]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elflink.c
Remove spurious spaces added by previous delta
[thirdparty/binutils-gdb.git] / bfd / elflink.c
CommitLineData
252b5132 1/* ELF linking support for BFD.
7e9f0867 2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
7898deda 3 Free Software Foundation, Inc.
252b5132 4
8fdd7217 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
8fdd7217
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
252b5132 11
8fdd7217
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
8fdd7217
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
20
21#include "bfd.h"
22#include "sysdep.h"
23#include "bfdlink.h"
24#include "libbfd.h"
25#define ARCH_SIZE 0
26#include "elf-bfd.h"
4ad4eba5 27#include "safe-ctype.h"
ccf2f652 28#include "libiberty.h"
252b5132 29
b34976b6 30bfd_boolean
268b6b39 31_bfd_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
32{
33 flagword flags;
aad5d350 34 asection *s;
252b5132 35 struct elf_link_hash_entry *h;
14a793b2 36 struct bfd_link_hash_entry *bh;
9c5bfbb7 37 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
38 int ptralign;
39
40 /* This function may be called more than once. */
aad5d350
AM
41 s = bfd_get_section_by_name (abfd, ".got");
42 if (s != NULL && (s->flags & SEC_LINKER_CREATED) != 0)
b34976b6 43 return TRUE;
252b5132
RH
44
45 switch (bed->s->arch_size)
46 {
bb0deeff
AO
47 case 32:
48 ptralign = 2;
49 break;
50
51 case 64:
52 ptralign = 3;
53 break;
54
55 default:
56 bfd_set_error (bfd_error_bad_value);
b34976b6 57 return FALSE;
252b5132
RH
58 }
59
e5a52504 60 flags = bed->dynamic_sec_flags;
252b5132
RH
61
62 s = bfd_make_section (abfd, ".got");
63 if (s == NULL
64 || !bfd_set_section_flags (abfd, s, flags)
65 || !bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 66 return FALSE;
252b5132
RH
67
68 if (bed->want_got_plt)
69 {
70 s = bfd_make_section (abfd, ".got.plt");
71 if (s == NULL
72 || !bfd_set_section_flags (abfd, s, flags)
73 || !bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 74 return FALSE;
252b5132
RH
75 }
76
2517a57f
AM
77 if (bed->want_got_sym)
78 {
79 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
80 (or .got.plt) section. We don't do this in the linker script
81 because we don't want to define the symbol if we are not creating
82 a global offset table. */
14a793b2 83 bh = NULL;
2517a57f
AM
84 if (!(_bfd_generic_link_add_one_symbol
85 (info, abfd, "_GLOBAL_OFFSET_TABLE_", BSF_GLOBAL, s,
268b6b39 86 bed->got_symbol_offset, NULL, FALSE, bed->collect, &bh)))
b34976b6 87 return FALSE;
14a793b2 88 h = (struct elf_link_hash_entry *) bh;
f5385ebf 89 h->def_regular = 1;
2517a57f 90 h->type = STT_OBJECT;
e6857c0c 91 h->other = STV_HIDDEN;
252b5132 92
36af4a4e 93 if (! info->executable
c152c796 94 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 95 return FALSE;
252b5132 96
2517a57f
AM
97 elf_hash_table (info)->hgot = h;
98 }
252b5132
RH
99
100 /* The first bit of the global offset table is the header. */
eea6121a 101 s->size += bed->got_header_size + bed->got_symbol_offset;
252b5132 102
b34976b6 103 return TRUE;
252b5132
RH
104}
105\f
7e9f0867
AM
106/* Create a strtab to hold the dynamic symbol names. */
107static bfd_boolean
108_bfd_elf_link_create_dynstrtab (bfd *abfd, struct bfd_link_info *info)
109{
110 struct elf_link_hash_table *hash_table;
111
112 hash_table = elf_hash_table (info);
113 if (hash_table->dynobj == NULL)
114 hash_table->dynobj = abfd;
115
116 if (hash_table->dynstr == NULL)
117 {
118 hash_table->dynstr = _bfd_elf_strtab_init ();
119 if (hash_table->dynstr == NULL)
120 return FALSE;
121 }
122 return TRUE;
123}
124
45d6a902
AM
125/* Create some sections which will be filled in with dynamic linking
126 information. ABFD is an input file which requires dynamic sections
127 to be created. The dynamic sections take up virtual memory space
128 when the final executable is run, so we need to create them before
129 addresses are assigned to the output sections. We work out the
130 actual contents and size of these sections later. */
252b5132 131
b34976b6 132bfd_boolean
268b6b39 133_bfd_elf_link_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 134{
45d6a902
AM
135 flagword flags;
136 register asection *s;
137 struct elf_link_hash_entry *h;
138 struct bfd_link_hash_entry *bh;
9c5bfbb7 139 const struct elf_backend_data *bed;
252b5132 140
0eddce27 141 if (! is_elf_hash_table (info->hash))
45d6a902
AM
142 return FALSE;
143
144 if (elf_hash_table (info)->dynamic_sections_created)
145 return TRUE;
146
7e9f0867
AM
147 if (!_bfd_elf_link_create_dynstrtab (abfd, info))
148 return FALSE;
45d6a902 149
7e9f0867 150 abfd = elf_hash_table (info)->dynobj;
e5a52504
MM
151 bed = get_elf_backend_data (abfd);
152
153 flags = bed->dynamic_sec_flags;
45d6a902
AM
154
155 /* A dynamically linked executable has a .interp section, but a
156 shared library does not. */
36af4a4e 157 if (info->executable)
252b5132 158 {
45d6a902
AM
159 s = bfd_make_section (abfd, ".interp");
160 if (s == NULL
161 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
162 return FALSE;
163 }
bb0deeff 164
0eddce27 165 if (! info->traditional_format)
45d6a902
AM
166 {
167 s = bfd_make_section (abfd, ".eh_frame_hdr");
168 if (s == NULL
169 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
170 || ! bfd_set_section_alignment (abfd, s, 2))
171 return FALSE;
172 elf_hash_table (info)->eh_info.hdr_sec = s;
173 }
bb0deeff 174
45d6a902
AM
175 /* Create sections to hold version informations. These are removed
176 if they are not needed. */
177 s = bfd_make_section (abfd, ".gnu.version_d");
178 if (s == NULL
179 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
180 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
181 return FALSE;
182
183 s = bfd_make_section (abfd, ".gnu.version");
184 if (s == NULL
185 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
186 || ! bfd_set_section_alignment (abfd, s, 1))
187 return FALSE;
188
189 s = bfd_make_section (abfd, ".gnu.version_r");
190 if (s == NULL
191 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
192 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
193 return FALSE;
194
195 s = bfd_make_section (abfd, ".dynsym");
196 if (s == NULL
197 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
198 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
199 return FALSE;
200
201 s = bfd_make_section (abfd, ".dynstr");
202 if (s == NULL
203 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
204 return FALSE;
205
45d6a902
AM
206 s = bfd_make_section (abfd, ".dynamic");
207 if (s == NULL
208 || ! bfd_set_section_flags (abfd, s, flags)
209 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
210 return FALSE;
211
212 /* The special symbol _DYNAMIC is always set to the start of the
77cfaee6
AM
213 .dynamic section. We could set _DYNAMIC in a linker script, but we
214 only want to define it if we are, in fact, creating a .dynamic
215 section. We don't want to define it if there is no .dynamic
216 section, since on some ELF platforms the start up code examines it
217 to decide how to initialize the process. */
218 h = elf_link_hash_lookup (elf_hash_table (info), "_DYNAMIC",
219 FALSE, FALSE, FALSE);
220 if (h != NULL)
221 {
222 /* Zap symbol defined in an as-needed lib that wasn't linked.
223 This is a symptom of a larger problem: Absolute symbols
224 defined in shared libraries can't be overridden, because we
225 lose the link to the bfd which is via the symbol section. */
226 h->root.type = bfd_link_hash_new;
227 }
228 bh = &h->root;
45d6a902 229 if (! (_bfd_generic_link_add_one_symbol
268b6b39
AM
230 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, 0, NULL, FALSE,
231 get_elf_backend_data (abfd)->collect, &bh)))
45d6a902
AM
232 return FALSE;
233 h = (struct elf_link_hash_entry *) bh;
f5385ebf 234 h->def_regular = 1;
45d6a902
AM
235 h->type = STT_OBJECT;
236
36af4a4e 237 if (! info->executable
c152c796 238 && ! bfd_elf_link_record_dynamic_symbol (info, h))
45d6a902
AM
239 return FALSE;
240
241 s = bfd_make_section (abfd, ".hash");
242 if (s == NULL
243 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
244 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
245 return FALSE;
246 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
247
248 /* Let the backend create the rest of the sections. This lets the
249 backend set the right flags. The backend will normally create
250 the .got and .plt sections. */
251 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
252 return FALSE;
253
254 elf_hash_table (info)->dynamic_sections_created = TRUE;
255
256 return TRUE;
257}
258
259/* Create dynamic sections when linking against a dynamic object. */
260
261bfd_boolean
268b6b39 262_bfd_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
45d6a902
AM
263{
264 flagword flags, pltflags;
265 asection *s;
9c5bfbb7 266 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902 267
252b5132
RH
268 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
269 .rel[a].bss sections. */
e5a52504 270 flags = bed->dynamic_sec_flags;
252b5132
RH
271
272 pltflags = flags;
252b5132 273 if (bed->plt_not_loaded)
6df4d94c
MM
274 /* We do not clear SEC_ALLOC here because we still want the OS to
275 allocate space for the section; it's just that there's nothing
276 to read in from the object file. */
5d1634d7 277 pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
6df4d94c
MM
278 else
279 pltflags |= SEC_ALLOC | SEC_CODE | SEC_LOAD;
252b5132
RH
280 if (bed->plt_readonly)
281 pltflags |= SEC_READONLY;
282
283 s = bfd_make_section (abfd, ".plt");
284 if (s == NULL
285 || ! bfd_set_section_flags (abfd, s, pltflags)
286 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
b34976b6 287 return FALSE;
252b5132
RH
288
289 if (bed->want_plt_sym)
290 {
291 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
292 .plt section. */
14a793b2
AM
293 struct elf_link_hash_entry *h;
294 struct bfd_link_hash_entry *bh = NULL;
295
252b5132 296 if (! (_bfd_generic_link_add_one_symbol
268b6b39
AM
297 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s, 0, NULL,
298 FALSE, get_elf_backend_data (abfd)->collect, &bh)))
b34976b6 299 return FALSE;
14a793b2 300 h = (struct elf_link_hash_entry *) bh;
f5385ebf 301 h->def_regular = 1;
252b5132
RH
302 h->type = STT_OBJECT;
303
36af4a4e 304 if (! info->executable
c152c796 305 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 306 return FALSE;
252b5132
RH
307 }
308
3e932841 309 s = bfd_make_section (abfd,
bf572ba0 310 bed->default_use_rela_p ? ".rela.plt" : ".rel.plt");
252b5132
RH
311 if (s == NULL
312 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
45d6a902 313 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
b34976b6 314 return FALSE;
252b5132
RH
315
316 if (! _bfd_elf_create_got_section (abfd, info))
b34976b6 317 return FALSE;
252b5132 318
3018b441
RH
319 if (bed->want_dynbss)
320 {
321 /* The .dynbss section is a place to put symbols which are defined
322 by dynamic objects, are referenced by regular objects, and are
323 not functions. We must allocate space for them in the process
324 image and use a R_*_COPY reloc to tell the dynamic linker to
325 initialize them at run time. The linker script puts the .dynbss
326 section into the .bss section of the final image. */
327 s = bfd_make_section (abfd, ".dynbss");
328 if (s == NULL
77f3d027 329 || ! bfd_set_section_flags (abfd, s, SEC_ALLOC | SEC_LINKER_CREATED))
b34976b6 330 return FALSE;
252b5132 331
3018b441 332 /* The .rel[a].bss section holds copy relocs. This section is not
77cfaee6
AM
333 normally needed. We need to create it here, though, so that the
334 linker will map it to an output section. We can't just create it
335 only if we need it, because we will not know whether we need it
336 until we have seen all the input files, and the first time the
337 main linker code calls BFD after examining all the input files
338 (size_dynamic_sections) the input sections have already been
339 mapped to the output sections. If the section turns out not to
340 be needed, we can discard it later. We will never need this
341 section when generating a shared object, since they do not use
342 copy relocs. */
3018b441
RH
343 if (! info->shared)
344 {
3e932841
KH
345 s = bfd_make_section (abfd,
346 (bed->default_use_rela_p
347 ? ".rela.bss" : ".rel.bss"));
3018b441
RH
348 if (s == NULL
349 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
45d6a902 350 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
b34976b6 351 return FALSE;
3018b441 352 }
252b5132
RH
353 }
354
b34976b6 355 return TRUE;
252b5132
RH
356}
357\f
252b5132
RH
358/* Record a new dynamic symbol. We record the dynamic symbols as we
359 read the input files, since we need to have a list of all of them
360 before we can determine the final sizes of the output sections.
361 Note that we may actually call this function even though we are not
362 going to output any dynamic symbols; in some cases we know that a
363 symbol should be in the dynamic symbol table, but only if there is
364 one. */
365
b34976b6 366bfd_boolean
c152c796
AM
367bfd_elf_link_record_dynamic_symbol (struct bfd_link_info *info,
368 struct elf_link_hash_entry *h)
252b5132
RH
369{
370 if (h->dynindx == -1)
371 {
2b0f7ef9 372 struct elf_strtab_hash *dynstr;
68b6ddd0 373 char *p;
252b5132 374 const char *name;
252b5132
RH
375 bfd_size_type indx;
376
7a13edea
NC
377 /* XXX: The ABI draft says the linker must turn hidden and
378 internal symbols into STB_LOCAL symbols when producing the
379 DSO. However, if ld.so honors st_other in the dynamic table,
380 this would not be necessary. */
381 switch (ELF_ST_VISIBILITY (h->other))
382 {
383 case STV_INTERNAL:
384 case STV_HIDDEN:
9d6eee78
L
385 if (h->root.type != bfd_link_hash_undefined
386 && h->root.type != bfd_link_hash_undefweak)
38048eb9 387 {
f5385ebf 388 h->forced_local = 1;
67687978
PB
389 if (!elf_hash_table (info)->is_relocatable_executable)
390 return TRUE;
7a13edea 391 }
0444bdd4 392
7a13edea
NC
393 default:
394 break;
395 }
396
252b5132
RH
397 h->dynindx = elf_hash_table (info)->dynsymcount;
398 ++elf_hash_table (info)->dynsymcount;
399
400 dynstr = elf_hash_table (info)->dynstr;
401 if (dynstr == NULL)
402 {
403 /* Create a strtab to hold the dynamic symbol names. */
2b0f7ef9 404 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_strtab_init ();
252b5132 405 if (dynstr == NULL)
b34976b6 406 return FALSE;
252b5132
RH
407 }
408
409 /* We don't put any version information in the dynamic string
aad5d350 410 table. */
252b5132
RH
411 name = h->root.root.string;
412 p = strchr (name, ELF_VER_CHR);
68b6ddd0
AM
413 if (p != NULL)
414 /* We know that the p points into writable memory. In fact,
415 there are only a few symbols that have read-only names, being
416 those like _GLOBAL_OFFSET_TABLE_ that are created specially
417 by the backends. Most symbols will have names pointing into
418 an ELF string table read from a file, or to objalloc memory. */
419 *p = 0;
420
421 indx = _bfd_elf_strtab_add (dynstr, name, p != NULL);
422
423 if (p != NULL)
424 *p = ELF_VER_CHR;
252b5132
RH
425
426 if (indx == (bfd_size_type) -1)
b34976b6 427 return FALSE;
252b5132
RH
428 h->dynstr_index = indx;
429 }
430
b34976b6 431 return TRUE;
252b5132 432}
45d6a902
AM
433\f
434/* Record an assignment to a symbol made by a linker script. We need
435 this in case some dynamic object refers to this symbol. */
436
437bfd_boolean
268b6b39
AM
438bfd_elf_record_link_assignment (bfd *output_bfd ATTRIBUTE_UNUSED,
439 struct bfd_link_info *info,
440 const char *name,
441 bfd_boolean provide)
45d6a902
AM
442{
443 struct elf_link_hash_entry *h;
4ea42fb7 444 struct elf_link_hash_table *htab;
45d6a902 445
0eddce27 446 if (!is_elf_hash_table (info->hash))
45d6a902
AM
447 return TRUE;
448
4ea42fb7
AM
449 htab = elf_hash_table (info);
450 h = elf_link_hash_lookup (htab, name, !provide, TRUE, FALSE);
45d6a902 451 if (h == NULL)
4ea42fb7 452 return provide;
45d6a902 453
02bb6eae
AO
454 /* Since we're defining the symbol, don't let it seem to have not
455 been defined. record_dynamic_symbol and size_dynamic_sections
77cfaee6 456 may depend on this. */
02bb6eae
AO
457 if (h->root.type == bfd_link_hash_undefweak
458 || h->root.type == bfd_link_hash_undefined)
77cfaee6 459 {
4ea42fb7 460 h->root.type = bfd_link_hash_new;
77cfaee6
AM
461 if (h->root.u.undef.next != NULL || htab->root.undefs_tail == &h->root)
462 bfd_link_repair_undef_list (&htab->root);
77cfaee6 463 }
02bb6eae 464
45d6a902 465 if (h->root.type == bfd_link_hash_new)
f5385ebf 466 h->non_elf = 0;
45d6a902
AM
467
468 /* If this symbol is being provided by the linker script, and it is
469 currently defined by a dynamic object, but not by a regular
470 object, then mark it as undefined so that the generic linker will
471 force the correct value. */
472 if (provide
f5385ebf
AM
473 && h->def_dynamic
474 && !h->def_regular)
45d6a902
AM
475 h->root.type = bfd_link_hash_undefined;
476
477 /* If this symbol is not being provided by the linker script, and it is
478 currently defined by a dynamic object, but not by a regular object,
479 then clear out any version information because the symbol will not be
480 associated with the dynamic object any more. */
481 if (!provide
f5385ebf
AM
482 && h->def_dynamic
483 && !h->def_regular)
45d6a902
AM
484 h->verinfo.verdef = NULL;
485
f5385ebf 486 h->def_regular = 1;
45d6a902 487
6fa3860b
PB
488 /* STV_HIDDEN and STV_INTERNAL symbols must be STB_LOCAL in shared objects
489 and executables. */
490 if (!info->relocatable
491 && h->dynindx != -1
492 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
493 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
494 h->forced_local = 1;
495
f5385ebf
AM
496 if ((h->def_dynamic
497 || h->ref_dynamic
67687978
PB
498 || info->shared
499 || (info->executable && elf_hash_table (info)->is_relocatable_executable))
45d6a902
AM
500 && h->dynindx == -1)
501 {
c152c796 502 if (! bfd_elf_link_record_dynamic_symbol (info, h))
45d6a902
AM
503 return FALSE;
504
505 /* If this is a weak defined symbol, and we know a corresponding
506 real symbol from the same dynamic object, make sure the real
507 symbol is also made into a dynamic symbol. */
f6e332e6
AM
508 if (h->u.weakdef != NULL
509 && h->u.weakdef->dynindx == -1)
45d6a902 510 {
f6e332e6 511 if (! bfd_elf_link_record_dynamic_symbol (info, h->u.weakdef))
45d6a902
AM
512 return FALSE;
513 }
514 }
515
516 return TRUE;
517}
42751cf3 518
8c58d23b
AM
519/* Record a new local dynamic symbol. Returns 0 on failure, 1 on
520 success, and 2 on a failure caused by attempting to record a symbol
521 in a discarded section, eg. a discarded link-once section symbol. */
522
523int
c152c796
AM
524bfd_elf_link_record_local_dynamic_symbol (struct bfd_link_info *info,
525 bfd *input_bfd,
526 long input_indx)
8c58d23b
AM
527{
528 bfd_size_type amt;
529 struct elf_link_local_dynamic_entry *entry;
530 struct elf_link_hash_table *eht;
531 struct elf_strtab_hash *dynstr;
532 unsigned long dynstr_index;
533 char *name;
534 Elf_External_Sym_Shndx eshndx;
535 char esym[sizeof (Elf64_External_Sym)];
536
0eddce27 537 if (! is_elf_hash_table (info->hash))
8c58d23b
AM
538 return 0;
539
540 /* See if the entry exists already. */
541 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
542 if (entry->input_bfd == input_bfd && entry->input_indx == input_indx)
543 return 1;
544
545 amt = sizeof (*entry);
268b6b39 546 entry = bfd_alloc (input_bfd, amt);
8c58d23b
AM
547 if (entry == NULL)
548 return 0;
549
550 /* Go find the symbol, so that we can find it's name. */
551 if (!bfd_elf_get_elf_syms (input_bfd, &elf_tdata (input_bfd)->symtab_hdr,
268b6b39 552 1, input_indx, &entry->isym, esym, &eshndx))
8c58d23b
AM
553 {
554 bfd_release (input_bfd, entry);
555 return 0;
556 }
557
558 if (entry->isym.st_shndx != SHN_UNDEF
559 && (entry->isym.st_shndx < SHN_LORESERVE
560 || entry->isym.st_shndx > SHN_HIRESERVE))
561 {
562 asection *s;
563
564 s = bfd_section_from_elf_index (input_bfd, entry->isym.st_shndx);
565 if (s == NULL || bfd_is_abs_section (s->output_section))
566 {
567 /* We can still bfd_release here as nothing has done another
568 bfd_alloc. We can't do this later in this function. */
569 bfd_release (input_bfd, entry);
570 return 2;
571 }
572 }
573
574 name = (bfd_elf_string_from_elf_section
575 (input_bfd, elf_tdata (input_bfd)->symtab_hdr.sh_link,
576 entry->isym.st_name));
577
578 dynstr = elf_hash_table (info)->dynstr;
579 if (dynstr == NULL)
580 {
581 /* Create a strtab to hold the dynamic symbol names. */
582 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_strtab_init ();
583 if (dynstr == NULL)
584 return 0;
585 }
586
b34976b6 587 dynstr_index = _bfd_elf_strtab_add (dynstr, name, FALSE);
8c58d23b
AM
588 if (dynstr_index == (unsigned long) -1)
589 return 0;
590 entry->isym.st_name = dynstr_index;
591
592 eht = elf_hash_table (info);
593
594 entry->next = eht->dynlocal;
595 eht->dynlocal = entry;
596 entry->input_bfd = input_bfd;
597 entry->input_indx = input_indx;
598 eht->dynsymcount++;
599
600 /* Whatever binding the symbol had before, it's now local. */
601 entry->isym.st_info
602 = ELF_ST_INFO (STB_LOCAL, ELF_ST_TYPE (entry->isym.st_info));
603
604 /* The dynindx will be set at the end of size_dynamic_sections. */
605
606 return 1;
607}
608
30b30c21 609/* Return the dynindex of a local dynamic symbol. */
42751cf3 610
30b30c21 611long
268b6b39
AM
612_bfd_elf_link_lookup_local_dynindx (struct bfd_link_info *info,
613 bfd *input_bfd,
614 long input_indx)
30b30c21
RH
615{
616 struct elf_link_local_dynamic_entry *e;
617
618 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
619 if (e->input_bfd == input_bfd && e->input_indx == input_indx)
620 return e->dynindx;
621 return -1;
622}
623
624/* This function is used to renumber the dynamic symbols, if some of
625 them are removed because they are marked as local. This is called
626 via elf_link_hash_traverse. */
627
b34976b6 628static bfd_boolean
268b6b39
AM
629elf_link_renumber_hash_table_dynsyms (struct elf_link_hash_entry *h,
630 void *data)
42751cf3 631{
268b6b39 632 size_t *count = data;
30b30c21 633
e92d460e
AM
634 if (h->root.type == bfd_link_hash_warning)
635 h = (struct elf_link_hash_entry *) h->root.u.i.link;
636
6fa3860b
PB
637 if (h->forced_local)
638 return TRUE;
639
640 if (h->dynindx != -1)
641 h->dynindx = ++(*count);
642
643 return TRUE;
644}
645
646
647/* Like elf_link_renumber_hash_table_dynsyms, but just number symbols with
648 STB_LOCAL binding. */
649
650static bfd_boolean
651elf_link_renumber_local_hash_table_dynsyms (struct elf_link_hash_entry *h,
652 void *data)
653{
654 size_t *count = data;
655
656 if (h->root.type == bfd_link_hash_warning)
657 h = (struct elf_link_hash_entry *) h->root.u.i.link;
658
659 if (!h->forced_local)
660 return TRUE;
661
42751cf3 662 if (h->dynindx != -1)
30b30c21
RH
663 h->dynindx = ++(*count);
664
b34976b6 665 return TRUE;
42751cf3 666}
30b30c21 667
aee6f5b4
AO
668/* Return true if the dynamic symbol for a given section should be
669 omitted when creating a shared library. */
670bfd_boolean
671_bfd_elf_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
672 struct bfd_link_info *info,
673 asection *p)
674{
675 switch (elf_section_data (p)->this_hdr.sh_type)
676 {
677 case SHT_PROGBITS:
678 case SHT_NOBITS:
679 /* If sh_type is yet undecided, assume it could be
680 SHT_PROGBITS/SHT_NOBITS. */
681 case SHT_NULL:
682 if (strcmp (p->name, ".got") == 0
683 || strcmp (p->name, ".got.plt") == 0
684 || strcmp (p->name, ".plt") == 0)
685 {
686 asection *ip;
687 bfd *dynobj = elf_hash_table (info)->dynobj;
688
689 if (dynobj != NULL
1da212d6 690 && (ip = bfd_get_section_by_name (dynobj, p->name)) != NULL
aee6f5b4
AO
691 && (ip->flags & SEC_LINKER_CREATED)
692 && ip->output_section == p)
693 return TRUE;
694 }
695 return FALSE;
696
697 /* There shouldn't be section relative relocations
698 against any other section. */
699 default:
700 return TRUE;
701 }
702}
703
062e2358 704/* Assign dynsym indices. In a shared library we generate a section
6fa3860b
PB
705 symbol for each output section, which come first. Next come symbols
706 which have been forced to local binding. Then all of the back-end
707 allocated local dynamic syms, followed by the rest of the global
708 symbols. */
30b30c21 709
554220db
AM
710static unsigned long
711_bfd_elf_link_renumber_dynsyms (bfd *output_bfd,
712 struct bfd_link_info *info,
713 unsigned long *section_sym_count)
30b30c21
RH
714{
715 unsigned long dynsymcount = 0;
716
67687978 717 if (info->shared || elf_hash_table (info)->is_relocatable_executable)
30b30c21 718 {
aee6f5b4 719 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
30b30c21
RH
720 asection *p;
721 for (p = output_bfd->sections; p ; p = p->next)
8c37241b 722 if ((p->flags & SEC_EXCLUDE) == 0
aee6f5b4
AO
723 && (p->flags & SEC_ALLOC) != 0
724 && !(*bed->elf_backend_omit_section_dynsym) (output_bfd, info, p))
725 elf_section_data (p)->dynindx = ++dynsymcount;
30b30c21 726 }
554220db 727 *section_sym_count = dynsymcount;
30b30c21 728
6fa3860b
PB
729 elf_link_hash_traverse (elf_hash_table (info),
730 elf_link_renumber_local_hash_table_dynsyms,
731 &dynsymcount);
732
30b30c21
RH
733 if (elf_hash_table (info)->dynlocal)
734 {
735 struct elf_link_local_dynamic_entry *p;
736 for (p = elf_hash_table (info)->dynlocal; p ; p = p->next)
737 p->dynindx = ++dynsymcount;
738 }
739
740 elf_link_hash_traverse (elf_hash_table (info),
741 elf_link_renumber_hash_table_dynsyms,
742 &dynsymcount);
743
744 /* There is an unused NULL entry at the head of the table which
745 we must account for in our count. Unless there weren't any
746 symbols, which means we'll have no table at all. */
747 if (dynsymcount != 0)
748 ++dynsymcount;
749
750 return elf_hash_table (info)->dynsymcount = dynsymcount;
751}
252b5132 752
45d6a902
AM
753/* This function is called when we want to define a new symbol. It
754 handles the various cases which arise when we find a definition in
755 a dynamic object, or when there is already a definition in a
756 dynamic object. The new symbol is described by NAME, SYM, PSEC,
757 and PVALUE. We set SYM_HASH to the hash table entry. We set
758 OVERRIDE if the old symbol is overriding a new definition. We set
759 TYPE_CHANGE_OK if it is OK for the type to change. We set
760 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
761 change, we mean that we shouldn't warn if the type or size does
af44c138
L
762 change. We set POLD_ALIGNMENT if an old common symbol in a dynamic
763 object is overridden by a regular object. */
45d6a902
AM
764
765bfd_boolean
268b6b39
AM
766_bfd_elf_merge_symbol (bfd *abfd,
767 struct bfd_link_info *info,
768 const char *name,
769 Elf_Internal_Sym *sym,
770 asection **psec,
771 bfd_vma *pvalue,
af44c138 772 unsigned int *pold_alignment,
268b6b39
AM
773 struct elf_link_hash_entry **sym_hash,
774 bfd_boolean *skip,
775 bfd_boolean *override,
776 bfd_boolean *type_change_ok,
0f8a2703 777 bfd_boolean *size_change_ok)
252b5132 778{
7479dfd4 779 asection *sec, *oldsec;
45d6a902
AM
780 struct elf_link_hash_entry *h;
781 struct elf_link_hash_entry *flip;
782 int bind;
783 bfd *oldbfd;
784 bfd_boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
77cfaee6 785 bfd_boolean newweak, oldweak;
45d6a902
AM
786
787 *skip = FALSE;
788 *override = FALSE;
789
790 sec = *psec;
791 bind = ELF_ST_BIND (sym->st_info);
792
793 if (! bfd_is_und_section (sec))
794 h = elf_link_hash_lookup (elf_hash_table (info), name, TRUE, FALSE, FALSE);
795 else
796 h = ((struct elf_link_hash_entry *)
797 bfd_wrapped_link_hash_lookup (abfd, info, name, TRUE, FALSE, FALSE));
798 if (h == NULL)
799 return FALSE;
800 *sym_hash = h;
252b5132 801
45d6a902
AM
802 /* This code is for coping with dynamic objects, and is only useful
803 if we are doing an ELF link. */
804 if (info->hash->creator != abfd->xvec)
805 return TRUE;
252b5132 806
45d6a902
AM
807 /* For merging, we only care about real symbols. */
808
809 while (h->root.type == bfd_link_hash_indirect
810 || h->root.type == bfd_link_hash_warning)
811 h = (struct elf_link_hash_entry *) h->root.u.i.link;
812
813 /* If we just created the symbol, mark it as being an ELF symbol.
814 Other than that, there is nothing to do--there is no merge issue
815 with a newly defined symbol--so we just return. */
816
817 if (h->root.type == bfd_link_hash_new)
252b5132 818 {
f5385ebf 819 h->non_elf = 0;
45d6a902
AM
820 return TRUE;
821 }
252b5132 822
7479dfd4
L
823 /* OLDBFD and OLDSEC are a BFD and an ASECTION associated with the
824 existing symbol. */
252b5132 825
45d6a902
AM
826 switch (h->root.type)
827 {
828 default:
829 oldbfd = NULL;
7479dfd4 830 oldsec = NULL;
45d6a902 831 break;
252b5132 832
45d6a902
AM
833 case bfd_link_hash_undefined:
834 case bfd_link_hash_undefweak:
835 oldbfd = h->root.u.undef.abfd;
7479dfd4 836 oldsec = NULL;
45d6a902
AM
837 break;
838
839 case bfd_link_hash_defined:
840 case bfd_link_hash_defweak:
841 oldbfd = h->root.u.def.section->owner;
7479dfd4 842 oldsec = h->root.u.def.section;
45d6a902
AM
843 break;
844
845 case bfd_link_hash_common:
846 oldbfd = h->root.u.c.p->section->owner;
7479dfd4 847 oldsec = h->root.u.c.p->section;
45d6a902
AM
848 break;
849 }
850
851 /* In cases involving weak versioned symbols, we may wind up trying
852 to merge a symbol with itself. Catch that here, to avoid the
853 confusion that results if we try to override a symbol with
854 itself. The additional tests catch cases like
855 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
856 dynamic object, which we do want to handle here. */
857 if (abfd == oldbfd
858 && ((abfd->flags & DYNAMIC) == 0
f5385ebf 859 || !h->def_regular))
45d6a902
AM
860 return TRUE;
861
862 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
863 respectively, is from a dynamic object. */
864
865 if ((abfd->flags & DYNAMIC) != 0)
866 newdyn = TRUE;
867 else
868 newdyn = FALSE;
869
870 if (oldbfd != NULL)
871 olddyn = (oldbfd->flags & DYNAMIC) != 0;
872 else
873 {
874 asection *hsec;
875
876 /* This code handles the special SHN_MIPS_{TEXT,DATA} section
877 indices used by MIPS ELF. */
878 switch (h->root.type)
252b5132 879 {
45d6a902
AM
880 default:
881 hsec = NULL;
882 break;
252b5132 883
45d6a902
AM
884 case bfd_link_hash_defined:
885 case bfd_link_hash_defweak:
886 hsec = h->root.u.def.section;
887 break;
252b5132 888
45d6a902
AM
889 case bfd_link_hash_common:
890 hsec = h->root.u.c.p->section;
891 break;
252b5132 892 }
252b5132 893
45d6a902
AM
894 if (hsec == NULL)
895 olddyn = FALSE;
896 else
897 olddyn = (hsec->symbol->flags & BSF_DYNAMIC) != 0;
898 }
252b5132 899
45d6a902
AM
900 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
901 respectively, appear to be a definition rather than reference. */
902
903 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
904 newdef = FALSE;
905 else
906 newdef = TRUE;
907
908 if (h->root.type == bfd_link_hash_undefined
909 || h->root.type == bfd_link_hash_undefweak
910 || h->root.type == bfd_link_hash_common)
911 olddef = FALSE;
912 else
913 olddef = TRUE;
914
7479dfd4
L
915 /* Check TLS symbol. */
916 if ((ELF_ST_TYPE (sym->st_info) == STT_TLS || h->type == STT_TLS)
917 && ELF_ST_TYPE (sym->st_info) != h->type)
918 {
919 bfd *ntbfd, *tbfd;
920 bfd_boolean ntdef, tdef;
921 asection *ntsec, *tsec;
922
923 if (h->type == STT_TLS)
924 {
925 ntbfd = abfd;
926 ntsec = sec;
927 ntdef = newdef;
928 tbfd = oldbfd;
929 tsec = oldsec;
930 tdef = olddef;
931 }
932 else
933 {
934 ntbfd = oldbfd;
935 ntsec = oldsec;
936 ntdef = olddef;
937 tbfd = abfd;
938 tsec = sec;
939 tdef = newdef;
940 }
941
942 if (tdef && ntdef)
943 (*_bfd_error_handler)
944 (_("%s: TLS definition in %B section %A mismatches non-TLS definition in %B section %A"),
945 tbfd, tsec, ntbfd, ntsec, h->root.root.string);
946 else if (!tdef && !ntdef)
947 (*_bfd_error_handler)
948 (_("%s: TLS reference in %B mismatches non-TLS reference in %B"),
949 tbfd, ntbfd, h->root.root.string);
950 else if (tdef)
951 (*_bfd_error_handler)
952 (_("%s: TLS definition in %B section %A mismatches non-TLS reference in %B"),
953 tbfd, tsec, ntbfd, h->root.root.string);
954 else
955 (*_bfd_error_handler)
956 (_("%s: TLS reference in %B mismatches non-TLS definition in %B section %A"),
957 tbfd, ntbfd, ntsec, h->root.root.string);
958
959 bfd_set_error (bfd_error_bad_value);
960 return FALSE;
961 }
962
4cc11e76 963 /* We need to remember if a symbol has a definition in a dynamic
45d6a902
AM
964 object or is weak in all dynamic objects. Internal and hidden
965 visibility will make it unavailable to dynamic objects. */
f5385ebf 966 if (newdyn && !h->dynamic_def)
45d6a902
AM
967 {
968 if (!bfd_is_und_section (sec))
f5385ebf 969 h->dynamic_def = 1;
45d6a902 970 else
252b5132 971 {
45d6a902
AM
972 /* Check if this symbol is weak in all dynamic objects. If it
973 is the first time we see it in a dynamic object, we mark
974 if it is weak. Otherwise, we clear it. */
f5385ebf 975 if (!h->ref_dynamic)
79349b09 976 {
45d6a902 977 if (bind == STB_WEAK)
f5385ebf 978 h->dynamic_weak = 1;
252b5132 979 }
45d6a902 980 else if (bind != STB_WEAK)
f5385ebf 981 h->dynamic_weak = 0;
252b5132 982 }
45d6a902 983 }
252b5132 984
45d6a902
AM
985 /* If the old symbol has non-default visibility, we ignore the new
986 definition from a dynamic object. */
987 if (newdyn
9c7a29a3 988 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
45d6a902
AM
989 && !bfd_is_und_section (sec))
990 {
991 *skip = TRUE;
992 /* Make sure this symbol is dynamic. */
f5385ebf 993 h->ref_dynamic = 1;
45d6a902
AM
994 /* A protected symbol has external availability. Make sure it is
995 recorded as dynamic.
996
997 FIXME: Should we check type and size for protected symbol? */
998 if (ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
c152c796 999 return bfd_elf_link_record_dynamic_symbol (info, h);
45d6a902
AM
1000 else
1001 return TRUE;
1002 }
1003 else if (!newdyn
9c7a29a3 1004 && ELF_ST_VISIBILITY (sym->st_other) != STV_DEFAULT
f5385ebf 1005 && h->def_dynamic)
45d6a902
AM
1006 {
1007 /* If the new symbol with non-default visibility comes from a
1008 relocatable file and the old definition comes from a dynamic
1009 object, we remove the old definition. */
1010 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1011 h = *sym_hash;
1de1a317 1012
f6e332e6 1013 if ((h->root.u.undef.next || info->hash->undefs_tail == &h->root)
1de1a317
L
1014 && bfd_is_und_section (sec))
1015 {
1016 /* If the new symbol is undefined and the old symbol was
1017 also undefined before, we need to make sure
1018 _bfd_generic_link_add_one_symbol doesn't mess
f6e332e6 1019 up the linker hash table undefs list. Since the old
1de1a317
L
1020 definition came from a dynamic object, it is still on the
1021 undefs list. */
1022 h->root.type = bfd_link_hash_undefined;
1de1a317
L
1023 h->root.u.undef.abfd = abfd;
1024 }
1025 else
1026 {
1027 h->root.type = bfd_link_hash_new;
1028 h->root.u.undef.abfd = NULL;
1029 }
1030
f5385ebf 1031 if (h->def_dynamic)
252b5132 1032 {
f5385ebf
AM
1033 h->def_dynamic = 0;
1034 h->ref_dynamic = 1;
1035 h->dynamic_def = 1;
45d6a902
AM
1036 }
1037 /* FIXME: Should we check type and size for protected symbol? */
1038 h->size = 0;
1039 h->type = 0;
1040 return TRUE;
1041 }
14a793b2 1042
79349b09
AM
1043 /* Differentiate strong and weak symbols. */
1044 newweak = bind == STB_WEAK;
1045 oldweak = (h->root.type == bfd_link_hash_defweak
1046 || h->root.type == bfd_link_hash_undefweak);
14a793b2 1047
15b43f48
AM
1048 /* If a new weak symbol definition comes from a regular file and the
1049 old symbol comes from a dynamic library, we treat the new one as
1050 strong. Similarly, an old weak symbol definition from a regular
1051 file is treated as strong when the new symbol comes from a dynamic
1052 library. Further, an old weak symbol from a dynamic library is
1053 treated as strong if the new symbol is from a dynamic library.
1054 This reflects the way glibc's ld.so works.
1055
1056 Do this before setting *type_change_ok or *size_change_ok so that
1057 we warn properly when dynamic library symbols are overridden. */
1058
1059 if (newdef && !newdyn && olddyn)
0f8a2703 1060 newweak = FALSE;
15b43f48 1061 if (olddef && newdyn)
0f8a2703
AM
1062 oldweak = FALSE;
1063
79349b09
AM
1064 /* It's OK to change the type if either the existing symbol or the
1065 new symbol is weak. A type change is also OK if the old symbol
1066 is undefined and the new symbol is defined. */
252b5132 1067
79349b09
AM
1068 if (oldweak
1069 || newweak
1070 || (newdef
1071 && h->root.type == bfd_link_hash_undefined))
1072 *type_change_ok = TRUE;
1073
1074 /* It's OK to change the size if either the existing symbol or the
1075 new symbol is weak, or if the old symbol is undefined. */
1076
1077 if (*type_change_ok
1078 || h->root.type == bfd_link_hash_undefined)
1079 *size_change_ok = TRUE;
45d6a902 1080
45d6a902
AM
1081 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
1082 symbol, respectively, appears to be a common symbol in a dynamic
1083 object. If a symbol appears in an uninitialized section, and is
1084 not weak, and is not a function, then it may be a common symbol
1085 which was resolved when the dynamic object was created. We want
1086 to treat such symbols specially, because they raise special
1087 considerations when setting the symbol size: if the symbol
1088 appears as a common symbol in a regular object, and the size in
1089 the regular object is larger, we must make sure that we use the
1090 larger size. This problematic case can always be avoided in C,
1091 but it must be handled correctly when using Fortran shared
1092 libraries.
1093
1094 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
1095 likewise for OLDDYNCOMMON and OLDDEF.
1096
1097 Note that this test is just a heuristic, and that it is quite
1098 possible to have an uninitialized symbol in a shared object which
1099 is really a definition, rather than a common symbol. This could
1100 lead to some minor confusion when the symbol really is a common
1101 symbol in some regular object. However, I think it will be
1102 harmless. */
1103
1104 if (newdyn
1105 && newdef
79349b09 1106 && !newweak
45d6a902
AM
1107 && (sec->flags & SEC_ALLOC) != 0
1108 && (sec->flags & SEC_LOAD) == 0
1109 && sym->st_size > 0
45d6a902
AM
1110 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
1111 newdyncommon = TRUE;
1112 else
1113 newdyncommon = FALSE;
1114
1115 if (olddyn
1116 && olddef
1117 && h->root.type == bfd_link_hash_defined
f5385ebf 1118 && h->def_dynamic
45d6a902
AM
1119 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
1120 && (h->root.u.def.section->flags & SEC_LOAD) == 0
1121 && h->size > 0
1122 && h->type != STT_FUNC)
1123 olddyncommon = TRUE;
1124 else
1125 olddyncommon = FALSE;
1126
45d6a902
AM
1127 /* If both the old and the new symbols look like common symbols in a
1128 dynamic object, set the size of the symbol to the larger of the
1129 two. */
1130
1131 if (olddyncommon
1132 && newdyncommon
1133 && sym->st_size != h->size)
1134 {
1135 /* Since we think we have two common symbols, issue a multiple
1136 common warning if desired. Note that we only warn if the
1137 size is different. If the size is the same, we simply let
1138 the old symbol override the new one as normally happens with
1139 symbols defined in dynamic objects. */
1140
1141 if (! ((*info->callbacks->multiple_common)
1142 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
1143 h->size, abfd, bfd_link_hash_common, sym->st_size)))
1144 return FALSE;
252b5132 1145
45d6a902
AM
1146 if (sym->st_size > h->size)
1147 h->size = sym->st_size;
252b5132 1148
45d6a902 1149 *size_change_ok = TRUE;
252b5132
RH
1150 }
1151
45d6a902
AM
1152 /* If we are looking at a dynamic object, and we have found a
1153 definition, we need to see if the symbol was already defined by
1154 some other object. If so, we want to use the existing
1155 definition, and we do not want to report a multiple symbol
1156 definition error; we do this by clobbering *PSEC to be
1157 bfd_und_section_ptr.
