]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elflink.c
* link.cmd: Remove.
[thirdparty/binutils-gdb.git] / bfd / elflink.c
CommitLineData
252b5132 1/* ELF linking support for BFD.
7e9f0867 2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005
7898deda 3 Free Software Foundation, Inc.
252b5132 4
8fdd7217 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
8fdd7217
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
252b5132 11
8fdd7217
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
8fdd7217
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
20
21#include "bfd.h"
22#include "sysdep.h"
23#include "bfdlink.h"
24#include "libbfd.h"
25#define ARCH_SIZE 0
26#include "elf-bfd.h"
4ad4eba5 27#include "safe-ctype.h"
ccf2f652 28#include "libiberty.h"
252b5132 29
b34976b6 30bfd_boolean
268b6b39 31_bfd_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
32{
33 flagword flags;
aad5d350 34 asection *s;
252b5132 35 struct elf_link_hash_entry *h;
14a793b2 36 struct bfd_link_hash_entry *bh;
9c5bfbb7 37 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
38 int ptralign;
39
40 /* This function may be called more than once. */
aad5d350
AM
41 s = bfd_get_section_by_name (abfd, ".got");
42 if (s != NULL && (s->flags & SEC_LINKER_CREATED) != 0)
b34976b6 43 return TRUE;
252b5132
RH
44
45 switch (bed->s->arch_size)
46 {
bb0deeff
AO
47 case 32:
48 ptralign = 2;
49 break;
50
51 case 64:
52 ptralign = 3;
53 break;
54
55 default:
56 bfd_set_error (bfd_error_bad_value);
b34976b6 57 return FALSE;
252b5132
RH
58 }
59
e5a52504 60 flags = bed->dynamic_sec_flags;
252b5132
RH
61
62 s = bfd_make_section (abfd, ".got");
63 if (s == NULL
64 || !bfd_set_section_flags (abfd, s, flags)
65 || !bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 66 return FALSE;
252b5132
RH
67
68 if (bed->want_got_plt)
69 {
70 s = bfd_make_section (abfd, ".got.plt");
71 if (s == NULL
72 || !bfd_set_section_flags (abfd, s, flags)
73 || !bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 74 return FALSE;
252b5132
RH
75 }
76
2517a57f
AM
77 if (bed->want_got_sym)
78 {
79 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
80 (or .got.plt) section. We don't do this in the linker script
81 because we don't want to define the symbol if we are not creating
82 a global offset table. */
14a793b2 83 bh = NULL;
2517a57f
AM
84 if (!(_bfd_generic_link_add_one_symbol
85 (info, abfd, "_GLOBAL_OFFSET_TABLE_", BSF_GLOBAL, s,
268b6b39 86 bed->got_symbol_offset, NULL, FALSE, bed->collect, &bh)))
b34976b6 87 return FALSE;
14a793b2 88 h = (struct elf_link_hash_entry *) bh;
f5385ebf 89 h->def_regular = 1;
2517a57f 90 h->type = STT_OBJECT;
e6857c0c 91 h->other = STV_HIDDEN;
252b5132 92
36af4a4e 93 if (! info->executable
c152c796 94 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 95 return FALSE;
252b5132 96
2517a57f
AM
97 elf_hash_table (info)->hgot = h;
98 }
252b5132
RH
99
100 /* The first bit of the global offset table is the header. */
eea6121a 101 s->size += bed->got_header_size + bed->got_symbol_offset;
252b5132 102
b34976b6 103 return TRUE;
252b5132
RH
104}
105\f
7e9f0867
AM
106/* Create a strtab to hold the dynamic symbol names. */
107static bfd_boolean
108_bfd_elf_link_create_dynstrtab (bfd *abfd, struct bfd_link_info *info)
109{
110 struct elf_link_hash_table *hash_table;
111
112 hash_table = elf_hash_table (info);
113 if (hash_table->dynobj == NULL)
114 hash_table->dynobj = abfd;
115
116 if (hash_table->dynstr == NULL)
117 {
118 hash_table->dynstr = _bfd_elf_strtab_init ();
119 if (hash_table->dynstr == NULL)
120 return FALSE;
121 }
122 return TRUE;
123}
124
45d6a902
AM
125/* Create some sections which will be filled in with dynamic linking
126 information. ABFD is an input file which requires dynamic sections
127 to be created. The dynamic sections take up virtual memory space
128 when the final executable is run, so we need to create them before
129 addresses are assigned to the output sections. We work out the
130 actual contents and size of these sections later. */
252b5132 131
b34976b6 132bfd_boolean
268b6b39 133_bfd_elf_link_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 134{
45d6a902
AM
135 flagword flags;
136 register asection *s;
137 struct elf_link_hash_entry *h;
138 struct bfd_link_hash_entry *bh;
9c5bfbb7 139 const struct elf_backend_data *bed;
252b5132 140
0eddce27 141 if (! is_elf_hash_table (info->hash))
45d6a902
AM
142 return FALSE;
143
144 if (elf_hash_table (info)->dynamic_sections_created)
145 return TRUE;
146
7e9f0867
AM
147 if (!_bfd_elf_link_create_dynstrtab (abfd, info))
148 return FALSE;
45d6a902 149
7e9f0867 150 abfd = elf_hash_table (info)->dynobj;
e5a52504
MM
151 bed = get_elf_backend_data (abfd);
152
153 flags = bed->dynamic_sec_flags;
45d6a902
AM
154
155 /* A dynamically linked executable has a .interp section, but a
156 shared library does not. */
36af4a4e 157 if (info->executable)
252b5132 158 {
45d6a902
AM
159 s = bfd_make_section (abfd, ".interp");
160 if (s == NULL
161 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
162 return FALSE;
163 }
bb0deeff 164
0eddce27 165 if (! info->traditional_format)
45d6a902
AM
166 {
167 s = bfd_make_section (abfd, ".eh_frame_hdr");
168 if (s == NULL
169 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
170 || ! bfd_set_section_alignment (abfd, s, 2))
171 return FALSE;
172 elf_hash_table (info)->eh_info.hdr_sec = s;
173 }
bb0deeff 174
45d6a902
AM
175 /* Create sections to hold version informations. These are removed
176 if they are not needed. */
177 s = bfd_make_section (abfd, ".gnu.version_d");
178 if (s == NULL
179 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
180 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
181 return FALSE;
182
183 s = bfd_make_section (abfd, ".gnu.version");
184 if (s == NULL
185 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
186 || ! bfd_set_section_alignment (abfd, s, 1))
187 return FALSE;
188
189 s = bfd_make_section (abfd, ".gnu.version_r");
190 if (s == NULL
191 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
192 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
193 return FALSE;
194
195 s = bfd_make_section (abfd, ".dynsym");
196 if (s == NULL
197 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
198 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
199 return FALSE;
200
201 s = bfd_make_section (abfd, ".dynstr");
202 if (s == NULL
203 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
204 return FALSE;
205
45d6a902
AM
206 s = bfd_make_section (abfd, ".dynamic");
207 if (s == NULL
208 || ! bfd_set_section_flags (abfd, s, flags)
209 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
210 return FALSE;
211
212 /* The special symbol _DYNAMIC is always set to the start of the
77cfaee6
AM
213 .dynamic section. We could set _DYNAMIC in a linker script, but we
214 only want to define it if we are, in fact, creating a .dynamic
215 section. We don't want to define it if there is no .dynamic
216 section, since on some ELF platforms the start up code examines it
217 to decide how to initialize the process. */
218 h = elf_link_hash_lookup (elf_hash_table (info), "_DYNAMIC",
219 FALSE, FALSE, FALSE);
220 if (h != NULL)
221 {
222 /* Zap symbol defined in an as-needed lib that wasn't linked.
223 This is a symptom of a larger problem: Absolute symbols
224 defined in shared libraries can't be overridden, because we
225 lose the link to the bfd which is via the symbol section. */
226 h->root.type = bfd_link_hash_new;
227 }
228 bh = &h->root;
45d6a902 229 if (! (_bfd_generic_link_add_one_symbol
268b6b39
AM
230 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, 0, NULL, FALSE,
231 get_elf_backend_data (abfd)->collect, &bh)))
45d6a902
AM
232 return FALSE;
233 h = (struct elf_link_hash_entry *) bh;
f5385ebf 234 h->def_regular = 1;
45d6a902
AM
235 h->type = STT_OBJECT;
236
36af4a4e 237 if (! info->executable
c152c796 238 && ! bfd_elf_link_record_dynamic_symbol (info, h))
45d6a902
AM
239 return FALSE;
240
241 s = bfd_make_section (abfd, ".hash");
242 if (s == NULL
243 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
244 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
245 return FALSE;
246 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
247
248 /* Let the backend create the rest of the sections. This lets the
249 backend set the right flags. The backend will normally create
250 the .got and .plt sections. */
251 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
252 return FALSE;
253
254 elf_hash_table (info)->dynamic_sections_created = TRUE;
255
256 return TRUE;
257}
258
259/* Create dynamic sections when linking against a dynamic object. */
260
261bfd_boolean
268b6b39 262_bfd_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
45d6a902
AM
263{
264 flagword flags, pltflags;
265 asection *s;
9c5bfbb7 266 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902 267
252b5132
RH
268 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
269 .rel[a].bss sections. */
e5a52504 270 flags = bed->dynamic_sec_flags;
252b5132
RH
271
272 pltflags = flags;
252b5132 273 if (bed->plt_not_loaded)
6df4d94c
MM
274 /* We do not clear SEC_ALLOC here because we still want the OS to
275 allocate space for the section; it's just that there's nothing
276 to read in from the object file. */
5d1634d7 277 pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
6df4d94c
MM
278 else
279 pltflags |= SEC_ALLOC | SEC_CODE | SEC_LOAD;
252b5132
RH
280 if (bed->plt_readonly)
281 pltflags |= SEC_READONLY;
282
283 s = bfd_make_section (abfd, ".plt");
284 if (s == NULL
285 || ! bfd_set_section_flags (abfd, s, pltflags)
286 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
b34976b6 287 return FALSE;
252b5132
RH
288
289 if (bed->want_plt_sym)
290 {
291 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
292 .plt section. */
14a793b2
AM
293 struct elf_link_hash_entry *h;
294 struct bfd_link_hash_entry *bh = NULL;
295
252b5132 296 if (! (_bfd_generic_link_add_one_symbol
268b6b39
AM
297 (info, abfd, "_PROCEDURE_LINKAGE_TABLE_", BSF_GLOBAL, s, 0, NULL,
298 FALSE, get_elf_backend_data (abfd)->collect, &bh)))
b34976b6 299 return FALSE;
14a793b2 300 h = (struct elf_link_hash_entry *) bh;
f5385ebf 301 h->def_regular = 1;
252b5132
RH
302 h->type = STT_OBJECT;
303
36af4a4e 304 if (! info->executable
c152c796 305 && ! bfd_elf_link_record_dynamic_symbol (info, h))
b34976b6 306 return FALSE;
252b5132
RH
307 }
308
3e932841 309 s = bfd_make_section (abfd,
bf572ba0 310 bed->default_use_rela_p ? ".rela.plt" : ".rel.plt");
252b5132
RH
311 if (s == NULL
312 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
45d6a902 313 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
b34976b6 314 return FALSE;
252b5132
RH
315
316 if (! _bfd_elf_create_got_section (abfd, info))
b34976b6 317 return FALSE;
252b5132 318
3018b441
RH
319 if (bed->want_dynbss)
320 {
321 /* The .dynbss section is a place to put symbols which are defined
322 by dynamic objects, are referenced by regular objects, and are
323 not functions. We must allocate space for them in the process
324 image and use a R_*_COPY reloc to tell the dynamic linker to
325 initialize them at run time. The linker script puts the .dynbss
326 section into the .bss section of the final image. */
327 s = bfd_make_section (abfd, ".dynbss");
328 if (s == NULL
77f3d027 329 || ! bfd_set_section_flags (abfd, s, SEC_ALLOC | SEC_LINKER_CREATED))
b34976b6 330 return FALSE;
252b5132 331
3018b441 332 /* The .rel[a].bss section holds copy relocs. This section is not
77cfaee6
AM
333 normally needed. We need to create it here, though, so that the
334 linker will map it to an output section. We can't just create it
335 only if we need it, because we will not know whether we need it
336 until we have seen all the input files, and the first time the
337 main linker code calls BFD after examining all the input files
338 (size_dynamic_sections) the input sections have already been
339 mapped to the output sections. If the section turns out not to
340 be needed, we can discard it later. We will never need this
341 section when generating a shared object, since they do not use
342 copy relocs. */
3018b441
RH
343 if (! info->shared)
344 {
3e932841
KH
345 s = bfd_make_section (abfd,
346 (bed->default_use_rela_p
347 ? ".rela.bss" : ".rel.bss"));
3018b441
RH
348 if (s == NULL
349 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
45d6a902 350 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
b34976b6 351 return FALSE;
3018b441 352 }
252b5132
RH
353 }
354
b34976b6 355 return TRUE;
252b5132
RH
356}
357\f
252b5132
RH
358/* Record a new dynamic symbol. We record the dynamic symbols as we
359 read the input files, since we need to have a list of all of them
360 before we can determine the final sizes of the output sections.
361 Note that we may actually call this function even though we are not
362 going to output any dynamic symbols; in some cases we know that a
363 symbol should be in the dynamic symbol table, but only if there is
364 one. */
365
b34976b6 366bfd_boolean
c152c796
AM
367bfd_elf_link_record_dynamic_symbol (struct bfd_link_info *info,
368 struct elf_link_hash_entry *h)
252b5132
RH
369{
370 if (h->dynindx == -1)
371 {
2b0f7ef9 372 struct elf_strtab_hash *dynstr;
68b6ddd0 373 char *p;
252b5132 374 const char *name;
252b5132
RH
375 bfd_size_type indx;
376
7a13edea
NC
377 /* XXX: The ABI draft says the linker must turn hidden and
378 internal symbols into STB_LOCAL symbols when producing the
379 DSO. However, if ld.so honors st_other in the dynamic table,
380 this would not be necessary. */
381 switch (ELF_ST_VISIBILITY (h->other))
382 {
383 case STV_INTERNAL:
384 case STV_HIDDEN:
9d6eee78
L
385 if (h->root.type != bfd_link_hash_undefined
386 && h->root.type != bfd_link_hash_undefweak)
38048eb9 387 {
f5385ebf 388 h->forced_local = 1;
67687978
PB
389 if (!elf_hash_table (info)->is_relocatable_executable)
390 return TRUE;
7a13edea 391 }
0444bdd4 392
7a13edea
NC
393 default:
394 break;
395 }
396
252b5132
RH
397 h->dynindx = elf_hash_table (info)->dynsymcount;
398 ++elf_hash_table (info)->dynsymcount;
399
400 dynstr = elf_hash_table (info)->dynstr;
401 if (dynstr == NULL)
402 {
403 /* Create a strtab to hold the dynamic symbol names. */
2b0f7ef9 404 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_strtab_init ();
252b5132 405 if (dynstr == NULL)
b34976b6 406 return FALSE;
252b5132
RH
407 }
408
409 /* We don't put any version information in the dynamic string
aad5d350 410 table. */
252b5132
RH
411 name = h->root.root.string;
412 p = strchr (name, ELF_VER_CHR);
68b6ddd0
AM
413 if (p != NULL)
414 /* We know that the p points into writable memory. In fact,
415 there are only a few symbols that have read-only names, being
416 those like _GLOBAL_OFFSET_TABLE_ that are created specially
417 by the backends. Most symbols will have names pointing into
418 an ELF string table read from a file, or to objalloc memory. */
419 *p = 0;
420
421 indx = _bfd_elf_strtab_add (dynstr, name, p != NULL);
422
423 if (p != NULL)
424 *p = ELF_VER_CHR;
252b5132
RH
425
426 if (indx == (bfd_size_type) -1)
b34976b6 427 return FALSE;
252b5132
RH
428 h->dynstr_index = indx;
429 }
430
b34976b6 431 return TRUE;
252b5132 432}
45d6a902
AM
433\f
434/* Record an assignment to a symbol made by a linker script. We need
435 this in case some dynamic object refers to this symbol. */
436
437bfd_boolean
268b6b39
AM
438bfd_elf_record_link_assignment (bfd *output_bfd ATTRIBUTE_UNUSED,
439 struct bfd_link_info *info,
440 const char *name,
441 bfd_boolean provide)
45d6a902
AM
442{
443 struct elf_link_hash_entry *h;
4ea42fb7 444 struct elf_link_hash_table *htab;
45d6a902 445
0eddce27 446 if (!is_elf_hash_table (info->hash))
45d6a902
AM
447 return TRUE;
448
4ea42fb7
AM
449 htab = elf_hash_table (info);
450 h = elf_link_hash_lookup (htab, name, !provide, TRUE, FALSE);
45d6a902 451 if (h == NULL)
4ea42fb7 452 return provide;
45d6a902 453
02bb6eae
AO
454 /* Since we're defining the symbol, don't let it seem to have not
455 been defined. record_dynamic_symbol and size_dynamic_sections
77cfaee6 456 may depend on this. */
02bb6eae
AO
457 if (h->root.type == bfd_link_hash_undefweak
458 || h->root.type == bfd_link_hash_undefined)
77cfaee6 459 {
4ea42fb7 460 h->root.type = bfd_link_hash_new;
77cfaee6
AM
461 if (h->root.u.undef.next != NULL || htab->root.undefs_tail == &h->root)
462 bfd_link_repair_undef_list (&htab->root);
77cfaee6 463 }
02bb6eae 464
45d6a902 465 if (h->root.type == bfd_link_hash_new)
f5385ebf 466 h->non_elf = 0;
45d6a902
AM
467
468 /* If this symbol is being provided by the linker script, and it is
469 currently defined by a dynamic object, but not by a regular
470 object, then mark it as undefined so that the generic linker will
471 force the correct value. */
472 if (provide
f5385ebf
AM
473 && h->def_dynamic
474 && !h->def_regular)
45d6a902
AM
475 h->root.type = bfd_link_hash_undefined;
476
477 /* If this symbol is not being provided by the linker script, and it is
478 currently defined by a dynamic object, but not by a regular object,
479 then clear out any version information because the symbol will not be
480 associated with the dynamic object any more. */
481 if (!provide
f5385ebf
AM
482 && h->def_dynamic
483 && !h->def_regular)
45d6a902
AM
484 h->verinfo.verdef = NULL;
485
f5385ebf 486 h->def_regular = 1;
45d6a902 487
6fa3860b
PB
488 /* STV_HIDDEN and STV_INTERNAL symbols must be STB_LOCAL in shared objects
489 and executables. */
490 if (!info->relocatable
491 && h->dynindx != -1
492 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
493 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
494 h->forced_local = 1;
495
f5385ebf
AM
496 if ((h->def_dynamic
497 || h->ref_dynamic
67687978
PB
498 || info->shared
499 || (info->executable && elf_hash_table (info)->is_relocatable_executable))
45d6a902
AM
500 && h->dynindx == -1)
501 {
c152c796 502 if (! bfd_elf_link_record_dynamic_symbol (info, h))
45d6a902
AM
503 return FALSE;
504
505 /* If this is a weak defined symbol, and we know a corresponding
506 real symbol from the same dynamic object, make sure the real
507 symbol is also made into a dynamic symbol. */
f6e332e6
AM
508 if (h->u.weakdef != NULL
509 && h->u.weakdef->dynindx == -1)
45d6a902 510 {
f6e332e6 511 if (! bfd_elf_link_record_dynamic_symbol (info, h->u.weakdef))
45d6a902
AM
512 return FALSE;
513 }
514 }
515
516 return TRUE;
517}
42751cf3 518
8c58d23b
AM
519/* Record a new local dynamic symbol. Returns 0 on failure, 1 on
520 success, and 2 on a failure caused by attempting to record a symbol
521 in a discarded section, eg. a discarded link-once section symbol. */
522
523int
c152c796
AM
524bfd_elf_link_record_local_dynamic_symbol (struct bfd_link_info *info,
525 bfd *input_bfd,
526 long input_indx)
8c58d23b
AM
527{
528 bfd_size_type amt;
529 struct elf_link_local_dynamic_entry *entry;
530 struct elf_link_hash_table *eht;
531 struct elf_strtab_hash *dynstr;
532 unsigned long dynstr_index;
533 char *name;
534 Elf_External_Sym_Shndx eshndx;
535 char esym[sizeof (Elf64_External_Sym)];
536
0eddce27 537 if (! is_elf_hash_table (info->hash))
8c58d23b
AM
538 return 0;
539
540 /* See if the entry exists already. */
541 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
542 if (entry->input_bfd == input_bfd && entry->input_indx == input_indx)
543 return 1;
544
545 amt = sizeof (*entry);
268b6b39 546 entry = bfd_alloc (input_bfd, amt);
8c58d23b
AM
547 if (entry == NULL)
548 return 0;
549
550 /* Go find the symbol, so that we can find it's name. */
551 if (!bfd_elf_get_elf_syms (input_bfd, &elf_tdata (input_bfd)->symtab_hdr,
268b6b39 552 1, input_indx, &entry->isym, esym, &eshndx))
8c58d23b
AM
553 {
554 bfd_release (input_bfd, entry);
555 return 0;
556 }
557
558 if (entry->isym.st_shndx != SHN_UNDEF
559 && (entry->isym.st_shndx < SHN_LORESERVE
560 || entry->isym.st_shndx > SHN_HIRESERVE))
561 {
562 asection *s;
563
564 s = bfd_section_from_elf_index (input_bfd, entry->isym.st_shndx);
565 if (s == NULL || bfd_is_abs_section (s->output_section))
566 {
567 /* We can still bfd_release here as nothing has done another
568 bfd_alloc. We can't do this later in this function. */
569 bfd_release (input_bfd, entry);
570 return 2;
571 }
572 }
573
574 name = (bfd_elf_string_from_elf_section
575 (input_bfd, elf_tdata (input_bfd)->symtab_hdr.sh_link,
576 entry->isym.st_name));
577
578 dynstr = elf_hash_table (info)->dynstr;
579 if (dynstr == NULL)
580 {
581 /* Create a strtab to hold the dynamic symbol names. */
582 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_strtab_init ();
583 if (dynstr == NULL)
584 return 0;
585 }
586
b34976b6 587 dynstr_index = _bfd_elf_strtab_add (dynstr, name, FALSE);
8c58d23b
AM
588 if (dynstr_index == (unsigned long) -1)
589 return 0;
590 entry->isym.st_name = dynstr_index;
591
592 eht = elf_hash_table (info);
593
594 entry->next = eht->dynlocal;
595 eht->dynlocal = entry;
596 entry->input_bfd = input_bfd;
597 entry->input_indx = input_indx;
598 eht->dynsymcount++;
599
600 /* Whatever binding the symbol had before, it's now local. */
601 entry->isym.st_info
602 = ELF_ST_INFO (STB_LOCAL, ELF_ST_TYPE (entry->isym.st_info));
603
604 /* The dynindx will be set at the end of size_dynamic_sections. */
605
606 return 1;
607}
608
30b30c21 609/* Return the dynindex of a local dynamic symbol. */
42751cf3 610
30b30c21 611long
268b6b39
AM
612_bfd_elf_link_lookup_local_dynindx (struct bfd_link_info *info,
613 bfd *input_bfd,
614 long input_indx)
30b30c21
RH
615{
616 struct elf_link_local_dynamic_entry *e;
617
618 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
619 if (e->input_bfd == input_bfd && e->input_indx == input_indx)
620 return e->dynindx;
621 return -1;
622}
623
624/* This function is used to renumber the dynamic symbols, if some of
625 them are removed because they are marked as local. This is called
626 via elf_link_hash_traverse. */
627
b34976b6 628static bfd_boolean
268b6b39
AM
629elf_link_renumber_hash_table_dynsyms (struct elf_link_hash_entry *h,
630 void *data)
42751cf3 631{
268b6b39 632 size_t *count = data;
30b30c21 633
e92d460e
AM
634 if (h->root.type == bfd_link_hash_warning)
635 h = (struct elf_link_hash_entry *) h->root.u.i.link;
636
6fa3860b
PB
637 if (h->forced_local)
638 return TRUE;
639
640 if (h->dynindx != -1)
641 h->dynindx = ++(*count);
642
643 return TRUE;
644}
645
646
647/* Like elf_link_renumber_hash_table_dynsyms, but just number symbols with
648 STB_LOCAL binding. */
649
650static bfd_boolean
651elf_link_renumber_local_hash_table_dynsyms (struct elf_link_hash_entry *h,
652 void *data)
653{
654 size_t *count = data;
655
656 if (h->root.type == bfd_link_hash_warning)
657 h = (struct elf_link_hash_entry *) h->root.u.i.link;
658
659 if (!h->forced_local)
660 return TRUE;
661
42751cf3 662 if (h->dynindx != -1)
30b30c21
RH
663 h->dynindx = ++(*count);
664
b34976b6 665 return TRUE;
42751cf3 666}
30b30c21 667
aee6f5b4
AO
668/* Return true if the dynamic symbol for a given section should be
669 omitted when creating a shared library. */
670bfd_boolean
671_bfd_elf_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
672 struct bfd_link_info *info,
673 asection *p)
674{
675 switch (elf_section_data (p)->this_hdr.sh_type)
676 {
677 case SHT_PROGBITS:
678 case SHT_NOBITS:
679 /* If sh_type is yet undecided, assume it could be
680 SHT_PROGBITS/SHT_NOBITS. */
681 case SHT_NULL:
682 if (strcmp (p->name, ".got") == 0
683 || strcmp (p->name, ".got.plt") == 0
684 || strcmp (p->name, ".plt") == 0)
685 {
686 asection *ip;
687 bfd *dynobj = elf_hash_table (info)->dynobj;
688
689 if (dynobj != NULL
1da212d6 690 && (ip = bfd_get_section_by_name (dynobj, p->name)) != NULL
aee6f5b4
AO
691 && (ip->flags & SEC_LINKER_CREATED)
692 && ip->output_section == p)
693 return TRUE;
694 }
695 return FALSE;
696
697 /* There shouldn't be section relative relocations
698 against any other section. */
699 default:
700 return TRUE;
701 }
702}
703
062e2358 704/* Assign dynsym indices. In a shared library we generate a section
6fa3860b
PB
705 symbol for each output section, which come first. Next come symbols
706 which have been forced to local binding. Then all of the back-end
707 allocated local dynamic syms, followed by the rest of the global
708 symbols. */
30b30c21 709
554220db
AM
710static unsigned long
711_bfd_elf_link_renumber_dynsyms (bfd *output_bfd,
712 struct bfd_link_info *info,
713 unsigned long *section_sym_count)
30b30c21
RH
714{
715 unsigned long dynsymcount = 0;
716
67687978 717 if (info->shared || elf_hash_table (info)->is_relocatable_executable)
30b30c21 718 {
aee6f5b4 719 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
30b30c21
RH
720 asection *p;
721 for (p = output_bfd->sections; p ; p = p->next)
8c37241b 722 if ((p->flags & SEC_EXCLUDE) == 0
aee6f5b4
AO
723 && (p->flags & SEC_ALLOC) != 0
724 && !(*bed->elf_backend_omit_section_dynsym) (output_bfd, info, p))
725 elf_section_data (p)->dynindx = ++dynsymcount;
30b30c21 726 }
554220db 727 *section_sym_count = dynsymcount;
30b30c21 728
6fa3860b
PB
729 elf_link_hash_traverse (elf_hash_table (info),
730 elf_link_renumber_local_hash_table_dynsyms,
731 &dynsymcount);
732
30b30c21
RH
733 if (elf_hash_table (info)->dynlocal)
734 {
735 struct elf_link_local_dynamic_entry *p;
736 for (p = elf_hash_table (info)->dynlocal; p ; p = p->next)
737 p->dynindx = ++dynsymcount;
738 }
739
740 elf_link_hash_traverse (elf_hash_table (info),
741 elf_link_renumber_hash_table_dynsyms,
742 &dynsymcount);
743
744 /* There is an unused NULL entry at the head of the table which
745 we must account for in our count. Unless there weren't any
746 symbols, which means we'll have no table at all. */
747 if (dynsymcount != 0)
748 ++dynsymcount;
749
750 return elf_hash_table (info)->dynsymcount = dynsymcount;
751}
252b5132 752
45d6a902
AM
753/* This function is called when we want to define a new symbol. It
754 handles the various cases which arise when we find a definition in
755 a dynamic object, or when there is already a definition in a
756 dynamic object. The new symbol is described by NAME, SYM, PSEC,
757 and PVALUE. We set SYM_HASH to the hash table entry. We set
758 OVERRIDE if the old symbol is overriding a new definition. We set
759 TYPE_CHANGE_OK if it is OK for the type to change. We set
760 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
761 change, we mean that we shouldn't warn if the type or size does
af44c138
L
762 change. We set POLD_ALIGNMENT if an old common symbol in a dynamic
763 object is overridden by a regular object. */
45d6a902
AM
764
765bfd_boolean
268b6b39
AM
766_bfd_elf_merge_symbol (bfd *abfd,
767 struct bfd_link_info *info,
768 const char *name,
769 Elf_Internal_Sym *sym,
770 asection **psec,
771 bfd_vma *pvalue,
af44c138 772 unsigned int *pold_alignment,
268b6b39
AM
773 struct elf_link_hash_entry **sym_hash,
774 bfd_boolean *skip,
775 bfd_boolean *override,
776 bfd_boolean *type_change_ok,
0f8a2703 777 bfd_boolean *size_change_ok)
252b5132 778{
7479dfd4 779 asection *sec, *oldsec;
45d6a902
AM
780 struct elf_link_hash_entry *h;
781 struct elf_link_hash_entry *flip;
782 int bind;
783 bfd *oldbfd;
784 bfd_boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
77cfaee6 785 bfd_boolean newweak, oldweak;
45d6a902
AM
786
787 *skip = FALSE;
788 *override = FALSE;
789
790 sec = *psec;
791 bind = ELF_ST_BIND (sym->st_info);
792
793 if (! bfd_is_und_section (sec))
794 h = elf_link_hash_lookup (elf_hash_table (info), name, TRUE, FALSE, FALSE);
795 else
796 h = ((struct elf_link_hash_entry *)
797 bfd_wrapped_link_hash_lookup (abfd, info, name, TRUE, FALSE, FALSE));
798 if (h == NULL)
799 return FALSE;
800 *sym_hash = h;
252b5132 801
45d6a902
AM
802 /* This code is for coping with dynamic objects, and is only useful
803 if we are doing an ELF link. */
804 if (info->hash->creator != abfd->xvec)
805 return TRUE;
252b5132 806
45d6a902
AM
807 /* For merging, we only care about real symbols. */
808
809 while (h->root.type == bfd_link_hash_indirect
810 || h->root.type == bfd_link_hash_warning)
811 h = (struct elf_link_hash_entry *) h->root.u.i.link;
812
813 /* If we just created the symbol, mark it as being an ELF symbol.
814 Other than that, there is nothing to do--there is no merge issue
815 with a newly defined symbol--so we just return. */
816
817 if (h->root.type == bfd_link_hash_new)
252b5132 818 {
f5385ebf 819 h->non_elf = 0;
45d6a902
AM
820 return TRUE;
821 }
252b5132 822
7479dfd4
L
823 /* OLDBFD and OLDSEC are a BFD and an ASECTION associated with the
824 existing symbol. */
252b5132 825
45d6a902
AM
826 switch (h->root.type)
827 {
828 default:
829 oldbfd = NULL;
7479dfd4 830 oldsec = NULL;
45d6a902 831 break;
252b5132 832
45d6a902
AM
833 case bfd_link_hash_undefined:
834 case bfd_link_hash_undefweak:
835 oldbfd = h->root.u.undef.abfd;
7479dfd4 836 oldsec = NULL;
45d6a902
AM
837 break;
838
839 case bfd_link_hash_defined:
840 case bfd_link_hash_defweak:
841 oldbfd = h->root.u.def.section->owner;
7479dfd4 842 oldsec = h->root.u.def.section;
45d6a902
AM
843 break;
844
845 case bfd_link_hash_common:
846 oldbfd = h->root.u.c.p->section->owner;
7479dfd4 847 oldsec = h->root.u.c.p->section;
45d6a902
AM
848 break;
849 }
850
851 /* In cases involving weak versioned symbols, we may wind up trying
852 to merge a symbol with itself. Catch that here, to avoid the
853 confusion that results if we try to override a symbol with
854 itself. The additional tests catch cases like
855 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
856 dynamic object, which we do want to handle here. */
857 if (abfd == oldbfd
858 && ((abfd->flags & DYNAMIC) == 0
f5385ebf 859 || !h->def_regular))
45d6a902
AM
860 return TRUE;
861
862 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
863 respectively, is from a dynamic object. */
864
865 if ((abfd->flags & DYNAMIC) != 0)
866 newdyn = TRUE;
867 else
868 newdyn = FALSE;
869
870 if (oldbfd != NULL)
871 olddyn = (oldbfd->flags & DYNAMIC) != 0;
872 else
873 {
874 asection *hsec;
875
876 /* This code handles the special SHN_MIPS_{TEXT,DATA} section
877 indices used by MIPS ELF. */
878 switch (h->root.type)
252b5132 879 {
45d6a902
AM
880 default:
881 hsec = NULL;
882 break;
252b5132 883
45d6a902
AM
884 case bfd_link_hash_defined:
885 case bfd_link_hash_defweak:
886 hsec = h->root.u.def.section;
887 break;
252b5132 888
45d6a902
AM
889 case bfd_link_hash_common:
890 hsec = h->root.u.c.p->section;
891 break;
252b5132 892 }
252b5132 893
45d6a902
AM
894 if (hsec == NULL)
895 olddyn = FALSE;
896 else
897 olddyn = (hsec->symbol->flags & BSF_DYNAMIC) != 0;
898 }
252b5132 899
45d6a902
AM
900 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
901 respectively, appear to be a definition rather than reference. */
902
903 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
904 newdef = FALSE;
905 else
906 newdef = TRUE;
907
908 if (h->root.type == bfd_link_hash_undefined
909 || h->root.type == bfd_link_hash_undefweak
910 || h->root.type == bfd_link_hash_common)
911 olddef = FALSE;
912 else
913 olddef = TRUE;
914
7479dfd4
L
915 /* Check TLS symbol. */
916 if ((ELF_ST_TYPE (sym->st_info) == STT_TLS || h->type == STT_TLS)
917 && ELF_ST_TYPE (sym->st_info) != h->type)
918 {
919 bfd *ntbfd, *tbfd;
920 bfd_boolean ntdef, tdef;
921 asection *ntsec, *tsec;
922
923 if (h->type == STT_TLS)
924 {
925 ntbfd = abfd;
926 ntsec = sec;
927 ntdef = newdef;
928 tbfd = oldbfd;
929 tsec = oldsec;
930 tdef = olddef;
931 }
932 else
933 {
934 ntbfd = oldbfd;
935 ntsec = oldsec;
936 ntdef = olddef;
937 tbfd = abfd;
938 tsec = sec;
939 tdef = newdef;
940 }
941
942 if (tdef && ntdef)
943 (*_bfd_error_handler)
944 (_("%s: TLS definition in %B section %A mismatches non-TLS definition in %B section %A"),
945 tbfd, tsec, ntbfd, ntsec, h->root.root.string);
946 else if (!tdef && !ntdef)
947 (*_bfd_error_handler)
948 (_("%s: TLS reference in %B mismatches non-TLS reference in %B"),
949 tbfd, ntbfd, h->root.root.string);
950 else if (tdef)
951 (*_bfd_error_handler)
952 (_("%s: TLS definition in %B section %A mismatches non-TLS reference in %B"),
953 tbfd, tsec, ntbfd, h->root.root.string);
954 else
955 (*_bfd_error_handler)
956 (_("%s: TLS reference in %B mismatches non-TLS definition in %B section %A"),
957 tbfd, ntbfd, ntsec, h->root.root.string);
958
959 bfd_set_error (bfd_error_bad_value);
960 return FALSE;
961 }
962
4cc11e76 963 /* We need to remember if a symbol has a definition in a dynamic
45d6a902
AM
964 object or is weak in all dynamic objects. Internal and hidden
965 visibility will make it unavailable to dynamic objects. */
f5385ebf 966 if (newdyn && !h->dynamic_def)
45d6a902
AM
967 {
968 if (!bfd_is_und_section (sec))
f5385ebf 969 h->dynamic_def = 1;
45d6a902 970 else
252b5132 971 {
45d6a902
AM
972 /* Check if this symbol is weak in all dynamic objects. If it
973 is the first time we see it in a dynamic object, we mark
974 if it is weak. Otherwise, we clear it. */
f5385ebf 975 if (!h->ref_dynamic)
79349b09 976 {
45d6a902 977 if (bind == STB_WEAK)
f5385ebf 978 h->dynamic_weak = 1;
252b5132 979 }
45d6a902 980 else if (bind != STB_WEAK)
f5385ebf 981 h->dynamic_weak = 0;
252b5132 982 }
45d6a902 983 }
252b5132 984
45d6a902
AM
985 /* If the old symbol has non-default visibility, we ignore the new
986 definition from a dynamic object. */
987 if (newdyn
9c7a29a3 988 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
45d6a902
AM
989 && !bfd_is_und_section (sec))
990 {
991 *skip = TRUE;
992 /* Make sure this symbol is dynamic. */
f5385ebf 993 h->ref_dynamic = 1;
45d6a902
AM
994 /* A protected symbol has external availability. Make sure it is
995 recorded as dynamic.
996
997 FIXME: Should we check type and size for protected symbol? */
998 if (ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
c152c796 999 return bfd_elf_link_record_dynamic_symbol (info, h);
45d6a902
AM
1000 else
1001 return TRUE;
1002 }
1003 else if (!newdyn
9c7a29a3 1004 && ELF_ST_VISIBILITY (sym->st_other) != STV_DEFAULT
f5385ebf 1005 && h->def_dynamic)
45d6a902
AM
1006 {
1007 /* If the new symbol with non-default visibility comes from a
1008 relocatable file and the old definition comes from a dynamic
1009 object, we remove the old definition. */
1010 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1011 h = *sym_hash;
1de1a317 1012
f6e332e6 1013 if ((h->root.u.undef.next || info->hash->undefs_tail == &h->root)
1de1a317
L
1014 && bfd_is_und_section (sec))
1015 {
1016 /* If the new symbol is undefined and the old symbol was
1017 also undefined before, we need to make sure
1018 _bfd_generic_link_add_one_symbol doesn't mess
f6e332e6 1019 up the linker hash table undefs list. Since the old
1de1a317
L
1020 definition came from a dynamic object, it is still on the
1021 undefs list. */
1022 h->root.type = bfd_link_hash_undefined;
1de1a317
L
1023 h->root.u.undef.abfd = abfd;
1024 }
1025 else
1026 {
1027 h->root.type = bfd_link_hash_new;
1028 h->root.u.undef.abfd = NULL;
1029 }
1030
f5385ebf 1031 if (h->def_dynamic)
252b5132 1032 {
f5385ebf
AM
1033 h->def_dynamic = 0;
1034 h->ref_dynamic = 1;
1035 h->dynamic_def = 1;
45d6a902
AM
1036 }
1037 /* FIXME: Should we check type and size for protected symbol? */
1038 h->size = 0;
1039 h->type = 0;
1040 return TRUE;
1041 }
14a793b2 1042
79349b09
AM
1043 /* Differentiate strong and weak symbols. */
1044 newweak = bind == STB_WEAK;
1045 oldweak = (h->root.type == bfd_link_hash_defweak
1046 || h->root.type == bfd_link_hash_undefweak);
14a793b2 1047
15b43f48
AM
1048 /* If a new weak symbol definition comes from a regular file and the
1049 old symbol comes from a dynamic library, we treat the new one as
1050 strong. Similarly, an old weak symbol definition from a regular
1051 file is treated as strong when the new symbol comes from a dynamic
1052 library. Further, an old weak symbol from a dynamic library is
1053 treated as strong if the new symbol is from a dynamic library.
1054 This reflects the way glibc's ld.so works.
1055
1056 Do this before setting *type_change_ok or *size_change_ok so that
1057 we warn properly when dynamic library symbols are overridden. */
1058
1059 if (newdef && !newdyn && olddyn)
0f8a2703 1060 newweak = FALSE;
15b43f48 1061 if (olddef && newdyn)
0f8a2703
AM
1062 oldweak = FALSE;
1063
79349b09
AM
1064 /* It's OK to change the type if either the existing symbol or the
1065 new symbol is weak. A type change is also OK if the old symbol
1066 is undefined and the new symbol is defined. */
252b5132 1067
79349b09
AM
1068 if (oldweak
1069 || newweak
1070 || (newdef
1071 && h->root.type == bfd_link_hash_undefined))
1072 *type_change_ok = TRUE;
1073
1074 /* It's OK to change the size if either the existing symbol or the
1075 new symbol is weak, or if the old symbol is undefined. */
1076
1077 if (*type_change_ok
1078 || h->root.type == bfd_link_hash_undefined)
1079 *size_change_ok = TRUE;
45d6a902 1080
45d6a902
AM
1081 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
1082 symbol, respectively, appears to be a common symbol in a dynamic
1083 object. If a symbol appears in an uninitialized section, and is
1084 not weak, and is not a function, then it may be a common symbol
1085 which was resolved when the dynamic object was created. We want
1086 to treat such symbols specially, because they raise special
1087 considerations when setting the symbol size: if the symbol
1088 appears as a common symbol in a regular object, and the size in
1089 the regular object is larger, we must make sure that we use the
1090 larger size. This problematic case can always be avoided in C,
1091 but it must be handled correctly when using Fortran shared
1092 libraries.
1093
1094 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
1095 likewise for OLDDYNCOMMON and OLDDEF.
1096
1097 Note that this test is just a heuristic, and that it is quite
1098 possible to have an uninitialized symbol in a shared object which
1099 is really a definition, rather than a common symbol. This could
1100 lead to some minor confusion when the symbol really is a common
1101 symbol in some regular object. However, I think it will be
1102 harmless. */
1103
1104 if (newdyn
1105 && newdef
79349b09 1106 && !newweak
45d6a902
AM
1107 && (sec->flags & SEC_ALLOC) != 0
1108 && (sec->flags & SEC_LOAD) == 0
1109 && sym->st_size > 0
45d6a902
AM
1110 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
1111 newdyncommon = TRUE;
1112 else
1113 newdyncommon = FALSE;
1114
1115 if (olddyn
1116 && olddef
1117 && h->root.type == bfd_link_hash_defined
f5385ebf 1118 && h->def_dynamic
45d6a902
AM
1119 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
1120 && (h->root.u.def.section->flags & SEC_LOAD) == 0
1121 && h->size > 0
1122 && h->type != STT_FUNC)
1123 olddyncommon = TRUE;
1124 else
1125 olddyncommon = FALSE;
1126
45d6a902
AM
1127 /* If both the old and the new symbols look like common symbols in a
1128 dynamic object, set the size of the symbol to the larger of the
1129 two. */
1130
1131 if (olddyncommon
1132 && newdyncommon
1133 && sym->st_size != h->size)
1134 {
1135 /* Since we think we have two common symbols, issue a multiple
1136 common warning if desired. Note that we only warn if the
1137 size is different. If the size is the same, we simply let
1138 the old symbol override the new one as normally happens with
1139 symbols defined in dynamic objects. */
1140
1141 if (! ((*info->callbacks->multiple_common)
1142 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
1143 h->size, abfd, bfd_link_hash_common, sym->st_size)))
1144 return FALSE;
252b5132 1145
45d6a902
AM
1146 if (sym->st_size > h->size)
1147 h->size = sym->st_size;
252b5132 1148
45d6a902 1149 *size_change_ok = TRUE;
252b5132
RH
1150 }
1151
45d6a902
AM
1152 /* If we are looking at a dynamic object, and we have found a
1153 definition, we need to see if the symbol was already defined by
1154 some other object. If so, we want to use the existing
1155 definition, and we do not want to report a multiple symbol
1156 definition error; we do this by clobbering *PSEC to be
1157 bfd_und_section_ptr.
