1 /* i370-specific support for 32-bit ELF
2 Copyright 1994, 1995, 1996, 1997, 1998, 2000, 2001
3 Free Software Foundation, Inc.
4 Written by Ian Lance Taylor, Cygnus Support.
7 This file is part of BFD, the Binary File Descriptor library.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
23 /* This file is based on a preliminary PowerPC ELF ABI.
24 But its been hacked on for the IBM 360/370 architectures.
25 Basically, the 31bit relocation works, and just about everything
26 else is a wild card. In particular, don't expect shared libs or
27 dynamic loading to work ... its never been tested ...
37 #define USE_RELA /* we want RELA relocations, not REL */
39 /* i370 relocations */
40 /* Note that there is really just one relocation that we currently
41 * support (and only one that we seem to need, at the moment), and
42 * that is the 31-bit address relocation. Note that the 370/390
43 * only supports a 31-bit (2GB) address space.
63 static reloc_howto_type *i370_elf_howto_table[ (int)R_I370_max ];
65 static reloc_howto_type i370_elf_howto_raw[] =
67 /* This reloc does nothing. */
68 HOWTO (R_I370_NONE, /* type */
70 2, /* size (0 = byte, 1 = short, 2 = long) */
72 false, /* pc_relative */
74 complain_overflow_bitfield, /* complain_on_overflow */
75 bfd_elf_generic_reloc, /* special_function */
76 "R_I370_NONE", /* name */
77 false, /* partial_inplace */
80 false), /* pcrel_offset */
82 /* A standard 31 bit relocation. */
83 HOWTO (R_I370_ADDR31, /* type */
85 2, /* size (0 = byte, 1 = short, 2 = long) */
87 false, /* pc_relative */
89 complain_overflow_bitfield, /* complain_on_overflow */
90 bfd_elf_generic_reloc, /* special_function */
91 "R_I370_ADDR31", /* name */
92 false, /* partial_inplace */
94 0x7fffffff, /* dst_mask */
95 false), /* pcrel_offset */
97 /* A standard 32 bit relocation. */
98 HOWTO (R_I370_ADDR32, /* type */
100 2, /* size (0 = byte, 1 = short, 2 = long) */
102 false, /* pc_relative */
104 complain_overflow_bitfield, /* complain_on_overflow */
105 bfd_elf_generic_reloc, /* special_function */
106 "R_I370_ADDR32", /* name */
107 false, /* partial_inplace */
109 0xffffffff, /* dst_mask */
110 false), /* pcrel_offset */
112 /* A standard 16 bit relocation. */
113 HOWTO (R_I370_ADDR16, /* type */
115 1, /* size (0 = byte, 1 = short, 2 = long) */
117 false, /* pc_relative */
119 complain_overflow_bitfield, /* complain_on_overflow */
120 bfd_elf_generic_reloc, /* special_function */
121 "R_I370_ADDR16", /* name */
122 false, /* partial_inplace */
124 0xffff, /* dst_mask */
125 false), /* pcrel_offset */
127 /* 31-bit PC relative */
128 HOWTO (R_I370_REL31, /* type */
130 2, /* size (0 = byte, 1 = short, 2 = long) */
132 true, /* pc_relative */
134 complain_overflow_bitfield, /* complain_on_overflow */
135 bfd_elf_generic_reloc, /* special_function */
136 "R_I370_REL31", /* name */
137 false, /* partial_inplace */
139 0x7fffffff, /* dst_mask */
140 true), /* pcrel_offset */
142 /* 32-bit PC relative */
143 HOWTO (R_I370_REL32, /* type */
145 2, /* size (0 = byte, 1 = short, 2 = long) */
147 true, /* pc_relative */
149 complain_overflow_bitfield, /* complain_on_overflow */
150 bfd_elf_generic_reloc, /* special_function */
151 "R_I370_REL32", /* name */
152 false, /* partial_inplace */
154 0xffffffff, /* dst_mask */
155 true), /* pcrel_offset */
157 /* A standard 12 bit relocation. */
158 HOWTO (R_I370_ADDR12, /* type */
160 1, /* size (0 = byte, 1 = short, 2 = long) */
162 false, /* pc_relative */
164 complain_overflow_bitfield, /* complain_on_overflow */
165 bfd_elf_generic_reloc, /* special_function */
166 "R_I370_ADDR12", /* name */
167 false, /* partial_inplace */
169 0xfff, /* dst_mask */
170 false), /* pcrel_offset */
172 /* 12-bit PC relative */
173 HOWTO (R_I370_REL12, /* type */
175 1, /* size (0 = byte, 1 = short, 2 = long) */
177 true, /* pc_relative */
179 complain_overflow_bitfield, /* complain_on_overflow */
180 bfd_elf_generic_reloc, /* special_function */
181 "R_I370_REL12", /* name */
182 false, /* partial_inplace */
184 0xfff, /* dst_mask */
185 true), /* pcrel_offset */
187 /* A standard 8 bit relocation. */
188 HOWTO (R_I370_ADDR8, /* type */
190 0, /* size (0 = byte, 1 = short, 2 = long) */
192 false, /* pc_relative */
194 complain_overflow_bitfield, /* complain_on_overflow */
195 bfd_elf_generic_reloc, /* special_function */
196 "R_I370_ADDR8", /* name */
197 false, /* partial_inplace */
200 false), /* pcrel_offset */
202 /* 8-bit PC relative */
203 HOWTO (R_I370_REL8, /* type */
205 0, /* size (0 = byte, 1 = short, 2 = long) */
207 true, /* pc_relative */
209 complain_overflow_bitfield, /* complain_on_overflow */
210 bfd_elf_generic_reloc, /* special_function */