1158
1159 We treat a common symbol as a definition if the symbol in the
1160 shared library is a function, since common symbols always
1161 represent variables; this can cause confusion in principle, but
1162 any such confusion would seem to indicate an erroneous program or
1163 shared library. We also permit a common symbol in a regular
79349b09 1164 object to override a weak symbol in a shared object. */
45d6a902
AM
1165
1166 if (newdyn
1167 && newdef
77cfaee6 1168 && (olddef
45d6a902 1169 || (h->root.type == bfd_link_hash_common
79349b09 1170 && (newweak
0f8a2703 1171 || ELF_ST_TYPE (sym->st_info) == STT_FUNC))))
45d6a902
AM
1172 {
1173 *override = TRUE;
1174 newdef = FALSE;
1175 newdyncommon = FALSE;
252b5132 1176
45d6a902
AM
1177 *psec = sec = bfd_und_section_ptr;
1178 *size_change_ok = TRUE;
252b5132 1179
45d6a902
AM
1180 /* If we get here when the old symbol is a common symbol, then
1181 we are explicitly letting it override a weak symbol or
1182 function in a dynamic object, and we don't want to warn about
1183 a type change. If the old symbol is a defined symbol, a type
1184 change warning may still be appropriate. */
252b5132 1185
45d6a902
AM
1186 if (h->root.type == bfd_link_hash_common)
1187 *type_change_ok = TRUE;
1188 }
1189
1190 /* Handle the special case of an old common symbol merging with a
1191 new symbol which looks like a common symbol in a shared object.
1192 We change *PSEC and *PVALUE to make the new symbol look like a
1193 common symbol, and let _bfd_generic_link_add_one_symbol will do
1194 the right thing. */
1195
1196 if (newdyncommon
1197 && h->root.type == bfd_link_hash_common)
1198 {
1199 *override = TRUE;
1200 newdef = FALSE;
1201 newdyncommon = FALSE;
1202 *pvalue = sym->st_size;
1203 *psec = sec = bfd_com_section_ptr;
1204 *size_change_ok = TRUE;
1205 }
1206
1207 /* If the old symbol is from a dynamic object, and the new symbol is
1208 a definition which is not from a dynamic object, then the new
1209 symbol overrides the old symbol. Symbols from regular files
1210 always take precedence over symbols from dynamic objects, even if
1211 they are defined after the dynamic object in the link.
1212
1213 As above, we again permit a common symbol in a regular object to
1214 override a definition in a shared object if the shared object
0f8a2703 1215 symbol is a function or is weak. */
45d6a902
AM
1216
1217 flip = NULL;
77cfaee6 1218 if (!newdyn
45d6a902
AM
1219 && (newdef
1220 || (bfd_is_com_section (sec)
79349b09
AM
1221 && (oldweak
1222 || h->type == STT_FUNC)))
45d6a902
AM
1223 && olddyn
1224 && olddef
f5385ebf 1225 && h->def_dynamic)
45d6a902
AM
1226 {
1227 /* Change the hash table entry to undefined, and let
1228 _bfd_generic_link_add_one_symbol do the right thing with the
1229 new definition. */
1230
1231 h->root.type = bfd_link_hash_undefined;
1232 h->root.u.undef.abfd = h->root.u.def.section->owner;
1233 *size_change_ok = TRUE;
1234
1235 olddef = FALSE;
1236 olddyncommon = FALSE;
1237
1238 /* We again permit a type change when a common symbol may be
1239 overriding a function. */
1240
1241 if (bfd_is_com_section (sec))
1242 *type_change_ok = TRUE;
1243
1244 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1245 flip = *sym_hash;
1246 else
1247 /* This union may have been set to be non-NULL when this symbol
1248 was seen in a dynamic object. We must force the union to be
1249 NULL, so that it is correct for a regular symbol. */
1250 h->verinfo.vertree = NULL;
1251 }
1252
1253 /* Handle the special case of a new common symbol merging with an
1254 old symbol that looks like it might be a common symbol defined in
1255 a shared object. Note that we have already handled the case in
1256 which a new common symbol should simply override the definition
1257 in the shared library. */
1258
1259 if (! newdyn
1260 && bfd_is_com_section (sec)
1261 && olddyncommon)
1262 {
1263 /* It would be best if we could set the hash table entry to a
1264 common symbol, but we don't know what to use for the section
1265 or the alignment. */
1266 if (! ((*info->callbacks->multiple_common)
1267 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
1268 h->size, abfd, bfd_link_hash_common, sym->st_size)))
1269 return FALSE;
1270
4cc11e76 1271 /* If the presumed common symbol in the dynamic object is
45d6a902
AM
1272 larger, pretend that the new symbol has its size. */
1273
1274 if (h->size > *pvalue)
1275 *pvalue = h->size;
1276
af44c138
L
1277 /* We need to remember the alignment required by the symbol
1278 in the dynamic object. */
1279 BFD_ASSERT (pold_alignment);
1280 *pold_alignment = h->root.u.def.section->alignment_power;
45d6a902
AM
1281
1282 olddef = FALSE;
1283 olddyncommon = FALSE;
1284
1285 h->root.type = bfd_link_hash_undefined;
1286 h->root.u.undef.abfd = h->root.u.def.section->owner;
1287
1288 *size_change_ok = TRUE;
1289 *type_change_ok = TRUE;
1290
1291 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1292 flip = *sym_hash;
1293 else
1294 h->verinfo.vertree = NULL;
1295 }
1296
1297 if (flip != NULL)
1298 {
1299 /* Handle the case where we had a versioned symbol in a dynamic
1300 library and now find a definition in a normal object. In this
1301 case, we make the versioned symbol point to the normal one. */
9c5bfbb7 1302 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902
AM
1303 flip->root.type = h->root.type;
1304 h->root.type = bfd_link_hash_indirect;
1305 h->root.u.i.link = (struct bfd_link_hash_entry *) flip;
1306 (*bed->elf_backend_copy_indirect_symbol) (bed, flip, h);
1307 flip->root.u.undef.abfd = h->root.u.undef.abfd;
f5385ebf 1308 if (h->def_dynamic)
45d6a902 1309 {
f5385ebf
AM
1310 h->def_dynamic = 0;
1311 flip->ref_dynamic = 1;
45d6a902
AM
1312 }
1313 }
1314
45d6a902
AM
1315 return TRUE;
1316}
1317
1318/* This function is called to create an indirect symbol from the
1319 default for the symbol with the default version if needed. The
1320 symbol is described by H, NAME, SYM, PSEC, VALUE, and OVERRIDE. We
0f8a2703 1321 set DYNSYM if the new indirect symbol is dynamic. */
45d6a902
AM
1322
1323bfd_boolean
268b6b39
AM
1324_bfd_elf_add_default_symbol (bfd *abfd,
1325 struct bfd_link_info *info,
1326 struct elf_link_hash_entry *h,
1327 const char *name,
1328 Elf_Internal_Sym *sym,
1329 asection **psec,
1330 bfd_vma *value,
1331 bfd_boolean *dynsym,
0f8a2703 1332 bfd_boolean override)
45d6a902
AM
1333{
1334 bfd_boolean type_change_ok;
1335 bfd_boolean size_change_ok;
1336 bfd_boolean skip;
1337 char *shortname;
1338 struct elf_link_hash_entry *hi;
1339 struct bfd_link_hash_entry *bh;
9c5bfbb7 1340 const struct elf_backend_data *bed;
45d6a902
AM
1341 bfd_boolean collect;
1342 bfd_boolean dynamic;
1343 char *p;
1344 size_t len, shortlen;
1345 asection *sec;
1346
1347 /* If this symbol has a version, and it is the default version, we
1348 create an indirect symbol from the default name to the fully
1349 decorated name. This will cause external references which do not
1350 specify a version to be bound to this version of the symbol. */
1351 p = strchr (name, ELF_VER_CHR);
1352 if (p == NULL || p[1] != ELF_VER_CHR)
1353 return TRUE;
1354
1355 if (override)
1356 {
4cc11e76 1357 /* We are overridden by an old definition. We need to check if we
45d6a902
AM
1358 need to create the indirect symbol from the default name. */
1359 hi = elf_link_hash_lookup (elf_hash_table (info), name, TRUE,
1360 FALSE, FALSE);
1361 BFD_ASSERT (hi != NULL);
1362 if (hi == h)
1363 return TRUE;
1364 while (hi->root.type == bfd_link_hash_indirect
1365 || hi->root.type == bfd_link_hash_warning)
1366 {
1367 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1368 if (hi == h)
1369 return TRUE;
1370 }
1371 }
1372
1373 bed = get_elf_backend_data (abfd);
1374 collect = bed->collect;
1375 dynamic = (abfd->flags & DYNAMIC) != 0;
1376
1377 shortlen = p - name;
1378 shortname = bfd_hash_allocate (&info->hash->table, shortlen + 1);
1379 if (shortname == NULL)
1380 return FALSE;
1381 memcpy (shortname, name, shortlen);
1382 shortname[shortlen] = '\0';
1383
1384 /* We are going to create a new symbol. Merge it with any existing
1385 symbol with this name. For the purposes of the merge, act as
1386 though we were defining the symbol we just defined, although we
1387 actually going to define an indirect symbol. */
1388 type_change_ok = FALSE;
1389 size_change_ok = FALSE;
1390 sec = *psec;
1391 if (!_bfd_elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
af44c138
L
1392 NULL, &hi, &skip, &override,
1393 &type_change_ok, &size_change_ok))
45d6a902
AM
1394 return FALSE;
1395
1396 if (skip)
1397 goto nondefault;
1398
1399 if (! override)
1400 {
1401 bh = &hi->root;
1402 if (! (_bfd_generic_link_add_one_symbol
1403 (info, abfd, shortname, BSF_INDIRECT, bfd_ind_section_ptr,
268b6b39 1404 0, name, FALSE, collect, &bh)))
45d6a902
AM
1405 return FALSE;
1406 hi = (struct elf_link_hash_entry *) bh;
1407 }
1408 else
1409 {
1410 /* In this case the symbol named SHORTNAME is overriding the
1411 indirect symbol we want to add. We were planning on making
1412 SHORTNAME an indirect symbol referring to NAME. SHORTNAME
1413 is the name without a version. NAME is the fully versioned
1414 name, and it is the default version.
1415
1416 Overriding means that we already saw a definition for the
1417 symbol SHORTNAME in a regular object, and it is overriding
1418 the symbol defined in the dynamic object.
1419
1420 When this happens, we actually want to change NAME, the
1421 symbol we just added, to refer to SHORTNAME. This will cause
1422 references to NAME in the shared object to become references
1423 to SHORTNAME in the regular object. This is what we expect
1424 when we override a function in a shared object: that the
1425 references in the shared object will be mapped to the
1426 definition in the regular object. */
1427
1428 while (hi->root.type == bfd_link_hash_indirect
1429 || hi->root.type == bfd_link_hash_warning)
1430 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1431
1432 h->root.type = bfd_link_hash_indirect;
1433 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
f5385ebf 1434 if (h->def_dynamic)
45d6a902 1435 {
f5385ebf
AM
1436 h->def_dynamic = 0;
1437 hi->ref_dynamic = 1;
1438 if (hi->ref_regular
1439 || hi->def_regular)
45d6a902 1440 {
c152c796 1441 if (! bfd_elf_link_record_dynamic_symbol (info, hi))
45d6a902
AM
1442 return FALSE;
1443 }
1444 }
1445
1446 /* Now set HI to H, so that the following code will set the
1447 other fields correctly. */
1448 hi = h;
1449 }
1450
1451 /* If there is a duplicate definition somewhere, then HI may not
1452 point to an indirect symbol. We will have reported an error to
1453 the user in that case. */
1454
1455 if (hi->root.type == bfd_link_hash_indirect)
1456 {
1457 struct elf_link_hash_entry *ht;
1458
45d6a902
AM
1459 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
1460 (*bed->elf_backend_copy_indirect_symbol) (bed, ht, hi);
1461
1462 /* See if the new flags lead us to realize that the symbol must
1463 be dynamic. */
1464 if (! *dynsym)
1465 {
1466 if (! dynamic)
1467 {
1468 if (info->shared
f5385ebf 1469 || hi->ref_dynamic)
45d6a902
AM
1470 *dynsym = TRUE;
1471 }
1472 else
1473 {
f5385ebf 1474 if (hi->ref_regular)
45d6a902
AM
1475 *dynsym = TRUE;
1476 }
1477 }
1478 }
1479
1480 /* We also need to define an indirection from the nondefault version
1481 of the symbol. */
1482
1483nondefault:
1484 len = strlen (name);
1485 shortname = bfd_hash_allocate (&info->hash->table, len);
1486 if (shortname == NULL)
1487 return FALSE;
1488 memcpy (shortname, name, shortlen);
1489 memcpy (shortname + shortlen, p + 1, len - shortlen);
1490
1491 /* Once again, merge with any existing symbol. */
1492 type_change_ok = FALSE;
1493 size_change_ok = FALSE;
1494 sec = *psec;
1495 if (!_bfd_elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
af44c138
L
1496 NULL, &hi, &skip, &override,
1497 &type_change_ok, &size_change_ok))
45d6a902
AM
1498 return FALSE;
1499
1500 if (skip)
1501 return TRUE;
1502
1503 if (override)
1504 {
1505 /* Here SHORTNAME is a versioned name, so we don't expect to see
1506 the type of override we do in the case above unless it is
4cc11e76 1507 overridden by a versioned definition. */
45d6a902
AM
1508 if (hi->root.type != bfd_link_hash_defined
1509 && hi->root.type != bfd_link_hash_defweak)
1510 (*_bfd_error_handler)
d003868e
AM
1511 (_("%B: unexpected redefinition of indirect versioned symbol `%s'"),
1512 abfd, shortname);
45d6a902
AM
1513 }
1514 else
1515 {
1516 bh = &hi->root;
1517 if (! (_bfd_generic_link_add_one_symbol
1518 (info, abfd, shortname, BSF_INDIRECT,
268b6b39 1519 bfd_ind_section_ptr, 0, name, FALSE, collect, &bh)))
45d6a902
AM
1520 return FALSE;
1521 hi = (struct elf_link_hash_entry *) bh;
1522
1523 /* If there is a duplicate definition somewhere, then HI may not
1524 point to an indirect symbol. We will have reported an error
1525 to the user in that case. */
1526
1527 if (hi->root.type == bfd_link_hash_indirect)
1528 {
45d6a902
AM
1529 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
1530
1531 /* See if the new flags lead us to realize that the symbol
1532 must be dynamic. */
1533 if (! *dynsym)
1534 {
1535 if (! dynamic)
1536 {
1537 if (info->shared
f5385ebf 1538 || hi->ref_dynamic)
45d6a902
AM
1539 *dynsym = TRUE;
1540 }
1541 else
1542 {
f5385ebf 1543 if (hi->ref_regular)
45d6a902
AM
1544 *dynsym = TRUE;
1545 }
1546 }
1547 }
1548 }
1549
1550 return TRUE;
1551}
1552\f
1553/* This routine is used to export all defined symbols into the dynamic
1554 symbol table. It is called via elf_link_hash_traverse. */
1555
1556bfd_boolean
268b6b39 1557_bfd_elf_export_symbol (struct elf_link_hash_entry *h, void *data)
45d6a902 1558{
268b6b39 1559 struct elf_info_failed *eif = data;
45d6a902
AM
1560
1561 /* Ignore indirect symbols. These are added by the versioning code. */
1562 if (h->root.type == bfd_link_hash_indirect)
1563 return TRUE;
1564
1565 if (h->root.type == bfd_link_hash_warning)
1566 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1567
1568 if (h->dynindx == -1
f5385ebf
AM
1569 && (h->def_regular
1570 || h->ref_regular))
45d6a902
AM
1571 {
1572 struct bfd_elf_version_tree *t;
1573 struct bfd_elf_version_expr *d;
1574
1575 for (t = eif->verdefs; t != NULL; t = t->next)
1576 {
108ba305 1577 if (t->globals.list != NULL)
45d6a902 1578 {
108ba305
JJ
1579 d = (*t->match) (&t->globals, NULL, h->root.root.string);
1580 if (d != NULL)
1581 goto doit;
45d6a902
AM
1582 }
1583
108ba305 1584 if (t->locals.list != NULL)
45d6a902 1585 {
108ba305
JJ
1586 d = (*t->match) (&t->locals, NULL, h->root.root.string);
1587 if (d != NULL)
1588 return TRUE;
45d6a902
AM
1589 }
1590 }
1591
1592 if (!eif->verdefs)
1593 {
1594 doit:
c152c796 1595 if (! bfd_elf_link_record_dynamic_symbol (eif->info, h))
45d6a902
AM
1596 {
1597 eif->failed = TRUE;
1598 return FALSE;
1599 }
1600 }
1601 }
1602
1603 return TRUE;
1604}
1605\f
1606/* Look through the symbols which are defined in other shared
1607 libraries and referenced here. Update the list of version
1608 dependencies. This will be put into the .gnu.version_r section.
1609 This function is called via elf_link_hash_traverse. */
1610
1611bfd_boolean
268b6b39
AM
1612_bfd_elf_link_find_version_dependencies (struct elf_link_hash_entry *h,
1613 void *data)
45d6a902 1614{
268b6b39 1615 struct elf_find_verdep_info *rinfo = data;
45d6a902
AM
1616 Elf_Internal_Verneed *t;
1617 Elf_Internal_Vernaux *a;
1618 bfd_size_type amt;
1619
1620 if (h->root.type == bfd_link_hash_warning)
1621 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1622
1623 /* We only care about symbols defined in shared objects with version
1624 information. */
f5385ebf
AM
1625 if (!h->def_dynamic
1626 || h->def_regular
45d6a902
AM
1627 || h->dynindx == -1
1628 || h->verinfo.verdef == NULL)
1629 return TRUE;
1630
1631 /* See if we already know about this version. */
1632 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
1633 {
1634 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
1635 continue;
1636
1637 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1638 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
1639 return TRUE;
1640
1641 break;
1642 }
1643
1644 /* This is a new version. Add it to tree we are building. */
1645
1646 if (t == NULL)
1647 {
1648 amt = sizeof *t;
268b6b39 1649 t = bfd_zalloc (rinfo->output_bfd, amt);
45d6a902
AM
1650 if (t == NULL)
1651 {
1652 rinfo->failed = TRUE;
1653 return FALSE;
1654 }
1655
1656 t->vn_bfd = h->verinfo.verdef->vd_bfd;
1657 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
1658 elf_tdata (rinfo->output_bfd)->verref = t;
1659 }
1660
1661 amt = sizeof *a;
268b6b39 1662 a = bfd_zalloc (rinfo->output_bfd, amt);
45d6a902
AM
1663
1664 /* Note that we are copying a string pointer here, and testing it
1665 above. If bfd_elf_string_from_elf_section is ever changed to
1666 discard the string data when low in memory, this will have to be
1667 fixed. */
1668 a->vna_nodename = h->verinfo.verdef->vd_nodename;
1669
1670 a->vna_flags = h->verinfo.verdef->vd_flags;
1671 a->vna_nextptr = t->vn_auxptr;
1672
1673 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
1674 ++rinfo->vers;
1675
1676 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
1677
1678 t->vn_auxptr = a;
1679
1680 return TRUE;
1681}
1682
1683/* Figure out appropriate versions for all the symbols. We may not
1684 have the version number script until we have read all of the input
1685 files, so until that point we don't know which symbols should be
1686 local. This function is called via elf_link_hash_traverse. */
1687
1688bfd_boolean
268b6b39 1689_bfd_elf_link_assign_sym_version (struct elf_link_hash_entry *h, void *data)
45d6a902
AM
1690{
1691 struct elf_assign_sym_version_info *sinfo;
1692 struct bfd_link_info *info;
9c5bfbb7 1693 const struct elf_backend_data *bed;
45d6a902
AM
1694 struct elf_info_failed eif;
1695 char *p;
1696 bfd_size_type amt;
1697
268b6b39 1698 sinfo = data;
45d6a902
AM
1699 info = sinfo->info;
1700
1701 if (h->root.type == bfd_link_hash_warning)
1702 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1703
1704 /* Fix the symbol flags. */
1705 eif.failed = FALSE;
1706 eif.info = info;
1707 if (! _bfd_elf_fix_symbol_flags (h, &eif))
1708 {
1709 if (eif.failed)
1710 sinfo->failed = TRUE;
1711 return FALSE;
1712 }
1713
1714 /* We only need version numbers for symbols defined in regular
1715 objects. */
f5385ebf 1716 if (!h->def_regular)
45d6a902
AM
1717 return TRUE;
1718
1719 bed = get_elf_backend_data (sinfo->output_bfd);
1720 p = strchr (h->root.root.string, ELF_VER_CHR);
1721 if (p != NULL && h->verinfo.vertree == NULL)
1722 {
1723 struct bfd_elf_version_tree *t;
1724 bfd_boolean hidden;
1725
1726 hidden = TRUE;
1727
1728 /* There are two consecutive ELF_VER_CHR characters if this is
1729 not a hidden symbol. */
1730 ++p;
1731 if (*p == ELF_VER_CHR)
1732 {
1733 hidden = FALSE;
1734 ++p;
1735 }
1736
1737 /* If there is no version string, we can just return out. */
1738 if (*p == '\0')
1739 {
1740 if (hidden)
f5385ebf 1741 h->hidden = 1;
45d6a902
AM
1742 return TRUE;
1743 }
1744
1745 /* Look for the version. If we find it, it is no longer weak. */
1746 for (t = sinfo->verdefs; t != NULL; t = t->next)
1747 {
1748 if (strcmp (t->name, p) == 0)
1749 {
1750 size_t len;
1751 char *alc;
1752 struct bfd_elf_version_expr *d;
1753
1754 len = p - h->root.root.string;
268b6b39 1755 alc = bfd_malloc (len);
45d6a902
AM
1756 if (alc == NULL)
1757 return FALSE;
1758 memcpy (alc, h->root.root.string, len - 1);
1759 alc[len - 1] = '\0';
1760 if (alc[len - 2] == ELF_VER_CHR)
1761 alc[len - 2] = '\0';
1762
1763 h->verinfo.vertree = t;
1764 t->used = TRUE;
1765 d = NULL;
1766
108ba305
JJ
1767 if (t->globals.list != NULL)
1768 d = (*t->match) (&t->globals, NULL, alc);
45d6a902
AM
1769
1770 /* See if there is anything to force this symbol to
1771 local scope. */
108ba305 1772 if (d == NULL && t->locals.list != NULL)
45d6a902 1773 {
108ba305
JJ
1774 d = (*t->match) (&t->locals, NULL, alc);
1775 if (d != NULL
1776 && h->dynindx != -1
1777 && info->shared
1778 && ! info->export_dynamic)
1779 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
45d6a902
AM
1780 }
1781
1782 free (alc);
1783 break;
1784 }
1785 }
1786
1787 /* If we are building an application, we need to create a
1788 version node for this version. */
36af4a4e 1789 if (t == NULL && info->executable)
45d6a902
AM
1790 {
1791 struct bfd_elf_version_tree **pp;
1792 int version_index;
1793
1794 /* If we aren't going to export this symbol, we don't need
1795 to worry about it. */
1796 if (h->dynindx == -1)
1797 return TRUE;
1798
1799 amt = sizeof *t;
108ba305 1800 t = bfd_zalloc (sinfo->output_bfd, amt);
45d6a902
AM
1801 if (t == NULL)
1802 {
1803 sinfo->failed = TRUE;
1804 return FALSE;
1805 }
1806
45d6a902 1807 t->name = p;
45d6a902
AM
1808 t->name_indx = (unsigned int) -1;
1809 t->used = TRUE;
1810
1811 version_index = 1;
1812 /* Don't count anonymous version tag. */
1813 if (sinfo->verdefs != NULL && sinfo->verdefs->vernum == 0)
1814 version_index = 0;
1815 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
1816 ++version_index;
1817 t->vernum = version_index;
1818
1819 *pp = t;
1820
1821 h->verinfo.vertree = t;
1822 }
1823 else if (t == NULL)
1824 {
1825 /* We could not find the version for a symbol when
1826 generating a shared archive. Return an error. */
1827 (*_bfd_error_handler)
d003868e
AM
1828 (_("%B: undefined versioned symbol name %s"),
1829 sinfo->output_bfd, h->root.root.string);
45d6a902
AM
1830 bfd_set_error (bfd_error_bad_value);
1831 sinfo->failed = TRUE;
1832 return FALSE;
1833 }
1834
1835 if (hidden)
f5385ebf 1836 h->hidden = 1;
45d6a902
AM
1837 }
1838
1839 /* If we don't have a version for this symbol, see if we can find
1840 something. */
1841 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
1842 {
1843 struct bfd_elf_version_tree *t;
1844 struct bfd_elf_version_tree *local_ver;
1845 struct bfd_elf_version_expr *d;
1846
1847 /* See if can find what version this symbol is in. If the
1848 symbol is supposed to be local, then don't actually register
1849 it. */
1850 local_ver = NULL;
1851 for (t = sinfo->verdefs; t != NULL; t = t->next)
1852 {
108ba305 1853 if (t->globals.list != NULL)
45d6a902
AM
1854 {
1855 bfd_boolean matched;
1856
1857 matched = FALSE;
108ba305
JJ
1858 d = NULL;
1859 while ((d = (*t->match) (&t->globals, d,
1860 h->root.root.string)) != NULL)
1861 if (d->symver)
1862 matched = TRUE;
1863 else
1864 {
1865 /* There is a version without definition. Make
1866 the symbol the default definition for this
1867 version. */
1868 h->verinfo.vertree = t;
1869 local_ver = NULL;
1870 d->script = 1;
1871 break;
1872 }
45d6a902
AM
1873 if (d != NULL)
1874 break;
1875 else if (matched)
1876 /* There is no undefined version for this symbol. Hide the
1877 default one. */
1878 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
1879 }
1880
108ba305 1881 if (t->locals.list != NULL)
45d6a902 1882 {
108ba305
JJ
1883 d = NULL;
1884 while ((d = (*t->match) (&t->locals, d,
1885 h->root.root.string)) != NULL)
45d6a902 1886 {
108ba305 1887 local_ver = t;
45d6a902 1888 /* If the match is "*", keep looking for a more
108ba305
JJ
1889 explicit, perhaps even global, match.
1890 XXX: Shouldn't this be !d->wildcard instead? */
1891 if (d->pattern[0] != '*' || d->pattern[1] != '\0')
1892 break;
45d6a902
AM
1893 }
1894
1895 if (d != NULL)
1896 break;
1897 }
1898 }
1899
1900 if (local_ver != NULL)
1901 {
1902 h->verinfo.vertree = local_ver;
1903 if (h->dynindx != -1
1904 && info->shared
1905 && ! info->export_dynamic)
1906 {
1907 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
1908 }
1909 }
1910 }
1911
1912 return TRUE;
1913}
1914\f
45d6a902
AM
1915/* Read and swap the relocs from the section indicated by SHDR. This
1916 may be either a REL or a RELA section. The relocations are
1917 translated into RELA relocations and stored in INTERNAL_RELOCS,
1918 which should have already been allocated to contain enough space.
1919 The EXTERNAL_RELOCS are a buffer where the external form of the
1920 relocations should be stored.
1921
1922 Returns FALSE if something goes wrong. */
1923
1924static bfd_boolean
268b6b39 1925elf_link_read_relocs_from_section (bfd *abfd,
243ef1e0 1926 asection *sec,
268b6b39
AM
1927 Elf_Internal_Shdr *shdr,
1928 void *external_relocs,
1929 Elf_Internal_Rela *internal_relocs)
45d6a902 1930{
9c5bfbb7 1931 const struct elf_backend_data *bed;
268b6b39 1932 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
45d6a902
AM
1933 const bfd_byte *erela;
1934 const bfd_byte *erelaend;
1935 Elf_Internal_Rela *irela;
243ef1e0
L
1936 Elf_Internal_Shdr *symtab_hdr;
1937 size_t nsyms;
45d6a902 1938
45d6a902
AM
1939 /* Position ourselves at the start of the section. */
1940 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
1941 return FALSE;
1942
1943 /* Read the relocations. */
1944 if (bfd_bread (external_relocs, shdr->sh_size, abfd) != shdr->sh_size)
1945 return FALSE;
1946
243ef1e0
L
1947 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1948 nsyms = symtab_hdr->sh_size / symtab_hdr->sh_entsize;
1949
45d6a902
AM
1950 bed = get_elf_backend_data (abfd);
1951
1952 /* Convert the external relocations to the internal format. */
1953 if (shdr->sh_entsize == bed->s->sizeof_rel)
1954 swap_in = bed->s->swap_reloc_in;
1955 else if (shdr->sh_entsize == bed->s->sizeof_rela)
1956 swap_in = bed->s->swap_reloca_in;
1957 else
1958 {
1959 bfd_set_error (bfd_error_wrong_format);
1960 return FALSE;
1961 }
1962
1963 erela = external_relocs;
51992aec 1964 erelaend = erela + shdr->sh_size;
45d6a902
AM
1965 irela = internal_relocs;
1966 while (erela < erelaend)
1967 {
243ef1e0
L
1968 bfd_vma r_symndx;
1969
45d6a902 1970 (*swap_in) (abfd, erela, irela);
243ef1e0
L
1971 r_symndx = ELF32_R_SYM (irela->r_info);
1972 if (bed->s->arch_size == 64)
1973 r_symndx >>= 24;
1974 if ((size_t) r_symndx >= nsyms)
1975 {
1976 (*_bfd_error_handler)
d003868e
AM
1977 (_("%B: bad reloc symbol index (0x%lx >= 0x%lx)"
1978 " for offset 0x%lx in section `%A'"),
1979 abfd, sec,
1980 (unsigned long) r_symndx, (unsigned long) nsyms, irela->r_offset);
243ef1e0
L
1981 bfd_set_error (bfd_error_bad_value);
1982 return FALSE;
1983 }
45d6a902
AM
1984 irela += bed->s->int_rels_per_ext_rel;
1985 erela += shdr->sh_entsize;
1986 }
1987
1988 return TRUE;
1989}
1990
1991/* Read and swap the relocs for a section O. They may have been
1992 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
1993 not NULL, they are used as buffers to read into. They are known to
1994 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
1995 the return value is allocated using either malloc or bfd_alloc,
1996 according to the KEEP_MEMORY argument. If O has two relocation
1997 sections (both REL and RELA relocations), then the REL_HDR
1998 relocations will appear first in INTERNAL_RELOCS, followed by the
1999 REL_HDR2 relocations. */
2000
2001Elf_Internal_Rela *
268b6b39
AM
2002_bfd_elf_link_read_relocs (bfd *abfd,
2003 asection *o,
2004 void *external_relocs,
2005 Elf_Internal_Rela *internal_relocs,
2006 bfd_boolean keep_memory)
45d6a902
AM
2007{
2008 Elf_Internal_Shdr *rel_hdr;
268b6b39 2009 void *alloc1 = NULL;
45d6a902 2010 Elf_Internal_Rela *alloc2 = NULL;
9c5bfbb7 2011 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902
AM
2012
2013 if (elf_section_data (o)->relocs != NULL)
2014 return elf_section_data (o)->relocs;
2015
2016 if (o->reloc_count == 0)
2017 return NULL;
2018
2019 rel_hdr = &elf_section_data (o)->rel_hdr;
2020
2021 if (internal_relocs == NULL)
2022 {
2023 bfd_size_type size;
2024
2025 size = o->reloc_count;
2026 size *= bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
2027 if (keep_memory)
268b6b39 2028 internal_relocs = bfd_alloc (abfd, size);
45d6a902 2029 else
268b6b39 2030 internal_relocs = alloc2 = bfd_malloc (size);
45d6a902
AM
2031 if (internal_relocs == NULL)
2032 goto error_return;
2033 }
2034
2035 if (external_relocs == NULL)
2036 {
2037 bfd_size_type size = rel_hdr->sh_size;
2038
2039 if (elf_section_data (o)->rel_hdr2)
2040 size += elf_section_data (o)->rel_hdr2->sh_size;
268b6b39 2041 alloc1 = bfd_malloc (size);
45d6a902
AM
2042 if (alloc1 == NULL)
2043 goto error_return;
2044 external_relocs = alloc1;
2045 }
2046
243ef1e0 2047 if (!elf_link_read_relocs_from_section (abfd, o, rel_hdr,
45d6a902
AM
2048 external_relocs,
2049 internal_relocs))
2050 goto error_return;
51992aec
AM
2051 if (elf_section_data (o)->rel_hdr2
2052 && (!elf_link_read_relocs_from_section
2053 (abfd, o,
2054 elf_section_data (o)->rel_hdr2,
2055 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
2056 internal_relocs + (NUM_SHDR_ENTRIES (rel_hdr)
2057 * bed->s->int_rels_per_ext_rel))))
45d6a902
AM
2058 goto error_return;
2059
2060 /* Cache the results for next time, if we can. */
2061 if (keep_memory)
2062 elf_section_data (o)->relocs = internal_relocs;
2063
2064 if (alloc1 != NULL)
2065 free (alloc1);
2066
2067 /* Don't free alloc2, since if it was allocated we are passing it
2068 back (under the name of internal_relocs). */
2069
2070 return internal_relocs;
2071
2072 error_return:
2073 if (alloc1 != NULL)
2074 free (alloc1);
2075 if (alloc2 != NULL)
2076 free (alloc2);
2077 return NULL;
2078}
2079
2080/* Compute the size of, and allocate space for, REL_HDR which is the
2081 section header for a section containing relocations for O. */
2082
2083bfd_boolean
268b6b39
AM
2084_bfd_elf_link_size_reloc_section (bfd *abfd,
2085 Elf_Internal_Shdr *rel_hdr,
2086 asection *o)
45d6a902
AM
2087{
2088 bfd_size_type reloc_count;
2089 bfd_size_type num_rel_hashes;
2090
2091 /* Figure out how many relocations there will be. */
2092 if (rel_hdr == &elf_section_data (o)->rel_hdr)
2093 reloc_count = elf_section_data (o)->rel_count;
2094 else
2095 reloc_count = elf_section_data (o)->rel_count2;
2096
2097 num_rel_hashes = o->reloc_count;
2098 if (num_rel_hashes < reloc_count)
2099 num_rel_hashes = reloc_count;
2100
2101 /* That allows us to calculate the size of the section. */
2102 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
2103
2104 /* The contents field must last into write_object_contents, so we
2105 allocate it with bfd_alloc rather than malloc. Also since we
2106 cannot be sure that the contents will actually be filled in,
2107 we zero the allocated space. */
268b6b39 2108 rel_hdr->contents = bfd_zalloc (abfd, rel_hdr->sh_size);
45d6a902
AM
2109 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
2110 return FALSE;
2111
2112 /* We only allocate one set of hash entries, so we only do it the
2113 first time we are called. */
2114 if (elf_section_data (o)->rel_hashes == NULL
2115 && num_rel_hashes)
2116 {
2117 struct elf_link_hash_entry **p;
2118
268b6b39 2119 p = bfd_zmalloc (num_rel_hashes * sizeof (struct elf_link_hash_entry *));
45d6a902
AM
2120 if (p == NULL)
2121 return FALSE;
2122
2123 elf_section_data (o)->rel_hashes = p;
2124 }
2125
2126 return TRUE;
2127}
2128
2129/* Copy the relocations indicated by the INTERNAL_RELOCS (which
2130 originated from the section given by INPUT_REL_HDR) to the
2131 OUTPUT_BFD. */
2132
2133bfd_boolean
268b6b39
AM
2134_bfd_elf_link_output_relocs (bfd *output_bfd,
2135 asection *input_section,
2136 Elf_Internal_Shdr *input_rel_hdr,
2137 Elf_Internal_Rela *internal_relocs)
45d6a902
AM
2138{
2139 Elf_Internal_Rela *irela;
2140 Elf_Internal_Rela *irelaend;
2141 bfd_byte *erel;
2142 Elf_Internal_Shdr *output_rel_hdr;
2143 asection *output_section;
2144 unsigned int *rel_countp = NULL;
9c5bfbb7 2145 const struct elf_backend_data *bed;
268b6b39 2146 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
45d6a902
AM
2147
2148 output_section = input_section->output_section;
2149 output_rel_hdr = NULL;
2150
2151 if (elf_section_data (output_section)->rel_hdr.sh_entsize
2152 == input_rel_hdr->sh_entsize)
2153 {
2154 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
2155 rel_countp = &elf_section_data (output_section)->rel_count;
2156 }
2157 else if (elf_section_data (output_section)->rel_hdr2
2158 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
2159 == input_rel_hdr->sh_entsize))
2160 {
2161 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
2162 rel_countp = &elf_section_data (output_section)->rel_count2;
2163 }
2164 else
2165 {
2166 (*_bfd_error_handler)
d003868e
AM
2167 (_("%B: relocation size mismatch in %B section %A"),
2168 output_bfd, input_section->owner, input_section);
45d6a902
AM
2169 bfd_set_error (bfd_error_wrong_object_format);
2170 return FALSE;
2171 }
2172
2173 bed = get_elf_backend_data (output_bfd);
2174 if (input_rel_hdr->sh_entsize == bed->s->sizeof_rel)
2175 swap_out = bed->s->swap_reloc_out;
2176 else if (input_rel_hdr->sh_entsize == bed->s->sizeof_rela)
2177 swap_out = bed->s->swap_reloca_out;
2178 else
2179 abort ();
2180
2181 erel = output_rel_hdr->contents;
2182 erel += *rel_countp * input_rel_hdr->sh_entsize;
2183 irela = internal_relocs;
2184 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
2185 * bed->s->int_rels_per_ext_rel);
2186 while (irela < irelaend)
2187 {
2188 (*swap_out) (output_bfd, irela, erel);
2189 irela += bed->s->int_rels_per_ext_rel;
2190 erel += input_rel_hdr->sh_entsize;
2191 }
2192
2193 /* Bump the counter, so that we know where to add the next set of
2194 relocations. */
2195 *rel_countp += NUM_SHDR_ENTRIES (input_rel_hdr);
2196
2197 return TRUE;
2198}
2199\f
2200/* Fix up the flags for a symbol. This handles various cases which
2201 can only be fixed after all the input files are seen. This is
2202 currently called by both adjust_dynamic_symbol and
2203 assign_sym_version, which is unnecessary but perhaps more robust in
2204 the face of future changes. */
2205
2206bfd_boolean
268b6b39
AM
2207_bfd_elf_fix_symbol_flags (struct elf_link_hash_entry *h,
2208 struct elf_info_failed *eif)
45d6a902
AM
2209{
2210 /* If this symbol was mentioned in a non-ELF file, try to set
2211 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
2212 permit a non-ELF file to correctly refer to a symbol defined in
2213 an ELF dynamic object. */
f5385ebf 2214 if (h->non_elf)
45d6a902
AM
2215 {
2216 while (h->root.type == bfd_link_hash_indirect)
2217 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2218
2219 if (h->root.type != bfd_link_hash_defined
2220 && h->root.type != bfd_link_hash_defweak)
f5385ebf
AM
2221 {
2222 h->ref_regular = 1;
2223 h->ref_regular_nonweak = 1;
2224 }
45d6a902
AM
2225 else
2226 {
2227 if (h->root.u.def.section->owner != NULL
2228 && (bfd_get_flavour (h->root.u.def.section->owner)
2229 == bfd_target_elf_flavour))
f5385ebf
AM
2230 {
2231 h->ref_regular = 1;
2232 h->ref_regular_nonweak = 1;
2233 }
45d6a902 2234 else
f5385ebf 2235 h->def_regular = 1;
45d6a902
AM
2236 }
2237
2238 if (h->dynindx == -1
f5385ebf
AM
2239 && (h->def_dynamic
2240 || h->ref_dynamic))
45d6a902 2241 {
c152c796 2242 if (! bfd_elf_link_record_dynamic_symbol (eif->info, h))
45d6a902
AM
2243 {
2244 eif->failed = TRUE;
2245 return FALSE;
2246 }
2247 }
2248 }
2249 else
2250 {
f5385ebf 2251 /* Unfortunately, NON_ELF is only correct if the symbol
45d6a902
AM
2252 was first seen in a non-ELF file. Fortunately, if the symbol
2253 was first seen in an ELF file, we're probably OK unless the
2254 symbol was defined in a non-ELF file. Catch that case here.
2255 FIXME: We're still in trouble if the symbol was first seen in
2256 a dynamic object, and then later in a non-ELF regular object. */
2257 if ((h->root.type == bfd_link_hash_defined
2258 || h->root.type == bfd_link_hash_defweak)
f5385ebf 2259 && !h->def_regular
45d6a902
AM
2260 && (h->root.u.def.section->owner != NULL
2261 ? (bfd_get_flavour (h->root.u.def.section->owner)
2262 != bfd_target_elf_flavour)
2263 : (bfd_is_abs_section (h->root.u.def.section)
f5385ebf
AM
2264 && !h->def_dynamic)))
2265 h->def_regular = 1;
45d6a902
AM
2266 }
2267
2268 /* If this is a final link, and the symbol was defined as a common
2269 symbol in a regular object file, and there was no definition in
2270 any dynamic object, then the linker will have allocated space for
f5385ebf 2271 the symbol in a common section but the DEF_REGULAR
45d6a902
AM
2272 flag will not have been set. */
2273 if (h->root.type == bfd_link_hash_defined
f5385ebf
AM
2274 && !h->def_regular
2275 && h->ref_regular
2276 && !h->def_dynamic
45d6a902 2277 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
f5385ebf 2278 h->def_regular = 1;
45d6a902
AM
2279
2280 /* If -Bsymbolic was used (which means to bind references to global
2281 symbols to the definition within the shared object), and this
2282 symbol was defined in a regular object, then it actually doesn't
9c7a29a3
AM
2283 need a PLT entry. Likewise, if the symbol has non-default
2284 visibility. If the symbol has hidden or internal visibility, we
c1be741f 2285 will force it local. */
f5385ebf 2286 if (h->needs_plt
45d6a902 2287 && eif->info->shared
0eddce27 2288 && is_elf_hash_table (eif->info->hash)
45d6a902 2289 && (eif->info->symbolic
c1be741f 2290 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
f5385ebf 2291 && h->def_regular)
45d6a902 2292 {
9c5bfbb7 2293 const struct elf_backend_data *bed;
45d6a902
AM
2294 bfd_boolean force_local;
2295
2296 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2297
2298 force_local = (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
2299 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN);
2300 (*bed->elf_backend_hide_symbol) (eif->info, h, force_local);
2301 }
2302
2303 /* If a weak undefined symbol has non-default visibility, we also
2304 hide it from the dynamic linker. */
9c7a29a3 2305 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
45d6a902
AM
2306 && h->root.type == bfd_link_hash_undefweak)
2307 {
9c5bfbb7 2308 const struct elf_backend_data *bed;
45d6a902
AM
2309 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2310 (*bed->elf_backend_hide_symbol) (eif->info, h, TRUE);
2311 }
2312
2313 /* If this is a weak defined symbol in a dynamic object, and we know
2314 the real definition in the dynamic object, copy interesting flags
2315 over to the real definition. */
f6e332e6 2316 if (h->u.weakdef != NULL)
45d6a902
AM
2317 {
2318 struct elf_link_hash_entry *weakdef;
2319
f6e332e6 2320 weakdef = h->u.weakdef;
45d6a902
AM
2321 if (h->root.type == bfd_link_hash_indirect)
2322 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2323
2324 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2325 || h->root.type == bfd_link_hash_defweak);
2326 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
2327 || weakdef->root.type == bfd_link_hash_defweak);
f5385ebf 2328 BFD_ASSERT (weakdef->def_dynamic);
45d6a902
AM
2329
2330 /* If the real definition is defined by a regular object file,
2331 don't do anything special. See the longer description in
2332 _bfd_elf_adjust_dynamic_symbol, below. */
f5385ebf 2333 if (weakdef->def_regular)
f6e332e6 2334 h->u.weakdef = NULL;
45d6a902
AM
2335 else
2336 {
9c5bfbb7 2337 const struct elf_backend_data *bed;
45d6a902
AM
2338
2339 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2340 (*bed->elf_backend_copy_indirect_symbol) (bed, weakdef, h);
2341 }
2342 }
2343
2344 return TRUE;
2345}
2346
2347/* Make the backend pick a good value for a dynamic symbol. This is
2348 called via elf_link_hash_traverse, and also calls itself
2349 recursively. */
2350
2351bfd_boolean
268b6b39 2352_bfd_elf_adjust_dynamic_symbol (struct elf_link_hash_entry *h, void *data)
45d6a902 2353{
268b6b39 2354 struct elf_info_failed *eif = data;
45d6a902 2355 bfd *dynobj;
9c5bfbb7 2356 const struct elf_backend_data *bed;
45d6a902 2357
0eddce27 2358 if (! is_elf_hash_table (eif->info->hash))
45d6a902
AM
2359 return FALSE;
2360
2361 if (h->root.type == bfd_link_hash_warning)
2362 {
2363 h->plt = elf_hash_table (eif->info)->init_offset;
2364 h->got = elf_hash_table (eif->info)->init_offset;
2365
2366 /* When warning symbols are created, they **replace** the "real"
2367 entry in the hash table, thus we never get to see the real
2368 symbol in a hash traversal. So look at it now. */
2369 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2370 }
2371
2372 /* Ignore indirect symbols. These are added by the versioning code. */
2373 if (h->root.type == bfd_link_hash_indirect)
2374 return TRUE;
2375
2376 /* Fix the symbol flags. */
2377 if (! _bfd_elf_fix_symbol_flags (h, eif))
2378 return FALSE;
2379
2380 /* If this symbol does not require a PLT entry, and it is not
2381 defined by a dynamic object, or is not referenced by a regular
2382 object, ignore it. We do have to handle a weak defined symbol,
2383 even if no regular object refers to it, if we decided to add it
2384 to the dynamic symbol table. FIXME: Do we normally need to worry
2385 about symbols which are defined by one dynamic object and
2386 referenced by another one? */
f5385ebf
AM
2387 if (!h->needs_plt
2388 && (h->def_regular
2389 || !h->def_dynamic
2390 || (!h->ref_regular
f6e332e6 2391 && (h->u.weakdef == NULL || h->u.weakdef->dynindx == -1))))
45d6a902
AM
2392 {
2393 h->plt = elf_hash_table (eif->info)->init_offset;
2394 return TRUE;
2395 }
2396
2397 /* If we've already adjusted this symbol, don't do it again. This
2398 can happen via a recursive call. */
f5385ebf 2399 if (h->dynamic_adjusted)
45d6a902
AM
2400 return TRUE;
2401
2402 /* Don't look at this symbol again. Note that we must set this
2403 after checking the above conditions, because we may look at a
2404 symbol once, decide not to do anything, and then get called
2405 recursively later after REF_REGULAR is set below. */
f5385ebf 2406 h->dynamic_adjusted = 1;
45d6a902
AM
2407
2408 /* If this is a weak definition, and we know a real definition, and
2409 the real symbol is not itself defined by a regular object file,
2410 then get a good value for the real definition. We handle the
2411 real symbol first, for the convenience of the backend routine.
