1 /* IBM S/390-specific support for 64-bit ELF
2    Copyright (C) 2000-2014 Free Software Foundation, Inc.
3    Contributed Martin Schwidefsky (schwidefsky@de.ibm.com).
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20    02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 
29 /* In case we're on a 32-bit machine, construct a 64-bit "-1" value
30    from smaller values.  Start with zero, widen, *then* decrement.  */
31 #define MINUS_ONE      (((bfd_vma)0) - 1)
32 
33 static bfd_reloc_status_type
34 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
35 		asection *, bfd *, char **);
36 static bfd_reloc_status_type
37 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
38 		      asection *, bfd *, char **);
39 
40 /* The relocation "howto" table.  */
41 static reloc_howto_type elf_howto_table[] =
42 {
43   HOWTO (R_390_NONE,		/* type */
44 	 0,			/* rightshift */
45 	 0,			/* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
46 	 0,			/* bitsize */
47 	 FALSE,			/* pc_relative */
48 	 0,			/* bitpos */
49 	 complain_overflow_dont, /* complain_on_overflow */
50 	 bfd_elf_generic_reloc, /* special_function */
51 	 "R_390_NONE",		/* name */
52 	 FALSE,			/* partial_inplace */
53 	 0,			/* src_mask */
54 	 0,			/* dst_mask */
55 	 FALSE),		/* pcrel_offset */
56 
57   HOWTO(R_390_8,         0, 0,  8, FALSE, 0, complain_overflow_bitfield,
58 	bfd_elf_generic_reloc, "R_390_8",        FALSE, 0,0x000000ff, FALSE),
59   HOWTO(R_390_12,        0, 1, 12, FALSE, 0, complain_overflow_dont,
60 	bfd_elf_generic_reloc, "R_390_12",       FALSE, 0,0x00000fff, FALSE),
61   HOWTO(R_390_16,        0, 1, 16, FALSE, 0, complain_overflow_bitfield,
62 	bfd_elf_generic_reloc, "R_390_16",       FALSE, 0,0x0000ffff, FALSE),
63   HOWTO(R_390_32,        0, 2, 32, FALSE, 0, complain_overflow_bitfield,
64 	bfd_elf_generic_reloc, "R_390_32",       FALSE, 0,0xffffffff, FALSE),
65   HOWTO(R_390_PC32,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
66 	bfd_elf_generic_reloc, "R_390_PC32",     FALSE, 0,0xffffffff, TRUE),
67   HOWTO(R_390_GOT12,	 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
68 	bfd_elf_generic_reloc, "R_390_GOT12",    FALSE, 0,0x00000fff, FALSE),
69   HOWTO(R_390_GOT32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
70 	bfd_elf_generic_reloc, "R_390_GOT32",    FALSE, 0,0xffffffff, FALSE),
71   HOWTO(R_390_PLT32,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
72 	bfd_elf_generic_reloc, "R_390_PLT32",    FALSE, 0,0xffffffff, TRUE),
73   HOWTO(R_390_COPY,      0, 4, 64, FALSE, 0, complain_overflow_bitfield,
74 	bfd_elf_generic_reloc, "R_390_COPY",     FALSE, 0,MINUS_ONE,  FALSE),
75   HOWTO(R_390_GLOB_DAT,  0, 4, 64, FALSE, 0, complain_overflow_bitfield,
76 	bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,MINUS_ONE,  FALSE),
77   HOWTO(R_390_JMP_SLOT,  0, 4, 64, FALSE, 0, complain_overflow_bitfield,
78 	bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,MINUS_ONE,  FALSE),
79   HOWTO(R_390_RELATIVE,  0, 4, 64,  TRUE, 0, complain_overflow_bitfield,
80 	bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,MINUS_ONE,  FALSE),
81   HOWTO(R_390_GOTOFF32,  0, 2, 32, FALSE, 0, complain_overflow_bitfield,
82 	bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,MINUS_ONE,  FALSE),
83   HOWTO(R_390_GOTPC,     0, 4, 64,  TRUE, 0, complain_overflow_bitfield,
84 	bfd_elf_generic_reloc, "R_390_GOTPC",    FALSE, 0,MINUS_ONE,  TRUE),
85   HOWTO(R_390_GOT16,     0, 1, 16, FALSE, 0, complain_overflow_bitfield,
86 	bfd_elf_generic_reloc, "R_390_GOT16",    FALSE, 0,0x0000ffff, FALSE),
87   HOWTO(R_390_PC16,      0, 1, 16,  TRUE, 0, complain_overflow_bitfield,
88 	bfd_elf_generic_reloc, "R_390_PC16",     FALSE, 0,0x0000ffff, TRUE),
89   HOWTO(R_390_PC16DBL,   1, 1, 16,  TRUE, 0, complain_overflow_bitfield,
90 	bfd_elf_generic_reloc, "R_390_PC16DBL",  FALSE, 0,0x0000ffff, TRUE),
91   HOWTO(R_390_PLT16DBL,  1, 1, 16,  TRUE, 0, complain_overflow_bitfield,
92 	bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
93   HOWTO(R_390_PC32DBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
94 	bfd_elf_generic_reloc, "R_390_PC32DBL",  FALSE, 0,0xffffffff, TRUE),
95   HOWTO(R_390_PLT32DBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
96 	bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
97   HOWTO(R_390_GOTPCDBL,  1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
98 	bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,MINUS_ONE,  TRUE),
99   HOWTO(R_390_64,        0, 4, 64, FALSE, 0, complain_overflow_bitfield,
100 	bfd_elf_generic_reloc, "R_390_64",       FALSE, 0,MINUS_ONE,  FALSE),
101   HOWTO(R_390_PC64,	 0, 4, 64,  TRUE, 0, complain_overflow_bitfield,
102 	bfd_elf_generic_reloc, "R_390_PC64",     FALSE, 0,MINUS_ONE,  TRUE),
103   HOWTO(R_390_GOT64,	 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
104 	bfd_elf_generic_reloc, "R_390_GOT64",    FALSE, 0,MINUS_ONE,  FALSE),
105   HOWTO(R_390_PLT64,	 0, 4, 64,  TRUE, 0, complain_overflow_bitfield,
106 	bfd_elf_generic_reloc, "R_390_PLT64",    FALSE, 0,MINUS_ONE,  TRUE),
107   HOWTO(R_390_GOTENT,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
108 	bfd_elf_generic_reloc, "R_390_GOTENT",   FALSE, 0,MINUS_ONE,  TRUE),
109   HOWTO(R_390_GOTOFF16,  0, 1, 16, FALSE, 0, complain_overflow_bitfield,
110 	bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
111   HOWTO(R_390_GOTOFF64,  0, 4, 64, FALSE, 0, complain_overflow_bitfield,
112 	bfd_elf_generic_reloc, "R_390_GOTOFF64", FALSE, 0,MINUS_ONE,  FALSE),
113   HOWTO(R_390_GOTPLT12,	 0, 1, 12, FALSE, 0, complain_overflow_dont,
114 	bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
115   HOWTO(R_390_GOTPLT16,  0, 1, 16, FALSE, 0, complain_overflow_bitfield,
116 	bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
117   HOWTO(R_390_GOTPLT32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
118 	bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
119   HOWTO(R_390_GOTPLT64,	 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
120 	bfd_elf_generic_reloc, "R_390_GOTPLT64", FALSE, 0,MINUS_ONE,  FALSE),
121   HOWTO(R_390_GOTPLTENT, 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
122 	bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,MINUS_ONE,  TRUE),
123   HOWTO(R_390_PLTOFF16,  0, 1, 16, FALSE, 0, complain_overflow_bitfield,
124 	bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
125   HOWTO(R_390_PLTOFF32,  0, 2, 32, FALSE, 0, complain_overflow_bitfield,
126 	bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
127   HOWTO(R_390_PLTOFF64,  0, 4, 64, FALSE, 0, complain_overflow_bitfield,
128 	bfd_elf_generic_reloc, "R_390_PLTOFF64", FALSE, 0,MINUS_ONE,  FALSE),
129   HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
130 	s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
131   HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
132 	s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
133   HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
134 	s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
135   EMPTY_HOWTO (R_390_TLS_GD32),	/* Empty entry for R_390_TLS_GD32.  */
136   HOWTO(R_390_TLS_GD64,  0, 4, 64, FALSE, 0, complain_overflow_bitfield,
137 	bfd_elf_generic_reloc, "R_390_TLS_GD64", FALSE, 0, MINUS_ONE, FALSE),
138   HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
139 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
140   EMPTY_HOWTO (R_390_TLS_GOTIE32),	/* Empty entry for R_390_TLS_GOTIE32.  */
141   HOWTO(R_390_TLS_GOTIE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
142 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE64", FALSE, 0, MINUS_ONE, FALSE),
143   EMPTY_HOWTO (R_390_TLS_LDM32),	/* Empty entry for R_390_TLS_LDM32.  */
144   HOWTO(R_390_TLS_LDM64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
145 	bfd_elf_generic_reloc, "R_390_TLS_LDM64", FALSE, 0, MINUS_ONE, FALSE),
146   EMPTY_HOWTO (R_390_TLS_IE32),	/* Empty entry for R_390_TLS_IE32.  */
147   HOWTO(R_390_TLS_IE64,  0, 4, 64, FALSE, 0, complain_overflow_bitfield,
148 	bfd_elf_generic_reloc, "R_390_TLS_IE64", FALSE, 0, MINUS_ONE, FALSE),
149   HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
150 	bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, MINUS_ONE, TRUE),
151   EMPTY_HOWTO (R_390_TLS_LE32),	/* Empty entry for R_390_TLS_LE32.  */
152   HOWTO(R_390_TLS_LE64,  0, 2, 32, FALSE, 0, complain_overflow_bitfield,
153 	bfd_elf_generic_reloc, "R_390_TLS_LE64", FALSE, 0, MINUS_ONE, FALSE),
154   EMPTY_HOWTO (R_390_TLS_LDO32),	/* Empty entry for R_390_TLS_LDO32.  */
155   HOWTO(R_390_TLS_LDO64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
156 	bfd_elf_generic_reloc, "R_390_TLS_LDO64", FALSE, 0, MINUS_ONE, FALSE),
157   HOWTO(R_390_TLS_DTPMOD, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
158 	bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, MINUS_ONE, FALSE),
159   HOWTO(R_390_TLS_DTPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
160 	bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, MINUS_ONE, FALSE),
161   HOWTO(R_390_TLS_TPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
162 	bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, MINUS_ONE, FALSE),
163   HOWTO(R_390_20,        0, 2, 20, FALSE, 8, complain_overflow_dont,
164 	s390_elf_ldisp_reloc, "R_390_20",      FALSE, 0,0x0fffff00, FALSE),
165   HOWTO(R_390_GOT20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
166 	s390_elf_ldisp_reloc, "R_390_GOT20",   FALSE, 0,0x0fffff00, FALSE),
167   HOWTO(R_390_GOTPLT20,  0, 2, 20, FALSE, 8, complain_overflow_dont,
168 	s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
169   HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
170 	s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
171   HOWTO(R_390_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
172 	bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, MINUS_ONE, FALSE),
173   HOWTO(R_390_PC12DBL,   1, 1, 12,  TRUE, 0, complain_overflow_bitfield,
174 	bfd_elf_generic_reloc, "R_390_PC12DBL",  FALSE, 0,0x00000fff, TRUE),
175   HOWTO(R_390_PLT12DBL,  1, 1, 12,  TRUE, 0, complain_overflow_bitfield,
176 	bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
177   HOWTO(R_390_PC24DBL,   1, 2, 24,  TRUE, 0, complain_overflow_bitfield,
178 	bfd_elf_generic_reloc, "R_390_PC24DBL",  FALSE, 0,0x00ffffff, TRUE),
179   HOWTO(R_390_PLT24DBL,  1, 2, 24,  TRUE, 0, complain_overflow_bitfield,
180 	bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
181 };
182 
183 /* GNU extension to record C++ vtable hierarchy.  */
184 static reloc_howto_type elf64_s390_vtinherit_howto =
185   HOWTO (R_390_GNU_VTINHERIT, 0,4,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
186 static reloc_howto_type elf64_s390_vtentry_howto =
187   HOWTO (R_390_GNU_VTENTRY, 0,4,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
188 
189 static reloc_howto_type *
elf_s390_reloc_type_lookup(bfd * abfd ATTRIBUTE_UNUSED,bfd_reloc_code_real_type code)190 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
191 			    bfd_reloc_code_real_type code)
192 {
193   switch (code)
194     {
195     case BFD_RELOC_NONE:
196       return &elf_howto_table[(int) R_390_NONE];
197     case BFD_RELOC_8:
198       return &elf_howto_table[(int) R_390_8];
199     case BFD_RELOC_390_12:
200       return &elf_howto_table[(int) R_390_12];
201     case BFD_RELOC_16:
202       return &elf_howto_table[(int) R_390_16];
203     case BFD_RELOC_32:
204       return &elf_howto_table[(int) R_390_32];
205     case BFD_RELOC_CTOR:
206       return &elf_howto_table[(int) R_390_32];
207     case BFD_RELOC_32_PCREL:
208       return &elf_howto_table[(int) R_390_PC32];
209     case BFD_RELOC_390_GOT12:
210       return &elf_howto_table[(int) R_390_GOT12];
211     case BFD_RELOC_32_GOT_PCREL:
212       return &elf_howto_table[(int) R_390_GOT32];
213     case BFD_RELOC_390_PLT32:
214       return &elf_howto_table[(int) R_390_PLT32];
215     case BFD_RELOC_390_COPY:
216       return &elf_howto_table[(int) R_390_COPY];
217     case BFD_RELOC_390_GLOB_DAT:
218       return &elf_howto_table[(int) R_390_GLOB_DAT];
219     case BFD_RELOC_390_JMP_SLOT:
220       return &elf_howto_table[(int) R_390_JMP_SLOT];
221     case BFD_RELOC_390_RELATIVE:
222       return &elf_howto_table[(int) R_390_RELATIVE];
223     case BFD_RELOC_32_GOTOFF:
224       return &elf_howto_table[(int) R_390_GOTOFF32];
225     case BFD_RELOC_390_GOTPC:
226       return &elf_howto_table[(int) R_390_GOTPC];
227     case BFD_RELOC_390_GOT16:
228       return &elf_howto_table[(int) R_390_GOT16];
229     case BFD_RELOC_16_PCREL:
230       return &elf_howto_table[(int) R_390_PC16];
231     case BFD_RELOC_390_PC12DBL:
232       return &elf_howto_table[(int) R_390_PC12DBL];
233     case BFD_RELOC_390_PLT12DBL:
234       return &elf_howto_table[(int) R_390_PLT12DBL];
235     case BFD_RELOC_390_PC16DBL:
236       return &elf_howto_table[(int) R_390_PC16DBL];
237     case BFD_RELOC_390_PLT16DBL:
238       return &elf_howto_table[(int) R_390_PLT16DBL];
239     case BFD_RELOC_390_PC24DBL:
240       return &elf_howto_table[(int) R_390_PC24DBL];
241     case BFD_RELOC_390_PLT24DBL:
242       return &elf_howto_table[(int) R_390_PLT24DBL];
243     case BFD_RELOC_390_PC32DBL:
244       return &elf_howto_table[(int) R_390_PC32DBL];
245     case BFD_RELOC_390_PLT32DBL:
246       return &elf_howto_table[(int) R_390_PLT32DBL];
247     case BFD_RELOC_390_GOTPCDBL:
248       return &elf_howto_table[(int) R_390_GOTPCDBL];
249     case BFD_RELOC_64:
250       return &elf_howto_table[(int) R_390_64];
251     case BFD_RELOC_64_PCREL:
252       return &elf_howto_table[(int) R_390_PC64];
253     case BFD_RELOC_390_GOT64:
254       return &elf_howto_table[(int) R_390_GOT64];
255     case BFD_RELOC_390_PLT64:
256       return &elf_howto_table[(int) R_390_PLT64];
257     case BFD_RELOC_390_GOTENT:
258       return &elf_howto_table[(int) R_390_GOTENT];
259     case BFD_RELOC_16_GOTOFF:
260       return &elf_howto_table[(int) R_390_GOTOFF16];
261     case BFD_RELOC_390_GOTOFF64:
262       return &elf_howto_table[(int) R_390_GOTOFF64];
263     case BFD_RELOC_390_GOTPLT12:
264       return &elf_howto_table[(int) R_390_GOTPLT12];
265     case BFD_RELOC_390_GOTPLT16:
266       return &elf_howto_table[(int) R_390_GOTPLT16];
267     case BFD_RELOC_390_GOTPLT32:
268       return &elf_howto_table[(int) R_390_GOTPLT32];
269     case BFD_RELOC_390_GOTPLT64:
270       return &elf_howto_table[(int) R_390_GOTPLT64];
271     case BFD_RELOC_390_GOTPLTENT:
272       return &elf_howto_table[(int) R_390_GOTPLTENT];
273     case BFD_RELOC_390_PLTOFF16:
274       return &elf_howto_table[(int) R_390_PLTOFF16];
275     case BFD_RELOC_390_PLTOFF32:
276       return &elf_howto_table[(int) R_390_PLTOFF32];
277     case BFD_RELOC_390_PLTOFF64:
278       return &elf_howto_table[(int) R_390_PLTOFF64];
279     case BFD_RELOC_390_TLS_LOAD:
280       return &elf_howto_table[(int) R_390_TLS_LOAD];
281     case BFD_RELOC_390_TLS_GDCALL:
282       return &elf_howto_table[(int) R_390_TLS_GDCALL];
283     case BFD_RELOC_390_TLS_LDCALL:
284       return &elf_howto_table[(int) R_390_TLS_LDCALL];
285     case BFD_RELOC_390_TLS_GD64:
286       return &elf_howto_table[(int) R_390_TLS_GD64];
287     case BFD_RELOC_390_TLS_GOTIE12:
288       return &elf_howto_table[(int) R_390_TLS_GOTIE12];
289     case BFD_RELOC_390_TLS_GOTIE64:
290       return &elf_howto_table[(int) R_390_TLS_GOTIE64];
291     case BFD_RELOC_390_TLS_LDM64:
292       return &elf_howto_table[(int) R_390_TLS_LDM64];
293     case BFD_RELOC_390_TLS_IE64:
294       return &elf_howto_table[(int) R_390_TLS_IE64];
295     case BFD_RELOC_390_TLS_IEENT:
296       return &elf_howto_table[(int) R_390_TLS_IEENT];
297     case BFD_RELOC_390_TLS_LE64:
298       return &elf_howto_table[(int) R_390_TLS_LE64];
299     case BFD_RELOC_390_TLS_LDO64:
300       return &elf_howto_table[(int) R_390_TLS_LDO64];
301     case BFD_RELOC_390_TLS_DTPMOD:
302       return &elf_howto_table[(int) R_390_TLS_DTPMOD];
303     case BFD_RELOC_390_TLS_DTPOFF:
304       return &elf_howto_table[(int) R_390_TLS_DTPOFF];
305     case BFD_RELOC_390_TLS_TPOFF:
306       return &elf_howto_table[(int) R_390_TLS_TPOFF];
307     case BFD_RELOC_390_20:
308       return &elf_howto_table[(int) R_390_20];
309     case BFD_RELOC_390_GOT20:
310       return &elf_howto_table[(int) R_390_GOT20];
311     case BFD_RELOC_390_GOTPLT20:
312       return &elf_howto_table[(int) R_390_GOTPLT20];
313     case BFD_RELOC_390_TLS_GOTIE20:
314       return &elf_howto_table[(int) R_390_TLS_GOTIE20];
315     case BFD_RELOC_390_IRELATIVE:
316       return &elf_howto_table[(int) R_390_IRELATIVE];
317     case BFD_RELOC_VTABLE_INHERIT:
318       return &elf64_s390_vtinherit_howto;
319     case BFD_RELOC_VTABLE_ENTRY:
320       return &elf64_s390_vtentry_howto;
321     default:
322       break;
323     }
324   return 0;
325 }
326 
327 static reloc_howto_type *
elf_s390_reloc_name_lookup(bfd * abfd ATTRIBUTE_UNUSED,const char * r_name)328 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
329 			    const char *r_name)
330 {
331   unsigned int i;
332 
333   for (i = 0;
