merge from gcc
[deliverable/binutils-gdb.git] / bfd / elflink.h
CommitLineData
252b5132 1/* ELF linker support.
7898deda
NC
2 Copyright 1995, 1996, 1997, 1998, 1999, 2000, 2001
3 Free Software Foundation, Inc.
252b5132
RH
4
5This file is part of BFD, the Binary File Descriptor library.
6
7This program is free software; you can redistribute it and/or modify
8it under the terms of the GNU General Public License as published by
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
11
12This program is distributed in the hope that it will be useful,
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
18along with this program; if not, write to the Free Software
19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
20
21/* ELF linker code. */
22
23/* This struct is used to pass information to routines called via
24 elf_link_hash_traverse which must return failure. */
25
26struct elf_info_failed
27{
28 boolean failed;
29 struct bfd_link_info *info;
30};
31
32static boolean elf_link_add_object_symbols
33 PARAMS ((bfd *, struct bfd_link_info *));
34static boolean elf_link_add_archive_symbols
35 PARAMS ((bfd *, struct bfd_link_info *));
36static boolean elf_merge_symbol
37 PARAMS ((bfd *, struct bfd_link_info *, const char *, Elf_Internal_Sym *,
38 asection **, bfd_vma *, struct elf_link_hash_entry **,
456981d7 39 boolean *, boolean *, boolean *, boolean));
252b5132
RH
40static boolean elf_export_symbol
41 PARAMS ((struct elf_link_hash_entry *, PTR));
42static boolean elf_fix_symbol_flags
43 PARAMS ((struct elf_link_hash_entry *, struct elf_info_failed *));
44static boolean elf_adjust_dynamic_symbol
45 PARAMS ((struct elf_link_hash_entry *, PTR));
46static boolean elf_link_find_version_dependencies
47 PARAMS ((struct elf_link_hash_entry *, PTR));
48static boolean elf_link_find_version_dependencies
49 PARAMS ((struct elf_link_hash_entry *, PTR));
50static boolean elf_link_assign_sym_version
51 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
52static boolean elf_collect_hash_codes
53 PARAMS ((struct elf_link_hash_entry *, PTR));
3e932841 54static boolean elf_link_read_relocs_from_section
6b5bd373 55 PARAMS ((bfd *, Elf_Internal_Shdr *, PTR, Elf_Internal_Rela *));
23bc299b
MM
56static void elf_link_output_relocs
57 PARAMS ((bfd *, asection *, Elf_Internal_Shdr *, Elf_Internal_Rela *));
58static boolean elf_link_size_reloc_section
59 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
3e932841
KH
60static void elf_link_adjust_relocs
61 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned int,
31367b81 62 struct elf_link_hash_entry **));
252b5132
RH
63
64/* Given an ELF BFD, add symbols to the global hash table as
65 appropriate. */
66
67boolean
68elf_bfd_link_add_symbols (abfd, info)
69 bfd *abfd;
70 struct bfd_link_info *info;
71{
72 switch (bfd_get_format (abfd))
73 {
74 case bfd_object:
75 return elf_link_add_object_symbols (abfd, info);
76 case bfd_archive:
77 return elf_link_add_archive_symbols (abfd, info);
78 default:
79 bfd_set_error (bfd_error_wrong_format);
80 return false;
81 }
82}
83\f
7da9d88f 84/* Return true iff this is a non-common, definition of a non-function symbol. */
48dfb430 85static boolean
7da9d88f 86is_global_data_symbol_definition (abfd, sym)
86033394 87 bfd * abfd ATTRIBUTE_UNUSED;
48dfb430
NC
88 Elf_Internal_Sym * sym;
89{
90 /* Local symbols do not count, but target specific ones might. */
91 if (ELF_ST_BIND (sym->st_info) != STB_GLOBAL
92 && ELF_ST_BIND (sym->st_info) < STB_LOOS)
93 return false;
94
7da9d88f
NC
95 /* Function symbols do not count. */
96 if (ELF_ST_TYPE (sym->st_info) == STT_FUNC)
97 return false;
98
48dfb430
NC
99 /* If the section is undefined, then so is the symbol. */
100 if (sym->st_shndx == SHN_UNDEF)
101 return false;
3e932841 102
48dfb430
NC
103 /* If the symbol is defined in the common section, then
104 it is a common definition and so does not count. */
105 if (sym->st_shndx == SHN_COMMON)
106 return false;
107
108 /* If the symbol is in a target specific section then we
109 must rely upon the backend to tell us what it is. */
110 if (sym->st_shndx >= SHN_LORESERVE && sym->st_shndx < SHN_ABS)
111 /* FIXME - this function is not coded yet:
3e932841 112
48dfb430 113 return _bfd_is_global_symbol_definition (abfd, sym);
3e932841 114
48dfb430
NC
115 Instead for now assume that the definition is not global,
116 Even if this is wrong, at least the linker will behave
117 in the same way that it used to do. */
118 return false;
3e932841 119
48dfb430
NC
120 return true;
121}
122
a3a8c91d 123/* Search the symbol table of the archive element of the archive ABFD
7da9d88f 124 whoes archive map contains a mention of SYMDEF, and determine if
a3a8c91d
NC
125 the symbol is defined in this element. */
126static boolean
127elf_link_is_defined_archive_symbol (abfd, symdef)
128 bfd * abfd;
129 carsym * symdef;
130{
131 Elf_Internal_Shdr * hdr;
132 Elf_External_Sym * esym;
133 Elf_External_Sym * esymend;
134 Elf_External_Sym * buf = NULL;
135 size_t symcount;
136 size_t extsymcount;
137 size_t extsymoff;
138 boolean result = false;
3e932841 139
a3a8c91d
NC
140 abfd = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
141 if (abfd == (bfd *) NULL)
142 return false;
143
144 if (! bfd_check_format (abfd, bfd_object))
145 return false;
146
48dfb430
NC
147 /* If we have already included the element containing this symbol in the
148 link then we do not need to include it again. Just claim that any symbol
149 it contains is not a definition, so that our caller will not decide to
150 (re)include this element. */
151 if (abfd->archive_pass)
152 return false;
3e932841 153
a3a8c91d
NC
154 /* Select the appropriate symbol table. */
155 if ((abfd->flags & DYNAMIC) == 0 || elf_dynsymtab (abfd) == 0)
156 hdr = &elf_tdata (abfd)->symtab_hdr;
157 else
158 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
159
160 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
161
162 /* The sh_info field of the symtab header tells us where the
163 external symbols start. We don't care about the local symbols. */
164 if (elf_bad_symtab (abfd))
165 {
166 extsymcount = symcount;
167 extsymoff = 0;
168 }
169 else
170 {
171 extsymcount = symcount - hdr->sh_info;
172 extsymoff = hdr->sh_info;
173 }
174
175 buf = ((Elf_External_Sym *)
176 bfd_malloc (extsymcount * sizeof (Elf_External_Sym)));
177 if (buf == NULL && extsymcount != 0)
178 return false;
179
180 /* Read in the symbol table.
181 FIXME: This ought to be cached somewhere. */
182 if (bfd_seek (abfd,
183 hdr->sh_offset + extsymoff * sizeof (Elf_External_Sym),
184 SEEK_SET) != 0
185 || (bfd_read ((PTR) buf, sizeof (Elf_External_Sym), extsymcount, abfd)
186 != extsymcount * sizeof (Elf_External_Sym)))
187 {
188 free (buf);
189 return false;
190 }
191
192 /* Scan the symbol table looking for SYMDEF. */
193 esymend = buf + extsymcount;
194 for (esym = buf;
195 esym < esymend;
196 esym++)
197 {
198 Elf_Internal_Sym sym;
199 const char * name;
200
201 elf_swap_symbol_in (abfd, esym, & sym);
202
203 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, sym.st_name);
204 if (name == (const char *) NULL)
205 break;
206
207 if (strcmp (name, symdef->name) == 0)
208 {
7da9d88f 209 result = is_global_data_symbol_definition (abfd, & sym);
a3a8c91d
NC
210 break;
211 }
212 }
213
214 free (buf);
3e932841 215
a3a8c91d
NC
216 return result;
217}
218\f
252b5132
RH
219/* Add symbols from an ELF archive file to the linker hash table. We
220 don't use _bfd_generic_link_add_archive_symbols because of a
221 problem which arises on UnixWare. The UnixWare libc.so is an
222 archive which includes an entry libc.so.1 which defines a bunch of
223 symbols. The libc.so archive also includes a number of other
224 object files, which also define symbols, some of which are the same
225 as those defined in libc.so.1. Correct linking requires that we
226 consider each object file in turn, and include it if it defines any
227 symbols we need. _bfd_generic_link_add_archive_symbols does not do
228 this; it looks through the list of undefined symbols, and includes
229 any object file which defines them. When this algorithm is used on
230 UnixWare, it winds up pulling in libc.so.1 early and defining a
231 bunch of symbols. This means that some of the other objects in the
232 archive are not included in the link, which is incorrect since they
233 precede libc.so.1 in the archive.
234
235 Fortunately, ELF archive handling is simpler than that done by
236 _bfd_generic_link_add_archive_symbols, which has to allow for a.out
237 oddities. In ELF, if we find a symbol in the archive map, and the
238 symbol is currently undefined, we know that we must pull in that
239 object file.
240
241 Unfortunately, we do have to make multiple passes over the symbol
242 table until nothing further is resolved. */
243
244static boolean
245elf_link_add_archive_symbols (abfd, info)
246 bfd *abfd;
247 struct bfd_link_info *info;
248{
249 symindex c;
250 boolean *defined = NULL;
251 boolean *included = NULL;
252 carsym *symdefs;
253 boolean loop;
254
255 if (! bfd_has_map (abfd))
256 {
257 /* An empty archive is a special case. */
258 if (bfd_openr_next_archived_file (abfd, (bfd *) NULL) == NULL)
259 return true;
260 bfd_set_error (bfd_error_no_armap);
261 return false;
262 }
263
264 /* Keep track of all symbols we know to be already defined, and all
265 files we know to be already included. This is to speed up the
266 second and subsequent passes. */
267 c = bfd_ardata (abfd)->symdef_count;
268 if (c == 0)
269 return true;
270 defined = (boolean *) bfd_malloc (c * sizeof (boolean));
271 included = (boolean *) bfd_malloc (c * sizeof (boolean));
272 if (defined == (boolean *) NULL || included == (boolean *) NULL)
273 goto error_return;
274 memset (defined, 0, c * sizeof (boolean));
275 memset (included, 0, c * sizeof (boolean));
276
277 symdefs = bfd_ardata (abfd)->symdefs;
278
279 do
280 {
281 file_ptr last;
282 symindex i;
283 carsym *symdef;
284 carsym *symdefend;
285
286 loop = false;
287 last = -1;
288
289 symdef = symdefs;
290 symdefend = symdef + c;
291 for (i = 0; symdef < symdefend; symdef++, i++)
292 {
293 struct elf_link_hash_entry *h;
294 bfd *element;
295 struct bfd_link_hash_entry *undefs_tail;
296 symindex mark;
297
298 if (defined[i] || included[i])
299 continue;
300 if (symdef->file_offset == last)
301 {
302 included[i] = true;
303 continue;
304 }
305
306 h = elf_link_hash_lookup (elf_hash_table (info), symdef->name,
307 false, false, false);
308
309 if (h == NULL)
310 {
311 char *p, *copy;
312
313 /* If this is a default version (the name contains @@),
314 look up the symbol again without the version. The
315 effect is that references to the symbol without the
316 version will be matched by the default symbol in the
317 archive. */
318
319 p = strchr (symdef->name, ELF_VER_CHR);
320 if (p == NULL || p[1] != ELF_VER_CHR)
321 continue;
322
323 copy = bfd_alloc (abfd, p - symdef->name + 1);
324 if (copy == NULL)
325 goto error_return;
326 memcpy (copy, symdef->name, p - symdef->name);
327 copy[p - symdef->name] = '\0';
328
329 h = elf_link_hash_lookup (elf_hash_table (info), copy,
330 false, false, false);
331
332 bfd_release (abfd, copy);
333 }
334
335 if (h == NULL)
336 continue;
337
a3a8c91d
NC
338 if (h->root.type == bfd_link_hash_common)
339 {
340 /* We currently have a common symbol. The archive map contains
341 a reference to this symbol, so we may want to include it. We
342 only want to include it however, if this archive element
343 contains a definition of the symbol, not just another common
344 declaration of it.
345
346 Unfortunately some archivers (including GNU ar) will put
347 declarations of common symbols into their archive maps, as
348 well as real definitions, so we cannot just go by the archive
349 map alone. Instead we must read in the element's symbol
350 table and check that to see what kind of symbol definition
351 this is. */
352 if (! elf_link_is_defined_archive_symbol (abfd, symdef))
353 continue;
354 }
355 else if (h->root.type != bfd_link_hash_undefined)
252b5132
RH
356 {
357 if (h->root.type != bfd_link_hash_undefweak)
358 defined[i] = true;
359 continue;
360 }
361
362 /* We need to include this archive member. */
252b5132
RH
363 element = _bfd_get_elt_at_filepos (abfd, symdef->file_offset);
364 if (element == (bfd *) NULL)
365 goto error_return;
366
367 if (! bfd_check_format (element, bfd_object))
368 goto error_return;
369
370 /* Doublecheck that we have not included this object
371 already--it should be impossible, but there may be
372 something wrong with the archive. */
373 if (element->archive_pass != 0)
374 {
375 bfd_set_error (bfd_error_bad_value);
376 goto error_return;
377 }
378 element->archive_pass = 1;
379
380 undefs_tail = info->hash->undefs_tail;
381
382 if (! (*info->callbacks->add_archive_element) (info, element,
383 symdef->name))
384 goto error_return;
385 if (! elf_link_add_object_symbols (element, info))
386 goto error_return;
387
388 /* If there are any new undefined symbols, we need to make
389 another pass through the archive in order to see whether
390 they can be defined. FIXME: This isn't perfect, because
391 common symbols wind up on undefs_tail and because an
392 undefined symbol which is defined later on in this pass
393 does not require another pass. This isn't a bug, but it
394 does make the code less efficient than it could be. */
395 if (undefs_tail != info->hash->undefs_tail)
396 loop = true;
397
398 /* Look backward to mark all symbols from this object file
399 which we have already seen in this pass. */
400 mark = i;
401 do
402 {
403 included[mark] = true;
404 if (mark == 0)
405 break;
406 --mark;
407 }
408 while (symdefs[mark].file_offset == symdef->file_offset);
409
410 /* We mark subsequent symbols from this object file as we go
411 on through the loop. */
412 last = symdef->file_offset;
413 }
414 }
415 while (loop);
416
417 free (defined);
418 free (included);
419
420 return true;
421
422 error_return:
423 if (defined != (boolean *) NULL)
424 free (defined);
425 if (included != (boolean *) NULL)
426 free (included);
427 return false;
428}
429
430/* This function is called when we want to define a new symbol. It
431 handles the various cases which arise when we find a definition in
432 a dynamic object, or when there is already a definition in a
433 dynamic object. The new symbol is described by NAME, SYM, PSEC,
434 and PVALUE. We set SYM_HASH to the hash table entry. We set
435 OVERRIDE if the old symbol is overriding a new definition. We set
436 TYPE_CHANGE_OK if it is OK for the type to change. We set
437 SIZE_CHANGE_OK if it is OK for the size to change. By OK to
438 change, we mean that we shouldn't warn if the type or size does
456981d7
L
439 change. DT_NEEDED indicates if it comes from a DT_NEEDED entry of
440 a shared object. */
252b5132
RH
441
442static boolean
443elf_merge_symbol (abfd, info, name, sym, psec, pvalue, sym_hash,
456981d7 444 override, type_change_ok, size_change_ok, dt_needed)
252b5132
RH
445 bfd *abfd;
446 struct bfd_link_info *info;
447 const char *name;
448 Elf_Internal_Sym *sym;
449 asection **psec;
450 bfd_vma *pvalue;
451 struct elf_link_hash_entry **sym_hash;
452 boolean *override;
453 boolean *type_change_ok;
454 boolean *size_change_ok;
456981d7 455 boolean dt_needed;
252b5132
RH
456{
457 asection *sec;
458 struct elf_link_hash_entry *h;
459 int bind;
460 bfd *oldbfd;
461 boolean newdyn, olddyn, olddef, newdef, newdyncommon, olddyncommon;
462
463 *override = false;
464
465 sec = *psec;
466 bind = ELF_ST_BIND (sym->st_info);
467
468 if (! bfd_is_und_section (sec))
469 h = elf_link_hash_lookup (elf_hash_table (info), name, true, false, false);
470 else
471 h = ((struct elf_link_hash_entry *)
472 bfd_wrapped_link_hash_lookup (abfd, info, name, true, false, false));
473 if (h == NULL)
474 return false;
475 *sym_hash = h;
476
477 /* This code is for coping with dynamic objects, and is only useful
478 if we are doing an ELF link. */
479 if (info->hash->creator != abfd->xvec)
480 return true;
481
482 /* For merging, we only care about real symbols. */
483
484 while (h->root.type == bfd_link_hash_indirect
485 || h->root.type == bfd_link_hash_warning)
486 h = (struct elf_link_hash_entry *) h->root.u.i.link;
487
488 /* If we just created the symbol, mark it as being an ELF symbol.
489 Other than that, there is nothing to do--there is no merge issue
490 with a newly defined symbol--so we just return. */
491
492 if (h->root.type == bfd_link_hash_new)
493 {
494 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
495 return true;
496 }
497
498 /* OLDBFD is a BFD associated with the existing symbol. */
499
500 switch (h->root.type)
501 {
502 default:
503 oldbfd = NULL;
504 break;
505
506 case bfd_link_hash_undefined:
507 case bfd_link_hash_undefweak:
508 oldbfd = h->root.u.undef.abfd;
509 break;
510
511 case bfd_link_hash_defined:
512 case bfd_link_hash_defweak:
513 oldbfd = h->root.u.def.section->owner;
514 break;
515
516 case bfd_link_hash_common:
517 oldbfd = h->root.u.c.p->section->owner;
518 break;
519 }
520
b4536acd
ILT
521 /* In cases involving weak versioned symbols, we may wind up trying
522 to merge a symbol with itself. Catch that here, to avoid the
523 confusion that results if we try to override a symbol with
accc7f69
ILT
524 itself. The additional tests catch cases like
525 _GLOBAL_OFFSET_TABLE_, which are regular symbols defined in a
526 dynamic object, which we do want to handle here. */
527 if (abfd == oldbfd
528 && ((abfd->flags & DYNAMIC) == 0
529 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0))
b4536acd
ILT
530 return true;
531
252b5132
RH
532 /* NEWDYN and OLDDYN indicate whether the new or old symbol,
533 respectively, is from a dynamic object. */
534
535 if ((abfd->flags & DYNAMIC) != 0)
536 newdyn = true;
537 else
538 newdyn = false;
539
0035bd7b
ILT
540 if (oldbfd != NULL)
541 olddyn = (oldbfd->flags & DYNAMIC) != 0;
252b5132 542 else
0035bd7b
ILT
543 {
544 asection *hsec;
545
546 /* This code handles the special SHN_MIPS_{TEXT,DATA} section
547 indices used by MIPS ELF. */
548 switch (h->root.type)
549 {
550 default:
551 hsec = NULL;
552 break;
553
554 case bfd_link_hash_defined:
555 case bfd_link_hash_defweak:
556 hsec = h->root.u.def.section;
557 break;
558
559 case bfd_link_hash_common:
560 hsec = h->root.u.c.p->section;
561 break;
562 }
563
564 if (hsec == NULL)
565 olddyn = false;
566 else
567 olddyn = (hsec->symbol->flags & BSF_DYNAMIC) != 0;
568 }
252b5132
RH
569
570 /* NEWDEF and OLDDEF indicate whether the new or old symbol,
571 respectively, appear to be a definition rather than reference. */
572
573 if (bfd_is_und_section (sec) || bfd_is_com_section (sec))
574 newdef = false;
575 else
576 newdef = true;
577
578 if (h->root.type == bfd_link_hash_undefined
579 || h->root.type == bfd_link_hash_undefweak
580 || h->root.type == bfd_link_hash_common)
581 olddef = false;
582 else
583 olddef = true;
584
585 /* NEWDYNCOMMON and OLDDYNCOMMON indicate whether the new or old
586 symbol, respectively, appears to be a common symbol in a dynamic
587 object. If a symbol appears in an uninitialized section, and is
588 not weak, and is not a function, then it may be a common symbol
589 which was resolved when the dynamic object was created. We want
590 to treat such symbols specially, because they raise special
591 considerations when setting the symbol size: if the symbol
592 appears as a common symbol in a regular object, and the size in
593 the regular object is larger, we must make sure that we use the
594 larger size. This problematic case can always be avoided in C,
595 but it must be handled correctly when using Fortran shared
596 libraries.
597
598 Note that if NEWDYNCOMMON is set, NEWDEF will be set, and
599 likewise for OLDDYNCOMMON and OLDDEF.
600
601 Note that this test is just a heuristic, and that it is quite
602 possible to have an uninitialized symbol in a shared object which
603 is really a definition, rather than a common symbol. This could
604 lead to some minor confusion when the symbol really is a common
605 symbol in some regular object. However, I think it will be
606 harmless. */
607
608 if (newdyn
609 && newdef
610 && (sec->flags & SEC_ALLOC) != 0
611 && (sec->flags & SEC_LOAD) == 0
612 && sym->st_size > 0
613 && bind != STB_WEAK
614 && ELF_ST_TYPE (sym->st_info) != STT_FUNC)
615 newdyncommon = true;
616 else
617 newdyncommon = false;
618
619 if (olddyn
620 && olddef
621 && h->root.type == bfd_link_hash_defined
622 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
623 && (h->root.u.def.section->flags & SEC_ALLOC) != 0
624 && (h->root.u.def.section->flags & SEC_LOAD) == 0
625 && h->size > 0
626 && h->type != STT_FUNC)
627 olddyncommon = true;
628 else
629 olddyncommon = false;
630
631 /* It's OK to change the type if either the existing symbol or the
456981d7
L
632 new symbol is weak unless it comes from a DT_NEEDED entry of
633 a shared object, in which case, the DT_NEEDED entry may not be
3e932841 634 required at the run time. */
252b5132 635
456981d7 636 if ((! dt_needed && h->root.type == bfd_link_hash_defweak)
252b5132
RH
637 || h->root.type == bfd_link_hash_undefweak
638 || bind == STB_WEAK)
639 *type_change_ok = true;
640
641 /* It's OK to change the size if either the existing symbol or the
642 new symbol is weak, or if the old symbol is undefined. */
643
644 if (*type_change_ok
645 || h->root.type == bfd_link_hash_undefined)
646 *size_change_ok = true;
647
648 /* If both the old and the new symbols look like common symbols in a
649 dynamic object, set the size of the symbol to the larger of the
650 two. */
651
652 if (olddyncommon
653 && newdyncommon
654 && sym->st_size != h->size)
655 {
656 /* Since we think we have two common symbols, issue a multiple
657 common warning if desired. Note that we only warn if the
658 size is different. If the size is the same, we simply let
659 the old symbol override the new one as normally happens with
660 symbols defined in dynamic objects. */
661
662 if (! ((*info->callbacks->multiple_common)
663 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
664 h->size, abfd, bfd_link_hash_common, sym->st_size)))
665 return false;
666
667 if (sym->st_size > h->size)
668 h->size = sym->st_size;
669
670 *size_change_ok = true;
671 }
672
673 /* If we are looking at a dynamic object, and we have found a
674 definition, we need to see if the symbol was already defined by
675 some other object. If so, we want to use the existing
676 definition, and we do not want to report a multiple symbol
677 definition error; we do this by clobbering *PSEC to be
678 bfd_und_section_ptr.
679
680 We treat a common symbol as a definition if the symbol in the
681 shared library is a function, since common symbols always
682 represent variables; this can cause confusion in principle, but
683 any such confusion would seem to indicate an erroneous program or
684 shared library. We also permit a common symbol in a regular
0525d26e
ILT
685 object to override a weak symbol in a shared object.
686
687 We prefer a non-weak definition in a shared library to a weak
456981d7
L
688 definition in the executable unless it comes from a DT_NEEDED
689 entry of a shared object, in which case, the DT_NEEDED entry
3e932841 690 may not be required at the run time. */
252b5132
RH
691
692 if (newdyn
693 && newdef
694 && (olddef
695 || (h->root.type == bfd_link_hash_common
696 && (bind == STB_WEAK
0525d26e 697 || ELF_ST_TYPE (sym->st_info) == STT_FUNC)))
3e932841 698 && (h->root.type != bfd_link_hash_defweak
456981d7 699 || dt_needed
0525d26e 700 || bind == STB_WEAK))
252b5132
RH
701 {
702 *override = true;
703 newdef = false;
704 newdyncommon = false;
705
706 *psec = sec = bfd_und_section_ptr;
707 *size_change_ok = true;
708
709 /* If we get here when the old symbol is a common symbol, then
710 we are explicitly letting it override a weak symbol or
711 function in a dynamic object, and we don't want to warn about
712 a type change. If the old symbol is a defined symbol, a type
713 change warning may still be appropriate. */
714
715 if (h->root.type == bfd_link_hash_common)
716 *type_change_ok = true;
717 }
718
719 /* Handle the special case of an old common symbol merging with a
720 new symbol which looks like a common symbol in a shared object.
721 We change *PSEC and *PVALUE to make the new symbol look like a
722 common symbol, and let _bfd_generic_link_add_one_symbol will do
723 the right thing. */
724
725 if (newdyncommon
726 && h->root.type == bfd_link_hash_common)
727 {
728 *override = true;
729 newdef = false;
730 newdyncommon = false;
731 *pvalue = sym->st_size;
732 *psec = sec = bfd_com_section_ptr;
733 *size_change_ok = true;
734 }
735
736 /* If the old symbol is from a dynamic object, and the new symbol is
737 a definition which is not from a dynamic object, then the new
738 symbol overrides the old symbol. Symbols from regular files
739 always take precedence over symbols from dynamic objects, even if
740 they are defined after the dynamic object in the link.
741
742 As above, we again permit a common symbol in a regular object to
743 override a definition in a shared object if the shared object
0525d26e
ILT
744 symbol is a function or is weak.
745
746 As above, we permit a non-weak definition in a shared object to
747 override a weak definition in a regular object. */
252b5132
RH
748
749 if (! newdyn
750 && (newdef
751 || (bfd_is_com_section (sec)
752 && (h->root.type == bfd_link_hash_defweak
753 || h->type == STT_FUNC)))
754 && olddyn
755 && olddef
0525d26e
ILT
756 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
757 && (bind != STB_WEAK
758 || h->root.type == bfd_link_hash_defweak))
252b5132
RH
759 {
760 /* Change the hash table entry to undefined, and let
761 _bfd_generic_link_add_one_symbol do the right thing with the
762 new definition. */
763
764 h->root.type = bfd_link_hash_undefined;
765 h->root.u.undef.abfd = h->root.u.def.section->owner;
766 *size_change_ok = true;
767
768 olddef = false;
769 olddyncommon = false;
770
771 /* We again permit a type change when a common symbol may be
772 overriding a function. */
773
774 if (bfd_is_com_section (sec))
775 *type_change_ok = true;
776
777 /* This union may have been set to be non-NULL when this symbol
778 was seen in a dynamic object. We must force the union to be
779 NULL, so that it is correct for a regular symbol. */
780
781 h->verinfo.vertree = NULL;
782
783 /* In this special case, if H is the target of an indirection,
784 we want the caller to frob with H rather than with the
785 indirect symbol. That will permit the caller to redefine the
786 target of the indirection, rather than the indirect symbol
787 itself. FIXME: This will break the -y option if we store a
788 symbol with a different name. */
789 *sym_hash = h;
790 }
791
792 /* Handle the special case of a new common symbol merging with an
793 old symbol that looks like it might be a common symbol defined in
794 a shared object. Note that we have already handled the case in
795 which a new common symbol should simply override the definition
796 in the shared library. */
797
798 if (! newdyn
799 && bfd_is_com_section (sec)
800 && olddyncommon)
801 {
802 /* It would be best if we could set the hash table entry to a
803 common symbol, but we don't know what to use for the section
804 or the alignment. */
805 if (! ((*info->callbacks->multiple_common)
806 (info, h->root.root.string, oldbfd, bfd_link_hash_common,
807 h->size, abfd, bfd_link_hash_common, sym->st_size)))
808 return false;
809
810 /* If the predumed common symbol in the dynamic object is
811 larger, pretend that the new symbol has its size. */
812
813 if (h->size > *pvalue)
814 *pvalue = h->size;
815
816 /* FIXME: We no longer know the alignment required by the symbol
817 in the dynamic object, so we just wind up using the one from
818 the regular object. */
819
820 olddef = false;
821 olddyncommon = false;
822
823 h->root.type = bfd_link_hash_undefined;
824 h->root.u.undef.abfd = h->root.u.def.section->owner;
825
826 *size_change_ok = true;
827 *type_change_ok = true;
828
829 h->verinfo.vertree = NULL;
830 }
831
0525d26e
ILT
832 /* Handle the special case of a weak definition in a regular object
833 followed by a non-weak definition in a shared object. In this
456981d7
L
834 case, we prefer the definition in the shared object unless it
835 comes from a DT_NEEDED entry of a shared object, in which case,
3e932841 836 the DT_NEEDED entry may not be required at the run time. */
0525d26e 837 if (olddef
456981d7 838 && ! dt_needed
0525d26e
ILT
839 && h->root.type == bfd_link_hash_defweak
840 && newdef
841 && newdyn
842 && bind != STB_WEAK)
b4536acd
ILT
843 {
844 /* To make this work we have to frob the flags so that the rest
845 of the code does not think we are using the regular
846 definition. */
64df8d0b
ILT
847 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
848 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
849 else if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0)
850 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
851 h->elf_link_hash_flags &= ~ (ELF_LINK_HASH_DEF_REGULAR
852 | ELF_LINK_HASH_DEF_DYNAMIC);
b4536acd
ILT
853
854 /* If H is the target of an indirection, we want the caller to
855 use H rather than the indirect symbol. Otherwise if we are
856 defining a new indirect symbol we will wind up attaching it
857 to the entry we are overriding. */
858 *sym_hash = h;
859 }
0525d26e
ILT
860
861 /* Handle the special case of a non-weak definition in a shared
862 object followed by a weak definition in a regular object. In
863 this case we prefer to definition in the shared object. To make
864 this work we have to tell the caller to not treat the new symbol
865 as a definition. */
866 if (olddef
867 && olddyn
868 && h->root.type != bfd_link_hash_defweak
869 && newdef
870 && ! newdyn
871 && bind == STB_WEAK)
872 *override = true;
873
252b5132
RH
874 return true;
875}
876
877/* Add symbols from an ELF object file to the linker hash table. */
878
879static boolean
880elf_link_add_object_symbols (abfd, info)
881 bfd *abfd;
882 struct bfd_link_info *info;
883{
884 boolean (*add_symbol_hook) PARAMS ((bfd *, struct bfd_link_info *,
885 const Elf_Internal_Sym *,
886 const char **, flagword *,
887 asection **, bfd_vma *));
888 boolean (*check_relocs) PARAMS ((bfd *, struct bfd_link_info *,
889 asection *, const Elf_Internal_Rela *));
890 boolean collect;
891 Elf_Internal_Shdr *hdr;
892 size_t symcount;
893 size_t extsymcount;
894 size_t extsymoff;
895 Elf_External_Sym *buf = NULL;
896 struct elf_link_hash_entry **sym_hash;
897 boolean dynamic;
898 bfd_byte *dynver = NULL;
899 Elf_External_Versym *extversym = NULL;
900 Elf_External_Versym *ever;
901 Elf_External_Dyn *dynbuf = NULL;
902 struct elf_link_hash_entry *weaks;
903 Elf_External_Sym *esym;
904 Elf_External_Sym *esymend;
c61b8717 905 struct elf_backend_data *bed;
74816898 906 boolean dt_needed;
252b5132 907
c61b8717
RH
908 bed = get_elf_backend_data (abfd);
909 add_symbol_hook = bed->elf_add_symbol_hook;
910 collect = bed->collect;
252b5132
RH
911
912 if ((abfd->flags & DYNAMIC) == 0)
913 dynamic = false;
914 else
915 {
916 dynamic = true;
917
918 /* You can't use -r against a dynamic object. Also, there's no
919 hope of using a dynamic object which does not exactly match
920 the format of the output file. */
921 if (info->relocateable || info->hash->creator != abfd->xvec)
922 {
923 bfd_set_error (bfd_error_invalid_operation);
924 goto error_return;
925 }
926 }
927
928 /* As a GNU extension, any input sections which are named
929 .gnu.warning.SYMBOL are treated as warning symbols for the given
930 symbol. This differs from .gnu.warning sections, which generate
931 warnings when they are included in an output file. */
932 if (! info->shared)
933 {
934 asection *s;
935
936 for (s = abfd->sections; s != NULL; s = s->next)
937 {
938 const char *name;
939
940 name = bfd_get_section_name (abfd, s);
941 if (strncmp (name, ".gnu.warning.", sizeof ".gnu.warning." - 1) == 0)
942 {
943 char *msg;
944 bfd_size_type sz;
945
946 name += sizeof ".gnu.warning." - 1;
947
948 /* If this is a shared object, then look up the symbol
949 in the hash table. If it is there, and it is already
950 been defined, then we will not be using the entry
951 from this shared object, so we don't need to warn.
