindx;
2925 }
2926 BFD_ASSERT (sindx != 0);
2927
2928 /* We are turning this relocation into one
2929 against a section symbol, so subtract out
2930 the output section's address but not the
2931 offset of the input section in the output
2932 section. */
2933 outrel.r_addend -= osec->vma;
2934 }
2935 outrel.r_info = ELF64_R_INFO (sindx, r_type);
2936 }
2937 }
2938
2939 sreloc = elf_section_data (input_section)->sreloc;
2940 if (sreloc == NULL)
2941 abort ();
2942
2943 loc = sreloc->contents;
2944 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2945 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2946
2947 /* If this reloc is against an external symbol, we do
2948 not want to fiddle with the addend. Otherwise, we
2949 need to include the symbol value so that it becomes
2950 an addend for the dynamic reloc. */
2951 if (! relocate)
2952 continue;
2953 }
2954
2955 break;
2956
2957 /* Relocations for tls literal pool entries. */
2958 case R_390_TLS_IE64:
2959 if (bfd_link_pic (info))
2960 {
2961 Elf_Internal_Rela outrel;
2962 asection *sreloc;
2963 bfd_byte *loc;
2964
2965 outrel.r_offset = rel->r_offset
2966 + input_section->output_section->vma
2967 + input_section->output_offset;
2968 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2969 sreloc = elf_section_data (input_section)->sreloc;
2970 if (sreloc == NULL)
2971 abort ();
2972 loc = sreloc->contents;
2973 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2974 bfd_elf64_swap_reloc_out (output_bfd, &outrel, loc);
2975 }
2976 /* Fall through. */
2977
2978 case R_390_TLS_GD64:
2979 case R_390_TLS_GOTIE64:
2980 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2981 tls_type = GOT_UNKNOWN;
2982 if (h == NULL && local_got_offsets)
2983 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2984 else if (h != NULL)
2985 {
2986 tls_type = elf_s390_hash_entry(h)->tls_type;
2987 if (!bfd_link_pic (info) && h->dynindx == -1 && tls_type >= GOT_TLS_IE)
2988 r_type = R_390_TLS_LE64;
2989 }
2990 if (r_type == R_390_TLS_GD64 && tls_type >= GOT_TLS_IE)
2991 r_type = R_390_TLS_IE64;
2992
2993 if (r_type == R_390_TLS_LE64)
2994 {
2995 /* This relocation gets optimized away by the local exec
2996 access optimization. */
2997 BFD_ASSERT (! unresolved_reloc);
2998 bfd_put_64 (output_bfd, -tpoff (info, relocation),
2999 contents + rel->r_offset);
3000 continue;
3001 }
3002
3003 if (htab->elf.sgot == NULL)
3004 abort ();
3005
3006 if (h != NULL)
3007 off = h->got.offset;
3008 else
3009 {
3010 if (local_got_offsets == NULL)
3011 abort ();
3012
3013 off = local_got_offsets[r_symndx];
3014 }
3015
3016 emit_tls_relocs:
3017
3018 if ((off & 1) != 0)
3019 off &= ~1;
3020 else
3021 {
3022 Elf_Internal_Rela outrel;
3023 bfd_byte *loc;
3024 int dr_type, indx;
3025
3026 if (htab->elf.srelgot == NULL)
3027 abort ();
3028
3029 outrel.r_offset = (htab->elf.sgot->output_section->vma
3030 + htab->elf.sgot->output_offset + off);
3031
3032 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3033 if (r_type == R_390_TLS_GD64)
3034 dr_type = R_390_TLS_DTPMOD;
3035 else
3036 dr_type = R_390_TLS_TPOFF;
3037 if (dr_type == R_390_TLS_TPOFF && indx == 0)
3038 outrel.r_addend = relocation - dtpoff_base (info);
3039 else
3040 outrel.r_addend = 0;
3041 outrel.r_info = ELF64_R_INFO (indx, dr_type);
3042 loc = htab->elf.srelgot->contents;
3043 loc += htab->elf.srelgot->reloc_count++
3044 * sizeof (Elf64_External_Rela);
3045 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3046
3047 if (r_type == R_390_TLS_GD64)
3048 {
3049 if (indx == 0)
3050 {
3051 BFD_ASSERT (! unresolved_reloc);
3052 bfd_put_64 (output_bfd,
3053 relocation - dtpoff_base (info),
3054 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3055 }
3056 else
3057 {
3058 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_DTPOFF);
3059 outrel.r_offset += GOT_ENTRY_SIZE;
3060 outrel.r_addend = 0;
3061 htab->elf.srelgot->reloc_count++;
3062 loc += sizeof (Elf64_External_Rela);
3063 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3064 }
3065 }
3066
3067 if (h != NULL)
3068 h->got.offset |= 1;
3069 else
3070 local_got_offsets[r_symndx] |= 1;
3071 }
3072
3073 if (off >= (bfd_vma) -2)
3074 abort ();
3075 if (r_type == ELF64_R_TYPE (rel->r_info))
3076 {
3077 relocation = htab->elf.sgot->output_offset + off;
