Regen POTFILES.in
[deliverable/binutils-gdb.git] / bfd / elf64-s390.c
CommitLineData
a85d7ed0 1/* IBM S/390-specific support for 64-bit ELF
6f2750fe 2 Copyright (C) 2000-2016 Free Software Foundation, Inc.
a85d7ed0
NC
3 Contributed Martin Schwidefsky (schwidefsky@de.ibm.com).
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
a85d7ed0
NC
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
3e110533 19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA
53e09e0a 20 02110-1301, USA. */
a85d7ed0 21
a85d7ed0 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
a85d7ed0
NC
24#include "bfdlink.h"
25#include "libbfd.h"
26#include "elf-bfd.h"
a85d7ed0 27#include "elf/s390.h"
e3e9290d 28#include <stdarg.h>
a85d7ed0
NC
29
30/* In case we're on a 32-bit machine, construct a 64-bit "-1" value
31 from smaller values. Start with zero, widen, *then* decrement. */
32#define MINUS_ONE (((bfd_vma)0) - 1)
33
2c3fc389
NC
34static bfd_reloc_status_type
35s390_tls_reloc (bfd *, arelent *, asymbol *, void *,
36 asection *, bfd *, char **);
37static bfd_reloc_status_type
38s390_elf_ldisp_reloc (bfd *, arelent *, asymbol *, void *,
39 asection *, bfd *, char **);
40
a85d7ed0
NC
41/* The relocation "howto" table. */
42static reloc_howto_type elf_howto_table[] =
43{
44 HOWTO (R_390_NONE, /* type */
45 0, /* rightshift */
6346d5ca 46 3, /* size (0 = byte, 1 = 2 byte, 2 = 4 byte) */
a85d7ed0 47 0, /* bitsize */
b34976b6 48 FALSE, /* pc_relative */
a85d7ed0
NC
49 0, /* bitpos */
50 complain_overflow_dont, /* complain_on_overflow */
51 bfd_elf_generic_reloc, /* special_function */
52 "R_390_NONE", /* name */
b34976b6 53 FALSE, /* partial_inplace */
a85d7ed0
NC
54 0, /* src_mask */
55 0, /* dst_mask */
b34976b6
AM
56 FALSE), /* pcrel_offset */
57
5236c819
MS
58 HOWTO(R_390_8, 0, 0, 8, FALSE, 0, complain_overflow_bitfield,
59 bfd_elf_generic_reloc, "R_390_8", FALSE, 0,0x000000ff, FALSE),
60 HOWTO(R_390_12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
61 bfd_elf_generic_reloc, "R_390_12", FALSE, 0,0x00000fff, FALSE),
62 HOWTO(R_390_16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
63 bfd_elf_generic_reloc, "R_390_16", FALSE, 0,0x0000ffff, FALSE),
64 HOWTO(R_390_32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
65 bfd_elf_generic_reloc, "R_390_32", FALSE, 0,0xffffffff, FALSE),
66 HOWTO(R_390_PC32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
67 bfd_elf_generic_reloc, "R_390_PC32", FALSE, 0,0xffffffff, TRUE),
15f8604d 68 HOWTO(R_390_GOT12, 0, 1, 12, FALSE, 0, complain_overflow_bitfield,
5236c819
MS
69 bfd_elf_generic_reloc, "R_390_GOT12", FALSE, 0,0x00000fff, FALSE),
70 HOWTO(R_390_GOT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
71 bfd_elf_generic_reloc, "R_390_GOT32", FALSE, 0,0xffffffff, FALSE),
72 HOWTO(R_390_PLT32, 0, 2, 32, TRUE, 0, complain_overflow_bitfield,
73 bfd_elf_generic_reloc, "R_390_PLT32", FALSE, 0,0xffffffff, TRUE),
74 HOWTO(R_390_COPY, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
75 bfd_elf_generic_reloc, "R_390_COPY", FALSE, 0,MINUS_ONE, FALSE),
76 HOWTO(R_390_GLOB_DAT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
77 bfd_elf_generic_reloc, "R_390_GLOB_DAT", FALSE, 0,MINUS_ONE, FALSE),
78 HOWTO(R_390_JMP_SLOT, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
79 bfd_elf_generic_reloc, "R_390_JMP_SLOT", FALSE, 0,MINUS_ONE, FALSE),
80 HOWTO(R_390_RELATIVE, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
81 bfd_elf_generic_reloc, "R_390_RELATIVE", FALSE, 0,MINUS_ONE, FALSE),
82 HOWTO(R_390_GOTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
83 bfd_elf_generic_reloc, "R_390_GOTOFF32", FALSE, 0,MINUS_ONE, FALSE),
84 HOWTO(R_390_GOTPC, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
85 bfd_elf_generic_reloc, "R_390_GOTPC", FALSE, 0,MINUS_ONE, TRUE),
86 HOWTO(R_390_GOT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
87 bfd_elf_generic_reloc, "R_390_GOT16", FALSE, 0,0x0000ffff, FALSE),
88 HOWTO(R_390_PC16, 0, 1, 16, TRUE, 0, complain_overflow_bitfield,
89 bfd_elf_generic_reloc, "R_390_PC16", FALSE, 0,0x0000ffff, TRUE),
90 HOWTO(R_390_PC16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
91 bfd_elf_generic_reloc, "R_390_PC16DBL", FALSE, 0,0x0000ffff, TRUE),
92 HOWTO(R_390_PLT16DBL, 1, 1, 16, TRUE, 0, complain_overflow_bitfield,
93 bfd_elf_generic_reloc, "R_390_PLT16DBL", FALSE, 0,0x0000ffff, TRUE),
94 HOWTO(R_390_PC32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
95 bfd_elf_generic_reloc, "R_390_PC32DBL", FALSE, 0,0xffffffff, TRUE),
96 HOWTO(R_390_PLT32DBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
97 bfd_elf_generic_reloc, "R_390_PLT32DBL", FALSE, 0,0xffffffff, TRUE),
98 HOWTO(R_390_GOTPCDBL, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
99 bfd_elf_generic_reloc, "R_390_GOTPCDBL", FALSE, 0,MINUS_ONE, TRUE),
100 HOWTO(R_390_64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
101 bfd_elf_generic_reloc, "R_390_64", FALSE, 0,MINUS_ONE, FALSE),
102 HOWTO(R_390_PC64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
103 bfd_elf_generic_reloc, "R_390_PC64", FALSE, 0,MINUS_ONE, TRUE),
104 HOWTO(R_390_GOT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
105 bfd_elf_generic_reloc, "R_390_GOT64", FALSE, 0,MINUS_ONE, FALSE),
106 HOWTO(R_390_PLT64, 0, 4, 64, TRUE, 0, complain_overflow_bitfield,
107 bfd_elf_generic_reloc, "R_390_PLT64", FALSE, 0,MINUS_ONE, TRUE),
108 HOWTO(R_390_GOTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
109 bfd_elf_generic_reloc, "R_390_GOTENT", FALSE, 0,MINUS_ONE, TRUE),
110 HOWTO(R_390_GOTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
111 bfd_elf_generic_reloc, "R_390_GOTOFF16", FALSE, 0,0x0000ffff, FALSE),
112 HOWTO(R_390_GOTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
113 bfd_elf_generic_reloc, "R_390_GOTOFF64", FALSE, 0,MINUS_ONE, FALSE),
114 HOWTO(R_390_GOTPLT12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
115 bfd_elf_generic_reloc, "R_390_GOTPLT12", FALSE, 0,0x00000fff, FALSE),
116 HOWTO(R_390_GOTPLT16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
117 bfd_elf_generic_reloc, "R_390_GOTPLT16", FALSE, 0,0x0000ffff, FALSE),
118 HOWTO(R_390_GOTPLT32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
119 bfd_elf_generic_reloc, "R_390_GOTPLT32", FALSE, 0,0xffffffff, FALSE),
120 HOWTO(R_390_GOTPLT64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
121 bfd_elf_generic_reloc, "R_390_GOTPLT64", FALSE, 0,MINUS_ONE, FALSE),
122 HOWTO(R_390_GOTPLTENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
123 bfd_elf_generic_reloc, "R_390_GOTPLTENT",FALSE, 0,MINUS_ONE, TRUE),
124 HOWTO(R_390_PLTOFF16, 0, 1, 16, FALSE, 0, complain_overflow_bitfield,
125 bfd_elf_generic_reloc, "R_390_PLTOFF16", FALSE, 0,0x0000ffff, FALSE),
126 HOWTO(R_390_PLTOFF32, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
127 bfd_elf_generic_reloc, "R_390_PLTOFF32", FALSE, 0,0xffffffff, FALSE),
128 HOWTO(R_390_PLTOFF64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
129 bfd_elf_generic_reloc, "R_390_PLTOFF64", FALSE, 0,MINUS_ONE, FALSE),
69fc87f1
MS
130 HOWTO(R_390_TLS_LOAD, 0, 0, 0, FALSE, 0, complain_overflow_dont,
131 s390_tls_reloc, "R_390_TLS_LOAD", FALSE, 0, 0, FALSE),
132 HOWTO(R_390_TLS_GDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
133 s390_tls_reloc, "R_390_TLS_GDCALL", FALSE, 0, 0, FALSE),
134 HOWTO(R_390_TLS_LDCALL, 0, 0, 0, FALSE, 0, complain_overflow_dont,
135 s390_tls_reloc, "R_390_TLS_LDCALL", FALSE, 0, 0, FALSE),
136 EMPTY_HOWTO (R_390_TLS_GD32), /* Empty entry for R_390_TLS_GD32. */
137 HOWTO(R_390_TLS_GD64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
138 bfd_elf_generic_reloc, "R_390_TLS_GD64", FALSE, 0, MINUS_ONE, FALSE),
139 HOWTO(R_390_TLS_GOTIE12, 0, 1, 12, FALSE, 0, complain_overflow_dont,
140 bfd_elf_generic_reloc, "R_390_TLS_GOTIE12", FALSE, 0, 0x00000fff, FALSE),
141 EMPTY_HOWTO (R_390_TLS_GOTIE32), /* Empty entry for R_390_TLS_GOTIE32. */
142 HOWTO(R_390_TLS_GOTIE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
143 bfd_elf_generic_reloc, "R_390_TLS_GOTIE64", FALSE, 0, MINUS_ONE, FALSE),
144 EMPTY_HOWTO (R_390_TLS_LDM32), /* Empty entry for R_390_TLS_LDM32. */
145 HOWTO(R_390_TLS_LDM64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
146 bfd_elf_generic_reloc, "R_390_TLS_LDM64", FALSE, 0, MINUS_ONE, FALSE),
147 EMPTY_HOWTO (R_390_TLS_IE32), /* Empty entry for R_390_TLS_IE32. */
148 HOWTO(R_390_TLS_IE64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
149 bfd_elf_generic_reloc, "R_390_TLS_IE64", FALSE, 0, MINUS_ONE, FALSE),
150 HOWTO(R_390_TLS_IEENT, 1, 2, 32, TRUE, 0, complain_overflow_bitfield,
151 bfd_elf_generic_reloc, "R_390_TLS_IEENT", FALSE, 0, MINUS_ONE, TRUE),
152 EMPTY_HOWTO (R_390_TLS_LE32), /* Empty entry for R_390_TLS_LE32. */
153 HOWTO(R_390_TLS_LE64, 0, 2, 32, FALSE, 0, complain_overflow_bitfield,
154 bfd_elf_generic_reloc, "R_390_TLS_LE64", FALSE, 0, MINUS_ONE, FALSE),
155 EMPTY_HOWTO (R_390_TLS_LDO32), /* Empty entry for R_390_TLS_LDO32. */
156 HOWTO(R_390_TLS_LDO64, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
157 bfd_elf_generic_reloc, "R_390_TLS_LDO64", FALSE, 0, MINUS_ONE, FALSE),
158 HOWTO(R_390_TLS_DTPMOD, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
159 bfd_elf_generic_reloc, "R_390_TLS_DTPMOD", FALSE, 0, MINUS_ONE, FALSE),
160 HOWTO(R_390_TLS_DTPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
161 bfd_elf_generic_reloc, "R_390_TLS_DTPOFF", FALSE, 0, MINUS_ONE, FALSE),
162 HOWTO(R_390_TLS_TPOFF, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
163 bfd_elf_generic_reloc, "R_390_TLS_TPOFF", FALSE, 0, MINUS_ONE, FALSE),
bd1ea41b
MS
164 HOWTO(R_390_20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
165 s390_elf_ldisp_reloc, "R_390_20", FALSE, 0,0x0fffff00, FALSE),
166 HOWTO(R_390_GOT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
167 s390_elf_ldisp_reloc, "R_390_GOT20", FALSE, 0,0x0fffff00, FALSE),
168 HOWTO(R_390_GOTPLT20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
169 s390_elf_ldisp_reloc, "R_390_GOTPLT20", FALSE, 0,0x0fffff00, FALSE),
170 HOWTO(R_390_TLS_GOTIE20, 0, 2, 20, FALSE, 8, complain_overflow_dont,
171 s390_elf_ldisp_reloc, "R_390_TLS_GOTIE20", FALSE, 0,0x0fffff00, FALSE),
470b557a
AK
172 HOWTO(R_390_IRELATIVE, 0, 4, 64, FALSE, 0, complain_overflow_bitfield,
173 bfd_elf_generic_reloc, "R_390_IRELATIVE", FALSE, 0, MINUS_ONE, FALSE),
fb798c50
AK
174 HOWTO(R_390_PC12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
175 bfd_elf_generic_reloc, "R_390_PC12DBL", FALSE, 0,0x00000fff, TRUE),
176 HOWTO(R_390_PLT12DBL, 1, 1, 12, TRUE, 0, complain_overflow_bitfield,
177 bfd_elf_generic_reloc, "R_390_PLT12DBL", FALSE, 0,0x00000fff, TRUE),
178 HOWTO(R_390_PC24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
179 bfd_elf_generic_reloc, "R_390_PC24DBL", FALSE, 0,0x00ffffff, TRUE),
180 HOWTO(R_390_PLT24DBL, 1, 2, 24, TRUE, 0, complain_overflow_bitfield,
181 bfd_elf_generic_reloc, "R_390_PLT24DBL", FALSE, 0,0x00ffffff, TRUE),
a85d7ed0
NC
182};
183
184/* GNU extension to record C++ vtable hierarchy. */
185static reloc_howto_type elf64_s390_vtinherit_howto =
b34976b6 186 HOWTO (R_390_GNU_VTINHERIT, 0,4,0,FALSE,0,complain_overflow_dont, NULL, "R_390_GNU_VTINHERIT", FALSE,0, 0, FALSE);
a85d7ed0 187static reloc_howto_type elf64_s390_vtentry_howto =
b34976b6 188 HOWTO (R_390_GNU_VTENTRY, 0,4,0,FALSE,0,complain_overflow_dont, _bfd_elf_rel_vtable_reloc_fn,"R_390_GNU_VTENTRY", FALSE,0,0, FALSE);
a85d7ed0
NC
189
190static reloc_howto_type *
2c3fc389
NC
191elf_s390_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
192 bfd_reloc_code_real_type code)
a85d7ed0 193{
0451c93c
MS
194 switch (code)
195 {
196 case BFD_RELOC_NONE:
197 return &elf_howto_table[(int) R_390_NONE];
198 case BFD_RELOC_8:
199 return &elf_howto_table[(int) R_390_8];
200 case BFD_RELOC_390_12:
201 return &elf_howto_table[(int) R_390_12];
202 case BFD_RELOC_16:
203 return &elf_howto_table[(int) R_390_16];
204 case BFD_RELOC_32:
205 return &elf_howto_table[(int) R_390_32];
206 case BFD_RELOC_CTOR:
207 return &elf_howto_table[(int) R_390_32];
208 case BFD_RELOC_32_PCREL:
209 return &elf_howto_table[(int) R_390_PC32];
210 case BFD_RELOC_390_GOT12:
211 return &elf_howto_table[(int) R_390_GOT12];
212 case BFD_RELOC_32_GOT_PCREL:
213 return &elf_howto_table[(int) R_390_GOT32];
214 case BFD_RELOC_390_PLT32:
215 return &elf_howto_table[(int) R_390_PLT32];
216 case BFD_RELOC_390_COPY:
217 return &elf_howto_table[(int) R_390_COPY];
218 case BFD_RELOC_390_GLOB_DAT:
219 return &elf_howto_table[(int) R_390_GLOB_DAT];
220 case BFD_RELOC_390_JMP_SLOT:
221 return &elf_howto_table[(int) R_390_JMP_SLOT];
222 case BFD_RELOC_390_RELATIVE:
223 return &elf_howto_table[(int) R_390_RELATIVE];
224 case BFD_RELOC_32_GOTOFF:
5236c819 225 return &elf_howto_table[(int) R_390_GOTOFF32];
0451c93c
MS
226 case BFD_RELOC_390_GOTPC:
227 return &elf_howto_table[(int) R_390_GOTPC];
228 case BFD_RELOC_390_GOT16:
229 return &elf_howto_table[(int) R_390_GOT16];
230 case BFD_RELOC_16_PCREL:
231 return &elf_howto_table[(int) R_390_PC16];
fb798c50
AK
232 case BFD_RELOC_390_PC12DBL:
233 return &elf_howto_table[(int) R_390_PC12DBL];
234 case BFD_RELOC_390_PLT12DBL:
235 return &elf_howto_table[(int) R_390_PLT12DBL];
0451c93c
MS
236 case BFD_RELOC_390_PC16DBL:
237 return &elf_howto_table[(int) R_390_PC16DBL];
238 case BFD_RELOC_390_PLT16DBL:
239 return &elf_howto_table[(int) R_390_PLT16DBL];
fb798c50
AK
240 case BFD_RELOC_390_PC24DBL:
241 return &elf_howto_table[(int) R_390_PC24DBL];
242 case BFD_RELOC_390_PLT24DBL:
243 return &elf_howto_table[(int) R_390_PLT24DBL];
0451c93c
MS
244 case BFD_RELOC_390_PC32DBL:
245 return &elf_howto_table[(int) R_390_PC32DBL];
246 case BFD_RELOC_390_PLT32DBL:
247 return &elf_howto_table[(int) R_390_PLT32DBL];
248 case BFD_RELOC_390_GOTPCDBL:
249 return &elf_howto_table[(int) R_390_GOTPCDBL];
250 case BFD_RELOC_64:
251 return &elf_howto_table[(int) R_390_64];
252 case BFD_RELOC_64_PCREL:
253 return &elf_howto_table[(int) R_390_PC64];
254 case BFD_RELOC_390_GOT64:
255 return &elf_howto_table[(int) R_390_GOT64];
256 case BFD_RELOC_390_PLT64:
257 return &elf_howto_table[(int) R_390_PLT64];
258 case BFD_RELOC_390_GOTENT:
259 return &elf_howto_table[(int) R_390_GOTENT];
5236c819
MS
260 case BFD_RELOC_16_GOTOFF:
261 return &elf_howto_table[(int) R_390_GOTOFF16];
262 case BFD_RELOC_390_GOTOFF64:
263 return &elf_howto_table[(int) R_390_GOTOFF64];
264 case BFD_RELOC_390_GOTPLT12:
265 return &elf_howto_table[(int) R_390_GOTPLT12];
266 case BFD_RELOC_390_GOTPLT16:
267 return &elf_howto_table[(int) R_390_GOTPLT16];
268 case BFD_RELOC_390_GOTPLT32:
269 return &elf_howto_table[(int) R_390_GOTPLT32];
270 case BFD_RELOC_390_GOTPLT64:
271 return &elf_howto_table[(int) R_390_GOTPLT64];
272 case BFD_RELOC_390_GOTPLTENT:
273 return &elf_howto_table[(int) R_390_GOTPLTENT];
274 case BFD_RELOC_390_PLTOFF16:
275 return &elf_howto_table[(int) R_390_PLTOFF16];
276 case BFD_RELOC_390_PLTOFF32:
277 return &elf_howto_table[(int) R_390_PLTOFF32];
278 case BFD_RELOC_390_PLTOFF64:
279 return &elf_howto_table[(int) R_390_PLTOFF64];
69fc87f1
MS
280 case BFD_RELOC_390_TLS_LOAD:
281 return &elf_howto_table[(int) R_390_TLS_LOAD];
282 case BFD_RELOC_390_TLS_GDCALL:
283 return &elf_howto_table[(int) R_390_TLS_GDCALL];
284 case BFD_RELOC_390_TLS_LDCALL:
285 return &elf_howto_table[(int) R_390_TLS_LDCALL];
286 case BFD_RELOC_390_TLS_GD64:
287 return &elf_howto_table[(int) R_390_TLS_GD64];
288 case BFD_RELOC_390_TLS_GOTIE12:
289 return &elf_howto_table[(int) R_390_TLS_GOTIE12];
290 case BFD_RELOC_390_TLS_GOTIE64:
291 return &elf_howto_table[(int) R_390_TLS_GOTIE64];
292 case BFD_RELOC_390_TLS_LDM64:
293 return &elf_howto_table[(int) R_390_TLS_LDM64];
294 case BFD_RELOC_390_TLS_IE64:
295 return &elf_howto_table[(int) R_390_TLS_IE64];
296 case BFD_RELOC_390_TLS_IEENT:
297 return &elf_howto_table[(int) R_390_TLS_IEENT];
298 case BFD_RELOC_390_TLS_LE64:
299 return &elf_howto_table[(int) R_390_TLS_LE64];
300 case BFD_RELOC_390_TLS_LDO64:
301 return &elf_howto_table[(int) R_390_TLS_LDO64];
302 case BFD_RELOC_390_TLS_DTPMOD:
303 return &elf_howto_table[(int) R_390_TLS_DTPMOD];
304 case BFD_RELOC_390_TLS_DTPOFF:
305 return &elf_howto_table[(int) R_390_TLS_DTPOFF];
306 case BFD_RELOC_390_TLS_TPOFF:
307 return &elf_howto_table[(int) R_390_TLS_TPOFF];
bd1ea41b
MS
308 case BFD_RELOC_390_20:
309 return &elf_howto_table[(int) R_390_20];
310 case BFD_RELOC_390_GOT20:
311 return &elf_howto_table[(int) R_390_GOT20];
312 case BFD_RELOC_390_GOTPLT20:
313 return &elf_howto_table[(int) R_390_GOTPLT20];
314 case BFD_RELOC_390_TLS_GOTIE20:
315 return &elf_howto_table[(int) R_390_TLS_GOTIE20];
470b557a
AK
316 case BFD_RELOC_390_IRELATIVE:
317 return &elf_howto_table[(int) R_390_IRELATIVE];
5236c819
MS
318 case BFD_RELOC_VTABLE_INHERIT:
319 return &elf64_s390_vtinherit_howto;
320 case BFD_RELOC_VTABLE_ENTRY:
321 return &elf64_s390_vtentry_howto;
0451c93c
MS
322 default:
323 break;
324 }
a85d7ed0
NC
325 return 0;
326}
327
157090f7
AM
328static reloc_howto_type *
329elf_s390_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
330 const char *r_name)
331{
332 unsigned int i;
333
334 for (i = 0;
335 i < sizeof (elf_howto_table) / sizeof (elf_howto_table[0]);
336 i++)
337 if (elf_howto_table[i].name != NULL
338 && strcasecmp (elf_howto_table[i].name, r_name) == 0)
339 return &elf_howto_table[i];
340
0bc7245a
JK
341 if (strcasecmp (elf64_s390_vtinherit_howto.name, r_name) == 0)
342 return &elf64_s390_vtinherit_howto;
343 if (strcasecmp (elf64_s390_vtentry_howto.name, r_name) == 0)
344 return &elf64_s390_vtentry_howto;
157090f7
AM
345
346 return NULL;
347}
348
a85d7ed0
NC
349/* We need to use ELF64_R_TYPE so we have our own copy of this function,
350 and elf64-s390.c has its own copy. */
351
352static void
2c3fc389
NC
353elf_s390_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
354 arelent *cache_ptr,
355 Elf_Internal_Rela *dst)
a85d7ed0 356{
d0fb9a8d
JJ
357 unsigned int r_type = ELF64_R_TYPE(dst->r_info);
358 switch (r_type)
a85d7ed0
NC
359 {
360 case R_390_GNU_VTINHERIT:
361 cache_ptr->howto = &elf64_s390_vtinherit_howto;
362 break;
363
364 case R_390_GNU_VTENTRY:
365 cache_ptr->howto = &elf64_s390_vtentry_howto;
366 break;
367
368 default:
d0fb9a8d
JJ
369 if (r_type >= sizeof (elf_howto_table) / sizeof (elf_howto_table[0]))
370 {
695344c0 371 /* xgettext:c-format */
4eca0228
AM
372 _bfd_error_handler (_("%B: invalid relocation type %d"),
373 abfd, (int) r_type);
d0fb9a8d
JJ
374 r_type = R_390_NONE;
375 }
376 cache_ptr->howto = &elf_howto_table[r_type];
99c79b2e 377 }
a85d7ed0
NC
378}
379
69fc87f1
MS
380/* A relocation function which doesn't do anything. */
381static bfd_reloc_status_type
2c3fc389
NC
382s390_tls_reloc (bfd *abfd ATTRIBUTE_UNUSED,
383 arelent *reloc_entry,
384 asymbol *symbol ATTRIBUTE_UNUSED,
385 void * data ATTRIBUTE_UNUSED,
386 asection *input_section,
387 bfd *output_bfd,
388 char **error_message ATTRIBUTE_UNUSED)
69fc87f1
MS
389{
390 if (output_bfd)
391 reloc_entry->address += input_section->output_offset;
392 return bfd_reloc_ok;
393}
394
bd1ea41b
MS
395/* Handle the large displacement relocs. */
396static bfd_reloc_status_type
2c3fc389
NC
397s390_elf_ldisp_reloc (bfd *abfd,
398 arelent *reloc_entry,
399 asymbol *symbol,
400 void * data,
401 asection *input_section,
402 bfd *output_bfd,
403 char **error_message ATTRIBUTE_UNUSED)
bd1ea41b
MS
404{
405 reloc_howto_type *howto = reloc_entry->howto;
406 bfd_vma relocation;
407 bfd_vma insn;
408
409 if (output_bfd != (bfd *) NULL
410 && (symbol->flags & BSF_SECTION_SYM) == 0
411 && (! howto->partial_inplace
412 || reloc_entry->addend == 0))
413 {
414 reloc_entry->address += input_section->output_offset;
415 return bfd_reloc_ok;
416 }
417 if (output_bfd != NULL)
418 return bfd_reloc_continue;
419
07515404 420 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
bd1ea41b
MS
421 return bfd_reloc_outofrange;
422
423 relocation = (symbol->value
424 + symbol->section->output_section->vma
425 + symbol->section->output_offset);
426 relocation += reloc_entry->addend;
427 if (howto->pc_relative)
428 {
429 relocation -= (input_section->output_section->vma
430 + input_section->output_offset);
431 relocation -= reloc_entry->address;
432 }
433
68ffbac6 434 insn = bfd_get_32 (abfd, (bfd_byte *) data + reloc_entry->address);
bd1ea41b
MS
435 insn |= (relocation & 0xfff) << 16 | (relocation & 0xff000) >> 4;
436 bfd_put_32 (abfd, insn, (bfd_byte *) data + reloc_entry->address);
437
438 if ((bfd_signed_vma) relocation < - 0x80000
439 || (bfd_signed_vma) relocation > 0x7ffff)
440 return bfd_reloc_overflow;
441 else
442 return bfd_reloc_ok;
443}
444
b34976b6 445static bfd_boolean
2c3fc389 446elf_s390_is_local_label_name (bfd *abfd, const char *name)
a85d7ed0
NC
447{
448 if (name[0] == '.' && (name[1] == 'X' || name[1] == 'L'))
b34976b6 449 return TRUE;
a85d7ed0
NC
450
451 return _bfd_elf_is_local_label_name (abfd, name);
452}
453
454/* Functions for the 390 ELF linker. */
455
456/* The name of the dynamic interpreter. This is put in the .interp
457 section. */
458
87049b0d 459#define ELF_DYNAMIC_INTERPRETER "/lib/ld64.so.1"
a85d7ed0 460
64285810
MS
461/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
462 copying dynamic variables from a shared lib into an app's dynbss
463 section, and instead use a dynamic relocation to point into the
464 shared lib. */
465#define ELIMINATE_COPY_RELOCS 1
466
a85d7ed0
NC
467/* The size in bytes of the first entry in the procedure linkage table. */
468#define PLT_FIRST_ENTRY_SIZE 32
469/* The size in bytes of an entry in the procedure linkage table. */
99c79b2e 470#define PLT_ENTRY_SIZE 32
a85d7ed0
NC
471
472#define GOT_ENTRY_SIZE 8
473
470b557a
AK
474#define RELA_ENTRY_SIZE sizeof (Elf64_External_Rela)
475
a85d7ed0
NC
476/* The first three entries in a procedure linkage table are reserved,
477 and the initial contents are unimportant (we zero them out).
