* gdbtk-cmds.c (get_frame_name): Demangle function names, too.
[deliverable/binutils-gdb.git] / bfd / elflink.h
CommitLineData
8afe83be 1/* ELF linker support.
f6727b90 2 Copyright 1995, 1996, 1997, 1998 Free Software Foundation, Inc.
8afe83be
KR
3
4This file is part of BFD, the Binary File Descriptor library.
5
6This program is free software; you can redistribute it and/or modify
7it under the terms of the GNU General Public License as published by
8the Free Software Foundation; either version 2 of the License, or
9(at your option) any later version.
10
11This program is distributed in the hope that it will be useful,
12but WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14GNU General Public License for more details.
15
16You should have received a copy of the GNU General Public License
17along with this program; if not, write to the Free Software
943fbd5b 18Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
452a5efb 19
ede4eed4
KR
20/* ELF linker code. */
21
c19fbe0f
ILT
22/* This struct is used to pass information to routines called via
23 elf_link_hash_traverse which must return failure. */
24
25struct elf_info_failed
26{
27 boolean failed;
28 struct bfd_link_info *info;
29};
30
ede4eed4
KR
31static boolean elf_link_add_object_symbols
32 PARAMS ((bfd *, struct bfd_link_info *));
33static boolean elf_link_add_archive_symbols
34 PARAMS ((bfd *, struct bfd_link_info *));
044d7d49
ILT
35static boolean elf_merge_symbol
36 PARAMS ((bfd *, struct bfd_link_info *, const char *, Elf_Internal_Sym *,
37 asection **, bfd_vma *, struct elf_link_hash_entry **,
38 boolean *, boolean *, boolean *));
ede4eed4
KR
39static boolean elf_export_symbol
40 PARAMS ((struct elf_link_hash_entry *, PTR));
c19fbe0f
ILT
41static boolean elf_fix_symbol_flags
42 PARAMS ((struct elf_link_hash_entry *, struct elf_info_failed *));
ede4eed4
KR
43static boolean elf_adjust_dynamic_symbol
44 PARAMS ((struct elf_link_hash_entry *, PTR));
d044b40a
ILT
45static boolean elf_link_find_version_dependencies
46 PARAMS ((struct elf_link_hash_entry *, PTR));
47static boolean elf_link_find_version_dependencies
48 PARAMS ((struct elf_link_hash_entry *, PTR));
49static boolean elf_link_assign_sym_version
50 PARAMS ((struct elf_link_hash_entry *, PTR));
51static boolean elf_link_renumber_dynsyms
52 PARAMS ((struct elf_link_hash_entry *, PTR));
ede4eed4 53
ede4eed4
KR
54/* Given an ELF BFD, add symbols to the global hash table as
55 appropriate. */
56
57boolean
58elf_bfd_link_add_symbols (abfd, info)
59 bfd *abfd;
60 struct bfd_link_info *info;
61{
ede4eed4
KR
62 switch (bfd_get_format (abfd))
63 {
64 case bfd_object:
65 return elf_link_add_object_symbols (abfd, info);
66 case bfd_archive:
ede4eed4
KR
67 return elf_link_add_archive_symbols (abfd, info);
68 default:
69 bfd_set_error (bfd_error_wrong_format);
70 return false;
71 }
72}
3b3753b8 73\f
ede4eed4
KR
74
75/* Add symbols from an ELF archive file to the linker hash table. We
76 don't use _bfd_generic_link_add_archive_symbols because of a
77 problem which arises on UnixWare. The UnixWare libc.so is an
78 archive which includes an entry libc.so.1 which defines a bunch of
79 symbols. The libc.so archive also includes a number of other
80 object files, which also define symbols, some of which are the same
81 as those defined in libc.so.1. Correct linking requires that we
82 consider each object file in turn, and include it if it defines any
83 symbols we need. _bfd_generic_link_add_archive_symbols does not do
84 this; it looks through the list of undefined symbols, and includes
85 any object file which defines them. When this algorithm is used on
86 UnixWare, it winds up pulling in libc.so.1 early and defining a
87 bunch of symbols. This means that some of the other objects in the
88 archive are not included in the link, which is incorrect since they
89 precede libc.so.1 in the archive.
90
91 Fortunately, ELF archive handling is simpler than that done by
92 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
93 oddities. In ELF, if we find a symbol in the archive map, and the
94 symbol is currently undefined, we know that we must pull in that
95 object file.
96
97 Unfortunately, we do have to make multiple passes over the symbol
98 table until nothing further is resolved. */
99
100static boolean
101elf_link_add_archive_symbols (abfd, info)
102 bfd *abfd;
103 struct bfd_link_info *info;
104{
105 symindex c;
106 boolean *defined = NULL;
107 boolean *included = NULL;
108 carsym *symdefs;
109 boolean loop;
110
111 if (! bfd_has_map (abfd))
112 {
113 /* An empty archive is a special case. */
114 if (bfd_openr_next_archived_file (abfd, (bfd *) NULL) == NULL)
115 return true;
116 bfd_set_error (bfd_error_no_armap);
117 return false;
118 }
119
120 /* Keep track of all symbols we know to be already defined, and all
121 files we know to be already included. This is to speed up the
122 second and subsequent passes. */
123 c = bfd_ardata (abfd)->symdef_count;
124 if (c == 0)
125 return true;
58142f10
ILT
126 defined = (boolean *) bfd_malloc (c * sizeof (boolean));
127 included = (boolean *) bfd_malloc (c * sizeof (boolean));
ede4eed4 128 if (defined == (boolean *) NULL || included == (boolean *) NULL)
58142f10 129 goto error_return;
ede4eed4
KR
130 memset (defined, 0, c * sizeof (boolean));
131 memset (included, 0, c * sizeof (boolean));
132
133 symdefs = bfd_ardata (abfd)->symdefs;
134
135 do
136 {
137 file_ptr last;
138 symindex i;
139 carsym *symdef;
140 carsym *symdefend;
141
142 loop = false;
143 last = -1;
144
145 symdef = symdefs;
146 symdefend = symdef + c;
147 for (i = 0; symdef < symdefend; symdef++, i++)
148 {
149 struct elf_link_hash_entry *h;
150 bfd *element;
151 struct bfd_link_hash_entry *undefs_tail;
152 symindex mark;
153
154 if (defined[i] || included[i])
155 continue;
156 if (symdef->file_offset == last)
157 {
158 included[i] = true;
159 continue;
160 }
161
162 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
163 false, false, false);
d044b40a
ILT
164
165 if (h == NULL)
166 {
167 char *p, *copy;
168
169 /* If this is a default version (the name contains @@),
170 look up the symbol again without the version. The
171 effect is that references to the symbol without the
172 version will be matched by the default symbol in the
173 archive. */
174
175 p = strchr (symdef->name, ELF_VER_CHR);
176 if (p == NULL || p[1] != ELF_VER_CHR)
177 continue;
178
179 copy = bfd_alloc (abfd, p - symdef->name + 1);
180 if (copy == NULL)
181 goto error_return;
182 memcpy (copy, symdef->name, p - symdef->name);
183 copy[p - symdef->name] = '\0';
184
185 h = elf_link_hash_lookup (elf_hash_table (info), copy,
186 false, false, false);
187
188 bfd_release (abfd, copy);
189 }
190
191 if (h == NULL)
ede4eed4 192 continue;
d044b40a 193
ede4eed4
KR
194 if (h->root.type != bfd_link_hash_undefined)
195 {
68807a39
ILT
196 if (h->root.type != bfd_link_hash_undefweak)
197 defined[i] = true;
ede4eed4
KR
198 continue;
199 }
200
201 /* We need to include this archive member. */
202
203 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
204 if (element == (bfd *) NULL)
205 goto error_return;
206
207 if (! bfd_check_format (element, bfd_object))
208 goto error_return;
209
210 /* Doublecheck that we have not included this object
211 already--it should be impossible, but there may be
212 something wrong with the archive. */
213 if (element->archive_pass != 0)
214 {
215 bfd_set_error (bfd_error_bad_value);
216 goto error_return;
217 }
218 element->archive_pass = 1;
219
220 undefs_tail = info->hash->undefs_tail;
221
222 if (! (*info->callbacks->add_archive_element) (info, element,
223 symdef->name))
224 goto error_return;
225 if (! elf_link_add_object_symbols (element, info))
226 goto error_return;
227
228 /* If there are any new undefined symbols, we need to make
229 another pass through the archive in order to see whether
230 they can be defined. FIXME: This isn't perfect, because
231 common symbols wind up on undefs_tail and because an
232 undefined symbol which is defined later on in this pass
233 does not require another pass. This isn't a bug, but it
234 does make the code less efficient than it could be. */
235 if (undefs_tail != info->hash->undefs_tail)
236 loop = true;
237
238 /* Look backward to mark all symbols from this object file
239 which we have already seen in this pass. */
240 mark = i;
241 do
242 {
243 included[mark] = true;
244 if (mark == 0)
245 break;
246 --mark;
247 }
248 while (symdefs[mark].file_offset == symdef->file_offset);
249
250 /* We mark subsequent symbols from this object file as we go
251 on through the loop. */
252 last = symdef->file_offset;
253 }
254 }
255 while (loop);
256
257 free (defined);
258 free (included);
259
260 return true;
261
262 error_return:
263 if (defined != (boolean *) NULL)
264 free (defined);
265 if (included != (boolean *) NULL)
266 free (included);
267 return false;
268}
269
044d7d49
ILT
270/* This function is called when we want to define a new symbol. It
271 handles the various cases which arise when we find a definition in
272 a dynamic object, or when there is already a definition in a
273 dynamic object. The new symbol is described by NAME, SYM, PSEC,
274 and PVALUE. We set SYM_HASH to the hash table entry. We set
275 OVERRIDE if the old symbol is overriding a new definition. We set
276 TYPE_CHANGE_OK if it is OK for the type to change. We set
277 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
278 change, we mean that we shouldn't warn if the type or size does
279 change. */
280
281static boolean
282elf_merge_symbol (abfd, info, name, sym, psec, pvalue, sym_hash,
283 override, type_change_ok, size_change_ok)
284 bfd *abfd;
285 struct bfd_link_info *info;
286 const char *name;
287 Elf_Internal_Sym *sym;
288 asection **psec;
289 bfd_vma *pvalue;
290 struct elf_link_hash_entry **sym_hash;
291 boolean *override;
292 boolean *type_change_ok;
293 boolean *size_change_ok;
294{
295 asection *sec;
296 struct elf_link_hash_entry *h;
297 int bind;
298 bfd *oldbfd;
299 boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
300
044d7d49 301 *override = false;
044d7d49
ILT
302
303 sec = *psec;
304 bind = ELF_ST_BIND (sym->st_info);
305
306 if (! bfd_is_und_section (sec))
307 h = elf_link_hash_lookup (elf_hash_table (info), name, true, false, false);
308 else
309 h = ((struct elf_link_hash_entry *)
310 bfd_wrapped_link_hash_lookup (abfd, info, name, true, false, false));
311 if (h == NULL)
312 return false;
313 *sym_hash = h;
314
3359a0bc
ILT
315 /* This code is for coping with dynamic objects, and is only useful
316 if we are doing an ELF link. */
317 if (info->hash->creator != abfd->xvec)
318 return true;
319
e9982ee5
ILT
320 /* For merging, we only care about real symbols. */
321
322 while (h->root.type == bfd_link_hash_indirect
323 || h->root.type == bfd_link_hash_warning)
324 h = (struct elf_link_hash_entry *) h->root.u.i.link;
325
044d7d49
ILT
326 /* If we just created the symbol, mark it as being an ELF symbol.
327 Other than that, there is nothing to do--there is no merge issue
328 with a newly defined symbol--so we just return. */
329
330 if (h->root.type == bfd_link_hash_new)
331 {
332 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
333 return true;
334 }
335
044d7d49
ILT
336 /* OLDBFD is a BFD associated with the existing symbol. */
337
338 switch (h->root.type)
339 {
340 default:
341 oldbfd = NULL;
342 break;
343
344 case bfd_link_hash_undefined:
345 case bfd_link_hash_undefweak:
346 oldbfd = h->root.u.undef.abfd;
347 break;
348
349 case bfd_link_hash_defined:
350 case bfd_link_hash_defweak:
351 oldbfd = h->root.u.def.section->owner;
352 break;
353
354 case bfd_link_hash_common:
355 oldbfd = h->root.u.c.p->section->owner;
356 break;
357 }
358
359 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
360 respectively, is from a dynamic object. */
361
362 if ((abfd->flags & DYNAMIC) != 0)
363 newdyn = true;
364 else
365 newdyn = false;
366
367 if (oldbfd == NULL || (oldbfd->flags & DYNAMIC) == 0)
368 olddyn = false;
369 else
370 olddyn = true;
371
372 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
373 respectively, appear to be a definition rather than reference. */
374
375 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
376 newdef = false;
377 else
378 newdef = true;
379
380 if (h->root.type == bfd_link_hash_undefined
381 || h->root.type == bfd_link_hash_undefweak
382 || h->root.type == bfd_link_hash_common)
383 olddef = false;
384 else
385 olddef = true;
386
387 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
388 symbol, respectively, appears to be a common symbol in a dynamic
389 object. If a symbol appears in an uninitialized section, and is
390 not weak, and is not a function, then it may be a common symbol
391 which was resolved when the dynamic object was created. We want
392 to treat such symbols specially, because they raise special
393 considerations when setting the symbol size: if the symbol
394 appears as a common symbol in a regular object, and the size in
395 the regular object is larger, we must make sure that we use the
396 larger size. This problematic case can always be avoided in C,
397 but it must be handled correctly when using Fortran shared
398 libraries.
399
400 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
401 likewise for OLDDYNCOMMON and OLDDEF.
402
403 Note that this test is just a heuristic, and that it is quite
404 possible to have an uninitialized symbol in a shared object which
405 is really a definition, rather than a common symbol. This could
406 lead to some minor confusion when the symbol really is a common
407 symbol in some regular object. However, I think it will be
408 harmless. */
409
410 if (newdyn
411 && newdef
412 && (sec->flags & SEC_ALLOC) != 0
413 && (sec->flags & SEC_LOAD) == 0
414 && sym->st_size > 0
415 && bind != STB_WEAK
416 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
417 newdyncommon = true;
418 else
419 newdyncommon = false;
420
421 if (olddyn
422 && olddef
423 && h->root.type == bfd_link_hash_defined
424 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
425 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
426 && (h->root.u.def.section->flags & SEC_LOAD) == 0
427 && h->size > 0
428 && h->type != STT_FUNC)
429 olddyncommon = true;
430 else
431 olddyncommon = false;
432
433 /* It's OK to change the type if either the existing symbol or the
434 new symbol is weak. */
435
436 if (h->root.type == bfd_link_hash_defweak
437 || h->root.type == bfd_link_hash_undefweak
438 || bind == STB_WEAK)
439 *type_change_ok = true;
440
441 /* It's OK to change the size if either the existing symbol or the
442 new symbol is weak, or if the old symbol is undefined. */
443
444 if (*type_change_ok
445 || h->root.type == bfd_link_hash_undefined)
446 *size_change_ok = true;
447
448 /* If both the old and the new symbols look like common symbols in a
449 dynamic object, set the size of the symbol to the larger of the
450 two. */
451
452 if (olddyncommon
453 && newdyncommon
454 && sym->st_size != h->size)
455 {
456 /* Since we think we have two common symbols, issue a multiple
457 common warning if desired. Note that we only warn if the
458 size is different. If the size is the same, we simply let
459 the old symbol override the new one as normally happens with
460 symbols defined in dynamic objects. */
461
462 if (! ((*info->callbacks->multiple_common)
463 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
464 h->size, abfd, bfd_link_hash_common, sym->st_size)))
465 return false;
466
467 if (sym->st_size > h->size)
468 h->size = sym->st_size;
469
470 *size_change_ok = true;
471 }
472
473 /* If we are looking at a dynamic object, and we have found a
474 definition, we need to see if the symbol was already defined by
475 some other object. If so, we want to use the existing
476 definition, and we do not want to report a multiple symbol
477 definition error; we do this by clobbering *PSEC to be
478 bfd_und_section_ptr.
479
480 We treat a common symbol as a definition if the symbol in the
481 shared library is a function, since common symbols always
482 represent variables; this can cause confusion in principle, but
483 any such confusion would seem to indicate an erroneous program or
484 shared library. We also permit a common symbol in a regular
485 object to override a weak symbol in a shared object. */
486
487 if (newdyn
488 && newdef
489 && (olddef
490 || (h->root.type == bfd_link_hash_common
491 && (bind == STB_WEAK
492 || ELF_ST_TYPE (sym->st_info) == STT_FUNC))))
493 {
494 *override = true;
495 newdef = false;
496 newdyncommon = false;
497
498 *psec = sec = bfd_und_section_ptr;
499 *size_change_ok = true;
500
501 /* If we get here when the old symbol is a common symbol, then
502 we are explicitly letting it override a weak symbol or
503 function in a dynamic object, and we don't want to warn about
504 a type change. If the old symbol is a defined symbol, a type
505 change warning may still be appropriate. */
506
507 if (h->root.type == bfd_link_hash_common)
508 *type_change_ok = true;
509 }
510
511 /* Handle the special case of an old common symbol merging with a
512 new symbol which looks like a common symbol in a shared object.
513 We change *PSEC and *PVALUE to make the new symbol look like a
514 common symbol, and let _bfd_generic_link_add_one_symbol will do
515 the right thing. */
516
517 if (newdyncommon
518 && h->root.type == bfd_link_hash_common)
519 {
520 *override = true;
521 newdef = false;
522 newdyncommon = false;
523 *pvalue = sym->st_size;
524 *psec = sec = bfd_com_section_ptr;
525 *size_change_ok = true;
526 }
527
528 /* If the old symbol is from a dynamic object, and the new symbol is
529 a definition which is not from a dynamic object, then the new
530 symbol overrides the old symbol. Symbols from regular files
531 always take precedence over symbols from dynamic objects, even if
532 they are defined after the dynamic object in the link.
533
534 As above, we again permit a common symbol in a regular object to
535 override a definition in a shared object if the shared object
536 symbol is a function or is weak. */
537
538 if (! newdyn
539 && (newdef
540 || (bfd_is_com_section (sec)
541 && (h->root.type == bfd_link_hash_defweak
542 || h->type == STT_FUNC)))
543 && olddyn
544 && olddef
545 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0)
546 {
547 /* Change the hash table entry to undefined, and let
548 _bfd_generic_link_add_one_symbol do the right thing with the
549 new definition. */
550
551 h->root.type = bfd_link_hash_undefined;
552 h->root.u.undef.abfd = h->root.u.def.section->owner;
553 *size_change_ok = true;
554
555 olddef = false;
556 olddyncommon = false;
557
558 /* We again permit a type change when a common symbol may be
559 overriding a function. */
560
561 if (bfd_is_com_section (sec))
562 *type_change_ok = true;
563
564 /* This union may have been set to be non-NULL when this symbol
565 was seen in a dynamic object. We must force the union to be
566 NULL, so that it is correct for a regular symbol. */
567
568 h->verinfo.vertree = NULL;
541a4b54
ILT
569
570 /* In this special case, if H is the target of an indirection,
571 we want the caller to frob with H rather than with the
572 indirect symbol. That will permit the caller to redefine the
573 target of the indirection, rather than the indirect symbol
862eaedc
ILT
574 itself. FIXME: This will break the -y option if we store a
575 symbol with a different name. */
541a4b54 576 *sym_hash = h;
044d7d49
ILT
577 }
578
579 /* Handle the special case of a new common symbol merging with an
580 old symbol that looks like it might be a common symbol defined in
581 a shared object. Note that we have already handled the case in
582 which a new common symbol should simply override the definition
583 in the shared library. */
584
585 if (! newdyn
586 && bfd_is_com_section (sec)
587 && olddyncommon)
588 {
589 /* It would be best if we could set the hash table entry to a
590 common symbol, but we don't know what to use for the section
591 or the alignment. */
592 if (! ((*info->callbacks->multiple_common)
593 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
594 h->size, abfd, bfd_link_hash_common, sym->st_size)))
595 return false;
596
597 /* If the predumed common symbol in the dynamic object is
598 larger, pretend that the new symbol has its size. */
599
600 if (h->size > *pvalue)
601 *pvalue = h->size;
602
603 /* FIXME: We no longer know the alignment required by the symbol
604 in the dynamic object, so we just wind up using the one from
605 the regular object. */
606
607 olddef = false;
608 olddyncommon = false;
609
610 h->root.type = bfd_link_hash_undefined;
611 h->root.u.undef.abfd = h->root.u.def.section->owner;
612
613 *size_change_ok = true;
614 *type_change_ok = true;
615
616 h->verinfo.vertree = NULL;
617 }
618
619 return true;
620}
621
ede4eed4
KR
622/* Add symbols from an ELF object file to the linker hash table. */
623
624static boolean
625elf_link_add_object_symbols (abfd, info)
626 bfd *abfd;
627 struct bfd_link_info *info;
628{
629 boolean (*add_symbol_hook) PARAMS ((bfd *, struct bfd_link_info *,
630 const Elf_Internal_Sym *,
631 const char **, flagword *,
632 asection **, bfd_vma *));
633 boolean (*check_relocs) PARAMS ((bfd *, struct bfd_link_info *,
634 asection *, const Elf_Internal_Rela *));
635 boolean collect;
636 Elf_Internal_Shdr *hdr;
637 size_t symcount;
638 size_t extsymcount;
639 size_t extsymoff;
640 Elf_External_Sym *buf = NULL;
641 struct elf_link_hash_entry **sym_hash;
642 boolean dynamic;
d044b40a
ILT
643 bfd_byte *dynver = NULL;
644 Elf_External_Versym *extversym = NULL;
645 Elf_External_Versym *ever;
ede4eed4
KR
646 Elf_External_Dyn *dynbuf = NULL;
647 struct elf_link_hash_entry *weaks;
648 Elf_External_Sym *esym;
649 Elf_External_Sym *esymend;
650
651 add_symbol_hook = get_elf_backend_data (abfd)->elf_add_symbol_hook;
652 collect = get_elf_backend_data (abfd)->collect;
653
d044b40a
ILT
654 if ((abfd->flags & DYNAMIC) == 0)
655 dynamic = false;
656 else
657 {
658 dynamic = true;
659
660 /* You can't use -r against a dynamic object. Also, there's no
661 hope of using a dynamic object which does not exactly match
662 the format of the output file. */
663 if (info->relocateable || info->hash->creator != abfd->xvec)
664 {
665 bfd_set_error (bfd_error_invalid_operation);
666 goto error_return;
667 }
668 }
669
0cb70568
ILT
670 /* As a GNU extension, any input sections which are named
671 .gnu.warning.SYMBOL are treated as warning symbols for the given
672 symbol. This differs from .gnu.warning sections, which generate
673 warnings when they are included in an output file. */
674 if (! info->shared)
675 {
676 asection *s;
677
678 for (s = abfd->sections; s != NULL; s = s->next)
679 {
680 const char *name;
681
682 name = bfd_get_section_name (abfd, s);
683 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
684 {
685 char *msg;
686 bfd_size_type sz;
687
54626f1a
ILT
688 name += sizeof ".gnu.warning." - 1;
689
690 /* If this is a shared object, then look up the symbol
691 in the hash table. If it is there, and it is already
692 been defined, then we will not be using the entry
693 from this shared object, so we don't need to warn.
694 FIXME: If we see the definition in a regular object
695 later on, we will warn, but we shouldn't. The only
696 fix is to keep track of what warnings we are supposed
697 to emit, and then handle them all at the end of the
698 link. */
d044b40a 699 if (dynamic && abfd->xvec == info->hash->creator)
54626f1a
ILT
700 {
701 struct elf_link_hash_entry *h;
702
703 h = elf_link_hash_lookup (elf_hash_table (info), name,
704 false, false, true);
705
706 /* FIXME: What about bfd_link_hash_common? */
707 if (h != NULL
708 && (h->root.type == bfd_link_hash_defined
709 || h->root.type == bfd_link_hash_defweak))
710 {
711 /* We don't want to issue this warning. Clobber
712 the section size so that the warning does not
713 get copied into the output file. */
714 s->_raw_size = 0;
715 continue;
716 }
717 }
718
0cb70568
ILT
719 sz = bfd_section_size (abfd, s);
720 msg = (char *) bfd_alloc (abfd, sz);
721 if (msg == NULL)
a9713b91 722 goto error_return;
0cb70568
ILT
723
724 if (! bfd_get_section_contents (abfd, s, msg, (file_ptr) 0, sz))
725 goto error_return;
726
727 if (! (_bfd_generic_link_add_one_symbol
54626f1a
ILT
728 (info, abfd, name, BSF_WARNING, s, (bfd_vma) 0, msg,
729 false, collect, (struct bfd_link_hash_entry **) NULL)))
0cb70568
ILT
730 goto error_return;
731
732 if (! info->relocateable)
733 {
734 /* Clobber the section size so that the warning does
735 not get copied into the output file. */
736 s->_raw_size = 0;
737 }
738 }
739 }
740 }
741
d044b40a
ILT
742 /* If this is a dynamic object, we always link against the .dynsym
743 symbol table, not the .symtab symbol table. The dynamic linker
744 will only see the .dynsym symbol table, so there is no reason to
745 look at .symtab for a dynamic object. */
746
747 if (! dynamic || elf_dynsymtab (abfd) == 0)
748 hdr = &elf_tdata (abfd)->symtab_hdr;
749 else
750 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
751
752 if (dynamic)
ede4eed4 753 {
d044b40a
ILT
754 /* Read in any version definitions. */
755
601acd61
UD
756 if (! _bfd_elf_slurp_version_tables (abfd))
757 goto error_return;
d044b40a
ILT
758
759 /* Read in the symbol versions, but don't bother to convert them
760 to internal format. */
761 if (elf_dynversym (abfd) != 0)
762 {
763 Elf_Internal_Shdr *versymhdr;
764
765 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
766 extversym = (Elf_External_Versym *) bfd_malloc (hdr->sh_size);
767 if (extversym == NULL)
768 goto error_return;
769 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
770 || (bfd_read ((PTR) extversym, 1, versymhdr->sh_size, abfd)
771 != versymhdr->sh_size))
772 goto error_return;
773 }
ede4eed4
KR
774 }
775
ede4eed4
KR
776 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
777
778 /* The sh_info field of the symtab header tells us where the
779 external symbols start. We don't care about the local symbols at
780 this point. */
781 if (elf_bad_symtab (abfd))
782 {
783 extsymcount = symcount;
784 extsymoff = 0;
785 }
786 else
787 {
788 extsymcount = symcount - hdr->sh_info;
789 extsymoff = hdr->sh_info;
790 }
791
58142f10
ILT
792 buf = ((Elf_External_Sym *)
793 bfd_malloc (extsymcount * sizeof (Elf_External_Sym)));
ede4eed4 794 if (buf == NULL && extsymcount != 0)
58142f10 795 goto error_return;
ede4eed4
KR
796
797 /* We store a pointer to the hash table entry for each external
798 symbol. */
799 sym_hash = ((struct elf_link_hash_entry **)
800 bfd_alloc (abfd,
801 extsymcount * sizeof (struct elf_link_hash_entry *)));
802 if (sym_hash == NULL)
a9713b91 803 goto error_return;
ede4eed4
KR
804 elf_sym_hashes (abfd) = sym_hash;
805
d044b40a 806 if (! dynamic)
ede4eed4 807 {
ede4eed4
KR
808 /* If we are creating a shared library, create all the dynamic
809 sections immediately. We need to attach them to something,
810 so we attach them to this BFD, provided it is the right
811 format. FIXME: If there are no input BFD's of the same
812 format as the output, we can't make a shared library. */
813 if (info->shared
814 && ! elf_hash_table (info)->dynamic_sections_created
815 && abfd->xvec == info->hash->creator)
816 {
817 if (! elf_link_create_dynamic_sections (abfd, info))
818 goto error_return;
819 }
820 }
821 else
822 {
823 asection *s;
824 boolean add_needed;
825 const char *name;
826 bfd_size_type oldsize;
827 bfd_size_type strindex;
828
ede4eed4
KR
829 /* Find the name to use in a DT_NEEDED entry that refers to this
830 object. If the object has a DT_SONAME entry, we use it.
