Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf64-s390.c
CommitLineData
a85d7ed0 1/* IBM S/390-specific support for 64-bit ELF
6f2750fe 2 Copyright (C) 2000-2016 Free Software Foundation, Inc.
a85d7ed0
NC
3 Contributed Martin Schwidefsky (schwidefsky@de.ibm.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
a85d7ed0
NC
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
3e110533 19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
53e09e0a 20 02110-1301, USA. */
a85d7ed0 21
a85d7ed0 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
a85d7ed0
NC
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
a85d7ed0 27#include "elf/s390.h"
e3e9290d 28#include <stdarg.h>
a85d7ed0
NC
29
30/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
31 from smaller values. Start with zero, widen, *then* decrement. */
32#define MINUS_ONE (((bfd_vma)0) - 1)
33
2c3fc389
NC
34static bfd_reloc_status_type
35s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
36 asection *, bfd *, char **);
37static bfd_reloc_status_type
38s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
39 asection *, bfd *, char **);
40
a85d7ed0
NC
41/* The relocation "howto" table. */
42static reloc_howto_type elf_howto_table[] =
43{
44 HOWTO (R_390_NONE, /* type */
45 0, /* rightshift */
6346d5ca 46 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
a85d7ed0 47 0, /* bitsize */
b34976b6 48 FALSE, /* pc_relative */
a85d7ed0
NC
49 0, /* bitpos */
50 complain_overflow_dont, /* complain_on_overflow */
51 bfd_elf_generic_reloc, /* special_function */
52 "R_390_NONE", /* name */
b34976b6 53 FALSE, /* partial_inplace */
a85d7ed0
NC
54 0, /* src_mask */
55 0, /* dst_mask */
b34976b6
AM
56 FALSE), /* pcrel_offset */
57
5236c819
MS
58 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
60 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
61 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
62 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
63 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
64 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
65 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
66 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
67 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
15f8604d 68 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
5236c819
MS
69 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
70 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
71 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
72 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
73 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
74 HOWTO(R_390_COPY, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
75 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,MINUS_ONE, FALSE),
76 HOWTO(R_390_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
77 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,MINUS_ONE, FALSE),
78 HOWTO(R_390_JMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
79 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,MINUS_ONE, FALSE),
80 HOWTO(R_390_RELATIVE, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
81 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,MINUS_ONE, FALSE),
82 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,MINUS_ONE, FALSE),
84 HOWTO(R_390_GOTPC, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,MINUS_ONE, TRUE),
86 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
88 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
89 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
90 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
91 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
92 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
93 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
94 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
95 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
96 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
97 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
98 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
99 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,MINUS_ONE, TRUE),
100 HOWTO(R_390_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
101 bfd_elf_generic_reloc, "R_390_64", FALSE, 0,MINUS_ONE, FALSE),
102 HOWTO(R_390_PC64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
103 bfd_elf_generic_reloc, "R_390_PC64", FALSE, 0,MINUS_ONE, TRUE),
104 HOWTO(R_390_GOT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
105 bfd_elf_generic_reloc, "R_390_GOT64", FALSE, 0,MINUS_ONE, FALSE),
106 HOWTO(R_390_PLT64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
107 bfd_elf_generic_reloc, "R_390_PLT64", FALSE, 0,MINUS_ONE, TRUE),
108 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
109 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,MINUS_ONE, TRUE),
110 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
112 HOWTO(R_390_GOTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
113 bfd_elf_generic_reloc, "R_390_GOTOFF64", FALSE, 0,MINUS_ONE, FALSE),
114 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
116 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
117 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
118 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
119 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
120 HOWTO(R_390_GOTPLT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
121 bfd_elf_generic_reloc, "R_390_GOTPLT64", FALSE, 0,MINUS_ONE, FALSE),
122 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
123 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,MINUS_ONE, TRUE),
124 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
125 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
126 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
128 HOWTO(R_390_PLTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
129 bfd_elf_generic_reloc, "R_390_PLTOFF64", FALSE, 0,MINUS_ONE, FALSE),
69fc87f1
MS
130 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
131 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
132 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
133 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
134 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
135 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
136 EMPTY_HOWTO (R_390_TLS_GD32), /* Empty entry for R_390_TLS_GD32. */
137 HOWTO(R_390_TLS_GD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_GD64", FALSE, 0, MINUS_ONE, FALSE),
139 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
140 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
141 EMPTY_HOWTO (R_390_TLS_GOTIE32), /* Empty entry for R_390_TLS_GOTIE32. */
142 HOWTO(R_390_TLS_GOTIE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_GOTIE64", FALSE, 0, MINUS_ONE, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LDM32), /* Empty entry for R_390_TLS_LDM32. */
145 HOWTO(R_390_TLS_LDM64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDM64", FALSE, 0, MINUS_ONE, FALSE),
147 EMPTY_HOWTO (R_390_TLS_IE32), /* Empty entry for R_390_TLS_IE32. */
148 HOWTO(R_390_TLS_IE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_IE64", FALSE, 0, MINUS_ONE, FALSE),
150 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, MINUS_ONE, TRUE),
152 EMPTY_HOWTO (R_390_TLS_LE32), /* Empty entry for R_390_TLS_LE32. */
153 HOWTO(R_390_TLS_LE64, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
154 bfd_elf_generic_reloc, "R_390_TLS_LE64", FALSE, 0, MINUS_ONE, FALSE),
155 EMPTY_HOWTO (R_390_TLS_LDO32), /* Empty entry for R_390_TLS_LDO32. */
156 HOWTO(R_390_TLS_LDO64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
157 bfd_elf_generic_reloc, "R_390_TLS_LDO64", FALSE, 0, MINUS_ONE, FALSE),
158 HOWTO(R_390_TLS_DTPMOD, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
159 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, MINUS_ONE, FALSE),
160 HOWTO(R_390_TLS_DTPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
161 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, MINUS_ONE, FALSE),
162 HOWTO(R_390_TLS_TPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, MINUS_ONE, FALSE),
bd1ea41b
MS
164 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
165 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
166 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
167 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
168 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
169 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
170 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
171 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
470b557a
AK
172 HOWTO(R_390_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
173 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, MINUS_ONE, FALSE),
fb798c50
AK
174 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
175 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
176 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
177 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
178 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
179 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
180 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
181 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
a85d7ed0
NC
182};
183
184/* GNU extension to record C++ vtable hierarchy. */
185static reloc_howto_type elf64_s390_vtinherit_howto =
b34976b6 186 HOWTO (R_390_GNU_VTINHERIT, 0,4,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
a85d7ed0 187static reloc_howto_type elf64_s390_vtentry_howto =
b34976b6 188 HOWTO (R_390_GNU_VTENTRY, 0,4,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
a85d7ed0
NC
189
190static reloc_howto_type *
2c3fc389
NC
191elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
192 bfd_reloc_code_real_type code)
a85d7ed0 193{
0451c93c
MS
194 switch (code)
195 {
196 case BFD_RELOC_NONE:
197 return &elf_howto_table[(int) R_390_NONE];
198 case BFD_RELOC_8:
199 return &elf_howto_table[(int) R_390_8];
200 case BFD_RELOC_390_12:
201 return &elf_howto_table[(int) R_390_12];
202 case BFD_RELOC_16:
203 return &elf_howto_table[(int) R_390_16];
204 case BFD_RELOC_32:
205 return &elf_howto_table[(int) R_390_32];
206 case BFD_RELOC_CTOR:
207 return &elf_howto_table[(int) R_390_32];
208 case BFD_RELOC_32_PCREL:
209 return &elf_howto_table[(int) R_390_PC32];
210 case BFD_RELOC_390_GOT12:
211 return &elf_howto_table[(int) R_390_GOT12];
212 case BFD_RELOC_32_GOT_PCREL:
213 return &elf_howto_table[(int) R_390_GOT32];
214 case BFD_RELOC_390_PLT32:
215 return &elf_howto_table[(int) R_390_PLT32];
216 case BFD_RELOC_390_COPY:
217 return &elf_howto_table[(int) R_390_COPY];
218 case BFD_RELOC_390_GLOB_DAT:
219 return &elf_howto_table[(int) R_390_GLOB_DAT];
220 case BFD_RELOC_390_JMP_SLOT:
221 return &elf_howto_table[(int) R_390_JMP_SLOT];
222 case BFD_RELOC_390_RELATIVE:
223 return &elf_howto_table[(int) R_390_RELATIVE];
224 case BFD_RELOC_32_GOTOFF:
5236c819 225 return &elf_howto_table[(int) R_390_GOTOFF32];
0451c93c
MS
226 case BFD_RELOC_390_GOTPC:
227 return &elf_howto_table[(int) R_390_GOTPC];
228 case BFD_RELOC_390_GOT16:
229 return &elf_howto_table[(int) R_390_GOT16];
230 case BFD_RELOC_16_PCREL:
231 return &elf_howto_table[(int) R_390_PC16];
fb798c50
AK
232 case BFD_RELOC_390_PC12DBL:
233 return &elf_howto_table[(int) R_390_PC12DBL];
234 case BFD_RELOC_390_PLT12DBL:
235 return &elf_howto_table[(int) R_390_PLT12DBL];
0451c93c
MS
236 case BFD_RELOC_390_PC16DBL:
237 return &elf_howto_table[(int) R_390_PC16DBL];
238 case BFD_RELOC_390_PLT16DBL:
239 return &elf_howto_table[(int) R_390_PLT16DBL];
fb798c50
AK
240 case BFD_RELOC_390_PC24DBL:
241 return &elf_howto_table[(int) R_390_PC24DBL];
242 case BFD_RELOC_390_PLT24DBL:
243 return &elf_howto_table[(int) R_390_PLT24DBL];
0451c93c
MS
244 case BFD_RELOC_390_PC32DBL:
245 return &elf_howto_table[(int) R_390_PC32DBL];
246 case BFD_RELOC_390_PLT32DBL:
247 return &elf_howto_table[(int) R_390_PLT32DBL];
248 case BFD_RELOC_390_GOTPCDBL:
249 return &elf_howto_table[(int) R_390_GOTPCDBL];
250 case BFD_RELOC_64:
251 return &elf_howto_table[(int) R_390_64];
252 case BFD_RELOC_64_PCREL:
253 return &elf_howto_table[(int) R_390_PC64];
254 case BFD_RELOC_390_GOT64:
255 return &elf_howto_table[(int) R_390_GOT64];
256 case BFD_RELOC_390_PLT64:
257 return &elf_howto_table[(int) R_390_PLT64];
258 case BFD_RELOC_390_GOTENT:
259 return &elf_howto_table[(int) R_390_GOTENT];
5236c819
MS
260 case BFD_RELOC_16_GOTOFF:
261 return &elf_howto_table[(int) R_390_GOTOFF16];
262 case BFD_RELOC_390_GOTOFF64:
263 return &elf_howto_table[(int) R_390_GOTOFF64];
264 case BFD_RELOC_390_GOTPLT12:
265 return &elf_howto_table[(int) R_390_GOTPLT12];
266 case BFD_RELOC_390_GOTPLT16:
267 return &elf_howto_table[(int) R_390_GOTPLT16];
268 case BFD_RELOC_390_GOTPLT32:
269 return &elf_howto_table[(int) R_390_GOTPLT32];
270 case BFD_RELOC_390_GOTPLT64:
271 return &elf_howto_table[(int) R_390_GOTPLT64];
272 case BFD_RELOC_390_GOTPLTENT:
273 return &elf_howto_table[(int) R_390_GOTPLTENT];
274 case BFD_RELOC_390_PLTOFF16:
275 return &elf_howto_table[(int) R_390_PLTOFF16];
276 case BFD_RELOC_390_PLTOFF32:
277 return &elf_howto_table[(int) R_390_PLTOFF32];
278 case BFD_RELOC_390_PLTOFF64:
279 return &elf_howto_table[(int) R_390_PLTOFF64];
69fc87f1
MS
280 case BFD_RELOC_390_TLS_LOAD:
281 return &elf_howto_table[(int) R_390_TLS_LOAD];
282 case BFD_RELOC_390_TLS_GDCALL:
283 return &elf_howto_table[(int) R_390_TLS_GDCALL];
284 case BFD_RELOC_390_TLS_LDCALL:
285 return &elf_howto_table[(int) R_390_TLS_LDCALL];
286 case BFD_RELOC_390_TLS_GD64:
287 return &elf_howto_table[(int) R_390_TLS_GD64];
288 case BFD_RELOC_390_TLS_GOTIE12:
289 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
290 case BFD_RELOC_390_TLS_GOTIE64:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE64];
292 case BFD_RELOC_390_TLS_LDM64:
293 return &elf_howto_table[(int) R_390_TLS_LDM64];
294 case BFD_RELOC_390_TLS_IE64:
295 return &elf_howto_table[(int) R_390_TLS_IE64];
296 case BFD_RELOC_390_TLS_IEENT:
297 return &elf_howto_table[(int) R_390_TLS_IEENT];
298 case BFD_RELOC_390_TLS_LE64:
299 return &elf_howto_table[(int) R_390_TLS_LE64];
300 case BFD_RELOC_390_TLS_LDO64:
301 return &elf_howto_table[(int) R_390_TLS_LDO64];
302 case BFD_RELOC_390_TLS_DTPMOD:
303 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
304 case BFD_RELOC_390_TLS_DTPOFF:
305 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
306 case BFD_RELOC_390_TLS_TPOFF:
307 return &elf_howto_table[(int) R_390_TLS_TPOFF];
bd1ea41b
MS
308 case BFD_RELOC_390_20:
309 return &elf_howto_table[(int) R_390_20];
310 case BFD_RELOC_390_GOT20:
311 return &elf_howto_table[(int) R_390_GOT20];
312 case BFD_RELOC_390_GOTPLT20:
313 return &elf_howto_table[(int) R_390_GOTPLT20];
314 case BFD_RELOC_390_TLS_GOTIE20:
315 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
470b557a
AK
316 case BFD_RELOC_390_IRELATIVE:
317 return &elf_howto_table[(int) R_390_IRELATIVE];
5236c819
MS
318 case BFD_RELOC_VTABLE_INHERIT:
319 return &elf64_s390_vtinherit_howto;
320 case BFD_RELOC_VTABLE_ENTRY:
321 return &elf64_s390_vtentry_howto;
0451c93c
MS
322 default:
323 break;
324 }
a85d7ed0
NC
325 return 0;
326}
327
157090f7
AM
328static reloc_howto_type *
329elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
330 const char *r_name)
331{
332 unsigned int i;
333
334 for (i = 0;
335 i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]);
336 i++)
337 if (elf_howto_table[i].name != NULL
338 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
339 return &elf_howto_table[i];
340
0bc7245a
JK
341 if (strcasecmp (elf64_s390_vtinherit_howto.name, r_name) == 0)
342 return &elf64_s390_vtinherit_howto;
343 if (strcasecmp (elf64_s390_vtentry_howto.name, r_name) == 0)
344 return &elf64_s390_vtentry_howto;
157090f7
AM
345
346 return NULL;
347}
348
a85d7ed0
NC
349/* We need to use ELF64_R_TYPE so we have our own copy of this function,
350 and elf64-s390.c has its own copy. */
351
352static void
2c3fc389
NC
353elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
354 arelent *cache_ptr,
355 Elf_Internal_Rela *dst)
a85d7ed0 356{
d0fb9a8d
JJ
357 unsigned int r_type = ELF64_R_TYPE(dst->r_info);
358 switch (r_type)
a85d7ed0
NC
359 {
360 case R_390_GNU_VTINHERIT:
361 cache_ptr->howto = &elf64_s390_vtinherit_howto;
362 break;
363
364 case R_390_GNU_VTENTRY:
365 cache_ptr->howto = &elf64_s390_vtentry_howto;
366 break;
367
368 default:
d0fb9a8d
JJ
369 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
370 {
371 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
372 abfd, (int) r_type);
373 r_type = R_390_NONE;
374 }
375 cache_ptr->howto = &elf_howto_table[r_type];
99c79b2e 376 }
a85d7ed0
NC
377}
378
69fc87f1
MS
379/* A relocation function which doesn't do anything. */
380static bfd_reloc_status_type
2c3fc389
NC
381s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
382 arelent *reloc_entry,
383 asymbol *symbol ATTRIBUTE_UNUSED,
384 void * data ATTRIBUTE_UNUSED,
385 asection *input_section,
386 bfd *output_bfd,
387 char **error_message ATTRIBUTE_UNUSED)
69fc87f1
MS
388{
389 if (output_bfd)
390 reloc_entry->address += input_section->output_offset;
391 return bfd_reloc_ok;
392}
393
bd1ea41b
MS
394/* Handle the large displacement relocs. */
395static bfd_reloc_status_type
2c3fc389
NC
396s390_elf_ldisp_reloc (bfd *abfd,
397 arelent *reloc_entry,
398 asymbol *symbol,
399 void * data,
400 asection *input_section,
401 bfd *output_bfd,
402 char **error_message ATTRIBUTE_UNUSED)
bd1ea41b
MS
403{
404 reloc_howto_type *howto = reloc_entry->howto;
405 bfd_vma relocation;
406 bfd_vma insn;
407
408 if (output_bfd != (bfd *) NULL
409 && (symbol->flags & BSF_SECTION_SYM) == 0
410 && (! howto->partial_inplace
411 || reloc_entry->addend == 0))
412 {
413 reloc_entry->address += input_section->output_offset;
414 return bfd_reloc_ok;
415 }
416 if (output_bfd != NULL)
417 return bfd_reloc_continue;
418
07515404 419 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
bd1ea41b
MS
420 return bfd_reloc_outofrange;
421
422 relocation = (symbol->value
423 + symbol->section->output_section->vma
424 + symbol->section->output_offset);
425 relocation += reloc_entry->addend;
426 if (howto->pc_relative)
427 {
428 relocation -= (input_section->output_section->vma
429 + input_section->output_offset);
430 relocation -= reloc_entry->address;
431 }
432
68ffbac6 433 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
bd1ea41b
MS
434 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
435 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
436
437 if ((bfd_signed_vma) relocation < - 0x80000
438 || (bfd_signed_vma) relocation > 0x7ffff)
439 return bfd_reloc_overflow;
440 else
441 return bfd_reloc_ok;
442}
443
b34976b6 444static bfd_boolean
2c3fc389 445elf_s390_is_local_label_name (bfd *abfd, const char *name)
a85d7ed0
NC
446{
447 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
b34976b6 448 return TRUE;
a85d7ed0
NC
449
450 return _bfd_elf_is_local_label_name (abfd, name);
451}
452
453/* Functions for the 390 ELF linker. */
454
455/* The name of the dynamic interpreter. This is put in the .interp
456 section. */
457
87049b0d 458#define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
a85d7ed0 459
64285810
MS
460/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
461 copying dynamic variables from a shared lib into an app's dynbss
462 section, and instead use a dynamic relocation to point into the
463 shared lib. */
464#define ELIMINATE_COPY_RELOCS 1
465
a85d7ed0
NC
466/* The size in bytes of the first entry in the procedure linkage table. */
467#define PLT_FIRST_ENTRY_SIZE 32
468/* The size in bytes of an entry in the procedure linkage table. */
99c79b2e 469#define PLT_ENTRY_SIZE 32
a85d7ed0
NC
470
471#define GOT_ENTRY_SIZE 8
472
470b557a
AK
473#define RELA_ENTRY_SIZE sizeof (Elf64_External_Rela)
474
a85d7ed0
NC
475/* The first three entries in a procedure linkage table are reserved,
476 and the initial contents are unimportant (we zero them out).
477 Subsequent entries look like this. See the SVR4 ABI 386
478 supplement to see how this works. */
479
480/* For the s390, simple addr offset can only be 0 - 4096.
