1 /* IBM S/390-specific support for 32-bit ELF
2    Copyright (C) 2000-2021 Free Software Foundation, Inc.
3    Contributed by Carl B. Pedersen and Martin Schwidefsky.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20    02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29 
30 static bfd_reloc_status_type
31 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 		asection *, bfd *, char **);
33 static bfd_reloc_status_type
34 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 		      asection *, bfd *, char **);
36 
37 /* The relocation "howto" table.  */
38 
39 static reloc_howto_type elf_howto_table[] =
40 {
41   HOWTO (R_390_NONE,		/* type */
42 	 0,			/* rightshift */
43 	 3,			/* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
44 	 0,			/* bitsize */
45 	 false,			/* pc_relative */
46 	 0,			/* bitpos */
47 	 complain_overflow_dont, /* complain_on_overflow */
48 	 bfd_elf_generic_reloc, /* special_function */
49 	 "R_390_NONE",		/* name */
50 	 false,			/* partial_inplace */
51 	 0,			/* src_mask */
52 	 0,			/* dst_mask */
53 	 false),		/* pcrel_offset */
54 
55   HOWTO(R_390_8,	 0, 0,	8, false, 0, complain_overflow_bitfield,
56 	bfd_elf_generic_reloc, "R_390_8",	 false, 0,0x000000ff, false),
57   HOWTO(R_390_12,	 0, 1, 12, false, 0, complain_overflow_dont,
58 	bfd_elf_generic_reloc, "R_390_12",	 false, 0,0x00000fff, false),
59   HOWTO(R_390_16,	 0, 1, 16, false, 0, complain_overflow_bitfield,
60 	bfd_elf_generic_reloc, "R_390_16",	 false, 0,0x0000ffff, false),
61   HOWTO(R_390_32,	 0, 2, 32, false, 0, complain_overflow_bitfield,
62 	bfd_elf_generic_reloc, "R_390_32",	 false, 0,0xffffffff, false),
63   HOWTO(R_390_PC32,	 0, 2, 32,  true, 0, complain_overflow_bitfield,
64 	bfd_elf_generic_reloc, "R_390_PC32",	 false, 0,0xffffffff, true),
65   HOWTO(R_390_GOT12,	 0, 1, 12, false, 0, complain_overflow_bitfield,
66 	bfd_elf_generic_reloc, "R_390_GOT12",	 false, 0,0x00000fff, false),
67   HOWTO(R_390_GOT32,	 0, 2, 32, false, 0, complain_overflow_bitfield,
68 	bfd_elf_generic_reloc, "R_390_GOT32",	 false, 0,0xffffffff, false),
69   HOWTO(R_390_PLT32,	 0, 2, 32,  true, 0, complain_overflow_bitfield,
70 	bfd_elf_generic_reloc, "R_390_PLT32",	 false, 0,0xffffffff, true),
71   HOWTO(R_390_COPY,	 0, 2, 32, false, 0, complain_overflow_bitfield,
72 	bfd_elf_generic_reloc, "R_390_COPY",	 false, 0,0xffffffff, false),
73   HOWTO(R_390_GLOB_DAT,	 0, 2, 32, false, 0, complain_overflow_bitfield,
74 	bfd_elf_generic_reloc, "R_390_GLOB_DAT", false, 0,0xffffffff, false),
75   HOWTO(R_390_JMP_SLOT,	 0, 2, 32, false, 0, complain_overflow_bitfield,
76 	bfd_elf_generic_reloc, "R_390_JMP_SLOT", false, 0,0xffffffff, false),
77   HOWTO(R_390_RELATIVE,	 0, 2, 32,  true, 0, complain_overflow_bitfield,
78 	bfd_elf_generic_reloc, "R_390_RELATIVE", false, 0,0xffffffff, false),
79   HOWTO(R_390_GOTOFF32,	 0, 2, 32, false, 0, complain_overflow_bitfield,
80 	bfd_elf_generic_reloc, "R_390_GOTOFF32", false, 0,0xffffffff, false),
81   HOWTO(R_390_GOTPC,	 0, 2, 32,  true, 0, complain_overflow_bitfield,
82 	bfd_elf_generic_reloc, "R_390_GOTPC",	 false, 0,0xffffffff, true),
83   HOWTO(R_390_GOT16,	 0, 1, 16, false, 0, complain_overflow_bitfield,
84 	bfd_elf_generic_reloc, "R_390_GOT16",	 false, 0,0x0000ffff, false),
85   HOWTO(R_390_PC16,	 0, 1, 16,  true, 0, complain_overflow_bitfield,
86 	bfd_elf_generic_reloc, "R_390_PC16",	 false, 0,0x0000ffff, true),
87   HOWTO(R_390_PC16DBL,	 1, 1, 16,  true, 0, complain_overflow_bitfield,
88 	bfd_elf_generic_reloc, "R_390_PC16DBL",	 false, 0,0x0000ffff, true),
89   HOWTO(R_390_PLT16DBL,	 1, 1, 16,  true, 0, complain_overflow_bitfield,
90 	bfd_elf_generic_reloc, "R_390_PLT16DBL", false, 0,0x0000ffff, true),
91   HOWTO(R_390_PC32DBL,	 1, 2, 32,  true, 0, complain_overflow_bitfield,
92 	bfd_elf_generic_reloc, "R_390_PC32DBL",	 false, 0,0xffffffff, true),
93   HOWTO(R_390_PLT32DBL,	 1, 2, 32,  true, 0, complain_overflow_bitfield,
94 	bfd_elf_generic_reloc, "R_390_PLT32DBL", false, 0,0xffffffff, true),
95   HOWTO(R_390_GOTPCDBL,	 1, 2, 32,  true, 0, complain_overflow_bitfield,
96 	bfd_elf_generic_reloc, "R_390_GOTPCDBL", false, 0,0xffffffff, true),
97   EMPTY_HOWTO (R_390_64),	/* Empty entry for R_390_64.  */
98   EMPTY_HOWTO (R_390_PC64),	/* Empty entry for R_390_PC64.  */
99   EMPTY_HOWTO (R_390_GOT64),	/* Empty entry for R_390_GOT64.  */
100   EMPTY_HOWTO (R_390_PLT64),	/* Empty entry for R_390_PLT64.  */
101   HOWTO(R_390_GOTENT,	 1, 2, 32,  true, 0, complain_overflow_bitfield,
102 	bfd_elf_generic_reloc, "R_390_GOTENT",	 false, 0,0xffffffff, true),
103   HOWTO(R_390_GOTOFF16,	 0, 1, 16, false, 0, complain_overflow_bitfield,
104 	bfd_elf_generic_reloc, "R_390_GOTOFF16", false, 0,0x0000ffff, false),
105   EMPTY_HOWTO (R_390_GOTOFF64),	/* Empty entry for R_390_GOTOFF64.  */
106   HOWTO(R_390_GOTPLT12,	 0, 1, 12, false, 0, complain_overflow_dont,
107 	bfd_elf_generic_reloc, "R_390_GOTPLT12", false, 0,0x00000fff, false),
108   HOWTO(R_390_GOTPLT16,	 0, 1, 16, false, 0, complain_overflow_bitfield,
109 	bfd_elf_generic_reloc, "R_390_GOTPLT16", false, 0,0x0000ffff, false),
110   HOWTO(R_390_GOTPLT32,	 0, 2, 32, false, 0, complain_overflow_bitfield,
111 	bfd_elf_generic_reloc, "R_390_GOTPLT32", false, 0,0xffffffff, false),
112   EMPTY_HOWTO (R_390_GOTPLT64),	/* Empty entry for R_390_GOTPLT64.  */
113   HOWTO(R_390_GOTPLTENT, 1, 2, 32,  true, 0, complain_overflow_bitfield,
114 	bfd_elf_generic_reloc, "R_390_GOTPLTENT",false, 0,0xffffffff, true),
115   HOWTO(R_390_PLTOFF16,	 0, 1, 16, false, 0, complain_overflow_bitfield,
116 	bfd_elf_generic_reloc, "R_390_PLTOFF16", false, 0,0x0000ffff, false),
117   HOWTO(R_390_PLTOFF32,	 0, 2, 32, false, 0, complain_overflow_bitfield,
118 	bfd_elf_generic_reloc, "R_390_PLTOFF32", false, 0,0xffffffff, false),
119   EMPTY_HOWTO (R_390_PLTOFF64),	/* Empty entry for R_390_PLTOFF64.  */
120   HOWTO(R_390_TLS_LOAD, 0, 0, 0, false, 0, complain_overflow_dont,
121 	s390_tls_reloc, "R_390_TLS_LOAD", false, 0, 0, false),
122   HOWTO(R_390_TLS_GDCALL, 0, 0, 0, false, 0, complain_overflow_dont,
123 	s390_tls_reloc, "R_390_TLS_GDCALL", false, 0, 0, false),
124   HOWTO(R_390_TLS_LDCALL, 0, 0, 0, false, 0, complain_overflow_dont,
125 	s390_tls_reloc, "R_390_TLS_LDCALL", false, 0, 0, false),
126   HOWTO(R_390_TLS_GD32, 0, 2, 32, false, 0, complain_overflow_bitfield,
127 	bfd_elf_generic_reloc, "R_390_TLS_GD32", false, 0, 0xffffffff, false),
128   EMPTY_HOWTO (R_390_TLS_GD64),	/* Empty entry for R_390_TLS_GD64.  */
129   HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, false, 0, complain_overflow_dont,
130 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", false, 0, 0x00000fff, false),
131   HOWTO(R_390_TLS_GOTIE32, 0, 2, 32, false, 0, complain_overflow_bitfield,
132 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", false, 0, 0xffffffff, false),
133   EMPTY_HOWTO (R_390_TLS_GOTIE64),	/* Empty entry for R_390_TLS_GOTIE64.  */
134   HOWTO(R_390_TLS_LDM32, 0, 2, 32, false, 0, complain_overflow_bitfield,
135 	bfd_elf_generic_reloc, "R_390_TLS_LDM32", false, 0, 0xffffffff, false),
136   EMPTY_HOWTO (R_390_TLS_LDM64),	/* Empty entry for R_390_TLS_LDM64.  */
137   HOWTO(R_390_TLS_IE32, 0, 2, 32, false, 0, complain_overflow_bitfield,
138 	bfd_elf_generic_reloc, "R_390_TLS_IE32", false, 0, 0xffffffff, false),
139   EMPTY_HOWTO (R_390_TLS_IE64),	/* Empty entry for R_390_TLS_IE64.  */
140   HOWTO(R_390_TLS_IEENT, 1, 2, 32, true, 0, complain_overflow_bitfield,
141 	bfd_elf_generic_reloc, "R_390_TLS_IEENT", false, 0, 0xffffffff, true),
142   HOWTO(R_390_TLS_LE32, 0, 2, 32, false, 0, complain_overflow_bitfield,
143 	bfd_elf_generic_reloc, "R_390_TLS_LE32", false, 0, 0xffffffff, false),
144   EMPTY_HOWTO (R_390_TLS_LE64),	/* Empty entry for R_390_TLS_LE64.  */
145   HOWTO(R_390_TLS_LDO32, 0, 2, 32, false, 0, complain_overflow_bitfield,
146 	bfd_elf_generic_reloc, "R_390_TLS_LDO32", false, 0, 0xffffffff, false),
147   EMPTY_HOWTO (R_390_TLS_LDO64),	/* Empty entry for R_390_TLS_LDO64.  */
148   HOWTO(R_390_TLS_DTPMOD, 0, 2, 32, false, 0, complain_overflow_bitfield,
149 	bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", false, 0, 0xffffffff, false),
150   HOWTO(R_390_TLS_DTPOFF, 0, 2, 32, false, 0, complain_overflow_bitfield,
151 	bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", false, 0, 0xffffffff, false),
152   HOWTO(R_390_TLS_TPOFF, 0, 2, 32, false, 0, complain_overflow_bitfield,
153 	bfd_elf_generic_reloc, "R_390_TLS_TPOFF", false, 0, 0xffffffff, false),
154   HOWTO(R_390_20,	 0, 2, 20, false, 8, complain_overflow_dont,
155 	s390_elf_ldisp_reloc, "R_390_20",      false, 0,0x0fffff00, false),
156   HOWTO(R_390_GOT20,	 0, 2, 20, false, 8, complain_overflow_dont,
157 	s390_elf_ldisp_reloc, "R_390_GOT20",   false, 0,0x0fffff00, false),
158   HOWTO(R_390_GOTPLT20,	 0, 2, 20, false, 8, complain_overflow_dont,
159 	s390_elf_ldisp_reloc, "R_390_GOTPLT20", false, 0,0x0fffff00, false),
160   HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, false, 8, complain_overflow_dont,
161 	s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", false, 0,0x0fffff00, false),
162   HOWTO(R_390_IRELATIVE, 0, 2, 32, true, 0, complain_overflow_bitfield,
163 	bfd_elf_generic_reloc, "R_390_IRELATIVE", false, 0, 0xffffffff, false),
164   HOWTO(R_390_PC12DBL,	 1, 1, 12,  true, 0, complain_overflow_bitfield,
165 	bfd_elf_generic_reloc, "R_390_PC12DBL",	 false, 0,0x00000fff, true),
166   HOWTO(R_390_PLT12DBL,	 1, 1, 12,  true, 0, complain_overflow_bitfield,
167 	bfd_elf_generic_reloc, "R_390_PLT12DBL", false, 0,0x00000fff, true),
168   HOWTO(R_390_PC24DBL,	 1, 2, 24,  true, 0, complain_overflow_bitfield,
169 	bfd_elf_generic_reloc, "R_390_PC24DBL",	 false, 0,0x00ffffff, true),
170   HOWTO(R_390_PLT24DBL,	 1, 2, 24,  true, 0, complain_overflow_bitfield,
171 	bfd_elf_generic_reloc, "R_390_PLT24DBL", false, 0,0x00ffffff, true),
172 };
173 
174 /* GNU extension to record C++ vtable hierarchy.  */
175 static reloc_howto_type elf32_s390_vtinherit_howto =
176   HOWTO (R_390_GNU_VTINHERIT, 0,2,0,false,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", false,0, 0, false);
177 static reloc_howto_type elf32_s390_vtentry_howto =
178   HOWTO (R_390_GNU_VTENTRY, 0,2,0,false,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", false,0,0, false);
179 
180 static reloc_howto_type *
elf_s390_reloc_type_lookup(bfd * abfd ATTRIBUTE_UNUSED,bfd_reloc_code_real_type code)181 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 			    bfd_reloc_code_real_type code)
183 {
184   switch (code)
185     {
186     case BFD_RELOC_NONE:
187       return &elf_howto_table[(int) R_390_NONE];
188     case BFD_RELOC_8:
189       return &elf_howto_table[(int) R_390_8];
190     case BFD_RELOC_390_12:
191       return &elf_howto_table[(int) R_390_12];
192     case BFD_RELOC_16:
193       return &elf_howto_table[(int) R_390_16];
194     case BFD_RELOC_32:
195       return &elf_howto_table[(int) R_390_32];
196     case BFD_RELOC_CTOR:
197       return &elf_howto_table[(int) R_390_32];
198     case BFD_RELOC_32_PCREL:
199       return &elf_howto_table[(int) R_390_PC32];
200     case BFD_RELOC_390_GOT12:
201       return &elf_howto_table[(int) R_390_GOT12];
202     case BFD_RELOC_32_GOT_PCREL:
203       return &elf_howto_table[(int) R_390_GOT32];
204     case BFD_RELOC_390_PLT32:
205       return &elf_howto_table[(int) R_390_PLT32];
206     case BFD_RELOC_390_COPY:
207       return &elf_howto_table[(int) R_390_COPY];
208     case BFD_RELOC_390_GLOB_DAT:
209       return &elf_howto_table[(int) R_390_GLOB_DAT];
210     case BFD_RELOC_390_JMP_SLOT:
211       return &elf_howto_table[(int) R_390_JMP_SLOT];
212     case BFD_RELOC_390_RELATIVE:
213       return &elf_howto_table[(int) R_390_RELATIVE];
214     case BFD_RELOC_32_GOTOFF:
215       return &elf_howto_table[(int) R_390_GOTOFF32];
216     case BFD_RELOC_390_GOTPC:
217       return &elf_howto_table[(int) R_390_GOTPC];
218     case BFD_RELOC_390_GOT16:
219       return &elf_howto_table[(int) R_390_GOT16];
220     case BFD_RELOC_16_PCREL:
221       return &elf_howto_table[(int) R_390_PC16];
222     case BFD_RELOC_390_PC12DBL:
223       return &elf_howto_table[(int) R_390_PC12DBL];
224     case BFD_RELOC_390_PLT12DBL:
225       return &elf_howto_table[(int) R_390_PLT12DBL];
226     case BFD_RELOC_390_PC16DBL:
227       return &elf_howto_table[(int) R_390_PC16DBL];
228     case BFD_RELOC_390_PLT16DBL:
229       return &elf_howto_table[(int) R_390_PLT16DBL];
230     case BFD_RELOC_390_PC24DBL:
231       return &elf_howto_table[(int) R_390_PC24DBL];
232     case BFD_RELOC_390_PLT24DBL:
233       return &elf_howto_table[(int) R_390_PLT24DBL];
234     case BFD_RELOC_390_PC32DBL:
235       return &elf_howto_table[(int) R_390_PC32DBL];
236     case BFD_RELOC_390_PLT32DBL:
237       return &elf_howto_table[(int) R_390_PLT32DBL];
238     case BFD_RELOC_390_GOTPCDBL:
239       return &elf_howto_table[(int) R_390_GOTPCDBL];
240     case BFD_RELOC_390_GOTENT:
241       return &elf_howto_table[(int) R_390_GOTENT];
242     case BFD_RELOC_16_GOTOFF:
243       return &elf_howto_table[(int) R_390_GOTOFF16];
244     case BFD_RELOC_390_GOTPLT12:
245       return &elf_howto_table[(int) R_390_GOTPLT12];
246     case BFD_RELOC_390_GOTPLT16:
247       return &elf_howto_table[(int) R_390_GOTPLT16];
248     case BFD_RELOC_390_GOTPLT32:
249       return &elf_howto_table[(int) R_390_GOTPLT32];
250     case BFD_RELOC_390_GOTPLTENT:
251       return &elf_howto_table[(int) R_390_GOTPLTENT];
252     case BFD_RELOC_390_PLTOFF16:
253       return &elf_howto_table[(int) R_390_PLTOFF16];
254     case BFD_RELOC_390_PLTOFF32:
255       return &elf_howto_table[(int) R_390_PLTOFF32];
256     case BFD_RELOC_390_TLS_LOAD:
257       return &elf_howto_table[(int) R_390_TLS_LOAD];
258     case BFD_RELOC_390_TLS_GDCALL:
259       return &elf_howto_table[(int) R_390_TLS_GDCALL];
260     case BFD_RELOC_390_TLS_LDCALL:
261       return &elf_howto_table[(int) R_390_TLS_LDCALL];
262     case BFD_RELOC_390_TLS_GD32:
263       return &elf_howto_table[(int) R_390_TLS_GD32];
264     case BFD_RELOC_390_TLS_GOTIE12:
265       return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266     case BFD_RELOC_390_TLS_GOTIE32:
267       return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268     case BFD_RELOC_390_TLS_LDM32:
269       return &elf_howto_table[(int) R_390_TLS_LDM32];
270     case BFD_RELOC_390_TLS_IE32:
271       return &elf_howto_table[(int) R_390_TLS_IE32];
272     case BFD_RELOC_390_TLS_IEENT:
273       return &elf_howto_table[(int) R_390_TLS_IEENT];
274     case BFD_RELOC_390_TLS_LE32:
275       return &elf_howto_table[(int) R_390_TLS_LE32];
276     case BFD_RELOC_390_TLS_LDO32:
277       return &elf_howto_table[(int) R_390_TLS_LDO32];
278     case BFD_RELOC_390_TLS_DTPMOD:
279       return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280     case BFD_RELOC_390_TLS_DTPOFF:
281       return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282     case BFD_RELOC_390_TLS_TPOFF:
283       return &elf_howto_table[(int) R_390_TLS_TPOFF];
284     case BFD_RELOC_390_20:
285       return &elf_howto_table[(int) R_390_20];
286     case BFD_RELOC_390_GOT20:
287       return &elf_howto_table[(int) R_390_GOT20];
288     case BFD_RELOC_390_GOTPLT20:
289       return &elf_howto_table[(int) R_390_GOTPLT20];
290     case BFD_RELOC_390_TLS_GOTIE20:
