ELF: Move dyn_relocs to struct elf_link_hash_entry
[deliverable/binutils-gdb.git] / bfd / elf32-s390.c
CommitLineData
a85d7ed0 1/* IBM S/390-specific support for 32-bit ELF
b3adc24a 2 Copyright (C) 2000-2020 Free Software Foundation, Inc.
a85d7ed0
NC
3 Contributed by Carl B. Pedersen and Martin Schwidefsky.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
a85d7ed0
NC
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
3e110533 19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
53e09e0a 20 02110-1301, USA. */
a85d7ed0 21
a85d7ed0 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
a85d7ed0
NC
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
a85d7ed0 27#include "elf/s390.h"
e3e9290d 28#include <stdarg.h>
a85d7ed0 29
2c3fc389
NC
30static bfd_reloc_status_type
31s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
32 asection *, bfd *, char **);
33static bfd_reloc_status_type
34s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
35 asection *, bfd *, char **);
36
a85d7ed0
NC
37/* The relocation "howto" table. */
38
39static reloc_howto_type elf_howto_table[] =
40{
41 HOWTO (R_390_NONE, /* type */
42 0, /* rightshift */
6346d5ca 43 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
a85d7ed0 44 0, /* bitsize */
b34976b6 45 FALSE, /* pc_relative */
a85d7ed0
NC
46 0, /* bitpos */
47 complain_overflow_dont, /* complain_on_overflow */
48 bfd_elf_generic_reloc, /* special_function */
49 "R_390_NONE", /* name */
b34976b6 50 FALSE, /* partial_inplace */
a85d7ed0
NC
51 0, /* src_mask */
52 0, /* dst_mask */
b34976b6
AM
53 FALSE), /* pcrel_offset */
54
07d6d2b8
AM
55 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
56 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
57 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
58 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
59 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
60 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
61 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
62 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
5236c819 63 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
07d6d2b8 64 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
15f8604d 65 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
07d6d2b8 66 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
5236c819 67 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
07d6d2b8 68 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
5236c819 69 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
07d6d2b8
AM
70 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
71 HOWTO(R_390_COPY, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
72 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,0xffffffff, FALSE),
73 HOWTO(R_390_GLOB_DAT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
5236c819 74 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,0xffffffff, FALSE),
07d6d2b8 75 HOWTO(R_390_JMP_SLOT, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
5236c819 76 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,0xffffffff, FALSE),
07d6d2b8 77 HOWTO(R_390_RELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
5236c819 78 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,0xffffffff, FALSE),
07d6d2b8 79 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
5236c819 80 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,0xffffffff, FALSE),
07d6d2b8
AM
81 HOWTO(R_390_GOTPC, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
82 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,0xffffffff, TRUE),
83 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
84 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
85 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
86 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
87 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
88 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
89 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
5236c819
MS
90 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
91 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
07d6d2b8 92 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
5236c819
MS
93 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
94 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
07d6d2b8 95 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
5236c819
MS
96 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,0xffffffff, TRUE),
97 EMPTY_HOWTO (R_390_64), /* Empty entry for R_390_64. */
98 EMPTY_HOWTO (R_390_PC64), /* Empty entry for R_390_PC64. */
99 EMPTY_HOWTO (R_390_GOT64), /* Empty entry for R_390_GOT64. */
100 EMPTY_HOWTO (R_390_PLT64), /* Empty entry for R_390_PLT64. */
101 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
07d6d2b8
AM
102 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,0xffffffff, TRUE),
103 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
5236c819
MS
104 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
105 EMPTY_HOWTO (R_390_GOTOFF64), /* Empty entry for R_390_GOTOFF64. */
07d6d2b8 106 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
5236c819 107 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
07d6d2b8 108 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
5236c819 109 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
07d6d2b8 110 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
5236c819
MS
111 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
112 EMPTY_HOWTO (R_390_GOTPLT64), /* Empty entry for R_390_GOTPLT64. */
113 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
114 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,0xffffffff, TRUE),
07d6d2b8 115 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
5236c819 116 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
07d6d2b8 117 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
5236c819
MS
118 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
119 EMPTY_HOWTO (R_390_PLTOFF64), /* Empty entry for R_390_PLTOFF64. */
69fc87f1
MS
120 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
121 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
122 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
123 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
124 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
125 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
126 HOWTO(R_390_TLS_GD32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_TLS_GD32", FALSE, 0, 0xffffffff, FALSE),
128 EMPTY_HOWTO (R_390_TLS_GD64), /* Empty entry for R_390_TLS_GD64. */
129 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
130 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
131 HOWTO(R_390_TLS_GOTIE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
132 bfd_elf_generic_reloc, "R_390_TLS_GOTIE32", FALSE, 0, 0xffffffff, FALSE),
133 EMPTY_HOWTO (R_390_TLS_GOTIE64), /* Empty entry for R_390_TLS_GOTIE64. */
134 HOWTO(R_390_TLS_LDM32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
135 bfd_elf_generic_reloc, "R_390_TLS_LDM32", FALSE, 0, 0xffffffff, FALSE),
136 EMPTY_HOWTO (R_390_TLS_LDM64), /* Empty entry for R_390_TLS_LDM64. */
137 HOWTO(R_390_TLS_IE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_IE32", FALSE, 0, 0xffffffff, FALSE),
139 EMPTY_HOWTO (R_390_TLS_IE64), /* Empty entry for R_390_TLS_IE64. */
140 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
141 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, 0xffffffff, TRUE),
142 HOWTO(R_390_TLS_LE32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_LE32", FALSE, 0, 0xffffffff, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LE64), /* Empty entry for R_390_TLS_LE64. */
145 HOWTO(R_390_TLS_LDO32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDO32", FALSE, 0, 0xffffffff, FALSE),
147 EMPTY_HOWTO (R_390_TLS_LDO64), /* Empty entry for R_390_TLS_LDO64. */
148 HOWTO(R_390_TLS_DTPMOD, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, 0xffffffff, FALSE),
150 HOWTO(R_390_TLS_DTPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, 0xffffffff, FALSE),
152 HOWTO(R_390_TLS_TPOFF, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
153 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, 0xffffffff, FALSE),
07d6d2b8 154 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
bd1ea41b
MS
155 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
156 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
157 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
07d6d2b8 158 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
bd1ea41b
MS
159 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
160 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
161 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
470b557a
AK
162 HOWTO(R_390_IRELATIVE, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, 0xffffffff, FALSE),
07d6d2b8
AM
164 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
165 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
fb798c50
AK
166 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
167 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
07d6d2b8
AM
168 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
169 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
fb798c50
AK
170 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
171 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
a85d7ed0
NC
172};
173
174/* GNU extension to record C++ vtable hierarchy. */
175static reloc_howto_type elf32_s390_vtinherit_howto =
b34976b6 176 HOWTO (R_390_GNU_VTINHERIT, 0,2,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
a85d7ed0 177static reloc_howto_type elf32_s390_vtentry_howto =
b34976b6 178 HOWTO (R_390_GNU_VTENTRY, 0,2,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
a85d7ed0
NC
179
180static reloc_howto_type *
2c3fc389
NC
181elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
182 bfd_reloc_code_real_type code)
a85d7ed0 183{
ec338859 184 switch (code)
0451c93c
MS
185 {
186 case BFD_RELOC_NONE:
187 return &elf_howto_table[(int) R_390_NONE];
188 case BFD_RELOC_8:
189 return &elf_howto_table[(int) R_390_8];
190 case BFD_RELOC_390_12:
191 return &elf_howto_table[(int) R_390_12];
192 case BFD_RELOC_16:
193 return &elf_howto_table[(int) R_390_16];
194 case BFD_RELOC_32:
195 return &elf_howto_table[(int) R_390_32];
196 case BFD_RELOC_CTOR:
197 return &elf_howto_table[(int) R_390_32];
198 case BFD_RELOC_32_PCREL:
199 return &elf_howto_table[(int) R_390_PC32];
200 case BFD_RELOC_390_GOT12:
201 return &elf_howto_table[(int) R_390_GOT12];
202 case BFD_RELOC_32_GOT_PCREL:
203 return &elf_howto_table[(int) R_390_GOT32];
204 case BFD_RELOC_390_PLT32:
205 return &elf_howto_table[(int) R_390_PLT32];
206 case BFD_RELOC_390_COPY:
207 return &elf_howto_table[(int) R_390_COPY];
208 case BFD_RELOC_390_GLOB_DAT:
209 return &elf_howto_table[(int) R_390_GLOB_DAT];
210 case BFD_RELOC_390_JMP_SLOT:
211 return &elf_howto_table[(int) R_390_JMP_SLOT];
212 case BFD_RELOC_390_RELATIVE:
213 return &elf_howto_table[(int) R_390_RELATIVE];
214 case BFD_RELOC_32_GOTOFF:
5236c819 215 return &elf_howto_table[(int) R_390_GOTOFF32];
0451c93c
MS
216 case BFD_RELOC_390_GOTPC:
217 return &elf_howto_table[(int) R_390_GOTPC];
218 case BFD_RELOC_390_GOT16:
219 return &elf_howto_table[(int) R_390_GOT16];
220 case BFD_RELOC_16_PCREL:
221 return &elf_howto_table[(int) R_390_PC16];
fb798c50
AK
222 case BFD_RELOC_390_PC12DBL:
223 return &elf_howto_table[(int) R_390_PC12DBL];
224 case BFD_RELOC_390_PLT12DBL:
225 return &elf_howto_table[(int) R_390_PLT12DBL];
0451c93c
MS
226 case BFD_RELOC_390_PC16DBL:
227 return &elf_howto_table[(int) R_390_PC16DBL];
228 case BFD_RELOC_390_PLT16DBL:
229 return &elf_howto_table[(int) R_390_PLT16DBL];
fb798c50
AK
230 case BFD_RELOC_390_PC24DBL:
231 return &elf_howto_table[(int) R_390_PC24DBL];
232 case BFD_RELOC_390_PLT24DBL:
233 return &elf_howto_table[(int) R_390_PLT24DBL];
befc3abb
MS
234 case BFD_RELOC_390_PC32DBL:
235 return &elf_howto_table[(int) R_390_PC32DBL];
236 case BFD_RELOC_390_PLT32DBL:
237 return &elf_howto_table[(int) R_390_PLT32DBL];
238 case BFD_RELOC_390_GOTPCDBL:
239 return &elf_howto_table[(int) R_390_GOTPCDBL];
240 case BFD_RELOC_390_GOTENT:
241 return &elf_howto_table[(int) R_390_GOTENT];
5236c819
MS
242 case BFD_RELOC_16_GOTOFF:
243 return &elf_howto_table[(int) R_390_GOTOFF16];
244 case BFD_RELOC_390_GOTPLT12:
245 return &elf_howto_table[(int) R_390_GOTPLT12];
246 case BFD_RELOC_390_GOTPLT16:
247 return &elf_howto_table[(int) R_390_GOTPLT16];
248 case BFD_RELOC_390_GOTPLT32:
249 return &elf_howto_table[(int) R_390_GOTPLT32];
250 case BFD_RELOC_390_GOTPLTENT:
251 return &elf_howto_table[(int) R_390_GOTPLTENT];
252 case BFD_RELOC_390_PLTOFF16:
253 return &elf_howto_table[(int) R_390_PLTOFF16];
254 case BFD_RELOC_390_PLTOFF32:
255 return &elf_howto_table[(int) R_390_PLTOFF32];
69fc87f1
MS
256 case BFD_RELOC_390_TLS_LOAD:
257 return &elf_howto_table[(int) R_390_TLS_LOAD];
258 case BFD_RELOC_390_TLS_GDCALL:
259 return &elf_howto_table[(int) R_390_TLS_GDCALL];
260 case BFD_RELOC_390_TLS_LDCALL:
261 return &elf_howto_table[(int) R_390_TLS_LDCALL];
262 case BFD_RELOC_390_TLS_GD32:
263 return &elf_howto_table[(int) R_390_TLS_GD32];
264 case BFD_RELOC_390_TLS_GOTIE12:
265 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
266 case BFD_RELOC_390_TLS_GOTIE32:
267 return &elf_howto_table[(int) R_390_TLS_GOTIE32];
268 case BFD_RELOC_390_TLS_LDM32:
269 return &elf_howto_table[(int) R_390_TLS_LDM32];
270 case BFD_RELOC_390_TLS_IE32:
271 return &elf_howto_table[(int) R_390_TLS_IE32];
272 case BFD_RELOC_390_TLS_IEENT:
273 return &elf_howto_table[(int) R_390_TLS_IEENT];
274 case BFD_RELOC_390_TLS_LE32:
275 return &elf_howto_table[(int) R_390_TLS_LE32];
276 case BFD_RELOC_390_TLS_LDO32:
277 return &elf_howto_table[(int) R_390_TLS_LDO32];
278 case BFD_RELOC_390_TLS_DTPMOD:
279 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
280 case BFD_RELOC_390_TLS_DTPOFF:
281 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
282 case BFD_RELOC_390_TLS_TPOFF:
283 return &elf_howto_table[(int) R_390_TLS_TPOFF];
bd1ea41b
MS
284 case BFD_RELOC_390_20:
285 return &elf_howto_table[(int) R_390_20];
286 case BFD_RELOC_390_GOT20:
287 return &elf_howto_table[(int) R_390_GOT20];
288 case BFD_RELOC_390_GOTPLT20:
289 return &elf_howto_table[(int) R_390_GOTPLT20];
290 case BFD_RELOC_390_TLS_GOTIE20:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
470b557a
AK
292 case BFD_RELOC_390_IRELATIVE:
293 return &elf_howto_table[(int) R_390_IRELATIVE];
0451c93c
MS
294 case BFD_RELOC_VTABLE_INHERIT:
295 return &elf32_s390_vtinherit_howto;
296 case BFD_RELOC_VTABLE_ENTRY:
297 return &elf32_s390_vtentry_howto;
298 default:
299 break;
300 }
a85d7ed0
NC
301 return 0;
302}
303
157090f7
AM
304static reloc_howto_type *
305elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
306 const char *r_name)
307{
308 unsigned int i;
309
310 for (i = 0; i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]); i++)
311 if (elf_howto_table[i].name != NULL
312 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
313 return &elf_howto_table[i];
314
315 if (strcasecmp (elf32_s390_vtinherit_howto.name, r_name) == 0)
316 return &elf32_s390_vtinherit_howto;
317 if (strcasecmp (elf32_s390_vtentry_howto.name, r_name) == 0)
318 return &elf32_s390_vtentry_howto;
319
320 return NULL;
321}
322
a85d7ed0
NC
323/* We need to use ELF32_R_TYPE so we have our own copy of this function,
324 and elf32-s390.c has its own copy. */
325
f3185997
NC
326static bfd_boolean
327elf_s390_info_to_howto (bfd *abfd,
2c3fc389
NC
328 arelent *cache_ptr,
329 Elf_Internal_Rela *dst)
a85d7ed0 330{
d0fb9a8d 331 unsigned int r_type = ELF32_R_TYPE(dst->r_info);
f3185997 332
d0fb9a8d 333 switch (r_type)
a85d7ed0
NC
334 {
335 case R_390_GNU_VTINHERIT:
336 cache_ptr->howto = &elf32_s390_vtinherit_howto;
337 break;
338
339 case R_390_GNU_VTENTRY:
340 cache_ptr->howto = &elf32_s390_vtentry_howto;
341 break;
342
343 default:
d0fb9a8d
JJ
344 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
345 {
695344c0 346 /* xgettext:c-format */
0aa13fee
AM
347 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
348 abfd, r_type);
f3185997
NC
349 bfd_set_error (bfd_error_bad_value);
350 return FALSE;
d0fb9a8d
JJ
351 }
352 cache_ptr->howto = &elf_howto_table[r_type];
dc810e39 353 }
f3185997
NC
354
355 return TRUE;
a85d7ed0
NC
356}
357
69fc87f1
MS
358/* A relocation function which doesn't do anything. */
359static bfd_reloc_status_type
2c3fc389
NC
360s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
361 arelent *reloc_entry,
362 asymbol *symbol ATTRIBUTE_UNUSED,
363 void * data ATTRIBUTE_UNUSED,
364 asection *input_section,
365 bfd *output_bfd,
366 char **error_message ATTRIBUTE_UNUSED)
69fc87f1
MS
367{
368 if (output_bfd)
369 reloc_entry->address += input_section->output_offset;
370 return bfd_reloc_ok;
371}
372
bd1ea41b
MS
373/* Handle the large displacement relocs. */
374static bfd_reloc_status_type
2c3fc389
NC
375s390_elf_ldisp_reloc (bfd *abfd ATTRIBUTE_UNUSED,
376 arelent *reloc_entry,
377 asymbol *symbol,
378 void * data ATTRIBUTE_UNUSED,
379 asection *input_section,
380 bfd *output_bfd,
381 char **error_message ATTRIBUTE_UNUSED)
bd1ea41b
MS
382{
383 reloc_howto_type *howto = reloc_entry->howto;
384 bfd_vma relocation;
385 bfd_vma insn;
68ffbac6 386
bd1ea41b
MS
387 if (output_bfd != (bfd *) NULL
388 && (symbol->flags & BSF_SECTION_SYM) == 0
389 && (! howto->partial_inplace
390 || reloc_entry->addend == 0))
391 {
392 reloc_entry->address += input_section->output_offset;
393 return bfd_reloc_ok;
394 }
68ffbac6 395
bd1ea41b
MS
396 if (output_bfd != NULL)
397 return bfd_reloc_continue;
68ffbac6 398
07515404 399 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
bd1ea41b 400 return bfd_reloc_outofrange;
68ffbac6 401
bd1ea41b
MS
402 relocation = (symbol->value
403 + symbol->section->output_section->vma
404 + symbol->section->output_offset);
405 relocation += reloc_entry->addend;
406 if (howto->pc_relative)
407 {
408 relocation -= (input_section->output_section->vma
409 + input_section->output_offset);
410 relocation -= reloc_entry->address;
411 }
68ffbac6 412
bd1ea41b
MS
413 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
414 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
415 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
68ffbac6 416
bd1ea41b
MS
417 if ((bfd_signed_vma) relocation < - 0x80000
418 || (bfd_signed_vma) relocation > 0x7ffff)
419 return bfd_reloc_overflow;
420 else
421 return bfd_reloc_ok;
422}
423
b34976b6 424static bfd_boolean
2c3fc389 425elf_s390_is_local_label_name (bfd *abfd, const char *name)
a85d7ed0
NC
426{
427 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
b34976b6 428 return TRUE;
a85d7ed0
NC
429
430 return _bfd_elf_is_local_label_name (abfd, name);
431}
432
433/* Functions for the 390 ELF linker. */
434
435/* The name of the dynamic interpreter. This is put in the .interp
436 section. */
437
87049b0d 438#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
a85d7ed0 439
64285810
MS
440/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
441 copying dynamic variables from a shared lib into an app's dynbss
442 section, and instead use a dynamic relocation to point into the
443 shared lib. */
444#define ELIMINATE_COPY_RELOCS 1
445
a85d7ed0
NC
446/* The size in bytes of the first entry in the procedure linkage table. */
447#define PLT_FIRST_ENTRY_SIZE 32
448/* The size in bytes of an entry in the procedure linkage table. */
dc810e39 449#define PLT_ENTRY_SIZE 32
a85d7ed0
NC
450
451#define GOT_ENTRY_SIZE 4
452
470b557a
AK
453#define RELA_ENTRY_SIZE sizeof (Elf32_External_Rela)
454
a85d7ed0
NC
455/* The first three entries in a procedure linkage table are reserved,
456 and the initial contents are unimportant (we zero them out).
457 Subsequent entries look like this. See the SVR4 ABI 386
458 supplement to see how this works. */
459
460/* For the s390, simple addr offset can only be 0 - 4096.
461 To use the full 2 GB address space, several instructions
462 are needed to load an address in a register and execute
463 a branch( or just saving the address)
464
dc810e39 465 Furthermore, only r 0 and 1 are free to use!!! */
a85d7ed0
NC
466
467/* The first 3 words in the GOT are then reserved.
468 Word 0 is the address of the dynamic table.
469 Word 1 is a pointer to a structure describing the object
470 Word 2 is used to point to the loader entry address.
471
4cc11e76 472 The code for position independent PLT entries looks like this:
a85d7ed0
NC
473
474 r12 holds addr of the current GOT at entry to the PLT
475
476 The GOT holds the address in the PLT to be executed.
477 The loader then gets:
478 24(15) = Pointer to the structure describing the object.
a7e28bbe 479 28(15) = Offset into rela.plt
a85d7ed0
NC
480
481 The loader must then find the module where the function is
482 and insert the address in the GOT.
