]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf64-s390.c
-Wimplicit-fallthrough warning fixes
[thirdparty/binutils-gdb.git] / bfd / elf64-s390.c
CommitLineData
a85d7ed0 1/* IBM S/390-specific support for 64-bit ELF
6f2750fe 2 Copyright (C) 2000-2016 Free Software Foundation, Inc.
a85d7ed0
NC
3 Contributed Martin Schwidefsky (schwidefsky@de.ibm.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
a85d7ed0
NC
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
3e110533 19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
53e09e0a 20 02110-1301, USA. */
a85d7ed0 21
a85d7ed0 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
a85d7ed0
NC
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
a85d7ed0 27#include "elf/s390.h"
e3e9290d 28#include <stdarg.h>
a85d7ed0
NC
29
30/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
31 from smaller values. Start with zero, widen, *then* decrement. */
32#define MINUS_ONE (((bfd_vma)0) - 1)
33
2c3fc389
NC
34static bfd_reloc_status_type
35s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
36 asection *, bfd *, char **);
37static bfd_reloc_status_type
38s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
39 asection *, bfd *, char **);
40
a85d7ed0
NC
41/* The relocation "howto" table. */
42static reloc_howto_type elf_howto_table[] =
43{
44 HOWTO (R_390_NONE, /* type */
45 0, /* rightshift */
6346d5ca 46 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
a85d7ed0 47 0, /* bitsize */
b34976b6 48 FALSE, /* pc_relative */
a85d7ed0
NC
49 0, /* bitpos */
50 complain_overflow_dont, /* complain_on_overflow */
51 bfd_elf_generic_reloc, /* special_function */
52 "R_390_NONE", /* name */
b34976b6 53 FALSE, /* partial_inplace */
a85d7ed0
NC
54 0, /* src_mask */
55 0, /* dst_mask */
b34976b6
AM
56 FALSE), /* pcrel_offset */
57
5236c819
MS
58 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
60 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
61 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
62 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
63 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
64 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
65 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
66 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
67 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
15f8604d 68 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
5236c819
MS
69 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
70 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
71 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
72 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
73 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
74 HOWTO(R_390_COPY, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
75 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,MINUS_ONE, FALSE),
76 HOWTO(R_390_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
77 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,MINUS_ONE, FALSE),
78 HOWTO(R_390_JMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
79 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,MINUS_ONE, FALSE),
80 HOWTO(R_390_RELATIVE, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
81 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,MINUS_ONE, FALSE),
82 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,MINUS_ONE, FALSE),
84 HOWTO(R_390_GOTPC, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,MINUS_ONE, TRUE),
86 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
88 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
89 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
90 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
91 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
92 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
93 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
94 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
95 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
96 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
97 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
98 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
99 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,MINUS_ONE, TRUE),
100 HOWTO(R_390_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
101 bfd_elf_generic_reloc, "R_390_64", FALSE, 0,MINUS_ONE, FALSE),
102 HOWTO(R_390_PC64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
103 bfd_elf_generic_reloc, "R_390_PC64", FALSE, 0,MINUS_ONE, TRUE),
104 HOWTO(R_390_GOT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
105 bfd_elf_generic_reloc, "R_390_GOT64", FALSE, 0,MINUS_ONE, FALSE),
106 HOWTO(R_390_PLT64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
107 bfd_elf_generic_reloc, "R_390_PLT64", FALSE, 0,MINUS_ONE, TRUE),
108 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
109 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,MINUS_ONE, TRUE),
110 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
112 HOWTO(R_390_GOTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
113 bfd_elf_generic_reloc, "R_390_GOTOFF64", FALSE, 0,MINUS_ONE, FALSE),
114 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
116 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
117 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
118 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
119 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
120 HOWTO(R_390_GOTPLT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
121 bfd_elf_generic_reloc, "R_390_GOTPLT64", FALSE, 0,MINUS_ONE, FALSE),
122 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
123 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,MINUS_ONE, TRUE),
124 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
125 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
126 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
128 HOWTO(R_390_PLTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
129 bfd_elf_generic_reloc, "R_390_PLTOFF64", FALSE, 0,MINUS_ONE, FALSE),
69fc87f1
MS
130 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
131 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
132 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
133 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
134 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
135 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
136 EMPTY_HOWTO (R_390_TLS_GD32), /* Empty entry for R_390_TLS_GD32. */
137 HOWTO(R_390_TLS_GD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_GD64", FALSE, 0, MINUS_ONE, FALSE),
139 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
140 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
141 EMPTY_HOWTO (R_390_TLS_GOTIE32), /* Empty entry for R_390_TLS_GOTIE32. */
142 HOWTO(R_390_TLS_GOTIE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_GOTIE64", FALSE, 0, MINUS_ONE, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LDM32), /* Empty entry for R_390_TLS_LDM32. */
145 HOWTO(R_390_TLS_LDM64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDM64", FALSE, 0, MINUS_ONE, FALSE),
147 EMPTY_HOWTO (R_390_TLS_IE32), /* Empty entry for R_390_TLS_IE32. */
148 HOWTO(R_390_TLS_IE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_IE64", FALSE, 0, MINUS_ONE, FALSE),
150 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, MINUS_ONE, TRUE),
152 EMPTY_HOWTO (R_390_TLS_LE32), /* Empty entry for R_390_TLS_LE32. */
153 HOWTO(R_390_TLS_LE64, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
154 bfd_elf_generic_reloc, "R_390_TLS_LE64", FALSE, 0, MINUS_ONE, FALSE),
155 EMPTY_HOWTO (R_390_TLS_LDO32), /* Empty entry for R_390_TLS_LDO32. */
156 HOWTO(R_390_TLS_LDO64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
157 bfd_elf_generic_reloc, "R_390_TLS_LDO64", FALSE, 0, MINUS_ONE, FALSE),
158 HOWTO(R_390_TLS_DTPMOD, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
159 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, MINUS_ONE, FALSE),
160 HOWTO(R_390_TLS_DTPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
161 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, MINUS_ONE, FALSE),
162 HOWTO(R_390_TLS_TPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, MINUS_ONE, FALSE),
bd1ea41b
MS
164 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
165 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
166 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
167 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
168 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
169 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
170 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
171 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
470b557a
AK
172 HOWTO(R_390_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
173 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, MINUS_ONE, FALSE),
fb798c50
AK
174 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
175 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
176 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
177 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
178 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
179 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
180 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
181 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
a85d7ed0
NC
182};
183
184/* GNU extension to record C++ vtable hierarchy. */
185static reloc_howto_type elf64_s390_vtinherit_howto =
b34976b6 186 HOWTO (R_390_GNU_VTINHERIT, 0,4,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
a85d7ed0 187static reloc_howto_type elf64_s390_vtentry_howto =
b34976b6 188 HOWTO (R_390_GNU_VTENTRY, 0,4,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
a85d7ed0
NC
189
190static reloc_howto_type *
2c3fc389
NC
191elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
192 bfd_reloc_code_real_type code)
a85d7ed0 193{
0451c93c
MS
194 switch (code)
195 {
196 case BFD_RELOC_NONE:
197 return &elf_howto_table[(int) R_390_NONE];
198 case BFD_RELOC_8:
199 return &elf_howto_table[(int) R_390_8];
200 case BFD_RELOC_390_12:
201 return &elf_howto_table[(int) R_390_12];
202 case BFD_RELOC_16:
203 return &elf_howto_table[(int) R_390_16];
204 case BFD_RELOC_32:
205 return &elf_howto_table[(int) R_390_32];
206 case BFD_RELOC_CTOR:
207 return &elf_howto_table[(int) R_390_32];
208 case BFD_RELOC_32_PCREL:
209 return &elf_howto_table[(int) R_390_PC32];
210 case BFD_RELOC_390_GOT12:
211 return &elf_howto_table[(int) R_390_GOT12];
212 case BFD_RELOC_32_GOT_PCREL:
213 return &elf_howto_table[(int) R_390_GOT32];
214 case BFD_RELOC_390_PLT32:
215 return &elf_howto_table[(int) R_390_PLT32];
216 case BFD_RELOC_390_COPY:
217 return &elf_howto_table[(int) R_390_COPY];
218 case BFD_RELOC_390_GLOB_DAT:
219 return &elf_howto_table[(int) R_390_GLOB_DAT];
220 case BFD_RELOC_390_JMP_SLOT:
221 return &elf_howto_table[(int) R_390_JMP_SLOT];
222 case BFD_RELOC_390_RELATIVE:
223 return &elf_howto_table[(int) R_390_RELATIVE];
224 case BFD_RELOC_32_GOTOFF:
5236c819 225 return &elf_howto_table[(int) R_390_GOTOFF32];
0451c93c
MS
226 case BFD_RELOC_390_GOTPC:
227 return &elf_howto_table[(int) R_390_GOTPC];
228 case BFD_RELOC_390_GOT16:
229 return &elf_howto_table[(int) R_390_GOT16];
230 case BFD_RELOC_16_PCREL:
231 return &elf_howto_table[(int) R_390_PC16];
fb798c50
AK
232 case BFD_RELOC_390_PC12DBL:
233 return &elf_howto_table[(int) R_390_PC12DBL];
234 case BFD_RELOC_390_PLT12DBL:
235 return &elf_howto_table[(int) R_390_PLT12DBL];
0451c93c
MS
236 case BFD_RELOC_390_PC16DBL:
237 return &elf_howto_table[(int) R_390_PC16DBL];
238 case BFD_RELOC_390_PLT16DBL:
239 return &elf_howto_table[(int) R_390_PLT16DBL];
fb798c50
AK
240 case BFD_RELOC_390_PC24DBL:
241 return &elf_howto_table[(int) R_390_PC24DBL];
242 case BFD_RELOC_390_PLT24DBL:
243 return &elf_howto_table[(int) R_390_PLT24DBL];
0451c93c
MS
244 case BFD_RELOC_390_PC32DBL:
245 return &elf_howto_table[(int) R_390_PC32DBL];
246 case BFD_RELOC_390_PLT32DBL:
247 return &elf_howto_table[(int) R_390_PLT32DBL];
248 case BFD_RELOC_390_GOTPCDBL:
249 return &elf_howto_table[(int) R_390_GOTPCDBL];
250 case BFD_RELOC_64:
251 return &elf_howto_table[(int) R_390_64];
252 case BFD_RELOC_64_PCREL:
253 return &elf_howto_table[(int) R_390_PC64];
254 case BFD_RELOC_390_GOT64:
255 return &elf_howto_table[(int) R_390_GOT64];
256 case BFD_RELOC_390_PLT64:
257 return &elf_howto_table[(int) R_390_PLT64];
258 case BFD_RELOC_390_GOTENT:
259 return &elf_howto_table[(int) R_390_GOTENT];
5236c819
MS
260 case BFD_RELOC_16_GOTOFF:
261 return &elf_howto_table[(int) R_390_GOTOFF16];
262 case BFD_RELOC_390_GOTOFF64:
263 return &elf_howto_table[(int) R_390_GOTOFF64];
264 case BFD_RELOC_390_GOTPLT12:
265 return &elf_howto_table[(int) R_390_GOTPLT12];
266 case BFD_RELOC_390_GOTPLT16:
267 return &elf_howto_table[(int) R_390_GOTPLT16];
268 case BFD_RELOC_390_GOTPLT32:
269 return &elf_howto_table[(int) R_390_GOTPLT32];
270 case BFD_RELOC_390_GOTPLT64:
271 return &elf_howto_table[(int) R_390_GOTPLT64];
272 case BFD_RELOC_390_GOTPLTENT:
273 return &elf_howto_table[(int) R_390_GOTPLTENT];
274 case BFD_RELOC_390_PLTOFF16:
275 return &elf_howto_table[(int) R_390_PLTOFF16];
276 case BFD_RELOC_390_PLTOFF32:
277 return &elf_howto_table[(int) R_390_PLTOFF32];
278 case BFD_RELOC_390_PLTOFF64:
279 return &elf_howto_table[(int) R_390_PLTOFF64];
69fc87f1
MS
280 case BFD_RELOC_390_TLS_LOAD:
281 return &elf_howto_table[(int) R_390_TLS_LOAD];
282 case BFD_RELOC_390_TLS_GDCALL:
283 return &elf_howto_table[(int) R_390_TLS_GDCALL];
284 case BFD_RELOC_390_TLS_LDCALL:
285 return &elf_howto_table[(int) R_390_TLS_LDCALL];
286 case BFD_RELOC_390_TLS_GD64:
287 return &elf_howto_table[(int) R_390_TLS_GD64];
288 case BFD_RELOC_390_TLS_GOTIE12:
289 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
290 case BFD_RELOC_390_TLS_GOTIE64:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE64];
292 case BFD_RELOC_390_TLS_LDM64:
293 return &elf_howto_table[(int) R_390_TLS_LDM64];
294 case BFD_RELOC_390_TLS_IE64:
295 return &elf_howto_table[(int) R_390_TLS_IE64];
296 case BFD_RELOC_390_TLS_IEENT:
297 return &elf_howto_table[(int) R_390_TLS_IEENT];
298 case BFD_RELOC_390_TLS_LE64:
299 return &elf_howto_table[(int) R_390_TLS_LE64];
300 case BFD_RELOC_390_TLS_LDO64:
301 return &elf_howto_table[(int) R_390_TLS_LDO64];
302 case BFD_RELOC_390_TLS_DTPMOD:
303 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
304 case BFD_RELOC_390_TLS_DTPOFF:
305 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
306 case BFD_RELOC_390_TLS_TPOFF:
307 return &elf_howto_table[(int) R_390_TLS_TPOFF];
bd1ea41b
MS
308 case BFD_RELOC_390_20:
309 return &elf_howto_table[(int) R_390_20];
310 case BFD_RELOC_390_GOT20:
311 return &elf_howto_table[(int) R_390_GOT20];
312 case BFD_RELOC_390_GOTPLT20:
313 return &elf_howto_table[(int) R_390_GOTPLT20];
314 case BFD_RELOC_390_TLS_GOTIE20:
315 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
470b557a
AK
316 case BFD_RELOC_390_IRELATIVE:
317 return &elf_howto_table[(int) R_390_IRELATIVE];
5236c819
MS
318 case BFD_RELOC_VTABLE_INHERIT:
319 return &elf64_s390_vtinherit_howto;
320 case BFD_RELOC_VTABLE_ENTRY:
321 return &elf64_s390_vtentry_howto;
0451c93c
MS
322 default:
323 break;
324 }
a85d7ed0
NC
325 return 0;
326}
327
157090f7
AM
328static reloc_howto_type *
329elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
330 const char *r_name)
331{
332 unsigned int i;
333
334 for (i = 0;
335 i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]);
336 i++)
337 if (elf_howto_table[i].name != NULL
338 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
339 return &elf_howto_table[i];
340
0bc7245a
JK
341 if (strcasecmp (elf64_s390_vtinherit_howto.name, r_name) == 0)
342 return &elf64_s390_vtinherit_howto;
343 if (strcasecmp (elf64_s390_vtentry_howto.name, r_name) == 0)
344 return &elf64_s390_vtentry_howto;
157090f7
AM
345
346 return NULL;
347}
348
a85d7ed0
NC
349/* We need to use ELF64_R_TYPE so we have our own copy of this function,
350 and elf64-s390.c has its own copy. */
351
352static void
2c3fc389
NC
353elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
354 arelent *cache_ptr,
355 Elf_Internal_Rela *dst)
a85d7ed0 356{
d0fb9a8d
JJ
357 unsigned int r_type = ELF64_R_TYPE(dst->r_info);
358 switch (r_type)
a85d7ed0
NC
359 {
360 case R_390_GNU_VTINHERIT:
361 cache_ptr->howto = &elf64_s390_vtinherit_howto;
362 break;
363
364 case R_390_GNU_VTENTRY:
365 cache_ptr->howto = &elf64_s390_vtentry_howto;
366 break;
367
368 default:
d0fb9a8d
JJ
369 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
370 {
4eca0228
AM
371 _bfd_error_handler (_("%B: invalid relocation type %d"),
372 abfd, (int) r_type);
d0fb9a8d
JJ
373 r_type = R_390_NONE;
374 }
375 cache_ptr->howto = &elf_howto_table[r_type];
99c79b2e 376 }
a85d7ed0
NC
377}
378
69fc87f1
MS
379/* A relocation function which doesn't do anything. */
380static bfd_reloc_status_type
2c3fc389
NC
381s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
382 arelent *reloc_entry,
383 asymbol *symbol ATTRIBUTE_UNUSED,
384 void * data ATTRIBUTE_UNUSED,
385 asection *input_section,
386 bfd *output_bfd,
387 char **error_message ATTRIBUTE_UNUSED)
69fc87f1
MS
388{
389 if (output_bfd)
390 reloc_entry->address += input_section->output_offset;
391 return bfd_reloc_ok;
392}
393
bd1ea41b
MS
394/* Handle the large displacement relocs. */
395static bfd_reloc_status_type
2c3fc389
NC
396s390_elf_ldisp_reloc (bfd *abfd,
397 arelent *reloc_entry,
398 asymbol *symbol,
399 void * data,
400 asection *input_section,
401 bfd *output_bfd,
402 char **error_message ATTRIBUTE_UNUSED)
bd1ea41b
MS
403{
404 reloc_howto_type *howto = reloc_entry->howto;
405 bfd_vma relocation;
406 bfd_vma insn;
407
408 if (output_bfd != (bfd *) NULL
409 && (symbol->flags & BSF_SECTION_SYM) == 0
410 && (! howto->partial_inplace
411 || reloc_entry->addend == 0))
412 {
413 reloc_entry->address += input_section->output_offset;
414 return bfd_reloc_ok;
415 }
416 if (output_bfd != NULL)
417 return bfd_reloc_continue;
418
07515404 419 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
bd1ea41b
MS
420 return bfd_reloc_outofrange;
421
422 relocation = (symbol->value
423 + symbol->section->output_section->vma
424 + symbol->section->output_offset);
425 relocation += reloc_entry->addend;
426 if (howto->pc_relative)
427 {
428 relocation -= (input_section->output_section->vma
429 + input_section->output_offset);
430 relocation -= reloc_entry->address;
431 }
432
68ffbac6 433 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
bd1ea41b
MS
434 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
435 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
436
437 if ((bfd_signed_vma) relocation < - 0x80000
438 || (bfd_signed_vma) relocation > 0x7ffff)
439 return bfd_reloc_overflow;
440 else
441 return bfd_reloc_ok;
442}
443
b34976b6 444static bfd_boolean
2c3fc389 445elf_s390_is_local_label_name (bfd *abfd, const char *name)
a85d7ed0
NC
446{
447 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
b34976b6 448 return TRUE;
a85d7ed0
NC
449
450 return _bfd_elf_is_local_label_name (abfd, name);
451}
452
453/* Functions for the 390 ELF linker. */
454
455/* The name of the dynamic interpreter. This is put in the .interp
456 section. */
457
87049b0d 458#define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
a85d7ed0 459
64285810
MS
460/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
461 copying dynamic variables from a shared lib into an app's dynbss
462 section, and instead use a dynamic relocation to point into the
463 shared lib. */
464#define ELIMINATE_COPY_RELOCS 1
465
a85d7ed0
NC
466/* The size in bytes of the first entry in the procedure linkage table. */
467#define PLT_FIRST_ENTRY_SIZE 32
468/* The size in bytes of an entry in the procedure linkage table. */
99c79b2e 469#define PLT_ENTRY_SIZE 32
a85d7ed0
NC
470
471#define GOT_ENTRY_SIZE 8
472
470b557a
AK
473#define RELA_ENTRY_SIZE sizeof (Elf64_External_Rela)
474
a85d7ed0
NC
475/* The first three entries in a procedure linkage table are reserved,
476 and the initial contents are unimportant (we zero them out).
