xref: /netbsd-src/external/gpl3/binutils/dist/bfd/elf32-s390.c (revision f3cfa6f6ce31685c6c4a758bc430e69eb99f50a4)
1 /* IBM S/390-specific support for 32-bit ELF
2    Copyright (C) 2000-2018 Free Software Foundation, Inc.
3    Contributed by Carl B. Pedersen and Martin Schwidefsky.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20    02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29 
30 static bfd_reloc_status_type
31 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 		asection *, bfd *, char **);
33 static bfd_reloc_status_type
34 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 		      asection *, bfd *, char **);
36 
37 /* The relocation "howto" table.  */
38 
39 static reloc_howto_type elf_howto_table[] =
40 {
41   HOWTO (R_390_NONE,		/* type */
42 	 0,			/* rightshift */
43 	 3,			/* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
44 	 0,			/* bitsize */
45 	 FALSE,			/* pc_relative */
46 	 0,			/* bitpos */
47 	 complain_overflow_dont, /* complain_on_overflow */
48 	 bfd_elf_generic_reloc, /* special_function */
49 	 "R_390_NONE",		/* name */
50 	 FALSE,			/* partial_inplace */
51 	 0,			/* src_mask */
52 	 0,			/* dst_mask */
53 	 FALSE),		/* pcrel_offset */
54 
55   HOWTO(R_390_8,	 0, 0,	8, FALSE, 0, complain_overflow_bitfield,
56 	bfd_elf_generic_reloc, "R_390_8",	 FALSE, 0,0x000000ff, FALSE),
57   HOWTO(R_390_12,	 0, 1, 12, FALSE, 0, complain_overflow_dont,
58 	bfd_elf_generic_reloc, "R_390_12",	 FALSE, 0,0x00000fff, FALSE),
59   HOWTO(R_390_16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
60 	bfd_elf_generic_reloc, "R_390_16",	 FALSE, 0,0x0000ffff, FALSE),
61   HOWTO(R_390_32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
62 	bfd_elf_generic_reloc, "R_390_32",	 FALSE, 0,0xffffffff, FALSE),
63   HOWTO(R_390_PC32,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
64 	bfd_elf_generic_reloc, "R_390_PC32",	 FALSE, 0,0xffffffff, TRUE),
65   HOWTO(R_390_GOT12,	 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
66 	bfd_elf_generic_reloc, "R_390_GOT12",	 FALSE, 0,0x00000fff, FALSE),
67   HOWTO(R_390_GOT32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
68 	bfd_elf_generic_reloc, "R_390_GOT32",	 FALSE, 0,0xffffffff, FALSE),
69   HOWTO(R_390_PLT32,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
70 	bfd_elf_generic_reloc, "R_390_PLT32",	 FALSE, 0,0xffffffff, TRUE),
71   HOWTO(R_390_COPY,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
72 	bfd_elf_generic_reloc, "R_390_COPY",	 FALSE, 0,0xffffffff, FALSE),
73   HOWTO(R_390_GLOB_DAT,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
74 	bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,0xffffffff, FALSE),
75   HOWTO(R_390_JMP_SLOT,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
76 	bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,0xffffffff, FALSE),
77   HOWTO(R_390_RELATIVE,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
78 	bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,0xffffffff, FALSE),
79   HOWTO(R_390_GOTOFF32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
80 	bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,0xffffffff, FALSE),
81   HOWTO(R_390_GOTPC,	 0, 2, 32,  TRUE, 0, complain_overflow_bitfield,
82 	bfd_elf_generic_reloc, "R_390_GOTPC",	 FALSE, 0,0xffffffff, TRUE),
83   HOWTO(R_390_GOT16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
84 	bfd_elf_generic_reloc, "R_390_GOT16",	 FALSE, 0,0x0000ffff, FALSE),
85   HOWTO(R_390_PC16,	 0, 1, 16,  TRUE, 0, complain_overflow_bitfield,
86 	bfd_elf_generic_reloc, "R_390_PC16",	 FALSE, 0,0x0000ffff, TRUE),
87   HOWTO(R_390_PC16DBL,	 1, 1, 16,  TRUE, 0, complain_overflow_bitfield,
88 	bfd_elf_generic_reloc, "R_390_PC16DBL",	 FALSE, 0,0x0000ffff, TRUE),
89   HOWTO(R_390_PLT16DBL,	 1, 1, 16,  TRUE, 0, complain_overflow_bitfield,
90 	bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
91   HOWTO(R_390_PC32DBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
92 	bfd_elf_generic_reloc, "R_390_PC32DBL",	 FALSE, 0,0xffffffff, TRUE),
93   HOWTO(R_390_PLT32DBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
94 	bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
95   HOWTO(R_390_GOTPCDBL,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
96 	bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,0xffffffff, TRUE),
97   EMPTY_HOWTO (R_390_64),	/* Empty entry for R_390_64.  */
98   EMPTY_HOWTO (R_390_PC64),	/* Empty entry for R_390_PC64.  */
99   EMPTY_HOWTO (R_390_GOT64),	/* Empty entry for R_390_GOT64.  */
100   EMPTY_HOWTO (R_390_PLT64),	/* Empty entry for R_390_PLT64.  */
101   HOWTO(R_390_GOTENT,	 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
102 	bfd_elf_generic_reloc, "R_390_GOTENT",	 FALSE, 0,0xffffffff, TRUE),
103   HOWTO(R_390_GOTOFF16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
104 	bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
105   EMPTY_HOWTO (R_390_GOTOFF64),	/* Empty entry for R_390_GOTOFF64.  */
106   HOWTO(R_390_GOTPLT12,	 0, 1, 12, FALSE, 0, complain_overflow_dont,
107 	bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
108   HOWTO(R_390_GOTPLT16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
109 	bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
110   HOWTO(R_390_GOTPLT32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
111 	bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
112   EMPTY_HOWTO (R_390_GOTPLT64),	/* Empty entry for R_390_GOTPLT64.  */
113   HOWTO(R_390_GOTPLTENT, 1, 2, 32,  TRUE, 0, complain_overflow_bitfield,
114 	bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,0xffffffff, TRUE),
115   HOWTO(R_390_PLTOFF16,	 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
116 	bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
117   HOWTO(R_390_PLTOFF32,	 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
118 	bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
119   EMPTY_HOWTO (R_390_PLTOFF64),	/* Empty entry for R_390_PLTOFF64.  */
120   HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
121 	s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
122   HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
123 	s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
124   HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
125 	s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
126   HOWTO(R_390_TLS_GD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 	bfd_elf_generic_reloc, "R_390_TLS_GD32", FALSE, 0, 0xffffffff, FALSE),
128   EMPTY_HOWTO (R_390_TLS_GD64),	/* Empty entry for R_390_TLS_GD64.  */
129   HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
130 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
131   HOWTO(R_390_TLS_GOTIE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", FALSE, 0, 0xffffffff, FALSE),
133   EMPTY_HOWTO (R_390_TLS_GOTIE64),	/* Empty entry for R_390_TLS_GOTIE64.  */
134   HOWTO(R_390_TLS_LDM32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
135 	bfd_elf_generic_reloc, "R_390_TLS_LDM32", FALSE, 0, 0xffffffff, FALSE),
136   EMPTY_HOWTO (R_390_TLS_LDM64),	/* Empty entry for R_390_TLS_LDM64.  */
137   HOWTO(R_390_TLS_IE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 	bfd_elf_generic_reloc, "R_390_TLS_IE32", FALSE, 0, 0xffffffff, FALSE),
139   EMPTY_HOWTO (R_390_TLS_IE64),	/* Empty entry for R_390_TLS_IE64.  */
140   HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
141 	bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, 0xffffffff, TRUE),
142   HOWTO(R_390_TLS_LE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
143 	bfd_elf_generic_reloc, "R_390_TLS_LE32", FALSE, 0, 0xffffffff, FALSE),
144   EMPTY_HOWTO (R_390_TLS_LE64),	/* Empty entry for R_390_TLS_LE64.  */
145   HOWTO(R_390_TLS_LDO32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
146 	bfd_elf_generic_reloc, "R_390_TLS_LDO32", FALSE, 0, 0xffffffff, FALSE),
147   EMPTY_HOWTO (R_390_TLS_LDO64),	/* Empty entry for R_390_TLS_LDO64.  */
148   HOWTO(R_390_TLS_DTPMOD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
149 	bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, 0xffffffff, FALSE),
150   HOWTO(R_390_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
151 	bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, 0xffffffff, FALSE),
152   HOWTO(R_390_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
153 	bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, 0xffffffff, FALSE),
154   HOWTO(R_390_20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
155 	s390_elf_ldisp_reloc, "R_390_20",      FALSE, 0,0x0fffff00, FALSE),
156   HOWTO(R_390_GOT20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
157 	s390_elf_ldisp_reloc, "R_390_GOT20",   FALSE, 0,0x0fffff00, FALSE),
158   HOWTO(R_390_GOTPLT20,	 0, 2, 20, FALSE, 8, complain_overflow_dont,
159 	s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
160   HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
161 	s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
162   HOWTO(R_390_IRELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
163 	bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, 0xffffffff, FALSE),
164   HOWTO(R_390_PC12DBL,	 1, 1, 12,  TRUE, 0, complain_overflow_bitfield,
165 	bfd_elf_generic_reloc, "R_390_PC12DBL",	 FALSE, 0,0x00000fff, TRUE),
166   HOWTO(R_390_PLT12DBL,	 1, 1, 12,  TRUE, 0, complain_overflow_bitfield,
167 	bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
168   HOWTO(R_390_PC24DBL,	 1, 2, 24,  TRUE, 0, complain_overflow_bitfield,
169 	bfd_elf_generic_reloc, "R_390_PC24DBL",	 FALSE, 0,0x00ffffff, TRUE),
170   HOWTO(R_390_PLT24DBL,	 1, 2, 24,  TRUE, 0, complain_overflow_bitfield,
171 	bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
172 };
173 
174 /* GNU extension to record C++ vtable hierarchy.  */
175 static reloc_howto_type elf32_s390_vtinherit_howto =
176   HOWTO (R_390_GNU_VTINHERIT, 0,2,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
177 static reloc_howto_type elf32_s390_vtentry_howto =
178   HOWTO (R_390_GNU_VTENTRY, 0,2,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
179 
180 static reloc_howto_type *
181 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 			    bfd_reloc_code_real_type code)
183 {
184   switch (code)
185     {
186     case BFD_RELOC_NONE:
187       return &elf_howto_table[(int) R_390_NONE];
188     case BFD_RELOC_8:
189       return &elf_howto_table[(int) R_390_8];
190     case BFD_RELOC_390_12:
191       return &elf_howto_table[(int) R_390_12];
192     case BFD_RELOC_16:
193       return &elf_howto_table[(int) R_390_16];
194     case BFD_RELOC_32:
195       return &elf_howto_table[(int) R_390_32];
196     case BFD_RELOC_CTOR:
197       return &elf_howto_table[(int) R_390_32];
198     case BFD_RELOC_32_PCREL:
199       return &elf_howto_table[(int) R_390_PC32];
200     case BFD_RELOC_390_GOT12:
201       return &elf_howto_table[(int) R_390_GOT12];
202     case BFD_RELOC_32_GOT_PCREL:
203       return &elf_howto_table[(int) R_390_GOT32];
204     case BFD_RELOC_390_PLT32:
205       return &elf_howto_table[(int) R_390_PLT32];
206     case BFD_RELOC_390_COPY:
207       return &elf_howto_table[(int) R_390_COPY];
208     case BFD_RELOC_390_GLOB_DAT:
209       return &elf_howto_table[(int) R_390_GLOB_DAT];
210     case BFD_RELOC_390_JMP_SLOT:
211       return &elf_howto_table[(int) R_390_JMP_SLOT];
212     case BFD_RELOC_390_RELATIVE:
213       return &elf_howto_table[(int) R_390_RELATIVE];
214     case BFD_RELOC_32_GOTOFF:
215       return &elf_howto_table[(int) R_390_GOTOFF32];
216     case BFD_RELOC_390_GOTPC:
217       return &elf_howto_table[(int) R_390_GOTPC];
218     case BFD_RELOC_390_GOT16:
219       return &elf_howto_table[(int) R_390_GOT16];
220     case BFD_RELOC_16_PCREL:
221       return &elf_howto_table[(int) R_390_PC16];
222     case BFD_RELOC_390_PC12DBL:
223       return &elf_howto_table[(int) R_390_PC12DBL];
224     case BFD_RELOC_390_PLT12DBL:
225       return &elf_howto_table[(int) R_390_PLT12DBL];
226     case BFD_RELOC_390_PC16DBL:
227       return &elf_howto_table[(int) R_390_PC16DBL];
228     case BFD_RELOC_390_PLT16DBL:
229       return &elf_howto_table[(int) R_390_PLT16DBL];
230     case BFD_RELOC_390_PC24DBL:
231       return &elf_howto_table[(int) R_390_PC24DBL];
232     case BFD_RELOC_390_PLT24DBL:
233       return &elf_howto_table[(int) R_390_PLT24DBL];
234     case BFD_RELOC_390_PC32DBL:
235       return &elf_howto_table[(int) R_390_PC32DBL];
236     case BFD_RELOC_390_PLT32DBL:
237       return &elf_howto_table[(int) R_390_PLT32DBL];
238     case BFD_RELOC_390_GOTPCDBL:
239       return &elf_howto_table[(int) R_390_GOTPCDBL];
240     case BFD_RELOC_390_GOTENT:
241       return &elf_howto_table[(int) R_390_GOTENT];
242     case BFD_RELOC_16_GOTOFF:
243       return &elf_howto_table[(int) R_390_GOTOFF16];
244     case BFD_RELOC_390_GOTPLT12:
245       return &elf_howto_table[(int) R_390_GOTPLT12];
246     case BFD_RELOC_390_GOTPLT16:
247       return &elf_howto_table[(int) R_390_GOTPLT16];
248     case BFD_RELOC_390_GOTPLT32:
249       return &elf_howto_table[(int) R_390_GOTPLT32];
250     case BFD_RELOC_390_GOTPLTENT:
251       return &elf_howto_table[(int) R_390_GOTPLTENT];
252     case BFD_RELOC_390_PLTOFF16:
253       return &elf_howto_table[(int) R_390_PLTOFF16];
254     case BFD_RELOC_390_PLTOFF32:
255       return &elf_howto_table[(int) R_390_PLTOFF32];
256     case BFD_RELOC_390_TLS_LOAD:
257       return &elf_howto_table[(int) R_390_TLS_LOAD];
258     case BFD_RELOC_390_TLS_GDCALL:
259       return &elf_howto_table[(int) R_390_TLS_GDCALL];
260     case BFD_RELOC_390_TLS_LDCALL:
261       return &elf_howto_table[(int) R_390_TLS_LDCALL];
262     case BFD_RELOC_390_TLS_GD32:
263       return &elf_howto_table[(int) R_390_TLS_GD32];
264     case BFD_RELOC_390_TLS_GOTIE12:
265       return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266     case BFD_RELOC_390_TLS_GOTIE32:
267       return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268     case BFD_RELOC_390_TLS_LDM32:
269       return &elf_howto_table[(int) R_390_TLS_LDM32];
270     case BFD_RELOC_390_TLS_IE32:
271       return &elf_howto_table[(int) R_390_TLS_IE32];
272     case BFD_RELOC_390_TLS_IEENT:
273       return &elf_howto_table[(int) R_390_TLS_IEENT];
274     case BFD_RELOC_390_TLS_LE32:
275       return &elf_howto_table[(int) R_390_TLS_LE32];
276     case BFD_RELOC_390_TLS_LDO32:
277       return &elf_howto_table[(int) R_390_TLS_LDO32];
278     case BFD_RELOC_390_TLS_DTPMOD:
279       return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280     case BFD_RELOC_390_TLS_DTPOFF:
281       return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282     case BFD_RELOC_390_TLS_TPOFF:
283       return &elf_howto_table[(int) R_390_TLS_TPOFF];
284     case BFD_RELOC_390_20:
285       return &elf_howto_table[(int) R_390_20];
286     case BFD_RELOC_390_GOT20:
287       return &elf_howto_table[(int) R_390_GOT20];
288     case BFD_RELOC_390_GOTPLT20:
289       return &elf_howto_table[(int) R_390_GOTPLT20];
290     case BFD_RELOC_390_TLS_GOTIE20:
291       return &elf_howto_table[(int) R_390_TLS_GOTIE20];
292     case BFD_RELOC_390_IRELATIVE:
293       return &elf_howto_table[(int) R_390_IRELATIVE];
294     case BFD_RELOC_VTABLE_INHERIT:
295       return &elf32_s390_vtinherit_howto;
296     case BFD_RELOC_VTABLE_ENTRY:
297       return &elf32_s390_vtentry_howto;
298     default:
299       break;
300     }
301   return 0;
302 }
303 
304 static reloc_howto_type *
305 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 			    const char *r_name)
307 {
308   unsigned int i;
309 
310   for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311     if (elf_howto_table[i].name != NULL
312 	&& strcasecmp (elf_howto_table[i].name, r_name) == 0)
313       return &elf_howto_table[i];
314 
315   if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316     return &elf32_s390_vtinherit_howto;
317   if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318     return &elf32_s390_vtentry_howto;
319 
320   return NULL;
321 }
322 
323 /* We need to use ELF32_R_TYPE so we have our own copy of this function,
324    and elf32-s390.c has its own copy.  */
325 
326 static bfd_boolean
327 elf_s390_info_to_howto (bfd *abfd,
328 			arelent *cache_ptr,
329 			Elf_Internal_Rela *dst)
330 {
331   unsigned int r_type = ELF32_R_TYPE(dst->r_info);
332 
333   switch (r_type)
334     {
335     case R_390_GNU_VTINHERIT:
336       cache_ptr->howto = &elf32_s390_vtinherit_howto;
337       break;
338 
339     case R_390_GNU_VTENTRY:
340       cache_ptr->howto = &elf32_s390_vtentry_howto;
341       break;
342 
343     default:
344       if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
345 	{
346 	  /* xgettext:c-format */
347 	  _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
348 			      abfd, r_type);
349 	  bfd_set_error (bfd_error_bad_value);
350 	  return FALSE;
351 	}
352       cache_ptr->howto = &elf_howto_table[r_type];
353     }
354 
355   return TRUE;
356 }
357 
358 /* A relocation function which doesn't do anything.  */
359 static bfd_reloc_status_type
360 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
361 		arelent *reloc_entry,
362 		asymbol *symbol ATTRIBUTE_UNUSED,
363 		void * data ATTRIBUTE_UNUSED,
364 		asection *input_section,
365 		bfd *output_bfd,
366 		char **error_message ATTRIBUTE_UNUSED)
367 {
368   if (output_bfd)
369     reloc_entry->address += input_section->output_offset;
370   return bfd_reloc_ok;
371 }
372 
373 /* Handle the large displacement relocs.  */
374 static bfd_reloc_status_type
375 s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
376 		      arelent *reloc_entry,
377 		      asymbol *symbol,
378 		      void * data ATTRIBUTE_UNUSED,
379 		      asection *input_section,
380 		      bfd *output_bfd,
381 		      char **error_message ATTRIBUTE_UNUSED)
382 {
383   reloc_howto_type *howto = reloc_entry->howto;
384   bfd_vma relocation;
385   bfd_vma insn;
386 
387   if (output_bfd != (bfd *) NULL
388       && (symbol->flags & BSF_SECTION_SYM) == 0
389       && (! howto->partial_inplace
390 	  || reloc_entry->addend == 0))
391     {
392       reloc_entry->address += input_section->output_offset;
393       return bfd_reloc_ok;
394     }
395 
396   if (output_bfd != NULL)
397     return bfd_reloc_continue;
398 
399   if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
400     return bfd_reloc_outofrange;
401 
402   relocation = (symbol->value
403 		+ symbol->section->output_section->vma
404 		+ symbol->section->output_offset);
405   relocation += reloc_entry->addend;
406   if (howto->pc_relative)
407     {
408       relocation -= (input_section->output_section->vma
409 		     + input_section->output_offset);
410       relocation -= reloc_entry->address;
411     }
412 
413   insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
414   insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
415   bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
416 
417   if ((bfd_signed_vma) relocation < - 0x80000
418       || (bfd_signed_vma) relocation > 0x7ffff)
419     return bfd_reloc_overflow;
420   else
421     return bfd_reloc_ok;
422 }
423 
424 static bfd_boolean
425 elf_s390_is_local_label_name (bfd *abfd, const char *name)
426 {
427   if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
428     return TRUE;
429 
430   return _bfd_elf_is_local_label_name (abfd, name);
431 }
432 
433 /* Functions for the 390 ELF linker.  */
434 
435 /* The name of the dynamic interpreter.  This is put in the .interp
436    section.  */
437 
438 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
439 
440 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
441    copying dynamic variables from a shared lib into an app's dynbss
442    section, and instead use a dynamic relocation to point into the
443    shared lib.  */
444 #define ELIMINATE_COPY_RELOCS 1
445 
446 /* The size in bytes of the first entry in the procedure linkage table.  */
447 #define PLT_FIRST_ENTRY_SIZE 32
448 /* The size in bytes of an entry in the procedure linkage table.  */
449 #define PLT_ENTRY_SIZE 32
450 
451 #define GOT_ENTRY_SIZE 4
452 
453 #define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
454 
455 /* The first three entries in a procedure linkage table are reserved,
456    and the initial contents are unimportant (we zero them out).