831 Otherwise, if the generic linker stuck something in
60a49e7f
ILT
832 elf_dt_name, we use that. Otherwise, we just use the file
833 name. If the generic linker put a null string into
834 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
835 there is a DT_SONAME entry. */
ede4eed4
KR
836 add_needed = true;
837 name = bfd_get_filename (abfd);
60a49e7f 838 if (elf_dt_name (abfd) != NULL)
ede4eed4 839 {
60a49e7f 840 name = elf_dt_name (abfd);
ede4eed4
KR
841 if (*name == '\0')
842 add_needed = false;
843 }
844 s = bfd_get_section_by_name (abfd, ".dynamic");
845 if (s != NULL)
846 {
847 Elf_External_Dyn *extdyn;
848 Elf_External_Dyn *extdynend;
849 int elfsec;
850 unsigned long link;
851
58142f10 852 dynbuf = (Elf_External_Dyn *) bfd_malloc ((size_t) s->_raw_size);
ede4eed4 853 if (dynbuf == NULL)
58142f10 854 goto error_return;
ede4eed4
KR
855
856 if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf,
857 (file_ptr) 0, s->_raw_size))
858 goto error_return;
859
860 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
861 if (elfsec == -1)
862 goto error_return;
863 link = elf_elfsections (abfd)[elfsec]->sh_link;
864
865 extdyn = dynbuf;
866 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
867 for (; extdyn < extdynend; extdyn++)
868 {
869 Elf_Internal_Dyn dyn;
870
871 elf_swap_dyn_in (abfd, extdyn, &dyn);
60a49e7f 872 if (dyn.d_tag == DT_SONAME)
ede4eed4
KR
873 {
874 name = bfd_elf_string_from_elf_section (abfd, link,
875 dyn.d_un.d_val);
876 if (name == NULL)
877 goto error_return;
878 }
879 if (dyn.d_tag == DT_NEEDED)
880 {
54406786 881 struct bfd_link_needed_list *n, **pn;
ede4eed4
KR
882 char *fnm, *anm;
883
54406786
ILT
884 n = ((struct bfd_link_needed_list *)
885 bfd_alloc (abfd, sizeof (struct bfd_link_needed_list)));
ede4eed4
KR
886 fnm = bfd_elf_string_from_elf_section (abfd, link,
887 dyn.d_un.d_val);
888 if (n == NULL || fnm == NULL)
889 goto error_return;
890 anm = bfd_alloc (abfd, strlen (fnm) + 1);
891 if (anm == NULL)
892 goto error_return;
893 strcpy (anm, fnm);
894 n->name = anm;
895 n->by = abfd;
896 n->next = NULL;
897 for (pn = &elf_hash_table (info)->needed;
898 *pn != NULL;
899 pn = &(*pn)->next)
900 ;
901 *pn = n;
902 }
903 }
904
905 free (dynbuf);
906 dynbuf = NULL;
907 }
908
909 /* We do not want to include any of the sections in a dynamic
910 object in the output file. We hack by simply clobbering the
911 list of sections in the BFD. This could be handled more
912 cleanly by, say, a new section flag; the existing
913 SEC_NEVER_LOAD flag is not the one we want, because that one
914 still implies that the section takes up space in the output
915 file. */
916 abfd->sections = NULL;
010d9f2d 917 abfd->section_count = 0;
ede4eed4
KR
918
919 /* If this is the first dynamic object found in the link, create
920 the special sections required for dynamic linking. */
921 if (! elf_hash_table (info)->dynamic_sections_created)
922 {
923 if (! elf_link_create_dynamic_sections (abfd, info))
924 goto error_return;
925 }
926
927 if (add_needed)
928 {
929 /* Add a DT_NEEDED entry for this dynamic object. */
930 oldsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
931 strindex = _bfd_stringtab_add (elf_hash_table (info)->dynstr, name,
932 true, false);
933 if (strindex == (bfd_size_type) -1)
934 goto error_return;
935
936 if (oldsize == _bfd_stringtab_size (elf_hash_table (info)->dynstr))
937 {
938 asection *sdyn;
939 Elf_External_Dyn *dyncon, *dynconend;
940
941 /* The hash table size did not change, which means that
942 the dynamic object name was already entered. If we
943 have already included this dynamic object in the
944 link, just ignore it. There is no reason to include
945 a particular dynamic object more than once. */
946 sdyn = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
947 ".dynamic");
948 BFD_ASSERT (sdyn != NULL);
949
950 dyncon = (Elf_External_Dyn *) sdyn->contents;
951 dynconend = (Elf_External_Dyn *) (sdyn->contents +
952 sdyn->_raw_size);
953 for (; dyncon < dynconend; dyncon++)
954 {
955 Elf_Internal_Dyn dyn;
956
957 elf_swap_dyn_in (elf_hash_table (info)->dynobj, dyncon,
958 &dyn);
959 if (dyn.d_tag == DT_NEEDED
960 && dyn.d_un.d_val == strindex)
961 {
962 if (buf != NULL)
963 free (buf);
d044b40a
ILT
964 if (extversym != NULL)
965 free (extversym);
ede4eed4
KR
966 return true;
967 }
968 }
969 }
970
971 if (! elf_add_dynamic_entry (info, DT_NEEDED, strindex))
972 goto error_return;
973 }
60a49e7f
ILT
974
975 /* Save the SONAME, if there is one, because sometimes the
976 linker emulation code will need to know it. */
977 if (*name == '\0')
978 name = bfd_get_filename (abfd);
979 elf_dt_name (abfd) = name;
ede4eed4
KR
980 }
981
982 if (bfd_seek (abfd,
983 hdr->sh_offset + extsymoff * sizeof (Elf_External_Sym),
984 SEEK_SET) != 0
985 || (bfd_read ((PTR) buf, sizeof (Elf_External_Sym), extsymcount, abfd)
986 != extsymcount * sizeof (Elf_External_Sym)))
987 goto error_return;
988
989 weaks = NULL;
990
e549b1d2 991 ever = extversym != NULL ? extversym + extsymoff : NULL;
ede4eed4 992 esymend = buf + extsymcount;
d044b40a
ILT
993 for (esym = buf;
994 esym < esymend;
995 esym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
ede4eed4
KR
996 {
997 Elf_Internal_Sym sym;
998 int bind;
999 bfd_vma value;
1000 asection *sec;
1001 flagword flags;
1002 const char *name;
0cb70568 1003 struct elf_link_hash_entry *h;
ede4eed4 1004 boolean definition;
ee9f09cd 1005 boolean size_change_ok, type_change_ok;
452a5efb 1006 boolean new_weakdef;
fd6c00ba 1007 unsigned int old_alignment;
ede4eed4
KR
1008
1009 elf_swap_symbol_in (abfd, esym, &sym);
1010
1011 flags = BSF_NO_FLAGS;
1012 sec = NULL;
1013 value = sym.st_value;
1014 *sym_hash = NULL;
1015
1016 bind = ELF_ST_BIND (sym.st_info);
1017 if (bind == STB_LOCAL)
1018 {
1019 /* This should be impossible, since ELF requires that all
1020 global symbols follow all local symbols, and that sh_info
1021 point to the first global symbol. Unfortunatealy, Irix 5
1022 screws this up. */
1023 continue;
1024 }
1025 else if (bind == STB_GLOBAL)
1026 {
1027 if (sym.st_shndx != SHN_UNDEF
1028 && sym.st_shndx != SHN_COMMON)
1029 flags = BSF_GLOBAL;
1030 else
1031 flags = 0;
1032 }
1033 else if (bind == STB_WEAK)
1034 flags = BSF_WEAK;
1035 else
1036 {
1037 /* Leave it up to the processor backend. */
1038 }
1039
1040 if (sym.st_shndx == SHN_UNDEF)
1041 sec = bfd_und_section_ptr;
1042 else if (sym.st_shndx > 0 && sym.st_shndx < SHN_LORESERVE)
1043 {
1044 sec = section_from_elf_index (abfd, sym.st_shndx);
f02004e9 1045 if (sec == NULL)
ede4eed4 1046 sec = bfd_abs_section_ptr;
f02004e9
ILT
1047 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1048 value -= sec->vma;
ede4eed4
KR
1049 }
1050 else if (sym.st_shndx == SHN_ABS)
1051 sec = bfd_abs_section_ptr;
1052 else if (sym.st_shndx == SHN_COMMON)
1053 {
1054 sec = bfd_com_section_ptr;
1055 /* What ELF calls the size we call the value. What ELF
1056 calls the value we call the alignment. */
1057 value = sym.st_size;
1058 }
1059 else
1060 {
1061 /* Leave it up to the processor backend. */
1062 }
1063
1064 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, sym.st_name);
1065 if (name == (const char *) NULL)
1066 goto error_return;
1067
1068 if (add_symbol_hook)
1069 {
1070 if (! (*add_symbol_hook) (abfd, info, &sym, &name, &flags, &sec,
1071 &value))
1072 goto error_return;
1073
1074 /* The hook function sets the name to NULL if this symbol
1075 should be skipped for some reason. */
1076 if (name == (const char *) NULL)
1077 continue;
1078 }
1079
1080 /* Sanity check that all possibilities were handled. */
1081 if (sec == (asection *) NULL)
1082 {
1083 bfd_set_error (bfd_error_bad_value);
1084 goto error_return;
1085 }
1086
1087 if (bfd_is_und_section (sec)
1088 || bfd_is_com_section (sec))
1089 definition = false;
1090 else
1091 definition = true;
1092
ee9f09cd 1093 size_change_ok = false;
5b3b9ff6 1094 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
fd6c00ba 1095 old_alignment = 0;
ede4eed4
KR
1096 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1097 {
d044b40a 1098 Elf_Internal_Versym iver;
f6727b90 1099 unsigned int vernum = 0;
d044b40a
ILT
1100 boolean override;
1101
1102 if (ever != NULL)
1103 {
1104 _bfd_elf_swap_versym_in (abfd, ever, &iver);
1105 vernum = iver.vs_vers & VERSYM_VERSION;
1106
1107 /* If this is a hidden symbol, or if it is not version
1108 1, we append the version name to the symbol name.
1109 However, we do not modify a non-hidden absolute
1110 symbol, because it might be the version symbol
1111 itself. FIXME: What if it isn't? */
1112 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
1113 || (vernum > 1 && ! bfd_is_abs_section (sec)))
1114 {
1115 const char *verstr;
1116 int namelen, newlen;
1117 char *newname, *p;
1118
601acd61 1119 if (sym.st_shndx != SHN_UNDEF)
e549b1d2 1120 {
601acd61
UD
1121 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
1122 {
1123 (*_bfd_error_handler)
53d3ce37 1124 (_("%s: %s: invalid version %u (max %d)"),
601acd61
UD
1125 abfd->filename, name, vernum,
1126 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1127 bfd_set_error (bfd_error_bad_value);
1128 goto error_return;
1129 }
1130 else if (vernum > 1)
1131 verstr =
1132 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1133 else
1134 verstr = "";
e549b1d2 1135 }
d044b40a 1136 else
601acd61
UD
1137 {
1138 /* We cannot simply test for the number of
1139 entries in the VERNEED section since the
1140 numbers for the needed versions do not start
1141 at 0. */
1142 Elf_Internal_Verneed *t;
1143
1144 verstr = NULL;
1145 for (t = elf_tdata (abfd)->verref;
1146 t != NULL;
1147 t = t->vn_nextref)
1148 {
1149 Elf_Internal_Vernaux *a;
1150
1151 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1152 {
1153 if (a->vna_other == vernum)
1154 {
1155 verstr = a->vna_nodename;
1156 break;
1157 }
1158 }
1159 if (a != NULL)
1160 break;
1161 }
1162 if (verstr == NULL)
1163 {
1164 (*_bfd_error_handler)
53d3ce37 1165 (_("%s: %s: invalid needed version %d"),
601acd61
UD
1166 abfd->filename, name, vernum);
1167 bfd_set_error (bfd_error_bad_value);
1168 goto error_return;
1169 }
1170 }
d044b40a
ILT
1171
1172 namelen = strlen (name);
1173 newlen = namelen + strlen (verstr) + 2;
1174 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
1175 ++newlen;
1176
1177 newname = (char *) bfd_alloc (abfd, newlen);
1178 if (newname == NULL)
1179 goto error_return;
1180 strcpy (newname, name);
1181 p = newname + namelen;
1182 *p++ = ELF_VER_CHR;
1183 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
1184 *p++ = ELF_VER_CHR;
1185 strcpy (p, verstr);
1186
1187 name = newname;
1188 }
1189 }
1190
044d7d49
ILT
1191 if (! elf_merge_symbol (abfd, info, name, &sym, &sec, &value,
1192 sym_hash, &override, &type_change_ok,
1193 &size_change_ok))
ede4eed4 1194 goto error_return;
ede4eed4 1195
044d7d49
ILT
1196 if (override)
1197 definition = false;
869b7d80 1198
044d7d49 1199 h = *sym_hash;
0cb70568
ILT
1200 while (h->root.type == bfd_link_hash_indirect
1201 || h->root.type == bfd_link_hash_warning)
c4badc83 1202 h = (struct elf_link_hash_entry *) h->root.u.i.link;
0cb70568 1203
044d7d49
ILT
1204 /* Remember the old alignment if this is a common symbol, so
1205 that we don't reduce the alignment later on. We can't
1206 check later, because _bfd_generic_link_add_one_symbol
1207 will set a default for the alignment which we want to
1208 override. */
fd6c00ba
ILT
1209 if (h->root.type == bfd_link_hash_common)
1210 old_alignment = h->root.u.c.p->alignment_power;
1211
13eb6306 1212 if (elf_tdata (abfd)->verdef != NULL
d044b40a
ILT
1213 && ! override
1214 && vernum > 1
13eb6306 1215 && definition)
d044b40a 1216 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
ede4eed4
KR
1217 }
1218
1219 if (! (_bfd_generic_link_add_one_symbol
1220 (info, abfd, name, flags, sec, value, (const char *) NULL,
1221 false, collect, (struct bfd_link_hash_entry **) sym_hash)))
1222 goto error_return;
1223
0cb70568
ILT
1224 h = *sym_hash;
1225 while (h->root.type == bfd_link_hash_indirect
1226 || h->root.type == bfd_link_hash_warning)
1227 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1228 *sym_hash = h;
1229
452a5efb 1230 new_weakdef = false;
ede4eed4
KR
1231 if (dynamic
1232 && definition
1233 && (flags & BSF_WEAK) != 0
1234 && ELF_ST_TYPE (sym.st_info) != STT_FUNC
1235 && info->hash->creator->flavour == bfd_target_elf_flavour
0cb70568 1236 && h->weakdef == NULL)
ede4eed4
KR
1237 {
1238 /* Keep a list of all weak defined non function symbols from
1239 a dynamic object, using the weakdef field. Later in this
1240 function we will set the weakdef field to the correct
1241 value. We only put non-function symbols from dynamic
1242 objects on this list, because that happens to be the only
1243 time we need to know the normal symbol corresponding to a
1244 weak symbol, and the information is time consuming to
1245 figure out. If the weakdef field is not already NULL,
1246 then this symbol was already defined by some previous
1247 dynamic object, and we will be using that previous
1248 definition anyhow. */
1249
0cb70568
ILT
1250 h->weakdef = weaks;
1251 weaks = h;
452a5efb 1252 new_weakdef = true;
ede4eed4
KR
1253 }
1254
fd6c00ba 1255 /* Set the alignment of a common symbol. */
ede4eed4 1256 if (sym.st_shndx == SHN_COMMON
0cb70568 1257 && h->root.type == bfd_link_hash_common)
fd6c00ba
ILT
1258 {
1259 unsigned int align;
1260
1261 align = bfd_log2 (sym.st_value);
1262 if (align > old_alignment)
1263 h->root.u.c.p->alignment_power = align;
1264 }
ede4eed4
KR
1265
1266 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1267 {
1268 int old_flags;
1269 boolean dynsym;
1270 int new_flag;
1271
1272 /* Remember the symbol size and type. */
3d7c42c9
ILT
1273 if (sym.st_size != 0
1274 && (definition || h->size == 0))
ede4eed4 1275 {
ee9f09cd 1276 if (h->size != 0 && h->size != sym.st_size && ! size_change_ok)
3d7c42c9 1277 (*_bfd_error_handler)
53d3ce37 1278 (_("Warning: size of symbol `%s' changed from %lu to %lu in %s"),
ba254dc5
ILT
1279 name, (unsigned long) h->size, (unsigned long) sym.st_size,
1280 bfd_get_filename (abfd));
1281
1282 h->size = sym.st_size;
ede4eed4 1283 }
031dfce0
ILT
1284
1285 /* If this is a common symbol, then we always want H->SIZE
1286 to be the size of the common symbol. The code just above
1287 won't fix the size if a common symbol becomes larger. We
1288 don't warn about a size change here, because that is
1289 covered by --warn-common. */
1290 if (h->root.type == bfd_link_hash_common)
1291 h->size = h->root.u.c.size;
1292
3d7c42c9
ILT
1293 if (ELF_ST_TYPE (sym.st_info) != STT_NOTYPE
1294 && (definition || h->type == STT_NOTYPE))
ede4eed4 1295 {
3d7c42c9 1296 if (h->type != STT_NOTYPE
8235c112 1297 && h->type != ELF_ST_TYPE (sym.st_info)
ee9f09cd 1298 && ! type_change_ok)
3d7c42c9 1299 (*_bfd_error_handler)
53d3ce37 1300 (_("Warning: type of symbol `%s' changed from %d to %d in %s"),
3d7c42c9
ILT
1301 name, h->type, ELF_ST_TYPE (sym.st_info),
1302 bfd_get_filename (abfd));
1303
ede4eed4
KR
1304 h->type = ELF_ST_TYPE (sym.st_info);
1305 }
1306
6c02f1a0
ILT
1307 if (sym.st_other != 0
1308 && (definition || h->other == 0))
1309 h->other = sym.st_other;
1310
ede4eed4
KR
1311 /* Set a flag in the hash table entry indicating the type of
1312 reference or definition we just found. Keep a count of
1313 the number of dynamic symbols we find. A dynamic symbol
1314 is one which is referenced or defined by both a regular
440f3914 1315 object and a shared object. */
ede4eed4
KR
1316 old_flags = h->elf_link_hash_flags;
1317 dynsym = false;
1318 if (! dynamic)
1319 {
1320 if (! definition)
1321 new_flag = ELF_LINK_HASH_REF_REGULAR;
1322 else
1323 new_flag = ELF_LINK_HASH_DEF_REGULAR;
1324 if (info->shared
1325 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1326 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1327 dynsym = true;
1328 }
1329 else
1330 {
1331 if (! definition)
1332 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1333 else
1334 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
0db6249c 1335 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1c4794f5
ILT
1336 | ELF_LINK_HASH_REF_REGULAR)) != 0
1337 || (h->weakdef != NULL
440f3914
ILT
1338 && ! new_weakdef
1339 && h->weakdef->dynindx != -1))
ede4eed4
KR
1340 dynsym = true;
1341 }
1342
1343 h->elf_link_hash_flags |= new_flag;
d044b40a
ILT
1344
1345 /* If this symbol has a version, and it is the default
1346 version, we create an indirect symbol from the default
1347 name to the fully decorated name. This will cause
1348 external references which do not specify a version to be
1349 bound to this version of the symbol. */
1350 if (definition)
1351 {
1352 char *p;
1353
1354 p = strchr (name, ELF_VER_CHR);
1355 if (p != NULL && p[1] == ELF_VER_CHR)
1356 {
1357 char *shortname;
044d7d49
ILT
1358 struct elf_link_hash_entry *hi;
1359 boolean override;
d044b40a
ILT
1360
1361 shortname = bfd_hash_allocate (&info->hash->table,
1362 p - name + 1);
1363 if (shortname == NULL)
1364 goto error_return;
1365 strncpy (shortname, name, p - name);
1366 shortname[p - name] = '\0';
1367
044d7d49
ILT
1368 /* We are going to create a new symbol. Merge it
1369 with any existing symbol with this name. For the
1370 purposes of the merge, act as though we were
1371 defining the symbol we just defined, although we
1372 actually going to define an indirect symbol. */
0e039bdc
ILT
1373 type_change_ok = false;
1374 size_change_ok = false;
044d7d49
ILT
1375 if (! elf_merge_symbol (abfd, info, shortname, &sym, &sec,
1376 &value, &hi, &override,
1377 &type_change_ok, &size_change_ok))
1378 goto error_return;
d044b40a 1379
044d7d49 1380 if (! override)
d6bfcdb5 1381 {
52c92c7f
ILT
1382 if (! (_bfd_generic_link_add_one_symbol
1383 (info, abfd, shortname, BSF_INDIRECT,
1384 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1385 collect, (struct bfd_link_hash_entry **) &hi)))
1386 goto error_return;
541a4b54
ILT
1387 }
1388 else
1389 {
1390 /* In this case the symbol named SHORTNAME is
1391 overriding the indirect symbol we want to
1392 add. We were planning on making SHORTNAME an
1393 indirect symbol referring to NAME. SHORTNAME
1394 is the name without a version. NAME is the
1395 fully versioned name, and it is the default
1396 version.
1397
1398 Overriding means that we already saw a
1399 definition for the symbol SHORTNAME in a
1400 regular object, and it is overriding the
1401 symbol defined in the dynamic object.
1402
1403 When this happens, we actually want to change
1404 NAME, the symbol we just added, to refer to
1405 SHORTNAME. This will cause references to
1406 NAME in the shared object to become
1407 references to SHORTNAME in the regular
1408 object. This is what we expect when we
1409 override a function in a shared object: that
1410 the references in the shared object will be
1411 mapped to the definition in the regular
1412 object. */
1413
677525e9
ILT
1414 while (hi->root.type == bfd_link_hash_indirect
1415 || hi->root.type == bfd_link_hash_warning)
1416 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1417
541a4b54
ILT
1418 h->root.type = bfd_link_hash_indirect;
1419 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
1420 if (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)
1421 {
1422 h->elf_link_hash_flags &=~ ELF_LINK_HASH_DEF_DYNAMIC;
1423 hi->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
1424 if (! _bfd_elf_link_record_dynamic_symbol (info, hi))
1425 goto error_return;
1426 }
52c92c7f 1427
541a4b54
ILT
1428 /* Now set HI to H, so that the following code
1429 will set the other fields correctly. */
1430 hi = h;
1431 }
52c92c7f 1432
541a4b54
ILT
1433 /* If there is a duplicate definition somewhere,
1434 then HI may not point to an indirect symbol. We
1435 will have reported an error to the user in that
1436 case. */
1437
1438 if (hi->root.type == bfd_link_hash_indirect)
1439 {
1440 struct elf_link_hash_entry *ht;
1441
1442 /* If the symbol became indirect, then we assume
1443 that we have not seen a definition before. */
1444 BFD_ASSERT ((hi->elf_link_hash_flags
1445 & (ELF_LINK_HASH_DEF_DYNAMIC
1446 | ELF_LINK_HASH_DEF_REGULAR))
1447 == 0);
1448
1449 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
1450
1451 /* Copy down any references that we may have
1452 already seen to the symbol which just became
1453 indirect. */
1454 ht->elf_link_hash_flags |=
1455 (hi->elf_link_hash_flags
1456 & (ELF_LINK_HASH_REF_DYNAMIC
1457 | ELF_LINK_HASH_REF_REGULAR));
1458
be228e0d
ILT
1459 /* Copy over the global and procedure linkage table
1460 offset entries. These may have been already set
1461 up by a check_relocs routine. */
303b4cc6 1462 if (ht->got.offset == (bfd_vma) -1)
52c92c7f 1463 {
303b4cc6
RH
1464 ht->got.offset = hi->got.offset;
1465 hi->got.offset = (bfd_vma) -1;
541a4b54 1466 }
303b4cc6 1467 BFD_ASSERT (hi->got.offset == (bfd_vma) -1);
e549b1d2 1468
be228e0d
ILT
1469 if (ht->plt.offset == (bfd_vma) -1)
1470 {
1471 ht->plt.offset = hi->plt.offset;
1472 hi->plt.offset = (bfd_vma) -1;
1473 }
1474 BFD_ASSERT (hi->plt.offset == (bfd_vma) -1);
1475
541a4b54
ILT
1476 if (ht->dynindx == -1)
1477 {
1478 ht->dynindx = hi->dynindx;
1479 ht->dynstr_index = hi->dynstr_index;
1480 hi->dynindx = -1;
1481 hi->dynstr_index = 0;
1482 }
1483 BFD_ASSERT (hi->dynindx == -1);
e549b1d2 1484
541a4b54
ILT
1485 /* FIXME: There may be other information to copy
1486 over for particular targets. */
1487
1488 /* See if the new flags lead us to realize that
1489 the symbol must be dynamic. */
1490 if (! dynsym)
1491 {
1492 if (! dynamic)
e549b1d2 1493 {
541a4b54
ILT
1494 if (info->shared
1495 || ((hi->elf_link_hash_flags
1496 & ELF_LINK_HASH_REF_DYNAMIC)
1497 != 0))
1498 dynsym = true;
e549b1d2 1499 }
541a4b54 1500 else
e549b1d2 1501 {
541a4b54
ILT
1502 if ((hi->elf_link_hash_flags
1503 & ELF_LINK_HASH_REF_REGULAR) != 0)
1504 dynsym = true;
e549b1d2 1505 }
52c92c7f 1506 }
d6bfcdb5
ILT
1507 }
1508
1509 /* We also need to define an indirection from the
1510 nondefault version of the symbol. */
1511
1512 shortname = bfd_hash_allocate (&info->hash->table,
1513 strlen (name));
1514 if (shortname == NULL)
1515 goto error_return;
1516 strncpy (shortname, name, p - name);
1517 strcpy (shortname + (p - name), p + 1);
1518
044d7d49 1519 /* Once again, merge with any existing symbol. */
0e039bdc
ILT
1520 type_change_ok = false;
1521 size_change_ok = false;
044d7d49
ILT
1522 if (! elf_merge_symbol (abfd, info, shortname, &sym, &sec,
1523 &value, &hi, &override,
1524 &type_change_ok, &size_change_ok))
1525 goto error_return;
d6bfcdb5 1526
541a4b54
ILT
1527 if (override)
1528 {
1529 /* Here SHORTNAME is a versioned name, so we
1530 don't expect to see the type of override we
1531 do in the case above. */
1532 (*_bfd_error_handler)
53d3ce37 1533 (_("%s: warning: unexpected redefinition of `%s'"),
541a4b54
ILT
1534 bfd_get_filename (abfd), shortname);
1535 }
1536 else
d6bfcdb5 1537 {
52c92c7f
ILT
1538 if (! (_bfd_generic_link_add_one_symbol
1539 (info, abfd, shortname, BSF_INDIRECT,
1540 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1541 collect, (struct bfd_link_hash_entry **) &hi)))
1542 goto error_return;
1543
1544 /* If there is a duplicate definition somewhere,
1545 then HI may not point to an indirect symbol.
