*** empty log message ***
[deliverable/binutils-gdb.git] / bfd / elflink.c
CommitLineData
252b5132 1/* ELF linking support for BFD.
64d03ab5
AM
2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
3 2005, 2006 Free Software Foundation, Inc.
252b5132 4
8fdd7217 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
8fdd7217
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
252b5132 11
8fdd7217
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
8fdd7217
NC
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
3e110533 19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
252b5132
RH
20
21#include "bfd.h"
22#include "sysdep.h"
23#include "bfdlink.h"
24#include "libbfd.h"
25#define ARCH_SIZE 0
26#include "elf-bfd.h"
4ad4eba5 27#include "safe-ctype.h"
ccf2f652 28#include "libiberty.h"
66eb6687 29#include "objalloc.h"
252b5132 30
d98685ac
AM
31/* Define a symbol in a dynamic linkage section. */
32
33struct elf_link_hash_entry *
34_bfd_elf_define_linkage_sym (bfd *abfd,
35 struct bfd_link_info *info,
36 asection *sec,
37 const char *name)
38{
39 struct elf_link_hash_entry *h;
40 struct bfd_link_hash_entry *bh;
ccabcbe5 41 const struct elf_backend_data *bed;
d98685ac
AM
42
43 h = elf_link_hash_lookup (elf_hash_table (info), name, FALSE, FALSE, FALSE);
44 if (h != NULL)
45 {
46 /* Zap symbol defined in an as-needed lib that wasn't linked.
47 This is a symptom of a larger problem: Absolute symbols
48 defined in shared libraries can't be overridden, because we
49 lose the link to the bfd which is via the symbol section. */
50 h->root.type = bfd_link_hash_new;
51 }
52
53 bh = &h->root;
54 if (!_bfd_generic_link_add_one_symbol (info, abfd, name, BSF_GLOBAL,
55 sec, 0, NULL, FALSE,
56 get_elf_backend_data (abfd)->collect,
57 &bh))
58 return NULL;
59 h = (struct elf_link_hash_entry *) bh;
60 h->def_regular = 1;
61 h->type = STT_OBJECT;
62 h->other = (h->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
63
ccabcbe5
AM
64 bed = get_elf_backend_data (abfd);
65 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
d98685ac
AM
66 return h;
67}
68
b34976b6 69bfd_boolean
268b6b39 70_bfd_elf_create_got_section (bfd *abfd, struct bfd_link_info *info)
252b5132
RH
71{
72 flagword flags;
aad5d350 73 asection *s;
252b5132 74 struct elf_link_hash_entry *h;
9c5bfbb7 75 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
76 int ptralign;
77
78 /* This function may be called more than once. */
aad5d350
AM
79 s = bfd_get_section_by_name (abfd, ".got");
80 if (s != NULL && (s->flags & SEC_LINKER_CREATED) != 0)
b34976b6 81 return TRUE;
252b5132
RH
82
83 switch (bed->s->arch_size)
84 {
bb0deeff
AO
85 case 32:
86 ptralign = 2;
87 break;
88
89 case 64:
90 ptralign = 3;
91 break;
92
93 default:
94 bfd_set_error (bfd_error_bad_value);
b34976b6 95 return FALSE;
252b5132
RH
96 }
97
e5a52504 98 flags = bed->dynamic_sec_flags;
252b5132 99
3496cb2a 100 s = bfd_make_section_with_flags (abfd, ".got", flags);
252b5132 101 if (s == NULL
252b5132 102 || !bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 103 return FALSE;
252b5132
RH
104
105 if (bed->want_got_plt)
106 {
3496cb2a 107 s = bfd_make_section_with_flags (abfd, ".got.plt", flags);
252b5132 108 if (s == NULL
252b5132 109 || !bfd_set_section_alignment (abfd, s, ptralign))
b34976b6 110 return FALSE;
252b5132
RH
111 }
112
2517a57f
AM
113 if (bed->want_got_sym)
114 {
115 /* Define the symbol _GLOBAL_OFFSET_TABLE_ at the start of the .got
116 (or .got.plt) section. We don't do this in the linker script
117 because we don't want to define the symbol if we are not creating
118 a global offset table. */
d98685ac 119 h = _bfd_elf_define_linkage_sym (abfd, info, s, "_GLOBAL_OFFSET_TABLE_");
2517a57f 120 elf_hash_table (info)->hgot = h;
d98685ac
AM
121 if (h == NULL)
122 return FALSE;
2517a57f 123 }
252b5132
RH
124
125 /* The first bit of the global offset table is the header. */
3b36f7e6 126 s->size += bed->got_header_size;
252b5132 127
b34976b6 128 return TRUE;
252b5132
RH
129}
130\f
7e9f0867
AM
131/* Create a strtab to hold the dynamic symbol names. */
132static bfd_boolean
133_bfd_elf_link_create_dynstrtab (bfd *abfd, struct bfd_link_info *info)
134{
135 struct elf_link_hash_table *hash_table;
136
137 hash_table = elf_hash_table (info);
138 if (hash_table->dynobj == NULL)
139 hash_table->dynobj = abfd;
140
141 if (hash_table->dynstr == NULL)
142 {
143 hash_table->dynstr = _bfd_elf_strtab_init ();
144 if (hash_table->dynstr == NULL)
145 return FALSE;
146 }
147 return TRUE;
148}
149
45d6a902
AM
150/* Create some sections which will be filled in with dynamic linking
151 information. ABFD is an input file which requires dynamic sections
152 to be created. The dynamic sections take up virtual memory space
153 when the final executable is run, so we need to create them before
154 addresses are assigned to the output sections. We work out the
155 actual contents and size of these sections later. */
252b5132 156
b34976b6 157bfd_boolean
268b6b39 158_bfd_elf_link_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 159{
45d6a902
AM
160 flagword flags;
161 register asection *s;
9c5bfbb7 162 const struct elf_backend_data *bed;
252b5132 163
0eddce27 164 if (! is_elf_hash_table (info->hash))
45d6a902
AM
165 return FALSE;
166
167 if (elf_hash_table (info)->dynamic_sections_created)
168 return TRUE;
169
7e9f0867
AM
170 if (!_bfd_elf_link_create_dynstrtab (abfd, info))
171 return FALSE;
45d6a902 172
7e9f0867 173 abfd = elf_hash_table (info)->dynobj;
e5a52504
MM
174 bed = get_elf_backend_data (abfd);
175
176 flags = bed->dynamic_sec_flags;
45d6a902
AM
177
178 /* A dynamically linked executable has a .interp section, but a
179 shared library does not. */
36af4a4e 180 if (info->executable)
252b5132 181 {
3496cb2a
L
182 s = bfd_make_section_with_flags (abfd, ".interp",
183 flags | SEC_READONLY);
184 if (s == NULL)
45d6a902
AM
185 return FALSE;
186 }
bb0deeff 187
45d6a902
AM
188 /* Create sections to hold version informations. These are removed
189 if they are not needed. */
3496cb2a
L
190 s = bfd_make_section_with_flags (abfd, ".gnu.version_d",
191 flags | SEC_READONLY);
45d6a902 192 if (s == NULL
45d6a902
AM
193 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
194 return FALSE;
195
3496cb2a
L
196 s = bfd_make_section_with_flags (abfd, ".gnu.version",
197 flags | SEC_READONLY);
45d6a902 198 if (s == NULL
45d6a902
AM
199 || ! bfd_set_section_alignment (abfd, s, 1))
200 return FALSE;
201
3496cb2a
L
202 s = bfd_make_section_with_flags (abfd, ".gnu.version_r",
203 flags | SEC_READONLY);
45d6a902 204 if (s == NULL
45d6a902
AM
205 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
206 return FALSE;
207
3496cb2a
L
208 s = bfd_make_section_with_flags (abfd, ".dynsym",
209 flags | SEC_READONLY);
45d6a902 210 if (s == NULL
45d6a902
AM
211 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
212 return FALSE;
213
3496cb2a
L
214 s = bfd_make_section_with_flags (abfd, ".dynstr",
215 flags | SEC_READONLY);
216 if (s == NULL)
45d6a902
AM
217 return FALSE;
218
3496cb2a 219 s = bfd_make_section_with_flags (abfd, ".dynamic", flags);
45d6a902 220 if (s == NULL
45d6a902
AM
221 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
222 return FALSE;
223
224 /* The special symbol _DYNAMIC is always set to the start of the
77cfaee6
AM
225 .dynamic section. We could set _DYNAMIC in a linker script, but we
226 only want to define it if we are, in fact, creating a .dynamic
227 section. We don't want to define it if there is no .dynamic
228 section, since on some ELF platforms the start up code examines it
229 to decide how to initialize the process. */
d98685ac 230 if (!_bfd_elf_define_linkage_sym (abfd, info, s, "_DYNAMIC"))
45d6a902
AM
231 return FALSE;
232
fdc90cb4
JJ
233 if (info->emit_hash)
234 {
235 s = bfd_make_section_with_flags (abfd, ".hash", flags | SEC_READONLY);
236 if (s == NULL
237 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
238 return FALSE;
239 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
240 }
241
242 if (info->emit_gnu_hash)
243 {
244 s = bfd_make_section_with_flags (abfd, ".gnu.hash",
245 flags | SEC_READONLY);
246 if (s == NULL
247 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
248 return FALSE;
249 /* For 64-bit ELF, .gnu.hash is a non-uniform entity size section:
250 4 32-bit words followed by variable count of 64-bit words, then
251 variable count of 32-bit words. */
252 if (bed->s->arch_size == 64)
253 elf_section_data (s)->this_hdr.sh_entsize = 0;
254 else
255 elf_section_data (s)->this_hdr.sh_entsize = 4;
256 }
45d6a902
AM
257
258 /* Let the backend create the rest of the sections. This lets the
259 backend set the right flags. The backend will normally create
260 the .got and .plt sections. */
261 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
262 return FALSE;
263
264 elf_hash_table (info)->dynamic_sections_created = TRUE;
265
266 return TRUE;
267}
268
269/* Create dynamic sections when linking against a dynamic object. */
270
271bfd_boolean
268b6b39 272_bfd_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
45d6a902
AM
273{
274 flagword flags, pltflags;
7325306f 275 struct elf_link_hash_entry *h;
45d6a902 276 asection *s;
9c5bfbb7 277 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902 278
252b5132
RH
279 /* We need to create .plt, .rel[a].plt, .got, .got.plt, .dynbss, and
280 .rel[a].bss sections. */
e5a52504 281 flags = bed->dynamic_sec_flags;
252b5132
RH
282
283 pltflags = flags;
252b5132 284 if (bed->plt_not_loaded)
6df4d94c
MM
285 /* We do not clear SEC_ALLOC here because we still want the OS to
286 allocate space for the section; it's just that there's nothing
287 to read in from the object file. */
5d1634d7 288 pltflags &= ~ (SEC_CODE | SEC_LOAD | SEC_HAS_CONTENTS);
6df4d94c
MM
289 else
290 pltflags |= SEC_ALLOC | SEC_CODE | SEC_LOAD;
252b5132
RH
291 if (bed->plt_readonly)
292 pltflags |= SEC_READONLY;
293
3496cb2a 294 s = bfd_make_section_with_flags (abfd, ".plt", pltflags);
252b5132 295 if (s == NULL
252b5132 296 || ! bfd_set_section_alignment (abfd, s, bed->plt_alignment))
b34976b6 297 return FALSE;
252b5132 298
d98685ac
AM
299 /* Define the symbol _PROCEDURE_LINKAGE_TABLE_ at the start of the
300 .plt section. */
7325306f
RS
301 if (bed->want_plt_sym)
302 {
303 h = _bfd_elf_define_linkage_sym (abfd, info, s,
304 "_PROCEDURE_LINKAGE_TABLE_");
305 elf_hash_table (info)->hplt = h;
306 if (h == NULL)
307 return FALSE;
308 }
252b5132 309
3496cb2a
L
310 s = bfd_make_section_with_flags (abfd,
311 (bed->default_use_rela_p
312 ? ".rela.plt" : ".rel.plt"),
313 flags | SEC_READONLY);
252b5132 314 if (s == NULL
45d6a902 315 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
b34976b6 316 return FALSE;
252b5132
RH
317
318 if (! _bfd_elf_create_got_section (abfd, info))
b34976b6 319 return FALSE;
252b5132 320
3018b441
RH
321 if (bed->want_dynbss)
322 {
323 /* The .dynbss section is a place to put symbols which are defined
324 by dynamic objects, are referenced by regular objects, and are
325 not functions. We must allocate space for them in the process
326 image and use a R_*_COPY reloc to tell the dynamic linker to
327 initialize them at run time. The linker script puts the .dynbss
328 section into the .bss section of the final image. */
3496cb2a
L
329 s = bfd_make_section_with_flags (abfd, ".dynbss",
330 (SEC_ALLOC
331 | SEC_LINKER_CREATED));
332 if (s == NULL)
b34976b6 333 return FALSE;
252b5132 334
3018b441 335 /* The .rel[a].bss section holds copy relocs. This section is not
77cfaee6
AM
336 normally needed. We need to create it here, though, so that the
337 linker will map it to an output section. We can't just create it
338 only if we need it, because we will not know whether we need it
339 until we have seen all the input files, and the first time the
340 main linker code calls BFD after examining all the input files
341 (size_dynamic_sections) the input sections have already been
342 mapped to the output sections. If the section turns out not to
343 be needed, we can discard it later. We will never need this
344 section when generating a shared object, since they do not use
345 copy relocs. */
3018b441
RH
346 if (! info->shared)
347 {
3496cb2a
L
348 s = bfd_make_section_with_flags (abfd,
349 (bed->default_use_rela_p
350 ? ".rela.bss" : ".rel.bss"),
351 flags | SEC_READONLY);
3018b441 352 if (s == NULL
45d6a902 353 || ! bfd_set_section_alignment (abfd, s, bed->s->log_file_align))
b34976b6 354 return FALSE;
3018b441 355 }
252b5132
RH
356 }
357
b34976b6 358 return TRUE;
252b5132
RH
359}
360\f
252b5132
RH
361/* Record a new dynamic symbol. We record the dynamic symbols as we
362 read the input files, since we need to have a list of all of them
363 before we can determine the final sizes of the output sections.
364 Note that we may actually call this function even though we are not
365 going to output any dynamic symbols; in some cases we know that a
366 symbol should be in the dynamic symbol table, but only if there is
367 one. */
368
b34976b6 369bfd_boolean
c152c796
AM
370bfd_elf_link_record_dynamic_symbol (struct bfd_link_info *info,
371 struct elf_link_hash_entry *h)
252b5132
RH
372{
373 if (h->dynindx == -1)
374 {
2b0f7ef9 375 struct elf_strtab_hash *dynstr;
68b6ddd0 376 char *p;
252b5132 377 const char *name;
252b5132
RH
378 bfd_size_type indx;
379
7a13edea
NC
380 /* XXX: The ABI draft says the linker must turn hidden and
381 internal symbols into STB_LOCAL symbols when producing the
382 DSO. However, if ld.so honors st_other in the dynamic table,
383 this would not be necessary. */
384 switch (ELF_ST_VISIBILITY (h->other))
385 {
386 case STV_INTERNAL:
387 case STV_HIDDEN:
9d6eee78
L
388 if (h->root.type != bfd_link_hash_undefined
389 && h->root.type != bfd_link_hash_undefweak)
38048eb9 390 {
f5385ebf 391 h->forced_local = 1;
67687978
PB
392 if (!elf_hash_table (info)->is_relocatable_executable)
393 return TRUE;
7a13edea 394 }
0444bdd4 395
7a13edea
NC
396 default:
397 break;
398 }
399
252b5132
RH
400 h->dynindx = elf_hash_table (info)->dynsymcount;
401 ++elf_hash_table (info)->dynsymcount;
402
403 dynstr = elf_hash_table (info)->dynstr;
404 if (dynstr == NULL)
405 {
406 /* Create a strtab to hold the dynamic symbol names. */
2b0f7ef9 407 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_strtab_init ();
252b5132 408 if (dynstr == NULL)
b34976b6 409 return FALSE;
252b5132
RH
410 }
411
412 /* We don't put any version information in the dynamic string
aad5d350 413 table. */
252b5132
RH
414 name = h->root.root.string;
415 p = strchr (name, ELF_VER_CHR);
68b6ddd0
AM
416 if (p != NULL)
417 /* We know that the p points into writable memory. In fact,
418 there are only a few symbols that have read-only names, being
419 those like _GLOBAL_OFFSET_TABLE_ that are created specially
420 by the backends. Most symbols will have names pointing into
421 an ELF string table read from a file, or to objalloc memory. */
422 *p = 0;
423
424 indx = _bfd_elf_strtab_add (dynstr, name, p != NULL);
425
426 if (p != NULL)
427 *p = ELF_VER_CHR;
252b5132
RH
428
429 if (indx == (bfd_size_type) -1)
b34976b6 430 return FALSE;
252b5132
RH
431 h->dynstr_index = indx;
432 }
433
b34976b6 434 return TRUE;
252b5132 435}
45d6a902 436\f
55255dae
L
437/* Mark a symbol dynamic. */
438
439void
440bfd_elf_link_mark_dynamic_symbol (struct bfd_link_info *info,
441 struct elf_link_hash_entry *h)
442{
443 struct bfd_elf_dynamic_list *d = info->dynamic;
444
445 if (d == NULL || info->relocatable)
446 return;
447
448 if ((*d->match) (&d->head, NULL, h->root.root.string))
449 h->dynamic = 1;
450}
451
45d6a902
AM
452/* Record an assignment to a symbol made by a linker script. We need
453 this in case some dynamic object refers to this symbol. */
454
455bfd_boolean
fe21a8fc
L
456bfd_elf_record_link_assignment (bfd *output_bfd,
457 struct bfd_link_info *info,
268b6b39 458 const char *name,
fe21a8fc
L
459 bfd_boolean provide,
460 bfd_boolean hidden)
45d6a902
AM
461{
462 struct elf_link_hash_entry *h;
4ea42fb7 463 struct elf_link_hash_table *htab;
45d6a902 464
0eddce27 465 if (!is_elf_hash_table (info->hash))
45d6a902
AM
466 return TRUE;
467
4ea42fb7
AM
468 htab = elf_hash_table (info);
469 h = elf_link_hash_lookup (htab, name, !provide, TRUE, FALSE);
45d6a902 470 if (h == NULL)
4ea42fb7 471 return provide;
45d6a902 472
02bb6eae
AO
473 /* Since we're defining the symbol, don't let it seem to have not
474 been defined. record_dynamic_symbol and size_dynamic_sections
77cfaee6 475 may depend on this. */
02bb6eae
AO
476 if (h->root.type == bfd_link_hash_undefweak
477 || h->root.type == bfd_link_hash_undefined)
77cfaee6 478 {
4ea42fb7 479 h->root.type = bfd_link_hash_new;
77cfaee6
AM
480 if (h->root.u.undef.next != NULL || htab->root.undefs_tail == &h->root)
481 bfd_link_repair_undef_list (&htab->root);
77cfaee6 482 }
02bb6eae 483
45d6a902 484 if (h->root.type == bfd_link_hash_new)
55255dae
L
485 {
486 bfd_elf_link_mark_dynamic_symbol (info, h);
487 h->non_elf = 0;
488 }
45d6a902
AM
489
490 /* If this symbol is being provided by the linker script, and it is
491 currently defined by a dynamic object, but not by a regular
492 object, then mark it as undefined so that the generic linker will
493 force the correct value. */
494 if (provide
f5385ebf
AM
495 && h->def_dynamic
496 && !h->def_regular)
45d6a902
AM
497 h->root.type = bfd_link_hash_undefined;
498
499 /* If this symbol is not being provided by the linker script, and it is
500 currently defined by a dynamic object, but not by a regular object,
501 then clear out any version information because the symbol will not be
502 associated with the dynamic object any more. */
503 if (!provide
f5385ebf
AM
504 && h->def_dynamic
505 && !h->def_regular)
45d6a902
AM
506 h->verinfo.verdef = NULL;
507
f5385ebf 508 h->def_regular = 1;
45d6a902 509
fe21a8fc
L
510 if (provide && hidden)
511 {
512 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
513
514 h->other = (h->other & ~ELF_ST_VISIBILITY (-1)) | STV_HIDDEN;
515 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
516 }
517
6fa3860b
PB
518 /* STV_HIDDEN and STV_INTERNAL symbols must be STB_LOCAL in shared objects
519 and executables. */
520 if (!info->relocatable
521 && h->dynindx != -1
522 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
523 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
524 h->forced_local = 1;
525
f5385ebf
AM
526 if ((h->def_dynamic
527 || h->ref_dynamic
67687978
PB
528 || info->shared
529 || (info->executable && elf_hash_table (info)->is_relocatable_executable))
45d6a902
AM
530 && h->dynindx == -1)
531 {
c152c796 532 if (! bfd_elf_link_record_dynamic_symbol (info, h))
45d6a902
AM
533 return FALSE;
534
535 /* If this is a weak defined symbol, and we know a corresponding
536 real symbol from the same dynamic object, make sure the real
537 symbol is also made into a dynamic symbol. */
f6e332e6
AM
538 if (h->u.weakdef != NULL
539 && h->u.weakdef->dynindx == -1)
45d6a902 540 {
f6e332e6 541 if (! bfd_elf_link_record_dynamic_symbol (info, h->u.weakdef))
45d6a902
AM
542 return FALSE;
543 }
544 }
545
546 return TRUE;
547}
42751cf3 548
8c58d23b
AM
549/* Record a new local dynamic symbol. Returns 0 on failure, 1 on
550 success, and 2 on a failure caused by attempting to record a symbol
551 in a discarded section, eg. a discarded link-once section symbol. */
552
553int
c152c796
AM
554bfd_elf_link_record_local_dynamic_symbol (struct bfd_link_info *info,
555 bfd *input_bfd,
556 long input_indx)
8c58d23b
AM
557{
558 bfd_size_type amt;
559 struct elf_link_local_dynamic_entry *entry;
560 struct elf_link_hash_table *eht;
561 struct elf_strtab_hash *dynstr;
562 unsigned long dynstr_index;
563 char *name;
564 Elf_External_Sym_Shndx eshndx;
565 char esym[sizeof (Elf64_External_Sym)];
566
0eddce27 567 if (! is_elf_hash_table (info->hash))
8c58d23b
AM
568 return 0;
569
570 /* See if the entry exists already. */
571 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
572 if (entry->input_bfd == input_bfd && entry->input_indx == input_indx)
573 return 1;
574
575 amt = sizeof (*entry);
268b6b39 576 entry = bfd_alloc (input_bfd, amt);
8c58d23b
AM
577 if (entry == NULL)
578 return 0;
579
580 /* Go find the symbol, so that we can find it's name. */
581 if (!bfd_elf_get_elf_syms (input_bfd, &elf_tdata (input_bfd)->symtab_hdr,
268b6b39 582 1, input_indx, &entry->isym, esym, &eshndx))
8c58d23b
AM
583 {
584 bfd_release (input_bfd, entry);
585 return 0;
586 }
587
588 if (entry->isym.st_shndx != SHN_UNDEF
589 && (entry->isym.st_shndx < SHN_LORESERVE
590 || entry->isym.st_shndx > SHN_HIRESERVE))
591 {
592 asection *s;
593
594 s = bfd_section_from_elf_index (input_bfd, entry->isym.st_shndx);
595 if (s == NULL || bfd_is_abs_section (s->output_section))
596 {
597 /* We can still bfd_release here as nothing has done another
598 bfd_alloc. We can't do this later in this function. */
599 bfd_release (input_bfd, entry);
600 return 2;
601 }
602 }
603
604 name = (bfd_elf_string_from_elf_section
605 (input_bfd, elf_tdata (input_bfd)->symtab_hdr.sh_link,
606 entry->isym.st_name));
607
608 dynstr = elf_hash_table (info)->dynstr;
609 if (dynstr == NULL)
610 {
611 /* Create a strtab to hold the dynamic symbol names. */
612 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_strtab_init ();
613 if (dynstr == NULL)
614 return 0;
615 }
616
b34976b6 617 dynstr_index = _bfd_elf_strtab_add (dynstr, name, FALSE);
8c58d23b
AM
618 if (dynstr_index == (unsigned long) -1)
619 return 0;
620 entry->isym.st_name = dynstr_index;
621
622 eht = elf_hash_table (info);
623
624 entry->next = eht->dynlocal;
625 eht->dynlocal = entry;
626 entry->input_bfd = input_bfd;
627 entry->input_indx = input_indx;
628 eht->dynsymcount++;
629
630 /* Whatever binding the symbol had before, it's now local. */
631 entry->isym.st_info
632 = ELF_ST_INFO (STB_LOCAL, ELF_ST_TYPE (entry->isym.st_info));
633
634 /* The dynindx will be set at the end of size_dynamic_sections. */
635
636 return 1;
637}
638
30b30c21 639/* Return the dynindex of a local dynamic symbol. */
42751cf3 640
30b30c21 641long
268b6b39
AM
642_bfd_elf_link_lookup_local_dynindx (struct bfd_link_info *info,
643 bfd *input_bfd,
644 long input_indx)
30b30c21
RH
645{
646 struct elf_link_local_dynamic_entry *e;
647
648 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
649 if (e->input_bfd == input_bfd && e->input_indx == input_indx)
650 return e->dynindx;
651 return -1;
652}
653
654/* This function is used to renumber the dynamic symbols, if some of
655 them are removed because they are marked as local. This is called
656 via elf_link_hash_traverse. */
657
b34976b6 658static bfd_boolean
268b6b39
AM
659elf_link_renumber_hash_table_dynsyms (struct elf_link_hash_entry *h,
660 void *data)
42751cf3 661{
268b6b39 662 size_t *count = data;
30b30c21 663
e92d460e
AM
664 if (h->root.type == bfd_link_hash_warning)
665 h = (struct elf_link_hash_entry *) h->root.u.i.link;
666
6fa3860b
PB
667 if (h->forced_local)
668 return TRUE;
669
670 if (h->dynindx != -1)
671 h->dynindx = ++(*count);
672
673 return TRUE;
674}
675
676
677/* Like elf_link_renumber_hash_table_dynsyms, but just number symbols with
678 STB_LOCAL binding. */
679
680static bfd_boolean
681elf_link_renumber_local_hash_table_dynsyms (struct elf_link_hash_entry *h,
682 void *data)
683{
684 size_t *count = data;
685
686 if (h->root.type == bfd_link_hash_warning)
687 h = (struct elf_link_hash_entry *) h->root.u.i.link;
688
689 if (!h->forced_local)
690 return TRUE;
691
42751cf3 692 if (h->dynindx != -1)
30b30c21
RH
693 h->dynindx = ++(*count);
694
b34976b6 695 return TRUE;
42751cf3 696}
30b30c21 697
aee6f5b4
AO
698/* Return true if the dynamic symbol for a given section should be
699 omitted when creating a shared library. */
700bfd_boolean
701_bfd_elf_link_omit_section_dynsym (bfd *output_bfd ATTRIBUTE_UNUSED,
702 struct bfd_link_info *info,
703 asection *p)
704{
74541ad4
AM
705 struct elf_link_hash_table *htab;
706
aee6f5b4
AO
707 switch (elf_section_data (p)->this_hdr.sh_type)
708 {
709 case SHT_PROGBITS:
710 case SHT_NOBITS:
711 /* If sh_type is yet undecided, assume it could be
712 SHT_PROGBITS/SHT_NOBITS. */
713 case SHT_NULL:
74541ad4
AM
714 htab = elf_hash_table (info);
715 if (p == htab->tls_sec)
716 return FALSE;
717
718 if (htab->text_index_section != NULL)
719 return p != htab->text_index_section && p != htab->data_index_section;
720
aee6f5b4
AO
721 if (strcmp (p->name, ".got") == 0
722 || strcmp (p->name, ".got.plt") == 0
723 || strcmp (p->name, ".plt") == 0)
724 {
725 asection *ip;
aee6f5b4 726
74541ad4
AM
727 if (htab->dynobj != NULL
728 && (ip = bfd_get_section_by_name (htab->dynobj, p->name)) != NULL
aee6f5b4
AO
729 && (ip->flags & SEC_LINKER_CREATED)
730 && ip->output_section == p)
731 return TRUE;
732 }
733 return FALSE;
734
735 /* There shouldn't be section relative relocations
736 against any other section. */
737 default:
738 return TRUE;
739 }
740}
741
062e2358 742/* Assign dynsym indices. In a shared library we generate a section
6fa3860b
PB
743 symbol for each output section, which come first. Next come symbols
744 which have been forced to local binding. Then all of the back-end
745 allocated local dynamic syms, followed by the rest of the global
746 symbols. */
30b30c21 747
554220db
AM
748static unsigned long
749_bfd_elf_link_renumber_dynsyms (bfd *output_bfd,
750 struct bfd_link_info *info,
751 unsigned long *section_sym_count)
30b30c21
RH
752{
753 unsigned long dynsymcount = 0;
754
67687978 755 if (info->shared || elf_hash_table (info)->is_relocatable_executable)
30b30c21 756 {
aee6f5b4 757 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
30b30c21
RH
758 asection *p;
759 for (p = output_bfd->sections; p ; p = p->next)
8c37241b 760 if ((p->flags & SEC_EXCLUDE) == 0
aee6f5b4
AO
761 && (p->flags & SEC_ALLOC) != 0
762 && !(*bed->elf_backend_omit_section_dynsym) (output_bfd, info, p))
763 elf_section_data (p)->dynindx = ++dynsymcount;
74541ad4
AM
764 else
765 elf_section_data (p)->dynindx = 0;
30b30c21 766 }
554220db 767 *section_sym_count = dynsymcount;
30b30c21 768
6fa3860b
PB
769 elf_link_hash_traverse (elf_hash_table (info),
770 elf_link_renumber_local_hash_table_dynsyms,
771 &dynsymcount);
772
30b30c21
RH
773 if (elf_hash_table (info)->dynlocal)
774 {
775 struct elf_link_local_dynamic_entry *p;
776 for (p = elf_hash_table (info)->dynlocal; p ; p = p->next)
777 p->dynindx = ++dynsymcount;
778 }
779
780 elf_link_hash_traverse (elf_hash_table (info),
781 elf_link_renumber_hash_table_dynsyms,
782 &dynsymcount);
783
784 /* There is an unused NULL entry at the head of the table which
785 we must account for in our count. Unless there weren't any
786 symbols, which means we'll have no table at all. */
787 if (dynsymcount != 0)
788 ++dynsymcount;
789
ccabcbe5
AM
790 elf_hash_table (info)->dynsymcount = dynsymcount;
791 return dynsymcount;
30b30c21 792}
252b5132 793
45d6a902
AM
794/* This function is called when we want to define a new symbol. It
795 handles the various cases which arise when we find a definition in
796 a dynamic object, or when there is already a definition in a
797 dynamic object. The new symbol is described by NAME, SYM, PSEC,
798 and PVALUE. We set SYM_HASH to the hash table entry. We set
799 OVERRIDE if the old symbol is overriding a new definition. We set
800 TYPE_CHANGE_OK if it is OK for the type to change. We set
801 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
802 change, we mean that we shouldn't warn if the type or size does
af44c138
L
803 change. We set POLD_ALIGNMENT if an old common symbol in a dynamic
804 object is overridden by a regular object. */
45d6a902
AM
805
806bfd_boolean
268b6b39
AM
807_bfd_elf_merge_symbol (bfd *abfd,
808 struct bfd_link_info *info,
809 const char *name,
810 Elf_Internal_Sym *sym,
811 asection **psec,
812 bfd_vma *pvalue,
af44c138 813 unsigned int *pold_alignment,
268b6b39
AM
814 struct elf_link_hash_entry **sym_hash,
815 bfd_boolean *skip,
816 bfd_boolean *override,
817 bfd_boolean *type_change_ok,
0f8a2703 818 bfd_boolean *size_change_ok)
252b5132 819{
7479dfd4 820 asection *sec, *oldsec;
45d6a902
AM
821 struct elf_link_hash_entry *h;
822 struct elf_link_hash_entry *flip;
823 int bind;
824 bfd *oldbfd;
825 bfd_boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
77cfaee6 826 bfd_boolean newweak, oldweak;
a4d8e49b 827 const struct elf_backend_data *bed;
45d6a902
AM
828
829 *skip = FALSE;
830 *override = FALSE;
831
832 sec = *psec;
833 bind = ELF_ST_BIND (sym->st_info);
834
cd7be95b
KH
835 /* Silently discard TLS symbols from --just-syms. There's no way to
836 combine a static TLS block with a new TLS block for this executable. */
837 if (ELF_ST_TYPE (sym->st_info) == STT_TLS
838 && sec->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
839 {
840 *skip = TRUE;
841 return TRUE;
842 }
843
45d6a902
AM
844 if (! bfd_is_und_section (sec))
845 h = elf_link_hash_lookup (elf_hash_table (info), name, TRUE, FALSE, FALSE);
846 else
847 h = ((struct elf_link_hash_entry *)
848 bfd_wrapped_link_hash_lookup (abfd, info, name, TRUE, FALSE, FALSE));
849 if (h == NULL)
850 return FALSE;
851 *sym_hash = h;
252b5132 852
45d6a902
AM
853 /* This code is for coping with dynamic objects, and is only useful
854 if we are doing an ELF link. */
855 if (info->hash->creator != abfd->xvec)
856 return TRUE;
252b5132 857
45d6a902
AM
858 /* For merging, we only care about real symbols. */
859
860 while (h->root.type == bfd_link_hash_indirect
861 || h->root.type == bfd_link_hash_warning)
862 h = (struct elf_link_hash_entry *) h->root.u.i.link;
863
864 /* If we just created the symbol, mark it as being an ELF symbol.
865 Other than that, there is nothing to do--there is no merge issue
866 with a newly defined symbol--so we just return. */
867
868 if (h->root.type == bfd_link_hash_new)
252b5132 869 {
55255dae 870 bfd_elf_link_mark_dynamic_symbol (info, h);
f5385ebf 871 h->non_elf = 0;
45d6a902
AM
872 return TRUE;
873 }
252b5132 874
7479dfd4
L
875 /* OLDBFD and OLDSEC are a BFD and an ASECTION associated with the
876 existing symbol. */
252b5132 877
45d6a902
AM
878 switch (h->root.type)
879 {
880 default:
881 oldbfd = NULL;
7479dfd4 882 oldsec = NULL;
45d6a902 883 break;
252b5132 884
45d6a902
AM
885 case bfd_link_hash_undefined:
886 case bfd_link_hash_undefweak:
887 oldbfd = h->root.u.undef.abfd;
7479dfd4 888 oldsec = NULL;
45d6a902
AM
889 break;
890
891 case bfd_link_hash_defined:
892 case bfd_link_hash_defweak:
893 oldbfd = h->root.u.def.section->owner;
7479dfd4 894 oldsec = h->root.u.def.section;
45d6a902
AM
895 break;
896
897 case bfd_link_hash_common:
898 oldbfd = h->root.u.c.p->section->owner;
7479dfd4 899 oldsec = h->root.u.c.p->section;
45d6a902
AM
900 break;
901 }
902
903 /* In cases involving weak versioned symbols, we may wind up trying
904 to merge a symbol with itself. Catch that here, to avoid the
905 confusion that results if we try to override a symbol with
906 itself. The additional tests catch cases like
907 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
908 dynamic object, which we do want to handle here. */
909 if (abfd == oldbfd
910 && ((abfd->flags & DYNAMIC) == 0
f5385ebf 911 || !h->def_regular))
45d6a902
AM
912 return TRUE;
913
914 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
915 respectively, is from a dynamic object. */
916
707bba77 917 newdyn = (abfd->flags & DYNAMIC) != 0;
45d6a902 918
707bba77 919 olddyn = FALSE;
45d6a902
AM
920 if (oldbfd != NULL)
921 olddyn = (oldbfd->flags & DYNAMIC) != 0;
707bba77 922 else if (oldsec != NULL)
45d6a902 923 {
707bba77 924 /* This handles the special SHN_MIPS_{TEXT,DATA} section
45d6a902 925 indices used by MIPS ELF. */
707bba77 926 olddyn = (oldsec->symbol->flags & BSF_DYNAMIC) != 0;
45d6a902 927 }
252b5132 928
45d6a902
AM
929 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
930 respectively, appear to be a definition rather than reference. */
931
707bba77 932 newdef = !bfd_is_und_section (sec) && !bfd_is_com_section (sec);
45d6a902 933
707bba77
AM
934 olddef = (h->root.type != bfd_link_hash_undefined
935 && h->root.type != bfd_link_hash_undefweak
936 && h->root.type != bfd_link_hash_common);
45d6a902 937
580a2b6e
L
938 /* When we try to create a default indirect symbol from the dynamic
939 definition with the default version, we skip it if its type and
940 the type of existing regular definition mismatch. We only do it
941 if the existing regular definition won't be dynamic. */
942 if (pold_alignment == NULL
943 && !info->shared
944 && !info->export_dynamic
945 && !h->ref_dynamic
946 && newdyn
947 && newdef
948 && !olddyn
949 && (olddef || h->root.type == bfd_link_hash_common)
950 && ELF_ST_TYPE (sym->st_info) != h->type
951 && ELF_ST_TYPE (sym->st_info) != STT_NOTYPE
952 && h->type != STT_NOTYPE)
953 {
954 *skip = TRUE;
955 return TRUE;
956 }
957
68f49ba3
L
958 /* Check TLS symbol. We don't check undefined symbol introduced by
959 "ld -u". */
7479dfd4 960 if ((ELF_ST_TYPE (sym->st_info) == STT_TLS || h->type == STT_TLS)
68f49ba3
L
961 && ELF_ST_TYPE (sym->st_info) != h->type
962 && oldbfd != NULL)
7479dfd4
L
963 {
964 bfd *ntbfd, *tbfd;
965 bfd_boolean ntdef, tdef;
966 asection *ntsec, *tsec;
967
968 if (h->type == STT_TLS)
969 {
3b36f7e6 970 ntbfd = abfd;
7479dfd4
L
971 ntsec = sec;
972 ntdef = newdef;
973 tbfd = oldbfd;
974 tsec = oldsec;
975 tdef = olddef;
976 }
977 else
978 {
979 ntbfd = oldbfd;
980 ntsec = oldsec;
981 ntdef = olddef;
982 tbfd = abfd;
983 tsec = sec;
984 tdef = newdef;
985 }
986
987 if (tdef && ntdef)
988 (*_bfd_error_handler)
989 (_("%s: TLS definition in %B section %A mismatches non-TLS definition in %B section %A"),
990 tbfd, tsec, ntbfd, ntsec, h->root.root.string);
991 else if (!tdef && !ntdef)
992 (*_bfd_error_handler)
993 (_("%s: TLS reference in %B mismatches non-TLS reference in %B"),
994 tbfd, ntbfd, h->root.root.string);
995 else if (tdef)
996 (*_bfd_error_handler)
997 (_("%s: TLS definition in %B section %A mismatches non-TLS reference in %B"),
998 tbfd, tsec, ntbfd, h->root.root.string);
999 else
1000 (*_bfd_error_handler)
1001 (_("%s: TLS reference in %B mismatches non-TLS definition in %B section %A"),
1002 tbfd, ntbfd, ntsec, h->root.root.string);
1003
1004 bfd_set_error (bfd_error_bad_value);
1005 return FALSE;
1006 }
1007
4cc11e76 1008 /* We need to remember if a symbol has a definition in a dynamic
45d6a902
AM
1009 object or is weak in all dynamic objects. Internal and hidden
1010 visibility will make it unavailable to dynamic objects. */
f5385ebf 1011 if (newdyn && !h->dynamic_def)
45d6a902
AM
1012 {
1013 if (!bfd_is_und_section (sec))
f5385ebf 1014 h->dynamic_def = 1;
45d6a902 1015 else
252b5132 1016 {
45d6a902
AM
1017 /* Check if this symbol is weak in all dynamic objects. If it
1018 is the first time we see it in a dynamic object, we mark
1019 if it is weak. Otherwise, we clear it. */
f5385ebf 1020 if (!h->ref_dynamic)
79349b09 1021 {
45d6a902 1022 if (bind == STB_WEAK)
f5385ebf 1023 h->dynamic_weak = 1;
252b5132 1024 }
45d6a902 1025 else if (bind != STB_WEAK)
f5385ebf 1026 h->dynamic_weak = 0;
252b5132 1027 }
45d6a902 1028 }
252b5132 1029
45d6a902
AM
1030 /* If the old symbol has non-default visibility, we ignore the new
1031 definition from a dynamic object. */
1032 if (newdyn
9c7a29a3 1033 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
45d6a902
AM
1034 && !bfd_is_und_section (sec))
1035 {
1036 *skip = TRUE;
1037 /* Make sure this symbol is dynamic. */
f5385ebf 1038 h->ref_dynamic = 1;
45d6a902
AM
1039 /* A protected symbol has external availability. Make sure it is
1040 recorded as dynamic.
1041
1042 FIXME: Should we check type and size for protected symbol? */
1043 if (ELF_ST_VISIBILITY (h->other) == STV_PROTECTED)
c152c796 1044 return bfd_elf_link_record_dynamic_symbol (info, h);
45d6a902
AM
1045 else
1046 return TRUE;
1047 }
1048 else if (!newdyn
9c7a29a3 1049 && ELF_ST_VISIBILITY (sym->st_other) != STV_DEFAULT
f5385ebf 1050 && h->def_dynamic)
45d6a902
AM
1051 {
1052 /* If the new symbol with non-default visibility comes from a
1053 relocatable file and the old definition comes from a dynamic
1054 object, we remove the old definition. */
1055 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
d2dee3b2
L
1056 {
1057 /* Handle the case where the old dynamic definition is
1058 default versioned. We need to copy the symbol info from
1059 the symbol with default version to the normal one if it
1060 was referenced before. */
1061 if (h->ref_regular)
1062 {
1063 const struct elf_backend_data *bed
1064 = get_elf_backend_data (abfd);
1065 struct elf_link_hash_entry *vh = *sym_hash;
1066 vh->root.type = h->root.type;
1067 h->root.type = bfd_link_hash_indirect;
1068 (*bed->elf_backend_copy_indirect_symbol) (info, vh, h);
1069 /* Protected symbols will override the dynamic definition
1070 with default version. */
1071 if (ELF_ST_VISIBILITY (sym->st_other) == STV_PROTECTED)
1072 {
1073 h->root.u.i.link = (struct bfd_link_hash_entry *) vh;
1074 vh->dynamic_def = 1;
1075 vh->ref_dynamic = 1;
1076 }
1077 else
1078 {
1079 h->root.type = vh->root.type;
1080 vh->ref_dynamic = 0;
1081 /* We have to hide it here since it was made dynamic
1082 global with extra bits when the symbol info was
1083 copied from the old dynamic definition. */
1084 (*bed->elf_backend_hide_symbol) (info, vh, TRUE);
1085 }
1086 h = vh;
1087 }
1088 else
1089 h = *sym_hash;
1090 }
1de1a317 1091
f6e332e6 1092 if ((h->root.u.undef.next || info->hash->undefs_tail == &h->root)
1de1a317
L
1093 && bfd_is_und_section (sec))
1094 {
1095 /* If the new symbol is undefined and the old symbol was
1096 also undefined before, we need to make sure
1097 _bfd_generic_link_add_one_symbol doesn't mess
f6e332e6 1098 up the linker hash table undefs list. Since the old
1de1a317
L
1099 definition came from a dynamic object, it is still on the
1100 undefs list. */
1101 h->root.type = bfd_link_hash_undefined;
1de1a317
L
1102 h->root.u.undef.abfd = abfd;
1103 }
1104 else
1105 {
1106 h->root.type = bfd_link_hash_new;
1107 h->root.u.undef.abfd = NULL;
1108 }
1109
f5385ebf 1110 if (h->def_dynamic)
252b5132 1111 {
f5385ebf
AM
1112 h->def_dynamic = 0;
1113 h->ref_dynamic = 1;
1114 h->dynamic_def = 1;
45d6a902
AM
1115 }
1116 /* FIXME: Should we check type and size for protected symbol? */
1117 h->size = 0;
1118 h->type = 0;
1119 return TRUE;
1120 }
14a793b2 1121
79349b09
AM
1122 /* Differentiate strong and weak symbols. */
1123 newweak = bind == STB_WEAK;
1124 oldweak = (h->root.type == bfd_link_hash_defweak
1125 || h->root.type == bfd_link_hash_undefweak);
14a793b2 1126
15b43f48
AM
1127 /* If a new weak symbol definition comes from a regular file and the
1128 old symbol comes from a dynamic library, we treat the new one as
1129 strong. Similarly, an old weak symbol definition from a regular
1130 file is treated as strong when the new symbol comes from a dynamic
1131 library. Further, an old weak symbol from a dynamic library is
1132 treated as strong if the new symbol is from a dynamic library.
1133 This reflects the way glibc's ld.so works.
1134
1135 Do this before setting *type_change_ok or *size_change_ok so that
1136 we warn properly when dynamic library symbols are overridden. */
1137
1138 if (newdef && !newdyn && olddyn)
0f8a2703 1139 newweak = FALSE;
15b43f48 1140 if (olddef && newdyn)
0f8a2703
AM
1141 oldweak = FALSE;
1142
79349b09
AM
1143 /* It's OK to change the type if either the existing symbol or the
1144 new symbol is weak. A type change is also OK if the old symbol
1145 is undefined and the new symbol is defined. */
252b5132 1146
79349b09
AM
1147 if (oldweak
1148 || newweak
1149 || (newdef
1150 && h->root.type == bfd_link_hash_undefined))
1151 *type_change_ok = TRUE;
1152
1153 /* It's OK to change the size if either the existing symbol or the
1154 new symbol is weak, or if the old symbol is undefined. */
1155
1156 if (*type_change_ok
1157 || h->root.type == bfd_link_hash_undefined)
1158 *size_change_ok = TRUE;
45d6a902 1159
45d6a902
AM
1160 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
1161 symbol, respectively, appears to be a common symbol in a dynamic
1162 object. If a symbol appears in an uninitialized section, and is
1163 not weak, and is not a function, then it may be a common symbol
1164 which was resolved when the dynamic object was created. We want
1165 to treat such symbols specially, because they raise special
1166 considerations when setting the symbol size: if the symbol
1167 appears as a common symbol in a regular object, and the size in
1168 the regular object is larger, we must make sure that we use the
1169 larger size. This problematic case can always be avoided in C,
1170 but it must be handled correctly when using Fortran shared
1171 libraries.
1172
1173 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
1174 likewise for OLDDYNCOMMON and OLDDEF.
1175
1176 Note that this test is just a heuristic, and that it is quite
1177 possible to have an uninitialized symbol in a shared object which
1178 is really a definition, rather than a common symbol. This could
1179 lead to some minor confusion when the symbol really is a common
1180 symbol in some regular object. However, I think it will be
1181 harmless. */
1182
1183 if (newdyn
1184 && newdef
79349b09 1185 && !newweak
45d6a902
AM
1186 && (sec->flags & SEC_ALLOC) != 0
1187 && (sec->flags & SEC_LOAD) == 0
1188 && sym->st_size > 0
45d6a902
AM
1189 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
1190 newdyncommon = TRUE;
1191 else
1192 newdyncommon = FALSE;
1193
1194 if (olddyn
1195 && olddef
1196 && h->root.type == bfd_link_hash_defined
f5385ebf 1197 && h->def_dynamic
45d6a902
AM
1198 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
1199 && (h->root.u.def.section->flags & SEC_LOAD) == 0
1200 && h->size > 0
1201 && h->type != STT_FUNC)
1202 olddyncommon = TRUE;
1203 else
1204 olddyncommon = FALSE;
1205
a4d8e49b
L
1206 /* We now know everything about the old and new symbols. We ask the
1207 backend to check if we can merge them. */
1208 bed = get_elf_backend_data (abfd);
1209 if (bed->merge_symbol
1210 && !bed->merge_symbol (info, sym_hash, h, sym, psec, pvalue,
1211 pold_alignment, skip, override,
1212 type_change_ok, size_change_ok,
1213 &newdyn, &newdef, &newdyncommon, &newweak,
1214 abfd, &sec,
1215 &olddyn, &olddef, &olddyncommon, &oldweak,
1216 oldbfd, &oldsec))
1217 return FALSE;
1218
45d6a902
AM
1219 /* If both the old and the new symbols look like common symbols in a
1220 dynamic object, set the size of the symbol to the larger of the
1221 two. */
1222
1223 if (olddyncommon
1224 && newdyncommon
1225 && sym->st_size != h->size)
1226 {
1227 /* Since we think we have two common symbols, issue a multiple
1228 common warning if desired. Note that we only warn if the
1229 size is different. If the size is the same, we simply let
1230 the old symbol override the new one as normally happens with
1231 symbols defined in dynamic objects. */
1232
1233 if (! ((*info->callbacks->multiple_common)
1234 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
1235 h->size, abfd, bfd_link_hash_common, sym->st_size)))
1236 return FALSE;
252b5132 1237
45d6a902
AM
1238 if (sym->st_size > h->size)
1239 h->size = sym->st_size;
252b5132 1240
45d6a902 1241 *size_change_ok = TRUE;
252b5132
RH
1242 }
1243
45d6a902
AM
1244 /* If we are looking at a dynamic object, and we have found a
1245 definition, we need to see if the symbol was already defined by
1246 some other object. If so, we want to use the existing
1247 definition, and we do not want to report a multiple symbol
1248 definition error; we do this by clobbering *PSEC to be
1249 bfd_und_section_ptr.