483
484 Note: 390 can only address +- 64 K relative.
07d6d2b8
AM
485 We check if offset > 65536, then make a relative branch -64xxx
486 back to a previous defined branch
487
488PLT1: BASR 1,0 # 2 bytes
489 L 1,22(1) # 4 bytes Load offset in GOT in r 1
490 L 1,(1,12) # 4 bytes Load address from GOT in r1
491 BCR 15,1 # 2 bytes Jump to address
492RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
493 L 1,14(1) # 4 bytes Load offset in symol table in r1
a85d7ed0 494 BRC 15,-x # 4 bytes Jump to start of PLT
07d6d2b8
AM
495 .word 0 # 2 bytes filler
496 .long ? # 4 bytes offset in GOT
497 .long ? # 4 bytes offset into rela.plt
a85d7ed0
NC
498
499 This was the general case. There are two additional, optimizes PLT
500 definitions. One for GOT offsets < 4096 and one for GOT offsets < 32768.
501 First the one for GOT offsets < 4096:
502
07d6d2b8
AM
503PLT1: L 1,<offset>(12) # 4 bytes Load address from GOT in R1
504 BCR 15,1 # 2 bytes Jump to address
505 .word 0,0,0 # 6 bytes filler
506RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
507 L 1,14(1) # 4 bytes Load offset in rela.plt in r1
508 BRC 15,-x # 4 bytes Jump to start of PLT
509 .word 0,0,0 # 6 bytes filler
510 .long ? # 4 bytes offset into rela.plt
a85d7ed0
NC
511
512 Second the one for GOT offsets < 32768:
513
07d6d2b8
AM
514PLT1: LHI 1,<offset> # 4 bytes Load offset in GOT to r1
515 L 1,(1,12) # 4 bytes Load address from GOT to r1
516 BCR 15,1 # 2 bytes Jump to address
517 .word 0 # 2 bytes filler
518RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
519 L 1,14(1) # 4 bytes Load offset in rela.plt in r1
520 BRC 15,-x # 4 bytes Jump to start of PLT
521 .word 0,0,0 # 6 bytes filler
522 .long ? # 4 bytes offset into rela.plt
a85d7ed0
NC
523
524Total = 32 bytes per PLT entry
525
526 The code for static build PLT entries looks like this:
527
07d6d2b8
AM
528PLT1: BASR 1,0 # 2 bytes
529 L 1,22(1) # 4 bytes Load address of GOT entry
530 L 1,0(0,1) # 4 bytes Load address from GOT in r1
531 BCR 15,1 # 2 bytes Jump to address
532RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
533 L 1,14(1) # 4 bytes Load offset in symbol table in r1
a85d7ed0 534 BRC 15,-x # 4 bytes Jump to start of PLT
07d6d2b8
AM
535 .word 0 # 2 bytes filler
536 .long ? # 4 bytes address of GOT entry
537 .long ? # 4 bytes offset into rela.plt */
a85d7ed0 538
9aa17453
AK
539static const bfd_byte elf_s390_plt_entry[PLT_ENTRY_SIZE] =
540 {
07d6d2b8
AM
541 0x0d, 0x10, /* basr %r1,%r0 */
542 0x58, 0x10, 0x10, 0x16, /* l %r1,22(%r1) */
543 0x58, 0x10, 0x10, 0x00, /* l %r1,0(%r1) */
544 0x07, 0xf1, /* br %r1 */
545 0x0d, 0x10, /* basr %r1,%r0 */
546 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
547 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
548 0x00, 0x00, /* padding */
549 0x00, 0x00, 0x00, 0x00, /* GOT offset */
550 0x00, 0x00, 0x00, 0x00 /* rela.plt offset */
9aa17453
AK
551 };
552
553/* Generic PLT pic entry. */
554static const bfd_byte elf_s390_plt_pic_entry[PLT_ENTRY_SIZE] =
555 {
07d6d2b8
AM
556 0x0d, 0x10, /* basr %r1,%r0 */
557 0x58, 0x10, 0x10, 0x16, /* l %r1,22(%r1) */
558 0x58, 0x11, 0xc0, 0x00, /* l %r1,0(%r1,%r12) */
559 0x07, 0xf1, /* br %r1 */
560 0x0d, 0x10, /* basr %r1,%r0 */
561 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
562 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
563 0x00, 0x00, /* padding */
564 0x00, 0x00, 0x00, 0x00, /* GOT offset */
565 0x00, 0x00, 0x00, 0x00 /* rela.plt offset */
9aa17453
AK
566 };
567
568/* Optimized PLT pic entry for GOT offset < 4k. xx will be replaced
569 when generating the PLT slot with the GOT offset. */
570static const bfd_byte elf_s390_plt_pic12_entry[PLT_ENTRY_SIZE] =
571 {
07d6d2b8
AM
572 0x58, 0x10, 0xc0, 0x00, /* l %r1,xx(%r12) */
573 0x07, 0xf1, /* br %r1 */
574 0x00, 0x00, 0x00, 0x00, /* padding */
9aa17453 575 0x00, 0x00,
07d6d2b8
AM
576 0x0d, 0x10, /* basr %r1,%r0 */
577 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
578 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
9aa17453
AK
579 0x00, 0x00, 0x00, 0x00,
580 0x00, 0x00, 0x00, 0x00
581 };
582
583/* Optimized PLT pic entry for GOT offset < 32k. xx will be replaced
584 when generating the PLT slot with the GOT offset. */
585static const bfd_byte elf_s390_plt_pic16_entry[PLT_ENTRY_SIZE] =
586 {
07d6d2b8
AM
587 0xa7, 0x18, 0x00, 0x00, /* lhi %r1,xx */
588 0x58, 0x11, 0xc0, 0x00, /* l %r1,0(%r1,%r12) */
589 0x07, 0xf1, /* br %r1 */
9aa17453 590 0x00, 0x00,
07d6d2b8
AM
591 0x0d, 0x10, /* basr %r1,%r0 */
592 0x58, 0x10, 0x10, 0x0e, /* l %r1,14(%r1) */
593 0xa7, 0xf4, 0x00, 0x00, /* j first plt */
9aa17453
AK
594 0x00, 0x00, 0x00, 0x00,
595 0x00, 0x00, 0x00, 0x00,
596 0x00, 0x00
597 };
a85d7ed0 598
a7e28bbe 599/* The first PLT entry pushes the offset into the rela.plt
a85d7ed0
NC
600 from R1 onto the stack at 8(15) and the loader object info
601 at 12(15), loads the loader address in R1 and jumps to it. */
602
603/* The first entry in the PLT for PIC code:
604
605PLT0:
07d6d2b8
AM
606 ST 1,28(15) # R1 has offset into rela.plt
607 L 1,4(12) # Get loader ino(object struct address)
608 ST 1,24(15) # Store address
609 L 1,8(12) # Entry address of loader in R1
610 BR 1 # Jump to loader
a85d7ed0
NC
611
612 The first entry in the PLT for static code:
613
614PLT0:
07d6d2b8 615 ST 1,28(15) # R1 has offset into rela.plt
a85d7ed0 616 BASR 1,0
07d6d2b8
AM
617 L 1,18(0,1) # Get address of GOT
618 MVC 24(4,15),4(1) # Move loader ino to stack
619 L 1,8(1) # Get address of loader
620 BR 1 # Jump to loader
621 .word 0 # filler
622 .long got # address of GOT */
a85d7ed0 623
9aa17453
AK
624static const bfd_byte elf_s390_plt_first_entry[PLT_FIRST_ENTRY_SIZE] =
625 {
07d6d2b8
AM
626 0x50, 0x10, 0xf0, 0x1c, /* st %r1,28(%r15) */
627 0x0d, 0x10, /* basr %r1,%r0 */
628 0x58, 0x10, 0x10, 0x12, /* l %r1,18(%r1) */
629 0xd2, 0x03, 0xf0, 0x18, 0x10, 0x04, /* mvc 24(4,%r15),4(%r1) */
630 0x58, 0x10, 0x10, 0x08, /* l %r1,8(%r1) */
631 0x07, 0xf1, /* br %r1 */
9aa17453
AK
632 0x00, 0x00, 0x00, 0x00,
633 0x00, 0x00, 0x00, 0x00,
634 0x00, 0x00
635 };
636
637static const bfd_byte elf_s390_plt_pic_first_entry[PLT_FIRST_ENTRY_SIZE] =
638 {
07d6d2b8
AM
639 0x50, 0x10, 0xf0, 0x1c, /* st %r1,28(%r15) */
640 0x58, 0x10, 0xc0, 0x04, /* l %r1,4(%r12) */
641 0x50, 0x10, 0xf0, 0x18, /* st %r1,24(%r15) */
642 0x58, 0x10, 0xc0, 0x08, /* l %r1,8(%r12) */
643 0x07, 0xf1, /* br %r1 */
9aa17453
AK
644 0x00, 0x00, 0x00, 0x00,
645 0x00, 0x00, 0x00, 0x00,
646 0x00, 0x00, 0x00, 0x00,
647 0x00, 0x00
648 };
a85d7ed0 649
a85d7ed0
NC
650
651/* s390 ELF linker hash entry. */
652
653struct elf_s390_link_hash_entry
654{
0451c93c 655 struct elf_link_hash_entry elf;
a85d7ed0 656
5236c819
MS
657 /* Number of GOTPLT references for a function. */
658 bfd_signed_vma gotplt_refcount;
69fc87f1
MS
659
660#define GOT_UNKNOWN 0
661#define GOT_NORMAL 1
662#define GOT_TLS_GD 2
663#define GOT_TLS_IE 3
664#define GOT_TLS_IE_NLT 4
665 unsigned char tls_type;
470b557a
AK
666
667 /* For pointer equality reasons we might need to change the symbol
668 type from STT_GNU_IFUNC to STT_FUNC together with its value and
669 section entry. So after alloc_dynrelocs only these values should
670 be used. In order to check whether a symbol is IFUNC use
671 s390_is_ifunc_symbol_p. */
672 bfd_vma ifunc_resolver_address;
673 asection *ifunc_resolver_section;
a85d7ed0
NC
674};
675
69fc87f1
MS
676#define elf_s390_hash_entry(ent) \
677 ((struct elf_s390_link_hash_entry *)(ent))
678
470b557a
AK
679/* This structure represents an entry in the local PLT list needed for
680 local IFUNC symbols. */
681struct plt_entry
682{
683 /* The section of the local symbol.
684 Set in relocate_section and used in finish_dynamic_sections. */
685 asection *sec;
686
687 union
688 {
689 bfd_signed_vma refcount;
690 bfd_vma offset;
691 } plt;
692};
693
0ffa91dd
NC
694/* NOTE: Keep this structure in sync with
695 the one declared in elf64-s390.c. */
69fc87f1
MS
696struct elf_s390_obj_tdata
697{
698 struct elf_obj_tdata root;
699
470b557a
AK
700 /* A local PLT is needed for ifunc symbols. */
701 struct plt_entry *local_plt;
702
0ffa91dd 703 /* TLS type for each local got entry. */
69fc87f1
MS
704 char *local_got_tls_type;
705};
706
707#define elf_s390_tdata(abfd) \
708 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
709
470b557a
AK
710#define elf_s390_local_plt(abfd) \
711 (elf_s390_tdata (abfd)->local_plt)
712
69fc87f1
MS
713#define elf_s390_local_got_tls_type(abfd) \
714 (elf_s390_tdata (abfd)->local_got_tls_type)
715
0ffa91dd
NC
716#define is_s390_elf(bfd) \
717 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
718 && elf_tdata (bfd) != NULL \
4dfe6ac6 719 && elf_object_id (bfd) == S390_ELF_DATA)
0ffa91dd 720
69fc87f1 721static bfd_boolean
62d7a5f6 722elf_s390_mkobject (bfd *abfd)
69fc87f1 723{
0ffa91dd 724 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
4dfe6ac6 725 S390_ELF_DATA);
69fc87f1
MS
726}
727
728static bfd_boolean
2c3fc389 729elf_s390_object_p (bfd *abfd)
69fc87f1 730{
69fc87f1
MS
731 /* Set the right machine number for an s390 elf32 file. */
732 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_31);
733}
734
a85d7ed0
NC
735/* s390 ELF linker hash table. */
736
737struct elf_s390_link_hash_table
738{
0451c93c 739 struct elf_link_hash_table elf;
a85d7ed0 740
0451c93c 741 /* Short-cuts to get to dynamic linker sections. */
470b557a 742 asection *irelifunc;
ec338859 743
2c3fc389
NC
744 union
745 {
69fc87f1
MS
746 bfd_signed_vma refcount;
747 bfd_vma offset;
748 } tls_ldm_got;
749
87d72d41
AM
750 /* Small local sym cache. */
751 struct sym_cache sym_cache;
0451c93c 752};
a85d7ed0
NC
753
754/* Get the s390 ELF linker hash table from a link_info structure. */
755
756#define elf_s390_hash_table(p) \
4dfe6ac6
NC
757 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
758 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
a85d7ed0 759
470b557a
AK
760#undef ELF64
761#include "elf-s390-common.c"
762
a85d7ed0
NC
763/* Create an entry in an s390 ELF linker hash table. */
764
765static struct bfd_hash_entry *
2c3fc389
NC
766link_hash_newfunc (struct bfd_hash_entry *entry,
767 struct bfd_hash_table *table,
768 const char *string)
a85d7ed0 769{
a85d7ed0
NC
770 /* Allocate the structure if it has not already been allocated by a
771 subclass. */
0451c93c
MS
772 if (entry == NULL)
773 {
774 entry = bfd_hash_allocate (table,
775 sizeof (struct elf_s390_link_hash_entry));
776 if (entry == NULL)
777 return entry;
778 }
ec338859 779
a85d7ed0 780 /* Call the allocation method of the superclass. */
0451c93c
MS
781 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
782 if (entry != NULL)
a85d7ed0 783 {
0451c93c 784 struct elf_s390_link_hash_entry *eh;
ec338859 785
0451c93c 786 eh = (struct elf_s390_link_hash_entry *) entry;
5236c819 787 eh->gotplt_refcount = 0;
69fc87f1 788 eh->tls_type = GOT_UNKNOWN;
470b557a
AK
789 eh->ifunc_resolver_address = 0;
790 eh->ifunc_resolver_section = NULL;
a85d7ed0
NC
791 }
792
0451c93c 793 return entry;
a85d7ed0
NC
794}
795
796/* Create an s390 ELF linker hash table. */
797
798static struct bfd_link_hash_table *
2c3fc389 799elf_s390_link_hash_table_create (bfd *abfd)
a85d7ed0
NC
800{
801 struct elf_s390_link_hash_table *ret;
986f0783 802 size_t amt = sizeof (struct elf_s390_link_hash_table);
a85d7ed0 803
7bf52ea2 804 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
0451c93c 805 if (ret == NULL)
a85d7ed0
NC
806 return NULL;
807
66eb6687 808 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
809 sizeof (struct elf_s390_link_hash_entry),
810 S390_ELF_DATA))
a85d7ed0 811 {
e2d34d7d 812 free (ret);
a85d7ed0
NC
813 return NULL;
814 }
815
0451c93c
MS
816 return &ret->elf.root;
817}
818
0451c93c
MS
819/* Copy the extra info we tack onto an elf_link_hash_entry. */
820
821static void
2c3fc389
NC
822elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
823 struct elf_link_hash_entry *dir,
824 struct elf_link_hash_entry *ind)
0451c93c
MS
825{
826 struct elf_s390_link_hash_entry *edir, *eind;
827
828 edir = (struct elf_s390_link_hash_entry *) dir;
829 eind = (struct elf_s390_link_hash_entry *) ind;
830
190eb1dd 831 if (ind->dyn_relocs != NULL)
0451c93c 832 {
190eb1dd 833 if (dir->dyn_relocs != NULL)
0451c93c 834 {
00d8c7a9
AK
835 struct elf_dyn_relocs **pp;
836 struct elf_dyn_relocs *p;
0451c93c 837
fcfa13d2 838 /* Add reloc counts against the indirect sym to the direct sym
0451c93c 839 list. Merge any entries against the same section. */
190eb1dd 840 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
0451c93c 841 {
00d8c7a9 842 struct elf_dyn_relocs *q;
0451c93c 843
190eb1dd 844 for (q = dir->dyn_relocs; q != NULL; q = q->next)
0451c93c
MS
845 if (q->sec == p->sec)
846 {
847 q->pc_count += p->pc_count;
848 q->count += p->count;
849 *pp = p->next;
850 break;
851 }
852 if (q == NULL)
853 pp = &p->next;
854 }
190eb1dd 855 *pp = dir->dyn_relocs;
0451c93c
MS
856 }
857
190eb1dd
L
858 dir->dyn_relocs = ind->dyn_relocs;
859 ind->dyn_relocs = NULL;
0451c93c
MS
860 }
861
69fc87f1
MS
862 if (ind->root.type == bfd_link_hash_indirect
863 && dir->got.refcount <= 0)
864 {
865 edir->tls_type = eind->tls_type;
866 eind->tls_type = GOT_UNKNOWN;
867 }
868
64285810
MS
869 if (ELIMINATE_COPY_RELOCS
870 && ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
871 && dir->dynamic_adjusted)
872 {
873 /* If called to transfer flags for a weakdef during processing
874 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
875 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
e81830c5
AM
876 if (dir->versioned != versioned_hidden)
877 dir->ref_dynamic |= ind->ref_dynamic;
f5385ebf
AM
878 dir->ref_regular |= ind->ref_regular;
879 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
880 dir->needs_plt |= ind->needs_plt;
881 }
64285810 882 else
fcfa13d2 883 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
0451c93c 884}
a85d7ed0 885
69fc87f1 886static int
2c3fc389
NC
887elf_s390_tls_transition (struct bfd_link_info *info,
888 int r_type,
889 int is_local)
69fc87f1 890{
0e1862bb 891 if (bfd_link_pic (info))
69fc87f1
MS
892 return r_type;
893
894 switch (r_type)
895 {
896 case R_390_TLS_GD32:
897 case R_390_TLS_IE32:
898 if (is_local)
899 return R_390_TLS_LE32;
900 return R_390_TLS_IE32;
901 case R_390_TLS_GOTIE32:
902 if (is_local)
903 return R_390_TLS_LE32;
904 return R_390_TLS_GOTIE32;
905 case R_390_TLS_LDM32:
906 return R_390_TLS_LE32;
907 }
908
909 return r_type;
910}
911
a85d7ed0
NC
912/* Look through the relocs for a section during the first phase, and
913 allocate space in the global offset table or procedure linkage
914 table. */
915
b34976b6 916static bfd_boolean
2c3fc389
NC
917elf_s390_check_relocs (bfd *abfd,
918 struct bfd_link_info *info,
919 asection *sec,
920 const Elf_Internal_Rela *relocs)
a85d7ed0 921{
0451c93c 922 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
923 Elf_Internal_Shdr *symtab_hdr;
924 struct elf_link_hash_entry **sym_hashes;
a85d7ed0
NC
925 const Elf_Internal_Rela *rel;
926 const Elf_Internal_Rela *rel_end;
a85d7ed0 927 asection *sreloc;
5236c819 928 bfd_signed_vma *local_got_refcounts;
69fc87f1 929 int tls_type, old_tls_type;
470b557a 930 Elf_Internal_Sym *isym;
a85d7ed0 931
0e1862bb 932 if (bfd_link_relocatable (info))
b34976b6 933 return TRUE;
a85d7ed0 934
0ffa91dd
NC
935 BFD_ASSERT (is_s390_elf (abfd));
936
0451c93c 937 htab = elf_s390_hash_table (info);
0ffa91dd 938 symtab_hdr = &elf_symtab_hdr (abfd);
a85d7ed0 939 sym_hashes = elf_sym_hashes (abfd);
5236c819 940 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 941
a85d7ed0
NC
942 sreloc = NULL;
943
944 rel_end = relocs + sec->reloc_count;
945 for (rel = relocs; rel < rel_end; rel++)
946 {
69fc87f1 947 unsigned int r_type;
d42c267e 948 unsigned int r_symndx;
a85d7ed0
NC
949 struct elf_link_hash_entry *h;
950
951 r_symndx = ELF32_R_SYM (rel->r_info);
952
0451c93c
MS
953 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
954 {
695344c0 955 /* xgettext:c-format */
871b3ab2 956 _bfd_error_handler (_("%pB: bad symbol index: %d"),
4eca0228 957 abfd, r_symndx);
b34976b6 958 return FALSE;
0451c93c
MS
959 }
960
a85d7ed0 961 if (r_symndx < symtab_hdr->sh_info)
470b557a
AK
962 {
963 /* A local symbol. */
964 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
965 abfd, r_symndx);
966 if (isym == NULL)
967 return FALSE;
968
969 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
970 {
971 struct plt_entry *plt;
972
0cb79d69
AK
973 if (htab->elf.dynobj == NULL)
974 htab->elf.dynobj = abfd;
975
470b557a
AK
976 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
977 return FALSE;
978
979 if (local_got_refcounts == NULL)
980 {
981 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
982 return FALSE;
983 local_got_refcounts = elf_local_got_refcounts (abfd);
984 }
985 plt = elf_s390_local_plt (abfd);
986 plt[r_symndx].plt.refcount++;
987 }
988 h = NULL;
989 }
a85d7ed0 990 else
973a3492
L
991 {
992 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
993 while (h->root.type == bfd_link_hash_indirect
994 || h->root.type == bfd_link_hash_warning)
995 h = (struct elf_link_hash_entry *) h->root.u.i.link;
996 }
a85d7ed0 997
5236c819
MS
998 /* Create got section and local_got_refcounts array if they
999 are needed. */
69fc87f1
MS
1000 r_type = elf_s390_tls_transition (info,
1001 ELF32_R_TYPE (rel->r_info),
1002 h == NULL);
1003 switch (r_type)
a85d7ed0
NC
1004 {
1005 case R_390_GOT12:
5236c819 1006 case R_390_GOT16:
bd1ea41b 1007 case R_390_GOT20:
a85d7ed0 1008 case R_390_GOT32:
befc3abb 1009 case R_390_GOTENT:
5236c819
MS
1010 case R_390_GOTPLT12:
1011 case R_390_GOTPLT16:
bd1ea41b 1012 case R_390_GOTPLT20:
5236c819
MS
1013 case R_390_GOTPLT32:
1014 case R_390_GOTPLTENT:
69fc87f1
MS
1015 case R_390_TLS_GD32:
1016 case R_390_TLS_GOTIE12:
bd1ea41b 1017 case R_390_TLS_GOTIE20:
69fc87f1
MS
1018 case R_390_TLS_GOTIE32:
1019 case R_390_TLS_IEENT:
1020 case R_390_TLS_IE32:
1021 case R_390_TLS_LDM32:
5236c819
MS
1022 if (h == NULL
1023 && local_got_refcounts == NULL)
