1 /* i370-specific support for 32-bit ELF
2    Copyright 1994, 1995, 1996, 1997, 1998, 2000, 2001, 2002, 2003, 2004,
3    2005, 2006, 2007, 2008, 2010, 2011, 2012 Free Software Foundation, Inc.
4    Written by Ian Lance Taylor, Cygnus Support.
5    Hacked by Linas Vepstas for i370 linas@linas.org
6 
7    This file is part of BFD, the Binary File Descriptor library.
8 
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13 
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18 
19    You should have received a copy of the GNU General Public License
20    along with this program; if not, write to the Free Software
21    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22    MA 02110-1301, USA.  */
23 
24 /* This file is based on a preliminary PowerPC ELF ABI.
25    But its been hacked on for the IBM 360/370 architectures.
26    Basically, the 31bit relocation works, and just about everything
27    else is a wild card.  In particular, don't expect shared libs or
28    dynamic loading to work ...  its never been tested.  */
29 
30 #include "sysdep.h"
31 #include "bfd.h"
32 #include "bfdlink.h"
33 #include "libbfd.h"
34 #include "elf-bfd.h"
35 #include "elf/i370.h"
36 
37 static reloc_howto_type *i370_elf_howto_table[ (int)R_I370_max ];
38 
39 static reloc_howto_type i370_elf_howto_raw[] =
40 {
41   /* This reloc does nothing.  */
42   HOWTO (R_I370_NONE,		/* type */
43 	 0,			/* rightshift */
44 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
45 	 32,			/* bitsize */
46 	 FALSE,			/* pc_relative */
47 	 0,			/* bitpos */
48 	 complain_overflow_bitfield, /* complain_on_overflow */
49 	 bfd_elf_generic_reloc,	/* special_function */
50 	 "R_I370_NONE",		/* name */
51 	 FALSE,			/* partial_inplace */
52 	 0,			/* src_mask */
53 	 0,			/* dst_mask */
54 	 FALSE),		/* pcrel_offset */
55 
56   /* A standard 31 bit relocation.  */
57   HOWTO (R_I370_ADDR31,		/* type */
58 	 0,			/* rightshift */
59 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
60 	 31,			/* bitsize */
61 	 FALSE,			/* pc_relative */
62 	 0,			/* bitpos */
63 	 complain_overflow_bitfield, /* complain_on_overflow */
64 	 bfd_elf_generic_reloc,	/* special_function */
65 	 "R_I370_ADDR31",	/* name */
66 	 FALSE,			/* partial_inplace */
67 	 0,			/* src_mask */
68 	 0x7fffffff,		/* dst_mask */
69 	 FALSE),		/* pcrel_offset */
70 
71   /* A standard 32 bit relocation.  */
72   HOWTO (R_I370_ADDR32,		/* type */
73 	 0,			/* rightshift */
74 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
75 	 32,			/* bitsize */
76 	 FALSE,			/* pc_relative */
77 	 0,			/* bitpos */
78 	 complain_overflow_bitfield, /* complain_on_overflow */
79 	 bfd_elf_generic_reloc,	/* special_function */
80 	 "R_I370_ADDR32",	/* name */
81 	 FALSE,			/* partial_inplace */
82 	 0,			/* src_mask */
83 	 0xffffffff,		/* dst_mask */
84 	 FALSE),		/* pcrel_offset */
85 
86   /* A standard 16 bit relocation.  */
87   HOWTO (R_I370_ADDR16,		/* type */
88 	 0,			/* rightshift */
89 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
90 	 16,			/* bitsize */
91 	 FALSE,			/* pc_relative */
92 	 0,			/* bitpos */
93 	 complain_overflow_bitfield, /* complain_on_overflow */
94 	 bfd_elf_generic_reloc,	/* special_function */
95 	 "R_I370_ADDR16",	/* name */
96 	 FALSE,			/* partial_inplace */
97 	 0,			/* src_mask */
98 	 0xffff,		/* dst_mask */
99 	 FALSE),		/* pcrel_offset */
100 
101   /* 31-bit PC relative.  */
102   HOWTO (R_I370_REL31,		/* type */
103 	 0,			/* rightshift */
104 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
105 	 31,			/* bitsize */
106 	 TRUE,			/* pc_relative */
107 	 0,			/* bitpos */
108 	 complain_overflow_bitfield, /* complain_on_overflow */
109 	 bfd_elf_generic_reloc,	/* special_function */
110 	 "R_I370_REL31",	/* name */
111 	 FALSE,			/* partial_inplace */
112 	 0,			/* src_mask */
113 	 0x7fffffff,		/* dst_mask */
114 	 TRUE),			/* pcrel_offset */
115 
116   /* 32-bit PC relative.  */
117   HOWTO (R_I370_REL32,		/* type */
118 	 0,			/* rightshift */
119 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
120 	 32,			/* bitsize */
121 	 TRUE,			/* pc_relative */
122 	 0,			/* bitpos */
123 	 complain_overflow_bitfield, /* complain_on_overflow */
124 	 bfd_elf_generic_reloc,	/* special_function */
125 	 "R_I370_REL32",	/* name */
126 	 FALSE,			/* partial_inplace */
127 	 0,			/* src_mask */
128 	 0xffffffff,		/* dst_mask */
129 	 TRUE),			/* pcrel_offset */
130 
131   /* A standard 12 bit relocation.  */
132   HOWTO (R_I370_ADDR12,		/* type */
133 	 0,			/* rightshift */
134 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
135 	 12,			/* bitsize */
136 	 FALSE,			/* pc_relative */
137 	 0,			/* bitpos */
138 	 complain_overflow_bitfield, /* complain_on_overflow */
139 	 bfd_elf_generic_reloc,	/* special_function */
140 	 "R_I370_ADDR12",	/* name */
141 	 FALSE,			/* partial_inplace */
142 	 0,			/* src_mask */
143 	 0xfff,			/* dst_mask */
144 	 FALSE),		/* pcrel_offset */
145 
146   /* 12-bit PC relative.  */
147   HOWTO (R_I370_REL12,		/* type */
148 	 0,			/* rightshift */
149 	 1,			/* size (0 = byte, 1 = short, 2 = long) */
150 	 12,			/* bitsize */
151 	 TRUE,			/* pc_relative */
152 	 0,			/* bitpos */
153 	 complain_overflow_bitfield, /* complain_on_overflow */
154 	 bfd_elf_generic_reloc,	/* special_function */
155 	 "R_I370_REL12",	/* name */
156 	 FALSE,			/* partial_inplace */
157 	 0,			/* src_mask */
158 	 0xfff,			/* dst_mask */