1546 We will have reported an error to the user in
1547 that case. */
1548
1549 if (hi->root.type == bfd_link_hash_indirect)
1550 {
e549b1d2
ILT
1551 /* If the symbol became indirect, then we
1552 assume that we have not seen a definition
1553 before. */
1554 BFD_ASSERT ((hi->elf_link_hash_flags
1555 & (ELF_LINK_HASH_DEF_DYNAMIC
1556 | ELF_LINK_HASH_DEF_REGULAR))
1557 == 0);
1558
1559 /* Copy down any references that we may have
1560 already seen to the symbol which just
1561 became indirect. */
1562 h->elf_link_hash_flags |=
1563 (hi->elf_link_hash_flags
1564 & (ELF_LINK_HASH_REF_DYNAMIC
1565 | ELF_LINK_HASH_REF_REGULAR));
1566
be228e0d
ILT
1567 /* Copy over the global and procedure linkage
1568 table offset entries. These may have been
1569 already set up by a check_relocs routine. */
303b4cc6 1570 if (h->got.offset == (bfd_vma) -1)
e549b1d2 1571 {
303b4cc6
RH
1572 h->got.offset = hi->got.offset;
1573 hi->got.offset = (bfd_vma) -1;
e549b1d2 1574 }
303b4cc6 1575 BFD_ASSERT (hi->got.offset == (bfd_vma) -1);
e549b1d2 1576
be228e0d
ILT
1577 if (h->plt.offset == (bfd_vma) -1)
1578 {
1579 h->plt.offset = hi->plt.offset;
1580 hi->plt.offset = (bfd_vma) -1;
1581 }
1582 BFD_ASSERT (hi->got.offset == (bfd_vma) -1);
1583
e549b1d2
ILT
1584 if (h->dynindx == -1)
1585 {
1586 h->dynindx = hi->dynindx;
1587 h->dynstr_index = hi->dynstr_index;
1588 hi->dynindx = -1;
1589 hi->dynstr_index = 0;
1590 }
1591 BFD_ASSERT (hi->dynindx == -1);
1592
1593 /* FIXME: There may be other information to
1594 copy over for particular targets. */
1595
1596 /* See if the new flags lead us to realize
1597 that the symbol must be dynamic. */
1598 if (! dynsym)
1599 {
1600 if (! dynamic)
1601 {
1602 if (info->shared
1603 || ((hi->elf_link_hash_flags
1604 & ELF_LINK_HASH_REF_DYNAMIC)
1605 != 0))
1606 dynsym = true;
1607 }
1608 else
1609 {
1610 if ((hi->elf_link_hash_flags
1611 & ELF_LINK_HASH_REF_REGULAR) != 0)
1612 dynsym = true;
1613 }
1614 }
52c92c7f 1615 }
d6bfcdb5 1616 }
d044b40a
ILT
1617 }
1618 }
1619
ede4eed4
KR
1620 if (dynsym && h->dynindx == -1)
1621 {
1622 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1623 goto error_return;
452a5efb
ILT
1624 if (h->weakdef != NULL
1625 && ! new_weakdef
1626 && h->weakdef->dynindx == -1)
1627 {
1628 if (! _bfd_elf_link_record_dynamic_symbol (info,
1629 h->weakdef))
1630 goto error_return;
1631 }
ede4eed4
KR
1632 }
1633 }
1634 }
1635
1636 /* Now set the weakdefs field correctly for all the weak defined
1637 symbols we found. The only way to do this is to search all the
1638 symbols. Since we only need the information for non functions in
1639 dynamic objects, that's the only time we actually put anything on
1640 the list WEAKS. We need this information so that if a regular
1641 object refers to a symbol defined weakly in a dynamic object, the
1642 real symbol in the dynamic object is also put in the dynamic
1643 symbols; we also must arrange for both symbols to point to the
1644 same memory location. We could handle the general case of symbol
1645 aliasing, but a general symbol alias can only be generated in
1646 assembler code, handling it correctly would be very time
1647 consuming, and other ELF linkers don't handle general aliasing
1648 either. */
1649 while (weaks != NULL)
1650 {
1651 struct elf_link_hash_entry *hlook;
1652 asection *slook;
1653 bfd_vma vlook;
1654 struct elf_link_hash_entry **hpp;
1655 struct elf_link_hash_entry **hppend;
1656
1657 hlook = weaks;
1658 weaks = hlook->weakdef;
1659 hlook->weakdef = NULL;
1660
1661 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
1662 || hlook->root.type == bfd_link_hash_defweak
1663 || hlook->root.type == bfd_link_hash_common
1664 || hlook->root.type == bfd_link_hash_indirect);
1665 slook = hlook->root.u.def.section;
1666 vlook = hlook->root.u.def.value;
1667
1668 hpp = elf_sym_hashes (abfd);
1669 hppend = hpp + extsymcount;
1670 for (; hpp < hppend; hpp++)
1671 {
1672 struct elf_link_hash_entry *h;
1673
1674 h = *hpp;
1675 if (h != NULL && h != hlook
d2bb6c79 1676 && h->root.type == bfd_link_hash_defined
ede4eed4
KR
1677 && h->root.u.def.section == slook
1678 && h->root.u.def.value == vlook)
1679 {
1680 hlook->weakdef = h;
1681
1682 /* If the weak definition is in the list of dynamic
1683 symbols, make sure the real definition is put there
1684 as well. */
1685 if (hlook->dynindx != -1
1686 && h->dynindx == -1)
1687 {
1688 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1689 goto error_return;
1690 }
1691
440f3914
ILT
1692 /* If the real definition is in the list of dynamic
1693 symbols, make sure the weak definition is put there
1694 as well. If we don't do this, then the dynamic
1695 loader might not merge the entries for the real
1696 definition and the weak definition. */
1697 if (h->dynindx != -1
1698 && hlook->dynindx == -1)
1699 {
1700 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
1701 goto error_return;
1702 }
1703
ede4eed4
KR
1704 break;
1705 }
1706 }
1707 }
1708
1709 if (buf != NULL)
1710 {
1711 free (buf);
1712 buf = NULL;
1713 }
1714
d044b40a
ILT
1715 if (extversym != NULL)
1716 {
1717 free (extversym);
1718 extversym = NULL;
1719 }
1720
ede4eed4
KR
1721 /* If this object is the same format as the output object, and it is
1722 not a shared library, then let the backend look through the
1723 relocs.
1724
1725 This is required to build global offset table entries and to
1726 arrange for dynamic relocs. It is not required for the
1727 particular common case of linking non PIC code, even when linking
1728 against shared libraries, but unfortunately there is no way of
1729 knowing whether an object file has been compiled PIC or not.
1730 Looking through the relocs is not particularly time consuming.
1731 The problem is that we must either (1) keep the relocs in memory,
1732 which causes the linker to require additional runtime memory or
1733 (2) read the relocs twice from the input file, which wastes time.
1734 This would be a good case for using mmap.
1735
1736 I have no idea how to handle linking PIC code into a file of a
1737 different format. It probably can't be done. */
1738 check_relocs = get_elf_backend_data (abfd)->check_relocs;
1739 if (! dynamic
1740 && abfd->xvec == info->hash->creator
1741 && check_relocs != NULL)
1742 {
1743 asection *o;
1744
1745 for (o = abfd->sections; o != NULL; o = o->next)
1746 {
1747 Elf_Internal_Rela *internal_relocs;
1748 boolean ok;
1749
1750 if ((o->flags & SEC_RELOC) == 0
a0c80726
ILT
1751 || o->reloc_count == 0
1752 || ((info->strip == strip_all || info->strip == strip_debugger)
94e05b00
ILT
1753 && (o->flags & SEC_DEBUGGING) != 0)
1754 || bfd_is_abs_section (o->output_section))
ede4eed4
KR
1755 continue;
1756
c86158e5
ILT
1757 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
1758 (abfd, o, (PTR) NULL,
1759 (Elf_Internal_Rela *) NULL,
1760 info->keep_memory));
ede4eed4
KR
1761 if (internal_relocs == NULL)
1762 goto error_return;
1763
1764 ok = (*check_relocs) (abfd, info, o, internal_relocs);
1765
1766 if (! info->keep_memory)
1767 free (internal_relocs);
1768
1769 if (! ok)
1770 goto error_return;
1771 }
1772 }
1773
1726b8f0
ILT
1774 /* If this is a non-traditional, non-relocateable link, try to
1775 optimize the handling of the .stab/.stabstr sections. */
1776 if (! dynamic
1777 && ! info->relocateable
1778 && ! info->traditional_format
1779 && info->hash->creator->flavour == bfd_target_elf_flavour
1780 && (info->strip != strip_all && info->strip != strip_debugger))
1781 {
1782 asection *stab, *stabstr;
1783
1784 stab = bfd_get_section_by_name (abfd, ".stab");
1785 if (stab != NULL)
1786 {
1787 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
1788
1789 if (stabstr != NULL)
1790 {
1791 struct bfd_elf_section_data *secdata;
1792
1793 secdata = elf_section_data (stab);
1794 if (! _bfd_link_section_stabs (abfd,
1795 &elf_hash_table (info)->stab_info,
1796 stab, stabstr,
1797 &secdata->stab_info))
1798 goto error_return;
1799 }
1800 }
1801 }
1802
ede4eed4
KR
1803 return true;
1804
1805 error_return:
1806 if (buf != NULL)
1807 free (buf);
1808 if (dynbuf != NULL)
1809 free (dynbuf);
d044b40a
ILT
1810 if (dynver != NULL)
1811 free (dynver);
1812 if (extversym != NULL)
1813 free (extversym);
ede4eed4
KR
1814 return false;
1815}
1816
1817/* Create some sections which will be filled in with dynamic linking
1818 information. ABFD is an input file which requires dynamic sections
1819 to be created. The dynamic sections take up virtual memory space
1820 when the final executable is run, so we need to create them before
1821 addresses are assigned to the output sections. We work out the
1822 actual contents and size of these sections later. */
1823
1824boolean
1825elf_link_create_dynamic_sections (abfd, info)
1826 bfd *abfd;
1827 struct bfd_link_info *info;
1828{
1829 flagword flags;
1830 register asection *s;
1831 struct elf_link_hash_entry *h;
1832 struct elf_backend_data *bed;
1833
1834 if (elf_hash_table (info)->dynamic_sections_created)
1835 return true;
1836
1837 /* Make sure that all dynamic sections use the same input BFD. */
1838 if (elf_hash_table (info)->dynobj == NULL)
1839 elf_hash_table (info)->dynobj = abfd;
1840 else
1841 abfd = elf_hash_table (info)->dynobj;
1842
1843 /* Note that we set the SEC_IN_MEMORY flag for all of these
1844 sections. */
ff12f303
ILT
1845 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
1846 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
ede4eed4
KR
1847
1848 /* A dynamically linked executable has a .interp section, but a
1849 shared library does not. */
1850 if (! info->shared)
1851 {
1852 s = bfd_make_section (abfd, ".interp");
1853 if (s == NULL
1854 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
1855 return false;
1856 }
1857
d044b40a
ILT
1858 /* Create sections to hold version informations. These are removed
1859 if they are not needed. */
1860 s = bfd_make_section (abfd, ".gnu.version_d");
1861 if (s == NULL
1862 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
65c2dd6e 1863 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
d044b40a
ILT
1864 return false;
1865
1866 s = bfd_make_section (abfd, ".gnu.version");
1867 if (s == NULL
1868 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
1869 || ! bfd_set_section_alignment (abfd, s, 1))
1870 return false;
1871
1872 s = bfd_make_section (abfd, ".gnu.version_r");
1873 if (s == NULL
1874 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
65c2dd6e 1875 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
d044b40a
ILT
1876 return false;
1877
ede4eed4
KR
1878 s = bfd_make_section (abfd, ".dynsym");
1879 if (s == NULL
1880 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
1881 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
1882 return false;
1883
1884 s = bfd_make_section (abfd, ".dynstr");
1885 if (s == NULL
1886 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
1887 return false;
1888
1889 /* Create a strtab to hold the dynamic symbol names. */
1890 if (elf_hash_table (info)->dynstr == NULL)
1891 {
1892 elf_hash_table (info)->dynstr = elf_stringtab_init ();
1893 if (elf_hash_table (info)->dynstr == NULL)
1894 return false;
1895 }
1896
1897 s = bfd_make_section (abfd, ".dynamic");
1898 if (s == NULL
1899 || ! bfd_set_section_flags (abfd, s, flags)
1900 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
1901 return false;
1902
1903 /* The special symbol _DYNAMIC is always set to the start of the
1904 .dynamic section. This call occurs before we have processed the
1905 symbols for any dynamic object, so we don't have to worry about
1906 overriding a dynamic definition. We could set _DYNAMIC in a
1907 linker script, but we only want to define it if we are, in fact,
1908 creating a .dynamic section. We don't want to define it if there
1909 is no .dynamic section, since on some ELF platforms the start up
1910 code examines it to decide how to initialize the process. */
1911 h = NULL;
1912 if (! (_bfd_generic_link_add_one_symbol
1913 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, (bfd_vma) 0,
1914 (const char *) NULL, false, get_elf_backend_data (abfd)->collect,
1915 (struct bfd_link_hash_entry **) &h)))
1916 return false;
1917 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
1918 h->type = STT_OBJECT;
1919
1920 if (info->shared
1921 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
1922 return false;
1923
1924 s = bfd_make_section (abfd, ".hash");
1925 if (s == NULL
1926 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
1927 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
1928 return false;
1929
1930 /* Let the backend create the rest of the sections. This lets the
1931 backend set the right flags. The backend will normally create
1932 the .got and .plt sections. */
1933 bed = get_elf_backend_data (abfd);
1934 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
1935 return false;
1936
1937 elf_hash_table (info)->dynamic_sections_created = true;
1938
1939 return true;
1940}
1941
1942/* Add an entry to the .dynamic table. */
1943
1944boolean
1945elf_add_dynamic_entry (info, tag, val)
1946 struct bfd_link_info *info;
1947 bfd_vma tag;
1948 bfd_vma val;
1949{
1950 Elf_Internal_Dyn dyn;
1951 bfd *dynobj;
1952 asection *s;
1953 size_t newsize;
1954 bfd_byte *newcontents;
1955
1956 dynobj = elf_hash_table (info)->dynobj;
1957
1958 s = bfd_get_section_by_name (dynobj, ".dynamic");
1959 BFD_ASSERT (s != NULL);
1960
1961 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
58142f10 1962 newcontents = (bfd_byte *) bfd_realloc (s->contents, newsize);
ede4eed4 1963 if (newcontents == NULL)
58142f10 1964 return false;
ede4eed4
KR
1965
1966 dyn.d_tag = tag;
1967 dyn.d_un.d_val = val;
1968 elf_swap_dyn_out (dynobj, &dyn,
1969 (Elf_External_Dyn *) (newcontents + s->_raw_size));
1970
1971 s->_raw_size = newsize;
1972 s->contents = newcontents;
1973
1974 return true;
1975}
3b3753b8 1976\f
ede4eed4
KR
1977
1978/* Read and swap the relocs for a section. They may have been cached.
1979 If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are not NULL,
1980 they are used as buffers to read into. They are known to be large
1981 enough. If the INTERNAL_RELOCS relocs argument is NULL, the return
1982 value is allocated using either malloc or bfd_alloc, according to
1983 the KEEP_MEMORY argument. */
1984
c86158e5
ILT
1985Elf_Internal_Rela *
1986NAME(_bfd_elf,link_read_relocs) (abfd, o, external_relocs, internal_relocs,
1987 keep_memory)
ede4eed4
KR
1988 bfd *abfd;
1989 asection *o;
1990 PTR external_relocs;
1991 Elf_Internal_Rela *internal_relocs;
1992 boolean keep_memory;
1993{
1994 Elf_Internal_Shdr *rel_hdr;
1995 PTR alloc1 = NULL;
1996 Elf_Internal_Rela *alloc2 = NULL;
1997
1998 if (elf_section_data (o)->relocs != NULL)
1999 return elf_section_data (o)->relocs;
2000
2001 if (o->reloc_count == 0)
2002 return NULL;
2003
2004 rel_hdr = &elf_section_data (o)->rel_hdr;
2005
2006 if (internal_relocs == NULL)
2007 {
2008 size_t size;
2009
2010 size = o->reloc_count * sizeof (Elf_Internal_Rela);
2011 if (keep_memory)
2012 internal_relocs = (Elf_Internal_Rela *) bfd_alloc (abfd, size);
2013 else
58142f10 2014 internal_relocs = alloc2 = (Elf_Internal_Rela *) bfd_malloc (size);
ede4eed4 2015 if (internal_relocs == NULL)
58142f10 2016 goto error_return;
ede4eed4
KR
2017 }
2018
2019 if (external_relocs == NULL)
2020 {
58142f10 2021 alloc1 = (PTR) bfd_malloc ((size_t) rel_hdr->sh_size);
ede4eed4 2022 if (alloc1 == NULL)
58142f10 2023 goto error_return;
ede4eed4
KR
2024 external_relocs = alloc1;
2025 }
2026
2027 if ((bfd_seek (abfd, rel_hdr->sh_offset, SEEK_SET) != 0)
2028 || (bfd_read (external_relocs, 1, rel_hdr->sh_size, abfd)
2029 != rel_hdr->sh_size))
2030 goto error_return;
2031
2032 /* Swap in the relocs. For convenience, we always produce an
2033 Elf_Internal_Rela array; if the relocs are Rel, we set the addend
2034 to 0. */
2035 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
2036 {
2037 Elf_External_Rel *erel;
2038 Elf_External_Rel *erelend;
2039 Elf_Internal_Rela *irela;
2040
2041 erel = (Elf_External_Rel *) external_relocs;
2042 erelend = erel + o->reloc_count;
2043 irela = internal_relocs;
2044 for (; erel < erelend; erel++, irela++)
2045 {
2046 Elf_Internal_Rel irel;
2047
2048 elf_swap_reloc_in (abfd, erel, &irel);
2049 irela->r_offset = irel.r_offset;
2050 irela->r_info = irel.r_info;
2051 irela->r_addend = 0;
2052 }
2053 }
2054 else
2055 {
2056 Elf_External_Rela *erela;
2057 Elf_External_Rela *erelaend;
2058 Elf_Internal_Rela *irela;
2059
2060 BFD_ASSERT (rel_hdr->sh_entsize == sizeof (Elf_External_Rela));
2061
2062 erela = (Elf_External_Rela *) external_relocs;
2063 erelaend = erela + o->reloc_count;
2064 irela = internal_relocs;
2065 for (; erela < erelaend; erela++, irela++)
2066 elf_swap_reloca_in (abfd, erela, irela);
2067 }
2068
2069 /* Cache the results for next time, if we can. */
2070 if (keep_memory)
2071 elf_section_data (o)->relocs = internal_relocs;
ff12f303 2072
ede4eed4
KR
2073 if (alloc1 != NULL)
2074 free (alloc1);
2075
2076 /* Don't free alloc2, since if it was allocated we are passing it
2077 back (under the name of internal_relocs). */
2078
2079 return internal_relocs;
2080
2081 error_return:
2082 if (alloc1 != NULL)
2083 free (alloc1);
2084 if (alloc2 != NULL)
2085 free (alloc2);
2086 return NULL;
2087}
3b3753b8 2088\f
ede4eed4
KR
2089
2090/* Record an assignment to a symbol made by a linker script. We need
2091 this in case some dynamic object refers to this symbol. */
2092
2093/*ARGSUSED*/
2094boolean
2095NAME(bfd_elf,record_link_assignment) (output_bfd, info, name, provide)
2096 bfd *output_bfd;
2097 struct bfd_link_info *info;
2098 const char *name;
2099 boolean provide;
2100{
2101 struct elf_link_hash_entry *h;
2102
2103 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2104 return true;
2105
2106 h = elf_link_hash_lookup (elf_hash_table (info), name, true, true, false);
2107 if (h == NULL)
2108 return false;
2109
869b7d80
ILT
2110 if (h->root.type == bfd_link_hash_new)
2111 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
2112
ede4eed4
KR
2113 /* If this symbol is being provided by the linker script, and it is
2114 currently defined by a dynamic object, but not by a regular
2115 object, then mark it as undefined so that the generic linker will
2116 force the correct value. */
2117 if (provide
2118 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2119 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2120 h->root.type = bfd_link_hash_undefined;
2121
13eb6306
ILT
2122 /* If this symbol is not being provided by the linker script, and it is
2123 currently defined by a dynamic object, but not by a regular object,
2124 then clear out any version information because the symbol will not be
2125 associated with the dynamic object any more. */
2126 if (!provide
2127 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2128 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2129 h->verinfo.verdef = NULL;
2130
ede4eed4
KR
2131 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2132 h->type = STT_OBJECT;
2133
2134 if (((h->elf_link_hash_flags & (ELF_LINK_HASH_DEF_DYNAMIC
2135 | ELF_LINK_HASH_REF_DYNAMIC)) != 0
2136 || info->shared)
2137 && h->dynindx == -1)
2138 {
2139 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2140 return false;
2141
2142 /* If this is a weak defined symbol, and we know a corresponding
2143 real symbol from the same dynamic object, make sure the real
2144 symbol is also made into a dynamic symbol. */
2145 if (h->weakdef != NULL
2146 && h->weakdef->dynindx == -1)
2147 {
2148 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2149 return false;
2150 }
2151 }
2152
2153 return true;
2154}
3b3753b8 2155\f
d044b40a
ILT
2156/* This structure is used to pass information to
2157 elf_link_assign_sym_version. */
2158
2159struct elf_assign_sym_version_info
2160{
2161 /* Output BFD. */
2162 bfd *output_bfd;
2163 /* General link information. */
2164 struct bfd_link_info *info;
2165 /* Version tree. */
2166 struct bfd_elf_version_tree *verdefs;
2167 /* Whether we are exporting all dynamic symbols. */
2168 boolean export_dynamic;
2169 /* Whether we removed any symbols from the dynamic symbol table. */
2170 boolean removed_dynamic;
2171 /* Whether we had a failure. */
2172 boolean failed;
2173};
2174
2175/* This structure is used to pass information to
2176 elf_link_find_version_dependencies. */
2177
2178struct elf_find_verdep_info
2179{
2180 /* Output BFD. */
2181 bfd *output_bfd;
2182 /* General link information. */
2183 struct bfd_link_info *info;
2184 /* The number of dependencies. */
2185 unsigned int vers;
2186 /* Whether we had a failure. */
2187 boolean failed;
2188};
ede4eed4
KR
2189
2190/* Array used to determine the number of hash table buckets to use
2191 based on the number of symbols there are. If there are fewer than
2192 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
2193 fewer than 37 we use 17 buckets, and so forth. We never use more
6b8ec6f3 2194 than 32771 buckets. */
ede4eed4
KR
2195
2196static const size_t elf_buckets[] =
2197{
6b8ec6f3
ILT
2198 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
2199 16411, 32771, 0
ede4eed4
KR
2200};
2201
2202/* Set up the sizes and contents of the ELF dynamic sections. This is
2203 called by the ELF linker emulation before_allocation routine. We
2204 must set the sizes of the sections before the linker sets the
2205 addresses of the various sections. */
2206
2207boolean
2208NAME(bfd_elf,size_dynamic_sections) (output_bfd, soname, rpath,
148437ec 2209 export_dynamic, filter_shlib,
d044b40a
ILT
2210 auxiliary_filters, info, sinterpptr,
2211 verdefs)
ede4eed4
KR
2212 bfd *output_bfd;
2213 const char *soname;
2214 const char *rpath;
2215 boolean export_dynamic;
148437ec 2216 const char *filter_shlib;
db109ca2 2217 const char * const *auxiliary_filters;
ede4eed4
KR
2218 struct bfd_link_info *info;
2219 asection **sinterpptr;
d044b40a 2220 struct bfd_elf_version_tree *verdefs;
ede4eed4 2221{
d044b40a 2222 bfd_size_type soname_indx;
ede4eed4
KR
2223 bfd *dynobj;
2224 struct elf_backend_data *bed;
e549b1d2 2225 bfd_size_type old_dynsymcount;
c19fbe0f 2226 struct elf_assign_sym_version_info asvinfo;
ede4eed4
KR
2227
2228 *sinterpptr = NULL;
2229
f6727b90 2230 soname_indx = (bfd_size_type) -1;
d044b40a 2231
ede4eed4
KR
2232 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2233 return true;
2234
ff12f303
ILT
2235 /* The backend may have to create some sections regardless of whether
2236 we're dynamic or not. */
2237 bed = get_elf_backend_data (output_bfd);
2238 if (bed->elf_backend_always_size_sections
2239 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
2240 return false;
2241
ede4eed4
KR
2242 dynobj = elf_hash_table (info)->dynobj;
2243
2244 /* If there were no dynamic objects in the link, there is nothing to
2245 do here. */