291       return &elf_howto_table[(int) R_390_TLS_GOTIE20];
292     case BFD_RELOC_390_IRELATIVE:
293       return &elf_howto_table[(int) R_390_IRELATIVE];
294     case BFD_RELOC_VTABLE_INHERIT:
295       return &elf32_s390_vtinherit_howto;
296     case BFD_RELOC_VTABLE_ENTRY:
297       return &elf32_s390_vtentry_howto;
298     default:
299       break;
300     }
301   return 0;
302 }
303 
304 static reloc_howto_type *
elf_s390_reloc_name_lookup(bfd * abfd ATTRIBUTE_UNUSED,const char * r_name)305 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 			    const char *r_name)
307 {
308   unsigned int i;
309 
310   for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311     if (elf_howto_table[i].name != NULL
312 	&& strcasecmp (elf_howto_table[i].name, r_name) == 0)
313       return &elf_howto_table[i];
314 
315   if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316     return &elf32_s390_vtinherit_howto;
317   if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318     return &elf32_s390_vtentry_howto;
319 
320   return NULL;
321 }
322 
323 /* We need to use ELF32_R_TYPE so we have our own copy of this function,
324    and elf32-s390.c has its own copy.  */
325 
326 static bool
elf_s390_info_to_howto(bfd * abfd,arelent * cache_ptr,Elf_Internal_Rela * dst)327 elf_s390_info_to_howto (bfd *abfd,
328 			arelent *cache_ptr,
329 			Elf_Internal_Rela *dst)
330 {
331   unsigned int r_type = ELF32_R_TYPE(dst->r_info);
332 
333   switch (r_type)
334     {
335     case R_390_GNU_VTINHERIT:
336       cache_ptr->howto = &elf32_s390_vtinherit_howto;
337       break;
338 
339     case R_390_GNU_VTENTRY:
340       cache_ptr->howto = &elf32_s390_vtentry_howto;
341       break;
342 
343     default:
344       if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
345 	{
346 	  /* xgettext:c-format */
347 	  _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
348 			      abfd, r_type);
349 	  bfd_set_error (bfd_error_bad_value);
350 	  return false;
351 	}
352       cache_ptr->howto = &elf_howto_table[r_type];
353     }
354 
355   return true;
356 }
357 
358 /* A relocation function which doesn't do anything.  */
359 static bfd_reloc_status_type
s390_tls_reloc(bfd * abfd ATTRIBUTE_UNUSED,arelent * reloc_entry,asymbol * symbol ATTRIBUTE_UNUSED,void * data ATTRIBUTE_UNUSED,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)360 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
361 		arelent *reloc_entry,
362 		asymbol *symbol ATTRIBUTE_UNUSED,
363 		void * data ATTRIBUTE_UNUSED,
364 		asection *input_section,
365 		bfd *output_bfd,
366 		char **error_message ATTRIBUTE_UNUSED)
367 {
368   if (output_bfd)
369     reloc_entry->address += input_section->output_offset;
370   return bfd_reloc_ok;
371 }
372 
373 /* Handle the large displacement relocs.  */
374 static bfd_reloc_status_type
s390_elf_ldisp_reloc(bfd * abfd ATTRIBUTE_UNUSED,arelent * reloc_entry,asymbol * symbol,void * data ATTRIBUTE_UNUSED,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)375 s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
376 		      arelent *reloc_entry,
377 		      asymbol *symbol,
378 		      void * data ATTRIBUTE_UNUSED,
379 		      asection *input_section,
380 		      bfd *output_bfd,
381 		      char **error_message ATTRIBUTE_UNUSED)
382 {
383   reloc_howto_type *howto = reloc_entry->howto;
384   bfd_vma relocation;
385   bfd_vma insn;
386 
387   if (output_bfd != (bfd *) NULL
388       && (symbol->flags & BSF_SECTION_SYM) == 0
389       && (! howto->partial_inplace
390 	  || reloc_entry->addend == 0))
391     {
392       reloc_entry->address += input_section->output_offset;
393       return bfd_reloc_ok;
394     }
395 
396   if (output_bfd != NULL)
397     return bfd_reloc_continue;
398 
399   if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
400     return bfd_reloc_outofrange;
401 
402   relocation = (symbol->value
403 		+ symbol->section->output_section->vma
404 		+ symbol->section->output_offset);
405   relocation += reloc_entry->addend;
406   if (howto->pc_relative)
407     {
408       relocation -= (input_section->output_section->vma
409 		     + input_section->output_offset);
410       relocation -= reloc_entry->address;
411     }
412 
413   insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
414   insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
415   bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
416 
417   if ((bfd_signed_vma) relocation < - 0x80000
418       || (bfd_signed_vma) relocation > 0x7ffff)
419     return bfd_reloc_overflow;
420   else
421     return bfd_reloc_ok;
422 }
423 
424 static bool
elf_s390_is_local_label_name(bfd * abfd,const char * name)425 elf_s390_is_local_label_name (bfd *abfd, const char *name)
426 {
427   if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
428     return true;
429 
430   return _bfd_elf_is_local_label_name (abfd, name);
431 }
432 
433 /* Functions for the 390 ELF linker.  */
434 
435 /* The name of the dynamic interpreter.  This is put in the .interp
436    section.  */
437 
438 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
439 
440 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
441    copying dynamic variables from a shared lib into an app's dynbss
442    section, and instead use a dynamic relocation to point into the
443    shared lib.  */
444 #define ELIMINATE_COPY_RELOCS 1
445 
446 /* The size in bytes of the first entry in the procedure linkage table.  */
447 #define PLT_FIRST_ENTRY_SIZE 32
448 /* The size in bytes of an entry in the procedure linkage table.  */
449 #define PLT_ENTRY_SIZE 32
450 
451 #define GOT_ENTRY_SIZE 4
452 
453 #define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
454 
455 /* The first three entries in a procedure linkage table are reserved,
456    and the initial contents are unimportant (we zero them out).
457    Subsequent entries look like this.  See the SVR4 ABI 386
458    supplement to see how this works.  */
459 
460 /* For the s390, simple addr offset can only be 0 - 4096.
461    To use the full 2 GB address space, several instructions
462    are needed to load an address in a register and execute
463    a branch( or just saving the address)
464 
465    Furthermore, only r 0 and 1 are free to use!!!  */
466 
467 /* The first 3 words in the GOT are then reserved.
468    Word 0 is the address of the dynamic table.
469    Word 1 is a pointer to a structure describing the object
470    Word 2 is used to point to the loader entry address.
471 
472    The code for position independent PLT entries looks like this:
473 
474    r12 holds addr of the current GOT at entry to the PLT
475 
476    The GOT holds the address in the PLT to be executed.
477    The loader then gets:
478    24(15) =  Pointer to the structure describing the object.
479    28(15) =  Offset into rela.plt
480 
481    The loader  must  then find the module where the function is
482    and insert the address in the GOT.
483 
484   Note: 390 can only address +- 64 K relative.
485 	We check if offset > 65536, then make a relative branch -64xxx
486 	back to a previous defined branch
487 
488 PLT1: BASR 1,0	       # 2 bytes
489       L	   1,22(1)     # 4 bytes  Load offset in GOT in r 1
490       L	   1,(1,12)    # 4 bytes  Load address from GOT in r1
491       BCR  15,1	       # 2 bytes  Jump to address
492 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
493       L	   1,14(1)     # 4 bytes  Load offset in symol table in r1
494       BRC  15,-x       # 4 bytes  Jump to start of PLT
495       .word 0	       # 2 bytes filler
496       .long ?	       # 4 bytes  offset in GOT
497       .long ?	       # 4 bytes  offset into rela.plt
498 
499   This was the general case. There are two additional, optimizes PLT
500   definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
501   First the one for GOT offsets < 4096:
502 
503 PLT1: L	   1,<offset>(12) # 4 bytes  Load address from GOT in R1
504       BCR  15,1		  # 2 bytes  Jump to address
505       .word 0,0,0	  # 6 bytes  filler
506 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
507       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
508       BRC  15,-x	  # 4 bytes  Jump to start of PLT
509       .word 0,0,0	  # 6 bytes  filler
510       .long ?		  # 4 bytes  offset into rela.plt
511 
512   Second the one for GOT offsets < 32768:
513 
514 PLT1: LHI  1,<offset>	  # 4 bytes  Load offset in GOT to r1
515       L	   1,(1,12)	  # 4 bytes  Load address from GOT to r1
516       BCR  15,1		  # 2 bytes  Jump to address
517       .word 0		  # 2 bytes  filler
518 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
519       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
520       BRC  15,-x	  # 4 bytes  Jump to start of PLT
521       .word 0,0,0	  # 6 bytes  filler
522       .long ?		  # 4 bytes  offset into rela.plt
523 
524 Total = 32 bytes per PLT entry
525 
526    The code for static build PLT entries looks like this:
527 
528 PLT1: BASR 1,0	       # 2 bytes
529       L	   1,22(1)     # 4 bytes  Load address of GOT entry
530       L	   1,0(0,1)    # 4 bytes  Load address from GOT in r1
531       BCR  15,1	       # 2 bytes  Jump to address
532 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
533       L	   1,14(1)     # 4 bytes  Load offset in symbol table in r1
534       BRC  15,-x       # 4 bytes  Jump to start of PLT
535       .word 0	       # 2 bytes  filler
536       .long ?	       # 4 bytes  address of GOT entry
537       .long ?	       # 4 bytes  offset into rela.plt  */
538 
539 static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
540   {
541     0x0d, 0x10,				    /* basr    %r1,%r0	   */
542     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1) */
543     0x58, 0x10, 0x10, 0x00,		    /* l       %r1,0(%r1)  */
544     0x07, 0xf1,				    /* br      %r1	   */
545     0x0d, 0x10,				    /* basr    %r1,%r0	   */
546     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1) */
547     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt   */
548     0x00, 0x00,				    /* padding		   */
549     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	   */
550     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	   */
551   };
552 
553 /* Generic PLT pic entry.  */
554 static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
555   {
556     0x0d, 0x10,				    /* basr    %r1,%r0	       */
557     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1)     */
558     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
559     0x07, 0xf1,				    /* br      %r1	       */
560     0x0d, 0x10,				    /* basr    %r1,%r0	       */
561     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
562     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
563     0x00, 0x00,				    /* padding		       */
564     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	       */
565     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	       */
566   };
567 
568 /* Optimized PLT pic entry for GOT offset < 4k.  xx will be replaced
569    when generating the PLT slot with the GOT offset.  */
570 static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
571   {
572     0x58, 0x10, 0xc0, 0x00,		    /* l       %r1,xx(%r12) */
573     0x07, 0xf1,				    /* br      %r1	    */
574     0x00, 0x00, 0x00, 0x00,		    /* padding		    */
575     0x00, 0x00,
576     0x0d, 0x10,				    /* basr    %r1,%r0	    */
577     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)  */
578     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt    */
579     0x00, 0x00, 0x00, 0x00,
580     0x00, 0x00, 0x00, 0x00
581   };
582 
583 /* Optimized PLT pic entry for GOT offset < 32k.  xx will be replaced
584    when generating the PLT slot with the GOT offset.  */
585 static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
586   {
587     0xa7, 0x18, 0x00, 0x00,		    /* lhi     %r1,xx	       */
588     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
589     0x07, 0xf1,				    /* br      %r1	       */
590     0x00, 0x00,
591     0x0d, 0x10,				    /* basr    %r1,%r0	       */
592     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
593     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
594     0x00, 0x00, 0x00, 0x00,
595     0x00, 0x00, 0x00, 0x00,
596     0x00, 0x00
597   };
598 
599 /* The first PLT entry pushes the offset into the rela.plt
600    from R1 onto the stack at 8(15) and the loader object info
601    at 12(15), loads the loader address in R1 and jumps to it.  */
602 
603 /* The first entry in the PLT for PIC code:
604 
605 PLT0:
606    ST	1,28(15)  # R1 has offset into rela.plt
607    L	1,4(12)	  # Get loader ino(object struct address)
608    ST	1,24(15)  # Store address
609    L	1,8(12)	  # Entry address of loader in R1
610    BR	1	  # Jump to loader
611 
612    The first entry in the PLT for static code:
613 
614 PLT0:
615    ST	1,28(15)      # R1 has offset into rela.plt
616    BASR 1,0
617    L	1,18(0,1)     # Get address of GOT
618    MVC	24(4,15),4(1) # Move loader ino to stack
619    L	1,8(1)	      # Get address of loader
620    BR	1	      # Jump to loader
621    .word 0	      # filler
622    .long got	      # address of GOT  */
623 
624 static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
625   {
626     0x50, 0x10, 0xf0, 0x1c,		      /* st	 %r1,28(%r15)	   */
627     0x0d, 0x10,				      /* basr	 %r1,%r0	   */
628     0x58, 0x10, 0x10, 0x12,		      /* l	 %r1,18(%r1)	   */
629     0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04,	      /* mvc	 24(4,%r15),4(%r1) */
630     0x58, 0x10, 0x10, 0x08,		      /* l	 %r1,8(%r1)	   */
631     0x07, 0xf1,				      /* br	 %r1		   */
632     0x00, 0x00, 0x00, 0x00,
633     0x00, 0x00, 0x00, 0x00,
634     0x00, 0x00
635   };
636 
637 static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
638   {
639     0x50, 0x10, 0xf0, 0x1c,			/* st	   %r1,28(%r15)	 */
640     0x58, 0x10, 0xc0, 0x04,			/* l	   %r1,4(%r12)	 */
641     0x50, 0x10, 0xf0, 0x18,			/* st	   %r1,24(%r15)	 */
642     0x58, 0x10, 0xc0, 0x08,			/* l	   %r1,8(%r12)	 */
643     0x07, 0xf1,					/* br	   %r1		 */
644     0x00, 0x00, 0x00, 0x00,
645     0x00, 0x00, 0x00, 0x00,
646     0x00, 0x00, 0x00, 0x00,
647     0x00, 0x00
648   };
649 
650 
651 /* s390 ELF linker hash entry.  */
652 
653 struct elf_s390_link_hash_entry
654 {
655   struct elf_link_hash_entry elf;
656 
657   /* Number of GOTPLT references for a function.  */
658   bfd_signed_vma gotplt_refcount;
659 
660 #define GOT_UNKNOWN	0
661 #define GOT_NORMAL	1
662 #define GOT_TLS_GD	2
663 #define GOT_TLS_IE	3
664 #define GOT_TLS_IE_NLT	4
665   unsigned char tls_type;
666 
667   /* For pointer equality reasons we might need to change the symbol
668      type from STT_GNU_IFUNC to STT_FUNC together with its value and
669      section entry.  So after alloc_dynrelocs only these values should
670      be used.  In order to check whether a symbol is IFUNC use
671      s390_is_ifunc_symbol_p.  */
672   bfd_vma ifunc_resolver_address;
673   asection *ifunc_resolver_section;
674 };
675 
676 #define elf_s390_hash_entry(ent) \
677   ((struct elf_s390_link_hash_entry *)(ent))
678 
679 /* This structure represents an entry in the local PLT list needed for
680    local IFUNC symbols.  */
681 struct plt_entry
682 {
683   /* The section of the local symbol.