3078 if (r_type == R_390_TLS_IE64 || r_type == R_390_TLS_IEENT)
3079 relocation += htab->elf.sgot->output_section->vma;
3080 unresolved_reloc = FALSE;
3081 }
3082 else
3083 {
3084 bfd_put_64 (output_bfd, htab->elf.sgot->output_offset + off,
3085 contents + rel->r_offset);
3086 continue;
3087 }
3088 break;
3089
3090 case R_390_TLS_GOTIE12:
3091 case R_390_TLS_GOTIE20:
3092 case R_390_TLS_IEENT:
3093 if (h == NULL)
3094 {
3095 if (local_got_offsets == NULL)
3096 abort();
3097 off = local_got_offsets[r_symndx];
3098 if (bfd_link_pic (info))
3099 goto emit_tls_relocs;
3100 }
3101 else
3102 {
3103 off = h->got.offset;
3104 tls_type = elf_s390_hash_entry(h)->tls_type;
3105 if (bfd_link_pic (info) || h->dynindx != -1 || tls_type < GOT_TLS_IE)
3106 goto emit_tls_relocs;
3107 }
3108
3109 if (htab->elf.sgot == NULL)
3110 abort ();
3111
3112 BFD_ASSERT (! unresolved_reloc);
3113 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3114 htab->elf.sgot->contents + off);
3115 relocation = htab->elf.sgot->output_offset + off;
3116 if (r_type == R_390_TLS_IEENT)
3117 relocation += htab->elf.sgot->output_section->vma;
3118 unresolved_reloc = FALSE;
3119 break;
3120
3121 case R_390_TLS_LDM64:
3122 if (! bfd_link_pic (info))
3123 /* The literal pool entry this relocation refers to gets ignored
3124 by the optimized code of the local exec model. Do nothing
3125 and the value will turn out zero. */
3126 continue;
3127
3128 if (htab->elf.sgot == NULL)
3129 abort ();
3130
3131 off = htab->tls_ldm_got.offset;
3132 if (off & 1)
3133 off &= ~1;
3134 else
3135 {
3136 Elf_Internal_Rela outrel;
3137 bfd_byte *loc;
3138
3139 if (htab->elf.srelgot == NULL)
3140 abort ();
3141
3142 outrel.r_offset = (htab->elf.sgot->output_section->vma
3143 + htab->elf.sgot->output_offset + off);
3144
3145 bfd_put_64 (output_bfd, 0,
3146 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3147 outrel.r_info = ELF64_R_INFO (0, R_390_TLS_DTPMOD);
3148 outrel.r_addend = 0;
3149 loc = htab->elf.srelgot->contents;
3150 loc += htab->elf.srelgot->reloc_count++
3151 * sizeof (Elf64_External_Rela);
3152 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3153 htab->tls_ldm_got.offset |= 1;
3154 }
3155 relocation = htab->elf.sgot->output_offset + off;
3156 unresolved_reloc = FALSE;
3157 break;
3158
3159 case R_390_TLS_LE64:
3160 if (bfd_link_dll (info))
3161 {
3162 /* Linking a shared library with non-fpic code requires
3163 a R_390_TLS_TPOFF relocation. */
3164 Elf_Internal_Rela outrel;
3165 asection *sreloc;
3166 bfd_byte *loc;
3167 int indx;
3168
3169 outrel.r_offset = rel->r_offset
3170 + input_section->output_section->vma
3171 + input_section->output_offset;
3172 if (h != NULL && h->dynindx != -1)
3173 indx = h->dynindx;
3174 else
3175 indx = 0;
3176 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_TPOFF);
3177 if (indx == 0)
3178 outrel.r_addend = relocation - dtpoff_base (info);
3179 else
3180 outrel.r_addend = 0;
3181 sreloc = elf_section_data (input_section)->sreloc;
3182 if (sreloc == NULL)
3183 abort ();
3184 loc = sreloc->contents;
3185 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
3186 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3187 }
3188 else
3189 {
3190 BFD_ASSERT (! unresolved_reloc);
3191 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3192 contents + rel->r_offset);
3193 }
3194 continue;
3195
3196 case R_390_TLS_LDO64:
3197 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
3198 relocation -= dtpoff_base (info);
3199 else
3200 /* When converting LDO to LE, we must negate. */
3201 relocation = -tpoff (info, relocation);
3202 break;
3203
3204 /* Relocations for tls instructions. */
3205 case R_390_TLS_LOAD:
3206 case R_390_TLS_GDCALL:
3207 case R_390_TLS_LDCALL:
3208 tls_type = GOT_UNKNOWN;
3209 if (h == NULL && local_got_offsets)
3210 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3211 else if (h != NULL)
3212 tls_type = elf_s390_hash_entry(h)->tls_type;
3213
3214 if (tls_type == GOT_TLS_GD)
3215 continue;
3216
3217 if (r_type == R_390_TLS_LOAD)
3218 {
3219 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3220 {
3221 /* IE->LE transition. Four valid cases:
3222 lg %rx,(0,%ry) -> sllg %rx,%ry,0
3223 lg %rx,(%ry,0) -> sllg %rx,%ry,0
3224 lg %rx,(%ry,%r12) -> sllg %rx,%ry,0
3225 lg %rx,(%r12,%ry) -> sllg %rx,%ry,0 */
3226 unsigned int insn0, insn1, ry;