159 	 TRUE),			/* pcrel_offset */
160 
161   /* A standard 8 bit relocation.  */
162   HOWTO (R_I370_ADDR8,		/* type */
163 	 0,			/* rightshift */
164 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
165 	 8,			/* bitsize */
166 	 FALSE,			/* pc_relative */
167 	 0,			/* bitpos */
168 	 complain_overflow_bitfield, /* complain_on_overflow */
169 	 bfd_elf_generic_reloc,	/* special_function */
170 	 "R_I370_ADDR8",	/* name */
171 	 FALSE,			/* partial_inplace */
172 	 0,			/* src_mask */
173 	 0xff,			/* dst_mask */
174 	 FALSE),		/* pcrel_offset */
175 
176   /* 8-bit PC relative.  */
177   HOWTO (R_I370_REL8,		/* type */
178 	 0,			/* rightshift */
179 	 0,			/* size (0 = byte, 1 = short, 2 = long) */
180 	 8,			/* bitsize */
181 	 TRUE,			/* pc_relative */
182 	 0,			/* bitpos */
183 	 complain_overflow_bitfield, /* complain_on_overflow */
184 	 bfd_elf_generic_reloc,	/* special_function */
185 	 "R_I370_REL8",		/* name */
186 	 FALSE,			/* partial_inplace */
187 	 0,			/* src_mask */
188 	 0xff,			/* dst_mask */
189 	 TRUE),			/* pcrel_offset */
190 
191   /* This is used only by the dynamic linker.  The symbol should exist
192      both in the object being run and in some shared library.  The
193      dynamic linker copies the data addressed by the symbol from the
194      shared library into the object, because the object being
195      run has to have the data at some particular address.  */
196   HOWTO (R_I370_COPY,		/* type */
197 	 0,			/* rightshift */
198 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
199 	 32,			/* bitsize */
200 	 FALSE,			/* pc_relative */
201 	 0,			/* bitpos */
202 	 complain_overflow_bitfield, /* complain_on_overflow */
203 	 bfd_elf_generic_reloc,	 /* special_function */
204 	 "R_I370_COPY",		/* name */
205 	 FALSE,			/* partial_inplace */
206 	 0,			/* src_mask */
207 	 0,			/* dst_mask */
208 	 FALSE),		/* pcrel_offset */
209 
210   /* Used only by the dynamic linker.  When the object is run, this
211      longword is set to the load address of the object, plus the
212      addend.  */
213   HOWTO (R_I370_RELATIVE,	/* type */
214 	 0,			/* rightshift */
215 	 2,			/* size (0 = byte, 1 = short, 2 = long) */
216 	 32,			/* bitsize */
217 	 FALSE,			/* pc_relative */
218 	 0,			/* bitpos */
219 	 complain_overflow_bitfield, /* complain_on_overflow */
220 	 bfd_elf_generic_reloc,	 /* special_function */
221 	 "R_I370_RELATIVE",	/* name */
222 	 FALSE,			/* partial_inplace */
223 	 0,			/* src_mask */
224 	 0xffffffff,		/* dst_mask */
225 	 FALSE),		/* pcrel_offset */
226 
227 };
228 
229 /* Initialize the i370_elf_howto_table, so that linear accesses can be done.  */
230 
231 static void
i370_elf_howto_init(void)232 i370_elf_howto_init (void)
233 {
234   unsigned int i, type;
235 
236   for (i = 0; i < sizeof (i370_elf_howto_raw) / sizeof (i370_elf_howto_raw[0]); i++)
237     {
238       type = i370_elf_howto_raw[i].type;
239       BFD_ASSERT (type < sizeof (i370_elf_howto_table) / sizeof (i370_elf_howto_table[0]));
240       i370_elf_howto_table[type] = &i370_elf_howto_raw[i];
241     }
242 }
243 
244 static reloc_howto_type *
i370_elf_reloc_type_lookup(bfd * abfd ATTRIBUTE_UNUSED,bfd_reloc_code_real_type code)245 i370_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
246 			    bfd_reloc_code_real_type code)
247 {
248   enum i370_reloc_type i370_reloc = R_I370_NONE;
249 
250   if (!i370_elf_howto_table[ R_I370_ADDR31 ])
251     /* Initialize howto table if needed.  */
252     i370_elf_howto_init ();
253 
254   switch ((int) code)
255     {
256     default:
257       return NULL;
258 
259     case BFD_RELOC_NONE:	i370_reloc = R_I370_NONE;	break;
260     case BFD_RELOC_32:		i370_reloc = R_I370_ADDR31;	break;
261     case BFD_RELOC_16:		i370_reloc = R_I370_ADDR16;	break;
262     case BFD_RELOC_32_PCREL:	i370_reloc = R_I370_REL31;	break;
263     case BFD_RELOC_CTOR:	i370_reloc = R_I370_ADDR31;	break;
264     case BFD_RELOC_I370_D12:	i370_reloc = R_I370_ADDR12;	break;
265     }
266 
267   return i370_elf_howto_table[ (int)i370_reloc ];
268 };
269 
270 static reloc_howto_type *
i370_elf_reloc_name_lookup(bfd * abfd ATTRIBUTE_UNUSED,const char * r_name)271 i370_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
272 			    const char *r_name)
273 {
274   unsigned int i;
275 
276   for (i = 0;
277        i < sizeof (i370_elf_howto_raw) / sizeof (i370_elf_howto_raw[0]);
278        i++)
279     if (i370_elf_howto_raw[i].name != NULL
280 	&& strcasecmp (i370_elf_howto_raw[i].name, r_name) == 0)
281       return &i370_elf_howto_raw[i];
282 
283   return NULL;
284 }
285 
286 /* The name of the dynamic interpreter.  This is put in the .interp
287     section.  */
288 
289 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so"
290 
291 /* Set the howto pointer for an i370 ELF reloc.  */
292 
293 static void
i370_elf_info_to_howto(bfd * abfd ATTRIBUTE_UNUSED,arelent * cache_ptr,Elf_Internal_Rela * dst)294 i370_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
295 			arelent *cache_ptr,
296 			Elf_Internal_Rela *dst)
297 {
298   if (!i370_elf_howto_table[ R_I370_ADDR31 ])
299     /* Initialize howto table.  */
300     i370_elf_howto_init ();
301 
302   BFD_ASSERT (ELF32_R_TYPE (dst->r_info) < (unsigned int) R_I370_max);
303   cache_ptr->howto = i370_elf_howto_table[ELF32_R_TYPE (dst->r_info)];
304 }
305 
306 /* Hack alert --  the following several routines look generic to me ...