457    Subsequent entries look like this.  See the SVR4 ABI 386
458    supplement to see how this works.  */
459 
460 /* For the s390, simple addr offset can only be 0 - 4096.
461    To use the full 2 GB address space, several instructions
462    are needed to load an address in a register and execute
463    a branch( or just saving the address)
464 
465    Furthermore, only r 0 and 1 are free to use!!!  */
466 
467 /* The first 3 words in the GOT are then reserved.
468    Word 0 is the address of the dynamic table.
469    Word 1 is a pointer to a structure describing the object
470    Word 2 is used to point to the loader entry address.
471 
472    The code for position independent PLT entries looks like this:
473 
474    r12 holds addr of the current GOT at entry to the PLT
475 
476    The GOT holds the address in the PLT to be executed.
477    The loader then gets:
478    24(15) =  Pointer to the structure describing the object.
479    28(15) =  Offset into rela.plt
480 
481    The loader  must  then find the module where the function is
482    and insert the address in the GOT.
483 
484   Note: 390 can only address +- 64 K relative.
485 	We check if offset > 65536, then make a relative branch -64xxx
486 	back to a previous defined branch
487 
488 PLT1: BASR 1,0	       # 2 bytes
489       L	   1,22(1)     # 4 bytes  Load offset in GOT in r 1
490       L	   1,(1,12)    # 4 bytes  Load address from GOT in r1
491       BCR  15,1	       # 2 bytes  Jump to address
492 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
493       L	   1,14(1)     # 4 bytes  Load offset in symol table in r1
494       BRC  15,-x       # 4 bytes  Jump to start of PLT
495       .word 0	       # 2 bytes filler
496       .long ?	       # 4 bytes  offset in GOT
497       .long ?	       # 4 bytes  offset into rela.plt
498 
499   This was the general case. There are two additional, optimizes PLT
500   definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
501   First the one for GOT offsets < 4096:
502 
503 PLT1: L	   1,<offset>(12) # 4 bytes  Load address from GOT in R1
504       BCR  15,1		  # 2 bytes  Jump to address
505       .word 0,0,0	  # 6 bytes  filler
506 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
507       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
508       BRC  15,-x	  # 4 bytes  Jump to start of PLT
509       .word 0,0,0	  # 6 bytes  filler
510       .long ?		  # 4 bytes  offset into rela.plt
511 
512   Second the one for GOT offsets < 32768:
513 
514 PLT1: LHI  1,<offset>	  # 4 bytes  Load offset in GOT to r1
515       L	   1,(1,12)	  # 4 bytes  Load address from GOT to r1
516       BCR  15,1		  # 2 bytes  Jump to address
517       .word 0		  # 2 bytes  filler
518 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
519       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
520       BRC  15,-x	  # 4 bytes  Jump to start of PLT
521       .word 0,0,0	  # 6 bytes  filler
522       .long ?		  # 4 bytes  offset into rela.plt
523 
524 Total = 32 bytes per PLT entry
525 
526    The code for static build PLT entries looks like this:
527 
528 PLT1: BASR 1,0	       # 2 bytes
529       L	   1,22(1)     # 4 bytes  Load address of GOT entry
530       L	   1,0(0,1)    # 4 bytes  Load address from GOT in r1
531       BCR  15,1	       # 2 bytes  Jump to address
532 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
533       L	   1,14(1)     # 4 bytes  Load offset in symbol table in r1
534       BRC  15,-x       # 4 bytes  Jump to start of PLT
535       .word 0	       # 2 bytes  filler
536       .long ?	       # 4 bytes  address of GOT entry
537       .long ?	       # 4 bytes  offset into rela.plt  */
538 
539 static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
540   {
541     0x0d, 0x10,				    /* basr    %r1,%r0	   */
542     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1) */
543     0x58, 0x10, 0x10, 0x00,		    /* l       %r1,0(%r1)  */
544     0x07, 0xf1,				    /* br      %r1	   */
545     0x0d, 0x10,				    /* basr    %r1,%r0	   */
546     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1) */
547     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt   */
548     0x00, 0x00,				    /* padding		   */
549     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	   */
550     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	   */
551   };
552 
553 /* Generic PLT pic entry.  */
554 static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
555   {
556     0x0d, 0x10,				    /* basr    %r1,%r0	       */
557     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1)     */
558     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
559     0x07, 0xf1,				    /* br      %r1	       */
560     0x0d, 0x10,				    /* basr    %r1,%r0	       */
561     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
562     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
563     0x00, 0x00,				    /* padding		       */
564     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	       */
565     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	       */
566   };
567 
568 /* Optimized PLT pic entry for GOT offset < 4k.  xx will be replaced
569    when generating the PLT slot with the GOT offset.  */
570 static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
571   {
572     0x58, 0x10, 0xc0, 0x00,		    /* l       %r1,xx(%r12) */
573     0x07, 0xf1,				    /* br      %r1	    */
574     0x00, 0x00, 0x00, 0x00,		    /* padding		    */
575     0x00, 0x00,
576     0x0d, 0x10,				    /* basr    %r1,%r0	    */
577     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)  */
578     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt    */
579     0x00, 0x00, 0x00, 0x00,
580     0x00, 0x00, 0x00, 0x00
581   };
582 
583 /* Optimized PLT pic entry for GOT offset < 32k.  xx will be replaced
584    when generating the PLT slot with the GOT offset.  */
585 static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
586   {
587     0xa7, 0x18, 0x00, 0x00,		    /* lhi     %r1,xx	       */
588     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
589     0x07, 0xf1,				    /* br      %r1	       */
590     0x00, 0x00,
591     0x0d, 0x10,				    /* basr    %r1,%r0	       */
592     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
593     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
594     0x00, 0x00, 0x00, 0x00,
595     0x00, 0x00, 0x00, 0x00,
596     0x00, 0x00
597   };
598 
599 /* The first PLT entry pushes the offset into the rela.plt
600    from R1 onto the stack at 8(15) and the loader object info
601    at 12(15), loads the loader address in R1 and jumps to it.  */
602 
603 /* The first entry in the PLT for PIC code:
604 
605 PLT0:
606    ST	1,28(15)  # R1 has offset into rela.plt
607    L	1,4(12)	  # Get loader ino(object struct address)
608    ST	1,24(15)  # Store address
609    L	1,8(12)	  # Entry address of loader in R1
610    BR	1	  # Jump to loader
611 
612    The first entry in the PLT for static code:
613 
614 PLT0:
615    ST	1,28(15)      # R1 has offset into rela.plt
616    BASR 1,0
617    L	1,18(0,1)     # Get address of GOT
618    MVC	24(4,15),4(1) # Move loader ino to stack
619    L	1,8(1)	      # Get address of loader
620    BR	1	      # Jump to loader
621    .word 0	      # filler
622    .long got	      # address of GOT  */
623 
624 static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
625   {
626     0x50, 0x10, 0xf0, 0x1c,		      /* st	 %r1,28(%r15)	   */
627     0x0d, 0x10,				      /* basr	 %r1,%r0	   */
628     0x58, 0x10, 0x10, 0x12,		      /* l	 %r1,18(%r1)	   */
629     0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04,	      /* mvc	 24(4,%r15),4(%r1) */
630     0x58, 0x10, 0x10, 0x08,		      /* l	 %r1,8(%r1)	   */
631     0x07, 0xf1,				      /* br	 %r1		   */
632     0x00, 0x00, 0x00, 0x00,
633     0x00, 0x00, 0x00, 0x00,
634     0x00, 0x00
635   };
636 
637 static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
638   {
639     0x50, 0x10, 0xf0, 0x1c,			/* st	   %r1,28(%r15)	 */
640     0x58, 0x10, 0xc0, 0x04,			/* l	   %r1,4(%r12)	 */
641     0x50, 0x10, 0xf0, 0x18,			/* st	   %r1,24(%r15)	 */
642     0x58, 0x10, 0xc0, 0x08,			/* l	   %r1,8(%r12)	 */
643     0x07, 0xf1,					/* br	   %r1		 */
644     0x00, 0x00, 0x00, 0x00,
645     0x00, 0x00, 0x00, 0x00,
646     0x00, 0x00, 0x00, 0x00,
647     0x00, 0x00
648   };
649 
650 
651 /* s390 ELF linker hash entry.  */
652 
653 struct elf_s390_link_hash_entry
654 {
655   struct elf_link_hash_entry elf;
656 
657   /* Track dynamic relocs copied for this symbol.  */
658   struct elf_dyn_relocs *dyn_relocs;
659 
660   /* Number of GOTPLT references for a function.  */
661   bfd_signed_vma gotplt_refcount;
662 
663 #define GOT_UNKNOWN	0
664 #define GOT_NORMAL	1
665 #define GOT_TLS_GD	2
666 #define GOT_TLS_IE	3
667 #define GOT_TLS_IE_NLT	4
668   unsigned char tls_type;
669 
670   /* For pointer equality reasons we might need to change the symbol
671      type from STT_GNU_IFUNC to STT_FUNC together with its value and
672      section entry.  So after alloc_dynrelocs only these values should
673      be used.  In order to check whether a symbol is IFUNC use
674      s390_is_ifunc_symbol_p.  */
675   bfd_vma ifunc_resolver_address;
676   asection *ifunc_resolver_section;
677 };
678 
679 #define elf_s390_hash_entry(ent) \
680   ((struct elf_s390_link_hash_entry *)(ent))
681 
682 /* This structure represents an entry in the local PLT list needed for
683    local IFUNC symbols.  */
684 struct plt_entry
685 {
686   /* The section of the local symbol.
687      Set in relocate_section and used in finish_dynamic_sections.  */
688   asection *sec;
689 
690   union
691   {
692     bfd_signed_vma refcount;
693     bfd_vma offset;
694   } plt;
695 };
696 
697 /* NOTE: Keep this structure in sync with
698    the one declared in elf64-s390.c.  */
699 struct elf_s390_obj_tdata
700 {
701   struct elf_obj_tdata root;
702 
703   /* A local PLT is needed for ifunc symbols.  */
704   struct plt_entry *local_plt;
705 
706   /* TLS type for each local got entry.  */
707   char *local_got_tls_type;
708 };
709 
710 #define elf_s390_tdata(abfd) \
711   ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
712 
713 #define elf_s390_local_plt(abfd)		\
714   (elf_s390_tdata (abfd)->local_plt)
715 
716 #define elf_s390_local_got_tls_type(abfd) \
717   (elf_s390_tdata (abfd)->local_got_tls_type)
718 
719 #define is_s390_elf(bfd) \
720   (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
721    && elf_tdata (bfd) != NULL \
722    && elf_object_id (bfd) == S390_ELF_DATA)
723 
724 static bfd_boolean
725 elf_s390_mkobject (bfd *abfd)
726 {
727   return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
728 				  S390_ELF_DATA);
729 }
730 
731 static bfd_boolean
732 elf_s390_object_p (bfd *abfd)
733 {
734   /* Set the right machine number for an s390 elf32 file.  */
735   return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
736 }
737 
738 /* s390 ELF linker hash table.  */
739 
740 struct elf_s390_link_hash_table
741 {
742   struct elf_link_hash_table elf;
743 
744   /* Short-cuts to get to dynamic linker sections.  */
745   asection *irelifunc;
746 
747   union
748   {
749     bfd_signed_vma refcount;
750     bfd_vma offset;
751   } tls_ldm_got;
752 
753   /* Small local sym cache.  */
754   struct sym_cache sym_cache;
755 };
756 
757 /* Get the s390 ELF linker hash table from a link_info structure.  */
758 
759 #define elf_s390_hash_table(p) \
760   (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
761   == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
762 
763 #undef ELF64
764 #include "elf-s390-common.c"
765 
766 /* Create an entry in an s390 ELF linker hash table.  */
767 
768 static struct bfd_hash_entry *
769 link_hash_newfunc (struct bfd_hash_entry *entry,
770 		   struct bfd_hash_table *table,
771 		   const char *string)
772 {
773   /* Allocate the structure if it has not already been allocated by a
774      subclass.  */
775   if (entry == NULL)
776     {
777       entry = bfd_hash_allocate (table,
778 				 sizeof (struct elf_s390_link_hash_entry));
779       if (entry == NULL)
780 	return entry;
781     }
782 
783   /* Call the allocation method of the superclass.  */
784   entry = _bfd_elf_link_hash_newfunc (entry, table, string);
785   if (entry != NULL)
786     {
787       struct elf_s390_link_hash_entry *eh;
788 
789       eh = (struct elf_s390_link_hash_entry *) entry;
790       eh->dyn_relocs = NULL;
791       eh->gotplt_refcount = 0;
792       eh->tls_type = GOT_UNKNOWN;
793       eh->ifunc_resolver_address = 0;
794       eh->ifunc_resolver_section = NULL;
795     }
796 
797   return entry;
798 }
799 
800 /* Create an s390 ELF linker hash table.  */
801 
802 static struct bfd_link_hash_table *
803 elf_s390_link_hash_table_create (bfd *abfd)
804 {
805   struct elf_s390_link_hash_table *ret;
806   bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
807 
808   ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
809   if (ret == NULL)
810     return NULL;
811 
812   if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
813 				      sizeof (struct elf_s390_link_hash_entry),
814 				      S390_ELF_DATA))
815     {
816       free (ret);
817       return NULL;
818     }
819 
820   return &ret->elf.root;
821 }
822 
823 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
824 
825 static void
826 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
827 			       struct elf_link_hash_entry *dir,
828 			       struct elf_link_hash_entry *ind)
829 {
830   struct elf_s390_link_hash_entry *edir, *eind;
831 
832   edir = (struct elf_s390_link_hash_entry *) dir;
833   eind = (struct elf_s390_link_hash_entry *) ind;
834 
835   if (eind->dyn_relocs != NULL)
836     {
837       if (edir->dyn_relocs != NULL)
838 	{
839 	  struct elf_dyn_relocs **pp;
840 	  struct elf_dyn_relocs *p;
841 
842 	  /* Add reloc counts against the indirect sym to the direct sym
843 	     list.  Merge any entries against the same section.  */
844 	  for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
845 	    {
846 	      struct elf_dyn_relocs *q;
847 
848 	      for (q = edir->dyn_relocs; q != NULL; q = q->next)
849 		if (q->sec == p->sec)
850 		  {
851 		    q->pc_count += p->pc_count;
852 		    q->count += p->count;
853 		    *pp = p->next;
854 		    break;
855 		  }
856 	      if (q == NULL)
857 		pp = &p->next;
858 	    }
859 	  *pp = edir->dyn_relocs;
860 	}
861 
862       edir->dyn_relocs = eind->dyn_relocs;
863       eind->dyn_relocs = NULL;
864     }
865 
866   if (ind->root.type == bfd_link_hash_indirect
867       && dir->got.refcount <= 0)
868     {
869       edir->tls_type = eind->tls_type;
870       eind->tls_type = GOT_UNKNOWN;
871     }
872 
873   if (ELIMINATE_COPY_RELOCS
874       && ind->root.type != bfd_link_hash_indirect
875       && dir->dynamic_adjusted)
876     {
877       /* If called to transfer flags for a weakdef during processing
878 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
879 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
880       if (dir->versioned != versioned_hidden)
881 	dir->ref_dynamic |= ind->ref_dynamic;
882       dir->ref_regular |= ind->ref_regular;
883       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
884       dir->needs_plt |= ind->needs_plt;
885     }
886   else
887     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
