* elflink.h (struct elf_final_link_info): Add shndxbuf_size.
[deliverable/binutils-gdb.git] / bfd / elflink.h
CommitLineData
252b5132 1/* ELF linker support.
c8e5ddc8 2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002
7898deda 3 Free Software Foundation, Inc.
252b5132
RH
4
5This file is part of BFD, the Binary File Descriptor library.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21/* ELF linker code. */
22
23/* This struct is used to pass information to routines called via
24 elf_link_hash_traverse which must return failure. */
25
26struct elf_info_failed
27{
28 boolean failed;
29 struct bfd_link_info *info;
bc2b6df7 30 struct bfd_elf_version_tree *verdefs;
252b5132
RH
31};
32
a7b97311
AM
33static boolean is_global_data_symbol_definition
34 PARAMS ((bfd *, Elf_Internal_Sym *));
35static boolean elf_link_is_defined_archive_symbol
36 PARAMS ((bfd *, carsym *));
252b5132
RH
37static boolean elf_link_add_object_symbols
38 PARAMS ((bfd *, struct bfd_link_info *));
39static boolean elf_link_add_archive_symbols
40 PARAMS ((bfd *, struct bfd_link_info *));
41static boolean elf_merge_symbol
215007a6
L
42 PARAMS ((bfd *, struct bfd_link_info *, const char *,
43 Elf_Internal_Sym *, asection **, bfd_vma *,
44 struct elf_link_hash_entry **, boolean *, boolean *,
45 boolean *, boolean));
46static boolean elf_add_default_symbol
47 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
48 const char *, Elf_Internal_Sym *, asection **, bfd_vma *,
49 boolean *, boolean, boolean));
252b5132
RH
50static boolean elf_export_symbol
51 PARAMS ((struct elf_link_hash_entry *, PTR));
2b0f7ef9
JJ
52static boolean elf_finalize_dynstr
53 PARAMS ((bfd *, struct bfd_link_info *));
252b5132
RH
54static boolean elf_fix_symbol_flags
55 PARAMS ((struct elf_link_hash_entry *, struct elf_info_failed *));
56static boolean elf_adjust_dynamic_symbol
57 PARAMS ((struct elf_link_hash_entry *, PTR));
58static boolean elf_link_find_version_dependencies
59 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
60static boolean elf_link_assign_sym_version
61 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
62static boolean elf_collect_hash_codes
63 PARAMS ((struct elf_link_hash_entry *, PTR));
3e932841 64static boolean elf_link_read_relocs_from_section
6b5bd373 65 PARAMS ((bfd *, Elf_Internal_Shdr *, PTR, Elf_Internal_Rela *));
a7b97311
AM
66static size_t compute_bucket_count
67 PARAMS ((struct bfd_link_info *));
41241523 68static boolean elf_link_output_relocs
23bc299b
MM
69 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *));
70static boolean elf_link_size_reloc_section
71 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
3e932841
KH
72static void elf_link_adjust_relocs
73 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned int,
31367b81 74 struct elf_link_hash_entry **));
db6751f2
JJ
75static int elf_link_sort_cmp1
76 PARAMS ((const void *, const void *));
77static int elf_link_sort_cmp2
78 PARAMS ((const void *, const void *));
79static size_t elf_link_sort_relocs
80 PARAMS ((bfd *, struct bfd_link_info *, asection **));
73d074b4
DJ
81static boolean elf_section_ignore_discarded_relocs
82 PARAMS ((asection *));
252b5132
RH
83
84/* Given an ELF BFD, add symbols to the global hash table as
85 appropriate. */
86
87boolean
88elf_bfd_link_add_symbols (abfd, info)
89 bfd *abfd;
90 struct bfd_link_info *info;
91{
92 switch (bfd_get_format (abfd))
93 {
94 case bfd_object:
95 return elf_link_add_object_symbols (abfd, info);
96 case bfd_archive:
97 return elf_link_add_archive_symbols (abfd, info);
98 default:
99 bfd_set_error (bfd_error_wrong_format);
100 return false;
101 }
102}
103\f
7da9d88f 104/* Return true iff this is a non-common, definition of a non-function symbol. */
48dfb430 105static boolean
7da9d88f 106is_global_data_symbol_definition (abfd, sym)
86033394 107 bfd * abfd ATTRIBUTE_UNUSED;
48dfb430
NC
108 Elf_Internal_Sym * sym;
109{
110 /* Local symbols do not count, but target specific ones might. */
111 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
112 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
113 return false;
114
7da9d88f
NC
115 /* Function symbols do not count. */
116 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
117 return false;
118
48dfb430
NC
119 /* If the section is undefined, then so is the symbol. */
120 if (sym->st_shndx == SHN_UNDEF)
121 return false;
3e932841 122
48dfb430
NC
123 /* If the symbol is defined in the common section, then
124 it is a common definition and so does not count. */
125 if (sym->st_shndx == SHN_COMMON)
126 return false;
127
128 /* If the symbol is in a target specific section then we
129 must rely upon the backend to tell us what it is. */
130 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
131 /* FIXME - this function is not coded yet:
3e932841 132
48dfb430 133 return _bfd_is_global_symbol_definition (abfd, sym);
3e932841 134
48dfb430
NC
135 Instead for now assume that the definition is not global,
136 Even if this is wrong, at least the linker will behave
137 in the same way that it used to do. */
138 return false;
3e932841 139
48dfb430
NC
140 return true;
141}
142
a3a8c91d 143/* Search the symbol table of the archive element of the archive ABFD
4e8a9624 144 whose archive map contains a mention of SYMDEF, and determine if
a3a8c91d
NC
145 the symbol is defined in this element. */
146static boolean
147elf_link_is_defined_archive_symbol (abfd, symdef)
148 bfd * abfd;
149 carsym * symdef;
150{
151 Elf_Internal_Shdr * hdr;
dc810e39
AM
152 bfd_size_type symcount;
153 bfd_size_type extsymcount;
154 bfd_size_type extsymoff;
6cdc0ccc
AM
155 Elf_Internal_Sym *isymbuf;
156 Elf_Internal_Sym *isym;
157 Elf_Internal_Sym *isymend;
158 boolean result;
3e932841 159
a3a8c91d
NC
160 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
161 if (abfd == (bfd *) NULL)
162 return false;
163
164 if (! bfd_check_format (abfd, bfd_object))
165 return false;
166
48dfb430
NC
167 /* If we have already included the element containing this symbol in the
168 link then we do not need to include it again. Just claim that any symbol
169 it contains is not a definition, so that our caller will not decide to
170 (re)include this element. */
171 if (abfd->archive_pass)
172 return false;
3e932841 173
a3a8c91d
NC
174 /* Select the appropriate symbol table. */
175 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
6cdc0ccc 176 hdr = &elf_tdata (abfd)->symtab_hdr;
a3a8c91d 177 else
6cdc0ccc 178 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
a3a8c91d
NC
179
180 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
181
182 /* The sh_info field of the symtab header tells us where the
183 external symbols start. We don't care about the local symbols. */
184 if (elf_bad_symtab (abfd))
185 {
186 extsymcount = symcount;
187 extsymoff = 0;
188 }
189 else
190 {
191 extsymcount = symcount - hdr->sh_info;
192 extsymoff = hdr->sh_info;
193 }
194
6cdc0ccc 195 if (extsymcount == 0)
a3a8c91d
NC
196 return false;
197
6cdc0ccc
AM
198 /* Read in the symbol table. */
199 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
200 NULL, NULL, NULL);
201 if (isymbuf == NULL)
202 return false;
a3a8c91d
NC
203
204 /* Scan the symbol table looking for SYMDEF. */
6cdc0ccc
AM
205 result = false;
206 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
a3a8c91d 207 {
6cdc0ccc 208 const char *name;
a3a8c91d 209
6cdc0ccc
AM
210 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
211 isym->st_name);
a3a8c91d
NC
212 if (name == (const char *) NULL)
213 break;
214
215 if (strcmp (name, symdef->name) == 0)
216 {
6cdc0ccc 217 result = is_global_data_symbol_definition (abfd, isym);
a3a8c91d
NC
218 break;
219 }
220 }
221
6cdc0ccc 222 free (isymbuf);
3e932841 223
a3a8c91d
NC
224 return result;
225}
226\f
252b5132
RH
227/* Add symbols from an ELF archive file to the linker hash table. We
228 don't use _bfd_generic_link_add_archive_symbols because of a
229 problem which arises on UnixWare. The UnixWare libc.so is an
230 archive which includes an entry libc.so.1 which defines a bunch of
231 symbols. The libc.so archive also includes a number of other
232 object files, which also define symbols, some of which are the same
233 as those defined in libc.so.1. Correct linking requires that we
234 consider each object file in turn, and include it if it defines any
235 symbols we need. _bfd_generic_link_add_archive_symbols does not do
236 this; it looks through the list of undefined symbols, and includes
237 any object file which defines them. When this algorithm is used on
238 UnixWare, it winds up pulling in libc.so.1 early and defining a
239 bunch of symbols. This means that some of the other objects in the
240 archive are not included in the link, which is incorrect since they
241 precede libc.so.1 in the archive.
242
243 Fortunately, ELF archive handling is simpler than that done by
244 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
245 oddities. In ELF, if we find a symbol in the archive map, and the
246 symbol is currently undefined, we know that we must pull in that
247 object file.
248
249 Unfortunately, we do have to make multiple passes over the symbol
250 table until nothing further is resolved. */
251
252static boolean
253elf_link_add_archive_symbols (abfd, info)
254 bfd *abfd;
255 struct bfd_link_info *info;
256{
257 symindex c;
258 boolean *defined = NULL;
259 boolean *included = NULL;
260 carsym *symdefs;
261 boolean loop;
dc810e39 262 bfd_size_type amt;
252b5132
RH
263
264 if (! bfd_has_map (abfd))
265 {
266 /* An empty archive is a special case. */
267 if (bfd_openr_next_archived_file (abfd, (bfd *) NULL) == NULL)
268 return true;
269 bfd_set_error (bfd_error_no_armap);
270 return false;
271 }
272
273 /* Keep track of all symbols we know to be already defined, and all
274 files we know to be already included. This is to speed up the
275 second and subsequent passes. */
276 c = bfd_ardata (abfd)->symdef_count;
277 if (c == 0)
278 return true;
dc810e39
AM
279 amt = c;
280 amt *= sizeof (boolean);
1126897b
AM
281 defined = (boolean *) bfd_zmalloc (amt);
282 included = (boolean *) bfd_zmalloc (amt);
252b5132
RH
283 if (defined == (boolean *) NULL || included == (boolean *) NULL)
284 goto error_return;
252b5132
RH
285
286 symdefs = bfd_ardata (abfd)->symdefs;
287
288 do
289 {
290 file_ptr last;
291 symindex i;
292 carsym *symdef;
293 carsym *symdefend;
294
295 loop = false;
296 last = -1;
297
298 symdef = symdefs;
299 symdefend = symdef + c;
300 for (i = 0; symdef < symdefend; symdef++, i++)
301 {
302 struct elf_link_hash_entry *h;
303 bfd *element;
304 struct bfd_link_hash_entry *undefs_tail;
305 symindex mark;
306
307 if (defined[i] || included[i])
308 continue;
309 if (symdef->file_offset == last)
310 {
311 included[i] = true;
312 continue;
313 }
314
315 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
316 false, false, false);
317
318 if (h == NULL)
319 {
320 char *p, *copy;
48fc70a2 321 size_t len, first;
252b5132
RH
322
323 /* If this is a default version (the name contains @@),
48fc70a2
AM
324 look up the symbol again with only one `@' as well
325 as without the version. The effect is that references
326 to the symbol with and without the version will be
327 matched by the default symbol in the archive. */
252b5132
RH
328
329 p = strchr (symdef->name, ELF_VER_CHR);
330 if (p == NULL || p[1] != ELF_VER_CHR)
331 continue;
332
48fc70a2
AM
333 /* First check with only one `@'. */
334 len = strlen (symdef->name);
335 copy = bfd_alloc (abfd, (bfd_size_type) len);
252b5132
RH
336 if (copy == NULL)
337 goto error_return;
48fc70a2
AM
338 first = p - symdef->name + 1;
339 memcpy (copy, symdef->name, first);
340 memcpy (copy + first, symdef->name + first + 1, len - first);
252b5132
RH
341
342 h = elf_link_hash_lookup (elf_hash_table (info), copy,
343 false, false, false);
344
48fc70a2 345 if (h == NULL)
58821868 346 {
48fc70a2
AM
347 /* We also need to check references to the symbol
348 without the version. */
349
350 copy[first - 1] = '\0';
351 h = elf_link_hash_lookup (elf_hash_table (info),
352 copy, false, false, false);
353 }
354
252b5132
RH
355 bfd_release (abfd, copy);
356 }
357
358 if (h == NULL)
359 continue;
360
a3a8c91d
NC
361 if (h->root.type == bfd_link_hash_common)
362 {
363 /* We currently have a common symbol. The archive map contains
364 a reference to this symbol, so we may want to include it. We
365 only want to include it however, if this archive element
366 contains a definition of the symbol, not just another common
367 declaration of it.
368
369 Unfortunately some archivers (including GNU ar) will put
370 declarations of common symbols into their archive maps, as
371 well as real definitions, so we cannot just go by the archive
372 map alone. Instead we must read in the element's symbol
373 table and check that to see what kind of symbol definition
374 this is. */
375 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
376 continue;
377 }
378 else if (h->root.type != bfd_link_hash_undefined)
252b5132
RH
379 {
380 if (h->root.type != bfd_link_hash_undefweak)
381 defined[i] = true;
382 continue;
383 }
384
385 /* We need to include this archive member. */
252b5132
RH
386 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
387 if (element == (bfd *) NULL)
388 goto error_return;
389
390 if (! bfd_check_format (element, bfd_object))
391 goto error_return;
392
393 /* Doublecheck that we have not included this object
394 already--it should be impossible, but there may be
395 something wrong with the archive. */
396 if (element->archive_pass != 0)
397 {
398 bfd_set_error (bfd_error_bad_value);
399 goto error_return;
400 }
401 element->archive_pass = 1;
402
403 undefs_tail = info->hash->undefs_tail;
404
405 if (! (*info->callbacks->add_archive_element) (info, element,
406 symdef->name))
407 goto error_return;
408 if (! elf_link_add_object_symbols (element, info))
409 goto error_return;
410
411 /* If there are any new undefined symbols, we need to make
412 another pass through the archive in order to see whether
413 they can be defined. FIXME: This isn't perfect, because
414 common symbols wind up on undefs_tail and because an
415 undefined symbol which is defined later on in this pass
416 does not require another pass. This isn't a bug, but it
417 does make the code less efficient than it could be. */
418 if (undefs_tail != info->hash->undefs_tail)
419 loop = true;
420
421 /* Look backward to mark all symbols from this object file
422 which we have already seen in this pass. */
423 mark = i;
424 do
425 {
426 included[mark] = true;
427 if (mark == 0)
428 break;
429 --mark;
430 }
431 while (symdefs[mark].file_offset == symdef->file_offset);
432
433 /* We mark subsequent symbols from this object file as we go
434 on through the loop. */
435 last = symdef->file_offset;
436 }
437 }
438 while (loop);
439
440 free (defined);
441 free (included);
442
443 return true;
444
445 error_return:
446 if (defined != (boolean *) NULL)
447 free (defined);
448 if (included != (boolean *) NULL)
449 free (included);
450 return false;
451}
452
453/* This function is called when we want to define a new symbol. It
454 handles the various cases which arise when we find a definition in
455 a dynamic object, or when there is already a definition in a
456 dynamic object. The new symbol is described by NAME, SYM, PSEC,
457 and PVALUE. We set SYM_HASH to the hash table entry. We set
458 OVERRIDE if the old symbol is overriding a new definition. We set
459 TYPE_CHANGE_OK if it is OK for the type to change. We set
460 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
461 change, we mean that we shouldn't warn if the type or size does
456981d7
L
462 change. DT_NEEDED indicates if it comes from a DT_NEEDED entry of
463 a shared object. */
252b5132
RH
464
465static boolean
466elf_merge_symbol (abfd, info, name, sym, psec, pvalue, sym_hash,
456981d7 467 override, type_change_ok, size_change_ok, dt_needed)
252b5132
RH
468 bfd *abfd;
469 struct bfd_link_info *info;
470 const char *name;
471 Elf_Internal_Sym *sym;
472 asection **psec;
473 bfd_vma *pvalue;
474 struct elf_link_hash_entry **sym_hash;
475 boolean *override;
476 boolean *type_change_ok;
477 boolean *size_change_ok;
456981d7 478 boolean dt_needed;
252b5132
RH
479{
480 asection *sec;
481 struct elf_link_hash_entry *h;
482 int bind;
483 bfd *oldbfd;
484 boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
485
486 *override = false;
487
488 sec = *psec;
489 bind = ELF_ST_BIND (sym->st_info);
490
491 if (! bfd_is_und_section (sec))
492 h = elf_link_hash_lookup (elf_hash_table (info), name, true, false, false);
493 else
494 h = ((struct elf_link_hash_entry *)
495 bfd_wrapped_link_hash_lookup (abfd, info, name, true, false, false));
496 if (h == NULL)
497 return false;
498 *sym_hash = h;
499
500 /* This code is for coping with dynamic objects, and is only useful
501 if we are doing an ELF link. */
502 if (info->hash->creator != abfd->xvec)
503 return true;
504
505 /* For merging, we only care about real symbols. */
506
507 while (h->root.type == bfd_link_hash_indirect
508 || h->root.type == bfd_link_hash_warning)
509 h = (struct elf_link_hash_entry *) h->root.u.i.link;
510
511 /* If we just created the symbol, mark it as being an ELF symbol.
512 Other than that, there is nothing to do--there is no merge issue
513 with a newly defined symbol--so we just return. */
514
515 if (h->root.type == bfd_link_hash_new)
516 {
517 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
518 return true;
519 }
520
521 /* OLDBFD is a BFD associated with the existing symbol. */
522
523 switch (h->root.type)
524 {
525 default:
526 oldbfd = NULL;
527 break;
528
529 case bfd_link_hash_undefined:
530 case bfd_link_hash_undefweak:
531 oldbfd = h->root.u.undef.abfd;
532 break;
533
534 case bfd_link_hash_defined:
535 case bfd_link_hash_defweak:
536 oldbfd = h->root.u.def.section->owner;
537 break;
538
539 case bfd_link_hash_common:
540 oldbfd = h->root.u.c.p->section->owner;
541 break;
542 }
543
b4536acd
ILT
544 /* In cases involving weak versioned symbols, we may wind up trying
545 to merge a symbol with itself. Catch that here, to avoid the
546 confusion that results if we try to override a symbol with
accc7f69
ILT
547 itself. The additional tests catch cases like
548 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
549 dynamic object, which we do want to handle here. */
550 if (abfd == oldbfd
551 && ((abfd->flags & DYNAMIC) == 0
552 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
b4536acd
ILT
553 return true;
554
252b5132
RH
555 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
556 respectively, is from a dynamic object. */
557
558 if ((abfd->flags & DYNAMIC) != 0)
559 newdyn = true;
560 else
561 newdyn = false;
562
0035bd7b
ILT
563 if (oldbfd != NULL)
564 olddyn = (oldbfd->flags & DYNAMIC) != 0;
252b5132 565 else
0035bd7b
ILT
566 {
567 asection *hsec;
568
569 /* This code handles the special SHN_MIPS_{TEXT,DATA} section
c44233aa 570 indices used by MIPS ELF. */
0035bd7b
ILT
571 switch (h->root.type)
572 {
573 default:
574 hsec = NULL;
575 break;
576
577 case bfd_link_hash_defined:
578 case bfd_link_hash_defweak:
579 hsec = h->root.u.def.section;
580 break;
581
582 case bfd_link_hash_common:
583 hsec = h->root.u.c.p->section;
584 break;
585 }
586
587 if (hsec == NULL)
588 olddyn = false;
589 else
590 olddyn = (hsec->symbol->flags & BSF_DYNAMIC) != 0;
591 }
252b5132
RH
592
593 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
594 respectively, appear to be a definition rather than reference. */
595
596 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
597 newdef = false;
598 else
599 newdef = true;
600
601 if (h->root.type == bfd_link_hash_undefined
602 || h->root.type == bfd_link_hash_undefweak
603 || h->root.type == bfd_link_hash_common)
604 olddef = false;
605 else
606 olddef = true;
607
608 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
609 symbol, respectively, appears to be a common symbol in a dynamic
610 object. If a symbol appears in an uninitialized section, and is
611 not weak, and is not a function, then it may be a common symbol
612 which was resolved when the dynamic object was created. We want
613 to treat such symbols specially, because they raise special
614 considerations when setting the symbol size: if the symbol
615 appears as a common symbol in a regular object, and the size in
616 the regular object is larger, we must make sure that we use the
617 larger size. This problematic case can always be avoided in C,
618 but it must be handled correctly when using Fortran shared
619 libraries.
620
621 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
622 likewise for OLDDYNCOMMON and OLDDEF.
623
624 Note that this test is just a heuristic, and that it is quite
625 possible to have an uninitialized symbol in a shared object which
626 is really a definition, rather than a common symbol. This could
627 lead to some minor confusion when the symbol really is a common
628 symbol in some regular object. However, I think it will be
629 harmless. */
630
631 if (newdyn
632 && newdef
633 && (sec->flags & SEC_ALLOC) != 0
634 && (sec->flags & SEC_LOAD) == 0
635 && sym->st_size > 0
636 && bind != STB_WEAK
637 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
638 newdyncommon = true;
639 else
640 newdyncommon = false;
641
642 if (olddyn
643 && olddef
644 && h->root.type == bfd_link_hash_defined
645 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
646 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
647 && (h->root.u.def.section->flags & SEC_LOAD) == 0
648 && h->size > 0
649 && h->type != STT_FUNC)
650 olddyncommon = true;
651 else
652 olddyncommon = false;
653
654 /* It's OK to change the type if either the existing symbol or the
456981d7
L
655 new symbol is weak unless it comes from a DT_NEEDED entry of
656 a shared object, in which case, the DT_NEEDED entry may not be
3e932841 657 required at the run time. */
252b5132 658
456981d7 659 if ((! dt_needed && h->root.type == bfd_link_hash_defweak)
252b5132
RH
660 || h->root.type == bfd_link_hash_undefweak
661 || bind == STB_WEAK)
662 *type_change_ok = true;
663
664 /* It's OK to change the size if either the existing symbol or the
665 new symbol is weak, or if the old symbol is undefined. */
666
667 if (*type_change_ok
668 || h->root.type == bfd_link_hash_undefined)
669 *size_change_ok = true;
670
671 /* If both the old and the new symbols look like common symbols in a
672 dynamic object, set the size of the symbol to the larger of the
673 two. */
674
675 if (olddyncommon
676 && newdyncommon
677 && sym->st_size != h->size)
678 {
679 /* Since we think we have two common symbols, issue a multiple
c44233aa
AM
680 common warning if desired. Note that we only warn if the
681 size is different. If the size is the same, we simply let
682 the old symbol override the new one as normally happens with
683 symbols defined in dynamic objects. */
252b5132
RH
684
685 if (! ((*info->callbacks->multiple_common)
686 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
687 h->size, abfd, bfd_link_hash_common, sym->st_size)))
688 return false;
689
690 if (sym->st_size > h->size)
691 h->size = sym->st_size;
692
693 *size_change_ok = true;
694 }
695
696 /* If we are looking at a dynamic object, and we have found a
697 definition, we need to see if the symbol was already defined by
698 some other object. If so, we want to use the existing
699 definition, and we do not want to report a multiple symbol
700 definition error; we do this by clobbering *PSEC to be
701 bfd_und_section_ptr.
702
703 We treat a common symbol as a definition if the symbol in the
704 shared library is a function, since common symbols always
705 represent variables; this can cause confusion in principle, but
706 any such confusion would seem to indicate an erroneous program or
707 shared library. We also permit a common symbol in a regular
0525d26e
ILT
708 object to override a weak symbol in a shared object.
709
710 We prefer a non-weak definition in a shared library to a weak
456981d7
L
711 definition in the executable unless it comes from a DT_NEEDED
712 entry of a shared object, in which case, the DT_NEEDED entry
3e932841 713 may not be required at the run time. */
252b5132
RH
714
715 if (newdyn
716 && newdef
717 && (olddef
718 || (h->root.type == bfd_link_hash_common
719 && (bind == STB_WEAK
0525d26e 720 || ELF_ST_TYPE (sym->st_info) == STT_FUNC)))
3e932841 721 && (h->root.type != bfd_link_hash_defweak
456981d7 722 || dt_needed
0525d26e 723 || bind == STB_WEAK))
252b5132
RH
724 {
725 *override = true;
726 newdef = false;
727 newdyncommon = false;
728
729 *psec = sec = bfd_und_section_ptr;
730 *size_change_ok = true;
731
732 /* If we get here when the old symbol is a common symbol, then
c44233aa
AM
733 we are explicitly letting it override a weak symbol or
734 function in a dynamic object, and we don't want to warn about
735 a type change. If the old symbol is a defined symbol, a type
736 change warning may still be appropriate. */
252b5132
RH
737
738 if (h->root.type == bfd_link_hash_common)
739 *type_change_ok = true;
740 }
741
742 /* Handle the special case of an old common symbol merging with a
743 new symbol which looks like a common symbol in a shared object.
744 We change *PSEC and *PVALUE to make the new symbol look like a
745 common symbol, and let _bfd_generic_link_add_one_symbol will do
746 the right thing. */
747
748 if (newdyncommon
749 && h->root.type == bfd_link_hash_common)
750 {
751 *override = true;
752 newdef = false;
753 newdyncommon = false;
754 *pvalue = sym->st_size;
755 *psec = sec = bfd_com_section_ptr;
756 *size_change_ok = true;
757 }
758
759 /* If the old symbol is from a dynamic object, and the new symbol is
760 a definition which is not from a dynamic object, then the new
761 symbol overrides the old symbol. Symbols from regular files
762 always take precedence over symbols from dynamic objects, even if
763 they are defined after the dynamic object in the link.
764
765 As above, we again permit a common symbol in a regular object to
766 override a definition in a shared object if the shared object
0525d26e
ILT
767 symbol is a function or is weak.
768
769 As above, we permit a non-weak definition in a shared object to
770 override a weak definition in a regular object. */
252b5132
RH
771
772 if (! newdyn
773 && (newdef
774 || (bfd_is_com_section (sec)
775 && (h->root.type == bfd_link_hash_defweak
776 || h->type == STT_FUNC)))
777 && olddyn
778 && olddef
0525d26e
ILT
779 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
780 && (bind != STB_WEAK
781 || h->root.type == bfd_link_hash_defweak))
252b5132
RH
782 {
783 /* Change the hash table entry to undefined, and let
784 _bfd_generic_link_add_one_symbol do the right thing with the
785 new definition. */
786
787 h->root.type = bfd_link_hash_undefined;
788 h->root.u.undef.abfd = h->root.u.def.section->owner;
789 *size_change_ok = true;
790
791 olddef = false;
792 olddyncommon = false;
793
794 /* We again permit a type change when a common symbol may be
c44233aa 795 overriding a function. */
252b5132
RH
796
797 if (bfd_is_com_section (sec))
798 *type_change_ok = true;
799
800 /* This union may have been set to be non-NULL when this symbol
801 was seen in a dynamic object. We must force the union to be
802 NULL, so that it is correct for a regular symbol. */
803
804 h->verinfo.vertree = NULL;
805
806 /* In this special case, if H is the target of an indirection,
c44233aa
AM
807 we want the caller to frob with H rather than with the
808 indirect symbol. That will permit the caller to redefine the
809 target of the indirection, rather than the indirect symbol
810 itself. FIXME: This will break the -y option if we store a
811 symbol with a different name. */
252b5132
RH
812 *sym_hash = h;
813 }
814
815 /* Handle the special case of a new common symbol merging with an
816 old symbol that looks like it might be a common symbol defined in
817 a shared object. Note that we have already handled the case in
818 which a new common symbol should simply override the definition
819 in the shared library. */
820
821 if (! newdyn
822 && bfd_is_com_section (sec)
823 && olddyncommon)
824 {
825 /* It would be best if we could set the hash table entry to a
826 common symbol, but we don't know what to use for the section
827 or the alignment. */
828 if (! ((*info->callbacks->multiple_common)
829 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
830 h->size, abfd, bfd_link_hash_common, sym->st_size)))
831 return false;
832
833 /* If the predumed common symbol in the dynamic object is
c44233aa 834 larger, pretend that the new symbol has its size. */
252b5132
RH
835
836 if (h->size > *pvalue)
837 *pvalue = h->size;
838
839 /* FIXME: We no longer know the alignment required by the symbol
840 in the dynamic object, so we just wind up using the one from
841 the regular object. */
842
843 olddef = false;
844 olddyncommon = false;
845
846 h->root.type = bfd_link_hash_undefined;
847 h->root.u.undef.abfd = h->root.u.def.section->owner;
848
849 *size_change_ok = true;
850 *type_change_ok = true;
851
852 h->verinfo.vertree = NULL;
853 }
854
0525d26e
ILT
855 /* Handle the special case of a weak definition in a regular object
856 followed by a non-weak definition in a shared object. In this
456981d7
L
857 case, we prefer the definition in the shared object unless it
858 comes from a DT_NEEDED entry of a shared object, in which case,
3e932841 859 the DT_NEEDED entry may not be required at the run time. */
0525d26e 860 if (olddef
456981d7 861 && ! dt_needed
0525d26e
ILT
862 && h->root.type == bfd_link_hash_defweak
863 && newdef
864 && newdyn
865 && bind != STB_WEAK)
b4536acd
ILT
866 {
867 /* To make this work we have to frob the flags so that the rest
c44233aa
AM
868 of the code does not think we are using the regular
869 definition. */
64df8d0b
ILT
870 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
871 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
872 else if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0)
873 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
874 h->elf_link_hash_flags &= ~ (ELF_LINK_HASH_DEF_REGULAR
875 | ELF_LINK_HASH_DEF_DYNAMIC);
b4536acd
ILT
876
877 /* If H is the target of an indirection, we want the caller to
c44233aa
AM
878 use H rather than the indirect symbol. Otherwise if we are
879 defining a new indirect symbol we will wind up attaching it
880 to the entry we are overriding. */
b4536acd
ILT
881 *sym_hash = h;
882 }
0525d26e
ILT
883
884 /* Handle the special case of a non-weak definition in a shared
885 object followed by a weak definition in a regular object. In
886 this case we prefer to definition in the shared object. To make
887 this work we have to tell the caller to not treat the new symbol
888 as a definition. */
889 if (olddef
890 && olddyn
891 && h->root.type != bfd_link_hash_defweak
892 && newdef
893 && ! newdyn
894 && bind == STB_WEAK)
895 *override = true;
896
252b5132
RH
897 return true;
898}
899
215007a6
L
900/* This function is called to create an indirect symbol from the
901 default for the symbol with the default version if needed. The
871da94f 902 symbol is described by H, NAME, SYM, PSEC, VALUE, and OVERRIDE. We
215007a6
L
903 set DYNSYM if the new indirect symbol is dynamic. DT_NEEDED
904 indicates if it comes from a DT_NEEDED entry of a shared object. */
905
906static boolean
871da94f 907elf_add_default_symbol (abfd, info, h, name, sym, psec, value,
215007a6
L
908 dynsym, override, dt_needed)
909 bfd *abfd;
910 struct bfd_link_info *info;
911 struct elf_link_hash_entry *h;
912 const char *name;
913 Elf_Internal_Sym *sym;
871da94f 914 asection **psec;
215007a6
L
915 bfd_vma *value;
916 boolean *dynsym;
917 boolean override;
918 boolean dt_needed;
919{
920 boolean type_change_ok;
921 boolean size_change_ok;
922 char *shortname;
923 struct elf_link_hash_entry *hi;
14a793b2 924 struct bfd_link_hash_entry *bh;
215007a6
L
925 struct elf_backend_data *bed;
926 boolean collect;
927 boolean dynamic;
928 char *p;
d4c88bbb 929 size_t len, shortlen;
871da94f 930 asection *sec;
215007a6
L
931
932 /* If this symbol has a version, and it is the default version, we
933 create an indirect symbol from the default name to the fully
934 decorated name. This will cause external references which do not
935 specify a version to be bound to this version of the symbol. */
936 p = strchr (name, ELF_VER_CHR);
937 if (p == NULL || p[1] != ELF_VER_CHR)
938 return true;
939
940 if (override)
941 {
942 /* We are overridden by an old defition. We need to check if we
d4c88bbb 943 need to create the indirect symbol from the default name. */
215007a6
L
944 hi = elf_link_hash_lookup (elf_hash_table (info), name, true,
945 false, false);
946 BFD_ASSERT (hi != NULL);
947 if (hi == h)
948 return true;
949 while (hi->root.type == bfd_link_hash_indirect
950 || hi->root.type == bfd_link_hash_warning)
951 {
952 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
953 if (hi == h)
954 return true;
955 }
956 }
957
958 bed = get_elf_backend_data (abfd);
959 collect = bed->collect;
960 dynamic = (abfd->flags & DYNAMIC) != 0;
961
d4c88bbb
AM
962 shortlen = p - name;
963 shortname = bfd_hash_allocate (&info->hash->table, shortlen + 1);
215007a6
L
964 if (shortname == NULL)
965 return false;
d4c88bbb
AM
966 memcpy (shortname, name, shortlen);
967 shortname[shortlen] = '\0';
215007a6
L
968
969 /* We are going to create a new symbol. Merge it with any existing
970 symbol with this name. For the purposes of the merge, act as
971 though we were defining the symbol we just defined, although we
972 actually going to define an indirect symbol. */
973 type_change_ok = false;
974 size_change_ok = false;
871da94f
L
975 sec = *psec;
976 if (! elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
215007a6
L
977 &hi, &override, &type_change_ok,
978 &size_change_ok, dt_needed))
979 return false;
980
981 if (! override)
982 {
14a793b2 983 bh = &hi->root;
215007a6
L
984 if (! (_bfd_generic_link_add_one_symbol
985 (info, abfd, shortname, BSF_INDIRECT, bfd_ind_section_ptr,
14a793b2 986 (bfd_vma) 0, name, false, collect, &bh)))
215007a6 987 return false;
14a793b2 988 hi = (struct elf_link_hash_entry *) bh;
215007a6
L
989 }
990 else
991 {
992 /* In this case the symbol named SHORTNAME is overriding the
993 indirect symbol we want to add. We were planning on making
994 SHORTNAME an indirect symbol referring to NAME. SHORTNAME
995 is the name without a version. NAME is the fully versioned
996 name, and it is the default version.
997
998 Overriding means that we already saw a definition for the
999 symbol SHORTNAME in a regular object, and it is overriding
1000 the symbol defined in the dynamic object.
1001
1002 When this happens, we actually want to change NAME, the
1003 symbol we just added, to refer to SHORTNAME. This will cause
1004 references to NAME in the shared object to become references
1005 to SHORTNAME in the regular object. This is what we expect
1006 when we override a function in a shared object: that the
1007 references in the shared object will be mapped to the
1008 definition in the regular object. */
1009
1010 while (hi->root.type == bfd_link_hash_indirect
1011 || hi->root.type == bfd_link_hash_warning)
1012 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1013
1014 h->root.type = bfd_link_hash_indirect;
1015 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
1016 if (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)
1017 {
1018 h->elf_link_hash_flags &=~ ELF_LINK_HASH_DEF_DYNAMIC;
1019 hi->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
1020 if (hi->elf_link_hash_flags
1021 & (ELF_LINK_HASH_REF_REGULAR
1022 | ELF_LINK_HASH_DEF_REGULAR))
1023 {
1024 if (! _bfd_elf_link_record_dynamic_symbol (info, hi))
1025 return false;
1026 }
1027 }
1028
1029 /* Now set HI to H, so that the following code will set the
c44233aa 1030 other fields correctly. */
215007a6
L
1031 hi = h;
1032 }
1033
1034 /* If there is a duplicate definition somewhere, then HI may not
1035 point to an indirect symbol. We will have reported an error to
1036 the user in that case. */
1037
1038 if (hi->root.type == bfd_link_hash_indirect)
1039 {
1040 struct elf_link_hash_entry *ht;
1041
1042 /* If the symbol became indirect, then we assume that we have
1043 not seen a definition before. */
1044 BFD_ASSERT ((hi->elf_link_hash_flags
1045 & (ELF_LINK_HASH_DEF_DYNAMIC
1046 | ELF_LINK_HASH_DEF_REGULAR)) == 0);
1047
1048 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
b48fa14c 1049 (*bed->elf_backend_copy_indirect_symbol) (bed, ht, hi);
215007a6
L
1050
1051 /* See if the new flags lead us to realize that the symbol must
1052 be dynamic. */
1053 if (! *dynsym)
1054 {
1055 if (! dynamic)
1056 {
1057 if (info->shared
1058 || ((hi->elf_link_hash_flags
1059 & ELF_LINK_HASH_REF_DYNAMIC) != 0))
1060 *dynsym = true;
1061 }
1062 else
1063 {
1064 if ((hi->elf_link_hash_flags
1065 & ELF_LINK_HASH_REF_REGULAR) != 0)
1066 *dynsym = true;
1067 }
1068 }
1069 }
1070
1071 /* We also need to define an indirection from the nondefault version
1072 of the symbol. */
1073
d4c88bbb
AM
1074 len = strlen (name);
1075 shortname = bfd_hash_allocate (&info->hash->table, len);
215007a6
L
1076 if (shortname == NULL)
1077 return false;
d4c88bbb
AM
1078 memcpy (shortname, name, shortlen);
1079 memcpy (shortname + shortlen, p + 1, len - shortlen);
215007a6
L
1080
1081 /* Once again, merge with any existing symbol. */
1082 type_change_ok = false;
1083 size_change_ok = false;
871da94f
L
1084 sec = *psec;
1085 if (! elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
215007a6
L
1086 &hi, &override, &type_change_ok,
1087 &size_change_ok, dt_needed))
1088 return false;
1089
1090 if (override)
1091 {
1092 /* Here SHORTNAME is a versioned name, so we don't expect to see
d8bbe778
L
1093 the type of override we do in the case above unless it is
1094 overridden by a versioned definiton. */
1095 if (hi->root.type != bfd_link_hash_defined
1096 && hi->root.type != bfd_link_hash_defweak)
1097 (*_bfd_error_handler)
1098 (_("%s: warning: unexpected redefinition of indirect versioned symbol `%s'"),
1099 bfd_archive_filename (abfd), shortname);
215007a6
L
1100 }
1101 else
1102 {
14a793b2 1103 bh = &hi->root;
215007a6
L
1104 if (! (_bfd_generic_link_add_one_symbol
1105 (info, abfd, shortname, BSF_INDIRECT,
14a793b2 1106 bfd_ind_section_ptr, (bfd_vma) 0, name, false, collect, &bh)))
215007a6 1107 return false;
14a793b2 1108 hi = (struct elf_link_hash_entry *) bh;
215007a6
L
1109
1110 /* If there is a duplicate definition somewhere, then HI may not
1111 point to an indirect symbol. We will have reported an error
1112 to the user in that case. */
1113
1114 if (hi->root.type == bfd_link_hash_indirect)
1115 {
1116 /* If the symbol became indirect, then we assume that we have
1117 not seen a definition before. */
1118 BFD_ASSERT ((hi->elf_link_hash_flags
1119 & (ELF_LINK_HASH_DEF_DYNAMIC
1120 | ELF_LINK_HASH_DEF_REGULAR)) == 0);
1121
b48fa14c 1122 (*bed->elf_backend_copy_indirect_symbol) (bed, h, hi);
215007a6
L
1123
1124 /* See if the new flags lead us to realize that the symbol
1125 must be dynamic. */
1126 if (! *dynsym)
1127 {
1128 if (! dynamic)
1129 {
1130 if (info->shared
1131 || ((hi->elf_link_hash_flags
1132 & ELF_LINK_HASH_REF_DYNAMIC) != 0))
1133 *dynsym = true;
1134 }
1135 else
1136 {
1137 if ((hi->elf_link_hash_flags
1138 & ELF_LINK_HASH_REF_REGULAR) != 0)
1139 *dynsym = true;
1140 }
1141 }
1142 }
1143 }
1144
1145 return true;
1146}
1147
252b5132
RH
1148/* Add symbols from an ELF object file to the linker hash table. */
1149
1150static boolean
1151elf_link_add_object_symbols (abfd, info)
1152 bfd *abfd;
1153 struct bfd_link_info *info;
1154{
1155 boolean (*add_symbol_hook) PARAMS ((bfd *, struct bfd_link_info *,
1156 const Elf_Internal_Sym *,
1157 const char **, flagword *,
1158 asection **, bfd_vma *));
1159 boolean (*check_relocs) PARAMS ((bfd *, struct bfd_link_info *,
1160 asection *, const Elf_Internal_Rela *));
1161 boolean collect;
1162 Elf_Internal_Shdr *hdr;
dc810e39
AM
1163 bfd_size_type symcount;
1164 bfd_size_type extsymcount;
1165 bfd_size_type extsymoff;
252b5132
RH
1166 struct elf_link_hash_entry **sym_hash;
1167 boolean dynamic;
252b5132
RH
1168 Elf_External_Versym *extversym = NULL;
1169 Elf_External_Versym *ever;
252b5132 1170 struct elf_link_hash_entry *weaks;
6cdc0ccc
AM
1171 Elf_Internal_Sym *isymbuf = NULL;
1172 Elf_Internal_Sym *isym;
1173 Elf_Internal_Sym *isymend;
c61b8717 1174 struct elf_backend_data *bed;
74816898 1175 boolean dt_needed;
8ea2e4bd 1176 struct elf_link_hash_table * hash_table;
dc810e39 1177 bfd_size_type amt;
8ea2e4bd
NC
1178
1179 hash_table = elf_hash_table (info);
252b5132 1180
c61b8717
RH
1181 bed = get_elf_backend_data (abfd);
1182 add_symbol_hook = bed->elf_add_symbol_hook;
1183 collect = bed->collect;
252b5132
RH
1184
1185 if ((abfd->flags & DYNAMIC) == 0)
1186 dynamic = false;
1187 else
1188 {
1189 dynamic = true;
1190
1191 /* You can't use -r against a dynamic object. Also, there's no
1192 hope of using a dynamic object which does not exactly match
1193 the format of the output file. */
1194 if (info->relocateable || info->hash->creator != abfd->xvec)
1195 {
1196 bfd_set_error (bfd_error_invalid_operation);
1197 goto error_return;
1198 }
1199 }
1200
1201 /* As a GNU extension, any input sections which are named
1202 .gnu.warning.SYMBOL are treated as warning symbols for the given
1203 symbol. This differs from .gnu.warning sections, which generate
1204 warnings when they are included in an output file. */
1205 if (! info->shared)
1206 {
1207 asection *s;
1208
1209 for (s = abfd->sections; s != NULL; s = s->next)
1210 {
1211 const char *name;
1212
1213 name = bfd_get_section_name (abfd, s);
1214 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
1215 {
1216 char *msg;
1217 bfd_size_type sz;
1218
1219 name += sizeof ".gnu.warning." - 1;
1220
1221 /* If this is a shared object, then look up the symbol
1222 in the hash table. If it is there, and it is already
1223 been defined, then we will not be using the entry
1224 from this shared object, so we don't need to warn.
