* elf32-m68hc11.c (elf_m68hc11_howto_table): Add the new relocs;
[deliverable/binutils-gdb.git] / bfd / elflink.h
1 /* ELF linker support.
2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002
3 Free Software Foundation, Inc.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21 /* ELF linker code. */
22
23 /* This struct is used to pass information to routines called via
24 elf_link_hash_traverse which must return failure. */
25
26 struct elf_info_failed
27 {
28 boolean failed;
29 struct bfd_link_info *info;
30 struct bfd_elf_version_tree *verdefs;
31 };
32
33 static boolean is_global_data_symbol_definition
34 PARAMS ((bfd *, Elf_Internal_Sym *));
35 static boolean elf_link_is_defined_archive_symbol
36 PARAMS ((bfd *, carsym *));
37 static boolean elf_link_add_object_symbols
38 PARAMS ((bfd *, struct bfd_link_info *));
39 static boolean elf_link_add_archive_symbols
40 PARAMS ((bfd *, struct bfd_link_info *));
41 static boolean elf_merge_symbol
42 PARAMS ((bfd *, struct bfd_link_info *, const char *,
43 Elf_Internal_Sym *, asection **, bfd_vma *,
44 struct elf_link_hash_entry **, boolean *, boolean *,
45 boolean *, boolean));
46 static boolean elf_add_default_symbol
47 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
48 const char *, Elf_Internal_Sym *, asection **, bfd_vma *,
49 boolean *, boolean, boolean));
50 static boolean elf_export_symbol
51 PARAMS ((struct elf_link_hash_entry *, PTR));
52 static boolean elf_finalize_dynstr
53 PARAMS ((bfd *, struct bfd_link_info *));
54 static boolean elf_fix_symbol_flags
55 PARAMS ((struct elf_link_hash_entry *, struct elf_info_failed *));
56 static boolean elf_adjust_dynamic_symbol
57 PARAMS ((struct elf_link_hash_entry *, PTR));
58 static boolean elf_link_find_version_dependencies
59 PARAMS ((struct elf_link_hash_entry *, PTR));
60 static boolean elf_link_assign_sym_version
61 PARAMS ((struct elf_link_hash_entry *, PTR));
62 static boolean elf_collect_hash_codes
63 PARAMS ((struct elf_link_hash_entry *, PTR));
64 static boolean elf_link_read_relocs_from_section
65 PARAMS ((bfd *, Elf_Internal_Shdr *, PTR, Elf_Internal_Rela *));
66 static size_t compute_bucket_count
67 PARAMS ((struct bfd_link_info *));
68 static boolean elf_link_output_relocs
69 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *));
70 static boolean elf_link_size_reloc_section
71 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
72 static void elf_link_adjust_relocs
73 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned int,
74 struct elf_link_hash_entry **));
75 static int elf_link_sort_cmp1
76 PARAMS ((const void *, const void *));
77 static int elf_link_sort_cmp2
78 PARAMS ((const void *, const void *));
79 static size_t elf_link_sort_relocs
80 PARAMS ((bfd *, struct bfd_link_info *, asection **));
81 static boolean elf_section_ignore_discarded_relocs
82 PARAMS ((asection *));
83
84 /* Given an ELF BFD, add symbols to the global hash table as
85 appropriate. */
86
87 boolean
88 elf_bfd_link_add_symbols (abfd, info)
89 bfd *abfd;
90 struct bfd_link_info *info;
91 {
92 switch (bfd_get_format (abfd))
93 {
94 case bfd_object:
95 return elf_link_add_object_symbols (abfd, info);
96 case bfd_archive:
97 return elf_link_add_archive_symbols (abfd, info);
98 default:
99 bfd_set_error (bfd_error_wrong_format);
100 return false;
101 }
102 }
103 \f
104 /* Return true iff this is a non-common, definition of a non-function symbol. */
105 static boolean
106 is_global_data_symbol_definition (abfd, sym)
107 bfd * abfd ATTRIBUTE_UNUSED;
108 Elf_Internal_Sym * sym;
109 {
110 /* Local symbols do not count, but target specific ones might. */
111 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
112 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
113 return false;
114
115 /* Function symbols do not count. */
116 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
117 return false;
118
119 /* If the section is undefined, then so is the symbol. */
120 if (sym->st_shndx == SHN_UNDEF)
121 return false;
122
123 /* If the symbol is defined in the common section, then
124 it is a common definition and so does not count. */
125 if (sym->st_shndx == SHN_COMMON)
126 return false;
127
128 /* If the symbol is in a target specific section then we
129 must rely upon the backend to tell us what it is. */
130 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
131 /* FIXME - this function is not coded yet:
132
133 return _bfd_is_global_symbol_definition (abfd, sym);
134
135 Instead for now assume that the definition is not global,
136 Even if this is wrong, at least the linker will behave
137 in the same way that it used to do. */
138 return false;
139
140 return true;
141 }
142
143 /* Search the symbol table of the archive element of the archive ABFD
144 whose archive map contains a mention of SYMDEF, and determine if
145 the symbol is defined in this element. */
146 static boolean
147 elf_link_is_defined_archive_symbol (abfd, symdef)
148 bfd * abfd;
149 carsym * symdef;
150 {
151 Elf_Internal_Shdr * hdr;
152 bfd_size_type symcount;
153 bfd_size_type extsymcount;
154 bfd_size_type extsymoff;
155 Elf_Internal_Sym *isymbuf;
156 Elf_Internal_Sym *isym;
157 Elf_Internal_Sym *isymend;
158 boolean result;
159
160 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
161 if (abfd == (bfd *) NULL)
162 return false;
163
164 if (! bfd_check_format (abfd, bfd_object))
165 return false;
166
167 /* If we have already included the element containing this symbol in the
168 link then we do not need to include it again. Just claim that any symbol
169 it contains is not a definition, so that our caller will not decide to
170 (re)include this element. */
171 if (abfd->archive_pass)
172 return false;
173
174 /* Select the appropriate symbol table. */
175 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
176 hdr = &elf_tdata (abfd)->symtab_hdr;
177 else
178 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
179
180 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
181
182 /* The sh_info field of the symtab header tells us where the
183 external symbols start. We don't care about the local symbols. */
184 if (elf_bad_symtab (abfd))
185 {
186 extsymcount = symcount;
187 extsymoff = 0;
188 }
189 else
190 {
191 extsymcount = symcount - hdr->sh_info;
192 extsymoff = hdr->sh_info;
193 }
194
195 if (extsymcount == 0)
196 return false;
197
198 /* Read in the symbol table. */
199 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
200 NULL, NULL, NULL);
201 if (isymbuf == NULL)
202 return false;
203
204 /* Scan the symbol table looking for SYMDEF. */
205 result = false;
206 for (isym = isymbuf, isymend = isymbuf + extsymcount; isym < isymend; isym++)
207 {
208 const char *name;
209
210 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
211 isym->st_name);
212 if (name == (const char *) NULL)
213 break;
214
215 if (strcmp (name, symdef->name) == 0)
216 {
217 result = is_global_data_symbol_definition (abfd, isym);
218 break;
219 }
220 }
221
222 free (isymbuf);
223
224 return result;
225 }
226 \f
227 /* Add symbols from an ELF archive file to the linker hash table. We
228 don't use _bfd_generic_link_add_archive_symbols because of a
229 problem which arises on UnixWare. The UnixWare libc.so is an
230 archive which includes an entry libc.so.1 which defines a bunch of
231 symbols. The libc.so archive also includes a number of other
232 object files, which also define symbols, some of which are the same
233 as those defined in libc.so.1. Correct linking requires that we
234 consider each object file in turn, and include it if it defines any
235 symbols we need. _bfd_generic_link_add_archive_symbols does not do
236 this; it looks through the list of undefined symbols, and includes
237 any object file which defines them. When this algorithm is used on
238 UnixWare, it winds up pulling in libc.so.1 early and defining a
239 bunch of symbols. This means that some of the other objects in the
240 archive are not included in the link, which is incorrect since they
241 precede libc.so.1 in the archive.
242
243 Fortunately, ELF archive handling is simpler than that done by
244 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
245 oddities. In ELF, if we find a symbol in the archive map, and the
246 symbol is currently undefined, we know that we must pull in that
247 object file.
248
249 Unfortunately, we do have to make multiple passes over the symbol
250 table until nothing further is resolved. */
251
252 static boolean
253 elf_link_add_archive_symbols (abfd, info)
254 bfd *abfd;
255 struct bfd_link_info *info;
256 {
257 symindex c;
258 boolean *defined = NULL;
259 boolean *included = NULL;
260 carsym *symdefs;
261 boolean loop;
262 bfd_size_type amt;
263
264 if (! bfd_has_map (abfd))
265 {
266 /* An empty archive is a special case. */
267 if (bfd_openr_next_archived_file (abfd, (bfd *) NULL) == NULL)
268 return true;
269 bfd_set_error (bfd_error_no_armap);
270 return false;
271 }
272
273 /* Keep track of all symbols we know to be already defined, and all
274 files we know to be already included. This is to speed up the
275 second and subsequent passes. */
276 c = bfd_ardata (abfd)->symdef_count;
277 if (c == 0)
278 return true;
279 amt = c;
280 amt *= sizeof (boolean);
281 defined = (boolean *) bfd_zmalloc (amt);
282 included = (boolean *) bfd_zmalloc (amt);
283 if (defined == (boolean *) NULL || included == (boolean *) NULL)
284 goto error_return;
285
286 symdefs = bfd_ardata (abfd)->symdefs;
287
288 do
289 {
290 file_ptr last;
291 symindex i;
292 carsym *symdef;
293 carsym *symdefend;
294
295 loop = false;
296 last = -1;
297
298 symdef = symdefs;
299 symdefend = symdef + c;
300 for (i = 0; symdef < symdefend; symdef++, i++)
301 {
302 struct elf_link_hash_entry *h;
303 bfd *element;
304 struct bfd_link_hash_entry *undefs_tail;
305 symindex mark;
306
307 if (defined[i] || included[i])
308 continue;
309 if (symdef->file_offset == last)
310 {
311 included[i] = true;
312 continue;
313 }
314
315 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
316 false, false, false);
317
318 if (h == NULL)
319 {
320 char *p, *copy;
321 size_t len, first;
322
323 /* If this is a default version (the name contains @@),
324 look up the symbol again with only one `@' as well
325 as without the version. The effect is that references
326 to the symbol with and without the version will be
327 matched by the default symbol in the archive. */
328
329 p = strchr (symdef->name, ELF_VER_CHR);
330 if (p == NULL || p[1] != ELF_VER_CHR)
331 continue;
332
333 /* First check with only one `@'. */
334 len = strlen (symdef->name);
335 copy = bfd_alloc (abfd, (bfd_size_type) len);
336 if (copy == NULL)
337 goto error_return;
338 first = p - symdef->name + 1;
339 memcpy (copy, symdef->name, first);
340 memcpy (copy + first, symdef->name + first + 1, len - first);
341
342 h = elf_link_hash_lookup (elf_hash_table (info), copy,
343 false, false, false);
344
345 if (h == NULL)
346 {
347 /* We also need to check references to the symbol
348 without the version. */
349
350 copy[first - 1] = '\0';
351 h = elf_link_hash_lookup (elf_hash_table (info),
352 copy, false, false, false);
353 }
354
355 bfd_release (abfd, copy);
356 }
357
358 if (h == NULL)
359 continue;
360
361 if (h->root.type == bfd_link_hash_common)
362 {
363 /* We currently have a common symbol. The archive map contains
364 a reference to this symbol, so we may want to include it. We
365 only want to include it however, if this archive element
366 contains a definition of the symbol, not just another common
367 declaration of it.
368
369 Unfortunately some archivers (including GNU ar) will put
370 declarations of common symbols into their archive maps, as
371 well as real definitions, so we cannot just go by the archive
372 map alone. Instead we must read in the element's symbol
373 table and check that to see what kind of symbol definition
374 this is. */
375 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
376 continue;
377 }
378 else if (h->root.type != bfd_link_hash_undefined)
379 {
380 if (h->root.type != bfd_link_hash_undefweak)
381 defined[i] = true;
382 continue;
383 }
384
385 /* We need to include this archive member. */
386 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
387 if (element == (bfd *) NULL)
388 goto error_return;
389
390 if (! bfd_check_format (element, bfd_object))
391 goto error_return;
392
393 /* Doublecheck that we have not included this object
394 already--it should be impossible, but there may be
395 something wrong with the archive. */
396 if (element->archive_pass != 0)
397 {
398 bfd_set_error (bfd_error_bad_value);
399 goto error_return;
400 }
401 element->archive_pass = 1;
402
403 undefs_tail = info->hash->undefs_tail;
404
405 if (! (*info->callbacks->add_archive_element) (info, element,
406 symdef->name))
407 goto error_return;
408 if (! elf_link_add_object_symbols (element, info))
409 goto error_return;
410
411 /* If there are any new undefined symbols, we need to make
412 another pass through the archive in order to see whether
413 they can be defined. FIXME: This isn't perfect, because
414 common symbols wind up on undefs_tail and because an
415 undefined symbol which is defined later on in this pass
416 does not require another pass. This isn't a bug, but it
417 does make the code less efficient than it could be. */
418 if (undefs_tail != info->hash->undefs_tail)
419 loop = true;
420
421 /* Look backward to mark all symbols from this object file
422 which we have already seen in this pass. */
423 mark = i;
424 do
425 {
426 included[mark] = true;
427 if (mark == 0)
428 break;
429 --mark;
430 }
431 while (symdefs[mark].file_offset == symdef->file_offset);
432
433 /* We mark subsequent symbols from this object file as we go
434 on through the loop. */
435 last = symdef->file_offset;
436 }
437 }
438 while (loop);
439
440 free (defined);
441 free (included);
442
443 return true;
444
445 error_return:
446 if (defined != (boolean *) NULL)
447 free (defined);
448 if (included != (boolean *) NULL)
449 free (included);
450 return false;
451 }
452
453 /* This function is called when we want to define a new symbol. It
454 handles the various cases which arise when we find a definition in
455 a dynamic object, or when there is already a definition in a
456 dynamic object. The new symbol is described by NAME, SYM, PSEC,
457 and PVALUE. We set SYM_HASH to the hash table entry. We set
458 OVERRIDE if the old symbol is overriding a new definition. We set
459 TYPE_CHANGE_OK if it is OK for the type to change. We set
460 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
461 change, we mean that we shouldn't warn if the type or size does
462 change. DT_NEEDED indicates if it comes from a DT_NEEDED entry of
463 a shared object. */
464
465 static boolean
466 elf_merge_symbol (abfd, info, name, sym, psec, pvalue, sym_hash,
467 override, type_change_ok, size_change_ok, dt_needed)
468 bfd *abfd;
469 struct bfd_link_info *info;
470 const char *name;
471 Elf_Internal_Sym *sym;
472 asection **psec;
473 bfd_vma *pvalue;
474 struct elf_link_hash_entry **sym_hash;
475 boolean *override;
476 boolean *type_change_ok;
477 boolean *size_change_ok;
478 boolean dt_needed;
479 {
480 asection *sec;
481 struct elf_link_hash_entry *h;
482 int bind;
483 bfd *oldbfd;
484 boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
485
486 *override = false;
487
488 sec = *psec;
489 bind = ELF_ST_BIND (sym->st_info);
490
491 if (! bfd_is_und_section (sec))
492 h = elf_link_hash_lookup (elf_hash_table (info), name, true, false, false);
493 else
494 h = ((struct elf_link_hash_entry *)
495 bfd_wrapped_link_hash_lookup (abfd, info, name, true, false, false));
496 if (h == NULL)
497 return false;
498 *sym_hash = h;
499
500 /* This code is for coping with dynamic objects, and is only useful
501 if we are doing an ELF link. */
502 if (info->hash->creator != abfd->xvec)
503 return true;
504
505 /* For merging, we only care about real symbols. */
506
507 while (h->root.type == bfd_link_hash_indirect
508 || h->root.type == bfd_link_hash_warning)
509 h = (struct elf_link_hash_entry *) h->root.u.i.link;
510
511 /* If we just created the symbol, mark it as being an ELF symbol.
512 Other than that, there is nothing to do--there is no merge issue
513 with a newly defined symbol--so we just return. */
514
515 if (h->root.type == bfd_link_hash_new)
516 {
517 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
518 return true;
519 }
520
521 /* OLDBFD is a BFD associated with the existing symbol. */
522
523 switch (h->root.type)
524 {
525 default:
526 oldbfd = NULL;
527 break;
528
529 case bfd_link_hash_undefined:
530 case bfd_link_hash_undefweak:
531 oldbfd = h->root.u.undef.abfd;
532 break;
533
534 case bfd_link_hash_defined:
535 case bfd_link_hash_defweak:
536 oldbfd = h->root.u.def.section->owner;
537 break;
538
539 case bfd_link_hash_common:
540 oldbfd = h->root.u.c.p->section->owner;
541 break;
542 }
543
544 /* In cases involving weak versioned symbols, we may wind up trying
545 to merge a symbol with itself. Catch that here, to avoid the
546 confusion that results if we try to override a symbol with
547 itself. The additional tests catch cases like
548 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
549 dynamic object, which we do want to handle here. */
550 if (abfd == oldbfd
551 && ((abfd->flags & DYNAMIC) == 0
552 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
553 return true;
554
555 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
556 respectively, is from a dynamic object. */
557
558 if ((abfd->flags & DYNAMIC) != 0)
559 newdyn = true;
560 else
561 newdyn = false;
562
563 if (oldbfd != NULL)
564 olddyn = (oldbfd->flags & DYNAMIC) != 0;
565 else
566 {
567 asection *hsec;
568
569 /* This code handles the special SHN_MIPS_{TEXT,DATA} section
570 indices used by MIPS ELF. */
571 switch (h->root.type)
572 {
573 default:
574 hsec = NULL;
575 break;
576
577 case bfd_link_hash_defined:
578 case bfd_link_hash_defweak:
579 hsec = h->root.u.def.section;
580 break;
581
582 case bfd_link_hash_common:
583 hsec = h->root.u.c.p->section;
584 break;
585 }
586
587 if (hsec == NULL)
588 olddyn = false;
589 else
590 olddyn = (hsec->symbol->flags & BSF_DYNAMIC) != 0;
591 }
592
593 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
594 respectively, appear to be a definition rather than reference. */
595
596 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
597 newdef = false;
598 else
599 newdef = true;
600
601 if (h->root.type == bfd_link_hash_undefined
602 || h->root.type == bfd_link_hash_undefweak
603 || h->root.type == bfd_link_hash_common)
604 olddef = false;
605 else
606 olddef = true;
607
608 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
609 symbol, respectively, appears to be a common symbol in a dynamic
610 object. If a symbol appears in an uninitialized section, and is
611 not weak, and is not a function, then it may be a common symbol
612 which was resolved when the dynamic object was created. We want
613 to treat such symbols specially, because they raise special
614 considerations when setting the symbol size: if the symbol
615 appears as a common symbol in a regular object, and the size in
616 the regular object is larger, we must make sure that we use the
617 larger size. This problematic case can always be avoided in C,
618 but it must be handled correctly when using Fortran shared
619 libraries.
620
621 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
622 likewise for OLDDYNCOMMON and OLDDEF.
623
624 Note that this test is just a heuristic, and that it is quite
625 possible to have an uninitialized symbol in a shared object which
626 is really a definition, rather than a common symbol. This could
627 lead to some minor confusion when the symbol really is a common
628 symbol in some regular object. However, I think it will be
629 harmless. */
630
631 if (newdyn
632 && newdef
633 && (sec->flags & SEC_ALLOC) != 0
634 && (sec->flags & SEC_LOAD) == 0
635 && sym->st_size > 0
636 && bind != STB_WEAK
637 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
638 newdyncommon = true;
639 else
640 newdyncommon = false;
641
642 if (olddyn
643 && olddef
644 && h->root.type == bfd_link_hash_defined
645 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
646 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
647 && (h->root.u.def.section->flags & SEC_LOAD) == 0
648 && h->size > 0
649 && h->type != STT_FUNC)
650 olddyncommon = true;
651 else
652 olddyncommon = false;
653
654 /* It's OK to change the type if either the existing symbol or the
655 new symbol is weak unless it comes from a DT_NEEDED entry of
656 a shared object, in which case, the DT_NEEDED entry may not be
657 required at the run time. */
658
659 if ((! dt_needed && h->root.type == bfd_link_hash_defweak)
660 || h->root.type == bfd_link_hash_undefweak
661 || bind == STB_WEAK)
662 *type_change_ok = true;
663
664 /* It's OK to change the size if either the existing symbol or the
665 new symbol is weak, or if the old symbol is undefined. */
666
667 if (*type_change_ok
668 || h->root.type == bfd_link_hash_undefined)
669 *size_change_ok = true;
670
671 /* If both the old and the new symbols look like common symbols in a
672 dynamic object, set the size of the symbol to the larger of the
673 two. */
674
675 if (olddyncommon
676 && newdyncommon
677 && sym->st_size != h->size)
678 {
679 /* Since we think we have two common symbols, issue a multiple
680 common warning if desired. Note that we only warn if the
681 size is different. If the size is the same, we simply let
682 the old symbol override the new one as normally happens with
683 symbols defined in dynamic objects. */
684
685 if (! ((*info->callbacks->multiple_common)
686 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
687 h->size, abfd, bfd_link_hash_common, sym->st_size)))
688 return false;
689
690 if (sym->st_size > h->size)
691 h->size = sym->st_size;
692
693 *size_change_ok = true;
694 }
695
696 /* If we are looking at a dynamic object, and we have found a
697 definition, we need to see if the symbol was already defined by
698 some other object. If so, we want to use the existing
699 definition, and we do not want to report a multiple symbol
700 definition error; we do this by clobbering *PSEC to be
701 bfd_und_section_ptr.
702
703 We treat a common symbol as a definition if the symbol in the
704 shared library is a function, since common symbols always
705 represent variables; this can cause confusion in principle, but
706 any such confusion would seem to indicate an erroneous program or
707 shared library. We also permit a common symbol in a regular
708 object to override a weak symbol in a shared object.
709
710 We prefer a non-weak definition in a shared library to a weak
711 definition in the executable unless it comes from a DT_NEEDED
712 entry of a shared object, in which case, the DT_NEEDED entry
713 may not be required at the run time. */
714
715 if (newdyn
716 && newdef
717 && (olddef
718 || (h->root.type == bfd_link_hash_common
719 && (bind == STB_WEAK
720 || ELF_ST_TYPE (sym->st_info) == STT_FUNC)))
721 && (h->root.type != bfd_link_hash_defweak
722 || dt_needed
723 || bind == STB_WEAK))
724 {
725 *override = true;
726 newdef = false;
727 newdyncommon = false;
728
729 *psec = sec = bfd_und_section_ptr;
730 *size_change_ok = true;
731
732 /* If we get here when the old symbol is a common symbol, then
733 we are explicitly letting it override a weak symbol or
734 function in a dynamic object, and we don't want to warn about
735 a type change. If the old symbol is a defined symbol, a type
736 change warning may still be appropriate. */
737
738 if (h->root.type == bfd_link_hash_common)
739 *type_change_ok = true;
740 }
741
742 /* Handle the special case of an old common symbol merging with a
743 new symbol which looks like a common symbol in a shared object.
744 We change *PSEC and *PVALUE to make the new symbol look like a
745 common symbol, and let _bfd_generic_link_add_one_symbol will do
746 the right thing. */
747
748 if (newdyncommon
749 && h->root.type == bfd_link_hash_common)
750 {
751 *override = true;
752 newdef = false;
753 newdyncommon = false;
754 *pvalue = sym->st_size;
755 *psec = sec = bfd_com_section_ptr;
756 *size_change_ok = true;
757 }
758
759 /* If the old symbol is from a dynamic object, and the new symbol is
760 a definition which is not from a dynamic object, then the new
761 symbol overrides the old symbol. Symbols from regular files
762 always take precedence over symbols from dynamic objects, even if
763 they are defined after the dynamic object in the link.
764
765 As above, we again permit a common symbol in a regular object to
766 override a definition in a shared object if the shared object
767 symbol is a function or is weak.
768
769 As above, we permit a non-weak definition in a shared object to
770 override a weak definition in a regular object. */
771
772 if (! newdyn
773 && (newdef
774 || (bfd_is_com_section (sec)
775 && (h->root.type == bfd_link_hash_defweak
776 || h->type == STT_FUNC)))
777 && olddyn
778 && olddef
779 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
780 && (bind != STB_WEAK
781 || h->root.type == bfd_link_hash_defweak))
782 {
783 /* Change the hash table entry to undefined, and let
784 _bfd_generic_link_add_one_symbol do the right thing with the
785 new definition. */
786
787 h->root.type = bfd_link_hash_undefined;
788 h->root.u.undef.abfd = h->root.u.def.section->owner;
789 *size_change_ok = true;
790
791 olddef = false;
792 olddyncommon = false;
793
794 /* We again permit a type change when a common symbol may be
795 overriding a function. */
796
797 if (bfd_is_com_section (sec))
798 *type_change_ok = true;
799
800 /* This union may have been set to be non-NULL when this symbol
801 was seen in a dynamic object. We must force the union to be
802 NULL, so that it is correct for a regular symbol. */
803
804 h->verinfo.vertree = NULL;
805
806 /* In this special case, if H is the target of an indirection,
807 we want the caller to frob with H rather than with the
808 indirect symbol. That will permit the caller to redefine the
809 target of the indirection, rather than the indirect symbol
810 itself. FIXME: This will break the -y option if we store a
811 symbol with a different name. */
812 *sym_hash = h;
813 }
814
815 /* Handle the special case of a new common symbol merging with an
816 old symbol that looks like it might be a common symbol defined in
817 a shared object. Note that we have already handled the case in
818 which a new common symbol should simply override the definition
819 in the shared library. */
820
821 if (! newdyn
822 && bfd_is_com_section (sec)
823 && olddyncommon)
824 {
825 /* It would be best if we could set the hash table entry to a
826 common symbol, but we don't know what to use for the section
827 or the alignment. */
828 if (! ((*info->callbacks->multiple_common)
829 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
830 h->size, abfd, bfd_link_hash_common, sym->st_size)))
831 return false;
832
833 /* If the predumed common symbol in the dynamic object is
834 larger, pretend that the new symbol has its size. */
835
836 if (h->size > *pvalue)
837 *pvalue = h->size;
838
839 /* FIXME: We no longer know the alignment required by the symbol
840 in the dynamic object, so we just wind up using the one from
841 the regular object. */
842
843 olddef = false;
844 olddyncommon = false;
845
846 h->root.type = bfd_link_hash_undefined;
847 h->root.u.undef.abfd = h->root.u.def.section->owner;
848
849 *size_change_ok = true;
850 *type_change_ok = true;
851
852 h->verinfo.vertree = NULL;
853 }
854
855 /* Handle the special case of a weak definition in a regular object
856 followed by a non-weak definition in a shared object. In this
857 case, we prefer the definition in the shared object unless it
858 comes from a DT_NEEDED entry of a shared object, in which case,
859 the DT_NEEDED entry may not be required at the run time. */
860 if (olddef
861 && ! dt_needed
862 && h->root.type == bfd_link_hash_defweak
863 && newdef
864 && newdyn
865 && bind != STB_WEAK)
866 {
867 /* To make this work we have to frob the flags so that the rest
868 of the code does not think we are using the regular
869 definition. */
870 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
871 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
872 else if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0)
873 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
874 h->elf_link_hash_flags &= ~ (ELF_LINK_HASH_DEF_REGULAR
875 | ELF_LINK_HASH_DEF_DYNAMIC);
876
877 /* If H is the target of an indirection, we want the caller to
878 use H rather than the indirect symbol. Otherwise if we are
879 defining a new indirect symbol we will wind up attaching it
880 to the entry we are overriding. */
881 *sym_hash = h;
882 }
883
884 /* Handle the special case of a non-weak definition in a shared
885 object followed by a weak definition in a regular object. In
886 this case we prefer to definition in the shared object. To make
887 this work we have to tell the caller to not treat the new symbol
888 as a definition. */
889 if (olddef
890 && olddyn
891 && h->root.type != bfd_link_hash_defweak
892 && newdef
893 && ! newdyn
894 && bind == STB_WEAK)
895 *override = true;
896
897 return true;
898 }
899
900 /* This function is called to create an indirect symbol from the
901 default for the symbol with the default version if needed. The
902 symbol is described by H, NAME, SYM, PSEC, VALUE, and OVERRIDE. We
903 set DYNSYM if the new indirect symbol is dynamic. DT_NEEDED
904 indicates if it comes from a DT_NEEDED entry of a shared object. */
905
906 static boolean
907 elf_add_default_symbol (abfd, info, h, name, sym, psec, value,
908 dynsym, override, dt_needed)
909 bfd *abfd;
910 struct bfd_link_info *info;
911 struct elf_link_hash_entry *h;
912 const char *name;
913 Elf_Internal_Sym *sym;
914 asection **psec;
915 bfd_vma *value;
916 boolean *dynsym;
917 boolean override;
918 boolean dt_needed;
919 {
920 boolean type_change_ok;
921 boolean size_change_ok;
922 char *shortname;
923 struct elf_link_hash_entry *hi;
924 struct elf_backend_data *bed;
925 boolean collect;
926 boolean dynamic;
927 char *p;
928 size_t len, shortlen;
929 asection *sec;
930
931 /* If this symbol has a version, and it is the default version, we
932 create an indirect symbol from the default name to the fully
933 decorated name. This will cause external references which do not
934 specify a version to be bound to this version of the symbol. */
935 p = strchr (name, ELF_VER_CHR);
936 if (p == NULL || p[1] != ELF_VER_CHR)
937 return true;
938
939 if (override)
940 {
941 /* We are overridden by an old defition. We need to check if we
942 need to create the indirect symbol from the default name. */
943 hi = elf_link_hash_lookup (elf_hash_table (info), name, true,
944 false, false);
945 BFD_ASSERT (hi != NULL);
946 if (hi == h)
947 return true;
948 while (hi->root.type == bfd_link_hash_indirect
949 || hi->root.type == bfd_link_hash_warning)
950 {
951 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
952 if (hi == h)
953 return true;
954 }
955 }
956
957 bed = get_elf_backend_data (abfd);
958 collect = bed->collect;
959 dynamic = (abfd->flags & DYNAMIC) != 0;
960
961 shortlen = p - name;
962 shortname = bfd_hash_allocate (&info->hash->table, shortlen + 1);
963 if (shortname == NULL)
964 return false;
965 memcpy (shortname, name, shortlen);
966 shortname[shortlen] = '\0';
967
968 /* We are going to create a new symbol. Merge it with any existing
969 symbol with this name. For the purposes of the merge, act as
970 though we were defining the symbol we just defined, although we
971 actually going to define an indirect symbol. */
972 type_change_ok = false;
973 size_change_ok = false;
974 sec = *psec;
975 if (! elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
976 &hi, &override, &type_change_ok,
977 &size_change_ok, dt_needed))
978 return false;
979
980 if (! override)
981 {
982 if (! (_bfd_generic_link_add_one_symbol
983 (info, abfd, shortname, BSF_INDIRECT, bfd_ind_section_ptr,
984 (bfd_vma) 0, name, false, collect,
985 (struct bfd_link_hash_entry **) &hi)))
986 return false;
987 }
988 else
989 {
990 /* In this case the symbol named SHORTNAME is overriding the
991 indirect symbol we want to add. We were planning on making
992 SHORTNAME an indirect symbol referring to NAME. SHORTNAME
993 is the name without a version. NAME is the fully versioned
994 name, and it is the default version.
995
996 Overriding means that we already saw a definition for the
997 symbol SHORTNAME in a regular object, and it is overriding
998 the symbol defined in the dynamic object.
999
1000 When this happens, we actually want to change NAME, the
1001 symbol we just added, to refer to SHORTNAME. This will cause
1002 references to NAME in the shared object to become references
1003 to SHORTNAME in the regular object. This is what we expect
1004 when we override a function in a shared object: that the
1005 references in the shared object will be mapped to the
1006 definition in the regular object. */
1007
1008 while (hi->root.type == bfd_link_hash_indirect
1009 || hi->root.type == bfd_link_hash_warning)
1010 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1011
1012 h->root.type = bfd_link_hash_indirect;
1013 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
1014 if (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)
1015 {
1016 h->elf_link_hash_flags &=~ ELF_LINK_HASH_DEF_DYNAMIC;
1017 hi->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
1018 if (hi->elf_link_hash_flags
1019 & (ELF_LINK_HASH_REF_REGULAR
1020 | ELF_LINK_HASH_DEF_REGULAR))
1021 {
1022 if (! _bfd_elf_link_record_dynamic_symbol (info, hi))
1023 return false;
1024 }
1025 }
1026
1027 /* Now set HI to H, so that the following code will set the
1028 other fields correctly. */
1029 hi = h;
1030 }
1031
1032 /* If there is a duplicate definition somewhere, then HI may not
1033 point to an indirect symbol. We will have reported an error to
1034 the user in that case. */
1035
1036 if (hi->root.type == bfd_link_hash_indirect)
1037 {
1038 struct elf_link_hash_entry *ht;
1039
1040 /* If the symbol became indirect, then we assume that we have
1041 not seen a definition before. */
1042 BFD_ASSERT ((hi->elf_link_hash_flags
1043 & (ELF_LINK_HASH_DEF_DYNAMIC
1044 | ELF_LINK_HASH_DEF_REGULAR)) == 0);
1045
1046 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
1047 (*bed->elf_backend_copy_indirect_symbol) (ht, hi);
1048
1049 /* See if the new flags lead us to realize that the symbol must
1050 be dynamic. */
1051 if (! *dynsym)
1052 {
1053 if (! dynamic)
1054 {
1055 if (info->shared
1056 || ((hi->elf_link_hash_flags
1057 & ELF_LINK_HASH_REF_DYNAMIC) != 0))
1058 *dynsym = true;
1059 }
1060 else
1061 {
1062 if ((hi->elf_link_hash_flags
1063 & ELF_LINK_HASH_REF_REGULAR) != 0)
1064 *dynsym = true;
1065 }
1066 }
1067 }
1068
1069 /* We also need to define an indirection from the nondefault version
1070 of the symbol. */
1071
1072 len = strlen (name);
1073 shortname = bfd_hash_allocate (&info->hash->table, len);
1074 if (shortname == NULL)
1075 return false;
1076 memcpy (shortname, name, shortlen);
1077 memcpy (shortname + shortlen, p + 1, len - shortlen);
1078
1079 /* Once again, merge with any existing symbol. */
1080 type_change_ok = false;
1081 size_change_ok = false;
1082 sec = *psec;
1083 if (! elf_merge_symbol (abfd, info, shortname, sym, &sec, value,
1084 &hi, &override, &type_change_ok,
1085 &size_change_ok, dt_needed))
1086 return false;
1087
1088 if (override)
1089 {
1090 /* Here SHORTNAME is a versioned name, so we don't expect to see
1091 the type of override we do in the case above unless it is
1092 overridden by a versioned definiton. */
1093 if (hi->root.type != bfd_link_hash_defined
1094 && hi->root.type != bfd_link_hash_defweak)
1095 (*_bfd_error_handler)
1096 (_("%s: warning: unexpected redefinition of indirect versioned symbol `%s'"),
1097 bfd_archive_filename (abfd), shortname);
1098 }
1099 else
1100 {
1101 if (! (_bfd_generic_link_add_one_symbol
1102 (info, abfd, shortname, BSF_INDIRECT,
1103 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1104 collect, (struct bfd_link_hash_entry **) &hi)))
1105 return false;
1106
1107 /* If there is a duplicate definition somewhere, then HI may not
1108 point to an indirect symbol. We will have reported an error
1109 to the user in that case. */
1110
1111 if (hi->root.type == bfd_link_hash_indirect)
1112 {
1113 /* If the symbol became indirect, then we assume that we have
1114 not seen a definition before. */
1115 BFD_ASSERT ((hi->elf_link_hash_flags
1116 & (ELF_LINK_HASH_DEF_DYNAMIC
1117 | ELF_LINK_HASH_DEF_REGULAR)) == 0);
1118
1119 (*bed->elf_backend_copy_indirect_symbol) (h, hi);
1120
1121 /* See if the new flags lead us to realize that the symbol
1122 must be dynamic. */
1123 if (! *dynsym)
1124 {
1125 if (! dynamic)
1126 {
1127 if (info->shared
1128 || ((hi->elf_link_hash_flags
1129 & ELF_LINK_HASH_REF_DYNAMIC) != 0))
1130 *dynsym = true;
1131 }
1132 else
1133 {
1134 if ((hi->elf_link_hash_flags
1135 & ELF_LINK_HASH_REF_REGULAR) != 0)
1136 *dynsym = true;
1137 }
1138 }
1139 }
1140 }
1141
1142 return true;
1143 }
1144
1145 /* Add symbols from an ELF object file to the linker hash table. */
1146
1147 static boolean
1148 elf_link_add_object_symbols (abfd, info)
1149 bfd *abfd;
1150 struct bfd_link_info *info;
1151 {
1152 boolean (*add_symbol_hook) PARAMS ((bfd *, struct bfd_link_info *,
1153 const Elf_Internal_Sym *,
1154 const char **, flagword *,
1155 asection **, bfd_vma *));
1156 boolean (*check_relocs) PARAMS ((bfd *, struct bfd_link_info *,
1157 asection *, const Elf_Internal_Rela *));
1158 boolean collect;
1159 Elf_Internal_Shdr *hdr;
1160 bfd_size_type symcount;
1161 bfd_size_type extsymcount;
1162 bfd_size_type extsymoff;
1163 struct elf_link_hash_entry **sym_hash;
1164 boolean dynamic;
1165 Elf_External_Versym *extversym = NULL;
1166 Elf_External_Versym *ever;
1167 struct elf_link_hash_entry *weaks;
1168 Elf_Internal_Sym *isymbuf = NULL;
1169 Elf_Internal_Sym *isym;
1170 Elf_Internal_Sym *isymend;
1171 struct elf_backend_data *bed;
1172 boolean dt_needed;
1173 struct elf_link_hash_table * hash_table;
1174 bfd_size_type amt;
1175
1176 hash_table = elf_hash_table (info);
1177
1178 bed = get_elf_backend_data (abfd);
1179 add_symbol_hook = bed->elf_add_symbol_hook;
1180 collect = bed->collect;
1181
1182 if ((abfd->flags & DYNAMIC) == 0)
1183 dynamic = false;
1184 else
1185 {
1186 dynamic = true;
1187
1188 /* You can't use -r against a dynamic object. Also, there's no
1189 hope of using a dynamic object which does not exactly match
1190 the format of the output file. */
1191 if (info->relocateable || info->hash->creator != abfd->xvec)
1192 {
1193 bfd_set_error (bfd_error_invalid_operation);
1194 goto error_return;
1195 }
1196 }
1197
1198 /* As a GNU extension, any input sections which are named
1199 .gnu.warning.SYMBOL are treated as warning symbols for the given
1200 symbol. This differs from .gnu.warning sections, which generate
1201 warnings when they are included in an output file. */
1202 if (! info->shared)
1203 {
1204 asection *s;
1205
1206 for (s = abfd->sections; s != NULL; s = s->next)
1207 {
1208 const char *name;
1209
1210 name = bfd_get_section_name (abfd, s);
1211 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
1212 {
1213 char *msg;
1214 bfd_size_type sz;
1215
1216 name += sizeof ".gnu.warning." - 1;
1217
1218 /* If this is a shared object, then look up the symbol
1219 in the hash table. If it is there, and it is already
1220 been defined, then we will not be using the entry
1221 from this shared object, so we don't need to warn.