888 }
889 
890 static int
891 elf_s390_tls_transition (struct bfd_link_info *info,
892 			 int r_type,
893 			 int is_local)
894 {
895   if (bfd_link_pic (info))
896     return r_type;
897 
898   switch (r_type)
899     {
900     case R_390_TLS_GD32:
901     case R_390_TLS_IE32:
902       if (is_local)
903 	return R_390_TLS_LE32;
904       return R_390_TLS_IE32;
905     case R_390_TLS_GOTIE32:
906       if (is_local)
907 	return R_390_TLS_LE32;
908       return R_390_TLS_GOTIE32;
909     case R_390_TLS_LDM32:
910       return R_390_TLS_LE32;
911     }
912 
913   return r_type;
914 }
915 
916 /* Look through the relocs for a section during the first phase, and
917    allocate space in the global offset table or procedure linkage
918    table.  */
919 
920 static bfd_boolean
921 elf_s390_check_relocs (bfd *abfd,
922 		       struct bfd_link_info *info,
923 		       asection *sec,
924 		       const Elf_Internal_Rela *relocs)
925 {
926   struct elf_s390_link_hash_table *htab;
927   Elf_Internal_Shdr *symtab_hdr;
928   struct elf_link_hash_entry **sym_hashes;
929   const Elf_Internal_Rela *rel;
930   const Elf_Internal_Rela *rel_end;
931   asection *sreloc;
932   bfd_signed_vma *local_got_refcounts;
933   int tls_type, old_tls_type;
934   Elf_Internal_Sym *isym;
935 
936   if (bfd_link_relocatable (info))
937     return TRUE;
938 
939   BFD_ASSERT (is_s390_elf (abfd));
940 
941   htab = elf_s390_hash_table (info);
942   symtab_hdr = &elf_symtab_hdr (abfd);
943   sym_hashes = elf_sym_hashes (abfd);
944   local_got_refcounts = elf_local_got_refcounts (abfd);
945 
946   sreloc = NULL;
947 
948   rel_end = relocs + sec->reloc_count;
949   for (rel = relocs; rel < rel_end; rel++)
950     {
951       unsigned int r_type;
952       unsigned int r_symndx;
953       struct elf_link_hash_entry *h;
954 
955       r_symndx = ELF32_R_SYM (rel->r_info);
956 
957       if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
958 	{
959 	  /* xgettext:c-format */
960 	  _bfd_error_handler (_("%pB: bad symbol index: %d"),
961 			      abfd, r_symndx);
962 	  return FALSE;
963 	}
964 
965       if (r_symndx < symtab_hdr->sh_info)
966 	{
967 	  /* A local symbol.  */
968 	  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
969 					abfd, r_symndx);
970 	  if (isym == NULL)
971 	    return FALSE;
972 
973 	  if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
974 	    {
975 	      struct plt_entry *plt;
976 
977 	      if (htab->elf.dynobj == NULL)
978 		htab->elf.dynobj = abfd;
979 
980 	      if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
981 		return FALSE;
982 
983 	      if (local_got_refcounts == NULL)
984 		{
985 		  if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
986 		    return FALSE;
987 		  local_got_refcounts = elf_local_got_refcounts (abfd);
988 		}
989 	      plt = elf_s390_local_plt (abfd);
990 	      plt[r_symndx].plt.refcount++;
991 	    }
992 	  h = NULL;
993 	}
994       else
995 	{
996 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
997 	  while (h->root.type == bfd_link_hash_indirect
998 		 || h->root.type == bfd_link_hash_warning)
999 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
1000 	}
1001 
1002       /* Create got section and local_got_refcounts array if they
1003 	 are needed.  */
1004       r_type = elf_s390_tls_transition (info,
1005 					ELF32_R_TYPE (rel->r_info),
1006 					h == NULL);
1007       switch (r_type)
1008 	{
1009 	case R_390_GOT12:
1010 	case R_390_GOT16:
1011 	case R_390_GOT20:
1012 	case R_390_GOT32:
1013 	case R_390_GOTENT:
1014 	case R_390_GOTPLT12:
1015 	case R_390_GOTPLT16:
1016 	case R_390_GOTPLT20:
1017 	case R_390_GOTPLT32:
1018 	case R_390_GOTPLTENT:
1019 	case R_390_TLS_GD32:
1020 	case R_390_TLS_GOTIE12:
1021 	case R_390_TLS_GOTIE20:
1022 	case R_390_TLS_GOTIE32:
1023 	case R_390_TLS_IEENT:
1024 	case R_390_TLS_IE32:
1025 	case R_390_TLS_LDM32:
1026 	  if (h == NULL
1027 	      && local_got_refcounts == NULL)
1028 	    {
1029 	      if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
1030 		return FALSE;
1031 	      local_got_refcounts = elf_local_got_refcounts (abfd);
1032 	    }
1033 	  /* Fall through.  */
1034 	case R_390_GOTOFF16:
1035 	case R_390_GOTOFF32:
1036 	case R_390_GOTPC:
1037 	case R_390_GOTPCDBL:
1038 	  if (htab->elf.sgot == NULL)
1039 	    {
1040 	      if (htab->elf.dynobj == NULL)
1041 		htab->elf.dynobj = abfd;
1042 	      if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
1043 		return FALSE;
1044 	    }
1045 	}
1046 
1047       if (h != NULL)
1048 	{
1049 	  if (htab->elf.dynobj == NULL)
1050 	    htab->elf.dynobj = abfd;
1051 	  if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1052 	    return FALSE;
1053 
1054 	  /* Make sure an IFUNC symbol defined in a non-shared object
1055 	     always gets a PLT slot.  */
1056 	  if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1057 	    {
1058 	      /* The symbol is called by the dynamic loader in order
1059 		 to resolve the relocation.  So it is in fact also
1060 		 referenced.  */
1061 	      h->ref_regular = 1;
1062 	      h->needs_plt = 1;
1063 	    }
1064 	}
1065       switch (r_type)
1066 	{
1067 	case R_390_GOTPC:
1068 	case R_390_GOTPCDBL:
1069 	  /* These relocs do not need a GOT slot.  They just load the
1070 	     GOT pointer itself or address something else relative to
1071 	     the GOT.  Since the GOT pointer has been set up above we
1072 	     are done.  */
1073 	  break;
1074 	case R_390_GOTOFF16:
1075 	case R_390_GOTOFF32:
1076 	  if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1077 	    break;
1078 	  /* Fall through.  */
1079 
1080 	case R_390_PLT12DBL:
1081 	case R_390_PLT16DBL:
1082 	case R_390_PLT24DBL:
1083 	case R_390_PLT32DBL:
1084 	case R_390_PLT32:
1085 	case R_390_PLTOFF16:
1086 	case R_390_PLTOFF32:
1087 	  /* This symbol requires a procedure linkage table entry.  We
1088 	     actually build the entry in adjust_dynamic_symbol,
1089 	     because this might be a case of linking PIC code which is
1090 	     never referenced by a dynamic object, in which case we
1091 	     don't need to generate a procedure linkage table entry
1092 	     after all.  */
1093 
1094 	  /* If this is a local symbol, we resolve it directly without
1095 	     creating a procedure linkage table entry.  */
1096 	  if (h != NULL)
1097 	    {
1098 	      h->needs_plt = 1;
1099 	      h->plt.refcount += 1;
1100 	    }
1101 	  break;
1102 
1103 	case R_390_GOTPLT12:
1104 	case R_390_GOTPLT16:
1105 	case R_390_GOTPLT20:
1106 	case R_390_GOTPLT32:
1107 	case R_390_GOTPLTENT:
1108 	  /* This symbol requires either a procedure linkage table entry
1109 	     or an entry in the local got. We actually build the entry
1110 	     in adjust_dynamic_symbol because whether this is really a
1111 	     global reference can change and with it the fact if we have
1112 	     to create a plt entry or a local got entry. To be able to
1113 	     make a once global symbol a local one we have to keep track
1114 	     of the number of gotplt references that exist for this
1115 	     symbol.  */
1116 	  if (h != NULL)
1117 	    {
1118 	      ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1119 	      h->needs_plt = 1;
1120 	      h->plt.refcount += 1;
1121 	    }
1122 	  else
1123 	    local_got_refcounts[r_symndx] += 1;
1124 	  break;
1125 
1126 	case R_390_TLS_LDM32:
1127 	  htab->tls_ldm_got.refcount += 1;
1128 	  break;
1129 
1130 	case R_390_TLS_IE32:
1131 	case R_390_TLS_GOTIE12:
1132 	case R_390_TLS_GOTIE20:
1133 	case R_390_TLS_GOTIE32:
1134 	case R_390_TLS_IEENT:
1135 	  if (bfd_link_pic (info))
1136 	    info->flags |= DF_STATIC_TLS;
1137 	  /* Fall through.  */
1138 
1139 	case R_390_GOT12:
1140 	case R_390_GOT16:
1141 	case R_390_GOT20:
1142 	case R_390_GOT32:
1143 	case R_390_GOTENT:
1144 	case R_390_TLS_GD32:
1145 	  /* This symbol requires a global offset table entry.  */
1146 	  switch (r_type)
1147 	    {
1148 	    default:
1149 	    case R_390_GOT12:
1150 	    case R_390_GOT16:
1151 	    case R_390_GOT20:
1152 	    case R_390_GOT32:
1153 	    case R_390_GOTENT:
1154 	      tls_type = GOT_NORMAL;
1155 	      break;
1156 	    case R_390_TLS_GD32:
1157 	      tls_type = GOT_TLS_GD;
1158 	      break;
1159 	    case R_390_TLS_IE32:
1160 	    case R_390_TLS_GOTIE32:
1161 	      tls_type = GOT_TLS_IE;
1162 	      break;
1163 	    case R_390_TLS_GOTIE12:
1164 	    case R_390_TLS_GOTIE20:
1165 	    case R_390_TLS_IEENT:
1166 	      tls_type = GOT_TLS_IE_NLT;
1167 	      break;
1168 	    }
1169 
1170 	  if (h != NULL)
1171 	    {
1172 	      h->got.refcount += 1;
1173 	      old_tls_type = elf_s390_hash_entry(h)->tls_type;
1174 	    }
1175 	  else
1176 	    {
1177 	      local_got_refcounts[r_symndx] += 1;
1178 	      old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1179 	    }
1180 	  /* If a TLS symbol is accessed using IE at least once,
1181 	     there is no point to use dynamic model for it.  */
1182 	  if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1183 	    {
1184 	      if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1185 		{
1186 		  _bfd_error_handler
1187 		    /* xgettext:c-format */
1188 		    (_("%pB: `%s' accessed both as normal and thread local symbol"),
1189 		     abfd, h->root.root.string);
1190 		  return FALSE;
1191 		}
1192 	      if (old_tls_type > tls_type)
1193 		tls_type = old_tls_type;
1194 	    }
1195 
1196 	  if (old_tls_type != tls_type)
1197 	    {
1198 	      if (h != NULL)
1199 		elf_s390_hash_entry (h)->tls_type = tls_type;
1200 	      else
1201 		elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1202 	    }
1203 
1204 	  if (r_type != R_390_TLS_IE32)
1205 	    break;
1206 	  /* Fall through.  */
1207 
1208 	case R_390_TLS_LE32:
1209 	  /* For static linking and executables this reloc will be
1210 	     calculated at linktime otherwise a TLS_TPOFF runtime
1211 	     reloc will be generated.  */
1212 	  if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
1213 	    break;
1214 
1215 	  if (!bfd_link_pic (info))
1216 	    break;
1217 	  info->flags |= DF_STATIC_TLS;
1218 	  /* Fall through.  */
1219 
1220 	case R_390_8:
1221 	case R_390_16:
1222 	case R_390_32:
1223 	case R_390_PC16:
1224 	case R_390_PC12DBL:
1225 	case R_390_PC16DBL:
1226 	case R_390_PC24DBL:
1227 	case R_390_PC32DBL:
1228 	case R_390_PC32:
1229 	  if (h != NULL && bfd_link_executable (info))
1230 	    {
1231 	      /* If this reloc is in a read-only section, we might
1232 		 need a copy reloc.  We can't check reliably at this
1233 		 stage whether the section is read-only, as input
1234 		 sections have not yet been mapped to output sections.
1235 		 Tentatively set the flag for now, and correct in
1236 		 adjust_dynamic_symbol.  */
1237 	      h->non_got_ref = 1;
1238 
1239 	      if (!bfd_link_pic (info))
1240 		{
1241 		  /* We may need a .plt entry if the function this reloc
1242 		     refers to is in a shared lib.  */
1243 		  h->plt.refcount += 1;
1244 		}
1245 	    }
1246 
1247 	  /* If we are creating a shared library, and this is a reloc
1248 	     against a global symbol, or a non PC relative reloc
1249 	     against a local symbol, then we need to copy the reloc
1250 	     into the shared library.  However, if we are linking with
1251 	     -Bsymbolic, we do not need to copy a reloc against a
1252 	     global symbol which is defined in an object we are
1253 	     including in the link (i.e., DEF_REGULAR is set).  At
1254 	     this point we have not seen all the input files, so it is
1255 	     possible that DEF_REGULAR is not set now but will be set
1256 	     later (it is never cleared).  In case of a weak definition,
1257 	     DEF_REGULAR may be cleared later by a strong definition in
1258 	     a shared library. We account for that possibility below by
1259 	     storing information in the relocs_copied field of the hash
1260 	     table entry.  A similar situation occurs when creating
1261 	     shared libraries and symbol visibility changes render the
1262 	     symbol local.
1263 
1264 	     If on the other hand, we are creating an executable, we
1265 	     may need to keep relocations for symbols satisfied by a
1266 	     dynamic library if we manage to avoid copy relocs for the
1267 	     symbol.  */
1268 	  if ((bfd_link_pic (info)
1269 	       && (sec->flags & SEC_ALLOC) != 0
1270 	       && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
1271 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
1272 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
1273 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
1274 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
1275 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1276 		   || (h != NULL
1277 		       && (! SYMBOLIC_BIND (info, h)
1278 			   || h->root.type == bfd_link_hash_defweak
1279 			   || !h->def_regular))))
1280 	      || (ELIMINATE_COPY_RELOCS
1281 		  && !bfd_link_pic (info)
1282 		  && (sec->flags & SEC_ALLOC) != 0
1283 		  && h != NULL
1284 		  && (h->root.type == bfd_link_hash_defweak
1285 		      || !h->def_regular)))
1286 	    {
1287 	      struct elf_dyn_relocs *p;
1288 	      struct elf_dyn_relocs **head;
1289 
1290 	      /* We must copy these reloc types into the output file.
1291 		 Create a reloc section in dynobj and make room for
1292 		 this reloc.  */
1293 	      if (sreloc == NULL)
1294 		{
1295 		  if (htab->elf.dynobj == NULL)
1296 		    htab->elf.dynobj = abfd;
1297 
1298 		  sreloc = _bfd_elf_make_dynamic_reloc_section
1299 		    (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
1300 
1301 		  if (sreloc == NULL)
1302 		    return FALSE;
1303 		}
1304 
1305 	      /* If this is a global symbol, we count the number of
1306 		 relocations we need for this symbol.  */
1307 	      if (h != NULL)
1308 		{
1309 		  head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
1310 		}
1311 	      else
1312 		{
1313 		  /* Track dynamic relocs needed for local syms too.
1314 		     We really need local syms available to do this
1315 		     easily.  Oh well.  */
1316 		  asection *s;
1317 		  void *vpp;
1318 
1319 		  isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1320 						abfd, r_symndx);
1321 		  if (isym == NULL)
1322 		    return FALSE;
1323 
1324 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1325 		  if (s == NULL)
1326 		    s = sec;
1327 
1328 		  vpp = &elf_section_data (s)->local_dynrel;
1329 		  head = (struct elf_dyn_relocs **) vpp;
1330 		}
1331 
1332 	      p = *head;
1333 	      if (p == NULL || p->sec != sec)
1334 		{
1335 		  bfd_size_type amt = sizeof *p;
1336 
1337 		  p = ((struct elf_dyn_relocs *)
1338 		       bfd_alloc (htab->elf.dynobj, amt));
1339 		  if (p == NULL)
1340 		    return FALSE;
1341 		  p->next = *head;
1342 		  *head = p;
1343 		  p->sec = sec;
1344 		  p->count = 0;
1345 		  p->pc_count = 0;
1346 		}
1347 
1348 	      p->count += 1;
1349 	      if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
1350 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
1351 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
1352 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
1353 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
1354 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1355 		p->pc_count += 1;
1356 	    }
1357 	  break;
1358 
1359 	  /* This relocation describes the C++ object vtable hierarchy.
