* ld-srec/sr3.cc (__eh_pc): Define.
[deliverable/binutils-gdb.git] / bfd / elflink.h
CommitLineData
8afe83be 1/* ELF linker support.
56f3b62c 2 Copyright 1995, 1996, 1997 Free Software Foundation, Inc.
8afe83be
KR
3
4This file is part of BFD, the Binary File Descriptor library.
5
6This program is free software; you can redistribute it and/or modify
7it under the terms of the GNU General Public License as published by
8the Free Software Foundation; either version 2 of the License, or
9(at your option) any later version.
10
11This program is distributed in the hope that it will be useful,
12but WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14GNU General Public License for more details.
15
16You should have received a copy of the GNU General Public License
17along with this program; if not, write to the Free Software
943fbd5b 18Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
452a5efb 19
ede4eed4
KR
20/* ELF linker code. */
21
c19fbe0f
ILT
22/* This struct is used to pass information to routines called via
23 elf_link_hash_traverse which must return failure. */
24
25struct elf_info_failed
26{
27 boolean failed;
28 struct bfd_link_info *info;
29};
30
ede4eed4
KR
31static boolean elf_link_add_object_symbols
32 PARAMS ((bfd *, struct bfd_link_info *));
33static boolean elf_link_add_archive_symbols
34 PARAMS ((bfd *, struct bfd_link_info *));
044d7d49
ILT
35static boolean elf_merge_symbol
36 PARAMS ((bfd *, struct bfd_link_info *, const char *, Elf_Internal_Sym *,
37 asection **, bfd_vma *, struct elf_link_hash_entry **,
38 boolean *, boolean *, boolean *));
ede4eed4
KR
39static boolean elf_export_symbol
40 PARAMS ((struct elf_link_hash_entry *, PTR));
c19fbe0f
ILT
41static boolean elf_fix_symbol_flags
42 PARAMS ((struct elf_link_hash_entry *, struct elf_info_failed *));
ede4eed4
KR
43static boolean elf_adjust_dynamic_symbol
44 PARAMS ((struct elf_link_hash_entry *, PTR));
d044b40a
ILT
45static boolean elf_link_find_version_dependencies
46 PARAMS ((struct elf_link_hash_entry *, PTR));
47static boolean elf_link_find_version_dependencies
48 PARAMS ((struct elf_link_hash_entry *, PTR));
49static boolean elf_link_assign_sym_version
50 PARAMS ((struct elf_link_hash_entry *, PTR));
51static boolean elf_link_renumber_dynsyms
52 PARAMS ((struct elf_link_hash_entry *, PTR));
ede4eed4 53
ede4eed4
KR
54/* Given an ELF BFD, add symbols to the global hash table as
55 appropriate. */
56
57boolean
58elf_bfd_link_add_symbols (abfd, info)
59 bfd *abfd;
60 struct bfd_link_info *info;
61{
ede4eed4
KR
62 switch (bfd_get_format (abfd))
63 {
64 case bfd_object:
65 return elf_link_add_object_symbols (abfd, info);
66 case bfd_archive:
ede4eed4
KR
67 return elf_link_add_archive_symbols (abfd, info);
68 default:
69 bfd_set_error (bfd_error_wrong_format);
70 return false;
71 }
72}
3b3753b8 73\f
ede4eed4
KR
74
75/* Add symbols from an ELF archive file to the linker hash table. We
76 don't use _bfd_generic_link_add_archive_symbols because of a
77 problem which arises on UnixWare. The UnixWare libc.so is an
78 archive which includes an entry libc.so.1 which defines a bunch of
79 symbols. The libc.so archive also includes a number of other
80 object files, which also define symbols, some of which are the same
81 as those defined in libc.so.1. Correct linking requires that we
82 consider each object file in turn, and include it if it defines any
83 symbols we need. _bfd_generic_link_add_archive_symbols does not do
84 this; it looks through the list of undefined symbols, and includes
85 any object file which defines them. When this algorithm is used on
86 UnixWare, it winds up pulling in libc.so.1 early and defining a
87 bunch of symbols. This means that some of the other objects in the
88 archive are not included in the link, which is incorrect since they
89 precede libc.so.1 in the archive.
90
91 Fortunately, ELF archive handling is simpler than that done by
92 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
93 oddities. In ELF, if we find a symbol in the archive map, and the
94 symbol is currently undefined, we know that we must pull in that
95 object file.
96
97 Unfortunately, we do have to make multiple passes over the symbol
98 table until nothing further is resolved. */
99
100static boolean
101elf_link_add_archive_symbols (abfd, info)
102 bfd *abfd;
103 struct bfd_link_info *info;
104{
105 symindex c;
106 boolean *defined = NULL;
107 boolean *included = NULL;
108 carsym *symdefs;
109 boolean loop;
110
111 if (! bfd_has_map (abfd))
112 {
113 /* An empty archive is a special case. */
114 if (bfd_openr_next_archived_file (abfd, (bfd *) NULL) == NULL)
115 return true;
116 bfd_set_error (bfd_error_no_armap);
117 return false;
118 }
119
120 /* Keep track of all symbols we know to be already defined, and all
121 files we know to be already included. This is to speed up the
122 second and subsequent passes. */
123 c = bfd_ardata (abfd)->symdef_count;
124 if (c == 0)
125 return true;
58142f10
ILT
126 defined = (boolean *) bfd_malloc (c * sizeof (boolean));
127 included = (boolean *) bfd_malloc (c * sizeof (boolean));
ede4eed4 128 if (defined == (boolean *) NULL || included == (boolean *) NULL)
58142f10 129 goto error_return;
ede4eed4
KR
130 memset (defined, 0, c * sizeof (boolean));
131 memset (included, 0, c * sizeof (boolean));
132
133 symdefs = bfd_ardata (abfd)->symdefs;
134
135 do
136 {
137 file_ptr last;
138 symindex i;
139 carsym *symdef;
140 carsym *symdefend;
141
142 loop = false;
143 last = -1;
144
145 symdef = symdefs;
146 symdefend = symdef + c;
147 for (i = 0; symdef < symdefend; symdef++, i++)
148 {
149 struct elf_link_hash_entry *h;
150 bfd *element;
151 struct bfd_link_hash_entry *undefs_tail;
152 symindex mark;
153
154 if (defined[i] || included[i])
155 continue;
156 if (symdef->file_offset == last)
157 {
158 included[i] = true;
159 continue;
160 }
161
162 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
163 false, false, false);
d044b40a
ILT
164
165 if (h == NULL)
166 {
167 char *p, *copy;
168
169 /* If this is a default version (the name contains @@),
170 look up the symbol again without the version. The
171 effect is that references to the symbol without the
172 version will be matched by the default symbol in the
173 archive. */
174
175 p = strchr (symdef->name, ELF_VER_CHR);
176 if (p == NULL || p[1] != ELF_VER_CHR)
177 continue;
178
179 copy = bfd_alloc (abfd, p - symdef->name + 1);
180 if (copy == NULL)
181 goto error_return;
182 memcpy (copy, symdef->name, p - symdef->name);
183 copy[p - symdef->name] = '\0';
184
185 h = elf_link_hash_lookup (elf_hash_table (info), copy,
186 false, false, false);
187
188 bfd_release (abfd, copy);
189 }
190
191 if (h == NULL)
ede4eed4 192 continue;
d044b40a 193
ede4eed4
KR
194 if (h->root.type != bfd_link_hash_undefined)
195 {
68807a39
ILT
196 if (h->root.type != bfd_link_hash_undefweak)
197 defined[i] = true;
ede4eed4
KR
198 continue;
199 }
200
201 /* We need to include this archive member. */
202
203 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
204 if (element == (bfd *) NULL)
205 goto error_return;
206
207 if (! bfd_check_format (element, bfd_object))
208 goto error_return;
209
210 /* Doublecheck that we have not included this object
211 already--it should be impossible, but there may be
212 something wrong with the archive. */
213 if (element->archive_pass != 0)
214 {
215 bfd_set_error (bfd_error_bad_value);
216 goto error_return;
217 }
218 element->archive_pass = 1;
219
220 undefs_tail = info->hash->undefs_tail;
221
222 if (! (*info->callbacks->add_archive_element) (info, element,
223 symdef->name))
224 goto error_return;
225 if (! elf_link_add_object_symbols (element, info))
226 goto error_return;
227
228 /* If there are any new undefined symbols, we need to make
229 another pass through the archive in order to see whether
230 they can be defined. FIXME: This isn't perfect, because
231 common symbols wind up on undefs_tail and because an
232 undefined symbol which is defined later on in this pass
233 does not require another pass. This isn't a bug, but it
234 does make the code less efficient than it could be. */
235 if (undefs_tail != info->hash->undefs_tail)
236 loop = true;
237
238 /* Look backward to mark all symbols from this object file
239 which we have already seen in this pass. */
240 mark = i;
241 do
242 {
243 included[mark] = true;
244 if (mark == 0)
245 break;
246 --mark;
247 }
248 while (symdefs[mark].file_offset == symdef->file_offset);
249
250 /* We mark subsequent symbols from this object file as we go
251 on through the loop. */
252 last = symdef->file_offset;
253 }
254 }
255 while (loop);
256
257 free (defined);
258 free (included);
259
260 return true;
261
262 error_return:
263 if (defined != (boolean *) NULL)
264 free (defined);
265 if (included != (boolean *) NULL)
266 free (included);
267 return false;
268}
269
044d7d49
ILT
270/* This function is called when we want to define a new symbol. It
271 handles the various cases which arise when we find a definition in
272 a dynamic object, or when there is already a definition in a
273 dynamic object. The new symbol is described by NAME, SYM, PSEC,
274 and PVALUE. We set SYM_HASH to the hash table entry. We set
275 OVERRIDE if the old symbol is overriding a new definition. We set
276 TYPE_CHANGE_OK if it is OK for the type to change. We set
277 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
278 change, we mean that we shouldn't warn if the type or size does
279 change. */
280
281static boolean
282elf_merge_symbol (abfd, info, name, sym, psec, pvalue, sym_hash,
283 override, type_change_ok, size_change_ok)
284 bfd *abfd;
285 struct bfd_link_info *info;
286 const char *name;
287 Elf_Internal_Sym *sym;
288 asection **psec;
289 bfd_vma *pvalue;
290 struct elf_link_hash_entry **sym_hash;
291 boolean *override;
292 boolean *type_change_ok;
293 boolean *size_change_ok;
294{
295 asection *sec;
296 struct elf_link_hash_entry *h;
297 int bind;
298 bfd *oldbfd;
299 boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
300
044d7d49
ILT
301 *override = false;
302 *type_change_ok = false;
303 *size_change_ok = false;
304
305 sec = *psec;
306 bind = ELF_ST_BIND (sym->st_info);
307
308 if (! bfd_is_und_section (sec))
309 h = elf_link_hash_lookup (elf_hash_table (info), name, true, false, false);
310 else
311 h = ((struct elf_link_hash_entry *)
312 bfd_wrapped_link_hash_lookup (abfd, info, name, true, false, false));
313 if (h == NULL)
314 return false;
315 *sym_hash = h;
316
3359a0bc
ILT
317 /* This code is for coping with dynamic objects, and is only useful
318 if we are doing an ELF link. */
319 if (info->hash->creator != abfd->xvec)
320 return true;
321
e9982ee5
ILT
322 /* For merging, we only care about real symbols. */
323
324 while (h->root.type == bfd_link_hash_indirect
325 || h->root.type == bfd_link_hash_warning)
326 h = (struct elf_link_hash_entry *) h->root.u.i.link;
327
044d7d49
ILT
328 /* If we just created the symbol, mark it as being an ELF symbol.
329 Other than that, there is nothing to do--there is no merge issue
330 with a newly defined symbol--so we just return. */
331
332 if (h->root.type == bfd_link_hash_new)
333 {
334 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
335 return true;
336 }
337
044d7d49
ILT
338 /* OLDBFD is a BFD associated with the existing symbol. */
339
340 switch (h->root.type)
341 {
342 default:
343 oldbfd = NULL;
344 break;
345
346 case bfd_link_hash_undefined:
347 case bfd_link_hash_undefweak:
348 oldbfd = h->root.u.undef.abfd;
349 break;
350
351 case bfd_link_hash_defined:
352 case bfd_link_hash_defweak:
353 oldbfd = h->root.u.def.section->owner;
354 break;
355
356 case bfd_link_hash_common:
357 oldbfd = h->root.u.c.p->section->owner;
358 break;
359 }
360
361 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
362 respectively, is from a dynamic object. */
363
364 if ((abfd->flags & DYNAMIC) != 0)
365 newdyn = true;
366 else
367 newdyn = false;
368
369 if (oldbfd == NULL || (oldbfd->flags & DYNAMIC) == 0)
370 olddyn = false;
371 else
372 olddyn = true;
373
374 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
375 respectively, appear to be a definition rather than reference. */
376
377 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
378 newdef = false;
379 else
380 newdef = true;
381
382 if (h->root.type == bfd_link_hash_undefined
383 || h->root.type == bfd_link_hash_undefweak
384 || h->root.type == bfd_link_hash_common)
385 olddef = false;
386 else
387 olddef = true;
388
389 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
390 symbol, respectively, appears to be a common symbol in a dynamic
391 object. If a symbol appears in an uninitialized section, and is
392 not weak, and is not a function, then it may be a common symbol
393 which was resolved when the dynamic object was created. We want
394 to treat such symbols specially, because they raise special
395 considerations when setting the symbol size: if the symbol
396 appears as a common symbol in a regular object, and the size in
397 the regular object is larger, we must make sure that we use the
398 larger size. This problematic case can always be avoided in C,
399 but it must be handled correctly when using Fortran shared
400 libraries.
401
402 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
403 likewise for OLDDYNCOMMON and OLDDEF.
404
405 Note that this test is just a heuristic, and that it is quite
406 possible to have an uninitialized symbol in a shared object which
407 is really a definition, rather than a common symbol. This could
408 lead to some minor confusion when the symbol really is a common
409 symbol in some regular object. However, I think it will be
410 harmless. */
411
412 if (newdyn
413 && newdef
414 && (sec->flags & SEC_ALLOC) != 0
415 && (sec->flags & SEC_LOAD) == 0
416 && sym->st_size > 0
417 && bind != STB_WEAK
418 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
419 newdyncommon = true;
420 else
421 newdyncommon = false;
422
423 if (olddyn
424 && olddef
425 && h->root.type == bfd_link_hash_defined
426 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
427 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
428 && (h->root.u.def.section->flags & SEC_LOAD) == 0
429 && h->size > 0
430 && h->type != STT_FUNC)
431 olddyncommon = true;
432 else
433 olddyncommon = false;
434
435 /* It's OK to change the type if either the existing symbol or the
436 new symbol is weak. */
437
438 if (h->root.type == bfd_link_hash_defweak
439 || h->root.type == bfd_link_hash_undefweak
440 || bind == STB_WEAK)
441 *type_change_ok = true;
442
443 /* It's OK to change the size if either the existing symbol or the
444 new symbol is weak, or if the old symbol is undefined. */
445
446 if (*type_change_ok
447 || h->root.type == bfd_link_hash_undefined)
448 *size_change_ok = true;
449
450 /* If both the old and the new symbols look like common symbols in a
451 dynamic object, set the size of the symbol to the larger of the
452 two. */
453
454 if (olddyncommon
455 && newdyncommon
456 && sym->st_size != h->size)
457 {
458 /* Since we think we have two common symbols, issue a multiple
459 common warning if desired. Note that we only warn if the
460 size is different. If the size is the same, we simply let
461 the old symbol override the new one as normally happens with
462 symbols defined in dynamic objects. */
463
464 if (! ((*info->callbacks->multiple_common)
465 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
466 h->size, abfd, bfd_link_hash_common, sym->st_size)))
467 return false;
468
469 if (sym->st_size > h->size)
470 h->size = sym->st_size;
471
472 *size_change_ok = true;
473 }
474
475 /* If we are looking at a dynamic object, and we have found a
476 definition, we need to see if the symbol was already defined by
477 some other object. If so, we want to use the existing
478 definition, and we do not want to report a multiple symbol
479 definition error; we do this by clobbering *PSEC to be
480 bfd_und_section_ptr.
481
482 We treat a common symbol as a definition if the symbol in the
483 shared library is a function, since common symbols always
484 represent variables; this can cause confusion in principle, but
485 any such confusion would seem to indicate an erroneous program or
486 shared library. We also permit a common symbol in a regular
487 object to override a weak symbol in a shared object. */
488
489 if (newdyn
490 && newdef
491 && (olddef
492 || (h->root.type == bfd_link_hash_common
493 && (bind == STB_WEAK
494 || ELF_ST_TYPE (sym->st_info) == STT_FUNC))))
495 {
496 *override = true;
497 newdef = false;
498 newdyncommon = false;
499
500 *psec = sec = bfd_und_section_ptr;
501 *size_change_ok = true;
502
503 /* If we get here when the old symbol is a common symbol, then
504 we are explicitly letting it override a weak symbol or
505 function in a dynamic object, and we don't want to warn about
506 a type change. If the old symbol is a defined symbol, a type
507 change warning may still be appropriate. */
508
509 if (h->root.type == bfd_link_hash_common)
510 *type_change_ok = true;
511 }
512
513 /* Handle the special case of an old common symbol merging with a
514 new symbol which looks like a common symbol in a shared object.
515 We change *PSEC and *PVALUE to make the new symbol look like a
516 common symbol, and let _bfd_generic_link_add_one_symbol will do
517 the right thing. */
518
519 if (newdyncommon
520 && h->root.type == bfd_link_hash_common)
521 {
522 *override = true;
523 newdef = false;
524 newdyncommon = false;
525 *pvalue = sym->st_size;
526 *psec = sec = bfd_com_section_ptr;
527 *size_change_ok = true;
528 }
529
530 /* If the old symbol is from a dynamic object, and the new symbol is
531 a definition which is not from a dynamic object, then the new
532 symbol overrides the old symbol. Symbols from regular files
533 always take precedence over symbols from dynamic objects, even if
534 they are defined after the dynamic object in the link.
535
536 As above, we again permit a common symbol in a regular object to
537 override a definition in a shared object if the shared object
538 symbol is a function or is weak. */
539
540 if (! newdyn
541 && (newdef
542 || (bfd_is_com_section (sec)
543 && (h->root.type == bfd_link_hash_defweak
544 || h->type == STT_FUNC)))
545 && olddyn
546 && olddef
547 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0)
548 {
549 /* Change the hash table entry to undefined, and let
550 _bfd_generic_link_add_one_symbol do the right thing with the
551 new definition. */
552
553 h->root.type = bfd_link_hash_undefined;
554 h->root.u.undef.abfd = h->root.u.def.section->owner;
555 *size_change_ok = true;
556
557 olddef = false;
558 olddyncommon = false;
559
560 /* We again permit a type change when a common symbol may be
561 overriding a function. */
562
563 if (bfd_is_com_section (sec))
564 *type_change_ok = true;
565
566 /* This union may have been set to be non-NULL when this symbol
567 was seen in a dynamic object. We must force the union to be
568 NULL, so that it is correct for a regular symbol. */
569
570 h->verinfo.vertree = NULL;
541a4b54
ILT
571
572 /* In this special case, if H is the target of an indirection,
573 we want the caller to frob with H rather than with the
574 indirect symbol. That will permit the caller to redefine the
575 target of the indirection, rather than the indirect symbol
862eaedc
ILT
576 itself. FIXME: This will break the -y option if we store a
577 symbol with a different name. */
541a4b54 578 *sym_hash = h;
044d7d49
ILT
579 }
580
581 /* Handle the special case of a new common symbol merging with an
582 old symbol that looks like it might be a common symbol defined in
583 a shared object. Note that we have already handled the case in
584 which a new common symbol should simply override the definition
585 in the shared library. */
586
587 if (! newdyn
588 && bfd_is_com_section (sec)
589 && olddyncommon)
590 {
591 /* It would be best if we could set the hash table entry to a
592 common symbol, but we don't know what to use for the section
593 or the alignment. */
594 if (! ((*info->callbacks->multiple_common)
595 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
596 h->size, abfd, bfd_link_hash_common, sym->st_size)))
597 return false;
598
599 /* If the predumed common symbol in the dynamic object is
600 larger, pretend that the new symbol has its size. */
601
602 if (h->size > *pvalue)
603 *pvalue = h->size;
604
605 /* FIXME: We no longer know the alignment required by the symbol
606 in the dynamic object, so we just wind up using the one from
607 the regular object. */
608
609 olddef = false;
610 olddyncommon = false;
611
612 h->root.type = bfd_link_hash_undefined;
613 h->root.u.undef.abfd = h->root.u.def.section->owner;
614
615 *size_change_ok = true;
616 *type_change_ok = true;
617
618 h->verinfo.vertree = NULL;
619 }
620
621 return true;
622}
623
ede4eed4
KR
624/* Add symbols from an ELF object file to the linker hash table. */
625
626static boolean
627elf_link_add_object_symbols (abfd, info)
628 bfd *abfd;
629 struct bfd_link_info *info;
630{
631 boolean (*add_symbol_hook) PARAMS ((bfd *, struct bfd_link_info *,
632 const Elf_Internal_Sym *,
633 const char **, flagword *,
634 asection **, bfd_vma *));
635 boolean (*check_relocs) PARAMS ((bfd *, struct bfd_link_info *,
636 asection *, const Elf_Internal_Rela *));
637 boolean collect;
638 Elf_Internal_Shdr *hdr;
639 size_t symcount;
640 size_t extsymcount;
641 size_t extsymoff;
642 Elf_External_Sym *buf = NULL;
643 struct elf_link_hash_entry **sym_hash;
644 boolean dynamic;
d044b40a
ILT
645 bfd_byte *dynver = NULL;
646 Elf_External_Versym *extversym = NULL;
647 Elf_External_Versym *ever;
ede4eed4
KR
648 Elf_External_Dyn *dynbuf = NULL;
649 struct elf_link_hash_entry *weaks;
650 Elf_External_Sym *esym;
651 Elf_External_Sym *esymend;
652
653 add_symbol_hook = get_elf_backend_data (abfd)->elf_add_symbol_hook;
654 collect = get_elf_backend_data (abfd)->collect;
655
d044b40a
ILT
656 if ((abfd->flags & DYNAMIC) == 0)
657 dynamic = false;
658 else
659 {
660 dynamic = true;
661
662 /* You can't use -r against a dynamic object. Also, there's no
663 hope of using a dynamic object which does not exactly match
664 the format of the output file. */
665 if (info->relocateable || info->hash->creator != abfd->xvec)
666 {
667 bfd_set_error (bfd_error_invalid_operation);
668 goto error_return;
669 }
670 }
671
0cb70568
ILT
672 /* As a GNU extension, any input sections which are named
673 .gnu.warning.SYMBOL are treated as warning symbols for the given
674 symbol. This differs from .gnu.warning sections, which generate
675 warnings when they are included in an output file. */
676 if (! info->shared)
677 {
678 asection *s;
679
680 for (s = abfd->sections; s != NULL; s = s->next)
681 {
682 const char *name;
683
684 name = bfd_get_section_name (abfd, s);
685 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
686 {
687 char *msg;
688 bfd_size_type sz;
689
54626f1a
ILT
690 name += sizeof ".gnu.warning." - 1;
691
692 /* If this is a shared object, then look up the symbol
693 in the hash table. If it is there, and it is already
694 been defined, then we will not be using the entry
695 from this shared object, so we don't need to warn.