3227
3228 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3229 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3230 if (insn1 != 0x0004)
3231 invalid_tls_insn (input_bfd, input_section, rel);
3232 ry = 0;
3233 if ((insn0 & 0xff00f000) == 0xe3000000)
3234 /* lg %rx,0(%ry,0) -> sllg %rx,%ry,0 */
3235 ry = (insn0 & 0x000f0000);
3236 else if ((insn0 & 0xff0f0000) == 0xe3000000)
3237 /* lg %rx,0(0,%ry) -> sllg %rx,%ry,0 */
3238 ry = (insn0 & 0x0000f000) << 4;
3239 else if ((insn0 & 0xff00f000) == 0xe300c000)
3240 /* lg %rx,0(%ry,%r12) -> sllg %rx,%ry,0 */
3241 ry = (insn0 & 0x000f0000);
3242 else if ((insn0 & 0xff0f0000) == 0xe30c0000)
3243 /* lg %rx,0(%r12,%ry) -> sllg %rx,%ry,0 */
3244 ry = (insn0 & 0x0000f000) << 4;
3245 else
3246 invalid_tls_insn (input_bfd, input_section, rel);
3247 insn0 = 0xeb000000 | (insn0 & 0x00f00000) | ry;
3248 insn1 = 0x000d;
3249 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3250 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3251 }
3252 }
3253 else if (r_type == R_390_TLS_GDCALL)
3254 {
3255 unsigned int insn0, insn1;
3256
3257 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3258 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3259 if ((insn0 & 0xffff0000) != 0xc0e50000)
3260 invalid_tls_insn (input_bfd, input_section, rel);
3261 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3262 {
3263 /* GD->LE transition.
3264 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3265 insn0 = 0xc0040000;
3266 insn1 = 0x0000;
3267 }
3268 else
3269 {
3270 /* GD->IE transition.
3271 brasl %r14,__tls_get_addr@plt -> lg %r2,0(%r2,%r12) */
3272 insn0 = 0xe322c000;
3273 insn1 = 0x0004;
3274 }
3275 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3276 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3277 }
3278 else if (r_type == R_390_TLS_LDCALL)
3279 {
3280 if (!bfd_link_pic (info))
3281 {
3282 unsigned int insn0, insn1;
3283
3284 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3285 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3286 if ((insn0 & 0xffff0000) != 0xc0e50000)
3287 invalid_tls_insn (input_bfd, input_section, rel);
3288 /* LD->LE transition.
3289 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3290 insn0 = 0xc0040000;
3291 insn1 = 0x0000;
3292 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3293 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3294 }
3295 }
3296 continue;
3297
3298 default:
3299 break;
3300 }
3301
3302 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3303 because such sections are not SEC_ALLOC and thus ld.so will
3304 not process them. */
3305 if (unresolved_reloc
3306 && !((input_section->flags & SEC_DEBUGGING) != 0
3307 && h->def_dynamic)
3308 && _bfd_elf_section_offset (output_bfd, info, input_section,
3309 rel->r_offset) != (bfd_vma) -1)
3310 (*_bfd_error_handler)
3311 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3312 input_bfd,
3313 input_section,
3314 (long) rel->r_offset,
3315 howto->name,
3316 h->root.root.string);
3317
3318 do_relocation:
3319
3320 /* When applying a 24 bit reloc we need to start one byte
3321 earlier. Otherwise the 32 bit get/put bfd operations might
3322 access a byte after the actual section. */
3323 if (r_type == R_390_PC24DBL
3324 || r_type == R_390_PLT24DBL)
3325 rel->r_offset--;
3326
3327 if (r_type == R_390_20
3328 || r_type == R_390_GOT20
3329 || r_type == R_390_GOTPLT20
3330 || r_type == R_390_TLS_GOTIE20)
3331 {
3332 relocation += rel->r_addend;
3333 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3334 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3335 contents, rel->r_offset,
3336 relocation, 0);
3337 }
3338 else
3339 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3340 contents, rel->r_offset,
3341 relocation, rel->r_addend);
3342
3343 if (r != bfd_reloc_ok)
3344 {
3345 const char *name;
3346
3347 if (h != NULL)
3348 name = h->root.root.string;
3349 else
3350 {
3351 name = bfd_elf_string_from_elf_section (input_bfd,
3352 symtab_hdr->sh_link,
3353 sym->st_name);
3354 if (name == NULL)
3355 return FALSE;
3356 if (*name == '\0')
3357 name = bfd_section_name (input_bfd, sec);
3358 }
3359
3360 if (r == bfd_reloc_overflow)
3361 (*info->callbacks->reloc_overflow)
3362 (info, (h ? &h->root : NULL), name, howto->name,