a85d7ed0 1024 {
470b557a 1025 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
5236c819 1026 return FALSE;
470b557a 1027 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 1028 }
5236c819
MS
1029 /* Fall through. */
1030 case R_390_GOTOFF16:
1031 case R_390_GOTOFF32:
0451c93c 1032 case R_390_GOTPC:
befc3abb 1033 case R_390_GOTPCDBL:
f41345a7 1034 if (htab->elf.sgot == NULL)
0451c93c
MS
1035 {
1036 if (htab->elf.dynobj == NULL)
1037 htab->elf.dynobj = abfd;
ce558b89 1038 if (!_bfd_elf_create_got_section (htab->elf.dynobj, info))
b34976b6 1039 return FALSE;
0451c93c 1040 }
5236c819
MS
1041 }
1042
470b557a
AK
1043 if (h != NULL)
1044 {
1045 if (htab->elf.dynobj == NULL)
1046 htab->elf.dynobj = abfd;
1047 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1048 return FALSE;
1049
1050 /* Make sure an IFUNC symbol defined in a non-shared object
1051 always gets a PLT slot. */
1052 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1053 {
1054 /* The symbol is called by the dynamic loader in order
1055 to resolve the relocation. So it is in fact also
1056 referenced. */
1057 h->ref_regular = 1;
1058 h->needs_plt = 1;
1059 }
1060 }
69fc87f1 1061 switch (r_type)
5236c819 1062 {
5236c819
MS
1063 case R_390_GOTPC:
1064 case R_390_GOTPCDBL:
470b557a
AK
1065 /* These relocs do not need a GOT slot. They just load the
1066 GOT pointer itself or address something else relative to
1067 the GOT. Since the GOT pointer has been set up above we
1068 are done. */
a85d7ed0 1069 break;
01a53584
AK
1070 case R_390_GOTOFF16:
1071 case R_390_GOTOFF32:
1072 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1073 break;
1a0670f3 1074 /* Fall through. */
a85d7ed0 1075
fb798c50 1076 case R_390_PLT12DBL:
26e41594 1077 case R_390_PLT16DBL:
fb798c50 1078 case R_390_PLT24DBL:
26e41594 1079 case R_390_PLT32DBL:
a85d7ed0 1080 case R_390_PLT32:
5236c819
MS
1081 case R_390_PLTOFF16:
1082 case R_390_PLTOFF32:
a85d7ed0 1083 /* This symbol requires a procedure linkage table entry. We
26e41594
AM
1084 actually build the entry in adjust_dynamic_symbol,
1085 because this might be a case of linking PIC code which is
1086 never referenced by a dynamic object, in which case we
1087 don't need to generate a procedure linkage table entry
1088 after all. */
a85d7ed0
NC
1089
1090 /* If this is a local symbol, we resolve it directly without
26e41594 1091 creating a procedure linkage table entry. */
5236c819
MS
1092 if (h != NULL)
1093 {
f5385ebf 1094 h->needs_plt = 1;
5236c819
MS
1095 h->plt.refcount += 1;
1096 }
1097 break;
a85d7ed0 1098
5236c819
MS
1099 case R_390_GOTPLT12:
1100 case R_390_GOTPLT16:
bd1ea41b 1101 case R_390_GOTPLT20:
5236c819
MS
1102 case R_390_GOTPLT32:
1103 case R_390_GOTPLTENT:
1104 /* This symbol requires either a procedure linkage table entry
1105 or an entry in the local got. We actually build the entry
1106 in adjust_dynamic_symbol because whether this is really a
1107 global reference can change and with it the fact if we have
1108 to create a plt entry or a local got entry. To be able to
1109 make a once global symbol a local one we have to keep track
1110 of the number of gotplt references that exist for this
1111 symbol. */
1112 if (h != NULL)
1113 {
1114 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
f5385ebf 1115 h->needs_plt = 1;
5236c819
MS
1116 h->plt.refcount += 1;
1117 }
1118 else
1119 local_got_refcounts[r_symndx] += 1;
a85d7ed0
NC
1120 break;
1121
69fc87f1
MS
1122 case R_390_TLS_LDM32:
1123 htab->tls_ldm_got.refcount += 1;
1124 break;
1125
1126 case R_390_TLS_IE32:
1127 case R_390_TLS_GOTIE12:
bd1ea41b 1128 case R_390_TLS_GOTIE20:
69fc87f1
MS
1129 case R_390_TLS_GOTIE32:
1130 case R_390_TLS_IEENT:
0e1862bb 1131 if (bfd_link_pic (info))
69fc87f1 1132 info->flags |= DF_STATIC_TLS;
ae9a127f 1133 /* Fall through. */
69fc87f1
MS
1134
1135 case R_390_GOT12:
26e41594 1136 case R_390_GOT16:
bd1ea41b 1137 case R_390_GOT20:
69fc87f1
MS
1138 case R_390_GOT32:
1139 case R_390_GOTENT:
1140 case R_390_TLS_GD32:
1141 /* This symbol requires a global offset table entry. */
1142 switch (r_type)
1143 {
1144 default:
1145 case R_390_GOT12:
1146 case R_390_GOT16:
bd1ea41b 1147 case R_390_GOT20:
69fc87f1
MS
1148 case R_390_GOT32:
1149 case R_390_GOTENT:
1150 tls_type = GOT_NORMAL;
1151 break;
1152 case R_390_TLS_GD32:
1153 tls_type = GOT_TLS_GD;
1154 break;
1155 case R_390_TLS_IE32:
1156 case R_390_TLS_GOTIE32:
1157 tls_type = GOT_TLS_IE;
1158 break;
1159 case R_390_TLS_GOTIE12:
bd1ea41b 1160 case R_390_TLS_GOTIE20:
69fc87f1
MS
1161 case R_390_TLS_IEENT:
1162 tls_type = GOT_TLS_IE_NLT;
1163 break;
1164 }
1165
1166 if (h != NULL)
1167 {
1168 h->got.refcount += 1;
1169 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1170 }
1171 else
1172 {
1173 local_got_refcounts[r_symndx] += 1;
1174 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
1175 }
1176 /* If a TLS symbol is accessed using IE at least once,
1177 there is no point to use dynamic model for it. */
1178 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1179 {
1180 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1181 {
4eca0228 1182 _bfd_error_handler
695344c0 1183 /* xgettext:c-format */
871b3ab2 1184 (_("%pB: `%s' accessed both as normal and thread local symbol"),
d003868e 1185 abfd, h->root.root.string);
69fc87f1
MS
1186 return FALSE;
1187 }
1188 if (old_tls_type > tls_type)
1189 tls_type = old_tls_type;
1190 }
1191
1192 if (old_tls_type != tls_type)
1193 {
1194 if (h != NULL)
1195 elf_s390_hash_entry (h)->tls_type = tls_type;
1196 else
1197 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1198 }
1199
1200 if (r_type != R_390_TLS_IE32)
1201 break;
ae9a127f 1202 /* Fall through. */
69fc87f1
MS
1203
1204 case R_390_TLS_LE32:
e00d879a
AK
1205 /* For static linking and executables this reloc will be
1206 calculated at linktime otherwise a TLS_TPOFF runtime
1207 reloc will be generated. */
0e1862bb 1208 if (r_type == R_390_TLS_LE32 && bfd_link_pie (info))
e00d879a
AK
1209 break;
1210
0e1862bb 1211 if (!bfd_link_pic (info))
69fc87f1
MS
1212 break;
1213 info->flags |= DF_STATIC_TLS;
ae9a127f 1214 /* Fall through. */
69fc87f1 1215
26e41594
AM
1216 case R_390_8:
1217 case R_390_16:
a85d7ed0 1218 case R_390_32:
26e41594 1219 case R_390_PC16:
fb798c50 1220 case R_390_PC12DBL:
26e41594 1221 case R_390_PC16DBL:
fb798c50 1222 case R_390_PC24DBL:
befc3abb 1223 case R_390_PC32DBL:
a85d7ed0 1224 case R_390_PC32:
99ba5125 1225 if (h != NULL && bfd_link_executable (info))
0451c93c
MS
1226 {
1227 /* If this reloc is in a read-only section, we might
1228 need a copy reloc. We can't check reliably at this
1229 stage whether the section is read-only, as input
1230 sections have not yet been mapped to output sections.
1231 Tentatively set the flag for now, and correct in
1232 adjust_dynamic_symbol. */
f5385ebf 1233 h->non_got_ref = 1;
ec338859 1234
0e1862bb 1235 if (!bfd_link_pic (info))
470b557a
AK
1236 {
1237 /* We may need a .plt entry if the function this reloc
1238 refers to is in a shared lib. */
1239 h->plt.refcount += 1;
1240 }
0451c93c 1241 }
a85d7ed0
NC
1242
1243 /* If we are creating a shared library, and this is a reloc
0451c93c
MS
1244 against a global symbol, or a non PC relative reloc
1245 against a local symbol, then we need to copy the reloc
1246 into the shared library. However, if we are linking with
1247 -Bsymbolic, we do not need to copy a reloc against a
1248 global symbol which is defined in an object we are
1249 including in the link (i.e., DEF_REGULAR is set). At
1250 this point we have not seen all the input files, so it is
1251 possible that DEF_REGULAR is not set now but will be set
1252 later (it is never cleared). In case of a weak definition,
1253 DEF_REGULAR may be cleared later by a strong definition in
1254 a shared library. We account for that possibility below by
1255 storing information in the relocs_copied field of the hash
1256 table entry. A similar situation occurs when creating
1257 shared libraries and symbol visibility changes render the
1258 symbol local.
1259
1260 If on the other hand, we are creating an executable, we
1261 may need to keep relocations for symbols satisfied by a
1262 dynamic library if we manage to avoid copy relocs for the
1263 symbol. */
0e1862bb 1264 if ((bfd_link_pic (info)
0451c93c 1265 && (sec->flags & SEC_ALLOC) != 0
ec338859 1266 && ((ELF32_R_TYPE (rel->r_info) != R_390_PC16
fb798c50 1267 && ELF32_R_TYPE (rel->r_info) != R_390_PC12DBL
0451c93c 1268 && ELF32_R_TYPE (rel->r_info) != R_390_PC16DBL
fb798c50 1269 && ELF32_R_TYPE (rel->r_info) != R_390_PC24DBL
befc3abb 1270 && ELF32_R_TYPE (rel->r_info) != R_390_PC32DBL
0451c93c
MS
1271 && ELF32_R_TYPE (rel->r_info) != R_390_PC32)
1272 || (h != NULL
8c21ca21 1273 && (! SYMBOLIC_BIND (info, h)
0451c93c 1274 || h->root.type == bfd_link_hash_defweak
f5385ebf 1275 || !h->def_regular))))
64285810 1276 || (ELIMINATE_COPY_RELOCS
0e1862bb 1277 && !bfd_link_pic (info)
0451c93c
MS
1278 && (sec->flags & SEC_ALLOC) != 0
1279 && h != NULL
1280 && (h->root.type == bfd_link_hash_defweak
f5385ebf 1281 || !h->def_regular)))
a85d7ed0 1282 {
00d8c7a9
AK
1283 struct elf_dyn_relocs *p;
1284 struct elf_dyn_relocs **head;
ec338859 1285
0451c93c
MS
1286 /* We must copy these reloc types into the output file.
1287 Create a reloc section in dynobj and make room for
1288 this reloc. */
a85d7ed0
NC
1289 if (sreloc == NULL)
1290 {
0451c93c
MS
1291 if (htab->elf.dynobj == NULL)
1292 htab->elf.dynobj = abfd;
a85d7ed0 1293
83bac4b0
NC
1294 sreloc = _bfd_elf_make_dynamic_reloc_section
1295 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
1296
a85d7ed0 1297 if (sreloc == NULL)
83bac4b0 1298 return FALSE;
a85d7ed0
NC
1299 }
1300
0451c93c
MS
1301 /* If this is a global symbol, we count the number of
1302 relocations we need for this symbol. */
1303 if (h != NULL)
a85d7ed0 1304 {
190eb1dd 1305 head = &h->dyn_relocs;
0451c93c
MS
1306 }
1307 else
1308 {
ec338859
AM
1309 /* Track dynamic relocs needed for local syms too.
1310 We really need local syms available to do this
1311 easily. Oh well. */
ec338859 1312 asection *s;
6edfbbad 1313 void *vpp;
ae9a127f 1314
87d72d41
AM
1315 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1316 abfd, r_symndx);
1317 if (isym == NULL)
b34976b6 1318 return FALSE;
ec338859 1319
87d72d41
AM
1320 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1321 if (s == NULL)
1322 s = sec;
1323
6edfbbad 1324 vpp = &elf_section_data (s)->local_dynrel;
00d8c7a9 1325 head = (struct elf_dyn_relocs **) vpp;
ec338859
AM
1326 }
1327
1328 p = *head;
1329 if (p == NULL || p->sec != sec)
1330 {
986f0783 1331 size_t amt = sizeof *p;
ae9a127f 1332
00d8c7a9 1333 p = ((struct elf_dyn_relocs *)
ec338859
AM
1334 bfd_alloc (htab->elf.dynobj, amt));
1335 if (p == NULL)
b34976b6 1336 return FALSE;
ec338859
AM
1337 p->next = *head;
1338 *head = p;
1339 p->sec = sec;
1340 p->count = 0;
1341 p->pc_count = 0;
a85d7ed0 1342 }
ec338859
AM
1343
1344 p->count += 1;
1345 if (ELF32_R_TYPE (rel->r_info) == R_390_PC16
fb798c50 1346 || ELF32_R_TYPE (rel->r_info) == R_390_PC12DBL
ec338859 1347 || ELF32_R_TYPE (rel->r_info) == R_390_PC16DBL
fb798c50 1348 || ELF32_R_TYPE (rel->r_info) == R_390_PC24DBL
befc3abb 1349 || ELF32_R_TYPE (rel->r_info) == R_390_PC32DBL
ec338859
AM
1350 || ELF32_R_TYPE (rel->r_info) == R_390_PC32)
1351 p->pc_count += 1;
a85d7ed0 1352 }
a85d7ed0 1353 break;
ec338859 1354
a85d7ed0
NC
1355 /* This relocation describes the C++ object vtable hierarchy.
1356 Reconstruct it for later use during GC. */
26e41594 1357 case R_390_GNU_VTINHERIT:
c152c796 1358 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
26e41594
AM
1359 return FALSE;
1360 break;
ec338859 1361
a85d7ed0
NC
1362 /* This relocation describes which C++ vtable entries are actually
1363 used. Record for later use during GC. */
26e41594 1364 case R_390_GNU_VTENTRY:
a0ea3a14 1365 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
26e41594
AM
1366 return FALSE;
1367 break;
ec338859 1368
a85d7ed0
NC
1369 default:
1370 break;
1371 }
1372 }
1373
b34976b6 1374 return TRUE;
a85d7ed0
NC
1375}
1376
1377/* Return the section that should be marked against GC for a given
1378 relocation. */
1379
1380static asection *
07adf181
AM
1381elf_s390_gc_mark_hook (asection *sec,
1382 struct bfd_link_info *info,
1383 Elf_Internal_Rela *rel,
1384 struct elf_link_hash_entry *h,
1385 Elf_Internal_Sym *sym)
a85d7ed0
NC
1386{
1387 if (h != NULL)
07adf181
AM
1388 switch (ELF32_R_TYPE (rel->r_info))
1389 {
1390 case R_390_GNU_VTINHERIT:
1391 case R_390_GNU_VTENTRY:
1392 return NULL;
1393 }
1394 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
a85d7ed0 1395
a85d7ed0
NC
1396}
1397
5236c819
MS
1398/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1399 entry but we found we will not create any. Called when we find we will
1400 not have any PLT for this symbol, by for example
1401 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1402 or elf_s390_size_dynamic_sections if no dynamic sections will be
1403 created (we're only linking static objects). */
1404
1405static void
2c3fc389 1406elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
5236c819
MS
1407{
1408 if (h->elf.root.type == bfd_link_hash_warning)
1409 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1410
1411 if (h->gotplt_refcount <= 0)
1412 return;
1413
1414 /* We simply add the number of gotplt references to the number
1415 * of got references for this symbol. */
1416 h->elf.got.refcount += h->gotplt_refcount;
1417 h->gotplt_refcount = -1;
1418}
1419
63c1f59d
AM
1420/* Find dynamic relocs for H that apply to read-only sections. */
1421
1422static asection *
1423readonly_dynrelocs (struct elf_link_hash_entry *h)
1424{
1425 struct elf_dyn_relocs *p;
1426
190eb1dd 1427 for (p = h->dyn_relocs; p != NULL; p = p->next)
63c1f59d
AM
1428 {
1429 asection *s = p->sec->output_section;
1430
1431 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1432 return p->sec;
1433 }
1434 return NULL;
1435}
1436
a85d7ed0
NC
1437/* Adjust a symbol defined by a dynamic object and referenced by a
1438 regular object. The current definition is in some section of the
1439 dynamic object, but we're not including those sections. We have to
1440 change the definition to something the rest of the link can
1441 understand. */
1442
b34976b6 1443static bfd_boolean
2c3fc389
NC
1444elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1445 struct elf_link_hash_entry *h)
a85d7ed0 1446{
0451c93c 1447 struct elf_s390_link_hash_table *htab;
5474d94f 1448 asection *s, *srel;
a85d7ed0 1449
470b557a
AK
1450 /* STT_GNU_IFUNC symbol must go through PLT. */
1451 if (s390_is_ifunc_symbol_p (h))
d8ee9e44
AK
1452 {
1453 /* All local STT_GNU_IFUNC references must be treated as local
1454 calls via local PLT. */
1455 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1456 {
1457 bfd_size_type pc_count = 0, count = 0;
1458 struct elf_dyn_relocs **pp;
d8ee9e44
AK
1459 struct elf_dyn_relocs *p;
1460
190eb1dd 1461 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
d8ee9e44
AK
1462 {
1463 pc_count += p->pc_count;
1464 p->count -= p->pc_count;
1465 p->pc_count = 0;
1466 count += p->count;
1467 if (p->count == 0)
1468 *pp = p->next;
1469 else
1470 pp = &p->next;
1471 }
1472
1473 if (pc_count || count)
1474 {
1475 h->needs_plt = 1;
1476 h->non_got_ref = 1;
1477 if (h->plt.refcount <= 0)
1478 h->plt.refcount = 1;
1479 else
1480 h->plt.refcount += 1;
1481 }
1482 }
1483
1484 if (h->plt.refcount <= 0)
1485 {
1486 h->plt.offset = (bfd_vma) -1;
1487 h->needs_plt = 0;
1488 }
1489 return TRUE;
1490 }
470b557a 1491
a85d7ed0
NC
1492 /* If this is a function, put it in the procedure linkage table. We
1493 will fill in the contents of the procedure linkage table later
cedb70c5 1494 (although we could actually do it here). */
a85d7ed0 1495 if (h->type == STT_FUNC
f5385ebf 1496 || h->needs_plt)
a85d7ed0 1497 {
0451c93c 1498 if (h->plt.refcount <= 0
8c21ca21
AK
1499 || SYMBOL_CALLS_LOCAL (info, h)
1500 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1501 && h->root.type != bfd_link_hash_undefweak))
a85d7ed0
NC
1502 {
1503 /* This case can occur if we saw a PLT32 reloc in an input
26e41594
AM
1504 file, but the symbol was never referred to by a dynamic
1505 object, or if all references were garbage collected. In
a85d7ed0
NC
1506 such a case, we don't actually need to build a procedure
1507 linkage table, and we can just do a PC32 reloc instead. */
1508 h->plt.offset = (bfd_vma) -1;
f5385ebf 1509 h->needs_plt = 0;
5236c819 1510 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
a85d7ed0
NC
1511 }
1512
b34976b6 1513 return TRUE;
a85d7ed0 1514 }
bbd7ec4a 1515 else
0451c93c
MS
1516 /* It's possible that we incorrectly decided a .plt reloc was
1517 needed for an R_390_PC32 reloc to a non-function sym in
1518 check_relocs. We can't decide accurately between function and
1519 non-function syms in check-relocs; Objects loaded later in
1520 the link may change h->type. So fix it now. */
bbd7ec4a 1521 h->plt.offset = (bfd_vma) -1;
a85d7ed0
NC
1522
1523 /* If this is a weak symbol, and there is a real definition, the
1524 processor independent code will have arranged for us to see the
1525 real definition first, and we can just use the same value. */
60d67dc8 1526 if (h->is_weakalias)
a85d7ed0 1527 {
60d67dc8
AM
1528 struct elf_link_hash_entry *def = weakdef (h);
1529 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1530 h->root.u.def.section = def->root.u.def.section;
1531 h->root.u.def.value = def->root.u.def.value;
64285810 1532 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
60d67dc8 1533 h->non_got_ref = def->non_got_ref;
b34976b6 1534 return TRUE;
a85d7ed0
NC
1535 }
1536
1537 /* This is a reference to a symbol defined by a dynamic object which
1538 is not a function. */
1539
1540 /* If we are creating a shared library, we must presume that the
1541 only references to the symbol are via the global offset table.
