xref: /netbsd-src/external/gpl3/gdb/dist/bfd/elf32-s390.c (revision 22ebeae4b2252475e0ebe332f69734639cb946ea)
1 /* IBM S/390-specific support for 32-bit ELF
2    Copyright (C) 2000-2024 Free Software Foundation, Inc.
3    Contributed by Carl B. Pedersen and Martin Schwidefsky.
4 
5    This file is part of BFD, the Binary File Descriptor library.
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11 
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16 
17    You should have received a copy of the GNU General Public License
18    along with this program; if not, write to the Free Software
19    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
20    02110-1301, USA.  */
21 
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "libbfd.h"
26 #include "elf-bfd.h"
27 #include "elf/s390.h"
28 #include <stdarg.h>
29 
30 static bfd_reloc_status_type
31 s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 		asection *, bfd *, char **);
33 static bfd_reloc_status_type
34 s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 		      asection *, bfd *, char **);
36 
37 /* The relocation "howto" table.  */
38 
39 static reloc_howto_type elf_howto_table[] =
40 {
41   HOWTO (R_390_NONE,		/* type */
42 	 0,			/* rightshift */
43 	 0,			/* size */
44 	 0,			/* bitsize */
45 	 false,			/* pc_relative */
46 	 0,			/* bitpos */
47 	 complain_overflow_dont, /* complain_on_overflow */
48 	 bfd_elf_generic_reloc, /* special_function */
49 	 "R_390_NONE",		/* name */
50 	 false,			/* partial_inplace */
51 	 0,			/* src_mask */
52 	 0,			/* dst_mask */
53 	 false),		/* pcrel_offset */
54 
55   HOWTO(R_390_8,	 0, 1,	8, false, 0, complain_overflow_bitfield,
56 	bfd_elf_generic_reloc, "R_390_8",	 false, 0,0x000000ff, false),
57   HOWTO(R_390_12,	 0, 2, 12, false, 0, complain_overflow_dont,
58 	bfd_elf_generic_reloc, "R_390_12",	 false, 0,0x00000fff, false),
59   HOWTO(R_390_16,	 0, 2, 16, false, 0, complain_overflow_bitfield,
60 	bfd_elf_generic_reloc, "R_390_16",	 false, 0,0x0000ffff, false),
61   HOWTO(R_390_32,	 0, 4, 32, false, 0, complain_overflow_bitfield,
62 	bfd_elf_generic_reloc, "R_390_32",	 false, 0,0xffffffff, false),
63   HOWTO(R_390_PC32,	 0, 4, 32,  true, 0, complain_overflow_bitfield,
64 	bfd_elf_generic_reloc, "R_390_PC32",	 false, 0,0xffffffff, true),
65   HOWTO(R_390_GOT12,	 0, 2, 12, false, 0, complain_overflow_bitfield,
66 	bfd_elf_generic_reloc, "R_390_GOT12",	 false, 0,0x00000fff, false),
67   HOWTO(R_390_GOT32,	 0, 4, 32, false, 0, complain_overflow_bitfield,
68 	bfd_elf_generic_reloc, "R_390_GOT32",	 false, 0,0xffffffff, false),
69   HOWTO(R_390_PLT32,	 0, 4, 32,  true, 0, complain_overflow_bitfield,
70 	bfd_elf_generic_reloc, "R_390_PLT32",	 false, 0,0xffffffff, true),
71   HOWTO(R_390_COPY,	 0, 4, 32, false, 0, complain_overflow_bitfield,
72 	bfd_elf_generic_reloc, "R_390_COPY",	 false, 0,0xffffffff, false),
73   HOWTO(R_390_GLOB_DAT,	 0, 4, 32, false, 0, complain_overflow_bitfield,
74 	bfd_elf_generic_reloc, "R_390_GLOB_DAT", false, 0,0xffffffff, false),
75   HOWTO(R_390_JMP_SLOT,	 0, 4, 32, false, 0, complain_overflow_bitfield,
76 	bfd_elf_generic_reloc, "R_390_JMP_SLOT", false, 0,0xffffffff, false),
77   HOWTO(R_390_RELATIVE,	 0, 4, 32,  true, 0, complain_overflow_bitfield,
78 	bfd_elf_generic_reloc, "R_390_RELATIVE", false, 0,0xffffffff, false),
79   HOWTO(R_390_GOTOFF32,	 0, 4, 32, false, 0, complain_overflow_bitfield,
80 	bfd_elf_generic_reloc, "R_390_GOTOFF32", false, 0,0xffffffff, false),
81   HOWTO(R_390_GOTPC,	 0, 4, 32,  true, 0, complain_overflow_bitfield,
82 	bfd_elf_generic_reloc, "R_390_GOTPC",	 false, 0,0xffffffff, true),
83   HOWTO(R_390_GOT16,	 0, 2, 16, false, 0, complain_overflow_bitfield,
84 	bfd_elf_generic_reloc, "R_390_GOT16",	 false, 0,0x0000ffff, false),
85   HOWTO(R_390_PC16,	 0, 2, 16,  true, 0, complain_overflow_bitfield,
86 	bfd_elf_generic_reloc, "R_390_PC16",	 false, 0,0x0000ffff, true),
87   HOWTO(R_390_PC16DBL,	 1, 2, 16,  true, 0, complain_overflow_bitfield,
88 	bfd_elf_generic_reloc, "R_390_PC16DBL",	 false, 0,0x0000ffff, true),
89   HOWTO(R_390_PLT16DBL,	 1, 2, 16,  true, 0, complain_overflow_bitfield,
90 	bfd_elf_generic_reloc, "R_390_PLT16DBL", false, 0,0x0000ffff, true),
91   HOWTO(R_390_PC32DBL,	 1, 4, 32,  true, 0, complain_overflow_bitfield,
92 	bfd_elf_generic_reloc, "R_390_PC32DBL",	 false, 0,0xffffffff, true),
93   HOWTO(R_390_PLT32DBL,	 1, 4, 32,  true, 0, complain_overflow_bitfield,
94 	bfd_elf_generic_reloc, "R_390_PLT32DBL", false, 0,0xffffffff, true),
95   HOWTO(R_390_GOTPCDBL,	 1, 4, 32,  true, 0, complain_overflow_bitfield,
96 	bfd_elf_generic_reloc, "R_390_GOTPCDBL", false, 0,0xffffffff, true),
97   EMPTY_HOWTO (R_390_64),	/* Empty entry for R_390_64.  */
98   EMPTY_HOWTO (R_390_PC64),	/* Empty entry for R_390_PC64.  */
99   EMPTY_HOWTO (R_390_GOT64),	/* Empty entry for R_390_GOT64.  */
100   EMPTY_HOWTO (R_390_PLT64),	/* Empty entry for R_390_PLT64.  */
101   HOWTO(R_390_GOTENT,	 1, 4, 32,  true, 0, complain_overflow_bitfield,
102 	bfd_elf_generic_reloc, "R_390_GOTENT",	 false, 0,0xffffffff, true),
103   HOWTO(R_390_GOTOFF16,	 0, 2, 16, false, 0, complain_overflow_bitfield,
104 	bfd_elf_generic_reloc, "R_390_GOTOFF16", false, 0,0x0000ffff, false),
105   EMPTY_HOWTO (R_390_GOTOFF64),	/* Empty entry for R_390_GOTOFF64.  */
106   HOWTO(R_390_GOTPLT12,	 0, 2, 12, false, 0, complain_overflow_dont,
107 	bfd_elf_generic_reloc, "R_390_GOTPLT12", false, 0,0x00000fff, false),
108   HOWTO(R_390_GOTPLT16,	 0, 2, 16, false, 0, complain_overflow_bitfield,
109 	bfd_elf_generic_reloc, "R_390_GOTPLT16", false, 0,0x0000ffff, false),
110   HOWTO(R_390_GOTPLT32,	 0, 4, 32, false, 0, complain_overflow_bitfield,
111 	bfd_elf_generic_reloc, "R_390_GOTPLT32", false, 0,0xffffffff, false),
112   EMPTY_HOWTO (R_390_GOTPLT64),	/* Empty entry for R_390_GOTPLT64.  */
113   HOWTO(R_390_GOTPLTENT, 1, 4, 32,  true, 0, complain_overflow_bitfield,
114 	bfd_elf_generic_reloc, "R_390_GOTPLTENT",false, 0,0xffffffff, true),
115   HOWTO(R_390_PLTOFF16,	 0, 2, 16, false, 0, complain_overflow_bitfield,
116 	bfd_elf_generic_reloc, "R_390_PLTOFF16", false, 0,0x0000ffff, false),
117   HOWTO(R_390_PLTOFF32,	 0, 4, 32, false, 0, complain_overflow_bitfield,
118 	bfd_elf_generic_reloc, "R_390_PLTOFF32", false, 0,0xffffffff, false),
119   EMPTY_HOWTO (R_390_PLTOFF64),	/* Empty entry for R_390_PLTOFF64.  */
120   HOWTO(R_390_TLS_LOAD, 0, 0, 0, false, 0, complain_overflow_dont,
121 	s390_tls_reloc, "R_390_TLS_LOAD", false, 0, 0, false),
122   HOWTO(R_390_TLS_GDCALL, 0, 0, 0, false, 0, complain_overflow_dont,
123 	s390_tls_reloc, "R_390_TLS_GDCALL", false, 0, 0, false),
124   HOWTO(R_390_TLS_LDCALL, 0, 0, 0, false, 0, complain_overflow_dont,
125 	s390_tls_reloc, "R_390_TLS_LDCALL", false, 0, 0, false),
126   HOWTO(R_390_TLS_GD32, 0, 4, 32, false, 0, complain_overflow_bitfield,
127 	bfd_elf_generic_reloc, "R_390_TLS_GD32", false, 0, 0xffffffff, false),
128   EMPTY_HOWTO (R_390_TLS_GD64),	/* Empty entry for R_390_TLS_GD64.  */
129   HOWTO(R_390_TLS_GOTIE12, 0, 2, 12, false, 0, complain_overflow_dont,
130 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", false, 0, 0x00000fff, false),
131   HOWTO(R_390_TLS_GOTIE32, 0, 4, 32, false, 0, complain_overflow_bitfield,
132 	bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", false, 0, 0xffffffff, false),
133   EMPTY_HOWTO (R_390_TLS_GOTIE64),	/* Empty entry for R_390_TLS_GOTIE64.  */
134   HOWTO(R_390_TLS_LDM32, 0, 4, 32, false, 0, complain_overflow_bitfield,
135 	bfd_elf_generic_reloc, "R_390_TLS_LDM32", false, 0, 0xffffffff, false),
136   EMPTY_HOWTO (R_390_TLS_LDM64),	/* Empty entry for R_390_TLS_LDM64.  */
137   HOWTO(R_390_TLS_IE32, 0, 4, 32, false, 0, complain_overflow_bitfield,
138 	bfd_elf_generic_reloc, "R_390_TLS_IE32", false, 0, 0xffffffff, false),
139   EMPTY_HOWTO (R_390_TLS_IE64),	/* Empty entry for R_390_TLS_IE64.  */
140   HOWTO(R_390_TLS_IEENT, 1, 4, 32, true, 0, complain_overflow_bitfield,
141 	bfd_elf_generic_reloc, "R_390_TLS_IEENT", false, 0, 0xffffffff, true),
142   HOWTO(R_390_TLS_LE32, 0, 4, 32, false, 0, complain_overflow_bitfield,
143 	bfd_elf_generic_reloc, "R_390_TLS_LE32", false, 0, 0xffffffff, false),
144   EMPTY_HOWTO (R_390_TLS_LE64),	/* Empty entry for R_390_TLS_LE64.  */
145   HOWTO(R_390_TLS_LDO32, 0, 4, 32, false, 0, complain_overflow_bitfield,
146 	bfd_elf_generic_reloc, "R_390_TLS_LDO32", false, 0, 0xffffffff, false),
147   EMPTY_HOWTO (R_390_TLS_LDO64),	/* Empty entry for R_390_TLS_LDO64.  */
148   HOWTO(R_390_TLS_DTPMOD, 0, 4, 32, false, 0, complain_overflow_bitfield,
149 	bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", false, 0, 0xffffffff, false),
150   HOWTO(R_390_TLS_DTPOFF, 0, 4, 32, false, 0, complain_overflow_bitfield,
151 	bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", false, 0, 0xffffffff, false),
152   HOWTO(R_390_TLS_TPOFF, 0, 4, 32, false, 0, complain_overflow_bitfield,
153 	bfd_elf_generic_reloc, "R_390_TLS_TPOFF", false, 0, 0xffffffff, false),
154   HOWTO(R_390_20,	 0, 4, 20, false, 8, complain_overflow_dont,
155 	s390_elf_ldisp_reloc, "R_390_20",      false, 0,0x0fffff00, false),
156   HOWTO(R_390_GOT20,	 0, 4, 20, false, 8, complain_overflow_dont,
157 	s390_elf_ldisp_reloc, "R_390_GOT20",   false, 0,0x0fffff00, false),
158   HOWTO(R_390_GOTPLT20,	 0, 4, 20, false, 8, complain_overflow_dont,
159 	s390_elf_ldisp_reloc, "R_390_GOTPLT20", false, 0,0x0fffff00, false),
160   HOWTO(R_390_TLS_GOTIE20, 0, 4, 20, false, 8, complain_overflow_dont,
161 	s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", false, 0,0x0fffff00, false),
162   HOWTO(R_390_IRELATIVE, 0, 4, 32, true, 0, complain_overflow_bitfield,
163 	bfd_elf_generic_reloc, "R_390_IRELATIVE", false, 0, 0xffffffff, false),
164   HOWTO(R_390_PC12DBL,	 1, 2, 12,  true, 0, complain_overflow_bitfield,
165 	bfd_elf_generic_reloc, "R_390_PC12DBL",	 false, 0,0x00000fff, true),
166   HOWTO(R_390_PLT12DBL,	 1, 2, 12,  true, 0, complain_overflow_bitfield,
167 	bfd_elf_generic_reloc, "R_390_PLT12DBL", false, 0,0x00000fff, true),
168   HOWTO(R_390_PC24DBL,	 1, 4, 24,  true, 0, complain_overflow_bitfield,
169 	bfd_elf_generic_reloc, "R_390_PC24DBL",	 false, 0,0x00ffffff, true),
170   HOWTO(R_390_PLT24DBL,	 1, 4, 24,  true, 0, complain_overflow_bitfield,
171 	bfd_elf_generic_reloc, "R_390_PLT24DBL", false, 0,0x00ffffff, true),
172 };
173 
174 /* GNU extension to record C++ vtable hierarchy.  */
175 static reloc_howto_type elf32_s390_vtinherit_howto =
176   HOWTO (R_390_GNU_VTINHERIT, 0,4,0,false,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", false,0, 0, false);
177 static reloc_howto_type elf32_s390_vtentry_howto =
178   HOWTO (R_390_GNU_VTENTRY, 0,4,0,false,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", false,0,0, false);
179 
180 static reloc_howto_type *
181 elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 			    bfd_reloc_code_real_type code)
183 {
184   switch (code)
185     {
186     case BFD_RELOC_NONE:
187       return &elf_howto_table[(int) R_390_NONE];
188     case BFD_RELOC_8:
189       return &elf_howto_table[(int) R_390_8];
190     case BFD_RELOC_390_12:
191       return &elf_howto_table[(int) R_390_12];
192     case BFD_RELOC_16:
193       return &elf_howto_table[(int) R_390_16];
194     case BFD_RELOC_32:
195       return &elf_howto_table[(int) R_390_32];
196     case BFD_RELOC_CTOR:
197       return &elf_howto_table[(int) R_390_32];
198     case BFD_RELOC_32_PCREL:
199       return &elf_howto_table[(int) R_390_PC32];
200     case BFD_RELOC_390_GOT12:
201       return &elf_howto_table[(int) R_390_GOT12];
202     case BFD_RELOC_32_GOT_PCREL:
203       return &elf_howto_table[(int) R_390_GOT32];
204     case BFD_RELOC_390_PLT32:
205       return &elf_howto_table[(int) R_390_PLT32];
206     case BFD_RELOC_390_COPY:
207       return &elf_howto_table[(int) R_390_COPY];
208     case BFD_RELOC_390_GLOB_DAT:
209       return &elf_howto_table[(int) R_390_GLOB_DAT];
210     case BFD_RELOC_390_JMP_SLOT:
211       return &elf_howto_table[(int) R_390_JMP_SLOT];
212     case BFD_RELOC_390_RELATIVE:
213       return &elf_howto_table[(int) R_390_RELATIVE];
214     case BFD_RELOC_32_GOTOFF:
215       return &elf_howto_table[(int) R_390_GOTOFF32];
216     case BFD_RELOC_390_GOTPC:
217       return &elf_howto_table[(int) R_390_GOTPC];
218     case BFD_RELOC_390_GOT16:
219       return &elf_howto_table[(int) R_390_GOT16];
220     case BFD_RELOC_16_PCREL:
221       return &elf_howto_table[(int) R_390_PC16];
222     case BFD_RELOC_390_PC12DBL:
223       return &elf_howto_table[(int) R_390_PC12DBL];
224     case BFD_RELOC_390_PLT12DBL:
225       return &elf_howto_table[(int) R_390_PLT12DBL];
226     case BFD_RELOC_390_PC16DBL:
227       return &elf_howto_table[(int) R_390_PC16DBL];
228     case BFD_RELOC_390_PLT16DBL:
229       return &elf_howto_table[(int) R_390_PLT16DBL];
230     case BFD_RELOC_390_PC24DBL:
231       return &elf_howto_table[(int) R_390_PC24DBL];
232     case BFD_RELOC_390_PLT24DBL:
233       return &elf_howto_table[(int) R_390_PLT24DBL];
234     case BFD_RELOC_390_PC32DBL:
235       return &elf_howto_table[(int) R_390_PC32DBL];
236     case BFD_RELOC_390_PLT32DBL:
237       return &elf_howto_table[(int) R_390_PLT32DBL];
238     case BFD_RELOC_390_GOTPCDBL:
239       return &elf_howto_table[(int) R_390_GOTPCDBL];
240     case BFD_RELOC_390_GOTENT:
241       return &elf_howto_table[(int) R_390_GOTENT];
242     case BFD_RELOC_16_GOTOFF:
243       return &elf_howto_table[(int) R_390_GOTOFF16];
244     case BFD_RELOC_390_GOTPLT12:
245       return &elf_howto_table[(int) R_390_GOTPLT12];
246     case BFD_RELOC_390_GOTPLT16:
247       return &elf_howto_table[(int) R_390_GOTPLT16];
248     case BFD_RELOC_390_GOTPLT32:
249       return &elf_howto_table[(int) R_390_GOTPLT32];
250     case BFD_RELOC_390_GOTPLTENT:
251       return &elf_howto_table[(int) R_390_GOTPLTENT];
252     case BFD_RELOC_390_PLTOFF16:
253       return &elf_howto_table[(int) R_390_PLTOFF16];
254     case BFD_RELOC_390_PLTOFF32:
255       return &elf_howto_table[(int) R_390_PLTOFF32];
256     case BFD_RELOC_390_TLS_LOAD:
257       return &elf_howto_table[(int) R_390_TLS_LOAD];
258     case BFD_RELOC_390_TLS_GDCALL:
259       return &elf_howto_table[(int) R_390_TLS_GDCALL];
260     case BFD_RELOC_390_TLS_LDCALL:
261       return &elf_howto_table[(int) R_390_TLS_LDCALL];
262     case BFD_RELOC_390_TLS_GD32:
263       return &elf_howto_table[(int) R_390_TLS_GD32];
264     case BFD_RELOC_390_TLS_GOTIE12:
265       return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266     case BFD_RELOC_390_TLS_GOTIE32:
267       return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268     case BFD_RELOC_390_TLS_LDM32:
269       return &elf_howto_table[(int) R_390_TLS_LDM32];
270     case BFD_RELOC_390_TLS_IE32:
271       return &elf_howto_table[(int) R_390_TLS_IE32];
272     case BFD_RELOC_390_TLS_IEENT:
273       return &elf_howto_table[(int) R_390_TLS_IEENT];
274     case BFD_RELOC_390_TLS_LE32:
275       return &elf_howto_table[(int) R_390_TLS_LE32];
276     case BFD_RELOC_390_TLS_LDO32:
277       return &elf_howto_table[(int) R_390_TLS_LDO32];
278     case BFD_RELOC_390_TLS_DTPMOD:
279       return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280     case BFD_RELOC_390_TLS_DTPOFF:
