xref: /netbsd-src/external/gpl3/binutils.old/dist/bfd/elf32-s390.c (revision 3f351f34c6d827cf017cdcff3543f6ec0c88b420)
1 /* IBM S/390-specific support for 32-bit ELF
2    Copyright (C) 2000-2020 Free Software Foundation, Inc.
3    Contributed by Carl B. Pedersen and Martin Schwidefsky.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20    02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29 
30 static bfd_reloc_status_type
31 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 		asection *, bfd *, char **);
33 static bfd_reloc_status_type
34 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 		      asection *, bfd *, char **);
36 
37 /* The relocation "howto" table.  */
38 
39 static reloc_howto_type elf_howto_table[] =
40 {
41   HOWTO (R_390_NONE,		/* type */
42 	 0,			/* rightshift */
43 	 3,			/* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
44 	 0,			/* bitsize */
45 	 FALSE,			/* pc_relative */
46 	 0,			/* bitpos */
47 	 complain_overflow_dont, /* complain_on_overflow */
48 	 bfd_elf_generic_reloc, /* special_function */
49 	 "R_390_NONE",		/* name */
50 	 FALSE,			/* partial_inplace */
51 	 0,			/* src_mask */
52 	 0,			/* dst_mask */
53 	 FALSE),		/* pcrel_offset */
54 
55   HOWTO(R_390_8,	 0, 0,	8, FALSE, 0, complain_overflow_bitfield,
56 	bfd_elf_generic_reloc, "R_390_8",	 FALSE, 0,0x000000ff, FALSE),
57   HOWTO(R_390_12,	 0, 1, 12, FALSE, 0, complain_overflow_dont,
58 	bfd_elf_generic_reloc, "R_390_12",	 FALSE, 0,0x00000fff, FALSE),
59   HOWTO(R_390_16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
60 	bfd_elf_generic_reloc, "R_390_16",	 FALSE, 0,0x0000ffff, FALSE),
61   HOWTO(R_390_32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
62 	bfd_elf_generic_reloc, "R_390_32",	 FALSE, 0,0xffffffff, FALSE),
63   HOWTO(R_390_PC32,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
64 	bfd_elf_generic_reloc, "R_390_PC32",	 FALSE, 0,0xffffffff, TRUE),
65   HOWTO(R_390_GOT12,	 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
66 	bfd_elf_generic_reloc, "R_390_GOT12",	 FALSE, 0,0x00000fff, FALSE),
67   HOWTO(R_390_GOT32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
68 	bfd_elf_generic_reloc, "R_390_GOT32",	 FALSE, 0,0xffffffff, FALSE),
69   HOWTO(R_390_PLT32,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
70 	bfd_elf_generic_reloc, "R_390_PLT32",	 FALSE, 0,0xffffffff, TRUE),
71   HOWTO(R_390_COPY,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
72 	bfd_elf_generic_reloc, "R_390_COPY",	 FALSE, 0,0xffffffff, FALSE),
73   HOWTO(R_390_GLOB_DAT,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
74 	bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,0xffffffff, FALSE),
75   HOWTO(R_390_JMP_SLOT,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
76 	bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,0xffffffff, FALSE),
77   HOWTO(R_390_RELATIVE,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
78 	bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,0xffffffff, FALSE),
79   HOWTO(R_390_GOTOFF32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
80 	bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,0xffffffff, FALSE),
81   HOWTO(R_390_GOTPC,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
82 	bfd_elf_generic_reloc, "R_390_GOTPC",	 FALSE, 0,0xffffffff, TRUE),
83   HOWTO(R_390_GOT16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
84 	bfd_elf_generic_reloc, "R_390_GOT16",	 FALSE, 0,0x0000ffff, FALSE),
85   HOWTO(R_390_PC16,	 0, 1, 16,  TRUE, 0, complain_overflow_bitfield,
86 	bfd_elf_generic_reloc, "R_390_PC16",	 FALSE, 0,0x0000ffff, TRUE),
87   HOWTO(R_390_PC16DBL,	 1, 1, 16,  TRUE, 0, complain_overflow_bitfield,
88 	bfd_elf_generic_reloc, "R_390_PC16DBL",	 FALSE, 0,0x0000ffff, TRUE),
89   HOWTO(R_390_PLT16DBL,	 1, 1, 16,  TRUE, 0, complain_overflow_bitfield,
90 	bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
91   HOWTO(R_390_PC32DBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
92 	bfd_elf_generic_reloc, "R_390_PC32DBL",	 FALSE, 0,0xffffffff, TRUE),
93   HOWTO(R_390_PLT32DBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
94 	bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
95   HOWTO(R_390_GOTPCDBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
96 	bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,0xffffffff, TRUE),
97   EMPTY_HOWTO (R_390_64),	/* Empty entry for R_390_64.  */
98   EMPTY_HOWTO (R_390_PC64),	/* Empty entry for R_390_PC64.  */
99   EMPTY_HOWTO (R_390_GOT64),	/* Empty entry for R_390_GOT64.  */
100   EMPTY_HOWTO (R_390_PLT64),	/* Empty entry for R_390_PLT64.  */
101   HOWTO(R_390_GOTENT,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
102 	bfd_elf_generic_reloc, "R_390_GOTENT",	 FALSE, 0,0xffffffff, TRUE),
103   HOWTO(R_390_GOTOFF16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
104 	bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
105   EMPTY_HOWTO (R_390_GOTOFF64),	/* Empty entry for R_390_GOTOFF64.  */
106   HOWTO(R_390_GOTPLT12,	 0, 1, 12, FALSE, 0, complain_overflow_dont,
107 	bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
108   HOWTO(R_390_GOTPLT16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
109 	bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
110   HOWTO(R_390_GOTPLT32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
111 	bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
112   EMPTY_HOWTO (R_390_GOTPLT64),	/* Empty entry for R_390_GOTPLT64.  */
113   HOWTO(R_390_GOTPLTENT, 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
114 	bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,0xffffffff, TRUE),
115   HOWTO(R_390_PLTOFF16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
116 	bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
117   HOWTO(R_390_PLTOFF32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
118 	bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
119   EMPTY_HOWTO (R_390_PLTOFF64),	/* Empty entry for R_390_PLTOFF64.  */
120   HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
121 	s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
122   HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
123 	s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
124   HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
125 	s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
126   HOWTO(R_390_TLS_GD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 	bfd_elf_generic_reloc, "R_390_TLS_GD32", FALSE, 0, 0xffffffff, FALSE),
128   EMPTY_HOWTO (R_390_TLS_GD64),	/* Empty entry for R_390_TLS_GD64.  */
129   HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
130 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
131   HOWTO(R_390_TLS_GOTIE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", FALSE, 0, 0xffffffff, FALSE),
133   EMPTY_HOWTO (R_390_TLS_GOTIE64),	/* Empty entry for R_390_TLS_GOTIE64.  */
134   HOWTO(R_390_TLS_LDM32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
135 	bfd_elf_generic_reloc, "R_390_TLS_LDM32", FALSE, 0, 0xffffffff, FALSE),
136   EMPTY_HOWTO (R_390_TLS_LDM64),	/* Empty entry for R_390_TLS_LDM64.  */
137   HOWTO(R_390_TLS_IE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 	bfd_elf_generic_reloc, "R_390_TLS_IE32", FALSE, 0, 0xffffffff, FALSE),
139   EMPTY_HOWTO (R_390_TLS_IE64),	/* Empty entry for R_390_TLS_IE64.  */
140   HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
141 	bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, 0xffffffff, TRUE),
142   HOWTO(R_390_TLS_LE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
143 	bfd_elf_generic_reloc, "R_390_TLS_LE32", FALSE, 0, 0xffffffff, FALSE),
144   EMPTY_HOWTO (R_390_TLS_LE64),	/* Empty entry for R_390_TLS_LE64.  */
145   HOWTO(R_390_TLS_LDO32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
146 	bfd_elf_generic_reloc, "R_390_TLS_LDO32", FALSE, 0, 0xffffffff, FALSE),
147   EMPTY_HOWTO (R_390_TLS_LDO64),	/* Empty entry for R_390_TLS_LDO64.  */
148   HOWTO(R_390_TLS_DTPMOD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
149 	bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, 0xffffffff, FALSE),
150   HOWTO(R_390_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
151 	bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, 0xffffffff, FALSE),
152   HOWTO(R_390_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
153 	bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, 0xffffffff, FALSE),
154   HOWTO(R_390_20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
155 	s390_elf_ldisp_reloc, "R_390_20",      FALSE, 0,0x0fffff00, FALSE),
156   HOWTO(R_390_GOT20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
157 	s390_elf_ldisp_reloc, "R_390_GOT20",   FALSE, 0,0x0fffff00, FALSE),
158   HOWTO(R_390_GOTPLT20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
159 	s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
160   HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
161 	s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
162   HOWTO(R_390_IRELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
163 	bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, 0xffffffff, FALSE),
164   HOWTO(R_390_PC12DBL,	 1, 1, 12,  TRUE, 0, complain_overflow_bitfield,
165 	bfd_elf_generic_reloc, "R_390_PC12DBL",	 FALSE, 0,0x00000fff, TRUE),
166   HOWTO(R_390_PLT12DBL,	 1, 1, 12,  TRUE, 0, complain_overflow_bitfield,
167 	bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
168   HOWTO(R_390_PC24DBL,	 1, 2, 24,  TRUE, 0, complain_overflow_bitfield,
169 	bfd_elf_generic_reloc, "R_390_PC24DBL",	 FALSE, 0,0x00ffffff, TRUE),
170   HOWTO(R_390_PLT24DBL,	 1, 2, 24,  TRUE, 0, complain_overflow_bitfield,
171 	bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
172 };
173 
174 /* GNU extension to record C++ vtable hierarchy.  */
175 static reloc_howto_type elf32_s390_vtinherit_howto =
176   HOWTO (R_390_GNU_VTINHERIT, 0,2,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
177 static reloc_howto_type elf32_s390_vtentry_howto =
178   HOWTO (R_390_GNU_VTENTRY, 0,2,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
179 
180 static reloc_howto_type *
181 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 			    bfd_reloc_code_real_type code)
183 {
184   switch (code)
185     {
186     case BFD_RELOC_NONE:
187       return &elf_howto_table[(int) R_390_NONE];
188     case BFD_RELOC_8:
189       return &elf_howto_table[(int) R_390_8];
190     case BFD_RELOC_390_12:
191       return &elf_howto_table[(int) R_390_12];
192     case BFD_RELOC_16:
193       return &elf_howto_table[(int) R_390_16];
194     case BFD_RELOC_32:
195       return &elf_howto_table[(int) R_390_32];
196     case BFD_RELOC_CTOR:
197       return &elf_howto_table[(int) R_390_32];
198     case BFD_RELOC_32_PCREL:
199       return &elf_howto_table[(int) R_390_PC32];
200     case BFD_RELOC_390_GOT12:
201       return &elf_howto_table[(int) R_390_GOT12];
202     case BFD_RELOC_32_GOT_PCREL:
203       return &elf_howto_table[(int) R_390_GOT32];
204     case BFD_RELOC_390_PLT32:
205       return &elf_howto_table[(int) R_390_PLT32];
206     case BFD_RELOC_390_COPY:
207       return &elf_howto_table[(int) R_390_COPY];
208     case BFD_RELOC_390_GLOB_DAT:
209       return &elf_howto_table[(int) R_390_GLOB_DAT];
210     case BFD_RELOC_390_JMP_SLOT:
211       return &elf_howto_table[(int) R_390_JMP_SLOT];
212     case BFD_RELOC_390_RELATIVE:
213       return &elf_howto_table[(int) R_390_RELATIVE];
214     case BFD_RELOC_32_GOTOFF:
215       return &elf_howto_table[(int) R_390_GOTOFF32];
216     case BFD_RELOC_390_GOTPC:
217       return &elf_howto_table[(int) R_390_GOTPC];
218     case BFD_RELOC_390_GOT16:
219       return &elf_howto_table[(int) R_390_GOT16];
220     case BFD_RELOC_16_PCREL:
221       return &elf_howto_table[(int) R_390_PC16];
222     case BFD_RELOC_390_PC12DBL:
223       return &elf_howto_table[(int) R_390_PC12DBL];
224     case BFD_RELOC_390_PLT12DBL:
225       return &elf_howto_table[(int) R_390_PLT12DBL];
226     case BFD_RELOC_390_PC16DBL:
227       return &elf_howto_table[(int) R_390_PC16DBL];
228     case BFD_RELOC_390_PLT16DBL:
229       return &elf_howto_table[(int) R_390_PLT16DBL];
230     case BFD_RELOC_390_PC24DBL:
231       return &elf_howto_table[(int) R_390_PC24DBL];
232     case BFD_RELOC_390_PLT24DBL:
233       return &elf_howto_table[(int) R_390_PLT24DBL];
234     case BFD_RELOC_390_PC32DBL:
235       return &elf_howto_table[(int) R_390_PC32DBL];
236     case BFD_RELOC_390_PLT32DBL:
237       return &elf_howto_table[(int) R_390_PLT32DBL];
238     case BFD_RELOC_390_GOTPCDBL:
239       return &elf_howto_table[(int) R_390_GOTPCDBL];
240     case BFD_RELOC_390_GOTENT:
241       return &elf_howto_table[(int) R_390_GOTENT];
242     case BFD_RELOC_16_GOTOFF:
243       return &elf_howto_table[(int) R_390_GOTOFF16];
244     case BFD_RELOC_390_GOTPLT12:
245       return &elf_howto_table[(int) R_390_GOTPLT12];
246     case BFD_RELOC_390_GOTPLT16:
247       return &elf_howto_table[(int) R_390_GOTPLT16];
248     case BFD_RELOC_390_GOTPLT32:
249       return &elf_howto_table[(int) R_390_GOTPLT32];
250     case BFD_RELOC_390_GOTPLTENT:
251       return &elf_howto_table[(int) R_390_GOTPLTENT];
252     case BFD_RELOC_390_PLTOFF16:
253       return &elf_howto_table[(int) R_390_PLTOFF16];
254     case BFD_RELOC_390_PLTOFF32:
255       return &elf_howto_table[(int) R_390_PLTOFF32];
256     case BFD_RELOC_390_TLS_LOAD:
257       return &elf_howto_table[(int) R_390_TLS_LOAD];
258     case BFD_RELOC_390_TLS_GDCALL:
259       return &elf_howto_table[(int) R_390_TLS_GDCALL];
260     case BFD_RELOC_390_TLS_LDCALL:
261       return &elf_howto_table[(int) R_390_TLS_LDCALL];
262     case BFD_RELOC_390_TLS_GD32:
263       return &elf_howto_table[(int) R_390_TLS_GD32];
264     case BFD_RELOC_390_TLS_GOTIE12:
265       return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266     case BFD_RELOC_390_TLS_GOTIE32:
267       return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268     case BFD_RELOC_390_TLS_LDM32:
269       return &elf_howto_table[(int) R_390_TLS_LDM32];
270     case BFD_RELOC_390_TLS_IE32:
271       return &elf_howto_table[(int) R_390_TLS_IE32];
272     case BFD_RELOC_390_TLS_IEENT:
273       return &elf_howto_table[(int) R_390_TLS_IEENT];
274     case BFD_RELOC_390_TLS_LE32:
275       return &elf_howto_table[(int) R_390_TLS_LE32];
276     case BFD_RELOC_390_TLS_LDO32:
277       return &elf_howto_table[(int) R_390_TLS_LDO32];
278     case BFD_RELOC_390_TLS_DTPMOD:
279       return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280     case BFD_RELOC_390_TLS_DTPOFF:
281       return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282     case BFD_RELOC_390_TLS_TPOFF:
283       return &elf_howto_table[(int) R_390_TLS_TPOFF];
284     case BFD_RELOC_390_20:
285       return &elf_howto_table[(int) R_390_20];
286     case BFD_RELOC_390_GOT20:
287       return &elf_howto_table[(int) R_390_GOT20];
288     case BFD_RELOC_390_GOTPLT20:
289       return &elf_howto_table[(int) R_390_GOTPLT20];
290     case BFD_RELOC_390_TLS_GOTIE20:
291       return &elf_howto_table[(int) R_390_TLS_GOTIE20];
292     case BFD_RELOC_390_IRELATIVE:
293       return &elf_howto_table[(int) R_390_IRELATIVE];
294     case BFD_RELOC_VTABLE_INHERIT:
295       return &elf32_s390_vtinherit_howto;
296     case BFD_RELOC_VTABLE_ENTRY:
297       return &elf32_s390_vtentry_howto;
298     default:
299       break;
300     }
301   return 0;
302 }
303 
304 static reloc_howto_type *
305 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 			    const char *r_name)
307 {
308   unsigned int i;
309 
310   for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311     if (elf_howto_table[i].name != NULL
312 	&& strcasecmp (elf_howto_table[i].name, r_name) == 0)
313       return &elf_howto_table[i];
314 
315   if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316     return &elf32_s390_vtinherit_howto;
317   if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318     return &elf32_s390_vtentry_howto;
319 
320   return NULL;
321 }
322 
323 /* We need to use ELF32_R_TYPE so we have our own copy of this function,
324    and elf32-s390.c has its own copy.  */
325 
326 static bfd_boolean
327 elf_s390_info_to_howto (bfd *abfd,
328 			arelent *cache_ptr,
329 			Elf_Internal_Rela *dst)
330 {
331   unsigned int r_type = ELF32_R_TYPE(dst->r_info);
332 
333   switch (r_type)
334     {
335     case R_390_GNU_VTINHERIT:
336       cache_ptr->howto = &elf32_s390_vtinherit_howto;
337       break;
338 
339     case R_390_GNU_VTENTRY:
340       cache_ptr->howto = &elf32_s390_vtentry_howto;
341       break;
342 
343     default:
344       if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
345 	{
346 	  /* xgettext:c-format */
347 	  _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
348 			      abfd, r_type);
349 	  bfd_set_error (bfd_error_bad_value);
350 	  return FALSE;
351 	}
352       cache_ptr->howto = &elf_howto_table[r_type];
353     }
354 
355   return TRUE;
356 }
357 
358 /* A relocation function which doesn't do anything.  */
359 static bfd_reloc_status_type
360 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
361 		arelent *reloc_entry,
362 		asymbol *symbol ATTRIBUTE_UNUSED,
363 		void * data ATTRIBUTE_UNUSED,
364 		asection *input_section,
365 		bfd *output_bfd,
366 		char **error_message ATTRIBUTE_UNUSED)
367 {
368   if (output_bfd)
369     reloc_entry->address += input_section->output_offset;
370   return bfd_reloc_ok;
371 }
372 
373 /* Handle the large displacement relocs.  */
374 static bfd_reloc_status_type
375 s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
376 		      arelent *reloc_entry,
377 		      asymbol *symbol,
378 		      void * data ATTRIBUTE_UNUSED,
379 		      asection *input_section,
380 		      bfd *output_bfd,
381 		      char **error_message ATTRIBUTE_UNUSED)
382 {
383   reloc_howto_type *howto = reloc_entry->howto;
384   bfd_vma relocation;
385   bfd_vma insn;
386 
387   if (output_bfd != (bfd *) NULL
388       && (symbol->flags & BSF_SECTION_SYM) == 0
389       && (! howto->partial_inplace
390 	  || reloc_entry->addend == 0))
391     {
392       reloc_entry->address += input_section->output_offset;
393       return bfd_reloc_ok;
394     }
395 
396   if (output_bfd != NULL)
397     return bfd_reloc_continue;
398 
399   if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
400     return bfd_reloc_outofrange;
401 
402   relocation = (symbol->value
403 		+ symbol->section->output_section->vma
404 		+ symbol->section->output_offset);
405   relocation += reloc_entry->addend;
406   if (howto->pc_relative)
407     {
408       relocation -= (input_section->output_section->vma
409 		     + input_section->output_offset);
410       relocation -= reloc_entry->address;
411     }
412 
413   insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
414   insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
415   bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
416 
417   if ((bfd_signed_vma) relocation < - 0x80000
418       || (bfd_signed_vma) relocation > 0x7ffff)
419     return bfd_reloc_overflow;
420   else
421     return bfd_reloc_ok;
422 }
423 
424 static bfd_boolean
425 elf_s390_is_local_label_name (bfd *abfd, const char *name)
426 {
427   if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
428     return TRUE;
429 
430   return _bfd_elf_is_local_label_name (abfd, name);
431 }
432 
433 /* Functions for the 390 ELF linker.  */
434 
435 /* The name of the dynamic interpreter.  This is put in the .interp
436    section.  */
437 
438 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
439 
440 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
441    copying dynamic variables from a shared lib into an app's dynbss
442    section, and instead use a dynamic relocation to point into the
443    shared lib.  */
444 #define ELIMINATE_COPY_RELOCS 1
445 
446 /* The size in bytes of the first entry in the procedure linkage table.  */
447 #define PLT_FIRST_ENTRY_SIZE 32
448 /* The size in bytes of an entry in the procedure linkage table.  */
449 #define PLT_ENTRY_SIZE 32
450 
451 #define GOT_ENTRY_SIZE 4
452 
453 #define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
454 
455 /* The first three entries in a procedure linkage table are reserved,
456    and the initial contents are unimportant (we zero them out).