478 Subsequent entries look like this. See the SVR4 ABI 386
479 supplement to see how this works. */
480
481/* For the s390, simple addr offset can only be 0 - 4096.
482 To use the full 16777216 TB address space, several instructions
483 are needed to load an address in a register and execute
484 a branch( or just saving the address)
485
99c79b2e 486 Furthermore, only r 0 and 1 are free to use!!! */
a85d7ed0
NC
487
488/* The first 3 words in the GOT are then reserved.
489 Word 0 is the address of the dynamic table.
490 Word 1 is a pointer to a structure describing the object
491 Word 2 is used to point to the loader entry address.
492
493 The code for PLT entries looks like this:
494
495 The GOT holds the address in the PLT to be executed.
496 The loader then gets:
3b67f094
MK
497 48(15) = Pointer to the structure describing the object.
498 56(15) = Offset in symbol table
a85d7ed0
NC
499 The loader must then find the module where the function is
500 and insert the address in the GOT.
501
502 PLT1: LARL 1,<fn>@GOTENT # 6 bytes Load address of GOT entry in r1
503 LG 1,0(1) # 6 bytes Load address from GOT in r1
504 BCR 15,1 # 2 bytes Jump to address
505 RET1: BASR 1,0 # 2 bytes Return from GOT 1st time
506 LGF 1,12(1) # 6 bytes Load offset in symbl table in r1
507 BRCL 15,-x # 6 bytes Jump to start of PLT
a7e28bbe 508 .long ? # 4 bytes offset into .rela.plt
a85d7ed0
NC
509
510 Total = 32 bytes per PLT entry
511 Fixup at offset 2: relative address to GOT entry
512 Fixup at offset 22: relative branch to PLT0
a7e28bbe 513 Fixup at offset 28: 32 bit offset into .rela.plt
a85d7ed0 514
a7e28bbe
AK
515 A 32 bit offset into the symbol table is enough. It allows for
516 .rela.plt sections up to a size of 2 gigabyte. A single dynamic
517 object (the main program, any shared library) is limited to 4GB in
518 size. Having a .rela.plt of 2GB would already make the .plt
519 section bigger than 8GB. */
a85d7ed0 520
9aa17453
AK
521static const bfd_byte elf_s390x_plt_entry[PLT_ENTRY_SIZE] =
522 {
523 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
524 0xe3, 0x10, 0x10, 0x00, 0x00, 0x04, /* lg %r1,0(%r1) */
525 0x07, 0xf1, /* br %r1 */
526 0x0d, 0x10, /* basr %r1,%r0 */
527 0xe3, 0x10, 0x10, 0x0c, 0x00, 0x14, /* lgf %r1,12(%r1) */
528 0xc0, 0xf4, 0x00, 0x00, 0x00, 0x00, /* jg first plt */
529 0x00, 0x00, 0x00, 0x00 /* .long 0x00000000 */
530 };
a85d7ed0
NC
531
532/* The first PLT entry pushes the offset into the symbol table
a7e28bbe
AK
533 from R1 onto the stack at 56(15) and the loader object info
534 at 48(15), loads the loader address in R1 and jumps to it. */
a85d7ed0
NC
535
536/* The first entry in the PLT:
537
538 PLT0:
539 STG 1,56(15) # r1 contains the offset into the symbol table
540 LARL 1,_GLOBAL_OFFSET_TABLE # load address of global offset table
541 MVC 48(8,15),8(1) # move loader ino (object struct address) to stack
542 LG 1,16(1) # get entry address of loader
543 BCR 15,1 # jump to loader
544
545 Fixup at offset 8: relative address to start of GOT. */
546
9aa17453
AK
547static const bfd_byte elf_s390x_first_plt_entry[PLT_FIRST_ENTRY_SIZE] =
548 {
549 0xe3, 0x10, 0xf0, 0x38, 0x00, 0x24, /* stg %r1,56(%r15) */
550 0xc0, 0x10, 0x00, 0x00, 0x00, 0x00, /* larl %r1,. */
551 0xd2, 0x07, 0xf0, 0x30, 0x10, 0x08, /* mvc 48(8,%r15),8(%r1) */
552 0xe3, 0x10, 0x10, 0x10, 0x00, 0x04, /* lg %r1,16(%r1) */
553 0x07, 0xf1, /* br %r1 */
554 0x07, 0x00, /* nopr %r0 */
555 0x07, 0x00, /* nopr %r0 */
556 0x07, 0x00 /* nopr %r0 */
557 };
a85d7ed0 558
a85d7ed0
NC
559
560/* s390 ELF linker hash entry. */
561
562struct elf_s390_link_hash_entry
563{
0451c93c 564 struct elf_link_hash_entry elf;
a85d7ed0 565
0451c93c 566 /* Track dynamic relocs copied for this symbol. */
00d8c7a9 567 struct elf_dyn_relocs *dyn_relocs;
5236c819
MS
568
569 /* Number of GOTPLT references for a function. */
570 bfd_signed_vma gotplt_refcount;
69fc87f1
MS
571
572#define GOT_UNKNOWN 0
573#define GOT_NORMAL 1
574#define GOT_TLS_GD 2
575#define GOT_TLS_IE 3
576#define GOT_TLS_IE_NLT 3
577 unsigned char tls_type;
470b557a
AK
578
579 /* For pointer equality reasons we might need to change the symbol
580 type from STT_GNU_IFUNC to STT_FUNC together with its value and
581 section entry. So after alloc_dynrelocs only these values should
582 be used. In order to check whether a symbol is IFUNC use
583 s390_is_ifunc_symbol_p. */
584 bfd_vma ifunc_resolver_address;
585 asection *ifunc_resolver_section;
a85d7ed0
NC
586};
587
69fc87f1
MS
588#define elf_s390_hash_entry(ent) \
589 ((struct elf_s390_link_hash_entry *)(ent))
590
470b557a
AK
591/* This structure represents an entry in the local PLT list needed for
592 local IFUNC symbols. */
593struct plt_entry
594{
595 /* The section of the local symbol.
596 Set in relocate_section and used in finish_dynamic_sections. */
597 asection *sec;
598
599 union
600 {
601 bfd_signed_vma refcount;
602 bfd_vma offset;
603 } plt;
604};
605
0ffa91dd
NC
606/* NOTE: Keep this structure in sync with
607 the one declared in elf32-s390.c. */
69fc87f1
MS
608struct elf_s390_obj_tdata
609{
610 struct elf_obj_tdata root;
611
470b557a
AK
612 /* A local PLT is needed for ifunc symbols. */
613 struct plt_entry *local_plt;
614
0ffa91dd 615 /* TLS type for each local got entry. */
69fc87f1
MS
616 char *local_got_tls_type;
617};
618
619#define elf_s390_tdata(abfd) \
620 ((struct elf_s390_obj_tdata *) (abfd)->tdata.any)
621
470b557a
AK
622#define elf_s390_local_plt(abfd) \
623 (elf_s390_tdata (abfd)->local_plt)
624
69fc87f1
MS
625#define elf_s390_local_got_tls_type(abfd) \
626 (elf_s390_tdata (abfd)->local_got_tls_type)
627
0ffa91dd
NC
628#define is_s390_elf(bfd) \
629 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
630 && elf_tdata (bfd) != NULL \
4dfe6ac6 631 && elf_object_id (bfd) == S390_ELF_DATA)
0ffa91dd 632
69fc87f1 633static bfd_boolean
62d7a5f6 634elf_s390_mkobject (bfd *abfd)
69fc87f1 635{
0ffa91dd 636 return bfd_elf_allocate_object (abfd, sizeof (struct elf_s390_obj_tdata),
4dfe6ac6 637 S390_ELF_DATA);
69fc87f1
MS
638}
639
640static bfd_boolean
2c3fc389 641elf_s390_object_p (bfd *abfd)
69fc87f1 642{
69fc87f1
MS
643 /* Set the right machine number for an s390 elf32 file. */
644 return bfd_default_set_arch_mach (abfd, bfd_arch_s390, bfd_mach_s390_64);
645}
646
a85d7ed0
NC
647/* s390 ELF linker hash table. */
648
649struct elf_s390_link_hash_table
650{
0451c93c 651 struct elf_link_hash_table elf;
a85d7ed0 652
0451c93c 653 /* Short-cuts to get to dynamic linker sections. */
0451c93c
MS
654 asection *sdynbss;
655 asection *srelbss;
470b557a 656 asection *irelifunc;
ec338859 657
69fc87f1
MS
658 union {
659 bfd_signed_vma refcount;
660 bfd_vma offset;
661 } tls_ldm_got;
662
87d72d41
AM
663 /* Small local sym cache. */
664 struct sym_cache sym_cache;
0451c93c 665};
a85d7ed0
NC
666
667/* Get the s390 ELF linker hash table from a link_info structure. */
668
ceada896
AA
669#define elf_s390_hash_table(p) \
670 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
671 == S390_ELF_DATA ? ((struct elf_s390_link_hash_table *) ((p)->hash)) : NULL)
a85d7ed0 672
470b557a
AK
673#define ELF64 1
674#include "elf-s390-common.c"
675
a85d7ed0
NC
676/* Create an entry in an s390 ELF linker hash table. */
677
678static struct bfd_hash_entry *
2c3fc389
NC
679link_hash_newfunc (struct bfd_hash_entry *entry,
680 struct bfd_hash_table *table,
681 const char *string)
a85d7ed0 682{
a85d7ed0
NC
683 /* Allocate the structure if it has not already been allocated by a
684 subclass. */
0451c93c
MS
685 if (entry == NULL)
686 {
687 entry = bfd_hash_allocate (table,
688 sizeof (struct elf_s390_link_hash_entry));
689 if (entry == NULL)
690 return entry;
691 }
a85d7ed0
NC
692
693 /* Call the allocation method of the superclass. */
0451c93c
MS
694 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
695 if (entry != NULL)
a85d7ed0 696 {
0451c93c
MS
697 struct elf_s390_link_hash_entry *eh;
698
699 eh = (struct elf_s390_link_hash_entry *) entry;
700 eh->dyn_relocs = NULL;
5236c819 701 eh->gotplt_refcount = 0;
69fc87f1 702 eh->tls_type = GOT_UNKNOWN;
470b557a
AK
703 eh->ifunc_resolver_address = 0;
704 eh->ifunc_resolver_section = NULL;
a85d7ed0
NC
705 }
706
0451c93c 707 return entry;
a85d7ed0
NC
708}
709
710/* Create an s390 ELF linker hash table. */
711
712static struct bfd_link_hash_table *
2c3fc389 713elf_s390_link_hash_table_create (bfd *abfd)
a85d7ed0
NC
714{
715 struct elf_s390_link_hash_table *ret;
dc810e39 716 bfd_size_type amt = sizeof (struct elf_s390_link_hash_table);
a85d7ed0 717
7bf52ea2 718 ret = (struct elf_s390_link_hash_table *) bfd_zmalloc (amt);
0451c93c 719 if (ret == NULL)
a85d7ed0
NC
720 return NULL;
721
66eb6687 722 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, link_hash_newfunc,
4dfe6ac6
NC
723 sizeof (struct elf_s390_link_hash_entry),
724 S390_ELF_DATA))
a85d7ed0 725 {
e2d34d7d 726 free (ret);
a85d7ed0
NC
727 return NULL;
728 }
729
0451c93c
MS
730 return &ret->elf.root;
731}
732
733/* Create .got, .gotplt, and .rela.got sections in DYNOBJ, and set up
734 shortcuts to them in our hash table. */
735
b34976b6 736static bfd_boolean
4dfe6ac6
NC
737create_got_section (bfd *dynobj,
738 struct bfd_link_info *info)
0451c93c
MS
739{
740 struct elf_s390_link_hash_table *htab;
741
742 if (! _bfd_elf_create_got_section (dynobj, info))
b34976b6 743 return FALSE;
0451c93c
MS
744
745 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
746 if (htab == NULL)
747 return FALSE;
748
3d4d4302
AM
749 htab->elf.sgot = bfd_get_linker_section (dynobj, ".got");
750 htab->elf.sgotplt = bfd_get_linker_section (dynobj, ".got.plt");
751 htab->elf.srelgot = bfd_get_linker_section (dynobj, ".rela.got");
f41345a7 752 if (!htab->elf.sgot || !htab->elf.sgotplt || !htab->elf.srelgot)
0451c93c 753 abort ();
b34976b6 754 return TRUE;
0451c93c
MS
755}
756
757/* Create .plt, .rela.plt, .got, .got.plt, .rela.got, .dynbss, and
758 .rela.bss sections in DYNOBJ, and set up shortcuts to them in our
759 hash table. */
760
b34976b6 761static bfd_boolean
4dfe6ac6
NC
762elf_s390_create_dynamic_sections (bfd *dynobj,
763 struct bfd_link_info *info)
0451c93c
MS
764{
765 struct elf_s390_link_hash_table *htab;
766
767 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
768 if (htab == NULL)
769 return FALSE;
770
f41345a7 771 if (!htab->elf.sgot && !create_got_section (dynobj, info))
b34976b6 772 return FALSE;
0451c93c
MS
773
774 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
b34976b6 775 return FALSE;
0451c93c 776
3d4d4302
AM
777 htab->elf.splt = bfd_get_linker_section (dynobj, ".plt");
778 htab->elf.srelplt = bfd_get_linker_section (dynobj, ".rela.plt");
779 htab->sdynbss = bfd_get_linker_section (dynobj, ".dynbss");
0e1862bb 780 if (!bfd_link_pic (info))
3d4d4302 781 htab->srelbss = bfd_get_linker_section (dynobj, ".rela.bss");
0451c93c 782
f41345a7 783 if (!htab->elf.splt || !htab->elf.srelplt || !htab->sdynbss
0e1862bb 784 || (!bfd_link_pic (info) && !htab->srelbss))
0451c93c
MS
785 abort ();
786
b34976b6 787 return TRUE;
a85d7ed0
NC
788}
789
0451c93c
MS
790/* Copy the extra info we tack onto an elf_link_hash_entry. */
791
792static void
2c3fc389
NC
793elf_s390_copy_indirect_symbol (struct bfd_link_info *info,
794 struct elf_link_hash_entry *dir,
795 struct elf_link_hash_entry *ind)
0451c93c
MS
796{
797 struct elf_s390_link_hash_entry *edir, *eind;
798
799 edir = (struct elf_s390_link_hash_entry *) dir;
800 eind = (struct elf_s390_link_hash_entry *) ind;
801
802 if (eind->dyn_relocs != NULL)
803 {
804 if (edir->dyn_relocs != NULL)
805 {
00d8c7a9
AK
806 struct elf_dyn_relocs **pp;
807 struct elf_dyn_relocs *p;
0451c93c 808
fcfa13d2 809 /* Add reloc counts against the indirect sym to the direct sym
0451c93c
MS
810 list. Merge any entries against the same section. */
811 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
812 {
00d8c7a9 813 struct elf_dyn_relocs *q;
0451c93c
MS
814
815 for (q = edir->dyn_relocs; q != NULL; q = q->next)
816 if (q->sec == p->sec)
817 {
818 q->pc_count += p->pc_count;
819 q->count += p->count;
820 *pp = p->next;
821 break;
822 }
823 if (q == NULL)
824 pp = &p->next;
825 }
826 *pp = edir->dyn_relocs;
827 }
828
829 edir->dyn_relocs = eind->dyn_relocs;
830 eind->dyn_relocs = NULL;
831 }
832
69fc87f1
MS
833 if (ind->root.type == bfd_link_hash_indirect
834 && dir->got.refcount <= 0)
835 {
836 edir->tls_type = eind->tls_type;
837 eind->tls_type = GOT_UNKNOWN;
838 }
839
64285810
MS
840 if (ELIMINATE_COPY_RELOCS
841 && ind->root.type != bfd_link_hash_indirect
f5385ebf
AM
842 && dir->dynamic_adjusted)
843 {
844 /* If called to transfer flags for a weakdef during processing
845 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
846 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
847 dir->ref_dynamic |= ind->ref_dynamic;
848 dir->ref_regular |= ind->ref_regular;
849 dir->ref_regular_nonweak |= ind->ref_regular_nonweak;
850 dir->needs_plt |= ind->needs_plt;
851 }
64285810 852 else
fcfa13d2 853 _bfd_elf_link_hash_copy_indirect (info, dir, ind);
0451c93c 854}
a85d7ed0 855
69fc87f1 856static int
2c3fc389
NC
857elf_s390_tls_transition (struct bfd_link_info *info,
858 int r_type,
859 int is_local)
69fc87f1 860{
0e1862bb 861 if (bfd_link_pic (info))
69fc87f1
MS
862 return r_type;
863
864 switch (r_type)
865 {
866 case R_390_TLS_GD64:
867 case R_390_TLS_IE64:
868 if (is_local)
869 return R_390_TLS_LE64;
870 return R_390_TLS_IE64;
871 case R_390_TLS_GOTIE64:
872 if (is_local)
873 return R_390_TLS_LE64;
874 return R_390_TLS_GOTIE64;
875 case R_390_TLS_LDM64:
876 return R_390_TLS_LE64;
877 }
878
879 return r_type;
880}
881
a85d7ed0
NC
882/* Look through the relocs for a section during the first phase, and
883 allocate space in the global offset table or procedure linkage
884 table. */
885
b34976b6 886static bfd_boolean
4dfe6ac6
NC
887elf_s390_check_relocs (bfd *abfd,
888 struct bfd_link_info *info,
889 asection *sec,
890 const Elf_Internal_Rela *relocs)
a85d7ed0 891{
0451c93c 892 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
893 Elf_Internal_Shdr *symtab_hdr;
894 struct elf_link_hash_entry **sym_hashes;
a85d7ed0
NC
895 const Elf_Internal_Rela *rel;
896 const Elf_Internal_Rela *rel_end;
a85d7ed0 897 asection *sreloc;
5236c819 898 bfd_signed_vma *local_got_refcounts;
69fc87f1 899 int tls_type, old_tls_type;
a85d7ed0 900
0e1862bb 901 if (bfd_link_relocatable (info))
b34976b6 902 return TRUE;
a85d7ed0 903
0ffa91dd
NC
904 BFD_ASSERT (is_s390_elf (abfd));
905
0451c93c 906 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
907 if (htab == NULL)
908 return FALSE;