334        i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]);
335        i++)
336     if (elf_howto_table[i].name != NULL
337 	&& strcasecmp (elf_howto_table[i].name, r_name) == 0)
338       return &elf_howto_table[i];
339 
340     if (strcasecmp (elf64_s390_vtinherit_howto.name, r_name) == 0)
341       return &elf64_s390_vtinherit_howto;
342     if (strcasecmp (elf64_s390_vtentry_howto.name, r_name) == 0)
343       return &elf64_s390_vtentry_howto;
344 
345   return NULL;
346 }
347 
348 /* We need to use ELF64_R_TYPE so we have our own copy of this function,
349    and elf64-s390.c has its own copy.  */
350 
351 static void
elf_s390_info_to_howto(bfd * abfd ATTRIBUTE_UNUSED,arelent * cache_ptr,Elf_Internal_Rela * dst)352 elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
353 			arelent *cache_ptr,
354 			Elf_Internal_Rela *dst)
355 {
356   unsigned int r_type = ELF64_R_TYPE(dst->r_info);
357   switch (r_type)
358     {
359     case R_390_GNU_VTINHERIT:
360       cache_ptr->howto = &elf64_s390_vtinherit_howto;
361       break;
362 
363     case R_390_GNU_VTENTRY:
364       cache_ptr->howto = &elf64_s390_vtentry_howto;
365       break;
366 
367     default:
368       if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
369 	{
370 	  (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
371 				 abfd, (int) r_type);
372 	  r_type = R_390_NONE;
373 	}
374       cache_ptr->howto = &elf_howto_table[r_type];
375     }
376 }
377 
378 /* A relocation function which doesn't do anything.  */
379 static bfd_reloc_status_type
s390_tls_reloc(bfd * abfd ATTRIBUTE_UNUSED,arelent * reloc_entry,asymbol * symbol ATTRIBUTE_UNUSED,void * data ATTRIBUTE_UNUSED,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)380 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
381 		arelent *reloc_entry,
382 		asymbol *symbol ATTRIBUTE_UNUSED,
383 		void * data ATTRIBUTE_UNUSED,
384 		asection *input_section,
385 		bfd *output_bfd,
386 		char **error_message ATTRIBUTE_UNUSED)
387 {
388   if (output_bfd)
389     reloc_entry->address += input_section->output_offset;
390   return bfd_reloc_ok;
391 }
392 
393 /* Handle the large displacement relocs.  */
394 static bfd_reloc_status_type
s390_elf_ldisp_reloc(bfd * abfd,arelent * reloc_entry,asymbol * symbol,void * data,asection * input_section,bfd * output_bfd,char ** error_message ATTRIBUTE_UNUSED)395 s390_elf_ldisp_reloc (bfd *abfd,
396 		      arelent *reloc_entry,
397 		      asymbol *symbol,
398 		      void * data,
399 		      asection *input_section,
400 		      bfd *output_bfd,
401 		      char **error_message ATTRIBUTE_UNUSED)
402 {
403   reloc_howto_type *howto = reloc_entry->howto;
404   bfd_vma relocation;
405   bfd_vma insn;
406 
407   if (output_bfd != (bfd *) NULL
408       && (symbol->flags & BSF_SECTION_SYM) == 0
409       && (! howto->partial_inplace
410 	  || reloc_entry->addend == 0))
411     {
412       reloc_entry->address += input_section->output_offset;
413       return bfd_reloc_ok;
414     }
415   if (output_bfd != NULL)
416     return bfd_reloc_continue;
417 
418   if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
419     return bfd_reloc_outofrange;
420 
421   relocation = (symbol->value
422 		+ symbol->section->output_section->vma
423 		+ symbol->section->output_offset);
424   relocation += reloc_entry->addend;
425   if (howto->pc_relative)
426     {
427       relocation -= (input_section->output_section->vma
428 		     + input_section->output_offset);
429       relocation -= reloc_entry->address;
430     }
431 
432   insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
433   insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
434   bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
435 
436   if ((bfd_signed_vma) relocation < - 0x80000
437       || (bfd_signed_vma) relocation > 0x7ffff)
438     return bfd_reloc_overflow;
439   else
440     return bfd_reloc_ok;
441 }
442 
443 static bfd_boolean
elf_s390_is_local_label_name(bfd * abfd,const char * name)444 elf_s390_is_local_label_name (bfd *abfd, const char *name)
445 {
446   if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
447     return TRUE;
448 
449   return _bfd_elf_is_local_label_name (abfd, name);
450 }
451 
452 /* Functions for the 390 ELF linker.  */
453 
454 /* The name of the dynamic interpreter.  This is put in the .interp
455    section.  */
456 
457 #define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
458 
459 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
460    copying dynamic variables from a shared lib into an app's dynbss
461    section, and instead use a dynamic relocation to point into the
462    shared lib.  */
463 #define ELIMINATE_COPY_RELOCS 1
464 
465 /* The size in bytes of the first entry in the procedure linkage table.  */
466 #define PLT_FIRST_ENTRY_SIZE 32
467 /* The size in bytes of an entry in the procedure linkage table.  */
468 #define PLT_ENTRY_SIZE 32
469 
470 #define GOT_ENTRY_SIZE 8
471 
472 #define RELA_ENTRY_SIZE sizeof (Elf64_External_Rela)
473 
474 /* The first three entries in a procedure linkage table are reserved,
475    and the initial contents are unimportant (we zero them out).
476    Subsequent entries look like this.  See the SVR4 ABI 386
477    supplement to see how this works.  */
478 
479 /* For the s390, simple addr offset can only be 0 - 4096.
480    To use the full 16777216 TB address space, several instructions
481    are needed to load an address in a register and execute
482    a branch( or just saving the address)
483 
484    Furthermore, only r 0 and 1 are free to use!!!  */
485 
486 /* The first 3 words in the GOT are then reserved.
487    Word 0 is the address of the dynamic table.
488    Word 1 is a pointer to a structure describing the object
489    Word 2 is used to point to the loader entry address.
490 
491    The code for PLT entries looks like this:
492 
493    The GOT holds the address in the PLT to be executed.
494    The loader then gets:
495    24(15) =  Pointer to the structure describing the object.
496    28(15) =  Offset in symbol table
497    The loader  must  then find the module where the function is
498    and insert the address in the GOT.
499 
500    PLT1: LARL 1,<fn>@GOTENT # 6 bytes  Load address of GOT entry in r1
501          LG   1,0(1)      # 6 bytes  Load address from GOT in r1
502          BCR  15,1        # 2 bytes  Jump to address
503    RET1: BASR 1,0         # 2 bytes  Return from GOT 1st time
504          LGF  1,12(1)     # 6 bytes  Load offset in symbl table in r1
505          BRCL 15,-x       # 6 bytes  Jump to start of PLT
506          .long ?          # 4 bytes  offset into .rela.plt
507 
508    Total = 32 bytes per PLT entry
509    Fixup at offset 2: relative address to GOT entry
510    Fixup at offset 22: relative branch to PLT0
511    Fixup at offset 28: 32 bit offset into .rela.plt
512 
513    A 32 bit offset into the symbol table is enough. It allows for
514    .rela.plt sections up to a size of 2 gigabyte.  A single dynamic
515    object (the main program, any shared library) is limited to 4GB in
516    size.  Having a .rela.plt of 2GB would already make the .plt
517    section bigger than 8GB.  */
518 
519 static const bfd_byte elf_s390x_plt_entry[PLT_ENTRY_SIZE] =
520   {
521     0xc0, 0x10, 0x00, 0x00, 0x00, 0x00,     /* larl    %r1,.       */
522     0xe3, 0x10, 0x10, 0x00, 0x00, 0x04,     /* lg      %r1,0(%r1)  */
523     0x07, 0xf1,                             /* br      %r1         */
524     0x0d, 0x10,                             /* basr    %r1,%r0     */
525     0xe3, 0x10, 0x10, 0x0c, 0x00, 0x14,     /* lgf     %r1,12(%r1) */
526     0xc0, 0xf4, 0x00, 0x00, 0x00, 0x00,     /* jg      first plt   */
527     0x00, 0x00, 0x00, 0x00                  /* .long   0x00000000  */
528   };
529 
530 /* The first PLT entry pushes the offset into the symbol table
531    from R1 onto the stack at 56(15) and the loader object info
532    at 48(15), loads the loader address in R1 and jumps to it.  */
533 
534 /* The first entry in the PLT:
535 
536   PLT0:
537      STG  1,56(15)  # r1 contains the offset into the symbol table
538      LARL 1,_GLOBAL_OFFSET_TABLE # load address of global offset table
539      MVC  48(8,15),8(1) # move loader ino (object struct address) to stack
540      LG   1,16(1)   # get entry address of loader
541      BCR  15,1      # jump to loader
542 
543      Fixup at offset 8: relative address to start of GOT.  */
544 
545 static const bfd_byte elf_s390x_first_plt_entry[PLT_FIRST_ENTRY_SIZE] =
546   {
547     0xe3, 0x10, 0xf0, 0x38, 0x00, 0x24,     /* stg     %r1,56(%r15)      */
548     0xc0, 0x10, 0x00, 0x00, 0x00, 0x00,     /* larl    %r1,.             */
549     0xd2, 0x07, 0xf0, 0x30, 0x10, 0x08,     /* mvc     48(8,%r15),8(%r1) */
550     0xe3, 0x10, 0x10, 0x10, 0x00, 0x04,     /* lg      %r1,16(%r1)       */
551     0x07, 0xf1,                             /* br      %r1               */
552     0x07, 0x00,                             /* nopr    %r0               */
553     0x07, 0x00,                             /* nopr    %r0               */
554     0x07, 0x00                              /* nopr    %r0               */
555   };
556 
557 
558 /* s390 ELF linker hash entry.  */
559 
560 struct elf_s390_link_hash_entry
561 {
562   struct elf_link_hash_entry elf;
563 
564   /* Track dynamic relocs copied for this symbol.  */
565   struct elf_dyn_relocs *dyn_relocs;
566 
567   /* Number of GOTPLT references for a function.  */
568   bfd_signed_vma gotplt_refcount;
569 
570 #define GOT_UNKNOWN	0
571 #define GOT_NORMAL	1
572 #define GOT_TLS_GD	2
573 #define GOT_TLS_IE	3
574 #define GOT_TLS_IE_NLT	3
575   unsigned char tls_type;
576 
577   /* For pointer equality reasons we might need to change the symbol
578      type from STT_GNU_IFUNC to STT_FUNC together with its value and
579      section entry.  So after alloc_dynrelocs only these values should
580      be used.  In order to check whether a symbol is IFUNC use
581      s390_is_ifunc_symbol_p.  */
582   bfd_vma ifunc_resolver_address;
583   asection *ifunc_resolver_section;
584 };
585 
586 #define elf_s390_hash_entry(ent) \
587   ((struct elf_s390_link_hash_entry *)(ent))
588 
589 /* This structure represents an entry in the local PLT list needed for
590    local IFUNC symbols.  */
591 struct plt_entry
592 {
593   /* The section of the local symbol.
594      Set in relocate_section and used in finish_dynamic_sections.  */
595   asection *sec;
596 
597   union
598     {
599       bfd_signed_vma refcount;
600       bfd_vma offset;
601     } plt;
602 };
603 
604 /* NOTE: Keep this structure in sync with
605    the one declared in elf32-s390.c.  */
606 struct elf_s390_obj_tdata
607 {
608   struct elf_obj_tdata root;
609 
610   /* A local PLT is needed for ifunc symbols.  */
611   struct plt_entry *local_plt;
612 
613   /* TLS type for each local got entry.  */
614   char *local_got_tls_type;
615 };
616 
617 #define elf_s390_tdata(abfd) \
618   ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
619 
620 #define elf_s390_local_plt(abfd) \
621   (elf_s390_tdata (abfd)->local_plt)
622 
623 #define elf_s390_local_got_tls_type(abfd) \
624   (elf_s390_tdata (abfd)->local_got_tls_type)
625 
626 #define is_s390_elf(bfd)				\
627   (bfd_get_flavour (bfd) == bfd_target_elf_flavour	\
628    && elf_tdata (bfd) != NULL				\
629    && elf_object_id (bfd) == S390_ELF_DATA)
630 
631 static bfd_boolean
elf_s390_mkobject(bfd * abfd)632 elf_s390_mkobject (bfd *abfd)
633 {
634   return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
635 				  S390_ELF_DATA);
636 }
637 
638 static bfd_boolean
elf_s390_object_p(bfd * abfd)639 elf_s390_object_p (bfd *abfd)
640 {
641   /* Set the right machine number for an s390 elf32 file.  */
642   return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_64);
643 }
644 
645 /* s390 ELF linker hash table.  */
646 
647 struct elf_s390_link_hash_table
648 {
649   struct elf_link_hash_table elf;
650 
651   /* Short-cuts to get to dynamic linker sections.  */
652   asection *sdynbss;
653   asection *srelbss;
654   asection *irelifunc;
655 
656   union {
657     bfd_signed_vma refcount;
658     bfd_vma offset;
659   } tls_ldm_got;
660 
661   /* Small local sym cache.  */
662   struct sym_cache sym_cache;
663 };
664 
665 /* Get the s390 ELF linker hash table from a link_info structure.  */
666 
667 #define elf_s390_hash_table(p) \
668   (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
669   == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
670 
671 #define ELF64 1
672 #include "elf-s390-common.c"
673 
674 /* Create an entry in an s390 ELF linker hash table.  */
675 
676 static struct bfd_hash_entry *
link_hash_newfunc(struct bfd_hash_entry * entry,struct bfd_hash_table * table,const char * string)677 link_hash_newfunc (struct bfd_hash_entry *entry,
678 		   struct bfd_hash_table *table,
679 		   const char *string)
680 {
681   /* Allocate the structure if it has not already been allocated by a
682      subclass.  */
683   if (entry == NULL)
684     {
685       entry = bfd_hash_allocate (table,
686 				 sizeof (struct elf_s390_link_hash_entry));
687       if (entry == NULL)
688 	return entry;
689     }
690 
691   /* Call the allocation method of the superclass.  */
692   entry = _bfd_elf_link_hash_newfunc (entry, table, string);
693   if (entry != NULL)
694     {
695       struct elf_s390_link_hash_entry *eh;
696 
697       eh = (struct elf_s390_link_hash_entry *) entry;
698       eh->dyn_relocs = NULL;
699       eh->gotplt_refcount = 0;
700       eh->tls_type = GOT_UNKNOWN;
701       eh->ifunc_resolver_address = 0;
702       eh->ifunc_resolver_section = NULL;
703     }
704 
705   return entry;
706 }
707 
708 /* Create an s390 ELF linker hash table.  */
709 
710 static struct bfd_link_hash_table *
elf_s390_link_hash_table_create(bfd * abfd)711 elf_s390_link_hash_table_create (bfd *abfd)
712 {
713   struct elf_s390_link_hash_table *ret;
714   bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
715 
716   ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
717   if (ret == NULL)
718     return NULL;
719 
720   if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
721 				      sizeof (struct elf_s390_link_hash_entry),
722 				      S390_ELF_DATA))
723     {
724       free (ret);
725       return NULL;
726     }
727 
728   return &ret->elf.root;
729 }
730 
731 /* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
732    shortcuts to them in our hash table.  */
733 
734 static bfd_boolean
create_got_section(bfd * dynobj,struct bfd_link_info * info)735 create_got_section (bfd *dynobj,
736 		    struct bfd_link_info *info)
737 {
738   struct elf_s390_link_hash_table *htab;
739 
740   if (! _bfd_elf_create_got_section (dynobj, info))
741     return FALSE;
742 
743   htab = elf_s390_hash_table (info);
744   if (htab == NULL)
745     return FALSE;
746 
747   htab->elf.sgot = bfd_get_linker_section (dynobj, ".got");
748   htab->elf.sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
749   htab->elf.srelgot = bfd_get_linker_section (dynobj, ".rela.got");
750   if (!htab->elf.sgot || !htab->elf.sgotplt || !htab->elf.srelgot)
751     abort ();
752   return TRUE;
753 }
754 
755 /* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
756    .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
757    hash table.  */
758 
759 static bfd_boolean
elf_s390_create_dynamic_sections(bfd * dynobj,struct bfd_link_info * info)760 elf_s390_create_dynamic_sections (bfd *dynobj,
761 				  struct bfd_link_info *info)
762 {
763   struct elf_s390_link_hash_table *htab;
764 
765   htab = elf_s390_hash_table (info);
766   if (htab == NULL)
767     return FALSE;
768 
769   if (!htab->elf.sgot && !create_got_section (dynobj, info))
770     return FALSE;
771 
772   if (!_bfd_elf_create_dynamic_sections (dynobj, info))
773     return FALSE;
774 
775   htab->elf.splt = bfd_get_linker_section (dynobj, ".plt");
776   htab->elf.srelplt = bfd_get_linker_section (dynobj, ".rela.plt");
777   htab->sdynbss = bfd_get_linker_section (dynobj, ".dynbss");
778   if (!info->shared)
779     htab->srelbss = bfd_get_linker_section (dynobj, ".rela.bss");
780 
781   if (!htab->elf.splt || !htab->elf.srelplt || !htab->sdynbss
782       || (!info->shared && !htab->srelbss))
783     abort ();
784 
785   return TRUE;
786 }
787 
788 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
789 
790 static void
elf_s390_copy_indirect_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * dir,struct elf_link_hash_entry * ind)791 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
792 			       struct elf_link_hash_entry *dir,
793 			       struct elf_link_hash_entry *ind)
794 {
795   struct elf_s390_link_hash_entry *edir, *eind;
796 
797   edir = (struct elf_s390_link_hash_entry *) dir;
798   eind = (struct elf_s390_link_hash_entry *) ind;
799 
800   if (eind->dyn_relocs != NULL)
801     {
802       if (edir->dyn_relocs != NULL)
803 	{
804 	  struct elf_dyn_relocs **pp;
805 	  struct elf_dyn_relocs *p;
806 
807 	  /* Add reloc counts against the indirect sym to the direct sym