457    Subsequent entries look like this.  See the SVR4 ABI 386
458    supplement to see how this works.  */
459 
460 /* For the s390, simple addr offset can only be 0 - 4096.
461    To use the full 2 GB address space, several instructions
462    are needed to load an address in a register and execute
463    a branch( or just saving the address)
464 
465    Furthermore, only r 0 and 1 are free to use!!!  */
466 
467 /* The first 3 words in the GOT are then reserved.
468    Word 0 is the address of the dynamic table.
469    Word 1 is a pointer to a structure describing the object
470    Word 2 is used to point to the loader entry address.
471 
472    The code for position independent PLT entries looks like this:
473 
474    r12 holds addr of the current GOT at entry to the PLT
475 
476    The GOT holds the address in the PLT to be executed.
477    The loader then gets:
478    24(15) =  Pointer to the structure describing the object.
479    28(15) =  Offset into rela.plt
480 
481    The loader  must  then find the module where the function is
482    and insert the address in the GOT.
483 
484   Note: 390 can only address +- 64 K relative.
485 	We check if offset > 65536, then make a relative branch -64xxx
486 	back to a previous defined branch
487 
488 PLT1: BASR 1,0	       # 2 bytes
489       L	   1,22(1)     # 4 bytes  Load offset in GOT in r 1
490       L	   1,(1,12)    # 4 bytes  Load address from GOT in r1
491       BCR  15,1	       # 2 bytes  Jump to address
492 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
493       L	   1,14(1)     # 4 bytes  Load offset in symol table in r1
494       BRC  15,-x       # 4 bytes  Jump to start of PLT
495       .word 0	       # 2 bytes filler
496       .long ?	       # 4 bytes  offset in GOT
497       .long ?	       # 4 bytes  offset into rela.plt
498 
499   This was the general case. There are two additional, optimizes PLT
500   definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
501   First the one for GOT offsets < 4096:
502 
503 PLT1: L	   1,<offset>(12) # 4 bytes  Load address from GOT in R1
504       BCR  15,1		  # 2 bytes  Jump to address
505       .word 0,0,0	  # 6 bytes  filler
506 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
507       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
508       BRC  15,-x	  # 4 bytes  Jump to start of PLT
509       .word 0,0,0	  # 6 bytes  filler
510       .long ?		  # 4 bytes  offset into rela.plt
511 
512   Second the one for GOT offsets < 32768:
513 
514 PLT1: LHI  1,<offset>	  # 4 bytes  Load offset in GOT to r1
515       L	   1,(1,12)	  # 4 bytes  Load address from GOT to r1
516       BCR  15,1		  # 2 bytes  Jump to address
517       .word 0		  # 2 bytes  filler
518 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
519       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
520       BRC  15,-x	  # 4 bytes  Jump to start of PLT
521       .word 0,0,0	  # 6 bytes  filler
522       .long ?		  # 4 bytes  offset into rela.plt
523 
524 Total = 32 bytes per PLT entry
525 
526    The code for static build PLT entries looks like this:
527 
528 PLT1: BASR 1,0	       # 2 bytes
529       L	   1,22(1)     # 4 bytes  Load address of GOT entry
530       L	   1,0(0,1)    # 4 bytes  Load address from GOT in r1
531       BCR  15,1	       # 2 bytes  Jump to address
532 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
533       L	   1,14(1)     # 4 bytes  Load offset in symbol table in r1
534       BRC  15,-x       # 4 bytes  Jump to start of PLT
535       .word 0	       # 2 bytes  filler
536       .long ?	       # 4 bytes  address of GOT entry
537       .long ?	       # 4 bytes  offset into rela.plt  */
538 
539 static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
540   {
541     0x0d, 0x10,				    /* basr    %r1,%r0	   */
542     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1) */
543     0x58, 0x10, 0x10, 0x00,		    /* l       %r1,0(%r1)  */
544     0x07, 0xf1,				    /* br      %r1	   */
545     0x0d, 0x10,				    /* basr    %r1,%r0	   */
546     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1) */
547     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt   */
548     0x00, 0x00,				    /* padding		   */
549     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	   */
550     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	   */
551   };
552 
553 /* Generic PLT pic entry.  */
554 static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
555   {
556     0x0d, 0x10,				    /* basr    %r1,%r0	       */
557     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1)     */
558     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
559     0x07, 0xf1,				    /* br      %r1	       */
560     0x0d, 0x10,				    /* basr    %r1,%r0	       */
561     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
562     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
563     0x00, 0x00,				    /* padding		       */
564     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	       */
565     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	       */
566   };
567 
568 /* Optimized PLT pic entry for GOT offset < 4k.  xx will be replaced
569    when generating the PLT slot with the GOT offset.  */
570 static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
571   {
572     0x58, 0x10, 0xc0, 0x00,		    /* l       %r1,xx(%r12) */
573     0x07, 0xf1,				    /* br      %r1	    */
574     0x00, 0x00, 0x00, 0x00,		    /* padding		    */
575     0x00, 0x00,
576     0x0d, 0x10,				    /* basr    %r1,%r0	    */
577     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)  */
578     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt    */
579     0x00, 0x00, 0x00, 0x00,
580     0x00, 0x00, 0x00, 0x00
581   };
582 
583 /* Optimized PLT pic entry for GOT offset < 32k.  xx will be replaced
584    when generating the PLT slot with the GOT offset.  */
585 static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
586   {
587     0xa7, 0x18, 0x00, 0x00,		    /* lhi     %r1,xx	       */
588     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
589     0x07, 0xf1,				    /* br      %r1	       */
590     0x00, 0x00,
591     0x0d, 0x10,				    /* basr    %r1,%r0	       */
592     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
593     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
594     0x00, 0x00, 0x00, 0x00,
595     0x00, 0x00, 0x00, 0x00,
596     0x00, 0x00
597   };
598 
599 /* The first PLT entry pushes the offset into the rela.plt
600    from R1 onto the stack at 8(15) and the loader object info
601    at 12(15), loads the loader address in R1 and jumps to it.  */
602 
603 /* The first entry in the PLT for PIC code:
604 
605 PLT0:
606    ST	1,28(15)  # R1 has offset into rela.plt
607    L	1,4(12)	  # Get loader ino(object struct address)
608    ST	1,24(15)  # Store address
609    L	1,8(12)	  # Entry address of loader in R1
610    BR	1	  # Jump to loader
611 
612    The first entry in the PLT for static code:
613 
614 PLT0:
615    ST	1,28(15)      # R1 has offset into rela.plt
616    BASR 1,0
617    L	1,18(0,1)     # Get address of GOT
618    MVC	24(4,15),4(1) # Move loader ino to stack
619    L	1,8(1)	      # Get address of loader
620    BR	1	      # Jump to loader
621    .word 0	      # filler
622    .long got	      # address of GOT  */
623 
624 static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
625   {
626     0x50, 0x10, 0xf0, 0x1c,		      /* st	 %r1,28(%r15)	   */
627     0x0d, 0x10,				      /* basr	 %r1,%r0	   */
628     0x58, 0x10, 0x10, 0x12,		      /* l	 %r1,18(%r1)	   */
629     0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04,	      /* mvc	 24(4,%r15),4(%r1) */
630     0x58, 0x10, 0x10, 0x08,		      /* l	 %r1,8(%r1)	   */
631     0x07, 0xf1,				      /* br	 %r1		   */
632     0x00, 0x00, 0x00, 0x00,
633     0x00, 0x00, 0x00, 0x00,
634     0x00, 0x00
635   };
636 
637 static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
638   {
639     0x50, 0x10, 0xf0, 0x1c,			/* st	   %r1,28(%r15)	 */
640     0x58, 0x10, 0xc0, 0x04,			/* l	   %r1,4(%r12)	 */
641     0x50, 0x10, 0xf0, 0x18,			/* st	   %r1,24(%r15)	 */
642     0x58, 0x10, 0xc0, 0x08,			/* l	   %r1,8(%r12)	 */
643     0x07, 0xf1,					/* br	   %r1		 */
644     0x00, 0x00, 0x00, 0x00,
645     0x00, 0x00, 0x00, 0x00,
646     0x00, 0x00, 0x00, 0x00,
647     0x00, 0x00
648   };
649 
650 
651 /* s390 ELF linker hash entry.  */
652 
653 struct elf_s390_link_hash_entry
654 {
655   struct elf_link_hash_entry elf;
656 
657   /* Track dynamic relocs copied for this symbol.  */
658   struct elf_dyn_relocs *dyn_relocs;
659 
660   /* Number of GOTPLT references for a function.  */
661   bfd_signed_vma gotplt_refcount;
662 
663 #define GOT_UNKNOWN	0
664 #define GOT_NORMAL	1
665 #define GOT_TLS_GD	2
666 #define GOT_TLS_IE	3
667 #define GOT_TLS_IE_NLT	4
668   unsigned char tls_type;
669 
670   /* For pointer equality reasons we might need to change the symbol
671      type from STT_GNU_IFUNC to STT_FUNC together with its value and
672      section entry.  So after alloc_dynrelocs only these values should
673      be used.  In order to check whether a symbol is IFUNC use
674      s390_is_ifunc_symbol_p.  */
675   bfd_vma ifunc_resolver_address;
676   asection *ifunc_resolver_section;
677 };
678 
679 #define elf_s390_hash_entry(ent) \
680   ((struct elf_s390_link_hash_entry *)(ent))
681 
682 /* This structure represents an entry in the local PLT list needed for
683    local IFUNC symbols.  */
684 struct plt_entry
685 {
686   /* The section of the local symbol.
687      Set in relocate_section and used in finish_dynamic_sections.  */
688   asection *sec;
689 
690   union
691   {
692     bfd_signed_vma refcount;
693     bfd_vma offset;
694   } plt;
695 };
696 
697 /* NOTE: Keep this structure in sync with
698    the one declared in elf64-s390.c.  */
699 struct elf_s390_obj_tdata
700 {
701   struct elf_obj_tdata root;
702 
703   /* A local PLT is needed for ifunc symbols.  */
704   struct plt_entry *local_plt;
705 
706   /* TLS type for each local got entry.  */
707   char *local_got_tls_type;
708 };
709 
710 #define elf_s390_tdata(abfd) \
711   ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
712 
713 #define elf_s390_local_plt(abfd)		\
714   (elf_s390_tdata (abfd)->local_plt)
715 
716 #define elf_s390_local_got_tls_type(abfd) \
717   (elf_s390_tdata (abfd)->local_got_tls_type)
718 
719 #define is_s390_elf(bfd) \
720   (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
721    && elf_tdata (bfd) != NULL \
722    && elf_object_id (bfd) == S390_ELF_DATA)
723 
724 static bfd_boolean
725 elf_s390_mkobject (bfd *abfd)
726 {
727   return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
728 				  S390_ELF_DATA);
729 }
730 
731 static bfd_boolean
732 elf_s390_object_p (bfd *abfd)
733 {
734   /* Set the right machine number for an s390 elf32 file.  */
735   return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
736 }
737 
738 /* s390 ELF linker hash table.  */
739 
740 struct elf_s390_link_hash_table
741 {
742   struct elf_link_hash_table elf;
743 
744   /* Short-cuts to get to dynamic linker sections.  */
745   asection *irelifunc;
746 
747   union
748   {
749     bfd_signed_vma refcount;
750     bfd_vma offset;
751   } tls_ldm_got;
752 
753   /* Small local sym cache.  */
754   struct sym_cache sym_cache;
755 };
756 
757 /* Get the s390 ELF linker hash table from a link_info structure.  */
758 
759 #define elf_s390_hash_table(p) \
760   (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
761   == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
762 
763 #undef ELF64
764 #include "elf-s390-common.c"
765 
766 /* Create an entry in an s390 ELF linker hash table.  */
767 
768 static struct bfd_hash_entry *
769 link_hash_newfunc (struct bfd_hash_entry *entry,
770 		   struct bfd_hash_table *table,
771 		   const char *string)
772 {
773   /* Allocate the structure if it has not already been allocated by a
774      subclass.  */
775   if (entry == NULL)
776     {
777       entry = bfd_hash_allocate (table,
778 				 sizeof (struct elf_s390_link_hash_entry));
779       if (entry == NULL)
780 	return entry;
781     }
782 
783   /* Call the allocation method of the superclass.  */
784   entry = _bfd_elf_link_hash_newfunc (entry, table, string);
785   if (entry != NULL)
786     {
787       struct elf_s390_link_hash_entry *eh;
788 
789       eh = (struct elf_s390_link_hash_entry *) entry;
790       eh->dyn_relocs = NULL;
791       eh->gotplt_refcount = 0;
792       eh->tls_type = GOT_UNKNOWN;
793       eh->ifunc_resolver_address = 0;
794       eh->ifunc_resolver_section = NULL;
795     }
796 
797   return entry;
798 }
799 
800 /* Create an s390 ELF linker hash table.  */
801 
802 static struct bfd_link_hash_table *
803 elf_s390_link_hash_table_create (bfd *abfd)
804 {
805   struct elf_s390_link_hash_table *ret;
806   bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
807 
808   ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
809   if (ret == NULL)
810     return NULL;
811 
812   if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
813 				      sizeof (struct elf_s390_link_hash_entry),
814 				      S390_ELF_DATA))
815     {
816       free (ret);
817       return NULL;
818     }
819 
820   return &ret->elf.root;
821 }
822 
823 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
824 
825 static void
826 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
827 			       struct elf_link_hash_entry *dir,
828 			       struct elf_link_hash_entry *ind)
829 {
830   struct elf_s390_link_hash_entry *edir, *eind;
831 
832   edir = (struct elf_s390_link_hash_entry *) dir;
833   eind = (struct elf_s390_link_hash_entry *) ind;
834 
835   if (eind->dyn_relocs != NULL)
836     {
837       if (edir->dyn_relocs != NULL)
838 	{
839 	  struct elf_dyn_relocs **pp;
840 	  struct elf_dyn_relocs *p;
841 
842 	  /* Add reloc counts against the indirect sym to the direct sym
843 	     list.  Merge any entries against the same section.  */
844 	  for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
845 	    {
846 	      struct elf_dyn_relocs *q;
847 
848 	      for (q = edir->dyn_relocs; q != NULL; q = q->next)
849 		if (q->sec == p->sec)
850 		  {
851 		    q->pc_count += p->pc_count;
852 		    q->count += p->count;
853 		    *pp = p->next;
854 		    break;
855 		  }
856 	      if (q == NULL)
857 		pp = &p->next;
858 	    }
859 	  *pp = edir->dyn_relocs;
860 	}
861 
862       edir->dyn_relocs = eind->dyn_relocs;
863       eind->dyn_relocs = NULL;
864     }
865 
866   if (ind->root.type == bfd_link_hash_indirect
867       && dir->got.refcount <= 0)
868     {
869       edir->tls_type = eind->tls_type;
870       eind->tls_type = GOT_UNKNOWN;
871     }
872 
873   if (ELIMINATE_COPY_RELOCS
874       && ind->root.type != bfd_link_hash_indirect
875       && dir->dynamic_adjusted)
876     {
877       /* If called to transfer flags for a weakdef during processing
878 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
879 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
880       if (dir->versioned != versioned_hidden)
881 	dir->ref_dynamic |= ind->ref_dynamic;
882       dir->ref_regular |= ind->ref_regular;
883       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
884       dir->needs_plt |= ind->needs_plt;
885     }
886   else
887     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