2246 if (dynobj == NULL)
2247 return true;
2248
2249 /* If we are supposed to export all symbols into the dynamic symbol
2250 table (this is not the normal case), then do so. */
2251 if (export_dynamic)
2252 {
2253 struct elf_info_failed eif;
2254
2255 eif.failed = false;
2256 eif.info = info;
2257 elf_link_hash_traverse (elf_hash_table (info), elf_export_symbol,
2258 (PTR) &eif);
2259 if (eif.failed)
2260 return false;
2261 }
2262
2263 if (elf_hash_table (info)->dynamic_sections_created)
2264 {
2265 struct elf_info_failed eif;
73a68447 2266 struct elf_link_hash_entry *h;
ede4eed4
KR
2267 bfd_size_type strsize;
2268
2269 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
2270 BFD_ASSERT (*sinterpptr != NULL || info->shared);
2271
2272 if (soname != NULL)
2273 {
d044b40a
ILT
2274 soname_indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2275 soname, true, true);
2276 if (soname_indx == (bfd_size_type) -1
2277 || ! elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
ede4eed4 2278 return false;
ff12f303 2279 }
ede4eed4 2280
951fe66d
ILT
2281 if (info->symbolic)
2282 {
2283 if (! elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
2284 return false;
2285 }
2286
ede4eed4
KR
2287 if (rpath != NULL)
2288 {
2289 bfd_size_type indx;
2290
2291 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr, rpath,
2292 true, true);
2293 if (indx == (bfd_size_type) -1
2294 || ! elf_add_dynamic_entry (info, DT_RPATH, indx))
2295 return false;
2296 }
2297
148437ec
ILT
2298 if (filter_shlib != NULL)
2299 {
2300 bfd_size_type indx;
2301
2302 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2303 filter_shlib, true, true);
2304 if (indx == (bfd_size_type) -1
2305 || ! elf_add_dynamic_entry (info, DT_FILTER, indx))
2306 return false;
2307 }
2308
db109ca2 2309 if (auxiliary_filters != NULL)
148437ec 2310 {
db109ca2 2311 const char * const *p;
148437ec 2312
db109ca2
ILT
2313 for (p = auxiliary_filters; *p != NULL; p++)
2314 {
2315 bfd_size_type indx;
2316
2317 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2318 *p, true, true);
2319 if (indx == (bfd_size_type) -1
2320 || ! elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
2321 return false;
2322 }
148437ec
ILT
2323 }
2324
c19fbe0f
ILT
2325 /* Attach all the symbols to their version information. */
2326 asvinfo.output_bfd = output_bfd;
2327 asvinfo.info = info;
2328 asvinfo.verdefs = verdefs;
2329 asvinfo.export_dynamic = export_dynamic;
2330 asvinfo.removed_dynamic = false;
2331 asvinfo.failed = false;
2332
2333 elf_link_hash_traverse (elf_hash_table (info),
2334 elf_link_assign_sym_version,
2335 (PTR) &asvinfo);
2336 if (asvinfo.failed)
2337 return false;
2338
ede4eed4
KR
2339 /* Find all symbols which were defined in a dynamic object and make
2340 the backend pick a reasonable value for them. */
2341 eif.failed = false;
2342 eif.info = info;
2343 elf_link_hash_traverse (elf_hash_table (info),
2344 elf_adjust_dynamic_symbol,
2345 (PTR) &eif);
2346 if (eif.failed)
2347 return false;
2348
2349 /* Add some entries to the .dynamic section. We fill in some of the
2350 values later, in elf_bfd_final_link, but we must add the entries
2351 now so that we know the final size of the .dynamic section. */
73a68447
ILT
2352 h = elf_link_hash_lookup (elf_hash_table (info), "_init", false,
2353 false, false);
2354 if (h != NULL
2355 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
2356 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
ede4eed4
KR
2357 {
2358 if (! elf_add_dynamic_entry (info, DT_INIT, 0))
2359 return false;
2360 }
73a68447
ILT
2361 h = elf_link_hash_lookup (elf_hash_table (info), "_fini", false,
2362 false, false);
2363 if (h != NULL
2364 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
2365 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
ede4eed4
KR
2366 {
2367 if (! elf_add_dynamic_entry (info, DT_FINI, 0))
2368 return false;
2369 }
2370 strsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
2371 if (! elf_add_dynamic_entry (info, DT_HASH, 0)
2372 || ! elf_add_dynamic_entry (info, DT_STRTAB, 0)
2373 || ! elf_add_dynamic_entry (info, DT_SYMTAB, 0)
2374 || ! elf_add_dynamic_entry (info, DT_STRSZ, strsize)
2375 || ! elf_add_dynamic_entry (info, DT_SYMENT,
2376 sizeof (Elf_External_Sym)))
2377 return false;
2378 }
2379
2380 /* The backend must work out the sizes of all the other dynamic
2381 sections. */
e549b1d2 2382 old_dynsymcount = elf_hash_table (info)->dynsymcount;
37b68f72
RH
2383 if (bed->elf_backend_size_dynamic_sections
2384 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
ede4eed4
KR
2385 return false;
2386
2387 if (elf_hash_table (info)->dynamic_sections_created)
2388 {
2389 size_t dynsymcount;
2390 asection *s;
2391 size_t i;
2392 size_t bucketcount = 0;
2393 Elf_Internal_Sym isym;
2394
d044b40a
ILT
2395 /* Set up the version definition section. */
2396 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
2397 BFD_ASSERT (s != NULL);
d6bfcdb5 2398
d6bfcdb5
ILT
2399 /* We may have created additional version definitions if we are
2400 just linking a regular application. */
c19fbe0f 2401 verdefs = asvinfo.verdefs;
d6bfcdb5 2402
d044b40a
ILT
2403 if (verdefs == NULL)
2404 {
d044b40a
ILT
2405 asection **spp;
2406
d044b40a
ILT
2407 /* Don't include this section in the output file. */
2408 for (spp = &output_bfd->sections;
2409 *spp != s->output_section;
2410 spp = &(*spp)->next)
2411 ;
2412 *spp = s->output_section->next;
2413 --output_bfd->section_count;
2414 }
2415 else
2416 {
d044b40a
ILT
2417 unsigned int cdefs;
2418 bfd_size_type size;
2419 struct bfd_elf_version_tree *t;
2420 bfd_byte *p;
2421 Elf_Internal_Verdef def;
2422 Elf_Internal_Verdaux defaux;
2423
c19fbe0f 2424 if (asvinfo.removed_dynamic)
d044b40a
ILT
2425 {
2426 /* Some dynamic symbols were changed to be local
e549b1d2
ILT
2427 symbols. In this case, we renumber all of the
2428 dynamic symbols, so that we don't have a hole. If
2429 the backend changed dynsymcount, then assume that the
2430 new symbols are at the start. This is the case on
2431 the MIPS. FIXME: The names of the removed symbols
2432 will still be in the dynamic string table, wasting
2433 space. */
2434 elf_hash_table (info)->dynsymcount =
2435 1 + (elf_hash_table (info)->dynsymcount - old_dynsymcount);
d044b40a
ILT
2436 elf_link_hash_traverse (elf_hash_table (info),
2437 elf_link_renumber_dynsyms,
2438 (PTR) info);
2439 }
2440
2441 cdefs = 0;
2442 size = 0;
2443
2444 /* Make space for the base version. */
2445 size += sizeof (Elf_External_Verdef);
2446 size += sizeof (Elf_External_Verdaux);
2447 ++cdefs;
2448
2449 for (t = verdefs; t != NULL; t = t->next)
2450 {
2451 struct bfd_elf_version_deps *n;
2452
2453 size += sizeof (Elf_External_Verdef);
2454 size += sizeof (Elf_External_Verdaux);
2455 ++cdefs;
2456
2457 for (n = t->deps; n != NULL; n = n->next)
2458 size += sizeof (Elf_External_Verdaux);
2459 }
2460
2461 s->_raw_size = size;
2462 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
2463 if (s->contents == NULL && s->_raw_size != 0)
2464 return false;
2465
2466 /* Fill in the version definition section. */
2467
2468 p = s->contents;
2469
2470 def.vd_version = VER_DEF_CURRENT;
2471 def.vd_flags = VER_FLG_BASE;
2472 def.vd_ndx = 1;
2473 def.vd_cnt = 1;
2474 def.vd_aux = sizeof (Elf_External_Verdef);
2475 def.vd_next = (sizeof (Elf_External_Verdef)
2476 + sizeof (Elf_External_Verdaux));
2477
f6727b90 2478 if (soname_indx != (bfd_size_type) -1)
d044b40a
ILT
2479 {
2480 def.vd_hash = bfd_elf_hash ((const unsigned char *) soname);
2481 defaux.vda_name = soname_indx;
2482 }
2483 else
2484 {
2485 const char *name;
2486 bfd_size_type indx;
2487
2488 name = output_bfd->filename;
2489 def.vd_hash = bfd_elf_hash ((const unsigned char *) name);
2490 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2491 name, true, false);
2492 if (indx == (bfd_size_type) -1)
2493 return false;
2494 defaux.vda_name = indx;
2495 }
2496 defaux.vda_next = 0;
2497
2498 _bfd_elf_swap_verdef_out (output_bfd, &def,
2499 (Elf_External_Verdef *)p);
2500 p += sizeof (Elf_External_Verdef);
2501 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2502 (Elf_External_Verdaux *) p);
2503 p += sizeof (Elf_External_Verdaux);
2504
2505 for (t = verdefs; t != NULL; t = t->next)
2506 {
2507 unsigned int cdeps;
2508 struct bfd_elf_version_deps *n;
2509 struct elf_link_hash_entry *h;
2510
2511 cdeps = 0;
2512 for (n = t->deps; n != NULL; n = n->next)
2513 ++cdeps;
2514
2515 /* Add a symbol representing this version. */
2516 h = NULL;
2517 if (! (_bfd_generic_link_add_one_symbol
2518 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
2519 (bfd_vma) 0, (const char *) NULL, false,
2520 get_elf_backend_data (dynobj)->collect,
2521 (struct bfd_link_hash_entry **) &h)))
2522 return false;
2523 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
2524 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2525 h->type = STT_OBJECT;
2526 h->verinfo.vertree = t;
2527
d6bfcdb5
ILT
2528 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2529 return false;
d044b40a
ILT
2530
2531 def.vd_version = VER_DEF_CURRENT;
2532 def.vd_flags = 0;
2533 if (t->globals == NULL && t->locals == NULL && ! t->used)
2534 def.vd_flags |= VER_FLG_WEAK;
2535 def.vd_ndx = t->vernum + 1;
2536 def.vd_cnt = cdeps + 1;
2537 def.vd_hash = bfd_elf_hash ((const unsigned char *) t->name);
2538 def.vd_aux = sizeof (Elf_External_Verdef);
2539 if (t->next != NULL)
2540 def.vd_next = (sizeof (Elf_External_Verdef)
2541 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
2542 else
2543 def.vd_next = 0;
2544
2545 _bfd_elf_swap_verdef_out (output_bfd, &def,
2546 (Elf_External_Verdef *) p);
2547 p += sizeof (Elf_External_Verdef);
2548
2549 defaux.vda_name = h->dynstr_index;
2550 if (t->deps == NULL)
2551 defaux.vda_next = 0;
2552 else
2553 defaux.vda_next = sizeof (Elf_External_Verdaux);
2554 t->name_indx = defaux.vda_name;
2555
2556 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2557 (Elf_External_Verdaux *) p);
2558 p += sizeof (Elf_External_Verdaux);
2559
2560 for (n = t->deps; n != NULL; n = n->next)
2561 {
9793236c
ILT
2562 if (n->version_needed == NULL)
2563 {
2564 /* This can happen if there was an error in the
2565 version script. */
2566 defaux.vda_name = 0;
2567 }
2568 else
2569 defaux.vda_name = n->version_needed->name_indx;
d044b40a
ILT
2570 if (n->next == NULL)
2571 defaux.vda_next = 0;
2572 else
2573 defaux.vda_next = sizeof (Elf_External_Verdaux);
2574
2575 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
2576 (Elf_External_Verdaux *) p);
2577 p += sizeof (Elf_External_Verdaux);
2578 }
2579 }
2580
2581 if (! elf_add_dynamic_entry (info, DT_VERDEF, 0)
2582 || ! elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
2583 return false;
2584
2585 elf_tdata (output_bfd)->cverdefs = cdefs;
2586 }
2587
2588 /* Work out the size of the version reference section. */
2589
2590 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
2591 BFD_ASSERT (s != NULL);
2592 {
2593 struct elf_find_verdep_info sinfo;
2594
2595 sinfo.output_bfd = output_bfd;
2596 sinfo.info = info;
2597 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
2598 if (sinfo.vers == 0)
2599 sinfo.vers = 1;
2600 sinfo.failed = false;
2601
2602 elf_link_hash_traverse (elf_hash_table (info),
2603 elf_link_find_version_dependencies,
2604 (PTR) &sinfo);
2605
2606 if (elf_tdata (output_bfd)->verref == NULL)
2607 {
2608 asection **spp;
2609
2610 /* We don't have any version definitions, so we can just
2611 remove the section. */
2612
2613 for (spp = &output_bfd->sections;
2614 *spp != s->output_section;
2615 spp = &(*spp)->next)
2616 ;
2617 *spp = s->output_section->next;
2618 --output_bfd->section_count;
2619 }
2620 else
2621 {
2622 Elf_Internal_Verneed *t;
2623 unsigned int size;
2624 unsigned int crefs;
2625 bfd_byte *p;
2626
2627 /* Build the version definition section. */
d6bfcdb5
ILT
2628 size = 0;
2629 crefs = 0;
d044b40a
ILT
2630 for (t = elf_tdata (output_bfd)->verref;
2631 t != NULL;
2632 t = t->vn_nextref)
2633 {
2634 Elf_Internal_Vernaux *a;
2635
2636 size += sizeof (Elf_External_Verneed);
2637 ++crefs;
2638 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2639 size += sizeof (Elf_External_Vernaux);
2640 }
2641
2642 s->_raw_size = size;
2643 s->contents = (bfd_byte *) bfd_alloc (output_bfd, size);
2644 if (s->contents == NULL)
2645 return false;
2646
2647 p = s->contents;
2648 for (t = elf_tdata (output_bfd)->verref;
2649 t != NULL;
2650 t = t->vn_nextref)
2651 {
2652 unsigned int caux;
2653 Elf_Internal_Vernaux *a;
2654 bfd_size_type indx;
2655
2656 caux = 0;
2657 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2658 ++caux;
2659
2660 t->vn_version = VER_NEED_CURRENT;
2661 t->vn_cnt = caux;
601acd61
UD
2662 if (elf_dt_name (t->vn_bfd) != NULL)
2663 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2664 elf_dt_name (t->vn_bfd),
2665 true, false);
2666 else
2667 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2668 t->vn_bfd->filename, true, false);
d044b40a
ILT
2669 if (indx == (bfd_size_type) -1)
2670 return false;
2671 t->vn_file = indx;
2672 t->vn_aux = sizeof (Elf_External_Verneed);
2673 if (t->vn_nextref == NULL)
2674 t->vn_next = 0;
2675 else
2676 t->vn_next = (sizeof (Elf_External_Verneed)
2677 + caux * sizeof (Elf_External_Vernaux));
2678
2679 _bfd_elf_swap_verneed_out (output_bfd, t,
2680 (Elf_External_Verneed *) p);
2681 p += sizeof (Elf_External_Verneed);
2682
2683 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
2684 {
2685 a->vna_hash = bfd_elf_hash ((const unsigned char *)
2686 a->vna_nodename);
2687 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2688 a->vna_nodename, true, false);
2689 if (indx == (bfd_size_type) -1)
2690 return false;
2691 a->vna_name = indx;
2692 if (a->vna_nextptr == NULL)
2693 a->vna_next = 0;
2694 else
2695 a->vna_next = sizeof (Elf_External_Vernaux);
2696
2697 _bfd_elf_swap_vernaux_out (output_bfd, a,
2698 (Elf_External_Vernaux *) p);
2699 p += sizeof (Elf_External_Vernaux);
2700 }
2701 }
2702
2703 if (! elf_add_dynamic_entry (info, DT_VERNEED, 0)
2704 || ! elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
2705 return false;
2706
2707 elf_tdata (output_bfd)->cverrefs = crefs;
2708 }
2709 }
2710
2711 dynsymcount = elf_hash_table (info)->dynsymcount;
2712
2713 /* Work out the size of the symbol version section. */
2714 s = bfd_get_section_by_name (dynobj, ".gnu.version");
2715 BFD_ASSERT (s != NULL);
2716 if (dynsymcount == 0
2717 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
2718 {
2719 asection **spp;
2720
2721 /* We don't need any symbol versions; just discard the
2722 section. */
2723 for (spp = &output_bfd->sections;
2724 *spp != s->output_section;
2725 spp = &(*spp)->next)
2726 ;
2727 *spp = s->output_section->next;
2728 --output_bfd->section_count;
2729 }
2730 else
2731 {
d044b40a 2732 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
e549b1d2 2733 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
d044b40a
ILT
2734 if (s->contents == NULL)
2735 return false;
2736
d044b40a
ILT
2737 if (! elf_add_dynamic_entry (info, DT_VERSYM, 0))
2738 return false;
2739 }
2740
ede4eed4
KR
2741 /* Set the size of the .dynsym and .hash sections. We counted
2742 the number of dynamic symbols in elf_link_add_object_symbols.
2743 We will build the contents of .dynsym and .hash when we build
2744 the final symbol table, because until then we do not know the
2745 correct value to give the symbols. We built the .dynstr
2746 section as we went along in elf_link_add_object_symbols. */
ede4eed4
KR
2747 s = bfd_get_section_by_name (dynobj, ".dynsym");
2748 BFD_ASSERT (s != NULL);
2749 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
2750 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
2751 if (s->contents == NULL && s->_raw_size != 0)
a9713b91 2752 return false;
ede4eed4
KR
2753
2754 /* The first entry in .dynsym is a dummy symbol. */
2755 isym.st_value = 0;
2756 isym.st_size = 0;
2757 isym.st_name = 0;
2758 isym.st_info = 0;
2759 isym.st_other = 0;
2760 isym.st_shndx = 0;
2761 elf_swap_symbol_out (output_bfd, &isym,
cf9fb9f2 2762 (PTR) (Elf_External_Sym *) s->contents);
ede4eed4
KR
2763
2764 for (i = 0; elf_buckets[i] != 0; i++)
2765 {
2766 bucketcount = elf_buckets[i];
2767 if (dynsymcount < elf_buckets[i + 1])
2768 break;
2769 }
2770
2771 s = bfd_get_section_by_name (dynobj, ".hash");
2772 BFD_ASSERT (s != NULL);
2773 s->_raw_size = (2 + bucketcount + dynsymcount) * (ARCH_SIZE / 8);
2774 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
2775 if (s->contents == NULL)
a9713b91 2776 return false;
3fe22b98 2777 memset (s->contents, 0, (size_t) s->_raw_size);
ede4eed4
KR
2778
2779 put_word (output_bfd, bucketcount, s->contents);
2780 put_word (output_bfd, dynsymcount, s->contents + (ARCH_SIZE / 8));
2781
2782 elf_hash_table (info)->bucketcount = bucketcount;
2783
2784 s = bfd_get_section_by_name (dynobj, ".dynstr");
2785 BFD_ASSERT (s != NULL);
2786 s->_raw_size = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
2787
2788 if (! elf_add_dynamic_entry (info, DT_NULL, 0))
2789 return false;
2790 }
2791
2792 return true;
2793}
3b3753b8 2794\f
c19fbe0f
ILT
2795/* Fix up the flags for a symbol. This handles various cases which
2796 can only be fixed after all the input files are seen. This is
2797 currently called by both adjust_dynamic_symbol and
2798 assign_sym_version, which is unnecessary but perhaps more robust in
2799 the face of future changes. */
ede4eed4
KR
2800
2801static boolean
c19fbe0f 2802elf_fix_symbol_flags (h, eif)
ede4eed4 2803 struct elf_link_hash_entry *h;
c19fbe0f 2804 struct elf_info_failed *eif;
ede4eed4 2805{
869b7d80
ILT
2806 /* If this symbol was mentioned in a non-ELF file, try to set
2807 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
2808 permit a non-ELF file to correctly refer to a symbol defined in
2809 an ELF dynamic object. */
2810 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) != 0)
2811 {
2812 if (h->root.type != bfd_link_hash_defined
2813 && h->root.type != bfd_link_hash_defweak)
2814 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
2815 else
2816 {
e303e2e3
ILT
2817 if (h->root.u.def.section->owner != NULL
2818 && (bfd_get_flavour (h->root.u.def.section->owner)
2819 == bfd_target_elf_flavour))
869b7d80
ILT
2820 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
2821 else
2822 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2823 }
2824
c19fbe0f
ILT
2825 if (h->dynindx == -1
2826 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2827 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
869b7d80
ILT
2828 {
2829 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
2830 {
2831 eif->failed = true;
2832 return false;
2833 }
2834 }
2835 }
2836
ce6a7731
ILT
2837 /* If this is a final link, and the symbol was defined as a common
2838 symbol in a regular object file, and there was no definition in
2839 any dynamic object, then the linker will have allocated space for
2840 the symbol in a common section but the ELF_LINK_HASH_DEF_REGULAR
2841 flag will not have been set. */
2842 if (h->root.type == bfd_link_hash_defined
2843 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
2844 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
2845 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
2846 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
2847 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2848
951fe66d
ILT
2849 /* If -Bsymbolic was used (which means to bind references to global
2850 symbols to the definition within the shared object), and this
2851 symbol was defined in a regular object, then it actually doesn't
2852 need a PLT entry. */
2853 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
2854 && eif->info->shared
2855 && eif->info->symbolic
2856 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
be228e0d
ILT
2857 {
2858 h->elf_link_hash_flags &=~ ELF_LINK_HASH_NEEDS_PLT;
2859 h->plt.offset = (bfd_vma) -1;
2860 }
951fe66d 2861
c19fbe0f
ILT
2862 return true;
2863}
2864
2865/* Make the backend pick a good value for a dynamic symbol. This is
2866 called via elf_link_hash_traverse, and also calls itself
2867 recursively. */
2868
2869static boolean
2870elf_adjust_dynamic_symbol (h, data)
2871 struct elf_link_hash_entry *h;
2872 PTR data;
2873{
2874 struct elf_info_failed *eif = (struct elf_info_failed *) data;
2875 bfd *dynobj;
2876 struct elf_backend_data *bed;
2877
2878 /* Ignore indirect symbols. These are added by the versioning code. */
2879 if (h->root.type == bfd_link_hash_indirect)
2880 return true;
2881
2882 /* Fix the symbol flags. */
2883 if (! elf_fix_symbol_flags (h, eif))
2884 return false;
2885
ede4eed4
KR
2886 /* If this symbol does not require a PLT entry, and it is not
2887 defined by a dynamic object, or is not referenced by a regular
452a5efb
ILT
2888 object, ignore it. We do have to handle a weak defined symbol,
2889 even if no regular object refers to it, if we decided to add it
2890 to the dynamic symbol table. FIXME: Do we normally need to worry
2891 about symbols which are defined by one dynamic object and
2892 referenced by another one? */
ede4eed4
KR
2893 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0
2894 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2895 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
452a5efb
ILT
2896 || ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
2897 && (h->weakdef == NULL || h->weakdef->dynindx == -1))))
be228e0d
ILT
2898 {
2899 h->plt.offset = (bfd_vma) -1;
2900 return true;
2901 }
ede4eed4
KR
2902
2903 /* If we've already adjusted this symbol, don't do it again. This
2904 can happen via a recursive call. */
2905 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
2906 return true;
2907
2908 /* Don't look at this symbol again. Note that we must set this
2909 after checking the above conditions, because we may look at a
2910 symbol once, decide not to do anything, and then get called
2911 recursively later after REF_REGULAR is set below. */
2912 h->elf_link_hash_flags |= ELF_LINK_HASH_DYNAMIC_ADJUSTED;
2913
2914 /* If this is a weak definition, and we know a real definition, and
2915 the real symbol is not itself defined by a regular object file,
2916 then get a good value for the real definition. We handle the
2917 real symbol first, for the convenience of the backend routine.
2918
2919 Note that there is a confusing case here. If the real definition
2920 is defined by a regular object file, we don't get the real symbol
2921 from the dynamic object, but we do get the weak symbol. If the
2922 processor backend uses a COPY reloc, then if some routine in the
2923 dynamic object changes the real symbol, we will not see that
2924 change in the corresponding weak symbol. This is the way other
2925 ELF linkers work as well, and seems to be a result of the shared
2926 library model.