808 	     list.  Merge any entries against the same section.  */
809 	  for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
810 	    {
811 	      struct elf_dyn_relocs *q;
812 
813 	      for (q = edir->dyn_relocs; q != NULL; q = q->next)
814 		if (q->sec == p->sec)
815 		  {
816 		    q->pc_count += p->pc_count;
817 		    q->count += p->count;
818 		    *pp = p->next;
819 		    break;
820 		  }
821 	      if (q == NULL)
822 		pp = &p->next;
823 	    }
824 	  *pp = edir->dyn_relocs;
825 	}
826 
827       edir->dyn_relocs = eind->dyn_relocs;
828       eind->dyn_relocs = NULL;
829     }
830 
831   if (ind->root.type == bfd_link_hash_indirect
832       && dir->got.refcount <= 0)
833     {
834       edir->tls_type = eind->tls_type;
835       eind->tls_type = GOT_UNKNOWN;
836     }
837 
838   if (ELIMINATE_COPY_RELOCS
839       && ind->root.type != bfd_link_hash_indirect
840       && dir->dynamic_adjusted)
841     {
842       /* If called to transfer flags for a weakdef during processing
843 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
844 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
845       dir->ref_dynamic |= ind->ref_dynamic;
846       dir->ref_regular |= ind->ref_regular;
847       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
848       dir->needs_plt |= ind->needs_plt;
849     }
850   else
851     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
852 }
853 
854 static int
elf_s390_tls_transition(struct bfd_link_info * info,int r_type,int is_local)855 elf_s390_tls_transition (struct bfd_link_info *info,
856 			 int r_type,
857 			 int is_local)
858 {
859   if (info->shared)
860     return r_type;
861 
862   switch (r_type)
863     {
864     case R_390_TLS_GD64:
865     case R_390_TLS_IE64:
866       if (is_local)
867 	return R_390_TLS_LE64;
868       return R_390_TLS_IE64;
869     case R_390_TLS_GOTIE64:
870       if (is_local)
871 	return R_390_TLS_LE64;
872       return R_390_TLS_GOTIE64;
873     case R_390_TLS_LDM64:
874       return R_390_TLS_LE64;
875     }
876 
877   return r_type;
878 }
879 
880 /* Look through the relocs for a section during the first phase, and
881    allocate space in the global offset table or procedure linkage
882    table.  */
883 
884 static bfd_boolean
elf_s390_check_relocs(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)885 elf_s390_check_relocs (bfd *abfd,
886 		       struct bfd_link_info *info,
887 		       asection *sec,
888 		       const Elf_Internal_Rela *relocs)
889 {
890   struct elf_s390_link_hash_table *htab;
891   Elf_Internal_Shdr *symtab_hdr;
892   struct elf_link_hash_entry **sym_hashes;
893   const Elf_Internal_Rela *rel;
894   const Elf_Internal_Rela *rel_end;
895   asection *sreloc;
896   bfd_signed_vma *local_got_refcounts;
897   int tls_type, old_tls_type;
898 
899   if (info->relocatable)
900     return TRUE;
901 
902   BFD_ASSERT (is_s390_elf (abfd));
903 
904   htab = elf_s390_hash_table (info);
905   if (htab == NULL)
906     return FALSE;
907 
908   symtab_hdr = &elf_symtab_hdr (abfd);
909   sym_hashes = elf_sym_hashes (abfd);
910   local_got_refcounts = elf_local_got_refcounts (abfd);
911 
912   sreloc = NULL;
913 
914   rel_end = relocs + sec->reloc_count;
915   for (rel = relocs; rel < rel_end; rel++)
916     {
917       unsigned int r_type;
918       unsigned long r_symndx;
919       struct elf_link_hash_entry *h;
920       Elf_Internal_Sym *isym;
921 
922       r_symndx = ELF64_R_SYM (rel->r_info);
923 
924       if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
925 	{
926 	  (*_bfd_error_handler) (_("%B: bad symbol index: %d"),
927 				 abfd,
928 				 r_symndx);
929 	  return FALSE;
930 	}
931 
932       if (r_symndx < symtab_hdr->sh_info)
933 	{
934 	  /* A local symbol.  */
935 	  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
936 					abfd, r_symndx);
937 	  if (isym == NULL)
938 	    return FALSE;
939 
940 	  if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
941 	    {
942 	      struct plt_entry *plt;
943 
944 	      if (htab->elf.dynobj == NULL)
945 		htab->elf.dynobj = abfd;
946 
947 	      if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
948 		return FALSE;
949 
950 	      if (local_got_refcounts == NULL)
951 		{
952 		  if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
953 		    return FALSE;
954 		  local_got_refcounts = elf_local_got_refcounts (abfd);
955 		}
956 	      plt = elf_s390_local_plt (abfd);
957 	      plt[r_symndx].plt.refcount++;
958 	    }
959 	  h = NULL;
960 	}
961       else
962 	{
963 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
964 	  while (h->root.type == bfd_link_hash_indirect
965 		 || h->root.type == bfd_link_hash_warning)
966 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
967 
968 	  /* PR15323, ref flags aren't set for references in the same
969 	     object.  */
970 	  h->root.non_ir_ref = 1;
971 	}
972 
973       /* Create got section and local_got_refcounts array if they
974 	 are needed.  */
975       r_type = elf_s390_tls_transition (info,
976 					ELF64_R_TYPE (rel->r_info),
977 					h == NULL);
978       switch (r_type)
979 	{
980 	case R_390_GOT12:
981 	case R_390_GOT16:
982 	case R_390_GOT20:
983 	case R_390_GOT32:
984 	case R_390_GOT64:
985 	case R_390_GOTENT:
986 	case R_390_GOTPLT12:
987 	case R_390_GOTPLT16:
988 	case R_390_GOTPLT20:
989 	case R_390_GOTPLT32:
990 	case R_390_GOTPLT64:
991 	case R_390_GOTPLTENT:
992 	case R_390_TLS_GD64:
993 	case R_390_TLS_GOTIE12:
994 	case R_390_TLS_GOTIE20:
995 	case R_390_TLS_GOTIE64:
996 	case R_390_TLS_IEENT:
997 	case R_390_TLS_IE64:
998 	case R_390_TLS_LDM64:
999 	  if (h == NULL
1000 	      && local_got_refcounts == NULL)
1001 	    {
1002 	      if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
1003 		return FALSE;
1004 	      local_got_refcounts = elf_local_got_refcounts (abfd);
1005 	    }
1006 
1007 	  /* Fall through.  */
1008 	case R_390_GOTOFF16:
1009 	case R_390_GOTOFF32:
1010 	case R_390_GOTOFF64:
1011 	case R_390_GOTPC:
1012 	case R_390_GOTPCDBL:
1013 	  if (htab->elf.sgot == NULL)
1014 	    {
1015 	      if (htab->elf.dynobj == NULL)
1016 		htab->elf.dynobj = abfd;
1017 	      if (!create_got_section (htab->elf.dynobj, info))
1018 		return FALSE;
1019 	    }
1020 	}
1021 
1022       if (h != NULL)
1023 	{
1024 	  if (htab->elf.dynobj == NULL)
1025 	    htab->elf.dynobj = abfd;
1026 	  if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1027 	    return FALSE;
1028 
1029 	  /* Make sure an IFUNC symbol defined in a non-shared object
1030 	     always gets a PLT slot.  */
1031 	  if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1032 	    {
1033 	      /* The symbol is called by the dynamic loader in order
1034 		 to resolve the relocation.  So it is in fact also
1035 		 referenced.  */
1036 	      h->ref_regular = 1;
1037 	      h->needs_plt = 1;
1038 	    }
1039 	}
1040 
1041       switch (r_type)
1042 	{
1043 	case R_390_GOTOFF16:
1044 	case R_390_GOTOFF32:
1045 	case R_390_GOTOFF64:
1046 	case R_390_GOTPC:
1047 	case R_390_GOTPCDBL:
1048 	  /* These relocs do not need a GOT slot.  They just load the
1049 	     GOT pointer itself or address something else relative to
1050 	     the GOT.  Since the GOT pointer has been set up above we
1051 	     are done.  */
1052 	  break;
1053 
1054 	case R_390_PLT12DBL:
1055 	case R_390_PLT16DBL:
1056 	case R_390_PLT24DBL:
1057 	case R_390_PLT32:
1058 	case R_390_PLT32DBL:
1059 	case R_390_PLT64:
1060 	case R_390_PLTOFF16:
1061 	case R_390_PLTOFF32:
1062 	case R_390_PLTOFF64:
1063 	  /* This symbol requires a procedure linkage table entry.  We
1064 	     actually build the entry in adjust_dynamic_symbol,
1065 	     because this might be a case of linking PIC code which is
1066 	     never referenced by a dynamic object, in which case we
1067 	     don't need to generate a procedure linkage table entry
1068 	     after all.  */
1069 
1070 	  /* If this is a local symbol, we resolve it directly without
1071 	     creating a procedure linkage table entry.  */
1072 	  if (h != NULL)
1073 	    {
1074 	      h->needs_plt = 1;
1075 	      h->plt.refcount += 1;
1076 	    }
1077 	  break;
1078 
1079 	case R_390_GOTPLT12:
1080 	case R_390_GOTPLT16:
1081 	case R_390_GOTPLT20:
1082 	case R_390_GOTPLT32:
1083 	case R_390_GOTPLT64:
1084 	case R_390_GOTPLTENT:
1085 	  /* This symbol requires either a procedure linkage table entry
1086 	     or an entry in the local got. We actually build the entry
1087 	     in adjust_dynamic_symbol because whether this is really a
1088 	     global reference can change and with it the fact if we have
1089 	     to create a plt entry or a local got entry. To be able to
1090 	     make a once global symbol a local one we have to keep track
1091 	     of the number of gotplt references that exist for this
1092 	     symbol.  */
1093 	  if (h != NULL)
1094 	    {
1095 	      ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1096 	      h->needs_plt = 1;
1097 	      h->plt.refcount += 1;
1098 	    }
1099 	  else
1100 	    local_got_refcounts[r_symndx] += 1;
1101 	  break;
1102 
1103 	case R_390_TLS_LDM64:
1104 	  htab->tls_ldm_got.refcount += 1;
1105 	  break;
1106 
1107 	case R_390_TLS_IE64:
1108 	case R_390_TLS_GOTIE12:
1109 	case R_390_TLS_GOTIE20:
1110 	case R_390_TLS_GOTIE64:
1111 	case R_390_TLS_IEENT:
1112 	  if (info->shared)
1113 	    info->flags |= DF_STATIC_TLS;
1114 	  /* Fall through */
1115 
1116 	case R_390_GOT12:
1117 	case R_390_GOT16:
1118 	case R_390_GOT20:
1119 	case R_390_GOT32:
1120 	case R_390_GOT64:
1121 	case R_390_GOTENT:
1122 	case R_390_TLS_GD64:
1123 	  /* This symbol requires a global offset table entry.  */
1124 	  switch (r_type)
1125 	    {
1126 	    default:
1127 	    case R_390_GOT12:
1128 	    case R_390_GOT16:
1129 	    case R_390_GOT20:
1130 	    case R_390_GOT32:
1131 	    case R_390_GOTENT:
1132 	      tls_type = GOT_NORMAL;
1133 	      break;
1134 	    case R_390_TLS_GD64:
1135 	      tls_type = GOT_TLS_GD;
1136 	      break;
1137 	    case R_390_TLS_IE64:
1138 	    case R_390_TLS_GOTIE64:
1139 	      tls_type = GOT_TLS_IE;
1140 	      break;
1141 	    case R_390_TLS_GOTIE12:
1142 	    case R_390_TLS_GOTIE20:
1143 	    case R_390_TLS_IEENT:
1144 	      tls_type = GOT_TLS_IE_NLT;
1145 	      break;
1146 	    }
1147 
1148 	  if (h != NULL)
1149 	    {
1150 	      h->got.refcount += 1;
1151 	      old_tls_type = elf_s390_hash_entry(h)->tls_type;
1152 	    }
1153 	  else
1154 	    {
1155 	      local_got_refcounts[r_symndx] += 1;
1156 	      old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1157 	    }
1158 	  /* If a TLS symbol is accessed using IE at least once,
1159 	     there is no point to use dynamic model for it.  */
1160 	  if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1161 	    {
1162 	      if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1163 		{
1164 		  (*_bfd_error_handler)
1165 		    (_("%B: `%s' accessed both as normal and thread local symbol"),
1166 		     abfd, h->root.root.string);
1167 		  return FALSE;
1168 		}
1169 	      if (old_tls_type > tls_type)
1170 		tls_type = old_tls_type;
1171 	    }
1172 
1173 	  if (old_tls_type != tls_type)
1174 	    {
1175 	      if (h != NULL)
1176 		elf_s390_hash_entry (h)->tls_type = tls_type;
1177 	      else
1178 		elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1179 	    }
1180 
1181 	  if (r_type != R_390_TLS_IE64)
1182 	    break;
1183 	  /* Fall through */
1184 
1185 	case R_390_TLS_LE64:
1186 	  /* For static linking and executables this reloc will be
1187 	     calculated at linktime otherwise a TLS_TPOFF runtime
1188 	     reloc will be generated.  */
1189 	  if (r_type == R_390_TLS_LE64 && info->pie)
1190 	    break;
1191 
1192 	  if (!info->shared)
1193 	    break;
1194 	  info->flags |= DF_STATIC_TLS;
1195 	  /* Fall through */
1196 
1197 	case R_390_8:
1198 	case R_390_16:
1199 	case R_390_32:
1200 	case R_390_64:
1201 	case R_390_PC12DBL:
1202 	case R_390_PC16:
1203 	case R_390_PC16DBL:
1204 	case R_390_PC24DBL:
1205 	case R_390_PC32:
1206 	case R_390_PC32DBL:
1207 	case R_390_PC64:
1208 	  if (h != NULL)
1209 	    {
1210 	      /* If this reloc is in a read-only section, we might
1211 		 need a copy reloc.  We can't check reliably at this
1212 		 stage whether the section is read-only, as input
1213 		 sections have not yet been mapped to output sections.
1214 		 Tentatively set the flag for now, and correct in
1215 		 adjust_dynamic_symbol.  */
1216 	      h->non_got_ref = 1;
1217 
1218 	      if (!info->shared)
1219 		{
1220 		  /* We may need a .plt entry if the function this reloc
1221 		     refers to is in a shared lib.  */
1222 		  h->plt.refcount += 1;
1223 		}
1224 	    }
1225 
1226 	  /* If we are creating a shared library, and this is a reloc
1227 	     against a global symbol, or a non PC relative reloc
1228 	     against a local symbol, then we need to copy the reloc
1229 	     into the shared library.  However, if we are linking with
1230 	     -Bsymbolic, we do not need to copy a reloc against a
1231 	     global symbol which is defined in an object we are
1232 	     including in the link (i.e., DEF_REGULAR is set).  At
1233 	     this point we have not seen all the input files, so it is
1234 	     possible that DEF_REGULAR is not set now but will be set
1235 	     later (it is never cleared).  In case of a weak definition,
1236 	     DEF_REGULAR may be cleared later by a strong definition in
1237 	     a shared library. We account for that possibility below by
1238 	     storing information in the relocs_copied field of the hash
1239 	     table entry.  A similar situation occurs when creating
1240 	     shared libraries and symbol visibility changes render the
1241 	     symbol local.
1242 
1243 	     If on the other hand, we are creating an executable, we
1244 	     may need to keep relocations for symbols satisfied by a
1245 	     dynamic library if we manage to avoid copy relocs for the
1246 	     symbol.  */
1247 	  if ((info->shared
1248 	       && (sec->flags & SEC_ALLOC) != 0
1249 	       && ((ELF64_R_TYPE (rel->r_info) != R_390_PC16
1250 		    && ELF64_R_TYPE (rel->r_info) != R_390_PC12DBL
1251 		    && ELF64_R_TYPE (rel->r_info) != R_390_PC16DBL
1252 		    && ELF64_R_TYPE (rel->r_info) != R_390_PC24DBL
1253 		    && ELF64_R_TYPE (rel->r_info) != R_390_PC32
1254 		    && ELF64_R_TYPE (rel->r_info) != R_390_PC32DBL
1255 		    && ELF64_R_TYPE (rel->r_info) != R_390_PC64)
1256 		   || (h != NULL
1257 		       && (! SYMBOLIC_BIND (info, h)
1258 			   || h->root.type == bfd_link_hash_defweak
1259 			   || !h->def_regular))))
1260 	      || (ELIMINATE_COPY_RELOCS
1261 		  && !info->shared
1262 		  && (sec->flags & SEC_ALLOC) != 0
1263 		  && h != NULL
1264 		  && (h->root.type == bfd_link_hash_defweak
1265 		      || !h->def_regular)))
1266 	    {
1267 	      struct elf_dyn_relocs *p;
1268 	      struct elf_dyn_relocs **head;
1269 
1270 	      /* We must copy these reloc types into the output file.
1271 		 Create a reloc section in dynobj and make room for
1272 		 this reloc.  */
1273 	      if (sreloc == NULL)
1274 		{
1275 		  if (htab->elf.dynobj == NULL)
1276 		    htab->elf.dynobj = abfd;
1277 
1278 		  sreloc = _bfd_elf_make_dynamic_reloc_section
1279 		    (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
1280 
1281 		  if (sreloc == NULL)
1282 		    return FALSE;
1283 		}
1284 
1285 	      /* If this is a global symbol, we count the number of
1286 		 relocations we need for this symbol.  */
1287 	      if (h != NULL)
1288 		{
1289 		  head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
1290 		}
1291 	      else
1292 		{
1293 		  /* Track dynamic relocs needed for local syms too.
1294 		     We really need local syms available to do this
1295 		     easily.  Oh well.  */
1296 		  asection *s;
1297 		  void *vpp;
1298 
1299 		  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1300 						abfd, r_symndx);
1301 		  if (isym == NULL)
1302 		    return FALSE;
1303 
1304 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1305 		  if (s == NULL)
1306 		    s = sec;
1307 
1308 		  vpp = &elf_section_data (s)->local_dynrel;
1309 		  head = (struct elf_dyn_relocs **) vpp;
1310 		}
1311 
1312 	      p = *head;
1313 	      if (p == NULL || p->sec != sec)
1314 		{
1315 		  bfd_size_type amt = sizeof *p;
1316 		  p = ((struct elf_dyn_relocs *)
1317 		       bfd_alloc (htab->elf.dynobj, amt));
1318 		  if (p == NULL)
1319 		    return FALSE;
1320 		  p->next = *head;
1321 		  *head = p;
1322 		  p->sec = sec;
1323 		  p->count = 0;
1324 		  p->pc_count = 0;
1325 		}
1326 
1327 	      p->count += 1;
1328 	      if (ELF64_R_TYPE (rel->r_info) == R_390_PC16
1329 		  || ELF64_R_TYPE (rel->r_info) == R_390_PC12DBL
1330 		  || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1331 		  || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1332 		  || ELF64_R_TYPE (rel->r_info) == R_390_PC32
1333 		  || ELF64_R_TYPE (rel->r_info) == R_390_PC32DBL
1334 		  || ELF64_R_TYPE (rel->r_info) == R_390_PC64)
1335 		p->pc_count += 1;
1336 	    }
1337 	  break;
1338 
1339 	  /* This relocation describes the C++ object vtable hierarchy.