684      Set in relocate_section and used in finish_dynamic_sections.  */
685   asection *sec;
686 
687   union
688   {
689     bfd_signed_vma refcount;
690     bfd_vma offset;
691   } plt;
692 };
693 
694 /* NOTE: Keep this structure in sync with
695    the one declared in elf64-s390.c.  */
696 struct elf_s390_obj_tdata
697 {
698   struct elf_obj_tdata root;
699 
700   /* A local PLT is needed for ifunc symbols.  */
701   struct plt_entry *local_plt;
702 
703   /* TLS type for each local got entry.  */
704   char *local_got_tls_type;
705 };
706 
707 #define elf_s390_tdata(abfd) \
708   ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
709 
710 #define elf_s390_local_plt(abfd)		\
711   (elf_s390_tdata (abfd)->local_plt)
712 
713 #define elf_s390_local_got_tls_type(abfd) \
714   (elf_s390_tdata (abfd)->local_got_tls_type)
715 
716 #define is_s390_elf(bfd) \
717   (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
718    && elf_tdata (bfd) != NULL \
719    && elf_object_id (bfd) == S390_ELF_DATA)
720 
721 static bool
elf_s390_mkobject(bfd * abfd)722 elf_s390_mkobject (bfd *abfd)
723 {
724   return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
725 				  S390_ELF_DATA);
726 }
727 
728 static bool
elf_s390_object_p(bfd * abfd)729 elf_s390_object_p (bfd *abfd)
730 {
731   /* Set the right machine number for an s390 elf32 file.  */
732   return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
733 }
734 
735 /* s390 ELF linker hash table.  */
736 
737 struct elf_s390_link_hash_table
738 {
739   struct elf_link_hash_table elf;
740 
741   /* Short-cuts to get to dynamic linker sections.  */
742   asection *irelifunc;
743 
744   union
745   {
746     bfd_signed_vma refcount;
747     bfd_vma offset;
748   } tls_ldm_got;
749 };
750 
751 /* Get the s390 ELF linker hash table from a link_info structure.  */
752 
753 #define elf_s390_hash_table(p) \
754   ((is_elf_hash_table ((p)->hash)					\
755     && elf_hash_table_id (elf_hash_table (p)) == S390_ELF_DATA)		\
756    ? (struct elf_s390_link_hash_table *) (p)->hash : NULL)
757 
758 #undef ELF64
759 #include "elf-s390-common.c"
760 
761 /* Create an entry in an s390 ELF linker hash table.  */
762 
763 static struct bfd_hash_entry *
link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)764 link_hash_newfunc (struct bfd_hash_entry *entry,
765 		   struct bfd_hash_table *table,
766 		   const char *string)
767 {
768   /* Allocate the structure if it has not already been allocated by a
769      subclass.  */
770   if (entry == NULL)
771     {
772       entry = bfd_hash_allocate (table,
773 				 sizeof (struct elf_s390_link_hash_entry));
774       if (entry == NULL)
775 	return entry;
776     }
777 
778   /* Call the allocation method of the superclass.  */
779   entry = _bfd_elf_link_hash_newfunc (entry, table, string);
780   if (entry != NULL)
781     {
782       struct elf_s390_link_hash_entry *eh;
783 
784       eh = (struct elf_s390_link_hash_entry *) entry;
785       eh->gotplt_refcount = 0;
786       eh->tls_type = GOT_UNKNOWN;
787       eh->ifunc_resolver_address = 0;
788       eh->ifunc_resolver_section = NULL;
789     }
790 
791   return entry;
792 }
793 
794 /* Create an s390 ELF linker hash table.  */
795 
796 static struct bfd_link_hash_table *
elf_s390_link_hash_table_create(bfd * abfd)797 elf_s390_link_hash_table_create (bfd *abfd)
798 {
799   struct elf_s390_link_hash_table *ret;
800   size_t amt = sizeof (struct elf_s390_link_hash_table);
801 
802   ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
803   if (ret == NULL)
804     return NULL;
805 
806   if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
807 				      sizeof (struct elf_s390_link_hash_entry),
808 				      S390_ELF_DATA))
809     {
810       free (ret);
811       return NULL;
812     }
813 
814   return &ret->elf.root;
815 }
816 
817 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
818 
819 static void
elf_s390_copy_indirect_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * dir,struct elf_link_hash_entry * ind)820 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
821 			       struct elf_link_hash_entry *dir,
822 			       struct elf_link_hash_entry *ind)
823 {
824   struct elf_s390_link_hash_entry *edir, *eind;
825 
826   edir = (struct elf_s390_link_hash_entry *) dir;
827   eind = (struct elf_s390_link_hash_entry *) ind;
828 
829   if (ind->root.type == bfd_link_hash_indirect
830       && dir->got.refcount <= 0)
831     {
832       edir->tls_type = eind->tls_type;
833       eind->tls_type = GOT_UNKNOWN;
834     }
835 
836   if (ELIMINATE_COPY_RELOCS
837       && ind->root.type != bfd_link_hash_indirect
838       && dir->dynamic_adjusted)
839     {
840       /* If called to transfer flags for a weakdef during processing
841 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
842 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
843       if (dir->versioned != versioned_hidden)
844 	dir->ref_dynamic |= ind->ref_dynamic;
845       dir->ref_regular |= ind->ref_regular;
846       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
847       dir->needs_plt |= ind->needs_plt;
848     }
849   else
850     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
851 }
852 
853 static int
elf_s390_tls_transition(struct bfd_link_info * info,int r_type,int is_local)854 elf_s390_tls_transition (struct bfd_link_info *info,
855 			 int r_type,
856 			 int is_local)
857 {
858   if (bfd_link_pic (info))
859     return r_type;
860 
861   switch (r_type)
862     {
863     case R_390_TLS_GD32:
864     case R_390_TLS_IE32:
865       if (is_local)
866 	return R_390_TLS_LE32;
867       return R_390_TLS_IE32;
868     case R_390_TLS_GOTIE32:
869       if (is_local)
870 	return R_390_TLS_LE32;
871       return R_390_TLS_GOTIE32;
872     case R_390_TLS_LDM32:
873       return R_390_TLS_LE32;
874     }
875 
876   return r_type;
877 }
878 
879 /* Look through the relocs for a section during the first phase, and
880    allocate space in the global offset table or procedure linkage
881    table.  */
882 
883 static bool
elf_s390_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)884 elf_s390_check_relocs (bfd *abfd,
885 		       struct bfd_link_info *info,
886 		       asection *sec,
887 		       const Elf_Internal_Rela *relocs)
888 {
889   struct elf_s390_link_hash_table *htab;
890   Elf_Internal_Shdr *symtab_hdr;
891   struct elf_link_hash_entry **sym_hashes;
892   const Elf_Internal_Rela *rel;
893   const Elf_Internal_Rela *rel_end;
894   asection *sreloc;
895   bfd_signed_vma *local_got_refcounts;
896   int tls_type, old_tls_type;
897   Elf_Internal_Sym *isym;
898 
899   if (bfd_link_relocatable (info))
900     return true;
901 
902   BFD_ASSERT (is_s390_elf (abfd));
903 
904   htab = elf_s390_hash_table (info);
905   symtab_hdr = &elf_symtab_hdr (abfd);
906   sym_hashes = elf_sym_hashes (abfd);
907   local_got_refcounts = elf_local_got_refcounts (abfd);
908 
909   sreloc = NULL;
910 
911   rel_end = relocs + sec->reloc_count;
912   for (rel = relocs; rel < rel_end; rel++)
913     {
914       unsigned int r_type;
915       unsigned int r_symndx;
916       struct elf_link_hash_entry *h;
917 
918       r_symndx = ELF32_R_SYM (rel->r_info);
919 
920       if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
921 	{
922 	  /* xgettext:c-format */
923 	  _bfd_error_handler (_("%pB: bad symbol index: %d"),
924 			      abfd, r_symndx);
925 	  return false;
926 	}
927 
928       if (r_symndx < symtab_hdr->sh_info)
929 	{
930 	  /* A local symbol.  */
931 	  isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
932 					abfd, r_symndx);
933 	  if (isym == NULL)
934 	    return false;
935 
936 	  if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
937 	    {
938 	      struct plt_entry *plt;
939 
940 	      if (htab->elf.dynobj == NULL)
941 		htab->elf.dynobj = abfd;
942 
943 	      if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
944 		return false;
945 
946 	      if (local_got_refcounts == NULL)
947 		{
948 		  if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
949 		    return false;
950 		  local_got_refcounts = elf_local_got_refcounts (abfd);
951 		}
952 	      plt = elf_s390_local_plt (abfd);
953 	      plt[r_symndx].plt.refcount++;
954 	    }
955 	  h = NULL;
956 	}
957       else
958 	{
959 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
960 	  while (h->root.type == bfd_link_hash_indirect
961 		 || h->root.type == bfd_link_hash_warning)
962 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
963 	}
964 
965       /* Create got section and local_got_refcounts array if they
966 	 are needed.  */
967       r_type = elf_s390_tls_transition (info,
968 					ELF32_R_TYPE (rel->r_info),
969 					h == NULL);
970       switch (r_type)
971 	{
972 	case R_390_GOT12:
973 	case R_390_GOT16:
974 	case R_390_GOT20:
975 	case R_390_GOT32:
976 	case R_390_GOTENT:
977 	case R_390_GOTPLT12:
978 	case R_390_GOTPLT16:
979 	case R_390_GOTPLT20:
980 	case R_390_GOTPLT32:
981 	case R_390_GOTPLTENT:
982 	case R_390_TLS_GD32:
983 	case R_390_TLS_GOTIE12:
984 	case R_390_TLS_GOTIE20:
985 	case R_390_TLS_GOTIE32:
986 	case R_390_TLS_IEENT:
987 	case R_390_TLS_IE32:
988 	case R_390_TLS_LDM32:
989 	  if (h == NULL
990 	      && local_got_refcounts == NULL)
991 	    {
992 	      if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
993 		return false;
994 	      local_got_refcounts = elf_local_got_refcounts (abfd);
995 	    }
996 	  /* Fall through.  */
997 	case R_390_GOTOFF16:
998 	case R_390_GOTOFF32:
999 	case R_390_GOTPC:
1000 	case R_390_GOTPCDBL:
1001 	  if (htab->elf.sgot == NULL)
1002 	    {
1003 	      if (htab->elf.dynobj == NULL)
1004 		htab->elf.dynobj = abfd;
1005 	      if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
1006 		return false;
1007 	    }
1008 	}
1009 
1010       if (h != NULL)
1011 	{
1012 	  if (htab->elf.dynobj == NULL)
1013 	    htab->elf.dynobj = abfd;
1014 	  if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1015 	    return false;
1016 
1017 	  /* Make sure an IFUNC symbol defined in a non-shared object
1018 	     always gets a PLT slot.  */
1019 	  if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1020 	    {
1021 	      /* The symbol is called by the dynamic loader in order
1022 		 to resolve the relocation.  So it is in fact also
1023 		 referenced.  */
1024 	      h->ref_regular = 1;
1025 	      h->needs_plt = 1;
1026 	    }
1027 	}
1028       switch (r_type)
1029 	{
1030 	case R_390_GOTPC:
1031 	case R_390_GOTPCDBL:
1032 	  /* These relocs do not need a GOT slot.  They just load the
1033 	     GOT pointer itself or address something else relative to
1034 	     the GOT.  Since the GOT pointer has been set up above we
1035 	     are done.  */
1036 	  break;
1037 	case R_390_GOTOFF16:
1038 	case R_390_GOTOFF32:
1039 	  if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1040 	    break;
1041 	  /* Fall through.  */
1042 
1043 	case R_390_PLT12DBL:
1044 	case R_390_PLT16DBL:
1045 	case R_390_PLT24DBL:
1046 	case R_390_PLT32DBL:
1047 	case R_390_PLT32:
1048 	case R_390_PLTOFF16:
1049 	case R_390_PLTOFF32:
1050 	  /* This symbol requires a procedure linkage table entry.  We
1051 	     actually build the entry in adjust_dynamic_symbol,
1052 	     because this might be a case of linking PIC code which is
1053 	     never referenced by a dynamic object, in which case we
1054 	     don't need to generate a procedure linkage table entry
1055 	     after all.  */
1056 
1057 	  /* If this is a local symbol, we resolve it directly without
1058 	     creating a procedure linkage table entry.  */
1059 	  if (h != NULL)
1060 	    {
1061 	      h->needs_plt = 1;
1062 	      h->plt.refcount += 1;
1063 	    }
1064 	  break;
1065 
1066 	case R_390_GOTPLT12:
1067 	case R_390_GOTPLT16:
1068 	case R_390_GOTPLT20:
1069 	case R_390_GOTPLT32:
1070 	case R_390_GOTPLTENT:
1071 	  /* This symbol requires either a procedure linkage table entry
1072 	     or an entry in the local got. We actually build the entry
1073 	     in adjust_dynamic_symbol because whether this is really a
1074 	     global reference can change and with it the fact if we have
1075 	     to create a plt entry or a local got entry. To be able to
1076 	     make a once global symbol a local one we have to keep track
1077 	     of the number of gotplt references that exist for this
1078 	     symbol.  */
1079 	  if (h != NULL)
1080 	    {
1081 	      ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1082 	      h->needs_plt = 1;
1083 	      h->plt.refcount += 1;
1084 	    }
1085 	  else
1086 	    local_got_refcounts[r_symndx] += 1;
1087 	  break;
1088 
1089 	case R_390_TLS_LDM32:
1090 	  htab->tls_ldm_got.refcount += 1;
1091 	  break;
1092 
1093 	case R_390_TLS_IE32:
1094 	case R_390_TLS_GOTIE12:
1095 	case R_390_TLS_GOTIE20:
1096 	case R_390_TLS_GOTIE32:
1097 	case R_390_TLS_IEENT:
1098 	  if (bfd_link_pic (info))
1099 	    info->flags |= DF_STATIC_TLS;
1100 	  /* Fall through.  */
1101 
1102 	case R_390_GOT12:
1103 	case R_390_GOT16:
1104 	case R_390_GOT20:
1105 	case R_390_GOT32:
1106 	case R_390_GOTENT:
1107 	case R_390_TLS_GD32:
1108 	  /* This symbol requires a global offset table entry.  */
1109 	  switch (r_type)
1110 	    {
1111 	    default:
1112 	    case R_390_GOT12:
1113 	    case R_390_GOT16:
1114 	    case R_390_GOT20:
1115 	    case R_390_GOT32:
1116 	    case R_390_GOTENT:
1117 	      tls_type = GOT_NORMAL;
1118 	      break;
1119 	    case R_390_TLS_GD32:
1120 	      tls_type = GOT_TLS_GD;
1121 	      break;
1122 	    case R_390_TLS_IE32:
1123 	    case R_390_TLS_GOTIE32:
1124 	      tls_type = GOT_TLS_IE;
1125 	      break;
1126 	    case R_390_TLS_GOTIE12:
1127 	    case R_390_TLS_GOTIE20:
1128 	    case R_390_TLS_IEENT:
1129 	      tls_type = GOT_TLS_IE_NLT;
1130 	      break;
1131 	    }
1132 
1133 	  if (h != NULL)
1134 	    {
1135 	      h->got.refcount += 1;
1136 	      old_tls_type = elf_s390_hash_entry(h)->tls_type;
1137 	    }
1138 	  else
1139 	    {
1140 	      local_got_refcounts[r_symndx] += 1;
1141 	      old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1142 	    }
1143 	  /* If a TLS symbol is accessed using IE at least once,
1144 	     there is no point to use dynamic model for it.  */
1145 	  if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1146 	    {
1147 	      if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1148 		{
1149 		  _bfd_error_handler
1150 		    /* xgettext:c-format */
1151 		    (_("%pB: `%s' accessed both as normal and thread local symbol"),
1152 		     abfd, h->root.root.string);
1153 		  return false;
1154 		}
1155 	      if (old_tls_type > tls_type)
1156 		tls_type = old_tls_type;
1157 	    }
1158 
1159 	  if (old_tls_type != tls_type)
1160 	    {
1161 	      if (h != NULL)
1162 		elf_s390_hash_entry (h)->tls_type = tls_type;
1163 	      else
1164 		elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1165 	    }
1166 
1167 	  if (r_type != R_390_TLS_IE32)
1168 	    break;
1169 	  /* Fall through.  */
1170 
1171 	case R_390_TLS_LE32:
1172 	  /* For static linking and executables this reloc will be
1173 	     calculated at linktime otherwise a TLS_TPOFF runtime
1174 	     reloc will be generated.  */
1175 	  if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
1176 	    break;
1177 
1178 	  if (!bfd_link_pic (info))
1179 	    break;
1180 	  info->flags |= DF_STATIC_TLS;
1181 	  /* Fall through.  */
1182 
1183 	case R_390_8:
1184 	case R_390_16:
1185 	case R_390_32:
1186 	case R_390_PC16:
1187 	case R_390_PC12DBL:
1188 	case R_390_PC16DBL:
1189 	case R_390_PC24DBL:
1190 	case R_390_PC32DBL:
1191 	case R_390_PC32:
1192 	  if (h != NULL && bfd_link_executable (info))
1193 	    {
1194 	      /* If this reloc is in a read-only section, we might
1195 		 need a copy reloc.  We can't check reliably at this
1196 		 stage whether the section is read-only, as input
1197 		 sections have not yet been mapped to output sections.
1198 		 Tentatively set the flag for now, and correct in
1199 		 adjust_dynamic_symbol.  */
1200 	      h->non_got_ref = 1;
1201 
1202 	      if (!bfd_link_pic (info))
1203 		{
1204 		  /* We may need a .plt entry if the function this reloc
1205 		     refers to is in a shared lib.  */
1206 		  h->plt.refcount += 1;
1207 		}
1208 	    }
1209 
1210 	  /* If we are creating a shared library, and this is a reloc
1211 	     against a global symbol, or a non PC relative reloc
1212 	     against a local symbol, then we need to copy the reloc
1213 	     into the shared library.  However, if we are linking with
1214 	     -Bsymbolic, we do not need to copy a reloc against a
1215 	     global symbol which is defined in an object we are
1216 	     including in the link (i.e., DEF_REGULAR is set).  At
1217 	     this point we have not seen all the input files, so it is
1218 	     possible that DEF_REGULAR is not set now but will be set
1219 	     later (it is never cleared).  In case of a weak definition,
1220 	     DEF_REGULAR may be cleared later by a strong definition in
1221 	     a shared library. We account for that possibility below by
1222 	     storing information in the relocs_copied field of the hash
1223 	     table entry.  A similar situation occurs when creating
1224 	     shared libraries and symbol visibility changes render the
1225 	     symbol local.
1226 
1227 	     If on the other hand, we are creating an executable, we
1228 	     may need to keep relocations for symbols satisfied by a
1229 	     dynamic library if we manage to avoid copy relocs for the
1230 	     symbol.  */
1231 	  if ((bfd_link_pic (info)
1232 	       && (sec->flags & SEC_ALLOC) != 0
1233 	       && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
1234 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
1235 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
1236 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
1237 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
1238 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1239 		   || (h != NULL
1240 		       && (! SYMBOLIC_BIND (info, h)
1241 			   || h->root.type == bfd_link_hash_defweak
1242 			   || !h->def_regular))))
1243 	      || (ELIMINATE_COPY_RELOCS
1244 		  && !bfd_link_pic (info)
1245 		  && (sec->flags & SEC_ALLOC) != 0
1246 		  && h != NULL
1247 		  && (h->root.type == bfd_link_hash_defweak
1248 		      || !h->def_regular)))
1249 	    {
1250 	      struct elf_dyn_relocs *p;
1251 	      struct elf_dyn_relocs **head;
1252 
1253 	      /* We must copy these reloc types into the output file.
1254 		 Create a reloc section in dynobj and make room for
1255 		 this reloc.  */
1256 	      if (sreloc == NULL)
1257 		{
1258 		  if (htab->elf.dynobj == NULL)
1259 		    htab->elf.dynobj = abfd;
1260 
1261 		  sreloc = _bfd_elf_make_dynamic_reloc_section
1262 		    (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ true);
1263 
1264 		  if (sreloc == NULL)
1265 		    return false;
1266 		}
1267 
1268 	      /* If this is a global symbol, we count the number of
1269 		 relocations we need for this symbol.  */
1270 	      if (h != NULL)
1271 		{
1272 		  head = &h->dyn_relocs;
1273 		}
1274 	      else
1275 		{
1276 		  /* Track dynamic relocs needed for local syms too.