2927
2928 I will clarify this issue. Most SVR4 shared libraries define the
2929 variable _timezone and define timezone as a weak synonym. The
2930 tzset call changes _timezone. If you write
2931 extern int timezone;
2932 int _timezone = 5;
2933 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
2934 you might expect that, since timezone is a synonym for _timezone,
2935 the same number will print both times. However, if the processor
2936 backend uses a COPY reloc, then actually timezone will be copied
2937 into your process image, and, since you define _timezone
2938 yourself, _timezone will not. Thus timezone and _timezone will
2939 wind up at different memory locations. The tzset call will set
2940 _timezone, leaving timezone unchanged. */
2941
2942 if (h->weakdef != NULL)
2943 {
2944 struct elf_link_hash_entry *weakdef;
2945
2946 BFD_ASSERT (h->root.type == bfd_link_hash_defined
2947 || h->root.type == bfd_link_hash_defweak);
2948 weakdef = h->weakdef;
2949 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
2950 || weakdef->root.type == bfd_link_hash_defweak);
2951 BFD_ASSERT (weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC);
2952 if ((weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
2953 {
2954 /* This symbol is defined by a regular object file, so we
2955 will not do anything special. Clear weakdef for the
2956 convenience of the processor backend. */
2957 h->weakdef = NULL;
2958 }
2959 else
2960 {
2961 /* There is an implicit reference by a regular object file
2962 via the weak symbol. */
2963 weakdef->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
2964 if (! elf_adjust_dynamic_symbol (weakdef, (PTR) eif))
2965 return false;
2966 }
2967 }
2968
2969 dynobj = elf_hash_table (eif->info)->dynobj;
2970 bed = get_elf_backend_data (dynobj);
2971 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
2972 {
2973 eif->failed = true;
2974 return false;
2975 }
2976
2977 return true;
2978}
2979\f
d044b40a
ILT
2980/* This routine is used to export all defined symbols into the dynamic
2981 symbol table. It is called via elf_link_hash_traverse. */
2982
2983static boolean
2984elf_export_symbol (h, data)
2985 struct elf_link_hash_entry *h;
2986 PTR data;
2987{
2988 struct elf_info_failed *eif = (struct elf_info_failed *) data;
2989
e549b1d2
ILT
2990 /* Ignore indirect symbols. These are added by the versioning code. */
2991 if (h->root.type == bfd_link_hash_indirect)
2992 return true;
2993
d044b40a
ILT
2994 if (h->dynindx == -1
2995 && (h->elf_link_hash_flags
2996 & (ELF_LINK_HASH_DEF_REGULAR | ELF_LINK_HASH_REF_REGULAR)) != 0)
2997 {
2998 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
2999 {
3000 eif->failed = true;
3001 return false;
3002 }
3003 }
3004
3005 return true;
3006}
3007\f
3008/* Look through the symbols which are defined in other shared
3009 libraries and referenced here. Update the list of version
3010 dependencies. This will be put into the .gnu.version_r section.
3011 This function is called via elf_link_hash_traverse. */
3012
3013static boolean
3014elf_link_find_version_dependencies (h, data)
3015 struct elf_link_hash_entry *h;
3016 PTR data;
3017{
3018 struct elf_find_verdep_info *rinfo = (struct elf_find_verdep_info *) data;
3019 Elf_Internal_Verneed *t;
3020 Elf_Internal_Vernaux *a;
3021
3022 /* We only care about symbols defined in shared objects with version
3023 information. */
3024 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
a48ef404 3025 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
d044b40a
ILT
3026 || h->dynindx == -1
3027 || h->verinfo.verdef == NULL)
3028 return true;
3029
3030 /* See if we already know about this version. */
3031 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
3032 {
cf2cd4cf 3033 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
d044b40a
ILT
3034 continue;
3035
3036 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3037 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
3038 return true;
3039
3040 break;
3041 }
3042
3043 /* This is a new version. Add it to tree we are building. */
3044
3045 if (t == NULL)
3046 {
3047 t = (Elf_Internal_Verneed *) bfd_zalloc (rinfo->output_bfd, sizeof *t);
3048 if (t == NULL)
3049 {
3050 rinfo->failed = true;
3051 return false;
3052 }
3053
3054 t->vn_bfd = h->verinfo.verdef->vd_bfd;
3055 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
3056 elf_tdata (rinfo->output_bfd)->verref = t;
3057 }
3058
3059 a = (Elf_Internal_Vernaux *) bfd_zalloc (rinfo->output_bfd, sizeof *a);
3060
3061 /* Note that we are copying a string pointer here, and testing it
3062 above. If bfd_elf_string_from_elf_section is ever changed to
3063 discard the string data when low in memory, this will have to be
3064 fixed. */
3065 a->vna_nodename = h->verinfo.verdef->vd_nodename;
3066
3067 a->vna_flags = h->verinfo.verdef->vd_flags;
3068 a->vna_nextptr = t->vn_auxptr;
3069
3070 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
3071 ++rinfo->vers;
3072
3073 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
3074
3075 t->vn_auxptr = a;
3076
3077 return true;
3078}
3079
3080/* Figure out appropriate versions for all the symbols. We may not
3081 have the version number script until we have read all of the input
3082 files, so until that point we don't know which symbols should be
3083 local. This function is called via elf_link_hash_traverse. */
3084
3085static boolean
3086elf_link_assign_sym_version (h, data)
3087 struct elf_link_hash_entry *h;
3088 PTR data;
3089{
3090 struct elf_assign_sym_version_info *sinfo =
3091 (struct elf_assign_sym_version_info *) data;
3092 struct bfd_link_info *info = sinfo->info;
c19fbe0f 3093 struct elf_info_failed eif;
d044b40a
ILT
3094 char *p;
3095
c19fbe0f
ILT
3096 /* Fix the symbol flags. */
3097 eif.failed = false;
3098 eif.info = info;
3099 if (! elf_fix_symbol_flags (h, &eif))
3100 {
3101 if (eif.failed)
3102 sinfo->failed = true;
3103 return false;
3104 }
3105
d044b40a
ILT
3106 /* We only need version numbers for symbols defined in regular
3107 objects. */
3108 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3109 return true;
3110
3111 p = strchr (h->root.root.string, ELF_VER_CHR);
3112 if (p != NULL && h->verinfo.vertree == NULL)
3113 {
3114 struct bfd_elf_version_tree *t;
3115 boolean hidden;
3116
3117 hidden = true;
3118
3119 /* There are two consecutive ELF_VER_CHR characters if this is
3120 not a hidden symbol. */
3121 ++p;
3122 if (*p == ELF_VER_CHR)
3123 {
3124 hidden = false;
3125 ++p;
3126 }
3127
3128 /* If there is no version string, we can just return out. */
3129 if (*p == '\0')
3130 {
3131 if (hidden)
3132 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
3133 return true;
3134 }
3135
3136 /* Look for the version. If we find it, it is no longer weak. */
3137 for (t = sinfo->verdefs; t != NULL; t = t->next)
3138 {
3139 if (strcmp (t->name, p) == 0)
3140 {
bccab630
RH
3141 int len;
3142 char *alc;
3143 struct bfd_elf_version_expr *d;
3144
3145 len = p - h->root.root.string;
3146 alc = bfd_alloc (sinfo->output_bfd, len);
3147 if (alc == NULL)
3148 return false;
3149 strncpy (alc, h->root.root.string, len - 1);
3150 alc[len - 1] = '\0';
3151 if (alc[len - 2] == ELF_VER_CHR)
3152 alc[len - 2] = '\0';
3153
d044b40a
ILT
3154 h->verinfo.vertree = t;
3155 t->used = true;
bccab630
RH
3156 d = NULL;
3157
3158 if (t->globals != NULL)
3159 {
3160 for (d = t->globals; d != NULL; d = d->next)
3161 {
3162 if ((d->match[0] == '*' && d->match[1] == '\0')
3163 || fnmatch (d->match, alc, 0) == 0)
3164 break;
3165 }
3166 }
d6bfcdb5
ILT
3167
3168 /* See if there is anything to force this symbol to
3169 local scope. */
bccab630 3170 if (d == NULL && t->locals != NULL)
d6bfcdb5 3171 {
d6bfcdb5
ILT
3172 for (d = t->locals; d != NULL; d = d->next)
3173 {
3174 if ((d->match[0] == '*' && d->match[1] == '\0')
3175 || fnmatch (d->match, alc, 0) == 0)
3176 {
3177 if (h->dynindx != -1
3178 && info->shared
c19fbe0f 3179 && ! sinfo->export_dynamic)
d6bfcdb5
ILT
3180 {
3181 sinfo->removed_dynamic = true;
52c92c7f 3182 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
c19fbe0f
ILT
3183 h->elf_link_hash_flags &=~
3184 ELF_LINK_HASH_NEEDS_PLT;
d6bfcdb5 3185 h->dynindx = -1;
be228e0d 3186 h->plt.offset = (bfd_vma) -1;
d6bfcdb5
ILT
3187 /* FIXME: The name of the symbol has
3188 already been recorded in the dynamic
3189 string table section. */
3190 }
3191
3192 break;
3193 }
3194 }
d6bfcdb5
ILT
3195 }
3196
bccab630 3197 bfd_release (sinfo->output_bfd, alc);
d044b40a
ILT
3198 break;
3199 }
3200 }
3201
d6bfcdb5
ILT
3202 /* If we are building an application, we need to create a
3203 version node for this version. */
3204 if (t == NULL && ! info->shared)
3205 {
3206 struct bfd_elf_version_tree **pp;
3207 int version_index;
3208
3209 /* If we aren't going to export this symbol, we don't need
3210 to worry about it. */
3211 if (h->dynindx == -1)
3212 return true;
3213
3214 t = ((struct bfd_elf_version_tree *)
3215 bfd_alloc (sinfo->output_bfd, sizeof *t));
3216 if (t == NULL)
3217 {
3218 sinfo->failed = true;
3219 return false;
3220 }
3221
3222 t->next = NULL;
3223 t->name = p;
3224 t->globals = NULL;
3225 t->locals = NULL;
3226 t->deps = NULL;
3227 t->name_indx = (unsigned int) -1;
3228 t->used = true;
3229
3230 version_index = 1;
3231 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
3232 ++version_index;
3233 t->vernum = version_index;
3234
3235 *pp = t;
3236
3237 h->verinfo.vertree = t;
3238 }
3239 else if (t == NULL)
d044b40a 3240 {
d6bfcdb5
ILT
3241 /* We could not find the version for a symbol when
3242 generating a shared archive. Return an error. */
d044b40a 3243 (*_bfd_error_handler)
53d3ce37 3244 (_("%s: undefined versioned symbol name %s"),
52c92c7f 3245 bfd_get_filename (sinfo->output_bfd), h->root.root.string);
d044b40a
ILT
3246 bfd_set_error (bfd_error_bad_value);
3247 sinfo->failed = true;
3248 return false;
3249 }
3250
3251 if (hidden)
3252 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
3253 }
3254
3255 /* If we don't have a version for this symbol, see if we can find
3256 something. */
3257 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
3258 {
3259 struct bfd_elf_version_tree *t;
3260 struct bfd_elf_version_tree *deflt;
3261 struct bfd_elf_version_expr *d;
3262
3263 /* See if can find what version this symbol is in. If the
c19fbe0f 3264 symbol is supposed to be local, then don't actually register
d044b40a
ILT
3265 it. */
3266 deflt = NULL;
3267 for (t = sinfo->verdefs; t != NULL; t = t->next)
3268 {
3269 if (t->globals != NULL)
3270 {
3271 for (d = t->globals; d != NULL; d = d->next)
3272 {
3273 if (fnmatch (d->match, h->root.root.string, 0) == 0)
3274 {
3275 h->verinfo.vertree = t;
3276 break;
3277 }
3278 }
3279
3280 if (d != NULL)
3281 break;
3282 }
3283
3284 if (t->locals != NULL)
3285 {
3286 for (d = t->locals; d != NULL; d = d->next)
3287 {
3288 if (d->match[0] == '*' && d->match[1] == '\0')
3289 deflt = t;
3290 else if (fnmatch (d->match, h->root.root.string, 0) == 0)
3291 {
3292 h->verinfo.vertree = t;
3293 if (h->dynindx != -1
3294 && info->shared
c19fbe0f 3295 && ! sinfo->export_dynamic)
d044b40a
ILT
3296 {
3297 sinfo->removed_dynamic = true;
52c92c7f 3298 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
c19fbe0f 3299 h->elf_link_hash_flags &=~ ELF_LINK_HASH_NEEDS_PLT;
d044b40a 3300 h->dynindx = -1;
be228e0d 3301 h->plt.offset = (bfd_vma) -1;
d044b40a
ILT
3302 /* FIXME: The name of the symbol has already
3303 been recorded in the dynamic string table
3304 section. */
3305 }
3306 break;
3307 }
3308 }
3309
3310 if (d != NULL)
3311 break;
3312 }
3313 }
3314
3315 if (deflt != NULL && h->verinfo.vertree == NULL)
3316 {
3317 h->verinfo.vertree = deflt;
3318 if (h->dynindx != -1
3319 && info->shared
c19fbe0f 3320 && ! sinfo->export_dynamic)
d044b40a
ILT
3321 {
3322 sinfo->removed_dynamic = true;
52c92c7f 3323 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
c19fbe0f 3324 h->elf_link_hash_flags &=~ ELF_LINK_HASH_NEEDS_PLT;
d044b40a 3325 h->dynindx = -1;
be228e0d 3326 h->plt.offset = (bfd_vma) -1;
d044b40a
ILT
3327 /* FIXME: The name of the symbol has already been
3328 recorded in the dynamic string table section. */
3329 }
3330 }
3331 }
3332
3333 return true;
3334}
3335
3336/* This function is used to renumber the dynamic symbols, if some of
3337 them are removed because they are marked as local. This is called
3338 via elf_link_hash_traverse. */
3339
3340static boolean
3341elf_link_renumber_dynsyms (h, data)
3342 struct elf_link_hash_entry *h;
3343 PTR data;
3344{
3345 struct bfd_link_info *info = (struct bfd_link_info *) data;
3346
3347 if (h->dynindx != -1)
3348 {
3349 h->dynindx = elf_hash_table (info)->dynsymcount;
3350 ++elf_hash_table (info)->dynsymcount;
3351 }
3352
3353 return true;
3354}
3355\f
ede4eed4
KR
3356/* Final phase of ELF linker. */
3357
3358/* A structure we use to avoid passing large numbers of arguments. */
3359
3360struct elf_final_link_info
3361{
3362 /* General link information. */
3363 struct bfd_link_info *info;
3364 /* Output BFD. */
3365 bfd *output_bfd;
3366 /* Symbol string table. */
3367 struct bfd_strtab_hash *symstrtab;
3368 /* .dynsym section. */
3369 asection *dynsym_sec;
3370 /* .hash section. */
3371 asection *hash_sec;
d044b40a
ILT
3372 /* symbol version section (.gnu.version). */
3373 asection *symver_sec;
ede4eed4
KR
3374 /* Buffer large enough to hold contents of any section. */
3375 bfd_byte *contents;
3376 /* Buffer large enough to hold external relocs of any section. */
3377 PTR external_relocs;
3378 /* Buffer large enough to hold internal relocs of any section. */
3379 Elf_Internal_Rela *internal_relocs;
3380 /* Buffer large enough to hold external local symbols of any input
3381 BFD. */
3382 Elf_External_Sym *external_syms;
3383 /* Buffer large enough to hold internal local symbols of any input
3384 BFD. */
3385 Elf_Internal_Sym *internal_syms;
3386 /* Array large enough to hold a symbol index for each local symbol
3387 of any input BFD. */
3388 long *indices;
3389 /* Array large enough to hold a section pointer for each local
3390 symbol of any input BFD. */
3391 asection **sections;
3392 /* Buffer to hold swapped out symbols. */
3393 Elf_External_Sym *symbuf;
3394 /* Number of swapped out symbols in buffer. */
3395 size_t symbuf_count;
3396 /* Number of symbols which fit in symbuf. */
3397 size_t symbuf_size;
3398};
3399
3400static boolean elf_link_output_sym
3401 PARAMS ((struct elf_final_link_info *, const char *,
3402 Elf_Internal_Sym *, asection *));
3403static boolean elf_link_flush_output_syms
3404 PARAMS ((struct elf_final_link_info *));
3405static boolean elf_link_output_extsym
3406 PARAMS ((struct elf_link_hash_entry *, PTR));
3407static boolean elf_link_input_bfd
3408 PARAMS ((struct elf_final_link_info *, bfd *));
3409static boolean elf_reloc_link_order
3410 PARAMS ((bfd *, struct bfd_link_info *, asection *,
3411 struct bfd_link_order *));
3412
52c92c7f 3413/* This struct is used to pass information to elf_link_output_extsym. */
ede4eed4 3414
52c92c7f 3415struct elf_outext_info
ede4eed4
KR
3416{
3417 boolean failed;
52c92c7f 3418 boolean localsyms;
ede4eed4 3419 struct elf_final_link_info *finfo;
ff12f303 3420};
ede4eed4
KR
3421
3422/* Do the final step of an ELF link. */
3423
3424boolean
3425elf_bfd_final_link (abfd, info)
3426 bfd *abfd;
3427 struct bfd_link_info *info;
3428{
3429 boolean dynamic;
3430 bfd *dynobj;
3431 struct elf_final_link_info finfo;
3432 register asection *o;
3433 register struct bfd_link_order *p;
3434 register bfd *sub;
3435 size_t max_contents_size;
3436 size_t max_external_reloc_size;
3437 size_t max_internal_reloc_count;
3438 size_t max_sym_count;
3439 file_ptr off;
3440 Elf_Internal_Sym elfsym;
3441 unsigned int i;
3442 Elf_Internal_Shdr *symtab_hdr;
3443 Elf_Internal_Shdr *symstrtab_hdr;
3444 struct elf_backend_data *bed = get_elf_backend_data (abfd);
52c92c7f 3445 struct elf_outext_info eoinfo;
ede4eed4
KR
3446
3447 if (info->shared)
3448 abfd->flags |= DYNAMIC;
3449
3450 dynamic = elf_hash_table (info)->dynamic_sections_created;
3451 dynobj = elf_hash_table (info)->dynobj;
3452
3453 finfo.info = info;
3454 finfo.output_bfd = abfd;
3455 finfo.symstrtab = elf_stringtab_init ();
3456 if (finfo.symstrtab == NULL)
3457 return false;
d044b40a 3458
ede4eed4
KR
3459 if (! dynamic)
3460 {
3461 finfo.dynsym_sec = NULL;
3462 finfo.hash_sec = NULL;
d044b40a 3463 finfo.symver_sec = NULL;
ede4eed4
KR
3464 }
3465 else
3466 {
3467 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
3468 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
3469 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
d044b40a
ILT
3470 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
3471 /* Note that it is OK if symver_sec is NULL. */
ede4eed4 3472 }
d044b40a 3473
ede4eed4
KR
3474 finfo.contents = NULL;
3475 finfo.external_relocs = NULL;
3476 finfo.internal_relocs = NULL;
3477 finfo.external_syms = NULL;
3478 finfo.internal_syms = NULL;
3479 finfo.indices = NULL;
3480 finfo.sections = NULL;
3481 finfo.symbuf = NULL;
3482 finfo.symbuf_count = 0;
3483
3484 /* Count up the number of relocations we will output for each output
3485 section, so that we know the sizes of the reloc sections. We
3486 also figure out some maximum sizes. */
3487 max_contents_size = 0;
3488 max_external_reloc_size = 0;
3489 max_internal_reloc_count = 0;
3490 max_sym_count = 0;
3491 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
3492 {
3493 o->reloc_count = 0;
3494
3495 for (p = o->link_order_head; p != NULL; p = p->next)
3496 {
3497 if (p->type == bfd_section_reloc_link_order
3498 || p->type == bfd_symbol_reloc_link_order)
3499 ++o->reloc_count;
3500 else if (p->type == bfd_indirect_link_order)
3501 {
3502 asection *sec;
3503
3504 sec = p->u.indirect.section;
3505
7ec49f91
ILT
3506 /* Mark all sections which are to be included in the
3507 link. This will normally be every section. We need
3508 to do this so that we can identify any sections which
3509 the linker has decided to not include. */
ff0e4a93 3510 sec->linker_mark = true;
7ec49f91 3511
ede4eed4
KR
3512 if (info->relocateable)
3513 o->reloc_count += sec->reloc_count;
3514
3515 if (sec->_raw_size > max_contents_size)
3516 max_contents_size = sec->_raw_size;
3517 if (sec->_cooked_size > max_contents_size)
3518 max_contents_size = sec->_cooked_size;
3519
3520 /* We are interested in just local symbols, not all
3521 symbols. */
d044b40a
ILT
3522 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
3523 && (sec->owner->flags & DYNAMIC) == 0)
ede4eed4
KR
3524 {
3525 size_t sym_count;
3526
3527 if (elf_bad_symtab (sec->owner))
3528 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
3529 / sizeof (Elf_External_Sym));
3530 else
3531 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
3532
3533 if (sym_count > max_sym_count)
3534 max_sym_count = sym_count;
3535
3536 if ((sec->flags & SEC_RELOC) != 0)
3537 {
3538 size_t ext_size;
3539
3540 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
3541 if (ext_size > max_external_reloc_size)
3542 max_external_reloc_size = ext_size;
3543 if (sec->reloc_count > max_internal_reloc_count)
3544 max_internal_reloc_count = sec->reloc_count;
3545 }
3546 }
3547 }
3548 }
3549
3550 if (o->reloc_count > 0)
3551 o->flags |= SEC_RELOC;
3552 else
3553 {
3554 /* Explicitly clear the SEC_RELOC flag. The linker tends to
3555 set it (this is probably a bug) and if it is set
3556 assign_section_numbers will create a reloc section. */
3557 o->flags &=~ SEC_RELOC;
3558 }
3559
3560 /* If the SEC_ALLOC flag is not set, force the section VMA to
3561 zero. This is done in elf_fake_sections as well, but forcing
3562 the VMA to 0 here will ensure that relocs against these
3563 sections are handled correctly. */
2e0567eb
ILT
3564 if ((o->flags & SEC_ALLOC) == 0
3565 && ! o->user_set_vma)
ede4eed4
KR
3566 o->vma = 0;
3567 }
3568
3569 /* Figure out the file positions for everything but the symbol table
3570 and the relocs. We set symcount to force assign_section_numbers
3571 to create a symbol table. */
3572 abfd->symcount = info->strip == strip_all ? 0 : 1;
3573 BFD_ASSERT (! abfd->output_has_begun);
3574 if (! _bfd_elf_compute_section_file_positions (abfd, info))
3575 goto error_return;
3576
3577 /* That created the reloc sections. Set their sizes, and assign
3578 them file positions, and allocate some buffers. */
3579 for (o = abfd->sections; o != NULL; o = o->next)
3580 {
3581 if ((o->flags & SEC_RELOC) != 0)
3582 {
3583 Elf_Internal_Shdr *rel_hdr;
3584 register struct elf_link_hash_entry **p, **pend;
3585
3586 rel_hdr = &elf_section_data (o)->rel_hdr;
3587
3588 rel_hdr->sh_size = rel_hdr->sh_entsize * o->reloc_count;
3589
3590 /* The contents field must last into write_object_contents,
3591 so we allocate it with bfd_alloc rather than malloc. */
3592 rel_hdr->contents = (PTR) bfd_alloc (abfd, rel_hdr->sh_size);
3593 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
a9713b91 3594 goto error_return;
ede4eed4
KR
3595
3596 p = ((struct elf_link_hash_entry **)
58142f10
ILT
3597 bfd_malloc (o->reloc_count
3598 * sizeof (struct elf_link_hash_entry *)));
ede4eed4 3599 if (p == NULL && o->reloc_count != 0)
58142f10 3600 goto error_return;
ede4eed4
KR
3601 elf_section_data (o)->rel_hashes = p;
3602 pend = p + o->reloc_count;
3603 for (; p < pend; p++)
3604 *p = NULL;
3605
3606 /* Use the reloc_count field as an index when outputting the
3607 relocs. */
3608 o->reloc_count = 0;
3609 }
3610 }
3611
3612 _bfd_elf_assign_file_positions_for_relocs (abfd);
3613
3614 /* We have now assigned file positions for all the sections except
3615 .symtab and .strtab. We start the .symtab section at the current
3616 file position, and write directly to it. We build the .strtab
ab276dfa 3617 section in memory. */
ede4eed4
KR
3618 abfd->symcount = 0;
3619 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3620 /* sh_name is set in prep_headers. */
3621 symtab_hdr->sh_type = SHT_SYMTAB;
3622 symtab_hdr->sh_flags = 0;
3623 symtab_hdr->sh_addr = 0;
3624 symtab_hdr->sh_size = 0;
3625 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
3626 /* sh_link is set in assign_section_numbers. */
3627 /* sh_info is set below. */
3628 /* sh_offset is set just below. */
3629 symtab_hdr->sh_addralign = 4; /* FIXME: system dependent? */
3630
3631 off = elf_tdata (abfd)->next_file_pos;
3632 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, true);
3633
3634 /* Note that at this point elf_tdata (abfd)->next_file_pos is
3635 incorrect. We do not yet know the size of the .symtab section.
3636 We correct next_file_pos below, after we do know the size. */
3637
3638 /* Allocate a buffer to hold swapped out symbols. This is to avoid
3639 continuously seeking to the right position in the file. */
3640 if (! info->keep_memory || max_sym_count < 20)
3641 finfo.symbuf_size = 20;
3642 else
3643 finfo.symbuf_size = max_sym_count;
3644 finfo.symbuf = ((Elf_External_Sym *)
58142f10 3645 bfd_malloc (finfo.symbuf_size * sizeof (Elf_External_Sym)));
ede4eed4 3646 if (finfo.symbuf == NULL)
58142f10 3647 goto error_return;
ede4eed4
KR
3648
3649 /* Start writing out the symbol table. The first symbol is always a
3650 dummy symbol. */
28c16b55
ILT
3651 if (info->strip != strip_all || info->relocateable)
3652 {
3653 elfsym.st_value = 0;
3654 elfsym.st_size = 0;
3655 elfsym.st_info = 0;
3656 elfsym.st_other = 0;
3657 elfsym.st_shndx = SHN_UNDEF;
3658 if (! elf_link_output_sym (&finfo, (const char *) NULL,
3659 &elfsym, bfd_und_section_ptr))
3660 goto error_return;
3661 }
ede4eed4
KR
3662
3663#if 0
3664 /* Some standard ELF linkers do this, but we don't because it causes
3665 bootstrap comparison failures. */
3666 /* Output a file symbol for the output file as the second symbol.