281       return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282     case BFD_RELOC_390_TLS_TPOFF:
283       return &elf_howto_table[(int) R_390_TLS_TPOFF];
284     case BFD_RELOC_390_20:
285       return &elf_howto_table[(int) R_390_20];
286     case BFD_RELOC_390_GOT20:
287       return &elf_howto_table[(int) R_390_GOT20];
288     case BFD_RELOC_390_GOTPLT20:
289       return &elf_howto_table[(int) R_390_GOTPLT20];
290     case BFD_RELOC_390_TLS_GOTIE20:
291       return &elf_howto_table[(int) R_390_TLS_GOTIE20];
292     case BFD_RELOC_390_IRELATIVE:
293       return &elf_howto_table[(int) R_390_IRELATIVE];
294     case BFD_RELOC_VTABLE_INHERIT:
295       return &elf32_s390_vtinherit_howto;
296     case BFD_RELOC_VTABLE_ENTRY:
297       return &elf32_s390_vtentry_howto;
298     default:
299       break;
300     }
301   return 0;
302 }
303 
304 static reloc_howto_type *
305 elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 			    const char *r_name)
307 {
308   unsigned int i;
309 
310   for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311     if (elf_howto_table[i].name != NULL
312 	&& strcasecmp (elf_howto_table[i].name, r_name) == 0)
313       return &elf_howto_table[i];
314 
315   if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316     return &elf32_s390_vtinherit_howto;
317   if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318     return &elf32_s390_vtentry_howto;
319 
320   return NULL;
321 }
322 
323 /* We need to use ELF32_R_TYPE so we have our own copy of this function,
324    and elf32-s390.c has its own copy.  */
325 
326 static bool
327 elf_s390_info_to_howto (bfd *abfd,
328 			arelent *cache_ptr,
329 			Elf_Internal_Rela *dst)
330 {
331   unsigned int r_type = ELF32_R_TYPE(dst->r_info);
332 
333   switch (r_type)
334     {
335     case R_390_GNU_VTINHERIT:
336       cache_ptr->howto = &elf32_s390_vtinherit_howto;
337       break;
338 
339     case R_390_GNU_VTENTRY:
340       cache_ptr->howto = &elf32_s390_vtentry_howto;
341       break;
342 
343     default:
344       if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
345 	{
346 	  /* xgettext:c-format */
347 	  _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
348 			      abfd, r_type);
349 	  bfd_set_error (bfd_error_bad_value);
350 	  return false;
351 	}
352       cache_ptr->howto = &elf_howto_table[r_type];
353     }
354 
355   return true;
356 }
357 
358 /* A relocation function which doesn't do anything.  */
359 static bfd_reloc_status_type
360 s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
361 		arelent *reloc_entry,
362 		asymbol *symbol ATTRIBUTE_UNUSED,
363 		void * data ATTRIBUTE_UNUSED,
364 		asection *input_section,
365 		bfd *output_bfd,
366 		char **error_message ATTRIBUTE_UNUSED)
367 {
368   if (output_bfd)
369     reloc_entry->address += input_section->output_offset;
370   return bfd_reloc_ok;
371 }
372 
373 /* Handle the large displacement relocs.  */
374 static bfd_reloc_status_type
375 s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
376 		      arelent *reloc_entry,
377 		      asymbol *symbol,
378 		      void * data ATTRIBUTE_UNUSED,
379 		      asection *input_section,
380 		      bfd *output_bfd,
381 		      char **error_message ATTRIBUTE_UNUSED)
382 {
383   reloc_howto_type *howto = reloc_entry->howto;
384   bfd_vma relocation;
385   bfd_vma insn;
386 
387   if (output_bfd != (bfd *) NULL
388       && (symbol->flags & BSF_SECTION_SYM) == 0
389       && (! howto->partial_inplace
390 	  || reloc_entry->addend == 0))
391     {
392       reloc_entry->address += input_section->output_offset;
393       return bfd_reloc_ok;
394     }
395 
396   if (output_bfd != NULL)
397     return bfd_reloc_continue;
398 
399   if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
400     return bfd_reloc_outofrange;
401 
402   relocation = (symbol->value
403 		+ symbol->section->output_section->vma
404 		+ symbol->section->output_offset);
405   relocation += reloc_entry->addend;
406   if (howto->pc_relative)
407     {
408       relocation -= (input_section->output_section->vma
409 		     + input_section->output_offset);
410       relocation -= reloc_entry->address;
411     }
412 
413   insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
414   insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
415   bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
416 
417   if ((bfd_signed_vma) relocation < - 0x80000
418       || (bfd_signed_vma) relocation > 0x7ffff)
419     return bfd_reloc_overflow;
420   else
421     return bfd_reloc_ok;
422 }
423 
424 static bool
425 elf_s390_is_local_label_name (bfd *abfd, const char *name)
426 {
427   if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
428     return true;
429 
430   return _bfd_elf_is_local_label_name (abfd, name);
431 }
432 
433 /* Functions for the 390 ELF linker.  */
434 
435 /* The name of the dynamic interpreter.  This is put in the .interp
436    section.  */
437 
438 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
439 
440 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
441    copying dynamic variables from a shared lib into an app's dynbss
442    section, and instead use a dynamic relocation to point into the
443    shared lib.  */
444 #define ELIMINATE_COPY_RELOCS 1
445 
446 /* The size in bytes of the first entry in the procedure linkage table.  */
447 #define PLT_FIRST_ENTRY_SIZE 32
448 /* The size in bytes of an entry in the procedure linkage table.  */
449 #define PLT_ENTRY_SIZE 32
450 
451 #define GOT_ENTRY_SIZE 4
452 
453 #define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
454 
455 /* The first three entries in a procedure linkage table are reserved,
456    and the initial contents are unimportant (we zero them out).
457    Subsequent entries look like this.  See the SVR4 ABI 386
458    supplement to see how this works.  */
459 
460 /* For the s390, simple addr offset can only be 0 - 4096.
461    To use the full 2 GB address space, several instructions
462    are needed to load an address in a register and execute
463    a branch( or just saving the address)
464 
465    Furthermore, only r 0 and 1 are free to use!!!  */
466 
467 /* The first 3 words in the GOT are then reserved.
468    Word 0 is the address of the dynamic table.
469    Word 1 is a pointer to a structure describing the object
470    Word 2 is used to point to the loader entry address.
471 
472    The code for position independent PLT entries looks like this:
473 
474    r12 holds addr of the current GOT at entry to the PLT
475 
476    The GOT holds the address in the PLT to be executed.
477    The loader then gets:
478    24(15) =  Pointer to the structure describing the object.
479    28(15) =  Offset into rela.plt
480 
481    The loader  must  then find the module where the function is
482    and insert the address in the GOT.
483 
484   Note: 390 can only address +- 64 K relative.
485 	We check if offset > 65536, then make a relative branch -64xxx
486 	back to a previous defined branch
487 
488 PLT1: BASR 1,0	       # 2 bytes
489       L	   1,22(1)     # 4 bytes  Load offset in GOT in r 1
490       L	   1,(1,12)    # 4 bytes  Load address from GOT in r1
491       BCR  15,1	       # 2 bytes  Jump to address
492 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
493       L	   1,14(1)     # 4 bytes  Load offset in symol table in r1
494       BRC  15,-x       # 4 bytes  Jump to start of PLT
495       .word 0	       # 2 bytes filler
496       .long ?	       # 4 bytes  offset in GOT
497       .long ?	       # 4 bytes  offset into rela.plt
498 
499   This was the general case. There are two additional, optimizes PLT
500   definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
501   First the one for GOT offsets < 4096:
502 
503 PLT1: L	   1,<offset>(12) # 4 bytes  Load address from GOT in R1
504       BCR  15,1		  # 2 bytes  Jump to address
505       .word 0,0,0	  # 6 bytes  filler
506 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
507       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
508       BRC  15,-x	  # 4 bytes  Jump to start of PLT
509       .word 0,0,0	  # 6 bytes  filler
510       .long ?		  # 4 bytes  offset into rela.plt
511 
512   Second the one for GOT offsets < 32768:
513 
514 PLT1: LHI  1,<offset>	  # 4 bytes  Load offset in GOT to r1
515       L	   1,(1,12)	  # 4 bytes  Load address from GOT to r1
516       BCR  15,1		  # 2 bytes  Jump to address
517       .word 0		  # 2 bytes  filler
518 RET1: BASR 1,0		  # 2 bytes  Return from GOT 1st time
519       L	   1,14(1)	  # 4 bytes  Load offset in rela.plt in r1
520       BRC  15,-x	  # 4 bytes  Jump to start of PLT
521       .word 0,0,0	  # 6 bytes  filler
522       .long ?		  # 4 bytes  offset into rela.plt
523 
524 Total = 32 bytes per PLT entry
525 
526    The code for static build PLT entries looks like this:
527 
528 PLT1: BASR 1,0	       # 2 bytes
529       L	   1,22(1)     # 4 bytes  Load address of GOT entry
530       L	   1,0(0,1)    # 4 bytes  Load address from GOT in r1
531       BCR  15,1	       # 2 bytes  Jump to address
532 RET1: BASR 1,0	       # 2 bytes  Return from GOT 1st time
533       L	   1,14(1)     # 4 bytes  Load offset in symbol table in r1
534       BRC  15,-x       # 4 bytes  Jump to start of PLT
535       .word 0	       # 2 bytes  filler
536       .long ?	       # 4 bytes  address of GOT entry
537       .long ?	       # 4 bytes  offset into rela.plt  */
538 
539 static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
540   {
541     0x0d, 0x10,				    /* basr    %r1,%r0	   */
542     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1) */
543     0x58, 0x10, 0x10, 0x00,		    /* l       %r1,0(%r1)  */
544     0x07, 0xf1,				    /* br      %r1	   */
545     0x0d, 0x10,				    /* basr    %r1,%r0	   */
546     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1) */
547     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt   */
548     0x00, 0x00,				    /* padding		   */
549     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	   */
550     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	   */
551   };
552 
553 /* Generic PLT pic entry.  */
554 static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
555   {
556     0x0d, 0x10,				    /* basr    %r1,%r0	       */
557     0x58, 0x10, 0x10, 0x16,		    /* l       %r1,22(%r1)     */
558     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
559     0x07, 0xf1,				    /* br      %r1	       */
560     0x0d, 0x10,				    /* basr    %r1,%r0	       */
561     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
562     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
563     0x00, 0x00,				    /* padding		       */
564     0x00, 0x00, 0x00, 0x00,		    /* GOT offset	       */
565     0x00, 0x00, 0x00, 0x00		    /* rela.plt offset	       */
566   };
567 
568 /* Optimized PLT pic entry for GOT offset < 4k.  xx will be replaced
569    when generating the PLT slot with the GOT offset.  */
570 static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
571   {
572     0x58, 0x10, 0xc0, 0x00,		    /* l       %r1,xx(%r12) */
573     0x07, 0xf1,				    /* br      %r1	    */
574     0x00, 0x00, 0x00, 0x00,		    /* padding		    */
575     0x00, 0x00,
576     0x0d, 0x10,				    /* basr    %r1,%r0	    */
577     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)  */
578     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt    */
579     0x00, 0x00, 0x00, 0x00,
580     0x00, 0x00, 0x00, 0x00
581   };
582 
583 /* Optimized PLT pic entry for GOT offset < 32k.  xx will be replaced
584    when generating the PLT slot with the GOT offset.  */
585 static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
586   {
587     0xa7, 0x18, 0x00, 0x00,		    /* lhi     %r1,xx	       */
588     0x58, 0x11, 0xc0, 0x00,		    /* l       %r1,0(%r1,%r12) */
589     0x07, 0xf1,				    /* br      %r1	       */
590     0x00, 0x00,
591     0x0d, 0x10,				    /* basr    %r1,%r0	       */
592     0x58, 0x10, 0x10, 0x0e,		    /* l       %r1,14(%r1)     */
593     0xa7, 0xf4, 0x00, 0x00,		    /* j       first plt       */
594     0x00, 0x00, 0x00, 0x00,
595     0x00, 0x00, 0x00, 0x00,
596     0x00, 0x00
597   };
598 
599 /* The first PLT entry pushes the offset into the rela.plt
600    from R1 onto the stack at 8(15) and the loader object info
601    at 12(15), loads the loader address in R1 and jumps to it.  */
602 
603 /* The first entry in the PLT for PIC code:
604 
605 PLT0:
606    ST	1,28(15)  # R1 has offset into rela.plt
607    L	1,4(12)	  # Get loader ino(object struct address)
608    ST	1,24(15)  # Store address
609    L	1,8(12)	  # Entry address of loader in R1
610    BR	1	  # Jump to loader
611 
612    The first entry in the PLT for static code:
613 
614 PLT0:
615    ST	1,28(15)      # R1 has offset into rela.plt
616    BASR 1,0
617    L	1,18(0,1)     # Get address of GOT
618    MVC	24(4,15),4(1) # Move loader ino to stack
619    L	1,8(1)	      # Get address of loader
620    BR	1	      # Jump to loader
621    .word 0	      # filler
622    .long got	      # address of GOT  */
623 
624 static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
625   {
626     0x50, 0x10, 0xf0, 0x1c,		      /* st	 %r1,28(%r15)	   */
627     0x0d, 0x10,				      /* basr	 %r1,%r0	   */
628     0x58, 0x10, 0x10, 0x12,		      /* l	 %r1,18(%r1)	   */
629     0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04,	      /* mvc	 24(4,%r15),4(%r1) */
630     0x58, 0x10, 0x10, 0x08,		      /* l	 %r1,8(%r1)	   */
631     0x07, 0xf1,				      /* br	 %r1		   */
632     0x00, 0x00, 0x00, 0x00,
633     0x00, 0x00, 0x00, 0x00,
634     0x00, 0x00
635   };
636 
637 static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
638   {
639     0x50, 0x10, 0xf0, 0x1c,			/* st	   %r1,28(%r15)	 */
640     0x58, 0x10, 0xc0, 0x04,			/* l	   %r1,4(%r12)	 */
641     0x50, 0x10, 0xf0, 0x18,			/* st	   %r1,24(%r15)	 */
642     0x58, 0x10, 0xc0, 0x08,			/* l	   %r1,8(%r12)	 */
643     0x07, 0xf1,					/* br	   %r1		 */
644     0x00, 0x00, 0x00, 0x00,
645     0x00, 0x00, 0x00, 0x00,
646     0x00, 0x00, 0x00, 0x00,
647     0x00, 0x00
648   };
649 
650 
651 /* s390 ELF linker hash entry.  */
652 
653 struct elf_s390_link_hash_entry
654 {
655   struct elf_link_hash_entry elf;
656 
657   /* Number of GOTPLT references for a function.  */
658   bfd_signed_vma gotplt_refcount;
659 
660 #define GOT_UNKNOWN	0
661 #define GOT_NORMAL	1
662 #define GOT_TLS_GD	2
663 #define GOT_TLS_IE	3
664 #define GOT_TLS_IE_NLT	4
665   unsigned char tls_type;
666 
667   /* For pointer equality reasons we might need to change the symbol
668      type from STT_GNU_IFUNC to STT_FUNC together with its value and
669      section entry.  So after alloc_dynrelocs only these values should
670      be used.  In order to check whether a symbol is IFUNC use
671      s390_is_ifunc_symbol_p.  */
672   bfd_vma ifunc_resolver_address;
673   asection *ifunc_resolver_section;
674 };
675 
676 #define elf_s390_hash_entry(ent) \
677   ((struct elf_s390_link_hash_entry *)(ent))
678 
679 /* This structure represents an entry in the local PLT list needed for
680    local IFUNC symbols.  */
681 struct plt_entry
682 {
683   /* The section of the local symbol.