909
0ffa91dd 910 symtab_hdr = &elf_symtab_hdr (abfd);
a85d7ed0 911 sym_hashes = elf_sym_hashes (abfd);
5236c819 912 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 913
a85d7ed0
NC
914 sreloc = NULL;
915
916 rel_end = relocs + sec->reloc_count;
917 for (rel = relocs; rel < rel_end; rel++)
918 {
69fc87f1 919 unsigned int r_type;
a85d7ed0
NC
920 unsigned long r_symndx;
921 struct elf_link_hash_entry *h;
470b557a 922 Elf_Internal_Sym *isym;
a85d7ed0
NC
923
924 r_symndx = ELF64_R_SYM (rel->r_info);
925
0451c93c
MS
926 if (r_symndx >= NUM_SHDR_ENTRIES (symtab_hdr))
927 {
695344c0 928 /* xgettext:c-format */
4eca0228
AM
929 _bfd_error_handler (_("%B: bad symbol index: %d"),
930 abfd, r_symndx);
b34976b6 931 return FALSE;
0451c93c
MS
932 }
933
a85d7ed0 934 if (r_symndx < symtab_hdr->sh_info)
470b557a
AK
935 {
936 /* A local symbol. */
937 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
938 abfd, r_symndx);
939 if (isym == NULL)
940 return FALSE;
941
942 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
943 {
944 struct plt_entry *plt;
945
0cb79d69
AK
946 if (htab->elf.dynobj == NULL)
947 htab->elf.dynobj = abfd;
948
470b557a
AK
949 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
950 return FALSE;
951
952 if (local_got_refcounts == NULL)
953 {
954 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
955 return FALSE;
956 local_got_refcounts = elf_local_got_refcounts (abfd);
957 }
958 plt = elf_s390_local_plt (abfd);
959 plt[r_symndx].plt.refcount++;
960 }
961 h = NULL;
962 }
a85d7ed0 963 else
973a3492
L
964 {
965 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
966 while (h->root.type == bfd_link_hash_indirect
967 || h->root.type == bfd_link_hash_warning)
968 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
969
970 /* PR15323, ref flags aren't set for references in the same
971 object. */
972 h->root.non_ir_ref = 1;
973a3492 973 }
a85d7ed0 974
5236c819
MS
975 /* Create got section and local_got_refcounts array if they
976 are needed. */
69fc87f1
MS
977 r_type = elf_s390_tls_transition (info,
978 ELF64_R_TYPE (rel->r_info),
979 h == NULL);
980 switch (r_type)
a85d7ed0
NC
981 {
982 case R_390_GOT12:
947216bf 983 case R_390_GOT16:
bd1ea41b 984 case R_390_GOT20:
a85d7ed0
NC
985 case R_390_GOT32:
986 case R_390_GOT64:
987 case R_390_GOTENT:
5236c819
MS
988 case R_390_GOTPLT12:
989 case R_390_GOTPLT16:
bd1ea41b 990 case R_390_GOTPLT20:
5236c819
MS
991 case R_390_GOTPLT32:
992 case R_390_GOTPLT64:
993 case R_390_GOTPLTENT:
69fc87f1
MS
994 case R_390_TLS_GD64:
995 case R_390_TLS_GOTIE12:
bd1ea41b 996 case R_390_TLS_GOTIE20:
69fc87f1
MS
997 case R_390_TLS_GOTIE64:
998 case R_390_TLS_IEENT:
999 case R_390_TLS_IE64:
1000 case R_390_TLS_LDM64:
5236c819
MS
1001 if (h == NULL
1002 && local_got_refcounts == NULL)
a85d7ed0 1003 {
470b557a 1004 if (!elf_s390_allocate_local_syminfo (abfd, symtab_hdr))
5236c819 1005 return FALSE;
470b557a 1006 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0 1007 }
470b557a 1008
5236c819
MS
1009 /* Fall through. */
1010 case R_390_GOTOFF16:
1011 case R_390_GOTOFF32:
1012 case R_390_GOTOFF64:
0451c93c
MS
1013 case R_390_GOTPC:
1014 case R_390_GOTPCDBL:
f41345a7 1015 if (htab->elf.sgot == NULL)
0451c93c
MS
1016 {
1017 if (htab->elf.dynobj == NULL)
1018 htab->elf.dynobj = abfd;
1019 if (!create_got_section (htab->elf.dynobj, info))
b34976b6 1020 return FALSE;
0451c93c 1021 }
5236c819
MS
1022 }
1023
470b557a
AK
1024 if (h != NULL)
1025 {
1026 if (htab->elf.dynobj == NULL)
1027 htab->elf.dynobj = abfd;
1028 if (!s390_elf_create_ifunc_sections (htab->elf.dynobj, info))
1029 return FALSE;
1030
1031 /* Make sure an IFUNC symbol defined in a non-shared object
1032 always gets a PLT slot. */
1033 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
1034 {
1035 /* The symbol is called by the dynamic loader in order
1036 to resolve the relocation. So it is in fact also
1037 referenced. */
1038 h->ref_regular = 1;
1039 h->needs_plt = 1;
1040 }
1041 }
1042
69fc87f1 1043 switch (r_type)
5236c819 1044 {
5236c819
MS
1045 case R_390_GOTPC:
1046 case R_390_GOTPCDBL:
470b557a
AK
1047 /* These relocs do not need a GOT slot. They just load the
1048 GOT pointer itself or address something else relative to
1049 the GOT. Since the GOT pointer has been set up above we
1050 are done. */
0451c93c 1051 break;
d47b13e0
AK
1052 case R_390_GOTOFF16:
1053 case R_390_GOTOFF32:
1054 case R_390_GOTOFF64:
1055 if (h == NULL || !s390_is_ifunc_symbol_p (h) || !h->def_regular)
1056 break;
1a0670f3 1057 /* Fall through. */
ec338859 1058
fb798c50 1059 case R_390_PLT12DBL:
947216bf 1060 case R_390_PLT16DBL:
fb798c50 1061 case R_390_PLT24DBL:
a85d7ed0
NC
1062 case R_390_PLT32:
1063 case R_390_PLT32DBL:
1064 case R_390_PLT64:
5236c819
MS
1065 case R_390_PLTOFF16:
1066 case R_390_PLTOFF32:
1067 case R_390_PLTOFF64:
a85d7ed0 1068 /* This symbol requires a procedure linkage table entry. We
947216bf
AM
1069 actually build the entry in adjust_dynamic_symbol,
1070 because this might be a case of linking PIC code which is
1071 never referenced by a dynamic object, in which case we
1072 don't need to generate a procedure linkage table entry
1073 after all. */
ec338859 1074
a85d7ed0 1075 /* If this is a local symbol, we resolve it directly without
947216bf 1076 creating a procedure linkage table entry. */
5236c819
MS
1077 if (h != NULL)
1078 {
f5385ebf 1079 h->needs_plt = 1;
5236c819
MS
1080 h->plt.refcount += 1;
1081 }
1082 break;
ec338859 1083
5236c819
MS
1084 case R_390_GOTPLT12:
1085 case R_390_GOTPLT16:
bd1ea41b 1086 case R_390_GOTPLT20:
5236c819
MS
1087 case R_390_GOTPLT32:
1088 case R_390_GOTPLT64:
1089 case R_390_GOTPLTENT:
1090 /* This symbol requires either a procedure linkage table entry
1091 or an entry in the local got. We actually build the entry
1092 in adjust_dynamic_symbol because whether this is really a
1093 global reference can change and with it the fact if we have
1094 to create a plt entry or a local got entry. To be able to
1095 make a once global symbol a local one we have to keep track
1096 of the number of gotplt references that exist for this
1097 symbol. */
1098 if (h != NULL)
1099 {
1100 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount++;
f5385ebf 1101 h->needs_plt = 1;
5236c819
MS
1102 h->plt.refcount += 1;
1103 }
69fc87f1
MS
1104 else
1105 local_got_refcounts[r_symndx] += 1;
1106 break;
1107
1108 case R_390_TLS_LDM64:
1109 htab->tls_ldm_got.refcount += 1;
1110 break;
1111
1112 case R_390_TLS_IE64:
1113 case R_390_TLS_GOTIE12:
bd1ea41b 1114 case R_390_TLS_GOTIE20:
69fc87f1
MS
1115 case R_390_TLS_GOTIE64:
1116 case R_390_TLS_IEENT:
0e1862bb 1117 if (bfd_link_pic (info))
69fc87f1
MS
1118 info->flags |= DF_STATIC_TLS;
1119 /* Fall through */
1120
1121 case R_390_GOT12:
26e41594 1122 case R_390_GOT16:
bd1ea41b 1123 case R_390_GOT20:
69fc87f1
MS
1124 case R_390_GOT32:
1125 case R_390_GOT64:
1126 case R_390_GOTENT:
1127 case R_390_TLS_GD64:
1128 /* This symbol requires a global offset table entry. */
1129 switch (r_type)
1130 {
1131 default:
1132 case R_390_GOT12:
1133 case R_390_GOT16:
bd1ea41b 1134 case R_390_GOT20:
69fc87f1
MS
1135 case R_390_GOT32:
1136 case R_390_GOTENT:
1137 tls_type = GOT_NORMAL;
1138 break;
1139 case R_390_TLS_GD64:
1140 tls_type = GOT_TLS_GD;
1141 break;
1142 case R_390_TLS_IE64:
1143 case R_390_TLS_GOTIE64:
1144 tls_type = GOT_TLS_IE;
1145 break;
1146 case R_390_TLS_GOTIE12:
bd1ea41b 1147 case R_390_TLS_GOTIE20:
69fc87f1
MS
1148 case R_390_TLS_IEENT:
1149 tls_type = GOT_TLS_IE_NLT;
1150 break;
1151 }
1152
1153 if (h != NULL)
1154 {
1155 h->got.refcount += 1;
1156 old_tls_type = elf_s390_hash_entry(h)->tls_type;
1157 }
5236c819
MS
1158 else
1159 {
1160 local_got_refcounts[r_symndx] += 1;
69fc87f1 1161 old_tls_type = elf_s390_local_got_tls_type (abfd) [r_symndx];
5236c819 1162 }
69fc87f1
MS
1163 /* If a TLS symbol is accessed using IE at least once,
1164 there is no point to use dynamic model for it. */
1165 if (old_tls_type != tls_type && old_tls_type != GOT_UNKNOWN)
1166 {
1167 if (old_tls_type == GOT_NORMAL || tls_type == GOT_NORMAL)
1168 {
4eca0228 1169 _bfd_error_handler
695344c0 1170 /* xgettext:c-format */
d003868e
AM
1171 (_("%B: `%s' accessed both as normal and thread local symbol"),
1172 abfd, h->root.root.string);
69fc87f1
MS
1173 return FALSE;
1174 }
1175 if (old_tls_type > tls_type)
1176 tls_type = old_tls_type;
1177 }
1178
1179 if (old_tls_type != tls_type)
1180 {
1181 if (h != NULL)
1182 elf_s390_hash_entry (h)->tls_type = tls_type;
1183 else
1184 elf_s390_local_got_tls_type (abfd) [r_symndx] = tls_type;
1185 }
1186
1187 if (r_type != R_390_TLS_IE64)
1188 break;
1189 /* Fall through */
1190
1191 case R_390_TLS_LE64:
e00d879a
AK
1192 /* For static linking and executables this reloc will be
1193 calculated at linktime otherwise a TLS_TPOFF runtime
1194 reloc will be generated. */
0e1862bb 1195 if (r_type == R_390_TLS_LE64 && bfd_link_pie (info))
e00d879a
AK
1196 break;
1197
0e1862bb 1198 if (!bfd_link_pic (info))
69fc87f1
MS
1199 break;
1200 info->flags |= DF_STATIC_TLS;
1201 /* Fall through */
ec338859 1202
947216bf
AM
1203 case R_390_8:
1204 case R_390_16:
a85d7ed0
NC
1205 case R_390_32:
1206 case R_390_64:
fb798c50 1207 case R_390_PC12DBL:
947216bf
AM
1208 case R_390_PC16:
1209 case R_390_PC16DBL:
fb798c50 1210 case R_390_PC24DBL:
a85d7ed0
NC
1211 case R_390_PC32:
1212 case R_390_PC32DBL:
1213 case R_390_PC64:
99ba5125 1214 if (h != NULL && bfd_link_executable (info))
0451c93c
MS
1215 {
1216 /* If this reloc is in a read-only section, we might
1217 need a copy reloc. We can't check reliably at this
1218 stage whether the section is read-only, as input
1219 sections have not yet been mapped to output sections.
1220 Tentatively set the flag for now, and correct in
1221 adjust_dynamic_symbol. */
f5385ebf 1222 h->non_got_ref = 1;
ec338859 1223
0e1862bb 1224 if (!bfd_link_pic (info))
470b557a
AK
1225 {
1226 /* We may need a .plt entry if the function this reloc
1227 refers to is in a shared lib. */
1228 h->plt.refcount += 1;
1229 }
0451c93c 1230 }
ec338859 1231
a85d7ed0 1232 /* If we are creating a shared library, and this is a reloc
0451c93c
MS
1233 against a global symbol, or a non PC relative reloc
1234 against a local symbol, then we need to copy the reloc
1235 into the shared library. However, if we are linking with
1236 -Bsymbolic, we do not need to copy a reloc against a
1237 global symbol which is defined in an object we are
1238 including in the link (i.e., DEF_REGULAR is set). At
1239 this point we have not seen all the input files, so it is
1240 possible that DEF_REGULAR is not set now but will be set
1241 later (it is never cleared). In case of a weak definition,
1242 DEF_REGULAR may be cleared later by a strong definition in
1243 a shared library. We account for that possibility below by
1244 storing information in the relocs_copied field of the hash
1245 table entry. A similar situation occurs when creating
1246 shared libraries and symbol visibility changes render the
1247 symbol local.
1248
1249 If on the other hand, we are creating an executable, we
1250 may need to keep relocations for symbols satisfied by a
1251 dynamic library if we manage to avoid copy relocs for the
1252 symbol. */
0e1862bb 1253 if ((bfd_link_pic (info)
0451c93c
MS
1254 && (sec->flags & SEC_ALLOC) != 0
1255 && ((ELF64_R_TYPE (rel->r_info) != R_390_PC16
fb798c50 1256 && ELF64_R_TYPE (rel->r_info) != R_390_PC12DBL
0451c93c 1257 && ELF64_R_TYPE (rel->r_info) != R_390_PC16DBL
fb798c50 1258 && ELF64_R_TYPE (rel->r_info) != R_390_PC24DBL
0451c93c
MS
1259 && ELF64_R_TYPE (rel->r_info) != R_390_PC32
1260 && ELF64_R_TYPE (rel->r_info) != R_390_PC32DBL
1261 && ELF64_R_TYPE (rel->r_info) != R_390_PC64)
1262 || (h != NULL
8c21ca21 1263 && (! SYMBOLIC_BIND (info, h)
0451c93c 1264 || h->root.type == bfd_link_hash_defweak
f5385ebf 1265 || !h->def_regular))))
64285810 1266 || (ELIMINATE_COPY_RELOCS
0e1862bb 1267 && !bfd_link_pic (info)
0451c93c
MS
1268 && (sec->flags & SEC_ALLOC) != 0
1269 && h != NULL
1270 && (h->root.type == bfd_link_hash_defweak
f5385ebf 1271 || !h->def_regular)))
a85d7ed0 1272 {
00d8c7a9
AK
1273 struct elf_dyn_relocs *p;
1274 struct elf_dyn_relocs **head;
ec338859 1275
0451c93c
MS
1276 /* We must copy these reloc types into the output file.
1277 Create a reloc section in dynobj and make room for
1278 this reloc. */
a85d7ed0
NC
1279 if (sreloc == NULL)
1280 {
440e9cd2
AK
1281 if (htab->elf.dynobj == NULL)
1282 htab->elf.dynobj = abfd;
1283
83bac4b0
NC
1284 sreloc = _bfd_elf_make_dynamic_reloc_section
1285 (sec, htab->elf.dynobj, 3, abfd, /*rela?*/ TRUE);
ec338859 1286
a85d7ed0 1287 if (sreloc == NULL)
83bac4b0 1288 return FALSE;
a85d7ed0 1289 }
ec338859 1290
0451c93c
MS
1291 /* If this is a global symbol, we count the number of
1292 relocations we need for this symbol. */
1293 if (h != NULL)
a85d7ed0 1294 {
ec338859 1295 head = &((struct elf_s390_link_hash_entry *) h)->dyn_relocs;
0451c93c
MS
1296 }
1297 else
1298 {
ec338859
AM
1299 /* Track dynamic relocs needed for local syms too.
1300 We really need local syms available to do this
1301 easily. Oh well. */
ec338859 1302 asection *s;
6edfbbad
DJ
1303 void *vpp;
1304
87d72d41
AM
1305 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1306 abfd, r_symndx);
1307 if (isym == NULL)
b34976b6 1308 return FALSE;
ec338859 1309
87d72d41
AM
1310 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
1311 if (s == NULL)
1312 s = sec;
1313
6edfbbad 1314 vpp = &elf_section_data (s)->local_dynrel;
00d8c7a9 1315 head = (struct elf_dyn_relocs **) vpp;
ec338859
AM
1316 }
1317
1318 p = *head;
1319 if (p == NULL || p->sec != sec)
1320 {
1321 bfd_size_type amt = sizeof *p;
00d8c7a9 1322 p = ((struct elf_dyn_relocs *)
ec338859
AM
1323 bfd_alloc (htab->elf.dynobj, amt));
1324 if (p == NULL)
b34976b6 1325 return FALSE;
ec338859
AM
1326 p->next = *head;
1327 *head = p;
1328 p->sec = sec;
1329 p->count = 0;
1330 p->pc_count = 0;
a85d7ed0 1331 }
ec338859
AM
1332
1333 p->count += 1;
1334 if (ELF64_R_TYPE (rel->r_info) == R_390_PC16
fb798c50
AK
1335 || ELF64_R_TYPE (rel->r_info) == R_390_PC12DBL
1336 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
ec338859
AM
1337 || ELF64_R_TYPE (rel->r_info) == R_390_PC16DBL
1338 || ELF64_R_TYPE (rel->r_info) == R_390_PC32
1339 || ELF64_R_TYPE (rel->r_info) == R_390_PC32DBL
1340 || ELF64_R_TYPE (rel->r_info) == R_390_PC64)
1341 p->pc_count += 1;
a85d7ed0 1342 }
a85d7ed0 1343 break;
ec338859 1344
a85d7ed0
NC
1345 /* This relocation describes the C++ object vtable hierarchy.