1158
1159 We treat a common symbol as a definition if the symbol in the
1160 shared library is a function, since common symbols always
1161 represent variables; this can cause confusion in principle, but
1162 any such confusion would seem to indicate an erroneous program or
1163 shared library. We also permit a common symbol in a regular
79349b09 1164 object to override a weak symbol in a shared object. */
45d6a902
AM
1165
1166 if (newdyn
1167 && newdef
77cfaee6 1168 && (olddef
45d6a902 1169 || (h->root.type == bfd_link_hash_common
79349b09 1170 && (newweak
0f8a2703 1171 || ELF_ST_TYPE (sym->st_info) == STT_FUNC))))
45d6a902
AM
1172 {
1173 *override = TRUE;
1174 newdef = FALSE;
1175 newdyncommon = FALSE;
252b5132 1176
45d6a902
AM
1177 *psec = sec = bfd_und_section_ptr;
1178 *size_change_ok = TRUE;
252b5132 1179
45d6a902
AM
1180 /* If we get here when the old symbol is a common symbol, then
1181 we are explicitly letting it override a weak symbol or
1182 function in a dynamic object, and we don't want to warn about
1183 a type change. If the old symbol is a defined symbol, a type
1184 change warning may still be appropriate. */
252b5132 1185
45d6a902
AM
1186 if (h->root.type == bfd_link_hash_common)
1187 *type_change_ok = TRUE;
1188 }
1189
1190 /* Handle the special case of an old common symbol merging with a
1191 new symbol which looks like a common symbol in a shared object.
1192 We change *PSEC and *PVALUE to make the new symbol look like a
1193 common symbol, and let _bfd_generic_link_add_one_symbol will do
1194 the right thing. */
1195
1196 if (newdyncommon
1197 && h->root.type == bfd_link_hash_common)
1198 {
1199 *override = TRUE;
1200 newdef = FALSE;
1201 newdyncommon = FALSE;
1202 *pvalue = sym->st_size;
1203 *psec = sec = bfd_com_section_ptr;
1204 *size_change_ok = TRUE;
1205 }
1206
1207 /* If the old symbol is from a dynamic object, and the new symbol is
1208 a definition which is not from a dynamic object, then the new
1209 symbol overrides the old symbol. Symbols from regular files
1210 always take precedence over symbols from dynamic objects, even if
1211 they are defined after the dynamic object in the link.
1212
1213 As above, we again permit a common symbol in a regular object to
1214 override a definition in a shared object if the shared object
0f8a2703 1215 symbol is a function or is weak. */
45d6a902
AM
1216
1217 flip = NULL;
77cfaee6 1218 if (!newdyn
45d6a902
AM
1219 && (newdef
1220 || (bfd_is_com_section (sec)
79349b09
AM
1221 && (oldweak
1222 || h->type == STT_FUNC)))
45d6a902
AM
1223 && olddyn
1224 && olddef
f5385ebf 1225 && h->def_dynamic)
45d6a902
AM
1226 {
1227 /* Change the hash table entry to undefined, and let
1228 _bfd_generic_link_add_one_symbol do the right thing with the
1229 new definition. */
1230
1231 h->root.type = bfd_link_hash_undefined;
1232 h->root.u.undef.abfd = h->root.u.def.section->owner;
1233 *size_change_ok = TRUE;
1234
1235 olddef = FALSE;
1236 olddyncommon = FALSE;
1237
1238 /* We again permit a type change when a common symbol may be
1239 overriding a function. */
1240
1241 if (bfd_is_com_section (sec))
1242 *type_change_ok = TRUE;
1243
1244 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1245 flip = *sym_hash;
1246 else
1247 /* This union may have been set to be non-NULL when this symbol
1248 was seen in a dynamic object. We must force the union to be
1249 NULL, so that it is correct for a regular symbol. */
1250 h->verinfo.vertree = NULL;
1251 }
1252
1253 /* Handle the special case of a new common symbol merging with an
1254 old symbol that looks like it might be a common symbol defined in
1255 a shared object. Note that we have already handled the case in
1256 which a new common symbol should simply override the definition
1257 in the shared library. */
1258
1259 if (! newdyn
1260 && bfd_is_com_section (sec)
1261 && olddyncommon)
1262 {
1263 /* It would be best if we could set the hash table entry to a
1264 common symbol, but we don't know what to use for the section
1265 or the alignment. */
1266 if (! ((*info->callbacks->multiple_common)
1267 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
1268 h->size, abfd, bfd_link_hash_common, sym->st_size)))
1269 return FALSE;
1270
4cc11e76 1271 /* If the presumed common symbol in the dynamic object is
45d6a902
AM
1272 larger, pretend that the new symbol has its size. */
1273
1274 if (h->size > *pvalue)
1275 *pvalue = h->size;
1276
af44c138
L
1277 /* We need to remember the alignment required by the symbol
1278 in the dynamic object. */
1279 BFD_ASSERT (pold_alignment);
1280 *pold_alignment = h->root.u.def.section->alignment_power;
45d6a902
AM
1281
1282 olddef = FALSE;
1283 olddyncommon = FALSE;
1284
1285 h->root.type = bfd_link_hash_undefined;
1286 h->root.u.undef.abfd = h->root.u.def.section->owner;
1287
1288 *size_change_ok = TRUE;
1289 *type_change_ok = TRUE;
1290
1291 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1292 flip = *sym_hash;
1293 else
1294 h->verinfo.vertree = NULL;
1295 }
1296
1297 if (flip != NULL)
1298 {
1299 /* Handle the case where we had a versioned symbol in a dynamic
1300 library and now find a definition in a normal object. In this
1301 case, we make the versioned symbol point to the normal one. */
9c5bfbb7 1302 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902
AM
1303 flip->root.type = h->root.type;
1304 h->root.type = bfd_link_hash_indirect;
1305 h->root.u.i.link = (struct bfd_link_hash_entry *) flip;
1306 (*bed->elf_backend_copy_indirect_symbol) (bed, flip, h);
1307 flip->root.u.undef.abfd = h->root.u.undef.abfd;
f5385ebf 1308 if (h->def_dynamic)
45d6a902 1309 {
f5385ebf
AM
1310 h->def_dynamic = 0;
1311 flip->ref_dynamic = 1;
45d6a902
AM
1312 }
1313 }
1314
45d6a902
AM
1315 return TRUE;
1316}
1317
1318/* This function is called to create an indirect symbol from the
1319 default for the symbol with the default version if needed. The
1320 symbol is described by H, NAME, SYM, PSEC, VALUE, and OVERRIDE. We
0f8a2703 1321 set DYNSYM if the new indirect symbol is dynamic. */
45d6a902
AM
1322
1323bfd_boolean
268b6b39
AM
1324_bfd_elf_add_default_symbol (bfd *abfd,
1325 struct bfd_link_info *info,
1326 struct elf_link_hash_entry *h,
1327 const char *name,
1328 Elf_Internal_Sym *sym,
1329 asection **psec,
1330 bfd_vma *value,
1331 bfd_boolean *dynsym,
0f8a2703 1332 bfd_boolean override)
45d6a902
AM
1333{
1334 bfd_boolean type_change_ok;
1335 bfd_boolean size_change_ok;
1336 bfd_boolean skip;
1337 char *shortname;
1338 struct elf_link_hash_entry *hi;
1339 struct bfd_link_hash_entry *bh;
9c5bfbb7 1340 const struct elf_backend_data *bed;
45d6a902
AM
1341 bfd_boolean collect;
1342 bfd_boolean dynamic;
1343 char *p;
1344 size_t len, shortlen;
1345 asection *sec;
1346
1347 /* If this symbol has a version, and it is the default version, we
1348 create an indirect symbol from the default name to the fully
1349 decorated name. This will cause external references which do not
1350 specify a version to be bound to this version of the symbol. */
1351 p = strchr (name, ELF_VER_CHR);
1352 if (p == NULL || p[1] != ELF_VER_CHR)
1353 return TRUE;
1354
1355 if (override)
1356 {
4cc11e76 1357 /* We are overridden by an old definition. We need to check if we
45d6a902
AM
1358 need to create the indirect symbol from the default name. */
1359 hi = elf_link_hash_lookup (elf_hash_table (info), name, TRUE,
1360 FALSE, FALSE);
1361 BFD_ASSERT (hi != NULL);
1362 if (hi == h)
1363 return TRUE;
1364 while (hi->root.type == bfd_link_hash_indirect
1365 || hi->root.type == bfd_link_hash_warning)
1366 {
1367 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1368 if (hi == h)
1369 return TRUE;
1370 }
1371 }
1372
1373 bed = get_elf_backend_data (abfd);
1374 collect = bed->collect;
1375 dynamic = (abfd->flags & DYNAMIC) != 0;
1376
1377 shortlen = p - name;
1378 shortname = bfd_hash_allocate (&info->hash->table, shortlen + 1);
1379 if (shortname == NULL)
1380 return FALSE;
1381 memcpy (shortname, name, shortlen);
1382 shortname[shortlen] = '\0';
1383
1384 /* We are going to create a new symbol. Merge it with any existing
1385 symbol with this name. For the purposes of the merge, act as
1386 though we were defining the symbol we just defined, although we
1387 actually going to define an indirect symbol. */
1388 type_change_ok = FALSE;
1389 size_change_ok = FALSE;
1390 sec = *psec;
1391 if (!_bfd_elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
af44c138
L
1392 NULL, &hi, &skip, &override,
1393 &type_change_ok, &size_change_ok))
45d6a902
AM
1394 return FALSE;
1395
1396 if (skip)
1397 goto nondefault;
1398
1399 if (! override)
1400 {
1401 bh = &hi->root;
1402 if (! (_bfd_generic_link_add_one_symbol
1403 (info, abfd, shortname, BSF_INDIRECT, bfd_ind_section_ptr,
268b6b39 1404 0, name, FALSE, collect, &bh)))
45d6a902
AM
1405 return FALSE;
1406 hi = (struct elf_link_hash_entry *) bh;
1407 }
1408 else
1409 {
1410 /* In this case the symbol named SHORTNAME is overriding the
1411 indirect symbol we want to add. We were planning on making
1412 SHORTNAME an indirect symbol referring to NAME. SHORTNAME
1413 is the name without a version. NAME is the fully versioned
1414 name, and it is the default version.
1415
1416 Overriding means that we already saw a definition for the
1417 symbol SHORTNAME in a regular object, and it is overriding
1418 the symbol defined in the dynamic object.
1419
1420 When this happens, we actually want to change NAME, the
1421 symbol we just added, to refer to SHORTNAME. This will cause
1422 references to NAME in the shared object to become references
1423 to SHORTNAME in the regular object. This is what we expect
1424 when we override a function in a shared object: that the
1425 references in the shared object will be mapped to the
1426 definition in the regular object. */
1427
1428 while (hi->root.type == bfd_link_hash_indirect
1429 || hi->root.type == bfd_link_hash_warning)
1430 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1431
1432 h->root.type = bfd_link_hash_indirect;
1433 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
f5385ebf 1434 if (h->def_dynamic)
45d6a902 1435 {
f5385ebf
AM
1436 h->def_dynamic = 0;
1437 hi->ref_dynamic = 1;
1438 if (hi->ref_regular
1439 || hi->def_regular)
45d6a902 1440 {
c152c796 1441 if (! bfd_elf_link_record_dynamic_symbol (info, hi))
45d6a902
AM
1442 return FALSE;
1443 }
1444 }
1445
1446 /* Now set HI to H, so that the following code will set the
1447 other fields correctly. */
1448 hi = h;
1449 }
1450
1451 /* If there is a duplicate definition somewhere, then HI may not
1452 point to an indirect symbol. We will have reported an error to
1453 the user in that case. */
1454
1455 if (hi->root.type == bfd_link_hash_indirect)
1456 {
1457 struct elf_link_hash_entry *ht;
1458
45d6a902
AM
1459 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
1460 (*bed->elf_backend_copy_indirect_symbol) (bed, ht, hi);
1461
1462 /* See if the new flags lead us to realize that the symbol must
1463 be dynamic. */
1464 if (! *dynsym)
1465 {
1466 if (! dynamic)
1467 {
1468 if (info->shared
f5385ebf 1469 || hi->ref_dynamic)
45d6a902
AM
1470 *dynsym = TRUE;
1471 }
1472 else
1473 {
f5385ebf 1474 if (hi->ref_regular)
45d6a902
AM
1475 *dynsym = TRUE;
1476 }
1477 }
1478 }
1479
1480 /* We also need to define an indirection from the nondefault version
1481 of the symbol. */
1482
1483nondefault:
1484 len = strlen (name);
1485 shortname = bfd_hash_allocate (&info->hash->table, len);
1486 if (shortname == NULL)
1487 return FALSE;
1488 memcpy (shortname, name, shortlen);
1489 memcpy (shortname + shortlen, p + 1, len - shortlen);
1490
1491 /* Once again, merge with any existing symbol. */
1492 type_change_ok = FALSE;
1493 size_change_ok = FALSE;
1494 sec = *psec;
1495 if (!_bfd_elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
af44c138
L
1496 NULL, &hi, &skip, &override,
1497 &type_change_ok, &size_change_ok))
45d6a902
AM
1498 return FALSE;
1499
1500 if (skip)
1501 return TRUE;
1502
1503 if (override)
1504 {
1505 /* Here SHORTNAME is a versioned name, so we don't expect to see
1506 the type of override we do in the case above unless it is
4cc11e76 1507 overridden by a versioned definition. */
45d6a902
AM
1508 if (hi->root.type != bfd_link_hash_defined
1509 && hi->root.type != bfd_link_hash_defweak)
1510 (*_bfd_error_handler)
d003868e
AM
1511 (_("%B: unexpected redefinition of indirect versioned symbol `%s'"),
1512 abfd, shortname);
45d6a902
AM
1513 }
1514 else
1515 {
1516 bh = &hi->root;
1517 if (! (_bfd_generic_link_add_one_symbol
1518 (info, abfd, shortname, BSF_INDIRECT,
268b6b39 1519 bfd_ind_section_ptr, 0, name, FALSE, collect, &bh)))
45d6a902
AM
1520 return FALSE;
1521 hi = (struct elf_link_hash_entry *) bh;
1522
1523 /* If there is a duplicate definition somewhere, then HI may not
1524 point to an indirect symbol. We will have reported an error
1525 to the user in that case. */
1526
1527 if (hi->root.type == bfd_link_hash_indirect)
1528 {
45d6a902
AM
1529 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
1530
1531 /* See if the new flags lead us to realize that the symbol
1532 must be dynamic. */
1533 if (! *dynsym)
1534 {
1535 if (! dynamic)
1536 {
1537 if (info->shared
f5385ebf 1538 || hi->ref_dynamic)
45d6a902
AM
1539 *dynsym = TRUE;
1540 }
1541 else
1542 {
f5385ebf 1543 if (hi->ref_regular)
45d6a902
AM
1544 *dynsym = TRUE;
1545 }
1546 }
1547 }
1548 }
1549
1550 return TRUE;
1551}
1552\f
1553/* This routine is used to export all defined symbols into the dynamic
1554 symbol table. It is called via elf_link_hash_traverse. */
1555
1556bfd_boolean
268b6b39 1557_bfd_elf_export_symbol (struct elf_link_hash_entry *h, void *data)
45d6a902 1558{
268b6b39 1559 struct elf_info_failed *eif = data;
45d6a902
AM
1560
1561 /* Ignore indirect symbols. These are added by the versioning code. */
1562 if (h->root.type == bfd_link_hash_indirect)
1563 return TRUE;
1564
1565 if (h->root.type == bfd_link_hash_warning)
1566 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1567
1568 if (h->dynindx == -1
f5385ebf
AM
1569 && (h->def_regular
1570 || h->ref_regular))
45d6a902
AM
1571 {
1572 struct bfd_elf_version_tree *t;
1573 struct bfd_elf_version_expr *d;
1574
1575 for (t = eif->verdefs; t != NULL; t = t->next)
1576 {
108ba305 1577 if (t->globals.list != NULL)
45d6a902 1578 {
108ba305
JJ
1579 d = (*t->match) (&t->globals, NULL, h->root.root.string);
1580 if (d != NULL)
1581 goto doit;
45d6a902
AM
1582 }
1583
108ba305 1584 if (t->locals.list != NULL)
45d6a902 1585 {
108ba305
JJ
1586 d = (*t->match) (&t->locals, NULL, h->root.root.string);
1587 if (d != NULL)
1588 return TRUE;
45d6a902
AM
1589 }
1590 }
1591
1592 if (!eif->verdefs)
1593 {
1594 doit:
c152c796 1595 if (! bfd_elf_link_record_dynamic_symbol (eif->info, h))
45d6a902
AM
1596 {
1597 eif->failed = TRUE;
1598 return FALSE;
1599 }
1600 }
1601 }
1602
1603 return TRUE;
1604}
1605\f
1606/* Look through the symbols which are defined in other shared
1607 libraries and referenced here. Update the list of version
1608 dependencies. This will be put into the .gnu.version_r section.
1609 This function is called via elf_link_hash_traverse. */
1610
1611bfd_boolean
268b6b39
AM
1612_bfd_elf_link_find_version_dependencies (struct elf_link_hash_entry *h,
1613 void *data)
45d6a902 1614{
268b6b39 1615 struct elf_find_verdep_info *rinfo = data;
45d6a902
AM
1616 Elf_Internal_Verneed *t;
1617 Elf_Internal_Vernaux *a;
1618 bfd_size_type amt;
1619
1620 if (h->root.type == bfd_link_hash_warning)
1621 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1622
1623 /* We only care about symbols defined in shared objects with version
1624 information. */
f5385ebf
AM
1625 if (!h->def_dynamic
1626 || h->def_regular
45d6a902
AM
1627 || h->dynindx == -1
1628 || h->verinfo.verdef == NULL)
1629 return TRUE;
1630
1631 /* See if we already know about this version. */
1632 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
1633 {
1634 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
1635 continue;
1636
1637 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1638 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
1639 return TRUE;
1640
1641 break;
1642 }
1643
1644 /* This is a new version. Add it to tree we are building. */
1645
1646 if (t == NULL)
1647 {
1648 amt = sizeof *t;
268b6b39 1649 t = bfd_zalloc (rinfo->output_bfd, amt);
45d6a902
AM
1650 if (t == NULL)
1651 {
1652 rinfo->failed = TRUE;
1653 return FALSE;
1654 }
1655
1656 t->vn_bfd = h->verinfo.verdef->vd_bfd;
1657 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
1658 elf_tdata (rinfo->output_bfd)->verref = t;
1659 }
1660
1661 amt = sizeof *a;
268b6b39 1662 a = bfd_zalloc (rinfo->output_bfd, amt);
45d6a902
AM
1663
1664 /* Note that we are copying a string pointer here, and testing it
1665 above. If bfd_elf_string_from_elf_section is ever changed to
1666 discard the string data when low in memory, this will have to be
1667 fixed. */
1668 a->vna_nodename = h->verinfo.verdef->vd_nodename;
1669
1670 a->vna_flags = h->verinfo.verdef->vd_flags;
1671 a->vna_nextptr = t->vn_auxptr;
1672
1673 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
1674 ++rinfo->vers;
1675
1676 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
1677
1678 t->vn_auxptr = a;
1679
1680 return TRUE;
1681}
1682
1683/* Figure out appropriate versions for all the symbols. We may not
1684 have the version number script until we have read all of the input
1685 files, so until that point we don't know which symbols should be
1686 local. This function is called via elf_link_hash_traverse. */
1687
1688bfd_boolean
268b6b39 1689_bfd_elf_link_assign_sym_version (struct elf_link_hash_entry *h, void *data)
45d6a902
AM
1690{
1691 struct elf_assign_sym_version_info *sinfo;
1692 struct bfd_link_info *info;
9c5bfbb7 1693 const struct elf_backend_data *bed;
45d6a902
AM
1694 struct elf_info_failed eif;
1695 char *p;
1696 bfd_size_type amt;
1697
268b6b39 1698 sinfo = data;
45d6a902
AM
1699 info = sinfo->info;
1700
1701 if (h->root.type == bfd_link_hash_warning)
1702 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1703
1704 /* Fix the symbol flags. */
1705 eif.failed = FALSE;
1706 eif.info = info;
1707 if (! _bfd_elf_fix_symbol_flags (h, &eif))
1708 {
1709 if (eif.failed)
1710 sinfo->failed = TRUE;
1711 return FALSE;
1712 }
1713
1714 /* We only need version numbers for symbols defined in regular
1715 objects. */
f5385ebf 1716 if (!h->def_regular)
45d6a902
AM
1717 return TRUE;
1718
1719 bed = get_elf_backend_data (sinfo->output_bfd);
1720 p = strchr (h->root.root.string, ELF_VER_CHR);
1721 if (p != NULL && h->verinfo.vertree == NULL)
1722 {
1723 struct bfd_elf_version_tree *t;
1724 bfd_boolean hidden;
1725
1726 hidden = TRUE;
1727
1728 /* There are two consecutive ELF_VER_CHR characters if this is
1729 not a hidden symbol. */
1730 ++p;
1731 if (*p == ELF_VER_CHR)
1732 {
1733 hidden = FALSE;
1734 ++p;
1735 }
1736
1737 /* If there is no version string, we can just return out. */
1738 if (*p == '\0')
1739 {
1740 if (hidden)
f5385ebf 1741 h->hidden = 1;
45d6a902
AM
1742 return TRUE;
1743 }
1744
1745 /* Look for the version. If we find it, it is no longer weak. */
1746 for (t = sinfo->verdefs; t != NULL; t = t->next)
1747 {
1748 if (strcmp (t->name, p) == 0)
1749 {
1750 size_t len;
1751 char *alc;
1752 struct bfd_elf_version_expr *d;
1753
1754 len = p - h->root.root.string;
268b6b39 1755 alc = bfd_malloc (len);
45d6a902
AM
1756 if (alc == NULL)
1757 return FALSE;
1758 memcpy (alc, h->root.root.string, len - 1);
1759 alc[len - 1] = '\0';
1760 if (alc[len - 2] == ELF_VER_CHR)
1761 alc[len - 2] = '\0';
1762
1763 h->verinfo.vertree = t;
1764 t->used = TRUE;
1765 d = NULL;
1766
108ba305
JJ
1767 if (t->globals.list != NULL)
1768 d = (*t->match) (&t->globals, NULL, alc);
45d6a902
AM
1769
1770 /* See if there is anything to force this symbol to
1771 local scope. */
108ba305 1772 if (d == NULL && t->locals.list != NULL)
45d6a902 1773 {
108ba305
JJ
1774 d = (*t->match) (&t->locals, NULL, alc);
1775 if (d != NULL
1776 && h->dynindx != -1
1777 && info->shared
1778 && ! info->export_dynamic)
1779 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
45d6a902
AM
1780 }
1781
1782 free (alc);
1783 break;
1784 }
1785 }
1786
1787 /* If we are building an application, we need to create a
1788 version node for this version. */
36af4a4e 1789 if (t == NULL && info->executable)
45d6a902
AM
1790 {
1791 struct bfd_elf_version_tree **pp;
1792 int version_index;
1793
1794 /* If we aren't going to export this symbol, we don't need
1795 to worry about it. */
1796 if (h->dynindx == -1)
1797 return TRUE;
1798
1799 amt = sizeof *t;
108ba305 1800 t = bfd_zalloc (sinfo->output_bfd, amt);
45d6a902
AM
1801 if (t == NULL)
1802 {
1803 sinfo->failed = TRUE;
1804 return FALSE;
1805 }
1806
45d6a902 1807 t->name = p;
45d6a902
AM
1808 t->name_indx = (unsigned int) -1;
1809 t->used = TRUE;
1810
1811 version_index = 1;
1812 /* Don't count anonymous version tag. */
1813 if (sinfo->verdefs != NULL && sinfo->verdefs->vernum == 0)
1814 version_index = 0;
1815 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
1816 ++version_index;
1817 t->vernum = version_index;
1818
1819 *pp = t;
1820
1821 h->verinfo.vertree = t;
1822 }
1823 else if (t == NULL)
1824 {
1825 /* We could not find the version for a symbol when
1826 generating a shared archive. Return an error. */
1827 (*_bfd_error_handler)
d003868e
AM
1828 (_("%B: undefined versioned symbol name %s"),
1829 sinfo->output_bfd, h->root.root.string);
45d6a902
AM
1830 bfd_set_error (bfd_error_bad_value);
1831 sinfo->failed = TRUE;
1832 return FALSE;
1833 }
1834
1835 if (hidden)
f5385ebf 1836 h->hidden = 1;
45d6a902
AM
1837 }
1838
1839 /* If we don't have a version for this symbol, see if we can find
1840 something. */
1841 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
1842 {
1843 struct bfd_elf_version_tree *t;
1844 struct bfd_elf_version_tree *local_ver;
1845 struct bfd_elf_version_expr *d;
1846
1847 /* See if can find what version this symbol is in. If the
1848 symbol is supposed to be local, then don't actually register
1849 it. */
1850 local_ver = NULL;
1851 for (t = sinfo->verdefs; t != NULL; t = t->next)
1852 {
108ba305 1853 if (t->globals.list != NULL)
45d6a902
AM
1854 {
1855 bfd_boolean matched;
1856
1857 matched = FALSE;
108ba305
JJ
1858 d = NULL;
1859 while ((d = (*t->match) (&t->globals, d,
1860 h->root.root.string)) != NULL)
1861 if (d->symver)
1862 matched = TRUE;
1863 else
1864 {
1865 /* There is a version without definition. Make
1866 the symbol the default definition for this
1867 version. */
1868 h->verinfo.vertree = t;
1869 local_ver = NULL;
1870 d->script = 1;
1871 break;
1872 }
45d6a902
AM
1873 if (d != NULL)
1874 break;
1875 else if (matched)
1876 /* There is no undefined version for this symbol. Hide the
1877 default one. */
1878 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
1879 }
1880
108ba305 1881 if (t->locals.list != NULL)
45d6a902 1882 {
108ba305
JJ
1883 d = NULL;
1884 while ((d = (*t->match) (&t->locals, d,
1885 h->root.root.string)) != NULL)
45d6a902 1886 {
108ba305 1887 local_ver = t;
45d6a902 1888 /* If the match is "*", keep looking for a more
108ba305
JJ
1889 explicit, perhaps even global, match.
1890 XXX: Shouldn't this be !d->wildcard instead? */
1891 if (d->pattern[0] != '*' || d->pattern[1] != '\0')
1892 break;
45d6a902
AM
1893 }
1894
1895 if (d != NULL)
1896 break;
1897 }
1898 }
1899
1900 if (local_ver != NULL)
1901 {
1902 h->verinfo.vertree = local_ver;
1903 if (h->dynindx != -1
1904 && info->shared
1905 && ! info->export_dynamic)
1906 {
1907 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
1908 }
1909 }
1910 }
1911
1912 return TRUE;
1913}
1914\f
45d6a902
AM
1915/* Read and swap the relocs from the section indicated by SHDR. This
1916 may be either a REL or a RELA section. The relocations are
1917 translated into RELA relocations and stored in INTERNAL_RELOCS,
1918 which should have already been allocated to contain enough space.
1919 The EXTERNAL_RELOCS are a buffer where the external form of the
1920 relocations should be stored.
1921
1922 Returns FALSE if something goes wrong. */
1923
1924static bfd_boolean
268b6b39 1925elf_link_read_relocs_from_section (bfd *abfd,
243ef1e0 1926 asection *sec,
268b6b39
AM
1927 Elf_Internal_Shdr *shdr,
1928 void *external_relocs,
1929 Elf_Internal_Rela *internal_relocs)
45d6a902 1930{
9c5bfbb7 1931 const struct elf_backend_data *bed;
268b6b39 1932 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
45d6a902
AM
1933 const bfd_byte *erela;
1934 const bfd_byte *erelaend;
1935 Elf_Internal_Rela *irela;
243ef1e0
L
1936 Elf_Internal_Shdr *symtab_hdr;
1937 size_t nsyms;
45d6a902 1938
45d6a902
AM
1939 /* Position ourselves at the start of the section. */
1940 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
1941 return FALSE;
1942
1943 /* Read the relocations. */
1944 if (bfd_bread (external_relocs, shdr->sh_size, abfd) != shdr->sh_size)
1945 return FALSE;
1946
243ef1e0
L
1947 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1948 nsyms = symtab_hdr->sh_size / symtab_hdr->sh_entsize;
1949
45d6a902
AM
1950 bed = get_elf_backend_data (abfd);
1951
1952 /* Convert the external relocations to the internal format. */
1953 if (shdr->sh_entsize == bed->s->sizeof_rel)
1954 swap_in = bed->s->swap_reloc_in;
1955 else if (shdr->sh_entsize == bed->s->sizeof_rela)
1956 swap_in = bed->s->swap_reloca_in;
1957 else
1958 {
1959 bfd_set_error (bfd_error_wrong_format);
1960 return FALSE;
1961 }
1962
1963 erela = external_relocs;
51992aec 1964 erelaend = erela + shdr->sh_size;
45d6a902
AM
1965 irela = internal_relocs;
1966 while (erela < erelaend)
1967 {
243ef1e0
L
1968 bfd_vma r_symndx;
1969
45d6a902 1970 (*swap_in) (abfd, erela, irela);
243ef1e0
L
1971 r_symndx = ELF32_R_SYM (irela->r_info);
1972 if (bed->s->arch_size == 64)
1973 r_symndx >>= 24;
1974 if ((size_t) r_symndx >= nsyms)
1975 {
1976 (*_bfd_error_handler)
d003868e
AM
1977 (_("%B: bad reloc symbol index (0x%lx >= 0x%lx)"
1978 " for offset 0x%lx in section `%A'"),
1979 abfd, sec,
1980 (unsigned long) r_symndx, (unsigned long) nsyms, irela->r_offset);
243ef1e0
L
1981 bfd_set_error (bfd_error_bad_value);
1982 return FALSE;
1983 }
45d6a902
AM
1984 irela += bed->s->int_rels_per_ext_rel;
1985 erela += shdr->sh_entsize;
1986 }
1987
1988 return TRUE;
1989}
1990
1991/* Read and swap the relocs for a section O. They may have been
1992 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
1993 not NULL, they are used as buffers to read into. They are known to
1994 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
1995 the return value is allocated using either malloc or bfd_alloc,
1996 according to the KEEP_MEMORY argument. If O has two relocation
1997 sections (both REL and RELA relocations), then the REL_HDR
1998 relocations will appear first in INTERNAL_RELOCS, followed by the
1999 REL_HDR2 relocations. */
2000
2001Elf_Internal_Rela *
268b6b39
AM
2002_bfd_elf_link_read_relocs (bfd *abfd,
2003 asection *o,
2004 void *external_relocs,
2005 Elf_Internal_Rela *internal_relocs,
2006 bfd_boolean keep_memory)
45d6a902
AM
2007{
2008 Elf_Internal_Shdr *rel_hdr;
268b6b39 2009 void *alloc1 = NULL;
45d6a902 2010 Elf_Internal_Rela *alloc2 = NULL;
9c5bfbb7 2011 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902
AM
2012
2013 if (elf_section_data (o)->relocs != NULL)
2014 return elf_section_data (o)->relocs;
2015
2016 if (o->reloc_count == 0)
2017 return NULL;
2018
2019 rel_hdr = &elf_section_data (o)->rel_hdr;
2020
2021 if (internal_relocs == NULL)
2022 {
2023 bfd_size_type size;
2024
2025 size = o->reloc_count;
2026 size *= bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
2027 if (keep_memory)
268b6b39 2028 internal_relocs = bfd_alloc (abfd, size);
45d6a902 2029 else
268b6b39 2030 internal_relocs = alloc2 = bfd_malloc (size);
45d6a902
AM
2031 if (internal_relocs == NULL)
2032 goto error_return;
2033 }
2034
2035 if (external_relocs == NULL)
2036 {
2037 bfd_size_type size = rel_hdr->sh_size;
2038
2039 if (elf_section_data (o)->rel_hdr2)
2040 size += elf_section_data (o)->rel_hdr2->sh_size;
268b6b39 2041 alloc1 = bfd_malloc (size);
45d6a902
AM
2042 if (alloc1 == NULL)
2043 goto error_return;
2044 external_relocs = alloc1;
2045 }
2046
243ef1e0 2047 if (!elf_link_read_relocs_from_section (abfd, o, rel_hdr,
45d6a902
AM
2048 external_relocs,
2049 internal_relocs))
2050 goto error_return;
51992aec
AM
2051 if (elf_section_data (o)->rel_hdr2
2052 && (!elf_link_read_relocs_from_section
2053 (abfd, o,
2054 elf_section_data (o)->rel_hdr2,
2055 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
2056 internal_relocs + (NUM_SHDR_ENTRIES (rel_hdr)
2057 * bed->s->int_rels_per_ext_rel))))
45d6a902
AM
2058 goto error_return;
2059
2060 /* Cache the results for next time, if we can. */
2061 if (keep_memory)
2062 elf_section_data (o)->relocs = internal_relocs;
2063
2064 if (alloc1 != NULL)
2065 free (alloc1);
2066
2067 /* Don't free alloc2, since if it was allocated we are passing it
2068 back (under the name of internal_relocs). */
2069
2070 return internal_relocs;
2071
2072 error_return:
2073 if (alloc1 != NULL)
2074 free (alloc1);
2075 if (alloc2 != NULL)
2076 free (alloc2);
2077 return NULL;
2078}
2079
2080/* Compute the size of, and allocate space for, REL_HDR which is the
2081 section header for a section containing relocations for O. */
2082
2083bfd_boolean
268b6b39
AM
2084_bfd_elf_link_size_reloc_section (bfd *abfd,
2085 Elf_Internal_Shdr *rel_hdr,
2086 asection *o)
45d6a902
AM
2087{
2088 bfd_size_type reloc_count;
2089 bfd_size_type num_rel_hashes;
2090
2091 /* Figure out how many relocations there will be. */
2092 if (rel_hdr == &elf_section_data (o)->rel_hdr)
2093 reloc_count = elf_section_data (o)->rel_count;
2094 else
2095 reloc_count = elf_section_data (o)->rel_count2;
2096
2097 num_rel_hashes = o->reloc_count;
2098 if (num_rel_hashes < reloc_count)
2099 num_rel_hashes = reloc_count;
2100
2101 /* That allows us to calculate the size of the section. */
2102 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
2103
2104 /* The contents field must last into write_object_contents, so we
2105 allocate it with bfd_alloc rather than malloc. Also since we
2106 cannot be sure that the contents will actually be filled in,
2107 we zero the allocated space. */
268b6b39 2108 rel_hdr->contents = bfd_zalloc (abfd, rel_hdr->sh_size);
45d6a902
AM
2109 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
2110 return FALSE;
2111
2112 /* We only allocate one set of hash entries, so we only do it the
2113 first time we are called. */
2114 if (elf_section_data (o)->rel_hashes == NULL
2115 && num_rel_hashes)
2116 {
2117 struct elf_link_hash_entry **p;
2118
268b6b39 2119 p = bfd_zmalloc (num_rel_hashes * sizeof (struct elf_link_hash_entry *));
45d6a902
AM
2120 if (p == NULL)
2121 return FALSE;
2122
2123 elf_section_data (o)->rel_hashes = p;
2124 }
2125
2126 return TRUE;
2127}
2128
2129/* Copy the relocations indicated by the INTERNAL_RELOCS (which
2130 originated from the section given by INPUT_REL_HDR) to the
2131 OUTPUT_BFD. */
2132
2133bfd_boolean
268b6b39
AM
2134_bfd_elf_link_output_relocs (bfd *output_bfd,
2135 asection *input_section,
2136 Elf_Internal_Shdr *input_rel_hdr,
2137 Elf_Internal_Rela *internal_relocs)
45d6a902
AM
2138{
2139 Elf_Internal_Rela *irela;
2140 Elf_Internal_Rela *irelaend;
2141 bfd_byte *erel;
2142 Elf_Internal_Shdr *output_rel_hdr;
2143 asection *output_section;
2144 unsigned int *rel_countp = NULL;
9c5bfbb7 2145 const struct elf_backend_data *bed;
268b6b39 2146 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
45d6a902
AM
2147
2148 output_section = input_section->output_section;
2149 output_rel_hdr = NULL;
2150
2151 if (elf_section_data (output_section)->rel_hdr.sh_entsize
2152 == input_rel_hdr->sh_entsize)
2153 {
2154 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
2155 rel_countp = &elf_section_data (output_section)->rel_count;
2156 }
2157 else if (elf_section_data (output_section)->rel_hdr2
2158 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
2159 == input_rel_hdr->sh_entsize))
2160 {
2161 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
2162 rel_countp = &elf_section_data (output_section)->rel_count2;
2163 }
2164 else
2165 {
2166 (*_bfd_error_handler)
d003868e
AM
2167 (_("%B: relocation size mismatch in %B section %A"),
2168 output_bfd, input_section->owner, input_section);
45d6a902
AM
2169 bfd_set_error (bfd_error_wrong_object_format);
2170 return FALSE;
2171 }
2172
2173 bed = get_elf_backend_data (output_bfd);
2174 if (input_rel_hdr->sh_entsize == bed->s->sizeof_rel)
2175 swap_out = bed->s->swap_reloc_out;
2176 else if (input_rel_hdr->sh_entsize == bed->s->sizeof_rela)
2177 swap_out = bed->s->swap_reloca_out;
2178 else
2179 abort ();
2180
2181 erel = output_rel_hdr->contents;
2182 erel += *rel_countp * input_rel_hdr->sh_entsize;
2183 irela = internal_relocs;
2184 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
2185 * bed->s->int_rels_per_ext_rel);
2186 while (irela < irelaend)
2187 {
2188 (*swap_out) (output_bfd, irela, erel);
2189 irela += bed->s->int_rels_per_ext_rel;
2190 erel += input_rel_hdr->sh_entsize;
2191 }
2192
2193 /* Bump the counter, so that we know where to add the next set of
2194 relocations. */
2195 *rel_countp += NUM_SHDR_ENTRIES (input_rel_hdr);
2196
2197 return TRUE;
2198}
2199\f
2200/* Fix up the flags for a symbol. This handles various cases which
2201 can only be fixed after all the input files are seen. This is
2202 currently called by both adjust_dynamic_symbol and
2203 assign_sym_version, which is unnecessary but perhaps more robust in
2204 the face of future changes. */
2205
2206bfd_boolean
268b6b39
AM
2207_bfd_elf_fix_symbol_flags (struct elf_link_hash_entry *h,
2208 struct elf_info_failed *eif)
45d6a902
AM
2209{
2210 /* If this symbol was mentioned in a non-ELF file, try to set
2211 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
2212 permit a non-ELF file to correctly refer to a symbol defined in
2213 an ELF dynamic object. */
f5385ebf 2214 if (h->non_elf)
45d6a902
AM
2215 {
2216 while (h->root.type == bfd_link_hash_indirect)
2217 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2218
2219 if (h->root.type != bfd_link_hash_defined
2220 && h->root.type != bfd_link_hash_defweak)
f5385ebf
AM
2221 {
2222 h->ref_regular = 1;
2223 h->ref_regular_nonweak = 1;
2224 }
45d6a902
AM
2225 else
2226 {
2227 if (h->root.u.def.section->owner != NULL
2228 && (bfd_get_flavour (h->root.u.def.section->owner)
2229 == bfd_target_elf_flavour))
f5385ebf
AM
2230 {
2231 h->ref_regular = 1;
2232 h->ref_regular_nonweak = 1;
2233 }
45d6a902 2234 else
f5385ebf 2235 h->def_regular = 1;
45d6a902
AM
2236 }
2237
2238 if (h->dynindx == -1
f5385ebf
AM
2239 && (h->def_dynamic
2240 || h->ref_dynamic))
45d6a902 2241 {
c152c796 2242 if (! bfd_elf_link_record_dynamic_symbol (eif->info, h))
45d6a902
AM
2243 {
2244 eif->failed = TRUE;
2245 return FALSE;
2246 }
2247 }
2248 }
2249 else
2250 {
f5385ebf 2251 /* Unfortunately, NON_ELF is only correct if the symbol
45d6a902
AM
2252 was first seen in a non-ELF file. Fortunately, if the symbol
2253 was first seen in an ELF file, we're probably OK unless the
2254 symbol was defined in a non-ELF file. Catch that case here.
2255 FIXME: We're still in trouble if the symbol was first seen in
2256 a dynamic object, and then later in a non-ELF regular object. */
2257 if ((h->root.type == bfd_link_hash_defined
2258 || h->root.type == bfd_link_hash_defweak)
f5385ebf 2259 && !h->def_regular
45d6a902
AM
2260 && (h->root.u.def.section->owner != NULL
2261 ? (bfd_get_flavour (h->root.u.def.section->owner)
2262 != bfd_target_elf_flavour)
2263 : (bfd_is_abs_section (h->root.u.def.section)
f5385ebf
AM
2264 && !h->def_dynamic)))
2265 h->def_regular = 1;
45d6a902
AM
2266 }
2267
2268 /* If this is a final link, and the symbol was defined as a common
2269 symbol in a regular object file, and there was no definition in
2270 any dynamic object, then the linker will have allocated space for
f5385ebf 2271 the symbol in a common section but the DEF_REGULAR
45d6a902
AM
2272 flag will not have been set. */
2273 if (h->root.type == bfd_link_hash_defined
f5385ebf
AM
2274 && !h->def_regular
2275 && h->ref_regular
2276 && !h->def_dynamic
45d6a902 2277 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
f5385ebf 2278 h->def_regular = 1;
45d6a902
AM
2279
2280 /* If -Bsymbolic was used (which means to bind references to global
2281 symbols to the definition within the shared object), and this
2282 symbol was defined in a regular object, then it actually doesn't
9c7a29a3
AM
2283 need a PLT entry. Likewise, if the symbol has non-default
2284 visibility. If the symbol has hidden or internal visibility, we
c1be741f 2285 will force it local. */
f5385ebf 2286 if (h->needs_plt
45d6a902 2287 && eif->info->shared
0eddce27 2288 && is_elf_hash_table (eif->info->hash)
45d6a902 2289 && (eif->info->symbolic
c1be741f 2290 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
f5385ebf 2291 && h->def_regular)
45d6a902 2292 {
9c5bfbb7 2293 const struct elf_backend_data *bed;
45d6a902
AM
2294 bfd_boolean force_local;
2295
2296 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2297
2298 force_local = (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
2299 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN);
2300 (*bed->elf_backend_hide_symbol) (eif->info, h, force_local);
2301 }
2302
2303 /* If a weak undefined symbol has non-default visibility, we also
2304 hide it from the dynamic linker. */
9c7a29a3 2305 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
45d6a902
AM
2306 && h->root.type == bfd_link_hash_undefweak)
2307 {
9c5bfbb7 2308 const struct elf_backend_data *bed;
45d6a902
AM
2309 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2310 (*bed->elf_backend_hide_symbol) (eif->info, h, TRUE);
2311 }
2312
2313 /* If this is a weak defined symbol in a dynamic object, and we know
2314 the real definition in the dynamic object, copy interesting flags
2315 over to the real definition. */
f6e332e6 2316 if (h->u.weakdef != NULL)
45d6a902
AM
2317 {
2318 struct elf_link_hash_entry *weakdef;
2319
f6e332e6 2320 weakdef = h->u.weakdef;
45d6a902
AM
2321 if (h->root.type == bfd_link_hash_indirect)
2322 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2323
2324 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2325 || h->root.type == bfd_link_hash_defweak);
2326 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
2327 || weakdef->root.type == bfd_link_hash_defweak);
f5385ebf 2328 BFD_ASSERT (weakdef->def_dynamic);
45d6a902
AM
2329
2330 /* If the real definition is defined by a regular object file,
2331 don't do anything special. See the longer description in
2332 _bfd_elf_adjust_dynamic_symbol, below. */
f5385ebf 2333 if (weakdef->def_regular)
f6e332e6 2334 h->u.weakdef = NULL;
45d6a902
AM
2335 else
2336 {
9c5bfbb7 2337 const struct elf_backend_data *bed;
45d6a902
AM
2338
2339 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2340 (*bed->elf_backend_copy_indirect_symbol) (bed, weakdef, h);
2341 }
2342 }
2343
2344 return TRUE;
2345}
2346
2347/* Make the backend pick a good value for a dynamic symbol. This is
2348 called via elf_link_hash_traverse, and also calls itself
2349 recursively. */
2350
2351bfd_boolean
268b6b39 2352_bfd_elf_adjust_dynamic_symbol (struct elf_link_hash_entry *h, void *data)
45d6a902 2353{
268b6b39 2354 struct elf_info_failed *eif = data;
45d6a902 2355 bfd *dynobj;
9c5bfbb7 2356 const struct elf_backend_data *bed;
45d6a902 2357
0eddce27 2358 if (! is_elf_hash_table (eif->info->hash))
45d6a902
AM
2359 return FALSE;
2360
2361 if (h->root.type == bfd_link_hash_warning)
2362 {
2363 h->plt = elf_hash_table (eif->info)->init_offset;
2364 h->got = elf_hash_table (eif->info)->init_offset;
2365
2366 /* When warning symbols are created, they **replace** the "real"
2367 entry in the hash table, thus we never get to see the real
2368 symbol in a hash traversal. So look at it now. */
2369 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2370 }
2371
2372 /* Ignore indirect symbols. These are added by the versioning code. */
2373 if (h->root.type == bfd_link_hash_indirect)
2374 return TRUE;
2375
2376 /* Fix the symbol flags. */
2377 if (! _bfd_elf_fix_symbol_flags (h, eif))
2378 return FALSE;
2379
2380 /* If this symbol does not require a PLT entry, and it is not
2381 defined by a dynamic object, or is not referenced by a regular
2382 object, ignore it. We do have to handle a weak defined symbol,
2383 even if no regular object refers to it, if we decided to add it
2384 to the dynamic symbol table. FIXME: Do we normally need to worry
2385 about symbols which are defined by one dynamic object and
2386 referenced by another one? */
f5385ebf
AM
2387 if (!h->needs_plt
2388 && (h->def_regular
2389 || !h->def_dynamic
2390 || (!h->ref_regular
f6e332e6 2391 && (h->u.weakdef == NULL || h->u.weakdef->dynindx == -1))))
45d6a902
AM
2392 {
2393 h->plt = elf_hash_table (eif->info)->init_offset;
2394 return TRUE;
2395 }
2396
2397 /* If we've already adjusted this symbol, don't do it again. This
2398 can happen via a recursive call. */
f5385ebf 2399 if (h->dynamic_adjusted)
45d6a902
AM
2400 return TRUE;
2401
2402 /* Don't look at this symbol again. Note that we must set this
2403 after checking the above conditions, because we may look at a
2404 symbol once, decide not to do anything, and then get called
2405 recursively later after REF_REGULAR is set below. */
f5385ebf 2406 h->dynamic_adjusted = 1;
45d6a902
AM
2407
2408 /* If this is a weak definition, and we know a real definition, and
2409 the real symbol is not itself defined by a regular object file,
2410 then get a good value for the real definition. We handle the
2411 real symbol first, for the convenience of the backend routine.