211 "R_I370_REL8", /* name */
212 false, /* partial_inplace */
215 true), /* pcrel_offset */
217 /* This is used only by the dynamic linker. The symbol should exist
218 both in the object being run and in some shared library. The
219 dynamic linker copies the data addressed by the symbol from the
220 shared library into the object, because the object being
221 run has to have the data at some particular address. */
222 HOWTO (R_I370_COPY, /* type */
224 2, /* size (0 = byte, 1 = short, 2 = long) */
226 false, /* pc_relative */
228 complain_overflow_bitfield, /* complain_on_overflow */
229 bfd_elf_generic_reloc, /* special_function */
230 "R_I370_COPY", /* name */
231 false, /* partial_inplace */
234 false), /* pcrel_offset */
236 /* Used only by the dynamic linker. When the object is run, this
237 longword is set to the load address of the object, plus the
239 HOWTO (R_I370_RELATIVE, /* type */
241 2, /* size (0 = byte, 1 = short, 2 = long) */
243 false, /* pc_relative */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_I370_RELATIVE", /* name */
248 false, /* partial_inplace */
250 0xffffffff, /* dst_mask */
251 false), /* pcrel_offset */
255 static void i370_elf_howto_init PARAMS ((void));
256 static reloc_howto_type *i370_elf_reloc_type_lookup
257 PARAMS ((bfd *, bfd_reloc_code_real_type));
259 static void i370_elf_info_to_howto PARAMS ((bfd *abfd, arelent *cache_ptr,
260 Elf32_Internal_Rela *dst));
261 static boolean i370_elf_set_private_flags PARAMS ((bfd *, flagword));
263 /* Initialize the i370_elf_howto_table, so that linear accesses can be done. */
266 i370_elf_howto_init ()
268 unsigned int i, type;
270 for (i = 0; i < sizeof (i370_elf_howto_raw) / sizeof (i370_elf_howto_raw[0]); i++)
272 type = i370_elf_howto_raw[i].type;
273 BFD_ASSERT (type < sizeof (i370_elf_howto_table) / sizeof (i370_elf_howto_table[0]));
274 i370_elf_howto_table[type] = &i370_elf_howto_raw[i];
278 static reloc_howto_type *
279 i370_elf_reloc_type_lookup (abfd, code)
280 bfd *abfd ATTRIBUTE_UNUSED;
281 bfd_reloc_code_real_type code;
283 enum i370_reloc_type i370_reloc = R_I370_NONE;
285 if (!i370_elf_howto_table[ R_I370_ADDR31 ]) /* Initialize howto table if needed */
286 i370_elf_howto_init ();
291 return (reloc_howto_type *)NULL;
293 case BFD_RELOC_NONE: i370_reloc = R_I370_NONE; break;
294 case BFD_RELOC_32: i370_reloc = R_I370_ADDR31; break;
295 case BFD_RELOC_16: i370_reloc = R_I370_ADDR16; break;
296 case BFD_RELOC_32_PCREL: i370_reloc = R_I370_REL31; break;
297 case BFD_RELOC_CTOR: i370_reloc = R_I370_ADDR31; break;
298 case BFD_RELOC_I370_D12: i370_reloc = R_I370_ADDR12; break;
301 return i370_elf_howto_table[ (int)i370_reloc ];
304 static boolean i370_elf_copy_private_bfd_data PARAMS ((bfd *, bfd *));
305 static boolean i370_elf_merge_private_bfd_data PARAMS ((bfd *, bfd *));
307 static boolean i370_elf_relocate_section PARAMS ((bfd *,
308 struct bfd_link_info *info,
312 Elf_Internal_Rela *relocs,
313 Elf_Internal_Sym *local_syms,
315 static void i370_elf_post_process_headers
316 PARAMS ((bfd *, struct bfd_link_info *));
318 static boolean i370_elf_create_dynamic_sections PARAMS ((bfd *,
319 struct bfd_link_info *));
321 static boolean i370_elf_section_from_shdr PARAMS ((bfd *,
322 Elf32_Internal_Shdr *,
324 static boolean i370_elf_fake_sections PARAMS ((bfd *,
325 Elf32_Internal_Shdr *,
328 static elf_linker_section_t *i370_elf_create_linker_section
330 struct bfd_link_info *info,
331 enum elf_linker_section_enum));
333 static boolean i370_elf_check_relocs PARAMS ((bfd *,
334 struct bfd_link_info *,
336 const Elf_Internal_Rela *));
338 static boolean i370_elf_adjust_dynamic_symbol PARAMS ((struct bfd_link_info *,
339 struct elf_link_hash_entry *));
341 static boolean i370_elf_adjust_dynindx PARAMS ((struct elf_link_hash_entry *, PTR));
343 static boolean i370_elf_size_dynamic_sections PARAMS ((bfd *, struct bfd_link_info *));
345 static boolean i370_elf_finish_dynamic_sections PARAMS ((bfd *, struct bfd_link_info *));
347 /* The name of the dynamic interpreter. This is put in the .interp
350 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so"
352 /* Set the howto pointer for an i370 ELF reloc. */
355 i370_elf_info_to_howto (abfd, cache_ptr, dst)
356 bfd *abfd ATTRIBUTE_UNUSED;
358 Elf32_Internal_Rela *dst;
360 if (!i370_elf_howto_table[ R_I370_ADDR31 ]) /* Initialize howto table */
361 i370_elf_howto_init ();
363 BFD_ASSERT (ELF32_R_TYPE (dst->r_info) < (unsigned int) R_I370_max);
364 cache_ptr->howto = i370_elf_howto_table[ELF32_R_TYPE (dst->r_info)];
367 /* hack alert -- the following several routines look generic to me ...
368 * why are we bothering with them ???