696 FIXME: If we see the definition in a regular object
697 later on, we will warn, but we shouldn't. The only
698 fix is to keep track of what warnings we are supposed
699 to emit, and then handle them all at the end of the
700 link. */
d044b40a 701 if (dynamic && abfd->xvec == info->hash->creator)
54626f1a
ILT
702 {
703 struct elf_link_hash_entry *h;
704
705 h = elf_link_hash_lookup (elf_hash_table (info), name,
706 false, false, true);
707
708 /* FIXME: What about bfd_link_hash_common? */
709 if (h != NULL
710 && (h->root.type == bfd_link_hash_defined
711 || h->root.type == bfd_link_hash_defweak))
712 {
713 /* We don't want to issue this warning. Clobber
714 the section size so that the warning does not
715 get copied into the output file. */
716 s->_raw_size = 0;
717 continue;
718 }
719 }
720
0cb70568
ILT
721 sz = bfd_section_size (abfd, s);
722 msg = (char *) bfd_alloc (abfd, sz);
723 if (msg == NULL)
a9713b91 724 goto error_return;
0cb70568
ILT
725
726 if (! bfd_get_section_contents (abfd, s, msg, (file_ptr) 0, sz))
727 goto error_return;
728
729 if (! (_bfd_generic_link_add_one_symbol
54626f1a
ILT
730 (info, abfd, name, BSF_WARNING, s, (bfd_vma) 0, msg,
731 false, collect, (struct bfd_link_hash_entry **) NULL)))
0cb70568
ILT
732 goto error_return;
733
734 if (! info->relocateable)
735 {
736 /* Clobber the section size so that the warning does
737 not get copied into the output file. */
738 s->_raw_size = 0;
739 }
740 }
741 }
742 }
743
d044b40a
ILT
744 /* If this is a dynamic object, we always link against the .dynsym
745 symbol table, not the .symtab symbol table. The dynamic linker
746 will only see the .dynsym symbol table, so there is no reason to
747 look at .symtab for a dynamic object. */
748
749 if (! dynamic || elf_dynsymtab (abfd) == 0)
750 hdr = &elf_tdata (abfd)->symtab_hdr;
751 else
752 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
753
754 if (dynamic)
ede4eed4 755 {
d044b40a
ILT
756 /* Read in any version definitions. */
757
601acd61
UD
758 if (! _bfd_elf_slurp_version_tables (abfd))
759 goto error_return;
d044b40a
ILT
760
761 /* Read in the symbol versions, but don't bother to convert them
762 to internal format. */
763 if (elf_dynversym (abfd) != 0)
764 {
765 Elf_Internal_Shdr *versymhdr;
766
767 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
768 extversym = (Elf_External_Versym *) bfd_malloc (hdr->sh_size);
769 if (extversym == NULL)
770 goto error_return;
771 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
772 || (bfd_read ((PTR) extversym, 1, versymhdr->sh_size, abfd)
773 != versymhdr->sh_size))
774 goto error_return;
775 }
ede4eed4
KR
776 }
777
ede4eed4
KR
778 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
779
780 /* The sh_info field of the symtab header tells us where the
781 external symbols start. We don't care about the local symbols at
782 this point. */
783 if (elf_bad_symtab (abfd))
784 {
785 extsymcount = symcount;
786 extsymoff = 0;
787 }
788 else
789 {
790 extsymcount = symcount - hdr->sh_info;
791 extsymoff = hdr->sh_info;
792 }
793
58142f10
ILT
794 buf = ((Elf_External_Sym *)
795 bfd_malloc (extsymcount * sizeof (Elf_External_Sym)));
ede4eed4 796 if (buf == NULL && extsymcount != 0)
58142f10 797 goto error_return;
ede4eed4
KR
798
799 /* We store a pointer to the hash table entry for each external
800 symbol. */
801 sym_hash = ((struct elf_link_hash_entry **)
802 bfd_alloc (abfd,
803 extsymcount * sizeof (struct elf_link_hash_entry *)));
804 if (sym_hash == NULL)
a9713b91 805 goto error_return;
ede4eed4
KR
806 elf_sym_hashes (abfd) = sym_hash;
807
d044b40a 808 if (! dynamic)
ede4eed4 809 {
ede4eed4
KR
810 /* If we are creating a shared library, create all the dynamic
811 sections immediately. We need to attach them to something,
812 so we attach them to this BFD, provided it is the right
813 format. FIXME: If there are no input BFD's of the same
814 format as the output, we can't make a shared library. */
815 if (info->shared
816 && ! elf_hash_table (info)->dynamic_sections_created
817 && abfd->xvec == info->hash->creator)
818 {
819 if (! elf_link_create_dynamic_sections (abfd, info))
820 goto error_return;
821 }
822 }
823 else
824 {
825 asection *s;
826 boolean add_needed;
827 const char *name;
828 bfd_size_type oldsize;
829 bfd_size_type strindex;
830
ede4eed4
KR
831 /* Find the name to use in a DT_NEEDED entry that refers to this
832 object. If the object has a DT_SONAME entry, we use it.
833 Otherwise, if the generic linker stuck something in
60a49e7f
ILT
834 elf_dt_name, we use that. Otherwise, we just use the file
835 name. If the generic linker put a null string into
836 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
837 there is a DT_SONAME entry. */
ede4eed4
KR
838 add_needed = true;
839 name = bfd_get_filename (abfd);
60a49e7f 840 if (elf_dt_name (abfd) != NULL)
ede4eed4 841 {
60a49e7f 842 name = elf_dt_name (abfd);
ede4eed4
KR
843 if (*name == '\0')
844 add_needed = false;
845 }
846 s = bfd_get_section_by_name (abfd, ".dynamic");
847 if (s != NULL)
848 {
849 Elf_External_Dyn *extdyn;
850 Elf_External_Dyn *extdynend;
851 int elfsec;
852 unsigned long link;
853
58142f10 854 dynbuf = (Elf_External_Dyn *) bfd_malloc ((size_t) s->_raw_size);
ede4eed4 855 if (dynbuf == NULL)
58142f10 856 goto error_return;
ede4eed4
KR
857
858 if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf,
859 (file_ptr) 0, s->_raw_size))
860 goto error_return;
861
862 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
863 if (elfsec == -1)
864 goto error_return;
865 link = elf_elfsections (abfd)[elfsec]->sh_link;
866
867 extdyn = dynbuf;
868 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
869 for (; extdyn < extdynend; extdyn++)
870 {
871 Elf_Internal_Dyn dyn;
872
873 elf_swap_dyn_in (abfd, extdyn, &dyn);
60a49e7f 874 if (dyn.d_tag == DT_SONAME)
ede4eed4
KR
875 {
876 name = bfd_elf_string_from_elf_section (abfd, link,
877 dyn.d_un.d_val);
878 if (name == NULL)
879 goto error_return;
880 }
881 if (dyn.d_tag == DT_NEEDED)
882 {
54406786 883 struct bfd_link_needed_list *n, **pn;
ede4eed4
KR
884 char *fnm, *anm;
885
54406786
ILT
886 n = ((struct bfd_link_needed_list *)
887 bfd_alloc (abfd, sizeof (struct bfd_link_needed_list)));
ede4eed4
KR
888 fnm = bfd_elf_string_from_elf_section (abfd, link,
889 dyn.d_un.d_val);
890 if (n == NULL || fnm == NULL)
891 goto error_return;
892 anm = bfd_alloc (abfd, strlen (fnm) + 1);
893 if (anm == NULL)
894 goto error_return;
895 strcpy (anm, fnm);
896 n->name = anm;
897 n->by = abfd;
898 n->next = NULL;
899 for (pn = &elf_hash_table (info)->needed;
900 *pn != NULL;
901 pn = &(*pn)->next)
902 ;
903 *pn = n;
904 }
905 }
906
907 free (dynbuf);
908 dynbuf = NULL;
909 }
910
911 /* We do not want to include any of the sections in a dynamic
912 object in the output file. We hack by simply clobbering the
913 list of sections in the BFD. This could be handled more
914 cleanly by, say, a new section flag; the existing
915 SEC_NEVER_LOAD flag is not the one we want, because that one
916 still implies that the section takes up space in the output
917 file. */
918 abfd->sections = NULL;
010d9f2d 919 abfd->section_count = 0;
ede4eed4
KR
920
921 /* If this is the first dynamic object found in the link, create
922 the special sections required for dynamic linking. */
923 if (! elf_hash_table (info)->dynamic_sections_created)
924 {
925 if (! elf_link_create_dynamic_sections (abfd, info))
926 goto error_return;
927 }
928
929 if (add_needed)
930 {
931 /* Add a DT_NEEDED entry for this dynamic object. */
932 oldsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
933 strindex = _bfd_stringtab_add (elf_hash_table (info)->dynstr, name,
934 true, false);
935 if (strindex == (bfd_size_type) -1)
936 goto error_return;
937
938 if (oldsize == _bfd_stringtab_size (elf_hash_table (info)->dynstr))
939 {
940 asection *sdyn;
941 Elf_External_Dyn *dyncon, *dynconend;
942
943 /* The hash table size did not change, which means that
944 the dynamic object name was already entered. If we
945 have already included this dynamic object in the
946 link, just ignore it. There is no reason to include
947 a particular dynamic object more than once. */
948 sdyn = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
949 ".dynamic");
950 BFD_ASSERT (sdyn != NULL);
951
952 dyncon = (Elf_External_Dyn *) sdyn->contents;
953 dynconend = (Elf_External_Dyn *) (sdyn->contents +
954 sdyn->_raw_size);
955 for (; dyncon < dynconend; dyncon++)
956 {
957 Elf_Internal_Dyn dyn;
958
959 elf_swap_dyn_in (elf_hash_table (info)->dynobj, dyncon,
960 &dyn);
961 if (dyn.d_tag == DT_NEEDED
962 && dyn.d_un.d_val == strindex)
963 {
964 if (buf != NULL)
965 free (buf);
d044b40a
ILT
966 if (extversym != NULL)
967 free (extversym);
ede4eed4
KR
968 return true;
969 }
970 }
971 }
972
973 if (! elf_add_dynamic_entry (info, DT_NEEDED, strindex))
974 goto error_return;
975 }
60a49e7f
ILT
976
977 /* Save the SONAME, if there is one, because sometimes the
978 linker emulation code will need to know it. */
979 if (*name == '\0')
980 name = bfd_get_filename (abfd);
981 elf_dt_name (abfd) = name;
ede4eed4
KR
982 }
983
984 if (bfd_seek (abfd,
985 hdr->sh_offset + extsymoff * sizeof (Elf_External_Sym),
986 SEEK_SET) != 0
987 || (bfd_read ((PTR) buf, sizeof (Elf_External_Sym), extsymcount, abfd)
988 != extsymcount * sizeof (Elf_External_Sym)))
989 goto error_return;
990
991 weaks = NULL;
992
e549b1d2 993 ever = extversym != NULL ? extversym + extsymoff : NULL;
ede4eed4 994 esymend = buf + extsymcount;
d044b40a
ILT
995 for (esym = buf;
996 esym < esymend;
997 esym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
ede4eed4
KR
998 {
999 Elf_Internal_Sym sym;
1000 int bind;
1001 bfd_vma value;
1002 asection *sec;
1003 flagword flags;
1004 const char *name;
0cb70568 1005 struct elf_link_hash_entry *h;
ede4eed4 1006 boolean definition;
ee9f09cd 1007 boolean size_change_ok, type_change_ok;
452a5efb 1008 boolean new_weakdef;
fd6c00ba 1009 unsigned int old_alignment;
ede4eed4
KR
1010
1011 elf_swap_symbol_in (abfd, esym, &sym);
1012
1013 flags = BSF_NO_FLAGS;
1014 sec = NULL;
1015 value = sym.st_value;
1016 *sym_hash = NULL;
1017
1018 bind = ELF_ST_BIND (sym.st_info);
1019 if (bind == STB_LOCAL)
1020 {
1021 /* This should be impossible, since ELF requires that all
1022 global symbols follow all local symbols, and that sh_info
1023 point to the first global symbol. Unfortunatealy, Irix 5
1024 screws this up. */
1025 continue;
1026 }
1027 else if (bind == STB_GLOBAL)
1028 {
1029 if (sym.st_shndx != SHN_UNDEF
1030 && sym.st_shndx != SHN_COMMON)
1031 flags = BSF_GLOBAL;
1032 else
1033 flags = 0;
1034 }
1035 else if (bind == STB_WEAK)
1036 flags = BSF_WEAK;
1037 else
1038 {
1039 /* Leave it up to the processor backend. */
1040 }
1041
1042 if (sym.st_shndx == SHN_UNDEF)
1043 sec = bfd_und_section_ptr;
1044 else if (sym.st_shndx > 0 && sym.st_shndx < SHN_LORESERVE)
1045 {
1046 sec = section_from_elf_index (abfd, sym.st_shndx);
f02004e9 1047 if (sec == NULL)
ede4eed4 1048 sec = bfd_abs_section_ptr;
f02004e9
ILT
1049 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1050 value -= sec->vma;
ede4eed4
KR
1051 }
1052 else if (sym.st_shndx == SHN_ABS)
1053 sec = bfd_abs_section_ptr;
1054 else if (sym.st_shndx == SHN_COMMON)
1055 {
1056 sec = bfd_com_section_ptr;
1057 /* What ELF calls the size we call the value. What ELF
1058 calls the value we call the alignment. */
1059 value = sym.st_size;
1060 }
1061 else
1062 {
1063 /* Leave it up to the processor backend. */
1064 }
1065
1066 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, sym.st_name);
1067 if (name == (const char *) NULL)
1068 goto error_return;
1069
1070 if (add_symbol_hook)
1071 {
1072 if (! (*add_symbol_hook) (abfd, info, &sym, &name, &flags, &sec,
1073 &value))
1074 goto error_return;
1075
1076 /* The hook function sets the name to NULL if this symbol
1077 should be skipped for some reason. */
1078 if (name == (const char *) NULL)
1079 continue;
1080 }
1081
1082 /* Sanity check that all possibilities were handled. */
1083 if (sec == (asection *) NULL)
1084 {
1085 bfd_set_error (bfd_error_bad_value);
1086 goto error_return;
1087 }
1088
1089 if (bfd_is_und_section (sec)
1090 || bfd_is_com_section (sec))
1091 definition = false;
1092 else
1093 definition = true;
1094
ee9f09cd 1095 size_change_ok = false;
5b3b9ff6 1096 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
fd6c00ba 1097 old_alignment = 0;
ede4eed4
KR
1098 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1099 {
d044b40a
ILT
1100 Elf_Internal_Versym iver;
1101 int vernum;
1102 boolean override;
1103
1104 if (ever != NULL)
1105 {
1106 _bfd_elf_swap_versym_in (abfd, ever, &iver);
1107 vernum = iver.vs_vers & VERSYM_VERSION;
1108
1109 /* If this is a hidden symbol, or if it is not version
1110 1, we append the version name to the symbol name.
1111 However, we do not modify a non-hidden absolute
1112 symbol, because it might be the version symbol
1113 itself. FIXME: What if it isn't? */
1114 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
1115 || (vernum > 1 && ! bfd_is_abs_section (sec)))
1116 {
1117 const char *verstr;
1118 int namelen, newlen;
1119 char *newname, *p;
1120
601acd61 1121 if (sym.st_shndx != SHN_UNDEF)
e549b1d2 1122 {
601acd61
UD
1123 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
1124 {
1125 (*_bfd_error_handler)
1126 ("%s: %s: invalid version %d (max %d)",
1127 abfd->filename, name, vernum,
1128 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1129 bfd_set_error (bfd_error_bad_value);
1130 goto error_return;
1131 }
1132 else if (vernum > 1)
1133 verstr =
1134 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1135 else
1136 verstr = "";
e549b1d2 1137 }
d044b40a 1138 else
601acd61
UD
1139 {
1140 /* We cannot simply test for the number of
1141 entries in the VERNEED section since the
1142 numbers for the needed versions do not start
1143 at 0. */
1144 Elf_Internal_Verneed *t;
1145
1146 verstr = NULL;
1147 for (t = elf_tdata (abfd)->verref;
1148 t != NULL;
1149 t = t->vn_nextref)
1150 {
1151 Elf_Internal_Vernaux *a;
1152
1153 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1154 {
1155 if (a->vna_other == vernum)
1156 {
1157 verstr = a->vna_nodename;
1158 break;
1159 }
1160 }
1161 if (a != NULL)
1162 break;
1163 }
1164 if (verstr == NULL)
1165 {
1166 (*_bfd_error_handler)
1167 ("%s: %s: invalid needed version %d",
1168 abfd->filename, name, vernum);
1169 bfd_set_error (bfd_error_bad_value);
1170 goto error_return;
1171 }
1172 }
d044b40a
ILT
1173
1174 namelen = strlen (name);
1175 newlen = namelen + strlen (verstr) + 2;
1176 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
1177 ++newlen;
1178
1179 newname = (char *) bfd_alloc (abfd, newlen);
1180 if (newname == NULL)
1181 goto error_return;
1182 strcpy (newname, name);
1183 p = newname + namelen;
1184 *p++ = ELF_VER_CHR;
1185 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
1186 *p++ = ELF_VER_CHR;
1187 strcpy (p, verstr);
1188
1189 name = newname;
1190 }
1191 }
1192
044d7d49
ILT
1193 if (! elf_merge_symbol (abfd, info, name, &sym, &sec, &value,
1194 sym_hash, &override, &type_change_ok,
1195 &size_change_ok))
ede4eed4 1196 goto error_return;
ede4eed4 1197
044d7d49
ILT
1198 if (override)
1199 definition = false;
869b7d80 1200
044d7d49 1201 h = *sym_hash;
0cb70568
ILT
1202 while (h->root.type == bfd_link_hash_indirect
1203 || h->root.type == bfd_link_hash_warning)
c4badc83 1204 h = (struct elf_link_hash_entry *) h->root.u.i.link;
0cb70568 1205
044d7d49
ILT
1206 /* Remember the old alignment if this is a common symbol, so
1207 that we don't reduce the alignment later on. We can't
1208 check later, because _bfd_generic_link_add_one_symbol
1209 will set a default for the alignment which we want to
1210 override. */
fd6c00ba
ILT
1211 if (h->root.type == bfd_link_hash_common)
1212 old_alignment = h->root.u.c.p->alignment_power;
1213
13eb6306 1214 if (elf_tdata (abfd)->verdef != NULL
d044b40a
ILT
1215 && ! override
1216 && vernum > 1
13eb6306 1217 && definition)
d044b40a 1218 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
ede4eed4
KR
1219 }
1220
1221 if (! (_bfd_generic_link_add_one_symbol
1222 (info, abfd, name, flags, sec, value, (const char *) NULL,
1223 false, collect, (struct bfd_link_hash_entry **) sym_hash)))
1224 goto error_return;
1225
0cb70568
ILT
1226 h = *sym_hash;
1227 while (h->root.type == bfd_link_hash_indirect
1228 || h->root.type == bfd_link_hash_warning)
1229 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1230 *sym_hash = h;
1231
452a5efb 1232 new_weakdef = false;
ede4eed4
KR
1233 if (dynamic
1234 && definition
1235 && (flags & BSF_WEAK) != 0
1236 && ELF_ST_TYPE (sym.st_info) != STT_FUNC
1237 && info->hash->creator->flavour == bfd_target_elf_flavour
0cb70568 1238 && h->weakdef == NULL)
ede4eed4
KR
1239 {
1240 /* Keep a list of all weak defined non function symbols from
1241 a dynamic object, using the weakdef field. Later in this
1242 function we will set the weakdef field to the correct
1243 value. We only put non-function symbols from dynamic
1244 objects on this list, because that happens to be the only
1245 time we need to know the normal symbol corresponding to a
1246 weak symbol, and the information is time consuming to
1247 figure out. If the weakdef field is not already NULL,
1248 then this symbol was already defined by some previous
1249 dynamic object, and we will be using that previous
1250 definition anyhow. */
1251
0cb70568
ILT
1252 h->weakdef = weaks;
1253 weaks = h;
452a5efb 1254 new_weakdef = true;
ede4eed4
KR
1255 }
1256
fd6c00ba 1257 /* Set the alignment of a common symbol. */
ede4eed4 1258 if (sym.st_shndx == SHN_COMMON
0cb70568 1259 && h->root.type == bfd_link_hash_common)
fd6c00ba
ILT
1260 {
1261 unsigned int align;
1262
1263 align = bfd_log2 (sym.st_value);
1264 if (align > old_alignment)
1265 h->root.u.c.p->alignment_power = align;
1266 }
ede4eed4
KR
1267
1268 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1269 {
1270 int old_flags;
1271 boolean dynsym;
1272 int new_flag;
1273
1274 /* Remember the symbol size and type. */
3d7c42c9
ILT
1275 if (sym.st_size != 0
1276 && (definition || h->size == 0))
ede4eed4 1277 {
ee9f09cd 1278 if (h->size != 0 && h->size != sym.st_size && ! size_change_ok)
3d7c42c9 1279 (*_bfd_error_handler)
ba254dc5
ILT
1280 ("Warning: size of symbol `%s' changed from %lu to %lu in %s",
1281 name, (unsigned long) h->size, (unsigned long) sym.st_size,
1282 bfd_get_filename (abfd));
1283
1284 h->size = sym.st_size;
ede4eed4 1285 }
031dfce0
ILT
1286
1287 /* If this is a common symbol, then we always want H->SIZE
1288 to be the size of the common symbol. The code just above
1289 won't fix the size if a common symbol becomes larger. We
1290 don't warn about a size change here, because that is
1291 covered by --warn-common. */
1292 if (h->root.type == bfd_link_hash_common)
1293 h->size = h->root.u.c.size;
1294
3d7c42c9
ILT
1295 if (ELF_ST_TYPE (sym.st_info) != STT_NOTYPE
1296 && (definition || h->type == STT_NOTYPE))
ede4eed4 1297 {
3d7c42c9 1298 if (h->type != STT_NOTYPE
8235c112 1299 && h->type != ELF_ST_TYPE (sym.st_info)
ee9f09cd 1300 && ! type_change_ok)
3d7c42c9
ILT
1301 (*_bfd_error_handler)
1302 ("Warning: type of symbol `%s' changed from %d to %d in %s",
1303 name, h->type, ELF_ST_TYPE (sym.st_info),
1304 bfd_get_filename (abfd));
1305
ede4eed4
KR
1306 h->type = ELF_ST_TYPE (sym.st_info);
1307 }
1308
6c02f1a0
ILT
1309 if (sym.st_other != 0
1310 && (definition || h->other == 0))
1311 h->other = sym.st_other;
1312
ede4eed4
KR
1313 /* Set a flag in the hash table entry indicating the type of
1314 reference or definition we just found. Keep a count of
1315 the number of dynamic symbols we find. A dynamic symbol
1316 is one which is referenced or defined by both a regular
440f3914 1317 object and a shared object. */
ede4eed4
KR
1318 old_flags = h->elf_link_hash_flags;
1319 dynsym = false;
1320 if (! dynamic)
1321 {
1322 if (! definition)
1323 new_flag = ELF_LINK_HASH_REF_REGULAR;
1324 else
1325 new_flag = ELF_LINK_HASH_DEF_REGULAR;
1326 if (info->shared
1327 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1328 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1329 dynsym = true;
1330 }
1331 else
1332 {
1333 if (! definition)
1334 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1335 else
1336 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
0db6249c 1337 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1c4794f5
ILT
1338 | ELF_LINK_HASH_REF_REGULAR)) != 0
1339 || (h->weakdef != NULL
440f3914
ILT
1340 && ! new_weakdef
1341 && h->weakdef->dynindx != -1))
ede4eed4
KR
1342 dynsym = true;
1343 }
1344
1345 h->elf_link_hash_flags |= new_flag;
d044b40a
ILT
1346
1347 /* If this symbol has a version, and it is the default
1348 version, we create an indirect symbol from the default
1349 name to the fully decorated name. This will cause
1350 external references which do not specify a version to be
1351 bound to this version of the symbol. */
1352 if (definition)
1353 {
1354 char *p;
1355
1356 p = strchr (name, ELF_VER_CHR);
1357 if (p != NULL && p[1] == ELF_VER_CHR)
1358 {
1359 char *shortname;
044d7d49
ILT
1360 struct elf_link_hash_entry *hi;
1361 boolean override;
d044b40a
ILT
1362
1363 shortname = bfd_hash_allocate (&info->hash->table,
1364 p - name + 1);
1365 if (shortname == NULL)
1366 goto error_return;
1367 strncpy (shortname, name, p - name);
1368 shortname[p - name] = '\0';
1369
044d7d49
ILT
1370 /* We are going to create a new symbol. Merge it
1371 with any existing symbol with this name. For the
1372 purposes of the merge, act as though we were
1373 defining the symbol we just defined, although we
1374 actually going to define an indirect symbol. */
1375 if (! elf_merge_symbol (abfd, info, shortname, &sym, &sec,
1376 &value, &hi, &override,
1377 &type_change_ok, &size_change_ok))
1378 goto error_return;
d044b40a 1379
044d7d49 1380 if (! override)
d6bfcdb5 1381 {
52c92c7f
ILT
1382 if (! (_bfd_generic_link_add_one_symbol
1383 (info, abfd, shortname, BSF_INDIRECT,
1384 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1385 collect, (struct bfd_link_hash_entry **) &hi)))
1386 goto error_return;
541a4b54
ILT
1387 }
1388 else
1389 {
1390 /* In this case the symbol named SHORTNAME is
1391 overriding the indirect symbol we want to
1392 add. We were planning on making SHORTNAME an
1393 indirect symbol referring to NAME. SHORTNAME
1394 is the name without a version. NAME is the
1395 fully versioned name, and it is the default
1396 version.