2412
2413 Note that there is a confusing case here. If the real definition
2414 is defined by a regular object file, we don't get the real symbol
2415 from the dynamic object, but we do get the weak symbol. If the
2416 processor backend uses a COPY reloc, then if some routine in the
2417 dynamic object changes the real symbol, we will not see that
2418 change in the corresponding weak symbol. This is the way other
2419 ELF linkers work as well, and seems to be a result of the shared
2420 library model.
2421
2422 I will clarify this issue. Most SVR4 shared libraries define the
2423 variable _timezone and define timezone as a weak synonym. The
2424 tzset call changes _timezone. If you write
2425 extern int timezone;
2426 int _timezone = 5;
2427 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
2428 you might expect that, since timezone is a synonym for _timezone,
2429 the same number will print both times. However, if the processor
2430 backend uses a COPY reloc, then actually timezone will be copied
2431 into your process image, and, since you define _timezone
2432 yourself, _timezone will not. Thus timezone and _timezone will
2433 wind up at different memory locations. The tzset call will set
2434 _timezone, leaving timezone unchanged. */
2435
f6e332e6 2436 if (h->u.weakdef != NULL)
45d6a902
AM
2437 {
2438 /* If we get to this point, we know there is an implicit
2439 reference by a regular object file via the weak symbol H.
2440 FIXME: Is this really true? What if the traversal finds
f6e332e6
AM
2441 H->U.WEAKDEF before it finds H? */
2442 h->u.weakdef->ref_regular = 1;
45d6a902 2443
f6e332e6 2444 if (! _bfd_elf_adjust_dynamic_symbol (h->u.weakdef, eif))
45d6a902
AM
2445 return FALSE;
2446 }
2447
2448 /* If a symbol has no type and no size and does not require a PLT
2449 entry, then we are probably about to do the wrong thing here: we
2450 are probably going to create a COPY reloc for an empty object.
2451 This case can arise when a shared object is built with assembly
2452 code, and the assembly code fails to set the symbol type. */
2453 if (h->size == 0
2454 && h->type == STT_NOTYPE
f5385ebf 2455 && !h->needs_plt)
45d6a902
AM
2456 (*_bfd_error_handler)
2457 (_("warning: type and size of dynamic symbol `%s' are not defined"),
2458 h->root.root.string);
2459
2460 dynobj = elf_hash_table (eif->info)->dynobj;
2461 bed = get_elf_backend_data (dynobj);
2462 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
2463 {
2464 eif->failed = TRUE;
2465 return FALSE;
2466 }
2467
2468 return TRUE;
2469}
2470
2471/* Adjust all external symbols pointing into SEC_MERGE sections
2472 to reflect the object merging within the sections. */
2473
2474bfd_boolean
268b6b39 2475_bfd_elf_link_sec_merge_syms (struct elf_link_hash_entry *h, void *data)
45d6a902
AM
2476{
2477 asection *sec;
2478
2479 if (h->root.type == bfd_link_hash_warning)
2480 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2481
2482 if ((h->root.type == bfd_link_hash_defined
2483 || h->root.type == bfd_link_hash_defweak)
2484 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
2485 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
2486 {
268b6b39 2487 bfd *output_bfd = data;
45d6a902
AM
2488
2489 h->root.u.def.value =
2490 _bfd_merged_section_offset (output_bfd,
2491 &h->root.u.def.section,
2492 elf_section_data (sec)->sec_info,
753731ee 2493 h->root.u.def.value);
45d6a902
AM
2494 }
2495
2496 return TRUE;
2497}
986a241f
RH
2498
2499/* Returns false if the symbol referred to by H should be considered
2500 to resolve local to the current module, and true if it should be
2501 considered to bind dynamically. */
2502
2503bfd_boolean
268b6b39
AM
2504_bfd_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
2505 struct bfd_link_info *info,
2506 bfd_boolean ignore_protected)
986a241f
RH
2507{
2508 bfd_boolean binding_stays_local_p;
2509
2510 if (h == NULL)
2511 return FALSE;
2512
2513 while (h->root.type == bfd_link_hash_indirect
2514 || h->root.type == bfd_link_hash_warning)
2515 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2516
2517 /* If it was forced local, then clearly it's not dynamic. */
2518 if (h->dynindx == -1)
2519 return FALSE;
f5385ebf 2520 if (h->forced_local)
986a241f
RH
2521 return FALSE;
2522
2523 /* Identify the cases where name binding rules say that a
2524 visible symbol resolves locally. */
2525 binding_stays_local_p = info->executable || info->symbolic;
2526
2527 switch (ELF_ST_VISIBILITY (h->other))
2528 {
2529 case STV_INTERNAL:
2530 case STV_HIDDEN:
2531 return FALSE;
2532
2533 case STV_PROTECTED:
2534 /* Proper resolution for function pointer equality may require
2535 that these symbols perhaps be resolved dynamically, even though
2536 we should be resolving them to the current module. */
1c16dfa5 2537 if (!ignore_protected || h->type != STT_FUNC)
986a241f
RH
2538 binding_stays_local_p = TRUE;
2539 break;
2540
2541 default:
986a241f
RH
2542 break;
2543 }
2544
aa37626c 2545 /* If it isn't defined locally, then clearly it's dynamic. */
f5385ebf 2546 if (!h->def_regular)
aa37626c
L
2547 return TRUE;
2548
986a241f
RH
2549 /* Otherwise, the symbol is dynamic if binding rules don't tell
2550 us that it remains local. */
2551 return !binding_stays_local_p;
2552}
f6c52c13
AM
2553
2554/* Return true if the symbol referred to by H should be considered
2555 to resolve local to the current module, and false otherwise. Differs
2556 from (the inverse of) _bfd_elf_dynamic_symbol_p in the treatment of
2557 undefined symbols and weak symbols. */
2558
2559bfd_boolean
268b6b39
AM
2560_bfd_elf_symbol_refs_local_p (struct elf_link_hash_entry *h,
2561 struct bfd_link_info *info,
2562 bfd_boolean local_protected)
f6c52c13
AM
2563{
2564 /* If it's a local sym, of course we resolve locally. */
2565 if (h == NULL)
2566 return TRUE;
2567
7e2294f9
AO
2568 /* Common symbols that become definitions don't get the DEF_REGULAR
2569 flag set, so test it first, and don't bail out. */
2570 if (ELF_COMMON_DEF_P (h))
2571 /* Do nothing. */;
f6c52c13
AM
2572 /* If we don't have a definition in a regular file, then we can't
2573 resolve locally. The sym is either undefined or dynamic. */
f5385ebf 2574 else if (!h->def_regular)
f6c52c13
AM
2575 return FALSE;
2576
2577 /* Forced local symbols resolve locally. */
f5385ebf 2578 if (h->forced_local)
f6c52c13
AM
2579 return TRUE;
2580
2581 /* As do non-dynamic symbols. */
2582 if (h->dynindx == -1)
2583 return TRUE;
2584
2585 /* At this point, we know the symbol is defined and dynamic. In an
2586 executable it must resolve locally, likewise when building symbolic
2587 shared libraries. */
2588 if (info->executable || info->symbolic)
2589 return TRUE;
2590
2591 /* Now deal with defined dynamic symbols in shared libraries. Ones
2592 with default visibility might not resolve locally. */
2593 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
2594 return FALSE;
2595
2596 /* However, STV_HIDDEN or STV_INTERNAL ones must be local. */
2597 if (ELF_ST_VISIBILITY (h->other) != STV_PROTECTED)
2598 return TRUE;
2599
1c16dfa5
L
2600 /* STV_PROTECTED non-function symbols are local. */
2601 if (h->type != STT_FUNC)
2602 return TRUE;
2603
f6c52c13
AM
2604 /* Function pointer equality tests may require that STV_PROTECTED
2605 symbols be treated as dynamic symbols, even when we know that the
2606 dynamic linker will resolve them locally. */
2607 return local_protected;
2608}
e1918d23
AM
2609
2610/* Caches some TLS segment info, and ensures that the TLS segment vma is
2611 aligned. Returns the first TLS output section. */
2612
2613struct bfd_section *
2614_bfd_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
2615{
2616 struct bfd_section *sec, *tls;
2617 unsigned int align = 0;
2618
2619 for (sec = obfd->sections; sec != NULL; sec = sec->next)
2620 if ((sec->flags & SEC_THREAD_LOCAL) != 0)
2621 break;
2622 tls = sec;
2623
2624 for (; sec != NULL && (sec->flags & SEC_THREAD_LOCAL) != 0; sec = sec->next)
2625 if (sec->alignment_power > align)
2626 align = sec->alignment_power;
2627
2628 elf_hash_table (info)->tls_sec = tls;
2629
2630 /* Ensure the alignment of the first section is the largest alignment,
2631 so that the tls segment starts aligned. */
2632 if (tls != NULL)
2633 tls->alignment_power = align;
2634
2635 return tls;
2636}
0ad989f9
L
2637
2638/* Return TRUE iff this is a non-common, definition of a non-function symbol. */
2639static bfd_boolean
2640is_global_data_symbol_definition (bfd *abfd ATTRIBUTE_UNUSED,
2641 Elf_Internal_Sym *sym)
2642{
2643 /* Local symbols do not count, but target specific ones might. */
2644 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
2645 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
2646 return FALSE;
2647
2648 /* Function symbols do not count. */
2649 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
2650 return FALSE;
2651
2652 /* If the section is undefined, then so is the symbol. */
2653 if (sym->st_shndx == SHN_UNDEF)
2654 return FALSE;
2655
2656 /* If the symbol is defined in the common section, then
2657 it is a common definition and so does not count. */
2658 if (sym->st_shndx == SHN_COMMON)
2659 return FALSE;
2660
2661 /* If the symbol is in a target specific section then we
2662 must rely upon the backend to tell us what it is. */
2663 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
2664 /* FIXME - this function is not coded yet:
2665
2666 return _bfd_is_global_symbol_definition (abfd, sym);
2667
2668 Instead for now assume that the definition is not global,
2669 Even if this is wrong, at least the linker will behave
2670 in the same way that it used to do. */
2671 return FALSE;
2672
2673 return TRUE;
2674}
2675
2676/* Search the symbol table of the archive element of the archive ABFD
2677 whose archive map contains a mention of SYMDEF, and determine if
2678 the symbol is defined in this element. */
2679static bfd_boolean
2680elf_link_is_defined_archive_symbol (bfd * abfd, carsym * symdef)
2681{
2682 Elf_Internal_Shdr * hdr;
2683 bfd_size_type symcount;
2684 bfd_size_type extsymcount;
2685 bfd_size_type extsymoff;
2686 Elf_Internal_Sym *isymbuf;
2687 Elf_Internal_Sym *isym;
2688 Elf_Internal_Sym *isymend;
2689 bfd_boolean result;
2690
2691 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
2692 if (abfd == NULL)
2693 return FALSE;
2694
2695 if (! bfd_check_format (abfd, bfd_object))
2696 return FALSE;
2697
2698 /* If we have already included the element containing this symbol in the
2699 link then we do not need to include it again. Just claim that any symbol
2700 it contains is not a definition, so that our caller will not decide to
2701 (re)include this element. */
2702 if (abfd->archive_pass)
2703 return FALSE;
2704
2705 /* Select the appropriate symbol table. */
2706 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
2707 hdr = &elf_tdata (abfd)->symtab_hdr;
2708 else
2709 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2710
2711 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
2712
2713 /* The sh_info field of the symtab header tells us where the
2714 external symbols start. We don't care about the local symbols. */
2715 if (elf_bad_symtab (abfd))
2716 {
2717 extsymcount = symcount;
2718 extsymoff = 0;
2719 }
2720 else
2721 {
2722 extsymcount = symcount - hdr->sh_info;
2723 extsymoff = hdr->sh_info;
2724 }
2725
2726 if (extsymcount == 0)
2727 return FALSE;
2728
2729 /* Read in the symbol table. */
2730 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
2731 NULL, NULL, NULL);
2732 if (isymbuf == NULL)
2733 return FALSE;
2734
2735 /* Scan the symbol table looking for SYMDEF. */
2736 result = FALSE;
2737 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
2738 {
2739 const char *name;
2740
2741 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
2742 isym->st_name);
2743 if (name == NULL)
2744 break;
2745
2746 if (strcmp (name, symdef->name) == 0)
2747 {
2748 result = is_global_data_symbol_definition (abfd, isym);
2749 break;
2750 }
2751 }
2752
2753 free (isymbuf);
2754
2755 return result;
2756}
2757\f
5a580b3a
AM
2758/* Add an entry to the .dynamic table. */
2759
2760bfd_boolean
2761_bfd_elf_add_dynamic_entry (struct bfd_link_info *info,
2762 bfd_vma tag,
2763 bfd_vma val)
2764{
2765 struct elf_link_hash_table *hash_table;
2766 const struct elf_backend_data *bed;
2767 asection *s;
2768 bfd_size_type newsize;
2769 bfd_byte *newcontents;
2770 Elf_Internal_Dyn dyn;
2771
2772 hash_table = elf_hash_table (info);
2773 if (! is_elf_hash_table (hash_table))
2774 return FALSE;
2775
8fdd7217
NC
2776 if (info->warn_shared_textrel && info->shared && tag == DT_TEXTREL)
2777 _bfd_error_handler
2778 (_("warning: creating a DT_TEXTREL in a shared object."));
2779
5a580b3a
AM
2780 bed = get_elf_backend_data (hash_table->dynobj);
2781 s = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
2782 BFD_ASSERT (s != NULL);
2783
eea6121a 2784 newsize = s->size + bed->s->sizeof_dyn;
5a580b3a
AM
2785 newcontents = bfd_realloc (s->contents, newsize);
2786 if (newcontents == NULL)
2787 return FALSE;
2788
2789 dyn.d_tag = tag;
2790 dyn.d_un.d_val = val;
eea6121a 2791 bed->s->swap_dyn_out (hash_table->dynobj, &dyn, newcontents + s->size);
5a580b3a 2792
eea6121a 2793 s->size = newsize;
5a580b3a
AM
2794 s->contents = newcontents;
2795
2796 return TRUE;
2797}
2798
2799/* Add a DT_NEEDED entry for this dynamic object if DO_IT is true,
2800 otherwise just check whether one already exists. Returns -1 on error,
2801 1 if a DT_NEEDED tag already exists, and 0 on success. */
2802
4ad4eba5 2803static int
7e9f0867
AM
2804elf_add_dt_needed_tag (bfd *abfd,
2805 struct bfd_link_info *info,
4ad4eba5
AM
2806 const char *soname,
2807 bfd_boolean do_it)
5a580b3a
AM
2808{
2809 struct elf_link_hash_table *hash_table;
2810 bfd_size_type oldsize;
2811 bfd_size_type strindex;
2812
7e9f0867
AM
2813 if (!_bfd_elf_link_create_dynstrtab (abfd, info))
2814 return -1;
2815
5a580b3a
AM
2816 hash_table = elf_hash_table (info);
2817 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
2818 strindex = _bfd_elf_strtab_add (hash_table->dynstr, soname, FALSE);
2819 if (strindex == (bfd_size_type) -1)
2820 return -1;
2821
2822 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
2823 {
2824 asection *sdyn;
2825 const struct elf_backend_data *bed;
2826 bfd_byte *extdyn;
2827
2828 bed = get_elf_backend_data (hash_table->dynobj);
2829 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
7e9f0867
AM
2830 if (sdyn != NULL)
2831 for (extdyn = sdyn->contents;
2832 extdyn < sdyn->contents + sdyn->size;
2833 extdyn += bed->s->sizeof_dyn)
2834 {
2835 Elf_Internal_Dyn dyn;
5a580b3a 2836
7e9f0867
AM
2837 bed->s->swap_dyn_in (hash_table->dynobj, extdyn, &dyn);
2838 if (dyn.d_tag == DT_NEEDED
2839 && dyn.d_un.d_val == strindex)
2840 {
2841 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
2842 return 1;
2843 }
2844 }
5a580b3a
AM
2845 }
2846
2847 if (do_it)
2848 {
7e9f0867
AM
2849 if (!_bfd_elf_link_create_dynamic_sections (hash_table->dynobj, info))
2850 return -1;
2851
5a580b3a
AM
2852 if (!_bfd_elf_add_dynamic_entry (info, DT_NEEDED, strindex))
2853 return -1;
2854 }
2855 else
2856 /* We were just checking for existence of the tag. */
2857 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
2858
2859 return 0;
2860}
2861
77cfaee6
AM
2862/* Called via elf_link_hash_traverse, elf_smash_syms sets all symbols
2863 belonging to NOT_NEEDED to bfd_link_hash_new. We know there are no
ec13b3bb
AM
2864 references from regular objects to these symbols.
2865
2866 ??? Should we do something about references from other dynamic
2867 obects? If not, we potentially lose some warnings about undefined
2868 symbols. But how can we recover the initial undefined / undefweak
2869 state? */
77cfaee6
AM
2870
2871struct elf_smash_syms_data
2872{
2873 bfd *not_needed;
2874 struct elf_link_hash_table *htab;
2875 bfd_boolean twiddled;
2876};
2877
2878static bfd_boolean
2879elf_smash_syms (struct elf_link_hash_entry *h, void *data)
2880{
2881 struct elf_smash_syms_data *inf = (struct elf_smash_syms_data *) data;
2882 struct bfd_link_hash_entry *bh;
2883
2884 switch (h->root.type)
2885 {
2886 default:
2887 case bfd_link_hash_new:
2888 return TRUE;
2889
2890 case bfd_link_hash_undefined:
11f25ea6
AM
2891 if (h->root.u.undef.abfd != inf->not_needed)
2892 return TRUE;
4ea42fb7
AM
2893 if (h->root.u.undef.weak != NULL
2894 && h->root.u.undef.weak != inf->not_needed)
11f25ea6
AM
2895 {
2896 /* Symbol was undefweak in u.undef.weak bfd, and has become
2897 undefined in as-needed lib. Restore weak. */
2898 h->root.type = bfd_link_hash_undefweak;
2899 h->root.u.undef.abfd = h->root.u.undef.weak;
2900 if (h->root.u.undef.next != NULL
2901 || inf->htab->root.undefs_tail == &h->root)
2902 inf->twiddled = TRUE;
2903 return TRUE;
2904 }
2905 break;
2906
77cfaee6
AM
2907 case bfd_link_hash_undefweak:
2908 if (h->root.u.undef.abfd != inf->not_needed)
2909 return TRUE;
2910 break;
2911
2912 case bfd_link_hash_defined:
2913 case bfd_link_hash_defweak:
2914 if (h->root.u.def.section->owner != inf->not_needed)
2915 return TRUE;
2916 break;
2917
2918 case bfd_link_hash_common:
2919 if (h->root.u.c.p->section->owner != inf->not_needed)
2920 return TRUE;
2921 break;
2922
2923 case bfd_link_hash_warning:
2924 case bfd_link_hash_indirect:
2925 elf_smash_syms ((struct elf_link_hash_entry *) h->root.u.i.link, data);
2926 if (h->root.u.i.link->type != bfd_link_hash_new)
2927 return TRUE;
2928 if (h->root.u.i.link->u.undef.abfd != inf->not_needed)
2929 return TRUE;
2930 break;
2931 }
2932
11f25ea6
AM
2933 /* There is no way we can undo symbol table state from defined or
2934 defweak back to undefined. */
2935 if (h->ref_regular)
2936 abort ();
2937
2e8b3a61
AM
2938 /* Set sym back to newly created state, but keep undef.next if it is
2939 being used as a list pointer. */
77cfaee6 2940 bh = h->root.u.undef.next;
2e8b3a61
AM
2941 if (bh == &h->root)
2942 bh = NULL;
77cfaee6
AM
2943 if (bh != NULL || inf->htab->root.undefs_tail == &h->root)
2944 inf->twiddled = TRUE;
2945 (*inf->htab->root.table.newfunc) (&h->root.root,
2946 &inf->htab->root.table,
2947 h->root.root.string);
2948 h->root.u.undef.next = bh;
2949 h->root.u.undef.abfd = inf->not_needed;
2950 h->non_elf = 0;
2951 return TRUE;
2952}
2953
5a580b3a 2954/* Sort symbol by value and section. */
4ad4eba5
AM
2955static int
2956elf_sort_symbol (const void *arg1, const void *arg2)
5a580b3a
AM
2957{
2958 const struct elf_link_hash_entry *h1;
2959 const struct elf_link_hash_entry *h2;
10b7e05b 2960 bfd_signed_vma vdiff;
5a580b3a
AM
2961
2962 h1 = *(const struct elf_link_hash_entry **) arg1;
2963 h2 = *(const struct elf_link_hash_entry **) arg2;
10b7e05b
NC
2964 vdiff = h1->root.u.def.value - h2->root.u.def.value;
2965 if (vdiff != 0)
2966 return vdiff > 0 ? 1 : -1;
2967 else
2968 {
2969 long sdiff = h1->root.u.def.section->id - h2->root.u.def.section->id;
2970 if (sdiff != 0)
2971 return sdiff > 0 ? 1 : -1;
2972 }
5a580b3a
AM
2973 return 0;
2974}
4ad4eba5 2975
5a580b3a
AM
2976/* This function is used to adjust offsets into .dynstr for
2977 dynamic symbols. This is called via elf_link_hash_traverse. */
2978
2979static bfd_boolean
2980elf_adjust_dynstr_offsets (struct elf_link_hash_entry *h, void *data)
2981{
2982 struct elf_strtab_hash *dynstr = data;
2983
2984 if (h->root.type == bfd_link_hash_warning)
2985 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2986
2987 if (h->dynindx != -1)
2988 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
2989 return TRUE;
2990}
2991
2992/* Assign string offsets in .dynstr, update all structures referencing
2993 them. */
2994
4ad4eba5
AM
2995static bfd_boolean
2996elf_finalize_dynstr (bfd *output_bfd, struct bfd_link_info *info)
5a580b3a
AM
2997{
2998 struct elf_link_hash_table *hash_table = elf_hash_table (info);
2999 struct elf_link_local_dynamic_entry *entry;
3000 struct elf_strtab_hash *dynstr = hash_table->dynstr;
3001 bfd *dynobj = hash_table->dynobj;
3002 asection *sdyn;
3003 bfd_size_type size;
3004 const struct elf_backend_data *bed;
3005 bfd_byte *extdyn;
3006
3007 _bfd_elf_strtab_finalize (dynstr);
3008 size = _bfd_elf_strtab_size (dynstr);
3009
3010 bed = get_elf_backend_data (dynobj);
3011 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3012 BFD_ASSERT (sdyn != NULL);
3013
3014 /* Update all .dynamic entries referencing .dynstr strings. */
3015 for (extdyn = sdyn->contents;
eea6121a 3016 extdyn < sdyn->contents + sdyn->size;
5a580b3a
AM
3017 extdyn += bed->s->sizeof_dyn)
3018 {
3019 Elf_Internal_Dyn dyn;
3020
3021 bed->s->swap_dyn_in (dynobj, extdyn, &dyn);
3022 switch (dyn.d_tag)
3023 {
3024 case DT_STRSZ:
3025 dyn.d_un.d_val = size;
3026 break;
3027 case DT_NEEDED:
3028 case DT_SONAME:
3029 case DT_RPATH:
3030 case DT_RUNPATH:
3031 case DT_FILTER:
3032 case DT_AUXILIARY:
3033 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
3034 break;
3035 default:
3036 continue;
3037 }
3038 bed->s->swap_dyn_out (dynobj, &dyn, extdyn);
3039 }
3040
3041 /* Now update local dynamic symbols. */
3042 for (entry = hash_table->dynlocal; entry ; entry = entry->next)
3043 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
3044 entry->isym.st_name);
3045
3046 /* And the rest of dynamic symbols. */
3047 elf_link_hash_traverse (hash_table, elf_adjust_dynstr_offsets, dynstr);
3048
3049 /* Adjust version definitions. */
3050 if (elf_tdata (output_bfd)->cverdefs)
3051 {
3052 asection *s;
3053 bfd_byte *p;
3054 bfd_size_type i;
3055 Elf_Internal_Verdef def;
3056 Elf_Internal_Verdaux defaux;
3057
3058 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3059 p = s->contents;
3060 do
3061 {
3062 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
3063 &def);
3064 p += sizeof (Elf_External_Verdef);
3e3b46e5
PB
3065 if (def.vd_aux != sizeof (Elf_External_Verdef))
3066 continue;
5a580b3a
AM
3067 for (i = 0; i < def.vd_cnt; ++i)
3068 {
3069 _bfd_elf_swap_verdaux_in (output_bfd,
3070 (Elf_External_Verdaux *) p, &defaux);
3071 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
3072 defaux.vda_name);
3073 _bfd_elf_swap_verdaux_out (output_bfd,
3074 &defaux, (Elf_External_Verdaux *) p);
3075 p += sizeof (Elf_External_Verdaux);
3076 }
3077 }
3078 while (def.vd_next);
3079 }
3080
3081 /* Adjust version references. */
3082 if (elf_tdata (output_bfd)->verref)
3083 {
3084 asection *s;
3085 bfd_byte *p;
3086 bfd_size_type i;
3087 Elf_Internal_Verneed need;
3088 Elf_Internal_Vernaux needaux;
3089
3090 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3091 p = s->contents;
3092 do
3093 {
3094 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
3095 &need);
3096 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
3097 _bfd_elf_swap_verneed_out (output_bfd, &need,
3098 (Elf_External_Verneed *) p);
3099 p += sizeof (Elf_External_Verneed);
3100 for (i = 0; i < need.vn_cnt; ++i)
3101 {
3102 _bfd_elf_swap_vernaux_in (output_bfd,
3103 (Elf_External_Vernaux *) p, &needaux);
3104 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
3105 needaux.vna_name);
3106 _bfd_elf_swap_vernaux_out (output_bfd,
3107 &needaux,
3108 (Elf_External_Vernaux *) p);
3109 p += sizeof (Elf_External_Vernaux);
3110 }
3111 }
3112 while (need.vn_next);
3113 }
3114
3115 return TRUE;
3116}
3117\f
4ad4eba5
AM
3118/* Add symbols from an ELF object file to the linker hash table. */
3119
3120static bfd_boolean
3121elf_link_add_object_symbols (bfd *abfd, struct bfd_link_info *info)
3122{
3123 bfd_boolean (*add_symbol_hook)
555cd476 3124 (bfd *, struct bfd_link_info *, Elf_Internal_Sym *,
4ad4eba5
AM
3125 const char **, flagword *, asection **, bfd_vma *);
3126 bfd_boolean (*check_relocs)
3127 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
85fbca6a
NC
3128 bfd_boolean (*check_directives)
3129 (bfd *, struct bfd_link_info *);
4ad4eba5
AM
3130 bfd_boolean collect;
3131 Elf_Internal_Shdr *hdr;
3132 bfd_size_type symcount;
3133 bfd_size_type extsymcount;
3134 bfd_size_type extsymoff;
3135 struct elf_link_hash_entry **sym_hash;
3136 bfd_boolean dynamic;
3137 Elf_External_Versym *extversym = NULL;
3138 Elf_External_Versym *ever;
3139 struct elf_link_hash_entry *weaks;
3140 struct elf_link_hash_entry **nondeflt_vers = NULL;
3141 bfd_size_type nondeflt_vers_cnt = 0;
3142 Elf_Internal_Sym *isymbuf = NULL;
3143 Elf_Internal_Sym *isym;
3144 Elf_Internal_Sym *isymend;
3145 const struct elf_backend_data *bed;
3146 bfd_boolean add_needed;
3147 struct elf_link_hash_table * hash_table;
3148 bfd_size_type amt;
3149
3150 hash_table = elf_hash_table (info);
3151
3152 bed = get_elf_backend_data (abfd);
3153 add_symbol_hook = bed->elf_add_symbol_hook;
3154 collect = bed->collect;
3155
3156 if ((abfd->flags & DYNAMIC) == 0)
3157 dynamic = FALSE;
3158 else
3159 {
3160 dynamic = TRUE;
3161
3162 /* You can't use -r against a dynamic object. Also, there's no
3163 hope of using a dynamic object which does not exactly match
3164 the format of the output file. */
3165 if (info->relocatable
3166 || !is_elf_hash_table (hash_table)
3167 || hash_table->root.creator != abfd->xvec)
3168 {
9a0789ec
NC
3169 if (info->relocatable)
3170 bfd_set_error (bfd_error_invalid_operation);
3171 else
3172 bfd_set_error (bfd_error_wrong_format);
4ad4eba5
AM
3173 goto error_return;
3174 }
3175 }
3176
3177 /* As a GNU extension, any input sections which are named
3178 .gnu.warning.SYMBOL are treated as warning symbols for the given
3179 symbol. This differs from .gnu.warning sections, which generate
3180 warnings when they are included in an output file. */
3181 if (info->executable)
3182 {
3183 asection *s;
3184
3185 for (s = abfd->sections; s != NULL; s = s->next)
3186 {
3187 const char *name;
3188
3189 name = bfd_get_section_name (abfd, s);
3190 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
3191 {
3192 char *msg;
3193 bfd_size_type sz;
4ad4eba5
AM
3194
3195 name += sizeof ".gnu.warning." - 1;
3196
3197 /* If this is a shared object, then look up the symbol
3198 in the hash table. If it is there, and it is already
3199 been defined, then we will not be using the entry
3200 from this shared object, so we don't need to warn.
3201 FIXME: If we see the definition in a regular object
3202 later on, we will warn, but we shouldn't. The only
3203 fix is to keep track of what warnings we are supposed
3204 to emit, and then handle them all at the end of the
3205 link. */
3206 if (dynamic)
3207 {
3208 struct elf_link_hash_entry *h;
3209
3210 h = elf_link_hash_lookup (hash_table, name,
3211 FALSE, FALSE, TRUE);
3212
3213 /* FIXME: What about bfd_link_hash_common? */
3214 if (h != NULL
3215 && (h->root.type == bfd_link_hash_defined
3216 || h->root.type == bfd_link_hash_defweak))
3217 {
3218 /* We don't want to issue this warning. Clobber
3219 the section size so that the warning does not
3220 get copied into the output file. */
eea6121a 3221 s->size = 0;
4ad4eba5
AM
3222 continue;
3223 }
3224 }
3225
eea6121a 3226 sz = s->size;
370a0e1b 3227 msg = bfd_alloc (abfd, sz + 1);
4ad4eba5
AM
3228 if (msg == NULL)
3229 goto error_return;
3230
370a0e1b 3231 if (! bfd_get_section_contents (abfd, s, msg, 0, sz))
4ad4eba5
AM
3232 goto error_return;
3233
370a0e1b 3234 msg[sz] = '\0';
4ad4eba5
AM
3235
3236 if (! (_bfd_generic_link_add_one_symbol
3237 (info, abfd, name, BSF_WARNING, s, 0, msg,
3238 FALSE, collect, NULL)))
3239 goto error_return;
3240
3241 if (! info->relocatable)
3242 {
3243 /* Clobber the section size so that the warning does
3244 not get copied into the output file. */
eea6121a 3245 s->size = 0;
11d2f718
AM
3246
3247 /* Also set SEC_EXCLUDE, so that symbols defined in
3248 the warning section don't get copied to the output. */
3249 s->flags |= SEC_EXCLUDE;
4ad4eba5
AM
3250 }
3251 }
3252 }
3253 }
3254
3255 add_needed = TRUE;
3256 if (! dynamic)
3257 {
3258 /* If we are creating a shared library, create all the dynamic
3259 sections immediately. We need to attach them to something,
3260 so we attach them to this BFD, provided it is the right
3261 format. FIXME: If there are no input BFD's of the same
3262 format as the output, we can't make a shared library. */
3263 if (info->shared
3264 && is_elf_hash_table (hash_table)
3265 && hash_table->root.creator == abfd->xvec
3266 && ! hash_table->dynamic_sections_created)
3267 {
3268 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
3269 goto error_return;
3270 }
3271 }
3272 else if (!is_elf_hash_table (hash_table))
3273 goto error_return;
3274 else
3275 {
3276 asection *s;
3277 const char *soname = NULL;
3278 struct bfd_link_needed_list *rpath = NULL, *runpath = NULL;
3279 int ret;
3280
3281 /* ld --just-symbols and dynamic objects don't mix very well.
3282 Test for --just-symbols by looking at info set up by
3283 _bfd_elf_link_just_syms. */
3284 if ((s = abfd->sections) != NULL
3285 && s->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
3286 goto error_return;
3287
3288 /* If this dynamic lib was specified on the command line with
3289 --as-needed in effect, then we don't want to add a DT_NEEDED
3290 tag unless the lib is actually used. Similary for libs brought
e56f61be
L
3291 in by another lib's DT_NEEDED. When --no-add-needed is used
3292 on a dynamic lib, we don't want to add a DT_NEEDED entry for
3293 any dynamic library in DT_NEEDED tags in the dynamic lib at
3294 all. */
3295 add_needed = (elf_dyn_lib_class (abfd)
3296 & (DYN_AS_NEEDED | DYN_DT_NEEDED
3297 | DYN_NO_NEEDED)) == 0;
4ad4eba5
AM
3298
3299 s = bfd_get_section_by_name (abfd, ".dynamic");
3300 if (s != NULL)
3301 {
3302 bfd_byte *dynbuf;
3303 bfd_byte *extdyn;
3304 int elfsec;
3305 unsigned long shlink;
3306
eea6121a 3307 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
4ad4eba5
AM
3308 goto error_free_dyn;
3309
3310 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
3311 if (elfsec == -1)
3312 goto error_free_dyn;
3313 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
3314
3315 for (extdyn = dynbuf;
eea6121a 3316 extdyn < dynbuf + s->size;
4ad4eba5
AM
3317 extdyn += bed->s->sizeof_dyn)
3318 {
3319 Elf_Internal_Dyn dyn;
3320
3321 bed->s->swap_dyn_in (abfd, extdyn, &dyn);
3322 if (dyn.d_tag == DT_SONAME)
3323 {
3324 unsigned int tagv = dyn.d_un.d_val;
3325 soname = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3326 if (soname == NULL)
3327 goto error_free_dyn;
3328 }
3329 if (dyn.d_tag == DT_NEEDED)
3330 {
3331 struct bfd_link_needed_list *n, **pn;
3332 char *fnm, *anm;
3333 unsigned int tagv = dyn.d_un.d_val;
3334
3335 amt = sizeof (struct bfd_link_needed_list);
3336 n = bfd_alloc (abfd, amt);
3337 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3338 if (n == NULL || fnm == NULL)
3339 goto error_free_dyn;
3340 amt = strlen (fnm) + 1;
3341 anm = bfd_alloc (abfd, amt);
3342 if (anm == NULL)
3343 goto error_free_dyn;
3344 memcpy (anm, fnm, amt);
3345 n->name = anm;
3346 n->by = abfd;
3347 n->next = NULL;
3348 for (pn = & hash_table->needed;
3349 *pn != NULL;
3350 pn = &(*pn)->next)
3351 ;
3352 *pn = n;
3353 }
3354 if (dyn.d_tag == DT_RUNPATH)
3355 {
3356 struct bfd_link_needed_list *n, **pn;
3357 char *fnm, *anm;
3358 unsigned int tagv = dyn.d_un.d_val;
3359
3360 amt = sizeof (struct bfd_link_needed_list);
3361 n = bfd_alloc (abfd, amt);
3362 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3363 if (n == NULL || fnm == NULL)
3364 goto error_free_dyn;
3365 amt = strlen (fnm) + 1;
3366 anm = bfd_alloc (abfd, amt);
3367 if (anm == NULL)
3368 goto error_free_dyn;
3369 memcpy (anm, fnm, amt);
3370 n->name = anm;
3371 n->by = abfd;
3372 n->next = NULL;
3373 for (pn = & runpath;
3374 *pn != NULL;
3375 pn = &(*pn)->next)
3376 ;
3377 *pn = n;
3378 }
3379 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
3380 if (!runpath && dyn.d_tag == DT_RPATH)
3381 {
3382 struct bfd_link_needed_list *n, **pn;
3383 char *fnm, *anm;
3384 unsigned int tagv = dyn.d_un.d_val;
3385
3386 amt = sizeof (struct bfd_link_needed_list);
3387 n = bfd_alloc (abfd, amt);
3388 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3389 if (n == NULL || fnm == NULL)
3390 goto error_free_dyn;
3391 amt = strlen (fnm) + 1;
3392 anm = bfd_alloc (abfd, amt);
3393 if (anm == NULL)
3394 {
3395 error_free_dyn:
3396 free (dynbuf);
3397 goto error_return;
3398 }
3399 memcpy (anm, fnm, amt);
3400 n->name = anm;
3401 n->by = abfd;
3402 n->next = NULL;
3403 for (pn = & rpath;
3404 *pn != NULL;
3405 pn = &(*pn)->next)
3406 ;
3407 *pn = n;
3408 }
3409 }
3410
3411 free (dynbuf);
3412 }
3413
3414 /* DT_RUNPATH overrides DT_RPATH. Do _NOT_ bfd_release, as that
3415 frees all more recently bfd_alloc'd blocks as well. */
3416 if (runpath)
3417 rpath = runpath;
3418
3419 if (rpath)
3420 {
3421 struct bfd_link_needed_list **pn;
3422 for (pn = & hash_table->runpath;
3423 *pn != NULL;
3424 pn = &(*pn)->next)
3425 ;
3426 *pn = rpath;
3427 }
3428
3429 /* We do not want to include any of the sections in a dynamic
3430 object in the output file. We hack by simply clobbering the
3431 list of sections in the BFD. This could be handled more
3432 cleanly by, say, a new section flag; the existing
3433 SEC_NEVER_LOAD flag is not the one we want, because that one
3434 still implies that the section takes up space in the output
3435 file. */
3436 bfd_section_list_clear (abfd);
3437
4ad4eba5
AM
3438 /* Find the name to use in a DT_NEEDED entry that refers to this
3439 object. If the object has a DT_SONAME entry, we use it.