3363 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3364 else
3365 {
3366 (*_bfd_error_handler)
3367 (_("%B(%A+0x%lx): reloc against `%s': error %d"),
3368 input_bfd, input_section,
3369 (long) rel->r_offset, name, (int) r);
3370 return FALSE;
3371 }
3372 }
3373 }
3374
3375 return TRUE;
3376 }
3377
3378 /* Generate the PLT slots together with the dynamic relocations needed
3379 for IFUNC symbols. */
3380
3381 static void
3382 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3383 struct bfd_link_info *info,
3384 struct elf_link_hash_entry *h,
3385 struct elf_s390_link_hash_table *htab,
3386 bfd_vma plt_offset,
3387 bfd_vma resolver_address)
3388 {
3389 bfd_vma plt_index;
3390 bfd_vma got_offset;
3391 Elf_Internal_Rela rela;
3392 bfd_byte *loc;
3393 asection *plt, *gotplt, *relplt;
3394
3395 if (htab->elf.iplt == NULL
3396 || htab->elf.igotplt == NULL
3397 || htab->elf.irelplt == NULL)
3398 abort ();
3399
3400 /* Index of the PLT slot within iplt section. */
3401 plt_index = plt_offset / PLT_ENTRY_SIZE;
3402 plt = htab->elf.iplt;
3403 /* Offset into the igot.plt section. */
3404 got_offset = plt_index * GOT_ENTRY_SIZE;
3405 gotplt = htab->elf.igotplt;
3406 relplt = htab->elf.irelplt;
3407
3408 /* Fill in the blueprint of a PLT. */
3409 memcpy (plt->contents + plt_offset, elf_s390x_plt_entry,
3410 PLT_ENTRY_SIZE);
3411
3412 /* Fixup the relative address to the GOT entry */
3413 bfd_put_32 (output_bfd,
3414 (gotplt->output_section->vma +
3415 gotplt->output_offset + got_offset
3416 - (plt->output_section->vma +
3417 plt->output_offset +
3418 plt_offset))/2,
3419 plt->contents + plt_offset + 2);
3420 /* Fixup the relative branch to PLT 0 */
3421 bfd_put_32 (output_bfd, - (plt->output_offset +
3422 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3423 plt->contents + plt_offset + 24);
3424 /* Fixup offset into .rela.plt section. */
3425 bfd_put_32 (output_bfd, relplt->output_offset +
3426 plt_index * sizeof (Elf64_External_Rela),
3427 plt->contents + plt_offset + 28);
3428
3429 /* Fill in the entry in the global offset table.
3430 Points to instruction after GOT offset. */
3431 bfd_put_64 (output_bfd,
3432 (plt->output_section->vma
3433 + plt->output_offset
3434 + plt_offset
3435 + 14),
3436 gotplt->contents + got_offset);
3437
3438 /* Fill in the entry in the .rela.plt section. */
3439 rela.r_offset = (gotplt->output_section->vma
3440 + gotplt->output_offset
3441 + got_offset);
3442
3443 if (!h
3444 || h->dynindx == -1
3445 || ((bfd_link_executable (info)
3446 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3447 && h->def_regular))
3448 {
3449 /* The symbol can be locally resolved. */
3450 rela.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
3451 rela.r_addend = resolver_address;
3452 }
3453 else
3454 {
3455 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3456 rela.r_addend = 0;
3457 }
3458
3459 loc = relplt->contents + plt_index * sizeof (Elf64_External_Rela);
3460 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3461 }
3462
3463
3464 /* Finish up dynamic symbol handling. We set the contents of various
3465 dynamic sections here. */
3466
3467 static bfd_boolean
3468 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3469 struct bfd_link_info *info,
3470 struct elf_link_hash_entry *h,
3471 Elf_Internal_Sym *sym)
3472 {
3473 struct elf_s390_link_hash_table *htab;
3474 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3475
3476 htab = elf_s390_hash_table (info);
3477 if (htab == NULL)
3478 return FALSE;
3479
3480 if (h->plt.offset != (bfd_vma) -1)
3481 {
3482 bfd_vma plt_index;
3483 bfd_vma got_offset;
3484 Elf_Internal_Rela rela;
3485 bfd_byte *loc;
3486
3487 /* This symbol has an entry in the procedure linkage table. Set
3488 it up. */
3489 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3490 {
3491 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3492 htab, h->plt.offset,
3493 eh->ifunc_resolver_address +
3494 eh->ifunc_resolver_section->output_offset +
3495 eh->ifunc_resolver_section->output_section->vma);
3496
3497 /* Do not return yet. Handling of explicit GOT slots of
3498 IFUNC symbols is below. */
3499 }
3500 else
3501 {
3502 if (h->dynindx == -1
3503 || htab->elf.splt == NULL
3504 || htab->elf.sgotplt == NULL
3505 || htab->elf.srelplt == NULL)
3506 abort ();
3507
3508 /* Calc. index no.