477 Subsequent entries look like this. See the SVR4 ABI 386
478 supplement to see how this works. */
479
480/* For the s390, simple addr offset can only be 0 - 4096.
481 To use the full 16777216 TB address space, several instructions
482 are needed to load an address in a register and execute
483 a branch( or just saving the address)
484
99c79b2e 485 Furthermore, only r 0 and 1 are free to use!!! */
a85d7ed0
NC
486
487/* The first 3 words in the GOT are then reserved.
488 Word 0 is the address of the dynamic table.
489 Word 1 is a pointer to a structure describing the object
490 Word 2 is used to point to the loader entry address.
491
492 The code for PLT entries looks like this:
493
494 The GOT holds the address in the PLT to be executed.
495 The loader then gets:
3b67f094
MK
496 48(15) = Pointer to the structure describing the object.
497 56(15) = Offset in symbol table
a85d7ed0
NC
498 The loader must then find the module where the function is
499 and insert the address in the GOT.
500
501 PLT1: LARL 1,<fn>@GOTENT # 6 bytes Load address of GOT entry in r1
502 LG 1,0(1) # 6 bytes Load address from GOT in r1
503 BCR 15,1 # 2 bytes Jump to address
504 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
505 LGF 1,12(1) # 6 bytes Load offset in symbl table in r1
506 BRCL 15,-x # 6 bytes Jump to start of PLT
a7e28bbe 507 .long ? # 4 bytes offset into .rela.plt
a85d7ed0
NC
508
509 Total = 32 bytes per PLT entry
510 Fixup at offset 2: relative address to GOT entry
511 Fixup at offset 22: relative branch to PLT0
a7e28bbe 512 Fixup at offset 28: 32 bit offset into .rela.plt
a85d7ed0 513
a7e28bbe
AK
514 A 32 bit offset into the symbol table is enough. It allows for
515 .rela.plt sections up to a size of 2 gigabyte. A single dynamic
516 object (the main program, any shared library) is limited to 4GB in
517 size. Having a .rela.plt of 2GB would already make the .plt
518 section bigger than 8GB. */
a85d7ed0 519
9aa17453
AK
520static const bfd_byte elf_s390x_plt_entry[PLT_ENTRY_SIZE] =
521 {
522 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
523 0xe3, 0x10, 0x10, 0x00, 0x00, 0x04, /* lg %r1,0(%r1) */
524 0x07, 0xf1, /* br %r1 */
525 0x0d, 0x10, /* basr %r1,%r0 */
526 0xe3, 0x10, 0x10, 0x0c, 0x00, 0x14, /* lgf %r1,12(%r1) */
527 0xc0, 0xf4, 0x00, 0x00, 0x00, 0x00, /* jg first plt */
528 0x00, 0x00, 0x00, 0x00 /* .long 0x00000000 */
529 };
a85d7ed0
NC
530
531/* The first PLT entry pushes the offset into the symbol table
a7e28bbe
AK
532 from R1 onto the stack at 56(15) and the loader object info
533 at 48(15), loads the loader address in R1 and jumps to it. */
a85d7ed0
NC
534
535/* The first entry in the PLT:
536
537 PLT0:
538 STG 1,56(15) # r1 contains the offset into the symbol table
539 LARL 1,_GLOBAL_OFFSET_TABLE # load address of global offset table
540 MVC 48(8,15),8(1) # move loader ino (object struct address) to stack
541 LG 1,16(1) # get entry address of loader
542 BCR 15,1 # jump to loader
543
544 Fixup at offset 8: relative address to start of GOT. */
545
9aa17453
AK
546static const bfd_byte elf_s390x_first_plt_entry[PLT_FIRST_ENTRY_SIZE] =
547 {
548 0xe3, 0x10, 0xf0, 0x38, 0x00, 0x24, /* stg %r1,56(%r15) */
549 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
550 0xd2, 0x07, 0xf0, 0x30, 0x10, 0x08, /* mvc 48(8,%r15),8(%r1) */
551 0xe3, 0x10, 0x10, 0x10, 0x00, 0x04, /* lg %r1,16(%r1) */
552 0x07, 0xf1, /* br %r1 */
553 0x07, 0x00, /* nopr %r0 */
554 0x07, 0x00, /* nopr %r0 */
555 0x07, 0x00 /* nopr %r0 */
556 };
a85d7ed0 557
a85d7ed0
NC
558
559/* s390 ELF linker hash entry. */
560
561struct elf_s390_link_hash_entry
562{
0451c93c 563 struct elf_link_hash_entry elf;
a85d7ed0 564
0451c93c 565 /* Track dynamic relocs copied for this symbol. */
00d8c7a9 566 struct elf_dyn_relocs *dyn_relocs;
5236c819
MS
567
568 /* Number of GOTPLT references for a function. */
569 bfd_signed_vma gotplt_refcount;
69fc87f1
MS
570
571#define GOT_UNKNOWN 0
572#define GOT_NORMAL 1
573#define GOT_TLS_GD 2
574#define GOT_TLS_IE 3
575#define GOT_TLS_IE_NLT 3
576 unsigned char tls_type;
470b557a
AK
577
578 /* For pointer equality reasons we might need to change the symbol
579 type from STT_GNU_IFUNC to STT_FUNC together with its value and
580 section entry. So after alloc_dynrelocs only these values should
581 be used. In order to check whether a symbol is IFUNC use
582 s390_is_ifunc_symbol_p. */
583 bfd_vma ifunc_resolver_address;
584 asection *ifunc_resolver_section;
a85d7ed0
NC
585};
586
69fc87f1
MS
587#define elf_s390_hash_entry(ent) \
588 ((struct elf_s390_link_hash_entry *)(ent))
589
470b557a
AK
590/* This structure represents an entry in the local PLT list needed for
591 local IFUNC symbols. */
592struct plt_entry
593{
594 /* The section of the local symbol.
595 Set in relocate_section and used in finish_dynamic_sections. */
596 asection *sec;
597
598 union
599 {
600 bfd_signed_vma refcount;
601 bfd_vma offset;
602 } plt;
603};
604
0ffa91dd
NC
605/* NOTE: Keep this structure in sync with
606 the one declared in elf32-s390.c. */
69fc87f1
MS
607struct elf_s390_obj_tdata
608{
609 struct elf_obj_tdata root;
610
470b557a
AK
611 /* A local PLT is needed for ifunc symbols. */
612 struct plt_entry *local_plt;
613
0ffa91dd 614 /* TLS type for each local got entry. */
69fc87f1
MS
615 char *local_got_tls_type;
616};
617
618#define elf_s390_tdata(abfd) \
619 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
620
470b557a
AK
621#define elf_s390_local_plt(abfd) \
622 (elf_s390_tdata (abfd)->local_plt)
623
69fc87f1
MS
624#define elf_s390_local_got_tls_type(abfd) \
625 (elf_s390_tdata (abfd)->local_got_tls_type)
626
0ffa91dd
NC
627#define is_s390_elf(bfd) \
628 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
629 && elf_tdata (bfd) != NULL \
4dfe6ac6 630 && elf_object_id (bfd) == S390_ELF_DATA)
0ffa91dd 631
69fc87f1 632static bfd_boolean
62d7a5f6 633elf_s390_mkobject (bfd *abfd)
69fc87f1 634{
0ffa91dd 635 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
4dfe6ac6 636 S390_ELF_DATA);
69fc87f1
MS
637}
638
639static bfd_boolean
2c3fc389 640elf_s390_object_p (bfd *abfd)
69fc87f1 641{
69fc87f1
MS
642 /* Set the right machine number for an s390 elf32 file. */
643 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_64);
644}
645
a85d7ed0
NC
646/* s390 ELF linker hash table. */
647
648struct elf_s390_link_hash_table
649{
0451c93c 650 struct elf_link_hash_table elf;
a85d7ed0 651
0451c93c 652 /* Short-cuts to get to dynamic linker sections. */
0451c93c
MS
653 asection *sdynbss;
654 asection *srelbss;
470b557a 655 asection *irelifunc;
ec338859 656
69fc87f1
MS
657 union {
658 bfd_signed_vma refcount;
659 bfd_vma offset;
660 } tls_ldm_got;
661
87d72d41
AM
662 /* Small local sym cache. */
663 struct sym_cache sym_cache;
0451c93c 664};
a85d7ed0
NC
665
666/* Get the s390 ELF linker hash table from a link_info structure. */
667
ceada896
AA
668#define elf_s390_hash_table(p) \
669 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
670 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
a85d7ed0 671
470b557a
AK
672#define ELF64 1
673#include "elf-s390-common.c"
674
a85d7ed0
NC
675/* Create an entry in an s390 ELF linker hash table. */
676
677static struct bfd_hash_entry *
2c3fc389
NC
678link_hash_newfunc (struct bfd_hash_entry *entry,
679 struct bfd_hash_table *table,
680 const char *string)
a85d7ed0 681{
a85d7ed0
NC
682 /* Allocate the structure if it has not already been allocated by a
683 subclass. */
0451c93c
MS
684 if (entry == NULL)
685 {
686 entry = bfd_hash_allocate (table,
687 sizeof (struct elf_s390_link_hash_entry));
688 if (entry == NULL)
689 return entry;
690 }
a85d7ed0
NC
691
692 /* Call the allocation method of the superclass. */
0451c93c
MS
693 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
694 if (entry != NULL)
a85d7ed0 695 {
0451c93c
MS
696 struct elf_s390_link_hash_entry *eh;
697
698 eh = (struct elf_s390_link_hash_entry *) entry;
699 eh->dyn_relocs = NULL;
5236c819 700 eh->gotplt_refcount = 0;
69fc87f1 701 eh->tls_type = GOT_UNKNOWN;
470b557a
AK
702 eh->ifunc_resolver_address = 0;
703 eh->ifunc_resolver_section = NULL;
a85d7ed0
NC
704 }
705
0451c93c 706 return entry;
a85d7ed0
NC
707}
708
709/* Create an s390 ELF linker hash table. */
710
711static struct bfd_link_hash_table *
2c3fc389 712elf_s390_link_hash_table_create (bfd *abfd)
a85d7ed0
NC
713{
714 struct elf_s390_link_hash_table *ret;
dc810e39 715 bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
a85d7ed0 716
7bf52ea2 717 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
0451c93c 718 if (ret == NULL)
a85d7ed0
NC
719 return NULL;
720
66eb6687 721 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
722 sizeof (struct elf_s390_link_hash_entry),
723 S390_ELF_DATA))
a85d7ed0 724 {
e2d34d7d 725 free (ret);
a85d7ed0
NC
726 return NULL;
727 }
728
0451c93c
MS
729 return &ret->elf.root;
730}
731
732/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
733 shortcuts to them in our hash table. */
734
b34976b6 735static bfd_boolean
4dfe6ac6
NC
736create_got_section (bfd *dynobj,
737 struct bfd_link_info *info)
0451c93c
MS
738{
739 struct elf_s390_link_hash_table *htab;
740
741 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 742 return FALSE;
0451c93c
MS
743
744 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
745 if (htab == NULL)
746 return FALSE;
747
3d4d4302
AM
748 htab->elf.sgot = bfd_get_linker_section (dynobj, ".got");
749 htab->elf.sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
750 htab->elf.srelgot = bfd_get_linker_section (dynobj, ".rela.got");
f41345a7 751 if (!htab->elf.sgot || !htab->elf.sgotplt || !htab->elf.srelgot)
0451c93c 752 abort ();
b34976b6 753 return TRUE;
0451c93c
MS
754}
755
756/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
757 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
758 hash table. */
759
b34976b6 760static bfd_boolean
4dfe6ac6
NC
761elf_s390_create_dynamic_sections (bfd *dynobj,
762 struct bfd_link_info *info)
0451c93c
MS
763{
764 struct elf_s390_link_hash_table *htab;
765
766 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
767 if (htab == NULL)
768 return FALSE;
769
f41345a7 770 if (!htab->elf.sgot && !create_got_section (dynobj, info))
b34976b6 771 return FALSE;
0451c93c
MS
772
773 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 774 return FALSE;
0451c93c 775
3d4d4302
AM
776 htab->elf.splt = bfd_get_linker_section (dynobj, ".plt");
777 htab->elf.srelplt = bfd_get_linker_section (dynobj, ".rela.plt");
778 htab->sdynbss = bfd_get_linker_section (dynobj, ".dynbss");
0e1862bb 779 if (!bfd_link_pic (info))
3d4d4302 780 htab->srelbss = bfd_get_linker_section (dynobj, ".rela.bss");
0451c93c 781
f41345a7 782 if (!htab->elf.splt || !htab->elf.srelplt || !htab->sdynbss
0e1862bb 783 || (!bfd_link_pic (info) && !htab->srelbss))
0451c93c
MS
784 abort ();
785
b34976b6 786 return TRUE;
a85d7ed0
NC
787}
788
0451c93c
MS
789/* Copy the extra info we tack onto an elf_link_hash_entry. */
790
791static void
2c3fc389
NC
792elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
793 struct elf_link_hash_entry *dir,
794 struct elf_link_hash_entry *ind)
0451c93c
MS
795{
796 struct elf_s390_link_hash_entry *edir, *eind;
797
798 edir = (struct elf_s390_link_hash_entry *) dir;
799 eind = (struct elf_s390_link_hash_entry *) ind;
800
801 if (eind->dyn_relocs != NULL)
802 {
803 if (edir->dyn_relocs != NULL)
804 {
00d8c7a9
AK
805 struct elf_dyn_relocs **pp;
806 struct elf_dyn_relocs *p;
0451c93c 807
fcfa13d2 808 /* Add reloc counts against the indirect sym to the direct sym
0451c93c
MS
809 list. Merge any entries against the same section. */
810 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
811 {
00d8c7a9 812 struct elf_dyn_relocs *q;
0451c93c
MS
813
814 for (q = edir->dyn_relocs; q != NULL; q = q->next)
815 if (q->sec == p->sec)
816 {
817 q->pc_count += p->pc_count;
818 q->count += p->count;
819 *pp = p->next;
820 break;
821 }
822 if (q == NULL)
823 pp = &p->next;
824 }
825 *pp = edir->dyn_relocs;
826 }
827
828 edir->dyn_relocs = eind->dyn_relocs;
829 eind->dyn_relocs = NULL;
830 }
831
69fc87f1
MS
832 if (ind->root.type == bfd_link_hash_indirect
833 && dir->got.refcount <= 0)
834 {
835 edir->tls_type = eind->tls_type;
836 eind->tls_type = GOT_UNKNOWN;
837 }
838
64285810
MS
839 if (ELIMINATE_COPY_RELOCS
840 && ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
841 && dir->dynamic_adjusted)
842 {
843 /* If called to transfer flags for a weakdef during processing
844 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
845 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
846 dir->ref_dynamic |= ind->ref_dynamic;
847 dir->ref_regular |= ind->ref_regular;
848 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
849 dir->needs_plt |= ind->needs_plt;
850 }
64285810 851 else
fcfa13d2 852 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
0451c93c 853}
a85d7ed0 854
69fc87f1 855static int
2c3fc389
NC
856elf_s390_tls_transition (struct bfd_link_info *info,
857 int r_type,
858 int is_local)
69fc87f1 859{
0e1862bb 860 if (bfd_link_pic (info))
69fc87f1
MS
861 return r_type;
862
863 switch (r_type)
864 {
865 case R_390_TLS_GD64:
866 case R_390_TLS_IE64:
867 if (is_local)
868 return R_390_TLS_LE64;
869 return R_390_TLS_IE64;
870 case R_390_TLS_GOTIE64:
871 if (is_local)
872 return R_390_TLS_LE64;
873 return R_390_TLS_GOTIE64;
874 case R_390_TLS_LDM64:
875 return R_390_TLS_LE64;
876 }
877
878 return r_type;
879}
880
a85d7ed0
NC
881/* Look through the relocs for a section during the first phase, and
882 allocate space in the global offset table or procedure linkage
883 table. */
884
b34976b6 885static bfd_boolean
4dfe6ac6
NC
886elf_s390_check_relocs (bfd *abfd,
887 struct bfd_link_info *info,
888 asection *sec,
889 const Elf_Internal_Rela *relocs)
a85d7ed0 890{
0451c93c 891 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
892 Elf_Internal_Shdr *symtab_hdr;
893 struct elf_link_hash_entry **sym_hashes;
a85d7ed0
NC
894 const Elf_Internal_Rela *rel;
895 const Elf_Internal_Rela *rel_end;
a85d7ed0 896 asection *sreloc;
5236c819 897 bfd_signed_vma *local_got_refcounts;
69fc87f1 898 int tls_type, old_tls_type;
a85d7ed0 899
0e1862bb 900 if (bfd_link_relocatable (info))
b34976b6 901 return TRUE;
a85d7ed0 902
0ffa91dd
NC
903 BFD_ASSERT (is_s390_elf (abfd));
904
0451c93c 905 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
906 if (htab == NULL)
907 return FALSE;
908