307    why are we bothering with them ?  */
308 /* Function to set whether a module needs the -mrelocatable bit set.  */
309 
310 static bfd_boolean
i370_elf_set_private_flags(bfd * abfd,flagword flags)311 i370_elf_set_private_flags (bfd *abfd, flagword flags)
312 {
313   BFD_ASSERT (!elf_flags_init (abfd)
314 	      || elf_elfheader (abfd)->e_flags == flags);
315 
316   elf_elfheader (abfd)->e_flags = flags;
317   elf_flags_init (abfd) = TRUE;
318   return TRUE;
319 }
320 
321 /* Merge backend specific data from an object file to the output
322    object file when linking.  */
323 
324 static bfd_boolean
i370_elf_merge_private_bfd_data(bfd * ibfd,bfd * obfd)325 i370_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
326 {
327   flagword old_flags;
328   flagword new_flags;
329 
330   if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
331       || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
332     return TRUE;
333 
334   new_flags = elf_elfheader (ibfd)->e_flags;
335   old_flags = elf_elfheader (obfd)->e_flags;
336   if (!elf_flags_init (obfd))	/* First call, no flags set.  */
337     {
338       elf_flags_init (obfd) = TRUE;
339       elf_elfheader (obfd)->e_flags = new_flags;
340     }
341 
342   else if (new_flags == old_flags)	/* Compatible flags are ok.  */
343     ;
344 
345   else					/* Incompatible flags.  */
346     {
347       (*_bfd_error_handler)
348 	("%B: uses different e_flags (0x%lx) fields than previous modules (0x%lx)",
349 	 ibfd, (long) new_flags, (long) old_flags);
350 
351       bfd_set_error (bfd_error_bad_value);
352       return FALSE;
353     }
354 
355   return TRUE;
356 }
357 
358 /* Handle an i370 specific section when reading an object file.  This
359    is called when elfcode.h finds a section with an unknown type.  */
360 /* XXX hack alert bogus This routine is mostly all junk and almost
361    certainly does the wrong thing.  Its here simply because it does
362    just enough to allow glibc-2.1 ld.so to compile & link.  */
363 
364 static bfd_boolean
i370_elf_section_from_shdr(bfd * abfd,Elf_Internal_Shdr * hdr,const char * name,int shindex)365 i370_elf_section_from_shdr (bfd *abfd,
366 			    Elf_Internal_Shdr *hdr,
367 			    const char *name,
368 			    int shindex)
369 {
370   asection *newsect;
371   flagword flags;
372 
373   if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
374     return FALSE;
375 
376   newsect = hdr->bfd_section;
377   flags = bfd_get_section_flags (abfd, newsect);
378   if (hdr->sh_type == SHT_ORDERED)
379     flags |= SEC_SORT_ENTRIES;
380 
381   bfd_set_section_flags (abfd, newsect, flags);
382   return TRUE;
383 }
384 
385 /* Set up any other section flags and such that may be necessary.  */
386 /* XXX hack alert bogus This routine is mostly all junk and almost
387    certainly does the wrong thing.  Its here simply because it does
388    just enough to allow glibc-2.1 ld.so to compile & link.  */
389 
390 static bfd_boolean
i370_elf_fake_sections(bfd * abfd ATTRIBUTE_UNUSED,Elf_Internal_Shdr * shdr,asection * asect)391 i370_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
392 			Elf_Internal_Shdr *shdr,
393 			asection *asect)
394 {
395   if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
396     shdr->sh_flags |= SHF_EXCLUDE;
397 
398   if ((asect->flags & SEC_SORT_ENTRIES) != 0)
399     shdr->sh_type = SHT_ORDERED;
400 
401   return TRUE;
402 }
403 
404 /* We have to create .dynsbss and .rela.sbss here so that they get mapped
405    to output sections (just like _bfd_elf_create_dynamic_sections has
406    to create .dynbss and .rela.bss).  */
407 /* XXX hack alert bogus This routine is mostly all junk and almost
408    certainly does the wrong thing.  Its here simply because it does
409    just enough to allow glibc-2.1 ld.so to compile & link.  */
410 
411 static bfd_boolean
i370_elf_create_dynamic_sections(bfd * abfd,struct bfd_link_info * info)412 i370_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
413 {
414   asection *s;
415   flagword flags;
416 
417   if (!_bfd_elf_create_dynamic_sections(abfd, info))
418     return FALSE;
419 
420   flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
421 	   | SEC_LINKER_CREATED);
422 
423   s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
424 					  SEC_ALLOC | SEC_LINKER_CREATED);
425   if (s == NULL)
426     return FALSE;
427 
428   if (! info->shared)
429     {
430       s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss",
431 					      flags | SEC_READONLY);
432       if (s == NULL
433 	  || ! bfd_set_section_alignment (abfd, s, 2))
434 	return FALSE;
435     }
436 
437    /* XXX beats me, seem to need a rela.text ...  */
438    s = bfd_make_section_anyway_with_flags (abfd, ".rela.text",
439 					   flags | SEC_READONLY);
440    if (s == NULL
441       || ! bfd_set_section_alignment (abfd, s, 2))
442     return FALSE;
443   return TRUE;
444 }
445 
446 /* Adjust a symbol defined by a dynamic object and referenced by a
447    regular object.  The current definition is in some section of the
448    dynamic object, but we're not including those sections.  We have to
449    change the definition to something the rest of the link can
450    understand.  */
451 /* XXX hack alert bogus This routine is mostly all junk and almost
452    certainly does the wrong thing.  Its here simply because it does
453    just enough to allow glibc-2.1 ld.so to compile & link.  */
454 
455 static bfd_boolean
i370_elf_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)456 i370_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
457 				struct elf_link_hash_entry *h)
458 {
459   bfd *dynobj = elf_hash_table (info)->dynobj;
460   asection *s;
461 
462 #ifdef DEBUG
463   fprintf (stderr, "i370_elf_adjust_dynamic_symbol called for %s\n",
464 	   h->root.root.string);
465 #endif
466 
467   /* Make sure we know what is going on here.  */
468   BFD_ASSERT (dynobj != NULL
469 	      && (h->needs_plt
470 		  || h->u.weakdef != NULL
471 		  || (h->def_dynamic
472 		      && h->ref_regular
473 		      && !h->def_regular)));
474 
475   s = bfd_get_linker_section (dynobj, ".rela.text");
476   BFD_ASSERT (s != NULL);
477   s->size += sizeof (Elf32_External_Rela);
478 
479   /* If this is a weak symbol, and there is a real definition, the
480      processor independent code will have arranged for us to see the
481      real definition first, and we can just use the same value.  */
482   if (h->u.weakdef != NULL)
483     {
484       BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
485 		  || h->u.weakdef->root.type == bfd_link_hash_defweak);
486       h->root.u.def.section = h->u.weakdef->root.u.def.section;
487       h->root.u.def.value = h->u.weakdef->root.u.def.value;
488       return TRUE;
489     }
490 
491   /* This is a reference to a symbol defined by a dynamic object which
492      is not a function.  */
493 
494   /* If we are creating a shared library, we must presume that the
495      only references to the symbol are via the global offset table.