370 /* Function to set whether a module needs the -mrelocatable bit set. */
372 i370_elf_set_private_flags (abfd, flags)
376 BFD_ASSERT (!elf_flags_init (abfd)
377 || elf_elfheader (abfd)->e_flags == flags);
379 elf_elfheader (abfd)->e_flags = flags;
380 elf_flags_init (abfd) = true;
384 /* Copy backend specific data from one object module to another */
386 i370_elf_copy_private_bfd_data (ibfd, obfd)
390 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
391 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
394 BFD_ASSERT (!elf_flags_init (obfd)
395 || elf_elfheader (obfd)->e_flags == elf_elfheader (ibfd)->e_flags);
397 elf_elfheader (obfd)->e_flags = elf_elfheader (ibfd)->e_flags;
398 elf_flags_init (obfd) = true;
402 /* Merge backend specific data from an object file to the output
403 object file when linking */
405 i370_elf_merge_private_bfd_data (ibfd, obfd)
412 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
413 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
416 new_flags = elf_elfheader (ibfd)->e_flags;
417 old_flags = elf_elfheader (obfd)->e_flags;
418 if (!elf_flags_init (obfd)) /* First call, no flags set */
420 elf_flags_init (obfd) = true;
421 elf_elfheader (obfd)->e_flags = new_flags;
424 else if (new_flags == old_flags) /* Compatible flags are ok */
427 else /* Incompatible flags */
429 (*_bfd_error_handler)
430 ("%s: uses different e_flags (0x%lx) fields than previous modules (0x%lx)",
431 bfd_archive_filename (ibfd), (long) new_flags, (long) old_flags);
433 bfd_set_error (bfd_error_bad_value);
440 /* Handle an i370 specific section when reading an object file. This
441 is called when elfcode.h finds a section with an unknown type. */
442 /* XXX hack alert bogus This routine is mostly all junk and almost
443 * certainly does the wrong thing. Its here simply because it does
444 * just enough to allow glibc-2.1 ld.so to compile & link.
448 i370_elf_section_from_shdr (abfd, hdr, name)
450 Elf32_Internal_Shdr *hdr;
456 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
459 newsect = hdr->bfd_section;
460 flags = bfd_get_section_flags (abfd, newsect);
461 if (hdr->sh_flags & SHF_EXCLUDE)
462 flags |= SEC_EXCLUDE;
464 if (hdr->sh_type == SHT_ORDERED)
465 flags |= SEC_SORT_ENTRIES;
467 bfd_set_section_flags (abfd, newsect, flags);
471 /* Set up any other section flags and such that may be necessary. */
472 /* XXX hack alert bogus This routine is mostly all junk and almost
473 * certainly does the wrong thing. Its here simply because it does
474 * just enough to allow glibc-2.1 ld.so to compile & link.
478 i370_elf_fake_sections (abfd, shdr, asect)
479 bfd *abfd ATTRIBUTE_UNUSED;
480 Elf32_Internal_Shdr *shdr;
483 if ((asect->flags & SEC_EXCLUDE) != 0)
484 shdr->sh_flags |= SHF_EXCLUDE;
486 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
487 shdr->sh_type = SHT_ORDERED;
493 /* Create a special linker section */
494 /* XXX hack alert bogus This routine is mostly all junk and almost
495 * certainly does the wrong thing. Its here simply because it does
496 * just enough to allow glibc-2.1 ld.so to compile & link.
499 static elf_linker_section_t *
500 i370_elf_create_linker_section (abfd, info, which)
502 struct bfd_link_info *info;
503 enum elf_linker_section_enum which;
505 bfd *dynobj = elf_hash_table (info)->dynobj;
506 elf_linker_section_t *lsect;
508 /* Record the first bfd section that needs the special section */
510 dynobj = elf_hash_table (info)->dynobj = abfd;
512 /* If this is the first time, create the section */
513 lsect = elf_linker_section (dynobj, which);
516 elf_linker_section_t defaults;
517 static elf_linker_section_t zero_section;
519 defaults = zero_section;
520 defaults.which = which;
521 defaults.hole_written_p = false;
522 defaults.alignment = 2;
524 /* Both of these sections are (technically) created by the user
525 putting data in them, so they shouldn't be marked
528 The linker creates them so it has somewhere to attach their
529 respective symbols. In fact, if they were empty it would
530 be OK to leave the symbol set to 0 (or any random number), because
531 the appropriate register should never be used. */
532 defaults.flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
538 (*_bfd_error_handler) ("%s: Unknown special linker type %d",
539 bfd_archive_filename (abfd),
542 bfd_set_error (bfd_error_bad_value);
543 return (elf_linker_section_t *)0;
545 case LINKER_SECTION_SDATA: /* .sdata/.sbss section */
546 defaults.name = ".sdata";
547 defaults.rel_name = ".rela.sdata";
548 defaults.bss_name = ".sbss";
549 defaults.sym_name = "_SDA_BASE_";
550 defaults.sym_offset = 32768;
553 case LINKER_SECTION_SDATA2: /* .sdata2/.sbss2 section */
554 defaults.name = ".sdata2";
555 defaults.rel_name = ".rela.sdata2";
556 defaults.bss_name = ".sbss2";
557 defaults.sym_name = "_SDA2_BASE_";
558 defaults.sym_offset = 32768;
559 defaults.flags |= SEC_READONLY;
563 lsect = _bfd_elf_create_linker_section (abfd, info, which, &defaults);
570 /* We have to create .dynsbss and .rela.sbss here so that they get mapped
571 to output sections (just like _bfd_elf_create_dynamic_sections has
572 to create .dynbss and .rela.bss). */
573 /* XXX hack alert bogus This routine is mostly all junk and almost
574 * certainly does the wrong thing. Its here simply because it does
575 * just enough to allow glibc-2.1 ld.so to compile & link.
579 i370_elf_create_dynamic_sections (abfd, info)
581 struct bfd_link_info *info;
583 register asection *s;
586 if (!_bfd_elf_create_dynamic_sections(abfd, info))
589 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
590 | SEC_LINKER_CREATED);
592 s = bfd_make_section (abfd, ".dynsbss");
594 || ! bfd_set_section_flags (abfd, s, SEC_ALLOC))
599 s = bfd_make_section (abfd, ".rela.sbss");
601 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
602 || ! bfd_set_section_alignment (abfd, s, 2))
606 /* xxx beats me, seem to need a rela.text ... */
607 s = bfd_make_section (abfd, ".rela.text");
609 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
610 || ! bfd_set_section_alignment (abfd, s, 2))
615 /* Adjust a symbol defined by a dynamic object and referenced by a
616 regular object. The current definition is in some section of the
617 dynamic object, but we're not including those sections. We have to
618 change the definition to something the rest of the link can
620 /* XXX hack alert bogus This routine is mostly all junk and almost
621 * certainly does the wrong thing. Its here simply because it does
622 * just enough to allow glibc-2.1 ld.so to compile & link.