952 FIXME: If we see the definition in a regular object
953 later on, we will warn, but we shouldn't. The only
954 fix is to keep track of what warnings we are supposed
955 to emit, and then handle them all at the end of the
956 link. */
957 if (dynamic && abfd->xvec == info->hash->creator)
958 {
959 struct elf_link_hash_entry *h;
960
961 h = elf_link_hash_lookup (elf_hash_table (info), name,
962 false, false, true);
963
964 /* FIXME: What about bfd_link_hash_common? */
965 if (h != NULL
966 && (h->root.type == bfd_link_hash_defined
967 || h->root.type == bfd_link_hash_defweak))
968 {
969 /* We don't want to issue this warning. Clobber
970 the section size so that the warning does not
971 get copied into the output file. */
972 s->_raw_size = 0;
973 continue;
974 }
975 }
976
977 sz = bfd_section_size (abfd, s);
978 msg = (char *) bfd_alloc (abfd, sz + 1);
979 if (msg == NULL)
980 goto error_return;
981
982 if (! bfd_get_section_contents (abfd, s, msg, (file_ptr) 0, sz))
983 goto error_return;
984
985 msg[sz] = '\0';
986
987 if (! (_bfd_generic_link_add_one_symbol
988 (info, abfd, name, BSF_WARNING, s, (bfd_vma) 0, msg,
989 false, collect, (struct bfd_link_hash_entry **) NULL)))
990 goto error_return;
991
992 if (! info->relocateable)
993 {
994 /* Clobber the section size so that the warning does
995 not get copied into the output file. */
996 s->_raw_size = 0;
997 }
998 }
999 }
1000 }
1001
1002 /* If this is a dynamic object, we always link against the .dynsym
1003 symbol table, not the .symtab symbol table. The dynamic linker
1004 will only see the .dynsym symbol table, so there is no reason to
1005 look at .symtab for a dynamic object. */
1006
1007 if (! dynamic || elf_dynsymtab (abfd) == 0)
1008 hdr = &elf_tdata (abfd)->symtab_hdr;
1009 else
1010 hdr = &elf_tdata (abfd)->dynsymtab_hdr;
1011
1012 if (dynamic)
1013 {
1014 /* Read in any version definitions. */
1015
1016 if (! _bfd_elf_slurp_version_tables (abfd))
1017 goto error_return;
1018
1019 /* Read in the symbol versions, but don't bother to convert them
1020 to internal format. */
1021 if (elf_dynversym (abfd) != 0)
1022 {
1023 Elf_Internal_Shdr *versymhdr;
1024
1025 versymhdr = &elf_tdata (abfd)->dynversym_hdr;
1026 extversym = (Elf_External_Versym *) bfd_malloc (hdr->sh_size);
1027 if (extversym == NULL)
1028 goto error_return;
1029 if (bfd_seek (abfd, versymhdr->sh_offset, SEEK_SET) != 0
1030 || (bfd_read ((PTR) extversym, 1, versymhdr->sh_size, abfd)
1031 != versymhdr->sh_size))
1032 goto error_return;
1033 }
1034 }
1035
1036 symcount = hdr->sh_size / sizeof (Elf_External_Sym);
1037
1038 /* The sh_info field of the symtab header tells us where the
1039 external symbols start. We don't care about the local symbols at
1040 this point. */
1041 if (elf_bad_symtab (abfd))
1042 {
1043 extsymcount = symcount;
1044 extsymoff = 0;
1045 }
1046 else
1047 {
1048 extsymcount = symcount - hdr->sh_info;
1049 extsymoff = hdr->sh_info;
1050 }
1051
1052 buf = ((Elf_External_Sym *)
1053 bfd_malloc (extsymcount * sizeof (Elf_External_Sym)));
1054 if (buf == NULL && extsymcount != 0)
1055 goto error_return;
1056
1057 /* We store a pointer to the hash table entry for each external
1058 symbol. */
1059 sym_hash = ((struct elf_link_hash_entry **)
1060 bfd_alloc (abfd,
1061 extsymcount * sizeof (struct elf_link_hash_entry *)));
1062 if (sym_hash == NULL)
1063 goto error_return;
1064 elf_sym_hashes (abfd) = sym_hash;
1065
74816898
L
1066 dt_needed = false;
1067
252b5132
RH
1068 if (! dynamic)
1069 {
1070 /* If we are creating a shared library, create all the dynamic
1071 sections immediately. We need to attach them to something,
1072 so we attach them to this BFD, provided it is the right
1073 format. FIXME: If there are no input BFD's of the same
1074 format as the output, we can't make a shared library. */
1075 if (info->shared
1076 && ! elf_hash_table (info)->dynamic_sections_created
1077 && abfd->xvec == info->hash->creator)
1078 {
1079 if (! elf_link_create_dynamic_sections (abfd, info))
1080 goto error_return;
1081 }
1082 }
1083 else
1084 {
1085 asection *s;
1086 boolean add_needed;
1087 const char *name;
1088 bfd_size_type oldsize;
1089 bfd_size_type strindex;
1090
1091 /* Find the name to use in a DT_NEEDED entry that refers to this
1092 object. If the object has a DT_SONAME entry, we use it.
1093 Otherwise, if the generic linker stuck something in
1094 elf_dt_name, we use that. Otherwise, we just use the file
1095 name. If the generic linker put a null string into
1096 elf_dt_name, we don't make a DT_NEEDED entry at all, even if
1097 there is a DT_SONAME entry. */
1098 add_needed = true;
1099 name = bfd_get_filename (abfd);
1100 if (elf_dt_name (abfd) != NULL)
1101 {
1102 name = elf_dt_name (abfd);
1103 if (*name == '\0')
74816898
L
1104 {
1105 if (elf_dt_soname (abfd) != NULL)
1106 dt_needed = true;
1107
1108 add_needed = false;
1109 }
252b5132
RH
1110 }
1111 s = bfd_get_section_by_name (abfd, ".dynamic");
1112 if (s != NULL)
1113 {
1114 Elf_External_Dyn *extdyn;
1115 Elf_External_Dyn *extdynend;
1116 int elfsec;
1117 unsigned long link;
a963dc6a
L
1118 int rpath;
1119 int runpath;
252b5132
RH
1120
1121 dynbuf = (Elf_External_Dyn *) bfd_malloc ((size_t) s->_raw_size);
1122 if (dynbuf == NULL)
1123 goto error_return;
1124
1125 if (! bfd_get_section_contents (abfd, s, (PTR) dynbuf,
1126 (file_ptr) 0, s->_raw_size))
1127 goto error_return;
1128
1129 elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1130 if (elfsec == -1)
1131 goto error_return;
1132 link = elf_elfsections (abfd)[elfsec]->sh_link;
1133
20e29382
JL
1134 {
1135 /* The shared libraries distributed with hpux11 have a bogus
1136 sh_link field for the ".dynamic" section. This code detects
1137 when LINK refers to a section that is not a string table and
1138 tries to find the string table for the ".dynsym" section
1139 instead. */
1140 Elf_Internal_Shdr *hdr = elf_elfsections (abfd)[link];
1141 if (hdr->sh_type != SHT_STRTAB)
1142 {
1143 asection *s = bfd_get_section_by_name (abfd, ".dynsym");
1144 int elfsec = _bfd_elf_section_from_bfd_section (abfd, s);
1145 if (elfsec == -1)
1146 goto error_return;
1147 link = elf_elfsections (abfd)[elfsec]->sh_link;
1148 }
1149 }
1150
252b5132
RH
1151 extdyn = dynbuf;
1152 extdynend = extdyn + s->_raw_size / sizeof (Elf_External_Dyn);
a963dc6a
L
1153 rpath = 0;
1154 runpath = 0;
252b5132
RH
1155 for (; extdyn < extdynend; extdyn++)
1156 {
1157 Elf_Internal_Dyn dyn;
1158
1159 elf_swap_dyn_in (abfd, extdyn, &dyn);
1160 if (dyn.d_tag == DT_SONAME)
1161 {
1162 name = bfd_elf_string_from_elf_section (abfd, link,
1163 dyn.d_un.d_val);
1164 if (name == NULL)
1165 goto error_return;
1166 }
1167 if (dyn.d_tag == DT_NEEDED)
1168 {
1169 struct bfd_link_needed_list *n, **pn;
1170 char *fnm, *anm;
1171
1172 n = ((struct bfd_link_needed_list *)
1173 bfd_alloc (abfd, sizeof (struct bfd_link_needed_list)));
1174 fnm = bfd_elf_string_from_elf_section (abfd, link,
1175 dyn.d_un.d_val);
1176 if (n == NULL || fnm == NULL)
1177 goto error_return;
1178 anm = bfd_alloc (abfd, strlen (fnm) + 1);
1179 if (anm == NULL)
1180 goto error_return;
1181 strcpy (anm, fnm);
1182 n->name = anm;
1183 n->by = abfd;
1184 n->next = NULL;
1185 for (pn = &elf_hash_table (info)->needed;
1186 *pn != NULL;
1187 pn = &(*pn)->next)
1188 ;
1189 *pn = n;
1190 }
a963dc6a
L
1191 if (dyn.d_tag == DT_RUNPATH)
1192 {
1193 struct bfd_link_needed_list *n, **pn;
1194 char *fnm, *anm;
1195
1196 /* When we see DT_RPATH before DT_RUNPATH, we have
512a2384
AM
1197 to clear runpath. Do _NOT_ bfd_release, as that
1198 frees all more recently bfd_alloc'd blocks as
1199 well. */
a963dc6a 1200 if (rpath && elf_hash_table (info)->runpath)
512a2384 1201 elf_hash_table (info)->runpath = NULL;
a963dc6a
L
1202
1203 n = ((struct bfd_link_needed_list *)
1204 bfd_alloc (abfd, sizeof (struct bfd_link_needed_list)));
1205 fnm = bfd_elf_string_from_elf_section (abfd, link,
1206 dyn.d_un.d_val);
1207 if (n == NULL || fnm == NULL)
1208 goto error_return;
1209 anm = bfd_alloc (abfd, strlen (fnm) + 1);
1210 if (anm == NULL)
1211 goto error_return;
1212 strcpy (anm, fnm);
1213 n->name = anm;
1214 n->by = abfd;
1215 n->next = NULL;
1216 for (pn = &elf_hash_table (info)->runpath;
1217 *pn != NULL;
1218 pn = &(*pn)->next)
1219 ;
1220 *pn = n;
1221 runpath = 1;
1222 rpath = 0;
1223 }
3e932841 1224 /* Ignore DT_RPATH if we have seen DT_RUNPATH. */
a963dc6a
L
1225 if (!runpath && dyn.d_tag == DT_RPATH)
1226 {
1227 struct bfd_link_needed_list *n, **pn;
1228 char *fnm, *anm;
1229
1230 n = ((struct bfd_link_needed_list *)
1231 bfd_alloc (abfd, sizeof (struct bfd_link_needed_list)));
1232 fnm = bfd_elf_string_from_elf_section (abfd, link,
1233 dyn.d_un.d_val);
1234 if (n == NULL || fnm == NULL)
1235 goto error_return;
1236 anm = bfd_alloc (abfd, strlen (fnm) + 1);
1237 if (anm == NULL)
1238 goto error_return;
1239 strcpy (anm, fnm);
1240 n->name = anm;
1241 n->by = abfd;
1242 n->next = NULL;
1243 for (pn = &elf_hash_table (info)->runpath;
1244 *pn != NULL;
1245 pn = &(*pn)->next)
1246 ;
1247 *pn = n;
1248 rpath = 1;
1249 }
252b5132
RH
1250 }
1251
1252 free (dynbuf);
1253 dynbuf = NULL;
1254 }
1255
1256 /* We do not want to include any of the sections in a dynamic
1257 object in the output file. We hack by simply clobbering the
1258 list of sections in the BFD. This could be handled more
1259 cleanly by, say, a new section flag; the existing
1260 SEC_NEVER_LOAD flag is not the one we want, because that one
1261 still implies that the section takes up space in the output
1262 file. */
1263 abfd->sections = NULL;
1264 abfd->section_count = 0;
1265
1266 /* If this is the first dynamic object found in the link, create
1267 the special sections required for dynamic linking. */
1268 if (! elf_hash_table (info)->dynamic_sections_created)
1269 {
1270 if (! elf_link_create_dynamic_sections (abfd, info))
1271 goto error_return;
1272 }
1273
1274 if (add_needed)
1275 {
1276 /* Add a DT_NEEDED entry for this dynamic object. */
1277 oldsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
1278 strindex = _bfd_stringtab_add (elf_hash_table (info)->dynstr, name,
1279 true, false);
1280 if (strindex == (bfd_size_type) -1)
1281 goto error_return;
1282
1283 if (oldsize == _bfd_stringtab_size (elf_hash_table (info)->dynstr))
1284 {
1285 asection *sdyn;
1286 Elf_External_Dyn *dyncon, *dynconend;
1287
1288 /* The hash table size did not change, which means that
1289 the dynamic object name was already entered. If we
1290 have already included this dynamic object in the
1291 link, just ignore it. There is no reason to include
1292 a particular dynamic object more than once. */
1293 sdyn = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
1294 ".dynamic");
1295 BFD_ASSERT (sdyn != NULL);
1296
1297 dyncon = (Elf_External_Dyn *) sdyn->contents;
1298 dynconend = (Elf_External_Dyn *) (sdyn->contents +
1299 sdyn->_raw_size);
1300 for (; dyncon < dynconend; dyncon++)
1301 {
1302 Elf_Internal_Dyn dyn;
1303
1304 elf_swap_dyn_in (elf_hash_table (info)->dynobj, dyncon,
1305 &dyn);
1306 if (dyn.d_tag == DT_NEEDED
1307 && dyn.d_un.d_val == strindex)
1308 {
1309 if (buf != NULL)
1310 free (buf);
1311 if (extversym != NULL)
1312 free (extversym);
1313 return true;
1314 }
1315 }
1316 }
1317
1318 if (! elf_add_dynamic_entry (info, DT_NEEDED, strindex))
1319 goto error_return;
1320 }
1321
1322 /* Save the SONAME, if there is one, because sometimes the
1323 linker emulation code will need to know it. */
1324 if (*name == '\0')
210ba1e8 1325 name = basename (bfd_get_filename (abfd));
252b5132
RH
1326 elf_dt_name (abfd) = name;
1327 }
1328
1329 if (bfd_seek (abfd,
1330 hdr->sh_offset + extsymoff * sizeof (Elf_External_Sym),
1331 SEEK_SET) != 0
1332 || (bfd_read ((PTR) buf, sizeof (Elf_External_Sym), extsymcount, abfd)
1333 != extsymcount * sizeof (Elf_External_Sym)))
1334 goto error_return;
1335
1336 weaks = NULL;
1337
1338 ever = extversym != NULL ? extversym + extsymoff : NULL;
1339 esymend = buf + extsymcount;
1340 for (esym = buf;
1341 esym < esymend;
1342 esym++, sym_hash++, ever = (ever != NULL ? ever + 1 : NULL))
1343 {
1344 Elf_Internal_Sym sym;
1345 int bind;
1346 bfd_vma value;
1347 asection *sec;
1348 flagword flags;
1349 const char *name;
1350 struct elf_link_hash_entry *h;
1351 boolean definition;
1352 boolean size_change_ok, type_change_ok;
1353 boolean new_weakdef;
1354 unsigned int old_alignment;
1355
1356 elf_swap_symbol_in (abfd, esym, &sym);
1357
1358 flags = BSF_NO_FLAGS;
1359 sec = NULL;
1360 value = sym.st_value;
1361 *sym_hash = NULL;
1362
1363 bind = ELF_ST_BIND (sym.st_info);
1364 if (bind == STB_LOCAL)
1365 {
1366 /* This should be impossible, since ELF requires that all
1367 global symbols follow all local symbols, and that sh_info
1368 point to the first global symbol. Unfortunatealy, Irix 5
1369 screws this up. */
1370 continue;
1371 }
1372 else if (bind == STB_GLOBAL)
1373 {
1374 if (sym.st_shndx != SHN_UNDEF
1375 && sym.st_shndx != SHN_COMMON)
1376 flags = BSF_GLOBAL;
252b5132
RH
1377 }
1378 else if (bind == STB_WEAK)
1379 flags = BSF_WEAK;
1380 else
1381 {
1382 /* Leave it up to the processor backend. */
1383 }
1384
1385 if (sym.st_shndx == SHN_UNDEF)
1386 sec = bfd_und_section_ptr;
1387 else if (sym.st_shndx > 0 && sym.st_shndx < SHN_LORESERVE)
1388 {
1389 sec = section_from_elf_index (abfd, sym.st_shndx);
1390 if (sec == NULL)
1391 sec = bfd_abs_section_ptr;
1392 else if ((abfd->flags & (EXEC_P | DYNAMIC)) != 0)
1393 value -= sec->vma;
1394 }
1395 else if (sym.st_shndx == SHN_ABS)
1396 sec = bfd_abs_section_ptr;
1397 else if (sym.st_shndx == SHN_COMMON)
1398 {
1399 sec = bfd_com_section_ptr;
1400 /* What ELF calls the size we call the value. What ELF
1401 calls the value we call the alignment. */
1402 value = sym.st_size;
1403 }
1404 else
1405 {
1406 /* Leave it up to the processor backend. */
1407 }
1408
1409 name = bfd_elf_string_from_elf_section (abfd, hdr->sh_link, sym.st_name);
1410 if (name == (const char *) NULL)
1411 goto error_return;
1412
1413 if (add_symbol_hook)
1414 {
1415 if (! (*add_symbol_hook) (abfd, info, &sym, &name, &flags, &sec,
1416 &value))
1417 goto error_return;
1418
1419 /* The hook function sets the name to NULL if this symbol
1420 should be skipped for some reason. */
1421 if (name == (const char *) NULL)
1422 continue;
1423 }
1424
1425 /* Sanity check that all possibilities were handled. */
1426 if (sec == (asection *) NULL)
1427 {
1428 bfd_set_error (bfd_error_bad_value);
1429 goto error_return;
1430 }
1431
1432 if (bfd_is_und_section (sec)
1433 || bfd_is_com_section (sec))
1434 definition = false;
1435 else
1436 definition = true;
1437
1438 size_change_ok = false;
1439 type_change_ok = get_elf_backend_data (abfd)->type_change_ok;
1440 old_alignment = 0;
1441 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1442 {
1443 Elf_Internal_Versym iver;
1444 unsigned int vernum = 0;
1445 boolean override;
1446
1447 if (ever != NULL)
1448 {
1449 _bfd_elf_swap_versym_in (abfd, ever, &iver);
1450 vernum = iver.vs_vers & VERSYM_VERSION;
1451
1452 /* If this is a hidden symbol, or if it is not version
1453 1, we append the version name to the symbol name.
1454 However, we do not modify a non-hidden absolute
1455 symbol, because it might be the version symbol
1456 itself. FIXME: What if it isn't? */
1457 if ((iver.vs_vers & VERSYM_HIDDEN) != 0
1458 || (vernum > 1 && ! bfd_is_abs_section (sec)))
1459 {
1460 const char *verstr;
1461 int namelen, newlen;
1462 char *newname, *p;
1463
1464 if (sym.st_shndx != SHN_UNDEF)
1465 {
1466 if (vernum > elf_tdata (abfd)->dynverdef_hdr.sh_info)
1467 {
1468 (*_bfd_error_handler)
1469 (_("%s: %s: invalid version %u (max %d)"),
1470 bfd_get_filename (abfd), name, vernum,
1471 elf_tdata (abfd)->dynverdef_hdr.sh_info);
1472 bfd_set_error (bfd_error_bad_value);
1473 goto error_return;
1474 }
1475 else if (vernum > 1)
1476 verstr =
1477 elf_tdata (abfd)->verdef[vernum - 1].vd_nodename;
1478 else
1479 verstr = "";
1480 }
1481 else
1482 {
1483 /* We cannot simply test for the number of
1484 entries in the VERNEED section since the
1485 numbers for the needed versions do not start
1486 at 0. */
1487 Elf_Internal_Verneed *t;
1488
1489 verstr = NULL;
1490 for (t = elf_tdata (abfd)->verref;
1491 t != NULL;
1492 t = t->vn_nextref)
1493 {
1494 Elf_Internal_Vernaux *a;
1495
1496 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
1497 {
1498 if (a->vna_other == vernum)
1499 {
1500 verstr = a->vna_nodename;
1501 break;
1502 }
1503 }
1504 if (a != NULL)
1505 break;
1506 }
1507 if (verstr == NULL)
1508 {
1509 (*_bfd_error_handler)
1510 (_("%s: %s: invalid needed version %d"),
1511 bfd_get_filename (abfd), name, vernum);
1512 bfd_set_error (bfd_error_bad_value);
1513 goto error_return;
1514 }
1515 }
1516
1517 namelen = strlen (name);
1518 newlen = namelen + strlen (verstr) + 2;
1519 if ((iver.vs_vers & VERSYM_HIDDEN) == 0)
1520 ++newlen;
1521
1522 newname = (char *) bfd_alloc (abfd, newlen);
1523 if (newname == NULL)
1524 goto error_return;
1525 strcpy (newname, name);
1526 p = newname + namelen;
1527 *p++ = ELF_VER_CHR;
1287d1cc
ILT
1528 /* If this is a defined non-hidden version symbol,
1529 we add another @ to the name. This indicates the
1530 default version of the symbol. */
1531 if ((iver.vs_vers & VERSYM_HIDDEN) == 0
1532 && sym.st_shndx != SHN_UNDEF)
252b5132
RH
1533 *p++ = ELF_VER_CHR;
1534 strcpy (p, verstr);
1535
1536 name = newname;
1537 }
1538 }
1539
1540 if (! elf_merge_symbol (abfd, info, name, &sym, &sec, &value,
1541 sym_hash, &override, &type_change_ok,
456981d7 1542 &size_change_ok, dt_needed))
252b5132
RH
1543 goto error_return;
1544
1545 if (override)
1546 definition = false;
1547
1548 h = *sym_hash;
1549 while (h->root.type == bfd_link_hash_indirect
1550 || h->root.type == bfd_link_hash_warning)
1551 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1552
1553 /* Remember the old alignment if this is a common symbol, so
1554 that we don't reduce the alignment later on. We can't
1555 check later, because _bfd_generic_link_add_one_symbol
1556 will set a default for the alignment which we want to
1557 override. */
1558 if (h->root.type == bfd_link_hash_common)
1559 old_alignment = h->root.u.c.p->alignment_power;
1560
1561 if (elf_tdata (abfd)->verdef != NULL
1562 && ! override
1563 && vernum > 1
1564 && definition)
1565 h->verinfo.verdef = &elf_tdata (abfd)->verdef[vernum - 1];
1566 }
1567
1568 if (! (_bfd_generic_link_add_one_symbol
1569 (info, abfd, name, flags, sec, value, (const char *) NULL,
1570 false, collect, (struct bfd_link_hash_entry **) sym_hash)))
1571 goto error_return;
1572
1573 h = *sym_hash;
1574 while (h->root.type == bfd_link_hash_indirect
1575 || h->root.type == bfd_link_hash_warning)
1576 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1577 *sym_hash = h;
1578
1579 new_weakdef = false;
1580 if (dynamic
1581 && definition
1582 && (flags & BSF_WEAK) != 0
1583 && ELF_ST_TYPE (sym.st_info) != STT_FUNC
1584 && info->hash->creator->flavour == bfd_target_elf_flavour
1585 && h->weakdef == NULL)
1586 {
1587 /* Keep a list of all weak defined non function symbols from
1588 a dynamic object, using the weakdef field. Later in this
1589 function we will set the weakdef field to the correct
1590 value. We only put non-function symbols from dynamic
1591 objects on this list, because that happens to be the only
1592 time we need to know the normal symbol corresponding to a
1593 weak symbol, and the information is time consuming to
1594 figure out. If the weakdef field is not already NULL,
1595 then this symbol was already defined by some previous
1596 dynamic object, and we will be using that previous
1597 definition anyhow. */
1598
1599 h->weakdef = weaks;
1600 weaks = h;
1601 new_weakdef = true;
1602 }
1603
1604 /* Set the alignment of a common symbol. */
1605 if (sym.st_shndx == SHN_COMMON
1606 && h->root.type == bfd_link_hash_common)
1607 {
1608 unsigned int align;
1609
1610 align = bfd_log2 (sym.st_value);
724982f6
NC
1611 if (align > old_alignment
1612 /* Permit an alignment power of zero if an alignment of one
1613 is specified and no other alignments have been specified. */
1614 || (sym.st_value == 1 && old_alignment == 0))
252b5132
RH
1615 h->root.u.c.p->alignment_power = align;
1616 }
1617
1618 if (info->hash->creator->flavour == bfd_target_elf_flavour)
1619 {
1620 int old_flags;
1621 boolean dynsym;
1622 int new_flag;
1623
1624 /* Remember the symbol size and type. */
1625 if (sym.st_size != 0
1626 && (definition || h->size == 0))
1627 {
1628 if (h->size != 0 && h->size != sym.st_size && ! size_change_ok)
1629 (*_bfd_error_handler)
1630 (_("Warning: size of symbol `%s' changed from %lu to %lu in %s"),
1631 name, (unsigned long) h->size, (unsigned long) sym.st_size,
1632 bfd_get_filename (abfd));
1633
1634 h->size = sym.st_size;
1635 }
1636
1637 /* If this is a common symbol, then we always want H->SIZE
1638 to be the size of the common symbol. The code just above
1639 won't fix the size if a common symbol becomes larger. We
1640 don't warn about a size change here, because that is
1641 covered by --warn-common. */
1642 if (h->root.type == bfd_link_hash_common)
1643 h->size = h->root.u.c.size;
1644
1645 if (ELF_ST_TYPE (sym.st_info) != STT_NOTYPE
1646 && (definition || h->type == STT_NOTYPE))
1647 {
1648 if (h->type != STT_NOTYPE
1649 && h->type != ELF_ST_TYPE (sym.st_info)
1650 && ! type_change_ok)
1651 (*_bfd_error_handler)
1652 (_("Warning: type of symbol `%s' changed from %d to %d in %s"),
1653 name, h->type, ELF_ST_TYPE (sym.st_info),
1654 bfd_get_filename (abfd));
1655
1656 h->type = ELF_ST_TYPE (sym.st_info);
1657 }
1658
7a13edea
NC
1659 /* If st_other has a processor-specific meaning, specific code
1660 might be needed here. */
1661 if (sym.st_other != 0)
1662 {
1663 /* Combine visibilities, using the most constraining one. */
1664 unsigned char hvis = ELF_ST_VISIBILITY (h->other);
1665 unsigned char symvis = ELF_ST_VISIBILITY (sym.st_other);
3e932841 1666
7a13edea 1667 if (symvis && (hvis > symvis || hvis == 0))
38048eb9 1668 h->other = sym.st_other;
3e932841 1669
7a13edea
NC
1670 /* If neither has visibility, use the st_other of the
1671 definition. This is an arbitrary choice, since the
1672 other bits have no general meaning. */
1673 if (!symvis && !hvis
1674 && (definition || h->other == 0))
1675 h->other = sym.st_other;
1676 }
252b5132
RH
1677
1678 /* Set a flag in the hash table entry indicating the type of
1679 reference or definition we just found. Keep a count of
1680 the number of dynamic symbols we find. A dynamic symbol
1681 is one which is referenced or defined by both a regular
1682 object and a shared object. */
1683 old_flags = h->elf_link_hash_flags;
1684 dynsym = false;
1685 if (! dynamic)
1686 {
1687 if (! definition)
1688 {
1689 new_flag = ELF_LINK_HASH_REF_REGULAR;
1690 if (bind != STB_WEAK)
1691 new_flag |= ELF_LINK_HASH_REF_REGULAR_NONWEAK;
1692 }
1693 else
1694 new_flag = ELF_LINK_HASH_DEF_REGULAR;
1695 if (info->shared
1696 || (old_flags & (ELF_LINK_HASH_DEF_DYNAMIC
1697 | ELF_LINK_HASH_REF_DYNAMIC)) != 0)
1698 dynsym = true;
1699 }
1700 else
1701 {
1702 if (! definition)
1703 new_flag = ELF_LINK_HASH_REF_DYNAMIC;
1704 else
1705 new_flag = ELF_LINK_HASH_DEF_DYNAMIC;
1706 if ((old_flags & (ELF_LINK_HASH_DEF_REGULAR
1707 | ELF_LINK_HASH_REF_REGULAR)) != 0
1708 || (h->weakdef != NULL
1709 && ! new_weakdef
1710 && h->weakdef->dynindx != -1))
1711 dynsym = true;
1712 }
1713
1714 h->elf_link_hash_flags |= new_flag;
1715
1716 /* If this symbol has a version, and it is the default
1717 version, we create an indirect symbol from the default
1718 name to the fully decorated name. This will cause
1719 external references which do not specify a version to be
1720 bound to this version of the symbol. */
051b8577 1721 if (definition || h->root.type == bfd_link_hash_common)
252b5132
RH
1722 {
1723 char *p;
1724
1725 p = strchr (name, ELF_VER_CHR);
1726 if (p != NULL && p[1] == ELF_VER_CHR)
1727 {
1728 char *shortname;
1729 struct elf_link_hash_entry *hi;
1730 boolean override;
1731
1732 shortname = bfd_hash_allocate (&info->hash->table,
1733 p - name + 1);
1734 if (shortname == NULL)
1735 goto error_return;
1736 strncpy (shortname, name, p - name);
1737 shortname[p - name] = '\0';
1738
1739 /* We are going to create a new symbol. Merge it
1740 with any existing symbol with this name. For the
1741 purposes of the merge, act as though we were
1742 defining the symbol we just defined, although we
1743 actually going to define an indirect symbol. */
1744 type_change_ok = false;
1745 size_change_ok = false;
1746 if (! elf_merge_symbol (abfd, info, shortname, &sym, &sec,
1747 &value, &hi, &override,
456981d7
L
1748 &type_change_ok,
1749 &size_change_ok, dt_needed))
252b5132
RH
1750 goto error_return;
1751
1752 if (! override)
1753 {
1754 if (! (_bfd_generic_link_add_one_symbol
1755 (info, abfd, shortname, BSF_INDIRECT,
1756 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1757 collect, (struct bfd_link_hash_entry **) &hi)))
1758 goto error_return;
1759 }
1760 else
1761 {
1762 /* In this case the symbol named SHORTNAME is
1763 overriding the indirect symbol we want to
1764 add. We were planning on making SHORTNAME an
1765 indirect symbol referring to NAME. SHORTNAME
1766 is the name without a version. NAME is the
1767 fully versioned name, and it is the default
1768 version.