1542 For such cases we need not do anything here; the relocations will
1543 be handled correctly by relocate_section. */
0e1862bb 1544 if (bfd_link_pic (info))
b34976b6 1545 return TRUE;
a85d7ed0
NC
1546
1547 /* If there are no references to this symbol that do not use the
1548 GOT, we don't need to generate a copy reloc. */
f5385ebf 1549 if (!h->non_got_ref)
b34976b6 1550 return TRUE;
a85d7ed0 1551
0451c93c
MS
1552 /* If -z nocopyreloc was given, we won't generate them either. */
1553 if (info->nocopyreloc)
1554 {
f5385ebf 1555 h->non_got_ref = 0;
b34976b6 1556 return TRUE;
0451c93c
MS
1557 }
1558
3bf083ed
AM
1559 /* If we don't find any dynamic relocs in read-only sections, then
1560 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1561 if (ELIMINATE_COPY_RELOCS && !readonly_dynrelocs (h))
0451c93c 1562 {
3bf083ed
AM
1563 h->non_got_ref = 0;
1564 return TRUE;
0451c93c
MS
1565 }
1566
a85d7ed0
NC
1567 /* We must allocate the symbol in our .dynbss section, which will
1568 become part of the .bss section of the executable. There will be
1569 an entry for this symbol in the .dynsym section. The dynamic
1570 object will contain position independent code, so all references
1571 from the dynamic object to this symbol will go through the global
1572 offset table. The dynamic linker will use the .dynsym entry to
1573 determine the address it must put in the global offset table, so
1574 both the dynamic object and the regular object will refer to the
1575 same memory location for the variable. */
1576
0451c93c 1577 htab = elf_s390_hash_table (info);
a85d7ed0 1578
0451c93c
MS
1579 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1580 copy the initial value out of the dynamic object and into the
1581 runtime process image. */
5474d94f
AM
1582 if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
1583 {
1584 s = htab->elf.sdynrelro;
1585 srel = htab->elf.sreldynrelro;
1586 }
1587 else
1588 {
1589 s = htab->elf.sdynbss;
1590 srel = htab->elf.srelbss;
1591 }
1d7e9d18 1592 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
a85d7ed0 1593 {
5474d94f 1594 srel->size += sizeof (Elf32_External_Rela);
f5385ebf 1595 h->needs_copy = 1;
a85d7ed0
NC
1596 }
1597
6cabe1ea 1598 return _bfd_elf_adjust_dynamic_copy (info, h, s);
a85d7ed0
NC
1599}
1600
0451c93c
MS
1601/* Allocate space in .plt, .got and associated reloc sections for
1602 dynamic relocs. */
1603
b34976b6 1604static bfd_boolean
2c3fc389 1605allocate_dynrelocs (struct elf_link_hash_entry *h, void * inf)
0451c93c
MS
1606{
1607 struct bfd_link_info *info;
1608 struct elf_s390_link_hash_table *htab;
00d8c7a9 1609 struct elf_dyn_relocs *p;
0451c93c 1610
e92d460e 1611 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1612 return TRUE;
0451c93c
MS
1613
1614 info = (struct bfd_link_info *) inf;
1615 htab = elf_s390_hash_table (info);
1616
470b557a
AK
1617 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1618 here if it is defined and referenced in a non-shared object. */
1619 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
61643fba 1620 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
470b557a
AK
1621 else if (htab->elf.dynamic_sections_created
1622 && h->plt.refcount > 0)
0451c93c
MS
1623 {
1624 /* Make sure this symbol is output as a dynamic symbol.
1625 Undefined weak syms won't yet be marked as dynamic. */
1626 if (h->dynindx == -1
f5385ebf 1627 && !h->forced_local)
0451c93c 1628 {
c152c796 1629 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1630 return FALSE;
0451c93c
MS
1631 }
1632
0e1862bb 1633 if (bfd_link_pic (info)
4ec72bde 1634 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
0451c93c 1635 {
f41345a7 1636 asection *s = htab->elf.splt;
0451c93c
MS
1637
1638 /* If this is the first .plt entry, make room for the special
1639 first entry. */
eea6121a
AM
1640 if (s->size == 0)
1641 s->size += PLT_FIRST_ENTRY_SIZE;
0451c93c 1642
eea6121a 1643 h->plt.offset = s->size;
0451c93c
MS
1644
1645 /* If this symbol is not defined in a regular file, and we are
1646 not generating a shared library, then set the symbol to this
1647 location in the .plt. This is required to make function
1648 pointers compare as equal between the normal executable and
1649 the shared library. */
0e1862bb 1650 if (! bfd_link_pic (info)
f5385ebf 1651 && !h->def_regular)
0451c93c
MS
1652 {
1653 h->root.u.def.section = s;
1654 h->root.u.def.value = h->plt.offset;
1655 }
ec338859 1656
0451c93c 1657 /* Make room for this entry. */
eea6121a 1658 s->size += PLT_ENTRY_SIZE;
ec338859 1659
24801b15
AK
1660 /* We also need to make an entry in the .got.plt section, which
1661 will be placed in the .got section by the linker script. */
f41345a7 1662 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
0451c93c
MS
1663
1664 /* We also need to make an entry in the .rela.plt section. */
f41345a7 1665 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
0451c93c
MS
1666 }
1667 else
1668 {
07d6d2b8 1669 h->plt.offset = (bfd_vma) -1;
f5385ebf 1670 h->needs_plt = 0;
5236c819 1671 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c 1672 }
ec338859 1673 }
0451c93c
MS
1674 else
1675 {
1676 h->plt.offset = (bfd_vma) -1;
f5385ebf 1677 h->needs_plt = 0;
5236c819 1678 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
ec338859
AM
1679 }
1680
69fc87f1
MS
1681 /* If R_390_TLS_{IE32,GOTIE32,GOTIE12,IEENT} symbol is now local to
1682 the binary, we can optimize a bit. IE32 and GOTIE32 get converted
1683 to R_390_TLS_LE32 requiring no TLS entry. For GOTIE12 and IEENT
1684 we can save the dynamic TLS relocation. */
1685 if (h->got.refcount > 0
0e1862bb 1686 && !bfd_link_pic (info)
69fc87f1
MS
1687 && h->dynindx == -1
1688 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
0451c93c 1689 {
69fc87f1
MS
1690 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1691 /* For the GOTIE access without a literal pool entry the offset has
1692 to be stored somewhere. The immediate value in the instruction
1693 is not bit enough so the value is stored in the got. */
1694 {
f41345a7
AK
1695 h->got.offset = htab->elf.sgot->size;
1696 htab->elf.sgot->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1697 }
1698 else
1699 h->got.offset = (bfd_vma) -1;
1700 }
1701 else if (h->got.refcount > 0)
ceada896 1702 {
0451c93c 1703 asection *s;
b34976b6 1704 bfd_boolean dyn;
69fc87f1 1705 int tls_type = elf_s390_hash_entry(h)->tls_type;
0451c93c
MS
1706
1707 /* Make sure this symbol is output as a dynamic symbol.
1708 Undefined weak syms won't yet be marked as dynamic. */
1709 if (h->dynindx == -1
f5385ebf 1710 && !h->forced_local)
0451c93c 1711 {
c152c796 1712 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1713 return FALSE;
0451c93c
MS
1714 }
1715
f41345a7 1716 s = htab->elf.sgot;
eea6121a
AM
1717 h->got.offset = s->size;
1718 s->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1719 /* R_390_TLS_GD32 needs 2 consecutive GOT slots. */
1720 if (tls_type == GOT_TLS_GD)
eea6121a 1721 s->size += GOT_ENTRY_SIZE;
0451c93c 1722 dyn = htab->elf.dynamic_sections_created;
69fc87f1
MS
1723 /* R_390_TLS_IE32 needs one dynamic relocation,
1724 R_390_TLS_GD32 needs one if local symbol and two if global. */
1725 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1726 || tls_type >= GOT_TLS_IE)
f41345a7 1727 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
69fc87f1 1728 else if (tls_type == GOT_TLS_GD)
f41345a7 1729 htab->elf.srelgot->size += 2 * sizeof (Elf32_External_Rela);
82058a73
MS
1730 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1731 || h->root.type != bfd_link_hash_undefweak)
0e1862bb 1732 && (bfd_link_pic (info)
82058a73 1733 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
f41345a7 1734 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
0451c93c
MS
1735 }
1736 else
1737 h->got.offset = (bfd_vma) -1;
1738
190eb1dd 1739 if (h->dyn_relocs == NULL)
b34976b6 1740 return TRUE;
0451c93c
MS
1741
1742 /* In the shared -Bsymbolic case, discard space allocated for
1743 dynamic pc-relative relocs against symbols which turn out to be
1744 defined in regular objects. For the normal shared case, discard
1745 space for pc-relative relocs that have become local due to symbol
1746 visibility changes. */
1747
0e1862bb 1748 if (bfd_link_pic (info))
0451c93c 1749 {
8c21ca21 1750 if (SYMBOL_CALLS_LOCAL (info, h))
0451c93c 1751 {
00d8c7a9 1752 struct elf_dyn_relocs **pp;
0451c93c 1753
190eb1dd 1754 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
0451c93c
MS
1755 {
1756 p->count -= p->pc_count;
1757 p->pc_count = 0;
1758 if (p->count == 0)
1759 *pp = p->next;
1760 else
1761 pp = &p->next;
1762 }
1763 }
82058a73
MS
1764
1765 /* Also discard relocs on undefined weak syms with non-default
1766 visibility. */
190eb1dd 1767 if (h->dyn_relocs != NULL
82058a73 1768 && h->root.type == bfd_link_hash_undefweak)
22d606e9 1769 {
b27bb18f
L
1770 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1771 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 1772 h->dyn_relocs = NULL;
22d606e9
AM
1773
1774 /* Make sure undefined weak symbols are output as a dynamic
1775 symbol in PIEs. */
1776 else if (h->dynindx == -1
1777 && !h->forced_local)
1778 {
1779 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1780 return FALSE;
1781 }
1782 }
0451c93c 1783 }
64285810 1784 else if (ELIMINATE_COPY_RELOCS)
0451c93c
MS
1785 {
1786 /* For the non-shared case, discard space for relocs against
1787 symbols which turn out to need copy relocs or are not
1788 dynamic. */
1789
f5385ebf
AM
1790 if (!h->non_got_ref
1791 && ((h->def_dynamic
1792 && !h->def_regular)
0451c93c
MS
1793 || (htab->elf.dynamic_sections_created
1794 && (h->root.type == bfd_link_hash_undefweak
1795 || h->root.type == bfd_link_hash_undefined))))
1796 {
1797 /* Make sure this symbol is output as a dynamic symbol.
1798 Undefined weak syms won't yet be marked as dynamic. */
1799 if (h->dynindx == -1
f5385ebf 1800 && !h->forced_local)
0451c93c 1801 {
c152c796 1802 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1803 return FALSE;
0451c93c
MS
1804 }
1805
1806 /* If that succeeded, we know we'll be keeping all the
1807 relocs. */
1808 if (h->dynindx != -1)
1809 goto keep;
1810 }
1811
190eb1dd 1812 h->dyn_relocs = NULL;
0451c93c 1813
ec338859 1814 keep: ;
0451c93c
MS
1815 }
1816
1817 /* Finally, allocate space. */
190eb1dd 1818 for (p = h->dyn_relocs; p != NULL; p = p->next)
0451c93c
MS
1819 {
1820 asection *sreloc = elf_section_data (p->sec)->sreloc;
ae9a127f 1821
eea6121a 1822 sreloc->size += p->count * sizeof (Elf32_External_Rela);
0451c93c
MS
1823 }
1824
b34976b6 1825 return TRUE;
0451c93c
MS
1826}
1827
63c1f59d
AM
1828/* Set DF_TEXTREL if we find any dynamic relocs that apply to
1829 read-only sections. */
0451c93c 1830
b34976b6 1831static bfd_boolean
63c1f59d 1832maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
0451c93c 1833{
63c1f59d 1834 asection *sec;
0451c93c 1835
63c1f59d
AM
1836 if (h->root.type == bfd_link_hash_indirect)
1837 return TRUE;
0451c93c 1838
63c1f59d
AM
1839 sec = readonly_dynrelocs (h);
1840 if (sec != NULL)
1841 {
1842 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
0451c93c 1843
63c1f59d
AM
1844 info->flags |= DF_TEXTREL;
1845 info->callbacks->minfo
c1c8c1ef 1846 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 1847 sec->owner, h->root.root.string, sec);
0451c93c 1848
63c1f59d
AM
1849 /* Not an error, just cut short the traversal. */
1850 return FALSE;
0451c93c 1851 }
b34976b6 1852 return TRUE;
0451c93c
MS
1853}
1854
a85d7ed0
NC
1855/* Set the sizes of the dynamic sections. */
1856
b34976b6 1857static bfd_boolean
2c3fc389
NC
1858elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
1859 struct bfd_link_info *info)
a85d7ed0 1860{
0451c93c 1861 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
1862 bfd *dynobj;
1863 asection *s;
b34976b6 1864 bfd_boolean relocs;
0451c93c 1865 bfd *ibfd;
a85d7ed0 1866
0451c93c
MS
1867 htab = elf_s390_hash_table (info);
1868 dynobj = htab->elf.dynobj;
1869 if (dynobj == NULL)
1870 abort ();
a85d7ed0 1871
0451c93c 1872 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
1873 {
1874 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 1875 if (bfd_link_executable (info) && !info->nointerp)
a85d7ed0 1876 {
3d4d4302 1877 s = bfd_get_linker_section (dynobj, ".interp");
0451c93c
MS
1878 if (s == NULL)
1879 abort ();
eea6121a 1880 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
a85d7ed0
NC
1881 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1882 }
1883 }
a85d7ed0 1884
0451c93c
MS
1885 /* Set up .got offsets for local syms, and space for local dynamic
1886 relocs. */
c72f2fb2 1887 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
a85d7ed0 1888 {
0451c93c
MS
1889 bfd_signed_vma *local_got;
1890 bfd_signed_vma *end_local_got;
69fc87f1 1891 char *local_tls_type;
0451c93c
MS
1892 bfd_size_type locsymcount;
1893 Elf_Internal_Shdr *symtab_hdr;
1894 asection *srela;
470b557a
AK
1895 struct plt_entry *local_plt;
1896 unsigned int i;
a85d7ed0 1897
0ffa91dd 1898 if (! is_s390_elf (ibfd))
a85d7ed0
NC
1899 continue;
1900
0451c93c 1901 for (s = ibfd->sections; s != NULL; s = s->next)
a85d7ed0 1902 {
00d8c7a9 1903 struct elf_dyn_relocs *p;
0451c93c 1904
6edfbbad 1905 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
a85d7ed0 1906 {
ec338859
AM
1907 if (!bfd_is_abs_section (p->sec)
1908 && bfd_is_abs_section (p->sec->output_section))
1909 {
1910 /* Input section has been discarded, either because
1911 it is a copy of a linkonce section or due to
1912 linker script /DISCARD/, so we'll be discarding
1913 the relocs too. */
1914 }
248866a8 1915 else if (p->count != 0)
ec338859
AM
1916 {
1917 srela = elf_section_data (p->sec)->sreloc;
eea6121a 1918 srela->size += p->count * sizeof (Elf32_External_Rela);
248866a8
AM
1919 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
1920 info->flags |= DF_TEXTREL;
ec338859 1921 }
a85d7ed0
NC
1922 }
1923 }
0451c93c
MS
1924
1925 local_got = elf_local_got_refcounts (ibfd);
1926 if (!local_got)
1927 continue;
1928
0ffa91dd 1929 symtab_hdr = &elf_symtab_hdr (ibfd);
0451c93c
MS
1930 locsymcount = symtab_hdr->sh_info;
1931 end_local_got = local_got + locsymcount;
69fc87f1 1932 local_tls_type = elf_s390_local_got_tls_type (ibfd);
f41345a7
AK
1933 s = htab->elf.sgot;
1934 srela = htab->elf.srelgot;
69fc87f1 1935 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
a85d7ed0 1936 {
0451c93c 1937 if (*local_got > 0)
a85d7ed0 1938 {
eea6121a
AM
1939 *local_got = s->size;
1940 s->size += GOT_ENTRY_SIZE;
69fc87f1 1941 if (*local_tls_type == GOT_TLS_GD)
eea6121a 1942 s->size += GOT_ENTRY_SIZE;
0e1862bb 1943 if (bfd_link_pic (info))
eea6121a 1944 srela->size += sizeof (Elf32_External_Rela);
a85d7ed0
NC
1945 }
1946 else
0451c93c
MS
1947 *local_got = (bfd_vma) -1;
1948 }
470b557a
AK
1949 local_plt = elf_s390_local_plt (ibfd);
1950 for (i = 0; i < symtab_hdr->sh_info; i++)
1951 {
1952 if (local_plt[i].plt.refcount > 0)
1953 {
1954 local_plt[i].plt.offset = htab->elf.iplt->size;
1955 htab->elf.iplt->size += PLT_ENTRY_SIZE;
1956 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
1957 htab->elf.irelplt->size += RELA_ENTRY_SIZE;
1958 }
1959 else
07d6d2b8 1960 local_plt[i].plt.offset = (bfd_vma) -1;
470b557a 1961 }
0451c93c
MS
1962 }
1963
69fc87f1
MS
1964 if (htab->tls_ldm_got.refcount > 0)
1965 {
1966 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM32
1967 relocs. */
f41345a7
AK
1968 htab->tls_ldm_got.offset = htab->elf.sgot->size;
1969 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
1970 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
69fc87f1
MS
1971 }
1972 else
1973 htab->tls_ldm_got.offset = -1;
1974
0451c93c
MS
1975 /* Allocate global sym .plt and .got entries, and space for global
1976 sym dynamic relocs. */
2c3fc389 1977 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
0451c93c
MS
1978
1979 /* We now have determined the sizes of the various dynamic sections.