481 To use the full 16777216 TB address space, several instructions
482 are needed to load an address in a register and execute
483 a branch( or just saving the address)
484
99c79b2e 485 Furthermore, only r 0 and 1 are free to use!!! */
a85d7ed0
NC
486
487/* The first 3 words in the GOT are then reserved.
488 Word 0 is the address of the dynamic table.
489 Word 1 is a pointer to a structure describing the object
490 Word 2 is used to point to the loader entry address.
491
492 The code for PLT entries looks like this:
493
494 The GOT holds the address in the PLT to be executed.
495 The loader then gets:
3b67f094
MK
496 48(15) = Pointer to the structure describing the object.
497 56(15) = Offset in symbol table
a85d7ed0
NC
498 The loader must then find the module where the function is
499 and insert the address in the GOT.
500
501 PLT1: LARL 1,<fn>@GOTENT # 6 bytes Load address of GOT entry in r1
502 LG 1,0(1) # 6 bytes Load address from GOT in r1
503 BCR 15,1 # 2 bytes Jump to address
504 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
505 LGF 1,12(1) # 6 bytes Load offset in symbl table in r1
506 BRCL 15,-x # 6 bytes Jump to start of PLT
a7e28bbe 507 .long ? # 4 bytes offset into .rela.plt
a85d7ed0
NC
508
509 Total = 32 bytes per PLT entry
510 Fixup at offset 2: relative address to GOT entry
511 Fixup at offset 22: relative branch to PLT0
a7e28bbe 512 Fixup at offset 28: 32 bit offset into .rela.plt
a85d7ed0 513
a7e28bbe
AK
514 A 32 bit offset into the symbol table is enough. It allows for
515 .rela.plt sections up to a size of 2 gigabyte. A single dynamic
516 object (the main program, any shared library) is limited to 4GB in
517 size. Having a .rela.plt of 2GB would already make the .plt
518 section bigger than 8GB. */
a85d7ed0 519
9aa17453
AK
520static const bfd_byte elf_s390x_plt_entry[PLT_ENTRY_SIZE] =
521 {
522 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
523 0xe3, 0x10, 0x10, 0x00, 0x00, 0x04, /* lg %r1,0(%r1) */
524 0x07, 0xf1, /* br %r1 */
525 0x0d, 0x10, /* basr %r1,%r0 */
526 0xe3, 0x10, 0x10, 0x0c, 0x00, 0x14, /* lgf %r1,12(%r1) */
527 0xc0, 0xf4, 0x00, 0x00, 0x00, 0x00, /* jg first plt */
528 0x00, 0x00, 0x00, 0x00 /* .long 0x00000000 */
529 };
a85d7ed0
NC
530
531/* The first PLT entry pushes the offset into the symbol table
a7e28bbe
AK
532 from R1 onto the stack at 56(15) and the loader object info
533 at 48(15), loads the loader address in R1 and jumps to it. */
a85d7ed0
NC
534
535/* The first entry in the PLT:
536
537 PLT0:
538 STG 1,56(15) # r1 contains the offset into the symbol table
539 LARL 1,_GLOBAL_OFFSET_TABLE # load address of global offset table
540 MVC 48(8,15),8(1) # move loader ino (object struct address) to stack
541 LG 1,16(1) # get entry address of loader
542 BCR 15,1 # jump to loader
543
544 Fixup at offset 8: relative address to start of GOT. */
545
9aa17453
AK
546static const bfd_byte elf_s390x_first_plt_entry[PLT_FIRST_ENTRY_SIZE] =
547 {
548 0xe3, 0x10, 0xf0, 0x38, 0x00, 0x24, /* stg %r1,56(%r15) */
549 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
550 0xd2, 0x07, 0xf0, 0x30, 0x10, 0x08, /* mvc 48(8,%r15),8(%r1) */
551 0xe3, 0x10, 0x10, 0x10, 0x00, 0x04, /* lg %r1,16(%r1) */
552 0x07, 0xf1, /* br %r1 */
553 0x07, 0x00, /* nopr %r0 */
554 0x07, 0x00, /* nopr %r0 */
555 0x07, 0x00 /* nopr %r0 */
556 };
a85d7ed0 557
a85d7ed0
NC
558
559/* s390 ELF linker hash entry. */
560
561struct elf_s390_link_hash_entry
562{
0451c93c 563 struct elf_link_hash_entry elf;
a85d7ed0 564
0451c93c 565 /* Track dynamic relocs copied for this symbol. */
00d8c7a9 566 struct elf_dyn_relocs *dyn_relocs;
5236c819
MS
567
568 /* Number of GOTPLT references for a function. */
569 bfd_signed_vma gotplt_refcount;
69fc87f1
MS
570
571#define GOT_UNKNOWN 0
572#define GOT_NORMAL 1
573#define GOT_TLS_GD 2
574#define GOT_TLS_IE 3
575#define GOT_TLS_IE_NLT 3
576 unsigned char tls_type;
470b557a
AK
577
578 /* For pointer equality reasons we might need to change the symbol
579 type from STT_GNU_IFUNC to STT_FUNC together with its value and
580 section entry. So after alloc_dynrelocs only these values should
581 be used. In order to check whether a symbol is IFUNC use
582 s390_is_ifunc_symbol_p. */
583 bfd_vma ifunc_resolver_address;
584 asection *ifunc_resolver_section;
a85d7ed0
NC
585};
586
69fc87f1
MS
587#define elf_s390_hash_entry(ent) \
588 ((struct elf_s390_link_hash_entry *)(ent))
589
470b557a
AK
590/* This structure represents an entry in the local PLT list needed for
591 local IFUNC symbols. */
592struct plt_entry
593{
594 /* The section of the local symbol.
595 Set in relocate_section and used in finish_dynamic_sections. */
596 asection *sec;
597
598 union
599 {
600 bfd_signed_vma refcount;
601 bfd_vma offset;
602 } plt;
603};
604
0ffa91dd
NC
605/* NOTE: Keep this structure in sync with
606 the one declared in elf32-s390.c. */
69fc87f1
MS
607struct elf_s390_obj_tdata
608{
609 struct elf_obj_tdata root;
610
470b557a
AK
611 /* A local PLT is needed for ifunc symbols. */
612 struct plt_entry *local_plt;
613
0ffa91dd 614 /* TLS type for each local got entry. */
69fc87f1
MS
615 char *local_got_tls_type;
616};
617
618#define elf_s390_tdata(abfd) \
619 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
620
470b557a
AK
621#define elf_s390_local_plt(abfd) \
622 (elf_s390_tdata (abfd)->local_plt)
623
69fc87f1
MS
624#define elf_s390_local_got_tls_type(abfd) \
625 (elf_s390_tdata (abfd)->local_got_tls_type)
626
0ffa91dd
NC
627#define is_s390_elf(bfd) \
628 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
629 && elf_tdata (bfd) != NULL \
4dfe6ac6 630 && elf_object_id (bfd) == S390_ELF_DATA)
0ffa91dd 631
69fc87f1 632static bfd_boolean
62d7a5f6 633elf_s390_mkobject (bfd *abfd)
69fc87f1 634{
0ffa91dd 635 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
4dfe6ac6 636 S390_ELF_DATA);
69fc87f1
MS
637}
638
639static bfd_boolean
2c3fc389 640elf_s390_object_p (bfd *abfd)
69fc87f1 641{
69fc87f1
MS
642 /* Set the right machine number for an s390 elf32 file. */
643 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_64);
644}
645
a85d7ed0
NC
646/* s390 ELF linker hash table. */
647
648struct elf_s390_link_hash_table
649{
0451c93c 650 struct elf_link_hash_table elf;
a85d7ed0 651
0451c93c 652 /* Short-cuts to get to dynamic linker sections. */
0451c93c
MS
653 asection *sdynbss;
654 asection *srelbss;
470b557a 655 asection *irelifunc;
ec338859 656
69fc87f1
MS
657 union {
658 bfd_signed_vma refcount;
659 bfd_vma offset;
660 } tls_ldm_got;
661
87d72d41
AM
662 /* Small local sym cache. */
663 struct sym_cache sym_cache;
0451c93c 664};
a85d7ed0
NC
665
666/* Get the s390 ELF linker hash table from a link_info structure. */
667
ceada896
AA
668#define elf_s390_hash_table(p) \
669 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
670 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
a85d7ed0 671
470b557a
AK
672#define ELF64 1
673#include "elf-s390-common.c"
674
a85d7ed0
NC
675/* Create an entry in an s390 ELF linker hash table. */
676
677static struct bfd_hash_entry *
2c3fc389
NC
678link_hash_newfunc (struct bfd_hash_entry *entry,
679 struct bfd_hash_table *table,
680 const char *string)
a85d7ed0 681{
a85d7ed0
NC
682 /* Allocate the structure if it has not already been allocated by a
683 subclass. */
0451c93c
MS
684 if (entry == NULL)
685 {
686 entry = bfd_hash_allocate (table,
687 sizeof (struct elf_s390_link_hash_entry));
688 if (entry == NULL)
689 return entry;
690 }
a85d7ed0
NC
691
692 /* Call the allocation method of the superclass. */
0451c93c
MS
693 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
694 if (entry != NULL)
a85d7ed0 695 {
0451c93c
MS
696 struct elf_s390_link_hash_entry *eh;
697
698 eh = (struct elf_s390_link_hash_entry *) entry;
699 eh->dyn_relocs = NULL;
5236c819 700 eh->gotplt_refcount = 0;
69fc87f1 701 eh->tls_type = GOT_UNKNOWN;
470b557a
AK
702 eh->ifunc_resolver_address = 0;
703 eh->ifunc_resolver_section = NULL;
a85d7ed0
NC
704 }
705
0451c93c 706 return entry;
a85d7ed0
NC
707}
708
709/* Create an s390 ELF linker hash table. */
710
711static struct bfd_link_hash_table *
2c3fc389 712elf_s390_link_hash_table_create (bfd *abfd)
a85d7ed0
NC
713{
714 struct elf_s390_link_hash_table *ret;
dc810e39 715 bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
a85d7ed0 716
7bf52ea2 717 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
0451c93c 718 if (ret == NULL)
a85d7ed0
NC
719 return NULL;
720
66eb6687 721 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
722 sizeof (struct elf_s390_link_hash_entry),
723 S390_ELF_DATA))
a85d7ed0 724 {
e2d34d7d 725 free (ret);
a85d7ed0
NC
726 return NULL;
727 }
728
0451c93c
MS
729 return &ret->elf.root;
730}
731
732/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
733 shortcuts to them in our hash table. */
734
b34976b6 735static bfd_boolean
4dfe6ac6
NC
736create_got_section (bfd *dynobj,
737 struct bfd_link_info *info)
0451c93c
MS
738{
739 struct elf_s390_link_hash_table *htab;
740
741 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 742 return FALSE;
0451c93c
MS
743
744 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
745 if (htab == NULL)
746 return FALSE;
747
3d4d4302
AM
748 htab->elf.sgot = bfd_get_linker_section (dynobj, ".got");
749 htab->elf.sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
750 htab->elf.srelgot = bfd_get_linker_section (dynobj, ".rela.got");
f41345a7 751 if (!htab->elf.sgot || !htab->elf.sgotplt || !htab->elf.srelgot)
0451c93c 752 abort ();
b34976b6 753 return TRUE;
0451c93c
MS
754}
755
756/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
757 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
758 hash table. */
759
b34976b6 760static bfd_boolean
4dfe6ac6
NC
761elf_s390_create_dynamic_sections (bfd *dynobj,
762 struct bfd_link_info *info)
0451c93c
MS
763{
764 struct elf_s390_link_hash_table *htab;
765
766 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
767 if (htab == NULL)
768 return FALSE;
769
f41345a7 770 if (!htab->elf.sgot && !create_got_section (dynobj, info))
b34976b6 771 return FALSE;
0451c93c
MS
772
773 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 774 return FALSE;
0451c93c 775
3d4d4302
AM
776 htab->elf.splt = bfd_get_linker_section (dynobj, ".plt");
777 htab->elf.srelplt = bfd_get_linker_section (dynobj, ".rela.plt");
778 htab->sdynbss = bfd_get_linker_section (dynobj, ".dynbss");
0e1862bb 779 if (!bfd_link_pic (info))
3d4d4302 780 htab->srelbss = bfd_get_linker_section (dynobj, ".rela.bss");
0451c93c 781
f41345a7 782 if (!htab->elf.splt || !htab->elf.srelplt || !htab->sdynbss
0e1862bb 783 || (!bfd_link_pic (info) && !htab->srelbss))
0451c93c
MS
784 abort ();
785
b34976b6 786 return TRUE;
a85d7ed0
NC
787}
788
0451c93c
MS
789/* Copy the extra info we tack onto an elf_link_hash_entry. */
790
791static void
2c3fc389
NC
792elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
793 struct elf_link_hash_entry *dir,
794 struct elf_link_hash_entry *ind)
0451c93c
MS
795{
796 struct elf_s390_link_hash_entry *edir, *eind;
797
798 edir = (struct elf_s390_link_hash_entry *) dir;
799 eind = (struct elf_s390_link_hash_entry *) ind;
800
801 if (eind->dyn_relocs != NULL)
802 {
803 if (edir->dyn_relocs != NULL)
804 {
00d8c7a9
AK
805 struct elf_dyn_relocs **pp;
806 struct elf_dyn_relocs *p;
0451c93c 807
fcfa13d2 808 /* Add reloc counts against the indirect sym to the direct sym
0451c93c
MS
809 list. Merge any entries against the same section. */
810 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
811 {
00d8c7a9 812 struct elf_dyn_relocs *q;
0451c93c
MS
813
814 for (q = edir->dyn_relocs; q != NULL; q = q->next)
815 if (q->sec == p->sec)
816 {
817 q->pc_count += p->pc_count;
818 q->count += p->count;
819 *pp = p->next;
820 break;
821 }
822 if (q == NULL)
823 pp = &p->next;
824 }
825 *pp = edir->dyn_relocs;
826 }
827
828 edir->dyn_relocs = eind->dyn_relocs;
829 eind->dyn_relocs = NULL;
830 }
831
69fc87f1
MS
832 if (ind->root.type == bfd_link_hash_indirect
833 && dir->got.refcount <= 0)
834 {
835 edir->tls_type = eind->tls_type;
836 eind->tls_type = GOT_UNKNOWN;
837 }
838
64285810
MS
839 if (ELIMINATE_COPY_RELOCS
840 && ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
841 && dir->dynamic_adjusted)
842 {
843 /* If called to transfer flags for a weakdef during processing
844 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
845 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
846 dir->ref_dynamic |= ind->ref_dynamic;
847 dir->ref_regular |= ind->ref_regular;
848 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
849 dir->needs_plt |= ind->needs_plt;
850 }
64285810 851 else
fcfa13d2 852 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
0451c93c 853}
a85d7ed0 854
69fc87f1 855static int
2c3fc389
NC
856elf_s390_tls_transition (struct bfd_link_info *info,
857 int r_type,
858 int is_local)
69fc87f1 859{
0e1862bb 860 if (bfd_link_pic (info))
69fc87f1
MS
861 return r_type;
862
863 switch (r_type)
864 {
865 case R_390_TLS_GD64:
866 case R_390_TLS_IE64:
867 if (is_local)
868 return R_390_TLS_LE64;
869 return R_390_TLS_IE64;
870 case R_390_TLS_GOTIE64:
871 if (is_local)
872 return R_390_TLS_LE64;
873 return R_390_TLS_GOTIE64;
874 case R_390_TLS_LDM64:
875 return R_390_TLS_LE64;
876 }
877
878 return r_type;
879}
880
a85d7ed0
NC
881/* Look through the relocs for a section during the first phase, and
882 allocate space in the global offset table or procedure linkage
883 table. */
884
b34976b6 885static bfd_boolean
4dfe6ac6
NC
886elf_s390_check_relocs (bfd *abfd,
887 struct bfd_link_info *info,
888 asection *sec,
889 const Elf_Internal_Rela *relocs)
a85d7ed0 890{
0451c93c 891 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
892 Elf_Internal_Shdr *symtab_hdr;
893 struct elf_link_hash_entry **sym_hashes;
a85d7ed0
NC
894 const Elf_Internal_Rela *rel;
895 const Elf_Internal_Rela *rel_end;
a85d7ed0 896 asection *sreloc;
5236c819 897 bfd_signed_vma *local_got_refcounts;
69fc87f1 898 int tls_type, old_tls_type;
a85d7ed0 899
0e1862bb 900 if (bfd_link_relocatable (info))
b34976b6 901 return TRUE;
a85d7ed0 902
0ffa91dd
NC
903 BFD_ASSERT (is_s390_elf (abfd));
904
0451c93c 905 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
906 if (htab == NULL)
907 return FALSE;
908
0ffa91dd 909 symtab_hdr = &elf_symtab_hdr (abfd);