1340 	     Reconstruct it for later use during GC.  */
1341 	case R_390_GNU_VTINHERIT:
1342 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1343 	    return FALSE;
1344 	  break;
1345 
1346 	  /* This relocation describes which C++ vtable entries are actually
1347 	     used.  Record for later use during GC.  */
1348 	case R_390_GNU_VTENTRY:
1349 	  BFD_ASSERT (h != NULL);
1350 	  if (h != NULL
1351 	      && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1352 	    return FALSE;
1353 	  break;
1354 
1355 	default:
1356 	  break;
1357 	}
1358     }
1359 
1360   return TRUE;
1361 }
1362 
1363 /* Return the section that should be marked against GC for a given
1364    relocation.  */
1365 
1366 static asection *
elf_s390_gc_mark_hook(asection * sec,struct bfd_link_info * info,Elf_Internal_Rela * rel,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)1367 elf_s390_gc_mark_hook (asection *sec,
1368 		       struct bfd_link_info *info,
1369 		       Elf_Internal_Rela *rel,
1370 		       struct elf_link_hash_entry *h,
1371 		       Elf_Internal_Sym *sym)
1372 {
1373   if (h != NULL)
1374     switch (ELF64_R_TYPE (rel->r_info))
1375       {
1376       case R_390_GNU_VTINHERIT:
1377       case R_390_GNU_VTENTRY:
1378 	return NULL;
1379       }
1380 
1381   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1382 }
1383 
1384 /* Update the got entry reference counts for the section being removed.  */
1385 
1386 static bfd_boolean
elf_s390_gc_sweep_hook(bfd * abfd,struct bfd_link_info * info,asection * sec,const Elf_Internal_Rela * relocs)1387 elf_s390_gc_sweep_hook (bfd *abfd,
1388 			struct bfd_link_info *info,
1389 			asection *sec,
1390 			const Elf_Internal_Rela *relocs)
1391 {
1392   struct elf_s390_link_hash_table *htab;
1393   Elf_Internal_Shdr *symtab_hdr;
1394   struct elf_link_hash_entry **sym_hashes;
1395   bfd_signed_vma *local_got_refcounts;
1396   const Elf_Internal_Rela *rel, *relend;
1397 
1398   if (info->relocatable)
1399     return TRUE;
1400 
1401   htab = elf_s390_hash_table (info);
1402   if (htab == NULL)
1403     return FALSE;
1404 
1405   elf_section_data (sec)->local_dynrel = NULL;
1406 
1407   symtab_hdr = &elf_symtab_hdr (abfd);
1408   sym_hashes = elf_sym_hashes (abfd);
1409   local_got_refcounts = elf_local_got_refcounts (abfd);
1410 
1411   relend = relocs + sec->reloc_count;
1412   for (rel = relocs; rel < relend; rel++)
1413     {
1414       unsigned long r_symndx;
1415       unsigned int r_type;
1416       struct elf_link_hash_entry *h = NULL;
1417 
1418       r_symndx = ELF64_R_SYM (rel->r_info);
1419       if (r_symndx >= symtab_hdr->sh_info)
1420 	{
1421 	  struct elf_s390_link_hash_entry *eh;
1422 	  struct elf_dyn_relocs **pp;
1423 	  struct elf_dyn_relocs *p;
1424 
1425 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1426 	  while (h->root.type == bfd_link_hash_indirect
1427 		 || h->root.type == bfd_link_hash_warning)
1428 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
1429 	  eh = (struct elf_s390_link_hash_entry *) h;
1430 
1431 	  for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1432 	    if (p->sec == sec)
1433 	      {
1434 		/* Everything must go for SEC.  */
1435 		*pp = p->next;
1436 		break;
1437 	      }
1438 	}
1439       else
1440 	{
1441 	  Elf_Internal_Sym *isym;
1442 
1443 	  /* A local symbol.  */
1444 	  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1445 					abfd, r_symndx);
1446 	  if (isym == NULL)
1447 	    return FALSE;
1448 
1449 	  if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1450 	    {
1451 	      struct plt_entry *plt = elf_s390_local_plt (abfd);
1452 	      if (plt[r_symndx].plt.refcount > 0)
1453 		plt[r_symndx].plt.refcount--;
1454 	    }
1455 	}
1456 
1457       r_type = ELF64_R_TYPE (rel->r_info);
1458       r_type = elf_s390_tls_transition (info, r_type, h != NULL);
1459       switch (r_type)
1460 	{
1461 	case R_390_TLS_LDM64:
1462 	  if (htab->tls_ldm_got.refcount > 0)
1463 	    htab->tls_ldm_got.refcount -= 1;
1464 	  break;
1465 
1466 	case R_390_TLS_GD64:
1467 	case R_390_TLS_IE64:
1468 	case R_390_TLS_GOTIE12:
1469 	case R_390_TLS_GOTIE20:
1470 	case R_390_TLS_GOTIE64:
1471 	case R_390_TLS_IEENT:
1472 	case R_390_GOT12:
1473 	case R_390_GOT16:
1474 	case R_390_GOT20:
1475 	case R_390_GOT32:
1476 	case R_390_GOT64:
1477 	case R_390_GOTOFF16:
1478 	case R_390_GOTOFF32:
1479 	case R_390_GOTOFF64:
1480 	case R_390_GOTPC:
1481 	case R_390_GOTPCDBL:
1482 	case R_390_GOTENT:
1483 	  if (h != NULL)
1484 	    {
1485 	      if (h->got.refcount > 0)
1486 		h->got.refcount -= 1;
1487 	    }
1488 	  else if (local_got_refcounts != NULL)
1489 	    {
1490 	      if (local_got_refcounts[r_symndx] > 0)
1491 		local_got_refcounts[r_symndx] -= 1;
1492 	    }
1493 	  break;
1494 
1495 	case R_390_8:
1496 	case R_390_12:
1497 	case R_390_16:
1498 	case R_390_20:
1499 	case R_390_32:
1500 	case R_390_64:
1501 	case R_390_PC16:
1502 	case R_390_PC12DBL:
1503 	case R_390_PC16DBL:
1504 	case R_390_PC24DBL:
1505 	case R_390_PC32:
1506 	case R_390_PC32DBL:
1507 	case R_390_PC64:
1508 	  if (info->shared)
1509 	    break;
1510 	  /* Fall through */
1511 
1512 	case R_390_PLT12DBL:
1513 	case R_390_PLT16DBL:
1514 	case R_390_PLT24DBL:
1515 	case R_390_PLT32:
1516 	case R_390_PLT32DBL:
1517 	case R_390_PLT64:
1518 	case R_390_PLTOFF16:
1519 	case R_390_PLTOFF32:
1520 	case R_390_PLTOFF64:
1521 	  if (h != NULL)
1522 	    {
1523 	      if (h->plt.refcount > 0)
1524 		h->plt.refcount -= 1;
1525 	    }
1526 	  break;
1527 
1528 	case R_390_GOTPLT12:
1529 	case R_390_GOTPLT16:
1530 	case R_390_GOTPLT20:
1531 	case R_390_GOTPLT32:
1532 	case R_390_GOTPLT64:
1533 	case R_390_GOTPLTENT:
1534 	  if (h != NULL)
1535 	    {
1536 	      if (h->plt.refcount > 0)
1537 		{
1538 		  ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount--;
1539 		  h->plt.refcount -= 1;
1540 		}
1541 	    }
1542 	  else if (local_got_refcounts != NULL)
1543 	    {
1544 	      if (local_got_refcounts[r_symndx] > 0)
1545 		local_got_refcounts[r_symndx] -= 1;
1546 	    }
1547 	  break;
1548 
1549 	default:
1550 	  break;
1551 	}
1552     }
1553 
1554   return TRUE;
1555 }
1556 
1557 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1558    entry but we found we will not create any.  Called when we find we will
1559    not have any PLT for this symbol, by for example
1560    elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1561    or elf_s390_size_dynamic_sections if no dynamic sections will be
1562    created (we're only linking static objects).  */
1563 
1564 static void
elf_s390_adjust_gotplt(struct elf_s390_link_hash_entry * h)1565 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1566 {
1567   if (h->elf.root.type == bfd_link_hash_warning)
1568     h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1569 
1570   if (h->gotplt_refcount <= 0)
1571     return;
1572 
1573   /* We simply add the number of gotplt references to the number
1574    * of got references for this symbol.  */
1575   h->elf.got.refcount += h->gotplt_refcount;
1576   h->gotplt_refcount = -1;
1577 }
1578 
1579 /* Adjust a symbol defined by a dynamic object and referenced by a
1580    regular object.  The current definition is in some section of the
1581    dynamic object, but we're not including those sections.  We have to
1582    change the definition to something the rest of the link can
1583    understand.  */
1584 
1585 static bfd_boolean
elf_s390_adjust_dynamic_symbol(struct bfd_link_info * info,struct elf_link_hash_entry * h)1586 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1587 				struct elf_link_hash_entry *h)
1588 {
1589   struct elf_s390_link_hash_table *htab;
1590   asection *s;
1591 
1592   /* STT_GNU_IFUNC symbol must go through PLT. */
1593   if (s390_is_ifunc_symbol_p (h))
1594     return TRUE;
1595 
1596   /* If this is a function, put it in the procedure linkage table.  We
1597      will fill in the contents of the procedure linkage table later
1598      (although we could actually do it here).  */
1599   if (h->type == STT_FUNC
1600       || h->needs_plt)
1601     {
1602       if (h->plt.refcount <= 0
1603 	  || SYMBOL_CALLS_LOCAL (info, h)
1604 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1605 	      && h->root.type == bfd_link_hash_undefweak))
1606 	{
1607 	  /* This case can occur if we saw a PLT32 reloc in an input
1608 	     file, but the symbol was never referred to by a dynamic
1609 	     object, or if all references were garbage collected.  In
1610 	     such a case, we don't actually need to build a procedure
1611 	     linkage table, and we can just do a PC32 reloc instead.  */
1612 	  h->plt.offset = (bfd_vma) -1;
1613 	  h->needs_plt = 0;
1614 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1615 	}
1616 
1617       return TRUE;
1618     }
1619   else
1620     /* It's possible that we incorrectly decided a .plt reloc was
1621        needed for an R_390_PC32 reloc to a non-function sym in
1622        check_relocs.  We can't decide accurately between function and
1623        non-function syms in check-relocs;  Objects loaded later in
1624        the link may change h->type.  So fix it now.  */
1625     h->plt.offset = (bfd_vma) -1;
1626 
1627   /* If this is a weak symbol, and there is a real definition, the
1628      processor independent code will have arranged for us to see the
1629      real definition first, and we can just use the same value.  */
1630   if (h->u.weakdef != NULL)
1631     {
1632       BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1633 		  || h->u.weakdef->root.type == bfd_link_hash_defweak);
1634       h->root.u.def.section = h->u.weakdef->root.u.def.section;
1635       h->root.u.def.value = h->u.weakdef->root.u.def.value;
1636       if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1637 	h->non_got_ref = h->u.weakdef->non_got_ref;
1638       return TRUE;
1639     }
1640 
1641   /* This is a reference to a symbol defined by a dynamic object which
1642      is not a function.  */
1643 
1644   /* If we are creating a shared library, we must presume that the
1645      only references to the symbol are via the global offset table.
1646      For such cases we need not do anything here; the relocations will
1647      be handled correctly by relocate_section.  */
1648   if (info->shared)
1649     return TRUE;
1650 
1651   /* If there are no references to this symbol that do not use the
1652      GOT, we don't need to generate a copy reloc.  */
1653   if (!h->non_got_ref)
1654     return TRUE;
1655 
1656   /* If -z nocopyreloc was given, we won't generate them either.  */
1657   if (info->nocopyreloc)
1658     {
1659       h->non_got_ref = 0;
1660       return TRUE;
1661     }
1662 
1663   if (ELIMINATE_COPY_RELOCS)
1664     {
1665       struct elf_s390_link_hash_entry * eh;
1666       struct elf_dyn_relocs *p;
1667 
1668       eh = (struct elf_s390_link_hash_entry *) h;
1669       for (p = eh->dyn_relocs; p != NULL; p = p->next)
1670 	{
1671 	  s = p->sec->output_section;
1672 	  if (s != NULL && (s->flags & SEC_READONLY) != 0)
1673 	    break;
1674 	}
1675 
1676       /* If we didn't find any dynamic relocs in read-only sections, then
1677 	 we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
1678       if (p == NULL)
1679 	{
1680 	  h->non_got_ref = 0;
1681 	  return TRUE;
1682 	}
1683     }
1684 
1685   /* We must allocate the symbol in our .dynbss section, which will
1686      become part of the .bss section of the executable.  There will be
1687      an entry for this symbol in the .dynsym section.  The dynamic
1688      object will contain position independent code, so all references
1689      from the dynamic object to this symbol will go through the global
1690      offset table.  The dynamic linker will use the .dynsym entry to
1691      determine the address it must put in the global offset table, so
1692      both the dynamic object and the regular object will refer to the
1693      same memory location for the variable.  */
1694 
1695   htab = elf_s390_hash_table (info);
1696   if (htab == NULL)
1697     return FALSE;
1698 
1699   /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1700      copy the initial value out of the dynamic object and into the
1701      runtime process image.  */
1702   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1703     {
1704       htab->srelbss->size += sizeof (Elf64_External_Rela);
1705       h->needs_copy = 1;
1706     }
1707 
1708   s = htab->sdynbss;
1709 
1710   return _bfd_elf_adjust_dynamic_copy (h, s);
1711 }
1712 
1713 /* Allocate space in .plt, .got and associated reloc sections for
1714    dynamic relocs.  */
1715 
1716 static bfd_boolean
allocate_dynrelocs(struct elf_link_hash_entry * h,void * inf)1717 allocate_dynrelocs (struct elf_link_hash_entry *h,
1718 		    void * inf)
1719 {
1720   struct bfd_link_info *info;
1721   struct elf_s390_link_hash_table *htab;
1722   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
1723   struct elf_dyn_relocs *p;
1724 
1725   if (h->root.type == bfd_link_hash_indirect)
1726     return TRUE;
1727 
1728   info = (struct bfd_link_info *) inf;
1729   htab = elf_s390_hash_table (info);
1730   if (htab == NULL)
1731     return FALSE;
1732 
1733   /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1734      here if it is defined and referenced in a non-shared object.  */
1735   if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1736     return s390_elf_allocate_ifunc_dyn_relocs (info, h,
1737 					       &eh->dyn_relocs);
1738   else if (htab->elf.dynamic_sections_created
1739 	   && h->plt.refcount > 0)
1740     {
1741       /* Make sure this symbol is output as a dynamic symbol.
1742 	 Undefined weak syms won't yet be marked as dynamic.  */
1743       if (h->dynindx == -1
1744 	  && !h->forced_local)
1745 	{
1746 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1747 	    return FALSE;
1748 	}
1749 
1750       if (info->shared
1751 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1752 	{
1753 	  asection *s = htab->elf.splt;
1754 
1755 	  /* If this is the first .plt entry, make room for the special
1756 	     first entry.  */
1757 	  if (s->size == 0)
1758 	    s->size += PLT_FIRST_ENTRY_SIZE;
1759 
1760 	  h->plt.offset = s->size;
1761 
1762 	  /* If this symbol is not defined in a regular file, and we are
1763 	     not generating a shared library, then set the symbol to this
1764 	     location in the .plt.  This is required to make function
1765 	     pointers compare as equal between the normal executable and
1766 	     the shared library.  */
1767 	  if (! info->shared
1768 	      && !h->def_regular)
1769 	    {
1770 	      h->root.u.def.section = s;
1771 	      h->root.u.def.value = h->plt.offset;
1772 	    }
1773 
1774 	  /* Make room for this entry.  */
1775 	  s->size += PLT_ENTRY_SIZE;
1776 
1777 	  /* We also need to make an entry in the .got.plt section, which
1778 	     will be placed in the .got section by the linker script.  */
1779 	  htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1780 
1781 	  /* We also need to make an entry in the .rela.plt section.  */
1782 	  htab->elf.srelplt->size += sizeof (Elf64_External_Rela);
1783 	}
1784       else
1785 	{
1786 	  h->plt.offset = (bfd_vma) -1;
1787 	  h->needs_plt = 0;
1788 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1789 	}
1790     }
1791   else
1792     {
1793       h->plt.offset = (bfd_vma) -1;
1794       h->needs_plt = 0;
1795       elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1796     }
1797 
1798   /* If R_390_TLS_{IE64,GOTIE64,GOTIE12,IEENT} symbol is now local to
1799      the binary, we can optimize a bit. IE64 and GOTIE64 get converted
1800      to R_390_TLS_LE64 requiring no TLS entry. For GOTIE12 and IEENT
1801      we can save the dynamic TLS relocation.  */
1802   if (h->got.refcount > 0
1803       && !info->shared
1804       && h->dynindx == -1
1805       && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1806     {
1807       if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1808 	/* For the GOTIE access without a literal pool entry the offset has
1809 	   to be stored somewhere. The immediate value in the instruction
1810 	   is not bit enough so the value is stored in the got.  */
1811 	{
1812 	  h->got.offset = htab->elf.sgot->size;
1813 	  htab->elf.sgot->size += GOT_ENTRY_SIZE;
1814 	}
1815       else
1816 	h->got.offset = (bfd_vma) -1;
1817     }
1818   else if (h->got.refcount > 0)
1819     {
1820       asection *s;
1821       bfd_boolean dyn;
1822       int tls_type = elf_s390_hash_entry(h)->tls_type;
1823 
1824       /* Make sure this symbol is output as a dynamic symbol.
1825 	 Undefined weak syms won't yet be marked as dynamic.  */
1826       if (h->dynindx == -1
1827 	  && !h->forced_local)
1828 	{
1829 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1830 	    return FALSE;
1831 	}
1832 
1833       s = htab->elf.sgot;
1834       h->got.offset = s->size;
1835       s->size += GOT_ENTRY_SIZE;
1836       /* R_390_TLS_GD64 needs 2 consecutive GOT slots.  */
1837       if (tls_type == GOT_TLS_GD)
1838 	s->size += GOT_ENTRY_SIZE;
1839       dyn = htab->elf.dynamic_sections_created;
1840       /* R_390_TLS_IE64 needs one dynamic relocation,
1841 	 R_390_TLS_GD64 needs one if local symbol and two if global.  */
1842       if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1843 	  || tls_type >= GOT_TLS_IE)
1844 	htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1845       else if (tls_type == GOT_TLS_GD)
1846 	htab->elf.srelgot->size += 2 * sizeof (Elf64_External_Rela);
1847       else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1848 		|| h->root.type != bfd_link_hash_undefweak)
1849 	       && (info->shared
1850 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1851 	htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
1852     }
1853   else
1854     h->got.offset = (bfd_vma) -1;
1855 
1856   if (eh->dyn_relocs == NULL)
1857     return TRUE;
1858 
1859   /* In the shared -Bsymbolic case, discard space allocated for
1860      dynamic pc-relative relocs against symbols which turn out to be
1861      defined in regular objects.  For the normal shared case, discard
1862      space for pc-relative relocs that have become local due to symbol
1863      visibility changes.  */
1864 
1865   if (info->shared)
1866     {
1867       if (SYMBOL_CALLS_LOCAL (info, h))
1868 	{
1869 	  struct elf_dyn_relocs **pp;
1870 
1871 	  for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1872 	    {
1873 	      p->count -= p->pc_count;
1874 	      p->pc_count = 0;
1875 	      if (p->count == 0)
1876 		*pp = p->next;
1877 	      else
1878 		pp = &p->next;
1879 	    }
1880 	}
1881 
1882       /* Also discard relocs on undefined weak syms with non-default
1883 	 visibility.  */
1884       if (eh->dyn_relocs != NULL
1885 	  && h->root.type == bfd_link_hash_undefweak)
1886 	{
1887 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1888 	    eh->dyn_relocs = NULL;
1889 
1890 	  /* Make sure undefined weak symbols are output as a dynamic
1891 	     symbol in PIEs.  */
1892 	  else if (h->dynindx == -1
1893 		   && !h->forced_local)
1894 	    {
1895 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1896 		return FALSE;
1897 	    }
1898 	}
1899     }
1900   else if (ELIMINATE_COPY_RELOCS)
1901     {
1902       /* For the non-shared case, discard space for relocs against
1903 	 symbols which turn out to need copy relocs or are not
1904 	 dynamic.  */
1905 
1906       if (!h->non_got_ref
1907 	  && ((h->def_dynamic
1908 	       && !h->def_regular)
1909 	      || (htab->elf.dynamic_sections_created
1910 		  && (h->root.type == bfd_link_hash_undefweak
1911 		      || h->root.type == bfd_link_hash_undefined))))
1912 	{
1913 	  /* Make sure this symbol is output as a dynamic symbol.