1980 Allocate memory for them. */
b34976b6 1981 relocs = FALSE;
0451c93c
MS
1982 for (s = dynobj->sections; s != NULL; s = s->next)
1983 {
1984 if ((s->flags & SEC_LINKER_CREATED) == 0)
1985 continue;
1986
f41345a7
AK
1987 if (s == htab->elf.splt
1988 || s == htab->elf.sgot
1989 || s == htab->elf.sgotplt
9d19e4fd 1990 || s == htab->elf.sdynbss
5474d94f 1991 || s == htab->elf.sdynrelro
470b557a
AK
1992 || s == htab->elf.iplt
1993 || s == htab->elf.igotplt
1994 || s == htab->irelifunc)
0451c93c
MS
1995 {
1996 /* Strip this section if we don't need it; see the
1997 comment below. */
a85d7ed0 1998 }
fd361982 1999 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
0451c93c 2000 {
eea6121a 2001 if (s->size != 0)
b34976b6 2002 relocs = TRUE;
ec338859 2003
0451c93c
MS
2004 /* We use the reloc_count field as a counter if we need
2005 to copy relocs into the output file. */
2006 s->reloc_count = 0;
2007 }
2008 else
a85d7ed0
NC
2009 {
2010 /* It's not one of our sections, so don't allocate space. */
2011 continue;
2012 }
2013
eea6121a 2014 if (s->size == 0)
a85d7ed0 2015 {
0451c93c
MS
2016 /* If we don't need this section, strip it from the
2017 output file. This is to handle .rela.bss and
2018 .rela.plt. We must create it in
2019 create_dynamic_sections, because it must be created
2020 before the linker maps input sections to output
2021 sections. The linker does that before
2022 adjust_dynamic_symbol is called, and it is that
2023 function which decides whether anything needs to go
2024 into these sections. */
2025
8423293d 2026 s->flags |= SEC_EXCLUDE;
a85d7ed0
NC
2027 continue;
2028 }
2029
c456f082
AM
2030 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2031 continue;
2032
0451c93c
MS
2033 /* Allocate memory for the section contents. We use bfd_zalloc
2034 here in case unused entries are not reclaimed before the
2035 section's contents are written out. This should not happen,
2036 but this way if it does, we get a R_390_NONE reloc instead
2037 of garbage. */
eea6121a 2038 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
0451c93c 2039 if (s->contents == NULL)
b34976b6 2040 return FALSE;
a85d7ed0 2041 }
ec338859 2042
0451c93c 2043 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2044 {
2045 /* Add some entries to the .dynamic section. We fill in the
2046 values later, in elf_s390_finish_dynamic_sections, but we
2047 must add the entries now so that we get the correct size for
2048 the .dynamic section. The DT_DEBUG entry is filled in by the
2049 dynamic linker and used by the debugger. */
dc810e39 2050#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2051 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
ec338859 2052
0e1862bb 2053 if (bfd_link_executable (info))
a85d7ed0 2054 {
dc810e39 2055 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2056 return FALSE;
a85d7ed0 2057 }
ec338859 2058
f41345a7 2059 if (htab->elf.splt->size != 0)
a85d7ed0 2060 {
dc810e39
AM
2061 if (!add_dynamic_entry (DT_PLTGOT, 0)
2062 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2063 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2064 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2065 return FALSE;
a85d7ed0 2066 }
ec338859 2067
a85d7ed0 2068 if (relocs)
26e41594
AM
2069 {
2070 if (!add_dynamic_entry (DT_RELA, 0)
2071 || !add_dynamic_entry (DT_RELASZ, 0)
2072 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2073 return FALSE;
a85d7ed0 2074
0451c93c
MS
2075 /* If any dynamic relocs apply to a read-only section,
2076 then we need a DT_TEXTREL entry. */
248866a8 2077 if ((info->flags & DF_TEXTREL) == 0)
63c1f59d 2078 elf_link_hash_traverse (&htab->elf, maybe_set_textrel, info);
ec338859 2079
0451c93c
MS
2080 if ((info->flags & DF_TEXTREL) != 0)
2081 {
2082 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2083 return FALSE;
0451c93c 2084 }
a85d7ed0
NC
2085 }
2086 }
dc810e39 2087#undef add_dynamic_entry
ec338859 2088
b34976b6 2089 return TRUE;
a85d7ed0
NC
2090}
2091
69fc87f1
MS
2092/* Return the base VMA address which should be subtracted from real addresses
2093 when resolving @dtpoff relocation.
2094 This is PT_TLS segment p_vaddr. */
2095
2096static bfd_vma
2c3fc389 2097dtpoff_base (struct bfd_link_info *info)
69fc87f1 2098{
e1918d23
AM
2099 /* If tls_sec is NULL, we should have signalled an error already. */
2100 if (elf_hash_table (info)->tls_sec == NULL)
69fc87f1 2101 return 0;
e1918d23 2102 return elf_hash_table (info)->tls_sec->vma;
69fc87f1
MS
2103}
2104
2105/* Return the relocation value for @tpoff relocation
2106 if STT_TLS virtual address is ADDRESS. */
2107
2108static bfd_vma
2c3fc389 2109tpoff (struct bfd_link_info *info, bfd_vma address)
69fc87f1 2110{
e1918d23 2111 struct elf_link_hash_table *htab = elf_hash_table (info);
69fc87f1 2112
e1918d23
AM
2113 /* If tls_sec is NULL, we should have signalled an error already. */
2114 if (htab->tls_sec == NULL)
69fc87f1 2115 return 0;
e1918d23 2116 return htab->tls_size + htab->tls_sec->vma - address;
69fc87f1
MS
2117}
2118
2119/* Complain if TLS instruction relocation is against an invalid
2120 instruction. */
2121
2122static void
2c3fc389
NC
2123invalid_tls_insn (bfd *input_bfd,
2124 asection *input_section,
2125 Elf_Internal_Rela *rel)
69fc87f1
MS
2126{
2127 reloc_howto_type *howto;
2128
2129 howto = elf_howto_table + ELF32_R_TYPE (rel->r_info);
4eca0228 2130 _bfd_error_handler
695344c0 2131 /* xgettext:c-format */
2dcf00ce 2132 (_("%pB(%pA+%#" PRIx64 "): invalid instruction for TLS relocation %s"),
d003868e
AM
2133 input_bfd,
2134 input_section,
2dcf00ce 2135 (uint64_t) rel->r_offset,
69fc87f1 2136 howto->name);
77df2968 2137 bfd_set_error (bfd_error_bad_value);
69fc87f1
MS
2138}
2139
a85d7ed0
NC
2140/* Relocate a 390 ELF section. */
2141
b34976b6 2142static bfd_boolean
2c3fc389
NC
2143elf_s390_relocate_section (bfd *output_bfd,
2144 struct bfd_link_info *info,
2145 bfd *input_bfd,
2146 asection *input_section,
2147 bfd_byte *contents,
2148 Elf_Internal_Rela *relocs,
2149 Elf_Internal_Sym *local_syms,
2150 asection **local_sections)
a85d7ed0 2151{
0451c93c 2152 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2153 Elf_Internal_Shdr *symtab_hdr;
2154 struct elf_link_hash_entry **sym_hashes;
2155 bfd_vma *local_got_offsets;
a85d7ed0
NC
2156 Elf_Internal_Rela *rel;
2157 Elf_Internal_Rela *relend;
2158
7af5d5c4
AM
2159 if (!is_s390_elf (input_bfd))
2160 {
2161 bfd_set_error (bfd_error_wrong_format);
2162 return FALSE;
2163 }
0ffa91dd 2164
0451c93c 2165 htab = elf_s390_hash_table (info);
0ffa91dd 2166 symtab_hdr = &elf_symtab_hdr (input_bfd);
a85d7ed0
NC
2167 sym_hashes = elf_sym_hashes (input_bfd);
2168 local_got_offsets = elf_local_got_offsets (input_bfd);
2169
a85d7ed0
NC
2170 rel = relocs;
2171 relend = relocs + input_section->reloc_count;
2172 for (; rel < relend; rel++)
2173 {
5236c819 2174 unsigned int r_type;
a85d7ed0
NC
2175 reloc_howto_type *howto;
2176 unsigned long r_symndx;
2177 struct elf_link_hash_entry *h;
2178 Elf_Internal_Sym *sym;
2179 asection *sec;
0451c93c 2180 bfd_vma off;
a85d7ed0 2181 bfd_vma relocation;
b34976b6 2182 bfd_boolean unresolved_reloc;
a85d7ed0 2183 bfd_reloc_status_type r;
69fc87f1 2184 int tls_type;
470b557a 2185 asection *base_got = htab->elf.sgot;
b27bb18f 2186 bfd_boolean resolved_to_zero;
ec338859 2187
a85d7ed0
NC
2188 r_type = ELF32_R_TYPE (rel->r_info);
2189 if (r_type == (int) R_390_GNU_VTINHERIT
26e41594
AM
2190 || r_type == (int) R_390_GNU_VTENTRY)
2191 continue;
5236c819 2192 if (r_type >= (int) R_390_max)
a85d7ed0
NC
2193 {
2194 bfd_set_error (bfd_error_bad_value);
b34976b6 2195 return FALSE;
a85d7ed0 2196 }
ec338859 2197
b491616a 2198 howto = elf_howto_table + r_type;
a85d7ed0 2199 r_symndx = ELF32_R_SYM (rel->r_info);
5236c819 2200
a85d7ed0
NC
2201 h = NULL;
2202 sym = NULL;
2203 sec = NULL;
b34976b6 2204 unresolved_reloc = FALSE;
a85d7ed0
NC
2205 if (r_symndx < symtab_hdr->sh_info)
2206 {
2207 sym = local_syms + r_symndx;
2208 sec = local_sections[r_symndx];
470b557a
AK
2209 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2210 {
2211 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2212 if (local_plt == NULL)
2213 return FALSE;
2214
2215 /* Address of the PLT slot. */
2216 relocation = (htab->elf.iplt->output_section->vma
2217 + htab->elf.iplt->output_offset
2218 + local_plt[r_symndx].plt.offset);
2219
2220 switch (r_type)
2221 {
31db78f6
AK
2222 case R_390_PLTOFF16:
2223 case R_390_PLTOFF32:
2224 relocation -= htab->elf.sgot->output_section->vma;
2225 break;
470b557a
AK
2226 case R_390_GOTPLT12:
2227 case R_390_GOTPLT16:
2228 case R_390_GOTPLT20:
2229 case R_390_GOTPLT32:
2230 case R_390_GOTPLTENT:
2231 case R_390_GOT12:
2232 case R_390_GOT16:
2233 case R_390_GOT20:
2234 case R_390_GOT32:
2235 case R_390_GOTENT:
2236 {
2237 /* Write the PLT slot address into the GOT slot. */
2238 bfd_put_32 (output_bfd, relocation,
2239 htab->elf.sgot->contents +
2240 local_got_offsets[r_symndx]);
2241 relocation = (local_got_offsets[r_symndx] +
2242 htab->elf.sgot->output_offset);
2243
2244 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2245 relocation += htab->elf.sgot->output_section->vma;
2246 break;
2247 }
2248 default:
2249 break;
2250 }
2251 /* The output section is needed later in
2252 finish_dynamic_section when creating the dynamic
2253 relocation. */
2254 local_plt[r_symndx].sec = sec;
2255 goto do_relocation;
2256 }
2257 else
2258 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a85d7ed0
NC
2259 }
2260 else
2261 {
560e09e9 2262 bfd_boolean warned ATTRIBUTE_UNUSED;
62d887d4 2263 bfd_boolean ignored ATTRIBUTE_UNUSED;
ec338859 2264
b2a8e766
AM
2265 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2266 r_symndx, symtab_hdr, sym_hashes,
2267 h, sec, relocation,
62d887d4 2268 unresolved_reloc, warned, ignored);
a85d7ed0 2269 }
ec338859 2270
dbaa2011 2271 if (sec != NULL && discarded_section (sec))
e4067dbb 2272 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2273 rel, 1, relend, howto, 0, contents);
ab96bf03 2274
0e1862bb 2275 if (bfd_link_relocatable (info))
ab96bf03
AM
2276 continue;
2277
b27bb18f
L
2278 resolved_to_zero = (h != NULL
2279 && UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
2280
a85d7ed0
NC
2281 switch (r_type)
2282 {
5236c819
MS
2283 case R_390_GOTPLT12:
2284 case R_390_GOTPLT16:
bd1ea41b 2285 case R_390_GOTPLT20:
5236c819
MS
2286 case R_390_GOTPLT32:
2287 case R_390_GOTPLTENT:
2288 /* There are three cases for a GOTPLT relocation. 1) The
2289 relocation is against the jump slot entry of a plt that
2290 will get emitted to the output file. 2) The relocation
2291 is against the jump slot of a plt entry that has been
2292 removed. elf_s390_adjust_gotplt has created a GOT entry
2293 as replacement. 3) The relocation is against a local symbol.
2294 Cases 2) and 3) are the same as the GOT relocation code
2295 so we just have to test for case 1 and fall through for
2296 the other two. */
2297 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2298 {
2299 bfd_vma plt_index;
2300
470b557a
AK
2301 if (s390_is_ifunc_symbol_p (h))
2302 {
2303 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2304 relocation = (plt_index * GOT_ENTRY_SIZE +
2305 htab->elf.igotplt->output_offset);
2306 if (r_type == R_390_GOTPLTENT)
2307 relocation += htab->elf.igotplt->output_section->vma;
2308 }
2309 else
2310 {
2311 /* Calc. index no.
2312 Current offset - size first entry / entry size. */
2313 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2314 PLT_ENTRY_SIZE;
2315
2316 /* Offset in GOT is PLT index plus GOT headers(3)
2317 times 4, addr & GOT addr. */
2318 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2319 if (r_type == R_390_GOTPLTENT)
2320 relocation += htab->elf.sgot->output_section->vma;
2321 }
5236c819
MS
2322 unresolved_reloc = FALSE;
2323
5236c819
MS
2324 }
2325 /* Fall through. */
2326
26e41594
AM
2327 case R_390_GOT12:
2328 case R_390_GOT16:
bd1ea41b 2329 case R_390_GOT20:
26e41594 2330 case R_390_GOT32:
befc3abb 2331 case R_390_GOTENT:
26e41594
AM
2332 /* Relocation is to the entry for this symbol in the global
2333 offset table. */
470b557a 2334 if (base_got == NULL)
0451c93c 2335 abort ();
ec338859 2336
26e41594
AM
2337 if (h != NULL)
2338 {
b34976b6 2339 bfd_boolean dyn;
ec338859 2340
26e41594 2341 off = h->got.offset;
0451c93c 2342 dyn = htab->elf.dynamic_sections_created;
470b557a
AK
2343
2344 if (s390_is_ifunc_symbol_p (h))
2345 {
2346 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2347 if (off == (bfd_vma)-1)
2348 {
2349 /* No explicit GOT usage so redirect to the
2350 got.iplt slot. */
2351 base_got = htab->elf.igotplt;
2352 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2353 }
2354 else
2355 {
2356 /* Explicit GOT slots must contain the address
2357 of the PLT slot. This will be handled in
2358 finish_dynamic_symbol. */
2359 }
2360 }
0e1862bb
L
2361 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2362 bfd_link_pic (info),
2363 h)
2364 || (bfd_link_pic (info)
470b557a
AK
2365 && SYMBOL_REFERENCES_LOCAL (info, h))
2366 || (ELF_ST_VISIBILITY (h->other)
2367 && h->root.type == bfd_link_hash_undefweak))
2368
26e41594
AM
2369 {
2370 /* This is actually a static link, or it is a
2371 -Bsymbolic link and the symbol is defined
2372 locally, or the symbol was forced to be local
2373 because of a version file. We must initialize
2374 this entry in the global offset table. Since the
2375 offset must always be a multiple of 2, we use the
2376 least significant bit to record whether we have
2377 initialized it already.
2378
2379 When doing a dynamic link, we create a .rel.got
2380 relocation entry to initialize the value. This
2381 is done in the finish_dynamic_symbol routine. */
2382 if ((off & 1) != 0)
2383 off &= ~1;
2384 else
2385 {
a85d7ed0 2386 bfd_put_32 (output_bfd, relocation,
470b557a 2387 base_got->contents + off);
26e41594
AM
2388 h->got.offset |= 1;
2389 }
a63cc5f7
AK
2390
2391 if ((h->def_regular
0e1862bb 2392 && bfd_link_pic (info)
a63cc5f7
AK
2393 && SYMBOL_REFERENCES_LOCAL (info, h))
2394 /* lrl rx,sym@GOTENT -> larl rx, sym */
2395 && ((r_type == R_390_GOTENT
2396 && (bfd_get_16 (input_bfd,
2397 contents + rel->r_offset - 2)
2398 & 0xff0f) == 0xc40d)
2399 /* ly rx, sym@GOT(r12) -> larl rx, sym */
2400 || (r_type == R_390_GOT20
2401 && (bfd_get_32 (input_bfd,
2402 contents + rel->r_offset - 2)
2403 & 0xff00f000) == 0xe300c000
2404 && bfd_get_8 (input_bfd,
2405 contents + rel->r_offset + 3) == 0x58)))
2406 {
2407 unsigned short new_insn =
2408 (0xc000 | (bfd_get_8 (input_bfd,
2409 contents + rel->r_offset - 1) & 0xf0));
2410 bfd_put_16 (output_bfd, new_insn,
2411 contents + rel->r_offset - 2);
2412 r_type = R_390_PC32DBL;
2413 rel->r_addend = 2;
2414 howto = elf_howto_table + r_type;
2415 relocation = h->root.u.def.value
2416 + h->root.u.def.section->output_section->vma
2417 + h->root.u.def.section->output_offset;
2418 goto do_relocation;
2419 }
26e41594 2420 }
0451c93c 2421 else
b34976b6 2422 unresolved_reloc = FALSE;
26e41594
AM
2423 }
2424 else
2425 {
0451c93c
MS
2426 if (local_got_offsets == NULL)
2427 abort ();
a85d7ed0 2428
26e41594 2429 off = local_got_offsets[r_symndx];
a85d7ed0 2430
26e41594
AM
2431 /* The offset must always be a multiple of 4. We use
2432 the least significant bit to record whether we have
2433 already generated the necessary reloc. */
2434 if ((off & 1) != 0)
2435 off &= ~1;
2436 else
2437 {
2438 bfd_put_32 (output_bfd, relocation,
f41345a7 2439 htab->elf.sgot->contents + off);
a85d7ed0 2440
0e1862bb 2441 if (bfd_link_pic (info))
26e41594
AM
2442 {
2443 asection *srelgot;
2444 Elf_Internal_Rela outrel;
947216bf 2445 bfd_byte *loc;
a85d7ed0 2446
f41345a7 2447 srelgot = htab->elf.srelgot;
0451c93c
MS
2448 if (srelgot == NULL)
2449 abort ();
a85d7ed0 2450
f41345a7
AK
2451 outrel.r_offset = (htab->elf.sgot->output_section->vma
2452 + htab->elf.sgot->output_offset
26e41594
AM
2453 + off);
2454 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
a85d7ed0 2455 outrel.r_addend = relocation;
947216bf
AM
2456 loc = srelgot->contents;
2457 loc += srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
26e41594
AM
2458 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2459 }
a85d7ed0 2460
26e41594
AM
2461 local_got_offsets[r_symndx] |= 1;
2462 }
2463 }
a85d7ed0 2464
0451c93c
MS
2465 if (off >= (bfd_vma) -2)
2466 abort ();
a85d7ed0 2467
470b557a 2468 relocation = base_got->output_offset + off;
befc3abb 2469
ae9a127f
NC
2470 /* For @GOTENT the relocation is against the offset between
2471 the instruction and the symbols entry in the GOT and not
2472 between the start of the GOT and the symbols entry. We
2473 add the vma of the GOT to get the correct value. */
5236c819
MS
2474 if ( r_type == R_390_GOTENT
2475 || r_type == R_390_GOTPLTENT)
470b557a 2476 relocation += base_got->output_section->vma;
befc3abb 2477
26e41594 2478 break;
dc810e39 2479
5236c819 2480 case R_390_GOTOFF16:
26e41594
AM
2481 case R_390_GOTOFF32:
2482 /* Relocation is relative to the start of the global offset
2483 table. */
2484
01a53584
AK
2485 if (h != NULL
2486 && s390_is_ifunc_symbol_p (h)
2487 && h->def_regular
2488 && !bfd_link_executable (info))
2489 {
2490 relocation = (htab->elf.iplt->output_section->vma
2491 + htab->elf.iplt->output_offset
2492 + h->plt.offset
2493 - htab->elf.sgot->output_section->vma);
2494 goto do_relocation;
2495 }
2496
26e41594
AM
2497 /* Note that sgot->output_offset is not involved in this
2498 calculation. We always want the start of .got. If we
2499 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2500 permitted by the ABI, we might have to change this
2501 calculation. */
f41345a7 2502 relocation -= htab->elf.sgot->output_section->vma;
26e41594
AM
2503 break;
2504
2505 case R_390_GOTPC:
befc3abb 2506 case R_390_GOTPCDBL:
26e41594 2507 /* Use global offset table as symbol value. */
f41345a7 2508 relocation = htab->elf.sgot->output_section->vma;
b34976b6 2509 unresolved_reloc = FALSE;
26e41594 2510 break;
a85d7ed0 2511
fb798c50 2512 case R_390_PLT12DBL:
26e41594 2513 case R_390_PLT16DBL:
fb798c50 2514 case R_390_PLT24DBL:
26e41594
AM
2515 case R_390_PLT32DBL:
2516 case R_390_PLT32:
2517 /* Relocation is to the entry for this symbol in the
2518 procedure linkage table. */
a85d7ed0 2519
26e41594
AM
2520 /* Resolve a PLT32 reloc against a local symbol directly,
2521 without using the procedure linkage table. */
2522 if (h == NULL)
2523 break;
a85d7ed0 2524
26e41594 2525 if (h->plt.offset == (bfd_vma) -1
470b557a 2526 || (htab->elf.splt == NULL && htab->elf.iplt == NULL))
26e41594
AM
2527 {
2528 /* We didn't make a PLT entry for this symbol. This
2529 happens when statically linking PIC code, or when
2530 using -Bsymbolic. */
2531 break;
2532 }
2533
470b557a
AK
2534 if (s390_is_ifunc_symbol_p (h))
2535 relocation = (htab->elf.iplt->output_section->vma
07d6d2b8 2536 + htab->elf.iplt->output_offset
470b557a
AK
2537 + h->plt.offset);
2538 else
2539 relocation = (htab->elf.splt->output_section->vma
2540 + htab->elf.splt->output_offset
2541 + h->plt.offset);
b34976b6 2542 unresolved_reloc = FALSE;
26e41594 2543 break;
a85d7ed0 2544
5236c819
MS
2545 case R_390_PLTOFF16:
2546 case R_390_PLTOFF32:
26e41594
AM
2547 /* Relocation is to the entry for this symbol in the
2548 procedure linkage table relative to the start of the GOT. */
5236c819
MS
2549
2550 /* For local symbols or if we didn't make a PLT entry for
2551 this symbol resolve the symbol directly. */
31db78f6 2552 if (h == NULL
5236c819 2553 || h->plt.offset == (bfd_vma) -1
31db78f6 2554 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
5236c819 2555 {
f41345a7 2556 relocation -= htab->elf.sgot->output_section->vma;
5236c819
MS
2557 break;
2558 }
2559
470b557a
AK
2560 if (s390_is_ifunc_symbol_p (h))
2561 relocation = (htab->elf.iplt->output_section->vma
2562 + htab->elf.iplt->output_offset
2563 + h->plt.offset
2564 - htab->elf.sgot->output_section->vma);
2565 else
2566 relocation = (htab->elf.splt->output_section->vma
2567 + htab->elf.splt->output_offset
2568 + h->plt.offset
2569 - htab->elf.sgot->output_section->vma);
5236c819 2570 unresolved_reloc = FALSE;
26e41594
AM
2571 break;
2572
26e41594 2573 case R_390_PC16:
fb798c50 2574 case R_390_PC12DBL:
26e41594 2575 case R_390_PC16DBL:
fb798c50 2576 case R_390_PC24DBL:
26e41594
AM
2577 case R_390_PC32DBL:
2578 case R_390_PC32:
99ba5125
AK
2579 if (h != NULL
2580 && s390_is_ifunc_symbol_p (h)
2581 && h->def_regular
2582 && !bfd_link_executable (info))