a85d7ed0 910 sym_hashes = elf_sym_hashes (abfd);
5236c819 911 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 912
a85d7ed0
NC
913 sreloc = NULL;
914
915 rel_end = relocs + sec->reloc_count;
916 for (rel = relocs; rel < rel_end; rel++)
917 {
69fc87f1 918 unsigned int r_type;
a85d7ed0
NC
919 unsigned long r_symndx;
920 struct elf_link_hash_entry *h;
470b557a 921 Elf_Internal_Sym *isym;
a85d7ed0
NC
922
923 r_symndx = ELF64_R_SYM (rel->r_info);
924
0451c93c
MS
925 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
926 {
d003868e
AM
927 (*_bfd_error_handler) (_("%B: bad symbol index: %d"),
928 abfd,
0451c93c 929 r_symndx);
b34976b6 930 return FALSE;
0451c93c
MS
931 }
932
a85d7ed0 933 if (r_symndx < symtab_hdr->sh_info)
470b557a
AK
934 {
935 /* A local symbol. */
936 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
937 abfd, r_symndx);
938 if (isym == NULL)
939 return FALSE;
940
941 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
942 {
943 struct plt_entry *plt;
944
0cb79d69
AK
945 if (htab->elf.dynobj == NULL)
946 htab->elf.dynobj = abfd;
947
470b557a
AK
948 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
949 return FALSE;
950
951 if (local_got_refcounts == NULL)
952 {
953 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
954 return FALSE;
955 local_got_refcounts = elf_local_got_refcounts (abfd);
956 }
957 plt = elf_s390_local_plt (abfd);
958 plt[r_symndx].plt.refcount++;
959 }
960 h = NULL;
961 }
a85d7ed0 962 else
973a3492
L
963 {
964 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
965 while (h->root.type == bfd_link_hash_indirect
966 || h->root.type == bfd_link_hash_warning)
967 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
968
969 /* PR15323, ref flags aren't set for references in the same
970 object. */
971 h->root.non_ir_ref = 1;
973a3492 972 }
a85d7ed0 973
5236c819
MS
974 /* Create got section and local_got_refcounts array if they
975 are needed. */
69fc87f1
MS
976 r_type = elf_s390_tls_transition (info,
977 ELF64_R_TYPE (rel->r_info),
978 h == NULL);
979 switch (r_type)
a85d7ed0
NC
980 {
981 case R_390_GOT12:
947216bf 982 case R_390_GOT16:
bd1ea41b 983 case R_390_GOT20:
a85d7ed0
NC
984 case R_390_GOT32:
985 case R_390_GOT64:
986 case R_390_GOTENT:
5236c819
MS
987 case R_390_GOTPLT12:
988 case R_390_GOTPLT16:
bd1ea41b 989 case R_390_GOTPLT20:
5236c819
MS
990 case R_390_GOTPLT32:
991 case R_390_GOTPLT64:
992 case R_390_GOTPLTENT:
69fc87f1
MS
993 case R_390_TLS_GD64:
994 case R_390_TLS_GOTIE12:
bd1ea41b 995 case R_390_TLS_GOTIE20:
69fc87f1
MS
996 case R_390_TLS_GOTIE64:
997 case R_390_TLS_IEENT:
998 case R_390_TLS_IE64:
999 case R_390_TLS_LDM64:
5236c819
MS
1000 if (h == NULL
1001 && local_got_refcounts == NULL)
a85d7ed0 1002 {
470b557a 1003 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
5236c819 1004 return FALSE;
470b557a 1005 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 1006 }
470b557a 1007
5236c819
MS
1008 /* Fall through. */
1009 case R_390_GOTOFF16:
1010 case R_390_GOTOFF32:
1011 case R_390_GOTOFF64:
0451c93c
MS
1012 case R_390_GOTPC:
1013 case R_390_GOTPCDBL:
f41345a7 1014 if (htab->elf.sgot == NULL)
0451c93c
MS
1015 {
1016 if (htab->elf.dynobj == NULL)
1017 htab->elf.dynobj = abfd;
1018 if (!create_got_section (htab->elf.dynobj, info))
b34976b6 1019 return FALSE;
0451c93c 1020 }
5236c819
MS
1021 }
1022
470b557a
AK
1023 if (h != NULL)
1024 {
1025 if (htab->elf.dynobj == NULL)
1026 htab->elf.dynobj = abfd;
1027 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1028 return FALSE;
1029
1030 /* Make sure an IFUNC symbol defined in a non-shared object
1031 always gets a PLT slot. */
1032 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1033 {
1034 /* The symbol is called by the dynamic loader in order
1035 to resolve the relocation. So it is in fact also
1036 referenced. */
1037 h->ref_regular = 1;
1038 h->needs_plt = 1;
1039 }
1040 }
1041
69fc87f1 1042 switch (r_type)
5236c819 1043 {
5236c819
MS
1044 case R_390_GOTPC:
1045 case R_390_GOTPCDBL:
470b557a
AK
1046 /* These relocs do not need a GOT slot. They just load the
1047 GOT pointer itself or address something else relative to
1048 the GOT. Since the GOT pointer has been set up above we
1049 are done. */
0451c93c 1050 break;
d47b13e0
AK
1051 case R_390_GOTOFF16:
1052 case R_390_GOTOFF32:
1053 case R_390_GOTOFF64:
1054 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1055 break;
ec338859 1056
fb798c50 1057 case R_390_PLT12DBL:
947216bf 1058 case R_390_PLT16DBL:
fb798c50 1059 case R_390_PLT24DBL:
a85d7ed0
NC
1060 case R_390_PLT32:
1061 case R_390_PLT32DBL:
1062 case R_390_PLT64:
5236c819
MS
1063 case R_390_PLTOFF16:
1064 case R_390_PLTOFF32:
1065 case R_390_PLTOFF64:
a85d7ed0 1066 /* This symbol requires a procedure linkage table entry. We
947216bf
AM
1067 actually build the entry in adjust_dynamic_symbol,
1068 because this might be a case of linking PIC code which is
1069 never referenced by a dynamic object, in which case we
1070 don't need to generate a procedure linkage table entry
1071 after all. */
ec338859 1072
a85d7ed0 1073 /* If this is a local symbol, we resolve it directly without
947216bf 1074 creating a procedure linkage table entry. */
5236c819
MS
1075 if (h != NULL)
1076 {
f5385ebf 1077 h->needs_plt = 1;
5236c819
MS
1078 h->plt.refcount += 1;
1079 }
1080 break;
ec338859 1081
5236c819
MS
1082 case R_390_GOTPLT12:
1083 case R_390_GOTPLT16:
bd1ea41b 1084 case R_390_GOTPLT20:
5236c819
MS
1085 case R_390_GOTPLT32:
1086 case R_390_GOTPLT64:
1087 case R_390_GOTPLTENT:
1088 /* This symbol requires either a procedure linkage table entry
1089 or an entry in the local got. We actually build the entry
1090 in adjust_dynamic_symbol because whether this is really a
1091 global reference can change and with it the fact if we have
1092 to create a plt entry or a local got entry. To be able to
1093 make a once global symbol a local one we have to keep track
1094 of the number of gotplt references that exist for this
1095 symbol. */
1096 if (h != NULL)
1097 {
1098 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
f5385ebf 1099 h->needs_plt = 1;
5236c819
MS
1100 h->plt.refcount += 1;
1101 }
69fc87f1
MS
1102 else
1103 local_got_refcounts[r_symndx] += 1;
1104 break;
1105
1106 case R_390_TLS_LDM64:
1107 htab->tls_ldm_got.refcount += 1;
1108 break;
1109
1110 case R_390_TLS_IE64:
1111 case R_390_TLS_GOTIE12:
bd1ea41b 1112 case R_390_TLS_GOTIE20:
69fc87f1
MS
1113 case R_390_TLS_GOTIE64:
1114 case R_390_TLS_IEENT:
0e1862bb 1115 if (bfd_link_pic (info))
69fc87f1
MS
1116 info->flags |= DF_STATIC_TLS;
1117 /* Fall through */
1118
1119 case R_390_GOT12:
26e41594 1120 case R_390_GOT16:
bd1ea41b 1121 case R_390_GOT20:
69fc87f1
MS
1122 case R_390_GOT32:
1123 case R_390_GOT64:
1124 case R_390_GOTENT:
1125 case R_390_TLS_GD64:
1126 /* This symbol requires a global offset table entry. */
1127 switch (r_type)
1128 {
1129 default:
1130 case R_390_GOT12:
1131 case R_390_GOT16:
bd1ea41b 1132 case R_390_GOT20:
69fc87f1
MS
1133 case R_390_GOT32:
1134 case R_390_GOTENT:
1135 tls_type = GOT_NORMAL;
1136 break;
1137 case R_390_TLS_GD64:
1138 tls_type = GOT_TLS_GD;
1139 break;
1140 case R_390_TLS_IE64:
1141 case R_390_TLS_GOTIE64:
1142 tls_type = GOT_TLS_IE;
1143 break;
1144 case R_390_TLS_GOTIE12:
bd1ea41b 1145 case R_390_TLS_GOTIE20:
69fc87f1
MS
1146 case R_390_TLS_IEENT:
1147 tls_type = GOT_TLS_IE_NLT;
1148 break;
1149 }
1150
1151 if (h != NULL)
1152 {
1153 h->got.refcount += 1;
1154 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1155 }
5236c819
MS
1156 else
1157 {
1158 local_got_refcounts[r_symndx] += 1;
69fc87f1 1159 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
5236c819 1160 }
69fc87f1
MS
1161 /* If a TLS symbol is accessed using IE at least once,
1162 there is no point to use dynamic model for it. */
1163 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1164 {
1165 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1166 {
1167 (*_bfd_error_handler)
d003868e
AM
1168 (_("%B: `%s' accessed both as normal and thread local symbol"),
1169 abfd, h->root.root.string);
69fc87f1
MS
1170 return FALSE;
1171 }
1172 if (old_tls_type > tls_type)
1173 tls_type = old_tls_type;
1174 }
1175
1176 if (old_tls_type != tls_type)
1177 {
1178 if (h != NULL)
1179 elf_s390_hash_entry (h)->tls_type = tls_type;
1180 else
1181 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1182 }
1183
1184 if (r_type != R_390_TLS_IE64)
1185 break;
1186 /* Fall through */
1187
1188 case R_390_TLS_LE64:
e00d879a
AK
1189 /* For static linking and executables this reloc will be
1190 calculated at linktime otherwise a TLS_TPOFF runtime
1191 reloc will be generated. */
0e1862bb 1192 if (r_type == R_390_TLS_LE64 && bfd_link_pie (info))
e00d879a
AK
1193 break;
1194
0e1862bb 1195 if (!bfd_link_pic (info))
69fc87f1
MS
1196 break;
1197 info->flags |= DF_STATIC_TLS;
1198 /* Fall through */
ec338859 1199
947216bf
AM
1200 case R_390_8:
1201 case R_390_16:
a85d7ed0
NC
1202 case R_390_32:
1203 case R_390_64:
fb798c50 1204 case R_390_PC12DBL:
947216bf
AM
1205 case R_390_PC16:
1206 case R_390_PC16DBL:
fb798c50 1207 case R_390_PC24DBL:
a85d7ed0
NC
1208 case R_390_PC32:
1209 case R_390_PC32DBL:
1210 case R_390_PC64:
99ba5125 1211 if (h != NULL && bfd_link_executable (info))
0451c93c
MS
1212 {
1213 /* If this reloc is in a read-only section, we might
1214 need a copy reloc. We can't check reliably at this
1215 stage whether the section is read-only, as input
1216 sections have not yet been mapped to output sections.
1217 Tentatively set the flag for now, and correct in
1218 adjust_dynamic_symbol. */
f5385ebf 1219 h->non_got_ref = 1;
ec338859 1220
0e1862bb 1221 if (!bfd_link_pic (info))
470b557a
AK
1222 {
1223 /* We may need a .plt entry if the function this reloc
1224 refers to is in a shared lib. */
1225 h->plt.refcount += 1;
1226 }
0451c93c 1227 }
ec338859 1228
a85d7ed0 1229 /* If we are creating a shared library, and this is a reloc
0451c93c
MS
1230 against a global symbol, or a non PC relative reloc
1231 against a local symbol, then we need to copy the reloc
1232 into the shared library. However, if we are linking with
1233 -Bsymbolic, we do not need to copy a reloc against a
1234 global symbol which is defined in an object we are
1235 including in the link (i.e., DEF_REGULAR is set). At
1236 this point we have not seen all the input files, so it is
1237 possible that DEF_REGULAR is not set now but will be set
1238 later (it is never cleared). In case of a weak definition,
1239 DEF_REGULAR may be cleared later by a strong definition in
1240 a shared library. We account for that possibility below by
1241 storing information in the relocs_copied field of the hash
1242 table entry. A similar situation occurs when creating
1243 shared libraries and symbol visibility changes render the
1244 symbol local.
1245
1246 If on the other hand, we are creating an executable, we
1247 may need to keep relocations for symbols satisfied by a
1248 dynamic library if we manage to avoid copy relocs for the
1249 symbol. */
0e1862bb 1250 if ((bfd_link_pic (info)
0451c93c
MS
1251 && (sec->flags & SEC_ALLOC) != 0
1252 && ((ELF64_R_TYPE (rel->r_info) != R_390_PC16
fb798c50 1253 && ELF64_R_TYPE (rel->r_info) != R_390_PC12DBL
0451c93c 1254 && ELF64_R_TYPE (rel->r_info) != R_390_PC16DBL
fb798c50 1255 && ELF64_R_TYPE (rel->r_info) != R_390_PC24DBL
0451c93c
MS
1256 && ELF64_R_TYPE (rel->r_info) != R_390_PC32
1257 && ELF64_R_TYPE (rel->r_info) != R_390_PC32DBL
1258 && ELF64_R_TYPE (rel->r_info) != R_390_PC64)
1259 || (h != NULL
8c21ca21 1260 && (! SYMBOLIC_BIND (info, h)
0451c93c 1261 || h->root.type == bfd_link_hash_defweak
f5385ebf 1262 || !h->def_regular))))
64285810 1263 || (ELIMINATE_COPY_RELOCS
0e1862bb 1264 && !bfd_link_pic (info)
0451c93c
MS
1265 && (sec->flags & SEC_ALLOC) != 0
1266 && h != NULL
1267 && (h->root.type == bfd_link_hash_defweak
f5385ebf 1268 || !h->def_regular)))
a85d7ed0 1269 {
00d8c7a9
AK
1270 struct elf_dyn_relocs *p;
1271 struct elf_dyn_relocs **head;
ec338859 1272
0451c93c
MS
1273 /* We must copy these reloc types into the output file.
1274 Create a reloc section in dynobj and make room for
1275 this reloc. */
a85d7ed0
NC
1276 if (sreloc == NULL)
1277 {
440e9cd2
AK
1278 if (htab->elf.dynobj == NULL)
1279 htab->elf.dynobj = abfd;
1280
83bac4b0
NC
1281 sreloc = _bfd_elf_make_dynamic_reloc_section
1282 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
ec338859 1283
a85d7ed0 1284 if (sreloc == NULL)
83bac4b0 1285 return FALSE;
a85d7ed0 1286 }
ec338859 1287
0451c93c
MS
1288 /* If this is a global symbol, we count the number of
1289 relocations we need for this symbol. */
1290 if (h != NULL)
a85d7ed0 1291 {
ec338859 1292 head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
0451c93c
MS
1293 }
1294 else
1295 {
ec338859
AM
1296 /* Track dynamic relocs needed for local syms too.
1297 We really need local syms available to do this
1298 easily. Oh well. */
ec338859 1299 asection *s;
6edfbbad
DJ
1300 void *vpp;
1301
87d72d41
AM
1302 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1303 abfd, r_symndx);
1304 if (isym == NULL)
b34976b6 1305 return FALSE;
ec338859 1306
87d72d41
AM
1307 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1308 if (s == NULL)
1309 s = sec;
1310
6edfbbad 1311 vpp = &elf_section_data (s)->local_dynrel;
00d8c7a9 1312 head = (struct elf_dyn_relocs **) vpp;
ec338859
AM
1313 }
1314
1315 p = *head;
1316 if (p == NULL || p->sec != sec)
1317 {
1318 bfd_size_type amt = sizeof *p;
00d8c7a9 1319 p = ((struct elf_dyn_relocs *)
ec338859
AM
1320 bfd_alloc (htab->elf.dynobj, amt));
1321 if (p == NULL)
b34976b6 1322 return FALSE;
ec338859
AM
1323 p->next = *head;
1324 *head = p;
1325 p->sec = sec;
1326 p->count = 0;
1327 p->pc_count = 0;
a85d7ed0 1328 }
ec338859
AM
1329
1330 p->count += 1;
1331 if (ELF64_R_TYPE (rel->r_info) == R_390_PC16
fb798c50
AK
1332 || ELF64_R_TYPE (rel->r_info) == R_390_PC12DBL
1333 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
ec338859
AM
1334 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1335 || ELF64_R_TYPE (rel->r_info) == R_390_PC32
1336 || ELF64_R_TYPE (rel->r_info) == R_390_PC32DBL
1337 || ELF64_R_TYPE (rel->r_info) == R_390_PC64)
1338 p->pc_count += 1;
a85d7ed0 1339 }
a85d7ed0 1340 break;
ec338859 1341
a85d7ed0
NC
1342 /* This relocation describes the C++ object vtable hierarchy.