1250
1251 We treat a common symbol as a definition if the symbol in the
1252 shared library is a function, since common symbols always
1253 represent variables; this can cause confusion in principle, but
1254 any such confusion would seem to indicate an erroneous program or
1255 shared library. We also permit a common symbol in a regular
79349b09 1256 object to override a weak symbol in a shared object. */
45d6a902
AM
1257
1258 if (newdyn
1259 && newdef
77cfaee6 1260 && (olddef
45d6a902 1261 || (h->root.type == bfd_link_hash_common
79349b09 1262 && (newweak
0f8a2703 1263 || ELF_ST_TYPE (sym->st_info) == STT_FUNC))))
45d6a902
AM
1264 {
1265 *override = TRUE;
1266 newdef = FALSE;
1267 newdyncommon = FALSE;
252b5132 1268
45d6a902
AM
1269 *psec = sec = bfd_und_section_ptr;
1270 *size_change_ok = TRUE;
252b5132 1271
45d6a902
AM
1272 /* If we get here when the old symbol is a common symbol, then
1273 we are explicitly letting it override a weak symbol or
1274 function in a dynamic object, and we don't want to warn about
1275 a type change. If the old symbol is a defined symbol, a type
1276 change warning may still be appropriate. */
252b5132 1277
45d6a902
AM
1278 if (h->root.type == bfd_link_hash_common)
1279 *type_change_ok = TRUE;
1280 }
1281
1282 /* Handle the special case of an old common symbol merging with a
1283 new symbol which looks like a common symbol in a shared object.
1284 We change *PSEC and *PVALUE to make the new symbol look like a
91134c82
L
1285 common symbol, and let _bfd_generic_link_add_one_symbol do the
1286 right thing. */
45d6a902
AM
1287
1288 if (newdyncommon
1289 && h->root.type == bfd_link_hash_common)
1290 {
1291 *override = TRUE;
1292 newdef = FALSE;
1293 newdyncommon = FALSE;
1294 *pvalue = sym->st_size;
a4d8e49b 1295 *psec = sec = bed->common_section (oldsec);
45d6a902
AM
1296 *size_change_ok = TRUE;
1297 }
1298
c5e2cead 1299 /* Skip weak definitions of symbols that are already defined. */
f41d945b 1300 if (newdef && olddef && newweak)
c5e2cead
L
1301 *skip = TRUE;
1302
45d6a902
AM
1303 /* If the old symbol is from a dynamic object, and the new symbol is
1304 a definition which is not from a dynamic object, then the new
1305 symbol overrides the old symbol. Symbols from regular files
1306 always take precedence over symbols from dynamic objects, even if
1307 they are defined after the dynamic object in the link.
1308
1309 As above, we again permit a common symbol in a regular object to
1310 override a definition in a shared object if the shared object
0f8a2703 1311 symbol is a function or is weak. */
45d6a902
AM
1312
1313 flip = NULL;
77cfaee6 1314 if (!newdyn
45d6a902
AM
1315 && (newdef
1316 || (bfd_is_com_section (sec)
79349b09
AM
1317 && (oldweak
1318 || h->type == STT_FUNC)))
45d6a902
AM
1319 && olddyn
1320 && olddef
f5385ebf 1321 && h->def_dynamic)
45d6a902
AM
1322 {
1323 /* Change the hash table entry to undefined, and let
1324 _bfd_generic_link_add_one_symbol do the right thing with the
1325 new definition. */
1326
1327 h->root.type = bfd_link_hash_undefined;
1328 h->root.u.undef.abfd = h->root.u.def.section->owner;
1329 *size_change_ok = TRUE;
1330
1331 olddef = FALSE;
1332 olddyncommon = FALSE;
1333
1334 /* We again permit a type change when a common symbol may be
1335 overriding a function. */
1336
1337 if (bfd_is_com_section (sec))
1338 *type_change_ok = TRUE;
1339
1340 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1341 flip = *sym_hash;
1342 else
1343 /* This union may have been set to be non-NULL when this symbol
1344 was seen in a dynamic object. We must force the union to be
1345 NULL, so that it is correct for a regular symbol. */
1346 h->verinfo.vertree = NULL;
1347 }
1348
1349 /* Handle the special case of a new common symbol merging with an
1350 old symbol that looks like it might be a common symbol defined in
1351 a shared object. Note that we have already handled the case in
1352 which a new common symbol should simply override the definition
1353 in the shared library. */
1354
1355 if (! newdyn
1356 && bfd_is_com_section (sec)
1357 && olddyncommon)
1358 {
1359 /* It would be best if we could set the hash table entry to a
1360 common symbol, but we don't know what to use for the section
1361 or the alignment. */
1362 if (! ((*info->callbacks->multiple_common)
1363 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
1364 h->size, abfd, bfd_link_hash_common, sym->st_size)))
1365 return FALSE;
1366
4cc11e76 1367 /* If the presumed common symbol in the dynamic object is
45d6a902
AM
1368 larger, pretend that the new symbol has its size. */
1369
1370 if (h->size > *pvalue)
1371 *pvalue = h->size;
1372
af44c138
L
1373 /* We need to remember the alignment required by the symbol
1374 in the dynamic object. */
1375 BFD_ASSERT (pold_alignment);
1376 *pold_alignment = h->root.u.def.section->alignment_power;
45d6a902
AM
1377
1378 olddef = FALSE;
1379 olddyncommon = FALSE;
1380
1381 h->root.type = bfd_link_hash_undefined;
1382 h->root.u.undef.abfd = h->root.u.def.section->owner;
1383
1384 *size_change_ok = TRUE;
1385 *type_change_ok = TRUE;
1386
1387 if ((*sym_hash)->root.type == bfd_link_hash_indirect)
1388 flip = *sym_hash;
1389 else
1390 h->verinfo.vertree = NULL;
1391 }
1392
1393 if (flip != NULL)
1394 {
1395 /* Handle the case where we had a versioned symbol in a dynamic
1396 library and now find a definition in a normal object. In this
1397 case, we make the versioned symbol point to the normal one. */
9c5bfbb7 1398 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902
AM
1399 flip->root.type = h->root.type;
1400 h->root.type = bfd_link_hash_indirect;
1401 h->root.u.i.link = (struct bfd_link_hash_entry *) flip;
fcfa13d2 1402 (*bed->elf_backend_copy_indirect_symbol) (info, flip, h);
45d6a902 1403 flip->root.u.undef.abfd = h->root.u.undef.abfd;
f5385ebf 1404 if (h->def_dynamic)
45d6a902 1405 {
f5385ebf
AM
1406 h->def_dynamic = 0;
1407 flip->ref_dynamic = 1;
45d6a902
AM
1408 }
1409 }
1410
45d6a902
AM
1411 return TRUE;
1412}
1413
1414/* This function is called to create an indirect symbol from the
1415 default for the symbol with the default version if needed. The
1416 symbol is described by H, NAME, SYM, PSEC, VALUE, and OVERRIDE. We
0f8a2703 1417 set DYNSYM if the new indirect symbol is dynamic. */
45d6a902
AM
1418
1419bfd_boolean
268b6b39
AM
1420_bfd_elf_add_default_symbol (bfd *abfd,
1421 struct bfd_link_info *info,
1422 struct elf_link_hash_entry *h,
1423 const char *name,
1424 Elf_Internal_Sym *sym,
1425 asection **psec,
1426 bfd_vma *value,
1427 bfd_boolean *dynsym,
0f8a2703 1428 bfd_boolean override)
45d6a902
AM
1429{
1430 bfd_boolean type_change_ok;
1431 bfd_boolean size_change_ok;
1432 bfd_boolean skip;
1433 char *shortname;
1434 struct elf_link_hash_entry *hi;
1435 struct bfd_link_hash_entry *bh;
9c5bfbb7 1436 const struct elf_backend_data *bed;
45d6a902
AM
1437 bfd_boolean collect;
1438 bfd_boolean dynamic;
1439 char *p;
1440 size_t len, shortlen;
1441 asection *sec;
1442
1443 /* If this symbol has a version, and it is the default version, we
1444 create an indirect symbol from the default name to the fully
1445 decorated name. This will cause external references which do not
1446 specify a version to be bound to this version of the symbol. */
1447 p = strchr (name, ELF_VER_CHR);
1448 if (p == NULL || p[1] != ELF_VER_CHR)
1449 return TRUE;
1450
1451 if (override)
1452 {
4cc11e76 1453 /* We are overridden by an old definition. We need to check if we
45d6a902
AM
1454 need to create the indirect symbol from the default name. */
1455 hi = elf_link_hash_lookup (elf_hash_table (info), name, TRUE,
1456 FALSE, FALSE);
1457 BFD_ASSERT (hi != NULL);
1458 if (hi == h)
1459 return TRUE;
1460 while (hi->root.type == bfd_link_hash_indirect
1461 || hi->root.type == bfd_link_hash_warning)
1462 {
1463 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1464 if (hi == h)
1465 return TRUE;
1466 }
1467 }
1468
1469 bed = get_elf_backend_data (abfd);
1470 collect = bed->collect;
1471 dynamic = (abfd->flags & DYNAMIC) != 0;
1472
1473 shortlen = p - name;
1474 shortname = bfd_hash_allocate (&info->hash->table, shortlen + 1);
1475 if (shortname == NULL)
1476 return FALSE;
1477 memcpy (shortname, name, shortlen);
1478 shortname[shortlen] = '\0';
1479
1480 /* We are going to create a new symbol. Merge it with any existing
1481 symbol with this name. For the purposes of the merge, act as
1482 though we were defining the symbol we just defined, although we
1483 actually going to define an indirect symbol. */
1484 type_change_ok = FALSE;
1485 size_change_ok = FALSE;
1486 sec = *psec;
1487 if (!_bfd_elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
af44c138
L
1488 NULL, &hi, &skip, &override,
1489 &type_change_ok, &size_change_ok))
45d6a902
AM
1490 return FALSE;
1491
1492 if (skip)
1493 goto nondefault;
1494
1495 if (! override)
1496 {
1497 bh = &hi->root;
1498 if (! (_bfd_generic_link_add_one_symbol
1499 (info, abfd, shortname, BSF_INDIRECT, bfd_ind_section_ptr,
268b6b39 1500 0, name, FALSE, collect, &bh)))
45d6a902
AM
1501 return FALSE;
1502 hi = (struct elf_link_hash_entry *) bh;
1503 }
1504 else
1505 {
1506 /* In this case the symbol named SHORTNAME is overriding the
1507 indirect symbol we want to add. We were planning on making
1508 SHORTNAME an indirect symbol referring to NAME. SHORTNAME
1509 is the name without a version. NAME is the fully versioned
1510 name, and it is the default version.
1511
1512 Overriding means that we already saw a definition for the
1513 symbol SHORTNAME in a regular object, and it is overriding
1514 the symbol defined in the dynamic object.
1515
1516 When this happens, we actually want to change NAME, the
1517 symbol we just added, to refer to SHORTNAME. This will cause
1518 references to NAME in the shared object to become references
1519 to SHORTNAME in the regular object. This is what we expect
1520 when we override a function in a shared object: that the
1521 references in the shared object will be mapped to the
1522 definition in the regular object. */
1523
1524 while (hi->root.type == bfd_link_hash_indirect
1525 || hi->root.type == bfd_link_hash_warning)
1526 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1527
1528 h->root.type = bfd_link_hash_indirect;
1529 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
f5385ebf 1530 if (h->def_dynamic)
45d6a902 1531 {
f5385ebf
AM
1532 h->def_dynamic = 0;
1533 hi->ref_dynamic = 1;
1534 if (hi->ref_regular
1535 || hi->def_regular)
45d6a902 1536 {
c152c796 1537 if (! bfd_elf_link_record_dynamic_symbol (info, hi))
45d6a902
AM
1538 return FALSE;
1539 }
1540 }
1541
1542 /* Now set HI to H, so that the following code will set the
1543 other fields correctly. */
1544 hi = h;
1545 }
1546
1547 /* If there is a duplicate definition somewhere, then HI may not
1548 point to an indirect symbol. We will have reported an error to
1549 the user in that case. */
1550
1551 if (hi->root.type == bfd_link_hash_indirect)
1552 {
1553 struct elf_link_hash_entry *ht;
1554
45d6a902 1555 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
fcfa13d2 1556 (*bed->elf_backend_copy_indirect_symbol) (info, ht, hi);
45d6a902
AM
1557
1558 /* See if the new flags lead us to realize that the symbol must
1559 be dynamic. */
1560 if (! *dynsym)
1561 {
1562 if (! dynamic)
1563 {
1564 if (info->shared
f5385ebf 1565 || hi->ref_dynamic)
45d6a902
AM
1566 *dynsym = TRUE;
1567 }
1568 else
1569 {
f5385ebf 1570 if (hi->ref_regular)
45d6a902
AM
1571 *dynsym = TRUE;
1572 }
1573 }
1574 }
1575
1576 /* We also need to define an indirection from the nondefault version
1577 of the symbol. */
1578
1579nondefault:
1580 len = strlen (name);
1581 shortname = bfd_hash_allocate (&info->hash->table, len);
1582 if (shortname == NULL)
1583 return FALSE;
1584 memcpy (shortname, name, shortlen);
1585 memcpy (shortname + shortlen, p + 1, len - shortlen);
1586
1587 /* Once again, merge with any existing symbol. */
1588 type_change_ok = FALSE;
1589 size_change_ok = FALSE;
1590 sec = *psec;
1591 if (!_bfd_elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
af44c138
L
1592 NULL, &hi, &skip, &override,
1593 &type_change_ok, &size_change_ok))
45d6a902
AM
1594 return FALSE;
1595
1596 if (skip)
1597 return TRUE;
1598
1599 if (override)
1600 {
1601 /* Here SHORTNAME is a versioned name, so we don't expect to see
1602 the type of override we do in the case above unless it is
4cc11e76 1603 overridden by a versioned definition. */
45d6a902
AM
1604 if (hi->root.type != bfd_link_hash_defined
1605 && hi->root.type != bfd_link_hash_defweak)
1606 (*_bfd_error_handler)
d003868e
AM
1607 (_("%B: unexpected redefinition of indirect versioned symbol `%s'"),
1608 abfd, shortname);
45d6a902
AM
1609 }
1610 else
1611 {
1612 bh = &hi->root;
1613 if (! (_bfd_generic_link_add_one_symbol
1614 (info, abfd, shortname, BSF_INDIRECT,
268b6b39 1615 bfd_ind_section_ptr, 0, name, FALSE, collect, &bh)))
45d6a902
AM
1616 return FALSE;
1617 hi = (struct elf_link_hash_entry *) bh;
1618
1619 /* If there is a duplicate definition somewhere, then HI may not
1620 point to an indirect symbol. We will have reported an error
1621 to the user in that case. */
1622
1623 if (hi->root.type == bfd_link_hash_indirect)
1624 {
fcfa13d2 1625 (*bed->elf_backend_copy_indirect_symbol) (info, h, hi);
45d6a902
AM
1626
1627 /* See if the new flags lead us to realize that the symbol
1628 must be dynamic. */
1629 if (! *dynsym)
1630 {
1631 if (! dynamic)
1632 {
1633 if (info->shared
f5385ebf 1634 || hi->ref_dynamic)
45d6a902
AM
1635 *dynsym = TRUE;
1636 }
1637 else
1638 {
f5385ebf 1639 if (hi->ref_regular)
45d6a902
AM
1640 *dynsym = TRUE;
1641 }
1642 }
1643 }
1644 }
1645
1646 return TRUE;
1647}
1648\f
1649/* This routine is used to export all defined symbols into the dynamic
1650 symbol table. It is called via elf_link_hash_traverse. */
1651
1652bfd_boolean
268b6b39 1653_bfd_elf_export_symbol (struct elf_link_hash_entry *h, void *data)
45d6a902 1654{
268b6b39 1655 struct elf_info_failed *eif = data;
45d6a902 1656
55255dae
L
1657 /* Ignore this if we won't export it. */
1658 if (!eif->info->export_dynamic && !h->dynamic)
1659 return TRUE;
1660
45d6a902
AM
1661 /* Ignore indirect symbols. These are added by the versioning code. */
1662 if (h->root.type == bfd_link_hash_indirect)
1663 return TRUE;
1664
1665 if (h->root.type == bfd_link_hash_warning)
1666 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1667
1668 if (h->dynindx == -1
f5385ebf
AM
1669 && (h->def_regular
1670 || h->ref_regular))
45d6a902
AM
1671 {
1672 struct bfd_elf_version_tree *t;
1673 struct bfd_elf_version_expr *d;
1674
1675 for (t = eif->verdefs; t != NULL; t = t->next)
1676 {
108ba305 1677 if (t->globals.list != NULL)
45d6a902 1678 {
108ba305
JJ
1679 d = (*t->match) (&t->globals, NULL, h->root.root.string);
1680 if (d != NULL)
1681 goto doit;
45d6a902
AM
1682 }
1683
108ba305 1684 if (t->locals.list != NULL)
45d6a902 1685 {
108ba305
JJ
1686 d = (*t->match) (&t->locals, NULL, h->root.root.string);
1687 if (d != NULL)
1688 return TRUE;
45d6a902
AM
1689 }
1690 }
1691
1692 if (!eif->verdefs)
1693 {
1694 doit:
c152c796 1695 if (! bfd_elf_link_record_dynamic_symbol (eif->info, h))
45d6a902
AM
1696 {
1697 eif->failed = TRUE;
1698 return FALSE;
1699 }
1700 }
1701 }
1702
1703 return TRUE;
1704}
1705\f
1706/* Look through the symbols which are defined in other shared
1707 libraries and referenced here. Update the list of version
1708 dependencies. This will be put into the .gnu.version_r section.
1709 This function is called via elf_link_hash_traverse. */
1710
1711bfd_boolean
268b6b39
AM
1712_bfd_elf_link_find_version_dependencies (struct elf_link_hash_entry *h,
1713 void *data)
45d6a902 1714{
268b6b39 1715 struct elf_find_verdep_info *rinfo = data;
45d6a902
AM
1716 Elf_Internal_Verneed *t;
1717 Elf_Internal_Vernaux *a;
1718 bfd_size_type amt;
1719
1720 if (h->root.type == bfd_link_hash_warning)
1721 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1722
1723 /* We only care about symbols defined in shared objects with version
1724 information. */
f5385ebf
AM
1725 if (!h->def_dynamic
1726 || h->def_regular
45d6a902
AM
1727 || h->dynindx == -1
1728 || h->verinfo.verdef == NULL)
1729 return TRUE;
1730
1731 /* See if we already know about this version. */
1732 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
1733 {
1734 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
1735 continue;
1736
1737 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1738 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
1739 return TRUE;
1740
1741 break;
1742 }
1743
1744 /* This is a new version. Add it to tree we are building. */
1745
1746 if (t == NULL)
1747 {
1748 amt = sizeof *t;
268b6b39 1749 t = bfd_zalloc (rinfo->output_bfd, amt);
45d6a902
AM
1750 if (t == NULL)
1751 {
1752 rinfo->failed = TRUE;
1753 return FALSE;
1754 }
1755
1756 t->vn_bfd = h->verinfo.verdef->vd_bfd;
1757 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
1758 elf_tdata (rinfo->output_bfd)->verref = t;
1759 }
1760
1761 amt = sizeof *a;
268b6b39 1762 a = bfd_zalloc (rinfo->output_bfd, amt);
45d6a902
AM
1763
1764 /* Note that we are copying a string pointer here, and testing it
1765 above. If bfd_elf_string_from_elf_section is ever changed to
1766 discard the string data when low in memory, this will have to be
1767 fixed. */
1768 a->vna_nodename = h->verinfo.verdef->vd_nodename;
1769
1770 a->vna_flags = h->verinfo.verdef->vd_flags;
1771 a->vna_nextptr = t->vn_auxptr;
1772
1773 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
1774 ++rinfo->vers;
1775
1776 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
1777
1778 t->vn_auxptr = a;
1779
1780 return TRUE;
1781}
1782
1783/* Figure out appropriate versions for all the symbols. We may not
1784 have the version number script until we have read all of the input
1785 files, so until that point we don't know which symbols should be
1786 local. This function is called via elf_link_hash_traverse. */
1787
1788bfd_boolean
268b6b39 1789_bfd_elf_link_assign_sym_version (struct elf_link_hash_entry *h, void *data)
45d6a902
AM
1790{
1791 struct elf_assign_sym_version_info *sinfo;
1792 struct bfd_link_info *info;
9c5bfbb7 1793 const struct elf_backend_data *bed;
45d6a902
AM
1794 struct elf_info_failed eif;
1795 char *p;
1796 bfd_size_type amt;
1797
268b6b39 1798 sinfo = data;
45d6a902
AM
1799 info = sinfo->info;
1800
1801 if (h->root.type == bfd_link_hash_warning)
1802 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1803
1804 /* Fix the symbol flags. */
1805 eif.failed = FALSE;
1806 eif.info = info;
1807 if (! _bfd_elf_fix_symbol_flags (h, &eif))
1808 {
1809 if (eif.failed)
1810 sinfo->failed = TRUE;
1811 return FALSE;
1812 }
1813
1814 /* We only need version numbers for symbols defined in regular
1815 objects. */
f5385ebf 1816 if (!h->def_regular)
45d6a902
AM
1817 return TRUE;
1818
1819 bed = get_elf_backend_data (sinfo->output_bfd);
1820 p = strchr (h->root.root.string, ELF_VER_CHR);
1821 if (p != NULL && h->verinfo.vertree == NULL)
1822 {
1823 struct bfd_elf_version_tree *t;
1824 bfd_boolean hidden;
1825
1826 hidden = TRUE;
1827
1828 /* There are two consecutive ELF_VER_CHR characters if this is
1829 not a hidden symbol. */
1830 ++p;
1831 if (*p == ELF_VER_CHR)
1832 {
1833 hidden = FALSE;
1834 ++p;
1835 }
1836
1837 /* If there is no version string, we can just return out. */
1838 if (*p == '\0')
1839 {
1840 if (hidden)
f5385ebf 1841 h->hidden = 1;
45d6a902
AM
1842 return TRUE;
1843 }
1844
1845 /* Look for the version. If we find it, it is no longer weak. */
1846 for (t = sinfo->verdefs; t != NULL; t = t->next)
1847 {
1848 if (strcmp (t->name, p) == 0)
1849 {
1850 size_t len;
1851 char *alc;
1852 struct bfd_elf_version_expr *d;
1853
1854 len = p - h->root.root.string;
268b6b39 1855 alc = bfd_malloc (len);
45d6a902
AM
1856 if (alc == NULL)
1857 return FALSE;
1858 memcpy (alc, h->root.root.string, len - 1);
1859 alc[len - 1] = '\0';
1860 if (alc[len - 2] == ELF_VER_CHR)
1861 alc[len - 2] = '\0';
1862
1863 h->verinfo.vertree = t;
1864 t->used = TRUE;
1865 d = NULL;
1866
108ba305
JJ
1867 if (t->globals.list != NULL)
1868 d = (*t->match) (&t->globals, NULL, alc);
45d6a902
AM
1869
1870 /* See if there is anything to force this symbol to
1871 local scope. */
108ba305 1872 if (d == NULL && t->locals.list != NULL)
45d6a902 1873 {
108ba305
JJ
1874 d = (*t->match) (&t->locals, NULL, alc);
1875 if (d != NULL
1876 && h->dynindx != -1
108ba305
JJ
1877 && ! info->export_dynamic)
1878 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
45d6a902
AM
1879 }
1880
1881 free (alc);
1882 break;
1883 }
1884 }
1885
1886 /* If we are building an application, we need to create a
1887 version node for this version. */
36af4a4e 1888 if (t == NULL && info->executable)
45d6a902
AM
1889 {
1890 struct bfd_elf_version_tree **pp;
1891 int version_index;
1892
1893 /* If we aren't going to export this symbol, we don't need
1894 to worry about it. */
1895 if (h->dynindx == -1)
1896 return TRUE;
1897
1898 amt = sizeof *t;
108ba305 1899 t = bfd_zalloc (sinfo->output_bfd, amt);
45d6a902
AM
1900 if (t == NULL)
1901 {
1902 sinfo->failed = TRUE;
1903 return FALSE;
1904 }
1905
45d6a902 1906 t->name = p;
45d6a902
AM
1907 t->name_indx = (unsigned int) -1;
1908 t->used = TRUE;
1909
1910 version_index = 1;
1911 /* Don't count anonymous version tag. */
1912 if (sinfo->verdefs != NULL && sinfo->verdefs->vernum == 0)
1913 version_index = 0;
1914 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
1915 ++version_index;
1916 t->vernum = version_index;
1917
1918 *pp = t;
1919
1920 h->verinfo.vertree = t;
1921 }
1922 else if (t == NULL)
1923 {
1924 /* We could not find the version for a symbol when
1925 generating a shared archive. Return an error. */
1926 (*_bfd_error_handler)
d003868e
AM
1927 (_("%B: undefined versioned symbol name %s"),
1928 sinfo->output_bfd, h->root.root.string);
45d6a902
AM
1929 bfd_set_error (bfd_error_bad_value);
1930 sinfo->failed = TRUE;
1931 return FALSE;
1932 }
1933
1934 if (hidden)
f5385ebf 1935 h->hidden = 1;
45d6a902
AM
1936 }
1937
1938 /* If we don't have a version for this symbol, see if we can find
1939 something. */
1940 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
1941 {
1942 struct bfd_elf_version_tree *t;
1943 struct bfd_elf_version_tree *local_ver;
1944 struct bfd_elf_version_expr *d;
1945
1946 /* See if can find what version this symbol is in. If the
1947 symbol is supposed to be local, then don't actually register
1948 it. */
1949 local_ver = NULL;
1950 for (t = sinfo->verdefs; t != NULL; t = t->next)
1951 {
108ba305 1952 if (t->globals.list != NULL)
45d6a902
AM
1953 {
1954 bfd_boolean matched;
1955
1956 matched = FALSE;
108ba305
JJ
1957 d = NULL;
1958 while ((d = (*t->match) (&t->globals, d,
1959 h->root.root.string)) != NULL)
1960 if (d->symver)
1961 matched = TRUE;
1962 else
1963 {
1964 /* There is a version without definition. Make
1965 the symbol the default definition for this
1966 version. */
1967 h->verinfo.vertree = t;
1968 local_ver = NULL;
1969 d->script = 1;
1970 break;
1971 }
45d6a902
AM
1972 if (d != NULL)
1973 break;
1974 else if (matched)
1975 /* There is no undefined version for this symbol. Hide the
1976 default one. */
1977 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
1978 }
1979
108ba305 1980 if (t->locals.list != NULL)
45d6a902 1981 {
108ba305
JJ
1982 d = NULL;
1983 while ((d = (*t->match) (&t->locals, d,
1984 h->root.root.string)) != NULL)
45d6a902 1985 {
108ba305 1986 local_ver = t;
45d6a902 1987 /* If the match is "*", keep looking for a more
108ba305
JJ
1988 explicit, perhaps even global, match.
1989 XXX: Shouldn't this be !d->wildcard instead? */
1990 if (d->pattern[0] != '*' || d->pattern[1] != '\0')
1991 break;
45d6a902
AM
1992 }
1993
1994 if (d != NULL)
1995 break;
1996 }
1997 }
1998
1999 if (local_ver != NULL)
2000 {
2001 h->verinfo.vertree = local_ver;
2002 if (h->dynindx != -1
45d6a902
AM
2003 && ! info->export_dynamic)
2004 {
2005 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
2006 }
2007 }
2008 }
2009
2010 return TRUE;
2011}
2012\f
45d6a902
AM
2013/* Read and swap the relocs from the section indicated by SHDR. This
2014 may be either a REL or a RELA section. The relocations are
2015 translated into RELA relocations and stored in INTERNAL_RELOCS,
2016 which should have already been allocated to contain enough space.
2017 The EXTERNAL_RELOCS are a buffer where the external form of the
2018 relocations should be stored.
2019
2020 Returns FALSE if something goes wrong. */
2021
2022static bfd_boolean
268b6b39 2023elf_link_read_relocs_from_section (bfd *abfd,
243ef1e0 2024 asection *sec,
268b6b39
AM
2025 Elf_Internal_Shdr *shdr,
2026 void *external_relocs,
2027 Elf_Internal_Rela *internal_relocs)
45d6a902 2028{
9c5bfbb7 2029 const struct elf_backend_data *bed;
268b6b39 2030 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
45d6a902
AM
2031 const bfd_byte *erela;
2032 const bfd_byte *erelaend;
2033 Elf_Internal_Rela *irela;
243ef1e0
L
2034 Elf_Internal_Shdr *symtab_hdr;
2035 size_t nsyms;
45d6a902 2036
45d6a902
AM
2037 /* Position ourselves at the start of the section. */
2038 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
2039 return FALSE;
2040
2041 /* Read the relocations. */
2042 if (bfd_bread (external_relocs, shdr->sh_size, abfd) != shdr->sh_size)
2043 return FALSE;
2044
243ef1e0
L
2045 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
2046 nsyms = symtab_hdr->sh_size / symtab_hdr->sh_entsize;
2047
45d6a902
AM
2048 bed = get_elf_backend_data (abfd);
2049
2050 /* Convert the external relocations to the internal format. */
2051 if (shdr->sh_entsize == bed->s->sizeof_rel)
2052 swap_in = bed->s->swap_reloc_in;
2053 else if (shdr->sh_entsize == bed->s->sizeof_rela)
2054 swap_in = bed->s->swap_reloca_in;
2055 else
2056 {
2057 bfd_set_error (bfd_error_wrong_format);
2058 return FALSE;
2059 }
2060
2061 erela = external_relocs;
51992aec 2062 erelaend = erela + shdr->sh_size;
45d6a902
AM
2063 irela = internal_relocs;
2064 while (erela < erelaend)
2065 {
243ef1e0
L
2066 bfd_vma r_symndx;
2067
45d6a902 2068 (*swap_in) (abfd, erela, irela);
243ef1e0
L
2069 r_symndx = ELF32_R_SYM (irela->r_info);
2070 if (bed->s->arch_size == 64)
2071 r_symndx >>= 24;
2072 if ((size_t) r_symndx >= nsyms)
2073 {
2074 (*_bfd_error_handler)
d003868e
AM
2075 (_("%B: bad reloc symbol index (0x%lx >= 0x%lx)"
2076 " for offset 0x%lx in section `%A'"),
2077 abfd, sec,
2078 (unsigned long) r_symndx, (unsigned long) nsyms, irela->r_offset);
243ef1e0
L
2079 bfd_set_error (bfd_error_bad_value);
2080 return FALSE;
2081 }
45d6a902
AM
2082 irela += bed->s->int_rels_per_ext_rel;
2083 erela += shdr->sh_entsize;
2084 }
2085
2086 return TRUE;
2087}
2088
2089/* Read and swap the relocs for a section O. They may have been
2090 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
2091 not NULL, they are used as buffers to read into. They are known to
2092 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
2093 the return value is allocated using either malloc or bfd_alloc,
2094 according to the KEEP_MEMORY argument. If O has two relocation
2095 sections (both REL and RELA relocations), then the REL_HDR
2096 relocations will appear first in INTERNAL_RELOCS, followed by the
2097 REL_HDR2 relocations. */
2098
2099Elf_Internal_Rela *
268b6b39
AM
2100_bfd_elf_link_read_relocs (bfd *abfd,
2101 asection *o,
2102 void *external_relocs,
2103 Elf_Internal_Rela *internal_relocs,
2104 bfd_boolean keep_memory)
45d6a902
AM
2105{
2106 Elf_Internal_Shdr *rel_hdr;
268b6b39 2107 void *alloc1 = NULL;
45d6a902 2108 Elf_Internal_Rela *alloc2 = NULL;
9c5bfbb7 2109 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
45d6a902
AM
2110
2111 if (elf_section_data (o)->relocs != NULL)
2112 return elf_section_data (o)->relocs;
2113
2114 if (o->reloc_count == 0)
2115 return NULL;
2116
2117 rel_hdr = &elf_section_data (o)->rel_hdr;
2118
2119 if (internal_relocs == NULL)
2120 {
2121 bfd_size_type size;
2122
2123 size = o->reloc_count;
2124 size *= bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
2125 if (keep_memory)
268b6b39 2126 internal_relocs = bfd_alloc (abfd, size);
45d6a902 2127 else
268b6b39 2128 internal_relocs = alloc2 = bfd_malloc (size);
45d6a902
AM
2129 if (internal_relocs == NULL)
2130 goto error_return;
2131 }
2132
2133 if (external_relocs == NULL)
2134 {
2135 bfd_size_type size = rel_hdr->sh_size;
2136
2137 if (elf_section_data (o)->rel_hdr2)
2138 size += elf_section_data (o)->rel_hdr2->sh_size;
268b6b39 2139 alloc1 = bfd_malloc (size);
45d6a902
AM
2140 if (alloc1 == NULL)
2141 goto error_return;
2142 external_relocs = alloc1;
2143 }
2144
243ef1e0 2145 if (!elf_link_read_relocs_from_section (abfd, o, rel_hdr,
45d6a902
AM
2146 external_relocs,
2147 internal_relocs))
2148 goto error_return;
51992aec
AM
2149 if (elf_section_data (o)->rel_hdr2
2150 && (!elf_link_read_relocs_from_section
2151 (abfd, o,
2152 elf_section_data (o)->rel_hdr2,
2153 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
2154 internal_relocs + (NUM_SHDR_ENTRIES (rel_hdr)
2155 * bed->s->int_rels_per_ext_rel))))
45d6a902
AM
2156 goto error_return;
2157
2158 /* Cache the results for next time, if we can. */
2159 if (keep_memory)
2160 elf_section_data (o)->relocs = internal_relocs;
2161
2162 if (alloc1 != NULL)
2163 free (alloc1);
2164
2165 /* Don't free alloc2, since if it was allocated we are passing it
2166 back (under the name of internal_relocs). */
2167
2168 return internal_relocs;
2169
2170 error_return:
2171 if (alloc1 != NULL)
2172 free (alloc1);
2173 if (alloc2 != NULL)
2174 free (alloc2);
2175 return NULL;
2176}
2177
2178/* Compute the size of, and allocate space for, REL_HDR which is the
2179 section header for a section containing relocations for O. */
2180
2181bfd_boolean
268b6b39
AM
2182_bfd_elf_link_size_reloc_section (bfd *abfd,
2183 Elf_Internal_Shdr *rel_hdr,
2184 asection *o)
45d6a902
AM
2185{
2186 bfd_size_type reloc_count;
2187 bfd_size_type num_rel_hashes;
2188
2189 /* Figure out how many relocations there will be. */
2190 if (rel_hdr == &elf_section_data (o)->rel_hdr)
2191 reloc_count = elf_section_data (o)->rel_count;
2192 else
2193 reloc_count = elf_section_data (o)->rel_count2;
2194
2195 num_rel_hashes = o->reloc_count;
2196 if (num_rel_hashes < reloc_count)
2197 num_rel_hashes = reloc_count;
2198
2199 /* That allows us to calculate the size of the section. */
2200 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
2201
2202 /* The contents field must last into write_object_contents, so we
2203 allocate it with bfd_alloc rather than malloc. Also since we
2204 cannot be sure that the contents will actually be filled in,
2205 we zero the allocated space. */
268b6b39 2206 rel_hdr->contents = bfd_zalloc (abfd, rel_hdr->sh_size);
45d6a902
AM
2207 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
2208 return FALSE;
2209
2210 /* We only allocate one set of hash entries, so we only do it the
2211 first time we are called. */
2212 if (elf_section_data (o)->rel_hashes == NULL
2213 && num_rel_hashes)
2214 {
2215 struct elf_link_hash_entry **p;
2216
268b6b39 2217 p = bfd_zmalloc (num_rel_hashes * sizeof (struct elf_link_hash_entry *));
45d6a902
AM
2218 if (p == NULL)
2219 return FALSE;
2220
2221 elf_section_data (o)->rel_hashes = p;
2222 }
2223
2224 return TRUE;
2225}
2226
2227/* Copy the relocations indicated by the INTERNAL_RELOCS (which
2228 originated from the section given by INPUT_REL_HDR) to the
2229 OUTPUT_BFD. */
2230
2231bfd_boolean
268b6b39
AM
2232_bfd_elf_link_output_relocs (bfd *output_bfd,
2233 asection *input_section,
2234 Elf_Internal_Shdr *input_rel_hdr,
eac338cf
PB
2235 Elf_Internal_Rela *internal_relocs,
2236 struct elf_link_hash_entry **rel_hash
2237 ATTRIBUTE_UNUSED)
45d6a902
AM
2238{
2239 Elf_Internal_Rela *irela;
2240 Elf_Internal_Rela *irelaend;
2241 bfd_byte *erel;
2242 Elf_Internal_Shdr *output_rel_hdr;
2243 asection *output_section;
2244 unsigned int *rel_countp = NULL;
9c5bfbb7 2245 const struct elf_backend_data *bed;
268b6b39 2246 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
45d6a902
AM
2247
2248 output_section = input_section->output_section;
2249 output_rel_hdr = NULL;
2250
2251 if (elf_section_data (output_section)->rel_hdr.sh_entsize
2252 == input_rel_hdr->sh_entsize)
2253 {
2254 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
2255 rel_countp = &elf_section_data (output_section)->rel_count;
2256 }
2257 else if (elf_section_data (output_section)->rel_hdr2
2258 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
2259 == input_rel_hdr->sh_entsize))
2260 {
2261 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
2262 rel_countp = &elf_section_data (output_section)->rel_count2;
2263 }
2264 else
2265 {
2266 (*_bfd_error_handler)
d003868e
AM
2267 (_("%B: relocation size mismatch in %B section %A"),
2268 output_bfd, input_section->owner, input_section);
45d6a902
AM
2269 bfd_set_error (bfd_error_wrong_object_format);
2270 return FALSE;
2271 }
2272
2273 bed = get_elf_backend_data (output_bfd);
2274 if (input_rel_hdr->sh_entsize == bed->s->sizeof_rel)
2275 swap_out = bed->s->swap_reloc_out;
2276 else if (input_rel_hdr->sh_entsize == bed->s->sizeof_rela)
2277 swap_out = bed->s->swap_reloca_out;
2278 else
2279 abort ();
2280
2281 erel = output_rel_hdr->contents;
2282 erel += *rel_countp * input_rel_hdr->sh_entsize;
2283 irela = internal_relocs;
2284 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
2285 * bed->s->int_rels_per_ext_rel);
2286 while (irela < irelaend)
2287 {
2288 (*swap_out) (output_bfd, irela, erel);
2289 irela += bed->s->int_rels_per_ext_rel;
2290 erel += input_rel_hdr->sh_entsize;
2291 }
2292
2293 /* Bump the counter, so that we know where to add the next set of
2294 relocations. */
2295 *rel_countp += NUM_SHDR_ENTRIES (input_rel_hdr);
2296
2297 return TRUE;
2298}
2299\f
508c3946
L
2300/* Make weak undefined symbols in PIE dynamic. */
2301
2302bfd_boolean
2303_bfd_elf_link_hash_fixup_symbol (struct bfd_link_info *info,
2304 struct elf_link_hash_entry *h)
2305{
2306 if (info->pie
2307 && h->dynindx == -1
2308 && h->root.type == bfd_link_hash_undefweak)
2309 return bfd_elf_link_record_dynamic_symbol (info, h);
2310
2311 return TRUE;
2312}
2313
45d6a902
AM
2314/* Fix up the flags for a symbol. This handles various cases which
2315 can only be fixed after all the input files are seen. This is
2316 currently called by both adjust_dynamic_symbol and
2317 assign_sym_version, which is unnecessary but perhaps more robust in
2318 the face of future changes. */
2319
2320bfd_boolean
268b6b39
AM
2321_bfd_elf_fix_symbol_flags (struct elf_link_hash_entry *h,
2322 struct elf_info_failed *eif)
45d6a902 2323{
508c3946
L
2324 const struct elf_backend_data *bed = NULL;
2325
45d6a902
AM
2326 /* If this symbol was mentioned in a non-ELF file, try to set
2327 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
2328 permit a non-ELF file to correctly refer to a symbol defined in
2329 an ELF dynamic object. */
f5385ebf 2330 if (h->non_elf)
45d6a902
AM
2331 {
2332 while (h->root.type == bfd_link_hash_indirect)
2333 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2334
2335 if (h->root.type != bfd_link_hash_defined
2336 && h->root.type != bfd_link_hash_defweak)
f5385ebf
AM
2337 {
2338 h->ref_regular = 1;
2339 h->ref_regular_nonweak = 1;
2340 }
45d6a902
AM
2341 else
2342 {
2343 if (h->root.u.def.section->owner != NULL
2344 && (bfd_get_flavour (h->root.u.def.section->owner)
2345 == bfd_target_elf_flavour))
f5385ebf
AM
2346 {
2347 h->ref_regular = 1;
2348 h->ref_regular_nonweak = 1;
2349 }
45d6a902 2350 else
f5385ebf 2351 h->def_regular = 1;
45d6a902
AM
2352 }
2353
2354 if (h->dynindx == -1
f5385ebf
AM
2355 && (h->def_dynamic
2356 || h->ref_dynamic))
45d6a902 2357 {
c152c796 2358 if (! bfd_elf_link_record_dynamic_symbol (eif->info, h))
45d6a902
AM
2359 {
2360 eif->failed = TRUE;
2361 return FALSE;
2362 }
2363 }
2364 }
2365 else
2366 {
f5385ebf 2367 /* Unfortunately, NON_ELF is only correct if the symbol
45d6a902
AM
2368 was first seen in a non-ELF file. Fortunately, if the symbol
2369 was first seen in an ELF file, we're probably OK unless the
2370 symbol was defined in a non-ELF file. Catch that case here.
2371 FIXME: We're still in trouble if the symbol was first seen in
2372 a dynamic object, and then later in a non-ELF regular object. */
2373 if ((h->root.type == bfd_link_hash_defined
2374 || h->root.type == bfd_link_hash_defweak)
f5385ebf 2375 && !h->def_regular
45d6a902
AM
2376 && (h->root.u.def.section->owner != NULL
2377 ? (bfd_get_flavour (h->root.u.def.section->owner)
2378 != bfd_target_elf_flavour)
2379 : (bfd_is_abs_section (h->root.u.def.section)
f5385ebf
AM
2380 && !h->def_dynamic)))
2381 h->def_regular = 1;
45d6a902
AM
2382 }
2383
508c3946
L
2384 /* Backend specific symbol fixup. */
2385 if (elf_hash_table (eif->info)->dynobj)
2386 {
2387 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2388 if (bed->elf_backend_fixup_symbol
2389 && !(*bed->elf_backend_fixup_symbol) (eif->info, h))
2390 return FALSE;
2391 }
2392
45d6a902
AM
2393 /* If this is a final link, and the symbol was defined as a common
2394 symbol in a regular object file, and there was no definition in
2395 any dynamic object, then the linker will have allocated space for
f5385ebf 2396 the symbol in a common section but the DEF_REGULAR
45d6a902
AM
2397 flag will not have been set. */
2398 if (h->root.type == bfd_link_hash_defined
f5385ebf
AM
2399 && !h->def_regular
2400 && h->ref_regular
2401 && !h->def_dynamic
45d6a902 2402 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
f5385ebf 2403 h->def_regular = 1;
45d6a902
AM
2404
2405 /* If -Bsymbolic was used (which means to bind references to global
2406 symbols to the definition within the shared object), and this
2407 symbol was defined in a regular object, then it actually doesn't
9c7a29a3
AM
2408 need a PLT entry. Likewise, if the symbol has non-default
2409 visibility. If the symbol has hidden or internal visibility, we
c1be741f 2410 will force it local. */
f5385ebf 2411 if (h->needs_plt
45d6a902 2412 && eif->info->shared
0eddce27 2413 && is_elf_hash_table (eif->info->hash)
55255dae 2414 && (SYMBOLIC_BIND (eif->info, h)
c1be741f 2415 || ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
f5385ebf 2416 && h->def_regular)
45d6a902 2417 {
45d6a902
AM
2418 bfd_boolean force_local;
2419
45d6a902
AM
2420 force_local = (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
2421 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN);
2422 (*bed->elf_backend_hide_symbol) (eif->info, h, force_local);
2423 }
2424
2425 /* If a weak undefined symbol has non-default visibility, we also
2426 hide it from the dynamic linker. */
9c7a29a3 2427 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
45d6a902
AM
2428 && h->root.type == bfd_link_hash_undefweak)
2429 {
9c5bfbb7 2430 const struct elf_backend_data *bed;
45d6a902
AM
2431 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
2432 (*bed->elf_backend_hide_symbol) (eif->info, h, TRUE);
2433 }
2434
2435 /* If this is a weak defined symbol in a dynamic object, and we know
2436 the real definition in the dynamic object, copy interesting flags
2437 over to the real definition. */
f6e332e6 2438 if (h->u.weakdef != NULL)
45d6a902
AM
2439 {
2440 struct elf_link_hash_entry *weakdef;
2441
f6e332e6 2442 weakdef = h->u.weakdef;
45d6a902
AM
2443 if (h->root.type == bfd_link_hash_indirect)
2444 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2445
2446 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2447 || h->root.type == bfd_link_hash_defweak);
2448 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
2449 || weakdef->root.type == bfd_link_hash_defweak);
f5385ebf 2450 BFD_ASSERT (weakdef->def_dynamic);
45d6a902
AM
2451
2452 /* If the real definition is defined by a regular object file,
2453 don't do anything special. See the longer description in
2454 _bfd_elf_adjust_dynamic_symbol, below. */
f5385ebf 2455 if (weakdef->def_regular)
f6e332e6 2456 h->u.weakdef = NULL;
45d6a902 2457 else
508c3946
L
2458 (*bed->elf_backend_copy_indirect_symbol) (eif->info, weakdef,
2459 h);
45d6a902
AM
2460 }
2461
2462 return TRUE;
2463}
2464
2465/* Make the backend pick a good value for a dynamic symbol. This is
2466 called via elf_link_hash_traverse, and also calls itself
2467 recursively. */
2468
2469bfd_boolean
268b6b39 2470_bfd_elf_adjust_dynamic_symbol (struct elf_link_hash_entry *h, void *data)
45d6a902 2471{
268b6b39 2472 struct elf_info_failed *eif = data;
45d6a902 2473 bfd *dynobj;
9c5bfbb7 2474 const struct elf_backend_data *bed;
45d6a902 2475
0eddce27 2476 if (! is_elf_hash_table (eif->info->hash))
45d6a902
AM
2477 return FALSE;
2478
2479 if (h->root.type == bfd_link_hash_warning)
2480 {
a6aa5195
AM
2481 h->got = elf_hash_table (eif->info)->init_got_offset;
2482 h->plt = elf_hash_table (eif->info)->init_plt_offset;
45d6a902
AM
2483
2484 /* When warning symbols are created, they **replace** the "real"
2485 entry in the hash table, thus we never get to see the real
2486 symbol in a hash traversal. So look at it now. */
2487 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2488 }
2489
2490 /* Ignore indirect symbols. These are added by the versioning code. */
2491 if (h->root.type == bfd_link_hash_indirect)
2492 return TRUE;
2493
2494 /* Fix the symbol flags. */
2495 if (! _bfd_elf_fix_symbol_flags (h, eif))
2496 return FALSE;
2497
2498 /* If this symbol does not require a PLT entry, and it is not
2499 defined by a dynamic object, or is not referenced by a regular
2500 object, ignore it. We do have to handle a weak defined symbol,
2501 even if no regular object refers to it, if we decided to add it
2502 to the dynamic symbol table. FIXME: Do we normally need to worry
2503 about symbols which are defined by one dynamic object and
2504 referenced by another one? */
f5385ebf
AM
2505 if (!h->needs_plt
2506 && (h->def_regular
2507 || !h->def_dynamic
2508 || (!h->ref_regular
f6e332e6 2509 && (h->u.weakdef == NULL || h->u.weakdef->dynindx == -1))))
45d6a902 2510 {
a6aa5195 2511 h->plt = elf_hash_table (eif->info)->init_plt_offset;
45d6a902
AM
2512 return TRUE;
2513 }
2514
2515 /* If we've already adjusted this symbol, don't do it again. This
2516 can happen via a recursive call. */
f5385ebf 2517 if (h->dynamic_adjusted)
45d6a902
AM
2518 return TRUE;
2519
2520 /* Don't look at this symbol again. Note that we must set this
2521 after checking the above conditions, because we may look at a
2522 symbol once, decide not to do anything, and then get called
2523 recursively later after REF_REGULAR is set below. */
f5385ebf 2524 h->dynamic_adjusted = 1;
45d6a902
AM
2525
2526 /* If this is a weak definition, and we know a real definition, and
2527 the real symbol is not itself defined by a regular object file,
2528 then get a good value for the real definition. We handle the
2529 real symbol first, for the convenience of the backend routine.
2530
2531 Note that there is a confusing case here. If the real definition
2532 is defined by a regular object file, we don't get the real symbol
2533 from the dynamic object, but we do get the weak symbol. If the
2534 processor backend uses a COPY reloc, then if some routine in the
2535 dynamic object changes the real symbol, we will not see that
2536 change in the corresponding weak symbol. This is the way other
2537 ELF linkers work as well, and seems to be a result of the shared
2538 library model.