1397
1398 Overriding means that we already saw a
1399 definition for the symbol SHORTNAME in a
1400 regular object, and it is overriding the
1401 symbol defined in the dynamic object.
1402
1403 When this happens, we actually want to change
1404 NAME, the symbol we just added, to refer to
1405 SHORTNAME. This will cause references to
1406 NAME in the shared object to become
1407 references to SHORTNAME in the regular
1408 object. This is what we expect when we
1409 override a function in a shared object: that
1410 the references in the shared object will be
1411 mapped to the definition in the regular
1412 object. */
1413
677525e9
ILT
1414 while (hi->root.type == bfd_link_hash_indirect
1415 || hi->root.type == bfd_link_hash_warning)
1416 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1417
541a4b54
ILT
1418 h->root.type = bfd_link_hash_indirect;
1419 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
1420 if (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)
1421 {
1422 h->elf_link_hash_flags &=~ ELF_LINK_HASH_DEF_DYNAMIC;
1423 hi->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
1424 if (! _bfd_elf_link_record_dynamic_symbol (info, hi))
1425 goto error_return;
1426 }
52c92c7f 1427
541a4b54
ILT
1428 /* Now set HI to H, so that the following code
1429 will set the other fields correctly. */
1430 hi = h;
1431 }
52c92c7f 1432
541a4b54
ILT
1433 /* If there is a duplicate definition somewhere,
1434 then HI may not point to an indirect symbol. We
1435 will have reported an error to the user in that
1436 case. */
1437
1438 if (hi->root.type == bfd_link_hash_indirect)
1439 {
1440 struct elf_link_hash_entry *ht;
1441
1442 /* If the symbol became indirect, then we assume
1443 that we have not seen a definition before. */
1444 BFD_ASSERT ((hi->elf_link_hash_flags
1445 & (ELF_LINK_HASH_DEF_DYNAMIC
1446 | ELF_LINK_HASH_DEF_REGULAR))
1447 == 0);
1448
1449 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
1450
1451 /* Copy down any references that we may have
1452 already seen to the symbol which just became
1453 indirect. */
1454 ht->elf_link_hash_flags |=
1455 (hi->elf_link_hash_flags
1456 & (ELF_LINK_HASH_REF_DYNAMIC
1457 | ELF_LINK_HASH_REF_REGULAR));
1458
1459 /* Copy over the global table offset entry.
1460 This may have been already set up by a
1461 check_relocs routine. */
1462 if (ht->got_offset == (bfd_vma) -1)
52c92c7f 1463 {
541a4b54
ILT
1464 ht->got_offset = hi->got_offset;
1465 hi->got_offset = (bfd_vma) -1;
1466 }
1467 BFD_ASSERT (hi->got_offset == (bfd_vma) -1);
e549b1d2 1468
541a4b54
ILT
1469 if (ht->dynindx == -1)
1470 {
1471 ht->dynindx = hi->dynindx;
1472 ht->dynstr_index = hi->dynstr_index;
1473 hi->dynindx = -1;
1474 hi->dynstr_index = 0;
1475 }
1476 BFD_ASSERT (hi->dynindx == -1);
e549b1d2 1477
541a4b54
ILT
1478 /* FIXME: There may be other information to copy
1479 over for particular targets. */
1480
1481 /* See if the new flags lead us to realize that
1482 the symbol must be dynamic. */
1483 if (! dynsym)
1484 {
1485 if (! dynamic)
e549b1d2 1486 {
541a4b54
ILT
1487 if (info->shared
1488 || ((hi->elf_link_hash_flags
1489 & ELF_LINK_HASH_REF_DYNAMIC)
1490 != 0))
1491 dynsym = true;
e549b1d2 1492 }
541a4b54 1493 else
e549b1d2 1494 {
541a4b54
ILT
1495 if ((hi->elf_link_hash_flags
1496 & ELF_LINK_HASH_REF_REGULAR) != 0)
1497 dynsym = true;
e549b1d2 1498 }
52c92c7f 1499 }
d6bfcdb5
ILT
1500 }
1501
1502 /* We also need to define an indirection from the
1503 nondefault version of the symbol. */
1504
1505 shortname = bfd_hash_allocate (&info->hash->table,
1506 strlen (name));
1507 if (shortname == NULL)
1508 goto error_return;
1509 strncpy (shortname, name, p - name);
1510 strcpy (shortname + (p - name), p + 1);
1511
044d7d49
ILT
1512 /* Once again, merge with any existing symbol. */
1513 if (! elf_merge_symbol (abfd, info, shortname, &sym, &sec,
1514 &value, &hi, &override,
1515 &type_change_ok, &size_change_ok))
1516 goto error_return;
d6bfcdb5 1517
541a4b54
ILT
1518 if (override)
1519 {
1520 /* Here SHORTNAME is a versioned name, so we
1521 don't expect to see the type of override we
1522 do in the case above. */
1523 (*_bfd_error_handler)
1524 ("%s: warning: unexpected redefinition of `%s'",
1525 bfd_get_filename (abfd), shortname);
1526 }
1527 else
d6bfcdb5 1528 {
52c92c7f
ILT
1529 if (! (_bfd_generic_link_add_one_symbol
1530 (info, abfd, shortname, BSF_INDIRECT,
1531 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1532 collect, (struct bfd_link_hash_entry **) &hi)))
1533 goto error_return;
1534
1535 /* If there is a duplicate definition somewhere,
1536 then HI may not point to an indirect symbol.
1537 We will have reported an error to the user in
1538 that case. */
1539
1540 if (hi->root.type == bfd_link_hash_indirect)
1541 {
e549b1d2
ILT
1542 /* If the symbol became indirect, then we
1543 assume that we have not seen a definition
1544 before. */
1545 BFD_ASSERT ((hi->elf_link_hash_flags
1546 & (ELF_LINK_HASH_DEF_DYNAMIC
1547 | ELF_LINK_HASH_DEF_REGULAR))
1548 == 0);
1549
1550 /* Copy down any references that we may have
1551 already seen to the symbol which just
1552 became indirect. */
1553 h->elf_link_hash_flags |=
1554 (hi->elf_link_hash_flags
1555 & (ELF_LINK_HASH_REF_DYNAMIC
1556 | ELF_LINK_HASH_REF_REGULAR));
1557
1558 /* Copy over the global table offset entry.
1559 This may have been already set up by a
1560 check_relocs routine. */
1561 if (h->got_offset == (bfd_vma) -1)
1562 {
1563 h->got_offset = hi->got_offset;
1564 hi->got_offset = (bfd_vma) -1;
1565 }
1566 BFD_ASSERT (hi->got_offset == (bfd_vma) -1);
1567
1568 if (h->dynindx == -1)
1569 {
1570 h->dynindx = hi->dynindx;
1571 h->dynstr_index = hi->dynstr_index;
1572 hi->dynindx = -1;
1573 hi->dynstr_index = 0;
1574 }
1575 BFD_ASSERT (hi->dynindx == -1);
1576
1577 /* FIXME: There may be other information to
1578 copy over for particular targets. */
1579
1580 /* See if the new flags lead us to realize
1581 that the symbol must be dynamic. */
1582 if (! dynsym)
1583 {
1584 if (! dynamic)
1585 {
1586 if (info->shared
1587 || ((hi->elf_link_hash_flags
1588 & ELF_LINK_HASH_REF_DYNAMIC)
1589 != 0))
1590 dynsym = true;
1591 }
1592 else
1593 {
1594 if ((hi->elf_link_hash_flags
1595 & ELF_LINK_HASH_REF_REGULAR) != 0)
1596 dynsym = true;
1597 }
1598 }
52c92c7f 1599 }
d6bfcdb5 1600 }
d044b40a
ILT
1601 }
1602 }
1603
ede4eed4
KR
1604 if (dynsym && h->dynindx == -1)
1605 {
1606 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1607 goto error_return;
452a5efb
ILT
1608 if (h->weakdef != NULL
1609 && ! new_weakdef
1610 && h->weakdef->dynindx == -1)
1611 {
1612 if (! _bfd_elf_link_record_dynamic_symbol (info,
1613 h->weakdef))
1614 goto error_return;
1615 }
ede4eed4
KR
1616 }
1617 }
1618 }
1619
1620 /* Now set the weakdefs field correctly for all the weak defined
1621 symbols we found. The only way to do this is to search all the
1622 symbols. Since we only need the information for non functions in
1623 dynamic objects, that's the only time we actually put anything on
1624 the list WEAKS. We need this information so that if a regular
1625 object refers to a symbol defined weakly in a dynamic object, the
1626 real symbol in the dynamic object is also put in the dynamic
1627 symbols; we also must arrange for both symbols to point to the
1628 same memory location. We could handle the general case of symbol
1629 aliasing, but a general symbol alias can only be generated in
1630 assembler code, handling it correctly would be very time
1631 consuming, and other ELF linkers don't handle general aliasing
1632 either. */
1633 while (weaks != NULL)
1634 {
1635 struct elf_link_hash_entry *hlook;
1636 asection *slook;
1637 bfd_vma vlook;
1638 struct elf_link_hash_entry **hpp;
1639 struct elf_link_hash_entry **hppend;
1640
1641 hlook = weaks;
1642 weaks = hlook->weakdef;
1643 hlook->weakdef = NULL;
1644
1645 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
1646 || hlook->root.type == bfd_link_hash_defweak
1647 || hlook->root.type == bfd_link_hash_common
1648 || hlook->root.type == bfd_link_hash_indirect);
1649 slook = hlook->root.u.def.section;
1650 vlook = hlook->root.u.def.value;
1651
1652 hpp = elf_sym_hashes (abfd);
1653 hppend = hpp + extsymcount;
1654 for (; hpp < hppend; hpp++)
1655 {
1656 struct elf_link_hash_entry *h;
1657
1658 h = *hpp;
1659 if (h != NULL && h != hlook
d2bb6c79 1660 && h->root.type == bfd_link_hash_defined
ede4eed4
KR
1661 && h->root.u.def.section == slook
1662 && h->root.u.def.value == vlook)
1663 {
1664 hlook->weakdef = h;
1665
1666 /* If the weak definition is in the list of dynamic
1667 symbols, make sure the real definition is put there
1668 as well. */
1669 if (hlook->dynindx != -1
1670 && h->dynindx == -1)
1671 {
1672 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1673 goto error_return;
1674 }
1675
440f3914
ILT
1676 /* If the real definition is in the list of dynamic
1677 symbols, make sure the weak definition is put there
1678 as well. If we don't do this, then the dynamic
1679 loader might not merge the entries for the real
1680 definition and the weak definition. */
1681 if (h->dynindx != -1
1682 && hlook->dynindx == -1)
1683 {
1684 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
1685 goto error_return;
1686 }
1687
ede4eed4
KR
1688 break;
1689 }
1690 }
1691 }
1692
1693 if (buf != NULL)
1694 {
1695 free (buf);
1696 buf = NULL;
1697 }
1698
d044b40a
ILT
1699 if (extversym != NULL)
1700 {
1701 free (extversym);
1702 extversym = NULL;
1703 }
1704
ede4eed4
KR
1705 /* If this object is the same format as the output object, and it is
1706 not a shared library, then let the backend look through the
1707 relocs.
1708
1709 This is required to build global offset table entries and to
1710 arrange for dynamic relocs. It is not required for the
1711 particular common case of linking non PIC code, even when linking
1712 against shared libraries, but unfortunately there is no way of
1713 knowing whether an object file has been compiled PIC or not.
1714 Looking through the relocs is not particularly time consuming.
1715 The problem is that we must either (1) keep the relocs in memory,
1716 which causes the linker to require additional runtime memory or
1717 (2) read the relocs twice from the input file, which wastes time.
1718 This would be a good case for using mmap.
1719
1720 I have no idea how to handle linking PIC code into a file of a
1721 different format. It probably can't be done. */
1722 check_relocs = get_elf_backend_data (abfd)->check_relocs;
1723 if (! dynamic
1724 && abfd->xvec == info->hash->creator
1725 && check_relocs != NULL)
1726 {
1727 asection *o;
1728
1729 for (o = abfd->sections; o != NULL; o = o->next)
1730 {
1731 Elf_Internal_Rela *internal_relocs;
1732 boolean ok;
1733
1734 if ((o->flags & SEC_RELOC) == 0
a0c80726
ILT
1735 || o->reloc_count == 0
1736 || ((info->strip == strip_all || info->strip == strip_debugger)
94e05b00
ILT
1737 && (o->flags & SEC_DEBUGGING) != 0)
1738 || bfd_is_abs_section (o->output_section))
ede4eed4
KR
1739 continue;
1740
c86158e5
ILT
1741 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
1742 (abfd, o, (PTR) NULL,
1743 (Elf_Internal_Rela *) NULL,
1744 info->keep_memory));
ede4eed4
KR
1745 if (internal_relocs == NULL)
1746 goto error_return;
1747
1748 ok = (*check_relocs) (abfd, info, o, internal_relocs);
1749
1750 if (! info->keep_memory)
1751 free (internal_relocs);
1752
1753 if (! ok)
1754 goto error_return;
1755 }
1756 }
1757
1726b8f0
ILT
1758 /* If this is a non-traditional, non-relocateable link, try to
1759 optimize the handling of the .stab/.stabstr sections. */
1760 if (! dynamic
1761 && ! info->relocateable
1762 && ! info->traditional_format
1763 && info->hash->creator->flavour == bfd_target_elf_flavour
1764 && (info->strip != strip_all && info->strip != strip_debugger))
1765 {
1766 asection *stab, *stabstr;
1767
1768 stab = bfd_get_section_by_name (abfd, ".stab");
1769 if (stab != NULL)
1770 {
1771 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
1772
1773 if (stabstr != NULL)
1774 {
1775 struct bfd_elf_section_data *secdata;
1776
1777 secdata = elf_section_data (stab);
1778 if (! _bfd_link_section_stabs (abfd,
1779 &elf_hash_table (info)->stab_info,
1780 stab, stabstr,
1781 &secdata->stab_info))
1782 goto error_return;
1783 }
1784 }
1785 }
1786
ede4eed4
KR
1787 return true;
1788
1789 error_return:
1790 if (buf != NULL)
1791 free (buf);
1792 if (dynbuf != NULL)
1793 free (dynbuf);
d044b40a
ILT
1794 if (dynver != NULL)
1795 free (dynver);
1796 if (extversym != NULL)
1797 free (extversym);
ede4eed4
KR
1798 return false;
1799}
1800
1801/* Create some sections which will be filled in with dynamic linking
1802 information. ABFD is an input file which requires dynamic sections
1803 to be created. The dynamic sections take up virtual memory space
1804 when the final executable is run, so we need to create them before
1805 addresses are assigned to the output sections. We work out the
1806 actual contents and size of these sections later. */
1807
1808boolean
1809elf_link_create_dynamic_sections (abfd, info)
1810 bfd *abfd;
1811 struct bfd_link_info *info;
1812{
1813 flagword flags;
1814 register asection *s;
1815 struct elf_link_hash_entry *h;
1816 struct elf_backend_data *bed;
1817
1818 if (elf_hash_table (info)->dynamic_sections_created)
1819 return true;
1820
1821 /* Make sure that all dynamic sections use the same input BFD. */
1822 if (elf_hash_table (info)->dynobj == NULL)
1823 elf_hash_table (info)->dynobj = abfd;
1824 else
1825 abfd = elf_hash_table (info)->dynobj;
1826
1827 /* Note that we set the SEC_IN_MEMORY flag for all of these
1828 sections. */
ff12f303
ILT
1829 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1830 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
ede4eed4
KR
1831
1832 /* A dynamically linked executable has a .interp section, but a
1833 shared library does not. */
1834 if (! info->shared)
1835 {
1836 s = bfd_make_section (abfd, ".interp");
1837 if (s == NULL
1838 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
1839 return false;
1840 }
1841
d044b40a
ILT
1842 /* Create sections to hold version informations. These are removed
1843 if they are not needed. */
1844 s = bfd_make_section (abfd, ".gnu.version_d");
1845 if (s == NULL
1846 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
65c2dd6e 1847 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
d044b40a
ILT
1848 return false;
1849
1850 s = bfd_make_section (abfd, ".gnu.version");
1851 if (s == NULL
1852 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
1853 || ! bfd_set_section_alignment (abfd, s, 1))
1854 return false;
1855
1856 s = bfd_make_section (abfd, ".gnu.version_r");
1857 if (s == NULL
1858 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
65c2dd6e 1859 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
d044b40a
ILT
1860 return false;
1861
ede4eed4
KR
1862 s = bfd_make_section (abfd, ".dynsym");
1863 if (s == NULL
1864 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
1865 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
1866 return false;
1867
1868 s = bfd_make_section (abfd, ".dynstr");
1869 if (s == NULL
1870 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
1871 return false;
1872
1873 /* Create a strtab to hold the dynamic symbol names. */
1874 if (elf_hash_table (info)->dynstr == NULL)
1875 {
1876 elf_hash_table (info)->dynstr = elf_stringtab_init ();
1877 if (elf_hash_table (info)->dynstr == NULL)
1878 return false;
1879 }
1880
1881 s = bfd_make_section (abfd, ".dynamic");
1882 if (s == NULL
1883 || ! bfd_set_section_flags (abfd, s, flags)
1884 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
1885 return false;
1886
1887 /* The special symbol _DYNAMIC is always set to the start of the
1888 .dynamic section. This call occurs before we have processed the
1889 symbols for any dynamic object, so we don't have to worry about
1890 overriding a dynamic definition. We could set _DYNAMIC in a
1891 linker script, but we only want to define it if we are, in fact,
1892 creating a .dynamic section. We don't want to define it if there
1893 is no .dynamic section, since on some ELF platforms the start up
1894 code examines it to decide how to initialize the process. */
1895 h = NULL;
1896 if (! (_bfd_generic_link_add_one_symbol
1897 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, (bfd_vma) 0,
1898 (const char *) NULL, false, get_elf_backend_data (abfd)->collect,
1899 (struct bfd_link_hash_entry **) &h)))
1900 return false;
1901 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
1902 h->type = STT_OBJECT;
1903
1904 if (info->shared
1905 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
1906 return false;
1907
1908 s = bfd_make_section (abfd, ".hash");
1909 if (s == NULL
1910 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
1911 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
1912 return false;
1913
1914 /* Let the backend create the rest of the sections. This lets the
1915 backend set the right flags. The backend will normally create
1916 the .got and .plt sections. */
1917 bed = get_elf_backend_data (abfd);
1918 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
1919 return false;
1920
1921 elf_hash_table (info)->dynamic_sections_created = true;
1922
1923 return true;
1924}
1925
1926/* Add an entry to the .dynamic table. */
1927
1928boolean
1929elf_add_dynamic_entry (info, tag, val)
1930 struct bfd_link_info *info;
1931 bfd_vma tag;
1932 bfd_vma val;
1933{
1934 Elf_Internal_Dyn dyn;
1935 bfd *dynobj;
1936 asection *s;
1937 size_t newsize;
1938 bfd_byte *newcontents;
1939
1940 dynobj = elf_hash_table (info)->dynobj;
1941
1942 s = bfd_get_section_by_name (dynobj, ".dynamic");
1943 BFD_ASSERT (s != NULL);
1944
1945 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
58142f10 1946 newcontents = (bfd_byte *) bfd_realloc (s->contents, newsize);
ede4eed4 1947 if (newcontents == NULL)
58142f10 1948 return false;
ede4eed4
KR
1949
1950 dyn.d_tag = tag;
1951 dyn.d_un.d_val = val;
1952 elf_swap_dyn_out (dynobj, &dyn,
1953 (Elf_External_Dyn *) (newcontents + s->_raw_size));
1954
1955 s->_raw_size = newsize;
1956 s->contents = newcontents;
1957
1958 return true;
1959}
3b3753b8 1960\f
ede4eed4
KR
1961
1962/* Read and swap the relocs for a section. They may have been cached.