1343 Reconstruct it for later use during GC. */
947216bf 1344 case R_390_GNU_VTINHERIT:
c152c796 1345 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 1346 return FALSE;
947216bf 1347 break;
ec338859 1348
a85d7ed0
NC
1349 /* This relocation describes which C++ vtable entries are actually
1350 used. Record for later use during GC. */
947216bf 1351 case R_390_GNU_VTENTRY:
d17e0c6e
JB
1352 BFD_ASSERT (h != NULL);
1353 if (h != NULL
1354 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 1355 return FALSE;
947216bf 1356 break;
ec338859 1357
a85d7ed0
NC
1358 default:
1359 break;
1360 }
1361 }
1362
b34976b6 1363 return TRUE;
a85d7ed0
NC
1364}
1365
1366/* Return the section that should be marked against GC for a given
1367 relocation. */
1368
1369static asection *
07adf181
AM
1370elf_s390_gc_mark_hook (asection *sec,
1371 struct bfd_link_info *info,
1372 Elf_Internal_Rela *rel,
1373 struct elf_link_hash_entry *h,
1374 Elf_Internal_Sym *sym)
a85d7ed0
NC
1375{
1376 if (h != NULL)
07adf181
AM
1377 switch (ELF64_R_TYPE (rel->r_info))
1378 {
1379 case R_390_GNU_VTINHERIT:
1380 case R_390_GNU_VTENTRY:
1381 return NULL;
1382 }
1383
1384 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
a85d7ed0
NC
1385}
1386
1387/* Update the got entry reference counts for the section being removed. */
1388
b34976b6 1389static bfd_boolean
07adf181
AM
1390elf_s390_gc_sweep_hook (bfd *abfd,
1391 struct bfd_link_info *info,
1392 asection *sec,
1393 const Elf_Internal_Rela *relocs)
a85d7ed0 1394{
4dfe6ac6 1395 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
1396 Elf_Internal_Shdr *symtab_hdr;
1397 struct elf_link_hash_entry **sym_hashes;
1398 bfd_signed_vma *local_got_refcounts;
1399 const Elf_Internal_Rela *rel, *relend;
a85d7ed0 1400
0e1862bb 1401 if (bfd_link_relocatable (info))
7dda2462
TG
1402 return TRUE;
1403
4dfe6ac6
NC
1404 htab = elf_s390_hash_table (info);
1405 if (htab == NULL)
1406 return FALSE;
1407
ec338859 1408 elf_section_data (sec)->local_dynrel = NULL;
a85d7ed0 1409
0ffa91dd 1410 symtab_hdr = &elf_symtab_hdr (abfd);
0451c93c
MS
1411 sym_hashes = elf_sym_hashes (abfd);
1412 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0
NC
1413
1414 relend = relocs + sec->reloc_count;
1415 for (rel = relocs; rel < relend; rel++)
5236c819 1416 {
26e41594
AM
1417 unsigned long r_symndx;
1418 unsigned int r_type;
1419 struct elf_link_hash_entry *h = NULL;
1420
5236c819 1421 r_symndx = ELF64_R_SYM (rel->r_info);
26e41594
AM
1422 if (r_symndx >= symtab_hdr->sh_info)
1423 {
1424 struct elf_s390_link_hash_entry *eh;
00d8c7a9
AK
1425 struct elf_dyn_relocs **pp;
1426 struct elf_dyn_relocs *p;
5236c819 1427
26e41594 1428 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3eb128b2
AM
1429 while (h->root.type == bfd_link_hash_indirect
1430 || h->root.type == bfd_link_hash_warning)
1431 h = (struct elf_link_hash_entry *) h->root.u.i.link;
26e41594 1432 eh = (struct elf_s390_link_hash_entry *) h;
5236c819 1433
26e41594
AM
1434 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1435 if (p->sec == sec)
1436 {
1437 /* Everything must go for SEC. */
1438 *pp = p->next;
1439 break;
1440 }
1441 }
470b557a
AK
1442 else
1443 {
1444 Elf_Internal_Sym *isym;
1445
1446 /* A local symbol. */
1447 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1448 abfd, r_symndx);
1449 if (isym == NULL)
1450 return FALSE;
1451
1452 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1453 {
1454 struct plt_entry *plt = elf_s390_local_plt (abfd);
1455 if (plt[r_symndx].plt.refcount > 0)
1456 plt[r_symndx].plt.refcount--;
1457 }
1458 }
26e41594
AM
1459
1460 r_type = ELF64_R_TYPE (rel->r_info);
1461 r_type = elf_s390_tls_transition (info, r_type, h != NULL);
69fc87f1 1462 switch (r_type)
5236c819 1463 {
69fc87f1 1464 case R_390_TLS_LDM64:
4dfe6ac6
NC
1465 if (htab->tls_ldm_got.refcount > 0)
1466 htab->tls_ldm_got.refcount -= 1;
69fc87f1 1467 break;
ef05be83
AK
1468 case R_390_GOTOFF16:
1469 case R_390_GOTOFF32:
1470 case R_390_GOTOFF64:
d47b13e0
AK
1471 if (h != NULL && s390_is_ifunc_symbol_p (h) && h->def_regular)
1472 {
1473 h->plt.refcount--;
1474 break;
1475 }
1476
ef05be83
AK
1477 case R_390_GOTPC:
1478 case R_390_GOTPCDBL:
1479 break;
69fc87f1
MS
1480
1481 case R_390_TLS_GD64:
1482 case R_390_TLS_IE64:
1483 case R_390_TLS_GOTIE12:
bd1ea41b 1484 case R_390_TLS_GOTIE20:
69fc87f1
MS
1485 case R_390_TLS_GOTIE64:
1486 case R_390_TLS_IEENT:
5236c819
MS
1487 case R_390_GOT12:
1488 case R_390_GOT16:
bd1ea41b 1489 case R_390_GOT20:
5236c819
MS
1490 case R_390_GOT32:
1491 case R_390_GOT64:
5236c819
MS
1492 case R_390_GOTENT:
1493 if (h != NULL)
1494 {
1495 if (h->got.refcount > 0)
1496 h->got.refcount -= 1;
1497 }
1498 else if (local_got_refcounts != NULL)
1499 {
1500 if (local_got_refcounts[r_symndx] > 0)
1501 local_got_refcounts[r_symndx] -= 1;
1502 }
26e41594 1503 break;
a85d7ed0 1504
5236c819
MS
1505 case R_390_8:
1506 case R_390_12:
1507 case R_390_16:
bd1ea41b 1508 case R_390_20:
5236c819
MS
1509 case R_390_32:
1510 case R_390_64:
1511 case R_390_PC16:
fb798c50 1512 case R_390_PC12DBL:
5236c819 1513 case R_390_PC16DBL:
fb798c50 1514 case R_390_PC24DBL:
5236c819
MS
1515 case R_390_PC32:
1516 case R_390_PC32DBL:
1517 case R_390_PC64:
0e1862bb 1518 if (bfd_link_pic (info))
26e41594
AM
1519 break;
1520 /* Fall through */
a85d7ed0 1521
fb798c50 1522 case R_390_PLT12DBL:
69fc87f1 1523 case R_390_PLT16DBL:
fb798c50 1524 case R_390_PLT24DBL:
69fc87f1
MS
1525 case R_390_PLT32:
1526 case R_390_PLT32DBL:
1527 case R_390_PLT64:
1528 case R_390_PLTOFF16:
1529 case R_390_PLTOFF32:
1530 case R_390_PLTOFF64:
1531 if (h != NULL)
1532 {
1533 if (h->plt.refcount > 0)
1534 h->plt.refcount -= 1;
1535 }
1536 break;
1537
1538 case R_390_GOTPLT12:
1539 case R_390_GOTPLT16:
bd1ea41b 1540 case R_390_GOTPLT20:
69fc87f1
MS
1541 case R_390_GOTPLT32:
1542 case R_390_GOTPLT64:
1543 case R_390_GOTPLTENT:
1544 if (h != NULL)
1545 {
1546 if (h->plt.refcount > 0)
1547 {
1548 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount--;
1549 h->plt.refcount -= 1;
1550 }
1551 }
1552 else if (local_got_refcounts != NULL)
1553 {
1554 if (local_got_refcounts[r_symndx] > 0)
1555 local_got_refcounts[r_symndx] -= 1;
1556 }
1557 break;
1558
5236c819
MS
1559 default:
1560 break;
1561 }
1562 }
a85d7ed0 1563
b34976b6 1564 return TRUE;
a85d7ed0
NC
1565}
1566
5236c819
MS
1567/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1568 entry but we found we will not create any. Called when we find we will
1569 not have any PLT for this symbol, by for example
1570 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1571 or elf_s390_size_dynamic_sections if no dynamic sections will be
1572 created (we're only linking static objects). */
1573
1574static void
2c3fc389 1575elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
5236c819
MS
1576{
1577 if (h->elf.root.type == bfd_link_hash_warning)
1578 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1579
1580 if (h->gotplt_refcount <= 0)
1581 return;
1582
1583 /* We simply add the number of gotplt references to the number
1584 * of got references for this symbol. */
1585 h->elf.got.refcount += h->gotplt_refcount;
1586 h->gotplt_refcount = -1;
1587}
1588
a85d7ed0
NC
1589/* Adjust a symbol defined by a dynamic object and referenced by a
1590 regular object. The current definition is in some section of the
1591 dynamic object, but we're not including those sections. We have to
1592 change the definition to something the rest of the link can
1593 understand. */
1594
b34976b6 1595static bfd_boolean
4dfe6ac6
NC
1596elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1597 struct elf_link_hash_entry *h)
a85d7ed0 1598{
0451c93c 1599 struct elf_s390_link_hash_table *htab;
a85d7ed0 1600 asection *s;
a85d7ed0 1601
470b557a
AK
1602 /* STT_GNU_IFUNC symbol must go through PLT. */
1603 if (s390_is_ifunc_symbol_p (h))
d8ee9e44
AK
1604 {
1605 /* All local STT_GNU_IFUNC references must be treated as local
1606 calls via local PLT. */
1607 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1608 {
1609 bfd_size_type pc_count = 0, count = 0;
1610 struct elf_dyn_relocs **pp;
1611 struct elf_s390_link_hash_entry *eh;
1612 struct elf_dyn_relocs *p;
1613
1614 eh = (struct elf_s390_link_hash_entry *) h;
1615 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1616 {
1617 pc_count += p->pc_count;
1618 p->count -= p->pc_count;
1619 p->pc_count = 0;
1620 count += p->count;
1621 if (p->count == 0)
1622 *pp = p->next;
1623 else
1624 pp = &p->next;
1625 }
1626
1627 if (pc_count || count)
1628 {
1629 h->needs_plt = 1;
1630 h->non_got_ref = 1;
1631 if (h->plt.refcount <= 0)
1632 h->plt.refcount = 1;
1633 else
1634 h->plt.refcount += 1;
1635 }
1636 }
1637
1638 if (h->plt.refcount <= 0)
1639 {
1640 h->plt.offset = (bfd_vma) -1;
1641 h->needs_plt = 0;
1642 }
1643 return TRUE;
1644 }
470b557a 1645
a85d7ed0
NC
1646 /* If this is a function, put it in the procedure linkage table. We
1647 will fill in the contents of the procedure linkage table later
cedb70c5 1648 (although we could actually do it here). */
a85d7ed0 1649 if (h->type == STT_FUNC
f5385ebf 1650 || h->needs_plt)
a85d7ed0 1651 {
0451c93c 1652 if (h->plt.refcount <= 0
8c21ca21
AK
1653 || SYMBOL_CALLS_LOCAL (info, h)
1654 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1655 && h->root.type == bfd_link_hash_undefweak))
a85d7ed0
NC
1656 {
1657 /* This case can occur if we saw a PLT32 reloc in an input
947216bf
AM
1658 file, but the symbol was never referred to by a dynamic
1659 object, or if all references were garbage collected. In
0451c93c
MS
1660 such a case, we don't actually need to build a procedure
1661 linkage table, and we can just do a PC32 reloc instead. */
a85d7ed0 1662 h->plt.offset = (bfd_vma) -1;
f5385ebf 1663 h->needs_plt = 0;
5236c819 1664 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
a85d7ed0
NC
1665 }
1666
b34976b6 1667 return TRUE;
a85d7ed0 1668 }
bbd7ec4a 1669 else
0451c93c
MS
1670 /* It's possible that we incorrectly decided a .plt reloc was
1671 needed for an R_390_PC32 reloc to a non-function sym in
1672 check_relocs. We can't decide accurately between function and
1673 non-function syms in check-relocs; Objects loaded later in
1674 the link may change h->type. So fix it now. */
bbd7ec4a 1675 h->plt.offset = (bfd_vma) -1;
a85d7ed0
NC
1676
1677 /* If this is a weak symbol, and there is a real definition, the
1678 processor independent code will have arranged for us to see the
1679 real definition first, and we can just use the same value. */
f6e332e6 1680 if (h->u.weakdef != NULL)
a85d7ed0 1681 {
f6e332e6
AM
1682 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1683 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1684 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1685 h->root.u.def.value = h->u.weakdef->root.u.def.value;
64285810 1686 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
f6e332e6 1687 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 1688 return TRUE;
a85d7ed0
NC
1689 }
1690
1691 /* This is a reference to a symbol defined by a dynamic object which
1692 is not a function. */
1693
1694 /* If we are creating a shared library, we must presume that the
1695 only references to the symbol are via the global offset table.
1696 For such cases we need not do anything here; the relocations will
1697 be handled correctly by relocate_section. */
0e1862bb 1698 if (bfd_link_pic (info))
b34976b6 1699 return TRUE;
a85d7ed0
NC
1700
1701 /* If there are no references to this symbol that do not use the
1702 GOT, we don't need to generate a copy reloc. */
f5385ebf 1703 if (!h->non_got_ref)
b34976b6 1704 return TRUE;
a85d7ed0 1705
0451c93c
MS
1706 /* If -z nocopyreloc was given, we won't generate them either. */
1707 if (info->nocopyreloc)
1708 {
f5385ebf 1709 h->non_got_ref = 0;
b34976b6 1710 return TRUE;
0451c93c
MS
1711 }
1712
64285810 1713 if (ELIMINATE_COPY_RELOCS)
0451c93c 1714 {
64285810 1715 struct elf_s390_link_hash_entry * eh;
00d8c7a9 1716 struct elf_dyn_relocs *p;
0451c93c 1717
64285810
MS
1718 eh = (struct elf_s390_link_hash_entry *) h;
1719 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1720 {
1721 s = p->sec->output_section;
1722 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1723 break;
1724 }
1725
1726 /* If we didn't find any dynamic relocs in read-only sections, then
1727 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1728 if (p == NULL)
1729 {
f5385ebf 1730 h->non_got_ref = 0;
64285810
MS
1731 return TRUE;
1732 }
0451c93c
MS
1733 }
1734
a85d7ed0
NC
1735 /* We must allocate the symbol in our .dynbss section, which will
1736 become part of the .bss section of the executable. There will be
1737 an entry for this symbol in the .dynsym section. The dynamic
1738 object will contain position independent code, so all references
1739 from the dynamic object to this symbol will go through the global
1740 offset table. The dynamic linker will use the .dynsym entry to
1741 determine the address it must put in the global offset table, so
1742 both the dynamic object and the regular object will refer to the
1743 same memory location for the variable. */
1744
0451c93c 1745 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
1746 if (htab == NULL)
1747 return FALSE;
a85d7ed0 1748
0451c93c
MS
1749 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1750 copy the initial value out of the dynamic object and into the
1751 runtime process image. */
1d7e9d18 1752 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
a85d7ed0 1753 {
eea6121a 1754 htab->srelbss->size += sizeof (Elf64_External_Rela);
f5385ebf 1755 h->needs_copy = 1;
a85d7ed0
NC
1756 }
1757
0451c93c 1758 s = htab->sdynbss;
a85d7ed0 1759
6cabe1ea 1760 return _bfd_elf_adjust_dynamic_copy (info, h, s);
a85d7ed0
NC
1761}
1762
0451c93c
MS
1763/* Allocate space in .plt, .got and associated reloc sections for
1764 dynamic relocs. */
1765
b34976b6 1766static bfd_boolean
4dfe6ac6
NC
1767allocate_dynrelocs (struct elf_link_hash_entry *h,
1768 void * inf)
0451c93c
MS
1769{
1770 struct bfd_link_info *info;
1771 struct elf_s390_link_hash_table *htab;
470b557a 1772 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
00d8c7a9 1773 struct elf_dyn_relocs *p;
0451c93c 1774
e92d460e 1775 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1776 return TRUE;
0451c93c
MS
1777
1778 info = (struct bfd_link_info *) inf;
1779 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
1780 if (htab == NULL)
1781 return FALSE;
0451c93c 1782
470b557a
AK
1783 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1784 here if it is defined and referenced in a non-shared object. */
1785 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
61643fba 1786 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
470b557a
AK
1787 else if (htab->elf.dynamic_sections_created
1788 && h->plt.refcount > 0)
0451c93c
MS
1789 {
1790 /* Make sure this symbol is output as a dynamic symbol.
1791 Undefined weak syms won't yet be marked as dynamic. */
1792 if (h->dynindx == -1
f5385ebf 1793 && !h->forced_local)
0451c93c 1794 {
c152c796 1795 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1796 return FALSE;
0451c93c
MS
1797 }
1798
0e1862bb 1799 if (bfd_link_pic (info)
4ec72bde 1800 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
0451c93c 1801 {
f41345a7 1802 asection *s = htab->elf.splt;
0451c93c
MS
1803
1804 /* If this is the first .plt entry, make room for the special
1805 first entry. */
eea6121a
AM
1806 if (s->size == 0)
1807 s->size += PLT_FIRST_ENTRY_SIZE;
0451c93c 1808
eea6121a 1809 h->plt.offset = s->size;
0451c93c
MS
1810
1811 /* If this symbol is not defined in a regular file, and we are
1812 not generating a shared library, then set the symbol to this
1813 location in the .plt. This is required to make function
1814 pointers compare as equal between the normal executable and
1815 the shared library. */
0e1862bb 1816 if (! bfd_link_pic (info)
f5385ebf 1817 && !h->def_regular)
0451c93c
MS
1818 {
1819 h->root.u.def.section = s;
1820 h->root.u.def.value = h->plt.offset;
1821 }
ec338859 1822
0451c93c 1823 /* Make room for this entry. */
eea6121a 1824 s->size += PLT_ENTRY_SIZE;
ec338859 1825
0451c93c
MS
1826 /* We also need to make an entry in the .got.plt section, which
1827 will be placed in the .got section by the linker script. */
f41345a7 1828 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
0451c93c
MS
1829
1830 /* We also need to make an entry in the .rela.plt section. */
f41345a7 1831 htab->elf.srelplt->size += sizeof (Elf64_External_Rela);
0451c93c
MS
1832 }
1833 else
1834 {
1835 h->plt.offset = (bfd_vma) -1;
f5385ebf 1836 h->needs_plt = 0;
5236c819 1837 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c
MS
1838 }
1839 }
1840 else
1841 {
1842 h->plt.offset = (bfd_vma) -1;
f5385ebf 1843 h->needs_plt = 0;
5236c819 1844 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c
MS
1845 }
1846
69fc87f1
MS
1847 /* If R_390_TLS_{IE64,GOTIE64,GOTIE12,IEENT} symbol is now local to
1848 the binary, we can optimize a bit. IE64 and GOTIE64 get converted
1849 to R_390_TLS_LE64 requiring no TLS entry. For GOTIE12 and IEENT
1850 we can save the dynamic TLS relocation. */
1851 if (h->got.refcount > 0
0e1862bb 1852 && !bfd_link_pic (info)
69fc87f1
MS
1853 && h->dynindx == -1
1854 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1855 {
1856 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1857 /* For the GOTIE access without a literal pool entry the offset has
1858 to be stored somewhere. The immediate value in the instruction
1859 is not bit enough so the value is stored in the got. */
1860 {
f41345a7
AK
1861 h->got.offset = htab->elf.sgot->size;
1862 htab->elf.sgot->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1863 }
1864 else
1865 h->got.offset = (bfd_vma) -1;
1866 }
1867 else if (h->got.refcount > 0)
0451c93c
MS
1868 {
1869 asection *s;
b34976b6 1870 bfd_boolean dyn;
69fc87f1 1871 int tls_type = elf_s390_hash_entry(h)->tls_type;
0451c93c
MS
1872
1873 /* Make sure this symbol is output as a dynamic symbol.
1874 Undefined weak syms won't yet be marked as dynamic. */
1875 if (h->dynindx == -1
f5385ebf 1876 && !h->forced_local)
0451c93c 1877 {
c152c796 1878 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1879 return FALSE;
0451c93c
MS
1880 }
1881
f41345a7 1882 s = htab->elf.sgot;
eea6121a
AM
1883 h->got.offset = s->size;
1884 s->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1885 /* R_390_TLS_GD64 needs 2 consecutive GOT slots. */
1886 if (tls_type == GOT_TLS_GD)
eea6121a 1887 s->size += GOT_ENTRY_SIZE;
0451c93c 1888 dyn = htab->elf.dynamic_sections_created;
69fc87f1
MS
1889 /* R_390_TLS_IE64 needs one dynamic relocation,
1890 R_390_TLS_GD64 needs one if local symbol and two if global. */
1891 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1892 || tls_type >= GOT_TLS_IE)
f41345a7 1893 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
69fc87f1 1894 else if (tls_type == GOT_TLS_GD)
f41345a7 1895 htab->elf.srelgot->size += 2 * sizeof (Elf64_External_Rela);
82058a73
MS
1896 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1897 || h->root.type != bfd_link_hash_undefweak)
0e1862bb 1898 && (bfd_link_pic (info)
82058a73 1899 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
f41345a7 1900 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
0451c93c
MS
1901 }
1902 else
1903 h->got.offset = (bfd_vma) -1;
1904
0451c93c 1905 if (eh->dyn_relocs == NULL)
b34976b6 1906 return TRUE;
0451c93c
MS
1907
1908 /* In the shared -Bsymbolic case, discard space allocated for
1909 dynamic pc-relative relocs against symbols which turn out to be
1910 defined in regular objects. For the normal shared case, discard
1911 space for pc-relative relocs that have become local due to symbol
1912 visibility changes. */
1913
0e1862bb 1914 if (bfd_link_pic (info))
0451c93c 1915 {
8c21ca21 1916 if (SYMBOL_CALLS_LOCAL (info, h))
0451c93c 1917 {
00d8c7a9 1918 struct elf_dyn_relocs **pp;
0451c93c
MS
1919
1920 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1921 {
1922 p->count -= p->pc_count;
1923 p->pc_count = 0;
1924 if (p->count == 0)
1925 *pp = p->next;
1926 else
1927 pp = &p->next;
1928 }
1929 }
82058a73
MS
1930
1931 /* Also discard relocs on undefined weak syms with non-default
1932 visibility. */
22d606e9 1933 if (eh->dyn_relocs != NULL
82058a73 1934 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
1935 {
1936 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1937 eh->dyn_relocs = NULL;
1938
1939 /* Make sure undefined weak symbols are output as a dynamic
1940 symbol in PIEs. */
1941 else if (h->dynindx == -1
1942 && !h->forced_local)
1943 {
1944 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1945 return FALSE;
1946 }
1947 }
0451c93c 1948 }
64285810 1949 else if (ELIMINATE_COPY_RELOCS)
0451c93c
MS
1950 {
1951 /* For the non-shared case, discard space for relocs against
1952 symbols which turn out to need copy relocs or are not
1953 dynamic. */
1954
f5385ebf
AM
1955 if (!h->non_got_ref
1956 && ((h->def_dynamic
1957 && !h->def_regular)
0451c93c
MS
1958 || (htab->elf.dynamic_sections_created
1959 && (h->root.type == bfd_link_hash_undefweak
1960 || h->root.type == bfd_link_hash_undefined))))
1961 {
1962 /* Make sure this symbol is output as a dynamic symbol.