496      For such cases we need not do anything here; the relocations will
497      be handled correctly by relocate_section.  */
498   if (info->shared)
499     return TRUE;
500 
501   /* We must allocate the symbol in our .dynbss section, which will
502      become part of the .bss section of the executable.  There will be
503      an entry for this symbol in the .dynsym section.  The dynamic
504      object will contain position independent code, so all references
505      from the dynamic object to this symbol will go through the global
506      offset table.  The dynamic linker will use the .dynsym entry to
507      determine the address it must put in the global offset table, so
508      both the dynamic object and the regular object will refer to the
509      same memory location for the variable.
510 
511      Of course, if the symbol is sufficiently small, we must instead
512      allocate it in .sbss.  FIXME: It would be better to do this if and
513      only if there were actually SDAREL relocs for that symbol.  */
514 
515   if (h->size <= elf_gp_size (dynobj))
516     s = bfd_get_linker_section (dynobj, ".dynsbss");
517   else
518     s = bfd_get_linker_section (dynobj, ".dynbss");
519   BFD_ASSERT (s != NULL);
520 
521   /* We must generate a R_I370_COPY reloc to tell the dynamic linker to
522      copy the initial value out of the dynamic object and into the
523      runtime process image.  We need to remember the offset into the
524      .rela.bss section we are going to use.  */
525   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
526     {
527       asection *srel;
528 
529       if (h->size <= elf_gp_size (dynobj))
530 	srel = bfd_get_linker_section (dynobj, ".rela.sbss");
531       else
532 	srel = bfd_get_linker_section (dynobj, ".rela.bss");
533       BFD_ASSERT (srel != NULL);
534       srel->size += sizeof (Elf32_External_Rela);
535       h->needs_copy = 1;
536     }
537 
538   return _bfd_elf_adjust_dynamic_copy (h, s);
539 }
540 
541 /* Increment the index of a dynamic symbol by a given amount.  Called
542    via elf_link_hash_traverse.  */
543 /* XXX hack alert bogus This routine is mostly all junk and almost
544    certainly does the wrong thing.  Its here simply because it does
545    just enough to allow glibc-2.1 ld.so to compile & link.  */
546 
547 static bfd_boolean
i370_elf_adjust_dynindx(struct elf_link_hash_entry * h,void * cparg)548 i370_elf_adjust_dynindx (struct elf_link_hash_entry *h, void * cparg)
549 {
550   int *cp = (int *) cparg;
551 
552 #ifdef DEBUG
553   fprintf (stderr,
554 	   "i370_elf_adjust_dynindx called, h->dynindx = %ld, *cp = %d\n",
555 	   h->dynindx, *cp);
556 #endif
557 
558   if (h->dynindx != -1)
559     h->dynindx += *cp;
560 
561   return TRUE;
562 }
563 
564 /* Set the sizes of the dynamic sections.  */
565 /* XXX hack alert bogus This routine is mostly all junk and almost
566    certainly does the wrong thing.  Its here simply because it does
567    just enough to allow glibc-2.1 ld.so to compile & link.  */
568 
569 static bfd_boolean
i370_elf_size_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)570 i370_elf_size_dynamic_sections (bfd *output_bfd,
571 				struct bfd_link_info *info)
572 {
573   bfd *dynobj;
574   asection *s;
575   bfd_boolean plt;
576   bfd_boolean relocs;
577   bfd_boolean reltext;
578 
579 #ifdef DEBUG
580   fprintf (stderr, "i370_elf_size_dynamic_sections called\n");
581 #endif
582 
583   dynobj = elf_hash_table (info)->dynobj;
584   BFD_ASSERT (dynobj != NULL);
585 
586   if (elf_hash_table (info)->dynamic_sections_created)
587     {
588       /* Set the contents of the .interp section to the interpreter.  */
589       if (info->executable)
590 	{
591 	  s = bfd_get_linker_section (dynobj, ".interp");
592 	  BFD_ASSERT (s != NULL);
593 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
594 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
595 	}
596     }
597   else
598     {
599       /* We may have created entries in the .rela.got, .rela.sdata, and
600 	 .rela.sdata2 sections.  However, if we are not creating the
601 	 dynamic sections, we will not actually use these entries.  Reset
602 	 the size of .rela.got, et al, which will cause it to get
603 	 stripped from the output file below.  */
604       static char *rela_sections[] = { ".rela.got", ".rela.sdata",
605 				       ".rela.sdata2", ".rela.sbss",
606 				       NULL };
607       char **p;
608 
609       for (p = rela_sections; *p != NULL; p++)
610 	{
611 	  s = bfd_get_linker_section (dynobj, *p);
612 	  if (s != NULL)
613 	    s->size = 0;
614 	}
615     }
616 
617   /* The check_relocs and adjust_dynamic_symbol entry points have
618      determined the sizes of the various dynamic sections.  Allocate
619      memory for them.  */
620   plt = FALSE;
621   relocs = FALSE;
622   reltext = FALSE;
623   for (s = dynobj->sections; s != NULL; s = s->next)
624     {
625       const char *name;
626 
627       if ((s->flags & SEC_LINKER_CREATED) == 0)
628 	continue;
629 
630       /* It's OK to base decisions on the section name, because none
631 	 of the dynobj section names depend upon the input files.  */
632       name = bfd_get_section_name (dynobj, s);
633 
634       if (strcmp (name, ".plt") == 0)
635 	{
636 	  /* Remember whether there is a PLT.  */
637 	  plt = s->size != 0;
638 	}
639       else if (CONST_STRNEQ (name, ".rela"))
640 	{
641 	  if (s->size != 0)
642 	    {
643 	      asection *target;
644 	      const char *outname;
645 
646 	      /* Remember whether there are any relocation sections.  */
647 	      relocs = TRUE;
648 
649 	      /* If this relocation section applies to a read only
650 		 section, then we probably need a DT_TEXTREL entry.  */
651 	      outname = bfd_get_section_name (output_bfd,