2583 {
2584 /* This will not work our if the function does not
2585 happen to set up the GOT pointer for some other
2586 reason. 31 bit PLT entries require r12 to hold the
2587 GOT pointer.
2588 FIXME: Implement an errorcheck.
2589 NOTE: It will work when brasl is not available
2590 (e.g. with -m31 -march=g5) since a local function
2591 call then does use GOTOFF which implies r12 being set
2592 up. */
2593 relocation = (htab->elf.iplt->output_section->vma
2594 + htab->elf.iplt->output_offset
2595 + h ->plt.offset);
2596 goto do_relocation;
2597 }
1a0670f3 2598 /* Fall through. */
99ba5125
AK
2599
2600 case R_390_8:
2601 case R_390_16:
2602 case R_390_32:
f657f8c4
NC
2603 if ((input_section->flags & SEC_ALLOC) == 0)
2604 break;
2605
470b557a
AK
2606 if (h != NULL
2607 && s390_is_ifunc_symbol_p (h)
2608 && h->def_regular)
2609 {
d7ab4911 2610 if (!bfd_link_pic (info))
470b557a
AK
2611 {
2612 /* For a non-shared object STT_GNU_IFUNC symbol must
2613 go through PLT. */
2614 relocation = (htab->elf.iplt->output_section->vma
2615 + htab->elf.iplt->output_offset
2616 + h ->plt.offset);
2617 goto do_relocation;
2618 }
2619 else
2620 {
2621 /* For shared objects a runtime relocation is needed. */
2622
2623 Elf_Internal_Rela outrel;
2624 asection *sreloc;
2625
2626 /* Need a dynamic relocation to get the real function
2627 address. */
2628 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2629 info,
2630 input_section,
2631 rel->r_offset);
2632 if (outrel.r_offset == (bfd_vma) -1
2633 || outrel.r_offset == (bfd_vma) -2)
2634 abort ();
2635
2636 outrel.r_offset += (input_section->output_section->vma
2637 + input_section->output_offset);
2638
2639 if (h->dynindx == -1
2640 || h->forced_local
0e1862bb 2641 || bfd_link_executable (info))
470b557a
AK
2642 {
2643 /* This symbol is resolved locally. */
2644 outrel.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
2645 outrel.r_addend = (h->root.u.def.value
2646 + h->root.u.def.section->output_section->vma
2647 + h->root.u.def.section->output_offset);
2648 }
2649 else
2650 {
2651 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
2652 outrel.r_addend = 0;
2653 }
2654
2655 sreloc = htab->elf.irelifunc;
2656 elf_append_rela (output_bfd, sreloc, &outrel);
2657
2658 /* If this reloc is against an external symbol, we
2659 do not want to fiddle with the addend. Otherwise,
2660 we need to include the symbol value so that it
2661 becomes an addend for the dynamic reloc. For an
2662 internal symbol, we have updated addend. */
2663 continue;
2664 }
2665 }
2666
0e1862bb 2667 if ((bfd_link_pic (info)
82058a73 2668 && (h == NULL
b27bb18f
L
2669 || (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2670 && !resolved_to_zero)
82058a73 2671 || h->root.type != bfd_link_hash_undefweak)
0451c93c 2672 && ((r_type != R_390_PC16
fb798c50 2673 && r_type != R_390_PC12DBL
0451c93c 2674 && r_type != R_390_PC16DBL
fb798c50 2675 && r_type != R_390_PC24DBL
befc3abb 2676 && r_type != R_390_PC32DBL
0451c93c 2677 && r_type != R_390_PC32)
8c21ca21 2678 || !SYMBOL_CALLS_LOCAL (info, h)))
64285810 2679 || (ELIMINATE_COPY_RELOCS
0e1862bb 2680 && !bfd_link_pic (info)
0451c93c
MS
2681 && h != NULL
2682 && h->dynindx != -1
f5385ebf
AM
2683 && !h->non_got_ref
2684 && ((h->def_dynamic
2685 && !h->def_regular)
0451c93c
MS
2686 || h->root.type == bfd_link_hash_undefweak
2687 || h->root.type == bfd_link_hash_undefined)))
26e41594
AM
2688 {
2689 Elf_Internal_Rela outrel;
2690 bfd_boolean skip, relocate;
0451c93c 2691 asection *sreloc;
947216bf 2692 bfd_byte *loc;
ec338859 2693
0451c93c
MS
2694 /* When generating a shared object, these relocations
2695 are copied into the output file to be resolved at run
2696 time. */
ec338859 2697
26e41594
AM
2698 skip = FALSE;
2699 relocate = FALSE;
ec338859 2700
c629eae0
JJ
2701 outrel.r_offset =
2702 _bfd_elf_section_offset (output_bfd, info, input_section,
2703 rel->r_offset);
2704 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2705 skip = TRUE;
0bb2d96a 2706 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2707 skip = TRUE, relocate = TRUE;
26e41594
AM
2708 outrel.r_offset += (input_section->output_section->vma
2709 + input_section->output_offset);
ec338859 2710
26e41594 2711 if (skip)
0bb2d96a 2712 memset (&outrel, 0, sizeof outrel);
26e41594 2713 else if (h != NULL
0451c93c
MS
2714 && h->dynindx != -1
2715 && (r_type == R_390_PC16
fb798c50 2716 || r_type == R_390_PC12DBL
0451c93c 2717 || r_type == R_390_PC16DBL
fb798c50 2718 || r_type == R_390_PC24DBL
befc3abb 2719 || r_type == R_390_PC32DBL
0451c93c 2720 || r_type == R_390_PC32
0e1862bb 2721 || !bfd_link_pic (info)
8c21ca21 2722 || !SYMBOLIC_BIND (info, h)
f5385ebf 2723 || !h->def_regular))
26e41594
AM
2724 {
2725 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
27018c3f 2726 outrel.r_addend = rel->r_addend;
26e41594
AM
2727 }
2728 else
2729 {
0451c93c 2730 /* This symbol is local, or marked to become local. */
90ced0dd 2731 outrel.r_addend = relocation + rel->r_addend;
b5727d75
MS
2732 if (r_type == R_390_32)
2733 {
2734 relocate = TRUE;
2735 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
b5727d75
MS
2736 }
2737 else
2738 {
2739 long sindx;
2740
90ced0dd 2741 if (bfd_is_abs_section (sec))
b5727d75
MS
2742 sindx = 0;
2743 else if (sec == NULL || sec->owner == NULL)
2744 {
2745 bfd_set_error(bfd_error_bad_value);
2746 return FALSE;
2747 }
2748 else
2749 {
2750 asection *osec;
2751
2752 osec = sec->output_section;
2753 sindx = elf_section_data (osec)->dynindx;
74541ad4
AM
2754 if (sindx == 0)
2755 {
2756 osec = htab->elf.text_index_section;
2757 sindx = elf_section_data (osec)->dynindx;
2758 }
2759 BFD_ASSERT (sindx != 0);
90ced0dd
MS
2760
2761 /* We are turning this relocation into one
2762 against a section symbol, so subtract out
2763 the output section's address but not the
2764 offset of the input section in the output
2765 section. */
90ced0dd 2766 outrel.r_addend -= osec->vma;
b5727d75
MS
2767 }
2768 outrel.r_info = ELF32_R_INFO (sindx, r_type);
b5727d75 2769 }
26e41594 2770 }
ec338859 2771
0451c93c
MS
2772 sreloc = elf_section_data (input_section)->sreloc;
2773 if (sreloc == NULL)
2774 abort ();
ec338859 2775
947216bf
AM
2776 loc = sreloc->contents;
2777 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
0451c93c 2778 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ec338859 2779
26e41594
AM
2780 /* If this reloc is against an external symbol, we do
2781 not want to fiddle with the addend. Otherwise, we
2782 need to include the symbol value so that it becomes
2783 an addend for the dynamic reloc. */
2784 if (! relocate)
2785 continue;
2786 }
0451c93c 2787 break;
ec338859 2788
69fc87f1
MS
2789 /* Relocations for tls literal pool entries. */
2790 case R_390_TLS_IE32:
0e1862bb 2791 if (bfd_link_pic (info))
69fc87f1
MS
2792 {
2793 Elf_Internal_Rela outrel;
2794 asection *sreloc;
2795 bfd_byte *loc;
2796
2797 outrel.r_offset = rel->r_offset
2798 + input_section->output_section->vma
2799 + input_section->output_offset;
2800 outrel.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
2801 sreloc = elf_section_data (input_section)->sreloc;
2802 if (sreloc == NULL)
2803 abort ();
2804 loc = sreloc->contents;
2805 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
2806 bfd_elf32_swap_reloc_out (output_bfd, &outrel, loc);
2807 }
ae9a127f 2808 /* Fall through. */
69fc87f1
MS
2809
2810 case R_390_TLS_GD32:
2811 case R_390_TLS_GOTIE32:
2812 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2813 tls_type = GOT_UNKNOWN;
2814 if (h == NULL && local_got_offsets)
2815 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2816 else if (h != NULL)
2817 {
2818 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb
L
2819 if (!bfd_link_pic (info)
2820 && h->dynindx == -1
2821 && tls_type >= GOT_TLS_IE)
69fc87f1
MS
2822 r_type = R_390_TLS_LE32;
2823 }
2824 if (r_type == R_390_TLS_GD32 && tls_type >= GOT_TLS_IE)
2825 r_type = R_390_TLS_IE32;
2826
2827 if (r_type == R_390_TLS_LE32)
2828 {
2829 /* This relocation gets optimized away by the local exec
2830 access optimization. */
2831 BFD_ASSERT (! unresolved_reloc);
2832 bfd_put_32 (output_bfd, -tpoff (info, relocation),
2833 contents + rel->r_offset);
2834 continue;
2835 }
2836
f41345a7 2837 if (htab->elf.sgot == NULL)
69fc87f1
MS
2838 abort ();
2839
2840 if (h != NULL)
2841 off = h->got.offset;
2842 else
2843 {
2844 if (local_got_offsets == NULL)
2845 abort ();
2846
2847 off = local_got_offsets[r_symndx];
2848 }
2849
2850 emit_tls_relocs:
2851
2852 if ((off & 1) != 0)
2853 off &= ~1;
26e41594 2854 else
69fc87f1
MS
2855 {
2856 Elf_Internal_Rela outrel;
2857 bfd_byte *loc;
2858 int dr_type, indx;
2859
f41345a7 2860 if (htab->elf.srelgot == NULL)
69fc87f1
MS
2861 abort ();
2862
f41345a7
AK
2863 outrel.r_offset = (htab->elf.sgot->output_section->vma
2864 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
2865
2866 indx = h && h->dynindx != -1 ? h->dynindx : 0;
2867 if (r_type == R_390_TLS_GD32)
2868 dr_type = R_390_TLS_DTPMOD;
2869 else
2870 dr_type = R_390_TLS_TPOFF;
2871 if (dr_type == R_390_TLS_TPOFF && indx == 0)
2872 outrel.r_addend = relocation - dtpoff_base (info);
2873 else
2874 outrel.r_addend = 0;
2875 outrel.r_info = ELF32_R_INFO (indx, dr_type);
f41345a7
AK
2876 loc = htab->elf.srelgot->contents;
2877 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
2878 * sizeof (Elf32_External_Rela);
2879 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2880
2881 if (r_type == R_390_TLS_GD32)
2882 {
2883 if (indx == 0)
2884 {
26e41594 2885 BFD_ASSERT (! unresolved_reloc);
69fc87f1
MS
2886 bfd_put_32 (output_bfd,
2887 relocation - dtpoff_base (info),
f41345a7 2888 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
2889 }
2890 else
2891 {
2892 outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_DTPOFF);
2893 outrel.r_offset += GOT_ENTRY_SIZE;
2894 outrel.r_addend = 0;
f41345a7 2895 htab->elf.srelgot->reloc_count++;
69fc87f1
MS
2896 loc += sizeof (Elf32_External_Rela);
2897 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2898 }
2899 }
2900
2901 if (h != NULL)
2902 h->got.offset |= 1;
2903 else
2904 local_got_offsets[r_symndx] |= 1;
2905 }
2906
2907 if (off >= (bfd_vma) -2)
2908 abort ();
2909 if (r_type == ELF32_R_TYPE (rel->r_info))
2910 {
f41345a7 2911 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 2912 if (r_type == R_390_TLS_IE32 || r_type == R_390_TLS_IEENT)
f41345a7 2913 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
2914 unresolved_reloc = FALSE;
2915 }
2916 else
2917 {
f41345a7 2918 bfd_put_32 (output_bfd, htab->elf.sgot->output_offset + off,
69fc87f1
MS
2919 contents + rel->r_offset);
2920 continue;
2921 }
2922 break;
2923
2924 case R_390_TLS_GOTIE12:
bd1ea41b 2925 case R_390_TLS_GOTIE20:
69fc87f1
MS
2926 case R_390_TLS_IEENT:
2927 if (h == NULL)
2928 {
2929 if (local_got_offsets == NULL)
2930 abort();
2931 off = local_got_offsets[r_symndx];
0e1862bb 2932 if (bfd_link_pic (info))
69fc87f1
MS
2933 goto emit_tls_relocs;
2934 }
2935 else
2936 {
2937 off = h->got.offset;
2938 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb
L
2939 if (bfd_link_pic (info)
2940 || h->dynindx != -1
2941 || tls_type < GOT_TLS_IE)
69fc87f1
MS
2942 goto emit_tls_relocs;
2943 }
2944
f41345a7 2945 if (htab->elf.sgot == NULL)
69fc87f1
MS
2946 abort ();
2947
2948 BFD_ASSERT (! unresolved_reloc);
2949 bfd_put_32 (output_bfd, -tpoff (info, relocation),
f41345a7
AK
2950 htab->elf.sgot->contents + off);
2951 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 2952 if (r_type == R_390_TLS_IEENT)
f41345a7 2953 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
2954 unresolved_reloc = FALSE;
2955 break;
2956
2957 case R_390_TLS_LDM32:
0e1862bb 2958 if (! bfd_link_pic (info))
69fc87f1
MS
2959 /* The literal pool entry this relocation refers to gets ignored
2960 by the optimized code of the local exec model. Do nothing
2961 and the value will turn out zero. */
2962 continue;
2963
f41345a7 2964 if (htab->elf.sgot == NULL)
69fc87f1
MS
2965 abort ();
2966
2967 off = htab->tls_ldm_got.offset;
2968 if (off & 1)
2969 off &= ~1;
2970 else
2971 {
2972 Elf_Internal_Rela outrel;
2973 bfd_byte *loc;
2974
f41345a7 2975 if (htab->elf.srelgot == NULL)
69fc87f1
MS
2976 abort ();
2977
f41345a7
AK
2978 outrel.r_offset = (htab->elf.sgot->output_section->vma
2979 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
2980
2981 bfd_put_32 (output_bfd, 0,
f41345a7 2982 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
2983 outrel.r_info = ELF32_R_INFO (0, R_390_TLS_DTPMOD);
2984 outrel.r_addend = 0;
f41345a7
AK
2985 loc = htab->elf.srelgot->contents;
2986 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
2987 * sizeof (Elf32_External_Rela);
2988 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
2989 htab->tls_ldm_got.offset |= 1;
2990 }
f41345a7 2991 relocation = htab->elf.sgot->output_offset + off;
26e41594 2992 unresolved_reloc = FALSE;
69fc87f1
MS
2993 break;
2994
2995 case R_390_TLS_LE32:
3cbc1e5e 2996 if (bfd_link_dll (info))
69fc87f1
MS
2997 {
2998 /* Linking a shared library with non-fpic code requires
2999 a R_390_TLS_TPOFF relocation. */
3000 Elf_Internal_Rela outrel;
3001 asection *sreloc;
3002 bfd_byte *loc;
3003 int indx;
3004
3005 outrel.r_offset = rel->r_offset
3006 + input_section->output_section->vma
3007 + input_section->output_offset;
3008 if (h != NULL && h->dynindx != -1)
3009 indx = h->dynindx;
3010 else
3011 indx = 0;
3012 outrel.r_info = ELF32_R_INFO (indx, R_390_TLS_TPOFF);
3013 if (indx == 0)
3014 outrel.r_addend = relocation - dtpoff_base (info);
3015 else
3016 outrel.r_addend = 0;
3017 sreloc = elf_section_data (input_section)->sreloc;
3018 if (sreloc == NULL)
3019 abort ();
3020 loc = sreloc->contents;
3021 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3022 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3023 }
3024 else
3025 {
3026 BFD_ASSERT (! unresolved_reloc);
3027 bfd_put_32 (output_bfd, -tpoff (info, relocation),
3028 contents + rel->r_offset);
3029 }
3030 continue;
3031
3032 case R_390_TLS_LDO32:
0e1862bb 3033 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
69fc87f1
MS
3034 relocation -= dtpoff_base (info);
3035 else
3036 /* When converting LDO to LE, we must negate. */
3037 relocation = -tpoff (info, relocation);
3038 break;
3039
3040 /* Relocations for tls instructions. */
3041 case R_390_TLS_LOAD:
3042 case R_390_TLS_GDCALL:
3043 case R_390_TLS_LDCALL:
3044 tls_type = GOT_UNKNOWN;
3045 if (h == NULL && local_got_offsets)
3046 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3047 else if (h != NULL)
3048 tls_type = elf_s390_hash_entry(h)->tls_type;
3049
3050 if (tls_type == GOT_TLS_GD)
3051 continue;
3052
3053 if (r_type == R_390_TLS_LOAD)
3054 {
0e1862bb 3055 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3056 {
3057 /* IE->LE transition. Four valid cases:
3058 l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0
3059 l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0
3060 l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0
3061 l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3062 unsigned int insn, ry;
3063
3064 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
69fc87f1
MS
3065 if ((insn & 0xff00f000) == 0x58000000)
3066 /* l %rx,0(%ry,0) -> lr %rx,%ry + bcr 0,0 */
3067 ry = (insn & 0x000f0000);
3068 else if ((insn & 0xff0f0000) == 0x58000000)
3069 /* l %rx,0(0,%ry) -> lr %rx,%ry + bcr 0,0 */
3070 ry = (insn & 0x0000f000) << 4;
3071 else if ((insn & 0xff00f000) == 0x5800c000)
3072 /* l %rx,0(%ry,%r12) -> lr %rx,%ry + bcr 0,0 */
3073 ry = (insn & 0x000f0000);
3074 else if ((insn & 0xff0f0000) == 0x580c0000)
3075 /* l %rx,0(%r12,%ry) -> lr %rx,%ry + bcr 0,0 */
3076 ry = (insn & 0x0000f000) << 4;
3077 else
3704e358
AK
3078 {
3079 invalid_tls_insn (input_bfd, input_section, rel);
3080 return FALSE;
3081 }
69fc87f1
MS
3082 insn = 0x18000700 | (insn & 0x00f00000) | ry;
3083 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3084 }
3085 }
3086 else if (r_type == R_390_TLS_GDCALL)
3087 {
3088 unsigned int insn;
3089
3090 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
77df2968 3091 if ((insn & 0xff000fff) != 0x4d000000 &&
d0ddfe27
AK
3092 (insn & 0xffff0000) != 0xc0e50000 &&
3093 (insn & 0xff000000) != 0x0d000000)
3704e358
AK
3094 {
3095 invalid_tls_insn (input_bfd, input_section, rel);
3096 return FALSE;
3097 }
0e1862bb 3098 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
77df2968 3099 {
d0ddfe27
AK
3100 if ((insn & 0xff000000) == 0x0d000000)
3101 {
3102 /* GD->LE transition.