3667 We output this even if we are discarding local symbols, although
3668 I'm not sure if this is correct. */
3669 elfsym.st_value = 0;
3670 elfsym.st_size = 0;
3671 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
3672 elfsym.st_other = 0;
3673 elfsym.st_shndx = SHN_ABS;
3674 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
3675 &elfsym, bfd_abs_section_ptr))
3676 goto error_return;
3677#endif
3678
3679 /* Output a symbol for each section. We output these even if we are
3680 discarding local symbols, since they are used for relocs. These
3681 symbols have no names. We store the index of each one in the
3682 index field of the section, so that we can find it again when
3683 outputting relocs. */
28c16b55 3684 if (info->strip != strip_all || info->relocateable)
ede4eed4 3685 {
28c16b55
ILT
3686 elfsym.st_size = 0;
3687 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
3688 elfsym.st_other = 0;
3689 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
3690 {
3691 o = section_from_elf_index (abfd, i);
3692 if (o != NULL)
3693 o->target_index = abfd->symcount;
3694 elfsym.st_shndx = i;
34bc6ffc
ILT
3695 if (info->relocateable || o == NULL)
3696 elfsym.st_value = 0;
3697 else
3698 elfsym.st_value = o->vma;
28c16b55
ILT
3699 if (! elf_link_output_sym (&finfo, (const char *) NULL,
3700 &elfsym, o))
3701 goto error_return;
3702 }
ede4eed4
KR
3703 }
3704
3705 /* Allocate some memory to hold information read in from the input
3706 files. */
58142f10
ILT
3707 finfo.contents = (bfd_byte *) bfd_malloc (max_contents_size);
3708 finfo.external_relocs = (PTR) bfd_malloc (max_external_reloc_size);
ede4eed4 3709 finfo.internal_relocs = ((Elf_Internal_Rela *)
58142f10
ILT
3710 bfd_malloc (max_internal_reloc_count
3711 * sizeof (Elf_Internal_Rela)));
ede4eed4 3712 finfo.external_syms = ((Elf_External_Sym *)
58142f10
ILT
3713 bfd_malloc (max_sym_count
3714 * sizeof (Elf_External_Sym)));
ede4eed4 3715 finfo.internal_syms = ((Elf_Internal_Sym *)
58142f10
ILT
3716 bfd_malloc (max_sym_count
3717 * sizeof (Elf_Internal_Sym)));
3718 finfo.indices = (long *) bfd_malloc (max_sym_count * sizeof (long));
3719 finfo.sections = ((asection **)
3720 bfd_malloc (max_sym_count * sizeof (asection *)));
ede4eed4
KR
3721 if ((finfo.contents == NULL && max_contents_size != 0)
3722 || (finfo.external_relocs == NULL && max_external_reloc_size != 0)
3723 || (finfo.internal_relocs == NULL && max_internal_reloc_count != 0)
3724 || (finfo.external_syms == NULL && max_sym_count != 0)
3725 || (finfo.internal_syms == NULL && max_sym_count != 0)
3726 || (finfo.indices == NULL && max_sym_count != 0)
3727 || (finfo.sections == NULL && max_sym_count != 0))
58142f10 3728 goto error_return;
ede4eed4
KR
3729
3730 /* Since ELF permits relocations to be against local symbols, we
3731 must have the local symbols available when we do the relocations.
3732 Since we would rather only read the local symbols once, and we
3733 would rather not keep them in memory, we handle all the
3734 relocations for a single input file at the same time.
3735
3736 Unfortunately, there is no way to know the total number of local
3737 symbols until we have seen all of them, and the local symbol
3738 indices precede the global symbol indices. This means that when
3739 we are generating relocateable output, and we see a reloc against
3740 a global symbol, we can not know the symbol index until we have
3741 finished examining all the local symbols to see which ones we are
3742 going to output. To deal with this, we keep the relocations in
3743 memory, and don't output them until the end of the link. This is
3744 an unfortunate waste of memory, but I don't see a good way around
3745 it. Fortunately, it only happens when performing a relocateable
3746 link, which is not the common case. FIXME: If keep_memory is set
3747 we could write the relocs out and then read them again; I don't
3748 know how bad the memory loss will be. */
3749
146f8b77 3750 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
ede4eed4
KR
3751 sub->output_has_begun = false;
3752 for (o = abfd->sections; o != NULL; o = o->next)
3753 {
3754 for (p = o->link_order_head; p != NULL; p = p->next)
3755 {
3756 if (p->type == bfd_indirect_link_order
3757 && (bfd_get_flavour (p->u.indirect.section->owner)
3758 == bfd_target_elf_flavour))
3759 {
3760 sub = p->u.indirect.section->owner;
3761 if (! sub->output_has_begun)
3762 {
3763 if (! elf_link_input_bfd (&finfo, sub))
3764 goto error_return;
3765 sub->output_has_begun = true;
3766 }
3767 }
3768 else if (p->type == bfd_section_reloc_link_order
3769 || p->type == bfd_symbol_reloc_link_order)
3770 {
3771 if (! elf_reloc_link_order (abfd, info, o, p))
3772 goto error_return;
3773 }
3774 else
3775 {
3776 if (! _bfd_default_link_order (abfd, info, o, p))
3777 goto error_return;
3778 }
3779 }
3780 }
3781
3782 /* That wrote out all the local symbols. Finish up the symbol table
3783 with the global symbols. */
3784
52c92c7f
ILT
3785 if (info->strip != strip_all && info->shared)
3786 {
3787 /* Output any global symbols that got converted to local in a
3788 version script. We do this in a separate step since ELF
3789 requires all local symbols to appear prior to any global
3790 symbols. FIXME: We should only do this if some global
3791 symbols were, in fact, converted to become local. FIXME:
3792 Will this work correctly with the Irix 5 linker? */
3793 eoinfo.failed = false;
3794 eoinfo.finfo = &finfo;
3795 eoinfo.localsyms = true;
3796 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
3797 (PTR) &eoinfo);
3798 if (eoinfo.failed)
3799 return false;
3800 }
3801
ede4eed4
KR
3802 /* The sh_info field records the index of the first non local
3803 symbol. */
3804 symtab_hdr->sh_info = abfd->symcount;
3805 if (dynamic)
3806 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info = 1;
3807
3808 /* We get the global symbols from the hash table. */
52c92c7f
ILT
3809 eoinfo.failed = false;
3810 eoinfo.localsyms = false;
3811 eoinfo.finfo = &finfo;
ede4eed4 3812 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
52c92c7f
ILT
3813 (PTR) &eoinfo);
3814 if (eoinfo.failed)
ede4eed4
KR
3815 return false;
3816
3817 /* Flush all symbols to the file. */
3818 if (! elf_link_flush_output_syms (&finfo))
3819 return false;
3820
3821 /* Now we know the size of the symtab section. */
3822 off += symtab_hdr->sh_size;
3823
3824 /* Finish up and write out the symbol string table (.strtab)
3825 section. */
3826 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
3827 /* sh_name was set in prep_headers. */
3828 symstrtab_hdr->sh_type = SHT_STRTAB;
3829 symstrtab_hdr->sh_flags = 0;
3830 symstrtab_hdr->sh_addr = 0;
3831 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
3832 symstrtab_hdr->sh_entsize = 0;
3833 symstrtab_hdr->sh_link = 0;
3834 symstrtab_hdr->sh_info = 0;
3835 /* sh_offset is set just below. */
3836 symstrtab_hdr->sh_addralign = 1;
3837
3838 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, true);
3839 elf_tdata (abfd)->next_file_pos = off;
3840
28c16b55
ILT
3841 if (abfd->symcount > 0)
3842 {
3843 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
3844 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
3845 return false;
3846 }
ede4eed4
KR
3847
3848 /* Adjust the relocs to have the correct symbol indices. */
3849 for (o = abfd->sections; o != NULL; o = o->next)
3850 {
3851 struct elf_link_hash_entry **rel_hash;
3852 Elf_Internal_Shdr *rel_hdr;
3853
3854 if ((o->flags & SEC_RELOC) == 0)
3855 continue;
3856
3857 rel_hash = elf_section_data (o)->rel_hashes;
3858 rel_hdr = &elf_section_data (o)->rel_hdr;
3859 for (i = 0; i < o->reloc_count; i++, rel_hash++)
3860 {
3861 if (*rel_hash == NULL)
3862 continue;
ff12f303 3863
ede4eed4
KR
3864 BFD_ASSERT ((*rel_hash)->indx >= 0);
3865
3866 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
3867 {
3868 Elf_External_Rel *erel;
3869 Elf_Internal_Rel irel;
3870
3871 erel = (Elf_External_Rel *) rel_hdr->contents + i;
3872 elf_swap_reloc_in (abfd, erel, &irel);
3873 irel.r_info = ELF_R_INFO ((*rel_hash)->indx,
3874 ELF_R_TYPE (irel.r_info));
3875 elf_swap_reloc_out (abfd, &irel, erel);
3876 }
3877 else
3878 {
3879 Elf_External_Rela *erela;
3880 Elf_Internal_Rela irela;
3881
3882 BFD_ASSERT (rel_hdr->sh_entsize
3883 == sizeof (Elf_External_Rela));
3884
3885 erela = (Elf_External_Rela *) rel_hdr->contents + i;
3886 elf_swap_reloca_in (abfd, erela, &irela);
3887 irela.r_info = ELF_R_INFO ((*rel_hash)->indx,
3888 ELF_R_TYPE (irela.r_info));
3889 elf_swap_reloca_out (abfd, &irela, erela);
3890 }
3891 }
3892
3893 /* Set the reloc_count field to 0 to prevent write_relocs from
3894 trying to swap the relocs out itself. */
3895 o->reloc_count = 0;
3896 }
3897
3898 /* If we are linking against a dynamic object, or generating a
3899 shared library, finish up the dynamic linking information. */
3900 if (dynamic)
3901 {
3902 Elf_External_Dyn *dyncon, *dynconend;
3903
3904 /* Fix up .dynamic entries. */
3905 o = bfd_get_section_by_name (dynobj, ".dynamic");
3906 BFD_ASSERT (o != NULL);
3907
3908 dyncon = (Elf_External_Dyn *) o->contents;
3909 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
3910 for (; dyncon < dynconend; dyncon++)
3911 {
3912 Elf_Internal_Dyn dyn;
3913 const char *name;
3914 unsigned int type;
3915
3916 elf_swap_dyn_in (dynobj, dyncon, &dyn);
3917
3918 switch (dyn.d_tag)
3919 {
3920 default:
3921 break;
3922
3923 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on
3924 magic _init and _fini symbols. This is pretty ugly,
3925 but we are compatible. */
3926 case DT_INIT:
3927 name = "_init";
3928 goto get_sym;
3929 case DT_FINI:
3930 name = "_fini";
3931 get_sym:
3932 {
3933 struct elf_link_hash_entry *h;
3934
3935 h = elf_link_hash_lookup (elf_hash_table (info), name,
3936 false, false, true);
d6f672b8
ILT
3937 if (h != NULL
3938 && (h->root.type == bfd_link_hash_defined
3939 || h->root.type == bfd_link_hash_defweak))
ede4eed4
KR
3940 {
3941 dyn.d_un.d_val = h->root.u.def.value;
3942 o = h->root.u.def.section;
3943 if (o->output_section != NULL)
3944 dyn.d_un.d_val += (o->output_section->vma
3945 + o->output_offset);
3946 else
d6f672b8
ILT
3947 {
3948 /* The symbol is imported from another shared
3949 library and does not apply to this one. */
3950 dyn.d_un.d_val = 0;
3951 }
3952
3953 elf_swap_dyn_out (dynobj, &dyn, dyncon);
ede4eed4 3954 }
ede4eed4
KR
3955 }
3956 break;
3957
3958 case DT_HASH:
3959 name = ".hash";
3960 goto get_vma;
3961 case DT_STRTAB:
3962 name = ".dynstr";
3963 goto get_vma;
3964 case DT_SYMTAB:
3965 name = ".dynsym";
d044b40a
ILT
3966 goto get_vma;
3967 case DT_VERDEF:
3968 name = ".gnu.version_d";
3969 goto get_vma;
3970 case DT_VERNEED:
3971 name = ".gnu.version_r";
3972 goto get_vma;
3973 case DT_VERSYM:
3974 name = ".gnu.version";
ede4eed4
KR
3975 get_vma:
3976 o = bfd_get_section_by_name (abfd, name);
3977 BFD_ASSERT (o != NULL);
3978 dyn.d_un.d_ptr = o->vma;
3979 elf_swap_dyn_out (dynobj, &dyn, dyncon);
3980 break;
3981
3982 case DT_REL:
3983 case DT_RELA:
3984 case DT_RELSZ:
3985 case DT_RELASZ:
3986 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
3987 type = SHT_REL;
3988 else
3989 type = SHT_RELA;
3990 dyn.d_un.d_val = 0;
3991 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
3992 {
3993 Elf_Internal_Shdr *hdr;
3994
3995 hdr = elf_elfsections (abfd)[i];
3996 if (hdr->sh_type == type
3997 && (hdr->sh_flags & SHF_ALLOC) != 0)
3998 {
3999 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
4000 dyn.d_un.d_val += hdr->sh_size;
4001 else
4002 {
4003 if (dyn.d_un.d_val == 0
4004 || hdr->sh_addr < dyn.d_un.d_val)
4005 dyn.d_un.d_val = hdr->sh_addr;
4006 }
4007 }
4008 }
4009 elf_swap_dyn_out (dynobj, &dyn, dyncon);
4010 break;
4011 }
4012 }
4013 }
4014
4015 /* If we have created any dynamic sections, then output them. */
4016 if (dynobj != NULL)
4017 {
4018 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
4019 goto error_return;
4020
4021 for (o = dynobj->sections; o != NULL; o = o->next)
4022 {
4023 if ((o->flags & SEC_HAS_CONTENTS) == 0
4024 || o->_raw_size == 0)
4025 continue;
ff12f303 4026 if ((o->flags & SEC_LINKER_CREATED) == 0)
ede4eed4
KR
4027 {
4028 /* At this point, we are only interested in sections
ff12f303 4029 created by elf_link_create_dynamic_sections. */
ede4eed4
KR
4030 continue;
4031 }
4032 if ((elf_section_data (o->output_section)->this_hdr.sh_type
4033 != SHT_STRTAB)
4034 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
4035 {
4036 if (! bfd_set_section_contents (abfd, o->output_section,
4037 o->contents, o->output_offset,
4038 o->_raw_size))
4039 goto error_return;
4040 }
4041 else
4042 {
4043 file_ptr off;
4044
4045 /* The contents of the .dynstr section are actually in a
4046 stringtab. */
4047 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
4048 if (bfd_seek (abfd, off, SEEK_SET) != 0
4049 || ! _bfd_stringtab_emit (abfd,
4050 elf_hash_table (info)->dynstr))
4051 goto error_return;
4052 }
4053 }
4054 }
4055
1726b8f0
ILT
4056 /* If we have optimized stabs strings, output them. */
4057 if (elf_hash_table (info)->stab_info != NULL)
4058 {
4059 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
4060 goto error_return;
4061 }
4062
ede4eed4
KR
4063 if (finfo.symstrtab != NULL)
4064 _bfd_stringtab_free (finfo.symstrtab);
4065 if (finfo.contents != NULL)
4066 free (finfo.contents);
4067 if (finfo.external_relocs != NULL)
4068 free (finfo.external_relocs);
4069 if (finfo.internal_relocs != NULL)
4070 free (finfo.internal_relocs);
4071 if (finfo.external_syms != NULL)
4072 free (finfo.external_syms);
4073 if (finfo.internal_syms != NULL)
4074 free (finfo.internal_syms);
4075 if (finfo.indices != NULL)
4076 free (finfo.indices);
4077 if (finfo.sections != NULL)
4078 free (finfo.sections);
4079 if (finfo.symbuf != NULL)
4080 free (finfo.symbuf);
4081 for (o = abfd->sections; o != NULL; o = o->next)
4082 {
4083 if ((o->flags & SEC_RELOC) != 0
4084 && elf_section_data (o)->rel_hashes != NULL)
4085 free (elf_section_data (o)->rel_hashes);
4086 }
4087
4088 elf_tdata (abfd)->linker = true;
4089
4090 return true;
4091
4092 error_return:
4093 if (finfo.symstrtab != NULL)
4094 _bfd_stringtab_free (finfo.symstrtab);
4095 if (finfo.contents != NULL)
4096 free (finfo.contents);
4097 if (finfo.external_relocs != NULL)
4098 free (finfo.external_relocs);
4099 if (finfo.internal_relocs != NULL)
4100 free (finfo.internal_relocs);
4101 if (finfo.external_syms != NULL)
4102 free (finfo.external_syms);
4103 if (finfo.internal_syms != NULL)
4104 free (finfo.internal_syms);
4105 if (finfo.indices != NULL)
4106 free (finfo.indices);
4107 if (finfo.sections != NULL)
4108 free (finfo.sections);
4109 if (finfo.symbuf != NULL)
4110 free (finfo.symbuf);
4111 for (o = abfd->sections; o != NULL; o = o->next)
4112 {
4113 if ((o->flags & SEC_RELOC) != 0
4114 && elf_section_data (o)->rel_hashes != NULL)
4115 free (elf_section_data (o)->rel_hashes);
4116 }
4117
4118 return false;
4119}
4120
4121/* Add a symbol to the output symbol table. */
4122
4123static boolean
4124elf_link_output_sym (finfo, name, elfsym, input_sec)
4125 struct elf_final_link_info *finfo;
4126 const char *name;
4127 Elf_Internal_Sym *elfsym;
4128 asection *input_sec;
4129{
4130 boolean (*output_symbol_hook) PARAMS ((bfd *,
4131 struct bfd_link_info *info,
4132 const char *,
4133 Elf_Internal_Sym *,
4134 asection *));
4135
4136 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
4137 elf_backend_link_output_symbol_hook;
4138 if (output_symbol_hook != NULL)
4139 {
4140 if (! ((*output_symbol_hook)
4141 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
4142 return false;
4143 }
4144
4145 if (name == (const char *) NULL || *name == '\0')
4146 elfsym->st_name = 0;
4147 else
4148 {
4149 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
4150 name, true,
4151 false);
4152 if (elfsym->st_name == (unsigned long) -1)
4153 return false;
4154 }
4155
4156 if (finfo->symbuf_count >= finfo->symbuf_size)
4157 {
4158 if (! elf_link_flush_output_syms (finfo))
4159 return false;
4160 }
4161
4162 elf_swap_symbol_out (finfo->output_bfd, elfsym,
cf9fb9f2 4163 (PTR) (finfo->symbuf + finfo->symbuf_count));
ede4eed4
KR
4164 ++finfo->symbuf_count;
4165
4166 ++finfo->output_bfd->symcount;
4167
4168 return true;
4169}
4170
4171/* Flush the output symbols to the file. */
4172
4173static boolean
4174elf_link_flush_output_syms (finfo)
4175 struct elf_final_link_info *finfo;
4176{
28c16b55
ILT
4177 if (finfo->symbuf_count > 0)
4178 {
4179 Elf_Internal_Shdr *symtab;
ede4eed4 4180
28c16b55 4181 symtab = &elf_tdata (finfo->output_bfd)->symtab_hdr;
ede4eed4 4182
28c16b55
ILT
4183 if (bfd_seek (finfo->output_bfd, symtab->sh_offset + symtab->sh_size,
4184 SEEK_SET) != 0
4185 || (bfd_write ((PTR) finfo->symbuf, finfo->symbuf_count,
4186 sizeof (Elf_External_Sym), finfo->output_bfd)
4187 != finfo->symbuf_count * sizeof (Elf_External_Sym)))
4188 return false;
ede4eed4 4189
28c16b55 4190 symtab->sh_size += finfo->symbuf_count * sizeof (Elf_External_Sym);
ede4eed4 4191
28c16b55
ILT
4192 finfo->symbuf_count = 0;
4193 }
ede4eed4
KR
4194
4195 return true;
4196}
4197
4198/* Add an external symbol to the symbol table. This is called from
52c92c7f
ILT
4199 the hash table traversal routine. When generating a shared object,
4200 we go through the symbol table twice. The first time we output
4201 anything that might have been forced to local scope in a version
4202 script. The second time we output the symbols that are still
4203 global symbols. */
ede4eed4
KR
4204
4205static boolean
4206elf_link_output_extsym (h, data)
4207 struct elf_link_hash_entry *h;
4208 PTR data;
4209{
52c92c7f
ILT
4210 struct elf_outext_info *eoinfo = (struct elf_outext_info *) data;
4211 struct elf_final_link_info *finfo = eoinfo->finfo;
ede4eed4
KR
4212 boolean strip;
4213 Elf_Internal_Sym sym;
4214 asection *input_sec;
4215
52c92c7f
ILT
4216 /* Decide whether to output this symbol in this pass. */
4217 if (eoinfo->localsyms)
4218 {
4219 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
4220 return true;
4221 }
4222 else
4223 {
4224 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4225 return true;
4226 }
4227
ede4eed4
KR
4228 /* If we are not creating a shared library, and this symbol is
4229 referenced by a shared library but is not defined anywhere, then
4230 warn that it is undefined. If we do not do this, the runtime
4231 linker will complain that the symbol is undefined when the
4232 program is run. We don't have to worry about symbols that are
4233 referenced by regular files, because we will already have issued
252239f8 4234 warnings for them. */
ede4eed4
KR
4235 if (! finfo->info->relocateable
4236 && ! finfo->info->shared
4237 && h->root.type == bfd_link_hash_undefined
4238 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
252239f8 4239 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
ede4eed4
KR
4240 {
4241 if (! ((*finfo->info->callbacks->undefined_symbol)
4242 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
4243 (asection *) NULL, 0)))
4244 {
52c92c7f 4245 eoinfo->failed = true;
ede4eed4
KR
4246 return false;
4247 }
4248 }
4249
4250 /* We don't want to output symbols that have never been mentioned by
4251 a regular file, or that we have been told to strip. However, if
4252 h->indx is set to -2, the symbol is used by a reloc and we must
4253 output it. */
4254 if (h->indx == -2)
4255 strip = false;
4256 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
4257 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
4258 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
4259 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
4260 strip = true;
4261 else if (finfo->info->strip == strip_all
4262 || (finfo->info->strip == strip_some
4263 && bfd_hash_lookup (finfo->info->keep_hash,
4264 h->root.root.string,
4265 false, false) == NULL))
4266 strip = true;
4267 else
4268 strip = false;
4269
4270 /* If we're stripping it, and it's not a dynamic symbol, there's
4271 nothing else to do. */
4272 if (strip && h->dynindx == -1)
4273 return true;
4274
4275 sym.st_value = 0;
4276 sym.st_size = h->size;
6c02f1a0 4277 sym.st_other = h->other;
52c92c7f
ILT
4278 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4279 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
4280 else if (h->root.type == bfd_link_hash_undefweak
4281 || h->root.type == bfd_link_hash_defweak)
ede4eed4
KR
4282 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
4283 else
4284 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
4285
4286 switch (h->root.type)
4287 {
4288 default:
4289 case bfd_link_hash_new:
4290 abort ();
4291 return false;
4292
4293 case bfd_link_hash_undefined:
4294 input_sec = bfd_und_section_ptr;
4295 sym.st_shndx = SHN_UNDEF;
4296 break;
4297
4298 case bfd_link_hash_undefweak:
4299 input_sec = bfd_und_section_ptr;
4300 sym.st_shndx = SHN_UNDEF;
4301 break;
4302
4303 case bfd_link_hash_defined:
4304 case bfd_link_hash_defweak:
4305 {
4306 input_sec = h->root.u.def.section;
4307 if (input_sec->output_section != NULL)
4308 {
4309 sym.st_shndx =
4310 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
4311 input_sec->output_section);
4312 if (sym.st_shndx == (unsigned short) -1)
4313 {
e1079cda
ILT
4314 (*_bfd_error_handler)
4315 (_("%s: could not find output section %s for input section %s"),
4316 bfd_get_filename (finfo->output_bfd),
4317 input_sec->output_section->name,
4318 input_sec->name);
52c92c7f 4319 eoinfo->failed = true;
ede4eed4
KR
4320 return false;
4321 }
4322
4323 /* ELF symbols in relocateable files are section relative,
4324 but in nonrelocateable files they are virtual
4325 addresses. */
4326 sym.st_value = h->root.u.def.value + input_sec->output_offset;
4327 if (! finfo->info->relocateable)
4328 sym.st_value += input_sec->output_section->vma;
4329 }
4330 else
4331 {
e549b1d2
ILT
4332 BFD_ASSERT (input_sec->owner == NULL
4333 || (input_sec->owner->flags & DYNAMIC) != 0);
ede4eed4
KR
4334 sym.st_shndx = SHN_UNDEF;
4335 input_sec = bfd_und_section_ptr;
4336 }
4337 }
4338 break;
4339
4340 case bfd_link_hash_common:
8211c929 4341 input_sec = h->root.u.c.p->section;
ede4eed4
KR
4342 sym.st_shndx = SHN_COMMON;
4343 sym.st_value = 1 << h->root.u.c.p->alignment_power;
4344 break;
4345
4346 case bfd_link_hash_indirect:
d044b40a
ILT
4347 /* These symbols are created by symbol versioning. They point
4348 to the decorated version of the name. For example, if the
4349 symbol foo@@GNU_1.2 is the default, which should be used when
4350 foo is used with no version, then we add an indirect symbol
d6bfcdb5
ILT
4351 foo which points to foo@@GNU_1.2. We ignore these symbols,
4352 since the indirected symbol is already in the hash table. If
4353 the indirect symbol is non-ELF, fall through and output it. */
4354 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) == 0)
d044b40a
ILT
4355 return true;
4356
4357 /* Fall through. */
ede4eed4 4358 case bfd_link_hash_warning:
d044b40a
ILT
4359 /* We can't represent these symbols in ELF, although a warning
4360 symbol may have come from a .gnu.warning.SYMBOL section. We
1f4ae0d6
ILT
4361 just put the target symbol in the hash table. If the target
4362 symbol does not really exist, don't do anything. */
4363 if (h->root.u.i.link->type == bfd_link_hash_new)
4364 return true;
0cb70568
ILT
4365 return (elf_link_output_extsym
4366 ((struct elf_link_hash_entry *) h->root.u.i.link, data));
ede4eed4
KR
4367 }
4368
8519ea21
ILT
4369 /* Give the processor backend a chance to tweak the symbol value,
4370 and also to finish up anything that needs to be done for this
4371 symbol. */
4372 if ((h->dynindx != -1
4373 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
4374 && elf_hash_table (finfo->info)->dynamic_sections_created)
4375 {
4376 struct elf_backend_data *bed;
4377
4378 bed = get_elf_backend_data (finfo->output_bfd);
4379 if (! ((*bed->elf_backend_finish_dynamic_symbol)
4380 (finfo->output_bfd, finfo->info, h, &sym)))
4381 {
4382 eoinfo->failed = true;
4383 return false;
4384 }
4385 }
4386
ede4eed4
KR
4387 /* If this symbol should be put in the .dynsym section, then put it
4388 there now. We have already know the symbol index. We also fill
4389 in the entry in the .hash section. */
4390 if (h->dynindx != -1
4391 && elf_hash_table (finfo->info)->dynamic_sections_created)
4392 {
d044b40a
ILT
4393 char *p, *copy;
4394 const char *name;
ede4eed4
KR
4395 size_t bucketcount;
4396 size_t bucket;
4397 bfd_byte *bucketpos;
4398 bfd_vma chain;
4399
4400 sym.st_name = h->dynstr_index;
4401
ede4eed4 4402 elf_swap_symbol_out (finfo->output_bfd, &sym,
cf9fb9f2
ILT
4403 (PTR) (((Elf_External_Sym *)
4404 finfo->dynsym_sec->contents)
4405 + h->dynindx));
ede4eed4 4406
d044b40a
ILT
4407 /* We didn't include the version string in the dynamic string
4408 table, so we must not consider it in the hash table. */
4409 name = h->root.root.string;
4410 p = strchr (name, ELF_VER_CHR);
4411 if (p == NULL)
4412 copy = NULL;
4413 else
4414 {
4415 copy = bfd_alloc (finfo->output_bfd, p - name + 1);
4416 strncpy (copy, name, p - name);
4417 copy[p - name] = '\0';
4418 name = copy;
4419 }
4420
ede4eed4 4421 bucketcount = elf_hash_table (finfo->info)->bucketcount;
d044b40a 4422 bucket = bfd_elf_hash ((const unsigned char *) name) % bucketcount;
ede4eed4
KR
4423 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
4424 + (bucket + 2) * (ARCH_SIZE / 8));
4425 chain = get_word (finfo->output_bfd, bucketpos);
4426 put_word (finfo->output_bfd, h->dynindx, bucketpos);
4427 put_word (finfo->output_bfd, chain,
4428 ((bfd_byte *) finfo->hash_sec->contents
4429 + (bucketcount + 2 + h->dynindx) * (ARCH_SIZE / 8)));
d044b40a
ILT
4430
4431 if (copy != NULL)
4432 bfd_release (finfo->output_bfd, copy);
4433
4434 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
4435 {
4436 Elf_Internal_Versym iversym;
4437
4438 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4439 {
4440 if (h->verinfo.verdef == NULL)
4441 iversym.vs_vers = 0;
4442 else
4443 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
4444 }
4445 else
4446 {
4447 if (h->verinfo.vertree == NULL)
4448 iversym.vs_vers = 1;
4449 else
4450 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
4451 }
4452
4453 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
4454 iversym.vs_vers |= VERSYM_HIDDEN;
4455
4456 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym,
4457 (((Elf_External_Versym *)
4458 finfo->symver_sec->contents)
4459 + h->dynindx));
4460 }
ede4eed4
KR
4461 }
4462
4463 /* If we're stripping it, then it was just a dynamic symbol, and
4464 there's nothing else to do. */
4465 if (strip)
4466 return true;
4467
4468 h->indx = finfo->output_bfd->symcount;
4469
4470 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
4471 {
52c92c7f 4472 eoinfo->failed = true;
ede4eed4
KR
4473 return false;
4474 }
4475
4476 return true;
4477}
4478
4479/* Link an input file into the linker output file. This function
4480 handles all the sections and relocations of the input file at once.