652 					      s->output_section);
653 	      target = bfd_get_section_by_name (output_bfd, outname + 5);
654 	      if (target != NULL
655 		  && (target->flags & SEC_READONLY) != 0
656 		  && (target->flags & SEC_ALLOC) != 0)
657 		reltext = TRUE;
658 
659 	      /* We use the reloc_count field as a counter if we need
660 		 to copy relocs into the output file.  */
661 	      s->reloc_count = 0;
662 	    }
663 	}
664       else if (strcmp (name, ".got") != 0
665 	       && strcmp (name, ".sdata") != 0
666 	       && strcmp (name, ".sdata2") != 0
667 	       && strcmp (name, ".dynbss") != 0
668 	       && strcmp (name, ".dynsbss") != 0)
669 	{
670 	  /* It's not one of our sections, so don't allocate space.  */
671 	  continue;
672 	}
673 
674       if (s->size == 0)
675 	{
676 	  /* If we don't need this section, strip it from the
677 	     output file.  This is mostly to handle .rela.bss and
678 	     .rela.plt.  We must create both sections in
679 	     create_dynamic_sections, because they must be created
680 	     before the linker maps input sections to output
681 	     sections.  The linker does that before
682 	     adjust_dynamic_symbol is called, and it is that
683 	     function which decides whether anything needs to go
684 	     into these sections.  */
685 	  s->flags |= SEC_EXCLUDE;
686 	  continue;
687 	}
688 
689       if ((s->flags & SEC_HAS_CONTENTS) == 0)
690 	continue;
691 
692       /* Allocate memory for the section contents.  */
693       s->contents = bfd_zalloc (dynobj, s->size);
694       if (s->contents == NULL)
695 	return FALSE;
696     }
697 
698   if (elf_hash_table (info)->dynamic_sections_created)
699     {
700       /* Add some entries to the .dynamic section.  We fill in the
701 	 values later, in i370_elf_finish_dynamic_sections, but we
702 	 must add the entries now so that we get the correct size for
703 	 the .dynamic section.  The DT_DEBUG entry is filled in by the
704 	 dynamic linker and used by the debugger.  */
705 #define add_dynamic_entry(TAG, VAL) \
706   _bfd_elf_add_dynamic_entry (info, TAG, VAL)
707 
708       if (!info->shared)
709 	{
710 	  if (!add_dynamic_entry (DT_DEBUG, 0))
711 	    return FALSE;
712 	}
713 
714       if (plt)
715 	{
716 	  if (!add_dynamic_entry (DT_PLTGOT, 0)
717 	      || !add_dynamic_entry (DT_PLTRELSZ, 0)
718 	      || !add_dynamic_entry (DT_PLTREL, DT_RELA)
719 	      || !add_dynamic_entry (DT_JMPREL, 0))
720 	    return FALSE;
721 	}
722 
723       if (relocs)
724 	{
725 	  if (!add_dynamic_entry (DT_RELA, 0)
726 	      || !add_dynamic_entry (DT_RELASZ, 0)
727 	      || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
728 	    return FALSE;
729 	}
730 
731       if (reltext)
732 	{
733 	  if (!add_dynamic_entry (DT_TEXTREL, 0))
734 	    return FALSE;
735 	  info->flags |= DF_TEXTREL;
736 	}
737     }
738 #undef add_dynamic_entry
739 
740   /* If we are generating a shared library, we generate a section
741      symbol for each output section.  These are local symbols, which
742      means that they must come first in the dynamic symbol table.
743      That means we must increment the dynamic symbol index of every
744      other dynamic symbol.
745 
746      FIXME: We assume that there will never be relocations to
747      locations in linker-created sections that do not have
748      externally-visible names. Instead, we should work out precisely
749      which sections relocations are targeted at.  */
750   if (info->shared)
751     {
752       int c;
753 
754       for (c = 0, s = output_bfd->sections; s != NULL; s = s->next)
755 	{
756 	  if ((s->flags & SEC_LINKER_CREATED) != 0
757 	      || (s->flags & SEC_ALLOC) == 0)
758 	    {
759 	      elf_section_data (s)->dynindx = -1;
760 	      continue;
761 	    }
762 
763 	  /* These symbols will have no names, so we don't need to
764 	     fiddle with dynstr_index.  */
765 
766 	  elf_section_data (s)->dynindx = c + 1;
767 
768 	  c++;
769 	}
770 
771       elf_link_hash_traverse (elf_hash_table (info),
772 			      i370_elf_adjust_dynindx, & c);
773       elf_hash_table (info)->dynsymcount += c;
774     }
775 
776   return TRUE;
777 }
778 
779 /* Look through the relocs for a section during the first phase, and
780    allocate space in the global offset table or procedure linkage
781    table.  */
782 /* XXX hack alert bogus This routine is mostly all junk and almost
783    certainly does the wrong thing.  Its here simply because it does
784    just enough to allow glibc-2.1 ld.so to compile & link.  */
785 
786 static bfd_boolean
i370_elf_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)787 i370_elf_check_relocs (bfd *abfd,
788 		       struct bfd_link_info *info,
789 		       asection *sec,
790 		       const Elf_Internal_Rela *relocs)
791 {
792   bfd *dynobj;
793   Elf_Internal_Shdr *symtab_hdr;
794   struct elf_link_hash_entry **sym_hashes;
795   const Elf_Internal_Rela *rel;
796   const Elf_Internal_Rela *rel_end;
797   asection *sreloc;
798 
799   if (info->relocatable)
800     return TRUE;
801 
802 #ifdef DEBUG
803   _bfd_error_handler ("i370_elf_check_relocs called for section %A in %B",
804 		      sec, abfd);
805 #endif
806 
807   dynobj = elf_hash_table (info)->dynobj;
808   symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
809   sym_hashes = elf_sym_hashes (abfd);
810 
811   sreloc = NULL;
812 
813   rel_end = relocs + sec->reloc_count;
814   for (rel = relocs; rel < rel_end; rel++)
815     {
816       unsigned long r_symndx;
817       struct elf_link_hash_entry *h;
818 
819       r_symndx = ELF32_R_SYM (rel->r_info);
820       if (r_symndx < symtab_hdr->sh_info)
821 	h = NULL;
822       else
823 	{
824 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
825 	  while (h->root.type == bfd_link_hash_indirect
826 		 || h->root.type == bfd_link_hash_warning)