1769
1770 Overriding means that we already saw a
1771 definition for the symbol SHORTNAME in a
1772 regular object, and it is overriding the
1773 symbol defined in the dynamic object.
1774
1775 When this happens, we actually want to change
1776 NAME, the symbol we just added, to refer to
1777 SHORTNAME. This will cause references to
1778 NAME in the shared object to become
1779 references to SHORTNAME in the regular
1780 object. This is what we expect when we
1781 override a function in a shared object: that
1782 the references in the shared object will be
1783 mapped to the definition in the regular
1784 object. */
1785
1786 while (hi->root.type == bfd_link_hash_indirect
1787 || hi->root.type == bfd_link_hash_warning)
1788 hi = (struct elf_link_hash_entry *) hi->root.u.i.link;
1789
1790 h->root.type = bfd_link_hash_indirect;
1791 h->root.u.i.link = (struct bfd_link_hash_entry *) hi;
1792 if (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)
1793 {
1794 h->elf_link_hash_flags &=~ ELF_LINK_HASH_DEF_DYNAMIC;
1795 hi->elf_link_hash_flags |= ELF_LINK_HASH_REF_DYNAMIC;
1796 if (hi->elf_link_hash_flags
1797 & (ELF_LINK_HASH_REF_REGULAR
1798 | ELF_LINK_HASH_DEF_REGULAR))
1799 {
1800 if (! _bfd_elf_link_record_dynamic_symbol (info,
1801 hi))
1802 goto error_return;
1803 }
1804 }
1805
1806 /* Now set HI to H, so that the following code
1807 will set the other fields correctly. */
1808 hi = h;
1809 }
1810
1811 /* If there is a duplicate definition somewhere,
1812 then HI may not point to an indirect symbol. We
1813 will have reported an error to the user in that
1814 case. */
1815
1816 if (hi->root.type == bfd_link_hash_indirect)
1817 {
1818 struct elf_link_hash_entry *ht;
1819
1820 /* If the symbol became indirect, then we assume
1821 that we have not seen a definition before. */
1822 BFD_ASSERT ((hi->elf_link_hash_flags
1823 & (ELF_LINK_HASH_DEF_DYNAMIC
1824 | ELF_LINK_HASH_DEF_REGULAR))
1825 == 0);
1826
1827 ht = (struct elf_link_hash_entry *) hi->root.u.i.link;
c61b8717 1828 (*bed->elf_backend_copy_indirect_symbol) (ht, hi);
252b5132
RH
1829
1830 /* See if the new flags lead us to realize that
1831 the symbol must be dynamic. */
1832 if (! dynsym)
1833 {
1834 if (! dynamic)
1835 {
1836 if (info->shared
1837 || ((hi->elf_link_hash_flags
1838 & ELF_LINK_HASH_REF_DYNAMIC)
1839 != 0))
1840 dynsym = true;
1841 }
1842 else
1843 {
1844 if ((hi->elf_link_hash_flags
1845 & ELF_LINK_HASH_REF_REGULAR) != 0)
1846 dynsym = true;
1847 }
1848 }
1849 }
1850
1851 /* We also need to define an indirection from the
1852 nondefault version of the symbol. */
1853
1854 shortname = bfd_hash_allocate (&info->hash->table,
1855 strlen (name));
1856 if (shortname == NULL)
1857 goto error_return;
1858 strncpy (shortname, name, p - name);
1859 strcpy (shortname + (p - name), p + 1);
1860
1861 /* Once again, merge with any existing symbol. */
1862 type_change_ok = false;
1863 size_change_ok = false;
1864 if (! elf_merge_symbol (abfd, info, shortname, &sym, &sec,
1865 &value, &hi, &override,
456981d7
L
1866 &type_change_ok,
1867 &size_change_ok, dt_needed))
252b5132
RH
1868 goto error_return;
1869
1870 if (override)
1871 {
1872 /* Here SHORTNAME is a versioned name, so we
1873 don't expect to see the type of override we
1874 do in the case above. */
1875 (*_bfd_error_handler)
1876 (_("%s: warning: unexpected redefinition of `%s'"),
1877 bfd_get_filename (abfd), shortname);
1878 }
1879 else
1880 {
1881 if (! (_bfd_generic_link_add_one_symbol
1882 (info, abfd, shortname, BSF_INDIRECT,
1883 bfd_ind_section_ptr, (bfd_vma) 0, name, false,
1884 collect, (struct bfd_link_hash_entry **) &hi)))
1885 goto error_return;
1886
1887 /* If there is a duplicate definition somewhere,
1888 then HI may not point to an indirect symbol.
1889 We will have reported an error to the user in
1890 that case. */
1891
1892 if (hi->root.type == bfd_link_hash_indirect)
1893 {
1894 /* If the symbol became indirect, then we
1895 assume that we have not seen a definition
1896 before. */
1897 BFD_ASSERT ((hi->elf_link_hash_flags
1898 & (ELF_LINK_HASH_DEF_DYNAMIC
1899 | ELF_LINK_HASH_DEF_REGULAR))
1900 == 0);
1901
c61b8717 1902 (*bed->elf_backend_copy_indirect_symbol) (h, hi);
252b5132
RH
1903
1904 /* See if the new flags lead us to realize
1905 that the symbol must be dynamic. */
1906 if (! dynsym)
1907 {
1908 if (! dynamic)
1909 {
1910 if (info->shared
1911 || ((hi->elf_link_hash_flags
1912 & ELF_LINK_HASH_REF_DYNAMIC)
1913 != 0))
1914 dynsym = true;
1915 }
1916 else
1917 {
1918 if ((hi->elf_link_hash_flags
1919 & ELF_LINK_HASH_REF_REGULAR) != 0)
1920 dynsym = true;
1921 }
1922 }
1923 }
1924 }
1925 }
1926 }
1927
1928 if (dynsym && h->dynindx == -1)
1929 {
1930 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
1931 goto error_return;
1932 if (h->weakdef != NULL
1933 && ! new_weakdef
1934 && h->weakdef->dynindx == -1)
1935 {
1936 if (! _bfd_elf_link_record_dynamic_symbol (info,
1937 h->weakdef))
1938 goto error_return;
1939 }
1940 }
38048eb9 1941 else if (dynsym && h->dynindx != -1)
0444bdd4
L
1942 /* If the symbol already has a dynamic index, but
1943 visibility says it should not be visible, turn it into
1944 a local symbol. */
1945 switch (ELF_ST_VISIBILITY (h->other))
1946 {
1947 case STV_INTERNAL:
3e932841 1948 case STV_HIDDEN:
0444bdd4 1949 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
f41cbf03 1950 (*bed->elf_backend_hide_symbol) (info, h);
0444bdd4
L
1951 break;
1952 }
74816898
L
1953
1954 if (dt_needed && definition
1955 && (h->elf_link_hash_flags
1956 & ELF_LINK_HASH_REF_REGULAR) != 0)
1957 {
1958 bfd_size_type oldsize;
1959 bfd_size_type strindex;
1960
1961 /* The symbol from a DT_NEEDED object is referenced from
1962 the regular object to create a dynamic executable. We
3e932841 1963 have to make sure there is a DT_NEEDED entry for it. */
74816898
L
1964
1965 dt_needed = false;
1966 oldsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
1967 strindex = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
1968 elf_dt_soname (abfd),
1969 true, false);
1970 if (strindex == (bfd_size_type) -1)
1971 goto error_return;
1972
1973 if (oldsize
1974 == _bfd_stringtab_size (elf_hash_table (info)->dynstr))
1975 {
1976 asection *sdyn;
1977 Elf_External_Dyn *dyncon, *dynconend;
1978
1979 sdyn = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
1980 ".dynamic");
1981 BFD_ASSERT (sdyn != NULL);
1982
1983 dyncon = (Elf_External_Dyn *) sdyn->contents;
1984 dynconend = (Elf_External_Dyn *) (sdyn->contents +
1985 sdyn->_raw_size);
1986 for (; dyncon < dynconend; dyncon++)
1987 {
1988 Elf_Internal_Dyn dyn;
1989
1990 elf_swap_dyn_in (elf_hash_table (info)->dynobj,
1991 dyncon, &dyn);
1992 BFD_ASSERT (dyn.d_tag != DT_NEEDED ||
1993 dyn.d_un.d_val != strindex);
1994 }
1995 }
1996
1997 if (! elf_add_dynamic_entry (info, DT_NEEDED, strindex))
1998 goto error_return;
1999 }
252b5132
RH
2000 }
2001 }
2002
2003 /* Now set the weakdefs field correctly for all the weak defined
2004 symbols we found. The only way to do this is to search all the
2005 symbols. Since we only need the information for non functions in
2006 dynamic objects, that's the only time we actually put anything on
2007 the list WEAKS. We need this information so that if a regular
2008 object refers to a symbol defined weakly in a dynamic object, the
2009 real symbol in the dynamic object is also put in the dynamic
2010 symbols; we also must arrange for both symbols to point to the
2011 same memory location. We could handle the general case of symbol
2012 aliasing, but a general symbol alias can only be generated in
2013 assembler code, handling it correctly would be very time
2014 consuming, and other ELF linkers don't handle general aliasing
2015 either. */
2016 while (weaks != NULL)
2017 {
2018 struct elf_link_hash_entry *hlook;
2019 asection *slook;
2020 bfd_vma vlook;
2021 struct elf_link_hash_entry **hpp;
2022 struct elf_link_hash_entry **hppend;
2023
2024 hlook = weaks;
2025 weaks = hlook->weakdef;
2026 hlook->weakdef = NULL;
2027
2028 BFD_ASSERT (hlook->root.type == bfd_link_hash_defined
2029 || hlook->root.type == bfd_link_hash_defweak
2030 || hlook->root.type == bfd_link_hash_common
2031 || hlook->root.type == bfd_link_hash_indirect);
2032 slook = hlook->root.u.def.section;
2033 vlook = hlook->root.u.def.value;
2034
2035 hpp = elf_sym_hashes (abfd);
2036 hppend = hpp + extsymcount;
2037 for (; hpp < hppend; hpp++)
2038 {
2039 struct elf_link_hash_entry *h;
2040
2041 h = *hpp;
2042 if (h != NULL && h != hlook
2043 && h->root.type == bfd_link_hash_defined
2044 && h->root.u.def.section == slook
2045 && h->root.u.def.value == vlook)
2046 {
2047 hlook->weakdef = h;
2048
2049 /* If the weak definition is in the list of dynamic
2050 symbols, make sure the real definition is put there
2051 as well. */
2052 if (hlook->dynindx != -1
2053 && h->dynindx == -1)
2054 {
2055 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2056 goto error_return;
2057 }
2058
2059 /* If the real definition is in the list of dynamic
2060 symbols, make sure the weak definition is put there
2061 as well. If we don't do this, then the dynamic
2062 loader might not merge the entries for the real
2063 definition and the weak definition. */
2064 if (h->dynindx != -1
2065 && hlook->dynindx == -1)
2066 {
2067 if (! _bfd_elf_link_record_dynamic_symbol (info, hlook))
2068 goto error_return;
2069 }
2070
2071 break;
2072 }
2073 }
2074 }
2075
2076 if (buf != NULL)
2077 {
2078 free (buf);
2079 buf = NULL;
2080 }
2081
2082 if (extversym != NULL)
2083 {
2084 free (extversym);
2085 extversym = NULL;
2086 }
2087
2088 /* If this object is the same format as the output object, and it is
2089 not a shared library, then let the backend look through the
2090 relocs.
2091
2092 This is required to build global offset table entries and to
2093 arrange for dynamic relocs. It is not required for the
2094 particular common case of linking non PIC code, even when linking
2095 against shared libraries, but unfortunately there is no way of
2096 knowing whether an object file has been compiled PIC or not.
2097 Looking through the relocs is not particularly time consuming.
2098 The problem is that we must either (1) keep the relocs in memory,
2099 which causes the linker to require additional runtime memory or
2100 (2) read the relocs twice from the input file, which wastes time.
2101 This would be a good case for using mmap.
2102
2103 I have no idea how to handle linking PIC code into a file of a
2104 different format. It probably can't be done. */
2105 check_relocs = get_elf_backend_data (abfd)->check_relocs;
2106 if (! dynamic
2107 && abfd->xvec == info->hash->creator
2108 && check_relocs != NULL)
2109 {
2110 asection *o;
2111
2112 for (o = abfd->sections; o != NULL; o = o->next)
2113 {
2114 Elf_Internal_Rela *internal_relocs;
2115 boolean ok;
2116
2117 if ((o->flags & SEC_RELOC) == 0
2118 || o->reloc_count == 0
2119 || ((info->strip == strip_all || info->strip == strip_debugger)
2120 && (o->flags & SEC_DEBUGGING) != 0)
2121 || bfd_is_abs_section (o->output_section))
2122 continue;
2123
2124 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
2125 (abfd, o, (PTR) NULL,
2126 (Elf_Internal_Rela *) NULL,
2127 info->keep_memory));
2128 if (internal_relocs == NULL)
2129 goto error_return;
2130
2131 ok = (*check_relocs) (abfd, info, o, internal_relocs);
2132
2133 if (! info->keep_memory)
2134 free (internal_relocs);
2135
2136 if (! ok)
2137 goto error_return;
2138 }
2139 }
2140
2141 /* If this is a non-traditional, non-relocateable link, try to
2142 optimize the handling of the .stab/.stabstr sections. */
2143 if (! dynamic
2144 && ! info->relocateable
2145 && ! info->traditional_format
2146 && info->hash->creator->flavour == bfd_target_elf_flavour
2147 && (info->strip != strip_all && info->strip != strip_debugger))
2148 {
2149 asection *stab, *stabstr;
2150
2151 stab = bfd_get_section_by_name (abfd, ".stab");
2152 if (stab != NULL)
2153 {
2154 stabstr = bfd_get_section_by_name (abfd, ".stabstr");
2155
2156 if (stabstr != NULL)
2157 {
2158 struct bfd_elf_section_data *secdata;
2159
2160 secdata = elf_section_data (stab);
2161 if (! _bfd_link_section_stabs (abfd,
2162 &elf_hash_table (info)->stab_info,
2163 stab, stabstr,
2164 &secdata->stab_info))
2165 goto error_return;
2166 }
2167 }
2168 }
2169
f5fa8ca2
JJ
2170 if (! info->relocateable && ! dynamic)
2171 {
2172 asection *s;
2173
2174 for (s = abfd->sections; s != NULL; s = s->next)
2175 if ((s->flags & SEC_MERGE)
2176 && ! _bfd_merge_section (abfd,
2177 &elf_hash_table (info)->merge_info,
2178 s, &elf_section_data (s)->merge_info))
2179 goto error_return;
2180 }
2181
252b5132
RH
2182 return true;
2183
2184 error_return:
2185 if (buf != NULL)
2186 free (buf);
2187 if (dynbuf != NULL)
2188 free (dynbuf);
2189 if (dynver != NULL)
2190 free (dynver);
2191 if (extversym != NULL)
2192 free (extversym);
2193 return false;
2194}
2195
2196/* Create some sections which will be filled in with dynamic linking
2197 information. ABFD is an input file which requires dynamic sections
2198 to be created. The dynamic sections take up virtual memory space
2199 when the final executable is run, so we need to create them before
2200 addresses are assigned to the output sections. We work out the
2201 actual contents and size of these sections later. */
2202
2203boolean
2204elf_link_create_dynamic_sections (abfd, info)
2205 bfd *abfd;
2206 struct bfd_link_info *info;
2207{
2208 flagword flags;
2209 register asection *s;
2210 struct elf_link_hash_entry *h;
2211 struct elf_backend_data *bed;
2212
2213 if (elf_hash_table (info)->dynamic_sections_created)
2214 return true;
2215
2216 /* Make sure that all dynamic sections use the same input BFD. */
2217 if (elf_hash_table (info)->dynobj == NULL)
2218 elf_hash_table (info)->dynobj = abfd;
2219 else
2220 abfd = elf_hash_table (info)->dynobj;
2221
2222 /* Note that we set the SEC_IN_MEMORY flag for all of these
2223 sections. */
2224 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
2225 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2226
2227 /* A dynamically linked executable has a .interp section, but a
2228 shared library does not. */
2229 if (! info->shared)
2230 {
2231 s = bfd_make_section (abfd, ".interp");
2232 if (s == NULL
2233 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2234 return false;
2235 }
2236
2237 /* Create sections to hold version informations. These are removed
2238 if they are not needed. */
2239 s = bfd_make_section (abfd, ".gnu.version_d");
2240 if (s == NULL
2241 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2242 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2243 return false;
2244
2245 s = bfd_make_section (abfd, ".gnu.version");
2246 if (s == NULL
2247 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2248 || ! bfd_set_section_alignment (abfd, s, 1))
2249 return false;
2250
2251 s = bfd_make_section (abfd, ".gnu.version_r");
2252 if (s == NULL
2253 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2254 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2255 return false;
2256
2257 s = bfd_make_section (abfd, ".dynsym");
2258 if (s == NULL
2259 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2260 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2261 return false;
2262
2263 s = bfd_make_section (abfd, ".dynstr");
2264 if (s == NULL
2265 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY))
2266 return false;
2267
2268 /* Create a strtab to hold the dynamic symbol names. */
2269 if (elf_hash_table (info)->dynstr == NULL)
2270 {
2271 elf_hash_table (info)->dynstr = elf_stringtab_init ();
2272 if (elf_hash_table (info)->dynstr == NULL)
2273 return false;
2274 }
2275
2276 s = bfd_make_section (abfd, ".dynamic");
2277 if (s == NULL
2278 || ! bfd_set_section_flags (abfd, s, flags)
2279 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2280 return false;
2281
2282 /* The special symbol _DYNAMIC is always set to the start of the
2283 .dynamic section. This call occurs before we have processed the
2284 symbols for any dynamic object, so we don't have to worry about
2285 overriding a dynamic definition. We could set _DYNAMIC in a
2286 linker script, but we only want to define it if we are, in fact,
2287 creating a .dynamic section. We don't want to define it if there
2288 is no .dynamic section, since on some ELF platforms the start up
2289 code examines it to decide how to initialize the process. */
2290 h = NULL;
2291 if (! (_bfd_generic_link_add_one_symbol
2292 (info, abfd, "_DYNAMIC", BSF_GLOBAL, s, (bfd_vma) 0,
2293 (const char *) NULL, false, get_elf_backend_data (abfd)->collect,
2294 (struct bfd_link_hash_entry **) &h)))
2295 return false;
2296 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
2297 h->type = STT_OBJECT;
2298
2299 if (info->shared
2300 && ! _bfd_elf_link_record_dynamic_symbol (info, h))
2301 return false;
2302
c7ac6ff8
MM
2303 bed = get_elf_backend_data (abfd);
2304
252b5132
RH
2305 s = bfd_make_section (abfd, ".hash");
2306 if (s == NULL
2307 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2308 || ! bfd_set_section_alignment (abfd, s, LOG_FILE_ALIGN))
2309 return false;
c7ac6ff8 2310 elf_section_data (s)->this_hdr.sh_entsize = bed->s->sizeof_hash_entry;
252b5132
RH
2311
2312 /* Let the backend create the rest of the sections. This lets the
2313 backend set the right flags. The backend will normally create
2314 the .got and .plt sections. */
252b5132
RH
2315 if (! (*bed->elf_backend_create_dynamic_sections) (abfd, info))
2316 return false;
2317
2318 elf_hash_table (info)->dynamic_sections_created = true;
2319
2320 return true;
2321}
2322
2323/* Add an entry to the .dynamic table. */
2324
2325boolean
2326elf_add_dynamic_entry (info, tag, val)
2327 struct bfd_link_info *info;
2328 bfd_vma tag;
2329 bfd_vma val;
2330{
2331 Elf_Internal_Dyn dyn;
2332 bfd *dynobj;
2333 asection *s;
2334 size_t newsize;
2335 bfd_byte *newcontents;
2336
2337 dynobj = elf_hash_table (info)->dynobj;
2338
2339 s = bfd_get_section_by_name (dynobj, ".dynamic");
2340 BFD_ASSERT (s != NULL);
2341
2342 newsize = s->_raw_size + sizeof (Elf_External_Dyn);
2343 newcontents = (bfd_byte *) bfd_realloc (s->contents, newsize);
2344 if (newcontents == NULL)
2345 return false;
2346
2347 dyn.d_tag = tag;
2348 dyn.d_un.d_val = val;
2349 elf_swap_dyn_out (dynobj, &dyn,
2350 (Elf_External_Dyn *) (newcontents + s->_raw_size));
2351
2352 s->_raw_size = newsize;
2353 s->contents = newcontents;
2354
2355 return true;
2356}
30b30c21
RH
2357
2358/* Record a new local dynamic symbol. */
2359
2360boolean
2361elf_link_record_local_dynamic_symbol (info, input_bfd, input_indx)
2362 struct bfd_link_info *info;
2363 bfd *input_bfd;
2364 long input_indx;
2365{
2366 struct elf_link_local_dynamic_entry *entry;
2367 struct elf_link_hash_table *eht;
2368 struct bfd_strtab_hash *dynstr;
2369 Elf_External_Sym esym;
2370 unsigned long dynstr_index;
2371 char *name;
30b30c21
RH
2372
2373 /* See if the entry exists already. */
2374 for (entry = elf_hash_table (info)->dynlocal; entry ; entry = entry->next)
2375 if (entry->input_bfd == input_bfd && entry->input_indx == input_indx)
2376 return true;
2377
2378 entry = (struct elf_link_local_dynamic_entry *)
2379 bfd_alloc (input_bfd, sizeof (*entry));
2380 if (entry == NULL)
2381 return false;
2382
2383 /* Go find the symbol, so that we can find it's name. */
2384 if (bfd_seek (input_bfd,
2385 (elf_tdata (input_bfd)->symtab_hdr.sh_offset
2386 + input_indx * sizeof (Elf_External_Sym)),
2387 SEEK_SET) != 0
2388 || (bfd_read (&esym, sizeof (Elf_External_Sym), 1, input_bfd)
2389 != sizeof (Elf_External_Sym)))
2390 return false;
2391 elf_swap_symbol_in (input_bfd, &esym, &entry->isym);
2392
2393 name = (bfd_elf_string_from_elf_section
2394 (input_bfd, elf_tdata (input_bfd)->symtab_hdr.sh_link,
2395 entry->isym.st_name));
2396
2397 dynstr = elf_hash_table (info)->dynstr;
2398 if (dynstr == NULL)
2399 {
2400 /* Create a strtab to hold the dynamic symbol names. */
2401 elf_hash_table (info)->dynstr = dynstr = _bfd_elf_stringtab_init ();
2402 if (dynstr == NULL)
2403 return false;
2404 }
2405
2406 dynstr_index = _bfd_stringtab_add (dynstr, name, true, false);
2407 if (dynstr_index == (unsigned long) -1)
2408 return false;
2409 entry->isym.st_name = dynstr_index;
2410
2411 eht = elf_hash_table (info);
2412
2413 entry->next = eht->dynlocal;
2414 eht->dynlocal = entry;
2415 entry->input_bfd = input_bfd;
2416 entry->input_indx = input_indx;
2417 eht->dynsymcount++;
2418
587ff49e
RH
2419 /* Whatever binding the symbol had before, it's now local. */
2420 entry->isym.st_info
2421 = ELF_ST_INFO (STB_LOCAL, ELF_ST_TYPE (entry->isym.st_info));
2422
30b30c21
RH
2423 /* The dynindx will be set at the end of size_dynamic_sections. */
2424
2425 return true;
2426}
252b5132 2427\f
6b5bd373
MM
2428/* Read and swap the relocs from the section indicated by SHDR. This
2429 may be either a REL or a RELA section. The relocations are
2430 translated into RELA relocations and stored in INTERNAL_RELOCS,
2431 which should have already been allocated to contain enough space.
2432 The EXTERNAL_RELOCS are a buffer where the external form of the
2433 relocations should be stored.