2539
2540 I will clarify this issue. Most SVR4 shared libraries define the
2541 variable _timezone and define timezone as a weak synonym. The
2542 tzset call changes _timezone. If you write
2543 extern int timezone;
2544 int _timezone = 5;
2545 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
2546 you might expect that, since timezone is a synonym for _timezone,
2547 the same number will print both times. However, if the processor
2548 backend uses a COPY reloc, then actually timezone will be copied
2549 into your process image, and, since you define _timezone
2550 yourself, _timezone will not. Thus timezone and _timezone will
2551 wind up at different memory locations. The tzset call will set
2552 _timezone, leaving timezone unchanged. */
2553
f6e332e6 2554 if (h->u.weakdef != NULL)
45d6a902
AM
2555 {
2556 /* If we get to this point, we know there is an implicit
2557 reference by a regular object file via the weak symbol H.
2558 FIXME: Is this really true? What if the traversal finds
f6e332e6
AM
2559 H->U.WEAKDEF before it finds H? */
2560 h->u.weakdef->ref_regular = 1;
45d6a902 2561
f6e332e6 2562 if (! _bfd_elf_adjust_dynamic_symbol (h->u.weakdef, eif))
45d6a902
AM
2563 return FALSE;
2564 }
2565
2566 /* If a symbol has no type and no size and does not require a PLT
2567 entry, then we are probably about to do the wrong thing here: we
2568 are probably going to create a COPY reloc for an empty object.
2569 This case can arise when a shared object is built with assembly
2570 code, and the assembly code fails to set the symbol type. */
2571 if (h->size == 0
2572 && h->type == STT_NOTYPE
f5385ebf 2573 && !h->needs_plt)
45d6a902
AM
2574 (*_bfd_error_handler)
2575 (_("warning: type and size of dynamic symbol `%s' are not defined"),
2576 h->root.root.string);
2577
2578 dynobj = elf_hash_table (eif->info)->dynobj;
2579 bed = get_elf_backend_data (dynobj);
2580 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
2581 {
2582 eif->failed = TRUE;
2583 return FALSE;
2584 }
2585
2586 return TRUE;
2587}
2588
2589/* Adjust all external symbols pointing into SEC_MERGE sections
2590 to reflect the object merging within the sections. */
2591
2592bfd_boolean
268b6b39 2593_bfd_elf_link_sec_merge_syms (struct elf_link_hash_entry *h, void *data)
45d6a902
AM
2594{
2595 asection *sec;
2596
2597 if (h->root.type == bfd_link_hash_warning)
2598 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2599
2600 if ((h->root.type == bfd_link_hash_defined
2601 || h->root.type == bfd_link_hash_defweak)
2602 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
2603 && sec->sec_info_type == ELF_INFO_TYPE_MERGE)
2604 {
268b6b39 2605 bfd *output_bfd = data;
45d6a902
AM
2606
2607 h->root.u.def.value =
2608 _bfd_merged_section_offset (output_bfd,
2609 &h->root.u.def.section,
2610 elf_section_data (sec)->sec_info,
753731ee 2611 h->root.u.def.value);
45d6a902
AM
2612 }
2613
2614 return TRUE;
2615}
986a241f
RH
2616
2617/* Returns false if the symbol referred to by H should be considered
2618 to resolve local to the current module, and true if it should be
2619 considered to bind dynamically. */
2620
2621bfd_boolean
268b6b39
AM
2622_bfd_elf_dynamic_symbol_p (struct elf_link_hash_entry *h,
2623 struct bfd_link_info *info,
2624 bfd_boolean ignore_protected)
986a241f
RH
2625{
2626 bfd_boolean binding_stays_local_p;
2627
2628 if (h == NULL)
2629 return FALSE;
2630
2631 while (h->root.type == bfd_link_hash_indirect
2632 || h->root.type == bfd_link_hash_warning)
2633 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2634
2635 /* If it was forced local, then clearly it's not dynamic. */
2636 if (h->dynindx == -1)
2637 return FALSE;
f5385ebf 2638 if (h->forced_local)
986a241f
RH
2639 return FALSE;
2640
2641 /* Identify the cases where name binding rules say that a
2642 visible symbol resolves locally. */
55255dae 2643 binding_stays_local_p = info->executable || SYMBOLIC_BIND (info, h);
986a241f
RH
2644
2645 switch (ELF_ST_VISIBILITY (h->other))
2646 {
2647 case STV_INTERNAL:
2648 case STV_HIDDEN:
2649 return FALSE;
2650
2651 case STV_PROTECTED:
2652 /* Proper resolution for function pointer equality may require
2653 that these symbols perhaps be resolved dynamically, even though
2654 we should be resolving them to the current module. */
1c16dfa5 2655 if (!ignore_protected || h->type != STT_FUNC)
986a241f
RH
2656 binding_stays_local_p = TRUE;
2657 break;
2658
2659 default:
986a241f
RH
2660 break;
2661 }
2662
aa37626c 2663 /* If it isn't defined locally, then clearly it's dynamic. */
f5385ebf 2664 if (!h->def_regular)
aa37626c
L
2665 return TRUE;
2666
986a241f
RH
2667 /* Otherwise, the symbol is dynamic if binding rules don't tell
2668 us that it remains local. */
2669 return !binding_stays_local_p;
2670}
f6c52c13
AM
2671
2672/* Return true if the symbol referred to by H should be considered
2673 to resolve local to the current module, and false otherwise. Differs
2674 from (the inverse of) _bfd_elf_dynamic_symbol_p in the treatment of
2675 undefined symbols and weak symbols. */
2676
2677bfd_boolean
268b6b39
AM
2678_bfd_elf_symbol_refs_local_p (struct elf_link_hash_entry *h,
2679 struct bfd_link_info *info,
2680 bfd_boolean local_protected)
f6c52c13
AM
2681{
2682 /* If it's a local sym, of course we resolve locally. */
2683 if (h == NULL)
2684 return TRUE;
2685
7e2294f9
AO
2686 /* Common symbols that become definitions don't get the DEF_REGULAR
2687 flag set, so test it first, and don't bail out. */
2688 if (ELF_COMMON_DEF_P (h))
2689 /* Do nothing. */;
f6c52c13 2690 /* If we don't have a definition in a regular file, then we can't
49ff44d6
L
2691 resolve locally. The sym is either undefined or dynamic. */
2692 else if (!h->def_regular)
f6c52c13
AM
2693 return FALSE;
2694
2695 /* Forced local symbols resolve locally. */
f5385ebf 2696 if (h->forced_local)
f6c52c13
AM
2697 return TRUE;
2698
2699 /* As do non-dynamic symbols. */
2700 if (h->dynindx == -1)
2701 return TRUE;
2702
2703 /* At this point, we know the symbol is defined and dynamic. In an
2704 executable it must resolve locally, likewise when building symbolic
2705 shared libraries. */
55255dae 2706 if (info->executable || SYMBOLIC_BIND (info, h))
f6c52c13
AM
2707 return TRUE;
2708
2709 /* Now deal with defined dynamic symbols in shared libraries. Ones
2710 with default visibility might not resolve locally. */
2711 if (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
2712 return FALSE;
2713
2714 /* However, STV_HIDDEN or STV_INTERNAL ones must be local. */
2715 if (ELF_ST_VISIBILITY (h->other) != STV_PROTECTED)
2716 return TRUE;
2717
1c16dfa5
L
2718 /* STV_PROTECTED non-function symbols are local. */
2719 if (h->type != STT_FUNC)
2720 return TRUE;
2721
f6c52c13
AM
2722 /* Function pointer equality tests may require that STV_PROTECTED
2723 symbols be treated as dynamic symbols, even when we know that the
2724 dynamic linker will resolve them locally. */
2725 return local_protected;
2726}
e1918d23
AM
2727
2728/* Caches some TLS segment info, and ensures that the TLS segment vma is
2729 aligned. Returns the first TLS output section. */
2730
2731struct bfd_section *
2732_bfd_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
2733{
2734 struct bfd_section *sec, *tls;
2735 unsigned int align = 0;
2736
2737 for (sec = obfd->sections; sec != NULL; sec = sec->next)
2738 if ((sec->flags & SEC_THREAD_LOCAL) != 0)
2739 break;
2740 tls = sec;
2741
2742 for (; sec != NULL && (sec->flags & SEC_THREAD_LOCAL) != 0; sec = sec->next)
2743 if (sec->alignment_power > align)
2744 align = sec->alignment_power;
2745
2746 elf_hash_table (info)->tls_sec = tls;
2747
2748 /* Ensure the alignment of the first section is the largest alignment,
2749 so that the tls segment starts aligned. */
2750 if (tls != NULL)
2751 tls->alignment_power = align;
2752
2753 return tls;
2754}
0ad989f9
L
2755
2756/* Return TRUE iff this is a non-common, definition of a non-function symbol. */
2757static bfd_boolean
2758is_global_data_symbol_definition (bfd *abfd ATTRIBUTE_UNUSED,
2759 Elf_Internal_Sym *sym)
2760{
a4d8e49b
L
2761 const struct elf_backend_data *bed;
2762
0ad989f9
L
2763 /* Local symbols do not count, but target specific ones might. */
2764 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
2765 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
2766 return FALSE;
2767
2768 /* Function symbols do not count. */
2769 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
2770 return FALSE;
2771
2772 /* If the section is undefined, then so is the symbol. */
2773 if (sym->st_shndx == SHN_UNDEF)
2774 return FALSE;
2775
2776 /* If the symbol is defined in the common section, then
2777 it is a common definition and so does not count. */
a4d8e49b
L
2778 bed = get_elf_backend_data (abfd);
2779 if (bed->common_definition (sym))
0ad989f9
L
2780 return FALSE;
2781
2782 /* If the symbol is in a target specific section then we
2783 must rely upon the backend to tell us what it is. */
2784 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
2785 /* FIXME - this function is not coded yet:
2786
2787 return _bfd_is_global_symbol_definition (abfd, sym);
2788
2789 Instead for now assume that the definition is not global,
2790 Even if this is wrong, at least the linker will behave
2791 in the same way that it used to do. */
2792 return FALSE;
2793
2794 return TRUE;
2795}
2796
2797/* Search the symbol table of the archive element of the archive ABFD
2798 whose archive map contains a mention of SYMDEF, and determine if
2799 the symbol is defined in this element. */
2800static bfd_boolean
2801elf_link_is_defined_archive_symbol (bfd * abfd, carsym * symdef)
2802{
2803 Elf_Internal_Shdr * hdr;
2804 bfd_size_type symcount;
2805 bfd_size_type extsymcount;
2806 bfd_size_type extsymoff;
2807 Elf_Internal_Sym *isymbuf;
2808 Elf_Internal_Sym *isym;
2809 Elf_Internal_Sym *isymend;
2810 bfd_boolean result;
2811
2812 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
2813 if (abfd == NULL)
2814 return FALSE;
2815
2816 if (! bfd_check_format (abfd, bfd_object))
2817 return FALSE;
2818
2819 /* If we have already included the element containing this symbol in the
2820 link then we do not need to include it again. Just claim that any symbol
2821 it contains is not a definition, so that our caller will not decide to
2822 (re)include this element. */
2823 if (abfd->archive_pass)
2824 return FALSE;
2825
2826 /* Select the appropriate symbol table. */
2827 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
2828 hdr = &elf_tdata (abfd)->symtab_hdr;
2829 else
2830 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
2831
2832 symcount = hdr->sh_size / get_elf_backend_data (abfd)->s->sizeof_sym;
2833
2834 /* The sh_info field of the symtab header tells us where the
2835 external symbols start. We don't care about the local symbols. */
2836 if (elf_bad_symtab (abfd))
2837 {
2838 extsymcount = symcount;
2839 extsymoff = 0;
2840 }
2841 else
2842 {
2843 extsymcount = symcount - hdr->sh_info;
2844 extsymoff = hdr->sh_info;
2845 }
2846
2847 if (extsymcount == 0)
2848 return FALSE;
2849
2850 /* Read in the symbol table. */
2851 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
2852 NULL, NULL, NULL);
2853 if (isymbuf == NULL)
2854 return FALSE;
2855
2856 /* Scan the symbol table looking for SYMDEF. */
2857 result = FALSE;
2858 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
2859 {
2860 const char *name;
2861
2862 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
2863 isym->st_name);
2864 if (name == NULL)
2865 break;
2866
2867 if (strcmp (name, symdef->name) == 0)
2868 {
2869 result = is_global_data_symbol_definition (abfd, isym);
2870 break;
2871 }
2872 }
2873
2874 free (isymbuf);
2875
2876 return result;
2877}
2878\f
5a580b3a
AM
2879/* Add an entry to the .dynamic table. */
2880
2881bfd_boolean
2882_bfd_elf_add_dynamic_entry (struct bfd_link_info *info,
2883 bfd_vma tag,
2884 bfd_vma val)
2885{
2886 struct elf_link_hash_table *hash_table;
2887 const struct elf_backend_data *bed;
2888 asection *s;
2889 bfd_size_type newsize;
2890 bfd_byte *newcontents;
2891 Elf_Internal_Dyn dyn;
2892
2893 hash_table = elf_hash_table (info);
2894 if (! is_elf_hash_table (hash_table))
2895 return FALSE;
2896
2897 bed = get_elf_backend_data (hash_table->dynobj);
2898 s = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
2899 BFD_ASSERT (s != NULL);
2900
eea6121a 2901 newsize = s->size + bed->s->sizeof_dyn;
5a580b3a
AM
2902 newcontents = bfd_realloc (s->contents, newsize);
2903 if (newcontents == NULL)
2904 return FALSE;
2905
2906 dyn.d_tag = tag;
2907 dyn.d_un.d_val = val;
eea6121a 2908 bed->s->swap_dyn_out (hash_table->dynobj, &dyn, newcontents + s->size);
5a580b3a 2909
eea6121a 2910 s->size = newsize;
5a580b3a
AM
2911 s->contents = newcontents;
2912
2913 return TRUE;
2914}
2915
2916/* Add a DT_NEEDED entry for this dynamic object if DO_IT is true,
2917 otherwise just check whether one already exists. Returns -1 on error,
2918 1 if a DT_NEEDED tag already exists, and 0 on success. */
2919
4ad4eba5 2920static int
7e9f0867
AM
2921elf_add_dt_needed_tag (bfd *abfd,
2922 struct bfd_link_info *info,
4ad4eba5
AM
2923 const char *soname,
2924 bfd_boolean do_it)
5a580b3a
AM
2925{
2926 struct elf_link_hash_table *hash_table;
2927 bfd_size_type oldsize;
2928 bfd_size_type strindex;
2929
7e9f0867
AM
2930 if (!_bfd_elf_link_create_dynstrtab (abfd, info))
2931 return -1;
2932
5a580b3a
AM
2933 hash_table = elf_hash_table (info);
2934 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
2935 strindex = _bfd_elf_strtab_add (hash_table->dynstr, soname, FALSE);
2936 if (strindex == (bfd_size_type) -1)
2937 return -1;
2938
2939 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
2940 {
2941 asection *sdyn;
2942 const struct elf_backend_data *bed;
2943 bfd_byte *extdyn;
2944
2945 bed = get_elf_backend_data (hash_table->dynobj);
2946 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
7e9f0867
AM
2947 if (sdyn != NULL)
2948 for (extdyn = sdyn->contents;
2949 extdyn < sdyn->contents + sdyn->size;
2950 extdyn += bed->s->sizeof_dyn)
2951 {
2952 Elf_Internal_Dyn dyn;
5a580b3a 2953
7e9f0867
AM
2954 bed->s->swap_dyn_in (hash_table->dynobj, extdyn, &dyn);
2955 if (dyn.d_tag == DT_NEEDED
2956 && dyn.d_un.d_val == strindex)
2957 {
2958 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
2959 return 1;
2960 }
2961 }
5a580b3a
AM
2962 }
2963
2964 if (do_it)
2965 {
7e9f0867
AM
2966 if (!_bfd_elf_link_create_dynamic_sections (hash_table->dynobj, info))
2967 return -1;
2968
5a580b3a
AM
2969 if (!_bfd_elf_add_dynamic_entry (info, DT_NEEDED, strindex))
2970 return -1;
2971 }
2972 else
2973 /* We were just checking for existence of the tag. */
2974 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
2975
2976 return 0;
2977}
2978
2979/* Sort symbol by value and section. */
4ad4eba5
AM
2980static int
2981elf_sort_symbol (const void *arg1, const void *arg2)
5a580b3a
AM
2982{
2983 const struct elf_link_hash_entry *h1;
2984 const struct elf_link_hash_entry *h2;
10b7e05b 2985 bfd_signed_vma vdiff;
5a580b3a
AM
2986
2987 h1 = *(const struct elf_link_hash_entry **) arg1;
2988 h2 = *(const struct elf_link_hash_entry **) arg2;
10b7e05b
NC
2989 vdiff = h1->root.u.def.value - h2->root.u.def.value;
2990 if (vdiff != 0)
2991 return vdiff > 0 ? 1 : -1;
2992 else
2993 {
2994 long sdiff = h1->root.u.def.section->id - h2->root.u.def.section->id;
2995 if (sdiff != 0)
2996 return sdiff > 0 ? 1 : -1;
2997 }
5a580b3a
AM
2998 return 0;
2999}
4ad4eba5 3000
5a580b3a
AM
3001/* This function is used to adjust offsets into .dynstr for
3002 dynamic symbols. This is called via elf_link_hash_traverse. */
3003
3004static bfd_boolean
3005elf_adjust_dynstr_offsets (struct elf_link_hash_entry *h, void *data)
3006{
3007 struct elf_strtab_hash *dynstr = data;
3008
3009 if (h->root.type == bfd_link_hash_warning)
3010 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3011
3012 if (h->dynindx != -1)
3013 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
3014 return TRUE;
3015}
3016
3017/* Assign string offsets in .dynstr, update all structures referencing
3018 them. */
3019
4ad4eba5
AM
3020static bfd_boolean
3021elf_finalize_dynstr (bfd *output_bfd, struct bfd_link_info *info)
5a580b3a
AM
3022{
3023 struct elf_link_hash_table *hash_table = elf_hash_table (info);
3024 struct elf_link_local_dynamic_entry *entry;
3025 struct elf_strtab_hash *dynstr = hash_table->dynstr;
3026 bfd *dynobj = hash_table->dynobj;
3027 asection *sdyn;
3028 bfd_size_type size;
3029 const struct elf_backend_data *bed;
3030 bfd_byte *extdyn;
3031
3032 _bfd_elf_strtab_finalize (dynstr);
3033 size = _bfd_elf_strtab_size (dynstr);
3034
3035 bed = get_elf_backend_data (dynobj);
3036 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3037 BFD_ASSERT (sdyn != NULL);
3038
3039 /* Update all .dynamic entries referencing .dynstr strings. */
3040 for (extdyn = sdyn->contents;
eea6121a 3041 extdyn < sdyn->contents + sdyn->size;
5a580b3a
AM
3042 extdyn += bed->s->sizeof_dyn)
3043 {
3044 Elf_Internal_Dyn dyn;
3045
3046 bed->s->swap_dyn_in (dynobj, extdyn, &dyn);
3047 switch (dyn.d_tag)
3048 {
3049 case DT_STRSZ:
3050 dyn.d_un.d_val = size;
3051 break;
3052 case DT_NEEDED:
3053 case DT_SONAME:
3054 case DT_RPATH:
3055 case DT_RUNPATH:
3056 case DT_FILTER:
3057 case DT_AUXILIARY:
3058 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
3059 break;
3060 default:
3061 continue;
3062 }
3063 bed->s->swap_dyn_out (dynobj, &dyn, extdyn);
3064 }
3065
3066 /* Now update local dynamic symbols. */
3067 for (entry = hash_table->dynlocal; entry ; entry = entry->next)
3068 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
3069 entry->isym.st_name);
3070
3071 /* And the rest of dynamic symbols. */
3072 elf_link_hash_traverse (hash_table, elf_adjust_dynstr_offsets, dynstr);
3073
3074 /* Adjust version definitions. */
3075 if (elf_tdata (output_bfd)->cverdefs)
3076 {
3077 asection *s;
3078 bfd_byte *p;
3079 bfd_size_type i;
3080 Elf_Internal_Verdef def;
3081 Elf_Internal_Verdaux defaux;
3082
3083 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3084 p = s->contents;
3085 do
3086 {
3087 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
3088 &def);
3089 p += sizeof (Elf_External_Verdef);
3e3b46e5
PB
3090 if (def.vd_aux != sizeof (Elf_External_Verdef))
3091 continue;
5a580b3a
AM
3092 for (i = 0; i < def.vd_cnt; ++i)
3093 {
3094 _bfd_elf_swap_verdaux_in (output_bfd,
3095 (Elf_External_Verdaux *) p, &defaux);
3096 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
3097 defaux.vda_name);
3098 _bfd_elf_swap_verdaux_out (output_bfd,
3099 &defaux, (Elf_External_Verdaux *) p);
3100 p += sizeof (Elf_External_Verdaux);
3101 }
3102 }
3103 while (def.vd_next);
3104 }
3105
3106 /* Adjust version references. */
3107 if (elf_tdata (output_bfd)->verref)
3108 {
3109 asection *s;
3110 bfd_byte *p;
3111 bfd_size_type i;
3112 Elf_Internal_Verneed need;
3113 Elf_Internal_Vernaux needaux;
3114
3115 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3116 p = s->contents;
3117 do
3118 {
3119 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
3120 &need);
3121 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
3122 _bfd_elf_swap_verneed_out (output_bfd, &need,
3123 (Elf_External_Verneed *) p);
3124 p += sizeof (Elf_External_Verneed);
3125 for (i = 0; i < need.vn_cnt; ++i)
3126 {
3127 _bfd_elf_swap_vernaux_in (output_bfd,
3128 (Elf_External_Vernaux *) p, &needaux);
3129 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
3130 needaux.vna_name);
3131 _bfd_elf_swap_vernaux_out (output_bfd,
3132 &needaux,
3133 (Elf_External_Vernaux *) p);
3134 p += sizeof (Elf_External_Vernaux);
3135 }
3136 }
3137 while (need.vn_next);
3138 }
3139
3140 return TRUE;
3141}
3142\f
4ad4eba5
AM
3143/* Add symbols from an ELF object file to the linker hash table. */
3144
3145static bfd_boolean
3146elf_link_add_object_symbols (bfd *abfd, struct bfd_link_info *info)
3147{
4ad4eba5
AM
3148 Elf_Internal_Shdr *hdr;
3149 bfd_size_type symcount;
3150 bfd_size_type extsymcount;
3151 bfd_size_type extsymoff;
3152 struct elf_link_hash_entry **sym_hash;
3153 bfd_boolean dynamic;
3154 Elf_External_Versym *extversym = NULL;
3155 Elf_External_Versym *ever;
3156 struct elf_link_hash_entry *weaks;
3157 struct elf_link_hash_entry **nondeflt_vers = NULL;
3158 bfd_size_type nondeflt_vers_cnt = 0;
3159 Elf_Internal_Sym *isymbuf = NULL;
3160 Elf_Internal_Sym *isym;
3161 Elf_Internal_Sym *isymend;
3162 const struct elf_backend_data *bed;
3163 bfd_boolean add_needed;
66eb6687 3164 struct elf_link_hash_table *htab;
4ad4eba5 3165 bfd_size_type amt;
66eb6687 3166 void *alloc_mark = NULL;
4f87808c
AM
3167 struct bfd_hash_entry **old_table = NULL;
3168 unsigned int old_size = 0;
3169 unsigned int old_count = 0;
66eb6687
AM
3170 void *old_tab = NULL;
3171 void *old_hash;
3172 void *old_ent;
3173 struct bfd_link_hash_entry *old_undefs = NULL;
3174 struct bfd_link_hash_entry *old_undefs_tail = NULL;
3175 long old_dynsymcount = 0;
3176 size_t tabsize = 0;
3177 size_t hashsize = 0;
4ad4eba5 3178
66eb6687 3179 htab = elf_hash_table (info);
4ad4eba5 3180 bed = get_elf_backend_data (abfd);
4ad4eba5
AM
3181
3182 if ((abfd->flags & DYNAMIC) == 0)
3183 dynamic = FALSE;
3184 else
3185 {
3186 dynamic = TRUE;
3187
3188 /* You can't use -r against a dynamic object. Also, there's no
3189 hope of using a dynamic object which does not exactly match
3190 the format of the output file. */
3191 if (info->relocatable
66eb6687
AM
3192 || !is_elf_hash_table (htab)
3193 || htab->root.creator != abfd->xvec)
4ad4eba5 3194 {
9a0789ec
NC
3195 if (info->relocatable)
3196 bfd_set_error (bfd_error_invalid_operation);
3197 else
3198 bfd_set_error (bfd_error_wrong_format);
4ad4eba5
AM
3199 goto error_return;
3200 }
3201 }
3202
3203 /* As a GNU extension, any input sections which are named
3204 .gnu.warning.SYMBOL are treated as warning symbols for the given
3205 symbol. This differs from .gnu.warning sections, which generate
3206 warnings when they are included in an output file. */
3207 if (info->executable)
3208 {
3209 asection *s;
3210
3211 for (s = abfd->sections; s != NULL; s = s->next)
3212 {
3213 const char *name;
3214
3215 name = bfd_get_section_name (abfd, s);
0112cd26 3216 if (CONST_STRNEQ (name, ".gnu.warning."))
4ad4eba5
AM
3217 {
3218 char *msg;
3219 bfd_size_type sz;
4ad4eba5
AM
3220
3221 name += sizeof ".gnu.warning." - 1;
3222
3223 /* If this is a shared object, then look up the symbol
3224 in the hash table. If it is there, and it is already
3225 been defined, then we will not be using the entry
3226 from this shared object, so we don't need to warn.
3227 FIXME: If we see the definition in a regular object
3228 later on, we will warn, but we shouldn't. The only
3229 fix is to keep track of what warnings we are supposed
3230 to emit, and then handle them all at the end of the
3231 link. */
3232 if (dynamic)
3233 {
3234 struct elf_link_hash_entry *h;
3235
66eb6687 3236 h = elf_link_hash_lookup (htab, name, FALSE, FALSE, TRUE);
4ad4eba5
AM
3237
3238 /* FIXME: What about bfd_link_hash_common? */
3239 if (h != NULL
3240 && (h->root.type == bfd_link_hash_defined
3241 || h->root.type == bfd_link_hash_defweak))
3242 {
3243 /* We don't want to issue this warning. Clobber
3244 the section size so that the warning does not
3245 get copied into the output file. */
eea6121a 3246 s->size = 0;
4ad4eba5
AM
3247 continue;
3248 }
3249 }
3250
eea6121a 3251 sz = s->size;
370a0e1b 3252 msg = bfd_alloc (abfd, sz + 1);
4ad4eba5
AM
3253 if (msg == NULL)
3254 goto error_return;
3255
370a0e1b 3256 if (! bfd_get_section_contents (abfd, s, msg, 0, sz))
4ad4eba5
AM
3257 goto error_return;
3258
370a0e1b 3259 msg[sz] = '\0';
4ad4eba5
AM
3260
3261 if (! (_bfd_generic_link_add_one_symbol
3262 (info, abfd, name, BSF_WARNING, s, 0, msg,
66eb6687 3263 FALSE, bed->collect, NULL)))
4ad4eba5
AM
3264 goto error_return;
3265
3266 if (! info->relocatable)
3267 {
3268 /* Clobber the section size so that the warning does
3269 not get copied into the output file. */
eea6121a 3270 s->size = 0;
11d2f718
AM
3271
3272 /* Also set SEC_EXCLUDE, so that symbols defined in
3273 the warning section don't get copied to the output. */
3274 s->flags |= SEC_EXCLUDE;
4ad4eba5
AM
3275 }
3276 }
3277 }
3278 }
3279
3280 add_needed = TRUE;
3281 if (! dynamic)
3282 {
3283 /* If we are creating a shared library, create all the dynamic
3284 sections immediately. We need to attach them to something,
3285 so we attach them to this BFD, provided it is the right
3286 format. FIXME: If there are no input BFD's of the same
3287 format as the output, we can't make a shared library. */
3288 if (info->shared
66eb6687
AM
3289 && is_elf_hash_table (htab)
3290 && htab->root.creator == abfd->xvec
3291 && !htab->dynamic_sections_created)
4ad4eba5
AM
3292 {
3293 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
3294 goto error_return;
3295 }
3296 }
66eb6687 3297 else if (!is_elf_hash_table (htab))
4ad4eba5
AM
3298 goto error_return;
3299 else
3300 {
3301 asection *s;
3302 const char *soname = NULL;
3303 struct bfd_link_needed_list *rpath = NULL, *runpath = NULL;
3304 int ret;
3305
3306 /* ld --just-symbols and dynamic objects don't mix very well.
92fd189d 3307 ld shouldn't allow it. */
4ad4eba5
AM
3308 if ((s = abfd->sections) != NULL
3309 && s->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
92fd189d 3310 abort ();
4ad4eba5
AM
3311
3312 /* If this dynamic lib was specified on the command line with
3313 --as-needed in effect, then we don't want to add a DT_NEEDED
3314 tag unless the lib is actually used. Similary for libs brought
e56f61be
L
3315 in by another lib's DT_NEEDED. When --no-add-needed is used
3316 on a dynamic lib, we don't want to add a DT_NEEDED entry for
3317 any dynamic library in DT_NEEDED tags in the dynamic lib at
3318 all. */
3319 add_needed = (elf_dyn_lib_class (abfd)
3320 & (DYN_AS_NEEDED | DYN_DT_NEEDED
3321 | DYN_NO_NEEDED)) == 0;
4ad4eba5
AM
3322
3323 s = bfd_get_section_by_name (abfd, ".dynamic");
3324 if (s != NULL)
3325 {
3326 bfd_byte *dynbuf;
3327 bfd_byte *extdyn;
3328 int elfsec;
3329 unsigned long shlink;
3330
eea6121a 3331 if (!bfd_malloc_and_get_section (abfd, s, &dynbuf))
4ad4eba5
AM
3332 goto error_free_dyn;
3333
3334 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
3335 if (elfsec == -1)
3336 goto error_free_dyn;
3337 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
3338
3339 for (extdyn = dynbuf;
eea6121a 3340 extdyn < dynbuf + s->size;
4ad4eba5
AM
3341 extdyn += bed->s->sizeof_dyn)
3342 {
3343 Elf_Internal_Dyn dyn;
3344
3345 bed->s->swap_dyn_in (abfd, extdyn, &dyn);
3346 if (dyn.d_tag == DT_SONAME)
3347 {
3348 unsigned int tagv = dyn.d_un.d_val;
3349 soname = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3350 if (soname == NULL)
3351 goto error_free_dyn;
3352 }
3353 if (dyn.d_tag == DT_NEEDED)
3354 {
3355 struct bfd_link_needed_list *n, **pn;
3356 char *fnm, *anm;
3357 unsigned int tagv = dyn.d_un.d_val;
3358
3359 amt = sizeof (struct bfd_link_needed_list);
3360 n = bfd_alloc (abfd, amt);
3361 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3362 if (n == NULL || fnm == NULL)
3363 goto error_free_dyn;
3364 amt = strlen (fnm) + 1;
3365 anm = bfd_alloc (abfd, amt);
3366 if (anm == NULL)
3367 goto error_free_dyn;
3368 memcpy (anm, fnm, amt);
3369 n->name = anm;
3370 n->by = abfd;
3371 n->next = NULL;
66eb6687 3372 for (pn = &htab->needed; *pn != NULL; pn = &(*pn)->next)
4ad4eba5
AM
3373 ;
3374 *pn = n;
3375 }
3376 if (dyn.d_tag == DT_RUNPATH)
3377 {
3378 struct bfd_link_needed_list *n, **pn;
3379 char *fnm, *anm;
3380 unsigned int tagv = dyn.d_un.d_val;
3381
3382 amt = sizeof (struct bfd_link_needed_list);
3383 n = bfd_alloc (abfd, amt);
3384 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3385 if (n == NULL || fnm == NULL)
3386 goto error_free_dyn;
3387 amt = strlen (fnm) + 1;
3388 anm = bfd_alloc (abfd, amt);
3389 if (anm == NULL)
3390 goto error_free_dyn;
3391 memcpy (anm, fnm, amt);
3392 n->name = anm;
3393 n->by = abfd;
3394 n->next = NULL;
3395 for (pn = & runpath;
3396 *pn != NULL;
3397 pn = &(*pn)->next)
3398 ;
3399 *pn = n;
3400 }
3401 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
3402 if (!runpath && dyn.d_tag == DT_RPATH)
3403 {
3404 struct bfd_link_needed_list *n, **pn;
3405 char *fnm, *anm;
3406 unsigned int tagv = dyn.d_un.d_val;
3407
3408 amt = sizeof (struct bfd_link_needed_list);
3409 n = bfd_alloc (abfd, amt);
3410 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
3411 if (n == NULL || fnm == NULL)
3412 goto error_free_dyn;
3413 amt = strlen (fnm) + 1;
3414 anm = bfd_alloc (abfd, amt);
3415 if (anm == NULL)
3416 {
3417 error_free_dyn:
3418 free (dynbuf);
3419 goto error_return;
3420 }
3421 memcpy (anm, fnm, amt);
3422 n->name = anm;
3423 n->by = abfd;
3424 n->next = NULL;
3425 for (pn = & rpath;
3426 *pn != NULL;
3427 pn = &(*pn)->next)
3428 ;
3429 *pn = n;
3430 }
3431 }
3432
3433 free (dynbuf);
3434 }
3435
3436 /* DT_RUNPATH overrides DT_RPATH. Do _NOT_ bfd_release, as that
3437 frees all more recently bfd_alloc'd blocks as well. */
3438 if (runpath)
3439 rpath = runpath;
3440
3441 if (rpath)
3442 {
3443 struct bfd_link_needed_list **pn;
66eb6687 3444 for (pn = &htab->runpath; *pn != NULL; pn = &(*pn)->next)
4ad4eba5
AM
3445 ;
3446 *pn = rpath;
3447 }
3448
3449 /* We do not want to include any of the sections in a dynamic
3450 object in the output file. We hack by simply clobbering the
3451 list of sections in the BFD. This could be handled more
3452 cleanly by, say, a new section flag; the existing
3453 SEC_NEVER_LOAD flag is not the one we want, because that one
3454 still implies that the section takes up space in the output
3455 file. */
3456 bfd_section_list_clear (abfd);
3457
4ad4eba5
AM
3458 /* Find the name to use in a DT_NEEDED entry that refers to this
3459 object. If the object has a DT_SONAME entry, we use it.
3460 Otherwise, if the generic linker stuck something in
3461 elf_dt_name, we use that. Otherwise, we just use the file
3462 name. */
3463 if (soname == NULL || *soname == '\0')
3464 {
3465 soname = elf_dt_name (abfd);
3466 if (soname == NULL || *soname == '\0')
3467 soname = bfd_get_filename (abfd);
3468 }
3469
3470 /* Save the SONAME because sometimes the linker emulation code
3471 will need to know it. */
3472 elf_dt_name (abfd) = soname;
3473
7e9f0867 3474 ret = elf_add_dt_needed_tag (abfd, info, soname, add_needed);
4ad4eba5
AM
3475 if (ret < 0)
3476 goto error_return;
3477
3478 /* If we have already included this dynamic object in the
3479 link, just ignore it. There is no reason to include a
3480 particular dynamic object more than once. */
3481 if (ret > 0)
3482 return TRUE;
3483 }
3484
3485 /* If this is a dynamic object, we always link against the .dynsym
3486 symbol table, not the .symtab symbol table. The dynamic linker
3487 will only see the .dynsym symbol table, so there is no reason to
3488 look at .symtab for a dynamic object. */
3489
3490 if (! dynamic || elf_dynsymtab (abfd) == 0)
3491 hdr = &elf_tdata (abfd)->symtab_hdr;
3492 else
3493 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
3494
3495 symcount = hdr->sh_size / bed->s->sizeof_sym;
3496
3497 /* The sh_info field of the symtab header tells us where the
3498 external symbols start. We don't care about the local symbols at
3499 this point. */
3500 if (elf_bad_symtab (abfd))
3501 {
3502 extsymcount = symcount;
3503 extsymoff = 0;
3504 }
3505 else
3506 {
3507 extsymcount = symcount - hdr->sh_info;
3508 extsymoff = hdr->sh_info;
3509 }
3510
3511 sym_hash = NULL;
3512 if (extsymcount != 0)
3513 {
3514 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
3515 NULL, NULL, NULL);
3516 if (isymbuf == NULL)
3517 goto error_return;
3518
3519 /* We store a pointer to the hash table entry for each external
3520 symbol. */
3521 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
3522 sym_hash = bfd_alloc (abfd, amt);
3523 if (sym_hash == NULL)
3524 goto error_free_sym;
3525 elf_sym_hashes (abfd) = sym_hash;
3526 }
3527
3528 if (dynamic)
3529 {
3530 /* Read in any version definitions. */
fc0e6df6
PB
3531 if (!_bfd_elf_slurp_version_tables (abfd,
3532 info->default_imported_symver))
4ad4eba5
AM
3533 goto error_free_sym;
3534
3535 /* Read in the symbol versions, but don't bother to convert them
3536 to internal format. */
3537 if (elf_dynversym (abfd) != 0)
3538 {
3539 Elf_Internal_Shdr *versymhdr;
3540
3541 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
3542 extversym = bfd_malloc (versymhdr->sh_size);
3543 if (extversym == NULL)
3544 goto error_free_sym;
3545 amt = versymhdr->sh_size;
3546 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
3547 || bfd_bread (extversym, amt, abfd) != amt)
3548 goto error_free_vers;
3549 }
3550 }
3551
66eb6687
AM
3552 /* If we are loading an as-needed shared lib, save the symbol table
3553 state before we start adding symbols. If the lib turns out
3554 to be unneeded, restore the state. */
3555 if ((elf_dyn_lib_class (abfd) & DYN_AS_NEEDED) != 0)
3556 {
3557 unsigned int i;
3558 size_t entsize;
3559
3560 for (entsize = 0, i = 0; i < htab->root.table.size; i++)
3561 {
3562 struct bfd_hash_entry *p;
2de92251 3563 struct elf_link_hash_entry *h;
66eb6687
AM
3564
3565 for (p = htab->root.table.table[i]; p != NULL; p = p->next)
2de92251
AM
3566 {
3567 h = (struct elf_link_hash_entry *) p;
3568 entsize += htab->root.table.entsize;
3569 if (h->root.type == bfd_link_hash_warning)
3570 entsize += htab->root.table.entsize;
3571 }
66eb6687
AM
3572 }
3573
3574 tabsize = htab->root.table.size * sizeof (struct bfd_hash_entry *);
3575 hashsize = extsymcount * sizeof (struct elf_link_hash_entry *);
3576 old_tab = bfd_malloc (tabsize + entsize + hashsize);
3577 if (old_tab == NULL)
3578 goto error_free_vers;
3579
3580 /* Remember the current objalloc pointer, so that all mem for
3581 symbols added can later be reclaimed. */
3582 alloc_mark = bfd_hash_allocate (&htab->root.table, 1);
3583 if (alloc_mark == NULL)
3584 goto error_free_vers;
3585
5061a885
AM
3586 /* Make a special call to the linker "notice" function to
3587 tell it that we are about to handle an as-needed lib. */
3588 if (!(*info->callbacks->notice) (info, NULL, abfd, NULL,
3589 notice_as_needed))
3590 return FALSE;
3591
3592
66eb6687
AM
3593 /* Clone the symbol table and sym hashes. Remember some
3594 pointers into the symbol table, and dynamic symbol count. */
3595 old_hash = (char *) old_tab + tabsize;
3596 old_ent = (char *) old_hash + hashsize;
3597 memcpy (old_tab, htab->root.table.table, tabsize);
3598 memcpy (old_hash, sym_hash, hashsize);
3599 old_undefs = htab->root.undefs;
3600 old_undefs_tail = htab->root.undefs_tail;
4f87808c
AM
3601 old_table = htab->root.table.table;
3602 old_size = htab->root.table.size;
3603 old_count = htab->root.table.count;
66eb6687
AM
3604 old_dynsymcount = htab->dynsymcount;
3605
3606 for (i = 0; i < htab->root.table.size; i++)
3607 {
3608 struct bfd_hash_entry *p;
2de92251 3609 struct elf_link_hash_entry *h;
66eb6687
AM
3610
3611 for (p = htab->root.table.table[i]; p != NULL; p = p->next)
3612 {
3613 memcpy (old_ent, p, htab->root.table.entsize);
3614 old_ent = (char *) old_ent + htab->root.table.entsize;
2de92251
AM
3615 h = (struct elf_link_hash_entry *) p;
3616 if (h->root.type == bfd_link_hash_warning)
3617 {
3618 memcpy (old_ent, h->root.u.i.link, htab->root.table.entsize);
3619 old_ent = (char *) old_ent + htab->root.table.entsize;
3620 }
66eb6687
AM
3621 }
3622 }
3623 }
4ad4eba5 3624
66eb6687 3625 weaks = NULL;
4ad4eba5
AM
3626 ever = extversym != NULL ? extversym + extsymoff : NULL;
3627 for (isym = isymbuf, isymend = isymbuf + extsymcount;
3628 isym < isymend;
3629 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
3630 {
3631 int bind;
3632 bfd_vma value;
af44c138 3633 asection *sec, *new_sec;
4ad4eba5
AM
3634 flagword flags;
3635 const char *name;
3636 struct elf_link_hash_entry *h;
3637 bfd_boolean definition;
3638 bfd_boolean size_change_ok;
3639 bfd_boolean type_change_ok;
3640 bfd_boolean new_weakdef;
3641 bfd_boolean override;
a4d8e49b 3642 bfd_boolean common;
4ad4eba5
AM
3643 unsigned int old_alignment;
3644 bfd *old_bfd;
3645
3646 override = FALSE;
3647
3648 flags = BSF_NO_FLAGS;
3649 sec = NULL;
3650 value = isym->st_value;
3651 *sym_hash = NULL;
a4d8e49b 3652 common = bed->common_definition (isym);
4ad4eba5
AM
3653
3654 bind = ELF_ST_BIND (isym->st_info);
3655 if (bind == STB_LOCAL)
3656 {
3657 /* This should be impossible, since ELF requires that all
3658 global symbols follow all local symbols, and that sh_info
3659 point to the first global symbol. Unfortunately, Irix 5
3660 screws this up. */
3661 continue;
3662 }
3663 else if (bind == STB_GLOBAL)
3664 {
a4d8e49b 3665 if (isym->st_shndx != SHN_UNDEF && !common)
4ad4eba5
AM
3666 flags = BSF_GLOBAL;
3667 }
3668 else if (bind == STB_WEAK)
3669 flags = BSF_WEAK;
3670 else
3671 {
3672 /* Leave it up to the processor backend. */
3673 }
3674
3675 if (isym->st_shndx == SHN_UNDEF)
3676 sec = bfd_und_section_ptr;
66eb6687
AM
3677 else if (isym->st_shndx < SHN_LORESERVE
3678 || isym->st_shndx > SHN_HIRESERVE)
4ad4eba5
AM
3679 {
3680 sec = bfd_section_from_elf_index (abfd, isym->st_shndx);
3681 if (sec == NULL)
3682 sec = bfd_abs_section_ptr;
529fcb95
PB
3683 else if (sec->kept_section)
3684 {
e5d08002
L
3685 /* Symbols from discarded section are undefined. We keep
3686 its visibility. */
529fcb95
PB
3687 sec = bfd_und_section_ptr;
3688 isym->st_shndx = SHN_UNDEF;
3689 }
4ad4eba5
AM
3690 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
3691 value -= sec->vma;
3692 }
3693 else if (isym->st_shndx == SHN_ABS)
3694 sec = bfd_abs_section_ptr;
3695 else if (isym->st_shndx == SHN_COMMON)
3696 {
3697 sec = bfd_com_section_ptr;
3698 /* What ELF calls the size we call the value. What ELF
3699 calls the value we call the alignment. */
3700 value = isym->st_size;
3701 }
3702 else
3703 {
3704 /* Leave it up to the processor backend. */
3705 }
3706
3707 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
3708 isym->st_name);
3709 if (name == NULL)
3710 goto error_free_vers;
3711
3712 if (isym->st_shndx == SHN_COMMON
6a4a0940
JJ
3713 && ELF_ST_TYPE (isym->st_info) == STT_TLS
3714 && !info->relocatable)
4ad4eba5
AM
3715 {
3716 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
3717
3718 if (tcomm == NULL)
3719 {
3496cb2a
L
3720 tcomm = bfd_make_section_with_flags (abfd, ".tcommon",
3721 (SEC_ALLOC
3722 | SEC_IS_COMMON
3723 | SEC_LINKER_CREATED
3724 | SEC_THREAD_LOCAL));
3725 if (tcomm == NULL)
4ad4eba5
AM
3726 goto error_free_vers;
3727 }
3728 sec = tcomm;
3729 }
66eb6687 3730 else if (bed->elf_add_symbol_hook)
4ad4eba5 3731 {
66eb6687
AM
3732 if (! (*bed->elf_add_symbol_hook) (abfd, info, isym, &name, &flags,
3733 &sec, &value))
4ad4eba5
AM
3734 goto error_free_vers;
3735
3736 /* The hook function sets the name to NULL if this symbol
3737 should be skipped for some reason. */
3738 if (name == NULL)
3739 continue;
3740 }
3741
3742 /* Sanity check that all possibilities were handled. */
3743 if (sec == NULL)
3744 {
3745 bfd_set_error (bfd_error_bad_value);
3746 goto error_free_vers;
3747 }
3748
3749 if (bfd_is_und_section (sec)
3750 || bfd_is_com_section (sec))
3751 definition = FALSE;
3752 else
3753 definition = TRUE;
3754
3755 size_change_ok = FALSE;
66eb6687 3756 type_change_ok = bed->type_change_ok;
4ad4eba5
AM
3757 old_alignment = 0;
3758 old_bfd = NULL;
af44c138 3759 new_sec = sec;
4ad4eba5 3760
66eb6687 3761 if (is_elf_hash_table (htab))
4ad4eba5
AM
3762 {
3763 Elf_Internal_Versym iver;
3764 unsigned int vernum = 0;
3765 bfd_boolean skip;
3766
fc0e6df6 3767 if (ever == NULL)
4ad4eba5 3768 {
fc0e6df6
PB
3769 if (info->default_imported_symver)
3770 /* Use the default symbol version created earlier. */
3771 iver.vs_vers = elf_tdata (abfd)->cverdefs;
3772 else
3773 iver.vs_vers = 0;
3774 }
3775 else
3776 _bfd_elf_swap_versym_in (abfd, ever, &iver);
3777
3778 vernum = iver.vs_vers & VERSYM_VERSION;
3779
3780 /* If this is a hidden symbol, or if it is not version
3781 1, we append the version name to the symbol name.
cc86ff91
EB
3782 However, we do not modify a non-hidden absolute symbol
3783 if it is not a function, because it might be the version
3784 symbol itself. FIXME: What if it isn't? */
fc0e6df6 3785 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
cc86ff91
EB
3786 || (vernum > 1 && (! bfd_is_abs_section (sec)
3787 || ELF_ST_TYPE (isym->st_info) == STT_FUNC)))
fc0e6df6
PB
3788 {
3789 const char *verstr;
3790 size_t namelen, verlen, newlen;
3791 char *newname, *p;
3792
3793 if (isym->st_shndx != SHN_UNDEF)
4ad4eba5 3794 {
fc0e6df6
PB
3795 if (vernum > elf_tdata (abfd)->cverdefs)
3796 verstr = NULL;
3797 else if (vernum > 1)
3798 verstr =
3799 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
3800 else
3801 verstr = "";
4ad4eba5 3802
fc0e6df6 3803 if (verstr == NULL)
4ad4eba5 3804 {
fc0e6df6
PB
3805 (*_bfd_error_handler)
3806 (_("%B: %s: invalid version %u (max %d)"),
3807 abfd, name, vernum,
3808 elf_tdata (abfd)->cverdefs);
3809 bfd_set_error (bfd_error_bad_value);
3810 goto error_free_vers;
4ad4eba5 3811 }
fc0e6df6
PB
3812 }
3813 else
3814 {
3815 /* We cannot simply test for the number of
3816 entries in the VERNEED section since the
3817 numbers for the needed versions do not start
3818 at 0. */
3819 Elf_Internal_Verneed *t;
3820
3821 verstr = NULL;
3822 for (t = elf_tdata (abfd)->verref;
3823 t != NULL;
3824 t = t->vn_nextref)
4ad4eba5 3825 {
fc0e6df6 3826 Elf_Internal_Vernaux *a;
4ad4eba5 3827
fc0e6df6
PB
3828 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3829 {
3830 if (a->vna_other == vernum)
4ad4eba5 3831 {
fc0e6df6
PB
3832 verstr = a->vna_nodename;
3833 break;
4ad4eba5 3834 }
4ad4eba5 3835 }
fc0e6df6
PB
3836 if (a != NULL)
3837 break;
3838 }
3839 if (verstr == NULL)
3840 {
3841 (*_bfd_error_handler)
3842 (_("%B: %s: invalid needed version %d"),
3843 abfd, name, vernum);
3844 bfd_set_error (bfd_error_bad_value);
3845 goto error_free_vers;
4ad4eba5 3846 }
4ad4eba5 3847 }
fc0e6df6
PB
3848
3849 namelen = strlen (name);
3850 verlen = strlen (verstr);
3851 newlen = namelen + verlen + 2;
3852 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
3853 && isym->st_shndx != SHN_UNDEF)
3854 ++newlen;
3855
66eb6687 3856 newname = bfd_hash_allocate (&htab->root.table, newlen);
fc0e6df6
PB
3857 if (newname == NULL)
3858 goto error_free_vers;
3859 memcpy (newname, name, namelen);
3860 p = newname + namelen;
3861 *p++ = ELF_VER_CHR;
3862 /* If this is a defined non-hidden version symbol,
3863 we add another @ to the name. This indicates the
3864 default version of the symbol. */
3865 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
3866 && isym->st_shndx != SHN_UNDEF)
3867 *p++ = ELF_VER_CHR;
3868 memcpy (p, verstr, verlen + 1);
3869
3870 name = newname;
4ad4eba5
AM
3871 }
3872
af44c138
L
3873 if (!_bfd_elf_merge_symbol (abfd, info, name, isym, &sec,
3874 &value, &old_alignment,
4ad4eba5
AM
3875 sym_hash, &skip, &override,
3876 &type_change_ok, &size_change_ok))
3877 goto error_free_vers;
3878
3879 if (skip)
3880 continue;
3881
3882 if (override)
3883 definition = FALSE;
3884
3885 h = *sym_hash;
3886 while (h->root.type == bfd_link_hash_indirect
3887 || h->root.type == bfd_link_hash_warning)
3888 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3889
3890 /* Remember the old alignment if this is a common symbol, so
3891 that we don't reduce the alignment later on. We can't
3892 check later, because _bfd_generic_link_add_one_symbol
3893 will set a default for the alignment which we want to
3894 override. We also remember the old bfd where the existing
3895 definition comes from. */
3896 switch (h->root.type)
3897 {
3898 default:
3899 break;
3900
3901 case bfd_link_hash_defined:
3902 case bfd_link_hash_defweak:
3903 old_bfd = h->root.u.def.section->owner;
3904 break;
3905
3906 case bfd_link_hash_common:
3907 old_bfd = h->root.u.c.p->section->owner;
3908 old_alignment = h->root.u.c.p->alignment_power;
3909 break;
3910 }
3911
3912 if (elf_tdata (abfd)->verdef != NULL
3913 && ! override
3914 && vernum > 1
3915 && definition)
3916 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
3917 }
3918
3919 if (! (_bfd_generic_link_add_one_symbol
66eb6687 3920 (info, abfd, name, flags, sec, value, NULL, FALSE, bed->collect,
4ad4eba5
AM
3921 (struct bfd_link_hash_entry **) sym_hash)))
3922 goto error_free_vers;
3923
3924 h = *sym_hash;
3925 while (h->root.type == bfd_link_hash_indirect
3926 || h->root.type == bfd_link_hash_warning)
3927 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3928 *sym_hash = h;
3929
3930 new_weakdef = FALSE;
3931 if (dynamic
3932 && definition
3933 && (flags & BSF_WEAK) != 0
3934 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
66eb6687 3935 && is_elf_hash_table (htab)
f6e332e6 3936 && h->u.weakdef == NULL)
4ad4eba5
AM
3937 {
3938 /* Keep a list of all weak defined non function symbols from
3939 a dynamic object, using the weakdef field. Later in this
3940 function we will set the weakdef field to the correct
3941 value. We only put non-function symbols from dynamic
3942 objects on this list, because that happens to be the only
3943 time we need to know the normal symbol corresponding to a
3944 weak symbol, and the information is time consuming to
3945 figure out. If the weakdef field is not already NULL,
3946 then this symbol was already defined by some previous
3947 dynamic object, and we will be using that previous
3948 definition anyhow. */
3949
f6e332e6 3950 h->u.weakdef = weaks;
4ad4eba5
AM
3951 weaks = h;
3952 new_weakdef = TRUE;
3953 }
3954
3955 /* Set the alignment of a common symbol. */
a4d8e49b 3956 if ((common || bfd_is_com_section (sec))
4ad4eba5
AM
3957 && h->root.type == bfd_link_hash_common)
3958 {
3959 unsigned int align;
3960
a4d8e49b 3961 if (common)
af44c138
L
3962 align = bfd_log2 (isym->st_value);
3963 else
3964 {
3965 /* The new symbol is a common symbol in a shared object.