3509 Current offset - size first entry / entry size. */
3510 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3511
3512 /* Offset in GOT is PLT index plus GOT headers(3) times 8,
3513 addr & GOT addr. */
3514 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3515
3516 /* Fill in the blueprint of a PLT. */
3517 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390x_plt_entry,
3518 PLT_ENTRY_SIZE);
3519
3520 /* Fixup the relative address to the GOT entry */
3521 bfd_put_32 (output_bfd,
3522 (htab->elf.sgotplt->output_section->vma +
3523 htab->elf.sgotplt->output_offset + got_offset
3524 - (htab->elf.splt->output_section->vma +
3525 htab->elf.splt->output_offset +
3526 h->plt.offset))/2,
3527 htab->elf.splt->contents + h->plt.offset + 2);
3528 /* Fixup the relative branch to PLT 0 */
3529 bfd_put_32 (output_bfd, - (PLT_FIRST_ENTRY_SIZE +
3530 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3531 htab->elf.splt->contents + h->plt.offset + 24);
3532 /* Fixup offset into .rela.plt section. */
3533 bfd_put_32 (output_bfd, plt_index * sizeof (Elf64_External_Rela),
3534 htab->elf.splt->contents + h->plt.offset + 28);
3535
3536 /* Fill in the entry in the global offset table.
3537 Points to instruction after GOT offset. */
3538 bfd_put_64 (output_bfd,
3539 (htab->elf.splt->output_section->vma
3540 + htab->elf.splt->output_offset
3541 + h->plt.offset
3542 + 14),
3543 htab->elf.sgotplt->contents + got_offset);
3544
3545 /* Fill in the entry in the .rela.plt section. */
3546 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3547 + htab->elf.sgotplt->output_offset
3548 + got_offset);
3549 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3550 rela.r_addend = 0;
3551 loc = htab->elf.srelplt->contents + plt_index *
3552 sizeof (Elf64_External_Rela);
3553 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3554
3555 if (!h->def_regular)
3556 {
3557 /* Mark the symbol as undefined, rather than as defined in
3558 the .plt section. Leave the value alone. This is a clue
3559 for the dynamic linker, to make function pointer
3560 comparisons work between an application and shared
3561 library. */
3562 sym->st_shndx = SHN_UNDEF;
3563 }
3564 }
3565 }
3566
3567 if (h->got.offset != (bfd_vma) -1
3568 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3569 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3570 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3571 {
3572 Elf_Internal_Rela rela;
3573 bfd_byte *loc;
3574
3575 /* This symbol has an entry in the global offset table. Set it
3576 up. */
3577 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3578 abort ();
3579
3580 rela.r_offset = (htab->elf.sgot->output_section->vma
3581 + htab->elf.sgot->output_offset
3582 + (h->got.offset &~ (bfd_vma) 1));
3583
3584 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3585 {
3586 if (bfd_link_pic (info))
3587 {
3588 /* An explicit GOT slot usage needs GLOB_DAT. If the
3589 symbol references local the implicit got.iplt slot
3590 will be used and the IRELATIVE reloc has been created
3591 above. */
3592 goto do_glob_dat;
3593 }
3594 else
3595 {
3596 /* For non-shared objects explicit GOT slots must be
3597 filled with the PLT slot address for pointer
3598 equality reasons. */
3599 bfd_put_64 (output_bfd, (htab->elf.iplt->output_section->vma
3600 + htab->elf.iplt->output_offset
3601 + h->plt.offset),
3602 htab->elf.sgot->contents + h->got.offset);
3603 return TRUE;
3604 }
3605 }
3606 else if (bfd_link_pic (info)
3607 && SYMBOL_REFERENCES_LOCAL (info, h))
3608 {
3609 /* If this is a static link, or it is a -Bsymbolic link and
3610 the symbol is defined locally or was forced to be local
3611 because of a version file, we just want to emit a
3612 RELATIVE reloc. The entry in the global offset table
3613 will already have been initialized in the
3614 relocate_section function. */
3615 if (!h->def_regular)
3616 return FALSE;
3617 BFD_ASSERT((h->got.offset & 1) != 0);
3618 rela.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
3619 rela.r_addend = (h->root.u.def.value
3620 + h->root.u.def.section->output_section->vma