1360 	     Reconstruct it for later use during GC.  */
1361 	case R_390_GNU_VTINHERIT:
1362 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1363 	    return FALSE;
1364 	  break;
1365 
1366 	  /* This relocation describes which C++ vtable entries are actually
1367 	     used.  Record for later use during GC.  */
1368 	case R_390_GNU_VTENTRY:
1369 	  BFD_ASSERT (h != NULL);
1370 	  if (h != NULL
1371 	      && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1372 	    return FALSE;
1373 	  break;
1374 
1375 	default:
1376 	  break;
1377 	}
1378     }
1379 
1380   return TRUE;
1381 }
1382 
1383 /* Return the section that should be marked against GC for a given
1384    relocation.  */
1385 
1386 static asection *
1387 elf_s390_gc_mark_hook (asection *sec,
1388 		       struct bfd_link_info *info,
1389 		       Elf_Internal_Rela *rel,
1390 		       struct elf_link_hash_entry *h,
1391 		       Elf_Internal_Sym *sym)
1392 {
1393   if (h != NULL)
1394     switch (ELF32_R_TYPE (rel->r_info))
1395       {
1396       case R_390_GNU_VTINHERIT:
1397       case R_390_GNU_VTENTRY:
1398 	return NULL;
1399       }
1400   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1401 
1402 }
1403 
1404 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1405    entry but we found we will not create any.  Called when we find we will
1406    not have any PLT for this symbol, by for example
1407    elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1408    or elf_s390_size_dynamic_sections if no dynamic sections will be
1409    created (we're only linking static objects).  */
1410 
1411 static void
1412 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1413 {
1414   if (h->elf.root.type == bfd_link_hash_warning)
1415     h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1416 
1417   if (h->gotplt_refcount <= 0)
1418     return;
1419 
1420   /* We simply add the number of gotplt references to the number
1421    * of got references for this symbol.  */
1422   h->elf.got.refcount += h->gotplt_refcount;
1423   h->gotplt_refcount = -1;
1424 }
1425 
1426 /* Find dynamic relocs for H that apply to read-only sections.  */
1427 
1428 static asection *
1429 readonly_dynrelocs (struct elf_link_hash_entry *h)
1430 {
1431   struct elf_dyn_relocs *p;
1432 
1433   for (p = elf_s390_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
1434     {
1435       asection *s = p->sec->output_section;
1436 
1437       if (s != NULL && (s->flags & SEC_READONLY) != 0)
1438 	return p->sec;
1439     }
1440   return NULL;
1441 }
1442 
1443 /* Adjust a symbol defined by a dynamic object and referenced by a
1444    regular object.  The current definition is in some section of the
1445    dynamic object, but we're not including those sections.  We have to
1446    change the definition to something the rest of the link can
1447    understand.  */
1448 
1449 static bfd_boolean
1450 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1451 				struct elf_link_hash_entry *h)
1452 {
1453   struct elf_s390_link_hash_table *htab;
1454   asection *s, *srel;
1455 
1456   /* STT_GNU_IFUNC symbol must go through PLT. */
1457   if (s390_is_ifunc_symbol_p (h))
1458     {
1459       /* All local STT_GNU_IFUNC references must be treated as local
1460 	 calls via local PLT.  */
1461       if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1462 	{
1463 	  bfd_size_type pc_count = 0, count = 0;
1464 	  struct elf_dyn_relocs **pp;
1465 	  struct elf_s390_link_hash_entry *eh;
1466 	  struct elf_dyn_relocs *p;
1467 
1468 	  eh = (struct elf_s390_link_hash_entry *) h;
1469 	  for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1470 	    {
1471 	      pc_count += p->pc_count;
1472 	      p->count -= p->pc_count;
1473 	      p->pc_count = 0;
1474 	      count += p->count;
1475 	      if (p->count == 0)
1476 		*pp = p->next;
1477 	      else
1478 		pp = &p->next;
1479 	    }
1480 
1481 	  if (pc_count || count)
1482 	    {
1483 	      h->needs_plt = 1;
1484 	      h->non_got_ref = 1;
1485 	      if (h->plt.refcount <= 0)
1486 		h->plt.refcount = 1;
1487 	      else
1488 		h->plt.refcount += 1;
1489 	    }
1490 	}
1491 
1492       if (h->plt.refcount <= 0)
1493 	{
1494 	  h->plt.offset = (bfd_vma) -1;
1495 	  h->needs_plt = 0;
1496 	}
1497       return TRUE;
1498     }
1499 
1500   /* If this is a function, put it in the procedure linkage table.  We
1501      will fill in the contents of the procedure linkage table later
1502      (although we could actually do it here).  */
1503   if (h->type == STT_FUNC
1504       || h->needs_plt)
1505     {
1506       if (h->plt.refcount <= 0
1507 	  || SYMBOL_CALLS_LOCAL (info, h)
1508 	  || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1509 	      && h->root.type != bfd_link_hash_undefweak))
1510 	{
1511 	  /* This case can occur if we saw a PLT32 reloc in an input
1512 	     file, but the symbol was never referred to by a dynamic
1513 	     object, or if all references were garbage collected.  In
1514 	     such a case, we don't actually need to build a procedure
1515 	     linkage table, and we can just do a PC32 reloc instead.  */
1516 	  h->plt.offset = (bfd_vma) -1;
1517 	  h->needs_plt = 0;
1518 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1519 	}
1520 
1521       return TRUE;
1522     }
1523   else
1524     /* It's possible that we incorrectly decided a .plt reloc was
1525        needed for an R_390_PC32 reloc to a non-function sym in
1526        check_relocs.  We can't decide accurately between function and
1527        non-function syms in check-relocs;  Objects loaded later in
1528        the link may change h->type.  So fix it now.  */
1529     h->plt.offset = (bfd_vma) -1;
1530 
1531   /* If this is a weak symbol, and there is a real definition, the
1532      processor independent code will have arranged for us to see the
1533      real definition first, and we can just use the same value.  */
1534   if (h->is_weakalias)
1535     {
1536       struct elf_link_hash_entry *def = weakdef (h);
1537       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1538       h->root.u.def.section = def->root.u.def.section;
1539       h->root.u.def.value = def->root.u.def.value;
1540       if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1541 	h->non_got_ref = def->non_got_ref;
1542       return TRUE;
1543     }
1544 
1545   /* This is a reference to a symbol defined by a dynamic object which
1546      is not a function.  */
1547 
1548   /* If we are creating a shared library, we must presume that the
1549      only references to the symbol are via the global offset table.
1550      For such cases we need not do anything here; the relocations will
1551      be handled correctly by relocate_section.  */
1552   if (bfd_link_pic (info))
1553     return TRUE;
1554 
1555   /* If there are no references to this symbol that do not use the
1556      GOT, we don't need to generate a copy reloc.  */
1557   if (!h->non_got_ref)
1558     return TRUE;
1559 
1560   /* If -z nocopyreloc was given, we won't generate them either.  */
1561   if (info->nocopyreloc)
1562     {
1563       h->non_got_ref = 0;
1564       return TRUE;
1565     }
1566 
1567   /* If we don't find any dynamic relocs in read-only sections, then
1568      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
1569   if (ELIMINATE_COPY_RELOCS && !readonly_dynrelocs (h))
1570     {
1571       h->non_got_ref = 0;
1572       return TRUE;
1573     }
1574 
1575   /* We must allocate the symbol in our .dynbss section, which will
1576      become part of the .bss section of the executable.  There will be
1577      an entry for this symbol in the .dynsym section.  The dynamic
1578      object will contain position independent code, so all references
1579      from the dynamic object to this symbol will go through the global
1580      offset table.  The dynamic linker will use the .dynsym entry to
1581      determine the address it must put in the global offset table, so
1582      both the dynamic object and the regular object will refer to the
1583      same memory location for the variable.  */
1584 
1585   htab = elf_s390_hash_table (info);
1586 
1587   /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1588      copy the initial value out of the dynamic object and into the
1589      runtime process image.  */
1590   if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1591     {
1592       s = htab->elf.sdynrelro;
1593       srel = htab->elf.sreldynrelro;
1594     }
1595   else
1596     {
1597       s = htab->elf.sdynbss;
1598       srel = htab->elf.srelbss;
1599     }
1600   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1601     {
1602       srel->size += sizeof (Elf32_External_Rela);
1603       h->needs_copy = 1;
1604     }
1605 
1606   return _bfd_elf_adjust_dynamic_copy (info, h, s);
1607 }
1608 
1609 /* Allocate space in .plt, .got and associated reloc sections for
1610    dynamic relocs.  */
1611 
1612 static bfd_boolean
1613 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1614 {
1615   struct bfd_link_info *info;
1616   struct elf_s390_link_hash_table *htab;
1617   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
1618   struct elf_dyn_relocs *p;
1619 
1620   if (h->root.type == bfd_link_hash_indirect)
1621     return TRUE;
1622 
1623   info = (struct bfd_link_info *) inf;
1624   htab = elf_s390_hash_table (info);
1625 
1626   /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1627      here if it is defined and referenced in a non-shared object.  */
1628   if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1629     return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1630   else if (htab->elf.dynamic_sections_created
1631 	   && h->plt.refcount > 0)
1632     {
1633       /* Make sure this symbol is output as a dynamic symbol.
1634 	 Undefined weak syms won't yet be marked as dynamic.  */
1635       if (h->dynindx == -1
1636 	  && !h->forced_local)
1637 	{
1638 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1639 	    return FALSE;
1640 	}
1641 
1642       if (bfd_link_pic (info)
1643 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1644 	{
1645 	  asection *s = htab->elf.splt;
1646 
1647 	  /* If this is the first .plt entry, make room for the special
1648 	     first entry.  */
1649 	  if (s->size == 0)
1650 	    s->size += PLT_FIRST_ENTRY_SIZE;
1651 
1652 	  h->plt.offset = s->size;
1653 
1654 	  /* If this symbol is not defined in a regular file, and we are
1655 	     not generating a shared library, then set the symbol to this
1656 	     location in the .plt.  This is required to make function
1657 	     pointers compare as equal between the normal executable and
1658 	     the shared library.  */
1659 	  if (! bfd_link_pic (info)
1660 	      && !h->def_regular)
1661 	    {
1662 	      h->root.u.def.section = s;
1663 	      h->root.u.def.value = h->plt.offset;
1664 	    }
1665 
1666 	  /* Make room for this entry.  */
1667 	  s->size += PLT_ENTRY_SIZE;
1668 
1669 	  /* We also need to make an entry in the .got.plt section, which
1670 	     will be placed in the .got section by the linker script.  */
1671 	  htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1672 
1673 	  /* We also need to make an entry in the .rela.plt section.  */
1674 	  htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1675 	}
1676       else
1677 	{
1678 	  h->plt.offset = (bfd_vma) -1;
1679 	  h->needs_plt = 0;
1680 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1681 	}
1682     }
1683   else
1684     {
1685       h->plt.offset = (bfd_vma) -1;
1686       h->needs_plt = 0;
1687       elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1688     }
1689 
1690   /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1691      the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1692      to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1693      we can save the dynamic TLS relocation.  */
1694   if (h->got.refcount > 0
1695       && !bfd_link_pic (info)
1696       && h->dynindx == -1
1697       && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1698     {
1699       if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1700 	/* For the GOTIE access without a literal pool entry the offset has
1701 	   to be stored somewhere. The immediate value in the instruction
1702 	   is not bit enough so the value is stored in the got.  */
1703 	{
1704 	  h->got.offset = htab->elf.sgot->size;
1705 	  htab->elf.sgot->size += GOT_ENTRY_SIZE;
1706 	}
1707       else
1708 	h->got.offset = (bfd_vma) -1;
1709     }
1710   else if (h->got.refcount > 0)
1711     {
1712       asection *s;
1713       bfd_boolean dyn;
1714       int tls_type = elf_s390_hash_entry(h)->tls_type;
1715 
1716       /* Make sure this symbol is output as a dynamic symbol.
1717 	 Undefined weak syms won't yet be marked as dynamic.  */
1718       if (h->dynindx == -1
1719 	  && !h->forced_local)
1720 	{
1721 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1722 	    return FALSE;
1723 	}
1724 
1725       s = htab->elf.sgot;
1726       h->got.offset = s->size;
1727       s->size += GOT_ENTRY_SIZE;
1728       /* R_390_TLS_GD32 needs 2 consecutive GOT slots.  */
1729       if (tls_type == GOT_TLS_GD)
1730 	s->size += GOT_ENTRY_SIZE;
1731       dyn = htab->elf.dynamic_sections_created;
1732       /* R_390_TLS_IE32 needs one dynamic relocation,
1733 	 R_390_TLS_GD32 needs one if local symbol and two if global.  */
1734       if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1735 	  || tls_type >= GOT_TLS_IE)
1736 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1737       else if (tls_type == GOT_TLS_GD)
1738 	htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
1739       else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1740 		|| h->root.type != bfd_link_hash_undefweak)
1741 	       && (bfd_link_pic (info)
1742 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1743 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1744     }
1745   else
1746     h->got.offset = (bfd_vma) -1;
1747 
1748   if (eh->dyn_relocs == NULL)
1749     return TRUE;
1750 
1751   /* In the shared -Bsymbolic case, discard space allocated for
1752      dynamic pc-relative relocs against symbols which turn out to be
1753      defined in regular objects.  For the normal shared case, discard
1754      space for pc-relative relocs that have become local due to symbol
1755      visibility changes.  */
1756 
1757   if (bfd_link_pic (info))
1758     {
1759       if (SYMBOL_CALLS_LOCAL (info, h))
1760 	{
1761 	  struct elf_dyn_relocs **pp;
1762 
1763 	  for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1764 	    {
1765 	      p->count -= p->pc_count;
1766 	      p->pc_count = 0;
1767 	      if (p->count == 0)
1768 		*pp = p->next;
1769 	      else
1770 		pp = &p->next;
1771 	    }
1772 	}
1773 
1774       /* Also discard relocs on undefined weak syms with non-default
1775 	 visibility.  */
1776       if (eh->dyn_relocs != NULL
1777 	  && h->root.type == bfd_link_hash_undefweak)
1778 	{
1779 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1780 	      || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1781 	    eh->dyn_relocs = NULL;
1782 
1783 	  /* Make sure undefined weak symbols are output as a dynamic
1784 	     symbol in PIEs.  */
1785 	  else if (h->dynindx == -1
1786 		   && !h->forced_local)
1787 	    {
1788 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1789 		return FALSE;
1790 	    }
1791 	}
1792     }
1793   else if (ELIMINATE_COPY_RELOCS)
1794     {
1795       /* For the non-shared case, discard space for relocs against
1796 	 symbols which turn out to need copy relocs or are not
1797 	 dynamic.  */
1798 
1799       if (!h->non_got_ref
1800 	  && ((h->def_dynamic
1801 	       && !h->def_regular)
1802 	      || (htab->elf.dynamic_sections_created
1803 		  && (h->root.type == bfd_link_hash_undefweak
1804 		      || h->root.type == bfd_link_hash_undefined))))
1805 	{
1806 	  /* Make sure this symbol is output as a dynamic symbol.
1807 	     Undefined weak syms won't yet be marked as dynamic.  */
1808 	  if (h->dynindx == -1
1809 	      && !h->forced_local)
1810 	    {
1811 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1812 		return FALSE;
1813 	    }
1814 
1815 	  /* If that succeeded, we know we'll be keeping all the
1816 	     relocs.  */
1817 	  if (h->dynindx != -1)
1818 	    goto keep;
1819 	}
1820 
1821       eh->dyn_relocs = NULL;
1822 
1823     keep: ;
1824     }
1825 
1826   /* Finally, allocate space.  */
1827   for (p = eh->dyn_relocs; p != NULL; p = p->next)
1828     {
1829       asection *sreloc = elf_section_data (p->sec)->sreloc;
1830 
1831       sreloc->size += p->count * sizeof (Elf32_External_Rela);
1832     }
1833 
1834   return TRUE;
1835 }
1836 
1837 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
1838    read-only sections.  */
1839 
1840 static bfd_boolean
1841 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
1842 {
1843   asection *sec;
1844 
1845   if (h->root.type == bfd_link_hash_indirect)
1846     return TRUE;
1847 
1848   sec = readonly_dynrelocs (h);
1849   if (sec != NULL)
1850     {
1851       struct bfd_link_info *info = (struct bfd_link_info *) info_p;
1852 
1853       info->flags |= DF_TEXTREL;
1854       info->callbacks->minfo
1855 	(_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
1856 	 sec->owner, h->root.root.string, sec);
1857 
1858       /* Not an error, just cut short the traversal.  */
1859       return FALSE;
1860     }
1861   return TRUE;
1862 }
1863 
1864 /* Set the sizes of the dynamic sections.  */
1865 
1866 static bfd_boolean
1867 elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1868 				struct bfd_link_info *info)
1869 {
1870   struct elf_s390_link_hash_table *htab;
1871   bfd *dynobj;
1872   asection *s;
1873   bfd_boolean relocs;
1874   bfd *ibfd;
1875 
1876   htab = elf_s390_hash_table (info);
1877   dynobj = htab->elf.dynobj;
1878   if (dynobj == NULL)
1879     abort ();
1880 
1881   if (htab->elf.dynamic_sections_created)
1882     {
1883       /* Set the contents of the .interp section to the interpreter.  */
1884       if (bfd_link_executable (info) && !info->nointerp)
1885 	{
1886 	  s = bfd_get_linker_section (dynobj, ".interp");
1887 	  if (s == NULL)
1888 	    abort ();
1889 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1890 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1891 	}
1892     }
1893 
1894   /* Set up .got offsets for local syms, and space for local dynamic
1895      relocs.  */
1896   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1897     {
1898       bfd_signed_vma *local_got;
1899       bfd_signed_vma *end_local_got;
1900       char *local_tls_type;
1901       bfd_size_type locsymcount;
1902       Elf_Internal_Shdr *symtab_hdr;
1903       asection *srela;
1904       struct plt_entry *local_plt;
1905       unsigned int i;
1906 
1907       if (! is_s390_elf (ibfd))
1908 	continue;
1909 
1910       for (s = ibfd->sections; s != NULL; s = s->next)
1911 	{
1912 	  struct elf_dyn_relocs *p;
1913 
1914 	  for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1915 	    {
1916 	      if (!bfd_is_abs_section (p->sec)
1917 		  && bfd_is_abs_section (p->sec->output_section))
1918 		{
1919 		  /* Input section has been discarded, either because
1920 		     it is a copy of a linkonce section or due to
1921 		     linker script /DISCARD/, so we'll be discarding
1922 		     the relocs too.  */
1923 		}
1924 	      else if (p->count != 0)
1925 		{
1926 		  srela = elf_section_data (p->sec)->sreloc;
1927 		  srela->size += p->count * sizeof (Elf32_External_Rela);
1928 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1929 		    info->flags |= DF_TEXTREL;
1930 		}
1931 	    }
1932 	}
1933 
1934       local_got = elf_local_got_refcounts (ibfd);
1935       if (!local_got)
1936 	continue;
1937 
1938       symtab_hdr = &elf_symtab_hdr (ibfd);
1939       locsymcount = symtab_hdr->sh_info;
1940       end_local_got = local_got + locsymcount;
1941       local_tls_type = elf_s390_local_got_tls_type (ibfd);
1942       s = htab->elf.sgot;
1943       srela = htab->elf.srelgot;
1944       for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1945 	{
1946 	  if (*local_got > 0)
1947 	    {
1948 	      *local_got = s->size;
1949 	      s->size += GOT_ENTRY_SIZE;
1950 	      if (*local_tls_type == GOT_TLS_GD)
1951 		s->size += GOT_ENTRY_SIZE;
1952 	      if (bfd_link_pic (info))
1953 		srela->size += sizeof (Elf32_External_Rela);
1954 	    }
1955 	  else
1956 	    *local_got = (bfd_vma) -1;
1957 	}
1958       local_plt = elf_s390_local_plt (ibfd);
1959       for (i = 0; i < symtab_hdr->sh_info; i++)
1960 	{
1961 	  if (local_plt[i].plt.refcount > 0)
1962 	    {
1963 	      local_plt[i].plt.offset = htab->elf.iplt->size;
1964 	      htab->elf.iplt->size += PLT_ENTRY_SIZE;
1965 	      htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1966 	      htab->elf.irelplt->size += RELA_ENTRY_SIZE;
1967 	    }
1968 	  else
1969 	    local_plt[i].plt.offset = (bfd_vma) -1;
1970 	}
1971     }
1972 
1973   if (htab->tls_ldm_got.refcount > 0)
1974     {
1975       /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
1976 	 relocs.  */
1977       htab->tls_ldm_got.offset = htab->elf.sgot->size;
1978       htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1979       htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1980     }
1981   else
1982     htab->tls_ldm_got.offset = -1;
1983 
1984   /* Allocate global sym .plt and .got entries, and space for global
1985      sym dynamic relocs.  */
1986   elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1987 
1988   /* We now have determined the sizes of the various dynamic sections.