1222 FIXME: If we see the definition in a regular object
1223 later on, we will warn, but we shouldn't. The only
1224 fix is to keep track of what warnings we are supposed
1225 to emit, and then handle them all at the end of the
1226 link. */
1227 if (dynamic && abfd->xvec == info->hash->creator)
1228 {
1229 struct elf_link_hash_entry *h;
1230
1231 h = elf_link_hash_lookup (hash_table, name,
1232 false, false, true);
1233
1234 /* FIXME: What about bfd_link_hash_common? */
1235 if (h != NULL
1236 && (h->root.type == bfd_link_hash_defined
1237 || h->root.type == bfd_link_hash_defweak))
1238 {
1239 /* We don't want to issue this warning. Clobber
1240 the section size so that the warning does not
1241 get copied into the output file. */
1242 s->_raw_size = 0;
1243 continue;
1244 }
1245 }
1246
1247 sz = bfd_section_size (abfd, s);
1248 msg = (char *) bfd_alloc (abfd, sz + 1);
1249 if (msg == NULL)
1250 goto error_return;
1251
1252 if (! bfd_get_section_contents (abfd, s, msg, (file_ptr) 0, sz))
1253 goto error_return;
1254
1255 msg[sz] = '\0';
1256
1257 if (! (_bfd_generic_link_add_one_symbol
1258 (info, abfd, name, BSF_WARNING, s, (bfd_vma) 0, msg,
1259 false, collect, (struct bfd_link_hash_entry **) NULL)))
1260 goto error_return;
1261
1262 if (! info->relocateable)
1263 {
1264 /* Clobber the section size so that the warning does
1265 not get copied into the output file. */
1266 s->_raw_size = 0;
1267 }
1268 }
1269 }
1270 }
1271
1272 dt_needed = false;
1273 if (! dynamic)
1274 {
1275 /* If we are creating a shared library, create all the dynamic
1276 sections immediately. We need to attach them to something,
1277 so we attach them to this BFD, provided it is the right
1278 format. FIXME: If there are no input BFD's of the same
1279 format as the output, we can't make a shared library. */
1280 if (info->shared
1281 && is_elf_hash_table (info)
1282 && ! hash_table->dynamic_sections_created
1283 && abfd->xvec == info->hash->creator)
1284 {
1285 if (! elf_link_create_dynamic_sections (abfd, info))
1286 goto error_return;
1287 }
1288 }
1289 else if (! is_elf_hash_table (info))
1290 goto error_return;
1291 else
1292 {
1293 asection *s;
1294 boolean add_needed;
1295 const char *name;
1296 bfd_size_type oldsize;
1297 bfd_size_type strindex;
1298
1299 /* Find the name to use in a DT_NEEDED entry that refers to this
1300 object. If the object has a DT_SONAME entry, we use it.
1301 Otherwise, if the generic linker stuck something in
1302 elf_dt_name, we use that. Otherwise, we just use the file
1303 name. If the generic linker put a null string into
1304 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
1305 there is a DT_SONAME entry. */
1306 add_needed = true;
1307 name = bfd_get_filename (abfd);
1308 if (elf_dt_name (abfd) != NULL)
1309 {
1310 name = elf_dt_name (abfd);
1311 if (*name == '\0')
1312 {
1313 if (elf_dt_soname (abfd) != NULL)
1314 dt_needed = true;
1315
1316 add_needed = false;
1317 }
1318 }
1319 s = bfd_get_section_by_name (abfd, ".dynamic");
1320 if (s != NULL)
1321 {
1322 Elf_External_Dyn *dynbuf = NULL;
1323 Elf_External_Dyn *extdyn;
1324 Elf_External_Dyn *extdynend;
1325 int elfsec;
1326 unsigned long shlink;
1327 int rpath;
1328 int runpath;
1329
1330 dynbuf = (Elf_External_Dyn *) bfd_malloc (s->_raw_size);
1331 if (dynbuf == NULL)
1332 goto error_return;
1333
1334 if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf,
1335 (file_ptr) 0, s->_raw_size))
1336 goto error_free_dyn;
1337
1338 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1339 if (elfsec == -1)
1340 goto error_free_dyn;
1341 shlink = elf_elfsections (abfd)[elfsec]->sh_link;
1342
1343 extdyn = dynbuf;
1344 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
1345 rpath = 0;
1346 runpath = 0;
1347 for (; extdyn < extdynend; extdyn++)
1348 {
1349 Elf_Internal_Dyn dyn;
1350
1351 elf_swap_dyn_in (abfd, extdyn, &dyn);
1352 if (dyn.d_tag == DT_SONAME)
1353 {
1354 unsigned int tagv = dyn.d_un.d_val;
1355 name = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1356 if (name == NULL)
1357 goto error_free_dyn;
1358 }
1359 if (dyn.d_tag == DT_NEEDED)
1360 {
1361 struct bfd_link_needed_list *n, **pn;
1362 char *fnm, *anm;
1363 unsigned int tagv = dyn.d_un.d_val;
1364
1365 amt = sizeof (struct bfd_link_needed_list);
1366 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1367 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1368 if (n == NULL || fnm == NULL)
1369 goto error_free_dyn;
1370 amt = strlen (fnm) + 1;
1371 anm = bfd_alloc (abfd, amt);
1372 if (anm == NULL)
1373 goto error_free_dyn;
1374 memcpy (anm, fnm, (size_t) amt);
1375 n->name = anm;
1376 n->by = abfd;
1377 n->next = NULL;
1378 for (pn = & hash_table->needed;
1379 *pn != NULL;
1380 pn = &(*pn)->next)
1381 ;
1382 *pn = n;
1383 }
1384 if (dyn.d_tag == DT_RUNPATH)
1385 {
1386 struct bfd_link_needed_list *n, **pn;
1387 char *fnm, *anm;
1388 unsigned int tagv = dyn.d_un.d_val;
1389
1390 /* When we see DT_RPATH before DT_RUNPATH, we have
1391 to clear runpath. Do _NOT_ bfd_release, as that
1392 frees all more recently bfd_alloc'd blocks as
1393 well. */
1394 if (rpath && hash_table->runpath)
1395 hash_table->runpath = NULL;
1396
1397 amt = sizeof (struct bfd_link_needed_list);
1398 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1399 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1400 if (n == NULL || fnm == NULL)
1401 goto error_free_dyn;
1402 amt = strlen (fnm) + 1;
1403 anm = bfd_alloc (abfd, amt);
1404 if (anm == NULL)
1405 goto error_free_dyn;
1406 memcpy (anm, fnm, (size_t) amt);
1407 n->name = anm;
1408 n->by = abfd;
1409 n->next = NULL;
1410 for (pn = & hash_table->runpath;
1411 *pn != NULL;
1412 pn = &(*pn)->next)
1413 ;
1414 *pn = n;
1415 runpath = 1;
1416 rpath = 0;
1417 }
1418 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
1419 if (!runpath && dyn.d_tag == DT_RPATH)
1420 {
1421 struct bfd_link_needed_list *n, **pn;
1422 char *fnm, *anm;
1423 unsigned int tagv = dyn.d_un.d_val;
1424
1425 amt = sizeof (struct bfd_link_needed_list);
1426 n = (struct bfd_link_needed_list *) bfd_alloc (abfd, amt);
1427 fnm = bfd_elf_string_from_elf_section (abfd, shlink, tagv);
1428 if (n == NULL || fnm == NULL)
1429 goto error_free_dyn;
1430 amt = strlen (fnm) + 1;
1431 anm = bfd_alloc (abfd, amt);
1432 if (anm == NULL)
1433 {
1434 error_free_dyn:
1435 free (dynbuf);
1436 goto error_return;
1437 }
1438 memcpy (anm, fnm, (size_t) amt);
1439 n->name = anm;
1440 n->by = abfd;
1441 n->next = NULL;
1442 for (pn = & hash_table->runpath;
1443 *pn != NULL;
1444 pn = &(*pn)->next)
1445 ;
1446 *pn = n;
1447 rpath = 1;
1448 }
1449 }
1450
1451 free (dynbuf);
1452 }
1453
1454 /* We do not want to include any of the sections in a dynamic
1455 object in the output file. We hack by simply clobbering the
1456 list of sections in the BFD. This could be handled more
1457 cleanly by, say, a new section flag; the existing
1458 SEC_NEVER_LOAD flag is not the one we want, because that one
1459 still implies that the section takes up space in the output
1460 file. */
1461 bfd_section_list_clear (abfd);
1462
1463 /* If this is the first dynamic object found in the link, create
1464 the special sections required for dynamic linking. */
1465 if (! hash_table->dynamic_sections_created)
1466 if (! elf_link_create_dynamic_sections (abfd, info))
1467 goto error_return;
1468
1469 if (add_needed)
1470 {
1471 /* Add a DT_NEEDED entry for this dynamic object. */
1472 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
1473 strindex = _bfd_elf_strtab_add (hash_table->dynstr, name, false);
1474 if (strindex == (bfd_size_type) -1)
1475 goto error_return;
1476
1477 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
1478 {
1479 asection *sdyn;
1480 Elf_External_Dyn *dyncon, *dynconend;
1481
1482 /* The hash table size did not change, which means that
1483 the dynamic object name was already entered. If we
1484 have already included this dynamic object in the
1485 link, just ignore it. There is no reason to include
1486 a particular dynamic object more than once. */
1487 sdyn = bfd_get_section_by_name (hash_table->dynobj, ".dynamic");
1488 BFD_ASSERT (sdyn != NULL);
1489
1490 dyncon = (Elf_External_Dyn *) sdyn->contents;
1491 dynconend = (Elf_External_Dyn *) (sdyn->contents +
1492 sdyn->_raw_size);
1493 for (; dyncon < dynconend; dyncon++)
1494 {
1495 Elf_Internal_Dyn dyn;
1496
1497 elf_swap_dyn_in (hash_table->dynobj, dyncon, & dyn);
1498 if (dyn.d_tag == DT_NEEDED
1499 && dyn.d_un.d_val == strindex)
1500 {
1501 _bfd_elf_strtab_delref (hash_table->dynstr, strindex);
1502 return true;
1503 }
1504 }
1505 }
1506
1507 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NEEDED, strindex))
1508 goto error_return;
1509 }
1510
1511 /* Save the SONAME, if there is one, because sometimes the
1512 linker emulation code will need to know it. */
1513 if (*name == '\0')
1514 name = basename (bfd_get_filename (abfd));
1515 elf_dt_name (abfd) = name;
1516 }
1517
1518 /* If this is a dynamic object, we always link against the .dynsym
1519 symbol table, not the .symtab symbol table. The dynamic linker
1520 will only see the .dynsym symbol table, so there is no reason to
1521 look at .symtab for a dynamic object. */
1522
1523 if (! dynamic || elf_dynsymtab (abfd) == 0)
1524 hdr = &elf_tdata (abfd)->symtab_hdr;
1525 else
1526 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1527
1528 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
1529
1530 /* The sh_info field of the symtab header tells us where the
1531 external symbols start. We don't care about the local symbols at
1532 this point. */
1533 if (elf_bad_symtab (abfd))
1534 {
1535 extsymcount = symcount;
1536 extsymoff = 0;
1537 }
1538 else
1539 {
1540 extsymcount = symcount - hdr->sh_info;
1541 extsymoff = hdr->sh_info;
1542 }
1543
1544 sym_hash = NULL;
1545 if (extsymcount != 0)
1546 {
1547 isymbuf = bfd_elf_get_elf_syms (abfd, hdr, extsymcount, extsymoff,
1548 NULL, NULL, NULL);
1549 if (isymbuf == NULL)
1550 goto error_return;
1551
1552 /* We store a pointer to the hash table entry for each external
1553 symbol. */
1554 amt = extsymcount * sizeof (struct elf_link_hash_entry *);
1555 sym_hash = (struct elf_link_hash_entry **) bfd_alloc (abfd, amt);
1556 if (sym_hash == NULL)
1557 goto error_free_sym;
1558 elf_sym_hashes (abfd) = sym_hash;
1559 }
1560
1561 if (dynamic)
1562 {
1563 /* Read in any version definitions. */
1564 if (! _bfd_elf_slurp_version_tables (abfd))
1565 goto error_free_sym;
1566
1567 /* Read in the symbol versions, but don't bother to convert them
1568 to internal format. */
1569 if (elf_dynversym (abfd) != 0)
1570 {
1571 Elf_Internal_Shdr *versymhdr;
1572
1573 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
1574 extversym = (Elf_External_Versym *) bfd_malloc (versymhdr->sh_size);
1575 if (extversym == NULL)
1576 goto error_free_sym;
1577 amt = versymhdr->sh_size;
1578 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
1579 || bfd_bread ((PTR) extversym, amt, abfd) != amt)
1580 goto error_free_vers;
1581 }
1582 }
1583
1584 weaks = NULL;
1585
1586 ever = extversym != NULL ? extversym + extsymoff : NULL;
1587 for (isym = isymbuf, isymend = isymbuf + extsymcount;
1588 isym < isymend;
1589 isym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
1590 {
1591 int bind;
1592 bfd_vma value;
1593 asection *sec;
1594 flagword flags;
1595 const char *name;
1596 struct elf_link_hash_entry *h;
1597 boolean definition;
1598 boolean size_change_ok, type_change_ok;
1599 boolean new_weakdef;
1600 unsigned int old_alignment;
1601 boolean override;
1602
1603 override = false;
1604
1605 flags = BSF_NO_FLAGS;
1606 sec = NULL;
1607 value = isym->st_value;
1608 *sym_hash = NULL;
1609
1610 bind = ELF_ST_BIND (isym->st_info);
1611 if (bind == STB_LOCAL)
1612 {
1613 /* This should be impossible, since ELF requires that all
1614 global symbols follow all local symbols, and that sh_info
1615 point to the first global symbol. Unfortunatealy, Irix 5
1616 screws this up. */
1617 continue;
1618 }
1619 else if (bind == STB_GLOBAL)
1620 {
1621 if (isym->st_shndx != SHN_UNDEF
1622 && isym->st_shndx != SHN_COMMON)
1623 flags = BSF_GLOBAL;
1624 }
1625 else if (bind == STB_WEAK)
1626 flags = BSF_WEAK;
1627 else
1628 {
1629 /* Leave it up to the processor backend. */
1630 }
1631
1632 if (isym->st_shndx == SHN_UNDEF)
1633 sec = bfd_und_section_ptr;
1634 else if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
1635 {
1636 sec = section_from_elf_index (abfd, isym->st_shndx);
1637 if (sec == NULL)
1638 sec = bfd_abs_section_ptr;
1639 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1640 value -= sec->vma;
1641 }
1642 else if (isym->st_shndx == SHN_ABS)
1643 sec = bfd_abs_section_ptr;
1644 else if (isym->st_shndx == SHN_COMMON)
1645 {
1646 sec = bfd_com_section_ptr;
1647 /* What ELF calls the size we call the value. What ELF
1648 calls the value we call the alignment. */
1649 value = isym->st_size;
1650 }
1651 else
1652 {
1653 /* Leave it up to the processor backend. */
1654 }
1655
1656 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link,
1657 isym->st_name);
1658 if (name == (const char *) NULL)
1659 goto error_free_vers;
1660
1661 if (isym->st_shndx == SHN_COMMON
1662 && ELF_ST_TYPE (isym->st_info) == STT_TLS)
1663 {
1664 asection *tcomm = bfd_get_section_by_name (abfd, ".tcommon");
1665
1666 if (tcomm == NULL)
1667 {
1668 tcomm = bfd_make_section (abfd, ".tcommon");
1669 if (tcomm == NULL
1670 || !bfd_set_section_flags (abfd, tcomm, (SEC_ALLOC
1671 | SEC_IS_COMMON
1672 | SEC_LINKER_CREATED
1673 | SEC_THREAD_LOCAL)))
1674 goto error_free_vers;
1675 }
1676 sec = tcomm;
1677 }
1678 else if (add_symbol_hook)
1679 {
1680 if (! (*add_symbol_hook) (abfd, info, isym, &name, &flags, &sec,
1681 &value))
1682 goto error_free_vers;
1683
1684 /* The hook function sets the name to NULL if this symbol
1685 should be skipped for some reason. */
1686 if (name == (const char *) NULL)
1687 continue;
1688 }
1689
1690 /* Sanity check that all possibilities were handled. */
1691 if (sec == (asection *) NULL)
1692 {
1693 bfd_set_error (bfd_error_bad_value);
1694 goto error_free_vers;
1695 }
1696
1697 if (bfd_is_und_section (sec)
1698 || bfd_is_com_section (sec))
1699 definition = false;
1700 else
1701 definition = true;
1702
1703 size_change_ok = false;
1704 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
1705 old_alignment = 0;
1706 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1707 {
1708 Elf_Internal_Versym iver;
1709 unsigned int vernum = 0;
1710
1711 if (ever != NULL)
1712 {
1713 _bfd_elf_swap_versym_in (abfd, ever, &iver);
1714 vernum = iver.vs_vers & VERSYM_VERSION;
1715
1716 /* If this is a hidden symbol, or if it is not version
1717 1, we append the version name to the symbol name.
1718 However, we do not modify a non-hidden absolute
1719 symbol, because it might be the version symbol
1720 itself. FIXME: What if it isn't? */
1721 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
1722 || (vernum > 1 && ! bfd_is_abs_section (sec)))
1723 {
1724 const char *verstr;
1725 size_t namelen, verlen, newlen;
1726 char *newname, *p;
1727
1728 if (isym->st_shndx != SHN_UNDEF)
1729 {
1730 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
1731 {
1732 (*_bfd_error_handler)
1733 (_("%s: %s: invalid version %u (max %d)"),
1734 bfd_archive_filename (abfd), name, vernum,
1735 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1736 bfd_set_error (bfd_error_bad_value);
1737 goto error_free_vers;
1738 }
1739 else if (vernum > 1)
1740 verstr =
1741 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1742 else
1743 verstr = "";
1744 }
1745 else
1746 {
1747 /* We cannot simply test for the number of
1748 entries in the VERNEED section since the
1749 numbers for the needed versions do not start
1750 at 0. */
1751 Elf_Internal_Verneed *t;
1752
1753 verstr = NULL;
1754 for (t = elf_tdata (abfd)->verref;
1755 t != NULL;
1756 t = t->vn_nextref)
1757 {
1758 Elf_Internal_Vernaux *a;
1759
1760 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1761 {
1762 if (a->vna_other == vernum)
1763 {
1764 verstr = a->vna_nodename;
1765 break;
1766 }
1767 }
1768 if (a != NULL)
1769 break;
1770 }
1771 if (verstr == NULL)
1772 {
1773 (*_bfd_error_handler)
1774 (_("%s: %s: invalid needed version %d"),
1775 bfd_archive_filename (abfd), name, vernum);
1776 bfd_set_error (bfd_error_bad_value);
1777 goto error_free_vers;
1778 }
1779 }
1780
1781 namelen = strlen (name);
1782 verlen = strlen (verstr);
1783 newlen = namelen + verlen + 2;
1784 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1785 && isym->st_shndx != SHN_UNDEF)
1786 ++newlen;
1787
1788 newname = (char *) bfd_alloc (abfd, (bfd_size_type) newlen);
1789 if (newname == NULL)
1790 goto error_free_vers;
1791 memcpy (newname, name, namelen);
1792 p = newname + namelen;
1793 *p++ = ELF_VER_CHR;
1794 /* If this is a defined non-hidden version symbol,
1795 we add another @ to the name. This indicates the
1796 default version of the symbol. */
1797 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1798 && isym->st_shndx != SHN_UNDEF)
1799 *p++ = ELF_VER_CHR;
1800 memcpy (p, verstr, verlen + 1);
1801
1802 name = newname;
1803 }
1804 }
1805
1806 if (! elf_merge_symbol (abfd, info, name, isym, &sec, &value,
1807 sym_hash, &override, &type_change_ok,
1808 &size_change_ok, dt_needed))
1809 goto error_free_vers;
1810
1811 if (override)
1812 definition = false;
1813
1814 h = *sym_hash;
1815 while (h->root.type == bfd_link_hash_indirect
1816 || h->root.type == bfd_link_hash_warning)
1817 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1818
1819 /* Remember the old alignment if this is a common symbol, so
1820 that we don't reduce the alignment later on. We can't
1821 check later, because _bfd_generic_link_add_one_symbol
1822 will set a default for the alignment which we want to
1823 override. */
1824 if (h->root.type == bfd_link_hash_common)
1825 old_alignment = h->root.u.c.p->alignment_power;
1826
1827 if (elf_tdata (abfd)->verdef != NULL
1828 && ! override
1829 && vernum > 1
1830 && definition)
1831 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
1832 }
1833
1834 if (! (_bfd_generic_link_add_one_symbol
1835 (info, abfd, name, flags, sec, value, (const char *) NULL,
1836 false, collect, (struct bfd_link_hash_entry **) sym_hash)))
1837 goto error_free_vers;
1838
1839 h = *sym_hash;
1840 while (h->root.type == bfd_link_hash_indirect
1841 || h->root.type == bfd_link_hash_warning)
1842 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1843 *sym_hash = h;
1844
1845 new_weakdef = false;
1846 if (dynamic
1847 && definition
1848 && (flags & BSF_WEAK) != 0
1849 && ELF_ST_TYPE (isym->st_info) != STT_FUNC
1850 && info->hash->creator->flavour == bfd_target_elf_flavour
1851 && h->weakdef == NULL)
1852 {
1853 /* Keep a list of all weak defined non function symbols from
1854 a dynamic object, using the weakdef field. Later in this
1855 function we will set the weakdef field to the correct
1856 value. We only put non-function symbols from dynamic
1857 objects on this list, because that happens to be the only
1858 time we need to know the normal symbol corresponding to a
1859 weak symbol, and the information is time consuming to
1860 figure out. If the weakdef field is not already NULL,
1861 then this symbol was already defined by some previous
1862 dynamic object, and we will be using that previous
1863 definition anyhow. */
1864
1865 h->weakdef = weaks;
1866 weaks = h;
1867 new_weakdef = true;
1868 }
1869
1870 /* Set the alignment of a common symbol. */
1871 if (isym->st_shndx == SHN_COMMON
1872 && h->root.type == bfd_link_hash_common)
1873 {
1874 unsigned int align;
1875
1876 align = bfd_log2 (isym->st_value);
1877 if (align > old_alignment
1878 /* Permit an alignment power of zero if an alignment of one
1879 is specified and no other alignments have been specified. */
1880 || (isym->st_value == 1 && old_alignment == 0))
1881 h->root.u.c.p->alignment_power = align;
1882 }
1883
1884 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1885 {
1886 int old_flags;
1887 boolean dynsym;
1888 int new_flag;
1889
1890 /* Remember the symbol size and type. */
1891 if (isym->st_size != 0
1892 && (definition || h->size == 0))
1893 {
1894 if (h->size != 0 && h->size != isym->st_size && ! size_change_ok)
1895 (*_bfd_error_handler)
1896 (_("Warning: size of symbol `%s' changed from %lu to %lu in %s"),
1897 name, (unsigned long) h->size,
1898 (unsigned long) isym->st_size, bfd_archive_filename (abfd));
1899
1900 h->size = isym->st_size;
1901 }
1902
1903 /* If this is a common symbol, then we always want H->SIZE
1904 to be the size of the common symbol. The code just above
1905 won't fix the size if a common symbol becomes larger. We
1906 don't warn about a size change here, because that is
1907 covered by --warn-common. */
1908 if (h->root.type == bfd_link_hash_common)
1909 h->size = h->root.u.c.size;
1910
1911 if (ELF_ST_TYPE (isym->st_info) != STT_NOTYPE
1912 && (definition || h->type == STT_NOTYPE))
1913 {
1914 if (h->type != STT_NOTYPE
1915 && h->type != ELF_ST_TYPE (isym->st_info)
1916 && ! type_change_ok)
1917 (*_bfd_error_handler)
1918 (_("Warning: type of symbol `%s' changed from %d to %d in %s"),
1919 name, h->type, ELF_ST_TYPE (isym->st_info),
1920 bfd_archive_filename (abfd));
1921
1922 h->type = ELF_ST_TYPE (isym->st_info);
1923 }
1924
1925 /* If st_other has a processor-specific meaning, specific code
1926 might be needed here. */
1927 if (isym->st_other != 0)
1928 {
1929 /* Combine visibilities, using the most constraining one. */
1930 unsigned char hvis = ELF_ST_VISIBILITY (h->other);
1931 unsigned char symvis = ELF_ST_VISIBILITY (isym->st_other);
1932
1933 if (symvis && (hvis > symvis || hvis == 0))
1934 h->other = isym->st_other;
1935
1936 /* If neither has visibility, use the st_other of the
1937 definition. This is an arbitrary choice, since the
1938 other bits have no general meaning. */
1939 if (!symvis && !hvis
1940 && (definition || h->other == 0))
1941 h->other = isym->st_other;
1942 }
1943
1944 /* Set a flag in the hash table entry indicating the type of
1945 reference or definition we just found. Keep a count of
1946 the number of dynamic symbols we find. A dynamic symbol
1947 is one which is referenced or defined by both a regular
1948 object and a shared object. */
1949 old_flags = h->elf_link_hash_flags;
1950 dynsym = false;
1951 if (! dynamic)
1952 {
1953 if (! definition)
1954 {
1955 new_flag = ELF_LINK_HASH_REF_REGULAR;
1956 if (bind != STB_WEAK)
1957 new_flag |= ELF_LINK_HASH_REF_REGULAR_NONWEAK;
1958 }
1959 else
1960 new_flag = ELF_LINK_HASH_DEF_REGULAR;
1961 if (info->shared
1962 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1963 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1964 dynsym = true;
1965 }
1966 else
1967 {
1968 if (! definition)
1969 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1970 else
1971 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
1972 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1973 | ELF_LINK_HASH_REF_REGULAR)) != 0
1974 || (h->weakdef != NULL
1975 && ! new_weakdef
1976 && h->weakdef->dynindx != -1))
1977 dynsym = true;
1978 }
1979
1980 h->elf_link_hash_flags |= new_flag;
1981
1982 /* Check to see if we need to add an indirect symbol for
1983 the default name. */
1984 if (definition || h->root.type == bfd_link_hash_common)
1985 if (! elf_add_default_symbol (abfd, info, h, name, isym,
1986 &sec, &value, &dynsym,
1987 override, dt_needed))
1988 goto error_free_vers;
1989
1990 if (dynsym && h->dynindx == -1)
1991 {
1992 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1993 goto error_free_vers;
1994 if (h->weakdef != NULL
1995 && ! new_weakdef
1996 && h->weakdef->dynindx == -1)
1997 {
1998 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
1999 goto error_free_vers;
2000 }
2001 }
2002 else if (dynsym && h->dynindx != -1)
2003 /* If the symbol already has a dynamic index, but
2004 visibility says it should not be visible, turn it into
2005 a local symbol. */
2006 switch (ELF_ST_VISIBILITY (h->other))
2007 {
2008 case STV_INTERNAL:
2009 case STV_HIDDEN:
2010 (*bed->elf_backend_hide_symbol) (info, h, true);
2011 break;
2012 }
2013
2014 if (dt_needed && definition
2015 && (h->elf_link_hash_flags
2016 & ELF_LINK_HASH_REF_REGULAR) != 0)
2017 {
2018 bfd_size_type oldsize;
2019 bfd_size_type strindex;
2020
2021 if (! is_elf_hash_table (info))
2022 goto error_free_vers;
2023
2024 /* The symbol from a DT_NEEDED object is referenced from
2025 the regular object to create a dynamic executable. We
2026 have to make sure there is a DT_NEEDED entry for it. */
2027
2028 dt_needed = false;
2029 oldsize = _bfd_elf_strtab_size (hash_table->dynstr);
2030 strindex = _bfd_elf_strtab_add (hash_table->dynstr,
2031 elf_dt_soname (abfd), false);
2032 if (strindex == (bfd_size_type) -1)
2033 goto error_free_vers;
2034
2035 if (oldsize == _bfd_elf_strtab_size (hash_table->dynstr))
2036 {
2037 asection *sdyn;
2038 Elf_External_Dyn *dyncon, *dynconend;
2039
2040 sdyn = bfd_get_section_by_name (hash_table->dynobj,
2041 ".dynamic");
2042 BFD_ASSERT (sdyn != NULL);
2043
2044 dyncon = (Elf_External_Dyn *) sdyn->contents;
2045 dynconend = (Elf_External_Dyn *) (sdyn->contents +
2046 sdyn->_raw_size);
2047 for (; dyncon < dynconend; dyncon++)
2048 {
2049 Elf_Internal_Dyn dyn;
2050
2051 elf_swap_dyn_in (hash_table->dynobj,
2052 dyncon, &dyn);
2053 BFD_ASSERT (dyn.d_tag != DT_NEEDED ||
2054 dyn.d_un.d_val != strindex);
2055 }
2056 }
2057
2058 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NEEDED, strindex))
2059 goto error_free_vers;
2060 }
2061 }
2062 }
2063
2064 if (extversym != NULL)
2065 {
2066 free (extversym);
2067 extversym = NULL;
2068 }
2069
2070 if (isymbuf != NULL)
2071 free (isymbuf);
2072 isymbuf = NULL;
2073
2074 /* Now set the weakdefs field correctly for all the weak defined
2075 symbols we found. The only way to do this is to search all the
2076 symbols. Since we only need the information for non functions in
2077 dynamic objects, that's the only time we actually put anything on
2078 the list WEAKS. We need this information so that if a regular
2079 object refers to a symbol defined weakly in a dynamic object, the
2080 real symbol in the dynamic object is also put in the dynamic
2081 symbols; we also must arrange for both symbols to point to the
2082 same memory location. We could handle the general case of symbol
2083 aliasing, but a general symbol alias can only be generated in
2084 assembler code, handling it correctly would be very time
2085 consuming, and other ELF linkers don't handle general aliasing
2086 either. */
2087 while (weaks != NULL)
2088 {
2089 struct elf_link_hash_entry *hlook;
2090 asection *slook;
2091 bfd_vma vlook;
2092 struct elf_link_hash_entry **hpp;
2093 struct elf_link_hash_entry **hppend;
2094
2095 hlook = weaks;
2096 weaks = hlook->weakdef;
2097 hlook->weakdef = NULL;
2098
2099 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
2100 || hlook->root.type == bfd_link_hash_defweak
2101 || hlook->root.type == bfd_link_hash_common
2102 || hlook->root.type == bfd_link_hash_indirect);
2103 slook = hlook->root.u.def.section;
2104 vlook = hlook->root.u.def.value;
2105
2106 hpp = elf_sym_hashes (abfd);
2107 hppend = hpp + extsymcount;
2108 for (; hpp < hppend; hpp++)
2109 {
2110 struct elf_link_hash_entry *h;
2111
2112 h = *hpp;
2113 if (h != NULL && h != hlook
2114 && h->root.type == bfd_link_hash_defined
2115 && h->root.u.def.section == slook
2116 && h->root.u.def.value == vlook)
2117 {
2118 hlook->weakdef = h;
2119
2120 /* If the weak definition is in the list of dynamic
2121 symbols, make sure the real definition is put there
2122 as well. */
2123 if (hlook->dynindx != -1
2124 && h->dynindx == -1)
2125 {
2126 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2127 goto error_return;
2128 }
2129
2130 /* If the real definition is in the list of dynamic
2131 symbols, make sure the weak definition is put there
2132 as well. If we don't do this, then the dynamic
2133 loader might not merge the entries for the real
2134 definition and the weak definition. */
2135 if (h->dynindx != -1
2136 && hlook->dynindx == -1)
2137 {
2138 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
2139 goto error_return;
2140 }
2141 break;
2142 }
2143 }
2144 }
2145
2146 /* If this object is the same format as the output object, and it is
2147 not a shared library, then let the backend look through the
2148 relocs.
2149
2150 This is required to build global offset table entries and to
2151 arrange for dynamic relocs. It is not required for the
2152 particular common case of linking non PIC code, even when linking
2153 against shared libraries, but unfortunately there is no way of
2154 knowing whether an object file has been compiled PIC or not.
2155 Looking through the relocs is not particularly time consuming.
2156 The problem is that we must either (1) keep the relocs in memory,
2157 which causes the linker to require additional runtime memory or
2158 (2) read the relocs twice from the input file, which wastes time.