888 }
889 
890 static int
891 elf_s390_tls_transition (struct bfd_link_info *info,
892 			 int r_type,
893 			 int is_local)
894 {
895   if (bfd_link_pic (info))
896     return r_type;
897 
898   switch (r_type)
899     {
900     case R_390_TLS_GD32:
901     case R_390_TLS_IE32:
902       if (is_local)
903 	return R_390_TLS_LE32;
904       return R_390_TLS_IE32;
905     case R_390_TLS_GOTIE32:
906       if (is_local)
907 	return R_390_TLS_LE32;
908       return R_390_TLS_GOTIE32;
909     case R_390_TLS_LDM32:
910       return R_390_TLS_LE32;
911     }
912 
913   return r_type;
914 }
915 
916 /* Look through the relocs for a section during the first phase, and
917    allocate space in the global offset table or procedure linkage
918    table.  */
919 
920 static bfd_boolean
921 elf_s390_check_relocs (bfd *abfd,
922 		       struct bfd_link_info *info,
923 		       asection *sec,
924 		       const Elf_Internal_Rela *relocs)
925 {
926   struct elf_s390_link_hash_table *htab;
927   Elf_Internal_Shdr *symtab_hdr;
928   struct elf_link_hash_entry **sym_hashes;
929   const Elf_Internal_Rela *rel;
930   const Elf_Internal_Rela *rel_end;
931   asection *sreloc;
932   bfd_signed_vma *local_got_refcounts;
933   int tls_type, old_tls_type;
934   Elf_Internal_Sym *isym;
935 
936   if (bfd_link_relocatable (info))
937     return TRUE;
938 
939   BFD_ASSERT (is_s390_elf (abfd));
940 
941   htab = elf_s390_hash_table (info);
942   symtab_hdr = &elf_symtab_hdr (abfd);
943   sym_hashes = elf_sym_hashes (abfd);
944   local_got_refcounts = elf_local_got_refcounts (abfd);
945 
946   sreloc = NULL;
947 
948   rel_end = relocs + sec->reloc_count;
949   for (rel = relocs; rel < rel_end; rel++)
950     {
951       unsigned int r_type;
952       unsigned int r_symndx;
953       struct elf_link_hash_entry *h;
954 
955       r_symndx = ELF32_R_SYM (rel->r_info);
956 
957       if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
958 	{
959 	  /* xgettext:c-format */
960 	  _bfd_error_handler (_("%pB: bad symbol index: %d"),
961 			      abfd, r_symndx);
962 	  return FALSE;
963 	}
964 
965       if (r_symndx < symtab_hdr->sh_info)
966 	{
967 	  /* A local symbol.  */
968 	  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
969 					abfd, r_symndx);
970 	  if (isym == NULL)
971 	    return FALSE;
972 
973 	  if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
974 	    {
975 	      struct plt_entry *plt;
976 
977 	      if (htab->elf.dynobj == NULL)
978 		htab->elf.dynobj = abfd;
979 
980 	      if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
981 		return FALSE;
982 
983 	      if (local_got_refcounts == NULL)
984 		{
985 		  if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
986 		    return FALSE;
987 		  local_got_refcounts = elf_local_got_refcounts (abfd);
988 		}
989 	      plt = elf_s390_local_plt (abfd);
990 	      plt[r_symndx].plt.refcount++;
991 	    }
992 	  h = NULL;
993 	}
994       else
995 	{
996 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
997 	  while (h->root.type == bfd_link_hash_indirect
998 		 || h->root.type == bfd_link_hash_warning)
999 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
1000 	}
1001 
1002       /* Create got section and local_got_refcounts array if they
1003 	 are needed.  */
1004       r_type = elf_s390_tls_transition (info,
1005 					ELF32_R_TYPE (rel->r_info),
1006 					h == NULL);
1007       switch (r_type)
1008 	{
1009 	case R_390_GOT12:
1010 	case R_390_GOT16:
1011 	case R_390_GOT20:
1012 	case R_390_GOT32:
1013 	case R_390_GOTENT:
1014 	case R_390_GOTPLT12:
1015 	case R_390_GOTPLT16:
1016 	case R_390_GOTPLT20:
1017 	case R_390_GOTPLT32:
1018 	case R_390_GOTPLTENT:
1019 	case R_390_TLS_GD32:
1020 	case R_390_TLS_GOTIE12:
1021 	case R_390_TLS_GOTIE20:
1022 	case R_390_TLS_GOTIE32:
1023 	case R_390_TLS_IEENT:
1024 	case R_390_TLS_IE32:
1025 	case R_390_TLS_LDM32:
1026 	  if (h == NULL
1027 	      && local_got_refcounts == NULL)
1028 	    {
1029 	      if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
1030 		return FALSE;
1031 	      local_got_refcounts = elf_local_got_refcounts (abfd);
1032 	    }
1033 	  /* Fall through.  */
1034 	case R_390_GOTOFF16:
1035 	case R_390_GOTOFF32:
1036 	case R_390_GOTPC:
1037 	case R_390_GOTPCDBL:
1038 	  if (htab->elf.sgot == NULL)
1039 	    {
1040 	      if (htab->elf.dynobj == NULL)
1041 		htab->elf.dynobj = abfd;
1042 	      if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
1043 		return FALSE;
1044 	    }
1045 	}
1046 
1047       if (h != NULL)
1048 	{
1049 	  if (htab->elf.dynobj == NULL)
1050 	    htab->elf.dynobj = abfd;
1051 	  if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1052 	    return FALSE;
1053 
1054 	  /* Make sure an IFUNC symbol defined in a non-shared object
1055 	     always gets a PLT slot.  */
1056 	  if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1057 	    {
1058 	      /* The symbol is called by the dynamic loader in order
1059 		 to resolve the relocation.  So it is in fact also
1060 		 referenced.  */
1061 	      h->ref_regular = 1;
1062 	      h->needs_plt = 1;
1063 	    }
1064 	}
1065       switch (r_type)
1066 	{
1067 	case R_390_GOTPC:
1068 	case R_390_GOTPCDBL:
1069 	  /* These relocs do not need a GOT slot.  They just load the
1070 	     GOT pointer itself or address something else relative to
1071 	     the GOT.  Since the GOT pointer has been set up above we
1072 	     are done.  */
1073 	  break;
1074 	case R_390_GOTOFF16:
1075 	case R_390_GOTOFF32:
1076 	  if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1077 	    break;
1078 	  /* Fall through.  */
1079 
1080 	case R_390_PLT12DBL:
1081 	case R_390_PLT16DBL:
1082 	case R_390_PLT24DBL:
1083 	case R_390_PLT32DBL:
1084 	case R_390_PLT32:
1085 	case R_390_PLTOFF16:
1086 	case R_390_PLTOFF32:
1087 	  /* This symbol requires a procedure linkage table entry.  We
1088 	     actually build the entry in adjust_dynamic_symbol,
1089 	     because this might be a case of linking PIC code which is
1090 	     never referenced by a dynamic object, in which case we
1091 	     don't need to generate a procedure linkage table entry
1092 	     after all.  */
1093 
1094 	  /* If this is a local symbol, we resolve it directly without
1095 	     creating a procedure linkage table entry.  */
1096 	  if (h != NULL)
1097 	    {
1098 	      h->needs_plt = 1;
1099 	      h->plt.refcount += 1;
1100 	    }
1101 	  break;
1102 
1103 	case R_390_GOTPLT12:
1104 	case R_390_GOTPLT16:
1105 	case R_390_GOTPLT20:
1106 	case R_390_GOTPLT32:
1107 	case R_390_GOTPLTENT:
1108 	  /* This symbol requires either a procedure linkage table entry
1109 	     or an entry in the local got. We actually build the entry
1110 	     in adjust_dynamic_symbol because whether this is really a
1111 	     global reference can change and with it the fact if we have
1112 	     to create a plt entry or a local got entry. To be able to
1113 	     make a once global symbol a local one we have to keep track
1114 	     of the number of gotplt references that exist for this
1115 	     symbol.  */
1116 	  if (h != NULL)
1117 	    {
1118 	      ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1119 	      h->needs_plt = 1;
1120 	      h->plt.refcount += 1;
1121 	    }
1122 	  else
1123 	    local_got_refcounts[r_symndx] += 1;
1124 	  break;
1125 
1126 	case R_390_TLS_LDM32:
1127 	  htab->tls_ldm_got.refcount += 1;
1128 	  break;
1129 
1130 	case R_390_TLS_IE32:
1131 	case R_390_TLS_GOTIE12:
1132 	case R_390_TLS_GOTIE20:
1133 	case R_390_TLS_GOTIE32:
1134 	case R_390_TLS_IEENT:
1135 	  if (bfd_link_pic (info))
1136 	    info->flags |= DF_STATIC_TLS;
1137 	  /* Fall through.  */
1138 
1139 	case R_390_GOT12:
1140 	case R_390_GOT16:
1141 	case R_390_GOT20:
1142 	case R_390_GOT32:
1143 	case R_390_GOTENT:
1144 	case R_390_TLS_GD32:
1145 	  /* This symbol requires a global offset table entry.  */
1146 	  switch (r_type)
1147 	    {
1148 	    default:
1149 	    case R_390_GOT12:
1150 	    case R_390_GOT16:
1151 	    case R_390_GOT20:
1152 	    case R_390_GOT32:
1153 	    case R_390_GOTENT:
1154 	      tls_type = GOT_NORMAL;
1155 	      break;
1156 	    case R_390_TLS_GD32:
1157 	      tls_type = GOT_TLS_GD;
1158 	      break;
1159 	    case R_390_TLS_IE32:
1160 	    case R_390_TLS_GOTIE32:
1161 	      tls_type = GOT_TLS_IE;
1162 	      break;
1163 	    case R_390_TLS_GOTIE12:
1164 	    case R_390_TLS_GOTIE20:
1165 	    case R_390_TLS_IEENT:
1166 	      tls_type = GOT_TLS_IE_NLT;
1167 	      break;
1168 	    }
1169 
1170 	  if (h != NULL)
1171 	    {
1172 	      h->got.refcount += 1;
1173 	      old_tls_type = elf_s390_hash_entry(h)->tls_type;
1174 	    }
1175 	  else
1176 	    {
1177 	      local_got_refcounts[r_symndx] += 1;
1178 	      old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1179 	    }
1180 	  /* If a TLS symbol is accessed using IE at least once,
1181 	     there is no point to use dynamic model for it.  */
1182 	  if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1183 	    {
1184 	      if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1185 		{
1186 		  _bfd_error_handler
1187 		    /* xgettext:c-format */
1188 		    (_("%pB: `%s' accessed both as normal and thread local symbol"),
1189 		     abfd, h->root.root.string);
1190 		  return FALSE;
1191 		}
1192 	      if (old_tls_type > tls_type)
1193 		tls_type = old_tls_type;
1194 	    }
1195 
1196 	  if (old_tls_type != tls_type)
1197 	    {
1198 	      if (h != NULL)
1199 		elf_s390_hash_entry (h)->tls_type = tls_type;
1200 	      else
1201 		elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1202 	    }
1203 
1204 	  if (r_type != R_390_TLS_IE32)
1205 	    break;
1206 	  /* Fall through.  */
1207 
1208 	case R_390_TLS_LE32:
1209 	  /* For static linking and executables this reloc will be
1210 	     calculated at linktime otherwise a TLS_TPOFF runtime
1211 	     reloc will be generated.  */
1212 	  if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
1213 	    break;
1214 
1215 	  if (!bfd_link_pic (info))
1216 	    break;
1217 	  info->flags |= DF_STATIC_TLS;
1218 	  /* Fall through.  */
1219 
1220 	case R_390_8:
1221 	case R_390_16:
1222 	case R_390_32:
1223 	case R_390_PC16:
1224 	case R_390_PC12DBL:
1225 	case R_390_PC16DBL:
1226 	case R_390_PC24DBL:
1227 	case R_390_PC32DBL:
1228 	case R_390_PC32:
1229 	  if (h != NULL && bfd_link_executable (info))
1230 	    {
1231 	      /* If this reloc is in a read-only section, we might
1232 		 need a copy reloc.  We can't check reliably at this
1233 		 stage whether the section is read-only, as input
1234 		 sections have not yet been mapped to output sections.
1235 		 Tentatively set the flag for now, and correct in
1236 		 adjust_dynamic_symbol.  */
1237 	      h->non_got_ref = 1;
1238 
1239 	      if (!bfd_link_pic (info))
1240 		{
1241 		  /* We may need a .plt entry if the function this reloc
1242 		     refers to is in a shared lib.  */
1243 		  h->plt.refcount += 1;
1244 		}
1245 	    }
1246 
1247 	  /* If we are creating a shared library, and this is a reloc
1248 	     against a global symbol, or a non PC relative reloc
1249 	     against a local symbol, then we need to copy the reloc
1250 	     into the shared library.  However, if we are linking with
1251 	     -Bsymbolic, we do not need to copy a reloc against a
1252 	     global symbol which is defined in an object we are
1253 	     including in the link (i.e., DEF_REGULAR is set).  At
1254 	     this point we have not seen all the input files, so it is
1255 	     possible that DEF_REGULAR is not set now but will be set
1256 	     later (it is never cleared).  In case of a weak definition,
1257 	     DEF_REGULAR may be cleared later by a strong definition in
1258 	     a shared library. We account for that possibility below by
1259 	     storing information in the relocs_copied field of the hash
1260 	     table entry.  A similar situation occurs when creating
1261 	     shared libraries and symbol visibility changes render the
1262 	     symbol local.
1263 
1264 	     If on the other hand, we are creating an executable, we
1265 	     may need to keep relocations for symbols satisfied by a
1266 	     dynamic library if we manage to avoid copy relocs for the
1267 	     symbol.  */
1268 	  if ((bfd_link_pic (info)
1269 	       && (sec->flags & SEC_ALLOC) != 0
1270 	       && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
1271 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
1272 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
1273 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
1274 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
1275 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1276 		   || (h != NULL
1277 		       && (! SYMBOLIC_BIND (info, h)
1278 			   || h->root.type == bfd_link_hash_defweak
1279 			   || !h->def_regular))))
1280 	      || (ELIMINATE_COPY_RELOCS
1281 		  && !bfd_link_pic (info)
1282 		  && (sec->flags & SEC_ALLOC) != 0
1283 		  && h != NULL
1284 		  && (h->root.type == bfd_link_hash_defweak
1285 		      || !h->def_regular)))
1286 	    {
1287 	      struct elf_dyn_relocs *p;
1288 	      struct elf_dyn_relocs **head;
1289 
1290 	      /* We must copy these reloc types into the output file.
1291 		 Create a reloc section in dynobj and make room for
1292 		 this reloc.  */
1293 	      if (sreloc == NULL)
1294 		{
1295 		  if (htab->elf.dynobj == NULL)
1296 		    htab->elf.dynobj = abfd;
1297 
1298 		  sreloc = _bfd_elf_make_dynamic_reloc_section
1299 		    (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
1300 
1301 		  if (sreloc == NULL)
1302 		    return FALSE;
1303 		}
1304 
1305 	      /* If this is a global symbol, we count the number of
1306 		 relocations we need for this symbol.  */
1307 	      if (h != NULL)
1308 		{
1309 		  head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
1310 		}
1311 	      else
1312 		{
1313 		  /* Track dynamic relocs needed for local syms too.
1314 		     We really need local syms available to do this
1315 		     easily.  Oh well.  */
1316 		  asection *s;
1317 		  void *vpp;
1318 
1319 		  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1320 						abfd, r_symndx);
1321 		  if (isym == NULL)
1322 		    return FALSE;
1323 
1324 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1325 		  if (s == NULL)
1326 		    s = sec;
1327 
1328 		  vpp = &elf_section_data (s)->local_dynrel;
1329 		  head = (struct elf_dyn_relocs **) vpp;
1330 		}
1331 
1332 	      p = *head;
1333 	      if (p == NULL || p->sec != sec)
1334 		{
1335 		  bfd_size_type amt = sizeof *p;
1336 
1337 		  p = ((struct elf_dyn_relocs *)
1338 		       bfd_alloc (htab->elf.dynobj, amt));
1339 		  if (p == NULL)
1340 		    return FALSE;
1341 		  p->next = *head;
1342 		  *head = p;
1343 		  p->sec = sec;
1344 		  p->count = 0;
1345 		  p->pc_count = 0;
1346 		}
1347 
1348 	      p->count += 1;
1349 	      if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
1350 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
1351 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
1352 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
1353 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
1354 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1355 		p->pc_count += 1;
1356 	    }
1357 	  break;
1358 
1359 	  /* This relocation describes the C++ object vtable hierarchy.