1989      Allocate memory for them.  */
1990   relocs = FALSE;
1991   for (s = dynobj->sections; s != NULL; s = s->next)
1992     {
1993       if ((s->flags & SEC_LINKER_CREATED) == 0)
1994 	continue;
1995 
1996       if (s == htab->elf.splt
1997 	  || s == htab->elf.sgot
1998 	  || s == htab->elf.sgotplt
1999 	  || s == htab->elf.sdynbss
2000 	  || s == htab->elf.sdynrelro
2001 	  || s == htab->elf.iplt
2002 	  || s == htab->elf.igotplt
2003 	  || s == htab->irelifunc)
2004 	{
2005 	  /* Strip this section if we don't need it; see the
2006 	     comment below.  */
2007 	}
2008       else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
2009 	{
2010 	  if (s->size != 0)
2011 	    relocs = TRUE;
2012 
2013 	  /* We use the reloc_count field as a counter if we need
2014 	     to copy relocs into the output file.  */
2015 	  s->reloc_count = 0;
2016 	}
2017       else
2018 	{
2019 	  /* It's not one of our sections, so don't allocate space.  */
2020 	  continue;
2021 	}
2022 
2023       if (s->size == 0)
2024 	{
2025 	  /* If we don't need this section, strip it from the
2026 	     output file.  This is to handle .rela.bss and
2027 	     .rela.plt.  We must create it in
2028 	     create_dynamic_sections, because it must be created
2029 	     before the linker maps input sections to output
2030 	     sections.  The linker does that before
2031 	     adjust_dynamic_symbol is called, and it is that
2032 	     function which decides whether anything needs to go
2033 	     into these sections.  */
2034 
2035 	  s->flags |= SEC_EXCLUDE;
2036 	  continue;
2037 	}
2038 
2039       if ((s->flags & SEC_HAS_CONTENTS) == 0)
2040 	continue;
2041 
2042       /* Allocate memory for the section contents.  We use bfd_zalloc
2043 	 here in case unused entries are not reclaimed before the
2044 	 section's contents are written out.  This should not happen,
2045 	 but this way if it does, we get a R_390_NONE reloc instead
2046 	 of garbage.  */
2047       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
2048       if (s->contents == NULL)
2049 	return FALSE;
2050     }
2051 
2052   if (htab->elf.dynamic_sections_created)
2053     {
2054       /* Add some entries to the .dynamic section.  We fill in the
2055 	 values later, in elf_s390_finish_dynamic_sections, but we
2056 	 must add the entries now so that we get the correct size for
2057 	 the .dynamic section.  The DT_DEBUG entry is filled in by the
2058 	 dynamic linker and used by the debugger.  */
2059 #define add_dynamic_entry(TAG, VAL) \
2060   _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2061 
2062       if (bfd_link_executable (info))
2063 	{
2064 	  if (!add_dynamic_entry (DT_DEBUG, 0))
2065 	    return FALSE;
2066 	}
2067 
2068       if (htab->elf.splt->size != 0)
2069 	{
2070 	  if (!add_dynamic_entry (DT_PLTGOT, 0)
2071 	      || !add_dynamic_entry (DT_PLTRELSZ, 0)
2072 	      || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2073 	      || !add_dynamic_entry (DT_JMPREL, 0))
2074 	    return FALSE;
2075 	}
2076 
2077       if (relocs)
2078 	{
2079 	  if (!add_dynamic_entry (DT_RELA, 0)
2080 	      || !add_dynamic_entry (DT_RELASZ, 0)
2081 	      || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
2082 	    return FALSE;
2083 
2084 	  /* If any dynamic relocs apply to a read-only section,
2085 	     then we need a DT_TEXTREL entry.  */
2086 	  if ((info->flags & DF_TEXTREL) == 0)
2087 	    elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
2088 
2089 	  if ((info->flags & DF_TEXTREL) != 0)
2090 	    {
2091 	      if (!add_dynamic_entry (DT_TEXTREL, 0))
2092 		return FALSE;
2093 	    }
2094 	}
2095     }
2096 #undef add_dynamic_entry
2097 
2098   return TRUE;
2099 }
2100 
2101 /* Return the base VMA address which should be subtracted from real addresses
2102    when resolving @dtpoff relocation.
2103    This is PT_TLS segment p_vaddr.  */
2104 
2105 static bfd_vma
2106 dtpoff_base (struct bfd_link_info *info)
2107 {
2108   /* If tls_sec is NULL, we should have signalled an error already.  */
2109   if (elf_hash_table (info)->tls_sec == NULL)
2110     return 0;
2111   return elf_hash_table (info)->tls_sec->vma;
2112 }
2113 
2114 /* Return the relocation value for @tpoff relocation
2115    if STT_TLS virtual address is ADDRESS.  */
2116 
2117 static bfd_vma
2118 tpoff (struct bfd_link_info *info, bfd_vma address)
2119 {
2120   struct elf_link_hash_table *htab = elf_hash_table (info);
2121 
2122   /* If tls_sec is NULL, we should have signalled an error already.  */
2123   if (htab->tls_sec == NULL)
2124     return 0;
2125   return htab->tls_size + htab->tls_sec->vma - address;
2126 }
2127 
2128 /* Complain if TLS instruction relocation is against an invalid
2129    instruction.  */
2130 
2131 static void
2132 invalid_tls_insn (bfd *input_bfd,
2133 		  asection *input_section,
2134 		  Elf_Internal_Rela *rel)
2135 {
2136   reloc_howto_type *howto;
2137 
2138   howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
2139   _bfd_error_handler
2140     /* xgettext:c-format */
2141     (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
2142      input_bfd,
2143      input_section,
2144      (uint64_t) rel->r_offset,
2145      howto->name);
2146   bfd_set_error (bfd_error_bad_value);
2147 }
2148 
2149 /* Relocate a 390 ELF section.  */
2150 
2151 static bfd_boolean
2152 elf_s390_relocate_section (bfd *output_bfd,
2153 			   struct bfd_link_info *info,
2154 			   bfd *input_bfd,
2155 			   asection *input_section,
2156 			   bfd_byte *contents,
2157 			   Elf_Internal_Rela *relocs,
2158 			   Elf_Internal_Sym *local_syms,
2159 			   asection **local_sections)
2160 {
2161   struct elf_s390_link_hash_table *htab;
2162   Elf_Internal_Shdr *symtab_hdr;
2163   struct elf_link_hash_entry **sym_hashes;
2164   bfd_vma *local_got_offsets;
2165   Elf_Internal_Rela *rel;
2166   Elf_Internal_Rela *relend;
2167 
2168   BFD_ASSERT (is_s390_elf (input_bfd));
2169 
2170   htab = elf_s390_hash_table (info);
2171   symtab_hdr = &elf_symtab_hdr (input_bfd);
2172   sym_hashes = elf_sym_hashes (input_bfd);
2173   local_got_offsets = elf_local_got_offsets (input_bfd);
2174 
2175   rel = relocs;
2176   relend = relocs + input_section->reloc_count;
2177   for (; rel < relend; rel++)
2178     {
2179       unsigned int r_type;
2180       reloc_howto_type *howto;
2181       unsigned long r_symndx;
2182       struct elf_link_hash_entry *h;
2183       Elf_Internal_Sym *sym;
2184       asection *sec;
2185       bfd_vma off;
2186       bfd_vma relocation;
2187       bfd_boolean unresolved_reloc;
2188       bfd_reloc_status_type r;
2189       int tls_type;
2190       asection *base_got = htab->elf.sgot;
2191       bfd_boolean resolved_to_zero;
2192 
2193       r_type = ELF32_R_TYPE (rel->r_info);
2194       if (r_type == (int) R_390_GNU_VTINHERIT
2195 	  || r_type == (int) R_390_GNU_VTENTRY)
2196 	continue;
2197       if (r_type >= (int) R_390_max)
2198 	{
2199 	  bfd_set_error (bfd_error_bad_value);
2200 	  return FALSE;
2201 	}
2202 
2203       howto = elf_howto_table + r_type;
2204       r_symndx = ELF32_R_SYM (rel->r_info);
2205 
2206       h = NULL;
2207       sym = NULL;
2208       sec = NULL;
2209       unresolved_reloc = FALSE;
2210       if (r_symndx < symtab_hdr->sh_info)
2211 	{
2212 	  sym = local_syms + r_symndx;
2213 	  sec = local_sections[r_symndx];
2214 	  if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2215 	    {
2216 	      struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2217 	      if (local_plt == NULL)
2218 		return FALSE;
2219 
2220 	      /* Address of the PLT slot.  */
2221 	      relocation = (htab->elf.iplt->output_section->vma
2222 			    + htab->elf.iplt->output_offset
2223 			    + local_plt[r_symndx].plt.offset);
2224 
2225 	      switch (r_type)
2226 		{
2227 		case R_390_PLTOFF16:
2228 		case R_390_PLTOFF32:
2229 		  relocation -= htab->elf.sgot->output_section->vma;
2230 		  break;
2231 		case R_390_GOTPLT12:
2232 		case R_390_GOTPLT16:
2233 		case R_390_GOTPLT20:
2234 		case R_390_GOTPLT32:
2235 		case R_390_GOTPLTENT:
2236 		case R_390_GOT12:
2237 		case R_390_GOT16:
2238 		case R_390_GOT20:
2239 		case R_390_GOT32:
2240 		case R_390_GOTENT:
2241 		  {
2242 		    /* Write the PLT slot address into the GOT slot.  */
2243 		    bfd_put_32 (output_bfd, relocation,
2244 				htab->elf.sgot->contents +
2245 				local_got_offsets[r_symndx]);
2246 		    relocation = (local_got_offsets[r_symndx] +
2247 				  htab->elf.sgot->output_offset);
2248 
2249 		    if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2250 		      relocation += htab->elf.sgot->output_section->vma;
2251 		    break;
2252 		  }
2253 		default:
2254 		  break;
2255 		}
2256 	      /* The output section is needed later in
2257 		 finish_dynamic_section when creating the dynamic
2258 		 relocation.  */
2259 	      local_plt[r_symndx].sec = sec;
2260 	      goto do_relocation;
2261 	    }
2262 	  else
2263 	    relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2264 	}
2265       else
2266 	{
2267 	  bfd_boolean warned ATTRIBUTE_UNUSED;
2268 	  bfd_boolean ignored ATTRIBUTE_UNUSED;
2269 
2270 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2271 				   r_symndx, symtab_hdr, sym_hashes,
2272 				   h, sec, relocation,
2273 				   unresolved_reloc, warned, ignored);
2274 	}
2275 
2276       if (sec != NULL && discarded_section (sec))
2277 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2278 					 rel, 1, relend, howto, 0, contents);
2279 
2280       if (bfd_link_relocatable (info))
2281 	continue;
2282 
2283       resolved_to_zero = (h != NULL
2284 			  && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2285 
2286       switch (r_type)
2287 	{
2288 	case R_390_GOTPLT12:
2289 	case R_390_GOTPLT16:
2290 	case R_390_GOTPLT20:
2291 	case R_390_GOTPLT32:
2292 	case R_390_GOTPLTENT:
2293 	  /* There are three cases for a GOTPLT relocation. 1) The
2294 	     relocation is against the jump slot entry of a plt that
2295 	     will get emitted to the output file. 2) The relocation
2296 	     is against the jump slot of a plt entry that has been
2297 	     removed. elf_s390_adjust_gotplt has created a GOT entry
2298 	     as replacement. 3) The relocation is against a local symbol.
2299 	     Cases 2) and 3) are the same as the GOT relocation code
2300 	     so we just have to test for case 1 and fall through for
2301 	     the other two.  */
2302 	  if (h != NULL && h->plt.offset != (bfd_vma) -1)
2303 	    {
2304 	      bfd_vma plt_index;
2305 
2306 	      if (s390_is_ifunc_symbol_p (h))
2307 		{
2308 		  plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2309 		  relocation = (plt_index * GOT_ENTRY_SIZE +
2310 				htab->elf.igotplt->output_offset);
2311 		  if (r_type == R_390_GOTPLTENT)
2312 		    relocation += htab->elf.igotplt->output_section->vma;
2313 		}
2314 	      else
2315 		{
2316 		  /* Calc. index no.
2317 		     Current offset - size first entry / entry size.  */
2318 		  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2319 		    PLT_ENTRY_SIZE;
2320 
2321 		  /* Offset in GOT is PLT index plus GOT headers(3)
2322 		     times 4, addr & GOT addr.  */
2323 		  relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2324 		  if (r_type == R_390_GOTPLTENT)
2325 		    relocation += htab->elf.sgot->output_section->vma;
2326 		}
2327 	      unresolved_reloc = FALSE;
2328 
2329 	    }
2330 	  /* Fall through.  */
2331 
2332 	case R_390_GOT12:
2333 	case R_390_GOT16:
2334 	case R_390_GOT20:
2335 	case R_390_GOT32:
2336 	case R_390_GOTENT:
2337 	  /* Relocation is to the entry for this symbol in the global
2338 	     offset table.  */
2339 	  if (base_got == NULL)
2340 	    abort ();
2341 
2342 	  if (h != NULL)
2343 	    {
2344 	      bfd_boolean dyn;
2345 
2346 	      off = h->got.offset;
2347 	      dyn = htab->elf.dynamic_sections_created;
2348 
2349 	      if (s390_is_ifunc_symbol_p (h))
2350 		{
2351 		  BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2352 		  if (off == (bfd_vma)-1)
2353 		    {
2354 		      /* No explicit GOT usage so redirect to the
2355 			 got.iplt slot.  */
2356 		      base_got = htab->elf.igotplt;
2357 		      off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2358 		    }
2359 		  else
2360 		    {
2361 		      /* Explicit GOT slots must contain the address
2362 			 of the PLT slot. This will be handled in
2363 			 finish_dynamic_symbol.  */
2364 		    }
2365 		}
2366 	      else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2367 							  bfd_link_pic (info),
2368 							  h)
2369 		       || (bfd_link_pic (info)
2370 			   && SYMBOL_REFERENCES_LOCAL (info, h))
2371 		       || (ELF_ST_VISIBILITY (h->other)
2372 			   && h->root.type == bfd_link_hash_undefweak))
2373 
2374 		{
2375 		  /* This is actually a static link, or it is a
2376 		     -Bsymbolic link and the symbol is defined
2377 		     locally, or the symbol was forced to be local
2378 		     because of a version file.  We must initialize
2379 		     this entry in the global offset table.  Since the
2380 		     offset must always be a multiple of 2, we use the
2381 		     least significant bit to record whether we have
2382 		     initialized it already.
2383 
2384 		     When doing a dynamic link, we create a .rel.got
2385 		     relocation entry to initialize the value.  This
2386 		     is done in the finish_dynamic_symbol routine.  */
2387 		  if ((off & 1) != 0)
2388 		    off &= ~1;
2389 		  else
2390 		    {
2391 		      bfd_put_32 (output_bfd, relocation,
2392 				  base_got->contents + off);
2393 		      h->got.offset |= 1;
2394 		    }
2395 
2396 		  if ((h->def_regular
2397 		       && bfd_link_pic (info)
2398 		       && SYMBOL_REFERENCES_LOCAL (info, h))
2399 		      /* lrl rx,sym@GOTENT -> larl rx, sym */
2400 		      && ((r_type == R_390_GOTENT
2401 			   && (bfd_get_16 (input_bfd,
2402 					   contents + rel->r_offset - 2)
2403 			       & 0xff0f) == 0xc40d)
2404 			  /* ly rx, sym@GOT(r12) -> larl rx, sym */
2405 			  || (r_type == R_390_GOT20
2406 			      && (bfd_get_32 (input_bfd,
2407 					      contents + rel->r_offset - 2)
2408 				  & 0xff00f000) == 0xe300c000
2409 			      && bfd_get_8 (input_bfd,
2410 					    contents + rel->r_offset + 3) == 0x58)))
2411 		    {
2412 		      unsigned short new_insn =
2413 			(0xc000 | (bfd_get_8 (input_bfd,
2414 					      contents + rel->r_offset - 1) & 0xf0));
2415 		      bfd_put_16 (output_bfd, new_insn,
2416 				  contents + rel->r_offset - 2);
2417 		      r_type = R_390_PC32DBL;
2418 		      rel->r_addend = 2;
2419 		      howto = elf_howto_table + r_type;
2420 		      relocation = h->root.u.def.value
2421 			+ h->root.u.def.section->output_section->vma
2422 			+ h->root.u.def.section->output_offset;
2423 		      goto do_relocation;
2424 		    }
2425 		}
2426 	      else
2427 		unresolved_reloc = FALSE;
2428 	    }
2429 	  else
2430 	    {
2431 	      if (local_got_offsets == NULL)
2432 		abort ();
2433 
2434 	      off = local_got_offsets[r_symndx];
2435 
2436 	      /* The offset must always be a multiple of 4.  We use
2437 		 the least significant bit to record whether we have
2438 		 already generated the necessary reloc.  */
2439 	      if ((off & 1) != 0)
2440 		off &= ~1;
2441 	      else
2442 		{
2443 		  bfd_put_32 (output_bfd, relocation,
2444 			      htab->elf.sgot->contents + off);
2445 
2446 		  if (bfd_link_pic (info))
2447 		    {
2448 		      asection *srelgot;
2449 		      Elf_Internal_Rela outrel;
2450 		      bfd_byte *loc;
2451 
2452 		      srelgot = htab->elf.srelgot;
2453 		      if (srelgot == NULL)
2454 			abort ();
2455 
2456 		      outrel.r_offset = (htab->elf.sgot->output_section->vma
2457 					 + htab->elf.sgot->output_offset
2458 					 + off);
2459 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2460 		      outrel.r_addend = relocation;
2461 		      loc = srelgot->contents;
2462 		      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2463 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2464 		    }
2465 
2466 		  local_got_offsets[r_symndx] |= 1;
2467 		}
2468 	    }
2469 
2470 	  if (off >= (bfd_vma) -2)
2471 	    abort ();
2472 
2473 	  relocation = base_got->output_offset + off;
2474 
2475 	  /* For @GOTENT the relocation is against the offset between
2476 	     the instruction and the symbols entry in the GOT and not
2477 	     between the start of the GOT and the symbols entry. We
2478 	     add the vma of the GOT to get the correct value.  */
2479 	  if (   r_type == R_390_GOTENT
2480 	      || r_type == R_390_GOTPLTENT)
2481 	    relocation += base_got->output_section->vma;
2482 
2483 	  break;
2484 
2485 	case R_390_GOTOFF16:
2486 	case R_390_GOTOFF32:
2487 	  /* Relocation is relative to the start of the global offset
2488 	     table.  */
2489 
2490 	  if (h != NULL
2491 	      && s390_is_ifunc_symbol_p (h)
2492 	      && h->def_regular
2493 	      && !bfd_link_executable (info))
2494 	    {
2495 	      relocation = (htab->elf.iplt->output_section->vma
2496 			    + htab->elf.iplt->output_offset
2497 			    + h->plt.offset
2498 			    - htab->elf.sgot->output_section->vma);
2499 	      goto do_relocation;
2500 	    }
2501 
2502 	  /* Note that sgot->output_offset is not involved in this
2503 	     calculation.  We always want the start of .got.  If we
2504 	     defined _GLOBAL_OFFSET_TABLE in a different way, as is
2505 	     permitted by the ABI, we might have to change this
2506 	     calculation.  */
2507 	  relocation -= htab->elf.sgot->output_section->vma;
2508 	  break;
2509 
2510 	case R_390_GOTPC:
2511 	case R_390_GOTPCDBL:
2512 	  /* Use global offset table as symbol value.  */
2513 	  relocation = htab->elf.sgot->output_section->vma;
2514 	  unresolved_reloc = FALSE;
2515 	  break;
2516 
2517 	case R_390_PLT12DBL:
2518 	case R_390_PLT16DBL:
2519 	case R_390_PLT24DBL:
2520 	case R_390_PLT32DBL:
2521 	case R_390_PLT32:
2522 	  /* Relocation is to the entry for this symbol in the
2523 	     procedure linkage table.  */
2524 
2525 	  /* Resolve a PLT32 reloc against a local symbol directly,
2526 	     without using the procedure linkage table.  */
2527 	  if (h == NULL)
2528 	    break;
2529 
2530 	  if (h->plt.offset == (bfd_vma) -1
2531 	      || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
2532 	    {
2533 	      /* We didn't make a PLT entry for this symbol.  This
2534 		 happens when statically linking PIC code, or when
2535 		 using -Bsymbolic.  */
2536 	      break;
2537 	    }
2538 
2539 	  if (s390_is_ifunc_symbol_p (h))
2540 	    relocation = (htab->elf.iplt->output_section->vma
2541 			  + htab->elf.iplt->output_offset
2542 			  + h->plt.offset);
2543 	  else
2544 	    relocation = (htab->elf.splt->output_section->vma
2545 			  + htab->elf.splt->output_offset
2546 			  + h->plt.offset);
2547 	  unresolved_reloc = FALSE;
2548 	  break;
2549 
2550 	case R_390_PLTOFF16:
2551 	case R_390_PLTOFF32:
2552 	  /* Relocation is to the entry for this symbol in the
2553 	     procedure linkage table relative to the start of the GOT.  */
2554 
2555 	  /* For local symbols or if we didn't make a PLT entry for
2556 	     this symbol resolve the symbol directly.  */
2557 	  if (h == NULL
2558 	      || h->plt.offset == (bfd_vma) -1
2559 	      || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2560 	    {
2561 	      relocation -= htab->elf.sgot->output_section->vma;
2562 	      break;
2563 	    }
2564 
2565 	  if (s390_is_ifunc_symbol_p (h))
2566 	    relocation = (htab->elf.iplt->output_section->vma
2567 			  + htab->elf.iplt->output_offset
2568 			  + h->plt.offset
2569 			  - htab->elf.sgot->output_section->vma);
2570 	  else
2571 	    relocation = (htab->elf.splt->output_section->vma
2572 			  + htab->elf.splt->output_offset
2573 			  + h->plt.offset
2574 			  - htab->elf.sgot->output_section->vma);
2575 	  unresolved_reloc = FALSE;
2576 	  break;
2577 
2578 	case R_390_PC16:
2579 	case R_390_PC12DBL:
2580 	case R_390_PC16DBL:
2581 	case R_390_PC24DBL:
2582 	case R_390_PC32DBL:
2583 	case R_390_PC32:
2584 	  if (h != NULL
2585 	      && s390_is_ifunc_symbol_p (h)
2586 	      && h->def_regular
2587 	      && !bfd_link_executable (info))