1914 	     Undefined weak syms won't yet be marked as dynamic.  */
1915 	  if (h->dynindx == -1
1916 	      && !h->forced_local)
1917 	    {
1918 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1919 		return FALSE;
1920 	    }
1921 
1922 	  /* If that succeeded, we know we'll be keeping all the
1923 	     relocs.  */
1924 	  if (h->dynindx != -1)
1925 	    goto keep;
1926 	}
1927 
1928       eh->dyn_relocs = NULL;
1929 
1930     keep: ;
1931     }
1932 
1933   /* Finally, allocate space.  */
1934   for (p = eh->dyn_relocs; p != NULL; p = p->next)
1935     {
1936       asection *sreloc = elf_section_data (p->sec)->sreloc;
1937       sreloc->size += p->count * sizeof (Elf64_External_Rela);
1938     }
1939 
1940   return TRUE;
1941 }
1942 
1943 /* Find any dynamic relocs that apply to read-only sections.  */
1944 
1945 static bfd_boolean
readonly_dynrelocs(struct elf_link_hash_entry * h,void * inf)1946 readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1947 {
1948   struct elf_s390_link_hash_entry *eh;
1949   struct elf_dyn_relocs *p;
1950 
1951   eh = (struct elf_s390_link_hash_entry *) h;
1952   for (p = eh->dyn_relocs; p != NULL; p = p->next)
1953     {
1954       asection *s = p->sec->output_section;
1955 
1956       if (s != NULL && (s->flags & SEC_READONLY) != 0)
1957 	{
1958 	  struct bfd_link_info *info = (struct bfd_link_info *) inf;
1959 
1960 	  info->flags |= DF_TEXTREL;
1961 
1962 	  /* Not an error, just cut short the traversal.  */
1963 	  return FALSE;
1964 	}
1965     }
1966   return TRUE;
1967 }
1968 
1969 /* Set the sizes of the dynamic sections.  */
1970 
1971 static bfd_boolean
elf_s390_size_dynamic_sections(bfd * output_bfd ATTRIBUTE_UNUSED,struct bfd_link_info * info)1972 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1973 				struct bfd_link_info *info)
1974 {
1975   struct elf_s390_link_hash_table *htab;
1976   bfd *dynobj;
1977   asection *s;
1978   bfd_boolean relocs;
1979   bfd *ibfd;
1980 
1981   htab = elf_s390_hash_table (info);
1982   if (htab == NULL)
1983     return FALSE;
1984 
1985   dynobj = htab->elf.dynobj;
1986   if (dynobj == NULL)
1987     abort ();
1988 
1989   if (htab->elf.dynamic_sections_created)
1990     {
1991       /* Set the contents of the .interp section to the interpreter.  */
1992       if (info->executable)
1993 	{
1994 	  s = bfd_get_linker_section (dynobj, ".interp");
1995 	  if (s == NULL)
1996 	    abort ();
1997 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1998 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1999 	}
2000     }
2001 
2002   /* Set up .got offsets for local syms, and space for local dynamic
2003      relocs.  */
2004   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2005     {
2006       bfd_signed_vma *local_got;
2007       bfd_signed_vma *end_local_got;
2008       char *local_tls_type;
2009       bfd_size_type locsymcount;
2010       Elf_Internal_Shdr *symtab_hdr;
2011       asection *srela;
2012       struct plt_entry *local_plt;
2013       unsigned int i;
2014 
2015       if (! is_s390_elf (ibfd))
2016 	continue;
2017 
2018       for (s = ibfd->sections; s != NULL; s = s->next)
2019 	{
2020 	  struct elf_dyn_relocs *p;
2021 
2022 	  for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
2023 	    {
2024 	      if (!bfd_is_abs_section (p->sec)
2025 		  && bfd_is_abs_section (p->sec->output_section))
2026 		{
2027 		  /* Input section has been discarded, either because
2028 		     it is a copy of a linkonce section or due to
2029 		     linker script /DISCARD/, so we'll be discarding
2030 		     the relocs too.  */
2031 		}
2032 	      else if (p->count != 0)
2033 		{
2034 		  srela = elf_section_data (p->sec)->sreloc;
2035 		  srela->size += p->count * sizeof (Elf64_External_Rela);
2036 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2037 		    info->flags |= DF_TEXTREL;
2038 		}
2039 	    }
2040 	}
2041 
2042       local_got = elf_local_got_refcounts (ibfd);
2043       if (!local_got)
2044 	continue;
2045 
2046       symtab_hdr = &elf_symtab_hdr (ibfd);
2047       locsymcount = symtab_hdr->sh_info;
2048       end_local_got = local_got + locsymcount;
2049       local_tls_type = elf_s390_local_got_tls_type (ibfd);
2050       s = htab->elf.sgot;
2051       srela = htab->elf.srelgot;
2052       for (; local_got < end_local_got; ++local_got, ++local_tls_type)
2053 	{
2054 	  if (*local_got > 0)
2055 	    {
2056 	      *local_got = s->size;
2057 	      s->size += GOT_ENTRY_SIZE;
2058 	      if (*local_tls_type == GOT_TLS_GD)
2059 		s->size += GOT_ENTRY_SIZE;
2060 	      if (info->shared)
2061 		srela->size += sizeof (Elf64_External_Rela);
2062 	    }
2063 	  else
2064 	    *local_got = (bfd_vma) -1;
2065 	}
2066 
2067       local_plt = elf_s390_local_plt (ibfd);
2068       for (i = 0; i < symtab_hdr->sh_info; i++)
2069 	{
2070 	  if (local_plt[i].plt.refcount > 0)
2071 	    {
2072 	      local_plt[i].plt.offset = htab->elf.iplt->size;
2073 	      htab->elf.iplt->size += PLT_ENTRY_SIZE;
2074 	      htab->elf.igotplt->size += GOT_ENTRY_SIZE;
2075 	      htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
2076 	    }
2077 	  else
2078 	    local_plt[i].plt.offset = (bfd_vma) -1;
2079 	}
2080     }
2081 
2082   if (htab->tls_ldm_got.refcount > 0)
2083     {
2084       /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM64
2085 	 relocs.  */
2086       htab->tls_ldm_got.offset = htab->elf.sgot->size;
2087       htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
2088       htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
2089     }
2090   else
2091     htab->tls_ldm_got.offset = -1;
2092 
2093   /* Allocate global sym .plt and .got entries, and space for global
2094      sym dynamic relocs.  */
2095   elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
2096 
2097   /* We now have determined the sizes of the various dynamic sections.
2098      Allocate memory for them.  */
2099   relocs = FALSE;
2100   for (s = dynobj->sections; s != NULL; s = s->next)
2101     {
2102       if ((s->flags & SEC_LINKER_CREATED) == 0)
2103 	continue;
2104 
2105       if (s == htab->elf.splt
2106 	  || s == htab->elf.sgot
2107 	  || s == htab->elf.sgotplt
2108 	  || s == htab->sdynbss
2109 	  || s == htab->elf.iplt
2110 	  || s == htab->elf.igotplt
2111 	  || s == htab->irelifunc)
2112 	{
2113 	  /* Strip this section if we don't need it; see the
2114 	     comment below.  */
2115 	}
2116       else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2117 	{
2118 	  if (s->size != 0 && s != htab->elf.srelplt)
2119 	    relocs = TRUE;
2120 
2121 	  /* We use the reloc_count field as a counter if we need
2122 	     to copy relocs into the output file.  */
2123 	  s->reloc_count = 0;
2124 	}
2125       else
2126 	{
2127 	  /* It's not one of our sections, so don't allocate space.  */
2128 	  continue;
2129 	}
2130 
2131       if (s->size == 0)
2132 	{
2133 	  /* If we don't need this section, strip it from the
2134 	     output file.  This is to handle .rela.bss and
2135 	     .rela.plt.  We must create it in
2136 	     create_dynamic_sections, because it must be created
2137 	     before the linker maps input sections to output
2138 	     sections.  The linker does that before
2139 	     adjust_dynamic_symbol is called, and it is that
2140 	     function which decides whether anything needs to go
2141 	     into these sections.  */
2142 
2143 	  s->flags |= SEC_EXCLUDE;
2144 	  continue;
2145 	}
2146 
2147       if ((s->flags & SEC_HAS_CONTENTS) == 0)
2148 	continue;
2149 
2150       /* Allocate memory for the section contents.  We use bfd_zalloc
2151 	 here in case unused entries are not reclaimed before the
2152 	 section's contents are written out.  This should not happen,
2153 	 but this way if it does, we get a R_390_NONE reloc instead
2154 	 of garbage.  */
2155       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2156       if (s->contents == NULL)
2157 	return FALSE;
2158     }
2159 
2160   if (htab->elf.dynamic_sections_created)
2161     {
2162       /* Add some entries to the .dynamic section.  We fill in the
2163 	 values later, in elf_s390_finish_dynamic_sections, but we
2164 	 must add the entries now so that we get the correct size for
2165 	 the .dynamic section.  The DT_DEBUG entry is filled in by the
2166 	 dynamic linker and used by the debugger.  */
2167 #define add_dynamic_entry(TAG, VAL) \
2168   _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2169 
2170       if (info->executable)
2171 	{
2172 	  if (!add_dynamic_entry (DT_DEBUG, 0))
2173 	    return FALSE;
2174 	}
2175 
2176       if (htab->elf.splt->size != 0)
2177 	{
2178 	  if (!add_dynamic_entry (DT_PLTGOT, 0)
2179 	      || !add_dynamic_entry (DT_PLTRELSZ, 0)
2180 	      || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2181 	      || !add_dynamic_entry (DT_JMPREL, 0))
2182 	    return FALSE;
2183 	}
2184 
2185       if (relocs)
2186 	{
2187 	  if (!add_dynamic_entry (DT_RELA, 0)
2188 	      || !add_dynamic_entry (DT_RELASZ, 0)
2189 	      || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
2190 	    return FALSE;
2191 
2192 	  /* If any dynamic relocs apply to a read-only section,
2193 	     then we need a DT_TEXTREL entry.  */
2194 	  if ((info->flags & DF_TEXTREL) == 0)
2195 	    elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2196 				    info);
2197 
2198 	  if ((info->flags & DF_TEXTREL) != 0)
2199 	    {
2200 	      if (!add_dynamic_entry (DT_TEXTREL, 0))
2201 		return FALSE;
2202 	    }
2203 	}
2204     }
2205 #undef add_dynamic_entry
2206 
2207   return TRUE;
2208 }
2209 
2210 /* Return the base VMA address which should be subtracted from real addresses
2211    when resolving @dtpoff relocation.
2212    This is PT_TLS segment p_vaddr.  */
2213 
2214 static bfd_vma
dtpoff_base(struct bfd_link_info * info)2215 dtpoff_base (struct bfd_link_info *info)
2216 {
2217   /* If tls_sec is NULL, we should have signalled an error already.  */
2218   if (elf_hash_table (info)->tls_sec == NULL)
2219     return 0;
2220   return elf_hash_table (info)->tls_sec->vma;
2221 }
2222 
2223 /* Return the relocation value for @tpoff relocation
2224    if STT_TLS virtual address is ADDRESS.  */
2225 
2226 static bfd_vma
tpoff(struct bfd_link_info * info,bfd_vma address)2227 tpoff (struct bfd_link_info *info, bfd_vma address)
2228 {
2229   struct elf_link_hash_table *htab = elf_hash_table (info);
2230 
2231   /* If tls_sec is NULL, we should have signalled an error already.  */
2232   if (htab->tls_sec == NULL)
2233     return 0;
2234   return htab->tls_size + htab->tls_sec->vma - address;
2235 }
2236 
2237 /* Complain if TLS instruction relocation is against an invalid
2238    instruction.  */
2239 
2240 static void
invalid_tls_insn(bfd * input_bfd,asection * input_section,Elf_Internal_Rela * rel)2241 invalid_tls_insn (bfd *input_bfd,
2242 		  asection *input_section,
2243 		  Elf_Internal_Rela *rel)
2244 {
2245   reloc_howto_type *howto;
2246 
2247   howto = elf_howto_table + ELF64_R_TYPE (rel->r_info);
2248   (*_bfd_error_handler)
2249     (_("%B(%A+0x%lx): invalid instruction for TLS relocation %s"),
2250      input_bfd,
2251      input_section,
2252      (long) rel->r_offset,
2253      howto->name);
2254   bfd_set_error (bfd_error_bad_value);
2255 }
2256 
2257 /* Relocate a 390 ELF section.  */
2258 
2259 static bfd_boolean
elf_s390_relocate_section(bfd * output_bfd,struct bfd_link_info * info,bfd * input_bfd,asection * input_section,bfd_byte * contents,Elf_Internal_Rela * relocs,Elf_Internal_Sym * local_syms,asection ** local_sections)2260 elf_s390_relocate_section (bfd *output_bfd,
2261 			   struct bfd_link_info *info,
2262 			   bfd *input_bfd,
2263 			   asection *input_section,
2264 			   bfd_byte *contents,
2265 			   Elf_Internal_Rela *relocs,
2266 			   Elf_Internal_Sym *local_syms,
2267 			   asection **local_sections)
2268 {
2269   struct elf_s390_link_hash_table *htab;
2270   Elf_Internal_Shdr *symtab_hdr;
2271   struct elf_link_hash_entry **sym_hashes;
2272   bfd_vma *local_got_offsets;
2273   Elf_Internal_Rela *rel;
2274   Elf_Internal_Rela *relend;
2275 
2276   BFD_ASSERT (is_s390_elf (input_bfd));
2277 
2278   htab = elf_s390_hash_table (info);
2279   if (htab == NULL)
2280     return FALSE;
2281 
2282   symtab_hdr = &elf_symtab_hdr (input_bfd);
2283   sym_hashes = elf_sym_hashes (input_bfd);
2284   local_got_offsets = elf_local_got_offsets (input_bfd);
2285 
2286   rel = relocs;
2287   relend = relocs + input_section->reloc_count;
2288   for (; rel < relend; rel++)
2289     {
2290       unsigned int r_type;
2291       reloc_howto_type *howto;
2292       unsigned long r_symndx;
2293       struct elf_link_hash_entry *h;
2294       Elf_Internal_Sym *sym;
2295       asection *sec;
2296       bfd_vma off;
2297       bfd_vma relocation;
2298       bfd_boolean unresolved_reloc;
2299       bfd_reloc_status_type r;
2300       int tls_type;
2301       asection *base_got = htab->elf.sgot;
2302 
2303       r_type = ELF64_R_TYPE (rel->r_info);
2304       if (r_type == (int) R_390_GNU_VTINHERIT
2305 	  || r_type == (int) R_390_GNU_VTENTRY)
2306 	continue;
2307       if (r_type >= (int) R_390_max)
2308 	{
2309 	  bfd_set_error (bfd_error_bad_value);
2310 	  return FALSE;
2311 	}
2312 
2313       howto = elf_howto_table + r_type;
2314       r_symndx = ELF64_R_SYM (rel->r_info);
2315 
2316       h = NULL;
2317       sym = NULL;
2318       sec = NULL;
2319       unresolved_reloc = FALSE;
2320       if (r_symndx < symtab_hdr->sh_info)
2321 	{
2322 	  sym = local_syms + r_symndx;
2323 	  sec = local_sections[r_symndx];
2324 
2325 	  if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2326 	    {
2327 	      struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2328 	      if (local_plt == NULL)
2329 		return FALSE;
2330 
2331 	      /* Address of the PLT slot.  */
2332 	      relocation = (htab->elf.iplt->output_section->vma
2333 			    + htab->elf.iplt->output_offset
2334 			    + local_plt[r_symndx].plt.offset);
2335 
2336 	      switch (r_type)
2337 		{
2338 		case R_390_PLTOFF16:
2339 		case R_390_PLTOFF32:
2340 		case R_390_PLTOFF64:
2341 		  relocation -= htab->elf.sgot->output_section->vma;
2342 		  break;
2343 		case R_390_GOTPLT12:
2344 		case R_390_GOTPLT16:
2345 		case R_390_GOTPLT20:
2346 		case R_390_GOTPLT32:
2347 		case R_390_GOTPLT64:
2348 		case R_390_GOTPLTENT:
2349 		case R_390_GOT12:
2350 		case R_390_GOT16:
2351 		case R_390_GOT20:
2352 		case R_390_GOT32:
2353 		case R_390_GOT64:
2354 		case R_390_GOTENT:
2355 		  {
2356 		    /* Write the PLT slot address into the GOT slot.  */
2357 		    bfd_put_64 (output_bfd, relocation,
2358 				htab->elf.sgot->contents +
2359 				local_got_offsets[r_symndx]);
2360 		    relocation = (local_got_offsets[r_symndx] +
2361 				  htab->elf.sgot->output_offset);
2362 
2363 		    if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2364 		      relocation += htab->elf.sgot->output_section->vma;
2365 		    break;
2366 		  }
2367 		default:
2368 		  break;
2369 		}
2370 	      /* The output section is needed later in
2371 		 finish_dynamic_section when creating the dynamic
2372 		 relocation.  */
2373 	      local_plt[r_symndx].sec = sec;
2374 	      goto do_relocation;
2375 	    }
2376 	  else
2377 	    relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2378 	}
2379       else
2380 	{
2381 	  bfd_boolean warned ATTRIBUTE_UNUSED;
2382 	  bfd_boolean ignored ATTRIBUTE_UNUSED;
2383 
2384 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2385 				   r_symndx, symtab_hdr, sym_hashes,
2386 				   h, sec, relocation,
2387 				   unresolved_reloc, warned, ignored);
2388 	}
2389 
2390       if (sec != NULL && discarded_section (sec))
2391 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2392 					 rel, 1, relend, howto, 0, contents);
2393 
2394       if (info->relocatable)
2395 	continue;
2396 
2397       switch (r_type)
2398 	{
2399 	case R_390_GOTPLT12:
2400 	case R_390_GOTPLT16:
2401 	case R_390_GOTPLT20:
2402 	case R_390_GOTPLT32:
2403 	case R_390_GOTPLT64:
2404 	case R_390_GOTPLTENT:
2405 	  /* There are three cases for a GOTPLT relocation. 1) The
2406 	     relocation is against the jump slot entry of a plt that
2407 	     will get emitted to the output file. 2) The relocation
2408 	     is against the jump slot of a plt entry that has been
2409 	     removed. elf_s390_adjust_gotplt has created a GOT entry
2410 	     as replacement. 3) The relocation is against a local symbol.