1360 	     Reconstruct it for later use during GC.  */
1361 	case R_390_GNU_VTINHERIT:
1362 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1363 	    return FALSE;
1364 	  break;
1365 
1366 	  /* This relocation describes which C++ vtable entries are actually
1367 	     used.  Record for later use during GC.  */
1368 	case R_390_GNU_VTENTRY:
1369 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1370 	    return FALSE;
1371 	  break;
1372 
1373 	default:
1374 	  break;
1375 	}
1376     }
1377 
1378   return TRUE;
1379 }
1380 
1381 /* Return the section that should be marked against GC for a given
1382    relocation.  */
1383 
1384 static asection *
1385 elf_s390_gc_mark_hook (asection *sec,
1386 		       struct bfd_link_info *info,
1387 		       Elf_Internal_Rela *rel,
1388 		       struct elf_link_hash_entry *h,
1389 		       Elf_Internal_Sym *sym)
1390 {
1391   if (h != NULL)
1392     switch (ELF32_R_TYPE (rel->r_info))
1393       {
1394       case R_390_GNU_VTINHERIT:
1395       case R_390_GNU_VTENTRY:
1396 	return NULL;
1397       }
1398   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1399 
1400 }
1401 
1402 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1403    entry but we found we will not create any.  Called when we find we will
1404    not have any PLT for this symbol, by for example
1405    elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1406    or elf_s390_size_dynamic_sections if no dynamic sections will be
1407    created (we're only linking static objects).  */
1408 
1409 static void
1410 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1411 {
1412   if (h->elf.root.type == bfd_link_hash_warning)
1413     h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1414 
1415   if (h->gotplt_refcount <= 0)
1416     return;
1417 
1418   /* We simply add the number of gotplt references to the number
1419    * of got references for this symbol.  */
1420   h->elf.got.refcount += h->gotplt_refcount;
1421   h->gotplt_refcount = -1;
1422 }
1423 
1424 /* Find dynamic relocs for H that apply to read-only sections.  */
1425 
1426 static asection *
1427 readonly_dynrelocs (struct elf_link_hash_entry *h)
1428 {
1429   struct elf_dyn_relocs *p;
1430 
1431   for (p = elf_s390_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
1432     {
1433       asection *s = p->sec->output_section;
1434 
1435       if (s != NULL && (s->flags & SEC_READONLY) != 0)
1436 	return p->sec;
1437     }
1438   return NULL;
1439 }
1440 
1441 /* Adjust a symbol defined by a dynamic object and referenced by a
1442    regular object.  The current definition is in some section of the
1443    dynamic object, but we're not including those sections.  We have to
1444    change the definition to something the rest of the link can
1445    understand.  */
1446 
1447 static bfd_boolean
1448 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1449 				struct elf_link_hash_entry *h)
1450 {
1451   struct elf_s390_link_hash_table *htab;
1452   asection *s, *srel;
1453 
1454   /* STT_GNU_IFUNC symbol must go through PLT. */
1455   if (s390_is_ifunc_symbol_p (h))
1456     {
1457       /* All local STT_GNU_IFUNC references must be treated as local
1458 	 calls via local PLT.  */
1459       if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1460 	{
1461 	  bfd_size_type pc_count = 0, count = 0;
1462 	  struct elf_dyn_relocs **pp;
1463 	  struct elf_s390_link_hash_entry *eh;
1464 	  struct elf_dyn_relocs *p;
1465 
1466 	  eh = (struct elf_s390_link_hash_entry *) h;
1467 	  for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1468 	    {
1469 	      pc_count += p->pc_count;
1470 	      p->count -= p->pc_count;
1471 	      p->pc_count = 0;
1472 	      count += p->count;
1473 	      if (p->count == 0)
1474 		*pp = p->next;
1475 	      else
1476 		pp = &p->next;
1477 	    }
1478 
1479 	  if (pc_count || count)
1480 	    {
1481 	      h->needs_plt = 1;
1482 	      h->non_got_ref = 1;
1483 	      if (h->plt.refcount <= 0)
1484 		h->plt.refcount = 1;
1485 	      else
1486 		h->plt.refcount += 1;
1487 	    }
1488 	}
1489 
1490       if (h->plt.refcount <= 0)
1491 	{
1492 	  h->plt.offset = (bfd_vma) -1;
1493 	  h->needs_plt = 0;
1494 	}
1495       return TRUE;
1496     }
1497 
1498   /* If this is a function, put it in the procedure linkage table.  We
1499      will fill in the contents of the procedure linkage table later
1500      (although we could actually do it here).  */
1501   if (h->type == STT_FUNC
1502       || h->needs_plt)
1503     {
1504       if (h->plt.refcount <= 0
1505 	  || SYMBOL_CALLS_LOCAL (info, h)
1506 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1507 	      && h->root.type != bfd_link_hash_undefweak))
1508 	{
1509 	  /* This case can occur if we saw a PLT32 reloc in an input
1510 	     file, but the symbol was never referred to by a dynamic
1511 	     object, or if all references were garbage collected.  In
1512 	     such a case, we don't actually need to build a procedure
1513 	     linkage table, and we can just do a PC32 reloc instead.  */
1514 	  h->plt.offset = (bfd_vma) -1;
1515 	  h->needs_plt = 0;
1516 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1517 	}
1518 
1519       return TRUE;
1520     }
1521   else
1522     /* It's possible that we incorrectly decided a .plt reloc was
1523        needed for an R_390_PC32 reloc to a non-function sym in
1524        check_relocs.  We can't decide accurately between function and
1525        non-function syms in check-relocs;  Objects loaded later in
1526        the link may change h->type.  So fix it now.  */
1527     h->plt.offset = (bfd_vma) -1;
1528 
1529   /* If this is a weak symbol, and there is a real definition, the
1530      processor independent code will have arranged for us to see the
1531      real definition first, and we can just use the same value.  */
1532   if (h->is_weakalias)
1533     {
1534       struct elf_link_hash_entry *def = weakdef (h);
1535       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1536       h->root.u.def.section = def->root.u.def.section;
1537       h->root.u.def.value = def->root.u.def.value;
1538       if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1539 	h->non_got_ref = def->non_got_ref;
1540       return TRUE;
1541     }
1542 
1543   /* This is a reference to a symbol defined by a dynamic object which
1544      is not a function.  */
1545 
1546   /* If we are creating a shared library, we must presume that the
1547      only references to the symbol are via the global offset table.
1548      For such cases we need not do anything here; the relocations will
1549      be handled correctly by relocate_section.  */
1550   if (bfd_link_pic (info))
1551     return TRUE;
1552 
1553   /* If there are no references to this symbol that do not use the
1554      GOT, we don't need to generate a copy reloc.  */
1555   if (!h->non_got_ref)
1556     return TRUE;
1557 
1558   /* If -z nocopyreloc was given, we won't generate them either.  */
1559   if (info->nocopyreloc)
1560     {
1561       h->non_got_ref = 0;
1562       return TRUE;
1563     }
1564 
1565   /* If we don't find any dynamic relocs in read-only sections, then
1566      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
1567   if (ELIMINATE_COPY_RELOCS && !readonly_dynrelocs (h))
1568     {
1569       h->non_got_ref = 0;
1570       return TRUE;
1571     }
1572 
1573   /* We must allocate the symbol in our .dynbss section, which will
1574      become part of the .bss section of the executable.  There will be
1575      an entry for this symbol in the .dynsym section.  The dynamic
1576      object will contain position independent code, so all references
1577      from the dynamic object to this symbol will go through the global
1578      offset table.  The dynamic linker will use the .dynsym entry to
1579      determine the address it must put in the global offset table, so
1580      both the dynamic object and the regular object will refer to the
1581      same memory location for the variable.  */
1582 
1583   htab = elf_s390_hash_table (info);
1584 
1585   /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1586      copy the initial value out of the dynamic object and into the
1587      runtime process image.  */
1588   if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1589     {
1590       s = htab->elf.sdynrelro;
1591       srel = htab->elf.sreldynrelro;
1592     }
1593   else
1594     {
1595       s = htab->elf.sdynbss;
1596       srel = htab->elf.srelbss;
1597     }
1598   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1599     {
1600       srel->size += sizeof (Elf32_External_Rela);
1601       h->needs_copy = 1;
1602     }
1603 
1604   return _bfd_elf_adjust_dynamic_copy (info, h, s);
1605 }
1606 
1607 /* Allocate space in .plt, .got and associated reloc sections for
1608    dynamic relocs.  */
1609 
1610 static bfd_boolean
1611 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1612 {
1613   struct bfd_link_info *info;
1614   struct elf_s390_link_hash_table *htab;
1615   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
1616   struct elf_dyn_relocs *p;
1617 
1618   if (h->root.type == bfd_link_hash_indirect)
1619     return TRUE;
1620 
1621   info = (struct bfd_link_info *) inf;
1622   htab = elf_s390_hash_table (info);
1623 
1624   /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1625      here if it is defined and referenced in a non-shared object.  */
1626   if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1627     return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1628   else if (htab->elf.dynamic_sections_created
1629 	   && h->plt.refcount > 0)
1630     {
1631       /* Make sure this symbol is output as a dynamic symbol.
1632 	 Undefined weak syms won't yet be marked as dynamic.  */
1633       if (h->dynindx == -1
1634 	  && !h->forced_local)
1635 	{
1636 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1637 	    return FALSE;
1638 	}
1639 
1640       if (bfd_link_pic (info)
1641 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1642 	{
1643 	  asection *s = htab->elf.splt;
1644 
1645 	  /* If this is the first .plt entry, make room for the special
1646 	     first entry.  */
1647 	  if (s->size == 0)
1648 	    s->size += PLT_FIRST_ENTRY_SIZE;
1649 
1650 	  h->plt.offset = s->size;
1651 
1652 	  /* If this symbol is not defined in a regular file, and we are
1653 	     not generating a shared library, then set the symbol to this
1654 	     location in the .plt.  This is required to make function
1655 	     pointers compare as equal between the normal executable and
1656 	     the shared library.  */
1657 	  if (! bfd_link_pic (info)
1658 	      && !h->def_regular)
1659 	    {
1660 	      h->root.u.def.section = s;
1661 	      h->root.u.def.value = h->plt.offset;
1662 	    }
1663 
1664 	  /* Make room for this entry.  */
1665 	  s->size += PLT_ENTRY_SIZE;
1666 
1667 	  /* We also need to make an entry in the .got.plt section, which
1668 	     will be placed in the .got section by the linker script.  */
1669 	  htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1670 
1671 	  /* We also need to make an entry in the .rela.plt section.  */
1672 	  htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1673 	}
1674       else
1675 	{
1676 	  h->plt.offset = (bfd_vma) -1;
1677 	  h->needs_plt = 0;
1678 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1679 	}
1680     }
1681   else
1682     {
1683       h->plt.offset = (bfd_vma) -1;
1684       h->needs_plt = 0;
1685       elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1686     }
1687 
1688   /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1689      the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1690      to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1691      we can save the dynamic TLS relocation.  */
1692   if (h->got.refcount > 0
1693       && !bfd_link_pic (info)
1694       && h->dynindx == -1
1695       && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1696     {
1697       if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1698 	/* For the GOTIE access without a literal pool entry the offset has
1699 	   to be stored somewhere. The immediate value in the instruction
1700 	   is not bit enough so the value is stored in the got.  */
1701 	{
1702 	  h->got.offset = htab->elf.sgot->size;
1703 	  htab->elf.sgot->size += GOT_ENTRY_SIZE;
1704 	}
1705       else
1706 	h->got.offset = (bfd_vma) -1;
1707     }
1708   else if (h->got.refcount > 0)
1709     {
1710       asection *s;
1711       bfd_boolean dyn;
1712       int tls_type = elf_s390_hash_entry(h)->tls_type;
1713 
1714       /* Make sure this symbol is output as a dynamic symbol.
1715 	 Undefined weak syms won't yet be marked as dynamic.  */
1716       if (h->dynindx == -1
1717 	  && !h->forced_local)
1718 	{
1719 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1720 	    return FALSE;
1721 	}
1722 
1723       s = htab->elf.sgot;
1724       h->got.offset = s->size;
1725       s->size += GOT_ENTRY_SIZE;
1726       /* R_390_TLS_GD32 needs 2 consecutive GOT slots.  */
1727       if (tls_type == GOT_TLS_GD)
1728 	s->size += GOT_ENTRY_SIZE;
1729       dyn = htab->elf.dynamic_sections_created;
1730       /* R_390_TLS_IE32 needs one dynamic relocation,
1731 	 R_390_TLS_GD32 needs one if local symbol and two if global.  */
1732       if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1733 	  || tls_type >= GOT_TLS_IE)
1734 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1735       else if (tls_type == GOT_TLS_GD)
1736 	htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
1737       else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1738 		|| h->root.type != bfd_link_hash_undefweak)
1739 	       && (bfd_link_pic (info)
1740 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1741 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1742     }
1743   else
1744     h->got.offset = (bfd_vma) -1;
1745 
1746   if (eh->dyn_relocs == NULL)
1747     return TRUE;
1748 
1749   /* In the shared -Bsymbolic case, discard space allocated for
1750      dynamic pc-relative relocs against symbols which turn out to be
1751      defined in regular objects.  For the normal shared case, discard
1752      space for pc-relative relocs that have become local due to symbol
1753      visibility changes.  */
1754 
1755   if (bfd_link_pic (info))
1756     {
1757       if (SYMBOL_CALLS_LOCAL (info, h))
1758 	{
1759 	  struct elf_dyn_relocs **pp;
1760 
1761 	  for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1762 	    {
1763 	      p->count -= p->pc_count;
1764 	      p->pc_count = 0;
1765 	      if (p->count == 0)
1766 		*pp = p->next;
1767 	      else
1768 		pp = &p->next;
1769 	    }
1770 	}
1771 
1772       /* Also discard relocs on undefined weak syms with non-default
1773 	 visibility.  */
1774       if (eh->dyn_relocs != NULL
1775 	  && h->root.type == bfd_link_hash_undefweak)
1776 	{
1777 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1778 	      || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1779 	    eh->dyn_relocs = NULL;
1780 
1781 	  /* Make sure undefined weak symbols are output as a dynamic
1782 	     symbol in PIEs.  */
1783 	  else if (h->dynindx == -1
1784 		   && !h->forced_local)
1785 	    {
1786 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1787 		return FALSE;
1788 	    }
1789 	}
1790     }
1791   else if (ELIMINATE_COPY_RELOCS)
1792     {
1793       /* For the non-shared case, discard space for relocs against
1794 	 symbols which turn out to need copy relocs or are not
1795 	 dynamic.  */
1796 
1797       if (!h->non_got_ref
1798 	  && ((h->def_dynamic
1799 	       && !h->def_regular)
1800 	      || (htab->elf.dynamic_sections_created
1801 		  && (h->root.type == bfd_link_hash_undefweak
1802 		      || h->root.type == bfd_link_hash_undefined))))
1803 	{
1804 	  /* Make sure this symbol is output as a dynamic symbol.
1805 	     Undefined weak syms won't yet be marked as dynamic.  */
1806 	  if (h->dynindx == -1
1807 	      && !h->forced_local)
1808 	    {
1809 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1810 		return FALSE;
1811 	    }
1812 
1813 	  /* If that succeeded, we know we'll be keeping all the
1814 	     relocs.  */
1815 	  if (h->dynindx != -1)
1816 	    goto keep;
1817 	}
1818 
1819       eh->dyn_relocs = NULL;
1820 
1821     keep: ;
1822     }
1823 
1824   /* Finally, allocate space.  */
1825   for (p = eh->dyn_relocs; p != NULL; p = p->next)
1826     {
1827       asection *sreloc = elf_section_data (p->sec)->sreloc;
1828 
1829       sreloc->size += p->count * sizeof (Elf32_External_Rela);
1830     }
1831 
1832   return TRUE;
1833 }
1834 
1835 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
1836    read-only sections.  */
1837 
1838 static bfd_boolean
1839 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
1840 {
1841   asection *sec;
1842 
1843   if (h->root.type == bfd_link_hash_indirect)
1844     return TRUE;
1845 
1846   sec = readonly_dynrelocs (h);
1847   if (sec != NULL)
1848     {
1849       struct bfd_link_info *info = (struct bfd_link_info *) info_p;
1850 
1851       info->flags |= DF_TEXTREL;
1852       info->callbacks->minfo
1853 	(_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
1854 	 sec->owner, h->root.root.string, sec);
1855 
1856       /* Not an error, just cut short the traversal.  */
1857       return FALSE;
1858     }
1859   return TRUE;
1860 }
1861 
1862 /* Set the sizes of the dynamic sections.  */
1863 
1864 static bfd_boolean
1865 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1866 				struct bfd_link_info *info)
1867 {
1868   struct elf_s390_link_hash_table *htab;
1869   bfd *dynobj;
1870   asection *s;
1871   bfd_boolean relocs;
1872   bfd *ibfd;
1873 
1874   htab = elf_s390_hash_table (info);
1875   dynobj = htab->elf.dynobj;
1876   if (dynobj == NULL)
1877     abort ();
1878 
1879   if (htab->elf.dynamic_sections_created)
1880     {
1881       /* Set the contents of the .interp section to the interpreter.  */
1882       if (bfd_link_executable (info) && !info->nointerp)
1883 	{
1884 	  s = bfd_get_linker_section (dynobj, ".interp");
1885 	  if (s == NULL)
1886 	    abort ();
1887 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1888 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1889 	}
1890     }
1891 
1892   /* Set up .got offsets for local syms, and space for local dynamic
1893      relocs.  */
1894   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1895     {
1896       bfd_signed_vma *local_got;
1897       bfd_signed_vma *end_local_got;
1898       char *local_tls_type;
1899       bfd_size_type locsymcount;
1900       Elf_Internal_Shdr *symtab_hdr;
1901       asection *srela;
1902       struct plt_entry *local_plt;
1903       unsigned int i;
1904 
1905       if (! is_s390_elf (ibfd))
1906 	continue;
1907 
1908       for (s = ibfd->sections; s != NULL; s = s->next)
1909 	{
1910 	  struct elf_dyn_relocs *p;
1911 
1912 	  for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1913 	    {
1914 	      if (!bfd_is_abs_section (p->sec)
1915 		  && bfd_is_abs_section (p->sec->output_section))
1916 		{
1917 		  /* Input section has been discarded, either because
1918 		     it is a copy of a linkonce section or due to
1919 		     linker script /DISCARD/, so we'll be discarding
1920 		     the relocs too.  */
1921 		}
1922 	      else if (p->count != 0)
1923 		{
1924 		  srela = elf_section_data (p->sec)->sreloc;
1925 		  srela->size += p->count * sizeof (Elf32_External_Rela);
1926 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1927 		    info->flags |= DF_TEXTREL;
1928 		}
1929 	    }
1930 	}
1931 
1932       local_got = elf_local_got_refcounts (ibfd);
1933       if (!local_got)
1934 	continue;
1935 
1936       symtab_hdr = &elf_symtab_hdr (ibfd);
1937       locsymcount = symtab_hdr->sh_info;
1938       end_local_got = local_got + locsymcount;
1939       local_tls_type = elf_s390_local_got_tls_type (ibfd);
1940       s = htab->elf.sgot;
1941       srela = htab->elf.srelgot;
1942       for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1943 	{
1944 	  if (*local_got > 0)
1945 	    {
1946 	      *local_got = s->size;
1947 	      s->size += GOT_ENTRY_SIZE;
1948 	      if (*local_tls_type == GOT_TLS_GD)
1949 		s->size += GOT_ENTRY_SIZE;
1950 	      if (bfd_link_pic (info))
1951 		srela->size += sizeof (Elf32_External_Rela);
1952 	    }
1953 	  else
1954 	    *local_got = (bfd_vma) -1;
1955 	}
1956       local_plt = elf_s390_local_plt (ibfd);
1957       for (i = 0; i < symtab_hdr->sh_info; i++)
1958 	{
1959 	  if (local_plt[i].plt.refcount > 0)
1960 	    {
1961 	      local_plt[i].plt.offset = htab->elf.iplt->size;
1962 	      htab->elf.iplt->size += PLT_ENTRY_SIZE;
1963 	      htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1964 	      htab->elf.irelplt->size += RELA_ENTRY_SIZE;
1965 	    }
1966 	  else
1967 	    local_plt[i].plt.offset = (bfd_vma) -1;
1968 	}
1969     }
1970 
1971   if (htab->tls_ldm_got.refcount > 0)
1972     {
1973       /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
1974 	 relocs.  */
1975       htab->tls_ldm_got.offset = htab->elf.sgot->size;
1976       htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1977       htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1978     }
1979   else
1980     htab->tls_ldm_got.offset = -1;
1981 
1982   /* Allocate global sym .plt and .got entries, and space for global
1983      sym dynamic relocs.  */
1984   elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1985 
1986   /* We now have determined the sizes of the various dynamic sections.