1963 Undefined weak syms won't yet be marked as dynamic. */
1964 if (h->dynindx == -1
f5385ebf 1965 && !h->forced_local)
0451c93c 1966 {
c152c796 1967 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1968 return FALSE;
0451c93c
MS
1969 }
1970
1971 /* If that succeeded, we know we'll be keeping all the
1972 relocs. */
1973 if (h->dynindx != -1)
1974 goto keep;
1975 }
1976
1977 eh->dyn_relocs = NULL;
1978
ec338859 1979 keep: ;
0451c93c
MS
1980 }
1981
1982 /* Finally, allocate space. */
1983 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1984 {
1985 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 1986 sreloc->size += p->count * sizeof (Elf64_External_Rela);
0451c93c
MS
1987 }
1988
b34976b6 1989 return TRUE;
0451c93c
MS
1990}
1991
1992/* Find any dynamic relocs that apply to read-only sections. */
1993
b34976b6 1994static bfd_boolean
2c3fc389 1995readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
0451c93c
MS
1996{
1997 struct elf_s390_link_hash_entry *eh;
00d8c7a9 1998 struct elf_dyn_relocs *p;
0451c93c
MS
1999
2000 eh = (struct elf_s390_link_hash_entry *) h;
2001 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2002 {
2003 asection *s = p->sec->output_section;
2004
2005 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2006 {
2007 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2008
2009 info->flags |= DF_TEXTREL;
2010
2011 /* Not an error, just cut short the traversal. */
b34976b6 2012 return FALSE;
0451c93c
MS
2013 }
2014 }
b34976b6 2015 return TRUE;
0451c93c
MS
2016}
2017
a85d7ed0
NC
2018/* Set the sizes of the dynamic sections. */
2019
b34976b6 2020static bfd_boolean
4dfe6ac6
NC
2021elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2022 struct bfd_link_info *info)
a85d7ed0 2023{
0451c93c 2024 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2025 bfd *dynobj;
2026 asection *s;
b34976b6 2027 bfd_boolean relocs;
0451c93c 2028 bfd *ibfd;
a85d7ed0 2029
0451c93c 2030 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
2031 if (htab == NULL)
2032 return FALSE;
2033
0451c93c
MS
2034 dynobj = htab->elf.dynobj;
2035 if (dynobj == NULL)
2036 abort ();
a85d7ed0 2037
0451c93c 2038 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2039 {
2040 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2041 if (bfd_link_executable (info) && !info->nointerp)
a85d7ed0 2042 {
3d4d4302 2043 s = bfd_get_linker_section (dynobj, ".interp");
0451c93c
MS
2044 if (s == NULL)
2045 abort ();
eea6121a 2046 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
a85d7ed0
NC
2047 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2048 }
2049 }
a85d7ed0 2050
0451c93c
MS
2051 /* Set up .got offsets for local syms, and space for local dynamic
2052 relocs. */
c72f2fb2 2053 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
a85d7ed0 2054 {
0451c93c
MS
2055 bfd_signed_vma *local_got;
2056 bfd_signed_vma *end_local_got;
69fc87f1 2057 char *local_tls_type;
0451c93c
MS
2058 bfd_size_type locsymcount;
2059 Elf_Internal_Shdr *symtab_hdr;
2060 asection *srela;
470b557a
AK
2061 struct plt_entry *local_plt;
2062 unsigned int i;
a85d7ed0 2063
0ffa91dd 2064 if (! is_s390_elf (ibfd))
a85d7ed0
NC
2065 continue;
2066
0451c93c 2067 for (s = ibfd->sections; s != NULL; s = s->next)
a85d7ed0 2068 {
00d8c7a9 2069 struct elf_dyn_relocs *p;
0451c93c 2070
6edfbbad 2071 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
a85d7ed0 2072 {
ec338859
AM
2073 if (!bfd_is_abs_section (p->sec)
2074 && bfd_is_abs_section (p->sec->output_section))
2075 {
2076 /* Input section has been discarded, either because
2077 it is a copy of a linkonce section or due to
2078 linker script /DISCARD/, so we'll be discarding
2079 the relocs too. */
2080 }
248866a8 2081 else if (p->count != 0)
ec338859
AM
2082 {
2083 srela = elf_section_data (p->sec)->sreloc;
eea6121a 2084 srela->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
2085 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2086 info->flags |= DF_TEXTREL;
ec338859 2087 }
a85d7ed0
NC
2088 }
2089 }
0451c93c
MS
2090
2091 local_got = elf_local_got_refcounts (ibfd);
2092 if (!local_got)
2093 continue;
2094
0ffa91dd 2095 symtab_hdr = &elf_symtab_hdr (ibfd);
0451c93c
MS
2096 locsymcount = symtab_hdr->sh_info;
2097 end_local_got = local_got + locsymcount;
69fc87f1 2098 local_tls_type = elf_s390_local_got_tls_type (ibfd);
f41345a7
AK
2099 s = htab->elf.sgot;
2100 srela = htab->elf.srelgot;
69fc87f1 2101 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
a85d7ed0 2102 {
0451c93c 2103 if (*local_got > 0)
a85d7ed0 2104 {
eea6121a
AM
2105 *local_got = s->size;
2106 s->size += GOT_ENTRY_SIZE;
69fc87f1 2107 if (*local_tls_type == GOT_TLS_GD)
eea6121a 2108 s->size += GOT_ENTRY_SIZE;
0e1862bb 2109 if (bfd_link_pic (info))
eea6121a 2110 srela->size += sizeof (Elf64_External_Rela);
a85d7ed0
NC
2111 }
2112 else
0451c93c 2113 *local_got = (bfd_vma) -1;
a85d7ed0 2114 }
470b557a
AK
2115
2116 local_plt = elf_s390_local_plt (ibfd);
2117 for (i = 0; i < symtab_hdr->sh_info; i++)
2118 {
2119 if (local_plt[i].plt.refcount > 0)
2120 {
2121 local_plt[i].plt.offset = htab->elf.iplt->size;
2122 htab->elf.iplt->size += PLT_ENTRY_SIZE;
2123 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
2124 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
2125 }
2126 else
2127 local_plt[i].plt.offset = (bfd_vma) -1;
2128 }
0451c93c
MS
2129 }
2130
69fc87f1
MS
2131 if (htab->tls_ldm_got.refcount > 0)
2132 {
2133 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM64
2134 relocs. */
f41345a7
AK
2135 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2136 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
2137 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
69fc87f1
MS
2138 }
2139 else
2140 htab->tls_ldm_got.offset = -1;
2141
0451c93c
MS
2142 /* Allocate global sym .plt and .got entries, and space for global
2143 sym dynamic relocs. */
2c3fc389 2144 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
0451c93c
MS
2145
2146 /* We now have determined the sizes of the various dynamic sections.
2147 Allocate memory for them. */
b34976b6 2148 relocs = FALSE;
0451c93c
MS
2149 for (s = dynobj->sections; s != NULL; s = s->next)
2150 {
2151 if ((s->flags & SEC_LINKER_CREATED) == 0)
2152 continue;
2153
f41345a7
AK
2154 if (s == htab->elf.splt
2155 || s == htab->elf.sgot
2156 || s == htab->elf.sgotplt
470b557a
AK
2157 || s == htab->sdynbss
2158 || s == htab->elf.iplt
2159 || s == htab->elf.igotplt
2160 || s == htab->irelifunc)
0451c93c
MS
2161 {
2162 /* Strip this section if we don't need it; see the
2163 comment below. */
2164 }
0112cd26 2165 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
0451c93c 2166 {
f41345a7 2167 if (s->size != 0 && s != htab->elf.srelplt)
b34976b6 2168 relocs = TRUE;
ec338859 2169
0451c93c
MS
2170 /* We use the reloc_count field as a counter if we need
2171 to copy relocs into the output file. */
2172 s->reloc_count = 0;
2173 }
2174 else
a85d7ed0
NC
2175 {
2176 /* It's not one of our sections, so don't allocate space. */
2177 continue;
2178 }
2179
eea6121a 2180 if (s->size == 0)
a85d7ed0 2181 {
0451c93c
MS
2182 /* If we don't need this section, strip it from the
2183 output file. This is to handle .rela.bss and
2184 .rela.plt. We must create it in
2185 create_dynamic_sections, because it must be created
2186 before the linker maps input sections to output
2187 sections. The linker does that before
2188 adjust_dynamic_symbol is called, and it is that
2189 function which decides whether anything needs to go
2190 into these sections. */
2191
8423293d 2192 s->flags |= SEC_EXCLUDE;
a85d7ed0
NC
2193 continue;
2194 }
2195
c456f082
AM
2196 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2197 continue;
2198
0451c93c
MS
2199 /* Allocate memory for the section contents. We use bfd_zalloc
2200 here in case unused entries are not reclaimed before the
2201 section's contents are written out. This should not happen,
2202 but this way if it does, we get a R_390_NONE reloc instead
2203 of garbage. */
eea6121a 2204 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
0451c93c 2205 if (s->contents == NULL)
b34976b6 2206 return FALSE;
a85d7ed0
NC
2207 }
2208
0451c93c 2209 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2210 {
2211 /* Add some entries to the .dynamic section. We fill in the
2212 values later, in elf_s390_finish_dynamic_sections, but we
2213 must add the entries now so that we get the correct size for
2214 the .dynamic section. The DT_DEBUG entry is filled in by the
2215 dynamic linker and used by the debugger. */
dc810e39 2216#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2217 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 2218
0e1862bb 2219 if (bfd_link_executable (info))
a85d7ed0 2220 {
dc810e39 2221 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2222 return FALSE;
a85d7ed0
NC
2223 }
2224
f41345a7 2225 if (htab->elf.splt->size != 0)
a85d7ed0 2226 {
dc810e39
AM
2227 if (!add_dynamic_entry (DT_PLTGOT, 0)
2228 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2229 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2230 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2231 return FALSE;
a85d7ed0
NC
2232 }
2233
2234 if (relocs)
947216bf
AM
2235 {
2236 if (!add_dynamic_entry (DT_RELA, 0)
2237 || !add_dynamic_entry (DT_RELASZ, 0)
2238 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 2239 return FALSE;
ec338859 2240
0451c93c
MS
2241 /* If any dynamic relocs apply to a read-only section,
2242 then we need a DT_TEXTREL entry. */
248866a8
AM
2243 if ((info->flags & DF_TEXTREL) == 0)
2244 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2c3fc389 2245 info);
ec338859 2246
0451c93c
MS
2247 if ((info->flags & DF_TEXTREL) != 0)
2248 {
2249 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2250 return FALSE;
0451c93c 2251 }
a85d7ed0
NC
2252 }
2253 }
dc810e39 2254#undef add_dynamic_entry
a85d7ed0 2255
b34976b6 2256 return TRUE;
a85d7ed0
NC
2257}
2258
69fc87f1
MS
2259/* Return the base VMA address which should be subtracted from real addresses
2260 when resolving @dtpoff relocation.
2261 This is PT_TLS segment p_vaddr. */
2262
2263static bfd_vma
2c3fc389 2264dtpoff_base (struct bfd_link_info *info)
69fc87f1 2265{
e1918d23
AM
2266 /* If tls_sec is NULL, we should have signalled an error already. */
2267 if (elf_hash_table (info)->tls_sec == NULL)
69fc87f1 2268 return 0;
e1918d23 2269 return elf_hash_table (info)->tls_sec->vma;
69fc87f1
MS
2270}
2271
2272/* Return the relocation value for @tpoff relocation
2273 if STT_TLS virtual address is ADDRESS. */
2274
2275static bfd_vma
2c3fc389 2276tpoff (struct bfd_link_info *info, bfd_vma address)
69fc87f1 2277{
e1918d23 2278 struct elf_link_hash_table *htab = elf_hash_table (info);
69fc87f1 2279
e1918d23
AM
2280 /* If tls_sec is NULL, we should have signalled an error already. */
2281 if (htab->tls_sec == NULL)
69fc87f1 2282 return 0;
e1918d23 2283 return htab->tls_size + htab->tls_sec->vma - address;
69fc87f1
MS
2284}
2285
2286/* Complain if TLS instruction relocation is against an invalid
2287 instruction. */
2288
2289static void
2c3fc389
NC
2290invalid_tls_insn (bfd *input_bfd,
2291 asection *input_section,
2292 Elf_Internal_Rela *rel)
69fc87f1
MS
2293{
2294 reloc_howto_type *howto;
2295
2296 howto = elf_howto_table + ELF64_R_TYPE (rel->r_info);
2297 (*_bfd_error_handler)
d003868e
AM
2298 (_("%B(%A+0x%lx): invalid instruction for TLS relocation %s"),
2299 input_bfd,
2300 input_section,
69fc87f1
MS
2301 (long) rel->r_offset,
2302 howto->name);
77df2968 2303 bfd_set_error (bfd_error_bad_value);
69fc87f1
MS
2304}
2305
a85d7ed0
NC
2306/* Relocate a 390 ELF section. */
2307
b34976b6 2308static bfd_boolean
4dfe6ac6
NC
2309elf_s390_relocate_section (bfd *output_bfd,
2310 struct bfd_link_info *info,
2311 bfd *input_bfd,
2312 asection *input_section,
2313 bfd_byte *contents,
2314 Elf_Internal_Rela *relocs,
2315 Elf_Internal_Sym *local_syms,
2316 asection **local_sections)
a85d7ed0 2317{
0451c93c 2318 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2319 Elf_Internal_Shdr *symtab_hdr;
2320 struct elf_link_hash_entry **sym_hashes;
2321 bfd_vma *local_got_offsets;
a85d7ed0
NC
2322 Elf_Internal_Rela *rel;
2323 Elf_Internal_Rela *relend;
2324
0ffa91dd
NC
2325 BFD_ASSERT (is_s390_elf (input_bfd));
2326
0451c93c 2327 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
2328 if (htab == NULL)
2329 return FALSE;
2330
0ffa91dd 2331 symtab_hdr = &elf_symtab_hdr (input_bfd);
a85d7ed0
NC
2332 sym_hashes = elf_sym_hashes (input_bfd);
2333 local_got_offsets = elf_local_got_offsets (input_bfd);
2334
a85d7ed0
NC
2335 rel = relocs;
2336 relend = relocs + input_section->reloc_count;
2337 for (; rel < relend; rel++)
2338 {
5236c819 2339 unsigned int r_type;
a85d7ed0
NC
2340 reloc_howto_type *howto;
2341 unsigned long r_symndx;
2342 struct elf_link_hash_entry *h;
2343 Elf_Internal_Sym *sym;
2344 asection *sec;
0451c93c 2345 bfd_vma off;
a85d7ed0 2346 bfd_vma relocation;
b34976b6 2347 bfd_boolean unresolved_reloc;
a85d7ed0 2348 bfd_reloc_status_type r;
69fc87f1 2349 int tls_type;
470b557a 2350 asection *base_got = htab->elf.sgot;
a85d7ed0
NC
2351
2352 r_type = ELF64_R_TYPE (rel->r_info);
0451c93c 2353 if (r_type == (int) R_390_GNU_VTINHERIT
947216bf
AM
2354 || r_type == (int) R_390_GNU_VTENTRY)
2355 continue;
5236c819 2356 if (r_type >= (int) R_390_max)
a85d7ed0
NC
2357 {
2358 bfd_set_error (bfd_error_bad_value);
b34976b6 2359 return FALSE;
a85d7ed0 2360 }
a85d7ed0 2361
b491616a 2362 howto = elf_howto_table + r_type;
a85d7ed0 2363 r_symndx = ELF64_R_SYM (rel->r_info);
5236c819 2364
a85d7ed0
NC
2365 h = NULL;
2366 sym = NULL;
2367 sec = NULL;
b34976b6 2368 unresolved_reloc = FALSE;
a85d7ed0
NC
2369 if (r_symndx < symtab_hdr->sh_info)
2370 {
2371 sym = local_syms + r_symndx;
2372 sec = local_sections[r_symndx];
470b557a
AK
2373
2374 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2375 {
2376 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2377 if (local_plt == NULL)
2378 return FALSE;
2379
2380 /* Address of the PLT slot. */
2381 relocation = (htab->elf.iplt->output_section->vma
2382 + htab->elf.iplt->output_offset
2383 + local_plt[r_symndx].plt.offset);
2384
2385 switch (r_type)
2386 {
31db78f6
AK
2387 case R_390_PLTOFF16:
2388 case R_390_PLTOFF32:
2389 case R_390_PLTOFF64:
2390 relocation -= htab->elf.sgot->output_section->vma;
2391 break;
470b557a
AK
2392 case R_390_GOTPLT12:
2393 case R_390_GOTPLT16:
2394 case R_390_GOTPLT20:
2395 case R_390_GOTPLT32:
2396 case R_390_GOTPLT64:
2397 case R_390_GOTPLTENT:
2398 case R_390_GOT12:
2399 case R_390_GOT16:
2400 case R_390_GOT20:
2401 case R_390_GOT32:
2402 case R_390_GOT64:
2403 case R_390_GOTENT:
2404 {
2405 /* Write the PLT slot address into the GOT slot. */
2406 bfd_put_64 (output_bfd, relocation,
2407 htab->elf.sgot->contents +
2408 local_got_offsets[r_symndx]);
2409 relocation = (local_got_offsets[r_symndx] +
2410 htab->elf.sgot->output_offset);
2411
2412 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2413 relocation += htab->elf.sgot->output_section->vma;
2414 break;
2415 }
2416 default:
2417 break;
2418 }
2419 /* The output section is needed later in
2420 finish_dynamic_section when creating the dynamic
2421 relocation. */
2422 local_plt[r_symndx].sec = sec;
2423 goto do_relocation;
2424 }
2425 else
2426 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a85d7ed0
NC
2427 }
2428 else
2429 {
560e09e9 2430 bfd_boolean warned ATTRIBUTE_UNUSED;
62d887d4 2431 bfd_boolean ignored ATTRIBUTE_UNUSED;
0451c93c 2432
b2a8e766
AM
2433 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2434 r_symndx, symtab_hdr, sym_hashes,
2435 h, sec, relocation,
62d887d4 2436 unresolved_reloc, warned, ignored);
a85d7ed0
NC
2437 }
2438
dbaa2011 2439 if (sec != NULL && discarded_section (sec))
e4067dbb 2440 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2441 rel, 1, relend, howto, 0, contents);
ab96bf03 2442
0e1862bb 2443 if (bfd_link_relocatable (info))
ab96bf03
AM
2444 continue;
2445
a85d7ed0
NC
2446 switch (r_type)
2447 {
5236c819
MS
2448 case R_390_GOTPLT12:
2449 case R_390_GOTPLT16:
bd1ea41b 2450 case R_390_GOTPLT20:
5236c819
MS
2451 case R_390_GOTPLT32:
2452 case R_390_GOTPLT64:
2453 case R_390_GOTPLTENT:
2454 /* There are three cases for a GOTPLT relocation. 1) The
2455 relocation is against the jump slot entry of a plt that
2456 will get emitted to the output file. 2) The relocation
2457 is against the jump slot of a plt entry that has been
2458 removed. elf_s390_adjust_gotplt has created a GOT entry
2459 as replacement. 3) The relocation is against a local symbol.
2460 Cases 2) and 3) are the same as the GOT relocation code
2461 so we just have to test for case 1 and fall through for
2462 the other two. */
2463 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2464 {
2465 bfd_vma plt_index;
2466
470b557a
AK
2467 if (s390_is_ifunc_symbol_p (h))
2468 {
2469 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2470 relocation = (plt_index * GOT_ENTRY_SIZE +
2471 htab->elf.igotplt->output_offset);
2472 if (r_type == R_390_GOTPLTENT)
2473 relocation += htab->elf.igotplt->output_section->vma;
2474 }
2475 else
2476 {
2477 /* Calc. index no.
2478 Current offset - size first entry / entry size. */
2479 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2480 PLT_ENTRY_SIZE;
2481
2482 /* Offset in GOT is PLT index plus GOT headers(3)
3b67f094 2483 times 8, addr & GOT addr. */
470b557a
AK
2484 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2485 if (r_type == R_390_GOTPLTENT)
2486 relocation += htab->elf.sgot->output_section->vma;
2487 }
5236c819 2488 unresolved_reloc = FALSE;
5236c819
MS
2489 break;
2490 }
2491 /* Fall through. */
2492
947216bf
AM
2493 case R_390_GOT12:
2494 case R_390_GOT16:
bd1ea41b 2495 case R_390_GOT20:
947216bf
AM
2496 case R_390_GOT32:
2497 case R_390_GOT64:
2498 case R_390_GOTENT:
2499 /* Relocation is to the entry for this symbol in the global
2500 offset table. */
470b557a 2501 if (base_got == NULL)
0451c93c 2502 abort ();
a85d7ed0 2503
947216bf
AM
2504 if (h != NULL)
2505 {
b34976b6 2506 bfd_boolean dyn;
a85d7ed0 2507
947216bf 2508 off = h->got.offset;
0451c93c 2509 dyn = htab->elf.dynamic_sections_created;
470b557a
AK
2510
2511 if (s390_is_ifunc_symbol_p (h))
2512 {
2513 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2514 if (off == (bfd_vma)-1)
2515 {
2516 /* No explicit GOT usage so redirect to the
2517 got.iplt slot. */
2518 base_got = htab->elf.igotplt;
2519 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2520 }
2521 else
2522 {
2523 /* Explicit GOT slots must contain the address
2524 of the PLT slot. This will be handled in
2525 finish_dynamic_symbol. */
2526 }
2527 }
0e1862bb
L
2528 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2529 bfd_link_pic (info),
2530 h)
2531 || (bfd_link_pic (info)
470b557a
AK
2532 && SYMBOL_REFERENCES_LOCAL (info, h))
2533 || (ELF_ST_VISIBILITY (h->other)
2534 && h->root.type == bfd_link_hash_undefweak))
947216bf
AM
2535 {
2536 /* This is actually a static link, or it is a
2537 -Bsymbolic link and the symbol is defined
2538 locally, or the symbol was forced to be local
2539 because of a version file. We must initialize
2540 this entry in the global offset table. Since the
2541 offset must always be a multiple of 2, we use the
2542 least significant bit to record whether we have
2543 initialized it already.