3966 We need to get the alignment from the section. */
3967 align = new_sec->alignment_power;
3968 }
4ad4eba5
AM
3969 if (align > old_alignment
3970 /* Permit an alignment power of zero if an alignment of one
3971 is specified and no other alignments have been specified. */
3972 || (isym->st_value == 1 && old_alignment == 0))
3973 h->root.u.c.p->alignment_power = align;
3974 else
3975 h->root.u.c.p->alignment_power = old_alignment;
3976 }
3977
66eb6687 3978 if (is_elf_hash_table (htab))
4ad4eba5 3979 {
4ad4eba5 3980 bfd_boolean dynsym;
4ad4eba5
AM
3981
3982 /* Check the alignment when a common symbol is involved. This
3983 can change when a common symbol is overridden by a normal
3984 definition or a common symbol is ignored due to the old
3985 normal definition. We need to make sure the maximum
3986 alignment is maintained. */
a4d8e49b 3987 if ((old_alignment || common)
4ad4eba5
AM
3988 && h->root.type != bfd_link_hash_common)
3989 {
3990 unsigned int common_align;
3991 unsigned int normal_align;
3992 unsigned int symbol_align;
3993 bfd *normal_bfd;
3994 bfd *common_bfd;
3995
3996 symbol_align = ffs (h->root.u.def.value) - 1;
3997 if (h->root.u.def.section->owner != NULL
3998 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3999 {
4000 normal_align = h->root.u.def.section->alignment_power;
4001 if (normal_align > symbol_align)
4002 normal_align = symbol_align;
4003 }
4004 else
4005 normal_align = symbol_align;
4006
4007 if (old_alignment)
4008 {
4009 common_align = old_alignment;
4010 common_bfd = old_bfd;
4011 normal_bfd = abfd;
4012 }
4013 else
4014 {
4015 common_align = bfd_log2 (isym->st_value);
4016 common_bfd = abfd;
4017 normal_bfd = old_bfd;
4018 }
4019
4020 if (normal_align < common_align)
d07676f8
NC
4021 {
4022 /* PR binutils/2735 */
4023 if (normal_bfd == NULL)
4024 (*_bfd_error_handler)
4025 (_("Warning: alignment %u of common symbol `%s' in %B"
4026 " is greater than the alignment (%u) of its section %A"),
4027 common_bfd, h->root.u.def.section,
4028 1 << common_align, name, 1 << normal_align);
4029 else
4030 (*_bfd_error_handler)
4031 (_("Warning: alignment %u of symbol `%s' in %B"
4032 " is smaller than %u in %B"),
4033 normal_bfd, common_bfd,
4034 1 << normal_align, name, 1 << common_align);
4035 }
4ad4eba5
AM
4036 }
4037
4038 /* Remember the symbol size and type. */
4039 if (isym->st_size != 0
4040 && (definition || h->size == 0))
4041 {
4042 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
4043 (*_bfd_error_handler)
d003868e
AM
4044 (_("Warning: size of symbol `%s' changed"
4045 " from %lu in %B to %lu in %B"),
4046 old_bfd, abfd,
4ad4eba5 4047 name, (unsigned long) h->size,
d003868e 4048 (unsigned long) isym->st_size);
4ad4eba5
AM
4049
4050 h->size = isym->st_size;
4051 }
4052
4053 /* If this is a common symbol, then we always want H->SIZE
4054 to be the size of the common symbol. The code just above
4055 won't fix the size if a common symbol becomes larger. We
4056 don't warn about a size change here, because that is
4057 covered by --warn-common. */
4058 if (h->root.type == bfd_link_hash_common)
4059 h->size = h->root.u.c.size;
4060
4061 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
4062 && (definition || h->type == STT_NOTYPE))
4063 {
4064 if (h->type != STT_NOTYPE
4065 && h->type != ELF_ST_TYPE (isym->st_info)
4066 && ! type_change_ok)
4067 (*_bfd_error_handler)
d003868e
AM
4068 (_("Warning: type of symbol `%s' changed"
4069 " from %d to %d in %B"),
4070 abfd, name, h->type, ELF_ST_TYPE (isym->st_info));
4ad4eba5
AM
4071
4072 h->type = ELF_ST_TYPE (isym->st_info);
4073 }
4074
4075 /* If st_other has a processor-specific meaning, specific
4076 code might be needed here. We never merge the visibility
4077 attribute with the one from a dynamic object. */
4078 if (bed->elf_backend_merge_symbol_attribute)
4079 (*bed->elf_backend_merge_symbol_attribute) (h, isym, definition,
4080 dynamic);
4081
b58f81ae
DJ
4082 /* If this symbol has default visibility and the user has requested
4083 we not re-export it, then mark it as hidden. */
4084 if (definition && !dynamic
4085 && (abfd->no_export
4086 || (abfd->my_archive && abfd->my_archive->no_export))
4087 && ELF_ST_VISIBILITY (isym->st_other) != STV_INTERNAL)
66eb6687
AM
4088 isym->st_other = (STV_HIDDEN
4089 | (isym->st_other & ~ELF_ST_VISIBILITY (-1)));
b58f81ae 4090
8992f0d7 4091 if (ELF_ST_VISIBILITY (isym->st_other) != 0 && !dynamic)
4ad4eba5
AM
4092 {
4093 unsigned char hvis, symvis, other, nvis;
4094
8992f0d7
TS
4095 /* Only merge the visibility. Leave the remainder of the
4096 st_other field to elf_backend_merge_symbol_attribute. */
4097 other = h->other & ~ELF_ST_VISIBILITY (-1);
4ad4eba5
AM
4098
4099 /* Combine visibilities, using the most constraining one. */
4100 hvis = ELF_ST_VISIBILITY (h->other);
4101 symvis = ELF_ST_VISIBILITY (isym->st_other);
4102 if (! hvis)
4103 nvis = symvis;
4104 else if (! symvis)
4105 nvis = hvis;
4106 else
4107 nvis = hvis < symvis ? hvis : symvis;
4108
4109 h->other = other | nvis;
4110 }
4111
4112 /* Set a flag in the hash table entry indicating the type of
4113 reference or definition we just found. Keep a count of
4114 the number of dynamic symbols we find. A dynamic symbol
4115 is one which is referenced or defined by both a regular
4116 object and a shared object. */
4ad4eba5
AM
4117 dynsym = FALSE;
4118 if (! dynamic)
4119 {
4120 if (! definition)
4121 {
f5385ebf 4122 h->ref_regular = 1;
4ad4eba5 4123 if (bind != STB_WEAK)
f5385ebf 4124 h->ref_regular_nonweak = 1;
4ad4eba5
AM
4125 }
4126 else
f5385ebf 4127 h->def_regular = 1;
4ad4eba5 4128 if (! info->executable
f5385ebf
AM
4129 || h->def_dynamic
4130 || h->ref_dynamic)
4ad4eba5
AM
4131 dynsym = TRUE;
4132 }
4133 else
4134 {
4135 if (! definition)
f5385ebf 4136 h->ref_dynamic = 1;
4ad4eba5 4137 else
f5385ebf
AM
4138 h->def_dynamic = 1;
4139 if (h->def_regular
4140 || h->ref_regular
f6e332e6 4141 || (h->u.weakdef != NULL
4ad4eba5 4142 && ! new_weakdef
f6e332e6 4143 && h->u.weakdef->dynindx != -1))
4ad4eba5
AM
4144 dynsym = TRUE;
4145 }
4146
92b7c7b6
L
4147 if (definition && (sec->flags & SEC_DEBUGGING))
4148 {
4149 /* We don't want to make debug symbol dynamic. */
4150 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4151 dynsym = FALSE;
4152 }
4153
4ad4eba5
AM
4154 /* Check to see if we need to add an indirect symbol for
4155 the default name. */
4156 if (definition || h->root.type == bfd_link_hash_common)
4157 if (!_bfd_elf_add_default_symbol (abfd, info, h, name, isym,
4158 &sec, &value, &dynsym,
4159 override))
4160 goto error_free_vers;
4161
4162 if (definition && !dynamic)
4163 {
4164 char *p = strchr (name, ELF_VER_CHR);
4165 if (p != NULL && p[1] != ELF_VER_CHR)
4166 {
4167 /* Queue non-default versions so that .symver x, x@FOO
4168 aliases can be checked. */
66eb6687 4169 if (!nondeflt_vers)
4ad4eba5 4170 {
66eb6687
AM
4171 amt = ((isymend - isym + 1)
4172 * sizeof (struct elf_link_hash_entry *));
4ad4eba5
AM
4173 nondeflt_vers = bfd_malloc (amt);
4174 }
66eb6687 4175 nondeflt_vers[nondeflt_vers_cnt++] = h;
4ad4eba5
AM
4176 }
4177 }
4178
4179 if (dynsym && h->dynindx == -1)
4180 {
c152c796 4181 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4ad4eba5 4182 goto error_free_vers;
f6e332e6 4183 if (h->u.weakdef != NULL
4ad4eba5 4184 && ! new_weakdef
f6e332e6 4185 && h->u.weakdef->dynindx == -1)
4ad4eba5 4186 {
66eb6687 4187 if (!bfd_elf_link_record_dynamic_symbol (info, h->u.weakdef))
4ad4eba5
AM
4188 goto error_free_vers;
4189 }
4190 }
4191 else if (dynsym && h->dynindx != -1)
4192 /* If the symbol already has a dynamic index, but
4193 visibility says it should not be visible, turn it into
4194 a local symbol. */
4195 switch (ELF_ST_VISIBILITY (h->other))
4196 {
4197 case STV_INTERNAL:
4198 case STV_HIDDEN:
4199 (*bed->elf_backend_hide_symbol) (info, h, TRUE);
4200 dynsym = FALSE;
4201 break;
4202 }
4203
4204 if (!add_needed
4205 && definition
4206 && dynsym
f5385ebf 4207 && h->ref_regular)
4ad4eba5
AM
4208 {
4209 int ret;
4210 const char *soname = elf_dt_name (abfd);
4211
4212 /* A symbol from a library loaded via DT_NEEDED of some
4213 other library is referenced by a regular object.
e56f61be
L
4214 Add a DT_NEEDED entry for it. Issue an error if
4215 --no-add-needed is used. */
4216 if ((elf_dyn_lib_class (abfd) & DYN_NO_NEEDED) != 0)
4217 {
4218 (*_bfd_error_handler)
4219 (_("%s: invalid DSO for symbol `%s' definition"),
d003868e 4220 abfd, name);
e56f61be
L
4221 bfd_set_error (bfd_error_bad_value);
4222 goto error_free_vers;
4223 }
4224
a5db907e
AM
4225 elf_dyn_lib_class (abfd) &= ~DYN_AS_NEEDED;
4226
4ad4eba5 4227 add_needed = TRUE;
7e9f0867 4228 ret = elf_add_dt_needed_tag (abfd, info, soname, add_needed);
4ad4eba5
AM
4229 if (ret < 0)
4230 goto error_free_vers;
4231
4232 BFD_ASSERT (ret == 0);
4233 }
4234 }
4235 }
4236
66eb6687
AM
4237 if (extversym != NULL)
4238 {
4239 free (extversym);
4240 extversym = NULL;
4241 }
4242
4243 if (isymbuf != NULL)
4244 {
4245 free (isymbuf);
4246 isymbuf = NULL;
4247 }
4248
4249 if ((elf_dyn_lib_class (abfd) & DYN_AS_NEEDED) != 0)
4250 {
4251 unsigned int i;
4252
4253 /* Restore the symbol table. */
4254 old_hash = (char *) old_tab + tabsize;
4255 old_ent = (char *) old_hash + hashsize;
4256 sym_hash = elf_sym_hashes (abfd);
4f87808c
AM
4257 htab->root.table.table = old_table;
4258 htab->root.table.size = old_size;
4259 htab->root.table.count = old_count;
66eb6687
AM
4260 memcpy (htab->root.table.table, old_tab, tabsize);
4261 memcpy (sym_hash, old_hash, hashsize);
4262 htab->root.undefs = old_undefs;
4263 htab->root.undefs_tail = old_undefs_tail;
4264 for (i = 0; i < htab->root.table.size; i++)
4265 {
4266 struct bfd_hash_entry *p;
4267 struct elf_link_hash_entry *h;
4268
4269 for (p = htab->root.table.table[i]; p != NULL; p = p->next)
4270 {
4271 h = (struct elf_link_hash_entry *) p;
2de92251
AM
4272 if (h->root.type == bfd_link_hash_warning)
4273 h = (struct elf_link_hash_entry *) h->root.u.i.link;
66eb6687
AM
4274 if (h->dynindx >= old_dynsymcount)
4275 _bfd_elf_strtab_delref (htab->dynstr, h->dynstr_index);
2de92251 4276
66eb6687
AM
4277 memcpy (p, old_ent, htab->root.table.entsize);
4278 old_ent = (char *) old_ent + htab->root.table.entsize;
2de92251
AM
4279 h = (struct elf_link_hash_entry *) p;
4280 if (h->root.type == bfd_link_hash_warning)
4281 {
4282 memcpy (h->root.u.i.link, old_ent, htab->root.table.entsize);
4283 old_ent = (char *) old_ent + htab->root.table.entsize;
4284 }
66eb6687
AM
4285 }
4286 }
4287
5061a885
AM
4288 /* Make a special call to the linker "notice" function to
4289 tell it that symbols added for crefs may need to be removed. */
4290 if (!(*info->callbacks->notice) (info, NULL, abfd, NULL,
4291 notice_not_needed))
4292 return FALSE;
4293
66eb6687
AM
4294 free (old_tab);
4295 objalloc_free_block ((struct objalloc *) htab->root.table.memory,
4296 alloc_mark);
4297 if (nondeflt_vers != NULL)
4298 free (nondeflt_vers);
4299 return TRUE;
4300 }
2de92251 4301
66eb6687
AM
4302 if (old_tab != NULL)
4303 {
5061a885
AM
4304 if (!(*info->callbacks->notice) (info, NULL, abfd, NULL,
4305 notice_needed))
4306 return FALSE;
66eb6687
AM
4307 free (old_tab);
4308 old_tab = NULL;
4309 }
4310
4ad4eba5
AM
4311 /* Now that all the symbols from this input file are created, handle
4312 .symver foo, foo@BAR such that any relocs against foo become foo@BAR. */
4313 if (nondeflt_vers != NULL)
4314 {
4315 bfd_size_type cnt, symidx;
4316
4317 for (cnt = 0; cnt < nondeflt_vers_cnt; ++cnt)
4318 {
4319 struct elf_link_hash_entry *h = nondeflt_vers[cnt], *hi;
4320 char *shortname, *p;
4321
4322 p = strchr (h->root.root.string, ELF_VER_CHR);
4323 if (p == NULL
4324 || (h->root.type != bfd_link_hash_defined
4325 && h->root.type != bfd_link_hash_defweak))
4326 continue;
4327
4328 amt = p - h->root.root.string;
4329 shortname = bfd_malloc (amt + 1);
4330 memcpy (shortname, h->root.root.string, amt);
4331 shortname[amt] = '\0';
4332
4333 hi = (struct elf_link_hash_entry *)
66eb6687 4334 bfd_link_hash_lookup (&htab->root, shortname,
4ad4eba5
AM
4335 FALSE, FALSE, FALSE);
4336 if (hi != NULL
4337 && hi->root.type == h->root.type
4338 && hi->root.u.def.value == h->root.u.def.value
4339 && hi->root.u.def.section == h->root.u.def.section)
4340 {
4341 (*bed->elf_backend_hide_symbol) (info, hi, TRUE);
4342 hi->root.type = bfd_link_hash_indirect;
4343 hi->root.u.i.link = (struct bfd_link_hash_entry *) h;
fcfa13d2 4344 (*bed->elf_backend_copy_indirect_symbol) (info, h, hi);
4ad4eba5
AM
4345 sym_hash = elf_sym_hashes (abfd);
4346 if (sym_hash)
4347 for (symidx = 0; symidx < extsymcount; ++symidx)
4348 if (sym_hash[symidx] == hi)
4349 {
4350 sym_hash[symidx] = h;
4351 break;
4352 }
4353 }
4354 free (shortname);
4355 }
4356 free (nondeflt_vers);
4357 nondeflt_vers = NULL;
4358 }
4359
4ad4eba5
AM
4360 /* Now set the weakdefs field correctly for all the weak defined
4361 symbols we found. The only way to do this is to search all the
4362 symbols. Since we only need the information for non functions in
4363 dynamic objects, that's the only time we actually put anything on
4364 the list WEAKS. We need this information so that if a regular
4365 object refers to a symbol defined weakly in a dynamic object, the
4366 real symbol in the dynamic object is also put in the dynamic
4367 symbols; we also must arrange for both symbols to point to the
4368 same memory location. We could handle the general case of symbol
4369 aliasing, but a general symbol alias can only be generated in
4370 assembler code, handling it correctly would be very time
4371 consuming, and other ELF linkers don't handle general aliasing
4372 either. */
4373 if (weaks != NULL)
4374 {
4375 struct elf_link_hash_entry **hpp;
4376 struct elf_link_hash_entry **hppend;
4377 struct elf_link_hash_entry **sorted_sym_hash;
4378 struct elf_link_hash_entry *h;
4379 size_t sym_count;
4380
4381 /* Since we have to search the whole symbol list for each weak
4382 defined symbol, search time for N weak defined symbols will be
4383 O(N^2). Binary search will cut it down to O(NlogN). */
4384 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
4385 sorted_sym_hash = bfd_malloc (amt);
4386 if (sorted_sym_hash == NULL)
4387 goto error_return;
4388 sym_hash = sorted_sym_hash;
4389 hpp = elf_sym_hashes (abfd);
4390 hppend = hpp + extsymcount;
4391 sym_count = 0;
4392 for (; hpp < hppend; hpp++)
4393 {
4394 h = *hpp;
4395 if (h != NULL
4396 && h->root.type == bfd_link_hash_defined
4397 && h->type != STT_FUNC)
4398 {
4399 *sym_hash = h;
4400 sym_hash++;
4401 sym_count++;
4402 }
4403 }
4404
4405 qsort (sorted_sym_hash, sym_count,
4406 sizeof (struct elf_link_hash_entry *),
4407 elf_sort_symbol);
4408
4409 while (weaks != NULL)
4410 {
4411 struct elf_link_hash_entry *hlook;
4412 asection *slook;
4413 bfd_vma vlook;
4414 long ilook;
4415 size_t i, j, idx;
4416
4417 hlook = weaks;
f6e332e6
AM
4418 weaks = hlook->u.weakdef;
4419 hlook->u.weakdef = NULL;
4ad4eba5
AM
4420
4421 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
4422 || hlook->root.type == bfd_link_hash_defweak
4423 || hlook->root.type == bfd_link_hash_common
4424 || hlook->root.type == bfd_link_hash_indirect);
4425 slook = hlook->root.u.def.section;
4426 vlook = hlook->root.u.def.value;
4427
4428 ilook = -1;
4429 i = 0;
4430 j = sym_count;
4431 while (i < j)
4432 {
4433 bfd_signed_vma vdiff;
4434 idx = (i + j) / 2;
4435 h = sorted_sym_hash [idx];
4436 vdiff = vlook - h->root.u.def.value;
4437 if (vdiff < 0)
4438 j = idx;
4439 else if (vdiff > 0)
4440 i = idx + 1;
4441 else
4442 {
a9b881be 4443 long sdiff = slook->id - h->root.u.def.section->id;
4ad4eba5
AM
4444 if (sdiff < 0)
4445 j = idx;
4446 else if (sdiff > 0)
4447 i = idx + 1;
4448 else
4449 {
4450 ilook = idx;
4451 break;
4452 }
4453 }
4454 }
4455
4456 /* We didn't find a value/section match. */
4457 if (ilook == -1)
4458 continue;
4459
4460 for (i = ilook; i < sym_count; i++)
4461 {
4462 h = sorted_sym_hash [i];
4463
4464 /* Stop if value or section doesn't match. */
4465 if (h->root.u.def.value != vlook
4466 || h->root.u.def.section != slook)
4467 break;
4468 else if (h != hlook)
4469 {
f6e332e6 4470 hlook->u.weakdef = h;
4ad4eba5
AM
4471
4472 /* If the weak definition is in the list of dynamic
4473 symbols, make sure the real definition is put
4474 there as well. */
4475 if (hlook->dynindx != -1 && h->dynindx == -1)
4476 {
c152c796 4477 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4ad4eba5
AM
4478 goto error_return;
4479 }
4480
4481 /* If the real definition is in the list of dynamic
4482 symbols, make sure the weak definition is put
4483 there as well. If we don't do this, then the
4484 dynamic loader might not merge the entries for the
4485 real definition and the weak definition. */
4486 if (h->dynindx != -1 && hlook->dynindx == -1)
4487 {
c152c796 4488 if (! bfd_elf_link_record_dynamic_symbol (info, hlook))
4ad4eba5
AM
4489 goto error_return;
4490 }
4491 break;
4492 }
4493 }
4494 }
4495
4496 free (sorted_sym_hash);
4497 }
4498
66eb6687
AM
4499 if (bed->check_directives)
4500 (*bed->check_directives) (abfd, info);
85fbca6a 4501
4ad4eba5
AM
4502 /* If this object is the same format as the output object, and it is
4503 not a shared library, then let the backend look through the
4504 relocs.
4505
4506 This is required to build global offset table entries and to
4507 arrange for dynamic relocs. It is not required for the
4508 particular common case of linking non PIC code, even when linking
4509 against shared libraries, but unfortunately there is no way of
4510 knowing whether an object file has been compiled PIC or not.
4511 Looking through the relocs is not particularly time consuming.
4512 The problem is that we must either (1) keep the relocs in memory,
4513 which causes the linker to require additional runtime memory or
4514 (2) read the relocs twice from the input file, which wastes time.
4515 This would be a good case for using mmap.
4516
4517 I have no idea how to handle linking PIC code into a file of a
4518 different format. It probably can't be done. */
4ad4eba5 4519 if (! dynamic
66eb6687
AM
4520 && is_elf_hash_table (htab)
4521 && htab->root.creator == abfd->xvec
4522 && bed->check_relocs != NULL)
4ad4eba5
AM
4523 {
4524 asection *o;
4525
4526 for (o = abfd->sections; o != NULL; o = o->next)
4527 {
4528 Elf_Internal_Rela *internal_relocs;
4529 bfd_boolean ok;
4530
4531 if ((o->flags & SEC_RELOC) == 0
4532 || o->reloc_count == 0
4533 || ((info->strip == strip_all || info->strip == strip_debugger)
4534 && (o->flags & SEC_DEBUGGING) != 0)
4535 || bfd_is_abs_section (o->output_section))
4536 continue;
4537
4538 internal_relocs = _bfd_elf_link_read_relocs (abfd, o, NULL, NULL,
4539 info->keep_memory);
4540 if (internal_relocs == NULL)
4541 goto error_return;
4542
66eb6687 4543 ok = (*bed->check_relocs) (abfd, info, o, internal_relocs);
4ad4eba5
AM
4544
4545 if (elf_section_data (o)->relocs != internal_relocs)
4546 free (internal_relocs);
4547
4548 if (! ok)
4549 goto error_return;
4550 }
4551 }
4552
4553 /* If this is a non-traditional link, try to optimize the handling
4554 of the .stab/.stabstr sections. */
4555 if (! dynamic
4556 && ! info->traditional_format
66eb6687 4557 && is_elf_hash_table (htab)
4ad4eba5
AM
4558 && (info->strip != strip_all && info->strip != strip_debugger))
4559 {
4560 asection *stabstr;
4561
4562 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
4563 if (stabstr != NULL)
4564 {
4565 bfd_size_type string_offset = 0;
4566 asection *stab;
4567
4568 for (stab = abfd->sections; stab; stab = stab->next)
0112cd26 4569 if (CONST_STRNEQ (stab->name, ".stab")
4ad4eba5
AM
4570 && (!stab->name[5] ||
4571 (stab->name[5] == '.' && ISDIGIT (stab->name[6])))
4572 && (stab->flags & SEC_MERGE) == 0
4573 && !bfd_is_abs_section (stab->output_section))
4574 {
4575 struct bfd_elf_section_data *secdata;
4576
4577 secdata = elf_section_data (stab);
66eb6687
AM
4578 if (! _bfd_link_section_stabs (abfd, &htab->stab_info, stab,
4579 stabstr, &secdata->sec_info,
4ad4eba5
AM
4580 &string_offset))
4581 goto error_return;
4582 if (secdata->sec_info)
4583 stab->sec_info_type = ELF_INFO_TYPE_STABS;
4584 }
4585 }
4586 }
4587
66eb6687 4588 if (is_elf_hash_table (htab) && add_needed)
4ad4eba5
AM
4589 {
4590 /* Add this bfd to the loaded list. */
4591 struct elf_link_loaded_list *n;
4592
4593 n = bfd_alloc (abfd, sizeof (struct elf_link_loaded_list));
4594 if (n == NULL)
4595 goto error_return;
4596 n->abfd = abfd;
66eb6687
AM
4597 n->next = htab->loaded;
4598 htab->loaded = n;
4ad4eba5
AM
4599 }
4600
4601 return TRUE;
4602
4603 error_free_vers:
66eb6687
AM
4604 if (old_tab != NULL)
4605 free (old_tab);
4ad4eba5
AM
4606 if (nondeflt_vers != NULL)
4607 free (nondeflt_vers);
4608 if (extversym != NULL)
4609 free (extversym);
4610 error_free_sym:
4611 if (isymbuf != NULL)
4612 free (isymbuf);
4613 error_return:
4614 return FALSE;
4615}
4616
8387904d
AM
4617/* Return the linker hash table entry of a symbol that might be
4618 satisfied by an archive symbol. Return -1 on error. */
4619
4620struct elf_link_hash_entry *
4621_bfd_elf_archive_symbol_lookup (bfd *abfd,
4622 struct bfd_link_info *info,
4623 const char *name)
4624{
4625 struct elf_link_hash_entry *h;
4626 char *p, *copy;
4627 size_t len, first;
4628
4629 h = elf_link_hash_lookup (elf_hash_table (info), name, FALSE, FALSE, FALSE);
4630 if (h != NULL)
4631 return h;
4632
4633 /* If this is a default version (the name contains @@), look up the
4634 symbol again with only one `@' as well as without the version.
4635 The effect is that references to the symbol with and without the
4636 version will be matched by the default symbol in the archive. */
4637
4638 p = strchr (name, ELF_VER_CHR);
4639 if (p == NULL || p[1] != ELF_VER_CHR)
4640 return h;
4641
4642 /* First check with only one `@'. */
4643 len = strlen (name);
4644 copy = bfd_alloc (abfd, len);
4645 if (copy == NULL)
4646 return (struct elf_link_hash_entry *) 0 - 1;
4647
4648 first = p - name + 1;
4649 memcpy (copy, name, first);
4650 memcpy (copy + first, name + first + 1, len - first);
4651
4652 h = elf_link_hash_lookup (elf_hash_table (info), copy, FALSE, FALSE, FALSE);
4653 if (h == NULL)
4654 {
4655 /* We also need to check references to the symbol without the
4656 version. */
4657 copy[first - 1] = '\0';
4658 h = elf_link_hash_lookup (elf_hash_table (info), copy,
4659 FALSE, FALSE, FALSE);
4660 }
4661
4662 bfd_release (abfd, copy);
4663 return h;
4664}
4665
0ad989f9
L
4666/* Add symbols from an ELF archive file to the linker hash table. We
4667 don't use _bfd_generic_link_add_archive_symbols because of a
4668 problem which arises on UnixWare. The UnixWare libc.so is an
4669 archive which includes an entry libc.so.1 which defines a bunch of
4670 symbols. The libc.so archive also includes a number of other
4671 object files, which also define symbols, some of which are the same
4672 as those defined in libc.so.1. Correct linking requires that we
4673 consider each object file in turn, and include it if it defines any
4674 symbols we need. _bfd_generic_link_add_archive_symbols does not do
4675 this; it looks through the list of undefined symbols, and includes
4676 any object file which defines them. When this algorithm is used on
4677 UnixWare, it winds up pulling in libc.so.1 early and defining a
4678 bunch of symbols. This means that some of the other objects in the
4679 archive are not included in the link, which is incorrect since they
4680 precede libc.so.1 in the archive.
4681
4682 Fortunately, ELF archive handling is simpler than that done by
4683 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
4684 oddities. In ELF, if we find a symbol in the archive map, and the
4685 symbol is currently undefined, we know that we must pull in that
4686 object file.
4687
4688 Unfortunately, we do have to make multiple passes over the symbol
4689 table until nothing further is resolved. */
4690
4ad4eba5
AM
4691static bfd_boolean
4692elf_link_add_archive_symbols (bfd *abfd, struct bfd_link_info *info)
0ad989f9
L
4693{
4694 symindex c;
4695 bfd_boolean *defined = NULL;
4696 bfd_boolean *included = NULL;
4697 carsym *symdefs;
4698 bfd_boolean loop;
4699 bfd_size_type amt;
8387904d
AM
4700 const struct elf_backend_data *bed;
4701 struct elf_link_hash_entry * (*archive_symbol_lookup)
4702 (bfd *, struct bfd_link_info *, const char *);
0ad989f9
L
4703
4704 if (! bfd_has_map (abfd))
4705 {
4706 /* An empty archive is a special case. */
4707 if (bfd_openr_next_archived_file (abfd, NULL) == NULL)
4708 return TRUE;
4709 bfd_set_error (bfd_error_no_armap);
4710 return FALSE;
4711 }
4712
4713 /* Keep track of all symbols we know to be already defined, and all
4714 files we know to be already included. This is to speed up the
4715 second and subsequent passes. */
4716 c = bfd_ardata (abfd)->symdef_count;
4717 if (c == 0)
4718 return TRUE;
4719 amt = c;
4720 amt *= sizeof (bfd_boolean);
4721 defined = bfd_zmalloc (amt);
4722 included = bfd_zmalloc (amt);
4723 if (defined == NULL || included == NULL)
4724 goto error_return;
4725
4726 symdefs = bfd_ardata (abfd)->symdefs;
8387904d
AM
4727 bed = get_elf_backend_data (abfd);
4728 archive_symbol_lookup = bed->elf_backend_archive_symbol_lookup;
0ad989f9
L
4729
4730 do
4731 {
4732 file_ptr last;
4733 symindex i;
4734 carsym *symdef;
4735 carsym *symdefend;
4736
4737 loop = FALSE;
4738 last = -1;
4739
4740 symdef = symdefs;
4741 symdefend = symdef + c;
4742 for (i = 0; symdef < symdefend; symdef++, i++)
4743 {
4744 struct elf_link_hash_entry *h;
4745 bfd *element;
4746 struct bfd_link_hash_entry *undefs_tail;
4747 symindex mark;
4748
4749 if (defined[i] || included[i])
4750 continue;
4751 if (symdef->file_offset == last)
4752 {
4753 included[i] = TRUE;
4754 continue;
4755 }
4756
8387904d
AM
4757 h = archive_symbol_lookup (abfd, info, symdef->name);
4758 if (h == (struct elf_link_hash_entry *) 0 - 1)
4759 goto error_return;
0ad989f9
L
4760
4761 if (h == NULL)
4762 continue;
4763
4764 if (h->root.type == bfd_link_hash_common)
4765 {
4766 /* We currently have a common symbol. The archive map contains
4767 a reference to this symbol, so we may want to include it. We
4768 only want to include it however, if this archive element
4769 contains a definition of the symbol, not just another common
4770 declaration of it.
4771
4772 Unfortunately some archivers (including GNU ar) will put
4773 declarations of common symbols into their archive maps, as
4774 well as real definitions, so we cannot just go by the archive
4775 map alone. Instead we must read in the element's symbol
4776 table and check that to see what kind of symbol definition
4777 this is. */
4778 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
4779 continue;
4780 }
4781 else if (h->root.type != bfd_link_hash_undefined)
4782 {
4783 if (h->root.type != bfd_link_hash_undefweak)
4784 defined[i] = TRUE;
4785 continue;
4786 }
4787
4788 /* We need to include this archive member. */
4789 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
4790 if (element == NULL)
4791 goto error_return;
4792
4793 if (! bfd_check_format (element, bfd_object))
4794 goto error_return;
4795
4796 /* Doublecheck that we have not included this object
4797 already--it should be impossible, but there may be
4798 something wrong with the archive. */
4799 if (element->archive_pass != 0)
4800 {
4801 bfd_set_error (bfd_error_bad_value);
4802 goto error_return;
4803 }
4804 element->archive_pass = 1;
4805
4806 undefs_tail = info->hash->undefs_tail;
4807
4808 if (! (*info->callbacks->add_archive_element) (info, element,
4809 symdef->name))
4810 goto error_return;
4811 if (! bfd_link_add_symbols (element, info))
4812 goto error_return;
4813
4814 /* If there are any new undefined symbols, we need to make
4815 another pass through the archive in order to see whether
4816 they can be defined. FIXME: This isn't perfect, because
4817 common symbols wind up on undefs_tail and because an
4818 undefined symbol which is defined later on in this pass
4819 does not require another pass. This isn't a bug, but it
4820 does make the code less efficient than it could be. */
4821 if (undefs_tail != info->hash->undefs_tail)
4822 loop = TRUE;
4823
4824 /* Look backward to mark all symbols from this object file
4825 which we have already seen in this pass. */
4826 mark = i;
4827 do
4828 {
4829 included[mark] = TRUE;
4830 if (mark == 0)
4831 break;
4832 --mark;
4833 }
4834 while (symdefs[mark].file_offset == symdef->file_offset);
4835
4836 /* We mark subsequent symbols from this object file as we go
4837 on through the loop. */
4838 last = symdef->file_offset;
4839 }
4840 }
4841 while (loop);
4842
4843 free (defined);
4844 free (included);
4845
4846 return TRUE;
4847
4848 error_return:
4849 if (defined != NULL)
4850 free (defined);
4851 if (included != NULL)
4852 free (included);
4853 return FALSE;
4854}
4ad4eba5
AM
4855
4856/* Given an ELF BFD, add symbols to the global hash table as
4857 appropriate. */
4858
4859bfd_boolean
4860bfd_elf_link_add_symbols (bfd *abfd, struct bfd_link_info *info)
4861{
4862 switch (bfd_get_format (abfd))
4863 {
4864 case bfd_object:
4865 return elf_link_add_object_symbols (abfd, info);
4866 case bfd_archive:
4867 return elf_link_add_archive_symbols (abfd, info);
4868 default:
4869 bfd_set_error (bfd_error_wrong_format);
4870 return FALSE;
4871 }
4872}
5a580b3a
AM
4873\f
4874/* This function will be called though elf_link_hash_traverse to store
4875 all hash value of the exported symbols in an array. */
4876
4877static bfd_boolean
4878elf_collect_hash_codes (struct elf_link_hash_entry *h, void *data)
4879{
4880 unsigned long **valuep = data;
4881 const char *name;
4882 char *p;
4883 unsigned long ha;
4884 char *alc = NULL;
4885
4886 if (h->root.type == bfd_link_hash_warning)
4887 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4888
4889 /* Ignore indirect symbols. These are added by the versioning code. */
4890 if (h->dynindx == -1)
4891 return TRUE;
4892
4893 name = h->root.root.string;
4894 p = strchr (name, ELF_VER_CHR);
4895 if (p != NULL)
4896 {
4897 alc = bfd_malloc (p - name + 1);
4898 memcpy (alc, name, p - name);
4899 alc[p - name] = '\0';
4900 name = alc;
4901 }
4902
4903 /* Compute the hash value. */
4904 ha = bfd_elf_hash (name);
4905
4906 /* Store the found hash value in the array given as the argument. */
4907 *(*valuep)++ = ha;
4908
4909 /* And store it in the struct so that we can put it in the hash table
4910 later. */
f6e332e6 4911 h->u.elf_hash_value = ha;
5a580b3a
AM
4912
4913 if (alc != NULL)
4914 free (alc);
4915
4916 return TRUE;
4917}
4918
fdc90cb4
JJ
4919struct collect_gnu_hash_codes
4920{
4921 bfd *output_bfd;
4922 const struct elf_backend_data *bed;
4923 unsigned long int nsyms;
4924 unsigned long int maskbits;
4925 unsigned long int *hashcodes;
4926 unsigned long int *hashval;
4927 unsigned long int *indx;
4928 unsigned long int *counts;
4929 bfd_vma *bitmask;
4930 bfd_byte *contents;
4931 long int min_dynindx;
4932 unsigned long int bucketcount;
4933 unsigned long int symindx;
4934 long int local_indx;
4935 long int shift1, shift2;
4936 unsigned long int mask;
4937};
4938
4939/* This function will be called though elf_link_hash_traverse to store
4940 all hash value of the exported symbols in an array. */
4941
4942static bfd_boolean
4943elf_collect_gnu_hash_codes (struct elf_link_hash_entry *h, void *data)
4944{
4945 struct collect_gnu_hash_codes *s = data;
4946 const char *name;
4947 char *p;
4948 unsigned long ha;
4949 char *alc = NULL;
4950
4951 if (h->root.type == bfd_link_hash_warning)
4952 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4953
4954 /* Ignore indirect symbols. These are added by the versioning code. */
4955 if (h->dynindx == -1)
4956 return TRUE;
4957
4958 /* Ignore also local symbols and undefined symbols. */
4959 if (! (*s->bed->elf_hash_symbol) (h))
4960 return TRUE;
4961
4962 name = h->root.root.string;
4963 p = strchr (name, ELF_VER_CHR);
4964 if (p != NULL)
4965 {
4966 alc = bfd_malloc (p - name + 1);
4967 memcpy (alc, name, p - name);
4968 alc[p - name] = '\0';
4969 name = alc;
4970 }
4971
4972 /* Compute the hash value. */
4973 ha = bfd_elf_gnu_hash (name);
4974
4975 /* Store the found hash value in the array for compute_bucket_count,
4976 and also for .dynsym reordering purposes. */
4977 s->hashcodes[s->nsyms] = ha;
4978 s->hashval[h->dynindx] = ha;
4979 ++s->nsyms;
4980 if (s->min_dynindx < 0 || s->min_dynindx > h->dynindx)
4981 s->min_dynindx = h->dynindx;
4982
4983 if (alc != NULL)
4984 free (alc);
4985
4986 return TRUE;
4987}
4988
4989/* This function will be called though elf_link_hash_traverse to do
4990 final dynaminc symbol renumbering. */
4991
4992static bfd_boolean
4993elf_renumber_gnu_hash_syms (struct elf_link_hash_entry *h, void *data)
4994{
4995 struct collect_gnu_hash_codes *s = data;
4996 unsigned long int bucket;
4997 unsigned long int val;
4998
4999 if (h->root.type == bfd_link_hash_warning)
5000 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5001
5002 /* Ignore indirect symbols. */
5003 if (h->dynindx == -1)
5004 return TRUE;
5005
5006 /* Ignore also local symbols and undefined symbols. */
5007 if (! (*s->bed->elf_hash_symbol) (h))
5008 {
5009 if (h->dynindx >= s->min_dynindx)
5010 h->dynindx = s->local_indx++;
5011 return TRUE;
5012 }
5013
5014 bucket = s->hashval[h->dynindx] % s->bucketcount;
5015 val = (s->hashval[h->dynindx] >> s->shift1)
5016 & ((s->maskbits >> s->shift1) - 1);
5017 s->bitmask[val] |= ((bfd_vma) 1) << (s->hashval[h->dynindx] & s->mask);
5018 s->bitmask[val]
5019 |= ((bfd_vma) 1) << ((s->hashval[h->dynindx] >> s->shift2) & s->mask);
5020 val = s->hashval[h->dynindx] & ~(unsigned long int) 1;
5021 if (s->counts[bucket] == 1)
5022 /* Last element terminates the chain. */
5023 val |= 1;
5024 bfd_put_32 (s->output_bfd, val,
5025 s->contents + (s->indx[bucket] - s->symindx) * 4);
5026 --s->counts[bucket];
5027 h->dynindx = s->indx[bucket]++;
5028 return TRUE;
5029}
5030
5031/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
5032
5033bfd_boolean
5034_bfd_elf_hash_symbol (struct elf_link_hash_entry *h)
5035{
5036 return !(h->forced_local
5037 || h->root.type == bfd_link_hash_undefined
5038 || h->root.type == bfd_link_hash_undefweak
5039 || ((h->root.type == bfd_link_hash_defined
5040 || h->root.type == bfd_link_hash_defweak)
5041 && h->root.u.def.section->output_section == NULL));
5042}
5043
5a580b3a
AM
5044/* Array used to determine the number of hash table buckets to use
5045 based on the number of symbols there are. If there are fewer than
5046 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
5047 fewer than 37 we use 17 buckets, and so forth. We never use more
5048 than 32771 buckets. */
5049
5050static const size_t elf_buckets[] =
5051{
5052 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
5053 16411, 32771, 0
5054};
5055
5056/* Compute bucket count for hashing table. We do not use a static set
5057 of possible tables sizes anymore. Instead we determine for all
5058 possible reasonable sizes of the table the outcome (i.e., the
5059 number of collisions etc) and choose the best solution. The
5060 weighting functions are not too simple to allow the table to grow
5061 without bounds. Instead one of the weighting factors is the size.