3440 Otherwise, if the generic linker stuck something in
3441 elf_dt_name, we use that. Otherwise, we just use the file
3442 name. */
3443 if (soname == NULL || *soname == '\0')
3444 {
3445 soname = elf_dt_name (abfd);
3446 if (soname == NULL || *soname == '\0')
3447 soname = bfd_get_filename (abfd);
3448 }
3449
3450 /* Save the SONAME because sometimes the linker emulation code
3451 will need to know it. */
3452 elf_dt_name (abfd) = soname;
3453
7e9f0867 3454 ret = elf_add_dt_needed_tag (abfd, info, soname, add_needed);
4ad4eba5
AM
3455 if (ret < 0)
3456 goto error_return;
3457
3458 /* If we have already included this dynamic object in the
3459 link, just ignore it. There is no reason to include a
3460 particular dynamic object more than once. */
3461 if (ret > 0)
3462 return TRUE;
3463 }
3464
3465 /* If this is a dynamic object, we always link against the .dynsym
3466 symbol table, not the .symtab symbol table. The dynamic linker
3467 will only see the .dynsym symbol table, so there is no reason to
3468 look at .symtab for a dynamic object. */
3469
3470 if (! dynamic || elf_dynsymtab (abfd) == 0)
3471 hdr = &elf_tdata (abfd)->symtab_hdr;
3472 else
3473 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
3474
3475 symcount = hdr->sh_size / bed->s->sizeof_sym;
3476
3477 /* The sh_info field of the symtab header tells us where the
3478 external symbols start. We don't care about the local symbols at
3479 this point. */
3480 if (elf_bad_symtab (abfd))
3481 {
3482 extsymcount = symcount;
3483 extsymoff = 0;
3484 }
3485 else
3486 {
3487 extsymcount = symcount - hdr->sh_info;
3488 extsymoff = hdr->sh_info;
3489 }
3490
3491 sym_hash = NULL;
3492 if (extsymcount != 0)
3493 {
3494 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
3495 NULL, NULL, NULL);
3496 if (isymbuf == NULL)
3497 goto error_return;
3498
3499 /* We store a pointer to the hash table entry for each external
3500 symbol. */
3501 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
3502 sym_hash = bfd_alloc (abfd, amt);
3503 if (sym_hash == NULL)
3504 goto error_free_sym;
3505 elf_sym_hashes (abfd) = sym_hash;
3506 }
3507
3508 if (dynamic)
3509 {
3510 /* Read in any version definitions. */
fc0e6df6
PB
3511 if (!_bfd_elf_slurp_version_tables (abfd,
3512 info->default_imported_symver))
4ad4eba5
AM
3513 goto error_free_sym;
3514
3515 /* Read in the symbol versions, but don't bother to convert them
3516 to internal format. */
3517 if (elf_dynversym (abfd) != 0)
3518 {
3519 Elf_Internal_Shdr *versymhdr;
3520
3521 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
3522 extversym = bfd_malloc (versymhdr->sh_size);
3523 if (extversym == NULL)
3524 goto error_free_sym;
3525 amt = versymhdr->sh_size;
3526 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
3527 || bfd_bread (extversym, amt, abfd) != amt)
3528 goto error_free_vers;
3529 }
3530 }
3531
3532 weaks = NULL;
3533
3534 ever = extversym != NULL ? extversym + extsymoff : NULL;
3535 for (isym = isymbuf, isymend = isymbuf + extsymcount;
3536 isym < isymend;
3537 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
3538 {
3539 int bind;
3540 bfd_vma value;
af44c138 3541 asection *sec, *new_sec;
4ad4eba5
AM
3542 flagword flags;
3543 const char *name;
3544 struct elf_link_hash_entry *h;
3545 bfd_boolean definition;
3546 bfd_boolean size_change_ok;
3547 bfd_boolean type_change_ok;
3548 bfd_boolean new_weakdef;
3549 bfd_boolean override;
3550 unsigned int old_alignment;
3551 bfd *old_bfd;
3552
3553 override = FALSE;
3554
3555 flags = BSF_NO_FLAGS;
3556 sec = NULL;
3557 value = isym->st_value;
3558 *sym_hash = NULL;
3559
3560 bind = ELF_ST_BIND (isym->st_info);
3561 if (bind == STB_LOCAL)
3562 {
3563 /* This should be impossible, since ELF requires that all
3564 global symbols follow all local symbols, and that sh_info
3565 point to the first global symbol. Unfortunately, Irix 5
3566 screws this up. */
3567 continue;
3568 }
3569 else if (bind == STB_GLOBAL)
3570 {
3571 if (isym->st_shndx != SHN_UNDEF
3572 && isym->st_shndx != SHN_COMMON)
3573 flags = BSF_GLOBAL;
3574 }
3575 else if (bind == STB_WEAK)
3576 flags = BSF_WEAK;
3577 else
3578 {
3579 /* Leave it up to the processor backend. */
3580 }
3581
3582 if (isym->st_shndx == SHN_UNDEF)
3583 sec = bfd_und_section_ptr;
3584 else if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
3585 {
3586 sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3587 if (sec == NULL)
3588 sec = bfd_abs_section_ptr;
529fcb95
PB
3589 else if (sec->kept_section)
3590 {
1f02cbd9
JB
3591 /* Symbols from discarded section are undefined, and have
3592 default visibility. */
529fcb95
PB
3593 sec = bfd_und_section_ptr;
3594 isym->st_shndx = SHN_UNDEF;
1f02cbd9
JB
3595 isym->st_other = STV_DEFAULT
3596 | (isym->st_other & ~ ELF_ST_VISIBILITY(-1));
529fcb95 3597 }
4ad4eba5
AM
3598 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
3599 value -= sec->vma;
3600 }
3601 else if (isym->st_shndx == SHN_ABS)
3602 sec = bfd_abs_section_ptr;
3603 else if (isym->st_shndx == SHN_COMMON)
3604 {
3605 sec = bfd_com_section_ptr;
3606 /* What ELF calls the size we call the value. What ELF
3607 calls the value we call the alignment. */
3608 value = isym->st_size;
3609 }
3610 else
3611 {
3612 /* Leave it up to the processor backend. */
3613 }
3614
3615 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
3616 isym->st_name);
3617 if (name == NULL)
3618 goto error_free_vers;
3619
3620 if (isym->st_shndx == SHN_COMMON
3621 && ELF_ST_TYPE (isym->st_info) == STT_TLS)
3622 {
3623 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
3624
3625 if (tcomm == NULL)
3626 {
3627 tcomm = bfd_make_section (abfd, ".tcommon");
3628 if (tcomm == NULL
3629 || !bfd_set_section_flags (abfd, tcomm, (SEC_ALLOC
3630 | SEC_IS_COMMON
3631 | SEC_LINKER_CREATED
3632 | SEC_THREAD_LOCAL)))
3633 goto error_free_vers;
3634 }
3635 sec = tcomm;
3636 }
3637 else if (add_symbol_hook)
3638 {
3639 if (! (*add_symbol_hook) (abfd, info, isym, &name, &flags, &sec,
3640 &value))
3641 goto error_free_vers;
3642
3643 /* The hook function sets the name to NULL if this symbol
3644 should be skipped for some reason. */
3645 if (name == NULL)
3646 continue;
3647 }
3648
3649 /* Sanity check that all possibilities were handled. */
3650 if (sec == NULL)
3651 {
3652 bfd_set_error (bfd_error_bad_value);
3653 goto error_free_vers;
3654 }
3655
3656 if (bfd_is_und_section (sec)
3657 || bfd_is_com_section (sec))
3658 definition = FALSE;
3659 else
3660 definition = TRUE;
3661
3662 size_change_ok = FALSE;
3663 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
3664 old_alignment = 0;
3665 old_bfd = NULL;
af44c138 3666 new_sec = sec;
4ad4eba5
AM
3667
3668 if (is_elf_hash_table (hash_table))
3669 {
3670 Elf_Internal_Versym iver;
3671 unsigned int vernum = 0;
3672 bfd_boolean skip;
3673
fc0e6df6 3674 if (ever == NULL)
4ad4eba5 3675 {
fc0e6df6
PB
3676 if (info->default_imported_symver)
3677 /* Use the default symbol version created earlier. */
3678 iver.vs_vers = elf_tdata (abfd)->cverdefs;
3679 else
3680 iver.vs_vers = 0;
3681 }
3682 else
3683 _bfd_elf_swap_versym_in (abfd, ever, &iver);
3684
3685 vernum = iver.vs_vers & VERSYM_VERSION;
3686
3687 /* If this is a hidden symbol, or if it is not version
3688 1, we append the version name to the symbol name.
3689 However, we do not modify a non-hidden absolute
3690 symbol, because it might be the version symbol
3691 itself. FIXME: What if it isn't? */
3692 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
3693 || (vernum > 1 && ! bfd_is_abs_section (sec)))
3694 {
3695 const char *verstr;
3696 size_t namelen, verlen, newlen;
3697 char *newname, *p;
3698
3699 if (isym->st_shndx != SHN_UNDEF)
4ad4eba5 3700 {
fc0e6df6
PB
3701 if (vernum > elf_tdata (abfd)->cverdefs)
3702 verstr = NULL;
3703 else if (vernum > 1)
3704 verstr =
3705 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
3706 else
3707 verstr = "";
4ad4eba5 3708
fc0e6df6 3709 if (verstr == NULL)
4ad4eba5 3710 {
fc0e6df6
PB
3711 (*_bfd_error_handler)
3712 (_("%B: %s: invalid version %u (max %d)"),
3713 abfd, name, vernum,
3714 elf_tdata (abfd)->cverdefs);
3715 bfd_set_error (bfd_error_bad_value);
3716 goto error_free_vers;
4ad4eba5 3717 }
fc0e6df6
PB
3718 }
3719 else
3720 {
3721 /* We cannot simply test for the number of
3722 entries in the VERNEED section since the
3723 numbers for the needed versions do not start
3724 at 0. */
3725 Elf_Internal_Verneed *t;
3726
3727 verstr = NULL;
3728 for (t = elf_tdata (abfd)->verref;
3729 t != NULL;
3730 t = t->vn_nextref)
4ad4eba5 3731 {
fc0e6df6 3732 Elf_Internal_Vernaux *a;
4ad4eba5 3733
fc0e6df6
PB
3734 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3735 {
3736 if (a->vna_other == vernum)
4ad4eba5 3737 {
fc0e6df6
PB
3738 verstr = a->vna_nodename;
3739 break;
4ad4eba5 3740 }
4ad4eba5 3741 }
fc0e6df6
PB
3742 if (a != NULL)
3743 break;
3744 }
3745 if (verstr == NULL)
3746 {
3747 (*_bfd_error_handler)
3748 (_("%B: %s: invalid needed version %d"),
3749 abfd, name, vernum);
3750 bfd_set_error (bfd_error_bad_value);
3751 goto error_free_vers;
4ad4eba5 3752 }
4ad4eba5 3753 }
fc0e6df6
PB
3754
3755 namelen = strlen (name);
3756 verlen = strlen (verstr);
3757 newlen = namelen + verlen + 2;
3758 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
3759 && isym->st_shndx != SHN_UNDEF)
3760 ++newlen;
3761
3762 newname = bfd_alloc (abfd, newlen);
3763 if (newname == NULL)
3764 goto error_free_vers;
3765 memcpy (newname, name, namelen);
3766 p = newname + namelen;
3767 *p++ = ELF_VER_CHR;
3768 /* If this is a defined non-hidden version symbol,
3769 we add another @ to the name. This indicates the
3770 default version of the symbol. */
3771 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
3772 && isym->st_shndx != SHN_UNDEF)
3773 *p++ = ELF_VER_CHR;
3774 memcpy (p, verstr, verlen + 1);
3775
3776 name = newname;
4ad4eba5
AM
3777 }
3778
af44c138
L
3779 if (!_bfd_elf_merge_symbol (abfd, info, name, isym, &sec,
3780 &value, &old_alignment,
4ad4eba5
AM
3781 sym_hash, &skip, &override,
3782 &type_change_ok, &size_change_ok))
3783 goto error_free_vers;
3784
3785 if (skip)
3786 continue;
3787
3788 if (override)
3789 definition = FALSE;
3790
3791 h = *sym_hash;
3792 while (h->root.type == bfd_link_hash_indirect
3793 || h->root.type == bfd_link_hash_warning)
3794 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3795
3796 /* Remember the old alignment if this is a common symbol, so
3797 that we don't reduce the alignment later on. We can't
3798 check later, because _bfd_generic_link_add_one_symbol
3799 will set a default for the alignment which we want to
3800 override. We also remember the old bfd where the existing
3801 definition comes from. */
3802 switch (h->root.type)
3803 {
3804 default:
3805 break;
3806
3807 case bfd_link_hash_defined:
3808 case bfd_link_hash_defweak:
3809 old_bfd = h->root.u.def.section->owner;
3810 break;
3811
3812 case bfd_link_hash_common:
3813 old_bfd = h->root.u.c.p->section->owner;
3814 old_alignment = h->root.u.c.p->alignment_power;
3815 break;
3816 }
3817
3818 if (elf_tdata (abfd)->verdef != NULL
3819 && ! override
3820 && vernum > 1
3821 && definition)
3822 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
3823 }
3824
3825 if (! (_bfd_generic_link_add_one_symbol
3826 (info, abfd, name, flags, sec, value, NULL, FALSE, collect,
3827 (struct bfd_link_hash_entry **) sym_hash)))
3828 goto error_free_vers;
3829
3830 h = *sym_hash;
3831 while (h->root.type == bfd_link_hash_indirect
3832 || h->root.type == bfd_link_hash_warning)
3833 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3834 *sym_hash = h;
3835
3836 new_weakdef = FALSE;
3837 if (dynamic
3838 && definition
3839 && (flags & BSF_WEAK) != 0
3840 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
3841 && is_elf_hash_table (hash_table)
f6e332e6 3842 && h->u.weakdef == NULL)
4ad4eba5
AM
3843 {
3844 /* Keep a list of all weak defined non function symbols from
3845 a dynamic object, using the weakdef field. Later in this
3846 function we will set the weakdef field to the correct
3847 value. We only put non-function symbols from dynamic
3848 objects on this list, because that happens to be the only
3849 time we need to know the normal symbol corresponding to a
3850 weak symbol, and the information is time consuming to
3851 figure out. If the weakdef field is not already NULL,
3852 then this symbol was already defined by some previous
3853 dynamic object, and we will be using that previous
3854 definition anyhow. */
3855
f6e332e6 3856 h->u.weakdef = weaks;
4ad4eba5
AM
3857 weaks = h;
3858 new_weakdef = TRUE;
3859 }
3860
3861 /* Set the alignment of a common symbol. */
af44c138
L
3862 if ((isym->st_shndx == SHN_COMMON
3863 || bfd_is_com_section (sec))
4ad4eba5
AM
3864 && h->root.type == bfd_link_hash_common)
3865 {
3866 unsigned int align;
3867
af44c138
L
3868 if (isym->st_shndx == SHN_COMMON)
3869 align = bfd_log2 (isym->st_value);
3870 else
3871 {
3872 /* The new symbol is a common symbol in a shared object.
3873 We need to get the alignment from the section. */
3874 align = new_sec->alignment_power;
3875 }
4ad4eba5
AM
3876 if (align > old_alignment
3877 /* Permit an alignment power of zero if an alignment of one
3878 is specified and no other alignments have been specified. */
3879 || (isym->st_value == 1 && old_alignment == 0))
3880 h->root.u.c.p->alignment_power = align;
3881 else
3882 h->root.u.c.p->alignment_power = old_alignment;
3883 }
3884
3885 if (is_elf_hash_table (hash_table))
3886 {
4ad4eba5 3887 bfd_boolean dynsym;
4ad4eba5
AM
3888
3889 /* Check the alignment when a common symbol is involved. This
3890 can change when a common symbol is overridden by a normal
3891 definition or a common symbol is ignored due to the old
3892 normal definition. We need to make sure the maximum
3893 alignment is maintained. */
3894 if ((old_alignment || isym->st_shndx == SHN_COMMON)
3895 && h->root.type != bfd_link_hash_common)
3896 {
3897 unsigned int common_align;
3898 unsigned int normal_align;
3899 unsigned int symbol_align;
3900 bfd *normal_bfd;
3901 bfd *common_bfd;
3902
3903 symbol_align = ffs (h->root.u.def.value) - 1;
3904 if (h->root.u.def.section->owner != NULL
3905 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3906 {
3907 normal_align = h->root.u.def.section->alignment_power;
3908 if (normal_align > symbol_align)
3909 normal_align = symbol_align;
3910 }
3911 else
3912 normal_align = symbol_align;
3913
3914 if (old_alignment)
3915 {
3916 common_align = old_alignment;
3917 common_bfd = old_bfd;
3918 normal_bfd = abfd;
3919 }
3920 else
3921 {
3922 common_align = bfd_log2 (isym->st_value);
3923 common_bfd = abfd;
3924 normal_bfd = old_bfd;
3925 }
3926
3927 if (normal_align < common_align)
3928 (*_bfd_error_handler)
d003868e
AM
3929 (_("Warning: alignment %u of symbol `%s' in %B"
3930 " is smaller than %u in %B"),
3931 normal_bfd, common_bfd,
3932 1 << normal_align, name, 1 << common_align);
4ad4eba5
AM
3933 }
3934
3935 /* Remember the symbol size and type. */
3936 if (isym->st_size != 0
3937 && (definition || h->size == 0))
3938 {
3939 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
3940 (*_bfd_error_handler)
d003868e
AM
3941 (_("Warning: size of symbol `%s' changed"
3942 " from %lu in %B to %lu in %B"),
3943 old_bfd, abfd,
4ad4eba5 3944 name, (unsigned long) h->size,
d003868e 3945 (unsigned long) isym->st_size);
4ad4eba5
AM
3946
3947 h->size = isym->st_size;
3948 }
3949
3950 /* If this is a common symbol, then we always want H->SIZE
3951 to be the size of the common symbol. The code just above
3952 won't fix the size if a common symbol becomes larger. We
3953 don't warn about a size change here, because that is
3954 covered by --warn-common. */
3955 if (h->root.type == bfd_link_hash_common)
3956 h->size = h->root.u.c.size;
3957
3958 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
3959 && (definition || h->type == STT_NOTYPE))
3960 {
3961 if (h->type != STT_NOTYPE
3962 && h->type != ELF_ST_TYPE (isym->st_info)
3963 && ! type_change_ok)
3964 (*_bfd_error_handler)
d003868e
AM
3965 (_("Warning: type of symbol `%s' changed"
3966 " from %d to %d in %B"),
3967 abfd, name, h->type, ELF_ST_TYPE (isym->st_info));
4ad4eba5
AM
3968
3969 h->type = ELF_ST_TYPE (isym->st_info);
3970 }
3971
3972 /* If st_other has a processor-specific meaning, specific
3973 code might be needed here. We never merge the visibility
3974 attribute with the one from a dynamic object. */
3975 if (bed->elf_backend_merge_symbol_attribute)
3976 (*bed->elf_backend_merge_symbol_attribute) (h, isym, definition,
3977 dynamic);
3978
b58f81ae
DJ
3979 /* If this symbol has default visibility and the user has requested
3980 we not re-export it, then mark it as hidden. */
3981 if (definition && !dynamic
3982 && (abfd->no_export
3983 || (abfd->my_archive && abfd->my_archive->no_export))
3984 && ELF_ST_VISIBILITY (isym->st_other) != STV_INTERNAL)
3985 isym->st_other = STV_HIDDEN | (isym->st_other & ~ ELF_ST_VISIBILITY (-1));
3986
4ad4eba5
AM
3987 if (isym->st_other != 0 && !dynamic)
3988 {
3989 unsigned char hvis, symvis, other, nvis;
3990
3991 /* Take the balance of OTHER from the definition. */
3992 other = (definition ? isym->st_other : h->other);
3993 other &= ~ ELF_ST_VISIBILITY (-1);
3994
3995 /* Combine visibilities, using the most constraining one. */
3996 hvis = ELF_ST_VISIBILITY (h->other);
3997 symvis = ELF_ST_VISIBILITY (isym->st_other);
3998 if (! hvis)
3999 nvis = symvis;
4000 else if (! symvis)
4001 nvis = hvis;
4002 else
4003 nvis = hvis < symvis ? hvis : symvis;
4004
4005 h->other = other | nvis;
4006 }
4007
4008 /* Set a flag in the hash table entry indicating the type of
4009 reference or definition we just found. Keep a count of
4010 the number of dynamic symbols we find. A dynamic symbol
4011 is one which is referenced or defined by both a regular
4012 object and a shared object. */
4ad4eba5
AM
4013 dynsym = FALSE;
4014 if (! dynamic)
4015 {
4016 if (! definition)
4017 {
f5385ebf 4018 h->ref_regular = 1;
4ad4eba5 4019 if (bind != STB_WEAK)
f5385ebf 4020 h->ref_regular_nonweak = 1;
4ad4eba5
AM
4021 }
4022 else
f5385ebf 4023 h->def_regular = 1;
4ad4eba5 4024 if (! info->executable
f5385ebf
AM
4025 || h->def_dynamic
4026 || h->ref_dynamic)
4ad4eba5
AM
4027 dynsym = TRUE;
4028 }
4029 else
4030 {
4031 if (! definition)
f5385ebf 4032 h->ref_dynamic = 1;
4ad4eba5 4033 else
f5385ebf
AM
4034 h->def_dynamic = 1;
4035 if (h->def_regular
4036 || h->ref_regular
f6e332e6 4037 || (h->u.weakdef != NULL
4ad4eba5 4038 && ! new_weakdef
f6e332e6 4039 && h->u.weakdef->dynindx != -1))
4ad4eba5
AM
4040 dynsym = TRUE;
4041 }
4042
4ad4eba5
AM
4043 /* Check to see if we need to add an indirect symbol for
4044 the default name. */
4045 if (definition || h->root.type == bfd_link_hash_common)
4046 if (!_bfd_elf_add_default_symbol (abfd, info, h, name, isym,
4047 &sec, &value, &dynsym,
4048 override))
4049 goto error_free_vers;
4050
4051 if (definition && !dynamic)
4052 {
4053 char *p = strchr (name, ELF_VER_CHR);
4054 if (p != NULL && p[1] != ELF_VER_CHR)
4055 {
4056 /* Queue non-default versions so that .symver x, x@FOO
4057 aliases can be checked. */
4058 if (! nondeflt_vers)
4059 {
4060 amt = (isymend - isym + 1)
4061 * sizeof (struct elf_link_hash_entry *);
4062 nondeflt_vers = bfd_malloc (amt);
4063 }
4064 nondeflt_vers [nondeflt_vers_cnt++] = h;
4065 }
4066 }
4067
4068 if (dynsym && h->dynindx == -1)
4069 {
c152c796 4070 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4ad4eba5 4071 goto error_free_vers;
f6e332e6 4072 if (h->u.weakdef != NULL
4ad4eba5 4073 && ! new_weakdef
f6e332e6 4074 && h->u.weakdef->dynindx == -1)
4ad4eba5 4075 {
f6e332e6 4076 if (! bfd_elf_link_record_dynamic_symbol (info, h->u.weakdef))
4ad4eba5
AM
4077 goto error_free_vers;
4078 }
4079 }
4080 else if (dynsym && h->dynindx != -1)
4081 /* If the symbol already has a dynamic index, but
4082 visibility says it should not be visible, turn it into
4083 a local symbol. */
4084 switch (ELF_ST_VISIBILITY (h->other))
4085 {
4086 case STV_INTERNAL:
4087 case STV_HIDDEN:
4088 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4089 dynsym = FALSE;
4090 break;
4091 }
4092
4093 if (!add_needed
4094 && definition
4095 && dynsym
f5385ebf 4096 && h->ref_regular)
4ad4eba5
AM
4097 {
4098 int ret;
4099 const char *soname = elf_dt_name (abfd);
4100
4101 /* A symbol from a library loaded via DT_NEEDED of some
4102 other library is referenced by a regular object.
e56f61be
L
4103 Add a DT_NEEDED entry for it. Issue an error if
4104 --no-add-needed is used. */
4105 if ((elf_dyn_lib_class (abfd) & DYN_NO_NEEDED) != 0)
4106 {
4107 (*_bfd_error_handler)
4108 (_("%s: invalid DSO for symbol `%s' definition"),
d003868e 4109 abfd, name);
e56f61be
L
4110 bfd_set_error (bfd_error_bad_value);
4111 goto error_free_vers;
4112 }
4113
a5db907e
AM
4114 elf_dyn_lib_class (abfd) &= ~DYN_AS_NEEDED;
4115
4ad4eba5 4116 add_needed = TRUE;
7e9f0867 4117 ret = elf_add_dt_needed_tag (abfd, info, soname, add_needed);
4ad4eba5
AM
4118 if (ret < 0)
4119 goto error_free_vers;
4120
4121 BFD_ASSERT (ret == 0);
4122 }
4123 }
4124 }
4125
4126 /* Now that all the symbols from this input file are created, handle
4127 .symver foo, foo@BAR such that any relocs against foo become foo@BAR. */
4128 if (nondeflt_vers != NULL)
4129 {
4130 bfd_size_type cnt, symidx;
4131
4132 for (cnt = 0; cnt < nondeflt_vers_cnt; ++cnt)
4133 {
4134 struct elf_link_hash_entry *h = nondeflt_vers[cnt], *hi;
4135 char *shortname, *p;
4136
4137 p = strchr (h->root.root.string, ELF_VER_CHR);
4138 if (p == NULL
4139 || (h->root.type != bfd_link_hash_defined
4140 && h->root.type != bfd_link_hash_defweak))
4141 continue;
4142
4143 amt = p - h->root.root.string;
4144 shortname = bfd_malloc (amt + 1);
4145 memcpy (shortname, h->root.root.string, amt);
4146 shortname[amt] = '\0';
4147
4148 hi = (struct elf_link_hash_entry *)
4149 bfd_link_hash_lookup (&hash_table->root, shortname,
4150 FALSE, FALSE, FALSE);
4151 if (hi != NULL
4152 && hi->root.type == h->root.type
4153 && hi->root.u.def.value == h->root.u.def.value
4154 && hi->root.u.def.section == h->root.u.def.section)
4155 {
4156 (*bed->elf_backend_hide_symbol) (info, hi, TRUE);
4157 hi->root.type = bfd_link_hash_indirect;
4158 hi->root.u.i.link = (struct bfd_link_hash_entry *) h;
4159 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
4160 sym_hash = elf_sym_hashes (abfd);
4161 if (sym_hash)
4162 for (symidx = 0; symidx < extsymcount; ++symidx)
4163 if (sym_hash[symidx] == hi)
4164 {
4165 sym_hash[symidx] = h;
4166 break;
4167 }
4168 }
4169 free (shortname);
4170 }
4171 free (nondeflt_vers);
4172 nondeflt_vers = NULL;
4173 }
4174
4175 if (extversym != NULL)
4176 {
4177 free (extversym);
4178 extversym = NULL;
4179 }
4180
4181 if (isymbuf != NULL)
4182 free (isymbuf);
4183 isymbuf = NULL;
4184
ec13b3bb
AM
4185 if (!add_needed
4186 && (elf_dyn_lib_class (abfd) & DYN_AS_NEEDED) != 0)
77cfaee6 4187 {
ec13b3bb
AM
4188 /* Remove symbols defined in an as-needed shared lib that wasn't
4189 needed. */
77cfaee6
AM
4190 struct elf_smash_syms_data inf;
4191 inf.not_needed = abfd;
4192 inf.htab = hash_table;
4193 inf.twiddled = FALSE;
4194 elf_link_hash_traverse (hash_table, elf_smash_syms, &inf);
4195 if (inf.twiddled)
4196 bfd_link_repair_undef_list (&hash_table->root);
4197 weaks = NULL;
4198 }
4199
4ad4eba5
AM
4200 /* Now set the weakdefs field correctly for all the weak defined
4201 symbols we found. The only way to do this is to search all the
4202 symbols. Since we only need the information for non functions in
4203 dynamic objects, that's the only time we actually put anything on
4204 the list WEAKS. We need this information so that if a regular
4205 object refers to a symbol defined weakly in a dynamic object, the
4206 real symbol in the dynamic object is also put in the dynamic
4207 symbols; we also must arrange for both symbols to point to the
4208 same memory location. We could handle the general case of symbol
4209 aliasing, but a general symbol alias can only be generated in
4210 assembler code, handling it correctly would be very time
4211 consuming, and other ELF linkers don't handle general aliasing
4212 either. */
4213 if (weaks != NULL)
4214 {
4215 struct elf_link_hash_entry **hpp;
4216 struct elf_link_hash_entry **hppend;
4217 struct elf_link_hash_entry **sorted_sym_hash;
4218 struct elf_link_hash_entry *h;
4219 size_t sym_count;
4220
4221 /* Since we have to search the whole symbol list for each weak
4222 defined symbol, search time for N weak defined symbols will be
4223 O(N^2). Binary search will cut it down to O(NlogN). */
4224 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
4225 sorted_sym_hash = bfd_malloc (amt);
4226 if (sorted_sym_hash == NULL)
4227 goto error_return;
4228 sym_hash = sorted_sym_hash;
4229 hpp = elf_sym_hashes (abfd);
4230 hppend = hpp + extsymcount;
4231 sym_count = 0;
4232 for (; hpp < hppend; hpp++)
4233 {
4234 h = *hpp;
4235 if (h != NULL
4236 && h->root.type == bfd_link_hash_defined
4237 && h->type != STT_FUNC)
4238 {
4239 *sym_hash = h;
4240 sym_hash++;
4241 sym_count++;
4242 }
4243 }
4244
4245 qsort (sorted_sym_hash, sym_count,
4246 sizeof (struct elf_link_hash_entry *),
4247 elf_sort_symbol);
4248
4249 while (weaks != NULL)
4250 {
4251 struct elf_link_hash_entry *hlook;
4252 asection *slook;
4253 bfd_vma vlook;
4254 long ilook;
4255 size_t i, j, idx;
4256
4257 hlook = weaks;
f6e332e6
AM
4258 weaks = hlook->u.weakdef;
4259 hlook->u.weakdef = NULL;
4ad4eba5
AM
4260
4261 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
4262 || hlook->root.type == bfd_link_hash_defweak
4263 || hlook->root.type == bfd_link_hash_common
4264 || hlook->root.type == bfd_link_hash_indirect);
4265 slook = hlook->root.u.def.section;
4266 vlook = hlook->root.u.def.value;
4267
4268 ilook = -1;
4269 i = 0;
4270 j = sym_count;
4271 while (i < j)
4272 {
4273 bfd_signed_vma vdiff;
4274 idx = (i + j) / 2;
4275 h = sorted_sym_hash [idx];
4276 vdiff = vlook - h->root.u.def.value;
4277 if (vdiff < 0)
4278 j = idx;
4279 else if (vdiff > 0)
4280 i = idx + 1;
4281 else
4282 {
a9b881be 4283 long sdiff = slook->id - h->root.u.def.section->id;
4ad4eba5
AM
4284 if (sdiff < 0)
4285 j = idx;
4286 else if (sdiff > 0)
4287 i = idx + 1;
4288 else
4289 {
4290 ilook = idx;
4291 break;
4292 }
4293 }
4294 }
4295
4296 /* We didn't find a value/section match. */
4297 if (ilook == -1)
4298 continue;
4299
4300 for (i = ilook; i < sym_count; i++)
4301 {
4302 h = sorted_sym_hash [i];
4303
4304 /* Stop if value or section doesn't match. */
4305 if (h->root.u.def.value != vlook
4306 || h->root.u.def.section != slook)
4307 break;
4308 else if (h != hlook)
4309 {
f6e332e6 4310 hlook->u.weakdef = h;
4ad4eba5
AM
4311
4312 /* If the weak definition is in the list of dynamic
4313 symbols, make sure the real definition is put
4314 there as well. */
4315 if (hlook->dynindx != -1 && h->dynindx == -1)
4316 {
c152c796 4317 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4ad4eba5
AM
4318 goto error_return;
4319 }
4320
4321 /* If the real definition is in the list of dynamic
4322 symbols, make sure the weak definition is put
4323 there as well. If we don't do this, then the
4324 dynamic loader might not merge the entries for the
4325 real definition and the weak definition. */
4326 if (h->dynindx != -1 && hlook->dynindx == -1)
4327 {
c152c796 4328 if (! bfd_elf_link_record_dynamic_symbol (info, hlook))
4ad4eba5
AM
4329 goto error_return;
4330 }
4331 break;
4332 }
4333 }
4334 }
4335
4336 free (sorted_sym_hash);
4337 }
4338
85fbca6a
NC
4339 check_directives = get_elf_backend_data (abfd)->check_directives;
4340 if (check_directives)
4341 check_directives (abfd, info);
4342
4ad4eba5
AM
4343 /* If this object is the same format as the output object, and it is
4344 not a shared library, then let the backend look through the
4345 relocs.
4346
4347 This is required to build global offset table entries and to
4348 arrange for dynamic relocs. It is not required for the
4349 particular common case of linking non PIC code, even when linking
4350 against shared libraries, but unfortunately there is no way of
4351 knowing whether an object file has been compiled PIC or not.
4352 Looking through the relocs is not particularly time consuming.
4353 The problem is that we must either (1) keep the relocs in memory,
4354 which causes the linker to require additional runtime memory or
4355 (2) read the relocs twice from the input file, which wastes time.
4356 This would be a good case for using mmap.
4357
4358 I have no idea how to handle linking PIC code into a file of a
4359 different format. It probably can't be done. */
4360 check_relocs = get_elf_backend_data (abfd)->check_relocs;
4361 if (! dynamic
4362 && is_elf_hash_table (hash_table)
4363 && hash_table->root.creator == abfd->xvec
4364 && check_relocs != NULL)
4365 {
4366 asection *o;
4367
4368 for (o = abfd->sections; o != NULL; o = o->next)
4369 {
4370 Elf_Internal_Rela *internal_relocs;
4371 bfd_boolean ok;
4372
4373 if ((o->flags & SEC_RELOC) == 0
4374 || o->reloc_count == 0
4375 || ((info->strip == strip_all || info->strip == strip_debugger)
4376 && (o->flags & SEC_DEBUGGING) != 0)
4377 || bfd_is_abs_section (o->output_section))
4378 continue;
4379
4380 internal_relocs = _bfd_elf_link_read_relocs (abfd, o, NULL, NULL,
4381 info->keep_memory);
4382 if (internal_relocs == NULL)
4383 goto error_return;
4384
4385 ok = (*check_relocs) (abfd, info, o, internal_relocs);
4386
4387 if (elf_section_data (o)->relocs != internal_relocs)
4388 free (internal_relocs);
4389
4390 if (! ok)
4391 goto error_return;
4392 }
4393 }
4394
4395 /* If this is a non-traditional link, try to optimize the handling
4396 of the .stab/.stabstr sections. */
4397 if (! dynamic
4398 && ! info->traditional_format
4399 && is_elf_hash_table (hash_table)
4400 && (info->strip != strip_all && info->strip != strip_debugger))
4401 {
4402 asection *stabstr;
4403
4404 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
4405 if (stabstr != NULL)
4406 {
4407 bfd_size_type string_offset = 0;
4408 asection *stab;
4409
4410 for (stab = abfd->sections; stab; stab = stab->next)
4411 if (strncmp (".stab", stab->name, 5) == 0
4412 && (!stab->name[5] ||
4413 (stab->name[5] == '.' && ISDIGIT (stab->name[6])))
4414 && (stab->flags & SEC_MERGE) == 0
4415 && !bfd_is_abs_section (stab->output_section))
4416 {
4417 struct bfd_elf_section_data *secdata;
4418
4419 secdata = elf_section_data (stab);
4420 if (! _bfd_link_section_stabs (abfd,
3722b82f 4421 &hash_table->stab_info,
4ad4eba5
AM
4422 stab, stabstr,
4423 &secdata->sec_info,
4424 &string_offset))
4425 goto error_return;
4426 if (secdata->sec_info)
4427 stab->sec_info_type = ELF_INFO_TYPE_STABS;
4428 }
4429 }
4430 }
4431
77cfaee6 4432 if (is_elf_hash_table (hash_table) && add_needed)
4ad4eba5
AM
4433 {
4434 /* Add this bfd to the loaded list. */
4435 struct elf_link_loaded_list *n;
4436
4437 n = bfd_alloc (abfd, sizeof (struct elf_link_loaded_list));
4438 if (n == NULL)
4439 goto error_return;
4440 n->abfd = abfd;
4441 n->next = hash_table->loaded;
4442 hash_table->loaded = n;
4443 }
4444
4445 return TRUE;
4446
4447 error_free_vers:
4448 if (nondeflt_vers != NULL)
4449 free (nondeflt_vers);
4450 if (extversym != NULL)
4451 free (extversym);
4452 error_free_sym:
4453 if (isymbuf != NULL)
4454 free (isymbuf);
4455 error_return:
4456 return FALSE;
4457}
4458
8387904d
AM
4459/* Return the linker hash table entry of a symbol that might be
4460 satisfied by an archive symbol. Return -1 on error. */
4461
4462struct elf_link_hash_entry *
4463_bfd_elf_archive_symbol_lookup (bfd *abfd,
4464 struct bfd_link_info *info,
4465 const char *name)
4466{
4467 struct elf_link_hash_entry *h;
4468 char *p, *copy;
4469 size_t len, first;
4470
4471 h = elf_link_hash_lookup (elf_hash_table (info), name, FALSE, FALSE, FALSE);
4472 if (h != NULL)
4473 return h;
4474
4475 /* If this is a default version (the name contains @@), look up the
4476 symbol again with only one `@' as well as without the version.
4477 The effect is that references to the symbol with and without the
4478 version will be matched by the default symbol in the archive. */
4479
4480 p = strchr (name, ELF_VER_CHR);
4481 if (p == NULL || p[1] != ELF_VER_CHR)
4482 return h;
4483
4484 /* First check with only one `@'. */
4485 len = strlen (name);
4486 copy = bfd_alloc (abfd, len);
4487 if (copy == NULL)
4488 return (struct elf_link_hash_entry *) 0 - 1;
4489
4490 first = p - name + 1;
4491 memcpy (copy, name, first);
4492 memcpy (copy + first, name + first + 1, len - first);
4493
4494 h = elf_link_hash_lookup (elf_hash_table (info), copy, FALSE, FALSE, FALSE);
4495 if (h == NULL)
4496 {
4497 /* We also need to check references to the symbol without the
4498 version. */
4499 copy[first - 1] = '\0';
4500 h = elf_link_hash_lookup (elf_hash_table (info), copy,
4501 FALSE, FALSE, FALSE);
4502 }
4503
4504 bfd_release (abfd, copy);
4505 return h;
4506}
4507
0ad989f9
L
4508/* Add symbols from an ELF archive file to the linker hash table. We
4509 don't use _bfd_generic_link_add_archive_symbols because of a
4510 problem which arises on UnixWare. The UnixWare libc.so is an
4511 archive which includes an entry libc.so.1 which defines a bunch of
4512 symbols. The libc.so archive also includes a number of other
4513 object files, which also define symbols, some of which are the same
4514 as those defined in libc.so.1. Correct linking requires that we
4515 consider each object file in turn, and include it if it defines any
4516 symbols we need. _bfd_generic_link_add_archive_symbols does not do
4517 this; it looks through the list of undefined symbols, and includes
4518 any object file which defines them. When this algorithm is used on
4519 UnixWare, it winds up pulling in libc.so.1 early and defining a
4520 bunch of symbols. This means that some of the other objects in the
4521 archive are not included in the link, which is incorrect since they
4522 precede libc.so.1 in the archive.
4523
4524 Fortunately, ELF archive handling is simpler than that done by
4525 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
4526 oddities. In ELF, if we find a symbol in the archive map, and the
4527 symbol is currently undefined, we know that we must pull in that
4528 object file.
4529
4530 Unfortunately, we do have to make multiple passes over the symbol
4531 table until nothing further is resolved. */
4532
4ad4eba5
AM
4533static bfd_boolean
4534elf_link_add_archive_symbols (bfd *abfd, struct bfd_link_info *info)
0ad989f9
L
4535{
4536 symindex c;
4537 bfd_boolean *defined = NULL;
4538 bfd_boolean *included = NULL;
4539 carsym *symdefs;
4540 bfd_boolean loop;
4541 bfd_size_type amt;
8387904d
AM
4542 const struct elf_backend_data *bed;
4543 struct elf_link_hash_entry * (*archive_symbol_lookup)
4544 (bfd *, struct bfd_link_info *, const char *);
0ad989f9
L
4545
4546 if (! bfd_has_map (abfd))
4547 {
4548 /* An empty archive is a special case. */
4549 if (bfd_openr_next_archived_file (abfd, NULL) == NULL)
4550 return TRUE;
4551 bfd_set_error (bfd_error_no_armap);
4552 return FALSE;
4553 }
4554
4555 /* Keep track of all symbols we know to be already defined, and all
4556 files we know to be already included. This is to speed up the
4557 second and subsequent passes. */
4558 c = bfd_ardata (abfd)->symdef_count;
4559 if (c == 0)
4560 return TRUE;
4561 amt = c;
4562 amt *= sizeof (bfd_boolean);
4563 defined = bfd_zmalloc (amt);
4564 included = bfd_zmalloc (amt);
4565 if (defined == NULL || included == NULL)
4566 goto error_return;
4567
4568 symdefs = bfd_ardata (abfd)->symdefs;
8387904d
AM
4569 bed = get_elf_backend_data (abfd);
4570 archive_symbol_lookup = bed->elf_backend_archive_symbol_lookup;
0ad989f9
L
4571
4572 do
4573 {
4574 file_ptr last;
4575 symindex i;
4576 carsym *symdef;
4577 carsym *symdefend;
4578
4579 loop = FALSE;
4580 last = -1;
4581
4582 symdef = symdefs;
4583 symdefend = symdef + c;
4584 for (i = 0; symdef < symdefend; symdef++, i++)
4585 {
4586 struct elf_link_hash_entry *h;
4587 bfd *element;
4588 struct bfd_link_hash_entry *undefs_tail;
4589 symindex mark;
4590
4591 if (defined[i] || included[i])
4592 continue;
4593 if (symdef->file_offset == last)
4594 {
4595 included[i] = TRUE;
4596 continue;
4597 }
4598
8387904d
AM
4599 h = archive_symbol_lookup (abfd, info, symdef->name);
4600 if (h == (struct elf_link_hash_entry *) 0 - 1)
4601 goto error_return;
0ad989f9
L
4602
4603 if (h == NULL)
4604 continue;
4605
4606 if (h->root.type == bfd_link_hash_common)
4607 {
4608 /* We currently have a common symbol. The archive map contains
4609 a reference to this symbol, so we may want to include it. We
4610 only want to include it however, if this archive element
4611 contains a definition of the symbol, not just another common
4612 declaration of it.
4613
4614 Unfortunately some archivers (including GNU ar) will put
4615 declarations of common symbols into their archive maps, as
4616 well as real definitions, so we cannot just go by the archive
4617 map alone. Instead we must read in the element's symbol
4618 table and check that to see what kind of symbol definition
4619 this is. */
4620 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
4621 continue;
4622 }
4623 else if (h->root.type != bfd_link_hash_undefined)
4624 {
4625 if (h->root.type != bfd_link_hash_undefweak)
4626 defined[i] = TRUE;
4627 continue;
4628 }
4629
4630 /* We need to include this archive member. */
4631 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
4632 if (element == NULL)
4633 goto error_return;
4634
4635 if (! bfd_check_format (element, bfd_object))
4636 goto error_return;
4637
4638 /* Doublecheck that we have not included this object
4639 already--it should be impossible, but there may be
4640 something wrong with the archive. */
4641 if (element->archive_pass != 0)
4642 {
4643 bfd_set_error (bfd_error_bad_value);
4644 goto error_return;
4645 }
4646 element->archive_pass = 1;
4647
4648 undefs_tail = info->hash->undefs_tail;
4649
4650 if (! (*info->callbacks->add_archive_element) (info, element,
4651 symdef->name))
4652 goto error_return;
4653 if (! bfd_link_add_symbols (element, info))
4654 goto error_return;
4655
4656 /* If there are any new undefined symbols, we need to make
4657 another pass through the archive in order to see whether
4658 they can be defined. FIXME: This isn't perfect, because
4659 common symbols wind up on undefs_tail and because an
4660 undefined symbol which is defined later on in this pass
4661 does not require another pass. This isn't a bug, but it
4662 does make the code less efficient than it could be. */
4663 if (undefs_tail != info->hash->undefs_tail)
4664 loop = TRUE;
4665
4666 /* Look backward to mark all symbols from this object file
4667 which we have already seen in this pass. */
4668 mark = i;
4669 do
4670 {
4671 included[mark] = TRUE;
4672 if (mark == 0)
4673 break;
4674 --mark;
4675 }
4676 while (symdefs[mark].file_offset == symdef->file_offset);
4677
4678 /* We mark subsequent symbols from this object file as we go
4679 on through the loop. */
4680 last = symdef->file_offset;
4681 }
4682 }
4683 while (loop);
4684
4685 free (defined);
4686 free (included);
4687
4688 return TRUE;
4689
4690 error_return:
4691 if (defined != NULL)
4692 free (defined);
4693 if (included != NULL)
4694 free (included);
4695 return FALSE;
4696}
4ad4eba5
AM
4697
4698/* Given an ELF BFD, add symbols to the global hash table as
4699 appropriate. */
4700
4701bfd_boolean
4702bfd_elf_link_add_symbols (bfd *abfd, struct bfd_link_info *info)
4703{
4704 switch (bfd_get_format (abfd))
4705 {
4706 case bfd_object:
4707 return elf_link_add_object_symbols (abfd, info);
4708 case bfd_archive:
4709 return elf_link_add_archive_symbols (abfd, info);
4710 default:
4711 bfd_set_error (bfd_error_wrong_format);
4712 return FALSE;
4713 }
4714}
5a580b3a
AM
4715\f
4716/* This function will be called though elf_link_hash_traverse to store
4717 all hash value of the exported symbols in an array. */
4718
4719static bfd_boolean
4720elf_collect_hash_codes (struct elf_link_hash_entry *h, void *data)
4721{
4722 unsigned long **valuep = data;
4723 const char *name;
4724 char *p;
4725 unsigned long ha;
4726 char *alc = NULL;
4727
4728 if (h->root.type == bfd_link_hash_warning)
4729 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4730
4731 /* Ignore indirect symbols. These are added by the versioning code. */
4732 if (h->dynindx == -1)
4733 return TRUE;
4734
4735 name = h->root.root.string;
4736 p = strchr (name, ELF_VER_CHR);
4737 if (p != NULL)
4738 {
4739 alc = bfd_malloc (p - name + 1);
4740 memcpy (alc, name, p - name);
4741 alc[p - name] = '\0';
4742 name = alc;
4743 }
4744
4745 /* Compute the hash value. */
4746 ha = bfd_elf_hash (name);
4747
4748 /* Store the found hash value in the array given as the argument. */
4749 *(*valuep)++ = ha;
4750
4751 /* And store it in the struct so that we can put it in the hash table
4752 later. */
f6e332e6 4753 h->u.elf_hash_value = ha;
5a580b3a
AM
4754
4755 if (alc != NULL)
4756 free (alc);
4757
4758 return TRUE;
4759}
4760
4761/* Array used to determine the number of hash table buckets to use
4762 based on the number of symbols there are. If there are fewer than
4763 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
4764 fewer than 37 we use 17 buckets, and so forth. We never use more
4765 than 32771 buckets. */
4766
4767static const size_t elf_buckets[] =
4768{
4769 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
4770 16411, 32771, 0
4771};
4772
4773/* Compute bucket count for hashing table. We do not use a static set
4774 of possible tables sizes anymore. Instead we determine for all
4775 possible reasonable sizes of the table the outcome (i.e., the
4776 number of collisions etc) and choose the best solution. The
4777 weighting functions are not too simple to allow the table to grow
4778 without bounds. Instead one of the weighting factors is the size.