2159 This would be a good case for using mmap.
2160
2161 I have no idea how to handle linking PIC code into a file of a
2162 different format. It probably can't be done. */
2163 check_relocs = get_elf_backend_data (abfd)->check_relocs;
2164 if (! dynamic
2165 && abfd->xvec == info->hash->creator
2166 && check_relocs != NULL)
2167 {
2168 asection *o;
2169
2170 for (o = abfd->sections; o != NULL; o = o->next)
2171 {
2172 Elf_Internal_Rela *internal_relocs;
2173 boolean ok;
2174
2175 if ((o->flags & SEC_RELOC) == 0
2176 || o->reloc_count == 0
2177 || ((info->strip == strip_all || info->strip == strip_debugger)
2178 && (o->flags & SEC_DEBUGGING) != 0)
2179 || bfd_is_abs_section (o->output_section))
2180 continue;
2181
2182 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
2183 (abfd, o, (PTR) NULL,
2184 (Elf_Internal_Rela *) NULL,
2185 info->keep_memory));
2186 if (internal_relocs == NULL)
2187 goto error_return;
2188
2189 ok = (*check_relocs) (abfd, info, o, internal_relocs);
2190
2191 if (elf_section_data (o)->relocs != internal_relocs)
2192 free (internal_relocs);
2193
2194 if (! ok)
2195 goto error_return;
2196 }
2197 }
2198
2199 /* If this is a non-traditional, non-relocateable link, try to
2200 optimize the handling of the .stab/.stabstr sections. */
2201 if (! dynamic
2202 && ! info->relocateable
2203 && ! info->traditional_format
2204 && info->hash->creator->flavour == bfd_target_elf_flavour
2205 && is_elf_hash_table (info)
2206 && (info->strip != strip_all && info->strip != strip_debugger))
2207 {
2208 asection *stab, *stabstr;
2209
2210 stab = bfd_get_section_by_name (abfd, ".stab");
2211 if (stab != NULL
2212 && (stab->flags & SEC_MERGE) == 0
2213 && !bfd_is_abs_section (stab->output_section))
2214 {
2215 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
2216
2217 if (stabstr != NULL)
2218 {
2219 struct bfd_elf_section_data *secdata;
2220
2221 secdata = elf_section_data (stab);
2222 if (! _bfd_link_section_stabs (abfd,
2223 & hash_table->stab_info,
2224 stab, stabstr,
2225 &secdata->sec_info))
2226 goto error_return;
2227 if (secdata->sec_info)
2228 secdata->sec_info_type = ELF_INFO_TYPE_STABS;
2229 }
2230 }
2231 }
2232
2233 if (! info->relocateable && ! dynamic
2234 && is_elf_hash_table (info))
2235 {
2236 asection *s;
2237
2238 for (s = abfd->sections; s != NULL; s = s->next)
2239 if ((s->flags & SEC_MERGE) != 0
2240 && !bfd_is_abs_section (s->output_section))
2241 {
2242 struct bfd_elf_section_data *secdata;
2243
2244 secdata = elf_section_data (s);
2245 if (! _bfd_merge_section (abfd,
2246 & hash_table->merge_info,
2247 s, &secdata->sec_info))
2248 goto error_return;
2249 else if (secdata->sec_info)
2250 secdata->sec_info_type = ELF_INFO_TYPE_MERGE;
2251 }
2252 }
2253
2254 if (is_elf_hash_table (info))
2255 {
2256 /* Add this bfd to the loaded list. */
2257 struct elf_link_loaded_list *n;
2258
2259 n = ((struct elf_link_loaded_list *)
2260 bfd_alloc (abfd, sizeof (struct elf_link_loaded_list)));
2261 if (n == NULL)
2262 goto error_return;
2263 n->abfd = abfd;
2264 n->next = hash_table->loaded;
2265 hash_table->loaded = n;
2266 }
2267
2268 return true;
2269
2270 error_free_vers:
2271 if (extversym != NULL)
2272 free (extversym);
2273 error_free_sym:
2274 if (isymbuf != NULL)
2275 free (isymbuf);
2276 error_return:
2277 return false;
2278 }
2279
2280 /* Create some sections which will be filled in with dynamic linking
2281 information. ABFD is an input file which requires dynamic sections
2282 to be created. The dynamic sections take up virtual memory space
2283 when the final executable is run, so we need to create them before
2284 addresses are assigned to the output sections. We work out the
2285 actual contents and size of these sections later. */
2286
2287 boolean
2288 elf_link_create_dynamic_sections (abfd, info)
2289 bfd *abfd;
2290 struct bfd_link_info *info;
2291 {
2292 flagword flags;
2293 register asection *s;
2294 struct elf_link_hash_entry *h;
2295 struct elf_backend_data *bed;
2296
2297 if (! is_elf_hash_table (info))
2298 return false;
2299
2300 if (elf_hash_table (info)->dynamic_sections_created)
2301 return true;
2302
2303 /* Make sure that all dynamic sections use the same input BFD. */
2304 if (elf_hash_table (info)->dynobj == NULL)
2305 elf_hash_table (info)->dynobj = abfd;
2306 else
2307 abfd = elf_hash_table (info)->dynobj;
2308
2309 /* Note that we set the SEC_IN_MEMORY flag for all of these
2310 sections. */
2311 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
2312 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2313
2314 /* A dynamically linked executable has a .interp section, but a
2315 shared library does not. */
2316 if (! info->shared)
2317 {
2318 s = bfd_make_section (abfd, ".interp");
2319 if (s == NULL
2320 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2321 return false;
2322 }
2323
2324 if (! info->traditional_format
2325 && info->hash->creator->flavour == bfd_target_elf_flavour)
2326 {
2327 s = bfd_make_section (abfd, ".eh_frame_hdr");
2328 if (s == NULL
2329 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2330 || ! bfd_set_section_alignment (abfd, s, 2))
2331 return false;
2332 }
2333
2334 /* Create sections to hold version informations. These are removed
2335 if they are not needed. */
2336 s = bfd_make_section (abfd, ".gnu.version_d");
2337 if (s == NULL
2338 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2339 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2340 return false;
2341
2342 s = bfd_make_section (abfd, ".gnu.version");
2343 if (s == NULL
2344 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2345 || ! bfd_set_section_alignment (abfd, s, 1))
2346 return false;
2347
2348 s = bfd_make_section (abfd, ".gnu.version_r");
2349 if (s == NULL
2350 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2351 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2352 return false;
2353
2354 s = bfd_make_section (abfd, ".dynsym");
2355 if (s == NULL
2356 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2357 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2358 return false;
2359
2360 s = bfd_make_section (abfd, ".dynstr");
2361 if (s == NULL
2362 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2363 return false;
2364
2365 /* Create a strtab to hold the dynamic symbol names. */
2366 if (elf_hash_table (info)->dynstr == NULL)
2367 {
2368 elf_hash_table (info)->dynstr = _bfd_elf_strtab_init ();
2369 if (elf_hash_table (info)->dynstr == NULL)
2370 return false;
2371 }
2372
2373 s = bfd_make_section (abfd, ".dynamic");
2374 if (s == NULL
2375 || ! bfd_set_section_flags (abfd, s, flags)
2376 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2377 return false;
2378
2379 /* The special symbol _DYNAMIC is always set to the start of the
2380 .dynamic section. This call occurs before we have processed the
2381 symbols for any dynamic object, so we don't have to worry about
2382 overriding a dynamic definition. We could set _DYNAMIC in a
2383 linker script, but we only want to define it if we are, in fact,
2384 creating a .dynamic section. We don't want to define it if there
2385 is no .dynamic section, since on some ELF platforms the start up
2386 code examines it to decide how to initialize the process. */
2387 h = NULL;
2388 if (! (_bfd_generic_link_add_one_symbol
2389 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, (bfd_vma) 0,
2390 (const char *) NULL, false, get_elf_backend_data (abfd)->collect,
2391 (struct bfd_link_hash_entry **) &h)))
2392 return false;
2393 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2394 h->type = STT_OBJECT;
2395
2396 if (info->shared
2397 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
2398 return false;
2399
2400 bed = get_elf_backend_data (abfd);
2401
2402 s = bfd_make_section (abfd, ".hash");
2403 if (s == NULL
2404 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2405 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2406 return false;
2407 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
2408
2409 /* Let the backend create the rest of the sections. This lets the
2410 backend set the right flags. The backend will normally create
2411 the .got and .plt sections. */
2412 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
2413 return false;
2414
2415 elf_hash_table (info)->dynamic_sections_created = true;
2416
2417 return true;
2418 }
2419
2420 /* Add an entry to the .dynamic table. */
2421
2422 boolean
2423 elf_add_dynamic_entry (info, tag, val)
2424 struct bfd_link_info *info;
2425 bfd_vma tag;
2426 bfd_vma val;
2427 {
2428 Elf_Internal_Dyn dyn;
2429 bfd *dynobj;
2430 asection *s;
2431 bfd_size_type newsize;
2432 bfd_byte *newcontents;
2433
2434 if (! is_elf_hash_table (info))
2435 return false;
2436
2437 dynobj = elf_hash_table (info)->dynobj;
2438
2439 s = bfd_get_section_by_name (dynobj, ".dynamic");
2440 BFD_ASSERT (s != NULL);
2441
2442 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
2443 newcontents = (bfd_byte *) bfd_realloc (s->contents, newsize);
2444 if (newcontents == NULL)
2445 return false;
2446
2447 dyn.d_tag = tag;
2448 dyn.d_un.d_val = val;
2449 elf_swap_dyn_out (dynobj, &dyn,
2450 (Elf_External_Dyn *) (newcontents + s->_raw_size));
2451
2452 s->_raw_size = newsize;
2453 s->contents = newcontents;
2454
2455 return true;
2456 }
2457 \f
2458 /* Read and swap the relocs from the section indicated by SHDR. This
2459 may be either a REL or a RELA section. The relocations are
2460 translated into RELA relocations and stored in INTERNAL_RELOCS,
2461 which should have already been allocated to contain enough space.
2462 The EXTERNAL_RELOCS are a buffer where the external form of the
2463 relocations should be stored.
2464
2465 Returns false if something goes wrong. */
2466
2467 static boolean
2468 elf_link_read_relocs_from_section (abfd, shdr, external_relocs,
2469 internal_relocs)
2470 bfd *abfd;
2471 Elf_Internal_Shdr *shdr;
2472 PTR external_relocs;
2473 Elf_Internal_Rela *internal_relocs;
2474 {
2475 struct elf_backend_data *bed;
2476 bfd_size_type amt;
2477
2478 /* If there aren't any relocations, that's OK. */
2479 if (!shdr)
2480 return true;
2481
2482 /* Position ourselves at the start of the section. */
2483 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
2484 return false;
2485
2486 /* Read the relocations. */
2487 if (bfd_bread (external_relocs, shdr->sh_size, abfd) != shdr->sh_size)
2488 return false;
2489
2490 bed = get_elf_backend_data (abfd);
2491
2492 /* Convert the external relocations to the internal format. */
2493 if (shdr->sh_entsize == sizeof (Elf_External_Rel))
2494 {
2495 Elf_External_Rel *erel;
2496 Elf_External_Rel *erelend;
2497 Elf_Internal_Rela *irela;
2498 Elf_Internal_Rel *irel;
2499
2500 erel = (Elf_External_Rel *) external_relocs;
2501 erelend = erel + NUM_SHDR_ENTRIES (shdr);
2502 irela = internal_relocs;
2503 amt = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rel);
2504 irel = bfd_alloc (abfd, amt);
2505 for (; erel < erelend; erel++, irela += bed->s->int_rels_per_ext_rel)
2506 {
2507 unsigned int i;
2508
2509 if (bed->s->swap_reloc_in)
2510 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, irel);
2511 else
2512 elf_swap_reloc_in (abfd, erel, irel);
2513
2514 for (i = 0; i < bed->s->int_rels_per_ext_rel; ++i)
2515 {
2516 irela[i].r_offset = irel[i].r_offset;
2517 irela[i].r_info = irel[i].r_info;
2518 irela[i].r_addend = 0;
2519 }
2520 }
2521 }
2522 else
2523 {
2524 Elf_External_Rela *erela;
2525 Elf_External_Rela *erelaend;
2526 Elf_Internal_Rela *irela;
2527
2528 BFD_ASSERT (shdr->sh_entsize == sizeof (Elf_External_Rela));
2529
2530 erela = (Elf_External_Rela *) external_relocs;
2531 erelaend = erela + NUM_SHDR_ENTRIES (shdr);
2532 irela = internal_relocs;
2533 for (; erela < erelaend; erela++, irela += bed->s->int_rels_per_ext_rel)
2534 {
2535 if (bed->s->swap_reloca_in)
2536 (*bed->s->swap_reloca_in) (abfd, (bfd_byte *) erela, irela);
2537 else
2538 elf_swap_reloca_in (abfd, erela, irela);
2539 }
2540 }
2541
2542 return true;
2543 }
2544
2545 /* Read and swap the relocs for a section O. They may have been
2546 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
2547 not NULL, they are used as buffers to read into. They are known to
2548 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
2549 the return value is allocated using either malloc or bfd_alloc,
2550 according to the KEEP_MEMORY argument. If O has two relocation
2551 sections (both REL and RELA relocations), then the REL_HDR
2552 relocations will appear first in INTERNAL_RELOCS, followed by the
2553 REL_HDR2 relocations. */
2554
2555 Elf_Internal_Rela *
2556 NAME(_bfd_elf,link_read_relocs) (abfd, o, external_relocs, internal_relocs,
2557 keep_memory)
2558 bfd *abfd;
2559 asection *o;
2560 PTR external_relocs;
2561 Elf_Internal_Rela *internal_relocs;
2562 boolean keep_memory;
2563 {
2564 Elf_Internal_Shdr *rel_hdr;
2565 PTR alloc1 = NULL;
2566 Elf_Internal_Rela *alloc2 = NULL;
2567 struct elf_backend_data *bed = get_elf_backend_data (abfd);
2568
2569 if (elf_section_data (o)->relocs != NULL)
2570 return elf_section_data (o)->relocs;
2571
2572 if (o->reloc_count == 0)
2573 return NULL;
2574
2575 rel_hdr = &elf_section_data (o)->rel_hdr;
2576
2577 if (internal_relocs == NULL)
2578 {
2579 bfd_size_type size;
2580
2581 size = o->reloc_count;
2582 size *= bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
2583 if (keep_memory)
2584 internal_relocs = (Elf_Internal_Rela *) bfd_alloc (abfd, size);
2585 else
2586 internal_relocs = alloc2 = (Elf_Internal_Rela *) bfd_malloc (size);
2587 if (internal_relocs == NULL)
2588 goto error_return;
2589 }
2590
2591 if (external_relocs == NULL)
2592 {
2593 bfd_size_type size = rel_hdr->sh_size;
2594
2595 if (elf_section_data (o)->rel_hdr2)
2596 size += elf_section_data (o)->rel_hdr2->sh_size;
2597 alloc1 = (PTR) bfd_malloc (size);
2598 if (alloc1 == NULL)
2599 goto error_return;
2600 external_relocs = alloc1;
2601 }
2602
2603 if (!elf_link_read_relocs_from_section (abfd, rel_hdr,
2604 external_relocs,
2605 internal_relocs))
2606 goto error_return;
2607 if (!elf_link_read_relocs_from_section
2608 (abfd,
2609 elf_section_data (o)->rel_hdr2,
2610 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
2611 internal_relocs + (NUM_SHDR_ENTRIES (rel_hdr)
2612 * bed->s->int_rels_per_ext_rel)))
2613 goto error_return;
2614
2615 /* Cache the results for next time, if we can. */
2616 if (keep_memory)
2617 elf_section_data (o)->relocs = internal_relocs;
2618
2619 if (alloc1 != NULL)
2620 free (alloc1);
2621
2622 /* Don't free alloc2, since if it was allocated we are passing it
2623 back (under the name of internal_relocs). */
2624
2625 return internal_relocs;
2626
2627 error_return:
2628 if (alloc1 != NULL)
2629 free (alloc1);
2630 if (alloc2 != NULL)
2631 free (alloc2);
2632 return NULL;
2633 }
2634 \f
2635 /* Record an assignment to a symbol made by a linker script. We need
2636 this in case some dynamic object refers to this symbol. */
2637
2638 boolean
2639 NAME(bfd_elf,record_link_assignment) (output_bfd, info, name, provide)
2640 bfd *output_bfd ATTRIBUTE_UNUSED;
2641 struct bfd_link_info *info;
2642 const char *name;
2643 boolean provide;
2644 {
2645 struct elf_link_hash_entry *h;
2646
2647 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2648 return true;
2649
2650 h = elf_link_hash_lookup (elf_hash_table (info), name, true, true, false);
2651 if (h == NULL)
2652 return false;
2653
2654 if (h->root.type == bfd_link_hash_new)
2655 h->elf_link_hash_flags &= ~ELF_LINK_NON_ELF;
2656
2657 /* If this symbol is being provided by the linker script, and it is
2658 currently defined by a dynamic object, but not by a regular
2659 object, then mark it as undefined so that the generic linker will
2660 force the correct value. */
2661 if (provide
2662 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2663 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2664 h->root.type = bfd_link_hash_undefined;
2665
2666 /* If this symbol is not being provided by the linker script, and it is
2667 currently defined by a dynamic object, but not by a regular object,
2668 then clear out any version information because the symbol will not be
2669 associated with the dynamic object any more. */
2670 if (!provide
2671 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2672 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2673 h->verinfo.verdef = NULL;
2674
2675 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2676
2677 if (((h->elf_link_hash_flags & (ELF_LINK_HASH_DEF_DYNAMIC
2678 | ELF_LINK_HASH_REF_DYNAMIC)) != 0
2679 || info->shared)
2680 && h->dynindx == -1)
2681 {
2682 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2683 return false;
2684
2685 /* If this is a weak defined symbol, and we know a corresponding
2686 real symbol from the same dynamic object, make sure the real
2687 symbol is also made into a dynamic symbol. */
2688 if (h->weakdef != NULL
2689 && h->weakdef->dynindx == -1)
2690 {
2691 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2692 return false;
2693 }
2694 }
2695
2696 return true;
2697 }
2698 \f
2699 /* This structure is used to pass information to
2700 elf_link_assign_sym_version. */
2701
2702 struct elf_assign_sym_version_info
2703 {
2704 /* Output BFD. */
2705 bfd *output_bfd;
2706 /* General link information. */
2707 struct bfd_link_info *info;
2708 /* Version tree. */
2709 struct bfd_elf_version_tree *verdefs;
2710 /* Whether we had a failure. */
2711 boolean failed;
2712 };
2713
2714 /* This structure is used to pass information to
2715 elf_link_find_version_dependencies. */
2716
2717 struct elf_find_verdep_info
2718 {
2719 /* Output BFD. */
2720 bfd *output_bfd;
2721 /* General link information. */
2722 struct bfd_link_info *info;
2723 /* The number of dependencies. */
2724 unsigned int vers;
2725 /* Whether we had a failure. */
2726 boolean failed;
2727 };
2728
2729 /* Array used to determine the number of hash table buckets to use
2730 based on the number of symbols there are. If there are fewer than
2731 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
2732 fewer than 37 we use 17 buckets, and so forth. We never use more
2733 than 32771 buckets. */
2734
2735 static const size_t elf_buckets[] =
2736 {
2737 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
2738 16411, 32771, 0
2739 };
2740
2741 /* Compute bucket count for hashing table. We do not use a static set
2742 of possible tables sizes anymore. Instead we determine for all
2743 possible reasonable sizes of the table the outcome (i.e., the
2744 number of collisions etc) and choose the best solution. The
2745 weighting functions are not too simple to allow the table to grow
2746 without bounds. Instead one of the weighting factors is the size.
2747 Therefore the result is always a good payoff between few collisions
2748 (= short chain lengths) and table size. */
2749 static size_t
2750 compute_bucket_count (info)
2751 struct bfd_link_info *info;
2752 {
2753 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
2754 size_t best_size = 0;
2755 unsigned long int *hashcodes;
2756 unsigned long int *hashcodesp;
2757 unsigned long int i;
2758 bfd_size_type amt;
2759
2760 /* Compute the hash values for all exported symbols. At the same
2761 time store the values in an array so that we could use them for
2762 optimizations. */
2763 amt = dynsymcount;
2764 amt *= sizeof (unsigned long int);
2765 hashcodes = (unsigned long int *) bfd_malloc (amt);
2766 if (hashcodes == NULL)
2767 return 0;
2768 hashcodesp = hashcodes;
2769
2770 /* Put all hash values in HASHCODES. */
2771 elf_link_hash_traverse (elf_hash_table (info),
2772 elf_collect_hash_codes, &hashcodesp);
2773
2774 /* We have a problem here. The following code to optimize the table
2775 size requires an integer type with more the 32 bits. If
2776 BFD_HOST_U_64_BIT is set we know about such a type. */
2777 #ifdef BFD_HOST_U_64_BIT
2778 if (info->optimize)
2779 {
2780 unsigned long int nsyms = hashcodesp - hashcodes;
2781 size_t minsize;
2782 size_t maxsize;
2783 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
2784 unsigned long int *counts ;
2785
2786 /* Possible optimization parameters: if we have NSYMS symbols we say
2787 that the hashing table must at least have NSYMS/4 and at most
2788 2*NSYMS buckets. */
2789 minsize = nsyms / 4;
2790 if (minsize == 0)
2791 minsize = 1;
2792 best_size = maxsize = nsyms * 2;
2793
2794 /* Create array where we count the collisions in. We must use bfd_malloc
2795 since the size could be large. */
2796 amt = maxsize;
2797 amt *= sizeof (unsigned long int);
2798 counts = (unsigned long int *) bfd_malloc (amt);
2799 if (counts == NULL)
2800 {
2801 free (hashcodes);
2802 return 0;
2803 }
2804
2805 /* Compute the "optimal" size for the hash table. The criteria is a
2806 minimal chain length. The minor criteria is (of course) the size
2807 of the table. */
2808 for (i = minsize; i < maxsize; ++i)
2809 {
2810 /* Walk through the array of hashcodes and count the collisions. */
2811 BFD_HOST_U_64_BIT max;
2812 unsigned long int j;
2813 unsigned long int fact;
2814
2815 memset (counts, '\0', i * sizeof (unsigned long int));
2816
2817 /* Determine how often each hash bucket is used. */
2818 for (j = 0; j < nsyms; ++j)
2819 ++counts[hashcodes[j] % i];
2820
2821 /* For the weight function we need some information about the
2822 pagesize on the target. This is information need not be 100%
2823 accurate. Since this information is not available (so far) we
2824 define it here to a reasonable default value. If it is crucial
2825 to have a better value some day simply define this value. */
2826 # ifndef BFD_TARGET_PAGESIZE
2827 # define BFD_TARGET_PAGESIZE (4096)
2828 # endif
2829
2830 /* We in any case need 2 + NSYMS entries for the size values and
2831 the chains. */
2832 max = (2 + nsyms) * (ARCH_SIZE / 8);
2833
2834 # if 1
2835 /* Variant 1: optimize for short chains. We add the squares
2836 of all the chain lengths (which favous many small chain
2837 over a few long chains). */
2838 for (j = 0; j < i; ++j)
2839 max += counts[j] * counts[j];
2840
2841 /* This adds penalties for the overall size of the table. */
2842 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2843 max *= fact * fact;
2844 # else
2845 /* Variant 2: Optimize a lot more for small table. Here we
2846 also add squares of the size but we also add penalties for
2847 empty slots (the +1 term). */
2848 for (j = 0; j < i; ++j)
2849 max += (1 + counts[j]) * (1 + counts[j]);
2850
2851 /* The overall size of the table is considered, but not as
2852 strong as in variant 1, where it is squared. */
2853 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2854 max *= fact;
2855 # endif
2856
2857 /* Compare with current best results. */
2858 if (max < best_chlen)
2859 {
2860 best_chlen = max;
2861 best_size = i;
2862 }
2863 }
2864
2865 free (counts);
2866 }
2867 else
2868 #endif /* defined (BFD_HOST_U_64_BIT) */
2869 {
2870 /* This is the fallback solution if no 64bit type is available or if we
2871 are not supposed to spend much time on optimizations. We select the
2872 bucket count using a fixed set of numbers. */
2873 for (i = 0; elf_buckets[i] != 0; i++)
2874 {
2875 best_size = elf_buckets[i];
2876 if (dynsymcount < elf_buckets[i + 1])
2877 break;
2878 }
2879 }
2880
2881 /* Free the arrays we needed. */
2882 free (hashcodes);
2883
2884 return best_size;
2885 }
2886
2887 /* Set up the sizes and contents of the ELF dynamic sections. This is
2888 called by the ELF linker emulation before_allocation routine. We
2889 must set the sizes of the sections before the linker sets the
2890 addresses of the various sections. */
2891
2892 boolean
2893 NAME(bfd_elf,size_dynamic_sections) (output_bfd, soname, rpath,
2894 filter_shlib,
2895 auxiliary_filters, info, sinterpptr,
2896 verdefs)
2897 bfd *output_bfd;
2898 const char *soname;
2899 const char *rpath;
2900 const char *filter_shlib;
2901 const char * const *auxiliary_filters;
2902 struct bfd_link_info *info;
2903 asection **sinterpptr;
2904 struct bfd_elf_version_tree *verdefs;
2905 {
2906 bfd_size_type soname_indx;
2907 bfd *dynobj;
2908 struct elf_backend_data *bed;
2909 struct elf_assign_sym_version_info asvinfo;
2910
2911 *sinterpptr = NULL;
2912
2913 soname_indx = (bfd_size_type) -1;
2914
2915 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2916 return true;
2917
2918 if (! is_elf_hash_table (info))
2919 return true;
2920
2921 /* Any syms created from now on start with -1 in
2922 got.refcount/offset and plt.refcount/offset. */
2923 elf_hash_table (info)->init_refcount = -1;
2924
2925 /* The backend may have to create some sections regardless of whether
2926 we're dynamic or not. */
2927 bed = get_elf_backend_data (output_bfd);
2928 if (bed->elf_backend_always_size_sections
2929 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
2930 return false;
2931
2932 dynobj = elf_hash_table (info)->dynobj;
2933
2934 /* If there were no dynamic objects in the link, there is nothing to
2935 do here. */
2936 if (dynobj == NULL)
2937 return true;
2938
2939 if (! _bfd_elf_maybe_strip_eh_frame_hdr (info))
2940 return false;
2941
2942 if (elf_hash_table (info)->dynamic_sections_created)
2943 {
2944 struct elf_info_failed eif;
2945 struct elf_link_hash_entry *h;
2946 asection *dynstr;
2947 struct bfd_elf_version_tree *t;
2948 struct bfd_elf_version_expr *d;
2949 boolean all_defined;
2950
2951 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
2952 BFD_ASSERT (*sinterpptr != NULL || info->shared);
2953
2954 if (soname != NULL)
2955 {
2956 soname_indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2957 soname, true);
2958 if (soname_indx == (bfd_size_type) -1
2959 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SONAME,
2960 soname_indx))
2961 return false;
2962 }
2963
2964 if (info->symbolic)
2965 {
2966 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMBOLIC,
2967 (bfd_vma) 0))
2968 return false;
2969 info->flags |= DF_SYMBOLIC;
2970 }
2971
2972 if (rpath != NULL)
2973 {
2974 bfd_size_type indx;
2975
2976 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr, rpath,
2977 true);
2978 if (info->new_dtags)
2979 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr, indx);
2980 if (indx == (bfd_size_type) -1
2981 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_RPATH, indx)
2982 || (info->new_dtags
2983 && ! elf_add_dynamic_entry (info, (bfd_vma) DT_RUNPATH,
2984 indx)))
2985 return false;
2986 }
2987
2988 if (filter_shlib != NULL)
2989 {
2990 bfd_size_type indx;
2991
2992 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
2993 filter_shlib, true);
2994 if (indx == (bfd_size_type) -1
2995 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_FILTER, indx))
2996 return false;
2997 }
2998
2999 if (auxiliary_filters != NULL)
3000 {
3001 const char * const *p;
3002
3003 for (p = auxiliary_filters; *p != NULL; p++)
3004 {
3005 bfd_size_type indx;
3006
3007 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3008 *p, true);
3009 if (indx == (bfd_size_type) -1
3010 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_AUXILIARY,
3011 indx))
3012 return false;
3013 }
3014 }
3015
3016 eif.info = info;
3017 eif.verdefs = verdefs;
3018 eif.failed = false;
3019
3020 /* If we are supposed to export all symbols into the dynamic symbol
3021 table (this is not the normal case), then do so. */
3022 if (info->export_dynamic)
3023 {
3024 elf_link_hash_traverse (elf_hash_table (info), elf_export_symbol,
3025 (PTR) &eif);
3026 if (eif.failed)
3027 return false;
3028 }
3029
3030 /* Make all global versions with definiton. */
3031 for (t = verdefs; t != NULL; t = t->next)
3032 for (d = t->globals; d != NULL; d = d->next)
3033 if (!d->symver && strchr (d->pattern, '*') == NULL)
3034 {
3035 const char *verstr, *name;
3036 size_t namelen, verlen, newlen;
3037 char *newname, *p;
3038 struct elf_link_hash_entry *newh;
3039
3040 name = d->pattern;
3041 namelen = strlen (name);
3042 verstr = t->name;
3043 verlen = strlen (verstr);
3044 newlen = namelen + verlen + 3;
3045
3046 newname = (char *) bfd_malloc ((bfd_size_type) newlen);
3047 if (newname == NULL)
3048 return false;
3049 memcpy (newname, name, namelen);
3050
3051 /* Check the hidden versioned definition. */
3052 p = newname + namelen;
3053 *p++ = ELF_VER_CHR;
3054 memcpy (p, verstr, verlen + 1);
3055 newh = elf_link_hash_lookup (elf_hash_table (info),
3056 newname, false, false,
3057 false);
3058 if (newh == NULL
3059 || (newh->root.type != bfd_link_hash_defined
3060 && newh->root.type != bfd_link_hash_defweak))
3061 {
3062 /* Check the default versioned definition. */
3063 *p++ = ELF_VER_CHR;
3064 memcpy (p, verstr, verlen + 1);
3065 newh = elf_link_hash_lookup (elf_hash_table (info),
3066 newname, false, false,
3067 false);
3068 }
3069 free (newname);
3070
3071 /* Mark this version if there is a definition. */
3072 if (newh != NULL
3073 && (newh->root.type == bfd_link_hash_defined
3074 || newh->root.type == bfd_link_hash_defweak))
3075 d->symver = 1;
3076 }
3077
3078 /* Attach all the symbols to their version information. */
3079 asvinfo.output_bfd = output_bfd;
3080 asvinfo.info = info;
3081 asvinfo.verdefs = verdefs;
3082 asvinfo.failed = false;
3083
3084 elf_link_hash_traverse (elf_hash_table (info),
3085 elf_link_assign_sym_version,
3086 (PTR) &asvinfo);
3087 if (asvinfo.failed)
3088 return false;
3089
3090 if (!info->allow_undefined_version)
3091 {
3092 /* Check if all global versions have a definiton. */
3093 all_defined = true;
3094 for (t = verdefs; t != NULL; t = t->next)
3095 for (d = t->globals; d != NULL; d = d->next)
3096 if (!d->symver && !d->script
3097 && strchr (d->pattern, '*') == NULL)
3098 {
3099 (*_bfd_error_handler)
3100 (_("%s: undefined version: %s"),
3101 d->pattern, t->name);
3102 all_defined = false;
3103 }
3104
3105 if (!all_defined)
3106 {
3107 bfd_set_error (bfd_error_bad_value);
3108 return false;
3109 }
3110 }
3111
3112 /* Find all symbols which were defined in a dynamic object and make
3113 the backend pick a reasonable value for them. */
3114 elf_link_hash_traverse (elf_hash_table (info),
3115 elf_adjust_dynamic_symbol,
3116 (PTR) &eif);
3117 if (eif.failed)
3118 return false;
3119
3120 /* Add some entries to the .dynamic section. We fill in some of the
3121 values later, in elf_bfd_final_link, but we must add the entries
3122 now so that we know the final size of the .dynamic section. */
3123
3124 /* If there are initialization and/or finalization functions to
3125 call then add the corresponding DT_INIT/DT_FINI entries. */
3126 h = (info->init_function
3127 ? elf_link_hash_lookup (elf_hash_table (info),
3128 info->init_function, false,
3129 false, false)
3130 : NULL);
3131 if (h != NULL
3132 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3133 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3134 {
3135 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_INIT, (bfd_vma) 0))
3136 return false;
3137 }
3138 h = (info->fini_function
3139 ? elf_link_hash_lookup (elf_hash_table (info),
3140 info->fini_function, false,
3141 false, false)
3142 : NULL);
3143 if (h != NULL
3144 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3145 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3146 {
3147 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FINI, (bfd_vma) 0))
3148 return false;
3149 }
3150
3151 if (bfd_get_section_by_name (output_bfd, ".preinit_array") != NULL)
3152 {
3153 /* DT_PREINIT_ARRAY is not allowed in shared library. */
3154 if (info->shared)
3155 {
3156 bfd *sub;
3157 asection *o;
3158
3159 for (sub = info->input_bfds; sub != NULL;
3160 sub = sub->link_next)
3161 for (o = sub->sections; o != NULL; o = o->next)
3162 if (elf_section_data (o)->this_hdr.sh_type
3163 == SHT_PREINIT_ARRAY)
3164 {
3165 (*_bfd_error_handler)
3166 (_("%s: .preinit_array section is not allowed in DSO"),
3167 bfd_archive_filename (sub));
3168 break;
3169 }
3170
3171 bfd_set_error (bfd_error_nonrepresentable_section);
3172 return false;
3173 }
3174
3175 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_PREINIT_ARRAY,
3176 (bfd_vma) 0)
3177 || !elf_add_dynamic_entry (info, (bfd_vma) DT_PREINIT_ARRAYSZ,
3178 (bfd_vma) 0))
3179 return false;
3180 }
3181 if (bfd_get_section_by_name (output_bfd, ".init_array") != NULL)
3182 {
3183 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_INIT_ARRAY,
3184 (bfd_vma) 0)
3185 || !elf_add_dynamic_entry (info, (bfd_vma) DT_INIT_ARRAYSZ,
3186 (bfd_vma) 0))
3187 return false;
3188 }
3189 if (bfd_get_section_by_name (output_bfd, ".fini_array") != NULL)
3190 {
3191 if (!elf_add_dynamic_entry (info, (bfd_vma) DT_FINI_ARRAY,
3192 (bfd_vma) 0)
3193 || !elf_add_dynamic_entry (info, (bfd_vma) DT_FINI_ARRAYSZ,
3194 (bfd_vma) 0))
3195 return false;
3196 }
3197
3198 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
3199 /* If .dynstr is excluded from the link, we don't want any of
3200 these tags. Strictly, we should be checking each section
3201 individually; This quick check covers for the case where
3202 someone does a /DISCARD/ : { *(*) }. */
3203 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
3204 {
3205 bfd_size_type strsize;
3206
3207 strsize = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
3208 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_HASH, (bfd_vma) 0)
3209 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_STRTAB, (bfd_vma) 0)
3210 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMTAB, (bfd_vma) 0)
3211 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_STRSZ, strsize)
3212 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_SYMENT,
3213 (bfd_vma) sizeof (Elf_External_Sym)))
3214 return false;
3215 }
3216 }
3217
3218 /* The backend must work out the sizes of all the other dynamic
3219 sections. */
3220 if (bed->elf_backend_size_dynamic_sections
3221 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
3222 return false;
3223
3224 if (elf_hash_table (info)->dynamic_sections_created)
3225 {
3226 bfd_size_type dynsymcount;
3227 asection *s;
3228 size_t bucketcount = 0;
3229 size_t hash_entry_size;
3230 unsigned int dtagcount;
3231
3232 /* Set up the version definition section. */
3233 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3234 BFD_ASSERT (s != NULL);
3235
3236 /* We may have created additional version definitions if we are
3237 just linking a regular application. */
3238 verdefs = asvinfo.verdefs;
3239
3240 /* Skip anonymous version tag. */
3241 if (verdefs != NULL && verdefs->vernum == 0)
3242 verdefs = verdefs->next;
3243
3244 if (verdefs == NULL)
3245 _bfd_strip_section_from_output (info, s);
3246 else
3247 {
3248 unsigned int cdefs;
3249 bfd_size_type size;
3250 struct bfd_elf_version_tree *t;
3251 bfd_byte *p;
3252 Elf_Internal_Verdef def;
3253 Elf_Internal_Verdaux defaux;
3254
3255 cdefs = 0;
3256 size = 0;
3257
3258 /* Make space for the base version. */
3259 size += sizeof (Elf_External_Verdef);
3260 size += sizeof (Elf_External_Verdaux);
3261 ++cdefs;
3262
3263 for (t = verdefs; t != NULL; t = t->next)
3264 {
3265 struct bfd_elf_version_deps *n;
3266
3267 size += sizeof (Elf_External_Verdef);
3268 size += sizeof (Elf_External_Verdaux);
3269 ++cdefs;
3270
3271 for (n = t->deps; n != NULL; n = n->next)
3272 size += sizeof (Elf_External_Verdaux);
3273 }
3274
3275 s->_raw_size = size;
3276 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3277 if (s->contents == NULL && s->_raw_size != 0)
3278 return false;
3279
3280 /* Fill in the version definition section. */
3281
3282 p = s->contents;
3283
3284 def.vd_version = VER_DEF_CURRENT;
3285 def.vd_flags = VER_FLG_BASE;
3286 def.vd_ndx = 1;
3287 def.vd_cnt = 1;
3288 def.vd_aux = sizeof (Elf_External_Verdef);
3289 def.vd_next = (sizeof (Elf_External_Verdef)
3290 + sizeof (Elf_External_Verdaux));
3291
3292 if (soname_indx != (bfd_size_type) -1)
3293 {
3294 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3295 soname_indx);
3296 def.vd_hash = bfd_elf_hash (soname);
3297 defaux.vda_name = soname_indx;
3298 }
3299 else
3300 {
3301 const char *name;
3302 bfd_size_type indx;
3303
3304 name = basename (output_bfd->filename);
3305 def.vd_hash = bfd_elf_hash (name);
3306 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3307 name, false);
3308 if (indx == (bfd_size_type) -1)
3309 return false;
3310 defaux.vda_name = indx;
3311 }
3312 defaux.vda_next = 0;
3313
3314 _bfd_elf_swap_verdef_out (output_bfd, &def,
3315 (Elf_External_Verdef *) p);
3316 p += sizeof (Elf_External_Verdef);
3317 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3318 (Elf_External_Verdaux *) p);
3319 p += sizeof (Elf_External_Verdaux);
3320
3321 for (t = verdefs; t != NULL; t = t->next)
3322 {
3323 unsigned int cdeps;
3324 struct bfd_elf_version_deps *n;
3325 struct elf_link_hash_entry *h;
3326
3327 cdeps = 0;
3328 for (n = t->deps; n != NULL; n = n->next)
3329 ++cdeps;
3330
3331 /* Add a symbol representing this version. */
3332 h = NULL;
3333 if (! (_bfd_generic_link_add_one_symbol
3334 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
3335 (bfd_vma) 0, (const char *) NULL, false,
3336 get_elf_backend_data (dynobj)->collect,
3337 (struct bfd_link_hash_entry **) &h)))
3338 return false;
3339 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
3340 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3341 h->type = STT_OBJECT;
3342 h->verinfo.vertree = t;
3343
3344 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
3345 return false;
3346
3347 def.vd_version = VER_DEF_CURRENT;
3348 def.vd_flags = 0;
3349 if (t->globals == NULL && t->locals == NULL && ! t->used)
3350 def.vd_flags |= VER_FLG_WEAK;
3351 def.vd_ndx = t->vernum + 1;
3352 def.vd_cnt = cdeps + 1;
3353 def.vd_hash = bfd_elf_hash (t->name);
3354 def.vd_aux = sizeof (Elf_External_Verdef);
3355 if (t->next != NULL)
3356 def.vd_next = (sizeof (Elf_External_Verdef)
3357 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
3358 else
3359 def.vd_next = 0;
3360
3361 _bfd_elf_swap_verdef_out (output_bfd, &def,
3362 (Elf_External_Verdef *) p);
3363 p += sizeof (Elf_External_Verdef);
3364
3365 defaux.vda_name = h->dynstr_index;
3366 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3367 h->dynstr_index);
3368 if (t->deps == NULL)
3369 defaux.vda_next = 0;
3370 else
3371 defaux.vda_next = sizeof (Elf_External_Verdaux);
3372 t->name_indx = defaux.vda_name;
3373
3374 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3375 (Elf_External_Verdaux *) p);
3376 p += sizeof (Elf_External_Verdaux);
3377
3378 for (n = t->deps; n != NULL; n = n->next)
3379 {
3380 if (n->version_needed == NULL)
3381 {
3382 /* This can happen if there was an error in the
3383 version script. */
3384 defaux.vda_name = 0;
3385 }
3386 else
3387 {
3388 defaux.vda_name = n->version_needed->name_indx;
3389 _bfd_elf_strtab_addref (elf_hash_table (info)->dynstr,
3390 defaux.vda_name);
3391 }
3392 if (n->next == NULL)
3393 defaux.vda_next = 0;
3394 else
3395 defaux.vda_next = sizeof (Elf_External_Verdaux);
3396
3397 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3398 (Elf_External_Verdaux *) p);
3399 p += sizeof (Elf_External_Verdaux);
3400 }
3401 }
3402
3403 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERDEF, (bfd_vma) 0)
3404 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_VERDEFNUM,
3405 (bfd_vma) cdefs))
3406 return false;
3407
3408 elf_tdata (output_bfd)->cverdefs = cdefs;
3409 }
3410
3411 if ((info->new_dtags && info->flags) || (info->flags & DF_STATIC_TLS))
3412 {
3413 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FLAGS, info->flags))
3414 return false;
3415 }
3416
3417 if (info->flags_1)
3418 {
3419 if (! info->shared)
3420 info->flags_1 &= ~ (DF_1_INITFIRST
3421 | DF_1_NODELETE
3422 | DF_1_NOOPEN);
3423 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_FLAGS_1,
3424 info->flags_1))
3425 return false;
3426 }
3427
3428 /* Work out the size of the version reference section. */
3429
3430 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3431 BFD_ASSERT (s != NULL);
3432 {
3433 struct elf_find_verdep_info sinfo;
3434
3435 sinfo.output_bfd = output_bfd;
3436 sinfo.info = info;
3437 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
3438 if (sinfo.vers == 0)
3439 sinfo.vers = 1;
3440 sinfo.failed = false;
3441
3442 elf_link_hash_traverse (elf_hash_table (info),
3443 elf_link_find_version_dependencies,
3444 (PTR) &sinfo);
3445
3446 if (elf_tdata (output_bfd)->verref == NULL)
3447 _bfd_strip_section_from_output (info, s);
3448 else
3449 {
3450 Elf_Internal_Verneed *t;
3451 unsigned int size;
3452 unsigned int crefs;
3453 bfd_byte *p;
3454
3455 /* Build the version definition section. */
3456 size = 0;
3457 crefs = 0;
3458 for (t = elf_tdata (output_bfd)->verref;
3459 t != NULL;
3460 t = t->vn_nextref)
3461 {
3462 Elf_Internal_Vernaux *a;
3463
3464 size += sizeof (Elf_External_Verneed);
3465 ++crefs;
3466 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3467 size += sizeof (Elf_External_Vernaux);
3468 }
3469
3470 s->_raw_size = size;
3471 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3472 if (s->contents == NULL)
3473 return false;
3474
3475 p = s->contents;
3476 for (t = elf_tdata (output_bfd)->verref;
3477 t != NULL;
3478 t = t->vn_nextref)
3479 {
3480 unsigned int caux;
3481 Elf_Internal_Vernaux *a;
3482 bfd_size_type indx;
3483
3484 caux = 0;
3485 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3486 ++caux;
3487
3488 t->vn_version = VER_NEED_CURRENT;
3489 t->vn_cnt = caux;
3490 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3491 elf_dt_name (t->vn_bfd) != NULL
3492 ? elf_dt_name (t->vn_bfd)
3493 : basename (t->vn_bfd->filename),
3494 false);
3495 if (indx == (bfd_size_type) -1)
3496 return false;
3497 t->vn_file = indx;
3498 t->vn_aux = sizeof (Elf_External_Verneed);
3499 if (t->vn_nextref == NULL)
3500 t->vn_next = 0;
3501 else
3502 t->vn_next = (sizeof (Elf_External_Verneed)
3503 + caux * sizeof (Elf_External_Vernaux));
3504
3505 _bfd_elf_swap_verneed_out (output_bfd, t,
3506 (Elf_External_Verneed *) p);
3507 p += sizeof (Elf_External_Verneed);
3508
3509 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3510 {
3511 a->vna_hash = bfd_elf_hash (a->vna_nodename);
3512 indx = _bfd_elf_strtab_add (elf_hash_table (info)->dynstr,
3513 a->vna_nodename, false);
3514 if (indx == (bfd_size_type) -1)
3515 return false;
3516 a->vna_name = indx;
3517 if (a->vna_nextptr == NULL)
3518 a->vna_next = 0;
3519 else
3520 a->vna_next = sizeof (Elf_External_Vernaux);
3521
3522 _bfd_elf_swap_vernaux_out (output_bfd, a,
3523 (Elf_External_Vernaux *) p);
3524 p += sizeof (Elf_External_Vernaux);
3525 }
3526 }
3527
3528 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERNEED,
3529 (bfd_vma) 0)
3530 || ! elf_add_dynamic_entry (info, (bfd_vma) DT_VERNEEDNUM,
3531 (bfd_vma) crefs))
3532 return false;
3533
3534 elf_tdata (output_bfd)->cverrefs = crefs;
3535 }
3536 }
3537
3538 /* Assign dynsym indicies. In a shared library we generate a
3539 section symbol for each output section, which come first.