3103 basr rx, ry -> nopr r7 */
3104 insn = 0x07070000 | (insn & 0xffff);
3105 }
3106 else if ((insn & 0xff000000) == 0x4d000000)
77df2968
MS
3107 {
3108 /* GD->LE transition.
3109 bas %r14,0(%rx,%r13) -> bc 0,0 */
3110 insn = 0x47000000;
3111 }
3112 else
3113 {
3114 /* GD->LE transition.
d0ddfe27 3115 brasl %r14,_tls_get_offset@plt -> brcl 0,. */
77df2968
MS
3116 insn = 0xc0040000;
3117 bfd_put_16 (output_bfd, 0x0000,
3118 contents + rel->r_offset + 4);
3119 }
3120 }
69fc87f1 3121 else
77df2968 3122 {
d0ddfe27
AK
3123 /* If basr is used in the pic case to invoke
3124 _tls_get_offset, something went wrong before. */
3125 if ((insn & 0xff000000) == 0x0d000000)
3704e358
AK
3126 {
3127 invalid_tls_insn (input_bfd, input_section, rel);
3128 return FALSE;
3129 }
d0ddfe27 3130
77df2968
MS
3131 if ((insn & 0xff000000) == 0x4d000000)
3132 {
3133 /* GD->IE transition.
3134 bas %r14,0(%rx,%r13) -> l %r2,0(%r2,%r12) */
3135 insn = 0x5822c000;
3136 }
3137 else
3138 {
3139 /* GD->IE transition.
3140 brasl %r14,__tls_get_addr@plt ->
07d6d2b8 3141 l %r2,0(%r2,%r12) ; bcr 0,0 */
77df2968
MS
3142 insn = 0x5822c000;
3143 bfd_put_16 (output_bfd, 0x0700,
3144 contents + rel->r_offset + 4);
3145 }
3146 }
69fc87f1
MS
3147 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3148 }
3149 else if (r_type == R_390_TLS_LDCALL)
3150 {
0e1862bb 3151 if (!bfd_link_pic (info))
69fc87f1
MS
3152 {
3153 unsigned int insn;
3154
3155 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
77df2968 3156 if ((insn & 0xff000fff) != 0x4d000000 &&
d0ddfe27
AK
3157 (insn & 0xffff0000) != 0xc0e50000 &&
3158 (insn & 0xff000000) != 0x0d000000)
3704e358
AK
3159 {
3160 invalid_tls_insn (input_bfd, input_section, rel);
3161 return FALSE;
3162 }
d0ddfe27
AK
3163
3164 if ((insn & 0xff000000) == 0x0d000000)
3165 {
3166 /* LD->LE transition.
3167 basr rx, ry -> nopr r7 */
3168 insn = 0x07070000 | (insn & 0xffff);
3169 }
3170 else if ((insn & 0xff000000) == 0x4d000000)
77df2968
MS
3171 {
3172 /* LD->LE transition.
3173 bas %r14,0(%rx,%r13) -> bc 0,0 */
3174 insn = 0x47000000;
3175 }
3176 else
3177 {
3178 /* LD->LE transition.
d0ddfe27 3179 brasl %r14,__tls_get_offset@plt -> brcl 0,. */
77df2968
MS
3180 insn = 0xc0040000;
3181 bfd_put_16 (output_bfd, 0x0000,
3182 contents + rel->r_offset + 4);
3183 }
69fc87f1
MS
3184 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
3185 }
3186 }
3187 continue;
3188
0451c93c
MS
3189 default:
3190 break;
3191 }
ec338859 3192
239e1f3a
AM
3193 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3194 because such sections are not SEC_ALLOC and thus ld.so will
3195 not process them. */
0451c93c 3196 if (unresolved_reloc
239e1f3a 3197 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3198 && h->def_dynamic)
3199 && _bfd_elf_section_offset (output_bfd, info, input_section,
3200 rel->r_offset) != (bfd_vma) -1)
4eca0228 3201 _bfd_error_handler
695344c0 3202 /* xgettext:c-format */
2dcf00ce
AM
3203 (_("%pB(%pA+%#" PRIx64 "): "
3204 "unresolvable %s relocation against symbol `%s'"),
d003868e
AM
3205 input_bfd,
3206 input_section,
2dcf00ce 3207 (uint64_t) rel->r_offset,
843fe662 3208 howto->name,
0451c93c 3209 h->root.root.string);
ec338859 3210
470b557a
AK
3211 do_relocation:
3212
fb798c50
AK
3213 /* When applying a 24 bit reloc we need to start one byte
3214 earlier. Otherwise the 32 bit get/put bfd operations might
3215 access a byte after the actual section. */
3216 if (r_type == R_390_PC24DBL
3217 || r_type == R_390_PLT24DBL)
3218 rel->r_offset--;
3219
bd1ea41b
MS
3220 if (r_type == R_390_20
3221 || r_type == R_390_GOT20
3222 || r_type == R_390_GOTPLT20
3223 || r_type == R_390_TLS_GOTIE20)
3224 {
3225 relocation += rel->r_addend;
3226 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3227 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3228 contents, rel->r_offset,
3229 relocation, 0);
3230 }
3231 else
3232 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3233 contents, rel->r_offset,
3234 relocation, rel->r_addend);
ec338859 3235
a85d7ed0
NC
3236 if (r != bfd_reloc_ok)
3237 {
0451c93c 3238 const char *name;
ec338859 3239
0451c93c
MS
3240 if (h != NULL)
3241 name = h->root.root.string;
3242 else
a85d7ed0 3243 {
0451c93c
MS
3244 name = bfd_elf_string_from_elf_section (input_bfd,
3245 symtab_hdr->sh_link,
3246 sym->st_name);
3247 if (name == NULL)
b34976b6 3248 return FALSE;
0451c93c 3249 if (*name == '\0')
fd361982 3250 name = bfd_section_name (sec);
0451c93c 3251 }
ec338859 3252
0451c93c 3253 if (r == bfd_reloc_overflow)
1a72702b
AM
3254 (*info->callbacks->reloc_overflow)
3255 (info, (h ? &h->root : NULL), name, howto->name,
3256 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
0451c93c
MS
3257 else
3258 {
4eca0228 3259 _bfd_error_handler
695344c0 3260 /* xgettext:c-format */
2dcf00ce 3261 (_("%pB(%pA+%#" PRIx64 "): reloc against `%s': error %d"),
d003868e 3262 input_bfd, input_section,
2dcf00ce 3263 (uint64_t) rel->r_offset, name, (int) r);
b34976b6 3264 return FALSE;
a85d7ed0
NC
3265 }
3266 }
3267 }
ec338859 3268
b34976b6 3269 return TRUE;
a85d7ed0
NC
3270}
3271
470b557a
AK
3272/* Generate the PLT slots together with the dynamic relocations needed
3273 for IFUNC symbols. */
3274
3275static void
3276elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3277 struct bfd_link_info *info,
3278 struct elf_link_hash_entry *h,
3279 struct elf_s390_link_hash_table *htab,
3280 bfd_vma iplt_offset,
3281 bfd_vma resolver_address)
3282{
3283 bfd_vma iplt_index;
3284 bfd_vma got_offset;
3285 bfd_vma igotiplt_offset;
3286 Elf_Internal_Rela rela;
3287 bfd_byte *loc;
3288 asection *plt, *gotplt, *relplt;
3289 bfd_vma relative_offset;
3290
3291 if (htab->elf.iplt == NULL
3292 || htab->elf.igotplt == NULL
3293 || htab->elf.irelplt == NULL)
3294 abort ();
3295
3296 gotplt = htab->elf.igotplt;
3297 relplt = htab->elf.irelplt;
3298
3299 /* Index of the PLT slot within iplt section. */
3300 iplt_index = iplt_offset / PLT_ENTRY_SIZE;
3301 plt = htab->elf.iplt;
3302 /* Offset into the igot.plt section. */
3303 igotiplt_offset = iplt_index * GOT_ENTRY_SIZE;
3304 /* Offset into the got section. */
3305 got_offset = igotiplt_offset + gotplt->output_offset;
3306
3307 /* S390 uses halfwords for relative branch calc! */
3308 relative_offset = - (plt->output_offset +
3309 (PLT_ENTRY_SIZE * iplt_index) + 18) / 2;
ceada896
AA
3310 /* If offset is > 32768, branch to a previous branch
3311 390 can only handle +-64 K jumps. */
470b557a
AK
3312 if ( -32768 > (int) relative_offset )
3313 relative_offset
3314 = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
3315
3316 /* Fill in the entry in the procedure linkage table. */
0e1862bb 3317 if (!bfd_link_pic (info))
470b557a
AK
3318 {
3319 memcpy (plt->contents + iplt_offset, elf_s390_plt_entry,
3320 PLT_ENTRY_SIZE);
3321
3322 /* Adjust jump to the first plt entry. */
3323 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3324 plt->contents + iplt_offset + 20);
3325
3326 /* Push the GOT offset field. */
3327 bfd_put_32 (output_bfd,
3328 (gotplt->output_section->vma
3329 + got_offset),
3330 plt->contents + iplt_offset + 24);
3331 }
3332 else if (got_offset < 4096)
3333 {
3334 /* The GOT offset is small enough to be used directly as
3335 displacement. */
3336 memcpy (plt->contents + iplt_offset,
3337 elf_s390_plt_pic12_entry,
3338 PLT_ENTRY_SIZE);
3339
3340 /* Put in the GOT offset as displacement value. The 0xc000
3341 value comes from the first word of the plt entry. Look
3342 at the elf_s390_plt_pic16_entry content. */
3343 bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3344 plt->contents + iplt_offset + 2);
3345
3346 /* Adjust the jump to the first plt entry. */
3347 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3348 plt->contents + iplt_offset + 20);
3349 }
3350 else if (got_offset < 32768)
3351 {
3352 /* The GOT offset is too big for a displacement but small
3353 enough to be a signed 16 bit immediate value as it can be
3354 used in an lhi instruction. */
3355 memcpy (plt->contents + iplt_offset,
3356 elf_s390_plt_pic16_entry,
3357 PLT_ENTRY_SIZE);
3358
3359 /* Put in the GOT offset for the lhi instruction. */
3360 bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3361 plt->contents + iplt_offset + 2);
3362
3363 /* Adjust the jump to the first plt entry. */
3364 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3365 plt->contents + iplt_offset + 20);
3366 }
3367 else
3368 {
3369 memcpy (plt->contents + iplt_offset,
3370 elf_s390_plt_pic_entry,
3371 PLT_ENTRY_SIZE);
3372
3373 /* Adjust the jump to the first plt entry. */
3374 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3375 plt->contents + iplt_offset + 20);
3376
3377 /* Push the GOT offset field. */
3378 bfd_put_32 (output_bfd, got_offset,
3379 plt->contents + iplt_offset + 24);
3380 }
3381 /* Insert offset into reloc. table here. */
3382 bfd_put_32 (output_bfd, relplt->output_offset +
3383 iplt_index * RELA_ENTRY_SIZE,
3384 plt->contents + iplt_offset + 28);
3385
3386 /* Fill in the entry in the global offset table.
3387 Points to instruction after GOT offset. */
3388 bfd_put_32 (output_bfd,
3389 (plt->output_section->vma
3390 + plt->output_offset
3391 + iplt_offset
3392 + 12),
3393 gotplt->contents + igotiplt_offset);
3394
3395 /* Fill in the entry in the .rela.plt section. */
3396 rela.r_offset = gotplt->output_section->vma + got_offset;
3397
3398 if (!h
3399 || h->dynindx == -1
0e1862bb 3400 || ((bfd_link_executable (info)
470b557a
AK
3401 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3402 && h->def_regular))
3403 {
3404 /* The symbol can be locally resolved. */
3405 rela.r_info = ELF32_R_INFO (0, R_390_IRELATIVE);
3406 rela.r_addend = resolver_address;
3407 }
3408 else
3409 {
3410 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3411 rela.r_addend = 0;
3412 }
3413
3414 loc = relplt->contents + iplt_index * RELA_ENTRY_SIZE;
3415 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3416}
3417
a85d7ed0
NC
3418/* Finish up dynamic symbol handling. We set the contents of various
3419 dynamic sections here. */
3420
b34976b6 3421static bfd_boolean
2c3fc389
NC
3422elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3423 struct bfd_link_info *info,
3424 struct elf_link_hash_entry *h,
3425 Elf_Internal_Sym *sym)
a85d7ed0 3426{
0451c93c 3427 struct elf_s390_link_hash_table *htab;
470b557a 3428 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
ec338859 3429
0451c93c 3430 htab = elf_s390_hash_table (info);
ec338859 3431
a85d7ed0
NC
3432 if (h->plt.offset != (bfd_vma) -1)
3433 {
0451c93c
MS
3434 bfd_vma plt_index;
3435 bfd_vma got_offset;
a85d7ed0 3436 Elf_Internal_Rela rela;
947216bf 3437 bfd_byte *loc;
a85d7ed0 3438 bfd_vma relative_offset;
ec338859 3439
a85d7ed0 3440 /* This symbol has an entry in the procedure linkage table. Set
26e41594 3441 it up. */
0a511368 3442 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
0451c93c 3443 {
0a511368
AK
3444 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3445 htab, h->plt.offset,
3446 eh->ifunc_resolver_address +
3447 eh->ifunc_resolver_section->output_offset +
3448 eh->ifunc_resolver_section->output_section->vma);
3449 /* Do not return yet. Handling of explicit GOT slots of
3450 IFUNC symbols is below. */
0451c93c 3451 }
a85d7ed0 3452 else
0451c93c 3453 {
470b557a
AK
3454 if (h->dynindx == -1
3455 || htab->elf.splt == NULL
3456 || htab->elf.sgotplt == NULL
3457 || htab->elf.srelplt == NULL)
3458 abort ();
9aa17453 3459
470b557a
AK
3460 /* Calc. index no.
3461 Current offset - size first entry / entry size. */
3462 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
9aa17453 3463
470b557a
AK
3464 /* Offset in GOT is PLT index plus GOT headers(3) times 4,
3465 addr & GOT addr. */
3466 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
a85d7ed0 3467
470b557a
AK
3468 /* S390 uses halfwords for relative branch calc! */
3469 relative_offset = - ((PLT_FIRST_ENTRY_SIZE +
3470 (PLT_ENTRY_SIZE * plt_index) + 18) / 2);
3471 /* If offset is > 32768, branch to a previous branch
3472 390 can only handle +-64 K jumps. */
3473 if ( -32768 > (int) relative_offset )
3474 relative_offset
3475 = -(unsigned) (((65536 / PLT_ENTRY_SIZE - 1) * PLT_ENTRY_SIZE) / 2);
ec338859 3476
470b557a 3477 /* Fill in the entry in the procedure linkage table. */
0e1862bb 3478 if (!bfd_link_pic (info))
470b557a
AK
3479 {
3480 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390_plt_entry,
3481 PLT_ENTRY_SIZE);
3482
3483 /* Adjust jump to the first plt entry. */
3484 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3485 htab->elf.splt->contents + h->plt.offset + 20);
3486
3487 /* Push the GOT offset field. */
3488 bfd_put_32 (output_bfd,
3489 (htab->elf.sgotplt->output_section->vma
3490 + htab->elf.sgotplt->output_offset
3491 + got_offset),
3492 htab->elf.splt->contents + h->plt.offset + 24);
3493 }
3494 else if (got_offset < 4096)
3495 {
3496 /* The GOT offset is small enough to be used directly as
3497 displacement. */
3498 memcpy (htab->elf.splt->contents + h->plt.offset,
3499 elf_s390_plt_pic12_entry,
3500 PLT_ENTRY_SIZE);
3501
3502 /* Put in the GOT offset as displacement value. The 0xc000
3503 value comes from the first word of the plt entry. Look
3b67f094 3504 at the elf_s390_plt_pic12_entry content. */
470b557a
AK
3505 bfd_put_16 (output_bfd, (bfd_vma)0xc000 | got_offset,
3506 htab->elf.splt->contents + h->plt.offset + 2);
3507
3508 /* Adjust the jump to the first plt entry. */
3509 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3510 htab->elf.splt->contents + h->plt.offset + 20);
3511 }
3512 else if (got_offset < 32768)
3513 {
3514 /* The GOT offset is too big for a displacement but small
3515 enough to be a signed 16 bit immediate value as it can be
3516 used in an lhi instruction. */
3517 memcpy (htab->elf.splt->contents + h->plt.offset,
3518 elf_s390_plt_pic16_entry,
3519 PLT_ENTRY_SIZE);
3520
3521 /* Put in the GOT offset for the lhi instruction. */
3522 bfd_put_16 (output_bfd, (bfd_vma)got_offset,
3523 htab->elf.splt->contents + h->plt.offset + 2);
3524
3525 /* Adjust the jump to the first plt entry. */
3526 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3527 htab->elf.splt->contents + h->plt.offset + 20);
3528 }
3529 else
3530 {
3531 memcpy (htab->elf.splt->contents + h->plt.offset,
3532 elf_s390_plt_pic_entry,
3533 PLT_ENTRY_SIZE);
3534
3535 /* Adjust the jump to the first plt entry. */
3536 bfd_put_32 (output_bfd, (bfd_vma) 0+(relative_offset << 16),
3537 htab->elf.splt->contents + h->plt.offset + 20);
3538
3539 /* Push the GOT offset field. */
3540 bfd_put_32 (output_bfd, got_offset,
3541 htab->elf.splt->contents + h->plt.offset + 24);
3542 }
3543 /* Insert offset into reloc. table here. */
3544 bfd_put_32 (output_bfd, plt_index * sizeof (Elf32_External_Rela),
3545 htab->elf.splt->contents + h->plt.offset + 28);
3546
3547 /* Fill in the entry in the global offset table.