626 i370_elf_adjust_dynamic_symbol (info, h)
627 struct bfd_link_info *info;
628 struct elf_link_hash_entry *h;
630 bfd *dynobj = elf_hash_table (info)->dynobj;
632 unsigned int power_of_two;
635 fprintf (stderr, "i370_elf_adjust_dynamic_symbol called for %s\n",
636 h->root.root.string);
639 /* Make sure we know what is going on here. */
640 BFD_ASSERT (dynobj != NULL
641 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
642 || h->weakdef != NULL
643 || ((h->elf_link_hash_flags
644 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
645 && (h->elf_link_hash_flags
646 & ELF_LINK_HASH_REF_REGULAR) != 0
647 && (h->elf_link_hash_flags
648 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
650 s = bfd_get_section_by_name (dynobj, ".rela.text");
651 BFD_ASSERT (s != NULL);
652 s->_raw_size += sizeof (Elf32_External_Rela);
654 /* If this is a weak symbol, and there is a real definition, the
655 processor independent code will have arranged for us to see the
656 real definition first, and we can just use the same value. */
657 if (h->weakdef != NULL)
659 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
660 || h->weakdef->root.type == bfd_link_hash_defweak);
661 h->root.u.def.section = h->weakdef->root.u.def.section;
662 h->root.u.def.value = h->weakdef->root.u.def.value;
666 /* This is a reference to a symbol defined by a dynamic object which
667 is not a function. */
669 /* If we are creating a shared library, we must presume that the
670 only references to the symbol are via the global offset table.
671 For such cases we need not do anything here; the relocations will
672 be handled correctly by relocate_section. */
676 /* We must allocate the symbol in our .dynbss section, which will
677 become part of the .bss section of the executable. There will be
678 an entry for this symbol in the .dynsym section. The dynamic
679 object will contain position independent code, so all references
680 from the dynamic object to this symbol will go through the global
681 offset table. The dynamic linker will use the .dynsym entry to
682 determine the address it must put in the global offset table, so
683 both the dynamic object and the regular object will refer to the
684 same memory location for the variable.
686 Of course, if the symbol is sufficiently small, we must instead
687 allocate it in .sbss. FIXME: It would be better to do this if and
688 only if there were actually SDAREL relocs for that symbol. */
690 if (h->size <= elf_gp_size (dynobj))
691 s = bfd_get_section_by_name (dynobj, ".dynsbss");
693 s = bfd_get_section_by_name (dynobj, ".dynbss");
694 BFD_ASSERT (s != NULL);
696 /* We must generate a R_I370_COPY reloc to tell the dynamic linker to
697 copy the initial value out of the dynamic object and into the
698 runtime process image. We need to remember the offset into the
699 .rela.bss section we are going to use. */
700 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
704 if (h->size <= elf_gp_size (dynobj))
705 srel = bfd_get_section_by_name (dynobj, ".rela.sbss");
707 srel = bfd_get_section_by_name (dynobj, ".rela.bss");
708 BFD_ASSERT (srel != NULL);
709 srel->_raw_size += sizeof (Elf32_External_Rela);
710 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
713 /* We need to figure out the alignment required for this symbol. I
714 have no idea how ELF linkers handle this. */
715 power_of_two = bfd_log2 (h->size);
716 if (power_of_two > 4)
719 /* Apply the required alignment. */
720 s->_raw_size = BFD_ALIGN (s->_raw_size,
721 (bfd_size_type) (1 << power_of_two));
722 if (power_of_two > bfd_get_section_alignment (dynobj, s))
724 if (! bfd_set_section_alignment (dynobj, s, power_of_two))
728 /* Define the symbol as being at this point in the section. */
729 h->root.u.def.section = s;
730 h->root.u.def.value = s->_raw_size;
732 /* Increment the section size to make room for the symbol. */
733 s->_raw_size += h->size;
738 /* Increment the index of a dynamic symbol by a given amount. Called
739 via elf_link_hash_traverse. */
740 /* XXX hack alert bogus This routine is mostly all junk and almost
741 * certainly does the wrong thing. Its here simply because it does
742 * just enough to allow glibc-2.1 ld.so to compile & link.
746 i370_elf_adjust_dynindx (h, cparg)
747 struct elf_link_hash_entry *h;
750 int *cp = (int *) cparg;
754 "i370_elf_adjust_dynindx called, h->dynindx = %d, *cp = %d\n",
758 if (h->dynindx != -1)
764 /* Set the sizes of the dynamic sections. */
765 /* XXX hack alert bogus This routine is mostly all junk and almost
766 * certainly does the wrong thing. Its here simply because it does
767 * just enough to allow glibc-2.1 ld.so to compile & link.