2412
2413 Note that there is a confusing case here. If the real definition
2414 is defined by a regular object file, we don't get the real symbol
2415 from the dynamic object, but we do get the weak symbol. If the
2416 processor backend uses a COPY reloc, then if some routine in the
2417 dynamic object changes the real symbol, we will not see that
2418 change in the corresponding weak symbol. This is the way other
2419 ELF linkers work as well, and seems to be a result of the shared
2420 library model.
2421
2422 I will clarify this issue. Most SVR4 shared libraries define the
2423 variable _timezone and define timezone as a weak synonym. The
2424 tzset call changes _timezone. If you write
2425 extern int timezone;
2426 int _timezone = 5;
2427 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
2428 you might expect that, since timezone is a synonym for _timezone,
2429 the same number will print both times. However, if the processor
2430 backend uses a COPY reloc, then actually timezone will be copied
2431 into your process image, and, since you define _timezone
2432 yourself, _timezone will not. Thus timezone and _timezone will
2433 wind up at different memory locations. The tzset call will set
2434 _timezone, leaving timezone unchanged. */
2435
f6e332e6 2436 if (h->u.weakdef != NULL)
45d6a902
AM
2437 {
2438 /* If we get to this point, we know there is an implicit
2439 reference by a regular object file via the weak symbol H.
2440 FIXME: Is this really true? What if the traversal finds
f6e332e6
AM
2441 H->U.WEAKDEF before it finds H? */
2442 h->u.weakdef->ref_regular = 1;
45d6a902 2443
f6e332e6 2444 if (! _bfd_elf_adjust_dynamic_symbol (h->u.weakdef, eif))
45d6a902
AM
2445 return FALSE;
2446 }
2447
2448 /* If a symbol has no type and no size and does not require a PLT
2449 entry, then we are probably about to do the wrong thing here: we
2450 are probably going to create a COPY reloc for an empty object.
2451 This case can arise when a shared object is built with assembly
2452 code, and the assembly code fails to set the symbol type. */
2453 if (h->size == 0
2454 && h->type == STT_NOTYPE
f5385ebf 2455 && !h->needs_plt)
45d6a902
AM
2456 (*_bfd_error_handler)
2457 (_("warning: type and size of dynamic symbol `%s' are not defined"),
2458 h->root.root.string);
2459
2460 dynobj = elf_hash_table (eif->info)->dynobj;
2461 bed = get_elf_backend_data (dynobj);
2462 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
2463 {
2464 eif->failed = TRUE;
2465 return FALSE;
2466 }
2467
2468 return TRUE;
2469}
2470
2471/* Adjust all external symbols pointing into SEC_MERGE sections
2472 to reflect the object merging within the sections. */
2473
2474bfd_boolean
268b6b39 2475_bfd_elf_link_sec_merge_syms (struct elf_link_hash_entry *h, void *data)
45d6a902
AM
2476{
2477 asection *sec;
2478
2479 if (h->root.type == bfd_link_hash_warning)
2480 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2481
2482 if ((h->root.type == bfd_link_hash_defined
2483 || h->root.type == bfd_link_hash_defweak)
2484 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
2485 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
2486 {
268b6b39 2487 bfd *output_bfd = data;
45d6a902
AM
2488
2489 h->root.u.def.value =
2490 _bfd_merged_section_offset (output_bfd,
2491 &h->root.u.def.section,
2492 elf_section_data (sec)->sec_info,
753731ee 2493 h->root.u.def.value);
45d6a902
AM
2494 }
2495
2496 return TRUE;
2497}
986a241f
RH
2498
2499/* Returns false if the symbol referred to by H should be considered
2500 to resolve local to the current module, and true if it should be
2501 considered to bind dynamically. */
2502
2503bfd_boolean
268b6b39
AM
2504_bfd_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
2505 struct bfd_link_info *info,
2506 bfd_boolean ignore_protected)
986a241f
RH
2507{
2508 bfd_boolean binding_stays_local_p;
2509
2510 if (h == NULL)
2511 return FALSE;
2512
2513 while (h->root.type == bfd_link_hash_indirect
2514 || h->root.type == bfd_link_hash_warning)
2515 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2516
2517 /* If it was forced local, then clearly it's not dynamic. */
2518 if (h->dynindx == -1)
2519 return FALSE;
f5385ebf 2520 if (h->forced_local)
986a241f
RH
2521 return FALSE;
2522
2523 /* Identify the cases where name binding rules say that a
2524 visible symbol resolves locally. */
2525 binding_stays_local_p = info->executable || info->symbolic;
2526
2527 switch (ELF_ST_VISIBILITY (h->other))
2528 {
2529 case STV_INTERNAL:
2530 case STV_HIDDEN:
2531 return FALSE;
2532
2533 case STV_PROTECTED:
2534 /* Proper resolution for function pointer equality may require
2535 that these symbols perhaps be resolved dynamically, even though
2536 we should be resolving them to the current module. */
1c16dfa5 2537 if (!ignore_protected || h->type != STT_FUNC)
986a241f
RH
2538 binding_stays_local_p = TRUE;
2539 break;
2540
2541 default:
986a241f
RH
2542 break;
2543 }
2544
aa37626c 2545 /* If it isn't defined locally, then clearly it's dynamic. */
f5385ebf 2546 if (!h->def_regular)
aa37626c
L
2547 return TRUE;
2548
986a241f
RH
2549 /* Otherwise, the symbol is dynamic if binding rules don't tell
2550 us that it remains local. */
2551 return !binding_stays_local_p;
2552}
f6c52c13
AM
2553
2554/* Return true if the symbol referred to by H should be considered
2555 to resolve local to the current module, and false otherwise. Differs
2556 from (the inverse of) _bfd_elf_dynamic_symbol_p in the treatment of
2557 undefined symbols and weak symbols. */
2558
2559bfd_boolean
268b6b39
AM
2560_bfd_elf_symbol_refs_local_p (struct elf_link_hash_entry *h,
2561 struct bfd_link_info *info,
2562 bfd_boolean local_protected)
f6c52c13
AM
2563{
2564 /* If it's a local sym, of course we resolve locally. */
2565 if (h == NULL)
2566 return TRUE;
2567
7e2294f9
AO
2568 /* Common symbols that become definitions don't get the DEF_REGULAR
2569 flag set, so test it first, and don't bail out. */
2570 if (ELF_COMMON_DEF_P (h))
2571 /* Do nothing. */;
f6c52c13
AM
2572 /* If we don't have a definition in a regular file, then we can't
2573 resolve locally. The sym is either undefined or dynamic. */
f5385ebf 2574 else if (!h->def_regular)
f6c52c13
AM
2575 return FALSE;
2576
2577 /* Forced local symbols resolve locally. */
f5385ebf 2578 if (h->forced_local)
f6c52c13
AM
2579 return TRUE;
2580
2581 /* As do non-dynamic symbols. */
2582 if (h->dynindx == -1)
2583 return TRUE;
2584
2585 /* At this point, we know the symbol is defined and dynamic. In an
2586 executable it must resolve locally, likewise when building symbolic
2587 shared libraries. */
2588 if (info->executable || info->symbolic)
2589 return TRUE;
2590
2591 /* Now deal with defined dynamic symbols in shared libraries. Ones
2592 with default visibility might not resolve locally. */
2593 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
2594 return FALSE;
2595
2596 /* However, STV_HIDDEN or STV_INTERNAL ones must be local. */
2597 if (ELF_ST_VISIBILITY (h->other) != STV_PROTECTED)
2598 return TRUE;
2599
1c16dfa5
L
2600 /* STV_PROTECTED non-function symbols are local. */
2601 if (h->type != STT_FUNC)
2602 return TRUE;
2603
f6c52c13
AM
2604 /* Function pointer equality tests may require that STV_PROTECTED
2605 symbols be treated as dynamic symbols, even when we know that the
2606 dynamic linker will resolve them locally. */
2607 return local_protected;
2608}
e1918d23
AM
2609
2610/* Caches some TLS segment info, and ensures that the TLS segment vma is
2611 aligned. Returns the first TLS output section. */
2612
2613struct bfd_section *
2614_bfd_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
2615{
2616 struct bfd_section *sec, *tls;
2617 unsigned int align = 0;
2618
2619 for (sec = obfd->sections; sec != NULL; sec = sec->next)
2620 if ((sec->flags & SEC_THREAD_LOCAL) != 0)
2621 break;
2622 tls = sec;
2623
2624 for (; sec != NULL && (sec->flags & SEC_THREAD_LOCAL) != 0; sec = sec->next)
2625 if (sec->alignment_power > align)
2626 align = sec->alignment_power;
2627
2628 elf_hash_table (info)->tls_sec = tls;
2629
2630 /* Ensure the alignment of the first section is the largest alignment,
2631 so that the tls segment starts aligned. */
2632 if (tls != NULL)
2633 tls->alignment_power = align;
2634
2635 return tls;
2636}
0ad989f9
L
2637
2638/* Return TRUE iff this is a non-common, definition of a non-function symbol. */
2639static bfd_boolean
2640is_global_data_symbol_definition (bfd *abfd ATTRIBUTE_UNUSED,
2641 Elf_Internal_Sym *sym)
2642{
2643 /* Local symbols do not count, but target specific ones might. */
2644 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
2645 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
2646 return FALSE;
2647
2648 /* Function symbols do not count. */
2649 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
2650 return FALSE;
2651
2652 /* If the section is undefined, then so is the symbol. */
2653 if (sym->st_shndx == SHN_UNDEF)
2654 return FALSE;
2655
2656 /* If the symbol is defined in the common section, then
2657 it is a common definition and so does not count. */
2658 if (sym->st_shndx == SHN_COMMON)
2659 return FALSE;
2660
2661 /* If the symbol is in a target specific section then we
2662 must rely upon the backend to tell us what it is. */
2663 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
2664 /* FIXME - this function is not coded yet:
2665
2666 return _bfd_is_global_symbol_definition (abfd, sym);
2667
2668 Instead for now assume that the definition is not global,
2669 Even if this is wrong, at least the linker will behave
2670 in the same way that it used to do. */
2671 return FALSE;
2672
2673 return TRUE;
2674}
2675
2676/* Search the symbol table of the archive element of the archive ABFD
2677 whose archive map contains a mention of SYMDEF, and determine if
2678 the symbol is defined in this element. */
2679static bfd_boolean
2680elf_link_is_defined_archive_symbol (bfd * abfd, carsym * symdef)
2681{
2682 Elf_Internal_Shdr * hdr;
2683 bfd_size_type symcount;
2684 bfd_size_type extsymcount;
2685 bfd_size_type extsymoff;
2686 Elf_Internal_Sym *isymbuf;
2687 Elf_Internal_Sym *isym;
2688 Elf_Internal_Sym *isymend;
2689 bfd_boolean result;
2690
2691 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
2692 if (abfd == NULL)
2693 return FALSE;
2694
2695 if (! bfd_check_format (abfd, bfd_object))
2696 return FALSE;
2697
2698 /* If we have already included the element containing this symbol in the
2699 link then we do not need to include it again. Just claim that any symbol
2700 it contains is not a definition, so that our caller will not decide to
2701 (re)include this element. */
2702 if (abfd->archive_pass)
2703 return FALSE;
2704
2705 /* Select the appropriate symbol table. */
2706 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
2707 hdr = &elf_tdata (abfd)->symtab_hdr;
2708 else
2709 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2710
2711 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
2712
2713 /* The sh_info field of the symtab header tells us where the
2714 external symbols start. We don't care about the local symbols. */
2715 if (elf_bad_symtab (abfd))
2716 {
2717 extsymcount = symcount;
2718 extsymoff = 0;
2719 }
2720 else
2721 {
2722 extsymcount = symcount - hdr->sh_info;
2723 extsymoff = hdr->sh_info;
2724 }
2725
2726 if (extsymcount == 0)
2727 return FALSE;
2728
2729 /* Read in the symbol table. */
2730 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
2731 NULL, NULL, NULL);
2732 if (isymbuf == NULL)
2733 return FALSE;
2734
2735 /* Scan the symbol table looking for SYMDEF. */
2736 result = FALSE;
2737 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
2738 {
2739 const char *name;
2740
2741 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
2742 isym->st_name);
2743 if (name == NULL)
2744 break;
2745
2746 if (strcmp (name, symdef->name) == 0)
2747 {
2748 result = is_global_data_symbol_definition (abfd, isym);
2749 break;
2750 }
2751 }
2752
2753 free (isymbuf);
2754
2755 return result;
2756}
2757\f
5a580b3a
AM
2758/* Add an entry to the .dynamic table. */
2759
2760bfd_boolean
2761_bfd_elf_add_dynamic_entry (struct bfd_link_info *info,
2762 bfd_vma tag,
2763 bfd_vma val)
2764{
2765 struct elf_link_hash_table *hash_table;
2766 const struct elf_backend_data *bed;
2767 asection *s;
2768 bfd_size_type newsize;
2769 bfd_byte *newcontents;
2770 Elf_Internal_Dyn dyn;
2771
2772 hash_table = elf_hash_table (info);
2773 if (! is_elf_hash_table (hash_table))
2774 return FALSE;
2775
8fdd7217
NC
2776 if (info->warn_shared_textrel && info->shared && tag == DT_TEXTREL)
2777 _bfd_error_handler
2778 (_("warning: creating a DT_TEXTREL in a shared object."));
2779
5a580b3a
AM
2780 bed = get_elf_backend_data (hash_table->dynobj);
2781 s = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
2782 BFD_ASSERT (s != NULL);
2783
eea6121a 2784 newsize = s->size + bed->s->sizeof_dyn;
5a580b3a
AM
2785 newcontents = bfd_realloc (s->contents, newsize);
2786 if (newcontents == NULL)
2787 return FALSE;
2788
2789 dyn.d_tag = tag;
2790 dyn.d_un.d_val = val;
eea6121a 2791 bed->s->swap_dyn_out (hash_table->dynobj, &dyn, newcontents + s->size);
5a580b3a 2792
eea6121a 2793 s->size = newsize;
5a580b3a
AM
2794 s->contents = newcontents;
2795
2796 return TRUE;
2797}
2798
2799/* Add a DT_NEEDED entry for this dynamic object if DO_IT is true,
2800 otherwise just check whether one already exists. Returns -1 on error,
2801 1 if a DT_NEEDED tag already exists, and 0 on success. */
2802
4ad4eba5 2803static int
7e9f0867
AM
2804elf_add_dt_needed_tag (bfd *abfd,
2805 struct bfd_link_info *info,
4ad4eba5
AM
2806 const char *soname,
2807 bfd_boolean do_it)
5a580b3a
AM
2808{
2809 struct elf_link_hash_table *hash_table;
2810 bfd_size_type oldsize;
2811 bfd_size_type strindex;
2812
7e9f0867
AM
2813 if (!_bfd_elf_link_create_dynstrtab (abfd, info))
2814 return -1;
2815
5a580b3a
AM
2816 hash_table = elf_hash_table (info);
2817 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
2818 strindex = _bfd_elf_strtab_add (hash_table->dynstr, soname, FALSE);
2819 if (strindex == (bfd_size_type) -1)
2820 return -1;
2821
2822 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
2823 {
2824 asection *sdyn;
2825 const struct elf_backend_data *bed;
2826 bfd_byte *extdyn;
2827
2828 bed = get_elf_backend_data (hash_table->dynobj);
2829 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
7e9f0867
AM
2830 if (sdyn != NULL)
2831 for (extdyn = sdyn->contents;
2832 extdyn < sdyn->contents + sdyn->size;
2833 extdyn += bed->s->sizeof_dyn)
2834 {
2835 Elf_Internal_Dyn dyn;
5a580b3a 2836
7e9f0867
AM
2837 bed->s->swap_dyn_in (hash_table->dynobj, extdyn, &dyn);
2838 if (dyn.d_tag == DT_NEEDED
2839 && dyn.d_un.d_val == strindex)
2840 {
2841 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
2842 return 1;
2843 }
2844 }
5a580b3a
AM
2845 }
2846
2847 if (do_it)
2848 {
7e9f0867
AM
2849 if (!_bfd_elf_link_create_dynamic_sections (hash_table->dynobj, info))
2850 return -1;
2851
5a580b3a
AM
2852 if (!_bfd_elf_add_dynamic_entry (info, DT_NEEDED, strindex))
2853 return -1;
2854 }
2855 else
2856 /* We were just checking for existence of the tag. */
2857 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
2858
2859 return 0;
2860}
2861
77cfaee6
AM
2862/* Called via elf_link_hash_traverse, elf_smash_syms sets all symbols
2863 belonging to NOT_NEEDED to bfd_link_hash_new. We know there are no
ec13b3bb
AM
2864 references from regular objects to these symbols.
2865
2866 ??? Should we do something about references from other dynamic
2867 obects? If not, we potentially lose some warnings about undefined
2868 symbols. But how can we recover the initial undefined / undefweak
2869 state? */
77cfaee6
AM
2870
2871struct elf_smash_syms_data
2872{
2873 bfd *not_needed;
2874 struct elf_link_hash_table *htab;
2875 bfd_boolean twiddled;
2876};
2877
2878static bfd_boolean
2879elf_smash_syms (struct elf_link_hash_entry *h, void *data)
2880{
2881 struct elf_smash_syms_data *inf = (struct elf_smash_syms_data *) data;
2882 struct bfd_link_hash_entry *bh;
2883
2884 switch (h->root.type)
2885 {
2886 default:
2887 case bfd_link_hash_new:
2888 return TRUE;
2889
2890 case bfd_link_hash_undefined:
11f25ea6
AM
2891 if (h->root.u.undef.abfd != inf->not_needed)
2892 return TRUE;
4ea42fb7
AM
2893 if (h->root.u.undef.weak != NULL
2894 && h->root.u.undef.weak != inf->not_needed)
11f25ea6
AM
2895 {
2896 /* Symbol was undefweak in u.undef.weak bfd, and has become
2897 undefined in as-needed lib. Restore weak. */
2898 h->root.type = bfd_link_hash_undefweak;
2899 h->root.u.undef.abfd = h->root.u.undef.weak;
2900 if (h->root.u.undef.next != NULL
2901 || inf->htab->root.undefs_tail == &h->root)
2902 inf->twiddled = TRUE;
2903 return TRUE;
2904 }
2905 break;
2906
77cfaee6
AM
2907 case bfd_link_hash_undefweak:
2908 if (h->root.u.undef.abfd != inf->not_needed)
2909 return TRUE;
2910 break;
2911
2912 case bfd_link_hash_defined:
2913 case bfd_link_hash_defweak:
2914 if (h->root.u.def.section->owner != inf->not_needed)
2915 return TRUE;
2916 break;
2917
2918 case bfd_link_hash_common:
2919 if (h->root.u.c.p->section->owner != inf->not_needed)
2920 return TRUE;
2921 break;
2922
2923 case bfd_link_hash_warning:
2924 case bfd_link_hash_indirect:
2925 elf_smash_syms ((struct elf_link_hash_entry *) h->root.u.i.link, data);
2926 if (h->root.u.i.link->type != bfd_link_hash_new)
2927 return TRUE;
2928 if (h->root.u.i.link->u.undef.abfd != inf->not_needed)
2929 return TRUE;
2930 break;
2931 }
2932
11f25ea6
AM
2933 /* There is no way we can undo symbol table state from defined or
2934 defweak back to undefined. */
2935 if (h->ref_regular)
2936 abort ();
2937
2e8b3a61
AM
2938 /* Set sym back to newly created state, but keep undef.next if it is
2939 being used as a list pointer. */
77cfaee6 2940 bh = h->root.u.undef.next;
2e8b3a61
AM
2941 if (bh == &h->root)
2942 bh = NULL;
77cfaee6
AM
2943 if (bh != NULL || inf->htab->root.undefs_tail == &h->root)
2944 inf->twiddled = TRUE;
2945 (*inf->htab->root.table.newfunc) (&h->root.root,
2946 &inf->htab->root.table,
2947 h->root.root.string);
2948 h->root.u.undef.next = bh;
2949 h->root.u.undef.abfd = inf->not_needed;
2950 h->non_elf = 0;
2951 return TRUE;
2952}
2953
5a580b3a 2954/* Sort symbol by value and section. */
4ad4eba5
AM
2955static int
2956elf_sort_symbol (const void *arg1, const void *arg2)
5a580b3a
AM
2957{
2958 const struct elf_link_hash_entry *h1;
2959 const struct elf_link_hash_entry *h2;
10b7e05b 2960 bfd_signed_vma vdiff;
5a580b3a
AM
2961
2962 h1 = *(const struct elf_link_hash_entry **) arg1;
2963 h2 = *(const struct elf_link_hash_entry **) arg2;
10b7e05b
NC
2964 vdiff = h1->root.u.def.value - h2->root.u.def.value;
2965 if (vdiff != 0)
2966 return vdiff > 0 ? 1 : -1;
2967 else
2968 {
2969 long sdiff = h1->root.u.def.section->id - h2->root.u.def.section->id;
2970 if (sdiff != 0)
2971 return sdiff > 0 ? 1 : -1;
2972 }
5a580b3a
AM
2973 return 0;
2974}
4ad4eba5 2975
5a580b3a
AM
2976/* This function is used to adjust offsets into .dynstr for
2977 dynamic symbols. This is called via elf_link_hash_traverse. */
2978
2979static bfd_boolean
2980elf_adjust_dynstr_offsets (struct elf_link_hash_entry *h, void *data)
2981{
2982 struct elf_strtab_hash *dynstr = data;
2983
2984 if (h->root.type == bfd_link_hash_warning)
2985 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2986
2987 if (h->dynindx != -1)
2988 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
2989 return TRUE;
2990}
2991
2992/* Assign string offsets in .dynstr, update all structures referencing
2993 them. */
2994
4ad4eba5
AM
2995static bfd_boolean
2996elf_finalize_dynstr (bfd *output_bfd, struct bfd_link_info *info)
5a580b3a
AM
2997{
2998 struct elf_link_hash_table *hash_table = elf_hash_table (info);
2999 struct elf_link_local_dynamic_entry *entry;
3000 struct elf_strtab_hash *dynstr = hash_table->dynstr;
3001 bfd *dynobj = hash_table->dynobj;
3002 asection *sdyn;
3003 bfd_size_type size;
3004 const struct elf_backend_data *bed;
3005 bfd_byte *extdyn;
3006
3007 _bfd_elf_strtab_finalize (dynstr);
3008 size = _bfd_elf_strtab_size (dynstr);
3009
3010 bed = get_elf_backend_data (dynobj);
3011 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3012 BFD_ASSERT (sdyn != NULL);
3013
3014 /* Update all .dynamic entries referencing .dynstr strings. */
3015 for (extdyn = sdyn->contents;
eea6121a 3016 extdyn < sdyn->contents + sdyn->size;
5a580b3a
AM
3017 extdyn += bed->s->sizeof_dyn)
3018 {
3019 Elf_Internal_Dyn dyn;
3020
3021 bed->s->swap_dyn_in (dynobj, extdyn, &dyn);
3022 switch (dyn.d_tag)
3023 {
3024 case DT_STRSZ:
3025 dyn.d_un.d_val = size;
3026 break;
3027 case DT_NEEDED:
3028 case DT_SONAME:
3029 case DT_RPATH:
3030 case DT_RUNPATH:
3031 case DT_FILTER:
3032 case DT_AUXILIARY:
3033 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
3034 break;
3035 default:
3036 continue;
3037 }
3038 bed->s->swap_dyn_out (dynobj, &dyn, extdyn);
3039 }
3040
3041 /* Now update local dynamic symbols. */
3042 for (entry = hash_table->dynlocal; entry ; entry = entry->next)
3043 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
3044 entry->isym.st_name);
3045
3046 /* And the rest of dynamic symbols. */
3047 elf_link_hash_traverse (hash_table, elf_adjust_dynstr_offsets, dynstr);
3048
3049 /* Adjust version definitions. */
3050 if (elf_tdata (output_bfd)->cverdefs)
3051 {
3052 asection *s;
3053 bfd_byte *p;
3054 bfd_size_type i;
3055 Elf_Internal_Verdef def;
3056 Elf_Internal_Verdaux defaux;
3057
3058 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3059 p = s->contents;
3060 do
3061 {
3062 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
3063 &def);
3064 p += sizeof (Elf_External_Verdef);
3e3b46e5
PB
3065 if (def.vd_aux != sizeof (Elf_External_Verdef))
3066 continue;
5a580b3a
AM
3067 for (i = 0; i < def.vd_cnt; ++i)
3068 {
3069 _bfd_elf_swap_verdaux_in (output_bfd,
3070 (Elf_External_Verdaux *) p, &defaux);
3071 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
3072 defaux.vda_name);
3073 _bfd_elf_swap_verdaux_out (output_bfd,
3074 &defaux, (Elf_External_Verdaux *) p);
3075 p += sizeof (Elf_External_Verdaux);
3076 }
3077 }
3078 while (def.vd_next);
3079 }
3080
3081 /* Adjust version references. */
3082 if (elf_tdata (output_bfd)->verref)
3083 {
3084 asection *s;
3085 bfd_byte *p;
3086 bfd_size_type i;
3087 Elf_Internal_Verneed need;
3088 Elf_Internal_Vernaux needaux;
3089
3090 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3091 p = s->contents;
3092 do
3093 {
3094 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
3095 &need);
3096 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
3097 _bfd_elf_swap_verneed_out (output_bfd, &need,
3098 (Elf_External_Verneed *) p);
3099 p += sizeof (Elf_External_Verneed);
3100 for (i = 0; i < need.vn_cnt; ++i)
3101 {
3102 _bfd_elf_swap_vernaux_in (output_bfd,
3103 (Elf_External_Vernaux *) p, &needaux);
3104 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
3105 needaux.vna_name);
3106 _bfd_elf_swap_vernaux_out (output_bfd,
3107 &needaux,
3108 (Elf_External_Vernaux *) p);
3109 p += sizeof (Elf_External_Vernaux);
3110 }
3111 }
3112 while (need.vn_next);
3113 }
3114
3115 return TRUE;
3116}
3117\f
4ad4eba5
AM
3118/* Add symbols from an ELF object file to the linker hash table. */
3119
3120static bfd_boolean
3121elf_link_add_object_symbols (bfd *abfd, struct bfd_link_info *info)
3122{
3123 bfd_boolean (*add_symbol_hook)
555cd476 3124 (bfd *, struct bfd_link_info *, Elf_Internal_Sym *,
4ad4eba5
AM
3125 const char **, flagword *, asection **, bfd_vma *);
3126 bfd_boolean (*check_relocs)
3127 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
85fbca6a
NC
3128 bfd_boolean (*check_directives)
3129 (bfd *, struct bfd_link_info *);
4ad4eba5
AM
3130 bfd_boolean collect;
3131 Elf_Internal_Shdr *hdr;
3132 bfd_size_type symcount;
3133 bfd_size_type extsymcount;
3134 bfd_size_type extsymoff;
3135 struct elf_link_hash_entry **sym_hash;
3136 bfd_boolean dynamic;
3137 Elf_External_Versym *extversym = NULL;
3138 Elf_External_Versym *ever;
3139 struct elf_link_hash_entry *weaks;
3140 struct elf_link_hash_entry **nondeflt_vers = NULL;
3141 bfd_size_type nondeflt_vers_cnt = 0;
3142 Elf_Internal_Sym *isymbuf = NULL;
3143 Elf_Internal_Sym *isym;
3144 Elf_Internal_Sym *isymend;
3145 const struct elf_backend_data *bed;
3146 bfd_boolean add_needed;
3147 struct elf_link_hash_table * hash_table;
3148 bfd_size_type amt;
3149
3150 hash_table = elf_hash_table (info);
3151
3152 bed = get_elf_backend_data (abfd);
3153 add_symbol_hook = bed->elf_add_symbol_hook;
3154 collect = bed->collect;
3155
3156 if ((abfd->flags & DYNAMIC) == 0)
3157 dynamic = FALSE;
3158 else
3159 {
3160 dynamic = TRUE;
3161
3162 /* You can't use -r against a dynamic object. Also, there's no
3163 hope of using a dynamic object which does not exactly match
3164 the format of the output file. */
3165 if (info->relocatable
3166 || !is_elf_hash_table (hash_table)
3167 || hash_table->root.creator != abfd->xvec)
3168 {
9a0789ec
NC
3169 if (info->relocatable)
3170 bfd_set_error (bfd_error_invalid_operation);
3171 else
3172 bfd_set_error (bfd_error_wrong_format);
4ad4eba5
AM
3173 goto error_return;
3174 }
3175 }
3176
3177 /* As a GNU extension, any input sections which are named
3178 .gnu.warning.SYMBOL are treated as warning symbols for the given
3179 symbol. This differs from .gnu.warning sections, which generate
3180 warnings when they are included in an output file. */
3181 if (info->executable)
3182 {
3183 asection *s;
3184
3185 for (s = abfd->sections; s != NULL; s = s->next)
3186 {
3187 const char *name;
3188
3189 name = bfd_get_section_name (abfd, s);
3190 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
3191 {
3192 char *msg;
3193 bfd_size_type sz;
4ad4eba5
AM
3194
3195 name += sizeof ".gnu.warning." - 1;
3196
3197 /* If this is a shared object, then look up the symbol
3198 in the hash table. If it is there, and it is already
3199 been defined, then we will not be using the entry
3200 from this shared object, so we don't need to warn.
3201 FIXME: If we see the definition in a regular object
3202 later on, we will warn, but we shouldn't. The only
3203 fix is to keep track of what warnings we are supposed
3204 to emit, and then handle them all at the end of the
3205 link. */
3206 if (dynamic)
3207 {
3208 struct elf_link_hash_entry *h;
3209
3210 h = elf_link_hash_lookup (hash_table, name,
3211 FALSE, FALSE, TRUE);
3212
3213 /* FIXME: What about bfd_link_hash_common? */
3214 if (h != NULL
3215 && (h->root.type == bfd_link_hash_defined
3216 || h->root.type == bfd_link_hash_defweak))
3217 {
3218 /* We don't want to issue this warning. Clobber
3219 the section size so that the warning does not
3220 get copied into the output file. */
eea6121a 3221 s->size = 0;
4ad4eba5
AM
3222 continue;
3223 }
3224 }
3225
eea6121a 3226 sz = s->size;
370a0e1b 3227 msg = bfd_alloc (abfd, sz + 1);
4ad4eba5
AM
3228 if (msg == NULL)
3229 goto error_return;
3230
370a0e1b 3231 if (! bfd_get_section_contents (abfd, s, msg, 0, sz))
4ad4eba5
AM
3232 goto error_return;
3233
370a0e1b 3234 msg[sz] = '\0';
4ad4eba5
AM
3235
3236 if (! (_bfd_generic_link_add_one_symbol
3237 (info, abfd, name, BSF_WARNING, s, 0, msg,
3238 FALSE, collect, NULL)))
3239 goto error_return;
3240
3241 if (! info->relocatable)
3242 {
3243 /* Clobber the section size so that the warning does
3244 not get copied into the output file. */
eea6121a 3245 s->size = 0;
11d2f718
AM
3246
3247 /* Also set SEC_EXCLUDE, so that symbols defined in
3248 the warning section don't get copied to the output. */
3249 s->flags |= SEC_EXCLUDE;
4ad4eba5
AM
3250 }
3251 }
3252 }
3253 }
3254
3255 add_needed = TRUE;
3256 if (! dynamic)
3257 {
3258 /* If we are creating a shared library, create all the dynamic
3259 sections immediately. We need to attach them to something,
3260 so we attach them to this BFD, provided it is the right
3261 format. FIXME: If there are no input BFD's of the same
3262 format as the output, we can't make a shared library. */
3263 if (info->shared
3264 && is_elf_hash_table (hash_table)
3265 && hash_table->root.creator == abfd->xvec
3266 && ! hash_table->dynamic_sections_created)
3267 {
3268 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
3269 goto error_return;
3270 }
3271 }
3272 else if (!is_elf_hash_table (hash_table))
3273 goto error_return;
3274 else
3275 {
3276 asection *s;
3277 const char *soname = NULL;
3278 struct bfd_link_needed_list *rpath = NULL, *runpath = NULL;
3279 int ret;
3280
3281 /* ld --just-symbols and dynamic objects don't mix very well.
3282 Test for --just-symbols by looking at info set up by
3283 _bfd_elf_link_just_syms. */
3284 if ((s = abfd->sections) != NULL
3285 && s->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
3286 goto error_return;
3287
3288 /* If this dynamic lib was specified on the command line with
3289 --as-needed in effect, then we don't want to add a DT_NEEDED
3290 tag unless the lib is actually used. Similary for libs brought
e56f61be
L
3291 in by another lib's DT_NEEDED. When --no-add-needed is used
3292 on a dynamic lib, we don't want to add a DT_NEEDED entry for
3293 any dynamic library in DT_NEEDED tags in the dynamic lib at
3294 all. */
3295 add_needed = (elf_dyn_lib_class (abfd)
3296 & (DYN_AS_NEEDED | DYN_DT_NEEDED
3297 | DYN_NO_NEEDED)) == 0;
4ad4eba5
AM
3298
3299 s = bfd_get_section_by_name (abfd, ".dynamic");
3300 if (s != NULL)
3301 {
3302 bfd_byte *dynbuf;
3303 bfd_byte *extdyn;
3304 int elfsec;
3305 unsigned long shlink;
3306
eea6121a 3307 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
4ad4eba5
AM
3308 goto error_free_dyn;
3309
3310 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
3311 if (elfsec == -1)
3312 goto error_free_dyn;
3313 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
3314
3315 for (extdyn = dynbuf;
eea6121a 3316 extdyn < dynbuf + s->size;
4ad4eba5
AM
3317 extdyn += bed->s->sizeof_dyn)
3318 {
3319 Elf_Internal_Dyn dyn;
3320
3321 bed->s->swap_dyn_in (abfd, extdyn, &dyn);
3322 if (dyn.d_tag == DT_SONAME)
3323 {
3324 unsigned int tagv = dyn.d_un.d_val;
3325 soname = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3326 if (soname == NULL)
3327 goto error_free_dyn;
3328 }
3329 if (dyn.d_tag == DT_NEEDED)
3330 {
3331 struct bfd_link_needed_list *n, **pn;
3332 char *fnm, *anm;
3333 unsigned int tagv = dyn.d_un.d_val;
3334
3335 amt = sizeof (struct bfd_link_needed_list);
3336 n = bfd_alloc (abfd, amt);
3337 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3338 if (n == NULL || fnm == NULL)
3339 goto error_free_dyn;
3340 amt = strlen (fnm) + 1;
3341 anm = bfd_alloc (abfd, amt);
3342 if (anm == NULL)
3343 goto error_free_dyn;
3344 memcpy (anm, fnm, amt);
3345 n->name = anm;
3346 n->by = abfd;
3347 n->next = NULL;
3348 for (pn = & hash_table->needed;
3349 *pn != NULL;
3350 pn = &(*pn)->next)
3351 ;
3352 *pn = n;
3353 }
3354 if (dyn.d_tag == DT_RUNPATH)
3355 {
3356 struct bfd_link_needed_list *n, **pn;
3357 char *fnm, *anm;
3358 unsigned int tagv = dyn.d_un.d_val;
3359
3360 amt = sizeof (struct bfd_link_needed_list);
3361 n = bfd_alloc (abfd, amt);
3362 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3363 if (n == NULL || fnm == NULL)
3364 goto error_free_dyn;
3365 amt = strlen (fnm) + 1;
3366 anm = bfd_alloc (abfd, amt);
3367 if (anm == NULL)
3368 goto error_free_dyn;
3369 memcpy (anm, fnm, amt);
3370 n->name = anm;
3371 n->by = abfd;
3372 n->next = NULL;
3373 for (pn = & runpath;
3374 *pn != NULL;
3375 pn = &(*pn)->next)
3376 ;
3377 *pn = n;
3378 }
3379 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
3380 if (!runpath && dyn.d_tag == DT_RPATH)
3381 {
3382 struct bfd_link_needed_list *n, **pn;
3383 char *fnm, *anm;
3384 unsigned int tagv = dyn.d_un.d_val;
3385
3386 amt = sizeof (struct bfd_link_needed_list);
3387 n = bfd_alloc (abfd, amt);
3388 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3389 if (n == NULL || fnm == NULL)
3390 goto error_free_dyn;
3391 amt = strlen (fnm) + 1;
3392 anm = bfd_alloc (abfd, amt);
3393 if (anm == NULL)
3394 {
3395 error_free_dyn:
3396 free (dynbuf);
3397 goto error_return;
3398 }
3399 memcpy (anm, fnm, amt);
3400 n->name = anm;
3401 n->by = abfd;
3402 n->next = NULL;
3403 for (pn = & rpath;
3404 *pn != NULL;
3405 pn = &(*pn)->next)
3406 ;
3407 *pn = n;
3408 }
3409 }
3410
3411 free (dynbuf);
3412 }
3413
3414 /* DT_RUNPATH overrides DT_RPATH. Do _NOT_ bfd_release, as that
3415 frees all more recently bfd_alloc'd blocks as well. */
3416 if (runpath)
3417 rpath = runpath;
3418
3419 if (rpath)
3420 {
3421 struct bfd_link_needed_list **pn;
3422 for (pn = & hash_table->runpath;
3423 *pn != NULL;
3424 pn = &(*pn)->next)
3425 ;
3426 *pn = rpath;
3427 }
3428
3429 /* We do not want to include any of the sections in a dynamic
3430 object in the output file. We hack by simply clobbering the
3431 list of sections in the BFD. This could be handled more
3432 cleanly by, say, a new section flag; the existing
3433 SEC_NEVER_LOAD flag is not the one we want, because that one
3434 still implies that the section takes up space in the output
3435 file. */
3436 bfd_section_list_clear (abfd);
3437
4ad4eba5
AM
3438 /* Find the name to use in a DT_NEEDED entry that refers to this
3439 object. If the object has a DT_SONAME entry, we use it.
3440 Otherwise, if the generic linker stuck something in
3441 elf_dt_name, we use that. Otherwise, we just use the file
3442 name. */
3443 if (soname == NULL || *soname == '\0')
3444 {
3445 soname = elf_dt_name (abfd);
3446 if (soname == NULL || *soname == '\0')
3447 soname = bfd_get_filename (abfd);
3448 }
3449
3450 /* Save the SONAME because sometimes the linker emulation code
3451 will need to know it. */
3452 elf_dt_name (abfd) = soname;
3453
7e9f0867 3454 ret = elf_add_dt_needed_tag (abfd, info, soname, add_needed);
4ad4eba5
AM
3455 if (ret < 0)
3456 goto error_return;
3457
3458 /* If we have already included this dynamic object in the
3459 link, just ignore it. There is no reason to include a
3460 particular dynamic object more than once. */
3461 if (ret > 0)
3462 return TRUE;
3463 }
3464
3465 /* If this is a dynamic object, we always link against the .dynsym
3466 symbol table, not the .symtab symbol table. The dynamic linker
3467 will only see the .dynsym symbol table, so there is no reason to
3468 look at .symtab for a dynamic object. */
3469
3470 if (! dynamic || elf_dynsymtab (abfd) == 0)
3471 hdr = &elf_tdata (abfd)->symtab_hdr;
3472 else
3473 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
3474
3475 symcount = hdr->sh_size / bed->s->sizeof_sym;
3476
3477 /* The sh_info field of the symtab header tells us where the
3478 external symbols start. We don't care about the local symbols at
3479 this point. */
3480 if (elf_bad_symtab (abfd))
3481 {
3482 extsymcount = symcount;
3483 extsymoff = 0;
3484 }
3485 else
3486 {
3487 extsymcount = symcount - hdr->sh_info;
3488 extsymoff = hdr->sh_info;
3489 }
3490
3491 sym_hash = NULL;
3492 if (extsymcount != 0)
3493 {
3494 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
3495 NULL, NULL, NULL);
3496 if (isymbuf == NULL)
3497 goto error_return;
3498
3499 /* We store a pointer to the hash table entry for each external
3500 symbol. */
3501 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
3502 sym_hash = bfd_alloc (abfd, amt);
3503 if (sym_hash == NULL)
3504 goto error_free_sym;
3505 elf_sym_hashes (abfd) = sym_hash;
3506 }
3507
3508 if (dynamic)
3509 {
3510 /* Read in any version definitions. */
fc0e6df6
PB
3511 if (!_bfd_elf_slurp_version_tables (abfd,
3512 info->default_imported_symver))
4ad4eba5
AM
3513 goto error_free_sym;
3514
3515 /* Read in the symbol versions, but don't bother to convert them
3516 to internal format. */
3517 if (elf_dynversym (abfd) != 0)
3518 {
3519 Elf_Internal_Shdr *versymhdr;
3520
3521 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
3522 extversym = bfd_malloc (versymhdr->sh_size);
3523 if (extversym == NULL)
3524 goto error_free_sym;
3525 amt = versymhdr->sh_size;
3526 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
3527 || bfd_bread (extversym, amt, abfd) != amt)
3528 goto error_free_vers;
3529 }
3530 }
3531
3532 weaks = NULL;
3533
3534 ever = extversym != NULL ? extversym + extsymoff : NULL;
3535 for (isym = isymbuf, isymend = isymbuf + extsymcount;
3536 isym < isymend;
3537 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
3538 {
3539 int bind;
3540 bfd_vma value;
af44c138 3541 asection *sec, *new_sec;
4ad4eba5
AM
3542 flagword flags;
3543 const char *name;
3544 struct elf_link_hash_entry *h;
3545 bfd_boolean definition;
3546 bfd_boolean size_change_ok;
3547 bfd_boolean type_change_ok;
3548 bfd_boolean new_weakdef;
3549 bfd_boolean override;
3550 unsigned int old_alignment;
3551 bfd *old_bfd;
3552
3553 override = FALSE;
3554
3555 flags = BSF_NO_FLAGS;
3556 sec = NULL;
3557 value = isym->st_value;
3558 *sym_hash = NULL;
3559
3560 bind = ELF_ST_BIND (isym->st_info);
3561 if (bind == STB_LOCAL)
3562 {
3563 /* This should be impossible, since ELF requires that all
3564 global symbols follow all local symbols, and that sh_info
3565 point to the first global symbol. Unfortunately, Irix 5
3566 screws this up. */
3567 continue;
3568 }
3569 else if (bind == STB_GLOBAL)
3570 {
3571 if (isym->st_shndx != SHN_UNDEF
3572 && isym->st_shndx != SHN_COMMON)
3573 flags = BSF_GLOBAL;
3574 }
3575 else if (bind == STB_WEAK)
3576 flags = BSF_WEAK;
3577 else
3578 {
3579 /* Leave it up to the processor backend. */
3580 }
3581
3582 if (isym->st_shndx == SHN_UNDEF)
3583 sec = bfd_und_section_ptr;
3584 else if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
3585 {
3586 sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3587 if (sec == NULL)
3588 sec = bfd_abs_section_ptr;
529fcb95
PB
3589 else if (sec->kept_section)
3590 {
1f02cbd9
JB
3591 /* Symbols from discarded section are undefined, and have
3592 default visibility. */
529fcb95
PB
3593 sec = bfd_und_section_ptr;
3594 isym->st_shndx = SHN_UNDEF;
1f02cbd9
JB
3595 isym->st_other = STV_DEFAULT
3596 | (isym->st_other & ~ ELF_ST_VISIBILITY(-1));
529fcb95 3597 }
4ad4eba5
AM
3598 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
3599 value -= sec->vma;
3600 }
3601 else if (isym->st_shndx == SHN_ABS)
3602 sec = bfd_abs_section_ptr;
3603 else if (isym->st_shndx == SHN_COMMON)
3604 {
3605 sec = bfd_com_section_ptr;
3606 /* What ELF calls the size we call the value. What ELF
3607 calls the value we call the alignment. */
3608 value = isym->st_size;
3609 }
3610 else
3611 {
3612 /* Leave it up to the processor backend. */
3613 }
3614
3615 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
3616 isym->st_name);
3617 if (name == NULL)
3618 goto error_free_vers;
3619
3620 if (isym->st_shndx == SHN_COMMON
3621 && ELF_ST_TYPE (isym->st_info) == STT_TLS)
3622 {
3623 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
3624
3625 if (tcomm == NULL)
3626 {
3627 tcomm = bfd_make_section (abfd, ".tcommon");
3628 if (tcomm == NULL
3629 || !bfd_set_section_flags (abfd, tcomm, (SEC_ALLOC
3630 | SEC_IS_COMMON
3631 | SEC_LINKER_CREATED
3632 | SEC_THREAD_LOCAL)))
3633 goto error_free_vers;
3634 }
3635 sec = tcomm;
3636 }
3637 else if (add_symbol_hook)
3638 {
3639 if (! (*add_symbol_hook) (abfd, info, isym, &name, &flags, &sec,
3640 &value))
3641 goto error_free_vers;
3642
3643 /* The hook function sets the name to NULL if this symbol
3644 should be skipped for some reason. */
3645 if (name == NULL)
3646 continue;
3647 }
3648
3649 /* Sanity check that all possibilities were handled. */
3650 if (sec == NULL)
3651 {
3652 bfd_set_error (bfd_error_bad_value);
3653 goto error_free_vers;
3654 }
3655
3656 if (bfd_is_und_section (sec)
3657 || bfd_is_com_section (sec))
3658 definition = FALSE;
3659 else
3660 definition = TRUE;
3661
3662 size_change_ok = FALSE;
3663 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
3664 old_alignment = 0;
3665 old_bfd = NULL;
af44c138 3666 new_sec = sec;
4ad4eba5
AM
3667
3668 if (is_elf_hash_table (hash_table))
3669 {
3670 Elf_Internal_Versym iver;
3671 unsigned int vernum = 0;
3672 bfd_boolean skip;
3673
fc0e6df6 3674 if (ever == NULL)
4ad4eba5 3675 {
fc0e6df6
PB
3676 if (info->default_imported_symver)
3677 /* Use the default symbol version created earlier. */
3678 iver.vs_vers = elf_tdata (abfd)->cverdefs;
3679 else
3680 iver.vs_vers = 0;
3681 }
3682 else
3683 _bfd_elf_swap_versym_in (abfd, ever, &iver);
3684
3685 vernum = iver.vs_vers & VERSYM_VERSION;
3686
3687 /* If this is a hidden symbol, or if it is not version
3688 1, we append the version name to the symbol name.