2434
2435 Returns false if something goes wrong. */
2436
2437static boolean
2438elf_link_read_relocs_from_section (abfd, shdr, external_relocs,
2439 internal_relocs)
2440 bfd *abfd;
2441 Elf_Internal_Shdr *shdr;
2442 PTR external_relocs;
2443 Elf_Internal_Rela *internal_relocs;
2444{
c7ac6ff8
MM
2445 struct elf_backend_data *bed;
2446
6b5bd373
MM
2447 /* If there aren't any relocations, that's OK. */
2448 if (!shdr)
2449 return true;
2450
2451 /* Position ourselves at the start of the section. */
2452 if (bfd_seek (abfd, shdr->sh_offset, SEEK_SET) != 0)
2453 return false;
2454
2455 /* Read the relocations. */
2456 if (bfd_read (external_relocs, 1, shdr->sh_size, abfd)
2457 != shdr->sh_size)
2458 return false;
2459
c7ac6ff8
MM
2460 bed = get_elf_backend_data (abfd);
2461
6b5bd373
MM
2462 /* Convert the external relocations to the internal format. */
2463 if (shdr->sh_entsize == sizeof (Elf_External_Rel))
2464 {
2465 Elf_External_Rel *erel;
2466 Elf_External_Rel *erelend;
2467 Elf_Internal_Rela *irela;
c7ac6ff8 2468 Elf_Internal_Rel *irel;
6b5bd373
MM
2469
2470 erel = (Elf_External_Rel *) external_relocs;
2471 erelend = erel + shdr->sh_size / shdr->sh_entsize;
2472 irela = internal_relocs;
c7ac6ff8
MM
2473 irel = bfd_alloc (abfd, (bed->s->int_rels_per_ext_rel
2474 * sizeof (Elf_Internal_Rel)));
2475 for (; erel < erelend; erel++, irela += bed->s->int_rels_per_ext_rel)
6b5bd373 2476 {
65388f2d 2477 unsigned char i;
c7ac6ff8
MM
2478
2479 if (bed->s->swap_reloc_in)
2480 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, irel);
2481 else
2482 elf_swap_reloc_in (abfd, erel, irel);
6b5bd373 2483
c7ac6ff8
MM
2484 for (i = 0; i < bed->s->int_rels_per_ext_rel; ++i)
2485 {
2486 irela[i].r_offset = irel[i].r_offset;
2487 irela[i].r_info = irel[i].r_info;
2488 irela[i].r_addend = 0;
2489 }
6b5bd373
MM
2490 }
2491 }
2492 else
2493 {
2494 Elf_External_Rela *erela;
2495 Elf_External_Rela *erelaend;
2496 Elf_Internal_Rela *irela;
2497
2498 BFD_ASSERT (shdr->sh_entsize == sizeof (Elf_External_Rela));
2499
2500 erela = (Elf_External_Rela *) external_relocs;
2501 erelaend = erela + shdr->sh_size / shdr->sh_entsize;
2502 irela = internal_relocs;
c7ac6ff8
MM
2503 for (; erela < erelaend; erela++, irela += bed->s->int_rels_per_ext_rel)
2504 {
2505 if (bed->s->swap_reloca_in)
2506 (*bed->s->swap_reloca_in) (abfd, (bfd_byte *) erela, irela);
2507 else
2508 elf_swap_reloca_in (abfd, erela, irela);
2509 }
6b5bd373
MM
2510 }
2511
2512 return true;
2513}
2514
23bc299b
MM
2515/* Read and swap the relocs for a section O. They may have been
2516 cached. If the EXTERNAL_RELOCS and INTERNAL_RELOCS arguments are
2517 not NULL, they are used as buffers to read into. They are known to
2518 be large enough. If the INTERNAL_RELOCS relocs argument is NULL,
2519 the return value is allocated using either malloc or bfd_alloc,
2520 according to the KEEP_MEMORY argument. If O has two relocation
2521 sections (both REL and RELA relocations), then the REL_HDR
2522 relocations will appear first in INTERNAL_RELOCS, followed by the
2523 REL_HDR2 relocations. */
252b5132
RH
2524
2525Elf_Internal_Rela *
2526NAME(_bfd_elf,link_read_relocs) (abfd, o, external_relocs, internal_relocs,
2527 keep_memory)
2528 bfd *abfd;
2529 asection *o;
2530 PTR external_relocs;
2531 Elf_Internal_Rela *internal_relocs;
2532 boolean keep_memory;
2533{
2534 Elf_Internal_Shdr *rel_hdr;
2535 PTR alloc1 = NULL;
2536 Elf_Internal_Rela *alloc2 = NULL;
c7ac6ff8 2537 struct elf_backend_data *bed = get_elf_backend_data (abfd);
252b5132
RH
2538
2539 if (elf_section_data (o)->relocs != NULL)
2540 return elf_section_data (o)->relocs;
2541
2542 if (o->reloc_count == 0)
2543 return NULL;
2544
2545 rel_hdr = &elf_section_data (o)->rel_hdr;
2546
2547 if (internal_relocs == NULL)
2548 {
2549 size_t size;
2550
3e932841 2551 size = (o->reloc_count * bed->s->int_rels_per_ext_rel
c7ac6ff8 2552 * sizeof (Elf_Internal_Rela));
252b5132
RH
2553 if (keep_memory)
2554 internal_relocs = (Elf_Internal_Rela *) bfd_alloc (abfd, size);
2555 else
2556 internal_relocs = alloc2 = (Elf_Internal_Rela *) bfd_malloc (size);
2557 if (internal_relocs == NULL)
2558 goto error_return;
2559 }
2560
2561 if (external_relocs == NULL)
2562 {
6b5bd373
MM
2563 size_t size = (size_t) rel_hdr->sh_size;
2564
2565 if (elf_section_data (o)->rel_hdr2)
2566 size += (size_t) elf_section_data (o)->rel_hdr2->sh_size;
2567 alloc1 = (PTR) bfd_malloc (size);
252b5132
RH
2568 if (alloc1 == NULL)
2569 goto error_return;
2570 external_relocs = alloc1;
2571 }
2572
6b5bd373
MM
2573 if (!elf_link_read_relocs_from_section (abfd, rel_hdr,
2574 external_relocs,
2575 internal_relocs))
2576 goto error_return;
3e932841
KH
2577 if (!elf_link_read_relocs_from_section
2578 (abfd,
6b5bd373 2579 elf_section_data (o)->rel_hdr2,
2f5116e2 2580 ((bfd_byte *) external_relocs) + rel_hdr->sh_size,
c7ac6ff8
MM
2581 internal_relocs + (rel_hdr->sh_size / rel_hdr->sh_entsize
2582 * bed->s->int_rels_per_ext_rel)))
252b5132 2583 goto error_return;
252b5132
RH
2584
2585 /* Cache the results for next time, if we can. */
2586 if (keep_memory)
2587 elf_section_data (o)->relocs = internal_relocs;
2588
2589 if (alloc1 != NULL)
2590 free (alloc1);
2591
2592 /* Don't free alloc2, since if it was allocated we are passing it
2593 back (under the name of internal_relocs). */
2594
2595 return internal_relocs;
2596
2597 error_return:
2598 if (alloc1 != NULL)
2599 free (alloc1);
2600 if (alloc2 != NULL)
2601 free (alloc2);
2602 return NULL;
2603}
2604\f
252b5132
RH
2605/* Record an assignment to a symbol made by a linker script. We need
2606 this in case some dynamic object refers to this symbol. */
2607
2608/*ARGSUSED*/
2609boolean
2610NAME(bfd_elf,record_link_assignment) (output_bfd, info, name, provide)
7442e600 2611 bfd *output_bfd ATTRIBUTE_UNUSED;
252b5132
RH
2612 struct bfd_link_info *info;
2613 const char *name;
2614 boolean provide;
2615{
2616 struct elf_link_hash_entry *h;
2617
2618 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2619 return true;
2620
2621 h = elf_link_hash_lookup (elf_hash_table (info), name, true, true, false);
2622 if (h == NULL)
2623 return false;
2624
2625 if (h->root.type == bfd_link_hash_new)
2626 h->elf_link_hash_flags &=~ ELF_LINK_NON_ELF;
2627
2628 /* If this symbol is being provided by the linker script, and it is
2629 currently defined by a dynamic object, but not by a regular
2630 object, then mark it as undefined so that the generic linker will
2631 force the correct value. */
2632 if (provide
2633 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2634 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2635 h->root.type = bfd_link_hash_undefined;
2636
2637 /* If this symbol is not being provided by the linker script, and it is
2638 currently defined by a dynamic object, but not by a regular object,
2639 then clear out any version information because the symbol will not be
2640 associated with the dynamic object any more. */
2641 if (!provide
2642 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2643 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2644 h->verinfo.verdef = NULL;
2645
2646 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
994819d2
NC
2647
2648 /* When possible, keep the original type of the symbol */
2649 if (h->type == STT_NOTYPE)
2650 h->type = STT_OBJECT;
252b5132
RH
2651
2652 if (((h->elf_link_hash_flags & (ELF_LINK_HASH_DEF_DYNAMIC
2653 | ELF_LINK_HASH_REF_DYNAMIC)) != 0
2654 || info->shared)
2655 && h->dynindx == -1)
2656 {
2657 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
2658 return false;
2659
2660 /* If this is a weak defined symbol, and we know a corresponding
2661 real symbol from the same dynamic object, make sure the real
2662 symbol is also made into a dynamic symbol. */
2663 if (h->weakdef != NULL
2664 && h->weakdef->dynindx == -1)
2665 {
2666 if (! _bfd_elf_link_record_dynamic_symbol (info, h->weakdef))
2667 return false;
2668 }
2669 }
2670
2671 return true;
2672}
2673\f
2674/* This structure is used to pass information to
2675 elf_link_assign_sym_version. */
2676
2677struct elf_assign_sym_version_info
2678{
2679 /* Output BFD. */
2680 bfd *output_bfd;
2681 /* General link information. */
2682 struct bfd_link_info *info;
2683 /* Version tree. */
2684 struct bfd_elf_version_tree *verdefs;
2685 /* Whether we are exporting all dynamic symbols. */
2686 boolean export_dynamic;
252b5132
RH
2687 /* Whether we had a failure. */
2688 boolean failed;
2689};
2690
2691/* This structure is used to pass information to
2692 elf_link_find_version_dependencies. */
2693
2694struct elf_find_verdep_info
2695{
2696 /* Output BFD. */
2697 bfd *output_bfd;
2698 /* General link information. */
2699 struct bfd_link_info *info;
2700 /* The number of dependencies. */
2701 unsigned int vers;
2702 /* Whether we had a failure. */
2703 boolean failed;
2704};
2705
2706/* Array used to determine the number of hash table buckets to use
2707 based on the number of symbols there are. If there are fewer than
2708 3 symbols we use 1 bucket, fewer than 17 symbols we use 3 buckets,
2709 fewer than 37 we use 17 buckets, and so forth. We never use more
2710 than 32771 buckets. */
2711
2712static const size_t elf_buckets[] =
2713{
2714 1, 3, 17, 37, 67, 97, 131, 197, 263, 521, 1031, 2053, 4099, 8209,
2715 16411, 32771, 0
2716};
2717
2718/* Compute bucket count for hashing table. We do not use a static set
2719 of possible tables sizes anymore. Instead we determine for all
2720 possible reasonable sizes of the table the outcome (i.e., the
2721 number of collisions etc) and choose the best solution. The
2722 weighting functions are not too simple to allow the table to grow
2723 without bounds. Instead one of the weighting factors is the size.
2724 Therefore the result is always a good payoff between few collisions
2725 (= short chain lengths) and table size. */
2726static size_t
2727compute_bucket_count (info)
2728 struct bfd_link_info *info;
2729{
2730 size_t dynsymcount = elf_hash_table (info)->dynsymcount;
7442e600 2731 size_t best_size = 0;
252b5132
RH
2732 unsigned long int *hashcodes;
2733 unsigned long int *hashcodesp;
2734 unsigned long int i;
2735
2736 /* Compute the hash values for all exported symbols. At the same
2737 time store the values in an array so that we could use them for
2738 optimizations. */
2739 hashcodes = (unsigned long int *) bfd_malloc (dynsymcount
2740 * sizeof (unsigned long int));
2741 if (hashcodes == NULL)
2742 return 0;
2743 hashcodesp = hashcodes;
2744
2745 /* Put all hash values in HASHCODES. */
2746 elf_link_hash_traverse (elf_hash_table (info),
2747 elf_collect_hash_codes, &hashcodesp);
2748
2749/* We have a problem here. The following code to optimize the table
2750 size requires an integer type with more the 32 bits. If
2751 BFD_HOST_U_64_BIT is set we know about such a type. */
2752#ifdef BFD_HOST_U_64_BIT
2753 if (info->optimize == true)
2754 {
2755 unsigned long int nsyms = hashcodesp - hashcodes;
2756 size_t minsize;
2757 size_t maxsize;
2758 BFD_HOST_U_64_BIT best_chlen = ~((BFD_HOST_U_64_BIT) 0);
2759 unsigned long int *counts ;
2760
2761 /* Possible optimization parameters: if we have NSYMS symbols we say
2762 that the hashing table must at least have NSYMS/4 and at most
2763 2*NSYMS buckets. */
2764 minsize = nsyms / 4;
2765 if (minsize == 0)
2766 minsize = 1;
2767 best_size = maxsize = nsyms * 2;
2768
2769 /* Create array where we count the collisions in. We must use bfd_malloc
2770 since the size could be large. */
2771 counts = (unsigned long int *) bfd_malloc (maxsize
2772 * sizeof (unsigned long int));
2773 if (counts == NULL)
2774 {
2775 free (hashcodes);
2776 return 0;
2777 }
2778
2779 /* Compute the "optimal" size for the hash table. The criteria is a
2780 minimal chain length. The minor criteria is (of course) the size
2781 of the table. */
2782 for (i = minsize; i < maxsize; ++i)
2783 {
2784 /* Walk through the array of hashcodes and count the collisions. */
2785 BFD_HOST_U_64_BIT max;
2786 unsigned long int j;
2787 unsigned long int fact;
2788
2789 memset (counts, '\0', i * sizeof (unsigned long int));
2790
2791 /* Determine how often each hash bucket is used. */
2792 for (j = 0; j < nsyms; ++j)
2793 ++counts[hashcodes[j] % i];
2794
2795 /* For the weight function we need some information about the
2796 pagesize on the target. This is information need not be 100%
2797 accurate. Since this information is not available (so far) we
2798 define it here to a reasonable default value. If it is crucial
2799 to have a better value some day simply define this value. */
2800# ifndef BFD_TARGET_PAGESIZE
2801# define BFD_TARGET_PAGESIZE (4096)
2802# endif
2803
2804 /* We in any case need 2 + NSYMS entries for the size values and
2805 the chains. */
2806 max = (2 + nsyms) * (ARCH_SIZE / 8);
2807
2808# if 1
2809 /* Variant 1: optimize for short chains. We add the squares
2810 of all the chain lengths (which favous many small chain
2811 over a few long chains). */
2812 for (j = 0; j < i; ++j)
2813 max += counts[j] * counts[j];
2814
2815 /* This adds penalties for the overall size of the table. */
2816 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2817 max *= fact * fact;
2818# else
2819 /* Variant 2: Optimize a lot more for small table. Here we
2820 also add squares of the size but we also add penalties for
2821 empty slots (the +1 term). */
2822 for (j = 0; j < i; ++j)
2823 max += (1 + counts[j]) * (1 + counts[j]);
2824
2825 /* The overall size of the table is considered, but not as
2826 strong as in variant 1, where it is squared. */
2827 fact = i / (BFD_TARGET_PAGESIZE / (ARCH_SIZE / 8)) + 1;
2828 max *= fact;
2829# endif
2830
2831 /* Compare with current best results. */
2832 if (max < best_chlen)
2833 {
2834 best_chlen = max;
2835 best_size = i;
2836 }
2837 }
2838
2839 free (counts);
2840 }
2841 else
2842#endif /* defined (BFD_HOST_U_64_BIT) */
2843 {
2844 /* This is the fallback solution if no 64bit type is available or if we
2845 are not supposed to spend much time on optimizations. We select the
2846 bucket count using a fixed set of numbers. */
2847 for (i = 0; elf_buckets[i] != 0; i++)
2848 {
2849 best_size = elf_buckets[i];
2850 if (dynsymcount < elf_buckets[i + 1])
2851 break;
2852 }
2853 }
2854
2855 /* Free the arrays we needed. */
2856 free (hashcodes);
2857
2858 return best_size;
2859}
2860
2861/* Set up the sizes and contents of the ELF dynamic sections. This is
2862 called by the ELF linker emulation before_allocation routine. We
2863 must set the sizes of the sections before the linker sets the
2864 addresses of the various sections. */
2865
2866boolean
2867NAME(bfd_elf,size_dynamic_sections) (output_bfd, soname, rpath,
2868 export_dynamic, filter_shlib,
2869 auxiliary_filters, info, sinterpptr,
2870 verdefs)
2871 bfd *output_bfd;
2872 const char *soname;
2873 const char *rpath;
2874 boolean export_dynamic;
2875 const char *filter_shlib;
2876 const char * const *auxiliary_filters;
2877 struct bfd_link_info *info;
2878 asection **sinterpptr;
2879 struct bfd_elf_version_tree *verdefs;
2880{
2881 bfd_size_type soname_indx;
2882 bfd *dynobj;
2883 struct elf_backend_data *bed;
252b5132
RH
2884 struct elf_assign_sym_version_info asvinfo;
2885
2886 *sinterpptr = NULL;
2887
2888 soname_indx = (bfd_size_type) -1;
2889
2890 if (info->hash->creator->flavour != bfd_target_elf_flavour)
2891 return true;
2892
2893 /* The backend may have to create some sections regardless of whether
2894 we're dynamic or not. */
2895 bed = get_elf_backend_data (output_bfd);
2896 if (bed->elf_backend_always_size_sections
2897 && ! (*bed->elf_backend_always_size_sections) (output_bfd, info))
2898 return false;
2899
2900 dynobj = elf_hash_table (info)->dynobj;
2901
2902 /* If there were no dynamic objects in the link, there is nothing to
2903 do here. */
2904 if (dynobj == NULL)
2905 return true;
2906
252b5132
RH
2907 if (elf_hash_table (info)->dynamic_sections_created)
2908 {
2909 struct elf_info_failed eif;
2910 struct elf_link_hash_entry *h;
fc8c40a0 2911 asection *dynstr;
252b5132
RH
2912
2913 *sinterpptr = bfd_get_section_by_name (dynobj, ".interp");
2914 BFD_ASSERT (*sinterpptr != NULL || info->shared);
2915
2916 if (soname != NULL)
2917 {
2918 soname_indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2919 soname, true, true);
2920 if (soname_indx == (bfd_size_type) -1
2921 || ! elf_add_dynamic_entry (info, DT_SONAME, soname_indx))
2922 return false;
2923 }
2924
2925 if (info->symbolic)
2926 {
2927 if (! elf_add_dynamic_entry (info, DT_SYMBOLIC, 0))
2928 return false;
d6cf2879 2929 info->flags |= DF_SYMBOLIC;
252b5132
RH
2930 }
2931
2932 if (rpath != NULL)
2933 {
2934 bfd_size_type indx;
2935
2936 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr, rpath,
2937 true, true);
2938 if (indx == (bfd_size_type) -1
d6cf2879 2939 || ! elf_add_dynamic_entry (info, DT_RPATH, indx)
c25373b7
L
2940 || (info->new_dtags
2941 && ! elf_add_dynamic_entry (info, DT_RUNPATH, indx)))
252b5132
RH
2942 return false;
2943 }
2944
2945 if (filter_shlib != NULL)
2946 {
2947 bfd_size_type indx;
2948
2949 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2950 filter_shlib, true, true);
2951 if (indx == (bfd_size_type) -1
2952 || ! elf_add_dynamic_entry (info, DT_FILTER, indx))
2953 return false;
2954 }
2955
2956 if (auxiliary_filters != NULL)
2957 {
2958 const char * const *p;
2959
2960 for (p = auxiliary_filters; *p != NULL; p++)
2961 {
2962 bfd_size_type indx;
2963
2964 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
2965 *p, true, true);
2966 if (indx == (bfd_size_type) -1
2967 || ! elf_add_dynamic_entry (info, DT_AUXILIARY, indx))
2968 return false;
2969 }
2970 }
2971
391a809a
AM
2972 eif.info = info;
2973 eif.failed = false;
2974
ea44b734
RH
2975 /* If we are supposed to export all symbols into the dynamic symbol
2976 table (this is not the normal case), then do so. */
2977 if (export_dynamic)
2978 {
ea44b734
RH
2979 elf_link_hash_traverse (elf_hash_table (info), elf_export_symbol,
2980 (PTR) &eif);
2981 if (eif.failed)
2982 return false;
2983 }
2984
252b5132
RH
2985 /* Attach all the symbols to their version information. */
2986 asvinfo.output_bfd = output_bfd;
2987 asvinfo.info = info;
2988 asvinfo.verdefs = verdefs;
2989 asvinfo.export_dynamic = export_dynamic;
252b5132
RH
2990 asvinfo.failed = false;
2991
2992 elf_link_hash_traverse (elf_hash_table (info),
2993 elf_link_assign_sym_version,
2994 (PTR) &asvinfo);
2995 if (asvinfo.failed)
2996 return false;
2997
2998 /* Find all symbols which were defined in a dynamic object and make
2999 the backend pick a reasonable value for them. */
252b5132
RH
3000 elf_link_hash_traverse (elf_hash_table (info),
3001 elf_adjust_dynamic_symbol,
3002 (PTR) &eif);
3003 if (eif.failed)
3004 return false;
3005
3006 /* Add some entries to the .dynamic section. We fill in some of the
3007 values later, in elf_bfd_final_link, but we must add the entries
3008 now so that we know the final size of the .dynamic section. */
f0c2e336
MM
3009
3010 /* If there are initialization and/or finalization functions to
3011 call then add the corresponding DT_INIT/DT_FINI entries. */
3012 h = (info->init_function
3e932841 3013 ? elf_link_hash_lookup (elf_hash_table (info),
f0c2e336
MM
3014 info->init_function, false,
3015 false, false)
3016 : NULL);
252b5132
RH
3017 if (h != NULL
3018 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3019 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3020 {
3021 if (! elf_add_dynamic_entry (info, DT_INIT, 0))
3022 return false;
3023 }
f0c2e336 3024 h = (info->fini_function
3e932841 3025 ? elf_link_hash_lookup (elf_hash_table (info),
f0c2e336
MM
3026 info->fini_function, false,
3027 false, false)
3028 : NULL);
252b5132
RH
3029 if (h != NULL
3030 && (h->elf_link_hash_flags & (ELF_LINK_HASH_REF_REGULAR
3031 | ELF_LINK_HASH_DEF_REGULAR)) != 0)
3032 {
3033 if (! elf_add_dynamic_entry (info, DT_FINI, 0))
3034 return false;
3035 }
f0c2e336 3036
fc8c40a0
AM
3037 dynstr = bfd_get_section_by_name (dynobj, ".dynstr");
3038 /* If .dynstr is excluded from the link, we don't want any of
3039 these tags. Strictly, we should be checking each section
3040 individually; This quick check covers for the case where
3041 someone does a /DISCARD/ : { *(*) }. */
3042 if (dynstr != NULL && dynstr->output_section != bfd_abs_section_ptr)
3043 {
3044 bfd_size_type strsize;
3045
3046 strsize = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
3047 if (! elf_add_dynamic_entry (info, DT_HASH, 0)
3048 || ! elf_add_dynamic_entry (info, DT_STRTAB, 0)
3049 || ! elf_add_dynamic_entry (info, DT_SYMTAB, 0)
3050 || ! elf_add_dynamic_entry (info, DT_STRSZ, strsize)
3051 || ! elf_add_dynamic_entry (info, DT_SYMENT,
3052 sizeof (Elf_External_Sym)))
3053 return false;
3054 }
252b5132
RH
3055 }
3056
3057 /* The backend must work out the sizes of all the other dynamic
3058 sections. */
252b5132
RH
3059 if (bed->elf_backend_size_dynamic_sections
3060 && ! (*bed->elf_backend_size_dynamic_sections) (output_bfd, info))
3061 return false;
3062
3063 if (elf_hash_table (info)->dynamic_sections_created)
3064 {
3065 size_t dynsymcount;
3066 asection *s;
3067 size_t bucketcount = 0;
c7ac6ff8 3068 size_t hash_entry_size;
252b5132
RH
3069
3070 /* Set up the version definition section. */
3071 s = bfd_get_section_by_name (dynobj, ".gnu.version_d");
3072 BFD_ASSERT (s != NULL);
3073
3074 /* We may have created additional version definitions if we are
3075 just linking a regular application. */
3076 verdefs = asvinfo.verdefs;
3077
3078 if (verdefs == NULL)
7f8d5fc9 3079 _bfd_strip_section_from_output (info, s);
252b5132
RH
3080 else
3081 {
3082 unsigned int cdefs;
3083 bfd_size_type size;
3084 struct bfd_elf_version_tree *t;
3085 bfd_byte *p;
3086 Elf_Internal_Verdef def;
3087 Elf_Internal_Verdaux defaux;
3088
252b5132
RH
3089 cdefs = 0;
3090 size = 0;
3091
3092 /* Make space for the base version. */
3093 size += sizeof (Elf_External_Verdef);
3094 size += sizeof (Elf_External_Verdaux);
3095 ++cdefs;
3096
3097 for (t = verdefs; t != NULL; t = t->next)
3098 {
3099 struct bfd_elf_version_deps *n;
3100
3101 size += sizeof (Elf_External_Verdef);
3102 size += sizeof (Elf_External_Verdaux);
3103 ++cdefs;
3104
3105 for (n = t->deps; n != NULL; n = n->next)
3106 size += sizeof (Elf_External_Verdaux);
3107 }
3108
3109 s->_raw_size = size;
3110 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3111 if (s->contents == NULL && s->_raw_size != 0)
3112 return false;
3113
3114 /* Fill in the version definition section. */
3115
3116 p = s->contents;
3117
3118 def.vd_version = VER_DEF_CURRENT;
3119 def.vd_flags = VER_FLG_BASE;
3120 def.vd_ndx = 1;
3121 def.vd_cnt = 1;
3122 def.vd_aux = sizeof (Elf_External_Verdef);
3123 def.vd_next = (sizeof (Elf_External_Verdef)
3124 + sizeof (Elf_External_Verdaux));
3125
3126 if (soname_indx != (bfd_size_type) -1)
3127 {
3a99b017 3128 def.vd_hash = bfd_elf_hash (soname);
252b5132
RH
3129 defaux.vda_name = soname_indx;
3130 }
3131 else
3132 {
3133 const char *name;
3134 bfd_size_type indx;
3135
3136 name = output_bfd->filename;
3a99b017 3137 def.vd_hash = bfd_elf_hash (name);
252b5132
RH
3138 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
3139 name, true, false);
3140 if (indx == (bfd_size_type) -1)
3141 return false;
3142 defaux.vda_name = indx;
3143 }
3144 defaux.vda_next = 0;
3145
3146 _bfd_elf_swap_verdef_out (output_bfd, &def,
3147 (Elf_External_Verdef *)p);
3148 p += sizeof (Elf_External_Verdef);
3149 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3150 (Elf_External_Verdaux *) p);
3151 p += sizeof (Elf_External_Verdaux);
3152
3153 for (t = verdefs; t != NULL; t = t->next)
3154 {
3155 unsigned int cdeps;
3156 struct bfd_elf_version_deps *n;
3157 struct elf_link_hash_entry *h;
3158
3159 cdeps = 0;
3160 for (n = t->deps; n != NULL; n = n->next)
3161 ++cdeps;
3162
3163 /* Add a symbol representing this version. */
3164 h = NULL;
3165 if (! (_bfd_generic_link_add_one_symbol
3166 (info, dynobj, t->name, BSF_GLOBAL, bfd_abs_section_ptr,
3167 (bfd_vma) 0, (const char *) NULL, false,
3168 get_elf_backend_data (dynobj)->collect,
3169 (struct bfd_link_hash_entry **) &h)))
3170 return false;
3171 h->elf_link_hash_flags &= ~ ELF_LINK_NON_ELF;
3172 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3173 h->type = STT_OBJECT;
3174 h->verinfo.vertree = t;
3175
3176 if (! _bfd_elf_link_record_dynamic_symbol (info, h))
3177 return false;
3178
3179 def.vd_version = VER_DEF_CURRENT;
3180 def.vd_flags = 0;
3181 if (t->globals == NULL && t->locals == NULL && ! t->used)
3182 def.vd_flags |= VER_FLG_WEAK;
3183 def.vd_ndx = t->vernum + 1;
3184 def.vd_cnt = cdeps + 1;
3a99b017 3185 def.vd_hash = bfd_elf_hash (t->name);
252b5132
RH
3186 def.vd_aux = sizeof (Elf_External_Verdef);
3187 if (t->next != NULL)
3188 def.vd_next = (sizeof (Elf_External_Verdef)
3189 + (cdeps + 1) * sizeof (Elf_External_Verdaux));
3190 else
3191 def.vd_next = 0;
3192
3193 _bfd_elf_swap_verdef_out (output_bfd, &def,
3194 (Elf_External_Verdef *) p);
3195 p += sizeof (Elf_External_Verdef);
3196
3197 defaux.vda_name = h->dynstr_index;
3198 if (t->deps == NULL)
3199 defaux.vda_next = 0;
3200 else
3201 defaux.vda_next = sizeof (Elf_External_Verdaux);
3202 t->name_indx = defaux.vda_name;
3203
3204 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3205 (Elf_External_Verdaux *) p);
3206 p += sizeof (Elf_External_Verdaux);
3207
3208 for (n = t->deps; n != NULL; n = n->next)
3209 {
3210 if (n->version_needed == NULL)
3211 {
3212 /* This can happen if there was an error in the
3213 version script. */
3214 defaux.vda_name = 0;
3215 }
3216 else
3217 defaux.vda_name = n->version_needed->name_indx;
3218 if (n->next == NULL)
3219 defaux.vda_next = 0;
3220 else
3221 defaux.vda_next = sizeof (Elf_External_Verdaux);
3222
3223 _bfd_elf_swap_verdaux_out (output_bfd, &defaux,
3224 (Elf_External_Verdaux *) p);
3225 p += sizeof (Elf_External_Verdaux);
3226 }
3227 }
3228
3229 if (! elf_add_dynamic_entry (info, DT_VERDEF, 0)
3230 || ! elf_add_dynamic_entry (info, DT_VERDEFNUM, cdefs))
3231 return false;
3232
3233 elf_tdata (output_bfd)->cverdefs = cdefs;
3234 }
3235
c25373b7 3236 if (info->new_dtags && info->flags)
d6cf2879
L
3237 {
3238 if (! elf_add_dynamic_entry (info, DT_FLAGS, info->flags))
3239 return false;
3240 }
3241
4d538889 3242 if (info->flags_1)
d6cf2879
L
3243 {
3244 if (! info->shared)
3245 info->flags_1 &= ~ (DF_1_INITFIRST
3246 | DF_1_NODELETE
3247 | DF_1_NOOPEN);
3248 if (! elf_add_dynamic_entry (info, DT_FLAGS_1, info->flags_1))
3249 return false;
3250 }
3251
252b5132
RH
3252 /* Work out the size of the version reference section. */
3253
3254 s = bfd_get_section_by_name (dynobj, ".gnu.version_r");
3255 BFD_ASSERT (s != NULL);
3256 {
3257 struct elf_find_verdep_info sinfo;
3258
3259 sinfo.output_bfd = output_bfd;
3260 sinfo.info = info;
3261 sinfo.vers = elf_tdata (output_bfd)->cverdefs;
3262 if (sinfo.vers == 0)
3263 sinfo.vers = 1;
3264 sinfo.failed = false;
3265
3266 elf_link_hash_traverse (elf_hash_table (info),
3267 elf_link_find_version_dependencies,
3268 (PTR) &sinfo);
3269
3270 if (elf_tdata (output_bfd)->verref == NULL)
7f8d5fc9 3271 _bfd_strip_section_from_output (info, s);
252b5132
RH
3272 else
3273 {
3274 Elf_Internal_Verneed *t;
3275 unsigned int size;
3276 unsigned int crefs;
3277 bfd_byte *p;
3278
3279 /* Build the version definition section. */
3280 size = 0;
3281 crefs = 0;
3282 for (t = elf_tdata (output_bfd)->verref;
3283 t != NULL;
3284 t = t->vn_nextref)
3285 {
3286 Elf_Internal_Vernaux *a;
3287
3288 size += sizeof (Elf_External_Verneed);
3289 ++crefs;
3290 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3291 size += sizeof (Elf_External_Vernaux);
3292 }
3293
3294 s->_raw_size = size;
3295 s->contents = (bfd_byte *) bfd_alloc (output_bfd, size);
3296 if (s->contents == NULL)
3297 return false;
3298
3299 p = s->contents;
3300 for (t = elf_tdata (output_bfd)->verref;
3301 t != NULL;
3302 t = t->vn_nextref)
3303 {
3304 unsigned int caux;
3305 Elf_Internal_Vernaux *a;
3306 bfd_size_type indx;
3307
3308 caux = 0;
3309 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3310 ++caux;
3311
3312 t->vn_version = VER_NEED_CURRENT;
3313 t->vn_cnt = caux;
3314 if (elf_dt_name (t->vn_bfd) != NULL)
3315 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
3316 elf_dt_name (t->vn_bfd),
3317 true, false);
3318 else
3319 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
210ba1e8
L
3320 basename (t->vn_bfd->filename),
3321 true, false);
252b5132
RH
3322 if (indx == (bfd_size_type) -1)
3323 return false;
3324 t->vn_file = indx;
3325 t->vn_aux = sizeof (Elf_External_Verneed);
3326 if (t->vn_nextref == NULL)
3327 t->vn_next = 0;
3328 else
3329 t->vn_next = (sizeof (Elf_External_Verneed)
3330 + caux * sizeof (Elf_External_Vernaux));
3331
3332 _bfd_elf_swap_verneed_out (output_bfd, t,
3333 (Elf_External_Verneed *) p);
3334 p += sizeof (Elf_External_Verneed);
3335
3336 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3337 {
3a99b017 3338 a->vna_hash = bfd_elf_hash (a->vna_nodename);
252b5132
RH
3339 indx = _bfd_stringtab_add (elf_hash_table (info)->dynstr,
3340 a->vna_nodename, true, false);
3341 if (indx == (bfd_size_type) -1)
3342 return false;
3343 a->vna_name = indx;
3344 if (a->vna_nextptr == NULL)
3345 a->vna_next = 0;
3346 else
3347 a->vna_next = sizeof (Elf_External_Vernaux);
3348
3349 _bfd_elf_swap_vernaux_out (output_bfd, a,
3350 (Elf_External_Vernaux *) p);
3351 p += sizeof (Elf_External_Vernaux);
3352 }
3353 }
3354
3355 if (! elf_add_dynamic_entry (info, DT_VERNEED, 0)
3356 || ! elf_add_dynamic_entry (info, DT_VERNEEDNUM, crefs))
3357 return false;
3358
3359 elf_tdata (output_bfd)->cverrefs = crefs;
3360 }
3361 }
3362
3e932841 3363 /* Assign dynsym indicies. In a shared library we generate a
30b30c21
RH
3364 section symbol for each output section, which come first.