771 i370_elf_size_dynamic_sections (output_bfd, info)
773 struct bfd_link_info *info;
782 fprintf (stderr, "i370_elf_size_dynamic_sections called\n");
785 dynobj = elf_hash_table (info)->dynobj;
786 BFD_ASSERT (dynobj != NULL);
788 if (elf_hash_table (info)->dynamic_sections_created)
790 /* Set the contents of the .interp section to the interpreter. */
793 s = bfd_get_section_by_name (dynobj, ".interp");
794 BFD_ASSERT (s != NULL);
795 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
796 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
801 /* We may have created entries in the .rela.got, .rela.sdata, and
802 .rela.sdata2 sections. However, if we are not creating the
803 dynamic sections, we will not actually use these entries. Reset
804 the size of .rela.got, et al, which will cause it to get
805 stripped from the output file below. */
806 static char *rela_sections[] = { ".rela.got", ".rela.sdata",
807 ".rela.sdata2", ".rela.sbss",
811 for (p = rela_sections; *p != (char *)0; p++)
813 s = bfd_get_section_by_name (dynobj, *p);
819 /* The check_relocs and adjust_dynamic_symbol entry points have
820 determined the sizes of the various dynamic sections. Allocate
825 for (s = dynobj->sections; s != NULL; s = s->next)
830 if ((s->flags & SEC_LINKER_CREATED) == 0)
833 /* It's OK to base decisions on the section name, because none
834 of the dynobj section names depend upon the input files. */
835 name = bfd_get_section_name (dynobj, s);
838 if (strcmp (name, ".plt") == 0)
840 if (s->_raw_size == 0)
842 /* Strip this section if we don't need it; see the
848 /* Remember whether there is a PLT. */
852 else if (strncmp (name, ".rela", 5) == 0)
854 if (s->_raw_size == 0)
856 /* If we don't need this section, strip it from the
857 output file. This is mostly to handle .rela.bss and
858 .rela.plt. We must create both sections in
859 create_dynamic_sections, because they must be created
860 before the linker maps input sections to output
861 sections. The linker does that before
862 adjust_dynamic_symbol is called, and it is that
863 function which decides whether anything needs to go
864 into these sections. */
872 /* Remember whether there are any relocation sections. */
875 /* If this relocation section applies to a read only
876 section, then we probably need a DT_TEXTREL entry. */
877 outname = bfd_get_section_name (output_bfd,
879 target = bfd_get_section_by_name (output_bfd, outname + 5);
881 && (target->flags & SEC_READONLY) != 0
882 && (target->flags & SEC_ALLOC) != 0)
885 /* We use the reloc_count field as a counter if we need
886 to copy relocs into the output file. */
890 else if (strcmp (name, ".got") != 0
891 && strcmp (name, ".sdata") != 0
892 && strcmp (name, ".sdata2") != 0)
894 /* It's not one of our sections, so don't allocate space. */
902 for (spp = &s->output_section->owner->sections;
903 *spp != s->output_section;
906 *spp = s->output_section->next;
907 --s->output_section->owner->section_count;
911 /* Allocate memory for the section contents. */
912 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
913 if (s->contents == NULL && s->_raw_size != 0)
917 if (elf_hash_table (info)->dynamic_sections_created)
919 /* Add some entries to the .dynamic section. We fill in the
920 values later, in i370_elf_finish_dynamic_sections, but we
921 must add the entries now so that we get the correct size for
922 the .dynamic section. The DT_DEBUG entry is filled in by the
923 dynamic linker and used by the debugger. */
924 #define add_dynamic_entry(TAG, VAL) \
925 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
929 if (!add_dynamic_entry (DT_DEBUG, 0))
935 if (!add_dynamic_entry (DT_PLTGOT, 0)
936 || !add_dynamic_entry (DT_PLTRELSZ, 0)
937 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
938 || !add_dynamic_entry (DT_JMPREL, 0))
944 if (!add_dynamic_entry (DT_RELA, 0)
945 || !add_dynamic_entry (DT_RELASZ, 0)
946 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
952 if (!add_dynamic_entry (DT_TEXTREL, 0))
954 info->flags |= DF_TEXTREL;
957 #undef add_dynamic_entry
959 /* If we are generating a shared library, we generate a section
960 symbol for each output section. These are local symbols, which
961 means that they must come first in the dynamic symbol table.
962 That means we must increment the dynamic symbol index of every
963 other dynamic symbol.
965 FIXME: We assume that there will never be relocations to
966 locations in linker-created sections that do not have
967 externally-visible names. Instead, we should work out precisely
968 which sections relocations are targetted at. */
973 for (c = 0, s = output_bfd->sections; s != NULL; s = s->next)
975 if ((s->flags & SEC_LINKER_CREATED) != 0
976 || (s->flags & SEC_ALLOC) == 0)
978 elf_section_data (s)->dynindx = -1;
982 /* These symbols will have no names, so we don't need to
983 fiddle with dynstr_index. */
985 elf_section_data (s)->dynindx = c + 1;
990 elf_link_hash_traverse (elf_hash_table (info),
991 i370_elf_adjust_dynindx,
993 elf_hash_table (info)->dynsymcount += c;
999 /* Look through the relocs for a section during the first phase, and
1000 allocate space in the global offset table or procedure linkage
1002 /* XXX hack alert bogus This routine is mostly all junk and almost
1003 * certainly does the wrong thing. Its here simply because it does
1004 * just enough to allow glibc-2.1 ld.so to compile & link.