1277 		     We really need local syms available to do this
1278 		     easily.  Oh well.  */
1279 		  asection *s;
1280 		  void *vpp;
1281 
1282 		  isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1283 						abfd, r_symndx);
1284 		  if (isym == NULL)
1285 		    return false;
1286 
1287 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1288 		  if (s == NULL)
1289 		    s = sec;
1290 
1291 		  vpp = &elf_section_data (s)->local_dynrel;
1292 		  head = (struct elf_dyn_relocs **) vpp;
1293 		}
1294 
1295 	      p = *head;
1296 	      if (p == NULL || p->sec != sec)
1297 		{
1298 		  size_t amt = sizeof *p;
1299 
1300 		  p = ((struct elf_dyn_relocs *)
1301 		       bfd_alloc (htab->elf.dynobj, amt));
1302 		  if (p == NULL)
1303 		    return false;
1304 		  p->next = *head;
1305 		  *head = p;
1306 		  p->sec = sec;
1307 		  p->count = 0;
1308 		  p->pc_count = 0;
1309 		}
1310 
1311 	      p->count += 1;
1312 	      if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
1313 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
1314 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
1315 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
1316 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
1317 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1318 		p->pc_count += 1;
1319 	    }
1320 	  break;
1321 
1322 	  /* This relocation describes the C++ object vtable hierarchy.
1323 	     Reconstruct it for later use during GC.  */
1324 	case R_390_GNU_VTINHERIT:
1325 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1326 	    return false;
1327 	  break;
1328 
1329 	  /* This relocation describes which C++ vtable entries are actually
1330 	     used.  Record for later use during GC.  */
1331 	case R_390_GNU_VTENTRY:
1332 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1333 	    return false;
1334 	  break;
1335 
1336 	default:
1337 	  break;
1338 	}
1339     }
1340 
1341   return true;
1342 }
1343 
1344 /* Return the section that should be marked against GC for a given
1345    relocation.  */
1346 
1347 static asection *
elf_s390_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)1348 elf_s390_gc_mark_hook (asection *sec,
1349 		       struct bfd_link_info *info,
1350 		       Elf_Internal_Rela *rel,
1351 		       struct elf_link_hash_entry *h,
1352 		       Elf_Internal_Sym *sym)
1353 {
1354   if (h != NULL)
1355     switch (ELF32_R_TYPE (rel->r_info))
1356       {
1357       case R_390_GNU_VTINHERIT:
1358       case R_390_GNU_VTENTRY:
1359 	return NULL;
1360       }
1361   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1362 
1363 }
1364 
1365 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1366    entry but we found we will not create any.  Called when we find we will
1367    not have any PLT for this symbol, by for example
1368    elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1369    or elf_s390_size_dynamic_sections if no dynamic sections will be
1370    created (we're only linking static objects).  */
1371 
1372 static void
elf_s390_adjust_gotplt(struct elf_s390_link_hash_entry * h)1373 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1374 {
1375   if (h->elf.root.type == bfd_link_hash_warning)
1376     h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1377 
1378   if (h->gotplt_refcount <= 0)
1379     return;
1380 
1381   /* We simply add the number of gotplt references to the number
1382    * of got references for this symbol.  */
1383   h->elf.got.refcount += h->gotplt_refcount;
1384   h->gotplt_refcount = -1;
1385 }
1386 
1387 /* Adjust a symbol defined by a dynamic object and referenced by a
1388    regular object.  The current definition is in some section of the
1389    dynamic object, but we're not including those sections.  We have to
1390    change the definition to something the rest of the link can
1391    understand.  */
1392 
1393 static bool
elf_s390_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)1394 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1395 				struct elf_link_hash_entry *h)
1396 {
1397   struct elf_s390_link_hash_table *htab;
1398   asection *s, *srel;
1399 
1400   /* STT_GNU_IFUNC symbol must go through PLT. */
1401   if (s390_is_ifunc_symbol_p (h))
1402     {
1403       /* All local STT_GNU_IFUNC references must be treated as local
1404 	 calls via local PLT.  */
1405       if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1406 	{
1407 	  bfd_size_type pc_count = 0, count = 0;
1408 	  struct elf_dyn_relocs **pp;
1409 	  struct elf_dyn_relocs *p;
1410 
1411 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1412 	    {
1413 	      pc_count += p->pc_count;
1414 	      p->count -= p->pc_count;
1415 	      p->pc_count = 0;
1416 	      count += p->count;
1417 	      if (p->count == 0)
1418 		*pp = p->next;
1419 	      else
1420 		pp = &p->next;
1421 	    }
1422 
1423 	  if (pc_count || count)
1424 	    {
1425 	      h->needs_plt = 1;
1426 	      h->non_got_ref = 1;
1427 	      if (h->plt.refcount <= 0)
1428 		h->plt.refcount = 1;
1429 	      else
1430 		h->plt.refcount += 1;
1431 	    }
1432 	}
1433 
1434       if (h->plt.refcount <= 0)
1435 	{
1436 	  h->plt.offset = (bfd_vma) -1;
1437 	  h->needs_plt = 0;
1438 	}
1439       return true;
1440     }
1441 
1442   /* If this is a function, put it in the procedure linkage table.  We
1443      will fill in the contents of the procedure linkage table later
1444      (although we could actually do it here).  */
1445   if (h->type == STT_FUNC
1446       || h->needs_plt)
1447     {
1448       if (h->plt.refcount <= 0
1449 	  || SYMBOL_CALLS_LOCAL (info, h)
1450 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1451 	      && h->root.type != bfd_link_hash_undefweak))
1452 	{
1453 	  /* This case can occur if we saw a PLT32 reloc in an input
1454 	     file, but the symbol was never referred to by a dynamic
1455 	     object, or if all references were garbage collected.  In
1456 	     such a case, we don't actually need to build a procedure
1457 	     linkage table, and we can just do a PC32 reloc instead.  */
1458 	  h->plt.offset = (bfd_vma) -1;
1459 	  h->needs_plt = 0;
1460 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1461 	}
1462 
1463       return true;
1464     }
1465   else
1466     /* It's possible that we incorrectly decided a .plt reloc was
1467        needed for an R_390_PC32 reloc to a non-function sym in
1468        check_relocs.  We can't decide accurately between function and
1469        non-function syms in check-relocs;  Objects loaded later in
1470        the link may change h->type.  So fix it now.  */
1471     h->plt.offset = (bfd_vma) -1;
1472 
1473   /* If this is a weak symbol, and there is a real definition, the
1474      processor independent code will have arranged for us to see the
1475      real definition first, and we can just use the same value.  */
1476   if (h->is_weakalias)
1477     {
1478       struct elf_link_hash_entry *def = weakdef (h);
1479       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1480       h->root.u.def.section = def->root.u.def.section;
1481       h->root.u.def.value = def->root.u.def.value;
1482       if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1483 	h->non_got_ref = def->non_got_ref;
1484       return true;
1485     }
1486 
1487   /* This is a reference to a symbol defined by a dynamic object which
1488      is not a function.  */
1489 
1490   /* If we are creating a shared library, we must presume that the
1491      only references to the symbol are via the global offset table.
1492      For such cases we need not do anything here; the relocations will
1493      be handled correctly by relocate_section.  */
1494   if (bfd_link_pic (info))
1495     return true;
1496 
1497   /* If there are no references to this symbol that do not use the
1498      GOT, we don't need to generate a copy reloc.  */
1499   if (!h->non_got_ref)
1500     return true;
1501 
1502   /* If -z nocopyreloc was given, we won't generate them either.  */
1503   if (info->nocopyreloc)
1504     {
1505       h->non_got_ref = 0;
1506       return true;
1507     }
1508 
1509   /* If we don't find any dynamic relocs in read-only sections, then
1510      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
1511   if (ELIMINATE_COPY_RELOCS && !_bfd_elf_readonly_dynrelocs (h))
1512     {
1513       h->non_got_ref = 0;
1514       return true;
1515     }
1516 
1517   /* We must allocate the symbol in our .dynbss section, which will
1518      become part of the .bss section of the executable.  There will be
1519      an entry for this symbol in the .dynsym section.  The dynamic
1520      object will contain position independent code, so all references
1521      from the dynamic object to this symbol will go through the global
1522      offset table.  The dynamic linker will use the .dynsym entry to
1523      determine the address it must put in the global offset table, so
1524      both the dynamic object and the regular object will refer to the
1525      same memory location for the variable.  */
1526 
1527   htab = elf_s390_hash_table (info);
1528 
1529   /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1530      copy the initial value out of the dynamic object and into the
1531      runtime process image.  */
1532   if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1533     {
1534       s = htab->elf.sdynrelro;
1535       srel = htab->elf.sreldynrelro;
1536     }
1537   else
1538     {
1539       s = htab->elf.sdynbss;
1540       srel = htab->elf.srelbss;
1541     }
1542   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1543     {
1544       srel->size += sizeof (Elf32_External_Rela);
1545       h->needs_copy = 1;
1546     }
1547 
1548   return _bfd_elf_adjust_dynamic_copy (info, h, s);
1549 }
1550 
1551 /* Allocate space in .plt, .got and associated reloc sections for
1552    dynamic relocs.  */
1553 
1554 static bool
allocate_dynrelocs(struct elf_link_hash_entry * h,void * inf)1555 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1556 {
1557   struct bfd_link_info *info;
1558   struct elf_s390_link_hash_table *htab;
1559   struct elf_dyn_relocs *p;
1560 
1561   if (h->root.type == bfd_link_hash_indirect)
1562     return true;
1563 
1564   info = (struct bfd_link_info *) inf;
1565   htab = elf_s390_hash_table (info);
1566 
1567   /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1568      here if it is defined and referenced in a non-shared object.  */
1569   if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1570     return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1571   else if (htab->elf.dynamic_sections_created
1572 	   && h->plt.refcount > 0)
1573     {
1574       /* Make sure this symbol is output as a dynamic symbol.
1575 	 Undefined weak syms won't yet be marked as dynamic.  */
1576       if (h->dynindx == -1
1577 	  && !h->forced_local)
1578 	{
1579 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1580 	    return false;
1581 	}
1582 
1583       if (bfd_link_pic (info)
1584 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1585 	{
1586 	  asection *s = htab->elf.splt;
1587 
1588 	  /* If this is the first .plt entry, make room for the special
1589 	     first entry.  */
1590 	  if (s->size == 0)
1591 	    s->size += PLT_FIRST_ENTRY_SIZE;
1592 
1593 	  h->plt.offset = s->size;
1594 
1595 	  /* If this symbol is not defined in a regular file, and we are
1596 	     not generating a shared library, then set the symbol to this
1597 	     location in the .plt.  This is required to make function
1598 	     pointers compare as equal between the normal executable and
1599 	     the shared library.  */
1600 	  if (! bfd_link_pic (info)
1601 	      && !h->def_regular)
1602 	    {
1603 	      h->root.u.def.section = s;
1604 	      h->root.u.def.value = h->plt.offset;
1605 	    }
1606 
1607 	  /* Make room for this entry.  */
1608 	  s->size += PLT_ENTRY_SIZE;
1609 
1610 	  /* We also need to make an entry in the .got.plt section, which
1611 	     will be placed in the .got section by the linker script.  */
1612 	  htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1613 
1614 	  /* We also need to make an entry in the .rela.plt section.  */
1615 	  htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1616 	}
1617       else
1618 	{
1619 	  h->plt.offset = (bfd_vma) -1;
1620 	  h->needs_plt = 0;
1621 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1622 	}
1623     }
1624   else
1625     {
1626       h->plt.offset = (bfd_vma) -1;
1627       h->needs_plt = 0;
1628       elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1629     }
1630 
1631   /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1632      the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1633      to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1634      we can save the dynamic TLS relocation.  */
1635   if (h->got.refcount > 0
1636       && !bfd_link_pic (info)
1637       && h->dynindx == -1
1638       && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1639     {
1640       if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1641 	/* For the GOTIE access without a literal pool entry the offset has
1642 	   to be stored somewhere. The immediate value in the instruction
1643 	   is not bit enough so the value is stored in the got.  */
1644 	{
1645 	  h->got.offset = htab->elf.sgot->size;
1646 	  htab->elf.sgot->size += GOT_ENTRY_SIZE;
1647 	}
1648       else
1649 	h->got.offset = (bfd_vma) -1;
1650     }
1651   else if (h->got.refcount > 0)
1652     {
1653       asection *s;
1654       bool dyn;
1655       int tls_type = elf_s390_hash_entry(h)->tls_type;
1656 
1657       /* Make sure this symbol is output as a dynamic symbol.
1658 	 Undefined weak syms won't yet be marked as dynamic.  */
1659       if (h->dynindx == -1
1660 	  && !h->forced_local)
1661 	{
1662 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1663 	    return false;
1664 	}
1665 
1666       s = htab->elf.sgot;
1667       h->got.offset = s->size;
1668       s->size += GOT_ENTRY_SIZE;
1669       /* R_390_TLS_GD32 needs 2 consecutive GOT slots.  */
1670       if (tls_type == GOT_TLS_GD)
1671 	s->size += GOT_ENTRY_SIZE;
1672       dyn = htab->elf.dynamic_sections_created;
1673       /* R_390_TLS_IE32 needs one dynamic relocation,
1674 	 R_390_TLS_GD32 needs one if local symbol and two if global.  */
1675       if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1676 	  || tls_type >= GOT_TLS_IE)
1677 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1678       else if (tls_type == GOT_TLS_GD)
1679 	htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
1680       else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1681 		|| h->root.type != bfd_link_hash_undefweak)
1682 	       && (bfd_link_pic (info)
1683 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1684 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1685     }
1686   else
1687     h->got.offset = (bfd_vma) -1;
1688 
1689   if (h->dyn_relocs == NULL)
1690     return true;
1691 
1692   /* In the shared -Bsymbolic case, discard space allocated for
1693      dynamic pc-relative relocs against symbols which turn out to be
1694      defined in regular objects.  For the normal shared case, discard
1695      space for pc-relative relocs that have become local due to symbol
1696      visibility changes.  */
1697 
1698   if (bfd_link_pic (info))
1699     {
1700       if (SYMBOL_CALLS_LOCAL (info, h))
1701 	{
1702 	  struct elf_dyn_relocs **pp;
1703 
1704 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1705 	    {
1706 	      p->count -= p->pc_count;
1707 	      p->pc_count = 0;
1708 	      if (p->count == 0)
1709 		*pp = p->next;
1710 	      else
1711 		pp = &p->next;
1712 	    }
1713 	}
1714 
1715       /* Also discard relocs on undefined weak syms with non-default
1716 	 visibility.  */
1717       if (h->dyn_relocs != NULL
1718 	  && h->root.type == bfd_link_hash_undefweak)
1719 	{
1720 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1721 	      || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1722 	    h->dyn_relocs = NULL;
1723 
1724 	  /* Make sure undefined weak symbols are output as a dynamic
1725 	     symbol in PIEs.  */
1726 	  else if (h->dynindx == -1
1727 		   && !h->forced_local)
1728 	    {
1729 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1730 		return false;
1731 	    }
1732 	}
1733     }
1734   else if (ELIMINATE_COPY_RELOCS)
1735     {
1736       /* For the non-shared case, discard space for relocs against
1737 	 symbols which turn out to need copy relocs or are not
1738 	 dynamic.  */
1739 
1740       if (!h->non_got_ref
1741 	  && ((h->def_dynamic
1742 	       && !h->def_regular)
1743 	      || (htab->elf.dynamic_sections_created
1744 		  && (h->root.type == bfd_link_hash_undefweak
1745 		      || h->root.type == bfd_link_hash_undefined))))
1746 	{
1747 	  /* Make sure this symbol is output as a dynamic symbol.
1748 	     Undefined weak syms won't yet be marked as dynamic.  */
1749 	  if (h->dynindx == -1
1750 	      && !h->forced_local)
1751 	    {
1752 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1753 		return false;
1754 	    }
1755 
1756 	  /* If that succeeded, we know we'll be keeping all the
1757 	     relocs.  */
1758 	  if (h->dynindx != -1)
1759 	    goto keep;
1760 	}
1761 
1762       h->dyn_relocs = NULL;
1763 
1764     keep: ;
1765     }
1766 
1767   /* Finally, allocate space.  */
1768   for (p = h->dyn_relocs; p != NULL; p = p->next)
1769     {
1770       asection *sreloc = elf_section_data (p->sec)->sreloc;
1771 
1772       sreloc->size += p->count * sizeof (Elf32_External_Rela);
1773     }
1774 
1775   return true;
1776 }
1777 
1778 /* Set the sizes of the dynamic sections.  */
1779 
1780 static bool
elf_s390_size_dynamic_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)1781 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1782 				struct bfd_link_info *info)
1783 {
1784   struct elf_s390_link_hash_table *htab;
1785   bfd *dynobj;
1786   asection *s;
1787   bool relocs;
1788   bfd *ibfd;
1789 
1790   htab = elf_s390_hash_table (info);
1791   dynobj = htab->elf.dynobj;
1792   if (dynobj == NULL)
1793     abort ();
1794 
1795   if (htab->elf.dynamic_sections_created)
1796     {
1797       /* Set the contents of the .interp section to the interpreter.  */
1798       if (bfd_link_executable (info) && !info->nointerp)
1799 	{
1800 	  s = bfd_get_linker_section (dynobj, ".interp");
1801 	  if (s == NULL)
1802 	    abort ();
1803 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1804 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1805 	}
1806     }
1807 
1808   /* Set up .got offsets for local syms, and space for local dynamic
1809      relocs.  */
1810   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1811     {
1812       bfd_signed_vma *local_got;
1813       bfd_signed_vma *end_local_got;
1814       char *local_tls_type;
1815       bfd_size_type locsymcount;
1816       Elf_Internal_Shdr *symtab_hdr;
1817       asection *srela;
1818       struct plt_entry *local_plt;
1819       unsigned int i;
1820 
1821       if (! is_s390_elf (ibfd))
1822 	continue;
1823 
1824       for (s = ibfd->sections; s != NULL; s = s->next)
1825 	{
1826 	  struct elf_dyn_relocs *p;
1827 
1828 	  for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1829 	    {
1830 	      if (!bfd_is_abs_section (p->sec)
1831 		  && bfd_is_abs_section (p->sec->output_section))
1832 		{
1833 		  /* Input section has been discarded, either because
1834 		     it is a copy of a linkonce section or due to
1835 		     linker script /DISCARD/, so we'll be discarding
1836 		     the relocs too.  */
1837 		}
1838 	      else if (p->count != 0)
1839 		{
1840 		  srela = elf_section_data (p->sec)->sreloc;
1841 		  srela->size += p->count * sizeof (Elf32_External_Rela);
1842 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1843 		    info->flags |= DF_TEXTREL;
1844 		}
1845 	    }
1846 	}
1847 
1848       local_got = elf_local_got_refcounts (ibfd);
1849       if (!local_got)
1850 	continue;
1851 
1852       symtab_hdr = &elf_symtab_hdr (ibfd);
1853       locsymcount = symtab_hdr->sh_info;
1854       end_local_got = local_got + locsymcount;
1855       local_tls_type = elf_s390_local_got_tls_type (ibfd);
1856       s = htab->elf.sgot;
1857       srela = htab->elf.srelgot;
1858       for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1859 	{
1860 	  if (*local_got > 0)
1861 	    {
1862 	      *local_got = s->size;
1863 	      s->size += GOT_ENTRY_SIZE;
1864 	      if (*local_tls_type == GOT_TLS_GD)
1865 		s->size += GOT_ENTRY_SIZE;
1866 	      if (bfd_link_pic (info))
1867 		srela->size += sizeof (Elf32_External_Rela);
1868 	    }
1869 	  else
1870 	    *local_got = (bfd_vma) -1;
1871 	}
1872       local_plt = elf_s390_local_plt (ibfd);
1873       for (i = 0; i < symtab_hdr->sh_info; i++)
1874 	{
1875 	  if (local_plt[i].plt.refcount > 0)
1876 	    {
1877 	      local_plt[i].plt.offset = htab->elf.iplt->size;
1878 	      htab->elf.iplt->size += PLT_ENTRY_SIZE;
1879 	      htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1880 	      htab->elf.irelplt->size += RELA_ENTRY_SIZE;
1881 	    }
1882 	  else
1883 	    local_plt[i].plt.offset = (bfd_vma) -1;
1884 	}
1885     }
1886 
1887   if (htab->tls_ldm_got.refcount > 0)
1888     {
1889       /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
1890 	 relocs.  */
1891       htab->tls_ldm_got.offset = htab->elf.sgot->size;
1892       htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1893       htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1894     }
1895   else
1896     htab->tls_ldm_got.offset = -1;
1897 
1898   /* Allocate global sym .plt and .got entries, and space for global
1899      sym dynamic relocs.  */
1900   elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1901 
1902   /* We now have determined the sizes of the various dynamic sections.