1987      Allocate memory for them.  */
1988   relocs = FALSE;
1989   for (s = dynobj->sections; s != NULL; s = s->next)
1990     {
1991       if ((s->flags & SEC_LINKER_CREATED) == 0)
1992 	continue;
1993 
1994       if (s == htab->elf.splt
1995 	  || s == htab->elf.sgot
1996 	  || s == htab->elf.sgotplt
1997 	  || s == htab->elf.sdynbss
1998 	  || s == htab->elf.sdynrelro
1999 	  || s == htab->elf.iplt
2000 	  || s == htab->elf.igotplt
2001 	  || s == htab->irelifunc)
2002 	{
2003 	  /* Strip this section if we don't need it; see the
2004 	     comment below.  */
2005 	}
2006       else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
2007 	{
2008 	  if (s->size != 0)
2009 	    relocs = TRUE;
2010 
2011 	  /* We use the reloc_count field as a counter if we need
2012 	     to copy relocs into the output file.  */
2013 	  s->reloc_count = 0;
2014 	}
2015       else
2016 	{
2017 	  /* It's not one of our sections, so don't allocate space.  */
2018 	  continue;
2019 	}
2020 
2021       if (s->size == 0)
2022 	{
2023 	  /* If we don't need this section, strip it from the
2024 	     output file.  This is to handle .rela.bss and
2025 	     .rela.plt.  We must create it in
2026 	     create_dynamic_sections, because it must be created
2027 	     before the linker maps input sections to output
2028 	     sections.  The linker does that before
2029 	     adjust_dynamic_symbol is called, and it is that
2030 	     function which decides whether anything needs to go
2031 	     into these sections.  */
2032 
2033 	  s->flags |= SEC_EXCLUDE;
2034 	  continue;
2035 	}
2036 
2037       if ((s->flags & SEC_HAS_CONTENTS) == 0)
2038 	continue;
2039 
2040       /* Allocate memory for the section contents.  We use bfd_zalloc
2041 	 here in case unused entries are not reclaimed before the
2042 	 section's contents are written out.  This should not happen,
2043 	 but this way if it does, we get a R_390_NONE reloc instead
2044 	 of garbage.  */
2045       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2046       if (s->contents == NULL)
2047 	return FALSE;
2048     }
2049 
2050   if (htab->elf.dynamic_sections_created)
2051     {
2052       /* Add some entries to the .dynamic section.  We fill in the
2053 	 values later, in elf_s390_finish_dynamic_sections, but we
2054 	 must add the entries now so that we get the correct size for
2055 	 the .dynamic section.  The DT_DEBUG entry is filled in by the
2056 	 dynamic linker and used by the debugger.  */
2057 #define add_dynamic_entry(TAG, VAL) \
2058   _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2059 
2060       if (bfd_link_executable (info))
2061 	{
2062 	  if (!add_dynamic_entry (DT_DEBUG, 0))
2063 	    return FALSE;
2064 	}
2065 
2066       if (htab->elf.splt->size != 0)
2067 	{
2068 	  if (!add_dynamic_entry (DT_PLTGOT, 0)
2069 	      || !add_dynamic_entry (DT_PLTRELSZ, 0)
2070 	      || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2071 	      || !add_dynamic_entry (DT_JMPREL, 0))
2072 	    return FALSE;
2073 	}
2074 
2075       if (relocs)
2076 	{
2077 	  if (!add_dynamic_entry (DT_RELA, 0)
2078 	      || !add_dynamic_entry (DT_RELASZ, 0)
2079 	      || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
2080 	    return FALSE;
2081 
2082 	  /* If any dynamic relocs apply to a read-only section,
2083 	     then we need a DT_TEXTREL entry.  */
2084 	  if ((info->flags & DF_TEXTREL) == 0)
2085 	    elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
2086 
2087 	  if ((info->flags & DF_TEXTREL) != 0)
2088 	    {
2089 	      if (!add_dynamic_entry (DT_TEXTREL, 0))
2090 		return FALSE;
2091 	    }
2092 	}
2093     }
2094 #undef add_dynamic_entry
2095 
2096   return TRUE;
2097 }
2098 
2099 /* Return the base VMA address which should be subtracted from real addresses
2100    when resolving @dtpoff relocation.
2101    This is PT_TLS segment p_vaddr.  */
2102 
2103 static bfd_vma
2104 dtpoff_base (struct bfd_link_info *info)
2105 {
2106   /* If tls_sec is NULL, we should have signalled an error already.  */
2107   if (elf_hash_table (info)->tls_sec == NULL)
2108     return 0;
2109   return elf_hash_table (info)->tls_sec->vma;
2110 }
2111 
2112 /* Return the relocation value for @tpoff relocation
2113    if STT_TLS virtual address is ADDRESS.  */
2114 
2115 static bfd_vma
2116 tpoff (struct bfd_link_info *info, bfd_vma address)
2117 {
2118   struct elf_link_hash_table *htab = elf_hash_table (info);
2119 
2120   /* If tls_sec is NULL, we should have signalled an error already.  */
2121   if (htab->tls_sec == NULL)
2122     return 0;
2123   return htab->tls_size + htab->tls_sec->vma - address;
2124 }
2125 
2126 /* Complain if TLS instruction relocation is against an invalid
2127    instruction.  */
2128 
2129 static void
2130 invalid_tls_insn (bfd *input_bfd,
2131 		  asection *input_section,
2132 		  Elf_Internal_Rela *rel)
2133 {
2134   reloc_howto_type *howto;
2135 
2136   howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
2137   _bfd_error_handler
2138     /* xgettext:c-format */
2139     (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
2140      input_bfd,
2141      input_section,
2142      (uint64_t) rel->r_offset,
2143      howto->name);
2144   bfd_set_error (bfd_error_bad_value);
2145 }
2146 
2147 /* Relocate a 390 ELF section.  */
2148 
2149 static bfd_boolean
2150 elf_s390_relocate_section (bfd *output_bfd,
2151 			   struct bfd_link_info *info,
2152 			   bfd *input_bfd,
2153 			   asection *input_section,
2154 			   bfd_byte *contents,
2155 			   Elf_Internal_Rela *relocs,
2156 			   Elf_Internal_Sym *local_syms,
2157 			   asection **local_sections)
2158 {
2159   struct elf_s390_link_hash_table *htab;
2160   Elf_Internal_Shdr *symtab_hdr;
2161   struct elf_link_hash_entry **sym_hashes;
2162   bfd_vma *local_got_offsets;
2163   Elf_Internal_Rela *rel;
2164   Elf_Internal_Rela *relend;
2165 
2166   if (!is_s390_elf (input_bfd))
2167     {
2168       bfd_set_error (bfd_error_wrong_format);
2169       return FALSE;
2170     }
2171 
2172   htab = elf_s390_hash_table (info);
2173   symtab_hdr = &elf_symtab_hdr (input_bfd);
2174   sym_hashes = elf_sym_hashes (input_bfd);
2175   local_got_offsets = elf_local_got_offsets (input_bfd);
2176 
2177   rel = relocs;
2178   relend = relocs + input_section->reloc_count;
2179   for (; rel < relend; rel++)
2180     {
2181       unsigned int r_type;
2182       reloc_howto_type *howto;
2183       unsigned long r_symndx;
2184       struct elf_link_hash_entry *h;
2185       Elf_Internal_Sym *sym;
2186       asection *sec;
2187       bfd_vma off;
2188       bfd_vma relocation;
2189       bfd_boolean unresolved_reloc;
2190       bfd_reloc_status_type r;
2191       int tls_type;
2192       asection *base_got = htab->elf.sgot;
2193       bfd_boolean resolved_to_zero;
2194 
2195       r_type = ELF32_R_TYPE (rel->r_info);
2196       if (r_type == (int) R_390_GNU_VTINHERIT
2197 	  || r_type == (int) R_390_GNU_VTENTRY)
2198 	continue;
2199       if (r_type >= (int) R_390_max)
2200 	{
2201 	  bfd_set_error (bfd_error_bad_value);
2202 	  return FALSE;
2203 	}
2204 
2205       howto = elf_howto_table + r_type;
2206       r_symndx = ELF32_R_SYM (rel->r_info);
2207 
2208       h = NULL;
2209       sym = NULL;
2210       sec = NULL;
2211       unresolved_reloc = FALSE;
2212       if (r_symndx < symtab_hdr->sh_info)
2213 	{
2214 	  sym = local_syms + r_symndx;
2215 	  sec = local_sections[r_symndx];
2216 	  if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2217 	    {
2218 	      struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2219 	      if (local_plt == NULL)
2220 		return FALSE;
2221 
2222 	      /* Address of the PLT slot.  */
2223 	      relocation = (htab->elf.iplt->output_section->vma
2224 			    + htab->elf.iplt->output_offset
2225 			    + local_plt[r_symndx].plt.offset);
2226 
2227 	      switch (r_type)
2228 		{
2229 		case R_390_PLTOFF16:
2230 		case R_390_PLTOFF32:
2231 		  relocation -= htab->elf.sgot->output_section->vma;
2232 		  break;
2233 		case R_390_GOTPLT12:
2234 		case R_390_GOTPLT16:
2235 		case R_390_GOTPLT20:
2236 		case R_390_GOTPLT32:
2237 		case R_390_GOTPLTENT:
2238 		case R_390_GOT12:
2239 		case R_390_GOT16:
2240 		case R_390_GOT20:
2241 		case R_390_GOT32:
2242 		case R_390_GOTENT:
2243 		  {
2244 		    /* Write the PLT slot address into the GOT slot.  */
2245 		    bfd_put_32 (output_bfd, relocation,
2246 				htab->elf.sgot->contents +
2247 				local_got_offsets[r_symndx]);
2248 		    relocation = (local_got_offsets[r_symndx] +
2249 				  htab->elf.sgot->output_offset);
2250 
2251 		    if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2252 		      relocation += htab->elf.sgot->output_section->vma;
2253 		    break;
2254 		  }
2255 		default:
2256 		  break;
2257 		}
2258 	      /* The output section is needed later in
2259 		 finish_dynamic_section when creating the dynamic
2260 		 relocation.  */
2261 	      local_plt[r_symndx].sec = sec;
2262 	      goto do_relocation;
2263 	    }
2264 	  else
2265 	    relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2266 	}
2267       else
2268 	{
2269 	  bfd_boolean warned ATTRIBUTE_UNUSED;
2270 	  bfd_boolean ignored ATTRIBUTE_UNUSED;
2271 
2272 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2273 				   r_symndx, symtab_hdr, sym_hashes,
2274 				   h, sec, relocation,
2275 				   unresolved_reloc, warned, ignored);
2276 	}
2277 
2278       if (sec != NULL && discarded_section (sec))
2279 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2280 					 rel, 1, relend, howto, 0, contents);
2281 
2282       if (bfd_link_relocatable (info))
2283 	continue;
2284 
2285       resolved_to_zero = (h != NULL
2286 			  && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2287 
2288       switch (r_type)
2289 	{
2290 	case R_390_GOTPLT12:
2291 	case R_390_GOTPLT16:
2292 	case R_390_GOTPLT20:
2293 	case R_390_GOTPLT32:
2294 	case R_390_GOTPLTENT:
2295 	  /* There are three cases for a GOTPLT relocation. 1) The
2296 	     relocation is against the jump slot entry of a plt that
2297 	     will get emitted to the output file. 2) The relocation
2298 	     is against the jump slot of a plt entry that has been
2299 	     removed. elf_s390_adjust_gotplt has created a GOT entry
2300 	     as replacement. 3) The relocation is against a local symbol.
2301 	     Cases 2) and 3) are the same as the GOT relocation code
2302 	     so we just have to test for case 1 and fall through for
2303 	     the other two.  */
2304 	  if (h != NULL && h->plt.offset != (bfd_vma) -1)
2305 	    {
2306 	      bfd_vma plt_index;
2307 
2308 	      if (s390_is_ifunc_symbol_p (h))
2309 		{
2310 		  plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2311 		  relocation = (plt_index * GOT_ENTRY_SIZE +
2312 				htab->elf.igotplt->output_offset);
2313 		  if (r_type == R_390_GOTPLTENT)
2314 		    relocation += htab->elf.igotplt->output_section->vma;
2315 		}
2316 	      else
2317 		{
2318 		  /* Calc. index no.
2319 		     Current offset - size first entry / entry size.  */
2320 		  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2321 		    PLT_ENTRY_SIZE;
2322 
2323 		  /* Offset in GOT is PLT index plus GOT headers(3)
2324 		     times 4, addr & GOT addr.  */
2325 		  relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2326 		  if (r_type == R_390_GOTPLTENT)
2327 		    relocation += htab->elf.sgot->output_section->vma;
2328 		}
2329 	      unresolved_reloc = FALSE;
2330 
2331 	    }
2332 	  /* Fall through.  */
2333 
2334 	case R_390_GOT12:
2335 	case R_390_GOT16:
2336 	case R_390_GOT20:
2337 	case R_390_GOT32:
2338 	case R_390_GOTENT:
2339 	  /* Relocation is to the entry for this symbol in the global
2340 	     offset table.  */
2341 	  if (base_got == NULL)
2342 	    abort ();
2343 
2344 	  if (h != NULL)
2345 	    {
2346 	      bfd_boolean dyn;
2347 
2348 	      off = h->got.offset;
2349 	      dyn = htab->elf.dynamic_sections_created;
2350 
2351 	      if (s390_is_ifunc_symbol_p (h))
2352 		{
2353 		  BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2354 		  if (off == (bfd_vma)-1)
2355 		    {
2356 		      /* No explicit GOT usage so redirect to the
2357 			 got.iplt slot.  */
2358 		      base_got = htab->elf.igotplt;
2359 		      off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2360 		    }
2361 		  else
2362 		    {
2363 		      /* Explicit GOT slots must contain the address
2364 			 of the PLT slot. This will be handled in
2365 			 finish_dynamic_symbol.  */
2366 		    }
2367 		}
2368 	      else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2369 							  bfd_link_pic (info),
2370 							  h)
2371 		       || (bfd_link_pic (info)
2372 			   && SYMBOL_REFERENCES_LOCAL (info, h))
2373 		       || (ELF_ST_VISIBILITY (h->other)
2374 			   && h->root.type == bfd_link_hash_undefweak))
2375 
2376 		{
2377 		  /* This is actually a static link, or it is a
2378 		     -Bsymbolic link and the symbol is defined
2379 		     locally, or the symbol was forced to be local
2380 		     because of a version file.  We must initialize
2381 		     this entry in the global offset table.  Since the
2382 		     offset must always be a multiple of 2, we use the
2383 		     least significant bit to record whether we have
2384 		     initialized it already.
2385 
2386 		     When doing a dynamic link, we create a .rel.got
2387 		     relocation entry to initialize the value.  This
2388 		     is done in the finish_dynamic_symbol routine.  */
2389 		  if ((off & 1) != 0)
2390 		    off &= ~1;
2391 		  else
2392 		    {
2393 		      bfd_put_32 (output_bfd, relocation,
2394 				  base_got->contents + off);
2395 		      h->got.offset |= 1;
2396 		    }
2397 
2398 		  if ((h->def_regular
2399 		       && bfd_link_pic (info)
2400 		       && SYMBOL_REFERENCES_LOCAL (info, h))
2401 		      /* lrl rx,sym@GOTENT -> larl rx, sym */
2402 		      && ((r_type == R_390_GOTENT
2403 			   && (bfd_get_16 (input_bfd,
2404 					   contents + rel->r_offset - 2)
2405 			       & 0xff0f) == 0xc40d)
2406 			  /* ly rx, sym@GOT(r12) -> larl rx, sym */
2407 			  || (r_type == R_390_GOT20
2408 			      && (bfd_get_32 (input_bfd,
2409 					      contents + rel->r_offset - 2)
2410 				  & 0xff00f000) == 0xe300c000
2411 			      && bfd_get_8 (input_bfd,
2412 					    contents + rel->r_offset + 3) == 0x58)))
2413 		    {
2414 		      unsigned short new_insn =
2415 			(0xc000 | (bfd_get_8 (input_bfd,
2416 					      contents + rel->r_offset - 1) & 0xf0));
2417 		      bfd_put_16 (output_bfd, new_insn,
2418 				  contents + rel->r_offset - 2);
2419 		      r_type = R_390_PC32DBL;
2420 		      rel->r_addend = 2;
2421 		      howto = elf_howto_table + r_type;
2422 		      relocation = h->root.u.def.value
2423 			+ h->root.u.def.section->output_section->vma
2424 			+ h->root.u.def.section->output_offset;
2425 		      goto do_relocation;
2426 		    }
2427 		}
2428 	      else
2429 		unresolved_reloc = FALSE;
2430 	    }
2431 	  else
2432 	    {
2433 	      if (local_got_offsets == NULL)
2434 		abort ();
2435 
2436 	      off = local_got_offsets[r_symndx];
2437 
2438 	      /* The offset must always be a multiple of 4.  We use
2439 		 the least significant bit to record whether we have
2440 		 already generated the necessary reloc.  */
2441 	      if ((off & 1) != 0)
2442 		off &= ~1;
2443 	      else
2444 		{
2445 		  bfd_put_32 (output_bfd, relocation,
2446 			      htab->elf.sgot->contents + off);
2447 
2448 		  if (bfd_link_pic (info))
2449 		    {
2450 		      asection *srelgot;
2451 		      Elf_Internal_Rela outrel;
2452 		      bfd_byte *loc;
2453 
2454 		      srelgot = htab->elf.srelgot;
2455 		      if (srelgot == NULL)
2456 			abort ();
2457 
2458 		      outrel.r_offset = (htab->elf.sgot->output_section->vma
2459 					 + htab->elf.sgot->output_offset
2460 					 + off);
2461 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2462 		      outrel.r_addend = relocation;
2463 		      loc = srelgot->contents;
2464 		      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2465 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2466 		    }
2467 
2468 		  local_got_offsets[r_symndx] |= 1;
2469 		}
2470 	    }
2471 
2472 	  if (off >= (bfd_vma) -2)
2473 	    abort ();
2474 
2475 	  relocation = base_got->output_offset + off;
2476 
2477 	  /* For @GOTENT the relocation is against the offset between
2478 	     the instruction and the symbols entry in the GOT and not
2479 	     between the start of the GOT and the symbols entry. We
2480 	     add the vma of the GOT to get the correct value.  */
2481 	  if (   r_type == R_390_GOTENT
2482 	      || r_type == R_390_GOTPLTENT)
2483 	    relocation += base_got->output_section->vma;
2484 
2485 	  break;
2486 
2487 	case R_390_GOTOFF16:
2488 	case R_390_GOTOFF32:
2489 	  /* Relocation is relative to the start of the global offset
2490 	     table.  */
2491 
2492 	  if (h != NULL
2493 	      && s390_is_ifunc_symbol_p (h)
2494 	      && h->def_regular
2495 	      && !bfd_link_executable (info))
2496 	    {
2497 	      relocation = (htab->elf.iplt->output_section->vma
2498 			    + htab->elf.iplt->output_offset
2499 			    + h->plt.offset
2500 			    - htab->elf.sgot->output_section->vma);
2501 	      goto do_relocation;
2502 	    }
2503 
2504 	  /* Note that sgot->output_offset is not involved in this
2505 	     calculation.  We always want the start of .got.  If we
2506 	     defined _GLOBAL_OFFSET_TABLE in a different way, as is
2507 	     permitted by the ABI, we might have to change this
2508 	     calculation.  */
2509 	  relocation -= htab->elf.sgot->output_section->vma;
2510 	  break;
2511 
2512 	case R_390_GOTPC:
2513 	case R_390_GOTPCDBL:
2514 	  /* Use global offset table as symbol value.  */
2515 	  relocation = htab->elf.sgot->output_section->vma;
2516 	  unresolved_reloc = FALSE;
2517 	  break;
2518 
2519 	case R_390_PLT12DBL:
2520 	case R_390_PLT16DBL:
2521 	case R_390_PLT24DBL:
2522 	case R_390_PLT32DBL:
2523 	case R_390_PLT32:
2524 	  /* Relocation is to the entry for this symbol in the
2525 	     procedure linkage table.  */
2526 
2527 	  /* Resolve a PLT32 reloc against a local symbol directly,
2528 	     without using the procedure linkage table.  */
2529 	  if (h == NULL)
2530 	    break;
2531 
2532 	  if (h->plt.offset == (bfd_vma) -1
2533 	      || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
2534 	    {
2535 	      /* We didn't make a PLT entry for this symbol.  This
2536 		 happens when statically linking PIC code, or when
2537 		 using -Bsymbolic.  */
2538 	      break;
2539 	    }
2540 
2541 	  if (s390_is_ifunc_symbol_p (h))
2542 	    relocation = (htab->elf.iplt->output_section->vma
2543 			  + htab->elf.iplt->output_offset
2544 			  + h->plt.offset);
2545 	  else
2546 	    relocation = (htab->elf.splt->output_section->vma
2547 			  + htab->elf.splt->output_offset
2548 			  + h->plt.offset);
2549 	  unresolved_reloc = FALSE;
2550 	  break;
2551 
2552 	case R_390_PLTOFF16:
2553 	case R_390_PLTOFF32:
2554 	  /* Relocation is to the entry for this symbol in the
2555 	     procedure linkage table relative to the start of the GOT.  */
2556 
2557 	  /* For local symbols or if we didn't make a PLT entry for
2558 	     this symbol resolve the symbol directly.  */
2559 	  if (h == NULL
2560 	      || h->plt.offset == (bfd_vma) -1
2561 	      || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2562 	    {
2563 	      relocation -= htab->elf.sgot->output_section->vma;
2564 	      break;
2565 	    }
2566 
2567 	  if (s390_is_ifunc_symbol_p (h))
2568 	    relocation = (htab->elf.iplt->output_section->vma
2569 			  + htab->elf.iplt->output_offset
2570 			  + h->plt.offset
2571 			  - htab->elf.sgot->output_section->vma);
2572 	  else
2573 	    relocation = (htab->elf.splt->output_section->vma
2574 			  + htab->elf.splt->output_offset
2575 			  + h->plt.offset
2576 			  - htab->elf.sgot->output_section->vma);
2577 	  unresolved_reloc = FALSE;
2578 	  break;
2579 
2580 	case R_390_PC16:
2581 	case R_390_PC12DBL:
2582 	case R_390_PC16DBL:
2583 	case R_390_PC24DBL:
2584 	case R_390_PC32DBL:
2585 	case R_390_PC32:
2586 	  if (h != NULL
2587 	      && s390_is_ifunc_symbol_p (h)
2588 	      && h->def_regular
2589 	      && !bfd_link_executable (info))