684      Set in relocate_section and used in finish_dynamic_sections.  */
685   asection *sec;
686 
687   union
688   {
689     bfd_signed_vma refcount;
690     bfd_vma offset;
691   } plt;
692 };
693 
694 /* NOTE: Keep this structure in sync with
695    the one declared in elf64-s390.c.  */
696 struct elf_s390_obj_tdata
697 {
698   struct elf_obj_tdata root;
699 
700   /* A local PLT is needed for ifunc symbols.  */
701   struct plt_entry *local_plt;
702 
703   /* TLS type for each local got entry.  */
704   char *local_got_tls_type;
705 };
706 
707 #define elf_s390_tdata(abfd) \
708   ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
709 
710 #define elf_s390_local_plt(abfd)		\
711   (elf_s390_tdata (abfd)->local_plt)
712 
713 #define elf_s390_local_got_tls_type(abfd) \
714   (elf_s390_tdata (abfd)->local_got_tls_type)
715 
716 #define is_s390_elf(bfd) \
717   (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
718    && elf_tdata (bfd) != NULL \
719    && elf_object_id (bfd) == S390_ELF_DATA)
720 
721 static bool
722 elf_s390_mkobject (bfd *abfd)
723 {
724   return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
725 				  S390_ELF_DATA);
726 }
727 
728 static bool
729 elf_s390_object_p (bfd *abfd)
730 {
731   /* Set the right machine number for an s390 elf32 file.  */
732   return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
733 }
734 
735 /* s390 ELF linker hash table.  */
736 
737 struct elf_s390_link_hash_table
738 {
739   struct elf_link_hash_table elf;
740 
741   /* Short-cuts to get to dynamic linker sections.  */
742   asection *irelifunc;
743 
744   union
745   {
746     bfd_signed_vma refcount;
747     bfd_vma offset;
748   } tls_ldm_got;
749 };
750 
751 /* Get the s390 ELF linker hash table from a link_info structure.  */
752 
753 #define elf_s390_hash_table(p) \
754   ((is_elf_hash_table ((p)->hash)					\
755     && elf_hash_table_id (elf_hash_table (p)) == S390_ELF_DATA)		\
756    ? (struct elf_s390_link_hash_table *) (p)->hash : NULL)
757 
758 #undef ELF64
759 #include "elf-s390-common.c"
760 
761 /* Create an entry in an s390 ELF linker hash table.  */
762 
763 static struct bfd_hash_entry *
764 link_hash_newfunc (struct bfd_hash_entry *entry,
765 		   struct bfd_hash_table *table,
766 		   const char *string)
767 {
768   /* Allocate the structure if it has not already been allocated by a
769      subclass.  */
770   if (entry == NULL)
771     {
772       entry = bfd_hash_allocate (table,
773 				 sizeof (struct elf_s390_link_hash_entry));
774       if (entry == NULL)
775 	return entry;
776     }
777 
778   /* Call the allocation method of the superclass.  */
779   entry = _bfd_elf_link_hash_newfunc (entry, table, string);
780   if (entry != NULL)
781     {
782       struct elf_s390_link_hash_entry *eh;
783 
784       eh = (struct elf_s390_link_hash_entry *) entry;
785       eh->gotplt_refcount = 0;
786       eh->tls_type = GOT_UNKNOWN;
787       eh->ifunc_resolver_address = 0;
788       eh->ifunc_resolver_section = NULL;
789     }
790 
791   return entry;
792 }
793 
794 /* Create an s390 ELF linker hash table.  */
795 
796 static struct bfd_link_hash_table *
797 elf_s390_link_hash_table_create (bfd *abfd)
798 {
799   struct elf_s390_link_hash_table *ret;
800   size_t amt = sizeof (struct elf_s390_link_hash_table);
801 
802   ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
803   if (ret == NULL)
804     return NULL;
805 
806   if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
807 				      sizeof (struct elf_s390_link_hash_entry),
808 				      S390_ELF_DATA))
809     {
810       free (ret);
811       return NULL;
812     }
813 
814   return &ret->elf.root;
815 }
816 
817 /* Copy the extra info we tack onto an elf_link_hash_entry.  */
818 
819 static void
820 elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
821 			       struct elf_link_hash_entry *dir,
822 			       struct elf_link_hash_entry *ind)
823 {
824   struct elf_s390_link_hash_entry *edir, *eind;
825 
826   edir = (struct elf_s390_link_hash_entry *) dir;
827   eind = (struct elf_s390_link_hash_entry *) ind;
828 
829   if (ind->root.type == bfd_link_hash_indirect
830       && dir->got.refcount <= 0)
831     {
832       edir->tls_type = eind->tls_type;
833       eind->tls_type = GOT_UNKNOWN;
834     }
835 
836   if (ELIMINATE_COPY_RELOCS
837       && ind->root.type != bfd_link_hash_indirect
838       && dir->dynamic_adjusted)
839     {
840       /* If called to transfer flags for a weakdef during processing
841 	 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
842 	 We clear it ourselves for ELIMINATE_COPY_RELOCS.  */
843       if (dir->versioned != versioned_hidden)
844 	dir->ref_dynamic |= ind->ref_dynamic;
845       dir->ref_regular |= ind->ref_regular;
846       dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
847       dir->needs_plt |= ind->needs_plt;
848     }
849   else
850     _bfd_elf_link_hash_copy_indirect (info, dir, ind);
851 }
852 
853 static int
854 elf_s390_tls_transition (struct bfd_link_info *info,
855 			 int r_type,
856 			 int is_local)
857 {
858   if (bfd_link_pic (info))
859     return r_type;
860 
861   switch (r_type)
862     {
863     case R_390_TLS_GD32:
864     case R_390_TLS_IE32:
865       if (is_local)
866 	return R_390_TLS_LE32;
867       return R_390_TLS_IE32;
868     case R_390_TLS_GOTIE32:
869       if (is_local)
870 	return R_390_TLS_LE32;
871       return R_390_TLS_GOTIE32;
872     case R_390_TLS_LDM32:
873       return R_390_TLS_LE32;
874     }
875 
876   return r_type;
877 }
878 
879 /* Look through the relocs for a section during the first phase, and
880    allocate space in the global offset table or procedure linkage
881    table.  */
882 
883 static bool
884 elf_s390_check_relocs (bfd *abfd,
885 		       struct bfd_link_info *info,
886 		       asection *sec,
887 		       const Elf_Internal_Rela *relocs)
888 {
889   struct elf_s390_link_hash_table *htab;
890   Elf_Internal_Shdr *symtab_hdr;
891   struct elf_link_hash_entry **sym_hashes;
892   const Elf_Internal_Rela *rel;
893   const Elf_Internal_Rela *rel_end;
894   asection *sreloc;
895   bfd_signed_vma *local_got_refcounts;
896   int tls_type, old_tls_type;
897   Elf_Internal_Sym *isym;
898 
899   if (bfd_link_relocatable (info))
900     return true;
901 
902   BFD_ASSERT (is_s390_elf (abfd));
903 
904   htab = elf_s390_hash_table (info);
905   symtab_hdr = &elf_symtab_hdr (abfd);
906   sym_hashes = elf_sym_hashes (abfd);
907   local_got_refcounts = elf_local_got_refcounts (abfd);
908 
909   sreloc = NULL;
910 
911   rel_end = relocs + sec->reloc_count;
912   for (rel = relocs; rel < rel_end; rel++)
913     {
914       unsigned int r_type;
915       unsigned int r_symndx;
916       struct elf_link_hash_entry *h;
917 
918       r_symndx = ELF32_R_SYM (rel->r_info);
919 
920       if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
921 	{
922 	  /* xgettext:c-format */
923 	  _bfd_error_handler (_("%pB: bad symbol index: %d"),
924 			      abfd, r_symndx);
925 	  return false;
926 	}
927 
928       if (r_symndx < symtab_hdr->sh_info)
929 	{
930 	  /* A local symbol.  */
931 	  isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
932 					abfd, r_symndx);
933 	  if (isym == NULL)
934 	    return false;
935 
936 	  if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
937 	    {
938 	      struct plt_entry *plt;
939 
940 	      if (htab->elf.dynobj == NULL)
941 		htab->elf.dynobj = abfd;
942 
943 	      if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
944 		return false;
945 
946 	      if (local_got_refcounts == NULL)
947 		{
948 		  if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
949 		    return false;
950 		  local_got_refcounts = elf_local_got_refcounts (abfd);
951 		}
952 	      plt = elf_s390_local_plt (abfd);
953 	      plt[r_symndx].plt.refcount++;
954 	    }
955 	  h = NULL;
956 	}
957       else
958 	{
959 	  h = sym_hashes[r_symndx - symtab_hdr->sh_info];
960 	  while (h->root.type == bfd_link_hash_indirect
961 		 || h->root.type == bfd_link_hash_warning)
962 	    h = (struct elf_link_hash_entry *) h->root.u.i.link;
963 	}
964 
965       /* Create got section and local_got_refcounts array if they
966 	 are needed.  */
967       r_type = elf_s390_tls_transition (info,
968 					ELF32_R_TYPE (rel->r_info),
969 					h == NULL);
970       switch (r_type)
971 	{
972 	case R_390_GOT12:
973 	case R_390_GOT16:
974 	case R_390_GOT20:
975 	case R_390_GOT32:
976 	case R_390_GOTENT:
977 	case R_390_GOTPLT12:
978 	case R_390_GOTPLT16:
979 	case R_390_GOTPLT20:
980 	case R_390_GOTPLT32:
981 	case R_390_GOTPLTENT:
982 	case R_390_TLS_GD32:
983 	case R_390_TLS_GOTIE12:
984 	case R_390_TLS_GOTIE20:
985 	case R_390_TLS_GOTIE32:
986 	case R_390_TLS_IEENT:
987 	case R_390_TLS_IE32:
988 	case R_390_TLS_LDM32:
989 	  if (h == NULL
990 	      && local_got_refcounts == NULL)
991 	    {
992 	      if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
993 		return false;
994 	      local_got_refcounts = elf_local_got_refcounts (abfd);
995 	    }
996 	  /* Fall through.  */
997 	case R_390_GOTOFF16:
998 	case R_390_GOTOFF32:
999 	case R_390_GOTPC:
1000 	case R_390_GOTPCDBL:
1001 	  if (htab->elf.sgot == NULL)
1002 	    {
1003 	      if (htab->elf.dynobj == NULL)
1004 		htab->elf.dynobj = abfd;
1005 	      if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
1006 		return false;
1007 	    }
1008 	}
1009 
1010       if (h != NULL)
1011 	{
1012 	  if (htab->elf.dynobj == NULL)
1013 	    htab->elf.dynobj = abfd;
1014 	  if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1015 	    return false;
1016 
1017 	  /* Make sure an IFUNC symbol defined in a non-shared object
1018 	     always gets a PLT slot.  */
1019 	  if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1020 	    {
1021 	      /* The symbol is called by the dynamic loader in order
1022 		 to resolve the relocation.  So it is in fact also
1023 		 referenced.  */
1024 	      h->ref_regular = 1;
1025 	      h->needs_plt = 1;
1026 	    }
1027 	}
1028       switch (r_type)
1029 	{
1030 	case R_390_GOTPC:
1031 	case R_390_GOTPCDBL:
1032 	  /* These relocs do not need a GOT slot.  They just load the
1033 	     GOT pointer itself or address something else relative to
1034 	     the GOT.  Since the GOT pointer has been set up above we
1035 	     are done.  */
1036 	  break;
1037 	case R_390_GOTOFF16:
1038 	case R_390_GOTOFF32:
1039 	  if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1040 	    break;
1041 	  /* Fall through.  */
1042 
1043 	case R_390_PLT12DBL:
1044 	case R_390_PLT16DBL:
1045 	case R_390_PLT24DBL:
1046 	case R_390_PLT32DBL:
1047 	case R_390_PLT32:
1048 	case R_390_PLTOFF16:
1049 	case R_390_PLTOFF32:
1050 	  /* This symbol requires a procedure linkage table entry.  We
1051 	     actually build the entry in adjust_dynamic_symbol,
1052 	     because this might be a case of linking PIC code which is
1053 	     never referenced by a dynamic object, in which case we
1054 	     don't need to generate a procedure linkage table entry
1055 	     after all.  */
1056 
1057 	  /* If this is a local symbol, we resolve it directly without
1058 	     creating a procedure linkage table entry.  */
1059 	  if (h != NULL)
1060 	    {
1061 	      h->needs_plt = 1;
1062 	      h->plt.refcount += 1;
1063 	    }
1064 	  break;
1065 
1066 	case R_390_GOTPLT12:
1067 	case R_390_GOTPLT16:
1068 	case R_390_GOTPLT20:
1069 	case R_390_GOTPLT32:
1070 	case R_390_GOTPLTENT:
1071 	  /* This symbol requires either a procedure linkage table entry
1072 	     or an entry in the local got. We actually build the entry
1073 	     in adjust_dynamic_symbol because whether this is really a
1074 	     global reference can change and with it the fact if we have
1075 	     to create a plt entry or a local got entry. To be able to
1076 	     make a once global symbol a local one we have to keep track
1077 	     of the number of gotplt references that exist for this
1078 	     symbol.  */
1079 	  if (h != NULL)
1080 	    {
1081 	      ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
1082 	      h->needs_plt = 1;
1083 	      h->plt.refcount += 1;
1084 	    }
1085 	  else
1086 	    local_got_refcounts[r_symndx] += 1;
1087 	  break;
1088 
1089 	case R_390_TLS_LDM32:
1090 	  htab->tls_ldm_got.refcount += 1;
1091 	  break;
1092 
1093 	case R_390_TLS_IE32:
1094 	case R_390_TLS_GOTIE12:
1095 	case R_390_TLS_GOTIE20:
1096 	case R_390_TLS_GOTIE32:
1097 	case R_390_TLS_IEENT:
1098 	  if (bfd_link_pic (info))
1099 	    info->flags |= DF_STATIC_TLS;
1100 	  /* Fall through.  */
1101 
1102 	case R_390_GOT12:
1103 	case R_390_GOT16:
1104 	case R_390_GOT20:
1105 	case R_390_GOT32:
1106 	case R_390_GOTENT:
1107 	case R_390_TLS_GD32:
1108 	  /* This symbol requires a global offset table entry.  */
1109 	  switch (r_type)
1110 	    {
1111 	    default:
1112 	    case R_390_GOT12:
1113 	    case R_390_GOT16:
1114 	    case R_390_GOT20:
1115 	    case R_390_GOT32:
1116 	    case R_390_GOTENT:
1117 	      tls_type = GOT_NORMAL;
1118 	      break;
1119 	    case R_390_TLS_GD32:
1120 	      tls_type = GOT_TLS_GD;
1121 	      break;
1122 	    case R_390_TLS_IE32:
1123 	    case R_390_TLS_GOTIE32:
1124 	      tls_type = GOT_TLS_IE;
1125 	      break;
1126 	    case R_390_TLS_GOTIE12:
1127 	    case R_390_TLS_GOTIE20:
1128 	    case R_390_TLS_IEENT:
1129 	      tls_type = GOT_TLS_IE_NLT;
1130 	      break;
1131 	    }
1132 
1133 	  if (h != NULL)
1134 	    {
1135 	      h->got.refcount += 1;
1136 	      old_tls_type = elf_s390_hash_entry(h)->tls_type;
1137 	    }
1138 	  else
1139 	    {
1140 	      local_got_refcounts[r_symndx] += 1;
1141 	      old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1142 	    }
1143 	  /* If a TLS symbol is accessed using IE at least once,
1144 	     there is no point to use dynamic model for it.  */
1145 	  if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1146 	    {
1147 	      if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1148 		{
1149 		  _bfd_error_handler
1150 		    /* xgettext:c-format */
1151 		    (_("%pB: `%s' accessed both as normal and thread local symbol"),
1152 		     abfd, h->root.root.string);
1153 		  return false;
1154 		}
1155 	      if (old_tls_type > tls_type)
1156 		tls_type = old_tls_type;
1157 	    }
1158 
1159 	  if (old_tls_type != tls_type)
1160 	    {
1161 	      if (h != NULL)
1162 		elf_s390_hash_entry (h)->tls_type = tls_type;
1163 	      else
1164 		elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1165 	    }
1166 
1167 	  if (r_type != R_390_TLS_IE32)
1168 	    break;
1169 	  /* Fall through.  */
1170 
1171 	case R_390_TLS_LE32:
1172 	  /* For static linking and executables this reloc will be
1173 	     calculated at linktime otherwise a TLS_TPOFF runtime
1174 	     reloc will be generated.  */
1175 	  if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
1176 	    break;
1177 
1178 	  if (!bfd_link_pic (info))
1179 	    break;
1180 	  info->flags |= DF_STATIC_TLS;
1181 	  /* Fall through.  */
1182 
1183 	case R_390_8:
1184 	case R_390_16:
1185 	case R_390_32:
1186 	case R_390_PC16:
1187 	case R_390_PC12DBL:
1188 	case R_390_PC16DBL:
1189 	case R_390_PC24DBL:
1190 	case R_390_PC32DBL:
1191 	case R_390_PC32:
1192 	  if (h != NULL && bfd_link_executable (info))
1193 	    {
1194 	      /* If this reloc is in a read-only section, we might
1195 		 need a copy reloc.  We can't check reliably at this
1196 		 stage whether the section is read-only, as input
1197 		 sections have not yet been mapped to output sections.
1198 		 Tentatively set the flag for now, and correct in
1199 		 adjust_dynamic_symbol.  */
1200 	      h->non_got_ref = 1;
1201 
1202 	      if (!bfd_link_pic (info))
1203 		{
1204 		  /* We may need a .plt entry if the function this reloc
1205 		     refers to is in a shared lib.  */
1206 		  h->plt.refcount += 1;
1207 		}
1208 	    }
1209 
1210 	  /* If we are creating a shared library, and this is a reloc
1211 	     against a global symbol, or a non PC relative reloc
1212 	     against a local symbol, then we need to copy the reloc
1213 	     into the shared library.  However, if we are linking with
1214 	     -Bsymbolic, we do not need to copy a reloc against a
1215 	     global symbol which is defined in an object we are
1216 	     including in the link (i.e., DEF_REGULAR is set).  At
1217 	     this point we have not seen all the input files, so it is
1218 	     possible that DEF_REGULAR is not set now but will be set
1219 	     later (it is never cleared).  In case of a weak definition,
1220 	     DEF_REGULAR may be cleared later by a strong definition in
1221 	     a shared library. We account for that possibility below by
1222 	     storing information in the relocs_copied field of the hash
1223 	     table entry.  A similar situation occurs when creating
1224 	     shared libraries and symbol visibility changes render the
1225 	     symbol local.
1226 
1227 	     If on the other hand, we are creating an executable, we
1228 	     may need to keep relocations for symbols satisfied by a
1229 	     dynamic library if we manage to avoid copy relocs for the
1230 	     symbol.  */
1231 	  if ((bfd_link_pic (info)
1232 	       && (sec->flags & SEC_ALLOC) != 0
1233 	       && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
1234 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
1235 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
1236 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
1237 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
1238 		    && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1239 		   || (h != NULL
1240 		       && (! SYMBOLIC_BIND (info, h)
1241 			   || h->root.type == bfd_link_hash_defweak
1242 			   || !h->def_regular))))
1243 	      || (ELIMINATE_COPY_RELOCS
1244 		  && !bfd_link_pic (info)
1245 		  && (sec->flags & SEC_ALLOC) != 0
1246 		  && h != NULL
1247 		  && (h->root.type == bfd_link_hash_defweak
1248 		      || !h->def_regular)))
1249 	    {
1250 	      struct elf_dyn_relocs *p;
1251 	      struct elf_dyn_relocs **head;
1252 
1253 	      /* We must copy these reloc types into the output file.
1254 		 Create a reloc section in dynobj and make room for
1255 		 this reloc.  */
1256 	      if (sreloc == NULL)
1257 		{
1258 		  if (htab->elf.dynobj == NULL)
1259 		    htab->elf.dynobj = abfd;
1260 
1261 		  sreloc = _bfd_elf_make_dynamic_reloc_section
1262 		    (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ true);
1263 
1264 		  if (sreloc == NULL)
1265 		    return false;
1266 		}
1267 
1268 	      /* If this is a global symbol, we count the number of
1269 		 relocations we need for this symbol.  */
1270 	      if (h != NULL)
1271 		{
1272 		  head = &h->dyn_relocs;
1273 		}
1274 	      else
1275 		{
1276 		  /* Track dynamic relocs needed for local syms too.