1008 i370_elf_check_relocs (abfd, info, sec, relocs)
1010 struct bfd_link_info *info;
1012 const Elf_Internal_Rela *relocs;
1015 Elf_Internal_Shdr *symtab_hdr;
1016 struct elf_link_hash_entry **sym_hashes;
1017 const Elf_Internal_Rela *rel;
1018 const Elf_Internal_Rela *rel_end;
1019 bfd_vma *local_got_offsets;
1022 if (info->relocateable)
1026 fprintf (stderr, "i370_elf_check_relocs called for section %s in %s\n",
1027 bfd_get_section_name (abfd, sec),
1028 bfd_archive_filename (abfd));
1031 dynobj = elf_hash_table (info)->dynobj;
1032 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1033 sym_hashes = elf_sym_hashes (abfd);
1034 local_got_offsets = elf_local_got_offsets (abfd);
1038 rel_end = relocs + sec->reloc_count;
1039 for (rel = relocs; rel < rel_end; rel++)
1041 unsigned long r_symndx;
1042 struct elf_link_hash_entry *h;
1044 r_symndx = ELF32_R_SYM (rel->r_info);
1045 if (r_symndx < symtab_hdr->sh_info)
1048 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1054 "i370_elf_check_relocs needs to create relocation for %s\n",
1055 (h && h->root.root.string)
1056 ? h->root.root.string : "<unknown>");
1062 name = (bfd_elf_string_from_elf_section
1064 elf_elfheader (abfd)->e_shstrndx,
1065 elf_section_data (sec)->rel_hdr.sh_name));
1069 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1070 && strcmp (bfd_get_section_name (abfd, sec), name + 5) == 0);
1072 sreloc = bfd_get_section_by_name (dynobj, name);
1077 sreloc = bfd_make_section (dynobj, name);
1078 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1079 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1080 if ((sec->flags & SEC_ALLOC) != 0)
1081 flags |= SEC_ALLOC | SEC_LOAD;
1083 || ! bfd_set_section_flags (dynobj, sreloc, flags)
1084 || ! bfd_set_section_alignment (dynobj, sreloc, 2))
1089 sreloc->_raw_size += sizeof (Elf32_External_Rela);
1091 /* FIXME: We should here do what the m68k and i386
1092 backends do: if the reloc is pc-relative, record it
1093 in case it turns out that the reloc is unnecessary
1094 because the symbol is forced local by versioning or
1095 we are linking with -Bdynamic. Fortunately this
1096 case is not frequent. */
1103 /* Finish up the dynamic sections. */
1104 /* XXX hack alert bogus This routine is mostly all junk and almost
1105 * certainly does the wrong thing. Its here simply because it does
1106 * just enough to allow glibc-2.1 ld.so to compile & link.
1110 i370_elf_finish_dynamic_sections (output_bfd, info)
1112 struct bfd_link_info *info;
1115 bfd *dynobj = elf_hash_table (info)->dynobj;
1116 asection *sgot = bfd_get_section_by_name (dynobj, ".got");
1119 fprintf (stderr, "i370_elf_finish_dynamic_sections called\n");
1122 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
1124 if (elf_hash_table (info)->dynamic_sections_created)
1127 Elf32_External_Dyn *dyncon, *dynconend;
1129 splt = bfd_get_section_by_name (dynobj, ".plt");
1130 BFD_ASSERT (splt != NULL && sdyn != NULL);
1132 dyncon = (Elf32_External_Dyn *) sdyn->contents;
1133 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
1134 for (; dyncon < dynconend; dyncon++)
1136 Elf_Internal_Dyn dyn;
1140 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
1144 case DT_PLTGOT: name = ".plt"; size = false; break;
1145 case DT_PLTRELSZ: name = ".rela.plt"; size = true; break;
1146 case DT_JMPREL: name = ".rela.plt"; size = false; break;
1147 default: name = NULL; size = false; break;
1154 s = bfd_get_section_by_name (output_bfd, name);
1160 dyn.d_un.d_ptr = s->vma;
1163 if (s->_cooked_size != 0)
1164 dyn.d_un.d_val = s->_cooked_size;
1166 dyn.d_un.d_val = s->_raw_size;
1169 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
1174 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4 so that a function can
1175 easily find the address of the _GLOBAL_OFFSET_TABLE_. */
1176 /* XXX this is clearly very wrong for the 370 arch */
1179 unsigned char *contents = sgot->contents;
1180 bfd_put_32 (output_bfd, (bfd_vma) 0x4e800021 /* blrl */, contents);
1183 bfd_put_32 (output_bfd, (bfd_vma) 0, contents+4);
1185 bfd_put_32 (output_bfd,
1186 sdyn->output_section->vma + sdyn->output_offset,
1189 elf_section_data (sgot->output_section)->this_hdr.sh_entsize = 4;
1196 Elf_Internal_Sym sym;
1199 /* Set up the section symbols for the output sections. */
1201 sdynsym = bfd_get_section_by_name (dynobj, ".dynsym");
1202 BFD_ASSERT (sdynsym != NULL);
1206 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
1209 for (s = output_bfd->sections; s != NULL; s = s->next)
1212 Elf32_External_Sym *esym;
1214 sym.st_value = s->vma;
1216 indx = elf_section_data (s)->this_idx;
1217 dindx = elf_section_data (s)->dynindx;
1220 BFD_ASSERT(indx > 0);
1221 BFD_ASSERT(dindx > 0);
1223 if (dindx > maxdindx)
1226 sym.st_shndx = indx;
1228 esym = (Elf32_External_Sym *) sdynsym->contents + dindx;
1229 bfd_elf32_swap_symbol_out (output_bfd, &sym, (PTR) esym, (PTR) 0);
1233 /* Set the sh_info field of the output .dynsym section to the
1234 index of the first global symbol. */
1235 elf_section_data (sdynsym->output_section)->this_hdr.sh_info =
1242 /* The RELOCATE_SECTION function is called by the ELF backend linker
1243 to handle the relocations for a section.
1245 The relocs are always passed as Rela structures; if the section
1246 actually uses Rel structures, the r_addend field will always be
1249 This function is responsible for adjust the section contents as
1250 necessary, and (if using Rela relocs and generating a
1251 relocateable output file) adjusting the reloc addend as
1254 This function does not have to worry about setting the reloc
1255 address or the reloc symbol index.
1257 LOCAL_SYMS is a pointer to the swapped in local symbols.
1259 LOCAL_SECTIONS is an array giving the section in the input file
1260 corresponding to the st_shndx field of each local symbol.
1262 The global hash table entry for the global symbols can be found
1263 via elf_sym_hashes (input_bfd).