2411 	     Cases 2) and 3) are the same as the GOT relocation code
2412 	     so we just have to test for case 1 and fall through for
2413 	     the other two.  */
2414 	  if (h != NULL && h->plt.offset != (bfd_vma) -1)
2415 	    {
2416 	      bfd_vma plt_index;
2417 
2418 	      if (s390_is_ifunc_symbol_p (h))
2419 		{
2420 		  plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2421 		  relocation = (plt_index * GOT_ENTRY_SIZE +
2422 				htab->elf.igotplt->output_offset);
2423 		  if (r_type == R_390_GOTPLTENT)
2424 		    relocation += htab->elf.igotplt->output_section->vma;
2425 		}
2426 	      else
2427 		{
2428 		  /* Calc. index no.
2429 		     Current offset - size first entry / entry size.  */
2430 		  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2431 		    PLT_ENTRY_SIZE;
2432 
2433 		  /* Offset in GOT is PLT index plus GOT headers(3)
2434 		     times 4, addr & GOT addr.  */
2435 		  relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2436 		  if (r_type == R_390_GOTPLTENT)
2437 		    relocation += htab->elf.sgot->output_section->vma;
2438 		}
2439 	      unresolved_reloc = FALSE;
2440 	      break;
2441 	    }
2442 	  /* Fall through.  */
2443 
2444 	case R_390_GOT12:
2445 	case R_390_GOT16:
2446 	case R_390_GOT20:
2447 	case R_390_GOT32:
2448 	case R_390_GOT64:
2449 	case R_390_GOTENT:
2450 	  /* Relocation is to the entry for this symbol in the global
2451 	     offset table.  */
2452 	  if (base_got == NULL)
2453 	    abort ();
2454 
2455 	  if (h != NULL)
2456 	    {
2457 	      bfd_boolean dyn;
2458 
2459 	      off = h->got.offset;
2460 	      dyn = htab->elf.dynamic_sections_created;
2461 
2462 	      if (s390_is_ifunc_symbol_p (h))
2463 		{
2464 		  BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2465 		  if (off == (bfd_vma)-1)
2466 		    {
2467 		      /* No explicit GOT usage so redirect to the
2468 			 got.iplt slot.  */
2469 		      base_got = htab->elf.igotplt;
2470 		      off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2471 		    }
2472 		  else
2473 		    {
2474 		      /* Explicit GOT slots must contain the address
2475 			 of the PLT slot. This will be handled in
2476 			 finish_dynamic_symbol.  */
2477 		    }
2478 		}
2479 	      else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
2480 		       || (info->shared
2481 			   && SYMBOL_REFERENCES_LOCAL (info, h))
2482 		       || (ELF_ST_VISIBILITY (h->other)
2483 			   && h->root.type == bfd_link_hash_undefweak))
2484 		{
2485 		  /* This is actually a static link, or it is a
2486 		     -Bsymbolic link and the symbol is defined
2487 		     locally, or the symbol was forced to be local
2488 		     because of a version file.  We must initialize
2489 		     this entry in the global offset table.  Since the
2490 		     offset must always be a multiple of 2, we use the
2491 		     least significant bit to record whether we have
2492 		     initialized it already.
2493 
2494 		     When doing a dynamic link, we create a .rel.got
2495 		     relocation entry to initialize the value.  This
2496 		     is done in the finish_dynamic_symbol routine.  */
2497 		  if ((off & 1) != 0)
2498 		    off &= ~1;
2499 		  else
2500 		    {
2501 		      bfd_put_64 (output_bfd, relocation,
2502 				  base_got->contents + off);
2503 		      h->got.offset |= 1;
2504 		    }
2505 
2506 		  if ((h->def_regular
2507 		       && info->shared
2508 		       && SYMBOL_REFERENCES_LOCAL (info, h))
2509 		      /* lgrl rx,sym@GOTENT -> larl rx, sym */
2510 		      && ((r_type == R_390_GOTENT
2511 			   && (bfd_get_16 (input_bfd,
2512 					   contents + rel->r_offset - 2)
2513 			       & 0xff0f) == 0xc408)
2514 			  /* lg rx, sym@GOT(r12) -> larl rx, sym */
2515 			  || (r_type == R_390_GOT20
2516 			      && (bfd_get_32 (input_bfd,
2517 					      contents + rel->r_offset - 2)
2518 				  & 0xff00f000) == 0xe300c000
2519 			      && bfd_get_8 (input_bfd,
2520 					    contents + rel->r_offset + 3) == 0x04)))
2521 
2522 		    {
2523 		      unsigned short new_insn =
2524 			(0xc000 | (bfd_get_8 (input_bfd,
2525 					      contents + rel->r_offset - 1) & 0xf0));
2526 		      bfd_put_16 (output_bfd, new_insn,
2527 				  contents + rel->r_offset - 2);
2528 		      r_type = R_390_PC32DBL;
2529 		      rel->r_addend = 2;
2530 		      howto = elf_howto_table + r_type;
2531 		      relocation = h->root.u.def.value
2532 			+ h->root.u.def.section->output_section->vma
2533 			+ h->root.u.def.section->output_offset;
2534 		      goto do_relocation;
2535 		    }
2536 		}
2537 	      else
2538 		unresolved_reloc = FALSE;
2539 	    }
2540 	  else
2541 	    {
2542 	      if (local_got_offsets == NULL)
2543 		abort ();
2544 
2545 	      off = local_got_offsets[r_symndx];
2546 
2547 	      /* The offset must always be a multiple of 8.  We use
2548 		 the least significant bit to record whether we have
2549 		 already generated the necessary reloc.  */
2550 	      if ((off & 1) != 0)
2551 		off &= ~1;
2552 	      else
2553 		{
2554 		  bfd_put_64 (output_bfd, relocation,
2555 			      htab->elf.sgot->contents + off);
2556 
2557 		  if (info->shared)
2558 		    {
2559 		      asection *s;
2560 		      Elf_Internal_Rela outrel;
2561 		      bfd_byte *loc;
2562 
2563 		      s = htab->elf.srelgot;
2564 		      if (s == NULL)
2565 			abort ();
2566 
2567 		      outrel.r_offset = (htab->elf.sgot->output_section->vma
2568 					 + htab->elf.sgot->output_offset
2569 					 + off);
2570 		      outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2571 		      outrel.r_addend = relocation;
2572 		      loc = s->contents;
2573 		      loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2574 		      bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2575 		    }
2576 
2577 		  local_got_offsets[r_symndx] |= 1;
2578 		}
2579 	    }
2580 
2581 	  if (off >= (bfd_vma) -2)
2582 	    abort ();
2583 
2584 	  relocation = base_got->output_offset + off;
2585 
2586 	  /* For @GOTENT the relocation is against the offset between
2587 	     the instruction and the symbols entry in the GOT and not
2588 	     between the start of the GOT and the symbols entry. We
2589 	     add the vma of the GOT to get the correct value.  */
2590 	  if (   r_type == R_390_GOTENT
2591 	      || r_type == R_390_GOTPLTENT)
2592 	    relocation += base_got->output_section->vma;
2593 
2594 	  break;
2595 
2596 	case R_390_GOTOFF16:
2597 	case R_390_GOTOFF32:
2598 	case R_390_GOTOFF64:
2599 	  /* Relocation is relative to the start of the global offset
2600 	     table.  */
2601 
2602 	  /* Note that sgot->output_offset is not involved in this
2603 	     calculation.  We always want the start of .got.  If we
2604 	     defined _GLOBAL_OFFSET_TABLE in a different way, as is
2605 	     permitted by the ABI, we might have to change this
2606 	     calculation.  */
2607 	  relocation -= htab->elf.sgot->output_section->vma;
2608 	  break;
2609 
2610 	case R_390_GOTPC:
2611 	case R_390_GOTPCDBL:
2612 	  /* Use global offset table as symbol value.  */
2613 	  relocation = htab->elf.sgot->output_section->vma;
2614 	  unresolved_reloc = FALSE;
2615 	  break;
2616 
2617 	case R_390_PLT12DBL:
2618 	case R_390_PLT16DBL:
2619 	case R_390_PLT24DBL:
2620 	case R_390_PLT32:
2621 	case R_390_PLT32DBL:
2622 	case R_390_PLT64:
2623 	  /* Relocation is to the entry for this symbol in the
2624 	     procedure linkage table.  */
2625 
2626 	  /* Resolve a PLT32 reloc against a local symbol directly,
2627 	     without using the procedure linkage table.  */
2628 	  if (h == NULL)
2629 	    break;
2630 
2631 	  if (h->plt.offset == (bfd_vma) -1
2632 	      || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2633 	    {
2634 	      /* We didn't make a PLT entry for this symbol.  This
2635 		 happens when statically linking PIC code, or when
2636 		 using -Bsymbolic.  */
2637 	      break;
2638 	    }
2639 	  if (s390_is_ifunc_symbol_p (h))
2640 	    relocation = (htab->elf.iplt->output_section->vma
2641 			  + htab->elf.iplt->output_offset
2642 			  + h->plt.offset);
2643 	  else
2644 	    relocation = (htab->elf.splt->output_section->vma
2645 			  + htab->elf.splt->output_offset
2646 			  + h->plt.offset);
2647 	  unresolved_reloc = FALSE;
2648 	  break;
2649 
2650 	case R_390_PLTOFF16:
2651 	case R_390_PLTOFF32:
2652 	case R_390_PLTOFF64:
2653 	  /* Relocation is to the entry for this symbol in the
2654 	     procedure linkage table relative to the start of the GOT.  */
2655 
2656 	  /* For local symbols or if we didn't make a PLT entry for
2657 	     this symbol resolve the symbol directly.  */
2658 	  if (h == NULL
2659 	      || h->plt.offset == (bfd_vma) -1
2660 	      || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2661 	    {
2662 	      relocation -= htab->elf.sgot->output_section->vma;
2663 	      break;
2664 	    }
2665 
2666 	  if (s390_is_ifunc_symbol_p (h))
2667 	    relocation = (htab->elf.iplt->output_section->vma
2668 			  + htab->elf.iplt->output_offset
2669 			  + h->plt.offset
2670 			  - htab->elf.sgot->output_section->vma);
2671 	  else
2672 	    relocation = (htab->elf.splt->output_section->vma
2673 			  + htab->elf.splt->output_offset
2674 			  + h->plt.offset
2675 			  - htab->elf.sgot->output_section->vma);
2676 	  unresolved_reloc = FALSE;
2677 	  break;
2678 
2679 	case R_390_8:
2680 	case R_390_16:
2681 	case R_390_32:
2682 	case R_390_64:
2683 	case R_390_PC16:
2684 	case R_390_PC12DBL:
2685 	case R_390_PC16DBL:
2686 	case R_390_PC24DBL:
2687 	case R_390_PC32:
2688 	case R_390_PC32DBL:
2689 	case R_390_PC64:
2690 
2691 	  if (h != NULL
2692 	      && s390_is_ifunc_symbol_p (h)
2693 	      && h->def_regular)
2694 	    {
2695 	      if (!info->shared || !h->non_got_ref)
2696 		{
2697 		  /* For a non-shared object STT_GNU_IFUNC symbol must
2698 		     go through PLT.  */
2699 		  relocation = (htab->elf.iplt->output_section->vma
2700 				+ htab->elf.iplt->output_offset
2701 				+ h ->plt.offset);
2702 		  goto do_relocation;
2703 		}
2704 	      else
2705 		{
2706 		  /* For shared objects a runtime relocation is needed.  */
2707 
2708 		  Elf_Internal_Rela outrel;
2709 		  asection *sreloc;
2710 
2711 		  /* Need a dynamic relocation to get the real function
2712 		     address.  */
2713 		  outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2714 							     info,
2715 							     input_section,
2716 							     rel->r_offset);
2717 		  if (outrel.r_offset == (bfd_vma) -1
2718 		      || outrel.r_offset == (bfd_vma) -2)
2719 		    abort ();
2720 
2721 		  outrel.r_offset += (input_section->output_section->vma
2722 				      + input_section->output_offset);
2723 
2724 		  if (h->dynindx == -1
2725 		      || h->forced_local
2726 		      || info->executable)
2727 		    {
2728 		      /* This symbol is resolved locally.  */
2729 		      outrel.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
2730 		      outrel.r_addend = (h->root.u.def.value
2731 					 + h->root.u.def.section->output_section->vma
2732 					 + h->root.u.def.section->output_offset);
2733 		    }
2734 		  else
2735 		    {
2736 		      outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2737 		      outrel.r_addend = 0;
2738 		    }
2739 
2740 		  sreloc = htab->elf.irelifunc;
2741 		  elf_append_rela (output_bfd, sreloc, &outrel);
2742 
2743 		  /* If this reloc is against an external symbol, we
2744 		     do not want to fiddle with the addend.  Otherwise,
2745 		     we need to include the symbol value so that it
2746 		     becomes an addend for the dynamic reloc.  For an
2747 		     internal symbol, we have updated addend.  */
2748 		  continue;
2749 		}
2750 	    }
2751 
2752 	  if ((input_section->flags & SEC_ALLOC) == 0)
2753 	    break;
2754 
2755 	  if ((info->shared
2756 	       && (h == NULL
2757 		   || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2758 		   || h->root.type != bfd_link_hash_undefweak)
2759 	       && ((r_type != R_390_PC16
2760 		    && r_type != R_390_PC12DBL
2761 		    && r_type != R_390_PC16DBL
2762 		    && r_type != R_390_PC24DBL
2763 		    && r_type != R_390_PC32
2764 		    && r_type != R_390_PC32DBL
2765 		    && r_type != R_390_PC64)
2766 		   || !SYMBOL_CALLS_LOCAL (info, h)))
2767 	      || (ELIMINATE_COPY_RELOCS
2768 		  && !info->shared
2769 		  && h != NULL
2770 		  && h->dynindx != -1
2771 		  && !h->non_got_ref
2772 		  && ((h->def_dynamic
2773 		       && !h->def_regular)
2774 		      || h->root.type == bfd_link_hash_undefweak
2775 		      || h->root.type == bfd_link_hash_undefined)))
2776 	    {
2777 	      Elf_Internal_Rela outrel;
2778 	      bfd_boolean skip, relocate;
2779 	      asection *sreloc;
2780 	      bfd_byte *loc;
2781 
2782 	      /* When generating a shared object, these relocations
2783 		 are copied into the output file to be resolved at run
2784 		 time.  */
2785 	      skip = FALSE;
2786 	      relocate = FALSE;
2787 
2788 	      outrel.r_offset =
2789 		_bfd_elf_section_offset (output_bfd, info, input_section,
2790 					 rel->r_offset);
2791 	      if (outrel.r_offset == (bfd_vma) -1)
2792 		skip = TRUE;
2793 	      else if (outrel.r_offset == (bfd_vma) -2)
2794 		skip = TRUE, relocate = TRUE;
2795 
2796 	      outrel.r_offset += (input_section->output_section->vma
2797 				  + input_section->output_offset);
2798 
2799 	      if (skip)
2800 		memset (&outrel, 0, sizeof outrel);
2801 	      else if (h != NULL
2802 		       && h->dynindx != -1
2803 		       && (r_type == R_390_PC16
2804 			   || r_type == R_390_PC12DBL
2805 			   || r_type == R_390_PC16DBL
2806 			   || r_type == R_390_PC24DBL
2807 			   || r_type == R_390_PC32
2808 			   || r_type == R_390_PC32DBL
2809 			   || r_type == R_390_PC64
2810 			   || !info->shared
2811 			   || !SYMBOLIC_BIND (info, h)
2812 			   || !h->def_regular))
2813 		{
2814 		  outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2815 		  outrel.r_addend = rel->r_addend;
2816 		}
2817 	      else
2818 		{
2819 		  /* This symbol is local, or marked to become local.  */
2820 		  outrel.r_addend = relocation + rel->r_addend;
2821 		  if (r_type == R_390_64)
2822 		    {
2823 		      relocate = TRUE;
2824 		      outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2825 		    }
2826 		  else
2827 		    {
2828 		      long sindx;
2829 
2830 		      if (bfd_is_abs_section (sec))
2831 			sindx = 0;
2832 		      else if (sec == NULL || sec->owner == NULL)
2833 			{
2834 			  bfd_set_error(bfd_error_bad_value);
2835 			  return FALSE;
2836 			}
2837 		      else
2838 			{
2839 			  asection *osec;
2840 
2841 			  osec = sec->output_section;
2842 			  sindx = elf_section_data (osec)->dynindx;
2843 
2844 			  if (sindx == 0)
2845 			    {
2846 			      osec = htab->elf.text_index_section;
2847 			      sindx = elf_section_data (osec)->dynindx;
2848 			    }
2849 			  BFD_ASSERT (sindx != 0);
2850 
2851 			  /* We are turning this relocation into one
2852 			     against a section symbol, so subtract out
2853 			     the output section's address but not the
2854 			     offset of the input section in the output
2855 			     section.  */
2856 			  outrel.r_addend -= osec->vma;
2857 			}
2858 		      outrel.r_info = ELF64_R_INFO (sindx, r_type);
2859 		    }
2860 		}
2861 
2862 	      sreloc = elf_section_data (input_section)->sreloc;
2863 	      if (sreloc == NULL)
2864 		abort ();
2865 
2866 	      loc = sreloc->contents;
2867 	      loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2868 	      bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2869 
2870 	      /* If this reloc is against an external symbol, we do
2871 		 not want to fiddle with the addend.  Otherwise, we
2872 		 need to include the symbol value so that it becomes
2873 		 an addend for the dynamic reloc.  */
2874 	      if (! relocate)
2875 		continue;
2876 	    }
2877 
2878 	  break;
2879 
2880 	  /* Relocations for tls literal pool entries.  */
2881 	case R_390_TLS_IE64:
2882 	  if (info->shared)
2883 	    {
2884 	      Elf_Internal_Rela outrel;
2885 	      asection *sreloc;
2886 	      bfd_byte *loc;
2887 
2888 	      outrel.r_offset = rel->r_offset
2889 				+ input_section->output_section->vma
2890 				+ input_section->output_offset;
2891 	      outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2892 	      sreloc = elf_section_data (input_section)->sreloc;
2893 	      if (sreloc == NULL)
2894 		abort ();
2895 	      loc = sreloc->contents;
2896 	      loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2897 	      bfd_elf64_swap_reloc_out (output_bfd, &outrel, loc);
2898 	    }
2899 	  /* Fall through.  */
2900 
2901 	case R_390_TLS_GD64:
2902 	case R_390_TLS_GOTIE64:
2903 	  r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2904 	  tls_type = GOT_UNKNOWN;
2905 	  if (h == NULL && local_got_offsets)
2906 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2907 	  else if (h != NULL)
2908 	    {
2909 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2910 	      if (!info->shared && h->dynindx == -1 && tls_type >= GOT_TLS_IE)
2911 		r_type = R_390_TLS_LE64;
2912 	    }
2913 	  if (r_type == R_390_TLS_GD64 && tls_type >= GOT_TLS_IE)
2914 	    r_type = R_390_TLS_IE64;
2915 
2916 	  if (r_type == R_390_TLS_LE64)
2917 	    {
2918 	      /* This relocation gets optimized away by the local exec
2919 		 access optimization.  */
2920 	      BFD_ASSERT (! unresolved_reloc);
2921 	      bfd_put_64 (output_bfd, -tpoff (info, relocation),
2922 			  contents + rel->r_offset);