3365 Next come all of the back-end allocated local dynamic syms,
3366 followed by the rest of the global symbols. */
3367
3368 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
252b5132
RH
3369
3370 /* Work out the size of the symbol version section. */
3371 s = bfd_get_section_by_name (dynobj, ".gnu.version");
3372 BFD_ASSERT (s != NULL);
3373 if (dynsymcount == 0
3374 || (verdefs == NULL && elf_tdata (output_bfd)->verref == NULL))
3375 {
7f8d5fc9 3376 _bfd_strip_section_from_output (info, s);
42751cf3
MM
3377 /* The DYNSYMCOUNT might have changed if we were going to
3378 output a dynamic symbol table entry for S. */
30b30c21 3379 dynsymcount = _bfd_elf_link_renumber_dynsyms (output_bfd, info);
252b5132
RH
3380 }
3381 else
3382 {
3383 s->_raw_size = dynsymcount * sizeof (Elf_External_Versym);
3384 s->contents = (bfd_byte *) bfd_zalloc (output_bfd, s->_raw_size);
3385 if (s->contents == NULL)
3386 return false;
3387
3388 if (! elf_add_dynamic_entry (info, DT_VERSYM, 0))
3389 return false;
3390 }
3391
3392 /* Set the size of the .dynsym and .hash sections. We counted
3393 the number of dynamic symbols in elf_link_add_object_symbols.
3394 We will build the contents of .dynsym and .hash when we build
3395 the final symbol table, because until then we do not know the
3396 correct value to give the symbols. We built the .dynstr
3397 section as we went along in elf_link_add_object_symbols. */
3398 s = bfd_get_section_by_name (dynobj, ".dynsym");
3399 BFD_ASSERT (s != NULL);
3400 s->_raw_size = dynsymcount * sizeof (Elf_External_Sym);
3401 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3402 if (s->contents == NULL && s->_raw_size != 0)
3403 return false;
3404
fc8c40a0
AM
3405 if (dynsymcount != 0)
3406 {
3407 Elf_Internal_Sym isym;
3408
3409 /* The first entry in .dynsym is a dummy symbol. */
3410 isym.st_value = 0;
3411 isym.st_size = 0;
3412 isym.st_name = 0;
3413 isym.st_info = 0;
3414 isym.st_other = 0;
3415 isym.st_shndx = 0;
3416 elf_swap_symbol_out (output_bfd, &isym,
3417 (PTR) (Elf_External_Sym *) s->contents);
3418 }
252b5132
RH
3419
3420 /* Compute the size of the hashing table. As a side effect this
3421 computes the hash values for all the names we export. */
3422 bucketcount = compute_bucket_count (info);
3423
3424 s = bfd_get_section_by_name (dynobj, ".hash");
3425 BFD_ASSERT (s != NULL);
c7ac6ff8
MM
3426 hash_entry_size = elf_section_data (s)->this_hdr.sh_entsize;
3427 s->_raw_size = ((2 + bucketcount + dynsymcount) * hash_entry_size);
252b5132
RH
3428 s->contents = (bfd_byte *) bfd_alloc (output_bfd, s->_raw_size);
3429 if (s->contents == NULL)
3430 return false;
3431 memset (s->contents, 0, (size_t) s->_raw_size);
3432
c7ac6ff8 3433 bfd_put (8 * hash_entry_size, output_bfd, bucketcount, s->contents);
3e932841 3434 bfd_put (8 * hash_entry_size, output_bfd, dynsymcount,
c7ac6ff8 3435 s->contents + hash_entry_size);
252b5132
RH
3436
3437 elf_hash_table (info)->bucketcount = bucketcount;
3438
3439 s = bfd_get_section_by_name (dynobj, ".dynstr");
3440 BFD_ASSERT (s != NULL);
3441 s->_raw_size = _bfd_stringtab_size (elf_hash_table (info)->dynstr);
3442
3443 if (! elf_add_dynamic_entry (info, DT_NULL, 0))
3444 return false;
3445 }
3446
3447 return true;
3448}
3449\f
3450/* Fix up the flags for a symbol. This handles various cases which
3451 can only be fixed after all the input files are seen. This is
3452 currently called by both adjust_dynamic_symbol and
3453 assign_sym_version, which is unnecessary but perhaps more robust in
3454 the face of future changes. */
3455
3456static boolean
3457elf_fix_symbol_flags (h, eif)
3458 struct elf_link_hash_entry *h;
3459 struct elf_info_failed *eif;
3460{
3461 /* If this symbol was mentioned in a non-ELF file, try to set
3462 DEF_REGULAR and REF_REGULAR correctly. This is the only way to
3463 permit a non-ELF file to correctly refer to a symbol defined in
3464 an ELF dynamic object. */
3465 if ((h->elf_link_hash_flags & ELF_LINK_NON_ELF) != 0)
3466 {
94b6c40a
L
3467 while (h->root.type == bfd_link_hash_indirect)
3468 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3469
252b5132
RH
3470 if (h->root.type != bfd_link_hash_defined
3471 && h->root.type != bfd_link_hash_defweak)
3472 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3473 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3474 else
3475 {
3476 if (h->root.u.def.section->owner != NULL
3477 && (bfd_get_flavour (h->root.u.def.section->owner)
3478 == bfd_target_elf_flavour))
3479 h->elf_link_hash_flags |= (ELF_LINK_HASH_REF_REGULAR
3480 | ELF_LINK_HASH_REF_REGULAR_NONWEAK);
3481 else
3482 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3483 }
3484
3485 if (h->dynindx == -1
3486 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3487 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0))
3488 {
3489 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
3490 {
3491 eif->failed = true;
3492 return false;
3493 }
3494 }
3495 }
3496 else
3497 {
3498 /* Unfortunately, ELF_LINK_NON_ELF is only correct if the symbol
3499 was first seen in a non-ELF file. Fortunately, if the symbol
3500 was first seen in an ELF file, we're probably OK unless the
3501 symbol was defined in a non-ELF file. Catch that case here.
3502 FIXME: We're still in trouble if the symbol was first seen in
3503 a dynamic object, and then later in a non-ELF regular object. */
3504 if ((h->root.type == bfd_link_hash_defined
3505 || h->root.type == bfd_link_hash_defweak)
3506 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3507 && (h->root.u.def.section->owner != NULL
3508 ? (bfd_get_flavour (h->root.u.def.section->owner)
3509 != bfd_target_elf_flavour)
3510 : (bfd_is_abs_section (h->root.u.def.section)
3511 && (h->elf_link_hash_flags
3512 & ELF_LINK_HASH_DEF_DYNAMIC) == 0)))
3513 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3514 }
3515
3516 /* If this is a final link, and the symbol was defined as a common
3517 symbol in a regular object file, and there was no definition in
3518 any dynamic object, then the linker will have allocated space for
3519 the symbol in a common section but the ELF_LINK_HASH_DEF_REGULAR
3520 flag will not have been set. */
3521 if (h->root.type == bfd_link_hash_defined
3522 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
3523 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
3524 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3525 && (h->root.u.def.section->owner->flags & DYNAMIC) == 0)
3526 h->elf_link_hash_flags |= ELF_LINK_HASH_DEF_REGULAR;
3527
3528 /* If -Bsymbolic was used (which means to bind references to global
3529 symbols to the definition within the shared object), and this
3530 symbol was defined in a regular object, then it actually doesn't
d954b040
HPN
3531 need a PLT entry, and we can accomplish that by forcing it local.
3532 Likewise, if the symbol has hidden or internal visibility.
3533 FIXME: It might be that we also do not need a PLT for other
3534 non-hidden visibilities, but we would have to tell that to the
3535 backend specifically; we can't just clear PLT-related data here. */
252b5132
RH
3536 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0
3537 && eif->info->shared
d954b040
HPN
3538 && (eif->info->symbolic
3539 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3540 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
252b5132
RH
3541 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3542 {
391a809a
AM
3543 struct elf_backend_data *bed;
3544 bed = get_elf_backend_data (elf_hash_table (eif->info)->dynobj);
5fba655a
L
3545 if (ELF_ST_VISIBILITY (h->other) == STV_INTERNAL
3546 || ELF_ST_VISIBILITY (h->other) == STV_HIDDEN)
3547 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
391a809a 3548 (*bed->elf_backend_hide_symbol) (eif->info, h);
252b5132
RH
3549 }
3550
fc4cc5bb
ILT
3551 /* If this is a weak defined symbol in a dynamic object, and we know
3552 the real definition in the dynamic object, copy interesting flags
3553 over to the real definition. */
3554 if (h->weakdef != NULL)
3555 {
3556 struct elf_link_hash_entry *weakdef;
3557
3558 BFD_ASSERT (h->root.type == bfd_link_hash_defined
3559 || h->root.type == bfd_link_hash_defweak);
3560 weakdef = h->weakdef;
3561 BFD_ASSERT (weakdef->root.type == bfd_link_hash_defined
3562 || weakdef->root.type == bfd_link_hash_defweak);
3563 BFD_ASSERT (weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC);
3564
3565 /* If the real definition is defined by a regular object file,
3566 don't do anything special. See the longer description in
3567 elf_adjust_dynamic_symbol, below. */
3568 if ((weakdef->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
3569 h->weakdef = NULL;
3570 else
3571 weakdef->elf_link_hash_flags |=
3572 (h->elf_link_hash_flags
3573 & (ELF_LINK_HASH_REF_REGULAR
3574 | ELF_LINK_HASH_REF_REGULAR_NONWEAK
3575 | ELF_LINK_NON_GOT_REF));
3576 }
3577
252b5132
RH
3578 return true;
3579}
3580
3581/* Make the backend pick a good value for a dynamic symbol. This is
3582 called via elf_link_hash_traverse, and also calls itself
3583 recursively. */
3584
3585static boolean
3586elf_adjust_dynamic_symbol (h, data)
3587 struct elf_link_hash_entry *h;
3588 PTR data;
3589{
3590 struct elf_info_failed *eif = (struct elf_info_failed *) data;
3591 bfd *dynobj;
3592 struct elf_backend_data *bed;
3593
3594 /* Ignore indirect symbols. These are added by the versioning code. */
3595 if (h->root.type == bfd_link_hash_indirect)
3596 return true;
3597
3598 /* Fix the symbol flags. */
3599 if (! elf_fix_symbol_flags (h, eif))
3600 return false;
3601
3602 /* If this symbol does not require a PLT entry, and it is not
3603 defined by a dynamic object, or is not referenced by a regular
3604 object, ignore it. We do have to handle a weak defined symbol,
3605 even if no regular object refers to it, if we decided to add it
3606 to the dynamic symbol table. FIXME: Do we normally need to worry
3607 about symbols which are defined by one dynamic object and
3608 referenced by another one? */
3609 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0
3610 && ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
3611 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3612 || ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0
3613 && (h->weakdef == NULL || h->weakdef->dynindx == -1))))
3614 {
3615 h->plt.offset = (bfd_vma) -1;
3616 return true;
3617 }
3618
3619 /* If we've already adjusted this symbol, don't do it again. This
3620 can happen via a recursive call. */
3621 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
3622 return true;
3623
3624 /* Don't look at this symbol again. Note that we must set this
3625 after checking the above conditions, because we may look at a
3626 symbol once, decide not to do anything, and then get called
3627 recursively later after REF_REGULAR is set below. */
3628 h->elf_link_hash_flags |= ELF_LINK_HASH_DYNAMIC_ADJUSTED;
3629
3630 /* If this is a weak definition, and we know a real definition, and
3631 the real symbol is not itself defined by a regular object file,
3632 then get a good value for the real definition. We handle the
3633 real symbol first, for the convenience of the backend routine.
3634
3635 Note that there is a confusing case here. If the real definition
3636 is defined by a regular object file, we don't get the real symbol
3637 from the dynamic object, but we do get the weak symbol. If the
3638 processor backend uses a COPY reloc, then if some routine in the
3639 dynamic object changes the real symbol, we will not see that
3640 change in the corresponding weak symbol. This is the way other
3641 ELF linkers work as well, and seems to be a result of the shared
3642 library model.
3643
3644 I will clarify this issue. Most SVR4 shared libraries define the
3645 variable _timezone and define timezone as a weak synonym. The
3646 tzset call changes _timezone. If you write
3647 extern int timezone;
3648 int _timezone = 5;
3649 int main () { tzset (); printf ("%d %d\n", timezone, _timezone); }
3650 you might expect that, since timezone is a synonym for _timezone,
3651 the same number will print both times. However, if the processor
3652 backend uses a COPY reloc, then actually timezone will be copied
3653 into your process image, and, since you define _timezone
3654 yourself, _timezone will not. Thus timezone and _timezone will
3655 wind up at different memory locations. The tzset call will set
3656 _timezone, leaving timezone unchanged. */
3657
3658 if (h->weakdef != NULL)
3659 {
fc4cc5bb
ILT
3660 /* If we get to this point, we know there is an implicit
3661 reference by a regular object file via the weak symbol H.
3662 FIXME: Is this really true? What if the traversal finds
3663 H->WEAKDEF before it finds H? */
3664 h->weakdef->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
252b5132 3665
fc4cc5bb
ILT
3666 if (! elf_adjust_dynamic_symbol (h->weakdef, (PTR) eif))
3667 return false;
252b5132
RH
3668 }
3669
3670 /* If a symbol has no type and no size and does not require a PLT
3671 entry, then we are probably about to do the wrong thing here: we
3672 are probably going to create a COPY reloc for an empty object.
3673 This case can arise when a shared object is built with assembly
3674 code, and the assembly code fails to set the symbol type. */
3675 if (h->size == 0
3676 && h->type == STT_NOTYPE
3677 && (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) == 0)
3678 (*_bfd_error_handler)
3679 (_("warning: type and size of dynamic symbol `%s' are not defined"),
3680 h->root.root.string);
3681
3682 dynobj = elf_hash_table (eif->info)->dynobj;
3683 bed = get_elf_backend_data (dynobj);
3684 if (! (*bed->elf_backend_adjust_dynamic_symbol) (eif->info, h))
3685 {
3686 eif->failed = true;
3687 return false;
3688 }
3689
3690 return true;
3691}
3692\f
3693/* This routine is used to export all defined symbols into the dynamic
3694 symbol table. It is called via elf_link_hash_traverse. */
3695
3696static boolean
3697elf_export_symbol (h, data)
3698 struct elf_link_hash_entry *h;
3699 PTR data;
3700{
3701 struct elf_info_failed *eif = (struct elf_info_failed *) data;
3702
3703 /* Ignore indirect symbols. These are added by the versioning code. */
3704 if (h->root.type == bfd_link_hash_indirect)
3705 return true;
3706
3707 if (h->dynindx == -1
3708 && (h->elf_link_hash_flags
3709 & (ELF_LINK_HASH_DEF_REGULAR | ELF_LINK_HASH_REF_REGULAR)) != 0)
3710 {
3711 if (! _bfd_elf_link_record_dynamic_symbol (eif->info, h))
3712 {
3713 eif->failed = true;
3714 return false;
3715 }
3716 }
3717
3718 return true;
3719}
3720\f
3721/* Look through the symbols which are defined in other shared
3722 libraries and referenced here. Update the list of version
3723 dependencies. This will be put into the .gnu.version_r section.
3724 This function is called via elf_link_hash_traverse. */
3725
3726static boolean
3727elf_link_find_version_dependencies (h, data)
3728 struct elf_link_hash_entry *h;
3729 PTR data;
3730{
3731 struct elf_find_verdep_info *rinfo = (struct elf_find_verdep_info *) data;
3732 Elf_Internal_Verneed *t;
3733 Elf_Internal_Vernaux *a;
3734
3735 /* We only care about symbols defined in shared objects with version
3736 information. */
3737 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) == 0
3738 || (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
3739 || h->dynindx == -1
3740 || h->verinfo.verdef == NULL)
3741 return true;
3742
3743 /* See if we already know about this version. */
3744 for (t = elf_tdata (rinfo->output_bfd)->verref; t != NULL; t = t->vn_nextref)
3745 {
3746 if (t->vn_bfd != h->verinfo.verdef->vd_bfd)
3747 continue;
3748
3749 for (a = t->vn_auxptr; a != NULL; a = a->vna_nextptr)
3750 if (a->vna_nodename == h->verinfo.verdef->vd_nodename)
3751 return true;
3752
3753 break;
3754 }
3755
3756 /* This is a new version. Add it to tree we are building. */
3757
3758 if (t == NULL)
3759 {
3760 t = (Elf_Internal_Verneed *) bfd_zalloc (rinfo->output_bfd, sizeof *t);
3761 if (t == NULL)
3762 {
3763 rinfo->failed = true;
3764 return false;
3765 }
3766
3767 t->vn_bfd = h->verinfo.verdef->vd_bfd;
3768 t->vn_nextref = elf_tdata (rinfo->output_bfd)->verref;
3769 elf_tdata (rinfo->output_bfd)->verref = t;
3770 }
3771
3772 a = (Elf_Internal_Vernaux *) bfd_zalloc (rinfo->output_bfd, sizeof *a);
3773
3774 /* Note that we are copying a string pointer here, and testing it
3775 above. If bfd_elf_string_from_elf_section is ever changed to
3776 discard the string data when low in memory, this will have to be
3777 fixed. */
3778 a->vna_nodename = h->verinfo.verdef->vd_nodename;
3779
3780 a->vna_flags = h->verinfo.verdef->vd_flags;
3781 a->vna_nextptr = t->vn_auxptr;
3782
3783 h->verinfo.verdef->vd_exp_refno = rinfo->vers;
3784 ++rinfo->vers;
3785
3786 a->vna_other = h->verinfo.verdef->vd_exp_refno + 1;
3787
3788 t->vn_auxptr = a;
3789
3790 return true;
3791}
3792
3793/* Figure out appropriate versions for all the symbols. We may not
3794 have the version number script until we have read all of the input
3795 files, so until that point we don't know which symbols should be
3796 local. This function is called via elf_link_hash_traverse. */
3797
3798static boolean
3799elf_link_assign_sym_version (h, data)
3800 struct elf_link_hash_entry *h;
3801 PTR data;
3802{
3803 struct elf_assign_sym_version_info *sinfo =
3804 (struct elf_assign_sym_version_info *) data;
3805 struct bfd_link_info *info = sinfo->info;
c61b8717 3806 struct elf_backend_data *bed;
252b5132
RH
3807 struct elf_info_failed eif;
3808 char *p;
3809
3810 /* Fix the symbol flags. */
3811 eif.failed = false;
3812 eif.info = info;
3813 if (! elf_fix_symbol_flags (h, &eif))
3814 {
3815 if (eif.failed)
3816 sinfo->failed = true;
3817 return false;
3818 }
3819
3820 /* We only need version numbers for symbols defined in regular
3821 objects. */
3822 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3823 return true;
3824
c61b8717 3825 bed = get_elf_backend_data (sinfo->output_bfd);
252b5132
RH
3826 p = strchr (h->root.root.string, ELF_VER_CHR);
3827 if (p != NULL && h->verinfo.vertree == NULL)
3828 {
3829 struct bfd_elf_version_tree *t;
3830 boolean hidden;
3831
3832 hidden = true;
3833
3834 /* There are two consecutive ELF_VER_CHR characters if this is
3835 not a hidden symbol. */
3836 ++p;
3837 if (*p == ELF_VER_CHR)
3838 {
3839 hidden = false;
3840 ++p;
3841 }
3842
3843 /* If there is no version string, we can just return out. */
3844 if (*p == '\0')
3845 {
3846 if (hidden)
3847 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
3848 return true;
3849 }
3850
3851 /* Look for the version. If we find it, it is no longer weak. */
3852 for (t = sinfo->verdefs; t != NULL; t = t->next)
3853 {
3854 if (strcmp (t->name, p) == 0)
3855 {
3856 int len;
3857 char *alc;
3858 struct bfd_elf_version_expr *d;
3859
3860 len = p - h->root.root.string;
3861 alc = bfd_alloc (sinfo->output_bfd, len);
3862 if (alc == NULL)
3863 return false;
3864 strncpy (alc, h->root.root.string, len - 1);
3865 alc[len - 1] = '\0';
3866 if (alc[len - 2] == ELF_VER_CHR)
3867 alc[len - 2] = '\0';
3868
3869 h->verinfo.vertree = t;
3870 t->used = true;
3871 d = NULL;
3872
3873 if (t->globals != NULL)
3874 {
3875 for (d = t->globals; d != NULL; d = d->next)
3876 if ((*d->match) (d, alc))
3877 break;
3878 }
3879
3880 /* See if there is anything to force this symbol to
3881 local scope. */
3882 if (d == NULL && t->locals != NULL)
3883 {
3884 for (d = t->locals; d != NULL; d = d->next)
3885 {
3886 if ((*d->match) (d, alc))
3887 {
3888 if (h->dynindx != -1
3889 && info->shared
3890 && ! sinfo->export_dynamic)
3891 {
252b5132 3892 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
f41cbf03 3893 (*bed->elf_backend_hide_symbol) (info, h);
252b5132
RH
3894 /* FIXME: The name of the symbol has
3895 already been recorded in the dynamic
3896 string table section. */
3897 }
3898
3899 break;
3900 }
3901 }
3902 }
3903
3904 bfd_release (sinfo->output_bfd, alc);
3905 break;
3906 }
3907 }
3908
3909 /* If we are building an application, we need to create a
3910 version node for this version. */
3911 if (t == NULL && ! info->shared)
3912 {
3913 struct bfd_elf_version_tree **pp;
3914 int version_index;
3915
3916 /* If we aren't going to export this symbol, we don't need
3e932841 3917 to worry about it. */
252b5132
RH
3918 if (h->dynindx == -1)
3919 return true;
3920
3921 t = ((struct bfd_elf_version_tree *)
3922 bfd_alloc (sinfo->output_bfd, sizeof *t));
3923 if (t == NULL)
3924 {
3925 sinfo->failed = true;
3926 return false;
3927 }
3928
3929 t->next = NULL;
3930 t->name = p;
3931 t->globals = NULL;
3932 t->locals = NULL;
3933 t->deps = NULL;
3934 t->name_indx = (unsigned int) -1;
3935 t->used = true;
3936
3937 version_index = 1;
3938 for (pp = &sinfo->verdefs; *pp != NULL; pp = &(*pp)->next)
3939 ++version_index;
3940 t->vernum = version_index;
3941
3942 *pp = t;
3943
3944 h->verinfo.vertree = t;
3945 }
3946 else if (t == NULL)
3947 {
3948 /* We could not find the version for a symbol when
3949 generating a shared archive. Return an error. */
3950 (*_bfd_error_handler)
3951 (_("%s: undefined versioned symbol name %s"),
3952 bfd_get_filename (sinfo->output_bfd), h->root.root.string);
3953 bfd_set_error (bfd_error_bad_value);
3954 sinfo->failed = true;
3955 return false;
3956 }
3957
3958 if (hidden)
3959 h->elf_link_hash_flags |= ELF_LINK_HIDDEN;
3960 }
3961
3962 /* If we don't have a version for this symbol, see if we can find
3963 something. */
3964 if (h->verinfo.vertree == NULL && sinfo->verdefs != NULL)
3965 {
3966 struct bfd_elf_version_tree *t;
3967 struct bfd_elf_version_tree *deflt;
3968 struct bfd_elf_version_expr *d;
3969
3970 /* See if can find what version this symbol is in. If the
3971 symbol is supposed to be local, then don't actually register
3972 it. */
3973 deflt = NULL;
3974 for (t = sinfo->verdefs; t != NULL; t = t->next)
3975 {
3976 if (t->globals != NULL)
3977 {
3978 for (d = t->globals; d != NULL; d = d->next)
3979 {
3980 if ((*d->match) (d, h->root.root.string))
3981 {
3982 h->verinfo.vertree = t;
3983 break;
3984 }
3985 }
3986
3987 if (d != NULL)
3988 break;
3989 }
3990
3991 if (t->locals != NULL)
3992 {
3993 for (d = t->locals; d != NULL; d = d->next)
3994 {
3995 if (d->pattern[0] == '*' && d->pattern[1] == '\0')
3996 deflt = t;
3997 else if ((*d->match) (d, h->root.root.string))
3998 {
3999 h->verinfo.vertree = t;
4000 if (h->dynindx != -1
4001 && info->shared
4002 && ! sinfo->export_dynamic)
4003 {
252b5132 4004 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
f41cbf03 4005 (*bed->elf_backend_hide_symbol) (info, h);
252b5132
RH
4006 /* FIXME: The name of the symbol has already
4007 been recorded in the dynamic string table
4008 section. */
4009 }
4010 break;
4011 }
4012 }
4013
4014 if (d != NULL)
4015 break;
4016 }
4017 }
4018
4019 if (deflt != NULL && h->verinfo.vertree == NULL)
4020 {
4021 h->verinfo.vertree = deflt;
4022 if (h->dynindx != -1
4023 && info->shared
4024 && ! sinfo->export_dynamic)
4025 {
252b5132 4026 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
f41cbf03 4027 (*bed->elf_backend_hide_symbol) (info, h);
252b5132
RH
4028 /* FIXME: The name of the symbol has already been
4029 recorded in the dynamic string table section. */
4030 }
4031 }
4032 }
4033
4034 return true;
4035}
252b5132
RH
4036\f
4037/* Final phase of ELF linker. */
4038
4039/* A structure we use to avoid passing large numbers of arguments. */
4040
4041struct elf_final_link_info
4042{
4043 /* General link information. */
4044 struct bfd_link_info *info;
4045 /* Output BFD. */
4046 bfd *output_bfd;
4047 /* Symbol string table. */
4048 struct bfd_strtab_hash *symstrtab;
4049 /* .dynsym section. */
4050 asection *dynsym_sec;
4051 /* .hash section. */
4052 asection *hash_sec;
4053 /* symbol version section (.gnu.version). */
4054 asection *symver_sec;
4055 /* Buffer large enough to hold contents of any section. */
4056 bfd_byte *contents;
4057 /* Buffer large enough to hold external relocs of any section. */
4058 PTR external_relocs;
4059 /* Buffer large enough to hold internal relocs of any section. */
4060 Elf_Internal_Rela *internal_relocs;
4061 /* Buffer large enough to hold external local symbols of any input
4062 BFD. */
4063 Elf_External_Sym *external_syms;
4064 /* Buffer large enough to hold internal local symbols of any input
4065 BFD. */
4066 Elf_Internal_Sym *internal_syms;
4067 /* Array large enough to hold a symbol index for each local symbol
4068 of any input BFD. */
4069 long *indices;
4070 /* Array large enough to hold a section pointer for each local
4071 symbol of any input BFD. */
4072 asection **sections;
4073 /* Buffer to hold swapped out symbols. */
4074 Elf_External_Sym *symbuf;
4075 /* Number of swapped out symbols in buffer. */
4076 size_t symbuf_count;
4077 /* Number of symbols which fit in symbuf. */
4078 size_t symbuf_size;
4079};
4080
4081static boolean elf_link_output_sym
4082 PARAMS ((struct elf_final_link_info *, const char *,
4083 Elf_Internal_Sym *, asection *));
4084static boolean elf_link_flush_output_syms
4085 PARAMS ((struct elf_final_link_info *));
4086static boolean elf_link_output_extsym
4087 PARAMS ((struct elf_link_hash_entry *, PTR));
f5fa8ca2
JJ
4088static boolean elf_link_sec_merge_syms
4089 PARAMS ((struct elf_link_hash_entry *, PTR));
252b5132
RH
4090static boolean elf_link_input_bfd
4091 PARAMS ((struct elf_final_link_info *, bfd *));
4092static boolean elf_reloc_link_order
4093 PARAMS ((bfd *, struct bfd_link_info *, asection *,
4094 struct bfd_link_order *));
4095
4096/* This struct is used to pass information to elf_link_output_extsym. */
4097
4098struct elf_outext_info
4099{
4100 boolean failed;
4101 boolean localsyms;
4102 struct elf_final_link_info *finfo;
4103};
4104
23bc299b
MM
4105/* Compute the size of, and allocate space for, REL_HDR which is the
4106 section header for a section containing relocations for O. */
4107
4108static boolean
4109elf_link_size_reloc_section (abfd, rel_hdr, o)
4110 bfd *abfd;
4111 Elf_Internal_Shdr *rel_hdr;
4112 asection *o;
4113{
4114 register struct elf_link_hash_entry **p, **pend;
b037af20 4115 unsigned reloc_count;
23bc299b 4116
b037af20
MM
4117 /* Figure out how many relocations there will be. */
4118 if (rel_hdr == &elf_section_data (o)->rel_hdr)
4119 reloc_count = elf_section_data (o)->rel_count;
4120 else
4121 reloc_count = elf_section_data (o)->rel_count2;
4122
4123 /* That allows us to calculate the size of the section. */
4124 rel_hdr->sh_size = rel_hdr->sh_entsize * reloc_count;
23bc299b
MM
4125
4126 /* The contents field must last into write_object_contents, so we
755cfd29
NC
4127 allocate it with bfd_alloc rather than malloc. Also since we
4128 cannot be sure that the contents will actually be filled in,
4129 we zero the allocated space. */
4130 rel_hdr->contents = (PTR) bfd_zalloc (abfd, rel_hdr->sh_size);
23bc299b
MM
4131 if (rel_hdr->contents == NULL && rel_hdr->sh_size != 0)
4132 return false;
3e932841 4133
b037af20
MM
4134 /* We only allocate one set of hash entries, so we only do it the
4135 first time we are called. */
4136 if (elf_section_data (o)->rel_hashes == NULL)
4137 {
4138 p = ((struct elf_link_hash_entry **)
4139 bfd_malloc (o->reloc_count
4140 * sizeof (struct elf_link_hash_entry *)));
4141 if (p == NULL && o->reloc_count != 0)
4142 return false;
23bc299b 4143
b037af20
MM
4144 elf_section_data (o)->rel_hashes = p;
4145 pend = p + o->reloc_count;
4146 for (; p < pend; p++)
4147 *p = NULL;
4148 }
23bc299b
MM
4149
4150 return true;
4151}
4152
31367b81
MM
4153/* When performing a relocateable link, the input relocations are
4154 preserved. But, if they reference global symbols, the indices
4155 referenced must be updated. Update all the relocations in
4156 REL_HDR (there are COUNT of them), using the data in REL_HASH. */
4157
4158static void
4159elf_link_adjust_relocs (abfd, rel_hdr, count, rel_hash)
4160 bfd *abfd;
4161 Elf_Internal_Shdr *rel_hdr;
4162 unsigned int count;
4163 struct elf_link_hash_entry **rel_hash;
4164{
4165 unsigned int i;
32f0787a 4166 struct elf_backend_data *bed = get_elf_backend_data (abfd);
31367b81
MM
4167
4168 for (i = 0; i < count; i++, rel_hash++)
4169 {
4170 if (*rel_hash == NULL)
4171 continue;
4172
4173 BFD_ASSERT ((*rel_hash)->indx >= 0);
4174
4175 if (rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
4176 {
4177 Elf_External_Rel *erel;
4178 Elf_Internal_Rel irel;
3e932841 4179
31367b81 4180 erel = (Elf_External_Rel *) rel_hdr->contents + i;
32f0787a
UC
4181 if (bed->s->swap_reloc_in)
4182 (*bed->s->swap_reloc_in) (abfd, (bfd_byte *) erel, &irel);
4183 else
4184 elf_swap_reloc_in (abfd, erel, &irel);
31367b81
MM
4185 irel.r_info = ELF_R_INFO ((*rel_hash)->indx,
4186 ELF_R_TYPE (irel.r_info));
32f0787a
UC
4187 if (bed->s->swap_reloc_out)
4188 (*bed->s->swap_reloc_out) (abfd, &irel, (bfd_byte *) erel);
4189 else
4190 elf_swap_reloc_out (abfd, &irel, erel);
31367b81
MM
4191 }
4192 else
4193 {
4194 Elf_External_Rela *erela;
4195 Elf_Internal_Rela irela;
3e932841 4196
31367b81
MM
4197 BFD_ASSERT (rel_hdr->sh_entsize
4198 == sizeof (Elf_External_Rela));
3e932841 4199
31367b81 4200 erela = (Elf_External_Rela *) rel_hdr->contents + i;
32f0787a
UC
4201 if (bed->s->swap_reloca_in)
4202 (*bed->s->swap_reloca_in) (abfd, (bfd_byte *) erela, &irela);
4203 else
4204 elf_swap_reloca_in (abfd, erela, &irela);
31367b81
MM
4205 irela.r_info = ELF_R_INFO ((*rel_hash)->indx,
4206 ELF_R_TYPE (irela.r_info));
32f0787a
UC
4207 if (bed->s->swap_reloca_out)
4208 (*bed->s->swap_reloca_out) (abfd, &irela, (bfd_byte *) erela);
4209 else
4210 elf_swap_reloca_out (abfd, &irela, erela);
31367b81
MM
4211 }
4212 }
4213}
4214
252b5132
RH
4215/* Do the final step of an ELF link. */
4216
4217boolean
4218elf_bfd_final_link (abfd, info)
4219 bfd *abfd;
4220 struct bfd_link_info *info;
4221{
4222 boolean dynamic;
4223 bfd *dynobj;
4224 struct elf_final_link_info finfo;
4225 register asection *o;
4226 register struct bfd_link_order *p;
4227 register bfd *sub;
4228 size_t max_contents_size;
4229 size_t max_external_reloc_size;
4230 size_t max_internal_reloc_count;
4231 size_t max_sym_count;
4232 file_ptr off;
4233 Elf_Internal_Sym elfsym;
4234 unsigned int i;
4235 Elf_Internal_Shdr *symtab_hdr;
4236 Elf_Internal_Shdr *symstrtab_hdr;
4237 struct elf_backend_data *bed = get_elf_backend_data (abfd);
4238 struct elf_outext_info eoinfo;
f5fa8ca2 4239 boolean merged;
252b5132
RH
4240
4241 if (info->shared)
4242 abfd->flags |= DYNAMIC;
4243
4244 dynamic = elf_hash_table (info)->dynamic_sections_created;
4245 dynobj = elf_hash_table (info)->dynobj;
4246
4247 finfo.info = info;
4248 finfo.output_bfd = abfd;
4249 finfo.symstrtab = elf_stringtab_init ();
4250 if (finfo.symstrtab == NULL)
4251 return false;
4252
4253 if (! dynamic)
4254 {
4255 finfo.dynsym_sec = NULL;
4256 finfo.hash_sec = NULL;
4257 finfo.symver_sec = NULL;
4258 }
4259 else
4260 {
4261 finfo.dynsym_sec = bfd_get_section_by_name (dynobj, ".dynsym");
4262 finfo.hash_sec = bfd_get_section_by_name (dynobj, ".hash");
4263 BFD_ASSERT (finfo.dynsym_sec != NULL && finfo.hash_sec != NULL);
4264 finfo.symver_sec = bfd_get_section_by_name (dynobj, ".gnu.version");
4265 /* Note that it is OK if symver_sec is NULL. */
4266 }
4267
4268 finfo.contents = NULL;
4269 finfo.external_relocs = NULL;
4270 finfo.internal_relocs = NULL;
4271 finfo.external_syms = NULL;
4272 finfo.internal_syms = NULL;
4273 finfo.indices = NULL;
4274 finfo.sections = NULL;
4275 finfo.symbuf = NULL;
4276 finfo.symbuf_count = 0;
4277
4278 /* Count up the number of relocations we will output for each output
4279 section, so that we know the sizes of the reloc sections. We
4280 also figure out some maximum sizes. */
4281 max_contents_size = 0;
4282 max_external_reloc_size = 0;
4283 max_internal_reloc_count = 0;
4284 max_sym_count = 0;
f5fa8ca2 4285 merged = false;
252b5132
RH
4286 for (o = abfd->sections; o != (asection *) NULL; o = o->next)
4287 {
4288 o->reloc_count = 0;
4289
4290 for (p = o->link_order_head; p != NULL; p = p->next)
4291 {
4292 if (p->type == bfd_section_reloc_link_order
4293 || p->type == bfd_symbol_reloc_link_order)
4294 ++o->reloc_count;
4295 else if (p->type == bfd_indirect_link_order)
4296 {
4297 asection *sec;
4298
4299 sec = p->u.indirect.section;
4300
4301 /* Mark all sections which are to be included in the
4302 link. This will normally be every section. We need
4303 to do this so that we can identify any sections which
4304 the linker has decided to not include. */
4305 sec->linker_mark = true;
4306
f5fa8ca2
JJ
4307 if (sec->flags & SEC_MERGE)
4308 merged = true;
4309
a712da20 4310 if (info->relocateable || info->emitrelocations)
252b5132
RH
4311 o->reloc_count += sec->reloc_count;
4312
4313 if (sec->_raw_size > max_contents_size)
4314 max_contents_size = sec->_raw_size;
4315 if (sec->_cooked_size > max_contents_size)
4316 max_contents_size = sec->_cooked_size;
4317
4318 /* We are interested in just local symbols, not all
4319 symbols. */
4320 if (bfd_get_flavour (sec->owner) == bfd_target_elf_flavour
4321 && (sec->owner->flags & DYNAMIC) == 0)
4322 {
4323 size_t sym_count;
4324
4325 if (elf_bad_symtab (sec->owner))
4326 sym_count = (elf_tdata (sec->owner)->symtab_hdr.sh_size
4327 / sizeof (Elf_External_Sym));
4328 else
4329 sym_count = elf_tdata (sec->owner)->symtab_hdr.sh_info;
4330
4331 if (sym_count > max_sym_count)
4332 max_sym_count = sym_count;
4333
4334 if ((sec->flags & SEC_RELOC) != 0)
4335 {
4336 size_t ext_size;
4337
4338 ext_size = elf_section_data (sec)->rel_hdr.sh_size;
4339 if (ext_size > max_external_reloc_size)
4340 max_external_reloc_size = ext_size;
4341 if (sec->reloc_count > max_internal_reloc_count)
4342 max_internal_reloc_count = sec->reloc_count;
4343 }
4344 }
4345 }
4346 }
4347
4348 if (o->reloc_count > 0)
4349 o->flags |= SEC_RELOC;
4350 else
4351 {
4352 /* Explicitly clear the SEC_RELOC flag. The linker tends to
4353 set it (this is probably a bug) and if it is set
4354 assign_section_numbers will create a reloc section. */
4355 o->flags &=~ SEC_RELOC;
4356 }
4357
4358 /* If the SEC_ALLOC flag is not set, force the section VMA to
4359 zero. This is done in elf_fake_sections as well, but forcing
4360 the VMA to 0 here will ensure that relocs against these
4361 sections are handled correctly. */
4362 if ((o->flags & SEC_ALLOC) == 0
4363 && ! o->user_set_vma)
4364 o->vma = 0;
4365 }
4366
f5fa8ca2
JJ
4367 if (! info->relocateable && merged)
4368 elf_link_hash_traverse (elf_hash_table (info),
4369 elf_link_sec_merge_syms, (PTR) abfd);
4370
252b5132
RH
4371 /* Figure out the file positions for everything but the symbol table
4372 and the relocs. We set symcount to force assign_section_numbers
4373 to create a symbol table. */
4374 bfd_get_symcount (abfd) = info->strip == strip_all ? 0 : 1;
4375 BFD_ASSERT (! abfd->output_has_begun);
4376 if (! _bfd_elf_compute_section_file_positions (abfd, info))
4377 goto error_return;
4378
b037af20
MM
4379 /* Figure out how many relocations we will have in each section.