1346 Reconstruct it for later use during GC. */
947216bf 1347 case R_390_GNU_VTINHERIT:
c152c796 1348 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 1349 return FALSE;
947216bf 1350 break;
ec338859 1351
a85d7ed0
NC
1352 /* This relocation describes which C++ vtable entries are actually
1353 used. Record for later use during GC. */
947216bf 1354 case R_390_GNU_VTENTRY:
d17e0c6e
JB
1355 BFD_ASSERT (h != NULL);
1356 if (h != NULL
1357 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 1358 return FALSE;
947216bf 1359 break;
ec338859 1360
a85d7ed0
NC
1361 default:
1362 break;
1363 }
1364 }
1365
b34976b6 1366 return TRUE;
a85d7ed0
NC
1367}
1368
1369/* Return the section that should be marked against GC for a given
1370 relocation. */
1371
1372static asection *
07adf181
AM
1373elf_s390_gc_mark_hook (asection *sec,
1374 struct bfd_link_info *info,
1375 Elf_Internal_Rela *rel,
1376 struct elf_link_hash_entry *h,
1377 Elf_Internal_Sym *sym)
a85d7ed0
NC
1378{
1379 if (h != NULL)
07adf181
AM
1380 switch (ELF64_R_TYPE (rel->r_info))
1381 {
1382 case R_390_GNU_VTINHERIT:
1383 case R_390_GNU_VTENTRY:
1384 return NULL;
1385 }
1386
1387 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
a85d7ed0
NC
1388}
1389
1390/* Update the got entry reference counts for the section being removed. */
1391
b34976b6 1392static bfd_boolean
07adf181
AM
1393elf_s390_gc_sweep_hook (bfd *abfd,
1394 struct bfd_link_info *info,
1395 asection *sec,
1396 const Elf_Internal_Rela *relocs)
a85d7ed0 1397{
4dfe6ac6 1398 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
1399 Elf_Internal_Shdr *symtab_hdr;
1400 struct elf_link_hash_entry **sym_hashes;
1401 bfd_signed_vma *local_got_refcounts;
1402 const Elf_Internal_Rela *rel, *relend;
a85d7ed0 1403
0e1862bb 1404 if (bfd_link_relocatable (info))
7dda2462
TG
1405 return TRUE;
1406
4dfe6ac6
NC
1407 htab = elf_s390_hash_table (info);
1408 if (htab == NULL)
1409 return FALSE;
1410
ec338859 1411 elf_section_data (sec)->local_dynrel = NULL;
a85d7ed0 1412
0ffa91dd 1413 symtab_hdr = &elf_symtab_hdr (abfd);
0451c93c
MS
1414 sym_hashes = elf_sym_hashes (abfd);
1415 local_got_refcounts = elf_local_got_refcounts (abfd);
a85d7ed0
NC
1416
1417 relend = relocs + sec->reloc_count;
1418 for (rel = relocs; rel < relend; rel++)
5236c819 1419 {
26e41594
AM
1420 unsigned long r_symndx;
1421 unsigned int r_type;
1422 struct elf_link_hash_entry *h = NULL;
1423
5236c819 1424 r_symndx = ELF64_R_SYM (rel->r_info);
26e41594
AM
1425 if (r_symndx >= symtab_hdr->sh_info)
1426 {
1427 struct elf_s390_link_hash_entry *eh;
00d8c7a9
AK
1428 struct elf_dyn_relocs **pp;
1429 struct elf_dyn_relocs *p;
5236c819 1430
26e41594 1431 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3eb128b2
AM
1432 while (h->root.type == bfd_link_hash_indirect
1433 || h->root.type == bfd_link_hash_warning)
1434 h = (struct elf_link_hash_entry *) h->root.u.i.link;
26e41594 1435 eh = (struct elf_s390_link_hash_entry *) h;
5236c819 1436
26e41594
AM
1437 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1438 if (p->sec == sec)
1439 {
1440 /* Everything must go for SEC. */
1441 *pp = p->next;
1442 break;
1443 }
1444 }
470b557a
AK
1445 else
1446 {
1447 Elf_Internal_Sym *isym;
1448
1449 /* A local symbol. */
1450 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1451 abfd, r_symndx);
1452 if (isym == NULL)
1453 return FALSE;
1454
1455 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
1456 {
1457 struct plt_entry *plt = elf_s390_local_plt (abfd);
1458 if (plt[r_symndx].plt.refcount > 0)
1459 plt[r_symndx].plt.refcount--;
1460 }
1461 }
26e41594
AM
1462
1463 r_type = ELF64_R_TYPE (rel->r_info);
1464 r_type = elf_s390_tls_transition (info, r_type, h != NULL);
69fc87f1 1465 switch (r_type)
5236c819 1466 {
69fc87f1 1467 case R_390_TLS_LDM64:
4dfe6ac6
NC
1468 if (htab->tls_ldm_got.refcount > 0)
1469 htab->tls_ldm_got.refcount -= 1;
69fc87f1 1470 break;
ef05be83
AK
1471 case R_390_GOTOFF16:
1472 case R_390_GOTOFF32:
1473 case R_390_GOTOFF64:
d47b13e0
AK
1474 if (h != NULL && s390_is_ifunc_symbol_p (h) && h->def_regular)
1475 {
1476 h->plt.refcount--;
1477 break;
1478 }
1479
ef05be83
AK
1480 case R_390_GOTPC:
1481 case R_390_GOTPCDBL:
1482 break;
69fc87f1
MS
1483
1484 case R_390_TLS_GD64:
1485 case R_390_TLS_IE64:
1486 case R_390_TLS_GOTIE12:
bd1ea41b 1487 case R_390_TLS_GOTIE20:
69fc87f1
MS
1488 case R_390_TLS_GOTIE64:
1489 case R_390_TLS_IEENT:
5236c819
MS
1490 case R_390_GOT12:
1491 case R_390_GOT16:
bd1ea41b 1492 case R_390_GOT20:
5236c819
MS
1493 case R_390_GOT32:
1494 case R_390_GOT64:
5236c819
MS
1495 case R_390_GOTENT:
1496 if (h != NULL)
1497 {
1498 if (h->got.refcount > 0)
1499 h->got.refcount -= 1;
1500 }
1501 else if (local_got_refcounts != NULL)
1502 {
1503 if (local_got_refcounts[r_symndx] > 0)
1504 local_got_refcounts[r_symndx] -= 1;
1505 }
26e41594 1506 break;
a85d7ed0 1507
5236c819
MS
1508 case R_390_8:
1509 case R_390_12:
1510 case R_390_16:
bd1ea41b 1511 case R_390_20:
5236c819
MS
1512 case R_390_32:
1513 case R_390_64:
1514 case R_390_PC16:
fb798c50 1515 case R_390_PC12DBL:
5236c819 1516 case R_390_PC16DBL:
fb798c50 1517 case R_390_PC24DBL:
5236c819
MS
1518 case R_390_PC32:
1519 case R_390_PC32DBL:
1520 case R_390_PC64:
0e1862bb 1521 if (bfd_link_pic (info))
26e41594
AM
1522 break;
1523 /* Fall through */
a85d7ed0 1524
fb798c50 1525 case R_390_PLT12DBL:
69fc87f1 1526 case R_390_PLT16DBL:
fb798c50 1527 case R_390_PLT24DBL:
69fc87f1
MS
1528 case R_390_PLT32:
1529 case R_390_PLT32DBL:
1530 case R_390_PLT64:
1531 case R_390_PLTOFF16:
1532 case R_390_PLTOFF32:
1533 case R_390_PLTOFF64:
1534 if (h != NULL)
1535 {
1536 if (h->plt.refcount > 0)
1537 h->plt.refcount -= 1;
1538 }
1539 break;
1540
1541 case R_390_GOTPLT12:
1542 case R_390_GOTPLT16:
bd1ea41b 1543 case R_390_GOTPLT20:
69fc87f1
MS
1544 case R_390_GOTPLT32:
1545 case R_390_GOTPLT64:
1546 case R_390_GOTPLTENT:
1547 if (h != NULL)
1548 {
1549 if (h->plt.refcount > 0)
1550 {
1551 ((struct elf_s390_link_hash_entry *) h)->gotplt_refcount--;
1552 h->plt.refcount -= 1;
1553 }
1554 }
1555 else if (local_got_refcounts != NULL)
1556 {
1557 if (local_got_refcounts[r_symndx] > 0)
1558 local_got_refcounts[r_symndx] -= 1;
1559 }
1560 break;
1561
5236c819
MS
1562 default:
1563 break;
1564 }
1565 }
a85d7ed0 1566
b34976b6 1567 return TRUE;
a85d7ed0
NC
1568}
1569
5236c819
MS
1570/* Make sure we emit a GOT entry if the symbol was supposed to have a PLT
1571 entry but we found we will not create any. Called when we find we will
1572 not have any PLT for this symbol, by for example
1573 elf_s390_adjust_dynamic_symbol when we're doing a proper dynamic link,
1574 or elf_s390_size_dynamic_sections if no dynamic sections will be
1575 created (we're only linking static objects). */
1576
1577static void
2c3fc389 1578elf_s390_adjust_gotplt (struct elf_s390_link_hash_entry *h)
5236c819
MS
1579{
1580 if (h->elf.root.type == bfd_link_hash_warning)
1581 h = (struct elf_s390_link_hash_entry *) h->elf.root.u.i.link;
1582
1583 if (h->gotplt_refcount <= 0)
1584 return;
1585
1586 /* We simply add the number of gotplt references to the number
1587 * of got references for this symbol. */
1588 h->elf.got.refcount += h->gotplt_refcount;
1589 h->gotplt_refcount = -1;
1590}
1591
a85d7ed0
NC
1592/* Adjust a symbol defined by a dynamic object and referenced by a
1593 regular object. The current definition is in some section of the
1594 dynamic object, but we're not including those sections. We have to
1595 change the definition to something the rest of the link can
1596 understand. */
1597
b34976b6 1598static bfd_boolean
4dfe6ac6
NC
1599elf_s390_adjust_dynamic_symbol (struct bfd_link_info *info,
1600 struct elf_link_hash_entry *h)
a85d7ed0 1601{
0451c93c 1602 struct elf_s390_link_hash_table *htab;
a85d7ed0 1603 asection *s;
a85d7ed0 1604
470b557a
AK
1605 /* STT_GNU_IFUNC symbol must go through PLT. */
1606 if (s390_is_ifunc_symbol_p (h))
d8ee9e44
AK
1607 {
1608 /* All local STT_GNU_IFUNC references must be treated as local
1609 calls via local PLT. */
1610 if (h->ref_regular && SYMBOL_CALLS_LOCAL (info, h))
1611 {
1612 bfd_size_type pc_count = 0, count = 0;
1613 struct elf_dyn_relocs **pp;
1614 struct elf_s390_link_hash_entry *eh;
1615 struct elf_dyn_relocs *p;
1616
1617 eh = (struct elf_s390_link_hash_entry *) h;
1618 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1619 {
1620 pc_count += p->pc_count;
1621 p->count -= p->pc_count;
1622 p->pc_count = 0;
1623 count += p->count;
1624 if (p->count == 0)
1625 *pp = p->next;
1626 else
1627 pp = &p->next;
1628 }
1629
1630 if (pc_count || count)
1631 {
1632 h->needs_plt = 1;
1633 h->non_got_ref = 1;
1634 if (h->plt.refcount <= 0)
1635 h->plt.refcount = 1;
1636 else
1637 h->plt.refcount += 1;
1638 }
1639 }
1640
1641 if (h->plt.refcount <= 0)
1642 {
1643 h->plt.offset = (bfd_vma) -1;
1644 h->needs_plt = 0;
1645 }
1646 return TRUE;
1647 }
470b557a 1648
a85d7ed0
NC
1649 /* If this is a function, put it in the procedure linkage table. We
1650 will fill in the contents of the procedure linkage table later
cedb70c5 1651 (although we could actually do it here). */
a85d7ed0 1652 if (h->type == STT_FUNC
f5385ebf 1653 || h->needs_plt)
a85d7ed0 1654 {
0451c93c 1655 if (h->plt.refcount <= 0
8c21ca21
AK
1656 || SYMBOL_CALLS_LOCAL (info, h)
1657 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1658 && h->root.type == bfd_link_hash_undefweak))
a85d7ed0
NC
1659 {
1660 /* This case can occur if we saw a PLT32 reloc in an input
947216bf
AM
1661 file, but the symbol was never referred to by a dynamic
1662 object, or if all references were garbage collected. In
0451c93c
MS
1663 such a case, we don't actually need to build a procedure
1664 linkage table, and we can just do a PC32 reloc instead. */
a85d7ed0 1665 h->plt.offset = (bfd_vma) -1;
f5385ebf 1666 h->needs_plt = 0;
5236c819 1667 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
a85d7ed0
NC
1668 }
1669
b34976b6 1670 return TRUE;
a85d7ed0 1671 }
bbd7ec4a 1672 else
0451c93c
MS
1673 /* It's possible that we incorrectly decided a .plt reloc was
1674 needed for an R_390_PC32 reloc to a non-function sym in
1675 check_relocs. We can't decide accurately between function and
1676 non-function syms in check-relocs; Objects loaded later in
1677 the link may change h->type. So fix it now. */
bbd7ec4a 1678 h->plt.offset = (bfd_vma) -1;
a85d7ed0
NC
1679
1680 /* If this is a weak symbol, and there is a real definition, the
1681 processor independent code will have arranged for us to see the
1682 real definition first, and we can just use the same value. */
f6e332e6 1683 if (h->u.weakdef != NULL)
a85d7ed0 1684 {
f6e332e6
AM
1685 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
1686 || h->u.weakdef->root.type == bfd_link_hash_defweak);
1687 h->root.u.def.section = h->u.weakdef->root.u.def.section;
1688 h->root.u.def.value = h->u.weakdef->root.u.def.value;
64285810 1689 if (ELIMINATE_COPY_RELOCS || info->nocopyreloc)
f6e332e6 1690 h->non_got_ref = h->u.weakdef->non_got_ref;
b34976b6 1691 return TRUE;
a85d7ed0
NC
1692 }
1693
1694 /* This is a reference to a symbol defined by a dynamic object which
1695 is not a function. */
1696
1697 /* If we are creating a shared library, we must presume that the
1698 only references to the symbol are via the global offset table.
1699 For such cases we need not do anything here; the relocations will
1700 be handled correctly by relocate_section. */
0e1862bb 1701 if (bfd_link_pic (info))
b34976b6 1702 return TRUE;
a85d7ed0
NC
1703
1704 /* If there are no references to this symbol that do not use the
1705 GOT, we don't need to generate a copy reloc. */
f5385ebf 1706 if (!h->non_got_ref)
b34976b6 1707 return TRUE;
a85d7ed0 1708
0451c93c
MS
1709 /* If -z nocopyreloc was given, we won't generate them either. */
1710 if (info->nocopyreloc)
1711 {
f5385ebf 1712 h->non_got_ref = 0;
b34976b6 1713 return TRUE;
0451c93c
MS
1714 }
1715
64285810 1716 if (ELIMINATE_COPY_RELOCS)
0451c93c 1717 {
64285810 1718 struct elf_s390_link_hash_entry * eh;
00d8c7a9 1719 struct elf_dyn_relocs *p;
0451c93c 1720
64285810
MS
1721 eh = (struct elf_s390_link_hash_entry *) h;
1722 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1723 {
1724 s = p->sec->output_section;
1725 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1726 break;
1727 }
1728
1729 /* If we didn't find any dynamic relocs in read-only sections, then
1730 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1731 if (p == NULL)
1732 {
f5385ebf 1733 h->non_got_ref = 0;
64285810
MS
1734 return TRUE;
1735 }
0451c93c
MS
1736 }
1737
a85d7ed0
NC
1738 /* We must allocate the symbol in our .dynbss section, which will
1739 become part of the .bss section of the executable. There will be
1740 an entry for this symbol in the .dynsym section. The dynamic
1741 object will contain position independent code, so all references
1742 from the dynamic object to this symbol will go through the global
1743 offset table. The dynamic linker will use the .dynsym entry to
1744 determine the address it must put in the global offset table, so
1745 both the dynamic object and the regular object will refer to the
1746 same memory location for the variable. */
1747
0451c93c 1748 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
1749 if (htab == NULL)
1750 return FALSE;
a85d7ed0 1751
0451c93c
MS
1752 /* We must generate a R_390_COPY reloc to tell the dynamic linker to
1753 copy the initial value out of the dynamic object and into the
1754 runtime process image. */
1d7e9d18 1755 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
a85d7ed0 1756 {
eea6121a 1757 htab->srelbss->size += sizeof (Elf64_External_Rela);
f5385ebf 1758 h->needs_copy = 1;
a85d7ed0
NC
1759 }
1760
0451c93c 1761 s = htab->sdynbss;
a85d7ed0 1762
6cabe1ea 1763 return _bfd_elf_adjust_dynamic_copy (info, h, s);
a85d7ed0
NC
1764}
1765
0451c93c
MS
1766/* Allocate space in .plt, .got and associated reloc sections for
1767 dynamic relocs. */
1768
b34976b6 1769static bfd_boolean
4dfe6ac6
NC
1770allocate_dynrelocs (struct elf_link_hash_entry *h,
1771 void * inf)
0451c93c
MS
1772{
1773 struct bfd_link_info *info;
1774 struct elf_s390_link_hash_table *htab;
470b557a 1775 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry *)h;
00d8c7a9 1776 struct elf_dyn_relocs *p;
0451c93c 1777
e92d460e 1778 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1779 return TRUE;
0451c93c
MS
1780
1781 info = (struct bfd_link_info *) inf;
1782 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
1783 if (htab == NULL)
1784 return FALSE;
0451c93c 1785
470b557a
AK
1786 /* Since STT_GNU_IFUNC symbol must go through PLT, we handle it
1787 here if it is defined and referenced in a non-shared object. */
1788 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
61643fba 1789 return s390_elf_allocate_ifunc_dyn_relocs (info, h);
470b557a
AK
1790 else if (htab->elf.dynamic_sections_created
1791 && h->plt.refcount > 0)
0451c93c
MS
1792 {
1793 /* Make sure this symbol is output as a dynamic symbol.
1794 Undefined weak syms won't yet be marked as dynamic. */
1795 if (h->dynindx == -1
f5385ebf 1796 && !h->forced_local)
0451c93c 1797 {
c152c796 1798 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1799 return FALSE;
0451c93c
MS
1800 }
1801
0e1862bb 1802 if (bfd_link_pic (info)
4ec72bde 1803 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
0451c93c 1804 {
f41345a7 1805 asection *s = htab->elf.splt;
0451c93c
MS
1806
1807 /* If this is the first .plt entry, make room for the special
1808 first entry. */
eea6121a
AM
1809 if (s->size == 0)
1810 s->size += PLT_FIRST_ENTRY_SIZE;
0451c93c 1811
eea6121a 1812 h->plt.offset = s->size;
0451c93c
MS
1813
1814 /* If this symbol is not defined in a regular file, and we are
1815 not generating a shared library, then set the symbol to this
1816 location in the .plt. This is required to make function
1817 pointers compare as equal between the normal executable and
1818 the shared library. */
0e1862bb 1819 if (! bfd_link_pic (info)
f5385ebf 1820 && !h->def_regular)
0451c93c
MS
1821 {
1822 h->root.u.def.section = s;
1823 h->root.u.def.value = h->plt.offset;
1824 }
ec338859 1825
0451c93c 1826 /* Make room for this entry. */
eea6121a 1827 s->size += PLT_ENTRY_SIZE;
ec338859 1828
0451c93c
MS
1829 /* We also need to make an entry in the .got.plt section, which
1830 will be placed in the .got section by the linker script. */
f41345a7 1831 htab->elf.sgotplt->size += GOT_ENTRY_SIZE;
0451c93c
MS
1832
1833 /* We also need to make an entry in the .rela.plt section. */
f41345a7 1834 htab->elf.srelplt->size += sizeof (Elf64_External_Rela);
0451c93c
MS
1835 }
1836 else
1837 {
1838 h->plt.offset = (bfd_vma) -1;
f5385ebf 1839 h->needs_plt = 0;
5236c819 1840 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c
MS
1841 }
1842 }
1843 else
1844 {
1845 h->plt.offset = (bfd_vma) -1;
f5385ebf 1846 h->needs_plt = 0;
5236c819 1847 elf_s390_adjust_gotplt((struct elf_s390_link_hash_entry *) h);
0451c93c
MS
1848 }
1849
69fc87f1
MS
1850 /* If R_390_TLS_{IE64,GOTIE64,GOTIE12,IEENT} symbol is now local to
1851 the binary, we can optimize a bit. IE64 and GOTIE64 get converted
1852 to R_390_TLS_LE64 requiring no TLS entry. For GOTIE12 and IEENT
1853 we can save the dynamic TLS relocation. */
1854 if (h->got.refcount > 0
0e1862bb 1855 && !bfd_link_pic (info)
69fc87f1
MS
1856 && h->dynindx == -1
1857 && elf_s390_hash_entry(h)->tls_type >= GOT_TLS_IE)
1858 {
1859 if (elf_s390_hash_entry(h)->tls_type == GOT_TLS_IE_NLT)
1860 /* For the GOTIE access without a literal pool entry the offset has
1861 to be stored somewhere. The immediate value in the instruction
1862 is not bit enough so the value is stored in the got. */
1863 {
f41345a7
AK
1864 h->got.offset = htab->elf.sgot->size;
1865 htab->elf.sgot->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1866 }
1867 else
1868 h->got.offset = (bfd_vma) -1;
1869 }
1870 else if (h->got.refcount > 0)
0451c93c
MS
1871 {
1872 asection *s;
b34976b6 1873 bfd_boolean dyn;
69fc87f1 1874 int tls_type = elf_s390_hash_entry(h)->tls_type;
0451c93c
MS
1875
1876 /* Make sure this symbol is output as a dynamic symbol.