2590 	    {
2591 	      /* This will not work our if the function does not
2592 		 happen to set up the GOT pointer for some other
2593 		 reason.  31 bit PLT entries require r12 to hold the
2594 		 GOT pointer.
2595 		 FIXME: Implement an errorcheck.
2596 		 NOTE: It will work when brasl is not available
2597 		 (e.g. with -m31 -march=g5) since a local function
2598 		 call then does use GOTOFF which implies r12 being set
2599 		 up.  */
2600 	      relocation = (htab->elf.iplt->output_section->vma
2601 			    + htab->elf.iplt->output_offset
2602 			    + h ->plt.offset);
2603 	      goto do_relocation;
2604 	    }
2605 	  /* Fall through.  */
2606 
2607 	case R_390_8:
2608 	case R_390_16:
2609 	case R_390_32:
2610 	  if ((input_section->flags & SEC_ALLOC) == 0)
2611 	    break;
2612 
2613 	  if (h != NULL
2614 	      && s390_is_ifunc_symbol_p (h)
2615 	      && h->def_regular)
2616 	    {
2617 	      if (!bfd_link_pic (info))
2618 		{
2619 		  /* For a non-shared object STT_GNU_IFUNC symbol must
2620 		     go through PLT.  */
2621 		  relocation = (htab->elf.iplt->output_section->vma
2622 				+ htab->elf.iplt->output_offset
2623 				+ h ->plt.offset);
2624 		  goto do_relocation;
2625 		}
2626 	      else
2627 		{
2628 		  /* For shared objects a runtime relocation is needed.  */
2629 
2630 		  Elf_Internal_Rela outrel;
2631 		  asection *sreloc;
2632 
2633 		  /* Need a dynamic relocation to get the real function
2634 		     address.  */
2635 		  outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2636 							     info,
2637 							     input_section,
2638 							     rel->r_offset);
2639 		  if (outrel.r_offset == (bfd_vma) -1
2640 		      || outrel.r_offset == (bfd_vma) -2)
2641 		    abort ();
2642 
2643 		  outrel.r_offset += (input_section->output_section->vma
2644 				      + input_section->output_offset);
2645 
2646 		  if (h->dynindx == -1
2647 		      || h->forced_local
2648 		      || bfd_link_executable (info))
2649 		    {
2650 		      /* This symbol is resolved locally.  */
2651 		      outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2652 		      outrel.r_addend = (h->root.u.def.value
2653 					 + h->root.u.def.section->output_section->vma
2654 					 + h->root.u.def.section->output_offset);
2655 		    }
2656 		  else
2657 		    {
2658 		      outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2659 		      outrel.r_addend = 0;
2660 		    }
2661 
2662 		  sreloc = htab->elf.irelifunc;
2663 		  elf_append_rela (output_bfd, sreloc, &outrel);
2664 
2665 		  /* If this reloc is against an external symbol, we
2666 		     do not want to fiddle with the addend.  Otherwise,
2667 		     we need to include the symbol value so that it
2668 		     becomes an addend for the dynamic reloc.  For an
2669 		     internal symbol, we have updated addend.  */
2670 		  continue;
2671 		}
2672 	    }
2673 
2674 	  if ((bfd_link_pic (info)
2675 	       && (h == NULL
2676 		   || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2677 		       && !resolved_to_zero)
2678 		   || h->root.type != bfd_link_hash_undefweak)
2679 	       && ((r_type != R_390_PC16
2680 		    && r_type != R_390_PC12DBL
2681 		    && r_type != R_390_PC16DBL
2682 		    && r_type != R_390_PC24DBL
2683 		    && r_type != R_390_PC32DBL
2684 		    && r_type != R_390_PC32)
2685 		   || !SYMBOL_CALLS_LOCAL (info, h)))
2686 	      || (ELIMINATE_COPY_RELOCS
2687 		  && !bfd_link_pic (info)
2688 		  && h != NULL
2689 		  && h->dynindx != -1
2690 		  && !h->non_got_ref
2691 		  && ((h->def_dynamic
2692 		       && !h->def_regular)
2693 		      || h->root.type == bfd_link_hash_undefweak
2694 		      || h->root.type == bfd_link_hash_undefined)))
2695 	    {
2696 	      Elf_Internal_Rela outrel;
2697 	      bfd_boolean skip, relocate;
2698 	      asection *sreloc;
2699 	      bfd_byte *loc;
2700 
2701 	      /* When generating a shared object, these relocations
2702 		 are copied into the output file to be resolved at run
2703 		 time.  */
2704 
2705 	      skip = FALSE;
2706 	      relocate = FALSE;
2707 
2708 	      outrel.r_offset =
2709 		_bfd_elf_section_offset (output_bfd, info, input_section,
2710 					 rel->r_offset);
2711 	      if (outrel.r_offset == (bfd_vma) -1)
2712 		skip = TRUE;
2713 	      else if (outrel.r_offset == (bfd_vma) -2)
2714 		skip = TRUE, relocate = TRUE;
2715 	      outrel.r_offset += (input_section->output_section->vma
2716 				  + input_section->output_offset);
2717 
2718 	      if (skip)
2719 		memset (&outrel, 0, sizeof outrel);
2720 	      else if (h != NULL
2721 		       && h->dynindx != -1
2722 		       && (r_type == R_390_PC16
2723 			   || r_type == R_390_PC12DBL
2724 			   || r_type == R_390_PC16DBL
2725 			   || r_type == R_390_PC24DBL
2726 			   || r_type == R_390_PC32DBL
2727 			   || r_type == R_390_PC32
2728 			   || !bfd_link_pic (info)
2729 			   || !SYMBOLIC_BIND (info, h)
2730 			   || !h->def_regular))
2731 		{
2732 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2733 		  outrel.r_addend = rel->r_addend;
2734 		}
2735 	      else
2736 		{
2737 		  /* This symbol is local, or marked to become local.  */
2738 		  outrel.r_addend = relocation + rel->r_addend;
2739 		  if (r_type == R_390_32)
2740 		    {
2741 		      relocate = TRUE;
2742 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2743 		    }
2744 		  else
2745 		    {
2746 		      long sindx;
2747 
2748 		      if (bfd_is_abs_section (sec))
2749 			sindx = 0;
2750 		      else if (sec == NULL || sec->owner == NULL)
2751 			{
2752 			  bfd_set_error(bfd_error_bad_value);
2753 			  return FALSE;
2754 			}
2755 		      else
2756 			{
2757 			  asection *osec;
2758 
2759 			  osec = sec->output_section;
2760 			  sindx = elf_section_data (osec)->dynindx;
2761 			  if (sindx == 0)
2762 			    {
2763 			      osec = htab->elf.text_index_section;
2764 			      sindx = elf_section_data (osec)->dynindx;
2765 			    }
2766 			  BFD_ASSERT (sindx != 0);
2767 
2768 			  /* We are turning this relocation into one
2769 			     against a section symbol, so subtract out
2770 			     the output section's address but not the
2771 			     offset of the input section in the output
2772 			     section.  */
2773 			  outrel.r_addend -= osec->vma;
2774 			}
2775 		      outrel.r_info = ELF32_R_INFO (sindx, r_type);
2776 		    }
2777 		}
2778 
2779 	      sreloc = elf_section_data (input_section)->sreloc;
2780 	      if (sreloc == NULL)
2781 		abort ();
2782 
2783 	      loc = sreloc->contents;
2784 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2785 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2786 
2787 	      /* If this reloc is against an external symbol, we do
2788 		 not want to fiddle with the addend.  Otherwise, we
2789 		 need to include the symbol value so that it becomes
2790 		 an addend for the dynamic reloc.  */
2791 	      if (! relocate)
2792 		continue;
2793 	    }
2794 	  break;
2795 
2796 	  /* Relocations for tls literal pool entries.  */
2797 	case R_390_TLS_IE32:
2798 	  if (bfd_link_pic (info))
2799 	    {
2800 	      Elf_Internal_Rela outrel;
2801 	      asection *sreloc;
2802 	      bfd_byte *loc;
2803 
2804 	      outrel.r_offset = rel->r_offset
2805 				+ input_section->output_section->vma
2806 				+ input_section->output_offset;
2807 	      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2808 	      sreloc = elf_section_data (input_section)->sreloc;
2809 	      if (sreloc == NULL)
2810 		abort ();
2811 	      loc = sreloc->contents;
2812 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2813 	      bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2814 	    }
2815 	  /* Fall through.  */
2816 
2817 	case R_390_TLS_GD32:
2818 	case R_390_TLS_GOTIE32:
2819 	  r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2820 	  tls_type = GOT_UNKNOWN;
2821 	  if (h == NULL && local_got_offsets)
2822 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2823 	  else if (h != NULL)
2824 	    {
2825 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2826 	      if (!bfd_link_pic (info)
2827 		  && h->dynindx == -1
2828 		  && tls_type >= GOT_TLS_IE)
2829 		r_type = R_390_TLS_LE32;
2830 	    }
2831 	  if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2832 	    r_type = R_390_TLS_IE32;
2833 
2834 	  if (r_type == R_390_TLS_LE32)
2835 	    {
2836 	      /* This relocation gets optimized away by the local exec
2837 		 access optimization.  */
2838 	      BFD_ASSERT (! unresolved_reloc);
2839 	      bfd_put_32 (output_bfd, -tpoff (info, relocation),
2840 			  contents + rel->r_offset);
2841 	      continue;
2842 	    }
2843 
2844 	  if (htab->elf.sgot == NULL)
2845 	    abort ();
2846 
2847 	  if (h != NULL)
2848 	    off = h->got.offset;
2849 	  else
2850 	    {
2851 	      if (local_got_offsets == NULL)
2852 		abort ();
2853 
2854 	      off = local_got_offsets[r_symndx];
2855 	    }
2856 
2857 	emit_tls_relocs:
2858 
2859 	  if ((off & 1) != 0)
2860 	    off &= ~1;
2861 	  else
2862 	    {
2863 	      Elf_Internal_Rela outrel;
2864 	      bfd_byte *loc;
2865 	      int dr_type, indx;
2866 
2867 	      if (htab->elf.srelgot == NULL)
2868 		abort ();
2869 
2870 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2871 				 + htab->elf.sgot->output_offset + off);
2872 
2873 	      indx = h && h->dynindx != -1 ? h->dynindx : 0;
2874 	      if (r_type == R_390_TLS_GD32)
2875 		dr_type = R_390_TLS_DTPMOD;
2876 	      else
2877 		dr_type = R_390_TLS_TPOFF;
2878 	      if (dr_type == R_390_TLS_TPOFF && indx == 0)
2879 		outrel.r_addend = relocation - dtpoff_base (info);
2880 	      else
2881 		outrel.r_addend = 0;
2882 	      outrel.r_info = ELF32_R_INFO (indx, dr_type);
2883 	      loc = htab->elf.srelgot->contents;
2884 	      loc += htab->elf.srelgot->reloc_count++
2885 		* sizeof (Elf32_External_Rela);
2886 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2887 
2888 	      if (r_type == R_390_TLS_GD32)
2889 		{
2890 		  if (indx == 0)
2891 		    {
2892 		      BFD_ASSERT (! unresolved_reloc);
2893 		      bfd_put_32 (output_bfd,
2894 				  relocation - dtpoff_base (info),
2895 				  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2896 		    }
2897 		  else
2898 		    {
2899 		      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
2900 		      outrel.r_offset += GOT_ENTRY_SIZE;
2901 		      outrel.r_addend = 0;
2902 		      htab->elf.srelgot->reloc_count++;
2903 		      loc += sizeof (Elf32_External_Rela);
2904 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2905 		    }
2906 		}
2907 
2908 	      if (h != NULL)
2909 		h->got.offset |= 1;
2910 	      else
2911 		local_got_offsets[r_symndx] |= 1;
2912 	    }
2913 
2914 	  if (off >= (bfd_vma) -2)
2915 	    abort ();
2916 	  if (r_type == ELF32_R_TYPE (rel->r_info))
2917 	    {
2918 	      relocation = htab->elf.sgot->output_offset + off;
2919 	      if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
2920 		relocation += htab->elf.sgot->output_section->vma;
2921 	      unresolved_reloc = FALSE;
2922 	    }
2923 	  else
2924 	    {
2925 	      bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
2926 			  contents + rel->r_offset);
2927 	      continue;
2928 	    }
2929 	  break;
2930 
2931 	case R_390_TLS_GOTIE12:
2932 	case R_390_TLS_GOTIE20:
2933 	case R_390_TLS_IEENT:
2934 	  if (h == NULL)
2935 	    {
2936 	      if (local_got_offsets == NULL)
2937 		abort();
2938 	      off = local_got_offsets[r_symndx];
2939 	      if (bfd_link_pic (info))
2940 		goto emit_tls_relocs;
2941 	    }
2942 	  else
2943 	    {
2944 	      off = h->got.offset;
2945 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2946 	      if (bfd_link_pic (info)
2947 		  || h->dynindx != -1
2948 		  || tls_type < GOT_TLS_IE)
2949 		goto emit_tls_relocs;
2950 	    }
2951 
2952 	  if (htab->elf.sgot == NULL)
2953 	    abort ();
2954 
2955 	  BFD_ASSERT (! unresolved_reloc);
2956 	  bfd_put_32 (output_bfd, -tpoff (info, relocation),
2957 		      htab->elf.sgot->contents + off);
2958 	  relocation = htab->elf.sgot->output_offset + off;
2959 	  if (r_type == R_390_TLS_IEENT)
2960 	    relocation += htab->elf.sgot->output_section->vma;
2961 	  unresolved_reloc = FALSE;
2962 	  break;
2963 
2964 	case R_390_TLS_LDM32:
2965 	  if (! bfd_link_pic (info))
2966 	    /* The literal pool entry this relocation refers to gets ignored
2967 	       by the optimized code of the local exec model. Do nothing
2968 	       and the value will turn out zero.  */
2969 	    continue;
2970 
2971 	  if (htab->elf.sgot == NULL)
2972 	    abort ();
2973 
2974 	  off = htab->tls_ldm_got.offset;
2975 	  if (off & 1)
2976 	    off &= ~1;
2977 	  else
2978 	    {
2979 	      Elf_Internal_Rela outrel;
2980 	      bfd_byte *loc;
2981 
2982 	      if (htab->elf.srelgot == NULL)
2983 		abort ();
2984 
2985 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2986 				 + htab->elf.sgot->output_offset + off);
2987 
2988 	      bfd_put_32 (output_bfd, 0,
2989 			  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2990 	      outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
2991 	      outrel.r_addend = 0;
2992 	      loc = htab->elf.srelgot->contents;
2993 	      loc += htab->elf.srelgot->reloc_count++
2994 		* sizeof (Elf32_External_Rela);
2995 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2996 	      htab->tls_ldm_got.offset |= 1;
2997 	    }
2998 	  relocation = htab->elf.sgot->output_offset + off;
2999 	  unresolved_reloc = FALSE;
3000 	  break;
3001 
3002 	case R_390_TLS_LE32:
3003 	  if (bfd_link_dll (info))
3004 	    {
3005 	      /* Linking a shared library with non-fpic code requires
3006 		 a R_390_TLS_TPOFF relocation.  */
3007 	      Elf_Internal_Rela outrel;
3008 	      asection *sreloc;
3009 	      bfd_byte *loc;
3010 	      int indx;
3011 
3012 	      outrel.r_offset = rel->r_offset
3013 				+ input_section->output_section->vma
3014 				+ input_section->output_offset;
3015 	      if (h != NULL && h->dynindx != -1)
3016 		indx = h->dynindx;
3017 	      else
3018 		indx = 0;
3019 	      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
3020 	      if (indx == 0)
3021 		outrel.r_addend = relocation - dtpoff_base (info);
3022 	      else
3023 		outrel.r_addend = 0;
3024 	      sreloc = elf_section_data (input_section)->sreloc;
3025 	      if (sreloc == NULL)
3026 		abort ();
3027 	      loc = sreloc->contents;
3028 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3029 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3030 	    }
3031 	  else
3032 	    {
3033 	      BFD_ASSERT (! unresolved_reloc);
3034 	      bfd_put_32 (output_bfd, -tpoff (info, relocation),
3035 			  contents + rel->r_offset);
3036 	    }
3037 	  continue;
3038 
3039 	case R_390_TLS_LDO32:
3040 	  if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
3041 	    relocation -= dtpoff_base (info);
3042 	  else
3043 	    /* When converting LDO to LE, we must negate.  */
3044 	    relocation = -tpoff (info, relocation);
3045 	  break;
3046 
3047 	  /* Relocations for tls instructions.  */
3048 	case R_390_TLS_LOAD:
3049 	case R_390_TLS_GDCALL:
3050 	case R_390_TLS_LDCALL:
3051 	  tls_type = GOT_UNKNOWN;
3052 	  if (h == NULL && local_got_offsets)
3053 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3054 	  else if (h != NULL)
3055 	    tls_type = elf_s390_hash_entry(h)->tls_type;
3056 
3057 	  if (tls_type == GOT_TLS_GD)
3058 	    continue;
3059 
3060 	  if (r_type == R_390_TLS_LOAD)
3061 	    {
3062 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3063 		{
3064 		  /* IE->LE transition. Four valid cases:
3065 		     l %rx,0(0,%ry)    -> lr %rx,%ry + bcr 0,0
3066 		     l %rx,0(%ry,0)    -> lr %rx,%ry + bcr 0,0
3067 		     l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
3068 		     l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3069 		  unsigned int insn, ry;
3070 
3071 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3072 		  if ((insn & 0xff00f000) == 0x58000000)
3073 		    /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0  */
3074 		    ry = (insn & 0x000f0000);
3075 		  else if ((insn & 0xff0f0000) == 0x58000000)
3076 		    /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0  */
3077 		    ry = (insn & 0x0000f000) << 4;
3078 		  else if ((insn & 0xff00f000) == 0x5800c000)
3079 		    /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0  */
3080 		    ry = (insn & 0x000f0000);
3081 		  else if ((insn & 0xff0f0000) == 0x580c0000)
3082 		    /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0  */
3083 		    ry = (insn & 0x0000f000) << 4;
3084 		  else
3085 		    {
3086 		      invalid_tls_insn (input_bfd, input_section, rel);
3087 		      return FALSE;
3088 		    }
3089 		  insn = 0x18000700 | (insn & 0x00f00000) | ry;
3090 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3091 		}
3092 	    }
3093 	  else if (r_type == R_390_TLS_GDCALL)
3094 	    {
3095 	      unsigned int insn;
3096 
3097 	      insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3098 	      if ((insn & 0xff000fff) != 0x4d000000 &&
3099 		  (insn & 0xffff0000) != 0xc0e50000 &&
3100 		  (insn & 0xff000000) != 0x0d000000)
3101 		{
3102 		  invalid_tls_insn (input_bfd, input_section, rel);
3103 		  return FALSE;
3104 		}
3105 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3106 		{
3107 		  if ((insn & 0xff000000) == 0x0d000000)
3108 		    {
3109 		      /* GD->LE transition.