3540 Next come all of the back-end allocated local dynamic syms,
3541 followed by the rest of the global symbols. */
3542
3543 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
3544
3545 /* Work out the size of the symbol version section. */
3546 s = bfd_get_section_by_name (dynobj, ".gnu.version");
3547 BFD_ASSERT (s != NULL);
3548 if (dynsymcount == 0
3549 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
3550 {
3551 _bfd_strip_section_from_output (info, s);
3552 /* The DYNSYMCOUNT might have changed if we were going to
3553 output a dynamic symbol table entry for S. */
3554 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
3555 }
3556 else
3557 {
3558 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
3559 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
3560 if (s->contents == NULL)
3561 return false;
3562
3563 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_VERSYM, (bfd_vma) 0))
3564 return false;
3565 }
3566
3567 /* Set the size of the .dynsym and .hash sections. We counted
3568 the number of dynamic symbols in elf_link_add_object_symbols.
3569 We will build the contents of .dynsym and .hash when we build
3570 the final symbol table, because until then we do not know the
3571 correct value to give the symbols. We built the .dynstr
3572 section as we went along in elf_link_add_object_symbols. */
3573 s = bfd_get_section_by_name (dynobj, ".dynsym");
3574 BFD_ASSERT (s != NULL);
3575 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
3576 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3577 if (s->contents == NULL && s->_raw_size != 0)
3578 return false;
3579
3580 if (dynsymcount != 0)
3581 {
3582 Elf_Internal_Sym isym;
3583
3584 /* The first entry in .dynsym is a dummy symbol. */
3585 isym.st_value = 0;
3586 isym.st_size = 0;
3587 isym.st_name = 0;
3588 isym.st_info = 0;
3589 isym.st_other = 0;
3590 isym.st_shndx = 0;
3591 elf_swap_symbol_out (output_bfd, &isym, (PTR) s->contents, (PTR) 0);
3592 }
3593
3594 /* Compute the size of the hashing table. As a side effect this
3595 computes the hash values for all the names we export. */
3596 bucketcount = compute_bucket_count (info);
3597
3598 s = bfd_get_section_by_name (dynobj, ".hash");
3599 BFD_ASSERT (s != NULL);
3600 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
3601 s->_raw_size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
3602 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
3603 if (s->contents == NULL)
3604 return false;
3605
3606 bfd_put (8 * hash_entry_size, output_bfd, (bfd_vma) bucketcount,
3607 s->contents);
3608 bfd_put (8 * hash_entry_size, output_bfd, (bfd_vma) dynsymcount,
3609 s->contents + hash_entry_size);
3610
3611 elf_hash_table (info)->bucketcount = bucketcount;
3612
3613 s = bfd_get_section_by_name (dynobj, ".dynstr");
3614 BFD_ASSERT (s != NULL);
3615
3616 elf_finalize_dynstr (output_bfd, info);
3617
3618 s->_raw_size = _bfd_elf_strtab_size (elf_hash_table (info)->dynstr);
3619
3620 for (dtagcount = 0; dtagcount <= info->spare_dynamic_tags; ++dtagcount)
3621 if (! elf_add_dynamic_entry (info, (bfd_vma) DT_NULL, (bfd_vma) 0))
3622 return false;
3623 }
3624
3625 return true;
3626 }
3627 \f
3628 /* This function is used to adjust offsets into .dynstr for
3629 dynamic symbols. This is called via elf_link_hash_traverse. */
3630
3631 static boolean elf_adjust_dynstr_offsets
3632 PARAMS ((struct elf_link_hash_entry *, PTR));
3633
3634 static boolean
3635 elf_adjust_dynstr_offsets (h, data)
3636 struct elf_link_hash_entry *h;
3637 PTR data;
3638 {
3639 struct elf_strtab_hash *dynstr = (struct elf_strtab_hash *) data;
3640
3641 if (h->root.type == bfd_link_hash_warning)
3642 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3643
3644 if (h->dynindx != -1)
3645 h->dynstr_index = _bfd_elf_strtab_offset (dynstr, h->dynstr_index);
3646 return true;
3647 }
3648
3649 /* Assign string offsets in .dynstr, update all structures referencing
3650 them. */
3651
3652 static boolean
3653 elf_finalize_dynstr (output_bfd, info)
3654 bfd *output_bfd;
3655 struct bfd_link_info *info;
3656 {
3657 struct elf_link_local_dynamic_entry *entry;
3658 struct elf_strtab_hash *dynstr = elf_hash_table (info)->dynstr;
3659 bfd *dynobj = elf_hash_table (info)->dynobj;
3660 asection *sdyn;
3661 bfd_size_type size;
3662 Elf_External_Dyn *dyncon, *dynconend;
3663
3664 _bfd_elf_strtab_finalize (dynstr);
3665 size = _bfd_elf_strtab_size (dynstr);
3666
3667 /* Update all .dynamic entries referencing .dynstr strings. */
3668 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
3669 BFD_ASSERT (sdyn != NULL);
3670
3671 dyncon = (Elf_External_Dyn *) sdyn->contents;
3672 dynconend = (Elf_External_Dyn *) (sdyn->contents +
3673 sdyn->_raw_size);
3674 for (; dyncon < dynconend; dyncon++)
3675 {
3676 Elf_Internal_Dyn dyn;
3677
3678 elf_swap_dyn_in (dynobj, dyncon, & dyn);
3679 switch (dyn.d_tag)
3680 {
3681 case DT_STRSZ:
3682 dyn.d_un.d_val = size;
3683 elf_swap_dyn_out (dynobj, & dyn, dyncon);
3684 break;
3685 case DT_NEEDED:
3686 case DT_SONAME:
3687 case DT_RPATH:
3688 case DT_RUNPATH:
3689 case DT_FILTER:
3690 case DT_AUXILIARY:
3691 dyn.d_un.d_val = _bfd_elf_strtab_offset (dynstr, dyn.d_un.d_val);
3692 elf_swap_dyn_out (dynobj, & dyn, dyncon);
3693 break;
3694 default:
3695 break;
3696 }
3697 }
3698
3699 /* Now update local dynamic symbols. */
3700 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
3701 entry->isym.st_name = _bfd_elf_strtab_offset (dynstr,
3702 entry->isym.st_name);
3703
3704 /* And the rest of dynamic symbols. */
3705 elf_link_hash_traverse (elf_hash_table (info),
3706 elf_adjust_dynstr_offsets, dynstr);
3707
3708 /* Adjust version definitions. */
3709 if (elf_tdata (output_bfd)->cverdefs)
3710 {
3711 asection *s;
3712 bfd_byte *p;
3713 bfd_size_type i;
3714 Elf_Internal_Verdef def;
3715 Elf_Internal_Verdaux defaux;
3716
3717 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3718 p = (bfd_byte *) s->contents;
3719 do
3720 {
3721 _bfd_elf_swap_verdef_in (output_bfd, (Elf_External_Verdef *) p,
3722 &def);
3723 p += sizeof (Elf_External_Verdef);
3724 for (i = 0; i < def.vd_cnt; ++i)
3725 {
3726 _bfd_elf_swap_verdaux_in (output_bfd,
3727 (Elf_External_Verdaux *) p, &defaux);
3728 defaux.vda_name = _bfd_elf_strtab_offset (dynstr,
3729 defaux.vda_name);
3730 _bfd_elf_swap_verdaux_out (output_bfd,
3731 &defaux, (Elf_External_Verdaux *) p);
3732 p += sizeof (Elf_External_Verdaux);
3733 }
3734 }
3735 while (def.vd_next);
3736 }
3737
3738 /* Adjust version references. */
3739 if (elf_tdata (output_bfd)->verref)
3740 {
3741 asection *s;
3742 bfd_byte *p;
3743 bfd_size_type i;
3744 Elf_Internal_Verneed need;
3745 Elf_Internal_Vernaux needaux;
3746
3747 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3748 p = (bfd_byte *) s->contents;
3749 do
3750 {
3751 _bfd_elf_swap_verneed_in (output_bfd, (Elf_External_Verneed *) p,
3752 &need);
3753 need.vn_file = _bfd_elf_strtab_offset (dynstr, need.vn_file);
3754 _bfd_elf_swap_verneed_out (output_bfd, &need,
3755 (Elf_External_Verneed *) p);
3756 p += sizeof (Elf_External_Verneed);
3757 for (i = 0; i < need.vn_cnt; ++i)
3758 {
3759 _bfd_elf_swap_vernaux_in (output_bfd,
3760 (Elf_External_Vernaux *) p, &needaux);
3761 needaux.vna_name = _bfd_elf_strtab_offset (dynstr,
3762 needaux.vna_name);
3763 _bfd_elf_swap_vernaux_out (output_bfd,
3764 &needaux,
3765 (Elf_External_Vernaux *) p);
3766 p += sizeof (Elf_External_Vernaux);
3767 }
3768 }
3769 while (need.vn_next);
3770 }
3771
3772 return true;
3773 }
3774
3775 /* Fix up the flags for a symbol. This handles various cases which
3776 can only be fixed after all the input files are seen. This is
3777 currently called by both adjust_dynamic_symbol and
3778 assign_sym_version, which is unnecessary but perhaps more robust in
3779 the face of future changes. */
3780
3781 static boolean
3782 elf_fix_symbol_flags (h, eif)
3783 struct elf_link_hash_entry *h;
3784 struct elf_info_failed *eif;
3785 {
3786 /* If this symbol was mentioned in a non-ELF file, try to set
3787 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
3788 permit a non-ELF file to correctly refer to a symbol defined in
3789 an ELF dynamic object. */
3790 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) != 0)
3791 {
3792 while (h->root.type == bfd_link_hash_indirect)
3793 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3794
3795 if (h->root.type != bfd_link_hash_defined
3796 && h->root.type != bfd_link_hash_defweak)
3797 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3798 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3799 else
3800 {
3801 if (h->root.u.def.section->owner != NULL
3802 && (bfd_get_flavour (h->root.u.def.section->owner)
3803 == bfd_target_elf_flavour))
3804 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3805 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3806 else
3807 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3808 }
3809
3810 if (h->dynindx == -1
3811 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3812 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
3813 {
3814 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
3815 {
3816 eif->failed = true;
3817 return false;
3818 }
3819 }
3820 }
3821 else
3822 {
3823 /* Unfortunately, ELF_LINK_NON_ELF is only correct if the symbol
3824 was first seen in a non-ELF file. Fortunately, if the symbol
3825 was first seen in an ELF file, we're probably OK unless the
3826 symbol was defined in a non-ELF file. Catch that case here.
3827 FIXME: We're still in trouble if the symbol was first seen in
3828 a dynamic object, and then later in a non-ELF regular object. */
3829 if ((h->root.type == bfd_link_hash_defined
3830 || h->root.type == bfd_link_hash_defweak)
3831 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3832 && (h->root.u.def.section->owner != NULL
3833 ? (bfd_get_flavour (h->root.u.def.section->owner)
3834 != bfd_target_elf_flavour)
3835 : (bfd_is_abs_section (h->root.u.def.section)
3836 && (h->elf_link_hash_flags
3837 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)))
3838 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3839 }
3840
3841 /* If this is a final link, and the symbol was defined as a common
3842 symbol in a regular object file, and there was no definition in
3843 any dynamic object, then the linker will have allocated space for
3844 the symbol in a common section but the ELF_LINK_HASH_DEF_REGULAR
3845 flag will not have been set. */
3846 if (h->root.type == bfd_link_hash_defined
3847 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3848 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
3849 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3850 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3851 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3852
3853 /* If -Bsymbolic was used (which means to bind references to global
3854 symbols to the definition within the shared object), and this
3855 symbol was defined in a regular object, then it actually doesn't
3856 need a PLT entry, and we can accomplish that by forcing it local.
3857 Likewise, if the symbol has hidden or internal visibility.
3858 FIXME: It might be that we also do not need a PLT for other
3859 non-hidden visibilities, but we would have to tell that to the
3860 backend specifically; we can't just clear PLT-related data here. */
3861 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
3862 && eif->info->shared
3863 && is_elf_hash_table (eif->info)
3864 && (eif->info->symbolic
3865 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3866 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
3867 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3868 {
3869 struct elf_backend_data *bed;
3870 boolean force_local;
3871
3872 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
3873
3874 force_local = (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3875 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN);
3876 (*bed->elf_backend_hide_symbol) (eif->info, h, force_local);
3877 }
3878
3879 /* If this is a weak defined symbol in a dynamic object, and we know
3880 the real definition in the dynamic object, copy interesting flags
3881 over to the real definition. */
3882 if (h->weakdef != NULL)
3883 {
3884 struct elf_link_hash_entry *weakdef;
3885
3886 BFD_ASSERT (h->root.type == bfd_link_hash_defined
3887 || h->root.type == bfd_link_hash_defweak);
3888 weakdef = h->weakdef;
3889 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
3890 || weakdef->root.type == bfd_link_hash_defweak);
3891 BFD_ASSERT (weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC);
3892
3893 /* If the real definition is defined by a regular object file,
3894 don't do anything special. See the longer description in
3895 elf_adjust_dynamic_symbol, below. */
3896 if ((weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3897 h->weakdef = NULL;
3898 else
3899 {
3900 struct elf_backend_data *bed;
3901
3902 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
3903 (*bed->elf_backend_copy_indirect_symbol) (weakdef, h);
3904 }
3905 }
3906
3907 return true;
3908 }
3909
3910 /* Make the backend pick a good value for a dynamic symbol. This is
3911 called via elf_link_hash_traverse, and also calls itself
3912 recursively. */
3913
3914 static boolean
3915 elf_adjust_dynamic_symbol (h, data)
3916 struct elf_link_hash_entry *h;
3917 PTR data;
3918 {
3919 struct elf_info_failed *eif = (struct elf_info_failed *) data;
3920 bfd *dynobj;
3921 struct elf_backend_data *bed;
3922
3923 if (h->root.type == bfd_link_hash_warning)
3924 {
3925 h->plt.offset = (bfd_vma) -1;
3926 h->got.offset = (bfd_vma) -1;
3927
3928 /* When warning symbols are created, they **replace** the "real"
3929 entry in the hash table, thus we never get to see the real
3930 symbol in a hash traversal. So look at it now. */
3931 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3932 }
3933
3934 /* Ignore indirect symbols. These are added by the versioning code. */
3935 if (h->root.type == bfd_link_hash_indirect)
3936 return true;
3937
3938 if (! is_elf_hash_table (eif->info))
3939 return false;
3940
3941 /* Fix the symbol flags. */
3942 if (! elf_fix_symbol_flags (h, eif))
3943 return false;
3944
3945 /* If this symbol does not require a PLT entry, and it is not
3946 defined by a dynamic object, or is not referenced by a regular
3947 object, ignore it. We do have to handle a weak defined symbol,
3948 even if no regular object refers to it, if we decided to add it
3949 to the dynamic symbol table. FIXME: Do we normally need to worry
3950 about symbols which are defined by one dynamic object and
3951 referenced by another one? */
3952 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0
3953 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
3954 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3955 || ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
3956 && (h->weakdef == NULL || h->weakdef->dynindx == -1))))
3957 {
3958 h->plt.offset = (bfd_vma) -1;
3959 return true;
3960 }
3961
3962 /* If we've already adjusted this symbol, don't do it again. This
3963 can happen via a recursive call. */
3964 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
3965 return true;
3966
3967 /* Don't look at this symbol again. Note that we must set this
3968 after checking the above conditions, because we may look at a
3969 symbol once, decide not to do anything, and then get called
3970 recursively later after REF_REGULAR is set below. */
3971 h->elf_link_hash_flags |= ELF_LINK_HASH_DYNAMIC_ADJUSTED;
3972
3973 /* If this is a weak definition, and we know a real definition, and
3974 the real symbol is not itself defined by a regular object file,
3975 then get a good value for the real definition. We handle the
3976 real symbol first, for the convenience of the backend routine.
3977
3978 Note that there is a confusing case here. If the real definition
3979 is defined by a regular object file, we don't get the real symbol
3980 from the dynamic object, but we do get the weak symbol. If the
3981 processor backend uses a COPY reloc, then if some routine in the
3982 dynamic object changes the real symbol, we will not see that
3983 change in the corresponding weak symbol. This is the way other
3984 ELF linkers work as well, and seems to be a result of the shared
3985 library model.
3986
3987 I will clarify this issue. Most SVR4 shared libraries define the
3988 variable _timezone and define timezone as a weak synonym. The
3989 tzset call changes _timezone. If you write
3990 extern int timezone;
3991 int _timezone = 5;
3992 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
3993 you might expect that, since timezone is a synonym for _timezone,
3994 the same number will print both times. However, if the processor
3995 backend uses a COPY reloc, then actually timezone will be copied
3996 into your process image, and, since you define _timezone
3997 yourself, _timezone will not. Thus timezone and _timezone will
3998 wind up at different memory locations. The tzset call will set
3999 _timezone, leaving timezone unchanged. */
4000
4001 if (h->weakdef != NULL)
4002 {
4003 /* If we get to this point, we know there is an implicit
4004 reference by a regular object file via the weak symbol H.
4005 FIXME: Is this really true? What if the traversal finds
4006 H->WEAKDEF before it finds H? */
4007 h->weakdef->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
4008
4009 if (! elf_adjust_dynamic_symbol (h->weakdef, (PTR) eif))
4010 return false;
4011 }
4012
4013 /* If a symbol has no type and no size and does not require a PLT
4014 entry, then we are probably about to do the wrong thing here: we
4015 are probably going to create a COPY reloc for an empty object.
4016 This case can arise when a shared object is built with assembly
4017 code, and the assembly code fails to set the symbol type. */
4018 if (h->size == 0
4019 && h->type == STT_NOTYPE
4020 && (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0)
4021 (*_bfd_error_handler)
4022 (_("warning: type and size of dynamic symbol `%s' are not defined"),
4023 h->root.root.string);
4024
4025 dynobj = elf_hash_table (eif->info)->dynobj;
4026 bed = get_elf_backend_data (dynobj);
4027 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
4028 {
4029 eif->failed = true;
4030 return false;
4031 }
4032
4033 return true;
4034 }
4035 \f
4036 /* This routine is used to export all defined symbols into the dynamic
4037 symbol table. It is called via elf_link_hash_traverse. */
4038
4039 static boolean
4040 elf_export_symbol (h, data)
4041 struct elf_link_hash_entry *h;
4042 PTR data;
4043 {
4044 struct elf_info_failed *eif = (struct elf_info_failed *) data;
4045
4046 /* Ignore indirect symbols. These are added by the versioning code. */
4047 if (h->root.type == bfd_link_hash_indirect)
4048 return true;
4049
4050 if (h->root.type == bfd_link_hash_warning)
4051 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4052
4053 if (h->dynindx == -1
4054 && (h->elf_link_hash_flags
4055 & (ELF_LINK_HASH_DEF_REGULAR | ELF_LINK_HASH_REF_REGULAR)) != 0)
4056 {
4057 struct bfd_elf_version_tree *t;
4058 struct bfd_elf_version_expr *d;
4059
4060 for (t = eif->verdefs; t != NULL; t = t->next)
4061 {
4062 if (t->globals != NULL)
4063 {
4064 for (d = t->globals; d != NULL; d = d->next)
4065 {
4066 if ((*d->match) (d, h->root.root.string))
4067 goto doit;
4068 }
4069 }
4070
4071 if (t->locals != NULL)
4072 {
4073 for (d = t->locals ; d != NULL; d = d->next)
4074 {
4075 if ((*d->match) (d, h->root.root.string))
4076 return true;
4077 }
4078 }
4079 }
4080
4081 if (!eif->verdefs)
4082 {
4083 doit:
4084 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
4085 {
4086 eif->failed = true;
4087 return false;
4088 }
4089 }
4090 }
4091
4092 return true;
4093 }
4094 \f
4095 /* Look through the symbols which are defined in other shared
4096 libraries and referenced here. Update the list of version
4097 dependencies. This will be put into the .gnu.version_r section.