3621 + h->root.u.def.section->output_offset);
3622 }
3623 else
3624 {
3625 BFD_ASSERT((h->got.offset & 1) == 0);
3626 do_glob_dat:
3627 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3628 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_GLOB_DAT);
3629 rela.r_addend = 0;
3630 }
3631
3632 loc = htab->elf.srelgot->contents;
3633 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
3634 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3635 }
3636
3637 if (h->needs_copy)
3638 {
3639 Elf_Internal_Rela rela;
3640 bfd_byte *loc;
3641
3642 /* This symbols needs a copy reloc. Set it up. */
3643
3644 if (h->dynindx == -1
3645 || (h->root.type != bfd_link_hash_defined
3646 && h->root.type != bfd_link_hash_defweak)
3647 || htab->srelbss == NULL)
3648 abort ();
3649
3650 rela.r_offset = (h->root.u.def.value
3651 + h->root.u.def.section->output_section->vma
3652 + h->root.u.def.section->output_offset);
3653 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_COPY);
3654 rela.r_addend = 0;
3655 loc = htab->srelbss->contents;
3656 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
3657 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3658 }
3659
3660 /* Mark some specially defined symbols as absolute. */
3661 if (h == htab->elf.hdynamic
3662 || h == htab->elf.hgot
3663 || h == htab->elf.hplt)
3664 sym->st_shndx = SHN_ABS;
3665
3666 return TRUE;
3667 }
3668
3669 /* Used to decide how to sort relocs in an optimal manner for the
3670 dynamic linker, before writing them out. */
3671
3672 static enum elf_reloc_type_class
3673 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3674 const asection *rel_sec ATTRIBUTE_UNUSED,
3675 const Elf_Internal_Rela *rela)
3676 {
3677 bfd *abfd = info->output_bfd;
3678 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3679 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3680 unsigned long r_symndx = ELF64_R_SYM (rela->r_info);
3681 Elf_Internal_Sym sym;
3682
3683 if (htab->elf.dynsym == NULL
3684 || !bed->s->swap_symbol_in (abfd,
3685 (htab->elf.dynsym->contents
3686 + r_symndx * bed->s->sizeof_sym),
3687 0, &sym))
3688 abort ();
3689
3690 /* Check relocation against STT_GNU_IFUNC symbol. */
3691 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3692 return reloc_class_ifunc;
3693
3694 switch ((int) ELF64_R_TYPE (rela->r_info))
3695 {
3696 case R_390_RELATIVE:
3697 return reloc_class_relative;
3698 case R_390_JMP_SLOT:
3699 return reloc_class_plt;
3700 case R_390_COPY:
3701 return reloc_class_copy;
3702 default:
3703 return reloc_class_normal;
3704 }
3705 }
3706
3707 /* Finish up the dynamic sections. */
3708
3709 static bfd_boolean
3710 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3711 struct bfd_link_info *info)
3712 {
3713 struct elf_s390_link_hash_table *htab;
3714 bfd *dynobj;
3715 asection *sdyn;
3716 bfd *ibfd;
3717 unsigned int i;
3718
3719 htab = elf_s390_hash_table (info);
3720 if (htab == NULL)
3721 return FALSE;
3722
3723 dynobj = htab->elf.dynobj;
3724 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3725
3726 if (htab->elf.dynamic_sections_created)
3727 {
3728 Elf64_External_Dyn *dyncon, *dynconend;
3729
3730 if (sdyn == NULL || htab->elf.sgot == NULL)
3731 abort ();
3732
3733 dyncon = (Elf64_External_Dyn *) sdyn->contents;
3734 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
3735 for (; dyncon < dynconend; dyncon++)
3736 {
3737 Elf_Internal_Dyn dyn;
3738 asection *s;
3739
3740 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
3741
3742 switch (dyn.d_tag)
3743 {
3744 default:
3745 continue;
3746
3747 case DT_PLTGOT:
3748 s = htab->elf.sgotplt;
3749 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3750 break;
3751
3752 case DT_JMPREL:
3753 s = htab->elf.srelplt;
3754 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3755 break;
3756
3757 case DT_PLTRELSZ:
3758 dyn.d_un.d_val = htab->elf.srelplt->size + htab->elf.irelplt->size;
3759 break;
3760
3761 case DT_RELASZ:
3762 /* The procedure linkage table relocs (DT_JMPREL) should
3763 not be included in the overall relocs (DT_RELA).