3110 			 basr rx, ry -> nopr r7 */
3111 		      insn = 0x07070000 | (insn & 0xffff);
3112 		    }
3113 		  else if ((insn & 0xff000000) == 0x4d000000)
3114 		    {
3115 		      /* GD->LE transition.
3116 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
3117 		      insn = 0x47000000;
3118 		    }
3119 		  else
3120 		    {
3121 		      /* GD->LE transition.
3122 			 brasl %r14,_tls_get_offset@plt -> brcl 0,.  */
3123 		      insn = 0xc0040000;
3124 		      bfd_put_16 (output_bfd, 0x0000,
3125 				  contents + rel->r_offset + 4);
3126 		    }
3127 		}
3128 	      else
3129 		{
3130 		  /* If basr is used in the pic case to invoke
3131 		     _tls_get_offset, something went wrong before.  */
3132 		  if ((insn & 0xff000000) == 0x0d000000)
3133 		    {
3134 		      invalid_tls_insn (input_bfd, input_section, rel);
3135 		      return FALSE;
3136 		    }
3137 
3138 		  if ((insn & 0xff000000) == 0x4d000000)
3139 		    {
3140 		      /* GD->IE transition.
3141 			 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12)  */
3142 		      insn = 0x5822c000;
3143 		    }
3144 		  else
3145 		    {
3146 		      /* GD->IE transition.
3147 			 brasl %r14,__tls_get_addr@plt ->
3148 				l %r2,0(%r2,%r12) ; bcr 0,0 */
3149 		      insn = 0x5822c000;
3150 		      bfd_put_16 (output_bfd, 0x0700,
3151 				  contents + rel->r_offset + 4);
3152 		    }
3153 		}
3154 	      bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3155 	    }
3156 	  else if (r_type == R_390_TLS_LDCALL)
3157 	    {
3158 	      if (!bfd_link_pic (info))
3159 		{
3160 		  unsigned int insn;
3161 
3162 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3163 		  if ((insn & 0xff000fff) != 0x4d000000 &&
3164 		      (insn & 0xffff0000) != 0xc0e50000 &&
3165 		      (insn & 0xff000000) != 0x0d000000)
3166 		    {
3167 		      invalid_tls_insn (input_bfd, input_section, rel);
3168 		      return FALSE;
3169 		    }
3170 
3171 		  if ((insn & 0xff000000) == 0x0d000000)
3172 		    {
3173 		      /* LD->LE transition.
3174 			 basr rx, ry -> nopr r7 */
3175 		      insn = 0x07070000 | (insn & 0xffff);
3176 		    }
3177 		  else if ((insn & 0xff000000) == 0x4d000000)
3178 		    {
3179 		      /* LD->LE transition.
3180 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
3181 		      insn = 0x47000000;
3182 		    }
3183 		  else
3184 		    {
3185 		      /* LD->LE transition.
3186 			 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
3187 		      insn = 0xc0040000;
3188 		      bfd_put_16 (output_bfd, 0x0000,
3189 				  contents + rel->r_offset + 4);
3190 		    }
3191 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3192 		}
3193 	    }
3194 	  continue;
3195 
3196 	default:
3197 	  break;
3198 	}
3199 
3200       /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3201 	 because such sections are not SEC_ALLOC and thus ld.so will
3202 	 not process them.  */
3203       if (unresolved_reloc
3204 	  && !((input_section->flags & SEC_DEBUGGING) != 0
3205 	       && h->def_dynamic)
3206 	  && _bfd_elf_section_offset (output_bfd, info, input_section,
3207 				      rel->r_offset) != (bfd_vma) -1)
3208 	_bfd_error_handler
3209 	  /* xgettext:c-format */
3210 	  (_("%pB(%pA+%#" PRIx64 "): "
3211 	     "unresolvable %s relocation against symbol `%s'"),
3212 	   input_bfd,
3213 	   input_section,
3214 	   (uint64_t) rel->r_offset,
3215 	   howto->name,
3216 	   h->root.root.string);
3217 
3218     do_relocation:
3219 
3220       /* When applying a 24 bit reloc we need to start one byte
3221 	 earlier.  Otherwise the 32 bit get/put bfd operations might
3222 	 access a byte after the actual section.  */
3223       if (r_type == R_390_PC24DBL
3224 	  || r_type == R_390_PLT24DBL)
3225 	rel->r_offset--;
3226 
3227       if (r_type == R_390_20
3228 	  || r_type == R_390_GOT20
3229 	  || r_type == R_390_GOTPLT20
3230 	  || r_type == R_390_TLS_GOTIE20)
3231 	{
3232 	  relocation += rel->r_addend;
3233 	  relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3234 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3235 					contents, rel->r_offset,
3236 					relocation, 0);
3237 	}
3238       else
3239 	r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3240 				      contents, rel->r_offset,
3241 				      relocation, rel->r_addend);
3242 
3243       if (r != bfd_reloc_ok)
3244 	{
3245 	  const char *name;
3246 
3247 	  if (h != NULL)
3248 	    name = h->root.root.string;
3249 	  else
3250 	    {
3251 	      name = bfd_elf_string_from_elf_section (input_bfd,
3252 						      symtab_hdr->sh_link,
3253 						      sym->st_name);
3254 	      if (name == NULL)
3255 		return FALSE;
3256 	      if (*name == '\0')
3257 		name = bfd_section_name (sec);
3258 	    }
3259 
3260 	  if (r == bfd_reloc_overflow)
3261 	    (*info->callbacks->reloc_overflow)
3262 	      (info, (h ? &h->root : NULL), name, howto->name,
3263 	       (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3264 	  else
3265 	    {
3266 	      _bfd_error_handler
3267 		/* xgettext:c-format */
3268 		(_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3269 		 input_bfd, input_section,
3270 		 (uint64_t) rel->r_offset, name, (int) r);
3271 	      return FALSE;
3272 	    }
3273 	}
3274     }
3275 
3276   return TRUE;
3277 }
3278 
3279 /* Generate the PLT slots together with the dynamic relocations needed
3280    for IFUNC symbols.  */
3281 
3282 static void
3283 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3284 			      struct bfd_link_info *info,
3285 			      struct elf_link_hash_entry *h,
3286 			      struct elf_s390_link_hash_table *htab,
3287 			      bfd_vma iplt_offset,
3288 			      bfd_vma resolver_address)
3289 {
3290   bfd_vma iplt_index;
3291   bfd_vma got_offset;
3292   bfd_vma igotiplt_offset;
3293   Elf_Internal_Rela rela;
3294   bfd_byte *loc;
3295   asection *plt, *gotplt, *relplt;
3296   bfd_vma relative_offset;
3297 
3298   if (htab->elf.iplt == NULL
3299       || htab->elf.igotplt == NULL
3300       || htab->elf.irelplt == NULL)
3301     abort ();
3302 
3303   gotplt = htab->elf.igotplt;
3304   relplt = htab->elf.irelplt;
3305 
3306   /* Index of the PLT slot within iplt section.  */
3307   iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3308   plt = htab->elf.iplt;
3309   /* Offset into the igot.plt section.  */
3310   igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3311   /* Offset into the got section.  */
3312   got_offset = igotiplt_offset + gotplt->output_offset;
3313 
3314   /* S390 uses halfwords for relative branch calc!  */
3315   relative_offset = - (plt->output_offset +
3316 		       (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
3317   /* If offset is > 32768, branch to a previous branch
3318      390 can only handle +-64 K jumps.  */
3319   if ( -32768 > (int) relative_offset )
3320     relative_offset
3321       = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3322 
3323   /* Fill in the entry in the procedure linkage table.  */
3324   if (!bfd_link_pic (info))
3325     {
3326       memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3327 	      PLT_ENTRY_SIZE);
3328 
3329       /* Adjust jump to the first plt entry.  */
3330       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3331 		  plt->contents + iplt_offset + 20);
3332 
3333       /* Push the GOT offset field.  */
3334       bfd_put_32 (output_bfd,
3335 		  (gotplt->output_section->vma
3336 		   + got_offset),
3337 		  plt->contents + iplt_offset + 24);
3338     }
3339   else if (got_offset < 4096)
3340     {
3341       /* The GOT offset is small enough to be used directly as
3342 	 displacement.  */
3343       memcpy (plt->contents + iplt_offset,
3344 	      elf_s390_plt_pic12_entry,
3345 	      PLT_ENTRY_SIZE);
3346 
3347       /* Put in the GOT offset as displacement value.  The 0xc000
3348 	 value comes from the first word of the plt entry.  Look
3349 	 at the elf_s390_plt_pic16_entry content.  */
3350       bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3351 		  plt->contents + iplt_offset + 2);
3352 
3353       /* Adjust the jump to the first plt entry.  */
3354       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3355 		  plt->contents + iplt_offset + 20);
3356     }
3357   else if (got_offset < 32768)
3358     {
3359       /* The GOT offset is too big for a displacement but small
3360 	 enough to be a signed 16 bit immediate value as it can be
3361 	 used in an lhi instruction.  */
3362       memcpy (plt->contents + iplt_offset,
3363 	      elf_s390_plt_pic16_entry,
3364 	      PLT_ENTRY_SIZE);
3365 
3366       /* Put in the GOT offset for the lhi instruction.  */
3367       bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3368 		  plt->contents + iplt_offset + 2);
3369 
3370       /* Adjust the jump to the first plt entry.  */
3371       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3372 		  plt->contents + iplt_offset + 20);
3373     }
3374   else
3375     {
3376       memcpy (plt->contents + iplt_offset,
3377 	      elf_s390_plt_pic_entry,
3378 	      PLT_ENTRY_SIZE);
3379 
3380       /* Adjust the jump to the first plt entry.  */
3381       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3382 		  plt->contents + iplt_offset + 20);
3383 
3384       /* Push the GOT offset field.  */
3385       bfd_put_32 (output_bfd, got_offset,
3386 		  plt->contents + iplt_offset + 24);
3387     }
3388   /* Insert offset into  reloc. table here.  */
3389   bfd_put_32 (output_bfd, relplt->output_offset +
3390 	      iplt_index * RELA_ENTRY_SIZE,
3391 	      plt->contents + iplt_offset + 28);
3392 
3393   /* Fill in the entry in the global offset table.
3394      Points to instruction after GOT offset.  */
3395   bfd_put_32 (output_bfd,
3396 	      (plt->output_section->vma
3397 	       + plt->output_offset
3398 	       + iplt_offset
3399 	       + 12),
3400 	      gotplt->contents + igotiplt_offset);
3401 
3402   /* Fill in the entry in the .rela.plt section.  */
3403   rela.r_offset = gotplt->output_section->vma + got_offset;
3404 
3405   if (!h
3406       || h->dynindx == -1
3407       || ((bfd_link_executable (info)
3408 	   || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3409 	  && h->def_regular))
3410     {
3411       /* The symbol can be locally resolved.  */
3412       rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3413       rela.r_addend = resolver_address;
3414     }
3415   else
3416     {
3417       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3418       rela.r_addend = 0;
3419     }
3420 
3421   loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3422   bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3423 }
3424 
3425 /* Finish up dynamic symbol handling.  We set the contents of various
3426    dynamic sections here.  */
3427 
3428 static bfd_boolean
3429 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3430 				struct bfd_link_info *info,
3431 				struct elf_link_hash_entry *h,
3432 				Elf_Internal_Sym *sym)
3433 {
3434   struct elf_s390_link_hash_table *htab;
3435   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3436 
3437   htab = elf_s390_hash_table (info);
3438 
3439   if (h->plt.offset != (bfd_vma) -1)
3440     {
3441       bfd_vma plt_index;
3442       bfd_vma got_offset;
3443       Elf_Internal_Rela rela;
3444       bfd_byte *loc;
3445       bfd_vma relative_offset;
3446 
3447       /* This symbol has an entry in the procedure linkage table.  Set
3448 	 it up.  */
3449       if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3450 	{
3451 	  elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3452 	    htab, h->plt.offset,
3453 	    eh->ifunc_resolver_address +
3454 	    eh->ifunc_resolver_section->output_offset +
3455 	    eh->ifunc_resolver_section->output_section->vma);
3456 	  /* Do not return yet.  Handling of explicit GOT slots of
3457 	     IFUNC symbols is below.  */
3458 	}
3459       else
3460 	{
3461 	  if (h->dynindx == -1
3462 	      || htab->elf.splt == NULL
3463 	      || htab->elf.sgotplt == NULL
3464 	      || htab->elf.srelplt == NULL)
3465 	    abort ();
3466 
3467 	  /* Calc. index no.
3468 	     Current offset - size first entry / entry size.  */
3469 	  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3470 
3471 	  /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3472 	     addr & GOT addr.  */
3473 	  got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3474 
3475 	  /* S390 uses halfwords for relative branch calc!  */
3476 	  relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3477 				(PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3478 	  /* If offset is > 32768, branch to a previous branch
3479 	     390 can only handle +-64 K jumps.  */
3480 	  if ( -32768 > (int) relative_offset )
3481 	    relative_offset
3482 	      = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3483 
3484 	  /* Fill in the entry in the procedure linkage table.  */
3485 	  if (!bfd_link_pic (info))
3486 	    {
3487 	      memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3488 		      PLT_ENTRY_SIZE);
3489 
3490 	      /* Adjust jump to the first plt entry.  */
3491 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3492 			  htab->elf.splt->contents + h->plt.offset + 20);
3493 
3494 	      /* Push the GOT offset field.  */
3495 	      bfd_put_32 (output_bfd,
3496 			  (htab->elf.sgotplt->output_section->vma
3497 			   + htab->elf.sgotplt->output_offset
3498 			   + got_offset),
3499 			  htab->elf.splt->contents + h->plt.offset + 24);
3500 	    }
3501 	  else if (got_offset < 4096)
3502 	    {
3503 	      /* The GOT offset is small enough to be used directly as
3504 		 displacement.  */
3505 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3506 		      elf_s390_plt_pic12_entry,
3507 		      PLT_ENTRY_SIZE);
3508 
3509 	      /* Put in the GOT offset as displacement value.  The 0xc000
3510 		 value comes from the first word of the plt entry.  Look
3511 		 at the elf_s390_plt_pic12_entry content.  */
3512 	      bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3513 			  htab->elf.splt->contents + h->plt.offset + 2);
3514 
3515 	      /* Adjust the jump to the first plt entry.  */
3516 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3517 			  htab->elf.splt->contents + h->plt.offset + 20);
3518 	    }
3519 	  else if (got_offset < 32768)
3520 	    {
3521 	      /* The GOT offset is too big for a displacement but small
3522 		 enough to be a signed 16 bit immediate value as it can be
3523 		 used in an lhi instruction.  */
3524 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3525 		      elf_s390_plt_pic16_entry,
3526 		      PLT_ENTRY_SIZE);
3527 
3528 	      /* Put in the GOT offset for the lhi instruction.  */
3529 	      bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3530 			  htab->elf.splt->contents + h->plt.offset + 2);
3531 
3532 	      /* Adjust the jump to the first plt entry.  */
3533 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3534 			  htab->elf.splt->contents + h->plt.offset + 20);
3535 	    }
3536 	  else
3537 	    {
3538 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3539 		      elf_s390_plt_pic_entry,
3540 		      PLT_ENTRY_SIZE);
3541 
3542 	      /* Adjust the jump to the first plt entry.  */
3543 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3544 			  htab->elf.splt->contents + h->plt.offset + 20);
3545 
3546 	      /* Push the GOT offset field.  */
3547 	      bfd_put_32 (output_bfd, got_offset,
3548 			  htab->elf.splt->contents + h->plt.offset + 24);
3549 	    }
3550 	  /* Insert offset into  reloc. table here.  */
3551 	  bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3552 		      htab->elf.splt->contents + h->plt.offset + 28);
3553 
3554 	  /* Fill in the entry in the global offset table.