4098 This function is called via elf_link_hash_traverse. */
4099
4100 static boolean
4101 elf_link_find_version_dependencies (h, data)
4102 struct elf_link_hash_entry *h;
4103 PTR data;
4104 {
4105 struct elf_find_verdep_info *rinfo = (struct elf_find_verdep_info *) data;
4106 Elf_Internal_Verneed *t;
4107 Elf_Internal_Vernaux *a;
4108 bfd_size_type amt;
4109
4110 if (h->root.type == bfd_link_hash_warning)
4111 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4112
4113 /* We only care about symbols defined in shared objects with version
4114 information. */
4115 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
4116 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
4117 || h->dynindx == -1
4118 || h->verinfo.verdef == NULL)
4119 return true;
4120
4121 /* See if we already know about this version. */
4122 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
4123 {
4124 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
4125 continue;
4126
4127 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
4128 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
4129 return true;
4130
4131 break;
4132 }
4133
4134 /* This is a new version. Add it to tree we are building. */
4135
4136 if (t == NULL)
4137 {
4138 amt = sizeof *t;
4139 t = (Elf_Internal_Verneed *) bfd_zalloc (rinfo->output_bfd, amt);
4140 if (t == NULL)
4141 {
4142 rinfo->failed = true;
4143 return false;
4144 }
4145
4146 t->vn_bfd = h->verinfo.verdef->vd_bfd;
4147 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
4148 elf_tdata (rinfo->output_bfd)->verref = t;
4149 }
4150
4151 amt = sizeof *a;
4152 a = (Elf_Internal_Vernaux *) bfd_zalloc (rinfo->output_bfd, amt);
4153
4154 /* Note that we are copying a string pointer here, and testing it
4155 above. If bfd_elf_string_from_elf_section is ever changed to
4156 discard the string data when low in memory, this will have to be
4157 fixed. */
4158 a->vna_nodename = h->verinfo.verdef->vd_nodename;
4159
4160 a->vna_flags = h->verinfo.verdef->vd_flags;
4161 a->vna_nextptr = t->vn_auxptr;
4162
4163 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
4164 ++rinfo->vers;
4165
4166 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
4167
4168 t->vn_auxptr = a;
4169
4170 return true;
4171 }
4172
4173 /* Figure out appropriate versions for all the symbols. We may not
4174 have the version number script until we have read all of the input
4175 files, so until that point we don't know which symbols should be
4176 local. This function is called via elf_link_hash_traverse. */
4177
4178 static boolean
4179 elf_link_assign_sym_version (h, data)
4180 struct elf_link_hash_entry *h;
4181 PTR data;
4182 {
4183 struct elf_assign_sym_version_info *sinfo;
4184 struct bfd_link_info *info;
4185 struct elf_backend_data *bed;
4186 struct elf_info_failed eif;
4187 char *p;
4188 bfd_size_type amt;
4189
4190 sinfo = (struct elf_assign_sym_version_info *) data;
4191 info = sinfo->info;
4192
4193 if (h->root.type == bfd_link_hash_warning)
4194 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4195
4196 /* Fix the symbol flags. */
4197 eif.failed = false;
4198 eif.info = info;
4199 if (! elf_fix_symbol_flags (h, &eif))
4200 {
4201 if (eif.failed)
4202 sinfo->failed = true;
4203 return false;
4204 }
4205
4206 /* We only need version numbers for symbols defined in regular
4207 objects. */
4208 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4209 return true;
4210
4211 bed = get_elf_backend_data (sinfo->output_bfd);
4212 p = strchr (h->root.root.string, ELF_VER_CHR);
4213 if (p != NULL && h->verinfo.vertree == NULL)
4214 {
4215 struct bfd_elf_version_tree *t;
4216 boolean hidden;
4217
4218 hidden = true;
4219
4220 /* There are two consecutive ELF_VER_CHR characters if this is
4221 not a hidden symbol. */
4222 ++p;
4223 if (*p == ELF_VER_CHR)
4224 {
4225 hidden = false;
4226 ++p;
4227 }
4228
4229 /* If there is no version string, we can just return out. */
4230 if (*p == '\0')
4231 {
4232 if (hidden)
4233 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
4234 return true;
4235 }
4236
4237 /* Look for the version. If we find it, it is no longer weak. */
4238 for (t = sinfo->verdefs; t != NULL; t = t->next)
4239 {
4240 if (strcmp (t->name, p) == 0)
4241 {
4242 size_t len;
4243 char *alc;
4244 struct bfd_elf_version_expr *d;
4245
4246 len = p - h->root.root.string;
4247 alc = bfd_malloc ((bfd_size_type) len);
4248 if (alc == NULL)
4249 return false;
4250 memcpy (alc, h->root.root.string, len - 1);
4251 alc[len - 1] = '\0';
4252 if (alc[len - 2] == ELF_VER_CHR)
4253 alc[len - 2] = '\0';
4254
4255 h->verinfo.vertree = t;
4256 t->used = true;
4257 d = NULL;
4258
4259 if (t->globals != NULL)
4260 {
4261 for (d = t->globals; d != NULL; d = d->next)
4262 if ((*d->match) (d, alc))
4263 break;
4264 }
4265
4266 /* See if there is anything to force this symbol to
4267 local scope. */
4268 if (d == NULL && t->locals != NULL)
4269 {
4270 for (d = t->locals; d != NULL; d = d->next)
4271 {
4272 if ((*d->match) (d, alc))
4273 {
4274 if (h->dynindx != -1
4275 && info->shared
4276 && ! info->export_dynamic)
4277 {
4278 (*bed->elf_backend_hide_symbol) (info, h, true);
4279 }
4280
4281 break;
4282 }
4283 }
4284 }
4285
4286 free (alc);
4287 break;
4288 }
4289 }
4290
4291 /* If we are building an application, we need to create a
4292 version node for this version. */
4293 if (t == NULL && ! info->shared)
4294 {
4295 struct bfd_elf_version_tree **pp;
4296 int version_index;
4297
4298 /* If we aren't going to export this symbol, we don't need
4299 to worry about it. */
4300 if (h->dynindx == -1)
4301 return true;
4302
4303 amt = sizeof *t;
4304 t = ((struct bfd_elf_version_tree *)
4305 bfd_alloc (sinfo->output_bfd, amt));
4306 if (t == NULL)
4307 {
4308 sinfo->failed = true;
4309 return false;
4310 }
4311
4312 t->next = NULL;
4313 t->name = p;
4314 t->globals = NULL;
4315 t->locals = NULL;
4316 t->deps = NULL;
4317 t->name_indx = (unsigned int) -1;
4318 t->used = true;
4319
4320 version_index = 1;
4321 /* Don't count anonymous version tag. */
4322 if (sinfo->verdefs != NULL && sinfo->verdefs->vernum == 0)
4323 version_index = 0;
4324 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
4325 ++version_index;
4326 t->vernum = version_index;
4327
4328 *pp = t;
4329
4330 h->verinfo.vertree = t;
4331 }
4332 else if (t == NULL)
4333 {
4334 /* We could not find the version for a symbol when
4335 generating a shared archive. Return an error. */
4336 (*_bfd_error_handler)
4337 (_("%s: undefined versioned symbol name %s"),
4338 bfd_get_filename (sinfo->output_bfd), h->root.root.string);
4339 bfd_set_error (bfd_error_bad_value);
4340 sinfo->failed = true;
4341 return false;
4342 }
4343
4344 if (hidden)
4345 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
4346 }
4347
4348 /* If we don't have a version for this symbol, see if we can find
4349 something. */
4350 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
4351 {
4352 struct bfd_elf_version_tree *t;
4353 struct bfd_elf_version_tree *local_ver;
4354 struct bfd_elf_version_expr *d;
4355
4356 /* See if can find what version this symbol is in. If the
4357 symbol is supposed to be local, then don't actually register
4358 it. */
4359 local_ver = NULL;
4360 for (t = sinfo->verdefs; t != NULL; t = t->next)
4361 {
4362 if (t->globals != NULL)
4363 {
4364 boolean matched;
4365
4366 matched = false;
4367 for (d = t->globals; d != NULL; d = d->next)
4368 {
4369 if ((*d->match) (d, h->root.root.string))
4370 {
4371 if (d->symver)
4372 matched = true;
4373 else
4374 {
4375 /* There is a version without definition. Make
4376 the symbol the default definition for this
4377 version. */
4378 h->verinfo.vertree = t;
4379 local_ver = NULL;
4380 d->script = 1;
4381 break;
4382 }
4383 }
4384 }
4385
4386 if (d != NULL)
4387 break;
4388 else if (matched)
4389 /* There is no undefined version for this symbol. Hide the
4390 default one. */
4391 (*bed->elf_backend_hide_symbol) (info, h, true);
4392 }
4393
4394 if (t->locals != NULL)
4395 {
4396 for (d = t->locals; d != NULL; d = d->next)
4397 {
4398 /* If the match is "*", keep looking for a more
4399 explicit, perhaps even global, match. */
4400 if (d->pattern[0] == '*' && d->pattern[1] == '\0')
4401 local_ver = t;
4402 else if ((*d->match) (d, h->root.root.string))
4403 {
4404 local_ver = t;
4405 break;
4406 }
4407 }
4408
4409 if (d != NULL)
4410 break;
4411 }
4412 }
4413
4414 if (local_ver != NULL)
4415 {
4416 h->verinfo.vertree = local_ver;
4417 if (h->dynindx != -1
4418 && info->shared
4419 && ! info->export_dynamic)
4420 {
4421 (*bed->elf_backend_hide_symbol) (info, h, true);
4422 }
4423 }
4424 }
4425
4426 return true;
4427 }
4428 \f
4429 /* Final phase of ELF linker. */
4430
4431 /* A structure we use to avoid passing large numbers of arguments. */
4432
4433 struct elf_final_link_info
4434 {
4435 /* General link information. */
4436 struct bfd_link_info *info;
4437 /* Output BFD. */
4438 bfd *output_bfd;
4439 /* Symbol string table. */
4440 struct bfd_strtab_hash *symstrtab;
4441 /* .dynsym section. */
4442 asection *dynsym_sec;
4443 /* .hash section. */
4444 asection *hash_sec;
4445 /* symbol version section (.gnu.version). */
4446 asection *symver_sec;
4447 /* first SHF_TLS section (if any). */
4448 asection *first_tls_sec;
4449 /* Buffer large enough to hold contents of any section. */
4450 bfd_byte *contents;
4451 /* Buffer large enough to hold external relocs of any section. */
4452 PTR external_relocs;
4453 /* Buffer large enough to hold internal relocs of any section. */
4454 Elf_Internal_Rela *internal_relocs;
4455 /* Buffer large enough to hold external local symbols of any input
4456 BFD. */
4457 Elf_External_Sym *external_syms;
4458 /* And a buffer for symbol section indices. */
4459 Elf_External_Sym_Shndx *locsym_shndx;
4460 /* Buffer large enough to hold internal local symbols of any input
4461 BFD. */
4462 Elf_Internal_Sym *internal_syms;
4463 /* Array large enough to hold a symbol index for each local symbol
4464 of any input BFD. */
4465 long *indices;
4466 /* Array large enough to hold a section pointer for each local
4467 symbol of any input BFD. */
4468 asection **sections;
4469 /* Buffer to hold swapped out symbols. */
4470 Elf_External_Sym *symbuf;
4471 /* And one for symbol section indices. */
4472 Elf_External_Sym_Shndx *symshndxbuf;
4473 /* Number of swapped out symbols in buffer. */
4474 size_t symbuf_count;
4475 /* Number of symbols which fit in symbuf. */
4476 size_t symbuf_size;
4477 };
4478
4479 static boolean elf_link_output_sym
4480 PARAMS ((struct elf_final_link_info *, const char *,
4481 Elf_Internal_Sym *, asection *));
4482 static boolean elf_link_flush_output_syms
4483 PARAMS ((struct elf_final_link_info *));
4484 static boolean elf_link_output_extsym
4485 PARAMS ((struct elf_link_hash_entry *, PTR));
4486 static boolean elf_link_sec_merge_syms
4487 PARAMS ((struct elf_link_hash_entry *, PTR));
4488 static boolean elf_link_check_versioned_symbol
4489 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
4490 static boolean elf_link_input_bfd
4491 PARAMS ((struct elf_final_link_info *, bfd *));
4492 static boolean elf_reloc_link_order
4493 PARAMS ((bfd *, struct bfd_link_info *, asection *,
4494 struct bfd_link_order *));
4495
4496 /* This struct is used to pass information to elf_link_output_extsym. */
4497
4498 struct elf_outext_info
4499 {
4500 boolean failed;
4501 boolean localsyms;
4502 struct elf_final_link_info *finfo;
4503 };
4504
4505 /* Compute the size of, and allocate space for, REL_HDR which is the
4506 section header for a section containing relocations for O. */
4507
4508 static boolean
4509 elf_link_size_reloc_section (abfd, rel_hdr, o)
4510 bfd *abfd;
4511 Elf_Internal_Shdr *rel_hdr;
4512 asection *o;
4513 {
4514 bfd_size_type reloc_count;
4515 bfd_size_type num_rel_hashes;
4516
4517 /* Figure out how many relocations there will be. */
4518 if (rel_hdr == &elf_section_data (o)->rel_hdr)
4519 reloc_count = elf_section_data (o)->rel_count;
4520 else
4521 reloc_count = elf_section_data (o)->rel_count2;
4522
4523 num_rel_hashes = o->reloc_count;
4524 if (num_rel_hashes < reloc_count)
4525 num_rel_hashes = reloc_count;
4526
4527 /* That allows us to calculate the size of the section. */
4528 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
4529
4530 /* The contents field must last into write_object_contents, so we
4531 allocate it with bfd_alloc rather than malloc. Also since we
4532 cannot be sure that the contents will actually be filled in,
4533 we zero the allocated space. */
4534 rel_hdr->contents = (PTR) bfd_zalloc (abfd, rel_hdr->sh_size);
4535 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
4536 return false;
4537
4538 /* We only allocate one set of hash entries, so we only do it the
4539 first time we are called. */
4540 if (elf_section_data (o)->rel_hashes == NULL
4541 && num_rel_hashes)
4542 {
4543 struct elf_link_hash_entry **p;
4544
4545 p = ((struct elf_link_hash_entry **)
4546 bfd_zmalloc (num_rel_hashes
4547 * sizeof (struct elf_link_hash_entry *)));
4548 if (p == NULL)
4549 return false;
4550
4551 elf_section_data (o)->rel_hashes = p;
4552 }
4553
4554 return true;
4555 }
4556
4557 /* When performing a relocateable link, the input relocations are
4558 preserved. But, if they reference global symbols, the indices
4559 referenced must be updated. Update all the relocations in
4560 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
4561
4562 static void
4563 elf_link_adjust_relocs (abfd, rel_hdr, count, rel_hash)
4564 bfd *abfd;
4565 Elf_Internal_Shdr *rel_hdr;
4566 unsigned int count;
4567 struct elf_link_hash_entry **rel_hash;
4568 {
4569 unsigned int i;
4570 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4571 Elf_Internal_Rel *irel;
4572 Elf_Internal_Rela *irela;
4573 bfd_size_type amt = sizeof (Elf_Internal_Rel) * bed->s->int_rels_per_ext_rel;
4574
4575 irel = (Elf_Internal_Rel *) bfd_zmalloc (amt);
4576 if (irel == NULL)
4577 {
4578 (*_bfd_error_handler) (_("Error: out of memory"));
4579 abort ();
4580 }
4581
4582 amt = sizeof (Elf_Internal_Rela) * bed->s->int_rels_per_ext_rel;
4583 irela = (Elf_Internal_Rela *) bfd_zmalloc (amt);
4584 if (irela == NULL)
4585 {
4586 (*_bfd_error_handler) (_("Error: out of memory"));
4587 abort ();
4588 }
4589
4590 for (i = 0; i < count; i++, rel_hash++)
4591 {
4592 if (*rel_hash == NULL)
4593 continue;
4594
4595 BFD_ASSERT ((*rel_hash)->indx >= 0);
4596
4597 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
4598 {
4599 Elf_External_Rel *erel;
4600 unsigned int j;
4601
4602 erel = (Elf_External_Rel *) rel_hdr->contents + i;
4603 if (bed->s->swap_reloc_in)
4604 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, irel);
4605 else
4606 elf_swap_reloc_in (abfd, erel, irel);
4607
4608 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
4609 irel[j].r_info = ELF_R_INFO ((*rel_hash)->indx,
4610 ELF_R_TYPE (irel[j].r_info));
4611
4612 if (bed->s->swap_reloc_out)
4613 (*bed->s->swap_reloc_out) (abfd, irel, (bfd_byte *) erel);
4614 else
4615 elf_swap_reloc_out (abfd, irel, erel);
4616 }
4617 else
4618 {
4619 Elf_External_Rela *erela;
4620 unsigned int j;
4621
4622 BFD_ASSERT (rel_hdr->sh_entsize
4623 == sizeof (Elf_External_Rela));
4624
4625 erela = (Elf_External_Rela *) rel_hdr->contents + i;
4626 if (bed->s->swap_reloca_in)
4627 (*bed->s->swap_reloca_in) (abfd, (bfd_byte *) erela, irela);
4628 else
4629 elf_swap_reloca_in (abfd, erela, irela);
4630
4631 for (j = 0; j < bed->s->int_rels_per_ext_rel; j++)
4632 irela[j].r_info = ELF_R_INFO ((*rel_hash)->indx,
4633 ELF_R_TYPE (irela[j].r_info));
4634
4635 if (bed->s->swap_reloca_out)
4636 (*bed->s->swap_reloca_out) (abfd, irela, (bfd_byte *) erela);
4637 else
4638 elf_swap_reloca_out (abfd, irela, erela);
4639 }
4640 }
4641
4642 free (irel);
4643 free (irela);
4644 }
4645
4646 struct elf_link_sort_rela
4647 {
4648 bfd_vma offset;
4649 enum elf_reloc_type_class type;
4650 union
4651 {
4652 Elf_Internal_Rel rel;
4653 Elf_Internal_Rela rela;
4654 } u;
4655 };
4656
4657 static int
4658 elf_link_sort_cmp1 (A, B)
4659 const PTR A;
4660 const PTR B;
4661 {
4662 struct elf_link_sort_rela *a = (struct elf_link_sort_rela *) A;
4663 struct elf_link_sort_rela *b = (struct elf_link_sort_rela *) B;
4664 int relativea, relativeb;
4665
4666 relativea = a->type == reloc_class_relative;
4667 relativeb = b->type == reloc_class_relative;
4668
4669 if (relativea < relativeb)
4670 return 1;
4671 if (relativea > relativeb)
4672 return -1;
4673 if (ELF_R_SYM (a->u.rel.r_info) < ELF_R_SYM (b->u.rel.r_info))
4674 return -1;
4675 if (ELF_R_SYM (a->u.rel.r_info) > ELF_R_SYM (b->u.rel.r_info))
4676 return 1;
4677 if (a->u.rel.r_offset < b->u.rel.r_offset)
4678 return -1;
4679 if (a->u.rel.r_offset > b->u.rel.r_offset)
4680 return 1;
4681 return 0;
4682 }
4683
4684 static int
4685 elf_link_sort_cmp2 (A, B)
4686 const PTR A;
4687 const PTR B;
4688 {
4689 struct elf_link_sort_rela *a = (struct elf_link_sort_rela *) A;
4690 struct elf_link_sort_rela *b = (struct elf_link_sort_rela *) B;
4691 int copya, copyb;
4692
4693 if (a->offset < b->offset)
4694 return -1;
4695 if (a->offset > b->offset)
4696 return 1;
4697 copya = (a->type == reloc_class_copy) * 2 + (a->type == reloc_class_plt);
4698 copyb = (b->type == reloc_class_copy) * 2 + (b->type == reloc_class_plt);
4699 if (copya < copyb)
4700 return -1;
4701 if (copya > copyb)
4702 return 1;
4703 if (a->u.rel.r_offset < b->u.rel.r_offset)
4704 return -1;
4705 if (a->u.rel.r_offset > b->u.rel.r_offset)
4706 return 1;
4707 return 0;
4708 }
4709
4710 static size_t
4711 elf_link_sort_relocs (abfd, info, psec)
4712 bfd *abfd;
4713 struct bfd_link_info *info;
4714 asection **psec;
4715 {
4716 bfd *dynobj = elf_hash_table (info)->dynobj;
4717 asection *reldyn, *o;
4718 boolean rel = false;
4719 bfd_size_type count, size;
4720 size_t i, j, ret;
4721 struct elf_link_sort_rela *rela;
4722 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4723
4724 reldyn = bfd_get_section_by_name (abfd, ".rela.dyn");
4725 if (reldyn == NULL || reldyn->_raw_size == 0)
4726 {
4727 reldyn = bfd_get_section_by_name (abfd, ".rel.dyn");
4728 if (reldyn == NULL || reldyn->_raw_size == 0)
4729 return 0;
4730 rel = true;
4731 count = reldyn->_raw_size / sizeof (Elf_External_Rel);
4732 }
4733 else
4734 count = reldyn->_raw_size / sizeof (Elf_External_Rela);
4735
4736 size = 0;
4737 for (o = dynobj->sections; o != NULL; o = o->next)
4738 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4739 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4740 && o->output_section == reldyn)
4741 size += o->_raw_size;
4742
4743 if (size != reldyn->_raw_size)
4744 return 0;
4745
4746 rela = (struct elf_link_sort_rela *) bfd_zmalloc (sizeof (*rela) * count);
4747 if (rela == NULL)
4748 {
4749 (*info->callbacks->warning)
4750 (info, _("Not enough memory to sort relocations"), 0, abfd, 0,
4751 (bfd_vma) 0);
4752 return 0;
4753 }
4754
4755 for (o = dynobj->sections; o != NULL; o = o->next)
4756 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4757 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4758 && o->output_section == reldyn)
4759 {
4760 if (rel)
4761 {
4762 Elf_External_Rel *erel, *erelend;
4763 struct elf_link_sort_rela *s;
4764
4765 erel = (Elf_External_Rel *) o->contents;
4766 erelend = (Elf_External_Rel *) (o->contents + o->_raw_size);
4767 s = rela + o->output_offset / sizeof (Elf_External_Rel);
4768 for (; erel < erelend; erel++, s++)
4769 {
4770 if (bed->s->swap_reloc_in)
4771 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, &s->u.rel);
4772 else
4773 elf_swap_reloc_in (abfd, erel, &s->u.rel);
4774
4775 s->type = (*bed->elf_backend_reloc_type_class) (&s->u.rela);
4776 }
4777 }
4778 else
4779 {
4780 Elf_External_Rela *erela, *erelaend;
4781 struct elf_link_sort_rela *s;
4782
4783 erela = (Elf_External_Rela *) o->contents;
4784 erelaend = (Elf_External_Rela *) (o->contents + o->_raw_size);
4785 s = rela + o->output_offset / sizeof (Elf_External_Rela);
4786 for (; erela < erelaend; erela++, s++)
4787 {
4788 if (bed->s->swap_reloca_in)
4789 (*bed->s->swap_reloca_in) (dynobj, (bfd_byte *) erela,
4790 &s->u.rela);
4791 else
4792 elf_swap_reloca_in (dynobj, erela, &s->u.rela);
4793
4794 s->type = (*bed->elf_backend_reloc_type_class) (&s->u.rela);
4795 }
4796 }
4797 }
4798
4799 qsort (rela, (size_t) count, sizeof (*rela), elf_link_sort_cmp1);
4800 for (ret = 0; ret < count && rela[ret].type == reloc_class_relative; ret++)
4801 ;
4802 for (i = ret, j = ret; i < count; i++)
4803 {
4804 if (ELF_R_SYM (rela[i].u.rel.r_info) != ELF_R_SYM (rela[j].u.rel.r_info))
4805 j = i;
4806 rela[i].offset = rela[j].u.rel.r_offset;
4807 }
4808 qsort (rela + ret, (size_t) count - ret, sizeof (*rela), elf_link_sort_cmp2);
4809
4810 for (o = dynobj->sections; o != NULL; o = o->next)
4811 if ((o->flags & (SEC_HAS_CONTENTS|SEC_LINKER_CREATED))
4812 == (SEC_HAS_CONTENTS|SEC_LINKER_CREATED)
4813 && o->output_section == reldyn)
4814 {
4815 if (rel)
4816 {
4817 Elf_External_Rel *erel, *erelend;
4818 struct elf_link_sort_rela *s;
4819
4820 erel = (Elf_External_Rel *) o->contents;
4821 erelend = (Elf_External_Rel *) (o->contents + o->_raw_size);
4822 s = rela + o->output_offset / sizeof (Elf_External_Rel);
4823 for (; erel < erelend; erel++, s++)
4824 {
4825 if (bed->s->swap_reloc_out)
4826 (*bed->s->swap_reloc_out) (abfd, &s->u.rel,
4827 (bfd_byte *) erel);
4828 else
4829 elf_swap_reloc_out (abfd, &s->u.rel, erel);
4830 }
4831 }
4832 else
4833 {
4834 Elf_External_Rela *erela, *erelaend;
4835 struct elf_link_sort_rela *s;
4836
4837 erela = (Elf_External_Rela *) o->contents;
4838 erelaend = (Elf_External_Rela *) (o->contents + o->_raw_size);
4839 s = rela + o->output_offset / sizeof (Elf_External_Rela);
4840 for (; erela < erelaend; erela++, s++)
4841 {
4842 if (bed->s->swap_reloca_out)
4843 (*bed->s->swap_reloca_out) (dynobj, &s->u.rela,
4844 (bfd_byte *) erela);
4845 else
4846 elf_swap_reloca_out (dynobj, &s->u.rela, erela);
4847 }
4848 }
4849 }
4850
4851 free (rela);
4852 *psec = reldyn;
4853 return ret;
4854 }
4855
4856 /* Do the final step of an ELF link. */
4857
4858 boolean
4859 elf_bfd_final_link (abfd, info)
4860 bfd *abfd;
4861 struct bfd_link_info *info;
4862 {
4863 boolean dynamic;
4864 boolean emit_relocs;
4865 bfd *dynobj;
4866 struct elf_final_link_info finfo;
4867 register asection *o;
4868 register struct bfd_link_order *p;
4869 register bfd *sub;
4870 bfd_size_type max_contents_size;
4871 bfd_size_type max_external_reloc_size;
4872 bfd_size_type max_internal_reloc_count;
4873 bfd_size_type max_sym_count;
4874 bfd_size_type max_sym_shndx_count;
4875 file_ptr off;
4876 Elf_Internal_Sym elfsym;
4877 unsigned int i;
4878 Elf_Internal_Shdr *symtab_hdr;
4879 Elf_Internal_Shdr *symstrtab_hdr;
4880 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4881 struct elf_outext_info eoinfo;
4882 boolean merged;
4883 size_t relativecount = 0;
4884 asection *reldyn = 0;
4885 bfd_size_type amt;
4886
4887 if (! is_elf_hash_table (info))
4888 return false;
4889
4890 if (info->shared)
4891 abfd->flags |= DYNAMIC;
4892
4893 dynamic = elf_hash_table (info)->dynamic_sections_created;
4894 dynobj = elf_hash_table (info)->dynobj;
4895
4896 emit_relocs = (info->relocateable
4897 || info->emitrelocations
4898 || bed->elf_backend_emit_relocs);
4899
4900 finfo.info = info;
4901 finfo.output_bfd = abfd;
4902 finfo.symstrtab = elf_stringtab_init ();
4903 if (finfo.symstrtab == NULL)
4904 return false;
4905
4906 if (! dynamic)
4907 {
4908 finfo.dynsym_sec = NULL;
4909 finfo.hash_sec = NULL;
4910 finfo.symver_sec = NULL;
4911 }
4912 else
4913 {
4914 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
4915 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
4916 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
4917 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
4918 /* Note that it is OK if symver_sec is NULL. */
4919 }
4920
4921 finfo.contents = NULL;
4922 finfo.external_relocs = NULL;
4923 finfo.internal_relocs = NULL;
4924 finfo.external_syms = NULL;
4925 finfo.locsym_shndx = NULL;
4926 finfo.internal_syms = NULL;
4927 finfo.indices = NULL;
4928 finfo.sections = NULL;
4929 finfo.symbuf = NULL;
4930 finfo.symshndxbuf = NULL;
4931 finfo.symbuf_count = 0;
4932 finfo.first_tls_sec = NULL;
4933 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4934 if ((o->flags & SEC_THREAD_LOCAL) != 0
4935 && (o->flags & SEC_LOAD) != 0)
4936 {
4937 finfo.first_tls_sec = o;
4938 break;
4939 }
4940
4941 /* Count up the number of relocations we will output for each output
4942 section, so that we know the sizes of the reloc sections. We
4943 also figure out some maximum sizes. */
4944 max_contents_size = 0;
4945 max_external_reloc_size = 0;
4946 max_internal_reloc_count = 0;
4947 max_sym_count = 0;
4948 max_sym_shndx_count = 0;
4949 merged = false;
4950 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4951 {
4952 o->reloc_count = 0;
4953
4954 for (p = o->link_order_head; p != NULL; p = p->next)
4955 {
4956 if (p->type == bfd_section_reloc_link_order
4957 || p->type == bfd_symbol_reloc_link_order)
4958 ++o->reloc_count;
4959 else if (p->type == bfd_indirect_link_order)
4960 {
4961 asection *sec;
4962
4963 sec = p->u.indirect.section;
4964
4965 /* Mark all sections which are to be included in the
4966 link. This will normally be every section. We need
4967 to do this so that we can identify any sections which
4968 the linker has decided to not include. */
4969 sec->linker_mark = true;
4970
4971 if (sec->flags & SEC_MERGE)
4972 merged = true;
4973
4974 if (info->relocateable || info->emitrelocations)
4975 o->reloc_count += sec->reloc_count;
4976 else if (bed->elf_backend_count_relocs)
4977 {
4978 Elf_Internal_Rela * relocs;
4979
4980 relocs = (NAME(_bfd_elf,link_read_relocs)
4981 (abfd, sec, (PTR) NULL,
4982 (Elf_Internal_Rela *) NULL, info->keep_memory));
4983
4984 o->reloc_count
4985 += (*bed->elf_backend_count_relocs) (sec, relocs);
4986
4987 if (elf_section_data (o)->relocs != relocs)
4988 free (relocs);
4989 }
4990
4991 if (sec->_raw_size > max_contents_size)
4992 max_contents_size = sec->_raw_size;
4993 if (sec->_cooked_size > max_contents_size)
4994 max_contents_size = sec->_cooked_size;
4995
4996 /* We are interested in just local symbols, not all
4997 symbols. */
4998 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
4999 && (sec->owner->flags & DYNAMIC) == 0)
5000 {
5001 size_t sym_count;
5002
5003 if (elf_bad_symtab (sec->owner))
5004 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
5005 / sizeof (Elf_External_Sym));
5006 else
5007 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
5008
5009 if (sym_count > max_sym_count)
5010 max_sym_count = sym_count;
5011
5012 if (sym_count > max_sym_shndx_count
5013 && elf_symtab_shndx (sec->owner) != 0)
5014 max_sym_shndx_count = sym_count;
5015
5016 if ((sec->flags & SEC_RELOC) != 0)
5017 {
5018 size_t ext_size;
5019
5020 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
5021 if (ext_size > max_external_reloc_size)
5022 max_external_reloc_size = ext_size;
5023 if (sec->reloc_count > max_internal_reloc_count)
5024 max_internal_reloc_count = sec->reloc_count;
5025 }
5026 }
5027 }
5028 }
5029
5030 if (o->reloc_count > 0)
5031 o->flags |= SEC_RELOC;
5032 else
5033 {
5034 /* Explicitly clear the SEC_RELOC flag. The linker tends to
5035 set it (this is probably a bug) and if it is set
5036 assign_section_numbers will create a reloc section. */
5037 o->flags &=~ SEC_RELOC;
5038 }
5039
5040 /* If the SEC_ALLOC flag is not set, force the section VMA to
5041 zero. This is done in elf_fake_sections as well, but forcing
5042 the VMA to 0 here will ensure that relocs against these
5043 sections are handled correctly. */
5044 if ((o->flags & SEC_ALLOC) == 0
5045 && ! o->user_set_vma)
5046 o->vma = 0;
5047 }
5048
5049 if (! info->relocateable && merged)
5050 elf_link_hash_traverse (elf_hash_table (info),
5051 elf_link_sec_merge_syms, (PTR) abfd);
5052
5053 /* Figure out the file positions for everything but the symbol table
5054 and the relocs. We set symcount to force assign_section_numbers
5055 to create a symbol table. */
5056 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
5057 BFD_ASSERT (! abfd->output_has_begun);
5058 if (! _bfd_elf_compute_section_file_positions (abfd, info))
5059 goto error_return;
5060
5061 /* Figure out how many relocations we will have in each section.
5062 Just using RELOC_COUNT isn't good enough since that doesn't
5063 maintain a separate value for REL vs. RELA relocations. */
5064 if (emit_relocs)
5065 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5066 for (o = sub->sections; o != NULL; o = o->next)
5067 {
5068 asection *output_section;
5069
5070 if (! o->linker_mark)
5071 {
5072 /* This section was omitted from the link. */
5073 continue;
5074 }
5075
5076 output_section = o->output_section;
5077
5078 if (output_section != NULL
5079 && (o->flags & SEC_RELOC) != 0)
5080 {
5081 struct bfd_elf_section_data *esdi
5082 = elf_section_data (o);
5083 struct bfd_elf_section_data *esdo
5084 = elf_section_data (output_section);
5085 unsigned int *rel_count;
5086 unsigned int *rel_count2;
5087 bfd_size_type entsize;
5088 bfd_size_type entsize2;
5089
5090 /* We must be careful to add the relocations from the
5091 input section to the right output count. */
5092 entsize = esdi->rel_hdr.sh_entsize;
5093 entsize2 = esdi->rel_hdr2 ? esdi->rel_hdr2->sh_entsize : 0;
5094 BFD_ASSERT ((entsize == sizeof (Elf_External_Rel)
5095 || entsize == sizeof (Elf_External_Rela))
5096 && entsize2 != entsize
5097 && (entsize2 == 0
5098 || entsize2 == sizeof (Elf_External_Rel)
5099 || entsize2 == sizeof (Elf_External_Rela)));
5100 if (entsize == esdo->rel_hdr.sh_entsize)
5101 {
5102 rel_count = &esdo->rel_count;
5103 rel_count2 = &esdo->rel_count2;
5104 }
5105 else
5106 {
5107 rel_count = &esdo->rel_count2;
5108 rel_count2 = &esdo->rel_count;
5109 }
5110
5111 *rel_count += NUM_SHDR_ENTRIES (& esdi->rel_hdr);
5112 if (esdi->rel_hdr2)
5113 *rel_count2 += NUM_SHDR_ENTRIES (esdi->rel_hdr2);
5114 output_section->flags |= SEC_RELOC;
5115 }
5116 }
5117
5118 /* That created the reloc sections. Set their sizes, and assign
5119 them file positions, and allocate some buffers. */
5120 for (o = abfd->sections; o != NULL; o = o->next)
5121 {
5122 if ((o->flags & SEC_RELOC) != 0)
5123 {
5124 if (!elf_link_size_reloc_section (abfd,
5125 &elf_section_data (o)->rel_hdr,
5126 o))
5127 goto error_return;
5128
5129 if (elf_section_data (o)->rel_hdr2
5130 && !elf_link_size_reloc_section (abfd,
5131 elf_section_data (o)->rel_hdr2,
5132 o))
5133 goto error_return;
5134 }
5135
5136 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
5137 to count upwards while actually outputting the relocations. */
5138 elf_section_data (o)->rel_count = 0;
5139 elf_section_data (o)->rel_count2 = 0;
5140 }
5141
5142 _bfd_elf_assign_file_positions_for_relocs (abfd);
5143
5144 /* We have now assigned file positions for all the sections except
5145 .symtab and .strtab. We start the .symtab section at the current
5146 file position, and write directly to it. We build the .strtab
5147 section in memory. */
5148 bfd_get_symcount (abfd) = 0;
5149 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5150 /* sh_name is set in prep_headers. */
5151 symtab_hdr->sh_type = SHT_SYMTAB;
5152 symtab_hdr->sh_flags = 0;
5153 symtab_hdr->sh_addr = 0;
5154 symtab_hdr->sh_size = 0;
5155 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
5156 /* sh_link is set in assign_section_numbers. */
5157 /* sh_info is set below. */
5158 /* sh_offset is set just below. */
5159 symtab_hdr->sh_addralign = bed->s->file_align;
5160
5161 off = elf_tdata (abfd)->next_file_pos;
5162 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, true);
5163
5164 /* Note that at this point elf_tdata (abfd)->next_file_pos is
5165 incorrect. We do not yet know the size of the .symtab section.
5166 We correct next_file_pos below, after we do know the size. */
5167
5168 /* Allocate a buffer to hold swapped out symbols. This is to avoid
5169 continuously seeking to the right position in the file. */
5170 if (! info->keep_memory || max_sym_count < 20)
5171 finfo.symbuf_size = 20;
5172 else
5173 finfo.symbuf_size = max_sym_count;
5174 amt = finfo.symbuf_size;
5175 amt *= sizeof (Elf_External_Sym);
5176 finfo.symbuf = (Elf_External_Sym *) bfd_malloc (amt);
5177 if (finfo.symbuf == NULL)
5178 goto error_return;
5179 if (elf_numsections (abfd) > SHN_LORESERVE)
5180 {
5181 amt = finfo.symbuf_size;
5182 amt *= sizeof (Elf_External_Sym_Shndx);
5183 finfo.symshndxbuf = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
5184 if (finfo.symshndxbuf == NULL)
5185 goto error_return;
5186 }
5187
5188 /* Start writing out the symbol table. The first symbol is always a
5189 dummy symbol. */
5190 if (info->strip != strip_all
5191 || emit_relocs)
5192 {
5193 elfsym.st_value = 0;
5194 elfsym.st_size = 0;
5195 elfsym.st_info = 0;
5196 elfsym.st_other = 0;
5197 elfsym.st_shndx = SHN_UNDEF;
5198 if (! elf_link_output_sym (&finfo, (const char *) NULL,
5199 &elfsym, bfd_und_section_ptr))
5200 goto error_return;
5201 }
5202
5203 #if 0
5204 /* Some standard ELF linkers do this, but we don't because it causes
5205 bootstrap comparison failures. */
5206 /* Output a file symbol for the output file as the second symbol.
5207 We output this even if we are discarding local symbols, although
5208 I'm not sure if this is correct. */
5209 elfsym.st_value = 0;
5210 elfsym.st_size = 0;
5211 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
5212 elfsym.st_other = 0;
5213 elfsym.st_shndx = SHN_ABS;
5214 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
5215 &elfsym, bfd_abs_section_ptr))
5216 goto error_return;
5217 #endif
5218
5219 /* Output a symbol for each section. We output these even if we are
5220 discarding local symbols, since they are used for relocs. These
5221 symbols have no names. We store the index of each one in the
5222 index field of the section, so that we can find it again when
5223 outputting relocs. */
5224 if (info->strip != strip_all
5225 || emit_relocs)
5226 {
5227 elfsym.st_size = 0;
5228 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5229 elfsym.st_other = 0;
5230 for (i = 1; i < elf_numsections (abfd); i++)
5231 {
5232 o = section_from_elf_index (abfd, i);
5233 if (o != NULL)
5234 o->target_index = bfd_get_symcount (abfd);
5235 elfsym.st_shndx = i;
5236 if (info->relocateable || o == NULL)
5237 elfsym.st_value = 0;
5238 else
5239 elfsym.st_value = o->vma;
5240 if (! elf_link_output_sym (&finfo, (const char *) NULL,
5241 &elfsym, o))
5242 goto error_return;
5243 if (i == SHN_LORESERVE)
5244 i += SHN_HIRESERVE + 1 - SHN_LORESERVE;
5245 }
5246 }
5247
5248 /* Allocate some memory to hold information read in from the input
5249 files. */
5250 if (max_contents_size != 0)
5251 {
5252 finfo.contents = (bfd_byte *) bfd_malloc (max_contents_size);
5253 if (finfo.contents == NULL)
5254 goto error_return;
5255 }
5256
5257 if (max_external_reloc_size != 0)
5258 {
5259 finfo.external_relocs = (PTR) bfd_malloc (max_external_reloc_size);
5260 if (finfo.external_relocs == NULL)
5261 goto error_return;
5262 }
5263
5264 if (max_internal_reloc_count != 0)
5265 {
5266 amt = max_internal_reloc_count * bed->s->int_rels_per_ext_rel;
5267 amt *= sizeof (Elf_Internal_Rela);
5268 finfo.internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
5269 if (finfo.internal_relocs == NULL)
5270 goto error_return;
5271 }
5272
5273 if (max_sym_count != 0)
5274 {
5275 amt = max_sym_count * sizeof (Elf_External_Sym);
5276 finfo.external_syms = (Elf_External_Sym *) bfd_malloc (amt);
5277 if (finfo.external_syms == NULL)
5278 goto error_return;
5279
5280 amt = max_sym_count * sizeof (Elf_Internal_Sym);
5281 finfo.internal_syms = (Elf_Internal_Sym *) bfd_malloc (amt);
5282 if (finfo.internal_syms == NULL)
5283 goto error_return;
5284
5285 amt = max_sym_count * sizeof (long);
5286 finfo.indices = (long *) bfd_malloc (amt);
5287 if (finfo.indices == NULL)
5288 goto error_return;
5289
5290 amt = max_sym_count * sizeof (asection *);
5291 finfo.sections = (asection **) bfd_malloc (amt);
5292 if (finfo.sections == NULL)
5293 goto error_return;
5294 }
5295
5296 if (max_sym_shndx_count != 0)
5297 {
5298 amt = max_sym_shndx_count * sizeof (Elf_External_Sym_Shndx);
5299 finfo.locsym_shndx = (Elf_External_Sym_Shndx *) bfd_malloc (amt);
5300 if (finfo.locsym_shndx == NULL)
5301 goto error_return;
5302 }
5303
5304 if (finfo.first_tls_sec)
5305 {
5306 unsigned int align = 0;
5307 bfd_vma base = finfo.first_tls_sec->vma, end = 0;
5308 asection *sec;
5309
5310 for (sec = finfo.first_tls_sec;
5311 sec && (sec->flags & SEC_THREAD_LOCAL);
5312 sec = sec->next)
5313 {
5314 bfd_vma size = sec->_raw_size;
5315
5316 if (bfd_get_section_alignment (abfd, sec) > align)
5317 align = bfd_get_section_alignment (abfd, sec);
5318 if (sec->_raw_size == 0 && (sec->flags & SEC_HAS_CONTENTS) == 0)
5319 {
5320 struct bfd_link_order *o;
5321
5322 size = 0;
5323 for (o = sec->link_order_head; o != NULL; o = o->next)
5324 if (size < o->offset + o->size)
5325 size = o->offset + o->size;
5326 }
5327 end = sec->vma + size;
5328 }
5329 elf_hash_table (info)->tls_segment
5330 = bfd_zalloc (abfd, sizeof (struct elf_link_tls_segment));
5331 if (elf_hash_table (info)->tls_segment == NULL)
5332 goto error_return;
5333 elf_hash_table (info)->tls_segment->start = base;
5334 elf_hash_table (info)->tls_segment->size = end - base;
5335 elf_hash_table (info)->tls_segment->align = align;
5336 }
5337
5338 /* Since ELF permits relocations to be against local symbols, we
5339 must have the local symbols available when we do the relocations.