1877 Undefined weak syms won't yet be marked as dynamic. */
1878 if (h->dynindx == -1
f5385ebf 1879 && !h->forced_local)
0451c93c 1880 {
c152c796 1881 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1882 return FALSE;
0451c93c
MS
1883 }
1884
f41345a7 1885 s = htab->elf.sgot;
eea6121a
AM
1886 h->got.offset = s->size;
1887 s->size += GOT_ENTRY_SIZE;
69fc87f1
MS
1888 /* R_390_TLS_GD64 needs 2 consecutive GOT slots. */
1889 if (tls_type == GOT_TLS_GD)
eea6121a 1890 s->size += GOT_ENTRY_SIZE;
0451c93c 1891 dyn = htab->elf.dynamic_sections_created;
69fc87f1
MS
1892 /* R_390_TLS_IE64 needs one dynamic relocation,
1893 R_390_TLS_GD64 needs one if local symbol and two if global. */
1894 if ((tls_type == GOT_TLS_GD && h->dynindx == -1)
1895 || tls_type >= GOT_TLS_IE)
f41345a7 1896 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
69fc87f1 1897 else if (tls_type == GOT_TLS_GD)
f41345a7 1898 htab->elf.srelgot->size += 2 * sizeof (Elf64_External_Rela);
82058a73
MS
1899 else if ((ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
1900 || h->root.type != bfd_link_hash_undefweak)
0e1862bb 1901 && (bfd_link_pic (info)
82058a73 1902 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h)))
f41345a7 1903 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
0451c93c
MS
1904 }
1905 else
1906 h->got.offset = (bfd_vma) -1;
1907
0451c93c 1908 if (eh->dyn_relocs == NULL)
b34976b6 1909 return TRUE;
0451c93c
MS
1910
1911 /* In the shared -Bsymbolic case, discard space allocated for
1912 dynamic pc-relative relocs against symbols which turn out to be
1913 defined in regular objects. For the normal shared case, discard
1914 space for pc-relative relocs that have become local due to symbol
1915 visibility changes. */
1916
0e1862bb 1917 if (bfd_link_pic (info))
0451c93c 1918 {
8c21ca21 1919 if (SYMBOL_CALLS_LOCAL (info, h))
0451c93c 1920 {
00d8c7a9 1921 struct elf_dyn_relocs **pp;
0451c93c
MS
1922
1923 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1924 {
1925 p->count -= p->pc_count;
1926 p->pc_count = 0;
1927 if (p->count == 0)
1928 *pp = p->next;
1929 else
1930 pp = &p->next;
1931 }
1932 }
82058a73
MS
1933
1934 /* Also discard relocs on undefined weak syms with non-default
1935 visibility. */
22d606e9 1936 if (eh->dyn_relocs != NULL
82058a73 1937 && h->root.type == bfd_link_hash_undefweak)
22d606e9
AM
1938 {
1939 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
1940 eh->dyn_relocs = NULL;
1941
1942 /* Make sure undefined weak symbols are output as a dynamic
1943 symbol in PIEs. */
1944 else if (h->dynindx == -1
1945 && !h->forced_local)
1946 {
1947 if (! bfd_elf_link_record_dynamic_symbol (info, h))
1948 return FALSE;
1949 }
1950 }
0451c93c 1951 }
64285810 1952 else if (ELIMINATE_COPY_RELOCS)
0451c93c
MS
1953 {
1954 /* For the non-shared case, discard space for relocs against
1955 symbols which turn out to need copy relocs or are not
1956 dynamic. */
1957
f5385ebf
AM
1958 if (!h->non_got_ref
1959 && ((h->def_dynamic
1960 && !h->def_regular)
0451c93c
MS
1961 || (htab->elf.dynamic_sections_created
1962 && (h->root.type == bfd_link_hash_undefweak
1963 || h->root.type == bfd_link_hash_undefined))))
1964 {
1965 /* Make sure this symbol is output as a dynamic symbol.
1966 Undefined weak syms won't yet be marked as dynamic. */
1967 if (h->dynindx == -1
f5385ebf 1968 && !h->forced_local)
0451c93c 1969 {
c152c796 1970 if (! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 1971 return FALSE;
0451c93c
MS
1972 }
1973
1974 /* If that succeeded, we know we'll be keeping all the
1975 relocs. */
1976 if (h->dynindx != -1)
1977 goto keep;
1978 }
1979
1980 eh->dyn_relocs = NULL;
1981
ec338859 1982 keep: ;
0451c93c
MS
1983 }
1984
1985 /* Finally, allocate space. */
1986 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1987 {
1988 asection *sreloc = elf_section_data (p->sec)->sreloc;
eea6121a 1989 sreloc->size += p->count * sizeof (Elf64_External_Rela);
0451c93c
MS
1990 }
1991
b34976b6 1992 return TRUE;
0451c93c
MS
1993}
1994
1995/* Find any dynamic relocs that apply to read-only sections. */
1996
b34976b6 1997static bfd_boolean
2c3fc389 1998readonly_dynrelocs (struct elf_link_hash_entry *h, void * inf)
0451c93c
MS
1999{
2000 struct elf_s390_link_hash_entry *eh;
00d8c7a9 2001 struct elf_dyn_relocs *p;
0451c93c
MS
2002
2003 eh = (struct elf_s390_link_hash_entry *) h;
2004 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2005 {
2006 asection *s = p->sec->output_section;
2007
2008 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2009 {
2010 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2011
2012 info->flags |= DF_TEXTREL;
2013
2014 /* Not an error, just cut short the traversal. */
b34976b6 2015 return FALSE;
0451c93c
MS
2016 }
2017 }
b34976b6 2018 return TRUE;
0451c93c
MS
2019}
2020
a85d7ed0
NC
2021/* Set the sizes of the dynamic sections. */
2022
b34976b6 2023static bfd_boolean
4dfe6ac6
NC
2024elf_s390_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2025 struct bfd_link_info *info)
a85d7ed0 2026{
0451c93c 2027 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2028 bfd *dynobj;
2029 asection *s;
b34976b6 2030 bfd_boolean relocs;
0451c93c 2031 bfd *ibfd;
a85d7ed0 2032
0451c93c 2033 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
2034 if (htab == NULL)
2035 return FALSE;
2036
0451c93c
MS
2037 dynobj = htab->elf.dynobj;
2038 if (dynobj == NULL)
2039 abort ();
a85d7ed0 2040
0451c93c 2041 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2042 {
2043 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2044 if (bfd_link_executable (info) && !info->nointerp)
a85d7ed0 2045 {
3d4d4302 2046 s = bfd_get_linker_section (dynobj, ".interp");
0451c93c
MS
2047 if (s == NULL)
2048 abort ();
eea6121a 2049 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
a85d7ed0
NC
2050 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2051 }
2052 }
a85d7ed0 2053
0451c93c
MS
2054 /* Set up .got offsets for local syms, and space for local dynamic
2055 relocs. */
c72f2fb2 2056 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
a85d7ed0 2057 {
0451c93c
MS
2058 bfd_signed_vma *local_got;
2059 bfd_signed_vma *end_local_got;
69fc87f1 2060 char *local_tls_type;
0451c93c
MS
2061 bfd_size_type locsymcount;
2062 Elf_Internal_Shdr *symtab_hdr;
2063 asection *srela;
470b557a
AK
2064 struct plt_entry *local_plt;
2065 unsigned int i;
a85d7ed0 2066
0ffa91dd 2067 if (! is_s390_elf (ibfd))
a85d7ed0
NC
2068 continue;
2069
0451c93c 2070 for (s = ibfd->sections; s != NULL; s = s->next)
a85d7ed0 2071 {
00d8c7a9 2072 struct elf_dyn_relocs *p;
0451c93c 2073
6edfbbad 2074 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
a85d7ed0 2075 {
ec338859
AM
2076 if (!bfd_is_abs_section (p->sec)
2077 && bfd_is_abs_section (p->sec->output_section))
2078 {
2079 /* Input section has been discarded, either because
2080 it is a copy of a linkonce section or due to
2081 linker script /DISCARD/, so we'll be discarding
2082 the relocs too. */
2083 }
248866a8 2084 else if (p->count != 0)
ec338859
AM
2085 {
2086 srela = elf_section_data (p->sec)->sreloc;
eea6121a 2087 srela->size += p->count * sizeof (Elf64_External_Rela);
248866a8
AM
2088 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2089 info->flags |= DF_TEXTREL;
ec338859 2090 }
a85d7ed0
NC
2091 }
2092 }
0451c93c
MS
2093
2094 local_got = elf_local_got_refcounts (ibfd);
2095 if (!local_got)
2096 continue;
2097
0ffa91dd 2098 symtab_hdr = &elf_symtab_hdr (ibfd);
0451c93c
MS
2099 locsymcount = symtab_hdr->sh_info;
2100 end_local_got = local_got + locsymcount;
69fc87f1 2101 local_tls_type = elf_s390_local_got_tls_type (ibfd);
f41345a7
AK
2102 s = htab->elf.sgot;
2103 srela = htab->elf.srelgot;
69fc87f1 2104 for (; local_got < end_local_got; ++local_got, ++local_tls_type)
a85d7ed0 2105 {
0451c93c 2106 if (*local_got > 0)
a85d7ed0 2107 {
eea6121a
AM
2108 *local_got = s->size;
2109 s->size += GOT_ENTRY_SIZE;
69fc87f1 2110 if (*local_tls_type == GOT_TLS_GD)
eea6121a 2111 s->size += GOT_ENTRY_SIZE;
0e1862bb 2112 if (bfd_link_pic (info))
eea6121a 2113 srela->size += sizeof (Elf64_External_Rela);
a85d7ed0
NC
2114 }
2115 else
0451c93c 2116 *local_got = (bfd_vma) -1;
a85d7ed0 2117 }
470b557a
AK
2118
2119 local_plt = elf_s390_local_plt (ibfd);
2120 for (i = 0; i < symtab_hdr->sh_info; i++)
2121 {
2122 if (local_plt[i].plt.refcount > 0)
2123 {
2124 local_plt[i].plt.offset = htab->elf.iplt->size;
2125 htab->elf.iplt->size += PLT_ENTRY_SIZE;
2126 htab->elf.igotplt->size += GOT_ENTRY_SIZE;
2127 htab->elf.irelplt->size += sizeof (Elf64_External_Rela);
2128 }
2129 else
2130 local_plt[i].plt.offset = (bfd_vma) -1;
2131 }
0451c93c
MS
2132 }
2133
69fc87f1
MS
2134 if (htab->tls_ldm_got.refcount > 0)
2135 {
2136 /* Allocate 2 got entries and 1 dynamic reloc for R_390_TLS_LDM64
2137 relocs. */
f41345a7
AK
2138 htab->tls_ldm_got.offset = htab->elf.sgot->size;
2139 htab->elf.sgot->size += 2 * GOT_ENTRY_SIZE;
2140 htab->elf.srelgot->size += sizeof (Elf64_External_Rela);
69fc87f1
MS
2141 }
2142 else
2143 htab->tls_ldm_got.offset = -1;
2144
0451c93c
MS
2145 /* Allocate global sym .plt and .got entries, and space for global
2146 sym dynamic relocs. */
2c3fc389 2147 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
0451c93c
MS
2148
2149 /* We now have determined the sizes of the various dynamic sections.
2150 Allocate memory for them. */
b34976b6 2151 relocs = FALSE;
0451c93c
MS
2152 for (s = dynobj->sections; s != NULL; s = s->next)
2153 {
2154 if ((s->flags & SEC_LINKER_CREATED) == 0)
2155 continue;
2156
f41345a7
AK
2157 if (s == htab->elf.splt
2158 || s == htab->elf.sgot
2159 || s == htab->elf.sgotplt
470b557a
AK
2160 || s == htab->sdynbss
2161 || s == htab->elf.iplt
2162 || s == htab->elf.igotplt
2163 || s == htab->irelifunc)
0451c93c
MS
2164 {
2165 /* Strip this section if we don't need it; see the
2166 comment below. */
2167 }
0112cd26 2168 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
0451c93c 2169 {
f41345a7 2170 if (s->size != 0 && s != htab->elf.srelplt)
b34976b6 2171 relocs = TRUE;
ec338859 2172
0451c93c
MS
2173 /* We use the reloc_count field as a counter if we need
2174 to copy relocs into the output file. */
2175 s->reloc_count = 0;
2176 }
2177 else
a85d7ed0
NC
2178 {
2179 /* It's not one of our sections, so don't allocate space. */
2180 continue;
2181 }
2182
eea6121a 2183 if (s->size == 0)
a85d7ed0 2184 {
0451c93c
MS
2185 /* If we don't need this section, strip it from the
2186 output file. This is to handle .rela.bss and
2187 .rela.plt. We must create it in
2188 create_dynamic_sections, because it must be created
2189 before the linker maps input sections to output
2190 sections. The linker does that before
2191 adjust_dynamic_symbol is called, and it is that
2192 function which decides whether anything needs to go
2193 into these sections. */
2194
8423293d 2195 s->flags |= SEC_EXCLUDE;
a85d7ed0
NC
2196 continue;
2197 }
2198
c456f082
AM
2199 if ((s->flags & SEC_HAS_CONTENTS) == 0)
2200 continue;
2201
0451c93c
MS
2202 /* Allocate memory for the section contents. We use bfd_zalloc
2203 here in case unused entries are not reclaimed before the
2204 section's contents are written out. This should not happen,
2205 but this way if it does, we get a R_390_NONE reloc instead
2206 of garbage. */
eea6121a 2207 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->size);
0451c93c 2208 if (s->contents == NULL)
b34976b6 2209 return FALSE;
a85d7ed0
NC
2210 }
2211
0451c93c 2212 if (htab->elf.dynamic_sections_created)
a85d7ed0
NC
2213 {
2214 /* Add some entries to the .dynamic section. We fill in the
2215 values later, in elf_s390_finish_dynamic_sections, but we
2216 must add the entries now so that we get the correct size for
2217 the .dynamic section. The DT_DEBUG entry is filled in by the
2218 dynamic linker and used by the debugger. */
dc810e39 2219#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2220 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39 2221
0e1862bb 2222 if (bfd_link_executable (info))
a85d7ed0 2223 {
dc810e39 2224 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2225 return FALSE;
a85d7ed0
NC
2226 }
2227
f41345a7 2228 if (htab->elf.splt->size != 0)
a85d7ed0 2229 {
dc810e39
AM
2230 if (!add_dynamic_entry (DT_PLTGOT, 0)
2231 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2232 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2233 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2234 return FALSE;
a85d7ed0
NC
2235 }
2236
2237 if (relocs)
947216bf
AM
2238 {
2239 if (!add_dynamic_entry (DT_RELA, 0)
2240 || !add_dynamic_entry (DT_RELASZ, 0)
2241 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 2242 return FALSE;
ec338859 2243
0451c93c
MS
2244 /* If any dynamic relocs apply to a read-only section,
2245 then we need a DT_TEXTREL entry. */
248866a8
AM
2246 if ((info->flags & DF_TEXTREL) == 0)
2247 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2c3fc389 2248 info);
ec338859 2249
0451c93c
MS
2250 if ((info->flags & DF_TEXTREL) != 0)
2251 {
2252 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2253 return FALSE;
0451c93c 2254 }
a85d7ed0
NC
2255 }
2256 }
dc810e39 2257#undef add_dynamic_entry
a85d7ed0 2258
b34976b6 2259 return TRUE;
a85d7ed0
NC
2260}
2261
69fc87f1
MS
2262/* Return the base VMA address which should be subtracted from real addresses
2263 when resolving @dtpoff relocation.
2264 This is PT_TLS segment p_vaddr. */
2265
2266static bfd_vma
2c3fc389 2267dtpoff_base (struct bfd_link_info *info)
69fc87f1 2268{
e1918d23
AM
2269 /* If tls_sec is NULL, we should have signalled an error already. */
2270 if (elf_hash_table (info)->tls_sec == NULL)
69fc87f1 2271 return 0;
e1918d23 2272 return elf_hash_table (info)->tls_sec->vma;
69fc87f1
MS
2273}
2274
2275/* Return the relocation value for @tpoff relocation
2276 if STT_TLS virtual address is ADDRESS. */
2277
2278static bfd_vma
2c3fc389 2279tpoff (struct bfd_link_info *info, bfd_vma address)
69fc87f1 2280{
e1918d23 2281 struct elf_link_hash_table *htab = elf_hash_table (info);
69fc87f1 2282
e1918d23
AM
2283 /* If tls_sec is NULL, we should have signalled an error already. */
2284 if (htab->tls_sec == NULL)
69fc87f1 2285 return 0;
e1918d23 2286 return htab->tls_size + htab->tls_sec->vma - address;
69fc87f1
MS
2287}
2288
2289/* Complain if TLS instruction relocation is against an invalid
2290 instruction. */
2291
2292static void
2c3fc389
NC
2293invalid_tls_insn (bfd *input_bfd,
2294 asection *input_section,
2295 Elf_Internal_Rela *rel)
69fc87f1
MS
2296{
2297 reloc_howto_type *howto;
2298
2299 howto = elf_howto_table + ELF64_R_TYPE (rel->r_info);
4eca0228 2300 _bfd_error_handler
695344c0 2301 /* xgettext:c-format */
d003868e
AM
2302 (_("%B(%A+0x%lx): invalid instruction for TLS relocation %s"),
2303 input_bfd,
2304 input_section,
69fc87f1
MS
2305 (long) rel->r_offset,
2306 howto->name);
77df2968 2307 bfd_set_error (bfd_error_bad_value);
69fc87f1
MS
2308}
2309
a85d7ed0
NC
2310/* Relocate a 390 ELF section. */
2311
b34976b6 2312static bfd_boolean
4dfe6ac6
NC
2313elf_s390_relocate_section (bfd *output_bfd,
2314 struct bfd_link_info *info,
2315 bfd *input_bfd,
2316 asection *input_section,
2317 bfd_byte *contents,
2318 Elf_Internal_Rela *relocs,
2319 Elf_Internal_Sym *local_syms,
2320 asection **local_sections)
a85d7ed0 2321{
0451c93c 2322 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
2323 Elf_Internal_Shdr *symtab_hdr;
2324 struct elf_link_hash_entry **sym_hashes;
2325 bfd_vma *local_got_offsets;
a85d7ed0
NC
2326 Elf_Internal_Rela *rel;
2327 Elf_Internal_Rela *relend;
2328
0ffa91dd
NC
2329 BFD_ASSERT (is_s390_elf (input_bfd));
2330
0451c93c 2331 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
2332 if (htab == NULL)
2333 return FALSE;
2334
0ffa91dd 2335 symtab_hdr = &elf_symtab_hdr (input_bfd);
a85d7ed0
NC
2336 sym_hashes = elf_sym_hashes (input_bfd);
2337 local_got_offsets = elf_local_got_offsets (input_bfd);
2338
a85d7ed0
NC
2339 rel = relocs;
2340 relend = relocs + input_section->reloc_count;
2341 for (; rel < relend; rel++)
2342 {
5236c819 2343 unsigned int r_type;
a85d7ed0
NC
2344 reloc_howto_type *howto;
2345 unsigned long r_symndx;
2346 struct elf_link_hash_entry *h;
2347 Elf_Internal_Sym *sym;
2348 asection *sec;
0451c93c 2349 bfd_vma off;
a85d7ed0 2350 bfd_vma relocation;
b34976b6 2351 bfd_boolean unresolved_reloc;
a85d7ed0 2352 bfd_reloc_status_type r;
69fc87f1 2353 int tls_type;
470b557a 2354 asection *base_got = htab->elf.sgot;
a85d7ed0
NC
2355
2356 r_type = ELF64_R_TYPE (rel->r_info);
0451c93c 2357 if (r_type == (int) R_390_GNU_VTINHERIT
947216bf
AM
2358 || r_type == (int) R_390_GNU_VTENTRY)
2359 continue;
5236c819 2360 if (r_type >= (int) R_390_max)
a85d7ed0
NC
2361 {
2362 bfd_set_error (bfd_error_bad_value);
b34976b6 2363 return FALSE;
a85d7ed0 2364 }
a85d7ed0 2365
b491616a 2366 howto = elf_howto_table + r_type;
a85d7ed0 2367 r_symndx = ELF64_R_SYM (rel->r_info);
5236c819 2368
a85d7ed0
NC
2369 h = NULL;
2370 sym = NULL;
2371 sec = NULL;
b34976b6 2372 unresolved_reloc = FALSE;
a85d7ed0
NC
2373 if (r_symndx < symtab_hdr->sh_info)
2374 {
2375 sym = local_syms + r_symndx;
2376 sec = local_sections[r_symndx];
470b557a
AK
2377
2378 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
2379 {
2380 struct plt_entry *local_plt = elf_s390_local_plt (input_bfd);
2381 if (local_plt == NULL)
2382 return FALSE;
2383
2384 /* Address of the PLT slot. */
2385 relocation = (htab->elf.iplt->output_section->vma
2386 + htab->elf.iplt->output_offset
2387 + local_plt[r_symndx].plt.offset);
2388
2389 switch (r_type)
2390 {
31db78f6
AK
2391 case R_390_PLTOFF16:
2392 case R_390_PLTOFF32:
2393 case R_390_PLTOFF64:
2394 relocation -= htab->elf.sgot->output_section->vma;
2395 break;
470b557a
AK
2396 case R_390_GOTPLT12:
2397 case R_390_GOTPLT16:
2398 case R_390_GOTPLT20:
2399 case R_390_GOTPLT32:
2400 case R_390_GOTPLT64:
2401 case R_390_GOTPLTENT:
2402 case R_390_GOT12:
2403 case R_390_GOT16:
2404 case R_390_GOT20:
2405 case R_390_GOT32:
2406 case R_390_GOT64:
2407 case R_390_GOTENT:
2408 {
2409 /* Write the PLT slot address into the GOT slot. */
2410 bfd_put_64 (output_bfd, relocation,
2411 htab->elf.sgot->contents +
2412 local_got_offsets[r_symndx]);
2413 relocation = (local_got_offsets[r_symndx] +
2414 htab->elf.sgot->output_offset);
2415
2416 if (r_type == R_390_GOTENT || r_type == R_390_GOTPLTENT)
2417 relocation += htab->elf.sgot->output_section->vma;
2418 break;
2419 }
2420 default:
2421 break;
2422 }
2423 /* The output section is needed later in
2424 finish_dynamic_section when creating the dynamic
2425 relocation. */
2426 local_plt[r_symndx].sec = sec;
2427 goto do_relocation;
2428 }
2429 else
2430 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
a85d7ed0
NC
2431 }
2432 else
2433 {
560e09e9 2434 bfd_boolean warned ATTRIBUTE_UNUSED;
62d887d4 2435 bfd_boolean ignored ATTRIBUTE_UNUSED;
0451c93c 2436
b2a8e766
AM
2437 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
2438 r_symndx, symtab_hdr, sym_hashes,
2439 h, sec, relocation,
62d887d4 2440 unresolved_reloc, warned, ignored);
a85d7ed0
NC
2441 }
2442
dbaa2011 2443 if (sec != NULL && discarded_section (sec))
e4067dbb 2444 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b 2445 rel, 1, relend, howto, 0, contents);
ab96bf03 2446
0e1862bb 2447 if (bfd_link_relocatable (info))
ab96bf03
AM
2448 continue;
2449
a85d7ed0
NC
2450 switch (r_type)
2451 {
5236c819
MS
2452 case R_390_GOTPLT12:
2453 case R_390_GOTPLT16:
bd1ea41b 2454 case R_390_GOTPLT20:
5236c819
MS
2455 case R_390_GOTPLT32:
2456 case R_390_GOTPLT64:
2457 case R_390_GOTPLTENT:
2458 /* There are three cases for a GOTPLT relocation. 1) The
2459 relocation is against the jump slot entry of a plt that
2460 will get emitted to the output file. 2) The relocation
2461 is against the jump slot of a plt entry that has been
2462 removed. elf_s390_adjust_gotplt has created a GOT entry
2463 as replacement. 3) The relocation is against a local symbol.