5062 Therefore the result is always a good payoff between few collisions
5063 (= short chain lengths) and table size. */
5064static size_t
fdc90cb4
JJ
5065compute_bucket_count (struct bfd_link_info *info, unsigned long int *hashcodes,
5066 unsigned long int nsyms, int gnu_hash)
5a580b3a
AM
5067{
5068 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
5069 size_t best_size = 0;
5a580b3a
AM
5070 unsigned long int i;
5071 bfd_size_type amt;
5072
5a580b3a
AM
5073 /* We have a problem here. The following code to optimize the table
5074 size requires an integer type with more the 32 bits. If
5075 BFD_HOST_U_64_BIT is set we know about such a type. */
5076#ifdef BFD_HOST_U_64_BIT
5077 if (info->optimize)
5078 {
5a580b3a
AM
5079 size_t minsize;
5080 size_t maxsize;
5081 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
5a580b3a
AM
5082 bfd *dynobj = elf_hash_table (info)->dynobj;
5083 const struct elf_backend_data *bed = get_elf_backend_data (dynobj);
fdc90cb4 5084 unsigned long int *counts;
5a580b3a
AM
5085
5086 /* Possible optimization parameters: if we have NSYMS symbols we say
5087 that the hashing table must at least have NSYMS/4 and at most
5088 2*NSYMS buckets. */
5089 minsize = nsyms / 4;
5090 if (minsize == 0)
5091 minsize = 1;
5092 best_size = maxsize = nsyms * 2;
fdc90cb4
JJ
5093 if (gnu_hash)
5094 {
5095 if (minsize < 2)
5096 minsize = 2;
5097 if ((best_size & 31) == 0)
5098 ++best_size;
5099 }
5a580b3a
AM
5100
5101 /* Create array where we count the collisions in. We must use bfd_malloc
5102 since the size could be large. */
5103 amt = maxsize;
5104 amt *= sizeof (unsigned long int);
5105 counts = bfd_malloc (amt);
5106 if (counts == NULL)
fdc90cb4 5107 return 0;
5a580b3a
AM
5108
5109 /* Compute the "optimal" size for the hash table. The criteria is a
5110 minimal chain length. The minor criteria is (of course) the size
5111 of the table. */
5112 for (i = minsize; i < maxsize; ++i)
5113 {
5114 /* Walk through the array of hashcodes and count the collisions. */
5115 BFD_HOST_U_64_BIT max;
5116 unsigned long int j;
5117 unsigned long int fact;
5118
fdc90cb4
JJ
5119 if (gnu_hash && (i & 31) == 0)
5120 continue;
5121
5a580b3a
AM
5122 memset (counts, '\0', i * sizeof (unsigned long int));
5123
5124 /* Determine how often each hash bucket is used. */
5125 for (j = 0; j < nsyms; ++j)
5126 ++counts[hashcodes[j] % i];
5127
5128 /* For the weight function we need some information about the
5129 pagesize on the target. This is information need not be 100%
5130 accurate. Since this information is not available (so far) we
5131 define it here to a reasonable default value. If it is crucial
5132 to have a better value some day simply define this value. */
5133# ifndef BFD_TARGET_PAGESIZE
5134# define BFD_TARGET_PAGESIZE (4096)
5135# endif
5136
fdc90cb4
JJ
5137 /* We in any case need 2 + DYNSYMCOUNT entries for the size values
5138 and the chains. */
5139 max = (2 + dynsymcount) * bed->s->sizeof_hash_entry;
5a580b3a
AM
5140
5141# if 1
5142 /* Variant 1: optimize for short chains. We add the squares
5143 of all the chain lengths (which favors many small chain
5144 over a few long chains). */
5145 for (j = 0; j < i; ++j)
5146 max += counts[j] * counts[j];
5147
5148 /* This adds penalties for the overall size of the table. */
fdc90cb4 5149 fact = i / (BFD_TARGET_PAGESIZE / bed->s->sizeof_hash_entry) + 1;
5a580b3a
AM
5150 max *= fact * fact;
5151# else
5152 /* Variant 2: Optimize a lot more for small table. Here we
5153 also add squares of the size but we also add penalties for
5154 empty slots (the +1 term). */
5155 for (j = 0; j < i; ++j)
5156 max += (1 + counts[j]) * (1 + counts[j]);
5157
5158 /* The overall size of the table is considered, but not as
5159 strong as in variant 1, where it is squared. */
fdc90cb4 5160 fact = i / (BFD_TARGET_PAGESIZE / bed->s->sizeof_hash_entry) + 1;
5a580b3a
AM
5161 max *= fact;
5162# endif
5163
5164 /* Compare with current best results. */
5165 if (max < best_chlen)
5166 {
5167 best_chlen = max;
5168 best_size = i;
5169 }
5170 }
5171
5172 free (counts);
5173 }
5174 else
5175#endif /* defined (BFD_HOST_U_64_BIT) */
5176 {
5177 /* This is the fallback solution if no 64bit type is available or if we
5178 are not supposed to spend much time on optimizations. We select the
5179 bucket count using a fixed set of numbers. */
5180 for (i = 0; elf_buckets[i] != 0; i++)
5181 {
5182 best_size = elf_buckets[i];
fdc90cb4 5183 if (nsyms < elf_buckets[i + 1])
5a580b3a
AM
5184 break;
5185 }
fdc90cb4
JJ
5186 if (gnu_hash && best_size < 2)
5187 best_size = 2;
5a580b3a
AM
5188 }
5189
5a580b3a
AM
5190 return best_size;
5191}
5192
5193/* Set up the sizes and contents of the ELF dynamic sections. This is
5194 called by the ELF linker emulation before_allocation routine. We
5195 must set the sizes of the sections before the linker sets the
5196 addresses of the various sections. */
5197
5198bfd_boolean
5199bfd_elf_size_dynamic_sections (bfd *output_bfd,
5200 const char *soname,
5201 const char *rpath,
5202 const char *filter_shlib,
5203 const char * const *auxiliary_filters,
5204 struct bfd_link_info *info,
5205 asection **sinterpptr,
5206 struct bfd_elf_version_tree *verdefs)
5207{
5208 bfd_size_type soname_indx;
5209 bfd *dynobj;
5210 const struct elf_backend_data *bed;
5211 struct elf_assign_sym_version_info asvinfo;
5212
5213 *sinterpptr = NULL;
5214
5215 soname_indx = (bfd_size_type) -1;
5216
5217 if (!is_elf_hash_table (info->hash))
5218 return TRUE;
5219
8c37241b 5220 elf_tdata (output_bfd)->relro = info->relro;
5a580b3a
AM
5221 if (info->execstack)
5222 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | PF_X;
5223 else if (info->noexecstack)
5224 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W;
5225 else
5226 {
5227 bfd *inputobj;
5228 asection *notesec = NULL;
5229 int exec = 0;
5230
5231 for (inputobj = info->input_bfds;
5232 inputobj;
5233 inputobj = inputobj->link_next)
5234 {
5235 asection *s;
5236
d457dcf6 5237 if (inputobj->flags & (DYNAMIC | BFD_LINKER_CREATED))
5a580b3a
AM
5238 continue;
5239 s = bfd_get_section_by_name (inputobj, ".note.GNU-stack");
5240 if (s)
5241 {
5242 if (s->flags & SEC_CODE)
5243 exec = PF_X;
5244 notesec = s;
5245 }
5246 else
5247 exec = PF_X;
5248 }
5249 if (notesec)
5250 {
5251 elf_tdata (output_bfd)->stack_flags = PF_R | PF_W | exec;
5252 if (exec && info->relocatable
5253 && notesec->output_section != bfd_abs_section_ptr)
5254 notesec->output_section->flags |= SEC_CODE;
5255 }
5256 }
5257
5258 /* Any syms created from now on start with -1 in
5259 got.refcount/offset and plt.refcount/offset. */
a6aa5195
AM
5260 elf_hash_table (info)->init_got_refcount
5261 = elf_hash_table (info)->init_got_offset;
5262 elf_hash_table (info)->init_plt_refcount
5263 = elf_hash_table (info)->init_plt_offset;
5a580b3a
AM
5264
5265 /* The backend may have to create some sections regardless of whether
5266 we're dynamic or not. */
5267 bed = get_elf_backend_data (output_bfd);
5268 if (bed->elf_backend_always_size_sections
5269 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
5270 return FALSE;
5271
eb3d5f3b
JB
5272 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
5273 return FALSE;
5274
5a580b3a
AM
5275 dynobj = elf_hash_table (info)->dynobj;
5276
5277 /* If there were no dynamic objects in the link, there is nothing to
5278 do here. */
5279 if (dynobj == NULL)
5280 return TRUE;
5281
5a580b3a
AM
5282 if (elf_hash_table (info)->dynamic_sections_created)
5283 {
5284 struct elf_info_failed eif;
5285 struct elf_link_hash_entry *h;
5286 asection *dynstr;
5287 struct bfd_elf_version_tree *t;
5288 struct bfd_elf_version_expr *d;
046183de 5289 asection *s;
5a580b3a
AM
5290 bfd_boolean all_defined;
5291
5292 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
5293 BFD_ASSERT (*sinterpptr != NULL || !info->executable);
5294
5295 if (soname != NULL)
5296 {
5297 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5298 soname, TRUE);
5299 if (soname_indx == (bfd_size_type) -1
5300 || !_bfd_elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
5301 return FALSE;
5302 }
5303
5304 if (info->symbolic)
5305 {
5306 if (!_bfd_elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
5307 return FALSE;
5308 info->flags |= DF_SYMBOLIC;
5309 }
5310
5311 if (rpath != NULL)
5312 {
5313 bfd_size_type indx;
5314
5315 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
5316 TRUE);
5317 if (indx == (bfd_size_type) -1
5318 || !_bfd_elf_add_dynamic_entry (info, DT_RPATH, indx))
5319 return FALSE;
5320
5321 if (info->new_dtags)
5322 {
5323 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
5324 if (!_bfd_elf_add_dynamic_entry (info, DT_RUNPATH, indx))
5325 return FALSE;
5326 }
5327 }
5328
5329 if (filter_shlib != NULL)
5330 {
5331 bfd_size_type indx;
5332
5333 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5334 filter_shlib, TRUE);
5335 if (indx == (bfd_size_type) -1
5336 || !_bfd_elf_add_dynamic_entry (info, DT_FILTER, indx))
5337 return FALSE;
5338 }
5339
5340 if (auxiliary_filters != NULL)
5341 {
5342 const char * const *p;
5343
5344 for (p = auxiliary_filters; *p != NULL; p++)
5345 {
5346 bfd_size_type indx;
5347
5348 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5349 *p, TRUE);
5350 if (indx == (bfd_size_type) -1
5351 || !_bfd_elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
5352 return FALSE;
5353 }
5354 }
5355
5356 eif.info = info;
5357 eif.verdefs = verdefs;
5358 eif.failed = FALSE;
5359
5360 /* If we are supposed to export all symbols into the dynamic symbol
5361 table (this is not the normal case), then do so. */
55255dae
L
5362 if (info->export_dynamic
5363 || (info->executable && info->dynamic))
5a580b3a
AM
5364 {
5365 elf_link_hash_traverse (elf_hash_table (info),
5366 _bfd_elf_export_symbol,
5367 &eif);
5368 if (eif.failed)
5369 return FALSE;
5370 }
5371
5372 /* Make all global versions with definition. */
5373 for (t = verdefs; t != NULL; t = t->next)
5374 for (d = t->globals.list; d != NULL; d = d->next)
5375 if (!d->symver && d->symbol)
5376 {
5377 const char *verstr, *name;
5378 size_t namelen, verlen, newlen;
5379 char *newname, *p;
5380 struct elf_link_hash_entry *newh;
5381
5382 name = d->symbol;
5383 namelen = strlen (name);
5384 verstr = t->name;
5385 verlen = strlen (verstr);
5386 newlen = namelen + verlen + 3;
5387
5388 newname = bfd_malloc (newlen);
5389 if (newname == NULL)
5390 return FALSE;
5391 memcpy (newname, name, namelen);
5392
5393 /* Check the hidden versioned definition. */
5394 p = newname + namelen;
5395 *p++ = ELF_VER_CHR;
5396 memcpy (p, verstr, verlen + 1);
5397 newh = elf_link_hash_lookup (elf_hash_table (info),
5398 newname, FALSE, FALSE,
5399 FALSE);
5400 if (newh == NULL
5401 || (newh->root.type != bfd_link_hash_defined
5402 && newh->root.type != bfd_link_hash_defweak))
5403 {
5404 /* Check the default versioned definition. */
5405 *p++ = ELF_VER_CHR;
5406 memcpy (p, verstr, verlen + 1);
5407 newh = elf_link_hash_lookup (elf_hash_table (info),
5408 newname, FALSE, FALSE,
5409 FALSE);
5410 }
5411 free (newname);
5412
5413 /* Mark this version if there is a definition and it is
5414 not defined in a shared object. */
5415 if (newh != NULL
f5385ebf 5416 && !newh->def_dynamic
5a580b3a
AM
5417 && (newh->root.type == bfd_link_hash_defined
5418 || newh->root.type == bfd_link_hash_defweak))
5419 d->symver = 1;
5420 }
5421
5422 /* Attach all the symbols to their version information. */
5423 asvinfo.output_bfd = output_bfd;
5424 asvinfo.info = info;
5425 asvinfo.verdefs = verdefs;
5426 asvinfo.failed = FALSE;
5427
5428 elf_link_hash_traverse (elf_hash_table (info),
5429 _bfd_elf_link_assign_sym_version,
5430 &asvinfo);
5431 if (asvinfo.failed)
5432 return FALSE;
5433
5434 if (!info->allow_undefined_version)
5435 {
5436 /* Check if all global versions have a definition. */
5437 all_defined = TRUE;
5438 for (t = verdefs; t != NULL; t = t->next)
5439 for (d = t->globals.list; d != NULL; d = d->next)
5440 if (!d->symver && !d->script)
5441 {
5442 (*_bfd_error_handler)
5443 (_("%s: undefined version: %s"),
5444 d->pattern, t->name);
5445 all_defined = FALSE;
5446 }
5447
5448 if (!all_defined)
5449 {
5450 bfd_set_error (bfd_error_bad_value);
5451 return FALSE;
5452 }
5453 }
5454
5455 /* Find all symbols which were defined in a dynamic object and make
5456 the backend pick a reasonable value for them. */
5457 elf_link_hash_traverse (elf_hash_table (info),
5458 _bfd_elf_adjust_dynamic_symbol,
5459 &eif);
5460 if (eif.failed)
5461 return FALSE;
5462
5463 /* Add some entries to the .dynamic section. We fill in some of the
ee75fd95 5464 values later, in bfd_elf_final_link, but we must add the entries
5a580b3a
AM
5465 now so that we know the final size of the .dynamic section. */
5466
5467 /* If there are initialization and/or finalization functions to
5468 call then add the corresponding DT_INIT/DT_FINI entries. */
5469 h = (info->init_function
5470 ? elf_link_hash_lookup (elf_hash_table (info),
5471 info->init_function, FALSE,
5472 FALSE, FALSE)
5473 : NULL);
5474 if (h != NULL
f5385ebf
AM
5475 && (h->ref_regular
5476 || h->def_regular))
5a580b3a
AM
5477 {
5478 if (!_bfd_elf_add_dynamic_entry (info, DT_INIT, 0))
5479 return FALSE;
5480 }
5481 h = (info->fini_function
5482 ? elf_link_hash_lookup (elf_hash_table (info),
5483 info->fini_function, FALSE,
5484 FALSE, FALSE)
5485 : NULL);
5486 if (h != NULL
f5385ebf
AM
5487 && (h->ref_regular
5488 || h->def_regular))
5a580b3a
AM
5489 {
5490 if (!_bfd_elf_add_dynamic_entry (info, DT_FINI, 0))
5491 return FALSE;
5492 }
5493
046183de
AM
5494 s = bfd_get_section_by_name (output_bfd, ".preinit_array");
5495 if (s != NULL && s->linker_has_input)
5a580b3a
AM
5496 {
5497 /* DT_PREINIT_ARRAY is not allowed in shared library. */
5498 if (! info->executable)
5499 {
5500 bfd *sub;
5501 asection *o;
5502
5503 for (sub = info->input_bfds; sub != NULL;
5504 sub = sub->link_next)
5505 for (o = sub->sections; o != NULL; o = o->next)
5506 if (elf_section_data (o)->this_hdr.sh_type
5507 == SHT_PREINIT_ARRAY)
5508 {
5509 (*_bfd_error_handler)
d003868e
AM
5510 (_("%B: .preinit_array section is not allowed in DSO"),
5511 sub);
5a580b3a
AM
5512 break;
5513 }
5514
5515 bfd_set_error (bfd_error_nonrepresentable_section);
5516 return FALSE;
5517 }
5518
5519 if (!_bfd_elf_add_dynamic_entry (info, DT_PREINIT_ARRAY, 0)
5520 || !_bfd_elf_add_dynamic_entry (info, DT_PREINIT_ARRAYSZ, 0))
5521 return FALSE;
5522 }
046183de
AM
5523 s = bfd_get_section_by_name (output_bfd, ".init_array");
5524 if (s != NULL && s->linker_has_input)
5a580b3a
AM
5525 {
5526 if (!_bfd_elf_add_dynamic_entry (info, DT_INIT_ARRAY, 0)
5527 || !_bfd_elf_add_dynamic_entry (info, DT_INIT_ARRAYSZ, 0))
5528 return FALSE;
5529 }
046183de
AM
5530 s = bfd_get_section_by_name (output_bfd, ".fini_array");
5531 if (s != NULL && s->linker_has_input)
5a580b3a
AM
5532 {
5533 if (!_bfd_elf_add_dynamic_entry (info, DT_FINI_ARRAY, 0)
5534 || !_bfd_elf_add_dynamic_entry (info, DT_FINI_ARRAYSZ, 0))
5535 return FALSE;
5536 }
5537
5538 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
5539 /* If .dynstr is excluded from the link, we don't want any of
5540 these tags. Strictly, we should be checking each section
5541 individually; This quick check covers for the case where
5542 someone does a /DISCARD/ : { *(*) }. */
5543 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
5544 {
5545 bfd_size_type strsize;
5546
5547 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
fdc90cb4
JJ
5548 if ((info->emit_hash
5549 && !_bfd_elf_add_dynamic_entry (info, DT_HASH, 0))
5550 || (info->emit_gnu_hash
5551 && !_bfd_elf_add_dynamic_entry (info, DT_GNU_HASH, 0))
5a580b3a
AM
5552 || !_bfd_elf_add_dynamic_entry (info, DT_STRTAB, 0)
5553 || !_bfd_elf_add_dynamic_entry (info, DT_SYMTAB, 0)
5554 || !_bfd_elf_add_dynamic_entry (info, DT_STRSZ, strsize)
5555 || !_bfd_elf_add_dynamic_entry (info, DT_SYMENT,
5556 bed->s->sizeof_sym))
5557 return FALSE;
5558 }
5559 }
5560
5561 /* The backend must work out the sizes of all the other dynamic
5562 sections. */
5563 if (bed->elf_backend_size_dynamic_sections
5564 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
5565 return FALSE;
5566
5567 if (elf_hash_table (info)->dynamic_sections_created)
5568 {
554220db 5569 unsigned long section_sym_count;
5a580b3a 5570 asection *s;
5a580b3a
AM
5571
5572 /* Set up the version definition section. */
5573 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
5574 BFD_ASSERT (s != NULL);
5575
5576 /* We may have created additional version definitions if we are
5577 just linking a regular application. */
5578 verdefs = asvinfo.verdefs;
5579
5580 /* Skip anonymous version tag. */
5581 if (verdefs != NULL && verdefs->vernum == 0)
5582 verdefs = verdefs->next;
5583
3e3b46e5 5584 if (verdefs == NULL && !info->create_default_symver)
8423293d 5585 s->flags |= SEC_EXCLUDE;
5a580b3a
AM
5586 else
5587 {
5588 unsigned int cdefs;
5589 bfd_size_type size;
5590 struct bfd_elf_version_tree *t;
5591 bfd_byte *p;
5592 Elf_Internal_Verdef def;
5593 Elf_Internal_Verdaux defaux;
3e3b46e5
PB
5594 struct bfd_link_hash_entry *bh;
5595 struct elf_link_hash_entry *h;
5596 const char *name;
5a580b3a
AM
5597
5598 cdefs = 0;
5599 size = 0;
5600
5601 /* Make space for the base version. */
5602 size += sizeof (Elf_External_Verdef);
5603 size += sizeof (Elf_External_Verdaux);
5604 ++cdefs;
5605
3e3b46e5
PB
5606 /* Make space for the default version. */
5607 if (info->create_default_symver)
5608 {
5609 size += sizeof (Elf_External_Verdef);
5610 ++cdefs;
5611 }
5612
5a580b3a
AM
5613 for (t = verdefs; t != NULL; t = t->next)
5614 {
5615 struct bfd_elf_version_deps *n;
5616
5617 size += sizeof (Elf_External_Verdef);
5618 size += sizeof (Elf_External_Verdaux);
5619 ++cdefs;
5620
5621 for (n = t->deps; n != NULL; n = n->next)
5622 size += sizeof (Elf_External_Verdaux);
5623 }
5624
eea6121a
AM
5625 s->size = size;
5626 s->contents = bfd_alloc (output_bfd, s->size);
5627 if (s->contents == NULL && s->size != 0)
5a580b3a
AM
5628 return FALSE;
5629
5630 /* Fill in the version definition section. */
5631
5632 p = s->contents;
5633
5634 def.vd_version = VER_DEF_CURRENT;
5635 def.vd_flags = VER_FLG_BASE;
5636 def.vd_ndx = 1;
5637 def.vd_cnt = 1;
3e3b46e5
PB
5638 if (info->create_default_symver)
5639 {
5640 def.vd_aux = 2 * sizeof (Elf_External_Verdef);
5641 def.vd_next = sizeof (Elf_External_Verdef);
5642 }
5643 else
5644 {
5645 def.vd_aux = sizeof (Elf_External_Verdef);
5646 def.vd_next = (sizeof (Elf_External_Verdef)
5647 + sizeof (Elf_External_Verdaux));
5648 }
5a580b3a
AM
5649
5650 if (soname_indx != (bfd_size_type) -1)
5651 {
5652 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5653 soname_indx);
5654 def.vd_hash = bfd_elf_hash (soname);
5655 defaux.vda_name = soname_indx;
3e3b46e5 5656 name = soname;
5a580b3a
AM
5657 }
5658 else
5659 {
5a580b3a
AM
5660 bfd_size_type indx;
5661
06084812 5662 name = lbasename (output_bfd->filename);
5a580b3a
AM
5663 def.vd_hash = bfd_elf_hash (name);
5664 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5665 name, FALSE);
5666 if (indx == (bfd_size_type) -1)
5667 return FALSE;
5668 defaux.vda_name = indx;
5669 }
5670 defaux.vda_next = 0;
5671
5672 _bfd_elf_swap_verdef_out (output_bfd, &def,
5673 (Elf_External_Verdef *) p);
5674 p += sizeof (Elf_External_Verdef);
3e3b46e5
PB
5675 if (info->create_default_symver)
5676 {
5677 /* Add a symbol representing this version. */
5678 bh = NULL;
5679 if (! (_bfd_generic_link_add_one_symbol
5680 (info, dynobj, name, BSF_GLOBAL, bfd_abs_section_ptr,
5681 0, NULL, FALSE,
5682 get_elf_backend_data (dynobj)->collect, &bh)))
5683 return FALSE;
5684 h = (struct elf_link_hash_entry *) bh;
5685 h->non_elf = 0;
5686 h->def_regular = 1;
5687 h->type = STT_OBJECT;
5688 h->verinfo.vertree = NULL;
5689
5690 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5691 return FALSE;
5692
5693 /* Create a duplicate of the base version with the same
5694 aux block, but different flags. */
5695 def.vd_flags = 0;
5696 def.vd_ndx = 2;
5697 def.vd_aux = sizeof (Elf_External_Verdef);
5698 if (verdefs)
5699 def.vd_next = (sizeof (Elf_External_Verdef)
5700 + sizeof (Elf_External_Verdaux));
5701 else
5702 def.vd_next = 0;
5703 _bfd_elf_swap_verdef_out (output_bfd, &def,
5704 (Elf_External_Verdef *) p);
5705 p += sizeof (Elf_External_Verdef);
5706 }
5a580b3a
AM
5707 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5708 (Elf_External_Verdaux *) p);
5709 p += sizeof (Elf_External_Verdaux);
5710
5711 for (t = verdefs; t != NULL; t = t->next)
5712 {
5713 unsigned int cdeps;
5714 struct bfd_elf_version_deps *n;
5a580b3a
AM
5715
5716 cdeps = 0;
5717 for (n = t->deps; n != NULL; n = n->next)
5718 ++cdeps;
5719
5720 /* Add a symbol representing this version. */
5721 bh = NULL;
5722 if (! (_bfd_generic_link_add_one_symbol
5723 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
5724 0, NULL, FALSE,
5725 get_elf_backend_data (dynobj)->collect, &bh)))
5726 return FALSE;
5727 h = (struct elf_link_hash_entry *) bh;
f5385ebf
AM
5728 h->non_elf = 0;
5729 h->def_regular = 1;
5a580b3a
AM
5730 h->type = STT_OBJECT;
5731 h->verinfo.vertree = t;
5732
c152c796 5733 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5a580b3a
AM
5734 return FALSE;
5735
5736 def.vd_version = VER_DEF_CURRENT;
5737 def.vd_flags = 0;
5738 if (t->globals.list == NULL
5739 && t->locals.list == NULL
5740 && ! t->used)
5741 def.vd_flags |= VER_FLG_WEAK;
3e3b46e5 5742 def.vd_ndx = t->vernum + (info->create_default_symver ? 2 : 1);
5a580b3a
AM
5743 def.vd_cnt = cdeps + 1;
5744 def.vd_hash = bfd_elf_hash (t->name);
5745 def.vd_aux = sizeof (Elf_External_Verdef);
5746 def.vd_next = 0;
5747 if (t->next != NULL)
5748 def.vd_next = (sizeof (Elf_External_Verdef)
5749 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
5750
5751 _bfd_elf_swap_verdef_out (output_bfd, &def,
5752 (Elf_External_Verdef *) p);
5753 p += sizeof (Elf_External_Verdef);
5754
5755 defaux.vda_name = h->dynstr_index;
5756 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5757 h->dynstr_index);
5758 defaux.vda_next = 0;
5759 if (t->deps != NULL)
5760 defaux.vda_next = sizeof (Elf_External_Verdaux);
5761 t->name_indx = defaux.vda_name;
5762
5763 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5764 (Elf_External_Verdaux *) p);
5765 p += sizeof (Elf_External_Verdaux);
5766
5767 for (n = t->deps; n != NULL; n = n->next)
5768 {
5769 if (n->version_needed == NULL)
5770 {
5771 /* This can happen if there was an error in the
5772 version script. */
5773 defaux.vda_name = 0;
5774 }
5775 else
5776 {
5777 defaux.vda_name = n->version_needed->name_indx;
5778 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
5779 defaux.vda_name);
5780 }
5781 if (n->next == NULL)
5782 defaux.vda_next = 0;
5783 else
5784 defaux.vda_next = sizeof (Elf_External_Verdaux);
5785
5786 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
5787 (Elf_External_Verdaux *) p);
5788 p += sizeof (Elf_External_Verdaux);
5789 }
5790 }
5791
5792 if (!_bfd_elf_add_dynamic_entry (info, DT_VERDEF, 0)
5793 || !_bfd_elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
5794 return FALSE;
5795
5796 elf_tdata (output_bfd)->cverdefs = cdefs;
5797 }
5798
5799 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
5800 {
5801 if (!_bfd_elf_add_dynamic_entry (info, DT_FLAGS, info->flags))
5802 return FALSE;
5803 }
5804 else if (info->flags & DF_BIND_NOW)
5805 {
5806 if (!_bfd_elf_add_dynamic_entry (info, DT_BIND_NOW, 0))
5807 return FALSE;
5808 }
5809
5810 if (info->flags_1)
5811 {
5812 if (info->executable)
5813 info->flags_1 &= ~ (DF_1_INITFIRST
5814 | DF_1_NODELETE
5815 | DF_1_NOOPEN);
5816 if (!_bfd_elf_add_dynamic_entry (info, DT_FLAGS_1, info->flags_1))
5817 return FALSE;
5818 }
5819
5820 /* Work out the size of the version reference section. */
5821
5822 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
5823 BFD_ASSERT (s != NULL);
5824 {
5825 struct elf_find_verdep_info sinfo;
5826
5827 sinfo.output_bfd = output_bfd;
5828 sinfo.info = info;
5829 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
5830 if (sinfo.vers == 0)
5831 sinfo.vers = 1;
5832 sinfo.failed = FALSE;
5833
5834 elf_link_hash_traverse (elf_hash_table (info),
5835 _bfd_elf_link_find_version_dependencies,
5836 &sinfo);
5837
5838 if (elf_tdata (output_bfd)->verref == NULL)
8423293d 5839 s->flags |= SEC_EXCLUDE;
5a580b3a
AM
5840 else
5841 {
5842 Elf_Internal_Verneed *t;
5843 unsigned int size;
5844 unsigned int crefs;
5845 bfd_byte *p;
5846
5847 /* Build the version definition section. */
5848 size = 0;
5849 crefs = 0;
5850 for (t = elf_tdata (output_bfd)->verref;
5851 t != NULL;
5852 t = t->vn_nextref)
5853 {
5854 Elf_Internal_Vernaux *a;
5855
5856 size += sizeof (Elf_External_Verneed);
5857 ++crefs;
5858 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5859 size += sizeof (Elf_External_Vernaux);
5860 }
5861
eea6121a
AM
5862 s->size = size;
5863 s->contents = bfd_alloc (output_bfd, s->size);
5a580b3a
AM
5864 if (s->contents == NULL)
5865 return FALSE;
5866
5867 p = s->contents;
5868 for (t = elf_tdata (output_bfd)->verref;
5869 t != NULL;
5870 t = t->vn_nextref)
5871 {
5872 unsigned int caux;
5873 Elf_Internal_Vernaux *a;
5874 bfd_size_type indx;
5875
5876 caux = 0;
5877 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5878 ++caux;
5879
5880 t->vn_version = VER_NEED_CURRENT;
5881 t->vn_cnt = caux;
5882 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5883 elf_dt_name (t->vn_bfd) != NULL
5884 ? elf_dt_name (t->vn_bfd)
06084812 5885 : lbasename (t->vn_bfd->filename),
5a580b3a
AM
5886 FALSE);
5887 if (indx == (bfd_size_type) -1)
5888 return FALSE;
5889 t->vn_file = indx;
5890 t->vn_aux = sizeof (Elf_External_Verneed);
5891 if (t->vn_nextref == NULL)
5892 t->vn_next = 0;
5893 else
5894 t->vn_next = (sizeof (Elf_External_Verneed)
5895 + caux * sizeof (Elf_External_Vernaux));
5896
5897 _bfd_elf_swap_verneed_out (output_bfd, t,
5898 (Elf_External_Verneed *) p);
5899 p += sizeof (Elf_External_Verneed);
5900
5901 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
5902 {
5903 a->vna_hash = bfd_elf_hash (a->vna_nodename);
5904 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
5905 a->vna_nodename, FALSE);
5906 if (indx == (bfd_size_type) -1)
5907 return FALSE;
5908 a->vna_name = indx;
5909 if (a->vna_nextptr == NULL)
5910 a->vna_next = 0;
5911 else
5912 a->vna_next = sizeof (Elf_External_Vernaux);
5913
5914 _bfd_elf_swap_vernaux_out (output_bfd, a,
5915 (Elf_External_Vernaux *) p);
5916 p += sizeof (Elf_External_Vernaux);
5917 }
5918 }
5919
5920 if (!_bfd_elf_add_dynamic_entry (info, DT_VERNEED, 0)
5921 || !_bfd_elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
5922 return FALSE;
5923
5924 elf_tdata (output_bfd)->cverrefs = crefs;
5925 }
5926 }
5927
8423293d
AM
5928 if ((elf_tdata (output_bfd)->cverrefs == 0
5929 && elf_tdata (output_bfd)->cverdefs == 0)
5930 || _bfd_elf_link_renumber_dynsyms (output_bfd, info,
5931 &section_sym_count) == 0)
5932 {
5933 s = bfd_get_section_by_name (dynobj, ".gnu.version");
5934 s->flags |= SEC_EXCLUDE;
5935 }
5936 }
5937 return TRUE;
5938}
5939
74541ad4
AM
5940/* Find the first non-excluded output section. We'll use its
5941 section symbol for some emitted relocs. */
5942void
5943_bfd_elf_init_1_index_section (bfd *output_bfd, struct bfd_link_info *info)
5944{
5945 asection *s;
5946
5947 for (s = output_bfd->sections; s != NULL; s = s->next)
5948 if ((s->flags & (SEC_EXCLUDE | SEC_ALLOC)) == SEC_ALLOC
5949 && !_bfd_elf_link_omit_section_dynsym (output_bfd, info, s))
5950 {
5951 elf_hash_table (info)->text_index_section = s;
5952 break;
5953 }
5954}
5955
5956/* Find two non-excluded output sections, one for code, one for data.
5957 We'll use their section symbols for some emitted relocs. */
5958void
5959_bfd_elf_init_2_index_sections (bfd *output_bfd, struct bfd_link_info *info)
5960{
5961 asection *s;
5962
5963 for (s = output_bfd->sections; s != NULL; s = s->next)
5964 if (((s->flags & (SEC_EXCLUDE | SEC_ALLOC | SEC_READONLY))
5965 == (SEC_ALLOC | SEC_READONLY))
5966 && !_bfd_elf_link_omit_section_dynsym (output_bfd, info, s))
5967 {
5968 elf_hash_table (info)->text_index_section = s;
5969 break;
5970 }
5971
5972 for (s = output_bfd->sections; s != NULL; s = s->next)
5973 if (((s->flags & (SEC_EXCLUDE | SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
5974 && !_bfd_elf_link_omit_section_dynsym (output_bfd, info, s))
5975 {
5976 elf_hash_table (info)->data_index_section = s;
5977 break;
5978 }
5979
5980 if (elf_hash_table (info)->text_index_section == NULL)
5981 elf_hash_table (info)->text_index_section
5982 = elf_hash_table (info)->data_index_section;
5983}
5984
8423293d
AM
5985bfd_boolean
5986bfd_elf_size_dynsym_hash_dynstr (bfd *output_bfd, struct bfd_link_info *info)
5987{
74541ad4
AM
5988 const struct elf_backend_data *bed;
5989
8423293d
AM
5990 if (!is_elf_hash_table (info->hash))
5991 return TRUE;
5992
74541ad4
AM
5993 bed = get_elf_backend_data (output_bfd);
5994 (*bed->elf_backend_init_index_section) (output_bfd, info);
5995
8423293d
AM
5996 if (elf_hash_table (info)->dynamic_sections_created)
5997 {
5998 bfd *dynobj;
8423293d
AM
5999 asection *s;
6000 bfd_size_type dynsymcount;
6001 unsigned long section_sym_count;
8423293d
AM
6002 unsigned int dtagcount;
6003
6004 dynobj = elf_hash_table (info)->dynobj;
6005
5a580b3a
AM
6006 /* Assign dynsym indicies. In a shared library we generate a
6007 section symbol for each output section, which come first.
6008 Next come all of the back-end allocated local dynamic syms,
6009 followed by the rest of the global symbols. */
6010
554220db
AM
6011 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info,
6012 &section_sym_count);
5a580b3a
AM
6013
6014 /* Work out the size of the symbol version section. */
6015 s = bfd_get_section_by_name (dynobj, ".gnu.version");
6016 BFD_ASSERT (s != NULL);
8423293d
AM
6017 if (dynsymcount != 0
6018 && (s->flags & SEC_EXCLUDE) == 0)
5a580b3a 6019 {
eea6121a
AM
6020 s->size = dynsymcount * sizeof (Elf_External_Versym);
6021 s->contents = bfd_zalloc (output_bfd, s->size);
5a580b3a
AM
6022 if (s->contents == NULL)
6023 return FALSE;
6024
6025 if (!_bfd_elf_add_dynamic_entry (info, DT_VERSYM, 0))
6026 return FALSE;
6027 }
6028
6029 /* Set the size of the .dynsym and .hash sections. We counted
6030 the number of dynamic symbols in elf_link_add_object_symbols.
6031 We will build the contents of .dynsym and .hash when we build
6032 the final symbol table, because until then we do not know the
6033 correct value to give the symbols. We built the .dynstr
6034 section as we went along in elf_link_add_object_symbols. */
6035 s = bfd_get_section_by_name (dynobj, ".dynsym");
6036 BFD_ASSERT (s != NULL);
eea6121a 6037 s->size = dynsymcount * bed->s->sizeof_sym;
5a580b3a
AM
6038
6039 if (dynsymcount != 0)
6040 {
554220db
AM
6041 s->contents = bfd_alloc (output_bfd, s->size);
6042 if (s->contents == NULL)
6043 return FALSE;
5a580b3a 6044
554220db
AM
6045 /* The first entry in .dynsym is a dummy symbol.
6046 Clear all the section syms, in case we don't output them all. */
6047 ++section_sym_count;
6048 memset (s->contents, 0, section_sym_count * bed->s->sizeof_sym);
5a580b3a
AM
6049 }
6050
fdc90cb4
JJ
6051 elf_hash_table (info)->bucketcount = 0;
6052
5a580b3a
AM
6053 /* Compute the size of the hashing table. As a side effect this
6054 computes the hash values for all the names we export. */
fdc90cb4
JJ
6055 if (info->emit_hash)
6056 {
6057 unsigned long int *hashcodes;
6058 unsigned long int *hashcodesp;
6059 bfd_size_type amt;
6060 unsigned long int nsyms;
6061 size_t bucketcount;
6062 size_t hash_entry_size;
6063
6064 /* Compute the hash values for all exported symbols. At the same
6065 time store the values in an array so that we could use them for
6066 optimizations. */
6067 amt = dynsymcount * sizeof (unsigned long int);
6068 hashcodes = bfd_malloc (amt);
6069 if (hashcodes == NULL)
6070 return FALSE;
6071 hashcodesp = hashcodes;
5a580b3a 6072
fdc90cb4
JJ
6073 /* Put all hash values in HASHCODES. */
6074 elf_link_hash_traverse (elf_hash_table (info),
6075 elf_collect_hash_codes, &hashcodesp);
5a580b3a 6076
fdc90cb4
JJ
6077 nsyms = hashcodesp - hashcodes;
6078 bucketcount
6079 = compute_bucket_count (info, hashcodes, nsyms, 0);
6080 free (hashcodes);
6081
6082 if (bucketcount == 0)
6083 return FALSE;
5a580b3a 6084
fdc90cb4
JJ
6085 elf_hash_table (info)->bucketcount = bucketcount;
6086
6087 s = bfd_get_section_by_name (dynobj, ".hash");
6088 BFD_ASSERT (s != NULL);
6089 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
6090 s->size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
6091 s->contents = bfd_zalloc (output_bfd, s->size);
6092 if (s->contents == NULL)
6093 return FALSE;
6094
6095 bfd_put (8 * hash_entry_size, output_bfd, bucketcount, s->contents);
6096 bfd_put (8 * hash_entry_size, output_bfd, dynsymcount,
6097 s->contents + hash_entry_size);
6098 }
6099
6100 if (info->emit_gnu_hash)
6101 {
6102 size_t i, cnt;
6103 unsigned char *contents;
6104 struct collect_gnu_hash_codes cinfo;
6105 bfd_size_type amt;
6106 size_t bucketcount;
6107
6108 memset (&cinfo, 0, sizeof (cinfo));
6109
6110 /* Compute the hash values for all exported symbols. At the same
6111 time store the values in an array so that we could use them for
6112 optimizations. */
6113 amt = dynsymcount * 2 * sizeof (unsigned long int);
6114 cinfo.hashcodes = bfd_malloc (amt);
6115 if (cinfo.hashcodes == NULL)
6116 return FALSE;
6117
6118 cinfo.hashval = cinfo.hashcodes + dynsymcount;
6119 cinfo.min_dynindx = -1;
6120 cinfo.output_bfd = output_bfd;
6121 cinfo.bed = bed;
6122
6123 /* Put all hash values in HASHCODES. */
6124 elf_link_hash_traverse (elf_hash_table (info),
6125 elf_collect_gnu_hash_codes, &cinfo);
6126
6127 bucketcount
6128 = compute_bucket_count (info, cinfo.hashcodes, cinfo.nsyms, 1);
6129
6130 if (bucketcount == 0)
6131 {
6132 free (cinfo.hashcodes);
6133 return FALSE;
6134 }
6135
6136 s = bfd_get_section_by_name (dynobj, ".gnu.hash");
6137 BFD_ASSERT (s != NULL);
6138
6139 if (cinfo.nsyms == 0)
6140 {
6141 /* Empty .gnu.hash section is special. */
6142 BFD_ASSERT (cinfo.min_dynindx == -1);
6143 free (cinfo.hashcodes);
6144 s->size = 5 * 4 + bed->s->arch_size / 8;
6145 contents = bfd_zalloc (output_bfd, s->size);
6146 if (contents == NULL)
6147 return FALSE;
6148 s->contents = contents;
6149 /* 1 empty bucket. */
6150 bfd_put_32 (output_bfd, 1, contents);
6151 /* SYMIDX above the special symbol 0. */
6152 bfd_put_32 (output_bfd, 1, contents + 4);
6153 /* Just one word for bitmask. */
6154 bfd_put_32 (output_bfd, 1, contents + 8);
6155 /* Only hash fn bloom filter. */
6156 bfd_put_32 (output_bfd, 0, contents + 12);
6157 /* No hashes are valid - empty bitmask. */
6158 bfd_put (bed->s->arch_size, output_bfd, 0, contents + 16);
6159 /* No hashes in the only bucket. */
6160 bfd_put_32 (output_bfd, 0,
6161 contents + 16 + bed->s->arch_size / 8);
6162 }
6163 else
6164 {
fdc90cb4 6165 unsigned long int maskwords, maskbitslog2;
0b33793d 6166 BFD_ASSERT (cinfo.min_dynindx != -1);
fdc90cb4
JJ
6167
6168 maskbitslog2 = bfd_log2 (cinfo.nsyms) + 1;
6169 if (maskbitslog2 < 3)
6170 maskbitslog2 = 5;
6171 else if ((1 << (maskbitslog2 - 2)) & cinfo.nsyms)
6172 maskbitslog2 = maskbitslog2 + 3;
6173 else
6174 maskbitslog2 = maskbitslog2 + 2;
6175 if (bed->s->arch_size == 64)
6176 {
6177 if (maskbitslog2 == 5)
6178 maskbitslog2 = 6;
6179 cinfo.shift1 = 6;
6180 }
6181 else
6182 cinfo.shift1 = 5;
6183 cinfo.mask = (1 << cinfo.shift1) - 1;
2ccdbfcc 6184 cinfo.shift2 = maskbitslog2;
fdc90cb4
JJ
6185 cinfo.maskbits = 1 << maskbitslog2;
6186 maskwords = 1 << (maskbitslog2 - cinfo.shift1);
6187 amt = bucketcount * sizeof (unsigned long int) * 2;
6188 amt += maskwords * sizeof (bfd_vma);
6189 cinfo.bitmask = bfd_malloc (amt);
6190 if (cinfo.bitmask == NULL)
6191 {
6192 free (cinfo.hashcodes);
6193 return FALSE;
6194 }
6195
6196 cinfo.counts = (void *) (cinfo.bitmask + maskwords);
6197 cinfo.indx = cinfo.counts + bucketcount;
6198 cinfo.symindx = dynsymcount - cinfo.nsyms;
6199 memset (cinfo.bitmask, 0, maskwords * sizeof (bfd_vma));
6200
6201 /* Determine how often each hash bucket is used. */
6202 memset (cinfo.counts, 0, bucketcount * sizeof (cinfo.counts[0]));
6203 for (i = 0; i < cinfo.nsyms; ++i)
6204 ++cinfo.counts[cinfo.hashcodes[i] % bucketcount];
6205
6206 for (i = 0, cnt = cinfo.symindx; i < bucketcount; ++i)
6207 if (cinfo.counts[i] != 0)
6208 {
6209 cinfo.indx[i] = cnt;
6210 cnt += cinfo.counts[i];
6211 }
6212 BFD_ASSERT (cnt == dynsymcount);
6213 cinfo.bucketcount = bucketcount;
6214 cinfo.local_indx = cinfo.min_dynindx;
6215
6216 s->size = (4 + bucketcount + cinfo.nsyms) * 4;
6217 s->size += cinfo.maskbits / 8;
6218 contents = bfd_zalloc (output_bfd, s->size);
6219 if (contents == NULL)
6220 {
6221 free (cinfo.bitmask);
6222 free (cinfo.hashcodes);
6223 return FALSE;
6224 }
6225
6226 s->contents = contents;
6227 bfd_put_32 (output_bfd, bucketcount, contents);
6228 bfd_put_32 (output_bfd, cinfo.symindx, contents + 4);
6229 bfd_put_32 (output_bfd, maskwords, contents + 8);
6230 bfd_put_32 (output_bfd, cinfo.shift2, contents + 12);
6231 contents += 16 + cinfo.maskbits / 8;
6232
6233 for (i = 0; i < bucketcount; ++i)
6234 {
6235 if (cinfo.counts[i] == 0)
6236 bfd_put_32 (output_bfd, 0, contents);
6237 else
6238 bfd_put_32 (output_bfd, cinfo.indx[i], contents);
6239 contents += 4;
6240 }
6241
6242 cinfo.contents = contents;
6243
6244 /* Renumber dynamic symbols, populate .gnu.hash section. */
6245 elf_link_hash_traverse (elf_hash_table (info),
6246 elf_renumber_gnu_hash_syms, &cinfo);
6247
6248 contents = s->contents + 16;
6249 for (i = 0; i < maskwords; ++i)
6250 {
6251 bfd_put (bed->s->arch_size, output_bfd, cinfo.bitmask[i],
6252 contents);
6253 contents += bed->s->arch_size / 8;
6254 }
6255
6256 free (cinfo.bitmask);
6257 free (cinfo.hashcodes);
6258 }
6259 }
5a580b3a
AM
6260
6261 s = bfd_get_section_by_name (dynobj, ".dynstr");
6262 BFD_ASSERT (s != NULL);
6263
4ad4eba5 6264 elf_finalize_dynstr (output_bfd, info);
5a580b3a 6265
eea6121a 6266 s->size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
5a580b3a
AM
6267
6268 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
6269 if (!_bfd_elf_add_dynamic_entry (info, DT_NULL, 0))
6270 return FALSE;
6271 }
6272
6273 return TRUE;
6274}
c152c796
AM
6275
6276/* Final phase of ELF linker. */
6277
6278/* A structure we use to avoid passing large numbers of arguments. */
6279
6280struct elf_final_link_info
6281{
6282 /* General link information. */
6283 struct bfd_link_info *info;
6284 /* Output BFD. */
6285 bfd *output_bfd;
6286 /* Symbol string table. */
6287 struct bfd_strtab_hash *symstrtab;
6288 /* .dynsym section. */
6289 asection *dynsym_sec;
6290 /* .hash section. */
6291 asection *hash_sec;
6292 /* symbol version section (.gnu.version). */
6293 asection *symver_sec;
6294 /* Buffer large enough to hold contents of any section. */
6295 bfd_byte *contents;
6296 /* Buffer large enough to hold external relocs of any section. */
6297 void *external_relocs;
6298 /* Buffer large enough to hold internal relocs of any section. */
6299 Elf_Internal_Rela *internal_relocs;
6300 /* Buffer large enough to hold external local symbols of any input
6301 BFD. */
6302 bfd_byte *external_syms;
6303 /* And a buffer for symbol section indices. */
6304 Elf_External_Sym_Shndx *locsym_shndx;
6305 /* Buffer large enough to hold internal local symbols of any input
6306 BFD. */
6307 Elf_Internal_Sym *internal_syms;
6308 /* Array large enough to hold a symbol index for each local symbol
6309 of any input BFD. */
6310 long *indices;
6311 /* Array large enough to hold a section pointer for each local
6312 symbol of any input BFD. */
6313 asection **sections;
6314 /* Buffer to hold swapped out symbols. */
6315 bfd_byte *symbuf;
6316 /* And one for symbol section indices. */
6317 Elf_External_Sym_Shndx *symshndxbuf;
6318 /* Number of swapped out symbols in buffer. */
6319 size_t symbuf_count;
6320 /* Number of symbols which fit in symbuf. */
6321 size_t symbuf_size;
6322 /* And same for symshndxbuf. */
6323 size_t shndxbuf_size;
6324};
6325
6326/* This struct is used to pass information to elf_link_output_extsym. */
6327
6328struct elf_outext_info
6329{
6330 bfd_boolean failed;
6331 bfd_boolean localsyms;
6332 struct elf_final_link_info *finfo;
6333};
6334
6335/* When performing a relocatable link, the input relocations are
6336 preserved. But, if they reference global symbols, the indices
6337 referenced must be updated. Update all the relocations in
6338 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
6339
6340static void
6341elf_link_adjust_relocs (bfd *abfd,
6342 Elf_Internal_Shdr *rel_hdr,
6343 unsigned int count,
6344 struct elf_link_hash_entry **rel_hash)
6345{
6346 unsigned int i;
6347 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6348 bfd_byte *erela;
6349 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
6350 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
6351 bfd_vma r_type_mask;
6352 int r_sym_shift;
6353
6354 if (rel_hdr->sh_entsize == bed->s->sizeof_rel)
6355 {
6356 swap_in = bed->s->swap_reloc_in;
6357 swap_out = bed->s->swap_reloc_out;
6358 }
6359 else if (rel_hdr->sh_entsize == bed->s->sizeof_rela)
6360 {
6361 swap_in = bed->s->swap_reloca_in;
6362 swap_out = bed->s->swap_reloca_out;
6363 }
6364 else
6365 abort ();
6366
6367 if (bed->s->int_rels_per_ext_rel > MAX_INT_RELS_PER_EXT_REL)
6368 abort ();
6369
6370 if (bed->s->arch_size == 32)
6371 {
6372 r_type_mask = 0xff;
6373 r_sym_shift = 8;
6374 }
6375 else
6376 {
6377 r_type_mask = 0xffffffff;
6378 r_sym_shift = 32;
6379 }
6380
6381 erela = rel_hdr->contents;
6382 for (i = 0; i < count; i++, rel_hash++, erela += rel_hdr->sh_entsize)
6383 {
6384 Elf_Internal_Rela irela[MAX_INT_RELS_PER_EXT_REL];
6385 unsigned int j;
6386
6387 if (*rel_hash == NULL)
6388 continue;
6389
6390 BFD_ASSERT ((*rel_hash)->indx >= 0);
6391
6392 (*swap_in) (abfd, erela, irela);
6393 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
6394 irela[j].r_info = ((bfd_vma) (*rel_hash)->indx << r_sym_shift
6395 | (irela[j].r_info & r_type_mask));
6396 (*swap_out) (abfd, irela, erela);
6397 }
6398}
6399
6400struct elf_link_sort_rela
6401{
6402 union {
6403 bfd_vma offset;
6404 bfd_vma sym_mask;
6405 } u;
6406 enum elf_reloc_type_class type;
6407 /* We use this as an array of size int_rels_per_ext_rel. */
6408 Elf_Internal_Rela rela[1];
6409};
6410
6411static int
6412elf_link_sort_cmp1 (const void *A, const void *B)
6413{
6414 const struct elf_link_sort_rela *a = A;
6415 const struct elf_link_sort_rela *b = B;
6416 int relativea, relativeb;
6417
6418 relativea = a->type == reloc_class_relative;
6419 relativeb = b->type == reloc_class_relative;
6420
6421 if (relativea < relativeb)
6422 return 1;
6423 if (relativea > relativeb)
6424 return -1;
6425 if ((a->rela->r_info & a->u.sym_mask) < (b->rela->r_info & b->u.sym_mask))
6426 return -1;
6427 if ((a->rela->r_info & a->u.sym_mask) > (b->rela->r_info & b->u.sym_mask))
6428 return 1;
6429 if (a->rela->r_offset < b->rela->r_offset)
6430 return -1;
6431 if (a->rela->r_offset > b->rela->r_offset)
6432 return 1;
6433 return 0;
6434}
6435
6436static int
6437elf_link_sort_cmp2 (const void *A, const void *B)
6438{
6439 const struct elf_link_sort_rela *a = A;
6440 const struct elf_link_sort_rela *b = B;
6441 int copya, copyb;
6442
6443 if (a->u.offset < b->u.offset)
6444 return -1;
6445 if (a->u.offset > b->u.offset)
6446 return 1;
6447 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
6448 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
6449 if (copya < copyb)
6450 return -1;
6451 if (copya > copyb)
6452 return 1;
6453 if (a->rela->r_offset < b->rela->r_offset)
6454 return -1;
6455 if (a->rela->r_offset > b->rela->r_offset)
6456 return 1;
6457 return 0;
6458}
6459
6460static size_t
6461elf_link_sort_relocs (bfd *abfd, struct bfd_link_info *info, asection **psec)
6462{
6463 asection *reldyn;
6464 bfd_size_type count, size;
6465 size_t i, ret, sort_elt, ext_size;
6466 bfd_byte *sort, *s_non_relative, *p;
6467 struct elf_link_sort_rela *sq;
6468 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
6469 int i2e = bed->s->int_rels_per_ext_rel;
6470 void (*swap_in) (bfd *, const bfd_byte *, Elf_Internal_Rela *);
6471 void (*swap_out) (bfd *, const Elf_Internal_Rela *, bfd_byte *);
6472 struct bfd_link_order *lo;
6473 bfd_vma r_sym_mask;
6474
6475 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
eea6121a 6476 if (reldyn == NULL || reldyn->size == 0)
c152c796
AM
6477 {
6478 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
eea6121a 6479 if (reldyn == NULL || reldyn->size == 0)
c152c796
AM
6480 return 0;
6481 ext_size = bed->s->sizeof_rel;
6482 swap_in = bed->s->swap_reloc_in;
6483 swap_out = bed->s->swap_reloc_out;
6484 }
6485 else
6486 {
6487 ext_size = bed->s->sizeof_rela;
6488 swap_in = bed->s->swap_reloca_in;
6489 swap_out = bed->s->swap_reloca_out;
6490 }
eea6121a 6491 count = reldyn->size / ext_size;
c152c796
AM
6492
6493 size = 0;
8423293d 6494 for (lo = reldyn->map_head.link_order; lo != NULL; lo = lo->next)
c152c796
AM
6495 if (lo->type == bfd_indirect_link_order)
6496 {
6497 asection *o = lo->u.indirect.section;
eea6121a 6498 size += o->size;
c152c796
AM
6499 }
6500
eea6121a 6501 if (size != reldyn->size)
c152c796
AM
6502 return 0;
6503
6504 sort_elt = (sizeof (struct elf_link_sort_rela)
6505 + (i2e - 1) * sizeof (Elf_Internal_Rela));
6506 sort = bfd_zmalloc (sort_elt * count);
6507 if (sort == NULL)
6508 {
6509 (*info->callbacks->warning)
6510 (info, _("Not enough memory to sort relocations"), 0, abfd, 0, 0);
6511 return 0;
6512 }
6513
6514 if (bed->s->arch_size == 32)
6515 r_sym_mask = ~(bfd_vma) 0xff;
6516 else
6517 r_sym_mask = ~(bfd_vma) 0xffffffff;
6518
8423293d 6519 for (lo = reldyn->map_head.link_order; lo != NULL; lo = lo->next)
c152c796
AM
6520 if (lo->type == bfd_indirect_link_order)
6521 {
6522 bfd_byte *erel, *erelend;
6523 asection *o = lo->u.indirect.section;
6524
1da212d6
AM
6525 if (o->contents == NULL && o->size != 0)
6526 {
6527 /* This is a reloc section that is being handled as a normal
6528 section. See bfd_section_from_shdr. We can't combine
6529 relocs in this case. */
6530 free (sort);
6531 return 0;
6532 }
c152c796 6533 erel = o->contents;
eea6121a 6534 erelend = o->contents + o->size;
c152c796
AM
6535 p = sort + o->output_offset / ext_size * sort_elt;
6536 while (erel < erelend)
6537 {
6538 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6539 (*swap_in) (abfd, erel, s->rela);
6540 s->type = (*bed->elf_backend_reloc_type_class) (s->rela);
6541 s->u.sym_mask = r_sym_mask;
6542 p += sort_elt;
6543 erel += ext_size;
6544 }
6545 }
6546
6547 qsort (sort, count, sort_elt, elf_link_sort_cmp1);
6548
6549 for (i = 0, p = sort; i < count; i++, p += sort_elt)
6550 {
6551 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6552 if (s->type != reloc_class_relative)
6553 break;
6554 }
6555 ret = i;
6556 s_non_relative = p;
6557
6558 sq = (struct elf_link_sort_rela *) s_non_relative;
6559 for (; i < count; i++, p += sort_elt)
6560 {
6561 struct elf_link_sort_rela *sp = (struct elf_link_sort_rela *) p;
6562 if (((sp->rela->r_info ^ sq->rela->r_info) & r_sym_mask) != 0)
6563 sq = sp;
6564 sp->u.offset = sq->rela->r_offset;
6565 }
6566
6567 qsort (s_non_relative, count - ret, sort_elt, elf_link_sort_cmp2);
6568
8423293d 6569 for (lo = reldyn->map_head.link_order; lo != NULL; lo = lo->next)
c152c796
AM
6570 if (lo->type == bfd_indirect_link_order)
6571 {
6572 bfd_byte *erel, *erelend;
6573 asection *o = lo->u.indirect.section;
6574
6575 erel = o->contents;
eea6121a 6576 erelend = o->contents + o->size;
c152c796
AM
6577 p = sort + o->output_offset / ext_size * sort_elt;
6578 while (erel < erelend)
6579 {
6580 struct elf_link_sort_rela *s = (struct elf_link_sort_rela *) p;
6581 (*swap_out) (abfd, s->rela, erel);
6582 p += sort_elt;
6583 erel += ext_size;
6584 }
6585 }
6586
6587 free (sort);
6588 *psec = reldyn;
6589 return ret;
6590}
6591
6592/* Flush the output symbols to the file. */
6593
6594static bfd_boolean
6595elf_link_flush_output_syms (struct elf_final_link_info *finfo,
6596 const struct elf_backend_data *bed)
6597{
6598 if (finfo->symbuf_count > 0)
6599 {
6600 Elf_Internal_Shdr *hdr;
6601 file_ptr pos;
6602 bfd_size_type amt;
6603
6604 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
6605 pos = hdr->sh_offset + hdr->sh_size;
6606 amt = finfo->symbuf_count * bed->s->sizeof_sym;
6607 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
6608 || bfd_bwrite (finfo->symbuf, amt, finfo->output_bfd) != amt)
6609 return FALSE;
6610
6611 hdr->sh_size += amt;
6612 finfo->symbuf_count = 0;
6613 }
6614
6615 return TRUE;
6616}
6617
6618/* Add a symbol to the output symbol table. */
6619
6620static bfd_boolean
6621elf_link_output_sym (struct elf_final_link_info *finfo,
6622 const char *name,
6623 Elf_Internal_Sym *elfsym,
6624 asection *input_sec,
6625 struct elf_link_hash_entry *h)
6626{
6627 bfd_byte *dest;
6628 Elf_External_Sym_Shndx *destshndx;
6629 bfd_boolean (*output_symbol_hook)
6630 (struct bfd_link_info *, const char *, Elf_Internal_Sym *, asection *,
6631 struct elf_link_hash_entry *);
6632 const struct elf_backend_data *bed;
6633
6634 bed = get_elf_backend_data (finfo->output_bfd);
6635 output_symbol_hook = bed->elf_backend_link_output_symbol_hook;
6636 if (output_symbol_hook != NULL)
6637 {
6638 if (! (*output_symbol_hook) (finfo->info, name, elfsym, input_sec, h))
6639 return FALSE;
6640 }
6641
6642 if (name == NULL || *name == '\0')
6643 elfsym->st_name = 0;
6644 else if (input_sec->flags & SEC_EXCLUDE)
6645 elfsym->st_name = 0;
6646 else
6647 {
6648 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
6649 name, TRUE, FALSE);
6650 if (elfsym->st_name == (unsigned long) -1)
6651 return FALSE;
6652 }
6653
6654 if (finfo->symbuf_count >= finfo->symbuf_size)
6655 {
6656 if (! elf_link_flush_output_syms (finfo, bed))
6657 return FALSE;
6658 }
6659
6660 dest = finfo->symbuf + finfo->symbuf_count * bed->s->sizeof_sym;
6661 destshndx = finfo->symshndxbuf;
6662 if (destshndx != NULL)
6663 {
6664 if (bfd_get_symcount (finfo->output_bfd) >= finfo->shndxbuf_size)
6665 {
6666 bfd_size_type amt;
6667
6668 amt = finfo->shndxbuf_size * sizeof (Elf_External_Sym_Shndx);
6669 finfo->symshndxbuf = destshndx = bfd_realloc (destshndx, amt * 2);
6670 if (destshndx == NULL)
6671 return FALSE;
6672 memset ((char *) destshndx + amt, 0, amt);
6673 finfo->shndxbuf_size *= 2;
6674 }
6675 destshndx += bfd_get_symcount (finfo->output_bfd);
6676 }
6677
6678 bed->s->swap_symbol_out (finfo->output_bfd, elfsym, dest, destshndx);
6679 finfo->symbuf_count += 1;
6680 bfd_get_symcount (finfo->output_bfd) += 1;
6681
6682 return TRUE;
6683}
6684
c0d5a53d
L
6685/* Return TRUE if the dynamic symbol SYM in ABFD is supported. */
6686
6687static bfd_boolean
6688check_dynsym (bfd *abfd, Elf_Internal_Sym *sym)
6689{
6690 if (sym->st_shndx > SHN_HIRESERVE)
6691 {
6692 /* The gABI doesn't support dynamic symbols in output sections
6693 beyond 64k. */
6694 (*_bfd_error_handler)
6695 (_("%B: Too many sections: %d (>= %d)"),
6696 abfd, bfd_count_sections (abfd), SHN_LORESERVE);
6697 bfd_set_error (bfd_error_nonrepresentable_section);
6698 return FALSE;
6699 }
6700 return TRUE;
6701}
6702
c152c796
AM
6703/* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
6704 allowing an unsatisfied unversioned symbol in the DSO to match a
6705 versioned symbol that would normally require an explicit version.