0ffa91dd 909 symtab_hdr = &elf_symtab_hdr (abfd);
a85d7ed0 910 sym_hashes = elf_sym_hashes (abfd);
5236c819 911 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 912
a85d7ed0
NC
913 sreloc = NULL;
914
915 rel_end = relocs + sec->reloc_count;
916 for (rel = relocs; rel < rel_end; rel++)
917 {
69fc87f1 918 unsigned int r_type;
a85d7ed0
NC
919 unsigned long r_symndx;
920 struct elf_link_hash_entry *h;
470b557a 921 Elf_Internal_Sym *isym;
a85d7ed0
NC
922
923 r_symndx = ELF64_R_SYM (rel->r_info);
924
0451c93c
MS
925 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
926 {
4eca0228
AM
927 _bfd_error_handler (_("%B: bad symbol index: %d"),
928 abfd, r_symndx);
b34976b6 929 return FALSE;
0451c93c
MS
930 }
931
a85d7ed0 932 if (r_symndx < symtab_hdr->sh_info)
470b557a
AK
933 {
934 /* A local symbol. */
935 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
936 abfd, r_symndx);
937 if (isym == NULL)
938 return FALSE;
939
940 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
941 {
942 struct plt_entry *plt;
943
0cb79d69
AK
944 if (htab->elf.dynobj == NULL)
945 htab->elf.dynobj = abfd;
946
470b557a
AK
947 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
948 return FALSE;
949
950 if (local_got_refcounts == NULL)
951 {
952 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
953 return FALSE;
954 local_got_refcounts = elf_local_got_refcounts (abfd);
955 }
956 plt = elf_s390_local_plt (abfd);
957 plt[r_symndx].plt.refcount++;
958 }
959 h = NULL;
960 }
a85d7ed0 961 else
973a3492
L
962 {
963 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
964 while (h->root.type == bfd_link_hash_indirect
965 || h->root.type == bfd_link_hash_warning)
966 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
967
968 /* PR15323, ref flags aren't set for references in the same
969 object. */
970 h->root.non_ir_ref = 1;
973a3492 971 }
a85d7ed0 972
5236c819
MS
973 /* Create got section and local_got_refcounts array if they
974 are needed. */
69fc87f1
MS
975 r_type = elf_s390_tls_transition (info,
976 ELF64_R_TYPE (rel->r_info),
977 h == NULL);
978 switch (r_type)
a85d7ed0
NC
979 {
980 case R_390_GOT12:
947216bf 981 case R_390_GOT16:
bd1ea41b 982 case R_390_GOT20:
a85d7ed0
NC
983 case R_390_GOT32:
984 case R_390_GOT64:
985 case R_390_GOTENT:
5236c819
MS
986 case R_390_GOTPLT12:
987 case R_390_GOTPLT16:
bd1ea41b 988 case R_390_GOTPLT20:
5236c819
MS
989 case R_390_GOTPLT32:
990 case R_390_GOTPLT64:
991 case R_390_GOTPLTENT:
69fc87f1
MS
992 case R_390_TLS_GD64:
993 case R_390_TLS_GOTIE12:
bd1ea41b 994 case R_390_TLS_GOTIE20:
69fc87f1
MS
995 case R_390_TLS_GOTIE64:
996 case R_390_TLS_IEENT:
997 case R_390_TLS_IE64:
998 case R_390_TLS_LDM64:
5236c819
MS
999 if (h == NULL
1000 && local_got_refcounts == NULL)
a85d7ed0 1001 {
470b557a 1002 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
5236c819 1003 return FALSE;
470b557a 1004 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 1005 }
470b557a 1006
5236c819
MS
1007 /* Fall through. */
1008 case R_390_GOTOFF16:
1009 case R_390_GOTOFF32:
1010 case R_390_GOTOFF64:
0451c93c
MS
1011 case R_390_GOTPC:
1012 case R_390_GOTPCDBL:
f41345a7 1013 if (htab->elf.sgot == NULL)
0451c93c
MS
1014 {
1015 if (htab->elf.dynobj == NULL)
1016 htab->elf.dynobj = abfd;
1017 if (!create_got_section (htab->elf.dynobj, info))
b34976b6 1018 return FALSE;
0451c93c 1019 }
5236c819
MS
1020 }
1021
470b557a
AK
1022 if (h != NULL)
1023 {
1024 if (htab->elf.dynobj == NULL)
1025 htab->elf.dynobj = abfd;
1026 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1027 return FALSE;
1028
1029 /* Make sure an IFUNC symbol defined in a non-shared object
1030 always gets a PLT slot. */
1031 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1032 {
1033 /* The symbol is called by the dynamic loader in order
1034 to resolve the relocation. So it is in fact also
1035 referenced. */
1036 h->ref_regular = 1;
1037 h->needs_plt = 1;
1038 }
1039 }
1040
69fc87f1 1041 switch (r_type)
5236c819 1042 {
5236c819
MS
1043 case R_390_GOTPC:
1044 case R_390_GOTPCDBL:
470b557a
AK
1045 /* These relocs do not need a GOT slot. They just load the
1046 GOT pointer itself or address something else relative to
1047 the GOT. Since the GOT pointer has been set up above we
1048 are done. */
0451c93c 1049 break;
d47b13e0
AK
1050 case R_390_GOTOFF16:
1051 case R_390_GOTOFF32:
1052 case R_390_GOTOFF64:
1053 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1054 break;
1a0670f3 1055 /* Fall through. */
ec338859 1056
fb798c50 1057 case R_390_PLT12DBL:
947216bf 1058 case R_390_PLT16DBL:
fb798c50 1059 case R_390_PLT24DBL:
a85d7ed0
NC
1060 case R_390_PLT32:
1061 case R_390_PLT32DBL:
1062 case R_390_PLT64:
5236c819
MS
1063 case R_390_PLTOFF16:
1064 case R_390_PLTOFF32:
1065 case R_390_PLTOFF64:
a85d7ed0 1066 /* This symbol requires a procedure linkage table entry. We
947216bf
AM
1067 actually build the entry in adjust_dynamic_symbol,
1068 because this might be a case of linking PIC code which is
1069 never referenced by a dynamic object, in which case we
1070 don't need to generate a procedure linkage table entry
1071 after all. */
ec338859 1072
a85d7ed0 1073 /* If this is a local symbol, we resolve it directly without
947216bf 1074 creating a procedure linkage table entry. */
5236c819
MS
1075 if (h != NULL)
1076 {
f5385ebf 1077 h->needs_plt = 1;
5236c819
MS
1078 h->plt.refcount += 1;
1079 }
1080 break;
ec338859 1081
5236c819
MS
1082 case R_390_GOTPLT12:
1083 case R_390_GOTPLT16:
bd1ea41b 1084 case R_390_GOTPLT20:
5236c819
MS
1085 case R_390_GOTPLT32:
1086 case R_390_GOTPLT64:
1087 case R_390_GOTPLTENT:
1088 /* This symbol requires either a procedure linkage table entry
1089 or an entry in the local got. We actually build the entry
1090 in adjust_dynamic_symbol because whether this is really a
1091 global reference can change and with it the fact if we have
1092 to create a plt entry or a local got entry. To be able to
1093 make a once global symbol a local one we have to keep track
1094 of the number of gotplt references that exist for this
1095 symbol. */
1096 if (h != NULL)
1097 {
1098 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
f5385ebf 1099 h->needs_plt = 1;
5236c819
MS
1100 h->plt.refcount += 1;
1101 }
69fc87f1
MS
1102 else
1103 local_got_refcounts[r_symndx] += 1;
1104 break;
1105
1106 case R_390_TLS_LDM64:
1107 htab->tls_ldm_got.refcount += 1;
1108 break;
1109
1110 case R_390_TLS_IE64:
1111 case R_390_TLS_GOTIE12:
bd1ea41b 1112 case R_390_TLS_GOTIE20:
69fc87f1
MS
1113 case R_390_TLS_GOTIE64:
1114 case R_390_TLS_IEENT:
0e1862bb 1115 if (bfd_link_pic (info))
69fc87f1
MS
1116 info->flags |= DF_STATIC_TLS;
1117 /* Fall through */
1118
1119 case R_390_GOT12:
26e41594 1120 case R_390_GOT16:
bd1ea41b 1121 case R_390_GOT20:
69fc87f1
MS
1122 case R_390_GOT32:
1123 case R_390_GOT64:
1124 case R_390_GOTENT:
1125 case R_390_TLS_GD64:
1126 /* This symbol requires a global offset table entry. */
1127 switch (r_type)
1128 {
1129 default:
1130 case R_390_GOT12:
1131 case R_390_GOT16:
bd1ea41b 1132 case R_390_GOT20:
69fc87f1
MS
1133 case R_390_GOT32:
1134 case R_390_GOTENT:
1135 tls_type = GOT_NORMAL;
1136 break;
1137 case R_390_TLS_GD64:
1138 tls_type = GOT_TLS_GD;
1139 break;
1140 case R_390_TLS_IE64:
1141 case R_390_TLS_GOTIE64:
1142 tls_type = GOT_TLS_IE;
1143 break;
1144 case R_390_TLS_GOTIE12:
bd1ea41b 1145 case R_390_TLS_GOTIE20:
69fc87f1
MS
1146 case R_390_TLS_IEENT:
1147 tls_type = GOT_TLS_IE_NLT;
1148 break;
1149 }
1150
1151 if (h != NULL)
1152 {
1153 h->got.refcount += 1;
1154 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1155 }
5236c819
MS
1156 else
1157 {
1158 local_got_refcounts[r_symndx] += 1;
69fc87f1 1159 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
5236c819 1160 }
69fc87f1
MS
1161 /* If a TLS symbol is accessed using IE at least once,
1162 there is no point to use dynamic model for it. */
1163 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1164 {
1165 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1166 {
4eca0228 1167 _bfd_error_handler
d003868e
AM
1168 (_("%B: `%s' accessed both as normal and thread local symbol"),
1169 abfd, h->root.root.string);
69fc87f1
MS
1170 return FALSE;
1171 }
1172 if (old_tls_type > tls_type)
1173 tls_type = old_tls_type;
1174 }
1175
1176 if (old_tls_type != tls_type)
1177 {
1178 if (h != NULL)
1179 elf_s390_hash_entry (h)->tls_type = tls_type;
1180 else
1181 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1182 }
1183
1184 if (r_type != R_390_TLS_IE64)
1185 break;
1186 /* Fall through */
1187
1188 case R_390_TLS_LE64:
e00d879a
AK
1189 /* For static linking and executables this reloc will be
1190 calculated at linktime otherwise a TLS_TPOFF runtime
1191 reloc will be generated. */
0e1862bb 1192 if (r_type == R_390_TLS_LE64 && bfd_link_pie (info))
e00d879a
AK
1193 break;
1194
0e1862bb 1195 if (!bfd_link_pic (info))
69fc87f1
MS
1196 break;
1197 info->flags |= DF_STATIC_TLS;
1198 /* Fall through */
ec338859 1199
947216bf
AM
1200 case R_390_8:
1201 case R_390_16:
a85d7ed0
NC
1202 case R_390_32:
1203 case R_390_64:
fb798c50 1204 case R_390_PC12DBL:
947216bf
AM
1205 case R_390_PC16:
1206 case R_390_PC16DBL:
fb798c50 1207 case R_390_PC24DBL:
a85d7ed0
NC
1208 case R_390_PC32:
1209 case R_390_PC32DBL:
1210 case R_390_PC64:
99ba5125 1211 if (h != NULL && bfd_link_executable (info))
0451c93c
MS
1212 {
1213 /* If this reloc is in a read-only section, we might
1214 need a copy reloc. We can't check reliably at this
1215 stage whether the section is read-only, as input
1216 sections have not yet been mapped to output sections.
1217 Tentatively set the flag for now, and correct in
1218 adjust_dynamic_symbol. */
f5385ebf 1219 h->non_got_ref = 1;
ec338859 1220
0e1862bb 1221 if (!bfd_link_pic (info))
470b557a
AK
1222 {
1223 /* We may need a .plt entry if the function this reloc
1224 refers to is in a shared lib. */
1225 h->plt.refcount += 1;
1226 }
0451c93c 1227 }
ec338859 1228
a85d7ed0 1229 /* If we are creating a shared library, and this is a reloc
0451c93c
MS
1230 against a global symbol, or a non PC relative reloc
1231 against a local symbol, then we need to copy the reloc
1232 into the shared library. However, if we are linking with
1233 -Bsymbolic, we do not need to copy a reloc against a
1234 global symbol which is defined in an object we are
1235 including in the link (i.e., DEF_REGULAR is set). At
1236 this point we have not seen all the input files, so it is
1237 possible that DEF_REGULAR is not set now but will be set
1238 later (it is never cleared). In case of a weak definition,
1239 DEF_REGULAR may be cleared later by a strong definition in
1240 a shared library. We account for that possibility below by
1241 storing information in the relocs_copied field of the hash
1242 table entry. A similar situation occurs when creating
1243 shared libraries and symbol visibility changes render the
1244 symbol local.
1245
1246 If on the other hand, we are creating an executable, we
1247 may need to keep relocations for symbols satisfied by a
1248 dynamic library if we manage to avoid copy relocs for the
1249 symbol. */
0e1862bb 1250 if ((bfd_link_pic (info)
0451c93c
MS
1251 && (sec->flags & SEC_ALLOC) != 0
1252 && ((ELF64_R_TYPE (rel->r_info) != R_390_PC16
fb798c50 1253 && ELF64_R_TYPE (rel->r_info) != R_390_PC12DBL
0451c93c 1254 && ELF64_R_TYPE (rel->r_info) != R_390_PC16DBL
fb798c50 1255 && ELF64_R_TYPE (rel->r_info) != R_390_PC24DBL
0451c93c
MS
1256 && ELF64_R_TYPE (rel->r_info) != R_390_PC32
1257 && ELF64_R_TYPE (rel->r_info) != R_390_PC32DBL
1258 && ELF64_R_TYPE (rel->r_info) != R_390_PC64)
1259 || (h != NULL
8c21ca21 1260 && (! SYMBOLIC_BIND (info, h)
0451c93c 1261 || h->root.type == bfd_link_hash_defweak
f5385ebf 1262 || !h->def_regular))))
64285810 1263 || (ELIMINATE_COPY_RELOCS
0e1862bb 1264 && !bfd_link_pic (info)
0451c93c
MS
1265 && (sec->flags & SEC_ALLOC) != 0
1266 && h != NULL
1267 && (h->root.type == bfd_link_hash_defweak
f5385ebf 1268 || !h->def_regular)))
a85d7ed0 1269 {
00d8c7a9
AK
1270 struct elf_dyn_relocs *p;
1271 struct elf_dyn_relocs **head;
ec338859 1272
0451c93c
MS
1273 /* We must copy these reloc types into the output file.
1274 Create a reloc section in dynobj and make room for
1275 this reloc. */
a85d7ed0
NC
1276 if (sreloc == NULL)
1277 {
440e9cd2
AK
1278 if (htab->elf.dynobj == NULL)
1279 htab->elf.dynobj = abfd;
1280
83bac4b0
NC
1281 sreloc = _bfd_elf_make_dynamic_reloc_section
1282 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
ec338859 1283
a85d7ed0 1284 if (sreloc == NULL)
83bac4b0 1285 return FALSE;
a85d7ed0 1286 }
ec338859 1287
0451c93c
MS
1288 /* If this is a global symbol, we count the number of
1289 relocations we need for this symbol. */
1290 if (h != NULL)
a85d7ed0 1291 {
ec338859 1292 head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
0451c93c
MS
1293 }
1294 else
1295 {
ec338859
AM
1296 /* Track dynamic relocs needed for local syms too.
1297 We really need local syms available to do this
1298 easily. Oh well. */
ec338859 1299 asection *s;
6edfbbad
DJ
1300 void *vpp;
1301
87d72d41
AM
1302 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1303 abfd, r_symndx);
1304 if (isym == NULL)
b34976b6 1305 return FALSE;
ec338859 1306
87d72d41
AM
1307 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1308 if (s == NULL)
1309 s = sec;
1310
6edfbbad 1311 vpp = &elf_section_data (s)->local_dynrel;
00d8c7a9 1312 head = (struct elf_dyn_relocs **) vpp;
ec338859
AM
1313 }
1314
1315 p = *head;
1316 if (p == NULL || p->sec != sec)
1317 {
1318 bfd_size_type amt = sizeof *p;
00d8c7a9 1319 p = ((struct elf_dyn_relocs *)
ec338859
AM
1320 bfd_alloc (htab->elf.dynobj, amt));
1321 if (p == NULL)
b34976b6 1322 return FALSE;
ec338859
AM
1323 p->next = *head;
1324 *head = p;
1325 p->sec = sec;
1326 p->count = 0;
1327 p->pc_count = 0;
a85d7ed0 1328 }
ec338859
AM
1329
1330 p->count += 1;
1331 if (ELF64_R_TYPE (rel->r_info) == R_390_PC16
fb798c50
AK
1332 || ELF64_R_TYPE (rel->r_info) == R_390_PC12DBL
1333 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
ec338859
AM
1334 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1335 || ELF64_R_TYPE (rel->r_info) == R_390_PC32
1336 || ELF64_R_TYPE (rel->r_info) == R_390_PC32DBL
1337 || ELF64_R_TYPE (rel->r_info) == R_390_PC64)
1338 p->pc_count += 1;
a85d7ed0 1339 }
a85d7ed0 1340 break;
ec338859 1341
a85d7ed0
NC
1342 /* This relocation describes the C++ object vtable hierarchy.