3689 However, we do not modify a non-hidden absolute
3690 symbol, because it might be the version symbol
3691 itself. FIXME: What if it isn't? */
3692 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
3693 || (vernum > 1 && ! bfd_is_abs_section (sec)))
3694 {
3695 const char *verstr;
3696 size_t namelen, verlen, newlen;
3697 char *newname, *p;
3698
3699 if (isym->st_shndx != SHN_UNDEF)
4ad4eba5 3700 {
fc0e6df6
PB
3701 if (vernum > elf_tdata (abfd)->cverdefs)
3702 verstr = NULL;
3703 else if (vernum > 1)
3704 verstr =
3705 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
3706 else
3707 verstr = "";
4ad4eba5 3708
fc0e6df6 3709 if (verstr == NULL)
4ad4eba5 3710 {
fc0e6df6
PB
3711 (*_bfd_error_handler)
3712 (_("%B: %s: invalid version %u (max %d)"),
3713 abfd, name, vernum,
3714 elf_tdata (abfd)->cverdefs);
3715 bfd_set_error (bfd_error_bad_value);
3716 goto error_free_vers;
4ad4eba5 3717 }
fc0e6df6
PB
3718 }
3719 else
3720 {
3721 /* We cannot simply test for the number of
3722 entries in the VERNEED section since the
3723 numbers for the needed versions do not start
3724 at 0. */
3725 Elf_Internal_Verneed *t;
3726
3727 verstr = NULL;
3728 for (t = elf_tdata (abfd)->verref;
3729 t != NULL;
3730 t = t->vn_nextref)
4ad4eba5 3731 {
fc0e6df6 3732 Elf_Internal_Vernaux *a;
4ad4eba5 3733
fc0e6df6
PB
3734 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3735 {
3736 if (a->vna_other == vernum)
4ad4eba5 3737 {
fc0e6df6
PB
3738 verstr = a->vna_nodename;
3739 break;
4ad4eba5 3740 }
4ad4eba5 3741 }
fc0e6df6
PB
3742 if (a != NULL)
3743 break;
3744 }
3745 if (verstr == NULL)
3746 {
3747 (*_bfd_error_handler)
3748 (_("%B: %s: invalid needed version %d"),
3749 abfd, name, vernum);
3750 bfd_set_error (bfd_error_bad_value);
3751 goto error_free_vers;
4ad4eba5 3752 }
4ad4eba5 3753 }
fc0e6df6
PB
3754
3755 namelen = strlen (name);
3756 verlen = strlen (verstr);
3757 newlen = namelen + verlen + 2;
3758 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
3759 && isym->st_shndx != SHN_UNDEF)
3760 ++newlen;
3761
3762 newname = bfd_alloc (abfd, newlen);
3763 if (newname == NULL)
3764 goto error_free_vers;
3765 memcpy (newname, name, namelen);
3766 p = newname + namelen;
3767 *p++ = ELF_VER_CHR;
3768 /* If this is a defined non-hidden version symbol,
3769 we add another @ to the name. This indicates the
3770 default version of the symbol. */
3771 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
3772 && isym->st_shndx != SHN_UNDEF)
3773 *p++ = ELF_VER_CHR;
3774 memcpy (p, verstr, verlen + 1);
3775
3776 name = newname;
4ad4eba5
AM
3777 }
3778
af44c138
L
3779 if (!_bfd_elf_merge_symbol (abfd, info, name, isym, &sec,
3780 &value, &old_alignment,
4ad4eba5
AM
3781 sym_hash, &skip, &override,
3782 &type_change_ok, &size_change_ok))
3783 goto error_free_vers;
3784
3785 if (skip)
3786 continue;
3787
3788 if (override)
3789 definition = FALSE;
3790
3791 h = *sym_hash;
3792 while (h->root.type == bfd_link_hash_indirect
3793 || h->root.type == bfd_link_hash_warning)
3794 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3795
3796 /* Remember the old alignment if this is a common symbol, so
3797 that we don't reduce the alignment later on. We can't
3798 check later, because _bfd_generic_link_add_one_symbol
3799 will set a default for the alignment which we want to
3800 override. We also remember the old bfd where the existing
3801 definition comes from. */
3802 switch (h->root.type)
3803 {
3804 default:
3805 break;
3806
3807 case bfd_link_hash_defined:
3808 case bfd_link_hash_defweak:
3809 old_bfd = h->root.u.def.section->owner;
3810 break;
3811
3812 case bfd_link_hash_common:
3813 old_bfd = h->root.u.c.p->section->owner;
3814 old_alignment = h->root.u.c.p->alignment_power;
3815 break;
3816 }
3817
3818 if (elf_tdata (abfd)->verdef != NULL
3819 && ! override
3820 && vernum > 1
3821 && definition)
3822 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
3823 }
3824
3825 if (! (_bfd_generic_link_add_one_symbol
3826 (info, abfd, name, flags, sec, value, NULL, FALSE, collect,
3827 (struct bfd_link_hash_entry **) sym_hash)))
3828 goto error_free_vers;
3829
3830 h = *sym_hash;
3831 while (h->root.type == bfd_link_hash_indirect
3832 || h->root.type == bfd_link_hash_warning)
3833 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3834 *sym_hash = h;
3835
3836 new_weakdef = FALSE;
3837 if (dynamic
3838 && definition
3839 && (flags & BSF_WEAK) != 0
3840 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
3841 && is_elf_hash_table (hash_table)
f6e332e6 3842 && h->u.weakdef == NULL)
4ad4eba5
AM
3843 {
3844 /* Keep a list of all weak defined non function symbols from
3845 a dynamic object, using the weakdef field. Later in this
3846 function we will set the weakdef field to the correct
3847 value. We only put non-function symbols from dynamic
3848 objects on this list, because that happens to be the only
3849 time we need to know the normal symbol corresponding to a
3850 weak symbol, and the information is time consuming to
3851 figure out. If the weakdef field is not already NULL,
3852 then this symbol was already defined by some previous
3853 dynamic object, and we will be using that previous
3854 definition anyhow. */
3855
f6e332e6 3856 h->u.weakdef = weaks;
4ad4eba5
AM
3857 weaks = h;
3858 new_weakdef = TRUE;
3859 }
3860
3861 /* Set the alignment of a common symbol. */
af44c138
L
3862 if ((isym->st_shndx == SHN_COMMON
3863 || bfd_is_com_section (sec))
4ad4eba5
AM
3864 && h->root.type == bfd_link_hash_common)
3865 {
3866 unsigned int align;
3867
af44c138
L
3868 if (isym->st_shndx == SHN_COMMON)
3869 align = bfd_log2 (isym->st_value);
3870 else
3871 {
3872 /* The new symbol is a common symbol in a shared object.
3873 We need to get the alignment from the section. */
3874 align = new_sec->alignment_power;
3875 }
4ad4eba5
AM
3876 if (align > old_alignment
3877 /* Permit an alignment power of zero if an alignment of one
3878 is specified and no other alignments have been specified. */
3879 || (isym->st_value == 1 && old_alignment == 0))
3880 h->root.u.c.p->alignment_power = align;
3881 else
3882 h->root.u.c.p->alignment_power = old_alignment;
3883 }
3884
3885 if (is_elf_hash_table (hash_table))
3886 {
4ad4eba5 3887 bfd_boolean dynsym;
4ad4eba5
AM
3888
3889 /* Check the alignment when a common symbol is involved. This
3890 can change when a common symbol is overridden by a normal
3891 definition or a common symbol is ignored due to the old
3892 normal definition. We need to make sure the maximum
3893 alignment is maintained. */
3894 if ((old_alignment || isym->st_shndx == SHN_COMMON)
3895 && h->root.type != bfd_link_hash_common)
3896 {
3897 unsigned int common_align;
3898 unsigned int normal_align;
3899 unsigned int symbol_align;
3900 bfd *normal_bfd;
3901 bfd *common_bfd;
3902
3903 symbol_align = ffs (h->root.u.def.value) - 1;
3904 if (h->root.u.def.section->owner != NULL
3905 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3906 {
3907 normal_align = h->root.u.def.section->alignment_power;
3908 if (normal_align > symbol_align)
3909 normal_align = symbol_align;
3910 }
3911 else
3912 normal_align = symbol_align;
3913
3914 if (old_alignment)
3915 {
3916 common_align = old_alignment;
3917 common_bfd = old_bfd;
3918 normal_bfd = abfd;
3919 }
3920 else
3921 {
3922 common_align = bfd_log2 (isym->st_value);
3923 common_bfd = abfd;
3924 normal_bfd = old_bfd;
3925 }
3926
3927 if (normal_align < common_align)
3928 (*_bfd_error_handler)
d003868e
AM
3929 (_("Warning: alignment %u of symbol `%s' in %B"
3930 " is smaller than %u in %B"),
3931 normal_bfd, common_bfd,
3932 1 << normal_align, name, 1 << common_align);
4ad4eba5
AM
3933 }
3934
3935 /* Remember the symbol size and type. */
3936 if (isym->st_size != 0
3937 && (definition || h->size == 0))
3938 {
3939 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
3940 (*_bfd_error_handler)
d003868e
AM
3941 (_("Warning: size of symbol `%s' changed"
3942 " from %lu in %B to %lu in %B"),
3943 old_bfd, abfd,
4ad4eba5 3944 name, (unsigned long) h->size,
d003868e 3945 (unsigned long) isym->st_size);
4ad4eba5
AM
3946
3947 h->size = isym->st_size;
3948 }
3949
3950 /* If this is a common symbol, then we always want H->SIZE
3951 to be the size of the common symbol. The code just above
3952 won't fix the size if a common symbol becomes larger. We
3953 don't warn about a size change here, because that is
3954 covered by --warn-common. */
3955 if (h->root.type == bfd_link_hash_common)
3956 h->size = h->root.u.c.size;
3957
3958 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
3959 && (definition || h->type == STT_NOTYPE))
3960 {
3961 if (h->type != STT_NOTYPE
3962 && h->type != ELF_ST_TYPE (isym->st_info)
3963 && ! type_change_ok)
3964 (*_bfd_error_handler)
d003868e
AM
3965 (_("Warning: type of symbol `%s' changed"
3966 " from %d to %d in %B"),
3967 abfd, name, h->type, ELF_ST_TYPE (isym->st_info));
4ad4eba5
AM
3968
3969 h->type = ELF_ST_TYPE (isym->st_info);
3970 }
3971
3972 /* If st_other has a processor-specific meaning, specific
3973 code might be needed here. We never merge the visibility
3974 attribute with the one from a dynamic object. */
3975 if (bed->elf_backend_merge_symbol_attribute)
3976 (*bed->elf_backend_merge_symbol_attribute) (h, isym, definition,
3977 dynamic);
3978
b58f81ae
DJ
3979 /* If this symbol has default visibility and the user has requested
3980 we not re-export it, then mark it as hidden. */
3981 if (definition && !dynamic
3982 && (abfd->no_export
3983 || (abfd->my_archive && abfd->my_archive->no_export))
3984 && ELF_ST_VISIBILITY (isym->st_other) != STV_INTERNAL)
3985 isym->st_other = STV_HIDDEN | (isym->st_other & ~ ELF_ST_VISIBILITY (-1));
3986
4ad4eba5
AM
3987 if (isym->st_other != 0 && !dynamic)
3988 {
3989 unsigned char hvis, symvis, other, nvis;
3990
3991 /* Take the balance of OTHER from the definition. */
3992 other = (definition ? isym->st_other : h->other);
3993 other &= ~ ELF_ST_VISIBILITY (-1);
3994
3995 /* Combine visibilities, using the most constraining one. */
3996 hvis = ELF_ST_VISIBILITY (h->other);
3997 symvis = ELF_ST_VISIBILITY (isym->st_other);
3998 if (! hvis)
3999 nvis = symvis;
4000 else if (! symvis)
4001 nvis = hvis;
4002 else
4003 nvis = hvis < symvis ? hvis : symvis;
4004
4005 h->other = other | nvis;
4006 }
4007
4008 /* Set a flag in the hash table entry indicating the type of
4009 reference or definition we just found. Keep a count of
4010 the number of dynamic symbols we find. A dynamic symbol
4011 is one which is referenced or defined by both a regular
4012 object and a shared object. */
4ad4eba5
AM
4013 dynsym = FALSE;
4014 if (! dynamic)
4015 {
4016 if (! definition)
4017 {
f5385ebf 4018 h->ref_regular = 1;
4ad4eba5 4019 if (bind != STB_WEAK)
f5385ebf 4020 h->ref_regular_nonweak = 1;
4ad4eba5
AM
4021 }
4022 else
f5385ebf 4023 h->def_regular = 1;
4ad4eba5 4024 if (! info->executable
f5385ebf
AM
4025 || h->def_dynamic
4026 || h->ref_dynamic)
4ad4eba5
AM
4027 dynsym = TRUE;
4028 }
4029 else
4030 {
4031 if (! definition)
f5385ebf 4032 h->ref_dynamic = 1;
4ad4eba5 4033 else
f5385ebf
AM
4034 h->def_dynamic = 1;
4035 if (h->def_regular
4036 || h->ref_regular
f6e332e6 4037 || (h->u.weakdef != NULL
4ad4eba5 4038 && ! new_weakdef
f6e332e6 4039 && h->u.weakdef->dynindx != -1))
4ad4eba5
AM
4040 dynsym = TRUE;
4041 }
4042
4ad4eba5
AM
4043 /* Check to see if we need to add an indirect symbol for
4044 the default name. */
4045 if (definition || h->root.type == bfd_link_hash_common)
4046 if (!_bfd_elf_add_default_symbol (abfd, info, h, name, isym,
4047 &sec, &value, &dynsym,
4048 override))
4049 goto error_free_vers;
4050
4051 if (definition && !dynamic)
4052 {
4053 char *p = strchr (name, ELF_VER_CHR);
4054 if (p != NULL && p[1] != ELF_VER_CHR)
4055 {
4056 /* Queue non-default versions so that .symver x, x@FOO
4057 aliases can be checked. */
4058 if (! nondeflt_vers)
4059 {
4060 amt = (isymend - isym + 1)
4061 * sizeof (struct elf_link_hash_entry *);
4062 nondeflt_vers = bfd_malloc (amt);
4063 }
4064 nondeflt_vers [nondeflt_vers_cnt++] = h;
4065 }
4066 }
4067
4068 if (dynsym && h->dynindx == -1)
4069 {
c152c796 4070 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4ad4eba5 4071 goto error_free_vers;
f6e332e6 4072 if (h->u.weakdef != NULL
4ad4eba5 4073 && ! new_weakdef
f6e332e6 4074 && h->u.weakdef->dynindx == -1)
4ad4eba5 4075 {
f6e332e6 4076 if (! bfd_elf_link_record_dynamic_symbol (info, h->u.weakdef))
4ad4eba5
AM
4077 goto error_free_vers;
4078 }
4079 }
4080 else if (dynsym && h->dynindx != -1)
4081 /* If the symbol already has a dynamic index, but
4082 visibility says it should not be visible, turn it into
4083 a local symbol. */
4084 switch (ELF_ST_VISIBILITY (h->other))
4085 {
4086 case STV_INTERNAL:
4087 case STV_HIDDEN:
4088 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4089 dynsym = FALSE;
4090 break;
4091 }
4092
4093 if (!add_needed
4094 && definition
4095 && dynsym
f5385ebf 4096 && h->ref_regular)
4ad4eba5
AM
4097 {
4098 int ret;
4099 const char *soname = elf_dt_name (abfd);
4100
4101 /* A symbol from a library loaded via DT_NEEDED of some
4102 other library is referenced by a regular object.
e56f61be
L
4103 Add a DT_NEEDED entry for it. Issue an error if
4104 --no-add-needed is used. */
4105 if ((elf_dyn_lib_class (abfd) & DYN_NO_NEEDED) != 0)
4106 {
4107 (*_bfd_error_handler)
4108 (_("%s: invalid DSO for symbol `%s' definition"),
d003868e 4109 abfd, name);
e56f61be
L
4110 bfd_set_error (bfd_error_bad_value);
4111 goto error_free_vers;
4112 }
4113
a5db907e
AM
4114 elf_dyn_lib_class (abfd) &= ~DYN_AS_NEEDED;
4115
4ad4eba5 4116 add_needed = TRUE;
7e9f0867 4117 ret = elf_add_dt_needed_tag (abfd, info, soname, add_needed);
4ad4eba5
AM
4118 if (ret < 0)
4119 goto error_free_vers;
4120
4121 BFD_ASSERT (ret == 0);
4122 }
4123 }
4124 }
4125
4126 /* Now that all the symbols from this input file are created, handle
4127 .symver foo, foo@BAR such that any relocs against foo become foo@BAR. */
4128 if (nondeflt_vers != NULL)
4129 {
4130 bfd_size_type cnt, symidx;
4131
4132 for (cnt = 0; cnt < nondeflt_vers_cnt; ++cnt)
4133 {
4134 struct elf_link_hash_entry *h = nondeflt_vers[cnt], *hi;
4135 char *shortname, *p;
4136
4137 p = strchr (h->root.root.string, ELF_VER_CHR);
4138 if (p == NULL
4139 || (h->root.type != bfd_link_hash_defined
4140 && h->root.type != bfd_link_hash_defweak))
4141 continue;
4142
4143 amt = p - h->root.root.string;
4144 shortname = bfd_malloc (amt + 1);
4145 memcpy (shortname, h->root.root.string, amt);
4146 shortname[amt] = '\0';
4147
4148 hi = (struct elf_link_hash_entry *)
4149 bfd_link_hash_lookup (&hash_table->root, shortname,
4150 FALSE, FALSE, FALSE);
4151 if (hi != NULL
4152 && hi->root.type == h->root.type
4153 && hi->root.u.def.value == h->root.u.def.value
4154 && hi->root.u.def.section == h->root.u.def.section)
4155 {
4156 (*bed->elf_backend_hide_symbol) (info, hi, TRUE);
4157 hi->root.type = bfd_link_hash_indirect;
4158 hi->root.u.i.link = (struct bfd_link_hash_entry *) h;
4159 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
4160 sym_hash = elf_sym_hashes (abfd);
4161 if (sym_hash)
4162 for (symidx = 0; symidx < extsymcount; ++symidx)
4163 if (sym_hash[symidx] == hi)
4164 {
4165 sym_hash[symidx] = h;
4166 break;
4167 }
4168 }
4169 free (shortname);
4170 }
4171 free (nondeflt_vers);
4172 nondeflt_vers = NULL;
4173 }
4174
4175 if (extversym != NULL)
4176 {
4177 free (extversym);
4178 extversym = NULL;
4179 }
4180
4181 if (isymbuf != NULL)
4182 free (isymbuf);
4183 isymbuf = NULL;
4184
ec13b3bb
AM
4185 if (!add_needed
4186 && (elf_dyn_lib_class (abfd) & DYN_AS_NEEDED) != 0)
77cfaee6 4187 {
ec13b3bb
AM
4188 /* Remove symbols defined in an as-needed shared lib that wasn't
4189 needed. */
77cfaee6
AM
4190 struct elf_smash_syms_data inf;
4191 inf.not_needed = abfd;
4192 inf.htab = hash_table;
4193 inf.twiddled = FALSE;
4194 elf_link_hash_traverse (hash_table, elf_smash_syms, &inf);
4195 if (inf.twiddled)
4196 bfd_link_repair_undef_list (&hash_table->root);
4197 weaks = NULL;
4198 }
4199
4ad4eba5
AM
4200 /* Now set the weakdefs field correctly for all the weak defined
4201 symbols we found. The only way to do this is to search all the
4202 symbols. Since we only need the information for non functions in
4203 dynamic objects, that's the only time we actually put anything on
4204 the list WEAKS. We need this information so that if a regular
4205 object refers to a symbol defined weakly in a dynamic object, the
4206 real symbol in the dynamic object is also put in the dynamic
4207 symbols; we also must arrange for both symbols to point to the
4208 same memory location. We could handle the general case of symbol
4209 aliasing, but a general symbol alias can only be generated in
4210 assembler code, handling it correctly would be very time
4211 consuming, and other ELF linkers don't handle general aliasing
4212 either. */
4213 if (weaks != NULL)
4214 {
4215 struct elf_link_hash_entry **hpp;
4216 struct elf_link_hash_entry **hppend;
4217 struct elf_link_hash_entry **sorted_sym_hash;
4218 struct elf_link_hash_entry *h;
4219 size_t sym_count;
4220
4221 /* Since we have to search the whole symbol list for each weak
4222 defined symbol, search time for N weak defined symbols will be
4223 O(N^2). Binary search will cut it down to O(NlogN). */
4224 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
4225 sorted_sym_hash = bfd_malloc (amt);
4226 if (sorted_sym_hash == NULL)
4227 goto error_return;
4228 sym_hash = sorted_sym_hash;
4229 hpp = elf_sym_hashes (abfd);
4230 hppend = hpp + extsymcount;
4231 sym_count = 0;
4232 for (; hpp < hppend; hpp++)
4233 {
4234 h = *hpp;
4235 if (h != NULL
4236 && h->root.type == bfd_link_hash_defined
4237 && h->type != STT_FUNC)
4238 {
4239 *sym_hash = h;
4240 sym_hash++;
4241 sym_count++;
4242 }
4243 }
4244
4245 qsort (sorted_sym_hash, sym_count,
4246 sizeof (struct elf_link_hash_entry *),
4247 elf_sort_symbol);
4248
4249 while (weaks != NULL)
4250 {
4251 struct elf_link_hash_entry *hlook;
4252 asection *slook;
4253 bfd_vma vlook;
4254 long ilook;
4255 size_t i, j, idx;
4256
4257 hlook = weaks;
f6e332e6
AM
4258 weaks = hlook->u.weakdef;
4259 hlook->u.weakdef = NULL;
4ad4eba5
AM
4260
4261 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
4262 || hlook->root.type == bfd_link_hash_defweak
4263 || hlook->root.type == bfd_link_hash_common
4264 || hlook->root.type == bfd_link_hash_indirect);
4265 slook = hlook->root.u.def.section;
4266 vlook = hlook->root.u.def.value;
4267
4268 ilook = -1;
4269 i = 0;
4270 j = sym_count;
4271 while (i < j)
4272 {
4273 bfd_signed_vma vdiff;
4274 idx = (i + j) / 2;
4275 h = sorted_sym_hash [idx];
4276 vdiff = vlook - h->root.u.def.value;
4277 if (vdiff < 0)
4278 j = idx;
4279 else if (vdiff > 0)
4280 i = idx + 1;
4281 else
4282 {
a9b881be 4283 long sdiff = slook->id - h->root.u.def.section->id;
4ad4eba5
AM
4284 if (sdiff < 0)
4285 j = idx;
4286 else if (sdiff > 0)
4287 i = idx + 1;
4288 else
4289 {
4290 ilook = idx;
4291 break;
4292 }
4293 }
4294 }
4295
4296 /* We didn't find a value/section match. */
4297 if (ilook == -1)
4298 continue;
4299
4300 for (i = ilook; i < sym_count; i++)
4301 {
4302 h = sorted_sym_hash [i];
4303
4304 /* Stop if value or section doesn't match. */
4305 if (h->root.u.def.value != vlook
4306 || h->root.u.def.section != slook)
4307 break;
4308 else if (h != hlook)
4309 {
f6e332e6 4310 hlook->u.weakdef = h;
4ad4eba5
AM
4311
4312 /* If the weak definition is in the list of dynamic
4313 symbols, make sure the real definition is put
4314 there as well. */
4315 if (hlook->dynindx != -1 && h->dynindx == -1)
4316 {
c152c796 4317 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4ad4eba5
AM
4318 goto error_return;
4319 }
4320
4321 /* If the real definition is in the list of dynamic
4322 symbols, make sure the weak definition is put
4323 there as well. If we don't do this, then the
4324 dynamic loader might not merge the entries for the
4325 real definition and the weak definition. */
4326 if (h->dynindx != -1 && hlook->dynindx == -1)
4327 {
c152c796 4328 if (! bfd_elf_link_record_dynamic_symbol (info, hlook))
4ad4eba5
AM
4329 goto error_return;
4330 }
4331 break;
4332 }
4333 }
4334 }
4335
4336 free (sorted_sym_hash);
4337 }
4338
85fbca6a
NC
4339 check_directives = get_elf_backend_data (abfd)->check_directives;
4340 if (check_directives)
4341 check_directives (abfd, info);
4342
4ad4eba5
AM
4343 /* If this object is the same format as the output object, and it is
4344 not a shared library, then let the backend look through the
4345 relocs.
4346
4347 This is required to build global offset table entries and to
4348 arrange for dynamic relocs. It is not required for the
4349 particular common case of linking non PIC code, even when linking
4350 against shared libraries, but unfortunately there is no way of
4351 knowing whether an object file has been compiled PIC or not.
4352 Looking through the relocs is not particularly time consuming.
4353 The problem is that we must either (1) keep the relocs in memory,
4354 which causes the linker to require additional runtime memory or
4355 (2) read the relocs twice from the input file, which wastes time.
4356 This would be a good case for using mmap.
4357
4358 I have no idea how to handle linking PIC code into a file of a
4359 different format. It probably can't be done. */
4360 check_relocs = get_elf_backend_data (abfd)->check_relocs;
4361 if (! dynamic
4362 && is_elf_hash_table (hash_table)
4363 && hash_table->root.creator == abfd->xvec
4364 && check_relocs != NULL)
4365 {
4366 asection *o;
4367
4368 for (o = abfd->sections; o != NULL; o = o->next)
4369 {
4370 Elf_Internal_Rela *internal_relocs;
4371 bfd_boolean ok;
4372
4373 if ((o->flags & SEC_RELOC) == 0
4374 || o->reloc_count == 0
4375 || ((info->strip == strip_all || info->strip == strip_debugger)
4376 && (o->flags & SEC_DEBUGGING) != 0)
4377 || bfd_is_abs_section (o->output_section))
4378 continue;
4379
4380 internal_relocs = _bfd_elf_link_read_relocs (abfd, o, NULL, NULL,
4381 info->keep_memory);
4382 if (internal_relocs == NULL)
4383 goto error_return;
4384
4385 ok = (*check_relocs) (abfd, info, o, internal_relocs);
4386
4387 if (elf_section_data (o)->relocs != internal_relocs)
4388 free (internal_relocs);
4389
4390 if (! ok)
4391 goto error_return;
4392 }
4393 }
4394
4395 /* If this is a non-traditional link, try to optimize the handling
4396 of the .stab/.stabstr sections. */
4397 if (! dynamic
4398 && ! info->traditional_format
4399 && is_elf_hash_table (hash_table)
4400 && (info->strip != strip_all && info->strip != strip_debugger))
4401 {
4402 asection *stabstr;
4403
4404 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
4405 if (stabstr != NULL)
4406 {
4407 bfd_size_type string_offset = 0;
4408 asection *stab;
4409
4410 for (stab = abfd->sections; stab; stab = stab->next)
4411 if (strncmp (".stab", stab->name, 5) == 0
4412 && (!stab->name[5] ||
4413 (stab->name[5] == '.' && ISDIGIT (stab->name[6])))
4414 && (stab->flags & SEC_MERGE) == 0
4415 && !bfd_is_abs_section (stab->output_section))
4416 {
4417 struct bfd_elf_section_data *secdata;
4418
4419 secdata = elf_section_data (stab);
4420 if (! _bfd_link_section_stabs (abfd,
3722b82f 4421 &hash_table->stab_info,
4ad4eba5
AM
4422 stab, stabstr,
4423 &secdata->sec_info,
4424 &string_offset))
4425 goto error_return;
4426 if (secdata->sec_info)
4427 stab->sec_info_type = ELF_INFO_TYPE_STABS;
4428 }
4429 }
4430 }
4431
77cfaee6 4432 if (is_elf_hash_table (hash_table) && add_needed)
4ad4eba5
AM
4433 {
4434 /* Add this bfd to the loaded list. */
4435 struct elf_link_loaded_list *n;
4436
4437 n = bfd_alloc (abfd, sizeof (struct elf_link_loaded_list));
4438 if (n == NULL)
4439 goto error_return;
4440 n->abfd = abfd;
4441 n->next = hash_table->loaded;
4442 hash_table->loaded = n;
4443 }
4444
4445 return TRUE;
4446
4447 error_free_vers:
4448 if (nondeflt_vers != NULL)
4449 free (nondeflt_vers);
4450 if (extversym != NULL)
4451 free (extversym);
4452 error_free_sym:
4453 if (isymbuf != NULL)
4454 free (isymbuf);
4455 error_return:
4456 return FALSE;
4457}
4458
8387904d
AM
4459/* Return the linker hash table entry of a symbol that might be
4460 satisfied by an archive symbol. Return -1 on error. */
4461
4462struct elf_link_hash_entry *
4463_bfd_elf_archive_symbol_lookup (bfd *abfd,
4464 struct bfd_link_info *info,
4465 const char *name)
4466{
4467 struct elf_link_hash_entry *h;
4468 char *p, *copy;
4469 size_t len, first;
4470
4471 h = elf_link_hash_lookup (elf_hash_table (info), name, FALSE, FALSE, FALSE);
4472 if (h != NULL)
4473 return h;
4474
4475 /* If this is a default version (the name contains @@), look up the
4476 symbol again with only one `@' as well as without the version.
4477 The effect is that references to the symbol with and without the
4478 version will be matched by the default symbol in the archive. */
4479
4480 p = strchr (name, ELF_VER_CHR);
4481 if (p == NULL || p[1] != ELF_VER_CHR)
4482 return h;
4483
4484 /* First check with only one `@'. */
4485 len = strlen (name);
4486 copy = bfd_alloc (abfd, len);
4487 if (copy == NULL)
4488 return (struct elf_link_hash_entry *) 0 - 1;
4489
4490 first = p - name + 1;
4491 memcpy (copy, name, first);
4492 memcpy (copy + first, name + first + 1, len - first);
4493
4494 h = elf_link_hash_lookup (elf_hash_table (info), copy, FALSE, FALSE, FALSE);
4495 if (h == NULL)
4496 {
4497 /* We also need to check references to the symbol without the
4498 version. */
4499 copy[first - 1] = '\0';
4500 h = elf_link_hash_lookup (elf_hash_table (info), copy,
4501 FALSE, FALSE, FALSE);
4502 }
4503
4504 bfd_release (abfd, copy);
4505 return h;
4506}
4507
0ad989f9
L
4508/* Add symbols from an ELF archive file to the linker hash table. We
4509 don't use _bfd_generic_link_add_archive_symbols because of a
4510 problem which arises on UnixWare. The UnixWare libc.so is an
4511 archive which includes an entry libc.so.1 which defines a bunch of
4512 symbols. The libc.so archive also includes a number of other
4513 object files, which also define symbols, some of which are the same
4514 as those defined in libc.so.1. Correct linking requires that we
4515 consider each object file in turn, and include it if it defines any
4516 symbols we need. _bfd_generic_link_add_archive_symbols does not do
4517 this; it looks through the list of undefined symbols, and includes
4518 any object file which defines them. When this algorithm is used on
4519 UnixWare, it winds up pulling in libc.so.1 early and defining a
4520 bunch of symbols. This means that some of the other objects in the
4521 archive are not included in the link, which is incorrect since they
4522 precede libc.so.1 in the archive.
4523
4524 Fortunately, ELF archive handling is simpler than that done by
4525 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
4526 oddities. In ELF, if we find a symbol in the archive map, and the
4527 symbol is currently undefined, we know that we must pull in that
4528 object file.
4529
4530 Unfortunately, we do have to make multiple passes over the symbol
4531 table until nothing further is resolved. */
4532
4ad4eba5
AM
4533static bfd_boolean
4534elf_link_add_archive_symbols (bfd *abfd, struct bfd_link_info *info)
0ad989f9
L
4535{
4536 symindex c;
4537 bfd_boolean *defined = NULL;
4538 bfd_boolean *included = NULL;
4539 carsym *symdefs;
4540 bfd_boolean loop;
4541 bfd_size_type amt;
8387904d
AM
4542 const struct elf_backend_data *bed;
4543 struct elf_link_hash_entry * (*archive_symbol_lookup)
4544 (bfd *, struct bfd_link_info *, const char *);
0ad989f9
L
4545
4546 if (! bfd_has_map (abfd))
4547 {
4548 /* An empty archive is a special case. */
4549 if (bfd_openr_next_archived_file (abfd, NULL) == NULL)
4550 return TRUE;
4551 bfd_set_error (bfd_error_no_armap);
4552 return FALSE;
4553 }
4554
4555 /* Keep track of all symbols we know to be already defined, and all
4556 files we know to be already included. This is to speed up the
4557 second and subsequent passes. */
4558 c = bfd_ardata (abfd)->symdef_count;
4559 if (c == 0)
4560 return TRUE;
4561 amt = c;
4562 amt *= sizeof (bfd_boolean);
4563 defined = bfd_zmalloc (amt);
4564 included = bfd_zmalloc (amt);
4565 if (defined == NULL || included == NULL)
4566 goto error_return;
4567
4568 symdefs = bfd_ardata (abfd)->symdefs;
8387904d
AM
4569 bed = get_elf_backend_data (abfd);
4570 archive_symbol_lookup = bed->elf_backend_archive_symbol_lookup;
0ad989f9
L
4571
4572 do
4573 {
4574 file_ptr last;
4575 symindex i;
4576 carsym *symdef;
4577 carsym *symdefend;
4578
4579 loop = FALSE;
4580 last = -1;
4581
4582 symdef = symdefs;
4583 symdefend = symdef + c;
4584 for (i = 0; symdef < symdefend; symdef++, i++)
4585 {
4586 struct elf_link_hash_entry *h;
4587 bfd *element;
4588 struct bfd_link_hash_entry *undefs_tail;
4589 symindex mark;
4590
4591 if (defined[i] || included[i])
4592 continue;
4593 if (symdef->file_offset == last)
4594 {
4595 included[i] = TRUE;
4596 continue;
4597 }
4598
8387904d
AM
4599 h = archive_symbol_lookup (abfd, info, symdef->name);
4600 if (h == (struct elf_link_hash_entry *) 0 - 1)
4601 goto error_return;
0ad989f9
L
4602
4603 if (h == NULL)
4604 continue;
4605
4606 if (h->root.type == bfd_link_hash_common)
4607 {
4608 /* We currently have a common symbol. The archive map contains
4609 a reference to this symbol, so we may want to include it. We
4610 only want to include it however, if this archive element
4611 contains a definition of the symbol, not just another common
4612 declaration of it.
4613
4614 Unfortunately some archivers (including GNU ar) will put
4615 declarations of common symbols into their archive maps, as
4616 well as real definitions, so we cannot just go by the archive
4617 map alone. Instead we must read in the element's symbol
4618 table and check that to see what kind of symbol definition
4619 this is. */
4620 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
4621 continue;
4622 }
4623 else if (h->root.type != bfd_link_hash_undefined)
4624 {
4625 if (h->root.type != bfd_link_hash_undefweak)
4626 defined[i] = TRUE;
4627 continue;
4628 }
4629
4630 /* We need to include this archive member. */
4631 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
4632 if (element == NULL)
4633 goto error_return;
4634
4635 if (! bfd_check_format (element, bfd_object))
4636 goto error_return;
4637
4638 /* Doublecheck that we have not included this object
4639 already--it should be impossible, but there may be
4640 something wrong with the archive. */
4641 if (element->archive_pass != 0)
4642 {
4643 bfd_set_error (bfd_error_bad_value);
4644 goto error_return;
4645 }
4646 element->archive_pass = 1;
4647
4648 undefs_tail = info->hash->undefs_tail;
4649
4650 if (! (*info->callbacks->add_archive_element) (info, element,
4651 symdef->name))
4652 goto error_return;
4653 if (! bfd_link_add_symbols (element, info))
4654 goto error_return;
4655
4656 /* If there are any new undefined symbols, we need to make
4657 another pass through the archive in order to see whether
4658 they can be defined. FIXME: This isn't perfect, because
4659 common symbols wind up on undefs_tail and because an
4660 undefined symbol which is defined later on in this pass
4661 does not require another pass. This isn't a bug, but it
4662 does make the code less efficient than it could be. */
4663 if (undefs_tail != info->hash->undefs_tail)
4664 loop = TRUE;
4665
4666 /* Look backward to mark all symbols from this object file
4667 which we have already seen in this pass. */
4668 mark = i;
4669 do
4670 {
4671 included[mark] = TRUE;
4672 if (mark == 0)
4673 break;
4674 --mark;
4675 }
4676 while (symdefs[mark].file_offset == symdef->file_offset);
4677
4678 /* We mark subsequent symbols from this object file as we go
4679 on through the loop. */
4680 last = symdef->file_offset;
4681 }
4682 }
4683 while (loop);
4684
4685 free (defined);
4686 free (included);
4687
4688 return TRUE;
4689
4690 error_return:
4691 if (defined != NULL)
4692 free (defined);
4693 if (included != NULL)
4694 free (included);
4695 return FALSE;
4696}
4ad4eba5
AM
4697
4698/* Given an ELF BFD, add symbols to the global hash table as
4699 appropriate. */
4700
4701bfd_boolean
4702bfd_elf_link_add_symbols (bfd *abfd, struct bfd_link_info *info)
4703{
4704 switch (bfd_get_format (abfd))
4705 {
4706 case bfd_object:
4707 return elf_link_add_object_symbols (abfd, info);
4708 case bfd_archive:
4709 return elf_link_add_archive_symbols (abfd, info);
4710 default:
4711 bfd_set_error (bfd_error_wrong_format);
4712 return FALSE;
4713 }
4714}
5a580b3a
AM
4715\f
4716/* This function will be called though elf_link_hash_traverse to store
4717 all hash value of the exported symbols in an array. */
4718
4719static bfd_boolean
4720elf_collect_hash_codes (struct elf_link_hash_entry *h, void *data)
4721{
4722 unsigned long **valuep = data;
4723 const char *name;
4724 char *p;
4725 unsigned long ha;
4726 char *alc = NULL;
4727
4728 if (h->root.type == bfd_link_hash_warning)
4729 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4730
4731 /* Ignore indirect symbols. These are added by the versioning code. */
4732 if (h->dynindx == -1)
4733 return TRUE;
4734
4735 name = h->root.root.string;
4736 p = strchr (name, ELF_VER_CHR);
4737 if (p != NULL)
4738 {
4739 alc = bfd_malloc (p - name + 1);
4740 memcpy (alc, name, p - name);
4741 alc[p - name] = '\0';
4742 name = alc;
4743 }
4744
4745 /* Compute the hash value. */
4746 ha = bfd_elf_hash (name);
4747
4748 /* Store the found hash value in the array given as the argument. */
4749 *(*valuep)++ = ha;
4750
4751 /* And store it in the struct so that we can put it in the hash table
4752 later. */
f6e332e6 4753 h->u.elf_hash_value = ha;
5a580b3a
AM
4754
4755 if (alc != NULL)
4756 free (alc);
4757
4758 return TRUE;
4759}
4760
4761/* Array used to determine the number of hash table buckets to use
4762 based on the number of symbols there are. If there are fewer than
4763 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
4764 fewer than 37 we use 17 buckets, and so forth. We never use more
4765 than 32771 buckets. */
4766
4767static const size_t elf_buckets[] =
4768{
4769 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
4770 16411, 32771, 0
4771};
4772
4773/* Compute bucket count for hashing table. We do not use a static set
4774 of possible tables sizes anymore. Instead we determine for all
4775 possible reasonable sizes of the table the outcome (i.e., the
4776 number of collisions etc) and choose the best solution. The
4777 weighting functions are not too simple to allow the table to grow
4778 without bounds. Instead one of the weighting factors is the size.