1963 If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are not NULL,
1964 they are used as buffers to read into. They are known to be large
1965 enough. If the INTERNAL_RELOCS relocs argument is NULL, the return
1966 value is allocated using either malloc or bfd_alloc, according to
1967 the KEEP_MEMORY argument. */
1968
c86158e5
ILT
1969Elf_Internal_Rela *
1970NAME(_bfd_elf,link_read_relocs) (abfd, o, external_relocs, internal_relocs,
1971 keep_memory)
ede4eed4
KR
1972 bfd *abfd;
1973 asection *o;
1974 PTR external_relocs;
1975 Elf_Internal_Rela *internal_relocs;
1976 boolean keep_memory;
1977{
1978 Elf_Internal_Shdr *rel_hdr;
1979 PTR alloc1 = NULL;
1980 Elf_Internal_Rela *alloc2 = NULL;
1981
1982 if (elf_section_data (o)->relocs != NULL)
1983 return elf_section_data (o)->relocs;
1984
1985 if (o->reloc_count == 0)
1986 return NULL;
1987
1988 rel_hdr = &elf_section_data (o)->rel_hdr;
1989
1990 if (internal_relocs == NULL)
1991 {
1992 size_t size;
1993
1994 size = o->reloc_count * sizeof (Elf_Internal_Rela);
1995 if (keep_memory)
1996 internal_relocs = (Elf_Internal_Rela *) bfd_alloc (abfd, size);
1997 else
58142f10 1998 internal_relocs = alloc2 = (Elf_Internal_Rela *) bfd_malloc (size);
ede4eed4 1999 if (internal_relocs == NULL)
58142f10 2000 goto error_return;
ede4eed4
KR
2001 }
2002
2003 if (external_relocs == NULL)
2004 {
58142f10 2005 alloc1 = (PTR) bfd_malloc ((size_t) rel_hdr->sh_size);
ede4eed4 2006 if (alloc1 == NULL)
58142f10 2007 goto error_return;
ede4eed4
KR
2008 external_relocs = alloc1;
2009 }
2010
2011 if ((bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0)
2012 || (bfd_read (external_relocs, 1, rel_hdr->sh_size, abfd)
2013 != rel_hdr->sh_size))
2014 goto error_return;
2015
2016 /* Swap in the relocs. For convenience, we always produce an
2017 Elf_Internal_Rela array; if the relocs are Rel, we set the addend
2018 to 0. */
2019 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
2020 {
2021 Elf_External_Rel *erel;
2022 Elf_External_Rel *erelend;
2023 Elf_Internal_Rela *irela;
2024
2025 erel = (Elf_External_Rel *) external_relocs;
2026 erelend = erel + o->reloc_count;
2027 irela = internal_relocs;
2028 for (; erel < erelend; erel++, irela++)
2029 {
2030 Elf_Internal_Rel irel;
2031
2032 elf_swap_reloc_in (abfd, erel, &irel);
2033 irela->r_offset = irel.r_offset;
2034 irela->r_info = irel.r_info;
2035 irela->r_addend = 0;
2036 }
2037 }
2038 else
2039 {
2040 Elf_External_Rela *erela;
2041 Elf_External_Rela *erelaend;
2042 Elf_Internal_Rela *irela;
2043
2044 BFD_ASSERT (rel_hdr->sh_entsize == sizeof (Elf_External_Rela));
2045
2046 erela = (Elf_External_Rela *) external_relocs;
2047 erelaend = erela + o->reloc_count;
2048 irela = internal_relocs;
2049 for (; erela < erelaend; erela++, irela++)
2050 elf_swap_reloca_in (abfd, erela, irela);
2051 }
2052
2053 /* Cache the results for next time, if we can. */
2054 if (keep_memory)
2055 elf_section_data (o)->relocs = internal_relocs;
ff12f303 2056
ede4eed4
KR
2057 if (alloc1 != NULL)
2058 free (alloc1);
2059
2060 /* Don't free alloc2, since if it was allocated we are passing it
2061 back (under the name of internal_relocs). */
2062
2063 return internal_relocs;
2064
2065 error_return:
2066 if (alloc1 != NULL)
2067 free (alloc1);
2068 if (alloc2 != NULL)
2069 free (alloc2);
2070 return NULL;
2071}
3b3753b8 2072\f
ede4eed4
KR
2073
2074/* Record an assignment to a symbol made by a linker script. We need
2075 this in case some dynamic object refers to this symbol. */
2076
2077/*ARGSUSED*/
2078boolean
2079NAME(bfd_elf,record_link_assignment) (output_bfd, info, name, provide)
2080 bfd *output_bfd;
2081 struct bfd_link_info *info;
2082 const char *name;
2083 boolean provide;
2084{
2085 struct elf_link_hash_entry *h;
2086
2087 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2088 return true;
2089
2090 h = elf_link_hash_lookup (elf_hash_table (info), name, true, true, false);
2091 if (h == NULL)
2092 return false;
2093
869b7d80
ILT
2094 if (h->root.type == bfd_link_hash_new)
2095 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
2096
ede4eed4
KR
2097 /* If this symbol is being provided by the linker script, and it is
2098 currently defined by a dynamic object, but not by a regular
2099 object, then mark it as undefined so that the generic linker will
2100 force the correct value. */
2101 if (provide
2102 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2103 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2104 h->root.type = bfd_link_hash_undefined;
2105
13eb6306
ILT
2106 /* If this symbol is not being provided by the linker script, and it is
2107 currently defined by a dynamic object, but not by a regular object,
2108 then clear out any version information because the symbol will not be
2109 associated with the dynamic object any more. */
2110 if (!provide
2111 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2112 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2113 h->verinfo.verdef = NULL;
2114
ede4eed4
KR
2115 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2116 h->type = STT_OBJECT;
2117
2118 if (((h->elf_link_hash_flags & (ELF_LINK_HASH_DEF_DYNAMIC
2119 | ELF_LINK_HASH_REF_DYNAMIC)) != 0
2120 || info->shared)
2121 && h->dynindx == -1)
2122 {
2123 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2124 return false;
2125
2126 /* If this is a weak defined symbol, and we know a corresponding
2127 real symbol from the same dynamic object, make sure the real
2128 symbol is also made into a dynamic symbol. */
2129 if (h->weakdef != NULL
2130 && h->weakdef->dynindx == -1)
2131 {
2132 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2133 return false;
2134 }
2135 }
2136
2137 return true;
2138}
3b3753b8 2139\f
d044b40a
ILT
2140/* This structure is used to pass information to
2141 elf_link_assign_sym_version. */
2142
2143struct elf_assign_sym_version_info
2144{
2145 /* Output BFD. */
2146 bfd *output_bfd;
2147 /* General link information. */
2148 struct bfd_link_info *info;
2149 /* Version tree. */
2150 struct bfd_elf_version_tree *verdefs;
2151 /* Whether we are exporting all dynamic symbols. */
2152 boolean export_dynamic;
2153 /* Whether we removed any symbols from the dynamic symbol table. */
2154 boolean removed_dynamic;
2155 /* Whether we had a failure. */
2156 boolean failed;
2157};
2158
2159/* This structure is used to pass information to
2160 elf_link_find_version_dependencies. */
2161
2162struct elf_find_verdep_info
2163{
2164 /* Output BFD. */
2165 bfd *output_bfd;
2166 /* General link information. */
2167 struct bfd_link_info *info;
2168 /* The number of dependencies. */
2169 unsigned int vers;
2170 /* Whether we had a failure. */
2171 boolean failed;
2172};
ede4eed4
KR
2173
2174/* Array used to determine the number of hash table buckets to use
2175 based on the number of symbols there are. If there are fewer than
2176 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
2177 fewer than 37 we use 17 buckets, and so forth. We never use more
6b8ec6f3 2178 than 32771 buckets. */
ede4eed4
KR
2179
2180static const size_t elf_buckets[] =
2181{
6b8ec6f3
ILT
2182 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
2183 16411, 32771, 0
ede4eed4
KR
2184};
2185
2186/* Set up the sizes and contents of the ELF dynamic sections. This is
2187 called by the ELF linker emulation before_allocation routine. We
2188 must set the sizes of the sections before the linker sets the
2189 addresses of the various sections. */
2190
2191boolean
2192NAME(bfd_elf,size_dynamic_sections) (output_bfd, soname, rpath,
148437ec 2193 export_dynamic, filter_shlib,
d044b40a
ILT
2194 auxiliary_filters, info, sinterpptr,
2195 verdefs)
ede4eed4
KR
2196 bfd *output_bfd;
2197 const char *soname;
2198 const char *rpath;
2199 boolean export_dynamic;
148437ec 2200 const char *filter_shlib;
db109ca2 2201 const char * const *auxiliary_filters;
ede4eed4
KR
2202 struct bfd_link_info *info;
2203 asection **sinterpptr;
d044b40a 2204 struct bfd_elf_version_tree *verdefs;
ede4eed4 2205{
d044b40a 2206 bfd_size_type soname_indx;
ede4eed4
KR
2207 bfd *dynobj;
2208 struct elf_backend_data *bed;
e549b1d2 2209 bfd_size_type old_dynsymcount;
c19fbe0f 2210 struct elf_assign_sym_version_info asvinfo;
ede4eed4
KR
2211
2212 *sinterpptr = NULL;
2213
d044b40a
ILT
2214 soname_indx = -1;
2215
ede4eed4
KR
2216 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2217 return true;
2218
ff12f303
ILT
2219 /* The backend may have to create some sections regardless of whether
2220 we're dynamic or not. */
2221 bed = get_elf_backend_data (output_bfd);
2222 if (bed->elf_backend_always_size_sections
2223 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
2224 return false;
2225
ede4eed4
KR
2226 dynobj = elf_hash_table (info)->dynobj;
2227
2228 /* If there were no dynamic objects in the link, there is nothing to
2229 do here. */
2230 if (dynobj == NULL)
2231 return true;
2232
2233 /* If we are supposed to export all symbols into the dynamic symbol
2234 table (this is not the normal case), then do so. */
2235 if (export_dynamic)
2236 {
2237 struct elf_info_failed eif;
2238
2239 eif.failed = false;
2240 eif.info = info;
2241 elf_link_hash_traverse (elf_hash_table (info), elf_export_symbol,
2242 (PTR) &eif);
2243 if (eif.failed)
2244 return false;
2245 }
2246
2247 if (elf_hash_table (info)->dynamic_sections_created)
2248 {
2249 struct elf_info_failed eif;
73a68447 2250 struct elf_link_hash_entry *h;
ede4eed4
KR
2251 bfd_size_type strsize;
2252
2253 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
2254 BFD_ASSERT (*sinterpptr != NULL || info->shared);
2255
2256 if (soname != NULL)
2257 {
d044b40a
ILT
2258 soname_indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2259 soname, true, true);
2260 if (soname_indx == (bfd_size_type) -1
2261 || ! elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
ede4eed4 2262 return false;
ff12f303 2263 }
ede4eed4 2264
951fe66d
ILT
2265 if (info->symbolic)
2266 {
2267 if (! elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
2268 return false;
2269 }
2270
ede4eed4
KR
2271 if (rpath != NULL)
2272 {
2273 bfd_size_type indx;
2274
2275 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr, rpath,
2276 true, true);
2277 if (indx == (bfd_size_type) -1
2278 || ! elf_add_dynamic_entry (info, DT_RPATH, indx))
2279 return false;
2280 }
2281
148437ec
ILT
2282 if (filter_shlib != NULL)
2283 {
2284 bfd_size_type indx;
2285
2286 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2287 filter_shlib, true, true);
2288 if (indx == (bfd_size_type) -1
2289 || ! elf_add_dynamic_entry (info, DT_FILTER, indx))
2290 return false;
2291 }
2292
db109ca2 2293 if (auxiliary_filters != NULL)
148437ec 2294 {
db109ca2 2295 const char * const *p;
148437ec 2296
db109ca2
ILT
2297 for (p = auxiliary_filters; *p != NULL; p++)
2298 {
2299 bfd_size_type indx;
2300
2301 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2302 *p, true, true);
2303 if (indx == (bfd_size_type) -1
2304 || ! elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
2305 return false;
2306 }
148437ec
ILT
2307 }
2308
c19fbe0f
ILT
2309 /* Attach all the symbols to their version information. */
2310 asvinfo.output_bfd = output_bfd;
2311 asvinfo.info = info;
2312 asvinfo.verdefs = verdefs;
2313 asvinfo.export_dynamic = export_dynamic;
2314 asvinfo.removed_dynamic = false;
2315 asvinfo.failed = false;
2316
2317 elf_link_hash_traverse (elf_hash_table (info),
2318 elf_link_assign_sym_version,
2319 (PTR) &asvinfo);
2320 if (asvinfo.failed)
2321 return false;
2322
ede4eed4
KR
2323 /* Find all symbols which were defined in a dynamic object and make
2324 the backend pick a reasonable value for them. */
2325 eif.failed = false;
2326 eif.info = info;
2327 elf_link_hash_traverse (elf_hash_table (info),
2328 elf_adjust_dynamic_symbol,
2329 (PTR) &eif);
2330 if (eif.failed)
2331 return false;
2332
2333 /* Add some entries to the .dynamic section. We fill in some of the
2334 values later, in elf_bfd_final_link, but we must add the entries
2335 now so that we know the final size of the .dynamic section. */
73a68447
ILT
2336 h = elf_link_hash_lookup (elf_hash_table (info), "_init", false,
2337 false, false);
2338 if (h != NULL
2339 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
2340 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
ede4eed4
KR
2341 {
2342 if (! elf_add_dynamic_entry (info, DT_INIT, 0))
2343 return false;
2344 }
73a68447
ILT
2345 h = elf_link_hash_lookup (elf_hash_table (info), "_fini", false,
2346 false, false);
2347 if (h != NULL
2348 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
2349 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
ede4eed4
KR
2350 {
2351 if (! elf_add_dynamic_entry (info, DT_FINI, 0))
2352 return false;
2353 }
2354 strsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
2355 if (! elf_add_dynamic_entry (info, DT_HASH, 0)
2356 || ! elf_add_dynamic_entry (info, DT_STRTAB, 0)
2357 || ! elf_add_dynamic_entry (info, DT_SYMTAB, 0)
2358 || ! elf_add_dynamic_entry (info, DT_STRSZ, strsize)
2359 || ! elf_add_dynamic_entry (info, DT_SYMENT,
2360 sizeof (Elf_External_Sym)))
2361 return false;
2362 }
2363
2364 /* The backend must work out the sizes of all the other dynamic
2365 sections. */
e549b1d2 2366 old_dynsymcount = elf_hash_table (info)->dynsymcount;
ede4eed4
KR
2367 if (! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
2368 return false;
2369
2370 if (elf_hash_table (info)->dynamic_sections_created)
2371 {
2372 size_t dynsymcount;
2373 asection *s;
2374 size_t i;
2375 size_t bucketcount = 0;
2376 Elf_Internal_Sym isym;
2377
d044b40a
ILT
2378 /* Set up the version definition section. */
2379 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
2380 BFD_ASSERT (s != NULL);
d6bfcdb5 2381
d6bfcdb5
ILT
2382 /* We may have created additional version definitions if we are
2383 just linking a regular application. */
c19fbe0f 2384 verdefs = asvinfo.verdefs;
d6bfcdb5 2385
d044b40a
ILT
2386 if (verdefs == NULL)
2387 {
d044b40a
ILT
2388 asection **spp;
2389
d044b40a
ILT
2390 /* Don't include this section in the output file. */
2391 for (spp = &output_bfd->sections;
2392 *spp != s->output_section;
2393 spp = &(*spp)->next)
2394 ;
2395 *spp = s->output_section->next;
2396 --output_bfd->section_count;
2397 }
2398 else
2399 {
d044b40a
ILT
2400 unsigned int cdefs;
2401 bfd_size_type size;
2402 struct bfd_elf_version_tree *t;
2403 bfd_byte *p;
2404 Elf_Internal_Verdef def;
2405 Elf_Internal_Verdaux defaux;
2406
c19fbe0f 2407 if (asvinfo.removed_dynamic)
d044b40a
ILT
2408 {
2409 /* Some dynamic symbols were changed to be local
e549b1d2
ILT
2410 symbols. In this case, we renumber all of the
2411 dynamic symbols, so that we don't have a hole. If
2412 the backend changed dynsymcount, then assume that the
2413 new symbols are at the start. This is the case on
2414 the MIPS. FIXME: The names of the removed symbols
2415 will still be in the dynamic string table, wasting
2416 space. */
2417 elf_hash_table (info)->dynsymcount =
2418 1 + (elf_hash_table (info)->dynsymcount - old_dynsymcount);
d044b40a
ILT
2419 elf_link_hash_traverse (elf_hash_table (info),
2420 elf_link_renumber_dynsyms,
2421 (PTR) info);
2422 }
2423
2424 cdefs = 0;
2425 size = 0;
2426
2427 /* Make space for the base version. */
2428 size += sizeof (Elf_External_Verdef);
2429 size += sizeof (Elf_External_Verdaux);
2430 ++cdefs;
2431
2432 for (t = verdefs; t != NULL; t = t->next)
2433 {
2434 struct bfd_elf_version_deps *n;
2435
2436 size += sizeof (Elf_External_Verdef);
2437 size += sizeof (Elf_External_Verdaux);
2438 ++cdefs;
2439
2440 for (n = t->deps; n != NULL; n = n->next)
2441 size += sizeof (Elf_External_Verdaux);
2442 }
2443
2444 s->_raw_size = size;
2445 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
2446 if (s->contents == NULL && s->_raw_size != 0)
2447 return false;
2448
2449 /* Fill in the version definition section. */
2450
2451 p = s->contents;
2452
2453 def.vd_version = VER_DEF_CURRENT;
2454 def.vd_flags = VER_FLG_BASE;
2455 def.vd_ndx = 1;
2456 def.vd_cnt = 1;
2457 def.vd_aux = sizeof (Elf_External_Verdef);
2458 def.vd_next = (sizeof (Elf_External_Verdef)
2459 + sizeof (Elf_External_Verdaux));
2460
2461 if (soname_indx != -1)
2462 {
2463 def.vd_hash = bfd_elf_hash ((const unsigned char *) soname);
2464 defaux.vda_name = soname_indx;
2465 }
2466 else
2467 {
2468 const char *name;
2469 bfd_size_type indx;
2470
2471 name = output_bfd->filename;
2472 def.vd_hash = bfd_elf_hash ((const unsigned char *) name);
2473 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2474 name, true, false);
2475 if (indx == (bfd_size_type) -1)
2476 return false;
2477 defaux.vda_name = indx;
2478 }
2479 defaux.vda_next = 0;
2480
2481 _bfd_elf_swap_verdef_out (output_bfd, &def,
2482 (Elf_External_Verdef *)p);
2483 p += sizeof (Elf_External_Verdef);
2484 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2485 (Elf_External_Verdaux *) p);
2486 p += sizeof (Elf_External_Verdaux);
2487
2488 for (t = verdefs; t != NULL; t = t->next)
2489 {
2490 unsigned int cdeps;
2491 struct bfd_elf_version_deps *n;
2492 struct elf_link_hash_entry *h;
2493
2494 cdeps = 0;
2495 for (n = t->deps; n != NULL; n = n->next)
2496 ++cdeps;
2497
2498 /* Add a symbol representing this version. */
2499 h = NULL;
2500 if (! (_bfd_generic_link_add_one_symbol
2501 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
2502 (bfd_vma) 0, (const char *) NULL, false,
2503 get_elf_backend_data (dynobj)->collect,
2504 (struct bfd_link_hash_entry **) &h)))
2505 return false;
2506 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
2507 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2508 h->type = STT_OBJECT;
2509 h->verinfo.vertree = t;
2510
d6bfcdb5
ILT
2511 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2512 return false;
d044b40a
ILT
2513
2514 def.vd_version = VER_DEF_CURRENT;
2515 def.vd_flags = 0;
2516 if (t->globals == NULL && t->locals == NULL && ! t->used)
2517 def.vd_flags |= VER_FLG_WEAK;
2518 def.vd_ndx = t->vernum + 1;
2519 def.vd_cnt = cdeps + 1;
2520 def.vd_hash = bfd_elf_hash ((const unsigned char *) t->name);
2521 def.vd_aux = sizeof (Elf_External_Verdef);
2522 if (t->next != NULL)
2523 def.vd_next = (sizeof (Elf_External_Verdef)
2524 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
2525 else
2526 def.vd_next = 0;
2527
2528 _bfd_elf_swap_verdef_out (output_bfd, &def,
2529 (Elf_External_Verdef *) p);
2530 p += sizeof (Elf_External_Verdef);
2531
2532 defaux.vda_name = h->dynstr_index;
2533 if (t->deps == NULL)
2534 defaux.vda_next = 0;
2535 else
2536 defaux.vda_next = sizeof (Elf_External_Verdaux);
2537 t->name_indx = defaux.vda_name;
2538
2539 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2540 (Elf_External_Verdaux *) p);
2541 p += sizeof (Elf_External_Verdaux);
2542
2543 for (n = t->deps; n != NULL; n = n->next)
2544 {
2545 defaux.vda_name = n->version_needed->name_indx;
2546 if (n->next == NULL)
2547 defaux.vda_next = 0;
2548 else
2549 defaux.vda_next = sizeof (Elf_External_Verdaux);
2550
2551 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2552 (Elf_External_Verdaux *) p);
2553 p += sizeof (Elf_External_Verdaux);
2554 }
2555 }
2556
2557 if (! elf_add_dynamic_entry (info, DT_VERDEF, 0)
2558 || ! elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
2559 return false;
2560
2561 elf_tdata (output_bfd)->cverdefs = cdefs;
2562 }
2563
2564 /* Work out the size of the version reference section. */
2565
2566 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
2567 BFD_ASSERT (s != NULL);
2568 {
2569 struct elf_find_verdep_info sinfo;
2570
2571 sinfo.output_bfd = output_bfd;
2572 sinfo.info = info;
2573 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
2574 if (sinfo.vers == 0)
2575 sinfo.vers = 1;
2576 sinfo.failed = false;
2577
2578 elf_link_hash_traverse (elf_hash_table (info),
2579 elf_link_find_version_dependencies,
2580 (PTR) &sinfo);
2581
2582 if (elf_tdata (output_bfd)->verref == NULL)
2583 {
2584 asection **spp;
2585
2586 /* We don't have any version definitions, so we can just
2587 remove the section. */
2588
2589 for (spp = &output_bfd->sections;
2590 *spp != s->output_section;
2591 spp = &(*spp)->next)
2592 ;
2593 *spp = s->output_section->next;
2594 --output_bfd->section_count;
2595 }
2596 else
2597 {
2598 Elf_Internal_Verneed *t;
2599 unsigned int size;
2600 unsigned int crefs;
2601 bfd_byte *p;
2602
2603 /* Build the version definition section. */
d6bfcdb5
ILT
2604 size = 0;
2605 crefs = 0;
d044b40a
ILT
2606 for (t = elf_tdata (output_bfd)->verref;
2607 t != NULL;
2608 t = t->vn_nextref)
2609 {
2610 Elf_Internal_Vernaux *a;
2611
2612 size += sizeof (Elf_External_Verneed);
2613 ++crefs;
2614 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2615 size += sizeof (Elf_External_Vernaux);
2616 }
2617
2618 s->_raw_size = size;
2619 s->contents = (bfd_byte *) bfd_alloc (output_bfd, size);
2620 if (s->contents == NULL)
2621 return false;
2622
2623 p = s->contents;
2624 for (t = elf_tdata (output_bfd)->verref;
2625 t != NULL;
2626 t = t->vn_nextref)
2627 {
2628 unsigned int caux;
2629 Elf_Internal_Vernaux *a;
2630 bfd_size_type indx;
2631
2632 caux = 0;
2633 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2634 ++caux;
2635
2636 t->vn_version = VER_NEED_CURRENT;
2637 t->vn_cnt = caux;
601acd61
UD
2638 if (elf_dt_name (t->vn_bfd) != NULL)
2639 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2640 elf_dt_name (t->vn_bfd),
2641 true, false);
2642 else
2643 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2644 t->vn_bfd->filename, true, false);
d044b40a
ILT
2645 if (indx == (bfd_size_type) -1)
2646 return false;
2647 t->vn_file = indx;
2648 t->vn_aux = sizeof (Elf_External_Verneed);
2649 if (t->vn_nextref == NULL)
2650 t->vn_next = 0;
2651 else
2652 t->vn_next = (sizeof (Elf_External_Verneed)
2653 + caux * sizeof (Elf_External_Vernaux));
2654
2655 _bfd_elf_swap_verneed_out (output_bfd, t,
2656 (Elf_External_Verneed *) p);
2657 p += sizeof (Elf_External_Verneed);
2658
2659 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2660 {
2661 a->vna_hash = bfd_elf_hash ((const unsigned char *)
2662 a->vna_nodename);
2663 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2664 a->vna_nodename, true, false);
2665 if (indx == (bfd_size_type) -1)
2666 return false;
2667 a->vna_name = indx;
2668 if (a->vna_nextptr == NULL)
2669 a->vna_next = 0;
2670 else
2671 a->vna_next = sizeof (Elf_External_Vernaux);
2672
2673 _bfd_elf_swap_vernaux_out (output_bfd, a,
2674 (Elf_External_Vernaux *) p);
2675 p += sizeof (Elf_External_Vernaux);
2676 }
2677 }
2678
2679 if (! elf_add_dynamic_entry (info, DT_VERNEED, 0)
2680 || ! elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
2681 return false;
2682
2683 elf_tdata (output_bfd)->cverrefs = crefs;
2684 }
2685 }
2686
2687 dynsymcount = elf_hash_table (info)->dynsymcount;
2688
2689 /* Work out the size of the symbol version section. */
2690 s = bfd_get_section_by_name (dynobj, ".gnu.version");
2691 BFD_ASSERT (s != NULL);
2692 if (dynsymcount == 0
2693 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
2694 {
2695 asection **spp;
2696
2697 /* We don't need any symbol versions; just discard the
2698 section. */
2699 for (spp = &output_bfd->sections;
2700 *spp != s->output_section;
2701 spp = &(*spp)->next)
2702 ;
2703 *spp = s->output_section->next;
2704 --output_bfd->section_count;
2705 }
2706 else
2707 {
d044b40a 2708 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
e549b1d2 2709 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
d044b40a
ILT
2710 if (s->contents == NULL)
2711 return false;
2712
d044b40a
ILT
2713 if (! elf_add_dynamic_entry (info, DT_VERSYM, 0))
2714 return false;
2715 }
2716
ede4eed4
KR
2717 /* Set the size of the .dynsym and .hash sections. We counted
2718 the number of dynamic symbols in elf_link_add_object_symbols.