3764 Therefore, we override the DT_RELASZ entry here to
3765 make it not include the JMPREL relocs. Since the
3766 linker script arranges for .rela.plt to follow all
3767 other relocation sections, we don't have to worry
3768 about changing the DT_RELA entry. */
3769 dyn.d_un.d_val -= htab->elf.srelplt->size + htab->elf.irelplt->size;
3770 break;
3771 }
3772
3773 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
3774 }
3775
3776 /* Fill in the special first entry in the procedure linkage table. */
3777 if (htab->elf.splt && htab->elf.splt->size > 0)
3778 {
3779 /* fill in blueprint for plt 0 entry */
3780 memcpy (htab->elf.splt->contents, elf_s390x_first_plt_entry,
3781 PLT_FIRST_ENTRY_SIZE);
3782 /* Fixup relative address to start of GOT */
3783 bfd_put_32 (output_bfd,
3784 (htab->elf.sgotplt->output_section->vma
3785 + htab->elf.sgotplt->output_offset
3786 - htab->elf.splt->output_section->vma
3787 - htab->elf.splt->output_offset - 6)/2,
3788 htab->elf.splt->contents + 8);
3789 }
3790 if (elf_section_data (htab->elf.splt->output_section) != NULL)
3791 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
3792 = PLT_ENTRY_SIZE;
3793 }
3794
3795 if (htab->elf.sgotplt)
3796 {
3797 /* Fill in the first three entries in the global offset table. */
3798 if (htab->elf.sgotplt->size > 0)
3799 {
3800 bfd_put_64 (output_bfd,
3801 (sdyn == NULL ? (bfd_vma) 0
3802 : sdyn->output_section->vma + sdyn->output_offset),
3803 htab->elf.sgotplt->contents);
3804 /* One entry for shared object struct ptr. */
3805 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3806 /* One entry for _dl_runtime_resolve. */
3807 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 16);
3808 }
3809
3810 elf_section_data (htab->elf.sgot->output_section)
3811 ->this_hdr.sh_entsize = 8;
3812 }
3813
3814 /* Finish dynamic symbol for local IFUNC symbols. */
3815 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3816 {
3817 struct plt_entry *local_plt;
3818 Elf_Internal_Sym *isym;
3819 Elf_Internal_Shdr *symtab_hdr;
3820
3821 symtab_hdr = &elf_symtab_hdr (ibfd);
3822
3823 local_plt = elf_s390_local_plt (ibfd);
3824 if (local_plt != NULL)
3825 for (i = 0; i < symtab_hdr->sh_info; i++)
3826 {
3827 if (local_plt[i].plt.offset != (bfd_vma) -1)
3828 {
3829 asection *sec = local_plt[i].sec;
3830 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3831 if (isym == NULL)
3832 return FALSE;
3833
3834 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3835 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3836 local_plt[i].plt.offset,
3837 isym->st_value
3838 + sec->output_section->vma
3839 + sec->output_offset);
3840
3841 }
3842 }
3843 }
3844
3845 return TRUE;
3846 }
3847 \f
3848 /* Support for core dump NOTE sections. */
3849
3850 static bfd_boolean
3851 elf_s390_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3852 {
3853 int offset;
3854 size_t size;
3855
3856 switch (note->descsz)
3857 {
3858 default:
3859 return FALSE;
3860
3861 case 336: /* sizeof(struct elf_prstatus) on s390x */
3862 /* pr_cursig */
3863 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3864
3865 /* pr_pid */
3866 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
3867
3868 /* pr_reg */
3869 offset = 112;
3870 size = 216;
3871 break;
3872 }
3873
3874 /* Make a ".reg/999" section. */
3875 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3876 size, note->descpos + offset);
3877 }
3878
3879 static bfd_boolean
3880 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3881 {
3882 switch (note->descsz)
3883 {
3884 default:
3885 return FALSE;
3886
3887 case 136: /* sizeof(struct elf_prpsinfo) on s390x */
3888 elf_tdata (abfd)->core->pid
3889 = bfd_get_32 (abfd, note->descdata + 24);
3890 elf_tdata (abfd)->core->program
3891 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
3892 elf_tdata (abfd)->core->command
3893 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3894 }
3895
3896 /* Note that for some reason, a spurious space is tacked
3897 onto the end of the args in some (at least one anyway)
3898 implementations, so strip it off if it exists. */
3899
3900 {
3901 char *command = elf_tdata (abfd)->core->command;
3902 int n = strlen (command);
3903
3904 if (0 < n && command[n - 1] == ' ')
3905 command[n - 1] = '\0';
3906 }
3907
3908 return TRUE;
3909 }
3910
3911 static char *
3912 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3913 int note_type, ...)