1277 		     We really need local syms available to do this
1278 		     easily.  Oh well.  */
1279 		  asection *s;
1280 		  void *vpp;
1281 
1282 		  isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
1283 						abfd, r_symndx);
1284 		  if (isym == NULL)
1285 		    return false;
1286 
1287 		  s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1288 		  if (s == NULL)
1289 		    s = sec;
1290 
1291 		  vpp = &elf_section_data (s)->local_dynrel;
1292 		  head = (struct elf_dyn_relocs **) vpp;
1293 		}
1294 
1295 	      p = *head;
1296 	      if (p == NULL || p->sec != sec)
1297 		{
1298 		  size_t amt = sizeof *p;
1299 
1300 		  p = ((struct elf_dyn_relocs *)
1301 		       bfd_alloc (htab->elf.dynobj, amt));
1302 		  if (p == NULL)
1303 		    return false;
1304 		  p->next = *head;
1305 		  *head = p;
1306 		  p->sec = sec;
1307 		  p->count = 0;
1308 		  p->pc_count = 0;
1309 		}
1310 
1311 	      p->count += 1;
1312 	      if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
1313 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
1314 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
1315 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
1316 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
1317 		  || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1318 		p->pc_count += 1;
1319 	    }
1320 	  break;
1321 
1322 	  /* This relocation describes the C++ object vtable hierarchy.
1323 	     Reconstruct it for later use during GC.  */
1324 	case R_390_GNU_VTINHERIT:
1325 	  if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
1326 	    return false;
1327 	  break;
1328 
1329 	  /* This relocation describes which C++ vtable entries are actually
1330 	     used.  Record for later use during GC.  */
1331 	case R_390_GNU_VTENTRY:
1332 	  if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
1333 	    return false;
1334 	  break;
1335 
1336 	default:
1337 	  break;
1338 	}
1339     }
1340 
1341   return true;
1342 }
1343 
1344 /* Return the section that should be marked against GC for a given
1345    relocation.  */
1346 
1347 static asection *
1348 elf_s390_gc_mark_hook (asection *sec,
1349 		       struct bfd_link_info *info,
1350 		       Elf_Internal_Rela *rel,
1351 		       struct elf_link_hash_entry *h,
1352 		       Elf_Internal_Sym *sym)
1353 {
1354   if (h != NULL)
1355     switch (ELF32_R_TYPE (rel->r_info))
1356       {
1357       case R_390_GNU_VTINHERIT:
1358       case R_390_GNU_VTENTRY:
1359 	return NULL;
1360       }
1361   return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
1362 
1363 }
1364 
1365 /* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1366    entry but we found we will not create any.  Called when we find we will
1367    not have any PLT for this symbol, by for example
1368    elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1369    or elf_s390_late_size_sections if no dynamic sections will be
1370    created (we're only linking static objects).  */
1371 
1372 static void
1373 elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
1374 {
1375   if (h->elf.root.type == bfd_link_hash_warning)
1376     h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1377 
1378   if (h->gotplt_refcount <= 0)
1379     return;
1380 
1381   /* We simply add the number of gotplt references to the number
1382    * of got references for this symbol.  */
1383   h->elf.got.refcount += h->gotplt_refcount;
1384   h->gotplt_refcount = -1;
1385 }
1386 
1387 /* Adjust a symbol defined by a dynamic object and referenced by a
1388    regular object.  The current definition is in some section of the
1389    dynamic object, but we're not including those sections.  We have to
1390    change the definition to something the rest of the link can
1391    understand.  */
1392 
1393 static bool
1394 elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1395 				struct elf_link_hash_entry *h)
1396 {
1397   struct elf_s390_link_hash_table *htab;
1398   asection *s, *srel;
1399 
1400   /* STT_GNU_IFUNC symbol must go through PLT. */
1401   if (s390_is_ifunc_symbol_p (h))
1402     {
1403       /* All local STT_GNU_IFUNC references must be treated as local
1404 	 calls via local PLT.  */
1405       if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1406 	{
1407 	  bfd_size_type pc_count = 0, count = 0;
1408 	  struct elf_dyn_relocs **pp;
1409 	  struct elf_dyn_relocs *p;
1410 
1411 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1412 	    {
1413 	      pc_count += p->pc_count;
1414 	      p->count -= p->pc_count;
1415 	      p->pc_count = 0;
1416 	      count += p->count;
1417 	      if (p->count == 0)
1418 		*pp = p->next;
1419 	      else
1420 		pp = &p->next;
1421 	    }
1422 
1423 	  if (pc_count || count)
1424 	    {
1425 	      h->needs_plt = 1;
1426 	      h->non_got_ref = 1;
1427 	      if (h->plt.refcount <= 0)
1428 		h->plt.refcount = 1;
1429 	      else
1430 		h->plt.refcount += 1;
1431 	    }
1432 	}
1433 
1434       if (h->plt.refcount <= 0)
1435 	{
1436 	  h->plt.offset = (bfd_vma) -1;
1437 	  h->needs_plt = 0;
1438 	}
1439       return true;
1440     }
1441 
1442   /* If this is a function, put it in the procedure linkage table.  We
1443      will fill in the contents of the procedure linkage table later
1444      (although we could actually do it here).  */
1445   if (h->type == STT_FUNC
1446       || h->needs_plt)
1447     {
1448       if (h->plt.refcount <= 0
1449 	  || SYMBOL_CALLS_LOCAL (info, h)
1450 	  || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1451 	{
1452 	  /* This case can occur if we saw a PLT32 reloc in an input
1453 	     file, but the symbol was never referred to by a dynamic
1454 	     object, or if all references were garbage collected.  In
1455 	     such a case, we don't actually need to build a procedure
1456 	     linkage table, and we can just do a PC32 reloc instead.  */
1457 	  h->plt.offset = (bfd_vma) -1;
1458 	  h->needs_plt = 0;
1459 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1460 	}
1461 
1462       return true;
1463     }
1464   else
1465     /* It's possible that we incorrectly decided a .plt reloc was
1466        needed for an R_390_PC32 reloc to a non-function sym in
1467        check_relocs.  We can't decide accurately between function and
1468        non-function syms in check-relocs;  Objects loaded later in
1469        the link may change h->type.  So fix it now.  */
1470     h->plt.offset = (bfd_vma) -1;
1471 
1472   /* If this is a weak symbol, and there is a real definition, the
1473      processor independent code will have arranged for us to see the
1474      real definition first, and we can just use the same value.  */
1475   if (h->is_weakalias)
1476     {
1477       struct elf_link_hash_entry *def = weakdef (h);
1478       BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1479       h->root.u.def.section = def->root.u.def.section;
1480       h->root.u.def.value = def->root.u.def.value;
1481       if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
1482 	h->non_got_ref = def->non_got_ref;
1483       return true;
1484     }
1485 
1486   /* This is a reference to a symbol defined by a dynamic object which
1487      is not a function.  */
1488 
1489   /* If we are creating a shared library, we must presume that the
1490      only references to the symbol are via the global offset table.
1491      For such cases we need not do anything here; the relocations will
1492      be handled correctly by relocate_section.  */
1493   if (bfd_link_pic (info))
1494     return true;
1495 
1496   /* If there are no references to this symbol that do not use the
1497      GOT, we don't need to generate a copy reloc.  */
1498   if (!h->non_got_ref)
1499     return true;
1500 
1501   /* If -z nocopyreloc was given, we won't generate them either.  */
1502   if (info->nocopyreloc)
1503     {
1504       h->non_got_ref = 0;
1505       return true;
1506     }
1507 
1508   /* If we don't find any dynamic relocs in read-only sections, then
1509      we'll be keeping the dynamic relocs and avoiding the copy reloc.  */
1510   if (ELIMINATE_COPY_RELOCS && !_bfd_elf_readonly_dynrelocs (h))
1511     {
1512       h->non_got_ref = 0;
1513       return true;
1514     }
1515 
1516   /* We must allocate the symbol in our .dynbss section, which will
1517      become part of the .bss section of the executable.  There will be
1518      an entry for this symbol in the .dynsym section.  The dynamic
1519      object will contain position independent code, so all references
1520      from the dynamic object to this symbol will go through the global
1521      offset table.  The dynamic linker will use the .dynsym entry to
1522      determine the address it must put in the global offset table, so
1523      both the dynamic object and the regular object will refer to the
1524      same memory location for the variable.  */
1525 
1526   htab = elf_s390_hash_table (info);
1527 
1528   /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1529      copy the initial value out of the dynamic object and into the
1530      runtime process image.  */
1531   if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1532     {
1533       s = htab->elf.sdynrelro;
1534       srel = htab->elf.sreldynrelro;
1535     }
1536   else
1537     {
1538       s = htab->elf.sdynbss;
1539       srel = htab->elf.srelbss;
1540     }
1541   if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
1542     {
1543       srel->size += sizeof (Elf32_External_Rela);
1544       h->needs_copy = 1;
1545     }
1546 
1547   return _bfd_elf_adjust_dynamic_copy (info, h, s);
1548 }
1549 
1550 /* Allocate space in .plt, .got and associated reloc sections for
1551    dynamic relocs.  */
1552 
1553 static bool
1554 allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
1555 {
1556   struct bfd_link_info *info;
1557   struct elf_s390_link_hash_table *htab;
1558   struct elf_dyn_relocs *p;
1559 
1560   if (h->root.type == bfd_link_hash_indirect)
1561     return true;
1562 
1563   info = (struct bfd_link_info *) inf;
1564   htab = elf_s390_hash_table (info);
1565 
1566   /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1567      here if it is defined and referenced in a non-shared object.  */
1568   if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1569     return s390_elf_allocate_ifunc_dyn_relocs (info, h);
1570   else if (htab->elf.dynamic_sections_created
1571 	   && h->plt.refcount > 0)
1572     {
1573       /* Make sure this symbol is output as a dynamic symbol.
1574 	 Undefined weak syms won't yet be marked as dynamic.  */
1575       if (h->dynindx == -1
1576 	  && !h->forced_local)
1577 	{
1578 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1579 	    return false;
1580 	}
1581 
1582       if (bfd_link_pic (info)
1583 	  || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
1584 	{
1585 	  asection *s = htab->elf.splt;
1586 
1587 	  /* If this is the first .plt entry, make room for the special
1588 	     first entry.  */
1589 	  if (s->size == 0)
1590 	    s->size += PLT_FIRST_ENTRY_SIZE;
1591 
1592 	  h->plt.offset = s->size;
1593 
1594 	  /* If this symbol is not defined in a regular file, and we are
1595 	     not generating a shared library, then set the symbol to this
1596 	     location in the .plt.  This is required to make function
1597 	     pointers compare as equal between the normal executable and
1598 	     the shared library.  */
1599 	  if (! bfd_link_pic (info)
1600 	      && !h->def_regular)
1601 	    {
1602 	      h->root.u.def.section = s;
1603 	      h->root.u.def.value = h->plt.offset;
1604 	    }
1605 
1606 	  /* Make room for this entry.  */
1607 	  s->size += PLT_ENTRY_SIZE;
1608 
1609 	  /* We also need to make an entry in the .got.plt section, which
1610 	     will be placed in the .got section by the linker script.  */
1611 	  htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
1612 
1613 	  /* We also need to make an entry in the .rela.plt section.  */
1614 	  htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
1615 	}
1616       else
1617 	{
1618 	  h->plt.offset = (bfd_vma) -1;
1619 	  h->needs_plt = 0;
1620 	  elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1621 	}
1622     }
1623   else
1624     {
1625       h->plt.offset = (bfd_vma) -1;
1626       h->needs_plt = 0;
1627       elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
1628     }
1629 
1630   /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1631      the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1632      to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1633      we can save the dynamic TLS relocation.  */
1634   if (h->got.refcount > 0
1635       && !bfd_link_pic (info)
1636       && h->dynindx == -1
1637       && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1638     {
1639       if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1640 	/* For the GOTIE access without a literal pool entry the offset has
1641 	   to be stored somewhere. The immediate value in the instruction
1642 	   is not bit enough so the value is stored in the got.  */
1643 	{
1644 	  h->got.offset = htab->elf.sgot->size;
1645 	  htab->elf.sgot->size += GOT_ENTRY_SIZE;
1646 	}
1647       else
1648 	h->got.offset = (bfd_vma) -1;
1649     }
1650   else if (h->got.refcount > 0)
1651     {
1652       asection *s;
1653       bool dyn;
1654       int tls_type = elf_s390_hash_entry(h)->tls_type;
1655 
1656       /* Make sure this symbol is output as a dynamic symbol.
1657 	 Undefined weak syms won't yet be marked as dynamic.  */
1658       if (h->dynindx == -1
1659 	  && !h->forced_local)
1660 	{
1661 	  if (! bfd_elf_link_record_dynamic_symbol (info, h))
1662 	    return false;
1663 	}
1664 
1665       s = htab->elf.sgot;
1666       h->got.offset = s->size;
1667       s->size += GOT_ENTRY_SIZE;
1668       /* R_390_TLS_GD32 needs 2 consecutive GOT slots.  */
1669       if (tls_type == GOT_TLS_GD)
1670 	s->size += GOT_ENTRY_SIZE;
1671       dyn = htab->elf.dynamic_sections_created;
1672       /* R_390_TLS_IE32 needs one dynamic relocation,
1673 	 R_390_TLS_GD32 needs one if local symbol and two if global.  */
1674       if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1675 	  || tls_type >= GOT_TLS_IE)
1676 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1677       else if (tls_type == GOT_TLS_GD)
1678 	htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
1679       else if (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
1680 	       && (bfd_link_pic (info)
1681 		   || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
1682 	htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1683     }
1684   else
1685     h->got.offset = (bfd_vma) -1;
1686 
1687   if (h->dyn_relocs == NULL)
1688     return true;
1689 
1690   /* In the shared -Bsymbolic case, discard space allocated for
1691      dynamic pc-relative relocs against symbols which turn out to be
1692      defined in regular objects.  For the normal shared case, discard
1693      space for pc-relative relocs that have become local due to symbol
1694      visibility changes.  */
1695 
1696   if (bfd_link_pic (info))
1697     {
1698       if (SYMBOL_CALLS_LOCAL (info, h))
1699 	{
1700 	  struct elf_dyn_relocs **pp;
1701 
1702 	  for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
1703 	    {
1704 	      p->count -= p->pc_count;
1705 	      p->pc_count = 0;
1706 	      if (p->count == 0)
1707 		*pp = p->next;
1708 	      else
1709 		pp = &p->next;
1710 	    }
1711 	}
1712 
1713       /* Also discard relocs on undefined weak syms with non-default
1714 	 visibility.  */
1715       if (h->dyn_relocs != NULL
1716 	  && h->root.type == bfd_link_hash_undefweak)
1717 	{
1718 	  if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1719 	      || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
1720 	    h->dyn_relocs = NULL;
1721 
1722 	  /* Make sure undefined weak symbols are output as a dynamic
1723 	     symbol in PIEs.  */
1724 	  else if (h->dynindx == -1
1725 		   && !h->forced_local)
1726 	    {
1727 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1728 		return false;
1729 	    }
1730 	}
1731     }
1732   else if (ELIMINATE_COPY_RELOCS)
1733     {
1734       /* For the non-shared case, discard space for relocs against
1735 	 symbols which turn out to need copy relocs or are not
1736 	 dynamic.  */
1737 
1738       if (!h->non_got_ref
1739 	  && ((h->def_dynamic
1740 	       && !h->def_regular)
1741 	      || (htab->elf.dynamic_sections_created
1742 		  && (h->root.type == bfd_link_hash_undefweak
1743 		      || h->root.type == bfd_link_hash_undefined))))
1744 	{
1745 	  /* Make sure this symbol is output as a dynamic symbol.
1746 	     Undefined weak syms won't yet be marked as dynamic.  */
1747 	  if (h->dynindx == -1
1748 	      && !h->forced_local)
1749 	    {
1750 	      if (! bfd_elf_link_record_dynamic_symbol (info, h))
1751 		return false;
1752 	    }
1753 
1754 	  /* If that succeeded, we know we'll be keeping all the
1755 	     relocs.  */
1756 	  if (h->dynindx != -1)
1757 	    goto keep;
1758 	}
1759 
1760       h->dyn_relocs = NULL;
1761 
1762     keep: ;
1763     }
1764 
1765   /* Finally, allocate space.  */
1766   for (p = h->dyn_relocs; p != NULL; p = p->next)
1767     {
1768       asection *sreloc = elf_section_data (p->sec)->sreloc;
1769 
1770       sreloc->size += p->count * sizeof (Elf32_External_Rela);
1771     }
1772 
1773   return true;
1774 }
1775 
1776 /* Set the sizes of the dynamic sections.  */
1777 
1778 static bool
1779 elf_s390_late_size_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1780 			     struct bfd_link_info *info)
1781 {
1782   struct elf_s390_link_hash_table *htab;
1783   bfd *dynobj;
1784   asection *s;
1785   bool relocs;
1786   bfd *ibfd;
1787 
1788   htab = elf_s390_hash_table (info);
1789   dynobj = htab->elf.dynobj;
1790   if (dynobj == NULL)
1791     return true;
1792 
1793   if (htab->elf.dynamic_sections_created)
1794     {
1795       /* Set the contents of the .interp section to the interpreter.  */
1796       if (bfd_link_executable (info) && !info->nointerp)
1797 	{
1798 	  s = bfd_get_linker_section (dynobj, ".interp");
1799 	  if (s == NULL)
1800 	    abort ();
1801 	  s->size = sizeof ELF_DYNAMIC_INTERPRETER;
1802 	  s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1803 	}
1804     }
1805 
1806   /* Set up .got offsets for local syms, and space for local dynamic
1807      relocs.  */
1808   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
1809     {
1810       bfd_signed_vma *local_got;
1811       bfd_signed_vma *end_local_got;
1812       char *local_tls_type;
1813       bfd_size_type locsymcount;
1814       Elf_Internal_Shdr *symtab_hdr;
1815       asection *srela;
1816       struct plt_entry *local_plt;
1817       unsigned int i;
1818 
1819       if (! is_s390_elf (ibfd))
1820 	continue;
1821 
1822       for (s = ibfd->sections; s != NULL; s = s->next)
1823 	{
1824 	  struct elf_dyn_relocs *p;
1825 
1826 	  for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
1827 	    {
1828 	      if (!bfd_is_abs_section (p->sec)
1829 		  && bfd_is_abs_section (p->sec->output_section))
1830 		{
1831 		  /* Input section has been discarded, either because
1832 		     it is a copy of a linkonce section or due to
1833 		     linker script /DISCARD/, so we'll be discarding
1834 		     the relocs too.  */
1835 		}
1836 	      else if (p->count != 0)
1837 		{
1838 		  srela = elf_section_data (p->sec)->sreloc;
1839 		  srela->size += p->count * sizeof (Elf32_External_Rela);
1840 		  if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1841 		    info->flags |= DF_TEXTREL;
1842 		}
1843 	    }
1844 	}
1845 
1846       local_got = elf_local_got_refcounts (ibfd);
1847       if (!local_got)
1848 	continue;
1849 
1850       symtab_hdr = &elf_symtab_hdr (ibfd);
1851       locsymcount = symtab_hdr->sh_info;
1852       end_local_got = local_got + locsymcount;
1853       local_tls_type = elf_s390_local_got_tls_type (ibfd);
1854       s = htab->elf.sgot;
1855       srela = htab->elf.srelgot;
1856       for (; local_got < end_local_got; ++local_got, ++local_tls_type)
1857 	{
1858 	  if (*local_got > 0)
1859 	    {
1860 	      *local_got = s->size;
1861 	      s->size += GOT_ENTRY_SIZE;
1862 	      if (*local_tls_type == GOT_TLS_GD)
1863 		s->size += GOT_ENTRY_SIZE;
1864 	      if (bfd_link_pic (info))
1865 		srela->size += sizeof (Elf32_External_Rela);
1866 	    }
1867 	  else
1868 	    *local_got = (bfd_vma) -1;
1869 	}
1870       local_plt = elf_s390_local_plt (ibfd);
1871       for (i = 0; i < symtab_hdr->sh_info; i++)
1872 	{
1873 	  if (local_plt[i].plt.refcount > 0)
1874 	    {
1875 	      local_plt[i].plt.offset = htab->elf.iplt->size;
1876 	      htab->elf.iplt->size += PLT_ENTRY_SIZE;
1877 	      htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1878 	      htab->elf.irelplt->size += RELA_ENTRY_SIZE;
1879 	    }
1880 	  else
1881 	    local_plt[i].plt.offset = (bfd_vma) -1;
1882 	}
1883     }
1884 
1885   if (htab->tls_ldm_got.refcount > 0)
1886     {
1887       /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
1888 	 relocs.  */
1889       htab->tls_ldm_got.offset = htab->elf.sgot->size;
1890       htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1891       htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
1892     }
1893   else
1894     htab->tls_ldm_got.offset = -1;
1895 
1896   /* Allocate global sym .plt and .got entries, and space for global
1897      sym dynamic relocs.  */
1898   elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
1899 
1900   /* We now have determined the sizes of the various dynamic sections.