1225 FIXME: If we see the definition in a regular object
1226 later on, we will warn, but we shouldn't. The only
1227 fix is to keep track of what warnings we are supposed
1228 to emit, and then handle them all at the end of the
1229 link. */
1230 if (dynamic && abfd->xvec == info->hash->creator)
1231 {
1232 struct elf_link_hash_entry *h;
1233
8ea2e4bd 1234 h = elf_link_hash_lookup (hash_table, name,
252b5132
RH
1235 false, false, true);
1236
1237 /* FIXME: What about bfd_link_hash_common? */
1238 if (h != NULL
1239 && (h->root.type == bfd_link_hash_defined
1240 || h->root.type == bfd_link_hash_defweak))
1241 {
1242 /* We don't want to issue this warning. Clobber
c44233aa
AM
1243 the section size so that the warning does not
1244 get copied into the output file. */
252b5132
RH
1245 s->_raw_size = 0;
1246 continue;
1247 }
1248 }
1249
1250 sz = bfd_section_size (abfd, s);
1251 msg = (char *) bfd_alloc (abfd, sz + 1);
1252 if (msg == NULL)
1253 goto error_return;
1254
1255 if (! bfd_get_section_contents (abfd, s, msg, (file_ptr) 0, sz))
1256 goto error_return;
1257
1258 msg[sz] = '\0';
1259
1260 if (! (_bfd_generic_link_add_one_symbol
1261 (info, abfd, name, BSF_WARNING, s, (bfd_vma) 0, msg,
1262 false, collect, (struct bfd_link_hash_entry **) NULL)))
1263 goto error_return;
1264
1265 if (! info->relocateable)
1266 {
1267 /* Clobber the section size so that the warning does
c44233aa 1268 not get copied into the output file. */
252b5132
RH
1269 s->_raw_size = 0;
1270 }
1271 }
1272 }
1273 }
1274
74816898 1275 dt_needed = false;
252b5132
RH
1276 if (! dynamic)
1277 {
1278 /* If we are creating a shared library, create all the dynamic
c44233aa
AM
1279 sections immediately. We need to attach them to something,
1280 so we attach them to this BFD, provided it is the right
1281 format. FIXME: If there are no input BFD's of the same
1282 format as the output, we can't make a shared library. */
252b5132 1283 if (info->shared
8ea2e4bd
NC
1284 && is_elf_hash_table (info)
1285 && ! hash_table->dynamic_sections_created
252b5132
RH
1286 && abfd->xvec == info->hash->creator)
1287 {
1288 if (! elf_link_create_dynamic_sections (abfd, info))
1289 goto error_return;
1290 }
1291 }
8ea2e4bd
NC
1292 else if (! is_elf_hash_table (info))
1293 goto error_return;
252b5132
RH
1294 else
1295 {
1296 asection *s;
1297 boolean add_needed;
1298 const char *name;
1299 bfd_size_type oldsize;
1300 bfd_size_type strindex;
5d603aa9 1301 struct bfd_link_needed_list *rpath = NULL, *runpath = NULL;
252b5132 1302
366f2964
AM
1303 /* ld --just-symbols and dynamic objects don't mix very well.
1304 Test for --just-symbols by looking at info set up by
1305 _bfd_elf_link_just_syms. */
1306 if ((s = abfd->sections) != NULL
1307 && elf_section_data (s)->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
1308 goto error_return;
1309
252b5132
RH
1310 /* Find the name to use in a DT_NEEDED entry that refers to this
1311 object. If the object has a DT_SONAME entry, we use it.
1312 Otherwise, if the generic linker stuck something in
1313 elf_dt_name, we use that. Otherwise, we just use the file
1314 name. If the generic linker put a null string into
1315 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
1316 there is a DT_SONAME entry. */
1317 add_needed = true;
7913c838 1318 name = bfd_get_filename (abfd);
252b5132
RH
1319 if (elf_dt_name (abfd) != NULL)
1320 {
1321 name = elf_dt_name (abfd);
1322 if (*name == '\0')
74816898
L
1323 {
1324 if (elf_dt_soname (abfd) != NULL)
c44233aa 1325 dt_needed = true;
74816898
L
1326
1327 add_needed = false;
1328 }
252b5132
RH
1329 }
1330 s = bfd_get_section_by_name (abfd, ".dynamic");
1331 if (s != NULL)
1332 {
6cdc0ccc 1333 Elf_External_Dyn *dynbuf = NULL;
252b5132
RH
1334 Elf_External_Dyn *extdyn;
1335 Elf_External_Dyn *extdynend;
1336 int elfsec;
dc810e39 1337 unsigned long shlink;
252b5132 1338
dc810e39 1339 dynbuf = (Elf_External_Dyn *) bfd_malloc (s->_raw_size);
252b5132
RH
1340 if (dynbuf == NULL)
1341 goto error_return;
1342
1343 if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf,
1344 (file_ptr) 0, s->_raw_size))
6cdc0ccc 1345 goto error_free_dyn;
252b5132
RH
1346
1347 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1348 if (elfsec == -1)
6cdc0ccc 1349 goto error_free_dyn;
dc810e39 1350 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
252b5132
RH
1351
1352 extdyn = dynbuf;
1353 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
1354 for (; extdyn < extdynend; extdyn++)
1355 {
1356 Elf_Internal_Dyn dyn;
1357
1358 elf_swap_dyn_in (abfd, extdyn, &dyn);
1359 if (dyn.d_tag == DT_SONAME)
1360 {
dc810e39
AM
1361 unsigned int tagv = dyn.d_un.d_val;
1362 name = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132 1363 if (name == NULL)
6cdc0ccc 1364 goto error_free_dyn;
252b5132
RH
1365 }
1366 if (dyn.d_tag == DT_NEEDED)
1367 {
1368 struct bfd_link_needed_list *n, **pn;
1369 char *fnm, *anm;
dc810e39 1370 unsigned int tagv = dyn.d_un.d_val;
252b5132 1371
dc810e39
AM
1372 amt = sizeof (struct bfd_link_needed_list);
1373 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1374 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
252b5132 1375 if (n == NULL || fnm == NULL)
6cdc0ccc 1376 goto error_free_dyn;
d4c88bbb
AM
1377 amt = strlen (fnm) + 1;
1378 anm = bfd_alloc (abfd, amt);
252b5132 1379 if (anm == NULL)
6cdc0ccc 1380 goto error_free_dyn;
d4c88bbb 1381 memcpy (anm, fnm, (size_t) amt);
252b5132
RH
1382 n->name = anm;
1383 n->by = abfd;
1384 n->next = NULL;
8ea2e4bd 1385 for (pn = & hash_table->needed;
252b5132
RH
1386 *pn != NULL;
1387 pn = &(*pn)->next)
1388 ;
1389 *pn = n;
1390 }
a963dc6a
L
1391 if (dyn.d_tag == DT_RUNPATH)
1392 {
1393 struct bfd_link_needed_list *n, **pn;
1394 char *fnm, *anm;
dc810e39 1395 unsigned int tagv = dyn.d_un.d_val;
a963dc6a 1396
dc810e39
AM
1397 amt = sizeof (struct bfd_link_needed_list);
1398 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1399 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
a963dc6a 1400 if (n == NULL || fnm == NULL)
6cdc0ccc 1401 goto error_free_dyn;
d4c88bbb
AM
1402 amt = strlen (fnm) + 1;
1403 anm = bfd_alloc (abfd, amt);
a963dc6a 1404 if (anm == NULL)
6cdc0ccc 1405 goto error_free_dyn;
d4c88bbb 1406 memcpy (anm, fnm, (size_t) amt);
a963dc6a
L
1407 n->name = anm;
1408 n->by = abfd;
1409 n->next = NULL;
5d603aa9 1410 for (pn = & runpath;
a963dc6a
L
1411 *pn != NULL;
1412 pn = &(*pn)->next)
1413 ;
1414 *pn = n;
a963dc6a 1415 }
3e932841 1416 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
a963dc6a 1417 if (!runpath && dyn.d_tag == DT_RPATH)
c44233aa 1418 {
a963dc6a
L
1419 struct bfd_link_needed_list *n, **pn;
1420 char *fnm, *anm;
dc810e39 1421 unsigned int tagv = dyn.d_un.d_val;
a963dc6a 1422
dc810e39
AM
1423 amt = sizeof (struct bfd_link_needed_list);
1424 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1425 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
a963dc6a 1426 if (n == NULL || fnm == NULL)
6cdc0ccc 1427 goto error_free_dyn;
d4c88bbb
AM
1428 amt = strlen (fnm) + 1;
1429 anm = bfd_alloc (abfd, amt);
a963dc6a 1430 if (anm == NULL)
6cdc0ccc
AM
1431 {
1432 error_free_dyn:
1433 free (dynbuf);
1434 goto error_return;
1435 }
d4c88bbb 1436 memcpy (anm, fnm, (size_t) amt);
a963dc6a
L
1437 n->name = anm;
1438 n->by = abfd;
1439 n->next = NULL;
5d603aa9 1440 for (pn = & rpath;
a963dc6a
L
1441 *pn != NULL;
1442 pn = &(*pn)->next)
1443 ;
1444 *pn = n;
a963dc6a 1445 }
252b5132
RH
1446 }
1447
1448 free (dynbuf);
252b5132
RH
1449 }
1450
5d603aa9
L
1451 /* DT_RUNPATH overrides DT_RPATH. Do _NOT_ bfd_release, as that
1452 frees all more recently bfd_alloc'd blocks as well. */
1453 if (runpath)
1454 rpath = runpath;
1455
1456 if (rpath)
1457 {
1458 struct bfd_link_needed_list **pn;
1459 for (pn = & hash_table->runpath;
1460 *pn != NULL;
1461 pn = &(*pn)->next)
1462 ;
1463 *pn = rpath;
1464 }
1465
252b5132
RH
1466 /* We do not want to include any of the sections in a dynamic
1467 object in the output file. We hack by simply clobbering the
1468 list of sections in the BFD. This could be handled more
1469 cleanly by, say, a new section flag; the existing
1470 SEC_NEVER_LOAD flag is not the one we want, because that one
1471 still implies that the section takes up space in the output
1472 file. */
c601ffdb 1473 bfd_section_list_clear (abfd);
252b5132
RH
1474
1475 /* If this is the first dynamic object found in the link, create
1476 the special sections required for dynamic linking. */
8ea2e4bd
NC
1477 if (! hash_table->dynamic_sections_created)
1478 if (! elf_link_create_dynamic_sections (abfd, info))
1479 goto error_return;
252b5132
RH
1480
1481 if (add_needed)
1482 {
1483 /* Add a DT_NEEDED entry for this dynamic object. */
2b0f7ef9
JJ
1484 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
1485 strindex = _bfd_elf_strtab_add (hash_table->dynstr, name, false);
252b5132
RH
1486 if (strindex == (bfd_size_type) -1)
1487 goto error_return;
1488
2b0f7ef9 1489 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
252b5132
RH
1490 {
1491 asection *sdyn;
1492 Elf_External_Dyn *dyncon, *dynconend;
1493
1494 /* The hash table size did not change, which means that
1495 the dynamic object name was already entered. If we
1496 have already included this dynamic object in the
1497 link, just ignore it. There is no reason to include
1498 a particular dynamic object more than once. */
8ea2e4bd 1499 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
252b5132
RH
1500 BFD_ASSERT (sdyn != NULL);
1501
1502 dyncon = (Elf_External_Dyn *) sdyn->contents;
1503 dynconend = (Elf_External_Dyn *) (sdyn->contents +
1504 sdyn->_raw_size);
1505 for (; dyncon < dynconend; dyncon++)
1506 {
1507 Elf_Internal_Dyn dyn;
1508
8ea2e4bd 1509 elf_swap_dyn_in (hash_table->dynobj, dyncon, & dyn);
252b5132
RH
1510 if (dyn.d_tag == DT_NEEDED
1511 && dyn.d_un.d_val == strindex)
1512 {
2b0f7ef9 1513 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
252b5132
RH
1514 return true;
1515 }
1516 }
1517 }
1518
dc810e39 1519 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NEEDED, strindex))
252b5132
RH
1520 goto error_return;
1521 }
1522
1523 /* Save the SONAME, if there is one, because sometimes the
c44233aa 1524 linker emulation code will need to know it. */
252b5132 1525 if (*name == '\0')
210ba1e8 1526 name = basename (bfd_get_filename (abfd));
252b5132
RH
1527 elf_dt_name (abfd) = name;
1528 }
1529
6cdc0ccc
AM
1530 /* If this is a dynamic object, we always link against the .dynsym
1531 symbol table, not the .symtab symbol table. The dynamic linker
1532 will only see the .dynsym symbol table, so there is no reason to
1533 look at .symtab for a dynamic object. */
1534
1535 if (! dynamic || elf_dynsymtab (abfd) == 0)
1536 hdr = &elf_tdata (abfd)->symtab_hdr;
1537 else
1538 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1539
1540 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
1541
1542 /* The sh_info field of the symtab header tells us where the
1543 external symbols start. We don't care about the local symbols at
1544 this point. */
1545 if (elf_bad_symtab (abfd))
1546 {
1547 extsymcount = symcount;
1548 extsymoff = 0;
1549 }
1550 else
1551 {
1552 extsymcount = symcount - hdr->sh_info;
1553 extsymoff = hdr->sh_info;
1554 }
252b5132 1555
6cdc0ccc
AM
1556 sym_hash = NULL;
1557 if (extsymcount != 0)
9ad5cbcf 1558 {
6cdc0ccc
AM
1559 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
1560 NULL, NULL, NULL);
1561 if (isymbuf == NULL)
9ad5cbcf 1562 goto error_return;
6cdc0ccc
AM
1563
1564 /* We store a pointer to the hash table entry for each external
1565 symbol. */
1566 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
1567 sym_hash = (struct elf_link_hash_entry **) bfd_alloc (abfd, amt);
1568 if (sym_hash == NULL)
1569 goto error_free_sym;
1570 elf_sym_hashes (abfd) = sym_hash;
1571 }
1572
1573 if (dynamic)
1574 {
1575 /* Read in any version definitions. */
1576 if (! _bfd_elf_slurp_version_tables (abfd))
1577 goto error_free_sym;
1578
1579 /* Read in the symbol versions, but don't bother to convert them
1580 to internal format. */
1581 if (elf_dynversym (abfd) != 0)
1582 {
1583 Elf_Internal_Shdr *versymhdr;
1584
1585 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
1586 extversym = (Elf_External_Versym *) bfd_malloc (versymhdr->sh_size);
1587 if (extversym == NULL)
1588 goto error_free_sym;
1589 amt = versymhdr->sh_size;
1590 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
1591 || bfd_bread ((PTR) extversym, amt, abfd) != amt)
1592 goto error_free_vers;
1593 }
9ad5cbcf
AM
1594 }
1595
252b5132
RH
1596 weaks = NULL;
1597
1598 ever = extversym != NULL ? extversym + extsymoff : NULL;
6cdc0ccc
AM
1599 for (isym = isymbuf, isymend = isymbuf + extsymcount;
1600 isym < isymend;
1601 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
252b5132 1602 {
252b5132
RH
1603 int bind;
1604 bfd_vma value;
1605 asection *sec;
1606 flagword flags;
1607 const char *name;
1608 struct elf_link_hash_entry *h;
1609 boolean definition;
1610 boolean size_change_ok, type_change_ok;
1611 boolean new_weakdef;
1612 unsigned int old_alignment;
215007a6
L
1613 boolean override;
1614
1615 override = false;
252b5132 1616
252b5132
RH
1617 flags = BSF_NO_FLAGS;
1618 sec = NULL;
6cdc0ccc 1619 value = isym->st_value;
252b5132
RH
1620 *sym_hash = NULL;
1621
6cdc0ccc 1622 bind = ELF_ST_BIND (isym->st_info);
252b5132
RH
1623 if (bind == STB_LOCAL)
1624 {
1625 /* This should be impossible, since ELF requires that all
1626 global symbols follow all local symbols, and that sh_info
1627 point to the first global symbol. Unfortunatealy, Irix 5
1628 screws this up. */
1629 continue;
1630 }
1631 else if (bind == STB_GLOBAL)
1632 {
6cdc0ccc
AM
1633 if (isym->st_shndx != SHN_UNDEF
1634 && isym->st_shndx != SHN_COMMON)
252b5132 1635 flags = BSF_GLOBAL;
252b5132
RH
1636 }
1637 else if (bind == STB_WEAK)
1638 flags = BSF_WEAK;
1639 else
1640 {
1641 /* Leave it up to the processor backend. */
1642 }
1643
6cdc0ccc 1644 if (isym->st_shndx == SHN_UNDEF)
252b5132 1645 sec = bfd_und_section_ptr;
6cdc0ccc 1646 else if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
252b5132 1647 {
6cdc0ccc 1648 sec = section_from_elf_index (abfd, isym->st_shndx);
252b5132
RH
1649 if (sec == NULL)
1650 sec = bfd_abs_section_ptr;
1651 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1652 value -= sec->vma;
1653 }
6cdc0ccc 1654 else if (isym->st_shndx == SHN_ABS)
252b5132 1655 sec = bfd_abs_section_ptr;
6cdc0ccc 1656 else if (isym->st_shndx == SHN_COMMON)
252b5132
RH
1657 {
1658 sec = bfd_com_section_ptr;
1659 /* What ELF calls the size we call the value. What ELF
1660 calls the value we call the alignment. */
6cdc0ccc 1661 value = isym->st_size;
252b5132
RH
1662 }
1663 else
1664 {
1665 /* Leave it up to the processor backend. */
1666 }
1667
6cdc0ccc
AM
1668 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
1669 isym->st_name);
252b5132 1670 if (name == (const char *) NULL)
6cdc0ccc 1671 goto error_free_vers;
252b5132 1672
6cdc0ccc
AM
1673 if (isym->st_shndx == SHN_COMMON
1674 && ELF_ST_TYPE (isym->st_info) == STT_TLS)
13ae64f3
JJ
1675 {
1676 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
1677
1678 if (tcomm == NULL)
1679 {
1680 tcomm = bfd_make_section (abfd, ".tcommon");
1681 if (tcomm == NULL
1682 || !bfd_set_section_flags (abfd, tcomm, (SEC_ALLOC
1683 | SEC_IS_COMMON
1684 | SEC_LINKER_CREATED
1685 | SEC_THREAD_LOCAL)))
6cdc0ccc 1686 goto error_free_vers;
13ae64f3
JJ
1687 }
1688 sec = tcomm;
1689 }
1690 else if (add_symbol_hook)
252b5132 1691 {
6cdc0ccc 1692 if (! (*add_symbol_hook) (abfd, info, isym, &name, &flags, &sec,
252b5132 1693 &value))
6cdc0ccc 1694 goto error_free_vers;
252b5132
RH
1695
1696 /* The hook function sets the name to NULL if this symbol
1697 should be skipped for some reason. */
1698 if (name == (const char *) NULL)
1699 continue;
1700 }
1701
1702 /* Sanity check that all possibilities were handled. */
1703 if (sec == (asection *) NULL)
1704 {
1705 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 1706 goto error_free_vers;
252b5132
RH
1707 }
1708
1709 if (bfd_is_und_section (sec)
1710 || bfd_is_com_section (sec))
1711 definition = false;
1712 else
1713 definition = true;
1714
1715 size_change_ok = false;
1716 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
1717 old_alignment = 0;
1718 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1719 {
1720 Elf_Internal_Versym iver;
1721 unsigned int vernum = 0;
252b5132
RH
1722
1723 if (ever != NULL)
1724 {
1725 _bfd_elf_swap_versym_in (abfd, ever, &iver);
1726 vernum = iver.vs_vers & VERSYM_VERSION;
1727
1728 /* If this is a hidden symbol, or if it is not version
c44233aa
AM
1729 1, we append the version name to the symbol name.
1730 However, we do not modify a non-hidden absolute
1731 symbol, because it might be the version symbol
1732 itself. FIXME: What if it isn't? */
252b5132
RH
1733 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
1734 || (vernum > 1 && ! bfd_is_abs_section (sec)))
1735 {
1736 const char *verstr;
d4c88bbb 1737 size_t namelen, verlen, newlen;
252b5132
RH
1738 char *newname, *p;
1739
6cdc0ccc 1740 if (isym->st_shndx != SHN_UNDEF)
252b5132
RH
1741 {
1742 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
1743 {
1744 (*_bfd_error_handler)
1745 (_("%s: %s: invalid version %u (max %d)"),
8f615d07 1746 bfd_archive_filename (abfd), name, vernum,
252b5132
RH
1747 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1748 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 1749 goto error_free_vers;
252b5132
RH
1750 }
1751 else if (vernum > 1)
1752 verstr =
1753 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1754 else
1755 verstr = "";
1756 }
1757 else
1758 {
1759 /* We cannot simply test for the number of
1760 entries in the VERNEED section since the
1761 numbers for the needed versions do not start
1762 at 0. */
1763 Elf_Internal_Verneed *t;
1764
1765 verstr = NULL;
1766 for (t = elf_tdata (abfd)->verref;
1767 t != NULL;
1768 t = t->vn_nextref)
1769 {
1770 Elf_Internal_Vernaux *a;
1771
1772 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1773 {
1774 if (a->vna_other == vernum)
1775 {
1776 verstr = a->vna_nodename;
1777 break;
1778 }
1779 }
1780 if (a != NULL)
1781 break;
1782 }
1783 if (verstr == NULL)
1784 {
1785 (*_bfd_error_handler)
1786 (_("%s: %s: invalid needed version %d"),
8f615d07 1787 bfd_archive_filename (abfd), name, vernum);
252b5132 1788 bfd_set_error (bfd_error_bad_value);
6cdc0ccc 1789 goto error_free_vers;
252b5132
RH
1790 }
1791 }
1792
1793 namelen = strlen (name);
d4c88bbb
AM
1794 verlen = strlen (verstr);
1795 newlen = namelen + verlen + 2;
1796 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
6cdc0ccc 1797 && isym->st_shndx != SHN_UNDEF)
252b5132
RH
1798 ++newlen;
1799
d4c88bbb 1800 newname = (char *) bfd_alloc (abfd, (bfd_size_type) newlen);
252b5132 1801 if (newname == NULL)
6cdc0ccc 1802 goto error_free_vers;
d4c88bbb 1803 memcpy (newname, name, namelen);
252b5132
RH
1804 p = newname + namelen;
1805 *p++ = ELF_VER_CHR;
1287d1cc
ILT
1806 /* If this is a defined non-hidden version symbol,
1807 we add another @ to the name. This indicates the
1808 default version of the symbol. */
1809 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
6cdc0ccc 1810 && isym->st_shndx != SHN_UNDEF)
252b5132 1811 *p++ = ELF_VER_CHR;
d4c88bbb 1812 memcpy (p, verstr, verlen + 1);
252b5132
RH
1813
1814 name = newname;
1815 }
1816 }
1817
6cdc0ccc 1818 if (! elf_merge_symbol (abfd, info, name, isym, &sec, &value,
252b5132 1819 sym_hash, &override, &type_change_ok,
456981d7 1820 &size_change_ok, dt_needed))
6cdc0ccc 1821 goto error_free_vers;
252b5132
RH
1822
1823 if (override)
1824 definition = false;
1825
1826 h = *sym_hash;
1827 while (h->root.type == bfd_link_hash_indirect
1828 || h->root.type == bfd_link_hash_warning)
1829 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1830
1831 /* Remember the old alignment if this is a common symbol, so
c44233aa
AM
1832 that we don't reduce the alignment later on. We can't
1833 check later, because _bfd_generic_link_add_one_symbol
1834 will set a default for the alignment which we want to
1835 override. */
252b5132
RH
1836 if (h->root.type == bfd_link_hash_common)
1837 old_alignment = h->root.u.c.p->alignment_power;
1838
1839 if (elf_tdata (abfd)->verdef != NULL
1840 && ! override
1841 && vernum > 1
1842 && definition)
1843 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
1844 }
1845
1846 if (! (_bfd_generic_link_add_one_symbol
1847 (info, abfd, name, flags, sec, value, (const char *) NULL,
1848 false, collect, (struct bfd_link_hash_entry **) sym_hash)))
6cdc0ccc 1849 goto error_free_vers;
252b5132
RH
1850
1851 h = *sym_hash;
1852 while (h->root.type == bfd_link_hash_indirect
1853 || h->root.type == bfd_link_hash_warning)
1854 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1855 *sym_hash = h;
1856
1857 new_weakdef = false;
1858 if (dynamic
1859 && definition
1860 && (flags & BSF_WEAK) != 0
6cdc0ccc 1861 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
252b5132
RH
1862 && info->hash->creator->flavour == bfd_target_elf_flavour
1863 && h->weakdef == NULL)
1864 {
1865 /* Keep a list of all weak defined non function symbols from
1866 a dynamic object, using the weakdef field. Later in this
1867 function we will set the weakdef field to the correct
1868 value. We only put non-function symbols from dynamic
1869 objects on this list, because that happens to be the only
1870 time we need to know the normal symbol corresponding to a
1871 weak symbol, and the information is time consuming to
1872 figure out. If the weakdef field is not already NULL,
1873 then this symbol was already defined by some previous
1874 dynamic object, and we will be using that previous
1875 definition anyhow. */
1876
1877 h->weakdef = weaks;
1878 weaks = h;
1879 new_weakdef = true;
1880 }
1881
1882 /* Set the alignment of a common symbol. */
6cdc0ccc 1883 if (isym->st_shndx == SHN_COMMON
252b5132
RH
1884 && h->root.type == bfd_link_hash_common)
1885 {
1886 unsigned int align;
1887
6cdc0ccc 1888 align = bfd_log2 (isym->st_value);
724982f6
NC
1889 if (align > old_alignment
1890 /* Permit an alignment power of zero if an alignment of one
1891 is specified and no other alignments have been specified. */
6cdc0ccc 1892 || (isym->st_value == 1 && old_alignment == 0))
252b5132
RH
1893 h->root.u.c.p->alignment_power = align;
1894 }
1895
1896 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1897 {
1898 int old_flags;
1899 boolean dynsym;
1900 int new_flag;
1901
1902 /* Remember the symbol size and type. */
6cdc0ccc 1903 if (isym->st_size != 0
252b5132
RH
1904 && (definition || h->size == 0))
1905 {
6cdc0ccc 1906 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
252b5132
RH
1907 (*_bfd_error_handler)
1908 (_("Warning: size of symbol `%s' changed from %lu to %lu in %s"),
6cdc0ccc
AM
1909 name, (unsigned long) h->size,
1910 (unsigned long) isym->st_size, bfd_archive_filename (abfd));
252b5132 1911
6cdc0ccc 1912 h->size = isym->st_size;
252b5132
RH
1913 }
1914
1915 /* If this is a common symbol, then we always want H->SIZE
c44233aa
AM
1916 to be the size of the common symbol. The code just above
1917 won't fix the size if a common symbol becomes larger. We
1918 don't warn about a size change here, because that is
1919 covered by --warn-common. */
252b5132
RH
1920 if (h->root.type == bfd_link_hash_common)
1921 h->size = h->root.u.c.size;
1922
6cdc0ccc 1923 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
252b5132
RH
1924 && (definition || h->type == STT_NOTYPE))
1925 {
1926 if (h->type != STT_NOTYPE
6cdc0ccc 1927 && h->type != ELF_ST_TYPE (isym->st_info)
252b5132
RH
1928 && ! type_change_ok)
1929 (*_bfd_error_handler)
1930 (_("Warning: type of symbol `%s' changed from %d to %d in %s"),
6cdc0ccc 1931 name, h->type, ELF_ST_TYPE (isym->st_info),
8f615d07 1932 bfd_archive_filename (abfd));
252b5132 1933
6cdc0ccc 1934 h->type = ELF_ST_TYPE (isym->st_info);
252b5132
RH
1935 }
1936
7a13edea
NC
1937 /* If st_other has a processor-specific meaning, specific code
1938 might be needed here. */
6cdc0ccc 1939 if (isym->st_other != 0)
7a13edea
NC
1940 {
1941 /* Combine visibilities, using the most constraining one. */
1942 unsigned char hvis = ELF_ST_VISIBILITY (h->other);
6cdc0ccc 1943 unsigned char symvis = ELF_ST_VISIBILITY (isym->st_other);
3e932841 1944
7a13edea 1945 if (symvis && (hvis > symvis || hvis == 0))
6cdc0ccc 1946 h->other = isym->st_other;
3e932841 1947
7a13edea 1948 /* If neither has visibility, use the st_other of the
c44233aa
AM
1949 definition. This is an arbitrary choice, since the
1950 other bits have no general meaning. */
7a13edea
NC
1951 if (!symvis && !hvis
1952 && (definition || h->other == 0))
6cdc0ccc 1953 h->other = isym->st_other;
7a13edea 1954 }
252b5132
RH
1955
1956 /* Set a flag in the hash table entry indicating the type of
1957 reference or definition we just found. Keep a count of
1958 the number of dynamic symbols we find. A dynamic symbol
1959 is one which is referenced or defined by both a regular
1960 object and a shared object. */
1961 old_flags = h->elf_link_hash_flags;
1962 dynsym = false;
1963 if (! dynamic)
1964 {
1965 if (! definition)
1966 {
1967 new_flag = ELF_LINK_HASH_REF_REGULAR;
1968 if (bind != STB_WEAK)
1969 new_flag |= ELF_LINK_HASH_REF_REGULAR_NONWEAK;
1970 }
1971 else
1972 new_flag = ELF_LINK_HASH_DEF_REGULAR;
1973 if (info->shared
1974 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1975 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1976 dynsym = true;
1977 }
1978 else
1979 {
1980 if (! definition)
1981 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1982 else
1983 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
1984 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1985 | ELF_LINK_HASH_REF_REGULAR)) != 0
1986 || (h->weakdef != NULL
1987 && ! new_weakdef
1988 && h->weakdef->dynindx != -1))
1989 dynsym = true;
1990 }
1991
1992 h->elf_link_hash_flags |= new_flag;
1993
215007a6
L
1994 /* Check to see if we need to add an indirect symbol for
1995 the default name. */
051b8577 1996 if (definition || h->root.type == bfd_link_hash_common)
6cdc0ccc 1997 if (! elf_add_default_symbol (abfd, info, h, name, isym,
215007a6
L
1998 &sec, &value, &dynsym,
1999 override, dt_needed))
6cdc0ccc 2000 goto error_free_vers;
252b5132
RH
2001
2002 if (dynsym && h->dynindx == -1)
2003 {
2004 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
6cdc0ccc 2005 goto error_free_vers;
252b5132
RH
2006 if (h->weakdef != NULL
2007 && ! new_weakdef
2008 && h->weakdef->dynindx == -1)
2009 {
a7b97311 2010 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
6cdc0ccc 2011 goto error_free_vers;
252b5132
RH
2012 }
2013 }
38048eb9 2014 else if (dynsym && h->dynindx != -1)
0444bdd4
L
2015 /* If the symbol already has a dynamic index, but
2016 visibility says it should not be visible, turn it into
2017 a local symbol. */
2018 switch (ELF_ST_VISIBILITY (h->other))
2019 {
2020 case STV_INTERNAL:
3e932841 2021 case STV_HIDDEN:
e5094212 2022 (*bed->elf_backend_hide_symbol) (info, h, true);
0444bdd4
L
2023 break;
2024 }
74816898
L
2025
2026 if (dt_needed && definition
2027 && (h->elf_link_hash_flags
2028 & ELF_LINK_HASH_REF_REGULAR) != 0)
2029 {
2030 bfd_size_type oldsize;
2031 bfd_size_type strindex;
2032
8ea2e4bd 2033 if (! is_elf_hash_table (info))
6cdc0ccc 2034 goto error_free_vers;
8ea2e4bd 2035
74816898 2036 /* The symbol from a DT_NEEDED object is referenced from
c44233aa 2037 the regular object to create a dynamic executable. We
3e932841 2038 have to make sure there is a DT_NEEDED entry for it. */
74816898
L
2039
2040 dt_needed = false;
2b0f7ef9
JJ
2041 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
2042 strindex = _bfd_elf_strtab_add (hash_table->dynstr,
2043 elf_dt_soname (abfd), false);
74816898 2044 if (strindex == (bfd_size_type) -1)
6cdc0ccc 2045 goto error_free_vers;
74816898 2046
2b0f7ef9 2047 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
74816898
L
2048 {
2049 asection *sdyn;
2050 Elf_External_Dyn *dyncon, *dynconend;
2051
8ea2e4bd 2052 sdyn = bfd_get_section_by_name (hash_table->dynobj,
74816898
L
2053 ".dynamic");
2054 BFD_ASSERT (sdyn != NULL);
2055
2056 dyncon = (Elf_External_Dyn *) sdyn->contents;
2057 dynconend = (Elf_External_Dyn *) (sdyn->contents +
2058 sdyn->_raw_size);
2059 for (; dyncon < dynconend; dyncon++)
2060 {
2061 Elf_Internal_Dyn dyn;
2062
8ea2e4bd 2063 elf_swap_dyn_in (hash_table->dynobj,
74816898
L
2064 dyncon, &dyn);
2065 BFD_ASSERT (dyn.d_tag != DT_NEEDED ||
2066 dyn.d_un.d_val != strindex);
2067 }
2068 }
2069
dc810e39 2070 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NEEDED, strindex))
6cdc0ccc 2071 goto error_free_vers;
74816898 2072 }
252b5132
RH
2073 }
2074 }
2075
6cdc0ccc
AM
2076 if (extversym != NULL)
2077 {
2078 free (extversym);
2079 extversym = NULL;
2080 }
2081
2082 if (isymbuf != NULL)
2083 free (isymbuf);
2084 isymbuf = NULL;
2085
252b5132
RH
2086 /* Now set the weakdefs field correctly for all the weak defined
2087 symbols we found. The only way to do this is to search all the
2088 symbols. Since we only need the information for non functions in
2089 dynamic objects, that's the only time we actually put anything on
2090 the list WEAKS. We need this information so that if a regular
2091 object refers to a symbol defined weakly in a dynamic object, the
2092 real symbol in the dynamic object is also put in the dynamic
2093 symbols; we also must arrange for both symbols to point to the
2094 same memory location. We could handle the general case of symbol
2095 aliasing, but a general symbol alias can only be generated in
2096 assembler code, handling it correctly would be very time
2097 consuming, and other ELF linkers don't handle general aliasing
2098 either. */
2099 while (weaks != NULL)
2100 {
2101 struct elf_link_hash_entry *hlook;
2102 asection *slook;
2103 bfd_vma vlook;
2104 struct elf_link_hash_entry **hpp;
2105 struct elf_link_hash_entry **hppend;
2106
2107 hlook = weaks;
2108 weaks = hlook->weakdef;
2109 hlook->weakdef = NULL;
2110
2111 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
2112 || hlook->root.type == bfd_link_hash_defweak
2113 || hlook->root.type == bfd_link_hash_common
2114 || hlook->root.type == bfd_link_hash_indirect);
2115 slook = hlook->root.u.def.section;
2116 vlook = hlook->root.u.def.value;
2117
2118 hpp = elf_sym_hashes (abfd);
2119 hppend = hpp + extsymcount;
2120 for (; hpp < hppend; hpp++)
2121 {
2122 struct elf_link_hash_entry *h;
2123
2124 h = *hpp;
2125 if (h != NULL && h != hlook
2126 && h->root.type == bfd_link_hash_defined
2127 && h->root.u.def.section == slook
2128 && h->root.u.def.value == vlook)
2129 {
2130 hlook->weakdef = h;
2131
2132 /* If the weak definition is in the list of dynamic
2133 symbols, make sure the real definition is put there
2134 as well. */
2135 if (hlook->dynindx != -1
2136 && h->dynindx == -1)
2137 {
2138 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2139 goto error_return;
2140 }
2141
2142 /* If the real definition is in the list of dynamic
c44233aa
AM
2143 symbols, make sure the weak definition is put there
2144 as well. If we don't do this, then the dynamic
2145 loader might not merge the entries for the real
2146 definition and the weak definition. */
252b5132
RH
2147 if (h->dynindx != -1
2148 && hlook->dynindx == -1)
2149 {
2150 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
2151 goto error_return;
2152 }
252b5132
RH
2153 break;
2154 }
2155 }
2156 }
2157
252b5132
RH
2158 /* If this object is the same format as the output object, and it is
2159 not a shared library, then let the backend look through the
2160 relocs.
2161
2162 This is required to build global offset table entries and to
2163 arrange for dynamic relocs. It is not required for the
2164 particular common case of linking non PIC code, even when linking
2165 against shared libraries, but unfortunately there is no way of
2166 knowing whether an object file has been compiled PIC or not.