1343 Reconstruct it for later use during GC. */
947216bf 1344 case R_390_GNU_VTINHERIT:
c152c796 1345 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 1346 return FALSE;
947216bf 1347 break;
ec338859 1348
a85d7ed0
NC
1349 /* This relocation describes which C++ vtable entries are actually
1350 used. Record for later use during GC. */
947216bf 1351 case R_390_GNU_VTENTRY:
d17e0c6e
JB
1352 BFD_ASSERT (h != NULL);
1353 if (h != NULL
1354 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 1355 return FALSE;
947216bf 1356 break;
ec338859 1357
a85d7ed0
NC
1358 default:
1359 break;
1360 }
1361 }
1362
b34976b6 1363 return TRUE;
a85d7ed0
NC
1364}
1365
1366/* Return the section that should be marked against GC for a given
1367 relocation. */
1368
1369static asection *
07adf181
AM
1370elf_s390_gc_mark_hook (asection *sec,
1371 struct bfd_link_info *info,
1372 Elf_Internal_Rela *rel,
1373 struct elf_link_hash_entry *h,
1374 Elf_Internal_Sym *sym)
a85d7ed0
NC
1375{
1376 if (h != NULL)
07adf181
AM
1377 switch (ELF64_R_TYPE (rel->r_info))
1378 {
1379 case R_390_GNU_VTINHERIT:
1380 case R_390_GNU_VTENTRY:
1381 return NULL;
1382 }
1383
1384 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
a85d7ed0
NC
1385}
1386
1387/* Update the got entry reference counts for the section being removed. */
1388
b34976b6 1389static bfd_boolean
07adf181
AM
1390elf_s390_gc_sweep_hook (bfd *abfd,
1391 struct bfd_link_info *info,
1392 asection *sec,
1393 const Elf_Internal_Rela *relocs)
a85d7ed0 1394{
4dfe6ac6 1395 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
1396 Elf_Internal_Shdr *symtab_hdr;
1397 struct elf_link_hash_entry **sym_hashes;
1398 bfd_signed_vma *local_got_refcounts;
1399 const Elf_Internal_Rela *rel, *relend;
a85d7ed0 1400
0e1862bb 1401 if (bfd_link_relocatable (info))
7dda2462
TG
1402 return TRUE;
1403
4dfe6ac6
NC
1404 htab = elf_s390_hash_table (info);
1405 if (htab == NULL)
1406 return FALSE;
1407
ec338859 1408 elf_section_data (sec)->local_dynrel = NULL;
a85d7ed0 1409
0ffa91dd 1410 symtab_hdr = &elf_symtab_hdr (abfd);
0451c93c
MS
1411 sym_hashes = elf_sym_hashes (abfd);
1412 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0
NC
1413
1414 relend = relocs + sec->reloc_count;
1415 for (rel = relocs; rel < relend; rel++)
5236c819 1416 {
26e41594
AM
1417 unsigned long r_symndx;
1418 unsigned int r_type;
1419 struct elf_link_hash_entry *h = NULL;
1420
5236c819 1421 r_symndx = ELF64_R_SYM (rel->r_info);
26e41594
AM
1422 if (r_symndx >= symtab_hdr->sh_info)
1423 {
1424 struct elf_s390_link_hash_entry *eh;
00d8c7a9
AK
1425 struct elf_dyn_relocs **pp;
1426 struct elf_dyn_relocs *p;
5236c819 1427
26e41594 1428 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3eb128b2
AM
1429 while (h->root.type == bfd_link_hash_indirect
1430 || h->root.type == bfd_link_hash_warning)
1431 h = (struct elf_link_hash_entry *) h->root.u.i.link;
26e41594 1432 eh = (struct elf_s390_link_hash_entry *) h;
5236c819 1433
26e41594
AM
1434 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1435 if (p->sec == sec)
1436 {
1437 /* Everything must go for SEC. */
1438 *pp = p->next;
1439 break;
1440 }
1441 }
470b557a
AK
1442 else
1443 {
1444 Elf_Internal_Sym *isym;
1445
1446 /* A local symbol. */
1447 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1448 abfd, r_symndx);
1449 if (isym == NULL)
1450 return FALSE;
1451
1452 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1453 {
1454 struct plt_entry *plt = elf_s390_local_plt (abfd);
1455 if (plt[r_symndx].plt.refcount > 0)
1456 plt[r_symndx].plt.refcount--;
1457 }
1458 }
26e41594
AM
1459
1460 r_type = ELF64_R_TYPE (rel->r_info);
1461 r_type = elf_s390_tls_transition (info, r_type, h != NULL);
69fc87f1 1462 switch (r_type)
5236c819 1463 {
69fc87f1 1464 case R_390_TLS_LDM64:
4dfe6ac6
NC
1465 if (htab->tls_ldm_got.refcount > 0)
1466 htab->tls_ldm_got.refcount -= 1;
69fc87f1 1467 break;
ef05be83
AK
1468 case R_390_GOTOFF16:
1469 case R_390_GOTOFF32:
1470 case R_390_GOTOFF64:
d47b13e0
AK
1471 if (h != NULL && s390_is_ifunc_symbol_p (h) && h->def_regular)
1472 {
1473 h->plt.refcount--;
1474 break;
1475 }
1476
ef05be83
AK
1477 case R_390_GOTPC:
1478 case R_390_GOTPCDBL:
1479 break;
69fc87f1
MS
1480
1481 case R_390_TLS_GD64:
1482 case R_390_TLS_IE64:
1483 case R_390_TLS_GOTIE12:
bd1ea41b 1484 case R_390_TLS_GOTIE20:
69fc87f1
MS
1485 case R_390_TLS_GOTIE64:
1486 case R_390_TLS_IEENT:
5236c819
MS
1487 case R_390_GOT12:
1488 case R_390_GOT16:
bd1ea41b 1489 case R_390_GOT20:
5236c819
MS
1490 case R_390_GOT32:
1491 case R_390_GOT64:
5236c819
MS
1492 case R_390_GOTENT:
1493 if (h != NULL)
1494 {
1495 if (h->got.refcount > 0)
1496 h->got.refcount -= 1;
1497 }
1498 else if (local_got_refcounts != NULL)
1499 {
1500 if (local_got_refcounts[r_symndx] > 0)
1501 local_got_refcounts[r_symndx] -= 1;
1502 }
26e41594 1503 break;
a85d7ed0 1504
5236c819
MS
1505 case R_390_8:
1506 case R_390_12:
1507 case R_390_16:
bd1ea41b 1508 case R_390_20:
5236c819
MS
1509 case R_390_32:
1510 case R_390_64:
1511 case R_390_PC16:
fb798c50 1512 case R_390_PC12DBL:
5236c819 1513 case R_390_PC16DBL:
fb798c50 1514 case R_390_PC24DBL:
5236c819
MS
1515 case R_390_PC32:
1516 case R_390_PC32DBL:
1517 case R_390_PC64:
0e1862bb 1518 if (bfd_link_pic (info))
26e41594
AM
1519 break;
1520 /* Fall through */
a85d7ed0 1521
fb798c50 1522 case R_390_PLT12DBL:
69fc87f1 1523 case R_390_PLT16DBL:
fb798c50 1524 case R_390_PLT24DBL:
69fc87f1
MS
1525 case R_390_PLT32:
1526 case R_390_PLT32DBL:
1527 case R_390_PLT64:
1528 case R_390_PLTOFF16:
1529 case R_390_PLTOFF32:
1530 case R_390_PLTOFF64:
1531 if (h != NULL)
1532 {
1533 if (h->plt.refcount > 0)
1534 h->plt.refcount -= 1;
1535 }
1536 break;
1537
1538 case R_390_GOTPLT12:
1539 case R_390_GOTPLT16:
bd1ea41b 1540 case R_390_GOTPLT20:
69fc87f1
MS
1541 case R_390_GOTPLT32:
1542 case R_390_GOTPLT64:
1543 case R_390_GOTPLTENT:
1544 if (h != NULL)
1545 {
1546 if (h->plt.refcount > 0)
1547 {
1548 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount--;
1549 h->plt.refcount -= 1;
1550 }
1551 }
1552 else if (local_got_refcounts != NULL)
1553 {
1554 if (local_got_refcounts[r_symndx] > 0)
1555 local_got_refcounts[r_symndx] -= 1;
1556 }
1557 break;
1558
5236c819
MS
1559 default:
1560 break;
1561 }
1562 }
a85d7ed0 1563
b34976b6 1564 return TRUE;
a85d7ed0
NC
1565}
1566
5236c819
MS
1567/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1568 entry but we found we will not create any. Called when we find we will
1569 not have any PLT for this symbol, by for example
1570 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1571 or elf_s390_size_dynamic_sections if no dynamic sections will be
1572 created (we're only linking static objects). */
1573
1574static void
2c3fc389 1575elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
5236c819
MS
1576{
1577 if (h->elf.root.type == bfd_link_hash_warning)
1578 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1579
1580 if (h->gotplt_refcount <= 0)
1581 return;
1582
1583 /* We simply add the number of gotplt references to the number
1584 * of got references for this symbol. */
1585 h->elf.got.refcount += h->gotplt_refcount;
1586 h->gotplt_refcount = -1;
1587}
1588
a85d7ed0
NC
1589/* Adjust a symbol defined by a dynamic object and referenced by a
1590 regular object. The current definition is in some section of the
1591 dynamic object, but we're not including those sections. We have to
1592 change the definition to something the rest of the link can
1593 understand. */
1594
b34976b6 1595static bfd_boolean
4dfe6ac6
NC
1596elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1597 struct elf_link_hash_entry *h)
a85d7ed0 1598{
0451c93c 1599 struct elf_s390_link_hash_table *htab;
a85d7ed0 1600 asection *s;
a85d7ed0 1601
470b557a
AK
1602 /* STT_GNU_IFUNC symbol must go through PLT. */
1603 if (s390_is_ifunc_symbol_p (h))
d8ee9e44
AK
1604 {
1605 /* All local STT_GNU_IFUNC references must be treated as local
1606 calls via local PLT. */
1607 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1608 {
1609 bfd_size_type pc_count = 0, count = 0;
1610 struct elf_dyn_relocs **pp;
1611 struct elf_s390_link_hash_entry *eh;
1612 struct elf_dyn_relocs *p;
1613
1614 eh = (struct elf_s390_link_hash_entry *) h;
1615 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1616 {
1617 pc_count += p->pc_count;
1618 p->count -= p->pc_count;
1619 p->pc_count = 0;
1620 count += p->count;
1621 if (p->count == 0)
1622 *pp = p->next;
1623 else
1624 pp = &p->next;
1625 }
1626
1627 if (pc_count || count)
1628 {
1629 h->needs_plt = 1;
1630 h->non_got_ref = 1;
1631 if (h->plt.refcount <= 0)
1632 h->plt.refcount = 1;
1633 else
1634 h->plt.refcount += 1;
1635 }
1636 }
1637
1638 if (h->plt.refcount <= 0)
1639 {
1640 h->plt.offset = (bfd_vma) -1;
1641 h->needs_plt = 0;
1642 }
1643 return TRUE;
1644 }
470b557a 1645
a85d7ed0
NC
1646 /* If this is a function, put it in the procedure linkage table. We
1647 will fill in the contents of the procedure linkage table later
cedb70c5 1648 (although we could actually do it here). */
a85d7ed0 1649 if (h->type == STT_FUNC
f5385ebf 1650 || h->needs_plt)
a85d7ed0 1651 {
0451c93c 1652 if (h->plt.refcount <= 0
8c21ca21
AK
1653 || SYMBOL_CALLS_LOCAL (info, h)
1654 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1655 && h->root.type == bfd_link_hash_undefweak))
a85d7ed0
NC
1656 {
1657 /* This case can occur if we saw a PLT32 reloc in an input
947216bf
AM
1658 file, but the symbol was never referred to by a dynamic
1659 object, or if all references were garbage collected. In
0451c93c
MS
1660 such a case, we don't actually need to build a procedure
1661 linkage table, and we can just do a PC32 reloc instead. */
a85d7ed0 1662 h->plt.offset = (bfd_vma) -1;
f5385ebf 1663 h->needs_plt = 0;
5236c819 1664 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
a85d7ed0
NC
1665 }
1666
b34976b6 1667 return TRUE;
a85d7ed0 1668 }
bbd7ec4a 1669 else
0451c93c
MS
1670 /* It's possible that we incorrectly decided a .plt reloc was
1671 needed for an R_390_PC32 reloc to a non-function sym in
1672 check_relocs. We can't decide accurately between function and
1673 non-function syms in check-relocs; Objects loaded later in
1674 the link may change h->type. So fix it now. */
bbd7ec4a 1675 h->plt.offset = (bfd_vma) -1;
a85d7ed0
NC
1676
1677 /* If this is a weak symbol, and there is a real definition, the
1678 processor independent code will have arranged for us to see the
1679 real definition first, and we can just use the same value. */
f6e332e6 1680 if (h->u.weakdef != NULL)
a85d7ed0 1681 {
f6e332e6
AM
1682 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1683 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1684 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1685 h->root.u.def.value = h->u.weakdef->root.u.def.value;
64285810 1686 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
f6e332e6 1687 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 1688 return TRUE;
a85d7ed0
NC
1689 }
1690
1691 /* This is a reference to a symbol defined by a dynamic object which
1692 is not a function. */
1693
1694 /* If we are creating a shared library, we must presume that the
1695 only references to the symbol are via the global offset table.
1696 For such cases we need not do anything here; the relocations will
1697 be handled correctly by relocate_section. */
0e1862bb 1698 if (bfd_link_pic (info))
b34976b6 1699 return TRUE;
a85d7ed0
NC
1700
1701 /* If there are no references to this symbol that do not use the
1702 GOT, we don't need to generate a copy reloc. */
f5385ebf 1703 if (!h->non_got_ref)
b34976b6 1704 return TRUE;
a85d7ed0 1705
0451c93c
MS
1706 /* If -z nocopyreloc was given, we won't generate them either. */
1707 if (info->nocopyreloc)
1708 {
f5385ebf 1709 h->non_got_ref = 0;
b34976b6 1710 return TRUE;
0451c93c
MS
1711 }
1712
64285810 1713 if (ELIMINATE_COPY_RELOCS)
0451c93c 1714 {
64285810 1715 struct elf_s390_link_hash_entry * eh;
00d8c7a9 1716 struct elf_dyn_relocs *p;
0451c93c 1717
64285810
MS
1718 eh = (struct elf_s390_link_hash_entry *) h;
1719 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1720 {
1721 s = p->sec->output_section;
1722 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1723 break;
1724 }
1725
1726 /* If we didn't find any dynamic relocs in read-only sections, then
1727 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1728 if (p == NULL)
1729 {
f5385ebf 1730 h->non_got_ref = 0;
64285810
MS
1731 return TRUE;
1732 }
0451c93c
MS
1733 }
1734
a85d7ed0
NC
1735 /* We must allocate the symbol in our .dynbss section, which will
1736 become part of the .bss section of the executable. There will be
1737 an entry for this symbol in the .dynsym section. The dynamic
1738 object will contain position independent code, so all references
1739 from the dynamic object to this symbol will go through the global
1740 offset table. The dynamic linker will use the .dynsym entry to
1741 determine the address it must put in the global offset table, so
1742 both the dynamic object and the regular object will refer to the
1743 same memory location for the variable. */
1744
0451c93c 1745 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
1746 if (htab == NULL)
1747 return FALSE;
a85d7ed0 1748
0451c93c
MS
1749 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1750 copy the initial value out of the dynamic object and into the
1751 runtime process image. */
1d7e9d18 1752 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
a85d7ed0 1753 {
eea6121a 1754 htab->srelbss->size += sizeof (Elf64_External_Rela);
f5385ebf 1755 h->needs_copy = 1;
a85d7ed0
NC
1756 }
1757
0451c93c 1758 s = htab->sdynbss;
a85d7ed0 1759
6cabe1ea 1760 return _bfd_elf_adjust_dynamic_copy (info, h, s);
a85d7ed0
NC
1761}
1762
0451c93c
MS
1763/* Allocate space in .plt, .got and associated reloc sections for
1764 dynamic relocs. */
1765
b34976b6 1766static bfd_boolean
4dfe6ac6
NC
1767allocate_dynrelocs (struct elf_link_hash_entry *h,
1768 void * inf)
0451c93c
MS
1769{
1770 struct bfd_link_info *info;
1771 struct elf_s390_link_hash_table *htab;
470b557a 1772 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
00d8c7a9 1773 struct elf_dyn_relocs *p;
0451c93c 1774
e92d460e 1775 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1776 return TRUE;
0451c93c
MS
1777
1778 info = (struct bfd_link_info *) inf;
1779 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
1780 if (htab == NULL)
1781 return FALSE;
0451c93c 1782
470b557a
AK
1783 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1784 here if it is defined and referenced in a non-shared object. */
1785 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
61643fba 1786 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
470b557a
AK
1787 else if (htab->elf.dynamic_sections_created
1788 && h->plt.refcount > 0)
0451c93c
MS
1789 {
1790 /* Make sure this symbol is output as a dynamic symbol.
1791 Undefined weak syms won't yet be marked as dynamic. */
1792 if (h->dynindx == -1
f5385ebf 1793 && !h->forced_local)
0451c93c 1794 {
c152c796 1795 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1796 return FALSE;
0451c93c
MS
1797 }
1798
0e1862bb 1799 if (bfd_link_pic (info)
4ec72bde 1800 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
0451c93c 1801 {
f41345a7 1802 asection *s = htab->elf.splt;
0451c93c
MS
1803
1804 /* If this is the first .plt entry, make room for the special
1805 first entry. */
eea6121a
AM
1806 if (s->size == 0)
1807 s->size += PLT_FIRST_ENTRY_SIZE;
0451c93c 1808
eea6121a 1809 h->plt.offset = s->size;
0451c93c
MS
1810
1811 /* If this symbol is not defined in a regular file, and we are
1812 not generating a shared library, then set the symbol to this
1813 location in the .plt. This is required to make function
1814 pointers compare as equal between the normal executable and
1815 the shared library. */
0e1862bb 1816 if (! bfd_link_pic (info)
f5385ebf 1817 && !h->def_regular)
0451c93c
MS
1818 {
1819 h->root.u.def.section = s;
1820 h->root.u.def.value = h->plt.offset;
1821 }
ec338859 1822
0451c93c 1823 /* Make room for this entry. */
eea6121a 1824 s->size += PLT_ENTRY_SIZE;
ec338859 1825
0451c93c
MS
1826 /* We also need to make an entry in the .got.plt section, which
1827 will be placed in the .got section by the linker script. */
f41345a7 1828 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
0451c93c
MS
1829
1830 /* We also need to make an entry in the .rela.plt section. */
f41345a7 1831 htab->elf.srelplt->size += sizeof (Elf64_External_Rela);
0451c93c
MS
1832 }
1833 else
1834 {
1835 h->plt.offset = (bfd_vma) -1;
f5385ebf 1836 h->needs_plt = 0;
5236c819 1837 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c
MS
1838 }
1839 }
1840 else
1841 {
1842 h->plt.offset = (bfd_vma) -1;
f5385ebf 1843 h->needs_plt = 0;
5236c819 1844 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c
MS
1845 }
1846
69fc87f1
MS
1847 /* If R_390_TLS_{IE64,GOTIE64,GOTIE12,IEENT} symbol is now local to
1848 the binary, we can optimize a bit. IE64 and GOTIE64 get converted
1849 to R_390_TLS_LE64 requiring no TLS entry. For GOTIE12 and IEENT
1850 we can save the dynamic TLS relocation. */
1851 if (h->got.refcount > 0
0e1862bb 1852 && !bfd_link_pic (info)
69fc87f1
MS
1853 && h->dynindx == -1
1854 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1855 {
1856 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1857 /* For the GOTIE access without a literal pool entry the offset has
1858 to be stored somewhere. The immediate value in the instruction
1859 is not bit enough so the value is stored in the got. */
1860 {
f41345a7
AK
1861 h->got.offset = htab->elf.sgot->size;
1862 htab->elf.sgot->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1863 }
1864 else
1865 h->got.offset = (bfd_vma) -1;
1866 }
1867 else if (h->got.refcount > 0)
0451c93c
MS
1868 {
1869 asection *s;
b34976b6 1870 bfd_boolean dyn;
69fc87f1 1871 int tls_type = elf_s390_hash_entry(h)->tls_type;
0451c93c
MS
1872
1873 /* Make sure this symbol is output as a dynamic symbol.
1874 Undefined weak syms won't yet be marked as dynamic. */
1875 if (h->dynindx == -1
f5385ebf 1876 && !h->forced_local)
0451c93c 1877 {
c152c796 1878 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1879 return FALSE;
0451c93c
MS
1880 }
1881
f41345a7 1882 s = htab->elf.sgot;
eea6121a
AM
1883 h->got.offset = s->size;
1884 s->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1885 /* R_390_TLS_GD64 needs 2 consecutive GOT slots. */
1886 if (tls_type == GOT_TLS_GD)
eea6121a 1887 s->size += GOT_ENTRY_SIZE;
0451c93c 1888 dyn = htab->elf.dynamic_sections_created;
69fc87f1
MS
1889 /* R_390_TLS_IE64 needs one dynamic relocation,
1890 R_390_TLS_GD64 needs one if local symbol and two if global. */
1891 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1892 || tls_type >= GOT_TLS_IE)
f41345a7 1893 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
69fc87f1 1894 else if (tls_type == GOT_TLS_GD)
f41345a7 1895 htab->elf.srelgot->size += 2 * sizeof (Elf64_External_Rela);
82058a73
MS
1896 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1897 || h->root.type != bfd_link_hash_undefweak)
0e1862bb 1898 && (bfd_link_pic (info)
82058a73 1899 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
f41345a7 1900 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
0451c93c
MS
1901 }
1902 else
1903 h->got.offset = (bfd_vma) -1;
1904
0451c93c 1905 if (eh->dyn_relocs == NULL)
b34976b6 1906 return TRUE;
0451c93c
MS
1907
1908 /* In the shared -Bsymbolic case, discard space allocated for
1909 dynamic pc-relative relocs against symbols which turn out to be
1910 defined in regular objects. For the normal shared case, discard
1911 space for pc-relative relocs that have become local due to symbol
1912 visibility changes. */
1913
0e1862bb 1914 if (bfd_link_pic (info))
0451c93c 1915 {
8c21ca21 1916 if (SYMBOL_CALLS_LOCAL (info, h))
0451c93c 1917 {
00d8c7a9 1918 struct elf_dyn_relocs **pp;
0451c93c
MS
1919
1920 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1921 {
1922 p->count -= p->pc_count;
1923 p->pc_count = 0;
1924 if (p->count == 0)
1925 *pp = p->next;
1926 else
1927 pp = &p->next;
1928 }
1929 }
82058a73
MS
1930
1931 /* Also discard relocs on undefined weak syms with non-default
1932 visibility. */
22d606e9 1933 if (eh->dyn_relocs != NULL
82058a73 1934 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
1935 {
1936 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1937 eh->dyn_relocs = NULL;
1938
1939 /* Make sure undefined weak symbols are output as a dynamic
1940 symbol in PIEs. */
1941 else if (h->dynindx == -1
1942 && !h->forced_local)
1943 {
1944 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1945 return FALSE;
1946 }
1947 }
0451c93c 1948 }
64285810 1949 else if (ELIMINATE_COPY_RELOCS)
0451c93c
MS
1950 {
1951 /* For the non-shared case, discard space for relocs against
1952 symbols which turn out to need copy relocs or are not
1953 dynamic. */
1954
f5385ebf
AM
1955 if (!h->non_got_ref
1956 && ((h->def_dynamic
1957 && !h->def_regular)
0451c93c
MS
1958 || (htab->elf.dynamic_sections_created
1959 && (h->root.type == bfd_link_hash_undefweak
1960 || h->root.type == bfd_link_hash_undefined))))
1961 {
1962 /* Make sure this symbol is output as a dynamic symbol.