4779 Therefore the result is always a good payoff between few collisions
4780 (= short chain lengths) and table size. */
4781static size_t
4782compute_bucket_count (struct bfd_link_info *info)
4783{
4784 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
4785 size_t best_size = 0;
4786 unsigned long int *hashcodes;
4787 unsigned long int *hashcodesp;
4788 unsigned long int i;
4789 bfd_size_type amt;
4790
4791 /* Compute the hash values for all exported symbols. At the same
4792 time store the values in an array so that we could use them for
4793 optimizations. */
4794 amt = dynsymcount;
4795 amt *= sizeof (unsigned long int);
4796 hashcodes = bfd_malloc (amt);
4797 if (hashcodes == NULL)
4798 return 0;
4799 hashcodesp = hashcodes;
4800
4801 /* Put all hash values in HASHCODES. */
4802 elf_link_hash_traverse (elf_hash_table (info),
4803 elf_collect_hash_codes, &hashcodesp);
4804
4805 /* We have a problem here. The following code to optimize the table
4806 size requires an integer type with more the 32 bits. If
4807 BFD_HOST_U_64_BIT is set we know about such a type. */
4808#ifdef BFD_HOST_U_64_BIT
4809 if (info->optimize)
4810 {
4811 unsigned long int nsyms = hashcodesp - hashcodes;
4812 size_t minsize;
4813 size_t maxsize;
4814 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
4815 unsigned long int *counts ;
4816 bfd *dynobj = elf_hash_table (info)->dynobj;
4817 const struct elf_backend_data *bed = get_elf_backend_data (dynobj);
4818
4819 /* Possible optimization parameters: if we have NSYMS symbols we say
4820 that the hashing table must at least have NSYMS/4 and at most
4821 2*NSYMS buckets. */
4822 minsize = nsyms / 4;
4823 if (minsize == 0)
4824 minsize = 1;
4825 best_size = maxsize = nsyms * 2;
4826
4827 /* Create array where we count the collisions in. We must use bfd_malloc
4828 since the size could be large. */
4829 amt = maxsize;
4830 amt *= sizeof (unsigned long int);
4831 counts = bfd_malloc (amt);
4832 if (counts == NULL)
4833 {
4834 free (hashcodes);
4835 return 0;
4836 }
4837
4838 /* Compute the "optimal" size for the hash table. The criteria is a
4839 minimal chain length. The minor criteria is (of course) the size
4840 of the table. */
4841 for (i = minsize; i < maxsize; ++i)
4842 {
4843 /* Walk through the array of hashcodes and count the collisions. */
4844 BFD_HOST_U_64_BIT max;
4845 unsigned long int j;
4846 unsigned long int fact;
4847
4848 memset (counts, '\0', i * sizeof (unsigned long int));
4849
4850 /* Determine how often each hash bucket is used. */
4851 for (j = 0; j < nsyms; ++j)
4852 ++counts[hashcodes[j] % i];
4853
4854 /* For the weight function we need some information about the
4855 pagesize on the target. This is information need not be 100%
4856 accurate. Since this information is not available (so far) we
4857 define it here to a reasonable default value. If it is crucial
4858 to have a better value some day simply define this value. */
4859# ifndef BFD_TARGET_PAGESIZE
4860# define BFD_TARGET_PAGESIZE (4096)
4861# endif
4862
4863 /* We in any case need 2 + NSYMS entries for the size values and
4864 the chains. */
4865 max = (2 + nsyms) * (bed->s->arch_size / 8);
4866
4867# if 1
4868 /* Variant 1: optimize for short chains. We add the squares
4869 of all the chain lengths (which favors many small chain
4870 over a few long chains). */
4871 for (j = 0; j < i; ++j)
4872 max += counts[j] * counts[j];
4873
4874 /* This adds penalties for the overall size of the table. */
4875 fact = i / (BFD_TARGET_PAGESIZE / (bed->s->arch_size / 8)) + 1;
4876 max *= fact * fact;
4877# else
4878 /* Variant 2: Optimize a lot more for small table. Here we
4879 also add squares of the size but we also add penalties for
4880 empty slots (the +1 term). */
4881 for (j = 0; j < i; ++j)
4882 max += (1 + counts[j]) * (1 + counts[j]);
4883
4884 /* The overall size of the table is considered, but not as
4885 strong as in variant 1, where it is squared. */
4886 fact = i / (BFD_TARGET_PAGESIZE / (bed->s->arch_size / 8)) + 1;
4887 max *= fact;
4888# endif
4889
4890 /* Compare with current best results. */
4891 if (max < best_chlen)
4892 {
4893 best_chlen = max;
4894 best_size = i;
4895 }
4896 }
4897
4898 free (counts);
4899 }
4900 else
4901#endif /* defined (BFD_HOST_U_64_BIT) */
4902 {
4903 /* This is the fallback solution if no 64bit type is available or if we
4904 are not supposed to spend much time on optimizations. We select the
4905 bucket count using a fixed set of numbers. */
4906 for (i = 0; elf_buckets[i] != 0; i++)
4907 {
4908 best_size = elf_buckets[i];
4909 if (dynsymcount < elf_buckets[i + 1])
4910 break;
4911 }
4912 }
4913
4914 /* Free the arrays we needed. */
4915 free (hashcodes);
4916
4917 return best_size;
4918}
4919
4920/* Set up the sizes and contents of the ELF dynamic sections. This is
4921 called by the ELF linker emulation before_allocation routine. We
4922 must set the sizes of the sections before the linker sets the
4923 addresses of the various sections. */
4924
4925bfd_boolean
4926bfd_elf_size_dynamic_sections (bfd *output_bfd,
4927 const char *soname,
4928 const char *rpath,
4929 const char *filter_shlib,
4930 const char * const *auxiliary_filters,
4931 struct bfd_link_info *info,
4932 asection **sinterpptr,
4933 struct bfd_elf_version_tree *verdefs)
4934{
4935 bfd_size_type soname_indx;
4936 bfd *dynobj;
4937 const struct elf_backend_data *bed;
4938 struct elf_assign_sym_version_info asvinfo;
4939
4940 *sinterpptr = NULL;
4941
4942 soname_indx = (bfd_size_type) -1;
4943
4944 if (!is_elf_hash_table (info->hash))
4945 return TRUE;
4946
8c37241b 4947 elf_tdata (output_bfd)->relro = info->relro;
5a580b3a
AM
4948 if (info->execstack)
4949 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
4950 else if (info->noexecstack)
4951 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W;
4952 else
4953 {
4954 bfd *inputobj;
4955 asection *notesec = NULL;
4956 int exec = 0;
4957
4958 for (inputobj = info->input_bfds;
4959 inputobj;
4960 inputobj = inputobj->link_next)
4961 {
4962 asection *s;
4963
d457dcf6 4964 if (inputobj->flags & (DYNAMIC | BFD_LINKER_CREATED))
5a580b3a
AM
4965 continue;
4966 s = bfd_get_section_by_name (inputobj, ".note.GNU-stack");
4967 if (s)
4968 {
4969 if (s->flags & SEC_CODE)
4970 exec = PF_X;
4971 notesec = s;
4972 }
4973 else
4974 exec = PF_X;
4975 }
4976 if (notesec)
4977 {
4978 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | exec;
4979 if (exec && info->relocatable
4980 && notesec->output_section != bfd_abs_section_ptr)
4981 notesec->output_section->flags |= SEC_CODE;
4982 }
4983 }
4984
4985 /* Any syms created from now on start with -1 in
4986 got.refcount/offset and plt.refcount/offset. */
4987 elf_hash_table (info)->init_refcount = elf_hash_table (info)->init_offset;
4988
4989 /* The backend may have to create some sections regardless of whether
4990 we're dynamic or not. */
4991 bed = get_elf_backend_data (output_bfd);
4992 if (bed->elf_backend_always_size_sections
4993 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
4994 return FALSE;
4995
4996 dynobj = elf_hash_table (info)->dynobj;
4997
4998 /* If there were no dynamic objects in the link, there is nothing to
4999 do here. */
5000 if (dynobj == NULL)
5001 return TRUE;
5002
5003 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
5004 return FALSE;
5005
5006 if (elf_hash_table (info)->dynamic_sections_created)
5007 {
5008 struct elf_info_failed eif;
5009 struct elf_link_hash_entry *h;
5010 asection *dynstr;
5011 struct bfd_elf_version_tree *t;
5012 struct bfd_elf_version_expr *d;
5013 bfd_boolean all_defined;
5014
5015 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
5016 BFD_ASSERT (*sinterpptr != NULL || !info->executable);
5017
5018 if (soname != NULL)
5019 {
5020 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5021 soname, TRUE);
5022 if (soname_indx == (bfd_size_type) -1
5023 || !_bfd_elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
5024 return FALSE;
5025 }
5026
5027 if (info->symbolic)
5028 {
5029 if (!_bfd_elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
5030 return FALSE;
5031 info->flags |= DF_SYMBOLIC;
5032 }
5033
5034 if (rpath != NULL)
5035 {
5036 bfd_size_type indx;
5037
5038 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
5039 TRUE);
5040 if (indx == (bfd_size_type) -1
5041 || !_bfd_elf_add_dynamic_entry (info, DT_RPATH, indx))
5042 return FALSE;
5043
5044 if (info->new_dtags)
5045 {
5046 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
5047 if (!_bfd_elf_add_dynamic_entry (info, DT_RUNPATH, indx))
5048 return FALSE;
5049 }
5050 }
5051
5052 if (filter_shlib != NULL)
5053 {
5054 bfd_size_type indx;
5055
5056 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5057 filter_shlib, TRUE);
5058 if (indx == (bfd_size_type) -1
5059 || !_bfd_elf_add_dynamic_entry (info, DT_FILTER, indx))
5060 return FALSE;
5061 }
5062
5063 if (auxiliary_filters != NULL)
5064 {
5065 const char * const *p;
5066
5067 for (p = auxiliary_filters; *p != NULL; p++)
5068 {
5069 bfd_size_type indx;
5070
5071 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5072 *p, TRUE);
5073 if (indx == (bfd_size_type) -1
5074 || !_bfd_elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
5075 return FALSE;
5076 }
5077 }
5078
5079 eif.info = info;
5080 eif.verdefs = verdefs;
5081 eif.failed = FALSE;
5082
5083 /* If we are supposed to export all symbols into the dynamic symbol
5084 table (this is not the normal case), then do so. */
5085 if (info->export_dynamic)
5086 {
5087 elf_link_hash_traverse (elf_hash_table (info),
5088 _bfd_elf_export_symbol,
5089 &eif);
5090 if (eif.failed)
5091 return FALSE;
5092 }
5093
5094 /* Make all global versions with definition. */
5095 for (t = verdefs; t != NULL; t = t->next)
5096 for (d = t->globals.list; d != NULL; d = d->next)
5097 if (!d->symver && d->symbol)
5098 {
5099 const char *verstr, *name;
5100 size_t namelen, verlen, newlen;
5101 char *newname, *p;
5102 struct elf_link_hash_entry *newh;
5103
5104 name = d->symbol;
5105 namelen = strlen (name);
5106 verstr = t->name;
5107 verlen = strlen (verstr);
5108 newlen = namelen + verlen + 3;
5109
5110 newname = bfd_malloc (newlen);
5111 if (newname == NULL)
5112 return FALSE;
5113 memcpy (newname, name, namelen);
5114
5115 /* Check the hidden versioned definition. */
5116 p = newname + namelen;
5117 *p++ = ELF_VER_CHR;
5118 memcpy (p, verstr, verlen + 1);
5119 newh = elf_link_hash_lookup (elf_hash_table (info),
5120 newname, FALSE, FALSE,
5121 FALSE);
5122 if (newh == NULL
5123 || (newh->root.type != bfd_link_hash_defined
5124 && newh->root.type != bfd_link_hash_defweak))
5125 {
5126 /* Check the default versioned definition. */
5127 *p++ = ELF_VER_CHR;
5128 memcpy (p, verstr, verlen + 1);
5129 newh = elf_link_hash_lookup (elf_hash_table (info),
5130 newname, FALSE, FALSE,
5131 FALSE);
5132 }
5133 free (newname);
5134
5135 /* Mark this version if there is a definition and it is
5136 not defined in a shared object. */
5137 if (newh != NULL
f5385ebf 5138 && !newh->def_dynamic
5a580b3a
AM
5139 && (newh->root.type == bfd_link_hash_defined
5140 || newh->root.type == bfd_link_hash_defweak))
5141 d->symver = 1;
5142 }
5143
5144 /* Attach all the symbols to their version information. */
5145 asvinfo.output_bfd = output_bfd;
5146 asvinfo.info = info;
5147 asvinfo.verdefs = verdefs;
5148 asvinfo.failed = FALSE;
5149
5150 elf_link_hash_traverse (elf_hash_table (info),
5151 _bfd_elf_link_assign_sym_version,
5152 &asvinfo);
5153 if (asvinfo.failed)
5154 return FALSE;
5155
5156 if (!info->allow_undefined_version)
5157 {
5158 /* Check if all global versions have a definition. */
5159 all_defined = TRUE;
5160 for (t = verdefs; t != NULL; t = t->next)
5161 for (d = t->globals.list; d != NULL; d = d->next)
5162 if (!d->symver && !d->script)
5163 {
5164 (*_bfd_error_handler)
5165 (_("%s: undefined version: %s"),
5166 d->pattern, t->name);
5167 all_defined = FALSE;
5168 }
5169
5170 if (!all_defined)
5171 {
5172 bfd_set_error (bfd_error_bad_value);
5173 return FALSE;
5174 }
5175 }
5176
5177 /* Find all symbols which were defined in a dynamic object and make
5178 the backend pick a reasonable value for them. */
5179 elf_link_hash_traverse (elf_hash_table (info),
5180 _bfd_elf_adjust_dynamic_symbol,
5181 &eif);
5182 if (eif.failed)
5183 return FALSE;
5184
5185 /* Add some entries to the .dynamic section. We fill in some of the
ee75fd95 5186 values later, in bfd_elf_final_link, but we must add the entries
5a580b3a
AM
5187 now so that we know the final size of the .dynamic section. */
5188
5189 /* If there are initialization and/or finalization functions to
5190 call then add the corresponding DT_INIT/DT_FINI entries. */
5191 h = (info->init_function
5192 ? elf_link_hash_lookup (elf_hash_table (info),
5193 info->init_function, FALSE,
5194 FALSE, FALSE)
5195 : NULL);
5196 if (h != NULL
f5385ebf
AM
5197 && (h->ref_regular
5198 || h->def_regular))
5a580b3a
AM
5199 {
5200 if (!_bfd_elf_add_dynamic_entry (info, DT_INIT, 0))
5201 return FALSE;
5202 }
5203 h = (info->fini_function
5204 ? elf_link_hash_lookup (elf_hash_table (info),
5205 info->fini_function, FALSE,
5206 FALSE, FALSE)
5207 : NULL);
5208 if (h != NULL
f5385ebf
AM
5209 && (h->ref_regular
5210 || h->def_regular))
5a580b3a
AM
5211 {
5212 if (!_bfd_elf_add_dynamic_entry (info, DT_FINI, 0))
5213 return FALSE;
5214 }
5215
5216 if (bfd_get_section_by_name (output_bfd, ".preinit_array") != NULL)
5217 {
5218 /* DT_PREINIT_ARRAY is not allowed in shared library. */
5219 if (! info->executable)
5220 {
5221 bfd *sub;
5222 asection *o;
5223
5224 for (sub = info->input_bfds; sub != NULL;
5225 sub = sub->link_next)
5226 for (o = sub->sections; o != NULL; o = o->next)
5227 if (elf_section_data (o)->this_hdr.sh_type
5228 == SHT_PREINIT_ARRAY)
5229 {
5230 (*_bfd_error_handler)
d003868e
AM
5231 (_("%B: .preinit_array section is not allowed in DSO"),
5232 sub);
5a580b3a
AM
5233 break;
5234 }
5235
5236 bfd_set_error (bfd_error_nonrepresentable_section);
5237 return FALSE;
5238 }
5239
5240 if (!_bfd_elf_add_dynamic_entry (info, DT_PREINIT_ARRAY, 0)
5241 || !_bfd_elf_add_dynamic_entry (info, DT_PREINIT_ARRAYSZ, 0))
5242 return FALSE;
5243 }
5244 if (bfd_get_section_by_name (output_bfd, ".init_array") != NULL)
5245 {
5246 if (!_bfd_elf_add_dynamic_entry (info, DT_INIT_ARRAY, 0)
5247 || !_bfd_elf_add_dynamic_entry (info, DT_INIT_ARRAYSZ, 0))
5248 return FALSE;
5249 }
5250 if (bfd_get_section_by_name (output_bfd, ".fini_array") != NULL)
5251 {
5252 if (!_bfd_elf_add_dynamic_entry (info, DT_FINI_ARRAY, 0)
5253 || !_bfd_elf_add_dynamic_entry (info, DT_FINI_ARRAYSZ, 0))
5254 return FALSE;
5255 }
5256
5257 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
5258 /* If .dynstr is excluded from the link, we don't want any of
5259 these tags. Strictly, we should be checking each section
5260 individually; This quick check covers for the case where
5261 someone does a /DISCARD/ : { *(*) }. */
5262 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
5263 {
5264 bfd_size_type strsize;
5265
5266 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
5267 if (!_bfd_elf_add_dynamic_entry (info, DT_HASH, 0)
5268 || !_bfd_elf_add_dynamic_entry (info, DT_STRTAB, 0)
5269 || !_bfd_elf_add_dynamic_entry (info, DT_SYMTAB, 0)
5270 || !_bfd_elf_add_dynamic_entry (info, DT_STRSZ, strsize)
5271 || !_bfd_elf_add_dynamic_entry (info, DT_SYMENT,
5272 bed->s->sizeof_sym))
5273 return FALSE;
5274 }
5275 }
5276
5277 /* The backend must work out the sizes of all the other dynamic
5278 sections. */
5279 if (bed->elf_backend_size_dynamic_sections
5280 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
5281 return FALSE;
5282
5283 if (elf_hash_table (info)->dynamic_sections_created)
5284 {
5285 bfd_size_type dynsymcount;
554220db 5286 unsigned long section_sym_count;
5a580b3a
AM
5287 asection *s;
5288 size_t bucketcount = 0;
5289 size_t hash_entry_size;
5290 unsigned int dtagcount;
5291
5292 /* Set up the version definition section. */
5293 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
5294 BFD_ASSERT (s != NULL);
5295
5296 /* We may have created additional version definitions if we are
5297 just linking a regular application. */
5298 verdefs = asvinfo.verdefs;
5299
5300 /* Skip anonymous version tag. */
5301 if (verdefs != NULL && verdefs->vernum == 0)
5302 verdefs = verdefs->next;
5303
3e3b46e5 5304 if (verdefs == NULL && !info->create_default_symver)
5a580b3a
AM
5305 _bfd_strip_section_from_output (info, s);
5306 else
5307 {
5308 unsigned int cdefs;
5309 bfd_size_type size;
5310 struct bfd_elf_version_tree *t;
5311 bfd_byte *p;
5312 Elf_Internal_Verdef def;
5313 Elf_Internal_Verdaux defaux;
3e3b46e5
PB
5314 struct bfd_link_hash_entry *bh;
5315 struct elf_link_hash_entry *h;
5316 const char *name;
5a580b3a
AM
5317
5318 cdefs = 0;
5319 size = 0;
5320
5321 /* Make space for the base version. */
5322 size += sizeof (Elf_External_Verdef);
5323 size += sizeof (Elf_External_Verdaux);
5324 ++cdefs;
5325
3e3b46e5
PB
5326 /* Make space for the default version. */
5327 if (info->create_default_symver)
5328 {
5329 size += sizeof (Elf_External_Verdef);
5330 ++cdefs;
5331 }
5332
5a580b3a
AM
5333 for (t = verdefs; t != NULL; t = t->next)
5334 {
5335 struct bfd_elf_version_deps *n;
5336
5337 size += sizeof (Elf_External_Verdef);
5338 size += sizeof (Elf_External_Verdaux);
5339 ++cdefs;
5340
5341 for (n = t->deps; n != NULL; n = n->next)
5342 size += sizeof (Elf_External_Verdaux);
5343 }
5344
eea6121a
AM
5345 s->size = size;
5346 s->contents = bfd_alloc (output_bfd, s->size);
5347 if (s->contents == NULL && s->size != 0)
5a580b3a
AM
5348 return FALSE;
5349
5350 /* Fill in the version definition section. */
5351
5352 p = s->contents;
5353
5354 def.vd_version = VER_DEF_CURRENT;
5355 def.vd_flags = VER_FLG_BASE;
5356 def.vd_ndx = 1;
5357 def.vd_cnt = 1;
3e3b46e5
PB
5358 if (info->create_default_symver)
5359 {
5360 def.vd_aux = 2 * sizeof (Elf_External_Verdef);
5361 def.vd_next = sizeof (Elf_External_Verdef);
5362 }
5363 else
5364 {
5365 def.vd_aux = sizeof (Elf_External_Verdef);
5366 def.vd_next = (sizeof (Elf_External_Verdef)
5367 + sizeof (Elf_External_Verdaux));
5368 }
5a580b3a
AM
5369
5370 if (soname_indx != (bfd_size_type) -1)
5371 {
5372 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5373 soname_indx);
5374 def.vd_hash = bfd_elf_hash (soname);
5375 defaux.vda_name = soname_indx;
3e3b46e5 5376 name = soname;
5a580b3a
AM
5377 }
5378 else
5379 {
5a580b3a
AM
5380 bfd_size_type indx;
5381
5382 name = basename (output_bfd->filename);
5383 def.vd_hash = bfd_elf_hash (name);
5384 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5385 name, FALSE);
5386 if (indx == (bfd_size_type) -1)
5387 return FALSE;
5388 defaux.vda_name = indx;
5389 }
5390 defaux.vda_next = 0;
5391
5392 _bfd_elf_swap_verdef_out (output_bfd, &def,
5393 (Elf_External_Verdef *) p);
5394 p += sizeof (Elf_External_Verdef);
3e3b46e5
PB
5395 if (info->create_default_symver)
5396 {
5397 /* Add a symbol representing this version. */
5398 bh = NULL;
5399 if (! (_bfd_generic_link_add_one_symbol
5400 (info, dynobj, name, BSF_GLOBAL, bfd_abs_section_ptr,
5401 0, NULL, FALSE,
5402 get_elf_backend_data (dynobj)->collect, &bh)))
5403 return FALSE;
5404 h = (struct elf_link_hash_entry *) bh;
5405 h->non_elf = 0;
5406 h->def_regular = 1;
5407 h->type = STT_OBJECT;
5408 h->verinfo.vertree = NULL;
5409
5410 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5411 return FALSE;
5412
5413 /* Create a duplicate of the base version with the same
5414 aux block, but different flags. */
5415 def.vd_flags = 0;
5416 def.vd_ndx = 2;
5417 def.vd_aux = sizeof (Elf_External_Verdef);
5418 if (verdefs)
5419 def.vd_next = (sizeof (Elf_External_Verdef)
5420 + sizeof (Elf_External_Verdaux));
5421 else
5422 def.vd_next = 0;
5423 _bfd_elf_swap_verdef_out (output_bfd, &def,
5424 (Elf_External_Verdef *) p);
5425 p += sizeof (Elf_External_Verdef);
5426 }
5a580b3a
AM
5427 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5428 (Elf_External_Verdaux *) p);
5429 p += sizeof (Elf_External_Verdaux);
5430
5431 for (t = verdefs; t != NULL; t = t->next)
5432 {
5433 unsigned int cdeps;
5434 struct bfd_elf_version_deps *n;
5a580b3a
AM
5435
5436 cdeps = 0;
5437 for (n = t->deps; n != NULL; n = n->next)
5438 ++cdeps;
5439
5440 /* Add a symbol representing this version. */
5441 bh = NULL;
5442 if (! (_bfd_generic_link_add_one_symbol
5443 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
5444 0, NULL, FALSE,
5445 get_elf_backend_data (dynobj)->collect, &bh)))
5446 return FALSE;
5447 h = (struct elf_link_hash_entry *) bh;
f5385ebf
AM
5448 h->non_elf = 0;
5449 h->def_regular = 1;
5a580b3a
AM
5450 h->type = STT_OBJECT;
5451 h->verinfo.vertree = t;
5452
c152c796 5453 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5a580b3a
AM
5454 return FALSE;
5455
5456 def.vd_version = VER_DEF_CURRENT;
5457 def.vd_flags = 0;
5458 if (t->globals.list == NULL
5459 && t->locals.list == NULL
5460 && ! t->used)
5461 def.vd_flags |= VER_FLG_WEAK;
3e3b46e5 5462 def.vd_ndx = t->vernum + (info->create_default_symver ? 2 : 1);
5a580b3a
AM
5463 def.vd_cnt = cdeps + 1;
5464 def.vd_hash = bfd_elf_hash (t->name);
5465 def.vd_aux = sizeof (Elf_External_Verdef);
5466 def.vd_next = 0;
5467 if (t->next != NULL)
5468 def.vd_next = (sizeof (Elf_External_Verdef)
5469 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
5470
5471 _bfd_elf_swap_verdef_out (output_bfd, &def,
5472 (Elf_External_Verdef *) p);
5473 p += sizeof (Elf_External_Verdef);
5474
5475 defaux.vda_name = h->dynstr_index;
5476 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5477 h->dynstr_index);
5478 defaux.vda_next = 0;
5479 if (t->deps != NULL)
5480 defaux.vda_next = sizeof (Elf_External_Verdaux);
5481 t->name_indx = defaux.vda_name;
5482
5483 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5484 (Elf_External_Verdaux *) p);
5485 p += sizeof (Elf_External_Verdaux);
5486
5487 for (n = t->deps; n != NULL; n = n->next)
5488 {
5489 if (n->version_needed == NULL)
5490 {
5491 /* This can happen if there was an error in the
5492 version script. */
5493 defaux.vda_name = 0;
5494 }
5495 else
5496 {
5497 defaux.vda_name = n->version_needed->name_indx;
5498 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5499 defaux.vda_name);
5500 }
5501 if (n->next == NULL)
5502 defaux.vda_next = 0;
5503 else
5504 defaux.vda_next = sizeof (Elf_External_Verdaux);
5505
5506 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5507 (Elf_External_Verdaux *) p);
5508 p += sizeof (Elf_External_Verdaux);
5509 }
5510 }
5511
5512 if (!_bfd_elf_add_dynamic_entry (info, DT_VERDEF, 0)
5513 || !_bfd_elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
5514 return FALSE;
5515
5516 elf_tdata (output_bfd)->cverdefs = cdefs;
5517 }
5518
5519 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
5520 {
5521 if (!_bfd_elf_add_dynamic_entry (info, DT_FLAGS, info->flags))
5522 return FALSE;
5523 }
5524 else if (info->flags & DF_BIND_NOW)
5525 {
5526 if (!_bfd_elf_add_dynamic_entry (info, DT_BIND_NOW, 0))
5527 return FALSE;
5528 }
5529
5530 if (info->flags_1)
5531 {
5532 if (info->executable)
5533 info->flags_1 &= ~ (DF_1_INITFIRST
5534 | DF_1_NODELETE
5535 | DF_1_NOOPEN);
5536 if (!_bfd_elf_add_dynamic_entry (info, DT_FLAGS_1, info->flags_1))
5537 return FALSE;
5538 }
5539
5540 /* Work out the size of the version reference section. */
5541
5542 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
5543 BFD_ASSERT (s != NULL);
5544 {
5545 struct elf_find_verdep_info sinfo;
5546
5547 sinfo.output_bfd = output_bfd;
5548 sinfo.info = info;
5549 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
5550 if (sinfo.vers == 0)
5551 sinfo.vers = 1;
5552 sinfo.failed = FALSE;
5553
5554 elf_link_hash_traverse (elf_hash_table (info),
5555 _bfd_elf_link_find_version_dependencies,
5556 &sinfo);
5557
5558 if (elf_tdata (output_bfd)->verref == NULL)
5559 _bfd_strip_section_from_output (info, s);
5560 else
5561 {
5562 Elf_Internal_Verneed *t;
5563 unsigned int size;
5564 unsigned int crefs;
5565 bfd_byte *p;
5566
5567 /* Build the version definition section. */
5568 size = 0;
5569 crefs = 0;
5570 for (t = elf_tdata (output_bfd)->verref;
5571 t != NULL;
5572 t = t->vn_nextref)
5573 {
5574 Elf_Internal_Vernaux *a;
5575
5576 size += sizeof (Elf_External_Verneed);
5577 ++crefs;
5578 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5579 size += sizeof (Elf_External_Vernaux);
5580 }
5581
eea6121a
AM
5582 s->size = size;
5583 s->contents = bfd_alloc (output_bfd, s->size);
5a580b3a
AM
5584 if (s->contents == NULL)
5585 return FALSE;
5586
5587 p = s->contents;
5588 for (t = elf_tdata (output_bfd)->verref;
5589 t != NULL;
5590 t = t->vn_nextref)
5591 {
5592 unsigned int caux;
5593 Elf_Internal_Vernaux *a;
5594 bfd_size_type indx;
5595
5596 caux = 0;
5597 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5598 ++caux;
5599
5600 t->vn_version = VER_NEED_CURRENT;
5601 t->vn_cnt = caux;
5602 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5603 elf_dt_name (t->vn_bfd) != NULL
5604 ? elf_dt_name (t->vn_bfd)
5605 : basename (t->vn_bfd->filename),
5606 FALSE);
5607 if (indx == (bfd_size_type) -1)
5608 return FALSE;
5609 t->vn_file = indx;
5610 t->vn_aux = sizeof (Elf_External_Verneed);
5611 if (t->vn_nextref == NULL)
5612 t->vn_next = 0;
5613 else
5614 t->vn_next = (sizeof (Elf_External_Verneed)
5615 + caux * sizeof (Elf_External_Vernaux));
5616
5617 _bfd_elf_swap_verneed_out (output_bfd, t,
5618 (Elf_External_Verneed *) p);
5619 p += sizeof (Elf_External_Verneed);
5620
5621 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5622 {
5623 a->vna_hash = bfd_elf_hash (a->vna_nodename);
5624 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5625 a->vna_nodename, FALSE);
5626 if (indx == (bfd_size_type) -1)
5627 return FALSE;
5628 a->vna_name = indx;
5629 if (a->vna_nextptr == NULL)
5630 a->vna_next = 0;
5631 else
5632 a->vna_next = sizeof (Elf_External_Vernaux);
5633
5634 _bfd_elf_swap_vernaux_out (output_bfd, a,
5635 (Elf_External_Vernaux *) p);
5636 p += sizeof (Elf_External_Vernaux);
5637 }
5638 }
5639
5640 if (!_bfd_elf_add_dynamic_entry (info, DT_VERNEED, 0)
5641 || !_bfd_elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
5642 return FALSE;
5643
5644 elf_tdata (output_bfd)->cverrefs = crefs;
5645 }
5646 }
5647
5648 /* Assign dynsym indicies. In a shared library we generate a
5649 section symbol for each output section, which come first.
5650 Next come all of the back-end allocated local dynamic syms,
5651 followed by the rest of the global symbols. */
5652
554220db
AM
5653 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info,
5654 &section_sym_count);
5a580b3a
AM
5655
5656 /* Work out the size of the symbol version section. */
5657 s = bfd_get_section_by_name (dynobj, ".gnu.version");
5658 BFD_ASSERT (s != NULL);
5659 if (dynsymcount == 0
3e3b46e5
PB
5660 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL
5661 && !info->create_default_symver))
5a580b3a
AM
5662 {
5663 _bfd_strip_section_from_output (info, s);
5664 /* The DYNSYMCOUNT might have changed if we were going to
5665 output a dynamic symbol table entry for S. */
554220db
AM
5666 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info,
5667 &section_sym_count);
5a580b3a
AM
5668 }
5669 else
5670 {
eea6121a
AM
5671 s->size = dynsymcount * sizeof (Elf_External_Versym);
5672 s->contents = bfd_zalloc (output_bfd, s->size);
5a580b3a
AM
5673 if (s->contents == NULL)
5674 return FALSE;
5675
5676 if (!_bfd_elf_add_dynamic_entry (info, DT_VERSYM, 0))
5677 return FALSE;
5678 }
5679
5680 /* Set the size of the .dynsym and .hash sections. We counted
5681 the number of dynamic symbols in elf_link_add_object_symbols.
5682 We will build the contents of .dynsym and .hash when we build
5683 the final symbol table, because until then we do not know the
5684 correct value to give the symbols. We built the .dynstr
5685 section as we went along in elf_link_add_object_symbols. */
5686 s = bfd_get_section_by_name (dynobj, ".dynsym");
5687 BFD_ASSERT (s != NULL);
eea6121a 5688 s->size = dynsymcount * bed->s->sizeof_sym;
5a580b3a
AM
5689
5690 if (dynsymcount != 0)
5691 {
554220db
AM
5692 s->contents = bfd_alloc (output_bfd, s->size);
5693 if (s->contents == NULL)
5694 return FALSE;
5a580b3a 5695
554220db
AM
5696 /* The first entry in .dynsym is a dummy symbol.
5697 Clear all the section syms, in case we don't output them all. */
5698 ++section_sym_count;
5699 memset (s->contents, 0, section_sym_count * bed->s->sizeof_sym);
5a580b3a
AM
5700 }
5701
5702 /* Compute the size of the hashing table. As a side effect this
5703 computes the hash values for all the names we export. */
5704 bucketcount = compute_bucket_count (info);
5705
5706 s = bfd_get_section_by_name (dynobj, ".hash");
5707 BFD_ASSERT (s != NULL);
5708 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
eea6121a
AM
5709 s->size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
5710 s->contents = bfd_zalloc (output_bfd, s->size);
5a580b3a
AM
5711 if (s->contents == NULL)
5712 return FALSE;
5713
5714 bfd_put (8 * hash_entry_size, output_bfd, bucketcount, s->contents);
5715 bfd_put (8 * hash_entry_size, output_bfd, dynsymcount,
5716 s->contents + hash_entry_size);
5717
5718 elf_hash_table (info)->bucketcount = bucketcount;
5719
5720 s = bfd_get_section_by_name (dynobj, ".dynstr");
5721 BFD_ASSERT (s != NULL);
5722
4ad4eba5 5723 elf_finalize_dynstr (output_bfd, info);
5a580b3a 5724
eea6121a 5725 s->size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
5a580b3a
AM
5726
5727 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
5728 if (!_bfd_elf_add_dynamic_entry (info, DT_NULL, 0))
5729 return FALSE;
5730 }
5731
5732 return TRUE;
5733}
c152c796
AM
5734
5735/* Final phase of ELF linker. */
5736
5737/* A structure we use to avoid passing large numbers of arguments. */
5738
5739struct elf_final_link_info
5740{
5741 /* General link information. */
5742 struct bfd_link_info *info;
5743 /* Output BFD. */
5744 bfd *output_bfd;
5745 /* Symbol string table. */
5746 struct bfd_strtab_hash *symstrtab;
5747 /* .dynsym section. */
5748 asection *dynsym_sec;
5749 /* .hash section. */
5750 asection *hash_sec;
5751 /* symbol version section (.gnu.version). */
5752 asection *symver_sec;
5753 /* Buffer large enough to hold contents of any section. */
5754 bfd_byte *contents;
5755 /* Buffer large enough to hold external relocs of any section. */
5756 void *external_relocs;
5757 /* Buffer large enough to hold internal relocs of any section. */
5758 Elf_Internal_Rela *internal_relocs;
5759 /* Buffer large enough to hold external local symbols of any input
5760 BFD. */
5761 bfd_byte *external_syms;
5762 /* And a buffer for symbol section indices. */
5763 Elf_External_Sym_Shndx *locsym_shndx;
5764 /* Buffer large enough to hold internal local symbols of any input
5765 BFD. */
5766 Elf_Internal_Sym *internal_syms;
5767 /* Array large enough to hold a symbol index for each local symbol
5768 of any input BFD. */
5769 long *indices;
5770 /* Array large enough to hold a section pointer for each local
5771 symbol of any input BFD. */
5772 asection **sections;
5773 /* Buffer to hold swapped out symbols. */
5774 bfd_byte *symbuf;
5775 /* And one for symbol section indices. */
5776 Elf_External_Sym_Shndx *symshndxbuf;
5777 /* Number of swapped out symbols in buffer. */
5778 size_t symbuf_count;
5779 /* Number of symbols which fit in symbuf. */
5780 size_t symbuf_size;
5781 /* And same for symshndxbuf. */
5782 size_t shndxbuf_size;
5783};
5784
5785/* This struct is used to pass information to elf_link_output_extsym. */
5786
5787struct elf_outext_info
5788{
5789 bfd_boolean failed;
5790 bfd_boolean localsyms;
5791 struct elf_final_link_info *finfo;
5792};
5793
5794/* When performing a relocatable link, the input relocations are
5795 preserved. But, if they reference global symbols, the indices
5796 referenced must be updated. Update all the relocations in
5797 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
5798
5799static void
5800elf_link_adjust_relocs (bfd *abfd,
5801 Elf_Internal_Shdr *rel_hdr,
5802 unsigned int count,
5803 struct elf_link_hash_entry **rel_hash)
5804{
5805 unsigned int i;
5806 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5807 bfd_byte *erela;
5808 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
5809 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
5810 bfd_vma r_type_mask;
5811 int r_sym_shift;
5812
5813 if (rel_hdr->sh_entsize == bed->s->sizeof_rel)
5814 {
5815 swap_in = bed->s->swap_reloc_in;
5816 swap_out = bed->s->swap_reloc_out;
5817 }
5818 else if (rel_hdr->sh_entsize == bed->s->sizeof_rela)
5819 {
5820 swap_in = bed->s->swap_reloca_in;
5821 swap_out = bed->s->swap_reloca_out;
5822 }
5823 else
5824 abort ();
5825
5826 if (bed->s->int_rels_per_ext_rel > MAX_INT_RELS_PER_EXT_REL)
5827 abort ();
5828
5829 if (bed->s->arch_size == 32)
5830 {
5831 r_type_mask = 0xff;
5832 r_sym_shift = 8;
5833 }
5834 else
5835 {
5836 r_type_mask = 0xffffffff;
5837 r_sym_shift = 32;
5838 }
5839
5840 erela = rel_hdr->contents;
5841 for (i = 0; i < count; i++, rel_hash++, erela += rel_hdr->sh_entsize)
5842 {
5843 Elf_Internal_Rela irela[MAX_INT_RELS_PER_EXT_REL];
5844 unsigned int j;
5845
5846 if (*rel_hash == NULL)
5847 continue;
5848
5849 BFD_ASSERT ((*rel_hash)->indx >= 0);
5850
5851 (*swap_in) (abfd, erela, irela);
5852 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
5853 irela[j].r_info = ((bfd_vma) (*rel_hash)->indx << r_sym_shift
5854 | (irela[j].r_info & r_type_mask));
5855 (*swap_out) (abfd, irela, erela);
5856 }
5857}
5858
5859struct elf_link_sort_rela
5860{
5861 union {
5862 bfd_vma offset;
5863 bfd_vma sym_mask;
5864 } u;
5865 enum elf_reloc_type_class type;
5866 /* We use this as an array of size int_rels_per_ext_rel. */
5867 Elf_Internal_Rela rela[1];
5868};
5869
5870static int
5871elf_link_sort_cmp1 (const void *A, const void *B)
5872{
5873 const struct elf_link_sort_rela *a = A;
5874 const struct elf_link_sort_rela *b = B;
5875 int relativea, relativeb;
5876
5877 relativea = a->type == reloc_class_relative;
5878 relativeb = b->type == reloc_class_relative;
5879
5880 if (relativea < relativeb)
5881 return 1;
5882 if (relativea > relativeb)
5883 return -1;
5884 if ((a->rela->r_info & a->u.sym_mask) < (b->rela->r_info & b->u.sym_mask))
5885 return -1;
5886 if ((a->rela->r_info & a->u.sym_mask) > (b->rela->r_info & b->u.sym_mask))
5887 return 1;
5888 if (a->rela->r_offset < b->rela->r_offset)
5889 return -1;
5890 if (a->rela->r_offset > b->rela->r_offset)
5891 return 1;
5892 return 0;
5893}
5894
5895static int
5896elf_link_sort_cmp2 (const void *A, const void *B)
5897{
5898 const struct elf_link_sort_rela *a = A;
5899 const struct elf_link_sort_rela *b = B;
5900 int copya, copyb;
5901
5902 if (a->u.offset < b->u.offset)
5903 return -1;
5904 if (a->u.offset > b->u.offset)
5905 return 1;
5906 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
5907 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
5908 if (copya < copyb)
5909 return -1;
5910 if (copya > copyb)
5911 return 1;
5912 if (a->rela->r_offset < b->rela->r_offset)
5913 return -1;
5914 if (a->rela->r_offset > b->rela->r_offset)
5915 return 1;
5916 return 0;
5917}
5918
5919static size_t
5920elf_link_sort_relocs (bfd *abfd, struct bfd_link_info *info, asection **psec)
5921{
5922 asection *reldyn;
5923 bfd_size_type count, size;
5924 size_t i, ret, sort_elt, ext_size;
5925 bfd_byte *sort, *s_non_relative, *p;
5926 struct elf_link_sort_rela *sq;
5927 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5928 int i2e = bed->s->int_rels_per_ext_rel;
5929 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
5930 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
5931 struct bfd_link_order *lo;
5932 bfd_vma r_sym_mask;
5933
5934 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
eea6121a 5935 if (reldyn == NULL || reldyn->size == 0)
c152c796
AM
5936 {
5937 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
eea6121a 5938 if (reldyn == NULL || reldyn->size == 0)
c152c796
AM
5939 return 0;
5940 ext_size = bed->s->sizeof_rel;
5941 swap_in = bed->s->swap_reloc_in;
5942 swap_out = bed->s->swap_reloc_out;
5943 }
5944 else
5945 {
5946 ext_size = bed->s->sizeof_rela;
5947 swap_in = bed->s->swap_reloca_in;
5948 swap_out = bed->s->swap_reloca_out;
5949 }
eea6121a 5950 count = reldyn->size / ext_size;
c152c796
AM
5951
5952 size = 0;
5953 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
5954 if (lo->type == bfd_indirect_link_order)
5955 {
5956 asection *o = lo->u.indirect.section;
eea6121a 5957 size += o->size;
c152c796
AM
5958 }
5959
eea6121a 5960 if (size != reldyn->size)
c152c796
AM
5961 return 0;
5962
5963 sort_elt = (sizeof (struct elf_link_sort_rela)
5964 + (i2e - 1) * sizeof (Elf_Internal_Rela));
5965 sort = bfd_zmalloc (sort_elt * count);
5966 if (sort == NULL)
5967 {
5968 (*info->callbacks->warning)
5969 (info, _("Not enough memory to sort relocations"), 0, abfd, 0, 0);
5970 return 0;
5971 }
5972
5973 if (bed->s->arch_size == 32)
5974 r_sym_mask = ~(bfd_vma) 0xff;
5975 else
5976 r_sym_mask = ~(bfd_vma) 0xffffffff;
5977
5978 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
5979 if (lo->type == bfd_indirect_link_order)
5980 {
5981 bfd_byte *erel, *erelend;
5982 asection *o = lo->u.indirect.section;
5983
1da212d6
AM
5984 if (o->contents == NULL && o->size != 0)
5985 {
5986 /* This is a reloc section that is being handled as a normal
5987 section. See bfd_section_from_shdr. We can't combine
5988 relocs in this case. */
5989 free (sort);
5990 return 0;
5991 }
c152c796 5992 erel = o->contents;
eea6121a 5993 erelend = o->contents + o->size;
c152c796
AM
5994 p = sort + o->output_offset / ext_size * sort_elt;
5995 while (erel < erelend)
5996 {
5997 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
5998 (*swap_in) (abfd, erel, s->rela);
5999 s->type = (*bed->elf_backend_reloc_type_class) (s->rela);
6000 s->u.sym_mask = r_sym_mask;
6001 p += sort_elt;
6002 erel += ext_size;
6003 }
6004 }
6005
6006 qsort (sort, count, sort_elt, elf_link_sort_cmp1);
6007
6008 for (i = 0, p = sort; i < count; i++, p += sort_elt)
6009 {
6010 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6011 if (s->type != reloc_class_relative)
6012 break;
6013 }
6014 ret = i;
6015 s_non_relative = p;
6016
6017 sq = (struct elf_link_sort_rela *) s_non_relative;
6018 for (; i < count; i++, p += sort_elt)
6019 {
6020 struct elf_link_sort_rela *sp = (struct elf_link_sort_rela *) p;
6021 if (((sp->rela->r_info ^ sq->rela->r_info) & r_sym_mask) != 0)
6022 sq = sp;
6023 sp->u.offset = sq->rela->r_offset;
6024 }
6025
6026 qsort (s_non_relative, count - ret, sort_elt, elf_link_sort_cmp2);
6027
6028 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
6029 if (lo->type == bfd_indirect_link_order)
6030 {
6031 bfd_byte *erel, *erelend;
6032 asection *o = lo->u.indirect.section;
6033
6034 erel = o->contents;
eea6121a 6035 erelend = o->contents + o->size;
c152c796
AM
6036 p = sort + o->output_offset / ext_size * sort_elt;
6037 while (erel < erelend)
6038 {
6039 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6040 (*swap_out) (abfd, s->rela, erel);
6041 p += sort_elt;
6042 erel += ext_size;
6043 }
6044 }
6045
6046 free (sort);
6047 *psec = reldyn;
6048 return ret;
6049}
6050
6051/* Flush the output symbols to the file. */
6052
6053static bfd_boolean
6054elf_link_flush_output_syms (struct elf_final_link_info *finfo,
6055 const struct elf_backend_data *bed)
6056{
6057 if (finfo->symbuf_count > 0)
6058 {
6059 Elf_Internal_Shdr *hdr;
6060 file_ptr pos;
6061 bfd_size_type amt;
6062
6063 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
6064 pos = hdr->sh_offset + hdr->sh_size;
6065 amt = finfo->symbuf_count * bed->s->sizeof_sym;
6066 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
6067 || bfd_bwrite (finfo->symbuf, amt, finfo->output_bfd) != amt)
6068 return FALSE;
6069
6070 hdr->sh_size += amt;
6071 finfo->symbuf_count = 0;
6072 }
6073
6074 return TRUE;
6075}
6076
6077/* Add a symbol to the output symbol table. */
6078
6079static bfd_boolean
6080elf_link_output_sym (struct elf_final_link_info *finfo,
6081 const char *name,
6082 Elf_Internal_Sym *elfsym,
6083 asection *input_sec,
6084 struct elf_link_hash_entry *h)
6085{
6086 bfd_byte *dest;
6087 Elf_External_Sym_Shndx *destshndx;
6088 bfd_boolean (*output_symbol_hook)
6089 (struct bfd_link_info *, const char *, Elf_Internal_Sym *, asection *,
6090 struct elf_link_hash_entry *);
6091 const struct elf_backend_data *bed;
6092
6093 bed = get_elf_backend_data (finfo->output_bfd);
6094 output_symbol_hook = bed->elf_backend_link_output_symbol_hook;
6095 if (output_symbol_hook != NULL)
6096 {
6097 if (! (*output_symbol_hook) (finfo->info, name, elfsym, input_sec, h))
6098 return FALSE;
6099 }
6100
6101 if (name == NULL || *name == '\0')
6102 elfsym->st_name = 0;
6103 else if (input_sec->flags & SEC_EXCLUDE)
6104 elfsym->st_name = 0;
6105 else
6106 {
6107 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
6108 name, TRUE, FALSE);
6109 if (elfsym->st_name == (unsigned long) -1)
6110 return FALSE;
6111 }
6112
6113 if (finfo->symbuf_count >= finfo->symbuf_size)
6114 {
6115 if (! elf_link_flush_output_syms (finfo, bed))
6116 return FALSE;
6117 }
6118
6119 dest = finfo->symbuf + finfo->symbuf_count * bed->s->sizeof_sym;
6120 destshndx = finfo->symshndxbuf;
6121 if (destshndx != NULL)
6122 {
6123 if (bfd_get_symcount (finfo->output_bfd) >= finfo->shndxbuf_size)
6124 {
6125 bfd_size_type amt;
6126
6127 amt = finfo->shndxbuf_size * sizeof (Elf_External_Sym_Shndx);
6128 finfo->symshndxbuf = destshndx = bfd_realloc (destshndx, amt * 2);
6129 if (destshndx == NULL)
6130 return FALSE;
6131 memset ((char *) destshndx + amt, 0, amt);
6132 finfo->shndxbuf_size *= 2;
6133 }
6134 destshndx += bfd_get_symcount (finfo->output_bfd);
6135 }
6136
6137 bed->s->swap_symbol_out (finfo->output_bfd, elfsym, dest, destshndx);
6138 finfo->symbuf_count += 1;
6139 bfd_get_symcount (finfo->output_bfd) += 1;
6140
6141 return TRUE;
6142}
6143
6144/* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
6145 allowing an unsatisfied unversioned symbol in the DSO to match a
6146 versioned symbol that would normally require an explicit version.