827 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
828 	}
829 
830       if (info->shared)
831 	{
832 #ifdef DEBUG
833 	  fprintf (stderr,
834 		   "i370_elf_check_relocs needs to create relocation for %s\n",
835 		   (h && h->root.root.string)
836 		   ? h->root.root.string : "<unknown>");
837 #endif
838 	  if (sreloc == NULL)
839 	    {
840 	      sreloc = _bfd_elf_make_dynamic_reloc_section
841 		(sec, dynobj, 2, abfd, /*rela?*/ TRUE);
842 
843 	      if (sreloc == NULL)
844 		return FALSE;
845 	    }
846 
847 	  sreloc->size += sizeof (Elf32_External_Rela);
848 
849 	  /* FIXME: We should here do what the m68k and i386
850 	     backends do: if the reloc is pc-relative, record it
851 	     in case it turns out that the reloc is unnecessary
852 	     because the symbol is forced local by versioning or
853 	     we are linking with -Bdynamic.  Fortunately this
854 	     case is not frequent.  */
855 	}
856     }
857 
858   return TRUE;
859 }
860 
861 /* Finish up the dynamic sections.  */
862 /* XXX hack alert bogus This routine is mostly all junk and almost
863    certainly does the wrong thing.  Its here simply because it does
864    just enough to allow glibc-2.1 ld.so to compile & link.  */
865 
866 static bfd_boolean
i370_elf_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)867 i370_elf_finish_dynamic_sections (bfd *output_bfd,
868 				  struct bfd_link_info *info)
869 {
870   asection *sdyn;
871   bfd *dynobj = elf_hash_table (info)->dynobj;
872   asection *sgot = bfd_get_linker_section (dynobj, ".got");
873 
874 #ifdef DEBUG
875   fprintf (stderr, "i370_elf_finish_dynamic_sections called\n");
876 #endif
877 
878   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
879 
880   if (elf_hash_table (info)->dynamic_sections_created)
881     {
882       asection *splt;
883       Elf32_External_Dyn *dyncon, *dynconend;
884 
885       splt = bfd_get_linker_section (dynobj, ".plt");
886       BFD_ASSERT (splt != NULL && sdyn != NULL);
887 
888       dyncon = (Elf32_External_Dyn *) sdyn->contents;
889       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
890       for (; dyncon < dynconend; dyncon++)
891 	{
892 	  Elf_Internal_Dyn dyn;
893 	  const char *name;
894 	  bfd_boolean size;
895 
896 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
897 
898 	  switch (dyn.d_tag)
899 	    {
900 	    case DT_PLTGOT:   name = ".plt";	  size = FALSE; break;
901 	    case DT_PLTRELSZ: name = ".rela.plt"; size = TRUE;  break;
902 	    case DT_JMPREL:   name = ".rela.plt"; size = FALSE; break;
903 	    default:	      name = NULL;	  size = FALSE; break;
904 	    }
905 
906 	  if (name != NULL)
907 	    {
908 	      asection *s;
909 
910 	      s = bfd_get_section_by_name (output_bfd, name);
911 	      if (s == NULL)
912 		dyn.d_un.d_val = 0;
913 	      else
914 		{
915 		  if (! size)
916 		    dyn.d_un.d_ptr = s->vma;
917 		  else
918 		    dyn.d_un.d_val = s->size;
919 		}
920 	      bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
921 	    }
922 	}
923     }
924 
925   if (sgot && sgot->size != 0)
926     {
927       unsigned char *contents = sgot->contents;
928 
929       if (sdyn == NULL)
930 	bfd_put_32 (output_bfd, (bfd_vma) 0, contents);
931       else
932 	bfd_put_32 (output_bfd,
933 		    sdyn->output_section->vma + sdyn->output_offset,
934 		    contents);
935 
936       elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
937     }
938 
939   if (info->shared)
940     {
941       asection *sdynsym;
942       asection *s;
943       Elf_Internal_Sym sym;
944       int maxdindx = 0;
945 
946       /* Set up the section symbols for the output sections.  */
947 
948       sdynsym = bfd_get_linker_section (dynobj, ".dynsym");
949       BFD_ASSERT (sdynsym != NULL);
950 
951       sym.st_size = 0;
952       sym.st_name = 0;
953       sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
954       sym.st_other = 0;
955       sym.st_target_internal = 0;
956 
957       for (s = output_bfd->sections; s != NULL; s = s->next)
958 	{
959 	  int indx, dindx;
960 	  Elf32_External_Sym *esym;
961 
962 	  sym.st_value = s->vma;
963 
964 	  indx = elf_section_data (s)->this_idx;
965 	  dindx = elf_section_data (s)->dynindx;
966 	  if (dindx != -1)
967 	    {
968 	      BFD_ASSERT(indx > 0);
969 	      BFD_ASSERT(dindx > 0);
970 
971 	      if (dindx > maxdindx)
972 		maxdindx = dindx;
973 
974 	      sym.st_shndx = indx;
975 
976 	      esym = (Elf32_External_Sym *) sdynsym->contents + dindx;
977 	      bfd_elf32_swap_symbol_out (output_bfd, &sym, esym, NULL);
978 	    }
979 	}
980 
981       /* Set the sh_info field of the output .dynsym section to the
982 	 index of the first global symbol.  */
983       elf_section_data (sdynsym->output_section)->this_hdr.sh_info =
984 	maxdindx + 1;
985     }
986 
987   return TRUE;
988 }
989 
990 /* The RELOCATE_SECTION function is called by the ELF backend linker
991    to handle the relocations for a section.
992 
993    The relocs are always passed as Rela structures; if the section
994    actually uses Rel structures, the r_addend field will always be
995    zero.
996 
997    This function is responsible for adjust the section contents as
998    necessary, and (if using Rela relocs and generating a
999    relocatable output file) adjusting the reloc addend as
1000    necessary.
1001 
1002    This function does not have to worry about setting the reloc
1003    address or the reloc symbol index.
1004 
1005    LOCAL_SYMS is a pointer to the swapped in local symbols.
1006 
1007    LOCAL_SECTIONS is an array giving the section in the input file
1008    corresponding to the st_shndx field of each local symbol.
1009 
1010    The global hash table entry for the global symbols can be found
1011    via elf_sym_hashes (input_bfd).