2588 	    {
2589 	      /* This will not work our if the function does not
2590 		 happen to set up the GOT pointer for some other
2591 		 reason.  31 bit PLT entries require r12 to hold the
2592 		 GOT pointer.
2593 		 FIXME: Implement an errorcheck.
2594 		 NOTE: It will work when brasl is not available
2595 		 (e.g. with -m31 -march=g5) since a local function
2596 		 call then does use GOTOFF which implies r12 being set
2597 		 up.  */
2598 	      relocation = (htab->elf.iplt->output_section->vma
2599 			    + htab->elf.iplt->output_offset
2600 			    + h ->plt.offset);
2601 	      goto do_relocation;
2602 	    }
2603 	  /* Fall through.  */
2604 
2605 	case R_390_8:
2606 	case R_390_16:
2607 	case R_390_32:
2608 	  if ((input_section->flags & SEC_ALLOC) == 0)
2609 	    break;
2610 
2611 	  if (h != NULL
2612 	      && s390_is_ifunc_symbol_p (h)
2613 	      && h->def_regular)
2614 	    {
2615 	      if (!bfd_link_pic (info))
2616 		{
2617 		  /* For a non-shared object STT_GNU_IFUNC symbol must
2618 		     go through PLT.  */
2619 		  relocation = (htab->elf.iplt->output_section->vma
2620 				+ htab->elf.iplt->output_offset
2621 				+ h ->plt.offset);
2622 		  goto do_relocation;
2623 		}
2624 	      else
2625 		{
2626 		  /* For shared objects a runtime relocation is needed.  */
2627 
2628 		  Elf_Internal_Rela outrel;
2629 		  asection *sreloc;
2630 
2631 		  /* Need a dynamic relocation to get the real function
2632 		     address.  */
2633 		  outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2634 							     info,
2635 							     input_section,
2636 							     rel->r_offset);
2637 		  if (outrel.r_offset == (bfd_vma) -1
2638 		      || outrel.r_offset == (bfd_vma) -2)
2639 		    abort ();
2640 
2641 		  outrel.r_offset += (input_section->output_section->vma
2642 				      + input_section->output_offset);
2643 
2644 		  if (h->dynindx == -1
2645 		      || h->forced_local
2646 		      || bfd_link_executable (info))
2647 		    {
2648 		      /* This symbol is resolved locally.  */
2649 		      outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2650 		      outrel.r_addend = (h->root.u.def.value
2651 					 + h->root.u.def.section->output_section->vma
2652 					 + h->root.u.def.section->output_offset);
2653 		    }
2654 		  else
2655 		    {
2656 		      outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2657 		      outrel.r_addend = 0;
2658 		    }
2659 
2660 		  sreloc = htab->elf.irelifunc;
2661 		  elf_append_rela (output_bfd, sreloc, &outrel);
2662 
2663 		  /* If this reloc is against an external symbol, we
2664 		     do not want to fiddle with the addend.  Otherwise,
2665 		     we need to include the symbol value so that it
2666 		     becomes an addend for the dynamic reloc.  For an
2667 		     internal symbol, we have updated addend.  */
2668 		  continue;
2669 		}
2670 	    }
2671 
2672 	  if ((bfd_link_pic (info)
2673 	       && (h == NULL
2674 		   || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2675 		       && !resolved_to_zero)
2676 		   || h->root.type != bfd_link_hash_undefweak)
2677 	       && ((r_type != R_390_PC16
2678 		    && r_type != R_390_PC12DBL
2679 		    && r_type != R_390_PC16DBL
2680 		    && r_type != R_390_PC24DBL
2681 		    && r_type != R_390_PC32DBL
2682 		    && r_type != R_390_PC32)
2683 		   || !SYMBOL_CALLS_LOCAL (info, h)))
2684 	      || (ELIMINATE_COPY_RELOCS
2685 		  && !bfd_link_pic (info)
2686 		  && h != NULL
2687 		  && h->dynindx != -1
2688 		  && !h->non_got_ref
2689 		  && ((h->def_dynamic
2690 		       && !h->def_regular)
2691 		      || h->root.type == bfd_link_hash_undefweak
2692 		      || h->root.type == bfd_link_hash_undefined)))
2693 	    {
2694 	      Elf_Internal_Rela outrel;
2695 	      bfd_boolean skip, relocate;
2696 	      asection *sreloc;
2697 	      bfd_byte *loc;
2698 
2699 	      /* When generating a shared object, these relocations
2700 		 are copied into the output file to be resolved at run
2701 		 time.  */
2702 
2703 	      skip = FALSE;
2704 	      relocate = FALSE;
2705 
2706 	      outrel.r_offset =
2707 		_bfd_elf_section_offset (output_bfd, info, input_section,
2708 					 rel->r_offset);
2709 	      if (outrel.r_offset == (bfd_vma) -1)
2710 		skip = TRUE;
2711 	      else if (outrel.r_offset == (bfd_vma) -2)
2712 		skip = TRUE, relocate = TRUE;
2713 	      outrel.r_offset += (input_section->output_section->vma
2714 				  + input_section->output_offset);
2715 
2716 	      if (skip)
2717 		memset (&outrel, 0, sizeof outrel);
2718 	      else if (h != NULL
2719 		       && h->dynindx != -1
2720 		       && (r_type == R_390_PC16
2721 			   || r_type == R_390_PC12DBL
2722 			   || r_type == R_390_PC16DBL
2723 			   || r_type == R_390_PC24DBL
2724 			   || r_type == R_390_PC32DBL
2725 			   || r_type == R_390_PC32
2726 			   || !bfd_link_pic (info)
2727 			   || !SYMBOLIC_BIND (info, h)
2728 			   || !h->def_regular))
2729 		{
2730 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2731 		  outrel.r_addend = rel->r_addend;
2732 		}
2733 	      else
2734 		{
2735 		  /* This symbol is local, or marked to become local.  */
2736 		  outrel.r_addend = relocation + rel->r_addend;
2737 		  if (r_type == R_390_32)
2738 		    {
2739 		      relocate = TRUE;
2740 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2741 		    }
2742 		  else
2743 		    {
2744 		      long sindx;
2745 
2746 		      if (bfd_is_abs_section (sec))
2747 			sindx = 0;
2748 		      else if (sec == NULL || sec->owner == NULL)
2749 			{
2750 			  bfd_set_error(bfd_error_bad_value);
2751 			  return FALSE;
2752 			}
2753 		      else
2754 			{
2755 			  asection *osec;
2756 
2757 			  osec = sec->output_section;
2758 			  sindx = elf_section_data (osec)->dynindx;
2759 			  if (sindx == 0)
2760 			    {
2761 			      osec = htab->elf.text_index_section;
2762 			      sindx = elf_section_data (osec)->dynindx;
2763 			    }
2764 			  BFD_ASSERT (sindx != 0);
2765 
2766 			  /* We are turning this relocation into one
2767 			     against a section symbol, so subtract out
2768 			     the output section's address but not the
2769 			     offset of the input section in the output
2770 			     section.  */
2771 			  outrel.r_addend -= osec->vma;
2772 			}
2773 		      outrel.r_info = ELF32_R_INFO (sindx, r_type);
2774 		    }
2775 		}
2776 
2777 	      sreloc = elf_section_data (input_section)->sreloc;
2778 	      if (sreloc == NULL)
2779 		abort ();
2780 
2781 	      loc = sreloc->contents;
2782 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2783 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2784 
2785 	      /* If this reloc is against an external symbol, we do
2786 		 not want to fiddle with the addend.  Otherwise, we
2787 		 need to include the symbol value so that it becomes
2788 		 an addend for the dynamic reloc.  */
2789 	      if (! relocate)
2790 		continue;
2791 	    }
2792 	  break;
2793 
2794 	  /* Relocations for tls literal pool entries.  */
2795 	case R_390_TLS_IE32:
2796 	  if (bfd_link_pic (info))
2797 	    {
2798 	      Elf_Internal_Rela outrel;
2799 	      asection *sreloc;
2800 	      bfd_byte *loc;
2801 
2802 	      outrel.r_offset = rel->r_offset
2803 				+ input_section->output_section->vma
2804 				+ input_section->output_offset;
2805 	      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2806 	      sreloc = elf_section_data (input_section)->sreloc;
2807 	      if (sreloc == NULL)
2808 		abort ();
2809 	      loc = sreloc->contents;
2810 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2811 	      bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2812 	    }
2813 	  /* Fall through.  */
2814 
2815 	case R_390_TLS_GD32:
2816 	case R_390_TLS_GOTIE32:
2817 	  r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2818 	  tls_type = GOT_UNKNOWN;
2819 	  if (h == NULL && local_got_offsets)
2820 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2821 	  else if (h != NULL)
2822 	    {
2823 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2824 	      if (!bfd_link_pic (info)
2825 		  && h->dynindx == -1
2826 		  && tls_type >= GOT_TLS_IE)
2827 		r_type = R_390_TLS_LE32;
2828 	    }
2829 	  if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2830 	    r_type = R_390_TLS_IE32;
2831 
2832 	  if (r_type == R_390_TLS_LE32)
2833 	    {
2834 	      /* This relocation gets optimized away by the local exec
2835 		 access optimization.  */
2836 	      BFD_ASSERT (! unresolved_reloc);
2837 	      bfd_put_32 (output_bfd, -tpoff (info, relocation),
2838 			  contents + rel->r_offset);
2839 	      continue;
2840 	    }
2841 
2842 	  if (htab->elf.sgot == NULL)
2843 	    abort ();
2844 
2845 	  if (h != NULL)
2846 	    off = h->got.offset;
2847 	  else
2848 	    {
2849 	      if (local_got_offsets == NULL)
2850 		abort ();
2851 
2852 	      off = local_got_offsets[r_symndx];
2853 	    }
2854 
2855 	emit_tls_relocs:
2856 
2857 	  if ((off & 1) != 0)
2858 	    off &= ~1;
2859 	  else
2860 	    {
2861 	      Elf_Internal_Rela outrel;
2862 	      bfd_byte *loc;
2863 	      int dr_type, indx;
2864 
2865 	      if (htab->elf.srelgot == NULL)
2866 		abort ();
2867 
2868 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2869 				 + htab->elf.sgot->output_offset + off);
2870 
2871 	      indx = h && h->dynindx != -1 ? h->dynindx : 0;
2872 	      if (r_type == R_390_TLS_GD32)
2873 		dr_type = R_390_TLS_DTPMOD;
2874 	      else
2875 		dr_type = R_390_TLS_TPOFF;
2876 	      if (dr_type == R_390_TLS_TPOFF && indx == 0)
2877 		outrel.r_addend = relocation - dtpoff_base (info);
2878 	      else
2879 		outrel.r_addend = 0;
2880 	      outrel.r_info = ELF32_R_INFO (indx, dr_type);
2881 	      loc = htab->elf.srelgot->contents;
2882 	      loc += htab->elf.srelgot->reloc_count++
2883 		* sizeof (Elf32_External_Rela);
2884 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2885 
2886 	      if (r_type == R_390_TLS_GD32)
2887 		{
2888 		  if (indx == 0)
2889 		    {
2890 		      BFD_ASSERT (! unresolved_reloc);
2891 		      bfd_put_32 (output_bfd,
2892 				  relocation - dtpoff_base (info),
2893 				  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2894 		    }
2895 		  else
2896 		    {
2897 		      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
2898 		      outrel.r_offset += GOT_ENTRY_SIZE;
2899 		      outrel.r_addend = 0;
2900 		      htab->elf.srelgot->reloc_count++;
2901 		      loc += sizeof (Elf32_External_Rela);
2902 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2903 		    }
2904 		}
2905 
2906 	      if (h != NULL)
2907 		h->got.offset |= 1;
2908 	      else
2909 		local_got_offsets[r_symndx] |= 1;
2910 	    }
2911 
2912 	  if (off >= (bfd_vma) -2)
2913 	    abort ();
2914 	  if (r_type == ELF32_R_TYPE (rel->r_info))
2915 	    {
2916 	      relocation = htab->elf.sgot->output_offset + off;
2917 	      if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
2918 		relocation += htab->elf.sgot->output_section->vma;
2919 	      unresolved_reloc = FALSE;
2920 	    }
2921 	  else
2922 	    {
2923 	      bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
2924 			  contents + rel->r_offset);
2925 	      continue;
2926 	    }
2927 	  break;
2928 
2929 	case R_390_TLS_GOTIE12:
2930 	case R_390_TLS_GOTIE20:
2931 	case R_390_TLS_IEENT:
2932 	  if (h == NULL)
2933 	    {
2934 	      if (local_got_offsets == NULL)
2935 		abort();
2936 	      off = local_got_offsets[r_symndx];
2937 	      if (bfd_link_pic (info))
2938 		goto emit_tls_relocs;
2939 	    }
2940 	  else
2941 	    {
2942 	      off = h->got.offset;
2943 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2944 	      if (bfd_link_pic (info)
2945 		  || h->dynindx != -1
2946 		  || tls_type < GOT_TLS_IE)
2947 		goto emit_tls_relocs;
2948 	    }
2949 
2950 	  if (htab->elf.sgot == NULL)
2951 	    abort ();
2952 
2953 	  BFD_ASSERT (! unresolved_reloc);
2954 	  bfd_put_32 (output_bfd, -tpoff (info, relocation),
2955 		      htab->elf.sgot->contents + off);
2956 	  relocation = htab->elf.sgot->output_offset + off;
2957 	  if (r_type == R_390_TLS_IEENT)
2958 	    relocation += htab->elf.sgot->output_section->vma;
2959 	  unresolved_reloc = FALSE;
2960 	  break;
2961 
2962 	case R_390_TLS_LDM32:
2963 	  if (! bfd_link_pic (info))
2964 	    /* The literal pool entry this relocation refers to gets ignored
2965 	       by the optimized code of the local exec model. Do nothing
2966 	       and the value will turn out zero.  */
2967 	    continue;
2968 
2969 	  if (htab->elf.sgot == NULL)
2970 	    abort ();
2971 
2972 	  off = htab->tls_ldm_got.offset;
2973 	  if (off & 1)
2974 	    off &= ~1;
2975 	  else
2976 	    {
2977 	      Elf_Internal_Rela outrel;
2978 	      bfd_byte *loc;
2979 
2980 	      if (htab->elf.srelgot == NULL)
2981 		abort ();
2982 
2983 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2984 				 + htab->elf.sgot->output_offset + off);
2985 
2986 	      bfd_put_32 (output_bfd, 0,
2987 			  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2988 	      outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
2989 	      outrel.r_addend = 0;
2990 	      loc = htab->elf.srelgot->contents;
2991 	      loc += htab->elf.srelgot->reloc_count++
2992 		* sizeof (Elf32_External_Rela);
2993 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2994 	      htab->tls_ldm_got.offset |= 1;
2995 	    }
2996 	  relocation = htab->elf.sgot->output_offset + off;
2997 	  unresolved_reloc = FALSE;
2998 	  break;
2999 
3000 	case R_390_TLS_LE32:
3001 	  if (bfd_link_dll (info))
3002 	    {
3003 	      /* Linking a shared library with non-fpic code requires
3004 		 a R_390_TLS_TPOFF relocation.  */
3005 	      Elf_Internal_Rela outrel;
3006 	      asection *sreloc;
3007 	      bfd_byte *loc;
3008 	      int indx;
3009 
3010 	      outrel.r_offset = rel->r_offset
3011 				+ input_section->output_section->vma
3012 				+ input_section->output_offset;
3013 	      if (h != NULL && h->dynindx != -1)
3014 		indx = h->dynindx;
3015 	      else
3016 		indx = 0;
3017 	      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
3018 	      if (indx == 0)
3019 		outrel.r_addend = relocation - dtpoff_base (info);
3020 	      else
3021 		outrel.r_addend = 0;
3022 	      sreloc = elf_section_data (input_section)->sreloc;
3023 	      if (sreloc == NULL)
3024 		abort ();
3025 	      loc = sreloc->contents;
3026 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3027 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3028 	    }
3029 	  else
3030 	    {
3031 	      BFD_ASSERT (! unresolved_reloc);
3032 	      bfd_put_32 (output_bfd, -tpoff (info, relocation),
3033 			  contents + rel->r_offset);
3034 	    }
3035 	  continue;
3036 
3037 	case R_390_TLS_LDO32:
3038 	  if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
3039 	    relocation -= dtpoff_base (info);
3040 	  else
3041 	    /* When converting LDO to LE, we must negate.  */
3042 	    relocation = -tpoff (info, relocation);
3043 	  break;
3044 
3045 	  /* Relocations for tls instructions.  */
3046 	case R_390_TLS_LOAD:
3047 	case R_390_TLS_GDCALL:
3048 	case R_390_TLS_LDCALL:
3049 	  tls_type = GOT_UNKNOWN;
3050 	  if (h == NULL && local_got_offsets)
3051 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3052 	  else if (h != NULL)
3053 	    tls_type = elf_s390_hash_entry(h)->tls_type;
3054 
3055 	  if (tls_type == GOT_TLS_GD)
3056 	    continue;
3057 
3058 	  if (r_type == R_390_TLS_LOAD)
3059 	    {
3060 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3061 		{
3062 		  /* IE->LE transition. Four valid cases:
3063 		     l %rx,0(0,%ry)    -> lr %rx,%ry + bcr 0,0
3064 		     l %rx,0(%ry,0)    -> lr %rx,%ry + bcr 0,0
3065 		     l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
3066 		     l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3067 		  unsigned int insn, ry;
3068 
3069 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3070 		  if ((insn & 0xff00f000) == 0x58000000)
3071 		    /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0  */
3072 		    ry = (insn & 0x000f0000);
3073 		  else if ((insn & 0xff0f0000) == 0x58000000)
3074 		    /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0  */
3075 		    ry = (insn & 0x0000f000) << 4;
3076 		  else if ((insn & 0xff00f000) == 0x5800c000)
3077 		    /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0  */
3078 		    ry = (insn & 0x000f0000);
3079 		  else if ((insn & 0xff0f0000) == 0x580c0000)
3080 		    /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0  */
3081 		    ry = (insn & 0x0000f000) << 4;
3082 		  else
3083 		    {
3084 		      invalid_tls_insn (input_bfd, input_section, rel);
3085 		      return FALSE;
3086 		    }
3087 		  insn = 0x18000700 | (insn & 0x00f00000) | ry;
3088 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3089 		}
3090 	    }
3091 	  else if (r_type == R_390_TLS_GDCALL)
3092 	    {
3093 	      unsigned int insn;
3094 
3095 	      insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3096 	      if ((insn & 0xff000fff) != 0x4d000000 &&
3097 		  (insn & 0xffff0000) != 0xc0e50000 &&
3098 		  (insn & 0xff000000) != 0x0d000000)
3099 		{
3100 		  invalid_tls_insn (input_bfd, input_section, rel);
3101 		  return FALSE;
3102 		}
3103 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
3104 		{
3105 		  if ((insn & 0xff000000) == 0x0d000000)
3106 		    {
3107 		      /* GD->LE transition.