4380 Just using RELOC_COUNT isn't good enough since that doesn't
4381 maintain a separate value for REL vs. RELA relocations. */
a712da20 4382 if (info->relocateable || info->emitrelocations)
b037af20
MM
4383 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
4384 for (o = sub->sections; o != NULL; o = o->next)
4385 {
814fe68a 4386 asection *output_section;
b037af20 4387
814fe68a
ILT
4388 if (! o->linker_mark)
4389 {
4390 /* This section was omitted from the link. */
4391 continue;
4392 }
4393
4394 output_section = o->output_section;
4395
4396 if (output_section != NULL
4397 && (o->flags & SEC_RELOC) != 0)
b037af20 4398 {
3e932841 4399 struct bfd_elf_section_data *esdi
b037af20 4400 = elf_section_data (o);
3e932841 4401 struct bfd_elf_section_data *esdo
b037af20 4402 = elf_section_data (output_section);
ce006217
MM
4403 unsigned int *rel_count;
4404 unsigned int *rel_count2;
b037af20 4405
ce006217
MM
4406 /* We must be careful to add the relocation froms the
4407 input section to the right output count. */
4408 if (esdi->rel_hdr.sh_entsize == esdo->rel_hdr.sh_entsize)
4409 {
4410 rel_count = &esdo->rel_count;
4411 rel_count2 = &esdo->rel_count2;
4412 }
4413 else
4414 {
4415 rel_count = &esdo->rel_count2;
4416 rel_count2 = &esdo->rel_count;
4417 }
3e932841
KH
4418
4419 *rel_count += (esdi->rel_hdr.sh_size
ce006217 4420 / esdi->rel_hdr.sh_entsize);
b037af20 4421 if (esdi->rel_hdr2)
3e932841 4422 *rel_count2 += (esdi->rel_hdr2->sh_size
ce006217 4423 / esdi->rel_hdr2->sh_entsize);
b037af20
MM
4424 }
4425 }
4426
252b5132
RH
4427 /* That created the reloc sections. Set their sizes, and assign
4428 them file positions, and allocate some buffers. */
4429 for (o = abfd->sections; o != NULL; o = o->next)
4430 {
4431 if ((o->flags & SEC_RELOC) != 0)
4432 {
23bc299b
MM
4433 if (!elf_link_size_reloc_section (abfd,
4434 &elf_section_data (o)->rel_hdr,
4435 o))
252b5132
RH
4436 goto error_return;
4437
23bc299b
MM
4438 if (elf_section_data (o)->rel_hdr2
4439 && !elf_link_size_reloc_section (abfd,
4440 elf_section_data (o)->rel_hdr2,
4441 o))
252b5132 4442 goto error_return;
252b5132 4443 }
b037af20
MM
4444
4445 /* Now, reset REL_COUNT and REL_COUNT2 so that we can use them
3e932841 4446 to count upwards while actually outputting the relocations. */
b037af20
MM
4447 elf_section_data (o)->rel_count = 0;
4448 elf_section_data (o)->rel_count2 = 0;
252b5132
RH
4449 }
4450
4451 _bfd_elf_assign_file_positions_for_relocs (abfd);
4452
4453 /* We have now assigned file positions for all the sections except
4454 .symtab and .strtab. We start the .symtab section at the current
4455 file position, and write directly to it. We build the .strtab
4456 section in memory. */
4457 bfd_get_symcount (abfd) = 0;
4458 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4459 /* sh_name is set in prep_headers. */
4460 symtab_hdr->sh_type = SHT_SYMTAB;
4461 symtab_hdr->sh_flags = 0;
4462 symtab_hdr->sh_addr = 0;
4463 symtab_hdr->sh_size = 0;
4464 symtab_hdr->sh_entsize = sizeof (Elf_External_Sym);
4465 /* sh_link is set in assign_section_numbers. */
4466 /* sh_info is set below. */
4467 /* sh_offset is set just below. */
f0e1d18a 4468 symtab_hdr->sh_addralign = bed->s->file_align;
252b5132
RH
4469
4470 off = elf_tdata (abfd)->next_file_pos;
4471 off = _bfd_elf_assign_file_position_for_section (symtab_hdr, off, true);
4472
4473 /* Note that at this point elf_tdata (abfd)->next_file_pos is
4474 incorrect. We do not yet know the size of the .symtab section.
4475 We correct next_file_pos below, after we do know the size. */
4476
4477 /* Allocate a buffer to hold swapped out symbols. This is to avoid
4478 continuously seeking to the right position in the file. */
4479 if (! info->keep_memory || max_sym_count < 20)
4480 finfo.symbuf_size = 20;
4481 else
4482 finfo.symbuf_size = max_sym_count;
4483 finfo.symbuf = ((Elf_External_Sym *)
4484 bfd_malloc (finfo.symbuf_size * sizeof (Elf_External_Sym)));
4485 if (finfo.symbuf == NULL)
4486 goto error_return;
4487
4488 /* Start writing out the symbol table. The first symbol is always a
4489 dummy symbol. */
a712da20 4490 if (info->strip != strip_all || info->relocateable || info->emitrelocations)
252b5132
RH
4491 {
4492 elfsym.st_value = 0;
4493 elfsym.st_size = 0;
4494 elfsym.st_info = 0;
4495 elfsym.st_other = 0;
4496 elfsym.st_shndx = SHN_UNDEF;
4497 if (! elf_link_output_sym (&finfo, (const char *) NULL,
4498 &elfsym, bfd_und_section_ptr))
4499 goto error_return;
4500 }
4501
4502#if 0
4503 /* Some standard ELF linkers do this, but we don't because it causes
4504 bootstrap comparison failures. */
4505 /* Output a file symbol for the output file as the second symbol.
4506 We output this even if we are discarding local symbols, although
4507 I'm not sure if this is correct. */
4508 elfsym.st_value = 0;
4509 elfsym.st_size = 0;
4510 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_FILE);
4511 elfsym.st_other = 0;
4512 elfsym.st_shndx = SHN_ABS;
4513 if (! elf_link_output_sym (&finfo, bfd_get_filename (abfd),
4514 &elfsym, bfd_abs_section_ptr))
4515 goto error_return;
4516#endif
4517
4518 /* Output a symbol for each section. We output these even if we are
4519 discarding local symbols, since they are used for relocs. These
4520 symbols have no names. We store the index of each one in the
4521 index field of the section, so that we can find it again when
4522 outputting relocs. */
a712da20 4523 if (info->strip != strip_all || info->relocateable || info->emitrelocations)
252b5132
RH
4524 {
4525 elfsym.st_size = 0;
4526 elfsym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
4527 elfsym.st_other = 0;
4528 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
4529 {
4530 o = section_from_elf_index (abfd, i);
4531 if (o != NULL)
4532 o->target_index = bfd_get_symcount (abfd);
4533 elfsym.st_shndx = i;
7ad34365 4534 if (info->relocateable || o == NULL)
252b5132
RH
4535 elfsym.st_value = 0;
4536 else
4537 elfsym.st_value = o->vma;
4538 if (! elf_link_output_sym (&finfo, (const char *) NULL,
4539 &elfsym, o))
4540 goto error_return;
4541 }
4542 }
4543
4544 /* Allocate some memory to hold information read in from the input
4545 files. */
4546 finfo.contents = (bfd_byte *) bfd_malloc (max_contents_size);
4547 finfo.external_relocs = (PTR) bfd_malloc (max_external_reloc_size);
4548 finfo.internal_relocs = ((Elf_Internal_Rela *)
4549 bfd_malloc (max_internal_reloc_count
c7ac6ff8
MM
4550 * sizeof (Elf_Internal_Rela)
4551 * bed->s->int_rels_per_ext_rel));
252b5132
RH
4552 finfo.external_syms = ((Elf_External_Sym *)
4553 bfd_malloc (max_sym_count
4554 * sizeof (Elf_External_Sym)));
4555 finfo.internal_syms = ((Elf_Internal_Sym *)
4556 bfd_malloc (max_sym_count
4557 * sizeof (Elf_Internal_Sym)));
4558 finfo.indices = (long *) bfd_malloc (max_sym_count * sizeof (long));
4559 finfo.sections = ((asection **)
4560 bfd_malloc (max_sym_count * sizeof (asection *)));
4561 if ((finfo.contents == NULL && max_contents_size != 0)
4562 || (finfo.external_relocs == NULL && max_external_reloc_size != 0)
4563 || (finfo.internal_relocs == NULL && max_internal_reloc_count != 0)
4564 || (finfo.external_syms == NULL && max_sym_count != 0)
4565 || (finfo.internal_syms == NULL && max_sym_count != 0)
4566 || (finfo.indices == NULL && max_sym_count != 0)
4567 || (finfo.sections == NULL && max_sym_count != 0))
4568 goto error_return;
4569
4570 /* Since ELF permits relocations to be against local symbols, we
4571 must have the local symbols available when we do the relocations.
4572 Since we would rather only read the local symbols once, and we
4573 would rather not keep them in memory, we handle all the
4574 relocations for a single input file at the same time.
4575
4576 Unfortunately, there is no way to know the total number of local
4577 symbols until we have seen all of them, and the local symbol
4578 indices precede the global symbol indices. This means that when
4579 we are generating relocateable output, and we see a reloc against
4580 a global symbol, we can not know the symbol index until we have
4581 finished examining all the local symbols to see which ones we are
4582 going to output. To deal with this, we keep the relocations in
4583 memory, and don't output them until the end of the link. This is
4584 an unfortunate waste of memory, but I don't see a good way around
4585 it. Fortunately, it only happens when performing a relocateable
4586 link, which is not the common case. FIXME: If keep_memory is set
4587 we could write the relocs out and then read them again; I don't
4588 know how bad the memory loss will be. */
4589
4590 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
4591 sub->output_has_begun = false;
4592 for (o = abfd->sections; o != NULL; o = o->next)
4593 {
4594 for (p = o->link_order_head; p != NULL; p = p->next)
4595 {
4596 if (p->type == bfd_indirect_link_order
4597 && (bfd_get_flavour (p->u.indirect.section->owner)
4598 == bfd_target_elf_flavour))
4599 {
4600 sub = p->u.indirect.section->owner;
4601 if (! sub->output_has_begun)
4602 {
4603 if (! elf_link_input_bfd (&finfo, sub))
4604 goto error_return;
4605 sub->output_has_begun = true;
4606 }
4607 }
4608 else if (p->type == bfd_section_reloc_link_order
4609 || p->type == bfd_symbol_reloc_link_order)
4610 {
4611 if (! elf_reloc_link_order (abfd, info, o, p))
4612 goto error_return;
4613 }
4614 else
4615 {
4616 if (! _bfd_default_link_order (abfd, info, o, p))
4617 goto error_return;
4618 }
4619 }
4620 }
4621
4622 /* That wrote out all the local symbols. Finish up the symbol table
5cc7c785
L
4623 with the global symbols. Even if we want to strip everything we
4624 can, we still need to deal with those global symbols that got
3e932841 4625 converted to local in a version script. */
252b5132 4626
2bd171e0 4627 if (info->shared)
252b5132
RH
4628 {
4629 /* Output any global symbols that got converted to local in a
4630 version script. We do this in a separate step since ELF
4631 requires all local symbols to appear prior to any global
4632 symbols. FIXME: We should only do this if some global
4633 symbols were, in fact, converted to become local. FIXME:
4634 Will this work correctly with the Irix 5 linker? */
4635 eoinfo.failed = false;
4636 eoinfo.finfo = &finfo;
4637 eoinfo.localsyms = true;
4638 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
4639 (PTR) &eoinfo);
4640 if (eoinfo.failed)
4641 return false;
4642 }
4643
30b30c21 4644 /* The sh_info field records the index of the first non local symbol. */
252b5132 4645 symtab_hdr->sh_info = bfd_get_symcount (abfd);
30b30c21 4646
fc8c40a0
AM
4647 if (dynamic
4648 && finfo.dynsym_sec->output_section != bfd_abs_section_ptr)
30b30c21
RH
4649 {
4650 Elf_Internal_Sym sym;
4651 Elf_External_Sym *dynsym =
4652 (Elf_External_Sym *)finfo.dynsym_sec->contents;
71a40b32 4653 long last_local = 0;
30b30c21
RH
4654
4655 /* Write out the section symbols for the output sections. */
4656 if (info->shared)
4657 {
4658 asection *s;
4659
4660 sym.st_size = 0;
4661 sym.st_name = 0;
4662 sym.st_info = ELF_ST_INFO (STB_LOCAL, STT_SECTION);
4663 sym.st_other = 0;
4664
4665 for (s = abfd->sections; s != NULL; s = s->next)
4666 {
4667 int indx;
4668 indx = elf_section_data (s)->this_idx;
4669 BFD_ASSERT (indx > 0);
4670 sym.st_shndx = indx;
4671 sym.st_value = s->vma;
4672
4673 elf_swap_symbol_out (abfd, &sym,
4674 dynsym + elf_section_data (s)->dynindx);
4675 }
4676
4677 last_local = bfd_count_sections (abfd);
4678 }
4679
4680 /* Write out the local dynsyms. */
4681 if (elf_hash_table (info)->dynlocal)
4682 {
4683 struct elf_link_local_dynamic_entry *e;
4684 for (e = elf_hash_table (info)->dynlocal; e ; e = e->next)
4685 {
318da145 4686 asection *s;
30b30c21 4687
b037af20
MM
4688 sym.st_size = e->isym.st_size;
4689 sym.st_other = e->isym.st_other;
4690
1fa0ddb3
RH
4691 /* Copy the internal symbol as is.