1012 
1013    When generating relocatable output, this function must handle
1014    STB_LOCAL/STT_SECTION symbols specially.  The output symbol is
1015    going to be the section symbol corresponding to the output
1016    section, which means that the addend must be adjusted
1017    accordingly.  */
1018 
1019 static bfd_boolean
i370_elf_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)1020 i370_elf_relocate_section (bfd *output_bfd,
1021 			   struct bfd_link_info *info,
1022 			   bfd *input_bfd,
1023 			   asection *input_section,
1024 			   bfd_byte *contents,
1025 			   Elf_Internal_Rela *relocs,
1026 			   Elf_Internal_Sym *local_syms,
1027 			   asection **local_sections)
1028 {
1029   Elf_Internal_Shdr *symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1030   struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
1031   Elf_Internal_Rela *rel = relocs;
1032   Elf_Internal_Rela *relend = relocs + input_section->reloc_count;
1033   asection *sreloc = NULL;
1034   bfd_boolean ret = TRUE;
1035 
1036 #ifdef DEBUG
1037   _bfd_error_handler ("i370_elf_relocate_section called for %B section %A, %ld relocations%s",
1038 		      input_bfd, input_section,
1039 		      (long) input_section->reloc_count,
1040 		      (info->relocatable) ? " (relocatable)" : "");
1041 #endif
1042 
1043   if (!i370_elf_howto_table[ R_I370_ADDR31 ])
1044     /* Initialize howto table if needed.  */
1045     i370_elf_howto_init ();
1046 
1047   for (; rel < relend; rel++)
1048     {
1049       enum i370_reloc_type r_type    = (enum i370_reloc_type) ELF32_R_TYPE (rel->r_info);
1050       bfd_vma offset		     = rel->r_offset;
1051       bfd_vma addend		     = rel->r_addend;
1052       bfd_reloc_status_type r	     = bfd_reloc_other;
1053       Elf_Internal_Sym *sym	     = NULL;
1054       asection *sec		     = NULL;
1055       struct elf_link_hash_entry * h = NULL;
1056       const char *sym_name	     = NULL;
1057       reloc_howto_type *howto;
1058       unsigned long r_symndx;
1059       bfd_vma relocation;
1060 
1061       /* Unknown relocation handling.  */
1062       if ((unsigned) r_type >= (unsigned) R_I370_max
1063 	  || !i370_elf_howto_table[(int)r_type])
1064 	{
1065 	  (*_bfd_error_handler) ("%B: unknown relocation type %d",
1066 				 input_bfd,
1067 				 (int) r_type);
1068 
1069 	  bfd_set_error (bfd_error_bad_value);
1070 	  ret = FALSE;
1071 	  continue;
1072 	}
1073 
1074       howto = i370_elf_howto_table[(int) r_type];
1075       r_symndx = ELF32_R_SYM (rel->r_info);
1076       relocation = 0;
1077 
1078       if (r_symndx < symtab_hdr->sh_info)
1079 	{
1080 	  sym = local_syms + r_symndx;
1081 	  sec = local_sections[r_symndx];
1082 	  sym_name = "<local symbol>";
1083 
1084 	  relocation = _bfd_elf_rela_local_sym (output_bfd, sym, & sec, rel);
1085 	  addend = rel->r_addend;
1086 	}
1087       else
1088 	{
1089 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1090 	  while (h->root.type == bfd_link_hash_indirect
1091 		 || h->root.type == bfd_link_hash_warning)
1092 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
1093 	  sym_name = h->root.root.string;
1094 	  if (h->root.type == bfd_link_hash_defined
1095 	      || h->root.type == bfd_link_hash_defweak)
1096 	    {
1097 	      sec = h->root.u.def.section;
1098 	      if (info->shared
1099 		  && ((! info->symbolic && h->dynindx != -1)
1100 		      || !h->def_regular)
1101 		  && (input_section->flags & SEC_ALLOC) != 0
1102 		  && (r_type == R_I370_ADDR31
1103 		      || r_type == R_I370_COPY
1104 		      || r_type == R_I370_ADDR16
1105 		      || r_type == R_I370_RELATIVE))
1106 		/* In these cases, we don't need the relocation
1107 		   value.  We check specially because in some
1108 		   obscure cases sec->output_section will be NULL.  */
1109 		;
1110 	      else
1111 		relocation = (h->root.u.def.value
1112 			      + sec->output_section->vma
1113 			      + sec->output_offset);
1114 	    }
1115 	  else if (h->root.type == bfd_link_hash_undefweak)
1116 	    ;
1117 	  else if (info->unresolved_syms_in_objects == RM_IGNORE
1118 		   && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
1119 	    ;
1120 	  else if (!info->relocatable)
1121 	    {
1122 	      if ((*info->callbacks->undefined_symbol)
1123 		  (info, h->root.root.string, input_bfd,
1124 		   input_section, rel->r_offset,
1125 		   (info->unresolved_syms_in_objects == RM_GENERATE_ERROR
1126 		    || ELF_ST_VISIBILITY (h->other))))
1127 		{
1128 		  ret = FALSE;
1129 		  continue;
1130 		}
1131 	    }
1132 	}
1133 
1134       if (sec != NULL && discarded_section (sec))
1135 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
1136 					 rel, 1, relend, howto, 0, contents);
1137 
1138       if (info->relocatable)
1139 	continue;
1140 
1141       switch ((int) r_type)
1142 	{
1143 	default:
1144 	  (*_bfd_error_handler)
1145 	    ("%B: unknown relocation type %d for symbol %s",
1146 	     input_bfd, (int) r_type, sym_name);
1147 
1148 	  bfd_set_error (bfd_error_bad_value);
1149 	  ret = FALSE;
1150 	  continue;
1151 
1152 	case (int) R_I370_NONE:
1153 	  continue;
1154 
1155 	/* Relocations that may need to be propagated if this is a shared
1156 	   object.  */
1157 	case (int) R_I370_REL31:
1158 	  /* If these relocations are not to a named symbol, they can be
1159 	     handled right here, no need to bother the dynamic linker.  */
1160 	  if (h == NULL
1161 	      || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1162 	    break;
1163 	/* Fall through.  */
1164 
1165 	/* Relocations that always need to be propagated if this is a shared
1166 	   object.  */
1167 	case (int) R_I370_ADDR31:
1168 	case (int) R_I370_ADDR16:
1169 	  if (info->shared
1170 	      && r_symndx != STN_UNDEF)
1171 	    {
1172 	      Elf_Internal_Rela outrel;
1173 	      bfd_byte *loc;
1174 	      int skip;
1175 
1176 #ifdef DEBUG
1177 	      fprintf (stderr,
1178 		       "i370_elf_relocate_section needs to create relocation for %s\n",
1179 		       (h && h->root.root.string) ? h->root.root.string : "<unknown>");
1180 #endif
1181 
1182 	      /* When generating a shared object, these relocations
1183 		 are copied into the output file to be resolved at run
1184 		 time.  */
1185 
1186 	      if (sreloc == NULL)
1187 		{
1188 		  sreloc = _bfd_elf_get_dynamic_reloc_section
1189 		    (input_bfd, input_section, /*rela?*/ TRUE);
1190 		  if (sreloc == NULL)
1191 		    return FALSE;
1192 		}
1193 
1194 	      skip = 0;
1195 
1196 	      outrel.r_offset =
1197 		_bfd_elf_section_offset (output_bfd, info, input_section,