2923 	      continue;
2924 	    }
2925 
2926 	  if (htab->elf.sgot == NULL)
2927 	    abort ();
2928 
2929 	  if (h != NULL)
2930 	    off = h->got.offset;
2931 	  else
2932 	    {
2933 	      if (local_got_offsets == NULL)
2934 		abort ();
2935 
2936 	      off = local_got_offsets[r_symndx];
2937 	    }
2938 
2939 	emit_tls_relocs:
2940 
2941 	  if ((off & 1) != 0)
2942 	    off &= ~1;
2943 	  else
2944 	    {
2945 	      Elf_Internal_Rela outrel;
2946 	      bfd_byte *loc;
2947 	      int dr_type, indx;
2948 
2949 	      if (htab->elf.srelgot == NULL)
2950 		abort ();
2951 
2952 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2953 				 + htab->elf.sgot->output_offset + off);
2954 
2955 	      indx = h && h->dynindx != -1 ? h->dynindx : 0;
2956 	      if (r_type == R_390_TLS_GD64)
2957 		dr_type = R_390_TLS_DTPMOD;
2958 	      else
2959 		dr_type = R_390_TLS_TPOFF;
2960 	      if (dr_type == R_390_TLS_TPOFF && indx == 0)
2961 		outrel.r_addend = relocation - dtpoff_base (info);
2962 	      else
2963 		outrel.r_addend = 0;
2964 	      outrel.r_info = ELF64_R_INFO (indx, dr_type);
2965 	      loc = htab->elf.srelgot->contents;
2966 	      loc += htab->elf.srelgot->reloc_count++
2967 		* sizeof (Elf64_External_Rela);
2968 	      bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2969 
2970 	      if (r_type == R_390_TLS_GD64)
2971 		{
2972 		  if (indx == 0)
2973 		    {
2974 	    	      BFD_ASSERT (! unresolved_reloc);
2975 		      bfd_put_64 (output_bfd,
2976 				  relocation - dtpoff_base (info),
2977 				  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2978 		    }
2979 		  else
2980 		    {
2981 		      outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_DTPOFF);
2982 		      outrel.r_offset += GOT_ENTRY_SIZE;
2983 		      outrel.r_addend = 0;
2984 		      htab->elf.srelgot->reloc_count++;
2985 		      loc += sizeof (Elf64_External_Rela);
2986 		      bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2987 		    }
2988 		}
2989 
2990 	      if (h != NULL)
2991 		h->got.offset |= 1;
2992 	      else
2993 		local_got_offsets[r_symndx] |= 1;
2994 	    }
2995 
2996 	  if (off >= (bfd_vma) -2)
2997 	    abort ();
2998 	  if (r_type == ELF64_R_TYPE (rel->r_info))
2999 	    {
3000 	      relocation = htab->elf.sgot->output_offset + off;
3001 	      if (r_type == R_390_TLS_IE64 || r_type == R_390_TLS_IEENT)
3002 		relocation += htab->elf.sgot->output_section->vma;
3003 	      unresolved_reloc = FALSE;
3004 	    }
3005 	  else
3006 	    {
3007 	      bfd_put_64 (output_bfd, htab->elf.sgot->output_offset + off,
3008 			  contents + rel->r_offset);
3009 	      continue;
3010 	    }
3011 	  break;
3012 
3013 	case R_390_TLS_GOTIE12:
3014 	case R_390_TLS_GOTIE20:
3015 	case R_390_TLS_IEENT:
3016 	  if (h == NULL)
3017 	    {
3018 	      if (local_got_offsets == NULL)
3019 		abort();
3020 	      off = local_got_offsets[r_symndx];
3021 	      if (info->shared)
3022 		goto emit_tls_relocs;
3023 	    }
3024 	  else
3025 	    {
3026 	      off = h->got.offset;
3027 	      tls_type = elf_s390_hash_entry(h)->tls_type;
3028 	      if (info->shared || h->dynindx != -1 || tls_type < GOT_TLS_IE)
3029 		goto emit_tls_relocs;
3030 	    }
3031 
3032 	  if (htab->elf.sgot == NULL)
3033 	    abort ();
3034 
3035 	  BFD_ASSERT (! unresolved_reloc);
3036 	  bfd_put_64 (output_bfd, -tpoff (info, relocation),
3037 		      htab->elf.sgot->contents + off);
3038 	  relocation = htab->elf.sgot->output_offset + off;
3039 	  if (r_type == R_390_TLS_IEENT)
3040 	    relocation += htab->elf.sgot->output_section->vma;
3041 	  unresolved_reloc = FALSE;
3042 	  break;
3043 
3044 	case R_390_TLS_LDM64:
3045 	  if (! info->shared)
3046 	    /* The literal pool entry this relocation refers to gets ignored
3047 	       by the optimized code of the local exec model. Do nothing
3048 	       and the value will turn out zero.  */
3049 	    continue;
3050 
3051 	  if (htab->elf.sgot == NULL)
3052 	    abort ();
3053 
3054 	  off = htab->tls_ldm_got.offset;
3055 	  if (off & 1)
3056 	    off &= ~1;
3057 	  else
3058 	    {
3059 	      Elf_Internal_Rela outrel;
3060 	      bfd_byte *loc;
3061 
3062 	      if (htab->elf.srelgot == NULL)
3063 		abort ();
3064 
3065 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
3066 				 + htab->elf.sgot->output_offset + off);
3067 
3068 	      bfd_put_64 (output_bfd, 0,
3069 			  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
3070 	      outrel.r_info = ELF64_R_INFO (0, R_390_TLS_DTPMOD);
3071 	      outrel.r_addend = 0;
3072 	      loc = htab->elf.srelgot->contents;
3073 	      loc += htab->elf.srelgot->reloc_count++
3074 		* sizeof (Elf64_External_Rela);
3075 	      bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3076 	      htab->tls_ldm_got.offset |= 1;
3077 	    }
3078 	  relocation = htab->elf.sgot->output_offset + off;
3079 	  unresolved_reloc = FALSE;
3080 	  break;
3081 
3082 	case R_390_TLS_LE64:
3083 	  if (info->shared && !info->pie)
3084 	    {
3085 	      /* Linking a shared library with non-fpic code requires
3086 		 a R_390_TLS_TPOFF relocation.  */
3087 	      Elf_Internal_Rela outrel;
3088 	      asection *sreloc;
3089 	      bfd_byte *loc;
3090 	      int indx;
3091 
3092 	      outrel.r_offset = rel->r_offset
3093 				+ input_section->output_section->vma
3094 				+ input_section->output_offset;
3095 	      if (h != NULL && h->dynindx != -1)
3096 		indx = h->dynindx;
3097 	      else
3098 		indx = 0;
3099 	      outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_TPOFF);
3100 	      if (indx == 0)
3101 		outrel.r_addend = relocation - dtpoff_base (info);
3102 	      else
3103 		outrel.r_addend = 0;
3104 	      sreloc = elf_section_data (input_section)->sreloc;
3105 	      if (sreloc == NULL)
3106 		abort ();
3107 	      loc = sreloc->contents;
3108 	      loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
3109 	      bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3110 	    }
3111 	  else
3112 	    {
3113 	      BFD_ASSERT (! unresolved_reloc);
3114 	      bfd_put_64 (output_bfd, -tpoff (info, relocation),
3115 			  contents + rel->r_offset);
3116 	    }
3117 	  continue;
3118 
3119 	case R_390_TLS_LDO64:
3120 	  if (info->shared || (input_section->flags & SEC_DEBUGGING))
3121 	    relocation -= dtpoff_base (info);
3122 	  else
3123 	    /* When converting LDO to LE, we must negate.  */
3124 	    relocation = -tpoff (info, relocation);
3125 	  break;
3126 
3127 	  /* Relocations for tls instructions.  */
3128 	case R_390_TLS_LOAD:
3129 	case R_390_TLS_GDCALL:
3130 	case R_390_TLS_LDCALL:
3131 	  tls_type = GOT_UNKNOWN;
3132 	  if (h == NULL && local_got_offsets)
3133 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3134 	  else if (h != NULL)
3135 	    tls_type = elf_s390_hash_entry(h)->tls_type;
3136 
3137 	  if (tls_type == GOT_TLS_GD)
3138 	    continue;
3139 
3140 	  if (r_type == R_390_TLS_LOAD)
3141 	    {
3142 	      if (!info->shared && (h == NULL || h->dynindx == -1))
3143 		{
3144 		  /* IE->LE transition. Four valid cases:
3145 		     lg %rx,(0,%ry)    -> sllg %rx,%ry,0
3146 		     lg %rx,(%ry,0)    -> sllg %rx,%ry,0
3147 		     lg %rx,(%ry,%r12) -> sllg %rx,%ry,0
3148 		     lg %rx,(%r12,%ry) -> sllg %rx,%ry,0  */
3149 		  unsigned int insn0, insn1, ry;
3150 
3151 		  insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3152 		  insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3153 		  if (insn1 != 0x0004)
3154 		    invalid_tls_insn (input_bfd, input_section, rel);
3155 		  ry = 0;
3156 		  if ((insn0 & 0xff00f000) == 0xe3000000)
3157 		    /* lg %rx,0(%ry,0) -> sllg %rx,%ry,0  */
3158 		    ry = (insn0 & 0x000f0000);
3159 		  else if ((insn0 & 0xff0f0000) == 0xe3000000)
3160 		    /* lg %rx,0(0,%ry) -> sllg %rx,%ry,0  */
3161 		    ry = (insn0 & 0x0000f000) << 4;
3162 		  else if ((insn0 & 0xff00f000) == 0xe300c000)
3163 		    /* lg %rx,0(%ry,%r12) -> sllg %rx,%ry,0  */
3164 		    ry = (insn0 & 0x000f0000);
3165 		  else if ((insn0 & 0xff0f0000) == 0xe30c0000)
3166 		    /* lg %rx,0(%r12,%ry) -> sllg %rx,%ry,0  */
3167 		    ry = (insn0 & 0x0000f000) << 4;
3168 		  else
3169 		    invalid_tls_insn (input_bfd, input_section, rel);
3170 		  insn0 = 0xeb000000 | (insn0 & 0x00f00000) | ry;
3171 		  insn1 = 0x000d;
3172 		  bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3173 		  bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3174 		}
3175 	    }
3176 	  else if (r_type == R_390_TLS_GDCALL)
3177 	    {
3178 	      unsigned int insn0, insn1;
3179 
3180 	      insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3181 	      insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3182 	      if ((insn0 & 0xffff0000) != 0xc0e50000)
3183 		invalid_tls_insn (input_bfd, input_section, rel);
3184 	      if (!info->shared && (h == NULL || h->dynindx == -1))
3185 		{
3186 		  /* GD->LE transition.
3187 		     brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3188 		  insn0 = 0xc0040000;
3189 		  insn1 = 0x0000;
3190 		}
3191 	      else
3192 		{
3193 		  /* GD->IE transition.
3194 		     brasl %r14,__tls_get_addr@plt -> lg %r2,0(%r2,%r12)  */
3195 		  insn0 = 0xe322c000;
3196 		  insn1 = 0x0004;
3197 		}
3198 	      bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3199 	      bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3200 	    }
3201 	  else if (r_type == R_390_TLS_LDCALL)
3202 	    {
3203 	      if (!info->shared)
3204 		{
3205 		  unsigned int insn0, insn1;
3206 
3207 		  insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3208 		  insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3209 		  if ((insn0 & 0xffff0000) != 0xc0e50000)
3210 		    invalid_tls_insn (input_bfd, input_section, rel);
3211 		  /* LD->LE transition.
3212 		     brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3213 		  insn0 = 0xc0040000;
3214 		  insn1 = 0x0000;
3215 		  bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3216 		  bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3217 		}
3218 	    }
3219 	  continue;
3220 
3221 	default:
3222 	  break;
3223 	}
3224 
3225       /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3226 	 because such sections are not SEC_ALLOC and thus ld.so will
3227 	 not process them.  */
3228       if (unresolved_reloc
3229 	  && !((input_section->flags & SEC_DEBUGGING) != 0
3230 	       && h->def_dynamic)
3231 	  && _bfd_elf_section_offset (output_bfd, info, input_section,
3232 				      rel->r_offset) != (bfd_vma) -1)
3233 	(*_bfd_error_handler)
3234 	  (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
3235 	   input_bfd,
3236 	   input_section,
3237 	   (long) rel->r_offset,
3238 	   howto->name,
3239 	   h->root.root.string);
3240 
3241     do_relocation:
3242 
3243       /* When applying a 24 bit reloc we need to start one byte
3244 	 earlier.  Otherwise the 32 bit get/put bfd operations might
3245 	 access a byte after the actual section.  */
3246       if (r_type == R_390_PC24DBL
3247 	  || r_type == R_390_PLT24DBL)
3248 	rel->r_offset--;
3249 
3250       if (r_type == R_390_20
3251 	  || r_type == R_390_GOT20
3252 	  || r_type == R_390_GOTPLT20
3253 	  || r_type == R_390_TLS_GOTIE20)
3254 	{
3255 	  relocation += rel->r_addend;
3256 	  relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3257 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3258 					contents, rel->r_offset,
3259 					relocation, 0);
3260 	}
3261       else
3262 	r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3263 				      contents, rel->r_offset,
3264 				      relocation, rel->r_addend);
3265 
3266       if (r != bfd_reloc_ok)
3267 	{
3268 	  const char *name;
3269 
3270 	  if (h != NULL)
3271 	    name = h->root.root.string;
3272 	  else
3273 	    {
3274 	      name = bfd_elf_string_from_elf_section (input_bfd,
3275 						      symtab_hdr->sh_link,
3276 						      sym->st_name);
3277 	      if (name == NULL)
3278 		return FALSE;
3279 	      if (*name == '\0')
3280 		name = bfd_section_name (input_bfd, sec);
3281 	    }
3282 
3283 	  if (r == bfd_reloc_overflow)
3284 	    {
3285 
3286 	      if (! ((*info->callbacks->reloc_overflow)
3287 		     (info, (h ? &h->root : NULL), name, howto->name,
3288 		      (bfd_vma) 0, input_bfd, input_section,
3289 		      rel->r_offset)))
3290 		return FALSE;
3291 	    }
3292 	  else
3293 	    {
3294 	      (*_bfd_error_handler)
3295 		(_("%B(%A+0x%lx): reloc against `%s': error %d"),
3296 		 input_bfd, input_section,
3297 		 (long) rel->r_offset, name, (int) r);
3298 	      return FALSE;
3299 	    }
3300 	}
3301     }
3302 
3303   return TRUE;
3304 }
3305 
3306 /* Generate the PLT slots together with the dynamic relocations needed
3307    for IFUNC symbols.  */
3308 
3309 static void
elf_s390_finish_ifunc_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,struct elf_s390_link_hash_table * htab,bfd_vma plt_offset,bfd_vma resolver_address)3310 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3311 			      struct bfd_link_info *info,
3312 			      struct elf_link_hash_entry *h,
3313 			      struct elf_s390_link_hash_table *htab,
3314 			      bfd_vma plt_offset,
3315 			      bfd_vma resolver_address)
3316 {
3317   bfd_vma plt_index;
3318   bfd_vma got_offset;
3319   Elf_Internal_Rela rela;
3320   bfd_byte *loc;
3321   asection *plt, *gotplt, *relplt;
3322 
3323   if (htab->elf.iplt == NULL
3324       || htab->elf.igotplt == NULL
3325       || htab->elf.irelplt == NULL)
3326     abort ();
3327 
3328   /* Index of the PLT slot within iplt section.  */
3329   plt_index = plt_offset / PLT_ENTRY_SIZE;
3330   plt = htab->elf.iplt;
3331   /* Offset into the igot.plt section.  */
3332   got_offset = plt_index * GOT_ENTRY_SIZE;
3333   gotplt = htab->elf.igotplt;
3334   relplt = htab->elf.irelplt;
3335 
3336   /* Fill in the blueprint of a PLT.  */
3337   memcpy (plt->contents + plt_offset, elf_s390x_plt_entry,
3338 	  PLT_ENTRY_SIZE);
3339 
3340   /* Fixup the relative address to the GOT entry */
3341   bfd_put_32 (output_bfd,
3342 	      (gotplt->output_section->vma +
3343 	       gotplt->output_offset + got_offset
3344 	       - (plt->output_section->vma +
3345 		  plt->output_offset +
3346 		  plt_offset))/2,
3347 	      plt->contents + plt_offset + 2);
3348   /* Fixup the relative branch to PLT 0 */
3349   bfd_put_32 (output_bfd, - (plt->output_offset +
3350 			     (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3351 	      plt->contents + plt_offset + 24);
3352   /* Fixup offset into .rela.plt section.  */
3353   bfd_put_32 (output_bfd, relplt->output_offset +
3354 	      plt_index * sizeof (Elf64_External_Rela),
3355 	      plt->contents + plt_offset + 28);
3356 
3357   /* Fill in the entry in the global offset table.
3358      Points to instruction after GOT offset.  */
3359   bfd_put_64 (output_bfd,
3360 	      (plt->output_section->vma
3361 	       + plt->output_offset
3362 	       + plt_offset
3363 	       + 14),
3364 	      gotplt->contents + got_offset);
3365 
3366   /* Fill in the entry in the .rela.plt section.  */
3367   rela.r_offset = (gotplt->output_section->vma
3368 		   + gotplt->output_offset
3369 		   + got_offset);
3370 
3371   if (!h
3372       || h->dynindx == -1
3373       || ((info->executable
3374 	   || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3375 	  && h->def_regular))
3376     {
3377       /* The symbol can be locally resolved.  */
3378       rela.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
3379       rela.r_addend = resolver_address;
3380     }
3381   else
3382     {
3383       rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3384       rela.r_addend = 0;
3385     }
3386 
3387   loc = relplt->contents + plt_index * sizeof (Elf64_External_Rela);
3388   bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3389 }
3390 
3391 
3392 /* Finish up dynamic symbol handling.  We set the contents of various
3393    dynamic sections here.  */
3394 
3395 static bfd_boolean
elf_s390_finish_dynamic_symbol(bfd * output_bfd,struct bfd_link_info * info,struct elf_link_hash_entry * h,Elf_Internal_Sym * sym)3396 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3397 				struct bfd_link_info *info,
3398 				struct elf_link_hash_entry *h,
3399 				Elf_Internal_Sym *sym)
3400 {
3401   struct elf_s390_link_hash_table *htab;
3402   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3403 
3404   htab = elf_s390_hash_table (info);
3405   if (htab == NULL)
3406     return FALSE;
3407 
3408   if (h->plt.offset != (bfd_vma) -1)
3409     {
3410       bfd_vma plt_index;
3411       bfd_vma got_offset;
3412       Elf_Internal_Rela rela;
3413       bfd_byte *loc;
3414 
3415       /* This symbol has an entry in the procedure linkage table.  Set
3416 	 it up.  */
3417       if (s390_is_ifunc_symbol_p (h))
3418 	{
3419 	  /* If we can resolve the IFUNC symbol locally we generate an
3420 	     IRELATIVE reloc.  */
3421 	  elf_s390_finish_ifunc_symbol (output_bfd, info, h, htab, h->plt.offset,
3422 					eh->ifunc_resolver_address +
3423 					eh->ifunc_resolver_section->output_offset +
3424 					eh->ifunc_resolver_section->output_section->vma);
3425 				 ;
3426 	  /* Fallthrough.  Handling of explicit GOT slots of IFUNC
3427 	     symbols is below.  */
3428 	}
3429       else
3430 	{
3431 	  if (h->dynindx == -1
3432 	      || htab->elf.splt == NULL
3433 	      || htab->elf.sgotplt == NULL
3434 	      || htab->elf.srelplt == NULL)
3435 	    abort ();
3436 
3437 	  /* Calc. index no.