2464 Cases 2) and 3) are the same as the GOT relocation code
2465 so we just have to test for case 1 and fall through for
2466 the other two. */
2467 if (h != NULL && h->plt.offset != (bfd_vma) -1)
2468 {
2469 bfd_vma plt_index;
2470
470b557a
AK
2471 if (s390_is_ifunc_symbol_p (h))
2472 {
2473 plt_index = h->plt.offset / PLT_ENTRY_SIZE;
2474 relocation = (plt_index * GOT_ENTRY_SIZE +
2475 htab->elf.igotplt->output_offset);
2476 if (r_type == R_390_GOTPLTENT)
2477 relocation += htab->elf.igotplt->output_section->vma;
2478 }
2479 else
2480 {
2481 /* Calc. index no.
2482 Current offset - size first entry / entry size. */
2483 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) /
2484 PLT_ENTRY_SIZE;
2485
2486 /* Offset in GOT is PLT index plus GOT headers(3)
3b67f094 2487 times 8, addr & GOT addr. */
470b557a
AK
2488 relocation = (plt_index + 3) * GOT_ENTRY_SIZE;
2489 if (r_type == R_390_GOTPLTENT)
2490 relocation += htab->elf.sgot->output_section->vma;
2491 }
5236c819 2492 unresolved_reloc = FALSE;
5236c819
MS
2493 break;
2494 }
2495 /* Fall through. */
2496
947216bf
AM
2497 case R_390_GOT12:
2498 case R_390_GOT16:
bd1ea41b 2499 case R_390_GOT20:
947216bf
AM
2500 case R_390_GOT32:
2501 case R_390_GOT64:
2502 case R_390_GOTENT:
2503 /* Relocation is to the entry for this symbol in the global
2504 offset table. */
470b557a 2505 if (base_got == NULL)
0451c93c 2506 abort ();
a85d7ed0 2507
947216bf
AM
2508 if (h != NULL)
2509 {
b34976b6 2510 bfd_boolean dyn;
a85d7ed0 2511
947216bf 2512 off = h->got.offset;
0451c93c 2513 dyn = htab->elf.dynamic_sections_created;
470b557a
AK
2514
2515 if (s390_is_ifunc_symbol_p (h))
2516 {
2517 BFD_ASSERT (h->plt.offset != (bfd_vma) -1);
2518 if (off == (bfd_vma)-1)
2519 {
2520 /* No explicit GOT usage so redirect to the
2521 got.iplt slot. */
2522 base_got = htab->elf.igotplt;
2523 off = h->plt.offset / PLT_ENTRY_SIZE * GOT_ENTRY_SIZE;
2524 }
2525 else
2526 {
2527 /* Explicit GOT slots must contain the address
2528 of the PLT slot. This will be handled in
2529 finish_dynamic_symbol. */
2530 }
2531 }
0e1862bb
L
2532 else if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
2533 bfd_link_pic (info),
2534 h)
2535 || (bfd_link_pic (info)
470b557a
AK
2536 && SYMBOL_REFERENCES_LOCAL (info, h))
2537 || (ELF_ST_VISIBILITY (h->other)
2538 && h->root.type == bfd_link_hash_undefweak))
947216bf
AM
2539 {
2540 /* This is actually a static link, or it is a
2541 -Bsymbolic link and the symbol is defined
2542 locally, or the symbol was forced to be local
2543 because of a version file. We must initialize
2544 this entry in the global offset table. Since the
2545 offset must always be a multiple of 2, we use the
2546 least significant bit to record whether we have
2547 initialized it already.
2548
2549 When doing a dynamic link, we create a .rel.got
2550 relocation entry to initialize the value. This
2551 is done in the finish_dynamic_symbol routine. */
2552 if ((off & 1) != 0)
2553 off &= ~1;
2554 else
2555 {
a85d7ed0 2556 bfd_put_64 (output_bfd, relocation,
470b557a 2557 base_got->contents + off);
947216bf
AM
2558 h->got.offset |= 1;
2559 }
a63cc5f7
AK
2560
2561 if ((h->def_regular
0e1862bb 2562 && bfd_link_pic (info)
a63cc5f7
AK
2563 && SYMBOL_REFERENCES_LOCAL (info, h))
2564 /* lgrl rx,sym@GOTENT -> larl rx, sym */
2565 && ((r_type == R_390_GOTENT
2566 && (bfd_get_16 (input_bfd,
2567 contents + rel->r_offset - 2)
2568 & 0xff0f) == 0xc408)
2569 /* lg rx, sym@GOT(r12) -> larl rx, sym */
2570 || (r_type == R_390_GOT20
2571 && (bfd_get_32 (input_bfd,
2572 contents + rel->r_offset - 2)
2573 & 0xff00f000) == 0xe300c000
2574 && bfd_get_8 (input_bfd,
2575 contents + rel->r_offset + 3) == 0x04)))
2576
2577 {
2578 unsigned short new_insn =
2579 (0xc000 | (bfd_get_8 (input_bfd,
2580 contents + rel->r_offset - 1) & 0xf0));
2581 bfd_put_16 (output_bfd, new_insn,
2582 contents + rel->r_offset - 2);
2583 r_type = R_390_PC32DBL;
2584 rel->r_addend = 2;
2585 howto = elf_howto_table + r_type;
2586 relocation = h->root.u.def.value
2587 + h->root.u.def.section->output_section->vma
2588 + h->root.u.def.section->output_offset;
2589 goto do_relocation;
2590 }
947216bf 2591 }
0451c93c 2592 else
b34976b6 2593 unresolved_reloc = FALSE;
947216bf
AM
2594 }
2595 else
2596 {
0451c93c
MS
2597 if (local_got_offsets == NULL)
2598 abort ();
a85d7ed0 2599
947216bf 2600 off = local_got_offsets[r_symndx];
a85d7ed0 2601
947216bf
AM
2602 /* The offset must always be a multiple of 8. We use
2603 the least significant bit to record whether we have
2604 already generated the necessary reloc. */
2605 if ((off & 1) != 0)
2606 off &= ~1;
2607 else
2608 {
2609 bfd_put_64 (output_bfd, relocation,
f41345a7 2610 htab->elf.sgot->contents + off);
a85d7ed0 2611
0e1862bb 2612 if (bfd_link_pic (info))
947216bf
AM
2613 {
2614 asection *s;
2615 Elf_Internal_Rela outrel;
2616 bfd_byte *loc;
a85d7ed0 2617
f41345a7 2618 s = htab->elf.srelgot;
947216bf 2619 if (s == NULL)
0451c93c 2620 abort ();
a85d7ed0 2621
f41345a7
AK
2622 outrel.r_offset = (htab->elf.sgot->output_section->vma
2623 + htab->elf.sgot->output_offset
947216bf
AM
2624 + off);
2625 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
a85d7ed0 2626 outrel.r_addend = relocation;
947216bf
AM
2627 loc = s->contents;
2628 loc += s->reloc_count++ * sizeof (Elf64_External_Rela);
2629 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
2630 }
a85d7ed0 2631
947216bf
AM
2632 local_got_offsets[r_symndx] |= 1;
2633 }
2634 }
a85d7ed0 2635
0451c93c
MS
2636 if (off >= (bfd_vma) -2)
2637 abort ();
2638
470b557a 2639 relocation = base_got->output_offset + off;
0451c93c 2640
ae9a127f
NC
2641 /* For @GOTENT the relocation is against the offset between
2642 the instruction and the symbols entry in the GOT and not
2643 between the start of the GOT and the symbols entry. We
2644 add the vma of the GOT to get the correct value. */
5236c819
MS
2645 if ( r_type == R_390_GOTENT
2646 || r_type == R_390_GOTPLTENT)
470b557a 2647 relocation += base_got->output_section->vma;
a85d7ed0 2648
947216bf 2649 break;
99c79b2e 2650
5236c819
MS
2651 case R_390_GOTOFF16:
2652 case R_390_GOTOFF32:
2653 case R_390_GOTOFF64:
947216bf
AM
2654 /* Relocation is relative to the start of the global offset
2655 table. */
a85d7ed0 2656
d47b13e0
AK
2657 if (h != NULL
2658 && s390_is_ifunc_symbol_p (h)
2659 && h->def_regular
2660 && !bfd_link_executable (info))
2661 {
2662 relocation = (htab->elf.iplt->output_section->vma
2663 + htab->elf.iplt->output_offset
2664 + h->plt.offset
2665 - htab->elf.sgot->output_section->vma);
2666 goto do_relocation;
2667 }
2668
947216bf
AM
2669 /* Note that sgot->output_offset is not involved in this
2670 calculation. We always want the start of .got. If we
2671 defined _GLOBAL_OFFSET_TABLE in a different way, as is
2672 permitted by the ABI, we might have to change this
2673 calculation. */
f41345a7 2674 relocation -= htab->elf.sgot->output_section->vma;
947216bf 2675 break;
a85d7ed0 2676
947216bf 2677 case R_390_GOTPC:
a85d7ed0 2678 case R_390_GOTPCDBL:
947216bf 2679 /* Use global offset table as symbol value. */
f41345a7 2680 relocation = htab->elf.sgot->output_section->vma;
b34976b6 2681 unresolved_reloc = FALSE;
947216bf 2682 break;
a85d7ed0 2683
fb798c50 2684 case R_390_PLT12DBL:
947216bf 2685 case R_390_PLT16DBL:
fb798c50 2686 case R_390_PLT24DBL:
947216bf
AM
2687 case R_390_PLT32:
2688 case R_390_PLT32DBL:
2689 case R_390_PLT64:
2690 /* Relocation is to the entry for this symbol in the
2691 procedure linkage table. */
a85d7ed0 2692
947216bf
AM
2693 /* Resolve a PLT32 reloc against a local symbol directly,
2694 without using the procedure linkage table. */
2695 if (h == NULL)
2696 break;
a85d7ed0 2697
947216bf 2698 if (h->plt.offset == (bfd_vma) -1
31db78f6 2699 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
947216bf
AM
2700 {
2701 /* We didn't make a PLT entry for this symbol. This
2702 happens when statically linking PIC code, or when
2703 using -Bsymbolic. */
2704 break;
2705 }
470b557a
AK
2706 if (s390_is_ifunc_symbol_p (h))
2707 relocation = (htab->elf.iplt->output_section->vma
2708 + htab->elf.iplt->output_offset
2709 + h->plt.offset);
2710 else
2711 relocation = (htab->elf.splt->output_section->vma
2712 + htab->elf.splt->output_offset
2713 + h->plt.offset);
b34976b6 2714 unresolved_reloc = FALSE;
26e41594 2715 break;
5236c819
MS
2716
2717 case R_390_PLTOFF16:
2718 case R_390_PLTOFF32:
2719 case R_390_PLTOFF64:
26e41594
AM
2720 /* Relocation is to the entry for this symbol in the
2721 procedure linkage table relative to the start of the GOT. */
5236c819
MS
2722
2723 /* For local symbols or if we didn't make a PLT entry for
2724 this symbol resolve the symbol directly. */
31db78f6 2725 if (h == NULL
5236c819 2726 || h->plt.offset == (bfd_vma) -1
31db78f6 2727 || (htab->elf.splt == NULL && !s390_is_ifunc_symbol_p (h)))
5236c819 2728 {
f41345a7 2729 relocation -= htab->elf.sgot->output_section->vma;
5236c819
MS
2730 break;
2731 }
2732
470b557a
AK
2733 if (s390_is_ifunc_symbol_p (h))
2734 relocation = (htab->elf.iplt->output_section->vma
2735 + htab->elf.iplt->output_offset
2736 + h->plt.offset
2737 - htab->elf.sgot->output_section->vma);
2738 else
2739 relocation = (htab->elf.splt->output_section->vma
2740 + htab->elf.splt->output_offset
2741 + h->plt.offset
2742 - htab->elf.sgot->output_section->vma);
5236c819 2743 unresolved_reloc = FALSE;
947216bf
AM
2744 break;
2745
947216bf 2746 case R_390_PC16:
fb798c50 2747 case R_390_PC12DBL:
947216bf 2748 case R_390_PC16DBL:
fb798c50 2749 case R_390_PC24DBL:
947216bf 2750 case R_390_PC32:
a85d7ed0 2751 case R_390_PC32DBL:
947216bf 2752 case R_390_PC64:
99ba5125
AK
2753 /* The target of these relocs are instruction operands
2754 residing in read-only sections. We cannot emit a runtime
2755 reloc for it. */
2756 if (h != NULL
2757 && s390_is_ifunc_symbol_p (h)
2758 && h->def_regular
2759 && bfd_link_pic (info))
2760 {
2761 relocation = (htab->elf.iplt->output_section->vma
2762 + htab->elf.iplt->output_offset
2763 + h->plt.offset);
2764 goto do_relocation;
2765 }
1a0670f3 2766 /* Fall through. */
99ba5125
AK
2767
2768 case R_390_8:
2769 case R_390_16:
2770 case R_390_32:
2771 case R_390_64:
470b557a
AK
2772
2773 if (h != NULL
2774 && s390_is_ifunc_symbol_p (h)
2775 && h->def_regular)
2776 {
0e1862bb 2777 if (!bfd_link_pic (info) || !h->non_got_ref)
470b557a
AK
2778 {
2779 /* For a non-shared object STT_GNU_IFUNC symbol must
2780 go through PLT. */
2781 relocation = (htab->elf.iplt->output_section->vma
2782 + htab->elf.iplt->output_offset
2783 + h ->plt.offset);
2784 goto do_relocation;
2785 }
2786 else
2787 {
2788 /* For shared objects a runtime relocation is needed. */
2789
2790 Elf_Internal_Rela outrel;
2791 asection *sreloc;
2792
2793 /* Need a dynamic relocation to get the real function
2794 address. */
2795 outrel.r_offset = _bfd_elf_section_offset (output_bfd,
2796 info,
2797 input_section,
2798 rel->r_offset);
2799 if (outrel.r_offset == (bfd_vma) -1
2800 || outrel.r_offset == (bfd_vma) -2)
2801 abort ();
2802
2803 outrel.r_offset += (input_section->output_section->vma
2804 + input_section->output_offset);
2805
2806 if (h->dynindx == -1
2807 || h->forced_local
0e1862bb 2808 || bfd_link_executable (info))
470b557a
AK
2809 {
2810 /* This symbol is resolved locally. */
2811 outrel.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
2812 outrel.r_addend = (h->root.u.def.value
2813 + h->root.u.def.section->output_section->vma
2814 + h->root.u.def.section->output_offset);
2815 }
2816 else
2817 {
2818 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
2819 outrel.r_addend = 0;
2820 }
2821
2822 sreloc = htab->elf.irelifunc;
2823 elf_append_rela (output_bfd, sreloc, &outrel);
2824
2825 /* If this reloc is against an external symbol, we
2826 do not want to fiddle with the addend. Otherwise,
2827 we need to include the symbol value so that it
2828 becomes an addend for the dynamic reloc. For an
2829 internal symbol, we have updated addend. */
2830 continue;
2831 }
2832 }
2833
b1e24c02 2834 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
2835 break;
2836
0e1862bb 2837 if ((bfd_link_pic (info)
82058a73
MS
2838 && (h == NULL
2839 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
2840 || h->root.type != bfd_link_hash_undefweak)
0451c93c 2841 && ((r_type != R_390_PC16
fb798c50 2842 && r_type != R_390_PC12DBL
0451c93c 2843 && r_type != R_390_PC16DBL
fb798c50 2844 && r_type != R_390_PC24DBL
0451c93c
MS
2845 && r_type != R_390_PC32
2846 && r_type != R_390_PC32DBL
2847 && r_type != R_390_PC64)
8c21ca21 2848 || !SYMBOL_CALLS_LOCAL (info, h)))
64285810 2849 || (ELIMINATE_COPY_RELOCS
0e1862bb 2850 && !bfd_link_pic (info)
0451c93c
MS
2851 && h != NULL
2852 && h->dynindx != -1
f5385ebf
AM
2853 && !h->non_got_ref
2854 && ((h->def_dynamic
2855 && !h->def_regular)
0451c93c
MS
2856 || h->root.type == bfd_link_hash_undefweak
2857 || h->root.type == bfd_link_hash_undefined)))
947216bf
AM
2858 {
2859 Elf_Internal_Rela outrel;
b34976b6 2860 bfd_boolean skip, relocate;
0451c93c 2861 asection *sreloc;
947216bf 2862 bfd_byte *loc;
a85d7ed0 2863
947216bf
AM
2864 /* When generating a shared object, these relocations
2865 are copied into the output file to be resolved at run
2866 time. */
b34976b6
AM
2867 skip = FALSE;
2868 relocate = FALSE;
a85d7ed0 2869
c629eae0
JJ
2870 outrel.r_offset =
2871 _bfd_elf_section_offset (output_bfd, info, input_section,
2872 rel->r_offset);
2873 if (outrel.r_offset == (bfd_vma) -1)
b34976b6 2874 skip = TRUE;
0bb2d96a 2875 else if (outrel.r_offset == (bfd_vma) -2)
b34976b6 2876 skip = TRUE, relocate = TRUE;
a85d7ed0 2877
947216bf
AM
2878 outrel.r_offset += (input_section->output_section->vma
2879 + input_section->output_offset);
a85d7ed0 2880
947216bf 2881 if (skip)
0bb2d96a 2882 memset (&outrel, 0, sizeof outrel);
947216bf 2883 else if (h != NULL
0451c93c
MS
2884 && h->dynindx != -1
2885 && (r_type == R_390_PC16
fb798c50 2886 || r_type == R_390_PC12DBL
0451c93c 2887 || r_type == R_390_PC16DBL
fb798c50 2888 || r_type == R_390_PC24DBL
0451c93c
MS
2889 || r_type == R_390_PC32
2890 || r_type == R_390_PC32DBL
2891 || r_type == R_390_PC64
0e1862bb 2892 || !bfd_link_pic (info)
8c21ca21 2893 || !SYMBOLIC_BIND (info, h)
f5385ebf 2894 || !h->def_regular))
947216bf
AM
2895 {
2896 outrel.r_info = ELF64_R_INFO (h->dynindx, r_type);
27018c3f 2897 outrel.r_addend = rel->r_addend;
947216bf
AM
2898 }
2899 else
2900 {
0451c93c 2901 /* This symbol is local, or marked to become local. */
90ced0dd 2902 outrel.r_addend = relocation + rel->r_addend;
b5727d75
MS
2903 if (r_type == R_390_64)
2904 {
2905 relocate = TRUE;
2906 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
b5727d75
MS
2907 }
2908 else
2909 {
2910 long sindx;
2911
90ced0dd 2912 if (bfd_is_abs_section (sec))
b5727d75
MS
2913 sindx = 0;
2914 else if (sec == NULL || sec->owner == NULL)
2915 {
2916 bfd_set_error(bfd_error_bad_value);
2917 return FALSE;
2918 }
2919 else
2920 {
2921 asection *osec;
2922
2923 osec = sec->output_section;
2924 sindx = elf_section_data (osec)->dynindx;
74541ad4
AM
2925
2926 if (sindx == 0)
2927 {
2928 osec = htab->elf.text_index_section;
2929 sindx = elf_section_data (osec)->dynindx;
2930 }
2931 BFD_ASSERT (sindx != 0);
90ced0dd
MS
2932
2933 /* We are turning this relocation into one
2934 against a section symbol, so subtract out
2935 the output section's address but not the
2936 offset of the input section in the output
2937 section. */
90ced0dd 2938 outrel.r_addend -= osec->vma;
b5727d75
MS
2939 }
2940 outrel.r_info = ELF64_R_INFO (sindx, r_type);
b5727d75 2941 }
0451c93c 2942 }
a85d7ed0 2943
0451c93c
MS
2944 sreloc = elf_section_data (input_section)->sreloc;
2945 if (sreloc == NULL)
2946 abort ();
2947
947216bf
AM
2948 loc = sreloc->contents;
2949 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2950 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
a85d7ed0 2951
947216bf
AM
2952 /* If this reloc is against an external symbol, we do
2953 not want to fiddle with the addend. Otherwise, we
2954 need to include the symbol value so that it becomes
2955 an addend for the dynamic reloc. */
2956 if (! relocate)
2957 continue;
2958 }
a85d7ed0 2959
947216bf 2960 break;
a85d7ed0 2961
69fc87f1
MS
2962 /* Relocations for tls literal pool entries. */
2963 case R_390_TLS_IE64:
0e1862bb 2964 if (bfd_link_pic (info))
69fc87f1
MS
2965 {
2966 Elf_Internal_Rela outrel;
2967 asection *sreloc;
2968 bfd_byte *loc;
2969
2970 outrel.r_offset = rel->r_offset
2971 + input_section->output_section->vma
2972 + input_section->output_offset;
2973 outrel.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
2974 sreloc = elf_section_data (input_section)->sreloc;
2975 if (sreloc == NULL)
2976 abort ();
2977 loc = sreloc->contents;
2978 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
2979 bfd_elf64_swap_reloc_out (output_bfd, &outrel, loc);
2980 }
ae9a127f 2981 /* Fall through. */
69fc87f1
MS
2982
2983 case R_390_TLS_GD64:
2984 case R_390_TLS_GOTIE64:
2985 r_type = elf_s390_tls_transition (info, r_type, h == NULL);
2986 tls_type = GOT_UNKNOWN;
2987 if (h == NULL && local_got_offsets)
2988 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
2989 else if (h != NULL)
2990 {
2991 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb 2992 if (!bfd_link_pic (info) && h->dynindx == -1 && tls_type >= GOT_TLS_IE)
69fc87f1
MS
2993 r_type = R_390_TLS_LE64;
2994 }
2995 if (r_type == R_390_TLS_GD64 && tls_type >= GOT_TLS_IE)
2996 r_type = R_390_TLS_IE64;
2997
2998 if (r_type == R_390_TLS_LE64)
2999 {
3000 /* This relocation gets optimized away by the local exec