4692 Note that we saved a word of storage and overwrote
30b30c21 4693 the original st_name with the dynstr_index. */
1fa0ddb3 4694 sym = e->isym;
30b30c21 4695
1fa0ddb3 4696 if (e->isym.st_shndx > 0 && e->isym.st_shndx < SHN_LORESERVE)
587ff49e
RH
4697 {
4698 s = bfd_section_from_elf_index (e->input_bfd,
4699 e->isym.st_shndx);
4700
4701 sym.st_shndx =
4702 elf_section_data (s->output_section)->this_idx;
4703 sym.st_value = (s->output_section->vma
4704 + s->output_offset
4705 + e->isym.st_value);
4706 }
30b30c21
RH
4707
4708 if (last_local < e->dynindx)
4709 last_local = e->dynindx;
4710
4711 elf_swap_symbol_out (abfd, &sym, dynsym + e->dynindx);
4712 }
4713 }
4714
71a40b32
ILT
4715 elf_section_data (finfo.dynsym_sec->output_section)->this_hdr.sh_info =
4716 last_local + 1;
30b30c21 4717 }
252b5132
RH
4718
4719 /* We get the global symbols from the hash table. */
4720 eoinfo.failed = false;
4721 eoinfo.localsyms = false;
4722 eoinfo.finfo = &finfo;
4723 elf_link_hash_traverse (elf_hash_table (info), elf_link_output_extsym,
4724 (PTR) &eoinfo);
4725 if (eoinfo.failed)
4726 return false;
4727
587ff49e
RH
4728 /* If backend needs to output some symbols not present in the hash
4729 table, do it now. */
4730 if (bed->elf_backend_output_arch_syms)
4731 {
4732 if (! (*bed->elf_backend_output_arch_syms)
4733 (abfd, info, (PTR) &finfo,
4734 (boolean (*) PARAMS ((PTR, const char *,
4735 Elf_Internal_Sym *, asection *)))
4736 elf_link_output_sym))
4737 return false;
3e932841 4738 }
587ff49e 4739
252b5132
RH
4740 /* Flush all symbols to the file. */
4741 if (! elf_link_flush_output_syms (&finfo))
4742 return false;
4743
4744 /* Now we know the size of the symtab section. */
4745 off += symtab_hdr->sh_size;
4746
4747 /* Finish up and write out the symbol string table (.strtab)
4748 section. */
4749 symstrtab_hdr = &elf_tdata (abfd)->strtab_hdr;
4750 /* sh_name was set in prep_headers. */
4751 symstrtab_hdr->sh_type = SHT_STRTAB;
4752 symstrtab_hdr->sh_flags = 0;
4753 symstrtab_hdr->sh_addr = 0;
4754 symstrtab_hdr->sh_size = _bfd_stringtab_size (finfo.symstrtab);
4755 symstrtab_hdr->sh_entsize = 0;
4756 symstrtab_hdr->sh_link = 0;
4757 symstrtab_hdr->sh_info = 0;
4758 /* sh_offset is set just below. */
4759 symstrtab_hdr->sh_addralign = 1;
4760
4761 off = _bfd_elf_assign_file_position_for_section (symstrtab_hdr, off, true);
4762 elf_tdata (abfd)->next_file_pos = off;
4763
4764 if (bfd_get_symcount (abfd) > 0)
4765 {
4766 if (bfd_seek (abfd, symstrtab_hdr->sh_offset, SEEK_SET) != 0
4767 || ! _bfd_stringtab_emit (abfd, finfo.symstrtab))
4768 return false;
4769 }
4770
4771 /* Adjust the relocs to have the correct symbol indices. */
4772 for (o = abfd->sections; o != NULL; o = o->next)
4773 {
252b5132
RH
4774 if ((o->flags & SEC_RELOC) == 0)
4775 continue;
4776
3e932841 4777 elf_link_adjust_relocs (abfd, &elf_section_data (o)->rel_hdr,
31367b81
MM
4778 elf_section_data (o)->rel_count,
4779 elf_section_data (o)->rel_hashes);
4780 if (elf_section_data (o)->rel_hdr2 != NULL)
4781 elf_link_adjust_relocs (abfd, elf_section_data (o)->rel_hdr2,
4782 elf_section_data (o)->rel_count2,
3e932841 4783 (elf_section_data (o)->rel_hashes
31367b81 4784 + elf_section_data (o)->rel_count));
252b5132
RH
4785
4786 /* Set the reloc_count field to 0 to prevent write_relocs from
4787 trying to swap the relocs out itself. */
4788 o->reloc_count = 0;
4789 }
4790
4791 /* If we are linking against a dynamic object, or generating a
4792 shared library, finish up the dynamic linking information. */
4793 if (dynamic)
4794 {
4795 Elf_External_Dyn *dyncon, *dynconend;
4796
4797 /* Fix up .dynamic entries. */
4798 o = bfd_get_section_by_name (dynobj, ".dynamic");
4799 BFD_ASSERT (o != NULL);
4800
4801 dyncon = (Elf_External_Dyn *) o->contents;
4802 dynconend = (Elf_External_Dyn *) (o->contents + o->_raw_size);
4803 for (; dyncon < dynconend; dyncon++)
4804 {
4805 Elf_Internal_Dyn dyn;
4806 const char *name;
4807 unsigned int type;
4808
4809 elf_swap_dyn_in (dynobj, dyncon, &dyn);
4810
4811 switch (dyn.d_tag)
4812 {
4813 default:
4814 break;
252b5132 4815 case DT_INIT:
f0c2e336 4816 name = info->init_function;
252b5132
RH
4817 goto get_sym;
4818 case DT_FINI:
f0c2e336 4819 name = info->fini_function;
252b5132
RH
4820 get_sym:
4821 {
4822 struct elf_link_hash_entry *h;
4823
4824 h = elf_link_hash_lookup (elf_hash_table (info), name,
4825 false, false, true);
4826 if (h != NULL
4827 && (h->root.type == bfd_link_hash_defined
4828 || h->root.type == bfd_link_hash_defweak))
4829 {
4830 dyn.d_un.d_val = h->root.u.def.value;
4831 o = h->root.u.def.section;
4832 if (o->output_section != NULL)
4833 dyn.d_un.d_val += (o->output_section->vma
4834 + o->output_offset);
4835 else
4836 {
4837 /* The symbol is imported from another shared
4838 library and does not apply to this one. */
4839 dyn.d_un.d_val = 0;
4840 }
4841
4842 elf_swap_dyn_out (dynobj, &dyn, dyncon);
4843 }
4844 }
4845 break;
4846
4847 case DT_HASH:
4848 name = ".hash";
4849 goto get_vma;
4850 case DT_STRTAB:
4851 name = ".dynstr";
4852 goto get_vma;
4853 case DT_SYMTAB:
4854 name = ".dynsym";
4855 goto get_vma;
4856 case DT_VERDEF:
4857 name = ".gnu.version_d";
4858 goto get_vma;
4859 case DT_VERNEED:
4860 name = ".gnu.version_r";
4861 goto get_vma;
4862 case DT_VERSYM:
4863 name = ".gnu.version";
4864 get_vma:
4865 o = bfd_get_section_by_name (abfd, name);
4866 BFD_ASSERT (o != NULL);
4867 dyn.d_un.d_ptr = o->vma;
4868 elf_swap_dyn_out (dynobj, &dyn, dyncon);
4869 break;
4870
4871 case DT_REL:
4872 case DT_RELA:
4873 case DT_RELSZ:
4874 case DT_RELASZ:
4875 if (dyn.d_tag == DT_REL || dyn.d_tag == DT_RELSZ)
4876 type = SHT_REL;
4877 else
4878 type = SHT_RELA;
4879 dyn.d_un.d_val = 0;
4880 for (i = 1; i < elf_elfheader (abfd)->e_shnum; i++)
4881 {
4882 Elf_Internal_Shdr *hdr;
4883
4884 hdr = elf_elfsections (abfd)[i];
4885 if (hdr->sh_type == type
4886 && (hdr->sh_flags & SHF_ALLOC) != 0)
4887 {
4888 if (dyn.d_tag == DT_RELSZ || dyn.d_tag == DT_RELASZ)
4889 dyn.d_un.d_val += hdr->sh_size;
4890 else
4891 {
4892 if (dyn.d_un.d_val == 0
4893 || hdr->sh_addr < dyn.d_un.d_val)
4894 dyn.d_un.d_val = hdr->sh_addr;
4895 }
4896 }
4897 }
4898 elf_swap_dyn_out (dynobj, &dyn, dyncon);
4899 break;
4900 }
4901 }
4902 }
4903
4904 /* If we have created any dynamic sections, then output them. */
4905 if (dynobj != NULL)
4906 {
4907 if (! (*bed->elf_backend_finish_dynamic_sections) (abfd, info))
4908 goto error_return;
4909
4910 for (o = dynobj->sections; o != NULL; o = o->next)
4911 {
4912 if ((o->flags & SEC_HAS_CONTENTS) == 0
fc8c40a0
AM
4913 || o->_raw_size == 0
4914 || o->output_section == bfd_abs_section_ptr)
252b5132
RH
4915 continue;
4916 if ((o->flags & SEC_LINKER_CREATED) == 0)
4917 {
4918 /* At this point, we are only interested in sections
4919 created by elf_link_create_dynamic_sections. */
4920 continue;
4921 }
4922 if ((elf_section_data (o->output_section)->this_hdr.sh_type
4923 != SHT_STRTAB)
4924 || strcmp (bfd_get_section_name (abfd, o), ".dynstr") != 0)
4925 {
4926 if (! bfd_set_section_contents (abfd, o->output_section,
4927 o->contents, o->output_offset,
4928 o->_raw_size))
4929 goto error_return;
4930 }
4931 else
4932 {
4933 file_ptr off;
4934
4935 /* The contents of the .dynstr section are actually in a
4936 stringtab. */
4937 off = elf_section_data (o->output_section)->this_hdr.sh_offset;
4938 if (bfd_seek (abfd, off, SEEK_SET) != 0
4939 || ! _bfd_stringtab_emit (abfd,
4940 elf_hash_table (info)->dynstr))
4941 goto error_return;
4942 }
4943 }
4944 }
4945
4946 /* If we have optimized stabs strings, output them. */
4947 if (elf_hash_table (info)->stab_info != NULL)
4948 {
4949 if (! _bfd_write_stab_strings (abfd, &elf_hash_table (info)->stab_info))
4950 goto error_return;
4951 }
4952
4953 if (finfo.symstrtab != NULL)
4954 _bfd_stringtab_free (finfo.symstrtab);
4955 if (finfo.contents != NULL)
4956 free (finfo.contents);
4957 if (finfo.external_relocs != NULL)
4958 free (finfo.external_relocs);
4959 if (finfo.internal_relocs != NULL)
4960 free (finfo.internal_relocs);
4961 if (finfo.external_syms != NULL)
4962 free (finfo.external_syms);
4963 if (finfo.internal_syms != NULL)
4964 free (finfo.internal_syms);
4965 if (finfo.indices != NULL)
4966 free (finfo.indices);
4967 if (finfo.sections != NULL)
4968 free (finfo.sections);
4969 if (finfo.symbuf != NULL)
4970 free (finfo.symbuf);
4971 for (o = abfd->sections; o != NULL; o = o->next)
4972 {
4973 if ((o->flags & SEC_RELOC) != 0
4974 && elf_section_data (o)->rel_hashes != NULL)
4975 free (elf_section_data (o)->rel_hashes);
4976 }
4977
4978 elf_tdata (abfd)->linker = true;
4979
4980 return true;
4981
4982 error_return:
4983 if (finfo.symstrtab != NULL)
4984 _bfd_stringtab_free (finfo.symstrtab);
4985 if (finfo.contents != NULL)
4986 free (finfo.contents);
4987 if (finfo.external_relocs != NULL)
4988 free (finfo.external_relocs);
4989 if (finfo.internal_relocs != NULL)
4990 free (finfo.internal_relocs);
4991 if (finfo.external_syms != NULL)
4992 free (finfo.external_syms);
4993 if (finfo.internal_syms != NULL)
4994 free (finfo.internal_syms);
4995 if (finfo.indices != NULL)
4996 free (finfo.indices);
4997 if (finfo.sections != NULL)
4998 free (finfo.sections);
4999 if (finfo.symbuf != NULL)
5000 free (finfo.symbuf);
5001 for (o = abfd->sections; o != NULL; o = o->next)
5002 {
5003 if ((o->flags & SEC_RELOC) != 0
5004 && elf_section_data (o)->rel_hashes != NULL)
5005 free (elf_section_data (o)->rel_hashes);
5006 }
5007
5008 return false;
5009}
5010
5011/* Add a symbol to the output symbol table. */
5012
5013static boolean
5014elf_link_output_sym (finfo, name, elfsym, input_sec)
5015 struct elf_final_link_info *finfo;
5016 const char *name;
5017 Elf_Internal_Sym *elfsym;
5018 asection *input_sec;
5019{
5020 boolean (*output_symbol_hook) PARAMS ((bfd *,
5021 struct bfd_link_info *info,
5022 const char *,
5023 Elf_Internal_Sym *,
5024 asection *));
5025
5026 output_symbol_hook = get_elf_backend_data (finfo->output_bfd)->
5027 elf_backend_link_output_symbol_hook;
5028 if (output_symbol_hook != NULL)
5029 {
5030 if (! ((*output_symbol_hook)
5031 (finfo->output_bfd, finfo->info, name, elfsym, input_sec)))
5032 return false;
5033 }
5034
5035 if (name == (const char *) NULL || *name == '\0')
5036 elfsym->st_name = 0;
5037 else if (input_sec->flags & SEC_EXCLUDE)
5038 elfsym->st_name = 0;
5039 else
5040 {
5041 elfsym->st_name = (unsigned long) _bfd_stringtab_add (finfo->symstrtab,
5042 name, true,
5043 false);
5044 if (elfsym->st_name == (unsigned long) -1)
5045 return false;
5046 }
5047
5048 if (finfo->symbuf_count >= finfo->symbuf_size)
5049 {
5050 if (! elf_link_flush_output_syms (finfo))
5051 return false;
5052 }
5053
5054 elf_swap_symbol_out (finfo->output_bfd, elfsym,
5055 (PTR) (finfo->symbuf + finfo->symbuf_count));
5056 ++finfo->symbuf_count;
5057
5058 ++ bfd_get_symcount (finfo->output_bfd);
5059
5060 return true;
5061}
5062
5063/* Flush the output symbols to the file. */
5064
5065static boolean
5066elf_link_flush_output_syms (finfo)
5067 struct elf_final_link_info *finfo;
5068{
5069 if (finfo->symbuf_count > 0)
5070 {
5071 Elf_Internal_Shdr *symtab;
5072
5073 symtab = &elf_tdata (finfo->output_bfd)->symtab_hdr;
5074
5075 if (bfd_seek (finfo->output_bfd, symtab->sh_offset + symtab->sh_size,
5076 SEEK_SET) != 0
5077 || (bfd_write ((PTR) finfo->symbuf, finfo->symbuf_count,
5078 sizeof (Elf_External_Sym), finfo->output_bfd)
5079 != finfo->symbuf_count * sizeof (Elf_External_Sym)))
5080 return false;
5081
5082 symtab->sh_size += finfo->symbuf_count * sizeof (Elf_External_Sym);
5083
5084 finfo->symbuf_count = 0;
5085 }
5086
5087 return true;
5088}
5089
f5fa8ca2
JJ
5090/* Adjust all external symbols pointing into SEC_MERGE sections
5091 to reflect the object merging within the sections. */
5092
5093static boolean
5094elf_link_sec_merge_syms (h, data)
5095 struct elf_link_hash_entry *h;
5096 PTR data;
5097{
5098 asection *sec;
5099
5100 if ((h->root.type == bfd_link_hash_defined
5101 || h->root.type == bfd_link_hash_defweak)
5102 && ((sec = h->root.u.def.section)->flags & SEC_MERGE)
5103 && elf_section_data (sec)->merge_info)
5104 {
5105 bfd *output_bfd = (bfd *) data;
5106
5107 h->root.u.def.value =
5108 _bfd_merged_section_offset (output_bfd,
5109 &h->root.u.def.section,
5110 elf_section_data (sec)->merge_info,
5111 h->root.u.def.value, (bfd_vma) 0);
5112 }
5113
5114 return true;
5115}
5116
252b5132
RH
5117/* Add an external symbol to the symbol table. This is called from
5118 the hash table traversal routine. When generating a shared object,
5119 we go through the symbol table twice. The first time we output
5120 anything that might have been forced to local scope in a version
5121 script. The second time we output the symbols that are still
5122 global symbols. */
5123
5124static boolean
5125elf_link_output_extsym (h, data)
5126 struct elf_link_hash_entry *h;
5127 PTR data;
5128{
5129 struct elf_outext_info *eoinfo = (struct elf_outext_info *) data;
5130 struct elf_final_link_info *finfo = eoinfo->finfo;
5131 boolean strip;
5132 Elf_Internal_Sym sym;
5133 asection *input_sec;
5134
5135 /* Decide whether to output this symbol in this pass. */
5136 if (eoinfo->localsyms)
5137 {
5138 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
5139 return true;
5140 }
5141 else
5142 {
5143 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
5144 return true;
5145 }
5146
5147 /* If we are not creating a shared library, and this symbol is
5148 referenced by a shared library but is not defined anywhere, then
5149 warn that it is undefined. If we do not do this, the runtime
5150 linker will complain that the symbol is undefined when the
5151 program is run. We don't have to worry about symbols that are
5152 referenced by regular files, because we will already have issued
5153 warnings for them. */
5154 if (! finfo->info->relocateable
b79e8c78 5155 && ! finfo->info->allow_shlib_undefined
252b5132 5156 && ! (finfo->info->shared
252b5132
RH
5157 && !finfo->info->no_undefined)
5158 && h->root.type == bfd_link_hash_undefined
5159 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0
5160 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
5161 {
5162 if (! ((*finfo->info->callbacks->undefined_symbol)
5163 (finfo->info, h->root.root.string, h->root.u.undef.abfd,
5cc7c785 5164 (asection *) NULL, 0, true)))
252b5132
RH
5165 {
5166 eoinfo->failed = true;
5167 return false;
5168 }
5169 }
5170
5171 /* We don't want to output symbols that have never been mentioned by
5172 a regular file, or that we have been told to strip. However, if
5173 h->indx is set to -2, the symbol is used by a reloc and we must
5174 output it. */
5175 if (h->indx == -2)
5176 strip = false;
5177 else if (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
5178 || (h->elf_link_hash_flags & ELF_LINK_HASH_REF_DYNAMIC) != 0)
5179 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0
5180 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) == 0)
5181 strip = true;
5182 else if (finfo->info->strip == strip_all
5183 || (finfo->info->strip == strip_some
5184 && bfd_hash_lookup (finfo->info->keep_hash,
5185 h->root.root.string,
5186 false, false) == NULL))
5187 strip = true;
5188 else
5189 strip = false;
5190
5191 /* If we're stripping it, and it's not a dynamic symbol, there's
2bd171e0
ILT
5192 nothing else to do unless it is a forced local symbol. */
5193 if (strip
5194 && h->dynindx == -1
5195 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
252b5132
RH
5196 return true;
5197
5198 sym.st_value = 0;
5199 sym.st_size = h->size;
5200 sym.st_other = h->other;
5201 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
5202 sym.st_info = ELF_ST_INFO (STB_LOCAL, h->type);
5203 else if (h->root.type == bfd_link_hash_undefweak
5204 || h->root.type == bfd_link_hash_defweak)
5205 sym.st_info = ELF_ST_INFO (STB_WEAK, h->type);
5206 else
5207 sym.st_info = ELF_ST_INFO (STB_GLOBAL, h->type);
5208
5209 switch (h->root.type)
5210 {
5211 default:
5212 case bfd_link_hash_new:
5213 abort ();
5214 return false;
5215
5216 case bfd_link_hash_undefined:
5217 input_sec = bfd_und_section_ptr;
5218 sym.st_shndx = SHN_UNDEF;
5219 break;
5220
5221 case bfd_link_hash_undefweak:
5222 input_sec = bfd_und_section_ptr;
5223 sym.st_shndx = SHN_UNDEF;
5224 break;
5225
5226 case bfd_link_hash_defined:
5227 case bfd_link_hash_defweak:
5228 {
5229 input_sec = h->root.u.def.section;
5230 if (input_sec->output_section != NULL)
5231 {
5232 sym.st_shndx =
5233 _bfd_elf_section_from_bfd_section (finfo->output_bfd,
5234 input_sec->output_section);
5235 if (sym.st_shndx == (unsigned short) -1)
5236 {
5237 (*_bfd_error_handler)
5238 (_("%s: could not find output section %s for input section %s"),
5239 bfd_get_filename (finfo->output_bfd),
5240 input_sec->output_section->name,
5241 input_sec->name);
5242 eoinfo->failed = true;
5243 return false;
5244 }
5245
5246 /* ELF symbols in relocateable files are section relative,
5247 but in nonrelocateable files they are virtual
5248 addresses. */
5249 sym.st_value = h->root.u.def.value + input_sec->output_offset;
5250 if (! finfo->info->relocateable)
5251 sym.st_value += input_sec->output_section->vma;
5252 }
5253 else
5254 {
5255 BFD_ASSERT (input_sec->owner == NULL
5256 || (input_sec->owner->flags & DYNAMIC) != 0);
5257 sym.st_shndx = SHN_UNDEF;
5258 input_sec = bfd_und_section_ptr;
5259 }
5260 }
5261 break;
5262
5263 case bfd_link_hash_common:
5264 input_sec = h->root.u.c.p->section;
5265 sym.st_shndx = SHN_COMMON;
5266 sym.st_value = 1 << h->root.u.c.p->alignment_power;
5267 break;
5268
5269 case bfd_link_hash_indirect:
5270 /* These symbols are created by symbol versioning. They point
5271 to the decorated version of the name. For example, if the
5272 symbol foo@@GNU_1.2 is the default, which should be used when
5273 foo is used with no version, then we add an indirect symbol
5274 foo which points to foo@@GNU_1.2. We ignore these symbols,
94b6c40a
L
5275 since the indirected symbol is already in the hash table. */
5276 return true;
252b5132 5277
252b5132
RH
5278 case bfd_link_hash_warning:
5279 /* We can't represent these symbols in ELF, although a warning
5280 symbol may have come from a .gnu.warning.SYMBOL section. We
5281 just put the target symbol in the hash table. If the target
5282 symbol does not really exist, don't do anything. */
5283 if (h->root.u.i.link->type == bfd_link_hash_new)
5284 return true;
5285 return (elf_link_output_extsym
5286 ((struct elf_link_hash_entry *) h->root.u.i.link, data));
5287 }
5288
5289 /* Give the processor backend a chance to tweak the symbol value,
5290 and also to finish up anything that needs to be done for this
5291 symbol. */
5292 if ((h->dynindx != -1
5293 || (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
5294 && elf_hash_table (finfo->info)->dynamic_sections_created)
5295 {
5296 struct elf_backend_data *bed;
5297
5298 bed = get_elf_backend_data (finfo->output_bfd);
5299 if (! ((*bed->elf_backend_finish_dynamic_symbol)
5300 (finfo->output_bfd, finfo->info, h, &sym)))
5301 {
5302 eoinfo->failed = true;
5303 return false;
5304 }
5305 }
5306
5307 /* If we are marking the symbol as undefined, and there are no
5308 non-weak references to this symbol from a regular object, then
91d3970e
ILT
5309 mark the symbol as weak undefined; if there are non-weak
5310 references, mark the symbol as strong. We can't do this earlier,
252b5132
RH
5311 because it might not be marked as undefined until the
5312 finish_dynamic_symbol routine gets through with it. */
5313 if (sym.st_shndx == SHN_UNDEF
252b5132 5314 && (h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR) != 0
91d3970e
ILT
5315 && (ELF_ST_BIND(sym.st_info) == STB_GLOBAL
5316 || ELF_ST_BIND(sym.st_info) == STB_WEAK))
5317 {
5318 int bindtype;
5319
5320 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK) != 0)
5321 bindtype = STB_GLOBAL;
5322 else
5323 bindtype = STB_WEAK;
5324 sym.st_info = ELF_ST_INFO (bindtype, ELF_ST_TYPE (sym.st_info));
5325 }
252b5132 5326
32c092c3 5327 /* If a symbol is not defined locally, we clear the visibility
3e932841 5328 field. */
32c092c3
L
5329 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
5330 sym.st_other ^= ELF_ST_VISIBILITY(sym.st_other);
5331
252b5132
RH
5332 /* If this symbol should be put in the .dynsym section, then put it
5333 there now. We have already know the symbol index. We also fill
5334 in the entry in the .hash section. */
5335 if (h->dynindx != -1
5336 && elf_hash_table (finfo->info)->dynamic_sections_created)
5337 {
5338 size_t bucketcount;
5339 size_t bucket;
c7ac6ff8 5340 size_t hash_entry_size;
252b5132
RH
5341 bfd_byte *bucketpos;
5342 bfd_vma chain;
5343
5344 sym.st_name = h->dynstr_index;
5345
5346 elf_swap_symbol_out (finfo->output_bfd, &sym,
5347 (PTR) (((Elf_External_Sym *)
5348 finfo->dynsym_sec->contents)
5349 + h->dynindx));
5350
5351 bucketcount = elf_hash_table (finfo->info)->bucketcount;
5352 bucket = h->elf_hash_value % bucketcount;
3e932841 5353 hash_entry_size
c7ac6ff8 5354 = elf_section_data (finfo->hash_sec)->this_hdr.sh_entsize;
252b5132 5355 bucketpos = ((bfd_byte *) finfo->hash_sec->contents
c7ac6ff8
MM
5356 + (bucket + 2) * hash_entry_size);
5357 chain = bfd_get (8 * hash_entry_size, finfo->output_bfd, bucketpos);
5358 bfd_put (8 * hash_entry_size, finfo->output_bfd, h->dynindx, bucketpos);
5359 bfd_put (8 * hash_entry_size, finfo->output_bfd, chain,
5360 ((bfd_byte *) finfo->hash_sec->contents
5361 + (bucketcount + 2 + h->dynindx) * hash_entry_size));
252b5132
RH
5362
5363 if (finfo->symver_sec != NULL && finfo->symver_sec->contents != NULL)
5364 {
5365 Elf_Internal_Versym iversym;
5366
5367 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
5368 {
5369 if (h->verinfo.verdef == NULL)
5370 iversym.vs_vers = 0;
5371 else
5372 iversym.vs_vers = h->verinfo.verdef->vd_exp_refno + 1;
5373 }
5374 else
5375 {
5376 if (h->verinfo.vertree == NULL)
5377 iversym.vs_vers = 1;
5378 else
5379 iversym.vs_vers = h->verinfo.vertree->vernum + 1;
5380 }
5381
5382 if ((h->elf_link_hash_flags & ELF_LINK_HIDDEN) != 0)
5383 iversym.vs_vers |= VERSYM_HIDDEN;
5384
5385 _bfd_elf_swap_versym_out (finfo->output_bfd, &iversym,
5386 (((Elf_External_Versym *)
5387 finfo->symver_sec->contents)
5388 + h->dynindx));
5389 }
5390 }
5391
5392 /* If we're stripping it, then it was just a dynamic symbol, and
5393 there's nothing else to do. */
5394 if (strip)
5395 return true;
5396
5397 h->indx = bfd_get_symcount (finfo->output_bfd);
5398
5399 if (! elf_link_output_sym (finfo, h->root.root.string, &sym, input_sec))
5400 {
5401 eoinfo->failed = true;
5402 return false;
5403 }
5404
5405 return true;
5406}
5407
23bc299b
MM
5408/* Copy the relocations indicated by the INTERNAL_RELOCS (which
5409 originated from the section given by INPUT_REL_HDR) to the
5410 OUTPUT_BFD. */
5411
5412static void
3e932841 5413elf_link_output_relocs (output_bfd, input_section, input_rel_hdr,
23bc299b
MM
5414 internal_relocs)
5415 bfd *output_bfd;
5416 asection *input_section;
5417 Elf_Internal_Shdr *input_rel_hdr;
5418 Elf_Internal_Rela *internal_relocs;
5419{
5420 Elf_Internal_Rela *irela;
5421 Elf_Internal_Rela *irelaend;
5422 Elf_Internal_Shdr *output_rel_hdr;
5423 asection *output_section;
7442e600 5424 unsigned int *rel_countp = NULL;
32f0787a 5425 struct elf_backend_data *bed;
23bc299b
MM
5426
5427 output_section = input_section->output_section;
5428 output_rel_hdr = NULL;
5429
3e932841 5430 if (elf_section_data (output_section)->rel_hdr.sh_entsize
23bc299b
MM
5431 == input_rel_hdr->sh_entsize)
5432 {
5433 output_rel_hdr = &elf_section_data (output_section)->rel_hdr;
5434 rel_countp = &elf_section_data (output_section)->rel_count;
5435 }
5436 else if (elf_section_data (output_section)->rel_hdr2
5437 && (elf_section_data (output_section)->rel_hdr2->sh_entsize
5438 == input_rel_hdr->sh_entsize))
5439 {
5440 output_rel_hdr = elf_section_data (output_section)->rel_hdr2;
5441 rel_countp = &elf_section_data (output_section)->rel_count2;
5442 }
5443
5444 BFD_ASSERT (output_rel_hdr != NULL);
32f0787a
UC
5445
5446 bed = get_elf_backend_data (output_bfd);
23bc299b
MM
5447 irela = internal_relocs;
5448 irelaend = irela + input_rel_hdr->sh_size / input_rel_hdr->sh_entsize;
5449 if (input_rel_hdr->sh_entsize == sizeof (Elf_External_Rel))
5450 {
5451 Elf_External_Rel *erel;
5452
5453 erel = ((Elf_External_Rel *) output_rel_hdr->contents + *rel_countp);
5454 for (; irela < irelaend; irela++, erel++)
5455 {
5456 Elf_Internal_Rel irel;
5457
5458 irel.r_offset = irela->r_offset;
5459 irel.r_info = irela->r_info;
5460 BFD_ASSERT (irela->r_addend == 0);
32f0787a
UC
5461 if (bed->s->swap_reloc_out)
5462 (*bed->s->swap_reloc_out) (output_bfd, &irel, (PTR) erel);
5463 else
5464 elf_swap_reloc_out (output_bfd, &irel, erel);
23bc299b
MM
5465 }
5466 }
5467 else
5468 {
5469 Elf_External_Rela *erela;
5470
5471 BFD_ASSERT (input_rel_hdr->sh_entsize
5472 == sizeof (Elf_External_Rela));
5473 erela = ((Elf_External_Rela *) output_rel_hdr->contents + *rel_countp);
5474 for (; irela < irelaend; irela++, erela++)
32f0787a
UC
5475 if (bed->s->swap_reloca_out)
5476 (*bed->s->swap_reloca_out) (output_bfd, irela, (PTR) erela);
5477 else
5478 elf_swap_reloca_out (output_bfd, irela, erela);
23bc299b
MM
5479 }
5480
5481 /* Bump the counter, so that we know where to add the next set of
5482 relocations. */
5483 *rel_countp += input_rel_hdr->sh_size / input_rel_hdr->sh_entsize;
5484}
5485
252b5132
RH
5486/* Link an input file into the linker output file. This function
5487 handles all the sections and relocations of the input file at once.
5488 This is so that we only have to read the local symbols once, and
5489 don't have to keep them in memory. */
5490
5491static boolean
5492elf_link_input_bfd (finfo, input_bfd)
5493 struct elf_final_link_info *finfo;
5494 bfd *input_bfd;
5495{
5496 boolean (*relocate_section) PARAMS ((bfd *, struct bfd_link_info *,
5497 bfd *, asection *, bfd_byte *,
5498 Elf_Internal_Rela *,
5499 Elf_Internal_Sym *, asection **));
5500 bfd *output_bfd;
5501 Elf_Internal_Shdr *symtab_hdr;
5502 size_t locsymcount;
5503 size_t extsymoff;
5504 Elf_External_Sym *external_syms;
5505 Elf_External_Sym *esym;
5506 Elf_External_Sym *esymend;
5507 Elf_Internal_Sym *isym;
5508 long *pindex;
5509 asection **ppsection;
5510 asection *o;
c7ac6ff8 5511 struct elf_backend_data *bed;
252b5132
RH
5512
5513 output_bfd = finfo->output_bfd;
c7ac6ff8
MM
5514 bed = get_elf_backend_data (output_bfd);
5515 relocate_section = bed->elf_backend_relocate_section;
252b5132
RH
5516
5517 /* If this is a dynamic object, we don't want to do anything here:
5518 we don't want the local symbols, and we don't want the section
5519 contents. */
5520 if ((input_bfd->flags & DYNAMIC) != 0)
5521 return true;
5522
5523 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
5524 if (elf_bad_symtab (input_bfd))
5525 {
5526 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
5527 extsymoff = 0;
5528 }
5529 else
5530 {
5531 locsymcount = symtab_hdr->sh_info;
5532 extsymoff = symtab_hdr->sh_info;
5533 }
5534
5535 /* Read the local symbols. */
5536 if (symtab_hdr->contents != NULL)
5537 external_syms = (Elf_External_Sym *) symtab_hdr->contents;
5538 else if (locsymcount == 0)
5539 external_syms = NULL;
5540 else
5541 {
5542 external_syms = finfo->external_syms;
5543 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
5544 || (bfd_read (external_syms, sizeof (Elf_External_Sym),
5545 locsymcount, input_bfd)
5546 != locsymcount * sizeof (Elf_External_Sym)))
5547 return false;
5548 }
5549
5550 /* Swap in the local symbols and write out the ones which we know
5551 are going into the output file. */
5552 esym = external_syms;
5553 esymend = esym + locsymcount;
5554 isym = finfo->internal_syms;
5555 pindex = finfo->indices;
5556 ppsection = finfo->sections;
5557 for (; esym < esymend; esym++, isym++, pindex++, ppsection++)
5558 {
5559 asection *isec;
5560 const char *name;
5561 Elf_Internal_Sym osym;
5562
5563 elf_swap_symbol_in (input_bfd, esym, isym);
5564 *pindex = -1;
5565
5566 if (elf_bad_symtab (input_bfd))
5567 {
5568 if (ELF_ST_BIND (isym->st_info) != STB_LOCAL)
5569 {
5570 *ppsection = NULL;
5571 continue;
5572 }
5573 }
5574
ea412e04 5575 name = NULL;
252b5132 5576 if (isym->st_shndx == SHN_UNDEF)
ea412e04
L
5577 {
5578 isec = bfd_und_section_ptr;
5579 name = isec->name;
5580 }
252b5132 5581 else if (isym->st_shndx > 0 && isym->st_shndx < SHN_LORESERVE)
f5fa8ca2
JJ
5582 {
5583 isec = section_from_elf_index (input_bfd, isym->st_shndx);
5584 if (isec && elf_section_data (isec)->merge_info
5585 && ELF_ST_TYPE (isym->st_info) != STT_SECTION)
5586 isym->st_value =
5587 _bfd_merged_section_offset (output_bfd, &isec,
5588 elf_section_data (isec)->merge_info,
5589 isym->st_value, (bfd_vma) 0);
5590 }
252b5132 5591 else if (isym->st_shndx == SHN_ABS)
ea412e04
L
5592 {
5593 isec = bfd_abs_section_ptr;
5594 name = isec->name;
5595 }
252b5132 5596 else if (isym->st_shndx == SHN_COMMON)
ea412e04
L
5597 {
5598 isec = bfd_com_section_ptr;
5599 name = isec->name;
5600 }
252b5132
RH
5601 else
5602 {
5603 /* Who knows? */
5604 isec = NULL;
5605 }
5606
5607 *ppsection = isec;
5608
5609 /* Don't output the first, undefined, symbol. */
5610 if (esym == external_syms)
5611 continue;
5612
24376d1b
AM
5613 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
5614 {
5615 asection *ksec;
5616
5617 /* Save away all section symbol values. */
5618 if (isec != NULL)
ea412e04
L
5619 {
5620 if (name)
5621 {
5622 if (isec->symbol->value != isym->st_value)
5623 (*_bfd_error_handler)
5624 (_("%s: invalid section symbol index 0x%x (%s) ingored"),
5625 bfd_get_filename (input_bfd), isym->st_shndx,
5626 name);
5627 continue;
5628 }
5629 isec->symbol->value = isym->st_value;
5630 }
24376d1b
AM
5631
5632 /* If this is a discarded link-once section symbol, update
5633 it's value to that of the kept section symbol. The
5634 linker will keep the first of any matching link-once
5635 sections, so we should have already seen it's section
5636 symbol. I trust no-one will have the bright idea of
5637 re-ordering the bfd list... */
5638 if (isec != NULL
5639 && (bfd_get_section_flags (input_bfd, isec) & SEC_LINK_ONCE) != 0
5640 && (ksec = isec->kept_section) != NULL)
5641 {
5642 isym->st_value = ksec->symbol->value;
5643
5644 /* That put the value right, but the section info is all
5645 wrong. I hope this works. */
5646 isec->output_offset = ksec->output_offset;
5647 isec->output_section = ksec->output_section;
5648 }
5649
5650 /* We never output section symbols. Instead, we use the
5651 section symbol of the corresponding section in the output
5652 file. */
5653 continue;
5654 }
5655
252b5132
RH
5656 /* If we are stripping all symbols, we don't want to output this
5657 one. */
5658 if (finfo->info->strip == strip_all)
5659 continue;
5660
252b5132
RH
5661 /* If we are discarding all local symbols, we don't want to
5662 output this one. If we are generating a relocateable output
5663 file, then some of the local symbols may be required by
5664 relocs; we output them below as we discover that they are
5665 needed. */
5666 if (finfo->info->discard == discard_all)
5667 continue;
5668
5669 /* If this symbol is defined in a section which we are
5670 discarding, we don't need to keep it, but note that
5671 linker_mark is only reliable for sections that have contents.