2544
2545 When doing a dynamic link, we create a .rel.got
2546 relocation entry to initialize the value. This
2547 is done in the finish_dynamic_symbol routine. */
2548 if ((off & 1) != 0)
2549 off &= ~1;
2550 else
2551 {
a85d7ed0 2552 bfd_put_64 (output_bfd, relocation,
470b557a 2553 base_got->contents + off);
947216bf
AM
2554 h->got.offset |= 1;
2555 }
a63cc5f7
AK
2556
2557 if ((h->def_regular
0e1862bb 2558 && bfd_link_pic (info)
a63cc5f7
AK
2559 && SYMBOL_REFERENCES_LOCAL (info, h))
2560 /* lgrl rx,sym@GOTENT -> larl rx, sym */
2561 && ((r_type == R_390_GOTENT
2562 && (bfd_get_16 (input_bfd,
2563 contents + rel->r_offset - 2)
2564 & 0xff0f) == 0xc408)
2565 /* lg rx, sym@GOT(r12) -> larl rx, sym */
2566 || (r_type == R_390_GOT20
2567 && (bfd_get_32 (input_bfd,
2568 contents + rel->r_offset - 2)
2569 & 0xff00f000) == 0xe300c000
2570 && bfd_get_8 (input_bfd,
2571 contents + rel->r_offset + 3) == 0x04)))
2572
2573 {
2574 unsigned short new_insn =
2575 (0xc000 | (bfd_get_8 (input_bfd,
2576 contents + rel->r_offset - 1) & 0xf0));
2577 bfd_put_16 (output_bfd, new_insn,
2578 contents + rel->r_offset - 2);
2579 r_type = R_390_PC32DBL;
2580 rel->r_addend = 2;
2581 howto = elf_howto_table + r_type;
2582 relocation = h->root.u.def.value
2583 + h->root.u.def.section->output_section->vma
2584 + h->root.u.def.section->output_offset;
2585 goto do_relocation;
2586 }
947216bf 2587 }
0451c93c 2588 else
b34976b6 2589 unresolved_reloc = FALSE;
947216bf
AM
2590 }
2591 else
2592 {
0451c93c
MS
2593 if (local_got_offsets == NULL)
2594 abort ();
a85d7ed0 2595
947216bf 2596 off = local_got_offsets[r_symndx];
a85d7ed0 2597
947216bf
AM
2598 /* The offset must always be a multiple of 8. We use
2599 the least significant bit to record whether we have
2600 already generated the necessary reloc. */
2601 if ((off & 1) != 0)
2602 off &= ~1;
2603 else
2604 {
2605 bfd_put_64 (output_bfd, relocation,
f41345a7 2606 htab->elf.sgot->contents + off);
a85d7ed0 2607
0e1862bb 2608 if (bfd_link_pic (info))
947216bf
AM
2609 {
2610 asection *s;
2611 Elf_Internal_Rela outrel;
2612 bfd_byte *loc;
a85d7ed0 2613
f41345a7 2614 s = htab->elf.srelgot;
947216bf 2615 if (s == NULL)
0451c93c 2616 abort ();
a85d7ed0 2617
f41345a7
AK
2618 outrel.r_offset = (htab->elf.sgot->output_section->vma
2619 + htab->elf.sgot->output_offset
947216bf
AM
2620 + off);
2621 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
a85d7ed0 2622 outrel.r_addend = relocation;
947216bf
AM
2623 loc = s->contents;
2624 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2625 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2626 }
a85d7ed0 2627
947216bf
AM
2628 local_got_offsets[r_symndx] |= 1;
2629 }
2630 }
a85d7ed0 2631
0451c93c
MS
2632 if (off >= (bfd_vma) -2)
2633 abort ();
2634
470b557a 2635 relocation = base_got->output_offset + off;
0451c93c 2636
ae9a127f
NC
2637 /* For @GOTENT the relocation is against the offset between
2638 the instruction and the symbols entry in the GOT and not
2639 between the start of the GOT and the symbols entry. We
2640 add the vma of the GOT to get the correct value. */
5236c819
MS
2641 if ( r_type == R_390_GOTENT
2642 || r_type == R_390_GOTPLTENT)
470b557a 2643 relocation += base_got->output_section->vma;
a85d7ed0 2644
947216bf 2645 break;
99c79b2e 2646
5236c819
MS
2647 case R_390_GOTOFF16:
2648 case R_390_GOTOFF32:
2649 case R_390_GOTOFF64:
947216bf
AM
2650 /* Relocation is relative to the start of the global offset
2651 table. */
a85d7ed0 2652
d47b13e0
AK
2653 if (h != NULL
2654 && s390_is_ifunc_symbol_p (h)
2655 && h->def_regular
2656 && !bfd_link_executable (info))
2657 {
2658 relocation = (htab->elf.iplt->output_section->vma
2659 + htab->elf.iplt->output_offset
2660 + h->plt.offset
2661 - htab->elf.sgot->output_section->vma);
2662 goto do_relocation;
2663 }
2664
947216bf
AM
2665 /* Note that sgot->output_offset is not involved in this
2666 calculation. We always want the start of .got. If we
2667 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2668 permitted by the ABI, we might have to change this
2669 calculation. */
f41345a7 2670 relocation -= htab->elf.sgot->output_section->vma;
947216bf 2671 break;
a85d7ed0 2672
947216bf 2673 case R_390_GOTPC:
a85d7ed0 2674 case R_390_GOTPCDBL:
947216bf 2675 /* Use global offset table as symbol value. */
f41345a7 2676 relocation = htab->elf.sgot->output_section->vma;
b34976b6 2677 unresolved_reloc = FALSE;
947216bf 2678 break;
a85d7ed0 2679
fb798c50 2680 case R_390_PLT12DBL:
947216bf 2681 case R_390_PLT16DBL:
fb798c50 2682 case R_390_PLT24DBL:
947216bf
AM
2683 case R_390_PLT32:
2684 case R_390_PLT32DBL:
2685 case R_390_PLT64:
2686 /* Relocation is to the entry for this symbol in the
2687 procedure linkage table. */
a85d7ed0 2688
947216bf
AM
2689 /* Resolve a PLT32 reloc against a local symbol directly,
2690 without using the procedure linkage table. */
2691 if (h == NULL)
2692 break;
a85d7ed0 2693
947216bf 2694 if (h->plt.offset == (bfd_vma) -1
31db78f6 2695 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
947216bf
AM
2696 {
2697 /* We didn't make a PLT entry for this symbol. This
2698 happens when statically linking PIC code, or when
2699 using -Bsymbolic. */
2700 break;
2701 }
470b557a
AK
2702 if (s390_is_ifunc_symbol_p (h))
2703 relocation = (htab->elf.iplt->output_section->vma
2704 + htab->elf.iplt->output_offset
2705 + h->plt.offset);
2706 else
2707 relocation = (htab->elf.splt->output_section->vma
2708 + htab->elf.splt->output_offset
2709 + h->plt.offset);
b34976b6 2710 unresolved_reloc = FALSE;
26e41594 2711 break;
5236c819
MS
2712
2713 case R_390_PLTOFF16:
2714 case R_390_PLTOFF32:
2715 case R_390_PLTOFF64:
26e41594
AM
2716 /* Relocation is to the entry for this symbol in the
2717 procedure linkage table relative to the start of the GOT. */
5236c819
MS
2718
2719 /* For local symbols or if we didn't make a PLT entry for
2720 this symbol resolve the symbol directly. */
31db78f6 2721 if (h == NULL
5236c819 2722 || h->plt.offset == (bfd_vma) -1
31db78f6 2723 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
5236c819 2724 {
f41345a7 2725 relocation -= htab->elf.sgot->output_section->vma;
5236c819
MS
2726 break;
2727 }
2728
470b557a
AK
2729 if (s390_is_ifunc_symbol_p (h))
2730 relocation = (htab->elf.iplt->output_section->vma
2731 + htab->elf.iplt->output_offset
2732 + h->plt.offset
2733 - htab->elf.sgot->output_section->vma);
2734 else
2735 relocation = (htab->elf.splt->output_section->vma
2736 + htab->elf.splt->output_offset
2737 + h->plt.offset
2738 - htab->elf.sgot->output_section->vma);
5236c819 2739 unresolved_reloc = FALSE;
947216bf
AM
2740 break;
2741
947216bf 2742 case R_390_PC16:
fb798c50 2743 case R_390_PC12DBL:
947216bf 2744 case R_390_PC16DBL:
fb798c50 2745 case R_390_PC24DBL:
947216bf 2746 case R_390_PC32:
a85d7ed0 2747 case R_390_PC32DBL:
947216bf 2748 case R_390_PC64:
99ba5125
AK
2749 /* The target of these relocs are instruction operands
2750 residing in read-only sections. We cannot emit a runtime
2751 reloc for it. */
2752 if (h != NULL
2753 && s390_is_ifunc_symbol_p (h)
2754 && h->def_regular
2755 && bfd_link_pic (info))
2756 {
2757 relocation = (htab->elf.iplt->output_section->vma
2758 + htab->elf.iplt->output_offset
2759 + h->plt.offset);
2760 goto do_relocation;
2761 }
2762
2763 case R_390_8:
2764 case R_390_16:
2765 case R_390_32:
2766 case R_390_64:
470b557a
AK
2767
2768 if (h != NULL
2769 && s390_is_ifunc_symbol_p (h)
2770 && h->def_regular)
2771 {
0e1862bb 2772 if (!bfd_link_pic (info) || !h->non_got_ref)
470b557a
AK
2773 {
2774 /* For a non-shared object STT_GNU_IFUNC symbol must
2775 go through PLT. */
2776 relocation = (htab->elf.iplt->output_section->vma
2777 + htab->elf.iplt->output_offset
2778 + h ->plt.offset);
2779 goto do_relocation;
2780 }
2781 else
2782 {
2783 /* For shared objects a runtime relocation is needed. */
2784
2785 Elf_Internal_Rela outrel;
2786 asection *sreloc;
2787
2788 /* Need a dynamic relocation to get the real function
2789 address. */
2790 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2791 info,
2792 input_section,
2793 rel->r_offset);
2794 if (outrel.r_offset == (bfd_vma) -1
2795 || outrel.r_offset == (bfd_vma) -2)
2796 abort ();
2797
2798 outrel.r_offset += (input_section->output_section->vma
2799 + input_section->output_offset);
2800
2801 if (h->dynindx == -1
2802 || h->forced_local
0e1862bb 2803 || bfd_link_executable (info))
470b557a
AK
2804 {
2805 /* This symbol is resolved locally. */
2806 outrel.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
2807 outrel.r_addend = (h->root.u.def.value
2808 + h->root.u.def.section->output_section->vma
2809 + h->root.u.def.section->output_offset);
2810 }
2811 else
2812 {
2813 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2814 outrel.r_addend = 0;
2815 }
2816
2817 sreloc = htab->elf.irelifunc;
2818 elf_append_rela (output_bfd, sreloc, &outrel);
2819
2820 /* If this reloc is against an external symbol, we
2821 do not want to fiddle with the addend. Otherwise,
2822 we need to include the symbol value so that it
2823 becomes an addend for the dynamic reloc. For an
2824 internal symbol, we have updated addend. */
2825 continue;
2826 }
2827 }
2828
b1e24c02 2829 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
2830 break;
2831
0e1862bb 2832 if ((bfd_link_pic (info)
82058a73
MS
2833 && (h == NULL
2834 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2835 || h->root.type != bfd_link_hash_undefweak)
0451c93c 2836 && ((r_type != R_390_PC16
fb798c50 2837 && r_type != R_390_PC12DBL
0451c93c 2838 && r_type != R_390_PC16DBL
fb798c50 2839 && r_type != R_390_PC24DBL
0451c93c
MS
2840 && r_type != R_390_PC32
2841 && r_type != R_390_PC32DBL
2842 && r_type != R_390_PC64)
8c21ca21 2843 || !SYMBOL_CALLS_LOCAL (info, h)))
64285810 2844 || (ELIMINATE_COPY_RELOCS
0e1862bb 2845 && !bfd_link_pic (info)
0451c93c
MS
2846 && h != NULL
2847 && h->dynindx != -1
f5385ebf
AM
2848 && !h->non_got_ref
2849 && ((h->def_dynamic
2850 && !h->def_regular)
0451c93c
MS
2851 || h->root.type == bfd_link_hash_undefweak
2852 || h->root.type == bfd_link_hash_undefined)))
947216bf
AM
2853 {
2854 Elf_Internal_Rela outrel;
b34976b6 2855 bfd_boolean skip, relocate;
0451c93c 2856 asection *sreloc;
947216bf 2857 bfd_byte *loc;
a85d7ed0 2858
947216bf
AM
2859 /* When generating a shared object, these relocations
2860 are copied into the output file to be resolved at run
2861 time. */
b34976b6
AM
2862 skip = FALSE;
2863 relocate = FALSE;
a85d7ed0 2864
c629eae0
JJ
2865 outrel.r_offset =
2866 _bfd_elf_section_offset (output_bfd, info, input_section,
2867 rel->r_offset);
2868 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2869 skip = TRUE;
0bb2d96a 2870 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2871 skip = TRUE, relocate = TRUE;
a85d7ed0 2872
947216bf
AM
2873 outrel.r_offset += (input_section->output_section->vma
2874 + input_section->output_offset);
a85d7ed0 2875
947216bf 2876 if (skip)
0bb2d96a 2877 memset (&outrel, 0, sizeof outrel);
947216bf 2878 else if (h != NULL
0451c93c
MS
2879 && h->dynindx != -1
2880 && (r_type == R_390_PC16
fb798c50 2881 || r_type == R_390_PC12DBL
0451c93c 2882 || r_type == R_390_PC16DBL
fb798c50 2883 || r_type == R_390_PC24DBL
0451c93c
MS
2884 || r_type == R_390_PC32
2885 || r_type == R_390_PC32DBL
2886 || r_type == R_390_PC64
0e1862bb 2887 || !bfd_link_pic (info)
8c21ca21 2888 || !SYMBOLIC_BIND (info, h)
f5385ebf 2889 || !h->def_regular))
947216bf
AM
2890 {
2891 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
27018c3f 2892 outrel.r_addend = rel->r_addend;
947216bf
AM
2893 }
2894 else
2895 {
0451c93c 2896 /* This symbol is local, or marked to become local. */
90ced0dd 2897 outrel.r_addend = relocation + rel->r_addend;
b5727d75
MS
2898 if (r_type == R_390_64)
2899 {
2900 relocate = TRUE;
2901 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
b5727d75
MS
2902 }
2903 else
2904 {
2905 long sindx;
2906
90ced0dd 2907 if (bfd_is_abs_section (sec))
b5727d75
MS
2908 sindx = 0;
2909 else if (sec == NULL || sec->owner == NULL)
2910 {
2911 bfd_set_error(bfd_error_bad_value);
2912 return FALSE;
2913 }
2914 else
2915 {
2916 asection *osec;
2917
2918 osec = sec->output_section;
2919 sindx = elf_section_data (osec)->dynindx;
74541ad4
AM
2920
2921 if (sindx == 0)
2922 {
2923 osec = htab->elf.text_index_section;
2924 sindx = elf_section_data (osec)->dynindx;
2925 }
2926 BFD_ASSERT (sindx != 0);
90ced0dd
MS
2927
2928 /* We are turning this relocation into one
2929 against a section symbol, so subtract out
2930 the output section's address but not the
2931 offset of the input section in the output
2932 section. */
90ced0dd 2933 outrel.r_addend -= osec->vma;
b5727d75
MS
2934 }
2935 outrel.r_info = ELF64_R_INFO (sindx, r_type);
b5727d75 2936 }
0451c93c 2937 }
a85d7ed0 2938
0451c93c
MS
2939 sreloc = elf_section_data (input_section)->sreloc;
2940 if (sreloc == NULL)
2941 abort ();
2942
947216bf
AM
2943 loc = sreloc->contents;
2944 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2945 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
a85d7ed0 2946
947216bf
AM
2947 /* If this reloc is against an external symbol, we do
2948 not want to fiddle with the addend. Otherwise, we
2949 need to include the symbol value so that it becomes
2950 an addend for the dynamic reloc. */
2951 if (! relocate)
2952 continue;
2953 }
a85d7ed0 2954
947216bf 2955 break;
a85d7ed0 2956
69fc87f1
MS
2957 /* Relocations for tls literal pool entries. */
2958 case R_390_TLS_IE64:
0e1862bb 2959 if (bfd_link_pic (info))
69fc87f1
MS
2960 {
2961 Elf_Internal_Rela outrel;
2962 asection *sreloc;
2963 bfd_byte *loc;
2964
2965 outrel.r_offset = rel->r_offset
2966 + input_section->output_section->vma
2967 + input_section->output_offset;
2968 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2969 sreloc = elf_section_data (input_section)->sreloc;
2970 if (sreloc == NULL)
2971 abort ();
2972 loc = sreloc->contents;
2973 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2974 bfd_elf64_swap_reloc_out (output_bfd, &outrel, loc);
2975 }
ae9a127f 2976 /* Fall through. */
69fc87f1
MS
2977
2978 case R_390_TLS_GD64:
2979 case R_390_TLS_GOTIE64:
2980 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2981 tls_type = GOT_UNKNOWN;
2982 if (h == NULL && local_got_offsets)
2983 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2984 else if (h != NULL)
2985 {
2986 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb 2987 if (!bfd_link_pic (info) && h->dynindx == -1 && tls_type >= GOT_TLS_IE)
69fc87f1
MS
2988 r_type = R_390_TLS_LE64;
2989 }
2990 if (r_type == R_390_TLS_GD64 && tls_type >= GOT_TLS_IE)
2991 r_type = R_390_TLS_IE64;
2992
2993 if (r_type == R_390_TLS_LE64)
2994 {
2995 /* This relocation gets optimized away by the local exec
2996 access optimization. */
2997 BFD_ASSERT (! unresolved_reloc);
2998 bfd_put_64 (output_bfd, -tpoff (info, relocation),
2999 contents + rel->r_offset);
3000 continue;
3001 }
3002
f41345a7 3003 if (htab->elf.sgot == NULL)
69fc87f1
MS
3004 abort ();
3005
3006 if (h != NULL)
3007 off = h->got.offset;
3008 else
3009 {
3010 if (local_got_offsets == NULL)
3011 abort ();
3012
3013 off = local_got_offsets[r_symndx];
3014 }
3015
3016 emit_tls_relocs:
3017
3018 if ((off & 1) != 0)
3019 off &= ~1;
26e41594 3020 else
69fc87f1
MS
3021 {
3022 Elf_Internal_Rela outrel;
3023 bfd_byte *loc;
3024 int dr_type, indx;
3025
f41345a7 3026 if (htab->elf.srelgot == NULL)
69fc87f1
MS
3027 abort ();
3028
f41345a7
AK
3029 outrel.r_offset = (htab->elf.sgot->output_section->vma
3030 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
3031
3032 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3033 if (r_type == R_390_TLS_GD64)
3034 dr_type = R_390_TLS_DTPMOD;
3035 else
3036 dr_type = R_390_TLS_TPOFF;
3037 if (dr_type == R_390_TLS_TPOFF && indx == 0)
3038 outrel.r_addend = relocation - dtpoff_base (info);
3039 else
3040 outrel.r_addend = 0;
3041 outrel.r_info = ELF64_R_INFO (indx, dr_type);
f41345a7
AK
3042 loc = htab->elf.srelgot->contents;
3043 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
3044 * sizeof (Elf64_External_Rela);