6706 We also handle the case that a DSO references a hidden symbol
6707 which may be satisfied by a versioned symbol in another DSO. */
6708
6709static bfd_boolean
6710elf_link_check_versioned_symbol (struct bfd_link_info *info,
6711 const struct elf_backend_data *bed,
6712 struct elf_link_hash_entry *h)
6713{
6714 bfd *abfd;
6715 struct elf_link_loaded_list *loaded;
6716
6717 if (!is_elf_hash_table (info->hash))
6718 return FALSE;
6719
6720 switch (h->root.type)
6721 {
6722 default:
6723 abfd = NULL;
6724 break;
6725
6726 case bfd_link_hash_undefined:
6727 case bfd_link_hash_undefweak:
6728 abfd = h->root.u.undef.abfd;
6729 if ((abfd->flags & DYNAMIC) == 0
e56f61be 6730 || (elf_dyn_lib_class (abfd) & DYN_DT_NEEDED) == 0)
c152c796
AM
6731 return FALSE;
6732 break;
6733
6734 case bfd_link_hash_defined:
6735 case bfd_link_hash_defweak:
6736 abfd = h->root.u.def.section->owner;
6737 break;
6738
6739 case bfd_link_hash_common:
6740 abfd = h->root.u.c.p->section->owner;
6741 break;
6742 }
6743 BFD_ASSERT (abfd != NULL);
6744
6745 for (loaded = elf_hash_table (info)->loaded;
6746 loaded != NULL;
6747 loaded = loaded->next)
6748 {
6749 bfd *input;
6750 Elf_Internal_Shdr *hdr;
6751 bfd_size_type symcount;
6752 bfd_size_type extsymcount;
6753 bfd_size_type extsymoff;
6754 Elf_Internal_Shdr *versymhdr;
6755 Elf_Internal_Sym *isym;
6756 Elf_Internal_Sym *isymend;
6757 Elf_Internal_Sym *isymbuf;
6758 Elf_External_Versym *ever;
6759 Elf_External_Versym *extversym;
6760
6761 input = loaded->abfd;
6762
6763 /* We check each DSO for a possible hidden versioned definition. */
6764 if (input == abfd
6765 || (input->flags & DYNAMIC) == 0
6766 || elf_dynversym (input) == 0)
6767 continue;
6768
6769 hdr = &elf_tdata (input)->dynsymtab_hdr;
6770
6771 symcount = hdr->sh_size / bed->s->sizeof_sym;
6772 if (elf_bad_symtab (input))
6773 {
6774 extsymcount = symcount;
6775 extsymoff = 0;
6776 }
6777 else
6778 {
6779 extsymcount = symcount - hdr->sh_info;
6780 extsymoff = hdr->sh_info;
6781 }
6782
6783 if (extsymcount == 0)
6784 continue;
6785
6786 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
6787 NULL, NULL, NULL);
6788 if (isymbuf == NULL)
6789 return FALSE;
6790
6791 /* Read in any version definitions. */
6792 versymhdr = &elf_tdata (input)->dynversym_hdr;
6793 extversym = bfd_malloc (versymhdr->sh_size);
6794 if (extversym == NULL)
6795 goto error_ret;
6796
6797 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
6798 || (bfd_bread (extversym, versymhdr->sh_size, input)
6799 != versymhdr->sh_size))
6800 {
6801 free (extversym);
6802 error_ret:
6803 free (isymbuf);
6804 return FALSE;
6805 }
6806
6807 ever = extversym + extsymoff;
6808 isymend = isymbuf + extsymcount;
6809 for (isym = isymbuf; isym < isymend; isym++, ever++)
6810 {
6811 const char *name;
6812 Elf_Internal_Versym iver;
6813 unsigned short version_index;
6814
6815 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
6816 || isym->st_shndx == SHN_UNDEF)
6817 continue;
6818
6819 name = bfd_elf_string_from_elf_section (input,
6820 hdr->sh_link,
6821 isym->st_name);
6822 if (strcmp (name, h->root.root.string) != 0)
6823 continue;
6824
6825 _bfd_elf_swap_versym_in (input, ever, &iver);
6826
6827 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
6828 {
6829 /* If we have a non-hidden versioned sym, then it should
6830 have provided a definition for the undefined sym. */
6831 abort ();
6832 }
6833
6834 version_index = iver.vs_vers & VERSYM_VERSION;
6835 if (version_index == 1 || version_index == 2)
6836 {
6837 /* This is the base or first version. We can use it. */
6838 free (extversym);
6839 free (isymbuf);
6840 return TRUE;
6841 }
6842 }
6843
6844 free (extversym);
6845 free (isymbuf);
6846 }
6847
6848 return FALSE;
6849}
6850
6851/* Add an external symbol to the symbol table. This is called from
6852 the hash table traversal routine. When generating a shared object,
6853 we go through the symbol table twice. The first time we output
6854 anything that might have been forced to local scope in a version
6855 script. The second time we output the symbols that are still
6856 global symbols. */
6857
6858static bfd_boolean
6859elf_link_output_extsym (struct elf_link_hash_entry *h, void *data)
6860{
6861 struct elf_outext_info *eoinfo = data;
6862 struct elf_final_link_info *finfo = eoinfo->finfo;
6863 bfd_boolean strip;
6864 Elf_Internal_Sym sym;
6865 asection *input_sec;
6866 const struct elf_backend_data *bed;
6867
6868 if (h->root.type == bfd_link_hash_warning)
6869 {
6870 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6871 if (h->root.type == bfd_link_hash_new)
6872 return TRUE;
6873 }
6874
6875 /* Decide whether to output this symbol in this pass. */
6876 if (eoinfo->localsyms)
6877 {
f5385ebf 6878 if (!h->forced_local)
c152c796
AM
6879 return TRUE;
6880 }
6881 else
6882 {
f5385ebf 6883 if (h->forced_local)
c152c796
AM
6884 return TRUE;
6885 }
6886
6887 bed = get_elf_backend_data (finfo->output_bfd);
6888
12ac1cf5 6889 if (h->root.type == bfd_link_hash_undefined)
c152c796 6890 {
12ac1cf5
NC
6891 /* If we have an undefined symbol reference here then it must have
6892 come from a shared library that is being linked in. (Undefined
6893 references in regular files have already been handled). */
6894 bfd_boolean ignore_undef = FALSE;
6895
6896 /* Some symbols may be special in that the fact that they're
6897 undefined can be safely ignored - let backend determine that. */
6898 if (bed->elf_backend_ignore_undef_symbol)
6899 ignore_undef = bed->elf_backend_ignore_undef_symbol (h);
6900
6901 /* If we are reporting errors for this situation then do so now. */
6902 if (ignore_undef == FALSE
6903 && h->ref_dynamic
6904 && ! h->ref_regular
6905 && ! elf_link_check_versioned_symbol (finfo->info, bed, h)
6906 && finfo->info->unresolved_syms_in_shared_libs != RM_IGNORE)
c152c796 6907 {
12ac1cf5
NC
6908 if (! (finfo->info->callbacks->undefined_symbol
6909 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
6910 NULL, 0, finfo->info->unresolved_syms_in_shared_libs == RM_GENERATE_ERROR)))
6911 {
6912 eoinfo->failed = TRUE;
6913 return FALSE;
6914 }
c152c796
AM
6915 }
6916 }
6917
6918 /* We should also warn if a forced local symbol is referenced from
6919 shared libraries. */
6920 if (! finfo->info->relocatable
6921 && (! finfo->info->shared)
f5385ebf
AM
6922 && h->forced_local
6923 && h->ref_dynamic
6924 && !h->dynamic_def
6925 && !h->dynamic_weak
c152c796
AM
6926 && ! elf_link_check_versioned_symbol (finfo->info, bed, h))
6927 {
6928 (*_bfd_error_handler)
d003868e 6929 (_("%B: %s symbol `%s' in %B is referenced by DSO"),
cfca085c
L
6930 finfo->output_bfd,
6931 h->root.u.def.section == bfd_abs_section_ptr
6932 ? finfo->output_bfd : h->root.u.def.section->owner,
c152c796
AM
6933 ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
6934 ? "internal"
6935 : ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
d003868e
AM
6936 ? "hidden" : "local",
6937 h->root.root.string);
c152c796
AM
6938 eoinfo->failed = TRUE;
6939 return FALSE;
6940 }
6941
6942 /* We don't want to output symbols that have never been mentioned by
6943 a regular file, or that we have been told to strip. However, if
6944 h->indx is set to -2, the symbol is used by a reloc and we must
6945 output it. */
6946 if (h->indx == -2)
6947 strip = FALSE;
f5385ebf 6948 else if ((h->def_dynamic
77cfaee6
AM
6949 || h->ref_dynamic
6950 || h->root.type == bfd_link_hash_new)
f5385ebf
AM
6951 && !h->def_regular
6952 && !h->ref_regular)
c152c796
AM
6953 strip = TRUE;
6954 else if (finfo->info->strip == strip_all)
6955 strip = TRUE;
6956 else if (finfo->info->strip == strip_some
6957 && bfd_hash_lookup (finfo->info->keep_hash,
6958 h->root.root.string, FALSE, FALSE) == NULL)
6959 strip = TRUE;
6960 else if (finfo->info->strip_discarded
6961 && (h->root.type == bfd_link_hash_defined
6962 || h->root.type == bfd_link_hash_defweak)
6963 && elf_discarded_section (h->root.u.def.section))
6964 strip = TRUE;
6965 else
6966 strip = FALSE;
6967
6968 /* If we're stripping it, and it's not a dynamic symbol, there's
6969 nothing else to do unless it is a forced local symbol. */
6970 if (strip
6971 && h->dynindx == -1
f5385ebf 6972 && !h->forced_local)
c152c796
AM
6973 return TRUE;
6974
6975 sym.st_value = 0;
6976 sym.st_size = h->size;
6977 sym.st_other = h->other;
f5385ebf 6978 if (h->forced_local)
c152c796
AM
6979 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
6980 else if (h->root.type == bfd_link_hash_undefweak
6981 || h->root.type == bfd_link_hash_defweak)
6982 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
6983 else
6984 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
6985
6986 switch (h->root.type)
6987 {
6988 default:
6989 case bfd_link_hash_new:
6990 case bfd_link_hash_warning:
6991 abort ();
6992 return FALSE;
6993
6994 case bfd_link_hash_undefined:
6995 case bfd_link_hash_undefweak:
6996 input_sec = bfd_und_section_ptr;
6997 sym.st_shndx = SHN_UNDEF;
6998 break;
6999
7000 case bfd_link_hash_defined:
7001 case bfd_link_hash_defweak:
7002 {
7003 input_sec = h->root.u.def.section;
7004 if (input_sec->output_section != NULL)
7005 {
7006 sym.st_shndx =
7007 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
7008 input_sec->output_section);
7009 if (sym.st_shndx == SHN_BAD)
7010 {
7011 (*_bfd_error_handler)
d003868e
AM
7012 (_("%B: could not find output section %A for input section %A"),
7013 finfo->output_bfd, input_sec->output_section, input_sec);
c152c796
AM
7014 eoinfo->failed = TRUE;
7015 return FALSE;
7016 }
7017
7018 /* ELF symbols in relocatable files are section relative,
7019 but in nonrelocatable files they are virtual
7020 addresses. */
7021 sym.st_value = h->root.u.def.value + input_sec->output_offset;
7022 if (! finfo->info->relocatable)
7023 {
7024 sym.st_value += input_sec->output_section->vma;
7025 if (h->type == STT_TLS)
7026 {
7027 /* STT_TLS symbols are relative to PT_TLS segment
7028 base. */
7029 BFD_ASSERT (elf_hash_table (finfo->info)->tls_sec != NULL);
7030 sym.st_value -= elf_hash_table (finfo->info)->tls_sec->vma;
7031 }
7032 }
7033 }
7034 else
7035 {
7036 BFD_ASSERT (input_sec->owner == NULL
7037 || (input_sec->owner->flags & DYNAMIC) != 0);
7038 sym.st_shndx = SHN_UNDEF;
7039 input_sec = bfd_und_section_ptr;
7040 }
7041 }
7042 break;
7043
7044 case bfd_link_hash_common:
7045 input_sec = h->root.u.c.p->section;
a4d8e49b 7046 sym.st_shndx = bed->common_section_index (input_sec);
c152c796
AM
7047 sym.st_value = 1 << h->root.u.c.p->alignment_power;
7048 break;
7049
7050 case bfd_link_hash_indirect:
7051 /* These symbols are created by symbol versioning. They point
7052 to the decorated version of the name. For example, if the
7053 symbol foo@@GNU_1.2 is the default, which should be used when
7054 foo is used with no version, then we add an indirect symbol
7055 foo which points to foo@@GNU_1.2. We ignore these symbols,
7056 since the indirected symbol is already in the hash table. */
7057 return TRUE;
7058 }
7059
7060 /* Give the processor backend a chance to tweak the symbol value,
7061 and also to finish up anything that needs to be done for this
7062 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
7063 forced local syms when non-shared is due to a historical quirk. */
7064 if ((h->dynindx != -1
f5385ebf 7065 || h->forced_local)
c152c796
AM
7066 && ((finfo->info->shared
7067 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
7068 || h->root.type != bfd_link_hash_undefweak))
f5385ebf 7069 || !h->forced_local)
c152c796
AM
7070 && elf_hash_table (finfo->info)->dynamic_sections_created)
7071 {
7072 if (! ((*bed->elf_backend_finish_dynamic_symbol)
7073 (finfo->output_bfd, finfo->info, h, &sym)))
7074 {
7075 eoinfo->failed = TRUE;
7076 return FALSE;
7077 }
7078 }
7079
7080 /* If we are marking the symbol as undefined, and there are no
7081 non-weak references to this symbol from a regular object, then
7082 mark the symbol as weak undefined; if there are non-weak
7083 references, mark the symbol as strong. We can't do this earlier,
7084 because it might not be marked as undefined until the
7085 finish_dynamic_symbol routine gets through with it. */
7086 if (sym.st_shndx == SHN_UNDEF
f5385ebf 7087 && h->ref_regular
c152c796
AM
7088 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
7089 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
7090 {
7091 int bindtype;
7092
f5385ebf 7093 if (h->ref_regular_nonweak)
c152c796
AM
7094 bindtype = STB_GLOBAL;
7095 else
7096 bindtype = STB_WEAK;
7097 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
7098 }
7099
7100 /* If a non-weak symbol with non-default visibility is not defined
7101 locally, it is a fatal error. */
7102 if (! finfo->info->relocatable
7103 && ELF_ST_VISIBILITY (sym.st_other) != STV_DEFAULT
7104 && ELF_ST_BIND (sym.st_info) != STB_WEAK
7105 && h->root.type == bfd_link_hash_undefined
f5385ebf 7106 && !h->def_regular)
c152c796
AM
7107 {
7108 (*_bfd_error_handler)
d003868e
AM
7109 (_("%B: %s symbol `%s' isn't defined"),
7110 finfo->output_bfd,
7111 ELF_ST_VISIBILITY (sym.st_other) == STV_PROTECTED
7112 ? "protected"
7113 : ELF_ST_VISIBILITY (sym.st_other) == STV_INTERNAL
7114 ? "internal" : "hidden",
7115 h->root.root.string);
c152c796
AM
7116 eoinfo->failed = TRUE;
7117 return FALSE;
7118 }
7119
7120 /* If this symbol should be put in the .dynsym section, then put it
7121 there now. We already know the symbol index. We also fill in
7122 the entry in the .hash section. */
7123 if (h->dynindx != -1
7124 && elf_hash_table (finfo->info)->dynamic_sections_created)
7125 {
c152c796
AM
7126 bfd_byte *esym;
7127
7128 sym.st_name = h->dynstr_index;
7129 esym = finfo->dynsym_sec->contents + h->dynindx * bed->s->sizeof_sym;
c0d5a53d
L
7130 if (! check_dynsym (finfo->output_bfd, &sym))
7131 {
7132 eoinfo->failed = TRUE;
7133 return FALSE;
7134 }
c152c796
AM
7135 bed->s->swap_symbol_out (finfo->output_bfd, &sym, esym, 0);
7136
fdc90cb4
JJ
7137 if (finfo->hash_sec != NULL)
7138 {
7139 size_t hash_entry_size;
7140 bfd_byte *bucketpos;
7141 bfd_vma chain;
41198d0c
L
7142 size_t bucketcount;
7143 size_t bucket;
7144
7145 bucketcount = elf_hash_table (finfo->info)->bucketcount;
7146 bucket = h->u.elf_hash_value % bucketcount;
fdc90cb4
JJ
7147
7148 hash_entry_size
7149 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
7150 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
7151 + (bucket + 2) * hash_entry_size);
7152 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
7153 bfd_put (8 * hash_entry_size, finfo->output_bfd, h->dynindx, bucketpos);
7154 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
7155 ((bfd_byte *) finfo->hash_sec->contents
7156 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
7157 }
c152c796
AM
7158
7159 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
7160 {
7161 Elf_Internal_Versym iversym;
7162 Elf_External_Versym *eversym;
7163
f5385ebf 7164 if (!h->def_regular)
c152c796
AM
7165 {
7166 if (h->verinfo.verdef == NULL)
7167 iversym.vs_vers = 0;
7168 else
7169 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
7170 }
7171 else
7172 {
7173 if (h->verinfo.vertree == NULL)
7174 iversym.vs_vers = 1;
7175 else
7176 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
3e3b46e5
PB
7177 if (finfo->info->create_default_symver)
7178 iversym.vs_vers++;
c152c796
AM
7179 }
7180
f5385ebf 7181 if (h->hidden)
c152c796
AM
7182 iversym.vs_vers |= VERSYM_HIDDEN;
7183
7184 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
7185 eversym += h->dynindx;
7186 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
7187 }
7188 }
7189
7190 /* If we're stripping it, then it was just a dynamic symbol, and
7191 there's nothing else to do. */
7192 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
7193 return TRUE;
7194
7195 h->indx = bfd_get_symcount (finfo->output_bfd);
7196
7197 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec, h))
7198 {
7199 eoinfo->failed = TRUE;
7200 return FALSE;
7201 }
7202
7203 return TRUE;
7204}
7205
cdd3575c
AM
7206/* Return TRUE if special handling is done for relocs in SEC against
7207 symbols defined in discarded sections. */
7208
c152c796
AM
7209static bfd_boolean
7210elf_section_ignore_discarded_relocs (asection *sec)
7211{
7212 const struct elf_backend_data *bed;
7213
cdd3575c
AM
7214 switch (sec->sec_info_type)
7215 {
7216 case ELF_INFO_TYPE_STABS:
7217 case ELF_INFO_TYPE_EH_FRAME:
7218 return TRUE;
7219 default:
7220 break;
7221 }
c152c796
AM
7222
7223 bed = get_elf_backend_data (sec->owner);
7224 if (bed->elf_backend_ignore_discarded_relocs != NULL
7225 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
7226 return TRUE;
7227
7228 return FALSE;
7229}
7230
9e66c942
AM
7231/* Return a mask saying how ld should treat relocations in SEC against
7232 symbols defined in discarded sections. If this function returns
7233 COMPLAIN set, ld will issue a warning message. If this function
7234 returns PRETEND set, and the discarded section was link-once and the
7235 same size as the kept link-once section, ld will pretend that the
7236 symbol was actually defined in the kept section. Otherwise ld will
7237 zero the reloc (at least that is the intent, but some cooperation by
7238 the target dependent code is needed, particularly for REL targets). */
7239
8a696751
AM
7240unsigned int
7241_bfd_elf_default_action_discarded (asection *sec)
cdd3575c 7242{
9e66c942 7243 if (sec->flags & SEC_DEBUGGING)
69d54b1b 7244 return PRETEND;
cdd3575c
AM
7245
7246 if (strcmp (".eh_frame", sec->name) == 0)
9e66c942 7247 return 0;
cdd3575c
AM
7248
7249 if (strcmp (".gcc_except_table", sec->name) == 0)
9e66c942 7250 return 0;
cdd3575c 7251
9e66c942 7252 return COMPLAIN | PRETEND;
cdd3575c
AM
7253}
7254
3d7f7666
L
7255/* Find a match between a section and a member of a section group. */
7256
7257static asection *
c0f00686
L
7258match_group_member (asection *sec, asection *group,
7259 struct bfd_link_info *info)
3d7f7666
L
7260{
7261 asection *first = elf_next_in_group (group);
7262 asection *s = first;
7263
7264 while (s != NULL)
7265 {
c0f00686 7266 if (bfd_elf_match_symbols_in_sections (s, sec, info))
3d7f7666
L
7267 return s;
7268
83180ade 7269 s = elf_next_in_group (s);
3d7f7666
L
7270 if (s == first)
7271 break;
7272 }
7273
7274 return NULL;
7275}
7276
01b3c8ab 7277/* Check if the kept section of a discarded section SEC can be used
c2370991
AM
7278 to replace it. Return the replacement if it is OK. Otherwise return
7279 NULL. */
01b3c8ab
L
7280
7281asection *
c0f00686 7282_bfd_elf_check_kept_section (asection *sec, struct bfd_link_info *info)
01b3c8ab
L
7283{
7284 asection *kept;
7285
7286 kept = sec->kept_section;
7287 if (kept != NULL)
7288 {
c2370991 7289 if ((kept->flags & SEC_GROUP) != 0)
c0f00686 7290 kept = match_group_member (sec, kept, info);
01b3c8ab
L
7291 if (kept != NULL && sec->size != kept->size)
7292 kept = NULL;
c2370991 7293 sec->kept_section = kept;
01b3c8ab
L
7294 }
7295 return kept;
7296}
7297
c152c796
AM
7298/* Link an input file into the linker output file. This function
7299 handles all the sections and relocations of the input file at once.
7300 This is so that we only have to read the local symbols once, and
7301 don't have to keep them in memory. */
7302
7303static bfd_boolean
7304elf_link_input_bfd (struct elf_final_link_info *finfo, bfd *input_bfd)
7305{
7306 bfd_boolean (*relocate_section)
7307 (bfd *, struct bfd_link_info *, bfd *, asection *, bfd_byte *,
7308 Elf_Internal_Rela *, Elf_Internal_Sym *, asection **);
7309 bfd *output_bfd;
7310 Elf_Internal_Shdr *symtab_hdr;
7311 size_t locsymcount;
7312 size_t extsymoff;
7313 Elf_Internal_Sym *isymbuf;
7314 Elf_Internal_Sym *isym;
7315 Elf_Internal_Sym *isymend;
7316 long *pindex;
7317 asection **ppsection;
7318 asection *o;
7319 const struct elf_backend_data *bed;
7320 bfd_boolean emit_relocs;
7321 struct elf_link_hash_entry **sym_hashes;
7322
7323 output_bfd = finfo->output_bfd;
7324 bed = get_elf_backend_data (output_bfd);
7325 relocate_section = bed->elf_backend_relocate_section;
7326
7327 /* If this is a dynamic object, we don't want to do anything here:
7328 we don't want the local symbols, and we don't want the section
7329 contents. */
7330 if ((input_bfd->flags & DYNAMIC) != 0)
7331 return TRUE;
7332
7333 emit_relocs = (finfo->info->relocatable
eac338cf 7334 || finfo->info->emitrelocations);
c152c796
AM
7335
7336 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7337 if (elf_bad_symtab (input_bfd))
7338 {
7339 locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
7340 extsymoff = 0;
7341 }
7342 else
7343 {
7344 locsymcount = symtab_hdr->sh_info;
7345 extsymoff = symtab_hdr->sh_info;
7346 }
7347
7348 /* Read the local symbols. */
7349 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
7350 if (isymbuf == NULL && locsymcount != 0)
7351 {
7352 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
7353 finfo->internal_syms,
7354 finfo->external_syms,
7355 finfo->locsym_shndx);
7356 if (isymbuf == NULL)
7357 return FALSE;
7358 }
7359
7360 /* Find local symbol sections and adjust values of symbols in
7361 SEC_MERGE sections. Write out those local symbols we know are
7362 going into the output file. */
7363 isymend = isymbuf + locsymcount;
7364 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
7365 isym < isymend;
7366 isym++, pindex++, ppsection++)
7367 {
7368 asection *isec;
7369 const char *name;
7370 Elf_Internal_Sym osym;
7371
7372 *pindex = -1;
7373
7374 if (elf_bad_symtab (input_bfd))
7375 {
7376 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
7377 {
7378 *ppsection = NULL;
7379 continue;
7380 }
7381 }
7382
7383 if (isym->st_shndx == SHN_UNDEF)
7384 isec = bfd_und_section_ptr;
7385 else if (isym->st_shndx < SHN_LORESERVE
7386 || isym->st_shndx > SHN_HIRESERVE)
7387 {
7388 isec = bfd_section_from_elf_index (input_bfd, isym->st_shndx);
7389 if (isec
7390 && isec->sec_info_type == ELF_INFO_TYPE_MERGE
7391 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
7392 isym->st_value =
7393 _bfd_merged_section_offset (output_bfd, &isec,
7394 elf_section_data (isec)->sec_info,
753731ee 7395 isym->st_value);
c152c796
AM
7396 }
7397 else if (isym->st_shndx == SHN_ABS)
7398 isec = bfd_abs_section_ptr;
7399 else if (isym->st_shndx == SHN_COMMON)
7400 isec = bfd_com_section_ptr;
7401 else
7402 {
f02571c5
AM
7403 /* Don't attempt to output symbols with st_shnx in the
7404 reserved range other than SHN_ABS and SHN_COMMON. */
7405 *ppsection = NULL;
7406 continue;
c152c796
AM
7407 }
7408
7409 *ppsection = isec;
7410
7411 /* Don't output the first, undefined, symbol. */
7412 if (ppsection == finfo->sections)
7413 continue;
7414
7415 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
7416 {
7417 /* We never output section symbols. Instead, we use the
7418 section symbol of the corresponding section in the output
7419 file. */
7420 continue;
7421 }
7422
7423 /* If we are stripping all symbols, we don't want to output this
7424 one. */
7425 if (finfo->info->strip == strip_all)
7426 continue;
7427
7428 /* If we are discarding all local symbols, we don't want to
7429 output this one. If we are generating a relocatable output
7430 file, then some of the local symbols may be required by
7431 relocs; we output them below as we discover that they are
7432 needed. */
7433 if (finfo->info->discard == discard_all)
7434 continue;
7435
7436 /* If this symbol is defined in a section which we are
f02571c5
AM
7437 discarding, we don't need to keep it. */
7438 if (isym->st_shndx != SHN_UNDEF
7439 && (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
ccf5f610 7440 && (isec == NULL
f02571c5
AM
7441 || bfd_section_removed_from_list (output_bfd,
7442 isec->output_section)))
e75a280b
L
7443 continue;
7444
c152c796
AM
7445 /* Get the name of the symbol. */
7446 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
7447 isym->st_name);
7448 if (name == NULL)
7449 return FALSE;
7450
7451 /* See if we are discarding symbols with this name. */
7452 if ((finfo->info->strip == strip_some
7453 && (bfd_hash_lookup (finfo->info->keep_hash, name, FALSE, FALSE)
7454 == NULL))
7455 || (((finfo->info->discard == discard_sec_merge
7456 && (isec->flags & SEC_MERGE) && ! finfo->info->relocatable)
7457 || finfo->info->discard == discard_l)
7458 && bfd_is_local_label_name (input_bfd, name)))
7459 continue;
7460
7461 /* If we get here, we are going to output this symbol. */
7462
7463 osym = *isym;
7464
7465 /* Adjust the section index for the output file. */
7466 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
7467 isec->output_section);
7468 if (osym.st_shndx == SHN_BAD)
7469 return FALSE;
7470
7471 *pindex = bfd_get_symcount (output_bfd);
7472
7473 /* ELF symbols in relocatable files are section relative, but
7474 in executable files they are virtual addresses. Note that
7475 this code assumes that all ELF sections have an associated
7476 BFD section with a reasonable value for output_offset; below
7477 we assume that they also have a reasonable value for
7478 output_section. Any special sections must be set up to meet
7479 these requirements. */
7480 osym.st_value += isec->output_offset;
7481 if (! finfo->info->relocatable)
7482 {
7483 osym.st_value += isec->output_section->vma;
7484 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
7485 {
7486 /* STT_TLS symbols are relative to PT_TLS segment base. */
7487 BFD_ASSERT (elf_hash_table (finfo->info)->tls_sec != NULL);
7488 osym.st_value -= elf_hash_table (finfo->info)->tls_sec->vma;
7489 }
7490 }
7491
7492 if (! elf_link_output_sym (finfo, name, &osym, isec, NULL))
7493 return FALSE;
7494 }
7495
7496 /* Relocate the contents of each section. */
7497 sym_hashes = elf_sym_hashes (input_bfd);
7498 for (o = input_bfd->sections; o != NULL; o = o->next)
7499 {
7500 bfd_byte *contents;
7501
7502 if (! o->linker_mark)
7503 {
7504 /* This section was omitted from the link. */
7505 continue;
7506 }
7507
7508 if ((o->flags & SEC_HAS_CONTENTS) == 0
eea6121a 7509 || (o->size == 0 && (o->flags & SEC_RELOC) == 0))
c152c796
AM
7510 continue;
7511
7512 if ((o->flags & SEC_LINKER_CREATED) != 0)
7513 {
7514 /* Section was created by _bfd_elf_link_create_dynamic_sections
7515 or somesuch. */
7516 continue;
7517 }
7518
7519 /* Get the contents of the section. They have been cached by a
7520 relaxation routine. Note that o is a section in an input
7521 file, so the contents field will not have been set by any of
7522 the routines which work on output files. */
7523 if (elf_section_data (o)->this_hdr.contents != NULL)
7524 contents = elf_section_data (o)->this_hdr.contents;
7525 else
7526 {
eea6121a
AM
7527 bfd_size_type amt = o->rawsize ? o->rawsize : o->size;
7528
c152c796 7529 contents = finfo->contents;
eea6121a 7530 if (! bfd_get_section_contents (input_bfd, o, contents, 0, amt))
c152c796
AM
7531 return FALSE;
7532 }
7533
7534 if ((o->flags & SEC_RELOC) != 0)
7535 {
7536 Elf_Internal_Rela *internal_relocs;
7537 bfd_vma r_type_mask;
7538 int r_sym_shift;
7539
7540 /* Get the swapped relocs. */
7541 internal_relocs
7542 = _bfd_elf_link_read_relocs (input_bfd, o, finfo->external_relocs,
7543 finfo->internal_relocs, FALSE);
7544 if (internal_relocs == NULL
7545 && o->reloc_count > 0)
7546 return FALSE;
7547
7548 if (bed->s->arch_size == 32)
7549 {
7550 r_type_mask = 0xff;
7551 r_sym_shift = 8;
7552 }
7553 else
7554 {
7555 r_type_mask = 0xffffffff;
7556 r_sym_shift = 32;
7557 }
7558
7559 /* Run through the relocs looking for any against symbols
7560 from discarded sections and section symbols from
7561 removed link-once sections. Complain about relocs
7562 against discarded sections. Zero relocs against removed
e0ae6d6f 7563 link-once sections. */
c152c796
AM
7564 if (!elf_section_ignore_discarded_relocs (o))
7565 {
7566 Elf_Internal_Rela *rel, *relend;
8a696751 7567 unsigned int action = (*bed->action_discarded) (o);
c152c796
AM
7568
7569 rel = internal_relocs;
7570 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
7571 for ( ; rel < relend; rel++)
7572 {
7573 unsigned long r_symndx = rel->r_info >> r_sym_shift;
cdd3575c
AM
7574 asection **ps, *sec;
7575 struct elf_link_hash_entry *h = NULL;
7576 const char *sym_name;
c152c796 7577
ee75fd95
AM
7578 if (r_symndx == STN_UNDEF)
7579 continue;
7580
c152c796
AM
7581 if (r_symndx >= locsymcount
7582 || (elf_bad_symtab (input_bfd)
7583 && finfo->sections[r_symndx] == NULL))
7584 {
c152c796 7585 h = sym_hashes[r_symndx - extsymoff];
dce669a1 7586
8c19749a
NC
7587 /* Badly formatted input files can contain relocs that
7588 reference non-existant symbols. Check here so that
7589 we do not seg fault. */
7590 if (h == NULL)
7591 {
7592 char buffer [32];
7593
7594 sprintf_vma (buffer, rel->r_info);
7595 (*_bfd_error_handler)
7596 (_("error: %B contains a reloc (0x%s) for section %A "
7597 "that references a non-existent global symbol"),
7598 input_bfd, o, buffer);
7599 bfd_set_error (bfd_error_bad_value);
7600 return FALSE;
7601 }
3b36f7e6 7602
c152c796
AM
7603 while (h->root.type == bfd_link_hash_indirect
7604 || h->root.type == bfd_link_hash_warning)
7605 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7606
cdd3575c
AM
7607 if (h->root.type != bfd_link_hash_defined
7608 && h->root.type != bfd_link_hash_defweak)
7609 continue;
7610
7611 ps = &h->root.u.def.section;
7612 sym_name = h->root.root.string;
c152c796
AM
7613 }
7614 else
7615 {
cdd3575c
AM
7616 Elf_Internal_Sym *sym = isymbuf + r_symndx;
7617 ps = &finfo->sections[r_symndx];
26c61ae5
L
7618 sym_name = bfd_elf_sym_name (input_bfd,
7619 symtab_hdr,
7620 sym, *ps);
cdd3575c 7621 }
c152c796 7622
cdd3575c
AM
7623 /* Complain if the definition comes from a
7624 discarded section. */
7625 if ((sec = *ps) != NULL && elf_discarded_section (sec))
7626 {
87e5235d 7627 BFD_ASSERT (r_symndx != 0);
9e66c942 7628 if (action & COMPLAIN)
e1fffbe6
AM
7629 (*finfo->info->callbacks->einfo)
7630 (_("%X`%s' referenced in section `%A' of %B: "
58ac56d0 7631 "defined in discarded section `%A' of %B\n"),
e1fffbe6 7632 sym_name, o, input_bfd, sec, sec->owner);
cdd3575c 7633
87e5235d 7634 /* Try to do the best we can to support buggy old
e0ae6d6f 7635 versions of gcc. Pretend that the symbol is
87e5235d
AM
7636 really defined in the kept linkonce section.
7637 FIXME: This is quite broken. Modifying the
7638 symbol here means we will be changing all later
e0ae6d6f 7639 uses of the symbol, not just in this section. */
01b3c8ab 7640 if (action & PRETEND)
87e5235d 7641 {
01b3c8ab
L
7642 asection *kept;
7643
c0f00686
L
7644 kept = _bfd_elf_check_kept_section (sec,
7645 finfo->info);
01b3c8ab 7646 if (kept != NULL)
87e5235d
AM
7647 {
7648 *ps = kept;
7649 continue;
7650 }
7651 }
7652
cdd3575c
AM
7653 /* Remove the symbol reference from the reloc, but
7654 don't kill the reloc completely. This is so that
7655 a zero value will be written into the section,
7656 which may have non-zero contents put there by the
7657 assembler. Zero in things like an eh_frame fde
7658 pc_begin allows stack unwinders to recognize the
7659 fde as bogus. */
7660 rel->r_info &= r_type_mask;
7661 rel->r_addend = 0;
c152c796
AM
7662 }
7663 }
7664 }
7665
7666 /* Relocate the section by invoking a back end routine.
7667
7668 The back end routine is responsible for adjusting the
7669 section contents as necessary, and (if using Rela relocs
7670 and generating a relocatable output file) adjusting the
7671 reloc addend as necessary.
7672
7673 The back end routine does not have to worry about setting
7674 the reloc address or the reloc symbol index.
7675
7676 The back end routine is given a pointer to the swapped in
7677 internal symbols, and can access the hash table entries
7678 for the external symbols via elf_sym_hashes (input_bfd).
7679
7680 When generating relocatable output, the back end routine
7681 must handle STB_LOCAL/STT_SECTION symbols specially. The
7682 output symbol is going to be a section symbol
7683 corresponding to the output section, which will require
7684 the addend to be adjusted. */
7685
7686 if (! (*relocate_section) (output_bfd, finfo->info,
7687 input_bfd, o, contents,
7688 internal_relocs,
7689 isymbuf,
7690 finfo->sections))
7691 return FALSE;
7692
7693 if (emit_relocs)
7694 {
7695 Elf_Internal_Rela *irela;
7696 Elf_Internal_Rela *irelaend;
7697 bfd_vma last_offset;
7698 struct elf_link_hash_entry **rel_hash;
eac338cf 7699 struct elf_link_hash_entry **rel_hash_list;
c152c796
AM
7700 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
7701 unsigned int next_erel;
c152c796
AM
7702 bfd_boolean rela_normal;
7703
7704 input_rel_hdr = &elf_section_data (o)->rel_hdr;
7705 rela_normal = (bed->rela_normal
7706 && (input_rel_hdr->sh_entsize
7707 == bed->s->sizeof_rela));
7708
7709 /* Adjust the reloc addresses and symbol indices. */
7710
7711 irela = internal_relocs;
7712 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
7713 rel_hash = (elf_section_data (o->output_section)->rel_hashes
7714 + elf_section_data (o->output_section)->rel_count
7715 + elf_section_data (o->output_section)->rel_count2);
eac338cf 7716 rel_hash_list = rel_hash;
c152c796
AM
7717 last_offset = o->output_offset;
7718 if (!finfo->info->relocatable)
7719 last_offset += o->output_section->vma;
7720 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
7721 {
7722 unsigned long r_symndx;
7723 asection *sec;
7724 Elf_Internal_Sym sym;
7725
7726 if (next_erel == bed->s->int_rels_per_ext_rel)
7727 {
7728 rel_hash++;
7729 next_erel = 0;
7730 }
7731
7732 irela->r_offset = _bfd_elf_section_offset (output_bfd,
7733 finfo->info, o,
7734 irela->r_offset);
7735 if (irela->r_offset >= (bfd_vma) -2)
7736 {
7737 /* This is a reloc for a deleted entry or somesuch.