3555 	     Points to instruction after GOT offset.  */
3556 	  bfd_put_32 (output_bfd,
3557 		      (htab->elf.splt->output_section->vma
3558 		       + htab->elf.splt->output_offset
3559 		       + h->plt.offset
3560 		       + 12),
3561 		      htab->elf.sgotplt->contents + got_offset);
3562 
3563 	  /* Fill in the entry in the .rela.plt section.  */
3564 	  rela.r_offset = (htab->elf.sgotplt->output_section->vma
3565 			   + htab->elf.sgotplt->output_offset
3566 			   + got_offset);
3567 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3568 	  rela.r_addend = 0;
3569 	  loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3570 	  bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3571 
3572 	  if (!h->def_regular)
3573 	    {
3574 	      /* Mark the symbol as undefined, rather than as defined in
3575 		 the .plt section.  Leave the value alone.  This is a clue
3576 		 for the dynamic linker, to make function pointer
3577 		 comparisons work between an application and shared
3578 		 library.  */
3579 	      sym->st_shndx = SHN_UNDEF;
3580 	    }
3581 	}
3582     }
3583 
3584   if (h->got.offset != (bfd_vma) -1
3585       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3586       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3587       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3588     {
3589       Elf_Internal_Rela rela;
3590       bfd_byte *loc;
3591 
3592       /* This symbol has an entry in the global offset table.  Set it
3593 	 up.  */
3594 
3595       if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3596 	abort ();
3597 
3598       rela.r_offset = (htab->elf.sgot->output_section->vma
3599 		       + htab->elf.sgot->output_offset
3600 		       + (h->got.offset &~ (bfd_vma) 1));
3601 
3602       /* If this is a static link, or it is a -Bsymbolic link and the
3603 	 symbol is defined locally or was forced to be local because
3604 	 of a version file, we just want to emit a RELATIVE reloc.
3605 	 The entry in the global offset table will already have been
3606 	 initialized in the relocate_section function.  */
3607       if (h->def_regular && s390_is_ifunc_symbol_p (h))
3608 	{
3609 	  if (bfd_link_pic (info))
3610 	    {
3611 	      /* An explicit GOT slot usage needs GLOB_DAT.  If the
3612 		 symbol references local the implicit got.iplt slot
3613 		 will be used and the IRELATIVE reloc has been created
3614 		 above.  */
3615 	      goto do_glob_dat;
3616 	    }
3617 	  else
3618 	    {
3619 	      /* For non-shared objects explicit GOT slots must be
3620 		 filled with the PLT slot address for pointer
3621 		 equality reasons.  */
3622 	      bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3623 				       + htab->elf.iplt->output_offset
3624 				       + h->plt.offset),
3625 			  htab->elf.sgot->contents + h->got.offset);
3626 	      return TRUE;
3627 	    }
3628 	}
3629       else if (bfd_link_pic (info)
3630 	       && SYMBOL_REFERENCES_LOCAL (info, h))
3631 	{
3632 	  /* If this is a static link, or it is a -Bsymbolic link and
3633 	     the symbol is defined locally or was forced to be local
3634 	     because of a version file, we just want to emit a
3635 	     RELATIVE reloc.  The entry in the global offset table
3636 	     will already have been initialized in the
3637 	     relocate_section function.  */
3638 	  if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
3639 	    return FALSE;
3640 	  BFD_ASSERT((h->got.offset & 1) != 0);
3641 	  rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3642 	  rela.r_addend = (h->root.u.def.value
3643 			   + h->root.u.def.section->output_section->vma
3644 			   + h->root.u.def.section->output_offset);
3645 	}
3646       else
3647 	{
3648 	  BFD_ASSERT((h->got.offset & 1) == 0);
3649 	do_glob_dat:
3650 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3651 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
3652 	  rela.r_addend = 0;
3653 	}
3654 
3655       loc = htab->elf.srelgot->contents;
3656       loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3657       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3658     }
3659 
3660   if (h->needs_copy)
3661     {
3662       Elf_Internal_Rela rela;
3663       asection *s;
3664       bfd_byte *loc;
3665 
3666       /* This symbols needs a copy reloc.  Set it up.  */
3667 
3668       if (h->dynindx == -1
3669 	  || (h->root.type != bfd_link_hash_defined
3670 	      && h->root.type != bfd_link_hash_defweak)
3671 	  || htab->elf.srelbss == NULL
3672 	  || htab->elf.sreldynrelro == NULL)
3673 	abort ();
3674 
3675       rela.r_offset = (h->root.u.def.value
3676 		       + h->root.u.def.section->output_section->vma
3677 		       + h->root.u.def.section->output_offset);
3678       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3679       rela.r_addend = 0;
3680       if (h->root.u.def.section == htab->elf.sdynrelro)
3681 	s = htab->elf.sreldynrelro;
3682       else
3683 	s = htab->elf.srelbss;
3684       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3685       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3686     }
3687 
3688   /* Mark some specially defined symbols as absolute.  */
3689   if (h == htab->elf.hdynamic
3690       || h == htab->elf.hgot
3691       || h == htab->elf.hplt)
3692     sym->st_shndx = SHN_ABS;
3693 
3694   return TRUE;
3695 }
3696 
3697 /* Used to decide how to sort relocs in an optimal manner for the
3698    dynamic linker, before writing them out.  */
3699 
3700 static enum elf_reloc_type_class
3701 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3702 			   const asection *rel_sec ATTRIBUTE_UNUSED,
3703 			   const Elf_Internal_Rela *rela)
3704 {
3705   bfd *abfd = info->output_bfd;
3706   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3707   struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3708   unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3709   Elf_Internal_Sym sym;
3710 
3711   if (htab->elf.dynsym == NULL
3712       || !bed->s->swap_symbol_in (abfd,
3713 				  (htab->elf.dynsym->contents
3714 				   + r_symndx * bed->s->sizeof_sym),
3715 				  0, &sym))
3716     abort ();
3717 
3718   /* Check relocation against STT_GNU_IFUNC symbol.  */
3719   if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3720     return reloc_class_ifunc;
3721 
3722   switch ((int) ELF32_R_TYPE (rela->r_info))
3723     {
3724     case R_390_RELATIVE:
3725       return reloc_class_relative;
3726     case R_390_JMP_SLOT:
3727       return reloc_class_plt;
3728     case R_390_COPY:
3729       return reloc_class_copy;
3730     default:
3731       return reloc_class_normal;
3732     }
3733 }
3734 
3735 /* Finish up the dynamic sections.  */
3736 
3737 static bfd_boolean
3738 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3739 				  struct bfd_link_info *info)
3740 {
3741   struct elf_s390_link_hash_table *htab;
3742   bfd *dynobj;
3743   asection *sdyn;
3744   bfd *ibfd;
3745   unsigned int i;
3746 
3747   htab = elf_s390_hash_table (info);
3748   dynobj = htab->elf.dynobj;
3749   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3750 
3751   if (htab->elf.dynamic_sections_created)
3752     {
3753       Elf32_External_Dyn *dyncon, *dynconend;
3754 
3755       if (sdyn == NULL || htab->elf.sgot == NULL)
3756 	abort ();
3757 
3758       dyncon = (Elf32_External_Dyn *) sdyn->contents;
3759       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3760       for (; dyncon < dynconend; dyncon++)
3761 	{
3762 	  Elf_Internal_Dyn dyn;
3763 	  asection *s;
3764 
3765 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3766 
3767 	  switch (dyn.d_tag)
3768 	    {
3769 	    default:
3770 	      continue;
3771 
3772 	    case DT_PLTGOT:
3773 	      s = htab->elf.sgotplt;
3774 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3775 	      break;
3776 
3777 	    case DT_JMPREL:
3778 	      s = htab->elf.srelplt;
3779 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3780 	      break;
3781 
3782 	    case DT_PLTRELSZ:
3783 	      dyn.d_un.d_val = htab->elf.srelplt->size;
3784 	      if (htab->elf.irelplt)
3785 		dyn.d_un.d_val += htab->elf.irelplt->size;
3786 	      break;
3787 	    }
3788 
3789 	  bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3790 	}
3791 
3792       /* Fill in the special first entry in the procedure linkage table.  */
3793       if (htab->elf.splt && htab->elf.splt->size > 0)
3794 	{
3795 	  memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
3796 	  if (bfd_link_pic (info))
3797 	    {
3798 	      memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
3799 		      PLT_FIRST_ENTRY_SIZE);
3800 	    }
3801 	  else
3802 	    {
3803 	      memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
3804 		      PLT_FIRST_ENTRY_SIZE);
3805 	      bfd_put_32 (output_bfd,
3806 			  htab->elf.sgotplt->output_section->vma
3807 			  + htab->elf.sgotplt->output_offset,
3808 			  htab->elf.splt->contents + 24);
3809 	    }
3810 	  elf_section_data (htab->elf.splt->output_section)
3811 	    ->this_hdr.sh_entsize = 4;
3812 	}
3813 
3814     }
3815 
3816   if (htab->elf.sgotplt)
3817     {
3818       /* Fill in the first three entries in the global offset table.  */
3819       if (htab->elf.sgotplt->size > 0)
3820 	{
3821 	  bfd_put_32 (output_bfd,
3822 		      (sdyn == NULL ? (bfd_vma) 0
3823 		       : sdyn->output_section->vma + sdyn->output_offset),
3824 		      htab->elf.sgotplt->contents);
3825 	  /* One entry for shared object struct ptr.  */
3826 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
3827 	  /* One entry for _dl_runtime_resolve.  */
3828 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3829 	}
3830 
3831       elf_section_data (htab->elf.sgotplt->output_section)
3832 	->this_hdr.sh_entsize = 4;
3833     }
3834   /* Finish dynamic symbol for local IFUNC symbols.  */
3835   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3836     {
3837       struct plt_entry *local_plt;
3838       Elf_Internal_Sym *isym;
3839       Elf_Internal_Shdr *symtab_hdr;
3840 
3841       symtab_hdr = &elf_symtab_hdr (ibfd);
3842 
3843       if (!is_s390_elf (ibfd))
3844 	continue;
3845 
3846       local_plt = elf_s390_local_plt (ibfd);
3847       if (local_plt != NULL)
3848 	for (i = 0; i < symtab_hdr->sh_info; i++)
3849 	  {
3850 	    if (local_plt[i].plt.offset != (bfd_vma) -1)
3851 	      {
3852 		asection *sec = local_plt[i].sec;
3853 		isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3854 		if (isym == NULL)
3855 		  return FALSE;
3856 
3857 		if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3858 		  elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3859 						local_plt[i].plt.offset,
3860 						isym->st_value
3861 						+ sec->output_section->vma
3862 						+ sec->output_offset);
3863 
3864 	      }
3865 	  }
3866     }
3867   return TRUE;
3868 }
3869 
3870 /* Support for core dump NOTE sections.  */
3871 
3872 static bfd_boolean
3873 elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
3874 {
3875   int offset;
3876   unsigned int size;
3877 
3878   switch (note->descsz)
3879     {
3880     default:
3881       return FALSE;
3882 
3883     case 224:			/* S/390 Linux.  */
3884       /* pr_cursig */
3885       elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3886 
3887       /* pr_pid */
3888       elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3889 
3890       /* pr_reg */
3891       offset = 72;
3892       size = 144;
3893       break;
3894     }
3895 
3896   /* Make a ".reg/999" section.  */
3897   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3898 					  size, note->descpos + offset);
3899 }
3900 
3901 static bfd_boolean
3902 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3903 {
3904   switch (note->descsz)
3905     {
3906     default:
3907       return FALSE;
3908 
3909     case 124:			/* sizeof(struct elf_prpsinfo) on s390 */
3910       elf_tdata (abfd)->core->pid
3911 	= bfd_get_32 (abfd, note->descdata + 12);
3912       elf_tdata (abfd)->core->program
3913 	= _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
3914       elf_tdata (abfd)->core->command
3915 	= _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
3916       break;
3917     }
3918 
3919   /* Note that for some reason, a spurious space is tacked
3920      onto the end of the args in some (at least one anyway)
3921      implementations, so strip it off if it exists.  */
3922 
3923   {
3924     char *command = elf_tdata (abfd)->core->command;
3925     int n = strlen (command);
3926 
3927     if (0 < n && command[n - 1] == ' ')
3928       command[n - 1] = '\0';
3929   }
3930 
3931   return TRUE;
3932 }
3933 
3934 static char *
3935 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3936 			  int note_type, ...)
3937 {
3938   va_list ap;
3939 
3940   switch (note_type)
3941     {
3942     default:
3943       return NULL;
3944 
3945     case NT_PRPSINFO:
3946       {
3947 	char data[124] ATTRIBUTE_NONSTRING = { 0 };
3948 	const char *fname, *psargs;
3949 
3950 	va_start (ap, note_type);
3951 	fname = va_arg (ap, const char *);
3952 	psargs = va_arg (ap, const char *);
3953 	va_end (ap);
3954 
3955 	strncpy (data + 28, fname, 16);
3956 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3957 	DIAGNOSTIC_PUSH;
3958 	/* GCC 8.0 and 8.1 warn about 80 equals destination size with
3959 	   -Wstringop-truncation:
3960 	   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3961 	 */
3962 	DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3963 #endif
3964 	strncpy (data + 44, psargs, 80);
3965 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3966 	DIAGNOSTIC_POP;
3967 #endif
3968 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3969 				   &data, sizeof (data));
3970       }
3971 
3972     case NT_PRSTATUS:
3973       {
3974 	char data[224] = { 0 };
3975 	long pid;
3976 	int cursig;
3977 	const void *gregs;
3978 
3979 	va_start (ap, note_type);
3980 	pid = va_arg (ap, long);
3981 	cursig = va_arg (ap, int);
3982 	gregs = va_arg (ap, const void *);
3983 	va_end (ap);
3984 
3985 	bfd_put_16 (abfd, cursig, data + 12);
3986 	bfd_put_32 (abfd, pid, data + 24);
3987 	memcpy (data + 72, gregs, 144);
3988 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3989 				   &data, sizeof (data));
3990       }
3991     }
3992   /* NOTREACHED */
3993 }
3994 
3995 /* Return address for Ith PLT stub in section PLT, for relocation REL
3996    or (bfd_vma) -1 if it should not be included.  */
3997 
3998 static bfd_vma
3999 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
4000 		      const arelent *rel ATTRIBUTE_UNUSED)
4001 {
4002   return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
4003 }
4004 
4005 /* Merge backend specific data from an object file to the output
4006    object file when linking.  */
4007 
4008 static bfd_boolean
4009 elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
4010 {
4011   bfd *obfd = info->output_bfd;
4012 
4013   if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
4014     return TRUE;
4015 
4016   if (!elf_s390_merge_obj_attributes (ibfd, info))
4017     return FALSE;
4018 
4019   elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
4020   return TRUE;
4021 }
4022 
4023 
4024 #define TARGET_BIG_SYM	s390_elf32_vec
4025 #define TARGET_BIG_NAME	"elf32-s390"
4026 #define ELF_ARCH	bfd_arch_s390
4027 #define ELF_TARGET_ID	S390_ELF_DATA
4028 #define ELF_MACHINE_CODE EM_S390
4029 #define ELF_MACHINE_ALT1 EM_S390_OLD
4030 #define ELF_MAXPAGESIZE 0x1000
4031 
4032 #define elf_backend_can_gc_sections	1
4033 #define elf_backend_can_refcount	1
4034 #define elf_backend_want_got_plt	1
4035 #define elf_backend_plt_readonly	1
4036 #define elf_backend_want_plt_sym	0
4037 #define elf_backend_got_header_size	12
4038 #define elf_backend_want_dynrelro	1
4039 #define elf_backend_rela_normal		1
4040 
4041 #define elf_info_to_howto		      elf_s390_info_to_howto
4042 
4043 #define bfd_elf32_bfd_is_local_label_name     elf_s390_is_local_label_name
4044 #define bfd_elf32_bfd_link_hash_table_create  elf_s390_link_hash_table_create
4045 #define bfd_elf32_bfd_reloc_type_lookup	      elf_s390_reloc_type_lookup
4046 #define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4047 
4048 #define bfd_elf32_bfd_merge_private_bfd_data  elf32_s390_merge_private_bfd_data
4049 
4050 #define elf_backend_adjust_dynamic_symbol     elf_s390_adjust_dynamic_symbol
4051 #define elf_backend_check_relocs	      elf_s390_check_relocs
4052 #define elf_backend_copy_indirect_symbol      elf_s390_copy_indirect_symbol
4053 #define elf_backend_create_dynamic_sections   _bfd_elf_create_dynamic_sections
4054 #define elf_backend_finish_dynamic_sections   elf_s390_finish_dynamic_sections
4055 #define elf_backend_finish_dynamic_symbol     elf_s390_finish_dynamic_symbol
4056 #define elf_backend_gc_mark_hook	      elf_s390_gc_mark_hook
4057 #define elf_backend_reloc_type_class	      elf_s390_reloc_type_class
4058 #define elf_backend_relocate_section	      elf_s390_relocate_section
4059 #define elf_backend_size_dynamic_sections     elf_s390_size_dynamic_sections
4060 #define elf_backend_init_index_section	      _bfd_elf_init_1_index_section
4061 #define elf_backend_grok_prstatus	      elf_s390_grok_prstatus
4062 #define elf_backend_grok_psinfo		      elf_s390_grok_psinfo
4063 #define elf_backend_write_core_note	      elf_s390_write_core_note
4064 #define elf_backend_plt_sym_val		      elf_s390_plt_sym_val
4065 #define elf_backend_sort_relocs_p	      elf_s390_elf_sort_relocs_p
4066 
4067 #define bfd_elf32_mkobject		elf_s390_mkobject
4068 #define elf_backend_object_p		elf_s390_object_p
4069 
4070 #define elf_backend_linux_prpsinfo32_ugid16	TRUE
4071 
4072 #include "elf32-target.h"
4073