2719 We will build the contents of .dynsym and .hash when we build
2720 the final symbol table, because until then we do not know the
2721 correct value to give the symbols. We built the .dynstr
2722 section as we went along in elf_link_add_object_symbols. */
ede4eed4
KR
2723 s = bfd_get_section_by_name (dynobj, ".dynsym");
2724 BFD_ASSERT (s != NULL);
2725 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
2726 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
2727 if (s->contents == NULL && s->_raw_size != 0)
a9713b91 2728 return false;
ede4eed4
KR
2729
2730 /* The first entry in .dynsym is a dummy symbol. */
2731 isym.st_value = 0;
2732 isym.st_size = 0;
2733 isym.st_name = 0;
2734 isym.st_info = 0;
2735 isym.st_other = 0;
2736 isym.st_shndx = 0;
2737 elf_swap_symbol_out (output_bfd, &isym,
cf9fb9f2 2738 (PTR) (Elf_External_Sym *) s->contents);
ede4eed4
KR
2739
2740 for (i = 0; elf_buckets[i] != 0; i++)
2741 {
2742 bucketcount = elf_buckets[i];
2743 if (dynsymcount < elf_buckets[i + 1])
2744 break;
2745 }
2746
2747 s = bfd_get_section_by_name (dynobj, ".hash");
2748 BFD_ASSERT (s != NULL);
2749 s->_raw_size = (2 + bucketcount + dynsymcount) * (ARCH_SIZE / 8);
2750 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
2751 if (s->contents == NULL)
a9713b91 2752 return false;
3fe22b98 2753 memset (s->contents, 0, (size_t) s->_raw_size);
ede4eed4
KR
2754
2755 put_word (output_bfd, bucketcount, s->contents);
2756 put_word (output_bfd, dynsymcount, s->contents + (ARCH_SIZE / 8));
2757
2758 elf_hash_table (info)->bucketcount = bucketcount;
2759
2760 s = bfd_get_section_by_name (dynobj, ".dynstr");
2761 BFD_ASSERT (s != NULL);
2762 s->_raw_size = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
2763
2764 if (! elf_add_dynamic_entry (info, DT_NULL, 0))
2765 return false;
2766 }
2767
2768 return true;
2769}
3b3753b8 2770\f
c19fbe0f
ILT
2771/* Fix up the flags for a symbol. This handles various cases which
2772 can only be fixed after all the input files are seen. This is
2773 currently called by both adjust_dynamic_symbol and
2774 assign_sym_version, which is unnecessary but perhaps more robust in
2775 the face of future changes. */
ede4eed4
KR
2776
2777static boolean
c19fbe0f 2778elf_fix_symbol_flags (h, eif)
ede4eed4 2779 struct elf_link_hash_entry *h;
c19fbe0f 2780 struct elf_info_failed *eif;
ede4eed4 2781{
869b7d80
ILT
2782 /* If this symbol was mentioned in a non-ELF file, try to set
2783 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
2784 permit a non-ELF file to correctly refer to a symbol defined in
2785 an ELF dynamic object. */
2786 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) != 0)
2787 {
2788 if (h->root.type != bfd_link_hash_defined
2789 && h->root.type != bfd_link_hash_defweak)
2790 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
2791 else
2792 {
e303e2e3
ILT
2793 if (h->root.u.def.section->owner != NULL
2794 && (bfd_get_flavour (h->root.u.def.section->owner)
2795 == bfd_target_elf_flavour))
869b7d80
ILT
2796 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
2797 else
2798 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2799 }
2800
c19fbe0f
ILT
2801 if (h->dynindx == -1
2802 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2803 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
869b7d80
ILT
2804 {
2805 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
2806 {
2807 eif->failed = true;
2808 return false;
2809 }
2810 }
2811 }
2812
ce6a7731
ILT
2813 /* If this is a final link, and the symbol was defined as a common
2814 symbol in a regular object file, and there was no definition in
2815 any dynamic object, then the linker will have allocated space for
2816 the symbol in a common section but the ELF_LINK_HASH_DEF_REGULAR
2817 flag will not have been set. */
2818 if (h->root.type == bfd_link_hash_defined
2819 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
2820 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
2821 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
2822 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
2823 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2824
951fe66d
ILT
2825 /* If -Bsymbolic was used (which means to bind references to global
2826 symbols to the definition within the shared object), and this
2827 symbol was defined in a regular object, then it actually doesn't
2828 need a PLT entry. */
2829 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
2830 && eif->info->shared
2831 && eif->info->symbolic
2832 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
2833 h->elf_link_hash_flags &=~ ELF_LINK_HASH_NEEDS_PLT;
2834
c19fbe0f
ILT
2835 return true;
2836}
2837
2838/* Make the backend pick a good value for a dynamic symbol. This is
2839 called via elf_link_hash_traverse, and also calls itself
2840 recursively. */
2841
2842static boolean
2843elf_adjust_dynamic_symbol (h, data)
2844 struct elf_link_hash_entry *h;
2845 PTR data;
2846{
2847 struct elf_info_failed *eif = (struct elf_info_failed *) data;
2848 bfd *dynobj;
2849 struct elf_backend_data *bed;
2850
2851 /* Ignore indirect symbols. These are added by the versioning code. */
2852 if (h->root.type == bfd_link_hash_indirect)
2853 return true;
2854
2855 /* Fix the symbol flags. */
2856 if (! elf_fix_symbol_flags (h, eif))
2857 return false;
2858
ede4eed4
KR
2859 /* If this symbol does not require a PLT entry, and it is not
2860 defined by a dynamic object, or is not referenced by a regular
452a5efb
ILT
2861 object, ignore it. We do have to handle a weak defined symbol,
2862 even if no regular object refers to it, if we decided to add it
2863 to the dynamic symbol table. FIXME: Do we normally need to worry
2864 about symbols which are defined by one dynamic object and
2865 referenced by another one? */
ede4eed4
KR
2866 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0
2867 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2868 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
452a5efb
ILT
2869 || ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
2870 && (h->weakdef == NULL || h->weakdef->dynindx == -1))))
ede4eed4
KR
2871 return true;
2872
2873 /* If we've already adjusted this symbol, don't do it again. This
2874 can happen via a recursive call. */
2875 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
2876 return true;
2877
2878 /* Don't look at this symbol again. Note that we must set this
2879 after checking the above conditions, because we may look at a
2880 symbol once, decide not to do anything, and then get called
2881 recursively later after REF_REGULAR is set below. */
2882 h->elf_link_hash_flags |= ELF_LINK_HASH_DYNAMIC_ADJUSTED;
2883
2884 /* If this is a weak definition, and we know a real definition, and
2885 the real symbol is not itself defined by a regular object file,
2886 then get a good value for the real definition. We handle the
2887 real symbol first, for the convenience of the backend routine.
2888
2889 Note that there is a confusing case here. If the real definition
2890 is defined by a regular object file, we don't get the real symbol
2891 from the dynamic object, but we do get the weak symbol. If the
2892 processor backend uses a COPY reloc, then if some routine in the
2893 dynamic object changes the real symbol, we will not see that
2894 change in the corresponding weak symbol. This is the way other
2895 ELF linkers work as well, and seems to be a result of the shared
2896 library model.
2897
2898 I will clarify this issue. Most SVR4 shared libraries define the
2899 variable _timezone and define timezone as a weak synonym. The
2900 tzset call changes _timezone. If you write
2901 extern int timezone;
2902 int _timezone = 5;
2903 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
2904 you might expect that, since timezone is a synonym for _timezone,
2905 the same number will print both times. However, if the processor
2906 backend uses a COPY reloc, then actually timezone will be copied
2907 into your process image, and, since you define _timezone
2908 yourself, _timezone will not. Thus timezone and _timezone will
2909 wind up at different memory locations. The tzset call will set
2910 _timezone, leaving timezone unchanged. */
2911
2912 if (h->weakdef != NULL)
2913 {
2914 struct elf_link_hash_entry *weakdef;
2915
2916 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2917 || h->root.type == bfd_link_hash_defweak);
2918 weakdef = h->weakdef;
2919 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
2920 || weakdef->root.type == bfd_link_hash_defweak);
2921 BFD_ASSERT (weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC);
2922 if ((weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
2923 {
2924 /* This symbol is defined by a regular object file, so we
2925 will not do anything special. Clear weakdef for the
2926 convenience of the processor backend. */
2927 h->weakdef = NULL;
2928 }
2929 else
2930 {
2931 /* There is an implicit reference by a regular object file
2932 via the weak symbol. */
2933 weakdef->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
2934 if (! elf_adjust_dynamic_symbol (weakdef, (PTR) eif))
2935 return false;
2936 }
2937 }
2938
2939 dynobj = elf_hash_table (eif->info)->dynobj;
2940 bed = get_elf_backend_data (dynobj);
2941 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
2942 {
2943 eif->failed = true;
2944 return false;
2945 }
2946
2947 return true;
2948}
2949\f
d044b40a
ILT
2950/* This routine is used to export all defined symbols into the dynamic
2951 symbol table. It is called via elf_link_hash_traverse. */
2952
2953static boolean
2954elf_export_symbol (h, data)
2955 struct elf_link_hash_entry *h;
2956 PTR data;
2957{
2958 struct elf_info_failed *eif = (struct elf_info_failed *) data;
2959
e549b1d2
ILT
2960 /* Ignore indirect symbols. These are added by the versioning code. */
2961 if (h->root.type == bfd_link_hash_indirect)
2962 return true;
2963
d044b40a
ILT
2964 if (h->dynindx == -1
2965 && (h->elf_link_hash_flags
2966 & (ELF_LINK_HASH_DEF_REGULAR | ELF_LINK_HASH_REF_REGULAR)) != 0)
2967 {
2968 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
2969 {
2970 eif->failed = true;
2971 return false;
2972 }
2973 }
2974
2975 return true;
2976}
2977\f
2978/* Look through the symbols which are defined in other shared
2979 libraries and referenced here. Update the list of version
2980 dependencies. This will be put into the .gnu.version_r section.
2981 This function is called via elf_link_hash_traverse. */
2982
2983static boolean
2984elf_link_find_version_dependencies (h, data)
2985 struct elf_link_hash_entry *h;
2986 PTR data;
2987{
2988 struct elf_find_verdep_info *rinfo = (struct elf_find_verdep_info *) data;
2989 Elf_Internal_Verneed *t;
2990 Elf_Internal_Vernaux *a;
2991
2992 /* We only care about symbols defined in shared objects with version
2993 information. */
2994 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
a48ef404 2995 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
d044b40a
ILT
2996 || h->dynindx == -1
2997 || h->verinfo.verdef == NULL)
2998 return true;
2999
3000 /* See if we already know about this version. */
3001 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
3002 {
cf2cd4cf 3003 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
d044b40a
ILT
3004 continue;
3005
3006 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3007 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
3008 return true;
3009
3010 break;
3011 }
3012
3013 /* This is a new version. Add it to tree we are building. */
3014
3015 if (t == NULL)
3016 {
3017 t = (Elf_Internal_Verneed *) bfd_zalloc (rinfo->output_bfd, sizeof *t);
3018 if (t == NULL)
3019 {
3020 rinfo->failed = true;
3021 return false;
3022 }
3023
3024 t->vn_bfd = h->verinfo.verdef->vd_bfd;
3025 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
3026 elf_tdata (rinfo->output_bfd)->verref = t;
3027 }
3028
3029 a = (Elf_Internal_Vernaux *) bfd_zalloc (rinfo->output_bfd, sizeof *a);
3030
3031 /* Note that we are copying a string pointer here, and testing it
3032 above. If bfd_elf_string_from_elf_section is ever changed to
3033 discard the string data when low in memory, this will have to be
3034 fixed. */
3035 a->vna_nodename = h->verinfo.verdef->vd_nodename;
3036
3037 a->vna_flags = h->verinfo.verdef->vd_flags;
3038 a->vna_nextptr = t->vn_auxptr;
3039
3040 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
3041 ++rinfo->vers;
3042
3043 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
3044
3045 t->vn_auxptr = a;
3046
3047 return true;
3048}
3049
3050/* Figure out appropriate versions for all the symbols. We may not
3051 have the version number script until we have read all of the input
3052 files, so until that point we don't know which symbols should be
3053 local. This function is called via elf_link_hash_traverse. */
3054
3055static boolean
3056elf_link_assign_sym_version (h, data)
3057 struct elf_link_hash_entry *h;
3058 PTR data;
3059{
3060 struct elf_assign_sym_version_info *sinfo =
3061 (struct elf_assign_sym_version_info *) data;
3062 struct bfd_link_info *info = sinfo->info;
c19fbe0f 3063 struct elf_info_failed eif;
d044b40a
ILT
3064 char *p;
3065
c19fbe0f
ILT
3066 /* Fix the symbol flags. */
3067 eif.failed = false;
3068 eif.info = info;
3069 if (! elf_fix_symbol_flags (h, &eif))
3070 {
3071 if (eif.failed)
3072 sinfo->failed = true;
3073 return false;
3074 }
3075
d044b40a
ILT
3076 /* We only need version numbers for symbols defined in regular
3077 objects. */
3078 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3079 return true;
3080
3081 p = strchr (h->root.root.string, ELF_VER_CHR);
3082 if (p != NULL && h->verinfo.vertree == NULL)
3083 {
3084 struct bfd_elf_version_tree *t;
3085 boolean hidden;
3086
3087 hidden = true;
3088
3089 /* There are two consecutive ELF_VER_CHR characters if this is
3090 not a hidden symbol. */
3091 ++p;
3092 if (*p == ELF_VER_CHR)
3093 {
3094 hidden = false;
3095 ++p;
3096 }
3097
3098 /* If there is no version string, we can just return out. */
3099 if (*p == '\0')
3100 {
3101 if (hidden)
3102 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
3103 return true;
3104 }
3105
3106 /* Look for the version. If we find it, it is no longer weak. */
3107 for (t = sinfo->verdefs; t != NULL; t = t->next)
3108 {
3109 if (strcmp (t->name, p) == 0)
3110 {
bccab630
RH
3111 int len;
3112 char *alc;
3113 struct bfd_elf_version_expr *d;
3114
3115 len = p - h->root.root.string;
3116 alc = bfd_alloc (sinfo->output_bfd, len);
3117 if (alc == NULL)
3118 return false;
3119 strncpy (alc, h->root.root.string, len - 1);
3120 alc[len - 1] = '\0';
3121 if (alc[len - 2] == ELF_VER_CHR)
3122 alc[len - 2] = '\0';
3123
d044b40a
ILT
3124 h->verinfo.vertree = t;
3125 t->used = true;
bccab630
RH
3126 d = NULL;
3127
3128 if (t->globals != NULL)
3129 {
3130 for (d = t->globals; d != NULL; d = d->next)
3131 {
3132 if ((d->match[0] == '*' && d->match[1] == '\0')
3133 || fnmatch (d->match, alc, 0) == 0)
3134 break;
3135 }
3136 }
d6bfcdb5
ILT
3137
3138 /* See if there is anything to force this symbol to
3139 local scope. */
bccab630 3140 if (d == NULL && t->locals != NULL)
d6bfcdb5 3141 {
d6bfcdb5
ILT
3142 for (d = t->locals; d != NULL; d = d->next)
3143 {
3144 if ((d->match[0] == '*' && d->match[1] == '\0')
3145 || fnmatch (d->match, alc, 0) == 0)
3146 {
3147 if (h->dynindx != -1
3148 && info->shared
c19fbe0f 3149 && ! sinfo->export_dynamic)
d6bfcdb5
ILT
3150 {
3151 sinfo->removed_dynamic = true;
52c92c7f 3152 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
c19fbe0f
ILT
3153 h->elf_link_hash_flags &=~
3154 ELF_LINK_HASH_NEEDS_PLT;
d6bfcdb5
ILT
3155 h->dynindx = -1;
3156 /* FIXME: The name of the symbol has
3157 already been recorded in the dynamic
3158 string table section. */
3159 }
3160
3161 break;
3162 }
3163 }
d6bfcdb5
ILT
3164 }
3165
bccab630 3166 bfd_release (sinfo->output_bfd, alc);
d044b40a
ILT
3167 break;
3168 }
3169 }
3170
d6bfcdb5
ILT
3171 /* If we are building an application, we need to create a
3172 version node for this version. */
3173 if (t == NULL && ! info->shared)
3174 {
3175 struct bfd_elf_version_tree **pp;
3176 int version_index;
3177
3178 /* If we aren't going to export this symbol, we don't need
3179 to worry about it. */
3180 if (h->dynindx == -1)
3181 return true;
3182
3183 t = ((struct bfd_elf_version_tree *)
3184 bfd_alloc (sinfo->output_bfd, sizeof *t));
3185 if (t == NULL)
3186 {
3187 sinfo->failed = true;
3188 return false;
3189 }
3190
3191 t->next = NULL;
3192 t->name = p;
3193 t->globals = NULL;
3194 t->locals = NULL;
3195 t->deps = NULL;
3196 t->name_indx = (unsigned int) -1;
3197 t->used = true;
3198
3199 version_index = 1;
3200 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
3201 ++version_index;
3202 t->vernum = version_index;
3203
3204 *pp = t;
3205
3206 h->verinfo.vertree = t;
3207 }
3208 else if (t == NULL)
d044b40a 3209 {
d6bfcdb5
ILT
3210 /* We could not find the version for a symbol when
3211 generating a shared archive. Return an error. */
d044b40a 3212 (*_bfd_error_handler)
52c92c7f
ILT
3213 ("%s: undefined version name %s",
3214 bfd_get_filename (sinfo->output_bfd), h->root.root.string);
d044b40a
ILT
3215 bfd_set_error (bfd_error_bad_value);
3216 sinfo->failed = true;
3217 return false;
3218 }
3219
3220 if (hidden)
3221 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
3222 }
3223
3224 /* If we don't have a version for this symbol, see if we can find
3225 something. */
3226 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
3227 {
3228 struct bfd_elf_version_tree *t;
3229 struct bfd_elf_version_tree *deflt;
3230 struct bfd_elf_version_expr *d;
3231
3232 /* See if can find what version this symbol is in. If the
c19fbe0f 3233 symbol is supposed to be local, then don't actually register
d044b40a
ILT
3234 it. */
3235 deflt = NULL;
3236 for (t = sinfo->verdefs; t != NULL; t = t->next)
3237 {
3238 if (t->globals != NULL)
3239 {
3240 for (d = t->globals; d != NULL; d = d->next)
3241 {
3242 if (fnmatch (d->match, h->root.root.string, 0) == 0)
3243 {
3244 h->verinfo.vertree = t;
3245 break;
3246 }
3247 }
3248
3249 if (d != NULL)
3250 break;
3251 }
3252
3253 if (t->locals != NULL)
3254 {
3255 for (d = t->locals; d != NULL; d = d->next)
3256 {
3257 if (d->match[0] == '*' && d->match[1] == '\0')
3258 deflt = t;
3259 else if (fnmatch (d->match, h->root.root.string, 0) == 0)
3260 {
3261 h->verinfo.vertree = t;
3262 if (h->dynindx != -1
3263 && info->shared
c19fbe0f 3264 && ! sinfo->export_dynamic)
d044b40a
ILT
3265 {
3266 sinfo->removed_dynamic = true;
52c92c7f 3267 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
c19fbe0f 3268 h->elf_link_hash_flags &=~ ELF_LINK_HASH_NEEDS_PLT;
d044b40a
ILT
3269 h->dynindx = -1;
3270 /* FIXME: The name of the symbol has already
3271 been recorded in the dynamic string table
3272 section. */
3273 }
3274 break;
3275 }
3276 }
3277
3278 if (d != NULL)
3279 break;
3280 }
3281 }
3282
3283 if (deflt != NULL && h->verinfo.vertree == NULL)
3284 {
3285 h->verinfo.vertree = deflt;
3286 if (h->dynindx != -1
3287 && info->shared
c19fbe0f 3288 && ! sinfo->export_dynamic)
d044b40a
ILT
3289 {
3290 sinfo->removed_dynamic = true;
52c92c7f 3291 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
c19fbe0f 3292 h->elf_link_hash_flags &=~ ELF_LINK_HASH_NEEDS_PLT;
d044b40a
ILT
3293 h->dynindx = -1;
3294 /* FIXME: The name of the symbol has already been
3295 recorded in the dynamic string table section. */
3296 }
3297 }
3298 }
3299
3300 return true;
3301}
3302
3303/* This function is used to renumber the dynamic symbols, if some of
3304 them are removed because they are marked as local. This is called
3305 via elf_link_hash_traverse. */
3306
3307static boolean
3308elf_link_renumber_dynsyms (h, data)
3309 struct elf_link_hash_entry *h;
3310 PTR data;
3311{
3312 struct bfd_link_info *info = (struct bfd_link_info *) data;
3313
3314 if (h->dynindx != -1)
3315 {
3316 h->dynindx = elf_hash_table (info)->dynsymcount;
3317 ++elf_hash_table (info)->dynsymcount;
3318 }
3319
3320 return true;
3321}
3322\f
ede4eed4
KR
3323/* Final phase of ELF linker. */
3324
3325/* A structure we use to avoid passing large numbers of arguments. */
3326
3327struct elf_final_link_info
3328{
3329 /* General link information. */
3330 struct bfd_link_info *info;
3331 /* Output BFD. */
3332 bfd *output_bfd;
3333 /* Symbol string table. */
3334 struct bfd_strtab_hash *symstrtab;
3335 /* .dynsym section. */
3336 asection *dynsym_sec;
3337 /* .hash section. */
3338 asection *hash_sec;
d044b40a
ILT
3339 /* symbol version section (.gnu.version). */
3340 asection *symver_sec;
ede4eed4
KR
3341 /* Buffer large enough to hold contents of any section. */
3342 bfd_byte *contents;
3343 /* Buffer large enough to hold external relocs of any section. */
3344 PTR external_relocs;
3345 /* Buffer large enough to hold internal relocs of any section. */
3346 Elf_Internal_Rela *internal_relocs;
3347 /* Buffer large enough to hold external local symbols of any input
3348 BFD. */
3349 Elf_External_Sym *external_syms;
3350 /* Buffer large enough to hold internal local symbols of any input
3351 BFD. */
3352 Elf_Internal_Sym *internal_syms;
3353 /* Array large enough to hold a symbol index for each local symbol
3354 of any input BFD. */
3355 long *indices;
3356 /* Array large enough to hold a section pointer for each local
3357 symbol of any input BFD. */
3358 asection **sections;
3359 /* Buffer to hold swapped out symbols. */
3360 Elf_External_Sym *symbuf;
3361 /* Number of swapped out symbols in buffer. */
3362 size_t symbuf_count;
3363 /* Number of symbols which fit in symbuf. */
3364 size_t symbuf_size;
3365};
3366
3367static boolean elf_link_output_sym
3368 PARAMS ((struct elf_final_link_info *, const char *,
3369 Elf_Internal_Sym *, asection *));
3370static boolean elf_link_flush_output_syms