1903      Allocate memory for them.  */
1904   relocs = false;
1905   for (s = dynobj->sections; s != NULL; s = s->next)
1906     {
1907       if ((s->flags & SEC_LINKER_CREATED) == 0)
1908 	continue;
1909 
1910       if (s == htab->elf.splt
1911 	  || s == htab->elf.sgot
1912 	  || s == htab->elf.sgotplt
1913 	  || s == htab->elf.sdynbss
1914 	  || s == htab->elf.sdynrelro
1915 	  || s == htab->elf.iplt
1916 	  || s == htab->elf.igotplt
1917 	  || s == htab->irelifunc)
1918 	{
1919 	  /* Strip this section if we don't need it; see the
1920 	     comment below.  */
1921 	}
1922       else if (startswith (bfd_section_name (s), ".rela"))
1923 	{
1924 	  if (s->size != 0)
1925 	    relocs = true;
1926 
1927 	  /* We use the reloc_count field as a counter if we need
1928 	     to copy relocs into the output file.  */
1929 	  s->reloc_count = 0;
1930 	}
1931       else
1932 	{
1933 	  /* It's not one of our sections, so don't allocate space.  */
1934 	  continue;
1935 	}
1936 
1937       if (s->size == 0)
1938 	{
1939 	  /* If we don't need this section, strip it from the
1940 	     output file.  This is to handle .rela.bss and
1941 	     .rela.plt.  We must create it in
1942 	     create_dynamic_sections, because it must be created
1943 	     before the linker maps input sections to output
1944 	     sections.  The linker does that before
1945 	     adjust_dynamic_symbol is called, and it is that
1946 	     function which decides whether anything needs to go
1947 	     into these sections.  */
1948 
1949 	  s->flags |= SEC_EXCLUDE;
1950 	  continue;
1951 	}
1952 
1953       if ((s->flags & SEC_HAS_CONTENTS) == 0)
1954 	continue;
1955 
1956       /* Allocate memory for the section contents.  We use bfd_zalloc
1957 	 here in case unused entries are not reclaimed before the
1958 	 section's contents are written out.  This should not happen,
1959 	 but this way if it does, we get a R_390_NONE reloc instead
1960 	 of garbage.  */
1961       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1962       if (s->contents == NULL)
1963 	return false;
1964     }
1965 
1966   return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
1967 }
1968 
1969 /* Return the base VMA address which should be subtracted from real addresses
1970    when resolving @dtpoff relocation.
1971    This is PT_TLS segment p_vaddr.  */
1972 
1973 static bfd_vma
dtpoff_base(struct bfd_link_info * info)1974 dtpoff_base (struct bfd_link_info *info)
1975 {
1976   /* If tls_sec is NULL, we should have signalled an error already.  */
1977   if (elf_hash_table (info)->tls_sec == NULL)
1978     return 0;
1979   return elf_hash_table (info)->tls_sec->vma;
1980 }
1981 
1982 /* Return the relocation value for @tpoff relocation
1983    if STT_TLS virtual address is ADDRESS.  */
1984 
1985 static bfd_vma
tpoff(struct bfd_link_info * info,bfd_vma address)1986 tpoff (struct bfd_link_info *info, bfd_vma address)
1987 {
1988   struct elf_link_hash_table *htab = elf_hash_table (info);
1989 
1990   /* If tls_sec is NULL, we should have signalled an error already.  */
1991   if (htab->tls_sec == NULL)
1992     return 0;
1993   return htab->tls_size + htab->tls_sec->vma - address;
1994 }
1995 
1996 /* Complain if TLS instruction relocation is against an invalid
1997    instruction.  */
1998 
1999 static void
invalid_tls_insn(bfd * input_bfd,asection * input_section,Elf_Internal_Rela * rel)2000 invalid_tls_insn (bfd *input_bfd,
2001 		  asection *input_section,
2002 		  Elf_Internal_Rela *rel)
2003 {
2004   reloc_howto_type *howto;
2005 
2006   howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
2007   _bfd_error_handler
2008     /* xgettext:c-format */
2009     (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
2010      input_bfd,
2011      input_section,
2012      (uint64_t) rel->r_offset,
2013      howto->name);
2014   bfd_set_error (bfd_error_bad_value);
2015 }
2016 
2017 /* Relocate a 390 ELF section.  */
2018 
2019 static int
elf_s390_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)2020 elf_s390_relocate_section (bfd *output_bfd,
2021 			   struct bfd_link_info *info,
2022 			   bfd *input_bfd,
2023 			   asection *input_section,
2024 			   bfd_byte *contents,
2025 			   Elf_Internal_Rela *relocs,
2026 			   Elf_Internal_Sym *local_syms,
2027 			   asection **local_sections)
2028 {
2029   struct elf_s390_link_hash_table *htab;
2030   Elf_Internal_Shdr *symtab_hdr;
2031   struct elf_link_hash_entry **sym_hashes;
2032   bfd_vma *local_got_offsets;
2033   Elf_Internal_Rela *rel;
2034   Elf_Internal_Rela *relend;
2035 
2036   if (!is_s390_elf (input_bfd))
2037     {
2038       bfd_set_error (bfd_error_wrong_format);
2039       return false;
2040     }
2041 
2042   htab = elf_s390_hash_table (info);
2043   symtab_hdr = &elf_symtab_hdr (input_bfd);
2044   sym_hashes = elf_sym_hashes (input_bfd);
2045   local_got_offsets = elf_local_got_offsets (input_bfd);
2046 
2047   rel = relocs;
2048   relend = relocs + input_section->reloc_count;
2049   for (; rel < relend; rel++)
2050     {
2051       unsigned int r_type;
2052       reloc_howto_type *howto;
2053       unsigned long r_symndx;
2054       struct elf_link_hash_entry *h;
2055       Elf_Internal_Sym *sym;
2056       asection *sec;
2057       bfd_vma off;
2058       bfd_vma relocation;
2059       bool unresolved_reloc;
2060       bfd_reloc_status_type r;
2061       int tls_type;
2062       asection *base_got = htab->elf.sgot;
2063       bool resolved_to_zero;
2064 
2065       r_type = ELF32_R_TYPE (rel->r_info);
2066       if (r_type == (int) R_390_GNU_VTINHERIT
2067 	  || r_type == (int) R_390_GNU_VTENTRY)
2068 	continue;
2069       if (r_type >= (int) R_390_max)
2070 	{
2071 	  bfd_set_error (bfd_error_bad_value);
2072 	  return false;
2073 	}
2074 
2075       howto = elf_howto_table + r_type;
2076       r_symndx = ELF32_R_SYM (rel->r_info);
2077 
2078       h = NULL;
2079       sym = NULL;
2080       sec = NULL;
2081       unresolved_reloc = false;
2082       if (r_symndx < symtab_hdr->sh_info)
2083 	{
2084 	  sym = local_syms + r_symndx;
2085 	  sec = local_sections[r_symndx];
2086 	  if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2087 	    {
2088 	      struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2089 	      if (local_plt == NULL)
2090 		return false;
2091 
2092 	      /* Address of the PLT slot.  */
2093 	      relocation = (htab->elf.iplt->output_section->vma
2094 			    + htab->elf.iplt->output_offset
2095 			    + local_plt[r_symndx].plt.offset);
2096 
2097 	      switch (r_type)
2098 		{
2099 		case R_390_PLTOFF16:
2100 		case R_390_PLTOFF32:
2101 		  relocation -= htab->elf.sgot->output_section->vma;
2102 		  break;
2103 		case R_390_GOTPLT12:
2104 		case R_390_GOTPLT16:
2105 		case R_390_GOTPLT20:
2106 		case R_390_GOTPLT32:
2107 		case R_390_GOTPLTENT:
2108 		case R_390_GOT12:
2109 		case R_390_GOT16:
2110 		case R_390_GOT20:
2111 		case R_390_GOT32:
2112 		case R_390_GOTENT:
2113 		  {
2114 		    /* Write the PLT slot address into the GOT slot.  */
2115 		    bfd_put_32 (output_bfd, relocation,
2116 				htab->elf.sgot->contents +
2117 				local_got_offsets[r_symndx]);
2118 		    relocation = (local_got_offsets[r_symndx] +
2119 				  htab->elf.sgot->output_offset);
2120 
2121 		    if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2122 		      relocation += htab->elf.sgot->output_section->vma;
2123 		    break;
2124 		  }
2125 		default:
2126 		  break;
2127 		}
2128 	      /* The output section is needed later in
2129 		 finish_dynamic_section when creating the dynamic
2130 		 relocation.  */
2131 	      local_plt[r_symndx].sec = sec;
2132 	      goto do_relocation;
2133 	    }
2134 	  else
2135 	    relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2136 	}
2137       else
2138 	{
2139 	  bool warned ATTRIBUTE_UNUSED;
2140 	  bool ignored ATTRIBUTE_UNUSED;
2141 
2142 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2143 				   r_symndx, symtab_hdr, sym_hashes,
2144 				   h, sec, relocation,
2145 				   unresolved_reloc, warned, ignored);
2146 	}
2147 
2148       if (sec != NULL && discarded_section (sec))
2149 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2150 					 rel, 1, relend, howto, 0, contents);
2151 
2152       if (bfd_link_relocatable (info))
2153 	continue;
2154 
2155       resolved_to_zero = (h != NULL
2156 			  && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2157 
2158       switch (r_type)
2159 	{
2160 	case R_390_GOTPLT12:
2161 	case R_390_GOTPLT16:
2162 	case R_390_GOTPLT20:
2163 	case R_390_GOTPLT32:
2164 	case R_390_GOTPLTENT:
2165 	  /* There are three cases for a GOTPLT relocation. 1) The
2166 	     relocation is against the jump slot entry of a plt that
2167 	     will get emitted to the output file. 2) The relocation
2168 	     is against the jump slot of a plt entry that has been
2169 	     removed. elf_s390_adjust_gotplt has created a GOT entry
2170 	     as replacement. 3) The relocation is against a local symbol.
2171 	     Cases 2) and 3) are the same as the GOT relocation code
2172 	     so we just have to test for case 1 and fall through for
2173 	     the other two.  */
2174 	  if (h != NULL && h->plt.offset != (bfd_vma) -1)
2175 	    {
2176 	      bfd_vma plt_index;
2177 
2178 	      if (s390_is_ifunc_symbol_p (h))
2179 		{
2180 		  plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2181 		  relocation = (plt_index * GOT_ENTRY_SIZE +
2182 				htab->elf.igotplt->output_offset);
2183 		  if (r_type == R_390_GOTPLTENT)
2184 		    relocation += htab->elf.igotplt->output_section->vma;
2185 		}
2186 	      else
2187 		{
2188 		  /* Calc. index no.
2189 		     Current offset - size first entry / entry size.  */
2190 		  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2191 		    PLT_ENTRY_SIZE;
2192 
2193 		  /* Offset in GOT is PLT index plus GOT headers(3)
2194 		     times 4, addr & GOT addr.  */
2195 		  relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2196 		  if (r_type == R_390_GOTPLTENT)
2197 		    relocation += htab->elf.sgot->output_section->vma;
2198 		}
2199 	      unresolved_reloc = false;
2200 
2201 	    }
2202 	  /* Fall through.  */
2203 
2204 	case R_390_GOT12:
2205 	case R_390_GOT16:
2206 	case R_390_GOT20:
2207 	case R_390_GOT32:
2208 	case R_390_GOTENT:
2209 	  /* Relocation is to the entry for this symbol in the global
2210 	     offset table.  */
2211 	  if (base_got == NULL)
2212 	    abort ();
2213 
2214 	  if (h != NULL)
2215 	    {
2216 	      bool dyn;
2217 
2218 	      off = h->got.offset;
2219 	      dyn = htab->elf.dynamic_sections_created;
2220 
2221 	      if (s390_is_ifunc_symbol_p (h))
2222 		{
2223 		  BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2224 		  if (off == (bfd_vma)-1)
2225 		    {
2226 		      /* No explicit GOT usage so redirect to the
2227 			 got.iplt slot.  */
2228 		      base_got = htab->elf.igotplt;
2229 		      off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2230 		    }
2231 		  else
2232 		    {
2233 		      /* Explicit GOT slots must contain the address
2234 			 of the PLT slot. This will be handled in
2235 			 finish_dynamic_symbol.  */
2236 		    }
2237 		}
2238 	      else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2239 							  bfd_link_pic (info),
2240 							  h)
2241 		       || (bfd_link_pic (info)
2242 			   && SYMBOL_REFERENCES_LOCAL (info, h))
2243 		       || (ELF_ST_VISIBILITY (h->other)
2244 			   && h->root.type == bfd_link_hash_undefweak))
2245 
2246 		{
2247 		  /* This is actually a static link, or it is a
2248 		     -Bsymbolic link and the symbol is defined
2249 		     locally, or the symbol was forced to be local
2250 		     because of a version file.  We must initialize
2251 		     this entry in the global offset table.  Since the
2252 		     offset must always be a multiple of 2, we use the
2253 		     least significant bit to record whether we have
2254 		     initialized it already.
2255 
2256 		     When doing a dynamic link, we create a .rel.got
2257 		     relocation entry to initialize the value.  This
2258 		     is done in the finish_dynamic_symbol routine.  */
2259 		  if ((off & 1) != 0)
2260 		    off &= ~1;
2261 		  else
2262 		    {
2263 		      bfd_put_32 (output_bfd, relocation,
2264 				  base_got->contents + off);
2265 		      h->got.offset |= 1;
2266 		    }
2267 
2268 		  if ((h->def_regular
2269 		       && bfd_link_pic (info)
2270 		       && SYMBOL_REFERENCES_LOCAL (info, h))
2271 		      /* lrl rx,sym@GOTENT -> larl rx, sym */
2272 		      && ((r_type == R_390_GOTENT
2273 			   && (bfd_get_16 (input_bfd,
2274 					   contents + rel->r_offset - 2)
2275 			       & 0xff0f) == 0xc40d)
2276 			  /* ly rx, sym@GOT(r12) -> larl rx, sym */
2277 			  || (r_type == R_390_GOT20
2278 			      && (bfd_get_32 (input_bfd,
2279 					      contents + rel->r_offset - 2)
2280 				  & 0xff00f000) == 0xe300c000
2281 			      && bfd_get_8 (input_bfd,
2282 					    contents + rel->r_offset + 3) == 0x58)))
2283 		    {
2284 		      unsigned short new_insn =
2285 			(0xc000 | (bfd_get_8 (input_bfd,
2286 					      contents + rel->r_offset - 1) & 0xf0));
2287 		      bfd_put_16 (output_bfd, new_insn,
2288 				  contents + rel->r_offset - 2);
2289 		      r_type = R_390_PC32DBL;
2290 		      rel->r_addend = 2;
2291 		      howto = elf_howto_table + r_type;
2292 		      relocation = h->root.u.def.value
2293 			+ h->root.u.def.section->output_section->vma
2294 			+ h->root.u.def.section->output_offset;
2295 		      goto do_relocation;
2296 		    }
2297 		}
2298 	      else
2299 		unresolved_reloc = false;
2300 	    }
2301 	  else
2302 	    {
2303 	      if (local_got_offsets == NULL)
2304 		abort ();
2305 
2306 	      off = local_got_offsets[r_symndx];
2307 
2308 	      /* The offset must always be a multiple of 4.  We use
2309 		 the least significant bit to record whether we have
2310 		 already generated the necessary reloc.  */
2311 	      if ((off & 1) != 0)
2312 		off &= ~1;
2313 	      else
2314 		{
2315 		  bfd_put_32 (output_bfd, relocation,
2316 			      htab->elf.sgot->contents + off);
2317 
2318 		  if (bfd_link_pic (info))
2319 		    {
2320 		      asection *srelgot;
2321 		      Elf_Internal_Rela outrel;
2322 		      bfd_byte *loc;
2323 
2324 		      srelgot = htab->elf.srelgot;
2325 		      if (srelgot == NULL)
2326 			abort ();
2327 
2328 		      outrel.r_offset = (htab->elf.sgot->output_section->vma
2329 					 + htab->elf.sgot->output_offset
2330 					 + off);
2331 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2332 		      outrel.r_addend = relocation;
2333 		      loc = srelgot->contents;
2334 		      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2335 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2336 		    }
2337 
2338 		  local_got_offsets[r_symndx] |= 1;
2339 		}
2340 	    }
2341 
2342 	  if (off >= (bfd_vma) -2)
2343 	    abort ();
2344 
2345 	  relocation = base_got->output_offset + off;
2346 
2347 	  /* For @GOTENT the relocation is against the offset between
2348 	     the instruction and the symbols entry in the GOT and not
2349 	     between the start of the GOT and the symbols entry. We
2350 	     add the vma of the GOT to get the correct value.  */
2351 	  if (   r_type == R_390_GOTENT
2352 	      || r_type == R_390_GOTPLTENT)
2353 	    relocation += base_got->output_section->vma;
2354 
2355 	  break;
2356 
2357 	case R_390_GOTOFF16:
2358 	case R_390_GOTOFF32:
2359 	  /* Relocation is relative to the start of the global offset
2360 	     table.  */
2361 
2362 	  if (h != NULL
2363 	      && s390_is_ifunc_symbol_p (h)
2364 	      && h->def_regular
2365 	      && !bfd_link_executable (info))
2366 	    {
2367 	      relocation = (htab->elf.iplt->output_section->vma
2368 			    + htab->elf.iplt->output_offset
2369 			    + h->plt.offset
2370 			    - htab->elf.sgot->output_section->vma);
2371 	      goto do_relocation;
2372 	    }
2373 
2374 	  /* Note that sgot->output_offset is not involved in this
2375 	     calculation.  We always want the start of .got.  If we
2376 	     defined _GLOBAL_OFFSET_TABLE in a different way, as is
2377 	     permitted by the ABI, we might have to change this
2378 	     calculation.  */
2379 	  relocation -= htab->elf.sgot->output_section->vma;
2380 	  break;
2381 
2382 	case R_390_GOTPC:
2383 	case R_390_GOTPCDBL:
2384 	  /* Use global offset table as symbol value.  */
2385 	  relocation = htab->elf.sgot->output_section->vma;
2386 	  unresolved_reloc = false;
2387 	  break;
2388 
2389 	case R_390_PLT12DBL:
2390 	case R_390_PLT16DBL:
2391 	case R_390_PLT24DBL:
2392 	case R_390_PLT32DBL:
2393 	case R_390_PLT32:
2394 	  /* Relocation is to the entry for this symbol in the
2395 	     procedure linkage table.  */
2396 
2397 	  /* Resolve a PLT32 reloc against a local symbol directly,
2398 	     without using the procedure linkage table.  */
2399 	  if (h == NULL)
2400 	    break;
2401 
2402 	  if (h->plt.offset == (bfd_vma) -1
2403 	      || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
2404 	    {
2405 	      /* We didn't make a PLT entry for this symbol.  This
2406 		 happens when statically linking PIC code, or when
2407 		 using -Bsymbolic.  */
2408 	      break;
2409 	    }
2410 
2411 	  if (s390_is_ifunc_symbol_p (h))
2412 	    relocation = (htab->elf.iplt->output_section->vma
2413 			  + htab->elf.iplt->output_offset
2414 			  + h->plt.offset);
2415 	  else
2416 	    relocation = (htab->elf.splt->output_section->vma
2417 			  + htab->elf.splt->output_offset
2418 			  + h->plt.offset);
2419 	  unresolved_reloc = false;
2420 	  break;
2421 
2422 	case R_390_PLTOFF16:
2423 	case R_390_PLTOFF32:
2424 	  /* Relocation is to the entry for this symbol in the
2425 	     procedure linkage table relative to the start of the GOT.  */
2426 
2427 	  /* For local symbols or if we didn't make a PLT entry for
2428 	     this symbol resolve the symbol directly.  */
2429 	  if (h == NULL
2430 	      || h->plt.offset == (bfd_vma) -1
2431 	      || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2432 	    {
2433 	      relocation -= htab->elf.sgot->output_section->vma;
2434 	      break;
2435 	    }
2436 
2437 	  if (s390_is_ifunc_symbol_p (h))
2438 	    relocation = (htab->elf.iplt->output_section->vma
2439 			  + htab->elf.iplt->output_offset
2440 			  + h->plt.offset
2441 			  - htab->elf.sgot->output_section->vma);
2442 	  else
2443 	    relocation = (htab->elf.splt->output_section->vma
2444 			  + htab->elf.splt->output_offset
2445 			  + h->plt.offset
2446 			  - htab->elf.sgot->output_section->vma);
2447 	  unresolved_reloc = false;
2448 	  break;
2449 
2450 	case R_390_PC16:
2451 	case R_390_PC12DBL:
2452 	case R_390_PC16DBL:
2453 	case R_390_PC24DBL:
2454 	case R_390_PC32DBL:
2455 	case R_390_PC32:
2456 	  if (h != NULL
2457 	      && s390_is_ifunc_symbol_p (h)
2458 	      && h->def_regular
2459 	      && !bfd_link_executable (info))