2167 Looking through the relocs is not particularly time consuming.
2168 The problem is that we must either (1) keep the relocs in memory,
2169 which causes the linker to require additional runtime memory or
2170 (2) read the relocs twice from the input file, which wastes time.
2171 This would be a good case for using mmap.
2172
2173 I have no idea how to handle linking PIC code into a file of a
2174 different format. It probably can't be done. */
2175 check_relocs = get_elf_backend_data (abfd)->check_relocs;
2176 if (! dynamic
2177 && abfd->xvec == info->hash->creator
2178 && check_relocs != NULL)
2179 {
2180 asection *o;
2181
2182 for (o = abfd->sections; o != NULL; o = o->next)
2183 {
2184 Elf_Internal_Rela *internal_relocs;
2185 boolean ok;
2186
2187 if ((o->flags & SEC_RELOC) == 0
2188 || o->reloc_count == 0
2189 || ((info->strip == strip_all || info->strip == strip_debugger)
2190 && (o->flags & SEC_DEBUGGING) != 0)
2191 || bfd_is_abs_section (o->output_section))
2192 continue;
2193
2194 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
2195 (abfd, o, (PTR) NULL,
2196 (Elf_Internal_Rela *) NULL,
2197 info->keep_memory));
2198 if (internal_relocs == NULL)
2199 goto error_return;
2200
2201 ok = (*check_relocs) (abfd, info, o, internal_relocs);
2202
6cdc0ccc 2203 if (elf_section_data (o)->relocs != internal_relocs)
252b5132
RH
2204 free (internal_relocs);
2205
2206 if (! ok)
2207 goto error_return;
2208 }
2209 }
2210
2211 /* If this is a non-traditional, non-relocateable link, try to
2212 optimize the handling of the .stab/.stabstr sections. */
2213 if (! dynamic
2214 && ! info->relocateable
2215 && ! info->traditional_format
2216 && info->hash->creator->flavour == bfd_target_elf_flavour
8ea2e4bd 2217 && is_elf_hash_table (info)
252b5132
RH
2218 && (info->strip != strip_all && info->strip != strip_debugger))
2219 {
2220 asection *stab, *stabstr;
2221
2222 stab = bfd_get_section_by_name (abfd, ".stab");
2d653fc7
AM
2223 if (stab != NULL
2224 && (stab->flags & SEC_MERGE) == 0
2225 && !bfd_is_abs_section (stab->output_section))
252b5132
RH
2226 {
2227 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
2228
2229 if (stabstr != NULL)
2230 {
2231 struct bfd_elf_section_data *secdata;
2232
2233 secdata = elf_section_data (stab);
2234 if (! _bfd_link_section_stabs (abfd,
8ea2e4bd 2235 & hash_table->stab_info,
252b5132 2236 stab, stabstr,
65765700 2237 &secdata->sec_info))
252b5132 2238 goto error_return;
65765700
JJ
2239 if (secdata->sec_info)
2240 secdata->sec_info_type = ELF_INFO_TYPE_STABS;
252b5132
RH
2241 }
2242 }
2243 }
2244
8ea2e4bd
NC
2245 if (! info->relocateable && ! dynamic
2246 && is_elf_hash_table (info))
f5fa8ca2
JJ
2247 {
2248 asection *s;
2249
2250 for (s = abfd->sections; s != NULL; s = s->next)
2d653fc7
AM
2251 if ((s->flags & SEC_MERGE) != 0
2252 && !bfd_is_abs_section (s->output_section))
65765700
JJ
2253 {
2254 struct bfd_elf_section_data *secdata;
2255
2256 secdata = elf_section_data (s);
2257 if (! _bfd_merge_section (abfd,
2258 & hash_table->merge_info,
2259 s, &secdata->sec_info))
2260 goto error_return;
2261 else if (secdata->sec_info)
2262 secdata->sec_info_type = ELF_INFO_TYPE_MERGE;
2263 }
f5fa8ca2
JJ
2264 }
2265
f5d44ba0
AM
2266 if (is_elf_hash_table (info))
2267 {
2268 /* Add this bfd to the loaded list. */
2269 struct elf_link_loaded_list *n;
2270
2271 n = ((struct elf_link_loaded_list *)
2272 bfd_alloc (abfd, sizeof (struct elf_link_loaded_list)));
2273 if (n == NULL)
2274 goto error_return;
2275 n->abfd = abfd;
2276 n->next = hash_table->loaded;
2277 hash_table->loaded = n;
2278 }
2279
252b5132
RH
2280 return true;
2281
6cdc0ccc 2282 error_free_vers:
252b5132
RH
2283 if (extversym != NULL)
2284 free (extversym);
6cdc0ccc
AM
2285 error_free_sym:
2286 if (isymbuf != NULL)
2287 free (isymbuf);
2288 error_return:
252b5132
RH
2289 return false;
2290}
2291
2292/* Create some sections which will be filled in with dynamic linking
2293 information. ABFD is an input file which requires dynamic sections
2294 to be created. The dynamic sections take up virtual memory space
2295 when the final executable is run, so we need to create them before
2296 addresses are assigned to the output sections. We work out the
2297 actual contents and size of these sections later. */
2298
2299boolean
2300elf_link_create_dynamic_sections (abfd, info)
2301 bfd *abfd;
2302 struct bfd_link_info *info;
2303{
2304 flagword flags;
2305 register asection *s;
2306 struct elf_link_hash_entry *h;
14a793b2 2307 struct bfd_link_hash_entry *bh;
252b5132
RH
2308 struct elf_backend_data *bed;
2309
8ea2e4bd
NC
2310 if (! is_elf_hash_table (info))
2311 return false;
2312
252b5132
RH
2313 if (elf_hash_table (info)->dynamic_sections_created)
2314 return true;
2315
2316 /* Make sure that all dynamic sections use the same input BFD. */
2317 if (elf_hash_table (info)->dynobj == NULL)
2318 elf_hash_table (info)->dynobj = abfd;
2319 else
2320 abfd = elf_hash_table (info)->dynobj;
2321
2322 /* Note that we set the SEC_IN_MEMORY flag for all of these
2323 sections. */
2324 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
2325 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2326
2327 /* A dynamically linked executable has a .interp section, but a
2328 shared library does not. */
2329 if (! info->shared)
2330 {
2331 s = bfd_make_section (abfd, ".interp");
2332 if (s == NULL
2333 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2334 return false;
2335 }
2336
65765700
JJ
2337 if (! info->traditional_format
2338 && info->hash->creator->flavour == bfd_target_elf_flavour)
2339 {
2340 s = bfd_make_section (abfd, ".eh_frame_hdr");
2341 if (s == NULL
2342 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2343 || ! bfd_set_section_alignment (abfd, s, 2))
2344 return false;
2345 }
2346
252b5132
RH
2347 /* Create sections to hold version informations. These are removed
2348 if they are not needed. */
2349 s = bfd_make_section (abfd, ".gnu.version_d");
2350 if (s == NULL
2351 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2352 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2353 return false;
2354
2355 s = bfd_make_section (abfd, ".gnu.version");
2356 if (s == NULL
2357 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2358 || ! bfd_set_section_alignment (abfd, s, 1))
2359 return false;
2360
2361 s = bfd_make_section (abfd, ".gnu.version_r");
2362 if (s == NULL
2363 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2364 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2365 return false;
2366
2367 s = bfd_make_section (abfd, ".dynsym");
2368 if (s == NULL
2369 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2370 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2371 return false;
2372
2373 s = bfd_make_section (abfd, ".dynstr");
2374 if (s == NULL
2375 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2376 return false;
2377
2378 /* Create a strtab to hold the dynamic symbol names. */
2379 if (elf_hash_table (info)->dynstr == NULL)
2380 {
2b0f7ef9 2381 elf_hash_table (info)->dynstr = _bfd_elf_strtab_init ();
252b5132
RH
2382 if (elf_hash_table (info)->dynstr == NULL)
2383 return false;
2384 }
2385
2386 s = bfd_make_section (abfd, ".dynamic");
2387 if (s == NULL
2388 || ! bfd_set_section_flags (abfd, s, flags)
2389 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2390 return false;
2391
2392 /* The special symbol _DYNAMIC is always set to the start of the
2393 .dynamic section. This call occurs before we have processed the
2394 symbols for any dynamic object, so we don't have to worry about
2395 overriding a dynamic definition. We could set _DYNAMIC in a
2396 linker script, but we only want to define it if we are, in fact,
2397 creating a .dynamic section. We don't want to define it if there
2398 is no .dynamic section, since on some ELF platforms the start up
2399 code examines it to decide how to initialize the process. */
14a793b2 2400 bh = NULL;
252b5132
RH
2401 if (! (_bfd_generic_link_add_one_symbol
2402 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, (bfd_vma) 0,
14a793b2 2403 (const char *) 0, false, get_elf_backend_data (abfd)->collect, &bh)))
252b5132 2404 return false;
14a793b2 2405 h = (struct elf_link_hash_entry *) bh;
252b5132
RH
2406 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2407 h->type = STT_OBJECT;
2408
2409 if (info->shared
2410 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
2411 return false;
2412
c7ac6ff8
MM
2413 bed = get_elf_backend_data (abfd);
2414
252b5132
RH
2415 s = bfd_make_section (abfd, ".hash");
2416 if (s == NULL
2417 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2418 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2419 return false;
c7ac6ff8 2420 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
252b5132
RH
2421
2422 /* Let the backend create the rest of the sections. This lets the
2423 backend set the right flags. The backend will normally create
2424 the .got and .plt sections. */
252b5132
RH
2425 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
2426 return false;
2427
2428 elf_hash_table (info)->dynamic_sections_created = true;
2429
2430 return true;
2431}
2432
2433/* Add an entry to the .dynamic table. */
2434
2435boolean
2436elf_add_dynamic_entry (info, tag, val)
2437 struct bfd_link_info *info;
2438 bfd_vma tag;
2439 bfd_vma val;
2440{
2441 Elf_Internal_Dyn dyn;
2442 bfd *dynobj;
2443 asection *s;
dc810e39 2444 bfd_size_type newsize;
252b5132
RH
2445 bfd_byte *newcontents;
2446
8ea2e4bd
NC
2447 if (! is_elf_hash_table (info))
2448 return false;
2449
252b5132
RH
2450 dynobj = elf_hash_table (info)->dynobj;
2451
2452 s = bfd_get_section_by_name (dynobj, ".dynamic");
2453 BFD_ASSERT (s != NULL);
2454
2455 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
2456 newcontents = (bfd_byte *) bfd_realloc (s->contents, newsize);
2457 if (newcontents == NULL)
2458 return false;
2459
2460 dyn.d_tag = tag;
2461 dyn.d_un.d_val = val;
2462 elf_swap_dyn_out (dynobj, &dyn,
2463 (Elf_External_Dyn *) (newcontents + s->_raw_size));
2464
2465 s->_raw_size = newsize;
2466 s->contents = newcontents;
2467
2468 return true;
2469}
2470\f
6b5bd373
MM
2471/* Read and swap the relocs from the section indicated by SHDR. This
2472 may be either a REL or a RELA section. The relocations are
2473 translated into RELA relocations and stored in INTERNAL_RELOCS,
2474 which should have already been allocated to contain enough space.
2475 The EXTERNAL_RELOCS are a buffer where the external form of the
2476 relocations should be stored.
2477
2478 Returns false if something goes wrong. */
2479
2480static boolean
2481elf_link_read_relocs_from_section (abfd, shdr, external_relocs,
2482 internal_relocs)
2483 bfd *abfd;
2484 Elf_Internal_Shdr *shdr;
2485 PTR external_relocs;
2486 Elf_Internal_Rela *internal_relocs;
2487{
c7ac6ff8 2488 struct elf_backend_data *bed;
dc810e39 2489 bfd_size_type amt;
c7ac6ff8 2490
6b5bd373
MM
2491 /* If there aren't any relocations, that's OK. */
2492 if (!shdr)
2493 return true;
2494
2495 /* Position ourselves at the start of the section. */
2496 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
2497 return false;
2498
2499 /* Read the relocations. */
dc810e39 2500 if (bfd_bread (external_relocs, shdr->sh_size, abfd) != shdr->sh_size)
6b5bd373
MM
2501 return false;
2502
c7ac6ff8
MM
2503 bed = get_elf_backend_data (abfd);
2504
6b5bd373
MM
2505 /* Convert the external relocations to the internal format. */
2506 if (shdr->sh_entsize == sizeof (Elf_External_Rel))
2507 {
2508 Elf_External_Rel *erel;
2509 Elf_External_Rel *erelend;
2510 Elf_Internal_Rela *irela;
c7ac6ff8 2511 Elf_Internal_Rel *irel;
6b5bd373
MM
2512
2513 erel = (Elf_External_Rel *) external_relocs;
d9bc7a44 2514 erelend = erel + NUM_SHDR_ENTRIES (shdr);
6b5bd373 2515 irela = internal_relocs;
dc810e39
AM
2516 amt = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rel);
2517 irel = bfd_alloc (abfd, amt);
c7ac6ff8 2518 for (; erel < erelend; erel++, irela += bed->s->int_rels_per_ext_rel)
6b5bd373 2519 {
4e8a9624 2520 unsigned int i;
c7ac6ff8
MM
2521
2522 if (bed->s->swap_reloc_in)
2523 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, irel);
2524 else
2525 elf_swap_reloc_in (abfd, erel, irel);
6b5bd373 2526
c7ac6ff8
MM
2527 for (i = 0; i < bed->s->int_rels_per_ext_rel; ++i)
2528 {
2529 irela[i].r_offset = irel[i].r_offset;
2530 irela[i].r_info = irel[i].r_info;
2531 irela[i].r_addend = 0;
2532 }
6b5bd373
MM
2533 }
2534 }
2535 else
2536 {
2537 Elf_External_Rela *erela;
2538 Elf_External_Rela *erelaend;
2539 Elf_Internal_Rela *irela;
2540
2541 BFD_ASSERT (shdr->sh_entsize == sizeof (Elf_External_Rela));
2542
2543 erela = (Elf_External_Rela *) external_relocs;
d9bc7a44 2544 erelaend = erela + NUM_SHDR_ENTRIES (shdr);
6b5bd373 2545 irela = internal_relocs;
c7ac6ff8
MM
2546 for (; erela < erelaend; erela++, irela += bed->s->int_rels_per_ext_rel)
2547 {
2548 if (bed->s->swap_reloca_in)
2549 (*bed->s->swap_reloca_in) (abfd, (bfd_byte *) erela, irela);
2550 else
2551 elf_swap_reloca_in (abfd, erela, irela);
2552 }
6b5bd373
MM
2553 }
2554
2555 return true;
2556}
2557
23bc299b
MM
2558/* Read and swap the relocs for a section O. They may have been
2559 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
2560 not NULL, they are used as buffers to read into. They are known to
2561 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
2562 the return value is allocated using either malloc or bfd_alloc,
2563 according to the KEEP_MEMORY argument. If O has two relocation
2564 sections (both REL and RELA relocations), then the REL_HDR
2565 relocations will appear first in INTERNAL_RELOCS, followed by the
2566 REL_HDR2 relocations. */
252b5132
RH
2567
2568Elf_Internal_Rela *
2569NAME(_bfd_elf,link_read_relocs) (abfd, o, external_relocs, internal_relocs,
2570 keep_memory)
2571 bfd *abfd;
2572 asection *o;
2573 PTR external_relocs;
2574 Elf_Internal_Rela *internal_relocs;
2575 boolean keep_memory;
2576{
2577 Elf_Internal_Shdr *rel_hdr;
2578 PTR alloc1 = NULL;
2579 Elf_Internal_Rela *alloc2 = NULL;
c7ac6ff8 2580 struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
2581
2582 if (elf_section_data (o)->relocs != NULL)
2583 return elf_section_data (o)->relocs;
2584
2585 if (o->reloc_count == 0)
2586 return NULL;
2587
2588 rel_hdr = &elf_section_data (o)->rel_hdr;
2589
2590 if (internal_relocs == NULL)
2591 {
dc810e39 2592 bfd_size_type size;
252b5132 2593
dc810e39
AM
2594 size = o->reloc_count;
2595 size *= bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
252b5132
RH
2596 if (keep_memory)
2597 internal_relocs = (Elf_Internal_Rela *) bfd_alloc (abfd, size);
2598 else
2599 internal_relocs = alloc2 = (Elf_Internal_Rela *) bfd_malloc (size);
2600 if (internal_relocs == NULL)
2601 goto error_return;
2602 }
2603
2604 if (external_relocs == NULL)
2605 {
dc810e39 2606 bfd_size_type size = rel_hdr->sh_size;
6b5bd373
MM
2607
2608 if (elf_section_data (o)->rel_hdr2)
dc810e39 2609 size += elf_section_data (o)->rel_hdr2->sh_size;
6b5bd373 2610 alloc1 = (PTR) bfd_malloc (size);
252b5132
RH
2611 if (alloc1 == NULL)
2612 goto error_return;
2613 external_relocs = alloc1;
2614 }
2615
6b5bd373
MM
2616 if (!elf_link_read_relocs_from_section (abfd, rel_hdr,
2617 external_relocs,
2618 internal_relocs))
2619 goto error_return;
3e932841
KH
2620 if (!elf_link_read_relocs_from_section
2621 (abfd,
6b5bd373 2622 elf_section_data (o)->rel_hdr2,
2f5116e2 2623 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
d9bc7a44 2624 internal_relocs + (NUM_SHDR_ENTRIES (rel_hdr)
c7ac6ff8 2625 * bed->s->int_rels_per_ext_rel)))
252b5132 2626 goto error_return;
252b5132
RH
2627
2628 /* Cache the results for next time, if we can. */
2629 if (keep_memory)
2630 elf_section_data (o)->relocs = internal_relocs;
2631
2632 if (alloc1 != NULL)
2633 free (alloc1);
2634
2635 /* Don't free alloc2, since if it was allocated we are passing it
2636 back (under the name of internal_relocs). */
2637
2638 return internal_relocs;
2639
2640 error_return:
2641 if (alloc1 != NULL)
2642 free (alloc1);
2643 if (alloc2 != NULL)
2644 free (alloc2);
2645 return NULL;
2646}
2647\f
252b5132
RH
2648/* Record an assignment to a symbol made by a linker script. We need
2649 this in case some dynamic object refers to this symbol. */
2650
252b5132
RH
2651boolean
2652NAME(bfd_elf,record_link_assignment) (output_bfd, info, name, provide)
7442e600 2653 bfd *output_bfd ATTRIBUTE_UNUSED;
252b5132
RH
2654 struct bfd_link_info *info;
2655 const char *name;
2656 boolean provide;
2657{
2658 struct elf_link_hash_entry *h;
2659
2660 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2661 return true;
2662
2663 h = elf_link_hash_lookup (elf_hash_table (info), name, true, true, false);
2664 if (h == NULL)
2665 return false;
2666
2667 if (h->root.type == bfd_link_hash_new)
a7b97311 2668 h->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
252b5132
RH
2669
2670 /* If this symbol is being provided by the linker script, and it is
2671 currently defined by a dynamic object, but not by a regular
2672 object, then mark it as undefined so that the generic linker will
2673 force the correct value. */
2674 if (provide
2675 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2676 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2677 h->root.type = bfd_link_hash_undefined;
2678
2679 /* If this symbol is not being provided by the linker script, and it is
2680 currently defined by a dynamic object, but not by a regular object,
2681 then clear out any version information because the symbol will not be
2682 associated with the dynamic object any more. */
2683 if (!provide
2684 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2685 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2686 h->verinfo.verdef = NULL;
2687
2688 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
994819d2 2689
252b5132
RH
2690 if (((h->elf_link_hash_flags & (ELF_LINK_HASH_DEF_DYNAMIC
2691 | ELF_LINK_HASH_REF_DYNAMIC)) != 0
2692 || info->shared)
2693 && h->dynindx == -1)
2694 {
2695 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2696 return false;
2697
2698 /* If this is a weak defined symbol, and we know a corresponding
2699 real symbol from the same dynamic object, make sure the real
2700 symbol is also made into a dynamic symbol. */
2701 if (h->weakdef != NULL
2702 && h->weakdef->dynindx == -1)
2703 {
2704 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2705 return false;
2706 }
2707 }
2708
2709 return true;
2710}
2711\f
2712/* This structure is used to pass information to
2713 elf_link_assign_sym_version. */
2714
2715struct elf_assign_sym_version_info
2716{
2717 /* Output BFD. */
2718 bfd *output_bfd;
2719 /* General link information. */
2720 struct bfd_link_info *info;
2721 /* Version tree. */
2722 struct bfd_elf_version_tree *verdefs;
252b5132
RH
2723 /* Whether we had a failure. */
2724 boolean failed;
2725};
2726
2727/* This structure is used to pass information to
2728 elf_link_find_version_dependencies. */
2729
2730struct elf_find_verdep_info
2731{
2732 /* Output BFD. */
2733 bfd *output_bfd;
2734 /* General link information. */
2735 struct bfd_link_info *info;
2736 /* The number of dependencies. */
2737 unsigned int vers;
2738 /* Whether we had a failure. */
2739 boolean failed;
2740};
2741
2742/* Array used to determine the number of hash table buckets to use
2743 based on the number of symbols there are. If there are fewer than
2744 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
2745 fewer than 37 we use 17 buckets, and so forth. We never use more
2746 than 32771 buckets. */
2747
2748static const size_t elf_buckets[] =
2749{
2750 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
2751 16411, 32771, 0
2752};
2753
2754/* Compute bucket count for hashing table. We do not use a static set
2755 of possible tables sizes anymore. Instead we determine for all
2756 possible reasonable sizes of the table the outcome (i.e., the
2757 number of collisions etc) and choose the best solution. The
2758 weighting functions are not too simple to allow the table to grow
2759 without bounds. Instead one of the weighting factors is the size.
2760 Therefore the result is always a good payoff between few collisions
2761 (= short chain lengths) and table size. */
2762static size_t
2763compute_bucket_count (info)
2764 struct bfd_link_info *info;
2765{
2766 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
7442e600 2767 size_t best_size = 0;
252b5132
RH
2768 unsigned long int *hashcodes;
2769 unsigned long int *hashcodesp;
2770 unsigned long int i;
dc810e39 2771 bfd_size_type amt;
252b5132
RH
2772
2773 /* Compute the hash values for all exported symbols. At the same
2774 time store the values in an array so that we could use them for
2775 optimizations. */
dc810e39
AM
2776 amt = dynsymcount;
2777 amt *= sizeof (unsigned long int);
2778 hashcodes = (unsigned long int *) bfd_malloc (amt);
252b5132
RH
2779 if (hashcodes == NULL)
2780 return 0;
2781 hashcodesp = hashcodes;
2782
2783 /* Put all hash values in HASHCODES. */
2784 elf_link_hash_traverse (elf_hash_table (info),
2785 elf_collect_hash_codes, &hashcodesp);
2786
58821868
AM
2787 /* We have a problem here. The following code to optimize the table
2788 size requires an integer type with more the 32 bits. If
2789 BFD_HOST_U_64_BIT is set we know about such a type. */
252b5132 2790#ifdef BFD_HOST_U_64_BIT
82e51918 2791 if (info->optimize)
252b5132
RH
2792 {
2793 unsigned long int nsyms = hashcodesp - hashcodes;
2794 size_t minsize;
2795 size_t maxsize;
2796 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
2797 unsigned long int *counts ;
2798
2799 /* Possible optimization parameters: if we have NSYMS symbols we say
2800 that the hashing table must at least have NSYMS/4 and at most
2801 2*NSYMS buckets. */
2802 minsize = nsyms / 4;
2803 if (minsize == 0)
2804 minsize = 1;
2805 best_size = maxsize = nsyms * 2;
2806
2807 /* Create array where we count the collisions in. We must use bfd_malloc
2808 since the size could be large. */
dc810e39
AM
2809 amt = maxsize;
2810 amt *= sizeof (unsigned long int);
2811 counts = (unsigned long int *) bfd_malloc (amt);
252b5132
RH
2812 if (counts == NULL)
2813 {
2814 free (hashcodes);
2815 return 0;
2816 }
2817
2818 /* Compute the "optimal" size for the hash table. The criteria is a
2819 minimal chain length. The minor criteria is (of course) the size
2820 of the table. */
2821 for (i = minsize; i < maxsize; ++i)
2822 {
2823 /* Walk through the array of hashcodes and count the collisions. */
2824 BFD_HOST_U_64_BIT max;
2825 unsigned long int j;
2826 unsigned long int fact;
2827
2828 memset (counts, '\0', i * sizeof (unsigned long int));
2829
2830 /* Determine how often each hash bucket is used. */
2831 for (j = 0; j < nsyms; ++j)
2832 ++counts[hashcodes[j] % i];
2833
2834 /* For the weight function we need some information about the
2835 pagesize on the target. This is information need not be 100%
2836 accurate. Since this information is not available (so far) we
2837 define it here to a reasonable default value. If it is crucial
2838 to have a better value some day simply define this value. */
2839# ifndef BFD_TARGET_PAGESIZE
2840# define BFD_TARGET_PAGESIZE (4096)
2841# endif
2842
2843 /* We in any case need 2 + NSYMS entries for the size values and
2844 the chains. */
2845 max = (2 + nsyms) * (ARCH_SIZE / 8);
2846
2847# if 1
2848 /* Variant 1: optimize for short chains. We add the squares
2849 of all the chain lengths (which favous many small chain
2850 over a few long chains). */
2851 for (j = 0; j < i; ++j)
2852 max += counts[j] * counts[j];
2853
2854 /* This adds penalties for the overall size of the table. */
2855 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2856 max *= fact * fact;
2857# else
2858 /* Variant 2: Optimize a lot more for small table. Here we
2859 also add squares of the size but we also add penalties for
2860 empty slots (the +1 term). */
2861 for (j = 0; j < i; ++j)
2862 max += (1 + counts[j]) * (1 + counts[j]);
2863
2864 /* The overall size of the table is considered, but not as
2865 strong as in variant 1, where it is squared. */
2866 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2867 max *= fact;
2868# endif
2869
2870 /* Compare with current best results. */
2871 if (max < best_chlen)
2872 {
2873 best_chlen = max;
2874 best_size = i;
2875 }
2876 }
2877
2878 free (counts);
2879 }
2880 else
2881#endif /* defined (BFD_HOST_U_64_BIT) */
2882 {
2883 /* This is the fallback solution if no 64bit type is available or if we
2884 are not supposed to spend much time on optimizations. We select the
2885 bucket count using a fixed set of numbers. */
2886 for (i = 0; elf_buckets[i] != 0; i++)
2887 {
2888 best_size = elf_buckets[i];
2889 if (dynsymcount < elf_buckets[i + 1])
2890 break;
2891 }
2892 }
2893
2894 /* Free the arrays we needed. */
2895 free (hashcodes);
2896
2897 return best_size;
2898}
2899
2900/* Set up the sizes and contents of the ELF dynamic sections. This is
2901 called by the ELF linker emulation before_allocation routine. We
2902 must set the sizes of the sections before the linker sets the
2903 addresses of the various sections. */
2904
2905boolean
2906NAME(bfd_elf,size_dynamic_sections) (output_bfd, soname, rpath,
99293407 2907 filter_shlib,
252b5132
RH
2908 auxiliary_filters, info, sinterpptr,
2909 verdefs)
2910 bfd *output_bfd;
2911 const char *soname;
2912 const char *rpath;
252b5132
RH
2913 const char *filter_shlib;
2914 const char * const *auxiliary_filters;
2915 struct bfd_link_info *info;
2916 asection **sinterpptr;
2917 struct bfd_elf_version_tree *verdefs;
2918{
2919 bfd_size_type soname_indx;
25e27870 2920 bfd *dynobj;
252b5132 2921 struct elf_backend_data *bed;
252b5132
RH
2922 struct elf_assign_sym_version_info asvinfo;
2923
2924 *sinterpptr = NULL;
2925
2926 soname_indx = (bfd_size_type) -1;
2927
2928 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2929 return true;
2930
8ea2e4bd 2931 if (! is_elf_hash_table (info))
cc36acdf 2932 return true;
8ea2e4bd 2933
51b64d56
AM
2934 /* Any syms created from now on start with -1 in
2935 got.refcount/offset and plt.refcount/offset. */
2936 elf_hash_table (info)->init_refcount = -1;
2937
252b5132
RH
2938 /* The backend may have to create some sections regardless of whether
2939 we're dynamic or not. */
2940 bed = get_elf_backend_data (output_bfd);
2941 if (bed->elf_backend_always_size_sections
2942 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
2943 return false;
2944
2945 dynobj = elf_hash_table (info)->dynobj;
2946
2947 /* If there were no dynamic objects in the link, there is nothing to
2948 do here. */
2949 if (dynobj == NULL)
2950 return true;
2951
68f69152
JJ
2952 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
2953 return false;
2954
252b5132
RH
2955 if (elf_hash_table (info)->dynamic_sections_created)
2956 {
2957 struct elf_info_failed eif;
2958 struct elf_link_hash_entry *h;
fc8c40a0 2959 asection *dynstr;
31941635
L
2960 struct bfd_elf_version_tree *t;
2961 struct bfd_elf_version_expr *d;
2962 boolean all_defined;
252b5132
RH
2963
2964 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
2965 BFD_ASSERT (*sinterpptr != NULL || info->shared);
2966
2967 if (soname != NULL)
2968 {
2b0f7ef9
JJ
2969 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2970 soname, true);
252b5132 2971 if (soname_indx == (bfd_size_type) -1
dc810e39
AM
2972 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SONAME,
2973 soname_indx))
252b5132
RH
2974 return false;
2975 }
2976
2977 if (info->symbolic)
2978 {
dc810e39
AM
2979 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMBOLIC,
2980 (bfd_vma) 0))
252b5132 2981 return false;
d6cf2879 2982 info->flags |= DF_SYMBOLIC;
252b5132
RH
2983 }
2984
2985 if (rpath != NULL)
2986 {
2987 bfd_size_type indx;
2988
2b0f7ef9
JJ
2989 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
2990 true);
2991 if (info->new_dtags)
2992 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
252b5132 2993 if (indx == (bfd_size_type) -1
dc810e39 2994 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_RPATH, indx)
c25373b7 2995 || (info->new_dtags
dc810e39
AM
2996 && ! elf_add_dynamic_entry (info, (bfd_vma) DT_RUNPATH,
2997 indx)))
252b5132
RH
2998 return false;
2999 }
3000
3001 if (filter_shlib != NULL)
3002 {
3003 bfd_size_type indx;
3004
2b0f7ef9
JJ
3005 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3006 filter_shlib, true);
252b5132 3007 if (indx == (bfd_size_type) -1
dc810e39 3008 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_FILTER, indx))
252b5132
RH
3009 return false;
3010 }
3011
3012 if (auxiliary_filters != NULL)
3013 {
3014 const char * const *p;
3015
3016 for (p = auxiliary_filters; *p != NULL; p++)
3017 {
3018 bfd_size_type indx;
3019
2b0f7ef9
JJ
3020 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3021 *p, true);
252b5132 3022 if (indx == (bfd_size_type) -1
dc810e39
AM
3023 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_AUXILIARY,
3024 indx))
252b5132
RH
3025 return false;
3026 }
3027 }
3028
391a809a 3029 eif.info = info;
bc2b6df7 3030 eif.verdefs = verdefs;
391a809a
AM
3031 eif.failed = false;
3032
ea44b734 3033 /* If we are supposed to export all symbols into the dynamic symbol
c44233aa 3034 table (this is not the normal case), then do so. */
99293407 3035 if (info->export_dynamic)
ea44b734 3036 {
ea44b734 3037 elf_link_hash_traverse (elf_hash_table (info), elf_export_symbol,
c44233aa 3038 (PTR) &eif);
ea44b734
RH
3039 if (eif.failed)
3040 return false;
3041 }
3042
31941635
L
3043 /* Make all global versions with definiton. */
3044 for (t = verdefs; t != NULL; t = t->next)
3045 for (d = t->globals; d != NULL; d = d->next)
3046 if (!d->symver && strchr (d->pattern, '*') == NULL)
3047 {
3048 const char *verstr, *name;
3049 size_t namelen, verlen, newlen;
3050 char *newname, *p;
3051 struct elf_link_hash_entry *newh;
3052
3053 name = d->pattern;
3054 namelen = strlen (name);
3055 verstr = t->name;
3056 verlen = strlen (verstr);
3057 newlen = namelen + verlen + 3;
3058
3059 newname = (char *) bfd_malloc ((bfd_size_type) newlen);
3060 if (newname == NULL)
3061 return false;
3062 memcpy (newname, name, namelen);
3063
3064 /* Check the hidden versioned definition. */
3065 p = newname + namelen;
3066 *p++ = ELF_VER_CHR;
3067 memcpy (p, verstr, verlen + 1);
3068 newh = elf_link_hash_lookup (elf_hash_table (info),
3069 newname, false, false,
3070 false);
3071 if (newh == NULL
3072 || (newh->root.type != bfd_link_hash_defined
3073 && newh->root.type != bfd_link_hash_defweak))
3074 {
3075 /* Check the default versioned definition. */
3076 *p++ = ELF_VER_CHR;
3077 memcpy (p, verstr, verlen + 1);
3078 newh = elf_link_hash_lookup (elf_hash_table (info),
3079 newname, false, false,
3080 false);
3081 }
3082 free (newname);
3083
c828c771
L
3084 /* Mark this version if there is a definition and it is
3085 not defined in a shared object. */
31941635 3086 if (newh != NULL
c828c771
L
3087 && ((newh->elf_link_hash_flags
3088 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)
31941635
L
3089 && (newh->root.type == bfd_link_hash_defined
3090 || newh->root.type == bfd_link_hash_defweak))
3091 d->symver = 1;
3092 }
3093
252b5132
RH
3094 /* Attach all the symbols to their version information. */
3095 asvinfo.output_bfd = output_bfd;
3096 asvinfo.info = info;
3097 asvinfo.verdefs = verdefs;
252b5132
RH
3098 asvinfo.failed = false;
3099
3100 elf_link_hash_traverse (elf_hash_table (info),
3101 elf_link_assign_sym_version,
3102 (PTR) &asvinfo);
3103 if (asvinfo.failed)
3104 return false;
3105
31941635
L
3106 if (!info->allow_undefined_version)
3107 {
3108 /* Check if all global versions have a definiton. */
3109 all_defined = true;
3110 for (t = verdefs; t != NULL; t = t->next)
3111 for (d = t->globals; d != NULL; d = d->next)
3112 if (!d->symver && !d->script
3113 && strchr (d->pattern, '*') == NULL)
3114 {
3115 (*_bfd_error_handler)
3116 (_("%s: undefined version: %s"),
3117 d->pattern, t->name);
3118 all_defined = false;
3119 }
3120
3121 if (!all_defined)
3122 {
3123 bfd_set_error (bfd_error_bad_value);
3124 return false;
3125 }
3126 }
3127
252b5132
RH
3128 /* Find all symbols which were defined in a dynamic object and make
3129 the backend pick a reasonable value for them. */
252b5132
RH
3130 elf_link_hash_traverse (elf_hash_table (info),
3131 elf_adjust_dynamic_symbol,
3132 (PTR) &eif);
3133 if (eif.failed)
3134 return false;
3135
3136 /* Add some entries to the .dynamic section. We fill in some of the
3137 values later, in elf_bfd_final_link, but we must add the entries
3138 now so that we know the final size of the .dynamic section. */
f0c2e336
MM
3139
3140 /* If there are initialization and/or finalization functions to
3141 call then add the corresponding DT_INIT/DT_FINI entries. */
3142 h = (info->init_function
3e932841 3143 ? elf_link_hash_lookup (elf_hash_table (info),
f0c2e336
MM
3144 info->init_function, false,
3145 false, false)
3146 : NULL);
252b5132
RH
3147 if (h != NULL
3148 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3149 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3150 {
dc810e39 3151 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_INIT, (bfd_vma) 0))
252b5132
RH
3152 return false;
3153 }
f0c2e336 3154 h = (info->fini_function
3e932841 3155 ? elf_link_hash_lookup (elf_hash_table (info),
f0c2e336
MM
3156 info->fini_function, false,
3157 false, false)
3158 : NULL);
252b5132
RH
3159 if (h != NULL
3160 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3161 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3162 {
dc810e39 3163 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FINI, (bfd_vma) 0))
252b5132
RH
3164 return false;
3165 }
f0c2e336 3166
fa7ea4d8
AM
3167 if (bfd_get_section_by_name (output_bfd, ".preinit_array") != NULL)
3168 {
3169 /* DT_PREINIT_ARRAY is not allowed in shared library. */
3170 if (info->shared)
3171 {
3172 bfd *sub;
3173 asection *o;
3174
3175 for (sub = info->input_bfds; sub != NULL;
3176 sub = sub->link_next)
3177 for (o = sub->sections; o != NULL; o = o->next)
3178 if (elf_section_data (o)->this_hdr.sh_type
3179 == SHT_PREINIT_ARRAY)
3180 {
3181 (*_bfd_error_handler)
3182 (_("%s: .preinit_array section is not allowed in DSO"),
58821868 3183 bfd_archive_filename (sub));
fa7ea4d8
AM
3184 break;
3185 }
60166579 3186
36b4f6e7 3187 bfd_set_error (bfd_error_nonrepresentable_section);
60166579 3188 return false;
fa7ea4d8
AM
3189 }
3190
3191 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_PREINIT_ARRAY,
3192 (bfd_vma) 0)
3193 || !elf_add_dynamic_entry (info, (bfd_vma) DT_PREINIT_ARRAYSZ,
3194 (bfd_vma) 0))
3195 return false;
3196 }
3197 if (bfd_get_section_by_name (output_bfd, ".init_array") != NULL)
3198 {
3199 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_INIT_ARRAY,
3200 (bfd_vma) 0)
3201 || !elf_add_dynamic_entry (info, (bfd_vma) DT_INIT_ARRAYSZ,
3202 (bfd_vma) 0))
3203 return false;
3204 }
3205 if (bfd_get_section_by_name (output_bfd, ".fini_array") != NULL)
3206 {
3207 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_FINI_ARRAY,
3208 (bfd_vma) 0)
3209 || !elf_add_dynamic_entry (info, (bfd_vma) DT_FINI_ARRAYSZ,
3210 (bfd_vma) 0))
3211 return false;
3212 }
30831527 3213
fc8c40a0
AM
3214 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
3215 /* If .dynstr is excluded from the link, we don't want any of
3216 these tags. Strictly, we should be checking each section
3217 individually; This quick check covers for the case where
3218 someone does a /DISCARD/ : { *(*) }. */
3219 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
3220 {
3221 bfd_size_type strsize;
3222
2b0f7ef9 3223 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
dc810e39
AM
3224 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_HASH, (bfd_vma) 0)
3225 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_STRTAB, (bfd_vma) 0)
3226 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMTAB, (bfd_vma) 0)
3227 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_STRSZ, strsize)
3228 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMENT,
3229 (bfd_vma) sizeof (Elf_External_Sym)))
fc8c40a0
AM
3230 return false;
3231 }
252b5132
RH
3232 }
3233
3234 /* The backend must work out the sizes of all the other dynamic
3235 sections. */
252b5132
RH
3236 if (bed->elf_backend_size_dynamic_sections
3237 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
3238 return false;
3239
3240 if (elf_hash_table (info)->dynamic_sections_created)
3241 {
dc810e39 3242 bfd_size_type dynsymcount;
252b5132
RH
3243 asection *s;
3244 size_t bucketcount = 0;
c7ac6ff8 3245 size_t hash_entry_size;
db6751f2 3246 unsigned int dtagcount;
252b5132
RH
3247
3248 /* Set up the version definition section. */
3249 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3250 BFD_ASSERT (s != NULL);
3251
3252 /* We may have created additional version definitions if we are
c44233aa 3253 just linking a regular application. */
252b5132
RH
3254 verdefs = asvinfo.verdefs;
3255
6b9b879a
JJ
3256 /* Skip anonymous version tag. */
3257 if (verdefs != NULL && verdefs->vernum == 0)
3258 verdefs = verdefs->next;
3259
252b5132 3260 if (verdefs == NULL)
7f8d5fc9 3261 _bfd_strip_section_from_output (info, s);
252b5132
RH
3262 else
3263 {
3264 unsigned int cdefs;
3265 bfd_size_type size;
3266 struct bfd_elf_version_tree *t;
3267 bfd_byte *p;
3268 Elf_Internal_Verdef def;
3269 Elf_Internal_Verdaux defaux;
3270
252b5132
RH
3271 cdefs = 0;
3272 size = 0;
3273
3274 /* Make space for the base version. */
3275 size += sizeof (Elf_External_Verdef);
3276 size += sizeof (Elf_External_Verdaux);
3277 ++cdefs;
3278
3279 for (t = verdefs; t != NULL; t = t->next)
3280 {
3281 struct bfd_elf_version_deps *n;
3282
3283 size += sizeof (Elf_External_Verdef);
3284 size += sizeof (Elf_External_Verdaux);
3285 ++cdefs;
3286
3287 for (n = t->deps; n != NULL; n = n->next)
3288 size += sizeof (Elf_External_Verdaux);
3289 }
3290
3291 s->_raw_size = size;
3292 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3293 if (s->contents == NULL && s->_raw_size != 0)
3294 return false;
3295
3296 /* Fill in the version definition section. */
3297
3298 p = s->contents;
3299
3300 def.vd_version = VER_DEF_CURRENT;
3301 def.vd_flags = VER_FLG_BASE;
3302 def.vd_ndx = 1;
3303 def.vd_cnt = 1;
3304 def.vd_aux = sizeof (Elf_External_Verdef);
3305 def.vd_next = (sizeof (Elf_External_Verdef)
3306 + sizeof (Elf_External_Verdaux));
3307
3308 if (soname_indx != (bfd_size_type) -1)
3309 {
2b0f7ef9
JJ
3310 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3311 soname_indx);
3a99b017 3312 def.vd_hash = bfd_elf_hash (soname);
252b5132
RH
3313 defaux.vda_name = soname_indx;
3314 }
3315 else
3316 {
3317 const char *name;
3318 bfd_size_type indx;
3319
96fd004e 3320 name = basename (output_bfd->filename);
3a99b017 3321 def.vd_hash = bfd_elf_hash (name);
2b0f7ef9
JJ
3322 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3323 name, false);
252b5132
RH
3324 if (indx == (bfd_size_type) -1)
3325 return false;
3326 defaux.vda_name = indx;
3327 }
3328 defaux.vda_next = 0;
3329
3330 _bfd_elf_swap_verdef_out (output_bfd, &def,
a7b97311 3331 (Elf_External_Verdef *) p);
252b5132
RH
3332 p += sizeof (Elf_External_Verdef);
3333 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3334 (Elf_External_Verdaux *) p);
3335 p += sizeof (Elf_External_Verdaux);
3336
3337 for (t = verdefs; t != NULL; t = t->next)
3338 {
3339 unsigned int cdeps;
3340 struct bfd_elf_version_deps *n;
3341 struct elf_link_hash_entry *h;
14a793b2 3342 struct bfd_link_hash_entry *bh;
252b5132
RH
3343
3344 cdeps = 0;
3345 for (n = t->deps; n != NULL; n = n->next)
3346 ++cdeps;
3347
3348 /* Add a symbol representing this version. */
14a793b2 3349 bh = NULL;
252b5132
RH
3350 if (! (_bfd_generic_link_add_one_symbol
3351 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
3352 (bfd_vma) 0, (const char *) NULL, false,
14a793b2 3353 get_elf_backend_data (dynobj)->collect, &bh)))
252b5132 3354 return false;
14a793b2 3355 h = (struct elf_link_hash_entry *) bh;
252b5132
RH
3356 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
3357 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3358 h->type = STT_OBJECT;
3359 h->verinfo.vertree = t;
3360
3361 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
3362 return false;
3363
3364 def.vd_version = VER_DEF_CURRENT;
3365 def.vd_flags = 0;
3366 if (t->globals == NULL && t->locals == NULL && ! t->used)
3367 def.vd_flags |= VER_FLG_WEAK;
3368 def.vd_ndx = t->vernum + 1;
3369 def.vd_cnt = cdeps + 1;
3a99b017 3370 def.vd_hash = bfd_elf_hash (t->name);
252b5132
RH
3371 def.vd_aux = sizeof (Elf_External_Verdef);
3372 if (t->next != NULL)
3373 def.vd_next = (sizeof (Elf_External_Verdef)
3374 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
3375 else
3376 def.vd_next = 0;
3377
3378 _bfd_elf_swap_verdef_out (output_bfd, &def,
3379 (Elf_External_Verdef *) p);
3380 p += sizeof (Elf_External_Verdef);
3381
3382 defaux.vda_name = h->dynstr_index;
2b0f7ef9
JJ
3383 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3384 h->dynstr_index);
252b5132
RH
3385 if (t->deps == NULL)
3386 defaux.vda_next = 0;
3387 else
3388 defaux.vda_next = sizeof (Elf_External_Verdaux);
3389 t->name_indx = defaux.vda_name;
3390
3391 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3392 (Elf_External_Verdaux *) p);
3393 p += sizeof (Elf_External_Verdaux);
3394
3395 for (n = t->deps; n != NULL; n = n->next)
3396 {
3397 if (n->version_needed == NULL)
3398 {
3399 /* This can happen if there was an error in the
3400 version script. */
3401 defaux.vda_name = 0;
3402 }
3403 else
2b0f7ef9
JJ
3404 {
3405 defaux.vda_name = n->version_needed->name_indx;
3406 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3407 defaux.vda_name);
3408 }
252b5132
RH
3409 if (n->next == NULL)
3410 defaux.vda_next = 0;
3411 else
3412 defaux.vda_next = sizeof (Elf_External_Verdaux);
3413
3414 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3415 (Elf_External_Verdaux *) p);
3416 p += sizeof (Elf_External_Verdaux);
3417 }
3418 }
3419
dc810e39
AM
3420 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERDEF, (bfd_vma) 0)
3421 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_VERDEFNUM,
3422 (bfd_vma) cdefs))
252b5132
RH
3423 return false;
3424
3425 elf_tdata (output_bfd)->cverdefs = cdefs;
3426 }
3427
13ae64f3 3428 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
d6cf2879 3429 {
dc810e39 3430 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FLAGS, info->flags))
d6cf2879
L
3431 return false;
3432 }
3433
4d538889 3434 if (info->flags_1)
d6cf2879
L
3435 {
3436 if (! info->shared)
3437 info->flags_1 &= ~ (DF_1_INITFIRST
3438 | DF_1_NODELETE
3439 | DF_1_NOOPEN);
dc810e39
AM
3440 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FLAGS_1,
3441 info->flags_1))
d6cf2879
L
3442 return false;
3443 }
3444
252b5132
RH
3445 /* Work out the size of the version reference section. */
3446
3447 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3448 BFD_ASSERT (s != NULL);
3449 {
3450 struct elf_find_verdep_info sinfo;
3451
3452 sinfo.output_bfd = output_bfd;
3453 sinfo.info = info;
3454 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
3455 if (sinfo.vers == 0)
3456 sinfo.vers = 1;
3457 sinfo.failed = false;
3458
3459 elf_link_hash_traverse (elf_hash_table (info),
3460 elf_link_find_version_dependencies,
3461 (PTR) &sinfo);
3462
3463 if (elf_tdata (output_bfd)->verref == NULL)
7f8d5fc9 3464 _bfd_strip_section_from_output (info, s);
252b5132
RH
3465 else
3466 {
3467 Elf_Internal_Verneed *t;
3468 unsigned int size;
3469 unsigned int crefs;
3470 bfd_byte *p;
3471
3472 /* Build the version definition section. */
3473 size = 0;
3474 crefs = 0;
3475 for (t = elf_tdata (output_bfd)->verref;
3476 t != NULL;
3477 t = t->vn_nextref)
3478 {
3479 Elf_Internal_Vernaux *a;
3480
3481 size += sizeof (Elf_External_Verneed);
3482 ++crefs;
3483 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3484 size += sizeof (Elf_External_Vernaux);
3485 }
3486
3487 s->_raw_size = size;
dc810e39 3488 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
252b5132
RH
3489 if (s->contents == NULL)
3490 return false;
3491
3492 p = s->contents;
3493 for (t = elf_tdata (output_bfd)->verref;
3494 t != NULL;
3495 t = t->vn_nextref)
3496 {
3497 unsigned int caux;
3498 Elf_Internal_Vernaux *a;
3499 bfd_size_type indx;
3500
3501 caux = 0;
3502 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3503 ++caux;
3504
3505 t->vn_version = VER_NEED_CURRENT;
3506 t->vn_cnt = caux;
2b0f7ef9
JJ
3507 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3508 elf_dt_name (t->vn_bfd) != NULL
3509 ? elf_dt_name (t->vn_bfd)
3510 : basename (t->vn_bfd->filename),
3511 false);
252b5132
RH
3512 if (indx == (bfd_size_type) -1)
3513 return false;
3514 t->vn_file = indx;
3515 t->vn_aux = sizeof (Elf_External_Verneed);
3516 if (t->vn_nextref == NULL)
3517 t->vn_next = 0;
3518 else
3519 t->vn_next = (sizeof (Elf_External_Verneed)
3520 + caux * sizeof (Elf_External_Vernaux));
3521
3522 _bfd_elf_swap_verneed_out (output_bfd, t,
3523 (Elf_External_Verneed *) p);
3524 p += sizeof (Elf_External_Verneed);
3525
3526 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3527 {
3a99b017 3528 a->vna_hash = bfd_elf_hash (a->vna_nodename);
2b0f7ef9
JJ
3529 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3530 a->vna_nodename, false);
252b5132
RH
3531 if (indx == (bfd_size_type) -1)
3532 return false;
3533 a->vna_name = indx;
3534 if (a->vna_nextptr == NULL)
3535 a->vna_next = 0;
3536 else
3537 a->vna_next = sizeof (Elf_External_Vernaux);
3538
3539 _bfd_elf_swap_vernaux_out (output_bfd, a,
3540 (Elf_External_Vernaux *) p);
3541 p += sizeof (Elf_External_Vernaux);
3542 }
3543 }
3544
dc810e39
AM
3545 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERNEED,
3546 (bfd_vma) 0)
3547 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_VERNEEDNUM,
3548 (bfd_vma) crefs))
252b5132
RH
3549 return false;
3550
3551 elf_tdata (output_bfd)->cverrefs = crefs;
3552 }
3553 }
3554
3e932841 3555 /* Assign dynsym indicies. In a shared library we generate a
30b30c21
RH
3556 section symbol for each output section, which come first.