3371 PARAMS ((struct elf_final_link_info *));
3372static boolean elf_link_output_extsym
3373 PARAMS ((struct elf_link_hash_entry *, PTR));
3374static boolean elf_link_input_bfd
3375 PARAMS ((struct elf_final_link_info *, bfd *));
3376static boolean elf_reloc_link_order
3377 PARAMS ((bfd *, struct bfd_link_info *, asection *,
3378 struct bfd_link_order *));
3379
52c92c7f 3380/* This struct is used to pass information to elf_link_output_extsym. */
ede4eed4 3381
52c92c7f 3382struct elf_outext_info
ede4eed4
KR
3383{
3384 boolean failed;
52c92c7f 3385 boolean localsyms;
ede4eed4 3386 struct elf_final_link_info *finfo;
ff12f303 3387};
ede4eed4
KR
3388
3389/* Do the final step of an ELF link. */
3390
3391boolean
3392elf_bfd_final_link (abfd, info)
3393 bfd *abfd;
3394 struct bfd_link_info *info;
3395{
3396 boolean dynamic;
3397 bfd *dynobj;
3398 struct elf_final_link_info finfo;
3399 register asection *o;
3400 register struct bfd_link_order *p;
3401 register bfd *sub;
3402 size_t max_contents_size;
3403 size_t max_external_reloc_size;
3404 size_t max_internal_reloc_count;
3405 size_t max_sym_count;
3406 file_ptr off;
3407 Elf_Internal_Sym elfsym;
3408 unsigned int i;
3409 Elf_Internal_Shdr *symtab_hdr;
3410 Elf_Internal_Shdr *symstrtab_hdr;
3411 struct elf_backend_data *bed = get_elf_backend_data (abfd);
52c92c7f 3412 struct elf_outext_info eoinfo;
ede4eed4
KR
3413
3414 if (info->shared)
3415 abfd->flags |= DYNAMIC;
3416
3417 dynamic = elf_hash_table (info)->dynamic_sections_created;
3418 dynobj = elf_hash_table (info)->dynobj;
3419
3420 finfo.info = info;
3421 finfo.output_bfd = abfd;
3422 finfo.symstrtab = elf_stringtab_init ();
3423 if (finfo.symstrtab == NULL)
3424 return false;
d044b40a 3425
ede4eed4
KR
3426 if (! dynamic)
3427 {
3428 finfo.dynsym_sec = NULL;
3429 finfo.hash_sec = NULL;
d044b40a 3430 finfo.symver_sec = NULL;
ede4eed4
KR
3431 }
3432 else
3433 {
3434 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
3435 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
3436 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
d044b40a
ILT
3437 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
3438 /* Note that it is OK if symver_sec is NULL. */
ede4eed4 3439 }
d044b40a 3440
ede4eed4
KR
3441 finfo.contents = NULL;
3442 finfo.external_relocs = NULL;
3443 finfo.internal_relocs = NULL;
3444 finfo.external_syms = NULL;
3445 finfo.internal_syms = NULL;
3446 finfo.indices = NULL;
3447 finfo.sections = NULL;
3448 finfo.symbuf = NULL;
3449 finfo.symbuf_count = 0;
3450
3451 /* Count up the number of relocations we will output for each output
3452 section, so that we know the sizes of the reloc sections. We
3453 also figure out some maximum sizes. */
3454 max_contents_size = 0;
3455 max_external_reloc_size = 0;
3456 max_internal_reloc_count = 0;
3457 max_sym_count = 0;
3458 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
3459 {
3460 o->reloc_count = 0;
3461
3462 for (p = o->link_order_head; p != NULL; p = p->next)
3463 {
3464 if (p->type == bfd_section_reloc_link_order
3465 || p->type == bfd_symbol_reloc_link_order)
3466 ++o->reloc_count;
3467 else if (p->type == bfd_indirect_link_order)
3468 {
3469 asection *sec;
3470
3471 sec = p->u.indirect.section;
3472
7ec49f91
ILT
3473 /* Mark all sections which are to be included in the
3474 link. This will normally be every section. We need
3475 to do this so that we can identify any sections which
3476 the linker has decided to not include. */
ff0e4a93 3477 sec->linker_mark = true;
7ec49f91 3478
ede4eed4
KR
3479 if (info->relocateable)
3480 o->reloc_count += sec->reloc_count;
3481
3482 if (sec->_raw_size > max_contents_size)
3483 max_contents_size = sec->_raw_size;
3484 if (sec->_cooked_size > max_contents_size)
3485 max_contents_size = sec->_cooked_size;
3486
3487 /* We are interested in just local symbols, not all
3488 symbols. */
d044b40a
ILT
3489 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
3490 && (sec->owner->flags & DYNAMIC) == 0)
ede4eed4
KR
3491 {
3492 size_t sym_count;
3493
3494 if (elf_bad_symtab (sec->owner))
3495 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
3496 / sizeof (Elf_External_Sym));
3497 else
3498 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
3499
3500 if (sym_count > max_sym_count)
3501 max_sym_count = sym_count;
3502
3503 if ((sec->flags & SEC_RELOC) != 0)
3504 {
3505 size_t ext_size;
3506
3507 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
3508 if (ext_size > max_external_reloc_size)
3509 max_external_reloc_size = ext_size;
3510 if (sec->reloc_count > max_internal_reloc_count)
3511 max_internal_reloc_count = sec->reloc_count;
3512 }
3513 }
3514 }
3515 }
3516
3517 if (o->reloc_count > 0)
3518 o->flags |= SEC_RELOC;
3519 else
3520 {
3521 /* Explicitly clear the SEC_RELOC flag. The linker tends to
3522 set it (this is probably a bug) and if it is set
3523 assign_section_numbers will create a reloc section. */
3524 o->flags &=~ SEC_RELOC;
3525 }
3526
3527 /* If the SEC_ALLOC flag is not set, force the section VMA to
3528 zero. This is done in elf_fake_sections as well, but forcing
3529 the VMA to 0 here will ensure that relocs against these
3530 sections are handled correctly. */
2e0567eb
ILT
3531 if ((o->flags & SEC_ALLOC) == 0
3532 && ! o->user_set_vma)
ede4eed4
KR
3533 o->vma = 0;
3534 }
3535
3536 /* Figure out the file positions for everything but the symbol table
3537 and the relocs. We set symcount to force assign_section_numbers
3538 to create a symbol table. */
3539 abfd->symcount = info->strip == strip_all ? 0 : 1;
3540 BFD_ASSERT (! abfd->output_has_begun);
3541 if (! _bfd_elf_compute_section_file_positions (abfd, info))
3542 goto error_return;
3543
3544 /* That created the reloc sections. Set their sizes, and assign
3545 them file positions, and allocate some buffers. */
3546 for (o = abfd->sections; o != NULL; o = o->next)
3547 {
3548 if ((o->flags & SEC_RELOC) != 0)
3549 {
3550 Elf_Internal_Shdr *rel_hdr;
3551 register struct elf_link_hash_entry **p, **pend;
3552
3553 rel_hdr = &elf_section_data (o)->rel_hdr;
3554
3555 rel_hdr->sh_size = rel_hdr->sh_entsize * o->reloc_count;
3556
3557 /* The contents field must last into write_object_contents,
3558 so we allocate it with bfd_alloc rather than malloc. */
3559 rel_hdr->contents = (PTR) bfd_alloc (abfd, rel_hdr->sh_size);
3560 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
a9713b91 3561 goto error_return;
ede4eed4
KR
3562
3563 p = ((struct elf_link_hash_entry **)
58142f10
ILT
3564 bfd_malloc (o->reloc_count
3565 * sizeof (struct elf_link_hash_entry *)));
ede4eed4 3566 if (p == NULL && o->reloc_count != 0)
58142f10 3567 goto error_return;
ede4eed4
KR
3568 elf_section_data (o)->rel_hashes = p;
3569 pend = p + o->reloc_count;
3570 for (; p < pend; p++)
3571 *p = NULL;
3572
3573 /* Use the reloc_count field as an index when outputting the
3574 relocs. */
3575 o->reloc_count = 0;
3576 }
3577 }
3578
3579 _bfd_elf_assign_file_positions_for_relocs (abfd);
3580
3581 /* We have now assigned file positions for all the sections except
3582 .symtab and .strtab. We start the .symtab section at the current
3583 file position, and write directly to it. We build the .strtab
ab276dfa 3584 section in memory. */
ede4eed4
KR
3585 abfd->symcount = 0;
3586 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3587 /* sh_name is set in prep_headers. */
3588 symtab_hdr->sh_type = SHT_SYMTAB;
3589 symtab_hdr->sh_flags = 0;
3590 symtab_hdr->sh_addr = 0;
3591 symtab_hdr->sh_size = 0;
3592 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
3593 /* sh_link is set in assign_section_numbers. */
3594 /* sh_info is set below. */
3595 /* sh_offset is set just below. */
3596 symtab_hdr->sh_addralign = 4; /* FIXME: system dependent? */
3597
3598 off = elf_tdata (abfd)->next_file_pos;
3599 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, true);
3600
3601 /* Note that at this point elf_tdata (abfd)->next_file_pos is
3602 incorrect. We do not yet know the size of the .symtab section.
3603 We correct next_file_pos below, after we do know the size. */
3604
3605 /* Allocate a buffer to hold swapped out symbols. This is to avoid
3606 continuously seeking to the right position in the file. */
3607 if (! info->keep_memory || max_sym_count < 20)
3608 finfo.symbuf_size = 20;
3609 else
3610 finfo.symbuf_size = max_sym_count;
3611 finfo.symbuf = ((Elf_External_Sym *)
58142f10 3612 bfd_malloc (finfo.symbuf_size * sizeof (Elf_External_Sym)));
ede4eed4 3613 if (finfo.symbuf == NULL)
58142f10 3614 goto error_return;
ede4eed4
KR
3615
3616 /* Start writing out the symbol table. The first symbol is always a
3617 dummy symbol. */
28c16b55
ILT
3618 if (info->strip != strip_all || info->relocateable)
3619 {
3620 elfsym.st_value = 0;
3621 elfsym.st_size = 0;
3622 elfsym.st_info = 0;
3623 elfsym.st_other = 0;
3624 elfsym.st_shndx = SHN_UNDEF;
3625 if (! elf_link_output_sym (&finfo, (const char *) NULL,
3626 &elfsym, bfd_und_section_ptr))
3627 goto error_return;
3628 }
ede4eed4
KR
3629
3630#if 0
3631 /* Some standard ELF linkers do this, but we don't because it causes
3632 bootstrap comparison failures. */
3633 /* Output a file symbol for the output file as the second symbol.
3634 We output this even if we are discarding local symbols, although
3635 I'm not sure if this is correct. */
3636 elfsym.st_value = 0;
3637 elfsym.st_size = 0;
3638 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
3639 elfsym.st_other = 0;
3640 elfsym.st_shndx = SHN_ABS;
3641 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
3642 &elfsym, bfd_abs_section_ptr))
3643 goto error_return;
3644#endif
3645
3646 /* Output a symbol for each section. We output these even if we are
3647 discarding local symbols, since they are used for relocs. These
3648 symbols have no names. We store the index of each one in the
3649 index field of the section, so that we can find it again when
3650 outputting relocs. */
28c16b55 3651 if (info->strip != strip_all || info->relocateable)
ede4eed4 3652 {
28c16b55
ILT
3653 elfsym.st_size = 0;
3654 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
3655 elfsym.st_other = 0;
3656 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
3657 {
3658 o = section_from_elf_index (abfd, i);
3659 if (o != NULL)
3660 o->target_index = abfd->symcount;
3661 elfsym.st_shndx = i;
34bc6ffc
ILT
3662 if (info->relocateable || o == NULL)
3663 elfsym.st_value = 0;
3664 else
3665 elfsym.st_value = o->vma;
28c16b55
ILT
3666 if (! elf_link_output_sym (&finfo, (const char *) NULL,
3667 &elfsym, o))
3668 goto error_return;
3669 }
ede4eed4
KR
3670 }
3671
3672 /* Allocate some memory to hold information read in from the input
3673 files. */
58142f10
ILT
3674 finfo.contents = (bfd_byte *) bfd_malloc (max_contents_size);
3675 finfo.external_relocs = (PTR) bfd_malloc (max_external_reloc_size);
ede4eed4 3676 finfo.internal_relocs = ((Elf_Internal_Rela *)
58142f10
ILT
3677 bfd_malloc (max_internal_reloc_count
3678 * sizeof (Elf_Internal_Rela)));
ede4eed4 3679 finfo.external_syms = ((Elf_External_Sym *)
58142f10
ILT
3680 bfd_malloc (max_sym_count
3681 * sizeof (Elf_External_Sym)));
ede4eed4 3682 finfo.internal_syms = ((Elf_Internal_Sym *)
58142f10
ILT
3683 bfd_malloc (max_sym_count
3684 * sizeof (Elf_Internal_Sym)));
3685 finfo.indices = (long *) bfd_malloc (max_sym_count * sizeof (long));
3686 finfo.sections = ((asection **)
3687 bfd_malloc (max_sym_count * sizeof (asection *)));
ede4eed4
KR
3688 if ((finfo.contents == NULL && max_contents_size != 0)
3689 || (finfo.external_relocs == NULL && max_external_reloc_size != 0)
3690 || (finfo.internal_relocs == NULL && max_internal_reloc_count != 0)
3691 || (finfo.external_syms == NULL && max_sym_count != 0)
3692 || (finfo.internal_syms == NULL && max_sym_count != 0)
3693 || (finfo.indices == NULL && max_sym_count != 0)
3694 || (finfo.sections == NULL && max_sym_count != 0))
58142f10 3695 goto error_return;
ede4eed4
KR
3696
3697 /* Since ELF permits relocations to be against local symbols, we
3698 must have the local symbols available when we do the relocations.
3699 Since we would rather only read the local symbols once, and we
3700 would rather not keep them in memory, we handle all the
3701 relocations for a single input file at the same time.
3702
3703 Unfortunately, there is no way to know the total number of local
3704 symbols until we have seen all of them, and the local symbol
3705 indices precede the global symbol indices. This means that when
3706 we are generating relocateable output, and we see a reloc against
3707 a global symbol, we can not know the symbol index until we have
3708 finished examining all the local symbols to see which ones we are
3709 going to output. To deal with this, we keep the relocations in
3710 memory, and don't output them until the end of the link. This is
3711 an unfortunate waste of memory, but I don't see a good way around
3712 it. Fortunately, it only happens when performing a relocateable
3713 link, which is not the common case. FIXME: If keep_memory is set
3714 we could write the relocs out and then read them again; I don't
3715 know how bad the memory loss will be. */
3716
3717 for (sub = info->input_bfds; sub != NULL; sub = sub->next)
3718 sub->output_has_begun = false;
3719 for (o = abfd->sections; o != NULL; o = o->next)
3720 {
3721 for (p = o->link_order_head; p != NULL; p = p->next)
3722 {
3723 if (p->type == bfd_indirect_link_order
3724 && (bfd_get_flavour (p->u.indirect.section->owner)
3725 == bfd_target_elf_flavour))
3726 {
3727 sub = p->u.indirect.section->owner;
3728 if (! sub->output_has_begun)
3729 {
3730 if (! elf_link_input_bfd (&finfo, sub))
3731 goto error_return;
3732 sub->output_has_begun = true;
3733 }
3734 }
3735 else if (p->type == bfd_section_reloc_link_order
3736 || p->type == bfd_symbol_reloc_link_order)
3737 {
3738 if (! elf_reloc_link_order (abfd, info, o, p))
3739 goto error_return;
3740 }
3741 else
3742 {
3743 if (! _bfd_default_link_order (abfd, info, o, p))
3744 goto error_return;
3745 }
3746 }
3747 }
3748
3749 /* That wrote out all the local symbols. Finish up the symbol table
3750 with the global symbols. */
3751
52c92c7f
ILT
3752 if (info->strip != strip_all && info->shared)
3753 {
3754 /* Output any global symbols that got converted to local in a
3755 version script. We do this in a separate step since ELF
3756 requires all local symbols to appear prior to any global
3757 symbols. FIXME: We should only do this if some global
3758 symbols were, in fact, converted to become local. FIXME:
3759 Will this work correctly with the Irix 5 linker? */
3760 eoinfo.failed = false;
3761 eoinfo.finfo = &finfo;
3762 eoinfo.localsyms = true;
3763 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
3764 (PTR) &eoinfo);
3765 if (eoinfo.failed)
3766 return false;
3767 }
3768
ede4eed4
KR
3769 /* The sh_info field records the index of the first non local
3770 symbol. */
3771 symtab_hdr->sh_info = abfd->symcount;
3772 if (dynamic)
3773 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info = 1;
3774
3775 /* We get the global symbols from the hash table. */
52c92c7f
ILT
3776 eoinfo.failed = false;
3777 eoinfo.localsyms = false;
3778 eoinfo.finfo = &finfo;
ede4eed4 3779 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
52c92c7f
ILT
3780 (PTR) &eoinfo);
3781 if (eoinfo.failed)
ede4eed4
KR
3782 return false;
3783
3784 /* Flush all symbols to the file. */
3785 if (! elf_link_flush_output_syms (&finfo))
3786 return false;
3787
3788 /* Now we know the size of the symtab section. */
3789 off += symtab_hdr->sh_size;
3790
3791 /* Finish up and write out the symbol string table (.strtab)
3792 section. */
3793 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
3794 /* sh_name was set in prep_headers. */
3795 symstrtab_hdr->sh_type = SHT_STRTAB;
3796 symstrtab_hdr->sh_flags = 0;
3797 symstrtab_hdr->sh_addr = 0;
3798 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
3799 symstrtab_hdr->sh_entsize = 0;
3800 symstrtab_hdr->sh_link = 0;
3801 symstrtab_hdr->sh_info = 0;
3802 /* sh_offset is set just below. */
3803 symstrtab_hdr->sh_addralign = 1;
3804
3805 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, true);
3806 elf_tdata (abfd)->next_file_pos = off;
3807
28c16b55
ILT
3808 if (abfd->symcount > 0)
3809 {
3810 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
3811 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
3812 return false;
3813 }
ede4eed4
KR
3814
3815 /* Adjust the relocs to have the correct symbol indices. */
3816 for (o = abfd->sections; o != NULL; o = o->next)
3817 {
3818 struct elf_link_hash_entry **rel_hash;
3819 Elf_Internal_Shdr *rel_hdr;
3820
3821 if ((o->flags & SEC_RELOC) == 0)
3822 continue;
3823
3824 rel_hash = elf_section_data (o)->rel_hashes;
3825 rel_hdr = &elf_section_data (o)->rel_hdr;
3826 for (i = 0; i < o->reloc_count; i++, rel_hash++)
3827 {
3828 if (*rel_hash == NULL)
3829 continue;
ff12f303 3830
ede4eed4
KR
3831 BFD_ASSERT ((*rel_hash)->indx >= 0);
3832
3833 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
3834 {
3835 Elf_External_Rel *erel;
3836 Elf_Internal_Rel irel;
3837
3838 erel = (Elf_External_Rel *) rel_hdr->contents + i;
3839 elf_swap_reloc_in (abfd, erel, &irel);
3840 irel.r_info = ELF_R_INFO ((*rel_hash)->indx,
3841 ELF_R_TYPE (irel.r_info));
3842 elf_swap_reloc_out (abfd, &irel, erel);
3843 }
3844 else
3845 {
3846 Elf_External_Rela *erela;
3847 Elf_Internal_Rela irela;
3848
3849 BFD_ASSERT (rel_hdr->sh_entsize
3850 == sizeof (Elf_External_Rela));
3851
3852 erela = (Elf_External_Rela *) rel_hdr->contents + i;
3853 elf_swap_reloca_in (abfd, erela, &irela);
3854 irela.r_info = ELF_R_INFO ((*rel_hash)->indx,
3855 ELF_R_TYPE (irela.r_info));
3856 elf_swap_reloca_out (abfd, &irela, erela);
3857 }
3858 }
3859
3860 /* Set the reloc_count field to 0 to prevent write_relocs from
3861 trying to swap the relocs out itself. */
3862 o->reloc_count = 0;
3863 }
3864
3865 /* If we are linking against a dynamic object, or generating a
3866 shared library, finish up the dynamic linking information. */
3867 if (dynamic)
3868 {
3869 Elf_External_Dyn *dyncon, *dynconend;
3870
3871 /* Fix up .dynamic entries. */
3872 o = bfd_get_section_by_name (dynobj, ".dynamic");
3873 BFD_ASSERT (o != NULL);
3874
3875 dyncon = (Elf_External_Dyn *) o->contents;
3876 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
3877 for (; dyncon < dynconend; dyncon++)
3878 {
3879 Elf_Internal_Dyn dyn;
3880 const char *name;
3881 unsigned int type;
3882
3883 elf_swap_dyn_in (dynobj, dyncon, &dyn);
3884
3885 switch (dyn.d_tag)
3886 {
3887 default:
3888 break;
3889
3890 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on
3891 magic _init and _fini symbols. This is pretty ugly,
3892 but we are compatible. */
3893 case DT_INIT:
3894 name = "_init";
3895 goto get_sym;
3896 case DT_FINI:
3897 name = "_fini";
3898 get_sym:
3899 {
3900 struct elf_link_hash_entry *h;
3901
3902 h = elf_link_hash_lookup (elf_hash_table (info), name,
3903 false, false, true);
d6f672b8
ILT
3904 if (h != NULL
3905 && (h->root.type == bfd_link_hash_defined
3906 || h->root.type == bfd_link_hash_defweak))
ede4eed4
KR
3907 {
3908 dyn.d_un.d_val = h->root.u.def.value;
3909 o = h->root.u.def.section;
3910 if (o->output_section != NULL)
3911 dyn.d_un.d_val += (o->output_section->vma
3912 + o->output_offset);
3913 else
d6f672b8
ILT
3914 {
3915 /* The symbol is imported from another shared
3916 library and does not apply to this one. */
3917 dyn.d_un.d_val = 0;
3918 }
3919
3920 elf_swap_dyn_out (dynobj, &dyn, dyncon);
ede4eed4 3921 }
ede4eed4
KR
3922 }
3923 break;
3924
3925 case DT_HASH:
3926 name = ".hash";
3927 goto get_vma;
3928 case DT_STRTAB:
3929 name = ".dynstr";
3930 goto get_vma;
3931 case DT_SYMTAB:
3932 name = ".dynsym";
d044b40a
ILT
3933 goto get_vma;
3934 case DT_VERDEF:
3935 name = ".gnu.version_d";
3936 goto get_vma;
3937 case DT_VERNEED:
3938 name = ".gnu.version_r";
3939 goto get_vma;
3940 case DT_VERSYM:
3941 name = ".gnu.version";
ede4eed4
KR
3942 get_vma:
3943 o = bfd_get_section_by_name (abfd, name);
3944 BFD_ASSERT (o != NULL);
3945 dyn.d_un.d_ptr = o->vma;
3946 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3947 break;
3948
3949 case DT_REL:
3950 case DT_RELA:
3951 case DT_RELSZ:
3952 case DT_RELASZ:
3953 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
3954 type = SHT_REL;
3955 else
3956 type = SHT_RELA;
3957 dyn.d_un.d_val = 0;
3958 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
3959 {
3960 Elf_Internal_Shdr *hdr;
3961
3962 hdr = elf_elfsections (abfd)[i];
3963 if (hdr->sh_type == type
3964 && (hdr->sh_flags & SHF_ALLOC) != 0)
3965 {
3966 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
3967 dyn.d_un.d_val += hdr->sh_size;
3968 else
3969 {
3970 if (dyn.d_un.d_val == 0
3971 || hdr->sh_addr < dyn.d_un.d_val)
3972 dyn.d_un.d_val = hdr->sh_addr;
3973 }
3974 }
3975 }
3976 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3977 break;
3978 }
3979 }
3980 }
3981
3982 /* If we have created any dynamic sections, then output them. */
3983 if (dynobj != NULL)
3984 {
3985 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
3986 goto error_return;
3987
3988 for (o = dynobj->sections; o != NULL; o = o->next)
3989 {
3990 if ((o->flags & SEC_HAS_CONTENTS) == 0
3991 || o->_raw_size == 0)
3992 continue;
ff12f303 3993 if ((o->flags & SEC_LINKER_CREATED) == 0)
ede4eed4
KR
3994 {
3995 /* At this point, we are only interested in sections
ff12f303 3996 created by elf_link_create_dynamic_sections. */
ede4eed4
KR
3997 continue;
3998 }
3999 if ((elf_section_data (o->output_section)->this_hdr.sh_type
4000 != SHT_STRTAB)
4001 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
4002 {
4003 if (! bfd_set_section_contents (abfd, o->output_section,
4004 o->contents, o->output_offset,
4005 o->_raw_size))
4006 goto error_return;
4007 }
4008 else
4009 {