3108 			 basr rx, ry -> nopr r7 */
3109 		      insn = 0x07070000 | (insn & 0xffff);
3110 		    }
3111 		  else if ((insn & 0xff000000) == 0x4d000000)
3112 		    {
3113 		      /* GD->LE transition.
3114 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
3115 		      insn = 0x47000000;
3116 		    }
3117 		  else
3118 		    {
3119 		      /* GD->LE transition.
3120 			 brasl %r14,_tls_get_offset@plt -> brcl 0,.  */
3121 		      insn = 0xc0040000;
3122 		      bfd_put_16 (output_bfd, 0x0000,
3123 				  contents + rel->r_offset + 4);
3124 		    }
3125 		}
3126 	      else
3127 		{
3128 		  /* If basr is used in the pic case to invoke
3129 		     _tls_get_offset, something went wrong before.  */
3130 		  if ((insn & 0xff000000) == 0x0d000000)
3131 		    {
3132 		      invalid_tls_insn (input_bfd, input_section, rel);
3133 		      return FALSE;
3134 		    }
3135 
3136 		  if ((insn & 0xff000000) == 0x4d000000)
3137 		    {
3138 		      /* GD->IE transition.
3139 			 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12)  */
3140 		      insn = 0x5822c000;
3141 		    }
3142 		  else
3143 		    {
3144 		      /* GD->IE transition.
3145 			 brasl %r14,__tls_get_addr@plt ->
3146 				l %r2,0(%r2,%r12) ; bcr 0,0 */
3147 		      insn = 0x5822c000;
3148 		      bfd_put_16 (output_bfd, 0x0700,
3149 				  contents + rel->r_offset + 4);
3150 		    }
3151 		}
3152 	      bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3153 	    }
3154 	  else if (r_type == R_390_TLS_LDCALL)
3155 	    {
3156 	      if (!bfd_link_pic (info))
3157 		{
3158 		  unsigned int insn;
3159 
3160 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3161 		  if ((insn & 0xff000fff) != 0x4d000000 &&
3162 		      (insn & 0xffff0000) != 0xc0e50000 &&
3163 		      (insn & 0xff000000) != 0x0d000000)
3164 		    {
3165 		      invalid_tls_insn (input_bfd, input_section, rel);
3166 		      return FALSE;
3167 		    }
3168 
3169 		  if ((insn & 0xff000000) == 0x0d000000)
3170 		    {
3171 		      /* LD->LE transition.
3172 			 basr rx, ry -> nopr r7 */
3173 		      insn = 0x07070000 | (insn & 0xffff);
3174 		    }
3175 		  else if ((insn & 0xff000000) == 0x4d000000)
3176 		    {
3177 		      /* LD->LE transition.
3178 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
3179 		      insn = 0x47000000;
3180 		    }
3181 		  else
3182 		    {
3183 		      /* LD->LE transition.
3184 			 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
3185 		      insn = 0xc0040000;
3186 		      bfd_put_16 (output_bfd, 0x0000,
3187 				  contents + rel->r_offset + 4);
3188 		    }
3189 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3190 		}
3191 	    }
3192 	  continue;
3193 
3194 	default:
3195 	  break;
3196 	}
3197 
3198       /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3199 	 because such sections are not SEC_ALLOC and thus ld.so will
3200 	 not process them.  */
3201       if (unresolved_reloc
3202 	  && !((input_section->flags & SEC_DEBUGGING) != 0
3203 	       && h->def_dynamic)
3204 	  && _bfd_elf_section_offset (output_bfd, info, input_section,
3205 				      rel->r_offset) != (bfd_vma) -1)
3206 	_bfd_error_handler
3207 	  /* xgettext:c-format */
3208 	  (_("%pB(%pA+%#" PRIx64 "): "
3209 	     "unresolvable %s relocation against symbol `%s'"),
3210 	   input_bfd,
3211 	   input_section,
3212 	   (uint64_t) rel->r_offset,
3213 	   howto->name,
3214 	   h->root.root.string);
3215 
3216     do_relocation:
3217 
3218       /* When applying a 24 bit reloc we need to start one byte
3219 	 earlier.  Otherwise the 32 bit get/put bfd operations might
3220 	 access a byte after the actual section.  */
3221       if (r_type == R_390_PC24DBL
3222 	  || r_type == R_390_PLT24DBL)
3223 	rel->r_offset--;
3224 
3225       if (r_type == R_390_20
3226 	  || r_type == R_390_GOT20
3227 	  || r_type == R_390_GOTPLT20
3228 	  || r_type == R_390_TLS_GOTIE20)
3229 	{
3230 	  relocation += rel->r_addend;
3231 	  relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3232 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3233 					contents, rel->r_offset,
3234 					relocation, 0);
3235 	}
3236       else
3237 	r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3238 				      contents, rel->r_offset,
3239 				      relocation, rel->r_addend);
3240 
3241       if (r != bfd_reloc_ok)
3242 	{
3243 	  const char *name;
3244 
3245 	  if (h != NULL)
3246 	    name = h->root.root.string;
3247 	  else
3248 	    {
3249 	      name = bfd_elf_string_from_elf_section (input_bfd,
3250 						      symtab_hdr->sh_link,
3251 						      sym->st_name);
3252 	      if (name == NULL)
3253 		return FALSE;
3254 	      if (*name == '\0')
3255 		name = bfd_section_name (input_bfd, sec);
3256 	    }
3257 
3258 	  if (r == bfd_reloc_overflow)
3259 	    (*info->callbacks->reloc_overflow)
3260 	      (info, (h ? &h->root : NULL), name, howto->name,
3261 	       (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3262 	  else
3263 	    {
3264 	      _bfd_error_handler
3265 		/* xgettext:c-format */
3266 		(_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3267 		 input_bfd, input_section,
3268 		 (uint64_t) rel->r_offset, name, (int) r);
3269 	      return FALSE;
3270 	    }
3271 	}
3272     }
3273 
3274   return TRUE;
3275 }
3276 
3277 /* Generate the PLT slots together with the dynamic relocations needed
3278    for IFUNC symbols.  */
3279 
3280 static void
3281 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3282 			      struct bfd_link_info *info,
3283 			      struct elf_link_hash_entry *h,
3284 			      struct elf_s390_link_hash_table *htab,
3285 			      bfd_vma iplt_offset,
3286 			      bfd_vma resolver_address)
3287 {
3288   bfd_vma iplt_index;
3289   bfd_vma got_offset;
3290   bfd_vma igotiplt_offset;
3291   Elf_Internal_Rela rela;
3292   bfd_byte *loc;
3293   asection *plt, *gotplt, *relplt;
3294   bfd_vma relative_offset;
3295 
3296   if (htab->elf.iplt == NULL
3297       || htab->elf.igotplt == NULL
3298       || htab->elf.irelplt == NULL)
3299     abort ();
3300 
3301   gotplt = htab->elf.igotplt;
3302   relplt = htab->elf.irelplt;
3303 
3304   /* Index of the PLT slot within iplt section.  */
3305   iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3306   plt = htab->elf.iplt;
3307   /* Offset into the igot.plt section.  */
3308   igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3309   /* Offset into the got section.  */
3310   got_offset = igotiplt_offset + gotplt->output_offset;
3311 
3312   /* S390 uses halfwords for relative branch calc!  */
3313   relative_offset = - (plt->output_offset +
3314 		       (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
3315   /* If offset is > 32768, branch to a previous branch
3316      390 can only handle +-64 K jumps.  */
3317   if ( -32768 > (int) relative_offset )
3318     relative_offset
3319       = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3320 
3321   /* Fill in the entry in the procedure linkage table.  */
3322   if (!bfd_link_pic (info))
3323     {
3324       memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3325 	      PLT_ENTRY_SIZE);
3326 
3327       /* Adjust jump to the first plt entry.  */
3328       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3329 		  plt->contents + iplt_offset + 20);
3330 
3331       /* Push the GOT offset field.  */
3332       bfd_put_32 (output_bfd,
3333 		  (gotplt->output_section->vma
3334 		   + got_offset),
3335 		  plt->contents + iplt_offset + 24);
3336     }
3337   else if (got_offset < 4096)
3338     {
3339       /* The GOT offset is small enough to be used directly as
3340 	 displacement.  */
3341       memcpy (plt->contents + iplt_offset,
3342 	      elf_s390_plt_pic12_entry,
3343 	      PLT_ENTRY_SIZE);
3344 
3345       /* Put in the GOT offset as displacement value.  The 0xc000
3346 	 value comes from the first word of the plt entry.  Look
3347 	 at the elf_s390_plt_pic16_entry content.  */
3348       bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3349 		  plt->contents + iplt_offset + 2);
3350 
3351       /* Adjust the jump to the first plt entry.  */
3352       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3353 		  plt->contents + iplt_offset + 20);
3354     }
3355   else if (got_offset < 32768)
3356     {
3357       /* The GOT offset is too big for a displacement but small
3358 	 enough to be a signed 16 bit immediate value as it can be
3359 	 used in an lhi instruction.  */
3360       memcpy (plt->contents + iplt_offset,
3361 	      elf_s390_plt_pic16_entry,
3362 	      PLT_ENTRY_SIZE);
3363 
3364       /* Put in the GOT offset for the lhi instruction.  */
3365       bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3366 		  plt->contents + iplt_offset + 2);
3367 
3368       /* Adjust the jump to the first plt entry.  */
3369       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3370 		  plt->contents + iplt_offset + 20);
3371     }
3372   else
3373     {
3374       memcpy (plt->contents + iplt_offset,
3375 	      elf_s390_plt_pic_entry,
3376 	      PLT_ENTRY_SIZE);
3377 
3378       /* Adjust the jump to the first plt entry.  */
3379       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3380 		  plt->contents + iplt_offset + 20);
3381 
3382       /* Push the GOT offset field.  */
3383       bfd_put_32 (output_bfd, got_offset,
3384 		  plt->contents + iplt_offset + 24);
3385     }
3386   /* Insert offset into  reloc. table here.  */
3387   bfd_put_32 (output_bfd, relplt->output_offset +
3388 	      iplt_index * RELA_ENTRY_SIZE,
3389 	      plt->contents + iplt_offset + 28);
3390 
3391   /* Fill in the entry in the global offset table.
3392      Points to instruction after GOT offset.  */
3393   bfd_put_32 (output_bfd,
3394 	      (plt->output_section->vma
3395 	       + plt->output_offset
3396 	       + iplt_offset
3397 	       + 12),
3398 	      gotplt->contents + igotiplt_offset);
3399 
3400   /* Fill in the entry in the .rela.plt section.  */
3401   rela.r_offset = gotplt->output_section->vma + got_offset;
3402 
3403   if (!h
3404       || h->dynindx == -1
3405       || ((bfd_link_executable (info)
3406 	   || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3407 	  && h->def_regular))
3408     {
3409       /* The symbol can be locally resolved.  */
3410       rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3411       rela.r_addend = resolver_address;
3412     }
3413   else
3414     {
3415       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3416       rela.r_addend = 0;
3417     }
3418 
3419   loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3420   bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3421 }
3422 
3423 /* Finish up dynamic symbol handling.  We set the contents of various
3424    dynamic sections here.  */
3425 
3426 static bfd_boolean
3427 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3428 				struct bfd_link_info *info,
3429 				struct elf_link_hash_entry *h,
3430 				Elf_Internal_Sym *sym)
3431 {
3432   struct elf_s390_link_hash_table *htab;
3433   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3434 
3435   htab = elf_s390_hash_table (info);
3436 
3437   if (h->plt.offset != (bfd_vma) -1)
3438     {
3439       bfd_vma plt_index;
3440       bfd_vma got_offset;
3441       Elf_Internal_Rela rela;
3442       bfd_byte *loc;
3443       bfd_vma relative_offset;
3444 
3445       /* This symbol has an entry in the procedure linkage table.  Set
3446 	 it up.  */
3447       if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3448 	{
3449 	  elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3450 	    htab, h->plt.offset,
3451 	    eh->ifunc_resolver_address +
3452 	    eh->ifunc_resolver_section->output_offset +
3453 	    eh->ifunc_resolver_section->output_section->vma);
3454 	  /* Do not return yet.  Handling of explicit GOT slots of
3455 	     IFUNC symbols is below.  */
3456 	}
3457       else
3458 	{
3459 	  if (h->dynindx == -1
3460 	      || htab->elf.splt == NULL
3461 	      || htab->elf.sgotplt == NULL
3462 	      || htab->elf.srelplt == NULL)
3463 	    abort ();
3464 
3465 	  /* Calc. index no.
3466 	     Current offset - size first entry / entry size.  */
3467 	  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3468 
3469 	  /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3470 	     addr & GOT addr.  */
3471 	  got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3472 
3473 	  /* S390 uses halfwords for relative branch calc!  */
3474 	  relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3475 				(PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3476 	  /* If offset is > 32768, branch to a previous branch
3477 	     390 can only handle +-64 K jumps.  */
3478 	  if ( -32768 > (int) relative_offset )
3479 	    relative_offset
3480 	      = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3481 
3482 	  /* Fill in the entry in the procedure linkage table.  */
3483 	  if (!bfd_link_pic (info))
3484 	    {
3485 	      memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3486 		      PLT_ENTRY_SIZE);
3487 
3488 	      /* Adjust jump to the first plt entry.  */
3489 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3490 			  htab->elf.splt->contents + h->plt.offset + 20);
3491 
3492 	      /* Push the GOT offset field.  */
3493 	      bfd_put_32 (output_bfd,
3494 			  (htab->elf.sgotplt->output_section->vma
3495 			   + htab->elf.sgotplt->output_offset
3496 			   + got_offset),
3497 			  htab->elf.splt->contents + h->plt.offset + 24);
3498 	    }
3499 	  else if (got_offset < 4096)
3500 	    {
3501 	      /* The GOT offset is small enough to be used directly as
3502 		 displacement.  */
3503 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3504 		      elf_s390_plt_pic12_entry,
3505 		      PLT_ENTRY_SIZE);
3506 
3507 	      /* Put in the GOT offset as displacement value.  The 0xc000
3508 		 value comes from the first word of the plt entry.  Look
3509 		 at the elf_s390_plt_pic12_entry content.  */
3510 	      bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3511 			  htab->elf.splt->contents + h->plt.offset + 2);
3512 
3513 	      /* Adjust the jump to the first plt entry.  */
3514 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3515 			  htab->elf.splt->contents + h->plt.offset + 20);
3516 	    }
3517 	  else if (got_offset < 32768)
3518 	    {
3519 	      /* The GOT offset is too big for a displacement but small
3520 		 enough to be a signed 16 bit immediate value as it can be
3521 		 used in an lhi instruction.  */
3522 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3523 		      elf_s390_plt_pic16_entry,
3524 		      PLT_ENTRY_SIZE);
3525 
3526 	      /* Put in the GOT offset for the lhi instruction.  */
3527 	      bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3528 			  htab->elf.splt->contents + h->plt.offset + 2);
3529 
3530 	      /* Adjust the jump to the first plt entry.  */
3531 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3532 			  htab->elf.splt->contents + h->plt.offset + 20);
3533 	    }
3534 	  else
3535 	    {
3536 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3537 		      elf_s390_plt_pic_entry,
3538 		      PLT_ENTRY_SIZE);
3539 
3540 	      /* Adjust the jump to the first plt entry.  */
3541 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3542 			  htab->elf.splt->contents + h->plt.offset + 20);
3543 
3544 	      /* Push the GOT offset field.  */
3545 	      bfd_put_32 (output_bfd, got_offset,
3546 			  htab->elf.splt->contents + h->plt.offset + 24);
3547 	    }
3548 	  /* Insert offset into  reloc. table here.  */
3549 	  bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3550 		      htab->elf.splt->contents + h->plt.offset + 28);
3551 
3552 	  /* Fill in the entry in the global offset table.