3045 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3046
3047 if (r_type == R_390_TLS_GD64)
3048 {
3049 if (indx == 0)
3050 {
3051 BFD_ASSERT (! unresolved_reloc);
3052 bfd_put_64 (output_bfd,
3053 relocation - dtpoff_base (info),
f41345a7 3054 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
3055 }
3056 else
3057 {
3058 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_DTPOFF);
3059 outrel.r_offset += GOT_ENTRY_SIZE;
3060 outrel.r_addend = 0;
f41345a7 3061 htab->elf.srelgot->reloc_count++;
69fc87f1
MS
3062 loc += sizeof (Elf64_External_Rela);
3063 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3064 }
3065 }
3066
3067 if (h != NULL)
3068 h->got.offset |= 1;
3069 else
3070 local_got_offsets[r_symndx] |= 1;
3071 }
3072
3073 if (off >= (bfd_vma) -2)
3074 abort ();
3075 if (r_type == ELF64_R_TYPE (rel->r_info))
3076 {
f41345a7 3077 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 3078 if (r_type == R_390_TLS_IE64 || r_type == R_390_TLS_IEENT)
f41345a7 3079 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
3080 unresolved_reloc = FALSE;
3081 }
3082 else
3083 {
f41345a7 3084 bfd_put_64 (output_bfd, htab->elf.sgot->output_offset + off,
69fc87f1
MS
3085 contents + rel->r_offset);
3086 continue;
3087 }
3088 break;
3089
3090 case R_390_TLS_GOTIE12:
bd1ea41b 3091 case R_390_TLS_GOTIE20:
69fc87f1
MS
3092 case R_390_TLS_IEENT:
3093 if (h == NULL)
3094 {
3095 if (local_got_offsets == NULL)
3096 abort();
3097 off = local_got_offsets[r_symndx];
0e1862bb 3098 if (bfd_link_pic (info))
69fc87f1
MS
3099 goto emit_tls_relocs;
3100 }
3101 else
3102 {
3103 off = h->got.offset;
3104 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb 3105 if (bfd_link_pic (info) || h->dynindx != -1 || tls_type < GOT_TLS_IE)
69fc87f1
MS
3106 goto emit_tls_relocs;
3107 }
3108
f41345a7 3109 if (htab->elf.sgot == NULL)
69fc87f1
MS
3110 abort ();
3111
3112 BFD_ASSERT (! unresolved_reloc);
3113 bfd_put_64 (output_bfd, -tpoff (info, relocation),
f41345a7
AK
3114 htab->elf.sgot->contents + off);
3115 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 3116 if (r_type == R_390_TLS_IEENT)
f41345a7 3117 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
3118 unresolved_reloc = FALSE;
3119 break;
3120
3121 case R_390_TLS_LDM64:
0e1862bb 3122 if (! bfd_link_pic (info))
69fc87f1
MS
3123 /* The literal pool entry this relocation refers to gets ignored
3124 by the optimized code of the local exec model. Do nothing
3125 and the value will turn out zero. */
3126 continue;
3127
f41345a7 3128 if (htab->elf.sgot == NULL)
69fc87f1
MS
3129 abort ();
3130
3131 off = htab->tls_ldm_got.offset;
3132 if (off & 1)
3133 off &= ~1;
3134 else
3135 {
3136 Elf_Internal_Rela outrel;
3137 bfd_byte *loc;
3138
f41345a7 3139 if (htab->elf.srelgot == NULL)
69fc87f1
MS
3140 abort ();
3141
f41345a7
AK
3142 outrel.r_offset = (htab->elf.sgot->output_section->vma
3143 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
3144
3145 bfd_put_64 (output_bfd, 0,
f41345a7 3146 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
3147 outrel.r_info = ELF64_R_INFO (0, R_390_TLS_DTPMOD);
3148 outrel.r_addend = 0;
f41345a7
AK
3149 loc = htab->elf.srelgot->contents;
3150 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
3151 * sizeof (Elf64_External_Rela);
3152 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3153 htab->tls_ldm_got.offset |= 1;
3154 }
f41345a7 3155 relocation = htab->elf.sgot->output_offset + off;
26e41594 3156 unresolved_reloc = FALSE;
69fc87f1
MS
3157 break;
3158
3159 case R_390_TLS_LE64:
3cbc1e5e 3160 if (bfd_link_dll (info))
69fc87f1
MS
3161 {
3162 /* Linking a shared library with non-fpic code requires
3163 a R_390_TLS_TPOFF relocation. */
3164 Elf_Internal_Rela outrel;
3165 asection *sreloc;
3166 bfd_byte *loc;
3167 int indx;
3168
3169 outrel.r_offset = rel->r_offset
3170 + input_section->output_section->vma
3171 + input_section->output_offset;
3172 if (h != NULL && h->dynindx != -1)
3173 indx = h->dynindx;
3174 else
3175 indx = 0;
3176 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_TPOFF);
3177 if (indx == 0)
3178 outrel.r_addend = relocation - dtpoff_base (info);
3179 else
3180 outrel.r_addend = 0;
3181 sreloc = elf_section_data (input_section)->sreloc;
3182 if (sreloc == NULL)
3183 abort ();
3184 loc = sreloc->contents;
3185 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
3186 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3187 }
3188 else
3189 {
3190 BFD_ASSERT (! unresolved_reloc);
3191 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3192 contents + rel->r_offset);
3193 }
3194 continue;
3195
3196 case R_390_TLS_LDO64:
0e1862bb 3197 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
69fc87f1
MS
3198 relocation -= dtpoff_base (info);
3199 else
3200 /* When converting LDO to LE, we must negate. */
3201 relocation = -tpoff (info, relocation);
3202 break;
3203
3204 /* Relocations for tls instructions. */
3205 case R_390_TLS_LOAD:
3206 case R_390_TLS_GDCALL:
3207 case R_390_TLS_LDCALL:
3208 tls_type = GOT_UNKNOWN;
3209 if (h == NULL && local_got_offsets)
3210 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3211 else if (h != NULL)
3212 tls_type = elf_s390_hash_entry(h)->tls_type;
3213
3214 if (tls_type == GOT_TLS_GD)
3215 continue;
3216
3217 if (r_type == R_390_TLS_LOAD)
3218 {
0e1862bb 3219 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3220 {
3221 /* IE->LE transition. Four valid cases:
3222 lg %rx,(0,%ry) -> sllg %rx,%ry,0
3223 lg %rx,(%ry,0) -> sllg %rx,%ry,0
3224 lg %rx,(%ry,%r12) -> sllg %rx,%ry,0
3225 lg %rx,(%r12,%ry) -> sllg %rx,%ry,0 */
3226 unsigned int insn0, insn1, ry;
3227
3228 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3229 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3230 if (insn1 != 0x0004)
3231 invalid_tls_insn (input_bfd, input_section, rel);
3232 ry = 0;
3233 if ((insn0 & 0xff00f000) == 0xe3000000)
3234 /* lg %rx,0(%ry,0) -> sllg %rx,%ry,0 */
3235 ry = (insn0 & 0x000f0000);
3236 else if ((insn0 & 0xff0f0000) == 0xe3000000)
3237 /* lg %rx,0(0,%ry) -> sllg %rx,%ry,0 */
3238 ry = (insn0 & 0x0000f000) << 4;
3239 else if ((insn0 & 0xff00f000) == 0xe300c000)
3240 /* lg %rx,0(%ry,%r12) -> sllg %rx,%ry,0 */
3241 ry = (insn0 & 0x000f0000);
3242 else if ((insn0 & 0xff0f0000) == 0xe30c0000)
3243 /* lg %rx,0(%r12,%ry) -> sllg %rx,%ry,0 */
3244 ry = (insn0 & 0x0000f000) << 4;
3245 else
3246 invalid_tls_insn (input_bfd, input_section, rel);
3247 insn0 = 0xeb000000 | (insn0 & 0x00f00000) | ry;
3248 insn1 = 0x000d;
3249 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3250 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3251 }
3252 }
3253 else if (r_type == R_390_TLS_GDCALL)
3254 {
3255 unsigned int insn0, insn1;
3256
3257 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3258 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3259 if ((insn0 & 0xffff0000) != 0xc0e50000)
3260 invalid_tls_insn (input_bfd, input_section, rel);
0e1862bb 3261 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3262 {
3263 /* GD->LE transition.
3264 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3265 insn0 = 0xc0040000;
3266 insn1 = 0x0000;
3267 }
3268 else
3269 {
3270 /* GD->IE transition.
3271 brasl %r14,__tls_get_addr@plt -> lg %r2,0(%r2,%r12) */
3272 insn0 = 0xe322c000;
3273 insn1 = 0x0004;
3274 }
3275 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3276 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3277 }
3278 else if (r_type == R_390_TLS_LDCALL)
3279 {
0e1862bb 3280 if (!bfd_link_pic (info))
69fc87f1
MS
3281 {
3282 unsigned int insn0, insn1;
3283
3284 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3285 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3286 if ((insn0 & 0xffff0000) != 0xc0e50000)
3287 invalid_tls_insn (input_bfd, input_section, rel);
3288 /* LD->LE transition.
3289 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3290 insn0 = 0xc0040000;
3291 insn1 = 0x0000;
3292 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3293 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3294 }
3295 }
3296 continue;
3297
947216bf
AM
3298 default:
3299 break;
3300 }
a85d7ed0 3301
239e1f3a
AM
3302 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3303 because such sections are not SEC_ALLOC and thus ld.so will
3304 not process them. */
0451c93c 3305 if (unresolved_reloc
239e1f3a 3306 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3307 && h->def_dynamic)
3308 && _bfd_elf_section_offset (output_bfd, info, input_section,
3309 rel->r_offset) != (bfd_vma) -1)
0451c93c 3310 (*_bfd_error_handler)
843fe662 3311 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
d003868e
AM
3312 input_bfd,
3313 input_section,
0451c93c 3314 (long) rel->r_offset,
843fe662 3315 howto->name,
0451c93c
MS
3316 h->root.root.string);
3317
470b557a
AK
3318 do_relocation:
3319
fb798c50
AK
3320 /* When applying a 24 bit reloc we need to start one byte
3321 earlier. Otherwise the 32 bit get/put bfd operations might
3322 access a byte after the actual section. */
3323 if (r_type == R_390_PC24DBL
3324 || r_type == R_390_PLT24DBL)
3325 rel->r_offset--;
3326
bd1ea41b
MS
3327 if (r_type == R_390_20
3328 || r_type == R_390_GOT20
3329 || r_type == R_390_GOTPLT20
3330 || r_type == R_390_TLS_GOTIE20)
3331 {
3332 relocation += rel->r_addend;
3333 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3334 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3335 contents, rel->r_offset,
3336 relocation, 0);
3337 }
3338 else
3339 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
a85d7ed0
NC
3340 contents, rel->r_offset,
3341 relocation, rel->r_addend);
3342
3343 if (r != bfd_reloc_ok)
3344 {
0451c93c 3345 const char *name;
ec338859 3346
0451c93c
MS
3347 if (h != NULL)
3348 name = h->root.root.string;
3349 else
a85d7ed0 3350 {
0451c93c
MS
3351 name = bfd_elf_string_from_elf_section (input_bfd,
3352 symtab_hdr->sh_link,
3353 sym->st_name);
3354 if (name == NULL)
b34976b6 3355 return FALSE;
0451c93c
MS
3356 if (*name == '\0')
3357 name = bfd_section_name (input_bfd, sec);
3358 }
ec338859 3359
0451c93c 3360 if (r == bfd_reloc_overflow)
1a72702b
AM
3361 (*info->callbacks->reloc_overflow)
3362 (info, (h ? &h->root : NULL), name, howto->name,
3363 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
0451c93c
MS
3364 else
3365 {
3366 (*_bfd_error_handler)
d003868e
AM
3367 (_("%B(%A+0x%lx): reloc against `%s': error %d"),
3368 input_bfd, input_section,
0451c93c 3369 (long) rel->r_offset, name, (int) r);
b34976b6 3370 return FALSE;
a85d7ed0
NC
3371 }
3372 }
3373 }
3374
b34976b6 3375 return TRUE;
a85d7ed0
NC
3376}
3377
470b557a
AK
3378/* Generate the PLT slots together with the dynamic relocations needed
3379 for IFUNC symbols. */
3380
3381static void
3382elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3383 struct bfd_link_info *info,
3384 struct elf_link_hash_entry *h,
3385 struct elf_s390_link_hash_table *htab,
3386 bfd_vma plt_offset,
3387 bfd_vma resolver_address)
3388{
3389 bfd_vma plt_index;
3390 bfd_vma got_offset;
3391 Elf_Internal_Rela rela;
3392 bfd_byte *loc;
3393 asection *plt, *gotplt, *relplt;
3394
3395 if (htab->elf.iplt == NULL
3396 || htab->elf.igotplt == NULL
3397 || htab->elf.irelplt == NULL)
3398 abort ();
3399
3400 /* Index of the PLT slot within iplt section. */
3401 plt_index = plt_offset / PLT_ENTRY_SIZE;
3402 plt = htab->elf.iplt;
3403 /* Offset into the igot.plt section. */
3404 got_offset = plt_index * GOT_ENTRY_SIZE;
3405 gotplt = htab->elf.igotplt;
3406 relplt = htab->elf.irelplt;
3407
3408 /* Fill in the blueprint of a PLT. */
3409 memcpy (plt->contents + plt_offset, elf_s390x_plt_entry,
3410 PLT_ENTRY_SIZE);
3411
3412 /* Fixup the relative address to the GOT entry */
3413 bfd_put_32 (output_bfd,
3414 (gotplt->output_section->vma +
3415 gotplt->output_offset + got_offset
3416 - (plt->output_section->vma +
3417 plt->output_offset +
3418 plt_offset))/2,
3419 plt->contents + plt_offset + 2);
3420 /* Fixup the relative branch to PLT 0 */
3421 bfd_put_32 (output_bfd, - (plt->output_offset +
3422 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3423 plt->contents + plt_offset + 24);
3424 /* Fixup offset into .rela.plt section. */
3425 bfd_put_32 (output_bfd, relplt->output_offset +
3426 plt_index * sizeof (Elf64_External_Rela),
3427 plt->contents + plt_offset + 28);
3428
3429 /* Fill in the entry in the global offset table.
3430 Points to instruction after GOT offset. */
3431 bfd_put_64 (output_bfd,
3432 (plt->output_section->vma
3433 + plt->output_offset
3434 + plt_offset
3435 + 14),
3436 gotplt->contents + got_offset);
3437
3438 /* Fill in the entry in the .rela.plt section. */
3439 rela.r_offset = (gotplt->output_section->vma
3440 + gotplt->output_offset
3441 + got_offset);
3442
3443 if (!h
3444 || h->dynindx == -1
0e1862bb 3445 || ((bfd_link_executable (info)
470b557a
AK
3446 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3447 && h->def_regular))
3448 {
3449 /* The symbol can be locally resolved. */
3450 rela.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
3451 rela.r_addend = resolver_address;
3452 }
3453 else
3454 {
3455 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3456 rela.r_addend = 0;
3457 }
3458
3459 loc = relplt->contents + plt_index * sizeof (Elf64_External_Rela);
3460 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3461}
3462
3463
a85d7ed0
NC
3464/* Finish up dynamic symbol handling. We set the contents of various
3465 dynamic sections here. */
3466
b34976b6 3467static bfd_boolean
4dfe6ac6
NC
3468elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3469 struct bfd_link_info *info,
3470 struct elf_link_hash_entry *h,
3471 Elf_Internal_Sym *sym)
a85d7ed0 3472{
0451c93c 3473 struct elf_s390_link_hash_table *htab;
470b557a 3474 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
a85d7ed0 3475
0451c93c 3476 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
3477 if (htab == NULL)
3478 return FALSE;
a85d7ed0
NC
3479
3480 if (h->plt.offset != (bfd_vma) -1)
3481 {
a85d7ed0 3482 bfd_vma plt_index;
0451c93c
MS
3483 bfd_vma got_offset;
3484 Elf_Internal_Rela rela;
947216bf 3485 bfd_byte *loc;
a85d7ed0
NC
3486
3487 /* This symbol has an entry in the procedure linkage table. Set
947216bf 3488 it up. */
0a511368 3489 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
470b557a 3490 {
0a511368
AK
3491 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3492 htab, h->plt.offset,
3493 eh->ifunc_resolver_address +
3494 eh->ifunc_resolver_section->output_offset +
3495 eh->ifunc_resolver_section->output_section->vma);
3496
3497 /* Do not return yet. Handling of explicit GOT slots of
3498 IFUNC symbols is below. */
470b557a
AK
3499 }
3500 else
3501 {
3502 if (h->dynindx == -1
3503 || htab->elf.splt == NULL
3504 || htab->elf.sgotplt == NULL
3505 || htab->elf.srelplt == NULL)
3506 abort ();
a85d7ed0 3507
470b557a
AK
3508 /* Calc. index no.
3509 Current offset - size first entry / entry size. */
3510 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
a85d7ed0 3511
470b557a
AK
3512 /* Offset in GOT is PLT index plus GOT headers(3) times 8,
3513 addr & GOT addr. */
3514 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
a85d7ed0 3515
470b557a
AK
3516 /* Fill in the blueprint of a PLT. */
3517 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390x_plt_entry,
3518 PLT_ENTRY_SIZE);
3519
3520 /* Fixup the relative address to the GOT entry */
3521 bfd_put_32 (output_bfd,
3522 (htab->elf.sgotplt->output_section->vma +
3523 htab->elf.sgotplt->output_offset + got_offset
3524 - (htab->elf.splt->output_section->vma +
3525 htab->elf.splt->output_offset +
3526 h->plt.offset))/2,
3527 htab->elf.splt->contents + h->plt.offset + 2);
3528 /* Fixup the relative branch to PLT 0 */
3529 bfd_put_32 (output_bfd, - (PLT_FIRST_ENTRY_SIZE +
3530 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3531 htab->elf.splt->contents + h->plt.offset + 24);
3532 /* Fixup offset into .rela.plt section. */
3533 bfd_put_32 (output_bfd, plt_index * sizeof (Elf64_External_Rela),
3534 htab->elf.splt->contents + h->plt.offset + 28);
3535
3536 /* Fill in the entry in the global offset table.