4481 This is so that we only have to read the local symbols once, and
4482 don't have to keep them in memory. */
4483
4484static boolean
4485elf_link_input_bfd (finfo, input_bfd)
4486 struct elf_final_link_info *finfo;
4487 bfd *input_bfd;
4488{
4489 boolean (*relocate_section) PARAMS ((bfd *, struct bfd_link_info *,
4490 bfd *, asection *, bfd_byte *,
4491 Elf_Internal_Rela *,
4492 Elf_Internal_Sym *, asection **));
4493 bfd *output_bfd;
4494 Elf_Internal_Shdr *symtab_hdr;
4495 size_t locsymcount;
4496 size_t extsymoff;
c86158e5 4497 Elf_External_Sym *external_syms;
ede4eed4
KR
4498 Elf_External_Sym *esym;
4499 Elf_External_Sym *esymend;
4500 Elf_Internal_Sym *isym;
4501 long *pindex;
4502 asection **ppsection;
4503 asection *o;
4504
4505 output_bfd = finfo->output_bfd;
4506 relocate_section =
4507 get_elf_backend_data (output_bfd)->elf_backend_relocate_section;
4508
4509 /* If this is a dynamic object, we don't want to do anything here:
4510 we don't want the local symbols, and we don't want the section
4511 contents. */
d044b40a 4512 if ((input_bfd->flags & DYNAMIC) != 0)
ede4eed4
KR
4513 return true;
4514
4515 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4516 if (elf_bad_symtab (input_bfd))
4517 {
4518 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
4519 extsymoff = 0;
4520 }
4521 else
4522 {
4523 locsymcount = symtab_hdr->sh_info;
4524 extsymoff = symtab_hdr->sh_info;
4525 }
4526
4527 /* Read the local symbols. */
c86158e5
ILT
4528 if (symtab_hdr->contents != NULL)
4529 external_syms = (Elf_External_Sym *) symtab_hdr->contents;
4530 else if (locsymcount == 0)
4531 external_syms = NULL;
4532 else
4533 {
4534 external_syms = finfo->external_syms;
4535 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
4536 || (bfd_read (external_syms, sizeof (Elf_External_Sym),
ede4eed4 4537 locsymcount, input_bfd)
c86158e5
ILT
4538 != locsymcount * sizeof (Elf_External_Sym)))
4539 return false;
4540 }
ede4eed4
KR
4541
4542 /* Swap in the local symbols and write out the ones which we know
4543 are going into the output file. */
c86158e5 4544 esym = external_syms;
ede4eed4
KR
4545 esymend = esym + locsymcount;
4546 isym = finfo->internal_syms;
4547 pindex = finfo->indices;
4548 ppsection = finfo->sections;
4549 for (; esym < esymend; esym++, isym++, pindex++, ppsection++)
4550 {
4551 asection *isec;
4552 const char *name;
4553 Elf_Internal_Sym osym;
4554
4555 elf_swap_symbol_in (input_bfd, esym, isym);
4556 *pindex = -1;
4557
4558 if (elf_bad_symtab (input_bfd))
4559 {
4560 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
4561 {
4562 *ppsection = NULL;
4563 continue;
4564 }
4565 }
4566
4567 if (isym->st_shndx == SHN_UNDEF)
4568 isec = bfd_und_section_ptr;
4569 else if (isym->st_shndx > 0 && isym->st_shndx < SHN_LORESERVE)
4570 isec = section_from_elf_index (input_bfd, isym->st_shndx);
4571 else if (isym->st_shndx == SHN_ABS)
4572 isec = bfd_abs_section_ptr;
4573 else if (isym->st_shndx == SHN_COMMON)
4574 isec = bfd_com_section_ptr;
4575 else
4576 {
4577 /* Who knows? */
4578 isec = NULL;
4579 }
4580
4581 *ppsection = isec;
4582
4583 /* Don't output the first, undefined, symbol. */
c86158e5 4584 if (esym == external_syms)
ede4eed4
KR
4585 continue;
4586
4587 /* If we are stripping all symbols, we don't want to output this
4588 one. */
4589 if (finfo->info->strip == strip_all)
4590 continue;
4591
4592 /* We never output section symbols. Instead, we use the section
4593 symbol of the corresponding section in the output file. */
4594 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
4595 continue;
4596
4597 /* If we are discarding all local symbols, we don't want to
4598 output this one. If we are generating a relocateable output
4599 file, then some of the local symbols may be required by
4600 relocs; we output them below as we discover that they are
4601 needed. */
4602 if (finfo->info->discard == discard_all)
4603 continue;
4604
258b1f5d 4605 /* If this symbol is defined in a section which we are
fa802cb0
ILT
4606 discarding, we don't need to keep it, but note that
4607 linker_mark is only reliable for sections that have contents.
4608 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
4609 as well as linker_mark. */
258b1f5d
ILT
4610 if (isym->st_shndx > 0
4611 && isym->st_shndx < SHN_LORESERVE
4612 && isec != NULL
fa802cb0 4613 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
258b1f5d
ILT
4614 || (! finfo->info->relocateable
4615 && (isec->flags & SEC_EXCLUDE) != 0)))
4616 continue;
4617
ede4eed4
KR
4618 /* Get the name of the symbol. */
4619 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
258b1f5d 4620 isym->st_name);
ede4eed4
KR
4621 if (name == NULL)
4622 return false;
4623
4624 /* See if we are discarding symbols with this name. */
4625 if ((finfo->info->strip == strip_some
4626 && (bfd_hash_lookup (finfo->info->keep_hash, name, false, false)
4627 == NULL))
4628 || (finfo->info->discard == discard_l
e316f514 4629 && bfd_is_local_label_name (input_bfd, name)))
ede4eed4
KR
4630 continue;
4631
4632 /* If we get here, we are going to output this symbol. */
4633
4634 osym = *isym;
4635
4636 /* Adjust the section index for the output file. */
4637 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
4638 isec->output_section);
4639 if (osym.st_shndx == (unsigned short) -1)
4640 return false;
4641
4642 *pindex = output_bfd->symcount;
4643
4644 /* ELF symbols in relocateable files are section relative, but
4645 in executable files they are virtual addresses. Note that
4646 this code assumes that all ELF sections have an associated
4647 BFD section with a reasonable value for output_offset; below
4648 we assume that they also have a reasonable value for
4649 output_section. Any special sections must be set up to meet
4650 these requirements. */
4651 osym.st_value += isec->output_offset;
4652 if (! finfo->info->relocateable)
4653 osym.st_value += isec->output_section->vma;
4654
4655 if (! elf_link_output_sym (finfo, name, &osym, isec))
4656 return false;
4657 }
4658
4659 /* Relocate the contents of each section. */
4660 for (o = input_bfd->sections; o != NULL; o = o->next)
4661 {
c86158e5
ILT
4662 bfd_byte *contents;
4663
ff0e4a93 4664 if (! o->linker_mark)
7ec49f91
ILT
4665 {
4666 /* This section was omitted from the link. */
4667 continue;
4668 }
4669
1726b8f0
ILT
4670 if ((o->flags & SEC_HAS_CONTENTS) == 0
4671 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
ede4eed4
KR
4672 continue;
4673
ff12f303 4674 if ((o->flags & SEC_LINKER_CREATED) != 0)
ede4eed4 4675 {
ff12f303
ILT
4676 /* Section was created by elf_link_create_dynamic_sections
4677 or somesuch. */
ede4eed4
KR
4678 continue;
4679 }
4680
c86158e5
ILT
4681 /* Get the contents of the section. They have been cached by a
4682 relaxation routine. Note that o is a section in an input
4683 file, so the contents field will not have been set by any of
4684 the routines which work on output files. */
4685 if (elf_section_data (o)->this_hdr.contents != NULL)
4686 contents = elf_section_data (o)->this_hdr.contents;
4687 else
4688 {
4689 contents = finfo->contents;
4690 if (! bfd_get_section_contents (input_bfd, o, contents,
4691 (file_ptr) 0, o->_raw_size))
4692 return false;
4693 }
ede4eed4
KR
4694
4695 if ((o->flags & SEC_RELOC) != 0)
4696 {
4697 Elf_Internal_Rela *internal_relocs;
4698
4699 /* Get the swapped relocs. */
c86158e5
ILT
4700 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
4701 (input_bfd, o, finfo->external_relocs,
4702 finfo->internal_relocs, false));
ede4eed4
KR
4703 if (internal_relocs == NULL
4704 && o->reloc_count > 0)
4705 return false;
4706
4707 /* Relocate the section by invoking a back end routine.
4708
4709 The back end routine is responsible for adjusting the
4710 section contents as necessary, and (if using Rela relocs
4711 and generating a relocateable output file) adjusting the
4712 reloc addend as necessary.
4713
4714 The back end routine does not have to worry about setting
4715 the reloc address or the reloc symbol index.
4716
4717 The back end routine is given a pointer to the swapped in
4718 internal symbols, and can access the hash table entries
4719 for the external symbols via elf_sym_hashes (input_bfd).
4720
4721 When generating relocateable output, the back end routine
4722 must handle STB_LOCAL/STT_SECTION symbols specially. The
4723 output symbol is going to be a section symbol
4724 corresponding to the output section, which will require
4725 the addend to be adjusted. */
4726
4727 if (! (*relocate_section) (output_bfd, finfo->info,
c86158e5 4728 input_bfd, o, contents,
ede4eed4
KR
4729 internal_relocs,
4730 finfo->internal_syms,
4731 finfo->sections))
4732 return false;
4733
4734 if (finfo->info->relocateable)
4735 {
4736 Elf_Internal_Rela *irela;
4737 Elf_Internal_Rela *irelaend;
4738 struct elf_link_hash_entry **rel_hash;
4739 Elf_Internal_Shdr *input_rel_hdr;
4740 Elf_Internal_Shdr *output_rel_hdr;
4741
4742 /* Adjust the reloc addresses and symbol indices. */
4743
4744 irela = internal_relocs;
4745 irelaend = irela + o->reloc_count;
4746 rel_hash = (elf_section_data (o->output_section)->rel_hashes
4747 + o->output_section->reloc_count);
4748 for (; irela < irelaend; irela++, rel_hash++)
4749 {
ae115e51 4750 unsigned long r_symndx;
ede4eed4
KR
4751 Elf_Internal_Sym *isym;
4752 asection *sec;
4753
4754 irela->r_offset += o->output_offset;
4755
4756 r_symndx = ELF_R_SYM (irela->r_info);
4757
4758 if (r_symndx == 0)
4759 continue;
4760
4761 if (r_symndx >= locsymcount
4762 || (elf_bad_symtab (input_bfd)
4763 && finfo->sections[r_symndx] == NULL))
4764 {
5ee8d932 4765 struct elf_link_hash_entry *rh;
ede4eed4
KR
4766 long indx;
4767
4768 /* This is a reloc against a global symbol. We
4769 have not yet output all the local symbols, so
4770 we do not know the symbol index of any global
4771 symbol. We set the rel_hash entry for this
4772 reloc to point to the global hash table entry
4773 for this symbol. The symbol index is then
4774 set at the end of elf_bfd_final_link. */
4775 indx = r_symndx - extsymoff;
5ee8d932
ILT
4776 rh = elf_sym_hashes (input_bfd)[indx];
4777 while (rh->root.type == bfd_link_hash_indirect
4778 || rh->root.type == bfd_link_hash_warning)
4779 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
ede4eed4
KR
4780
4781 /* Setting the index to -2 tells
4782 elf_link_output_extsym that this symbol is
4783 used by a reloc. */
5ee8d932
ILT
4784 BFD_ASSERT (rh->indx < 0);
4785 rh->indx = -2;
4786
4787 *rel_hash = rh;
ede4eed4
KR
4788
4789 continue;
4790 }
4791
4792 /* This is a reloc against a local symbol. */
4793
4794 *rel_hash = NULL;
4795 isym = finfo->internal_syms + r_symndx;
4796 sec = finfo->sections[r_symndx];
4797 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
4798 {
4799 /* I suppose the backend ought to fill in the
4800 section of any STT_SECTION symbol against a
ba4a4594
ILT
4801 processor specific section. If we have
4802 discarded a section, the output_section will
4803 be the absolute section. */
4804 if (sec != NULL
4805 && (bfd_is_abs_section (sec)
4806 || (sec->output_section != NULL
4807 && bfd_is_abs_section (sec->output_section))))
ede4eed4
KR
4808 r_symndx = 0;
4809 else if (sec == NULL || sec->owner == NULL)
4810 {
4811 bfd_set_error (bfd_error_bad_value);
4812 return false;
4813 }
4814 else
4815 {
4816 r_symndx = sec->output_section->target_index;
4817 BFD_ASSERT (r_symndx != 0);
4818 }
4819 }
4820 else
4821 {
4822 if (finfo->indices[r_symndx] == -1)
4823 {
4824 unsigned long link;
4825 const char *name;
4826 asection *osec;
4827
4828 if (finfo->info->strip == strip_all)
4829 {
4830 /* You can't do ld -r -s. */
4831 bfd_set_error (bfd_error_invalid_operation);
4832 return false;
4833 }
4834
4835 /* This symbol was skipped earlier, but
4836 since it is needed by a reloc, we
4837 must output it now. */
4838 link = symtab_hdr->sh_link;
4839 name = bfd_elf_string_from_elf_section (input_bfd,
4840 link,
4841 isym->st_name);
4842 if (name == NULL)
4843 return false;
4844
4845 osec = sec->output_section;
4846 isym->st_shndx =
4847 _bfd_elf_section_from_bfd_section (output_bfd,
4848 osec);
4849 if (isym->st_shndx == (unsigned short) -1)
4850 return false;
4851
4852 isym->st_value += sec->output_offset;
4853 if (! finfo->info->relocateable)
4854 isym->st_value += osec->vma;
4855
4856 finfo->indices[r_symndx] = output_bfd->symcount;
4857
4858 if (! elf_link_output_sym (finfo, name, isym, sec))
4859 return false;
4860 }
4861
4862 r_symndx = finfo->indices[r_symndx];
4863 }
4864
4865 irela->r_info = ELF_R_INFO (r_symndx,
4866 ELF_R_TYPE (irela->r_info));
4867 }
4868
4869 /* Swap out the relocs. */
4870 input_rel_hdr = &elf_section_data (o)->rel_hdr;
4871 output_rel_hdr = &elf_section_data (o->output_section)->rel_hdr;
4872 BFD_ASSERT (output_rel_hdr->sh_entsize
4873 == input_rel_hdr->sh_entsize);
4874 irela = internal_relocs;
4875 irelaend = irela + o->reloc_count;
4876 if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
4877 {
4878 Elf_External_Rel *erel;
4879
4880 erel = ((Elf_External_Rel *) output_rel_hdr->contents
4881 + o->output_section->reloc_count);
4882 for (; irela < irelaend; irela++, erel++)
4883 {
4884 Elf_Internal_Rel irel;
4885
4886 irel.r_offset = irela->r_offset;
4887 irel.r_info = irela->r_info;
4888 BFD_ASSERT (irela->r_addend == 0);
4889 elf_swap_reloc_out (output_bfd, &irel, erel);
4890 }
4891 }
4892 else
4893 {
4894 Elf_External_Rela *erela;
4895
4896 BFD_ASSERT (input_rel_hdr->sh_entsize
4897 == sizeof (Elf_External_Rela));
4898 erela = ((Elf_External_Rela *) output_rel_hdr->contents
4899 + o->output_section->reloc_count);
4900 for (; irela < irelaend; irela++, erela++)
4901 elf_swap_reloca_out (output_bfd, irela, erela);
4902 }
4903
4904 o->output_section->reloc_count += o->reloc_count;
4905 }
4906 }
4907
4908 /* Write out the modified section contents. */
1726b8f0
ILT
4909 if (elf_section_data (o)->stab_info == NULL)
4910 {
303b4cc6
RH
4911 if (! (o->flags & SEC_EXCLUDE) &&
4912 ! bfd_set_section_contents (output_bfd, o->output_section,
c86158e5 4913 contents, o->output_offset,
1726b8f0
ILT
4914 (o->_cooked_size != 0
4915 ? o->_cooked_size
4916 : o->_raw_size)))
4917 return false;
4918 }
4919 else
4920 {
3cd5cf3d
ILT
4921 if (! (_bfd_write_section_stabs
4922 (output_bfd, &elf_hash_table (finfo->info)->stab_info,
4923 o, &elf_section_data (o)->stab_info, contents)))
1726b8f0
ILT
4924 return false;
4925 }
ede4eed4
KR
4926 }
4927
4928 return true;
4929}
4930
4931/* Generate a reloc when linking an ELF file. This is a reloc
4932 requested by the linker, and does come from any input file. This
4933 is used to build constructor and destructor tables when linking
4934 with -Ur. */
4935
4936static boolean
4937elf_reloc_link_order (output_bfd, info, output_section, link_order)
4938 bfd *output_bfd;
4939 struct bfd_link_info *info;
4940 asection *output_section;
4941 struct bfd_link_order *link_order;
4942{
4943 reloc_howto_type *howto;
4944 long indx;
4945 bfd_vma offset;
5b3b9ff6 4946 bfd_vma addend;
ede4eed4
KR
4947 struct elf_link_hash_entry **rel_hash_ptr;
4948 Elf_Internal_Shdr *rel_hdr;
4949
4950 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
4951 if (howto == NULL)
4952 {
4953 bfd_set_error (bfd_error_bad_value);
4954 return false;
4955 }
4956
5b3b9ff6
ILT
4957 addend = link_order->u.reloc.p->addend;
4958
4959 /* Figure out the symbol index. */
4960 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
4961 + output_section->reloc_count);
4962 if (link_order->type == bfd_section_reloc_link_order)
4963 {
4964 indx = link_order->u.reloc.p->u.section->target_index;
4965 BFD_ASSERT (indx != 0);
4966 *rel_hash_ptr = NULL;
4967 }
4968 else
4969 {
4970 struct elf_link_hash_entry *h;
4971
4972 /* Treat a reloc against a defined symbol as though it were
4973 actually against the section. */
8881b321
ILT
4974 h = ((struct elf_link_hash_entry *)
4975 bfd_wrapped_link_hash_lookup (output_bfd, info,
4976 link_order->u.reloc.p->u.name,
4977 false, false, true));
5b3b9ff6
ILT
4978 if (h != NULL
4979 && (h->root.type == bfd_link_hash_defined
4980 || h->root.type == bfd_link_hash_defweak))
4981 {
4982 asection *section;
4983
4984 section = h->root.u.def.section;
4985 indx = section->output_section->target_index;
4986 *rel_hash_ptr = NULL;
4987 /* It seems that we ought to add the symbol value to the
4988 addend here, but in practice it has already been added
4989 because it was passed to constructor_callback. */
4990 addend += section->output_section->vma + section->output_offset;
4991 }
4992 else if (h != NULL)
4993 {
4994 /* Setting the index to -2 tells elf_link_output_extsym that
4995 this symbol is used by a reloc. */
4996 h->indx = -2;
4997 *rel_hash_ptr = h;
4998 indx = 0;
4999 }
5000 else
5001 {
5002 if (! ((*info->callbacks->unattached_reloc)
5003 (info, link_order->u.reloc.p->u.name, (bfd *) NULL,
5004 (asection *) NULL, (bfd_vma) 0)))
5005 return false;
5006 indx = 0;
5007 }
5008 }
5009
ede4eed4
KR
5010 /* If this is an inplace reloc, we must write the addend into the
5011 object file. */
5b3b9ff6 5012 if (howto->partial_inplace && addend != 0)
ede4eed4
KR
5013 {
5014 bfd_size_type size;
5015 bfd_reloc_status_type rstat;
5016 bfd_byte *buf;
5017 boolean ok;
5018
5019 size = bfd_get_reloc_size (howto);
5020 buf = (bfd_byte *) bfd_zmalloc (size);
5021 if (buf == (bfd_byte *) NULL)
a9713b91 5022 return false;
5b3b9ff6 5023 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
ede4eed4
KR
5024 switch (rstat)
5025 {
5026 case bfd_reloc_ok:
5027 break;
5028 default:
5029 case bfd_reloc_outofrange:
5030 abort ();
5031 case bfd_reloc_overflow:
5032 if (! ((*info->callbacks->reloc_overflow)
5033 (info,
5034 (link_order->type == bfd_section_reloc_link_order
5035 ? bfd_section_name (output_bfd,
5036 link_order->u.reloc.p->u.section)
5037 : link_order->u.reloc.p->u.name),
5b3b9ff6
ILT
5038 howto->name, addend, (bfd *) NULL, (asection *) NULL,
5039 (bfd_vma) 0)))
ede4eed4
KR
5040 {
5041 free (buf);
5042 return false;
5043 }
5044 break;
5045 }
5046 ok = bfd_set_section_contents (output_bfd, output_section, (PTR) buf,
5047 (file_ptr) link_order->offset, size);
5048 free (buf);
5049 if (! ok)
5050 return false;
5051 }
5052
ede4eed4
KR
5053 /* The address of a reloc is relative to the section in a
5054 relocateable file, and is a virtual address in an executable
5055 file. */
5056 offset = link_order->offset;
5057 if (! info->relocateable)
5058 offset += output_section->vma;
5059
5060 rel_hdr = &elf_section_data (output_section)->rel_hdr;
5061
5062 if (rel_hdr->sh_type == SHT_REL)
5063 {
5064 Elf_Internal_Rel irel;
5065 Elf_External_Rel *erel;
5066
5067 irel.r_offset = offset;
5068 irel.r_info = ELF_R_INFO (indx, howto->type);
5069 erel = ((Elf_External_Rel *) rel_hdr->contents
5070 + output_section->reloc_count);
5071 elf_swap_reloc_out (output_bfd, &irel, erel);
5072 }
5073 else
5074 {
5075 Elf_Internal_Rela irela;
5076 Elf_External_Rela *erela;
5077
5078 irela.r_offset = offset;
5079 irela.r_info = ELF_R_INFO (indx, howto->type);
5b3b9ff6 5080 irela.r_addend = addend;
ede4eed4
KR
5081 erela = ((Elf_External_Rela *) rel_hdr->contents
5082 + output_section->reloc_count);
5083 elf_swap_reloca_out (output_bfd, &irela, erela);
5084 }
5085
5086 ++output_section->reloc_count;
5087
5088 return true;
5089}
5090
3b3753b8
MM
5091\f
5092/* Allocate a pointer to live in a linker created section. */
5093
5094boolean
5095elf_create_pointer_linker_section (abfd, info, lsect, h, rel)
5096 bfd *abfd;
5097 struct bfd_link_info *info;
5098 elf_linker_section_t *lsect;
5099 struct elf_link_hash_entry *h;
5100 const Elf_Internal_Rela *rel;
5101{
5102 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
5103 elf_linker_section_pointers_t *linker_section_ptr;
5104 unsigned long r_symndx = ELF_R_SYM (rel->r_info);;
5105
5106 BFD_ASSERT (lsect != NULL);
5107
5108 /* Is this a global symbol? */
5109 if (h != NULL)
5110 {
5111 /* Has this symbol already been allocated, if so, our work is done */
5112 if (_bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
5113 rel->r_addend,
5114 lsect->which))
5115 return true;
5116
5117 ptr_linker_section_ptr = &h->linker_section_pointer;
5118 /* Make sure this symbol is output as a dynamic symbol. */
5119 if (h->dynindx == -1)
5120 {
5121 if (! elf_link_record_dynamic_symbol (info, h))
5122 return false;
5123 }
5124
eb82bc60
MM
5125 if (lsect->rel_section)
5126 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
3b3753b8
MM
5127 }
5128
5129 else /* Allocation of a pointer to a local symbol */
5130 {
5131 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
5132
5133 /* Allocate a table to hold the local symbols if first time */
5134 if (!ptr)
5135 {
f6727b90 5136 unsigned int num_symbols = elf_tdata (abfd)->symtab_hdr.sh_info;
3b3753b8
MM
5137 register unsigned int i;
5138
5139 ptr = (elf_linker_section_pointers_t **)
5140 bfd_alloc (abfd, num_symbols * sizeof (elf_linker_section_pointers_t *));
5141
5142 if (!ptr)
5143 return false;
5144
5145 elf_local_ptr_offsets (abfd) = ptr;
5146 for (i = 0; i < num_symbols; i++)
5147 ptr[i] = (elf_linker_section_pointers_t *)0;
5148 }
5149
5150 /* Has this symbol already been allocated, if so, our work is done */
5151 if (_bfd_elf_find_pointer_linker_section (ptr[r_symndx],
5152 rel->r_addend,
5153 lsect->which))
5154 return true;
5155
5156 ptr_linker_section_ptr = &ptr[r_symndx];
5157
5158 if (info->shared)
5159 {
5160 /* If we are generating a shared object, we need to
05f927dd 5161 output a R_<xxx>_RELATIVE reloc so that the
3b3753b8
MM
5162 dynamic linker can adjust this GOT entry. */
5163 BFD_ASSERT (lsect->rel_section != NULL);
5164 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
5165 }
5166 }
5167
5168 /* Allocate space for a pointer in the linker section, and allocate a new pointer record
5169 from internal memory. */
5170 BFD_ASSERT (ptr_linker_section_ptr != NULL);
5171 linker_section_ptr = (elf_linker_section_pointers_t *)
5172 bfd_alloc (abfd, sizeof (elf_linker_section_pointers_t));
5173
5174 if (!linker_section_ptr)
5175 return false;
5176
5177 linker_section_ptr->next = *ptr_linker_section_ptr;
5178 linker_section_ptr->addend = rel->r_addend;
5179 linker_section_ptr->which = lsect->which;
5180 linker_section_ptr->written_address_p = false;
5181 *ptr_linker_section_ptr = linker_section_ptr;
5182
cb73f5d7 5183#if 0
3b3753b8
MM
5184 if (lsect->hole_size && lsect->hole_offset < lsect->max_hole_offset)
5185 {
cb73f5d7 5186 linker_section_ptr->offset = lsect->section->_raw_size - lsect->hole_size + (ARCH_SIZE / 8);
3b3753b8
MM
5187 lsect->hole_offset += ARCH_SIZE / 8;
5188 lsect->sym_offset += ARCH_SIZE / 8;
5189 if (lsect->sym_hash) /* Bump up symbol value if needed */
4a4953f5
MM
5190 {
5191 lsect->sym_hash->root.u.def.value += ARCH_SIZE / 8;
5192#ifdef DEBUG
5193 fprintf (stderr, "Bump up %s by %ld, current value = %ld\n",
5194 lsect->sym_hash->root.root.string,
5195 (long)ARCH_SIZE / 8,
5196 (long)lsect->sym_hash->root.u.def.value);
5197#endif
5198 }
3b3753b8
MM
5199 }
5200 else
cb73f5d7 5201#endif
3b3753b8
MM
5202 linker_section_ptr->offset = lsect->section->_raw_size;
5203
5204 lsect->section->_raw_size += ARCH_SIZE / 8;
5205
5206#ifdef DEBUG
5207 fprintf (stderr, "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
5208 lsect->name, (long)linker_section_ptr->offset, (long)lsect->section->_raw_size);
5209#endif
5210
5211 return true;
5212}
5213
5214\f
5215#if ARCH_SIZE==64
5216#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_64 (BFD, VAL, ADDR)
5217#endif
5218#if ARCH_SIZE==32
5219#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_32 (BFD, VAL, ADDR)
5220#endif
5221
5222/* Fill in the address for a pointer generated in alinker section. */
5223
5224bfd_vma
5225elf_finish_pointer_linker_section (output_bfd, input_bfd, info, lsect, h, relocation, rel, relative_reloc)
5226 bfd *output_bfd;
5227 bfd *input_bfd;
5228 struct bfd_link_info *info;
5229 elf_linker_section_t *lsect;
5230 struct elf_link_hash_entry *h;
5231 bfd_vma relocation;
5232 const Elf_Internal_Rela *rel;
5233 int relative_reloc;
5234{
5235 elf_linker_section_pointers_t *linker_section_ptr;
5236
5237 BFD_ASSERT (lsect != NULL);
5238
3b3753b8
MM
5239 if (h != NULL) /* global symbol */
5240 {
5241 linker_section_ptr = _bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
5242 rel->r_addend,
5243 lsect->which);
5244
5245 BFD_ASSERT (linker_section_ptr != NULL);
5246
5247 if (! elf_hash_table (info)->dynamic_sections_created
5248 || (info->shared
5249 && info->symbolic
5250 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
5251 {
5252 /* This is actually a static link, or it is a
5253 -Bsymbolic link and the symbol is defined
5254 locally. We must initialize this entry in the
5255 global section.