2460 	    {
2461 	      /* This will not work our if the function does not
2462 		 happen to set up the GOT pointer for some other
2463 		 reason.  31 bit PLT entries require r12 to hold the
2464 		 GOT pointer.
2465 		 FIXME: Implement an errorcheck.
2466 		 NOTE: It will work when brasl is not available
2467 		 (e.g. with -m31 -march=g5) since a local function
2468 		 call then does use GOTOFF which implies r12 being set
2469 		 up.  */
2470 	      relocation = (htab->elf.iplt->output_section->vma
2471 			    + htab->elf.iplt->output_offset
2472 			    + h ->plt.offset);
2473 	      goto do_relocation;
2474 	    }
2475 	  /* Fall through.  */
2476 
2477 	case R_390_8:
2478 	case R_390_16:
2479 	case R_390_32:
2480 	  if ((input_section->flags & SEC_ALLOC) == 0)
2481 	    break;
2482 
2483 	  if (h != NULL
2484 	      && s390_is_ifunc_symbol_p (h)
2485 	      && h->def_regular)
2486 	    {
2487 	      if (!bfd_link_pic (info))
2488 		{
2489 		  /* For a non-shared object STT_GNU_IFUNC symbol must
2490 		     go through PLT.  */
2491 		  relocation = (htab->elf.iplt->output_section->vma
2492 				+ htab->elf.iplt->output_offset
2493 				+ h ->plt.offset);
2494 		  goto do_relocation;
2495 		}
2496 	      else
2497 		{
2498 		  /* For shared objects a runtime relocation is needed.  */
2499 
2500 		  Elf_Internal_Rela outrel;
2501 		  asection *sreloc;
2502 
2503 		  /* Need a dynamic relocation to get the real function
2504 		     address.  */
2505 		  outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2506 							     info,
2507 							     input_section,
2508 							     rel->r_offset);
2509 		  if (outrel.r_offset == (bfd_vma) -1
2510 		      || outrel.r_offset == (bfd_vma) -2)
2511 		    abort ();
2512 
2513 		  outrel.r_offset += (input_section->output_section->vma
2514 				      + input_section->output_offset);
2515 
2516 		  if (h->dynindx == -1
2517 		      || h->forced_local
2518 		      || bfd_link_executable (info))
2519 		    {
2520 		      /* This symbol is resolved locally.  */
2521 		      outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2522 		      outrel.r_addend = (h->root.u.def.value
2523 					 + h->root.u.def.section->output_section->vma
2524 					 + h->root.u.def.section->output_offset);
2525 		    }
2526 		  else
2527 		    {
2528 		      outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2529 		      outrel.r_addend = 0;
2530 		    }
2531 
2532 		  sreloc = htab->elf.irelifunc;
2533 		  elf_append_rela (output_bfd, sreloc, &outrel);
2534 
2535 		  /* If this reloc is against an external symbol, we
2536 		     do not want to fiddle with the addend.  Otherwise,
2537 		     we need to include the symbol value so that it
2538 		     becomes an addend for the dynamic reloc.  For an
2539 		     internal symbol, we have updated addend.  */
2540 		  continue;
2541 		}
2542 	    }
2543 
2544 	  if ((bfd_link_pic (info)
2545 	       && (h == NULL
2546 		   || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2547 		       && !resolved_to_zero)
2548 		   || h->root.type != bfd_link_hash_undefweak)
2549 	       && ((r_type != R_390_PC16
2550 		    && r_type != R_390_PC12DBL
2551 		    && r_type != R_390_PC16DBL
2552 		    && r_type != R_390_PC24DBL
2553 		    && r_type != R_390_PC32DBL
2554 		    && r_type != R_390_PC32)
2555 		   || !SYMBOL_CALLS_LOCAL (info, h)))
2556 	      || (ELIMINATE_COPY_RELOCS
2557 		  && !bfd_link_pic (info)
2558 		  && h != NULL
2559 		  && h->dynindx != -1
2560 		  && !h->non_got_ref
2561 		  && ((h->def_dynamic
2562 		       && !h->def_regular)
2563 		      || h->root.type == bfd_link_hash_undefweak
2564 		      || h->root.type == bfd_link_hash_undefined)))
2565 	    {
2566 	      Elf_Internal_Rela outrel;
2567 	      bool skip, relocate;
2568 	      asection *sreloc;
2569 	      bfd_byte *loc;
2570 
2571 	      /* When generating a shared object, these relocations
2572 		 are copied into the output file to be resolved at run
2573 		 time.  */
2574 
2575 	      skip = false;
2576 	      relocate = false;
2577 
2578 	      outrel.r_offset =
2579 		_bfd_elf_section_offset (output_bfd, info, input_section,
2580 					 rel->r_offset);
2581 	      if (outrel.r_offset == (bfd_vma) -1)
2582 		skip = true;
2583 	      else if (outrel.r_offset == (bfd_vma) -2)
2584 		skip = true, relocate = true;
2585 	      outrel.r_offset += (input_section->output_section->vma
2586 				  + input_section->output_offset);
2587 
2588 	      if (skip)
2589 		memset (&outrel, 0, sizeof outrel);
2590 	      else if (h != NULL
2591 		       && h->dynindx != -1
2592 		       && (r_type == R_390_PC16
2593 			   || r_type == R_390_PC12DBL
2594 			   || r_type == R_390_PC16DBL
2595 			   || r_type == R_390_PC24DBL
2596 			   || r_type == R_390_PC32DBL
2597 			   || r_type == R_390_PC32
2598 			   || !bfd_link_pic (info)
2599 			   || !SYMBOLIC_BIND (info, h)
2600 			   || !h->def_regular))
2601 		{
2602 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2603 		  outrel.r_addend = rel->r_addend;
2604 		}
2605 	      else
2606 		{
2607 		  /* This symbol is local, or marked to become local.  */
2608 		  outrel.r_addend = relocation + rel->r_addend;
2609 		  if (r_type == R_390_32)
2610 		    {
2611 		      relocate = true;
2612 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2613 		    }
2614 		  else
2615 		    {
2616 		      long sindx;
2617 
2618 		      if (bfd_is_abs_section (sec))
2619 			sindx = 0;
2620 		      else if (sec == NULL || sec->owner == NULL)
2621 			{
2622 			  bfd_set_error(bfd_error_bad_value);
2623 			  return false;
2624 			}
2625 		      else
2626 			{
2627 			  asection *osec;
2628 
2629 			  osec = sec->output_section;
2630 			  sindx = elf_section_data (osec)->dynindx;
2631 			  if (sindx == 0)
2632 			    {
2633 			      osec = htab->elf.text_index_section;
2634 			      sindx = elf_section_data (osec)->dynindx;
2635 			    }
2636 			  BFD_ASSERT (sindx != 0);
2637 
2638 			  /* We are turning this relocation into one
2639 			     against a section symbol, so subtract out
2640 			     the output section's address but not the
2641 			     offset of the input section in the output
2642 			     section.  */
2643 			  outrel.r_addend -= osec->vma;
2644 			}
2645 		      outrel.r_info = ELF32_R_INFO (sindx, r_type);
2646 		    }
2647 		}
2648 
2649 	      sreloc = elf_section_data (input_section)->sreloc;
2650 	      if (sreloc == NULL)
2651 		abort ();
2652 
2653 	      loc = sreloc->contents;
2654 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2655 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2656 
2657 	      /* If this reloc is against an external symbol, we do
2658 		 not want to fiddle with the addend.  Otherwise, we
2659 		 need to include the symbol value so that it becomes
2660 		 an addend for the dynamic reloc.  */
2661 	      if (! relocate)
2662 		continue;
2663 	    }
2664 	  break;
2665 
2666 	  /* Relocations for tls literal pool entries.  */
2667 	case R_390_TLS_IE32:
2668 	  if (bfd_link_pic (info))
2669 	    {
2670 	      Elf_Internal_Rela outrel;
2671 	      asection *sreloc;
2672 	      bfd_byte *loc;
2673 
2674 	      outrel.r_offset = rel->r_offset
2675 				+ input_section->output_section->vma
2676 				+ input_section->output_offset;
2677 	      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2678 	      sreloc = elf_section_data (input_section)->sreloc;
2679 	      if (sreloc == NULL)
2680 		abort ();
2681 	      loc = sreloc->contents;
2682 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2683 	      bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2684 	    }
2685 	  /* Fall through.  */
2686 
2687 	case R_390_TLS_GD32:
2688 	case R_390_TLS_GOTIE32:
2689 	  r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2690 	  tls_type = GOT_UNKNOWN;
2691 	  if (h == NULL && local_got_offsets)
2692 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2693 	  else if (h != NULL)
2694 	    {
2695 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2696 	      if (!bfd_link_pic (info)
2697 		  && h->dynindx == -1
2698 		  && tls_type >= GOT_TLS_IE)
2699 		r_type = R_390_TLS_LE32;
2700 	    }
2701 	  if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2702 	    r_type = R_390_TLS_IE32;
2703 
2704 	  if (r_type == R_390_TLS_LE32)
2705 	    {
2706 	      /* This relocation gets optimized away by the local exec
2707 		 access optimization.  */
2708 	      BFD_ASSERT (! unresolved_reloc);
2709 	      bfd_put_32 (output_bfd, -tpoff (info, relocation),
2710 			  contents + rel->r_offset);
2711 	      continue;
2712 	    }
2713 
2714 	  if (htab->elf.sgot == NULL)
2715 	    abort ();
2716 
2717 	  if (h != NULL)
2718 	    off = h->got.offset;
2719 	  else
2720 	    {
2721 	      if (local_got_offsets == NULL)
2722 		abort ();
2723 
2724 	      off = local_got_offsets[r_symndx];
2725 	    }
2726 
2727 	emit_tls_relocs:
2728 
2729 	  if ((off & 1) != 0)
2730 	    off &= ~1;
2731 	  else
2732 	    {
2733 	      Elf_Internal_Rela outrel;
2734 	      bfd_byte *loc;
2735 	      int dr_type, indx;
2736 
2737 	      if (htab->elf.srelgot == NULL)
2738 		abort ();
2739 
2740 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2741 				 + htab->elf.sgot->output_offset + off);
2742 
2743 	      indx = h && h->dynindx != -1 ? h->dynindx : 0;
2744 	      if (r_type == R_390_TLS_GD32)
2745 		dr_type = R_390_TLS_DTPMOD;
2746 	      else
2747 		dr_type = R_390_TLS_TPOFF;
2748 	      if (dr_type == R_390_TLS_TPOFF && indx == 0)
2749 		outrel.r_addend = relocation - dtpoff_base (info);
2750 	      else
2751 		outrel.r_addend = 0;
2752 	      outrel.r_info = ELF32_R_INFO (indx, dr_type);
2753 	      loc = htab->elf.srelgot->contents;
2754 	      loc += htab->elf.srelgot->reloc_count++
2755 		* sizeof (Elf32_External_Rela);
2756 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2757 
2758 	      if (r_type == R_390_TLS_GD32)
2759 		{
2760 		  if (indx == 0)
2761 		    {
2762 		      BFD_ASSERT (! unresolved_reloc);
2763 		      bfd_put_32 (output_bfd,
2764 				  relocation - dtpoff_base (info),
2765 				  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2766 		    }
2767 		  else
2768 		    {
2769 		      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
2770 		      outrel.r_offset += GOT_ENTRY_SIZE;
2771 		      outrel.r_addend = 0;
2772 		      htab->elf.srelgot->reloc_count++;
2773 		      loc += sizeof (Elf32_External_Rela);
2774 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2775 		    }
2776 		}
2777 
2778 	      if (h != NULL)
2779 		h->got.offset |= 1;
2780 	      else
2781 		local_got_offsets[r_symndx] |= 1;
2782 	    }
2783 
2784 	  if (off >= (bfd_vma) -2)
2785 	    abort ();
2786 	  if (r_type == ELF32_R_TYPE (rel->r_info))
2787 	    {
2788 	      relocation = htab->elf.sgot->output_offset + off;
2789 	      if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
2790 		relocation += htab->elf.sgot->output_section->vma;
2791 	      unresolved_reloc = false;
2792 	    }
2793 	  else
2794 	    {
2795 	      bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
2796 			  contents + rel->r_offset);
2797 	      continue;
2798 	    }
2799 	  break;
2800 
2801 	case R_390_TLS_GOTIE12:
2802 	case R_390_TLS_GOTIE20:
2803 	case R_390_TLS_IEENT:
2804 	  if (h == NULL)
2805 	    {
2806 	      if (local_got_offsets == NULL)
2807 		abort();
2808 	      off = local_got_offsets[r_symndx];
2809 	      if (bfd_link_pic (info))
2810 		goto emit_tls_relocs;
2811 	    }
2812 	  else
2813 	    {
2814 	      off = h->got.offset;
2815 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2816 	      if (bfd_link_pic (info)
2817 		  || h->dynindx != -1
2818 		  || tls_type < GOT_TLS_IE)
2819 		goto emit_tls_relocs;
2820 	    }
2821 
2822 	  if (htab->elf.sgot == NULL)
2823 	    abort ();
2824 
2825 	  BFD_ASSERT (! unresolved_reloc);
2826 	  bfd_put_32 (output_bfd, -tpoff (info, relocation),
2827 		      htab->elf.sgot->contents + off);
2828 	  relocation = htab->elf.sgot->output_offset + off;
2829 	  if (r_type == R_390_TLS_IEENT)
2830 	    relocation += htab->elf.sgot->output_section->vma;
2831 	  unresolved_reloc = false;
2832 	  break;
2833 
2834 	case R_390_TLS_LDM32:
2835 	  if (! bfd_link_pic (info))
2836 	    /* The literal pool entry this relocation refers to gets ignored
2837 	       by the optimized code of the local exec model. Do nothing
2838 	       and the value will turn out zero.  */
2839 	    continue;
2840 
2841 	  if (htab->elf.sgot == NULL)
2842 	    abort ();
2843 
2844 	  off = htab->tls_ldm_got.offset;
2845 	  if (off & 1)
2846 	    off &= ~1;
2847 	  else
2848 	    {
2849 	      Elf_Internal_Rela outrel;
2850 	      bfd_byte *loc;
2851 
2852 	      if (htab->elf.srelgot == NULL)
2853 		abort ();
2854 
2855 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2856 				 + htab->elf.sgot->output_offset + off);
2857 
2858 	      bfd_put_32 (output_bfd, 0,
2859 			  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2860 	      outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
2861 	      outrel.r_addend = 0;
2862 	      loc = htab->elf.srelgot->contents;
2863 	      loc += htab->elf.srelgot->reloc_count++
2864 		* sizeof (Elf32_External_Rela);
2865 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2866 	      htab->tls_ldm_got.offset |= 1;
2867 	    }
2868 	  relocation = htab->elf.sgot->output_offset + off;
2869 	  unresolved_reloc = false;
2870 	  break;
2871 
2872 	case R_390_TLS_LE32:
2873 	  if (bfd_link_dll (info))
2874 	    {
2875 	      /* Linking a shared library with non-fpic code requires
2876 		 a R_390_TLS_TPOFF relocation.  */
2877 	      Elf_Internal_Rela outrel;
2878 	      asection *sreloc;
2879 	      bfd_byte *loc;
2880 	      int indx;
2881 
2882 	      outrel.r_offset = rel->r_offset
2883 				+ input_section->output_section->vma
2884 				+ input_section->output_offset;
2885 	      if (h != NULL && h->dynindx != -1)
2886 		indx = h->dynindx;
2887 	      else
2888 		indx = 0;
2889 	      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
2890 	      if (indx == 0)
2891 		outrel.r_addend = relocation - dtpoff_base (info);
2892 	      else
2893 		outrel.r_addend = 0;
2894 	      sreloc = elf_section_data (input_section)->sreloc;
2895 	      if (sreloc == NULL)
2896 		abort ();
2897 	      loc = sreloc->contents;
2898 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2899 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2900 	    }
2901 	  else
2902 	    {
2903 	      BFD_ASSERT (! unresolved_reloc);
2904 	      bfd_put_32 (output_bfd, -tpoff (info, relocation),
2905 			  contents + rel->r_offset);
2906 	    }
2907 	  continue;
2908 
2909 	case R_390_TLS_LDO32:
2910 	  if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
2911 	    relocation -= dtpoff_base (info);
2912 	  else
2913 	    /* When converting LDO to LE, we must negate.  */
2914 	    relocation = -tpoff (info, relocation);
2915 	  break;
2916 
2917 	  /* Relocations for tls instructions.  */
2918 	case R_390_TLS_LOAD:
2919 	case R_390_TLS_GDCALL:
2920 	case R_390_TLS_LDCALL:
2921 	  tls_type = GOT_UNKNOWN;
2922 	  if (h == NULL && local_got_offsets)
2923 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2924 	  else if (h != NULL)
2925 	    tls_type = elf_s390_hash_entry(h)->tls_type;
2926 
2927 	  if (tls_type == GOT_TLS_GD)
2928 	    continue;
2929 
2930 	  if (r_type == R_390_TLS_LOAD)
2931 	    {
2932 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
2933 		{
2934 		  /* IE->LE transition. Four valid cases:
2935 		     l %rx,0(0,%ry)    -> lr %rx,%ry + bcr 0,0
2936 		     l %rx,0(%ry,0)    -> lr %rx,%ry + bcr 0,0
2937 		     l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
2938 		     l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
2939 		  unsigned int insn, ry;
2940 
2941 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2942 		  if ((insn & 0xff00f000) == 0x58000000)
2943 		    /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0  */
2944 		    ry = (insn & 0x000f0000);
2945 		  else if ((insn & 0xff0f0000) == 0x58000000)
2946 		    /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0  */
2947 		    ry = (insn & 0x0000f000) << 4;
2948 		  else if ((insn & 0xff00f000) == 0x5800c000)
2949 		    /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0  */
2950 		    ry = (insn & 0x000f0000);
2951 		  else if ((insn & 0xff0f0000) == 0x580c0000)
2952 		    /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0  */
2953 		    ry = (insn & 0x0000f000) << 4;
2954 		  else
2955 		    {
2956 		      invalid_tls_insn (input_bfd, input_section, rel);
2957 		      return false;
2958 		    }
2959 		  insn = 0x18000700 | (insn & 0x00f00000) | ry;
2960 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
2961 		}
2962 	    }
2963 	  else if (r_type == R_390_TLS_GDCALL)
2964 	    {
2965 	      unsigned int insn;
2966 
2967 	      insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2968 	      if ((insn & 0xff000fff) != 0x4d000000 &&
2969 		  (insn & 0xffff0000) != 0xc0e50000 &&
2970 		  (insn & 0xff000000) != 0x0d000000)
2971 		{
2972 		  invalid_tls_insn (input_bfd, input_section, rel);
2973 		  return false;
2974 		}
2975 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
2976 		{
2977 		  if ((insn & 0xff000000) == 0x0d000000)
2978 		    {
2979 		      /* GD->LE transition.