1963 Undefined weak syms won't yet be marked as dynamic. */
1964 if (h->dynindx == -1
f5385ebf 1965 && !h->forced_local)
0451c93c 1966 {
c152c796 1967 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1968 return FALSE;
0451c93c
MS
1969 }
1970
1971 /* If that succeeded, we know we'll be keeping all the
1972 relocs. */
1973 if (h->dynindx != -1)
1974 goto keep;
1975 }
1976
1977 eh->dyn_relocs = NULL;
1978
ec338859 1979 keep: ;
0451c93c
MS
1980 }
1981
1982 /* Finally, allocate space. */
1983 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1984 {
1985 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 1986 sreloc->size += p->count * sizeof (Elf64_External_Rela);
0451c93c
MS
1987 }
1988
b34976b6 1989 return TRUE;
0451c93c
MS
1990}
1991
1992/* Find any dynamic relocs that apply to read-only sections. */
1993
b34976b6 1994static bfd_boolean
2c3fc389 1995readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
0451c93c
MS
1996{
1997 struct elf_s390_link_hash_entry *eh;
00d8c7a9 1998 struct elf_dyn_relocs *p;
0451c93c
MS
1999
2000 eh = (struct elf_s390_link_hash_entry *) h;
2001 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2002 {
2003 asection *s = p->sec->output_section;
2004
2005 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2006 {
2007 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2008
2009 info->flags |= DF_TEXTREL;
2010
2011 /* Not an error, just cut short the traversal. */
b34976b6 2012 return FALSE;
0451c93c
MS
2013 }
2014 }
b34976b6 2015 return TRUE;
0451c93c
MS
2016}
2017
a85d7ed0
NC
2018/* Set the sizes of the dynamic sections. */
2019
b34976b6 2020static bfd_boolean
4dfe6ac6
NC
2021elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2022 struct bfd_link_info *info)
a85d7ed0 2023{
0451c93c 2024 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2025 bfd *dynobj;
2026 asection *s;
b34976b6 2027 bfd_boolean relocs;
0451c93c 2028 bfd *ibfd;
a85d7ed0 2029
0451c93c 2030 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
2031 if (htab == NULL)
2032 return FALSE;
2033
0451c93c
MS
2034 dynobj = htab->elf.dynobj;
2035 if (dynobj == NULL)
2036 abort ();
a85d7ed0 2037
0451c93c 2038 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2039 {
2040 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2041 if (bfd_link_executable (info) && !info->nointerp)
a85d7ed0 2042 {
3d4d4302 2043 s = bfd_get_linker_section (dynobj, ".interp");
0451c93c
MS
2044 if (s == NULL)
2045 abort ();
eea6121a 2046 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
a85d7ed0
NC
2047 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2048 }
2049 }
a85d7ed0 2050
0451c93c
MS
2051 /* Set up .got offsets for local syms, and space for local dynamic
2052 relocs. */
c72f2fb2 2053 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
a85d7ed0 2054 {
0451c93c
MS
2055 bfd_signed_vma *local_got;
2056 bfd_signed_vma *end_local_got;
69fc87f1 2057 char *local_tls_type;
0451c93c
MS
2058 bfd_size_type locsymcount;
2059 Elf_Internal_Shdr *symtab_hdr;
2060 asection *srela;
470b557a
AK
2061 struct plt_entry *local_plt;
2062 unsigned int i;
a85d7ed0 2063
0ffa91dd 2064 if (! is_s390_elf (ibfd))
a85d7ed0
NC
2065 continue;
2066
0451c93c 2067 for (s = ibfd->sections; s != NULL; s = s->next)
a85d7ed0 2068 {
00d8c7a9 2069 struct elf_dyn_relocs *p;
0451c93c 2070
6edfbbad 2071 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
a85d7ed0 2072 {
ec338859
AM
2073 if (!bfd_is_abs_section (p->sec)
2074 && bfd_is_abs_section (p->sec->output_section))
2075 {
2076 /* Input section has been discarded, either because
2077 it is a copy of a linkonce section or due to
2078 linker script /DISCARD/, so we'll be discarding
2079 the relocs too. */
2080 }
248866a8 2081 else if (p->count != 0)
ec338859
AM
2082 {
2083 srela = elf_section_data (p->sec)->sreloc;
eea6121a 2084 srela->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
2085 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2086 info->flags |= DF_TEXTREL;
ec338859 2087 }
a85d7ed0
NC
2088 }
2089 }
0451c93c
MS
2090
2091 local_got = elf_local_got_refcounts (ibfd);
2092 if (!local_got)
2093 continue;
2094
0ffa91dd 2095 symtab_hdr = &elf_symtab_hdr (ibfd);
0451c93c
MS
2096 locsymcount = symtab_hdr->sh_info;
2097 end_local_got = local_got + locsymcount;
69fc87f1 2098 local_tls_type = elf_s390_local_got_tls_type (ibfd);
f41345a7
AK
2099 s = htab->elf.sgot;
2100 srela = htab->elf.srelgot;
69fc87f1 2101 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
a85d7ed0 2102 {
0451c93c 2103 if (*local_got > 0)
a85d7ed0 2104 {
eea6121a
AM
2105 *local_got = s->size;
2106 s->size += GOT_ENTRY_SIZE;
69fc87f1 2107 if (*local_tls_type == GOT_TLS_GD)
eea6121a 2108 s->size += GOT_ENTRY_SIZE;
0e1862bb 2109 if (bfd_link_pic (info))
eea6121a 2110 srela->size += sizeof (Elf64_External_Rela);
a85d7ed0
NC
2111 }
2112 else
0451c93c 2113 *local_got = (bfd_vma) -1;
a85d7ed0 2114 }
470b557a
AK
2115
2116 local_plt = elf_s390_local_plt (ibfd);
2117 for (i = 0; i < symtab_hdr->sh_info; i++)
2118 {
2119 if (local_plt[i].plt.refcount > 0)
2120 {
2121 local_plt[i].plt.offset = htab->elf.iplt->size;
2122 htab->elf.iplt->size += PLT_ENTRY_SIZE;
2123 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
2124 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
2125 }
2126 else
2127 local_plt[i].plt.offset = (bfd_vma) -1;
2128 }
0451c93c
MS
2129 }
2130
69fc87f1
MS
2131 if (htab->tls_ldm_got.refcount > 0)
2132 {
2133 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM64
2134 relocs. */
f41345a7
AK
2135 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2136 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
2137 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
69fc87f1
MS
2138 }
2139 else
2140 htab->tls_ldm_got.offset = -1;
2141
0451c93c
MS
2142 /* Allocate global sym .plt and .got entries, and space for global
2143 sym dynamic relocs. */
2c3fc389 2144 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
0451c93c
MS
2145
2146 /* We now have determined the sizes of the various dynamic sections.
2147 Allocate memory for them. */
b34976b6 2148 relocs = FALSE;
0451c93c
MS
2149 for (s = dynobj->sections; s != NULL; s = s->next)
2150 {
2151 if ((s->flags & SEC_LINKER_CREATED) == 0)
2152 continue;
2153
f41345a7
AK
2154 if (s == htab->elf.splt
2155 || s == htab->elf.sgot
2156 || s == htab->elf.sgotplt
470b557a
AK
2157 || s == htab->sdynbss
2158 || s == htab->elf.iplt
2159 || s == htab->elf.igotplt
2160 || s == htab->irelifunc)
0451c93c
MS
2161 {
2162 /* Strip this section if we don't need it; see the
2163 comment below. */
2164 }
0112cd26 2165 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
0451c93c 2166 {
f41345a7 2167 if (s->size != 0 && s != htab->elf.srelplt)
b34976b6 2168 relocs = TRUE;
ec338859 2169
0451c93c
MS
2170 /* We use the reloc_count field as a counter if we need
2171 to copy relocs into the output file. */
2172 s->reloc_count = 0;
2173 }
2174 else
a85d7ed0
NC
2175 {
2176 /* It's not one of our sections, so don't allocate space. */
2177 continue;
2178 }
2179
eea6121a 2180 if (s->size == 0)
a85d7ed0 2181 {
0451c93c
MS
2182 /* If we don't need this section, strip it from the
2183 output file. This is to handle .rela.bss and
2184 .rela.plt. We must create it in
2185 create_dynamic_sections, because it must be created
2186 before the linker maps input sections to output
2187 sections. The linker does that before
2188 adjust_dynamic_symbol is called, and it is that
2189 function which decides whether anything needs to go
2190 into these sections. */
2191
8423293d 2192 s->flags |= SEC_EXCLUDE;
a85d7ed0
NC
2193 continue;
2194 }
2195
c456f082
AM
2196 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2197 continue;
2198
0451c93c
MS
2199 /* Allocate memory for the section contents. We use bfd_zalloc
2200 here in case unused entries are not reclaimed before the
2201 section's contents are written out. This should not happen,
2202 but this way if it does, we get a R_390_NONE reloc instead
2203 of garbage. */
eea6121a 2204 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
0451c93c 2205 if (s->contents == NULL)
b34976b6 2206 return FALSE;
a85d7ed0
NC
2207 }
2208
0451c93c 2209 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2210 {
2211 /* Add some entries to the .dynamic section. We fill in the
2212 values later, in elf_s390_finish_dynamic_sections, but we
2213 must add the entries now so that we get the correct size for
2214 the .dynamic section. The DT_DEBUG entry is filled in by the
2215 dynamic linker and used by the debugger. */
dc810e39 2216#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2217 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 2218
0e1862bb 2219 if (bfd_link_executable (info))
a85d7ed0 2220 {
dc810e39 2221 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2222 return FALSE;
a85d7ed0
NC
2223 }
2224
f41345a7 2225 if (htab->elf.splt->size != 0)
a85d7ed0 2226 {
dc810e39
AM
2227 if (!add_dynamic_entry (DT_PLTGOT, 0)
2228 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2229 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2230 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2231 return FALSE;
a85d7ed0
NC
2232 }
2233
2234 if (relocs)
947216bf
AM
2235 {
2236 if (!add_dynamic_entry (DT_RELA, 0)
2237 || !add_dynamic_entry (DT_RELASZ, 0)
2238 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 2239 return FALSE;
ec338859 2240
0451c93c
MS
2241 /* If any dynamic relocs apply to a read-only section,
2242 then we need a DT_TEXTREL entry. */
248866a8
AM
2243 if ((info->flags & DF_TEXTREL) == 0)
2244 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2c3fc389 2245 info);
ec338859 2246
0451c93c
MS
2247 if ((info->flags & DF_TEXTREL) != 0)
2248 {
2249 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2250 return FALSE;
0451c93c 2251 }
a85d7ed0
NC
2252 }
2253 }
dc810e39 2254#undef add_dynamic_entry
a85d7ed0 2255
b34976b6 2256 return TRUE;
a85d7ed0
NC
2257}
2258
69fc87f1
MS
2259/* Return the base VMA address which should be subtracted from real addresses
2260 when resolving @dtpoff relocation.
2261 This is PT_TLS segment p_vaddr. */
2262
2263static bfd_vma
2c3fc389 2264dtpoff_base (struct bfd_link_info *info)
69fc87f1 2265{
e1918d23
AM
2266 /* If tls_sec is NULL, we should have signalled an error already. */
2267 if (elf_hash_table (info)->tls_sec == NULL)
69fc87f1 2268 return 0;
e1918d23 2269 return elf_hash_table (info)->tls_sec->vma;
69fc87f1
MS
2270}
2271
2272/* Return the relocation value for @tpoff relocation
2273 if STT_TLS virtual address is ADDRESS. */
2274
2275static bfd_vma
2c3fc389 2276tpoff (struct bfd_link_info *info, bfd_vma address)
69fc87f1 2277{
e1918d23 2278 struct elf_link_hash_table *htab = elf_hash_table (info);
69fc87f1 2279
e1918d23
AM
2280 /* If tls_sec is NULL, we should have signalled an error already. */
2281 if (htab->tls_sec == NULL)
69fc87f1 2282 return 0;
e1918d23 2283 return htab->tls_size + htab->tls_sec->vma - address;
69fc87f1
MS
2284}
2285
2286/* Complain if TLS instruction relocation is against an invalid
2287 instruction. */
2288
2289static void
2c3fc389
NC
2290invalid_tls_insn (bfd *input_bfd,
2291 asection *input_section,
2292 Elf_Internal_Rela *rel)
69fc87f1
MS
2293{
2294 reloc_howto_type *howto;
2295
2296 howto = elf_howto_table + ELF64_R_TYPE (rel->r_info);
4eca0228 2297 _bfd_error_handler
d003868e
AM
2298 (_("%B(%A+0x%lx): invalid instruction for TLS relocation %s"),
2299 input_bfd,
2300 input_section,
69fc87f1
MS
2301 (long) rel->r_offset,
2302 howto->name);
77df2968 2303 bfd_set_error (bfd_error_bad_value);
69fc87f1
MS
2304}
2305
a85d7ed0
NC
2306/* Relocate a 390 ELF section. */
2307
b34976b6 2308static bfd_boolean
4dfe6ac6
NC
2309elf_s390_relocate_section (bfd *output_bfd,
2310 struct bfd_link_info *info,
2311 bfd *input_bfd,
2312 asection *input_section,
2313 bfd_byte *contents,
2314 Elf_Internal_Rela *relocs,
2315 Elf_Internal_Sym *local_syms,
2316 asection **local_sections)
a85d7ed0 2317{
0451c93c 2318 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2319 Elf_Internal_Shdr *symtab_hdr;
2320 struct elf_link_hash_entry **sym_hashes;
2321 bfd_vma *local_got_offsets;
a85d7ed0
NC
2322 Elf_Internal_Rela *rel;
2323 Elf_Internal_Rela *relend;
2324
0ffa91dd
NC
2325 BFD_ASSERT (is_s390_elf (input_bfd));
2326
0451c93c 2327 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
2328 if (htab == NULL)
2329 return FALSE;
2330
0ffa91dd 2331 symtab_hdr = &elf_symtab_hdr (input_bfd);
a85d7ed0
NC
2332 sym_hashes = elf_sym_hashes (input_bfd);
2333 local_got_offsets = elf_local_got_offsets (input_bfd);
2334
a85d7ed0
NC
2335 rel = relocs;
2336 relend = relocs + input_section->reloc_count;
2337 for (; rel < relend; rel++)
2338 {
5236c819 2339 unsigned int r_type;
a85d7ed0
NC
2340 reloc_howto_type *howto;
2341 unsigned long r_symndx;
2342 struct elf_link_hash_entry *h;
2343 Elf_Internal_Sym *sym;
2344 asection *sec;
0451c93c 2345 bfd_vma off;
a85d7ed0 2346 bfd_vma relocation;
b34976b6 2347 bfd_boolean unresolved_reloc;
a85d7ed0 2348 bfd_reloc_status_type r;
69fc87f1 2349 int tls_type;
470b557a 2350 asection *base_got = htab->elf.sgot;
a85d7ed0
NC
2351
2352 r_type = ELF64_R_TYPE (rel->r_info);
0451c93c 2353 if (r_type == (int) R_390_GNU_VTINHERIT
947216bf
AM
2354 || r_type == (int) R_390_GNU_VTENTRY)
2355 continue;
5236c819 2356 if (r_type >= (int) R_390_max)
a85d7ed0
NC
2357 {
2358 bfd_set_error (bfd_error_bad_value);
b34976b6 2359 return FALSE;
a85d7ed0 2360 }
a85d7ed0 2361
b491616a 2362 howto = elf_howto_table + r_type;
a85d7ed0 2363 r_symndx = ELF64_R_SYM (rel->r_info);
5236c819 2364
a85d7ed0
NC
2365 h = NULL;
2366 sym = NULL;
2367 sec = NULL;
b34976b6 2368 unresolved_reloc = FALSE;
a85d7ed0
NC
2369 if (r_symndx < symtab_hdr->sh_info)
2370 {
2371 sym = local_syms + r_symndx;
2372 sec = local_sections[r_symndx];
470b557a
AK
2373
2374 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2375 {
2376 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2377 if (local_plt == NULL)
2378 return FALSE;
2379
2380 /* Address of the PLT slot. */
2381 relocation = (htab->elf.iplt->output_section->vma
2382 + htab->elf.iplt->output_offset
2383 + local_plt[r_symndx].plt.offset);
2384
2385 switch (r_type)
2386 {
31db78f6
AK
2387 case R_390_PLTOFF16:
2388 case R_390_PLTOFF32:
2389 case R_390_PLTOFF64:
2390 relocation -= htab->elf.sgot->output_section->vma;
2391 break;
470b557a
AK
2392 case R_390_GOTPLT12:
2393 case R_390_GOTPLT16:
2394 case R_390_GOTPLT20:
2395 case R_390_GOTPLT32:
2396 case R_390_GOTPLT64:
2397 case R_390_GOTPLTENT:
2398 case R_390_GOT12:
2399 case R_390_GOT16:
2400 case R_390_GOT20:
2401 case R_390_GOT32:
2402 case R_390_GOT64:
2403 case R_390_GOTENT:
2404 {
2405 /* Write the PLT slot address into the GOT slot. */
2406 bfd_put_64 (output_bfd, relocation,
2407 htab->elf.sgot->contents +
2408 local_got_offsets[r_symndx]);
2409 relocation = (local_got_offsets[r_symndx] +
2410 htab->elf.sgot->output_offset);
2411
2412 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2413 relocation += htab->elf.sgot->output_section->vma;
2414 break;
2415 }
2416 default:
2417 break;
2418 }
2419 /* The output section is needed later in
2420 finish_dynamic_section when creating the dynamic
2421 relocation. */
2422 local_plt[r_symndx].sec = sec;
2423 goto do_relocation;
2424 }
2425 else
2426 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a85d7ed0
NC
2427 }
2428 else
2429 {
560e09e9 2430 bfd_boolean warned ATTRIBUTE_UNUSED;
62d887d4 2431 bfd_boolean ignored ATTRIBUTE_UNUSED;
0451c93c 2432
b2a8e766
AM
2433 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2434 r_symndx, symtab_hdr, sym_hashes,
2435 h, sec, relocation,
62d887d4 2436 unresolved_reloc, warned, ignored);
a85d7ed0
NC
2437 }
2438
dbaa2011 2439 if (sec != NULL && discarded_section (sec))
e4067dbb 2440 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2441 rel, 1, relend, howto, 0, contents);
ab96bf03 2442
0e1862bb 2443 if (bfd_link_relocatable (info))
ab96bf03
AM
2444 continue;
2445
a85d7ed0
NC
2446 switch (r_type)
2447 {
5236c819
MS
2448 case R_390_GOTPLT12:
2449 case R_390_GOTPLT16:
bd1ea41b 2450 case R_390_GOTPLT20:
5236c819
MS
2451 case R_390_GOTPLT32:
2452 case R_390_GOTPLT64:
2453 case R_390_GOTPLTENT:
2454 /* There are three cases for a GOTPLT relocation. 1) The
2455 relocation is against the jump slot entry of a plt that
2456 will get emitted to the output file. 2) The relocation
2457 is against the jump slot of a plt entry that has been
2458 removed. elf_s390_adjust_gotplt has created a GOT entry
2459 as replacement. 3) The relocation is against a local symbol.
2460 Cases 2) and 3) are the same as the GOT relocation code
2461 so we just have to test for case 1 and fall through for
2462 the other two. */
2463 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2464 {
2465 bfd_vma plt_index;
2466
470b557a
AK
2467 if (s390_is_ifunc_symbol_p (h))
2468 {
2469 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2470 relocation = (plt_index * GOT_ENTRY_SIZE +
2471 htab->elf.igotplt->output_offset);
2472 if (r_type == R_390_GOTPLTENT)
2473 relocation += htab->elf.igotplt->output_section->vma;
2474 }
2475 else
2476 {
2477 /* Calc. index no.