3537 Points to instruction after GOT offset. */
3538 bfd_put_64 (output_bfd,
3539 (htab->elf.splt->output_section->vma
3540 + htab->elf.splt->output_offset
3541 + h->plt.offset
3542 + 14),
3543 htab->elf.sgotplt->contents + got_offset);
3544
3545 /* Fill in the entry in the .rela.plt section. */
3546 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3547 + htab->elf.sgotplt->output_offset
3548 + got_offset);
3549 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3550 rela.r_addend = 0;
3551 loc = htab->elf.srelplt->contents + plt_index *
3552 sizeof (Elf64_External_Rela);
3553 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3554
3555 if (!h->def_regular)
3556 {
3557 /* Mark the symbol as undefined, rather than as defined in
3558 the .plt section. Leave the value alone. This is a clue
3559 for the dynamic linker, to make function pointer
3560 comparisons work between an application and shared
3561 library. */
3562 sym->st_shndx = SHN_UNDEF;
3563 }
a85d7ed0
NC
3564 }
3565 }
3566
69fc87f1
MS
3567 if (h->got.offset != (bfd_vma) -1
3568 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3569 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3570 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
a85d7ed0 3571 {
a85d7ed0 3572 Elf_Internal_Rela rela;
947216bf 3573 bfd_byte *loc;
a85d7ed0
NC
3574
3575 /* This symbol has an entry in the global offset table. Set it
947216bf 3576 up. */
f41345a7 3577 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
0451c93c 3578 abort ();
a85d7ed0 3579
f41345a7
AK
3580 rela.r_offset = (htab->elf.sgot->output_section->vma
3581 + htab->elf.sgot->output_offset
dc810e39 3582 + (h->got.offset &~ (bfd_vma) 1));
a85d7ed0 3583
470b557a
AK
3584 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3585 {
0e1862bb 3586 if (bfd_link_pic (info))
470b557a
AK
3587 {
3588 /* An explicit GOT slot usage needs GLOB_DAT. If the
3589 symbol references local the implicit got.iplt slot
3590 will be used and the IRELATIVE reloc has been created
3591 above. */
3592 goto do_glob_dat;
3593 }
3594 else
3595 {
3596 /* For non-shared objects explicit GOT slots must be
3597 filled with the PLT slot address for pointer
3598 equality reasons. */
3599 bfd_put_64 (output_bfd, (htab->elf.iplt->output_section->vma
3600 + htab->elf.iplt->output_offset
3601 + h->plt.offset),
3602 htab->elf.sgot->contents + h->got.offset);
3603 return TRUE;
3604 }
3605 }
0e1862bb 3606 else if (bfd_link_pic (info)
ceada896 3607 && SYMBOL_REFERENCES_LOCAL (info, h))
947216bf 3608 {
470b557a
AK
3609 /* If this is a static link, or it is a -Bsymbolic link and
3610 the symbol is defined locally or was forced to be local
3611 because of a version file, we just want to emit a
3612 RELATIVE reloc. The entry in the global offset table
3613 will already have been initialized in the
3614 relocate_section function. */
8c21ca21
AK
3615 if (!h->def_regular)
3616 return FALSE;
0451c93c 3617 BFD_ASSERT((h->got.offset & 1) != 0);
947216bf
AM
3618 rela.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
3619 rela.r_addend = (h->root.u.def.value
3620 + h->root.u.def.section->output_section->vma
3621 + h->root.u.def.section->output_offset);
3622 }
a85d7ed0
NC
3623 else
3624 {
3625 BFD_ASSERT((h->got.offset & 1) == 0);
ceada896 3626 do_glob_dat:
f41345a7 3627 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
a85d7ed0 3628 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_GLOB_DAT);
947216bf
AM
3629 rela.r_addend = 0;
3630 }
a85d7ed0 3631
f41345a7
AK
3632 loc = htab->elf.srelgot->contents;
3633 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
0451c93c 3634 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3635 }
3636
f5385ebf 3637 if (h->needs_copy)
a85d7ed0 3638 {
a85d7ed0 3639 Elf_Internal_Rela rela;
947216bf 3640 bfd_byte *loc;
a85d7ed0
NC
3641
3642 /* This symbols needs a copy reloc. Set it up. */
3643
0451c93c
MS
3644 if (h->dynindx == -1
3645 || (h->root.type != bfd_link_hash_defined
3646 && h->root.type != bfd_link_hash_defweak)
3647 || htab->srelbss == NULL)
3648 abort ();
a85d7ed0
NC
3649
3650 rela.r_offset = (h->root.u.def.value
3651 + h->root.u.def.section->output_section->vma
3652 + h->root.u.def.section->output_offset);
3653 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_COPY);
3654 rela.r_addend = 0;
947216bf
AM
3655 loc = htab->srelbss->contents;
3656 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
0451c93c 3657 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3658 }
3659
3660 /* Mark some specially defined symbols as absolute. */
9637f6ef 3661 if (h == htab->elf.hdynamic
22edb2f1
RS
3662 || h == htab->elf.hgot
3663 || h == htab->elf.hplt)
a85d7ed0
NC
3664 sym->st_shndx = SHN_ABS;
3665
b34976b6 3666 return TRUE;
a85d7ed0
NC
3667}
3668
0451c93c
MS
3669/* Used to decide how to sort relocs in an optimal manner for the
3670 dynamic linker, before writing them out. */
3671
3672static enum elf_reloc_type_class
7e612e98
AM
3673elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3674 const asection *rel_sec ATTRIBUTE_UNUSED,
3675 const Elf_Internal_Rela *rela)
0451c93c 3676{
0f042c67
AK
3677 bfd *abfd = info->output_bfd;
3678 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3679 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3680 unsigned long r_symndx = ELF64_R_SYM (rela->r_info);
3681 Elf_Internal_Sym sym;
3682
3683 if (htab->elf.dynsym == NULL
3684 || !bed->s->swap_symbol_in (abfd,
3685 (htab->elf.dynsym->contents
3686 + r_symndx * bed->s->sizeof_sym),
3687 0, &sym))
3688 abort ();
3689
3690 /* Check relocation against STT_GNU_IFUNC symbol. */
3691 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3692 return reloc_class_ifunc;
3693
0451c93c
MS
3694 switch ((int) ELF64_R_TYPE (rela->r_info))
3695 {
3696 case R_390_RELATIVE:
3697 return reloc_class_relative;
3698 case R_390_JMP_SLOT:
3699 return reloc_class_plt;
3700 case R_390_COPY:
3701 return reloc_class_copy;
3702 default:
3703 return reloc_class_normal;
3704 }
3705}
3706
a85d7ed0
NC
3707/* Finish up the dynamic sections. */
3708
b34976b6 3709static bfd_boolean
4dfe6ac6
NC
3710elf_s390_finish_dynamic_sections (bfd *output_bfd,
3711 struct bfd_link_info *info)
a85d7ed0 3712{
0451c93c 3713 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
3714 bfd *dynobj;
3715 asection *sdyn;
470b557a
AK
3716 bfd *ibfd;
3717 unsigned int i;
a85d7ed0 3718
0451c93c 3719 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
3720 if (htab == NULL)
3721 return FALSE;
3722
0451c93c 3723 dynobj = htab->elf.dynobj;
3d4d4302 3724 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
a85d7ed0 3725
0451c93c 3726 if (htab->elf.dynamic_sections_created)
a85d7ed0 3727 {
a85d7ed0
NC
3728 Elf64_External_Dyn *dyncon, *dynconend;
3729
f41345a7 3730 if (sdyn == NULL || htab->elf.sgot == NULL)
0451c93c 3731 abort ();
a85d7ed0
NC
3732
3733 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 3734 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
a85d7ed0
NC
3735 for (; dyncon < dynconend; dyncon++)
3736 {
3737 Elf_Internal_Dyn dyn;
a85d7ed0 3738 asection *s;
ec338859 3739
a85d7ed0 3740 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
ec338859 3741
a85d7ed0
NC
3742 switch (dyn.d_tag)
3743 {
3744 default:
0451c93c 3745 continue;
ec338859 3746
a85d7ed0 3747 case DT_PLTGOT:
4ade44b7
AM
3748 s = htab->elf.sgotplt;
3749 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
0451c93c 3750 break;
ec338859 3751
a85d7ed0 3752 case DT_JMPREL:
4ade44b7
AM
3753 s = htab->elf.srelplt;
3754 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
a85d7ed0 3755 break;
ec338859 3756
a85d7ed0 3757 case DT_PLTRELSZ:
f92339b8 3758 dyn.d_un.d_val = htab->elf.srelplt->size + htab->elf.irelplt->size;
a85d7ed0 3759 break;
ec338859 3760
a85d7ed0
NC
3761 case DT_RELASZ:
3762 /* The procedure linkage table relocs (DT_JMPREL) should
3763 not be included in the overall relocs (DT_RELA).
3764 Therefore, we override the DT_RELASZ entry here to
3765 make it not include the JMPREL relocs. Since the
3766 linker script arranges for .rela.plt to follow all
3767 other relocation sections, we don't have to worry
3768 about changing the DT_RELA entry. */
f92339b8 3769 dyn.d_un.d_val -= htab->elf.srelplt->size + htab->elf.irelplt->size;
a85d7ed0
NC
3770 break;
3771 }
0451c93c
MS
3772
3773 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
a85d7ed0
NC
3774 }
3775
3776 /* Fill in the special first entry in the procedure linkage table. */
f41345a7 3777 if (htab->elf.splt && htab->elf.splt->size > 0)
a85d7ed0
NC
3778 {
3779 /* fill in blueprint for plt 0 entry */
f41345a7 3780 memcpy (htab->elf.splt->contents, elf_s390x_first_plt_entry,
9aa17453 3781 PLT_FIRST_ENTRY_SIZE);
a85d7ed0
NC
3782 /* Fixup relative address to start of GOT */
3783 bfd_put_32 (output_bfd,
161db279
AK
3784 (htab->elf.sgotplt->output_section->vma
3785 + htab->elf.sgotplt->output_offset
3786 - htab->elf.splt->output_section->vma
3787 - htab->elf.splt->output_offset - 6)/2,
f41345a7 3788 htab->elf.splt->contents + 8);
a85d7ed0 3789 }
387f8054
MR
3790 if (elf_section_data (htab->elf.splt->output_section) != NULL)
3791 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
3792 = PLT_ENTRY_SIZE;
a85d7ed0
NC
3793 }
3794
f41345a7 3795 if (htab->elf.sgotplt)
a85d7ed0 3796 {
0451c93c 3797 /* Fill in the first three entries in the global offset table. */
f41345a7 3798 if (htab->elf.sgotplt->size > 0)
0451c93c
MS
3799 {
3800 bfd_put_64 (output_bfd,
3801 (sdyn == NULL ? (bfd_vma) 0
3802 : sdyn->output_section->vma + sdyn->output_offset),
f41345a7 3803 htab->elf.sgotplt->contents);
0451c93c 3804 /* One entry for shared object struct ptr. */
f41345a7 3805 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
0451c93c 3806 /* One entry for _dl_runtime_resolve. */
3b67f094 3807 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 16);
0451c93c 3808 }
a85d7ed0 3809
f41345a7 3810 elf_section_data (htab->elf.sgot->output_section)
0451c93c
MS
3811 ->this_hdr.sh_entsize = 8;
3812 }
470b557a
AK
3813
3814 /* Finish dynamic symbol for local IFUNC symbols. */
c72f2fb2 3815 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
470b557a
AK
3816 {
3817 struct plt_entry *local_plt;
3818 Elf_Internal_Sym *isym;
3819 Elf_Internal_Shdr *symtab_hdr;
3820
3821 symtab_hdr = &elf_symtab_hdr (ibfd);
3822
3823 local_plt = elf_s390_local_plt (ibfd);
3824 if (local_plt != NULL)
3825 for (i = 0; i < symtab_hdr->sh_info; i++)
3826 {
3827 if (local_plt[i].plt.offset != (bfd_vma) -1)
3828 {
3829 asection *sec = local_plt[i].sec;
3830 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3831 if (isym == NULL)
3832 return FALSE;
3833
3834 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3835 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3836 local_plt[i].plt.offset,
3837 isym->st_value
3838 + sec->output_section->vma
3839 + sec->output_offset);
3840
3841 }
3842 }
3843 }
3844
b34976b6 3845 return TRUE;
a85d7ed0 3846}
e3e9290d
AA
3847\f
3848/* Support for core dump NOTE sections. */
a85d7ed0 3849
e3e9290d
AA
3850static bfd_boolean
3851elf_s390_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3852{
3853 int offset;
3854 size_t size;
3855
3856 switch (note->descsz)
3857 {
3858 default:
3859 return FALSE;
3860
3861 case 336: /* sizeof(struct elf_prstatus) on s390x */
3862 /* pr_cursig */
3863 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3864
3865 /* pr_pid */
3866 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
3867
3868 /* pr_reg */
3869 offset = 112;
3870 size = 216;
3871 break;
3872 }
3873
3874 /* Make a ".reg/999" section. */
3875 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3876 size, note->descpos + offset);
3877}
3878
3879static bfd_boolean
3880elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3881{
3882 switch (note->descsz)
3883 {
3884 default:
3885 return FALSE;
3886
3887 case 136: /* sizeof(struct elf_prpsinfo) on s390x */
3888 elf_tdata (abfd)->core->pid
3889 = bfd_get_32 (abfd, note->descdata + 24);
3890 elf_tdata (abfd)->core->program
3891 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
3892 elf_tdata (abfd)->core->command
3893 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3894 }
3895
3896 /* Note that for some reason, a spurious space is tacked
3897 onto the end of the args in some (at least one anyway)
3898 implementations, so strip it off if it exists. */
3899
3900 {
3901 char *command = elf_tdata (abfd)->core->command;
3902 int n = strlen (command);
3903
3904 if (0 < n && command[n - 1] == ' ')
3905 command[n - 1] = '\0';
3906 }
3907
3908 return TRUE;
3909}
3910
3911static char *
3912elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3913 int note_type, ...)
3914{
3915 va_list ap;
3916
3917 switch (note_type)
3918 {
3919 default:
3920 return NULL;
3921
3922 case NT_PRPSINFO:
3923 {
3924 char data[136] = { 0 };
3925 const char *fname, *psargs;
3926
3927 va_start (ap, note_type);
3928 fname = va_arg (ap, const char *);
3929 psargs = va_arg (ap, const char *);
3930 va_end (ap);
3931
3932 strncpy (data + 40, fname, 16);
3933 strncpy (data + 56, psargs, 80);
3934 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3935 &data, sizeof (data));
3936 }
3937
3938 case NT_PRSTATUS:
3939 {
3940 char data[336] = { 0 };
3941 long pid;
3942 int cursig;
3943 const void *gregs;
3944
3945 va_start (ap, note_type);
3946 pid = va_arg (ap, long);
3947 cursig = va_arg (ap, int);
3948 gregs = va_arg (ap, const void *);
3949 va_end (ap);
3950
3951 bfd_put_16 (abfd, cursig, data + 12);
3952 bfd_put_32 (abfd, pid, data + 32);
3953 memcpy (data + 112, gregs, 216);
3954 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3955 &data, sizeof (data));
3956 }
3957 }
3958 /* NOTREACHED */
3959}
3960\f
4c45e5c9
JJ
3961/* Return address for Ith PLT stub in section PLT, for relocation REL
3962 or (bfd_vma) -1 if it should not be included. */
3963
3964static bfd_vma
3965elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3966 const arelent *rel ATTRIBUTE_UNUSED)
3967{
3968 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3969}
3970
643f7afb
AK
3971/* Merge backend specific data from an object file to the output
3972 object file when linking. */
3973
3974static bfd_boolean
3975elf64_s390_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
3976{
3977 if (!is_s390_elf (ibfd) || !is_s390_elf (obfd))
3978 return TRUE;
3979
3980 if (!elf_s390_merge_obj_attributes (ibfd, obfd))
3981 return FALSE;
3982
3983 return TRUE;
3984}
3985
ae9a127f
NC
3986/* Why was the hash table entry size definition changed from
3987 ARCH_SIZE/8 to 4? This breaks the 64 bit dynamic linker and
3988 this is the only reason for the s390_elf64_size_info structure. */
a85d7ed0
NC
3989
3990const struct elf_size_info s390_elf64_size_info =
3991{
3992 sizeof (Elf64_External_Ehdr),
3993 sizeof (Elf64_External_Phdr),
3994 sizeof (Elf64_External_Shdr),
3995 sizeof (Elf64_External_Rel),
3996 sizeof (Elf64_External_Rela),
3997 sizeof (Elf64_External_Sym),
3998 sizeof (Elf64_External_Dyn),
3999 sizeof (Elf_External_Note),
ae9a127f
NC
4000 8, /* hash-table entry size. */
4001 1, /* internal relocations per external relocations. */
4002 64, /* arch_size. */
45d6a902 4003 3, /* log_file_align. */
a85d7ed0
NC
4004 ELFCLASS64, EV_CURRENT,
4005 bfd_elf64_write_out_phdrs,
4006 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 4007 bfd_elf64_checksum_contents,
a85d7ed0 4008 bfd_elf64_write_relocs,
73ff0d56 4009 bfd_elf64_swap_symbol_in,
a85d7ed0
NC
4010 bfd_elf64_swap_symbol_out,
4011 bfd_elf64_slurp_reloc_table,
4012 bfd_elf64_slurp_symbol_table,
4013 bfd_elf64_swap_dyn_in,
4014 bfd_elf64_swap_dyn_out,
947216bf
AM
4015 bfd_elf64_swap_reloc_in,
4016 bfd_elf64_swap_reloc_out,
4017 bfd_elf64_swap_reloca_in,
4018 bfd_elf64_swap_reloca_out
a85d7ed0
NC
4019};
4020
6d00b590 4021#define TARGET_BIG_SYM s390_elf64_vec
a85d7ed0
NC
4022#define TARGET_BIG_NAME "elf64-s390"
4023#define ELF_ARCH bfd_arch_s390
ae95ffa6 4024#define ELF_TARGET_ID S390_ELF_DATA
a85d7ed0
NC
4025#define ELF_MACHINE_CODE EM_S390
4026#define ELF_MACHINE_ALT1 EM_S390_OLD
4027#define ELF_MAXPAGESIZE 0x1000
4028
4029#define elf_backend_size_info s390_elf64_size_info
4030
4031#define elf_backend_can_gc_sections 1
51b64d56 4032#define elf_backend_can_refcount 1
a85d7ed0
NC
4033#define elf_backend_want_got_plt 1
4034#define elf_backend_plt_readonly 1
4035#define elf_backend_want_plt_sym 0
4036#define elf_backend_got_header_size 24
b491616a 4037#define elf_backend_rela_normal 1
a85d7ed0
NC
4038
4039#define elf_info_to_howto elf_s390_info_to_howto
4040
a85d7ed0
NC
4041#define bfd_elf64_bfd_is_local_label_name elf_s390_is_local_label_name
4042#define bfd_elf64_bfd_link_hash_table_create elf_s390_link_hash_table_create
4043#define bfd_elf64_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
643f7afb
AK
4044#define bfd_elf64_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4045#define bfd_elf64_bfd_merge_private_bfd_data elf64_s390_merge_private_bfd_data
a85d7ed0
NC
4046
4047#define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
4048#define elf_backend_check_relocs elf_s390_check_relocs
0451c93c
MS
4049#define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
4050#define elf_backend_create_dynamic_sections elf_s390_create_dynamic_sections
a85d7ed0
NC
4051#define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4052#define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
4053#define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
4054#define elf_backend_gc_sweep_hook elf_s390_gc_sweep_hook
0451c93c 4055#define elf_backend_reloc_type_class elf_s390_reloc_type_class
a85d7ed0
NC
4056#define elf_backend_relocate_section elf_s390_relocate_section
4057#define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
74541ad4 4058#define elf_backend_init_index_section _bfd_elf_init_1_index_section
e3e9290d
AA
4059#define elf_backend_grok_prstatus elf_s390_grok_prstatus
4060#define elf_backend_grok_psinfo elf_s390_grok_psinfo
4061#define elf_backend_write_core_note elf_s390_write_core_note
4c45e5c9 4062#define elf_backend_plt_sym_val elf_s390_plt_sym_val
470b557a 4063#define elf_backend_add_symbol_hook elf_s390_add_symbol_hook
b9005ba7 4064#define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
a85d7ed0 4065
69fc87f1
MS
4066#define bfd_elf64_mkobject elf_s390_mkobject
4067#define elf_backend_object_p elf_s390_object_p
a85d7ed0
NC
4068
4069#include "elf64-target.h"
This page took 1.145636 seconds and 4 git commands to generate.