5340 Since we would rather only read the local symbols once, and we
5341 would rather not keep them in memory, we handle all the
5342 relocations for a single input file at the same time.
5343
5344 Unfortunately, there is no way to know the total number of local
5345 symbols until we have seen all of them, and the local symbol
5346 indices precede the global symbol indices. This means that when
5347 we are generating relocateable output, and we see a reloc against
5348 a global symbol, we can not know the symbol index until we have
5349 finished examining all the local symbols to see which ones we are
5350 going to output. To deal with this, we keep the relocations in
5351 memory, and don't output them until the end of the link. This is
5352 an unfortunate waste of memory, but I don't see a good way around
5353 it. Fortunately, it only happens when performing a relocateable
5354 link, which is not the common case. FIXME: If keep_memory is set
5355 we could write the relocs out and then read them again; I don't
5356 know how bad the memory loss will be. */
5357
5358 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5359 sub->output_has_begun = false;
5360 for (o = abfd->sections; o != NULL; o = o->next)
5361 {
5362 for (p = o->link_order_head; p != NULL; p = p->next)
5363 {
5364 if (p->type == bfd_indirect_link_order
5365 && (bfd_get_flavour ((sub = p->u.indirect.section->owner))
5366 == bfd_target_elf_flavour)
5367 && elf_elfheader (sub)->e_ident[EI_CLASS] == bed->s->elfclass)
5368 {
5369 if (! sub->output_has_begun)
5370 {
5371 if (! elf_link_input_bfd (&finfo, sub))
5372 goto error_return;
5373 sub->output_has_begun = true;
5374 }
5375 }
5376 else if (p->type == bfd_section_reloc_link_order
5377 || p->type == bfd_symbol_reloc_link_order)
5378 {
5379 if (! elf_reloc_link_order (abfd, info, o, p))
5380 goto error_return;
5381 }
5382 else
5383 {
5384 if (! _bfd_default_link_order (abfd, info, o, p))
5385 goto error_return;
5386 }
5387 }
5388 }
5389
5390 /* Output any global symbols that got converted to local in a
5391 version script or due to symbol visibility. We do this in a
5392 separate step since ELF requires all local symbols to appear
5393 prior to any global symbols. FIXME: We should only do this if
5394 some global symbols were, in fact, converted to become local.
5395 FIXME: Will this work correctly with the Irix 5 linker? */
5396 eoinfo.failed = false;
5397 eoinfo.finfo = &finfo;
5398 eoinfo.localsyms = true;
5399 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
5400 (PTR) &eoinfo);
5401 if (eoinfo.failed)
5402 return false;
5403
5404 /* That wrote out all the local symbols. Finish up the symbol table
5405 with the global symbols. Even if we want to strip everything we
5406 can, we still need to deal with those global symbols that got
5407 converted to local in a version script. */
5408
5409 /* The sh_info field records the index of the first non local symbol. */
5410 symtab_hdr->sh_info = bfd_get_symcount (abfd);
5411
5412 if (dynamic
5413 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
5414 {
5415 Elf_Internal_Sym sym;
5416 Elf_External_Sym *dynsym =
5417 (Elf_External_Sym *) finfo.dynsym_sec->contents;
5418 long last_local = 0;
5419
5420 /* Write out the section symbols for the output sections. */
5421 if (info->shared)
5422 {
5423 asection *s;
5424
5425 sym.st_size = 0;
5426 sym.st_name = 0;
5427 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
5428 sym.st_other = 0;
5429
5430 for (s = abfd->sections; s != NULL; s = s->next)
5431 {
5432 int indx;
5433 Elf_External_Sym *dest;
5434
5435 indx = elf_section_data (s)->this_idx;
5436 BFD_ASSERT (indx > 0);
5437 sym.st_shndx = indx;
5438 sym.st_value = s->vma;
5439 dest = dynsym + elf_section_data (s)->dynindx;
5440 elf_swap_symbol_out (abfd, &sym, (PTR) dest, (PTR) 0);
5441 }
5442
5443 last_local = bfd_count_sections (abfd);
5444 }
5445
5446 /* Write out the local dynsyms. */
5447 if (elf_hash_table (info)->dynlocal)
5448 {
5449 struct elf_link_local_dynamic_entry *e;
5450 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
5451 {
5452 asection *s;
5453 Elf_External_Sym *dest;
5454
5455 sym.st_size = e->isym.st_size;
5456 sym.st_other = e->isym.st_other;
5457
5458 /* Copy the internal symbol as is.
5459 Note that we saved a word of storage and overwrote
5460 the original st_name with the dynstr_index. */
5461 sym = e->isym;
5462
5463 if (e->isym.st_shndx != SHN_UNDEF
5464 && (e->isym.st_shndx < SHN_LORESERVE
5465 || e->isym.st_shndx > SHN_HIRESERVE))
5466 {
5467 s = bfd_section_from_elf_index (e->input_bfd,
5468 e->isym.st_shndx);
5469
5470 sym.st_shndx =
5471 elf_section_data (s->output_section)->this_idx;
5472 sym.st_value = (s->output_section->vma
5473 + s->output_offset
5474 + e->isym.st_value);
5475 }
5476
5477 if (last_local < e->dynindx)
5478 last_local = e->dynindx;
5479
5480 dest = dynsym + e->dynindx;
5481 elf_swap_symbol_out (abfd, &sym, (PTR) dest, (PTR) 0);
5482 }
5483 }
5484
5485 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
5486 last_local + 1;
5487 }
5488
5489 /* We get the global symbols from the hash table. */
5490 eoinfo.failed = false;
5491 eoinfo.localsyms = false;
5492 eoinfo.finfo = &finfo;
5493 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
5494 (PTR) &eoinfo);
5495 if (eoinfo.failed)
5496 return false;
5497
5498 /* If backend needs to output some symbols not present in the hash
5499 table, do it now. */
5500 if (bed->elf_backend_output_arch_syms)
5501 {
5502 typedef boolean (*out_sym_func) PARAMS ((PTR, const char *,
5503 Elf_Internal_Sym *,
5504 asection *));
5505
5506 if (! ((*bed->elf_backend_output_arch_syms)
5507 (abfd, info, (PTR) &finfo, (out_sym_func) elf_link_output_sym)))
5508 return false;
5509 }
5510
5511 /* Flush all symbols to the file. */
5512 if (! elf_link_flush_output_syms (&finfo))
5513 return false;
5514
5515 /* Now we know the size of the symtab section. */
5516 off += symtab_hdr->sh_size;
5517
5518 /* Finish up and write out the symbol string table (.strtab)
5519 section. */
5520 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
5521 /* sh_name was set in prep_headers. */
5522 symstrtab_hdr->sh_type = SHT_STRTAB;
5523 symstrtab_hdr->sh_flags = 0;
5524 symstrtab_hdr->sh_addr = 0;
5525 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
5526 symstrtab_hdr->sh_entsize = 0;
5527 symstrtab_hdr->sh_link = 0;
5528 symstrtab_hdr->sh_info = 0;
5529 /* sh_offset is set just below. */
5530 symstrtab_hdr->sh_addralign = 1;
5531
5532 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, true);
5533 elf_tdata (abfd)->next_file_pos = off;
5534
5535 if (bfd_get_symcount (abfd) > 0)
5536 {
5537 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
5538 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
5539 return false;
5540 }
5541
5542 /* Adjust the relocs to have the correct symbol indices. */
5543 for (o = abfd->sections; o != NULL; o = o->next)
5544 {
5545 if ((o->flags & SEC_RELOC) == 0)
5546 continue;
5547
5548 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
5549 elf_section_data (o)->rel_count,
5550 elf_section_data (o)->rel_hashes);
5551 if (elf_section_data (o)->rel_hdr2 != NULL)
5552 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
5553 elf_section_data (o)->rel_count2,
5554 (elf_section_data (o)->rel_hashes
5555 + elf_section_data (o)->rel_count));
5556
5557 /* Set the reloc_count field to 0 to prevent write_relocs from
5558 trying to swap the relocs out itself. */
5559 o->reloc_count = 0;
5560 }
5561
5562 if (dynamic && info->combreloc && dynobj != NULL)
5563 relativecount = elf_link_sort_relocs (abfd, info, &reldyn);
5564
5565 /* If we are linking against a dynamic object, or generating a
5566 shared library, finish up the dynamic linking information. */
5567 if (dynamic)
5568 {
5569 Elf_External_Dyn *dyncon, *dynconend;
5570
5571 /* Fix up .dynamic entries. */
5572 o = bfd_get_section_by_name (dynobj, ".dynamic");
5573 BFD_ASSERT (o != NULL);
5574
5575 dyncon = (Elf_External_Dyn *) o->contents;
5576 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
5577 for (; dyncon < dynconend; dyncon++)
5578 {
5579 Elf_Internal_Dyn dyn;
5580 const char *name;
5581 unsigned int type;
5582
5583 elf_swap_dyn_in (dynobj, dyncon, &dyn);
5584
5585 switch (dyn.d_tag)
5586 {
5587 default:
5588 break;
5589 case DT_NULL:
5590 if (relativecount > 0 && dyncon + 1 < dynconend)
5591 {
5592 switch (elf_section_data (reldyn)->this_hdr.sh_type)
5593 {
5594 case SHT_REL: dyn.d_tag = DT_RELCOUNT; break;
5595 case SHT_RELA: dyn.d_tag = DT_RELACOUNT; break;
5596 default: break;
5597 }
5598 if (dyn.d_tag != DT_NULL)
5599 {
5600 dyn.d_un.d_val = relativecount;
5601 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5602 relativecount = 0;
5603 }
5604 }
5605 break;
5606 case DT_INIT:
5607 name = info->init_function;
5608 goto get_sym;
5609 case DT_FINI:
5610 name = info->fini_function;
5611 get_sym:
5612 {
5613 struct elf_link_hash_entry *h;
5614
5615 h = elf_link_hash_lookup (elf_hash_table (info), name,
5616 false, false, true);
5617 if (h != NULL
5618 && (h->root.type == bfd_link_hash_defined
5619 || h->root.type == bfd_link_hash_defweak))
5620 {
5621 dyn.d_un.d_val = h->root.u.def.value;
5622 o = h->root.u.def.section;
5623 if (o->output_section != NULL)
5624 dyn.d_un.d_val += (o->output_section->vma
5625 + o->output_offset);
5626 else
5627 {
5628 /* The symbol is imported from another shared
5629 library and does not apply to this one. */
5630 dyn.d_un.d_val = 0;
5631 }
5632
5633 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5634 }
5635 }
5636 break;
5637
5638 case DT_PREINIT_ARRAYSZ:
5639 name = ".preinit_array";
5640 goto get_size;
5641 case DT_INIT_ARRAYSZ:
5642 name = ".init_array";
5643 goto get_size;
5644 case DT_FINI_ARRAYSZ:
5645 name = ".fini_array";
5646 get_size:
5647 o = bfd_get_section_by_name (abfd, name);
5648 if (o == NULL)
5649 {
5650 (*_bfd_error_handler)
5651 (_("%s: could not find output section %s"),
5652 bfd_get_filename (abfd), name);
5653 goto error_return;
5654 }
5655 if (o->_raw_size == 0)
5656 (*_bfd_error_handler)
5657 (_("warning: %s section has zero size"), name);
5658 dyn.d_un.d_val = o->_raw_size;
5659 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5660 break;
5661
5662 case DT_PREINIT_ARRAY:
5663 name = ".preinit_array";
5664 goto get_vma;
5665 case DT_INIT_ARRAY:
5666 name = ".init_array";
5667 goto get_vma;
5668 case DT_FINI_ARRAY:
5669 name = ".fini_array";
5670 goto get_vma;
5671
5672 case DT_HASH:
5673 name = ".hash";
5674 goto get_vma;
5675 case DT_STRTAB:
5676 name = ".dynstr";
5677 goto get_vma;
5678 case DT_SYMTAB:
5679 name = ".dynsym";
5680 goto get_vma;
5681 case DT_VERDEF:
5682 name = ".gnu.version_d";
5683 goto get_vma;
5684 case DT_VERNEED:
5685 name = ".gnu.version_r";
5686 goto get_vma;
5687 case DT_VERSYM:
5688 name = ".gnu.version";
5689 get_vma:
5690 o = bfd_get_section_by_name (abfd, name);
5691 if (o == NULL)
5692 {
5693 (*_bfd_error_handler)
5694 (_("%s: could not find output section %s"),
5695 bfd_get_filename (abfd), name);
5696 goto error_return;
5697 }
5698 dyn.d_un.d_ptr = o->vma;
5699 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5700 break;
5701
5702 case DT_REL:
5703 case DT_RELA:
5704 case DT_RELSZ:
5705 case DT_RELASZ:
5706 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
5707 type = SHT_REL;
5708 else
5709 type = SHT_RELA;
5710 dyn.d_un.d_val = 0;
5711 for (i = 1; i < elf_numsections (abfd); i++)
5712 {
5713 Elf_Internal_Shdr *hdr;
5714
5715 hdr = elf_elfsections (abfd)[i];
5716 if (hdr->sh_type == type
5717 && (hdr->sh_flags & SHF_ALLOC) != 0)
5718 {
5719 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
5720 dyn.d_un.d_val += hdr->sh_size;
5721 else
5722 {
5723 if (dyn.d_un.d_val == 0
5724 || hdr->sh_addr < dyn.d_un.d_val)
5725 dyn.d_un.d_val = hdr->sh_addr;
5726 }
5727 }
5728 }
5729 elf_swap_dyn_out (dynobj, &dyn, dyncon);
5730 break;
5731 }
5732 }
5733 }
5734
5735 /* If we have created any dynamic sections, then output them. */
5736 if (dynobj != NULL)
5737 {
5738 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
5739 goto error_return;
5740
5741 for (o = dynobj->sections; o != NULL; o = o->next)
5742 {
5743 if ((o->flags & SEC_HAS_CONTENTS) == 0
5744 || o->_raw_size == 0
5745 || o->output_section == bfd_abs_section_ptr)
5746 continue;
5747 if ((o->flags & SEC_LINKER_CREATED) == 0)
5748 {
5749 /* At this point, we are only interested in sections
5750 created by elf_link_create_dynamic_sections. */
5751 continue;
5752 }
5753 if ((elf_section_data (o->output_section)->this_hdr.sh_type
5754 != SHT_STRTAB)
5755 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
5756 {
5757 if (! bfd_set_section_contents (abfd, o->output_section,
5758 o->contents,
5759 (file_ptr) o->output_offset,
5760 o->_raw_size))
5761 goto error_return;
5762 }
5763 else
5764 {
5765 /* The contents of the .dynstr section are actually in a
5766 stringtab. */
5767 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
5768 if (bfd_seek (abfd, off, SEEK_SET) != 0
5769 || ! _bfd_elf_strtab_emit (abfd,
5770 elf_hash_table (info)->dynstr))
5771 goto error_return;
5772 }
5773 }
5774 }
5775
5776 if (info->relocateable)
5777 {
5778 boolean failed = false;
5779
5780 bfd_map_over_sections (abfd, bfd_elf_set_group_contents, &failed);
5781 if (failed)
5782 goto error_return;
5783 }
5784
5785 /* If we have optimized stabs strings, output them. */
5786 if (elf_hash_table (info)->stab_info != NULL)
5787 {
5788 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
5789 goto error_return;
5790 }
5791
5792 if (info->eh_frame_hdr && elf_hash_table (info)->dynobj)
5793 {
5794 o = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
5795 ".eh_frame_hdr");
5796 if (o
5797 && (elf_section_data (o)->sec_info_type
5798 == ELF_INFO_TYPE_EH_FRAME_HDR))
5799 {
5800 if (! _bfd_elf_write_section_eh_frame_hdr (abfd, o))
5801 goto error_return;
5802 }
5803 }
5804
5805 if (finfo.symstrtab != NULL)
5806 _bfd_stringtab_free (finfo.symstrtab);
5807 if (finfo.contents != NULL)
5808 free (finfo.contents);
5809 if (finfo.external_relocs != NULL)
5810 free (finfo.external_relocs);
5811 if (finfo.internal_relocs != NULL)
5812 free (finfo.internal_relocs);
5813 if (finfo.external_syms != NULL)
5814 free (finfo.external_syms);
5815 if (finfo.locsym_shndx != NULL)
5816 free (finfo.locsym_shndx);
5817 if (finfo.internal_syms != NULL)
5818 free (finfo.internal_syms);
5819 if (finfo.indices != NULL)
5820 free (finfo.indices);
5821 if (finfo.sections != NULL)
5822 free (finfo.sections);
5823 if (finfo.symbuf != NULL)
5824 free (finfo.symbuf);
5825 if (finfo.symshndxbuf != NULL)
5826 free (finfo.symbuf);
5827 for (o = abfd->sections; o != NULL; o = o->next)
5828 {
5829 if ((o->flags & SEC_RELOC) != 0
5830 && elf_section_data (o)->rel_hashes != NULL)
5831 free (elf_section_data (o)->rel_hashes);
5832 }
5833
5834 elf_tdata (abfd)->linker = true;
5835
5836 return true;
5837
5838 error_return:
5839 if (finfo.symstrtab != NULL)
5840 _bfd_stringtab_free (finfo.symstrtab);
5841 if (finfo.contents != NULL)
5842 free (finfo.contents);
5843 if (finfo.external_relocs != NULL)
5844 free (finfo.external_relocs);
5845 if (finfo.internal_relocs != NULL)
5846 free (finfo.internal_relocs);
5847 if (finfo.external_syms != NULL)
5848 free (finfo.external_syms);
5849 if (finfo.locsym_shndx != NULL)
5850 free (finfo.locsym_shndx);
5851 if (finfo.internal_syms != NULL)
5852 free (finfo.internal_syms);
5853 if (finfo.indices != NULL)
5854 free (finfo.indices);
5855 if (finfo.sections != NULL)
5856 free (finfo.sections);
5857 if (finfo.symbuf != NULL)
5858 free (finfo.symbuf);
5859 if (finfo.symshndxbuf != NULL)
5860 free (finfo.symbuf);
5861 for (o = abfd->sections; o != NULL; o = o->next)
5862 {
5863 if ((o->flags & SEC_RELOC) != 0
5864 && elf_section_data (o)->rel_hashes != NULL)
5865 free (elf_section_data (o)->rel_hashes);
5866 }
5867
5868 return false;
5869 }
5870
5871 /* Add a symbol to the output symbol table. */
5872
5873 static boolean
5874 elf_link_output_sym (finfo, name, elfsym, input_sec)
5875 struct elf_final_link_info *finfo;
5876 const char *name;
5877 Elf_Internal_Sym *elfsym;
5878 asection *input_sec;
5879 {
5880 Elf_External_Sym *dest;
5881 Elf_External_Sym_Shndx *destshndx;
5882
5883 boolean (*output_symbol_hook) PARAMS ((bfd *,
5884 struct bfd_link_info *info,
5885 const char *,
5886 Elf_Internal_Sym *,
5887 asection *));
5888
5889 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
5890 elf_backend_link_output_symbol_hook;
5891 if (output_symbol_hook != NULL)
5892 {
5893 if (! ((*output_symbol_hook)
5894 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
5895 return false;
5896 }
5897
5898 if (name == (const char *) NULL || *name == '\0')
5899 elfsym->st_name = 0;
5900 else if (input_sec->flags & SEC_EXCLUDE)
5901 elfsym->st_name = 0;
5902 else
5903 {
5904 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
5905 name, true, false);
5906 if (elfsym->st_name == (unsigned long) -1)
5907 return false;
5908 }
5909
5910 if (finfo->symbuf_count >= finfo->symbuf_size)
5911 {
5912 if (! elf_link_flush_output_syms (finfo))
5913 return false;
5914 }
5915
5916 dest = finfo->symbuf + finfo->symbuf_count;
5917 destshndx = finfo->symshndxbuf;
5918 if (destshndx != NULL)
5919 destshndx += finfo->symbuf_count;
5920 elf_swap_symbol_out (finfo->output_bfd, elfsym, (PTR) dest, (PTR) destshndx);
5921 ++finfo->symbuf_count;
5922
5923 ++ bfd_get_symcount (finfo->output_bfd);
5924
5925 return true;
5926 }
5927
5928 /* Flush the output symbols to the file. */
5929
5930 static boolean
5931 elf_link_flush_output_syms (finfo)
5932 struct elf_final_link_info *finfo;
5933 {
5934 if (finfo->symbuf_count > 0)
5935 {
5936 Elf_Internal_Shdr *hdr;
5937 file_ptr pos;
5938 bfd_size_type amt;
5939
5940 hdr = &elf_tdata (finfo->output_bfd)->symtab_hdr;
5941 pos = hdr->sh_offset + hdr->sh_size;
5942 amt = finfo->symbuf_count * sizeof (Elf_External_Sym);
5943 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
5944 || bfd_bwrite ((PTR) finfo->symbuf, amt, finfo->output_bfd) != amt)
5945 return false;
5946
5947 hdr->sh_size += amt;
5948
5949 if (finfo->symshndxbuf != NULL)
5950 {
5951 hdr = &elf_tdata (finfo->output_bfd)->symtab_shndx_hdr;
5952 pos = hdr->sh_offset + hdr->sh_size;
5953 amt = finfo->symbuf_count * sizeof (Elf_External_Sym_Shndx);
5954 if (bfd_seek (finfo->output_bfd, pos, SEEK_SET) != 0
5955 || (bfd_bwrite ((PTR) finfo->symshndxbuf, amt, finfo->output_bfd)
5956 != amt))
5957 return false;
5958
5959 hdr->sh_size += amt;
5960 }
5961
5962 finfo->symbuf_count = 0;
5963 }
5964
5965 return true;
5966 }
5967
5968 /* Adjust all external symbols pointing into SEC_MERGE sections
5969 to reflect the object merging within the sections. */
5970
5971 static boolean
5972 elf_link_sec_merge_syms (h, data)
5973 struct elf_link_hash_entry *h;
5974 PTR data;
5975 {
5976 asection *sec;
5977
5978 if (h->root.type == bfd_link_hash_warning)
5979 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5980
5981 if ((h->root.type == bfd_link_hash_defined
5982 || h->root.type == bfd_link_hash_defweak)
5983 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
5984 && elf_section_data (sec)->sec_info_type == ELF_INFO_TYPE_MERGE)
5985 {
5986 bfd *output_bfd = (bfd *) data;
5987
5988 h->root.u.def.value =
5989 _bfd_merged_section_offset (output_bfd,
5990 &h->root.u.def.section,
5991 elf_section_data (sec)->sec_info,
5992 h->root.u.def.value, (bfd_vma) 0);
5993 }
5994
5995 return true;
5996 }
5997
5998 /* For DSOs loaded in via a DT_NEEDED entry, emulate ld.so in
5999 allowing an unsatisfied unversioned symbol in the DSO to match a
6000 versioned symbol that would normally require an explicit version. */
6001
6002 static boolean
6003 elf_link_check_versioned_symbol (info, h)
6004 struct bfd_link_info *info;
6005 struct elf_link_hash_entry *h;
6006 {
6007 bfd *undef_bfd = h->root.u.undef.abfd;
6008 struct elf_link_loaded_list *loaded;
6009
6010 if ((undef_bfd->flags & DYNAMIC) == 0
6011 || info->hash->creator->flavour != bfd_target_elf_flavour
6012 || elf_dt_soname (h->root.u.undef.abfd) == NULL)
6013 return false;
6014
6015 for (loaded = elf_hash_table (info)->loaded;
6016 loaded != NULL;
6017 loaded = loaded->next)
6018 {
6019 bfd *input;
6020 Elf_Internal_Shdr *hdr;
6021 bfd_size_type symcount;
6022 bfd_size_type extsymcount;
6023 bfd_size_type extsymoff;
6024 Elf_Internal_Shdr *versymhdr;
6025 Elf_Internal_Sym *isym;
6026 Elf_Internal_Sym *isymend;
6027 Elf_Internal_Sym *isymbuf;
6028 Elf_External_Versym *ever;
6029 Elf_External_Versym *extversym;
6030
6031 input = loaded->abfd;
6032
6033 /* We check each DSO for a possible hidden versioned definition. */
6034 if (input == undef_bfd
6035 || (input->flags & DYNAMIC) == 0
6036 || elf_dynversym (input) == 0)
6037 continue;
6038
6039 hdr = &elf_tdata (input)->dynsymtab_hdr;
6040
6041 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
6042 if (elf_bad_symtab (input))
6043 {
6044 extsymcount = symcount;
6045 extsymoff = 0;
6046 }
6047 else
6048 {
6049 extsymcount = symcount - hdr->sh_info;
6050 extsymoff = hdr->sh_info;
6051 }
6052
6053 if (extsymcount == 0)
6054 continue;
6055
6056 isymbuf = bfd_elf_get_elf_syms (input, hdr, extsymcount, extsymoff,
6057 NULL, NULL, NULL);
6058 if (isymbuf == NULL)
6059 return false;
6060
6061 /* Read in any version definitions. */
6062 versymhdr = &elf_tdata (input)->dynversym_hdr;
6063 extversym = (Elf_External_Versym *) bfd_malloc (versymhdr->sh_size);
6064 if (extversym == NULL)
6065 goto error_ret;
6066
6067 if (bfd_seek (input, versymhdr->sh_offset, SEEK_SET) != 0
6068 || (bfd_bread ((PTR) extversym, versymhdr->sh_size, input)
6069 != versymhdr->sh_size))
6070 {
6071 free (extversym);
6072 error_ret:
6073 free (isymbuf);
6074 return false;
6075 }
6076
6077 ever = extversym + extsymoff;
6078 isymend = isymbuf + extsymcount;
6079 for (isym = isymbuf; isym < isymend; isym++, ever++)
6080 {
6081 const char *name;
6082 Elf_Internal_Versym iver;
6083
6084 if (ELF_ST_BIND (isym->st_info) == STB_LOCAL
6085 || isym->st_shndx == SHN_UNDEF)
6086 continue;
6087
6088 name = bfd_elf_string_from_elf_section (input,
6089 hdr->sh_link,
6090 isym->st_name);
6091 if (strcmp (name, h->root.root.string) != 0)
6092 continue;
6093
6094 _bfd_elf_swap_versym_in (input, ever, &iver);
6095
6096 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
6097 {
6098 /* If we have a non-hidden versioned sym, then it should
6099 have provided a definition for the undefined sym. */
6100 abort ();
6101 }
6102
6103 if ((iver.vs_vers & VERSYM_VERSION) == 2)
6104 {
6105 /* This is the oldest (default) sym. We can use it. */
6106 free (extversym);
6107 free (isymbuf);
6108 return true;
6109 }
6110 }
6111
6112 free (extversym);
6113 free (isymbuf);
6114 }
6115
6116 return false;
6117 }
6118
6119 /* Add an external symbol to the symbol table. This is called from
6120 the hash table traversal routine. When generating a shared object,
6121 we go through the symbol table twice. The first time we output
6122 anything that might have been forced to local scope in a version
6123 script. The second time we output the symbols that are still
6124 global symbols. */
6125
6126 static boolean
6127 elf_link_output_extsym (h, data)
6128 struct elf_link_hash_entry *h;
6129 PTR data;
6130 {
6131 struct elf_outext_info *eoinfo = (struct elf_outext_info *) data;
6132 struct elf_final_link_info *finfo = eoinfo->finfo;
6133 boolean strip;
6134 Elf_Internal_Sym sym;
6135 asection *input_sec;
6136
6137 if (h->root.type == bfd_link_hash_warning)
6138 {
6139 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6140 if (h->root.type == bfd_link_hash_new)
6141 return true;
6142 }
6143
6144 /* Decide whether to output this symbol in this pass. */
6145 if (eoinfo->localsyms)
6146 {
6147 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6148 return true;
6149 }
6150 else
6151 {
6152 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6153 return true;
6154 }
6155
6156 /* If we are not creating a shared library, and this symbol is
6157 referenced by a shared library but is not defined anywhere, then
6158 warn that it is undefined. If we do not do this, the runtime
6159 linker will complain that the symbol is undefined when the
6160 program is run. We don't have to worry about symbols that are
6161 referenced by regular files, because we will already have issued
6162 warnings for them. */
6163 if (! finfo->info->relocateable
6164 && ! finfo->info->allow_shlib_undefined
6165 && ! finfo->info->shared
6166 && h->root.type == bfd_link_hash_undefined
6167 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
6168 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
6169 && ! elf_link_check_versioned_symbol (finfo->info, h))
6170 {
6171 if (! ((*finfo->info->callbacks->undefined_symbol)
6172 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
6173 (asection *) NULL, (bfd_vma) 0, true)))
6174 {
6175 eoinfo->failed = true;
6176 return false;
6177 }
6178 }
6179
6180 /* We don't want to output symbols that have never been mentioned by
6181 a regular file, or that we have been told to strip. However, if
6182 h->indx is set to -2, the symbol is used by a reloc and we must
6183 output it. */
6184 if (h->indx == -2)
6185 strip = false;
6186 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
6187 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
6188 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
6189 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
6190 strip = true;
6191 else if (finfo->info->strip == strip_all
6192 || (finfo->info->strip == strip_some
6193 && bfd_hash_lookup (finfo->info->keep_hash,
6194 h->root.root.string,
6195 false, false) == NULL))
6196 strip = true;
6197 else
6198 strip = false;
6199
6200 /* If we're stripping it, and it's not a dynamic symbol, there's
6201 nothing else to do unless it is a forced local symbol. */
6202 if (strip
6203 && h->dynindx == -1
6204 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6205 return true;
6206
6207 sym.st_value = 0;
6208 sym.st_size = h->size;
6209 sym.st_other = h->other;
6210 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6211 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
6212 else if (h->root.type == bfd_link_hash_undefweak
6213 || h->root.type == bfd_link_hash_defweak)
6214 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
6215 else
6216 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
6217
6218 switch (h->root.type)
6219 {
6220 default:
6221 case bfd_link_hash_new:
6222 case bfd_link_hash_warning:
6223 abort ();
6224 return false;
6225
6226 case bfd_link_hash_undefined:
6227 case bfd_link_hash_undefweak:
6228 input_sec = bfd_und_section_ptr;
6229 sym.st_shndx = SHN_UNDEF;
6230 break;
6231
6232 case bfd_link_hash_defined:
6233 case bfd_link_hash_defweak:
6234 {
6235 input_sec = h->root.u.def.section;
6236 if (input_sec->output_section != NULL)
6237 {
6238 sym.st_shndx =
6239 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
6240 input_sec->output_section);
6241 if (sym.st_shndx == SHN_BAD)
6242 {
6243 (*_bfd_error_handler)
6244 (_("%s: could not find output section %s for input section %s"),
6245 bfd_get_filename (finfo->output_bfd),
6246 input_sec->output_section->name,
6247 input_sec->name);
6248 eoinfo->failed = true;
6249 return false;
6250 }
6251
6252 /* ELF symbols in relocateable files are section relative,
6253 but in nonrelocateable files they are virtual
6254 addresses. */
6255 sym.st_value = h->root.u.def.value + input_sec->output_offset;
6256 if (! finfo->info->relocateable)
6257 {
6258 sym.st_value += input_sec->output_section->vma;
6259 if (h->type == STT_TLS)
6260 {
6261 /* STT_TLS symbols are relative to PT_TLS segment
6262 base. */
6263 BFD_ASSERT (finfo->first_tls_sec != NULL);
6264 sym.st_value -= finfo->first_tls_sec->vma;
6265 }
6266 }
6267 }
6268 else
6269 {
6270 BFD_ASSERT (input_sec->owner == NULL
6271 || (input_sec->owner->flags & DYNAMIC) != 0);
6272 sym.st_shndx = SHN_UNDEF;
6273 input_sec = bfd_und_section_ptr;
6274 }
6275 }
6276 break;
6277
6278 case bfd_link_hash_common:
6279 input_sec = h->root.u.c.p->section;
6280 sym.st_shndx = SHN_COMMON;
6281 sym.st_value = 1 << h->root.u.c.p->alignment_power;
6282 break;
6283
6284 case bfd_link_hash_indirect:
6285 /* These symbols are created by symbol versioning. They point
6286 to the decorated version of the name. For example, if the
6287 symbol foo@@GNU_1.2 is the default, which should be used when
6288 foo is used with no version, then we add an indirect symbol
6289 foo which points to foo@@GNU_1.2. We ignore these symbols,
6290 since the indirected symbol is already in the hash table. */
6291 return true;
6292 }
6293
6294 /* Give the processor backend a chance to tweak the symbol value,
6295 and also to finish up anything that needs to be done for this
6296 symbol. FIXME: Not calling elf_backend_finish_dynamic_symbol for
6297 forced local syms when non-shared is due to a historical quirk. */
6298 if ((h->dynindx != -1
6299 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
6300 && (finfo->info->shared
6301 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
6302 && elf_hash_table (finfo->info)->dynamic_sections_created)
6303 {
6304 struct elf_backend_data *bed;
6305
6306 bed = get_elf_backend_data (finfo->output_bfd);
6307 if (! ((*bed->elf_backend_finish_dynamic_symbol)
6308 (finfo->output_bfd, finfo->info, h, &sym)))
6309 {
6310 eoinfo->failed = true;
6311 return false;
6312 }
6313 }
6314
6315 /* If we are marking the symbol as undefined, and there are no
6316 non-weak references to this symbol from a regular object, then
6317 mark the symbol as weak undefined; if there are non-weak
6318 references, mark the symbol as strong. We can't do this earlier,
6319 because it might not be marked as undefined until the
6320 finish_dynamic_symbol routine gets through with it. */
6321 if (sym.st_shndx == SHN_UNDEF
6322 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
6323 && (ELF_ST_BIND (sym.st_info) == STB_GLOBAL
6324 || ELF_ST_BIND (sym.st_info) == STB_WEAK))
6325 {
6326 int bindtype;
6327
6328 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK) != 0)
6329 bindtype = STB_GLOBAL;
6330 else
6331 bindtype = STB_WEAK;
6332 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
6333 }
6334
6335 /* If a symbol is not defined locally, we clear the visibility
6336 field. */
6337 if (! finfo->info->relocateable
6338 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
6339 sym.st_other ^= ELF_ST_VISIBILITY (sym.st_other);
6340
6341 /* If this symbol should be put in the .dynsym section, then put it
6342 there now. We already know the symbol index. We also fill in
6343 the entry in the .hash section. */
6344 if (h->dynindx != -1
6345 && elf_hash_table (finfo->info)->dynamic_sections_created)
6346 {
6347 size_t bucketcount;
6348 size_t bucket;
6349 size_t hash_entry_size;
6350 bfd_byte *bucketpos;
6351 bfd_vma chain;
6352 Elf_External_Sym *esym;
6353
6354 sym.st_name = h->dynstr_index;
6355 esym = (Elf_External_Sym *) finfo->dynsym_sec->contents + h->dynindx;
6356 elf_swap_symbol_out (finfo->output_bfd, &sym, (PTR) esym, (PTR) 0);
6357
6358 bucketcount = elf_hash_table (finfo->info)->bucketcount;
6359 bucket = h->elf_hash_value % bucketcount;
6360 hash_entry_size
6361 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
6362 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
6363 + (bucket + 2) * hash_entry_size);
6364 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
6365 bfd_put (8 * hash_entry_size, finfo->output_bfd, (bfd_vma) h->dynindx,
6366 bucketpos);
6367 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
6368 ((bfd_byte *) finfo->hash_sec->contents
6369 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
6370
6371 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
6372 {
6373 Elf_Internal_Versym iversym;
6374 Elf_External_Versym *eversym;
6375
6376 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
6377 {
6378 if (h->verinfo.verdef == NULL)
6379 iversym.vs_vers = 0;
6380 else
6381 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
6382 }
6383 else
6384 {
6385 if (h->verinfo.vertree == NULL)
6386 iversym.vs_vers = 1;
6387 else
6388 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
6389 }
6390
6391 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
6392 iversym.vs_vers |= VERSYM_HIDDEN;
6393
6394 eversym = (Elf_External_Versym *) finfo->symver_sec->contents;
6395 eversym += h->dynindx;
6396 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym, eversym);
6397 }
6398 }
6399
6400 /* If we're stripping it, then it was just a dynamic symbol, and
6401 there's nothing else to do. */
6402 if (strip || (input_sec->flags & SEC_EXCLUDE) != 0)
6403 return true;
6404
6405 h->indx = bfd_get_symcount (finfo->output_bfd);
6406
6407 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
6408 {
6409 eoinfo->failed = true;
6410 return false;
6411 }
6412
6413 return true;
6414 }
6415
6416 /* Copy the relocations indicated by the INTERNAL_RELOCS (which
6417 originated from the section given by INPUT_REL_HDR) to the
6418 OUTPUT_BFD. */
6419
6420 static boolean
6421 elf_link_output_relocs (output_bfd, input_section, input_rel_hdr,
6422 internal_relocs)
6423 bfd *output_bfd;
6424 asection *input_section;
6425 Elf_Internal_Shdr *input_rel_hdr;
6426 Elf_Internal_Rela *internal_relocs;
6427 {
6428 Elf_Internal_Rela *irela;
6429 Elf_Internal_Rela *irelaend;
6430 Elf_Internal_Shdr *output_rel_hdr;
6431 asection *output_section;
6432 unsigned int *rel_countp = NULL;
6433 struct elf_backend_data *bed;
6434 bfd_size_type amt;
6435
6436 output_section = input_section->output_section;
6437 output_rel_hdr = NULL;
6438
6439 if (elf_section_data (output_section)->rel_hdr.sh_entsize
6440 == input_rel_hdr->sh_entsize)
6441 {
6442 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
6443 rel_countp = &elf_section_data (output_section)->rel_count;
6444 }
6445 else if (elf_section_data (output_section)->rel_hdr2
6446 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
6447 == input_rel_hdr->sh_entsize))
6448 {
6449 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
6450 rel_countp = &elf_section_data (output_section)->rel_count2;
6451 }
6452 else
6453 {
6454 (*_bfd_error_handler)
6455 (_("%s: relocation size mismatch in %s section %s"),
6456 bfd_get_filename (output_bfd),
6457 bfd_archive_filename (input_section->owner),
6458 input_section->name);
6459 bfd_set_error (bfd_error_wrong_object_format);
6460 return false;
6461 }
6462
6463 bed = get_elf_backend_data (output_bfd);
6464 irela = internal_relocs;
6465 irelaend = irela + (NUM_SHDR_ENTRIES (input_rel_hdr)
6466 * bed->s->int_rels_per_ext_rel);
6467
6468 if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
6469 {
6470 Elf_External_Rel *erel;
6471 Elf_Internal_Rel *irel;
6472
6473 amt = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rel);
6474 irel = (Elf_Internal_Rel *) bfd_zmalloc (amt);
6475 if (irel == NULL)
6476 {
6477 (*_bfd_error_handler) (_("Error: out of memory"));
6478 abort ();
6479 }
6480
6481 erel = ((Elf_External_Rel *) output_rel_hdr->contents + *rel_countp);
6482 for (; irela < irelaend; irela += bed->s->int_rels_per_ext_rel, erel++)
6483 {
6484 unsigned int i;
6485
6486 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
6487 {
6488 irel[i].r_offset = irela[i].r_offset;
6489 irel[i].r_info = irela[i].r_info;
6490 BFD_ASSERT (irela[i].r_addend == 0);
6491 }
6492
6493 if (bed->s->swap_reloc_out)
6494 (*bed->s->swap_reloc_out) (output_bfd, irel, (PTR) erel);
6495 else
6496 elf_swap_reloc_out (output_bfd, irel, erel);
6497 }
6498
6499 free (irel);
6500 }
6501 else
6502 {
6503 Elf_External_Rela *erela;
6504
6505 BFD_ASSERT (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rela));
6506
6507 erela = ((Elf_External_Rela *) output_rel_hdr->contents + *rel_countp);
6508 for (; irela < irelaend; irela += bed->s->int_rels_per_ext_rel, erela++)
6509 if (bed->s->swap_reloca_out)
6510 (*bed->s->swap_reloca_out) (output_bfd, irela, (PTR) erela);
6511 else
6512 elf_swap_reloca_out (output_bfd, irela, erela);
6513 }
6514
6515 /* Bump the counter, so that we know where to add the next set of
6516 relocations. */
6517 *rel_countp += NUM_SHDR_ENTRIES (input_rel_hdr);
6518
6519 return true;
6520 }
6521
6522 /* Link an input file into the linker output file. This function
6523 handles all the sections and relocations of the input file at once.