1198 					 rel->r_offset);
1199 	      if (outrel.r_offset == (bfd_vma) -1
1200 		  || outrel.r_offset == (bfd_vma) -2)
1201 		skip = (int) outrel.r_offset;
1202 	      outrel.r_offset += (input_section->output_section->vma
1203 				  + input_section->output_offset);
1204 
1205 	      if (skip)
1206 		memset (&outrel, 0, sizeof outrel);
1207 	      /* h->dynindx may be -1 if this symbol was marked to
1208 		 become local.  */
1209 	      else if (h != NULL
1210 		       && ((! info->symbolic && h->dynindx != -1)
1211 			   || !h->def_regular))
1212 		{
1213 		  BFD_ASSERT (h->dynindx != -1);
1214 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1215 		  outrel.r_addend = rel->r_addend;
1216 		}
1217 	      else
1218 		{
1219 		  if (r_type == R_I370_ADDR31)
1220 		    {
1221 		      outrel.r_info = ELF32_R_INFO (0, R_I370_RELATIVE);
1222 		      outrel.r_addend = relocation + rel->r_addend;
1223 		    }
1224 		  else
1225 		    {
1226 		      long indx;
1227 
1228 		      if (bfd_is_abs_section (sec))
1229 			indx = 0;
1230 		      else if (sec == NULL || sec->owner == NULL)
1231 			{
1232 			  bfd_set_error (bfd_error_bad_value);
1233 			  return FALSE;
1234 			}
1235 		      else
1236 			{
1237 			  asection *osec;
1238 
1239 			  /* We are turning this relocation into one
1240 			     against a section symbol.  It would be
1241 			     proper to subtract the symbol's value,
1242 			     osec->vma, from the emitted reloc addend,
1243 			     but ld.so expects buggy relocs.  */
1244 			  osec = sec->output_section;
1245 			  indx = elf_section_data (osec)->dynindx;
1246 			  if (indx == 0)
1247 			    {
1248 			      struct elf_link_hash_table *htab;
1249 			      htab = elf_hash_table (info);
1250 			      osec = htab->text_index_section;
1251 			      indx = elf_section_data (osec)->dynindx;
1252 			    }
1253 			  BFD_ASSERT (indx != 0);
1254 #ifdef DEBUG
1255 			  if (indx <= 0)
1256 			    {
1257 			      printf ("indx=%ld section=%s flags=%08x name=%s\n",
1258 				      indx, osec->name, osec->flags,
1259 				      h->root.root.string);
1260 			    }
1261 #endif
1262 			}
1263 
1264 		      outrel.r_info = ELF32_R_INFO (indx, r_type);
1265 		      outrel.r_addend = relocation + rel->r_addend;
1266 		    }
1267 		}
1268 
1269 	      loc = sreloc->contents;
1270 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
1271 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
1272 
1273 	      /* This reloc will be computed at runtime, so there's no
1274 		 need to do anything now, unless this is a RELATIVE
1275 		 reloc in an unallocated section.  */
1276 	      if (skip == -1
1277 		  || (input_section->flags & SEC_ALLOC) != 0
1278 		  || ELF32_R_TYPE (outrel.r_info) != R_I370_RELATIVE)
1279 		continue;
1280 	    }
1281 	  break;
1282 
1283 	case (int) R_I370_COPY:
1284 	case (int) R_I370_RELATIVE:
1285 	  (*_bfd_error_handler)
1286 	    ("%B: Relocation %s is not yet supported for symbol %s.",
1287 	     input_bfd,
1288 	     i370_elf_howto_table[(int) r_type]->name,
1289 	     sym_name);
1290 
1291 	  bfd_set_error (bfd_error_invalid_operation);
1292 	  ret = FALSE;
1293 	  continue;
1294 	}
1295 
1296 #ifdef DEBUG
1297       fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, offset = %ld, addend = %ld\n",
1298 	       howto->name,
1299 	       (int)r_type,
1300 	       sym_name,
1301 	       r_symndx,
1302 	       (long) offset,
1303 	       (long) addend);
1304 #endif
1305 
1306       r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
1307 				    offset, relocation, addend);
1308 
1309       if (r != bfd_reloc_ok)
1310 	{
1311 	  ret = FALSE;
1312 	  switch (r)
1313 	    {
1314 	    default:
1315 	      break;
1316 
1317 	    case bfd_reloc_overflow:
1318 	      {
1319 		const char *name;
1320 
1321 		if (h != NULL)
1322 		  name = NULL;
1323 		else
1324 		  {
1325 		    name = bfd_elf_string_from_elf_section (input_bfd,
1326 							    symtab_hdr->sh_link,
1327 							    sym->st_name);
1328 		    if (name == NULL)
1329 		      break;
1330 
1331 		    if (*name == '\0')
1332 		      name = bfd_section_name (input_bfd, sec);
1333 		  }
1334 
1335 		(*info->callbacks->reloc_overflow) (info,
1336 						    (h ? &h->root : NULL),
1337 						    name,
1338 						    howto->name,
1339 						    (bfd_vma) 0,
1340 						    input_bfd,
1341 						    input_section,
1342 						    offset);
1343 	      }
1344 	      break;
1345 	    }
1346 	}
1347     }
1348 
1349 #ifdef DEBUG
1350   fprintf (stderr, "\n");
1351 #endif
1352 
1353   return ret;
1354 }
1355 
1356 #define TARGET_BIG_SYM		bfd_elf32_i370_vec
1357 #define TARGET_BIG_NAME		"elf32-i370"
1358 #define ELF_ARCH		bfd_arch_i370
1359 #define ELF_MACHINE_CODE	EM_S370
1360 #ifdef EM_I370_OLD
1361 #define ELF_MACHINE_ALT1	EM_I370_OLD
1362 #endif
1363 #define ELF_MAXPAGESIZE		0x1000
1364 #define ELF_OSABI		ELFOSABI_GNU
1365 
1366 #define elf_info_to_howto	i370_elf_info_to_howto
1367 
1368 #define elf_backend_plt_not_loaded 1
1369 #define elf_backend_rela_normal    1
1370 
1371 #define bfd_elf32_bfd_reloc_type_lookup		i370_elf_reloc_type_lookup
1372 #define bfd_elf32_bfd_reloc_name_lookup	i370_elf_reloc_name_lookup
1373 #define bfd_elf32_bfd_set_private_flags		i370_elf_set_private_flags
1374 #define bfd_elf32_bfd_merge_private_bfd_data	i370_elf_merge_private_bfd_data
1375 #define elf_backend_relocate_section		i370_elf_relocate_section
1376 
1377 /* Dynamic loader support is mostly broken; just enough here to be able to
1378    link glibc's ld.so without errors.  */
1379 #define elf_backend_create_dynamic_sections	i370_elf_create_dynamic_sections
1380 #define elf_backend_size_dynamic_sections	i370_elf_size_dynamic_sections
1381 #define elf_backend_init_index_section		_bfd_elf_init_1_index_section
1382 #define elf_backend_finish_dynamic_sections	i370_elf_finish_dynamic_sections
1383 #define elf_backend_fake_sections		i370_elf_fake_sections
1384 #define elf_backend_section_from_shdr		i370_elf_section_from_shdr
1385 #define elf_backend_adjust_dynamic_symbol	i370_elf_adjust_dynamic_symbol
1386 #define elf_backend_check_relocs		i370_elf_check_relocs
1387 #define elf_backend_post_process_headers	_bfd_elf_set_osabi
1388 
1389 static int
i370_noop(void)1390 i370_noop (void)
1391 {
1392   return 1;
1393 }
1394 
1395 #define elf_backend_finish_dynamic_symbol \
1396   (bfd_boolean (*) \
1397      (bfd *, struct bfd_link_info *, struct elf_link_hash_entry *, \
1398       Elf_Internal_Sym *)) i370_noop
1399 
1400 #include "elf32-target.h"
1401