1901      Allocate memory for them.  */
1902   relocs = false;
1903   for (s = dynobj->sections; s != NULL; s = s->next)
1904     {
1905       if ((s->flags & SEC_LINKER_CREATED) == 0)
1906 	continue;
1907 
1908       if (s == htab->elf.splt
1909 	  || s == htab->elf.sgot
1910 	  || s == htab->elf.sgotplt
1911 	  || s == htab->elf.sdynbss
1912 	  || s == htab->elf.sdynrelro
1913 	  || s == htab->elf.iplt
1914 	  || s == htab->elf.igotplt
1915 	  || s == htab->irelifunc)
1916 	{
1917 	  /* Strip this section if we don't need it; see the
1918 	     comment below.  */
1919 	}
1920       else if (startswith (bfd_section_name (s), ".rela"))
1921 	{
1922 	  if (s->size != 0)
1923 	    relocs = true;
1924 
1925 	  /* We use the reloc_count field as a counter if we need
1926 	     to copy relocs into the output file.  */
1927 	  s->reloc_count = 0;
1928 	}
1929       else
1930 	{
1931 	  /* It's not one of our sections, so don't allocate space.  */
1932 	  continue;
1933 	}
1934 
1935       if (s->size == 0)
1936 	{
1937 	  /* If we don't need this section, strip it from the
1938 	     output file.  This is to handle .rela.bss and
1939 	     .rela.plt.  We must create it in
1940 	     create_dynamic_sections, because it must be created
1941 	     before the linker maps input sections to output
1942 	     sections.  The linker does that before
1943 	     adjust_dynamic_symbol is called, and it is that
1944 	     function which decides whether anything needs to go
1945 	     into these sections.  */
1946 
1947 	  s->flags |= SEC_EXCLUDE;
1948 	  continue;
1949 	}
1950 
1951       if ((s->flags & SEC_HAS_CONTENTS) == 0)
1952 	continue;
1953 
1954       /* Allocate memory for the section contents.  We use bfd_zalloc
1955 	 here in case unused entries are not reclaimed before the
1956 	 section's contents are written out.  This should not happen,
1957 	 but this way if it does, we get a R_390_NONE reloc instead
1958 	 of garbage.  */
1959       s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
1960       if (s->contents == NULL)
1961 	return false;
1962     }
1963 
1964   return _bfd_elf_add_dynamic_tags (output_bfd, info, relocs);
1965 }
1966 
1967 /* Return the base VMA address which should be subtracted from real addresses
1968    when resolving @dtpoff relocation.
1969    This is PT_TLS segment p_vaddr.  */
1970 
1971 static bfd_vma
1972 dtpoff_base (struct bfd_link_info *info)
1973 {
1974   /* If tls_sec is NULL, we should have signalled an error already.  */
1975   if (elf_hash_table (info)->tls_sec == NULL)
1976     return 0;
1977   return elf_hash_table (info)->tls_sec->vma;
1978 }
1979 
1980 /* Return the relocation value for @tpoff relocation
1981    if STT_TLS virtual address is ADDRESS.  */
1982 
1983 static bfd_vma
1984 tpoff (struct bfd_link_info *info, bfd_vma address)
1985 {
1986   struct elf_link_hash_table *htab = elf_hash_table (info);
1987 
1988   /* If tls_sec is NULL, we should have signalled an error already.  */
1989   if (htab->tls_sec == NULL)
1990     return 0;
1991   return htab->tls_size + htab->tls_sec->vma - address;
1992 }
1993 
1994 /* Complain if TLS instruction relocation is against an invalid
1995    instruction.  */
1996 
1997 static void
1998 invalid_tls_insn (bfd *input_bfd,
1999 		  asection *input_section,
2000 		  Elf_Internal_Rela *rel)
2001 {
2002   reloc_howto_type *howto;
2003 
2004   howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
2005   _bfd_error_handler
2006     /* xgettext:c-format */
2007     (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
2008      input_bfd,
2009      input_section,
2010      (uint64_t) rel->r_offset,
2011      howto->name);
2012   bfd_set_error (bfd_error_bad_value);
2013 }
2014 
2015 /* Relocate a 390 ELF section.  */
2016 
2017 static int
2018 elf_s390_relocate_section (bfd *output_bfd,
2019 			   struct bfd_link_info *info,
2020 			   bfd *input_bfd,
2021 			   asection *input_section,
2022 			   bfd_byte *contents,
2023 			   Elf_Internal_Rela *relocs,
2024 			   Elf_Internal_Sym *local_syms,
2025 			   asection **local_sections)
2026 {
2027   struct elf_s390_link_hash_table *htab;
2028   Elf_Internal_Shdr *symtab_hdr;
2029   struct elf_link_hash_entry **sym_hashes;
2030   bfd_vma *local_got_offsets;
2031   Elf_Internal_Rela *rel;
2032   Elf_Internal_Rela *relend;
2033 
2034   if (!is_s390_elf (input_bfd))
2035     {
2036       bfd_set_error (bfd_error_wrong_format);
2037       return false;
2038     }
2039 
2040   htab = elf_s390_hash_table (info);
2041   symtab_hdr = &elf_symtab_hdr (input_bfd);
2042   sym_hashes = elf_sym_hashes (input_bfd);
2043   local_got_offsets = elf_local_got_offsets (input_bfd);
2044 
2045   rel = relocs;
2046   relend = relocs + input_section->reloc_count;
2047   for (; rel < relend; rel++)
2048     {
2049       unsigned int r_type;
2050       reloc_howto_type *howto;
2051       unsigned long r_symndx;
2052       struct elf_link_hash_entry *h;
2053       Elf_Internal_Sym *sym;
2054       asection *sec;
2055       bfd_vma off;
2056       bfd_vma relocation;
2057       bool unresolved_reloc;
2058       bfd_reloc_status_type r;
2059       int tls_type;
2060       asection *base_got = htab->elf.sgot;
2061       bool resolved_to_zero;
2062 
2063       r_type = ELF32_R_TYPE (rel->r_info);
2064       if (r_type == (int) R_390_GNU_VTINHERIT
2065 	  || r_type == (int) R_390_GNU_VTENTRY)
2066 	continue;
2067       if (r_type >= (int) R_390_max)
2068 	{
2069 	  bfd_set_error (bfd_error_bad_value);
2070 	  return false;
2071 	}
2072 
2073       howto = elf_howto_table + r_type;
2074       r_symndx = ELF32_R_SYM (rel->r_info);
2075 
2076       h = NULL;
2077       sym = NULL;
2078       sec = NULL;
2079       unresolved_reloc = false;
2080       if (r_symndx < symtab_hdr->sh_info)
2081 	{
2082 	  sym = local_syms + r_symndx;
2083 	  sec = local_sections[r_symndx];
2084 	  if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2085 	    {
2086 	      struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2087 	      if (local_plt == NULL)
2088 		return false;
2089 
2090 	      /* Address of the PLT slot.  */
2091 	      relocation = (htab->elf.iplt->output_section->vma
2092 			    + htab->elf.iplt->output_offset
2093 			    + local_plt[r_symndx].plt.offset);
2094 
2095 	      switch (r_type)
2096 		{
2097 		case R_390_PLTOFF16:
2098 		case R_390_PLTOFF32:
2099 		  relocation -= htab->elf.sgot->output_section->vma;
2100 		  break;
2101 		case R_390_GOTPLT12:
2102 		case R_390_GOTPLT16:
2103 		case R_390_GOTPLT20:
2104 		case R_390_GOTPLT32:
2105 		case R_390_GOTPLTENT:
2106 		case R_390_GOT12:
2107 		case R_390_GOT16:
2108 		case R_390_GOT20:
2109 		case R_390_GOT32:
2110 		case R_390_GOTENT:
2111 		  {
2112 		    /* Write the PLT slot address into the GOT slot.  */
2113 		    bfd_put_32 (output_bfd, relocation,
2114 				htab->elf.sgot->contents +
2115 				local_got_offsets[r_symndx]);
2116 		    relocation = (local_got_offsets[r_symndx] +
2117 				  htab->elf.sgot->output_offset);
2118 
2119 		    if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2120 		      relocation += htab->elf.sgot->output_section->vma;
2121 		    break;
2122 		  }
2123 		default:
2124 		  break;
2125 		}
2126 	      /* The output section is needed later in
2127 		 finish_dynamic_section when creating the dynamic
2128 		 relocation.  */
2129 	      local_plt[r_symndx].sec = sec;
2130 	      goto do_relocation;
2131 	    }
2132 	  else
2133 	    relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
2134 	}
2135       else
2136 	{
2137 	  bool warned ATTRIBUTE_UNUSED;
2138 	  bool ignored ATTRIBUTE_UNUSED;
2139 
2140 	  RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2141 				   r_symndx, symtab_hdr, sym_hashes,
2142 				   h, sec, relocation,
2143 				   unresolved_reloc, warned, ignored);
2144 	}
2145 
2146       if (sec != NULL && discarded_section (sec))
2147 	RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
2148 					 rel, 1, relend, howto, 0, contents);
2149 
2150       if (bfd_link_relocatable (info))
2151 	continue;
2152 
2153       resolved_to_zero = (h != NULL
2154 			  && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2155 
2156       switch (r_type)
2157 	{
2158 	case R_390_GOTPLT12:
2159 	case R_390_GOTPLT16:
2160 	case R_390_GOTPLT20:
2161 	case R_390_GOTPLT32:
2162 	case R_390_GOTPLTENT:
2163 	  /* There are three cases for a GOTPLT relocation. 1) The
2164 	     relocation is against the jump slot entry of a plt that
2165 	     will get emitted to the output file. 2) The relocation
2166 	     is against the jump slot of a plt entry that has been
2167 	     removed. elf_s390_adjust_gotplt has created a GOT entry
2168 	     as replacement. 3) The relocation is against a local symbol.
2169 	     Cases 2) and 3) are the same as the GOT relocation code
2170 	     so we just have to test for case 1 and fall through for
2171 	     the other two.  */
2172 	  if (h != NULL && h->plt.offset != (bfd_vma) -1)
2173 	    {
2174 	      bfd_vma plt_index;
2175 
2176 	      if (s390_is_ifunc_symbol_p (h))
2177 		{
2178 		  plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2179 		  relocation = (plt_index * GOT_ENTRY_SIZE +
2180 				htab->elf.igotplt->output_offset);
2181 		  if (r_type == R_390_GOTPLTENT)
2182 		    relocation += htab->elf.igotplt->output_section->vma;
2183 		}
2184 	      else
2185 		{
2186 		  /* Calc. index no.
2187 		     Current offset - size first entry / entry size.  */
2188 		  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2189 		    PLT_ENTRY_SIZE;
2190 
2191 		  /* Offset in GOT is PLT index plus GOT headers(3)
2192 		     times 4, addr & GOT addr.  */
2193 		  relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2194 		  if (r_type == R_390_GOTPLTENT)
2195 		    relocation += htab->elf.sgot->output_section->vma;
2196 		}
2197 	      unresolved_reloc = false;
2198 
2199 	    }
2200 	  /* Fall through.  */
2201 
2202 	case R_390_GOT12:
2203 	case R_390_GOT16:
2204 	case R_390_GOT20:
2205 	case R_390_GOT32:
2206 	case R_390_GOTENT:
2207 	  /* Relocation is to the entry for this symbol in the global
2208 	     offset table.  */
2209 	  if (base_got == NULL)
2210 	    abort ();
2211 
2212 	  if (h != NULL)
2213 	    {
2214 	      bool dyn;
2215 
2216 	      off = h->got.offset;
2217 	      dyn = htab->elf.dynamic_sections_created;
2218 
2219 	      if (s390_is_ifunc_symbol_p (h))
2220 		{
2221 		  BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2222 		  if (off == (bfd_vma)-1)
2223 		    {
2224 		      /* No explicit GOT usage so redirect to the
2225 			 got.iplt slot.  */
2226 		      base_got = htab->elf.igotplt;
2227 		      off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2228 		    }
2229 		  else
2230 		    {
2231 		      /* Explicit GOT slots must contain the address
2232 			 of the PLT slot. This will be handled in
2233 			 finish_dynamic_symbol.  */
2234 		    }
2235 		}
2236 	      else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2237 							  bfd_link_pic (info),
2238 							  h)
2239 		       || (bfd_link_pic (info)
2240 			   && SYMBOL_REFERENCES_LOCAL (info, h))
2241 		       || resolved_to_zero)
2242 		{
2243 		  /* This is actually a static link, or it is a
2244 		     -Bsymbolic link and the symbol is defined
2245 		     locally, or the symbol was forced to be local
2246 		     because of a version file.  We must initialize
2247 		     this entry in the global offset table.  Since the
2248 		     offset must always be a multiple of 2, we use the
2249 		     least significant bit to record whether we have
2250 		     initialized it already.
2251 
2252 		     When doing a dynamic link, we create a .rel.got
2253 		     relocation entry to initialize the value.  This
2254 		     is done in the finish_dynamic_symbol routine.  */
2255 		  if ((off & 1) != 0)
2256 		    off &= ~1;
2257 		  else
2258 		    {
2259 		      bfd_put_32 (output_bfd, relocation,
2260 				  base_got->contents + off);
2261 		      h->got.offset |= 1;
2262 		    }
2263 
2264 		  if ((h->def_regular
2265 		       && bfd_link_pic (info)
2266 		       && SYMBOL_REFERENCES_LOCAL (info, h))
2267 		      /* lrl rx,sym@GOTENT -> larl rx, sym */
2268 		      && ((r_type == R_390_GOTENT
2269 			   && (bfd_get_16 (input_bfd,
2270 					   contents + rel->r_offset - 2)
2271 			       & 0xff0f) == 0xc40d)
2272 			  /* ly rx, sym@GOT(r12) -> larl rx, sym */
2273 			  || (r_type == R_390_GOT20
2274 			      && (bfd_get_32 (input_bfd,
2275 					      contents + rel->r_offset - 2)
2276 				  & 0xff00f000) == 0xe300c000
2277 			      && bfd_get_8 (input_bfd,
2278 					    contents + rel->r_offset + 3) == 0x58)))
2279 		    {
2280 		      unsigned short new_insn =
2281 			(0xc000 | (bfd_get_8 (input_bfd,
2282 					      contents + rel->r_offset - 1) & 0xf0));
2283 		      bfd_put_16 (output_bfd, new_insn,
2284 				  contents + rel->r_offset - 2);
2285 		      r_type = R_390_PC32DBL;
2286 		      rel->r_addend = 2;
2287 		      howto = elf_howto_table + r_type;
2288 		      relocation = h->root.u.def.value
2289 			+ h->root.u.def.section->output_section->vma
2290 			+ h->root.u.def.section->output_offset;
2291 		      goto do_relocation;
2292 		    }
2293 		}
2294 	      else
2295 		unresolved_reloc = false;
2296 	    }
2297 	  else
2298 	    {
2299 	      if (local_got_offsets == NULL)
2300 		abort ();
2301 
2302 	      off = local_got_offsets[r_symndx];
2303 
2304 	      /* The offset must always be a multiple of 4.  We use
2305 		 the least significant bit to record whether we have
2306 		 already generated the necessary reloc.  */
2307 	      if ((off & 1) != 0)
2308 		off &= ~1;
2309 	      else
2310 		{
2311 		  bfd_put_32 (output_bfd, relocation,
2312 			      htab->elf.sgot->contents + off);
2313 
2314 		  if (bfd_link_pic (info))
2315 		    {
2316 		      asection *srelgot;
2317 		      Elf_Internal_Rela outrel;
2318 		      bfd_byte *loc;
2319 
2320 		      srelgot = htab->elf.srelgot;
2321 		      if (srelgot == NULL)
2322 			abort ();
2323 
2324 		      outrel.r_offset = (htab->elf.sgot->output_section->vma
2325 					 + htab->elf.sgot->output_offset
2326 					 + off);
2327 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2328 		      outrel.r_addend = relocation;
2329 		      loc = srelgot->contents;
2330 		      loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
2331 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2332 		    }
2333 
2334 		  local_got_offsets[r_symndx] |= 1;
2335 		}
2336 	    }
2337 
2338 	  if (off >= (bfd_vma) -2)
2339 	    abort ();
2340 
2341 	  relocation = base_got->output_offset + off;
2342 
2343 	  /* For @GOTENT the relocation is against the offset between
2344 	     the instruction and the symbols entry in the GOT and not
2345 	     between the start of the GOT and the symbols entry. We
2346 	     add the vma of the GOT to get the correct value.  */
2347 	  if (   r_type == R_390_GOTENT
2348 	      || r_type == R_390_GOTPLTENT)
2349 	    relocation += base_got->output_section->vma;
2350 
2351 	  break;
2352 
2353 	case R_390_GOTOFF16:
2354 	case R_390_GOTOFF32:
2355 	  /* Relocation is relative to the start of the global offset
2356 	     table.  */
2357 
2358 	  if (h != NULL
2359 	      && s390_is_ifunc_symbol_p (h)
2360 	      && h->def_regular
2361 	      && !bfd_link_executable (info))
2362 	    {
2363 	      relocation = (htab->elf.iplt->output_section->vma
2364 			    + htab->elf.iplt->output_offset
2365 			    + h->plt.offset
2366 			    - htab->elf.sgot->output_section->vma);
2367 	      goto do_relocation;
2368 	    }
2369 
2370 	  /* Note that sgot->output_offset is not involved in this
2371 	     calculation.  We always want the start of .got.  If we
2372 	     defined _GLOBAL_OFFSET_TABLE in a different way, as is
2373 	     permitted by the ABI, we might have to change this
2374 	     calculation.  */
2375 	  relocation -= htab->elf.sgot->output_section->vma;
2376 	  break;
2377 
2378 	case R_390_GOTPC:
2379 	case R_390_GOTPCDBL:
2380 	  /* Use global offset table as symbol value.  */
2381 	  relocation = htab->elf.sgot->output_section->vma;
2382 	  unresolved_reloc = false;
2383 	  break;
2384 
2385 	case R_390_PLT12DBL:
2386 	case R_390_PLT16DBL:
2387 	case R_390_PLT24DBL:
2388 	case R_390_PLT32DBL:
2389 	case R_390_PLT32:
2390 	  /* Relocation is to the entry for this symbol in the
2391 	     procedure linkage table.  */
2392 
2393 	  /* Resolve a PLT32 reloc against a local symbol directly,
2394 	     without using the procedure linkage table.  */
2395 	  if (h == NULL)
2396 	    break;
2397 
2398 	  if (h->plt.offset == (bfd_vma) -1
2399 	      || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
2400 	    {
2401 	      /* We didn't make a PLT entry for this symbol.  This
2402 		 happens when statically linking PIC code, or when
2403 		 using -Bsymbolic.  */
2404 	      break;
2405 	    }
2406 
2407 	  if (s390_is_ifunc_symbol_p (h))
2408 	    relocation = (htab->elf.iplt->output_section->vma
2409 			  + htab->elf.iplt->output_offset
2410 			  + h->plt.offset);
2411 	  else
2412 	    relocation = (htab->elf.splt->output_section->vma
2413 			  + htab->elf.splt->output_offset
2414 			  + h->plt.offset);
2415 	  unresolved_reloc = false;
2416 	  break;
2417 
2418 	case R_390_PLTOFF16:
2419 	case R_390_PLTOFF32:
2420 	  /* Relocation is to the entry for this symbol in the
2421 	     procedure linkage table relative to the start of the GOT.  */
2422 
2423 	  /* For local symbols or if we didn't make a PLT entry for
2424 	     this symbol resolve the symbol directly.  */
2425 	  if (h == NULL
2426 	      || h->plt.offset == (bfd_vma) -1
2427 	      || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
2428 	    {
2429 	      relocation -= htab->elf.sgot->output_section->vma;
2430 	      break;
2431 	    }
2432 
2433 	  if (s390_is_ifunc_symbol_p (h))
2434 	    relocation = (htab->elf.iplt->output_section->vma
2435 			  + htab->elf.iplt->output_offset
2436 			  + h->plt.offset
2437 			  - htab->elf.sgot->output_section->vma);
2438 	  else
2439 	    relocation = (htab->elf.splt->output_section->vma
2440 			  + htab->elf.splt->output_offset
2441 			  + h->plt.offset
2442 			  - htab->elf.sgot->output_section->vma);
2443 	  unresolved_reloc = false;
2444 	  break;
2445 
2446 	case R_390_PC16:
2447 	case R_390_PC12DBL:
2448 	case R_390_PC16DBL:
2449 	case R_390_PC24DBL:
2450 	case R_390_PC32DBL:
2451 	case R_390_PC32:
2452 	  if (h != NULL
2453 	      && s390_is_ifunc_symbol_p (h)
2454 	      && h->def_regular
2455 	      && !bfd_link_executable (info))