3001 access optimization. */
3002 BFD_ASSERT (! unresolved_reloc);
3003 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3004 contents + rel->r_offset);
3005 continue;
3006 }
3007
f41345a7 3008 if (htab->elf.sgot == NULL)
69fc87f1
MS
3009 abort ();
3010
3011 if (h != NULL)
3012 off = h->got.offset;
3013 else
3014 {
3015 if (local_got_offsets == NULL)
3016 abort ();
3017
3018 off = local_got_offsets[r_symndx];
3019 }
3020
3021 emit_tls_relocs:
3022
3023 if ((off & 1) != 0)
3024 off &= ~1;
26e41594 3025 else
69fc87f1
MS
3026 {
3027 Elf_Internal_Rela outrel;
3028 bfd_byte *loc;
3029 int dr_type, indx;
3030
f41345a7 3031 if (htab->elf.srelgot == NULL)
69fc87f1
MS
3032 abort ();
3033
f41345a7
AK
3034 outrel.r_offset = (htab->elf.sgot->output_section->vma
3035 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
3036
3037 indx = h && h->dynindx != -1 ? h->dynindx : 0;
3038 if (r_type == R_390_TLS_GD64)
3039 dr_type = R_390_TLS_DTPMOD;
3040 else
3041 dr_type = R_390_TLS_TPOFF;
3042 if (dr_type == R_390_TLS_TPOFF && indx == 0)
3043 outrel.r_addend = relocation - dtpoff_base (info);
3044 else
3045 outrel.r_addend = 0;
3046 outrel.r_info = ELF64_R_INFO (indx, dr_type);
f41345a7
AK
3047 loc = htab->elf.srelgot->contents;
3048 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
3049 * sizeof (Elf64_External_Rela);
3050 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3051
3052 if (r_type == R_390_TLS_GD64)
3053 {
3054 if (indx == 0)
3055 {
3056 BFD_ASSERT (! unresolved_reloc);
3057 bfd_put_64 (output_bfd,
3058 relocation - dtpoff_base (info),
f41345a7 3059 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
3060 }
3061 else
3062 {
3063 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_DTPOFF);
3064 outrel.r_offset += GOT_ENTRY_SIZE;
3065 outrel.r_addend = 0;
f41345a7 3066 htab->elf.srelgot->reloc_count++;
69fc87f1
MS
3067 loc += sizeof (Elf64_External_Rela);
3068 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3069 }
3070 }
3071
3072 if (h != NULL)
3073 h->got.offset |= 1;
3074 else
3075 local_got_offsets[r_symndx] |= 1;
3076 }
3077
3078 if (off >= (bfd_vma) -2)
3079 abort ();
3080 if (r_type == ELF64_R_TYPE (rel->r_info))
3081 {
f41345a7 3082 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 3083 if (r_type == R_390_TLS_IE64 || r_type == R_390_TLS_IEENT)
f41345a7 3084 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
3085 unresolved_reloc = FALSE;
3086 }
3087 else
3088 {
f41345a7 3089 bfd_put_64 (output_bfd, htab->elf.sgot->output_offset + off,
69fc87f1
MS
3090 contents + rel->r_offset);
3091 continue;
3092 }
3093 break;
3094
3095 case R_390_TLS_GOTIE12:
bd1ea41b 3096 case R_390_TLS_GOTIE20:
69fc87f1
MS
3097 case R_390_TLS_IEENT:
3098 if (h == NULL)
3099 {
3100 if (local_got_offsets == NULL)
3101 abort();
3102 off = local_got_offsets[r_symndx];
0e1862bb 3103 if (bfd_link_pic (info))
69fc87f1
MS
3104 goto emit_tls_relocs;
3105 }
3106 else
3107 {
3108 off = h->got.offset;
3109 tls_type = elf_s390_hash_entry(h)->tls_type;
0e1862bb 3110 if (bfd_link_pic (info) || h->dynindx != -1 || tls_type < GOT_TLS_IE)
69fc87f1
MS
3111 goto emit_tls_relocs;
3112 }
3113
f41345a7 3114 if (htab->elf.sgot == NULL)
69fc87f1
MS
3115 abort ();
3116
3117 BFD_ASSERT (! unresolved_reloc);
3118 bfd_put_64 (output_bfd, -tpoff (info, relocation),
f41345a7
AK
3119 htab->elf.sgot->contents + off);
3120 relocation = htab->elf.sgot->output_offset + off;
69fc87f1 3121 if (r_type == R_390_TLS_IEENT)
f41345a7 3122 relocation += htab->elf.sgot->output_section->vma;
69fc87f1
MS
3123 unresolved_reloc = FALSE;
3124 break;
3125
3126 case R_390_TLS_LDM64:
0e1862bb 3127 if (! bfd_link_pic (info))
69fc87f1
MS
3128 /* The literal pool entry this relocation refers to gets ignored
3129 by the optimized code of the local exec model. Do nothing
3130 and the value will turn out zero. */
3131 continue;
3132
f41345a7 3133 if (htab->elf.sgot == NULL)
69fc87f1
MS
3134 abort ();
3135
3136 off = htab->tls_ldm_got.offset;
3137 if (off & 1)
3138 off &= ~1;
3139 else
3140 {
3141 Elf_Internal_Rela outrel;
3142 bfd_byte *loc;
3143
f41345a7 3144 if (htab->elf.srelgot == NULL)
69fc87f1
MS
3145 abort ();
3146
f41345a7
AK
3147 outrel.r_offset = (htab->elf.sgot->output_section->vma
3148 + htab->elf.sgot->output_offset + off);
69fc87f1
MS
3149
3150 bfd_put_64 (output_bfd, 0,
f41345a7 3151 htab->elf.sgot->contents + off + GOT_ENTRY_SIZE);
69fc87f1
MS
3152 outrel.r_info = ELF64_R_INFO (0, R_390_TLS_DTPMOD);
3153 outrel.r_addend = 0;
f41345a7
AK
3154 loc = htab->elf.srelgot->contents;
3155 loc += htab->elf.srelgot->reloc_count++
69fc87f1
MS
3156 * sizeof (Elf64_External_Rela);
3157 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3158 htab->tls_ldm_got.offset |= 1;
3159 }
f41345a7 3160 relocation = htab->elf.sgot->output_offset + off;
26e41594 3161 unresolved_reloc = FALSE;
69fc87f1
MS
3162 break;
3163
3164 case R_390_TLS_LE64:
3cbc1e5e 3165 if (bfd_link_dll (info))
69fc87f1
MS
3166 {
3167 /* Linking a shared library with non-fpic code requires
3168 a R_390_TLS_TPOFF relocation. */
3169 Elf_Internal_Rela outrel;
3170 asection *sreloc;
3171 bfd_byte *loc;
3172 int indx;
3173
3174 outrel.r_offset = rel->r_offset
3175 + input_section->output_section->vma
3176 + input_section->output_offset;
3177 if (h != NULL && h->dynindx != -1)
3178 indx = h->dynindx;
3179 else
3180 indx = 0;
3181 outrel.r_info = ELF64_R_INFO (indx, R_390_TLS_TPOFF);
3182 if (indx == 0)
3183 outrel.r_addend = relocation - dtpoff_base (info);
3184 else
3185 outrel.r_addend = 0;
3186 sreloc = elf_section_data (input_section)->sreloc;
3187 if (sreloc == NULL)
3188 abort ();
3189 loc = sreloc->contents;
3190 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
3191 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
3192 }
3193 else
3194 {
3195 BFD_ASSERT (! unresolved_reloc);
3196 bfd_put_64 (output_bfd, -tpoff (info, relocation),
3197 contents + rel->r_offset);
3198 }
3199 continue;
3200
3201 case R_390_TLS_LDO64:
0e1862bb 3202 if (bfd_link_pic (info) || (input_section->flags & SEC_DEBUGGING))
69fc87f1
MS
3203 relocation -= dtpoff_base (info);
3204 else
3205 /* When converting LDO to LE, we must negate. */
3206 relocation = -tpoff (info, relocation);
3207 break;
3208
3209 /* Relocations for tls instructions. */
3210 case R_390_TLS_LOAD:
3211 case R_390_TLS_GDCALL:
3212 case R_390_TLS_LDCALL:
3213 tls_type = GOT_UNKNOWN;
3214 if (h == NULL && local_got_offsets)
3215 tls_type = elf_s390_local_got_tls_type (input_bfd) [r_symndx];
3216 else if (h != NULL)
3217 tls_type = elf_s390_hash_entry(h)->tls_type;
3218
3219 if (tls_type == GOT_TLS_GD)
3220 continue;
3221
3222 if (r_type == R_390_TLS_LOAD)
3223 {
0e1862bb 3224 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3225 {
3226 /* IE->LE transition. Four valid cases:
3227 lg %rx,(0,%ry) -> sllg %rx,%ry,0
3228 lg %rx,(%ry,0) -> sllg %rx,%ry,0
3229 lg %rx,(%ry,%r12) -> sllg %rx,%ry,0
3230 lg %rx,(%r12,%ry) -> sllg %rx,%ry,0 */
3231 unsigned int insn0, insn1, ry;
3232
3233 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3234 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3235 if (insn1 != 0x0004)
3236 invalid_tls_insn (input_bfd, input_section, rel);
3237 ry = 0;
3238 if ((insn0 & 0xff00f000) == 0xe3000000)
3239 /* lg %rx,0(%ry,0) -> sllg %rx,%ry,0 */
3240 ry = (insn0 & 0x000f0000);
3241 else if ((insn0 & 0xff0f0000) == 0xe3000000)
3242 /* lg %rx,0(0,%ry) -> sllg %rx,%ry,0 */
3243 ry = (insn0 & 0x0000f000) << 4;
3244 else if ((insn0 & 0xff00f000) == 0xe300c000)
3245 /* lg %rx,0(%ry,%r12) -> sllg %rx,%ry,0 */
3246 ry = (insn0 & 0x000f0000);
3247 else if ((insn0 & 0xff0f0000) == 0xe30c0000)
3248 /* lg %rx,0(%r12,%ry) -> sllg %rx,%ry,0 */
3249 ry = (insn0 & 0x0000f000) << 4;
3250 else
3251 invalid_tls_insn (input_bfd, input_section, rel);
3252 insn0 = 0xeb000000 | (insn0 & 0x00f00000) | ry;
3253 insn1 = 0x000d;
3254 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3255 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3256 }
3257 }
3258 else if (r_type == R_390_TLS_GDCALL)
3259 {
3260 unsigned int insn0, insn1;
3261
3262 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3263 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3264 if ((insn0 & 0xffff0000) != 0xc0e50000)
3265 invalid_tls_insn (input_bfd, input_section, rel);
0e1862bb 3266 if (!bfd_link_pic (info) && (h == NULL || h->dynindx == -1))
69fc87f1
MS
3267 {
3268 /* GD->LE transition.
3269 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3270 insn0 = 0xc0040000;
3271 insn1 = 0x0000;
3272 }
3273 else
3274 {
3275 /* GD->IE transition.
3276 brasl %r14,__tls_get_addr@plt -> lg %r2,0(%r2,%r12) */
3277 insn0 = 0xe322c000;
3278 insn1 = 0x0004;
3279 }
3280 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3281 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3282 }
3283 else if (r_type == R_390_TLS_LDCALL)
3284 {
0e1862bb 3285 if (!bfd_link_pic (info))
69fc87f1
MS
3286 {
3287 unsigned int insn0, insn1;
3288
3289 insn0 = bfd_get_32 (input_bfd, contents + rel->r_offset);
3290 insn1 = bfd_get_16 (input_bfd, contents + rel->r_offset + 4);
3291 if ((insn0 & 0xffff0000) != 0xc0e50000)
3292 invalid_tls_insn (input_bfd, input_section, rel);
3293 /* LD->LE transition.
3294 brasl %r14,__tls_get_addr@plt -> brcl 0,. */
3295 insn0 = 0xc0040000;
3296 insn1 = 0x0000;
3297 bfd_put_32 (output_bfd, insn0, contents + rel->r_offset);
3298 bfd_put_16 (output_bfd, insn1, contents + rel->r_offset + 4);
3299 }
3300 }
3301 continue;
3302
947216bf
AM
3303 default:
3304 break;
3305 }
a85d7ed0 3306
239e1f3a
AM
3307 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
3308 because such sections are not SEC_ALLOC and thus ld.so will
3309 not process them. */
0451c93c 3310 if (unresolved_reloc
239e1f3a 3311 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
3312 && h->def_dynamic)
3313 && _bfd_elf_section_offset (output_bfd, info, input_section,
3314 rel->r_offset) != (bfd_vma) -1)
4eca0228 3315 _bfd_error_handler
695344c0 3316 /* xgettext:c-format */
843fe662 3317 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
d003868e
AM
3318 input_bfd,
3319 input_section,
0451c93c 3320 (long) rel->r_offset,
843fe662 3321 howto->name,
0451c93c
MS
3322 h->root.root.string);
3323
470b557a
AK
3324 do_relocation:
3325
fb798c50
AK
3326 /* When applying a 24 bit reloc we need to start one byte
3327 earlier. Otherwise the 32 bit get/put bfd operations might
3328 access a byte after the actual section. */
3329 if (r_type == R_390_PC24DBL
3330 || r_type == R_390_PLT24DBL)
3331 rel->r_offset--;
3332
bd1ea41b
MS
3333 if (r_type == R_390_20
3334 || r_type == R_390_GOT20
3335 || r_type == R_390_GOTPLT20
3336 || r_type == R_390_TLS_GOTIE20)
3337 {
3338 relocation += rel->r_addend;
3339 relocation = (relocation&0xfff) << 8 | (relocation&0xff000) >> 12;
3340 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
3341 contents, rel->r_offset,
3342 relocation, 0);
3343 }
3344 else
3345 r = _bfd_final_link_relocate (howto, input_bfd, input_section,
a85d7ed0
NC
3346 contents, rel->r_offset,
3347 relocation, rel->r_addend);
3348
3349 if (r != bfd_reloc_ok)
3350 {
0451c93c 3351 const char *name;
ec338859 3352
0451c93c
MS
3353 if (h != NULL)
3354 name = h->root.root.string;
3355 else
a85d7ed0 3356 {
0451c93c
MS
3357 name = bfd_elf_string_from_elf_section (input_bfd,
3358 symtab_hdr->sh_link,
3359 sym->st_name);
3360 if (name == NULL)
b34976b6 3361 return FALSE;
0451c93c
MS
3362 if (*name == '\0')
3363 name = bfd_section_name (input_bfd, sec);
3364 }
ec338859 3365
0451c93c 3366 if (r == bfd_reloc_overflow)
1a72702b
AM
3367 (*info->callbacks->reloc_overflow)
3368 (info, (h ? &h->root : NULL), name, howto->name,
3369 (bfd_vma) 0, input_bfd, input_section, rel->r_offset);
0451c93c
MS
3370 else
3371 {
4eca0228 3372 _bfd_error_handler
695344c0 3373 /* xgettext:c-format */
d003868e
AM
3374 (_("%B(%A+0x%lx): reloc against `%s': error %d"),
3375 input_bfd, input_section,
0451c93c 3376 (long) rel->r_offset, name, (int) r);
b34976b6 3377 return FALSE;
a85d7ed0
NC
3378 }
3379 }
3380 }
3381
b34976b6 3382 return TRUE;
a85d7ed0
NC
3383}
3384
470b557a
AK
3385/* Generate the PLT slots together with the dynamic relocations needed
3386 for IFUNC symbols. */
3387
3388static void
3389elf_s390_finish_ifunc_symbol (bfd *output_bfd,
3390 struct bfd_link_info *info,
3391 struct elf_link_hash_entry *h,
3392 struct elf_s390_link_hash_table *htab,
3393 bfd_vma plt_offset,
3394 bfd_vma resolver_address)
3395{
3396 bfd_vma plt_index;
3397 bfd_vma got_offset;
3398 Elf_Internal_Rela rela;
3399 bfd_byte *loc;
3400 asection *plt, *gotplt, *relplt;
3401
3402 if (htab->elf.iplt == NULL
3403 || htab->elf.igotplt == NULL
3404 || htab->elf.irelplt == NULL)
3405 abort ();
3406
3407 /* Index of the PLT slot within iplt section. */
3408 plt_index = plt_offset / PLT_ENTRY_SIZE;
3409 plt = htab->elf.iplt;
3410 /* Offset into the igot.plt section. */
3411 got_offset = plt_index * GOT_ENTRY_SIZE;
3412 gotplt = htab->elf.igotplt;
3413 relplt = htab->elf.irelplt;
3414
3415 /* Fill in the blueprint of a PLT. */
3416 memcpy (plt->contents + plt_offset, elf_s390x_plt_entry,
3417 PLT_ENTRY_SIZE);
3418
3419 /* Fixup the relative address to the GOT entry */
3420 bfd_put_32 (output_bfd,
3421 (gotplt->output_section->vma +
3422 gotplt->output_offset + got_offset
3423 - (plt->output_section->vma +
3424 plt->output_offset +
3425 plt_offset))/2,
3426 plt->contents + plt_offset + 2);
3427 /* Fixup the relative branch to PLT 0 */
3428 bfd_put_32 (output_bfd, - (plt->output_offset +
3429 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3430 plt->contents + plt_offset + 24);
3431 /* Fixup offset into .rela.plt section. */
3432 bfd_put_32 (output_bfd, relplt->output_offset +
3433 plt_index * sizeof (Elf64_External_Rela),
3434 plt->contents + plt_offset + 28);
3435
3436 /* Fill in the entry in the global offset table.
3437 Points to instruction after GOT offset. */
3438 bfd_put_64 (output_bfd,
3439 (plt->output_section->vma
3440 + plt->output_offset
3441 + plt_offset
3442 + 14),
3443 gotplt->contents + got_offset);
3444
3445 /* Fill in the entry in the .rela.plt section. */
3446 rela.r_offset = (gotplt->output_section->vma
3447 + gotplt->output_offset
3448 + got_offset);
3449
3450 if (!h
3451 || h->dynindx == -1
0e1862bb 3452 || ((bfd_link_executable (info)
470b557a
AK
3453 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
3454 && h->def_regular))
3455 {
3456 /* The symbol can be locally resolved. */
3457 rela.r_info = ELF64_R_INFO (0, R_390_IRELATIVE);
3458 rela.r_addend = resolver_address;
3459 }
3460 else
3461 {
3462 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3463 rela.r_addend = 0;
3464 }
3465
3466 loc = relplt->contents + plt_index * sizeof (Elf64_External_Rela);
3467 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3468}
3469
3470
a85d7ed0
NC
3471/* Finish up dynamic symbol handling. We set the contents of various
3472 dynamic sections here. */
3473
b34976b6 3474static bfd_boolean
4dfe6ac6
NC
3475elf_s390_finish_dynamic_symbol (bfd *output_bfd,
3476 struct bfd_link_info *info,
3477 struct elf_link_hash_entry *h,
3478 Elf_Internal_Sym *sym)
a85d7ed0 3479{
0451c93c 3480 struct elf_s390_link_hash_table *htab;
470b557a 3481 struct elf_s390_link_hash_entry *eh = (struct elf_s390_link_hash_entry*)h;
a85d7ed0 3482
0451c93c 3483 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
3484 if (htab == NULL)
3485 return FALSE;
a85d7ed0
NC
3486
3487 if (h->plt.offset != (bfd_vma) -1)
3488 {
a85d7ed0 3489 bfd_vma plt_index;
0451c93c
MS
3490 bfd_vma got_offset;
3491 Elf_Internal_Rela rela;
947216bf 3492 bfd_byte *loc;
a85d7ed0
NC
3493
3494 /* This symbol has an entry in the procedure linkage table. Set
947216bf 3495 it up. */
0a511368 3496 if (s390_is_ifunc_symbol_p (h) && h->def_regular)
470b557a 3497 {
0a511368
AK
3498 elf_s390_finish_ifunc_symbol (output_bfd, info, h,
3499 htab, h->plt.offset,
3500 eh->ifunc_resolver_address +
3501 eh->ifunc_resolver_section->output_offset +
3502 eh->ifunc_resolver_section->output_section->vma);
3503
3504 /* Do not return yet. Handling of explicit GOT slots of
3505 IFUNC symbols is below. */
470b557a
AK
3506 }
3507 else
3508 {
3509 if (h->dynindx == -1
3510 || htab->elf.splt == NULL
3511 || htab->elf.sgotplt == NULL
3512 || htab->elf.srelplt == NULL)
3513 abort ();
a85d7ed0 3514
470b557a
AK
3515 /* Calc. index no.
3516 Current offset - size first entry / entry size. */
3517 plt_index = (h->plt.offset - PLT_FIRST_ENTRY_SIZE) / PLT_ENTRY_SIZE;
a85d7ed0 3518
470b557a
AK
3519 /* Offset in GOT is PLT index plus GOT headers(3) times 8,
3520 addr & GOT addr. */
3521 got_offset = (plt_index + 3) * GOT_ENTRY_SIZE;
a85d7ed0 3522
470b557a
AK
3523 /* Fill in the blueprint of a PLT. */
3524 memcpy (htab->elf.splt->contents + h->plt.offset, elf_s390x_plt_entry,
3525 PLT_ENTRY_SIZE);
3526
3527 /* Fixup the relative address to the GOT entry */
3528 bfd_put_32 (output_bfd,
3529 (htab->elf.sgotplt->output_section->vma +
3530 htab->elf.sgotplt->output_offset + got_offset
3531 - (htab->elf.splt->output_section->vma +
3532 htab->elf.splt->output_offset +
3533 h->plt.offset))/2,
3534 htab->elf.splt->contents + h->plt.offset + 2);
3535 /* Fixup the relative branch to PLT 0 */
3536 bfd_put_32 (output_bfd, - (PLT_FIRST_ENTRY_SIZE +
3537 (PLT_ENTRY_SIZE * plt_index) + 22)/2,
3538 htab->elf.splt->contents + h->plt.offset + 24);
3539 /* Fixup offset into .rela.plt section. */
3540 bfd_put_32 (output_bfd, plt_index * sizeof (Elf64_External_Rela),
3541 htab->elf.splt->contents + h->plt.offset + 28);
3542
3543 /* Fill in the entry in the global offset table.