3557 Next come all of the back-end allocated local dynamic syms,
3558 followed by the rest of the global symbols. */
3559
3560 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
252b5132
RH
3561
3562 /* Work out the size of the symbol version section. */
3563 s = bfd_get_section_by_name (dynobj, ".gnu.version");
3564 BFD_ASSERT (s != NULL);
3565 if (dynsymcount == 0
3566 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
3567 {
7f8d5fc9 3568 _bfd_strip_section_from_output (info, s);
42751cf3
MM
3569 /* The DYNSYMCOUNT might have changed if we were going to
3570 output a dynamic symbol table entry for S. */
30b30c21 3571 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
252b5132
RH
3572 }
3573 else
3574 {
3575 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
3576 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
3577 if (s->contents == NULL)
3578 return false;
3579
dc810e39 3580 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERSYM, (bfd_vma) 0))
252b5132
RH
3581 return false;
3582 }
3583
3584 /* Set the size of the .dynsym and .hash sections. We counted
3585 the number of dynamic symbols in elf_link_add_object_symbols.
3586 We will build the contents of .dynsym and .hash when we build
3587 the final symbol table, because until then we do not know the
3588 correct value to give the symbols. We built the .dynstr
3589 section as we went along in elf_link_add_object_symbols. */
3590 s = bfd_get_section_by_name (dynobj, ".dynsym");
3591 BFD_ASSERT (s != NULL);
3592 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
3593 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3594 if (s->contents == NULL && s->_raw_size != 0)
3595 return false;
3596
fc8c40a0
AM
3597 if (dynsymcount != 0)
3598 {
3599 Elf_Internal_Sym isym;
3600
3601 /* The first entry in .dynsym is a dummy symbol. */
3602 isym.st_value = 0;
3603 isym.st_size = 0;
3604 isym.st_name = 0;
3605 isym.st_info = 0;
3606 isym.st_other = 0;
3607 isym.st_shndx = 0;
9ad5cbcf 3608 elf_swap_symbol_out (output_bfd, &isym, (PTR) s->contents, (PTR) 0);
fc8c40a0 3609 }
252b5132
RH
3610
3611 /* Compute the size of the hashing table. As a side effect this
3612 computes the hash values for all the names we export. */
3613 bucketcount = compute_bucket_count (info);
3614
3615 s = bfd_get_section_by_name (dynobj, ".hash");
3616 BFD_ASSERT (s != NULL);
c7ac6ff8
MM
3617 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
3618 s->_raw_size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
1126897b 3619 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
252b5132
RH
3620 if (s->contents == NULL)
3621 return false;
252b5132 3622
dc810e39
AM
3623 bfd_put (8 * hash_entry_size, output_bfd, (bfd_vma) bucketcount,
3624 s->contents);
3625 bfd_put (8 * hash_entry_size, output_bfd, (bfd_vma) dynsymcount,
c7ac6ff8 3626 s->contents + hash_entry_size);
252b5132
RH
3627
3628 elf_hash_table (info)->bucketcount = bucketcount;
3629
3630 s = bfd_get_section_by_name (dynobj, ".dynstr");
3631 BFD_ASSERT (s != NULL);
2b0f7ef9
JJ
3632
3633 elf_finalize_dynstr (output_bfd, info);
3634
3635 s->_raw_size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
252b5132 3636
db6751f2 3637 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
dc810e39 3638 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NULL, (bfd_vma) 0))
db6751f2 3639 return false;
252b5132
RH
3640 }
3641
3642 return true;
3643}
3644\f
2b0f7ef9
JJ
3645/* This function is used to adjust offsets into .dynstr for
3646 dynamic symbols. This is called via elf_link_hash_traverse. */
c44233aa 3647
2b0f7ef9
JJ
3648static boolean elf_adjust_dynstr_offsets
3649PARAMS ((struct elf_link_hash_entry *, PTR));
c44233aa 3650
2b0f7ef9
JJ
3651static boolean
3652elf_adjust_dynstr_offsets (h, data)
3653 struct elf_link_hash_entry *h;
3654 PTR data;
3655{
3656 struct elf_strtab_hash *dynstr = (struct elf_strtab_hash *) data;
3657
e92d460e
AM
3658 if (h->root.type == bfd_link_hash_warning)
3659 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3660
2b0f7ef9
JJ
3661 if (h->dynindx != -1)
3662 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
3663 return true;
3664}
3665
3666/* Assign string offsets in .dynstr, update all structures referencing
3667 them. */
3668
3669static boolean
3670elf_finalize_dynstr (output_bfd, info)
3671 bfd *output_bfd;
3672 struct bfd_link_info *info;
3673{
3674 struct elf_link_local_dynamic_entry *entry;
3675 struct elf_strtab_hash *dynstr = elf_hash_table (info)->dynstr;
3676 bfd *dynobj = elf_hash_table (info)->dynobj;
3677 asection *sdyn;
3678 bfd_size_type size;
3679 Elf_External_Dyn *dyncon, *dynconend;
3680
3681 _bfd_elf_strtab_finalize (dynstr);
3682 size = _bfd_elf_strtab_size (dynstr);
3683
3684 /* Update all .dynamic entries referencing .dynstr strings. */
3685 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3686 BFD_ASSERT (sdyn != NULL);
3687
3688 dyncon = (Elf_External_Dyn *) sdyn->contents;
3689 dynconend = (Elf_External_Dyn *) (sdyn->contents +
3690 sdyn->_raw_size);
3691 for (; dyncon < dynconend; dyncon++)
3692 {
3693 Elf_Internal_Dyn dyn;
3694
3695 elf_swap_dyn_in (dynobj, dyncon, & dyn);
3696 switch (dyn.d_tag)
3697 {
3698 case DT_STRSZ:
3699 dyn.d_un.d_val = size;
3700 elf_swap_dyn_out (dynobj, & dyn, dyncon);
3701 break;
3702 case DT_NEEDED:
3703 case DT_SONAME:
3704 case DT_RPATH:
3705 case DT_RUNPATH:
3706 case DT_FILTER:
3707 case DT_AUXILIARY:
3708 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
3709 elf_swap_dyn_out (dynobj, & dyn, dyncon);
3710 break;
3711 default:
3712 break;
3713 }
3714 }
3715
3716 /* Now update local dynamic symbols. */
3717 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
3718 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
3719 entry->isym.st_name);
3720
3721 /* And the rest of dynamic symbols. */
3722 elf_link_hash_traverse (elf_hash_table (info),
3723 elf_adjust_dynstr_offsets, dynstr);
3724
3725 /* Adjust version definitions. */
3726 if (elf_tdata (output_bfd)->cverdefs)
3727 {
3728 asection *s;
3729 bfd_byte *p;
3730 bfd_size_type i;
3731 Elf_Internal_Verdef def;
3732 Elf_Internal_Verdaux defaux;
c44233aa 3733
2b0f7ef9
JJ
3734 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3735 p = (bfd_byte *) s->contents;
3736 do
3737 {
3738 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
3739 &def);
3740 p += sizeof (Elf_External_Verdef);
3741 for (i = 0; i < def.vd_cnt; ++i)
3742 {
3743 _bfd_elf_swap_verdaux_in (output_bfd,
3744 (Elf_External_Verdaux *) p, &defaux);
3745 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
3746 defaux.vda_name);
3747 _bfd_elf_swap_verdaux_out (output_bfd,
3748 &defaux, (Elf_External_Verdaux *) p);
3749 p += sizeof (Elf_External_Verdaux);
3750 }
3751 }
3752 while (def.vd_next);
3753 }
3754
3755 /* Adjust version references. */
3756 if (elf_tdata (output_bfd)->verref)
3757 {
3758 asection *s;
3759 bfd_byte *p;
3760 bfd_size_type i;
3761 Elf_Internal_Verneed need;
3762 Elf_Internal_Vernaux needaux;
c44233aa 3763
2b0f7ef9
JJ
3764 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3765 p = (bfd_byte *) s->contents;
3766 do
3767 {
3768 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
3769 &need);
3770 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
3771 _bfd_elf_swap_verneed_out (output_bfd, &need,
3772 (Elf_External_Verneed *) p);
3773 p += sizeof (Elf_External_Verneed);
3774 for (i = 0; i < need.vn_cnt; ++i)
3775 {
3776 _bfd_elf_swap_vernaux_in (output_bfd,
3777 (Elf_External_Vernaux *) p, &needaux);
3778 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
3779 needaux.vna_name);
3780 _bfd_elf_swap_vernaux_out (output_bfd,
3781 &needaux,
3782 (Elf_External_Vernaux *) p);
3783 p += sizeof (Elf_External_Vernaux);
3784 }
3785 }
3786 while (need.vn_next);
3787 }
3788
3789 return true;
3790}
3791
252b5132
RH
3792/* Fix up the flags for a symbol. This handles various cases which
3793 can only be fixed after all the input files are seen. This is
3794 currently called by both adjust_dynamic_symbol and
3795 assign_sym_version, which is unnecessary but perhaps more robust in
3796 the face of future changes. */
3797
3798static boolean
3799elf_fix_symbol_flags (h, eif)
3800 struct elf_link_hash_entry *h;
3801 struct elf_info_failed *eif;
3802{
3803 /* If this symbol was mentioned in a non-ELF file, try to set
3804 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
3805 permit a non-ELF file to correctly refer to a symbol defined in
3806 an ELF dynamic object. */
3807 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) != 0)
3808 {
94b6c40a
L
3809 while (h->root.type == bfd_link_hash_indirect)
3810 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3811
252b5132
RH
3812 if (h->root.type != bfd_link_hash_defined
3813 && h->root.type != bfd_link_hash_defweak)
3814 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3815 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3816 else
3817 {
3818 if (h->root.u.def.section->owner != NULL
3819 && (bfd_get_flavour (h->root.u.def.section->owner)
3820 == bfd_target_elf_flavour))
3821 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3822 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3823 else
3824 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3825 }
3826
3827 if (h->dynindx == -1
3828 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3829 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
3830 {
3831 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
3832 {
3833 eif->failed = true;
3834 return false;
3835 }
3836 }
3837 }
3838 else
3839 {
3840 /* Unfortunately, ELF_LINK_NON_ELF is only correct if the symbol
c44233aa
AM
3841 was first seen in a non-ELF file. Fortunately, if the symbol
3842 was first seen in an ELF file, we're probably OK unless the
3843 symbol was defined in a non-ELF file. Catch that case here.
3844 FIXME: We're still in trouble if the symbol was first seen in
3845 a dynamic object, and then later in a non-ELF regular object. */
252b5132
RH
3846 if ((h->root.type == bfd_link_hash_defined
3847 || h->root.type == bfd_link_hash_defweak)
3848 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3849 && (h->root.u.def.section->owner != NULL
3850 ? (bfd_get_flavour (h->root.u.def.section->owner)
3851 != bfd_target_elf_flavour)
3852 : (bfd_is_abs_section (h->root.u.def.section)
3853 && (h->elf_link_hash_flags
3854 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)))
3855 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3856 }
3857
3858 /* If this is a final link, and the symbol was defined as a common
3859 symbol in a regular object file, and there was no definition in
3860 any dynamic object, then the linker will have allocated space for
3861 the symbol in a common section but the ELF_LINK_HASH_DEF_REGULAR
3862 flag will not have been set. */
3863 if (h->root.type == bfd_link_hash_defined
3864 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3865 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
3866 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3867 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3868 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3869
3870 /* If -Bsymbolic was used (which means to bind references to global
3871 symbols to the definition within the shared object), and this
3872 symbol was defined in a regular object, then it actually doesn't
d954b040
HPN
3873 need a PLT entry, and we can accomplish that by forcing it local.
3874 Likewise, if the symbol has hidden or internal visibility.
3875 FIXME: It might be that we also do not need a PLT for other
3876 non-hidden visibilities, but we would have to tell that to the
3877 backend specifically; we can't just clear PLT-related data here. */
252b5132
RH
3878 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
3879 && eif->info->shared
8ea2e4bd 3880 && is_elf_hash_table (eif->info)
d954b040
HPN
3881 && (eif->info->symbolic
3882 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3883 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
252b5132
RH
3884 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3885 {
391a809a 3886 struct elf_backend_data *bed;
e5094212 3887 boolean force_local;
8ea2e4bd 3888
391a809a 3889 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
e5094212
AM
3890
3891 force_local = (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3892 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN);
3893 (*bed->elf_backend_hide_symbol) (eif->info, h, force_local);
252b5132
RH
3894 }
3895
fc4cc5bb
ILT
3896 /* If this is a weak defined symbol in a dynamic object, and we know
3897 the real definition in the dynamic object, copy interesting flags
3898 over to the real definition. */
3899 if (h->weakdef != NULL)
3900 {
3901 struct elf_link_hash_entry *weakdef;
3902
8e67855b
NC
3903 weakdef = h->weakdef;
3904 if (h->root.type == bfd_link_hash_indirect)
3905 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3906
fc4cc5bb
ILT
3907 BFD_ASSERT (h->root.type == bfd_link_hash_defined
3908 || h->root.type == bfd_link_hash_defweak);
fc4cc5bb
ILT
3909 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
3910 || weakdef->root.type == bfd_link_hash_defweak);
3911 BFD_ASSERT (weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC);
3912
3913 /* If the real definition is defined by a regular object file,
3914 don't do anything special. See the longer description in
3915 elf_adjust_dynamic_symbol, below. */
3916 if ((weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3917 h->weakdef = NULL;
3918 else
0a991dfe
AM
3919 {
3920 struct elf_backend_data *bed;
3921
3922 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
b48fa14c 3923 (*bed->elf_backend_copy_indirect_symbol) (bed, weakdef, h);
0a991dfe 3924 }
fc4cc5bb
ILT
3925 }
3926
252b5132
RH
3927 return true;
3928}
3929
3930/* Make the backend pick a good value for a dynamic symbol. This is
3931 called via elf_link_hash_traverse, and also calls itself
3932 recursively. */
3933
3934static boolean
3935elf_adjust_dynamic_symbol (h, data)
3936 struct elf_link_hash_entry *h;
3937 PTR data;
3938{
3939 struct elf_info_failed *eif = (struct elf_info_failed *) data;
3940 bfd *dynobj;
3941 struct elf_backend_data *bed;
3942
e92d460e
AM
3943 if (h->root.type == bfd_link_hash_warning)
3944 {
3945 h->plt.offset = (bfd_vma) -1;
3946 h->got.offset = (bfd_vma) -1;
3947
3948 /* When warning symbols are created, they **replace** the "real"
3949 entry in the hash table, thus we never get to see the real
3950 symbol in a hash traversal. So look at it now. */
3951 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3952 }
3953
252b5132
RH
3954 /* Ignore indirect symbols. These are added by the versioning code. */
3955 if (h->root.type == bfd_link_hash_indirect)
3956 return true;
3957
8ea2e4bd
NC
3958 if (! is_elf_hash_table (eif->info))
3959 return false;
3960
252b5132
RH
3961 /* Fix the symbol flags. */
3962 if (! elf_fix_symbol_flags (h, eif))
3963 return false;
3964
3965 /* If this symbol does not require a PLT entry, and it is not
3966 defined by a dynamic object, or is not referenced by a regular
3967 object, ignore it. We do have to handle a weak defined symbol,
3968 even if no regular object refers to it, if we decided to add it
3969 to the dynamic symbol table. FIXME: Do we normally need to worry
3970 about symbols which are defined by one dynamic object and
3971 referenced by another one? */
3972 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0
3973 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
3974 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3975 || ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
3976 && (h->weakdef == NULL || h->weakdef->dynindx == -1))))
3977 {
3978 h->plt.offset = (bfd_vma) -1;
3979 return true;
3980 }
3981
3982 /* If we've already adjusted this symbol, don't do it again. This
3983 can happen via a recursive call. */
3984 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
3985 return true;
3986
3987 /* Don't look at this symbol again. Note that we must set this
3988 after checking the above conditions, because we may look at a
3989 symbol once, decide not to do anything, and then get called
3990 recursively later after REF_REGULAR is set below. */
3991 h->elf_link_hash_flags |= ELF_LINK_HASH_DYNAMIC_ADJUSTED;
3992
3993 /* If this is a weak definition, and we know a real definition, and
3994 the real symbol is not itself defined by a regular object file,
3995 then get a good value for the real definition. We handle the
3996 real symbol first, for the convenience of the backend routine.
3997
3998 Note that there is a confusing case here. If the real definition
3999 is defined by a regular object file, we don't get the real symbol
4000 from the dynamic object, but we do get the weak symbol. If the
4001 processor backend uses a COPY reloc, then if some routine in the
4002 dynamic object changes the real symbol, we will not see that
4003 change in the corresponding weak symbol. This is the way other
4004 ELF linkers work as well, and seems to be a result of the shared
4005 library model.
4006
4007 I will clarify this issue. Most SVR4 shared libraries define the
4008 variable _timezone and define timezone as a weak synonym. The
4009 tzset call changes _timezone. If you write
4010 extern int timezone;
4011 int _timezone = 5;
4012 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
4013 you might expect that, since timezone is a synonym for _timezone,
4014 the same number will print both times. However, if the processor
4015 backend uses a COPY reloc, then actually timezone will be copied
4016 into your process image, and, since you define _timezone
4017 yourself, _timezone will not. Thus timezone and _timezone will
4018 wind up at different memory locations. The tzset call will set
4019 _timezone, leaving timezone unchanged. */
4020
4021 if (h->weakdef != NULL)
4022 {
fc4cc5bb
ILT
4023 /* If we get to this point, we know there is an implicit
4024 reference by a regular object file via the weak symbol H.
4025 FIXME: Is this really true? What if the traversal finds
4026 H->WEAKDEF before it finds H? */
4027 h->weakdef->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
252b5132 4028
fc4cc5bb
ILT
4029 if (! elf_adjust_dynamic_symbol (h->weakdef, (PTR) eif))
4030 return false;
252b5132
RH
4031 }
4032
4033 /* If a symbol has no type and no size and does not require a PLT
4034 entry, then we are probably about to do the wrong thing here: we
4035 are probably going to create a COPY reloc for an empty object.
4036 This case can arise when a shared object is built with assembly
4037 code, and the assembly code fails to set the symbol type. */
4038 if (h->size == 0
4039 && h->type == STT_NOTYPE
4040 && (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0)
4041 (*_bfd_error_handler)
4042 (_("warning: type and size of dynamic symbol `%s' are not defined"),
58821868 4043 h->root.root.string);
252b5132
RH
4044
4045 dynobj = elf_hash_table (eif->info)->dynobj;
4046 bed = get_elf_backend_data (dynobj);
4047 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
4048 {
4049 eif->failed = true;
4050 return false;
4051 }
4052
4053 return true;
4054}
4055\f
4056/* This routine is used to export all defined symbols into the dynamic
4057 symbol table. It is called via elf_link_hash_traverse. */
4058
4059static boolean
4060elf_export_symbol (h, data)
4061 struct elf_link_hash_entry *h;
4062 PTR data;
4063{
4064 struct elf_info_failed *eif = (struct elf_info_failed *) data;
4065
4066 /* Ignore indirect symbols. These are added by the versioning code. */
4067 if (h->root.type == bfd_link_hash_indirect)
4068 return true;
4069
e92d460e
AM
4070 if (h->root.type == bfd_link_hash_warning)
4071 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4072
252b5132
RH
4073 if (h->dynindx == -1
4074 && (h->elf_link_hash_flags
4075 & (ELF_LINK_HASH_DEF_REGULAR | ELF_LINK_HASH_REF_REGULAR)) != 0)
4076 {
bc2b6df7
L
4077 struct bfd_elf_version_tree *t;
4078 struct bfd_elf_version_expr *d;
4079
4080 for (t = eif->verdefs; t != NULL; t = t->next)
252b5132 4081 {
bc2b6df7
L
4082 if (t->globals != NULL)
4083 {
4084 for (d = t->globals; d != NULL; d = d->next)
4085 {
4086 if ((*d->match) (d, h->root.root.string))
4087 goto doit;
4088 }
4089 }
4090
4091 if (t->locals != NULL)
4092 {
4093 for (d = t->locals ; d != NULL; d = d->next)
4094 {
4095 if ((*d->match) (d, h->root.root.string))
4096 return true;
4097 }
4098 }
252b5132 4099 }
bc2b6df7
L
4100
4101 if (!eif->verdefs)
c44233aa 4102 {
58821868 4103 doit:
bc2b6df7
L
4104 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
4105 {
4106 eif->failed = true;
4107 return false;
4108 }
c44233aa 4109 }
252b5132
RH
4110 }
4111
4112 return true;
4113}
4114\f
4115/* Look through the symbols which are defined in other shared
4116 libraries and referenced here. Update the list of version
4117 dependencies. This will be put into the .gnu.version_r section.