2478 Current offset - size first entry / entry size. */
2479 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2480 PLT_ENTRY_SIZE;
2481
2482 /* Offset in GOT is PLT index plus GOT headers(3)
3b67f094 2483 times 8, addr & GOT addr. */
470b557a
AK
2484 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2485 if (r_type == R_390_GOTPLTENT)
2486 relocation += htab->elf.sgot->output_section->vma;
2487 }
5236c819 2488 unresolved_reloc = FALSE;
5236c819
MS
2489 break;
2490 }
2491 /* Fall through. */
2492
947216bf
AM
2493 case R_390_GOT12:
2494 case R_390_GOT16:
bd1ea41b 2495 case R_390_GOT20:
947216bf
AM
2496 case R_390_GOT32:
2497 case R_390_GOT64:
2498 case R_390_GOTENT:
2499 /* Relocation is to the entry for this symbol in the global
2500 offset table. */
470b557a 2501 if (base_got == NULL)
0451c93c 2502 abort ();
a85d7ed0 2503
947216bf
AM
2504 if (h != NULL)
2505 {
b34976b6 2506 bfd_boolean dyn;
a85d7ed0 2507
947216bf 2508 off = h->got.offset;
0451c93c 2509 dyn = htab->elf.dynamic_sections_created;
470b557a
AK
2510
2511 if (s390_is_ifunc_symbol_p (h))
2512 {
2513 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2514 if (off == (bfd_vma)-1)
2515 {
2516 /* No explicit GOT usage so redirect to the
2517 got.iplt slot. */
2518 base_got = htab->elf.igotplt;
2519 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2520 }
2521 else
2522 {
2523 /* Explicit GOT slots must contain the address
2524 of the PLT slot. This will be handled in
2525 finish_dynamic_symbol. */
2526 }
2527 }
0e1862bb
L
2528 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2529 bfd_link_pic (info),
2530 h)
2531 || (bfd_link_pic (info)
470b557a
AK
2532 && SYMBOL_REFERENCES_LOCAL (info, h))
2533 || (ELF_ST_VISIBILITY (h->other)
2534 && h->root.type == bfd_link_hash_undefweak))
947216bf
AM
2535 {
2536 /* This is actually a static link, or it is a
2537 -Bsymbolic link and the symbol is defined
2538 locally, or the symbol was forced to be local
2539 because of a version file. We must initialize
2540 this entry in the global offset table. Since the
2541 offset must always be a multiple of 2, we use the
2542 least significant bit to record whether we have
2543 initialized it already.
2544
2545 When doing a dynamic link, we create a .rel.got
2546 relocation entry to initialize the value. This
2547 is done in the finish_dynamic_symbol routine. */
2548 if ((off & 1) != 0)
2549 off &= ~1;
2550 else
2551 {
a85d7ed0 2552 bfd_put_64 (output_bfd, relocation,
470b557a 2553 base_got->contents + off);
947216bf
AM
2554 h->got.offset |= 1;
2555 }
a63cc5f7
AK
2556
2557 if ((h->def_regular
0e1862bb 2558 && bfd_link_pic (info)
a63cc5f7
AK
2559 && SYMBOL_REFERENCES_LOCAL (info, h))
2560 /* lgrl rx,sym@GOTENT -> larl rx, sym */
2561 && ((r_type == R_390_GOTENT
2562 && (bfd_get_16 (input_bfd,
2563 contents + rel->r_offset - 2)
2564 & 0xff0f) == 0xc408)
2565 /* lg rx, sym@GOT(r12) -> larl rx, sym */
2566 || (r_type == R_390_GOT20
2567 && (bfd_get_32 (input_bfd,
2568 contents + rel->r_offset - 2)
2569 & 0xff00f000) == 0xe300c000
2570 && bfd_get_8 (input_bfd,
2571 contents + rel->r_offset + 3) == 0x04)))
2572
2573 {
2574 unsigned short new_insn =
2575 (0xc000 | (bfd_get_8 (input_bfd,
2576 contents + rel->r_offset - 1) & 0xf0));
2577 bfd_put_16 (output_bfd, new_insn,
2578 contents + rel->r_offset - 2);
2579 r_type = R_390_PC32DBL;
2580 rel->r_addend = 2;
2581 howto = elf_howto_table + r_type;
2582 relocation = h->root.u.def.value
2583 + h->root.u.def.section->output_section->vma
2584 + h->root.u.def.section->output_offset;
2585 goto do_relocation;
2586 }
947216bf 2587 }
0451c93c 2588 else
b34976b6 2589 unresolved_reloc = FALSE;
947216bf
AM
2590 }
2591 else
2592 {
0451c93c
MS
2593 if (local_got_offsets == NULL)
2594 abort ();
a85d7ed0 2595
947216bf 2596 off = local_got_offsets[r_symndx];
a85d7ed0 2597
947216bf
AM
2598 /* The offset must always be a multiple of 8. We use
2599 the least significant bit to record whether we have
2600 already generated the necessary reloc. */
2601 if ((off & 1) != 0)
2602 off &= ~1;
2603 else
2604 {
2605 bfd_put_64 (output_bfd, relocation,
f41345a7 2606 htab->elf.sgot->contents + off);
a85d7ed0 2607
0e1862bb 2608 if (bfd_link_pic (info))
947216bf
AM
2609 {
2610 asection *s;
2611 Elf_Internal_Rela outrel;
2612 bfd_byte *loc;
a85d7ed0 2613
f41345a7 2614 s = htab->elf.srelgot;
947216bf 2615 if (s == NULL)
0451c93c 2616 abort ();
a85d7ed0 2617
f41345a7
AK
2618 outrel.r_offset = (htab->elf.sgot->output_section->vma
2619 + htab->elf.sgot->output_offset
947216bf
AM
2620 + off);
2621 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
a85d7ed0 2622 outrel.r_addend = relocation;
947216bf
AM
2623 loc = s->contents;
2624 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2625 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2626 }
a85d7ed0 2627
947216bf
AM
2628 local_got_offsets[r_symndx] |= 1;
2629 }
2630 }
a85d7ed0 2631
0451c93c
MS
2632 if (off >= (bfd_vma) -2)
2633 abort ();
2634
470b557a 2635 relocation = base_got->output_offset + off;
0451c93c 2636
ae9a127f
NC
2637 /* For @GOTENT the relocation is against the offset between
2638 the instruction and the symbols entry in the GOT and not
2639 between the start of the GOT and the symbols entry. We
2640 add the vma of the GOT to get the correct value. */
5236c819
MS
2641 if ( r_type == R_390_GOTENT
2642 || r_type == R_390_GOTPLTENT)
470b557a 2643 relocation += base_got->output_section->vma;
a85d7ed0 2644
947216bf 2645 break;
99c79b2e 2646
5236c819
MS
2647 case R_390_GOTOFF16:
2648 case R_390_GOTOFF32:
2649 case R_390_GOTOFF64:
947216bf
AM
2650 /* Relocation is relative to the start of the global offset
2651 table. */
a85d7ed0 2652
d47b13e0
AK
2653 if (h != NULL
2654 && s390_is_ifunc_symbol_p (h)
2655 && h->def_regular
2656 && !bfd_link_executable (info))
2657 {
2658 relocation = (htab->elf.iplt->output_section->vma
2659 + htab->elf.iplt->output_offset
2660 + h->plt.offset
2661 - htab->elf.sgot->output_section->vma);
2662 goto do_relocation;
2663 }
2664
947216bf
AM
2665 /* Note that sgot->output_offset is not involved in this
2666 calculation. We always want the start of .got. If we
2667 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2668 permitted by the ABI, we might have to change this
2669 calculation. */
f41345a7 2670 relocation -= htab->elf.sgot->output_section->vma;
947216bf 2671 break;
a85d7ed0 2672
947216bf 2673 case R_390_GOTPC:
a85d7ed0 2674 case R_390_GOTPCDBL:
947216bf 2675 /* Use global offset table as symbol value. */
f41345a7 2676 relocation = htab->elf.sgot->output_section->vma;
b34976b6 2677 unresolved_reloc = FALSE;
947216bf 2678 break;
a85d7ed0 2679
fb798c50 2680 case R_390_PLT12DBL:
947216bf 2681 case R_390_PLT16DBL:
fb798c50 2682 case R_390_PLT24DBL:
947216bf
AM
2683 case R_390_PLT32:
2684 case R_390_PLT32DBL:
2685 case R_390_PLT64:
2686 /* Relocation is to the entry for this symbol in the
2687 procedure linkage table. */
a85d7ed0 2688
947216bf
AM
2689 /* Resolve a PLT32 reloc against a local symbol directly,
2690 without using the procedure linkage table. */
2691 if (h == NULL)
2692 break;
a85d7ed0 2693
947216bf 2694 if (h->plt.offset == (bfd_vma) -1
31db78f6 2695 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
947216bf
AM
2696 {
2697 /* We didn't make a PLT entry for this symbol. This
2698 happens when statically linking PIC code, or when
2699 using -Bsymbolic. */
2700 break;
2701 }
470b557a
AK
2702 if (s390_is_ifunc_symbol_p (h))
2703 relocation = (htab->elf.iplt->output_section->vma
2704 + htab->elf.iplt->output_offset
2705 + h->plt.offset);
2706 else
2707 relocation = (htab->elf.splt->output_section->vma
2708 + htab->elf.splt->output_offset
2709 + h->plt.offset);
b34976b6 2710 unresolved_reloc = FALSE;
26e41594 2711 break;
5236c819
MS
2712
2713 case R_390_PLTOFF16:
2714 case R_390_PLTOFF32:
2715 case R_390_PLTOFF64:
26e41594
AM
2716 /* Relocation is to the entry for this symbol in the
2717 procedure linkage table relative to the start of the GOT. */
5236c819
MS
2718
2719 /* For local symbols or if we didn't make a PLT entry for
2720 this symbol resolve the symbol directly. */
31db78f6 2721 if (h == NULL
5236c819 2722 || h->plt.offset == (bfd_vma) -1
31db78f6 2723 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
5236c819 2724 {
f41345a7 2725 relocation -= htab->elf.sgot->output_section->vma;
5236c819
MS
2726 break;
2727 }
2728
470b557a
AK
2729 if (s390_is_ifunc_symbol_p (h))
2730 relocation = (htab->elf.iplt->output_section->vma
2731 + htab->elf.iplt->output_offset
2732 + h->plt.offset
2733 - htab->elf.sgot->output_section->vma);
2734 else
2735 relocation = (htab->elf.splt->output_section->vma
2736 + htab->elf.splt->output_offset
2737 + h->plt.offset
2738 - htab->elf.sgot->output_section->vma);
5236c819 2739 unresolved_reloc = FALSE;
947216bf
AM
2740 break;
2741
947216bf 2742 case R_390_PC16:
fb798c50 2743 case R_390_PC12DBL:
947216bf 2744 case R_390_PC16DBL:
fb798c50 2745 case R_390_PC24DBL:
947216bf 2746 case R_390_PC32:
a85d7ed0 2747 case R_390_PC32DBL:
947216bf 2748 case R_390_PC64:
99ba5125
AK
2749 /* The target of these relocs are instruction operands
2750 residing in read-only sections. We cannot emit a runtime
2751 reloc for it. */
2752 if (h != NULL
2753 && s390_is_ifunc_symbol_p (h)
2754 && h->def_regular
2755 && bfd_link_pic (info))
2756 {
2757 relocation = (htab->elf.iplt->output_section->vma
2758 + htab->elf.iplt->output_offset
2759 + h->plt.offset);
2760 goto do_relocation;
2761 }
1a0670f3 2762 /* Fall through. */
99ba5125
AK
2763
2764 case R_390_8:
2765 case R_390_16:
2766 case R_390_32:
2767 case R_390_64:
470b557a
AK
2768
2769 if (h != NULL
2770 && s390_is_ifunc_symbol_p (h)
2771 && h->def_regular)
2772 {
0e1862bb 2773 if (!bfd_link_pic (info) || !h->non_got_ref)
470b557a
AK
2774 {
2775 /* For a non-shared object STT_GNU_IFUNC symbol must
2776 go through PLT. */
2777 relocation = (htab->elf.iplt->output_section->vma
2778 + htab->elf.iplt->output_offset
2779 + h ->plt.offset);
2780 goto do_relocation;
2781 }
2782 else
2783 {
2784 /* For shared objects a runtime relocation is needed. */
2785
2786 Elf_Internal_Rela outrel;
2787 asection *sreloc;
2788
2789 /* Need a dynamic relocation to get the real function
2790 address. */
2791 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2792 info,
2793 input_section,
2794 rel->r_offset);
2795 if (outrel.r_offset == (bfd_vma) -1
2796 || outrel.r_offset == (bfd_vma) -2)
2797 abort ();
2798
2799 outrel.r_offset += (input_section->output_section->vma
2800 + input_section->output_offset);
2801
2802 if (h->dynindx == -1
2803 || h->forced_local
0e1862bb 2804 || bfd_link_executable (info))
470b557a
AK
2805 {
2806 /* This symbol is resolved locally. */
2807 outrel.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
2808 outrel.r_addend = (h->root.u.def.value
2809 + h->root.u.def.section->output_section->vma
2810 + h->root.u.def.section->output_offset);
2811 }
2812 else
2813 {
2814 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2815 outrel.r_addend = 0;
2816 }
2817
2818 sreloc = htab->elf.irelifunc;
2819 elf_append_rela (output_bfd, sreloc, &outrel);
2820
2821 /* If this reloc is against an external symbol, we
2822 do not want to fiddle with the addend. Otherwise,
2823 we need to include the symbol value so that it
2824 becomes an addend for the dynamic reloc. For an
2825 internal symbol, we have updated addend. */
2826 continue;
2827 }
2828 }
2829
b1e24c02 2830 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
2831 break;
2832
0e1862bb 2833 if ((bfd_link_pic (info)
82058a73
MS
2834 && (h == NULL
2835 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2836 || h->root.type != bfd_link_hash_undefweak)
0451c93c 2837 && ((r_type != R_390_PC16
fb798c50 2838 && r_type != R_390_PC12DBL
0451c93c 2839 && r_type != R_390_PC16DBL
fb798c50 2840 && r_type != R_390_PC24DBL
0451c93c
MS
2841 && r_type != R_390_PC32
2842 && r_type != R_390_PC32DBL
2843 && r_type != R_390_PC64)
8c21ca21 2844 || !SYMBOL_CALLS_LOCAL (info, h)))
64285810 2845 || (ELIMINATE_COPY_RELOCS
0e1862bb 2846 && !bfd_link_pic (info)
0451c93c
MS
2847 && h != NULL
2848 && h->dynindx != -1
f5385ebf
AM
2849 && !h->non_got_ref
2850 && ((h->def_dynamic
2851 && !h->def_regular)
0451c93c
MS
2852 || h->root.type == bfd_link_hash_undefweak
2853 || h->root.type == bfd_link_hash_undefined)))
947216bf
AM
2854 {
2855 Elf_Internal_Rela outrel;
b34976b6 2856 bfd_boolean skip, relocate;
0451c93c 2857 asection *sreloc;
947216bf 2858 bfd_byte *loc;
a85d7ed0 2859
947216bf
AM
2860 /* When generating a shared object, these relocations
2861 are copied into the output file to be resolved at run
2862 time. */
b34976b6
AM
2863 skip = FALSE;
2864 relocate = FALSE;
a85d7ed0 2865
c629eae0
JJ
2866 outrel.r_offset =
2867 _bfd_elf_section_offset (output_bfd, info, input_section,
2868 rel->r_offset);
2869 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2870 skip = TRUE;
0bb2d96a 2871 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2872 skip = TRUE, relocate = TRUE;
a85d7ed0 2873
947216bf
AM
2874 outrel.r_offset += (input_section->output_section->vma
2875 + input_section->output_offset);
a85d7ed0 2876
947216bf 2877 if (skip)
0bb2d96a 2878 memset (&outrel, 0, sizeof outrel);
947216bf 2879 else if (h != NULL
0451c93c
MS
2880 && h->dynindx != -1
2881 && (r_type == R_390_PC16
fb798c50 2882 || r_type == R_390_PC12DBL
0451c93c 2883 || r_type == R_390_PC16DBL
fb798c50 2884 || r_type == R_390_PC24DBL
0451c93c
MS
2885 || r_type == R_390_PC32
2886 || r_type == R_390_PC32DBL
2887 || r_type == R_390_PC64
0e1862bb 2888 || !bfd_link_pic (info)
8c21ca21 2889 || !SYMBOLIC_BIND (info, h)
f5385ebf 2890 || !h->def_regular))
947216bf
AM
2891 {
2892 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
27018c3f 2893 outrel.r_addend = rel->r_addend;
947216bf
AM
2894 }
2895 else
2896 {
0451c93c 2897 /* This symbol is local, or marked to become local. */
90ced0dd 2898 outrel.r_addend = relocation + rel->r_addend;
b5727d75
MS
2899 if (r_type == R_390_64)
2900 {
2901 relocate = TRUE;
2902 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
b5727d75
MS
2903 }
2904 else
2905 {
2906 long sindx;
2907
90ced0dd 2908 if (bfd_is_abs_section (sec))
b5727d75
MS
2909 sindx = 0;
2910 else if (sec == NULL || sec->owner == NULL)
2911 {
2912 bfd_set_error(bfd_error_bad_value);
2913 return FALSE;
2914 }
2915 else
2916 {
2917 asection *osec;
2918
2919 osec = sec->output_section;
2920 sindx = elf_section_data (osec)->dynindx;
74541ad4
AM
2921
2922 if (sindx == 0)
2923 {
2924 osec = htab->elf.text_index_section;
2925 sindx = elf_section_data (osec)->dynindx;
2926 }
2927 BFD_ASSERT (sindx != 0);
90ced0dd
MS
2928
2929 /* We are turning this relocation into one
2930 against a section symbol, so subtract out
2931 the output section's address but not the
2932 offset of the input section in the output
2933 section. */
90ced0dd 2934 outrel.r_addend -= osec->vma;
b5727d75
MS
2935 }
2936 outrel.r_info = ELF64_R_INFO (sindx, r_type);
b5727d75 2937 }
0451c93c 2938 }
a85d7ed0 2939
0451c93c
MS
2940 sreloc = elf_section_data (input_section)->sreloc;
2941 if (sreloc == NULL)
2942 abort ();
2943
947216bf
AM
2944 loc = sreloc->contents;
2945 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2946 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
a85d7ed0 2947
947216bf
AM
2948 /* If this reloc is against an external symbol, we do
2949 not want to fiddle with the addend. Otherwise, we
2950 need to include the symbol value so that it becomes
2951 an addend for the dynamic reloc. */
2952 if (! relocate)
2953 continue;
2954 }
a85d7ed0 2955
947216bf 2956 break;
a85d7ed0 2957
69fc87f1
MS
2958 /* Relocations for tls literal pool entries. */
2959 case R_390_TLS_IE64:
0e1862bb 2960 if (bfd_link_pic (info))
69fc87f1
MS
2961 {
2962 Elf_Internal_Rela outrel;
2963 asection *sreloc;
2964 bfd_byte *loc;
2965
2966 outrel.r_offset = rel->r_offset
2967 + input_section->output_section->vma
2968 + input_section->output_offset;
2969 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2970 sreloc = elf_section_data (input_section)->sreloc;
2971 if (sreloc == NULL)
2972 abort ();
2973 loc = sreloc->contents;
2974 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2975 bfd_elf64_swap_reloc_out (output_bfd, &outrel, loc);
2976 }
ae9a127f 2977 /* Fall through. */
69fc87f1
MS
2978
2979 case R_390_TLS_GD64:
2980 case R_390_TLS_GOTIE64:
2981 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2982 tls_type = GOT_UNKNOWN;
2983 if (h == NULL && local_got_offsets)
2984 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2985 else if (h != NULL)
2986 {
2987 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb 2988 if (!bfd_link_pic (info) && h->dynindx == -1 && tls_type >= GOT_TLS_IE)
69fc87f1
MS
2989 r_type = R_390_TLS_LE64;
2990 }
2991 if (r_type == R_390_TLS_GD64 && tls_type >= GOT_TLS_IE)
2992 r_type = R_390_TLS_IE64;
2993
2994 if (r_type == R_390_TLS_LE64)
2995 {
2996 /* This relocation gets optimized away by the local exec
2997 access optimization. */
2998 BFD_ASSERT (! unresolved_reloc);
2999 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3000 contents + rel->r_offset);
3001 continue;
3002 }
3003
f41345a7 3004 if (htab->elf.sgot == NULL)