6147 We also handle the case that a DSO references a hidden symbol
6148 which may be satisfied by a versioned symbol in another DSO. */
6149
6150static bfd_boolean
6151elf_link_check_versioned_symbol (struct bfd_link_info *info,
6152 const struct elf_backend_data *bed,
6153 struct elf_link_hash_entry *h)
6154{
6155 bfd *abfd;
6156 struct elf_link_loaded_list *loaded;
6157
6158 if (!is_elf_hash_table (info->hash))
6159 return FALSE;
6160
6161 switch (h->root.type)
6162 {
6163 default:
6164 abfd = NULL;
6165 break;
6166
6167 case bfd_link_hash_undefined:
6168 case bfd_link_hash_undefweak:
6169 abfd = h->root.u.undef.abfd;
6170 if ((abfd->flags & DYNAMIC) == 0
e56f61be 6171 || (elf_dyn_lib_class (abfd) & DYN_DT_NEEDED) == 0)
c152c796
AM
6172 return FALSE;
6173 break;
6174
6175 case bfd_link_hash_defined:
6176 case bfd_link_hash_defweak:
6177 abfd = h->root.u.def.section->owner;
6178 break;
6179
6180 case bfd_link_hash_common:
6181 abfd = h->root.u.c.p->section->owner;
6182 break;
6183 }
6184 BFD_ASSERT (abfd != NULL);
6185
6186 for (loaded = elf_hash_table (info)->loaded;
6187 loaded != NULL;
6188 loaded = loaded->next)
6189 {
6190 bfd *input;
6191 Elf_Internal_Shdr *hdr;
6192 bfd_size_type symcount;
6193 bfd_size_type extsymcount;
6194 bfd_size_type extsymoff;
6195 Elf_Internal_Shdr *versymhdr;
6196 Elf_Internal_Sym *isym;
6197 Elf_Internal_Sym *isymend;
6198 Elf_Internal_Sym *isymbuf;
6199 Elf_External_Versym *ever;
6200 Elf_External_Versym *extversym;
6201
6202 input = loaded->abfd;
6203
6204 /* We check each DSO for a possible hidden versioned definition. */
6205 if (input == abfd
6206 || (input->flags & DYNAMIC) == 0
6207 || elf_dynversym (input) == 0)
6208 continue;
6209
6210 hdr = &elf_tdata (input)->dynsymtab_hdr;
6211
6212 symcount = hdr->sh_size / bed->s->sizeof_sym;
6213 if (elf_bad_symtab (input))
6214 {
6215 extsymcount = symcount;
6216 extsymoff = 0;
6217 }
6218 else
6219 {
6220 extsymcount = symcount - hdr->sh_info;
6221 extsymoff = hdr->sh_info;
6222 }
6223
6224 if (extsymcount == 0)
6225 continue;
6226
6227 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
6228 NULL, NULL, NULL);
6229 if (isymbuf == NULL)
6230 return FALSE;
6231
6232 /* Read in any version definitions. */
6233 versymhdr = &elf_tdata (input)->dynversym_hdr;
6234 extversym = bfd_malloc (versymhdr->sh_size);
6235 if (extversym == NULL)
6236 goto error_ret;
6237
6238 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
6239 || (bfd_bread (extversym, versymhdr->sh_size, input)
6240 != versymhdr->sh_size))
6241 {
6242 free (extversym);
6243 error_ret:
6244 free (isymbuf);
6245 return FALSE;
6246 }
6247
6248 ever = extversym + extsymoff;
6249 isymend = isymbuf + extsymcount;
6250 for (isym = isymbuf; isym < isymend; isym++, ever++)
6251 {
6252 const char *name;
6253 Elf_Internal_Versym iver;
6254 unsigned short version_index;
6255
6256 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
6257 || isym->st_shndx == SHN_UNDEF)
6258 continue;
6259
6260 name = bfd_elf_string_from_elf_section (input,
6261 hdr->sh_link,
6262 isym->st_name);
6263 if (strcmp (name, h->root.root.string) != 0)
6264 continue;
6265
6266 _bfd_elf_swap_versym_in (input, ever, &iver);
6267
6268 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
6269 {
6270 /* If we have a non-hidden versioned sym, then it should
6271 have provided a definition for the undefined sym. */
6272 abort ();
6273 }
6274
6275 version_index = iver.vs_vers & VERSYM_VERSION;
6276 if (version_index == 1 || version_index == 2)
6277 {
6278 /* This is the base or first version. We can use it. */
6279 free (extversym);
6280 free (isymbuf);
6281 return TRUE;
6282 }
6283 }
6284
6285 free (extversym);
6286 free (isymbuf);
6287 }
6288
6289 return FALSE;
6290}
6291
6292/* Add an external symbol to the symbol table. This is called from
6293 the hash table traversal routine. When generating a shared object,
6294 we go through the symbol table twice. The first time we output
6295 anything that might have been forced to local scope in a version
6296 script. The second time we output the symbols that are still
6297 global symbols. */
6298
6299static bfd_boolean
6300elf_link_output_extsym (struct elf_link_hash_entry *h, void *data)
6301{
6302 struct elf_outext_info *eoinfo = data;
6303 struct elf_final_link_info *finfo = eoinfo->finfo;
6304 bfd_boolean strip;
6305 Elf_Internal_Sym sym;
6306 asection *input_sec;
6307 const struct elf_backend_data *bed;
6308
6309 if (h->root.type == bfd_link_hash_warning)
6310 {
6311 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6312 if (h->root.type == bfd_link_hash_new)
6313 return TRUE;
6314 }
6315
6316 /* Decide whether to output this symbol in this pass. */
6317 if (eoinfo->localsyms)
6318 {
f5385ebf 6319 if (!h->forced_local)
c152c796
AM
6320 return TRUE;
6321 }
6322 else
6323 {
f5385ebf 6324 if (h->forced_local)
c152c796
AM
6325 return TRUE;
6326 }
6327
6328 bed = get_elf_backend_data (finfo->output_bfd);
6329
6330 /* If we have an undefined symbol reference here then it must have
6331 come from a shared library that is being linked in. (Undefined
6332 references in regular files have already been handled). If we
6333 are reporting errors for this situation then do so now. */
6334 if (h->root.type == bfd_link_hash_undefined
f5385ebf
AM
6335 && h->ref_dynamic
6336 && !h->ref_regular
c152c796
AM
6337 && ! elf_link_check_versioned_symbol (finfo->info, bed, h)
6338 && finfo->info->unresolved_syms_in_shared_libs != RM_IGNORE)
6339 {
6340 if (! ((*finfo->info->callbacks->undefined_symbol)
6341 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
6342 NULL, 0, finfo->info->unresolved_syms_in_shared_libs == RM_GENERATE_ERROR)))
6343 {
6344 eoinfo->failed = TRUE;
6345 return FALSE;
6346 }
6347 }
6348
6349 /* We should also warn if a forced local symbol is referenced from
6350 shared libraries. */
6351 if (! finfo->info->relocatable
6352 && (! finfo->info->shared)
f5385ebf
AM
6353 && h->forced_local
6354 && h->ref_dynamic
6355 && !h->dynamic_def
6356 && !h->dynamic_weak
c152c796
AM
6357 && ! elf_link_check_versioned_symbol (finfo->info, bed, h))
6358 {
6359 (*_bfd_error_handler)
d003868e
AM
6360 (_("%B: %s symbol `%s' in %B is referenced by DSO"),
6361 finfo->output_bfd, h->root.u.def.section->owner,
c152c796
AM
6362 ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
6363 ? "internal"
6364 : ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
d003868e
AM
6365 ? "hidden" : "local",
6366 h->root.root.string);
c152c796
AM
6367 eoinfo->failed = TRUE;
6368 return FALSE;
6369 }
6370
6371 /* We don't want to output symbols that have never been mentioned by
6372 a regular file, or that we have been told to strip. However, if
6373 h->indx is set to -2, the symbol is used by a reloc and we must
6374 output it. */
6375 if (h->indx == -2)
6376 strip = FALSE;
f5385ebf 6377 else if ((h->def_dynamic
77cfaee6
AM
6378 || h->ref_dynamic
6379 || h->root.type == bfd_link_hash_new)
f5385ebf
AM
6380 && !h->def_regular
6381 && !h->ref_regular)
c152c796
AM
6382 strip = TRUE;
6383 else if (finfo->info->strip == strip_all)
6384 strip = TRUE;
6385 else if (finfo->info->strip == strip_some
6386 && bfd_hash_lookup (finfo->info->keep_hash,
6387 h->root.root.string, FALSE, FALSE) == NULL)
6388 strip = TRUE;
6389 else if (finfo->info->strip_discarded
6390 && (h->root.type == bfd_link_hash_defined
6391 || h->root.type == bfd_link_hash_defweak)
6392 && elf_discarded_section (h->root.u.def.section))
6393 strip = TRUE;
6394 else
6395 strip = FALSE;
6396
6397 /* If we're stripping it, and it's not a dynamic symbol, there's
6398 nothing else to do unless it is a forced local symbol. */
6399 if (strip
6400 && h->dynindx == -1
f5385ebf 6401 && !h->forced_local)
c152c796
AM
6402 return TRUE;
6403
6404 sym.st_value = 0;
6405 sym.st_size = h->size;
6406 sym.st_other = h->other;
f5385ebf 6407 if (h->forced_local)
c152c796
AM
6408 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
6409 else if (h->root.type == bfd_link_hash_undefweak
6410 || h->root.type == bfd_link_hash_defweak)
6411 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
6412 else
6413 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
6414
6415 switch (h->root.type)
6416 {
6417 default:
6418 case bfd_link_hash_new:
6419 case bfd_link_hash_warning:
6420 abort ();
6421 return FALSE;
6422
6423 case bfd_link_hash_undefined:
6424 case bfd_link_hash_undefweak:
6425 input_sec = bfd_und_section_ptr;
6426 sym.st_shndx = SHN_UNDEF;
6427 break;
6428
6429 case bfd_link_hash_defined:
6430 case bfd_link_hash_defweak:
6431 {
6432 input_sec = h->root.u.def.section;
6433 if (input_sec->output_section != NULL)
6434 {
6435 sym.st_shndx =
6436 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
6437 input_sec->output_section);
6438 if (sym.st_shndx == SHN_BAD)
6439 {
6440 (*_bfd_error_handler)
d003868e
AM
6441 (_("%B: could not find output section %A for input section %A"),
6442 finfo->output_bfd, input_sec->output_section, input_sec);
c152c796
AM
6443 eoinfo->failed = TRUE;
6444 return FALSE;
6445 }
6446
6447 /* ELF symbols in relocatable files are section relative,
6448 but in nonrelocatable files they are virtual
6449 addresses. */
6450 sym.st_value = h->root.u.def.value + input_sec->output_offset;
6451 if (! finfo->info->relocatable)
6452 {
6453 sym.st_value += input_sec->output_section->vma;
6454 if (h->type == STT_TLS)
6455 {
6456 /* STT_TLS symbols are relative to PT_TLS segment
6457 base. */
6458 BFD_ASSERT (elf_hash_table (finfo->info)->tls_sec != NULL);
6459 sym.st_value -= elf_hash_table (finfo->info)->tls_sec->vma;
6460 }
6461 }
6462 }
6463 else
6464 {
6465 BFD_ASSERT (input_sec->owner == NULL
6466 || (input_sec->owner->flags & DYNAMIC) != 0);
6467 sym.st_shndx = SHN_UNDEF;
6468 input_sec = bfd_und_section_ptr;
6469 }
6470 }
6471 break;
6472
6473 case bfd_link_hash_common:
6474 input_sec = h->root.u.c.p->section;
6475 sym.st_shndx = SHN_COMMON;
6476 sym.st_value = 1 << h->root.u.c.p->alignment_power;
6477 break;
6478
6479 case bfd_link_hash_indirect:
6480 /* These symbols are created by symbol versioning. They point
6481 to the decorated version of the name. For example, if the
6482 symbol foo@@GNU_1.2 is the default, which should be used when
6483 foo is used with no version, then we add an indirect symbol
6484 foo which points to foo@@GNU_1.2. We ignore these symbols,
6485 since the indirected symbol is already in the hash table. */
6486 return TRUE;
6487 }
6488
6489 /* Give the processor backend a chance to tweak the symbol value,
6490 and also to finish up anything that needs to be done for this
6491 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
6492 forced local syms when non-shared is due to a historical quirk. */
6493 if ((h->dynindx != -1
f5385ebf 6494 || h->forced_local)
c152c796
AM
6495 && ((finfo->info->shared
6496 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
6497 || h->root.type != bfd_link_hash_undefweak))
f5385ebf 6498 || !h->forced_local)
c152c796
AM
6499 && elf_hash_table (finfo->info)->dynamic_sections_created)
6500 {
6501 if (! ((*bed->elf_backend_finish_dynamic_symbol)
6502 (finfo->output_bfd, finfo->info, h, &sym)))
6503 {
6504 eoinfo->failed = TRUE;
6505 return FALSE;
6506 }
6507 }
6508
6509 /* If we are marking the symbol as undefined, and there are no
6510 non-weak references to this symbol from a regular object, then
6511 mark the symbol as weak undefined; if there are non-weak
6512 references, mark the symbol as strong. We can't do this earlier,
6513 because it might not be marked as undefined until the
6514 finish_dynamic_symbol routine gets through with it. */
6515 if (sym.st_shndx == SHN_UNDEF
f5385ebf 6516 && h->ref_regular
c152c796
AM
6517 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
6518 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
6519 {
6520 int bindtype;
6521
f5385ebf 6522 if (h->ref_regular_nonweak)
c152c796
AM
6523 bindtype = STB_GLOBAL;
6524 else
6525 bindtype = STB_WEAK;
6526 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
6527 }
6528
6529 /* If a non-weak symbol with non-default visibility is not defined
6530 locally, it is a fatal error. */
6531 if (! finfo->info->relocatable
6532 && ELF_ST_VISIBILITY (sym.st_other) != STV_DEFAULT
6533 && ELF_ST_BIND (sym.st_info) != STB_WEAK
6534 && h->root.type == bfd_link_hash_undefined
f5385ebf 6535 && !h->def_regular)
c152c796
AM
6536 {
6537 (*_bfd_error_handler)
d003868e
AM
6538 (_("%B: %s symbol `%s' isn't defined"),
6539 finfo->output_bfd,
6540 ELF_ST_VISIBILITY (sym.st_other) == STV_PROTECTED
6541 ? "protected"
6542 : ELF_ST_VISIBILITY (sym.st_other) == STV_INTERNAL
6543 ? "internal" : "hidden",
6544 h->root.root.string);
c152c796
AM
6545 eoinfo->failed = TRUE;
6546 return FALSE;
6547 }
6548
6549 /* If this symbol should be put in the .dynsym section, then put it
6550 there now. We already know the symbol index. We also fill in
6551 the entry in the .hash section. */
6552 if (h->dynindx != -1
6553 && elf_hash_table (finfo->info)->dynamic_sections_created)
6554 {
6555 size_t bucketcount;
6556 size_t bucket;
6557 size_t hash_entry_size;
6558 bfd_byte *bucketpos;
6559 bfd_vma chain;
6560 bfd_byte *esym;
6561
6562 sym.st_name = h->dynstr_index;
6563 esym = finfo->dynsym_sec->contents + h->dynindx * bed->s->sizeof_sym;
6564 bed->s->swap_symbol_out (finfo->output_bfd, &sym, esym, 0);
6565
6566 bucketcount = elf_hash_table (finfo->info)->bucketcount;
f6e332e6 6567 bucket = h->u.elf_hash_value % bucketcount;
c152c796
AM
6568 hash_entry_size
6569 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
6570 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
6571 + (bucket + 2) * hash_entry_size);
6572 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
6573 bfd_put (8 * hash_entry_size, finfo->output_bfd, h->dynindx, bucketpos);
6574 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
6575 ((bfd_byte *) finfo->hash_sec->contents
6576 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
6577
6578 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
6579 {
6580 Elf_Internal_Versym iversym;
6581 Elf_External_Versym *eversym;
6582
f5385ebf 6583 if (!h->def_regular)
c152c796
AM
6584 {
6585 if (h->verinfo.verdef == NULL)
6586 iversym.vs_vers = 0;
6587 else
6588 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
6589 }
6590 else
6591 {
6592 if (h->verinfo.vertree == NULL)
6593 iversym.vs_vers = 1;
6594 else
6595 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
3e3b46e5
PB
6596 if (finfo->info->create_default_symver)
6597 iversym.vs_vers++;
c152c796
AM
6598 }
6599
f5385ebf 6600 if (h->hidden)
c152c796
AM
6601 iversym.vs_vers |= VERSYM_HIDDEN;
6602
6603 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
6604 eversym += h->dynindx;
6605 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
6606 }
6607 }
6608
6609 /* If we're stripping it, then it was just a dynamic symbol, and
6610 there's nothing else to do. */
6611 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
6612 return TRUE;
6613
6614 h->indx = bfd_get_symcount (finfo->output_bfd);
6615
6616 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec, h))
6617 {
6618 eoinfo->failed = TRUE;
6619 return FALSE;
6620 }
6621
6622 return TRUE;
6623}
6624
cdd3575c
AM
6625/* Return TRUE if special handling is done for relocs in SEC against
6626 symbols defined in discarded sections. */
6627
c152c796
AM
6628static bfd_boolean
6629elf_section_ignore_discarded_relocs (asection *sec)
6630{
6631 const struct elf_backend_data *bed;
6632
cdd3575c
AM
6633 switch (sec->sec_info_type)
6634 {
6635 case ELF_INFO_TYPE_STABS:
6636 case ELF_INFO_TYPE_EH_FRAME:
6637 return TRUE;
6638 default:
6639 break;
6640 }
c152c796
AM
6641
6642 bed = get_elf_backend_data (sec->owner);
6643 if (bed->elf_backend_ignore_discarded_relocs != NULL
6644 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
6645 return TRUE;
6646
6647 return FALSE;
6648}
6649
9e66c942
AM
6650enum action_discarded
6651 {
6652 COMPLAIN = 1,
6653 PRETEND = 2
6654 };
6655
6656/* Return a mask saying how ld should treat relocations in SEC against
6657 symbols defined in discarded sections. If this function returns
6658 COMPLAIN set, ld will issue a warning message. If this function
6659 returns PRETEND set, and the discarded section was link-once and the
6660 same size as the kept link-once section, ld will pretend that the
6661 symbol was actually defined in the kept section. Otherwise ld will
6662 zero the reloc (at least that is the intent, but some cooperation by
6663 the target dependent code is needed, particularly for REL targets). */
6664
6665static unsigned int
6666elf_action_discarded (asection *sec)
cdd3575c 6667{
9e66c942
AM
6668 if (sec->flags & SEC_DEBUGGING)
6669 return PRETEND;
cdd3575c
AM
6670
6671 if (strcmp (".eh_frame", sec->name) == 0)
9e66c942 6672 return 0;
cdd3575c
AM
6673
6674 if (strcmp (".gcc_except_table", sec->name) == 0)
9e66c942 6675 return 0;
cdd3575c 6676
27b56da8 6677 if (strcmp (".PARISC.unwind", sec->name) == 0)
9e66c942 6678 return 0;
327c1315
AM
6679
6680 if (strcmp (".fixup", sec->name) == 0)
9e66c942 6681 return 0;
27b56da8 6682
9e66c942 6683 return COMPLAIN | PRETEND;
cdd3575c
AM
6684}
6685
3d7f7666
L
6686/* Find a match between a section and a member of a section group. */
6687
6688static asection *
6689match_group_member (asection *sec, asection *group)
6690{
6691 asection *first = elf_next_in_group (group);
6692 asection *s = first;
6693
6694 while (s != NULL)
6695 {
6696 if (bfd_elf_match_symbols_in_sections (s, sec))
6697 return s;
6698
6699 if (s == first)
6700 break;
6701 }
6702
6703 return NULL;
6704}
6705
01b3c8ab
L
6706/* Check if the kept section of a discarded section SEC can be used
6707 to replace it. Return the replacement if it is OK. Otherwise return
6708 NULL. */
6709
6710asection *
6711_bfd_elf_check_kept_section (asection *sec)
6712{
6713 asection *kept;
6714
6715 kept = sec->kept_section;
6716 if (kept != NULL)
6717 {
6718 if (elf_sec_group (sec) != NULL)
6719 kept = match_group_member (sec, kept);
6720 if (kept != NULL && sec->size != kept->size)
6721 kept = NULL;
6722 }
6723 return kept;
6724}
6725
c152c796
AM
6726/* Link an input file into the linker output file. This function
6727 handles all the sections and relocations of the input file at once.
6728 This is so that we only have to read the local symbols once, and
6729 don't have to keep them in memory. */
6730
6731static bfd_boolean
6732elf_link_input_bfd (struct elf_final_link_info *finfo, bfd *input_bfd)
6733{
6734 bfd_boolean (*relocate_section)
6735 (bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
6736 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **);
6737 bfd *output_bfd;
6738 Elf_Internal_Shdr *symtab_hdr;
6739 size_t locsymcount;
6740 size_t extsymoff;
6741 Elf_Internal_Sym *isymbuf;
6742 Elf_Internal_Sym *isym;
6743 Elf_Internal_Sym *isymend;
6744 long *pindex;
6745 asection **ppsection;
6746 asection *o;
6747 const struct elf_backend_data *bed;
6748 bfd_boolean emit_relocs;
6749 struct elf_link_hash_entry **sym_hashes;
6750
6751 output_bfd = finfo->output_bfd;
6752 bed = get_elf_backend_data (output_bfd);
6753 relocate_section = bed->elf_backend_relocate_section;
6754
6755 /* If this is a dynamic object, we don't want to do anything here:
6756 we don't want the local symbols, and we don't want the section
6757 contents. */
6758 if ((input_bfd->flags & DYNAMIC) != 0)
6759 return TRUE;
6760
6761 emit_relocs = (finfo->info->relocatable
6762 || finfo->info->emitrelocations
6763 || bed->elf_backend_emit_relocs);
6764
6765 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6766 if (elf_bad_symtab (input_bfd))
6767 {
6768 locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
6769 extsymoff = 0;
6770 }
6771 else
6772 {
6773 locsymcount = symtab_hdr->sh_info;
6774 extsymoff = symtab_hdr->sh_info;
6775 }
6776
6777 /* Read the local symbols. */
6778 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6779 if (isymbuf == NULL && locsymcount != 0)
6780 {
6781 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6782 finfo->internal_syms,
6783 finfo->external_syms,
6784 finfo->locsym_shndx);
6785 if (isymbuf == NULL)
6786 return FALSE;
6787 }
6788
6789 /* Find local symbol sections and adjust values of symbols in
6790 SEC_MERGE sections. Write out those local symbols we know are
6791 going into the output file. */
6792 isymend = isymbuf + locsymcount;
6793 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
6794 isym < isymend;
6795 isym++, pindex++, ppsection++)
6796 {
6797 asection *isec;
6798 const char *name;
6799 Elf_Internal_Sym osym;
6800
6801 *pindex = -1;
6802
6803 if (elf_bad_symtab (input_bfd))
6804 {
6805 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
6806 {
6807 *ppsection = NULL;
6808 continue;
6809 }
6810 }
6811
6812 if (isym->st_shndx == SHN_UNDEF)
6813 isec = bfd_und_section_ptr;
6814 else if (isym->st_shndx < SHN_LORESERVE
6815 || isym->st_shndx > SHN_HIRESERVE)
6816 {
6817 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
6818 if (isec
6819 && isec->sec_info_type == ELF_INFO_TYPE_MERGE
6820 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
6821 isym->st_value =
6822 _bfd_merged_section_offset (output_bfd, &isec,
6823 elf_section_data (isec)->sec_info,
753731ee 6824 isym->st_value);
c152c796
AM
6825 }
6826 else if (isym->st_shndx == SHN_ABS)
6827 isec = bfd_abs_section_ptr;
6828 else if (isym->st_shndx == SHN_COMMON)
6829 isec = bfd_com_section_ptr;
6830 else
6831 {
6832 /* Who knows? */
6833 isec = NULL;
6834 }
6835
6836 *ppsection = isec;
6837
6838 /* Don't output the first, undefined, symbol. */
6839 if (ppsection == finfo->sections)
6840 continue;
6841
6842 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
6843 {
6844 /* We never output section symbols. Instead, we use the
6845 section symbol of the corresponding section in the output
6846 file. */
6847 continue;
6848 }
6849
6850 /* If we are stripping all symbols, we don't want to output this
6851 one. */
6852 if (finfo->info->strip == strip_all)
6853 continue;
6854
6855 /* If we are discarding all local symbols, we don't want to
6856 output this one. If we are generating a relocatable output
6857 file, then some of the local symbols may be required by
6858 relocs; we output them below as we discover that they are
6859 needed. */
6860 if (finfo->info->discard == discard_all)
6861 continue;
6862
6863 /* If this symbol is defined in a section which we are
6864 discarding, we don't need to keep it, but note that
6865 linker_mark is only reliable for sections that have contents.
6866 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
6867 as well as linker_mark. */
6868 if ((isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
ccf5f610
PB
6869 && (isec == NULL
6870 || (! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
c152c796
AM
6871 || (! finfo->info->relocatable
6872 && (isec->flags & SEC_EXCLUDE) != 0)))
6873 continue;
6874
e75a280b
L
6875 /* If the section is not in the output BFD's section list, it is not
6876 being output. */
6877 if (bfd_section_removed_from_list (output_bfd, isec->output_section))
6878 continue;
6879
c152c796
AM
6880 /* Get the name of the symbol. */
6881 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
6882 isym->st_name);
6883 if (name == NULL)
6884 return FALSE;
6885
6886 /* See if we are discarding symbols with this name. */
6887 if ((finfo->info->strip == strip_some
6888 && (bfd_hash_lookup (finfo->info->keep_hash, name, FALSE, FALSE)
6889 == NULL))
6890 || (((finfo->info->discard == discard_sec_merge
6891 && (isec->flags & SEC_MERGE) && ! finfo->info->relocatable)
6892 || finfo->info->discard == discard_l)
6893 && bfd_is_local_label_name (input_bfd, name)))
6894 continue;
6895
6896 /* If we get here, we are going to output this symbol. */
6897
6898 osym = *isym;
6899
6900 /* Adjust the section index for the output file. */
6901 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
6902 isec->output_section);
6903 if (osym.st_shndx == SHN_BAD)
6904 return FALSE;
6905
6906 *pindex = bfd_get_symcount (output_bfd);
6907
6908 /* ELF symbols in relocatable files are section relative, but
6909 in executable files they are virtual addresses. Note that
6910 this code assumes that all ELF sections have an associated
6911 BFD section with a reasonable value for output_offset; below
6912 we assume that they also have a reasonable value for
6913 output_section. Any special sections must be set up to meet
6914 these requirements. */
6915 osym.st_value += isec->output_offset;
6916 if (! finfo->info->relocatable)
6917 {
6918 osym.st_value += isec->output_section->vma;
6919 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
6920 {
6921 /* STT_TLS symbols are relative to PT_TLS segment base. */
6922 BFD_ASSERT (elf_hash_table (finfo->info)->tls_sec != NULL);
6923 osym.st_value -= elf_hash_table (finfo->info)->tls_sec->vma;
6924 }
6925 }
6926
6927 if (! elf_link_output_sym (finfo, name, &osym, isec, NULL))
6928 return FALSE;
6929 }
6930
6931 /* Relocate the contents of each section. */
6932 sym_hashes = elf_sym_hashes (input_bfd);
6933 for (o = input_bfd->sections; o != NULL; o = o->next)
6934 {
6935 bfd_byte *contents;
6936
6937 if (! o->linker_mark)
6938 {
6939 /* This section was omitted from the link. */
6940 continue;
6941 }
6942
6943 if ((o->flags & SEC_HAS_CONTENTS) == 0
eea6121a 6944 || (o->size == 0 && (o->flags & SEC_RELOC) == 0))
c152c796
AM
6945 continue;
6946
6947 if ((o->flags & SEC_LINKER_CREATED) != 0)
6948 {
6949 /* Section was created by _bfd_elf_link_create_dynamic_sections
6950 or somesuch. */
6951 continue;
6952 }
6953
6954 /* Get the contents of the section. They have been cached by a
6955 relaxation routine. Note that o is a section in an input
6956 file, so the contents field will not have been set by any of
6957 the routines which work on output files. */
6958 if (elf_section_data (o)->this_hdr.contents != NULL)
6959 contents = elf_section_data (o)->this_hdr.contents;
6960 else
6961 {
eea6121a
AM
6962 bfd_size_type amt = o->rawsize ? o->rawsize : o->size;
6963
c152c796 6964 contents = finfo->contents;
eea6121a 6965 if (! bfd_get_section_contents (input_bfd, o, contents, 0, amt))
c152c796
AM
6966 return FALSE;
6967 }
6968
6969 if ((o->flags & SEC_RELOC) != 0)
6970 {
6971 Elf_Internal_Rela *internal_relocs;
6972 bfd_vma r_type_mask;
6973 int r_sym_shift;
6974
6975 /* Get the swapped relocs. */
6976 internal_relocs
6977 = _bfd_elf_link_read_relocs (input_bfd, o, finfo->external_relocs,
6978 finfo->internal_relocs, FALSE);
6979 if (internal_relocs == NULL
6980 && o->reloc_count > 0)
6981 return FALSE;
6982
6983 if (bed->s->arch_size == 32)
6984 {
6985 r_type_mask = 0xff;
6986 r_sym_shift = 8;
6987 }
6988 else
6989 {
6990 r_type_mask = 0xffffffff;
6991 r_sym_shift = 32;
6992 }
6993
6994 /* Run through the relocs looking for any against symbols
6995 from discarded sections and section symbols from
6996 removed link-once sections. Complain about relocs
6997 against discarded sections. Zero relocs against removed
6998 link-once sections. Preserve debug information as much
6999 as we can. */
7000 if (!elf_section_ignore_discarded_relocs (o))
7001 {
7002 Elf_Internal_Rela *rel, *relend;
9e66c942 7003 unsigned int action = elf_action_discarded (o);
c152c796
AM
7004
7005 rel = internal_relocs;
7006 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
7007 for ( ; rel < relend; rel++)
7008 {
7009 unsigned long r_symndx = rel->r_info >> r_sym_shift;
cdd3575c
AM
7010 asection **ps, *sec;
7011 struct elf_link_hash_entry *h = NULL;
7012 const char *sym_name;
c152c796 7013
ee75fd95
AM
7014 if (r_symndx == STN_UNDEF)
7015 continue;
7016
c152c796
AM
7017 if (r_symndx >= locsymcount
7018 || (elf_bad_symtab (input_bfd)
7019 && finfo->sections[r_symndx] == NULL))
7020 {
c152c796 7021 h = sym_hashes[r_symndx - extsymoff];
dce669a1 7022
8c19749a
NC
7023 /* Badly formatted input files can contain relocs that
7024 reference non-existant symbols. Check here so that
7025 we do not seg fault. */
7026 if (h == NULL)
7027 {
7028 char buffer [32];
7029
7030 sprintf_vma (buffer, rel->r_info);
7031 (*_bfd_error_handler)
7032 (_("error: %B contains a reloc (0x%s) for section %A "
7033 "that references a non-existent global symbol"),
7034 input_bfd, o, buffer);
7035 bfd_set_error (bfd_error_bad_value);
7036 return FALSE;
7037 }
7038
c152c796
AM
7039 while (h->root.type == bfd_link_hash_indirect
7040 || h->root.type == bfd_link_hash_warning)
7041 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7042
cdd3575c
AM
7043 if (h->root.type != bfd_link_hash_defined
7044 && h->root.type != bfd_link_hash_defweak)
7045 continue;
7046
7047 ps = &h->root.u.def.section;
7048 sym_name = h->root.root.string;
c152c796
AM
7049 }
7050 else
7051 {
cdd3575c
AM
7052 Elf_Internal_Sym *sym = isymbuf + r_symndx;
7053 ps = &finfo->sections[r_symndx];
be8dd2ca 7054 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym);
cdd3575c 7055 }
c152c796 7056
cdd3575c
AM
7057 /* Complain if the definition comes from a
7058 discarded section. */
7059 if ((sec = *ps) != NULL && elf_discarded_section (sec))
7060 {
87e5235d 7061 BFD_ASSERT (r_symndx != 0);
9e66c942 7062 if (action & COMPLAIN)
cdd3575c 7063 {
d003868e
AM
7064 (*_bfd_error_handler)
7065 (_("`%s' referenced in section `%A' of %B: "
c93625e2 7066 "defined in discarded section `%A' of %B"),
d003868e 7067 o, input_bfd, sec, sec->owner, sym_name);
6d633fd2
L
7068 bfd_set_error (bfd_error_bad_value);
7069 return FALSE;
cdd3575c
AM
7070 }
7071
87e5235d
AM
7072 /* Try to do the best we can to support buggy old
7073 versions of gcc. If we've warned, or this is
7074 debugging info, pretend that the symbol is
7075 really defined in the kept linkonce section.
7076 FIXME: This is quite broken. Modifying the
7077 symbol here means we will be changing all later
7078 uses of the symbol, not just in this section.
7079 The only thing that makes this half reasonable
7080 is that we warn in non-debug sections, and
7081 debug sections tend to come after other
7082 sections. */
01b3c8ab 7083 if (action & PRETEND)
87e5235d 7084 {
01b3c8ab
L
7085 asection *kept;
7086
7087 kept = _bfd_elf_check_kept_section (sec);
7088 if (kept != NULL)
87e5235d
AM
7089 {
7090 *ps = kept;
7091 continue;
7092 }
7093 }
7094
cdd3575c
AM
7095 /* Remove the symbol reference from the reloc, but
7096 don't kill the reloc completely. This is so that
7097 a zero value will be written into the section,
7098 which may have non-zero contents put there by the
7099 assembler. Zero in things like an eh_frame fde
7100 pc_begin allows stack unwinders to recognize the
7101 fde as bogus. */
7102 rel->r_info &= r_type_mask;
7103 rel->r_addend = 0;
c152c796
AM
7104 }
7105 }
7106 }
7107
7108 /* Relocate the section by invoking a back end routine.
7109
7110 The back end routine is responsible for adjusting the
7111 section contents as necessary, and (if using Rela relocs
7112 and generating a relocatable output file) adjusting the
7113 reloc addend as necessary.
7114
7115 The back end routine does not have to worry about setting
7116 the reloc address or the reloc symbol index.
7117
7118 The back end routine is given a pointer to the swapped in
7119 internal symbols, and can access the hash table entries
7120 for the external symbols via elf_sym_hashes (input_bfd).
7121
7122 When generating relocatable output, the back end routine
7123 must handle STB_LOCAL/STT_SECTION symbols specially. The
7124 output symbol is going to be a section symbol
7125 corresponding to the output section, which will require
7126 the addend to be adjusted. */
7127
7128 if (! (*relocate_section) (output_bfd, finfo->info,
7129 input_bfd, o, contents,
7130 internal_relocs,
7131 isymbuf,
7132 finfo->sections))
7133 return FALSE;
7134
7135 if (emit_relocs)
7136 {
7137 Elf_Internal_Rela *irela;
7138 Elf_Internal_Rela *irelaend;
7139 bfd_vma last_offset;
7140 struct elf_link_hash_entry **rel_hash;
7141 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
7142 unsigned int next_erel;
7143 bfd_boolean (*reloc_emitter)
7144 (bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *);
7145 bfd_boolean rela_normal;
7146
7147 input_rel_hdr = &elf_section_data (o)->rel_hdr;
7148 rela_normal = (bed->rela_normal
7149 && (input_rel_hdr->sh_entsize
7150 == bed->s->sizeof_rela));
7151
7152 /* Adjust the reloc addresses and symbol indices. */
7153
7154 irela = internal_relocs;
7155 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
7156 rel_hash = (elf_section_data (o->output_section)->rel_hashes
7157 + elf_section_data (o->output_section)->rel_count
7158 + elf_section_data (o->output_section)->rel_count2);
7159 last_offset = o->output_offset;
7160 if (!finfo->info->relocatable)
7161 last_offset += o->output_section->vma;
7162 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
7163 {
7164 unsigned long r_symndx;
7165 asection *sec;
7166 Elf_Internal_Sym sym;
7167
7168 if (next_erel == bed->s->int_rels_per_ext_rel)
7169 {
7170 rel_hash++;
7171 next_erel = 0;
7172 }
7173
7174 irela->r_offset = _bfd_elf_section_offset (output_bfd,
7175 finfo->info, o,
7176 irela->r_offset);
7177 if (irela->r_offset >= (bfd_vma) -2)
7178 {
7179 /* This is a reloc for a deleted entry or somesuch.