2456 	    {
2457 	      /* This will not work our if the function does not
2458 		 happen to set up the GOT pointer for some other
2459 		 reason.  31 bit PLT entries require r12 to hold the
2460 		 GOT pointer.
2461 		 FIXME: Implement an errorcheck.
2462 		 NOTE: It will work when brasl is not available
2463 		 (e.g. with -m31 -march=g5) since a local function
2464 		 call then does use GOTOFF which implies r12 being set
2465 		 up.  */
2466 	      relocation = (htab->elf.iplt->output_section->vma
2467 			    + htab->elf.iplt->output_offset
2468 			    + h ->plt.offset);
2469 	      goto do_relocation;
2470 	    }
2471 	  /* Fall through.  */
2472 
2473 	case R_390_8:
2474 	case R_390_16:
2475 	case R_390_32:
2476 	  if ((input_section->flags & SEC_ALLOC) == 0)
2477 	    break;
2478 
2479 	  if (h != NULL
2480 	      && s390_is_ifunc_symbol_p (h)
2481 	      && h->def_regular)
2482 	    {
2483 	      if (!bfd_link_pic (info))
2484 		{
2485 		  /* For a non-shared object STT_GNU_IFUNC symbol must
2486 		     go through PLT.  */
2487 		  relocation = (htab->elf.iplt->output_section->vma
2488 				+ htab->elf.iplt->output_offset
2489 				+ h ->plt.offset);
2490 		  goto do_relocation;
2491 		}
2492 	      else
2493 		{
2494 		  /* For shared objects a runtime relocation is needed.  */
2495 
2496 		  Elf_Internal_Rela outrel;
2497 		  asection *sreloc;
2498 
2499 		  /* Need a dynamic relocation to get the real function
2500 		     address.  */
2501 		  outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2502 							     info,
2503 							     input_section,
2504 							     rel->r_offset);
2505 		  if (outrel.r_offset == (bfd_vma) -1
2506 		      || outrel.r_offset == (bfd_vma) -2)
2507 		    abort ();
2508 
2509 		  outrel.r_offset += (input_section->output_section->vma
2510 				      + input_section->output_offset);
2511 
2512 		  if (h->dynindx == -1
2513 		      || h->forced_local
2514 		      || bfd_link_executable (info))
2515 		    {
2516 		      /* This symbol is resolved locally.  */
2517 		      outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2518 		      outrel.r_addend = (h->root.u.def.value
2519 					 + h->root.u.def.section->output_section->vma
2520 					 + h->root.u.def.section->output_offset);
2521 		    }
2522 		  else
2523 		    {
2524 		      outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2525 		      outrel.r_addend = 0;
2526 		    }
2527 
2528 		  sreloc = htab->elf.irelifunc;
2529 		  elf_append_rela (output_bfd, sreloc, &outrel);
2530 
2531 		  /* If this reloc is against an external symbol, we
2532 		     do not want to fiddle with the addend.  Otherwise,
2533 		     we need to include the symbol value so that it
2534 		     becomes an addend for the dynamic reloc.  For an
2535 		     internal symbol, we have updated addend.  */
2536 		  continue;
2537 		}
2538 	    }
2539 
2540 	  if ((bfd_link_pic (info)
2541 	       && (h == NULL
2542 		   || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2543 		       && !resolved_to_zero)
2544 		   || h->root.type != bfd_link_hash_undefweak)
2545 	       && ((r_type != R_390_PC16
2546 		    && r_type != R_390_PC12DBL
2547 		    && r_type != R_390_PC16DBL
2548 		    && r_type != R_390_PC24DBL
2549 		    && r_type != R_390_PC32DBL
2550 		    && r_type != R_390_PC32)
2551 		   || !SYMBOL_CALLS_LOCAL (info, h)))
2552 	      || (ELIMINATE_COPY_RELOCS
2553 		  && !bfd_link_pic (info)
2554 		  && h != NULL
2555 		  && h->dynindx != -1
2556 		  && !h->non_got_ref
2557 		  && ((h->def_dynamic
2558 		       && !h->def_regular)
2559 		      || h->root.type == bfd_link_hash_undefweak
2560 		      || h->root.type == bfd_link_hash_undefined)))
2561 	    {
2562 	      Elf_Internal_Rela outrel;
2563 	      bool skip, relocate;
2564 	      asection *sreloc;
2565 	      bfd_byte *loc;
2566 
2567 	      /* When generating a shared object, these relocations
2568 		 are copied into the output file to be resolved at run
2569 		 time.  */
2570 
2571 	      skip = false;
2572 	      relocate = false;
2573 
2574 	      outrel.r_offset =
2575 		_bfd_elf_section_offset (output_bfd, info, input_section,
2576 					 rel->r_offset);
2577 	      if (outrel.r_offset == (bfd_vma) -1)
2578 		skip = true;
2579 	      else if (outrel.r_offset == (bfd_vma) -2)
2580 		skip = true, relocate = true;
2581 	      outrel.r_offset += (input_section->output_section->vma
2582 				  + input_section->output_offset);
2583 
2584 	      if (skip)
2585 		memset (&outrel, 0, sizeof outrel);
2586 	      else if (h != NULL
2587 		       && h->dynindx != -1
2588 		       && (r_type == R_390_PC16
2589 			   || r_type == R_390_PC12DBL
2590 			   || r_type == R_390_PC16DBL
2591 			   || r_type == R_390_PC24DBL
2592 			   || r_type == R_390_PC32DBL
2593 			   || r_type == R_390_PC32
2594 			   || !bfd_link_pic (info)
2595 			   || !SYMBOLIC_BIND (info, h)
2596 			   || !h->def_regular))
2597 		{
2598 		  outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2599 		  outrel.r_addend = rel->r_addend;
2600 		}
2601 	      else
2602 		{
2603 		  /* This symbol is local, or marked to become local.  */
2604 		  outrel.r_addend = relocation + rel->r_addend;
2605 		  if (r_type == R_390_32)
2606 		    {
2607 		      relocate = true;
2608 		      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2609 		    }
2610 		  else
2611 		    {
2612 		      long sindx;
2613 
2614 		      if (bfd_is_abs_section (sec))
2615 			sindx = 0;
2616 		      else if (sec == NULL || sec->owner == NULL)
2617 			{
2618 			  bfd_set_error(bfd_error_bad_value);
2619 			  return false;
2620 			}
2621 		      else
2622 			{
2623 			  asection *osec;
2624 
2625 			  osec = sec->output_section;
2626 			  sindx = elf_section_data (osec)->dynindx;
2627 			  if (sindx == 0)
2628 			    {
2629 			      osec = htab->elf.text_index_section;
2630 			      sindx = elf_section_data (osec)->dynindx;
2631 			    }
2632 			  BFD_ASSERT (sindx != 0);
2633 
2634 			  /* We are turning this relocation into one
2635 			     against a section symbol, so subtract out
2636 			     the output section's address but not the
2637 			     offset of the input section in the output
2638 			     section.  */
2639 			  outrel.r_addend -= osec->vma;
2640 			}
2641 		      outrel.r_info = ELF32_R_INFO (sindx, r_type);
2642 		    }
2643 		}
2644 
2645 	      sreloc = elf_section_data (input_section)->sreloc;
2646 	      if (sreloc == NULL)
2647 		abort ();
2648 
2649 	      loc = sreloc->contents;
2650 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2651 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2652 
2653 	      /* If this reloc is against an external symbol, we do
2654 		 not want to fiddle with the addend.  Otherwise, we
2655 		 need to include the symbol value so that it becomes
2656 		 an addend for the dynamic reloc.  */
2657 	      if (! relocate)
2658 		continue;
2659 	    }
2660 	  break;
2661 
2662 	  /* Relocations for tls literal pool entries.  */
2663 	case R_390_TLS_IE32:
2664 	  if (bfd_link_pic (info))
2665 	    {
2666 	      Elf_Internal_Rela outrel;
2667 	      asection *sreloc;
2668 	      bfd_byte *loc;
2669 
2670 	      outrel.r_offset = rel->r_offset
2671 				+ input_section->output_section->vma
2672 				+ input_section->output_offset;
2673 	      outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2674 	      sreloc = elf_section_data (input_section)->sreloc;
2675 	      if (sreloc == NULL)
2676 		abort ();
2677 	      loc = sreloc->contents;
2678 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2679 	      bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2680 	    }
2681 	  /* Fall through.  */
2682 
2683 	case R_390_TLS_GD32:
2684 	case R_390_TLS_GOTIE32:
2685 	  r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2686 	  tls_type = GOT_UNKNOWN;
2687 	  if (h == NULL && local_got_offsets)
2688 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2689 	  else if (h != NULL)
2690 	    {
2691 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2692 	      if (!bfd_link_pic (info)
2693 		  && h->dynindx == -1
2694 		  && tls_type >= GOT_TLS_IE)
2695 		r_type = R_390_TLS_LE32;
2696 	    }
2697 	  if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2698 	    r_type = R_390_TLS_IE32;
2699 
2700 	  if (r_type == R_390_TLS_LE32)
2701 	    {
2702 	      /* This relocation gets optimized away by the local exec
2703 		 access optimization.  */
2704 	      BFD_ASSERT (! unresolved_reloc);
2705 	      bfd_put_32 (output_bfd, -tpoff (info, relocation) + rel->r_addend,
2706 			  contents + rel->r_offset);
2707 	      continue;
2708 	    }
2709 
2710 	  if (htab->elf.sgot == NULL)
2711 	    abort ();
2712 
2713 	  if (h != NULL)
2714 	    off = h->got.offset;
2715 	  else
2716 	    {
2717 	      if (local_got_offsets == NULL)
2718 		abort ();
2719 
2720 	      off = local_got_offsets[r_symndx];
2721 	    }
2722 
2723 	emit_tls_relocs:
2724 
2725 	  if ((off & 1) != 0)
2726 	    off &= ~1;
2727 	  else
2728 	    {
2729 	      Elf_Internal_Rela outrel;
2730 	      bfd_byte *loc;
2731 	      int dr_type, indx;
2732 
2733 	      if (htab->elf.srelgot == NULL)
2734 		abort ();
2735 
2736 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2737 				 + htab->elf.sgot->output_offset + off);
2738 
2739 	      indx = h && h->dynindx != -1 ? h->dynindx : 0;
2740 	      if (r_type == R_390_TLS_GD32)
2741 		dr_type = R_390_TLS_DTPMOD;
2742 	      else
2743 		dr_type = R_390_TLS_TPOFF;
2744 	      if (dr_type == R_390_TLS_TPOFF && indx == 0)
2745 		outrel.r_addend = relocation - dtpoff_base (info);
2746 	      else
2747 		outrel.r_addend = 0;
2748 	      outrel.r_info = ELF32_R_INFO (indx, dr_type);
2749 	      loc = htab->elf.srelgot->contents;
2750 	      loc += htab->elf.srelgot->reloc_count++
2751 		* sizeof (Elf32_External_Rela);
2752 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2753 
2754 	      if (r_type == R_390_TLS_GD32)
2755 		{
2756 		  if (indx == 0)
2757 		    {
2758 		      BFD_ASSERT (! unresolved_reloc);
2759 		      bfd_put_32 (output_bfd,
2760 				  relocation - dtpoff_base (info),
2761 				  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2762 		    }
2763 		  else
2764 		    {
2765 		      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
2766 		      outrel.r_offset += GOT_ENTRY_SIZE;
2767 		      outrel.r_addend = 0;
2768 		      htab->elf.srelgot->reloc_count++;
2769 		      loc += sizeof (Elf32_External_Rela);
2770 		      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2771 		    }
2772 		}
2773 
2774 	      if (h != NULL)
2775 		h->got.offset |= 1;
2776 	      else
2777 		local_got_offsets[r_symndx] |= 1;
2778 	    }
2779 
2780 	  if (off >= (bfd_vma) -2)
2781 	    abort ();
2782 	  if (r_type == ELF32_R_TYPE (rel->r_info))
2783 	    {
2784 	      relocation = htab->elf.sgot->output_offset + off;
2785 	      if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
2786 		relocation += htab->elf.sgot->output_section->vma;
2787 	      unresolved_reloc = false;
2788 	    }
2789 	  else
2790 	    {
2791 	      bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
2792 			  contents + rel->r_offset);
2793 	      continue;
2794 	    }
2795 	  break;
2796 
2797 	case R_390_TLS_GOTIE12:
2798 	case R_390_TLS_GOTIE20:
2799 	case R_390_TLS_IEENT:
2800 	  if (h == NULL)
2801 	    {
2802 	      if (local_got_offsets == NULL)
2803 		abort();
2804 	      off = local_got_offsets[r_symndx];
2805 	      if (bfd_link_pic (info))
2806 		goto emit_tls_relocs;
2807 	    }
2808 	  else
2809 	    {
2810 	      off = h->got.offset;
2811 	      tls_type = elf_s390_hash_entry(h)->tls_type;
2812 	      if (bfd_link_pic (info)
2813 		  || h->dynindx != -1
2814 		  || tls_type < GOT_TLS_IE)
2815 		goto emit_tls_relocs;
2816 	    }
2817 
2818 	  if (htab->elf.sgot == NULL)
2819 	    abort ();
2820 
2821 	  BFD_ASSERT (! unresolved_reloc);
2822 	  bfd_put_32 (output_bfd, -tpoff (info, relocation),
2823 		      htab->elf.sgot->contents + off);
2824 	  relocation = htab->elf.sgot->output_offset + off;
2825 	  if (r_type == R_390_TLS_IEENT)
2826 	    relocation += htab->elf.sgot->output_section->vma;
2827 	  unresolved_reloc = false;
2828 	  break;
2829 
2830 	case R_390_TLS_LDM32:
2831 	  if (! bfd_link_pic (info))
2832 	    /* The literal pool entry this relocation refers to gets ignored
2833 	       by the optimized code of the local exec model. Do nothing
2834 	       and the value will turn out zero.  */
2835 	    continue;
2836 
2837 	  if (htab->elf.sgot == NULL)
2838 	    abort ();
2839 
2840 	  off = htab->tls_ldm_got.offset;
2841 	  if (off & 1)
2842 	    off &= ~1;
2843 	  else
2844 	    {
2845 	      Elf_Internal_Rela outrel;
2846 	      bfd_byte *loc;
2847 
2848 	      if (htab->elf.srelgot == NULL)
2849 		abort ();
2850 
2851 	      outrel.r_offset = (htab->elf.sgot->output_section->vma
2852 				 + htab->elf.sgot->output_offset + off);
2853 
2854 	      bfd_put_32 (output_bfd, 0,
2855 			  htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
2856 	      outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
2857 	      outrel.r_addend = 0;
2858 	      loc = htab->elf.srelgot->contents;
2859 	      loc += htab->elf.srelgot->reloc_count++
2860 		* sizeof (Elf32_External_Rela);
2861 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2862 	      htab->tls_ldm_got.offset |= 1;
2863 	    }
2864 	  relocation = htab->elf.sgot->output_offset + off;
2865 	  unresolved_reloc = false;
2866 	  break;
2867 
2868 	case R_390_TLS_LE32:
2869 	  if (bfd_link_dll (info))
2870 	    {
2871 	      /* Linking a shared library with non-fpic code requires
2872 		 a R_390_TLS_TPOFF relocation.  */
2873 	      Elf_Internal_Rela outrel;
2874 	      asection *sreloc;
2875 	      bfd_byte *loc;
2876 	      int indx;
2877 
2878 	      outrel.r_offset = rel->r_offset
2879 				+ input_section->output_section->vma
2880 				+ input_section->output_offset;
2881 	      if (h != NULL && h->dynindx != -1)
2882 		indx = h->dynindx;
2883 	      else
2884 		indx = 0;
2885 	      outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
2886 	      if (indx == 0)
2887 		outrel.r_addend = relocation - dtpoff_base (info);
2888 	      else
2889 		outrel.r_addend = 0;
2890 	      sreloc = elf_section_data (input_section)->sreloc;
2891 	      if (sreloc == NULL)
2892 		abort ();
2893 	      loc = sreloc->contents;
2894 	      loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2895 	      bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2896 	    }
2897 	  else
2898 	    {
2899 	      BFD_ASSERT (! unresolved_reloc);
2900 	      bfd_put_32 (output_bfd, -tpoff (info, relocation) + rel->r_addend,
2901 			  contents + rel->r_offset);
2902 	    }
2903 	  continue;
2904 
2905 	case R_390_TLS_LDO32:
2906 	  if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
2907 	    relocation -= dtpoff_base (info);
2908 	  else
2909 	    /* When converting LDO to LE, we must negate.  */
2910 	    relocation = -tpoff (info, relocation);
2911 	  break;
2912 
2913 	  /* Relocations for tls instructions.  */
2914 	case R_390_TLS_LOAD:
2915 	case R_390_TLS_GDCALL:
2916 	case R_390_TLS_LDCALL:
2917 	  tls_type = GOT_UNKNOWN;
2918 	  if (h == NULL && local_got_offsets)
2919 	    tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2920 	  else if (h != NULL)
2921 	    tls_type = elf_s390_hash_entry(h)->tls_type;
2922 
2923 	  if (tls_type == GOT_TLS_GD)
2924 	    continue;
2925 
2926 	  if (r_type == R_390_TLS_LOAD)
2927 	    {
2928 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
2929 		{
2930 		  /* IE->LE transition. Four valid cases:
2931 		     l %rx,0(0,%ry)    -> lr %rx,%ry + bcr 0,0
2932 		     l %rx,0(%ry,0)    -> lr %rx,%ry + bcr 0,0
2933 		     l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
2934 		     l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
2935 		  unsigned int insn, ry;
2936 
2937 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2938 		  if ((insn & 0xff00f000) == 0x58000000)
2939 		    /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0  */
2940 		    ry = (insn & 0x000f0000);
2941 		  else if ((insn & 0xff0f0000) == 0x58000000)
2942 		    /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0  */
2943 		    ry = (insn & 0x0000f000) << 4;
2944 		  else if ((insn & 0xff00f000) == 0x5800c000)
2945 		    /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0  */
2946 		    ry = (insn & 0x000f0000);
2947 		  else if ((insn & 0xff0f0000) == 0x580c0000)
2948 		    /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0  */
2949 		    ry = (insn & 0x0000f000) << 4;
2950 		  else
2951 		    {
2952 		      invalid_tls_insn (input_bfd, input_section, rel);
2953 		      return false;
2954 		    }
2955 		  insn = 0x18000700 | (insn & 0x00f00000) | ry;
2956 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
2957 		}
2958 	    }
2959 	  else if (r_type == R_390_TLS_GDCALL)
2960 	    {
2961 	      unsigned int insn;
2962 
2963 	      insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2964 	      if ((insn & 0xff000fff) != 0x4d000000 &&
2965 		  (insn & 0xffff0000) != 0xc0e50000 &&
2966 		  (insn & 0xff000000) != 0x0d000000)
2967 		{
2968 		  invalid_tls_insn (input_bfd, input_section, rel);
2969 		  return false;
2970 		}
2971 	      if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
2972 		{
2973 		  if ((insn & 0xff000000) == 0x0d000000)
2974 		    {
2975 		      /* GD->LE transition.