4010 file_ptr off;
4011
4012 /* The contents of the .dynstr section are actually in a
4013 stringtab. */
4014 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
4015 if (bfd_seek (abfd, off, SEEK_SET) != 0
4016 || ! _bfd_stringtab_emit (abfd,
4017 elf_hash_table (info)->dynstr))
4018 goto error_return;
4019 }
4020 }
4021 }
4022
1726b8f0
ILT
4023 /* If we have optimized stabs strings, output them. */
4024 if (elf_hash_table (info)->stab_info != NULL)
4025 {
4026 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
4027 goto error_return;
4028 }
4029
ede4eed4
KR
4030 if (finfo.symstrtab != NULL)
4031 _bfd_stringtab_free (finfo.symstrtab);
4032 if (finfo.contents != NULL)
4033 free (finfo.contents);
4034 if (finfo.external_relocs != NULL)
4035 free (finfo.external_relocs);
4036 if (finfo.internal_relocs != NULL)
4037 free (finfo.internal_relocs);
4038 if (finfo.external_syms != NULL)
4039 free (finfo.external_syms);
4040 if (finfo.internal_syms != NULL)
4041 free (finfo.internal_syms);
4042 if (finfo.indices != NULL)
4043 free (finfo.indices);
4044 if (finfo.sections != NULL)
4045 free (finfo.sections);
4046 if (finfo.symbuf != NULL)
4047 free (finfo.symbuf);
4048 for (o = abfd->sections; o != NULL; o = o->next)
4049 {
4050 if ((o->flags & SEC_RELOC) != 0
4051 && elf_section_data (o)->rel_hashes != NULL)
4052 free (elf_section_data (o)->rel_hashes);
4053 }
4054
4055 elf_tdata (abfd)->linker = true;
4056
4057 return true;
4058
4059 error_return:
4060 if (finfo.symstrtab != NULL)
4061 _bfd_stringtab_free (finfo.symstrtab);
4062 if (finfo.contents != NULL)
4063 free (finfo.contents);
4064 if (finfo.external_relocs != NULL)
4065 free (finfo.external_relocs);
4066 if (finfo.internal_relocs != NULL)
4067 free (finfo.internal_relocs);
4068 if (finfo.external_syms != NULL)
4069 free (finfo.external_syms);
4070 if (finfo.internal_syms != NULL)
4071 free (finfo.internal_syms);
4072 if (finfo.indices != NULL)
4073 free (finfo.indices);
4074 if (finfo.sections != NULL)
4075 free (finfo.sections);
4076 if (finfo.symbuf != NULL)
4077 free (finfo.symbuf);
4078 for (o = abfd->sections; o != NULL; o = o->next)
4079 {
4080 if ((o->flags & SEC_RELOC) != 0
4081 && elf_section_data (o)->rel_hashes != NULL)
4082 free (elf_section_data (o)->rel_hashes);
4083 }
4084
4085 return false;
4086}
4087
4088/* Add a symbol to the output symbol table. */
4089
4090static boolean
4091elf_link_output_sym (finfo, name, elfsym, input_sec)
4092 struct elf_final_link_info *finfo;
4093 const char *name;
4094 Elf_Internal_Sym *elfsym;
4095 asection *input_sec;
4096{
4097 boolean (*output_symbol_hook) PARAMS ((bfd *,
4098 struct bfd_link_info *info,
4099 const char *,
4100 Elf_Internal_Sym *,
4101 asection *));
4102
4103 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
4104 elf_backend_link_output_symbol_hook;
4105 if (output_symbol_hook != NULL)
4106 {
4107 if (! ((*output_symbol_hook)
4108 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
4109 return false;
4110 }
4111
4112 if (name == (const char *) NULL || *name == '\0')
4113 elfsym->st_name = 0;
4114 else
4115 {
4116 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
4117 name, true,
4118 false);
4119 if (elfsym->st_name == (unsigned long) -1)
4120 return false;
4121 }
4122
4123 if (finfo->symbuf_count >= finfo->symbuf_size)
4124 {
4125 if (! elf_link_flush_output_syms (finfo))
4126 return false;
4127 }
4128
4129 elf_swap_symbol_out (finfo->output_bfd, elfsym,
cf9fb9f2 4130 (PTR) (finfo->symbuf + finfo->symbuf_count));
ede4eed4
KR
4131 ++finfo->symbuf_count;
4132
4133 ++finfo->output_bfd->symcount;
4134
4135 return true;
4136}
4137
4138/* Flush the output symbols to the file. */
4139
4140static boolean
4141elf_link_flush_output_syms (finfo)
4142 struct elf_final_link_info *finfo;
4143{
28c16b55
ILT
4144 if (finfo->symbuf_count > 0)
4145 {
4146 Elf_Internal_Shdr *symtab;
ede4eed4 4147
28c16b55 4148 symtab = &elf_tdata (finfo->output_bfd)->symtab_hdr;
ede4eed4 4149
28c16b55
ILT
4150 if (bfd_seek (finfo->output_bfd, symtab->sh_offset + symtab->sh_size,
4151 SEEK_SET) != 0
4152 || (bfd_write ((PTR) finfo->symbuf, finfo->symbuf_count,
4153 sizeof (Elf_External_Sym), finfo->output_bfd)
4154 != finfo->symbuf_count * sizeof (Elf_External_Sym)))
4155 return false;
ede4eed4 4156
28c16b55 4157 symtab->sh_size += finfo->symbuf_count * sizeof (Elf_External_Sym);
ede4eed4 4158
28c16b55
ILT
4159 finfo->symbuf_count = 0;
4160 }
ede4eed4
KR
4161
4162 return true;
4163}
4164
4165/* Add an external symbol to the symbol table. This is called from
52c92c7f
ILT
4166 the hash table traversal routine. When generating a shared object,
4167 we go through the symbol table twice. The first time we output
4168 anything that might have been forced to local scope in a version
4169 script. The second time we output the symbols that are still
4170 global symbols. */
ede4eed4
KR
4171
4172static boolean
4173elf_link_output_extsym (h, data)
4174 struct elf_link_hash_entry *h;
4175 PTR data;
4176{
52c92c7f
ILT
4177 struct elf_outext_info *eoinfo = (struct elf_outext_info *) data;
4178 struct elf_final_link_info *finfo = eoinfo->finfo;
ede4eed4
KR
4179 boolean strip;
4180 Elf_Internal_Sym sym;
4181 asection *input_sec;
4182
52c92c7f
ILT
4183 /* Decide whether to output this symbol in this pass. */
4184 if (eoinfo->localsyms)
4185 {
4186 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
4187 return true;
4188 }
4189 else
4190 {
4191 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4192 return true;
4193 }
4194
ede4eed4
KR
4195 /* If we are not creating a shared library, and this symbol is
4196 referenced by a shared library but is not defined anywhere, then
4197 warn that it is undefined. If we do not do this, the runtime
4198 linker will complain that the symbol is undefined when the
4199 program is run. We don't have to worry about symbols that are
4200 referenced by regular files, because we will already have issued
252239f8 4201 warnings for them. */
ede4eed4
KR
4202 if (! finfo->info->relocateable
4203 && ! finfo->info->shared
4204 && h->root.type == bfd_link_hash_undefined
4205 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
252239f8 4206 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
ede4eed4
KR
4207 {
4208 if (! ((*finfo->info->callbacks->undefined_symbol)
4209 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
4210 (asection *) NULL, 0)))
4211 {
52c92c7f 4212 eoinfo->failed = true;
ede4eed4
KR
4213 return false;
4214 }
4215 }
4216
4217 /* We don't want to output symbols that have never been mentioned by
4218 a regular file, or that we have been told to strip. However, if
4219 h->indx is set to -2, the symbol is used by a reloc and we must
4220 output it. */
4221 if (h->indx == -2)
4222 strip = false;
4223 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4224 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
4225 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
4226 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
4227 strip = true;
4228 else if (finfo->info->strip == strip_all
4229 || (finfo->info->strip == strip_some
4230 && bfd_hash_lookup (finfo->info->keep_hash,
4231 h->root.root.string,
4232 false, false) == NULL))
4233 strip = true;
4234 else
4235 strip = false;
4236
4237 /* If we're stripping it, and it's not a dynamic symbol, there's
4238 nothing else to do. */
4239 if (strip && h->dynindx == -1)
4240 return true;
4241
4242 sym.st_value = 0;
4243 sym.st_size = h->size;
6c02f1a0 4244 sym.st_other = h->other;
52c92c7f
ILT
4245 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4246 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
4247 else if (h->root.type == bfd_link_hash_undefweak
4248 || h->root.type == bfd_link_hash_defweak)
ede4eed4
KR
4249 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
4250 else
4251 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
4252
4253 switch (h->root.type)
4254 {
4255 default:
4256 case bfd_link_hash_new:
4257 abort ();
4258 return false;
4259
4260 case bfd_link_hash_undefined:
4261 input_sec = bfd_und_section_ptr;
4262 sym.st_shndx = SHN_UNDEF;
4263 break;
4264
4265 case bfd_link_hash_undefweak:
4266 input_sec = bfd_und_section_ptr;
4267 sym.st_shndx = SHN_UNDEF;
4268 break;
4269
4270 case bfd_link_hash_defined:
4271 case bfd_link_hash_defweak:
4272 {
4273 input_sec = h->root.u.def.section;
4274 if (input_sec->output_section != NULL)
4275 {
4276 sym.st_shndx =
4277 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
4278 input_sec->output_section);
4279 if (sym.st_shndx == (unsigned short) -1)
4280 {
52c92c7f 4281 eoinfo->failed = true;
ede4eed4
KR
4282 return false;
4283 }
4284
4285 /* ELF symbols in relocateable files are section relative,
4286 but in nonrelocateable files they are virtual
4287 addresses. */
4288 sym.st_value = h->root.u.def.value + input_sec->output_offset;
4289 if (! finfo->info->relocateable)
4290 sym.st_value += input_sec->output_section->vma;
4291 }
4292 else
4293 {
e549b1d2
ILT
4294 BFD_ASSERT (input_sec->owner == NULL
4295 || (input_sec->owner->flags & DYNAMIC) != 0);
ede4eed4
KR
4296 sym.st_shndx = SHN_UNDEF;
4297 input_sec = bfd_und_section_ptr;
4298 }
4299 }
4300 break;
4301
4302 case bfd_link_hash_common:
8211c929 4303 input_sec = h->root.u.c.p->section;
ede4eed4
KR
4304 sym.st_shndx = SHN_COMMON;
4305 sym.st_value = 1 << h->root.u.c.p->alignment_power;
4306 break;
4307
4308 case bfd_link_hash_indirect:
d044b40a
ILT
4309 /* These symbols are created by symbol versioning. They point
4310 to the decorated version of the name. For example, if the
4311 symbol foo@@GNU_1.2 is the default, which should be used when
4312 foo is used with no version, then we add an indirect symbol
d6bfcdb5
ILT
4313 foo which points to foo@@GNU_1.2. We ignore these symbols,
4314 since the indirected symbol is already in the hash table. If
4315 the indirect symbol is non-ELF, fall through and output it. */
4316 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) == 0)
d044b40a
ILT
4317 return true;
4318
4319 /* Fall through. */
ede4eed4 4320 case bfd_link_hash_warning:
d044b40a
ILT
4321 /* We can't represent these symbols in ELF, although a warning
4322 symbol may have come from a .gnu.warning.SYMBOL section. We
1f4ae0d6
ILT
4323 just put the target symbol in the hash table. If the target
4324 symbol does not really exist, don't do anything. */
4325 if (h->root.u.i.link->type == bfd_link_hash_new)
4326 return true;
0cb70568
ILT
4327 return (elf_link_output_extsym
4328 ((struct elf_link_hash_entry *) h->root.u.i.link, data));
ede4eed4
KR
4329 }
4330
8519ea21
ILT
4331 /* Give the processor backend a chance to tweak the symbol value,
4332 and also to finish up anything that needs to be done for this
4333 symbol. */
4334 if ((h->dynindx != -1
4335 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4336 && elf_hash_table (finfo->info)->dynamic_sections_created)
4337 {
4338 struct elf_backend_data *bed;
4339
4340 bed = get_elf_backend_data (finfo->output_bfd);
4341 if (! ((*bed->elf_backend_finish_dynamic_symbol)
4342 (finfo->output_bfd, finfo->info, h, &sym)))
4343 {
4344 eoinfo->failed = true;
4345 return false;
4346 }
4347 }
4348
ede4eed4
KR
4349 /* If this symbol should be put in the .dynsym section, then put it
4350 there now. We have already know the symbol index. We also fill
4351 in the entry in the .hash section. */
4352 if (h->dynindx != -1
4353 && elf_hash_table (finfo->info)->dynamic_sections_created)
4354 {
d044b40a
ILT
4355 char *p, *copy;
4356 const char *name;
ede4eed4
KR
4357 size_t bucketcount;
4358 size_t bucket;
4359 bfd_byte *bucketpos;
4360 bfd_vma chain;
4361
4362 sym.st_name = h->dynstr_index;
4363
ede4eed4 4364 elf_swap_symbol_out (finfo->output_bfd, &sym,
cf9fb9f2
ILT
4365 (PTR) (((Elf_External_Sym *)
4366 finfo->dynsym_sec->contents)
4367 + h->dynindx));
ede4eed4 4368
d044b40a
ILT
4369 /* We didn't include the version string in the dynamic string
4370 table, so we must not consider it in the hash table. */
4371 name = h->root.root.string;
4372 p = strchr (name, ELF_VER_CHR);
4373 if (p == NULL)
4374 copy = NULL;
4375 else
4376 {
4377 copy = bfd_alloc (finfo->output_bfd, p - name + 1);
4378 strncpy (copy, name, p - name);
4379 copy[p - name] = '\0';
4380 name = copy;
4381 }
4382
ede4eed4 4383 bucketcount = elf_hash_table (finfo->info)->bucketcount;
d044b40a 4384 bucket = bfd_elf_hash ((const unsigned char *) name) % bucketcount;
ede4eed4
KR
4385 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
4386 + (bucket + 2) * (ARCH_SIZE / 8));
4387 chain = get_word (finfo->output_bfd, bucketpos);
4388 put_word (finfo->output_bfd, h->dynindx, bucketpos);
4389 put_word (finfo->output_bfd, chain,
4390 ((bfd_byte *) finfo->hash_sec->contents
4391 + (bucketcount + 2 + h->dynindx) * (ARCH_SIZE / 8)));
d044b40a
ILT
4392
4393 if (copy != NULL)
4394 bfd_release (finfo->output_bfd, copy);
4395
4396 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
4397 {
4398 Elf_Internal_Versym iversym;
4399
4400 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4401 {
4402 if (h->verinfo.verdef == NULL)
4403 iversym.vs_vers = 0;
4404 else
4405 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
4406 }
4407 else
4408 {
4409 if (h->verinfo.vertree == NULL)
4410 iversym.vs_vers = 1;
4411 else
4412 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
4413 }
4414
4415 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
4416 iversym.vs_vers |= VERSYM_HIDDEN;
4417
4418 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym,
4419 (((Elf_External_Versym *)
4420 finfo->symver_sec->contents)
4421 + h->dynindx));
4422 }
ede4eed4
KR
4423 }
4424
4425 /* If we're stripping it, then it was just a dynamic symbol, and
4426 there's nothing else to do. */
4427 if (strip)
4428 return true;
4429
4430 h->indx = finfo->output_bfd->symcount;
4431
4432 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
4433 {
52c92c7f 4434 eoinfo->failed = true;
ede4eed4
KR
4435 return false;
4436 }
4437
4438 return true;
4439}
4440
4441/* Link an input file into the linker output file. This function
4442 handles all the sections and relocations of the input file at once.
4443 This is so that we only have to read the local symbols once, and
4444 don't have to keep them in memory. */
4445
4446static boolean
4447elf_link_input_bfd (finfo, input_bfd)
4448 struct elf_final_link_info *finfo;
4449 bfd *input_bfd;
4450{
4451 boolean (*relocate_section) PARAMS ((bfd *, struct bfd_link_info *,
4452 bfd *, asection *, bfd_byte *,
4453 Elf_Internal_Rela *,
4454 Elf_Internal_Sym *, asection **));
4455 bfd *output_bfd;
4456 Elf_Internal_Shdr *symtab_hdr;
4457 size_t locsymcount;
4458 size_t extsymoff;
c86158e5 4459 Elf_External_Sym *external_syms;
ede4eed4
KR
4460 Elf_External_Sym *esym;
4461 Elf_External_Sym *esymend;
4462 Elf_Internal_Sym *isym;
4463 long *pindex;
4464 asection **ppsection;
4465 asection *o;
4466
4467 output_bfd = finfo->output_bfd;
4468 relocate_section =
4469 get_elf_backend_data (output_bfd)->elf_backend_relocate_section;
4470
4471 /* If this is a dynamic object, we don't want to do anything here:
4472 we don't want the local symbols, and we don't want the section
4473 contents. */
d044b40a 4474 if ((input_bfd->flags & DYNAMIC) != 0)
ede4eed4
KR
4475 return true;
4476
4477 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4478 if (elf_bad_symtab (input_bfd))
4479 {
4480 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
4481 extsymoff = 0;
4482 }
4483 else
4484 {
4485 locsymcount = symtab_hdr->sh_info;
4486 extsymoff = symtab_hdr->sh_info;
4487 }
4488
4489 /* Read the local symbols. */
c86158e5
ILT
4490 if (symtab_hdr->contents != NULL)
4491 external_syms = (Elf_External_Sym *) symtab_hdr->contents;
4492 else if (locsymcount == 0)
4493 external_syms = NULL;
4494 else
4495 {
4496 external_syms = finfo->external_syms;
4497 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
4498 || (bfd_read (external_syms, sizeof (Elf_External_Sym),
ede4eed4 4499 locsymcount, input_bfd)
c86158e5
ILT
4500 != locsymcount * sizeof (Elf_External_Sym)))
4501 return false;
4502 }
ede4eed4
KR
4503
4504 /* Swap in the local symbols and write out the ones which we know
4505 are going into the output file. */
c86158e5 4506 esym = external_syms;
ede4eed4
KR
4507 esymend = esym + locsymcount;
4508 isym = finfo->internal_syms;
4509 pindex = finfo->indices;
4510 ppsection = finfo->sections;
4511 for (; esym < esymend; esym++, isym++, pindex++, ppsection++)
4512 {
4513 asection *isec;
4514 const char *name;
4515 Elf_Internal_Sym osym;
4516
4517 elf_swap_symbol_in (input_bfd, esym, isym);
4518 *pindex = -1;
4519
4520 if (elf_bad_symtab (input_bfd))
4521 {
4522 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
4523 {
4524 *ppsection = NULL;
4525 continue;
4526 }
4527 }
4528
4529 if (isym->st_shndx == SHN_UNDEF)
4530 isec = bfd_und_section_ptr;
4531 else if (isym->st_shndx > 0 && isym->st_shndx < SHN_LORESERVE)
4532 isec = section_from_elf_index (input_bfd, isym->st_shndx);
4533 else if (isym->st_shndx == SHN_ABS)
4534 isec = bfd_abs_section_ptr;
4535 else if (isym->st_shndx == SHN_COMMON)
4536 isec = bfd_com_section_ptr;
4537 else
4538 {
4539 /* Who knows? */
4540 isec = NULL;
4541 }
4542
4543 *ppsection = isec;
4544
4545 /* Don't output the first, undefined, symbol. */
c86158e5 4546 if (esym == external_syms)
ede4eed4
KR
4547 continue;
4548
4549 /* If we are stripping all symbols, we don't want to output this
4550 one. */
4551 if (finfo->info->strip == strip_all)
4552 continue;
4553
4554 /* We never output section symbols. Instead, we use the section
4555 symbol of the corresponding section in the output file. */
4556 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
4557 continue;
4558
4559 /* If we are discarding all local symbols, we don't want to
4560 output this one. If we are generating a relocateable output
4561 file, then some of the local symbols may be required by
4562 relocs; we output them below as we discover that they are
4563 needed. */
4564 if (finfo->info->discard == discard_all)
4565 continue;
4566
258b1f5d 4567 /* If this symbol is defined in a section which we are
fa802cb0
ILT
4568 discarding, we don't need to keep it, but note that
4569 linker_mark is only reliable for sections that have contents.
4570 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
4571 as well as linker_mark. */
258b1f5d
ILT
4572 if (isym->st_shndx > 0
4573 && isym->st_shndx < SHN_LORESERVE
4574 && isec != NULL
fa802cb0 4575 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
258b1f5d
ILT
4576 || (! finfo->info->relocateable
4577 && (isec->flags & SEC_EXCLUDE) != 0)))
4578 continue;
4579
ede4eed4
KR
4580 /* Get the name of the symbol. */
4581 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
258b1f5d 4582 isym->st_name);
ede4eed4
KR
4583 if (name == NULL)
4584 return false;
4585
4586 /* See if we are discarding symbols with this name. */
4587 if ((finfo->info->strip == strip_some
4588 && (bfd_hash_lookup (finfo->info->keep_hash, name, false, false)
4589 == NULL))
4590 || (finfo->info->discard == discard_l
e316f514 4591 && bfd_is_local_label_name (input_bfd, name)))
ede4eed4
KR
4592 continue;
4593
4594 /* If we get here, we are going to output this symbol. */
4595
4596 osym = *isym;
4597
4598 /* Adjust the section index for the output file. */
4599 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
4600 isec->output_section);
4601 if (osym.st_shndx == (unsigned short) -1)
4602 return false;
4603
4604 *pindex = output_bfd->symcount;
4605
4606 /* ELF symbols in relocateable files are section relative, but
4607 in executable files they are virtual addresses. Note that
4608 this code assumes that all ELF sections have an associated
4609 BFD section with a reasonable value for output_offset; below
4610 we assume that they also have a reasonable value for
4611 output_section. Any special sections must be set up to meet
4612 these requirements. */
4613 osym.st_value += isec->output_offset;
4614 if (! finfo->info->relocateable)
4615 osym.st_value += isec->output_section->vma;
4616
4617 if (! elf_link_output_sym (finfo, name, &osym, isec))
4618 return false;
4619 }
4620
4621 /* Relocate the contents of each section. */
4622 for (o = input_bfd->sections; o != NULL; o = o->next)
4623 {
c86158e5
ILT
4624 bfd_byte *contents;
4625
ff0e4a93 4626 if (! o->linker_mark)
7ec49f91
ILT
4627 {
4628 /* This section was omitted from the link. */
4629 continue;
4630 }
4631
1726b8f0
ILT
4632 if ((o->flags & SEC_HAS_CONTENTS) == 0
4633 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
ede4eed4
KR
4634 continue;
4635
ff12f303 4636 if ((o->flags & SEC_LINKER_CREATED) != 0)
ede4eed4 4637 {
ff12f303
ILT
4638 /* Section was created by elf_link_create_dynamic_sections
4639 or somesuch. */
ede4eed4
KR
4640 continue;
4641 }
4642
c86158e5
ILT
4643 /* Get the contents of the section. They have been cached by a
4644 relaxation routine. Note that o is a section in an input
4645 file, so the contents field will not have been set by any of
4646 the routines which work on output files. */
4647 if (elf_section_data (o)->this_hdr.contents != NULL)
4648 contents = elf_section_data (o)->this_hdr.contents;
4649 else
4650 {
4651 contents = finfo->contents;
4652 if (! bfd_get_section_contents (input_bfd, o, contents,
4653 (file_ptr) 0, o->_raw_size))
4654 return false;
4655 }
ede4eed4
KR
4656
4657 if ((o->flags & SEC_RELOC) != 0)
4658 {
4659 Elf_Internal_Rela *internal_relocs;
4660
4661 /* Get the swapped relocs. */
c86158e5
ILT
4662 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
4663 (input_bfd, o, finfo->external_relocs,
4664 finfo->internal_relocs, false));
ede4eed4
KR
4665 if (internal_relocs == NULL
4666 && o->reloc_count > 0)
4667 return false;
4668
4669 /* Relocate the section by invoking a back end routine.