4118 This function is called via elf_link_hash_traverse. */
4119
4120static boolean
4121elf_link_find_version_dependencies (h, data)
4122 struct elf_link_hash_entry *h;
4123 PTR data;
4124{
4125 struct elf_find_verdep_info *rinfo = (struct elf_find_verdep_info *) data;
4126 Elf_Internal_Verneed *t;
4127 Elf_Internal_Vernaux *a;
dc810e39 4128 bfd_size_type amt;
252b5132 4129
e92d460e
AM
4130 if (h->root.type == bfd_link_hash_warning)
4131 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4132
252b5132
RH
4133 /* We only care about symbols defined in shared objects with version
4134 information. */
4135 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4136 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
4137 || h->dynindx == -1
4138 || h->verinfo.verdef == NULL)
4139 return true;
4140
4141 /* See if we already know about this version. */
4142 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
4143 {
4144 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
4145 continue;
4146
4147 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
4148 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
4149 return true;
4150
4151 break;
4152 }
4153
4154 /* This is a new version. Add it to tree we are building. */
4155
4156 if (t == NULL)
4157 {
dc810e39
AM
4158 amt = sizeof *t;
4159 t = (Elf_Internal_Verneed *) bfd_zalloc (rinfo->output_bfd, amt);
252b5132
RH
4160 if (t == NULL)
4161 {
4162 rinfo->failed = true;
4163 return false;
4164 }
4165
4166 t->vn_bfd = h->verinfo.verdef->vd_bfd;
4167 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
4168 elf_tdata (rinfo->output_bfd)->verref = t;
4169 }
4170
dc810e39
AM
4171 amt = sizeof *a;
4172 a = (Elf_Internal_Vernaux *) bfd_zalloc (rinfo->output_bfd, amt);
252b5132
RH
4173
4174 /* Note that we are copying a string pointer here, and testing it
4175 above. If bfd_elf_string_from_elf_section is ever changed to
4176 discard the string data when low in memory, this will have to be
4177 fixed. */
4178 a->vna_nodename = h->verinfo.verdef->vd_nodename;
4179
4180 a->vna_flags = h->verinfo.verdef->vd_flags;
4181 a->vna_nextptr = t->vn_auxptr;
4182
4183 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
4184 ++rinfo->vers;
4185
4186 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
4187
4188 t->vn_auxptr = a;
4189
4190 return true;
4191}
4192
4193/* Figure out appropriate versions for all the symbols. We may not
4194 have the version number script until we have read all of the input
4195 files, so until that point we don't know which symbols should be
4196 local. This function is called via elf_link_hash_traverse. */
4197
4198static boolean
4199elf_link_assign_sym_version (h, data)
4200 struct elf_link_hash_entry *h;
4201 PTR data;
4202{
dc810e39
AM
4203 struct elf_assign_sym_version_info *sinfo;
4204 struct bfd_link_info *info;
c61b8717 4205 struct elf_backend_data *bed;
252b5132
RH
4206 struct elf_info_failed eif;
4207 char *p;
dc810e39
AM
4208 bfd_size_type amt;
4209
4210 sinfo = (struct elf_assign_sym_version_info *) data;
4211 info = sinfo->info;
252b5132 4212
e92d460e
AM
4213 if (h->root.type == bfd_link_hash_warning)
4214 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4215
252b5132
RH
4216 /* Fix the symbol flags. */
4217 eif.failed = false;
4218 eif.info = info;
4219 if (! elf_fix_symbol_flags (h, &eif))
4220 {
4221 if (eif.failed)
4222 sinfo->failed = true;
4223 return false;
4224 }
4225
4226 /* We only need version numbers for symbols defined in regular
4227 objects. */
4228 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4229 return true;
4230
c61b8717 4231 bed = get_elf_backend_data (sinfo->output_bfd);
252b5132
RH
4232 p = strchr (h->root.root.string, ELF_VER_CHR);
4233 if (p != NULL && h->verinfo.vertree == NULL)
4234 {
4235 struct bfd_elf_version_tree *t;
4236 boolean hidden;
4237
4238 hidden = true;
4239
4240 /* There are two consecutive ELF_VER_CHR characters if this is
c44233aa 4241 not a hidden symbol. */
252b5132
RH
4242 ++p;
4243 if (*p == ELF_VER_CHR)
4244 {
4245 hidden = false;
4246 ++p;
4247 }
4248
4249 /* If there is no version string, we can just return out. */
4250 if (*p == '\0')
4251 {
4252 if (hidden)
4253 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
4254 return true;
4255 }
4256
4257 /* Look for the version. If we find it, it is no longer weak. */
4258 for (t = sinfo->verdefs; t != NULL; t = t->next)
4259 {
4260 if (strcmp (t->name, p) == 0)
4261 {
dc810e39 4262 size_t len;
252b5132
RH
4263 char *alc;
4264 struct bfd_elf_version_expr *d;
4265
4266 len = p - h->root.root.string;
e5094212 4267 alc = bfd_malloc ((bfd_size_type) len);
252b5132 4268 if (alc == NULL)
c44233aa 4269 return false;
d4c88bbb 4270 memcpy (alc, h->root.root.string, len - 1);
252b5132
RH
4271 alc[len - 1] = '\0';
4272 if (alc[len - 2] == ELF_VER_CHR)
c44233aa 4273 alc[len - 2] = '\0';
252b5132
RH
4274
4275 h->verinfo.vertree = t;
4276 t->used = true;
4277 d = NULL;
4278
4279 if (t->globals != NULL)
4280 {
4281 for (d = t->globals; d != NULL; d = d->next)
4282 if ((*d->match) (d, alc))
4283 break;
4284 }
4285
4286 /* See if there is anything to force this symbol to
c44233aa 4287 local scope. */
252b5132
RH
4288 if (d == NULL && t->locals != NULL)
4289 {
4290 for (d = t->locals; d != NULL; d = d->next)
4291 {
4292 if ((*d->match) (d, alc))
4293 {
4294 if (h->dynindx != -1
4295 && info->shared
99293407 4296 && ! info->export_dynamic)
252b5132 4297 {
e5094212 4298 (*bed->elf_backend_hide_symbol) (info, h, true);
252b5132
RH
4299 }
4300
4301 break;
4302 }
4303 }
4304 }
4305
e5094212 4306 free (alc);
252b5132
RH
4307 break;
4308 }
4309 }
4310
4311 /* If we are building an application, we need to create a
c44233aa 4312 version node for this version. */
252b5132
RH
4313 if (t == NULL && ! info->shared)
4314 {
4315 struct bfd_elf_version_tree **pp;
4316 int version_index;
4317
4318 /* If we aren't going to export this symbol, we don't need
c44233aa 4319 to worry about it. */
252b5132
RH
4320 if (h->dynindx == -1)
4321 return true;
4322
dc810e39 4323 amt = sizeof *t;
252b5132 4324 t = ((struct bfd_elf_version_tree *)
dc810e39 4325 bfd_alloc (sinfo->output_bfd, amt));
252b5132
RH
4326 if (t == NULL)
4327 {
4328 sinfo->failed = true;
4329 return false;
4330 }
4331
4332 t->next = NULL;
4333 t->name = p;
4334 t->globals = NULL;
4335 t->locals = NULL;
4336 t->deps = NULL;
4337 t->name_indx = (unsigned int) -1;
4338 t->used = true;
4339
4340 version_index = 1;
6b9b879a
JJ
4341 /* Don't count anonymous version tag. */
4342 if (sinfo->verdefs != NULL && sinfo->verdefs->vernum == 0)
4343 version_index = 0;
252b5132
RH
4344 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
4345 ++version_index;
4346 t->vernum = version_index;
4347
4348 *pp = t;
4349
4350 h->verinfo.vertree = t;
4351 }
4352 else if (t == NULL)
4353 {
4354 /* We could not find the version for a symbol when
c44233aa 4355 generating a shared archive. Return an error. */
252b5132
RH
4356 (*_bfd_error_handler)
4357 (_("%s: undefined versioned symbol name %s"),
4358 bfd_get_filename (sinfo->output_bfd), h->root.root.string);
4359 bfd_set_error (bfd_error_bad_value);
4360 sinfo->failed = true;
4361 return false;
4362 }
4363
4364 if (hidden)
4365 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
4366 }
4367
4368 /* If we don't have a version for this symbol, see if we can find
4369 something. */
4370 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
4371 {
4372 struct bfd_elf_version_tree *t;
58821868 4373 struct bfd_elf_version_tree *local_ver;
252b5132
RH
4374 struct bfd_elf_version_expr *d;
4375
4376 /* See if can find what version this symbol is in. If the
c44233aa
AM
4377 symbol is supposed to be local, then don't actually register
4378 it. */
58821868 4379 local_ver = NULL;
252b5132
RH
4380 for (t = sinfo->verdefs; t != NULL; t = t->next)
4381 {
4382 if (t->globals != NULL)
4383 {
31941635
L
4384 boolean matched;
4385
4386 matched = false;
252b5132
RH
4387 for (d = t->globals; d != NULL; d = d->next)
4388 {
4389 if ((*d->match) (d, h->root.root.string))
4390 {
31941635
L
4391 if (d->symver)
4392 matched = true;
4393 else
4394 {
4395 /* There is a version without definition. Make
4396 the symbol the default definition for this
4397 version. */
4398 h->verinfo.vertree = t;
4399 local_ver = NULL;
4400 d->script = 1;
4401 break;
4402 }
252b5132
RH
4403 }
4404 }
4405
4406 if (d != NULL)
4407 break;
31941635
L
4408 else if (matched)
4409 /* There is no undefined version for this symbol. Hide the
4410 default one. */
4411 (*bed->elf_backend_hide_symbol) (info, h, true);
252b5132
RH
4412 }
4413
4414 if (t->locals != NULL)
4415 {
4416 for (d = t->locals; d != NULL; d = d->next)
4417 {
58821868
AM
4418 /* If the match is "*", keep looking for a more
4419 explicit, perhaps even global, match. */
252b5132 4420 if (d->pattern[0] == '*' && d->pattern[1] == '\0')
58821868 4421 local_ver = t;
252b5132
RH
4422 else if ((*d->match) (d, h->root.root.string))
4423 {
58821868 4424 local_ver = t;
252b5132
RH
4425 break;
4426 }
4427 }
4428
4429 if (d != NULL)
4430 break;
4431 }
4432 }
4433
58821868 4434 if (local_ver != NULL)
252b5132 4435 {
58821868 4436 h->verinfo.vertree = local_ver;
252b5132
RH
4437 if (h->dynindx != -1
4438 && info->shared
99293407 4439 && ! info->export_dynamic)
252b5132 4440 {
e5094212 4441 (*bed->elf_backend_hide_symbol) (info, h, true);
252b5132
RH
4442 }
4443 }
4444 }
4445
4446 return true;
4447}
252b5132
RH
4448\f
4449/* Final phase of ELF linker. */
4450
4451/* A structure we use to avoid passing large numbers of arguments. */
4452
4453struct elf_final_link_info
4454{
4455 /* General link information. */
4456 struct bfd_link_info *info;
4457 /* Output BFD. */
4458 bfd *output_bfd;
4459 /* Symbol string table. */
4460 struct bfd_strtab_hash *symstrtab;
4461 /* .dynsym section. */
4462 asection *dynsym_sec;
4463 /* .hash section. */
4464 asection *hash_sec;
4465 /* symbol version section (.gnu.version). */
4466 asection *symver_sec;
13ae64f3
JJ
4467 /* first SHF_TLS section (if any). */
4468 asection *first_tls_sec;
252b5132
RH
4469 /* Buffer large enough to hold contents of any section. */
4470 bfd_byte *contents;
4471 /* Buffer large enough to hold external relocs of any section. */
4472 PTR external_relocs;
4473 /* Buffer large enough to hold internal relocs of any section. */
4474 Elf_Internal_Rela *internal_relocs;
4475 /* Buffer large enough to hold external local symbols of any input
4476 BFD. */
4477 Elf_External_Sym *external_syms;
9ad5cbcf
AM
4478 /* And a buffer for symbol section indices. */
4479 Elf_External_Sym_Shndx *locsym_shndx;
252b5132
RH
4480 /* Buffer large enough to hold internal local symbols of any input
4481 BFD. */
4482 Elf_Internal_Sym *internal_syms;
4483 /* Array large enough to hold a symbol index for each local symbol
4484 of any input BFD. */
4485 long *indices;
4486 /* Array large enough to hold a section pointer for each local
4487 symbol of any input BFD. */
4488 asection **sections;
4489 /* Buffer to hold swapped out symbols. */
4490 Elf_External_Sym *symbuf;
9ad5cbcf
AM
4491 /* And one for symbol section indices. */
4492 Elf_External_Sym_Shndx *symshndxbuf;
252b5132
RH
4493 /* Number of swapped out symbols in buffer. */
4494 size_t symbuf_count;
4495 /* Number of symbols which fit in symbuf. */
4496 size_t symbuf_size;
c97e73dd
AM
4497 /* And same for symshndxbuf. */
4498 size_t shndxbuf_size;
252b5132
RH
4499};
4500
4501static boolean elf_link_output_sym
4502 PARAMS ((struct elf_final_link_info *, const char *,
4503 Elf_Internal_Sym *, asection *));
4504static boolean elf_link_flush_output_syms
4505 PARAMS ((struct elf_final_link_info *));
4506static boolean elf_link_output_extsym
4507 PARAMS ((struct elf_link_hash_entry *, PTR));
f5fa8ca2
JJ
4508static boolean elf_link_sec_merge_syms
4509 PARAMS ((struct elf_link_hash_entry *, PTR));
f5d44ba0
AM
4510static boolean elf_link_check_versioned_symbol
4511 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
252b5132
RH
4512static boolean elf_link_input_bfd
4513 PARAMS ((struct elf_final_link_info *, bfd *));
4514static boolean elf_reloc_link_order
4515 PARAMS ((bfd *, struct bfd_link_info *, asection *,
4516 struct bfd_link_order *));
4517
4518/* This struct is used to pass information to elf_link_output_extsym. */
4519
4520struct elf_outext_info
4521{
4522 boolean failed;
4523 boolean localsyms;
4524 struct elf_final_link_info *finfo;
4525};
4526
23bc299b
MM
4527/* Compute the size of, and allocate space for, REL_HDR which is the
4528 section header for a section containing relocations for O. */
4529
4530static boolean
4531elf_link_size_reloc_section (abfd, rel_hdr, o)
4532 bfd *abfd;
4533 Elf_Internal_Shdr *rel_hdr;
4534 asection *o;
4535{
dc810e39
AM
4536 bfd_size_type reloc_count;
4537 bfd_size_type num_rel_hashes;
23bc299b 4538
b037af20
MM
4539 /* Figure out how many relocations there will be. */
4540 if (rel_hdr == &elf_section_data (o)->rel_hdr)
4541 reloc_count = elf_section_data (o)->rel_count;
4542 else
4543 reloc_count = elf_section_data (o)->rel_count2;
4544
9317eacc
CM
4545 num_rel_hashes = o->reloc_count;
4546 if (num_rel_hashes < reloc_count)
4547 num_rel_hashes = reloc_count;
dc810e39 4548
b037af20
MM
4549 /* That allows us to calculate the size of the section. */
4550 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
23bc299b
MM
4551
4552 /* The contents field must last into write_object_contents, so we
755cfd29
NC
4553 allocate it with bfd_alloc rather than malloc. Also since we
4554 cannot be sure that the contents will actually be filled in,
4555 we zero the allocated space. */
4556 rel_hdr->contents = (PTR) bfd_zalloc (abfd, rel_hdr->sh_size);
23bc299b
MM
4557 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
4558 return false;
3e932841 4559
b037af20
MM
4560 /* We only allocate one set of hash entries, so we only do it the
4561 first time we are called. */
9317eacc
CM
4562 if (elf_section_data (o)->rel_hashes == NULL
4563 && num_rel_hashes)
b037af20 4564 {
209f668e
NC
4565 struct elf_link_hash_entry **p;
4566
b037af20 4567 p = ((struct elf_link_hash_entry **)
9317eacc 4568 bfd_zmalloc (num_rel_hashes
209f668e 4569 * sizeof (struct elf_link_hash_entry *)));
9317eacc 4570 if (p == NULL)
b037af20 4571 return false;
23bc299b 4572
b037af20 4573 elf_section_data (o)->rel_hashes = p;
b037af20 4574 }
23bc299b
MM
4575
4576 return true;
4577}
4578
31367b81
MM
4579/* When performing a relocateable link, the input relocations are
4580 preserved. But, if they reference global symbols, the indices
4581 referenced must be updated. Update all the relocations in
4582 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
4583
4584static void
4585elf_link_adjust_relocs (abfd, rel_hdr, count, rel_hash)
4586 bfd *abfd;
4587 Elf_Internal_Shdr *rel_hdr;
4588 unsigned int count;
4589 struct elf_link_hash_entry **rel_hash;
4590{
4591 unsigned int i;
32f0787a 4592 struct elf_backend_data *bed = get_elf_backend_data (abfd);
209f668e
NC
4593 Elf_Internal_Rel *irel;
4594 Elf_Internal_Rela *irela;
dc810e39 4595 bfd_size_type amt = sizeof (Elf_Internal_Rel) * bed->s->int_rels_per_ext_rel;
209f668e 4596
dc810e39 4597 irel = (Elf_Internal_Rel *) bfd_zmalloc (amt);
209f668e
NC
4598 if (irel == NULL)
4599 {
4600 (*_bfd_error_handler) (_("Error: out of memory"));
4601 abort ();
4602 }
4603
dc810e39
AM
4604 amt = sizeof (Elf_Internal_Rela) * bed->s->int_rels_per_ext_rel;
4605 irela = (Elf_Internal_Rela *) bfd_zmalloc (amt);
209f668e
NC
4606 if (irela == NULL)
4607 {
4608 (*_bfd_error_handler) (_("Error: out of memory"));
4609 abort ();
4610 }
31367b81
MM
4611
4612 for (i = 0; i < count; i++, rel_hash++)
4613 {
4614 if (*rel_hash == NULL)
4615 continue;
4616
4617 BFD_ASSERT ((*rel_hash)->indx >= 0);
4618
4619 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
4620 {
4621 Elf_External_Rel *erel;
209f668e 4622 unsigned int j;
3e932841 4623
31367b81 4624 erel = (Elf_External_Rel *) rel_hdr->contents + i;
32f0787a 4625 if (bed->s->swap_reloc_in)
209f668e 4626 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, irel);
32f0787a 4627 else
209f668e
NC
4628 elf_swap_reloc_in (abfd, erel, irel);
4629
4630 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
4631 irel[j].r_info = ELF_R_INFO ((*rel_hash)->indx,
4632 ELF_R_TYPE (irel[j].r_info));
4633
32f0787a 4634 if (bed->s->swap_reloc_out)
209f668e 4635 (*bed->s->swap_reloc_out) (abfd, irel, (bfd_byte *) erel);
32f0787a 4636 else
209f668e 4637 elf_swap_reloc_out (abfd, irel, erel);
31367b81
MM
4638 }
4639 else
4640 {
4641 Elf_External_Rela *erela;
209f668e 4642 unsigned int j;
3e932841 4643
31367b81
MM
4644 BFD_ASSERT (rel_hdr->sh_entsize
4645 == sizeof (Elf_External_Rela));
3e932841 4646
31367b81 4647 erela = (Elf_External_Rela *) rel_hdr->contents + i;
32f0787a 4648 if (bed->s->swap_reloca_in)
209f668e 4649 (*bed->s->swap_reloca_in) (abfd, (bfd_byte *) erela, irela);
32f0787a 4650 else
209f668e
NC
4651 elf_swap_reloca_in (abfd, erela, irela);
4652
4653 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
4654 irela[j].r_info = ELF_R_INFO ((*rel_hash)->indx,
58821868 4655 ELF_R_TYPE (irela[j].r_info));
209f668e 4656
32f0787a 4657 if (bed->s->swap_reloca_out)
209f668e 4658 (*bed->s->swap_reloca_out) (abfd, irela, (bfd_byte *) erela);
32f0787a 4659 else
209f668e 4660 elf_swap_reloca_out (abfd, irela, erela);
31367b81
MM
4661 }
4662 }
209f668e
NC
4663
4664 free (irel);
4665 free (irela);
31367b81
MM
4666}
4667
58821868
AM
4668struct elf_link_sort_rela
4669{
db6751f2
JJ
4670 bfd_vma offset;
4671 enum elf_reloc_type_class type;
58821868
AM
4672 union
4673 {
033fd5f9
AO
4674 /* We use these as arrays of size int_rels_per_ext_rel. */
4675 Elf_Internal_Rel rel[1];
4676 Elf_Internal_Rela rela[1];
db6751f2
JJ
4677 } u;
4678};
4679
4680static int
4681elf_link_sort_cmp1 (A, B)
4682 const PTR A;
4683 const PTR B;
4684{
f51e552e
AM
4685 struct elf_link_sort_rela *a = (struct elf_link_sort_rela *) A;
4686 struct elf_link_sort_rela *b = (struct elf_link_sort_rela *) B;
db6751f2
JJ
4687 int relativea, relativeb;
4688
4689 relativea = a->type == reloc_class_relative;
4690 relativeb = b->type == reloc_class_relative;
4691
4692 if (relativea < relativeb)
db6751f2 4693 return 1;
fcfbdf31
JJ
4694 if (relativea > relativeb)
4695 return -1;
033fd5f9 4696 if (ELF_R_SYM (a->u.rel->r_info) < ELF_R_SYM (b->u.rel->r_info))
db6751f2 4697 return -1;
033fd5f9 4698 if (ELF_R_SYM (a->u.rel->r_info) > ELF_R_SYM (b->u.rel->r_info))
db6751f2 4699 return 1;
033fd5f9 4700 if (a->u.rel->r_offset < b->u.rel->r_offset)
db6751f2 4701 return -1;
033fd5f9 4702 if (a->u.rel->r_offset > b->u.rel->r_offset)
db6751f2
JJ
4703 return 1;
4704 return 0;
4705}
4706
4707static int
4708elf_link_sort_cmp2 (A, B)
4709 const PTR A;
4710 const PTR B;
4711{
f51e552e
AM
4712 struct elf_link_sort_rela *a = (struct elf_link_sort_rela *) A;
4713 struct elf_link_sort_rela *b = (struct elf_link_sort_rela *) B;
db6751f2
JJ
4714 int copya, copyb;
4715
4716 if (a->offset < b->offset)
4717 return -1;
4718 if (a->offset > b->offset)
4719 return 1;
290394d6
JJ
4720 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
4721 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
db6751f2
JJ
4722 if (copya < copyb)
4723 return -1;
4724 if (copya > copyb)
4725 return 1;
033fd5f9 4726 if (a->u.rel->r_offset < b->u.rel->r_offset)
db6751f2 4727 return -1;
033fd5f9 4728 if (a->u.rel->r_offset > b->u.rel->r_offset)
db6751f2
JJ
4729 return 1;
4730 return 0;
4731}
4732
4733static size_t
4734elf_link_sort_relocs (abfd, info, psec)
4735 bfd *abfd;
4736 struct bfd_link_info *info;
4737 asection **psec;
4738{
4739 bfd *dynobj = elf_hash_table (info)->dynobj;
4740 asection *reldyn, *o;
4741 boolean rel = false;
f51e552e
AM
4742 bfd_size_type count, size;
4743 size_t i, j, ret;
db6751f2
JJ
4744 struct elf_link_sort_rela *rela;
4745 struct elf_backend_data *bed = get_elf_backend_data (abfd);
033fd5f9 4746 int i2e = bed->s->int_rels_per_ext_rel;
db6751f2
JJ
4747
4748 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
4749 if (reldyn == NULL || reldyn->_raw_size == 0)
4750 {
4751 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
4752 if (reldyn == NULL || reldyn->_raw_size == 0)
4753 return 0;
4754 rel = true;
4755 count = reldyn->_raw_size / sizeof (Elf_External_Rel);
4756 }
4757 else
4758 count = reldyn->_raw_size / sizeof (Elf_External_Rela);
4759
4760 size = 0;
4761 for (o = dynobj->sections; o != NULL; o = o->next)
4762 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4763 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4764 && o->output_section == reldyn)
4765 size += o->_raw_size;
4766
4767 if (size != reldyn->_raw_size)
4768 return 0;
4769
033fd5f9
AO
4770 /* We waste some memory here when N = i2e is greater than 1, since
4771 we allocate space for N * sizeof (*rela) where sizeof (*rela) +
4772 (N - 1) * sizeof (Elf_Internal_Rel/Rela) would do. Also, we use
4773 rela[k] only when k is a multiple of N, and then we index the
4774 array within the union, such that rela[k].u.rel[i], i < N, is the
4775 (i+1)th internal relocation corresponding to the (k/N)th external
4776 relocation. This is done such that the relocation swap-in and
4777 swap-out functions can gen pointers to arrays of internal
4778 relocations that form a single external relocation.
4779
4780 If C permitted arrays of structures with dynamic sizes, we could
4781 do better, but trying to avoid wasting space at the end of the
4782 chunk from rela[k] to rela[k+N-1] would require us to allocate a
4783 separate array of pointers and since most ports have N == 1, this
4784 would be more wasteful. */
4785 rela = (struct elf_link_sort_rela *) bfd_zmalloc
4786 (sizeof (*rela) * count * i2e);
db6751f2
JJ
4787 if (rela == NULL)
4788 {
4789 (*info->callbacks->warning)
dc810e39
AM
4790 (info, _("Not enough memory to sort relocations"), 0, abfd, 0,
4791 (bfd_vma) 0);
db6751f2
JJ
4792 return 0;
4793 }
4794
4795 for (o = dynobj->sections; o != NULL; o = o->next)
4796 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4797 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4798 && o->output_section == reldyn)
4799 {
4800 if (rel)
4801 {
4802 Elf_External_Rel *erel, *erelend;
4803 struct elf_link_sort_rela *s;
4804
4805 erel = (Elf_External_Rel *) o->contents;
f51e552e 4806 erelend = (Elf_External_Rel *) (o->contents + o->_raw_size);
033fd5f9
AO
4807 s = rela + (o->output_offset / sizeof (Elf_External_Rel) * i2e);
4808 for (; erel < erelend; erel++, s += i2e)
db6751f2
JJ
4809 {
4810 if (bed->s->swap_reloc_in)
033fd5f9
AO
4811 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel,
4812 s->u.rel);
db6751f2 4813 else
033fd5f9 4814 elf_swap_reloc_in (abfd, erel, s->u.rel);
db6751f2 4815
033fd5f9 4816 s->type = (*bed->elf_backend_reloc_type_class) (s->u.rela);
dc810e39 4817 }
db6751f2
JJ
4818 }
4819 else
4820 {
4821 Elf_External_Rela *erela, *erelaend;
4822 struct elf_link_sort_rela *s;
4823
4824 erela = (Elf_External_Rela *) o->contents;
f51e552e 4825 erelaend = (Elf_External_Rela *) (o->contents + o->_raw_size);
033fd5f9
AO
4826 s = rela + (o->output_offset / sizeof (Elf_External_Rela) * i2e);
4827 for (; erela < erelaend; erela++, s += i2e)
db6751f2
JJ
4828 {
4829 if (bed->s->swap_reloca_in)
dc810e39 4830 (*bed->s->swap_reloca_in) (dynobj, (bfd_byte *) erela,
033fd5f9 4831 s->u.rela);
db6751f2 4832 else
033fd5f9 4833 elf_swap_reloca_in (dynobj, erela, s->u.rela);
db6751f2 4834
033fd5f9 4835 s->type = (*bed->elf_backend_reloc_type_class) (s->u.rela);
dc810e39 4836 }
db6751f2
JJ
4837 }
4838 }
4839
033fd5f9
AO
4840 qsort (rela, (size_t) count, sizeof (*rela) * i2e, elf_link_sort_cmp1);
4841 for (ret = 0; ret < count * i2e && rela[ret].type == reloc_class_relative;
4842 ret += i2e)
fcfbdf31 4843 ;
033fd5f9 4844 for (i = ret, j = ret; i < count * i2e; i += i2e)
db6751f2 4845 {
033fd5f9
AO
4846 if (ELF_R_SYM (rela[i].u.rel->r_info)
4847 != ELF_R_SYM (rela[j].u.rel->r_info))
db6751f2 4848 j = i;
033fd5f9 4849 rela[i].offset = rela[j].u.rel->r_offset;
db6751f2 4850 }
033fd5f9
AO
4851 ret /= i2e;
4852 qsort (rela + ret, (size_t) count - ret,
4853 sizeof (*rela) * i2e, elf_link_sort_cmp2);
dc810e39 4854
db6751f2
JJ
4855 for (o = dynobj->sections; o != NULL; o = o->next)
4856 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4857 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4858 && o->output_section == reldyn)
4859 {
4860 if (rel)
4861 {
4862 Elf_External_Rel *erel, *erelend;
4863 struct elf_link_sort_rela *s;
4864
4865 erel = (Elf_External_Rel *) o->contents;
df22989b 4866 erelend = (Elf_External_Rel *) (o->contents + o->_raw_size);
033fd5f9
AO
4867 s = rela + (o->output_offset / sizeof (Elf_External_Rel) * i2e);
4868 for (; erel < erelend; erel++, s += i2e)
db6751f2
JJ
4869 {
4870 if (bed->s->swap_reloc_out)
033fd5f9 4871 (*bed->s->swap_reloc_out) (abfd, s->u.rel,
dc810e39 4872 (bfd_byte *) erel);
db6751f2 4873 else
033fd5f9 4874 elf_swap_reloc_out (abfd, s->u.rel, erel);
db6751f2
JJ
4875 }
4876 }
4877 else
4878 {
4879 Elf_External_Rela *erela, *erelaend;
4880 struct elf_link_sort_rela *s;
4881
4882 erela = (Elf_External_Rela *) o->contents;
df22989b 4883 erelaend = (Elf_External_Rela *) (o->contents + o->_raw_size);
033fd5f9
AO
4884 s = rela + (o->output_offset / sizeof (Elf_External_Rela) * i2e);
4885 for (; erela < erelaend; erela++, s += i2e)
db6751f2
JJ
4886 {
4887 if (bed->s->swap_reloca_out)
033fd5f9 4888 (*bed->s->swap_reloca_out) (dynobj, s->u.rela,
dc810e39 4889 (bfd_byte *) erela);
db6751f2 4890 else
033fd5f9 4891 elf_swap_reloca_out (dynobj, s->u.rela, erela);
dc810e39 4892 }
db6751f2
JJ
4893 }
4894 }
4895
4896 free (rela);
4897 *psec = reldyn;
4898 return ret;
4899}
4900
252b5132
RH
4901/* Do the final step of an ELF link. */
4902
4903boolean
4904elf_bfd_final_link (abfd, info)
4905 bfd *abfd;
4906 struct bfd_link_info *info;
4907{
4908 boolean dynamic;
9317eacc 4909 boolean emit_relocs;
252b5132
RH
4910 bfd *dynobj;
4911 struct elf_final_link_info finfo;
4912 register asection *o;
4913 register struct bfd_link_order *p;
4914 register bfd *sub;
dc810e39
AM
4915 bfd_size_type max_contents_size;
4916 bfd_size_type max_external_reloc_size;
4917 bfd_size_type max_internal_reloc_count;
4918 bfd_size_type max_sym_count;
9ad5cbcf 4919 bfd_size_type max_sym_shndx_count;
252b5132
RH
4920 file_ptr off;
4921 Elf_Internal_Sym elfsym;
4922 unsigned int i;
4923 Elf_Internal_Shdr *symtab_hdr;
c97e73dd 4924 Elf_Internal_Shdr *symtab_shndx_hdr;
252b5132
RH
4925 Elf_Internal_Shdr *symstrtab_hdr;
4926 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4927 struct elf_outext_info eoinfo;
f5fa8ca2 4928 boolean merged;
db6751f2
JJ
4929 size_t relativecount = 0;
4930 asection *reldyn = 0;
dc810e39 4931 bfd_size_type amt;
252b5132 4932
8ea2e4bd
NC
4933 if (! is_elf_hash_table (info))
4934 return false;
4935
252b5132
RH
4936 if (info->shared)
4937 abfd->flags |= DYNAMIC;
4938
4939 dynamic = elf_hash_table (info)->dynamic_sections_created;
4940 dynobj = elf_hash_table (info)->dynobj;
4941
9317eacc 4942 emit_relocs = (info->relocateable
c44233aa
AM
4943 || info->emitrelocations
4944 || bed->elf_backend_emit_relocs);
9317eacc 4945
252b5132
RH
4946 finfo.info = info;
4947 finfo.output_bfd = abfd;
4948 finfo.symstrtab = elf_stringtab_init ();
4949 if (finfo.symstrtab == NULL)
4950 return false;
4951
4952 if (! dynamic)
4953 {
4954 finfo.dynsym_sec = NULL;
4955 finfo.hash_sec = NULL;
4956 finfo.symver_sec = NULL;
4957 }
4958 else
4959 {
4960 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
4961 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
4962 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
4963 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
4964 /* Note that it is OK if symver_sec is NULL. */
4965 }
4966
4967 finfo.contents = NULL;
4968 finfo.external_relocs = NULL;
4969 finfo.internal_relocs = NULL;
4970 finfo.external_syms = NULL;
9ad5cbcf 4971 finfo.locsym_shndx = NULL;
252b5132
RH
4972 finfo.internal_syms = NULL;
4973 finfo.indices = NULL;
4974 finfo.sections = NULL;
4975 finfo.symbuf = NULL;
9ad5cbcf 4976 finfo.symshndxbuf = NULL;
252b5132 4977 finfo.symbuf_count = 0;
c97e73dd 4978 finfo.shndxbuf_size = 0;
13ae64f3
JJ
4979 finfo.first_tls_sec = NULL;
4980 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4981 if ((o->flags & SEC_THREAD_LOCAL) != 0
4982 && (o->flags & SEC_LOAD) != 0)
4983 {
4984 finfo.first_tls_sec = o;
4985 break;
4986 }
252b5132
RH
4987
4988 /* Count up the number of relocations we will output for each output
4989 section, so that we know the sizes of the reloc sections. We
4990 also figure out some maximum sizes. */
4991 max_contents_size = 0;
4992 max_external_reloc_size = 0;
4993 max_internal_reloc_count = 0;
4994 max_sym_count = 0;
9ad5cbcf 4995 max_sym_shndx_count = 0;
f5fa8ca2 4996 merged = false;
252b5132
RH
4997 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4998 {
4999 o->reloc_count = 0;
5000
5001 for (p = o->link_order_head; p != NULL; p = p->next)
5002 {
5003 if (p->type == bfd_section_reloc_link_order
5004 || p->type == bfd_symbol_reloc_link_order)
5005 ++o->reloc_count;
5006 else if (p->type == bfd_indirect_link_order)
5007 {
5008 asection *sec;
5009
5010 sec = p->u.indirect.section;
5011
5012 /* Mark all sections which are to be included in the
5013 link. This will normally be every section. We need
5014 to do this so that we can identify any sections which
5015 the linker has decided to not include. */
5016 sec->linker_mark = true;
5017
f5fa8ca2
JJ
5018 if (sec->flags & SEC_MERGE)
5019 merged = true;
5020
a712da20 5021 if (info->relocateable || info->emitrelocations)
252b5132 5022 o->reloc_count += sec->reloc_count;
c44233aa 5023 else if (bed->elf_backend_count_relocs)
9317eacc
CM
5024 {
5025 Elf_Internal_Rela * relocs;
5026
5027 relocs = (NAME(_bfd_elf,link_read_relocs)
5028 (abfd, sec, (PTR) NULL,
5029 (Elf_Internal_Rela *) NULL, info->keep_memory));
5030
c44233aa
AM
5031 o->reloc_count
5032 += (*bed->elf_backend_count_relocs) (sec, relocs);
9317eacc 5033
6cdc0ccc 5034 if (elf_section_data (o)->relocs != relocs)
9317eacc
CM
5035 free (relocs);
5036 }
252b5132
RH
5037
5038 if (sec->_raw_size > max_contents_size)
5039 max_contents_size = sec->_raw_size;
5040 if (sec->_cooked_size > max_contents_size)
5041 max_contents_size = sec->_cooked_size;
5042
5043 /* We are interested in just local symbols, not all
5044 symbols. */
5045 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
5046 && (sec->owner->flags & DYNAMIC) == 0)
5047 {
5048 size_t sym_count;
5049
5050 if (elf_bad_symtab (sec->owner))
5051 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
5052 / sizeof (Elf_External_Sym));
5053 else
5054 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
5055
5056 if (sym_count > max_sym_count)
5057 max_sym_count = sym_count;
5058
9ad5cbcf
AM
5059 if (sym_count > max_sym_shndx_count
5060 && elf_symtab_shndx (sec->owner) != 0)
5061 max_sym_shndx_count = sym_count;
5062
252b5132
RH
5063 if ((sec->flags & SEC_RELOC) != 0)
5064 {
5065 size_t ext_size;
5066
5067 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
5068 if (ext_size > max_external_reloc_size)
5069 max_external_reloc_size = ext_size;
5070 if (sec->reloc_count > max_internal_reloc_count)
5071 max_internal_reloc_count = sec->reloc_count;
5072 }
5073 }
5074 }
5075 }
5076
5077 if (o->reloc_count > 0)
5078 o->flags |= SEC_RELOC;
5079 else
5080 {
5081 /* Explicitly clear the SEC_RELOC flag. The linker tends to
5082 set it (this is probably a bug) and if it is set
5083 assign_section_numbers will create a reloc section. */
5084 o->flags &=~ SEC_RELOC;
5085 }
5086
5087 /* If the SEC_ALLOC flag is not set, force the section VMA to
5088 zero. This is done in elf_fake_sections as well, but forcing
5089 the VMA to 0 here will ensure that relocs against these
5090 sections are handled correctly. */
5091 if ((o->flags & SEC_ALLOC) == 0
5092 && ! o->user_set_vma)
5093 o->vma = 0;
5094 }
5095
f5fa8ca2
JJ
5096 if (! info->relocateable && merged)
5097 elf_link_hash_traverse (elf_hash_table (info),
5098 elf_link_sec_merge_syms, (PTR) abfd);
5099
252b5132
RH
5100 /* Figure out the file positions for everything but the symbol table
5101 and the relocs. We set symcount to force assign_section_numbers
5102 to create a symbol table. */
5103 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
5104 BFD_ASSERT (! abfd->output_has_begun);
5105 if (! _bfd_elf_compute_section_file_positions (abfd, info))
5106 goto error_return;
5107
b037af20
MM
5108 /* Figure out how many relocations we will have in each section.
5109 Just using RELOC_COUNT isn't good enough since that doesn't
5110 maintain a separate value for REL vs. RELA relocations. */
9317eacc 5111 if (emit_relocs)
b037af20
MM
5112 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5113 for (o = sub->sections; o != NULL; o = o->next)
5114 {
814fe68a 5115 asection *output_section;
b037af20 5116
814fe68a
ILT
5117 if (! o->linker_mark)
5118 {
5119 /* This section was omitted from the link. */
5120 continue;
5121 }
5122
5123 output_section = o->output_section;
5124
5125 if (output_section != NULL
5126 && (o->flags & SEC_RELOC) != 0)
b037af20 5127 {
3e932841 5128 struct bfd_elf_section_data *esdi
b037af20 5129 = elf_section_data (o);
3e932841 5130 struct bfd_elf_section_data *esdo
b037af20 5131 = elf_section_data (output_section);
ce006217
MM
5132 unsigned int *rel_count;
5133 unsigned int *rel_count2;
c119f9b8
AM
5134 bfd_size_type entsize;
5135 bfd_size_type entsize2;
b037af20 5136
c119f9b8 5137 /* We must be careful to add the relocations from the
ce006217 5138 input section to the right output count. */
c119f9b8
AM
5139 entsize = esdi->rel_hdr.sh_entsize;
5140 entsize2 = esdi->rel_hdr2 ? esdi->rel_hdr2->sh_entsize : 0;
5141 BFD_ASSERT ((entsize == sizeof (Elf_External_Rel)
5142 || entsize == sizeof (Elf_External_Rela))
5143 && entsize2 != entsize
5144 && (entsize2 == 0
5145 || entsize2 == sizeof (Elf_External_Rel)
5146 || entsize2 == sizeof (Elf_External_Rela)));
5147 if (entsize == esdo->rel_hdr.sh_entsize)
ce006217
MM
5148 {
5149 rel_count = &esdo->rel_count;
5150 rel_count2 = &esdo->rel_count2;
5151 }
5152 else
5153 {
5154 rel_count = &esdo->rel_count2;
5155 rel_count2 = &esdo->rel_count;
5156 }
3e932841 5157
d9bc7a44 5158 *rel_count += NUM_SHDR_ENTRIES (& esdi->rel_hdr);
b037af20 5159 if (esdi->rel_hdr2)
d9bc7a44 5160 *rel_count2 += NUM_SHDR_ENTRIES (esdi->rel_hdr2);
9317eacc 5161 output_section->flags |= SEC_RELOC;
b037af20
MM
5162 }
5163 }
5164
252b5132
RH
5165 /* That created the reloc sections. Set their sizes, and assign
5166 them file positions, and allocate some buffers. */
5167 for (o = abfd->sections; o != NULL; o = o->next)
5168 {
5169 if ((o->flags & SEC_RELOC) != 0)
5170 {
23bc299b
MM
5171 if (!elf_link_size_reloc_section (abfd,
5172 &elf_section_data (o)->rel_hdr,
5173 o))
252b5132
RH
5174 goto error_return;
5175
23bc299b
MM
5176 if (elf_section_data (o)->rel_hdr2
5177 && !elf_link_size_reloc_section (abfd,
5178 elf_section_data (o)->rel_hdr2,
5179 o))
252b5132 5180 goto error_return;
252b5132 5181 }
b037af20
MM
5182
5183 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
3e932841 5184 to count upwards while actually outputting the relocations. */
b037af20
MM
5185 elf_section_data (o)->rel_count = 0;
5186 elf_section_data (o)->rel_count2 = 0;
252b5132
RH
5187 }
5188
5189 _bfd_elf_assign_file_positions_for_relocs (abfd);
5190
5191 /* We have now assigned file positions for all the sections except
5192 .symtab and .strtab. We start the .symtab section at the current
5193 file position, and write directly to it. We build the .strtab
5194 section in memory. */
5195 bfd_get_symcount (abfd) = 0;
5196 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5197 /* sh_name is set in prep_headers. */
5198 symtab_hdr->sh_type = SHT_SYMTAB;
c97e73dd 5199 /* sh_flags, sh_addr and sh_size all start off zero. */
252b5132
RH
5200 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
5201 /* sh_link is set in assign_section_numbers. */
5202 /* sh_info is set below. */
5203 /* sh_offset is set just below. */
f0e1d18a 5204 symtab_hdr->sh_addralign = bed->s->file_align;
252b5132
RH
5205
5206 off = elf_tdata (abfd)->next_file_pos;
5207 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, true);
5208
5209 /* Note that at this point elf_tdata (abfd)->next_file_pos is
5210 incorrect. We do not yet know the size of the .symtab section.
5211 We correct next_file_pos below, after we do know the size. */
5212
5213 /* Allocate a buffer to hold swapped out symbols. This is to avoid
5214 continuously seeking to the right position in the file. */
5215 if (! info->keep_memory || max_sym_count < 20)
5216 finfo.symbuf_size = 20;
5217 else
5218 finfo.symbuf_size = max_sym_count;
dc810e39
AM
5219 amt = finfo.symbuf_size;
5220 amt *= sizeof (Elf_External_Sym);
5221 finfo.symbuf = (Elf_External_Sym *) bfd_malloc (amt);
252b5132
RH
5222 if (finfo.symbuf == NULL)
5223 goto error_return;
9ad5cbcf
AM
5224 if (elf_numsections (abfd) > SHN_LORESERVE)
5225 {
c97e73dd
AM
5226 /* Wild guess at number of output symbols. realloc'd as needed. */
5227 amt = 2 * max_sym_count + elf_numsections (abfd) + 1000;
5228 finfo.shndxbuf_size = amt;
9ad5cbcf 5229 amt *= sizeof (Elf_External_Sym_Shndx);
c97e73dd 5230 finfo.symshndxbuf = (Elf_External_Sym_Shndx *) bfd_zmalloc (amt);
9ad5cbcf
AM
5231 if (finfo.symshndxbuf == NULL)
5232 goto error_return;
5233 }
252b5132
RH
5234
5235 /* Start writing out the symbol table. The first symbol is always a
5236 dummy symbol. */
9317eacc
CM
5237 if (info->strip != strip_all
5238 || emit_relocs)
252b5132
RH
5239 {
5240 elfsym.st_value = 0;
5241 elfsym.st_size = 0;
5242 elfsym.st_info = 0;
5243 elfsym.st_other = 0;
5244 elfsym.st_shndx = SHN_UNDEF;
5245 if (! elf_link_output_sym (&finfo, (const char *) NULL,
5246 &elfsym, bfd_und_section_ptr))
5247 goto error_return;
5248 }
5249
5250#if 0
5251 /* Some standard ELF linkers do this, but we don't because it causes
5252 bootstrap comparison failures. */
5253 /* Output a file symbol for the output file as the second symbol.
5254 We output this even if we are discarding local symbols, although
5255 I'm not sure if this is correct. */
5256 elfsym.st_value = 0;
5257 elfsym.st_size = 0;
5258 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5259 elfsym.st_other = 0;
5260 elfsym.st_shndx = SHN_ABS;
5261 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
5262 &elfsym, bfd_abs_section_ptr))
5263 goto error_return;
5264#endif
5265
5266 /* Output a symbol for each section. We output these even if we are
5267 discarding local symbols, since they are used for relocs. These
5268 symbols have no names. We store the index of each one in the
5269 index field of the section, so that we can find it again when
5270 outputting relocs. */
9317eacc
CM
5271 if (info->strip != strip_all
5272 || emit_relocs)
252b5132
RH
5273 {
5274 elfsym.st_size = 0;
5275 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5276 elfsym.st_other = 0;
9ad5cbcf 5277 for (i = 1; i < elf_numsections (abfd); i++)
252b5132
RH
5278 {
5279 o = section_from_elf_index (abfd, i);
5280 if (o != NULL)
5281 o->target_index = bfd_get_symcount (abfd);
5282 elfsym.st_shndx = i;
7ad34365 5283 if (info->relocateable || o == NULL)
252b5132
RH
5284 elfsym.st_value = 0;
5285 else
5286 elfsym.st_value = o->vma;
5287 if (! elf_link_output_sym (&finfo, (const char *) NULL,
5288 &elfsym, o))
5289 goto error_return;
c97e73dd 5290 if (i == SHN_LORESERVE - 1)
9ad5cbcf 5291 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
252b5132
RH
5292 }
5293 }
5294
5295 /* Allocate some memory to hold information read in from the input
5296 files. */
9ad5cbcf
AM
5297 if (max_contents_size != 0)
5298 {
5299 finfo.contents = (bfd_byte *) bfd_malloc (max_contents_size);
5300 if (finfo.contents == NULL)
5301 goto error_return;
5302 }
5303
5304 if (max_external_reloc_size != 0)
5305 {
5306 finfo.external_relocs = (PTR) bfd_malloc (max_external_reloc_size);
5307 if (finfo.external_relocs == NULL)
5308 goto error_return;
5309 }
5310
5311 if (max_internal_reloc_count != 0)
5312 {
5313 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
5314 amt *= sizeof (Elf_Internal_Rela);
5315 finfo.internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
5316 if (finfo.internal_relocs == NULL)
5317 goto error_return;
5318 }
5319
5320 if (max_sym_count != 0)
5321 {
5322 amt = max_sym_count * sizeof (Elf_External_Sym);
5323 finfo.external_syms = (Elf_External_Sym *) bfd_malloc (amt);
5324 if (finfo.external_syms == NULL)
5325 goto error_return;
5326
5327 amt = max_sym_count * sizeof (Elf_Internal_Sym);
5328 finfo.internal_syms = (Elf_Internal_Sym *) bfd_malloc (amt);
5329 if (finfo.internal_syms == NULL)
5330 goto error_return;
5331
5332 amt = max_sym_count * sizeof (long);
5333 finfo.indices = (long *) bfd_malloc (amt);
5334 if (finfo.indices == NULL)
5335 goto error_return;
5336
5337 amt = max_sym_count * sizeof (asection *);
5338 finfo.sections = (asection **) bfd_malloc (amt);
5339 if (finfo.sections == NULL)
5340 goto error_return;
5341 }
5342
5343 if (max_sym_shndx_count != 0)
5344 {
5345 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
5346 finfo.locsym_shndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
5347 if (finfo.locsym_shndx == NULL)
5348 goto error_return;
5349 }
252b5132 5350
13ae64f3
JJ
5351 if (finfo.first_tls_sec)
5352 {
5353 unsigned int align = 0;
5354 bfd_vma base = finfo.first_tls_sec->vma, end = 0;
5355 asection *sec;
5356
5357 for (sec = finfo.first_tls_sec;
5358 sec && (sec->flags & SEC_THREAD_LOCAL);
5359 sec = sec->next)
5360 {
5361 bfd_vma size = sec->_raw_size;
5362
5363 if (bfd_get_section_alignment (abfd, sec) > align)
5364 align = bfd_get_section_alignment (abfd, sec);
5365 if (sec->_raw_size == 0 && (sec->flags & SEC_HAS_CONTENTS) == 0)
5366 {
5367 struct bfd_link_order *o;
5368
5369 size = 0;
5370 for (o = sec->link_order_head; o != NULL; o = o->next)
5371 if (size < o->offset + o->size)
58821868 5372 size = o->offset + o->size;
13ae64f3
JJ
5373 }
5374 end = sec->vma + size;
5375 }
5376 elf_hash_table (info)->tls_segment
5377 = bfd_zalloc (abfd, sizeof (struct elf_link_tls_segment));
5378 if (elf_hash_table (info)->tls_segment == NULL)
5379 goto error_return;
5380 elf_hash_table (info)->tls_segment->start = base;
5381 elf_hash_table (info)->tls_segment->size = end - base;
5382 elf_hash_table (info)->tls_segment->align = align;
5383 }
5384
252b5132
RH
5385 /* Since ELF permits relocations to be against local symbols, we
5386 must have the local symbols available when we do the relocations.