2980 			 basr rx, ry -> nopr r7 */
2981 		      insn = 0x07070000 | (insn & 0xffff);
2982 		    }
2983 		  else if ((insn & 0xff000000) == 0x4d000000)
2984 		    {
2985 		      /* GD->LE transition.
2986 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
2987 		      insn = 0x47000000;
2988 		    }
2989 		  else
2990 		    {
2991 		      /* GD->LE transition.
2992 			 brasl %r14,_tls_get_offset@plt -> brcl 0,.  */
2993 		      insn = 0xc0040000;
2994 		      bfd_put_16 (output_bfd, 0x0000,
2995 				  contents + rel->r_offset + 4);
2996 		    }
2997 		}
2998 	      else
2999 		{
3000 		  /* If basr is used in the pic case to invoke
3001 		     _tls_get_offset, something went wrong before.  */
3002 		  if ((insn & 0xff000000) == 0x0d000000)
3003 		    {
3004 		      invalid_tls_insn (input_bfd, input_section, rel);
3005 		      return false;
3006 		    }
3007 
3008 		  if ((insn & 0xff000000) == 0x4d000000)
3009 		    {
3010 		      /* GD->IE transition.
3011 			 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12)  */
3012 		      insn = 0x5822c000;
3013 		    }
3014 		  else
3015 		    {
3016 		      /* GD->IE transition.
3017 			 brasl %r14,__tls_get_addr@plt ->
3018 				l %r2,0(%r2,%r12) ; bcr 0,0 */
3019 		      insn = 0x5822c000;
3020 		      bfd_put_16 (output_bfd, 0x0700,
3021 				  contents + rel->r_offset + 4);
3022 		    }
3023 		}
3024 	      bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3025 	    }
3026 	  else if (r_type == R_390_TLS_LDCALL)
3027 	    {
3028 	      if (!bfd_link_pic (info))
3029 		{
3030 		  unsigned int insn;
3031 
3032 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3033 		  if ((insn & 0xff000fff) != 0x4d000000 &&
3034 		      (insn & 0xffff0000) != 0xc0e50000 &&
3035 		      (insn & 0xff000000) != 0x0d000000)
3036 		    {
3037 		      invalid_tls_insn (input_bfd, input_section, rel);
3038 		      return false;
3039 		    }
3040 
3041 		  if ((insn & 0xff000000) == 0x0d000000)
3042 		    {
3043 		      /* LD->LE transition.
3044 			 basr rx, ry -> nopr r7 */
3045 		      insn = 0x07070000 | (insn & 0xffff);
3046 		    }
3047 		  else if ((insn & 0xff000000) == 0x4d000000)
3048 		    {
3049 		      /* LD->LE transition.
3050 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
3051 		      insn = 0x47000000;
3052 		    }
3053 		  else
3054 		    {
3055 		      /* LD->LE transition.
3056 			 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
3057 		      insn = 0xc0040000;
3058 		      bfd_put_16 (output_bfd, 0x0000,
3059 				  contents + rel->r_offset + 4);
3060 		    }
3061 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3062 		}
3063 	    }
3064 	  continue;
3065 
3066 	default:
3067 	  break;
3068 	}
3069 
3070       /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3071 	 because such sections are not SEC_ALLOC and thus ld.so will
3072 	 not process them.  */
3073       if (unresolved_reloc
3074 	  && !((input_section->flags & SEC_DEBUGGING) != 0
3075 	       && h->def_dynamic)
3076 	  && _bfd_elf_section_offset (output_bfd, info, input_section,
3077 				      rel->r_offset) != (bfd_vma) -1)
3078 	_bfd_error_handler
3079 	  /* xgettext:c-format */
3080 	  (_("%pB(%pA+%#" PRIx64 "): "
3081 	     "unresolvable %s relocation against symbol `%s'"),
3082 	   input_bfd,
3083 	   input_section,
3084 	   (uint64_t) rel->r_offset,
3085 	   howto->name,
3086 	   h->root.root.string);
3087 
3088     do_relocation:
3089 
3090       /* When applying a 24 bit reloc we need to start one byte
3091 	 earlier.  Otherwise the 32 bit get/put bfd operations might
3092 	 access a byte after the actual section.  */
3093       if (r_type == R_390_PC24DBL
3094 	  || r_type == R_390_PLT24DBL)
3095 	rel->r_offset--;
3096 
3097       if (r_type == R_390_20
3098 	  || r_type == R_390_GOT20
3099 	  || r_type == R_390_GOTPLT20
3100 	  || r_type == R_390_TLS_GOTIE20)
3101 	{
3102 	  relocation += rel->r_addend;
3103 	  relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3104 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3105 					contents, rel->r_offset,
3106 					relocation, 0);
3107 	}
3108       else
3109 	r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3110 				      contents, rel->r_offset,
3111 				      relocation, rel->r_addend);
3112 
3113       if (r != bfd_reloc_ok)
3114 	{
3115 	  const char *name;
3116 
3117 	  if (h != NULL)
3118 	    name = h->root.root.string;
3119 	  else
3120 	    {
3121 	      name = bfd_elf_string_from_elf_section (input_bfd,
3122 						      symtab_hdr->sh_link,
3123 						      sym->st_name);
3124 	      if (name == NULL)
3125 		return false;
3126 	      if (*name == '\0')
3127 		name = bfd_section_name (sec);
3128 	    }
3129 
3130 	  if (r == bfd_reloc_overflow)
3131 	    (*info->callbacks->reloc_overflow)
3132 	      (info, (h ? &h->root : NULL), name, howto->name,
3133 	       (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3134 	  else
3135 	    {
3136 	      _bfd_error_handler
3137 		/* xgettext:c-format */
3138 		(_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3139 		 input_bfd, input_section,
3140 		 (uint64_t) rel->r_offset, name, (int) r);
3141 	      return false;
3142 	    }
3143 	}
3144     }
3145 
3146   return true;
3147 }
3148 
3149 /* Generate the PLT slots together with the dynamic relocations needed
3150    for IFUNC symbols.  */
3151 
3152 static void
elf_s390_finish_ifunc_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,struct elf_s390_link_hash_table * htab,bfd_vma iplt_offset,bfd_vma resolver_address)3153 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3154 			      struct bfd_link_info *info,
3155 			      struct elf_link_hash_entry *h,
3156 			      struct elf_s390_link_hash_table *htab,
3157 			      bfd_vma iplt_offset,
3158 			      bfd_vma resolver_address)
3159 {
3160   bfd_vma iplt_index;
3161   bfd_vma got_offset;
3162   bfd_vma igotiplt_offset;
3163   Elf_Internal_Rela rela;
3164   bfd_byte *loc;
3165   asection *plt, *gotplt, *relplt;
3166   bfd_vma relative_offset;
3167 
3168   if (htab->elf.iplt == NULL
3169       || htab->elf.igotplt == NULL
3170       || htab->elf.irelplt == NULL)
3171     abort ();
3172 
3173   gotplt = htab->elf.igotplt;
3174   relplt = htab->elf.irelplt;
3175 
3176   /* Index of the PLT slot within iplt section.  */
3177   iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3178   plt = htab->elf.iplt;
3179   /* Offset into the igot.plt section.  */
3180   igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3181   /* Offset into the got section.  */
3182   got_offset = igotiplt_offset + gotplt->output_offset;
3183 
3184   /* S390 uses halfwords for relative branch calc!  */
3185   relative_offset = - (plt->output_offset +
3186 		       (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
3187   /* If offset is > 32768, branch to a previous branch
3188      390 can only handle +-64 K jumps.  */
3189   if ( -32768 > (int) relative_offset )
3190     relative_offset
3191       = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3192 
3193   /* Fill in the entry in the procedure linkage table.  */
3194   if (!bfd_link_pic (info))
3195     {
3196       memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3197 	      PLT_ENTRY_SIZE);
3198 
3199       /* Adjust jump to the first plt entry.  */
3200       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3201 		  plt->contents + iplt_offset + 20);
3202 
3203       /* Push the GOT offset field.  */
3204       bfd_put_32 (output_bfd,
3205 		  (gotplt->output_section->vma
3206 		   + got_offset),
3207 		  plt->contents + iplt_offset + 24);
3208     }
3209   else if (got_offset < 4096)
3210     {
3211       /* The GOT offset is small enough to be used directly as
3212 	 displacement.  */
3213       memcpy (plt->contents + iplt_offset,
3214 	      elf_s390_plt_pic12_entry,
3215 	      PLT_ENTRY_SIZE);
3216 
3217       /* Put in the GOT offset as displacement value.  The 0xc000
3218 	 value comes from the first word of the plt entry.  Look
3219 	 at the elf_s390_plt_pic16_entry content.  */
3220       bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3221 		  plt->contents + iplt_offset + 2);
3222 
3223       /* Adjust the jump to the first plt entry.  */
3224       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3225 		  plt->contents + iplt_offset + 20);
3226     }
3227   else if (got_offset < 32768)
3228     {
3229       /* The GOT offset is too big for a displacement but small
3230 	 enough to be a signed 16 bit immediate value as it can be
3231 	 used in an lhi instruction.  */
3232       memcpy (plt->contents + iplt_offset,
3233 	      elf_s390_plt_pic16_entry,
3234 	      PLT_ENTRY_SIZE);
3235 
3236       /* Put in the GOT offset for the lhi instruction.  */
3237       bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3238 		  plt->contents + iplt_offset + 2);
3239 
3240       /* Adjust the jump to the first plt entry.  */
3241       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3242 		  plt->contents + iplt_offset + 20);
3243     }
3244   else
3245     {
3246       memcpy (plt->contents + iplt_offset,
3247 	      elf_s390_plt_pic_entry,
3248 	      PLT_ENTRY_SIZE);
3249 
3250       /* Adjust the jump to the first plt entry.  */
3251       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3252 		  plt->contents + iplt_offset + 20);
3253 
3254       /* Push the GOT offset field.  */
3255       bfd_put_32 (output_bfd, got_offset,
3256 		  plt->contents + iplt_offset + 24);
3257     }
3258   /* Insert offset into  reloc. table here.  */
3259   bfd_put_32 (output_bfd, relplt->output_offset +
3260 	      iplt_index * RELA_ENTRY_SIZE,
3261 	      plt->contents + iplt_offset + 28);
3262 
3263   /* Fill in the entry in the global offset table.
3264      Points to instruction after GOT offset.  */
3265   bfd_put_32 (output_bfd,
3266 	      (plt->output_section->vma
3267 	       + plt->output_offset
3268 	       + iplt_offset
3269 	       + 12),
3270 	      gotplt->contents + igotiplt_offset);
3271 
3272   /* Fill in the entry in the .rela.plt section.  */
3273   rela.r_offset = gotplt->output_section->vma + got_offset;
3274 
3275   if (!h
3276       || h->dynindx == -1
3277       || ((bfd_link_executable (info)
3278 	   || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3279 	  && h->def_regular))
3280     {
3281       /* The symbol can be locally resolved.  */
3282       rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3283       rela.r_addend = resolver_address;
3284     }
3285   else
3286     {
3287       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3288       rela.r_addend = 0;
3289     }
3290 
3291   loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3292   bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3293 }
3294 
3295 /* Finish up dynamic symbol handling.  We set the contents of various
3296    dynamic sections here.  */
3297 
3298 static bool
elf_s390_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)3299 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3300 				struct bfd_link_info *info,
3301 				struct elf_link_hash_entry *h,
3302 				Elf_Internal_Sym *sym)
3303 {
3304   struct elf_s390_link_hash_table *htab;
3305   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3306 
3307   htab = elf_s390_hash_table (info);
3308 
3309   if (h->plt.offset != (bfd_vma) -1)
3310     {
3311       bfd_vma plt_index;
3312       bfd_vma got_offset;
3313       Elf_Internal_Rela rela;
3314       bfd_byte *loc;
3315       bfd_vma relative_offset;
3316 
3317       /* This symbol has an entry in the procedure linkage table.  Set
3318 	 it up.  */
3319       if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3320 	{
3321 	  elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3322 	    htab, h->plt.offset,
3323 	    eh->ifunc_resolver_address +
3324 	    eh->ifunc_resolver_section->output_offset +
3325 	    eh->ifunc_resolver_section->output_section->vma);
3326 	  /* Do not return yet.  Handling of explicit GOT slots of
3327 	     IFUNC symbols is below.  */
3328 	}
3329       else
3330 	{
3331 	  if (h->dynindx == -1
3332 	      || htab->elf.splt == NULL
3333 	      || htab->elf.sgotplt == NULL
3334 	      || htab->elf.srelplt == NULL)
3335 	    abort ();
3336 
3337 	  /* Calc. index no.
3338 	     Current offset - size first entry / entry size.  */
3339 	  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3340 
3341 	  /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3342 	     addr & GOT addr.  */
3343 	  got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3344 
3345 	  /* S390 uses halfwords for relative branch calc!  */
3346 	  relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3347 				(PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3348 	  /* If offset is > 32768, branch to a previous branch
3349 	     390 can only handle +-64 K jumps.  */
3350 	  if ( -32768 > (int) relative_offset )
3351 	    relative_offset
3352 	      = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3353 
3354 	  /* Fill in the entry in the procedure linkage table.  */
3355 	  if (!bfd_link_pic (info))
3356 	    {
3357 	      memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3358 		      PLT_ENTRY_SIZE);
3359 
3360 	      /* Adjust jump to the first plt entry.  */
3361 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3362 			  htab->elf.splt->contents + h->plt.offset + 20);
3363 
3364 	      /* Push the GOT offset field.  */
3365 	      bfd_put_32 (output_bfd,
3366 			  (htab->elf.sgotplt->output_section->vma
3367 			   + htab->elf.sgotplt->output_offset
3368 			   + got_offset),
3369 			  htab->elf.splt->contents + h->plt.offset + 24);
3370 	    }
3371 	  else if (got_offset < 4096)
3372 	    {
3373 	      /* The GOT offset is small enough to be used directly as
3374 		 displacement.  */
3375 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3376 		      elf_s390_plt_pic12_entry,
3377 		      PLT_ENTRY_SIZE);
3378 
3379 	      /* Put in the GOT offset as displacement value.  The 0xc000
3380 		 value comes from the first word of the plt entry.  Look
3381 		 at the elf_s390_plt_pic12_entry content.  */
3382 	      bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3383 			  htab->elf.splt->contents + h->plt.offset + 2);
3384 
3385 	      /* Adjust the jump to the first plt entry.  */
3386 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3387 			  htab->elf.splt->contents + h->plt.offset + 20);
3388 	    }
3389 	  else if (got_offset < 32768)
3390 	    {
3391 	      /* The GOT offset is too big for a displacement but small
3392 		 enough to be a signed 16 bit immediate value as it can be
3393 		 used in an lhi instruction.  */
3394 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3395 		      elf_s390_plt_pic16_entry,
3396 		      PLT_ENTRY_SIZE);
3397 
3398 	      /* Put in the GOT offset for the lhi instruction.  */
3399 	      bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3400 			  htab->elf.splt->contents + h->plt.offset + 2);
3401 
3402 	      /* Adjust the jump to the first plt entry.  */
3403 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3404 			  htab->elf.splt->contents + h->plt.offset + 20);
3405 	    }
3406 	  else
3407 	    {
3408 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3409 		      elf_s390_plt_pic_entry,
3410 		      PLT_ENTRY_SIZE);
3411 
3412 	      /* Adjust the jump to the first plt entry.  */
3413 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3414 			  htab->elf.splt->contents + h->plt.offset + 20);
3415 
3416 	      /* Push the GOT offset field.  */
3417 	      bfd_put_32 (output_bfd, got_offset,
3418 			  htab->elf.splt->contents + h->plt.offset + 24);
3419 	    }
3420 	  /* Insert offset into  reloc. table here.  */
3421 	  bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3422 		      htab->elf.splt->contents + h->plt.offset + 28);
3423 
3424 	  /* Fill in the entry in the global offset table.