5256
5257 When doing a dynamic link, we create a .rela.<xxx>
5258 relocation entry to initialize the value. This
5259 is done in the finish_dynamic_symbol routine. */
5260 if (!linker_section_ptr->written_address_p)
5261 {
5262 linker_section_ptr->written_address_p = true;
5263 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
5264 lsect->section->contents + linker_section_ptr->offset);
5265 }
5266 }
5267 }
5268 else /* local symbol */
5269 {
5270 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
5271 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
5272 BFD_ASSERT (elf_local_ptr_offsets (input_bfd)[r_symndx] != NULL);
5273 linker_section_ptr = _bfd_elf_find_pointer_linker_section (elf_local_ptr_offsets (input_bfd)[r_symndx],
5274 rel->r_addend,
5275 lsect->which);
5276
5277 BFD_ASSERT (linker_section_ptr != NULL);
5278
5279 /* Write out pointer if it hasn't been rewritten out before */
5280 if (!linker_section_ptr->written_address_p)
5281 {
5282 linker_section_ptr->written_address_p = true;
5283 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
5284 lsect->section->contents + linker_section_ptr->offset);
5285
5286 if (info->shared)
5287 {
5288 asection *srel = lsect->rel_section;
5289 Elf_Internal_Rela outrel;
5290
5291 /* We need to generate a relative reloc for the dynamic linker. */
5292 if (!srel)
5293 lsect->rel_section = srel = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
5294 lsect->rel_name);
5295
5296 BFD_ASSERT (srel != NULL);
5297
5298 outrel.r_offset = (lsect->section->output_section->vma
5299 + lsect->section->output_offset
5300 + linker_section_ptr->offset);
5301 outrel.r_info = ELF_R_INFO (0, relative_reloc);
5302 outrel.r_addend = 0;
5303 elf_swap_reloca_out (output_bfd, &outrel,
5a5bac64 5304 (((Elf_External_Rela *)
3b3753b8
MM
5305 lsect->section->contents)
5306 + lsect->section->reloc_count));
5307 ++lsect->section->reloc_count;
5308 }
5309 }
5310 }
5311
5312 relocation = (lsect->section->output_offset
5313 + linker_section_ptr->offset
5314 - lsect->hole_offset
5315 - lsect->sym_offset);
5316
5317#ifdef DEBUG
5318 fprintf (stderr, "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
5319 lsect->name, (long)relocation, (long)relocation);
5320#endif
5321
5322 /* Subtract out the addend, because it will get added back in by the normal
5323 processing. */
5324 return relocation - linker_section_ptr->addend;
5325}
303b4cc6
RH
5326\f
5327/* Garbage collect unused sections. */
5328
5329static boolean elf_gc_mark
5330 PARAMS ((struct bfd_link_info *info, asection *sec,
5331 asection * (*gc_mark_hook)
5332 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
5333 struct elf_link_hash_entry *, Elf_Internal_Sym *))));
5334
5335static boolean elf_gc_sweep
5336 PARAMS ((struct bfd_link_info *info,
5337 boolean (*gc_sweep_hook)
5338 PARAMS ((bfd *abfd, struct bfd_link_info *info, asection *o,
5339 const Elf_Internal_Rela *relocs))));
5340
5341static boolean elf_gc_sweep_symbol
5342 PARAMS ((struct elf_link_hash_entry *h, PTR idxptr));
5343
5344static boolean elf_gc_allocate_got_offsets
5345 PARAMS ((struct elf_link_hash_entry *h, PTR offarg));
5346
1ff13765 5347static boolean elf_gc_propagate_vtable_entries_used
303b4cc6
RH
5348 PARAMS ((struct elf_link_hash_entry *h, PTR dummy));
5349
5350static boolean elf_gc_smash_unused_vtentry_relocs
5351 PARAMS ((struct elf_link_hash_entry *h, PTR dummy));
5352
5353/* The mark phase of garbage collection. For a given section, mark
5354 it, and all the sections which define symbols to which it refers. */
5355
5356static boolean
5357elf_gc_mark (info, sec, gc_mark_hook)
5358 struct bfd_link_info *info;
5359 asection *sec;
5360 asection * (*gc_mark_hook)
5361 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
5362 struct elf_link_hash_entry *, Elf_Internal_Sym *));
5363{
5364 boolean ret = true;
5365
5366 sec->gc_mark = 1;
5367
5368 /* Look through the section relocs. */
5369
5370 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
5371 {
5372 Elf_Internal_Rela *relstart, *rel, *relend;
5373 Elf_Internal_Shdr *symtab_hdr;
5374 struct elf_link_hash_entry **sym_hashes;
5375 size_t nlocsyms;
5376 size_t extsymoff;
5377 Elf_External_Sym *locsyms, *freesyms = NULL;
5378 bfd *input_bfd = sec->owner;
5379
5380 /* GCFIXME: how to arrange so that relocs and symbols are not
5381 reread continually? */
5382
5383 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
5384 sym_hashes = elf_sym_hashes (input_bfd);
5385
5386 /* Read the local symbols. */
5387 if (elf_bad_symtab (input_bfd))
5388 {
5389 nlocsyms = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
5390 extsymoff = 0;
5391 }
5392 else
5393 extsymoff = nlocsyms = symtab_hdr->sh_info;
5394 if (symtab_hdr->contents)
5395 locsyms = (Elf_External_Sym *) symtab_hdr->contents;
5396 else if (nlocsyms == 0)
5397 locsyms = NULL;
5398 else
5399 {
5400 locsyms = freesyms =
5401 bfd_malloc (nlocsyms * sizeof (Elf_External_Sym));
5402 if (freesyms == NULL
5403 || bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
5404 || (bfd_read (locsyms, sizeof (Elf_External_Sym),
5405 nlocsyms, input_bfd)
5406 != nlocsyms * sizeof (Elf_External_Sym)))
5407 {
5408 ret = false;
5409 goto out1;
5410 }
5411 }
5412
5413 /* Read the relocations. */
5414 relstart = (NAME(_bfd_elf,link_read_relocs)
5415 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL,
5416 info->keep_memory));
5417 if (relstart == NULL)
5418 {
5419 ret = false;
5420 goto out1;
5421 }
5422 relend = relstart + sec->reloc_count;
5423
5424 for (rel = relstart; rel < relend; rel++)
5425 {
5426 unsigned long r_symndx;
5427 asection *rsec;
5428 struct elf_link_hash_entry *h;
5429 Elf_Internal_Sym s;
5430
5431 r_symndx = ELF_R_SYM (rel->r_info);
5432 if (r_symndx == 0)
5433 continue;
5434
5435 if (elf_bad_symtab (sec->owner))
5436 {
5437 elf_swap_symbol_in (input_bfd, &locsyms[r_symndx], &s);
5438 if (ELF_ST_BIND (s.st_info) == STB_LOCAL)
5439 rsec = (*gc_mark_hook)(sec->owner, info, rel, NULL, &s);
5440 else
5441 {
5442 h = sym_hashes[r_symndx - extsymoff];
5443 rsec = (*gc_mark_hook)(sec->owner, info, rel, h, NULL);
5444 }
5445 }
5446 else if (r_symndx >= nlocsyms)
5447 {
5448 h = sym_hashes[r_symndx - extsymoff];
5449 rsec = (*gc_mark_hook)(sec->owner, info, rel, h, NULL);
5450 }
5451 else
5452 {
5453 elf_swap_symbol_in (input_bfd, &locsyms[r_symndx], &s);
5454 rsec = (*gc_mark_hook)(sec->owner, info, rel, NULL, &s);
5455 }
5456
5457 if (rsec && !rsec->gc_mark)
5458 if (!elf_gc_mark (info, rsec, gc_mark_hook))
5459 {
5460 ret = false;
5461 goto out2;
5462 }
5463 }
5464
5465 out2:
5466 if (!info->keep_memory)
5467 free (relstart);
5468 out1:
5469 if (freesyms)
5470 free (freesyms);
5471 }
5472
5473 return ret;
5474}
5475
5476/* The sweep phase of garbage collection. Remove all garbage sections. */
5477
5478static boolean
5479elf_gc_sweep (info, gc_sweep_hook)
5480 struct bfd_link_info *info;
5481 boolean (*gc_sweep_hook)
5482 PARAMS ((bfd *abfd, struct bfd_link_info *info, asection *o,
5483 const Elf_Internal_Rela *relocs));
5484{
5485 bfd *sub;
5486
5487 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5488 {
5489 asection *o;
5490
5491 for (o = sub->sections; o != NULL; o = o->next)
5492 {
5493 /* Keep special sections. Keep .debug sections. */
5494 if ((o->flags & SEC_LINKER_CREATED)
5495 || (o->flags & SEC_DEBUGGING))
5496 o->gc_mark = 1;
5497
5498 if (o->gc_mark)
5499 continue;
5500
5501 /* Skip sweeping sections already excluded. */
5502 if (o->flags & SEC_EXCLUDE)
5503 continue;
5504
5505 /* Since this is early in the link process, it is simple
5506 to remove a section from the output. */
5507 o->flags |= SEC_EXCLUDE;
5508
5509 /* But we also have to update some of the relocation
5510 info we collected before. */
5511 if (gc_sweep_hook
5512 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
5513 {
5514 Elf_Internal_Rela *internal_relocs;
5515 boolean r;
5516
5517 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
5518 (o->owner, o, NULL, NULL, info->keep_memory));
5519 if (internal_relocs == NULL)
5520 return false;
5521
5522 r = (*gc_sweep_hook)(o->owner, info, o, internal_relocs);
5523
5524 if (!info->keep_memory)
5525 free (internal_relocs);
5526
5527 if (!r)
5528 return false;
5529 }
5530 }
5531 }
5532
5533 /* Remove the symbols that were in the swept sections from the dynamic
5534 symbol table. GCFIXME: Anyone know how to get them out of the
5535 static symbol table as well? */
5536 {
5537 int i = 0;
5538
5539 elf_link_hash_traverse (elf_hash_table (info),
5540 elf_gc_sweep_symbol,
5541 (PTR) &i);
5542
5543 elf_hash_table (info)->dynsymcount = i;
5544 }
be228e0d
ILT
5545
5546 return true;
303b4cc6
RH
5547}
5548
5549/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
5550
5551static boolean
5552elf_gc_sweep_symbol (h, idxptr)
5553 struct elf_link_hash_entry *h;
5554 PTR idxptr;
5555{
5556 int *idx = (int *) idxptr;
5557
5558 if (h->dynindx != -1
5559 && ((h->root.type != bfd_link_hash_defined
5560 && h->root.type != bfd_link_hash_defweak)
5561 || h->root.u.def.section->gc_mark))
5562 h->dynindx = (*idx)++;
5563
5564 return true;
5565}
5566
5567/* Propogate collected vtable information. This is called through
5568 elf_link_hash_traverse. */
5569
5570static boolean
1ff13765 5571elf_gc_propagate_vtable_entries_used (h, okp)
303b4cc6
RH
5572 struct elf_link_hash_entry *h;
5573 PTR okp;
5574{
5575 /* Those that are not vtables. */
5576 if (h->vtable_parent == NULL)
5577 return true;
5578
5579 /* Those vtables that do not have parents, we cannot merge. */
5580 if (h->vtable_parent == (struct elf_link_hash_entry *) -1)
5581 return true;
5582
5583 /* If we've already been done, exit. */
5584 if (h->vtable_entries_used && h->vtable_entries_used[-1])
5585 return true;
5586
5587 /* Make sure the parent's table is up to date. */
1ff13765 5588 elf_gc_propagate_vtable_entries_used (h->vtable_parent, okp);
303b4cc6
RH
5589
5590 if (h->vtable_entries_used == NULL)
5591 {
5592 /* None of this table's entries were referenced. Re-use the
5593 parent's table. */
5594 h->vtable_entries_used = h->vtable_parent->vtable_entries_used;
5595 }
5596 else
5597 {
5598 size_t n;
5599 boolean *cu, *pu;
5600
5601 /* Or the parent's entries into ours. */
5602 cu = h->vtable_entries_used;
5603 cu[-1] = true;
5604 pu = h->vtable_parent->vtable_entries_used;
5605 if (pu != NULL)
5606 {
5607 n = h->vtable_parent->size / FILE_ALIGN;
5608 while (--n != 0)
5609 {
5610 if (*pu) *cu = true;
5611 pu++, cu++;
5612 }
5613 }
5614 }
5615
5616 return true;
5617}
5618
5619static boolean
5620elf_gc_smash_unused_vtentry_relocs (h, okp)
5621 struct elf_link_hash_entry *h;
5622 PTR okp;
5623{
5624 asection *sec;
5625 bfd_vma hstart, hend;
5626 Elf_Internal_Rela *relstart, *relend, *rel;
5627
5628 /* Take care of both those symbols that do not describe vtables as
5629 well as those that are not loaded. */
5630 if (h->vtable_parent == NULL)
5631 return true;
5632
5633 BFD_ASSERT (h->root.type == bfd_link_hash_defined
5634 || h->root.type == bfd_link_hash_defweak);
5635
5636 sec = h->root.u.def.section;
5637 hstart = h->root.u.def.value;
5638 hend = hstart + h->size;
5639
5640 relstart = (NAME(_bfd_elf,link_read_relocs)
5641 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL, true));
5642 if (!relstart)
5643 return *(boolean *)okp = false;
5644 relend = relstart + sec->reloc_count;
5645
5646 for (rel = relstart; rel < relend; ++rel)
5647 if (rel->r_offset >= hstart && rel->r_offset < hend)
5648 {
5649 /* If the entry is in use, do nothing. */
5650 if (h->vtable_entries_used)
5651 {
5652 bfd_vma entry = (rel->r_offset - hstart) / FILE_ALIGN;
5653 if (h->vtable_entries_used[entry])
5654 continue;
5655 }
5656 /* Otherwise, kill it. */
5657 rel->r_offset = rel->r_info = rel->r_addend = 0;
5658 }
5659
5660 return true;
5661}
5662
5663/* Do mark and sweep of unused sections. */
5664
5665boolean
5666elf_gc_sections (abfd, info)
5667 bfd *abfd;
5668 struct bfd_link_info *info;
5669{
5670 boolean ok = true;
5671 bfd *sub;
5672 asection * (*gc_mark_hook)
5673 PARAMS ((bfd *abfd, struct bfd_link_info *, Elf_Internal_Rela *,
5674 struct elf_link_hash_entry *h, Elf_Internal_Sym *));
5675
5676 if (!get_elf_backend_data (abfd)->can_gc_sections
5677 || info->relocateable)
5678 return true;
5679
5680 /* Apply transitive closure to the vtable entry usage info. */
5681 elf_link_hash_traverse (elf_hash_table (info),
1ff13765 5682 elf_gc_propagate_vtable_entries_used,
303b4cc6
RH
5683 (PTR) &ok);
5684 if (!ok)
5685 return false;
5686
5687 /* Kill the vtable relocations that were not used. */
5688 elf_link_hash_traverse (elf_hash_table (info),
5689 elf_gc_smash_unused_vtentry_relocs,
5690 (PTR) &ok);
5691 if (!ok)
5692 return false;
5693
5694 /* Grovel through relocs to find out who stays ... */
5695
5696 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
5697 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
5698 {
5699 asection *o;
5700 for (o = sub->sections; o != NULL; o = o->next)
5701 {
5702 if (o->flags & SEC_KEEP)
5703 if (!elf_gc_mark (info, o, gc_mark_hook))
5704 return false;
5705 }
5706 }
5707
5708 /* ... and mark SEC_EXCLUDE for those that go. */
5709 if (!elf_gc_sweep(info, get_elf_backend_data (abfd)->gc_sweep_hook))
5710 return false;
5711
5712 return true;
5713}
5714\f
5715/* Called from check_relocs to record the existance of a VTINHERIT reloc. */
5716
5717boolean
5718elf_gc_record_vtinherit (abfd, sec, h, offset)
5719 bfd *abfd;
5720 asection *sec;
5721 struct elf_link_hash_entry *h;
5722 bfd_vma offset;
5723{
5724 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
5725 struct elf_link_hash_entry **search, *child;
5726 bfd_size_type extsymcount;
5727
5728 /* The sh_info field of the symtab header tells us where the
5729 external symbols start. We don't care about the local symbols at
5730 this point. */
5731 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size/sizeof (Elf_External_Sym);
5732 if (!elf_bad_symtab (abfd))
5733 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
5734
5735 sym_hashes = elf_sym_hashes (abfd);
5736 sym_hashes_end = sym_hashes + extsymcount;
5737
5738 /* Hunt down the child symbol, which is in this section at the same
5739 offset as the relocation. */
5740 for (search = sym_hashes; search != sym_hashes_end; ++search)
5741 {
5742 if ((child = *search) != NULL
5743 && (child->root.type == bfd_link_hash_defined
5744 || child->root.type == bfd_link_hash_defweak)
5745 && child->root.u.def.section == sec
5746 && child->root.u.def.value == offset)
5747 goto win;
5748 }
5749
5750 (*_bfd_error_handler) ("%s: %s+%lu: No symbol found for INHERIT",
5751 bfd_get_filename (abfd), sec->name,
5752 (unsigned long)offset);
5753 bfd_set_error (bfd_error_invalid_operation);
5754 return false;
5755
5756win:
5757 if (!h)
5758 {
5759 /* This *should* only be the absolute section. It could potentially
5760 be that someone has defined a non-global vtable though, which
5761 would be bad. It isn't worth paging in the local symbols to be
5762 sure though; that case should simply be handled by the assembler. */
5763
5764 child->vtable_parent = (struct elf_link_hash_entry *) -1;
5765 }
5766 else
5767 child->vtable_parent = h;
5768
5769 return true;
5770}
5771
5772/* Called from check_relocs to record the existance of a VTENTRY reloc. */
5773
5774boolean
5775elf_gc_record_vtentry (abfd, sec, h, addend)
5776 bfd *abfd;
5777 asection *sec;
5778 struct elf_link_hash_entry *h;
5779 bfd_vma addend;
5780{
5781 if (h->vtable_entries_used == NULL)
5782 {
5783 /* Allocate one extra entry for use as a "done" flag for the
5784 consolidation pass. */
5785 size_t size = (h->size / FILE_ALIGN + 1) * sizeof(boolean);
5786 h->vtable_entries_used = (boolean *) bfd_alloc (abfd, size);
5787 if (h->vtable_entries_used == NULL)
5788 return false;
5789
5790 /* And arrange for that done flag to be at index -1. */
5791 memset (h->vtable_entries_used++, 0, size);
5792 }
5793 h->vtable_entries_used[addend / FILE_ALIGN] = true;
5794
5795 return true;
5796}
5797
5798/* And an accompanying bit to work out final got entry offsets once
5799 we're done. Should be called from final_link. */
5800
5801boolean
5802elf_gc_common_finalize_got_offsets (abfd, info)
5803 bfd *abfd;
5804 struct bfd_link_info *info;
5805{
be228e0d 5806 bfd *i;
7993f96a
RH
5807 struct elf_backend_data *bed = get_elf_backend_data (abfd);
5808 bfd_vma gotoff;
5809
5810 /* The GOT offset is relative to the .got section, but the GOT header is
5811 put into the .got.plt section, if the backend uses it. */
5812 if (bed->want_got_plt)
5813 gotoff = 0;
5814 else
5815 gotoff = bed->got_header_size;
be228e0d
ILT
5816
5817 /* Do the local .got entries first. */
5818 for (i = info->input_bfds; i; i = i->link_next)
303b4cc6 5819 {
be228e0d
ILT
5820 bfd_signed_vma *local_got = elf_local_got_refcounts (i);
5821 bfd_size_type j, locsymcount;
5822 Elf_Internal_Shdr *symtab_hdr;
303b4cc6 5823
be228e0d
ILT
5824 if (!local_got)
5825 continue;
303b4cc6 5826
be228e0d
ILT
5827 symtab_hdr = &elf_tdata (i)->symtab_hdr;
5828 if (elf_bad_symtab (i))
5829 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
5830 else
5831 locsymcount = symtab_hdr->sh_info;
303b4cc6 5832
be228e0d
ILT
5833 for (j = 0; j < locsymcount; ++j)
5834 {
5835 if (local_got[j] > 0)
5836 {
5837 local_got[j] = gotoff;
5838 gotoff += ARCH_SIZE / 8;
5839 }
303b4cc6 5840 else
be228e0d 5841 local_got[j] = (bfd_vma) -1;
303b4cc6 5842 }
303b4cc6
RH
5843 }
5844
be228e0d 5845 /* Then the global .got and .plt entries. */
be228e0d
ILT
5846 elf_link_hash_traverse (elf_hash_table (info),
5847 elf_gc_allocate_got_offsets,
965d5a46 5848 (PTR) &gotoff);
303b4cc6
RH
5849 return true;
5850}
5851
5852/* We need a special top-level link routine to convert got reference counts
5853 to real got offsets. */
5854
5855static boolean
5856elf_gc_allocate_got_offsets (h, offarg)
5857 struct elf_link_hash_entry *h;
5858 PTR offarg;
5859{
5860 bfd_vma *off = (bfd_vma *) offarg;
5861
be228e0d
ILT
5862 if (h->got.refcount > 0)
5863 {
5864 h->got.offset = off[0];
5865 off[0] += ARCH_SIZE / 8;
5866 }
5867 else
5868 h->got.offset = (bfd_vma) -1;
303b4cc6
RH
5869
5870 return true;
5871}
5872
5873/* Many folk need no more in the way of final link than this, once
5874 got entry reference counting is enabled. */
5875
5876boolean
5877elf_gc_common_final_link (abfd, info)
5878 bfd *abfd;
5879 struct bfd_link_info *info;
5880{
5881 if (!elf_gc_common_finalize_got_offsets (abfd, info))
5882 return false;
5883
5884 /* Invoke the regular ELF backend linker to do all the work. */
5885 return elf_bfd_final_link (abfd, info);
5886}
This page took 0.397469 seconds and 4 git commands to generate.