7180 Turn it into an R_*_NONE reloc, at the same
7181 offset as the last reloc. elf_eh_frame.c and
7182 elf_bfd_discard_info rely on reloc offsets
7183 being ordered. */
7184 irela->r_offset = last_offset;
7185 irela->r_info = 0;
7186 irela->r_addend = 0;
7187 continue;
7188 }
7189
7190 irela->r_offset += o->output_offset;
7191
7192 /* Relocs in an executable have to be virtual addresses. */
7193 if (!finfo->info->relocatable)
7194 irela->r_offset += o->output_section->vma;
7195
7196 last_offset = irela->r_offset;
7197
7198 r_symndx = irela->r_info >> r_sym_shift;
7199 if (r_symndx == STN_UNDEF)
7200 continue;
7201
7202 if (r_symndx >= locsymcount
7203 || (elf_bad_symtab (input_bfd)
7204 && finfo->sections[r_symndx] == NULL))
7205 {
7206 struct elf_link_hash_entry *rh;
7207 unsigned long indx;
7208
7209 /* This is a reloc against a global symbol. We
7210 have not yet output all the local symbols, so
7211 we do not know the symbol index of any global
7212 symbol. We set the rel_hash entry for this
7213 reloc to point to the global hash table entry
7214 for this symbol. The symbol index is then
ee75fd95 7215 set at the end of bfd_elf_final_link. */
c152c796
AM
7216 indx = r_symndx - extsymoff;
7217 rh = elf_sym_hashes (input_bfd)[indx];
7218 while (rh->root.type == bfd_link_hash_indirect
7219 || rh->root.type == bfd_link_hash_warning)
7220 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
7221
7222 /* Setting the index to -2 tells
7223 elf_link_output_extsym that this symbol is
7224 used by a reloc. */
7225 BFD_ASSERT (rh->indx < 0);
7226 rh->indx = -2;
7227
7228 *rel_hash = rh;
7229
7230 continue;
7231 }
7232
7233 /* This is a reloc against a local symbol. */
7234
7235 *rel_hash = NULL;
7236 sym = isymbuf[r_symndx];
7237 sec = finfo->sections[r_symndx];
7238 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
7239 {
7240 /* I suppose the backend ought to fill in the
7241 section of any STT_SECTION symbol against a
6a8d1586
AM
7242 processor specific section. */
7243 r_symndx = 0;
7244 if (bfd_is_abs_section (sec))
7245 ;
c152c796
AM
7246 else if (sec == NULL || sec->owner == NULL)
7247 {
7248 bfd_set_error (bfd_error_bad_value);
7249 return FALSE;
7250 }
7251 else
7252 {
6a8d1586
AM
7253 asection *osec = sec->output_section;
7254
7255 /* If we have discarded a section, the output
7256 section will be the absolute section. In
7257 case of discarded link-once and discarded
7258 SEC_MERGE sections, use the kept section. */
7259 if (bfd_is_abs_section (osec)
7260 && sec->kept_section != NULL
7261 && sec->kept_section->output_section != NULL)
7262 {
7263 osec = sec->kept_section->output_section;
7264 irela->r_addend -= osec->vma;
7265 }
7266
7267 if (!bfd_is_abs_section (osec))
7268 {
7269 r_symndx = osec->target_index;
7270 BFD_ASSERT (r_symndx != 0);
7271 }
c152c796
AM
7272 }
7273
7274 /* Adjust the addend according to where the
7275 section winds up in the output section. */
7276 if (rela_normal)
7277 irela->r_addend += sec->output_offset;
7278 }
7279 else
7280 {
7281 if (finfo->indices[r_symndx] == -1)
7282 {
7283 unsigned long shlink;
7284 const char *name;
7285 asection *osec;
7286
7287 if (finfo->info->strip == strip_all)
7288 {
7289 /* You can't do ld -r -s. */
7290 bfd_set_error (bfd_error_invalid_operation);
7291 return FALSE;
7292 }
7293
7294 /* This symbol was skipped earlier, but
7295 since it is needed by a reloc, we
7296 must output it now. */
7297 shlink = symtab_hdr->sh_link;
7298 name = (bfd_elf_string_from_elf_section
7299 (input_bfd, shlink, sym.st_name));
7300 if (name == NULL)
7301 return FALSE;
7302
7303 osec = sec->output_section;
7304 sym.st_shndx =
7305 _bfd_elf_section_from_bfd_section (output_bfd,
7306 osec);
7307 if (sym.st_shndx == SHN_BAD)
7308 return FALSE;
7309
7310 sym.st_value += sec->output_offset;
7311 if (! finfo->info->relocatable)
7312 {
7313 sym.st_value += osec->vma;
7314 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
7315 {
7316 /* STT_TLS symbols are relative to PT_TLS
7317 segment base. */
7318 BFD_ASSERT (elf_hash_table (finfo->info)
7319 ->tls_sec != NULL);
7320 sym.st_value -= (elf_hash_table (finfo->info)
7321 ->tls_sec->vma);
7322 }
7323 }
7324
7325 finfo->indices[r_symndx]
7326 = bfd_get_symcount (output_bfd);
7327
7328 if (! elf_link_output_sym (finfo, name, &sym, sec,
7329 NULL))
7330 return FALSE;
7331 }
7332
7333 r_symndx = finfo->indices[r_symndx];
7334 }
7335
7336 irela->r_info = ((bfd_vma) r_symndx << r_sym_shift
7337 | (irela->r_info & r_type_mask));
7338 }
7339
7340 /* Swap out the relocs. */
7341 if (bed->elf_backend_emit_relocs
7342 && !(finfo->info->relocatable
7343 || finfo->info->emitrelocations))
7344 reloc_emitter = bed->elf_backend_emit_relocs;
7345 else
7346 reloc_emitter = _bfd_elf_link_output_relocs;
7347
7348 if (input_rel_hdr->sh_size != 0
7349 && ! (*reloc_emitter) (output_bfd, o, input_rel_hdr,
7350 internal_relocs))
7351 return FALSE;
7352
7353 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
7354 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
7355 {
7356 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
7357 * bed->s->int_rels_per_ext_rel);
7358 if (! (*reloc_emitter) (output_bfd, o, input_rel_hdr2,
7359 internal_relocs))
7360 return FALSE;
7361 }
7362 }
7363 }
7364
7365 /* Write out the modified section contents. */
7366 if (bed->elf_backend_write_section
7367 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
7368 {
7369 /* Section written out. */
7370 }
7371 else switch (o->sec_info_type)
7372 {
7373 case ELF_INFO_TYPE_STABS:
7374 if (! (_bfd_write_section_stabs
7375 (output_bfd,
7376 &elf_hash_table (finfo->info)->stab_info,
7377 o, &elf_section_data (o)->sec_info, contents)))
7378 return FALSE;
7379 break;
7380 case ELF_INFO_TYPE_MERGE:
7381 if (! _bfd_write_merged_section (output_bfd, o,
7382 elf_section_data (o)->sec_info))
7383 return FALSE;
7384 break;
7385 case ELF_INFO_TYPE_EH_FRAME:
7386 {
7387 if (! _bfd_elf_write_section_eh_frame (output_bfd, finfo->info,
7388 o, contents))
7389 return FALSE;
7390 }
7391 break;
7392 default:
7393 {
c152c796
AM
7394 if (! (o->flags & SEC_EXCLUDE)
7395 && ! bfd_set_section_contents (output_bfd, o->output_section,
7396 contents,
7397 (file_ptr) o->output_offset,
eea6121a 7398 o->size))
c152c796
AM
7399 return FALSE;
7400 }
7401 break;
7402 }
7403 }
7404
7405 return TRUE;
7406}
7407
7408/* Generate a reloc when linking an ELF file. This is a reloc
7409 requested by the linker, and does come from any input file. This
7410 is used to build constructor and destructor tables when linking
7411 with -Ur. */
7412
7413static bfd_boolean
7414elf_reloc_link_order (bfd *output_bfd,
7415 struct bfd_link_info *info,
7416 asection *output_section,
7417 struct bfd_link_order *link_order)
7418{
7419 reloc_howto_type *howto;
7420 long indx;
7421 bfd_vma offset;
7422 bfd_vma addend;
7423 struct elf_link_hash_entry **rel_hash_ptr;
7424 Elf_Internal_Shdr *rel_hdr;
7425 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7426 Elf_Internal_Rela irel[MAX_INT_RELS_PER_EXT_REL];
7427 bfd_byte *erel;
7428 unsigned int i;
7429
7430 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
7431 if (howto == NULL)
7432 {
7433 bfd_set_error (bfd_error_bad_value);
7434 return FALSE;
7435 }
7436
7437 addend = link_order->u.reloc.p->addend;
7438
7439 /* Figure out the symbol index. */
7440 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
7441 + elf_section_data (output_section)->rel_count
7442 + elf_section_data (output_section)->rel_count2);
7443 if (link_order->type == bfd_section_reloc_link_order)
7444 {
7445 indx = link_order->u.reloc.p->u.section->target_index;
7446 BFD_ASSERT (indx != 0);
7447 *rel_hash_ptr = NULL;
7448 }
7449 else
7450 {
7451 struct elf_link_hash_entry *h;
7452
7453 /* Treat a reloc against a defined symbol as though it were
7454 actually against the section. */
7455 h = ((struct elf_link_hash_entry *)
7456 bfd_wrapped_link_hash_lookup (output_bfd, info,
7457 link_order->u.reloc.p->u.name,
7458 FALSE, FALSE, TRUE));
7459 if (h != NULL
7460 && (h->root.type == bfd_link_hash_defined
7461 || h->root.type == bfd_link_hash_defweak))
7462 {
7463 asection *section;
7464
7465 section = h->root.u.def.section;
7466 indx = section->output_section->target_index;
7467 *rel_hash_ptr = NULL;
7468 /* It seems that we ought to add the symbol value to the
7469 addend here, but in practice it has already been added
7470 because it was passed to constructor_callback. */
7471 addend += section->output_section->vma + section->output_offset;
7472 }
7473 else if (h != NULL)
7474 {
7475 /* Setting the index to -2 tells elf_link_output_extsym that
7476 this symbol is used by a reloc. */
7477 h->indx = -2;
7478 *rel_hash_ptr = h;
7479 indx = 0;
7480 }
7481 else
7482 {
7483 if (! ((*info->callbacks->unattached_reloc)
7484 (info, link_order->u.reloc.p->u.name, NULL, NULL, 0)))
7485 return FALSE;
7486 indx = 0;
7487 }
7488 }
7489
7490 /* If this is an inplace reloc, we must write the addend into the
7491 object file. */
7492 if (howto->partial_inplace && addend != 0)
7493 {
7494 bfd_size_type size;
7495 bfd_reloc_status_type rstat;
7496 bfd_byte *buf;
7497 bfd_boolean ok;
7498 const char *sym_name;
7499
7500 size = bfd_get_reloc_size (howto);
7501 buf = bfd_zmalloc (size);
7502 if (buf == NULL)
7503 return FALSE;
7504 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
7505 switch (rstat)
7506 {
7507 case bfd_reloc_ok:
7508 break;
7509
7510 default:
7511 case bfd_reloc_outofrange:
7512 abort ();
7513
7514 case bfd_reloc_overflow:
7515 if (link_order->type == bfd_section_reloc_link_order)
7516 sym_name = bfd_section_name (output_bfd,
7517 link_order->u.reloc.p->u.section);
7518 else
7519 sym_name = link_order->u.reloc.p->u.name;
7520 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
7521 (info, NULL, sym_name, howto->name, addend, NULL,
7522 NULL, (bfd_vma) 0)))
c152c796
AM
7523 {
7524 free (buf);
7525 return FALSE;
7526 }
7527 break;
7528 }
7529 ok = bfd_set_section_contents (output_bfd, output_section, buf,
7530 link_order->offset, size);
7531 free (buf);
7532 if (! ok)
7533 return FALSE;
7534 }
7535
7536 /* The address of a reloc is relative to the section in a
7537 relocatable file, and is a virtual address in an executable
7538 file. */
7539 offset = link_order->offset;
7540 if (! info->relocatable)
7541 offset += output_section->vma;
7542
7543 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7544 {
7545 irel[i].r_offset = offset;
7546 irel[i].r_info = 0;
7547 irel[i].r_addend = 0;
7548 }
7549 if (bed->s->arch_size == 32)
7550 irel[0].r_info = ELF32_R_INFO (indx, howto->type);
7551 else
7552 irel[0].r_info = ELF64_R_INFO (indx, howto->type);
7553
7554 rel_hdr = &elf_section_data (output_section)->rel_hdr;
7555 erel = rel_hdr->contents;
7556 if (rel_hdr->sh_type == SHT_REL)
7557 {
7558 erel += (elf_section_data (output_section)->rel_count
7559 * bed->s->sizeof_rel);
7560 (*bed->s->swap_reloc_out) (output_bfd, irel, erel);
7561 }
7562 else
7563 {
7564 irel[0].r_addend = addend;
7565 erel += (elf_section_data (output_section)->rel_count
7566 * bed->s->sizeof_rela);
7567 (*bed->s->swap_reloca_out) (output_bfd, irel, erel);
7568 }
7569
7570 ++elf_section_data (output_section)->rel_count;
7571
7572 return TRUE;
7573}
7574
0b52efa6
PB
7575
7576/* Get the output vma of the section pointed to by the sh_link field. */
7577
7578static bfd_vma
7579elf_get_linked_section_vma (struct bfd_link_order *p)
7580{
7581 Elf_Internal_Shdr **elf_shdrp;
7582 asection *s;
7583 int elfsec;
7584
7585 s = p->u.indirect.section;
7586 elf_shdrp = elf_elfsections (s->owner);
7587 elfsec = _bfd_elf_section_from_bfd_section (s->owner, s);
7588 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
7589 /* PR 290:
7590 The Intel C compiler generates SHT_IA_64_UNWIND with
7591 SHF_LINK_ORDER. But it doesn't set theh sh_link or
7592 sh_info fields. Hence we could get the situation
7593 where elfsec is 0. */
7594 if (elfsec == 0)
7595 {
7596 const struct elf_backend_data *bed
7597 = get_elf_backend_data (s->owner);
7598 if (bed->link_order_error_handler)
d003868e
AM
7599 bed->link_order_error_handler
7600 (_("%B: warning: sh_link not set for section `%A'"), s->owner, s);
185d09ad
L
7601 return 0;
7602 }
7603 else
7604 {
7605 s = elf_shdrp[elfsec]->bfd_section;
7606 return s->output_section->vma + s->output_offset;
7607 }
0b52efa6
PB
7608}
7609
7610
7611/* Compare two sections based on the locations of the sections they are
7612 linked to. Used by elf_fixup_link_order. */
7613
7614static int
7615compare_link_order (const void * a, const void * b)
7616{
7617 bfd_vma apos;
7618 bfd_vma bpos;
7619
7620 apos = elf_get_linked_section_vma (*(struct bfd_link_order **)a);
7621 bpos = elf_get_linked_section_vma (*(struct bfd_link_order **)b);
7622 if (apos < bpos)
7623 return -1;
7624 return apos > bpos;
7625}
7626
7627
7628/* Looks for sections with SHF_LINK_ORDER set. Rearranges them into the same
7629 order as their linked sections. Returns false if this could not be done
7630 because an output section includes both ordered and unordered
7631 sections. Ideally we'd do this in the linker proper. */
7632
7633static bfd_boolean
7634elf_fixup_link_order (bfd *abfd, asection *o)
7635{
7636 int seen_linkorder;
7637 int seen_other;
7638 int n;
7639 struct bfd_link_order *p;
7640 bfd *sub;
7641 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7642 int elfsec;
7643 struct bfd_link_order **sections;
7644 asection *s;
7645 bfd_vma offset;
7646
7647 seen_other = 0;
7648 seen_linkorder = 0;
7649 for (p = o->link_order_head; p != NULL; p = p->next)
7650 {
7651 if (p->type == bfd_indirect_link_order
7652 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
7653 == bfd_target_elf_flavour)
7654 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
7655 {
7656 s = p->u.indirect.section;
7657 elfsec = _bfd_elf_section_from_bfd_section (sub, s);
7658 if (elfsec != -1
7659 && elf_elfsections (sub)[elfsec]->sh_flags & SHF_LINK_ORDER)
7660 seen_linkorder++;
7661 else
7662 seen_other++;
7663 }
7664 else
7665 seen_other++;
7666 }
7667
7668 if (!seen_linkorder)
7669 return TRUE;
7670
7671 if (seen_other && seen_linkorder)
08ccf96b 7672 {
d003868e
AM
7673 (*_bfd_error_handler) (_("%A has both ordered and unordered sections"),
7674 o);
08ccf96b
L
7675 bfd_set_error (bfd_error_bad_value);
7676 return FALSE;
7677 }
0b52efa6
PB
7678
7679 sections = (struct bfd_link_order **)
7680 xmalloc (seen_linkorder * sizeof (struct bfd_link_order *));
7681 seen_linkorder = 0;
7682
7683 for (p = o->link_order_head; p != NULL; p = p->next)
7684 {
7685 sections[seen_linkorder++] = p;
7686 }
7687 /* Sort the input sections in the order of their linked section. */
7688 qsort (sections, seen_linkorder, sizeof (struct bfd_link_order *),
7689 compare_link_order);
7690
7691 /* Change the offsets of the sections. */
7692 offset = 0;
7693 for (n = 0; n < seen_linkorder; n++)
7694 {
7695 s = sections[n]->u.indirect.section;
7696 offset &= ~(bfd_vma)((1 << s->alignment_power) - 1);
7697 s->output_offset = offset;
7698 sections[n]->offset = offset;
7699 offset += sections[n]->size;
7700 }
7701
7702 return TRUE;
7703}
7704
7705
c152c796
AM
7706/* Do the final step of an ELF link. */
7707
7708bfd_boolean
7709bfd_elf_final_link (bfd *abfd, struct bfd_link_info *info)
7710{
7711 bfd_boolean dynamic;
7712 bfd_boolean emit_relocs;
7713 bfd *dynobj;
7714 struct elf_final_link_info finfo;
7715 register asection *o;
7716 register struct bfd_link_order *p;
7717 register bfd *sub;
7718 bfd_size_type max_contents_size;
7719 bfd_size_type max_external_reloc_size;
7720 bfd_size_type max_internal_reloc_count;
7721 bfd_size_type max_sym_count;
7722 bfd_size_type max_sym_shndx_count;
7723 file_ptr off;
7724 Elf_Internal_Sym elfsym;
7725 unsigned int i;
7726 Elf_Internal_Shdr *symtab_hdr;
7727 Elf_Internal_Shdr *symtab_shndx_hdr;
7728 Elf_Internal_Shdr *symstrtab_hdr;
7729 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7730 struct elf_outext_info eoinfo;
7731 bfd_boolean merged;
7732 size_t relativecount = 0;
7733 asection *reldyn = 0;
7734 bfd_size_type amt;
7735
7736 if (! is_elf_hash_table (info->hash))
7737 return FALSE;
7738
7739 if (info->shared)
7740 abfd->flags |= DYNAMIC;
7741
7742 dynamic = elf_hash_table (info)->dynamic_sections_created;
7743 dynobj = elf_hash_table (info)->dynobj;
7744
7745 emit_relocs = (info->relocatable
7746 || info->emitrelocations
7747 || bed->elf_backend_emit_relocs);
7748
7749 finfo.info = info;
7750 finfo.output_bfd = abfd;
7751 finfo.symstrtab = _bfd_elf_stringtab_init ();
7752 if (finfo.symstrtab == NULL)
7753 return FALSE;
7754
7755 if (! dynamic)
7756 {
7757 finfo.dynsym_sec = NULL;
7758 finfo.hash_sec = NULL;
7759 finfo.symver_sec = NULL;
7760 }
7761 else
7762 {
7763 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
7764 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
7765 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
7766 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
7767 /* Note that it is OK if symver_sec is NULL. */
7768 }
7769
7770 finfo.contents = NULL;
7771 finfo.external_relocs = NULL;
7772 finfo.internal_relocs = NULL;
7773 finfo.external_syms = NULL;
7774 finfo.locsym_shndx = NULL;
7775 finfo.internal_syms = NULL;
7776 finfo.indices = NULL;
7777 finfo.sections = NULL;
7778 finfo.symbuf = NULL;
7779 finfo.symshndxbuf = NULL;
7780 finfo.symbuf_count = 0;
7781 finfo.shndxbuf_size = 0;
7782
7783 /* Count up the number of relocations we will output for each output
7784 section, so that we know the sizes of the reloc sections. We
7785 also figure out some maximum sizes. */
7786 max_contents_size = 0;
7787 max_external_reloc_size = 0;
7788 max_internal_reloc_count = 0;
7789 max_sym_count = 0;
7790 max_sym_shndx_count = 0;
7791 merged = FALSE;
7792 for (o = abfd->sections; o != NULL; o = o->next)
7793 {
7794 struct bfd_elf_section_data *esdo = elf_section_data (o);
7795 o->reloc_count = 0;
7796
7797 for (p = o->link_order_head; p != NULL; p = p->next)
7798 {
7799 unsigned int reloc_count = 0;
7800 struct bfd_elf_section_data *esdi = NULL;
7801 unsigned int *rel_count1;
7802
7803 if (p->type == bfd_section_reloc_link_order
7804 || p->type == bfd_symbol_reloc_link_order)
7805 reloc_count = 1;
7806 else if (p->type == bfd_indirect_link_order)
7807 {
7808 asection *sec;
7809
7810 sec = p->u.indirect.section;
7811 esdi = elf_section_data (sec);
7812
7813 /* Mark all sections which are to be included in the
7814 link. This will normally be every section. We need
7815 to do this so that we can identify any sections which
7816 the linker has decided to not include. */
7817 sec->linker_mark = TRUE;
7818
7819 if (sec->flags & SEC_MERGE)
7820 merged = TRUE;
7821
7822 if (info->relocatable || info->emitrelocations)
7823 reloc_count = sec->reloc_count;
7824 else if (bed->elf_backend_count_relocs)
7825 {
7826 Elf_Internal_Rela * relocs;
7827
7828 relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
7829 info->keep_memory);
7830
7831 reloc_count = (*bed->elf_backend_count_relocs) (sec, relocs);
7832
7833 if (elf_section_data (o)->relocs != relocs)
7834 free (relocs);
7835 }
7836
eea6121a
AM
7837 if (sec->rawsize > max_contents_size)
7838 max_contents_size = sec->rawsize;
7839 if (sec->size > max_contents_size)
7840 max_contents_size = sec->size;
c152c796
AM
7841
7842 /* We are interested in just local symbols, not all
7843 symbols. */
7844 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
7845 && (sec->owner->flags & DYNAMIC) == 0)
7846 {
7847 size_t sym_count;
7848
7849 if (elf_bad_symtab (sec->owner))
7850 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
7851 / bed->s->sizeof_sym);
7852 else
7853 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
7854
7855 if (sym_count > max_sym_count)
7856 max_sym_count = sym_count;
7857
7858 if (sym_count > max_sym_shndx_count
7859 && elf_symtab_shndx (sec->owner) != 0)
7860 max_sym_shndx_count = sym_count;
7861
7862 if ((sec->flags & SEC_RELOC) != 0)
7863 {
7864 size_t ext_size;
7865
7866 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
7867 if (ext_size > max_external_reloc_size)
7868 max_external_reloc_size = ext_size;
7869 if (sec->reloc_count > max_internal_reloc_count)
7870 max_internal_reloc_count = sec->reloc_count;
7871 }
7872 }
7873 }
7874
7875 if (reloc_count == 0)
7876 continue;
7877
7878 o->reloc_count += reloc_count;
7879
7880 /* MIPS may have a mix of REL and RELA relocs on sections.
7881 To support this curious ABI we keep reloc counts in
7882 elf_section_data too. We must be careful to add the
7883 relocations from the input section to the right output
7884 count. FIXME: Get rid of one count. We have
7885 o->reloc_count == esdo->rel_count + esdo->rel_count2. */
7886 rel_count1 = &esdo->rel_count;
7887 if (esdi != NULL)
7888 {
7889 bfd_boolean same_size;
7890 bfd_size_type entsize1;
7891
7892 entsize1 = esdi->rel_hdr.sh_entsize;
7893 BFD_ASSERT (entsize1 == bed->s->sizeof_rel
7894 || entsize1 == bed->s->sizeof_rela);
7895 same_size = !o->use_rela_p == (entsize1 == bed->s->sizeof_rel);
7896
7897 if (!same_size)
7898 rel_count1 = &esdo->rel_count2;
7899
7900 if (esdi->rel_hdr2 != NULL)
7901 {
7902 bfd_size_type entsize2 = esdi->rel_hdr2->sh_entsize;
7903 unsigned int alt_count;
7904 unsigned int *rel_count2;
7905
7906 BFD_ASSERT (entsize2 != entsize1
7907 && (entsize2 == bed->s->sizeof_rel
7908 || entsize2 == bed->s->sizeof_rela));
7909
7910 rel_count2 = &esdo->rel_count2;
7911 if (!same_size)
7912 rel_count2 = &esdo->rel_count;
7913
7914 /* The following is probably too simplistic if the
7915 backend counts output relocs unusually. */
7916 BFD_ASSERT (bed->elf_backend_count_relocs == NULL);
7917 alt_count = NUM_SHDR_ENTRIES (esdi->rel_hdr2);
7918 *rel_count2 += alt_count;
7919 reloc_count -= alt_count;
7920 }
7921 }
7922 *rel_count1 += reloc_count;
7923 }
7924
7925 if (o->reloc_count > 0)
7926 o->flags |= SEC_RELOC;
7927 else
7928 {
7929 /* Explicitly clear the SEC_RELOC flag. The linker tends to
7930 set it (this is probably a bug) and if it is set
7931 assign_section_numbers will create a reloc section. */
7932 o->flags &=~ SEC_RELOC;
7933 }
7934
7935 /* If the SEC_ALLOC flag is not set, force the section VMA to
7936 zero. This is done in elf_fake_sections as well, but forcing
7937 the VMA to 0 here will ensure that relocs against these
7938 sections are handled correctly. */
7939 if ((o->flags & SEC_ALLOC) == 0
7940 && ! o->user_set_vma)
7941 o->vma = 0;
7942 }
7943
7944 if (! info->relocatable && merged)
7945 elf_link_hash_traverse (elf_hash_table (info),
7946 _bfd_elf_link_sec_merge_syms, abfd);
7947
7948 /* Figure out the file positions for everything but the symbol table
7949 and the relocs. We set symcount to force assign_section_numbers
7950 to create a symbol table. */
7951 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
7952 BFD_ASSERT (! abfd->output_has_begun);
7953 if (! _bfd_elf_compute_section_file_positions (abfd, info))
7954 goto error_return;
7955
ee75fd95 7956 /* Set sizes, and assign file positions for reloc sections. */
c152c796
AM
7957 for (o = abfd->sections; o != NULL; o = o->next)
7958 {
7959 if ((o->flags & SEC_RELOC) != 0)
7960 {
7961 if (!(_bfd_elf_link_size_reloc_section
7962 (abfd, &elf_section_data (o)->rel_hdr, o)))
7963 goto error_return;
7964
7965 if (elf_section_data (o)->rel_hdr2
7966 && !(_bfd_elf_link_size_reloc_section
7967 (abfd, elf_section_data (o)->rel_hdr2, o)))
7968 goto error_return;
7969 }
7970
7971 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
7972 to count upwards while actually outputting the relocations. */
7973 elf_section_data (o)->rel_count = 0;
7974 elf_section_data (o)->rel_count2 = 0;
7975 }
7976
7977 _bfd_elf_assign_file_positions_for_relocs (abfd);
7978
7979 /* We have now assigned file positions for all the sections except
7980 .symtab and .strtab. We start the .symtab section at the current
7981 file position, and write directly to it. We build the .strtab
7982 section in memory. */
7983 bfd_get_symcount (abfd) = 0;
7984 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7985 /* sh_name is set in prep_headers. */
7986 symtab_hdr->sh_type = SHT_SYMTAB;
7987 /* sh_flags, sh_addr and sh_size all start off zero. */
7988 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7989 /* sh_link is set in assign_section_numbers. */
7990 /* sh_info is set below. */
7991 /* sh_offset is set just below. */
7992 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
7993
7994 off = elf_tdata (abfd)->next_file_pos;
7995 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, TRUE);
7996
7997 /* Note that at this point elf_tdata (abfd)->next_file_pos is
7998 incorrect. We do not yet know the size of the .symtab section.
7999 We correct next_file_pos below, after we do know the size. */
8000
8001 /* Allocate a buffer to hold swapped out symbols. This is to avoid
8002 continuously seeking to the right position in the file. */
8003 if (! info->keep_memory || max_sym_count < 20)
8004 finfo.symbuf_size = 20;
8005 else
8006 finfo.symbuf_size = max_sym_count;
8007 amt = finfo.symbuf_size;
8008 amt *= bed->s->sizeof_sym;
8009 finfo.symbuf = bfd_malloc (amt);
8010 if (finfo.symbuf == NULL)
8011 goto error_return;
8012 if (elf_numsections (abfd) > SHN_LORESERVE)
8013 {
8014 /* Wild guess at number of output symbols. realloc'd as needed. */
8015 amt = 2 * max_sym_count + elf_numsections (abfd) + 1000;
8016 finfo.shndxbuf_size = amt;
8017 amt *= sizeof (Elf_External_Sym_Shndx);
8018 finfo.symshndxbuf = bfd_zmalloc (amt);
8019 if (finfo.symshndxbuf == NULL)
8020 goto error_return;
8021 }
8022
8023 /* Start writing out the symbol table. The first symbol is always a
8024 dummy symbol. */
8025 if (info->strip != strip_all
8026 || emit_relocs)
8027 {
8028 elfsym.st_value = 0;
8029 elfsym.st_size = 0;
8030 elfsym.st_info = 0;
8031 elfsym.st_other = 0;
8032 elfsym.st_shndx = SHN_UNDEF;
8033 if (! elf_link_output_sym (&finfo, NULL, &elfsym, bfd_und_section_ptr,
8034 NULL))
8035 goto error_return;
8036 }
8037
c152c796
AM
8038 /* Output a symbol for each section. We output these even if we are
8039 discarding local symbols, since they are used for relocs. These
8040 symbols have no names. We store the index of each one in the
8041 index field of the section, so that we can find it again when
8042 outputting relocs. */
8043 if (info->strip != strip_all
8044 || emit_relocs)
8045 {
8046 elfsym.st_size = 0;
8047 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8048 elfsym.st_other = 0;
8049 for (i = 1; i < elf_numsections (abfd); i++)
8050 {
8051 o = bfd_section_from_elf_index (abfd, i);
8052 if (o != NULL)
8053 o->target_index = bfd_get_symcount (abfd);
8054 elfsym.st_shndx = i;
8055 if (info->relocatable || o == NULL)
8056 elfsym.st_value = 0;
8057 else
8058 elfsym.st_value = o->vma;
8059 if (! elf_link_output_sym (&finfo, NULL, &elfsym, o, NULL))
8060 goto error_return;
8061 if (i == SHN_LORESERVE - 1)
8062 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
8063 }
8064 }
8065
8066 /* Allocate some memory to hold information read in from the input
8067 files. */
8068 if (max_contents_size != 0)
8069 {
8070 finfo.contents = bfd_malloc (max_contents_size);
8071 if (finfo.contents == NULL)
8072 goto error_return;
8073 }
8074
8075 if (max_external_reloc_size != 0)
8076 {
8077 finfo.external_relocs = bfd_malloc (max_external_reloc_size);
8078 if (finfo.external_relocs == NULL)
8079 goto error_return;
8080 }
8081
8082 if (max_internal_reloc_count != 0)
8083 {
8084 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
8085 amt *= sizeof (Elf_Internal_Rela);
8086 finfo.internal_relocs = bfd_malloc (amt);
8087 if (finfo.internal_relocs == NULL)
8088 goto error_return;
8089 }
8090
8091 if (max_sym_count != 0)
8092 {
8093 amt = max_sym_count * bed->s->sizeof_sym;
8094 finfo.external_syms = bfd_malloc (amt);
8095 if (finfo.external_syms == NULL)
8096 goto error_return;
8097
8098 amt = max_sym_count * sizeof (Elf_Internal_Sym);
8099 finfo.internal_syms = bfd_malloc (amt);
8100 if (finfo.internal_syms == NULL)
8101 goto error_return;
8102
8103 amt = max_sym_count * sizeof (long);
8104 finfo.indices = bfd_malloc (amt);
8105 if (finfo.indices == NULL)
8106 goto error_return;
8107
8108 amt = max_sym_count * sizeof (asection *);
8109 finfo.sections = bfd_malloc (amt);
8110 if (finfo.sections == NULL)
8111 goto error_return;
8112 }
8113
8114 if (max_sym_shndx_count != 0)
8115 {
8116 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
8117 finfo.locsym_shndx = bfd_malloc (amt);
8118 if (finfo.locsym_shndx == NULL)
8119 goto error_return;
8120 }
8121
8122 if (elf_hash_table (info)->tls_sec)
8123 {
8124 bfd_vma base, end = 0;
8125 asection *sec;
8126
8127 for (sec = elf_hash_table (info)->tls_sec;
8128 sec && (sec->flags & SEC_THREAD_LOCAL);
8129 sec = sec->next)
8130 {
eea6121a 8131 bfd_vma size = sec->size;
c152c796
AM
8132
8133 if (size == 0 && (sec->flags & SEC_HAS_CONTENTS) == 0)
8134 {
8135 struct bfd_link_order *o;
8136
8137 for (o = sec->link_order_head; o != NULL; o = o->next)
8138 if (size < o->offset + o->size)
8139 size = o->offset + o->size;
8140 }
8141 end = sec->vma + size;
8142 }
8143 base = elf_hash_table (info)->tls_sec->vma;
8144 end = align_power (end, elf_hash_table (info)->tls_sec->alignment_power);
8145 elf_hash_table (info)->tls_size = end - base;
8146 }
8147
0b52efa6
PB
8148 /* Reorder SHF_LINK_ORDER sections. */
8149 for (o = abfd->sections; o != NULL; o = o->next)
8150 {
8151 if (!elf_fixup_link_order (abfd, o))
8152 return FALSE;
8153 }
8154
c152c796
AM
8155 /* Since ELF permits relocations to be against local symbols, we
8156 must have the local symbols available when we do the relocations.
8157 Since we would rather only read the local symbols once, and we
8158 would rather not keep them in memory, we handle all the
8159 relocations for a single input file at the same time.
8160
8161 Unfortunately, there is no way to know the total number of local
8162 symbols until we have seen all of them, and the local symbol
8163 indices precede the global symbol indices. This means that when
8164 we are generating relocatable output, and we see a reloc against
8165 a global symbol, we can not know the symbol index until we have
8166 finished examining all the local symbols to see which ones we are
8167 going to output. To deal with this, we keep the relocations in
8168 memory, and don't output them until the end of the link. This is
8169 an unfortunate waste of memory, but I don't see a good way around
8170 it. Fortunately, it only happens when performing a relocatable
8171 link, which is not the common case. FIXME: If keep_memory is set
8172 we could write the relocs out and then read them again; I don't
8173 know how bad the memory loss will be. */
8174
8175 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8176 sub->output_has_begun = FALSE;
8177 for (o = abfd->sections; o != NULL; o = o->next)
8178 {
8179 for (p = o->link_order_head; p != NULL; p = p->next)
8180 {
8181 if (p->type == bfd_indirect_link_order
8182 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
8183 == bfd_target_elf_flavour)
8184 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
8185 {
8186 if (! sub->output_has_begun)
8187 {
8188 if (! elf_link_input_bfd (&finfo, sub))
8189 goto error_return;
8190 sub->output_has_begun = TRUE;
8191 }
8192 }
8193 else if (p->type == bfd_section_reloc_link_order
8194 || p->type == bfd_symbol_reloc_link_order)
8195 {
8196 if (! elf_reloc_link_order (abfd, info, o, p))
8197 goto error_return;
8198 }
8199 else
8200 {
8201 if (! _bfd_default_link_order (abfd, info, o, p))
8202 goto error_return;
8203 }
8204 }
8205 }
8206
8207 /* Output any global symbols that got converted to local in a
8208 version script or due to symbol visibility. We do this in a
8209 separate step since ELF requires all local symbols to appear
8210 prior to any global symbols. FIXME: We should only do this if
8211 some global symbols were, in fact, converted to become local.
8212 FIXME: Will this work correctly with the Irix 5 linker? */
8213 eoinfo.failed = FALSE;
8214 eoinfo.finfo = &finfo;
8215 eoinfo.localsyms = TRUE;
8216 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
8217 &eoinfo);
8218 if (eoinfo.failed)
8219 return FALSE;
8220
8221 /* That wrote out all the local symbols. Finish up the symbol table
8222 with the global symbols. Even if we want to strip everything we
8223 can, we still need to deal with those global symbols that got
8224 converted to local in a version script. */
8225
8226 /* The sh_info field records the index of the first non local symbol. */
8227 symtab_hdr->sh_info = bfd_get_symcount (abfd);
8228
8229 if (dynamic
8230 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
8231 {
8232 Elf_Internal_Sym sym;
8233 bfd_byte *dynsym = finfo.dynsym_sec->contents;
8234 long last_local = 0;
8235
8236 /* Write out the section symbols for the output sections. */
67687978 8237 if (info->shared || elf_hash_table (info)->is_relocatable_executable)
c152c796
AM
8238 {
8239 asection *s;
8240
8241 sym.st_size = 0;
8242 sym.st_name = 0;
8243 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8244 sym.st_other = 0;
8245
8246 for (s = abfd->sections; s != NULL; s = s->next)
8247 {
8248 int indx;
8249 bfd_byte *dest;
8250 long dynindx;
8251
c152c796 8252 dynindx = elf_section_data (s)->dynindx;
8c37241b
JJ
8253 if (dynindx <= 0)
8254 continue;
8255 indx = elf_section_data (s)->this_idx;
c152c796
AM
8256 BFD_ASSERT (indx > 0);
8257 sym.st_shndx = indx;
8258 sym.st_value = s->vma;
8259 dest = dynsym + dynindx * bed->s->sizeof_sym;
8c37241b
JJ
8260 if (last_local < dynindx)
8261 last_local = dynindx;
c152c796
AM
8262 bed->s->swap_symbol_out (abfd, &sym, dest, 0);
8263 }
c152c796
AM
8264 }
8265
8266 /* Write out the local dynsyms. */
8267 if (elf_hash_table (info)->dynlocal)
8268 {
8269 struct elf_link_local_dynamic_entry *e;
8270 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
8271 {
8272 asection *s;
8273 bfd_byte *dest;
8274
8275 sym.st_size = e->isym.st_size;
8276 sym.st_other = e->isym.st_other;
8277
8278 /* Copy the internal symbol as is.