3425 	     Points to instruction after GOT offset.  */
3426 	  bfd_put_32 (output_bfd,
3427 		      (htab->elf.splt->output_section->vma
3428 		       + htab->elf.splt->output_offset
3429 		       + h->plt.offset
3430 		       + 12),
3431 		      htab->elf.sgotplt->contents + got_offset);
3432 
3433 	  /* Fill in the entry in the .rela.plt section.  */
3434 	  rela.r_offset = (htab->elf.sgotplt->output_section->vma
3435 			   + htab->elf.sgotplt->output_offset
3436 			   + got_offset);
3437 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3438 	  rela.r_addend = 0;
3439 	  loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3440 	  bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3441 
3442 	  if (!h->def_regular)
3443 	    {
3444 	      /* Mark the symbol as undefined, rather than as defined in
3445 		 the .plt section.  Leave the value alone.  This is a clue
3446 		 for the dynamic linker, to make function pointer
3447 		 comparisons work between an application and shared
3448 		 library.  */
3449 	      sym->st_shndx = SHN_UNDEF;
3450 	    }
3451 	}
3452     }
3453 
3454   if (h->got.offset != (bfd_vma) -1
3455       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3456       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3457       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3458     {
3459       Elf_Internal_Rela rela;
3460       bfd_byte *loc;
3461 
3462       /* This symbol has an entry in the global offset table.  Set it
3463 	 up.  */
3464 
3465       if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3466 	abort ();
3467 
3468       rela.r_offset = (htab->elf.sgot->output_section->vma
3469 		       + htab->elf.sgot->output_offset
3470 		       + (h->got.offset &~ (bfd_vma) 1));
3471 
3472       /* If this is a static link, or it is a -Bsymbolic link and the
3473 	 symbol is defined locally or was forced to be local because
3474 	 of a version file, we just want to emit a RELATIVE reloc.
3475 	 The entry in the global offset table will already have been
3476 	 initialized in the relocate_section function.  */
3477       if (h->def_regular && s390_is_ifunc_symbol_p (h))
3478 	{
3479 	  if (bfd_link_pic (info))
3480 	    {
3481 	      /* An explicit GOT slot usage needs GLOB_DAT.  If the
3482 		 symbol references local the implicit got.iplt slot
3483 		 will be used and the IRELATIVE reloc has been created
3484 		 above.  */
3485 	      goto do_glob_dat;
3486 	    }
3487 	  else
3488 	    {
3489 	      /* For non-shared objects explicit GOT slots must be
3490 		 filled with the PLT slot address for pointer
3491 		 equality reasons.  */
3492 	      bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3493 				       + htab->elf.iplt->output_offset
3494 				       + h->plt.offset),
3495 			  htab->elf.sgot->contents + h->got.offset);
3496 	      return true;
3497 	    }
3498 	}
3499       else if (bfd_link_pic (info)
3500 	       && SYMBOL_REFERENCES_LOCAL (info, h))
3501 	{
3502 	  /* If this is a static link, or it is a -Bsymbolic link and
3503 	     the symbol is defined locally or was forced to be local
3504 	     because of a version file, we just want to emit a
3505 	     RELATIVE reloc.  The entry in the global offset table
3506 	     will already have been initialized in the
3507 	     relocate_section function.  */
3508 	  if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
3509 	    return false;
3510 	  BFD_ASSERT((h->got.offset & 1) != 0);
3511 	  rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3512 	  rela.r_addend = (h->root.u.def.value
3513 			   + h->root.u.def.section->output_section->vma
3514 			   + h->root.u.def.section->output_offset);
3515 	}
3516       else
3517 	{
3518 	  BFD_ASSERT((h->got.offset & 1) == 0);
3519 	do_glob_dat:
3520 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3521 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
3522 	  rela.r_addend = 0;
3523 	}
3524 
3525       loc = htab->elf.srelgot->contents;
3526       loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3527       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3528     }
3529 
3530   if (h->needs_copy)
3531     {
3532       Elf_Internal_Rela rela;
3533       asection *s;
3534       bfd_byte *loc;
3535 
3536       /* This symbols needs a copy reloc.  Set it up.  */
3537 
3538       if (h->dynindx == -1
3539 	  || (h->root.type != bfd_link_hash_defined
3540 	      && h->root.type != bfd_link_hash_defweak)
3541 	  || htab->elf.srelbss == NULL
3542 	  || htab->elf.sreldynrelro == NULL)
3543 	abort ();
3544 
3545       rela.r_offset = (h->root.u.def.value
3546 		       + h->root.u.def.section->output_section->vma
3547 		       + h->root.u.def.section->output_offset);
3548       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3549       rela.r_addend = 0;
3550       if (h->root.u.def.section == htab->elf.sdynrelro)
3551 	s = htab->elf.sreldynrelro;
3552       else
3553 	s = htab->elf.srelbss;
3554       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3555       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3556     }
3557 
3558   /* Mark some specially defined symbols as absolute.  */
3559   if (h == htab->elf.hdynamic
3560       || h == htab->elf.hgot
3561       || h == htab->elf.hplt)
3562     sym->st_shndx = SHN_ABS;
3563 
3564   return true;
3565 }
3566 
3567 /* Used to decide how to sort relocs in an optimal manner for the
3568    dynamic linker, before writing them out.  */
3569 
3570 static enum elf_reloc_type_class
elf_s390_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)3571 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3572 			   const asection *rel_sec ATTRIBUTE_UNUSED,
3573 			   const Elf_Internal_Rela *rela)
3574 {
3575   bfd *abfd = info->output_bfd;
3576   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3577   struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3578   unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3579   Elf_Internal_Sym sym;
3580 
3581   if (htab->elf.dynsym == NULL
3582       || !bed->s->swap_symbol_in (abfd,
3583 				  (htab->elf.dynsym->contents
3584 				   + r_symndx * bed->s->sizeof_sym),
3585 				  0, &sym))
3586     abort ();
3587 
3588   /* Check relocation against STT_GNU_IFUNC symbol.  */
3589   if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3590     return reloc_class_ifunc;
3591 
3592   switch ((int) ELF32_R_TYPE (rela->r_info))
3593     {
3594     case R_390_RELATIVE:
3595       return reloc_class_relative;
3596     case R_390_JMP_SLOT:
3597       return reloc_class_plt;
3598     case R_390_COPY:
3599       return reloc_class_copy;
3600     default:
3601       return reloc_class_normal;
3602     }
3603 }
3604 
3605 /* Finish up the dynamic sections.  */
3606 
3607 static bool
elf_s390_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)3608 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3609 				  struct bfd_link_info *info)
3610 {
3611   struct elf_s390_link_hash_table *htab;
3612   bfd *dynobj;
3613   asection *sdyn;
3614   bfd *ibfd;
3615   unsigned int i;
3616 
3617   htab = elf_s390_hash_table (info);
3618   dynobj = htab->elf.dynobj;
3619   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3620 
3621   if (htab->elf.dynamic_sections_created)
3622     {
3623       Elf32_External_Dyn *dyncon, *dynconend;
3624 
3625       if (sdyn == NULL || htab->elf.sgot == NULL)
3626 	abort ();
3627 
3628       dyncon = (Elf32_External_Dyn *) sdyn->contents;
3629       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3630       for (; dyncon < dynconend; dyncon++)
3631 	{
3632 	  Elf_Internal_Dyn dyn;
3633 	  asection *s;
3634 
3635 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3636 
3637 	  switch (dyn.d_tag)
3638 	    {
3639 	    default:
3640 	      continue;
3641 
3642 	    case DT_PLTGOT:
3643 	      s = htab->elf.sgotplt;
3644 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3645 	      break;
3646 
3647 	    case DT_JMPREL:
3648 	      s = htab->elf.srelplt;
3649 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3650 	      break;
3651 
3652 	    case DT_PLTRELSZ:
3653 	      dyn.d_un.d_val = htab->elf.srelplt->size;
3654 	      if (htab->elf.irelplt)
3655 		dyn.d_un.d_val += htab->elf.irelplt->size;
3656 	      break;
3657 	    }
3658 
3659 	  bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3660 	}
3661 
3662       /* Fill in the special first entry in the procedure linkage table.  */
3663       if (htab->elf.splt && htab->elf.splt->size > 0)
3664 	{
3665 	  memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
3666 	  if (bfd_link_pic (info))
3667 	    {
3668 	      memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
3669 		      PLT_FIRST_ENTRY_SIZE);
3670 	    }
3671 	  else
3672 	    {
3673 	      memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
3674 		      PLT_FIRST_ENTRY_SIZE);
3675 	      bfd_put_32 (output_bfd,
3676 			  htab->elf.sgotplt->output_section->vma
3677 			  + htab->elf.sgotplt->output_offset,
3678 			  htab->elf.splt->contents + 24);
3679 	    }
3680 	  elf_section_data (htab->elf.splt->output_section)
3681 	    ->this_hdr.sh_entsize = 4;
3682 	}
3683 
3684     }
3685 
3686   if (htab->elf.sgotplt)
3687     {
3688       /* Fill in the first three entries in the global offset table.  */
3689       if (htab->elf.sgotplt->size > 0)
3690 	{
3691 	  bfd_put_32 (output_bfd,
3692 		      (sdyn == NULL ? (bfd_vma) 0
3693 		       : sdyn->output_section->vma + sdyn->output_offset),
3694 		      htab->elf.sgotplt->contents);
3695 	  /* One entry for shared object struct ptr.  */
3696 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
3697 	  /* One entry for _dl_runtime_resolve.  */
3698 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3699 	}
3700 
3701       elf_section_data (htab->elf.sgotplt->output_section)
3702 	->this_hdr.sh_entsize = 4;
3703     }
3704   /* Finish dynamic symbol for local IFUNC symbols.  */
3705   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3706     {
3707       struct plt_entry *local_plt;
3708       Elf_Internal_Sym *isym;
3709       Elf_Internal_Shdr *symtab_hdr;
3710 
3711       symtab_hdr = &elf_symtab_hdr (ibfd);
3712 
3713       if (!is_s390_elf (ibfd))
3714 	continue;
3715 
3716       local_plt = elf_s390_local_plt (ibfd);
3717       if (local_plt != NULL)
3718 	for (i = 0; i < symtab_hdr->sh_info; i++)
3719 	  {
3720 	    if (local_plt[i].plt.offset != (bfd_vma) -1)
3721 	      {
3722 		asection *sec = local_plt[i].sec;
3723 		isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, ibfd, i);
3724 		if (isym == NULL)
3725 		  return false;
3726 
3727 		if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3728 		  elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3729 						local_plt[i].plt.offset,
3730 						isym->st_value
3731 						+ sec->output_section->vma
3732 						+ sec->output_offset);
3733 
3734 	      }
3735 	  }
3736     }
3737   return true;
3738 }
3739 
3740 /* Support for core dump NOTE sections.  */
3741 
3742 static bool
elf_s390_grok_prstatus(bfd * abfd,Elf_Internal_Note * note)3743 elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
3744 {
3745   int offset;
3746   unsigned int size;
3747 
3748   switch (note->descsz)
3749     {
3750     default:
3751       return false;
3752 
3753     case 224:			/* S/390 Linux.  */
3754       /* pr_cursig */
3755       elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3756 
3757       /* pr_pid */
3758       elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3759 
3760       /* pr_reg */
3761       offset = 72;
3762       size = 144;
3763       break;
3764     }
3765 
3766   /* Make a ".reg/999" section.  */
3767   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3768 					  size, note->descpos + offset);
3769 }
3770 
3771 static bool
elf_s390_grok_psinfo(bfd * abfd,Elf_Internal_Note * note)3772 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3773 {
3774   switch (note->descsz)
3775     {
3776     default:
3777       return false;
3778 
3779     case 124:			/* sizeof(struct elf_prpsinfo) on s390 */
3780       elf_tdata (abfd)->core->pid
3781 	= bfd_get_32 (abfd, note->descdata + 12);
3782       elf_tdata (abfd)->core->program
3783 	= _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
3784       elf_tdata (abfd)->core->command
3785 	= _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
3786       break;
3787     }
3788 
3789   /* Note that for some reason, a spurious space is tacked
3790      onto the end of the args in some (at least one anyway)
3791      implementations, so strip it off if it exists.  */
3792 
3793   {
3794     char *command = elf_tdata (abfd)->core->command;
3795     int n = strlen (command);
3796 
3797     if (0 < n && command[n - 1] == ' ')
3798       command[n - 1] = '\0';
3799   }
3800 
3801   return true;
3802 }
3803 
3804 static char *
elf_s390_write_core_note(bfd * abfd,char * buf,int * bufsiz,int note_type,...)3805 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3806 			  int note_type, ...)
3807 {
3808   va_list ap;
3809 
3810   switch (note_type)
3811     {
3812     default:
3813       return NULL;
3814 
3815     case NT_PRPSINFO:
3816       {
3817 	char data[124] ATTRIBUTE_NONSTRING = { 0 };
3818 	const char *fname, *psargs;
3819 
3820 	va_start (ap, note_type);
3821 	fname = va_arg (ap, const char *);
3822 	psargs = va_arg (ap, const char *);
3823 	va_end (ap);
3824 
3825 	strncpy (data + 28, fname, 16);
3826 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3827 	DIAGNOSTIC_PUSH;
3828 	/* GCC 8.0 and 8.1 warn about 80 equals destination size with
3829 	   -Wstringop-truncation:
3830 	   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3831 	 */
3832 	DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3833 #endif
3834 	strncpy (data + 44, psargs, 80);
3835 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3836 	DIAGNOSTIC_POP;
3837 #endif
3838 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3839 				   &data, sizeof (data));
3840       }
3841 
3842     case NT_PRSTATUS:
3843       {
3844 	char data[224] = { 0 };
3845 	long pid;
3846 	int cursig;
3847 	const void *gregs;
3848 
3849 	va_start (ap, note_type);
3850 	pid = va_arg (ap, long);
3851 	cursig = va_arg (ap, int);
3852 	gregs = va_arg (ap, const void *);
3853 	va_end (ap);
3854 
3855 	bfd_put_16 (abfd, cursig, data + 12);
3856 	bfd_put_32 (abfd, pid, data + 24);
3857 	memcpy (data + 72, gregs, 144);
3858 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3859 				   &data, sizeof (data));
3860       }
3861     }
3862   /* NOTREACHED */
3863 }
3864 
3865 /* Return address for Ith PLT stub in section PLT, for relocation REL
3866    or (bfd_vma) -1 if it should not be included.  */
3867 
3868 static bfd_vma
elf_s390_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)3869 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3870 		      const arelent *rel ATTRIBUTE_UNUSED)
3871 {
3872   return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3873 }
3874 
3875 /* Merge backend specific data from an object file to the output
3876    object file when linking.  */
3877 
3878 static bool
elf32_s390_merge_private_bfd_data(bfd * ibfd,struct bfd_link_info * info)3879 elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3880 {
3881   bfd *obfd = info->output_bfd;
3882 
3883   if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
3884     return true;
3885 
3886   if (!elf_s390_merge_obj_attributes (ibfd, info))
3887     return false;
3888 
3889   elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
3890   return true;
3891 }
3892 
3893 
3894 #define TARGET_BIG_SYM	s390_elf32_vec
3895 #define TARGET_BIG_NAME	"elf32-s390"
3896 #define ELF_ARCH	bfd_arch_s390
3897 #define ELF_TARGET_ID	S390_ELF_DATA
3898 #define ELF_MACHINE_CODE EM_S390
3899 #define ELF_MACHINE_ALT1 EM_S390_OLD
3900 #define ELF_MAXPAGESIZE 0x1000
3901 
3902 #define elf_backend_can_gc_sections	1
3903 #define elf_backend_can_refcount	1
3904 #define elf_backend_want_got_plt	1
3905 #define elf_backend_plt_readonly	1
3906 #define elf_backend_want_plt_sym	0
3907 #define elf_backend_got_header_size	12
3908 #define elf_backend_want_dynrelro	1
3909 #define elf_backend_rela_normal		1
3910 
3911 #define elf_info_to_howto		      elf_s390_info_to_howto
3912 
3913 #define bfd_elf32_bfd_is_local_label_name     elf_s390_is_local_label_name
3914 #define bfd_elf32_bfd_link_hash_table_create  elf_s390_link_hash_table_create
3915 #define bfd_elf32_bfd_reloc_type_lookup	      elf_s390_reloc_type_lookup
3916 #define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
3917 
3918 #define bfd_elf32_bfd_merge_private_bfd_data  elf32_s390_merge_private_bfd_data
3919 
3920 #define elf_backend_adjust_dynamic_symbol     elf_s390_adjust_dynamic_symbol
3921 #define elf_backend_check_relocs	      elf_s390_check_relocs
3922 #define elf_backend_copy_indirect_symbol      elf_s390_copy_indirect_symbol
3923 #define elf_backend_create_dynamic_sections   _bfd_elf_create_dynamic_sections
3924 #define elf_backend_finish_dynamic_sections   elf_s390_finish_dynamic_sections
3925 #define elf_backend_finish_dynamic_symbol     elf_s390_finish_dynamic_symbol
3926 #define elf_backend_gc_mark_hook	      elf_s390_gc_mark_hook
3927 #define elf_backend_reloc_type_class	      elf_s390_reloc_type_class
3928 #define elf_backend_relocate_section	      elf_s390_relocate_section
3929 #define elf_backend_size_dynamic_sections     elf_s390_size_dynamic_sections
3930 #define elf_backend_init_index_section	      _bfd_elf_init_1_index_section
3931 #define elf_backend_grok_prstatus	      elf_s390_grok_prstatus
3932 #define elf_backend_grok_psinfo		      elf_s390_grok_psinfo
3933 #define elf_backend_write_core_note	      elf_s390_write_core_note
3934 #define elf_backend_plt_sym_val		      elf_s390_plt_sym_val
3935 #define elf_backend_sort_relocs_p	      elf_s390_elf_sort_relocs_p
3936 
3937 #define bfd_elf32_mkobject		elf_s390_mkobject
3938 #define elf_backend_object_p		elf_s390_object_p
3939 
3940 #define elf_backend_linux_prpsinfo32_ugid16	true
3941 
3942 #include "elf32-target.h"
3943