7738 Turn it into an R_*_NONE reloc, at the same
7739 offset as the last reloc. elf_eh_frame.c and
e460dd0d 7740 bfd_elf_discard_info rely on reloc offsets
c152c796
AM
7741 being ordered. */
7742 irela->r_offset = last_offset;
7743 irela->r_info = 0;
7744 irela->r_addend = 0;
7745 continue;
7746 }
7747
7748 irela->r_offset += o->output_offset;
7749
7750 /* Relocs in an executable have to be virtual addresses. */
7751 if (!finfo->info->relocatable)
7752 irela->r_offset += o->output_section->vma;
7753
7754 last_offset = irela->r_offset;
7755
7756 r_symndx = irela->r_info >> r_sym_shift;
7757 if (r_symndx == STN_UNDEF)
7758 continue;
7759
7760 if (r_symndx >= locsymcount
7761 || (elf_bad_symtab (input_bfd)
7762 && finfo->sections[r_symndx] == NULL))
7763 {
7764 struct elf_link_hash_entry *rh;
7765 unsigned long indx;
7766
7767 /* This is a reloc against a global symbol. We
7768 have not yet output all the local symbols, so
7769 we do not know the symbol index of any global
7770 symbol. We set the rel_hash entry for this
7771 reloc to point to the global hash table entry
7772 for this symbol. The symbol index is then
ee75fd95 7773 set at the end of bfd_elf_final_link. */
c152c796
AM
7774 indx = r_symndx - extsymoff;
7775 rh = elf_sym_hashes (input_bfd)[indx];
7776 while (rh->root.type == bfd_link_hash_indirect
7777 || rh->root.type == bfd_link_hash_warning)
7778 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
7779
7780 /* Setting the index to -2 tells
7781 elf_link_output_extsym that this symbol is
7782 used by a reloc. */
7783 BFD_ASSERT (rh->indx < 0);
7784 rh->indx = -2;
7785
7786 *rel_hash = rh;
7787
7788 continue;
7789 }
7790
7791 /* This is a reloc against a local symbol. */
7792
7793 *rel_hash = NULL;
7794 sym = isymbuf[r_symndx];
7795 sec = finfo->sections[r_symndx];
7796 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
7797 {
7798 /* I suppose the backend ought to fill in the
7799 section of any STT_SECTION symbol against a
6a8d1586
AM
7800 processor specific section. */
7801 r_symndx = 0;
7802 if (bfd_is_abs_section (sec))
7803 ;
c152c796
AM
7804 else if (sec == NULL || sec->owner == NULL)
7805 {
7806 bfd_set_error (bfd_error_bad_value);
7807 return FALSE;
7808 }
7809 else
7810 {
6a8d1586
AM
7811 asection *osec = sec->output_section;
7812
7813 /* If we have discarded a section, the output
7814 section will be the absolute section. In
7815 case of discarded link-once and discarded
7816 SEC_MERGE sections, use the kept section. */
7817 if (bfd_is_abs_section (osec)
7818 && sec->kept_section != NULL
7819 && sec->kept_section->output_section != NULL)
7820 {
7821 osec = sec->kept_section->output_section;
7822 irela->r_addend -= osec->vma;
7823 }
7824
7825 if (!bfd_is_abs_section (osec))
7826 {
7827 r_symndx = osec->target_index;
74541ad4
AM
7828 if (r_symndx == 0)
7829 {
7830 struct elf_link_hash_table *htab;
7831 asection *oi;
7832
7833 htab = elf_hash_table (finfo->info);
7834 oi = htab->text_index_section;
7835 if ((osec->flags & SEC_READONLY) == 0
7836 && htab->data_index_section != NULL)
7837 oi = htab->data_index_section;
7838
7839 if (oi != NULL)
7840 {
7841 irela->r_addend += osec->vma - oi->vma;
7842 r_symndx = oi->target_index;
7843 }
7844 }
7845
6a8d1586
AM
7846 BFD_ASSERT (r_symndx != 0);
7847 }
c152c796
AM
7848 }
7849
7850 /* Adjust the addend according to where the
7851 section winds up in the output section. */
7852 if (rela_normal)
7853 irela->r_addend += sec->output_offset;
7854 }
7855 else
7856 {
7857 if (finfo->indices[r_symndx] == -1)
7858 {
7859 unsigned long shlink;
7860 const char *name;
7861 asection *osec;
7862
7863 if (finfo->info->strip == strip_all)
7864 {
7865 /* You can't do ld -r -s. */
7866 bfd_set_error (bfd_error_invalid_operation);
7867 return FALSE;
7868 }
7869
7870 /* This symbol was skipped earlier, but
7871 since it is needed by a reloc, we
7872 must output it now. */
7873 shlink = symtab_hdr->sh_link;
7874 name = (bfd_elf_string_from_elf_section
7875 (input_bfd, shlink, sym.st_name));
7876 if (name == NULL)
7877 return FALSE;
7878
7879 osec = sec->output_section;
7880 sym.st_shndx =
7881 _bfd_elf_section_from_bfd_section (output_bfd,
7882 osec);
7883 if (sym.st_shndx == SHN_BAD)
7884 return FALSE;
7885
7886 sym.st_value += sec->output_offset;
7887 if (! finfo->info->relocatable)
7888 {
7889 sym.st_value += osec->vma;
7890 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
7891 {
7892 /* STT_TLS symbols are relative to PT_TLS
7893 segment base. */
7894 BFD_ASSERT (elf_hash_table (finfo->info)
7895 ->tls_sec != NULL);
7896 sym.st_value -= (elf_hash_table (finfo->info)
7897 ->tls_sec->vma);
7898 }
7899 }
7900
7901 finfo->indices[r_symndx]
7902 = bfd_get_symcount (output_bfd);
7903
7904 if (! elf_link_output_sym (finfo, name, &sym, sec,
7905 NULL))
7906 return FALSE;
7907 }
7908
7909 r_symndx = finfo->indices[r_symndx];
7910 }
7911
7912 irela->r_info = ((bfd_vma) r_symndx << r_sym_shift
7913 | (irela->r_info & r_type_mask));
7914 }
7915
7916 /* Swap out the relocs. */
c152c796 7917 if (input_rel_hdr->sh_size != 0
eac338cf
PB
7918 && !bed->elf_backend_emit_relocs (output_bfd, o,
7919 input_rel_hdr,
7920 internal_relocs,
7921 rel_hash_list))
c152c796
AM
7922 return FALSE;
7923
7924 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
7925 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
7926 {
7927 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
7928 * bed->s->int_rels_per_ext_rel);
eac338cf
PB
7929 rel_hash_list += NUM_SHDR_ENTRIES (input_rel_hdr);
7930 if (!bed->elf_backend_emit_relocs (output_bfd, o,
7931 input_rel_hdr2,
7932 internal_relocs,
7933 rel_hash_list))
c152c796
AM
7934 return FALSE;
7935 }
7936 }
7937 }
7938
7939 /* Write out the modified section contents. */
7940 if (bed->elf_backend_write_section
7941 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
7942 {
7943 /* Section written out. */
7944 }
7945 else switch (o->sec_info_type)
7946 {
7947 case ELF_INFO_TYPE_STABS:
7948 if (! (_bfd_write_section_stabs
7949 (output_bfd,
7950 &elf_hash_table (finfo->info)->stab_info,
7951 o, &elf_section_data (o)->sec_info, contents)))
7952 return FALSE;
7953 break;
7954 case ELF_INFO_TYPE_MERGE:
7955 if (! _bfd_write_merged_section (output_bfd, o,
7956 elf_section_data (o)->sec_info))
7957 return FALSE;
7958 break;
7959 case ELF_INFO_TYPE_EH_FRAME:
7960 {
7961 if (! _bfd_elf_write_section_eh_frame (output_bfd, finfo->info,
7962 o, contents))
7963 return FALSE;
7964 }
7965 break;
7966 default:
7967 {
c152c796
AM
7968 if (! (o->flags & SEC_EXCLUDE)
7969 && ! bfd_set_section_contents (output_bfd, o->output_section,
7970 contents,
7971 (file_ptr) o->output_offset,
eea6121a 7972 o->size))
c152c796
AM
7973 return FALSE;
7974 }
7975 break;
7976 }
7977 }
7978
7979 return TRUE;
7980}
7981
7982/* Generate a reloc when linking an ELF file. This is a reloc
3a800eb9 7983 requested by the linker, and does not come from any input file. This
c152c796
AM
7984 is used to build constructor and destructor tables when linking
7985 with -Ur. */
7986
7987static bfd_boolean
7988elf_reloc_link_order (bfd *output_bfd,
7989 struct bfd_link_info *info,
7990 asection *output_section,
7991 struct bfd_link_order *link_order)
7992{
7993 reloc_howto_type *howto;
7994 long indx;
7995 bfd_vma offset;
7996 bfd_vma addend;
7997 struct elf_link_hash_entry **rel_hash_ptr;
7998 Elf_Internal_Shdr *rel_hdr;
7999 const struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
8000 Elf_Internal_Rela irel[MAX_INT_RELS_PER_EXT_REL];
8001 bfd_byte *erel;
8002 unsigned int i;
8003
8004 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
8005 if (howto == NULL)
8006 {
8007 bfd_set_error (bfd_error_bad_value);
8008 return FALSE;
8009 }
8010
8011 addend = link_order->u.reloc.p->addend;
8012
8013 /* Figure out the symbol index. */
8014 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
8015 + elf_section_data (output_section)->rel_count
8016 + elf_section_data (output_section)->rel_count2);
8017 if (link_order->type == bfd_section_reloc_link_order)
8018 {
8019 indx = link_order->u.reloc.p->u.section->target_index;
8020 BFD_ASSERT (indx != 0);
8021 *rel_hash_ptr = NULL;
8022 }
8023 else
8024 {
8025 struct elf_link_hash_entry *h;
8026
8027 /* Treat a reloc against a defined symbol as though it were
8028 actually against the section. */
8029 h = ((struct elf_link_hash_entry *)
8030 bfd_wrapped_link_hash_lookup (output_bfd, info,
8031 link_order->u.reloc.p->u.name,
8032 FALSE, FALSE, TRUE));
8033 if (h != NULL
8034 && (h->root.type == bfd_link_hash_defined
8035 || h->root.type == bfd_link_hash_defweak))
8036 {
8037 asection *section;
8038
8039 section = h->root.u.def.section;
8040 indx = section->output_section->target_index;
8041 *rel_hash_ptr = NULL;
8042 /* It seems that we ought to add the symbol value to the
8043 addend here, but in practice it has already been added
8044 because it was passed to constructor_callback. */
8045 addend += section->output_section->vma + section->output_offset;
8046 }
8047 else if (h != NULL)
8048 {
8049 /* Setting the index to -2 tells elf_link_output_extsym that
8050 this symbol is used by a reloc. */
8051 h->indx = -2;
8052 *rel_hash_ptr = h;
8053 indx = 0;
8054 }
8055 else
8056 {
8057 if (! ((*info->callbacks->unattached_reloc)
8058 (info, link_order->u.reloc.p->u.name, NULL, NULL, 0)))
8059 return FALSE;
8060 indx = 0;
8061 }
8062 }
8063
8064 /* If this is an inplace reloc, we must write the addend into the
8065 object file. */
8066 if (howto->partial_inplace && addend != 0)
8067 {
8068 bfd_size_type size;
8069 bfd_reloc_status_type rstat;
8070 bfd_byte *buf;
8071 bfd_boolean ok;
8072 const char *sym_name;
8073
8074 size = bfd_get_reloc_size (howto);
8075 buf = bfd_zmalloc (size);
8076 if (buf == NULL)
8077 return FALSE;
8078 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
8079 switch (rstat)
8080 {
8081 case bfd_reloc_ok:
8082 break;
8083
8084 default:
8085 case bfd_reloc_outofrange:
8086 abort ();
8087
8088 case bfd_reloc_overflow:
8089 if (link_order->type == bfd_section_reloc_link_order)
8090 sym_name = bfd_section_name (output_bfd,
8091 link_order->u.reloc.p->u.section);
8092 else
8093 sym_name = link_order->u.reloc.p->u.name;
8094 if (! ((*info->callbacks->reloc_overflow)
dfeffb9f
L
8095 (info, NULL, sym_name, howto->name, addend, NULL,
8096 NULL, (bfd_vma) 0)))
c152c796
AM
8097 {
8098 free (buf);
8099 return FALSE;
8100 }
8101 break;
8102 }
8103 ok = bfd_set_section_contents (output_bfd, output_section, buf,
8104 link_order->offset, size);
8105 free (buf);
8106 if (! ok)
8107 return FALSE;
8108 }
8109
8110 /* The address of a reloc is relative to the section in a
8111 relocatable file, and is a virtual address in an executable
8112 file. */
8113 offset = link_order->offset;
8114 if (! info->relocatable)
8115 offset += output_section->vma;
8116
8117 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
8118 {
8119 irel[i].r_offset = offset;
8120 irel[i].r_info = 0;
8121 irel[i].r_addend = 0;
8122 }
8123 if (bed->s->arch_size == 32)
8124 irel[0].r_info = ELF32_R_INFO (indx, howto->type);
8125 else
8126 irel[0].r_info = ELF64_R_INFO (indx, howto->type);
8127
8128 rel_hdr = &elf_section_data (output_section)->rel_hdr;
8129 erel = rel_hdr->contents;
8130 if (rel_hdr->sh_type == SHT_REL)
8131 {
8132 erel += (elf_section_data (output_section)->rel_count
8133 * bed->s->sizeof_rel);
8134 (*bed->s->swap_reloc_out) (output_bfd, irel, erel);
8135 }
8136 else
8137 {
8138 irel[0].r_addend = addend;
8139 erel += (elf_section_data (output_section)->rel_count
8140 * bed->s->sizeof_rela);
8141 (*bed->s->swap_reloca_out) (output_bfd, irel, erel);
8142 }
8143
8144 ++elf_section_data (output_section)->rel_count;
8145
8146 return TRUE;
8147}
8148
0b52efa6
PB
8149
8150/* Get the output vma of the section pointed to by the sh_link field. */
8151
8152static bfd_vma
8153elf_get_linked_section_vma (struct bfd_link_order *p)
8154{
8155 Elf_Internal_Shdr **elf_shdrp;
8156 asection *s;
8157 int elfsec;
8158
8159 s = p->u.indirect.section;
8160 elf_shdrp = elf_elfsections (s->owner);
8161 elfsec = _bfd_elf_section_from_bfd_section (s->owner, s);
8162 elfsec = elf_shdrp[elfsec]->sh_link;
185d09ad
L
8163 /* PR 290:
8164 The Intel C compiler generates SHT_IA_64_UNWIND with
e04bcc6d 8165 SHF_LINK_ORDER. But it doesn't set the sh_link or
185d09ad
L
8166 sh_info fields. Hence we could get the situation
8167 where elfsec is 0. */
8168 if (elfsec == 0)
8169 {
8170 const struct elf_backend_data *bed
8171 = get_elf_backend_data (s->owner);
8172 if (bed->link_order_error_handler)
d003868e
AM
8173 bed->link_order_error_handler
8174 (_("%B: warning: sh_link not set for section `%A'"), s->owner, s);
185d09ad
L
8175 return 0;
8176 }
8177 else
8178 {
8179 s = elf_shdrp[elfsec]->bfd_section;
8180 return s->output_section->vma + s->output_offset;
8181 }
0b52efa6
PB
8182}
8183
8184
8185/* Compare two sections based on the locations of the sections they are
8186 linked to. Used by elf_fixup_link_order. */
8187
8188static int
8189compare_link_order (const void * a, const void * b)
8190{
8191 bfd_vma apos;
8192 bfd_vma bpos;
8193
8194 apos = elf_get_linked_section_vma (*(struct bfd_link_order **)a);
8195 bpos = elf_get_linked_section_vma (*(struct bfd_link_order **)b);
8196 if (apos < bpos)
8197 return -1;
8198 return apos > bpos;
8199}
8200
8201
8202/* Looks for sections with SHF_LINK_ORDER set. Rearranges them into the same
8203 order as their linked sections. Returns false if this could not be done
8204 because an output section includes both ordered and unordered
8205 sections. Ideally we'd do this in the linker proper. */
8206
8207static bfd_boolean
8208elf_fixup_link_order (bfd *abfd, asection *o)
8209{
8210 int seen_linkorder;
8211 int seen_other;
8212 int n;
8213 struct bfd_link_order *p;
8214 bfd *sub;
8215 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
b761a207 8216 unsigned elfsec;
0b52efa6 8217 struct bfd_link_order **sections;
d33cdfe3 8218 asection *s, *other_sec, *linkorder_sec;
0b52efa6 8219 bfd_vma offset;
3b36f7e6 8220
d33cdfe3
L
8221 other_sec = NULL;
8222 linkorder_sec = NULL;
0b52efa6
PB
8223 seen_other = 0;
8224 seen_linkorder = 0;
8423293d 8225 for (p = o->map_head.link_order; p != NULL; p = p->next)
0b52efa6 8226 {
d33cdfe3 8227 if (p->type == bfd_indirect_link_order)
0b52efa6
PB
8228 {
8229 s = p->u.indirect.section;
d33cdfe3
L
8230 sub = s->owner;
8231 if (bfd_get_flavour (sub) == bfd_target_elf_flavour
8232 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass
b761a207
BE
8233 && (elfsec = _bfd_elf_section_from_bfd_section (sub, s))
8234 && elfsec < elf_numsections (sub)
0b52efa6 8235 && elf_elfsections (sub)[elfsec]->sh_flags & SHF_LINK_ORDER)
d33cdfe3
L
8236 {
8237 seen_linkorder++;
8238 linkorder_sec = s;
8239 }
0b52efa6 8240 else
d33cdfe3
L
8241 {
8242 seen_other++;
8243 other_sec = s;
8244 }
0b52efa6
PB
8245 }
8246 else
8247 seen_other++;
d33cdfe3
L
8248
8249 if (seen_other && seen_linkorder)
8250 {
8251 if (other_sec && linkorder_sec)
8252 (*_bfd_error_handler) (_("%A has both ordered [`%A' in %B] and unordered [`%A' in %B] sections"),
8253 o, linkorder_sec,
8254 linkorder_sec->owner, other_sec,
8255 other_sec->owner);
8256 else
8257 (*_bfd_error_handler) (_("%A has both ordered and unordered sections"),
8258 o);
8259 bfd_set_error (bfd_error_bad_value);
8260 return FALSE;
8261 }
0b52efa6
PB
8262 }
8263
8264 if (!seen_linkorder)
8265 return TRUE;
8266
0b52efa6
PB
8267 sections = (struct bfd_link_order **)
8268 xmalloc (seen_linkorder * sizeof (struct bfd_link_order *));
8269 seen_linkorder = 0;
3b36f7e6 8270
8423293d 8271 for (p = o->map_head.link_order; p != NULL; p = p->next)
0b52efa6
PB
8272 {
8273 sections[seen_linkorder++] = p;
8274 }
8275 /* Sort the input sections in the order of their linked section. */
8276 qsort (sections, seen_linkorder, sizeof (struct bfd_link_order *),
8277 compare_link_order);
8278
8279 /* Change the offsets of the sections. */
8280 offset = 0;
8281 for (n = 0; n < seen_linkorder; n++)
8282 {
8283 s = sections[n]->u.indirect.section;
8284 offset &= ~(bfd_vma)((1 << s->alignment_power) - 1);
8285 s->output_offset = offset;
8286 sections[n]->offset = offset;
8287 offset += sections[n]->size;
8288 }
8289
8290 return TRUE;
8291}
8292
8293
c152c796
AM
8294/* Do the final step of an ELF link. */
8295
8296bfd_boolean
8297bfd_elf_final_link (bfd *abfd, struct bfd_link_info *info)
8298{
8299 bfd_boolean dynamic;
8300 bfd_boolean emit_relocs;
8301 bfd *dynobj;
8302 struct elf_final_link_info finfo;
8303 register asection *o;
8304 register struct bfd_link_order *p;
8305 register bfd *sub;
8306 bfd_size_type max_contents_size;
8307 bfd_size_type max_external_reloc_size;
8308 bfd_size_type max_internal_reloc_count;
8309 bfd_size_type max_sym_count;
8310 bfd_size_type max_sym_shndx_count;
8311 file_ptr off;
8312 Elf_Internal_Sym elfsym;
8313 unsigned int i;
8314 Elf_Internal_Shdr *symtab_hdr;
8315 Elf_Internal_Shdr *symtab_shndx_hdr;
8316 Elf_Internal_Shdr *symstrtab_hdr;
8317 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
8318 struct elf_outext_info eoinfo;
8319 bfd_boolean merged;
8320 size_t relativecount = 0;
8321 asection *reldyn = 0;
8322 bfd_size_type amt;
8323
8324 if (! is_elf_hash_table (info->hash))
8325 return FALSE;
8326
8327 if (info->shared)
8328 abfd->flags |= DYNAMIC;
8329
8330 dynamic = elf_hash_table (info)->dynamic_sections_created;
8331 dynobj = elf_hash_table (info)->dynobj;
8332
8333 emit_relocs = (info->relocatable
a4676736 8334 || info->emitrelocations);
c152c796
AM
8335
8336 finfo.info = info;
8337 finfo.output_bfd = abfd;
8338 finfo.symstrtab = _bfd_elf_stringtab_init ();
8339 if (finfo.symstrtab == NULL)
8340 return FALSE;
8341
8342 if (! dynamic)
8343 {
8344 finfo.dynsym_sec = NULL;
8345 finfo.hash_sec = NULL;
8346 finfo.symver_sec = NULL;
8347 }
8348 else
8349 {
8350 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
8351 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
fdc90cb4 8352 BFD_ASSERT (finfo.dynsym_sec != NULL);
c152c796
AM
8353 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
8354 /* Note that it is OK if symver_sec is NULL. */
8355 }
8356
8357 finfo.contents = NULL;
8358 finfo.external_relocs = NULL;
8359 finfo.internal_relocs = NULL;
8360 finfo.external_syms = NULL;
8361 finfo.locsym_shndx = NULL;
8362 finfo.internal_syms = NULL;
8363 finfo.indices = NULL;
8364 finfo.sections = NULL;
8365 finfo.symbuf = NULL;
8366 finfo.symshndxbuf = NULL;
8367 finfo.symbuf_count = 0;
8368 finfo.shndxbuf_size = 0;
8369
8370 /* Count up the number of relocations we will output for each output
8371 section, so that we know the sizes of the reloc sections. We
8372 also figure out some maximum sizes. */
8373 max_contents_size = 0;
8374 max_external_reloc_size = 0;
8375 max_internal_reloc_count = 0;
8376 max_sym_count = 0;
8377 max_sym_shndx_count = 0;
8378 merged = FALSE;
8379 for (o = abfd->sections; o != NULL; o = o->next)
8380 {
8381 struct bfd_elf_section_data *esdo = elf_section_data (o);
8382 o->reloc_count = 0;
8383
8423293d 8384 for (p = o->map_head.link_order; p != NULL; p = p->next)
c152c796
AM
8385 {
8386 unsigned int reloc_count = 0;
8387 struct bfd_elf_section_data *esdi = NULL;
8388 unsigned int *rel_count1;
8389
8390 if (p->type == bfd_section_reloc_link_order
8391 || p->type == bfd_symbol_reloc_link_order)
8392 reloc_count = 1;
8393 else if (p->type == bfd_indirect_link_order)
8394 {
8395 asection *sec;
8396
8397 sec = p->u.indirect.section;
8398 esdi = elf_section_data (sec);
8399
8400 /* Mark all sections which are to be included in the
8401 link. This will normally be every section. We need
8402 to do this so that we can identify any sections which
8403 the linker has decided to not include. */
8404 sec->linker_mark = TRUE;
8405
8406 if (sec->flags & SEC_MERGE)
8407 merged = TRUE;
8408
8409 if (info->relocatable || info->emitrelocations)
8410 reloc_count = sec->reloc_count;
8411 else if (bed->elf_backend_count_relocs)
8412 {
8413 Elf_Internal_Rela * relocs;
8414
8415 relocs = _bfd_elf_link_read_relocs (abfd, sec, NULL, NULL,
8416 info->keep_memory);
8417
8418 reloc_count = (*bed->elf_backend_count_relocs) (sec, relocs);
8419
8420 if (elf_section_data (o)->relocs != relocs)
8421 free (relocs);
8422 }
8423
eea6121a
AM
8424 if (sec->rawsize > max_contents_size)
8425 max_contents_size = sec->rawsize;
8426 if (sec->size > max_contents_size)
8427 max_contents_size = sec->size;
c152c796
AM
8428
8429 /* We are interested in just local symbols, not all
8430 symbols. */
8431 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
8432 && (sec->owner->flags & DYNAMIC) == 0)
8433 {
8434 size_t sym_count;
8435
8436 if (elf_bad_symtab (sec->owner))
8437 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
8438 / bed->s->sizeof_sym);
8439 else
8440 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
8441
8442 if (sym_count > max_sym_count)
8443 max_sym_count = sym_count;
8444
8445 if (sym_count > max_sym_shndx_count
8446 && elf_symtab_shndx (sec->owner) != 0)
8447 max_sym_shndx_count = sym_count;
8448
8449 if ((sec->flags & SEC_RELOC) != 0)
8450 {
8451 size_t ext_size;
8452
8453 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
8454 if (ext_size > max_external_reloc_size)
8455 max_external_reloc_size = ext_size;
8456 if (sec->reloc_count > max_internal_reloc_count)
8457 max_internal_reloc_count = sec->reloc_count;
8458 }
8459 }
8460 }
8461
8462 if (reloc_count == 0)
8463 continue;
8464
8465 o->reloc_count += reloc_count;
8466
8467 /* MIPS may have a mix of REL and RELA relocs on sections.
8468 To support this curious ABI we keep reloc counts in
8469 elf_section_data too. We must be careful to add the
8470 relocations from the input section to the right output
8471 count. FIXME: Get rid of one count. We have
8472 o->reloc_count == esdo->rel_count + esdo->rel_count2. */
8473 rel_count1 = &esdo->rel_count;
8474 if (esdi != NULL)
8475 {
8476 bfd_boolean same_size;
8477 bfd_size_type entsize1;
8478
8479 entsize1 = esdi->rel_hdr.sh_entsize;
8480 BFD_ASSERT (entsize1 == bed->s->sizeof_rel
8481 || entsize1 == bed->s->sizeof_rela);
8482 same_size = !o->use_rela_p == (entsize1 == bed->s->sizeof_rel);
8483
8484 if (!same_size)
8485 rel_count1 = &esdo->rel_count2;
8486
8487 if (esdi->rel_hdr2 != NULL)
8488 {
8489 bfd_size_type entsize2 = esdi->rel_hdr2->sh_entsize;
8490 unsigned int alt_count;
8491 unsigned int *rel_count2;
8492
8493 BFD_ASSERT (entsize2 != entsize1
8494 && (entsize2 == bed->s->sizeof_rel
8495 || entsize2 == bed->s->sizeof_rela));
8496
8497 rel_count2 = &esdo->rel_count2;
8498 if (!same_size)
8499 rel_count2 = &esdo->rel_count;
8500
8501 /* The following is probably too simplistic if the
8502 backend counts output relocs unusually. */
8503 BFD_ASSERT (bed->elf_backend_count_relocs == NULL);
8504 alt_count = NUM_SHDR_ENTRIES (esdi->rel_hdr2);
8505 *rel_count2 += alt_count;
8506 reloc_count -= alt_count;
8507 }
8508 }
8509 *rel_count1 += reloc_count;
8510 }
8511
8512 if (o->reloc_count > 0)
8513 o->flags |= SEC_RELOC;
8514 else
8515 {
8516 /* Explicitly clear the SEC_RELOC flag. The linker tends to
8517 set it (this is probably a bug) and if it is set
8518 assign_section_numbers will create a reloc section. */
8519 o->flags &=~ SEC_RELOC;
8520 }
8521
8522 /* If the SEC_ALLOC flag is not set, force the section VMA to
8523 zero. This is done in elf_fake_sections as well, but forcing
8524 the VMA to 0 here will ensure that relocs against these
8525 sections are handled correctly. */
8526 if ((o->flags & SEC_ALLOC) == 0
8527 && ! o->user_set_vma)
8528 o->vma = 0;
8529 }
8530
8531 if (! info->relocatable && merged)
8532 elf_link_hash_traverse (elf_hash_table (info),
8533 _bfd_elf_link_sec_merge_syms, abfd);
8534
8535 /* Figure out the file positions for everything but the symbol table
8536 and the relocs. We set symcount to force assign_section_numbers
8537 to create a symbol table. */
8538 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
8539 BFD_ASSERT (! abfd->output_has_begun);
8540 if (! _bfd_elf_compute_section_file_positions (abfd, info))
8541 goto error_return;
8542
ee75fd95 8543 /* Set sizes, and assign file positions for reloc sections. */
c152c796
AM
8544 for (o = abfd->sections; o != NULL; o = o->next)
8545 {
8546 if ((o->flags & SEC_RELOC) != 0)
8547 {
8548 if (!(_bfd_elf_link_size_reloc_section
8549 (abfd, &elf_section_data (o)->rel_hdr, o)))
8550 goto error_return;
8551
8552 if (elf_section_data (o)->rel_hdr2
8553 && !(_bfd_elf_link_size_reloc_section
8554 (abfd, elf_section_data (o)->rel_hdr2, o)))
8555 goto error_return;
8556 }
8557
8558 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
8559 to count upwards while actually outputting the relocations. */
8560 elf_section_data (o)->rel_count = 0;
8561 elf_section_data (o)->rel_count2 = 0;
8562 }
8563
8564 _bfd_elf_assign_file_positions_for_relocs (abfd);
8565
8566 /* We have now assigned file positions for all the sections except
8567 .symtab and .strtab. We start the .symtab section at the current
8568 file position, and write directly to it. We build the .strtab
8569 section in memory. */
8570 bfd_get_symcount (abfd) = 0;
8571 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8572 /* sh_name is set in prep_headers. */
8573 symtab_hdr->sh_type = SHT_SYMTAB;
8574 /* sh_flags, sh_addr and sh_size all start off zero. */
8575 symtab_hdr->sh_entsize = bed->s->sizeof_sym;
8576 /* sh_link is set in assign_section_numbers. */
8577 /* sh_info is set below. */
8578 /* sh_offset is set just below. */
8579 symtab_hdr->sh_addralign = 1 << bed->s->log_file_align;
8580
8581 off = elf_tdata (abfd)->next_file_pos;
8582 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, TRUE);
8583
8584 /* Note that at this point elf_tdata (abfd)->next_file_pos is
8585 incorrect. We do not yet know the size of the .symtab section.
8586 We correct next_file_pos below, after we do know the size. */
8587
8588 /* Allocate a buffer to hold swapped out symbols. This is to avoid
8589 continuously seeking to the right position in the file. */
8590 if (! info->keep_memory || max_sym_count < 20)
8591 finfo.symbuf_size = 20;
8592 else
8593 finfo.symbuf_size = max_sym_count;
8594 amt = finfo.symbuf_size;
8595 amt *= bed->s->sizeof_sym;
8596 finfo.symbuf = bfd_malloc (amt);
8597 if (finfo.symbuf == NULL)
8598 goto error_return;
8599 if (elf_numsections (abfd) > SHN_LORESERVE)
8600 {
8601 /* Wild guess at number of output symbols. realloc'd as needed. */
8602 amt = 2 * max_sym_count + elf_numsections (abfd) + 1000;
8603 finfo.shndxbuf_size = amt;
8604 amt *= sizeof (Elf_External_Sym_Shndx);
8605 finfo.symshndxbuf = bfd_zmalloc (amt);
8606 if (finfo.symshndxbuf == NULL)
8607 goto error_return;
8608 }
8609
8610 /* Start writing out the symbol table. The first symbol is always a
8611 dummy symbol. */
8612 if (info->strip != strip_all
8613 || emit_relocs)
8614 {
8615 elfsym.st_value = 0;
8616 elfsym.st_size = 0;
8617 elfsym.st_info = 0;
8618 elfsym.st_other = 0;
8619 elfsym.st_shndx = SHN_UNDEF;
8620 if (! elf_link_output_sym (&finfo, NULL, &elfsym, bfd_und_section_ptr,
8621 NULL))
8622 goto error_return;
8623 }
8624
c152c796
AM
8625 /* Output a symbol for each section. We output these even if we are
8626 discarding local symbols, since they are used for relocs. These
8627 symbols have no names. We store the index of each one in the
8628 index field of the section, so that we can find it again when
8629 outputting relocs. */
8630 if (info->strip != strip_all
8631 || emit_relocs)
8632 {
8633 elfsym.st_size = 0;
8634 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8635 elfsym.st_other = 0;
f0b5bb34 8636 elfsym.st_value = 0;
c152c796
AM
8637 for (i = 1; i < elf_numsections (abfd); i++)
8638 {
8639 o = bfd_section_from_elf_index (abfd, i);
8640 if (o != NULL)
f0b5bb34
AM
8641 {
8642 o->target_index = bfd_get_symcount (abfd);
8643 elfsym.st_shndx = i;
8644 if (!info->relocatable)
8645 elfsym.st_value = o->vma;
8646 if (!elf_link_output_sym (&finfo, NULL, &elfsym, o, NULL))
8647 goto error_return;
8648 }
c152c796
AM
8649 if (i == SHN_LORESERVE - 1)
8650 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
8651 }
8652 }
8653
8654 /* Allocate some memory to hold information read in from the input
8655 files. */
8656 if (max_contents_size != 0)
8657 {
8658 finfo.contents = bfd_malloc (max_contents_size);
8659 if (finfo.contents == NULL)
8660 goto error_return;
8661 }
8662
8663 if (max_external_reloc_size != 0)
8664 {
8665 finfo.external_relocs = bfd_malloc (max_external_reloc_size);
8666 if (finfo.external_relocs == NULL)
8667 goto error_return;
8668 }
8669
8670 if (max_internal_reloc_count != 0)
8671 {
8672 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
8673 amt *= sizeof (Elf_Internal_Rela);
8674 finfo.internal_relocs = bfd_malloc (amt);
8675 if (finfo.internal_relocs == NULL)
8676 goto error_return;
8677 }
8678
8679 if (max_sym_count != 0)
8680 {
8681 amt = max_sym_count * bed->s->sizeof_sym;
8682 finfo.external_syms = bfd_malloc (amt);
8683 if (finfo.external_syms == NULL)
8684 goto error_return;
8685
8686 amt = max_sym_count * sizeof (Elf_Internal_Sym);
8687 finfo.internal_syms = bfd_malloc (amt);
8688 if (finfo.internal_syms == NULL)
8689 goto error_return;
8690
8691 amt = max_sym_count * sizeof (long);
8692 finfo.indices = bfd_malloc (amt);
8693 if (finfo.indices == NULL)
8694 goto error_return;
8695
8696 amt = max_sym_count * sizeof (asection *);
8697 finfo.sections = bfd_malloc (amt);
8698 if (finfo.sections == NULL)
8699 goto error_return;
8700 }
8701
8702 if (max_sym_shndx_count != 0)
8703 {
8704 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
8705 finfo.locsym_shndx = bfd_malloc (amt);
8706 if (finfo.locsym_shndx == NULL)
8707 goto error_return;
8708 }
8709
8710 if (elf_hash_table (info)->tls_sec)
8711 {
8712 bfd_vma base, end = 0;
8713 asection *sec;
8714
8715 for (sec = elf_hash_table (info)->tls_sec;
8716 sec && (sec->flags & SEC_THREAD_LOCAL);
8717 sec = sec->next)
8718 {
3a800eb9 8719 bfd_size_type size = sec->size;
c152c796 8720
3a800eb9
AM
8721 if (size == 0
8722 && (sec->flags & SEC_HAS_CONTENTS) == 0)
c152c796 8723 {
3a800eb9
AM
8724 struct bfd_link_order *o = sec->map_tail.link_order;
8725 if (o != NULL)
8726 size = o->offset + o->size;
c152c796
AM
8727 }
8728 end = sec->vma + size;
8729 }
8730 base = elf_hash_table (info)->tls_sec->vma;
8731 end = align_power (end, elf_hash_table (info)->tls_sec->alignment_power);
8732 elf_hash_table (info)->tls_size = end - base;
8733 }
8734
0b52efa6
PB
8735 /* Reorder SHF_LINK_ORDER sections. */
8736 for (o = abfd->sections; o != NULL; o = o->next)
8737 {
8738 if (!elf_fixup_link_order (abfd, o))
8739 return FALSE;
8740 }
8741
c152c796
AM
8742 /* Since ELF permits relocations to be against local symbols, we
8743 must have the local symbols available when we do the relocations.
8744 Since we would rather only read the local symbols once, and we
8745 would rather not keep them in memory, we handle all the
8746 relocations for a single input file at the same time.
8747
8748 Unfortunately, there is no way to know the total number of local
8749 symbols until we have seen all of them, and the local symbol
8750 indices precede the global symbol indices. This means that when
8751 we are generating relocatable output, and we see a reloc against
8752 a global symbol, we can not know the symbol index until we have
8753 finished examining all the local symbols to see which ones we are
8754 going to output. To deal with this, we keep the relocations in
8755 memory, and don't output them until the end of the link. This is
8756 an unfortunate waste of memory, but I don't see a good way around
8757 it. Fortunately, it only happens when performing a relocatable
8758 link, which is not the common case. FIXME: If keep_memory is set
8759 we could write the relocs out and then read them again; I don't
8760 know how bad the memory loss will be. */
8761
8762 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8763 sub->output_has_begun = FALSE;
8764 for (o = abfd->sections; o != NULL; o = o->next)
8765 {
8423293d 8766 for (p = o->map_head.link_order; p != NULL; p = p->next)
c152c796
AM
8767 {
8768 if (p->type == bfd_indirect_link_order
8769 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
8770 == bfd_target_elf_flavour)
8771 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
8772 {
8773 if (! sub->output_has_begun)
8774 {
8775 if (! elf_link_input_bfd (&finfo, sub))
8776 goto error_return;
8777 sub->output_has_begun = TRUE;
8778 }
8779 }
8780 else if (p->type == bfd_section_reloc_link_order
8781 || p->type == bfd_symbol_reloc_link_order)
8782 {
8783 if (! elf_reloc_link_order (abfd, info, o, p))
8784 goto error_return;
8785 }
8786 else
8787 {
8788 if (! _bfd_default_link_order (abfd, info, o, p))
8789 goto error_return;
8790 }
8791 }
8792 }
8793
c0f00686
L
8794 /* Free symbol buffer if needed. */
8795 if (!info->reduce_memory_overheads)
8796 {
8797 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8798 if (elf_tdata (sub)->symbuf)
8799 {
8800 free (elf_tdata (sub)->symbuf);
8801 elf_tdata (sub)->symbuf = NULL;
8802 }
8803 }
8804
c152c796
AM
8805 /* Output any global symbols that got converted to local in a
8806 version script or due to symbol visibility. We do this in a
8807 separate step since ELF requires all local symbols to appear
8808 prior to any global symbols. FIXME: We should only do this if
8809 some global symbols were, in fact, converted to become local.
8810 FIXME: Will this work correctly with the Irix 5 linker? */
8811 eoinfo.failed = FALSE;
8812 eoinfo.finfo = &finfo;
8813 eoinfo.localsyms = TRUE;
8814 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
8815 &eoinfo);
8816 if (eoinfo.failed)
8817 return FALSE;
8818
4e617b1e
PB
8819 /* If backend needs to output some local symbols not present in the hash
8820 table, do it now. */
8821 if (bed->elf_backend_output_arch_local_syms)
8822 {
8823 typedef bfd_boolean (*out_sym_func)
8824 (void *, const char *, Elf_Internal_Sym *, asection *,
8825 struct elf_link_hash_entry *);
8826
8827 if (! ((*bed->elf_backend_output_arch_local_syms)
8828 (abfd, info, &finfo, (out_sym_func) elf_link_output_sym)))
8829 return FALSE;
8830 }
8831
c152c796
AM
8832 /* That wrote out all the local symbols. Finish up the symbol table
8833 with the global symbols. Even if we want to strip everything we
8834 can, we still need to deal with those global symbols that got
8835 converted to local in a version script. */
8836
8837 /* The sh_info field records the index of the first non local symbol. */
8838 symtab_hdr->sh_info = bfd_get_symcount (abfd);
8839
8840 if (dynamic
8841 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
8842 {
8843 Elf_Internal_Sym sym;
8844 bfd_byte *dynsym = finfo.dynsym_sec->contents;
8845 long last_local = 0;
8846
8847 /* Write out the section symbols for the output sections. */
67687978 8848 if (info->shared || elf_hash_table (info)->is_relocatable_executable)
c152c796
AM
8849 {
8850 asection *s;
8851
8852 sym.st_size = 0;
8853 sym.st_name = 0;
8854 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
8855 sym.st_other = 0;
8856
8857 for (s = abfd->sections; s != NULL; s = s->next)
8858 {
8859 int indx;
8860 bfd_byte *dest;
8861 long dynindx;
8862
c152c796 8863 dynindx = elf_section_data (s)->dynindx;
8c37241b
JJ
8864 if (dynindx <= 0)
8865 continue;
8866 indx = elf_section_data (s)->this_idx;
c152c796
AM
8867 BFD_ASSERT (indx > 0);
8868 sym.st_shndx = indx;
c0d5a53d
L
8869 if (! check_dynsym (abfd, &sym))
8870 return FALSE;
c152c796
AM
8871 sym.st_value = s->vma;
8872 dest = dynsym + dynindx * bed->s->sizeof_sym;
8c37241b
JJ
8873 if (last_local < dynindx)
8874 last_local = dynindx;
c152c796
AM
8875 bed->s->swap_symbol_out (abfd, &sym, dest, 0);
8876 }
c152c796
AM
8877 }
8878
8879 /* Write out the local dynsyms. */
8880 if (elf_hash_table (info)->dynlocal)
8881 {
8882 struct elf_link_local_dynamic_entry *e;
8883 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
8884 {
8885 asection *s;
8886 bfd_byte *dest;
8887
8888 sym.st_size = e->isym.st_size;
8889 sym.st_other = e->isym.st_other;
8890
8891 /* Copy the internal symbol as is.