69fc87f1
MS
3005 abort ();
3006
3007 if (h != NULL)
3008 off = h->got.offset;
3009 else
3010 {
3011 if (local_got_offsets == NULL)
3012 abort ();
3013
3014 off = local_got_offsets[r_symndx];
3015 }
3016
3017 emit_tls_relocs:
3018
3019 if ((off & 1) != 0)
3020 off &= ~1;
26e41594 3021 else
69fc87f1
MS
3022 {
3023 Elf_Internal_Rela outrel;
3024 bfd_byte *loc;
3025 int dr_type, indx;
3026
f41345a7 3027 if (htab->elf.srelgot == NULL)
69fc87f1
MS
3028 abort ();
3029
f41345a7
AK
3030 outrel.r_offset = (htab->elf.sgot->output_section->vma
3031 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
3032
3033 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3034 if (r_type == R_390_TLS_GD64)
3035 dr_type = R_390_TLS_DTPMOD;
3036 else
3037 dr_type = R_390_TLS_TPOFF;
3038 if (dr_type == R_390_TLS_TPOFF && indx == 0)
3039 outrel.r_addend = relocation - dtpoff_base (info);
3040 else
3041 outrel.r_addend = 0;
3042 outrel.r_info = ELF64_R_INFO (indx, dr_type);
f41345a7
AK
3043 loc = htab->elf.srelgot->contents;
3044 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
3045 * sizeof (Elf64_External_Rela);
3046 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3047
3048 if (r_type == R_390_TLS_GD64)
3049 {
3050 if (indx == 0)
3051 {
3052 BFD_ASSERT (! unresolved_reloc);
3053 bfd_put_64 (output_bfd,
3054 relocation - dtpoff_base (info),
f41345a7 3055 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
3056 }
3057 else
3058 {
3059 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_DTPOFF);
3060 outrel.r_offset += GOT_ENTRY_SIZE;
3061 outrel.r_addend = 0;
f41345a7 3062 htab->elf.srelgot->reloc_count++;
69fc87f1
MS
3063 loc += sizeof (Elf64_External_Rela);
3064 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3065 }
3066 }
3067
3068 if (h != NULL)
3069 h->got.offset |= 1;
3070 else
3071 local_got_offsets[r_symndx] |= 1;
3072 }
3073
3074 if (off >= (bfd_vma) -2)
3075 abort ();
3076 if (r_type == ELF64_R_TYPE (rel->r_info))
3077 {
f41345a7 3078 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 3079 if (r_type == R_390_TLS_IE64 || r_type == R_390_TLS_IEENT)
f41345a7 3080 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
3081 unresolved_reloc = FALSE;
3082 }
3083 else
3084 {
f41345a7 3085 bfd_put_64 (output_bfd, htab->elf.sgot->output_offset + off,
69fc87f1
MS
3086 contents + rel->r_offset);
3087 continue;
3088 }
3089 break;
3090
3091 case R_390_TLS_GOTIE12:
bd1ea41b 3092 case R_390_TLS_GOTIE20:
69fc87f1
MS
3093 case R_390_TLS_IEENT:
3094 if (h == NULL)
3095 {
3096 if (local_got_offsets == NULL)
3097 abort();
3098 off = local_got_offsets[r_symndx];
0e1862bb 3099 if (bfd_link_pic (info))
69fc87f1
MS
3100 goto emit_tls_relocs;
3101 }
3102 else
3103 {
3104 off = h->got.offset;
3105 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb 3106 if (bfd_link_pic (info) || h->dynindx != -1 || tls_type < GOT_TLS_IE)
69fc87f1
MS
3107 goto emit_tls_relocs;
3108 }
3109
f41345a7 3110 if (htab->elf.sgot == NULL)
69fc87f1
MS
3111 abort ();
3112
3113 BFD_ASSERT (! unresolved_reloc);
3114 bfd_put_64 (output_bfd, -tpoff (info, relocation),
f41345a7
AK
3115 htab->elf.sgot->contents + off);
3116 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 3117 if (r_type == R_390_TLS_IEENT)
f41345a7 3118 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
3119 unresolved_reloc = FALSE;
3120 break;
3121
3122 case R_390_TLS_LDM64:
0e1862bb 3123 if (! bfd_link_pic (info))
69fc87f1
MS
3124 /* The literal pool entry this relocation refers to gets ignored
3125 by the optimized code of the local exec model. Do nothing
3126 and the value will turn out zero. */
3127 continue;
3128
f41345a7 3129 if (htab->elf.sgot == NULL)
69fc87f1
MS
3130 abort ();
3131
3132 off = htab->tls_ldm_got.offset;
3133 if (off & 1)
3134 off &= ~1;
3135 else
3136 {
3137 Elf_Internal_Rela outrel;
3138 bfd_byte *loc;
3139
f41345a7 3140 if (htab->elf.srelgot == NULL)
69fc87f1
MS
3141 abort ();
3142
f41345a7
AK
3143 outrel.r_offset = (htab->elf.sgot->output_section->vma
3144 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
3145
3146 bfd_put_64 (output_bfd, 0,
f41345a7 3147 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
3148 outrel.r_info = ELF64_R_INFO (0, R_390_TLS_DTPMOD);
3149 outrel.r_addend = 0;
f41345a7
AK
3150 loc = htab->elf.srelgot->contents;
3151 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
3152 * sizeof (Elf64_External_Rela);
3153 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3154 htab->tls_ldm_got.offset |= 1;
3155 }
f41345a7 3156 relocation = htab->elf.sgot->output_offset + off;
26e41594 3157 unresolved_reloc = FALSE;
69fc87f1
MS
3158 break;
3159
3160 case R_390_TLS_LE64:
3cbc1e5e 3161 if (bfd_link_dll (info))
69fc87f1
MS
3162 {
3163 /* Linking a shared library with non-fpic code requires
3164 a R_390_TLS_TPOFF relocation. */
3165 Elf_Internal_Rela outrel;
3166 asection *sreloc;
3167 bfd_byte *loc;
3168 int indx;
3169
3170 outrel.r_offset = rel->r_offset
3171 + input_section->output_section->vma
3172 + input_section->output_offset;
3173 if (h != NULL && h->dynindx != -1)
3174 indx = h->dynindx;
3175 else
3176 indx = 0;
3177 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_TPOFF);
3178 if (indx == 0)
3179 outrel.r_addend = relocation - dtpoff_base (info);
3180 else
3181 outrel.r_addend = 0;
3182 sreloc = elf_section_data (input_section)->sreloc;
3183 if (sreloc == NULL)
3184 abort ();
3185 loc = sreloc->contents;
3186 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
3187 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3188 }
3189 else
3190 {
3191 BFD_ASSERT (! unresolved_reloc);
3192 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3193 contents + rel->r_offset);
3194 }
3195 continue;
3196
3197 case R_390_TLS_LDO64:
0e1862bb 3198 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
69fc87f1
MS
3199 relocation -= dtpoff_base (info);
3200 else
3201 /* When converting LDO to LE, we must negate. */
3202 relocation = -tpoff (info, relocation);
3203 break;
3204
3205 /* Relocations for tls instructions. */
3206 case R_390_TLS_LOAD:
3207 case R_390_TLS_GDCALL:
3208 case R_390_TLS_LDCALL:
3209 tls_type = GOT_UNKNOWN;
3210 if (h == NULL && local_got_offsets)
3211 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3212 else if (h != NULL)
3213 tls_type = elf_s390_hash_entry(h)->tls_type;
3214
3215 if (tls_type == GOT_TLS_GD)
3216 continue;
3217
3218 if (r_type == R_390_TLS_LOAD)
3219 {
0e1862bb 3220 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3221 {
3222 /* IE->LE transition. Four valid cases:
3223 lg %rx,(0,%ry) -> sllg %rx,%ry,0
3224 lg %rx,(%ry,0) -> sllg %rx,%ry,0
3225 lg %rx,(%ry,%r12) -> sllg %rx,%ry,0
3226 lg %rx,(%r12,%ry) -> sllg %rx,%ry,0 */
3227 unsigned int insn0, insn1, ry;
3228
3229 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3230 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3231 if (insn1 != 0x0004)
3232 invalid_tls_insn (input_bfd, input_section, rel);
3233 ry = 0;
3234 if ((insn0 & 0xff00f000) == 0xe3000000)
3235 /* lg %rx,0(%ry,0) -> sllg %rx,%ry,0 */
3236 ry = (insn0 & 0x000f0000);
3237 else if ((insn0 & 0xff0f0000) == 0xe3000000)
3238 /* lg %rx,0(0,%ry) -> sllg %rx,%ry,0 */
3239 ry = (insn0 & 0x0000f000) << 4;
3240 else if ((insn0 & 0xff00f000) == 0xe300c000)
3241 /* lg %rx,0(%ry,%r12) -> sllg %rx,%ry,0 */
3242 ry = (insn0 & 0x000f0000);
3243 else if ((insn0 & 0xff0f0000) == 0xe30c0000)
3244 /* lg %rx,0(%r12,%ry) -> sllg %rx,%ry,0 */
3245 ry = (insn0 & 0x0000f000) << 4;
3246 else
3247 invalid_tls_insn (input_bfd, input_section, rel);
3248 insn0 = 0xeb000000 | (insn0 & 0x00f00000) | ry;
3249 insn1 = 0x000d;
3250 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3251 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3252 }
3253 }
3254 else if (r_type == R_390_TLS_GDCALL)
3255 {
3256 unsigned int insn0, insn1;
3257
3258 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3259 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3260 if ((insn0 & 0xffff0000) != 0xc0e50000)
3261 invalid_tls_insn (input_bfd, input_section, rel);
0e1862bb 3262 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3263 {
3264 /* GD->LE transition.
3265 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3266 insn0 = 0xc0040000;
3267 insn1 = 0x0000;
3268 }
3269 else
3270 {
3271 /* GD->IE transition.
3272 brasl %r14,__tls_get_addr@plt -> lg %r2,0(%r2,%r12) */
3273 insn0 = 0xe322c000;
3274 insn1 = 0x0004;
3275 }
3276 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3277 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3278 }
3279 else if (r_type == R_390_TLS_LDCALL)
3280 {
0e1862bb 3281 if (!bfd_link_pic (info))
69fc87f1
MS
3282 {
3283 unsigned int insn0, insn1;
3284
3285 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3286 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3287 if ((insn0 & 0xffff0000) != 0xc0e50000)
3288 invalid_tls_insn (input_bfd, input_section, rel);
3289 /* LD->LE transition.
3290 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3291 insn0 = 0xc0040000;
3292 insn1 = 0x0000;
3293 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3294 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3295 }
3296 }
3297 continue;
3298
947216bf
AM
3299 default:
3300 break;
3301 }
a85d7ed0 3302
239e1f3a
AM
3303 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3304 because such sections are not SEC_ALLOC and thus ld.so will
3305 not process them. */
0451c93c 3306 if (unresolved_reloc
239e1f3a 3307 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3308 && h->def_dynamic)
3309 && _bfd_elf_section_offset (output_bfd, info, input_section,
3310 rel->r_offset) != (bfd_vma) -1)
4eca0228 3311 _bfd_error_handler
843fe662 3312 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
d003868e
AM
3313 input_bfd,
3314 input_section,
0451c93c 3315 (long) rel->r_offset,
843fe662 3316 howto->name,
0451c93c
MS
3317 h->root.root.string);
3318
470b557a
AK
3319 do_relocation:
3320
fb798c50
AK
3321 /* When applying a 24 bit reloc we need to start one byte
3322 earlier. Otherwise the 32 bit get/put bfd operations might
3323 access a byte after the actual section. */
3324 if (r_type == R_390_PC24DBL
3325 || r_type == R_390_PLT24DBL)
3326 rel->r_offset--;
3327
bd1ea41b
MS
3328 if (r_type == R_390_20
3329 || r_type == R_390_GOT20
3330 || r_type == R_390_GOTPLT20
3331 || r_type == R_390_TLS_GOTIE20)
3332 {
3333 relocation += rel->r_addend;
3334 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3335 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3336 contents, rel->r_offset,
3337 relocation, 0);
3338 }
3339 else
3340 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
a85d7ed0
NC
3341 contents, rel->r_offset,
3342 relocation, rel->r_addend);
3343
3344 if (r != bfd_reloc_ok)
3345 {
0451c93c 3346 const char *name;
ec338859 3347
0451c93c
MS
3348 if (h != NULL)
3349 name = h->root.root.string;
3350 else
a85d7ed0 3351 {
0451c93c
MS
3352 name = bfd_elf_string_from_elf_section (input_bfd,
3353 symtab_hdr->sh_link,
3354 sym->st_name);
3355 if (name == NULL)
b34976b6 3356 return FALSE;
0451c93c
MS
3357 if (*name == '\0')
3358 name = bfd_section_name (input_bfd, sec);
3359 }
ec338859 3360
0451c93c 3361 if (r == bfd_reloc_overflow)
1a72702b
AM
3362 (*info->callbacks->reloc_overflow)
3363 (info, (h ? &h->root : NULL), name, howto->name,
3364 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
0451c93c
MS
3365 else
3366 {
4eca0228 3367 _bfd_error_handler
d003868e
AM
3368 (_("%B(%A+0x%lx): reloc against `%s': error %d"),
3369 input_bfd, input_section,
0451c93c 3370 (long) rel->r_offset, name, (int) r);
b34976b6 3371 return FALSE;
a85d7ed0
NC
3372 }
3373 }
3374 }
3375
b34976b6 3376 return TRUE;
a85d7ed0
NC
3377}
3378
470b557a
AK
3379/* Generate the PLT slots together with the dynamic relocations needed
3380 for IFUNC symbols. */
3381
3382static void
3383elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3384 struct bfd_link_info *info,
3385 struct elf_link_hash_entry *h,
3386 struct elf_s390_link_hash_table *htab,
3387 bfd_vma plt_offset,
3388 bfd_vma resolver_address)
3389{
3390 bfd_vma plt_index;
3391 bfd_vma got_offset;
3392 Elf_Internal_Rela rela;
3393 bfd_byte *loc;
3394 asection *plt, *gotplt, *relplt;
3395
3396 if (htab->elf.iplt == NULL
3397 || htab->elf.igotplt == NULL
3398 || htab->elf.irelplt == NULL)
3399 abort ();
3400
3401 /* Index of the PLT slot within iplt section. */
3402 plt_index = plt_offset / PLT_ENTRY_SIZE;
3403 plt = htab->elf.iplt;
3404 /* Offset into the igot.plt section. */
3405 got_offset = plt_index * GOT_ENTRY_SIZE;
3406 gotplt = htab->elf.igotplt;
3407 relplt = htab->elf.irelplt;
3408
3409 /* Fill in the blueprint of a PLT. */
3410 memcpy (plt->contents + plt_offset, elf_s390x_plt_entry,
3411 PLT_ENTRY_SIZE);
3412
3413 /* Fixup the relative address to the GOT entry */
3414 bfd_put_32 (output_bfd,
3415 (gotplt->output_section->vma +
3416 gotplt->output_offset + got_offset
3417 - (plt->output_section->vma +
3418 plt->output_offset +
3419 plt_offset))/2,
3420 plt->contents + plt_offset + 2);
3421 /* Fixup the relative branch to PLT 0 */
3422 bfd_put_32 (output_bfd, - (plt->output_offset +
3423 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3424 plt->contents + plt_offset + 24);
3425 /* Fixup offset into .rela.plt section. */
3426 bfd_put_32 (output_bfd, relplt->output_offset +
3427 plt_index * sizeof (Elf64_External_Rela),
3428 plt->contents + plt_offset + 28);
3429
3430 /* Fill in the entry in the global offset table.
3431 Points to instruction after GOT offset. */
3432 bfd_put_64 (output_bfd,
3433 (plt->output_section->vma
3434 + plt->output_offset
3435 + plt_offset
3436 + 14),
3437 gotplt->contents + got_offset);
3438
3439 /* Fill in the entry in the .rela.plt section. */
3440 rela.r_offset = (gotplt->output_section->vma
3441 + gotplt->output_offset
3442 + got_offset);
3443
3444 if (!h
3445 || h->dynindx == -1
0e1862bb 3446 || ((bfd_link_executable (info)
470b557a
AK
3447 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3448 && h->def_regular))
3449 {
3450 /* The symbol can be locally resolved. */
3451 rela.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
3452 rela.r_addend = resolver_address;
3453 }
3454 else
3455 {
3456 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3457 rela.r_addend = 0;
3458 }
3459
3460 loc = relplt->contents + plt_index * sizeof (Elf64_External_Rela);
3461 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3462}
3463
3464
a85d7ed0
NC
3465/* Finish up dynamic symbol handling. We set the contents of various
3466 dynamic sections here. */
3467
b34976b6 3468static bfd_boolean
4dfe6ac6
NC
3469elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3470 struct bfd_link_info *info,
3471 struct elf_link_hash_entry *h,
3472 Elf_Internal_Sym *sym)
a85d7ed0 3473{
0451c93c 3474 struct elf_s390_link_hash_table *htab;
470b557a 3475 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
a85d7ed0 3476
0451c93c 3477 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
3478 if (htab == NULL)
3479 return FALSE;
a85d7ed0
NC
3480
3481 if (h->plt.offset != (bfd_vma) -1)
3482 {
a85d7ed0 3483 bfd_vma plt_index;
0451c93c
MS
3484 bfd_vma got_offset;
3485 Elf_Internal_Rela rela;
947216bf 3486 bfd_byte *loc;
a85d7ed0
NC
3487
3488 /* This symbol has an entry in the procedure linkage table. Set
947216bf 3489 it up. */
0a511368 3490 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
470b557a 3491 {
0a511368
AK
3492 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3493 htab, h->plt.offset,
3494 eh->ifunc_resolver_address +
3495 eh->ifunc_resolver_section->output_offset +
3496 eh->ifunc_resolver_section->output_section->vma);
3497
3498 /* Do not return yet. Handling of explicit GOT slots of
3499 IFUNC symbols is below. */
470b557a
AK
3500 }
3501 else
3502 {
3503 if (h->dynindx == -1
3504 || htab->elf.splt == NULL
3505 || htab->elf.sgotplt == NULL
3506 || htab->elf.srelplt == NULL)
3507 abort ();
a85d7ed0 3508
470b557a
AK
3509 /* Calc. index no.
3510 Current offset - size first entry / entry size. */
3511 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
a85d7ed0 3512
470b557a
AK
3513 /* Offset in GOT is PLT index plus GOT headers(3) times 8,
3514 addr & GOT addr. */
3515 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
a85d7ed0 3516
470b557a
AK
3517 /* Fill in the blueprint of a PLT. */
3518 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390x_plt_entry,
3519 PLT_ENTRY_SIZE);
3520
3521 /* Fixup the relative address to the GOT entry */
3522 bfd_put_32 (output_bfd,
3523 (htab->elf.sgotplt->output_section->vma +
3524 htab->elf.sgotplt->output_offset + got_offset
3525 - (htab->elf.splt->output_section->vma +
3526 htab->elf.splt->output_offset +
3527 h->plt.offset))/2,
3528 htab->elf.splt->contents + h->plt.offset + 2);
3529 /* Fixup the relative branch to PLT 0 */
3530 bfd_put_32 (output_bfd, - (PLT_FIRST_ENTRY_SIZE +
3531 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3532 htab->elf.splt->contents + h->plt.offset + 24);
3533 /* Fixup offset into .rela.plt section. */
3534 bfd_put_32 (output_bfd, plt_index * sizeof (Elf64_External_Rela),
3535 htab->elf.splt->contents + h->plt.offset + 28);
3536
3537 /* Fill in the entry in the global offset table.