3548 Points to instruction after GOT offset. */
3549 bfd_put_32 (output_bfd,
3550 (htab->elf.splt->output_section->vma
3551 + htab->elf.splt->output_offset
3552 + h->plt.offset
3553 + 12),
3554 htab->elf.sgotplt->contents + got_offset);
3555
3556 /* Fill in the entry in the .rela.plt section. */
3557 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3558 + htab->elf.sgotplt->output_offset
3559 + got_offset);
3560 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_JMP_SLOT);
3561 rela.r_addend = 0;
3562 loc = htab->elf.srelplt->contents + plt_index * sizeof (Elf32_External_Rela);
3563 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
3564
3565 if (!h->def_regular)
3566 {
3567 /* Mark the symbol as undefined, rather than as defined in
3568 the .plt section. Leave the value alone. This is a clue
3569 for the dynamic linker, to make function pointer
3570 comparisons work between an application and shared
3571 library. */
3572 sym->st_shndx = SHN_UNDEF;
3573 }
a85d7ed0
NC
3574 }
3575 }
ec338859 3576
69fc87f1
MS
3577 if (h->got.offset != (bfd_vma) -1
3578 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3579 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3580 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
a85d7ed0 3581 {
a85d7ed0 3582 Elf_Internal_Rela rela;
947216bf 3583 bfd_byte *loc;
a85d7ed0
NC
3584
3585 /* This symbol has an entry in the global offset table. Set it
26e41594 3586 up. */
a85d7ed0 3587
f41345a7 3588 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
0451c93c 3589 abort ();
a85d7ed0 3590
f41345a7
AK
3591 rela.r_offset = (htab->elf.sgot->output_section->vma
3592 + htab->elf.sgot->output_offset
dc810e39 3593 + (h->got.offset &~ (bfd_vma) 1));
a85d7ed0
NC
3594
3595 /* If this is a static link, or it is a -Bsymbolic link and the
3596 symbol is defined locally or was forced to be local because
3597 of a version file, we just want to emit a RELATIVE reloc.
3598 The entry in the global offset table will already have been
3599 initialized in the relocate_section function. */
470b557a
AK
3600 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3601 {
0e1862bb 3602 if (bfd_link_pic (info))
470b557a
AK
3603 {
3604 /* An explicit GOT slot usage needs GLOB_DAT. If the
3605 symbol references local the implicit got.iplt slot
3606 will be used and the IRELATIVE reloc has been created
3607 above. */
3608 goto do_glob_dat;
3609 }
3610 else
3611 {
3612 /* For non-shared objects explicit GOT slots must be
3613 filled with the PLT slot address for pointer
3614 equality reasons. */
3615 bfd_put_32 (output_bfd, (htab->elf.iplt->output_section->vma
3616 + htab->elf.iplt->output_offset
3617 + h->plt.offset),
3618 htab->elf.sgot->contents + h->got.offset);
3619 return TRUE;
3620 }
3621 }
0e1862bb 3622 else if (bfd_link_pic (info)
ceada896 3623 && SYMBOL_REFERENCES_LOCAL (info, h))
0451c93c 3624 {
470b557a
AK
3625 /* If this is a static link, or it is a -Bsymbolic link and
3626 the symbol is defined locally or was forced to be local
3627 because of a version file, we just want to emit a
3628 RELATIVE reloc. The entry in the global offset table
3629 will already have been initialized in the
3630 relocate_section function. */
8170f769 3631 if (!(h->def_regular || ELF_COMMON_DEF_P (h)))
8c21ca21 3632 return FALSE;
0451c93c
MS
3633 BFD_ASSERT((h->got.offset & 1) != 0);
3634 rela.r_info = ELF32_R_INFO (0, R_390_RELATIVE);
3635 rela.r_addend = (h->root.u.def.value
26e41594
AM
3636 + h->root.u.def.section->output_section->vma
3637 + h->root.u.def.section->output_offset);
3638 }
a85d7ed0
NC
3639 else
3640 {
3641 BFD_ASSERT((h->got.offset & 1) == 0);
470b557a 3642 do_glob_dat:
f41345a7 3643 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
a85d7ed0 3644 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_GLOB_DAT);
26e41594
AM
3645 rela.r_addend = 0;
3646 }
a85d7ed0 3647
f41345a7
AK
3648 loc = htab->elf.srelgot->contents;
3649 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
0451c93c 3650 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3651 }
3652
f5385ebf 3653 if (h->needs_copy)
a85d7ed0 3654 {
a85d7ed0 3655 Elf_Internal_Rela rela;
5474d94f 3656 asection *s;
947216bf 3657 bfd_byte *loc;
a85d7ed0
NC
3658
3659 /* This symbols needs a copy reloc. Set it up. */
3660
0451c93c
MS
3661 if (h->dynindx == -1
3662 || (h->root.type != bfd_link_hash_defined
3663 && h->root.type != bfd_link_hash_defweak)
5474d94f
AM
3664 || htab->elf.srelbss == NULL
3665 || htab->elf.sreldynrelro == NULL)
0451c93c 3666 abort ();
a85d7ed0
NC
3667
3668 rela.r_offset = (h->root.u.def.value
3669 + h->root.u.def.section->output_section->vma
3670 + h->root.u.def.section->output_offset);
3671 rela.r_info = ELF32_R_INFO (h->dynindx, R_390_COPY);
3672 rela.r_addend = 0;
afbf7e8e 3673 if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f
AM
3674 s = htab->elf.sreldynrelro;
3675 else
3676 s = htab->elf.srelbss;
3677 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
0451c93c 3678 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3679 }
3680
3681 /* Mark some specially defined symbols as absolute. */
9637f6ef 3682 if (h == htab->elf.hdynamic
22edb2f1
RS
3683 || h == htab->elf.hgot
3684 || h == htab->elf.hplt)
a85d7ed0
NC
3685 sym->st_shndx = SHN_ABS;
3686
b34976b6 3687 return TRUE;
a85d7ed0
NC
3688}
3689
0451c93c
MS
3690/* Used to decide how to sort relocs in an optimal manner for the
3691 dynamic linker, before writing them out. */
3692
3693static enum elf_reloc_type_class
7e612e98
AM
3694elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3695 const asection *rel_sec ATTRIBUTE_UNUSED,
3696 const Elf_Internal_Rela *rela)
0451c93c 3697{
0f042c67
AK
3698 bfd *abfd = info->output_bfd;
3699 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3700 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3701 unsigned long r_symndx = ELF32_R_SYM (rela->r_info);
3702 Elf_Internal_Sym sym;
3703
3704 if (htab->elf.dynsym == NULL
3705 || !bed->s->swap_symbol_in (abfd,
3706 (htab->elf.dynsym->contents
3707 + r_symndx * bed->s->sizeof_sym),
3708 0, &sym))
3709 abort ();
3710
3711 /* Check relocation against STT_GNU_IFUNC symbol. */
3712 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3713 return reloc_class_ifunc;
3714
0451c93c
MS
3715 switch ((int) ELF32_R_TYPE (rela->r_info))
3716 {
3717 case R_390_RELATIVE:
3718 return reloc_class_relative;
3719 case R_390_JMP_SLOT:
3720 return reloc_class_plt;
3721 case R_390_COPY:
3722 return reloc_class_copy;
3723 default:
3724 return reloc_class_normal;
3725 }
3726}
3727
a85d7ed0
NC
3728/* Finish up the dynamic sections. */
3729
b34976b6 3730static bfd_boolean
2c3fc389
NC
3731elf_s390_finish_dynamic_sections (bfd *output_bfd,
3732 struct bfd_link_info *info)
a85d7ed0 3733{
0451c93c 3734 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
3735 bfd *dynobj;
3736 asection *sdyn;
470b557a
AK
3737 bfd *ibfd;
3738 unsigned int i;
a85d7ed0 3739
0451c93c
MS
3740 htab = elf_s390_hash_table (info);
3741 dynobj = htab->elf.dynobj;
3d4d4302 3742 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
a85d7ed0 3743
0451c93c 3744 if (htab->elf.dynamic_sections_created)
a85d7ed0 3745 {
a85d7ed0
NC
3746 Elf32_External_Dyn *dyncon, *dynconend;
3747
f41345a7 3748 if (sdyn == NULL || htab->elf.sgot == NULL)
0451c93c 3749 abort ();
a85d7ed0
NC
3750
3751 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 3752 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
a85d7ed0
NC
3753 for (; dyncon < dynconend; dyncon++)
3754 {
3755 Elf_Internal_Dyn dyn;
a85d7ed0 3756 asection *s;
ec338859 3757
a85d7ed0 3758 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
ec338859 3759
a85d7ed0
NC
3760 switch (dyn.d_tag)
3761 {
3762 default:
0451c93c 3763 continue;
ec338859 3764
a85d7ed0 3765 case DT_PLTGOT:
4ade44b7
AM
3766 s = htab->elf.sgotplt;
3767 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
0451c93c 3768 break;
ec338859 3769
a85d7ed0 3770 case DT_JMPREL:
4ade44b7
AM
3771 s = htab->elf.srelplt;
3772 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
a85d7ed0
NC
3773 break;
3774
3775 case DT_PLTRELSZ:
79c12fae
AK
3776 dyn.d_un.d_val = htab->elf.srelplt->size;
3777 if (htab->elf.irelplt)
3778 dyn.d_un.d_val += htab->elf.irelplt->size;
a85d7ed0
NC
3779 break;
3780 }
0451c93c
MS
3781
3782 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
a85d7ed0
NC
3783 }
3784
3785 /* Fill in the special first entry in the procedure linkage table. */
f41345a7 3786 if (htab->elf.splt && htab->elf.splt->size > 0)
a85d7ed0 3787 {
f41345a7 3788 memset (htab->elf.splt->contents, 0, PLT_FIRST_ENTRY_SIZE);
0e1862bb 3789 if (bfd_link_pic (info))
0451c93c 3790 {
f41345a7 3791 memcpy (htab->elf.splt->contents, elf_s390_plt_pic_first_entry,
9aa17453
AK
3792 PLT_FIRST_ENTRY_SIZE);
3793 }
26e41594 3794 else
9aa17453 3795 {
f41345a7 3796 memcpy (htab->elf.splt->contents, elf_s390_plt_first_entry,
9aa17453 3797 PLT_FIRST_ENTRY_SIZE);
26e41594 3798 bfd_put_32 (output_bfd,
f41345a7
AK
3799 htab->elf.sgotplt->output_section->vma
3800 + htab->elf.sgotplt->output_offset,
3801 htab->elf.splt->contents + 24);
ceada896 3802 }
f41345a7 3803 elf_section_data (htab->elf.splt->output_section)
0451c93c 3804 ->this_hdr.sh_entsize = 4;
a85d7ed0
NC
3805 }
3806
3807 }
3808
f41345a7 3809 if (htab->elf.sgotplt)
a85d7ed0 3810 {
0451c93c 3811 /* Fill in the first three entries in the global offset table. */
f41345a7 3812 if (htab->elf.sgotplt->size > 0)
0451c93c
MS
3813 {
3814 bfd_put_32 (output_bfd,
3815 (sdyn == NULL ? (bfd_vma) 0
3816 : sdyn->output_section->vma + sdyn->output_offset),
f41345a7 3817 htab->elf.sgotplt->contents);
0451c93c 3818 /* One entry for shared object struct ptr. */
f41345a7 3819 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 4);
0451c93c 3820 /* One entry for _dl_runtime_resolve. */
f41345a7 3821 bfd_put_32 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
0451c93c 3822 }
a85d7ed0 3823
f41345a7 3824 elf_section_data (htab->elf.sgotplt->output_section)
0451c93c
MS
3825 ->this_hdr.sh_entsize = 4;
3826 }
470b557a 3827 /* Finish dynamic symbol for local IFUNC symbols. */
c72f2fb2 3828 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
470b557a
AK
3829 {
3830 struct plt_entry *local_plt;
3831 Elf_Internal_Sym *isym;
3832 Elf_Internal_Shdr *symtab_hdr;
3833
3834 symtab_hdr = &elf_symtab_hdr (ibfd);
3835
1ef692ea
AK
3836 if (!is_s390_elf (ibfd))
3837 continue;
3838
470b557a
AK
3839 local_plt = elf_s390_local_plt (ibfd);
3840 if (local_plt != NULL)
3841 for (i = 0; i < symtab_hdr->sh_info; i++)
3842 {
3843 if (local_plt[i].plt.offset != (bfd_vma) -1)
3844 {
3845 asection *sec = local_plt[i].sec;
3846 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3847 if (isym == NULL)
3848 return FALSE;
3849
3850 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3851 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3852 local_plt[i].plt.offset,
3853 isym->st_value
3854 + sec->output_section->vma
3855 + sec->output_offset);
3856
3857 }
3858 }
3859 }
b34976b6 3860 return TRUE;
a85d7ed0 3861}
e3e9290d
AA
3862\f
3863/* Support for core dump NOTE sections. */
a85d7ed0 3864
b34976b6 3865static bfd_boolean
2c3fc389 3866elf_s390_grok_prstatus (bfd * abfd, Elf_Internal_Note * note)
979f4a38
NC
3867{
3868 int offset;
eea6121a 3869 unsigned int size;
979f4a38
NC
3870
3871 switch (note->descsz)
3872 {
ceada896
AA
3873 default:
3874 return FALSE;
979f4a38 3875
ceada896
AA
3876 case 224: /* S/390 Linux. */
3877 /* pr_cursig */
3878 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
979f4a38 3879
ceada896
AA
3880 /* pr_pid */
3881 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
979f4a38 3882
ceada896
AA
3883 /* pr_reg */
3884 offset = 72;
3885 size = 144;
3886 break;
979f4a38
NC
3887 }
3888
3889 /* Make a ".reg/999" section. */
3890 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
eea6121a 3891 size, note->descpos + offset);
979f4a38
NC
3892}
3893
e3e9290d
AA
3894static bfd_boolean
3895elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3896{
3897 switch (note->descsz)
3898 {
3899 default:
3900 return FALSE;
3901
3902 case 124: /* sizeof(struct elf_prpsinfo) on s390 */
3903 elf_tdata (abfd)->core->pid
3904 = bfd_get_32 (abfd, note->descdata + 12);
3905 elf_tdata (abfd)->core->program
3906 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
3907 elf_tdata (abfd)->core->command
3908 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
3909 break;
3910 }
3911
3912 /* Note that for some reason, a spurious space is tacked
3913 onto the end of the args in some (at least one anyway)
3914 implementations, so strip it off if it exists. */
3915
3916 {
3917 char *command = elf_tdata (abfd)->core->command;
3918 int n = strlen (command);
3919
3920 if (0 < n && command[n - 1] == ' ')
3921 command[n - 1] = '\0';
3922 }
3923
3924 return TRUE;
3925}
3926
3927static char *
3928elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3929 int note_type, ...)
3930{
3931 va_list ap;
3932
3933 switch (note_type)
3934 {
3935 default:
3936 return NULL;
3937
3938 case NT_PRPSINFO:
3939 {
602f1657 3940 char data[124] ATTRIBUTE_NONSTRING = { 0 };
e3e9290d
AA
3941 const char *fname, *psargs;
3942
3943 va_start (ap, note_type);
3944 fname = va_arg (ap, const char *);
3945 psargs = va_arg (ap, const char *);
3946 va_end (ap);
3947
3948 strncpy (data + 28, fname, 16);
898ade12 3949#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 3950 DIAGNOSTIC_PUSH;
be3e27bb 3951 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
3952 -Wstringop-truncation:
3953 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
3954 */
95da9854
L
3955 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
3956#endif
e3e9290d 3957 strncpy (data + 44, psargs, 80);
898ade12 3958#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 3959 DIAGNOSTIC_POP;
fe75810f 3960#endif
e3e9290d
AA
3961 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3962 &data, sizeof (data));
3963 }
3964
3965 case NT_PRSTATUS:
3966 {
3967 char data[224] = { 0 };
3968 long pid;
3969 int cursig;
3970 const void *gregs;
3971
3972 va_start (ap, note_type);
3973 pid = va_arg (ap, long);
3974 cursig = va_arg (ap, int);
3975 gregs = va_arg (ap, const void *);
3976 va_end (ap);
3977
3978 bfd_put_16 (abfd, cursig, data + 12);
3979 bfd_put_32 (abfd, pid, data + 24);
3980 memcpy (data + 72, gregs, 144);
3981 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3982 &data, sizeof (data));
3983 }
3984 }
3985 /* NOTREACHED */
3986}
3987\f
4c45e5c9
JJ
3988/* Return address for Ith PLT stub in section PLT, for relocation REL
3989 or (bfd_vma) -1 if it should not be included. */
3990
3991static bfd_vma
3992elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3993 const arelent *rel ATTRIBUTE_UNUSED)
3994{
3995 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3996}
3997
643f7afb
AK
3998/* Merge backend specific data from an object file to the output
3999 object file when linking. */
4000
55786da2 4001static bfd_boolean
50e03d47 4002elf32_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
55786da2 4003{
50e03d47
AM
4004 bfd *obfd = info->output_bfd;
4005
643f7afb
AK
4006 if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
4007 return TRUE;
4008
50e03d47 4009 if (!elf_s390_merge_obj_attributes (ibfd, info))
643f7afb
AK
4010 return FALSE;
4011
55786da2
AK
4012 elf_elfheader (obfd)->e_flags |= elf_elfheader (ibfd)->e_flags;
4013 return TRUE;
4014}
4015
4c45e5c9 4016
6d00b590 4017#define TARGET_BIG_SYM s390_elf32_vec
a85d7ed0
NC
4018#define TARGET_BIG_NAME "elf32-s390"
4019#define ELF_ARCH bfd_arch_s390
ae95ffa6 4020#define ELF_TARGET_ID S390_ELF_DATA
a85d7ed0
NC
4021#define ELF_MACHINE_CODE EM_S390
4022#define ELF_MACHINE_ALT1 EM_S390_OLD
4023#define ELF_MAXPAGESIZE 0x1000
4024
4025#define elf_backend_can_gc_sections 1
51b64d56 4026#define elf_backend_can_refcount 1
a85d7ed0
NC
4027#define elf_backend_want_got_plt 1
4028#define elf_backend_plt_readonly 1
4029#define elf_backend_want_plt_sym 0
4030#define elf_backend_got_header_size 12
5474d94f 4031#define elf_backend_want_dynrelro 1
b491616a 4032#define elf_backend_rela_normal 1
a85d7ed0 4033
26e41594 4034#define elf_info_to_howto elf_s390_info_to_howto
a85d7ed0 4035
a85d7ed0
NC
4036#define bfd_elf32_bfd_is_local_label_name elf_s390_is_local_label_name
4037#define bfd_elf32_bfd_link_hash_table_create elf_s390_link_hash_table_create
4038#define bfd_elf32_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
157090f7 4039#define bfd_elf32_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
a85d7ed0 4040
55786da2
AK
4041#define bfd_elf32_bfd_merge_private_bfd_data elf32_s390_merge_private_bfd_data
4042
a85d7ed0 4043#define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
26e41594 4044#define elf_backend_check_relocs elf_s390_check_relocs
0451c93c 4045#define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
9d19e4fd 4046#define elf_backend_create_dynamic_sections _bfd_elf_create_dynamic_sections
a85d7ed0
NC
4047#define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4048#define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
26e41594 4049#define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
0451c93c 4050#define elf_backend_reloc_type_class elf_s390_reloc_type_class
26e41594 4051#define elf_backend_relocate_section elf_s390_relocate_section
a85d7ed0 4052#define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
74541ad4 4053#define elf_backend_init_index_section _bfd_elf_init_1_index_section
979f4a38 4054#define elf_backend_grok_prstatus elf_s390_grok_prstatus
e3e9290d
AA
4055#define elf_backend_grok_psinfo elf_s390_grok_psinfo
4056#define elf_backend_write_core_note elf_s390_write_core_note
4c45e5c9 4057#define elf_backend_plt_sym_val elf_s390_plt_sym_val
07d6d2b8 4058#define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
a85d7ed0 4059
69fc87f1 4060#define bfd_elf32_mkobject elf_s390_mkobject
26e41594 4061#define elf_backend_object_p elf_s390_object_p
a85d7ed0 4062
a2f63b2e
MR
4063#define elf_backend_linux_prpsinfo32_ugid16 TRUE
4064
a85d7ed0 4065#include "elf32-target.h"
This page took 1.997479 seconds and 4 git commands to generate.