1265 When generating relocateable output, this function must handle
1266 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
1267 going to be the section symbol corresponding to the output
1268 section, which means that the addend must be adjusted
1272 i370_elf_relocate_section (output_bfd, info, input_bfd, input_section,
1273 contents, relocs, local_syms, local_sections)
1275 struct bfd_link_info *info;
1277 asection *input_section;
1279 Elf_Internal_Rela *relocs;
1280 Elf_Internal_Sym *local_syms;
1281 asection **local_sections;
1283 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
1284 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
1285 bfd *dynobj = elf_hash_table (info)->dynobj;
1286 Elf_Internal_Rela *rel = relocs;
1287 Elf_Internal_Rela *relend = relocs + input_section->reloc_count;
1288 asection *sreloc = NULL;
1289 bfd_vma *local_got_offsets;
1293 fprintf (stderr, "i370_elf_relocate_section called for %s section %s, %ld relocations%s\n",
1294 bfd_archive_filename (input_bfd),
1295 bfd_section_name(input_bfd, input_section),
1296 (long) input_section->reloc_count,
1297 (info->relocateable) ? " (relocatable)" : "");
1300 if (!i370_elf_howto_table[ R_I370_ADDR31 ]) /* Initialize howto table if needed */
1301 i370_elf_howto_init ();
1303 local_got_offsets = elf_local_got_offsets (input_bfd);
1305 for (; rel < relend; rel++)
1307 enum i370_reloc_type r_type = (enum i370_reloc_type)ELF32_R_TYPE (rel->r_info);
1308 bfd_vma offset = rel->r_offset;
1309 bfd_vma addend = rel->r_addend;
1310 bfd_reloc_status_type r = bfd_reloc_other;
1311 Elf_Internal_Sym *sym = (Elf_Internal_Sym *)0;
1312 asection *sec = (asection *)0;
1313 struct elf_link_hash_entry *h = (struct elf_link_hash_entry *)0;
1314 const char *sym_name = (const char *)0;
1315 reloc_howto_type *howto;
1316 unsigned long r_symndx;
1319 /* Unknown relocation handling */
1320 if ((unsigned)r_type >= (unsigned)R_I370_max
1321 || !i370_elf_howto_table[(int)r_type])
1323 (*_bfd_error_handler) ("%s: unknown relocation type %d",
1324 bfd_archive_filename (input_bfd),
1327 bfd_set_error (bfd_error_bad_value);
1332 howto = i370_elf_howto_table[(int)r_type];
1333 r_symndx = ELF32_R_SYM (rel->r_info);
1335 if (info->relocateable)
1337 /* This is a relocateable link. We don't have to change
1338 anything, unless the reloc is against a section symbol,
1339 in which case we have to adjust according to where the
1340 section symbol winds up in the output section. */
1341 if (r_symndx < symtab_hdr->sh_info)
1343 sym = local_syms + r_symndx;
1344 if ((unsigned)ELF_ST_TYPE (sym->st_info) == STT_SECTION)
1346 sec = local_sections[r_symndx];
1347 addend = rel->r_addend += sec->output_offset + sym->st_value;
1352 fprintf (stderr, "\ttype = %s (%d), symbol index = %ld, offset = %ld, addend = %ld\n",
1362 /* This is a final link. */
1363 if (r_symndx < symtab_hdr->sh_info)
1365 sym = local_syms + r_symndx;
1366 sec = local_sections[r_symndx];
1367 sym_name = "<local symbol>";
1369 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
1370 addend = rel->r_addend;
1374 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1375 while (h->root.type == bfd_link_hash_indirect
1376 || h->root.type == bfd_link_hash_warning)
1377 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1378 sym_name = h->root.root.string;
1379 if (h->root.type == bfd_link_hash_defined
1380 || h->root.type == bfd_link_hash_defweak)
1382 sec = h->root.u.def.section;
1384 && ((! info->symbolic && h->dynindx != -1)
1385 || (h->elf_link_hash_flags
1386 & ELF_LINK_HASH_DEF_REGULAR) == 0)
1387 && (input_section->flags & SEC_ALLOC) != 0
1388 && (r_type == R_I370_ADDR31
1389 || r_type == R_I370_COPY
1390 || r_type == R_I370_ADDR16
1391 || r_type == R_I370_RELATIVE))
1393 /* In these cases, we don't need the relocation
1394 value. We check specially because in some
1395 obscure cases sec->output_section will be NULL. */
1399 relocation = (h->root.u.def.value
1400 + sec->output_section->vma
1401 + sec->output_offset);
1403 else if (h->root.type == bfd_link_hash_undefweak)
1405 else if (info->shared
1406 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
1410 (*info->callbacks->undefined_symbol) (info,
1411 h->root.root.string,
1421 switch ((int) r_type)
1424 (*_bfd_error_handler)
1425 ("%s: unknown relocation type %d for symbol %s",
1426 bfd_archive_filename (input_bfd),
1427 (int) r_type, sym_name);
1429 bfd_set_error (bfd_error_bad_value);
1433 case (int)R_I370_NONE:
1436 /* Relocations that may need to be propagated if this is a shared
1438 case (int)R_I370_REL31:
1439 /* If these relocations are not to a named symbol, they can be
1440 handled right here, no need to bother the dynamic linker. */
1442 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
1446 /* Relocations that always need to be propagated if this is a shared
1448 case (int)R_I370_ADDR31:
1449 case (int)R_I370_ADDR16:
1453 Elf_Internal_Rela outrel;
1458 "i370_elf_relocate_section needs to create relocation for %s\n",
1459 (h && h->root.root.string) ? h->root.root.string : "<unknown>");
1462 /* When generating a shared object, these relocations
1463 are copied into the output file to be resolved at run
1470 name = (bfd_elf_string_from_elf_section
1472 elf_elfheader (input_bfd)->e_shstrndx,
1473 elf_section_data (input_section)->rel_hdr.sh_name));
1477 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