5387 Since we would rather only read the local symbols once, and we
5388 would rather not keep them in memory, we handle all the
5389 relocations for a single input file at the same time.
5390
5391 Unfortunately, there is no way to know the total number of local
5392 symbols until we have seen all of them, and the local symbol
5393 indices precede the global symbol indices. This means that when
5394 we are generating relocateable output, and we see a reloc against
5395 a global symbol, we can not know the symbol index until we have
5396 finished examining all the local symbols to see which ones we are
5397 going to output. To deal with this, we keep the relocations in
5398 memory, and don't output them until the end of the link. This is
5399 an unfortunate waste of memory, but I don't see a good way around
5400 it. Fortunately, it only happens when performing a relocateable
5401 link, which is not the common case. FIXME: If keep_memory is set
5402 we could write the relocs out and then read them again; I don't
5403 know how bad the memory loss will be. */
5404
5405 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5406 sub->output_has_begun = false;
5407 for (o = abfd->sections; o != NULL; o = o->next)
5408 {
5409 for (p = o->link_order_head; p != NULL; p = p->next)
5410 {
5411 if (p->type == bfd_indirect_link_order
a50c1845 5412 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
4ddafab0 5413 == bfd_target_elf_flavour)
a50c1845 5414 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
252b5132 5415 {
252b5132
RH
5416 if (! sub->output_has_begun)
5417 {
5418 if (! elf_link_input_bfd (&finfo, sub))
5419 goto error_return;
5420 sub->output_has_begun = true;
5421 }
5422 }
5423 else if (p->type == bfd_section_reloc_link_order
5424 || p->type == bfd_symbol_reloc_link_order)
5425 {
5426 if (! elf_reloc_link_order (abfd, info, o, p))
5427 goto error_return;
5428 }
5429 else
5430 {
5431 if (! _bfd_default_link_order (abfd, info, o, p))
5432 goto error_return;
5433 }
5434 }
5435 }
5436
c44233aa
AM
5437 /* Output any global symbols that got converted to local in a
5438 version script or due to symbol visibility. We do this in a
5439 separate step since ELF requires all local symbols to appear
5440 prior to any global symbols. FIXME: We should only do this if
5441 some global symbols were, in fact, converted to become local.
5442 FIXME: Will this work correctly with the Irix 5 linker? */
5443 eoinfo.failed = false;
5444 eoinfo.finfo = &finfo;
5445 eoinfo.localsyms = true;
5446 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
5447 (PTR) &eoinfo);
5448 if (eoinfo.failed)
5449 return false;
5450
252b5132 5451 /* That wrote out all the local symbols. Finish up the symbol table
5cc7c785
L
5452 with the global symbols. Even if we want to strip everything we
5453 can, we still need to deal with those global symbols that got
3e932841 5454 converted to local in a version script. */
252b5132 5455
30b30c21 5456 /* The sh_info field records the index of the first non local symbol. */
252b5132 5457 symtab_hdr->sh_info = bfd_get_symcount (abfd);
30b30c21 5458
fc8c40a0
AM
5459 if (dynamic
5460 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
30b30c21
RH
5461 {
5462 Elf_Internal_Sym sym;
5463 Elf_External_Sym *dynsym =
a7b97311 5464 (Elf_External_Sym *) finfo.dynsym_sec->contents;
71a40b32 5465 long last_local = 0;
30b30c21
RH
5466
5467 /* Write out the section symbols for the output sections. */
5468 if (info->shared)
5469 {
5470 asection *s;
5471
5472 sym.st_size = 0;
5473 sym.st_name = 0;
5474 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5475 sym.st_other = 0;
5476
5477 for (s = abfd->sections; s != NULL; s = s->next)
5478 {
5479 int indx;
9ad5cbcf
AM
5480 Elf_External_Sym *dest;
5481
30b30c21
RH
5482 indx = elf_section_data (s)->this_idx;
5483 BFD_ASSERT (indx > 0);
5484 sym.st_shndx = indx;
5485 sym.st_value = s->vma;
9ad5cbcf
AM
5486 dest = dynsym + elf_section_data (s)->dynindx;
5487 elf_swap_symbol_out (abfd, &sym, (PTR) dest, (PTR) 0);
30b30c21
RH
5488 }
5489
5490 last_local = bfd_count_sections (abfd);
5491 }
5492
5493 /* Write out the local dynsyms. */
5494 if (elf_hash_table (info)->dynlocal)
5495 {
5496 struct elf_link_local_dynamic_entry *e;
5497 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
5498 {
318da145 5499 asection *s;
9ad5cbcf 5500 Elf_External_Sym *dest;
30b30c21 5501
b037af20
MM
5502 sym.st_size = e->isym.st_size;
5503 sym.st_other = e->isym.st_other;
5504
1fa0ddb3
RH
5505 /* Copy the internal symbol as is.
5506 Note that we saved a word of storage and overwrote
c44233aa
AM
5507 the original st_name with the dynstr_index. */
5508 sym = e->isym;
30b30c21 5509
c8e5ddc8 5510 if (e->isym.st_shndx != SHN_UNDEF
58821868
AM
5511 && (e->isym.st_shndx < SHN_LORESERVE
5512 || e->isym.st_shndx > SHN_HIRESERVE))
587ff49e
RH
5513 {
5514 s = bfd_section_from_elf_index (e->input_bfd,
5515 e->isym.st_shndx);
5516
5517 sym.st_shndx =
5518 elf_section_data (s->output_section)->this_idx;
5519 sym.st_value = (s->output_section->vma
5520 + s->output_offset
5521 + e->isym.st_value);
5522 }
30b30c21
RH
5523
5524 if (last_local < e->dynindx)
5525 last_local = e->dynindx;
5526
9ad5cbcf
AM
5527 dest = dynsym + e->dynindx;
5528 elf_swap_symbol_out (abfd, &sym, (PTR) dest, (PTR) 0);
30b30c21
RH
5529 }
5530 }
5531
71a40b32
ILT
5532 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
5533 last_local + 1;
30b30c21 5534 }
252b5132
RH
5535
5536 /* We get the global symbols from the hash table. */
5537 eoinfo.failed = false;
5538 eoinfo.localsyms = false;
5539 eoinfo.finfo = &finfo;
5540 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
5541 (PTR) &eoinfo);
5542 if (eoinfo.failed)
5543 return false;
5544
587ff49e
RH
5545 /* If backend needs to output some symbols not present in the hash
5546 table, do it now. */
5547 if (bed->elf_backend_output_arch_syms)
5548 {
dc810e39
AM
5549 typedef boolean (*out_sym_func) PARAMS ((PTR, const char *,
5550 Elf_Internal_Sym *,
5551 asection *));
5552
5553 if (! ((*bed->elf_backend_output_arch_syms)
5554 (abfd, info, (PTR) &finfo, (out_sym_func) elf_link_output_sym)))
587ff49e 5555 return false;
3e932841 5556 }
587ff49e 5557
252b5132
RH
5558 /* Flush all symbols to the file. */
5559 if (! elf_link_flush_output_syms (&finfo))
5560 return false;
5561
5562 /* Now we know the size of the symtab section. */
5563 off += symtab_hdr->sh_size;
5564
c97e73dd
AM
5565 symtab_shndx_hdr = &elf_tdata (abfd)->symtab_shndx_hdr;
5566 if (symtab_shndx_hdr->sh_name != 0)
5567 {
5568 symtab_shndx_hdr->sh_type = SHT_SYMTAB_SHNDX;
5569 symtab_shndx_hdr->sh_entsize = sizeof (Elf_External_Sym_Shndx);
5570 symtab_shndx_hdr->sh_addralign = sizeof (Elf_External_Sym_Shndx);
5571 amt = bfd_get_symcount (abfd) * sizeof (Elf_External_Sym_Shndx);
5572 symtab_shndx_hdr->sh_size = amt;
5573
5574 off = _bfd_elf_assign_file_position_for_section (symtab_shndx_hdr,
5575 off, true);
5576
5577 if (bfd_seek (abfd, symtab_shndx_hdr->sh_offset, SEEK_SET) != 0
5578 || (bfd_bwrite ((PTR) finfo.symshndxbuf, amt, abfd) != amt))
5579 return false;
5580 }
5581
5582
252b5132
RH
5583 /* Finish up and write out the symbol string table (.strtab)
5584 section. */
5585 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5586 /* sh_name was set in prep_headers. */
5587 symstrtab_hdr->sh_type = SHT_STRTAB;
5588 symstrtab_hdr->sh_flags = 0;
5589 symstrtab_hdr->sh_addr = 0;
5590 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
5591 symstrtab_hdr->sh_entsize = 0;
5592 symstrtab_hdr->sh_link = 0;
5593 symstrtab_hdr->sh_info = 0;
5594 /* sh_offset is set just below. */
5595 symstrtab_hdr->sh_addralign = 1;
5596
5597 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, true);
5598 elf_tdata (abfd)->next_file_pos = off;
5599
5600 if (bfd_get_symcount (abfd) > 0)
5601 {
5602 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
5603 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
5604 return false;
5605 }
5606
5607 /* Adjust the relocs to have the correct symbol indices. */
5608 for (o = abfd->sections; o != NULL; o = o->next)
5609 {
252b5132
RH
5610 if ((o->flags & SEC_RELOC) == 0)
5611 continue;
5612
3e932841 5613 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
31367b81
MM
5614 elf_section_data (o)->rel_count,
5615 elf_section_data (o)->rel_hashes);
5616 if (elf_section_data (o)->rel_hdr2 != NULL)
5617 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
5618 elf_section_data (o)->rel_count2,
3e932841 5619 (elf_section_data (o)->rel_hashes
31367b81 5620 + elf_section_data (o)->rel_count));
252b5132
RH
5621
5622 /* Set the reloc_count field to 0 to prevent write_relocs from
5623 trying to swap the relocs out itself. */
5624 o->reloc_count = 0;
5625 }
5626
db6751f2
JJ
5627 if (dynamic && info->combreloc && dynobj != NULL)
5628 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
5629
252b5132
RH
5630 /* If we are linking against a dynamic object, or generating a
5631 shared library, finish up the dynamic linking information. */
5632 if (dynamic)
5633 {
5634 Elf_External_Dyn *dyncon, *dynconend;
5635
5636 /* Fix up .dynamic entries. */
5637 o = bfd_get_section_by_name (dynobj, ".dynamic");
5638 BFD_ASSERT (o != NULL);
5639
5640 dyncon = (Elf_External_Dyn *) o->contents;
5641 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
5642 for (; dyncon < dynconend; dyncon++)
5643 {
5644 Elf_Internal_Dyn dyn;
5645 const char *name;
5646 unsigned int type;
5647
5648 elf_swap_dyn_in (dynobj, dyncon, &dyn);
5649
5650 switch (dyn.d_tag)
5651 {
5652 default:
5653 break;
db6751f2
JJ
5654 case DT_NULL:
5655 if (relativecount > 0 && dyncon + 1 < dynconend)
5656 {
5657 switch (elf_section_data (reldyn)->this_hdr.sh_type)
5658 {
5659 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
5660 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
5661 default: break;
5662 }
5663 if (dyn.d_tag != DT_NULL)
5664 {
5665 dyn.d_un.d_val = relativecount;
5666 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5667 relativecount = 0;
5668 }
5669 }
5670 break;
252b5132 5671 case DT_INIT:
f0c2e336 5672 name = info->init_function;
252b5132
RH
5673 goto get_sym;
5674 case DT_FINI:
f0c2e336 5675 name = info->fini_function;
252b5132
RH
5676 get_sym:
5677 {
5678 struct elf_link_hash_entry *h;
5679
5680 h = elf_link_hash_lookup (elf_hash_table (info), name,
5681 false, false, true);
5682 if (h != NULL
5683 && (h->root.type == bfd_link_hash_defined
5684 || h->root.type == bfd_link_hash_defweak))
5685 {
5686 dyn.d_un.d_val = h->root.u.def.value;
5687 o = h->root.u.def.section;
5688 if (o->output_section != NULL)
5689 dyn.d_un.d_val += (o->output_section->vma
5690 + o->output_offset);
5691 else
5692 {
5693 /* The symbol is imported from another shared
5694 library and does not apply to this one. */
5695 dyn.d_un.d_val = 0;
5696 }
5697
5698 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5699 }
5700 }
5701 break;
5702
30831527
RH
5703 case DT_PREINIT_ARRAYSZ:
5704 name = ".preinit_array";
5705 goto get_size;
5706 case DT_INIT_ARRAYSZ:
5707 name = ".init_array";
5708 goto get_size;
5709 case DT_FINI_ARRAYSZ:
5710 name = ".fini_array";
5711 get_size:
5712 o = bfd_get_section_by_name (abfd, name);
2cb69dd3
JL
5713 if (o == NULL)
5714 {
5715 (*_bfd_error_handler)
5716 (_("%s: could not find output section %s"),
5717 bfd_get_filename (abfd), name);
5718 goto error_return;
5719 }
25e27870
L
5720 if (o->_raw_size == 0)
5721 (*_bfd_error_handler)
5722 (_("warning: %s section has zero size"), name);
30831527
RH
5723 dyn.d_un.d_val = o->_raw_size;
5724 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5725 break;
5726
5727 case DT_PREINIT_ARRAY:
5728 name = ".preinit_array";
5729 goto get_vma;
5730 case DT_INIT_ARRAY:
5731 name = ".init_array";
5732 goto get_vma;
5733 case DT_FINI_ARRAY:
5734 name = ".fini_array";
5735 goto get_vma;
5736
252b5132
RH
5737 case DT_HASH:
5738 name = ".hash";
5739 goto get_vma;
5740 case DT_STRTAB:
5741 name = ".dynstr";
5742 goto get_vma;
5743 case DT_SYMTAB:
5744 name = ".dynsym";
5745 goto get_vma;
5746 case DT_VERDEF:
5747 name = ".gnu.version_d";
5748 goto get_vma;
5749 case DT_VERNEED:
5750 name = ".gnu.version_r";
5751 goto get_vma;
5752 case DT_VERSYM:
5753 name = ".gnu.version";
5754 get_vma:
5755 o = bfd_get_section_by_name (abfd, name);
2cb69dd3
JL
5756 if (o == NULL)
5757 {
5758 (*_bfd_error_handler)
5759 (_("%s: could not find output section %s"),
5760 bfd_get_filename (abfd), name);
5761 goto error_return;
5762 }
252b5132
RH
5763 dyn.d_un.d_ptr = o->vma;
5764 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5765 break;
5766
5767 case DT_REL:
5768 case DT_RELA:
5769 case DT_RELSZ:
5770 case DT_RELASZ:
5771 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5772 type = SHT_REL;
5773 else
5774 type = SHT_RELA;
5775 dyn.d_un.d_val = 0;
9ad5cbcf 5776 for (i = 1; i < elf_numsections (abfd); i++)
252b5132
RH
5777 {
5778 Elf_Internal_Shdr *hdr;
5779
5780 hdr = elf_elfsections (abfd)[i];
5781 if (hdr->sh_type == type
5782 && (hdr->sh_flags & SHF_ALLOC) != 0)
5783 {
5784 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
5785 dyn.d_un.d_val += hdr->sh_size;
5786 else
5787 {
5788 if (dyn.d_un.d_val == 0
5789 || hdr->sh_addr < dyn.d_un.d_val)
5790 dyn.d_un.d_val = hdr->sh_addr;
5791 }
5792 }
5793 }
5794 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5795 break;
5796 }
5797 }
5798 }
5799
5800 /* If we have created any dynamic sections, then output them. */
5801 if (dynobj != NULL)
5802 {
5803 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
5804 goto error_return;
5805
5806 for (o = dynobj->sections; o != NULL; o = o->next)
5807 {
5808 if ((o->flags & SEC_HAS_CONTENTS) == 0
fc8c40a0
AM
5809 || o->_raw_size == 0
5810 || o->output_section == bfd_abs_section_ptr)
252b5132
RH
5811 continue;
5812 if ((o->flags & SEC_LINKER_CREATED) == 0)
5813 {
5814 /* At this point, we are only interested in sections
c44233aa 5815 created by elf_link_create_dynamic_sections. */
252b5132
RH
5816 continue;
5817 }
5818 if ((elf_section_data (o->output_section)->this_hdr.sh_type
5819 != SHT_STRTAB)
5820 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
5821 {
5822 if (! bfd_set_section_contents (abfd, o->output_section,
dc810e39
AM
5823 o->contents,
5824 (file_ptr) o->output_offset,
252b5132
RH
5825 o->_raw_size))
5826 goto error_return;
5827 }
5828 else
5829 {
252b5132 5830 /* The contents of the .dynstr section are actually in a
c44233aa 5831 stringtab. */
252b5132
RH
5832 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
5833 if (bfd_seek (abfd, off, SEEK_SET) != 0
2b0f7ef9
JJ
5834 || ! _bfd_elf_strtab_emit (abfd,
5835 elf_hash_table (info)->dynstr))
252b5132
RH
5836 goto error_return;
5837 }
5838 }
5839 }
5840
1126897b
AM
5841 if (info->relocateable)
5842 {
5843 boolean failed = false;
5844
5845 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
5846 if (failed)
5847 goto error_return;
5848 }
5849
252b5132
RH
5850 /* If we have optimized stabs strings, output them. */
5851 if (elf_hash_table (info)->stab_info != NULL)
5852 {
5853 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
5854 goto error_return;
5855 }
5856
57a72197 5857 if (info->eh_frame_hdr && elf_hash_table (info)->dynobj)
65765700
JJ
5858 {
5859 o = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
5860 ".eh_frame_hdr");
5861 if (o
5862 && (elf_section_data (o)->sec_info_type
5863 == ELF_INFO_TYPE_EH_FRAME_HDR))
5864 {
5865 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, o))
5866 goto error_return;
5867 }
5868 }
5869
252b5132
RH
5870 if (finfo.symstrtab != NULL)
5871 _bfd_stringtab_free (finfo.symstrtab);
5872 if (finfo.contents != NULL)
5873 free (finfo.contents);
5874 if (finfo.external_relocs != NULL)
5875 free (finfo.external_relocs);
5876 if (finfo.internal_relocs != NULL)
5877 free (finfo.internal_relocs);
5878 if (finfo.external_syms != NULL)
5879 free (finfo.external_syms);
9ad5cbcf
AM
5880 if (finfo.locsym_shndx != NULL)
5881 free (finfo.locsym_shndx);
252b5132
RH
5882 if (finfo.internal_syms != NULL)
5883 free (finfo.internal_syms);
5884 if (finfo.indices != NULL)
5885 free (finfo.indices);
5886 if (finfo.sections != NULL)
5887 free (finfo.sections);
5888 if (finfo.symbuf != NULL)
5889 free (finfo.symbuf);
9ad5cbcf 5890 if (finfo.symshndxbuf != NULL)
c97e73dd 5891 free (finfo.symshndxbuf);
252b5132
RH
5892 for (o = abfd->sections; o != NULL; o = o->next)
5893 {
5894 if ((o->flags & SEC_RELOC) != 0
5895 && elf_section_data (o)->rel_hashes != NULL)
c44233aa 5896 free (elf_section_data (o)->rel_hashes);
252b5132
RH
5897 }
5898
5899 elf_tdata (abfd)->linker = true;
5900
5901 return true;
5902
5903 error_return:
5904 if (finfo.symstrtab != NULL)
5905 _bfd_stringtab_free (finfo.symstrtab);
5906 if (finfo.contents != NULL)
5907 free (finfo.contents);
5908 if (finfo.external_relocs != NULL)
5909 free (finfo.external_relocs);
5910 if (finfo.internal_relocs != NULL)
5911 free (finfo.internal_relocs);
5912 if (finfo.external_syms != NULL)
5913 free (finfo.external_syms);
9ad5cbcf
AM
5914 if (finfo.locsym_shndx != NULL)
5915 free (finfo.locsym_shndx);
252b5132
RH
5916 if (finfo.internal_syms != NULL)
5917 free (finfo.internal_syms);
5918 if (finfo.indices != NULL)
5919 free (finfo.indices);
5920 if (finfo.sections != NULL)
5921 free (finfo.sections);
5922 if (finfo.symbuf != NULL)
5923 free (finfo.symbuf);
9ad5cbcf 5924 if (finfo.symshndxbuf != NULL)
c97e73dd 5925 free (finfo.symshndxbuf);
252b5132
RH
5926 for (o = abfd->sections; o != NULL; o = o->next)
5927 {
5928 if ((o->flags & SEC_RELOC) != 0
5929 && elf_section_data (o)->rel_hashes != NULL)
5930 free (elf_section_data (o)->rel_hashes);
5931 }
5932
5933 return false;
5934}
5935
5936/* Add a symbol to the output symbol table. */
5937
5938static boolean
5939elf_link_output_sym (finfo, name, elfsym, input_sec)
5940 struct elf_final_link_info *finfo;
5941 const char *name;
5942 Elf_Internal_Sym *elfsym;
5943 asection *input_sec;
5944{
9ad5cbcf
AM
5945 Elf_External_Sym *dest;
5946 Elf_External_Sym_Shndx *destshndx;
c44233aa 5947
252b5132
RH
5948 boolean (*output_symbol_hook) PARAMS ((bfd *,
5949 struct bfd_link_info *info,
5950 const char *,
5951 Elf_Internal_Sym *,
5952 asection *));
5953
5954 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
5955 elf_backend_link_output_symbol_hook;
5956 if (output_symbol_hook != NULL)
5957 {
5958 if (! ((*output_symbol_hook)
5959 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
5960 return false;
5961 }
5962
5963 if (name == (const char *) NULL || *name == '\0')
5964 elfsym->st_name = 0;
5965 else if (input_sec->flags & SEC_EXCLUDE)
5966 elfsym->st_name = 0;
5967 else
5968 {
5969 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
a7b97311 5970 name, true, false);
252b5132
RH
5971 if (elfsym->st_name == (unsigned long) -1)
5972 return false;
5973 }
5974
5975 if (finfo->symbuf_count >= finfo->symbuf_size)
5976 {
5977 if (! elf_link_flush_output_syms (finfo))
5978 return false;
5979 }
5980
9ad5cbcf
AM
5981 dest = finfo->symbuf + finfo->symbuf_count;
5982 destshndx = finfo->symshndxbuf;
5983 if (destshndx != NULL)
c97e73dd
AM
5984 {
5985 if (bfd_get_symcount (finfo->output_bfd) >= finfo->shndxbuf_size)
5986 {
5987 bfd_size_type amt;
252b5132 5988
c97e73dd
AM
5989 amt = finfo->shndxbuf_size * sizeof (Elf_External_Sym_Shndx);
5990 finfo->symshndxbuf = destshndx = bfd_realloc (destshndx, amt * 2);
5991 if (destshndx == NULL)
5992 return false;
5993 memset ((char *) destshndx + amt, 0, amt);
5994 finfo->shndxbuf_size *= 2;
5995 }
5996 destshndx += bfd_get_symcount (finfo->output_bfd);
5997 }
5998
5999 elf_swap_symbol_out (finfo->output_bfd, elfsym, (PTR) dest, (PTR) destshndx);
6000 finfo->symbuf_count += 1;
6001 bfd_get_symcount (finfo->output_bfd) += 1;
252b5132
RH
6002
6003 return true;
6004}
6005
6006/* Flush the output symbols to the file. */
6007
6008static boolean
6009elf_link_flush_output_syms (finfo)
6010 struct elf_final_link_info *finfo;
6011{
6012 if (finfo->symbuf_count > 0)
6013 {
9ad5cbcf 6014 Elf_Internal_Shdr *hdr;
dc810e39
AM
6015 file_ptr pos;
6016 bfd_size_type amt;
252b5132 6017
9ad5cbcf
AM
6018 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
6019 pos = hdr->sh_offset + hdr->sh_size;
dc810e39
AM
6020 amt = finfo->symbuf_count * sizeof (Elf_External_Sym);
6021 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
6022 || bfd_bwrite ((PTR) finfo->symbuf, amt, finfo->output_bfd) != amt)
252b5132
RH
6023 return false;
6024
9ad5cbcf 6025 hdr->sh_size += amt;
252b5132
RH
6026 finfo->symbuf_count = 0;
6027 }
6028
6029 return true;
6030}
6031
f5fa8ca2
JJ
6032/* Adjust all external symbols pointing into SEC_MERGE sections
6033 to reflect the object merging within the sections. */
6034
6035static boolean
6036elf_link_sec_merge_syms (h, data)
6037 struct elf_link_hash_entry *h;
6038 PTR data;
6039{
6040 asection *sec;
6041
e92d460e
AM
6042 if (h->root.type == bfd_link_hash_warning)
6043 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6044
f5fa8ca2
JJ
6045 if ((h->root.type == bfd_link_hash_defined
6046 || h->root.type == bfd_link_hash_defweak)
6047 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
65765700 6048 && elf_section_data (sec)->sec_info_type == ELF_INFO_TYPE_MERGE)
f5fa8ca2
JJ
6049 {
6050 bfd *output_bfd = (bfd *) data;
6051
6052 h->root.u.def.value =
6053 _bfd_merged_section_offset (output_bfd,
6054 &h->root.u.def.section,
65765700 6055 elf_section_data (sec)->sec_info,
f5fa8ca2
JJ
6056 h->root.u.def.value, (bfd_vma) 0);
6057 }
6058
6059 return true;
6060}
6061
f5d44ba0
AM
6062/* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
6063 allowing an unsatisfied unversioned symbol in the DSO to match a
6064 versioned symbol that would normally require an explicit version. */
6065
6066static boolean
6067elf_link_check_versioned_symbol (info, h)
6068 struct bfd_link_info *info;
6069 struct elf_link_hash_entry *h;
6070{
6071 bfd *undef_bfd = h->root.u.undef.abfd;
6072 struct elf_link_loaded_list *loaded;
f5d44ba0
AM
6073
6074 if ((undef_bfd->flags & DYNAMIC) == 0
6075 || info->hash->creator->flavour != bfd_target_elf_flavour
6076 || elf_dt_soname (h->root.u.undef.abfd) == NULL)
6077 return false;
6078
6079 for (loaded = elf_hash_table (info)->loaded;
6080 loaded != NULL;
6081 loaded = loaded->next)
6082 {
6083 bfd *input;
6084 Elf_Internal_Shdr *hdr;
6085 bfd_size_type symcount;
6086 bfd_size_type extsymcount;
6087 bfd_size_type extsymoff;
6088 Elf_Internal_Shdr *versymhdr;
6cdc0ccc
AM
6089 Elf_Internal_Sym *isym;
6090 Elf_Internal_Sym *isymend;
6091 Elf_Internal_Sym *isymbuf;
f5d44ba0 6092 Elf_External_Versym *ever;
6cdc0ccc 6093 Elf_External_Versym *extversym;
f5d44ba0
AM
6094
6095 input = loaded->abfd;
6096
6097 /* We check each DSO for a possible hidden versioned definition. */
6098 if (input == undef_bfd
6099 || (input->flags & DYNAMIC) == 0
6100 || elf_dynversym (input) == 0)
6101 continue;
6102
6103 hdr = &elf_tdata (input)->dynsymtab_hdr;
6104
6105 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
6106 if (elf_bad_symtab (input))
6107 {
6108 extsymcount = symcount;
6109 extsymoff = 0;
6110 }
6111 else
6112 {
6113 extsymcount = symcount - hdr->sh_info;
6114 extsymoff = hdr->sh_info;
6115 }
6116
6117 if (extsymcount == 0)
6118 continue;
6119
6cdc0ccc
AM
6120 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
6121 NULL, NULL, NULL);
6122 if (isymbuf == NULL)
f5d44ba0
AM
6123 return false;
6124
f5d44ba0
AM
6125 /* Read in any version definitions. */
6126 versymhdr = &elf_tdata (input)->dynversym_hdr;
6127 extversym = (Elf_External_Versym *) bfd_malloc (versymhdr->sh_size);
6128 if (extversym == NULL)
6129 goto error_ret;
6130
6131 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
6132 || (bfd_bread ((PTR) extversym, versymhdr->sh_size, input)
6133 != versymhdr->sh_size))
6134 {
6135 free (extversym);
6136 error_ret:
6cdc0ccc 6137 free (isymbuf);
f5d44ba0
AM
6138 return false;
6139 }
6140
6141 ever = extversym + extsymoff;
6cdc0ccc
AM
6142 isymend = isymbuf + extsymcount;
6143 for (isym = isymbuf; isym < isymend; isym++, ever++)
f5d44ba0
AM
6144 {
6145 const char *name;
f5d44ba0
AM
6146 Elf_Internal_Versym iver;
6147
6cdc0ccc
AM
6148 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
6149 || isym->st_shndx == SHN_UNDEF)
f5d44ba0
AM
6150 continue;
6151
6152 name = bfd_elf_string_from_elf_section (input,
6153 hdr->sh_link,
6cdc0ccc 6154 isym->st_name);
f5d44ba0
AM
6155 if (strcmp (name, h->root.root.string) != 0)
6156 continue;
6157
6158 _bfd_elf_swap_versym_in (input, ever, &iver);
6159
6160 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
6161 {
6162 /* If we have a non-hidden versioned sym, then it should
6163 have provided a definition for the undefined sym. */
6164 abort ();
6165 }
6166
6167 if ((iver.vs_vers & VERSYM_VERSION) == 2)
6168 {
6169 /* This is the oldest (default) sym. We can use it. */
6170 free (extversym);
6cdc0ccc 6171 free (isymbuf);
f5d44ba0
AM
6172 return true;
6173 }
6174 }
6175
6176 free (extversym);
6cdc0ccc 6177 free (isymbuf);
f5d44ba0
AM
6178 }
6179
6180 return false;
6181}
6182
252b5132
RH
6183/* Add an external symbol to the symbol table. This is called from
6184 the hash table traversal routine. When generating a shared object,
6185 we go through the symbol table twice. The first time we output
6186 anything that might have been forced to local scope in a version
6187 script. The second time we output the symbols that are still
6188 global symbols. */
6189
6190static boolean
6191elf_link_output_extsym (h, data)
6192 struct elf_link_hash_entry *h;
6193 PTR data;
6194{
6195 struct elf_outext_info *eoinfo = (struct elf_outext_info *) data;
6196 struct elf_final_link_info *finfo = eoinfo->finfo;
6197 boolean strip;
6198 Elf_Internal_Sym sym;
6199 asection *input_sec;
6200
e92d460e
AM
6201 if (h->root.type == bfd_link_hash_warning)
6202 {
6203 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6204 if (h->root.type == bfd_link_hash_new)
6205 return true;
6206 }
6207
252b5132
RH
6208 /* Decide whether to output this symbol in this pass. */
6209 if (eoinfo->localsyms)
6210 {
6211 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6212 return true;
6213 }
6214 else
6215 {
6216 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6217 return true;
6218 }
6219
6220 /* If we are not creating a shared library, and this symbol is
6221 referenced by a shared library but is not defined anywhere, then
6222 warn that it is undefined. If we do not do this, the runtime
6223 linker will complain that the symbol is undefined when the
6224 program is run. We don't have to worry about symbols that are
6225 referenced by regular files, because we will already have issued
6226 warnings for them. */
6227 if (! finfo->info->relocateable
b79e8c78 6228 && ! finfo->info->allow_shlib_undefined
e45bf863 6229 && ! finfo->info->shared
252b5132
RH
6230 && h->root.type == bfd_link_hash_undefined
6231 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
f5d44ba0
AM
6232 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
6233 && ! elf_link_check_versioned_symbol (finfo->info, h))
252b5132
RH
6234 {
6235 if (! ((*finfo->info->callbacks->undefined_symbol)
6236 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
dc810e39 6237 (asection *) NULL, (bfd_vma) 0, true)))
252b5132
RH
6238 {
6239 eoinfo->failed = true;
6240 return false;
6241 }
6242 }
6243
6244 /* We don't want to output symbols that have never been mentioned by
6245 a regular file, or that we have been told to strip. However, if
6246 h->indx is set to -2, the symbol is used by a reloc and we must
6247 output it. */
6248 if (h->indx == -2)
6249 strip = false;
6250 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
6251 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
6252 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
6253 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
6254 strip = true;
6255 else if (finfo->info->strip == strip_all
6256 || (finfo->info->strip == strip_some
6257 && bfd_hash_lookup (finfo->info->keep_hash,
6258 h->root.root.string,
6259 false, false) == NULL))
6260 strip = true;
6261 else
6262 strip = false;
6263
6264 /* If we're stripping it, and it's not a dynamic symbol, there's
2bd171e0
ILT
6265 nothing else to do unless it is a forced local symbol. */
6266 if (strip
6267 && h->dynindx == -1
6268 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
252b5132
RH
6269 return true;
6270
6271 sym.st_value = 0;
6272 sym.st_size = h->size;
6273 sym.st_other = h->other;
6274 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6275 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
6276 else if (h->root.type == bfd_link_hash_undefweak
6277 || h->root.type == bfd_link_hash_defweak)
6278 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
6279 else
6280 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
6281
6282 switch (h->root.type)
6283 {
6284 default:
6285 case bfd_link_hash_new:
e92d460e 6286 case bfd_link_hash_warning:
252b5132
RH
6287 abort ();
6288 return false;
6289
6290 case bfd_link_hash_undefined:
252b5132
RH
6291 case bfd_link_hash_undefweak:
6292 input_sec = bfd_und_section_ptr;
6293 sym.st_shndx = SHN_UNDEF;
6294 break;
6295
6296 case bfd_link_hash_defined:
6297 case bfd_link_hash_defweak:
6298 {
6299 input_sec = h->root.u.def.section;
6300 if (input_sec->output_section != NULL)
6301 {
6302 sym.st_shndx =
6303 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
6304 input_sec->output_section);
9ad5cbcf 6305 if (sym.st_shndx == SHN_BAD)
252b5132
RH
6306 {
6307 (*_bfd_error_handler)
6308 (_("%s: could not find output section %s for input section %s"),
6309 bfd_get_filename (finfo->output_bfd),
6310 input_sec->output_section->name,
6311 input_sec->name);
6312 eoinfo->failed = true;
6313 return false;
6314 }
6315
6316 /* ELF symbols in relocateable files are section relative,
6317 but in nonrelocateable files they are virtual
6318 addresses. */
6319 sym.st_value = h->root.u.def.value + input_sec->output_offset;
6320 if (! finfo->info->relocateable)
13ae64f3
JJ
6321 {
6322 sym.st_value += input_sec->output_section->vma;
6323 if (h->type == STT_TLS)
6324 {
6325 /* STT_TLS symbols are relative to PT_TLS segment
6326 base. */
6327 BFD_ASSERT (finfo->first_tls_sec != NULL);
6328 sym.st_value -= finfo->first_tls_sec->vma;
6329 }
6330 }
252b5132
RH
6331 }
6332 else
6333 {
6334 BFD_ASSERT (input_sec->owner == NULL
6335 || (input_sec->owner->flags & DYNAMIC) != 0);
6336 sym.st_shndx = SHN_UNDEF;
6337 input_sec = bfd_und_section_ptr;
6338 }
6339 }
6340 break;
6341
6342 case bfd_link_hash_common:
6343 input_sec = h->root.u.c.p->section;
6344 sym.st_shndx = SHN_COMMON;
6345 sym.st_value = 1 << h->root.u.c.p->alignment_power;
6346 break;
6347
6348 case bfd_link_hash_indirect:
6349 /* These symbols are created by symbol versioning. They point
c44233aa
AM
6350 to the decorated version of the name. For example, if the
6351 symbol foo@@GNU_1.2 is the default, which should be used when
6352 foo is used with no version, then we add an indirect symbol
6353 foo which points to foo@@GNU_1.2. We ignore these symbols,
6354 since the indirected symbol is already in the hash table. */
94b6c40a 6355 return true;
252b5132
RH
6356 }
6357
6358 /* Give the processor backend a chance to tweak the symbol value,
6359 and also to finish up anything that needs to be done for this
c44233aa
AM
6360 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
6361 forced local syms when non-shared is due to a historical quirk. */
252b5132
RH
6362 if ((h->dynindx != -1
6363 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
c44233aa
AM
6364 && (finfo->info->shared
6365 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
252b5132
RH
6366 && elf_hash_table (finfo->info)->dynamic_sections_created)
6367 {
6368 struct elf_backend_data *bed;
6369
6370 bed = get_elf_backend_data (finfo->output_bfd);
6371 if (! ((*bed->elf_backend_finish_dynamic_symbol)
6372 (finfo->output_bfd, finfo->info, h, &sym)))
6373 {
6374 eoinfo->failed = true;
6375 return false;
6376 }
6377 }
6378
6379 /* If we are marking the symbol as undefined, and there are no
6380 non-weak references to this symbol from a regular object, then
91d3970e
ILT
6381 mark the symbol as weak undefined; if there are non-weak
6382 references, mark the symbol as strong. We can't do this earlier,
252b5132
RH
6383 because it might not be marked as undefined until the
6384 finish_dynamic_symbol routine gets through with it. */
6385 if (sym.st_shndx == SHN_UNDEF
252b5132 6386 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
a7b97311
AM
6387 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
6388 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
91d3970e
ILT
6389 {
6390 int bindtype;
6391
6392 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK) != 0)
6393 bindtype = STB_GLOBAL;
6394 else
6395 bindtype = STB_WEAK;
6396 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
6397 }
252b5132 6398
32c092c3 6399 /* If a symbol is not defined locally, we clear the visibility
3e932841 6400 field. */
2cd533b7
L
6401 if (! finfo->info->relocateable
6402 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
a7b97311 6403 sym.st_other ^= ELF_ST_VISIBILITY (sym.st_other);
32c092c3 6404
252b5132 6405 /* If this symbol should be put in the .dynsym section, then put it
f5d44ba0
AM
6406 there now. We already know the symbol index. We also fill in
6407 the entry in the .hash section. */
252b5132
RH
6408 if (h->dynindx != -1
6409 && elf_hash_table (finfo->info)->dynamic_sections_created)
6410 {
6411 size_t bucketcount;
6412 size_t bucket;
c7ac6ff8 6413 size_t hash_entry_size;
252b5132
RH
6414 bfd_byte *bucketpos;
6415 bfd_vma chain;
dc810e39 6416 Elf_External_Sym *esym;
252b5132
RH
6417
6418 sym.st_name = h->dynstr_index;
dc810e39 6419 esym = (Elf_External_Sym *) finfo->dynsym_sec->contents + h->dynindx;
9ad5cbcf 6420 elf_swap_symbol_out (finfo->output_bfd, &sym, (PTR) esym, (PTR) 0);
252b5132
RH
6421
6422 bucketcount = elf_hash_table (finfo->info)->bucketcount;
6423 bucket = h->elf_hash_value % bucketcount;
3e932841 6424 hash_entry_size
c7ac6ff8 6425 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
252b5132 6426 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
c7ac6ff8
MM
6427 + (bucket + 2) * hash_entry_size);
6428 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
dc810e39
AM
6429 bfd_put (8 * hash_entry_size, finfo->output_bfd, (bfd_vma) h->dynindx,
6430 bucketpos);
c7ac6ff8
MM
6431 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
6432 ((bfd_byte *) finfo->hash_sec->contents
6433 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
252b5132
RH
6434
6435 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
6436 {
6437 Elf_Internal_Versym iversym;
dc810e39 6438 Elf_External_Versym *eversym;
252b5132
RH
6439
6440 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
6441 {
6442 if (h->verinfo.verdef == NULL)
6443 iversym.vs_vers = 0;
6444 else
6445 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
6446 }
6447 else
6448 {
6449 if (h->verinfo.vertree == NULL)
6450 iversym.vs_vers = 1;
6451 else
6452 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
6453 }
6454
6455 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
6456 iversym.vs_vers |= VERSYM_HIDDEN;
6457
dc810e39
AM
6458 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
6459 eversym += h->dynindx;
6460 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
252b5132
RH
6461 }
6462 }
6463
6464 /* If we're stripping it, then it was just a dynamic symbol, and
6465 there's nothing else to do. */
7330fb86 6466 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
252b5132
RH
6467 return true;
6468
6469 h->indx = bfd_get_symcount (finfo->output_bfd);
6470
6471 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
6472 {
6473 eoinfo->failed = true;
6474 return false;
6475 }
6476
6477 return true;
6478}
6479
23bc299b
MM
6480/* Copy the relocations indicated by the INTERNAL_RELOCS (which
6481 originated from the section given by INPUT_REL_HDR) to the
6482 OUTPUT_BFD. */
6483
41241523 6484static boolean
3e932841 6485elf_link_output_relocs (output_bfd, input_section, input_rel_hdr,
23bc299b
MM
6486 internal_relocs)
6487 bfd *output_bfd;
6488 asection *input_section;
6489 Elf_Internal_Shdr *input_rel_hdr;
6490 Elf_Internal_Rela *internal_relocs;
6491{
6492 Elf_Internal_Rela *irela;
6493 Elf_Internal_Rela *irelaend;
6494 Elf_Internal_Shdr *output_rel_hdr;
6495 asection *output_section;
7442e600 6496 unsigned int *rel_countp = NULL;
32f0787a 6497 struct elf_backend_data *bed;
dc810e39 6498 bfd_size_type amt;
23bc299b
MM
6499
6500 output_section = input_section->output_section;
6501 output_rel_hdr = NULL;
6502
3e932841 6503 if (elf_section_data (output_section)->rel_hdr.sh_entsize
23bc299b
MM
6504 == input_rel_hdr->sh_entsize)
6505 {
6506 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
6507 rel_countp = &elf_section_data (output_section)->rel_count;
6508 }
6509 else if (elf_section_data (output_section)->rel_hdr2
6510 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
6511 == input_rel_hdr->sh_entsize))
6512 {
6513 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
6514 rel_countp = &elf_section_data (output_section)->rel_count2;
6515 }
41241523
TS
6516 else
6517 {
58821868
AM
6518 (*_bfd_error_handler)
6519 (_("%s: relocation size mismatch in %s section %s"),
6520 bfd_get_filename (output_bfd),
6521 bfd_archive_filename (input_section->owner),
6522 input_section->name);
41241523
TS
6523 bfd_set_error (bfd_error_wrong_object_format);
6524 return false;
6525 }
32f0787a
UC
6526
6527 bed = get_elf_backend_data (output_bfd);
23bc299b 6528 irela = internal_relocs;
58821868
AM
6529 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
6530 * bed->s->int_rels_per_ext_rel);
209f668e 6531
23bc299b
MM
6532 if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
6533 {
6534 Elf_External_Rel *erel;
209f668e 6535 Elf_Internal_Rel *irel;
dc810e39
AM
6536
6537 amt = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rel);
6538 irel = (Elf_Internal_Rel *) bfd_zmalloc (amt);
209f668e
NC
6539 if (irel == NULL)
6540 {
6541 (*_bfd_error_handler) (_("Error: out of memory"));
6542 abort ();
6543 }
23bc299b
MM
6544
6545 erel = ((Elf_External_Rel *) output_rel_hdr->contents + *rel_countp);
209f668e 6546 for (; irela < irelaend; irela += bed->s->int_rels_per_ext_rel, erel++)
23bc299b 6547 {
4e8a9624 6548 unsigned int i;
dc810e39 6549
209f668e
NC
6550 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
6551 {
6552 irel[i].r_offset = irela[i].r_offset;
6553 irel[i].r_info = irela[i].r_info;
6554 BFD_ASSERT (irela[i].r_addend == 0);
6555 }
23bc299b 6556
32f0787a 6557 if (bed->s->swap_reloc_out)
209f668e 6558 (*bed->s->swap_reloc_out) (output_bfd, irel, (PTR) erel);
32f0787a 6559 else
209f668e 6560 elf_swap_reloc_out (output_bfd, irel, erel);
23bc299b 6561 }
209f668e
NC
6562
6563 free (irel);
23bc299b
MM
6564 }
6565 else
6566 {
6567 Elf_External_Rela *erela;
6568
209f668e
NC
6569 BFD_ASSERT (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rela));
6570
23bc299b 6571 erela = ((Elf_External_Rela *) output_rel_hdr->contents + *rel_countp);
209f668e 6572 for (; irela < irelaend; irela += bed->s->int_rels_per_ext_rel, erela++)
32f0787a
UC
6573 if (bed->s->swap_reloca_out)
6574 (*bed->s->swap_reloca_out) (output_bfd, irela, (PTR) erela);
6575 else
6576 elf_swap_reloca_out (output_bfd, irela, erela);
23bc299b
MM
6577 }
6578
6579 /* Bump the counter, so that we know where to add the next set of
6580 relocations. */
d9bc7a44 6581 *rel_countp += NUM_SHDR_ENTRIES (input_rel_hdr);
41241523
TS
6582
6583 return true;
23bc299b
MM
6584}
6585
252b5132
RH
6586/* Link an input file into the linker output file. This function
6587 handles all the sections and relocations of the input file at once.