3438 	     Current offset - size first entry / entry size.  */
3439 	  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3440 
3441 	  /* Offset in GOT is PLT index plus GOT headers(3) times 8,
3442 	     addr & GOT addr.  */
3443 	  got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3444 
3445 	  /* Fill in the blueprint of a PLT.  */
3446 	  memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390x_plt_entry,
3447 		  PLT_ENTRY_SIZE);
3448 
3449 	  /* Fixup the relative address to the GOT entry */
3450 	  bfd_put_32 (output_bfd,
3451 		      (htab->elf.sgotplt->output_section->vma +
3452 		       htab->elf.sgotplt->output_offset + got_offset
3453 		       - (htab->elf.splt->output_section->vma +
3454 			  htab->elf.splt->output_offset +
3455 			  h->plt.offset))/2,
3456 		      htab->elf.splt->contents + h->plt.offset + 2);
3457 	  /* Fixup the relative branch to PLT 0 */
3458 	  bfd_put_32 (output_bfd, - (PLT_FIRST_ENTRY_SIZE +
3459 				     (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3460 		      htab->elf.splt->contents + h->plt.offset + 24);
3461 	  /* Fixup offset into .rela.plt section.  */
3462 	  bfd_put_32 (output_bfd, plt_index * sizeof (Elf64_External_Rela),
3463 		      htab->elf.splt->contents + h->plt.offset + 28);
3464 
3465 	  /* Fill in the entry in the global offset table.
3466 	     Points to instruction after GOT offset.  */
3467 	  bfd_put_64 (output_bfd,
3468 		      (htab->elf.splt->output_section->vma
3469 		       + htab->elf.splt->output_offset
3470 		       + h->plt.offset
3471 		       + 14),
3472 		      htab->elf.sgotplt->contents + got_offset);
3473 
3474 	  /* Fill in the entry in the .rela.plt section.  */
3475 	  rela.r_offset = (htab->elf.sgotplt->output_section->vma
3476 			   + htab->elf.sgotplt->output_offset
3477 			   + got_offset);
3478 	  rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3479 	  rela.r_addend = 0;
3480 	  loc = htab->elf.srelplt->contents + plt_index *
3481 	    sizeof (Elf64_External_Rela);
3482 	  bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3483 
3484 	  if (!h->def_regular)
3485 	    {
3486 	      /* Mark the symbol as undefined, rather than as defined in
3487 		 the .plt section.  Leave the value alone.  This is a clue
3488 		 for the dynamic linker, to make function pointer
3489 		 comparisons work between an application and shared
3490 		 library.  */
3491 	      sym->st_shndx = SHN_UNDEF;
3492 	    }
3493 	}
3494     }
3495 
3496   if (h->got.offset != (bfd_vma) -1
3497       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3498       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3499       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3500     {
3501       Elf_Internal_Rela rela;
3502       bfd_byte *loc;
3503 
3504       /* This symbol has an entry in the global offset table.  Set it
3505 	 up.  */
3506       if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3507 	abort ();
3508 
3509       rela.r_offset = (htab->elf.sgot->output_section->vma
3510 		       + htab->elf.sgot->output_offset
3511 		       + (h->got.offset &~ (bfd_vma) 1));
3512 
3513       if (h->def_regular && s390_is_ifunc_symbol_p (h))
3514 	{
3515 	  if (info->shared)
3516 	    {
3517 	      /* An explicit GOT slot usage needs GLOB_DAT.  If the
3518 		 symbol references local the implicit got.iplt slot
3519 		 will be used and the IRELATIVE reloc has been created
3520 		 above.  */
3521 	      goto do_glob_dat;
3522 	    }
3523 	  else
3524 	    {
3525 	      /* For non-shared objects explicit GOT slots must be
3526 		 filled with the PLT slot address for pointer
3527 		 equality reasons.  */
3528 	      bfd_put_64 (output_bfd, (htab->elf.iplt->output_section->vma
3529 				       + htab->elf.iplt->output_offset
3530 				       + h->plt.offset),
3531 			  htab->elf.sgot->contents + h->got.offset);
3532 	      return TRUE;
3533 	    }
3534 	}
3535       else if (info->shared
3536 	  && SYMBOL_REFERENCES_LOCAL (info, h))
3537 	{
3538 	  /* If this is a static link, or it is a -Bsymbolic link and
3539 	     the symbol is defined locally or was forced to be local
3540 	     because of a version file, we just want to emit a
3541 	     RELATIVE reloc.  The entry in the global offset table
3542 	     will already have been initialized in the
3543 	     relocate_section function.  */
3544 	  if (!h->def_regular)
3545 	    return FALSE;
3546 	  BFD_ASSERT((h->got.offset & 1) != 0);
3547 	  rela.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
3548 	  rela.r_addend = (h->root.u.def.value
3549 			   + h->root.u.def.section->output_section->vma
3550 			   + h->root.u.def.section->output_offset);
3551 	}
3552       else
3553 	{
3554 	  BFD_ASSERT((h->got.offset & 1) == 0);
3555 do_glob_dat:
3556 	  bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3557 	  rela.r_info = ELF64_R_INFO (h->dynindx, R_390_GLOB_DAT);
3558 	  rela.r_addend = 0;
3559 	}
3560 
3561       loc = htab->elf.srelgot->contents;
3562       loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
3563       bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3564     }
3565 
3566   if (h->needs_copy)
3567     {
3568       Elf_Internal_Rela rela;
3569       bfd_byte *loc;
3570 
3571       /* This symbols needs a copy reloc.  Set it up.  */
3572 
3573       if (h->dynindx == -1
3574 	  || (h->root.type != bfd_link_hash_defined
3575 	      && h->root.type != bfd_link_hash_defweak)
3576 	  || htab->srelbss == NULL)
3577 	abort ();
3578 
3579       rela.r_offset = (h->root.u.def.value
3580 		       + h->root.u.def.section->output_section->vma
3581 		       + h->root.u.def.section->output_offset);
3582       rela.r_info = ELF64_R_INFO (h->dynindx, R_390_COPY);
3583       rela.r_addend = 0;
3584       loc = htab->srelbss->contents;
3585       loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
3586       bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3587     }
3588 
3589   /* Mark some specially defined symbols as absolute.  */
3590   if (h == htab->elf.hdynamic
3591       || h == htab->elf.hgot
3592       || h == htab->elf.hplt)
3593     sym->st_shndx = SHN_ABS;
3594 
3595   return TRUE;
3596 }
3597 
3598 /* Used to decide how to sort relocs in an optimal manner for the
3599    dynamic linker, before writing them out.  */
3600 
3601 static enum elf_reloc_type_class
elf_s390_reloc_type_class(const struct bfd_link_info * info ATTRIBUTE_UNUSED,const asection * rel_sec ATTRIBUTE_UNUSED,const Elf_Internal_Rela * rela)3602 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3603 			   const asection *rel_sec ATTRIBUTE_UNUSED,
3604 			   const Elf_Internal_Rela *rela)
3605 {
3606   switch ((int) ELF64_R_TYPE (rela->r_info))
3607     {
3608     case R_390_RELATIVE:
3609       return reloc_class_relative;
3610     case R_390_JMP_SLOT:
3611       return reloc_class_plt;
3612     case R_390_COPY:
3613       return reloc_class_copy;
3614     default:
3615       return reloc_class_normal;
3616     }
3617 }
3618 
3619 /* Finish up the dynamic sections.  */
3620 
3621 static bfd_boolean
elf_s390_finish_dynamic_sections(bfd * output_bfd,struct bfd_link_info * info)3622 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3623 				  struct bfd_link_info *info)
3624 {
3625   struct elf_s390_link_hash_table *htab;
3626   bfd *dynobj;
3627   asection *sdyn;
3628   bfd *ibfd;
3629   unsigned int i;
3630 
3631   htab = elf_s390_hash_table (info);
3632   if (htab == NULL)
3633     return FALSE;
3634 
3635   dynobj = htab->elf.dynobj;
3636   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3637 
3638   if (htab->elf.dynamic_sections_created)
3639     {
3640       Elf64_External_Dyn *dyncon, *dynconend;
3641 
3642       if (sdyn == NULL || htab->elf.sgot == NULL)
3643 	abort ();
3644 
3645       dyncon = (Elf64_External_Dyn *) sdyn->contents;
3646       dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
3647       for (; dyncon < dynconend; dyncon++)
3648 	{
3649 	  Elf_Internal_Dyn dyn;
3650 	  asection *s;
3651 
3652 	  bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
3653 
3654 	  switch (dyn.d_tag)
3655 	    {
3656 	    default:
3657 	      continue;
3658 
3659 	    case DT_PLTGOT:
3660 	      dyn.d_un.d_ptr = htab->elf.sgot->output_section->vma;
3661 	      break;
3662 
3663 	    case DT_JMPREL:
3664 	      dyn.d_un.d_ptr = htab->elf.srelplt->output_section->vma;
3665 	      break;
3666 
3667 	    case DT_PLTRELSZ:
3668 	      s = htab->elf.srelplt->output_section;
3669 	      dyn.d_un.d_val = s->size;
3670 	      break;
3671 
3672 	    case DT_RELASZ:
3673 	      /* The procedure linkage table relocs (DT_JMPREL) should
3674 		 not be included in the overall relocs (DT_RELA).
3675 		 Therefore, we override the DT_RELASZ entry here to
3676 		 make it not include the JMPREL relocs.  Since the
3677 		 linker script arranges for .rela.plt to follow all
3678 		 other relocation sections, we don't have to worry
3679 		 about changing the DT_RELA entry.  */
3680 	      s = htab->elf.srelplt->output_section;
3681 	      dyn.d_un.d_val -= s->size;
3682 	      break;
3683 	    }
3684 
3685 	  bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
3686 	}
3687 
3688       /* Fill in the special first entry in the procedure linkage table.  */
3689       if (htab->elf.splt && htab->elf.splt->size > 0)
3690 	{
3691 	  /* fill in blueprint for plt 0 entry */
3692 	  memcpy (htab->elf.splt->contents, elf_s390x_first_plt_entry,
3693 		  PLT_FIRST_ENTRY_SIZE);
3694 	  /* Fixup relative address to start of GOT */
3695 	  bfd_put_32 (output_bfd,
3696 		      (htab->elf.sgotplt->output_section->vma +
3697 		       htab->elf.sgotplt->output_offset
3698 		       - htab->elf.splt->output_section->vma - 6)/2,
3699 		      htab->elf.splt->contents + 8);
3700 	}
3701       if (elf_section_data (htab->elf.splt->output_section) != NULL)
3702 	elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
3703 	  = PLT_ENTRY_SIZE;
3704     }
3705 
3706   if (htab->elf.sgotplt)
3707     {
3708       /* Fill in the first three entries in the global offset table.  */
3709       if (htab->elf.sgotplt->size > 0)
3710 	{
3711 	  bfd_put_64 (output_bfd,
3712 		      (sdyn == NULL ? (bfd_vma) 0
3713 		       : sdyn->output_section->vma + sdyn->output_offset),
3714 		      htab->elf.sgotplt->contents);
3715 	  /* One entry for shared object struct ptr.  */
3716 	  bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3717 	  /* One entry for _dl_runtime_resolve.  */
3718 	  bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 12);
3719 	}
3720 
3721       elf_section_data (htab->elf.sgot->output_section)
3722 	->this_hdr.sh_entsize = 8;
3723     }
3724 
3725   /* Finish dynamic symbol for local IFUNC symbols.  */
3726   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3727     {
3728       struct plt_entry *local_plt;
3729       Elf_Internal_Sym *isym;
3730       Elf_Internal_Shdr *symtab_hdr;
3731 
3732       symtab_hdr = &elf_symtab_hdr (ibfd);
3733 
3734       local_plt = elf_s390_local_plt (ibfd);
3735       if (local_plt != NULL)
3736 	for (i = 0; i < symtab_hdr->sh_info; i++)
3737 	  {
3738 	    if (local_plt[i].plt.offset != (bfd_vma) -1)
3739 	      {
3740 		asection *sec = local_plt[i].sec;
3741 		isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3742 		if (isym == NULL)
3743 		  return FALSE;
3744 
3745 		if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3746 		  elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3747 						local_plt[i].plt.offset,
3748 						isym->st_value
3749 						+ sec->output_section->vma
3750 						+ sec->output_offset);
3751 
3752 	      }
3753 	  }
3754     }
3755 
3756   return TRUE;
3757 }
3758 
3759 /* Return address for Ith PLT stub in section PLT, for relocation REL
3760    or (bfd_vma) -1 if it should not be included.  */
3761 
3762 static bfd_vma
elf_s390_plt_sym_val(bfd_vma i,const asection * plt,const arelent * rel ATTRIBUTE_UNUSED)3763 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3764 		      const arelent *rel ATTRIBUTE_UNUSED)
3765 {
3766   return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3767 }
3768 
3769 /* Why was the hash table entry size definition changed from
3770    ARCH_SIZE/8 to 4? This breaks the 64 bit dynamic linker and
3771    this is the only reason for the s390_elf64_size_info structure.  */
3772 
3773 const struct elf_size_info s390_elf64_size_info =
3774 {
3775   sizeof (Elf64_External_Ehdr),
3776   sizeof (Elf64_External_Phdr),
3777   sizeof (Elf64_External_Shdr),
3778   sizeof (Elf64_External_Rel),
3779   sizeof (Elf64_External_Rela),
3780   sizeof (Elf64_External_Sym),
3781   sizeof (Elf64_External_Dyn),
3782   sizeof (Elf_External_Note),
3783   8,		/* hash-table entry size.  */
3784   1,		/* internal relocations per external relocations.  */
3785   64,		/* arch_size.  */
3786   3,		/* log_file_align.  */
3787   ELFCLASS64, EV_CURRENT,
3788   bfd_elf64_write_out_phdrs,
3789   bfd_elf64_write_shdrs_and_ehdr,
3790   bfd_elf64_checksum_contents,
3791   bfd_elf64_write_relocs,
3792   bfd_elf64_swap_symbol_in,
3793   bfd_elf64_swap_symbol_out,
3794   bfd_elf64_slurp_reloc_table,
3795   bfd_elf64_slurp_symbol_table,
3796   bfd_elf64_swap_dyn_in,
3797   bfd_elf64_swap_dyn_out,
3798   bfd_elf64_swap_reloc_in,
3799   bfd_elf64_swap_reloc_out,
3800   bfd_elf64_swap_reloca_in,
3801   bfd_elf64_swap_reloca_out
3802 };
3803 
3804 #define TARGET_BIG_SYM	s390_elf64_vec
3805 #define TARGET_BIG_NAME	"elf64-s390"
3806 #define ELF_ARCH	bfd_arch_s390
3807 #define ELF_TARGET_ID	S390_ELF_DATA
3808 #define ELF_MACHINE_CODE EM_S390
3809 #define ELF_MACHINE_ALT1 EM_S390_OLD
3810 #define ELF_MAXPAGESIZE 0x1000
3811 
3812 #define elf_backend_size_info		s390_elf64_size_info
3813 
3814 #define elf_backend_can_gc_sections	1
3815 #define elf_backend_can_refcount	1
3816 #define elf_backend_want_got_plt	1
3817 #define elf_backend_plt_readonly	1
3818 #define elf_backend_want_plt_sym	0
3819 #define elf_backend_got_header_size	24
3820 #define elf_backend_rela_normal		1
3821 
3822 #define elf_info_to_howto		elf_s390_info_to_howto
3823 
3824 #define bfd_elf64_bfd_is_local_label_name     elf_s390_is_local_label_name
3825 #define bfd_elf64_bfd_link_hash_table_create  elf_s390_link_hash_table_create
3826 #define bfd_elf64_bfd_reloc_type_lookup	      elf_s390_reloc_type_lookup
3827 #define bfd_elf64_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
3828 
3829 #define elf_backend_adjust_dynamic_symbol     elf_s390_adjust_dynamic_symbol
3830 #define elf_backend_check_relocs	      elf_s390_check_relocs
3831 #define elf_backend_copy_indirect_symbol      elf_s390_copy_indirect_symbol
3832 #define elf_backend_create_dynamic_sections   elf_s390_create_dynamic_sections
3833 #define elf_backend_finish_dynamic_sections   elf_s390_finish_dynamic_sections
3834 #define elf_backend_finish_dynamic_symbol     elf_s390_finish_dynamic_symbol
3835 #define elf_backend_gc_mark_hook	      elf_s390_gc_mark_hook
3836 #define elf_backend_gc_sweep_hook	      elf_s390_gc_sweep_hook
3837 #define elf_backend_reloc_type_class	      elf_s390_reloc_type_class
3838 #define elf_backend_relocate_section	      elf_s390_relocate_section
3839 #define elf_backend_size_dynamic_sections     elf_s390_size_dynamic_sections
3840 #define elf_backend_init_index_section	      _bfd_elf_init_1_index_section
3841 #define elf_backend_plt_sym_val		      elf_s390_plt_sym_val
3842 #define elf_backend_add_symbol_hook           elf_s390_add_symbol_hook
3843 
3844 #define bfd_elf64_mkobject		elf_s390_mkobject
3845 #define elf_backend_object_p		elf_s390_object_p
3846 
3847 /* Enable ELF64 archive functions.  */
3848 #define bfd_elf64_archive_functions
3849 extern bfd_boolean bfd_elf64_archive_slurp_armap (bfd *);
3850 extern bfd_boolean bfd_elf64_archive_write_armap (bfd *, unsigned int, struct orl *, unsigned int, int);
3851 
3852 #define bfd_elf64_archive_slurp_extended_name_table 	_bfd_archive_coff_slurp_extended_name_table
3853 #define bfd_elf64_archive_construct_extended_name_table _bfd_archive_coff_construct_extended_name_table
3854 #define bfd_elf64_archive_truncate_arname 		_bfd_archive_coff_truncate_arname
3855 #define bfd_elf64_archive_read_ar_hdr			_bfd_archive_coff_read_ar_hdr
3856 #define bfd_elf64_archive_write_ar_hdr			_bfd_archive_coff_write_ar_hdr
3857 #define bfd_elf64_archive_openr_next_archived_file 	_bfd_archive_coff_openr_next_archived_file
3858 #define bfd_elf64_archive_get_elt_at_index 		_bfd_archive_coff_get_elt_at_index
3859 #define bfd_elf64_archive_generic_stat_arch_elt 	_bfd_archive_coff_generic_stat_arch_elt
3860 #define bfd_elf64_archive_update_armap_timestamp 	_bfd_archive_coff_update_armap_timestamp
3861 
3862 #include "elf64-target.h"
3863