3538 Points to instruction after GOT offset. */
3539 bfd_put_64 (output_bfd,
3540 (htab->elf.splt->output_section->vma
3541 + htab->elf.splt->output_offset
3542 + h->plt.offset
3543 + 14),
3544 htab->elf.sgotplt->contents + got_offset);
3545
3546 /* Fill in the entry in the .rela.plt section. */
3547 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3548 + htab->elf.sgotplt->output_offset
3549 + got_offset);
3550 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3551 rela.r_addend = 0;
3552 loc = htab->elf.srelplt->contents + plt_index *
3553 sizeof (Elf64_External_Rela);
3554 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3555
3556 if (!h->def_regular)
3557 {
3558 /* Mark the symbol as undefined, rather than as defined in
3559 the .plt section. Leave the value alone. This is a clue
3560 for the dynamic linker, to make function pointer
3561 comparisons work between an application and shared
3562 library. */
3563 sym->st_shndx = SHN_UNDEF;
3564 }
a85d7ed0
NC
3565 }
3566 }
3567
69fc87f1
MS
3568 if (h->got.offset != (bfd_vma) -1
3569 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3570 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3571 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
a85d7ed0 3572 {
a85d7ed0 3573 Elf_Internal_Rela rela;
947216bf 3574 bfd_byte *loc;
a85d7ed0
NC
3575
3576 /* This symbol has an entry in the global offset table. Set it
947216bf 3577 up. */
f41345a7 3578 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
0451c93c 3579 abort ();
a85d7ed0 3580
f41345a7
AK
3581 rela.r_offset = (htab->elf.sgot->output_section->vma
3582 + htab->elf.sgot->output_offset
dc810e39 3583 + (h->got.offset &~ (bfd_vma) 1));
a85d7ed0 3584
470b557a
AK
3585 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3586 {
0e1862bb 3587 if (bfd_link_pic (info))
470b557a
AK
3588 {
3589 /* An explicit GOT slot usage needs GLOB_DAT. If the
3590 symbol references local the implicit got.iplt slot
3591 will be used and the IRELATIVE reloc has been created
3592 above. */
3593 goto do_glob_dat;
3594 }
3595 else
3596 {
3597 /* For non-shared objects explicit GOT slots must be
3598 filled with the PLT slot address for pointer
3599 equality reasons. */
3600 bfd_put_64 (output_bfd, (htab->elf.iplt->output_section->vma
3601 + htab->elf.iplt->output_offset
3602 + h->plt.offset),
3603 htab->elf.sgot->contents + h->got.offset);
3604 return TRUE;
3605 }
3606 }
0e1862bb 3607 else if (bfd_link_pic (info)
ceada896 3608 && SYMBOL_REFERENCES_LOCAL (info, h))
947216bf 3609 {
470b557a
AK
3610 /* If this is a static link, or it is a -Bsymbolic link and
3611 the symbol is defined locally or was forced to be local
3612 because of a version file, we just want to emit a
3613 RELATIVE reloc. The entry in the global offset table
3614 will already have been initialized in the
3615 relocate_section function. */
8c21ca21
AK
3616 if (!h->def_regular)
3617 return FALSE;
0451c93c 3618 BFD_ASSERT((h->got.offset & 1) != 0);
947216bf
AM
3619 rela.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
3620 rela.r_addend = (h->root.u.def.value
3621 + h->root.u.def.section->output_section->vma
3622 + h->root.u.def.section->output_offset);
3623 }
a85d7ed0
NC
3624 else
3625 {
3626 BFD_ASSERT((h->got.offset & 1) == 0);
ceada896 3627 do_glob_dat:
f41345a7 3628 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
a85d7ed0 3629 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_GLOB_DAT);
947216bf
AM
3630 rela.r_addend = 0;
3631 }
a85d7ed0 3632
f41345a7
AK
3633 loc = htab->elf.srelgot->contents;
3634 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
0451c93c 3635 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3636 }
3637
f5385ebf 3638 if (h->needs_copy)
a85d7ed0 3639 {
a85d7ed0 3640 Elf_Internal_Rela rela;
947216bf 3641 bfd_byte *loc;
a85d7ed0
NC
3642
3643 /* This symbols needs a copy reloc. Set it up. */
3644
0451c93c
MS
3645 if (h->dynindx == -1
3646 || (h->root.type != bfd_link_hash_defined
3647 && h->root.type != bfd_link_hash_defweak)
3648 || htab->srelbss == NULL)
3649 abort ();
a85d7ed0
NC
3650
3651 rela.r_offset = (h->root.u.def.value
3652 + h->root.u.def.section->output_section->vma
3653 + h->root.u.def.section->output_offset);
3654 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_COPY);
3655 rela.r_addend = 0;
947216bf
AM
3656 loc = htab->srelbss->contents;
3657 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
0451c93c 3658 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3659 }
3660
3661 /* Mark some specially defined symbols as absolute. */
9637f6ef 3662 if (h == htab->elf.hdynamic
22edb2f1
RS
3663 || h == htab->elf.hgot
3664 || h == htab->elf.hplt)
a85d7ed0
NC
3665 sym->st_shndx = SHN_ABS;
3666
b34976b6 3667 return TRUE;
a85d7ed0
NC
3668}
3669
0451c93c
MS
3670/* Used to decide how to sort relocs in an optimal manner for the
3671 dynamic linker, before writing them out. */
3672
3673static enum elf_reloc_type_class
7e612e98
AM
3674elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3675 const asection *rel_sec ATTRIBUTE_UNUSED,
3676 const Elf_Internal_Rela *rela)
0451c93c 3677{
0f042c67
AK
3678 bfd *abfd = info->output_bfd;
3679 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3680 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3681 unsigned long r_symndx = ELF64_R_SYM (rela->r_info);
3682 Elf_Internal_Sym sym;
3683
3684 if (htab->elf.dynsym == NULL
3685 || !bed->s->swap_symbol_in (abfd,
3686 (htab->elf.dynsym->contents
3687 + r_symndx * bed->s->sizeof_sym),
3688 0, &sym))
3689 abort ();
3690
3691 /* Check relocation against STT_GNU_IFUNC symbol. */
3692 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3693 return reloc_class_ifunc;
3694
0451c93c
MS
3695 switch ((int) ELF64_R_TYPE (rela->r_info))
3696 {
3697 case R_390_RELATIVE:
3698 return reloc_class_relative;
3699 case R_390_JMP_SLOT:
3700 return reloc_class_plt;
3701 case R_390_COPY:
3702 return reloc_class_copy;
3703 default:
3704 return reloc_class_normal;
3705 }
3706}
3707
a85d7ed0
NC
3708/* Finish up the dynamic sections. */
3709
b34976b6 3710static bfd_boolean
4dfe6ac6
NC
3711elf_s390_finish_dynamic_sections (bfd *output_bfd,
3712 struct bfd_link_info *info)
a85d7ed0 3713{
0451c93c 3714 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
3715 bfd *dynobj;
3716 asection *sdyn;
470b557a
AK
3717 bfd *ibfd;
3718 unsigned int i;
a85d7ed0 3719
0451c93c 3720 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
3721 if (htab == NULL)
3722 return FALSE;
3723
0451c93c 3724 dynobj = htab->elf.dynobj;
3d4d4302 3725 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
a85d7ed0 3726
0451c93c 3727 if (htab->elf.dynamic_sections_created)
a85d7ed0 3728 {
a85d7ed0
NC
3729 Elf64_External_Dyn *dyncon, *dynconend;
3730
f41345a7 3731 if (sdyn == NULL || htab->elf.sgot == NULL)
0451c93c 3732 abort ();
a85d7ed0
NC
3733
3734 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 3735 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
a85d7ed0
NC
3736 for (; dyncon < dynconend; dyncon++)
3737 {
3738 Elf_Internal_Dyn dyn;
a85d7ed0 3739 asection *s;
ec338859 3740
a85d7ed0 3741 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
ec338859 3742
a85d7ed0
NC
3743 switch (dyn.d_tag)
3744 {
3745 default:
0451c93c 3746 continue;
ec338859 3747
a85d7ed0 3748 case DT_PLTGOT:
4ade44b7
AM
3749 s = htab->elf.sgotplt;
3750 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
0451c93c 3751 break;
ec338859 3752
a85d7ed0 3753 case DT_JMPREL:
4ade44b7
AM
3754 s = htab->elf.srelplt;
3755 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
a85d7ed0 3756 break;
ec338859 3757
a85d7ed0 3758 case DT_PLTRELSZ:
f92339b8 3759 dyn.d_un.d_val = htab->elf.srelplt->size + htab->elf.irelplt->size;
a85d7ed0 3760 break;
ec338859 3761
a85d7ed0
NC
3762 case DT_RELASZ:
3763 /* The procedure linkage table relocs (DT_JMPREL) should
3764 not be included in the overall relocs (DT_RELA).
3765 Therefore, we override the DT_RELASZ entry here to
3766 make it not include the JMPREL relocs. Since the
3767 linker script arranges for .rela.plt to follow all
3768 other relocation sections, we don't have to worry
3769 about changing the DT_RELA entry. */
f92339b8 3770 dyn.d_un.d_val -= htab->elf.srelplt->size + htab->elf.irelplt->size;
a85d7ed0
NC
3771 break;
3772 }
0451c93c
MS
3773
3774 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
a85d7ed0
NC
3775 }
3776
3777 /* Fill in the special first entry in the procedure linkage table. */
f41345a7 3778 if (htab->elf.splt && htab->elf.splt->size > 0)
a85d7ed0
NC
3779 {
3780 /* fill in blueprint for plt 0 entry */
f41345a7 3781 memcpy (htab->elf.splt->contents, elf_s390x_first_plt_entry,
9aa17453 3782 PLT_FIRST_ENTRY_SIZE);
a85d7ed0
NC
3783 /* Fixup relative address to start of GOT */
3784 bfd_put_32 (output_bfd,
161db279
AK
3785 (htab->elf.sgotplt->output_section->vma
3786 + htab->elf.sgotplt->output_offset
3787 - htab->elf.splt->output_section->vma
3788 - htab->elf.splt->output_offset - 6)/2,
f41345a7 3789 htab->elf.splt->contents + 8);
a85d7ed0 3790 }
387f8054
MR
3791 if (elf_section_data (htab->elf.splt->output_section) != NULL)
3792 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
3793 = PLT_ENTRY_SIZE;
a85d7ed0
NC
3794 }
3795
f41345a7 3796 if (htab->elf.sgotplt)
a85d7ed0 3797 {
0451c93c 3798 /* Fill in the first three entries in the global offset table. */
f41345a7 3799 if (htab->elf.sgotplt->size > 0)
0451c93c
MS
3800 {
3801 bfd_put_64 (output_bfd,
3802 (sdyn == NULL ? (bfd_vma) 0
3803 : sdyn->output_section->vma + sdyn->output_offset),
f41345a7 3804 htab->elf.sgotplt->contents);
0451c93c 3805 /* One entry for shared object struct ptr. */
f41345a7 3806 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
0451c93c 3807 /* One entry for _dl_runtime_resolve. */
3b67f094 3808 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 16);
0451c93c 3809 }
a85d7ed0 3810
f41345a7 3811 elf_section_data (htab->elf.sgot->output_section)
0451c93c
MS
3812 ->this_hdr.sh_entsize = 8;
3813 }
470b557a
AK
3814
3815 /* Finish dynamic symbol for local IFUNC symbols. */
c72f2fb2 3816 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
470b557a
AK
3817 {
3818 struct plt_entry *local_plt;
3819 Elf_Internal_Sym *isym;
3820 Elf_Internal_Shdr *symtab_hdr;
3821
3822 symtab_hdr = &elf_symtab_hdr (ibfd);
3823
3824 local_plt = elf_s390_local_plt (ibfd);
3825 if (local_plt != NULL)
3826 for (i = 0; i < symtab_hdr->sh_info; i++)
3827 {
3828 if (local_plt[i].plt.offset != (bfd_vma) -1)
3829 {
3830 asection *sec = local_plt[i].sec;
3831 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3832 if (isym == NULL)
3833 return FALSE;
3834
3835 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3836 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3837 local_plt[i].plt.offset,
3838 isym->st_value
3839 + sec->output_section->vma
3840 + sec->output_offset);
3841
3842 }
3843 }
3844 }
3845
b34976b6 3846 return TRUE;
a85d7ed0 3847}
e3e9290d
AA
3848\f
3849/* Support for core dump NOTE sections. */
a85d7ed0 3850
e3e9290d
AA
3851static bfd_boolean
3852elf_s390_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3853{
3854 int offset;
3855 size_t size;
3856
3857 switch (note->descsz)
3858 {
3859 default:
3860 return FALSE;
3861
3862 case 336: /* sizeof(struct elf_prstatus) on s390x */
3863 /* pr_cursig */
3864 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3865
3866 /* pr_pid */
3867 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
3868
3869 /* pr_reg */
3870 offset = 112;
3871 size = 216;
3872 break;
3873 }
3874
3875 /* Make a ".reg/999" section. */
3876 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3877 size, note->descpos + offset);
3878}
3879
3880static bfd_boolean
3881elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3882{
3883 switch (note->descsz)
3884 {
3885 default:
3886 return FALSE;
3887
3888 case 136: /* sizeof(struct elf_prpsinfo) on s390x */
3889 elf_tdata (abfd)->core->pid
3890 = bfd_get_32 (abfd, note->descdata + 24);
3891 elf_tdata (abfd)->core->program
3892 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
3893 elf_tdata (abfd)->core->command
3894 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3895 }
3896
3897 /* Note that for some reason, a spurious space is tacked
3898 onto the end of the args in some (at least one anyway)
3899 implementations, so strip it off if it exists. */
3900
3901 {
3902 char *command = elf_tdata (abfd)->core->command;
3903 int n = strlen (command);
3904
3905 if (0 < n && command[n - 1] == ' ')
3906 command[n - 1] = '\0';
3907 }
3908
3909 return TRUE;
3910}
3911
3912static char *
3913elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3914 int note_type, ...)
3915{
3916 va_list ap;
3917
3918 switch (note_type)
3919 {
3920 default:
3921 return NULL;
3922
3923 case NT_PRPSINFO:
3924 {
3925 char data[136] = { 0 };
3926 const char *fname, *psargs;
3927
3928 va_start (ap, note_type);
3929 fname = va_arg (ap, const char *);
3930 psargs = va_arg (ap, const char *);
3931 va_end (ap);
3932
3933 strncpy (data + 40, fname, 16);
3934 strncpy (data + 56, psargs, 80);
3935 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3936 &data, sizeof (data));
3937 }
3938
3939 case NT_PRSTATUS:
3940 {
3941 char data[336] = { 0 };
3942 long pid;
3943 int cursig;
3944 const void *gregs;
3945
3946 va_start (ap, note_type);
3947 pid = va_arg (ap, long);
3948 cursig = va_arg (ap, int);
3949 gregs = va_arg (ap, const void *);
3950 va_end (ap);
3951
3952 bfd_put_16 (abfd, cursig, data + 12);
3953 bfd_put_32 (abfd, pid, data + 32);
3954 memcpy (data + 112, gregs, 216);
3955 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3956 &data, sizeof (data));
3957 }
3958 }
3959 /* NOTREACHED */
3960}
3961\f
4c45e5c9
JJ
3962/* Return address for Ith PLT stub in section PLT, for relocation REL
3963 or (bfd_vma) -1 if it should not be included. */
3964
3965static bfd_vma
3966elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3967 const arelent *rel ATTRIBUTE_UNUSED)
3968{
3969 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3970}
3971
643f7afb
AK
3972/* Merge backend specific data from an object file to the output
3973 object file when linking. */
3974
3975static bfd_boolean
3976elf64_s390_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
3977{
3978 if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
3979 return TRUE;
3980
3981 if (!elf_s390_merge_obj_attributes (ibfd, obfd))
3982 return FALSE;
3983
3984 return TRUE;
3985}
3986
ae9a127f
NC
3987/* Why was the hash table entry size definition changed from
3988 ARCH_SIZE/8 to 4? This breaks the 64 bit dynamic linker and
3989 this is the only reason for the s390_elf64_size_info structure. */
a85d7ed0
NC
3990
3991const struct elf_size_info s390_elf64_size_info =
3992{
3993 sizeof (Elf64_External_Ehdr),
3994 sizeof (Elf64_External_Phdr),
3995 sizeof (Elf64_External_Shdr),
3996 sizeof (Elf64_External_Rel),
3997 sizeof (Elf64_External_Rela),
3998 sizeof (Elf64_External_Sym),
3999 sizeof (Elf64_External_Dyn),
4000 sizeof (Elf_External_Note),
ae9a127f
NC
4001 8, /* hash-table entry size. */
4002 1, /* internal relocations per external relocations. */
4003 64, /* arch_size. */
45d6a902 4004 3, /* log_file_align. */
a85d7ed0
NC
4005 ELFCLASS64, EV_CURRENT,
4006 bfd_elf64_write_out_phdrs,
4007 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 4008 bfd_elf64_checksum_contents,
a85d7ed0 4009 bfd_elf64_write_relocs,
73ff0d56 4010 bfd_elf64_swap_symbol_in,
a85d7ed0
NC
4011 bfd_elf64_swap_symbol_out,
4012 bfd_elf64_slurp_reloc_table,
4013 bfd_elf64_slurp_symbol_table,
4014 bfd_elf64_swap_dyn_in,
4015 bfd_elf64_swap_dyn_out,
947216bf
AM
4016 bfd_elf64_swap_reloc_in,
4017 bfd_elf64_swap_reloc_out,
4018 bfd_elf64_swap_reloca_in,
4019 bfd_elf64_swap_reloca_out
a85d7ed0
NC
4020};
4021
6d00b590 4022#define TARGET_BIG_SYM s390_elf64_vec
a85d7ed0
NC
4023#define TARGET_BIG_NAME "elf64-s390"
4024#define ELF_ARCH bfd_arch_s390
ae95ffa6 4025#define ELF_TARGET_ID S390_ELF_DATA
a85d7ed0
NC
4026#define ELF_MACHINE_CODE EM_S390
4027#define ELF_MACHINE_ALT1 EM_S390_OLD
4028#define ELF_MAXPAGESIZE 0x1000
4029
4030#define elf_backend_size_info s390_elf64_size_info
4031
4032#define elf_backend_can_gc_sections 1
51b64d56 4033#define elf_backend_can_refcount 1
a85d7ed0
NC
4034#define elf_backend_want_got_plt 1
4035#define elf_backend_plt_readonly 1
4036#define elf_backend_want_plt_sym 0
4037#define elf_backend_got_header_size 24
b491616a 4038#define elf_backend_rela_normal 1
a85d7ed0
NC
4039
4040#define elf_info_to_howto elf_s390_info_to_howto
4041
a85d7ed0
NC
4042#define bfd_elf64_bfd_is_local_label_name elf_s390_is_local_label_name
4043#define bfd_elf64_bfd_link_hash_table_create elf_s390_link_hash_table_create
4044#define bfd_elf64_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
643f7afb
AK
4045#define bfd_elf64_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4046#define bfd_elf64_bfd_merge_private_bfd_data elf64_s390_merge_private_bfd_data
a85d7ed0
NC
4047
4048#define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
4049#define elf_backend_check_relocs elf_s390_check_relocs
0451c93c
MS
4050#define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
4051#define elf_backend_create_dynamic_sections elf_s390_create_dynamic_sections
a85d7ed0
NC
4052#define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4053#define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
4054#define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
4055#define elf_backend_gc_sweep_hook elf_s390_gc_sweep_hook
0451c93c 4056#define elf_backend_reloc_type_class elf_s390_reloc_type_class
a85d7ed0
NC
4057#define elf_backend_relocate_section elf_s390_relocate_section
4058#define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
74541ad4 4059#define elf_backend_init_index_section _bfd_elf_init_1_index_section
e3e9290d
AA
4060#define elf_backend_grok_prstatus elf_s390_grok_prstatus
4061#define elf_backend_grok_psinfo elf_s390_grok_psinfo
4062#define elf_backend_write_core_note elf_s390_write_core_note
4c45e5c9 4063#define elf_backend_plt_sym_val elf_s390_plt_sym_val
470b557a 4064#define elf_backend_add_symbol_hook elf_s390_add_symbol_hook
b9005ba7 4065#define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
a85d7ed0 4066
69fc87f1
MS
4067#define bfd_elf64_mkobject elf_s390_mkobject
4068#define elf_backend_object_p elf_s390_object_p
a85d7ed0
NC
4069
4070#include "elf64-target.h"