3914 {
3915 va_list ap;
3916
3917 switch (note_type)
3918 {
3919 default:
3920 return NULL;
3921
3922 case NT_PRPSINFO:
3923 {
3924 char data[136] = { 0 };
3925 const char *fname, *psargs;
3926
3927 va_start (ap, note_type);
3928 fname = va_arg (ap, const char *);
3929 psargs = va_arg (ap, const char *);
3930 va_end (ap);
3931
3932 strncpy (data + 40, fname, 16);
3933 strncpy (data + 56, psargs, 80);
3934 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3935 &data, sizeof (data));
3936 }
3937
3938 case NT_PRSTATUS:
3939 {
3940 char data[336] = { 0 };
3941 long pid;
3942 int cursig;
3943 const void *gregs;
3944
3945 va_start (ap, note_type);
3946 pid = va_arg (ap, long);
3947 cursig = va_arg (ap, int);
3948 gregs = va_arg (ap, const void *);
3949 va_end (ap);
3950
3951 bfd_put_16 (abfd, cursig, data + 12);
3952 bfd_put_32 (abfd, pid, data + 32);
3953 memcpy (data + 112, gregs, 216);
3954 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3955 &data, sizeof (data));
3956 }
3957 }
3958 /* NOTREACHED */
3959 }
3960 \f
3961 /* Return address for Ith PLT stub in section PLT, for relocation REL
3962 or (bfd_vma) -1 if it should not be included. */
3963
3964 static bfd_vma
3965 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3966 const arelent *rel ATTRIBUTE_UNUSED)
3967 {
3968 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3969 }
3970
3971 /* Merge backend specific data from an object file to the output
3972 object file when linking. */
3973
3974 static bfd_boolean
3975 elf64_s390_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
3976 {
3977 if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
3978 return TRUE;
3979
3980 if (!elf_s390_merge_obj_attributes (ibfd, obfd))
3981 return FALSE;
3982
3983 return TRUE;
3984 }
3985
3986 /* Why was the hash table entry size definition changed from
3987 ARCH_SIZE/8 to 4? This breaks the 64 bit dynamic linker and
3988 this is the only reason for the s390_elf64_size_info structure. */
3989
3990 const struct elf_size_info s390_elf64_size_info =
3991 {
3992 sizeof (Elf64_External_Ehdr),
3993 sizeof (Elf64_External_Phdr),
3994 sizeof (Elf64_External_Shdr),
3995 sizeof (Elf64_External_Rel),
3996 sizeof (Elf64_External_Rela),
3997 sizeof (Elf64_External_Sym),
3998 sizeof (Elf64_External_Dyn),
3999 sizeof (Elf_External_Note),
4000 8, /* hash-table entry size. */
4001 1, /* internal relocations per external relocations. */
4002 64, /* arch_size. */
4003 3, /* log_file_align. */
4004 ELFCLASS64, EV_CURRENT,
4005 bfd_elf64_write_out_phdrs,
4006 bfd_elf64_write_shdrs_and_ehdr,
4007 bfd_elf64_checksum_contents,
4008 bfd_elf64_write_relocs,
4009 bfd_elf64_swap_symbol_in,
4010 bfd_elf64_swap_symbol_out,
4011 bfd_elf64_slurp_reloc_table,
4012 bfd_elf64_slurp_symbol_table,
4013 bfd_elf64_swap_dyn_in,
4014 bfd_elf64_swap_dyn_out,
4015 bfd_elf64_swap_reloc_in,
4016 bfd_elf64_swap_reloc_out,
4017 bfd_elf64_swap_reloca_in,
4018 bfd_elf64_swap_reloca_out
4019 };
4020
4021 #define TARGET_BIG_SYM s390_elf64_vec
4022 #define TARGET_BIG_NAME "elf64-s390"
4023 #define ELF_ARCH bfd_arch_s390
4024 #define ELF_TARGET_ID S390_ELF_DATA
4025 #define ELF_MACHINE_CODE EM_S390
4026 #define ELF_MACHINE_ALT1 EM_S390_OLD
4027 #define ELF_MAXPAGESIZE 0x1000
4028
4029 #define elf_backend_size_info s390_elf64_size_info
4030
4031 #define elf_backend_can_gc_sections 1
4032 #define elf_backend_can_refcount 1
4033 #define elf_backend_want_got_plt 1
4034 #define elf_backend_plt_readonly 1
4035 #define elf_backend_want_plt_sym 0
4036 #define elf_backend_got_header_size 24
4037 #define elf_backend_rela_normal 1
4038
4039 #define elf_info_to_howto elf_s390_info_to_howto
4040
4041 #define bfd_elf64_bfd_is_local_label_name elf_s390_is_local_label_name
4042 #define bfd_elf64_bfd_link_hash_table_create elf_s390_link_hash_table_create
4043 #define bfd_elf64_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
4044 #define bfd_elf64_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4045 #define bfd_elf64_bfd_merge_private_bfd_data elf64_s390_merge_private_bfd_data
4046
4047 #define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
4048 #define elf_backend_check_relocs elf_s390_check_relocs
4049 #define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
4050 #define elf_backend_create_dynamic_sections elf_s390_create_dynamic_sections
4051 #define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4052 #define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
4053 #define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
4054 #define elf_backend_gc_sweep_hook elf_s390_gc_sweep_hook
4055 #define elf_backend_reloc_type_class elf_s390_reloc_type_class
4056 #define elf_backend_relocate_section elf_s390_relocate_section
4057 #define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
4058 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4059 #define elf_backend_grok_prstatus elf_s390_grok_prstatus
4060 #define elf_backend_grok_psinfo elf_s390_grok_psinfo
4061 #define elf_backend_write_core_note elf_s390_write_core_note
4062 #define elf_backend_plt_sym_val elf_s390_plt_sym_val
4063 #define elf_backend_add_symbol_hook elf_s390_add_symbol_hook
4064 #define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
4065
4066 #define bfd_elf64_mkobject elf_s390_mkobject
4067 #define elf_backend_object_p elf_s390_object_p
4068
4069 #include "elf64-target.h"
This page took 0.116983 seconds and 4 git commands to generate.