8279 Note that we saved a word of storage and overwrote
8280 the original st_name with the dynstr_index. */
8281 sym = e->isym;
8282
8283 if (e->isym.st_shndx != SHN_UNDEF
8284 && (e->isym.st_shndx < SHN_LORESERVE
8285 || e->isym.st_shndx > SHN_HIRESERVE))
8286 {
8287 s = bfd_section_from_elf_index (e->input_bfd,
8288 e->isym.st_shndx);
8289
8290 sym.st_shndx =
8291 elf_section_data (s->output_section)->this_idx;
8292 sym.st_value = (s->output_section->vma
8293 + s->output_offset
8294 + e->isym.st_value);
8295 }
8296
8297 if (last_local < e->dynindx)
8298 last_local = e->dynindx;
8299
8300 dest = dynsym + e->dynindx * bed->s->sizeof_sym;
8301 bed->s->swap_symbol_out (abfd, &sym, dest, 0);
8302 }
8303 }
8304
8305 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
8306 last_local + 1;
8307 }
8308
8309 /* We get the global symbols from the hash table. */
8310 eoinfo.failed = FALSE;
8311 eoinfo.localsyms = FALSE;
8312 eoinfo.finfo = &finfo;
8313 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
8314 &eoinfo);
8315 if (eoinfo.failed)
8316 return FALSE;
8317
8318 /* If backend needs to output some symbols not present in the hash
8319 table, do it now. */
8320 if (bed->elf_backend_output_arch_syms)
8321 {
8322 typedef bfd_boolean (*out_sym_func)
8323 (void *, const char *, Elf_Internal_Sym *, asection *,
8324 struct elf_link_hash_entry *);
8325
8326 if (! ((*bed->elf_backend_output_arch_syms)
8327 (abfd, info, &finfo, (out_sym_func) elf_link_output_sym)))
8328 return FALSE;
8329 }
8330
8331 /* Flush all symbols to the file. */
8332 if (! elf_link_flush_output_syms (&finfo, bed))
8333 return FALSE;
8334
8335 /* Now we know the size of the symtab section. */
8336 off += symtab_hdr->sh_size;
8337
8338 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
8339 if (symtab_shndx_hdr->sh_name != 0)
8340 {
8341 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8342 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8343 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8344 amt = bfd_get_symcount (abfd) * sizeof (Elf_External_Sym_Shndx);
8345 symtab_shndx_hdr->sh_size = amt;
8346
8347 off = _bfd_elf_assign_file_position_for_section (symtab_shndx_hdr,
8348 off, TRUE);
8349
8350 if (bfd_seek (abfd, symtab_shndx_hdr->sh_offset, SEEK_SET) != 0
8351 || (bfd_bwrite (finfo.symshndxbuf, amt, abfd) != amt))
8352 return FALSE;
8353 }
8354
8355
8356 /* Finish up and write out the symbol string table (.strtab)
8357 section. */
8358 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8359 /* sh_name was set in prep_headers. */
8360 symstrtab_hdr->sh_type = SHT_STRTAB;
8361 symstrtab_hdr->sh_flags = 0;
8362 symstrtab_hdr->sh_addr = 0;
8363 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
8364 symstrtab_hdr->sh_entsize = 0;
8365 symstrtab_hdr->sh_link = 0;
8366 symstrtab_hdr->sh_info = 0;
8367 /* sh_offset is set just below. */
8368 symstrtab_hdr->sh_addralign = 1;
8369
8370 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, TRUE);
8371 elf_tdata (abfd)->next_file_pos = off;
8372
8373 if (bfd_get_symcount (abfd) > 0)
8374 {
8375 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
8376 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
8377 return FALSE;
8378 }
8379
8380 /* Adjust the relocs to have the correct symbol indices. */
8381 for (o = abfd->sections; o != NULL; o = o->next)
8382 {
8383 if ((o->flags & SEC_RELOC) == 0)
8384 continue;
8385
8386 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
8387 elf_section_data (o)->rel_count,
8388 elf_section_data (o)->rel_hashes);
8389 if (elf_section_data (o)->rel_hdr2 != NULL)
8390 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
8391 elf_section_data (o)->rel_count2,
8392 (elf_section_data (o)->rel_hashes
8393 + elf_section_data (o)->rel_count));
8394
8395 /* Set the reloc_count field to 0 to prevent write_relocs from
8396 trying to swap the relocs out itself. */
8397 o->reloc_count = 0;
8398 }
8399
8400 if (dynamic && info->combreloc && dynobj != NULL)
8401 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
8402
8403 /* If we are linking against a dynamic object, or generating a
8404 shared library, finish up the dynamic linking information. */
8405 if (dynamic)
8406 {
8407 bfd_byte *dyncon, *dynconend;
8408
8409 /* Fix up .dynamic entries. */
8410 o = bfd_get_section_by_name (dynobj, ".dynamic");
8411 BFD_ASSERT (o != NULL);
8412
8413 dyncon = o->contents;
eea6121a 8414 dynconend = o->contents + o->size;
c152c796
AM
8415 for (; dyncon < dynconend; dyncon += bed->s->sizeof_dyn)
8416 {
8417 Elf_Internal_Dyn dyn;
8418 const char *name;
8419 unsigned int type;
8420
8421 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
8422
8423 switch (dyn.d_tag)
8424 {
8425 default:
8426 continue;
8427 case DT_NULL:
8428 if (relativecount > 0 && dyncon + bed->s->sizeof_dyn < dynconend)
8429 {
8430 switch (elf_section_data (reldyn)->this_hdr.sh_type)
8431 {
8432 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
8433 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
8434 default: continue;
8435 }
8436 dyn.d_un.d_val = relativecount;
8437 relativecount = 0;
8438 break;
8439 }
8440 continue;
8441
8442 case DT_INIT:
8443 name = info->init_function;
8444 goto get_sym;
8445 case DT_FINI:
8446 name = info->fini_function;
8447 get_sym:
8448 {
8449 struct elf_link_hash_entry *h;
8450
8451 h = elf_link_hash_lookup (elf_hash_table (info), name,
8452 FALSE, FALSE, TRUE);
8453 if (h != NULL
8454 && (h->root.type == bfd_link_hash_defined
8455 || h->root.type == bfd_link_hash_defweak))
8456 {
8457 dyn.d_un.d_val = h->root.u.def.value;
8458 o = h->root.u.def.section;
8459 if (o->output_section != NULL)
8460 dyn.d_un.d_val += (o->output_section->vma
8461 + o->output_offset);
8462 else
8463 {
8464 /* The symbol is imported from another shared
8465 library and does not apply to this one. */
8466 dyn.d_un.d_val = 0;
8467 }
8468 break;
8469 }
8470 }
8471 continue;
8472
8473 case DT_PREINIT_ARRAYSZ:
8474 name = ".preinit_array";
8475 goto get_size;
8476 case DT_INIT_ARRAYSZ:
8477 name = ".init_array";
8478 goto get_size;
8479 case DT_FINI_ARRAYSZ:
8480 name = ".fini_array";
8481 get_size:
8482 o = bfd_get_section_by_name (abfd, name);
8483 if (o == NULL)
8484 {
8485 (*_bfd_error_handler)
d003868e 8486 (_("%B: could not find output section %s"), abfd, name);
c152c796
AM
8487 goto error_return;
8488 }
eea6121a 8489 if (o->size == 0)
c152c796
AM
8490 (*_bfd_error_handler)
8491 (_("warning: %s section has zero size"), name);
eea6121a 8492 dyn.d_un.d_val = o->size;
c152c796
AM
8493 break;
8494
8495 case DT_PREINIT_ARRAY:
8496 name = ".preinit_array";
8497 goto get_vma;
8498 case DT_INIT_ARRAY:
8499 name = ".init_array";
8500 goto get_vma;
8501 case DT_FINI_ARRAY:
8502 name = ".fini_array";
8503 goto get_vma;
8504
8505 case DT_HASH:
8506 name = ".hash";
8507 goto get_vma;
8508 case DT_STRTAB:
8509 name = ".dynstr";
8510 goto get_vma;
8511 case DT_SYMTAB:
8512 name = ".dynsym";
8513 goto get_vma;
8514 case DT_VERDEF:
8515 name = ".gnu.version_d";
8516 goto get_vma;
8517 case DT_VERNEED:
8518 name = ".gnu.version_r";
8519 goto get_vma;
8520 case DT_VERSYM:
8521 name = ".gnu.version";
8522 get_vma:
8523 o = bfd_get_section_by_name (abfd, name);
8524 if (o == NULL)
8525 {
8526 (*_bfd_error_handler)
d003868e 8527 (_("%B: could not find output section %s"), abfd, name);
c152c796
AM
8528 goto error_return;
8529 }
8530 dyn.d_un.d_ptr = o->vma;
8531 break;
8532
8533 case DT_REL:
8534 case DT_RELA:
8535 case DT_RELSZ:
8536 case DT_RELASZ:
8537 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
8538 type = SHT_REL;
8539 else
8540 type = SHT_RELA;
8541 dyn.d_un.d_val = 0;
8542 for (i = 1; i < elf_numsections (abfd); i++)
8543 {
8544 Elf_Internal_Shdr *hdr;
8545
8546 hdr = elf_elfsections (abfd)[i];
8547 if (hdr->sh_type == type
8548 && (hdr->sh_flags & SHF_ALLOC) != 0)
8549 {
8550 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
8551 dyn.d_un.d_val += hdr->sh_size;
8552 else
8553 {
8554 if (dyn.d_un.d_val == 0
8555 || hdr->sh_addr < dyn.d_un.d_val)
8556 dyn.d_un.d_val = hdr->sh_addr;
8557 }
8558 }
8559 }
8560 break;
8561 }
8562 bed->s->swap_dyn_out (dynobj, &dyn, dyncon);
8563 }
8564 }
8565
8566 /* If we have created any dynamic sections, then output them. */
8567 if (dynobj != NULL)
8568 {
8569 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
8570 goto error_return;
8571
8572 for (o = dynobj->sections; o != NULL; o = o->next)
8573 {
8574 if ((o->flags & SEC_HAS_CONTENTS) == 0
eea6121a 8575 || o->size == 0
c152c796
AM
8576 || o->output_section == bfd_abs_section_ptr)
8577 continue;
8578 if ((o->flags & SEC_LINKER_CREATED) == 0)
8579 {
8580 /* At this point, we are only interested in sections
8581 created by _bfd_elf_link_create_dynamic_sections. */
8582 continue;
8583 }
3722b82f
AM
8584 if (elf_hash_table (info)->stab_info.stabstr == o)
8585 continue;
eea6121a
AM
8586 if (elf_hash_table (info)->eh_info.hdr_sec == o)
8587 continue;
c152c796
AM
8588 if ((elf_section_data (o->output_section)->this_hdr.sh_type
8589 != SHT_STRTAB)
8590 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
8591 {
8592 if (! bfd_set_section_contents (abfd, o->output_section,
8593 o->contents,
8594 (file_ptr) o->output_offset,
eea6121a 8595 o->size))
c152c796
AM
8596 goto error_return;
8597 }
8598 else
8599 {
8600 /* The contents of the .dynstr section are actually in a
8601 stringtab. */
8602 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
8603 if (bfd_seek (abfd, off, SEEK_SET) != 0
8604 || ! _bfd_elf_strtab_emit (abfd,
8605 elf_hash_table (info)->dynstr))
8606 goto error_return;
8607 }
8608 }
8609 }
8610
8611 if (info->relocatable)
8612 {
8613 bfd_boolean failed = FALSE;
8614
8615 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
8616 if (failed)
8617 goto error_return;
8618 }
8619
8620 /* If we have optimized stabs strings, output them. */
3722b82f 8621 if (elf_hash_table (info)->stab_info.stabstr != NULL)
c152c796
AM
8622 {
8623 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
8624 goto error_return;
8625 }
8626
8627 if (info->eh_frame_hdr)
8628 {
8629 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, info))
8630 goto error_return;
8631 }
8632
8633 if (finfo.symstrtab != NULL)
8634 _bfd_stringtab_free (finfo.symstrtab);
8635 if (finfo.contents != NULL)
8636 free (finfo.contents);
8637 if (finfo.external_relocs != NULL)
8638 free (finfo.external_relocs);
8639 if (finfo.internal_relocs != NULL)
8640 free (finfo.internal_relocs);
8641 if (finfo.external_syms != NULL)
8642 free (finfo.external_syms);
8643 if (finfo.locsym_shndx != NULL)
8644 free (finfo.locsym_shndx);
8645 if (finfo.internal_syms != NULL)
8646 free (finfo.internal_syms);
8647 if (finfo.indices != NULL)
8648 free (finfo.indices);
8649 if (finfo.sections != NULL)
8650 free (finfo.sections);
8651 if (finfo.symbuf != NULL)
8652 free (finfo.symbuf);
8653 if (finfo.symshndxbuf != NULL)
8654 free (finfo.symshndxbuf);
8655 for (o = abfd->sections; o != NULL; o = o->next)
8656 {
8657 if ((o->flags & SEC_RELOC) != 0
8658 && elf_section_data (o)->rel_hashes != NULL)
8659 free (elf_section_data (o)->rel_hashes);
8660 }
8661
8662 elf_tdata (abfd)->linker = TRUE;
8663
8664 return TRUE;
8665
8666 error_return:
8667 if (finfo.symstrtab != NULL)
8668 _bfd_stringtab_free (finfo.symstrtab);
8669 if (finfo.contents != NULL)
8670 free (finfo.contents);
8671 if (finfo.external_relocs != NULL)
8672 free (finfo.external_relocs);
8673 if (finfo.internal_relocs != NULL)
8674 free (finfo.internal_relocs);
8675 if (finfo.external_syms != NULL)
8676 free (finfo.external_syms);
8677 if (finfo.locsym_shndx != NULL)
8678 free (finfo.locsym_shndx);
8679 if (finfo.internal_syms != NULL)
8680 free (finfo.internal_syms);
8681 if (finfo.indices != NULL)
8682 free (finfo.indices);
8683 if (finfo.sections != NULL)
8684 free (finfo.sections);
8685 if (finfo.symbuf != NULL)
8686 free (finfo.symbuf);
8687 if (finfo.symshndxbuf != NULL)
8688 free (finfo.symshndxbuf);
8689 for (o = abfd->sections; o != NULL; o = o->next)
8690 {
8691 if ((o->flags & SEC_RELOC) != 0
8692 && elf_section_data (o)->rel_hashes != NULL)
8693 free (elf_section_data (o)->rel_hashes);
8694 }
8695
8696 return FALSE;
8697}
8698\f
8699/* Garbage collect unused sections. */
8700
8701/* The mark phase of garbage collection. For a given section, mark
8702 it and any sections in this section's group, and all the sections
8703 which define symbols to which it refers. */
8704
8705typedef asection * (*gc_mark_hook_fn)
8706 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
8707 struct elf_link_hash_entry *, Elf_Internal_Sym *);
8708
ccfa59ea
AM
8709bfd_boolean
8710_bfd_elf_gc_mark (struct bfd_link_info *info,
8711 asection *sec,
8712 gc_mark_hook_fn gc_mark_hook)
c152c796
AM
8713{
8714 bfd_boolean ret;
8715 asection *group_sec;
8716
8717 sec->gc_mark = 1;
8718
8719 /* Mark all the sections in the group. */
8720 group_sec = elf_section_data (sec)->next_in_group;
8721 if (group_sec && !group_sec->gc_mark)
ccfa59ea 8722 if (!_bfd_elf_gc_mark (info, group_sec, gc_mark_hook))
c152c796
AM
8723 return FALSE;
8724
8725 /* Look through the section relocs. */
8726 ret = TRUE;
8727 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
8728 {
8729 Elf_Internal_Rela *relstart, *rel, *relend;
8730 Elf_Internal_Shdr *symtab_hdr;
8731 struct elf_link_hash_entry **sym_hashes;
8732 size_t nlocsyms;
8733 size_t extsymoff;
8734 bfd *input_bfd = sec->owner;
8735 const struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
8736 Elf_Internal_Sym *isym = NULL;
8737 int r_sym_shift;
8738
8739 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
8740 sym_hashes = elf_sym_hashes (input_bfd);
8741
8742 /* Read the local symbols. */
8743 if (elf_bad_symtab (input_bfd))
8744 {
8745 nlocsyms = symtab_hdr->sh_size / bed->s->sizeof_sym;
8746 extsymoff = 0;
8747 }
8748 else
8749 extsymoff = nlocsyms = symtab_hdr->sh_info;
8750
8751 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
8752 if (isym == NULL && nlocsyms != 0)
8753 {
8754 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
8755 NULL, NULL, NULL);
8756 if (isym == NULL)
8757 return FALSE;
8758 }
8759
8760 /* Read the relocations. */
8761 relstart = _bfd_elf_link_read_relocs (input_bfd, sec, NULL, NULL,
8762 info->keep_memory);
8763 if (relstart == NULL)
8764 {
8765 ret = FALSE;
8766 goto out1;
8767 }
8768 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
8769
8770 if (bed->s->arch_size == 32)
8771 r_sym_shift = 8;
8772 else
8773 r_sym_shift = 32;
8774
8775 for (rel = relstart; rel < relend; rel++)
8776 {
8777 unsigned long r_symndx;
8778 asection *rsec;
8779 struct elf_link_hash_entry *h;
8780
8781 r_symndx = rel->r_info >> r_sym_shift;
8782 if (r_symndx == 0)
8783 continue;
8784
8785 if (r_symndx >= nlocsyms
8786 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
8787 {
8788 h = sym_hashes[r_symndx - extsymoff];
20f0a1ad
AM
8789 while (h->root.type == bfd_link_hash_indirect
8790 || h->root.type == bfd_link_hash_warning)
8791 h = (struct elf_link_hash_entry *) h->root.u.i.link;
c152c796
AM
8792 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
8793 }
8794 else
8795 {
8796 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
8797 }
8798
8799 if (rsec && !rsec->gc_mark)
8800 {
8801 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
8802 rsec->gc_mark = 1;
ccfa59ea 8803 else if (!_bfd_elf_gc_mark (info, rsec, gc_mark_hook))
c152c796
AM
8804 {
8805 ret = FALSE;
8806 goto out2;
8807 }
8808 }
8809 }
8810
8811 out2:
8812 if (elf_section_data (sec)->relocs != relstart)
8813 free (relstart);
8814 out1:
8815 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
8816 {
8817 if (! info->keep_memory)
8818 free (isym);
8819 else
8820 symtab_hdr->contents = (unsigned char *) isym;
8821 }
8822 }
8823
8824 return ret;
8825}
8826
8827/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
8828
8829static bfd_boolean
8830elf_gc_sweep_symbol (struct elf_link_hash_entry *h, void *idxptr)
8831{
8832 int *idx = idxptr;
8833
8834 if (h->root.type == bfd_link_hash_warning)
8835 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8836
8837 if (h->dynindx != -1
8838 && ((h->root.type != bfd_link_hash_defined
8839 && h->root.type != bfd_link_hash_defweak)
8840 || h->root.u.def.section->gc_mark))
8841 h->dynindx = (*idx)++;
8842
8843 return TRUE;
8844}
8845
8846/* The sweep phase of garbage collection. Remove all garbage sections. */
8847
8848typedef bfd_boolean (*gc_sweep_hook_fn)
8849 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
8850
8851static bfd_boolean
8852elf_gc_sweep (struct bfd_link_info *info, gc_sweep_hook_fn gc_sweep_hook)
8853{
8854 bfd *sub;
8855
8856 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8857 {
8858 asection *o;
8859
8860 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
8861 continue;
8862
8863 for (o = sub->sections; o != NULL; o = o->next)
8864 {
7c2c8505
AM
8865 /* Keep debug and special sections. */
8866 if ((o->flags & (SEC_DEBUGGING | SEC_LINKER_CREATED)) != 0
8867 || (o->flags & (SEC_ALLOC | SEC_LOAD)) == 0)
c152c796
AM
8868 o->gc_mark = 1;
8869
8870 if (o->gc_mark)
8871 continue;
8872
8873 /* Skip sweeping sections already excluded. */
8874 if (o->flags & SEC_EXCLUDE)
8875 continue;
8876
8877 /* Since this is early in the link process, it is simple
8878 to remove a section from the output. */
8879 o->flags |= SEC_EXCLUDE;
8880
8881 /* But we also have to update some of the relocation
8882 info we collected before. */
8883 if (gc_sweep_hook
8884 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
8885 {
8886 Elf_Internal_Rela *internal_relocs;
8887 bfd_boolean r;
8888
8889 internal_relocs
8890 = _bfd_elf_link_read_relocs (o->owner, o, NULL, NULL,
8891 info->keep_memory);
8892 if (internal_relocs == NULL)
8893 return FALSE;
8894
8895 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
8896
8897 if (elf_section_data (o)->relocs != internal_relocs)
8898 free (internal_relocs);
8899
8900 if (!r)
8901 return FALSE;
8902 }
8903 }
8904 }
8905
8906 /* Remove the symbols that were in the swept sections from the dynamic
8907 symbol table. GCFIXME: Anyone know how to get them out of the
8908 static symbol table as well? */
8909 {
8910 int i = 0;
8911
8912 elf_link_hash_traverse (elf_hash_table (info), elf_gc_sweep_symbol, &i);
8913
8914 elf_hash_table (info)->dynsymcount = i;
8915 }
8916
8917 return TRUE;
8918}
8919
8920/* Propagate collected vtable information. This is called through
8921 elf_link_hash_traverse. */
8922
8923static bfd_boolean
8924elf_gc_propagate_vtable_entries_used (struct elf_link_hash_entry *h, void *okp)
8925{
8926 if (h->root.type == bfd_link_hash_warning)
8927 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8928
8929 /* Those that are not vtables. */
f6e332e6 8930 if (h->vtable == NULL || h->vtable->parent == NULL)
c152c796
AM
8931 return TRUE;
8932
8933 /* Those vtables that do not have parents, we cannot merge. */
f6e332e6 8934 if (h->vtable->parent == (struct elf_link_hash_entry *) -1)
c152c796
AM
8935 return TRUE;
8936
8937 /* If we've already been done, exit. */
f6e332e6 8938 if (h->vtable->used && h->vtable->used[-1])
c152c796
AM
8939 return TRUE;
8940
8941 /* Make sure the parent's table is up to date. */
f6e332e6 8942 elf_gc_propagate_vtable_entries_used (h->vtable->parent, okp);
c152c796 8943
f6e332e6 8944 if (h->vtable->used == NULL)
c152c796
AM
8945 {
8946 /* None of this table's entries were referenced. Re-use the
8947 parent's table. */
f6e332e6
AM
8948 h->vtable->used = h->vtable->parent->vtable->used;
8949 h->vtable->size = h->vtable->parent->vtable->size;
c152c796
AM
8950 }
8951 else
8952 {
8953 size_t n;
8954 bfd_boolean *cu, *pu;
8955
8956 /* Or the parent's entries into ours. */
f6e332e6 8957 cu = h->vtable->used;
c152c796 8958 cu[-1] = TRUE;
f6e332e6 8959 pu = h->vtable->parent->vtable->used;
c152c796
AM
8960 if (pu != NULL)
8961 {
8962 const struct elf_backend_data *bed;
8963 unsigned int log_file_align;
8964
8965 bed = get_elf_backend_data (h->root.u.def.section->owner);
8966 log_file_align = bed->s->log_file_align;
f6e332e6 8967 n = h->vtable->parent->vtable->size >> log_file_align;
c152c796
AM
8968 while (n--)
8969 {
8970 if (*pu)
8971 *cu = TRUE;
8972 pu++;
8973 cu++;
8974 }
8975 }
8976 }
8977
8978 return TRUE;
8979}
8980
8981static bfd_boolean
8982elf_gc_smash_unused_vtentry_relocs (struct elf_link_hash_entry *h, void *okp)
8983{
8984 asection *sec;
8985 bfd_vma hstart, hend;
8986 Elf_Internal_Rela *relstart, *relend, *rel;
8987 const struct elf_backend_data *bed;
8988 unsigned int log_file_align;
8989
8990 if (h->root.type == bfd_link_hash_warning)
8991 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8992
8993 /* Take care of both those symbols that do not describe vtables as
8994 well as those that are not loaded. */
f6e332e6 8995 if (h->vtable == NULL || h->vtable->parent == NULL)
c152c796
AM
8996 return TRUE;
8997
8998 BFD_ASSERT (h->root.type == bfd_link_hash_defined
8999 || h->root.type == bfd_link_hash_defweak);
9000
9001 sec = h->root.u.def.section;
9002 hstart = h->root.u.def.value;
9003 hend = hstart + h->size;
9004
9005 relstart = _bfd_elf_link_read_relocs (sec->owner, sec, NULL, NULL, TRUE);
9006 if (!relstart)
9007 return *(bfd_boolean *) okp = FALSE;
9008 bed = get_elf_backend_data (sec->owner);
9009 log_file_align = bed->s->log_file_align;
9010
9011 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
9012
9013 for (rel = relstart; rel < relend; ++rel)
9014 if (rel->r_offset >= hstart && rel->r_offset < hend)
9015 {
9016 /* If the entry is in use, do nothing. */
f6e332e6
AM
9017 if (h->vtable->used
9018 && (rel->r_offset - hstart) < h->vtable->size)
c152c796
AM
9019 {
9020 bfd_vma entry = (rel->r_offset - hstart) >> log_file_align;
f6e332e6 9021 if (h->vtable->used[entry])
c152c796
AM
9022 continue;
9023 }
9024 /* Otherwise, kill it. */
9025 rel->r_offset = rel->r_info = rel->r_addend = 0;
9026 }
9027
9028 return TRUE;
9029}
9030
715df9b8
EB
9031/* Mark sections containing dynamically referenced symbols. This is called
9032 through elf_link_hash_traverse. */
9033
9034static bfd_boolean
9035elf_gc_mark_dynamic_ref_symbol (struct elf_link_hash_entry *h,
9036 void *okp ATTRIBUTE_UNUSED)
9037{
9038 if (h->root.type == bfd_link_hash_warning)
9039 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9040
9041 if ((h->root.type == bfd_link_hash_defined
9042 || h->root.type == bfd_link_hash_defweak)
f5385ebf 9043 && h->ref_dynamic)
715df9b8
EB
9044 h->root.u.def.section->flags |= SEC_KEEP;
9045
9046 return TRUE;
9047}
57316bff
L
9048
9049/* Mark sections containing global symbols. This is called through
9050 elf_link_hash_traverse. */
715df9b8 9051
57316bff
L
9052static bfd_boolean
9053elf_mark_used_section (struct elf_link_hash_entry *h,
554220db 9054 void *data ATTRIBUTE_UNUSED)
57316bff
L
9055{
9056 if (h->root.type == bfd_link_hash_warning)
9057 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9058
554220db
AM
9059 if (h->root.type == bfd_link_hash_defined
9060 || h->root.type == bfd_link_hash_defweak)
57316bff 9061 {
554220db 9062 asection *s = h->root.u.def.section;
7451fd89 9063 if (s != NULL && s->output_section != NULL)
554220db 9064 s->output_section->flags |= SEC_KEEP;
57316bff
L
9065 }
9066
9067 return TRUE;
9068}
9069
c152c796
AM
9070/* Do mark and sweep of unused sections. */
9071
9072bfd_boolean
9073bfd_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
9074{
9075 bfd_boolean ok = TRUE;
9076 bfd *sub;
9077 asection * (*gc_mark_hook)
9078 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
9079 struct elf_link_hash_entry *h, Elf_Internal_Sym *);
9080
57316bff
L
9081 if (!info->gc_sections)
9082 {
9083 /* If we are called when info->gc_sections is 0, we will mark
554220db 9084 all sections containing global symbols for non-relocatable
57316bff
L
9085 link. */
9086 if (!info->relocatable)
9087 elf_link_hash_traverse (elf_hash_table (info),
9088 elf_mark_used_section, NULL);
9089 return TRUE;
9090 }
9091
c152c796
AM
9092 if (!get_elf_backend_data (abfd)->can_gc_sections
9093 || info->relocatable
9094 || info->emitrelocations
715df9b8
EB
9095 || info->shared
9096 || !is_elf_hash_table (info->hash))
c152c796
AM
9097 {
9098 (*_bfd_error_handler)(_("Warning: gc-sections option ignored"));
9099 return TRUE;
9100 }
9101
9102 /* Apply transitive closure to the vtable entry usage info. */
9103 elf_link_hash_traverse (elf_hash_table (info),
9104 elf_gc_propagate_vtable_entries_used,
9105 &ok);
9106 if (!ok)
9107 return FALSE;
9108
9109 /* Kill the vtable relocations that were not used. */
9110 elf_link_hash_traverse (elf_hash_table (info),
9111 elf_gc_smash_unused_vtentry_relocs,
9112 &ok);
9113 if (!ok)
9114 return FALSE;
9115
715df9b8
EB
9116 /* Mark dynamically referenced symbols. */
9117 if (elf_hash_table (info)->dynamic_sections_created)
9118 elf_link_hash_traverse (elf_hash_table (info),
9119 elf_gc_mark_dynamic_ref_symbol,
9120 &ok);
9121 if (!ok)
9122 return FALSE;
c152c796 9123
715df9b8 9124 /* Grovel through relocs to find out who stays ... */
c152c796
AM
9125 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
9126 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
9127 {
9128 asection *o;
9129
9130 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
9131 continue;
9132
9133 for (o = sub->sections; o != NULL; o = o->next)
9134 {
9135 if (o->flags & SEC_KEEP)
715df9b8
EB
9136 {
9137 /* _bfd_elf_discard_section_eh_frame knows how to discard
9138 orphaned FDEs so don't mark sections referenced by the
9139 EH frame section. */
9140 if (strcmp (o->name, ".eh_frame") == 0)
9141 o->gc_mark = 1;
ccfa59ea 9142 else if (!_bfd_elf_gc_mark (info, o, gc_mark_hook))
715df9b8
EB
9143 return FALSE;
9144 }
c152c796
AM
9145 }
9146 }
9147
9148 /* ... and mark SEC_EXCLUDE for those that go. */
9149 if (!elf_gc_sweep (info, get_elf_backend_data (abfd)->gc_sweep_hook))
9150 return FALSE;
9151
9152 return TRUE;
9153}
9154\f
9155/* Called from check_relocs to record the existence of a VTINHERIT reloc. */
9156
9157bfd_boolean
9158bfd_elf_gc_record_vtinherit (bfd *abfd,
9159 asection *sec,
9160 struct elf_link_hash_entry *h,
9161 bfd_vma offset)
9162{
9163 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
9164 struct elf_link_hash_entry **search, *child;
9165 bfd_size_type extsymcount;
9166 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9167
9168 /* The sh_info field of the symtab header tells us where the
9169 external symbols start. We don't care about the local symbols at
9170 this point. */
9171 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size / bed->s->sizeof_sym;
9172 if (!elf_bad_symtab (abfd))
9173 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
9174
9175 sym_hashes = elf_sym_hashes (abfd);
9176 sym_hashes_end = sym_hashes + extsymcount;
9177
9178 /* Hunt down the child symbol, which is in this section at the same
9179 offset as the relocation. */
9180 for (search = sym_hashes; search != sym_hashes_end; ++search)
9181 {
9182 if ((child = *search) != NULL
9183 && (child->root.type == bfd_link_hash_defined
9184 || child->root.type == bfd_link_hash_defweak)
9185 && child->root.u.def.section == sec
9186 && child->root.u.def.value == offset)
9187 goto win;
9188 }
9189
d003868e
AM
9190 (*_bfd_error_handler) ("%B: %A+%lu: No symbol found for INHERIT",
9191 abfd, sec, (unsigned long) offset);
c152c796
AM
9192 bfd_set_error (bfd_error_invalid_operation);
9193 return FALSE;
9194
9195 win:
f6e332e6
AM
9196 if (!child->vtable)
9197 {
9198 child->vtable = bfd_zalloc (abfd, sizeof (*child->vtable));
9199 if (!child->vtable)
9200 return FALSE;
9201 }
c152c796
AM
9202 if (!h)
9203 {
9204 /* This *should* only be the absolute section. It could potentially
9205 be that someone has defined a non-global vtable though, which
9206 would be bad. It isn't worth paging in the local symbols to be
9207 sure though; that case should simply be handled by the assembler. */
9208
f6e332e6 9209 child->vtable->parent = (struct elf_link_hash_entry *) -1;
c152c796
AM
9210 }
9211 else
f6e332e6 9212 child->vtable->parent = h;
c152c796
AM
9213
9214 return TRUE;
9215}
9216
9217/* Called from check_relocs to record the existence of a VTENTRY reloc. */
9218
9219bfd_boolean
9220bfd_elf_gc_record_vtentry (bfd *abfd ATTRIBUTE_UNUSED,
9221 asection *sec ATTRIBUTE_UNUSED,
9222 struct elf_link_hash_entry *h,
9223 bfd_vma addend)
9224{
9225 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9226 unsigned int log_file_align = bed->s->log_file_align;
9227
f6e332e6
AM
9228 if (!h->vtable)
9229 {
9230 h->vtable = bfd_zalloc (abfd, sizeof (*h->vtable));
9231 if (!h->vtable)
9232 return FALSE;
9233 }
9234
9235 if (addend >= h->vtable->size)
c152c796
AM
9236 {
9237 size_t size, bytes, file_align;
f6e332e6 9238 bfd_boolean *ptr = h->vtable->used;
c152c796
AM
9239
9240 /* While the symbol is undefined, we have to be prepared to handle
9241 a zero size. */
9242 file_align = 1 << log_file_align;
9243 if (h->root.type == bfd_link_hash_undefined)
9244 size = addend + file_align;
9245 else
9246 {
9247 size = h->size;
9248 if (addend >= size)
9249 {
9250 /* Oops! We've got a reference past the defined end of
9251 the table. This is probably a bug -- shall we warn? */
9252 size = addend + file_align;
9253 }
9254 }
9255 size = (size + file_align - 1) & -file_align;
9256
9257 /* Allocate one extra entry for use as a "done" flag for the
9258 consolidation pass. */
9259 bytes = ((size >> log_file_align) + 1) * sizeof (bfd_boolean);
9260
9261 if (ptr)
9262 {
9263 ptr = bfd_realloc (ptr - 1, bytes);
9264
9265 if (ptr != NULL)
9266 {
9267 size_t oldbytes;
9268
f6e332e6 9269 oldbytes = (((h->vtable->size >> log_file_align) + 1)
c152c796
AM
9270 * sizeof (bfd_boolean));
9271 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
9272 }
9273 }
9274 else
9275 ptr = bfd_zmalloc (bytes);
9276
9277 if (ptr == NULL)
9278 return FALSE;
9279
9280 /* And arrange for that done flag to be at index -1. */
f6e332e6
AM
9281 h->vtable->used = ptr + 1;
9282 h->vtable->size = size;
c152c796
AM
9283 }
9284
f6e332e6 9285 h->vtable->used[addend >> log_file_align] = TRUE;
c152c796
AM
9286
9287 return TRUE;
9288}
9289
9290struct alloc_got_off_arg {
9291 bfd_vma gotoff;
9292 unsigned int got_elt_size;
9293};
9294
9295/* We need a special top-level link routine to convert got reference counts
9296 to real got offsets. */
9297
9298static bfd_boolean
9299elf_gc_allocate_got_offsets (struct elf_link_hash_entry *h, void *arg)
9300{
9301 struct alloc_got_off_arg *gofarg = arg;
9302
9303 if (h->root.type == bfd_link_hash_warning)
9304 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9305
9306 if (h->got.refcount > 0)
9307 {
9308 h->got.offset = gofarg->gotoff;
9309 gofarg->gotoff += gofarg->got_elt_size;
9310 }
9311 else
9312 h->got.offset = (bfd_vma) -1;
9313
9314 return TRUE;
9315}
9316
9317/* And an accompanying bit to work out final got entry offsets once
9318 we're done. Should be called from final_link. */
9319
9320bfd_boolean
9321bfd_elf_gc_common_finalize_got_offsets (bfd *abfd,
9322 struct bfd_link_info *info)
9323{
9324 bfd *i;
9325 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9326 bfd_vma gotoff;
9327 unsigned int got_elt_size = bed->s->arch_size / 8;
9328 struct alloc_got_off_arg gofarg;
9329
9330 if (! is_elf_hash_table (info->hash))
9331 return FALSE;
9332
9333 /* The GOT offset is relative to the .got section, but the GOT header is
9334 put into the .got.plt section, if the backend uses it. */
9335 if (bed->want_got_plt)
9336 gotoff = 0;
9337 else
9338 gotoff = bed->got_header_size;
9339
9340 /* Do the local .got entries first. */
9341 for (i = info->input_bfds; i; i = i->link_next)
9342 {
9343 bfd_signed_vma *local_got;
9344 bfd_size_type j, locsymcount;
9345 Elf_Internal_Shdr *symtab_hdr;
9346
9347 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
9348 continue;
9349
9350 local_got = elf_local_got_refcounts (i);
9351 if (!local_got)
9352 continue;
9353
9354 symtab_hdr = &elf_tdata (i)->symtab_hdr;
9355 if (elf_bad_symtab (i))
9356 locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
9357 else
9358 locsymcount = symtab_hdr->sh_info;
9359
9360 for (j = 0; j < locsymcount; ++j)
9361 {
9362 if (local_got[j] > 0)
9363 {
9364 local_got[j] = gotoff;
9365 gotoff += got_elt_size;
9366 }
9367 else
9368 local_got[j] = (bfd_vma) -1;
9369 }
9370 }
9371
9372 /* Then the global .got entries. .plt refcounts are handled by
9373 adjust_dynamic_symbol */
9374 gofarg.gotoff = gotoff;
9375 gofarg.got_elt_size = got_elt_size;
9376 elf_link_hash_traverse (elf_hash_table (info),
9377 elf_gc_allocate_got_offsets,
9378 &gofarg);
9379 return TRUE;
9380}
9381
9382/* Many folk need no more in the way of final link than this, once
9383 got entry reference counting is enabled. */
9384
9385bfd_boolean
9386bfd_elf_gc_common_final_link (bfd *abfd, struct bfd_link_info *info)
9387{
9388 if (!bfd_elf_gc_common_finalize_got_offsets (abfd, info))
9389 return FALSE;
9390
9391 /* Invoke the regular ELF backend linker to do all the work. */
9392 return bfd_elf_final_link (abfd, info);
9393}
9394
9395bfd_boolean
9396bfd_elf_reloc_symbol_deleted_p (bfd_vma offset, void *cookie)
9397{
9398 struct elf_reloc_cookie *rcookie = cookie;
9399
9400 if (rcookie->bad_symtab)
9401 rcookie->rel = rcookie->rels;
9402
9403 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
9404 {
9405 unsigned long r_symndx;
9406
9407 if (! rcookie->bad_symtab)
9408 if (rcookie->rel->r_offset > offset)
9409 return FALSE;
9410 if (rcookie->rel->r_offset != offset)
9411 continue;
9412
9413 r_symndx = rcookie->rel->r_info >> rcookie->r_sym_shift;
9414 if (r_symndx == SHN_UNDEF)
9415 return TRUE;
9416
9417 if (r_symndx >= rcookie->locsymcount
9418 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
9419 {
9420 struct elf_link_hash_entry *h;
9421
9422 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
9423
9424 while (h->root.type == bfd_link_hash_indirect
9425 || h->root.type == bfd_link_hash_warning)
9426 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9427
9428 if ((h->root.type == bfd_link_hash_defined
9429 || h->root.type == bfd_link_hash_defweak)
9430 && elf_discarded_section (h->root.u.def.section))
9431 return TRUE;
9432 else
9433 return FALSE;
9434 }
9435 else
9436 {
9437 /* It's not a relocation against a global symbol,
9438 but it could be a relocation against a local
9439 symbol for a discarded section. */
9440 asection *isec;
9441 Elf_Internal_Sym *isym;
9442
9443 /* Need to: get the symbol; get the section. */
9444 isym = &rcookie->locsyms[r_symndx];
9445 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
9446 {
9447 isec = bfd_section_from_elf_index (rcookie->abfd, isym->st_shndx);
9448 if (isec != NULL && elf_discarded_section (isec))
9449 return TRUE;
9450 }
9451 }
9452 return FALSE;
9453 }
9454 return FALSE;
9455}
9456
9457/* Discard unneeded references to discarded sections.
9458 Returns TRUE if any section's size was changed. */
9459/* This function assumes that the relocations are in sorted order,
9460 which is true for all known assemblers. */
9461
9462bfd_boolean
9463bfd_elf_discard_info (bfd *output_bfd, struct bfd_link_info *info)
9464{
9465 struct elf_reloc_cookie cookie;
9466 asection *stab, *eh;
9467 Elf_Internal_Shdr *symtab_hdr;
9468 const struct elf_backend_data *bed;
9469 bfd *abfd;
9470 unsigned int count;
9471 bfd_boolean ret = FALSE;
9472
9473 if (info->traditional_format
9474 || !is_elf_hash_table (info->hash))
9475 return FALSE;
9476
9477 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
9478 {
9479 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
9480 continue;
9481
9482 bed = get_elf_backend_data (abfd);
9483
9484 if ((abfd->flags & DYNAMIC) != 0)
9485 continue;
9486
9487 eh = bfd_get_section_by_name (abfd, ".eh_frame");
9488 if (info->relocatable
9489 || (eh != NULL
eea6121a 9490 && (eh->size == 0
c152c796
AM
9491 || bfd_is_abs_section (eh->output_section))))
9492 eh = NULL;
9493
9494 stab = bfd_get_section_by_name (abfd, ".stab");
9495 if (stab != NULL
eea6121a 9496 && (stab->size == 0
c152c796
AM
9497 || bfd_is_abs_section (stab->output_section)
9498 || stab->sec_info_type != ELF_INFO_TYPE_STABS))
9499 stab = NULL;
9500
9501 if (stab == NULL
9502 && eh == NULL
9503 && bed->elf_backend_discard_info == NULL)
9504 continue;
9505
9506 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
9507 cookie.abfd = abfd;
9508 cookie.sym_hashes = elf_sym_hashes (abfd);
9509 cookie.bad_symtab = elf_bad_symtab (abfd);
9510 if (cookie.bad_symtab)
9511 {
9512 cookie.locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
9513 cookie.extsymoff = 0;
9514 }
9515 else
9516 {
9517 cookie.locsymcount = symtab_hdr->sh_info;
9518 cookie.extsymoff = symtab_hdr->sh_info;
9519 }
9520
9521 if (bed->s->arch_size == 32)
9522 cookie.r_sym_shift = 8;
9523 else
9524 cookie.r_sym_shift = 32;
9525
9526 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
9527 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
9528 {
9529 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
9530 cookie.locsymcount, 0,
9531 NULL, NULL, NULL);
9532 if (cookie.locsyms == NULL)
9533 return FALSE;
9534 }
9535
9536 if (stab != NULL)
9537 {
9538 cookie.rels = NULL;
9539 count = stab->reloc_count;
9540 if (count != 0)
9541 cookie.rels = _bfd_elf_link_read_relocs (abfd, stab, NULL, NULL,
9542 info->keep_memory);
9543 if (cookie.rels != NULL)
9544 {
9545 cookie.rel = cookie.rels;
9546 cookie.relend = cookie.rels;
9547 cookie.relend += count * bed->s->int_rels_per_ext_rel;
9548 if (_bfd_discard_section_stabs (abfd, stab,
9549 elf_section_data (stab)->sec_info,
9550 bfd_elf_reloc_symbol_deleted_p,
9551 &cookie))
9552 ret = TRUE;
9553 if (elf_section_data (stab)->relocs != cookie.rels)
9554 free (cookie.rels);
9555 }
9556 }
9557
9558 if (eh != NULL)
9559 {
9560 cookie.rels = NULL;
9561 count = eh->reloc_count;
9562 if (count != 0)
9563 cookie.rels = _bfd_elf_link_read_relocs (abfd, eh, NULL, NULL,
9564 info->keep_memory);
9565 cookie.rel = cookie.rels;
9566 cookie.relend = cookie.rels;
9567 if (cookie.rels != NULL)
9568 cookie.relend += count * bed->s->int_rels_per_ext_rel;
9569
9570 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh,
9571 bfd_elf_reloc_symbol_deleted_p,
9572 &cookie))
9573 ret = TRUE;
9574
9575 if (cookie.rels != NULL
9576 && elf_section_data (eh)->relocs != cookie.rels)
9577 free (cookie.rels);
9578 }
9579
9580 if (bed->elf_backend_discard_info != NULL
9581 && (*bed->elf_backend_discard_info) (abfd, &cookie, info))
9582 ret = TRUE;
9583
9584 if (cookie.locsyms != NULL
9585 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
9586 {
9587 if (! info->keep_memory)
9588 free (cookie.locsyms);
9589 else
9590 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
9591 }
9592 }
9593
9594 if (info->eh_frame_hdr
9595 && !info->relocatable
9596 && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info))
9597 ret = TRUE;
9598
9599 return ret;
9600}
082b7297
L
9601
9602void
9603_bfd_elf_section_already_linked (bfd *abfd, struct bfd_section * sec)
9604{
9605 flagword flags;
6d2cd210 9606 const char *name, *p;
082b7297
L
9607 struct bfd_section_already_linked *l;
9608 struct bfd_section_already_linked_hash_entry *already_linked_list;
3d7f7666
L
9609 asection *group;
9610
9611 /* A single member comdat group section may be discarded by a
9612 linkonce section. See below. */
9613 if (sec->output_section == bfd_abs_section_ptr)
9614 return;
082b7297
L
9615
9616 flags = sec->flags;
3d7f7666
L
9617
9618 /* Check if it belongs to a section group. */
9619 group = elf_sec_group (sec);
9620
9621 /* Return if it isn't a linkonce section nor a member of a group. A
9622 comdat group section also has SEC_LINK_ONCE set. */
9623 if ((flags & SEC_LINK_ONCE) == 0 && group == NULL)
082b7297
L
9624 return;
9625
3d7f7666
L
9626 if (group)
9627 {
9628 /* If this is the member of a single member comdat group, check if
9629 the group should be discarded. */
9630 if (elf_next_in_group (sec) == sec
9631 && (group->flags & SEC_LINK_ONCE) != 0)
9632 sec = group;
9633 else
9634 return;
9635 }
9636
082b7297
L
9637 /* FIXME: When doing a relocatable link, we may have trouble
9638 copying relocations in other sections that refer to local symbols
9639 in the section being discarded. Those relocations will have to
9640 be converted somehow; as of this writing I'm not sure that any of
9641 the backends handle that correctly.
9642
9643 It is tempting to instead not discard link once sections when
9644 doing a relocatable link (technically, they should be discarded
9645 whenever we are building constructors). However, that fails,
9646 because the linker winds up combining all the link once sections
9647 into a single large link once section, which defeats the purpose
9648 of having link once sections in the first place.
9649
9650 Also, not merging link once sections in a relocatable link
9651 causes trouble for MIPS ELF, which relies on link once semantics
9652 to handle the .reginfo section correctly. */
9653
9654 name = bfd_get_section_name (abfd, sec);
9655
6d2cd210
JJ
9656 if (strncmp (name, ".gnu.linkonce.", sizeof (".gnu.linkonce.") - 1) == 0
9657 && (p = strchr (name + sizeof (".gnu.linkonce.") - 1, '.')) != NULL)
9658 p++;
9659 else
9660 p = name;
9661
9662 already_linked_list = bfd_section_already_linked_table_lookup (p);
082b7297
L
9663
9664 for (l = already_linked_list->entry; l != NULL; l = l->next)
9665 {
9666 /* We may have 3 different sections on the list: group section,
9667 comdat section and linkonce section. SEC may be a linkonce or
9668 group section. We match a group section with a group section,
9669 a linkonce section with a linkonce section, and ignore comdat
9670 section. */
3d7f7666 9671 if ((flags & SEC_GROUP) == (l->sec->flags & SEC_GROUP)
6d2cd210 9672 && strcmp (name, l->sec->name) == 0
082b7297
L
9673 && bfd_coff_get_comdat_section (l->sec->owner, l->sec) == NULL)
9674 {
9675 /* The section has already been linked. See if we should
6d2cd210 9676 issue a warning. */
082b7297
L
9677 switch (flags & SEC_LINK_DUPLICATES)
9678 {
9679 default:
9680 abort ();
9681
9682 case SEC_LINK_DUPLICATES_DISCARD:
9683 break;
9684
9685 case SEC_LINK_DUPLICATES_ONE_ONLY:
9686 (*_bfd_error_handler)
c93625e2 9687 (_("%B: ignoring duplicate section `%A'"),
d003868e 9688 abfd, sec);
082b7297
L
9689 break;
9690
9691 case SEC_LINK_DUPLICATES_SAME_SIZE:
9692 if (sec->size != l->sec->size)
9693 (*_bfd_error_handler)
c93625e2 9694 (_("%B: duplicate section `%A' has different size"),
d003868e 9695 abfd, sec);
082b7297 9696 break;
ea5158d8
DJ
9697
9698 case SEC_LINK_DUPLICATES_SAME_CONTENTS:
9699 if (sec->size != l->sec->size)
9700 (*_bfd_error_handler)
c93625e2 9701 (_("%B: duplicate section `%A' has different size"),
ea5158d8
DJ
9702 abfd, sec);
9703 else if (sec->size != 0)
9704 {
9705 bfd_byte *sec_contents, *l_sec_contents;
9706
9707 if (!bfd_malloc_and_get_section (abfd, sec, &sec_contents))
9708 (*_bfd_error_handler)
c93625e2 9709 (_("%B: warning: could not read contents of section `%A'"),
ea5158d8
DJ
9710 abfd, sec);
9711 else if (!bfd_malloc_and_get_section (l->sec->owner, l->sec,
9712 &l_sec_contents))
9713 (*_bfd_error_handler)
c93625e2 9714 (_("%B: warning: could not read contents of section `%A'"),
ea5158d8
DJ
9715 l->sec->owner, l->sec);
9716 else if (memcmp (sec_contents, l_sec_contents, sec->size) != 0)
9717 (*_bfd_error_handler)
c93625e2 9718 (_("%B: warning: duplicate section `%A' has different contents"),
ea5158d8
DJ
9719 abfd, sec);
9720
9721 if (sec_contents)
9722 free (sec_contents);
9723 if (l_sec_contents)
9724 free (l_sec_contents);
9725 }
9726 break;
082b7297
L
9727 }
9728
9729 /* Set the output_section field so that lang_add_section
9730 does not create a lang_input_section structure for this
9731 section. Since there might be a symbol in the section
9732 being discarded, we must retain a pointer to the section
9733 which we are really going to use. */
9734 sec->output_section = bfd_abs_section_ptr;
9735 sec->kept_section = l->sec;
9736
9737 if (flags & SEC_GROUP)
3d7f7666
L
9738 {
9739 asection *first = elf_next_in_group (sec);
9740 asection *s = first;
9741
9742 while (s != NULL)
9743 {
9744 s->output_section = bfd_abs_section_ptr;
9745 /* Record which group discards it. */
9746 s->kept_section = l->sec;
9747 s = elf_next_in_group (s);
9748 /* These lists are circular. */
9749 if (s == first)
9750 break;
9751 }
9752 }
082b7297
L
9753
9754 return;
9755 }
9756 }
9757
3d7f7666
L
9758 if (group)
9759 {
9760 /* If this is the member of a single member comdat group and the
9761 group hasn't be discarded, we check if it matches a linkonce
9762 section. We only record the discarded comdat group. Otherwise
9763 the undiscarded group will be discarded incorrectly later since
9764 itself has been recorded. */
6d2cd210
JJ
9765 for (l = already_linked_list->entry; l != NULL; l = l->next)
9766 if ((l->sec->flags & SEC_GROUP) == 0
9767 && bfd_coff_get_comdat_section (l->sec->owner, l->sec) == NULL
9768 && bfd_elf_match_symbols_in_sections (l->sec,
9769 elf_next_in_group (sec)))
9770 {
9771 elf_next_in_group (sec)->output_section = bfd_abs_section_ptr;
9772 elf_next_in_group (sec)->kept_section = l->sec;
9773 group->output_section = bfd_abs_section_ptr;
9774 break;
9775 }
9776 if (l == NULL)
3d7f7666
L
9777 return;
9778 }
9779 else
9780 /* There is no direct match. But for linkonce section, we should
9781 check if there is a match with comdat group member. We always
9782 record the linkonce section, discarded or not. */
6d2cd210
JJ
9783 for (l = already_linked_list->entry; l != NULL; l = l->next)
9784 if (l->sec->flags & SEC_GROUP)
9785 {
9786 asection *first = elf_next_in_group (l->sec);
9787
9788 if (first != NULL
9789 && elf_next_in_group (first) == first
9790 && bfd_elf_match_symbols_in_sections (first, sec))
9791 {
9792 sec->output_section = bfd_abs_section_ptr;
9793 sec->kept_section = l->sec;
9794 break;
9795 }
9796 }
9797
082b7297
L
9798 /* This is the first section with this name. Record it. */
9799 bfd_section_already_linked_table_insert (already_linked_list, sec);
9800}
81e1b023
L
9801
9802/* Set NAME to VAL if the symbol exists and is undefined. */
9803
9804void
9805_bfd_elf_provide_symbol (struct bfd_link_info *info, const char *name,
9806 bfd_vma val)
9807{
9808 struct elf_link_hash_entry *h;
9809 h = elf_link_hash_lookup (elf_hash_table (info), name, FALSE, FALSE,
9810 FALSE);
9811 if (h != NULL && h->root.type == bfd_link_hash_undefined)
9812 {
9813 h->root.type = bfd_link_hash_defined;
9814 h->root.u.def.section = bfd_abs_section_ptr;
9815 h->root.u.def.value = val;
9816 h->def_regular = 1;
9817 h->type = STT_OBJECT;
9818 h->other = STV_HIDDEN | (h->other & ~ ELF_ST_VISIBILITY (-1));
9819 h->forced_local = 1;
9820 }
9821}