4779 Therefore the result is always a good payoff between few collisions
4780 (= short chain lengths) and table size. */
4781static size_t
4782compute_bucket_count (struct bfd_link_info *info)
4783{
4784 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
4785 size_t best_size = 0;
4786 unsigned long int *hashcodes;
4787 unsigned long int *hashcodesp;
4788 unsigned long int i;
4789 bfd_size_type amt;
4790
4791 /* Compute the hash values for all exported symbols. At the same
4792 time store the values in an array so that we could use them for
4793 optimizations. */
4794 amt = dynsymcount;
4795 amt *= sizeof (unsigned long int);
4796 hashcodes = bfd_malloc (amt);
4797 if (hashcodes == NULL)
4798 return 0;
4799 hashcodesp = hashcodes;
4800
4801 /* Put all hash values in HASHCODES. */
4802 elf_link_hash_traverse (elf_hash_table (info),
4803 elf_collect_hash_codes, &hashcodesp);
4804
4805 /* We have a problem here. The following code to optimize the table
4806 size requires an integer type with more the 32 bits. If
4807 BFD_HOST_U_64_BIT is set we know about such a type. */
4808#ifdef BFD_HOST_U_64_BIT
4809 if (info->optimize)
4810 {
4811 unsigned long int nsyms = hashcodesp - hashcodes;
4812 size_t minsize;
4813 size_t maxsize;
4814 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
4815 unsigned long int *counts ;
4816 bfd *dynobj = elf_hash_table (info)->dynobj;
4817 const struct elf_backend_data *bed = get_elf_backend_data (dynobj);
4818
4819 /* Possible optimization parameters: if we have NSYMS symbols we say
4820 that the hashing table must at least have NSYMS/4 and at most
4821 2*NSYMS buckets. */
4822 minsize = nsyms / 4;
4823 if (minsize == 0)
4824 minsize = 1;
4825 best_size = maxsize = nsyms * 2;
4826
4827 /* Create array where we count the collisions in. We must use bfd_malloc
4828 since the size could be large. */
4829 amt = maxsize;
4830 amt *= sizeof (unsigned long int);
4831 counts = bfd_malloc (amt);
4832 if (counts == NULL)
4833 {
4834 free (hashcodes);
4835 return 0;
4836 }
4837
4838 /* Compute the "optimal" size for the hash table. The criteria is a
4839 minimal chain length. The minor criteria is (of course) the size
4840 of the table. */
4841 for (i = minsize; i < maxsize; ++i)
4842 {
4843 /* Walk through the array of hashcodes and count the collisions. */
4844 BFD_HOST_U_64_BIT max;
4845 unsigned long int j;
4846 unsigned long int fact;
4847
4848 memset (counts, '\0', i * sizeof (unsigned long int));
4849
4850 /* Determine how often each hash bucket is used. */
4851 for (j = 0; j < nsyms; ++j)
4852 ++counts[hashcodes[j] % i];
4853
4854 /* For the weight function we need some information about the
4855 pagesize on the target. This is information need not be 100%
4856 accurate. Since this information is not available (so far) we
4857 define it here to a reasonable default value. If it is crucial
4858 to have a better value some day simply define this value. */
4859# ifndef BFD_TARGET_PAGESIZE
4860# define BFD_TARGET_PAGESIZE (4096)
4861# endif
4862
4863 /* We in any case need 2 + NSYMS entries for the size values and
4864 the chains. */
4865 max = (2 + nsyms) * (bed->s->arch_size / 8);
4866
4867# if 1
4868 /* Variant 1: optimize for short chains. We add the squares
4869 of all the chain lengths (which favors many small chain
4870 over a few long chains). */
4871 for (j = 0; j < i; ++j)
4872 max += counts[j] * counts[j];
4873
4874 /* This adds penalties for the overall size of the table. */
4875 fact = i / (BFD_TARGET_PAGESIZE / (bed->s->arch_size / 8)) + 1;
4876 max *= fact * fact;
4877# else
4878 /* Variant 2: Optimize a lot more for small table. Here we
4879 also add squares of the size but we also add penalties for
4880 empty slots (the +1 term). */
4881 for (j = 0; j < i; ++j)
4882 max += (1 + counts[j]) * (1 + counts[j]);
4883
4884 /* The overall size of the table is considered, but not as
4885 strong as in variant 1, where it is squared. */
4886 fact = i / (BFD_TARGET_PAGESIZE / (bed->s->arch_size / 8)) + 1;
4887 max *= fact;
4888# endif
4889
4890 /* Compare with current best results. */
4891 if (max < best_chlen)
4892 {
4893 best_chlen = max;
4894 best_size = i;
4895 }
4896 }
4897
4898 free (counts);
4899 }
4900 else
4901#endif /* defined (BFD_HOST_U_64_BIT) */
4902 {
4903 /* This is the fallback solution if no 64bit type is available or if we
4904 are not supposed to spend much time on optimizations. We select the
4905 bucket count using a fixed set of numbers. */
4906 for (i = 0; elf_buckets[i] != 0; i++)
4907 {
4908 best_size = elf_buckets[i];
4909 if (dynsymcount < elf_buckets[i + 1])
4910 break;
4911 }
4912 }
4913
4914 /* Free the arrays we needed. */
4915 free (hashcodes);
4916
4917 return best_size;
4918}
4919
4920/* Set up the sizes and contents of the ELF dynamic sections. This is
4921 called by the ELF linker emulation before_allocation routine. We
4922 must set the sizes of the sections before the linker sets the
4923 addresses of the various sections. */
4924
4925bfd_boolean
4926bfd_elf_size_dynamic_sections (bfd *output_bfd,
4927 const char *soname,
4928 const char *rpath,
4929 const char *filter_shlib,
4930 const char * const *auxiliary_filters,
4931 struct bfd_link_info *info,
4932 asection **sinterpptr,
4933 struct bfd_elf_version_tree *verdefs)
4934{
4935 bfd_size_type soname_indx;
4936 bfd *dynobj;
4937 const struct elf_backend_data *bed;
4938 struct elf_assign_sym_version_info asvinfo;
4939
4940 *sinterpptr = NULL;
4941
4942 soname_indx = (bfd_size_type) -1;
4943
4944 if (!is_elf_hash_table (info->hash))
4945 return TRUE;
4946
8c37241b 4947 elf_tdata (output_bfd)->relro = info->relro;
5a580b3a
AM
4948 if (info->execstack)
4949 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
4950 else if (info->noexecstack)
4951 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W;
4952 else
4953 {
4954 bfd *inputobj;
4955 asection *notesec = NULL;
4956 int exec = 0;
4957
4958 for (inputobj = info->input_bfds;
4959 inputobj;
4960 inputobj = inputobj->link_next)
4961 {
4962 asection *s;
4963
d457dcf6 4964 if (inputobj->flags & (DYNAMIC | BFD_LINKER_CREATED))
5a580b3a
AM
4965 continue;
4966 s = bfd_get_section_by_name (inputobj, ".note.GNU-stack");
4967 if (s)
4968 {
4969 if (s->flags & SEC_CODE)
4970 exec = PF_X;
4971 notesec = s;
4972 }
4973 else
4974 exec = PF_X;
4975 }
4976 if (notesec)
4977 {
4978 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | exec;
4979 if (exec && info->relocatable
4980 && notesec->output_section != bfd_abs_section_ptr)
4981 notesec->output_section->flags |= SEC_CODE;
4982 }
4983 }
4984
4985 /* Any syms created from now on start with -1 in
4986 got.refcount/offset and plt.refcount/offset. */
4987 elf_hash_table (info)->init_refcount = elf_hash_table (info)->init_offset;
4988
4989 /* The backend may have to create some sections regardless of whether
4990 we're dynamic or not. */
4991 bed = get_elf_backend_data (output_bfd);
4992 if (bed->elf_backend_always_size_sections
4993 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
4994 return FALSE;
4995
4996 dynobj = elf_hash_table (info)->dynobj;
4997
4998 /* If there were no dynamic objects in the link, there is nothing to
4999 do here. */
5000 if (dynobj == NULL)
5001 return TRUE;
5002
5003 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
5004 return FALSE;
5005
5006 if (elf_hash_table (info)->dynamic_sections_created)
5007 {
5008 struct elf_info_failed eif;
5009 struct elf_link_hash_entry *h;
5010 asection *dynstr;
5011 struct bfd_elf_version_tree *t;
5012 struct bfd_elf_version_expr *d;
5013 bfd_boolean all_defined;
5014
5015 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
5016 BFD_ASSERT (*sinterpptr != NULL || !info->executable);
5017
5018 if (soname != NULL)
5019 {
5020 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5021 soname, TRUE);
5022 if (soname_indx == (bfd_size_type) -1
5023 || !_bfd_elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
5024 return FALSE;
5025 }
5026
5027 if (info->symbolic)
5028 {
5029 if (!_bfd_elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
5030 return FALSE;
5031 info->flags |= DF_SYMBOLIC;
5032 }
5033
5034 if (rpath != NULL)
5035 {
5036 bfd_size_type indx;
5037
5038 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
5039 TRUE);
5040 if (indx == (bfd_size_type) -1
5041 || !_bfd_elf_add_dynamic_entry (info, DT_RPATH, indx))
5042 return FALSE;
5043
5044 if (info->new_dtags)
5045 {
5046 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
5047 if (!_bfd_elf_add_dynamic_entry (info, DT_RUNPATH, indx))
5048 return FALSE;
5049 }
5050 }
5051
5052 if (filter_shlib != NULL)
5053 {
5054 bfd_size_type indx;
5055
5056 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5057 filter_shlib, TRUE);
5058 if (indx == (bfd_size_type) -1
5059 || !_bfd_elf_add_dynamic_entry (info, DT_FILTER, indx))
5060 return FALSE;
5061 }
5062
5063 if (auxiliary_filters != NULL)
5064 {
5065 const char * const *p;
5066
5067 for (p = auxiliary_filters; *p != NULL; p++)
5068 {
5069 bfd_size_type indx;
5070
5071 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5072 *p, TRUE);
5073 if (indx == (bfd_size_type) -1
5074 || !_bfd_elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
5075 return FALSE;
5076 }
5077 }
5078
5079 eif.info = info;
5080 eif.verdefs = verdefs;
5081 eif.failed = FALSE;
5082
5083 /* If we are supposed to export all symbols into the dynamic symbol
5084 table (this is not the normal case), then do so. */
5085 if (info->export_dynamic)
5086 {
5087 elf_link_hash_traverse (elf_hash_table (info),
5088 _bfd_elf_export_symbol,
5089 &eif);
5090 if (eif.failed)
5091 return FALSE;
5092 }
5093
5094 /* Make all global versions with definition. */
5095 for (t = verdefs; t != NULL; t = t->next)
5096 for (d = t->globals.list; d != NULL; d = d->next)
5097 if (!d->symver && d->symbol)
5098 {
5099 const char *verstr, *name;
5100 size_t namelen, verlen, newlen;
5101 char *newname, *p;
5102 struct elf_link_hash_entry *newh;
5103
5104 name = d->symbol;
5105 namelen = strlen (name);
5106 verstr = t->name;
5107 verlen = strlen (verstr);
5108 newlen = namelen + verlen + 3;
5109
5110 newname = bfd_malloc (newlen);
5111 if (newname == NULL)
5112 return FALSE;
5113 memcpy (newname, name, namelen);
5114
5115 /* Check the hidden versioned definition. */
5116 p = newname + namelen;
5117 *p++ = ELF_VER_CHR;
5118 memcpy (p, verstr, verlen + 1);
5119 newh = elf_link_hash_lookup (elf_hash_table (info),
5120 newname, FALSE, FALSE,
5121 FALSE);
5122 if (newh == NULL
5123 || (newh->root.type != bfd_link_hash_defined
5124 && newh->root.type != bfd_link_hash_defweak))
5125 {
5126 /* Check the default versioned definition. */
5127 *p++ = ELF_VER_CHR;
5128 memcpy (p, verstr, verlen + 1);
5129 newh = elf_link_hash_lookup (elf_hash_table (info),
5130 newname, FALSE, FALSE,
5131 FALSE);
5132 }
5133 free (newname);
5134
5135 /* Mark this version if there is a definition and it is
5136 not defined in a shared object. */
5137 if (newh != NULL
f5385ebf 5138 && !newh->def_dynamic
5a580b3a
AM
5139 && (newh->root.type == bfd_link_hash_defined
5140 || newh->root.type == bfd_link_hash_defweak))
5141 d->symver = 1;
5142 }
5143
5144 /* Attach all the symbols to their version information. */
5145 asvinfo.output_bfd = output_bfd;
5146 asvinfo.info = info;
5147 asvinfo.verdefs = verdefs;
5148 asvinfo.failed = FALSE;
5149
5150 elf_link_hash_traverse (elf_hash_table (info),
5151 _bfd_elf_link_assign_sym_version,
5152 &asvinfo);
5153 if (asvinfo.failed)
5154 return FALSE;
5155
5156 if (!info->allow_undefined_version)
5157 {
5158 /* Check if all global versions have a definition. */
5159 all_defined = TRUE;
5160 for (t = verdefs; t != NULL; t = t->next)
5161 for (d = t->globals.list; d != NULL; d = d->next)
5162 if (!d->symver && !d->script)
5163 {
5164 (*_bfd_error_handler)
5165 (_("%s: undefined version: %s"),
5166 d->pattern, t->name);
5167 all_defined = FALSE;
5168 }
5169
5170 if (!all_defined)
5171 {
5172 bfd_set_error (bfd_error_bad_value);
5173 return FALSE;
5174 }
5175 }
5176
5177 /* Find all symbols which were defined in a dynamic object and make
5178 the backend pick a reasonable value for them. */
5179 elf_link_hash_traverse (elf_hash_table (info),
5180 _bfd_elf_adjust_dynamic_symbol,
5181 &eif);
5182 if (eif.failed)
5183 return FALSE;
5184
5185 /* Add some entries to the .dynamic section. We fill in some of the
ee75fd95 5186 values later, in bfd_elf_final_link, but we must add the entries
5a580b3a
AM
5187 now so that we know the final size of the .dynamic section. */
5188
5189 /* If there are initialization and/or finalization functions to
5190 call then add the corresponding DT_INIT/DT_FINI entries. */
5191 h = (info->init_function
5192 ? elf_link_hash_lookup (elf_hash_table (info),
5193 info->init_function, FALSE,
5194 FALSE, FALSE)
5195 : NULL);
5196 if (h != NULL
f5385ebf
AM
5197 && (h->ref_regular
5198 || h->def_regular))
5a580b3a
AM
5199 {
5200 if (!_bfd_elf_add_dynamic_entry (info, DT_INIT, 0))
5201 return FALSE;
5202 }
5203 h = (info->fini_function
5204 ? elf_link_hash_lookup (elf_hash_table (info),
5205 info->fini_function, FALSE,
5206 FALSE, FALSE)
5207 : NULL);
5208 if (h != NULL
f5385ebf
AM
5209 && (h->ref_regular
5210 || h->def_regular))
5a580b3a
AM
5211 {
5212 if (!_bfd_elf_add_dynamic_entry (info, DT_FINI, 0))
5213 return FALSE;
5214 }
5215
5216 if (bfd_get_section_by_name (output_bfd, ".preinit_array") != NULL)
5217 {
5218 /* DT_PREINIT_ARRAY is not allowed in shared library. */
5219 if (! info->executable)
5220 {
5221 bfd *sub;
5222 asection *o;
5223
5224 for (sub = info->input_bfds; sub != NULL;
5225 sub = sub->link_next)
5226 for (o = sub->sections; o != NULL; o = o->next)
5227 if (elf_section_data (o)->this_hdr.sh_type
5228 == SHT_PREINIT_ARRAY)
5229 {
5230 (*_bfd_error_handler)
d003868e
AM
5231 (_("%B: .preinit_array section is not allowed in DSO"),
5232 sub);
5a580b3a
AM
5233 break;
5234 }
5235
5236 bfd_set_error (bfd_error_nonrepresentable_section);
5237 return FALSE;
5238 }
5239
5240 if (!_bfd_elf_add_dynamic_entry (info, DT_PREINIT_ARRAY, 0)
5241 || !_bfd_elf_add_dynamic_entry (info, DT_PREINIT_ARRAYSZ, 0))
5242 return FALSE;
5243 }
5244 if (bfd_get_section_by_name (output_bfd, ".init_array") != NULL)
5245 {
5246 if (!_bfd_elf_add_dynamic_entry (info, DT_INIT_ARRAY, 0)
5247 || !_bfd_elf_add_dynamic_entry (info, DT_INIT_ARRAYSZ, 0))
5248 return FALSE;
5249 }
5250 if (bfd_get_section_by_name (output_bfd, ".fini_array") != NULL)
5251 {
5252 if (!_bfd_elf_add_dynamic_entry (info, DT_FINI_ARRAY, 0)
5253 || !_bfd_elf_add_dynamic_entry (info, DT_FINI_ARRAYSZ, 0))
5254 return FALSE;
5255 }
5256
5257 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
5258 /* If .dynstr is excluded from the link, we don't want any of
5259 these tags. Strictly, we should be checking each section
5260 individually; This quick check covers for the case where
5261 someone does a /DISCARD/ : { *(*) }. */
5262 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
5263 {
5264 bfd_size_type strsize;
5265
5266 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
5267 if (!_bfd_elf_add_dynamic_entry (info, DT_HASH, 0)
5268 || !_bfd_elf_add_dynamic_entry (info, DT_STRTAB, 0)
5269 || !_bfd_elf_add_dynamic_entry (info, DT_SYMTAB, 0)
5270 || !_bfd_elf_add_dynamic_entry (info, DT_STRSZ, strsize)
5271 || !_bfd_elf_add_dynamic_entry (info, DT_SYMENT,
5272 bed->s->sizeof_sym))
5273 return FALSE;
5274 }
5275 }
5276
5277 /* The backend must work out the sizes of all the other dynamic
5278 sections. */
5279 if (bed->elf_backend_size_dynamic_sections
5280 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
5281 return FALSE;
5282
5283 if (elf_hash_table (info)->dynamic_sections_created)
5284 {
5285 bfd_size_type dynsymcount;
554220db 5286 unsigned long section_sym_count;
5a580b3a
AM
5287 asection *s;
5288 size_t bucketcount = 0;
5289 size_t hash_entry_size;
5290 unsigned int dtagcount;
5291
5292 /* Set up the version definition section. */
5293 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
5294 BFD_ASSERT (s != NULL);
5295
5296 /* We may have created additional version definitions if we are
5297 just linking a regular application. */
5298 verdefs = asvinfo.verdefs;
5299
5300 /* Skip anonymous version tag. */
5301 if (verdefs != NULL && verdefs->vernum == 0)
5302 verdefs = verdefs->next;
5303
3e3b46e5 5304 if (verdefs == NULL && !info->create_default_symver)
5a580b3a
AM
5305 _bfd_strip_section_from_output (info, s);
5306 else
5307 {
5308 unsigned int cdefs;
5309 bfd_size_type size;
5310 struct bfd_elf_version_tree *t;
5311 bfd_byte *p;
5312 Elf_Internal_Verdef def;
5313 Elf_Internal_Verdaux defaux;
3e3b46e5
PB
5314 struct bfd_link_hash_entry *bh;
5315 struct elf_link_hash_entry *h;
5316 const char *name;
5a580b3a
AM
5317
5318 cdefs = 0;
5319 size = 0;
5320
5321 /* Make space for the base version. */
5322 size += sizeof (Elf_External_Verdef);
5323 size += sizeof (Elf_External_Verdaux);
5324 ++cdefs;
5325
3e3b46e5
PB
5326 /* Make space for the default version. */
5327 if (info->create_default_symver)
5328 {
5329 size += sizeof (Elf_External_Verdef);
5330 ++cdefs;
5331 }
5332
5a580b3a
AM
5333 for (t = verdefs; t != NULL; t = t->next)
5334 {
5335 struct bfd_elf_version_deps *n;
5336
5337 size += sizeof (Elf_External_Verdef);
5338 size += sizeof (Elf_External_Verdaux);
5339 ++cdefs;
5340
5341 for (n = t->deps; n != NULL; n = n->next)
5342 size += sizeof (Elf_External_Verdaux);
5343 }
5344
eea6121a
AM
5345 s->size = size;
5346 s->contents = bfd_alloc (output_bfd, s->size);
5347 if (s->contents == NULL && s->size != 0)
5a580b3a
AM
5348 return FALSE;
5349
5350 /* Fill in the version definition section. */
5351
5352 p = s->contents;
5353
5354 def.vd_version = VER_DEF_CURRENT;
5355 def.vd_flags = VER_FLG_BASE;
5356 def.vd_ndx = 1;
5357 def.vd_cnt = 1;
3e3b46e5
PB
5358 if (info->create_default_symver)
5359 {
5360 def.vd_aux = 2 * sizeof (Elf_External_Verdef);
5361 def.vd_next = sizeof (Elf_External_Verdef);
5362 }
5363 else
5364 {
5365 def.vd_aux = sizeof (Elf_External_Verdef);
5366 def.vd_next = (sizeof (Elf_External_Verdef)
5367 + sizeof (Elf_External_Verdaux));
5368 }
5a580b3a
AM
5369
5370 if (soname_indx != (bfd_size_type) -1)
5371 {
5372 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5373 soname_indx);
5374 def.vd_hash = bfd_elf_hash (soname);
5375 defaux.vda_name = soname_indx;
3e3b46e5 5376 name = soname;
5a580b3a
AM
5377 }
5378 else
5379 {
5a580b3a
AM
5380 bfd_size_type indx;
5381
5382 name = basename (output_bfd->filename);
5383 def.vd_hash = bfd_elf_hash (name);
5384 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5385 name, FALSE);
5386 if (indx == (bfd_size_type) -1)
5387 return FALSE;
5388 defaux.vda_name = indx;
5389 }
5390 defaux.vda_next = 0;
5391
5392 _bfd_elf_swap_verdef_out (output_bfd, &def,
5393 (Elf_External_Verdef *) p);
5394 p += sizeof (Elf_External_Verdef);
3e3b46e5
PB
5395 if (info->create_default_symver)
5396 {
5397 /* Add a symbol representing this version. */
5398 bh = NULL;
5399 if (! (_bfd_generic_link_add_one_symbol
5400 (info, dynobj, name, BSF_GLOBAL, bfd_abs_section_ptr,
5401 0, NULL, FALSE,
5402 get_elf_backend_data (dynobj)->collect, &bh)))
5403 return FALSE;
5404 h = (struct elf_link_hash_entry *) bh;
5405 h->non_elf = 0;
5406 h->def_regular = 1;
5407 h->type = STT_OBJECT;
5408 h->verinfo.vertree = NULL;
5409
5410 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5411 return FALSE;
5412
5413 /* Create a duplicate of the base version with the same
5414 aux block, but different flags. */
5415 def.vd_flags = 0;
5416 def.vd_ndx = 2;
5417 def.vd_aux = sizeof (Elf_External_Verdef);
5418 if (verdefs)
5419 def.vd_next = (sizeof (Elf_External_Verdef)
5420 + sizeof (Elf_External_Verdaux));
5421 else
5422 def.vd_next = 0;
5423 _bfd_elf_swap_verdef_out (output_bfd, &def,
5424 (Elf_External_Verdef *) p);
5425 p += sizeof (Elf_External_Verdef);
5426 }
5a580b3a
AM
5427 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5428 (Elf_External_Verdaux *) p);
5429 p += sizeof (Elf_External_Verdaux);
5430
5431 for (t = verdefs; t != NULL; t = t->next)
5432 {
5433 unsigned int cdeps;
5434 struct bfd_elf_version_deps *n;
5a580b3a
AM
5435
5436 cdeps = 0;
5437 for (n = t->deps; n != NULL; n = n->next)
5438 ++cdeps;
5439
5440 /* Add a symbol representing this version. */
5441 bh = NULL;
5442 if (! (_bfd_generic_link_add_one_symbol
5443 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
5444 0, NULL, FALSE,
5445 get_elf_backend_data (dynobj)->collect, &bh)))
5446 return FALSE;
5447 h = (struct elf_link_hash_entry *) bh;
f5385ebf
AM
5448 h->non_elf = 0;
5449 h->def_regular = 1;
5a580b3a
AM
5450 h->type = STT_OBJECT;
5451 h->verinfo.vertree = t;
5452
c152c796 5453 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5a580b3a
AM
5454 return FALSE;
5455
5456 def.vd_version = VER_DEF_CURRENT;
5457 def.vd_flags = 0;
5458 if (t->globals.list == NULL
5459 && t->locals.list == NULL
5460 && ! t->used)
5461 def.vd_flags |= VER_FLG_WEAK;
3e3b46e5 5462 def.vd_ndx = t->vernum + (info->create_default_symver ? 2 : 1);
5a580b3a
AM
5463 def.vd_cnt = cdeps + 1;
5464 def.vd_hash = bfd_elf_hash (t->name);
5465 def.vd_aux = sizeof (Elf_External_Verdef);
5466 def.vd_next = 0;
5467 if (t->next != NULL)
5468 def.vd_next = (sizeof (Elf_External_Verdef)
5469 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
5470
5471 _bfd_elf_swap_verdef_out (output_bfd, &def,
5472 (Elf_External_Verdef *) p);
5473 p += sizeof (Elf_External_Verdef);
5474
5475 defaux.vda_name = h->dynstr_index;
5476 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5477 h->dynstr_index);
5478 defaux.vda_next = 0;
5479 if (t->deps != NULL)
5480 defaux.vda_next = sizeof (Elf_External_Verdaux);
5481 t->name_indx = defaux.vda_name;
5482
5483 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5484 (Elf_External_Verdaux *) p);
5485 p += sizeof (Elf_External_Verdaux);
5486
5487 for (n = t->deps; n != NULL; n = n->next)
5488 {
5489 if (n->version_needed == NULL)
5490 {
5491 /* This can happen if there was an error in the
5492 version script. */
5493 defaux.vda_name = 0;
5494 }
5495 else
5496 {
5497 defaux.vda_name = n->version_needed->name_indx;
5498 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5499 defaux.vda_name);
5500 }
5501 if (n->next == NULL)
5502 defaux.vda_next = 0;
5503 else
5504 defaux.vda_next = sizeof (Elf_External_Verdaux);
5505
5506 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5507 (Elf_External_Verdaux *) p);
5508 p += sizeof (Elf_External_Verdaux);
5509 }
5510 }
5511
5512 if (!_bfd_elf_add_dynamic_entry (info, DT_VERDEF, 0)
5513 || !_bfd_elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
5514 return FALSE;
5515
5516 elf_tdata (output_bfd)->cverdefs = cdefs;
5517 }
5518
5519 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
5520 {
5521 if (!_bfd_elf_add_dynamic_entry (info, DT_FLAGS, info->flags))
5522 return FALSE;
5523 }
5524 else if (info->flags & DF_BIND_NOW)
5525 {
5526 if (!_bfd_elf_add_dynamic_entry (info, DT_BIND_NOW, 0))
5527 return FALSE;
5528 }
5529
5530 if (info->flags_1)
5531 {
5532 if (info->executable)
5533 info->flags_1 &= ~ (DF_1_INITFIRST
5534 | DF_1_NODELETE
5535 | DF_1_NOOPEN);
5536 if (!_bfd_elf_add_dynamic_entry (info, DT_FLAGS_1, info->flags_1))
5537 return FALSE;
5538 }
5539
5540 /* Work out the size of the version reference section. */
5541
5542 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
5543 BFD_ASSERT (s != NULL);
5544 {
5545 struct elf_find_verdep_info sinfo;
5546
5547 sinfo.output_bfd = output_bfd;
5548 sinfo.info = info;
5549 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
5550 if (sinfo.vers == 0)
5551 sinfo.vers = 1;
5552 sinfo.failed = FALSE;
5553
5554 elf_link_hash_traverse (elf_hash_table (info),
5555 _bfd_elf_link_find_version_dependencies,
5556 &sinfo);
5557
5558 if (elf_tdata (output_bfd)->verref == NULL)
5559 _bfd_strip_section_from_output (info, s);
5560 else
5561 {
5562 Elf_Internal_Verneed *t;
5563 unsigned int size;
5564 unsigned int crefs;
5565 bfd_byte *p;
5566
5567 /* Build the version definition section. */
5568 size = 0;
5569 crefs = 0;
5570 for (t = elf_tdata (output_bfd)->verref;
5571 t != NULL;
5572 t = t->vn_nextref)
5573 {
5574 Elf_Internal_Vernaux *a;
5575
5576 size += sizeof (Elf_External_Verneed);
5577 ++crefs;
5578 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5579 size += sizeof (Elf_External_Vernaux);
5580 }
5581
eea6121a
AM
5582 s->size = size;
5583 s->contents = bfd_alloc (output_bfd, s->size);
5a580b3a
AM
5584 if (s->contents == NULL)
5585 return FALSE;
5586
5587 p = s->contents;
5588 for (t = elf_tdata (output_bfd)->verref;
5589 t != NULL;
5590 t = t->vn_nextref)
5591 {
5592 unsigned int caux;
5593 Elf_Internal_Vernaux *a;
5594 bfd_size_type indx;
5595
5596 caux = 0;
5597 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5598 ++caux;
5599
5600 t->vn_version = VER_NEED_CURRENT;
5601 t->vn_cnt = caux;
5602 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5603 elf_dt_name (t->vn_bfd) != NULL
5604 ? elf_dt_name (t->vn_bfd)
5605 : basename (t->vn_bfd->filename),
5606 FALSE);
5607 if (indx == (bfd_size_type) -1)
5608 return FALSE;
5609 t->vn_file = indx;
5610 t->vn_aux = sizeof (Elf_External_Verneed);
5611 if (t->vn_nextref == NULL)
5612 t->vn_next = 0;
5613 else
5614 t->vn_next = (sizeof (Elf_External_Verneed)
5615 + caux * sizeof (Elf_External_Vernaux));
5616
5617 _bfd_elf_swap_verneed_out (output_bfd, t,
5618 (Elf_External_Verneed *) p);
5619 p += sizeof (Elf_External_Verneed);
5620
5621 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5622 {
5623 a->vna_hash = bfd_elf_hash (a->vna_nodename);
5624 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5625 a->vna_nodename, FALSE);
5626 if (indx == (bfd_size_type) -1)
5627 return FALSE;
5628 a->vna_name = indx;
5629 if (a->vna_nextptr == NULL)
5630 a->vna_next = 0;
5631 else
5632 a->vna_next = sizeof (Elf_External_Vernaux);
5633
5634 _bfd_elf_swap_vernaux_out (output_bfd, a,
5635 (Elf_External_Vernaux *) p);
5636 p += sizeof (Elf_External_Vernaux);
5637 }
5638 }
5639
5640 if (!_bfd_elf_add_dynamic_entry (info, DT_VERNEED, 0)
5641 || !_bfd_elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
5642 return FALSE;
5643
5644 elf_tdata (output_bfd)->cverrefs = crefs;
5645 }
5646 }
5647
5648 /* Assign dynsym indicies. In a shared library we generate a
5649 section symbol for each output section, which come first.
5650 Next come all of the back-end allocated local dynamic syms,
5651 followed by the rest of the global symbols. */
5652
554220db
AM
5653 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info,
5654 &section_sym_count);
5a580b3a
AM
5655
5656 /* Work out the size of the symbol version section. */
5657 s = bfd_get_section_by_name (dynobj, ".gnu.version");
5658 BFD_ASSERT (s != NULL);
5659 if (dynsymcount == 0
3e3b46e5
PB
5660 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL
5661 && !info->create_default_symver))
5a580b3a
AM
5662 {
5663 _bfd_strip_section_from_output (info, s);
5664 /* The DYNSYMCOUNT might have changed if we were going to
5665 output a dynamic symbol table entry for S. */
554220db
AM
5666 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info,
5667 &section_sym_count);
5a580b3a
AM
5668 }
5669 else
5670 {
eea6121a
AM
5671 s->size = dynsymcount * sizeof (Elf_External_Versym);
5672 s->contents = bfd_zalloc (output_bfd, s->size);
5a580b3a
AM
5673 if (s->contents == NULL)
5674 return FALSE;
5675
5676 if (!_bfd_elf_add_dynamic_entry (info, DT_VERSYM, 0))
5677 return FALSE;
5678 }
5679
5680 /* Set the size of the .dynsym and .hash sections. We counted
5681 the number of dynamic symbols in elf_link_add_object_symbols.
5682 We will build the contents of .dynsym and .hash when we build
5683 the final symbol table, because until then we do not know the
5684 correct value to give the symbols. We built the .dynstr
5685 section as we went along in elf_link_add_object_symbols. */
5686 s = bfd_get_section_by_name (dynobj, ".dynsym");
5687 BFD_ASSERT (s != NULL);
eea6121a 5688 s->size = dynsymcount * bed->s->sizeof_sym;
5a580b3a
AM
5689
5690 if (dynsymcount != 0)
5691 {
554220db
AM
5692 s->contents = bfd_alloc (output_bfd, s->size);
5693 if (s->contents == NULL)
5694 return FALSE;
5a580b3a 5695
554220db
AM
5696 /* The first entry in .dynsym is a dummy symbol.
5697 Clear all the section syms, in case we don't output them all. */
5698 ++section_sym_count;
5699 memset (s->contents, 0, section_sym_count * bed->s->sizeof_sym);
5a580b3a
AM
5700 }
5701
5702 /* Compute the size of the hashing table. As a side effect this
5703 computes the hash values for all the names we export. */
5704 bucketcount = compute_bucket_count (info);
5705
5706 s = bfd_get_section_by_name (dynobj, ".hash");
5707 BFD_ASSERT (s != NULL);
5708 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
eea6121a
AM
5709 s->size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
5710 s->contents = bfd_zalloc (output_bfd, s->size);
5a580b3a
AM
5711 if (s->contents == NULL)
5712 return FALSE;
5713
5714 bfd_put (8 * hash_entry_size, output_bfd, bucketcount, s->contents);
5715 bfd_put (8 * hash_entry_size, output_bfd, dynsymcount,
5716 s->contents + hash_entry_size);
5717
5718 elf_hash_table (info)->bucketcount = bucketcount;
5719
5720 s = bfd_get_section_by_name (dynobj, ".dynstr");
5721 BFD_ASSERT (s != NULL);
5722
4ad4eba5 5723 elf_finalize_dynstr (output_bfd, info);
5a580b3a 5724
eea6121a 5725 s->size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
5a580b3a
AM
5726
5727 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
5728 if (!_bfd_elf_add_dynamic_entry (info, DT_NULL, 0))
5729 return FALSE;
5730 }
5731
5732 return TRUE;
5733}
c152c796
AM
5734
5735/* Final phase of ELF linker. */
5736
5737/* A structure we use to avoid passing large numbers of arguments. */
5738
5739struct elf_final_link_info
5740{
5741 /* General link information. */
5742 struct bfd_link_info *info;
5743 /* Output BFD. */
5744 bfd *output_bfd;
5745 /* Symbol string table. */
5746 struct bfd_strtab_hash *symstrtab;
5747 /* .dynsym section. */
5748 asection *dynsym_sec;
5749 /* .hash section. */
5750 asection *hash_sec;
5751 /* symbol version section (.gnu.version). */
5752 asection *symver_sec;
5753 /* Buffer large enough to hold contents of any section. */
5754 bfd_byte *contents;
5755 /* Buffer large enough to hold external relocs of any section. */
5756 void *external_relocs;
5757 /* Buffer large enough to hold internal relocs of any section. */
5758 Elf_Internal_Rela *internal_relocs;
5759 /* Buffer large enough to hold external local symbols of any input
5760 BFD. */
5761 bfd_byte *external_syms;
5762 /* And a buffer for symbol section indices. */
5763 Elf_External_Sym_Shndx *locsym_shndx;
5764 /* Buffer large enough to hold internal local symbols of any input
5765 BFD. */
5766 Elf_Internal_Sym *internal_syms;
5767 /* Array large enough to hold a symbol index for each local symbol
5768 of any input BFD. */
5769 long *indices;
5770 /* Array large enough to hold a section pointer for each local
5771 symbol of any input BFD. */
5772 asection **sections;
5773 /* Buffer to hold swapped out symbols. */
5774 bfd_byte *symbuf;
5775 /* And one for symbol section indices. */
5776 Elf_External_Sym_Shndx *symshndxbuf;
5777 /* Number of swapped out symbols in buffer. */
5778 size_t symbuf_count;
5779 /* Number of symbols which fit in symbuf. */
5780 size_t symbuf_size;
5781 /* And same for symshndxbuf. */
5782 size_t shndxbuf_size;
5783};
5784
5785/* This struct is used to pass information to elf_link_output_extsym. */
5786
5787struct elf_outext_info
5788{
5789 bfd_boolean failed;
5790 bfd_boolean localsyms;
5791 struct elf_final_link_info *finfo;
5792};
5793
5794/* When performing a relocatable link, the input relocations are
5795 preserved. But, if they reference global symbols, the indices
5796 referenced must be updated. Update all the relocations in
5797 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
5798
5799static void
5800elf_link_adjust_relocs (bfd *abfd,
5801 Elf_Internal_Shdr *rel_hdr,
5802 unsigned int count,
5803 struct elf_link_hash_entry **rel_hash)
5804{
5805 unsigned int i;
5806 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5807 bfd_byte *erela;
5808 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
5809 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
5810 bfd_vma r_type_mask;
5811 int r_sym_shift;
5812
5813 if (rel_hdr->sh_entsize == bed->s->sizeof_rel)
5814 {
5815 swap_in = bed->s->swap_reloc_in;
5816 swap_out = bed->s->swap_reloc_out;
5817 }
5818 else if (rel_hdr->sh_entsize == bed->s->sizeof_rela)
5819 {
5820 swap_in = bed->s->swap_reloca_in;
5821 swap_out = bed->s->swap_reloca_out;
5822 }
5823 else
5824 abort ();
5825
5826 if (bed->s->int_rels_per_ext_rel > MAX_INT_RELS_PER_EXT_REL)
5827 abort ();
5828
5829 if (bed->s->arch_size == 32)
5830 {
5831 r_type_mask = 0xff;
5832 r_sym_shift = 8;
5833 }
5834 else
5835 {
5836 r_type_mask = 0xffffffff;
5837 r_sym_shift = 32;
5838 }
5839
5840 erela = rel_hdr->contents;
5841 for (i = 0; i < count; i++, rel_hash++, erela += rel_hdr->sh_entsize)
5842 {
5843 Elf_Internal_Rela irela[MAX_INT_RELS_PER_EXT_REL];
5844 unsigned int j;
5845
5846 if (*rel_hash == NULL)
5847 continue;
5848
5849 BFD_ASSERT ((*rel_hash)->indx >= 0);
5850
5851 (*swap_in) (abfd, erela, irela);
5852 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
5853 irela[j].r_info = ((bfd_vma) (*rel_hash)->indx << r_sym_shift
5854 | (irela[j].r_info & r_type_mask));
5855 (*swap_out) (abfd, irela, erela);
5856 }
5857}
5858
5859struct elf_link_sort_rela
5860{
5861 union {
5862 bfd_vma offset;
5863 bfd_vma sym_mask;
5864 } u;
5865 enum elf_reloc_type_class type;
5866 /* We use this as an array of size int_rels_per_ext_rel. */
5867 Elf_Internal_Rela rela[1];
5868};
5869
5870static int
5871elf_link_sort_cmp1 (const void *A, const void *B)
5872{
5873 const struct elf_link_sort_rela *a = A;
5874 const struct elf_link_sort_rela *b = B;
5875 int relativea, relativeb;
5876
5877 relativea = a->type == reloc_class_relative;
5878 relativeb = b->type == reloc_class_relative;
5879
5880 if (relativea < relativeb)
5881 return 1;
5882 if (relativea > relativeb)
5883 return -1;
5884 if ((a->rela->r_info & a->u.sym_mask) < (b->rela->r_info & b->u.sym_mask))
5885 return -1;
5886 if ((a->rela->r_info & a->u.sym_mask) > (b->rela->r_info & b->u.sym_mask))
5887 return 1;
5888 if (a->rela->r_offset < b->rela->r_offset)
5889 return -1;
5890 if (a->rela->r_offset > b->rela->r_offset)
5891 return 1;
5892 return 0;
5893}
5894
5895static int
5896elf_link_sort_cmp2 (const void *A, const void *B)
5897{
5898 const struct elf_link_sort_rela *a = A;
5899 const struct elf_link_sort_rela *b = B;
5900 int copya, copyb;
5901
5902 if (a->u.offset < b->u.offset)
5903 return -1;
5904 if (a->u.offset > b->u.offset)
5905 return 1;
5906 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
5907 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
5908 if (copya < copyb)
5909 return -1;
5910 if (copya > copyb)
5911 return 1;
5912 if (a->rela->r_offset < b->rela->r_offset)
5913 return -1;
5914 if (a->rela->r_offset > b->rela->r_offset)
5915 return 1;
5916 return 0;
5917}
5918
5919static size_t
5920elf_link_sort_relocs (bfd *abfd, struct bfd_link_info *info, asection **psec)
5921{
5922 asection *reldyn;
5923 bfd_size_type count, size;
5924 size_t i, ret, sort_elt, ext_size;
5925 bfd_byte *sort, *s_non_relative, *p;
5926 struct elf_link_sort_rela *sq;
5927 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
5928 int i2e = bed->s->int_rels_per_ext_rel;
5929 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
5930 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
5931 struct bfd_link_order *lo;
5932 bfd_vma r_sym_mask;
5933
5934 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
eea6121a 5935 if (reldyn == NULL || reldyn->size == 0)
c152c796
AM
5936 {
5937 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
eea6121a 5938 if (reldyn == NULL || reldyn->size == 0)
c152c796
AM
5939 return 0;
5940 ext_size = bed->s->sizeof_rel;
5941 swap_in = bed->s->swap_reloc_in;
5942 swap_out = bed->s->swap_reloc_out;
5943 }
5944 else
5945 {
5946 ext_size = bed->s->sizeof_rela;
5947 swap_in = bed->s->swap_reloca_in;
5948 swap_out = bed->s->swap_reloca_out;
5949 }
eea6121a 5950 count = reldyn->size / ext_size;
c152c796
AM
5951
5952 size = 0;
5953 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
5954 if (lo->type == bfd_indirect_link_order)
5955 {
5956 asection *o = lo->u.indirect.section;
eea6121a 5957 size += o->size;
c152c796
AM
5958 }
5959
eea6121a 5960 if (size != reldyn->size)
c152c796
AM
5961 return 0;
5962
5963 sort_elt = (sizeof (struct elf_link_sort_rela)
5964 + (i2e - 1) * sizeof (Elf_Internal_Rela));
5965 sort = bfd_zmalloc (sort_elt * count);
5966 if (sort == NULL)
5967 {
5968 (*info->callbacks->warning)
5969 (info, _("Not enough memory to sort relocations"), 0, abfd, 0, 0);
5970 return 0;
5971 }
5972
5973 if (bed->s->arch_size == 32)
5974 r_sym_mask = ~(bfd_vma) 0xff;
5975 else
5976 r_sym_mask = ~(bfd_vma) 0xffffffff;
5977
5978 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
5979 if (lo->type == bfd_indirect_link_order)
5980 {
5981 bfd_byte *erel, *erelend;
5982 asection *o = lo->u.indirect.section;
5983
1da212d6
AM
5984 if (o->contents == NULL && o->size != 0)
5985 {
5986 /* This is a reloc section that is being handled as a normal
5987 section. See bfd_section_from_shdr. We can't combine
5988 relocs in this case. */
5989 free (sort);
5990 return 0;
5991 }
c152c796 5992 erel = o->contents;
eea6121a 5993 erelend = o->contents + o->size;
c152c796
AM
5994 p = sort + o->output_offset / ext_size * sort_elt;
5995 while (erel < erelend)
5996 {
5997 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
5998 (*swap_in) (abfd, erel, s->rela);
5999 s->type = (*bed->elf_backend_reloc_type_class) (s->rela);
6000 s->u.sym_mask = r_sym_mask;
6001 p += sort_elt;
6002 erel += ext_size;
6003 }
6004 }
6005
6006 qsort (sort, count, sort_elt, elf_link_sort_cmp1);
6007
6008 for (i = 0, p = sort; i < count; i++, p += sort_elt)
6009 {
6010 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6011 if (s->type != reloc_class_relative)
6012 break;
6013 }
6014 ret = i;
6015 s_non_relative = p;
6016
6017 sq = (struct elf_link_sort_rela *) s_non_relative;
6018 for (; i < count; i++, p += sort_elt)
6019 {
6020 struct elf_link_sort_rela *sp = (struct elf_link_sort_rela *) p;
6021 if (((sp->rela->r_info ^ sq->rela->r_info) & r_sym_mask) != 0)
6022 sq = sp;
6023 sp->u.offset = sq->rela->r_offset;
6024 }
6025
6026 qsort (s_non_relative, count - ret, sort_elt, elf_link_sort_cmp2);
6027
6028 for (lo = reldyn->link_order_head; lo != NULL; lo = lo->next)
6029 if (lo->type == bfd_indirect_link_order)
6030 {
6031 bfd_byte *erel, *erelend;
6032 asection *o = lo->u.indirect.section;
6033
6034 erel = o->contents;
eea6121a 6035 erelend = o->contents + o->size;
c152c796
AM
6036 p = sort + o->output_offset / ext_size * sort_elt;
6037 while (erel < erelend)
6038 {
6039 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6040 (*swap_out) (abfd, s->rela, erel);
6041 p += sort_elt;
6042 erel += ext_size;
6043 }
6044 }
6045
6046 free (sort);
6047 *psec = reldyn;
6048 return ret;
6049}
6050
6051/* Flush the output symbols to the file. */
6052
6053static bfd_boolean
6054elf_link_flush_output_syms (struct elf_final_link_info *finfo,
6055 const struct elf_backend_data *bed)
6056{
6057 if (finfo->symbuf_count > 0)
6058 {
6059 Elf_Internal_Shdr *hdr;
6060 file_ptr pos;
6061 bfd_size_type amt;
6062
6063 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
6064 pos = hdr->sh_offset + hdr->sh_size;
6065 amt = finfo->symbuf_count * bed->s->sizeof_sym;
6066 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
6067 || bfd_bwrite (finfo->symbuf, amt, finfo->output_bfd) != amt)
6068 return FALSE;
6069
6070 hdr->sh_size += amt;
6071 finfo->symbuf_count = 0;
6072 }
6073
6074 return TRUE;
6075}
6076
6077/* Add a symbol to the output symbol table. */
6078
6079static bfd_boolean
6080elf_link_output_sym (struct elf_final_link_info *finfo,
6081 const char *name,
6082 Elf_Internal_Sym *elfsym,
6083 asection *input_sec,
6084 struct elf_link_hash_entry *h)
6085{
6086 bfd_byte *dest;
6087 Elf_External_Sym_Shndx *destshndx;
6088 bfd_boolean (*output_symbol_hook)
6089 (struct bfd_link_info *, const char *, Elf_Internal_Sym *, asection *,
6090 struct elf_link_hash_entry *);
6091 const struct elf_backend_data *bed;
6092
6093 bed = get_elf_backend_data (finfo->output_bfd);
6094 output_symbol_hook = bed->elf_backend_link_output_symbol_hook;
6095 if (output_symbol_hook != NULL)
6096 {
6097 if (! (*output_symbol_hook) (finfo->info, name, elfsym, input_sec, h))
6098 return FALSE;
6099 }
6100
6101 if (name == NULL || *name == '\0')
6102 elfsym->st_name = 0;
6103 else if (input_sec->flags & SEC_EXCLUDE)
6104 elfsym->st_name = 0;
6105 else
6106 {
6107 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
6108 name, TRUE, FALSE);
6109 if (elfsym->st_name == (unsigned long) -1)
6110 return FALSE;
6111 }
6112
6113 if (finfo->symbuf_count >= finfo->symbuf_size)
6114 {
6115 if (! elf_link_flush_output_syms (finfo, bed))
6116 return FALSE;
6117 }
6118
6119 dest = finfo->symbuf + finfo->symbuf_count * bed->s->sizeof_sym;
6120 destshndx = finfo->symshndxbuf;
6121 if (destshndx != NULL)
6122 {
6123 if (bfd_get_symcount (finfo->output_bfd) >= finfo->shndxbuf_size)
6124 {
6125 bfd_size_type amt;
6126
6127 amt = finfo->shndxbuf_size * sizeof (Elf_External_Sym_Shndx);
6128 finfo->symshndxbuf = destshndx = bfd_realloc (destshndx, amt * 2);
6129 if (destshndx == NULL)
6130 return FALSE;
6131 memset ((char *) destshndx + amt, 0, amt);
6132 finfo->shndxbuf_size *= 2;
6133 }
6134 destshndx += bfd_get_symcount (finfo->output_bfd);
6135 }
6136
6137 bed->s->swap_symbol_out (finfo->output_bfd, elfsym, dest, destshndx);
6138 finfo->symbuf_count += 1;
6139 bfd_get_symcount (finfo->output_bfd) += 1;
6140
6141 return TRUE;
6142}
6143
6144/* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
6145 allowing an unsatisfied unversioned symbol in the DSO to match a
6146 versioned symbol that would normally require an explicit version.