3544 Points to instruction after GOT offset. */
3545 bfd_put_64 (output_bfd,
3546 (htab->elf.splt->output_section->vma
3547 + htab->elf.splt->output_offset
3548 + h->plt.offset
3549 + 14),
3550 htab->elf.sgotplt->contents + got_offset);
3551
3552 /* Fill in the entry in the .rela.plt section. */
3553 rela.r_offset = (htab->elf.sgotplt->output_section->vma
3554 + htab->elf.sgotplt->output_offset
3555 + got_offset);
3556 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_JMP_SLOT);
3557 rela.r_addend = 0;
3558 loc = htab->elf.srelplt->contents + plt_index *
3559 sizeof (Elf64_External_Rela);
3560 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
3561
3562 if (!h->def_regular)
3563 {
3564 /* Mark the symbol as undefined, rather than as defined in
3565 the .plt section. Leave the value alone. This is a clue
3566 for the dynamic linker, to make function pointer
3567 comparisons work between an application and shared
3568 library. */
3569 sym->st_shndx = SHN_UNDEF;
3570 }
a85d7ed0
NC
3571 }
3572 }
3573
69fc87f1
MS
3574 if (h->got.offset != (bfd_vma) -1
3575 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_GD
3576 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE
3577 && elf_s390_hash_entry(h)->tls_type != GOT_TLS_IE_NLT)
a85d7ed0 3578 {
a85d7ed0 3579 Elf_Internal_Rela rela;
947216bf 3580 bfd_byte *loc;
a85d7ed0
NC
3581
3582 /* This symbol has an entry in the global offset table. Set it
947216bf 3583 up. */
f41345a7 3584 if (htab->elf.sgot == NULL || htab->elf.srelgot == NULL)
0451c93c 3585 abort ();
a85d7ed0 3586
f41345a7
AK
3587 rela.r_offset = (htab->elf.sgot->output_section->vma
3588 + htab->elf.sgot->output_offset
dc810e39 3589 + (h->got.offset &~ (bfd_vma) 1));
a85d7ed0 3590
470b557a
AK
3591 if (h->def_regular && s390_is_ifunc_symbol_p (h))
3592 {
0e1862bb 3593 if (bfd_link_pic (info))
470b557a
AK
3594 {
3595 /* An explicit GOT slot usage needs GLOB_DAT. If the
3596 symbol references local the implicit got.iplt slot
3597 will be used and the IRELATIVE reloc has been created
3598 above. */
3599 goto do_glob_dat;
3600 }
3601 else
3602 {
3603 /* For non-shared objects explicit GOT slots must be
3604 filled with the PLT slot address for pointer
3605 equality reasons. */
3606 bfd_put_64 (output_bfd, (htab->elf.iplt->output_section->vma
3607 + htab->elf.iplt->output_offset
3608 + h->plt.offset),
3609 htab->elf.sgot->contents + h->got.offset);
3610 return TRUE;
3611 }
3612 }
0e1862bb 3613 else if (bfd_link_pic (info)
ceada896 3614 && SYMBOL_REFERENCES_LOCAL (info, h))
947216bf 3615 {
470b557a
AK
3616 /* If this is a static link, or it is a -Bsymbolic link and
3617 the symbol is defined locally or was forced to be local
3618 because of a version file, we just want to emit a
3619 RELATIVE reloc. The entry in the global offset table
3620 will already have been initialized in the
3621 relocate_section function. */
8c21ca21
AK
3622 if (!h->def_regular)
3623 return FALSE;
0451c93c 3624 BFD_ASSERT((h->got.offset & 1) != 0);
947216bf
AM
3625 rela.r_info = ELF64_R_INFO (0, R_390_RELATIVE);
3626 rela.r_addend = (h->root.u.def.value
3627 + h->root.u.def.section->output_section->vma
3628 + h->root.u.def.section->output_offset);
3629 }
a85d7ed0
NC
3630 else
3631 {
3632 BFD_ASSERT((h->got.offset & 1) == 0);
ceada896 3633 do_glob_dat:
f41345a7 3634 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgot->contents + h->got.offset);
a85d7ed0 3635 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_GLOB_DAT);
947216bf
AM
3636 rela.r_addend = 0;
3637 }
a85d7ed0 3638
f41345a7
AK
3639 loc = htab->elf.srelgot->contents;
3640 loc += htab->elf.srelgot->reloc_count++ * sizeof (Elf64_External_Rela);
0451c93c 3641 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3642 }
3643
f5385ebf 3644 if (h->needs_copy)
a85d7ed0 3645 {
a85d7ed0 3646 Elf_Internal_Rela rela;
947216bf 3647 bfd_byte *loc;
a85d7ed0
NC
3648
3649 /* This symbols needs a copy reloc. Set it up. */
3650
0451c93c
MS
3651 if (h->dynindx == -1
3652 || (h->root.type != bfd_link_hash_defined
3653 && h->root.type != bfd_link_hash_defweak)
3654 || htab->srelbss == NULL)
3655 abort ();
a85d7ed0
NC
3656
3657 rela.r_offset = (h->root.u.def.value
3658 + h->root.u.def.section->output_section->vma
3659 + h->root.u.def.section->output_offset);
3660 rela.r_info = ELF64_R_INFO (h->dynindx, R_390_COPY);
3661 rela.r_addend = 0;
947216bf
AM
3662 loc = htab->srelbss->contents;
3663 loc += htab->srelbss->reloc_count++ * sizeof (Elf64_External_Rela);
0451c93c 3664 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
a85d7ed0
NC
3665 }
3666
3667 /* Mark some specially defined symbols as absolute. */
9637f6ef 3668 if (h == htab->elf.hdynamic
22edb2f1
RS
3669 || h == htab->elf.hgot
3670 || h == htab->elf.hplt)
a85d7ed0
NC
3671 sym->st_shndx = SHN_ABS;
3672
b34976b6 3673 return TRUE;
a85d7ed0
NC
3674}
3675
0451c93c
MS
3676/* Used to decide how to sort relocs in an optimal manner for the
3677 dynamic linker, before writing them out. */
3678
3679static enum elf_reloc_type_class
7e612e98
AM
3680elf_s390_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
3681 const asection *rel_sec ATTRIBUTE_UNUSED,
3682 const Elf_Internal_Rela *rela)
0451c93c 3683{
0f042c67
AK
3684 bfd *abfd = info->output_bfd;
3685 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
3686 struct elf_s390_link_hash_table *htab = elf_s390_hash_table (info);
3687 unsigned long r_symndx = ELF64_R_SYM (rela->r_info);
3688 Elf_Internal_Sym sym;
3689
3690 if (htab->elf.dynsym == NULL
3691 || !bed->s->swap_symbol_in (abfd,
3692 (htab->elf.dynsym->contents
3693 + r_symndx * bed->s->sizeof_sym),
3694 0, &sym))
3695 abort ();
3696
3697 /* Check relocation against STT_GNU_IFUNC symbol. */
3698 if (ELF_ST_TYPE (sym.st_info) == STT_GNU_IFUNC)
3699 return reloc_class_ifunc;
3700
0451c93c
MS
3701 switch ((int) ELF64_R_TYPE (rela->r_info))
3702 {
3703 case R_390_RELATIVE:
3704 return reloc_class_relative;
3705 case R_390_JMP_SLOT:
3706 return reloc_class_plt;
3707 case R_390_COPY:
3708 return reloc_class_copy;
3709 default:
3710 return reloc_class_normal;
3711 }
3712}
3713
a85d7ed0
NC
3714/* Finish up the dynamic sections. */
3715
b34976b6 3716static bfd_boolean
4dfe6ac6
NC
3717elf_s390_finish_dynamic_sections (bfd *output_bfd,
3718 struct bfd_link_info *info)
a85d7ed0 3719{
0451c93c 3720 struct elf_s390_link_hash_table *htab;
a85d7ed0
NC
3721 bfd *dynobj;
3722 asection *sdyn;
470b557a
AK
3723 bfd *ibfd;
3724 unsigned int i;
a85d7ed0 3725
0451c93c 3726 htab = elf_s390_hash_table (info);
4dfe6ac6
NC
3727 if (htab == NULL)
3728 return FALSE;
3729
0451c93c 3730 dynobj = htab->elf.dynobj;
3d4d4302 3731 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
a85d7ed0 3732
0451c93c 3733 if (htab->elf.dynamic_sections_created)
a85d7ed0 3734 {
a85d7ed0
NC
3735 Elf64_External_Dyn *dyncon, *dynconend;
3736
f41345a7 3737 if (sdyn == NULL || htab->elf.sgot == NULL)
0451c93c 3738 abort ();
a85d7ed0
NC
3739
3740 dyncon = (Elf64_External_Dyn *) sdyn->contents;
eea6121a 3741 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
a85d7ed0
NC
3742 for (; dyncon < dynconend; dyncon++)
3743 {
3744 Elf_Internal_Dyn dyn;
a85d7ed0 3745 asection *s;
ec338859 3746
a85d7ed0 3747 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
ec338859 3748
a85d7ed0
NC
3749 switch (dyn.d_tag)
3750 {
3751 default:
0451c93c 3752 continue;
ec338859 3753
a85d7ed0 3754 case DT_PLTGOT:
4ade44b7
AM
3755 s = htab->elf.sgotplt;
3756 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
0451c93c 3757 break;
ec338859 3758
a85d7ed0 3759 case DT_JMPREL:
4ade44b7
AM
3760 s = htab->elf.srelplt;
3761 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
a85d7ed0 3762 break;
ec338859 3763
a85d7ed0 3764 case DT_PLTRELSZ:
f92339b8 3765 dyn.d_un.d_val = htab->elf.srelplt->size + htab->elf.irelplt->size;
a85d7ed0 3766 break;
ec338859 3767
a85d7ed0
NC
3768 case DT_RELASZ:
3769 /* The procedure linkage table relocs (DT_JMPREL) should
3770 not be included in the overall relocs (DT_RELA).
3771 Therefore, we override the DT_RELASZ entry here to
3772 make it not include the JMPREL relocs. Since the
3773 linker script arranges for .rela.plt to follow all
3774 other relocation sections, we don't have to worry
3775 about changing the DT_RELA entry. */
f92339b8 3776 dyn.d_un.d_val -= htab->elf.srelplt->size + htab->elf.irelplt->size;
a85d7ed0
NC
3777 break;
3778 }
0451c93c
MS
3779
3780 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
a85d7ed0
NC
3781 }
3782
3783 /* Fill in the special first entry in the procedure linkage table. */
f41345a7 3784 if (htab->elf.splt && htab->elf.splt->size > 0)
a85d7ed0
NC
3785 {
3786 /* fill in blueprint for plt 0 entry */
f41345a7 3787 memcpy (htab->elf.splt->contents, elf_s390x_first_plt_entry,
9aa17453 3788 PLT_FIRST_ENTRY_SIZE);
a85d7ed0
NC
3789 /* Fixup relative address to start of GOT */
3790 bfd_put_32 (output_bfd,
161db279
AK
3791 (htab->elf.sgotplt->output_section->vma
3792 + htab->elf.sgotplt->output_offset
3793 - htab->elf.splt->output_section->vma
3794 - htab->elf.splt->output_offset - 6)/2,
f41345a7 3795 htab->elf.splt->contents + 8);
a85d7ed0 3796 }
387f8054
MR
3797 if (elf_section_data (htab->elf.splt->output_section) != NULL)
3798 elf_section_data (htab->elf.splt->output_section)->this_hdr.sh_entsize
3799 = PLT_ENTRY_SIZE;
a85d7ed0
NC
3800 }
3801
f41345a7 3802 if (htab->elf.sgotplt)
a85d7ed0 3803 {
0451c93c 3804 /* Fill in the first three entries in the global offset table. */
f41345a7 3805 if (htab->elf.sgotplt->size > 0)
0451c93c
MS
3806 {
3807 bfd_put_64 (output_bfd,
3808 (sdyn == NULL ? (bfd_vma) 0
3809 : sdyn->output_section->vma + sdyn->output_offset),
f41345a7 3810 htab->elf.sgotplt->contents);
0451c93c 3811 /* One entry for shared object struct ptr. */
f41345a7 3812 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 8);
0451c93c 3813 /* One entry for _dl_runtime_resolve. */
3b67f094 3814 bfd_put_64 (output_bfd, (bfd_vma) 0, htab->elf.sgotplt->contents + 16);
0451c93c 3815 }
a85d7ed0 3816
f41345a7 3817 elf_section_data (htab->elf.sgot->output_section)
0451c93c
MS
3818 ->this_hdr.sh_entsize = 8;
3819 }
470b557a
AK
3820
3821 /* Finish dynamic symbol for local IFUNC symbols. */
c72f2fb2 3822 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
470b557a
AK
3823 {
3824 struct plt_entry *local_plt;
3825 Elf_Internal_Sym *isym;
3826 Elf_Internal_Shdr *symtab_hdr;
3827
3828 symtab_hdr = &elf_symtab_hdr (ibfd);
3829
3830 local_plt = elf_s390_local_plt (ibfd);
3831 if (local_plt != NULL)
3832 for (i = 0; i < symtab_hdr->sh_info; i++)
3833 {
3834 if (local_plt[i].plt.offset != (bfd_vma) -1)
3835 {
3836 asection *sec = local_plt[i].sec;
3837 isym = bfd_sym_from_r_symndx (&htab->sym_cache, ibfd, i);
3838 if (isym == NULL)
3839 return FALSE;
3840
3841 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
3842 elf_s390_finish_ifunc_symbol (output_bfd, info, NULL, htab,
3843 local_plt[i].plt.offset,
3844 isym->st_value
3845 + sec->output_section->vma
3846 + sec->output_offset);
3847
3848 }
3849 }
3850 }
3851
b34976b6 3852 return TRUE;
a85d7ed0 3853}
e3e9290d
AA
3854\f
3855/* Support for core dump NOTE sections. */
a85d7ed0 3856
e3e9290d
AA
3857static bfd_boolean
3858elf_s390_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
3859{
3860 int offset;
3861 size_t size;
3862
3863 switch (note->descsz)
3864 {
3865 default:
3866 return FALSE;
3867
3868 case 336: /* sizeof(struct elf_prstatus) on s390x */
3869 /* pr_cursig */
3870 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
3871
3872 /* pr_pid */
3873 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 32);
3874
3875 /* pr_reg */
3876 offset = 112;
3877 size = 216;
3878 break;
3879 }
3880
3881 /* Make a ".reg/999" section. */
3882 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
3883 size, note->descpos + offset);
3884}
3885
3886static bfd_boolean
3887elf_s390_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
3888{
3889 switch (note->descsz)
3890 {
3891 default:
3892 return FALSE;
3893
3894 case 136: /* sizeof(struct elf_prpsinfo) on s390x */
3895 elf_tdata (abfd)->core->pid
3896 = bfd_get_32 (abfd, note->descdata + 24);
3897 elf_tdata (abfd)->core->program
3898 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
3899 elf_tdata (abfd)->core->command
3900 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
3901 }
3902
3903 /* Note that for some reason, a spurious space is tacked
3904 onto the end of the args in some (at least one anyway)
3905 implementations, so strip it off if it exists. */
3906
3907 {
3908 char *command = elf_tdata (abfd)->core->command;
3909 int n = strlen (command);
3910
3911 if (0 < n && command[n - 1] == ' ')
3912 command[n - 1] = '\0';
3913 }
3914
3915 return TRUE;
3916}
3917
3918static char *
3919elf_s390_write_core_note (bfd *abfd, char *buf, int *bufsiz,
3920 int note_type, ...)
3921{
3922 va_list ap;
3923
3924 switch (note_type)
3925 {
3926 default:
3927 return NULL;
3928
3929 case NT_PRPSINFO:
3930 {
3931 char data[136] = { 0 };
3932 const char *fname, *psargs;
3933
3934 va_start (ap, note_type);
3935 fname = va_arg (ap, const char *);
3936 psargs = va_arg (ap, const char *);
3937 va_end (ap);
3938
3939 strncpy (data + 40, fname, 16);
3940 strncpy (data + 56, psargs, 80);
3941 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3942 &data, sizeof (data));
3943 }
3944
3945 case NT_PRSTATUS:
3946 {
3947 char data[336] = { 0 };
3948 long pid;
3949 int cursig;
3950 const void *gregs;
3951
3952 va_start (ap, note_type);
3953 pid = va_arg (ap, long);
3954 cursig = va_arg (ap, int);
3955 gregs = va_arg (ap, const void *);
3956 va_end (ap);
3957
3958 bfd_put_16 (abfd, cursig, data + 12);
3959 bfd_put_32 (abfd, pid, data + 32);
3960 memcpy (data + 112, gregs, 216);
3961 return elfcore_write_note (abfd, buf, bufsiz, "CORE", note_type,
3962 &data, sizeof (data));
3963 }
3964 }
3965 /* NOTREACHED */
3966}
3967\f
4c45e5c9
JJ
3968/* Return address for Ith PLT stub in section PLT, for relocation REL
3969 or (bfd_vma) -1 if it should not be included. */
3970
3971static bfd_vma
3972elf_s390_plt_sym_val (bfd_vma i, const asection *plt,
3973 const arelent *rel ATTRIBUTE_UNUSED)
3974{
3975 return plt->vma + PLT_FIRST_ENTRY_SIZE + i * PLT_ENTRY_SIZE;
3976}
3977
643f7afb
AK
3978/* Merge backend specific data from an object file to the output
3979 object file when linking. */
3980
3981static bfd_boolean
50e03d47 3982elf64_s390_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
643f7afb 3983{
50e03d47 3984 if (!is_s390_elf (ibfd) || !is_s390_elf (info->output_bfd))
643f7afb
AK
3985 return TRUE;
3986
50e03d47 3987 return elf_s390_merge_obj_attributes (ibfd, info);
643f7afb
AK
3988}
3989
ae9a127f
NC
3990/* Why was the hash table entry size definition changed from
3991 ARCH_SIZE/8 to 4? This breaks the 64 bit dynamic linker and
3992 this is the only reason for the s390_elf64_size_info structure. */
a85d7ed0
NC
3993
3994const struct elf_size_info s390_elf64_size_info =
3995{
3996 sizeof (Elf64_External_Ehdr),
3997 sizeof (Elf64_External_Phdr),
3998 sizeof (Elf64_External_Shdr),
3999 sizeof (Elf64_External_Rel),
4000 sizeof (Elf64_External_Rela),
4001 sizeof (Elf64_External_Sym),
4002 sizeof (Elf64_External_Dyn),
4003 sizeof (Elf_External_Note),
ae9a127f
NC
4004 8, /* hash-table entry size. */
4005 1, /* internal relocations per external relocations. */
4006 64, /* arch_size. */
45d6a902 4007 3, /* log_file_align. */
a85d7ed0
NC
4008 ELFCLASS64, EV_CURRENT,
4009 bfd_elf64_write_out_phdrs,
4010 bfd_elf64_write_shdrs_and_ehdr,
1489a3a0 4011 bfd_elf64_checksum_contents,
a85d7ed0 4012 bfd_elf64_write_relocs,
73ff0d56 4013 bfd_elf64_swap_symbol_in,
a85d7ed0
NC
4014 bfd_elf64_swap_symbol_out,
4015 bfd_elf64_slurp_reloc_table,
4016 bfd_elf64_slurp_symbol_table,
4017 bfd_elf64_swap_dyn_in,
4018 bfd_elf64_swap_dyn_out,
947216bf
AM
4019 bfd_elf64_swap_reloc_in,
4020 bfd_elf64_swap_reloc_out,
4021 bfd_elf64_swap_reloca_in,
4022 bfd_elf64_swap_reloca_out
a85d7ed0
NC
4023};
4024
6d00b590 4025#define TARGET_BIG_SYM s390_elf64_vec
a85d7ed0
NC
4026#define TARGET_BIG_NAME "elf64-s390"
4027#define ELF_ARCH bfd_arch_s390
ae95ffa6 4028#define ELF_TARGET_ID S390_ELF_DATA
a85d7ed0
NC
4029#define ELF_MACHINE_CODE EM_S390
4030#define ELF_MACHINE_ALT1 EM_S390_OLD
4031#define ELF_MAXPAGESIZE 0x1000
4032
4033#define elf_backend_size_info s390_elf64_size_info
4034
4035#define elf_backend_can_gc_sections 1
51b64d56 4036#define elf_backend_can_refcount 1
a85d7ed0
NC
4037#define elf_backend_want_got_plt 1
4038#define elf_backend_plt_readonly 1
4039#define elf_backend_want_plt_sym 0
4040#define elf_backend_got_header_size 24
b491616a 4041#define elf_backend_rela_normal 1
a85d7ed0
NC
4042
4043#define elf_info_to_howto elf_s390_info_to_howto
4044
a85d7ed0
NC
4045#define bfd_elf64_bfd_is_local_label_name elf_s390_is_local_label_name
4046#define bfd_elf64_bfd_link_hash_table_create elf_s390_link_hash_table_create
4047#define bfd_elf64_bfd_reloc_type_lookup elf_s390_reloc_type_lookup
643f7afb
AK
4048#define bfd_elf64_bfd_reloc_name_lookup elf_s390_reloc_name_lookup
4049#define bfd_elf64_bfd_merge_private_bfd_data elf64_s390_merge_private_bfd_data
a85d7ed0
NC
4050
4051#define elf_backend_adjust_dynamic_symbol elf_s390_adjust_dynamic_symbol
4052#define elf_backend_check_relocs elf_s390_check_relocs
0451c93c
MS
4053#define elf_backend_copy_indirect_symbol elf_s390_copy_indirect_symbol
4054#define elf_backend_create_dynamic_sections elf_s390_create_dynamic_sections
a85d7ed0
NC
4055#define elf_backend_finish_dynamic_sections elf_s390_finish_dynamic_sections
4056#define elf_backend_finish_dynamic_symbol elf_s390_finish_dynamic_symbol
4057#define elf_backend_gc_mark_hook elf_s390_gc_mark_hook
4058#define elf_backend_gc_sweep_hook elf_s390_gc_sweep_hook
0451c93c 4059#define elf_backend_reloc_type_class elf_s390_reloc_type_class
a85d7ed0
NC
4060#define elf_backend_relocate_section elf_s390_relocate_section
4061#define elf_backend_size_dynamic_sections elf_s390_size_dynamic_sections
74541ad4 4062#define elf_backend_init_index_section _bfd_elf_init_1_index_section
e3e9290d
AA
4063#define elf_backend_grok_prstatus elf_s390_grok_prstatus
4064#define elf_backend_grok_psinfo elf_s390_grok_psinfo
4065#define elf_backend_write_core_note elf_s390_write_core_note
4c45e5c9 4066#define elf_backend_plt_sym_val elf_s390_plt_sym_val
470b557a 4067#define elf_backend_add_symbol_hook elf_s390_add_symbol_hook
b9005ba7 4068#define elf_backend_sort_relocs_p elf_s390_elf_sort_relocs_p
a85d7ed0 4069
69fc87f1
MS
4070#define bfd_elf64_mkobject elf_s390_mkobject
4071#define elf_backend_object_p elf_s390_object_p
a85d7ed0
NC
4072
4073#include "elf64-target.h"
This page took 1.063325 seconds and 4 git commands to generate.