1478 && strcmp (bfd_get_section_name (input_bfd,
1482 sreloc = bfd_get_section_by_name (dynobj, name);
1483 BFD_ASSERT (sreloc != NULL);
1489 _bfd_elf_section_offset (output_bfd, info, input_section,
1491 if (outrel.r_offset == (bfd_vma) -1)
1493 outrel.r_offset += (input_section->output_section->vma
1494 + input_section->output_offset);
1497 memset (&outrel, 0, sizeof outrel);
1498 /* h->dynindx may be -1 if this symbol was marked to
1501 && ((! info->symbolic && h->dynindx != -1)
1502 || (h->elf_link_hash_flags
1503 & ELF_LINK_HASH_DEF_REGULAR) == 0))
1505 BFD_ASSERT (h->dynindx != -1);
1506 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
1507 outrel.r_addend = rel->r_addend;
1511 if (r_type == R_I370_ADDR31)
1513 outrel.r_info = ELF32_R_INFO (0, R_I370_RELATIVE);
1514 outrel.r_addend = relocation + rel->r_addend;
1521 sec = local_sections[r_symndx];
1524 BFD_ASSERT (h->root.type == bfd_link_hash_defined
1526 == bfd_link_hash_defweak));
1527 sec = h->root.u.def.section;
1529 if (sec != NULL && bfd_is_abs_section (sec))
1531 else if (sec == NULL || sec->owner == NULL)
1533 bfd_set_error (bfd_error_bad_value);
1540 osec = sec->output_section;
1541 indx = elf_section_data (osec)->dynindx;
1542 BFD_ASSERT(indx > 0);
1546 printf ("indx=%d section=%s flags=%08x name=%s\n",
1547 indx, osec->name, osec->flags,
1548 h->root.root.string);
1553 outrel.r_info = ELF32_R_INFO (indx, r_type);
1554 outrel.r_addend = relocation + rel->r_addend;
1558 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
1559 (((Elf32_External_Rela *)
1561 + sreloc->reloc_count));
1562 ++sreloc->reloc_count;
1564 /* This reloc will be computed at runtime, so there's no
1565 need to do anything now, unless this is a RELATIVE
1566 reloc in an unallocated section. */
1568 || (input_section->flags & SEC_ALLOC) != 0
1569 || ELF32_R_TYPE (outrel.r_info) != R_I370_RELATIVE)
1574 case (int)R_I370_COPY:
1575 case (int)R_I370_RELATIVE:
1576 (*_bfd_error_handler)
1577 ("%s: Relocation %s is not yet supported for symbol %s.",
1578 bfd_archive_filename (input_bfd),
1579 i370_elf_howto_table[(int) r_type]->name,
1582 bfd_set_error (bfd_error_invalid_operation);
1588 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, offset = %ld, addend = %ld\n",
1597 r = _bfd_final_link_relocate (howto,
1605 if (r != bfd_reloc_ok)
1613 case bfd_reloc_overflow:
1618 name = h->root.root.string;
1621 name = bfd_elf_string_from_elf_section (input_bfd,
1622 symtab_hdr->sh_link,
1628 name = bfd_section_name (input_bfd, sec);
1631 (*info->callbacks->reloc_overflow) (info,
1646 fprintf (stderr, "\n");
1653 i370_elf_post_process_headers (abfd, link_info)
1655 struct bfd_link_info * link_info ATTRIBUTE_UNUSED;
1657 Elf_Internal_Ehdr * i_ehdrp; /* Elf file header, internal form */
1659 i_ehdrp = elf_elfheader (abfd);
1660 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
1663 #define TARGET_BIG_SYM bfd_elf32_i370_vec
1664 #define TARGET_BIG_NAME "elf32-i370"
1665 #define ELF_ARCH bfd_arch_i370
1666 #define ELF_MACHINE_CODE EM_S370
1668 #define ELF_MACHINE_ALT1 EM_I370_OLD
1670 #define ELF_MAXPAGESIZE 0x1000
1671 #define elf_info_to_howto i370_elf_info_to_howto
1673 #define elf_backend_plt_not_loaded 1
1674 #define elf_backend_got_symbol_offset 4
1676 #define bfd_elf32_bfd_reloc_type_lookup i370_elf_reloc_type_lookup
1677 #define bfd_elf32_bfd_set_private_flags i370_elf_set_private_flags
1678 #define bfd_elf32_bfd_copy_private_bfd_data i370_elf_copy_private_bfd_data
1679 #define bfd_elf32_bfd_merge_private_bfd_data i370_elf_merge_private_bfd_data
1680 #define elf_backend_relocate_section i370_elf_relocate_section
1682 /* dynamic loader support is mostly broken; just enough here to be able to
1683 * link glibc's ld.so without errors.
1685 #define elf_backend_create_dynamic_sections i370_elf_create_dynamic_sections
1686 #define elf_backend_size_dynamic_sections i370_elf_size_dynamic_sections
1687 #define elf_backend_finish_dynamic_sections i370_elf_finish_dynamic_sections
1688 #define elf_backend_fake_sections i370_elf_fake_sections
1689 #define elf_backend_section_from_shdr i370_elf_section_from_shdr
1690 #define elf_backend_adjust_dynamic_symbol i370_elf_adjust_dynamic_symbol
1691 #define elf_backend_check_relocs i370_elf_check_relocs
1694 #define elf_backend_add_symbol_hook i370_elf_add_symbol_hook
1695 #define elf_backend_finish_dynamic_symbol i370_elf_finish_dynamic_symbol
1696 #define elf_backend_additional_program_headers i370_elf_additional_program_headers
1697 #define elf_backend_modify_segment_map i370_elf_modify_segment_map
1700 #define elf_backend_post_process_headers i370_elf_post_process_headers
1702 static int i370_noop PARAMS ((void));
1704 static int i370_noop ()
1709 /* we need to define these at least as no-ops to link glibc ld.so */
1711 #define elf_backend_add_symbol_hook \
1712 (boolean (*) PARAMS ((bfd *, struct bfd_link_info *, \
1713 const Elf_Internal_Sym *, const char **, flagword *, \
1714 asection **, bfd_vma *))) i370_noop
1715 #define elf_backend_finish_dynamic_symbol \
1716 (boolean (*) PARAMS ((bfd *, struct bfd_link_info *, \
1717 struct elf_link_hash_entry *, \
1718 Elf_Internal_Sym *))) i370_noop
1719 #define elf_backend_additional_program_headers \
1720 (int (*) PARAMS ((bfd *))) i370_noop
1721 #define elf_backend_modify_segment_map \
1722 (boolean (*) PARAMS ((bfd *))) i370_noop
1724 #include "elf32-target.h"