4670
4671 The back end routine is responsible for adjusting the
4672 section contents as necessary, and (if using Rela relocs
4673 and generating a relocateable output file) adjusting the
4674 reloc addend as necessary.
4675
4676 The back end routine does not have to worry about setting
4677 the reloc address or the reloc symbol index.
4678
4679 The back end routine is given a pointer to the swapped in
4680 internal symbols, and can access the hash table entries
4681 for the external symbols via elf_sym_hashes (input_bfd).
4682
4683 When generating relocateable output, the back end routine
4684 must handle STB_LOCAL/STT_SECTION symbols specially. The
4685 output symbol is going to be a section symbol
4686 corresponding to the output section, which will require
4687 the addend to be adjusted. */
4688
4689 if (! (*relocate_section) (output_bfd, finfo->info,
c86158e5 4690 input_bfd, o, contents,
ede4eed4
KR
4691 internal_relocs,
4692 finfo->internal_syms,
4693 finfo->sections))
4694 return false;
4695
4696 if (finfo->info->relocateable)
4697 {
4698 Elf_Internal_Rela *irela;
4699 Elf_Internal_Rela *irelaend;
4700 struct elf_link_hash_entry **rel_hash;
4701 Elf_Internal_Shdr *input_rel_hdr;
4702 Elf_Internal_Shdr *output_rel_hdr;
4703
4704 /* Adjust the reloc addresses and symbol indices. */
4705
4706 irela = internal_relocs;
4707 irelaend = irela + o->reloc_count;
4708 rel_hash = (elf_section_data (o->output_section)->rel_hashes
4709 + o->output_section->reloc_count);
4710 for (; irela < irelaend; irela++, rel_hash++)
4711 {
ae115e51 4712 unsigned long r_symndx;
ede4eed4
KR
4713 Elf_Internal_Sym *isym;
4714 asection *sec;
4715
4716 irela->r_offset += o->output_offset;
4717
4718 r_symndx = ELF_R_SYM (irela->r_info);
4719
4720 if (r_symndx == 0)
4721 continue;
4722
4723 if (r_symndx >= locsymcount
4724 || (elf_bad_symtab (input_bfd)
4725 && finfo->sections[r_symndx] == NULL))
4726 {
4727 long indx;
4728
4729 /* This is a reloc against a global symbol. We
4730 have not yet output all the local symbols, so
4731 we do not know the symbol index of any global
4732 symbol. We set the rel_hash entry for this
4733 reloc to point to the global hash table entry
4734 for this symbol. The symbol index is then
4735 set at the end of elf_bfd_final_link. */
4736 indx = r_symndx - extsymoff;
4737 *rel_hash = elf_sym_hashes (input_bfd)[indx];
4738
4739 /* Setting the index to -2 tells
4740 elf_link_output_extsym that this symbol is
4741 used by a reloc. */
4742 BFD_ASSERT ((*rel_hash)->indx < 0);
4743 (*rel_hash)->indx = -2;
4744
4745 continue;
4746 }
4747
4748 /* This is a reloc against a local symbol. */
4749
4750 *rel_hash = NULL;
4751 isym = finfo->internal_syms + r_symndx;
4752 sec = finfo->sections[r_symndx];
4753 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
4754 {
4755 /* I suppose the backend ought to fill in the
4756 section of any STT_SECTION symbol against a
ba4a4594
ILT
4757 processor specific section. If we have
4758 discarded a section, the output_section will
4759 be the absolute section. */
4760 if (sec != NULL
4761 && (bfd_is_abs_section (sec)
4762 || (sec->output_section != NULL
4763 && bfd_is_abs_section (sec->output_section))))
ede4eed4
KR
4764 r_symndx = 0;
4765 else if (sec == NULL || sec->owner == NULL)
4766 {
4767 bfd_set_error (bfd_error_bad_value);
4768 return false;
4769 }
4770 else
4771 {
4772 r_symndx = sec->output_section->target_index;
4773 BFD_ASSERT (r_symndx != 0);
4774 }
4775 }
4776 else
4777 {
4778 if (finfo->indices[r_symndx] == -1)
4779 {
4780 unsigned long link;
4781 const char *name;
4782 asection *osec;
4783
4784 if (finfo->info->strip == strip_all)
4785 {
4786 /* You can't do ld -r -s. */
4787 bfd_set_error (bfd_error_invalid_operation);
4788 return false;
4789 }
4790
4791 /* This symbol was skipped earlier, but
4792 since it is needed by a reloc, we
4793 must output it now. */
4794 link = symtab_hdr->sh_link;
4795 name = bfd_elf_string_from_elf_section (input_bfd,
4796 link,
4797 isym->st_name);
4798 if (name == NULL)
4799 return false;
4800
4801 osec = sec->output_section;
4802 isym->st_shndx =
4803 _bfd_elf_section_from_bfd_section (output_bfd,
4804 osec);
4805 if (isym->st_shndx == (unsigned short) -1)
4806 return false;
4807
4808 isym->st_value += sec->output_offset;
4809 if (! finfo->info->relocateable)
4810 isym->st_value += osec->vma;
4811
4812 finfo->indices[r_symndx] = output_bfd->symcount;
4813
4814 if (! elf_link_output_sym (finfo, name, isym, sec))
4815 return false;
4816 }
4817
4818 r_symndx = finfo->indices[r_symndx];
4819 }
4820
4821 irela->r_info = ELF_R_INFO (r_symndx,
4822 ELF_R_TYPE (irela->r_info));
4823 }
4824
4825 /* Swap out the relocs. */
4826 input_rel_hdr = &elf_section_data (o)->rel_hdr;
4827 output_rel_hdr = &elf_section_data (o->output_section)->rel_hdr;
4828 BFD_ASSERT (output_rel_hdr->sh_entsize
4829 == input_rel_hdr->sh_entsize);
4830 irela = internal_relocs;
4831 irelaend = irela + o->reloc_count;
4832 if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
4833 {
4834 Elf_External_Rel *erel;
4835
4836 erel = ((Elf_External_Rel *) output_rel_hdr->contents
4837 + o->output_section->reloc_count);
4838 for (; irela < irelaend; irela++, erel++)
4839 {
4840 Elf_Internal_Rel irel;
4841
4842 irel.r_offset = irela->r_offset;
4843 irel.r_info = irela->r_info;
4844 BFD_ASSERT (irela->r_addend == 0);
4845 elf_swap_reloc_out (output_bfd, &irel, erel);
4846 }
4847 }
4848 else
4849 {
4850 Elf_External_Rela *erela;
4851
4852 BFD_ASSERT (input_rel_hdr->sh_entsize
4853 == sizeof (Elf_External_Rela));
4854 erela = ((Elf_External_Rela *) output_rel_hdr->contents
4855 + o->output_section->reloc_count);
4856 for (; irela < irelaend; irela++, erela++)
4857 elf_swap_reloca_out (output_bfd, irela, erela);
4858 }
4859
4860 o->output_section->reloc_count += o->reloc_count;
4861 }
4862 }
4863
4864 /* Write out the modified section contents. */
1726b8f0
ILT
4865 if (elf_section_data (o)->stab_info == NULL)
4866 {
4867 if (! bfd_set_section_contents (output_bfd, o->output_section,
c86158e5 4868 contents, o->output_offset,
1726b8f0
ILT
4869 (o->_cooked_size != 0
4870 ? o->_cooked_size
4871 : o->_raw_size)))
4872 return false;
4873 }
4874 else
4875 {
3cd5cf3d
ILT
4876 if (! (_bfd_write_section_stabs
4877 (output_bfd, &elf_hash_table (finfo->info)->stab_info,
4878 o, &elf_section_data (o)->stab_info, contents)))
1726b8f0
ILT
4879 return false;
4880 }
ede4eed4
KR
4881 }
4882
4883 return true;
4884}
4885
4886/* Generate a reloc when linking an ELF file. This is a reloc
4887 requested by the linker, and does come from any input file. This
4888 is used to build constructor and destructor tables when linking
4889 with -Ur. */
4890
4891static boolean
4892elf_reloc_link_order (output_bfd, info, output_section, link_order)
4893 bfd *output_bfd;
4894 struct bfd_link_info *info;
4895 asection *output_section;
4896 struct bfd_link_order *link_order;
4897{
4898 reloc_howto_type *howto;
4899 long indx;
4900 bfd_vma offset;
5b3b9ff6 4901 bfd_vma addend;
ede4eed4
KR
4902 struct elf_link_hash_entry **rel_hash_ptr;
4903 Elf_Internal_Shdr *rel_hdr;
4904
4905 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
4906 if (howto == NULL)
4907 {
4908 bfd_set_error (bfd_error_bad_value);
4909 return false;
4910 }
4911
5b3b9ff6
ILT
4912 addend = link_order->u.reloc.p->addend;
4913
4914 /* Figure out the symbol index. */
4915 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
4916 + output_section->reloc_count);
4917 if (link_order->type == bfd_section_reloc_link_order)
4918 {
4919 indx = link_order->u.reloc.p->u.section->target_index;
4920 BFD_ASSERT (indx != 0);
4921 *rel_hash_ptr = NULL;
4922 }
4923 else
4924 {
4925 struct elf_link_hash_entry *h;
4926
4927 /* Treat a reloc against a defined symbol as though it were
4928 actually against the section. */
8881b321
ILT
4929 h = ((struct elf_link_hash_entry *)
4930 bfd_wrapped_link_hash_lookup (output_bfd, info,
4931 link_order->u.reloc.p->u.name,
4932 false, false, true));
5b3b9ff6
ILT
4933 if (h != NULL
4934 && (h->root.type == bfd_link_hash_defined
4935 || h->root.type == bfd_link_hash_defweak))
4936 {
4937 asection *section;
4938
4939 section = h->root.u.def.section;
4940 indx = section->output_section->target_index;
4941 *rel_hash_ptr = NULL;
4942 /* It seems that we ought to add the symbol value to the
4943 addend here, but in practice it has already been added
4944 because it was passed to constructor_callback. */
4945 addend += section->output_section->vma + section->output_offset;
4946 }
4947 else if (h != NULL)
4948 {
4949 /* Setting the index to -2 tells elf_link_output_extsym that
4950 this symbol is used by a reloc. */
4951 h->indx = -2;
4952 *rel_hash_ptr = h;
4953 indx = 0;
4954 }
4955 else
4956 {
4957 if (! ((*info->callbacks->unattached_reloc)
4958 (info, link_order->u.reloc.p->u.name, (bfd *) NULL,
4959 (asection *) NULL, (bfd_vma) 0)))
4960 return false;
4961 indx = 0;
4962 }
4963 }
4964
ede4eed4
KR
4965 /* If this is an inplace reloc, we must write the addend into the
4966 object file. */
5b3b9ff6 4967 if (howto->partial_inplace && addend != 0)
ede4eed4
KR
4968 {
4969 bfd_size_type size;
4970 bfd_reloc_status_type rstat;
4971 bfd_byte *buf;
4972 boolean ok;
4973
4974 size = bfd_get_reloc_size (howto);
4975 buf = (bfd_byte *) bfd_zmalloc (size);
4976 if (buf == (bfd_byte *) NULL)
a9713b91 4977 return false;
5b3b9ff6 4978 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
ede4eed4
KR
4979 switch (rstat)
4980 {
4981 case bfd_reloc_ok:
4982 break;
4983 default:
4984 case bfd_reloc_outofrange:
4985 abort ();
4986 case bfd_reloc_overflow:
4987 if (! ((*info->callbacks->reloc_overflow)
4988 (info,
4989 (link_order->type == bfd_section_reloc_link_order
4990 ? bfd_section_name (output_bfd,
4991 link_order->u.reloc.p->u.section)
4992 : link_order->u.reloc.p->u.name),
5b3b9ff6
ILT
4993 howto->name, addend, (bfd *) NULL, (asection *) NULL,
4994 (bfd_vma) 0)))
ede4eed4
KR
4995 {
4996 free (buf);
4997 return false;
4998 }
4999 break;
5000 }
5001 ok = bfd_set_section_contents (output_bfd, output_section, (PTR) buf,
5002 (file_ptr) link_order->offset, size);
5003 free (buf);
5004 if (! ok)
5005 return false;
5006 }
5007
ede4eed4
KR
5008 /* The address of a reloc is relative to the section in a
5009 relocateable file, and is a virtual address in an executable
5010 file. */
5011 offset = link_order->offset;
5012 if (! info->relocateable)
5013 offset += output_section->vma;
5014
5015 rel_hdr = &elf_section_data (output_section)->rel_hdr;
5016
5017 if (rel_hdr->sh_type == SHT_REL)
5018 {
5019 Elf_Internal_Rel irel;
5020 Elf_External_Rel *erel;
5021
5022 irel.r_offset = offset;
5023 irel.r_info = ELF_R_INFO (indx, howto->type);
5024 erel = ((Elf_External_Rel *) rel_hdr->contents
5025 + output_section->reloc_count);
5026 elf_swap_reloc_out (output_bfd, &irel, erel);
5027 }
5028 else
5029 {
5030 Elf_Internal_Rela irela;
5031 Elf_External_Rela *erela;
5032
5033 irela.r_offset = offset;
5034 irela.r_info = ELF_R_INFO (indx, howto->type);
5b3b9ff6 5035 irela.r_addend = addend;
ede4eed4
KR
5036 erela = ((Elf_External_Rela *) rel_hdr->contents
5037 + output_section->reloc_count);
5038 elf_swap_reloca_out (output_bfd, &irela, erela);
5039 }
5040
5041 ++output_section->reloc_count;
5042
5043 return true;
5044}
5045
3b3753b8
MM
5046\f
5047/* Allocate a pointer to live in a linker created section. */
5048
5049boolean
5050elf_create_pointer_linker_section (abfd, info, lsect, h, rel)
5051 bfd *abfd;
5052 struct bfd_link_info *info;
5053 elf_linker_section_t *lsect;
5054 struct elf_link_hash_entry *h;
5055 const Elf_Internal_Rela *rel;
5056{
5057 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
5058 elf_linker_section_pointers_t *linker_section_ptr;
5059 unsigned long r_symndx = ELF_R_SYM (rel->r_info);;
5060
5061 BFD_ASSERT (lsect != NULL);
5062
5063 /* Is this a global symbol? */
5064 if (h != NULL)
5065 {
5066 /* Has this symbol already been allocated, if so, our work is done */
5067 if (_bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
5068 rel->r_addend,
5069 lsect->which))
5070 return true;
5071
5072 ptr_linker_section_ptr = &h->linker_section_pointer;
5073 /* Make sure this symbol is output as a dynamic symbol. */
5074 if (h->dynindx == -1)
5075 {
5076 if (! elf_link_record_dynamic_symbol (info, h))
5077 return false;
5078 }
5079
eb82bc60
MM
5080 if (lsect->rel_section)
5081 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
3b3753b8
MM
5082 }
5083
5084 else /* Allocation of a pointer to a local symbol */
5085 {
5086 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
5087
5088 /* Allocate a table to hold the local symbols if first time */
5089 if (!ptr)
5090 {
5091 int num_symbols = elf_tdata (abfd)->symtab_hdr.sh_info;
5092 register unsigned int i;
5093
5094 ptr = (elf_linker_section_pointers_t **)
5095 bfd_alloc (abfd, num_symbols * sizeof (elf_linker_section_pointers_t *));
5096
5097 if (!ptr)
5098 return false;
5099
5100 elf_local_ptr_offsets (abfd) = ptr;
5101 for (i = 0; i < num_symbols; i++)
5102 ptr[i] = (elf_linker_section_pointers_t *)0;
5103 }
5104
5105 /* Has this symbol already been allocated, if so, our work is done */
5106 if (_bfd_elf_find_pointer_linker_section (ptr[r_symndx],
5107 rel->r_addend,
5108 lsect->which))
5109 return true;
5110
5111 ptr_linker_section_ptr = &ptr[r_symndx];
5112
5113 if (info->shared)
5114 {
5115 /* If we are generating a shared object, we need to
05f927dd 5116 output a R_<xxx>_RELATIVE reloc so that the
3b3753b8
MM
5117 dynamic linker can adjust this GOT entry. */
5118 BFD_ASSERT (lsect->rel_section != NULL);
5119 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
5120 }
5121 }
5122
5123 /* Allocate space for a pointer in the linker section, and allocate a new pointer record
5124 from internal memory. */
5125 BFD_ASSERT (ptr_linker_section_ptr != NULL);
5126 linker_section_ptr = (elf_linker_section_pointers_t *)
5127 bfd_alloc (abfd, sizeof (elf_linker_section_pointers_t));
5128
5129 if (!linker_section_ptr)
5130 return false;
5131
5132 linker_section_ptr->next = *ptr_linker_section_ptr;
5133 linker_section_ptr->addend = rel->r_addend;
5134 linker_section_ptr->which = lsect->which;
5135 linker_section_ptr->written_address_p = false;
5136 *ptr_linker_section_ptr = linker_section_ptr;
5137
cb73f5d7 5138#if 0
3b3753b8
MM
5139 if (lsect->hole_size && lsect->hole_offset < lsect->max_hole_offset)
5140 {
cb73f5d7 5141 linker_section_ptr->offset = lsect->section->_raw_size - lsect->hole_size + (ARCH_SIZE / 8);
3b3753b8
MM
5142 lsect->hole_offset += ARCH_SIZE / 8;
5143 lsect->sym_offset += ARCH_SIZE / 8;
5144 if (lsect->sym_hash) /* Bump up symbol value if needed */
4a4953f5
MM
5145 {
5146 lsect->sym_hash->root.u.def.value += ARCH_SIZE / 8;
5147#ifdef DEBUG
5148 fprintf (stderr, "Bump up %s by %ld, current value = %ld\n",
5149 lsect->sym_hash->root.root.string,
5150 (long)ARCH_SIZE / 8,
5151 (long)lsect->sym_hash->root.u.def.value);
5152#endif
5153 }
3b3753b8
MM
5154 }
5155 else
cb73f5d7 5156#endif
3b3753b8
MM
5157 linker_section_ptr->offset = lsect->section->_raw_size;
5158
5159 lsect->section->_raw_size += ARCH_SIZE / 8;
5160
5161#ifdef DEBUG
5162 fprintf (stderr, "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
5163 lsect->name, (long)linker_section_ptr->offset, (long)lsect->section->_raw_size);
5164#endif
5165
5166 return true;
5167}
5168
5169\f
5170#if ARCH_SIZE==64
5171#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_64 (BFD, VAL, ADDR)
5172#endif
5173#if ARCH_SIZE==32
5174#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_32 (BFD, VAL, ADDR)
5175#endif
5176
5177/* Fill in the address for a pointer generated in alinker section. */
5178
5179bfd_vma
5180elf_finish_pointer_linker_section (output_bfd, input_bfd, info, lsect, h, relocation, rel, relative_reloc)
5181 bfd *output_bfd;
5182 bfd *input_bfd;
5183 struct bfd_link_info *info;
5184 elf_linker_section_t *lsect;
5185 struct elf_link_hash_entry *h;
5186 bfd_vma relocation;
5187 const Elf_Internal_Rela *rel;
5188 int relative_reloc;
5189{
5190 elf_linker_section_pointers_t *linker_section_ptr;
5191
5192 BFD_ASSERT (lsect != NULL);
5193
3b3753b8
MM
5194 if (h != NULL) /* global symbol */
5195 {
5196 linker_section_ptr = _bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
5197 rel->r_addend,
5198 lsect->which);
5199
5200 BFD_ASSERT (linker_section_ptr != NULL);
5201
5202 if (! elf_hash_table (info)->dynamic_sections_created
5203 || (info->shared
5204 && info->symbolic
5205 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
5206 {
5207 /* This is actually a static link, or it is a
5208 -Bsymbolic link and the symbol is defined
5209 locally. We must initialize this entry in the
5210 global section.
5211
5212 When doing a dynamic link, we create a .rela.<xxx>
5213 relocation entry to initialize the value. This
5214 is done in the finish_dynamic_symbol routine. */
5215 if (!linker_section_ptr->written_address_p)
5216 {
5217 linker_section_ptr->written_address_p = true;
5218 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
5219 lsect->section->contents + linker_section_ptr->offset);
5220 }
5221 }
5222 }
5223 else /* local symbol */
5224 {
5225 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
5226 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
5227 BFD_ASSERT (elf_local_ptr_offsets (input_bfd)[r_symndx] != NULL);
5228 linker_section_ptr = _bfd_elf_find_pointer_linker_section (elf_local_ptr_offsets (input_bfd)[r_symndx],
5229 rel->r_addend,
5230 lsect->which);
5231
5232 BFD_ASSERT (linker_section_ptr != NULL);
5233
5234 /* Write out pointer if it hasn't been rewritten out before */
5235 if (!linker_section_ptr->written_address_p)
5236 {
5237 linker_section_ptr->written_address_p = true;
5238 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
5239 lsect->section->contents + linker_section_ptr->offset);
5240
5241 if (info->shared)
5242 {
5243 asection *srel = lsect->rel_section;
5244 Elf_Internal_Rela outrel;
5245
5246 /* We need to generate a relative reloc for the dynamic linker. */
5247 if (!srel)
5248 lsect->rel_section = srel = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
5249 lsect->rel_name);
5250
5251 BFD_ASSERT (srel != NULL);
5252
5253 outrel.r_offset = (lsect->section->output_section->vma
5254 + lsect->section->output_offset
5255 + linker_section_ptr->offset);
5256 outrel.r_info = ELF_R_INFO (0, relative_reloc);
5257 outrel.r_addend = 0;
5258 elf_swap_reloca_out (output_bfd, &outrel,
5a5bac64 5259 (((Elf_External_Rela *)
3b3753b8
MM
5260 lsect->section->contents)
5261 + lsect->section->reloc_count));
5262 ++lsect->section->reloc_count;
5263 }
5264 }
5265 }
5266
5267 relocation = (lsect->section->output_offset
5268 + linker_section_ptr->offset
5269 - lsect->hole_offset
5270 - lsect->sym_offset);
5271
5272#ifdef DEBUG
5273 fprintf (stderr, "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
5274 lsect->name, (long)relocation, (long)relocation);
5275#endif
5276
5277 /* Subtract out the addend, because it will get added back in by the normal
5278 processing. */
5279 return relocation - linker_section_ptr->addend;
5280}
This page took 0.468002 seconds and 4 git commands to generate.