6588 This is so that we only have to read the local symbols once, and
6589 don't have to keep them in memory. */
6590
6591static boolean
6592elf_link_input_bfd (finfo, input_bfd)
6593 struct elf_final_link_info *finfo;
6594 bfd *input_bfd;
6595{
6596 boolean (*relocate_section) PARAMS ((bfd *, struct bfd_link_info *,
6597 bfd *, asection *, bfd_byte *,
6598 Elf_Internal_Rela *,
6599 Elf_Internal_Sym *, asection **));
6600 bfd *output_bfd;
6601 Elf_Internal_Shdr *symtab_hdr;
6602 size_t locsymcount;
6603 size_t extsymoff;
6cdc0ccc 6604 Elf_Internal_Sym *isymbuf;
252b5132 6605 Elf_Internal_Sym *isym;
6cdc0ccc 6606 Elf_Internal_Sym *isymend;
252b5132
RH
6607 long *pindex;
6608 asection **ppsection;
6609 asection *o;
c7ac6ff8 6610 struct elf_backend_data *bed;
9317eacc 6611 boolean emit_relocs;
f8deed93 6612 struct elf_link_hash_entry **sym_hashes;
252b5132
RH
6613
6614 output_bfd = finfo->output_bfd;
c7ac6ff8
MM
6615 bed = get_elf_backend_data (output_bfd);
6616 relocate_section = bed->elf_backend_relocate_section;
252b5132
RH
6617
6618 /* If this is a dynamic object, we don't want to do anything here:
6619 we don't want the local symbols, and we don't want the section
6620 contents. */
6621 if ((input_bfd->flags & DYNAMIC) != 0)
6622 return true;
6623
9317eacc 6624 emit_relocs = (finfo->info->relocateable
c44233aa
AM
6625 || finfo->info->emitrelocations
6626 || bed->elf_backend_emit_relocs);
9317eacc 6627
252b5132
RH
6628 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6629 if (elf_bad_symtab (input_bfd))
6630 {
6631 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
6632 extsymoff = 0;
6633 }
6634 else
6635 {
6636 locsymcount = symtab_hdr->sh_info;
6637 extsymoff = symtab_hdr->sh_info;
6638 }
6639
6640 /* Read the local symbols. */
6cdc0ccc
AM
6641 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6642 if (isymbuf == NULL && locsymcount != 0)
6643 {
6644 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6645 finfo->internal_syms,
6646 finfo->external_syms,
6647 finfo->locsym_shndx);
6648 if (isymbuf == NULL)
252b5132
RH
6649 return false;
6650 }
6651
6cdc0ccc
AM
6652 /* Find local symbol sections and adjust values of symbols in
6653 SEC_MERGE sections. Write out those local symbols we know are
6654 going into the output file. */
6655 isymend = isymbuf + locsymcount;
6656 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
6657 isym < isymend;
6658 isym++, pindex++, ppsection++)
252b5132
RH
6659 {
6660 asection *isec;
6661 const char *name;
6662 Elf_Internal_Sym osym;
6663
252b5132
RH
6664 *pindex = -1;
6665
6666 if (elf_bad_symtab (input_bfd))
6667 {
6668 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
6669 {
6670 *ppsection = NULL;
6671 continue;
6672 }
6673 }
6674
6675 if (isym->st_shndx == SHN_UNDEF)
862517b6 6676 isec = bfd_und_section_ptr;
9ad5cbcf
AM
6677 else if (isym->st_shndx < SHN_LORESERVE
6678 || isym->st_shndx > SHN_HIRESERVE)
f5fa8ca2
JJ
6679 {
6680 isec = section_from_elf_index (input_bfd, isym->st_shndx);
65765700
JJ
6681 if (isec
6682 && elf_section_data (isec)->sec_info_type == ELF_INFO_TYPE_MERGE
f5fa8ca2
JJ
6683 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
6684 isym->st_value =
6685 _bfd_merged_section_offset (output_bfd, &isec,
65765700 6686 elf_section_data (isec)->sec_info,
f5fa8ca2
JJ
6687 isym->st_value, (bfd_vma) 0);
6688 }
252b5132 6689 else if (isym->st_shndx == SHN_ABS)
862517b6 6690 isec = bfd_abs_section_ptr;
252b5132 6691 else if (isym->st_shndx == SHN_COMMON)
862517b6 6692 isec = bfd_com_section_ptr;
252b5132
RH
6693 else
6694 {
6695 /* Who knows? */
6696 isec = NULL;
6697 }
6698
6699 *ppsection = isec;
6700
6701 /* Don't output the first, undefined, symbol. */
6cdc0ccc 6702 if (ppsection == finfo->sections)
252b5132
RH
6703 continue;
6704
24376d1b
AM
6705 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
6706 {
24376d1b
AM
6707 /* We never output section symbols. Instead, we use the
6708 section symbol of the corresponding section in the output
6709 file. */
6710 continue;
6711 }
6712
252b5132
RH
6713 /* If we are stripping all symbols, we don't want to output this
6714 one. */
6715 if (finfo->info->strip == strip_all)
6716 continue;
6717
252b5132
RH
6718 /* If we are discarding all local symbols, we don't want to
6719 output this one. If we are generating a relocateable output
6720 file, then some of the local symbols may be required by
6721 relocs; we output them below as we discover that they are
6722 needed. */
6723 if (finfo->info->discard == discard_all)
6724 continue;
6725
6726 /* If this symbol is defined in a section which we are
c44233aa
AM
6727 discarding, we don't need to keep it, but note that
6728 linker_mark is only reliable for sections that have contents.
6729 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
6730 as well as linker_mark. */
9ad5cbcf 6731 if ((isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
252b5132
RH
6732 && isec != NULL
6733 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
6734 || (! finfo->info->relocateable
6735 && (isec->flags & SEC_EXCLUDE) != 0)))
6736 continue;
6737
6738 /* Get the name of the symbol. */
6739 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
6740 isym->st_name);
6741 if (name == NULL)
6742 return false;
6743
6744 /* See if we are discarding symbols with this name. */
6745 if ((finfo->info->strip == strip_some
6746 && (bfd_hash_lookup (finfo->info->keep_hash, name, false, false)
6747 == NULL))
f5fa8ca2
JJ
6748 || (((finfo->info->discard == discard_sec_merge
6749 && (isec->flags & SEC_MERGE) && ! finfo->info->relocateable)
6750 || finfo->info->discard == discard_l)
252b5132
RH
6751 && bfd_is_local_label_name (input_bfd, name)))
6752 continue;
6753
6754 /* If we get here, we are going to output this symbol. */
6755
6756 osym = *isym;
6757
6758 /* Adjust the section index for the output file. */
6759 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
6760 isec->output_section);
9ad5cbcf 6761 if (osym.st_shndx == SHN_BAD)
252b5132
RH
6762 return false;
6763
6764 *pindex = bfd_get_symcount (output_bfd);
6765
6766 /* ELF symbols in relocateable files are section relative, but
6767 in executable files they are virtual addresses. Note that
6768 this code assumes that all ELF sections have an associated
6769 BFD section with a reasonable value for output_offset; below
6770 we assume that they also have a reasonable value for
6771 output_section. Any special sections must be set up to meet
6772 these requirements. */
6773 osym.st_value += isec->output_offset;
6774 if (! finfo->info->relocateable)
13ae64f3
JJ
6775 {
6776 osym.st_value += isec->output_section->vma;
6777 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
6778 {
6779 /* STT_TLS symbols are relative to PT_TLS segment base. */
6780 BFD_ASSERT (finfo->first_tls_sec != NULL);
6781 osym.st_value -= finfo->first_tls_sec->vma;
6782 }
6783 }
252b5132
RH
6784
6785 if (! elf_link_output_sym (finfo, name, &osym, isec))
6786 return false;
6787 }
6788
6789 /* Relocate the contents of each section. */
f8deed93 6790 sym_hashes = elf_sym_hashes (input_bfd);
252b5132
RH
6791 for (o = input_bfd->sections; o != NULL; o = o->next)
6792 {
6793 bfd_byte *contents;
6794
6795 if (! o->linker_mark)
6796 {
6797 /* This section was omitted from the link. */
6798 continue;
6799 }
6800
6801 if ((o->flags & SEC_HAS_CONTENTS) == 0
6802 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
6803 continue;
6804
6805 if ((o->flags & SEC_LINKER_CREATED) != 0)
6806 {
6807 /* Section was created by elf_link_create_dynamic_sections
6808 or somesuch. */
6809 continue;
6810 }
6811
6812 /* Get the contents of the section. They have been cached by a
c44233aa
AM
6813 relaxation routine. Note that o is a section in an input
6814 file, so the contents field will not have been set by any of
6815 the routines which work on output files. */
252b5132
RH
6816 if (elf_section_data (o)->this_hdr.contents != NULL)
6817 contents = elf_section_data (o)->this_hdr.contents;
6818 else
6819 {
6820 contents = finfo->contents;
6821 if (! bfd_get_section_contents (input_bfd, o, contents,
6822 (file_ptr) 0, o->_raw_size))
6823 return false;
6824 }
6825
6826 if ((o->flags & SEC_RELOC) != 0)
6827 {
6828 Elf_Internal_Rela *internal_relocs;
6829
6830 /* Get the swapped relocs. */
6831 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
6832 (input_bfd, o, finfo->external_relocs,
6833 finfo->internal_relocs, false));
6834 if (internal_relocs == NULL
6835 && o->reloc_count > 0)
6836 return false;
6837
ec338859
AM
6838 /* Run through the relocs looking for any against symbols
6839 from discarded sections and section symbols from
6840 removed link-once sections. Complain about relocs
6841 against discarded sections. Zero relocs against removed
6842 link-once sections. We should really complain if
6843 anything in the final link tries to use it, but
6844 DWARF-based exception handling might have an entry in
6845 .eh_frame to describe a routine in the linkonce section,
6846 and it turns out to be hard to remove the .eh_frame
6847 entry too. FIXME. */
73d074b4
DJ
6848 if (!finfo->info->relocateable
6849 && !elf_section_ignore_discarded_relocs (o))
ec338859
AM
6850 {
6851 Elf_Internal_Rela *rel, *relend;
50b4d486 6852
ec338859
AM
6853 rel = internal_relocs;
6854 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
6855 for ( ; rel < relend; rel++)
6856 {
6857 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
6858
6859 if (r_symndx >= locsymcount
6860 || (elf_bad_symtab (input_bfd)
6861 && finfo->sections[r_symndx] == NULL))
6862 {
6863 struct elf_link_hash_entry *h;
6864
6865 h = sym_hashes[r_symndx - extsymoff];
6866 while (h->root.type == bfd_link_hash_indirect
6867 || h->root.type == bfd_link_hash_warning)
6868 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6869
6870 /* Complain if the definition comes from a
6871 discarded section. */
6872 if ((h->root.type == bfd_link_hash_defined
6873 || h->root.type == bfd_link_hash_defweak)
ed4de5e2 6874 && elf_discarded_section (h->root.u.def.section))
ec338859 6875 {
ec338859
AM
6876 if ((o->flags & SEC_DEBUGGING) != 0)
6877 {
45e9217a 6878 BFD_ASSERT (r_symndx != 0);
f8deed93 6879 memset (rel, 0, sizeof (*rel));
ec338859
AM
6880 }
6881 else
ec338859
AM
6882 {
6883 if (! ((*finfo->info->callbacks->undefined_symbol)
6884 (finfo->info, h->root.root.string,
6885 input_bfd, o, rel->r_offset,
6886 true)))
6887 return false;
6888 }
6889 }
6890 }
6891 else
6892 {
f9f32305 6893 asection *sec = finfo->sections[r_symndx];
50b4d486 6894
ed4de5e2 6895 if (sec != NULL && elf_discarded_section (sec))
f9f32305 6896 {
ad43ed4c
L
6897 if ((o->flags & SEC_DEBUGGING) != 0
6898 || (sec->flags & SEC_LINK_ONCE) != 0)
f9f32305 6899 {
45e9217a 6900 BFD_ASSERT (r_symndx != 0);
f9f32305
AM
6901 rel->r_info
6902 = ELF_R_INFO (0, ELF_R_TYPE (rel->r_info));
6903 rel->r_addend = 0;
6904 }
6905 else
f9f32305
AM
6906 {
6907 boolean ok;
6908 const char *msg
6909 = _("local symbols in discarded section %s");
6910 bfd_size_type amt
6911 = strlen (sec->name) + strlen (msg) - 1;
6912 char *buf = (char *) bfd_malloc (amt);
6913
6914 if (buf != NULL)
6915 sprintf (buf, msg, sec->name);
6916 else
6917 buf = (char *) sec->name;
6918 ok = (*finfo->info->callbacks
6919 ->undefined_symbol) (finfo->info, buf,
6920 input_bfd, o,
6921 rel->r_offset,
6922 true);
6923 if (buf != sec->name)
6924 free (buf);
6925 if (!ok)
6926 return false;
ec338859
AM
6927 }
6928 }
6929 }
6930 }
6931 }
50b4d486 6932
252b5132
RH
6933 /* Relocate the section by invoking a back end routine.
6934
6935 The back end routine is responsible for adjusting the
6936 section contents as necessary, and (if using Rela relocs
6937 and generating a relocateable output file) adjusting the
6938 reloc addend as necessary.
6939
6940 The back end routine does not have to worry about setting
6941 the reloc address or the reloc symbol index.
6942
6943 The back end routine is given a pointer to the swapped in
6944 internal symbols, and can access the hash table entries
6945 for the external symbols via elf_sym_hashes (input_bfd).
6946
6947 When generating relocateable output, the back end routine
6948 must handle STB_LOCAL/STT_SECTION symbols specially. The
6949 output symbol is going to be a section symbol
6950 corresponding to the output section, which will require
6951 the addend to be adjusted. */
6952
6953 if (! (*relocate_section) (output_bfd, finfo->info,
6954 input_bfd, o, contents,
6955 internal_relocs,
6cdc0ccc 6956 isymbuf,
252b5132
RH
6957 finfo->sections))
6958 return false;
6959
9317eacc 6960 if (emit_relocs)
252b5132
RH
6961 {
6962 Elf_Internal_Rela *irela;
6963 Elf_Internal_Rela *irelaend;
6964 struct elf_link_hash_entry **rel_hash;
c89583f8 6965 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
4e8a9624 6966 unsigned int next_erel;
41241523
TS
6967 boolean (*reloc_emitter) PARAMS ((bfd *, asection *,
6968 Elf_Internal_Shdr *,
6969 Elf_Internal_Rela *));
b491616a
AM
6970 boolean rela_normal;
6971
6972 input_rel_hdr = &elf_section_data (o)->rel_hdr;
6973 rela_normal = (bed->rela_normal
6974 && (input_rel_hdr->sh_entsize
6975 == sizeof (Elf_External_Rela)));
252b5132
RH
6976
6977 /* Adjust the reloc addresses and symbol indices. */
6978
6979 irela = internal_relocs;
dc810e39 6980 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132 6981 rel_hash = (elf_section_data (o->output_section)->rel_hashes
31367b81
MM
6982 + elf_section_data (o->output_section)->rel_count
6983 + elf_section_data (o->output_section)->rel_count2);
209f668e 6984 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
252b5132
RH
6985 {
6986 unsigned long r_symndx;
252b5132 6987 asection *sec;
fad2542d 6988 Elf_Internal_Sym sym;
252b5132 6989
209f668e
NC
6990 if (next_erel == bed->s->int_rels_per_ext_rel)
6991 {
6992 rel_hash++;
6993 next_erel = 0;
6994 }
6995
252b5132
RH
6996 irela->r_offset += o->output_offset;
6997
7ad34365 6998 /* Relocs in an executable have to be virtual addresses. */
fd984e46 6999 if (!finfo->info->relocateable)
7ad34365
NC
7000 irela->r_offset += o->output_section->vma;
7001
252b5132
RH
7002 r_symndx = ELF_R_SYM (irela->r_info);
7003
7004 if (r_symndx == 0)
7005 continue;
7006
7007 if (r_symndx >= locsymcount
7008 || (elf_bad_symtab (input_bfd)
7009 && finfo->sections[r_symndx] == NULL))
7010 {
7011 struct elf_link_hash_entry *rh;
209f668e 7012 unsigned long indx;
252b5132
RH
7013
7014 /* This is a reloc against a global symbol. We
7015 have not yet output all the local symbols, so
7016 we do not know the symbol index of any global
7017 symbol. We set the rel_hash entry for this
7018 reloc to point to the global hash table entry
7019 for this symbol. The symbol index is then
7020 set at the end of elf_bfd_final_link. */
7021 indx = r_symndx - extsymoff;
7022 rh = elf_sym_hashes (input_bfd)[indx];
7023 while (rh->root.type == bfd_link_hash_indirect
7024 || rh->root.type == bfd_link_hash_warning)
7025 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
7026
7027 /* Setting the index to -2 tells
7028 elf_link_output_extsym that this symbol is
7029 used by a reloc. */
7030 BFD_ASSERT (rh->indx < 0);
7031 rh->indx = -2;
7032
7033 *rel_hash = rh;
7034
7035 continue;
7036 }
7037
3e932841 7038 /* This is a reloc against a local symbol. */
252b5132
RH
7039
7040 *rel_hash = NULL;
fad2542d 7041 sym = isymbuf[r_symndx];
252b5132 7042 sec = finfo->sections[r_symndx];
fad2542d 7043 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
252b5132
RH
7044 {
7045 /* I suppose the backend ought to fill in the
7046 section of any STT_SECTION symbol against a
7047 processor specific section. If we have
7048 discarded a section, the output_section will
7049 be the absolute section. */
b491616a
AM
7050 if (bfd_is_abs_section (sec)
7051 || (sec != NULL
7052 && bfd_is_abs_section (sec->output_section)))
252b5132
RH
7053 r_symndx = 0;
7054 else if (sec == NULL || sec->owner == NULL)
7055 {
7056 bfd_set_error (bfd_error_bad_value);
7057 return false;
7058 }
7059 else
7060 {
7061 r_symndx = sec->output_section->target_index;
7062 BFD_ASSERT (r_symndx != 0);
7063 }
b491616a
AM
7064
7065 /* Adjust the addend according to where the
f5d44ba0 7066 section winds up in the output section. */
b491616a
AM
7067 if (rela_normal)
7068 irela->r_addend += sec->output_offset;
252b5132
RH
7069 }
7070 else
7071 {
7072 if (finfo->indices[r_symndx] == -1)
7073 {
dc810e39 7074 unsigned long shlink;
252b5132
RH
7075 const char *name;
7076 asection *osec;
7077
7078 if (finfo->info->strip == strip_all)
7079 {
7080 /* You can't do ld -r -s. */
7081 bfd_set_error (bfd_error_invalid_operation);
7082 return false;
7083 }
7084
7085 /* This symbol was skipped earlier, but
7086 since it is needed by a reloc, we
7087 must output it now. */
dc810e39 7088 shlink = symtab_hdr->sh_link;
a7b97311 7089 name = (bfd_elf_string_from_elf_section
fad2542d 7090 (input_bfd, shlink, sym.st_name));
252b5132
RH
7091 if (name == NULL)
7092 return false;
7093
7094 osec = sec->output_section;
fad2542d 7095 sym.st_shndx =
252b5132
RH
7096 _bfd_elf_section_from_bfd_section (output_bfd,
7097 osec);
fad2542d 7098 if (sym.st_shndx == SHN_BAD)
252b5132
RH
7099 return false;
7100
fad2542d 7101 sym.st_value += sec->output_offset;
252b5132 7102 if (! finfo->info->relocateable)
13ae64f3 7103 {
fad2542d
AM
7104 sym.st_value += osec->vma;
7105 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
13ae64f3
JJ
7106 {
7107 /* STT_TLS symbols are relative to PT_TLS
7108 segment base. */
7109 BFD_ASSERT (finfo->first_tls_sec != NULL);
fad2542d 7110 sym.st_value -= finfo->first_tls_sec->vma;
13ae64f3
JJ
7111 }
7112 }
252b5132 7113
a7b97311
AM
7114 finfo->indices[r_symndx]
7115 = bfd_get_symcount (output_bfd);
252b5132 7116
fad2542d 7117 if (! elf_link_output_sym (finfo, name, &sym, sec))
252b5132
RH
7118 return false;
7119 }
7120
7121 r_symndx = finfo->indices[r_symndx];
7122 }
7123
7124 irela->r_info = ELF_R_INFO (r_symndx,
7125 ELF_R_TYPE (irela->r_info));
7126 }
7127
7128 /* Swap out the relocs. */
c44233aa
AM
7129 if (bed->elf_backend_emit_relocs
7130 && !(finfo->info->relocateable
a7b97311 7131 || finfo->info->emitrelocations))
c44233aa
AM
7132 reloc_emitter = bed->elf_backend_emit_relocs;
7133 else
7134 reloc_emitter = elf_link_output_relocs;
9317eacc 7135
c89583f8
AM
7136 if (input_rel_hdr->sh_size != 0
7137 && ! (*reloc_emitter) (output_bfd, o, input_rel_hdr,
7138 internal_relocs))
41241523 7139 return false;
9317eacc 7140
c89583f8
AM
7141 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
7142 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
c44233aa
AM
7143 {
7144 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
dc810e39 7145 * bed->s->int_rels_per_ext_rel);
c89583f8 7146 if (! (*reloc_emitter) (output_bfd, o, input_rel_hdr2,
41241523
TS
7147 internal_relocs))
7148 return false;
c44233aa 7149 }
252b5132
RH
7150 }
7151 }
7152
7153 /* Write out the modified section contents. */
73d074b4 7154 if (bed->elf_backend_write_section
f9f32305 7155 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
73d074b4
DJ
7156 {
7157 /* Section written out. */
7158 }
65765700 7159 else switch (elf_section_data (o)->sec_info_type)
f5fa8ca2 7160 {
65765700 7161 case ELF_INFO_TYPE_STABS:
f5fa8ca2 7162 if (! (_bfd_write_section_stabs
65765700
JJ
7163 (output_bfd,
7164 &elf_hash_table (finfo->info)->stab_info,
7165 o, &elf_section_data (o)->sec_info, contents)))
f5fa8ca2 7166 return false;
65765700
JJ
7167 break;
7168 case ELF_INFO_TYPE_MERGE:
f5fa8ca2 7169 if (! (_bfd_write_merged_section
65765700 7170 (output_bfd, o, elf_section_data (o)->sec_info)))
252b5132 7171 return false;
65765700
JJ
7172 break;
7173 case ELF_INFO_TYPE_EH_FRAME:
7174 {
7175 asection *ehdrsec;
7176
7177 ehdrsec
7178 = bfd_get_section_by_name (elf_hash_table (finfo->info)->dynobj,
7179 ".eh_frame_hdr");
7180 if (! (_bfd_elf_write_section_eh_frame (output_bfd, o, ehdrsec,
7181 contents)))
7182 return false;
7183 }
7184 break;
7185 default:
7186 {
7187 bfd_size_type sec_size;
7188
7189 sec_size = (o->_cooked_size != 0 ? o->_cooked_size : o->_raw_size);
7190 if (! (o->flags & SEC_EXCLUDE)
7191 && ! bfd_set_section_contents (output_bfd, o->output_section,
7192 contents,
7193 (file_ptr) o->output_offset,
7194 sec_size))
7195 return false;
7196 }
7197 break;
252b5132
RH
7198 }
7199 }
7200
7201 return true;
7202}
7203
7204/* Generate a reloc when linking an ELF file. This is a reloc
7205 requested by the linker, and does come from any input file. This
7206 is used to build constructor and destructor tables when linking
7207 with -Ur. */
7208
7209static boolean
7210elf_reloc_link_order (output_bfd, info, output_section, link_order)
7211 bfd *output_bfd;
7212 struct bfd_link_info *info;
7213 asection *output_section;
7214 struct bfd_link_order *link_order;
7215{
7216 reloc_howto_type *howto;
7217 long indx;
7218 bfd_vma offset;
7219 bfd_vma addend;
7220 struct elf_link_hash_entry **rel_hash_ptr;
7221 Elf_Internal_Shdr *rel_hdr;
32f0787a 7222 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
252b5132
RH
7223
7224 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
7225 if (howto == NULL)
7226 {
7227 bfd_set_error (bfd_error_bad_value);
7228 return false;
7229 }
7230
7231 addend = link_order->u.reloc.p->addend;
7232
7233 /* Figure out the symbol index. */
7234 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
31367b81
MM
7235 + elf_section_data (output_section)->rel_count
7236 + elf_section_data (output_section)->rel_count2);
252b5132
RH
7237 if (link_order->type == bfd_section_reloc_link_order)
7238 {
7239 indx = link_order->u.reloc.p->u.section->target_index;
7240 BFD_ASSERT (indx != 0);
7241 *rel_hash_ptr = NULL;
7242 }
7243 else
7244 {
7245 struct elf_link_hash_entry *h;
7246
7247 /* Treat a reloc against a defined symbol as though it were
c44233aa 7248 actually against the section. */
252b5132
RH
7249 h = ((struct elf_link_hash_entry *)
7250 bfd_wrapped_link_hash_lookup (output_bfd, info,
7251 link_order->u.reloc.p->u.name,
7252 false, false, true));
7253 if (h != NULL
7254 && (h->root.type == bfd_link_hash_defined
7255 || h->root.type == bfd_link_hash_defweak))
7256 {
7257 asection *section;
7258
7259 section = h->root.u.def.section;
7260 indx = section->output_section->target_index;
7261 *rel_hash_ptr = NULL;
7262 /* It seems that we ought to add the symbol value to the
c44233aa
AM
7263 addend here, but in practice it has already been added
7264 because it was passed to constructor_callback. */
252b5132
RH
7265 addend += section->output_section->vma + section->output_offset;
7266 }
7267 else if (h != NULL)
7268 {
7269 /* Setting the index to -2 tells elf_link_output_extsym that
7270 this symbol is used by a reloc. */
7271 h->indx = -2;
7272 *rel_hash_ptr = h;
7273 indx = 0;
7274 }
7275 else
7276 {
7277 if (! ((*info->callbacks->unattached_reloc)
7278 (info, link_order->u.reloc.p->u.name, (bfd *) NULL,
7279 (asection *) NULL, (bfd_vma) 0)))
7280 return false;
7281 indx = 0;
7282 }
7283 }
7284
7285 /* If this is an inplace reloc, we must write the addend into the
7286 object file. */
7287 if (howto->partial_inplace && addend != 0)
7288 {
7289 bfd_size_type size;
7290 bfd_reloc_status_type rstat;
7291 bfd_byte *buf;
7292 boolean ok;
dc810e39 7293 const char *sym_name;
252b5132
RH
7294
7295 size = bfd_get_reloc_size (howto);
7296 buf = (bfd_byte *) bfd_zmalloc (size);
7297 if (buf == (bfd_byte *) NULL)
7298 return false;
dc810e39 7299 rstat = _bfd_relocate_contents (howto, output_bfd, (bfd_vma) addend, buf);
252b5132
RH
7300 switch (rstat)
7301 {
7302 case bfd_reloc_ok:
7303 break;
dc810e39 7304
252b5132
RH
7305 default:
7306 case bfd_reloc_outofrange:
7307 abort ();
dc810e39 7308
252b5132 7309 case bfd_reloc_overflow:
dc810e39
AM
7310 if (link_order->type == bfd_section_reloc_link_order)
7311 sym_name = bfd_section_name (output_bfd,
7312 link_order->u.reloc.p->u.section);
7313 else
7314 sym_name = link_order->u.reloc.p->u.name;
252b5132 7315 if (! ((*info->callbacks->reloc_overflow)
dc810e39
AM
7316 (info, sym_name, howto->name, addend,
7317 (bfd *) NULL, (asection *) NULL, (bfd_vma) 0)))
252b5132
RH
7318 {
7319 free (buf);
7320 return false;
7321 }
7322 break;
7323 }
7324 ok = bfd_set_section_contents (output_bfd, output_section, (PTR) buf,
7325 (file_ptr) link_order->offset, size);
7326 free (buf);
7327 if (! ok)
7328 return false;
7329 }
7330
7331 /* The address of a reloc is relative to the section in a
7332 relocateable file, and is a virtual address in an executable
7333 file. */
7334 offset = link_order->offset;
7335 if (! info->relocateable)
7336 offset += output_section->vma;
7337
7338 rel_hdr = &elf_section_data (output_section)->rel_hdr;
7339
7340 if (rel_hdr->sh_type == SHT_REL)
7341 {
dc810e39 7342 bfd_size_type size;
209f668e 7343 Elf_Internal_Rel *irel;
252b5132 7344 Elf_External_Rel *erel;
4e8a9624 7345 unsigned int i;
dc810e39
AM
7346
7347 size = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rel);
7348 irel = (Elf_Internal_Rel *) bfd_zmalloc (size);
209f668e
NC
7349 if (irel == NULL)
7350 return false;
dc810e39 7351
209f668e
NC
7352 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7353 irel[i].r_offset = offset;
7354 irel[0].r_info = ELF_R_INFO (indx, howto->type);
252b5132 7355
252b5132 7356 erel = ((Elf_External_Rel *) rel_hdr->contents
0525d26e 7357 + elf_section_data (output_section)->rel_count);
209f668e 7358
32f0787a 7359 if (bed->s->swap_reloc_out)
209f668e 7360 (*bed->s->swap_reloc_out) (output_bfd, irel, (bfd_byte *) erel);
32f0787a 7361 else
209f668e
NC
7362 elf_swap_reloc_out (output_bfd, irel, erel);
7363
7364 free (irel);
252b5132
RH
7365 }
7366 else
7367 {
dc810e39 7368 bfd_size_type size;
209f668e 7369 Elf_Internal_Rela *irela;
252b5132 7370 Elf_External_Rela *erela;
4e8a9624 7371 unsigned int i;
dc810e39
AM
7372
7373 size = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
7374 irela = (Elf_Internal_Rela *) bfd_zmalloc (size);
209f668e
NC
7375 if (irela == NULL)
7376 return false;
7377
7378 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7379 irela[i].r_offset = offset;
7380 irela[0].r_info = ELF_R_INFO (indx, howto->type);
7381 irela[0].r_addend = addend;
252b5132 7382
252b5132 7383 erela = ((Elf_External_Rela *) rel_hdr->contents
0525d26e 7384 + elf_section_data (output_section)->rel_count);
209f668e 7385
32f0787a 7386 if (bed->s->swap_reloca_out)
209f668e 7387 (*bed->s->swap_reloca_out) (output_bfd, irela, (bfd_byte *) erela);
32f0787a 7388 else
209f668e 7389 elf_swap_reloca_out (output_bfd, irela, erela);
252b5132
RH
7390 }
7391
0525d26e 7392 ++elf_section_data (output_section)->rel_count;
252b5132
RH
7393
7394 return true;
7395}
252b5132
RH
7396\f
7397/* Allocate a pointer to live in a linker created section. */
7398
7399boolean
7400elf_create_pointer_linker_section (abfd, info, lsect, h, rel)
7401 bfd *abfd;
7402 struct bfd_link_info *info;
7403 elf_linker_section_t *lsect;
7404 struct elf_link_hash_entry *h;
7405 const Elf_Internal_Rela *rel;
7406{
7407 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
7408 elf_linker_section_pointers_t *linker_section_ptr;
dc810e39
AM
7409 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
7410 bfd_size_type amt;
252b5132
RH
7411
7412 BFD_ASSERT (lsect != NULL);
7413
a7b97311 7414 /* Is this a global symbol? */
252b5132
RH
7415 if (h != NULL)
7416 {
a7b97311 7417 /* Has this symbol already been allocated? If so, our work is done. */
252b5132
RH
7418 if (_bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
7419 rel->r_addend,
7420 lsect->which))
7421 return true;
7422
7423 ptr_linker_section_ptr = &h->linker_section_pointer;
7424 /* Make sure this symbol is output as a dynamic symbol. */
7425 if (h->dynindx == -1)
7426 {
7427 if (! elf_link_record_dynamic_symbol (info, h))
7428 return false;
7429 }
7430
7431 if (lsect->rel_section)
7432 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
7433 }
a7b97311 7434 else
252b5132 7435 {
a7b97311 7436 /* Allocation of a pointer to a local symbol. */
252b5132
RH
7437 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
7438
a7b97311 7439 /* Allocate a table to hold the local symbols if first time. */
252b5132
RH
7440 if (!ptr)
7441 {
7442 unsigned int num_symbols = elf_tdata (abfd)->symtab_hdr.sh_info;
7443 register unsigned int i;
7444
dc810e39
AM
7445 amt = num_symbols;
7446 amt *= sizeof (elf_linker_section_pointers_t *);
7447 ptr = (elf_linker_section_pointers_t **) bfd_alloc (abfd, amt);
252b5132
RH
7448
7449 if (!ptr)
7450 return false;
7451
7452 elf_local_ptr_offsets (abfd) = ptr;
7453 for (i = 0; i < num_symbols; i++)
a7b97311 7454 ptr[i] = (elf_linker_section_pointers_t *) 0;
252b5132
RH
7455 }
7456
a7b97311 7457 /* Has this symbol already been allocated? If so, our work is done. */
252b5132
RH
7458 if (_bfd_elf_find_pointer_linker_section (ptr[r_symndx],
7459 rel->r_addend,
7460 lsect->which))
7461 return true;
7462
7463 ptr_linker_section_ptr = &ptr[r_symndx];
7464
7465 if (info->shared)
7466 {
7467 /* If we are generating a shared object, we need to
7468 output a R_<xxx>_RELATIVE reloc so that the
7469 dynamic linker can adjust this GOT entry. */
7470 BFD_ASSERT (lsect->rel_section != NULL);
7471 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
7472 }
7473 }
7474
a7b97311
AM
7475 /* Allocate space for a pointer in the linker section, and allocate
7476 a new pointer record from internal memory. */
252b5132 7477 BFD_ASSERT (ptr_linker_section_ptr != NULL);
dc810e39
AM
7478 amt = sizeof (elf_linker_section_pointers_t);
7479 linker_section_ptr = (elf_linker_section_pointers_t *) bfd_alloc (abfd, amt);
252b5132
RH
7480
7481 if (!linker_section_ptr)
7482 return false;
7483
7484 linker_section_ptr->next = *ptr_linker_section_ptr;
7485 linker_section_ptr->addend = rel->r_addend;
7486 linker_section_ptr->which = lsect->which;
7487 linker_section_ptr->written_address_p = false;
7488 *ptr_linker_section_ptr = linker_section_ptr;
7489
7490#if 0
7491 if (lsect->hole_size && lsect->hole_offset < lsect->max_hole_offset)
7492 {
a7b97311
AM
7493 linker_section_ptr->offset = (lsect->section->_raw_size
7494 - lsect->hole_size + (ARCH_SIZE / 8));
252b5132
RH
7495 lsect->hole_offset += ARCH_SIZE / 8;
7496 lsect->sym_offset += ARCH_SIZE / 8;
a7b97311 7497 if (lsect->sym_hash)
252b5132 7498 {
a7b97311 7499 /* Bump up symbol value if needed. */
252b5132
RH
7500 lsect->sym_hash->root.u.def.value += ARCH_SIZE / 8;
7501#ifdef DEBUG
7502 fprintf (stderr, "Bump up %s by %ld, current value = %ld\n",
7503 lsect->sym_hash->root.root.string,
a7b97311
AM
7504 (long) ARCH_SIZE / 8,
7505 (long) lsect->sym_hash->root.u.def.value);
252b5132
RH
7506#endif
7507 }
7508 }
7509 else
7510#endif
7511 linker_section_ptr->offset = lsect->section->_raw_size;
7512
7513 lsect->section->_raw_size += ARCH_SIZE / 8;
7514
7515#ifdef DEBUG
a7b97311
AM
7516 fprintf (stderr,
7517 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
7518 lsect->name, (long) linker_section_ptr->offset,
7519 (long) lsect->section->_raw_size);
252b5132
RH
7520#endif
7521
7522 return true;
7523}
252b5132
RH
7524\f
7525#if ARCH_SIZE==64
7526#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_64 (BFD, VAL, ADDR)
7527#endif
7528#if ARCH_SIZE==32
7529#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_32 (BFD, VAL, ADDR)
7530#endif
7531
209f668e 7532/* Fill in the address for a pointer generated in a linker section. */
252b5132
RH
7533
7534bfd_vma
a7b97311
AM
7535elf_finish_pointer_linker_section (output_bfd, input_bfd, info, lsect, h,
7536 relocation, rel, relative_reloc)
252b5132
RH
7537 bfd *output_bfd;
7538 bfd *input_bfd;
7539 struct bfd_link_info *info;
7540 elf_linker_section_t *lsect;
7541 struct elf_link_hash_entry *h;
7542 bfd_vma relocation;
7543 const Elf_Internal_Rela *rel;
7544 int relative_reloc;
7545{
7546 elf_linker_section_pointers_t *linker_section_ptr;
7547
7548 BFD_ASSERT (lsect != NULL);
7549
a7b97311 7550 if (h != NULL)
252b5132 7551 {
a7b97311
AM
7552 /* Handle global symbol. */
7553 linker_section_ptr = (_bfd_elf_find_pointer_linker_section
7554 (h->linker_section_pointer,
7555 rel->r_addend,
7556 lsect->which));
252b5132
RH
7557
7558 BFD_ASSERT (linker_section_ptr != NULL);
7559
7560 if (! elf_hash_table (info)->dynamic_sections_created
7561 || (info->shared
7562 && info->symbolic
7563 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
7564 {
7565 /* This is actually a static link, or it is a
7566 -Bsymbolic link and the symbol is defined
7567 locally. We must initialize this entry in the
7568 global section.