6147 We also handle the case that a DSO references a hidden symbol
6148 which may be satisfied by a versioned symbol in another DSO. */
6149
6150static bfd_boolean
6151elf_link_check_versioned_symbol (struct bfd_link_info *info,
6152 const struct elf_backend_data *bed,
6153 struct elf_link_hash_entry *h)
6154{
6155 bfd *abfd;
6156 struct elf_link_loaded_list *loaded;
6157
6158 if (!is_elf_hash_table (info->hash))
6159 return FALSE;
6160
6161 switch (h->root.type)
6162 {
6163 default:
6164 abfd = NULL;
6165 break;
6166
6167 case bfd_link_hash_undefined:
6168 case bfd_link_hash_undefweak:
6169 abfd = h->root.u.undef.abfd;
6170 if ((abfd->flags & DYNAMIC) == 0
e56f61be 6171 || (elf_dyn_lib_class (abfd) & DYN_DT_NEEDED) == 0)
c152c796
AM
6172 return FALSE;
6173 break;
6174
6175 case bfd_link_hash_defined:
6176 case bfd_link_hash_defweak:
6177 abfd = h->root.u.def.section->owner;
6178 break;
6179
6180 case bfd_link_hash_common:
6181 abfd = h->root.u.c.p->section->owner;
6182 break;
6183 }
6184 BFD_ASSERT (abfd != NULL);
6185
6186 for (loaded = elf_hash_table (info)->loaded;
6187 loaded != NULL;
6188 loaded = loaded->next)
6189 {
6190 bfd *input;
6191 Elf_Internal_Shdr *hdr;
6192 bfd_size_type symcount;
6193 bfd_size_type extsymcount;
6194 bfd_size_type extsymoff;
6195 Elf_Internal_Shdr *versymhdr;
6196 Elf_Internal_Sym *isym;
6197 Elf_Internal_Sym *isymend;
6198 Elf_Internal_Sym *isymbuf;
6199 Elf_External_Versym *ever;
6200 Elf_External_Versym *extversym;
6201
6202 input = loaded->abfd;
6203
6204 /* We check each DSO for a possible hidden versioned definition. */
6205 if (input == abfd
6206 || (input->flags & DYNAMIC) == 0
6207 || elf_dynversym (input) == 0)
6208 continue;
6209
6210 hdr = &elf_tdata (input)->dynsymtab_hdr;
6211
6212 symcount = hdr->sh_size / bed->s->sizeof_sym;
6213 if (elf_bad_symtab (input))
6214 {
6215 extsymcount = symcount;
6216 extsymoff = 0;
6217 }
6218 else
6219 {
6220 extsymcount = symcount - hdr->sh_info;
6221 extsymoff = hdr->sh_info;
6222 }
6223
6224 if (extsymcount == 0)
6225 continue;
6226
6227 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
6228 NULL, NULL, NULL);
6229 if (isymbuf == NULL)
6230 return FALSE;
6231
6232 /* Read in any version definitions. */
6233 versymhdr = &elf_tdata (input)->dynversym_hdr;
6234 extversym = bfd_malloc (versymhdr->sh_size);
6235 if (extversym == NULL)
6236 goto error_ret;
6237
6238 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
6239 || (bfd_bread (extversym, versymhdr->sh_size, input)
6240 != versymhdr->sh_size))
6241 {
6242 free (extversym);
6243 error_ret:
6244 free (isymbuf);
6245 return FALSE;
6246 }
6247
6248 ever = extversym + extsymoff;
6249 isymend = isymbuf + extsymcount;
6250 for (isym = isymbuf; isym < isymend; isym++, ever++)
6251 {
6252 const char *name;
6253 Elf_Internal_Versym iver;
6254 unsigned short version_index;
6255
6256 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
6257 || isym->st_shndx == SHN_UNDEF)
6258 continue;
6259
6260 name = bfd_elf_string_from_elf_section (input,
6261 hdr->sh_link,
6262 isym->st_name);
6263 if (strcmp (name, h->root.root.string) != 0)
6264 continue;
6265
6266 _bfd_elf_swap_versym_in (input, ever, &iver);
6267
6268 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
6269 {
6270 /* If we have a non-hidden versioned sym, then it should
6271 have provided a definition for the undefined sym. */
6272 abort ();
6273 }
6274
6275 version_index = iver.vs_vers & VERSYM_VERSION;
6276 if (version_index == 1 || version_index == 2)
6277 {
6278 /* This is the base or first version. We can use it. */
6279 free (extversym);
6280 free (isymbuf);
6281 return TRUE;
6282 }
6283 }
6284
6285 free (extversym);
6286 free (isymbuf);
6287 }
6288
6289 return FALSE;
6290}
6291
6292/* Add an external symbol to the symbol table. This is called from
6293 the hash table traversal routine. When generating a shared object,
6294 we go through the symbol table twice. The first time we output
6295 anything that might have been forced to local scope in a version
6296 script. The second time we output the symbols that are still
6297 global symbols. */
6298
6299static bfd_boolean
6300elf_link_output_extsym (struct elf_link_hash_entry *h, void *data)
6301{
6302 struct elf_outext_info *eoinfo = data;
6303 struct elf_final_link_info *finfo = eoinfo->finfo;
6304 bfd_boolean strip;
6305 Elf_Internal_Sym sym;
6306 asection *input_sec;
6307 const struct elf_backend_data *bed;
6308
6309 if (h->root.type == bfd_link_hash_warning)
6310 {
6311 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6312 if (h->root.type == bfd_link_hash_new)
6313 return TRUE;
6314 }
6315
6316 /* Decide whether to output this symbol in this pass. */
6317 if (eoinfo->localsyms)
6318 {
f5385ebf 6319 if (!h->forced_local)
c152c796
AM
6320 return TRUE;
6321 }
6322 else
6323 {
f5385ebf 6324 if (h->forced_local)
c152c796
AM
6325 return TRUE;
6326 }
6327
6328 bed = get_elf_backend_data (finfo->output_bfd);
6329
6330 /* If we have an undefined symbol reference here then it must have
6331 come from a shared library that is being linked in. (Undefined
6332 references in regular files have already been handled). If we
6333 are reporting errors for this situation then do so now. */
6334 if (h->root.type == bfd_link_hash_undefined
f5385ebf
AM
6335 && h->ref_dynamic
6336 && !h->ref_regular
c152c796
AM
6337 && ! elf_link_check_versioned_symbol (finfo->info, bed, h)
6338 && finfo->info->unresolved_syms_in_shared_libs != RM_IGNORE)
6339 {
6340 if (! ((*finfo->info->callbacks->undefined_symbol)
6341 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
6342 NULL, 0, finfo->info->unresolved_syms_in_shared_libs == RM_GENERATE_ERROR)))
6343 {
6344 eoinfo->failed = TRUE;
6345 return FALSE;
6346 }
6347 }
6348
6349 /* We should also warn if a forced local symbol is referenced from
6350 shared libraries. */
6351 if (! finfo->info->relocatable
6352 && (! finfo->info->shared)
f5385ebf
AM
6353 && h->forced_local
6354 && h->ref_dynamic
6355 && !h->dynamic_def
6356 && !h->dynamic_weak
c152c796
AM
6357 && ! elf_link_check_versioned_symbol (finfo->info, bed, h))
6358 {
6359 (*_bfd_error_handler)
d003868e
AM
6360 (_("%B: %s symbol `%s' in %B is referenced by DSO"),
6361 finfo->output_bfd, h->root.u.def.section->owner,
c152c796
AM
6362 ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
6363 ? "internal"
6364 : ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
d003868e
AM
6365 ? "hidden" : "local",
6366 h->root.root.string);
c152c796
AM
6367 eoinfo->failed = TRUE;
6368 return FALSE;
6369 }
6370
6371 /* We don't want to output symbols that have never been mentioned by
6372 a regular file, or that we have been told to strip. However, if
6373 h->indx is set to -2, the symbol is used by a reloc and we must
6374 output it. */
6375 if (h->indx == -2)
6376 strip = FALSE;
f5385ebf 6377 else if ((h->def_dynamic
77cfaee6
AM
6378 || h->ref_dynamic
6379 || h->root.type == bfd_link_hash_new)
f5385ebf
AM
6380 && !h->def_regular
6381 && !h->ref_regular)
c152c796
AM
6382 strip = TRUE;
6383 else if (finfo->info->strip == strip_all)
6384 strip = TRUE;
6385 else if (finfo->info->strip == strip_some
6386 && bfd_hash_lookup (finfo->info->keep_hash,
6387 h->root.root.string, FALSE, FALSE) == NULL)
6388 strip = TRUE;
6389 else if (finfo->info->strip_discarded
6390 && (h->root.type == bfd_link_hash_defined
6391 || h->root.type == bfd_link_hash_defweak)
6392 && elf_discarded_section (h->root.u.def.section))
6393 strip = TRUE;
6394 else
6395 strip = FALSE;
6396
6397 /* If we're stripping it, and it's not a dynamic symbol, there's
6398 nothing else to do unless it is a forced local symbol. */
6399 if (strip
6400 && h->dynindx == -1
f5385ebf 6401 && !h->forced_local)
c152c796
AM
6402 return TRUE;
6403
6404 sym.st_value = 0;
6405 sym.st_size = h->size;
6406 sym.st_other = h->other;
f5385ebf 6407 if (h->forced_local)
c152c796
AM
6408 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
6409 else if (h->root.type == bfd_link_hash_undefweak
6410 || h->root.type == bfd_link_hash_defweak)
6411 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
6412 else
6413 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
6414
6415 switch (h->root.type)
6416 {
6417 default:
6418 case bfd_link_hash_new:
6419 case bfd_link_hash_warning:
6420 abort ();
6421 return FALSE;
6422
6423 case bfd_link_hash_undefined:
6424 case bfd_link_hash_undefweak:
6425 input_sec = bfd_und_section_ptr;
6426 sym.st_shndx = SHN_UNDEF;
6427 break;
6428
6429 case bfd_link_hash_defined:
6430 case bfd_link_hash_defweak:
6431 {
6432 input_sec = h->root.u.def.section;
6433 if (input_sec->output_section != NULL)
6434 {
6435 sym.st_shndx =
6436 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
6437 input_sec->output_section);
6438 if (sym.st_shndx == SHN_BAD)
6439 {
6440 (*_bfd_error_handler)
d003868e
AM
6441 (_("%B: could not find output section %A for input section %A"),
6442 finfo->output_bfd, input_sec->output_section, input_sec);
c152c796
AM
6443 eoinfo->failed = TRUE;
6444 return FALSE;
6445 }
6446
6447 /* ELF symbols in relocatable files are section relative,
6448 but in nonrelocatable files they are virtual
6449 addresses. */
6450 sym.st_value = h->root.u.def.value + input_sec->output_offset;
6451 if (! finfo->info->relocatable)
6452 {
6453 sym.st_value += input_sec->output_section->vma;
6454 if (h->type == STT_TLS)
6455 {
6456 /* STT_TLS symbols are relative to PT_TLS segment
6457 base. */
6458 BFD_ASSERT (elf_hash_table (finfo->info)->tls_sec != NULL);
6459 sym.st_value -= elf_hash_table (finfo->info)->tls_sec->vma;
6460 }
6461 }
6462 }
6463 else
6464 {
6465 BFD_ASSERT (input_sec->owner == NULL
6466 || (input_sec->owner->flags & DYNAMIC) != 0);
6467 sym.st_shndx = SHN_UNDEF;
6468 input_sec = bfd_und_section_ptr;
6469 }
6470 }
6471 break;
6472
6473 case bfd_link_hash_common:
6474 input_sec = h->root.u.c.p->section;
6475 sym.st_shndx = SHN_COMMON;
6476 sym.st_value = 1 << h->root.u.c.p->alignment_power;
6477 break;
6478
6479 case bfd_link_hash_indirect:
6480 /* These symbols are created by symbol versioning. They point
6481 to the decorated version of the name. For example, if the
6482 symbol foo@@GNU_1.2 is the default, which should be used when
6483 foo is used with no version, then we add an indirect symbol
6484 foo which points to foo@@GNU_1.2. We ignore these symbols,
6485 since the indirected symbol is already in the hash table. */
6486 return TRUE;
6487 }
6488
6489 /* Give the processor backend a chance to tweak the symbol value,
6490 and also to finish up anything that needs to be done for this
6491 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
6492 forced local syms when non-shared is due to a historical quirk. */
6493 if ((h->dynindx != -1
f5385ebf 6494 || h->forced_local)
c152c796
AM
6495 && ((finfo->info->shared
6496 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
6497 || h->root.type != bfd_link_hash_undefweak))
f5385ebf 6498 || !h->forced_local)
c152c796
AM
6499 && elf_hash_table (finfo->info)->dynamic_sections_created)
6500 {
6501 if (! ((*bed->elf_backend_finish_dynamic_symbol)
6502 (finfo->output_bfd, finfo->info, h, &sym)))
6503 {
6504 eoinfo->failed = TRUE;
6505 return FALSE;
6506 }
6507 }
6508
6509 /* If we are marking the symbol as undefined, and there are no
6510 non-weak references to this symbol from a regular object, then
6511 mark the symbol as weak undefined; if there are non-weak
6512 references, mark the symbol as strong. We can't do this earlier,
6513 because it might not be marked as undefined until the
6514 finish_dynamic_symbol routine gets through with it. */
6515 if (sym.st_shndx == SHN_UNDEF
f5385ebf 6516 && h->ref_regular
c152c796
AM
6517 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
6518 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
6519 {
6520 int bindtype;
6521
f5385ebf 6522 if (h->ref_regular_nonweak)
c152c796
AM
6523 bindtype = STB_GLOBAL;
6524 else
6525 bindtype = STB_WEAK;
6526 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
6527 }
6528
6529 /* If a non-weak symbol with non-default visibility is not defined
6530 locally, it is a fatal error. */
6531 if (! finfo->info->relocatable
6532 && ELF_ST_VISIBILITY (sym.st_other) != STV_DEFAULT
6533 && ELF_ST_BIND (sym.st_info) != STB_WEAK
6534 && h->root.type == bfd_link_hash_undefined
f5385ebf 6535 && !h->def_regular)
c152c796
AM
6536 {
6537 (*_bfd_error_handler)
d003868e
AM
6538 (_("%B: %s symbol `%s' isn't defined"),
6539 finfo->output_bfd,
6540 ELF_ST_VISIBILITY (sym.st_other) == STV_PROTECTED
6541 ? "protected"
6542 : ELF_ST_VISIBILITY (sym.st_other) == STV_INTERNAL
6543 ? "internal" : "hidden",
6544 h->root.root.string);
c152c796
AM
6545 eoinfo->failed = TRUE;
6546 return FALSE;
6547 }
6548
6549 /* If this symbol should be put in the .dynsym section, then put it
6550 there now. We already know the symbol index. We also fill in
6551 the entry in the .hash section. */
6552 if (h->dynindx != -1
6553 && elf_hash_table (finfo->info)->dynamic_sections_created)
6554 {
6555 size_t bucketcount;
6556 size_t bucket;
6557 size_t hash_entry_size;
6558 bfd_byte *bucketpos;
6559 bfd_vma chain;
6560 bfd_byte *esym;
6561
6562 sym.st_name = h->dynstr_index;
6563 esym = finfo->dynsym_sec->contents + h->dynindx * bed->s->sizeof_sym;
6564 bed->s->swap_symbol_out (finfo->output_bfd, &sym, esym, 0);
6565
6566 bucketcount = elf_hash_table (finfo->info)->bucketcount;
f6e332e6 6567 bucket = h->u.elf_hash_value % bucketcount;
c152c796
AM
6568 hash_entry_size
6569 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
6570 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
6571 + (bucket + 2) * hash_entry_size);
6572 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
6573 bfd_put (8 * hash_entry_size, finfo->output_bfd, h->dynindx, bucketpos);
6574 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
6575 ((bfd_byte *) finfo->hash_sec->contents
6576 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
6577
6578 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
6579 {
6580 Elf_Internal_Versym iversym;
6581 Elf_External_Versym *eversym;
6582
f5385ebf 6583 if (!h->def_regular)
c152c796
AM
6584 {
6585 if (h->verinfo.verdef == NULL)
6586 iversym.vs_vers = 0;
6587 else
6588 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
6589 }
6590 else
6591 {
6592 if (h->verinfo.vertree == NULL)
6593 iversym.vs_vers = 1;
6594 else
6595 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
3e3b46e5
PB
6596 if (finfo->info->create_default_symver)
6597 iversym.vs_vers++;
c152c796
AM
6598 }
6599
f5385ebf 6600 if (h->hidden)
c152c796
AM
6601 iversym.vs_vers |= VERSYM_HIDDEN;
6602
6603 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
6604 eversym += h->dynindx;
6605 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
6606 }
6607 }
6608
6609 /* If we're stripping it, then it was just a dynamic symbol, and
6610 there's nothing else to do. */
6611 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
6612 return TRUE;
6613
6614 h->indx = bfd_get_symcount (finfo->output_bfd);
6615
6616 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec, h))
6617 {
6618 eoinfo->failed = TRUE;
6619 return FALSE;
6620 }
6621
6622 return TRUE;
6623}
6624
cdd3575c
AM
6625/* Return TRUE if special handling is done for relocs in SEC against
6626 symbols defined in discarded sections. */
6627
c152c796
AM
6628static bfd_boolean
6629elf_section_ignore_discarded_relocs (asection *sec)
6630{
6631 const struct elf_backend_data *bed;
6632
cdd3575c
AM
6633 switch (sec->sec_info_type)
6634 {
6635 case ELF_INFO_TYPE_STABS:
6636 case ELF_INFO_TYPE_EH_FRAME:
6637 return TRUE;
6638 default:
6639 break;
6640 }
c152c796
AM
6641
6642 bed = get_elf_backend_data (sec->owner);
6643 if (bed->elf_backend_ignore_discarded_relocs != NULL
6644 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
6645 return TRUE;
6646
6647 return FALSE;
6648}
6649
9e66c942
AM
6650enum action_discarded
6651 {
6652 COMPLAIN = 1,
6653 PRETEND = 2
6654 };
6655
6656/* Return a mask saying how ld should treat relocations in SEC against
6657 symbols defined in discarded sections. If this function returns
6658 COMPLAIN set, ld will issue a warning message. If this function
6659 returns PRETEND set, and the discarded section was link-once and the
6660 same size as the kept link-once section, ld will pretend that the
6661 symbol was actually defined in the kept section. Otherwise ld will
6662 zero the reloc (at least that is the intent, but some cooperation by
6663 the target dependent code is needed, particularly for REL targets). */
6664
6665static unsigned int
6666elf_action_discarded (asection *sec)
cdd3575c 6667{
9e66c942
AM
6668 if (sec->flags & SEC_DEBUGGING)
6669 return PRETEND;
cdd3575c
AM
6670
6671 if (strcmp (".eh_frame", sec->name) == 0)
9e66c942 6672 return 0;
cdd3575c
AM
6673
6674 if (strcmp (".gcc_except_table", sec->name) == 0)
9e66c942 6675 return 0;
cdd3575c 6676
27b56da8 6677 if (strcmp (".PARISC.unwind", sec->name) == 0)
9e66c942 6678 return 0;
327c1315
AM
6679
6680 if (strcmp (".fixup", sec->name) == 0)
9e66c942 6681 return 0;
27b56da8 6682
9e66c942 6683 return COMPLAIN | PRETEND;
cdd3575c
AM
6684}
6685
3d7f7666
L
6686/* Find a match between a section and a member of a section group. */
6687
6688static asection *
6689match_group_member (asection *sec, asection *group)
6690{
6691 asection *first = elf_next_in_group (group);
6692 asection *s = first;
6693
6694 while (s != NULL)
6695 {
6696 if (bfd_elf_match_symbols_in_sections (s, sec))
6697 return s;
6698
6699 if (s == first)
6700 break;
6701 }
6702
6703 return NULL;
6704}
6705
01b3c8ab
L
6706/* Check if the kept section of a discarded section SEC can be used
6707 to replace it. Return the replacement if it is OK. Otherwise return
6708 NULL. */
6709
6710asection *
6711_bfd_elf_check_kept_section (asection *sec)
6712{
6713 asection *kept;
6714
6715 kept = sec->kept_section;
6716 if (kept != NULL)
6717 {
6718 if (elf_sec_group (sec) != NULL)
6719 kept = match_group_member (sec, kept);
6720 if (kept != NULL && sec->size != kept->size)
6721 kept = NULL;
6722 }
6723 return kept;
6724}
6725
c152c796
AM
6726/* Link an input file into the linker output file. This function
6727 handles all the sections and relocations of the input file at once.
6728 This is so that we only have to read the local symbols once, and
6729 don't have to keep them in memory. */
6730
6731static bfd_boolean
6732elf_link_input_bfd (struct elf_final_link_info *finfo, bfd *input_bfd)
6733{
6734 bfd_boolean (*relocate_section)
6735 (bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
6736 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **);
6737 bfd *output_bfd;
6738 Elf_Internal_Shdr *symtab_hdr;
6739 size_t locsymcount;
6740 size_t extsymoff;
6741 Elf_Internal_Sym *isymbuf;
6742 Elf_Internal_Sym *isym;
6743 Elf_Internal_Sym *isymend;
6744 long *pindex;
6745 asection **ppsection;
6746 asection *o;
6747 const struct elf_backend_data *bed;
6748 bfd_boolean emit_relocs;
6749 struct elf_link_hash_entry **sym_hashes;
6750
6751 output_bfd = finfo->output_bfd;
6752 bed = get_elf_backend_data (output_bfd);
6753 relocate_section = bed->elf_backend_relocate_section;
6754
6755 /* If this is a dynamic object, we don't want to do anything here:
6756 we don't want the local symbols, and we don't want the section
6757 contents. */
6758 if ((input_bfd->flags & DYNAMIC) != 0)
6759 return TRUE;
6760
6761 emit_relocs = (finfo->info->relocatable
6762 || finfo->info->emitrelocations
6763 || bed->elf_backend_emit_relocs);
6764
6765 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6766 if (elf_bad_symtab (input_bfd))
6767 {
6768 locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
6769 extsymoff = 0;
6770 }
6771 else
6772 {
6773 locsymcount = symtab_hdr->sh_info;
6774 extsymoff = symtab_hdr->sh_info;
6775 }
6776
6777 /* Read the local symbols. */
6778 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6779 if (isymbuf == NULL && locsymcount != 0)
6780 {
6781 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6782 finfo->internal_syms,
6783 finfo->external_syms,
6784 finfo->locsym_shndx);
6785 if (isymbuf == NULL)
6786 return FALSE;
6787 }
6788
6789 /* Find local symbol sections and adjust values of symbols in
6790 SEC_MERGE sections. Write out those local symbols we know are
6791 going into the output file. */
6792 isymend = isymbuf + locsymcount;
6793 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
6794 isym < isymend;
6795 isym++, pindex++, ppsection++)
6796 {
6797 asection *isec;
6798 const char *name;
6799 Elf_Internal_Sym osym;
6800
6801 *pindex = -1;
6802
6803 if (elf_bad_symtab (input_bfd))
6804 {
6805 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
6806 {
6807 *ppsection = NULL;
6808 continue;
6809 }
6810 }
6811
6812 if (isym->st_shndx == SHN_UNDEF)
6813 isec = bfd_und_section_ptr;
6814 else if (isym->st_shndx < SHN_LORESERVE
6815 || isym->st_shndx > SHN_HIRESERVE)
6816 {
6817 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
6818 if (isec
6819 && isec->sec_info_type == ELF_INFO_TYPE_MERGE
6820 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
6821 isym->st_value =
6822 _bfd_merged_section_offset (output_bfd, &isec,
6823 elf_section_data (isec)->sec_info,
753731ee 6824 isym->st_value);
c152c796
AM
6825 }
6826 else if (isym->st_shndx == SHN_ABS)
6827 isec = bfd_abs_section_ptr;
6828 else if (isym->st_shndx == SHN_COMMON)
6829 isec = bfd_com_section_ptr;
6830 else
6831 {
6832 /* Who knows? */
6833 isec = NULL;
6834 }
6835
6836 *ppsection = isec;
6837
6838 /* Don't output the first, undefined, symbol. */
6839 if (ppsection == finfo->sections)
6840 continue;
6841
6842 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
6843 {
6844 /* We never output section symbols. Instead, we use the
6845 section symbol of the corresponding section in the output
6846 file. */
6847 continue;
6848 }
6849
6850 /* If we are stripping all symbols, we don't want to output this
6851 one. */
6852 if (finfo->info->strip == strip_all)
6853 continue;
6854
6855 /* If we are discarding all local symbols, we don't want to
6856 output this one. If we are generating a relocatable output
6857 file, then some of the local symbols may be required by
6858 relocs; we output them below as we discover that they are
6859 needed. */
6860 if (finfo->info->discard == discard_all)
6861 continue;
6862
6863 /* If this symbol is defined in a section which we are
6864 discarding, we don't need to keep it, but note that
6865 linker_mark is only reliable for sections that have contents.
6866 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
6867 as well as linker_mark. */
6868 if ((isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
ccf5f610
PB
6869 && (isec == NULL
6870 || (! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
c152c796
AM
6871 || (! finfo->info->relocatable
6872 && (isec->flags & SEC_EXCLUDE) != 0)))
6873 continue;
6874
e75a280b
L
6875 /* If the section is not in the output BFD's section list, it is not
6876 being output. */
6877 if (bfd_section_removed_from_list (output_bfd, isec->output_section))
6878 continue;
6879
c152c796
AM
6880 /* Get the name of the symbol. */
6881 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
6882 isym->st_name);
6883 if (name == NULL)
6884 return FALSE;
6885
6886 /* See if we are discarding symbols with this name. */
6887 if ((finfo->info->strip == strip_some
6888 && (bfd_hash_lookup (finfo->info->keep_hash, name, FALSE, FALSE)
6889 == NULL))
6890 || (((finfo->info->discard == discard_sec_merge
6891 && (isec->flags & SEC_MERGE) && ! finfo->info->relocatable)
6892 || finfo->info->discard == discard_l)
6893 && bfd_is_local_label_name (input_bfd, name)))
6894 continue;
6895
6896 /* If we get here, we are going to output this symbol. */
6897
6898 osym = *isym;
6899
6900 /* Adjust the section index for the output file. */
6901 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
6902 isec->output_section);
6903 if (osym.st_shndx == SHN_BAD)
6904 return FALSE;
6905
6906 *pindex = bfd_get_symcount (output_bfd);
6907
6908 /* ELF symbols in relocatable files are section relative, but
6909 in executable files they are virtual addresses. Note that
6910 this code assumes that all ELF sections have an associated
6911 BFD section with a reasonable value for output_offset; below
6912 we assume that they also have a reasonable value for
6913 output_section. Any special sections must be set up to meet
6914 these requirements. */
6915 osym.st_value += isec->output_offset;
6916 if (! finfo->info->relocatable)
6917 {
6918 osym.st_value += isec->output_section->vma;
6919 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
6920 {
6921 /* STT_TLS symbols are relative to PT_TLS segment base. */
6922 BFD_ASSERT (elf_hash_table (finfo->info)->tls_sec != NULL);
6923 osym.st_value -= elf_hash_table (finfo->info)->tls_sec->vma;
6924 }
6925 }
6926
6927 if (! elf_link_output_sym (finfo, name, &osym, isec, NULL))
6928 return FALSE;
6929 }
6930
6931 /* Relocate the contents of each section. */
6932 sym_hashes = elf_sym_hashes (input_bfd);
6933 for (o = input_bfd->sections; o != NULL; o = o->next)
6934 {
6935 bfd_byte *contents;
6936
6937 if (! o->linker_mark)
6938 {
6939 /* This section was omitted from the link. */
6940 continue;
6941 }
6942
6943 if ((o->flags & SEC_HAS_CONTENTS) == 0
eea6121a 6944 || (o->size == 0 && (o->flags & SEC_RELOC) == 0))
c152c796
AM
6945 continue;
6946
6947 if ((o->flags & SEC_LINKER_CREATED) != 0)
6948 {
6949 /* Section was created by _bfd_elf_link_create_dynamic_sections
6950 or somesuch. */
6951 continue;
6952 }
6953
6954 /* Get the contents of the section. They have been cached by a
6955 relaxation routine. Note that o is a section in an input
6956 file, so the contents field will not have been set by any of
6957 the routines which work on output files. */
6958 if (elf_section_data (o)->this_hdr.contents != NULL)
6959 contents = elf_section_data (o)->this_hdr.contents;
6960 else
6961 {
eea6121a
AM
6962 bfd_size_type amt = o->rawsize ? o->rawsize : o->size;
6963
c152c796 6964 contents = finfo->contents;
eea6121a 6965 if (! bfd_get_section_contents (input_bfd, o, contents, 0, amt))
c152c796
AM
6966 return FALSE;
6967 }
6968
6969 if ((o->flags & SEC_RELOC) != 0)
6970 {
6971 Elf_Internal_Rela *internal_relocs;
6972 bfd_vma r_type_mask;
6973 int r_sym_shift;
6974
6975 /* Get the swapped relocs. */
6976 internal_relocs
6977 = _bfd_elf_link_read_relocs (input_bfd, o, finfo->external_relocs,
6978 finfo->internal_relocs, FALSE);
6979 if (internal_relocs == NULL
6980 && o->reloc_count > 0)
6981 return FALSE;
6982
6983 if (bed->s->arch_size == 32)
6984 {
6985 r_type_mask = 0xff;
6986 r_sym_shift = 8;
6987 }
6988 else
6989 {
6990 r_type_mask = 0xffffffff;
6991 r_sym_shift = 32;
6992 }
6993
6994 /* Run through the relocs looking for any against symbols
6995 from discarded sections and section symbols from
6996 removed link-once sections. Complain about relocs
6997 against discarded sections. Zero relocs against removed
6998 link-once sections. Preserve debug information as much
6999 as we can. */
7000 if (!elf_section_ignore_discarded_relocs (o))
7001 {
7002 Elf_Internal_Rela *rel, *relend;
9e66c942 7003 unsigned int action = elf_action_discarded (o);
c152c796
AM
7004
7005 rel = internal_relocs;
7006 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
7007 for ( ; rel < relend; rel++)
7008 {
7009 unsigned long r_symndx = rel->r_info >> r_sym_shift;
cdd3575c
AM
7010 asection **ps, *sec;
7011 struct elf_link_hash_entry *h = NULL;
7012 const char *sym_name;
c152c796 7013
ee75fd95
AM
7014 if (r_symndx == STN_UNDEF)
7015 continue;
7016
c152c796
AM
7017 if (r_symndx >= locsymcount
7018 || (elf_bad_symtab (input_bfd)
7019 && finfo->sections[r_symndx] == NULL))
7020 {
c152c796
AM
7021 h = sym_hashes[r_symndx - extsymoff];
7022 while (h->root.type == bfd_link_hash_indirect
7023 || h->root.type == bfd_link_hash_warning)
7024 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7025
cdd3575c
AM
7026 if (h->root.type != bfd_link_hash_defined
7027 && h->root.type != bfd_link_hash_defweak)
7028 continue;
7029
7030 ps = &h->root.u.def.section;
7031 sym_name = h->root.root.string;
c152c796
AM
7032 }
7033 else
7034 {
cdd3575c
AM
7035 Elf_Internal_Sym *sym = isymbuf + r_symndx;
7036 ps = &finfo->sections[r_symndx];
be8dd2ca 7037 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym);
cdd3575c 7038 }
c152c796 7039
cdd3575c
AM
7040 /* Complain if the definition comes from a
7041 discarded section. */
7042 if ((sec = *ps) != NULL && elf_discarded_section (sec))
7043 {
87e5235d 7044 BFD_ASSERT (r_symndx != 0);
9e66c942 7045 if (action & COMPLAIN)
cdd3575c 7046 {
d003868e
AM
7047 (*_bfd_error_handler)
7048 (_("`%s' referenced in section `%A' of %B: "
c93625e2 7049 "defined in discarded section `%A' of %B"),
d003868e 7050 o, input_bfd, sec, sec->owner, sym_name);
6d633fd2
L
7051 bfd_set_error (bfd_error_bad_value);
7052 return FALSE;
cdd3575c
AM
7053 }
7054
87e5235d
AM
7055 /* Try to do the best we can to support buggy old
7056 versions of gcc. If we've warned, or this is
7057 debugging info, pretend that the symbol is
7058 really defined in the kept linkonce section.
7059 FIXME: This is quite broken. Modifying the
7060 symbol here means we will be changing all later
7061 uses of the symbol, not just in this section.
7062 The only thing that makes this half reasonable
7063 is that we warn in non-debug sections, and
7064 debug sections tend to come after other
7065 sections. */
01b3c8ab 7066 if (action & PRETEND)
87e5235d 7067 {
01b3c8ab
L
7068 asection *kept;
7069
7070 kept = _bfd_elf_check_kept_section (sec);
7071 if (kept != NULL)
87e5235d
AM
7072 {
7073 *ps = kept;
7074 continue;
7075 }
7076 }
7077
cdd3575c
AM
7078 /* Remove the symbol reference from the reloc, but
7079 don't kill the reloc completely. This is so that
7080 a zero value will be written into the section,
7081 which may have non-zero contents put there by the
7082 assembler. Zero in things like an eh_frame fde
7083 pc_begin allows stack unwinders to recognize the
7084 fde as bogus. */
7085 rel->r_info &= r_type_mask;
7086 rel->r_addend = 0;
c152c796
AM
7087 }
7088 }
7089 }
7090
7091 /* Relocate the section by invoking a back end routine.
7092
7093 The back end routine is responsible for adjusting the
7094 section contents as necessary, and (if using Rela relocs
7095 and generating a relocatable output file) adjusting the
7096 reloc addend as necessary.
7097
7098 The back end routine does not have to worry about setting
7099 the reloc address or the reloc symbol index.
7100
7101 The back end routine is given a pointer to the swapped in
7102 internal symbols, and can access the hash table entries
7103 for the external symbols via elf_sym_hashes (input_bfd).
7104
7105 When generating relocatable output, the back end routine
7106 must handle STB_LOCAL/STT_SECTION symbols specially. The
7107 output symbol is going to be a section symbol
7108 corresponding to the output section, which will require
7109 the addend to be adjusted. */
7110
7111 if (! (*relocate_section) (output_bfd, finfo->info,
7112 input_bfd, o, contents,
7113 internal_relocs,
7114 isymbuf,
7115 finfo->sections))
7116 return FALSE;
7117
7118 if (emit_relocs)
7119 {
7120 Elf_Internal_Rela *irela;
7121 Elf_Internal_Rela *irelaend;
7122 bfd_vma last_offset;
7123 struct elf_link_hash_entry **rel_hash;
7124 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
7125 unsigned int next_erel;
7126 bfd_boolean (*reloc_emitter)
7127 (bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *);
7128 bfd_boolean rela_normal;
7129
7130 input_rel_hdr = &elf_section_data (o)->rel_hdr;
7131 rela_normal = (bed->rela_normal
7132 && (input_rel_hdr->sh_entsize
7133 == bed->s->sizeof_rela));
7134
7135 /* Adjust the reloc addresses and symbol indices. */
7136
7137 irela = internal_relocs;
7138 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
7139 rel_hash = (elf_section_data (o->output_section)->rel_hashes
7140 + elf_section_data (o->output_section)->rel_count
7141 + elf_section_data (o->output_section)->rel_count2);
7142 last_offset = o->output_offset;
7143 if (!finfo->info->relocatable)
7144 last_offset += o->output_section->vma;
7145 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
7146 {
7147 unsigned long r_symndx;
7148 asection *sec;
7149 Elf_Internal_Sym sym;
7150
7151 if (next_erel == bed->s->int_rels_per_ext_rel)
7152 {
7153 rel_hash++;
7154 next_erel = 0;
7155 }
7156
7157 irela->r_offset = _bfd_elf_section_offset (output_bfd,
7158 finfo->info, o,
7159 irela->r_offset);
7160 if (irela->r_offset >= (bfd_vma) -2)
7161 {
7162 /* This is a reloc for a deleted entry or somesuch.