2976 			 basr rx, ry -> nopr r7 */
2977 		      insn = 0x07070000 | (insn & 0xffff);
2978 		    }
2979 		  else if ((insn & 0xff000000) == 0x4d000000)
2980 		    {
2981 		      /* GD->LE transition.
2982 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
2983 		      insn = 0x47000000;
2984 		    }
2985 		  else
2986 		    {
2987 		      /* GD->LE transition.
2988 			 brasl %r14,_tls_get_offset@plt -> brcl 0,.  */
2989 		      insn = 0xc0040000;
2990 		      bfd_put_16 (output_bfd, 0x0000,
2991 				  contents + rel->r_offset + 4);
2992 		    }
2993 		}
2994 	      else
2995 		{
2996 		  /* If basr is used in the pic case to invoke
2997 		     _tls_get_offset, something went wrong before.  */
2998 		  if ((insn & 0xff000000) == 0x0d000000)
2999 		    {
3000 		      invalid_tls_insn (input_bfd, input_section, rel);
3001 		      return false;
3002 		    }
3003 
3004 		  if ((insn & 0xff000000) == 0x4d000000)
3005 		    {
3006 		      /* GD->IE transition.
3007 			 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12)  */
3008 		      insn = 0x5822c000;
3009 		    }
3010 		  else
3011 		    {
3012 		      /* GD->IE transition.
3013 			 brasl %r14,__tls_get_addr@plt ->
3014 				l %r2,0(%r2,%r12) ; bcr 0,0 */
3015 		      insn = 0x5822c000;
3016 		      bfd_put_16 (output_bfd, 0x0700,
3017 				  contents + rel->r_offset + 4);
3018 		    }
3019 		}
3020 	      bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3021 	    }
3022 	  else if (r_type == R_390_TLS_LDCALL)
3023 	    {
3024 	      if (!bfd_link_pic (info))
3025 		{
3026 		  unsigned int insn;
3027 
3028 		  insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
3029 		  if ((insn & 0xff000fff) != 0x4d000000 &&
3030 		      (insn & 0xffff0000) != 0xc0e50000 &&
3031 		      (insn & 0xff000000) != 0x0d000000)
3032 		    {
3033 		      invalid_tls_insn (input_bfd, input_section, rel);
3034 		      return false;
3035 		    }
3036 
3037 		  if ((insn & 0xff000000) == 0x0d000000)
3038 		    {
3039 		      /* LD->LE transition.
3040 			 basr rx, ry -> nopr r7 */
3041 		      insn = 0x07070000 | (insn & 0xffff);
3042 		    }
3043 		  else if ((insn & 0xff000000) == 0x4d000000)
3044 		    {
3045 		      /* LD->LE transition.
3046 			 bas %r14,0(%rx,%r13) -> bc 0,0  */
3047 		      insn = 0x47000000;
3048 		    }
3049 		  else
3050 		    {
3051 		      /* LD->LE transition.
3052 			 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
3053 		      insn = 0xc0040000;
3054 		      bfd_put_16 (output_bfd, 0x0000,
3055 				  contents + rel->r_offset + 4);
3056 		    }
3057 		  bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3058 		}
3059 	    }
3060 	  continue;
3061 
3062 	default:
3063 	  break;
3064 	}
3065 
3066       /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3067 	 because such sections are not SEC_ALLOC and thus ld.so will
3068 	 not process them.  */
3069       if (unresolved_reloc
3070 	  && !((input_section->flags & SEC_DEBUGGING) != 0
3071 	       && h->def_dynamic)
3072 	  && _bfd_elf_section_offset (output_bfd, info, input_section,
3073 				      rel->r_offset) != (bfd_vma) -1)
3074 	_bfd_error_handler
3075 	  /* xgettext:c-format */
3076 	  (_("%pB(%pA+%#" PRIx64 "): "
3077 	     "unresolvable %s relocation against symbol `%s'"),
3078 	   input_bfd,
3079 	   input_section,
3080 	   (uint64_t) rel->r_offset,
3081 	   howto->name,
3082 	   h->root.root.string);
3083 
3084     do_relocation:
3085 
3086       /* When applying a 24 bit reloc we need to start one byte
3087 	 earlier.  Otherwise the 32 bit get/put bfd operations might
3088 	 access a byte after the actual section.  */
3089       if (r_type == R_390_PC24DBL
3090 	  || r_type == R_390_PLT24DBL)
3091 	rel->r_offset--;
3092 
3093       if (r_type == R_390_20
3094 	  || r_type == R_390_GOT20
3095 	  || r_type == R_390_GOTPLT20
3096 	  || r_type == R_390_TLS_GOTIE20)
3097 	{
3098 	  relocation += rel->r_addend;
3099 	  relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3100 	  r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3101 					contents, rel->r_offset,
3102 					relocation, 0);
3103 	}
3104       else
3105 	r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3106 				      contents, rel->r_offset,
3107 				      relocation, rel->r_addend);
3108 
3109       if (r != bfd_reloc_ok)
3110 	{
3111 	  const char *name;
3112 
3113 	  if (h != NULL)
3114 	    name = h->root.root.string;
3115 	  else
3116 	    {
3117 	      name = bfd_elf_string_from_elf_section (input_bfd,
3118 						      symtab_hdr->sh_link,
3119 						      sym->st_name);
3120 	      if (name == NULL)
3121 		return false;
3122 	      if (*name == '\0')
3123 		name = bfd_section_name (sec);
3124 	    }
3125 
3126 	  if (r == bfd_reloc_overflow)
3127 	    (*info->callbacks->reloc_overflow)
3128 	      (info, (h ? &h->root : NULL), name, howto->name,
3129 	       (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
3130 	  else
3131 	    {
3132 	      _bfd_error_handler
3133 		/* xgettext:c-format */
3134 		(_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
3135 		 input_bfd, input_section,
3136 		 (uint64_t) rel->r_offset, name, (int) r);
3137 	      return false;
3138 	    }
3139 	}
3140     }
3141 
3142   return true;
3143 }
3144 
3145 /* Generate the PLT slots together with the dynamic relocations needed
3146    for IFUNC symbols.  */
3147 
3148 static void
3149 elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3150 			      struct bfd_link_info *info,
3151 			      struct elf_link_hash_entry *h,
3152 			      struct elf_s390_link_hash_table *htab,
3153 			      bfd_vma iplt_offset,
3154 			      bfd_vma resolver_address)
3155 {
3156   bfd_vma iplt_index;
3157   bfd_vma got_offset;
3158   bfd_vma igotiplt_offset;
3159   Elf_Internal_Rela rela;
3160   bfd_byte *loc;
3161   asection *plt, *gotplt, *relplt;
3162   bfd_vma relative_offset;
3163 
3164   if (htab->elf.iplt == NULL
3165       || htab->elf.igotplt == NULL
3166       || htab->elf.irelplt == NULL)
3167     abort ();
3168 
3169   gotplt = htab->elf.igotplt;
3170   relplt = htab->elf.irelplt;
3171 
3172   /* Index of the PLT slot within iplt section.  */
3173   iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3174   plt = htab->elf.iplt;
3175   /* Offset into the igot.plt section.  */
3176   igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3177   /* Offset into the got section.  */
3178   got_offset = igotiplt_offset + gotplt->output_offset;
3179 
3180   /* S390 uses halfwords for relative branch calc!  */
3181   relative_offset = - (plt->output_offset +
3182 		       (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
3183   /* If offset is > 32768, branch to a previous branch
3184      390 can only handle +-64 K jumps.  */
3185   if ( -32768 > (int) relative_offset )
3186     relative_offset
3187       = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3188 
3189   /* Fill in the entry in the procedure linkage table.  */
3190   if (!bfd_link_pic (info))
3191     {
3192       memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3193 	      PLT_ENTRY_SIZE);
3194 
3195       /* Adjust jump to the first plt entry.  */
3196       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3197 		  plt->contents + iplt_offset + 20);
3198 
3199       /* Push the GOT offset field.  */
3200       bfd_put_32 (output_bfd,
3201 		  (gotplt->output_section->vma
3202 		   + got_offset),
3203 		  plt->contents + iplt_offset + 24);
3204     }
3205   else if (got_offset < 4096)
3206     {
3207       /* The GOT offset is small enough to be used directly as
3208 	 displacement.  */
3209       memcpy (plt->contents + iplt_offset,
3210 	      elf_s390_plt_pic12_entry,
3211 	      PLT_ENTRY_SIZE);
3212 
3213       /* Put in the GOT offset as displacement value.  The 0xc000
3214 	 value comes from the first word of the plt entry.  Look
3215 	 at the elf_s390_plt_pic16_entry content.  */
3216       bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3217 		  plt->contents + iplt_offset + 2);
3218 
3219       /* Adjust the jump to the first plt entry.  */
3220       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3221 		  plt->contents + iplt_offset + 20);
3222     }
3223   else if (got_offset < 32768)
3224     {
3225       /* The GOT offset is too big for a displacement but small
3226 	 enough to be a signed 16 bit immediate value as it can be
3227 	 used in an lhi instruction.  */
3228       memcpy (plt->contents + iplt_offset,
3229 	      elf_s390_plt_pic16_entry,
3230 	      PLT_ENTRY_SIZE);
3231 
3232       /* Put in the GOT offset for the lhi instruction.  */
3233       bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3234 		  plt->contents + iplt_offset + 2);
3235 
3236       /* Adjust the jump to the first plt entry.  */
3237       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3238 		  plt->contents + iplt_offset + 20);
3239     }
3240   else
3241     {
3242       memcpy (plt->contents + iplt_offset,
3243 	      elf_s390_plt_pic_entry,
3244 	      PLT_ENTRY_SIZE);
3245 
3246       /* Adjust the jump to the first plt entry.  */
3247       bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3248 		  plt->contents + iplt_offset + 20);
3249 
3250       /* Push the GOT offset field.  */
3251       bfd_put_32 (output_bfd, got_offset,
3252 		  plt->contents + iplt_offset + 24);
3253     }
3254   /* Insert offset into  reloc. table here.  */
3255   bfd_put_32 (output_bfd, relplt->output_offset +
3256 	      iplt_index * RELA_ENTRY_SIZE,
3257 	      plt->contents + iplt_offset + 28);
3258 
3259   /* Fill in the entry in the global offset table.
3260      Points to instruction after GOT offset.  */
3261   bfd_put_32 (output_bfd,
3262 	      (plt->output_section->vma
3263 	       + plt->output_offset
3264 	       + iplt_offset
3265 	       + 12),
3266 	      gotplt->contents + igotiplt_offset);
3267 
3268   /* Fill in the entry in the .rela.plt section.  */
3269   rela.r_offset = gotplt->output_section->vma + got_offset;
3270 
3271   if (!h
3272       || h->dynindx == -1
3273       || ((bfd_link_executable (info)
3274 	   || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3275 	  && h->def_regular))
3276     {
3277       /* The symbol can be locally resolved.  */
3278       rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3279       rela.r_addend = resolver_address;
3280     }
3281   else
3282     {
3283       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3284       rela.r_addend = 0;
3285     }
3286 
3287   loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3288   bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3289 }
3290 
3291 /* Finish up dynamic symbol handling.  We set the contents of various
3292    dynamic sections here.  */
3293 
3294 static bool
3295 elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3296 				struct bfd_link_info *info,
3297 				struct elf_link_hash_entry *h,
3298 				Elf_Internal_Sym *sym)
3299 {
3300   struct elf_s390_link_hash_table *htab;
3301   struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
3302 
3303   htab = elf_s390_hash_table (info);
3304 
3305   if (h->plt.offset != (bfd_vma) -1)
3306     {
3307       bfd_vma plt_index;
3308       bfd_vma got_offset;
3309       Elf_Internal_Rela rela;
3310       bfd_byte *loc;
3311       bfd_vma relative_offset;
3312 
3313       /* This symbol has an entry in the procedure linkage table.  Set
3314 	 it up.  */
3315       if (s390_is_ifunc_symbol_p (h) && h->def_regular)
3316 	{
3317 	  elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3318 	    htab, h->plt.offset,
3319 	    eh->ifunc_resolver_address +
3320 	    eh->ifunc_resolver_section->output_offset +
3321 	    eh->ifunc_resolver_section->output_section->vma);
3322 	  /* Do not return yet.  Handling of explicit GOT slots of
3323 	     IFUNC symbols is below.  */
3324 	}
3325       else
3326 	{
3327 	  if (h->dynindx == -1
3328 	      || htab->elf.splt == NULL
3329 	      || htab->elf.sgotplt == NULL
3330 	      || htab->elf.srelplt == NULL)
3331 	    abort ();
3332 
3333 	  /* Calc. index no.
3334 	     Current offset - size first entry / entry size.  */
3335 	  plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
3336 
3337 	  /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3338 	     addr & GOT addr.  */
3339 	  got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
3340 
3341 	  /* S390 uses halfwords for relative branch calc!  */
3342 	  relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3343 				(PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3344 	  /* If offset is > 32768, branch to a previous branch
3345 	     390 can only handle +-64 K jumps.  */
3346 	  if ( -32768 > (int) relative_offset )
3347 	    relative_offset
3348 	      = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3349 
3350 	  /* Fill in the entry in the procedure linkage table.  */
3351 	  if (!bfd_link_pic (info))
3352 	    {
3353 	      memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3354 		      PLT_ENTRY_SIZE);
3355 
3356 	      /* Adjust jump to the first plt entry.  */
3357 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3358 			  htab->elf.splt->contents + h->plt.offset + 20);
3359 
3360 	      /* Push the GOT offset field.  */
3361 	      bfd_put_32 (output_bfd,
3362 			  (htab->elf.sgotplt->output_section->vma
3363 			   + htab->elf.sgotplt->output_offset
3364 			   + got_offset),
3365 			  htab->elf.splt->contents + h->plt.offset + 24);
3366 	    }
3367 	  else if (got_offset < 4096)
3368 	    {
3369 	      /* The GOT offset is small enough to be used directly as
3370 		 displacement.  */
3371 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3372 		      elf_s390_plt_pic12_entry,
3373 		      PLT_ENTRY_SIZE);
3374 
3375 	      /* Put in the GOT offset as displacement value.  The 0xc000
3376 		 value comes from the first word of the plt entry.  Look
3377 		 at the elf_s390_plt_pic12_entry content.  */
3378 	      bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3379 			  htab->elf.splt->contents + h->plt.offset + 2);
3380 
3381 	      /* Adjust the jump to the first plt entry.  */
3382 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3383 			  htab->elf.splt->contents + h->plt.offset + 20);
3384 	    }
3385 	  else if (got_offset < 32768)
3386 	    {
3387 	      /* The GOT offset is too big for a displacement but small
3388 		 enough to be a signed 16 bit immediate value as it can be
3389 		 used in an lhi instruction.  */
3390 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3391 		      elf_s390_plt_pic16_entry,
3392 		      PLT_ENTRY_SIZE);
3393 
3394 	      /* Put in the GOT offset for the lhi instruction.  */
3395 	      bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3396 			  htab->elf.splt->contents + h->plt.offset + 2);
3397 
3398 	      /* Adjust the jump to the first plt entry.  */
3399 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3400 			  htab->elf.splt->contents + h->plt.offset + 20);
3401 	    }
3402 	  else
3403 	    {
3404 	      memcpy (htab->elf.splt->contents + h->plt.offset,
3405 		      elf_s390_plt_pic_entry,
3406 		      PLT_ENTRY_SIZE);
3407 
3408 	      /* Adjust the jump to the first plt entry.  */
3409 	      bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3410 			  htab->elf.splt->contents + h->plt.offset + 20);
3411 
3412 	      /* Push the GOT offset field.  */
3413 	      bfd_put_32 (output_bfd, got_offset,
3414 			  htab->elf.splt->contents + h->plt.offset + 24);
3415 	    }
3416 	  /* Insert offset into  reloc. table here.  */
3417 	  bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3418 		      htab->elf.splt->contents + h->plt.offset + 28);
3419 
3420 	  /* Fill in the entry in the global offset table.