7569
7570 When doing a dynamic link, we create a .rela.<xxx>
7571 relocation entry to initialize the value. This
7572 is done in the finish_dynamic_symbol routine. */
7573 if (!linker_section_ptr->written_address_p)
7574 {
7575 linker_section_ptr->written_address_p = true;
a7b97311
AM
7576 bfd_put_ptr (output_bfd,
7577 relocation + linker_section_ptr->addend,
7578 (lsect->section->contents
7579 + linker_section_ptr->offset));
252b5132
RH
7580 }
7581 }
7582 }
a7b97311 7583 else
252b5132 7584 {
a7b97311 7585 /* Handle local symbol. */
252b5132
RH
7586 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
7587 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
7588 BFD_ASSERT (elf_local_ptr_offsets (input_bfd)[r_symndx] != NULL);
a7b97311
AM
7589 linker_section_ptr = (_bfd_elf_find_pointer_linker_section
7590 (elf_local_ptr_offsets (input_bfd)[r_symndx],
7591 rel->r_addend,
7592 lsect->which));
252b5132
RH
7593
7594 BFD_ASSERT (linker_section_ptr != NULL);
7595
a7b97311 7596 /* Write out pointer if it hasn't been rewritten out before. */
252b5132
RH
7597 if (!linker_section_ptr->written_address_p)
7598 {
7599 linker_section_ptr->written_address_p = true;
7600 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
7601 lsect->section->contents + linker_section_ptr->offset);
7602
7603 if (info->shared)
7604 {
7605 asection *srel = lsect->rel_section;
209f668e 7606 Elf_Internal_Rela *outrel;
dc810e39 7607 Elf_External_Rela *erel;
209f668e
NC
7608 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7609 unsigned int i;
dc810e39 7610 bfd_size_type amt;
209f668e 7611
dc810e39
AM
7612 amt = sizeof (Elf_Internal_Rela) * bed->s->int_rels_per_ext_rel;
7613 outrel = (Elf_Internal_Rela *) bfd_zmalloc (amt);
209f668e
NC
7614 if (outrel == NULL)
7615 {
7616 (*_bfd_error_handler) (_("Error: out of memory"));
7617 return 0;
7618 }
252b5132 7619
a7b97311
AM
7620 /* We need to generate a relative reloc for the dynamic
7621 linker. */
252b5132 7622 if (!srel)
a7b97311
AM
7623 {
7624 srel = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
7625 lsect->rel_name);
7626 lsect->rel_section = srel;
7627 }
252b5132
RH
7628
7629 BFD_ASSERT (srel != NULL);
7630
209f668e
NC
7631 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7632 outrel[i].r_offset = (lsect->section->output_section->vma
7633 + lsect->section->output_offset
7634 + linker_section_ptr->offset);
7635 outrel[0].r_info = ELF_R_INFO (0, relative_reloc);
7636 outrel[0].r_addend = 0;
dc810e39
AM
7637 erel = (Elf_External_Rela *) lsect->section->contents;
7638 erel += elf_section_data (lsect->section)->rel_count;
7639 elf_swap_reloca_out (output_bfd, outrel, erel);
0525d26e 7640 ++elf_section_data (lsect->section)->rel_count;
dc810e39 7641
209f668e 7642 free (outrel);
252b5132
RH
7643 }
7644 }
7645 }
7646
7647 relocation = (lsect->section->output_offset
7648 + linker_section_ptr->offset
7649 - lsect->hole_offset
7650 - lsect->sym_offset);
7651
7652#ifdef DEBUG
a7b97311
AM
7653 fprintf (stderr,
7654 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7655 lsect->name, (long) relocation, (long) relocation);
252b5132
RH
7656#endif
7657
7658 /* Subtract out the addend, because it will get added back in by the normal
7659 processing. */
7660 return relocation - linker_section_ptr->addend;
7661}
7662\f
7663/* Garbage collect unused sections. */
7664
7665static boolean elf_gc_mark
58821868
AM
7666 PARAMS ((struct bfd_link_info *, asection *,
7667 asection * (*) (asection *, struct bfd_link_info *,
7668 Elf_Internal_Rela *, struct elf_link_hash_entry *,
7669 Elf_Internal_Sym *)));
252b5132
RH
7670
7671static boolean elf_gc_sweep
58821868
AM
7672 PARAMS ((struct bfd_link_info *,
7673 boolean (*) (bfd *, struct bfd_link_info *, asection *,
7674 const Elf_Internal_Rela *)));
252b5132
RH
7675
7676static boolean elf_gc_sweep_symbol
58821868 7677 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
7678
7679static boolean elf_gc_allocate_got_offsets
58821868 7680 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
7681
7682static boolean elf_gc_propagate_vtable_entries_used
58821868 7683 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
7684
7685static boolean elf_gc_smash_unused_vtentry_relocs
58821868 7686 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
7687
7688/* The mark phase of garbage collection. For a given section, mark
dbb410c3
AM
7689 it and any sections in this section's group, and all the sections
7690 which define symbols to which it refers. */
252b5132
RH
7691
7692static boolean
7693elf_gc_mark (info, sec, gc_mark_hook)
7694 struct bfd_link_info *info;
7695 asection *sec;
58821868
AM
7696 asection * (*gc_mark_hook) PARAMS ((asection *, struct bfd_link_info *,
7697 Elf_Internal_Rela *,
7698 struct elf_link_hash_entry *,
7699 Elf_Internal_Sym *));
252b5132 7700{
dbb410c3
AM
7701 boolean ret;
7702 asection *group_sec;
252b5132
RH
7703
7704 sec->gc_mark = 1;
7705
dbb410c3
AM
7706 /* Mark all the sections in the group. */
7707 group_sec = elf_section_data (sec)->next_in_group;
7708 if (group_sec && !group_sec->gc_mark)
7709 if (!elf_gc_mark (info, group_sec, gc_mark_hook))
7710 return false;
252b5132 7711
dbb410c3
AM
7712 /* Look through the section relocs. */
7713 ret = true;
252b5132
RH
7714 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
7715 {
7716 Elf_Internal_Rela *relstart, *rel, *relend;
7717 Elf_Internal_Shdr *symtab_hdr;
7718 struct elf_link_hash_entry **sym_hashes;
7719 size_t nlocsyms;
7720 size_t extsymoff;
252b5132 7721 bfd *input_bfd = sec->owner;
c7ac6ff8 7722 struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
6cdc0ccc 7723 Elf_Internal_Sym *isym = NULL;
252b5132
RH
7724
7725 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7726 sym_hashes = elf_sym_hashes (input_bfd);
7727
7728 /* Read the local symbols. */
7729 if (elf_bad_symtab (input_bfd))
7730 {
7731 nlocsyms = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
c44233aa 7732 extsymoff = 0;
252b5132
RH
7733 }
7734 else
7735 extsymoff = nlocsyms = symtab_hdr->sh_info;
9ad5cbcf 7736
6cdc0ccc
AM
7737 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
7738 if (isym == NULL && nlocsyms != 0)
9ad5cbcf 7739 {
6cdc0ccc
AM
7740 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
7741 NULL, NULL, NULL);
7742 if (isym == NULL)
9ad5cbcf
AM
7743 return false;
7744 }
7745
252b5132
RH
7746 /* Read the relocations. */
7747 relstart = (NAME(_bfd_elf,link_read_relocs)
6cdc0ccc 7748 (input_bfd, sec, NULL, (Elf_Internal_Rela *) NULL,
252b5132
RH
7749 info->keep_memory));
7750 if (relstart == NULL)
7751 {
7752 ret = false;
7753 goto out1;
7754 }
c7ac6ff8 7755 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132
RH
7756
7757 for (rel = relstart; rel < relend; rel++)
7758 {
7759 unsigned long r_symndx;
7760 asection *rsec;
7761 struct elf_link_hash_entry *h;
252b5132
RH
7762
7763 r_symndx = ELF_R_SYM (rel->r_info);
7764 if (r_symndx == 0)
7765 continue;
7766
6cdc0ccc
AM
7767 if (r_symndx >= nlocsyms
7768 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
252b5132
RH
7769 {
7770 h = sym_hashes[r_symndx - extsymoff];
1e2f5b6e 7771 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
252b5132
RH
7772 }
7773 else
7774 {
6cdc0ccc 7775 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
252b5132
RH
7776 }
7777
7778 if (rsec && !rsec->gc_mark)
b91afed7
AM
7779 {
7780 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
7781 rsec->gc_mark = 1;
7782 else if (!elf_gc_mark (info, rsec, gc_mark_hook))
7783 {
7784 ret = false;
7785 goto out2;
7786 }
7787 }
252b5132
RH
7788 }
7789
7790 out2:
6cdc0ccc 7791 if (elf_section_data (sec)->relocs != relstart)
252b5132
RH
7792 free (relstart);
7793 out1:
6cdc0ccc
AM
7794 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
7795 {
7796 if (! info->keep_memory)
7797 free (isym);
7798 else
7799 symtab_hdr->contents = (unsigned char *) isym;
7800 }
252b5132
RH
7801 }
7802
7803 return ret;
7804}
7805
7806/* The sweep phase of garbage collection. Remove all garbage sections. */
7807
7808static boolean
7809elf_gc_sweep (info, gc_sweep_hook)
7810 struct bfd_link_info *info;
58821868
AM
7811 boolean (*gc_sweep_hook) PARAMS ((bfd *, struct bfd_link_info *,
7812 asection *, const Elf_Internal_Rela *));
252b5132
RH
7813{
7814 bfd *sub;
7815
7816 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
7817 {
7818 asection *o;
7819
f6af82bd
AM
7820 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
7821 continue;
7822
252b5132
RH
7823 for (o = sub->sections; o != NULL; o = o->next)
7824 {
7825 /* Keep special sections. Keep .debug sections. */
7826 if ((o->flags & SEC_LINKER_CREATED)
7827 || (o->flags & SEC_DEBUGGING))
7828 o->gc_mark = 1;
7829
7830 if (o->gc_mark)
7831 continue;
7832
7833 /* Skip sweeping sections already excluded. */
7834 if (o->flags & SEC_EXCLUDE)
7835 continue;
7836
7837 /* Since this is early in the link process, it is simple
7838 to remove a section from the output. */
7839 o->flags |= SEC_EXCLUDE;
7840
7841 /* But we also have to update some of the relocation
7842 info we collected before. */
7843 if (gc_sweep_hook
7844 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
7845 {
7846 Elf_Internal_Rela *internal_relocs;
7847 boolean r;
7848
7849 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
7850 (o->owner, o, NULL, NULL, info->keep_memory));
7851 if (internal_relocs == NULL)
7852 return false;
7853
3e932841 7854 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
252b5132 7855
6cdc0ccc 7856 if (elf_section_data (o)->relocs != internal_relocs)
252b5132
RH
7857 free (internal_relocs);
7858
7859 if (!r)
7860 return false;
7861 }
7862 }
7863 }
7864
7865 /* Remove the symbols that were in the swept sections from the dynamic
7866 symbol table. GCFIXME: Anyone know how to get them out of the
7867 static symbol table as well? */
7868 {
7869 int i = 0;
7870
7871 elf_link_hash_traverse (elf_hash_table (info),
7872 elf_gc_sweep_symbol,
7873 (PTR) &i);
7874
7875 elf_hash_table (info)->dynsymcount = i;
7876 }
7877
7878 return true;
7879}
7880
7881/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
7882
7883static boolean
7884elf_gc_sweep_symbol (h, idxptr)
7885 struct elf_link_hash_entry *h;
7886 PTR idxptr;
7887{
7888 int *idx = (int *) idxptr;
7889
e92d460e
AM
7890 if (h->root.type == bfd_link_hash_warning)
7891 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7892
252b5132
RH
7893 if (h->dynindx != -1
7894 && ((h->root.type != bfd_link_hash_defined
7895 && h->root.type != bfd_link_hash_defweak)
7896 || h->root.u.def.section->gc_mark))
7897 h->dynindx = (*idx)++;
7898
7899 return true;
7900}
7901
7902/* Propogate collected vtable information. This is called through
7903 elf_link_hash_traverse. */
7904
7905static boolean
7906elf_gc_propagate_vtable_entries_used (h, okp)
7907 struct elf_link_hash_entry *h;
7908 PTR okp;
7909{
e92d460e
AM
7910 if (h->root.type == bfd_link_hash_warning)
7911 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7912
3e932841 7913 /* Those that are not vtables. */
252b5132
RH
7914 if (h->vtable_parent == NULL)
7915 return true;
7916
7917 /* Those vtables that do not have parents, we cannot merge. */
7918 if (h->vtable_parent == (struct elf_link_hash_entry *) -1)
7919 return true;
7920
7921 /* If we've already been done, exit. */
7922 if (h->vtable_entries_used && h->vtable_entries_used[-1])
7923 return true;
7924
7925 /* Make sure the parent's table is up to date. */
7926 elf_gc_propagate_vtable_entries_used (h->vtable_parent, okp);
7927
7928 if (h->vtable_entries_used == NULL)
7929 {
7930 /* None of this table's entries were referenced. Re-use the
7931 parent's table. */
7932 h->vtable_entries_used = h->vtable_parent->vtable_entries_used;
7933 h->vtable_entries_size = h->vtable_parent->vtable_entries_size;
7934 }
7935 else
7936 {
7937 size_t n;
7938 boolean *cu, *pu;
7939
7940 /* Or the parent's entries into ours. */
7941 cu = h->vtable_entries_used;
7942 cu[-1] = true;
7943 pu = h->vtable_parent->vtable_entries_used;
7944 if (pu != NULL)
7945 {
c44233aa
AM
7946 asection *sec = h->root.u.def.section;
7947 struct elf_backend_data *bed = get_elf_backend_data (sec->owner);
7948 int file_align = bed->s->file_align;
0d1ea5c0
CM
7949
7950 n = h->vtable_parent->vtable_entries_size / file_align;
374b596d 7951 while (n--)
252b5132 7952 {
374b596d
NC
7953 if (*pu)
7954 *cu = true;
7955 pu++;
7956 cu++;
252b5132
RH
7957 }
7958 }
7959 }
7960
7961 return true;
7962}
7963
7964static boolean
7965elf_gc_smash_unused_vtentry_relocs (h, okp)
7966 struct elf_link_hash_entry *h;
7967 PTR okp;
7968{
7969 asection *sec;
7970 bfd_vma hstart, hend;
7971 Elf_Internal_Rela *relstart, *relend, *rel;
c7ac6ff8 7972 struct elf_backend_data *bed;
0d1ea5c0 7973 int file_align;
252b5132 7974
e92d460e
AM
7975 if (h->root.type == bfd_link_hash_warning)
7976 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7977
252b5132
RH
7978 /* Take care of both those symbols that do not describe vtables as
7979 well as those that are not loaded. */
7980 if (h->vtable_parent == NULL)
7981 return true;
7982
7983 BFD_ASSERT (h->root.type == bfd_link_hash_defined
7984 || h->root.type == bfd_link_hash_defweak);
7985
7986 sec = h->root.u.def.section;
7987 hstart = h->root.u.def.value;
7988 hend = hstart + h->size;
7989
7990 relstart = (NAME(_bfd_elf,link_read_relocs)
7991 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL, true));
7992 if (!relstart)
a7b97311 7993 return *(boolean *) okp = false;
c7ac6ff8 7994 bed = get_elf_backend_data (sec->owner);
0d1ea5c0
CM
7995 file_align = bed->s->file_align;
7996
c7ac6ff8 7997 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132
RH
7998
7999 for (rel = relstart; rel < relend; ++rel)
8000 if (rel->r_offset >= hstart && rel->r_offset < hend)
8001 {
8002 /* If the entry is in use, do nothing. */
8003 if (h->vtable_entries_used
8004 && (rel->r_offset - hstart) < h->vtable_entries_size)
8005 {
0d1ea5c0 8006 bfd_vma entry = (rel->r_offset - hstart) / file_align;
252b5132
RH
8007 if (h->vtable_entries_used[entry])
8008 continue;
8009 }
8010 /* Otherwise, kill it. */
8011 rel->r_offset = rel->r_info = rel->r_addend = 0;
8012 }
8013
8014 return true;
8015}
8016
8017/* Do mark and sweep of unused sections. */
8018
8019boolean
8020elf_gc_sections (abfd, info)
8021 bfd *abfd;
8022 struct bfd_link_info *info;
8023{
8024 boolean ok = true;
8025 bfd *sub;
8026 asection * (*gc_mark_hook)
1e2f5b6e 8027 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
c44233aa 8028 struct elf_link_hash_entry *h, Elf_Internal_Sym *));
252b5132
RH
8029
8030 if (!get_elf_backend_data (abfd)->can_gc_sections
6d3e950b 8031 || info->relocateable || info->emitrelocations
252b5132
RH
8032 || elf_hash_table (info)->dynamic_sections_created)
8033 return true;
8034
8035 /* Apply transitive closure to the vtable entry usage info. */
8036 elf_link_hash_traverse (elf_hash_table (info),
8037 elf_gc_propagate_vtable_entries_used,
8038 (PTR) &ok);
8039 if (!ok)
8040 return false;
8041
8042 /* Kill the vtable relocations that were not used. */
8043 elf_link_hash_traverse (elf_hash_table (info),
8044 elf_gc_smash_unused_vtentry_relocs,
8045 (PTR) &ok);
8046 if (!ok)
8047 return false;
8048
8049 /* Grovel through relocs to find out who stays ... */
8050
8051 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
8052 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8053 {
8054 asection *o;
f6af82bd
AM
8055
8056 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
8057 continue;
8058
252b5132
RH
8059 for (o = sub->sections; o != NULL; o = o->next)
8060 {
8061 if (o->flags & SEC_KEEP)
c44233aa 8062 if (!elf_gc_mark (info, o, gc_mark_hook))
252b5132
RH
8063 return false;
8064 }
8065 }
8066
8067 /* ... and mark SEC_EXCLUDE for those that go. */
a7b97311 8068 if (!elf_gc_sweep (info, get_elf_backend_data (abfd)->gc_sweep_hook))
252b5132
RH
8069 return false;
8070
8071 return true;
8072}
8073\f
8074/* Called from check_relocs to record the existance of a VTINHERIT reloc. */
8075
8076boolean
8077elf_gc_record_vtinherit (abfd, sec, h, offset)
8078 bfd *abfd;
8079 asection *sec;
8080 struct elf_link_hash_entry *h;
8081 bfd_vma offset;
8082{
8083 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
8084 struct elf_link_hash_entry **search, *child;
8085 bfd_size_type extsymcount;
8086
8087 /* The sh_info field of the symtab header tells us where the
8088 external symbols start. We don't care about the local symbols at
8089 this point. */
8090 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size/sizeof (Elf_External_Sym);
8091 if (!elf_bad_symtab (abfd))
8092 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
8093
8094 sym_hashes = elf_sym_hashes (abfd);
8095 sym_hashes_end = sym_hashes + extsymcount;
8096
8097 /* Hunt down the child symbol, which is in this section at the same
8098 offset as the relocation. */
8099 for (search = sym_hashes; search != sym_hashes_end; ++search)
8100 {
8101 if ((child = *search) != NULL
8102 && (child->root.type == bfd_link_hash_defined
8103 || child->root.type == bfd_link_hash_defweak)
8104 && child->root.u.def.section == sec
8105 && child->root.u.def.value == offset)
8106 goto win;
8107 }
8108
8109 (*_bfd_error_handler) ("%s: %s+%lu: No symbol found for INHERIT",
8f615d07 8110 bfd_archive_filename (abfd), sec->name,
a7b97311 8111 (unsigned long) offset);
252b5132
RH
8112 bfd_set_error (bfd_error_invalid_operation);
8113 return false;
8114
dc810e39 8115 win:
252b5132
RH
8116 if (!h)
8117 {
8118 /* This *should* only be the absolute section. It could potentially
8119 be that someone has defined a non-global vtable though, which
8120 would be bad. It isn't worth paging in the local symbols to be
8121 sure though; that case should simply be handled by the assembler. */
8122
8123 child->vtable_parent = (struct elf_link_hash_entry *) -1;
8124 }
8125 else
8126 child->vtable_parent = h;
8127
8128 return true;
8129}
8130
8131/* Called from check_relocs to record the existance of a VTENTRY reloc. */
8132
8133boolean
8134elf_gc_record_vtentry (abfd, sec, h, addend)
7442e600
ILT
8135 bfd *abfd ATTRIBUTE_UNUSED;
8136 asection *sec ATTRIBUTE_UNUSED;
252b5132
RH
8137 struct elf_link_hash_entry *h;
8138 bfd_vma addend;
8139{
0d1ea5c0
CM
8140 struct elf_backend_data *bed = get_elf_backend_data (abfd);
8141 int file_align = bed->s->file_align;
8142
252b5132
RH
8143 if (addend >= h->vtable_entries_size)
8144 {
8145 size_t size, bytes;
8146 boolean *ptr = h->vtable_entries_used;
8147
8148 /* While the symbol is undefined, we have to be prepared to handle
8149 a zero size. */
8150 if (h->root.type == bfd_link_hash_undefined)
8151 size = addend;
8152 else
8153 {
8154 size = h->size;
8155 if (size < addend)
8156 {
8157 /* Oops! We've got a reference past the defined end of
8158 the table. This is probably a bug -- shall we warn? */
8159 size = addend;
8160 }
8161 }
8162
8163 /* Allocate one extra entry for use as a "done" flag for the
8164 consolidation pass. */
0d1ea5c0 8165 bytes = (size / file_align + 1) * sizeof (boolean);
252b5132
RH
8166
8167 if (ptr)
8168 {
dc810e39 8169 ptr = bfd_realloc (ptr - 1, (bfd_size_type) bytes);
3e932841 8170
fed79cc6
NC
8171 if (ptr != NULL)
8172 {
8173 size_t oldbytes;
252b5132 8174
a7b97311
AM
8175 oldbytes = ((h->vtable_entries_size / file_align + 1)
8176 * sizeof (boolean));
8177 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
fed79cc6 8178 }
252b5132
RH
8179 }
8180 else
dc810e39 8181 ptr = bfd_zmalloc ((bfd_size_type) bytes);
252b5132 8182
fed79cc6
NC
8183 if (ptr == NULL)
8184 return false;
3e932841 8185
252b5132 8186 /* And arrange for that done flag to be at index -1. */
fed79cc6 8187 h->vtable_entries_used = ptr + 1;
252b5132
RH
8188 h->vtable_entries_size = size;
8189 }
3e932841 8190
0d1ea5c0 8191 h->vtable_entries_used[addend / file_align] = true;
252b5132
RH
8192
8193 return true;
8194}
8195
8196/* And an accompanying bit to work out final got entry offsets once
8197 we're done. Should be called from final_link. */
8198
8199boolean
8200elf_gc_common_finalize_got_offsets (abfd, info)
8201 bfd *abfd;
8202 struct bfd_link_info *info;
8203{
8204 bfd *i;
8205 struct elf_backend_data *bed = get_elf_backend_data (abfd);
8206 bfd_vma gotoff;
8207
8208 /* The GOT offset is relative to the .got section, but the GOT header is
8209 put into the .got.plt section, if the backend uses it. */
8210 if (bed->want_got_plt)
8211 gotoff = 0;
8212 else
8213 gotoff = bed->got_header_size;
8214
8215 /* Do the local .got entries first. */
8216 for (i = info->input_bfds; i; i = i->link_next)
8217 {
f6af82bd 8218 bfd_signed_vma *local_got;
252b5132
RH
8219 bfd_size_type j, locsymcount;
8220 Elf_Internal_Shdr *symtab_hdr;
8221
f6af82bd
AM
8222 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
8223 continue;
8224
8225 local_got = elf_local_got_refcounts (i);
252b5132
RH
8226 if (!local_got)
8227 continue;
8228
8229 symtab_hdr = &elf_tdata (i)->symtab_hdr;
8230 if (elf_bad_symtab (i))
8231 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
8232 else
8233 locsymcount = symtab_hdr->sh_info;
8234
8235 for (j = 0; j < locsymcount; ++j)
8236 {
8237 if (local_got[j] > 0)
8238 {
8239 local_got[j] = gotoff;
8240 gotoff += ARCH_SIZE / 8;
8241 }
8242 else
8243 local_got[j] = (bfd_vma) -1;
8244 }
8245 }
8246
dd5724d5
AM
8247 /* Then the global .got entries. .plt refcounts are handled by
8248 adjust_dynamic_symbol */
252b5132
RH
8249 elf_link_hash_traverse (elf_hash_table (info),
8250 elf_gc_allocate_got_offsets,
8251 (PTR) &gotoff);
8252 return true;
8253}
8254
8255/* We need a special top-level link routine to convert got reference counts
8256 to real got offsets. */
8257
8258static boolean
8259elf_gc_allocate_got_offsets (h, offarg)
8260 struct elf_link_hash_entry *h;
8261 PTR offarg;
8262{
8263 bfd_vma *off = (bfd_vma *) offarg;
8264
e92d460e
AM
8265 if (h->root.type == bfd_link_hash_warning)
8266 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8267
252b5132
RH
8268 if (h->got.refcount > 0)
8269 {
8270 h->got.offset = off[0];
8271 off[0] += ARCH_SIZE / 8;
8272 }
8273 else
8274 h->got.offset = (bfd_vma) -1;
8275
8276 return true;
8277}
8278
8279/* Many folk need no more in the way of final link than this, once
8280 got entry reference counting is enabled. */
8281
8282boolean
8283elf_gc_common_final_link (abfd, info)
8284 bfd *abfd;
8285 struct bfd_link_info *info;
8286{
8287 if (!elf_gc_common_finalize_got_offsets (abfd, info))
8288 return false;
8289
8290 /* Invoke the regular ELF backend linker to do all the work. */
8291 return elf_bfd_final_link (abfd, info);
8292}
8293
8294/* This function will be called though elf_link_hash_traverse to store
8295 all hash value of the exported symbols in an array. */
8296
8297static boolean
8298elf_collect_hash_codes (h, data)
8299 struct elf_link_hash_entry *h;
8300 PTR data;
8301{
8302 unsigned long **valuep = (unsigned long **) data;
8303 const char *name;
8304 char *p;
8305 unsigned long ha;
8306 char *alc = NULL;
8307
e92d460e
AM
8308 if (h->root.type == bfd_link_hash_warning)
8309 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8310
252b5132
RH
8311 /* Ignore indirect symbols. These are added by the versioning code. */
8312 if (h->dynindx == -1)
8313 return true;
8314
8315 name = h->root.root.string;
8316 p = strchr (name, ELF_VER_CHR);
8317 if (p != NULL)
8318 {
dc810e39
AM
8319 alc = bfd_malloc ((bfd_size_type) (p - name + 1));
8320 memcpy (alc, name, (size_t) (p - name));
252b5132
RH
8321 alc[p - name] = '\0';
8322 name = alc;
8323 }
8324
8325 /* Compute the hash value. */
8326 ha = bfd_elf_hash (name);
8327
8328 /* Store the found hash value in the array given as the argument. */
8329 *(*valuep)++ = ha;
8330
8331 /* And store it in the struct so that we can put it in the hash table
8332 later. */
8333 h->elf_hash_value = ha;
8334
8335 if (alc != NULL)
8336 free (alc);
8337
8338 return true;
8339}
73d074b4
DJ
8340
8341boolean
8342elf_reloc_symbol_deleted_p (offset, cookie)
8343 bfd_vma offset;
8344 PTR cookie;
8345{
9ad5cbcf 8346 struct elf_reloc_cookie *rcookie = (struct elf_reloc_cookie *) cookie;
73d074b4
DJ
8347
8348 if (rcookie->bad_symtab)
8349 rcookie->rel = rcookie->rels;
8350
8351 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
8352 {
8353 unsigned long r_symndx = ELF_R_SYM (rcookie->rel->r_info);
73d074b4
DJ
8354
8355 if (! rcookie->bad_symtab)
8356 if (rcookie->rel->r_offset > offset)
8357 return false;
8358 if (rcookie->rel->r_offset != offset)
8359 continue;
8360
73d074b4 8361 if (r_symndx >= rcookie->locsymcount
6cdc0ccc 8362 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
73d074b4
DJ
8363 {
8364 struct elf_link_hash_entry *h;
8365
8366 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
8367
8368 while (h->root.type == bfd_link_hash_indirect
8369 || h->root.type == bfd_link_hash_warning)
8370 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8371
8372 if ((h->root.type == bfd_link_hash_defined
8373 || h->root.type == bfd_link_hash_defweak)
ed4de5e2 8374 && elf_discarded_section (h->root.u.def.section))
73d074b4
DJ
8375 return true;
8376 else
8377 return false;
8378 }
6cdc0ccc 8379 else
73d074b4
DJ
8380 {
8381 /* It's not a relocation against a global symbol,
44421011 8382 but it could be a relocation against a local
73d074b4
DJ
8383 symbol for a discarded section. */
8384 asection *isec;
6cdc0ccc 8385 Elf_Internal_Sym *isym;
73d074b4
DJ
8386
8387 /* Need to: get the symbol; get the section. */
6cdc0ccc
AM
8388 isym = &rcookie->locsyms[r_symndx];
8389 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
73d074b4 8390 {
6cdc0ccc 8391 isec = section_from_elf_index (rcookie->abfd, isym->st_shndx);
ed4de5e2 8392 if (isec != NULL && elf_discarded_section (isec))
73d074b4
DJ
8393 return true;
8394 }
8395 }
8396 return false;
8397 }
8398 return false;
8399}
8400
8401/* Discard unneeded references to discarded sections.
8402 Returns true if any section's size was changed. */
8403/* This function assumes that the relocations are in sorted order,
8404 which is true for all known assemblers. */
8405
8406boolean
65765700
JJ
8407elf_bfd_discard_info (output_bfd, info)
8408 bfd *output_bfd;
73d074b4
DJ
8409 struct bfd_link_info *info;
8410{
8411 struct elf_reloc_cookie cookie;
65765700 8412 asection *stab, *eh, *ehdr;
73d074b4 8413 Elf_Internal_Shdr *symtab_hdr;
73d074b4
DJ
8414 struct elf_backend_data *bed;
8415 bfd *abfd;
8416 boolean ret = false;
65765700 8417 boolean strip = info->strip == strip_all || info->strip == strip_debugger;
73d074b4
DJ
8418
8419 if (info->relocateable
8420 || info->traditional_format
8421 || info->hash->creator->flavour != bfd_target_elf_flavour
65765700 8422 || ! is_elf_hash_table (info))
73d074b4 8423 return false;
65765700 8424
72dd6331
AM
8425 ehdr = NULL;
8426 if (elf_hash_table (info)->dynobj != NULL)
8427 ehdr = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
8428 ".eh_frame_hdr");
65765700 8429
73d074b4
DJ
8430 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
8431 {
163c1c30
L
8432 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
8433 continue;
8434
73d074b4
DJ
8435 bed = get_elf_backend_data (abfd);
8436
8437 if ((abfd->flags & DYNAMIC) != 0)
8438 continue;
8439
65765700
JJ
8440 eh = NULL;
8441 if (ehdr)
8442 {
8443 eh = bfd_get_section_by_name (abfd, ".eh_frame");
2d653fc7
AM
8444 if (eh && (eh->_raw_size == 0
8445 || bfd_is_abs_section (eh->output_section)))
65765700
JJ
8446 eh = NULL;
8447 }
8448
2d653fc7
AM
8449 stab = NULL;
8450 if (!strip)
8451 {
8452 stab = bfd_get_section_by_name (abfd, ".stab");
8453 if (stab && (stab->_raw_size == 0
8454 || bfd_is_abs_section (stab->output_section)))
8455 stab = NULL;
8456 }
40b829d4
AM
8457 if ((! stab
8458 || elf_section_data(stab)->sec_info_type != ELF_INFO_TYPE_STABS)
65765700
JJ
8459 && ! eh
8460 && (strip || ! bed->elf_backend_discard_info))
73d074b4
DJ
8461 continue;
8462
8463 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
73d074b4
DJ
8464 cookie.abfd = abfd;
8465 cookie.sym_hashes = elf_sym_hashes (abfd);
8466 cookie.bad_symtab = elf_bad_symtab (abfd);
8467 if (cookie.bad_symtab)
8468 {
8469 cookie.locsymcount =
8470 symtab_hdr->sh_size / sizeof (Elf_External_Sym);
8471 cookie.extsymoff = 0;
8472 }
8473 else
8474 {
8475 cookie.locsymcount = symtab_hdr->sh_info;
8476 cookie.extsymoff = symtab_hdr->sh_info;
8477 }
8478
6cdc0ccc
AM
8479 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
8480 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
c44233aa 8481 {
6cdc0ccc
AM
8482 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
8483 cookie.locsymcount, 0,
8484 NULL, NULL, NULL);
c44233aa 8485 if (cookie.locsyms == NULL)
9ad5cbcf 8486 return false;
9ad5cbcf 8487 }
73d074b4 8488
65765700 8489 if (stab)
73d074b4
DJ
8490 {
8491 cookie.rels = (NAME(_bfd_elf,link_read_relocs)
6cdc0ccc 8492 (abfd, stab, (PTR) NULL, (Elf_Internal_Rela *) NULL,
73d074b4
DJ
8493 info->keep_memory));
8494 if (cookie.rels)
8495 {
8496 cookie.rel = cookie.rels;
8497 cookie.relend =
65765700
JJ
8498 cookie.rels + stab->reloc_count * bed->s->int_rels_per_ext_rel;
8499 if (_bfd_discard_section_stabs (abfd, stab,
8500 elf_section_data (stab)->sec_info,
73d074b4
DJ
8501 elf_reloc_symbol_deleted_p,
8502 &cookie))
8503 ret = true;
6cdc0ccc 8504 if (elf_section_data (stab)->relocs != cookie.rels)
73d074b4
DJ
8505 free (cookie.rels);
8506 }
8507 }
8508
65765700
JJ
8509 if (eh)
8510 {
8511 cookie.rels = NULL;
8512 cookie.rel = NULL;
8513 cookie.relend = NULL;
8514 if (eh->reloc_count)
8515 cookie.rels = (NAME(_bfd_elf,link_read_relocs)
40b829d4 8516 (abfd, eh, (PTR) NULL, (Elf_Internal_Rela *) NULL,
65765700
JJ
8517 info->keep_memory));
8518 if (cookie.rels)
8519 {
8520 cookie.rel = cookie.rels;
8521 cookie.relend =
8522 cookie.rels + eh->reloc_count * bed->s->int_rels_per_ext_rel;
8523 }
8524 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh, ehdr,
8525 elf_reloc_symbol_deleted_p,
8526 &cookie))
ad34bc37
AM
8527 {
8528 /* Relocs have been edited. Ensure edited version is
8529 used later in relocate_section. */
8530 elf_section_data (eh)->relocs = cookie.rels;
8531 ret = true;
8532 }
6cdc0ccc 8533 if (cookie.rels && elf_section_data (eh)->relocs != cookie.rels)
65765700
JJ
8534 free (cookie.rels);
8535 }
8536
73d074b4
DJ
8537 if (bed->elf_backend_discard_info)
8538 {
8539 if (bed->elf_backend_discard_info (abfd, &cookie, info))
8540 ret = true;
8541 }
8542
6cdc0ccc
AM
8543 if (cookie.locsyms != NULL
8544 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
8545 {
8546 if (! info->keep_memory)
8547 free (cookie.locsyms);
8548 else
8549 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
8550 }
73d074b4 8551 }
65765700 8552
40b829d4 8553 if (ehdr && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info, ehdr))
65765700 8554 ret = true;
73d074b4
DJ
8555 return ret;
8556}
8557
8558static boolean
8559elf_section_ignore_discarded_relocs (sec)
8560 asection *sec;
8561{
40b829d4
AM
8562 struct elf_backend_data *bed;
8563
65765700
JJ
8564 switch (elf_section_data (sec)->sec_info_type)
8565 {
8566 case ELF_INFO_TYPE_STABS:
8567 case ELF_INFO_TYPE_EH_FRAME:
8568 return true;
8569 default:
8570 break;
8571 }
40b829d4
AM
8572
8573 bed = get_elf_backend_data (sec->owner);
8574 if (bed->elf_backend_ignore_discarded_relocs != NULL
8575 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
73d074b4 8576 return true;
65765700
JJ
8577
8578 return false;
73d074b4 8579}
This page took 0.668324 seconds and 4 git commands to generate.