6524 This is so that we only have to read the local symbols once, and
6525 don't have to keep them in memory. */
6526
6527 static boolean
6528 elf_link_input_bfd (finfo, input_bfd)
6529 struct elf_final_link_info *finfo;
6530 bfd *input_bfd;
6531 {
6532 boolean (*relocate_section) PARAMS ((bfd *, struct bfd_link_info *,
6533 bfd *, asection *, bfd_byte *,
6534 Elf_Internal_Rela *,
6535 Elf_Internal_Sym *, asection **));
6536 bfd *output_bfd;
6537 Elf_Internal_Shdr *symtab_hdr;
6538 size_t locsymcount;
6539 size_t extsymoff;
6540 Elf_Internal_Sym *isymbuf;
6541 Elf_Internal_Sym *isym;
6542 Elf_Internal_Sym *isymend;
6543 long *pindex;
6544 asection **ppsection;
6545 asection *o;
6546 struct elf_backend_data *bed;
6547 boolean emit_relocs;
6548 struct elf_link_hash_entry **sym_hashes;
6549
6550 output_bfd = finfo->output_bfd;
6551 bed = get_elf_backend_data (output_bfd);
6552 relocate_section = bed->elf_backend_relocate_section;
6553
6554 /* If this is a dynamic object, we don't want to do anything here:
6555 we don't want the local symbols, and we don't want the section
6556 contents. */
6557 if ((input_bfd->flags & DYNAMIC) != 0)
6558 return true;
6559
6560 emit_relocs = (finfo->info->relocateable
6561 || finfo->info->emitrelocations
6562 || bed->elf_backend_emit_relocs);
6563
6564 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6565 if (elf_bad_symtab (input_bfd))
6566 {
6567 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
6568 extsymoff = 0;
6569 }
6570 else
6571 {
6572 locsymcount = symtab_hdr->sh_info;
6573 extsymoff = symtab_hdr->sh_info;
6574 }
6575
6576 /* Read the local symbols. */
6577 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6578 if (isymbuf == NULL && locsymcount != 0)
6579 {
6580 isymbuf = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, locsymcount, 0,
6581 finfo->internal_syms,
6582 finfo->external_syms,
6583 finfo->locsym_shndx);
6584 if (isymbuf == NULL)
6585 return false;
6586 }
6587
6588 /* Find local symbol sections and adjust values of symbols in
6589 SEC_MERGE sections. Write out those local symbols we know are
6590 going into the output file. */
6591 isymend = isymbuf + locsymcount;
6592 for (isym = isymbuf, pindex = finfo->indices, ppsection = finfo->sections;
6593 isym < isymend;
6594 isym++, pindex++, ppsection++)
6595 {
6596 asection *isec;
6597 const char *name;
6598 Elf_Internal_Sym osym;
6599
6600 *pindex = -1;
6601
6602 if (elf_bad_symtab (input_bfd))
6603 {
6604 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
6605 {
6606 *ppsection = NULL;
6607 continue;
6608 }
6609 }
6610
6611 if (isym->st_shndx == SHN_UNDEF)
6612 isec = bfd_und_section_ptr;
6613 else if (isym->st_shndx < SHN_LORESERVE
6614 || isym->st_shndx > SHN_HIRESERVE)
6615 {
6616 isec = section_from_elf_index (input_bfd, isym->st_shndx);
6617 if (isec
6618 && elf_section_data (isec)->sec_info_type == ELF_INFO_TYPE_MERGE
6619 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
6620 isym->st_value =
6621 _bfd_merged_section_offset (output_bfd, &isec,
6622 elf_section_data (isec)->sec_info,
6623 isym->st_value, (bfd_vma) 0);
6624 }
6625 else if (isym->st_shndx == SHN_ABS)
6626 isec = bfd_abs_section_ptr;
6627 else if (isym->st_shndx == SHN_COMMON)
6628 isec = bfd_com_section_ptr;
6629 else
6630 {
6631 /* Who knows? */
6632 isec = NULL;
6633 }
6634
6635 *ppsection = isec;
6636
6637 /* Don't output the first, undefined, symbol. */
6638 if (ppsection == finfo->sections)
6639 continue;
6640
6641 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
6642 {
6643 /* We never output section symbols. Instead, we use the
6644 section symbol of the corresponding section in the output
6645 file. */
6646 continue;
6647 }
6648
6649 /* If we are stripping all symbols, we don't want to output this
6650 one. */
6651 if (finfo->info->strip == strip_all)
6652 continue;
6653
6654 /* If we are discarding all local symbols, we don't want to
6655 output this one. If we are generating a relocateable output
6656 file, then some of the local symbols may be required by
6657 relocs; we output them below as we discover that they are
6658 needed. */
6659 if (finfo->info->discard == discard_all)
6660 continue;
6661
6662 /* If this symbol is defined in a section which we are
6663 discarding, we don't need to keep it, but note that
6664 linker_mark is only reliable for sections that have contents.
6665 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
6666 as well as linker_mark. */
6667 if ((isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
6668 && isec != NULL
6669 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
6670 || (! finfo->info->relocateable
6671 && (isec->flags & SEC_EXCLUDE) != 0)))
6672 continue;
6673
6674 /* Get the name of the symbol. */
6675 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
6676 isym->st_name);
6677 if (name == NULL)
6678 return false;
6679
6680 /* See if we are discarding symbols with this name. */
6681 if ((finfo->info->strip == strip_some
6682 && (bfd_hash_lookup (finfo->info->keep_hash, name, false, false)
6683 == NULL))
6684 || (((finfo->info->discard == discard_sec_merge
6685 && (isec->flags & SEC_MERGE) && ! finfo->info->relocateable)
6686 || finfo->info->discard == discard_l)
6687 && bfd_is_local_label_name (input_bfd, name)))
6688 continue;
6689
6690 /* If we get here, we are going to output this symbol. */
6691
6692 osym = *isym;
6693
6694 /* Adjust the section index for the output file. */
6695 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
6696 isec->output_section);
6697 if (osym.st_shndx == SHN_BAD)
6698 return false;
6699
6700 *pindex = bfd_get_symcount (output_bfd);
6701
6702 /* ELF symbols in relocateable files are section relative, but
6703 in executable files they are virtual addresses. Note that
6704 this code assumes that all ELF sections have an associated
6705 BFD section with a reasonable value for output_offset; below
6706 we assume that they also have a reasonable value for
6707 output_section. Any special sections must be set up to meet
6708 these requirements. */
6709 osym.st_value += isec->output_offset;
6710 if (! finfo->info->relocateable)
6711 {
6712 osym.st_value += isec->output_section->vma;
6713 if (ELF_ST_TYPE (osym.st_info) == STT_TLS)
6714 {
6715 /* STT_TLS symbols are relative to PT_TLS segment base. */
6716 BFD_ASSERT (finfo->first_tls_sec != NULL);
6717 osym.st_value -= finfo->first_tls_sec->vma;
6718 }
6719 }
6720
6721 if (! elf_link_output_sym (finfo, name, &osym, isec))
6722 return false;
6723 }
6724
6725 /* Relocate the contents of each section. */
6726 sym_hashes = elf_sym_hashes (input_bfd);
6727 for (o = input_bfd->sections; o != NULL; o = o->next)
6728 {
6729 bfd_byte *contents;
6730
6731 if (! o->linker_mark)
6732 {
6733 /* This section was omitted from the link. */
6734 continue;
6735 }
6736
6737 if ((o->flags & SEC_HAS_CONTENTS) == 0
6738 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
6739 continue;
6740
6741 if ((o->flags & SEC_LINKER_CREATED) != 0)
6742 {
6743 /* Section was created by elf_link_create_dynamic_sections
6744 or somesuch. */
6745 continue;
6746 }
6747
6748 /* Get the contents of the section. They have been cached by a
6749 relaxation routine. Note that o is a section in an input
6750 file, so the contents field will not have been set by any of
6751 the routines which work on output files. */
6752 if (elf_section_data (o)->this_hdr.contents != NULL)
6753 contents = elf_section_data (o)->this_hdr.contents;
6754 else
6755 {
6756 contents = finfo->contents;
6757 if (! bfd_get_section_contents (input_bfd, o, contents,
6758 (file_ptr) 0, o->_raw_size))
6759 return false;
6760 }
6761
6762 if ((o->flags & SEC_RELOC) != 0)
6763 {
6764 Elf_Internal_Rela *internal_relocs;
6765
6766 /* Get the swapped relocs. */
6767 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
6768 (input_bfd, o, finfo->external_relocs,
6769 finfo->internal_relocs, false));
6770 if (internal_relocs == NULL
6771 && o->reloc_count > 0)
6772 return false;
6773
6774 /* Run through the relocs looking for any against symbols
6775 from discarded sections and section symbols from
6776 removed link-once sections. Complain about relocs
6777 against discarded sections. Zero relocs against removed
6778 link-once sections. We should really complain if
6779 anything in the final link tries to use it, but
6780 DWARF-based exception handling might have an entry in
6781 .eh_frame to describe a routine in the linkonce section,
6782 and it turns out to be hard to remove the .eh_frame
6783 entry too. FIXME. */
6784 if (!finfo->info->relocateable
6785 && !elf_section_ignore_discarded_relocs (o))
6786 {
6787 Elf_Internal_Rela *rel, *relend;
6788
6789 rel = internal_relocs;
6790 relend = rel + o->reloc_count * bed->s->int_rels_per_ext_rel;
6791 for ( ; rel < relend; rel++)
6792 {
6793 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
6794
6795 if (r_symndx >= locsymcount
6796 || (elf_bad_symtab (input_bfd)
6797 && finfo->sections[r_symndx] == NULL))
6798 {
6799 struct elf_link_hash_entry *h;
6800
6801 h = sym_hashes[r_symndx - extsymoff];
6802 while (h->root.type == bfd_link_hash_indirect
6803 || h->root.type == bfd_link_hash_warning)
6804 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6805
6806 /* Complain if the definition comes from a
6807 discarded section. */
6808 if ((h->root.type == bfd_link_hash_defined
6809 || h->root.type == bfd_link_hash_defweak)
6810 && elf_discarded_section (h->root.u.def.section))
6811 {
6812 #if BFD_VERSION_DATE < 20031005
6813 if ((o->flags & SEC_DEBUGGING) != 0)
6814 {
6815 #if BFD_VERSION_DATE > 20021005
6816 (*finfo->info->callbacks->warning)
6817 (finfo->info,
6818 _("warning: relocation against removed section; zeroing"),
6819 NULL, input_bfd, o, rel->r_offset);
6820 #endif
6821 BFD_ASSERT (r_symndx != 0);
6822 memset (rel, 0, sizeof (*rel));
6823 }
6824 else
6825 #endif
6826 {
6827 if (! ((*finfo->info->callbacks->undefined_symbol)
6828 (finfo->info, h->root.root.string,
6829 input_bfd, o, rel->r_offset,
6830 true)))
6831 return false;
6832 }
6833 }
6834 }
6835 else
6836 {
6837 asection *sec = finfo->sections[r_symndx];
6838
6839 if (sec != NULL && elf_discarded_section (sec))
6840 {
6841 #if BFD_VERSION_DATE < 20031005
6842 if ((o->flags & SEC_DEBUGGING) != 0
6843 || (sec->flags & SEC_LINK_ONCE) != 0)
6844 {
6845 #if BFD_VERSION_DATE > 20021005
6846 (*finfo->info->callbacks->warning)
6847 (finfo->info,
6848 _("warning: relocation against removed section"),
6849 NULL, input_bfd, o, rel->r_offset);
6850 #endif
6851 BFD_ASSERT (r_symndx != 0);
6852 rel->r_info
6853 = ELF_R_INFO (0, ELF_R_TYPE (rel->r_info));
6854 rel->r_addend = 0;
6855 }
6856 else
6857 #endif
6858 {
6859 boolean ok;
6860 const char *msg
6861 = _("local symbols in discarded section %s");
6862 bfd_size_type amt
6863 = strlen (sec->name) + strlen (msg) - 1;
6864 char *buf = (char *) bfd_malloc (amt);
6865
6866 if (buf != NULL)
6867 sprintf (buf, msg, sec->name);
6868 else
6869 buf = (char *) sec->name;
6870 ok = (*finfo->info->callbacks
6871 ->undefined_symbol) (finfo->info, buf,
6872 input_bfd, o,
6873 rel->r_offset,
6874 true);
6875 if (buf != sec->name)
6876 free (buf);
6877 if (!ok)
6878 return false;
6879 }
6880 }
6881 }
6882 }
6883 }
6884
6885 /* Relocate the section by invoking a back end routine.
6886
6887 The back end routine is responsible for adjusting the
6888 section contents as necessary, and (if using Rela relocs
6889 and generating a relocateable output file) adjusting the
6890 reloc addend as necessary.
6891
6892 The back end routine does not have to worry about setting
6893 the reloc address or the reloc symbol index.
6894
6895 The back end routine is given a pointer to the swapped in
6896 internal symbols, and can access the hash table entries
6897 for the external symbols via elf_sym_hashes (input_bfd).
6898
6899 When generating relocateable output, the back end routine
6900 must handle STB_LOCAL/STT_SECTION symbols specially. The
6901 output symbol is going to be a section symbol
6902 corresponding to the output section, which will require
6903 the addend to be adjusted. */
6904
6905 if (! (*relocate_section) (output_bfd, finfo->info,
6906 input_bfd, o, contents,
6907 internal_relocs,
6908 isymbuf,
6909 finfo->sections))
6910 return false;
6911
6912 if (emit_relocs)
6913 {
6914 Elf_Internal_Rela *irela;
6915 Elf_Internal_Rela *irelaend;
6916 struct elf_link_hash_entry **rel_hash;
6917 Elf_Internal_Shdr *input_rel_hdr, *input_rel_hdr2;
6918 unsigned int next_erel;
6919 boolean (*reloc_emitter) PARAMS ((bfd *, asection *,
6920 Elf_Internal_Shdr *,
6921 Elf_Internal_Rela *));
6922 boolean rela_normal;
6923
6924 input_rel_hdr = &elf_section_data (o)->rel_hdr;
6925 rela_normal = (bed->rela_normal
6926 && (input_rel_hdr->sh_entsize
6927 == sizeof (Elf_External_Rela)));
6928
6929 /* Adjust the reloc addresses and symbol indices. */
6930
6931 irela = internal_relocs;
6932 irelaend = irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
6933 rel_hash = (elf_section_data (o->output_section)->rel_hashes
6934 + elf_section_data (o->output_section)->rel_count
6935 + elf_section_data (o->output_section)->rel_count2);
6936 for (next_erel = 0; irela < irelaend; irela++, next_erel++)
6937 {
6938 unsigned long r_symndx;
6939 asection *sec;
6940 Elf_Internal_Sym sym;
6941
6942 if (next_erel == bed->s->int_rels_per_ext_rel)
6943 {
6944 rel_hash++;
6945 next_erel = 0;
6946 }
6947
6948 irela->r_offset += o->output_offset;
6949
6950 /* Relocs in an executable have to be virtual addresses. */
6951 if (!finfo->info->relocateable)
6952 irela->r_offset += o->output_section->vma;
6953
6954 r_symndx = ELF_R_SYM (irela->r_info);
6955
6956 if (r_symndx == 0)
6957 continue;
6958
6959 if (r_symndx >= locsymcount
6960 || (elf_bad_symtab (input_bfd)
6961 && finfo->sections[r_symndx] == NULL))
6962 {
6963 struct elf_link_hash_entry *rh;
6964 unsigned long indx;
6965
6966 /* This is a reloc against a global symbol. We
6967 have not yet output all the local symbols, so
6968 we do not know the symbol index of any global
6969 symbol. We set the rel_hash entry for this
6970 reloc to point to the global hash table entry
6971 for this symbol. The symbol index is then
6972 set at the end of elf_bfd_final_link. */
6973 indx = r_symndx - extsymoff;
6974 rh = elf_sym_hashes (input_bfd)[indx];
6975 while (rh->root.type == bfd_link_hash_indirect
6976 || rh->root.type == bfd_link_hash_warning)
6977 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
6978
6979 /* Setting the index to -2 tells
6980 elf_link_output_extsym that this symbol is
6981 used by a reloc. */
6982 BFD_ASSERT (rh->indx < 0);
6983 rh->indx = -2;
6984
6985 *rel_hash = rh;
6986
6987 continue;
6988 }
6989
6990 /* This is a reloc against a local symbol. */
6991
6992 *rel_hash = NULL;
6993 sym = isymbuf[r_symndx];
6994 sec = finfo->sections[r_symndx];
6995 if (ELF_ST_TYPE (sym.st_info) == STT_SECTION)
6996 {
6997 /* I suppose the backend ought to fill in the
6998 section of any STT_SECTION symbol against a
6999 processor specific section. If we have
7000 discarded a section, the output_section will
7001 be the absolute section. */
7002 if (bfd_is_abs_section (sec)
7003 || (sec != NULL
7004 && bfd_is_abs_section (sec->output_section)))
7005 r_symndx = 0;
7006 else if (sec == NULL || sec->owner == NULL)
7007 {
7008 bfd_set_error (bfd_error_bad_value);
7009 return false;
7010 }
7011 else
7012 {
7013 r_symndx = sec->output_section->target_index;
7014 BFD_ASSERT (r_symndx != 0);
7015 }
7016
7017 /* Adjust the addend according to where the
7018 section winds up in the output section. */
7019 if (rela_normal)
7020 irela->r_addend += sec->output_offset;
7021 }
7022 else
7023 {
7024 if (finfo->indices[r_symndx] == -1)
7025 {
7026 unsigned long shlink;
7027 const char *name;
7028 asection *osec;
7029
7030 if (finfo->info->strip == strip_all)
7031 {
7032 /* You can't do ld -r -s. */
7033 bfd_set_error (bfd_error_invalid_operation);
7034 return false;
7035 }
7036
7037 /* This symbol was skipped earlier, but
7038 since it is needed by a reloc, we
7039 must output it now. */
7040 shlink = symtab_hdr->sh_link;
7041 name = (bfd_elf_string_from_elf_section
7042 (input_bfd, shlink, sym.st_name));
7043 if (name == NULL)
7044 return false;
7045
7046 osec = sec->output_section;
7047 sym.st_shndx =
7048 _bfd_elf_section_from_bfd_section (output_bfd,
7049 osec);
7050 if (sym.st_shndx == SHN_BAD)
7051 return false;
7052
7053 sym.st_value += sec->output_offset;
7054 if (! finfo->info->relocateable)
7055 {
7056 sym.st_value += osec->vma;
7057 if (ELF_ST_TYPE (sym.st_info) == STT_TLS)
7058 {
7059 /* STT_TLS symbols are relative to PT_TLS
7060 segment base. */
7061 BFD_ASSERT (finfo->first_tls_sec != NULL);
7062 sym.st_value -= finfo->first_tls_sec->vma;
7063 }
7064 }
7065
7066 finfo->indices[r_symndx]
7067 = bfd_get_symcount (output_bfd);
7068
7069 if (! elf_link_output_sym (finfo, name, &sym, sec))
7070 return false;
7071 }
7072
7073 r_symndx = finfo->indices[r_symndx];
7074 }
7075
7076 irela->r_info = ELF_R_INFO (r_symndx,
7077 ELF_R_TYPE (irela->r_info));
7078 }
7079
7080 /* Swap out the relocs. */
7081 if (bed->elf_backend_emit_relocs
7082 && !(finfo->info->relocateable
7083 || finfo->info->emitrelocations))
7084 reloc_emitter = bed->elf_backend_emit_relocs;
7085 else
7086 reloc_emitter = elf_link_output_relocs;
7087
7088 if (input_rel_hdr->sh_size != 0
7089 && ! (*reloc_emitter) (output_bfd, o, input_rel_hdr,
7090 internal_relocs))
7091 return false;
7092
7093 input_rel_hdr2 = elf_section_data (o)->rel_hdr2;
7094 if (input_rel_hdr2 && input_rel_hdr2->sh_size != 0)
7095 {
7096 internal_relocs += (NUM_SHDR_ENTRIES (input_rel_hdr)
7097 * bed->s->int_rels_per_ext_rel);
7098 if (! (*reloc_emitter) (output_bfd, o, input_rel_hdr2,
7099 internal_relocs))
7100 return false;
7101 }
7102 }
7103 }
7104
7105 /* Write out the modified section contents. */
7106 if (bed->elf_backend_write_section
7107 && (*bed->elf_backend_write_section) (output_bfd, o, contents))
7108 {
7109 /* Section written out. */
7110 }
7111 else switch (elf_section_data (o)->sec_info_type)
7112 {
7113 case ELF_INFO_TYPE_STABS:
7114 if (! (_bfd_write_section_stabs
7115 (output_bfd,
7116 &elf_hash_table (finfo->info)->stab_info,
7117 o, &elf_section_data (o)->sec_info, contents)))
7118 return false;
7119 break;
7120 case ELF_INFO_TYPE_MERGE:
7121 if (! (_bfd_write_merged_section
7122 (output_bfd, o, elf_section_data (o)->sec_info)))
7123 return false;
7124 break;
7125 case ELF_INFO_TYPE_EH_FRAME:
7126 {
7127 asection *ehdrsec;
7128
7129 ehdrsec
7130 = bfd_get_section_by_name (elf_hash_table (finfo->info)->dynobj,
7131 ".eh_frame_hdr");
7132 if (! (_bfd_elf_write_section_eh_frame (output_bfd, o, ehdrsec,
7133 contents)))
7134 return false;
7135 }
7136 break;
7137 default:
7138 {
7139 bfd_size_type sec_size;
7140
7141 sec_size = (o->_cooked_size != 0 ? o->_cooked_size : o->_raw_size);
7142 if (! (o->flags & SEC_EXCLUDE)
7143 && ! bfd_set_section_contents (output_bfd, o->output_section,
7144 contents,
7145 (file_ptr) o->output_offset,
7146 sec_size))
7147 return false;
7148 }
7149 break;
7150 }
7151 }
7152
7153 return true;
7154 }
7155
7156 /* Generate a reloc when linking an ELF file. This is a reloc
7157 requested by the linker, and does come from any input file. This
7158 is used to build constructor and destructor tables when linking
7159 with -Ur. */
7160
7161 static boolean
7162 elf_reloc_link_order (output_bfd, info, output_section, link_order)
7163 bfd *output_bfd;
7164 struct bfd_link_info *info;
7165 asection *output_section;
7166 struct bfd_link_order *link_order;
7167 {
7168 reloc_howto_type *howto;
7169 long indx;
7170 bfd_vma offset;
7171 bfd_vma addend;
7172 struct elf_link_hash_entry **rel_hash_ptr;
7173 Elf_Internal_Shdr *rel_hdr;
7174 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7175
7176 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
7177 if (howto == NULL)
7178 {
7179 bfd_set_error (bfd_error_bad_value);
7180 return false;
7181 }
7182
7183 addend = link_order->u.reloc.p->addend;
7184
7185 /* Figure out the symbol index. */
7186 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
7187 + elf_section_data (output_section)->rel_count
7188 + elf_section_data (output_section)->rel_count2);
7189 if (link_order->type == bfd_section_reloc_link_order)
7190 {
7191 indx = link_order->u.reloc.p->u.section->target_index;
7192 BFD_ASSERT (indx != 0);
7193 *rel_hash_ptr = NULL;
7194 }
7195 else
7196 {
7197 struct elf_link_hash_entry *h;
7198
7199 /* Treat a reloc against a defined symbol as though it were
7200 actually against the section. */
7201 h = ((struct elf_link_hash_entry *)
7202 bfd_wrapped_link_hash_lookup (output_bfd, info,
7203 link_order->u.reloc.p->u.name,
7204 false, false, true));
7205 if (h != NULL
7206 && (h->root.type == bfd_link_hash_defined
7207 || h->root.type == bfd_link_hash_defweak))
7208 {
7209 asection *section;
7210
7211 section = h->root.u.def.section;
7212 indx = section->output_section->target_index;
7213 *rel_hash_ptr = NULL;
7214 /* It seems that we ought to add the symbol value to the
7215 addend here, but in practice it has already been added
7216 because it was passed to constructor_callback. */
7217 addend += section->output_section->vma + section->output_offset;
7218 }
7219 else if (h != NULL)
7220 {
7221 /* Setting the index to -2 tells elf_link_output_extsym that
7222 this symbol is used by a reloc. */
7223 h->indx = -2;
7224 *rel_hash_ptr = h;
7225 indx = 0;
7226 }
7227 else
7228 {
7229 if (! ((*info->callbacks->unattached_reloc)
7230 (info, link_order->u.reloc.p->u.name, (bfd *) NULL,
7231 (asection *) NULL, (bfd_vma) 0)))
7232 return false;
7233 indx = 0;
7234 }
7235 }
7236
7237 /* If this is an inplace reloc, we must write the addend into the
7238 object file. */
7239 if (howto->partial_inplace && addend != 0)
7240 {
7241 bfd_size_type size;
7242 bfd_reloc_status_type rstat;
7243 bfd_byte *buf;
7244 boolean ok;
7245 const char *sym_name;
7246
7247 size = bfd_get_reloc_size (howto);
7248 buf = (bfd_byte *) bfd_zmalloc (size);
7249 if (buf == (bfd_byte *) NULL)
7250 return false;
7251 rstat = _bfd_relocate_contents (howto, output_bfd, (bfd_vma) addend, buf);
7252 switch (rstat)
7253 {
7254 case bfd_reloc_ok:
7255 break;
7256
7257 default:
7258 case bfd_reloc_outofrange:
7259 abort ();
7260
7261 case bfd_reloc_overflow:
7262 if (link_order->type == bfd_section_reloc_link_order)
7263 sym_name = bfd_section_name (output_bfd,
7264 link_order->u.reloc.p->u.section);
7265 else
7266 sym_name = link_order->u.reloc.p->u.name;
7267 if (! ((*info->callbacks->reloc_overflow)
7268 (info, sym_name, howto->name, addend,
7269 (bfd *) NULL, (asection *) NULL, (bfd_vma) 0)))
7270 {
7271 free (buf);
7272 return false;
7273 }
7274 break;
7275 }
7276 ok = bfd_set_section_contents (output_bfd, output_section, (PTR) buf,
7277 (file_ptr) link_order->offset, size);
7278 free (buf);
7279 if (! ok)
7280 return false;
7281 }
7282
7283 /* The address of a reloc is relative to the section in a
7284 relocateable file, and is a virtual address in an executable
7285 file. */
7286 offset = link_order->offset;
7287 if (! info->relocateable)
7288 offset += output_section->vma;
7289
7290 rel_hdr = &elf_section_data (output_section)->rel_hdr;
7291
7292 if (rel_hdr->sh_type == SHT_REL)
7293 {
7294 bfd_size_type size;
7295 Elf_Internal_Rel *irel;
7296 Elf_External_Rel *erel;
7297 unsigned int i;
7298
7299 size = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rel);
7300 irel = (Elf_Internal_Rel *) bfd_zmalloc (size);
7301 if (irel == NULL)
7302 return false;
7303
7304 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7305 irel[i].r_offset = offset;
7306 irel[0].r_info = ELF_R_INFO (indx, howto->type);
7307
7308 erel = ((Elf_External_Rel *) rel_hdr->contents
7309 + elf_section_data (output_section)->rel_count);
7310
7311 if (bed->s->swap_reloc_out)
7312 (*bed->s->swap_reloc_out) (output_bfd, irel, (bfd_byte *) erel);
7313 else
7314 elf_swap_reloc_out (output_bfd, irel, erel);
7315
7316 free (irel);
7317 }
7318 else
7319 {
7320 bfd_size_type size;
7321 Elf_Internal_Rela *irela;
7322 Elf_External_Rela *erela;
7323 unsigned int i;
7324
7325 size = bed->s->int_rels_per_ext_rel * sizeof (Elf_Internal_Rela);
7326 irela = (Elf_Internal_Rela *) bfd_zmalloc (size);
7327 if (irela == NULL)
7328 return false;
7329
7330 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7331 irela[i].r_offset = offset;
7332 irela[0].r_info = ELF_R_INFO (indx, howto->type);
7333 irela[0].r_addend = addend;
7334
7335 erela = ((Elf_External_Rela *) rel_hdr->contents
7336 + elf_section_data (output_section)->rel_count);
7337
7338 if (bed->s->swap_reloca_out)
7339 (*bed->s->swap_reloca_out) (output_bfd, irela, (bfd_byte *) erela);
7340 else
7341 elf_swap_reloca_out (output_bfd, irela, erela);
7342 }
7343
7344 ++elf_section_data (output_section)->rel_count;
7345
7346 return true;
7347 }
7348 \f
7349 /* Allocate a pointer to live in a linker created section. */
7350
7351 boolean
7352 elf_create_pointer_linker_section (abfd, info, lsect, h, rel)
7353 bfd *abfd;
7354 struct bfd_link_info *info;
7355 elf_linker_section_t *lsect;
7356 struct elf_link_hash_entry *h;
7357 const Elf_Internal_Rela *rel;
7358 {
7359 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
7360 elf_linker_section_pointers_t *linker_section_ptr;
7361 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
7362 bfd_size_type amt;
7363
7364 BFD_ASSERT (lsect != NULL);
7365
7366 /* Is this a global symbol? */
7367 if (h != NULL)
7368 {
7369 /* Has this symbol already been allocated? If so, our work is done. */
7370 if (_bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
7371 rel->r_addend,
7372 lsect->which))
7373 return true;
7374
7375 ptr_linker_section_ptr = &h->linker_section_pointer;
7376 /* Make sure this symbol is output as a dynamic symbol. */
7377 if (h->dynindx == -1)
7378 {
7379 if (! elf_link_record_dynamic_symbol (info, h))
7380 return false;
7381 }
7382
7383 if (lsect->rel_section)
7384 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
7385 }
7386 else
7387 {
7388 /* Allocation of a pointer to a local symbol. */
7389 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
7390
7391 /* Allocate a table to hold the local symbols if first time. */
7392 if (!ptr)
7393 {
7394 unsigned int num_symbols = elf_tdata (abfd)->symtab_hdr.sh_info;
7395 register unsigned int i;
7396
7397 amt = num_symbols;
7398 amt *= sizeof (elf_linker_section_pointers_t *);
7399 ptr = (elf_linker_section_pointers_t **) bfd_alloc (abfd, amt);
7400
7401 if (!ptr)
7402 return false;
7403
7404 elf_local_ptr_offsets (abfd) = ptr;
7405 for (i = 0; i < num_symbols; i++)
7406 ptr[i] = (elf_linker_section_pointers_t *) 0;
7407 }
7408
7409 /* Has this symbol already been allocated? If so, our work is done. */
7410 if (_bfd_elf_find_pointer_linker_section (ptr[r_symndx],
7411 rel->r_addend,
7412 lsect->which))
7413 return true;
7414
7415 ptr_linker_section_ptr = &ptr[r_symndx];
7416
7417 if (info->shared)
7418 {
7419 /* If we are generating a shared object, we need to
7420 output a R_<xxx>_RELATIVE reloc so that the
7421 dynamic linker can adjust this GOT entry. */
7422 BFD_ASSERT (lsect->rel_section != NULL);
7423 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
7424 }
7425 }
7426
7427 /* Allocate space for a pointer in the linker section, and allocate
7428 a new pointer record from internal memory. */
7429 BFD_ASSERT (ptr_linker_section_ptr != NULL);
7430 amt = sizeof (elf_linker_section_pointers_t);
7431 linker_section_ptr = (elf_linker_section_pointers_t *) bfd_alloc (abfd, amt);
7432
7433 if (!linker_section_ptr)
7434 return false;
7435
7436 linker_section_ptr->next = *ptr_linker_section_ptr;
7437 linker_section_ptr->addend = rel->r_addend;
7438 linker_section_ptr->which = lsect->which;
7439 linker_section_ptr->written_address_p = false;
7440 *ptr_linker_section_ptr = linker_section_ptr;
7441
7442 #if 0
7443 if (lsect->hole_size && lsect->hole_offset < lsect->max_hole_offset)
7444 {
7445 linker_section_ptr->offset = (lsect->section->_raw_size
7446 - lsect->hole_size + (ARCH_SIZE / 8));
7447 lsect->hole_offset += ARCH_SIZE / 8;
7448 lsect->sym_offset += ARCH_SIZE / 8;
7449 if (lsect->sym_hash)
7450 {
7451 /* Bump up symbol value if needed. */
7452 lsect->sym_hash->root.u.def.value += ARCH_SIZE / 8;
7453 #ifdef DEBUG
7454 fprintf (stderr, "Bump up %s by %ld, current value = %ld\n",
7455 lsect->sym_hash->root.root.string,
7456 (long) ARCH_SIZE / 8,
7457 (long) lsect->sym_hash->root.u.def.value);
7458 #endif
7459 }
7460 }
7461 else
7462 #endif
7463 linker_section_ptr->offset = lsect->section->_raw_size;
7464
7465 lsect->section->_raw_size += ARCH_SIZE / 8;
7466
7467 #ifdef DEBUG
7468 fprintf (stderr,
7469 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
7470 lsect->name, (long) linker_section_ptr->offset,
7471 (long) lsect->section->_raw_size);
7472 #endif
7473
7474 return true;
7475 }
7476 \f
7477 #if ARCH_SIZE==64
7478 #define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_64 (BFD, VAL, ADDR)
7479 #endif
7480 #if ARCH_SIZE==32
7481 #define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_32 (BFD, VAL, ADDR)
7482 #endif
7483
7484 /* Fill in the address for a pointer generated in a linker section. */
7485
7486 bfd_vma
7487 elf_finish_pointer_linker_section (output_bfd, input_bfd, info, lsect, h,
7488 relocation, rel, relative_reloc)
7489 bfd *output_bfd;
7490 bfd *input_bfd;
7491 struct bfd_link_info *info;
7492 elf_linker_section_t *lsect;
7493 struct elf_link_hash_entry *h;
7494 bfd_vma relocation;
7495 const Elf_Internal_Rela *rel;
7496 int relative_reloc;
7497 {
7498 elf_linker_section_pointers_t *linker_section_ptr;
7499
7500 BFD_ASSERT (lsect != NULL);
7501
7502 if (h != NULL)
7503 {
7504 /* Handle global symbol. */
7505 linker_section_ptr = (_bfd_elf_find_pointer_linker_section
7506 (h->linker_section_pointer,
7507 rel->r_addend,
7508 lsect->which));
7509
7510 BFD_ASSERT (linker_section_ptr != NULL);
7511
7512 if (! elf_hash_table (info)->dynamic_sections_created
7513 || (info->shared
7514 && info->symbolic
7515 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
7516 {
7517 /* This is actually a static link, or it is a
7518 -Bsymbolic link and the symbol is defined
7519 locally. We must initialize this entry in the
7520 global section.