7163 Turn it into an R_*_NONE reloc, at the same
7164 offset as the last reloc. elf_eh_frame.c and
7165 elf_bfd_discard_info rely on reloc offsets
7166 being ordered. */
7167 irela->r_offset = last_offset;
7168 irela->r_info = 0;
7169 irela->r_addend = 0;
7170 continue;
7171 }
7172
7173 irela->r_offset += o->output_offset;
7174
7175 /* Relocs in an executable have to be virtual addresses. */
7176 if (!finfo->info->relocatable)
7177 irela->r_offset += o->output_section->vma;
7178
7179 last_offset = irela->r_offset;
7180
7181 r_symndx = irela->r_info >> r_sym_shift;
7182 if (r_symndx == STN_UNDEF)
7183 continue;
7184
7185 if (r_symndx >= locsymcount
7186 || (elf_bad_symtab (input_bfd)
7187 && finfo->sections[r_symndx] == NULL))
7188 {
7189 struct elf_link_hash_entry *rh;
7190 unsigned long indx;
7191
7192 /* This is a reloc against a global symbol. We
7193 have not yet output all the local symbols, so
7194 we do not know the symbol index of any global
7195 symbol. We set the rel_hash entry for this
7196 reloc to point to the global hash table entry
7197 for this symbol. The symbol index is then
ee75fd95 7198 set at the end of bfd_elf_final_link. */
c152c796
AM
7199 indx = r_symndx - extsymoff;
7200 rh = elf_sym_hashes (input_bfd)[indx];
7201 while (rh->root.type == bfd_link_hash_indirect
7202 || rh->root.type == bfd_link_hash_warning)
7203 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
7204
7205 /* Setting the index to -2 tells
7206 elf_link_output_extsym that this symbol is
7207 used by a reloc. */
7208 BFD_ASSERT (rh->indx < 0);
7209 rh->indx = -2;
7210
7211 *rel_hash = rh;
7212
7213 continue;
7214 }
7215
7216 /* This is a reloc against a local symbol. */
7217
7218 *rel_hash = NULL;
7219 sym = isymbuf[r_symndx];
7220 sec = finfo->sections[r_symndx];
7221 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
7222 {
7223 /* I suppose the backend ought to fill in the
7224 section of any STT_SECTION symbol against a
6a8d1586
AM
7225 processor specific section. */
7226 r_symndx = 0;
7227 if (bfd_is_abs_section (sec))
7228 ;
c152c796
AM
7229 else if (sec == NULL || sec->owner == NULL)
7230 {
7231 bfd_set_error (bfd_error_bad_value);
7232 return FALSE;
7233 }
7234 else
7235 {
6a8d1586
AM
7236 asection *osec = sec->output_section;
7237
7238 /* If we have discarded a section, the output
7239 section will be the absolute section. In
7240 case of discarded link-once and discarded
7241 SEC_MERGE sections, use the kept section. */
7242 if (bfd_is_abs_section (osec)
7243 && sec->kept_section != NULL
7244 && sec->kept_section->output_section != NULL)
7245 {
7246 osec = sec->kept_section->output_section;
7247 irela->r_addend -= osec->vma;
7248 }
7249
7250 if (!bfd_is_abs_section (osec))
7251 {
7252 r_symndx = osec->target_index;
7253 BFD_ASSERT (r_symndx != 0);
7254 }
c152c796
AM
7255 }
7256
7257 /* Adjust the addend according to where the
7258 section winds up in the output section. */
7259 if (rela_normal)
7260 irela->r_addend += sec->output_offset;
7261 }
7262 else
7263 {
7264 if (finfo->indices[r_symndx] == -1)
7265 {
7266 unsigned long shlink;
7267 const char *name;
7268 asection *osec;
7269
7270 if (finfo->info->strip == strip_all)
7271 {
7272 /* You can't do ld -r -s. */
7273 bfd_set_error (bfd_error_invalid_operation);
7274 return FALSE;
7275 }
7276
7277 /* This symbol was skipped earlier, but
7278 since it is needed by a reloc, we
7279 must output it now. */
7280 shlink = symtab_hdr->sh_link;
7281 name = (bfd_elf_string_from_elf_section
7282 (input_bfd, shlink, sym.st_name));
7283 if (name == NULL)
7284 return FALSE;
7285
7286 osec = sec->output_section;
7287 sym.st_shndx =
7288 _bfd_elf_section_from_bfd_section (output_bfd,
7289 osec);
7290 if (sym.st_shndx == SHN_BAD)
7291 return FALSE;
7292
7293 sym.st_value += sec->output_offset;
7294 if (! finfo->info->relocatable)
7295 {
7296 sym.st_value += osec->vma;
7297 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
7298 {
7299 /* STT_TLS symbols are relative to PT_TLS
7300 segment base. */
7301 BFD_ASSERT (elf_hash_table (finfo->info)
7302 ->tls_sec != NULL);
7303 sym.st_value -= (elf_hash_table (finfo->info)
7304 ->tls_sec->vma);
7305 }
7306 }
7307
7308 finfo->indices[r_symndx]
7309 = bfd_get_symcount (output_bfd);
7310
7311 if (! elf_link_output_sym (finfo, name, &sym, sec,
7312 NULL))
7313 return FALSE;
7314 }
7315
7316 r_symndx = finfo->indices[r_symndx];
7317 }
7318
7319 irela->r_info = ((bfd_vma) r_symndx << r_sym_shift
7320 | (irela->r_info & r_type_mask));
7321 }
7322
7323 /* Swap out the relocs. */
7324 if (bed->elf_backend_emit_relocs
7325 && !(finfo->info->relocatable
7326 || finfo->info->emitrelocations))
7327 reloc_emitter = bed->elf_backend_emit_relocs;
7328 else
7329 reloc_emitter = _bfd_elf_link_output_relocs;
7330
7331 if (input_rel_hdr->sh_size != 0
7332 && ! (*reloc_emitter) (output_bfd, o, input_rel_hdr,
7333 internal_relocs))
7334 return FALSE;
7335
7336 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
7337 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
7338 {
7339 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
7340 * bed->s->int_rels_per_ext_rel);
7341 if (! (*reloc_emitter) (output_bfd, o, input_rel_hdr2,
7342 internal_relocs))
7343 return FALSE;
7344 }
7345 }
7346 }
7347
7348 /* Write out the modified section contents. */
7349 if (bed->elf_backend_write_section
7350 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
7351 {
7352 /* Section written out. */
7353 }
7354 else switch (o->sec_info_type)
7355 {
7356 case ELF_INFO_TYPE_STABS:
7357 if (! (_bfd_write_section_stabs
7358 (output_bfd,
7359 &elf_hash_table (finfo->info)->stab_info,
7360 o, &elf_section_data (o)->sec_info, contents)))
7361 return FALSE;
7362 break;
7363 case ELF_INFO_TYPE_MERGE:
7364 if (! _bfd_write_merged_section (output_bfd, o,
7365 elf_section_data (o)->sec_info))
7366 return FALSE;
7367 break;
7368 case ELF_INFO_TYPE_EH_FRAME:
7369 {
7370 if (! _bfd_elf_write_section_eh_frame (output_bfd, finfo->info,
7371 o, contents))
7372 return FALSE;
7373 }
7374 break;
7375 default:
7376 {
c152c796
AM
7377 if (! (o->flags & SEC_EXCLUDE)
7378 && ! bfd_set_section_contents (output_bfd, o->output_section,
7379 contents,
7380 (file_ptr) o->output_offset,
eea6121a 7381 o->size))
c152c796
AM
7382 return FALSE;
7383 }
7384 break;
7385 }
7386 }
7387
7388 return TRUE;
7389}
7390
7391/* Generate a reloc when linking an ELF file. This is a reloc
7392 requested by the linker, and does come from any input file. This
7393 is used to build constructor and destructor tables when linking
7394 with -Ur. */
7395
7396static bfd_boolean
7397elf_reloc_link_order (bfd *output_bfd,
7398 struct bfd_link_info *info,
7399 asection *output_section,
7400 struct bfd_link_order *link_order)
7401{
7402 reloc_howto_type *howto;
7403 long indx;
7404 bfd_vma offset;
7405 bfd_vma addend;
7406 struct elf_link_hash_entry **rel_hash_ptr;
7407 Elf_Internal_Shdr *rel_hdr;
7408 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7409 Elf_Internal_Rela irel[MAX_INT_RELS_PER_EXT_REL];
7410 bfd_byte *erel;
7411 unsigned int i;
7412
7413 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
7414 if (howto == NULL)
7415 {
7416 bfd_set_error (bfd_error_bad_value);
7417 return FALSE;
7418 }
7419
7420 addend = link_order->u.reloc.p->addend;
7421
7422 /* Figure out the symbol index. */
7423 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
7424 + elf_section_data (output_section)->rel_count
7425 + elf_section_data (output_section)->rel_count2);
7426 if (link_order->type == bfd_section_reloc_link_order)
7427 {
7428 indx = link_order->u.reloc.p->u.section->target_index;
7429 BFD_ASSERT (indx != 0);
7430 *rel_hash_ptr = NULL;
7431 }
7432 else
7433 {
7434 struct elf_link_hash_entry *h;
7435
7436 /* Treat a reloc against a defined symbol as though it were
7437 actually against the section. */
7438 h = ((struct elf_link_hash_entry *)
7439 bfd_wrapped_link_hash_lookup (output_bfd, info,
7440 link_order->u.reloc.p->u.name,
7441 FALSE, FALSE, TRUE));
7442 if (h != NULL
7443 && (h->root.type == bfd_link_hash_defined
7444 || h->root.type == bfd_link_hash_defweak))
7445 {
7446 asection *section;
7447
7448 section = h->root.u.def.section;
7449 indx = section->output_section->target_index;
7450 *rel_hash_ptr = NULL;
7451 /* It seems that we ought to add the symbol value to the
7452 addend here, but in practice it has already been added
7453 because it was passed to constructor_callback. */
7454 addend += section->output_section->vma + section->output_offset;
7455 }
7456 else if (h != NULL)
7457 {
7458 /* Setting the index to -2 tells elf_link_output_extsym that
7459 this symbol is used by a reloc. */
7460 h->indx = -2;
7461 *rel_hash_ptr = h;
7462 indx = 0;
7463 }
7464 else
7465 {
7466 if (! ((*info->callbacks->unattached_reloc)
7467 (info, link_order->u.reloc.p->u.name, NULL, NULL, 0)))
7468 return FALSE;
7469 indx = 0;
7470 }
7471 }
7472
7473 /* If this is an inplace reloc, we must write the addend into the
7474 object file. */
7475 if (howto->partial_inplace && addend != 0)
7476 {
7477 bfd_size_type size;
7478 bfd_reloc_status_type rstat;
7479 bfd_byte *buf;
7480 bfd_boolean ok;
7481 const char *sym_name;
7482
7483 size = bfd_get_reloc_size (howto);
7484 buf = bfd_zmalloc (size);
7485 if (buf == NULL)
7486 return FALSE;
7487 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
7488 switch (rstat)
7489 {
7490 case bfd_reloc_ok:
7491 break;
7492
7493 default:
7494 case bfd_reloc_outofrange:
7495 abort ();
7496
7497 case bfd_reloc_overflow:
7498 if (link_order->type == bfd_section_reloc_link_order)
7499 sym_name = bfd_section_name (output_bfd,
7500 link_order->u.reloc.p->u.section);
7501 else
7502 sym_name = link_order->u.reloc.p->u.name;
7503 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
7504 (info, NULL, sym_name, howto->name, addend, NULL,
7505 NULL, (bfd_vma) 0)))
c152c796
AM
7506 {
7507 free (buf);
7508 return FALSE;
7509 }
7510 break;
7511 }
7512 ok = bfd_set_section_contents (output_bfd, output_section, buf,
7513 link_order->offset, size);
7514 free (buf);
7515 if (! ok)
7516 return FALSE;
7517 }
7518
7519 /* The address of a reloc is relative to the section in a
7520 relocatable file, and is a virtual address in an executable
7521 file. */
7522 offset = link_order->offset;
7523 if (! info->relocatable)
7524 offset += output_section->vma;
7525
7526 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7527 {
7528 irel[i].r_offset = offset;
7529 irel[i].r_info = 0;
7530 irel[i].r_addend = 0;
7531 }
7532 if (bed->s->arch_size == 32)
7533 irel[0].r_info = ELF32_R_INFO (indx, howto->type);
7534 else
7535 irel[0].r_info = ELF64_R_INFO (indx, howto->type);
7536
7537 rel_hdr = &elf_section_data (output_section)->rel_hdr;
7538 erel = rel_hdr->contents;
7539 if (rel_hdr->sh_type == SHT_REL)
7540 {
7541 erel += (elf_section_data (output_section)->rel_count
7542 * bed->s->sizeof_rel);
7543 (*bed->s->swap_reloc_out) (output_bfd, irel, erel);
7544 }
7545 else
7546 {
7547 irel[0].r_addend = addend;
7548 erel += (elf_section_data (output_section)->rel_count
7549 * bed->s->sizeof_rela);
7550 (*bed->s->swap_reloca_out) (output_bfd, irel, erel);
7551 }
7552
7553 ++elf_section_data (output_section)->rel_count;
7554
7555 return TRUE;
7556}
7557
0b52efa6
PB
7558
7559/* Get the output vma of the section pointed to by the sh_link field. */
7560
7561static bfd_vma
7562elf_get_linked_section_vma (struct bfd_link_order *p)
7563{
7564 Elf_Internal_Shdr **elf_shdrp;
7565 asection *s;
7566 int elfsec;
7567
7568 s = p->u.indirect.section;
7569 elf_shdrp = elf_elfsections (s->owner);
7570 elfsec = _bfd_elf_section_from_bfd_section (s->owner, s);
7571 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
7572 /* PR 290:
7573 The Intel C compiler generates SHT_IA_64_UNWIND with
7574 SHF_LINK_ORDER. But it doesn't set theh sh_link or
7575 sh_info fields. Hence we could get the situation
7576 where elfsec is 0. */
7577 if (elfsec == 0)
7578 {
7579 const struct elf_backend_data *bed
7580 = get_elf_backend_data (s->owner);
7581 if (bed->link_order_error_handler)
d003868e
AM
7582 bed->link_order_error_handler
7583 (_("%B: warning: sh_link not set for section `%A'"), s->owner, s);
185d09ad
L
7584 return 0;
7585 }
7586 else
7587 {
7588 s = elf_shdrp[elfsec]->bfd_section;
7589 return s->output_section->vma + s->output_offset;
7590 }
0b52efa6
PB
7591}
7592
7593
7594/* Compare two sections based on the locations of the sections they are
7595 linked to. Used by elf_fixup_link_order. */
7596
7597static int
7598compare_link_order (const void * a, const void * b)
7599{
7600 bfd_vma apos;
7601 bfd_vma bpos;
7602
7603 apos = elf_get_linked_section_vma (*(struct bfd_link_order **)a);
7604 bpos = elf_get_linked_section_vma (*(struct bfd_link_order **)b);
7605 if (apos < bpos)
7606 return -1;
7607 return apos > bpos;
7608}
7609
7610
7611/* Looks for sections with SHF_LINK_ORDER set. Rearranges them into the same
7612 order as their linked sections. Returns false if this could not be done
7613 because an output section includes both ordered and unordered
7614 sections. Ideally we'd do this in the linker proper. */
7615
7616static bfd_boolean
7617elf_fixup_link_order (bfd *abfd, asection *o)
7618{
7619 int seen_linkorder;
7620 int seen_other;
7621 int n;
7622 struct bfd_link_order *p;
7623 bfd *sub;
7624 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7625 int elfsec;
7626 struct bfd_link_order **sections;
7627 asection *s;
7628 bfd_vma offset;
7629
7630 seen_other = 0;
7631 seen_linkorder = 0;
7632 for (p = o->link_order_head; p != NULL; p = p->next)
7633 {
7634 if (p->type == bfd_indirect_link_order
7635 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
7636 == bfd_target_elf_flavour)
7637 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
7638 {
7639 s = p->u.indirect.section;
7640 elfsec = _bfd_elf_section_from_bfd_section (sub, s);
7641 if (elfsec != -1
7642 && elf_elfsections (sub)[elfsec]->sh_flags & SHF_LINK_ORDER)
7643 seen_linkorder++;
7644 else
7645 seen_other++;
7646 }
7647 else
7648 seen_other++;
7649 }
7650
7651 if (!seen_linkorder)
7652 return TRUE;
7653
7654 if (seen_other && seen_linkorder)
08ccf96b 7655 {
d003868e
AM
7656 (*_bfd_error_handler) (_("%A has both ordered and unordered sections"),
7657 o);
08ccf96b
L
7658 bfd_set_error (bfd_error_bad_value);
7659 return FALSE;
7660 }
0b52efa6
PB
7661
7662 sections = (struct bfd_link_order **)
7663 xmalloc (seen_linkorder * sizeof (struct bfd_link_order *));
7664 seen_linkorder = 0;
7665
7666 for (p = o->link_order_head; p != NULL; p = p->next)
7667 {
7668 sections[seen_linkorder++] = p;
7669 }
7670 /* Sort the input sections in the order of their linked section. */
7671 qsort (sections, seen_linkorder, sizeof (struct bfd_link_order *),
7672 compare_link_order);
7673
7674 /* Change the offsets of the sections. */
7675 offset = 0;
7676 for (n = 0; n < seen_linkorder; n++)
7677 {
7678 s = sections[n]->u.indirect.section;
7679 offset &= ~(bfd_vma)((1 << s->alignment_power) - 1);
7680 s->output_offset = offset;
7681 sections[n]->offset = offset;
7682 offset += sections[n]->size;
7683 }
7684
7685 return TRUE;
7686}
7687
7688
c152c796
AM
7689/* Do the final step of an ELF link. */
7690
7691bfd_boolean
7692bfd_elf_final_link (bfd *abfd, struct bfd_link_info *info)
7693{
7694 bfd_boolean dynamic;
7695 bfd_boolean emit_relocs;
7696 bfd *dynobj;
7697 struct elf_final_link_info finfo;
7698 register asection *o;
7699 register struct bfd_link_order *p;
7700 register bfd *sub;
7701 bfd_size_type max_contents_size;
7702 bfd_size_type max_external_reloc_size;
7703 bfd_size_type max_internal_reloc_count;
7704 bfd_size_type max_sym_count;
7705 bfd_size_type max_sym_shndx_count;
7706 file_ptr off;
7707 Elf_Internal_Sym elfsym;
7708 unsigned int i;
7709 Elf_Internal_Shdr *symtab_hdr;
7710 Elf_Internal_Shdr *symtab_shndx_hdr;
7711 Elf_Internal_Shdr *symstrtab_hdr;
7712 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
7713 struct elf_outext_info eoinfo;
7714 bfd_boolean merged;
7715 size_t relativecount = 0;
7716 asection *reldyn = 0;
7717 bfd_size_type amt;
7718
7719 if (! is_elf_hash_table (info->hash))
7720 return FALSE;
7721
7722 if (info->shared)
7723 abfd->flags |= DYNAMIC;
7724
7725 dynamic = elf_hash_table (info)->dynamic_sections_created;
7726 dynobj = elf_hash_table (info)->dynobj;
7727
7728 emit_relocs = (info->relocatable
7729 || info->emitrelocations
7730 || bed->elf_backend_emit_relocs);
7731
7732 finfo.info = info;
7733 finfo.output_bfd = abfd;
7734 finfo.symstrtab = _bfd_elf_stringtab_init ();
7735 if (finfo.symstrtab == NULL)
7736 return FALSE;
7737
7738 if (! dynamic)
7739 {
7740 finfo.dynsym_sec = NULL;
7741 finfo.hash_sec = NULL;
7742 finfo.symver_sec = NULL;
7743 }
7744 else
7745 {
7746 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
7747 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
7748 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
7749 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
7750 /* Note that it is OK if symver_sec is NULL. */
7751 }
7752
7753 finfo.contents = NULL;
7754 finfo.external_relocs = NULL;
7755 finfo.internal_relocs = NULL;
7756 finfo.external_syms = NULL;
7757 finfo.locsym_shndx = NULL;
7758 finfo.internal_syms = NULL;
7759 finfo.indices = NULL;
7760 finfo.sections = NULL;
7761 finfo.symbuf = NULL;
7762 finfo.symshndxbuf = NULL;
7763 finfo.symbuf_count = 0;
7764 finfo.shndxbuf_size = 0;
7765
7766 /* Count up the number of relocations we will output for each output
7767 section, so that we know the sizes of the reloc sections. We
7768 also figure out some maximum sizes. */
7769 max_contents_size = 0;
7770 max_external_reloc_size = 0;
7771 max_internal_reloc_count = 0;
7772 max_sym_count = 0;
7773 max_sym_shndx_count = 0;
7774 merged = FALSE;
7775 for (o = abfd->sections; o != NULL; o = o->next)
7776 {
7777 struct bfd_elf_section_data *esdo = elf_section_data (o);
7778 o->reloc_count = 0;
7779
7780 for (p = o->link_order_head; p != NULL; p = p->next)
7781 {
7782 unsigned int reloc_count = 0;
7783 struct bfd_elf_section_data *esdi = NULL;
7784 unsigned int *rel_count1;
7785
7786 if (p->type == bfd_section_reloc_link_order
7787 || p->type == bfd_symbol_reloc_link_order)
7788 reloc_count = 1;
7789 else if (p->type == bfd_indirect_link_order)
7790 {
7791 asection *sec;
7792
7793 sec = p->u.indirect.section;
7794 esdi = elf_section_data (sec);
7795
7796 /* Mark all sections which are to be included in the
7797 link. This will normally be every section. We need
7798 to do this so that we can identify any sections which
7799 the linker has decided to not include. */
7800 sec->linker_mark = TRUE;
7801
7802 if (sec->flags & SEC_MERGE)
7803 merged = TRUE;
7804
7805 if (info->relocatable || info->emitrelocations)
7806 reloc_count = sec->reloc_count;
7807 else if (bed->elf_backend_count_relocs)
7808 {
7809 Elf_Internal_Rela * relocs;
7810
7811 relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
7812 info->keep_memory);
7813
7814 reloc_count = (*bed->elf_backend_count_relocs) (sec, relocs);
7815
7816 if (elf_section_data (o)->relocs != relocs)
7817 free (relocs);
7818 }
7819
eea6121a
AM
7820 if (sec->rawsize > max_contents_size)
7821 max_contents_size = sec->rawsize;
7822 if (sec->size > max_contents_size)
7823 max_contents_size = sec->size;
c152c796
AM
7824
7825 /* We are interested in just local symbols, not all
7826 symbols. */
7827 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
7828 && (sec->owner->flags & DYNAMIC) == 0)
7829 {
7830 size_t sym_count;
7831
7832 if (elf_bad_symtab (sec->owner))
7833 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
7834 / bed->s->sizeof_sym);
7835 else
7836 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
7837
7838 if (sym_count > max_sym_count)
7839 max_sym_count = sym_count;
7840
7841 if (sym_count > max_sym_shndx_count
7842 && elf_symtab_shndx (sec->owner) != 0)
7843 max_sym_shndx_count = sym_count;
7844
7845 if ((sec->flags & SEC_RELOC) != 0)
7846 {
7847 size_t ext_size;
7848
7849 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
7850 if (ext_size > max_external_reloc_size)
7851 max_external_reloc_size = ext_size;
7852 if (sec->reloc_count > max_internal_reloc_count)
7853 max_internal_reloc_count = sec->reloc_count;
7854 }
7855 }
7856 }
7857
7858 if (reloc_count == 0)
7859 continue;
7860
7861 o->reloc_count += reloc_count;
7862
7863 /* MIPS may have a mix of REL and RELA relocs on sections.
7864 To support this curious ABI we keep reloc counts in
7865 elf_section_data too. We must be careful to add the
7866 relocations from the input section to the right output
7867 count. FIXME: Get rid of one count. We have
7868 o->reloc_count == esdo->rel_count + esdo->rel_count2. */
7869 rel_count1 = &esdo->rel_count;
7870 if (esdi != NULL)
7871 {
7872 bfd_boolean same_size;
7873 bfd_size_type entsize1;
7874
7875 entsize1 = esdi->rel_hdr.sh_entsize;
7876 BFD_ASSERT (entsize1 == bed->s->sizeof_rel
7877 || entsize1 == bed->s->sizeof_rela);
7878 same_size = !o->use_rela_p == (entsize1 == bed->s->sizeof_rel);
7879
7880 if (!same_size)
7881 rel_count1 = &esdo->rel_count2;
7882
7883 if (esdi->rel_hdr2 != NULL)
7884 {
7885 bfd_size_type entsize2 = esdi->rel_hdr2->sh_entsize;
7886 unsigned int alt_count;
7887 unsigned int *rel_count2;
7888
7889 BFD_ASSERT (entsize2 != entsize1
7890 && (entsize2 == bed->s->sizeof_rel
7891 || entsize2 == bed->s->sizeof_rela));
7892
7893 rel_count2 = &esdo->rel_count2;
7894 if (!same_size)
7895 rel_count2 = &esdo->rel_count;
7896
7897 /* The following is probably too simplistic if the
7898 backend counts output relocs unusually. */
7899 BFD_ASSERT (bed->elf_backend_count_relocs == NULL);
7900 alt_count = NUM_SHDR_ENTRIES (esdi->rel_hdr2);
7901 *rel_count2 += alt_count;
7902 reloc_count -= alt_count;
7903 }
7904 }
7905 *rel_count1 += reloc_count;
7906 }
7907
7908 if (o->reloc_count > 0)
7909 o->flags |= SEC_RELOC;
7910 else
7911 {
7912 /* Explicitly clear the SEC_RELOC flag. The linker tends to
7913 set it (this is probably a bug) and if it is set
7914 assign_section_numbers will create a reloc section. */
7915 o->flags &=~ SEC_RELOC;
7916 }
7917
7918 /* If the SEC_ALLOC flag is not set, force the section VMA to
7919 zero. This is done in elf_fake_sections as well, but forcing
7920 the VMA to 0 here will ensure that relocs against these
7921 sections are handled correctly. */
7922 if ((o->flags & SEC_ALLOC) == 0
7923 && ! o->user_set_vma)
7924 o->vma = 0;
7925 }
7926
7927 if (! info->relocatable && merged)
7928 elf_link_hash_traverse (elf_hash_table (info),
7929 _bfd_elf_link_sec_merge_syms, abfd);
7930
7931 /* Figure out the file positions for everything but the symbol table
7932 and the relocs. We set symcount to force assign_section_numbers
7933 to create a symbol table. */
7934 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
7935 BFD_ASSERT (! abfd->output_has_begun);
7936 if (! _bfd_elf_compute_section_file_positions (abfd, info))
7937 goto error_return;
7938
ee75fd95 7939 /* Set sizes, and assign file positions for reloc sections. */
c152c796
AM
7940 for (o = abfd->sections; o != NULL; o = o->next)
7941 {
7942 if ((o->flags & SEC_RELOC) != 0)
7943 {
7944 if (!(_bfd_elf_link_size_reloc_section
7945 (abfd, &elf_section_data (o)->rel_hdr, o)))
7946 goto error_return;
7947
7948 if (elf_section_data (o)->rel_hdr2
7949 && !(_bfd_elf_link_size_reloc_section
7950 (abfd, elf_section_data (o)->rel_hdr2, o)))
7951 goto error_return;
7952 }
7953
7954 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
7955 to count upwards while actually outputting the relocations. */
7956 elf_section_data (o)->rel_count = 0;
7957 elf_section_data (o)->rel_count2 = 0;
7958 }
7959
7960 _bfd_elf_assign_file_positions_for_relocs (abfd);
7961
7962 /* We have now assigned file positions for all the sections except
7963 .symtab and .strtab. We start the .symtab section at the current
7964 file position, and write directly to it. We build the .strtab
7965 section in memory. */
7966 bfd_get_symcount (abfd) = 0;
7967 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
7968 /* sh_name is set in prep_headers. */
7969 symtab_hdr->sh_type = SHT_SYMTAB;
7970 /* sh_flags, sh_addr and sh_size all start off zero. */
7971 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
7972 /* sh_link is set in assign_section_numbers. */
7973 /* sh_info is set below. */
7974 /* sh_offset is set just below. */
7975 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
7976
7977 off = elf_tdata (abfd)->next_file_pos;
7978 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, TRUE);
7979
7980 /* Note that at this point elf_tdata (abfd)->next_file_pos is
7981 incorrect. We do not yet know the size of the .symtab section.
7982 We correct next_file_pos below, after we do know the size. */
7983
7984 /* Allocate a buffer to hold swapped out symbols. This is to avoid
7985 continuously seeking to the right position in the file. */
7986 if (! info->keep_memory || max_sym_count < 20)
7987 finfo.symbuf_size = 20;
7988 else
7989 finfo.symbuf_size = max_sym_count;
7990 amt = finfo.symbuf_size;
7991 amt *= bed->s->sizeof_sym;
7992 finfo.symbuf = bfd_malloc (amt);
7993 if (finfo.symbuf == NULL)
7994 goto error_return;
7995 if (elf_numsections (abfd) > SHN_LORESERVE)
7996 {
7997 /* Wild guess at number of output symbols. realloc'd as needed. */
7998 amt = 2 * max_sym_count + elf_numsections (abfd) + 1000;
7999 finfo.shndxbuf_size = amt;
8000 amt *= sizeof (Elf_External_Sym_Shndx);
8001 finfo.symshndxbuf = bfd_zmalloc (amt);
8002 if (finfo.symshndxbuf == NULL)
8003 goto error_return;
8004 }
8005
8006 /* Start writing out the symbol table. The first symbol is always a
8007 dummy symbol. */
8008 if (info->strip != strip_all
8009 || emit_relocs)
8010 {
8011 elfsym.st_value = 0;
8012 elfsym.st_size = 0;
8013 elfsym.st_info = 0;
8014 elfsym.st_other = 0;
8015 elfsym.st_shndx = SHN_UNDEF;
8016 if (! elf_link_output_sym (&finfo, NULL, &elfsym, bfd_und_section_ptr,
8017 NULL))
8018 goto error_return;
8019 }
8020
c152c796
AM
8021 /* Output a symbol for each section. We output these even if we are
8022 discarding local symbols, since they are used for relocs. These
8023 symbols have no names. We store the index of each one in the
8024 index field of the section, so that we can find it again when
8025 outputting relocs. */
8026 if (info->strip != strip_all
8027 || emit_relocs)
8028 {
8029 elfsym.st_size = 0;
8030 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8031 elfsym.st_other = 0;
8032 for (i = 1; i < elf_numsections (abfd); i++)
8033 {
8034 o = bfd_section_from_elf_index (abfd, i);
8035 if (o != NULL)
8036 o->target_index = bfd_get_symcount (abfd);
8037 elfsym.st_shndx = i;
8038 if (info->relocatable || o == NULL)
8039 elfsym.st_value = 0;
8040 else
8041 elfsym.st_value = o->vma;
8042 if (! elf_link_output_sym (&finfo, NULL, &elfsym, o, NULL))
8043 goto error_return;
8044 if (i == SHN_LORESERVE - 1)
8045 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
8046 }
8047 }
8048
8049 /* Allocate some memory to hold information read in from the input
8050 files. */
8051 if (max_contents_size != 0)
8052 {
8053 finfo.contents = bfd_malloc (max_contents_size);
8054 if (finfo.contents == NULL)
8055 goto error_return;
8056 }
8057
8058 if (max_external_reloc_size != 0)
8059 {
8060 finfo.external_relocs = bfd_malloc (max_external_reloc_size);
8061 if (finfo.external_relocs == NULL)
8062 goto error_return;
8063 }
8064
8065 if (max_internal_reloc_count != 0)
8066 {
8067 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
8068 amt *= sizeof (Elf_Internal_Rela);
8069 finfo.internal_relocs = bfd_malloc (amt);
8070 if (finfo.internal_relocs == NULL)
8071 goto error_return;
8072 }
8073
8074 if (max_sym_count != 0)
8075 {
8076 amt = max_sym_count * bed->s->sizeof_sym;
8077 finfo.external_syms = bfd_malloc (amt);
8078 if (finfo.external_syms == NULL)
8079 goto error_return;
8080
8081 amt = max_sym_count * sizeof (Elf_Internal_Sym);
8082 finfo.internal_syms = bfd_malloc (amt);
8083 if (finfo.internal_syms == NULL)
8084 goto error_return;
8085
8086 amt = max_sym_count * sizeof (long);
8087 finfo.indices = bfd_malloc (amt);
8088 if (finfo.indices == NULL)
8089 goto error_return;
8090
8091 amt = max_sym_count * sizeof (asection *);
8092 finfo.sections = bfd_malloc (amt);
8093 if (finfo.sections == NULL)
8094 goto error_return;
8095 }
8096
8097 if (max_sym_shndx_count != 0)
8098 {
8099 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
8100 finfo.locsym_shndx = bfd_malloc (amt);
8101 if (finfo.locsym_shndx == NULL)
8102 goto error_return;
8103 }
8104
8105 if (elf_hash_table (info)->tls_sec)
8106 {
8107 bfd_vma base, end = 0;
8108 asection *sec;
8109
8110 for (sec = elf_hash_table (info)->tls_sec;
8111 sec && (sec->flags & SEC_THREAD_LOCAL);
8112 sec = sec->next)
8113 {
eea6121a 8114 bfd_vma size = sec->size;
c152c796
AM
8115
8116 if (size == 0 && (sec->flags & SEC_HAS_CONTENTS) == 0)
8117 {
8118 struct bfd_link_order *o;
8119
8120 for (o = sec->link_order_head; o != NULL; o = o->next)
8121 if (size < o->offset + o->size)
8122 size = o->offset + o->size;
8123 }
8124 end = sec->vma + size;
8125 }
8126 base = elf_hash_table (info)->tls_sec->vma;
8127 end = align_power (end, elf_hash_table (info)->tls_sec->alignment_power);
8128 elf_hash_table (info)->tls_size = end - base;
8129 }
8130
0b52efa6
PB
8131 /* Reorder SHF_LINK_ORDER sections. */
8132 for (o = abfd->sections; o != NULL; o = o->next)
8133 {
8134 if (!elf_fixup_link_order (abfd, o))
8135 return FALSE;
8136 }
8137
c152c796
AM
8138 /* Since ELF permits relocations to be against local symbols, we
8139 must have the local symbols available when we do the relocations.
8140 Since we would rather only read the local symbols once, and we
8141 would rather not keep them in memory, we handle all the
8142 relocations for a single input file at the same time.
8143
8144 Unfortunately, there is no way to know the total number of local
8145 symbols until we have seen all of them, and the local symbol
8146 indices precede the global symbol indices. This means that when
8147 we are generating relocatable output, and we see a reloc against
8148 a global symbol, we can not know the symbol index until we have
8149 finished examining all the local symbols to see which ones we are
8150 going to output. To deal with this, we keep the relocations in
8151 memory, and don't output them until the end of the link. This is
8152 an unfortunate waste of memory, but I don't see a good way around
8153 it. Fortunately, it only happens when performing a relocatable
8154 link, which is not the common case. FIXME: If keep_memory is set
8155 we could write the relocs out and then read them again; I don't
8156 know how bad the memory loss will be. */
8157
8158 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8159 sub->output_has_begun = FALSE;
8160 for (o = abfd->sections; o != NULL; o = o->next)
8161 {
8162 for (p = o->link_order_head; p != NULL; p = p->next)
8163 {
8164 if (p->type == bfd_indirect_link_order
8165 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
8166 == bfd_target_elf_flavour)
8167 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
8168 {
8169 if (! sub->output_has_begun)
8170 {
8171 if (! elf_link_input_bfd (&finfo, sub))
8172 goto error_return;
8173 sub->output_has_begun = TRUE;
8174 }
8175 }
8176 else if (p->type == bfd_section_reloc_link_order
8177 || p->type == bfd_symbol_reloc_link_order)
8178 {
8179 if (! elf_reloc_link_order (abfd, info, o, p))
8180 goto error_return;
8181 }
8182 else
8183 {
8184 if (! _bfd_default_link_order (abfd, info, o, p))
8185 goto error_return;
8186 }
8187 }
8188 }
8189
8190 /* Output any global symbols that got converted to local in a
8191 version script or due to symbol visibility. We do this in a
8192 separate step since ELF requires all local symbols to appear
8193 prior to any global symbols. FIXME: We should only do this if
8194 some global symbols were, in fact, converted to become local.
8195 FIXME: Will this work correctly with the Irix 5 linker? */
8196 eoinfo.failed = FALSE;
8197 eoinfo.finfo = &finfo;
8198 eoinfo.localsyms = TRUE;
8199 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
8200 &eoinfo);
8201 if (eoinfo.failed)
8202 return FALSE;
8203
8204 /* That wrote out all the local symbols. Finish up the symbol table
8205 with the global symbols. Even if we want to strip everything we
8206 can, we still need to deal with those global symbols that got
8207 converted to local in a version script. */
8208
8209 /* The sh_info field records the index of the first non local symbol. */
8210 symtab_hdr->sh_info = bfd_get_symcount (abfd);
8211
8212 if (dynamic
8213 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
8214 {
8215 Elf_Internal_Sym sym;
8216 bfd_byte *dynsym = finfo.dynsym_sec->contents;
8217 long last_local = 0;
8218
8219 /* Write out the section symbols for the output sections. */
67687978 8220 if (info->shared || elf_hash_table (info)->is_relocatable_executable)
c152c796
AM
8221 {
8222 asection *s;
8223
8224 sym.st_size = 0;
8225 sym.st_name = 0;
8226 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8227 sym.st_other = 0;
8228
8229 for (s = abfd->sections; s != NULL; s = s->next)
8230 {
8231 int indx;
8232 bfd_byte *dest;
8233 long dynindx;
8234
c152c796 8235 dynindx = elf_section_data (s)->dynindx;
8c37241b
JJ
8236 if (dynindx <= 0)
8237 continue;
8238 indx = elf_section_data (s)->this_idx;
c152c796
AM
8239 BFD_ASSERT (indx > 0);
8240 sym.st_shndx = indx;
8241 sym.st_value = s->vma;
8242 dest = dynsym + dynindx * bed->s->sizeof_sym;
8c37241b
JJ
8243 if (last_local < dynindx)
8244 last_local = dynindx;
c152c796
AM
8245 bed->s->swap_symbol_out (abfd, &sym, dest, 0);
8246 }
c152c796
AM
8247 }
8248
8249 /* Write out the local dynsyms. */
8250 if (elf_hash_table (info)->dynlocal)
8251 {
8252 struct elf_link_local_dynamic_entry *e;
8253 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
8254 {
8255 asection *s;
8256 bfd_byte *dest;
8257
8258 sym.st_size = e->isym.st_size;
8259 sym.st_other = e->isym.st_other;
8260
8261 /* Copy the internal symbol as is.