3421 	     Points to instruction after GOT offset.  */
3422 	  bfd_put_32 (output_bfd,
3423 		      (htab->elf.splt->output_section->vma
3424 		       + htab->elf.splt->output_offset
3425 		       + h->plt.offset
3426 		       + 12),
3427 		      htab->elf.sgotplt->contents + got_offset);
3428 
3429 	  /* Fill in the entry in the .rela.plt section.  */
3430 	  rela.r_offset = (htab->elf.sgotplt->output_section->vma
3431 			   + htab->elf.sgotplt->output_offset
3432 			   + got_offset);
3433 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3434 	  rela.r_addend = 0;
3435 	  loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3436 	  bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3437 
3438 	  if (!h->def_regular)
3439 	    {
3440 	      /* Mark the symbol as undefined, rather than as defined in
3441 		 the .plt section.  Leave the value alone.  This is a clue
3442 		 for the dynamic linker, to make function pointer
3443 		 comparisons work between an application and shared
3444 		 library.  */
3445 	      sym->st_shndx = SHN_UNDEF;
3446 	    }
3447 	}
3448     }
3449 
3450   if (h->got.offset != (bfd_vma) -1
3451       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3452       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3453       && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
3454     {
3455       Elf_Internal_Rela rela;
3456       bfd_byte *loc;
3457 
3458       /* This symbol has an entry in the global offset table.  Set it
3459 	 up.  */
3460 
3461       if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
3462 	abort ();
3463 
3464       rela.r_offset = (htab->elf.sgot->output_section->vma
3465 		       + htab->elf.sgot->output_offset
3466 		       + (h->got.offset &~ (bfd_vma) 1));
3467 
3468       /* If this is a static link, or it is a -Bsymbolic link and the
3469 	 symbol is defined locally or was forced to be local because
3470 	 of a version file, we just want to emit a RELATIVE reloc.
3471 	 The entry in the global offset table will already have been
3472 	 initialized in the relocate_section function.  */
3473       if (h->def_regular && s390_is_ifunc_symbol_p (h))
3474 	{
3475 	  if (bfd_link_pic (info))
3476 	    {
3477 	      /* An explicit GOT slot usage needs GLOB_DAT.  If the
3478 		 symbol references local the implicit got.iplt slot
3479 		 will be used and the IRELATIVE reloc has been created
3480 		 above.  */
3481 	      goto do_glob_dat;
3482 	    }
3483 	  else
3484 	    {
3485 	      /* For non-shared objects explicit GOT slots must be
3486 		 filled with the PLT slot address for pointer
3487 		 equality reasons.  */
3488 	      bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3489 				       + htab->elf.iplt->output_offset
3490 				       + h->plt.offset),
3491 			  htab->elf.sgot->contents + h->got.offset);
3492 	      return true;
3493 	    }
3494 	}
3495       else if (bfd_link_pic (info)
3496 	       && SYMBOL_REFERENCES_LOCAL (info, h))
3497 	{
3498 	  if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
3499 	    return true;
3500 
3501 	  /* If this is a static link, or it is a -Bsymbolic link and
3502 	     the symbol is defined locally or was forced to be local
3503 	     because of a version file, we just want to emit a
3504 	     RELATIVE reloc.  The entry in the global offset table
3505 	     will already have been initialized in the
3506 	     relocate_section function.  */
3507 	  if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
3508 	    return false;
3509 	  BFD_ASSERT((h->got.offset & 1) != 0);
3510 	  rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3511 	  rela.r_addend = (h->root.u.def.value
3512 			   + h->root.u.def.section->output_section->vma
3513 			   + h->root.u.def.section->output_offset);
3514 	}
3515       else
3516 	{
3517 	  BFD_ASSERT((h->got.offset & 1) == 0);
3518 	do_glob_dat:
3519 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
3520 	  rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
3521 	  rela.r_addend = 0;
3522 	}
3523 
3524       loc = htab->elf.srelgot->contents;
3525       loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3526       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3527     }
3528 
3529   if (h->needs_copy)
3530     {
3531       Elf_Internal_Rela rela;
3532       asection *s;
3533       bfd_byte *loc;
3534 
3535       /* This symbols needs a copy reloc.  Set it up.  */
3536 
3537       if (h->dynindx == -1
3538 	  || (h->root.type != bfd_link_hash_defined
3539 	      && h->root.type != bfd_link_hash_defweak)
3540 	  || htab->elf.srelbss == NULL
3541 	  || htab->elf.sreldynrelro == NULL)
3542 	abort ();
3543 
3544       rela.r_offset = (h->root.u.def.value
3545 		       + h->root.u.def.section->output_section->vma
3546 		       + h->root.u.def.section->output_offset);
3547       rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3548       rela.r_addend = 0;
3549       if (h->root.u.def.section == htab->elf.sdynrelro)
3550 	s = htab->elf.sreldynrelro;
3551       else
3552 	s = htab->elf.srelbss;
3553       loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3554       bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3555     }
3556 
3557   /* Mark some specially defined symbols as absolute.  */
3558   if (h == htab->elf.hdynamic
3559       || h == htab->elf.hgot
3560       || h == htab->elf.hplt)
3561     sym->st_shndx = SHN_ABS;
3562 
3563   return true;
3564 }
3565 
3566 /* Used to decide how to sort relocs in an optimal manner for the
3567    dynamic linker, before writing them out.  */
3568 
3569 static enum elf_reloc_type_class
3570 elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3571 			   const asection *rel_sec ATTRIBUTE_UNUSED,
3572 			   const Elf_Internal_Rela *rela)
3573 {
3574   bfd *abfd = info->output_bfd;
3575   const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3576   struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3577   unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3578   Elf_Internal_Sym sym;
3579 
3580   if (htab->elf.dynsym == NULL
3581       || !bed->s->swap_symbol_in (abfd,
3582 				  (htab->elf.dynsym->contents
3583 				   + r_symndx * bed->s->sizeof_sym),
3584 				  0, &sym))
3585     abort ();
3586 
3587   /* Check relocation against STT_GNU_IFUNC symbol.  */
3588   if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3589     return reloc_class_ifunc;
3590 
3591   switch ((int) ELF32_R_TYPE (rela->r_info))
3592     {
3593     case R_390_RELATIVE:
3594       return reloc_class_relative;
3595     case R_390_JMP_SLOT:
3596       return reloc_class_plt;
3597     case R_390_COPY:
3598       return reloc_class_copy;
3599     default:
3600       return reloc_class_normal;
3601     }
3602 }
3603 
3604 /* Finish up the dynamic sections.  */
3605 
3606 static bool
3607 elf_s390_finish_dynamic_sections (bfd *output_bfd,
3608 				  struct bfd_link_info *info)
3609 {
3610   struct elf_s390_link_hash_table *htab;
3611   bfd *dynobj;
3612   asection *sdyn;
3613   bfd *ibfd;
3614   unsigned int i;
3615 
3616   htab = elf_s390_hash_table (info);
3617   dynobj = htab->elf.dynobj;
3618   sdyn = bfd_get_linker_section (dynobj, ".dynamic");
3619 
3620   if (htab->elf.dynamic_sections_created)
3621     {
3622       Elf32_External_Dyn *dyncon, *dynconend;
3623 
3624       if (sdyn == NULL || htab->elf.sgot == NULL)
3625 	abort ();
3626 
3627       dyncon = (Elf32_External_Dyn *) sdyn->contents;
3628       dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
3629       for (; dyncon < dynconend; dyncon++)
3630 	{
3631 	  Elf_Internal_Dyn dyn;
3632 	  asection *s;
3633 
3634 	  bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
3635 
3636 	  switch (dyn.d_tag)
3637 	    {
3638 	    default:
3639 	      continue;
3640 
3641 	    case DT_PLTGOT:
3642 	      s = htab->elf.sgotplt;
3643 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3644 	      break;
3645 
3646 	    case DT_JMPREL:
3647 	      s = htab->elf.srelplt;
3648 	      dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
3649 	      break;
3650 
3651 	    case DT_PLTRELSZ:
3652 	      dyn.d_un.d_val = htab->elf.srelplt->size;
3653 	      if (htab->elf.irelplt)
3654 		dyn.d_un.d_val += htab->elf.irelplt->size;
3655 	      break;
3656 	    }
3657 
3658 	  bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
3659 	}
3660 
3661       /* Fill in the special first entry in the procedure linkage table.  */
3662       if (htab->elf.splt && htab->elf.splt->size > 0)
3663 	{
3664 	  memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
3665 	  if (bfd_link_pic (info))
3666 	    {
3667 	      memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
3668 		      PLT_FIRST_ENTRY_SIZE);
3669 	    }
3670 	  else
3671 	    {
3672 	      memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
3673 		      PLT_FIRST_ENTRY_SIZE);
3674 	      bfd_put_32 (output_bfd,
3675 			  htab->elf.sgotplt->output_section->vma
3676 			  + htab->elf.sgotplt->output_offset,
3677 			  htab->elf.splt->contents + 24);
3678 	    }
3679 	  elf_section_data (htab->elf.splt->output_section)
3680 	    ->this_hdr.sh_entsize = 4;
3681 	}
3682 
3683     }
3684 
3685   if (htab->elf.sgotplt)
3686     {
3687       /* Fill in the first three entries in the global offset table.  */
3688       if (htab->elf.sgotplt->size > 0)
3689 	{
3690 	  bfd_put_32 (output_bfd,
3691 		      (sdyn == NULL ? (bfd_vma) 0
3692 		       : sdyn->output_section->vma + sdyn->output_offset),
3693 		      htab->elf.sgotplt->contents);
3694 	  /* One entry for shared object struct ptr.  */
3695 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
3696 	  /* One entry for _dl_runtime_resolve.  */
3697 	  bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
3698 	}
3699 
3700       elf_section_data (htab->elf.sgotplt->output_section)
3701 	->this_hdr.sh_entsize = 4;
3702     }
3703   /* Finish dynamic symbol for local IFUNC symbols.  */
3704   for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
3705     {
3706       struct plt_entry *local_plt;
3707       Elf_Internal_Sym *isym;
3708       Elf_Internal_Shdr *symtab_hdr;
3709 
3710       symtab_hdr = &elf_symtab_hdr (ibfd);
3711 
3712       if (!is_s390_elf (ibfd))
3713 	continue;
3714 
3715       local_plt = elf_s390_local_plt (ibfd);
3716       if (local_plt != NULL)
3717 	for (i = 0; i < symtab_hdr->sh_info; i++)
3718 	  {
3719 	    if (local_plt[i].plt.offset != (bfd_vma) -1)
3720 	      {
3721 		asection *sec = local_plt[i].sec;
3722 		isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, ibfd, i);
3723 		if (isym == NULL)
3724 		  return false;
3725 
3726 		if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3727 		  elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3728 						local_plt[i].plt.offset,
3729 						isym->st_value
3730 						+ sec->output_section->vma
3731 						+ sec->output_offset);
3732 
3733 	      }
3734 	  }
3735     }
3736   return true;
3737 }
3738 
3739 /* Support for core dump NOTE sections.  */
3740 
3741 static bool
3742 elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
3743 {
3744   int offset;
3745   unsigned int size;
3746 
3747   switch (note->descsz)
3748     {
3749     default:
3750       return false;
3751 
3752     case 224:			/* S/390 Linux.  */
3753       /* pr_cursig */
3754       elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3755 
3756       /* pr_pid */
3757       elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
3758 
3759       /* pr_reg */
3760       offset = 72;
3761       size = 144;
3762       break;
3763     }
3764 
3765   /* Make a ".reg/999" section.  */
3766   return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3767 					  size, note->descpos + offset);
3768 }
3769 
3770 static bool
3771 elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3772 {
3773   switch (note->descsz)
3774     {
3775     default:
3776       return false;
3777 
3778     case 124:			/* sizeof(struct elf_prpsinfo) on s390 */
3779       elf_tdata (abfd)->core->pid
3780 	= bfd_get_32 (abfd, note->descdata + 12);
3781       elf_tdata (abfd)->core->program
3782 	= _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
3783       elf_tdata (abfd)->core->command
3784 	= _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
3785       break;
3786     }
3787 
3788   /* Note that for some reason, a spurious space is tacked
3789      onto the end of the args in some (at least one anyway)
3790      implementations, so strip it off if it exists.  */
3791 
3792   {
3793     char *command = elf_tdata (abfd)->core->command;
3794     int n = strlen (command);
3795 
3796     if (0 < n && command[n - 1] == ' ')
3797       command[n - 1] = '\0';
3798   }
3799 
3800   return true;
3801 }
3802 
3803 static char *
3804 elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3805 			  int note_type, ...)
3806 {
3807   va_list ap;
3808 
3809   switch (note_type)
3810     {
3811     default:
3812       return NULL;
3813 
3814     case NT_PRPSINFO:
3815       {
3816 	char data[124] ATTRIBUTE_NONSTRING = { 0 };
3817 	const char *fname, *psargs;
3818 
3819 	va_start (ap, note_type);
3820 	fname = va_arg (ap, const char *);
3821 	psargs = va_arg (ap, const char *);
3822 	va_end (ap);
3823 
3824 	strncpy (data + 28, fname, 16);
3825 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3826 	DIAGNOSTIC_PUSH;
3827 	/* GCC 8.0 and 8.1 warn about 80 equals destination size with
3828 	   -Wstringop-truncation:
3829 	   https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3830 	 */
3831 	DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3832 #endif
3833 	strncpy (data + 44, psargs, 80);
3834 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
3835 	DIAGNOSTIC_POP;
3836 #endif
3837 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3838 				   &data, sizeof (data));
3839       }
3840 
3841     case NT_PRSTATUS:
3842       {
3843 	char data[224] = { 0 };
3844 	long pid;
3845 	int cursig;
3846 	const void *gregs;
3847 
3848 	va_start (ap, note_type);
3849 	pid = va_arg (ap, long);
3850 	cursig = va_arg (ap, int);
3851 	gregs = va_arg (ap, const void *);
3852 	va_end (ap);
3853 
3854 	bfd_put_16 (abfd, cursig, data + 12);
3855 	bfd_put_32 (abfd, pid, data + 24);
3856 	memcpy (data + 72, gregs, 144);
3857 	return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3858 				   &data, sizeof (data));
3859       }
3860     }
3861   /* NOTREACHED */
3862 }
3863 
3864 /* Return address for Ith PLT stub in section PLT, for relocation REL
3865    or (bfd_vma) -1 if it should not be included.  */
3866 
3867 static bfd_vma
3868 elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3869 		      const arelent *rel ATTRIBUTE_UNUSED)
3870 {
3871   return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3872 }
3873 
3874 /* Merge backend specific data from an object file to the output
3875    object file when linking.  */
3876 
3877 static bool
3878 elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3879 {
3880   bfd *obfd = info->output_bfd;
3881 
3882   if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
3883     return true;
3884 
3885   if (!elf_s390_merge_obj_attributes (ibfd, info))
3886     return false;
3887 
3888   elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
3889   return true;
3890 }
3891 
3892 
3893 #define TARGET_BIG_SYM	s390_elf32_vec
3894 #define TARGET_BIG_NAME	"elf32-s390"
3895 #define ELF_ARCH	bfd_arch_s390
3896 #define ELF_TARGET_ID	S390_ELF_DATA
3897 #define ELF_MACHINE_CODE EM_S390
3898 #define ELF_MACHINE_ALT1 EM_S390_OLD
3899 #define ELF_MAXPAGESIZE 0x1000
3900 
3901 #define elf_backend_can_gc_sections	1
3902 #define elf_backend_can_refcount	1
3903 #define elf_backend_want_got_plt	1
3904 #define elf_backend_plt_readonly	1
3905 #define elf_backend_want_plt_sym	0
3906 #define elf_backend_got_header_size	12
3907 #define elf_backend_want_dynrelro	1
3908 #define elf_backend_rela_normal		1
3909 
3910 #define elf_info_to_howto		      elf_s390_info_to_howto
3911 
3912 #define bfd_elf32_bfd_is_local_label_name     elf_s390_is_local_label_name
3913 #define bfd_elf32_bfd_link_hash_table_create  elf_s390_link_hash_table_create
3914 #define bfd_elf32_bfd_reloc_type_lookup	      elf_s390_reloc_type_lookup
3915 #define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
3916 
3917 #define bfd_elf32_bfd_merge_private_bfd_data  elf32_s390_merge_private_bfd_data
3918 
3919 #define elf_backend_adjust_dynamic_symbol     elf_s390_adjust_dynamic_symbol
3920 #define elf_backend_check_relocs	      elf_s390_check_relocs
3921 #define elf_backend_copy_indirect_symbol      elf_s390_copy_indirect_symbol
3922 #define elf_backend_create_dynamic_sections   _bfd_elf_create_dynamic_sections
3923 #define elf_backend_finish_dynamic_sections   elf_s390_finish_dynamic_sections
3924 #define elf_backend_finish_dynamic_symbol     elf_s390_finish_dynamic_symbol
3925 #define elf_backend_gc_mark_hook	      elf_s390_gc_mark_hook
3926 #define elf_backend_reloc_type_class	      elf_s390_reloc_type_class
3927 #define elf_backend_relocate_section	      elf_s390_relocate_section
3928 #define elf_backend_late_size_sections	      elf_s390_late_size_sections
3929 #define elf_backend_init_index_section	      _bfd_elf_init_1_index_section
3930 #define elf_backend_grok_prstatus	      elf_s390_grok_prstatus
3931 #define elf_backend_grok_psinfo		      elf_s390_grok_psinfo
3932 #define elf_backend_write_core_note	      elf_s390_write_core_note
3933 #define elf_backend_plt_sym_val		      elf_s390_plt_sym_val
3934 #define elf_backend_sort_relocs_p	      elf_s390_elf_sort_relocs_p
3935 
3936 #define bfd_elf32_mkobject		elf_s390_mkobject
3937 #define elf_backend_object_p		elf_s390_object_p
3938 
3939 #define elf_backend_linux_prpsinfo32_ugid16	true
3940 
3941 #include "elf32-target.h"
3942