8892 Note that we saved a word of storage and overwrote
8893 the original st_name with the dynstr_index. */
8894 sym = e->isym;
8895
8896 if (e->isym.st_shndx != SHN_UNDEF
8897 && (e->isym.st_shndx < SHN_LORESERVE
8898 || e->isym.st_shndx > SHN_HIRESERVE))
8899 {
8900 s = bfd_section_from_elf_index (e->input_bfd,
8901 e->isym.st_shndx);
8902
8903 sym.st_shndx =
8904 elf_section_data (s->output_section)->this_idx;
c0d5a53d
L
8905 if (! check_dynsym (abfd, &sym))
8906 return FALSE;
c152c796
AM
8907 sym.st_value = (s->output_section->vma
8908 + s->output_offset
8909 + e->isym.st_value);
8910 }
8911
8912 if (last_local < e->dynindx)
8913 last_local = e->dynindx;
8914
8915 dest = dynsym + e->dynindx * bed->s->sizeof_sym;
8916 bed->s->swap_symbol_out (abfd, &sym, dest, 0);
8917 }
8918 }
8919
8920 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
8921 last_local + 1;
8922 }
8923
8924 /* We get the global symbols from the hash table. */
8925 eoinfo.failed = FALSE;
8926 eoinfo.localsyms = FALSE;
8927 eoinfo.finfo = &finfo;
8928 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
8929 &eoinfo);
8930 if (eoinfo.failed)
8931 return FALSE;
8932
8933 /* If backend needs to output some symbols not present in the hash
8934 table, do it now. */
8935 if (bed->elf_backend_output_arch_syms)
8936 {
8937 typedef bfd_boolean (*out_sym_func)
8938 (void *, const char *, Elf_Internal_Sym *, asection *,
8939 struct elf_link_hash_entry *);
8940
8941 if (! ((*bed->elf_backend_output_arch_syms)
8942 (abfd, info, &finfo, (out_sym_func) elf_link_output_sym)))
8943 return FALSE;
8944 }
8945
8946 /* Flush all symbols to the file. */
8947 if (! elf_link_flush_output_syms (&finfo, bed))
8948 return FALSE;
8949
8950 /* Now we know the size of the symtab section. */
8951 off += symtab_hdr->sh_size;
8952
8953 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
8954 if (symtab_shndx_hdr->sh_name != 0)
8955 {
8956 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
8957 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
8958 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
8959 amt = bfd_get_symcount (abfd) * sizeof (Elf_External_Sym_Shndx);
8960 symtab_shndx_hdr->sh_size = amt;
8961
8962 off = _bfd_elf_assign_file_position_for_section (symtab_shndx_hdr,
8963 off, TRUE);
8964
8965 if (bfd_seek (abfd, symtab_shndx_hdr->sh_offset, SEEK_SET) != 0
8966 || (bfd_bwrite (finfo.symshndxbuf, amt, abfd) != amt))
8967 return FALSE;
8968 }
8969
8970
8971 /* Finish up and write out the symbol string table (.strtab)
8972 section. */
8973 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
8974 /* sh_name was set in prep_headers. */
8975 symstrtab_hdr->sh_type = SHT_STRTAB;
8976 symstrtab_hdr->sh_flags = 0;
8977 symstrtab_hdr->sh_addr = 0;
8978 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
8979 symstrtab_hdr->sh_entsize = 0;
8980 symstrtab_hdr->sh_link = 0;
8981 symstrtab_hdr->sh_info = 0;
8982 /* sh_offset is set just below. */
8983 symstrtab_hdr->sh_addralign = 1;
8984
8985 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, TRUE);
8986 elf_tdata (abfd)->next_file_pos = off;
8987
8988 if (bfd_get_symcount (abfd) > 0)
8989 {
8990 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
8991 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
8992 return FALSE;
8993 }
8994
8995 /* Adjust the relocs to have the correct symbol indices. */
8996 for (o = abfd->sections; o != NULL; o = o->next)
8997 {
8998 if ((o->flags & SEC_RELOC) == 0)
8999 continue;
9000
9001 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
9002 elf_section_data (o)->rel_count,
9003 elf_section_data (o)->rel_hashes);
9004 if (elf_section_data (o)->rel_hdr2 != NULL)
9005 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
9006 elf_section_data (o)->rel_count2,
9007 (elf_section_data (o)->rel_hashes
9008 + elf_section_data (o)->rel_count));
9009
9010 /* Set the reloc_count field to 0 to prevent write_relocs from
9011 trying to swap the relocs out itself. */
9012 o->reloc_count = 0;
9013 }
9014
9015 if (dynamic && info->combreloc && dynobj != NULL)
9016 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
9017
9018 /* If we are linking against a dynamic object, or generating a
9019 shared library, finish up the dynamic linking information. */
9020 if (dynamic)
9021 {
9022 bfd_byte *dyncon, *dynconend;
9023
9024 /* Fix up .dynamic entries. */
9025 o = bfd_get_section_by_name (dynobj, ".dynamic");
9026 BFD_ASSERT (o != NULL);
9027
9028 dyncon = o->contents;
eea6121a 9029 dynconend = o->contents + o->size;
c152c796
AM
9030 for (; dyncon < dynconend; dyncon += bed->s->sizeof_dyn)
9031 {
9032 Elf_Internal_Dyn dyn;
9033 const char *name;
9034 unsigned int type;
9035
9036 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
9037
9038 switch (dyn.d_tag)
9039 {
9040 default:
9041 continue;
9042 case DT_NULL:
9043 if (relativecount > 0 && dyncon + bed->s->sizeof_dyn < dynconend)
9044 {
9045 switch (elf_section_data (reldyn)->this_hdr.sh_type)
9046 {
9047 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
9048 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
9049 default: continue;
9050 }
9051 dyn.d_un.d_val = relativecount;
9052 relativecount = 0;
9053 break;
9054 }
9055 continue;
9056
9057 case DT_INIT:
9058 name = info->init_function;
9059 goto get_sym;
9060 case DT_FINI:
9061 name = info->fini_function;
9062 get_sym:
9063 {
9064 struct elf_link_hash_entry *h;
9065
9066 h = elf_link_hash_lookup (elf_hash_table (info), name,
9067 FALSE, FALSE, TRUE);
9068 if (h != NULL
9069 && (h->root.type == bfd_link_hash_defined
9070 || h->root.type == bfd_link_hash_defweak))
9071 {
9072 dyn.d_un.d_val = h->root.u.def.value;
9073 o = h->root.u.def.section;
9074 if (o->output_section != NULL)
9075 dyn.d_un.d_val += (o->output_section->vma
9076 + o->output_offset);
9077 else
9078 {
9079 /* The symbol is imported from another shared
9080 library and does not apply to this one. */
9081 dyn.d_un.d_val = 0;
9082 }
9083 break;
9084 }
9085 }
9086 continue;
9087
9088 case DT_PREINIT_ARRAYSZ:
9089 name = ".preinit_array";
9090 goto get_size;
9091 case DT_INIT_ARRAYSZ:
9092 name = ".init_array";
9093 goto get_size;
9094 case DT_FINI_ARRAYSZ:
9095 name = ".fini_array";
9096 get_size:
9097 o = bfd_get_section_by_name (abfd, name);
9098 if (o == NULL)
9099 {
9100 (*_bfd_error_handler)
d003868e 9101 (_("%B: could not find output section %s"), abfd, name);
c152c796
AM
9102 goto error_return;
9103 }
eea6121a 9104 if (o->size == 0)
c152c796
AM
9105 (*_bfd_error_handler)
9106 (_("warning: %s section has zero size"), name);
eea6121a 9107 dyn.d_un.d_val = o->size;
c152c796
AM
9108 break;
9109
9110 case DT_PREINIT_ARRAY:
9111 name = ".preinit_array";
9112 goto get_vma;
9113 case DT_INIT_ARRAY:
9114 name = ".init_array";
9115 goto get_vma;
9116 case DT_FINI_ARRAY:
9117 name = ".fini_array";
9118 goto get_vma;
9119
9120 case DT_HASH:
9121 name = ".hash";
9122 goto get_vma;
fdc90cb4
JJ
9123 case DT_GNU_HASH:
9124 name = ".gnu.hash";
9125 goto get_vma;
c152c796
AM
9126 case DT_STRTAB:
9127 name = ".dynstr";
9128 goto get_vma;
9129 case DT_SYMTAB:
9130 name = ".dynsym";
9131 goto get_vma;
9132 case DT_VERDEF:
9133 name = ".gnu.version_d";
9134 goto get_vma;
9135 case DT_VERNEED:
9136 name = ".gnu.version_r";
9137 goto get_vma;
9138 case DT_VERSYM:
9139 name = ".gnu.version";
9140 get_vma:
9141 o = bfd_get_section_by_name (abfd, name);
9142 if (o == NULL)
9143 {
9144 (*_bfd_error_handler)
d003868e 9145 (_("%B: could not find output section %s"), abfd, name);
c152c796
AM
9146 goto error_return;
9147 }
9148 dyn.d_un.d_ptr = o->vma;
9149 break;
9150
9151 case DT_REL:
9152 case DT_RELA:
9153 case DT_RELSZ:
9154 case DT_RELASZ:
9155 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
9156 type = SHT_REL;
9157 else
9158 type = SHT_RELA;
9159 dyn.d_un.d_val = 0;
9160 for (i = 1; i < elf_numsections (abfd); i++)
9161 {
9162 Elf_Internal_Shdr *hdr;
9163
9164 hdr = elf_elfsections (abfd)[i];
9165 if (hdr->sh_type == type
9166 && (hdr->sh_flags & SHF_ALLOC) != 0)
9167 {
9168 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
9169 dyn.d_un.d_val += hdr->sh_size;
9170 else
9171 {
9172 if (dyn.d_un.d_val == 0
9173 || hdr->sh_addr < dyn.d_un.d_val)
9174 dyn.d_un.d_val = hdr->sh_addr;
9175 }
9176 }
9177 }
9178 break;
9179 }
9180 bed->s->swap_dyn_out (dynobj, &dyn, dyncon);
9181 }
9182 }
9183
9184 /* If we have created any dynamic sections, then output them. */
9185 if (dynobj != NULL)
9186 {
9187 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
9188 goto error_return;
9189
943284cc
DJ
9190 /* Check for DT_TEXTREL (late, in case the backend removes it). */
9191 if (info->warn_shared_textrel && info->shared)
9192 {
9193 bfd_byte *dyncon, *dynconend;
9194
9195 /* Fix up .dynamic entries. */
9196 o = bfd_get_section_by_name (dynobj, ".dynamic");
9197 BFD_ASSERT (o != NULL);
9198
9199 dyncon = o->contents;
9200 dynconend = o->contents + o->size;
9201 for (; dyncon < dynconend; dyncon += bed->s->sizeof_dyn)
9202 {
9203 Elf_Internal_Dyn dyn;
9204
9205 bed->s->swap_dyn_in (dynobj, dyncon, &dyn);
9206
9207 if (dyn.d_tag == DT_TEXTREL)
9208 {
9209 _bfd_error_handler
9210 (_("warning: creating a DT_TEXTREL in a shared object."));
9211 break;
9212 }
9213 }
9214 }
9215
c152c796
AM
9216 for (o = dynobj->sections; o != NULL; o = o->next)
9217 {
9218 if ((o->flags & SEC_HAS_CONTENTS) == 0
eea6121a 9219 || o->size == 0
c152c796
AM
9220 || o->output_section == bfd_abs_section_ptr)
9221 continue;
9222 if ((o->flags & SEC_LINKER_CREATED) == 0)
9223 {
9224 /* At this point, we are only interested in sections
9225 created by _bfd_elf_link_create_dynamic_sections. */
9226 continue;
9227 }
3722b82f
AM
9228 if (elf_hash_table (info)->stab_info.stabstr == o)
9229 continue;
eea6121a
AM
9230 if (elf_hash_table (info)->eh_info.hdr_sec == o)
9231 continue;
c152c796
AM
9232 if ((elf_section_data (o->output_section)->this_hdr.sh_type
9233 != SHT_STRTAB)
9234 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
9235 {
9236 if (! bfd_set_section_contents (abfd, o->output_section,
9237 o->contents,
9238 (file_ptr) o->output_offset,
eea6121a 9239 o->size))
c152c796
AM
9240 goto error_return;
9241 }
9242 else
9243 {
9244 /* The contents of the .dynstr section are actually in a
9245 stringtab. */
9246 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
9247 if (bfd_seek (abfd, off, SEEK_SET) != 0
9248 || ! _bfd_elf_strtab_emit (abfd,
9249 elf_hash_table (info)->dynstr))
9250 goto error_return;
9251 }
9252 }
9253 }
9254
9255 if (info->relocatable)
9256 {
9257 bfd_boolean failed = FALSE;
9258
9259 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
9260 if (failed)
9261 goto error_return;
9262 }
9263
9264 /* If we have optimized stabs strings, output them. */
3722b82f 9265 if (elf_hash_table (info)->stab_info.stabstr != NULL)
c152c796
AM
9266 {
9267 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
9268 goto error_return;
9269 }
9270
9271 if (info->eh_frame_hdr)
9272 {
9273 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, info))
9274 goto error_return;
9275 }
9276
9277 if (finfo.symstrtab != NULL)
9278 _bfd_stringtab_free (finfo.symstrtab);
9279 if (finfo.contents != NULL)
9280 free (finfo.contents);
9281 if (finfo.external_relocs != NULL)
9282 free (finfo.external_relocs);
9283 if (finfo.internal_relocs != NULL)
9284 free (finfo.internal_relocs);
9285 if (finfo.external_syms != NULL)
9286 free (finfo.external_syms);
9287 if (finfo.locsym_shndx != NULL)
9288 free (finfo.locsym_shndx);
9289 if (finfo.internal_syms != NULL)
9290 free (finfo.internal_syms);
9291 if (finfo.indices != NULL)
9292 free (finfo.indices);
9293 if (finfo.sections != NULL)
9294 free (finfo.sections);
9295 if (finfo.symbuf != NULL)
9296 free (finfo.symbuf);
9297 if (finfo.symshndxbuf != NULL)
9298 free (finfo.symshndxbuf);
9299 for (o = abfd->sections; o != NULL; o = o->next)
9300 {
9301 if ((o->flags & SEC_RELOC) != 0
9302 && elf_section_data (o)->rel_hashes != NULL)
9303 free (elf_section_data (o)->rel_hashes);
9304 }
9305
9306 elf_tdata (abfd)->linker = TRUE;
9307
9308 return TRUE;
9309
9310 error_return:
9311 if (finfo.symstrtab != NULL)
9312 _bfd_stringtab_free (finfo.symstrtab);
9313 if (finfo.contents != NULL)
9314 free (finfo.contents);
9315 if (finfo.external_relocs != NULL)
9316 free (finfo.external_relocs);
9317 if (finfo.internal_relocs != NULL)
9318 free (finfo.internal_relocs);
9319 if (finfo.external_syms != NULL)
9320 free (finfo.external_syms);
9321 if (finfo.locsym_shndx != NULL)
9322 free (finfo.locsym_shndx);
9323 if (finfo.internal_syms != NULL)
9324 free (finfo.internal_syms);
9325 if (finfo.indices != NULL)
9326 free (finfo.indices);
9327 if (finfo.sections != NULL)
9328 free (finfo.sections);
9329 if (finfo.symbuf != NULL)
9330 free (finfo.symbuf);
9331 if (finfo.symshndxbuf != NULL)
9332 free (finfo.symshndxbuf);
9333 for (o = abfd->sections; o != NULL; o = o->next)
9334 {
9335 if ((o->flags & SEC_RELOC) != 0
9336 && elf_section_data (o)->rel_hashes != NULL)
9337 free (elf_section_data (o)->rel_hashes);
9338 }
9339
9340 return FALSE;
9341}
9342\f
9343/* Garbage collect unused sections. */
9344
c152c796
AM
9345typedef asection * (*gc_mark_hook_fn)
9346 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
9347 struct elf_link_hash_entry *, Elf_Internal_Sym *);
9348
07adf181
AM
9349/* Default gc_mark_hook. */
9350
9351asection *
9352_bfd_elf_gc_mark_hook (asection *sec,
9353 struct bfd_link_info *info ATTRIBUTE_UNUSED,
9354 Elf_Internal_Rela *rel ATTRIBUTE_UNUSED,
9355 struct elf_link_hash_entry *h,
9356 Elf_Internal_Sym *sym)
9357{
9358 if (h != NULL)
9359 {
9360 switch (h->root.type)
9361 {
9362 case bfd_link_hash_defined:
9363 case bfd_link_hash_defweak:
9364 return h->root.u.def.section;
9365
9366 case bfd_link_hash_common:
9367 return h->root.u.c.p->section;
9368
9369 default:
9370 break;
9371 }
9372 }
9373 else
9374 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
9375
9376 return NULL;
9377}
9378
9379/* The mark phase of garbage collection. For a given section, mark
9380 it and any sections in this section's group, and all the sections
9381 which define symbols to which it refers. */
9382
ccfa59ea
AM
9383bfd_boolean
9384_bfd_elf_gc_mark (struct bfd_link_info *info,
9385 asection *sec,
9386 gc_mark_hook_fn gc_mark_hook)
c152c796
AM
9387{
9388 bfd_boolean ret;
39c2f51b 9389 bfd_boolean is_eh;
c152c796
AM
9390 asection *group_sec;
9391
9392 sec->gc_mark = 1;
9393
9394 /* Mark all the sections in the group. */
9395 group_sec = elf_section_data (sec)->next_in_group;
9396 if (group_sec && !group_sec->gc_mark)
ccfa59ea 9397 if (!_bfd_elf_gc_mark (info, group_sec, gc_mark_hook))
c152c796
AM
9398 return FALSE;
9399
9400 /* Look through the section relocs. */
9401 ret = TRUE;
39c2f51b 9402 is_eh = strcmp (sec->name, ".eh_frame") == 0;
c152c796
AM
9403 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
9404 {
9405 Elf_Internal_Rela *relstart, *rel, *relend;
9406 Elf_Internal_Shdr *symtab_hdr;
9407 struct elf_link_hash_entry **sym_hashes;
9408 size_t nlocsyms;
9409 size_t extsymoff;
9410 bfd *input_bfd = sec->owner;
9411 const struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
9412 Elf_Internal_Sym *isym = NULL;
9413 int r_sym_shift;
9414
9415 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
9416 sym_hashes = elf_sym_hashes (input_bfd);
9417
9418 /* Read the local symbols. */
9419 if (elf_bad_symtab (input_bfd))
9420 {
9421 nlocsyms = symtab_hdr->sh_size / bed->s->sizeof_sym;
9422 extsymoff = 0;
9423 }
9424 else
9425 extsymoff = nlocsyms = symtab_hdr->sh_info;
9426
9427 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
9428 if (isym == NULL && nlocsyms != 0)
9429 {
9430 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
9431 NULL, NULL, NULL);
9432 if (isym == NULL)
9433 return FALSE;
9434 }
9435
9436 /* Read the relocations. */
9437 relstart = _bfd_elf_link_read_relocs (input_bfd, sec, NULL, NULL,
9438 info->keep_memory);
9439 if (relstart == NULL)
9440 {
9441 ret = FALSE;
9442 goto out1;
9443 }
9444 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
9445
9446 if (bed->s->arch_size == 32)
9447 r_sym_shift = 8;
9448 else
9449 r_sym_shift = 32;
9450
9451 for (rel = relstart; rel < relend; rel++)
9452 {
9453 unsigned long r_symndx;
9454 asection *rsec;
9455 struct elf_link_hash_entry *h;
9456
9457 r_symndx = rel->r_info >> r_sym_shift;
9458 if (r_symndx == 0)
9459 continue;
9460
9461 if (r_symndx >= nlocsyms
9462 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
9463 {
9464 h = sym_hashes[r_symndx - extsymoff];
20f0a1ad
AM
9465 while (h->root.type == bfd_link_hash_indirect
9466 || h->root.type == bfd_link_hash_warning)
9467 h = (struct elf_link_hash_entry *) h->root.u.i.link;
c152c796
AM
9468 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
9469 }
9470 else
9471 {
9472 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
9473 }
9474
9475 if (rsec && !rsec->gc_mark)
9476 {
9477 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
9478 rsec->gc_mark = 1;
39c2f51b
AM
9479 else if (is_eh)
9480 rsec->gc_mark_from_eh = 1;
ccfa59ea 9481 else if (!_bfd_elf_gc_mark (info, rsec, gc_mark_hook))
c152c796
AM
9482 {
9483 ret = FALSE;
9484 goto out2;
9485 }
9486 }
9487 }
9488
9489 out2:
9490 if (elf_section_data (sec)->relocs != relstart)
9491 free (relstart);
9492 out1:
9493 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
9494 {
9495 if (! info->keep_memory)
9496 free (isym);
9497 else
9498 symtab_hdr->contents = (unsigned char *) isym;
9499 }
9500 }
9501
9502 return ret;
9503}
9504
9505/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
9506
c17d87de
NC
9507struct elf_gc_sweep_symbol_info
9508{
ccabcbe5
AM
9509 struct bfd_link_info *info;
9510 void (*hide_symbol) (struct bfd_link_info *, struct elf_link_hash_entry *,
9511 bfd_boolean);
9512};
9513
c152c796 9514static bfd_boolean
ccabcbe5 9515elf_gc_sweep_symbol (struct elf_link_hash_entry *h, void *data)
c152c796 9516{
c152c796
AM
9517 if (h->root.type == bfd_link_hash_warning)
9518 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9519
ccabcbe5
AM
9520 if ((h->root.type == bfd_link_hash_defined
9521 || h->root.type == bfd_link_hash_defweak)
9522 && !h->root.u.def.section->gc_mark
9523 && !(h->root.u.def.section->owner->flags & DYNAMIC))
9524 {
9525 struct elf_gc_sweep_symbol_info *inf = data;
9526 (*inf->hide_symbol) (inf->info, h, TRUE);
9527 }
c152c796
AM
9528
9529 return TRUE;
9530}
9531
9532/* The sweep phase of garbage collection. Remove all garbage sections. */
9533
9534typedef bfd_boolean (*gc_sweep_hook_fn)
9535 (bfd *, struct bfd_link_info *, asection *, const Elf_Internal_Rela *);
9536
9537static bfd_boolean
ccabcbe5 9538elf_gc_sweep (bfd *abfd, struct bfd_link_info *info)
c152c796
AM
9539{
9540 bfd *sub;
ccabcbe5
AM
9541 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9542 gc_sweep_hook_fn gc_sweep_hook = bed->gc_sweep_hook;
9543 unsigned long section_sym_count;
9544 struct elf_gc_sweep_symbol_info sweep_info;
c152c796
AM
9545
9546 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
9547 {
9548 asection *o;
9549
9550 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
9551 continue;
9552
9553 for (o = sub->sections; o != NULL; o = o->next)
9554 {
7c2c8505
AM
9555 /* Keep debug and special sections. */
9556 if ((o->flags & (SEC_DEBUGGING | SEC_LINKER_CREATED)) != 0
dea5f36a 9557 || (o->flags & (SEC_ALLOC | SEC_LOAD | SEC_RELOC)) == 0)
c152c796
AM
9558 o->gc_mark = 1;
9559
9560 if (o->gc_mark)
9561 continue;
9562
9563 /* Skip sweeping sections already excluded. */
9564 if (o->flags & SEC_EXCLUDE)
9565 continue;
9566
9567 /* Since this is early in the link process, it is simple
9568 to remove a section from the output. */
9569 o->flags |= SEC_EXCLUDE;
9570
c17d87de
NC
9571 if (info->print_gc_sections == TRUE)
9572 _bfd_error_handler (_("Removing unused section '%s' in file '%B'"), sub, o->name);
9573
c152c796
AM
9574 /* But we also have to update some of the relocation
9575 info we collected before. */
9576 if (gc_sweep_hook
e8aaee2a
AM
9577 && (o->flags & SEC_RELOC) != 0
9578 && o->reloc_count > 0
9579 && !bfd_is_abs_section (o->output_section))
c152c796
AM
9580 {
9581 Elf_Internal_Rela *internal_relocs;
9582 bfd_boolean r;
9583
9584 internal_relocs
9585 = _bfd_elf_link_read_relocs (o->owner, o, NULL, NULL,
9586 info->keep_memory);
9587 if (internal_relocs == NULL)
9588 return FALSE;
9589
9590 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
9591
9592 if (elf_section_data (o)->relocs != internal_relocs)
9593 free (internal_relocs);
9594
9595 if (!r)
9596 return FALSE;
9597 }
9598 }
9599 }
9600
9601 /* Remove the symbols that were in the swept sections from the dynamic
9602 symbol table. GCFIXME: Anyone know how to get them out of the
9603 static symbol table as well? */
ccabcbe5
AM
9604 sweep_info.info = info;
9605 sweep_info.hide_symbol = bed->elf_backend_hide_symbol;
9606 elf_link_hash_traverse (elf_hash_table (info), elf_gc_sweep_symbol,
9607 &sweep_info);
c152c796 9608
ccabcbe5 9609 _bfd_elf_link_renumber_dynsyms (abfd, info, &section_sym_count);
c152c796
AM
9610 return TRUE;
9611}
9612
9613/* Propagate collected vtable information. This is called through
9614 elf_link_hash_traverse. */
9615
9616static bfd_boolean
9617elf_gc_propagate_vtable_entries_used (struct elf_link_hash_entry *h, void *okp)
9618{
9619 if (h->root.type == bfd_link_hash_warning)
9620 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9621
9622 /* Those that are not vtables. */
f6e332e6 9623 if (h->vtable == NULL || h->vtable->parent == NULL)
c152c796
AM
9624 return TRUE;
9625
9626 /* Those vtables that do not have parents, we cannot merge. */
f6e332e6 9627 if (h->vtable->parent == (struct elf_link_hash_entry *) -1)
c152c796
AM
9628 return TRUE;
9629
9630 /* If we've already been done, exit. */
f6e332e6 9631 if (h->vtable->used && h->vtable->used[-1])
c152c796
AM
9632 return TRUE;
9633
9634 /* Make sure the parent's table is up to date. */
f6e332e6 9635 elf_gc_propagate_vtable_entries_used (h->vtable->parent, okp);
c152c796 9636
f6e332e6 9637 if (h->vtable->used == NULL)
c152c796
AM
9638 {
9639 /* None of this table's entries were referenced. Re-use the
9640 parent's table. */
f6e332e6
AM
9641 h->vtable->used = h->vtable->parent->vtable->used;
9642 h->vtable->size = h->vtable->parent->vtable->size;
c152c796
AM
9643 }
9644 else
9645 {
9646 size_t n;
9647 bfd_boolean *cu, *pu;
9648
9649 /* Or the parent's entries into ours. */
f6e332e6 9650 cu = h->vtable->used;
c152c796 9651 cu[-1] = TRUE;
f6e332e6 9652 pu = h->vtable->parent->vtable->used;
c152c796
AM
9653 if (pu != NULL)
9654 {
9655 const struct elf_backend_data *bed;
9656 unsigned int log_file_align;
9657
9658 bed = get_elf_backend_data (h->root.u.def.section->owner);
9659 log_file_align = bed->s->log_file_align;
f6e332e6 9660 n = h->vtable->parent->vtable->size >> log_file_align;
c152c796
AM
9661 while (n--)
9662 {
9663 if (*pu)
9664 *cu = TRUE;
9665 pu++;
9666 cu++;
9667 }
9668 }
9669 }
9670
9671 return TRUE;
9672}
9673
9674static bfd_boolean
9675elf_gc_smash_unused_vtentry_relocs (struct elf_link_hash_entry *h, void *okp)
9676{
9677 asection *sec;
9678 bfd_vma hstart, hend;
9679 Elf_Internal_Rela *relstart, *relend, *rel;
9680 const struct elf_backend_data *bed;
9681 unsigned int log_file_align;
9682
9683 if (h->root.type == bfd_link_hash_warning)
9684 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9685
9686 /* Take care of both those symbols that do not describe vtables as
9687 well as those that are not loaded. */
f6e332e6 9688 if (h->vtable == NULL || h->vtable->parent == NULL)
c152c796
AM
9689 return TRUE;
9690
9691 BFD_ASSERT (h->root.type == bfd_link_hash_defined
9692 || h->root.type == bfd_link_hash_defweak);
9693
9694 sec = h->root.u.def.section;
9695 hstart = h->root.u.def.value;
9696 hend = hstart + h->size;
9697
9698 relstart = _bfd_elf_link_read_relocs (sec->owner, sec, NULL, NULL, TRUE);
9699 if (!relstart)
9700 return *(bfd_boolean *) okp = FALSE;
9701 bed = get_elf_backend_data (sec->owner);
9702 log_file_align = bed->s->log_file_align;
9703
9704 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
9705
9706 for (rel = relstart; rel < relend; ++rel)
9707 if (rel->r_offset >= hstart && rel->r_offset < hend)
9708 {
9709 /* If the entry is in use, do nothing. */
f6e332e6
AM
9710 if (h->vtable->used
9711 && (rel->r_offset - hstart) < h->vtable->size)
c152c796
AM
9712 {
9713 bfd_vma entry = (rel->r_offset - hstart) >> log_file_align;
f6e332e6 9714 if (h->vtable->used[entry])
c152c796
AM
9715 continue;
9716 }
9717 /* Otherwise, kill it. */
9718 rel->r_offset = rel->r_info = rel->r_addend = 0;
9719 }
9720
9721 return TRUE;
9722}
9723
87538722
AM
9724/* Mark sections containing dynamically referenced symbols. When
9725 building shared libraries, we must assume that any visible symbol is
9726 referenced. */
715df9b8 9727
64d03ab5
AM
9728bfd_boolean
9729bfd_elf_gc_mark_dynamic_ref_symbol (struct elf_link_hash_entry *h, void *inf)
715df9b8 9730{
87538722
AM
9731 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9732
715df9b8
EB
9733 if (h->root.type == bfd_link_hash_warning)
9734 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9735
9736 if ((h->root.type == bfd_link_hash_defined
9737 || h->root.type == bfd_link_hash_defweak)
87538722 9738 && (h->ref_dynamic
5adcfd8b 9739 || (!info->executable
87538722
AM
9740 && h->def_regular
9741 && ELF_ST_VISIBILITY (h->other) != STV_INTERNAL
9742 && ELF_ST_VISIBILITY (h->other) != STV_HIDDEN)))
715df9b8
EB
9743 h->root.u.def.section->flags |= SEC_KEEP;
9744
9745 return TRUE;
9746}
3b36f7e6 9747
c152c796
AM
9748/* Do mark and sweep of unused sections. */
9749
9750bfd_boolean
9751bfd_elf_gc_sections (bfd *abfd, struct bfd_link_info *info)
9752{
9753 bfd_boolean ok = TRUE;
9754 bfd *sub;
9755 asection * (*gc_mark_hook)
9756 (asection *, struct bfd_link_info *, Elf_Internal_Rela *,
9757 struct elf_link_hash_entry *h, Elf_Internal_Sym *);
64d03ab5 9758 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
c152c796 9759
64d03ab5 9760 if (!bed->can_gc_sections
c152c796
AM
9761 || info->relocatable
9762 || info->emitrelocations
715df9b8 9763 || !is_elf_hash_table (info->hash))
c152c796
AM
9764 {
9765 (*_bfd_error_handler)(_("Warning: gc-sections option ignored"));
9766 return TRUE;
9767 }
9768
9769 /* Apply transitive closure to the vtable entry usage info. */
9770 elf_link_hash_traverse (elf_hash_table (info),
9771 elf_gc_propagate_vtable_entries_used,
9772 &ok);
9773 if (!ok)
9774 return FALSE;
9775
9776 /* Kill the vtable relocations that were not used. */
9777 elf_link_hash_traverse (elf_hash_table (info),
9778 elf_gc_smash_unused_vtentry_relocs,
9779 &ok);
9780 if (!ok)
9781 return FALSE;
9782
715df9b8
EB
9783 /* Mark dynamically referenced symbols. */
9784 if (elf_hash_table (info)->dynamic_sections_created)
9785 elf_link_hash_traverse (elf_hash_table (info),
64d03ab5 9786 bed->gc_mark_dynamic_ref,
87538722 9787 info);
c152c796 9788
715df9b8 9789 /* Grovel through relocs to find out who stays ... */
64d03ab5 9790 gc_mark_hook = bed->gc_mark_hook;
c152c796
AM
9791 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
9792 {
9793 asection *o;
9794
9795 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
9796 continue;
9797
9798 for (o = sub->sections; o != NULL; o = o->next)
a14a5de3 9799 if ((o->flags & (SEC_EXCLUDE | SEC_KEEP)) == SEC_KEEP && !o->gc_mark)
39c2f51b
AM
9800 if (!_bfd_elf_gc_mark (info, o, gc_mark_hook))
9801 return FALSE;
c152c796
AM
9802 }
9803
9e8cc8b4
AM
9804 /* ... again for sections marked from eh_frame. */
9805 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
9806 {
9807 asection *o;
9808
9809 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
9810 continue;
9811
a48710b3
EB
9812 /* Keep .gcc_except_table.* if the associated .text.* (or the
9813 associated .gnu.linkonce.t.* if .text.* doesn't exist) is
9e8cc8b4 9814 marked. This isn't very nice, but the proper solution,
2de92251 9815 splitting .eh_frame up and using comdat doesn't pan out
9e8cc8b4
AM
9816 easily due to needing special relocs to handle the
9817 difference of two symbols in separate sections.
9818 Don't keep code sections referenced by .eh_frame. */
ea9986ff 9819#define TEXT_PREFIX ".text."
a48710b3 9820#define TEXT_PREFIX2 ".gnu.linkonce.t."
ea9986ff 9821#define GCC_EXCEPT_TABLE_PREFIX ".gcc_except_table."
9e8cc8b4
AM
9822 for (o = sub->sections; o != NULL; o = o->next)
9823 if (!o->gc_mark && o->gc_mark_from_eh && (o->flags & SEC_CODE) == 0)
9824 {
ea9986ff 9825 if (CONST_STRNEQ (o->name, GCC_EXCEPT_TABLE_PREFIX))
9e8cc8b4 9826 {
9e8cc8b4 9827 char *fn_name;
ea9986ff 9828 const char *sec_name;
9e8cc8b4 9829 asection *fn_text;
a48710b3 9830 unsigned o_name_prefix_len , fn_name_prefix_len, tmp;
9e8cc8b4 9831
a48710b3 9832 o_name_prefix_len = strlen (GCC_EXCEPT_TABLE_PREFIX);
ea9986ff 9833 sec_name = o->name + o_name_prefix_len;
a48710b3
EB
9834 fn_name_prefix_len = strlen (TEXT_PREFIX);
9835 tmp = strlen (TEXT_PREFIX2);
9836 if (tmp > fn_name_prefix_len)
9837 fn_name_prefix_len = tmp;
9838 fn_name
9839 = bfd_malloc (fn_name_prefix_len + strlen (sec_name) + 1);
9e8cc8b4
AM
9840 if (fn_name == NULL)
9841 return FALSE;
a48710b3
EB
9842
9843 /* Try the first prefix. */
ea9986ff 9844 sprintf (fn_name, "%s%s", TEXT_PREFIX, sec_name);
9e8cc8b4 9845 fn_text = bfd_get_section_by_name (sub, fn_name);
a48710b3
EB
9846
9847 /* Try the second prefix. */
9848 if (fn_text == NULL)
9849 {
9850 sprintf (fn_name, "%s%s", TEXT_PREFIX2, sec_name);
9851 fn_text = bfd_get_section_by_name (sub, fn_name);
9852 }
9853
9e8cc8b4
AM
9854 free (fn_name);
9855 if (fn_text == NULL || !fn_text->gc_mark)
9856 continue;
9857 }
9858
9859 /* If not using specially named exception table section,
9860 then keep whatever we are using. */
9861 if (!_bfd_elf_gc_mark (info, o, gc_mark_hook))
9862 return FALSE;
9863 }
9864 }
9865
c152c796 9866 /* ... and mark SEC_EXCLUDE for those that go. */
ccabcbe5 9867 return elf_gc_sweep (abfd, info);
c152c796
AM
9868}
9869\f
9870/* Called from check_relocs to record the existence of a VTINHERIT reloc. */
9871
9872bfd_boolean
9873bfd_elf_gc_record_vtinherit (bfd *abfd,
9874 asection *sec,
9875 struct elf_link_hash_entry *h,
9876 bfd_vma offset)
9877{
9878 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
9879 struct elf_link_hash_entry **search, *child;
9880 bfd_size_type extsymcount;
9881 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9882
9883 /* The sh_info field of the symtab header tells us where the
9884 external symbols start. We don't care about the local symbols at
9885 this point. */
9886 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size / bed->s->sizeof_sym;
9887 if (!elf_bad_symtab (abfd))
9888 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
9889
9890 sym_hashes = elf_sym_hashes (abfd);
9891 sym_hashes_end = sym_hashes + extsymcount;
9892
9893 /* Hunt down the child symbol, which is in this section at the same
9894 offset as the relocation. */
9895 for (search = sym_hashes; search != sym_hashes_end; ++search)
9896 {
9897 if ((child = *search) != NULL
9898 && (child->root.type == bfd_link_hash_defined
9899 || child->root.type == bfd_link_hash_defweak)
9900 && child->root.u.def.section == sec
9901 && child->root.u.def.value == offset)
9902 goto win;
9903 }
9904
d003868e
AM
9905 (*_bfd_error_handler) ("%B: %A+%lu: No symbol found for INHERIT",
9906 abfd, sec, (unsigned long) offset);
c152c796
AM
9907 bfd_set_error (bfd_error_invalid_operation);
9908 return FALSE;
9909
9910 win:
f6e332e6
AM
9911 if (!child->vtable)
9912 {
9913 child->vtable = bfd_zalloc (abfd, sizeof (*child->vtable));
9914 if (!child->vtable)
9915 return FALSE;
9916 }
c152c796
AM
9917 if (!h)
9918 {
9919 /* This *should* only be the absolute section. It could potentially
9920 be that someone has defined a non-global vtable though, which
9921 would be bad. It isn't worth paging in the local symbols to be
9922 sure though; that case should simply be handled by the assembler. */
9923
f6e332e6 9924 child->vtable->parent = (struct elf_link_hash_entry *) -1;
c152c796
AM
9925 }
9926 else
f6e332e6 9927 child->vtable->parent = h;
c152c796
AM
9928
9929 return TRUE;
9930}
9931
9932/* Called from check_relocs to record the existence of a VTENTRY reloc. */
9933
9934bfd_boolean
9935bfd_elf_gc_record_vtentry (bfd *abfd ATTRIBUTE_UNUSED,
9936 asection *sec ATTRIBUTE_UNUSED,
9937 struct elf_link_hash_entry *h,
9938 bfd_vma addend)
9939{
9940 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
9941 unsigned int log_file_align = bed->s->log_file_align;
9942
f6e332e6
AM
9943 if (!h->vtable)
9944 {
9945 h->vtable = bfd_zalloc (abfd, sizeof (*h->vtable));
9946 if (!h->vtable)
9947 return FALSE;
9948 }
9949
9950 if (addend >= h->vtable->size)
c152c796
AM
9951 {
9952 size_t size, bytes, file_align;
f6e332e6 9953 bfd_boolean *ptr = h->vtable->used;
c152c796
AM
9954
9955 /* While the symbol is undefined, we have to be prepared to handle
9956 a zero size. */
9957 file_align = 1 << log_file_align;
9958 if (h->root.type == bfd_link_hash_undefined)
9959 size = addend + file_align;
9960 else
9961 {
9962 size = h->size;
9963 if (addend >= size)
9964 {
9965 /* Oops! We've got a reference past the defined end of
9966 the table. This is probably a bug -- shall we warn? */
9967 size = addend + file_align;
9968 }
9969 }
9970 size = (size + file_align - 1) & -file_align;
9971
9972 /* Allocate one extra entry for use as a "done" flag for the
9973 consolidation pass. */
9974 bytes = ((size >> log_file_align) + 1) * sizeof (bfd_boolean);
9975
9976 if (ptr)
9977 {
9978 ptr = bfd_realloc (ptr - 1, bytes);
9979
9980 if (ptr != NULL)
9981 {
9982 size_t oldbytes;
9983
f6e332e6 9984 oldbytes = (((h->vtable->size >> log_file_align) + 1)
c152c796
AM
9985 * sizeof (bfd_boolean));
9986 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
9987 }
9988 }
9989 else
9990 ptr = bfd_zmalloc (bytes);
9991
9992 if (ptr == NULL)
9993 return FALSE;
9994
9995 /* And arrange for that done flag to be at index -1. */
f6e332e6
AM
9996 h->vtable->used = ptr + 1;
9997 h->vtable->size = size;
c152c796
AM
9998 }
9999
f6e332e6 10000 h->vtable->used[addend >> log_file_align] = TRUE;
c152c796
AM
10001
10002 return TRUE;
10003}
10004
10005struct alloc_got_off_arg {
10006 bfd_vma gotoff;
10007 unsigned int got_elt_size;
10008};
10009
10010/* We need a special top-level link routine to convert got reference counts
10011 to real got offsets. */
10012
10013static bfd_boolean
10014elf_gc_allocate_got_offsets (struct elf_link_hash_entry *h, void *arg)
10015{
10016 struct alloc_got_off_arg *gofarg = arg;
10017
10018 if (h->root.type == bfd_link_hash_warning)
10019 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10020
10021 if (h->got.refcount > 0)
10022 {
10023 h->got.offset = gofarg->gotoff;
10024 gofarg->gotoff += gofarg->got_elt_size;
10025 }
10026 else
10027 h->got.offset = (bfd_vma) -1;
10028
10029 return TRUE;
10030}
10031
10032/* And an accompanying bit to work out final got entry offsets once
10033 we're done. Should be called from final_link. */
10034
10035bfd_boolean
10036bfd_elf_gc_common_finalize_got_offsets (bfd *abfd,
10037 struct bfd_link_info *info)
10038{
10039 bfd *i;
10040 const struct elf_backend_data *bed = get_elf_backend_data (abfd);
10041 bfd_vma gotoff;
10042 unsigned int got_elt_size = bed->s->arch_size / 8;
10043 struct alloc_got_off_arg gofarg;
10044
10045 if (! is_elf_hash_table (info->hash))
10046 return FALSE;
10047
10048 /* The GOT offset is relative to the .got section, but the GOT header is
10049 put into the .got.plt section, if the backend uses it. */
10050 if (bed->want_got_plt)
10051 gotoff = 0;
10052 else
10053 gotoff = bed->got_header_size;
10054
10055 /* Do the local .got entries first. */
10056 for (i = info->input_bfds; i; i = i->link_next)
10057 {
10058 bfd_signed_vma *local_got;
10059 bfd_size_type j, locsymcount;
10060 Elf_Internal_Shdr *symtab_hdr;
10061
10062 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
10063 continue;
10064
10065 local_got = elf_local_got_refcounts (i);
10066 if (!local_got)
10067 continue;
10068
10069 symtab_hdr = &elf_tdata (i)->symtab_hdr;
10070 if (elf_bad_symtab (i))
10071 locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
10072 else
10073 locsymcount = symtab_hdr->sh_info;
10074
10075 for (j = 0; j < locsymcount; ++j)
10076 {
10077 if (local_got[j] > 0)
10078 {
10079 local_got[j] = gotoff;
10080 gotoff += got_elt_size;
10081 }
10082 else
10083 local_got[j] = (bfd_vma) -1;
10084 }
10085 }
10086
10087 /* Then the global .got entries. .plt refcounts are handled by
10088 adjust_dynamic_symbol */
10089 gofarg.gotoff = gotoff;
10090 gofarg.got_elt_size = got_elt_size;
10091 elf_link_hash_traverse (elf_hash_table (info),
10092 elf_gc_allocate_got_offsets,
10093 &gofarg);
10094 return TRUE;
10095}
10096
10097/* Many folk need no more in the way of final link than this, once
10098 got entry reference counting is enabled. */
10099
10100bfd_boolean
10101bfd_elf_gc_common_final_link (bfd *abfd, struct bfd_link_info *info)
10102{
10103 if (!bfd_elf_gc_common_finalize_got_offsets (abfd, info))
10104 return FALSE;
10105
10106 /* Invoke the regular ELF backend linker to do all the work. */
10107 return bfd_elf_final_link (abfd, info);
10108}
10109
10110bfd_boolean
10111bfd_elf_reloc_symbol_deleted_p (bfd_vma offset, void *cookie)
10112{
10113 struct elf_reloc_cookie *rcookie = cookie;
10114
10115 if (rcookie->bad_symtab)
10116 rcookie->rel = rcookie->rels;
10117
10118 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
10119 {
10120 unsigned long r_symndx;
10121
10122 if (! rcookie->bad_symtab)
10123 if (rcookie->rel->r_offset > offset)
10124 return FALSE;
10125 if (rcookie->rel->r_offset != offset)
10126 continue;
10127
10128 r_symndx = rcookie->rel->r_info >> rcookie->r_sym_shift;
10129 if (r_symndx == SHN_UNDEF)
10130 return TRUE;
10131
10132 if (r_symndx >= rcookie->locsymcount
10133 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
10134 {
10135 struct elf_link_hash_entry *h;
10136
10137 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
10138
10139 while (h->root.type == bfd_link_hash_indirect
10140 || h->root.type == bfd_link_hash_warning)
10141 h = (struct elf_link_hash_entry *) h->root.u.i.link;
10142
10143 if ((h->root.type == bfd_link_hash_defined
10144 || h->root.type == bfd_link_hash_defweak)
10145 && elf_discarded_section (h->root.u.def.section))
10146 return TRUE;
10147 else
10148 return FALSE;
10149 }
10150 else
10151 {
10152 /* It's not a relocation against a global symbol,
10153 but it could be a relocation against a local
10154 symbol for a discarded section. */
10155 asection *isec;
10156 Elf_Internal_Sym *isym;
10157
10158 /* Need to: get the symbol; get the section. */
10159 isym = &rcookie->locsyms[r_symndx];
10160 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
10161 {
10162 isec = bfd_section_from_elf_index (rcookie->abfd, isym->st_shndx);
10163 if (isec != NULL && elf_discarded_section (isec))
10164 return TRUE;
10165 }
10166 }
10167 return FALSE;
10168 }
10169 return FALSE;
10170}
10171
10172/* Discard unneeded references to discarded sections.
10173 Returns TRUE if any section's size was changed. */
10174/* This function assumes that the relocations are in sorted order,
10175 which is true for all known assemblers. */
10176
10177bfd_boolean
10178bfd_elf_discard_info (bfd *output_bfd, struct bfd_link_info *info)
10179{
10180 struct elf_reloc_cookie cookie;
10181 asection *stab, *eh;
10182 Elf_Internal_Shdr *symtab_hdr;
10183 const struct elf_backend_data *bed;
10184 bfd *abfd;
10185 unsigned int count;
10186 bfd_boolean ret = FALSE;
10187
10188 if (info->traditional_format
10189 || !is_elf_hash_table (info->hash))
10190 return FALSE;
10191
10192 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
10193 {
10194 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
10195 continue;
10196
10197 bed = get_elf_backend_data (abfd);
10198
10199 if ((abfd->flags & DYNAMIC) != 0)
10200 continue;
10201
10202 eh = bfd_get_section_by_name (abfd, ".eh_frame");
10203 if (info->relocatable
10204 || (eh != NULL
eea6121a 10205 && (eh->size == 0
c152c796
AM
10206 || bfd_is_abs_section (eh->output_section))))
10207 eh = NULL;
10208
10209 stab = bfd_get_section_by_name (abfd, ".stab");
10210 if (stab != NULL
eea6121a 10211 && (stab->size == 0
c152c796
AM
10212 || bfd_is_abs_section (stab->output_section)
10213 || stab->sec_info_type != ELF_INFO_TYPE_STABS))
10214 stab = NULL;
10215
10216 if (stab == NULL
10217 && eh == NULL
10218 && bed->elf_backend_discard_info == NULL)
10219 continue;
10220
10221 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
10222 cookie.abfd = abfd;
10223 cookie.sym_hashes = elf_sym_hashes (abfd);
10224 cookie.bad_symtab = elf_bad_symtab (abfd);
10225 if (cookie.bad_symtab)
10226 {
10227 cookie.locsymcount = symtab_hdr->sh_size / bed->s->sizeof_sym;
10228 cookie.extsymoff = 0;
10229 }
10230 else
10231 {
10232 cookie.locsymcount = symtab_hdr->sh_info;
10233 cookie.extsymoff = symtab_hdr->sh_info;
10234 }
10235
10236 if (bed->s->arch_size == 32)
10237 cookie.r_sym_shift = 8;
10238 else
10239 cookie.r_sym_shift = 32;
10240
10241 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
10242 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
10243 {
10244 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
10245 cookie.locsymcount, 0,
10246 NULL, NULL, NULL);
10247 if (cookie.locsyms == NULL)
10248 return FALSE;
10249 }
10250
10251 if (stab != NULL)
10252 {
10253 cookie.rels = NULL;
10254 count = stab->reloc_count;
10255 if (count != 0)
10256 cookie.rels = _bfd_elf_link_read_relocs (abfd, stab, NULL, NULL,
10257 info->keep_memory);
10258 if (cookie.rels != NULL)
10259 {
10260 cookie.rel = cookie.rels;
10261 cookie.relend = cookie.rels;
10262 cookie.relend += count * bed->s->int_rels_per_ext_rel;
10263 if (_bfd_discard_section_stabs (abfd, stab,
10264 elf_section_data (stab)->sec_info,
10265 bfd_elf_reloc_symbol_deleted_p,
10266 &cookie))
10267 ret = TRUE;
10268 if (elf_section_data (stab)->relocs != cookie.rels)
10269 free (cookie.rels);
10270 }
10271 }
10272
10273 if (eh != NULL)
10274 {
10275 cookie.rels = NULL;
10276 count = eh->reloc_count;
10277 if (count != 0)
10278 cookie.rels = _bfd_elf_link_read_relocs (abfd, eh, NULL, NULL,
10279 info->keep_memory);
10280 cookie.rel = cookie.rels;
10281 cookie.relend = cookie.rels;
10282 if (cookie.rels != NULL)
10283 cookie.relend += count * bed->s->int_rels_per_ext_rel;
10284
10285 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh,
10286 bfd_elf_reloc_symbol_deleted_p,
10287 &cookie))
10288 ret = TRUE;
10289
10290 if (cookie.rels != NULL
10291 && elf_section_data (eh)->relocs != cookie.rels)
10292 free (cookie.rels);
10293 }
10294
10295 if (bed->elf_backend_discard_info != NULL
10296 && (*bed->elf_backend_discard_info) (abfd, &cookie, info))
10297 ret = TRUE;
10298
10299 if (cookie.locsyms != NULL
10300 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
10301 {
10302 if (! info->keep_memory)
10303 free (cookie.locsyms);
10304 else
10305 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
10306 }
10307 }
10308
10309 if (info->eh_frame_hdr
10310 && !info->relocatable
10311 && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info))
10312 ret = TRUE;
10313
10314 return ret;
10315}
082b7297
L
10316
10317void
c0f00686
L
10318_bfd_elf_section_already_linked (bfd *abfd, struct bfd_section *sec,
10319 struct bfd_link_info *info)
082b7297
L
10320{
10321 flagword flags;
6d2cd210 10322 const char *name, *p;
082b7297
L
10323 struct bfd_section_already_linked *l;
10324 struct bfd_section_already_linked_hash_entry *already_linked_list;
3d7f7666 10325
3d7f7666
L
10326 if (sec->output_section == bfd_abs_section_ptr)
10327 return;
082b7297
L
10328
10329 flags = sec->flags;
3d7f7666 10330
c2370991
AM
10331 /* Return if it isn't a linkonce section. A comdat group section
10332 also has SEC_LINK_ONCE set. */
10333 if ((flags & SEC_LINK_ONCE) == 0)
082b7297
L
10334 return;
10335
c2370991
AM
10336 /* Don't put group member sections on our list of already linked
10337 sections. They are handled as a group via their group section. */
10338 if (elf_sec_group (sec) != NULL)
10339 return;
3d7f7666 10340
082b7297
L
10341 /* FIXME: When doing a relocatable link, we may have trouble
10342 copying relocations in other sections that refer to local symbols
10343 in the section being discarded. Those relocations will have to
10344 be converted somehow; as of this writing I'm not sure that any of
10345 the backends handle that correctly.
10346
10347 It is tempting to instead not discard link once sections when
10348 doing a relocatable link (technically, they should be discarded
10349 whenever we are building constructors). However, that fails,
10350 because the linker winds up combining all the link once sections
10351 into a single large link once section, which defeats the purpose
10352 of having link once sections in the first place.
10353
10354 Also, not merging link once sections in a relocatable link
10355 causes trouble for MIPS ELF, which relies on link once semantics
10356 to handle the .reginfo section correctly. */
10357
10358 name = bfd_get_section_name (abfd, sec);
10359
0112cd26 10360 if (CONST_STRNEQ (name, ".gnu.linkonce.")
6d2cd210
JJ
10361 && (p = strchr (name + sizeof (".gnu.linkonce.") - 1, '.')) != NULL)
10362 p++;
10363 else
10364 p = name;
10365
10366 already_linked_list = bfd_section_already_linked_table_lookup (p);
082b7297
L
10367
10368 for (l = already_linked_list->entry; l != NULL; l = l->next)
10369 {
c2370991
AM
10370 /* We may have 2 different types of sections on the list: group
10371 sections and linkonce sections. Match like sections. */
3d7f7666 10372 if ((flags & SEC_GROUP) == (l->sec->flags & SEC_GROUP)
6d2cd210 10373 && strcmp (name, l->sec->name) == 0
082b7297
L
10374 && bfd_coff_get_comdat_section (l->sec->owner, l->sec) == NULL)
10375 {
10376 /* The section has already been linked. See if we should
6d2cd210 10377 issue a warning. */
082b7297
L
10378 switch (flags & SEC_LINK_DUPLICATES)
10379 {
10380 default:
10381 abort ();
10382
10383 case SEC_LINK_DUPLICATES_DISCARD:
10384 break;
10385
10386 case SEC_LINK_DUPLICATES_ONE_ONLY:
10387 (*_bfd_error_handler)
c93625e2 10388 (_("%B: ignoring duplicate section `%A'"),
d003868e 10389 abfd, sec);
082b7297
L
10390 break;
10391
10392 case SEC_LINK_DUPLICATES_SAME_SIZE:
10393 if (sec->size != l->sec->size)
10394 (*_bfd_error_handler)
c93625e2 10395 (_("%B: duplicate section `%A' has different size"),
d003868e 10396 abfd, sec);
082b7297 10397 break;
ea5158d8
DJ
10398
10399 case SEC_LINK_DUPLICATES_SAME_CONTENTS:
10400 if (sec->size != l->sec->size)
10401 (*_bfd_error_handler)
c93625e2 10402 (_("%B: duplicate section `%A' has different size"),
ea5158d8
DJ
10403 abfd, sec);
10404 else if (sec->size != 0)
10405 {
10406 bfd_byte *sec_contents, *l_sec_contents;
10407
10408 if (!bfd_malloc_and_get_section (abfd, sec, &sec_contents))
10409 (*_bfd_error_handler)
c93625e2 10410 (_("%B: warning: could not read contents of section `%A'"),
ea5158d8
DJ
10411 abfd, sec);
10412 else if (!bfd_malloc_and_get_section (l->sec->owner, l->sec,
10413 &l_sec_contents))
10414 (*_bfd_error_handler)
c93625e2 10415 (_("%B: warning: could not read contents of section `%A'"),
ea5158d8
DJ
10416 l->sec->owner, l->sec);
10417 else if (memcmp (sec_contents, l_sec_contents, sec->size) != 0)
10418 (*_bfd_error_handler)
c93625e2 10419 (_("%B: warning: duplicate section `%A' has different contents"),
ea5158d8
DJ
10420 abfd, sec);
10421
10422 if (sec_contents)
10423 free (sec_contents);
10424 if (l_sec_contents)
10425 free (l_sec_contents);
10426 }
10427 break;
082b7297
L
10428 }
10429
10430 /* Set the output_section field so that lang_add_section
10431 does not create a lang_input_section structure for this
10432 section. Since there might be a symbol in the section
10433 being discarded, we must retain a pointer to the section
10434 which we are really going to use. */
10435 sec->output_section = bfd_abs_section_ptr;
10436 sec->kept_section = l->sec;
3b36f7e6 10437
082b7297 10438 if (flags & SEC_GROUP)
3d7f7666
L
10439 {
10440 asection *first = elf_next_in_group (sec);
10441 asection *s = first;
10442
10443 while (s != NULL)
10444 {
10445 s->output_section = bfd_abs_section_ptr;
10446 /* Record which group discards it. */
10447 s->kept_section = l->sec;
10448 s = elf_next_in_group (s);
10449 /* These lists are circular. */
10450 if (s == first)
10451 break;
10452 }
10453 }
082b7297
L
10454
10455 return;
10456 }
10457 }
10458
c2370991
AM
10459 /* A single member comdat group section may be discarded by a
10460 linkonce section and vice versa. */
10461
10462 if ((flags & SEC_GROUP) != 0)
3d7f7666 10463 {
c2370991
AM
10464 asection *first = elf_next_in_group (sec);
10465
10466 if (first != NULL && elf_next_in_group (first) == first)
10467 /* Check this single member group against linkonce sections. */
10468 for (l = already_linked_list->entry; l != NULL; l = l->next)
10469 if ((l->sec->flags & SEC_GROUP) == 0
10470 && bfd_coff_get_comdat_section (l->sec->owner, l->sec) == NULL
10471 && bfd_elf_match_symbols_in_sections (l->sec, first, info))
10472 {
10473 first->output_section = bfd_abs_section_ptr;
10474 first->kept_section = l->sec;
10475 sec->output_section = bfd_abs_section_ptr;
10476 break;
10477 }
3d7f7666
L
10478 }
10479 else
c2370991 10480 /* Check this linkonce section against single member groups. */
6d2cd210
JJ
10481 for (l = already_linked_list->entry; l != NULL; l = l->next)
10482 if (l->sec->flags & SEC_GROUP)
10483 {
10484 asection *first = elf_next_in_group (l->sec);
10485
10486 if (first != NULL
10487 && elf_next_in_group (first) == first
c0f00686 10488 && bfd_elf_match_symbols_in_sections (first, sec, info))
6d2cd210
JJ
10489 {
10490 sec->output_section = bfd_abs_section_ptr;
c2370991 10491 sec->kept_section = first;
6d2cd210
JJ
10492 break;
10493 }
10494 }
10495
082b7297
L
10496 /* This is the first section with this name. Record it. */
10497 bfd_section_already_linked_table_insert (already_linked_list, sec);
10498}
81e1b023 10499
a4d8e49b
L
10500bfd_boolean
10501_bfd_elf_common_definition (Elf_Internal_Sym *sym)
10502{
10503 return sym->st_shndx == SHN_COMMON;
10504}
10505
10506unsigned int
10507_bfd_elf_common_section_index (asection *sec ATTRIBUTE_UNUSED)
10508{
10509 return SHN_COMMON;
10510}
10511
10512asection *
10513_bfd_elf_common_section (asection *sec ATTRIBUTE_UNUSED)
10514{
10515 return bfd_com_section_ptr;
10516}
This page took 1.153606 seconds and 4 git commands to generate.