7521
7522 When doing a dynamic link, we create a .rela.<xxx>
7523 relocation entry to initialize the value. This
7524 is done in the finish_dynamic_symbol routine. */
7525 if (!linker_section_ptr->written_address_p)
7526 {
7527 linker_section_ptr->written_address_p = true;
7528 bfd_put_ptr (output_bfd,
7529 relocation + linker_section_ptr->addend,
7530 (lsect->section->contents
7531 + linker_section_ptr->offset));
7532 }
7533 }
7534 }
7535 else
7536 {
7537 /* Handle local symbol. */
7538 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
7539 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
7540 BFD_ASSERT (elf_local_ptr_offsets (input_bfd)[r_symndx] != NULL);
7541 linker_section_ptr = (_bfd_elf_find_pointer_linker_section
7542 (elf_local_ptr_offsets (input_bfd)[r_symndx],
7543 rel->r_addend,
7544 lsect->which));
7545
7546 BFD_ASSERT (linker_section_ptr != NULL);
7547
7548 /* Write out pointer if it hasn't been rewritten out before. */
7549 if (!linker_section_ptr->written_address_p)
7550 {
7551 linker_section_ptr->written_address_p = true;
7552 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
7553 lsect->section->contents + linker_section_ptr->offset);
7554
7555 if (info->shared)
7556 {
7557 asection *srel = lsect->rel_section;
7558 Elf_Internal_Rela *outrel;
7559 Elf_External_Rela *erel;
7560 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
7561 unsigned int i;
7562 bfd_size_type amt;
7563
7564 amt = sizeof (Elf_Internal_Rela) * bed->s->int_rels_per_ext_rel;
7565 outrel = (Elf_Internal_Rela *) bfd_zmalloc (amt);
7566 if (outrel == NULL)
7567 {
7568 (*_bfd_error_handler) (_("Error: out of memory"));
7569 return 0;
7570 }
7571
7572 /* We need to generate a relative reloc for the dynamic
7573 linker. */
7574 if (!srel)
7575 {
7576 srel = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
7577 lsect->rel_name);
7578 lsect->rel_section = srel;
7579 }
7580
7581 BFD_ASSERT (srel != NULL);
7582
7583 for (i = 0; i < bed->s->int_rels_per_ext_rel; i++)
7584 outrel[i].r_offset = (lsect->section->output_section->vma
7585 + lsect->section->output_offset
7586 + linker_section_ptr->offset);
7587 outrel[0].r_info = ELF_R_INFO (0, relative_reloc);
7588 outrel[0].r_addend = 0;
7589 erel = (Elf_External_Rela *) lsect->section->contents;
7590 erel += elf_section_data (lsect->section)->rel_count;
7591 elf_swap_reloca_out (output_bfd, outrel, erel);
7592 ++elf_section_data (lsect->section)->rel_count;
7593
7594 free (outrel);
7595 }
7596 }
7597 }
7598
7599 relocation = (lsect->section->output_offset
7600 + linker_section_ptr->offset
7601 - lsect->hole_offset
7602 - lsect->sym_offset);
7603
7604 #ifdef DEBUG
7605 fprintf (stderr,
7606 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7607 lsect->name, (long) relocation, (long) relocation);
7608 #endif
7609
7610 /* Subtract out the addend, because it will get added back in by the normal
7611 processing. */
7612 return relocation - linker_section_ptr->addend;
7613 }
7614 \f
7615 /* Garbage collect unused sections. */
7616
7617 static boolean elf_gc_mark
7618 PARAMS ((struct bfd_link_info *, asection *,
7619 asection * (*) (asection *, struct bfd_link_info *,
7620 Elf_Internal_Rela *, struct elf_link_hash_entry *,
7621 Elf_Internal_Sym *)));
7622
7623 static boolean elf_gc_sweep
7624 PARAMS ((struct bfd_link_info *,
7625 boolean (*) (bfd *, struct bfd_link_info *, asection *,
7626 const Elf_Internal_Rela *)));
7627
7628 static boolean elf_gc_sweep_symbol
7629 PARAMS ((struct elf_link_hash_entry *, PTR));
7630
7631 static boolean elf_gc_allocate_got_offsets
7632 PARAMS ((struct elf_link_hash_entry *, PTR));
7633
7634 static boolean elf_gc_propagate_vtable_entries_used
7635 PARAMS ((struct elf_link_hash_entry *, PTR));
7636
7637 static boolean elf_gc_smash_unused_vtentry_relocs
7638 PARAMS ((struct elf_link_hash_entry *, PTR));
7639
7640 /* The mark phase of garbage collection. For a given section, mark
7641 it and any sections in this section's group, and all the sections
7642 which define symbols to which it refers. */
7643
7644 static boolean
7645 elf_gc_mark (info, sec, gc_mark_hook)
7646 struct bfd_link_info *info;
7647 asection *sec;
7648 asection * (*gc_mark_hook) PARAMS ((asection *, struct bfd_link_info *,
7649 Elf_Internal_Rela *,
7650 struct elf_link_hash_entry *,
7651 Elf_Internal_Sym *));
7652 {
7653 boolean ret;
7654 asection *group_sec;
7655
7656 sec->gc_mark = 1;
7657
7658 /* Mark all the sections in the group. */
7659 group_sec = elf_section_data (sec)->next_in_group;
7660 if (group_sec && !group_sec->gc_mark)
7661 if (!elf_gc_mark (info, group_sec, gc_mark_hook))
7662 return false;
7663
7664 /* Look through the section relocs. */
7665 ret = true;
7666 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
7667 {
7668 Elf_Internal_Rela *relstart, *rel, *relend;
7669 Elf_Internal_Shdr *symtab_hdr;
7670 struct elf_link_hash_entry **sym_hashes;
7671 size_t nlocsyms;
7672 size_t extsymoff;
7673 bfd *input_bfd = sec->owner;
7674 struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
7675 Elf_Internal_Sym *isym = NULL;
7676
7677 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
7678 sym_hashes = elf_sym_hashes (input_bfd);
7679
7680 /* Read the local symbols. */
7681 if (elf_bad_symtab (input_bfd))
7682 {
7683 nlocsyms = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
7684 extsymoff = 0;
7685 }
7686 else
7687 extsymoff = nlocsyms = symtab_hdr->sh_info;
7688
7689 isym = (Elf_Internal_Sym *) symtab_hdr->contents;
7690 if (isym == NULL && nlocsyms != 0)
7691 {
7692 isym = bfd_elf_get_elf_syms (input_bfd, symtab_hdr, nlocsyms, 0,
7693 NULL, NULL, NULL);
7694 if (isym == NULL)
7695 return false;
7696 }
7697
7698 /* Read the relocations. */
7699 relstart = (NAME(_bfd_elf,link_read_relocs)
7700 (input_bfd, sec, NULL, (Elf_Internal_Rela *) NULL,
7701 info->keep_memory));
7702 if (relstart == NULL)
7703 {
7704 ret = false;
7705 goto out1;
7706 }
7707 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
7708
7709 for (rel = relstart; rel < relend; rel++)
7710 {
7711 unsigned long r_symndx;
7712 asection *rsec;
7713 struct elf_link_hash_entry *h;
7714
7715 r_symndx = ELF_R_SYM (rel->r_info);
7716 if (r_symndx == 0)
7717 continue;
7718
7719 if (r_symndx >= nlocsyms
7720 || ELF_ST_BIND (isym[r_symndx].st_info) != STB_LOCAL)
7721 {
7722 h = sym_hashes[r_symndx - extsymoff];
7723 rsec = (*gc_mark_hook) (sec, info, rel, h, NULL);
7724 }
7725 else
7726 {
7727 rsec = (*gc_mark_hook) (sec, info, rel, NULL, &isym[r_symndx]);
7728 }
7729
7730 if (rsec && !rsec->gc_mark)
7731 {
7732 if (bfd_get_flavour (rsec->owner) != bfd_target_elf_flavour)
7733 rsec->gc_mark = 1;
7734 else if (!elf_gc_mark (info, rsec, gc_mark_hook))
7735 {
7736 ret = false;
7737 goto out2;
7738 }
7739 }
7740 }
7741
7742 out2:
7743 if (elf_section_data (sec)->relocs != relstart)
7744 free (relstart);
7745 out1:
7746 if (isym != NULL && symtab_hdr->contents != (unsigned char *) isym)
7747 {
7748 if (! info->keep_memory)
7749 free (isym);
7750 else
7751 symtab_hdr->contents = (unsigned char *) isym;
7752 }
7753 }
7754
7755 return ret;
7756 }
7757
7758 /* The sweep phase of garbage collection. Remove all garbage sections. */
7759
7760 static boolean
7761 elf_gc_sweep (info, gc_sweep_hook)
7762 struct bfd_link_info *info;
7763 boolean (*gc_sweep_hook) PARAMS ((bfd *, struct bfd_link_info *,
7764 asection *, const Elf_Internal_Rela *));
7765 {
7766 bfd *sub;
7767
7768 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
7769 {
7770 asection *o;
7771
7772 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
7773 continue;
7774
7775 for (o = sub->sections; o != NULL; o = o->next)
7776 {
7777 /* Keep special sections. Keep .debug sections. */
7778 if ((o->flags & SEC_LINKER_CREATED)
7779 || (o->flags & SEC_DEBUGGING))
7780 o->gc_mark = 1;
7781
7782 if (o->gc_mark)
7783 continue;
7784
7785 /* Skip sweeping sections already excluded. */
7786 if (o->flags & SEC_EXCLUDE)
7787 continue;
7788
7789 /* Since this is early in the link process, it is simple
7790 to remove a section from the output. */
7791 o->flags |= SEC_EXCLUDE;
7792
7793 /* But we also have to update some of the relocation
7794 info we collected before. */
7795 if (gc_sweep_hook
7796 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
7797 {
7798 Elf_Internal_Rela *internal_relocs;
7799 boolean r;
7800
7801 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
7802 (o->owner, o, NULL, NULL, info->keep_memory));
7803 if (internal_relocs == NULL)
7804 return false;
7805
7806 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
7807
7808 if (elf_section_data (o)->relocs != internal_relocs)
7809 free (internal_relocs);
7810
7811 if (!r)
7812 return false;
7813 }
7814 }
7815 }
7816
7817 /* Remove the symbols that were in the swept sections from the dynamic
7818 symbol table. GCFIXME: Anyone know how to get them out of the
7819 static symbol table as well? */
7820 {
7821 int i = 0;
7822
7823 elf_link_hash_traverse (elf_hash_table (info),
7824 elf_gc_sweep_symbol,
7825 (PTR) &i);
7826
7827 elf_hash_table (info)->dynsymcount = i;
7828 }
7829
7830 return true;
7831 }
7832
7833 /* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
7834
7835 static boolean
7836 elf_gc_sweep_symbol (h, idxptr)
7837 struct elf_link_hash_entry *h;
7838 PTR idxptr;
7839 {
7840 int *idx = (int *) idxptr;
7841
7842 if (h->root.type == bfd_link_hash_warning)
7843 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7844
7845 if (h->dynindx != -1
7846 && ((h->root.type != bfd_link_hash_defined
7847 && h->root.type != bfd_link_hash_defweak)
7848 || h->root.u.def.section->gc_mark))
7849 h->dynindx = (*idx)++;
7850
7851 return true;
7852 }
7853
7854 /* Propogate collected vtable information. This is called through
7855 elf_link_hash_traverse. */
7856
7857 static boolean
7858 elf_gc_propagate_vtable_entries_used (h, okp)
7859 struct elf_link_hash_entry *h;
7860 PTR okp;
7861 {
7862 if (h->root.type == bfd_link_hash_warning)
7863 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7864
7865 /* Those that are not vtables. */
7866 if (h->vtable_parent == NULL)
7867 return true;
7868
7869 /* Those vtables that do not have parents, we cannot merge. */
7870 if (h->vtable_parent == (struct elf_link_hash_entry *) -1)
7871 return true;
7872
7873 /* If we've already been done, exit. */
7874 if (h->vtable_entries_used && h->vtable_entries_used[-1])
7875 return true;
7876
7877 /* Make sure the parent's table is up to date. */
7878 elf_gc_propagate_vtable_entries_used (h->vtable_parent, okp);
7879
7880 if (h->vtable_entries_used == NULL)
7881 {
7882 /* None of this table's entries were referenced. Re-use the
7883 parent's table. */
7884 h->vtable_entries_used = h->vtable_parent->vtable_entries_used;
7885 h->vtable_entries_size = h->vtable_parent->vtable_entries_size;
7886 }
7887 else
7888 {
7889 size_t n;
7890 boolean *cu, *pu;
7891
7892 /* Or the parent's entries into ours. */
7893 cu = h->vtable_entries_used;
7894 cu[-1] = true;
7895 pu = h->vtable_parent->vtable_entries_used;
7896 if (pu != NULL)
7897 {
7898 asection *sec = h->root.u.def.section;
7899 struct elf_backend_data *bed = get_elf_backend_data (sec->owner);
7900 int file_align = bed->s->file_align;
7901
7902 n = h->vtable_parent->vtable_entries_size / file_align;
7903 while (n--)
7904 {
7905 if (*pu)
7906 *cu = true;
7907 pu++;
7908 cu++;
7909 }
7910 }
7911 }
7912
7913 return true;
7914 }
7915
7916 static boolean
7917 elf_gc_smash_unused_vtentry_relocs (h, okp)
7918 struct elf_link_hash_entry *h;
7919 PTR okp;
7920 {
7921 asection *sec;
7922 bfd_vma hstart, hend;
7923 Elf_Internal_Rela *relstart, *relend, *rel;
7924 struct elf_backend_data *bed;
7925 int file_align;
7926
7927 if (h->root.type == bfd_link_hash_warning)
7928 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7929
7930 /* Take care of both those symbols that do not describe vtables as
7931 well as those that are not loaded. */
7932 if (h->vtable_parent == NULL)
7933 return true;
7934
7935 BFD_ASSERT (h->root.type == bfd_link_hash_defined
7936 || h->root.type == bfd_link_hash_defweak);
7937
7938 sec = h->root.u.def.section;
7939 hstart = h->root.u.def.value;
7940 hend = hstart + h->size;
7941
7942 relstart = (NAME(_bfd_elf,link_read_relocs)
7943 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL, true));
7944 if (!relstart)
7945 return *(boolean *) okp = false;
7946 bed = get_elf_backend_data (sec->owner);
7947 file_align = bed->s->file_align;
7948
7949 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
7950
7951 for (rel = relstart; rel < relend; ++rel)
7952 if (rel->r_offset >= hstart && rel->r_offset < hend)
7953 {
7954 /* If the entry is in use, do nothing. */
7955 if (h->vtable_entries_used
7956 && (rel->r_offset - hstart) < h->vtable_entries_size)
7957 {
7958 bfd_vma entry = (rel->r_offset - hstart) / file_align;
7959 if (h->vtable_entries_used[entry])
7960 continue;
7961 }
7962 /* Otherwise, kill it. */
7963 rel->r_offset = rel->r_info = rel->r_addend = 0;
7964 }
7965
7966 return true;
7967 }
7968
7969 /* Do mark and sweep of unused sections. */
7970
7971 boolean
7972 elf_gc_sections (abfd, info)
7973 bfd *abfd;
7974 struct bfd_link_info *info;
7975 {
7976 boolean ok = true;
7977 bfd *sub;
7978 asection * (*gc_mark_hook)
7979 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
7980 struct elf_link_hash_entry *h, Elf_Internal_Sym *));
7981
7982 if (!get_elf_backend_data (abfd)->can_gc_sections
7983 || info->relocateable || info->emitrelocations
7984 || elf_hash_table (info)->dynamic_sections_created)
7985 return true;
7986
7987 /* Apply transitive closure to the vtable entry usage info. */
7988 elf_link_hash_traverse (elf_hash_table (info),
7989 elf_gc_propagate_vtable_entries_used,
7990 (PTR) &ok);
7991 if (!ok)
7992 return false;
7993
7994 /* Kill the vtable relocations that were not used. */
7995 elf_link_hash_traverse (elf_hash_table (info),
7996 elf_gc_smash_unused_vtentry_relocs,
7997 (PTR) &ok);
7998 if (!ok)
7999 return false;
8000
8001 /* Grovel through relocs to find out who stays ... */
8002
8003 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
8004 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
8005 {
8006 asection *o;
8007
8008 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
8009 continue;
8010
8011 for (o = sub->sections; o != NULL; o = o->next)
8012 {
8013 if (o->flags & SEC_KEEP)
8014 if (!elf_gc_mark (info, o, gc_mark_hook))
8015 return false;
8016 }
8017 }
8018
8019 /* ... and mark SEC_EXCLUDE for those that go. */
8020 if (!elf_gc_sweep (info, get_elf_backend_data (abfd)->gc_sweep_hook))
8021 return false;
8022
8023 return true;
8024 }
8025 \f
8026 /* Called from check_relocs to record the existance of a VTINHERIT reloc. */
8027
8028 boolean
8029 elf_gc_record_vtinherit (abfd, sec, h, offset)
8030 bfd *abfd;
8031 asection *sec;
8032 struct elf_link_hash_entry *h;
8033 bfd_vma offset;
8034 {
8035 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
8036 struct elf_link_hash_entry **search, *child;
8037 bfd_size_type extsymcount;
8038
8039 /* The sh_info field of the symtab header tells us where the
8040 external symbols start. We don't care about the local symbols at
8041 this point. */
8042 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size/sizeof (Elf_External_Sym);
8043 if (!elf_bad_symtab (abfd))
8044 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
8045
8046 sym_hashes = elf_sym_hashes (abfd);
8047 sym_hashes_end = sym_hashes + extsymcount;
8048
8049 /* Hunt down the child symbol, which is in this section at the same
8050 offset as the relocation. */
8051 for (search = sym_hashes; search != sym_hashes_end; ++search)
8052 {
8053 if ((child = *search) != NULL
8054 && (child->root.type == bfd_link_hash_defined
8055 || child->root.type == bfd_link_hash_defweak)
8056 && child->root.u.def.section == sec
8057 && child->root.u.def.value == offset)
8058 goto win;
8059 }
8060
8061 (*_bfd_error_handler) ("%s: %s+%lu: No symbol found for INHERIT",
8062 bfd_archive_filename (abfd), sec->name,
8063 (unsigned long) offset);
8064 bfd_set_error (bfd_error_invalid_operation);
8065 return false;
8066
8067 win:
8068 if (!h)
8069 {
8070 /* This *should* only be the absolute section. It could potentially
8071 be that someone has defined a non-global vtable though, which
8072 would be bad. It isn't worth paging in the local symbols to be
8073 sure though; that case should simply be handled by the assembler. */
8074
8075 child->vtable_parent = (struct elf_link_hash_entry *) -1;
8076 }
8077 else
8078 child->vtable_parent = h;
8079
8080 return true;
8081 }
8082
8083 /* Called from check_relocs to record the existance of a VTENTRY reloc. */
8084
8085 boolean
8086 elf_gc_record_vtentry (abfd, sec, h, addend)
8087 bfd *abfd ATTRIBUTE_UNUSED;
8088 asection *sec ATTRIBUTE_UNUSED;
8089 struct elf_link_hash_entry *h;
8090 bfd_vma addend;
8091 {
8092 struct elf_backend_data *bed = get_elf_backend_data (abfd);
8093 int file_align = bed->s->file_align;
8094
8095 if (addend >= h->vtable_entries_size)
8096 {
8097 size_t size, bytes;
8098 boolean *ptr = h->vtable_entries_used;
8099
8100 /* While the symbol is undefined, we have to be prepared to handle
8101 a zero size. */
8102 if (h->root.type == bfd_link_hash_undefined)
8103 size = addend;
8104 else
8105 {
8106 size = h->size;
8107 if (size < addend)
8108 {
8109 /* Oops! We've got a reference past the defined end of
8110 the table. This is probably a bug -- shall we warn? */
8111 size = addend;
8112 }
8113 }
8114
8115 /* Allocate one extra entry for use as a "done" flag for the
8116 consolidation pass. */
8117 bytes = (size / file_align + 1) * sizeof (boolean);
8118
8119 if (ptr)
8120 {
8121 ptr = bfd_realloc (ptr - 1, (bfd_size_type) bytes);
8122
8123 if (ptr != NULL)
8124 {
8125 size_t oldbytes;
8126
8127 oldbytes = ((h->vtable_entries_size / file_align + 1)
8128 * sizeof (boolean));
8129 memset (((char *) ptr) + oldbytes, 0, bytes - oldbytes);
8130 }
8131 }
8132 else
8133 ptr = bfd_zmalloc ((bfd_size_type) bytes);
8134
8135 if (ptr == NULL)
8136 return false;
8137
8138 /* And arrange for that done flag to be at index -1. */
8139 h->vtable_entries_used = ptr + 1;
8140 h->vtable_entries_size = size;
8141 }
8142
8143 h->vtable_entries_used[addend / file_align] = true;
8144
8145 return true;
8146 }
8147
8148 /* And an accompanying bit to work out final got entry offsets once
8149 we're done. Should be called from final_link. */
8150
8151 boolean
8152 elf_gc_common_finalize_got_offsets (abfd, info)
8153 bfd *abfd;
8154 struct bfd_link_info *info;
8155 {
8156 bfd *i;
8157 struct elf_backend_data *bed = get_elf_backend_data (abfd);
8158 bfd_vma gotoff;
8159
8160 /* The GOT offset is relative to the .got section, but the GOT header is
8161 put into the .got.plt section, if the backend uses it. */
8162 if (bed->want_got_plt)
8163 gotoff = 0;
8164 else
8165 gotoff = bed->got_header_size;
8166
8167 /* Do the local .got entries first. */
8168 for (i = info->input_bfds; i; i = i->link_next)
8169 {
8170 bfd_signed_vma *local_got;
8171 bfd_size_type j, locsymcount;
8172 Elf_Internal_Shdr *symtab_hdr;
8173
8174 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
8175 continue;
8176
8177 local_got = elf_local_got_refcounts (i);
8178 if (!local_got)
8179 continue;
8180
8181 symtab_hdr = &elf_tdata (i)->symtab_hdr;
8182 if (elf_bad_symtab (i))
8183 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
8184 else
8185 locsymcount = symtab_hdr->sh_info;
8186
8187 for (j = 0; j < locsymcount; ++j)
8188 {
8189 if (local_got[j] > 0)
8190 {
8191 local_got[j] = gotoff;
8192 gotoff += ARCH_SIZE / 8;
8193 }
8194 else
8195 local_got[j] = (bfd_vma) -1;
8196 }
8197 }
8198
8199 /* Then the global .got entries. .plt refcounts are handled by
8200 adjust_dynamic_symbol */
8201 elf_link_hash_traverse (elf_hash_table (info),
8202 elf_gc_allocate_got_offsets,
8203 (PTR) &gotoff);
8204 return true;
8205 }
8206
8207 /* We need a special top-level link routine to convert got reference counts
8208 to real got offsets. */
8209
8210 static boolean
8211 elf_gc_allocate_got_offsets (h, offarg)
8212 struct elf_link_hash_entry *h;
8213 PTR offarg;
8214 {
8215 bfd_vma *off = (bfd_vma *) offarg;
8216
8217 if (h->root.type == bfd_link_hash_warning)
8218 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8219
8220 if (h->got.refcount > 0)
8221 {
8222 h->got.offset = off[0];
8223 off[0] += ARCH_SIZE / 8;
8224 }
8225 else
8226 h->got.offset = (bfd_vma) -1;
8227
8228 return true;
8229 }
8230
8231 /* Many folk need no more in the way of final link than this, once
8232 got entry reference counting is enabled. */
8233
8234 boolean
8235 elf_gc_common_final_link (abfd, info)
8236 bfd *abfd;
8237 struct bfd_link_info *info;
8238 {
8239 if (!elf_gc_common_finalize_got_offsets (abfd, info))
8240 return false;
8241
8242 /* Invoke the regular ELF backend linker to do all the work. */
8243 return elf_bfd_final_link (abfd, info);
8244 }
8245
8246 /* This function will be called though elf_link_hash_traverse to store
8247 all hash value of the exported symbols in an array. */
8248
8249 static boolean
8250 elf_collect_hash_codes (h, data)
8251 struct elf_link_hash_entry *h;
8252 PTR data;
8253 {
8254 unsigned long **valuep = (unsigned long **) data;
8255 const char *name;
8256 char *p;
8257 unsigned long ha;
8258 char *alc = NULL;
8259
8260 if (h->root.type == bfd_link_hash_warning)
8261 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8262
8263 /* Ignore indirect symbols. These are added by the versioning code. */
8264 if (h->dynindx == -1)
8265 return true;
8266
8267 name = h->root.root.string;
8268 p = strchr (name, ELF_VER_CHR);
8269 if (p != NULL)
8270 {
8271 alc = bfd_malloc ((bfd_size_type) (p - name + 1));
8272 memcpy (alc, name, (size_t) (p - name));
8273 alc[p - name] = '\0';
8274 name = alc;
8275 }
8276
8277 /* Compute the hash value. */
8278 ha = bfd_elf_hash (name);
8279
8280 /* Store the found hash value in the array given as the argument. */
8281 *(*valuep)++ = ha;
8282
8283 /* And store it in the struct so that we can put it in the hash table
8284 later. */
8285 h->elf_hash_value = ha;
8286
8287 if (alc != NULL)
8288 free (alc);
8289
8290 return true;
8291 }
8292
8293 boolean
8294 elf_reloc_symbol_deleted_p (offset, cookie)
8295 bfd_vma offset;
8296 PTR cookie;
8297 {
8298 struct elf_reloc_cookie *rcookie = (struct elf_reloc_cookie *) cookie;
8299
8300 if (rcookie->bad_symtab)
8301 rcookie->rel = rcookie->rels;
8302
8303 for (; rcookie->rel < rcookie->relend; rcookie->rel++)
8304 {
8305 unsigned long r_symndx = ELF_R_SYM (rcookie->rel->r_info);
8306
8307 if (! rcookie->bad_symtab)
8308 if (rcookie->rel->r_offset > offset)
8309 return false;
8310 if (rcookie->rel->r_offset != offset)
8311 continue;
8312
8313 if (r_symndx >= rcookie->locsymcount
8314 || ELF_ST_BIND (rcookie->locsyms[r_symndx].st_info) != STB_LOCAL)
8315 {
8316 struct elf_link_hash_entry *h;
8317
8318 h = rcookie->sym_hashes[r_symndx - rcookie->extsymoff];
8319
8320 while (h->root.type == bfd_link_hash_indirect
8321 || h->root.type == bfd_link_hash_warning)
8322 h = (struct elf_link_hash_entry *) h->root.u.i.link;
8323
8324 if ((h->root.type == bfd_link_hash_defined
8325 || h->root.type == bfd_link_hash_defweak)
8326 && elf_discarded_section (h->root.u.def.section))
8327 return true;
8328 else
8329 return false;
8330 }
8331 else
8332 {
8333 /* It's not a relocation against a global symbol,
8334 but it could be a relocation against a local
8335 symbol for a discarded section. */
8336 asection *isec;
8337 Elf_Internal_Sym *isym;
8338
8339 /* Need to: get the symbol; get the section. */
8340 isym = &rcookie->locsyms[r_symndx];
8341 if (isym->st_shndx < SHN_LORESERVE || isym->st_shndx > SHN_HIRESERVE)
8342 {
8343 isec = section_from_elf_index (rcookie->abfd, isym->st_shndx);
8344 if (isec != NULL && elf_discarded_section (isec))
8345 return true;
8346 }
8347 }
8348 return false;
8349 }
8350 return false;
8351 }
8352
8353 /* Discard unneeded references to discarded sections.
8354 Returns true if any section's size was changed. */
8355 /* This function assumes that the relocations are in sorted order,
8356 which is true for all known assemblers. */
8357
8358 boolean
8359 elf_bfd_discard_info (output_bfd, info)
8360 bfd *output_bfd;
8361 struct bfd_link_info *info;
8362 {
8363 struct elf_reloc_cookie cookie;
8364 asection *stab, *eh, *ehdr;
8365 Elf_Internal_Shdr *symtab_hdr;
8366 struct elf_backend_data *bed;
8367 bfd *abfd;
8368 boolean ret = false;
8369 boolean strip = info->strip == strip_all || info->strip == strip_debugger;
8370
8371 if (info->relocateable
8372 || info->traditional_format
8373 || info->hash->creator->flavour != bfd_target_elf_flavour
8374 || ! is_elf_hash_table (info))
8375 return false;
8376
8377 ehdr = NULL;
8378 if (elf_hash_table (info)->dynobj != NULL)
8379 ehdr = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
8380 ".eh_frame_hdr");
8381
8382 for (abfd = info->input_bfds; abfd != NULL; abfd = abfd->link_next)
8383 {
8384 if (bfd_get_flavour (abfd) != bfd_target_elf_flavour)
8385 continue;
8386
8387 bed = get_elf_backend_data (abfd);
8388
8389 if ((abfd->flags & DYNAMIC) != 0)
8390 continue;
8391
8392 eh = NULL;
8393 if (ehdr)
8394 {
8395 eh = bfd_get_section_by_name (abfd, ".eh_frame");
8396 if (eh && (eh->_raw_size == 0
8397 || bfd_is_abs_section (eh->output_section)))
8398 eh = NULL;
8399 }
8400
8401 stab = NULL;
8402 if (!strip)
8403 {
8404 stab = bfd_get_section_by_name (abfd, ".stab");
8405 if (stab && (stab->_raw_size == 0
8406 || bfd_is_abs_section (stab->output_section)))
8407 stab = NULL;
8408 }
8409 if ((! stab
8410 || elf_section_data(stab)->sec_info_type != ELF_INFO_TYPE_STABS)
8411 && ! eh
8412 && (strip || ! bed->elf_backend_discard_info))
8413 continue;
8414
8415 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
8416 cookie.abfd = abfd;
8417 cookie.sym_hashes = elf_sym_hashes (abfd);
8418 cookie.bad_symtab = elf_bad_symtab (abfd);
8419 if (cookie.bad_symtab)
8420 {
8421 cookie.locsymcount =
8422 symtab_hdr->sh_size / sizeof (Elf_External_Sym);
8423 cookie.extsymoff = 0;
8424 }
8425 else
8426 {
8427 cookie.locsymcount = symtab_hdr->sh_info;
8428 cookie.extsymoff = symtab_hdr->sh_info;
8429 }
8430
8431 cookie.locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
8432 if (cookie.locsyms == NULL && cookie.locsymcount != 0)
8433 {
8434 cookie.locsyms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
8435 cookie.locsymcount, 0,
8436 NULL, NULL, NULL);
8437 if (cookie.locsyms == NULL)
8438 return false;
8439 }
8440
8441 if (stab)
8442 {
8443 cookie.rels = (NAME(_bfd_elf,link_read_relocs)
8444 (abfd, stab, (PTR) NULL, (Elf_Internal_Rela *) NULL,
8445 info->keep_memory));
8446 if (cookie.rels)
8447 {
8448 cookie.rel = cookie.rels;
8449 cookie.relend =
8450 cookie.rels + stab->reloc_count * bed->s->int_rels_per_ext_rel;
8451 if (_bfd_discard_section_stabs (abfd, stab,
8452 elf_section_data (stab)->sec_info,
8453 elf_reloc_symbol_deleted_p,
8454 &cookie))
8455 ret = true;
8456 if (elf_section_data (stab)->relocs != cookie.rels)
8457 free (cookie.rels);
8458 }
8459 }
8460
8461 if (eh)
8462 {
8463 cookie.rels = NULL;
8464 cookie.rel = NULL;
8465 cookie.relend = NULL;
8466 if (eh->reloc_count)
8467 cookie.rels = (NAME(_bfd_elf,link_read_relocs)
8468 (abfd, eh, (PTR) NULL, (Elf_Internal_Rela *) NULL,
8469 info->keep_memory));
8470 if (cookie.rels)
8471 {
8472 cookie.rel = cookie.rels;
8473 cookie.relend =
8474 cookie.rels + eh->reloc_count * bed->s->int_rels_per_ext_rel;
8475 }
8476 if (_bfd_elf_discard_section_eh_frame (abfd, info, eh, ehdr,
8477 elf_reloc_symbol_deleted_p,
8478 &cookie))
8479 ret = true;
8480 if (cookie.rels && elf_section_data (eh)->relocs != cookie.rels)
8481 free (cookie.rels);
8482 }
8483
8484 if (bed->elf_backend_discard_info)
8485 {
8486 if (bed->elf_backend_discard_info (abfd, &cookie, info))
8487 ret = true;
8488 }
8489
8490 if (cookie.locsyms != NULL
8491 && symtab_hdr->contents != (unsigned char *) cookie.locsyms)
8492 {
8493 if (! info->keep_memory)
8494 free (cookie.locsyms);
8495 else
8496 symtab_hdr->contents = (unsigned char *) cookie.locsyms;
8497 }
8498 }
8499
8500 if (ehdr && _bfd_elf_discard_section_eh_frame_hdr (output_bfd, info, ehdr))
8501 ret = true;
8502 return ret;
8503 }
8504
8505 static boolean
8506 elf_section_ignore_discarded_relocs (sec)
8507 asection *sec;
8508 {
8509 struct elf_backend_data *bed;
8510
8511 switch (elf_section_data (sec)->sec_info_type)
8512 {
8513 case ELF_INFO_TYPE_STABS:
8514 case ELF_INFO_TYPE_EH_FRAME:
8515 return true;
8516 default:
8517 break;
8518 }
8519
8520 bed = get_elf_backend_data (sec->owner);
8521 if (bed->elf_backend_ignore_discarded_relocs != NULL
8522 && (*bed->elf_backend_ignore_discarded_relocs) (sec))
8523 return true;
8524
8525 return false;
8526 }
This page took 0.390282 seconds and 4 git commands to generate.