8262 Note that we saved a word of storage and overwrote
8263 the original st_name with the dynstr_index. */
8264 sym = e->isym;
8265
8266 if (e->isym.st_shndx != SHN_UNDEF
8267 && (e->isym.st_shndx < SHN_LORESERVE
8268 || e->isym.st_shndx > SHN_HIRESERVE))
8269 {
8270 s = bfd_section_from_elf_index (e->input_bfd,
8271 e->isym.st_shndx);
8272
8273 sym.st_shndx =
8274 elf_section_data (s->output_section)->this_idx;
8275 sym.st_value = (s->output_section->vma
8276 + s->output_offset
8277 + e->isym.st_value);
8278 }
8279
8280 if (last_local < e->dynindx)
8281 last_local = e->dynindx;
8282
8283 dest = dynsym + e->dynindx * bed->s->sizeof_sym;
8284 bed->s->swap_symbol_out (abfd, &sym, dest, 0);
8285 }
8286 }
8287
8288 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
8289 last_local + 1;
8290 }
8291
8292 /* We get the global symbols from the hash table. */
8293 eoinfo.failed = FALSE;
8294 eoinfo.localsyms = FALSE;
8295 eoinfo.finfo = &finfo;
8296 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
8297 &eoinfo);
8298 if (eoinfo.failed)
8299 return FALSE;
8300
8301 /* If backend needs to output some symbols not present in the hash
8302 table, do it now. */
8303 if (bed->elf_backend_output_arch_syms)
8304 {
8305 typedef bfd_boolean (*out_sym_func)
8306 (void *, const char *, Elf_Internal_Sym *, asection *,
8307 struct elf_link_hash_entry *);
8308
8309 if (! ((*bed->elf_backend_output_arch_syms)
8310 (abfd, info, &finfo, (out_sym_func) elf_link_output_sym)))
8311 return FALSE;
8312 }
8313
8314 /* Flush all symbols to the file. */
8315 if (! elf_link_flush_output_syms (&finfo, bed))
8316 return FALSE;
8317
8318 /* Now we know the size of the symtab section. */
8319 off += symtab_hdr->sh_size;
8320
8321 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
8322 if (symtab_shndx_hdr->sh_name != 0)
8323 {
8324 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8325 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8326 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8327 amt = bfd_get_symcount (abfd) * sizeof (Elf_External_Sym_Shndx);
8328 symtab_shndx_hdr->sh_size = amt;
8329
8330 off = _bfd_elf_assign_file_position_for_section (symtab_shndx_hdr,
8331 off, TRUE);
8332
8333 if (bfd_seek (abfd, symtab_shndx_hdr->sh_offset, SEEK_SET) != 0
8334 || (bfd_bwrite (finfo.symshndxbuf, amt, abfd) != amt))
8335 return FALSE;
8336 }
8337
8338
8339 /* Finish up and write out the symbol string table (.strtab)
8340 section. */
8341 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8342 /* sh_name was set in prep_headers. */
8343 symstrtab_hdr->sh_type = SHT_STRTAB;
8344 symstrtab_hdr->sh_flags = 0;
8345 symstrtab_hdr->sh_addr = 0;
8346 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
8347 symstrtab_hdr->sh_entsize = 0;
8348 symstrtab_hdr->sh_link = 0;
8349 symstrtab_hdr->sh_info = 0;
8350 /* sh_offset is set just below. */
8351 symstrtab_hdr->sh_addralign = 1;
8352
8353 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, TRUE);
8354 elf_tdata (abfd)->next_file_pos = off;
8355
8356 if (bfd_get_symcount (abfd) > 0)
8357 {
8358 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
8359 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
8360 return FALSE;
8361 }
8362
8363 /* Adjust the relocs to have the correct symbol indices. */
8364 for (o = abfd->sections; o != NULL; o = o->next)
8365 {
8366 if ((o->flags & SEC_RELOC) == 0)
8367 continue;
8368
8369 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
8370 elf_section_data (o)->rel_count,
8371 elf_section_data (o)->rel_hashes);
8372 if (elf_section_data (o)->rel_hdr2 != NULL)
8373 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
8374 elf_section_data (o)->rel_count2,
8375 (elf_section_data (o)->rel_hashes
8376 + elf_section_data (o)->rel_count));
8377
8378 /* Set the reloc_count field to 0 to prevent write_relocs from
8379 trying to swap the relocs out itself. */
8380 o->reloc_count = 0;
8381 }
8382
8383 if (dynamic && info->combreloc && dynobj != NULL)
8384 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
8385
8386 /* If we are linking against a dynamic object, or generating a
8387 shared library, finish up the dynamic linking information. */
8388 if (dynamic)
8389 {
8390 bfd_byte *dyncon, *dynconend;
8391
8392 /* Fix up .dynamic entries. */
8393 o = bfd_get_section_by_name (dynobj, ".dynamic");
8394 BFD_ASSERT (o != NULL);
8395
8396 dyncon = o->contents;
eea6121a 8397 dynconend = o->contents + o->size;
c152c796
AM
8398 for (; dyncon < dynconend; dyncon += bed->s->sizeof_dyn)
8399 {
8400 Elf_Internal_Dyn dyn;
8401 const char *name;
8402 unsigned int type;
8403
8404 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
8405
8406 switch (dyn.d_tag)
8407 {
8408 default:
8409 continue;
8410 case DT_NULL:
8411 if (relativecount > 0 && dyncon + bed->s->sizeof_dyn < dynconend)
8412 {
8413 switch (elf_section_data (reldyn)->this_hdr.sh_type)
8414 {
8415 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
8416 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
8417 default: continue;
8418 }
8419 dyn.d_un.d_val = relativecount;
8420 relativecount = 0;
8421 break;
8422 }
8423 continue;
8424
8425 case DT_INIT:
8426 name = info->init_function;
8427 goto get_sym;
8428 case DT_FINI:
8429 name = info->fini_function;
8430 get_sym:
8431 {
8432 struct elf_link_hash_entry *h;
8433
8434 h = elf_link_hash_lookup (elf_hash_table (info), name,
8435 FALSE, FALSE, TRUE);
8436 if (h != NULL
8437 && (h->root.type == bfd_link_hash_defined
8438 || h->root.type == bfd_link_hash_defweak))
8439 {
8440 dyn.d_un.d_val = h->root.u.def.value;
8441 o = h->root.u.def.section;
8442 if (o->output_section != NULL)
8443 dyn.d_un.d_val += (o->output_section->vma
8444 + o->output_offset);
8445 else
8446 {
8447 /* The symbol is imported from another shared
8448 library and does not apply to this one. */
8449 dyn.d_un.d_val = 0;
8450 }
8451 break;
8452 }
8453 }
8454 continue;
8455
8456 case DT_PREINIT_ARRAYSZ:
8457 name = ".preinit_array";
8458 goto get_size;
8459 case DT_INIT_ARRAYSZ:
8460 name = ".init_array";
8461 goto get_size;
8462 case DT_FINI_ARRAYSZ:
8463 name = ".fini_array";
8464 get_size:
8465 o = bfd_get_section_by_name (abfd, name);
8466 if (o == NULL)
8467 {
8468 (*_bfd_error_handler)
d003868e 8469 (_("%B: could not find output section %s"), abfd, name);
c152c796
AM
8470 goto error_return;
8471 }
eea6121a 8472 if (o->size == 0)
c152c796
AM
8473 (*_bfd_error_handler)
8474 (_("warning: %s section has zero size"), name);
eea6121a 8475 dyn.d_un.d_val = o->size;
c152c796
AM
8476 break;
8477
8478 case DT_PREINIT_ARRAY:
8479 name = ".preinit_array";
8480 goto get_vma;
8481 case DT_INIT_ARRAY:
8482 name = ".init_array";
8483 goto get_vma;
8484 case DT_FINI_ARRAY:
8485 name = ".fini_array";
8486 goto get_vma;
8487
8488 case DT_HASH:
8489 name = ".hash";
8490 goto get_vma;
8491 case DT_STRTAB:
8492 name = ".dynstr";
8493 goto get_vma;
8494 case DT_SYMTAB:
8495 name = ".dynsym";
8496 goto get_vma;
8497 case DT_VERDEF:
8498 name = ".gnu.version_d";
8499 goto get_vma;
8500 case DT_VERNEED:
8501 name = ".gnu.version_r";
8502 goto get_vma;
8503 case DT_VERSYM:
8504 name = ".gnu.version";
8505 get_vma:
8506 o = bfd_get_section_by_name (abfd, name);
8507 if (o == NULL)
8508 {
8509 (*_bfd_error_handler)
d003868e 8510 (_("%B: could not find output section %s"), abfd, name);
c152c796
AM
8511 goto error_return;
8512 }
8513 dyn.d_un.d_ptr = o->vma;
8514 break;
8515
8516 case DT_REL:
8517 case DT_RELA:
8518 case DT_RELSZ:
8519 case DT_RELASZ:
8520 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
8521 type = SHT_REL;
8522 else
8523 type = SHT_RELA;
8524 dyn.d_un.d_val = 0;
8525 for (i = 1; i < elf_numsections (abfd); i++)
8526 {
8527 Elf_Internal_Shdr *hdr;
8528
8529 hdr = elf_elfsections (abfd)[i];
8530 if (hdr->sh_type == type
8531 && (hdr->sh_flags & SHF_ALLOC) != 0)
8532 {
8533 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
8534 dyn.d_un.d_val += hdr->sh_size;
8535 else
8536 {
8537 if (dyn.d_un.d_val == 0
8538 || hdr->sh_addr < dyn.d_un.d_val)
8539 dyn.d_un.d_val = hdr->sh_addr;
8540 }
8541 }
8542 }
8543 break;
8544 }
8545 bed->s->swap_dyn_out (dynobj, &dyn, dyncon);
8546 }
8547 }
8548
8549 /* If we have created any dynamic sections, then output them. */
8550 if (dynobj != NULL)
8551 {
8552 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
8553 goto error_return;
8554
8555 for (o = dynobj->sections; o != NULL; o = o->next)
8556 {
8557 if ((o->flags & SEC_HAS_CONTENTS) == 0
eea6121a 8558 || o->size == 0
c152c796
AM
8559 || o->output_section == bfd_abs_section_ptr)
8560 continue;
8561 if ((o->flags & SEC_LINKER_CREATED) == 0)
8562 {
8563 /* At this point, we are only interested in sections
8564 created by _bfd_elf_link_create_dynamic_sections. */
8565 continue;
8566 }
3722b82f
AM
8567 if (elf_hash_table (info)->stab_info.stabstr == o)
8568 continue;
eea6121a
AM
8569 if (elf_hash_table (info)->eh_info.hdr_sec == o)
8570 continue;
c152c796
AM
8571 if ((elf_section_data (o->output_section)->this_hdr.sh_type
8572 != SHT_STRTAB)
8573 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
8574 {
8575 if (! bfd_set_section_contents (abfd, o->output_section,
8576 o->contents,
8577 (file_ptr) o->output_offset,
eea6121a 8578 o->size))
c152c796
AM
8579 goto error_return;
8580 }
8581 else
8582 {
8583 /* The contents of the .dynstr section are actually in a
8584 stringtab. */
8585 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
8586 if (bfd_seek (abfd, off, SEEK_SET) != 0
8587 || ! _bfd_elf_strtab_emit (abfd,
8588 elf_hash_table (info)->dynstr))
8589 goto error_return;
8590 }
8591 }
8592 }
8593
8594 if (info->relocatable)
8595 {
8596 bfd_boolean failed = FALSE;
8597
8598 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
8599 if (failed)
8600 goto error_return;
8601 }
8602
8603 /* If we have optimized stabs strings, output them. */
3722b82f 8604 if (elf_hash_table (info)->stab_info.stabstr != NULL)
c152c796
AM
8605 {
8606 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
8607 goto error_return;
8608 }
8609
8610 if (info->eh_frame_hdr)
8611 {
8612 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, info))
8613 goto error_return;
8614 }
8615
8616 if (finfo.symstrtab != NULL)
8617 _bfd_stringtab_free (finfo.symstrtab);
8618 if (finfo.contents != NULL)
8619 free (finfo.contents);
8620 if (finfo.external_relocs != NULL)
8621 free (finfo.external_relocs);
8622 if (finfo.internal_relocs != NULL)
8623 free (finfo.internal_relocs);
8624 if (finfo.external_syms != NULL)
8625 free (finfo.external_syms);
8626 if (finfo.locsym_shndx != NULL)
8627 free (finfo.locsym_shndx);
8628 if (finfo.internal_syms != NULL)
8629 free (finfo.internal_syms);
8630 if (finfo.indices != NULL)
8631 free (finfo.indices);
8632 if (finfo.sections != NULL)
8633 free (finfo.sections);
8634 if (finfo.symbuf != NULL)
8635 free (finfo.symbuf);
8636 if (finfo.symshndxbuf != NULL)
8637 free (finfo.symshndxbuf);
8638 for (o = abfd->sections; o != NULL; o = o->next)
8639 {
8640 if ((o->flags & SEC_RELOC) != 0
8641 && elf_section_data (o)->rel_hashes != NULL)
8642 free (elf_section_data (o)->rel_hashes);
8643 }
8644
8645 elf_tdata (abfd)->linker = TRUE;
8646
8647 return TRUE;
8648
8649 error_return:
8650 if (finfo.symstrtab != NULL)
8651 _bfd_stringtab_free (finfo.symstrtab);
8652 if (finfo.contents != NULL)
8653 free (finfo.contents);
8654 if (finfo.external_relocs != NULL)
8655 free (finfo.external_relocs);
8656 if (finfo.internal_relocs != NULL)
8657 free (finfo.internal_relocs);
8658 if (finfo.external_syms != NULL)
8659 free (finfo.external_syms);
8660 if (finfo.locsym_shndx != NULL)
8661 free (finfo.locsym_shndx);
8662 if (finfo.internal_syms != NULL)
8663 free (finfo.internal_syms);
8664 if (finfo.indices != NULL)
8665 free (finfo.indices);
8666 if (finfo.sections != NULL)
8667 free (finfo.sections);
8668 if (finfo.symbuf != NULL)
8669 free (finfo.symbuf);
8670 if (finfo.symshndxbuf != NULL)
8671 free (finfo.symshndxbuf);
8672 for (o = abfd->sections; o != NULL; o = o->next)
8673 {
8674 if ((o->flags & SEC_RELOC) != 0
8675 && elf_section_data (o)->rel_hashes != NULL)
8676 free (elf_section_data (o)->rel_hashes);
8677 }
8678
8679 return FALSE;
8680}
8681\f
8682/* Garbage collect unused sections. */
8683
8684/* The mark phase of garbage collection. For a given section, mark
8685 it and any sections in this section's group, and all the sections
8686 which define symbols to which it refers. */
8687
8688typedef asection * (*gc_mark_hook_fn)
8689 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
8690 struct elf_link_hash_entry *, Elf_Internal_Sym *);
8691
ccfa59ea
AM
8692bfd_boolean
8693_bfd_elf_gc_mark (struct bfd_link_info *info,
8694 asection *sec,
8695 gc_mark_hook_fn gc_mark_hook)
c152c796
AM
8696{
8697 bfd_boolean ret;
8698 asection *group_sec;
8699
8700 sec->gc_mark = 1;
8701
8702 /* Mark all the sections in the group. */
8703 group_sec = elf_section_data (sec)->next_in_group;
8704 if (group_sec && !group_sec->gc_mark)
ccfa59ea 8705 if (!_bfd_elf_gc_mark (info, group_sec, gc_mark_hook))
c152c796
AM
8706 return FALSE;
8707
8708 /* Look through the section relocs. */
8709 ret = TRUE;
8710 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
8711 {
8712 Elf_Internal_Rela *relstart, *rel, *relend;
8713 Elf_Internal_Shdr *symtab_hdr;
8714 struct elf_link_hash_entry **sym_hashes;
8715 size_t nlocsyms;
8716 size_t extsymoff;
8717 bfd *input_bfd = sec->owner;
8718 const struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
8719 Elf_Internal_Sym *isym = NULL;
8720 int r_sym_shift;
8721
8722 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
8723 sym_hashes = elf_sym_hashes (input_bfd);
8724
8725 /* Read the local symbols. */
8726 if (elf_bad_symtab (input_bfd))
8727 {
8728 nlocsyms = symtab_hdr->sh_size / bed->s->sizeof_sym;
8729 extsymoff = 0;
8730 }
8731 else
8732 extsymoff = nlocsyms = symtab_hdr->sh_info;
8733
8734 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
8735 if (isym == NULL && nlocsyms != 0)
8736 {
8737 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
8738 NULL, NULL, NULL);
8739 if (isym == NULL)
8740 return FALSE;
8741 }
8742
8743 /* Read the relocations. */
8744 relstart = _bfd_elf_link_read_relocs (input_bfd, sec, NULL, NULL,
8745 info->keep_memory);
8746 if (relstart == NULL)
8747 {
8748 ret = FALSE;
8749 goto out1;
8750 }
8751 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
8752
8753 if (bed->s->arch_size == 32)
8754 r_sym_shift = 8;
8755 else
8756 r_sym_shift = 32;
8757
8758 for (rel = relstart; rel < relend; rel++)
8759 {
8760 unsigned long r_symndx;
8761 asection *rsec;
8762 struct elf_link_hash_entry *h;
8763
8764 r_symndx = rel->r_info >> r_sym_shift;
8765 if (r_symndx == 0)
8766 continue;
8767
8768 if (r_symndx >= nlocsyms
8769 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
8770 {
8771 h = sym_hashes[r_symndx - extsymoff];
20f0a1ad
AM
8772 while (h->root.type == bfd_link_hash_indirect
8773 || h->root.type == bfd_link_hash_warning)
8774 h = (struct elf_link_hash_entry *) h->root.u.i.link;
c152c796
AM
8775 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
8776 }
8777 else
8778 {
8779 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
8780 }
8781
8782 if (rsec && !rsec->gc_mark)
8783 {
8784 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
8785 rsec->gc_mark = 1;
ccfa59ea 8786 else if (!_bfd_elf_gc_mark (info, rsec, gc_mark_hook))
c152c796
AM
8787 {
8788 ret = FALSE;
8789 goto out2;
8790 }
8791 }
8792 }
8793
8794 out2:
8795 if (elf_section_data (sec)->relocs != relstart)
8796 free (relstart);
8797 out1:
8798 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
8799 {
8800 if (! info->keep_memory)
8801 free (isym);
8802 else
8803 symtab_hdr->contents = (unsigned char *) isym;
8804 }
8805 }
8806
8807 return ret;
8808}
8809
8810/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
8811
8812static bfd_boolean
8813elf_gc_sweep_symbol (struct elf_link_hash_entry *h, void *idxptr)
8814{
8815 int *idx = idxptr;
8816
8817 if (h->root.type == bfd_link_hash_warning)
8818 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8819
8820 if (h->dynindx != -1
8821 && ((h->root.type != bfd_link_hash_defined
8822 && h->root.type != bfd_link_hash_defweak)
8823 || h->root.u.def.section->gc_mark))
8824 h->dynindx = (*idx)++;
8825
8826 return TRUE;
8827}
8828
8829/* The sweep phase of garbage collection. Remove all garbage sections. */
8830
8831typedef bfd_boolean (*gc_sweep_hook_fn)
8832 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
8833
8834static bfd_boolean
8835elf_gc_sweep (struct bfd_link_info *info, gc_sweep_hook_fn gc_sweep_hook)
8836{
8837 bfd *sub;
8838
8839 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8840 {
8841 asection *o;
8842
8843 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
8844 continue;
8845
8846 for (o = sub->sections; o != NULL; o = o->next)
8847 {
7c2c8505
AM
8848 /* Keep debug and special sections. */
8849 if ((o->flags & (SEC_DEBUGGING | SEC_LINKER_CREATED)) != 0
8850 || (o->flags & (SEC_ALLOC | SEC_LOAD)) == 0)
c152c796
AM
8851 o->gc_mark = 1;
8852
8853 if (o->gc_mark)
8854 continue;
8855
8856 /* Skip sweeping sections already excluded. */
8857 if (o->flags & SEC_EXCLUDE)
8858 continue;
8859
8860 /* Since this is early in the link process, it is simple
8861 to remove a section from the output. */
8862 o->flags |= SEC_EXCLUDE;
8863
8864 /* But we also have to update some of the relocation
8865 info we collected before. */
8866 if (gc_sweep_hook
8867 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
8868 {
8869 Elf_Internal_Rela *internal_relocs;
8870 bfd_boolean r;
8871
8872 internal_relocs
8873 = _bfd_elf_link_read_relocs (o->owner, o, NULL, NULL,
8874 info->keep_memory);
8875 if (internal_relocs == NULL)
8876 return FALSE;
8877
8878 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
8879
8880 if (elf_section_data (o)->relocs != internal_relocs)
8881 free (internal_relocs);
8882
8883 if (!r)
8884 return FALSE;
8885 }
8886 }
8887 }
8888
8889 /* Remove the symbols that were in the swept sections from the dynamic
8890 symbol table. GCFIXME: Anyone know how to get them out of the
8891 static symbol table as well? */
8892 {
8893 int i = 0;
8894
8895 elf_link_hash_traverse (elf_hash_table (info), elf_gc_sweep_symbol, &i);
8896
8897 elf_hash_table (info)->dynsymcount = i;
8898 }
8899
8900 return TRUE;
8901}
8902
8903/* Propagate collected vtable information. This is called through
8904 elf_link_hash_traverse. */
8905
8906static bfd_boolean
8907elf_gc_propagate_vtable_entries_used (struct elf_link_hash_entry *h, void *okp)
8908{
8909 if (h->root.type == bfd_link_hash_warning)
8910 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8911
8912 /* Those that are not vtables. */
f6e332e6 8913 if (h->vtable == NULL || h->vtable->parent == NULL)
c152c796
AM
8914 return TRUE;
8915
8916 /* Those vtables that do not have parents, we cannot merge. */
f6e332e6 8917 if (h->vtable->parent == (struct elf_link_hash_entry *) -1)
c152c796
AM
8918 return TRUE;
8919
8920 /* If we've already been done, exit. */
f6e332e6 8921 if (h->vtable->used && h->vtable->used[-1])
c152c796
AM
8922 return TRUE;
8923
8924 /* Make sure the parent's table is up to date. */
f6e332e6 8925 elf_gc_propagate_vtable_entries_used (h->vtable->parent, okp);
c152c796 8926
f6e332e6 8927 if (h->vtable->used == NULL)
c152c796
AM
8928 {
8929 /* None of this table's entries were referenced. Re-use the
8930 parent's table. */
f6e332e6
AM
8931 h->vtable->used = h->vtable->parent->vtable->used;
8932 h->vtable->size = h->vtable->parent->vtable->size;
c152c796
AM
8933 }
8934 else
8935 {
8936 size_t n;
8937 bfd_boolean *cu, *pu;
8938
8939 /* Or the parent's entries into ours. */
f6e332e6 8940 cu = h->vtable->used;
c152c796 8941 cu[-1] = TRUE;
f6e332e6 8942 pu = h->vtable->parent->vtable->used;
c152c796
AM
8943 if (pu != NULL)
8944 {
8945 const struct elf_backend_data *bed;
8946 unsigned int log_file_align;
8947
8948 bed = get_elf_backend_data (h->root.u.def.section->owner);
8949 log_file_align = bed->s->log_file_align;
f6e332e6 8950 n = h->vtable->parent->vtable->size >> log_file_align;
c152c796
AM
8951 while (n--)
8952 {
8953 if (*pu)
8954 *cu = TRUE;
8955 pu++;
8956 cu++;
8957 }
8958 }
8959 }
8960
8961 return TRUE;
8962}
8963
8964static bfd_boolean
8965elf_gc_smash_unused_vtentry_relocs (struct elf_link_hash_entry *h, void *okp)
8966{
8967 asection *sec;
8968 bfd_vma hstart, hend;
8969 Elf_Internal_Rela *relstart, *relend, *rel;
8970 const struct elf_backend_data *bed;
8971 unsigned int log_file_align;
8972
8973 if (h->root.type == bfd_link_hash_warning)
8974 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8975
8976 /* Take care of both those symbols that do not describe vtables as
8977 well as those that are not loaded. */
f6e332e6 8978 if (h->vtable == NULL || h->vtable->parent == NULL)
c152c796
AM
8979 return TRUE;
8980
8981 BFD_ASSERT (h->root.type == bfd_link_hash_defined
8982 || h->root.type == bfd_link_hash_defweak);
8983
8984 sec = h->root.u.def.section;
8985 hstart = h->root.u.def.value;
8986 hend = hstart + h->size;
8987
8988 relstart = _bfd_elf_link_read_relocs (sec->owner, sec, NULL, NULL, TRUE);
8989 if (!relstart)
8990 return *(bfd_boolean *) okp = FALSE;
8991 bed = get_elf_backend_data (sec->owner);
8992 log_file_align = bed->s->log_file_align;
8993
8994 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
8995
8996 for (rel = relstart; rel < relend; ++rel)
8997 if (rel->r_offset >= hstart && rel->r_offset < hend)
8998 {
8999 /* If the entry is in use, do nothing. */
f6e332e6
AM
9000 if (h->vtable->used
9001 && (rel->r_offset - hstart) < h->vtable->size)
c152c796
AM
9002 {
9003 bfd_vma entry = (rel->r_offset - hstart) >> log_file_align;
f6e332e6 9004 if (h->vtable->used[entry])
c152c796
AM
9005 continue;
9006 }
9007 /* Otherwise, kill it. */
9008 rel->r_offset = rel->r_info = rel->r_addend = 0;
9009 }
9010
9011 return TRUE;
9012}
9013
715df9b8
EB
9014/* Mark sections containing dynamically referenced symbols. This is called
9015 through elf_link_hash_traverse. */
9016
9017static bfd_boolean
9018elf_gc_mark_dynamic_ref_symbol (struct elf_link_hash_entry *h,
9019 void *okp ATTRIBUTE_UNUSED)
9020{
9021 if (h->root.type == bfd_link_hash_warning)
9022 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9023
9024 if ((h->root.type == bfd_link_hash_defined
9025 || h->root.type == bfd_link_hash_defweak)
f5385ebf 9026 && h->ref_dynamic)
715df9b8
EB
9027 h->root.u.def.section->flags |= SEC_KEEP;
9028
9029 return TRUE;
9030}
57316bff
L
9031
9032/* Mark sections containing global symbols. This is called through
9033 elf_link_hash_traverse. */
715df9b8 9034
57316bff
L
9035static bfd_boolean
9036elf_mark_used_section (struct elf_link_hash_entry *h,
554220db 9037 void *data ATTRIBUTE_UNUSED)
57316bff
L
9038{
9039 if (h->root.type == bfd_link_hash_warning)
9040 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9041
554220db
AM
9042 if (h->root.type == bfd_link_hash_defined
9043 || h->root.type == bfd_link_hash_defweak)
57316bff 9044 {
554220db 9045 asection *s = h->root.u.def.section;
7451fd89 9046 if (s != NULL && s->output_section != NULL)
554220db 9047 s->output_section->flags |= SEC_KEEP;
57316bff
L
9048 }
9049
9050 return TRUE;
9051}
9052
c152c796
AM
9053/* Do mark and sweep of unused sections. */
9054
9055bfd_boolean
9056bfd_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
9057{
9058 bfd_boolean ok = TRUE;
9059 bfd *sub;
9060 asection * (*gc_mark_hook)
9061 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
9062 struct elf_link_hash_entry *h, Elf_Internal_Sym *);
9063
57316bff
L
9064 if (!info->gc_sections)
9065 {
9066 /* If we are called when info->gc_sections is 0, we will mark
554220db 9067 all sections containing global symbols for non-relocatable
57316bff
L
9068 link. */
9069 if (!info->relocatable)
9070 elf_link_hash_traverse (elf_hash_table (info),
9071 elf_mark_used_section, NULL);
9072 return TRUE;
9073 }
9074
c152c796
AM
9075 if (!get_elf_backend_data (abfd)->can_gc_sections
9076 || info->relocatable
9077 || info->emitrelocations
715df9b8
EB
9078 || info->shared
9079 || !is_elf_hash_table (info->hash))
c152c796
AM
9080 {
9081 (*_bfd_error_handler)(_("Warning: gc-sections option ignored"));
9082 return TRUE;
9083 }
9084
9085 /* Apply transitive closure to the vtable entry usage info. */
9086 elf_link_hash_traverse (elf_hash_table (info),
9087 elf_gc_propagate_vtable_entries_used,
9088 &ok);
9089 if (!ok)
9090 return FALSE;
9091
9092 /* Kill the vtable relocations that were not used. */
9093 elf_link_hash_traverse (elf_hash_table (info),
9094 elf_gc_smash_unused_vtentry_relocs,
9095 &ok);
9096 if (!ok)
9097 return FALSE;
9098
715df9b8
EB
9099 /* Mark dynamically referenced symbols. */
9100 if (elf_hash_table (info)->dynamic_sections_created)
9101 elf_link_hash_traverse (elf_hash_table (info),
9102 elf_gc_mark_dynamic_ref_symbol,
9103 &ok);
9104 if (!ok)
9105 return FALSE;
c152c796 9106
715df9b8 9107 /* Grovel through relocs to find out who stays ... */
c152c796
AM
9108 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
9109 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
9110 {
9111 asection *o;
9112
9113 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
9114 continue;
9115
9116 for (o = sub->sections; o != NULL; o = o->next)
9117 {
9118 if (o->flags & SEC_KEEP)
715df9b8
EB
9119 {
9120 /* _bfd_elf_discard_section_eh_frame knows how to discard
9121 orphaned FDEs so don't mark sections referenced by the
9122 EH frame section. */
9123 if (strcmp (o->name, ".eh_frame") == 0)
9124 o->gc_mark = 1;
ccfa59ea 9125 else if (!_bfd_elf_gc_mark (info, o, gc_mark_hook))
715df9b8
EB
9126 return FALSE;
9127 }
c152c796
AM
9128 }
9129 }
9130
9131 /* ... and mark SEC_EXCLUDE for those that go. */
9132 if (!elf_gc_sweep (info, get_elf_backend_data (abfd)->gc_sweep_hook))
9133 return FALSE;
9134
9135 return TRUE;
9136}
9137\f
9138/* Called from check_relocs to record the existence of a VTINHERIT reloc. */
9139
9140bfd_boolean
9141bfd_elf_gc_record_vtinherit (bfd *abfd,
9142 asection *sec,
9143 struct elf_link_hash_entry *h,
9144 bfd_vma offset)
9145{
9146 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
9147 struct elf_link_hash_entry **search, *child;
9148 bfd_size_type extsymcount;
9149 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9150
9151 /* The sh_info field of the symtab header tells us where the
9152 external symbols start. We don't care about the local symbols at
9153 this point. */
9154 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size / bed->s->sizeof_sym;
9155 if (!elf_bad_symtab (abfd))
9156 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
9157
9158 sym_hashes = elf_sym_hashes (abfd);
9159 sym_hashes_end = sym_hashes + extsymcount;
9160
9161 /* Hunt down the child symbol, which is in this section at the same
9162 offset as the relocation. */
9163 for (search = sym_hashes; search != sym_hashes_end; ++search)
9164 {
9165 if ((child = *search) != NULL
9166 && (child->root.type == bfd_link_hash_defined
9167 || child->root.type == bfd_link_hash_defweak)
9168 && child->root.u.def.section == sec
9169 && child->root.u.def.value == offset)
9170 goto win;
9171 }
9172
d003868e
AM
9173 (*_bfd_error_handler) ("%B: %A+%lu: No symbol found for INHERIT",
9174 abfd, sec, (unsigned long) offset);
c152c796
AM
9175 bfd_set_error (bfd_error_invalid_operation);
9176 return FALSE;
9177
9178 win:
f6e332e6
AM
9179 if (!child->vtable)
9180 {
9181 child->vtable = bfd_zalloc (abfd, sizeof (*child->vtable));
9182 if (!child->vtable)
9183 return FALSE;
9184 }
c152c796
AM
9185 if (!h)
9186 {
9187 /* This *should* only be the absolute section. It could potentially
9188 be that someone has defined a non-global vtable though, which
9189 would be bad. It isn't worth paging in the local symbols to be
9190 sure though; that case should simply be handled by the assembler. */
9191
f6e332e6 9192 child->vtable->parent = (struct elf_link_hash_entry *) -1;
c152c796
AM
9193 }
9194 else
f6e332e6 9195 child->vtable->parent = h;
c152c796
AM
9196
9197 return TRUE;
9198}
9199
9200/* Called from check_relocs to record the existence of a VTENTRY reloc. */
9201
9202bfd_boolean
9203bfd_elf_gc_record_vtentry (bfd *abfd ATTRIBUTE_UNUSED,
9204 asection *sec ATTRIBUTE_UNUSED,
9205 struct elf_link_hash_entry *h,
9206 bfd_vma addend)
9207{
9208 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9209 unsigned int log_file_align = bed->s->log_file_align;
9210
f6e332e6
AM
9211 if (!h->vtable)
9212 {
9213 h->vtable = bfd_zalloc (abfd, sizeof (*h->vtable));
9214 if (!h->vtable)
9215 return FALSE;
9216 }
9217
9218 if (addend >= h->vtable->size)
c152c796
AM
9219 {
9220 size_t size, bytes, file_align;
f6e332e6 9221 bfd_boolean *ptr = h->vtable->used;
c152c796
AM
9222
9223 /* While the symbol is undefined, we have to be prepared to handle
9224 a zero size. */
9225 file_align = 1 << log_file_align;
9226 if (h->root.type == bfd_link_hash_undefined)
9227 size = addend + file_align;
9228 else
9229 {
9230 size = h->size;
9231 if (addend >= size)
9232 {
9233 /* Oops! We've got a reference past the defined end of
9234 the table. This is probably a bug -- shall we warn? */
9235 size = addend + file_align;
9236 }
9237 }
9238 size = (size + file_align - 1) & -file_align;
9239
9240 /* Allocate one extra entry for use as a "done" flag for the
9241 consolidation pass. */
9242 bytes = ((size >> log_file_align) + 1) * sizeof (bfd_boolean);
9243
9244 if (ptr)
9245 {
9246 ptr = bfd_realloc (ptr - 1, bytes);
9247
9248 if (ptr != NULL)
9249 {
9250 size_t oldbytes;
9251
f6e332e6 9252 oldbytes = (((h->vtable->size >> log_file_align) + 1)
c152c796
AM
9253 * sizeof (bfd_boolean));
9254 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
9255 }
9256 }
9257 else
9258 ptr = bfd_zmalloc (bytes);
9259
9260 if (ptr == NULL)
9261 return FALSE;
9262
9263 /* And arrange for that done flag to be at index -1. */
f6e332e6
AM
9264 h->vtable->used = ptr + 1;
9265 h->vtable->size = size;
c152c796
AM
9266 }
9267
f6e332e6 9268 h->vtable->used[addend >> log_file_align] = TRUE;
c152c796
AM
9269
9270 return TRUE;
9271}
9272
9273struct alloc_got_off_arg {
9274 bfd_vma gotoff;
9275 unsigned int got_elt_size;
9276};
9277
9278/* We need a special top-level link routine to convert got reference counts
9279 to real got offsets. */
9280
9281static bfd_boolean
9282elf_gc_allocate_got_offsets (struct elf_link_hash_entry *h, void *arg)
9283{
9284 struct alloc_got_off_arg *gofarg = arg;
9285
9286 if (h->root.type == bfd_link_hash_warning)
9287 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9288
9289 if (h->got.refcount > 0)
9290 {
9291 h->got.offset = gofarg->gotoff;
9292 gofarg->gotoff += gofarg->got_elt_size;
9293 }
9294 else
9295 h->got.offset = (bfd_vma) -1;
9296
9297 return TRUE;
9298}
9299
9300/* And an accompanying bit to work out final got entry offsets once
9301 we're done. Should be called from final_link. */
9302
9303bfd_boolean
9304bfd_elf_gc_common_finalize_got_offsets (bfd *abfd,
9305 struct bfd_link_info *info)
9306{
9307 bfd *i;
9308 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9309 bfd_vma gotoff;
9310 unsigned int got_elt_size = bed->s->arch_size / 8;
9311 struct alloc_got_off_arg gofarg;
9312
9313 if (! is_elf_hash_table (info->hash))
9314 return FALSE;
9315
9316 /* The GOT offset is relative to the .got section, but the GOT header is
9317 put into the .got.plt section, if the backend uses it. */
9318 if (bed->want_got_plt)
9319 gotoff = 0;
9320 else
9321 gotoff = bed->got_header_size;
9322
9323 /* Do the local .got entries first. */
9324 for (i = info->input_bfds; i; i = i->link_next)
9325 {
9326 bfd_signed_vma *local_got;
9327 bfd_size_type j, locsymcount;
9328 Elf_Internal_Shdr *symtab_hdr;
9329
9330 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
9331 continue;
9332
9333 local_got = elf_local_got_refcounts (i);
9334 if (!local_got)
9335 continue;
9336
9337 symtab_hdr = &elf_tdata (i)->symtab_hdr;
9338 if (elf_bad_symtab (i))
9339 locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
9340 else
9341 locsymcount = symtab_hdr->sh_info;
9342
9343 for (j = 0; j < locsymcount; ++j)
9344 {
9345 if (local_got[j] > 0)
9346 {
9347 local_got[j] = gotoff;
9348 gotoff += got_elt_size;
9349 }
9350 else
9351 local_got[j] = (bfd_vma) -1;
9352 }
9353 }
9354
9355 /* Then the global .got entries. .plt refcounts are handled by
9356 adjust_dynamic_symbol */
9357 gofarg.gotoff = gotoff;
9358 gofarg.got_elt_size = got_elt_size;
9359 elf_link_hash_traverse (elf_hash_table (info),
9360 elf_gc_allocate_got_offsets,
9361 &gofarg);
9362 return TRUE;
9363}
9364
9365/* Many folk need no more in the way of final link than this, once
9366 got entry reference counting is enabled. */
9367
9368bfd_boolean
9369bfd_elf_gc_common_final_link (bfd *abfd, struct bfd_link_info *info)
9370{
9371 if (!bfd_elf_gc_common_finalize_got_offsets (abfd, info))
9372 return FALSE;
9373
9374 /* Invoke the regular ELF backend linker to do all the work. */
9375 return bfd_elf_final_link (abfd, info);
9376}
9377
9378bfd_boolean
9379bfd_elf_reloc_symbol_deleted_p (bfd_vma offset, void *cookie)
9380{
9381 struct elf_reloc_cookie *rcookie = cookie;
9382
9383 if (rcookie->bad_symtab)
9384 rcookie->rel = rcookie->rels;
9385
9386 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
9387 {
9388 unsigned long r_symndx;
9389
9390 if (! rcookie->bad_symtab)
9391 if (rcookie->rel->r_offset > offset)
9392 return FALSE;
9393 if (rcookie->rel->r_offset != offset)
9394 continue;
9395
9396 r_symndx = rcookie->rel->r_info >> rcookie->r_sym_shift;
9397 if (r_symndx == SHN_UNDEF)
9398 return TRUE;
9399
9400 if (r_symndx >= rcookie->locsymcount
9401 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
9402 {
9403 struct elf_link_hash_entry *h;
9404
9405 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
9406
9407 while (h->root.type == bfd_link_hash_indirect
9408 || h->root.type == bfd_link_hash_warning)
9409 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9410
9411 if ((h->root.type == bfd_link_hash_defined
9412 || h->root.type == bfd_link_hash_defweak)
9413 && elf_discarded_section (h->root.u.def.section))
9414 return TRUE;
9415 else
9416 return FALSE;
9417 }
9418 else
9419 {
9420 /* It's not a relocation against a global symbol,
9421 but it could be a relocation against a local
9422 symbol for a discarded section. */
9423 asection *isec;
9424 Elf_Internal_Sym *isym;
9425
9426 /* Need to: get the symbol; get the section. */
9427 isym = &rcookie->locsyms[r_symndx];
9428 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
9429 {
9430 isec = bfd_section_from_elf_index (rcookie->abfd, isym->st_shndx);
9431 if (isec != NULL && elf_discarded_section (isec))
9432 return TRUE;
9433 }
9434 }
9435 return FALSE;
9436 }
9437 return FALSE;
9438}
9439
9440/* Discard unneeded references to discarded sections.
9441 Returns TRUE if any section's size was changed. */
9442/* This function assumes that the relocations are in sorted order,
9443 which is true for all known assemblers. */
9444
9445bfd_boolean
9446bfd_elf_discard_info (bfd *output_bfd, struct bfd_link_info *info)
9447{
9448 struct elf_reloc_cookie cookie;
9449 asection *stab, *eh;
9450 Elf_Internal_Shdr *symtab_hdr;
9451 const struct elf_backend_data *bed;
9452 bfd *abfd;
9453 unsigned int count;
9454 bfd_boolean ret = FALSE;
9455
9456 if (info->traditional_format
9457 || !is_elf_hash_table (info->hash))
9458 return FALSE;
9459
9460 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
9461 {
9462 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
9463 continue;
9464
9465 bed = get_elf_backend_data (abfd);
9466
9467 if ((abfd->flags & DYNAMIC) != 0)
9468 continue;
9469
9470 eh = bfd_get_section_by_name (abfd, ".eh_frame");
9471 if (info->relocatable
9472 || (eh != NULL
eea6121a 9473 && (eh->size == 0
c152c796
AM
9474 || bfd_is_abs_section (eh->output_section))))
9475 eh = NULL;
9476
9477 stab = bfd_get_section_by_name (abfd, ".stab");
9478 if (stab != NULL
eea6121a 9479 && (stab->size == 0
c152c796
AM
9480 || bfd_is_abs_section (stab->output_section)
9481 || stab->sec_info_type != ELF_INFO_TYPE_STABS))
9482 stab = NULL;
9483
9484 if (stab == NULL
9485 && eh == NULL
9486 && bed->elf_backend_discard_info == NULL)
9487 continue;
9488
9489 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
9490 cookie.abfd = abfd;
9491 cookie.sym_hashes = elf_sym_hashes (abfd);
9492 cookie.bad_symtab = elf_bad_symtab (abfd);
9493 if (cookie.bad_symtab)
9494 {
9495 cookie.locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
9496 cookie.extsymoff = 0;
9497 }
9498 else
9499 {
9500 cookie.locsymcount = symtab_hdr->sh_info;
9501 cookie.extsymoff = symtab_hdr->sh_info;
9502 }
9503
9504 if (bed->s->arch_size == 32)
9505 cookie.r_sym_shift = 8;
9506 else
9507 cookie.r_sym_shift = 32;
9508
9509 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
9510 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
9511 {
9512 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
9513 cookie.locsymcount, 0,
9514 NULL, NULL, NULL);
9515 if (cookie.locsyms == NULL)
9516 return FALSE;
9517 }
9518
9519 if (stab != NULL)
9520 {
9521 cookie.rels = NULL;
9522 count = stab->reloc_count;
9523 if (count != 0)
9524 cookie.rels = _bfd_elf_link_read_relocs (abfd, stab, NULL, NULL,
9525 info->keep_memory);
9526 if (cookie.rels != NULL)
9527 {
9528 cookie.rel = cookie.rels;
9529 cookie.relend = cookie.rels;
9530 cookie.relend += count * bed->s->int_rels_per_ext_rel;
9531 if (_bfd_discard_section_stabs (abfd, stab,
9532 elf_section_data (stab)->sec_info,
9533 bfd_elf_reloc_symbol_deleted_p,
9534 &cookie))
9535 ret = TRUE;
9536 if (elf_section_data (stab)->relocs != cookie.rels)
9537 free (cookie.rels);
9538 }
9539 }
9540
9541 if (eh != NULL)
9542 {
9543 cookie.rels = NULL;
9544 count = eh->reloc_count;
9545 if (count != 0)
9546 cookie.rels = _bfd_elf_link_read_relocs (abfd, eh, NULL, NULL,
9547 info->keep_memory);
9548 cookie.rel = cookie.rels;
9549 cookie.relend = cookie.rels;
9550 if (cookie.rels != NULL)
9551 cookie.relend += count * bed->s->int_rels_per_ext_rel;
9552
9553 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh,
9554 bfd_elf_reloc_symbol_deleted_p,
9555 &cookie))
9556 ret = TRUE;
9557
9558 if (cookie.rels != NULL
9559 && elf_section_data (eh)->relocs != cookie.rels)
9560 free (cookie.rels);
9561 }
9562
9563 if (bed->elf_backend_discard_info != NULL
9564 && (*bed->elf_backend_discard_info) (abfd, &cookie, info))
9565 ret = TRUE;
9566
9567 if (cookie.locsyms != NULL
9568 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
9569 {
9570 if (! info->keep_memory)
9571 free (cookie.locsyms);
9572 else
9573 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
9574 }
9575 }
9576
9577 if (info->eh_frame_hdr
9578 && !info->relocatable
9579 && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info))
9580 ret = TRUE;
9581
9582 return ret;
9583}
082b7297
L
9584
9585void
9586_bfd_elf_section_already_linked (bfd *abfd, struct bfd_section * sec)
9587{
9588 flagword flags;
6d2cd210 9589 const char *name, *p;
082b7297
L
9590 struct bfd_section_already_linked *l;
9591 struct bfd_section_already_linked_hash_entry *already_linked_list;
3d7f7666
L
9592 asection *group;
9593
9594 /* A single member comdat group section may be discarded by a
9595 linkonce section. See below. */
9596 if (sec->output_section == bfd_abs_section_ptr)
9597 return;
082b7297
L
9598
9599 flags = sec->flags;
3d7f7666
L
9600
9601 /* Check if it belongs to a section group. */
9602 group = elf_sec_group (sec);
9603
9604 /* Return if it isn't a linkonce section nor a member of a group. A
9605 comdat group section also has SEC_LINK_ONCE set. */
9606 if ((flags & SEC_LINK_ONCE) == 0 && group == NULL)
082b7297
L
9607 return;
9608
3d7f7666
L
9609 if (group)
9610 {
9611 /* If this is the member of a single member comdat group, check if
9612 the group should be discarded. */
9613 if (elf_next_in_group (sec) == sec
9614 && (group->flags & SEC_LINK_ONCE) != 0)
9615 sec = group;
9616 else
9617 return;
9618 }
9619
082b7297
L
9620 /* FIXME: When doing a relocatable link, we may have trouble
9621 copying relocations in other sections that refer to local symbols
9622 in the section being discarded. Those relocations will have to
9623 be converted somehow; as of this writing I'm not sure that any of
9624 the backends handle that correctly.
9625
9626 It is tempting to instead not discard link once sections when
9627 doing a relocatable link (technically, they should be discarded
9628 whenever we are building constructors). However, that fails,
9629 because the linker winds up combining all the link once sections
9630 into a single large link once section, which defeats the purpose
9631 of having link once sections in the first place.
9632
9633 Also, not merging link once sections in a relocatable link
9634 causes trouble for MIPS ELF, which relies on link once semantics
9635 to handle the .reginfo section correctly. */
9636
9637 name = bfd_get_section_name (abfd, sec);
9638
6d2cd210
JJ
9639 if (strncmp (name, ".gnu.linkonce.", sizeof (".gnu.linkonce.") - 1) == 0
9640 && (p = strchr (name + sizeof (".gnu.linkonce.") - 1, '.')) != NULL)
9641 p++;
9642 else
9643 p = name;
9644
9645 already_linked_list = bfd_section_already_linked_table_lookup (p);
082b7297
L
9646
9647 for (l = already_linked_list->entry; l != NULL; l = l->next)
9648 {
9649 /* We may have 3 different sections on the list: group section,
9650 comdat section and linkonce section. SEC may be a linkonce or
9651 group section. We match a group section with a group section,
9652 a linkonce section with a linkonce section, and ignore comdat
9653 section. */
3d7f7666 9654 if ((flags & SEC_GROUP) == (l->sec->flags & SEC_GROUP)
6d2cd210 9655 && strcmp (name, l->sec->name) == 0
082b7297
L
9656 && bfd_coff_get_comdat_section (l->sec->owner, l->sec) == NULL)
9657 {
9658 /* The section has already been linked. See if we should
6d2cd210 9659 issue a warning. */
082b7297
L
9660 switch (flags & SEC_LINK_DUPLICATES)
9661 {
9662 default:
9663 abort ();
9664
9665 case SEC_LINK_DUPLICATES_DISCARD:
9666 break;
9667
9668 case SEC_LINK_DUPLICATES_ONE_ONLY:
9669 (*_bfd_error_handler)
c93625e2 9670 (_("%B: ignoring duplicate section `%A'"),
d003868e 9671 abfd, sec);
082b7297
L
9672 break;
9673
9674 case SEC_LINK_DUPLICATES_SAME_SIZE:
9675 if (sec->size != l->sec->size)
9676 (*_bfd_error_handler)
c93625e2 9677 (_("%B: duplicate section `%A' has different size"),
d003868e 9678 abfd, sec);
082b7297 9679 break;
ea5158d8
DJ
9680
9681 case SEC_LINK_DUPLICATES_SAME_CONTENTS:
9682 if (sec->size != l->sec->size)
9683 (*_bfd_error_handler)
c93625e2 9684 (_("%B: duplicate section `%A' has different size"),
ea5158d8
DJ
9685 abfd, sec);
9686 else if (sec->size != 0)
9687 {
9688 bfd_byte *sec_contents, *l_sec_contents;
9689
9690 if (!bfd_malloc_and_get_section (abfd, sec, &sec_contents))
9691 (*_bfd_error_handler)
c93625e2 9692 (_("%B: warning: could not read contents of section `%A'"),
ea5158d8
DJ
9693 abfd, sec);
9694 else if (!bfd_malloc_and_get_section (l->sec->owner, l->sec,
9695 &l_sec_contents))
9696 (*_bfd_error_handler)
c93625e2 9697 (_("%B: warning: could not read contents of section `%A'"),
ea5158d8
DJ
9698 l->sec->owner, l->sec);
9699 else if (memcmp (sec_contents, l_sec_contents, sec->size) != 0)
9700 (*_bfd_error_handler)
c93625e2 9701 (_("%B: warning: duplicate section `%A' has different contents"),
ea5158d8
DJ
9702 abfd, sec);
9703
9704 if (sec_contents)
9705 free (sec_contents);
9706 if (l_sec_contents)
9707 free (l_sec_contents);
9708 }
9709 break;
082b7297
L
9710 }
9711
9712 /* Set the output_section field so that lang_add_section
9713 does not create a lang_input_section structure for this
9714 section. Since there might be a symbol in the section
9715 being discarded, we must retain a pointer to the section
9716 which we are really going to use. */
9717 sec->output_section = bfd_abs_section_ptr;
9718 sec->kept_section = l->sec;
9719
9720 if (flags & SEC_GROUP)
3d7f7666
L
9721 {
9722 asection *first = elf_next_in_group (sec);
9723 asection *s = first;
9724
9725 while (s != NULL)
9726 {
9727 s->output_section = bfd_abs_section_ptr;
9728 /* Record which group discards it. */
9729 s->kept_section = l->sec;
9730 s = elf_next_in_group (s);
9731 /* These lists are circular. */
9732 if (s == first)
9733 break;
9734 }
9735 }
082b7297
L
9736
9737 return;
9738 }
9739 }
9740
3d7f7666
L
9741 if (group)
9742 {
9743 /* If this is the member of a single member comdat group and the
9744 group hasn't be discarded, we check if it matches a linkonce
9745 section. We only record the discarded comdat group. Otherwise
9746 the undiscarded group will be discarded incorrectly later since
9747 itself has been recorded. */
6d2cd210
JJ
9748 for (l = already_linked_list->entry; l != NULL; l = l->next)
9749 if ((l->sec->flags & SEC_GROUP) == 0
9750 && bfd_coff_get_comdat_section (l->sec->owner, l->sec) == NULL
9751 && bfd_elf_match_symbols_in_sections (l->sec,
9752 elf_next_in_group (sec)))
9753 {
9754 elf_next_in_group (sec)->output_section = bfd_abs_section_ptr;
9755 elf_next_in_group (sec)->kept_section = l->sec;
9756 group->output_section = bfd_abs_section_ptr;
9757 break;
9758 }
9759 if (l == NULL)
3d7f7666
L
9760 return;
9761 }
9762 else
9763 /* There is no direct match. But for linkonce section, we should
9764 check if there is a match with comdat group member. We always
9765 record the linkonce section, discarded or not. */
6d2cd210
JJ
9766 for (l = already_linked_list->entry; l != NULL; l = l->next)
9767 if (l->sec->flags & SEC_GROUP)
9768 {
9769 asection *first = elf_next_in_group (l->sec);
9770
9771 if (first != NULL
9772 && elf_next_in_group (first) == first
9773 && bfd_elf_match_symbols_in_sections (first, sec))
9774 {
9775 sec->output_section = bfd_abs_section_ptr;
9776 sec->kept_section = l->sec;
9777 break;
9778 }
9779 }
9780
082b7297
L
9781 /* This is the first section with this name. Record it. */
9782 bfd_section_already_linked_table_insert (already_linked_list, sec);
9783}
81e1b023
L
9784
9785/* Set NAME to VAL if the symbol exists and is undefined. */
9786
9787void
9788_bfd_elf_provide_symbol (struct bfd_link_info *info, const char *name,
9789 bfd_vma val)
9790{
9791 struct elf_link_hash_entry *h;
9792 h = elf_link_hash_lookup (elf_hash_table (info), name, FALSE, FALSE,
9793 FALSE);
9794 if (h != NULL && h->root.type == bfd_link_hash_undefined)
9795 {
9796 h->root.type = bfd_link_hash_defined;
9797 h->root.u.def.section = bfd_abs_section_ptr;
9798 h->root.u.def.value = val;
9799 h->def_regular = 1;
9800 h->type = STT_OBJECT;
9801 h->other = STV_HIDDEN | (h->other & ~ ELF_ST_VISIBILITY (-1));
9802 h->forced_local = 1;
9803 }
9804}