3553 	     Points to instruction after GOT offset.  */
3554 	  bfd_put_32 (output_bfd,
3555 		      (htab->elf.splt->output_section->vma
3556 		       + htab->elf.splt->output_offset
3557 		       + h->plt.offset
3558 		       + 12),
3559 		      htab->elf.sgotplt->contents + got_offset);
3560 
3561 	  /* Fill in the entry in the .rela.plt section.  */
3562 	  rela.r_offset = (htab->elf.sgotplt->output_section->vma
3563 			   + htab->elf.sgotplt->output_offset
3564 			   + got_offset);
3565 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3566 	  rela.r_addend = 0;
3567 	  loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3568 	  bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3569 
3570 	  if (!h->def_regular)
3571 	    {
3572 	      /* Mark the symbol as undefined, rather than as defined in
3573 		 the .plt section.  Leave the value alone.  This is a clue
3574 		 for the dynamic linker, to make function pointer
3575 		 comparisons work between an application and shared
3576 		 library.  */
3577 	      sym->st_shndx = SHN_UNDEF;
3578 	    }
3579 	}
3580     }
3581 
3582   if (h->got.offset != (bfd_vma) -1
3583       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3584       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3585       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3586     {
3587       Elf_Internal_Rela rela;
3588       bfd_byte *loc;
3589 
3590       /* This symbol has an entry in the global offset table.  Set it
3591 	 up.  */
3592 
3593       if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3594 	abort ();
3595 
3596       rela.r_offset = (htab->elf.sgot->output_section->vma
3597 		       + htab->elf.sgot->output_offset
3598 		       + (h->got.offset &~ (bfd_vma) 1));
3599 
3600       /* If this is a static link, or it is a -Bsymbolic link and the
3601 	 symbol is defined locally or was forced to be local because
3602 	 of a version file, we just want to emit a RELATIVE reloc.
3603 	 The entry in the global offset table will already have been
3604 	 initialized in the relocate_section function.  */
3605       if (h->def_regular && s390_is_ifunc_symbol_p (h))
3606 	{
3607 	  if (bfd_link_pic (info))
3608 	    {
3609 	      /* An explicit GOT slot usage needs GLOB_DAT.  If the
3610 		 symbol references local the implicit got.iplt slot
3611 		 will be used and the IRELATIVE reloc has been created
3612 		 above.  */
3613 	      goto do_glob_dat;
3614 	    }
3615 	  else
3616 	    {
3617 	      /* For non-shared objects explicit GOT slots must be
3618 		 filled with the PLT slot address for pointer
3619 		 equality reasons.  */
3620 	      bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3621 				       + htab->elf.iplt->output_offset
3622 				       + h->plt.offset),
3623 			  htab->elf.sgot->contents + h->got.offset);
3624 	      return TRUE;
3625 	    }
3626 	}
3627       else if (bfd_link_pic (info)
3628 	       && SYMBOL_REFERENCES_LOCAL (info, h))
3629 	{
3630 	  /* If this is a static link, or it is a -Bsymbolic link and
3631 	     the symbol is defined locally or was forced to be local
3632 	     because of a version file, we just want to emit a
3633 	     RELATIVE reloc.  The entry in the global offset table
3634 	     will already have been initialized in the
3635 	     relocate_section function.  */
3636 	  if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
3637 	    return FALSE;
3638 	  BFD_ASSERT((h->got.offset & 1) != 0);
3639 	  rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3640 	  rela.r_addend = (h->root.u.def.value
3641 			   + h->root.u.def.section->output_section->vma
3642 			   + h->root.u.def.section->output_offset);
3643 	}
3644       else
3645 	{
3646 	  BFD_ASSERT((h->got.offset & 1) == 0);
3647 	do_glob_dat:
3648 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3649 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
3650 	  rela.r_addend = 0;
3651 	}
3652 
3653       loc = htab->elf.srelgot->contents;
3654       loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3655       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3656     }
3657 
3658   if (h->needs_copy)
3659     {
3660       Elf_Internal_Rela rela;
3661       asection *s;
3662       bfd_byte *loc;
3663 
3664       /* This symbols needs a copy reloc.  Set it up.  */
3665 
3666       if (h->dynindx == -1
3667 	  || (h->root.type != bfd_link_hash_defined
3668 	      && h->root.type != bfd_link_hash_defweak)
3669 	  || htab->elf.srelbss == NULL
3670 	  || htab->elf.sreldynrelro == NULL)
3671 	abort ();
3672 
3673       rela.r_offset = (h->root.u.def.value
3674 		       + h->root.u.def.section->output_section->vma
3675 		       + h->root.u.def.section->output_offset);
3676       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3677       rela.r_addend = 0;
3678       if (h->root.u.def.section == htab->elf.sdynrelro)
3679 	s = htab->elf.sreldynrelro;
3680       else
3681 	s = htab->elf.srelbss;
3682       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3683       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3684     }
3685 
3686   /* Mark some specially defined symbols as absolute.  */
3687   if (h == htab->elf.hdynamic
3688       || h == htab->elf.hgot
3689       || h == htab->elf.hplt)
3690     sym->st_shndx = SHN_ABS;
3691 
3692   return TRUE;
3693 }
3694 
3695 /* Used to decide how to sort relocs in an optimal manner for the
3696    dynamic linker, before writing them out.  */
3697 
3698 static enum elf_reloc_type_class
3699 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3700 			   const asection *rel_sec ATTRIBUTE_UNUSED,
3701 			   const Elf_Internal_Rela *rela)
3702 {
3703   bfd *abfd = info->output_bfd;
3704   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3705   struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3706   unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3707   Elf_Internal_Sym sym;
3708 
3709   if (htab->elf.dynsym == NULL
3710       || !bed->s->swap_symbol_in (abfd,
3711 				  (htab->elf.dynsym->contents
3712 				   + r_symndx * bed->s->sizeof_sym),
3713 				  0, &sym))
3714     abort ();
3715 
3716   /* Check relocation against STT_GNU_IFUNC symbol.  */
3717   if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3718     return reloc_class_ifunc;
3719 
3720   switch ((int) ELF32_R_TYPE (rela->r_info))
3721     {
3722     case R_390_RELATIVE:
3723       return reloc_class_relative;
3724     case R_390_JMP_SLOT:
3725       return reloc_class_plt;
3726     case R_390_COPY:
3727       return reloc_class_copy;
3728     default:
3729       return reloc_class_normal;
3730     }
3731 }
3732 
3733 /* Finish up the dynamic sections.  */
3734 
3735 static bfd_boolean
3736 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3737 				  struct bfd_link_info *info)
3738 {
3739   struct elf_s390_link_hash_table *htab;
3740   bfd *dynobj;
3741   asection *sdyn;
3742   bfd *ibfd;
3743   unsigned int i;
3744 
3745   htab = elf_s390_hash_table (info);
3746   dynobj = htab->elf.dynobj;
3747   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3748 
3749   if (htab->elf.dynamic_sections_created)
3750     {
3751       Elf32_External_Dyn *dyncon, *dynconend;
3752 
3753       if (sdyn == NULL || htab->elf.sgot == NULL)
3754 	abort ();
3755 
3756       dyncon = (Elf32_External_Dyn *) sdyn->contents;
3757       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3758       for (; dyncon < dynconend; dyncon++)
3759 	{
3760 	  Elf_Internal_Dyn dyn;
3761 	  asection *s;
3762 
3763 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3764 
3765 	  switch (dyn.d_tag)
3766 	    {
3767 	    default:
3768 	      continue;
3769 
3770 	    case DT_PLTGOT:
3771 	      s = htab->elf.sgotplt;
3772 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3773 	      break;
3774 
3775 	    case DT_JMPREL:
3776 	      s = htab->elf.srelplt;
3777 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3778 	      break;
3779 
3780 	    case DT_PLTRELSZ:
3781 	      dyn.d_un.d_val = htab->elf.srelplt->size;
3782 	      if (htab->elf.irelplt)
3783 		dyn.d_un.d_val += htab->elf.irelplt->size;
3784 	      break;
3785 	    }
3786 
3787 	  bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3788 	}
3789 
3790       /* Fill in the special first entry in the procedure linkage table.  */
3791       if (htab->elf.splt && htab->elf.splt->size > 0)
3792 	{
3793 	  memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
3794 	  if (bfd_link_pic (info))
3795 	    {
3796 	      memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
3797 		      PLT_FIRST_ENTRY_SIZE);
3798 	    }
3799 	  else
3800 	    {
3801 	      memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
3802 		      PLT_FIRST_ENTRY_SIZE);
3803 	      bfd_put_32 (output_bfd,
3804 			  htab->elf.sgotplt->output_section->vma
3805 			  + htab->elf.sgotplt->output_offset,
3806 			  htab->elf.splt->contents + 24);
3807 	    }
3808 	  elf_section_data (htab->elf.splt->output_section)
3809 	    ->this_hdr.sh_entsize = 4;
3810 	}
3811 
3812     }
3813 
3814   if (htab->elf.sgotplt)
3815     {
3816       /* Fill in the first three entries in the global offset table.  */
3817       if (htab->elf.sgotplt->size > 0)
3818 	{
3819 	  bfd_put_32 (output_bfd,
3820 		      (sdyn == NULL ? (bfd_vma) 0
3821 		       : sdyn->output_section->vma + sdyn->output_offset),
3822 		      htab->elf.sgotplt->contents);
3823 	  /* One entry for shared object struct ptr.  */
3824 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
3825 	  /* One entry for _dl_runtime_resolve.  */
3826 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3827 	}
3828 
3829       elf_section_data (htab->elf.sgotplt->output_section)
3830 	->this_hdr.sh_entsize = 4;
3831     }
3832   /* Finish dynamic symbol for local IFUNC symbols.  */
3833   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3834     {
3835       struct plt_entry *local_plt;
3836       Elf_Internal_Sym *isym;
3837       Elf_Internal_Shdr *symtab_hdr;
3838 
3839       symtab_hdr = &elf_symtab_hdr (ibfd);
3840 
3841       if (!is_s390_elf (ibfd))
3842 	continue;
3843 
3844       local_plt = elf_s390_local_plt (ibfd);
3845       if (local_plt != NULL)
3846 	for (i = 0; i < symtab_hdr->sh_info; i++)
3847 	  {
3848 	    if (local_plt[i].plt.offset != (bfd_vma) -1)
3849 	      {
3850 		asection *sec = local_plt[i].sec;
3851 		isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3852 		if (isym == NULL)
3853 		  return FALSE;
3854 
3855 		if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3856 		  elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3857 						local_plt[i].plt.offset,
3858 						isym->st_value
3859 						+ sec->output_section->vma
3860 						+ sec->output_offset);
3861 
3862 	      }
3863 	  }
3864     }
3865   return TRUE;
3866 }
3867 
3868 /* Support for core dump NOTE sections.  */
3869 
3870 static bfd_boolean
3871 elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
3872 {
3873   int offset;
3874   unsigned int size;
3875 
3876   switch (note->descsz)
3877     {
3878     default:
3879       return FALSE;
3880 
3881     case 224:			/* S/390 Linux.  */
3882       /* pr_cursig */
3883       elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3884 
3885       /* pr_pid */
3886       elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3887 
3888       /* pr_reg */
3889       offset = 72;
3890       size = 144;
3891       break;
3892     }
3893 
3894   /* Make a ".reg/999" section.  */
3895   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3896 					  size, note->descpos + offset);
3897 }
3898 
3899 static bfd_boolean
3900 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3901 {
3902   switch (note->descsz)
3903     {
3904     default:
3905       return FALSE;
3906 
3907     case 124:			/* sizeof(struct elf_prpsinfo) on s390 */
3908       elf_tdata (abfd)->core->pid
3909 	= bfd_get_32 (abfd, note->descdata + 12);
3910       elf_tdata (abfd)->core->program
3911 	= _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
3912       elf_tdata (abfd)->core->command
3913 	= _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
3914       break;
3915     }
3916 
3917   /* Note that for some reason, a spurious space is tacked
3918      onto the end of the args in some (at least one anyway)
3919      implementations, so strip it off if it exists.  */
3920 
3921   {
3922     char *command = elf_tdata (abfd)->core->command;
3923     int n = strlen (command);
3924 
3925     if (0 < n && command[n - 1] == ' ')
3926       command[n - 1] = '\0';
3927   }
3928 
3929   return TRUE;
3930 }
3931 
3932 static char *
3933 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3934 			  int note_type, ...)
3935 {
3936   va_list ap;
3937 
3938   switch (note_type)
3939     {
3940     default:
3941       return NULL;
3942 
3943     case NT_PRPSINFO:
3944       {
3945 	char data[124] ATTRIBUTE_NONSTRING = { 0 };
3946 	const char *fname, *psargs;
3947 
3948 	va_start (ap, note_type);
3949 	fname = va_arg (ap, const char *);
3950 	psargs = va_arg (ap, const char *);
3951 	va_end (ap);
3952 
3953 	strncpy (data + 28, fname, 16);
3954 #if GCC_VERSION == 8001
3955 	DIAGNOSTIC_PUSH;
3956 	/* GCC 8.1 warns about 80 equals destination size with
3957 	   -Wstringop-truncation:
3958 	   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3959 	 */
3960 	DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3961 #endif
3962 	strncpy (data + 44, psargs, 80);
3963 #if GCC_VERSION == 8001
3964 	DIAGNOSTIC_POP;
3965 #endif
3966 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3967 				   &data, sizeof (data));
3968       }
3969 
3970     case NT_PRSTATUS:
3971       {
3972 	char data[224] = { 0 };
3973 	long pid;
3974 	int cursig;
3975 	const void *gregs;
3976 
3977 	va_start (ap, note_type);
3978 	pid = va_arg (ap, long);
3979 	cursig = va_arg (ap, int);
3980 	gregs = va_arg (ap, const void *);
3981 	va_end (ap);
3982 
3983 	bfd_put_16 (abfd, cursig, data + 12);
3984 	bfd_put_32 (abfd, pid, data + 24);
3985 	memcpy (data + 72, gregs, 144);
3986 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3987 				   &data, sizeof (data));
3988       }
3989     }
3990   /* NOTREACHED */
3991 }
3992 
3993 /* Return address for Ith PLT stub in section PLT, for relocation REL
3994    or (bfd_vma) -1 if it should not be included.  */
3995 
3996 static bfd_vma
3997 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3998 		      const arelent *rel ATTRIBUTE_UNUSED)
3999 {
4000   return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
4001 }
4002 
4003 /* Merge backend specific data from an object file to the output
4004    object file when linking.  */
4005 
4006 static bfd_boolean
4007 elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
4008 {
4009   bfd *obfd = info->output_bfd;
4010 
4011   if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
4012     return TRUE;
4013 
4014   if (!elf_s390_merge_obj_attributes (ibfd, info))
4015     return FALSE;
4016 
4017   elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
4018   return TRUE;
4019 }
4020 
4021 
4022 #define TARGET_BIG_SYM	s390_elf32_vec
4023 #define TARGET_BIG_NAME	"elf32-s390"
4024 #define ELF_ARCH	bfd_arch_s390
4025 #define ELF_TARGET_ID	S390_ELF_DATA
4026 #define ELF_MACHINE_CODE EM_S390
4027 #define ELF_MACHINE_ALT1 EM_S390_OLD
4028 #define ELF_MAXPAGESIZE 0x1000
4029 
4030 #define elf_backend_can_gc_sections	1
4031 #define elf_backend_can_refcount	1
4032 #define elf_backend_want_got_plt	1
4033 #define elf_backend_plt_readonly	1
4034 #define elf_backend_want_plt_sym	0
4035 #define elf_backend_got_header_size	12
4036 #define elf_backend_want_dynrelro	1
4037 #define elf_backend_rela_normal		1
4038 
4039 #define elf_info_to_howto		      elf_s390_info_to_howto
4040 
4041 #define bfd_elf32_bfd_is_local_label_name     elf_s390_is_local_label_name
4042 #define bfd_elf32_bfd_link_hash_table_create  elf_s390_link_hash_table_create
4043 #define bfd_elf32_bfd_reloc_type_lookup	      elf_s390_reloc_type_lookup
4044 #define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4045 
4046 #define bfd_elf32_bfd_merge_private_bfd_data  elf32_s390_merge_private_bfd_data
4047 
4048 #define elf_backend_adjust_dynamic_symbol     elf_s390_adjust_dynamic_symbol
4049 #define elf_backend_check_relocs	      elf_s390_check_relocs
4050 #define elf_backend_copy_indirect_symbol      elf_s390_copy_indirect_symbol
4051 #define elf_backend_create_dynamic_sections   _bfd_elf_create_dynamic_sections
4052 #define elf_backend_finish_dynamic_sections   elf_s390_finish_dynamic_sections
4053 #define elf_backend_finish_dynamic_symbol     elf_s390_finish_dynamic_symbol
4054 #define elf_backend_gc_mark_hook	      elf_s390_gc_mark_hook
4055 #define elf_backend_reloc_type_class	      elf_s390_reloc_type_class
4056 #define elf_backend_relocate_section	      elf_s390_relocate_section
4057 #define elf_backend_size_dynamic_sections     elf_s390_size_dynamic_sections
4058 #define elf_backend_init_index_section	      _bfd_elf_init_1_index_section
4059 #define elf_backend_grok_prstatus	      elf_s390_grok_prstatus
4060 #define elf_backend_grok_psinfo		      elf_s390_grok_psinfo
4061 #define elf_backend_write_core_note	      elf_s390_write_core_note
4062 #define elf_backend_plt_sym_val		      elf_s390_plt_sym_val
4063 #define elf_backend_sort_relocs_p	      elf_s390_elf_sort_relocs_p
4064 
4065 #define bfd_elf32_mkobject		elf_s390_mkobject
4066 #define elf_backend_object_p		elf_s390_object_p
4067 
4068 #define elf_backend_linux_prpsinfo32_ugid16	TRUE
4069 
4070 #include "elf32-target.h"
4071