5672 For the benefit of the MIPS ELF linker, we check SEC_EXCLUDE
5673 as well as linker_mark. */
5674 if (isym->st_shndx > 0
5675 && isym->st_shndx < SHN_LORESERVE
5676 && isec != NULL
5677 && ((! isec->linker_mark && (isec->flags & SEC_HAS_CONTENTS) != 0)
5678 || (! finfo->info->relocateable
5679 && (isec->flags & SEC_EXCLUDE) != 0)))
5680 continue;
5681
5682 /* Get the name of the symbol. */
5683 name = bfd_elf_string_from_elf_section (input_bfd, symtab_hdr->sh_link,
5684 isym->st_name);
5685 if (name == NULL)
5686 return false;
5687
5688 /* See if we are discarding symbols with this name. */
5689 if ((finfo->info->strip == strip_some
5690 && (bfd_hash_lookup (finfo->info->keep_hash, name, false, false)
5691 == NULL))
f5fa8ca2
JJ
5692 || (((finfo->info->discard == discard_sec_merge
5693 && (isec->flags & SEC_MERGE) && ! finfo->info->relocateable)
5694 || finfo->info->discard == discard_l)
252b5132
RH
5695 && bfd_is_local_label_name (input_bfd, name)))
5696 continue;
5697
5698 /* If we get here, we are going to output this symbol. */
5699
5700 osym = *isym;
5701
5702 /* Adjust the section index for the output file. */
5703 osym.st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
5704 isec->output_section);
5705 if (osym.st_shndx == (unsigned short) -1)
5706 return false;
5707
5708 *pindex = bfd_get_symcount (output_bfd);
5709
5710 /* ELF symbols in relocateable files are section relative, but
5711 in executable files they are virtual addresses. Note that
5712 this code assumes that all ELF sections have an associated
5713 BFD section with a reasonable value for output_offset; below
5714 we assume that they also have a reasonable value for
5715 output_section. Any special sections must be set up to meet
5716 these requirements. */
5717 osym.st_value += isec->output_offset;
5718 if (! finfo->info->relocateable)
5719 osym.st_value += isec->output_section->vma;
5720
5721 if (! elf_link_output_sym (finfo, name, &osym, isec))
5722 return false;
5723 }
5724
5725 /* Relocate the contents of each section. */
5726 for (o = input_bfd->sections; o != NULL; o = o->next)
5727 {
5728 bfd_byte *contents;
5729
5730 if (! o->linker_mark)
5731 {
5732 /* This section was omitted from the link. */
5733 continue;
5734 }
5735
5736 if ((o->flags & SEC_HAS_CONTENTS) == 0
5737 || (o->_raw_size == 0 && (o->flags & SEC_RELOC) == 0))
5738 continue;
5739
5740 if ((o->flags & SEC_LINKER_CREATED) != 0)
5741 {
5742 /* Section was created by elf_link_create_dynamic_sections
5743 or somesuch. */
5744 continue;
5745 }
5746
5747 /* Get the contents of the section. They have been cached by a
5748 relaxation routine. Note that o is a section in an input
5749 file, so the contents field will not have been set by any of
5750 the routines which work on output files. */
5751 if (elf_section_data (o)->this_hdr.contents != NULL)
5752 contents = elf_section_data (o)->this_hdr.contents;
5753 else
5754 {
5755 contents = finfo->contents;
5756 if (! bfd_get_section_contents (input_bfd, o, contents,
5757 (file_ptr) 0, o->_raw_size))
5758 return false;
5759 }
5760
5761 if ((o->flags & SEC_RELOC) != 0)
5762 {
5763 Elf_Internal_Rela *internal_relocs;
5764
5765 /* Get the swapped relocs. */
5766 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
5767 (input_bfd, o, finfo->external_relocs,
5768 finfo->internal_relocs, false));
5769 if (internal_relocs == NULL
5770 && o->reloc_count > 0)
5771 return false;
5772
5773 /* Relocate the section by invoking a back end routine.
5774
5775 The back end routine is responsible for adjusting the
5776 section contents as necessary, and (if using Rela relocs
5777 and generating a relocateable output file) adjusting the
5778 reloc addend as necessary.
5779
5780 The back end routine does not have to worry about setting
5781 the reloc address or the reloc symbol index.
5782
5783 The back end routine is given a pointer to the swapped in
5784 internal symbols, and can access the hash table entries
5785 for the external symbols via elf_sym_hashes (input_bfd).
5786
5787 When generating relocateable output, the back end routine
5788 must handle STB_LOCAL/STT_SECTION symbols specially. The
5789 output symbol is going to be a section symbol
5790 corresponding to the output section, which will require
5791 the addend to be adjusted. */
5792
5793 if (! (*relocate_section) (output_bfd, finfo->info,
5794 input_bfd, o, contents,
5795 internal_relocs,
5796 finfo->internal_syms,
5797 finfo->sections))
5798 return false;
5799
a712da20 5800 if (finfo->info->relocateable || finfo->info->emitrelocations)
252b5132
RH
5801 {
5802 Elf_Internal_Rela *irela;
5803 Elf_Internal_Rela *irelaend;
5804 struct elf_link_hash_entry **rel_hash;
5805 Elf_Internal_Shdr *input_rel_hdr;
252b5132
RH
5806
5807 /* Adjust the reloc addresses and symbol indices. */
5808
5809 irela = internal_relocs;
3e932841 5810 irelaend =
c7ac6ff8 5811 irela + o->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132 5812 rel_hash = (elf_section_data (o->output_section)->rel_hashes
31367b81
MM
5813 + elf_section_data (o->output_section)->rel_count
5814 + elf_section_data (o->output_section)->rel_count2);
252b5132
RH
5815 for (; irela < irelaend; irela++, rel_hash++)
5816 {
5817 unsigned long r_symndx;
5818 Elf_Internal_Sym *isym;
5819 asection *sec;
5820
5821 irela->r_offset += o->output_offset;
5822
7ad34365
NC
5823 /* Relocs in an executable have to be virtual addresses. */
5824 if (finfo->info->emitrelocations)
5825 irela->r_offset += o->output_section->vma;
5826
252b5132
RH
5827 r_symndx = ELF_R_SYM (irela->r_info);
5828
5829 if (r_symndx == 0)
5830 continue;
5831
5832 if (r_symndx >= locsymcount
5833 || (elf_bad_symtab (input_bfd)
5834 && finfo->sections[r_symndx] == NULL))
5835 {
5836 struct elf_link_hash_entry *rh;
5837 long indx;
5838
5839 /* This is a reloc against a global symbol. We
5840 have not yet output all the local symbols, so
5841 we do not know the symbol index of any global
5842 symbol. We set the rel_hash entry for this
5843 reloc to point to the global hash table entry
5844 for this symbol. The symbol index is then
5845 set at the end of elf_bfd_final_link. */
5846 indx = r_symndx - extsymoff;
5847 rh = elf_sym_hashes (input_bfd)[indx];
5848 while (rh->root.type == bfd_link_hash_indirect
5849 || rh->root.type == bfd_link_hash_warning)
5850 rh = (struct elf_link_hash_entry *) rh->root.u.i.link;
5851
5852 /* Setting the index to -2 tells
5853 elf_link_output_extsym that this symbol is
5854 used by a reloc. */
5855 BFD_ASSERT (rh->indx < 0);
5856 rh->indx = -2;
5857
5858 *rel_hash = rh;
5859
5860 continue;
5861 }
5862
3e932841 5863 /* This is a reloc against a local symbol. */
252b5132
RH
5864
5865 *rel_hash = NULL;
5866 isym = finfo->internal_syms + r_symndx;
5867 sec = finfo->sections[r_symndx];
5868 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
5869 {
5870 /* I suppose the backend ought to fill in the
5871 section of any STT_SECTION symbol against a
5872 processor specific section. If we have
5873 discarded a section, the output_section will
5874 be the absolute section. */
5875 if (sec != NULL
5876 && (bfd_is_abs_section (sec)
5877 || (sec->output_section != NULL
5878 && bfd_is_abs_section (sec->output_section))))
5879 r_symndx = 0;
5880 else if (sec == NULL || sec->owner == NULL)
5881 {
5882 bfd_set_error (bfd_error_bad_value);
5883 return false;
5884 }
5885 else
5886 {
5887 r_symndx = sec->output_section->target_index;
5888 BFD_ASSERT (r_symndx != 0);
5889 }
5890 }
5891 else
5892 {
5893 if (finfo->indices[r_symndx] == -1)
5894 {
5895 unsigned long link;
5896 const char *name;
5897 asection *osec;
5898
5899 if (finfo->info->strip == strip_all)
5900 {
5901 /* You can't do ld -r -s. */
5902 bfd_set_error (bfd_error_invalid_operation);
5903 return false;
5904 }
5905
5906 /* This symbol was skipped earlier, but
5907 since it is needed by a reloc, we
5908 must output it now. */
5909 link = symtab_hdr->sh_link;
5910 name = bfd_elf_string_from_elf_section (input_bfd,
5911 link,
5912 isym->st_name);
5913 if (name == NULL)
5914 return false;
5915
5916 osec = sec->output_section;
5917 isym->st_shndx =
5918 _bfd_elf_section_from_bfd_section (output_bfd,
5919 osec);
5920 if (isym->st_shndx == (unsigned short) -1)
5921 return false;
5922
5923 isym->st_value += sec->output_offset;
5924 if (! finfo->info->relocateable)
5925 isym->st_value += osec->vma;
5926
5927 finfo->indices[r_symndx] = bfd_get_symcount (output_bfd);
5928
5929 if (! elf_link_output_sym (finfo, name, isym, sec))
5930 return false;
5931 }
5932
5933 r_symndx = finfo->indices[r_symndx];
5934 }
5935
5936 irela->r_info = ELF_R_INFO (r_symndx,
5937 ELF_R_TYPE (irela->r_info));
5938 }
5939
5940 /* Swap out the relocs. */
5941 input_rel_hdr = &elf_section_data (o)->rel_hdr;
3e932841 5942 elf_link_output_relocs (output_bfd, o,
23bc299b
MM
5943 input_rel_hdr,
5944 internal_relocs);
3e932841 5945 internal_relocs
23bc299b
MM
5946 += input_rel_hdr->sh_size / input_rel_hdr->sh_entsize;
5947 input_rel_hdr = elf_section_data (o)->rel_hdr2;
5948 if (input_rel_hdr)
3e932841 5949 elf_link_output_relocs (output_bfd, o,
23bc299b
MM
5950 input_rel_hdr,
5951 internal_relocs);
252b5132
RH
5952 }
5953 }
5954
5955 /* Write out the modified section contents. */
f5fa8ca2
JJ
5956 if (elf_section_data (o)->stab_info)
5957 {
5958 if (! (_bfd_write_section_stabs
5959 (output_bfd, &elf_hash_table (finfo->info)->stab_info,
5960 o, &elf_section_data (o)->stab_info, contents)))
5961 return false;
5962 }
5963 else if (elf_section_data (o)->merge_info)
5964 {
5965 if (! (_bfd_write_merged_section
5966 (output_bfd, o, elf_section_data (o)->merge_info)))
5967 return false;
5968 }
5969 else
252b5132
RH
5970 {
5971 if (! (o->flags & SEC_EXCLUDE) &&
5972 ! bfd_set_section_contents (output_bfd, o->output_section,
5973 contents, o->output_offset,
5974 (o->_cooked_size != 0
5975 ? o->_cooked_size
5976 : o->_raw_size)))
5977 return false;
252b5132
RH
5978 }
5979 }
5980
5981 return true;
5982}
5983
5984/* Generate a reloc when linking an ELF file. This is a reloc
5985 requested by the linker, and does come from any input file. This
5986 is used to build constructor and destructor tables when linking
5987 with -Ur. */
5988
5989static boolean
5990elf_reloc_link_order (output_bfd, info, output_section, link_order)
5991 bfd *output_bfd;
5992 struct bfd_link_info *info;
5993 asection *output_section;
5994 struct bfd_link_order *link_order;
5995{
5996 reloc_howto_type *howto;
5997 long indx;
5998 bfd_vma offset;
5999 bfd_vma addend;
6000 struct elf_link_hash_entry **rel_hash_ptr;
6001 Elf_Internal_Shdr *rel_hdr;
32f0787a 6002 struct elf_backend_data *bed = get_elf_backend_data (output_bfd);
252b5132
RH
6003
6004 howto = bfd_reloc_type_lookup (output_bfd, link_order->u.reloc.p->reloc);
6005 if (howto == NULL)
6006 {
6007 bfd_set_error (bfd_error_bad_value);
6008 return false;
6009 }
6010
6011 addend = link_order->u.reloc.p->addend;
6012
6013 /* Figure out the symbol index. */
6014 rel_hash_ptr = (elf_section_data (output_section)->rel_hashes
31367b81
MM
6015 + elf_section_data (output_section)->rel_count
6016 + elf_section_data (output_section)->rel_count2);
252b5132
RH
6017 if (link_order->type == bfd_section_reloc_link_order)
6018 {
6019 indx = link_order->u.reloc.p->u.section->target_index;
6020 BFD_ASSERT (indx != 0);
6021 *rel_hash_ptr = NULL;
6022 }
6023 else
6024 {
6025 struct elf_link_hash_entry *h;
6026
6027 /* Treat a reloc against a defined symbol as though it were
6028 actually against the section. */
6029 h = ((struct elf_link_hash_entry *)
6030 bfd_wrapped_link_hash_lookup (output_bfd, info,
6031 link_order->u.reloc.p->u.name,
6032 false, false, true));
6033 if (h != NULL
6034 && (h->root.type == bfd_link_hash_defined
6035 || h->root.type == bfd_link_hash_defweak))
6036 {
6037 asection *section;
6038
6039 section = h->root.u.def.section;
6040 indx = section->output_section->target_index;
6041 *rel_hash_ptr = NULL;
6042 /* It seems that we ought to add the symbol value to the
6043 addend here, but in practice it has already been added
6044 because it was passed to constructor_callback. */
6045 addend += section->output_section->vma + section->output_offset;
6046 }
6047 else if (h != NULL)
6048 {
6049 /* Setting the index to -2 tells elf_link_output_extsym that
6050 this symbol is used by a reloc. */
6051 h->indx = -2;
6052 *rel_hash_ptr = h;
6053 indx = 0;
6054 }
6055 else
6056 {
6057 if (! ((*info->callbacks->unattached_reloc)
6058 (info, link_order->u.reloc.p->u.name, (bfd *) NULL,
6059 (asection *) NULL, (bfd_vma) 0)))
6060 return false;
6061 indx = 0;
6062 }
6063 }
6064
6065 /* If this is an inplace reloc, we must write the addend into the
6066 object file. */
6067 if (howto->partial_inplace && addend != 0)
6068 {
6069 bfd_size_type size;
6070 bfd_reloc_status_type rstat;
6071 bfd_byte *buf;
6072 boolean ok;
6073
6074 size = bfd_get_reloc_size (howto);
6075 buf = (bfd_byte *) bfd_zmalloc (size);
6076 if (buf == (bfd_byte *) NULL)
6077 return false;
6078 rstat = _bfd_relocate_contents (howto, output_bfd, addend, buf);
6079 switch (rstat)
6080 {
6081 case bfd_reloc_ok:
6082 break;
6083 default:
6084 case bfd_reloc_outofrange:
6085 abort ();
6086 case bfd_reloc_overflow:
6087 if (! ((*info->callbacks->reloc_overflow)
6088 (info,
6089 (link_order->type == bfd_section_reloc_link_order
6090 ? bfd_section_name (output_bfd,
6091 link_order->u.reloc.p->u.section)
6092 : link_order->u.reloc.p->u.name),
6093 howto->name, addend, (bfd *) NULL, (asection *) NULL,
6094 (bfd_vma) 0)))
6095 {
6096 free (buf);
6097 return false;
6098 }
6099 break;
6100 }
6101 ok = bfd_set_section_contents (output_bfd, output_section, (PTR) buf,
6102 (file_ptr) link_order->offset, size);
6103 free (buf);
6104 if (! ok)
6105 return false;
6106 }
6107
6108 /* The address of a reloc is relative to the section in a
6109 relocateable file, and is a virtual address in an executable
6110 file. */
6111 offset = link_order->offset;
6112 if (! info->relocateable)
6113 offset += output_section->vma;
6114
6115 rel_hdr = &elf_section_data (output_section)->rel_hdr;
6116
6117 if (rel_hdr->sh_type == SHT_REL)
6118 {
6119 Elf_Internal_Rel irel;
6120 Elf_External_Rel *erel;
6121
6122 irel.r_offset = offset;
6123 irel.r_info = ELF_R_INFO (indx, howto->type);
6124 erel = ((Elf_External_Rel *) rel_hdr->contents
0525d26e 6125 + elf_section_data (output_section)->rel_count);
32f0787a
UC
6126 if (bed->s->swap_reloc_out)
6127 (*bed->s->swap_reloc_out) (output_bfd, &irel, (bfd_byte *) erel);
6128 else
6129 elf_swap_reloc_out (output_bfd, &irel, erel);
252b5132
RH
6130 }
6131 else
6132 {
6133 Elf_Internal_Rela irela;
6134 Elf_External_Rela *erela;
6135
6136 irela.r_offset = offset;
6137 irela.r_info = ELF_R_INFO (indx, howto->type);
6138 irela.r_addend = addend;
6139 erela = ((Elf_External_Rela *) rel_hdr->contents
0525d26e 6140 + elf_section_data (output_section)->rel_count);
32f0787a
UC
6141 if (bed->s->swap_reloca_out)
6142 (*bed->s->swap_reloca_out) (output_bfd, &irela, (bfd_byte *) erela);
6143 else
6144 elf_swap_reloca_out (output_bfd, &irela, erela);
252b5132
RH
6145 }
6146
0525d26e 6147 ++elf_section_data (output_section)->rel_count;
252b5132
RH
6148
6149 return true;
6150}
252b5132
RH
6151\f
6152/* Allocate a pointer to live in a linker created section. */
6153
6154boolean
6155elf_create_pointer_linker_section (abfd, info, lsect, h, rel)
6156 bfd *abfd;
6157 struct bfd_link_info *info;
6158 elf_linker_section_t *lsect;
6159 struct elf_link_hash_entry *h;
6160 const Elf_Internal_Rela *rel;
6161{
6162 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
6163 elf_linker_section_pointers_t *linker_section_ptr;
6164 unsigned long r_symndx = ELF_R_SYM (rel->r_info);;
6165
6166 BFD_ASSERT (lsect != NULL);
6167
6168 /* Is this a global symbol? */
6169 if (h != NULL)
6170 {
6171 /* Has this symbol already been allocated, if so, our work is done */
6172 if (_bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
6173 rel->r_addend,
6174 lsect->which))
6175 return true;
6176
6177 ptr_linker_section_ptr = &h->linker_section_pointer;
6178 /* Make sure this symbol is output as a dynamic symbol. */
6179 if (h->dynindx == -1)
6180 {
6181 if (! elf_link_record_dynamic_symbol (info, h))
6182 return false;
6183 }
6184
6185 if (lsect->rel_section)
6186 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
6187 }
6188
6189 else /* Allocation of a pointer to a local symbol */
6190 {
6191 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
6192
6193 /* Allocate a table to hold the local symbols if first time */
6194 if (!ptr)
6195 {
6196 unsigned int num_symbols = elf_tdata (abfd)->symtab_hdr.sh_info;
6197 register unsigned int i;
6198
6199 ptr = (elf_linker_section_pointers_t **)
6200 bfd_alloc (abfd, num_symbols * sizeof (elf_linker_section_pointers_t *));
6201
6202 if (!ptr)
6203 return false;
6204
6205 elf_local_ptr_offsets (abfd) = ptr;
6206 for (i = 0; i < num_symbols; i++)
6207 ptr[i] = (elf_linker_section_pointers_t *)0;
6208 }
6209
6210 /* Has this symbol already been allocated, if so, our work is done */
6211 if (_bfd_elf_find_pointer_linker_section (ptr[r_symndx],
6212 rel->r_addend,
6213 lsect->which))
6214 return true;
6215
6216 ptr_linker_section_ptr = &ptr[r_symndx];
6217
6218 if (info->shared)
6219 {
6220 /* If we are generating a shared object, we need to
6221 output a R_<xxx>_RELATIVE reloc so that the
6222 dynamic linker can adjust this GOT entry. */
6223 BFD_ASSERT (lsect->rel_section != NULL);
6224 lsect->rel_section->_raw_size += sizeof (Elf_External_Rela);
6225 }
6226 }
6227
6228 /* Allocate space for a pointer in the linker section, and allocate a new pointer record
6229 from internal memory. */
6230 BFD_ASSERT (ptr_linker_section_ptr != NULL);
6231 linker_section_ptr = (elf_linker_section_pointers_t *)
6232 bfd_alloc (abfd, sizeof (elf_linker_section_pointers_t));
6233
6234 if (!linker_section_ptr)
6235 return false;
6236
6237 linker_section_ptr->next = *ptr_linker_section_ptr;
6238 linker_section_ptr->addend = rel->r_addend;
6239 linker_section_ptr->which = lsect->which;
6240 linker_section_ptr->written_address_p = false;
6241 *ptr_linker_section_ptr = linker_section_ptr;
6242
6243#if 0
6244 if (lsect->hole_size && lsect->hole_offset < lsect->max_hole_offset)
6245 {
6246 linker_section_ptr->offset = lsect->section->_raw_size - lsect->hole_size + (ARCH_SIZE / 8);
6247 lsect->hole_offset += ARCH_SIZE / 8;
6248 lsect->sym_offset += ARCH_SIZE / 8;
6249 if (lsect->sym_hash) /* Bump up symbol value if needed */
6250 {
6251 lsect->sym_hash->root.u.def.value += ARCH_SIZE / 8;
6252#ifdef DEBUG
6253 fprintf (stderr, "Bump up %s by %ld, current value = %ld\n",
6254 lsect->sym_hash->root.root.string,
6255 (long)ARCH_SIZE / 8,
6256 (long)lsect->sym_hash->root.u.def.value);
6257#endif
6258 }
6259 }
6260 else
6261#endif
6262 linker_section_ptr->offset = lsect->section->_raw_size;
6263
6264 lsect->section->_raw_size += ARCH_SIZE / 8;
6265
6266#ifdef DEBUG
6267 fprintf (stderr, "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
6268 lsect->name, (long)linker_section_ptr->offset, (long)lsect->section->_raw_size);
6269#endif
6270
6271 return true;
6272}
252b5132
RH
6273\f
6274#if ARCH_SIZE==64
6275#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_64 (BFD, VAL, ADDR)
6276#endif
6277#if ARCH_SIZE==32
6278#define bfd_put_ptr(BFD,VAL,ADDR) bfd_put_32 (BFD, VAL, ADDR)
6279#endif
6280
6281/* Fill in the address for a pointer generated in alinker section. */
6282
6283bfd_vma
6284elf_finish_pointer_linker_section (output_bfd, input_bfd, info, lsect, h, relocation, rel, relative_reloc)
6285 bfd *output_bfd;
6286 bfd *input_bfd;
6287 struct bfd_link_info *info;
6288 elf_linker_section_t *lsect;
6289 struct elf_link_hash_entry *h;
6290 bfd_vma relocation;
6291 const Elf_Internal_Rela *rel;
6292 int relative_reloc;
6293{
6294 elf_linker_section_pointers_t *linker_section_ptr;
6295
6296 BFD_ASSERT (lsect != NULL);
6297
6298 if (h != NULL) /* global symbol */
6299 {
6300 linker_section_ptr = _bfd_elf_find_pointer_linker_section (h->linker_section_pointer,
6301 rel->r_addend,
6302 lsect->which);
6303
6304 BFD_ASSERT (linker_section_ptr != NULL);
6305
6306 if (! elf_hash_table (info)->dynamic_sections_created
6307 || (info->shared
6308 && info->symbolic
6309 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)))
6310 {
6311 /* This is actually a static link, or it is a
6312 -Bsymbolic link and the symbol is defined
6313 locally. We must initialize this entry in the
6314 global section.
6315
6316 When doing a dynamic link, we create a .rela.<xxx>
6317 relocation entry to initialize the value. This
6318 is done in the finish_dynamic_symbol routine. */
6319 if (!linker_section_ptr->written_address_p)
6320 {
6321 linker_section_ptr->written_address_p = true;
6322 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
6323 lsect->section->contents + linker_section_ptr->offset);
6324 }
6325 }
6326 }
6327 else /* local symbol */
6328 {
6329 unsigned long r_symndx = ELF_R_SYM (rel->r_info);
6330 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
6331 BFD_ASSERT (elf_local_ptr_offsets (input_bfd)[r_symndx] != NULL);
6332 linker_section_ptr = _bfd_elf_find_pointer_linker_section (elf_local_ptr_offsets (input_bfd)[r_symndx],
6333 rel->r_addend,
6334 lsect->which);
6335
6336 BFD_ASSERT (linker_section_ptr != NULL);
6337
6338 /* Write out pointer if it hasn't been rewritten out before */
6339 if (!linker_section_ptr->written_address_p)
6340 {
6341 linker_section_ptr->written_address_p = true;
6342 bfd_put_ptr (output_bfd, relocation + linker_section_ptr->addend,
6343 lsect->section->contents + linker_section_ptr->offset);
6344
6345 if (info->shared)
6346 {
6347 asection *srel = lsect->rel_section;
6348 Elf_Internal_Rela outrel;
6349
6350 /* We need to generate a relative reloc for the dynamic linker. */
6351 if (!srel)
6352 lsect->rel_section = srel = bfd_get_section_by_name (elf_hash_table (info)->dynobj,
6353 lsect->rel_name);
6354
6355 BFD_ASSERT (srel != NULL);
6356
6357 outrel.r_offset = (lsect->section->output_section->vma
6358 + lsect->section->output_offset
6359 + linker_section_ptr->offset);
6360 outrel.r_info = ELF_R_INFO (0, relative_reloc);
6361 outrel.r_addend = 0;
6362 elf_swap_reloca_out (output_bfd, &outrel,
6363 (((Elf_External_Rela *)
6364 lsect->section->contents)
0525d26e
ILT
6365 + elf_section_data (lsect->section)->rel_count));
6366 ++elf_section_data (lsect->section)->rel_count;
252b5132
RH
6367 }
6368 }
6369 }
6370
6371 relocation = (lsect->section->output_offset
6372 + linker_section_ptr->offset
6373 - lsect->hole_offset
6374 - lsect->sym_offset);
6375
6376#ifdef DEBUG
6377 fprintf (stderr, "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6378 lsect->name, (long)relocation, (long)relocation);
6379#endif
6380
6381 /* Subtract out the addend, because it will get added back in by the normal
6382 processing. */
6383 return relocation - linker_section_ptr->addend;
6384}
6385\f
6386/* Garbage collect unused sections. */
6387
6388static boolean elf_gc_mark
6389 PARAMS ((struct bfd_link_info *info, asection *sec,
6390 asection * (*gc_mark_hook)
6391 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
6392 struct elf_link_hash_entry *, Elf_Internal_Sym *))));
6393
6394static boolean elf_gc_sweep
6395 PARAMS ((struct bfd_link_info *info,
6396 boolean (*gc_sweep_hook)
6397 PARAMS ((bfd *abfd, struct bfd_link_info *info, asection *o,
6398 const Elf_Internal_Rela *relocs))));
6399
6400static boolean elf_gc_sweep_symbol
6401 PARAMS ((struct elf_link_hash_entry *h, PTR idxptr));
6402
6403static boolean elf_gc_allocate_got_offsets
6404 PARAMS ((struct elf_link_hash_entry *h, PTR offarg));
6405
6406static boolean elf_gc_propagate_vtable_entries_used
6407 PARAMS ((struct elf_link_hash_entry *h, PTR dummy));
6408
6409static boolean elf_gc_smash_unused_vtentry_relocs
6410 PARAMS ((struct elf_link_hash_entry *h, PTR dummy));
6411
6412/* The mark phase of garbage collection. For a given section, mark
6413 it, and all the sections which define symbols to which it refers. */
6414
6415static boolean
6416elf_gc_mark (info, sec, gc_mark_hook)
6417 struct bfd_link_info *info;
6418 asection *sec;
6419 asection * (*gc_mark_hook)
6420 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
6421 struct elf_link_hash_entry *, Elf_Internal_Sym *));
6422{
6423 boolean ret = true;
6424
6425 sec->gc_mark = 1;
6426
6427 /* Look through the section relocs. */
6428
6429 if ((sec->flags & SEC_RELOC) != 0 && sec->reloc_count > 0)
6430 {
6431 Elf_Internal_Rela *relstart, *rel, *relend;
6432 Elf_Internal_Shdr *symtab_hdr;
6433 struct elf_link_hash_entry **sym_hashes;
6434 size_t nlocsyms;
6435 size_t extsymoff;
6436 Elf_External_Sym *locsyms, *freesyms = NULL;
6437 bfd *input_bfd = sec->owner;
c7ac6ff8 6438 struct elf_backend_data *bed = get_elf_backend_data (input_bfd);
252b5132
RH
6439
6440 /* GCFIXME: how to arrange so that relocs and symbols are not
6441 reread continually? */
6442
6443 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
6444 sym_hashes = elf_sym_hashes (input_bfd);
6445
6446 /* Read the local symbols. */
6447 if (elf_bad_symtab (input_bfd))
6448 {
6449 nlocsyms = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
6450 extsymoff = 0;
6451 }
6452 else
6453 extsymoff = nlocsyms = symtab_hdr->sh_info;
6454 if (symtab_hdr->contents)
6455 locsyms = (Elf_External_Sym *) symtab_hdr->contents;
6456 else if (nlocsyms == 0)
6457 locsyms = NULL;
6458 else
6459 {
6460 locsyms = freesyms =
6461 bfd_malloc (nlocsyms * sizeof (Elf_External_Sym));
6462 if (freesyms == NULL
6463 || bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
6464 || (bfd_read (locsyms, sizeof (Elf_External_Sym),
6465 nlocsyms, input_bfd)
6466 != nlocsyms * sizeof (Elf_External_Sym)))
6467 {
6468 ret = false;
6469 goto out1;
6470 }
6471 }
6472
6473 /* Read the relocations. */
6474 relstart = (NAME(_bfd_elf,link_read_relocs)
6475 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL,
6476 info->keep_memory));
6477 if (relstart == NULL)
6478 {
6479 ret = false;
6480 goto out1;
6481 }
c7ac6ff8 6482 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132
RH
6483
6484 for (rel = relstart; rel < relend; rel++)
6485 {
6486 unsigned long r_symndx;
6487 asection *rsec;
6488 struct elf_link_hash_entry *h;
6489 Elf_Internal_Sym s;
6490
6491 r_symndx = ELF_R_SYM (rel->r_info);
6492 if (r_symndx == 0)
6493 continue;
6494
6495 if (elf_bad_symtab (sec->owner))
6496 {
6497 elf_swap_symbol_in (input_bfd, &locsyms[r_symndx], &s);
6498 if (ELF_ST_BIND (s.st_info) == STB_LOCAL)
3e932841 6499 rsec = (*gc_mark_hook) (sec->owner, info, rel, NULL, &s);
252b5132
RH
6500 else
6501 {
6502 h = sym_hashes[r_symndx - extsymoff];
3e932841 6503 rsec = (*gc_mark_hook) (sec->owner, info, rel, h, NULL);
252b5132
RH
6504 }
6505 }
6506 else if (r_symndx >= nlocsyms)
6507 {
6508 h = sym_hashes[r_symndx - extsymoff];
3e932841 6509 rsec = (*gc_mark_hook) (sec->owner, info, rel, h, NULL);
252b5132
RH
6510 }
6511 else
6512 {
6513 elf_swap_symbol_in (input_bfd, &locsyms[r_symndx], &s);
3e932841 6514 rsec = (*gc_mark_hook) (sec->owner, info, rel, NULL, &s);
252b5132
RH
6515 }
6516
6517 if (rsec && !rsec->gc_mark)
6518 if (!elf_gc_mark (info, rsec, gc_mark_hook))
6519 {
6520 ret = false;
6521 goto out2;
6522 }
6523 }
6524
6525 out2:
6526 if (!info->keep_memory)
6527 free (relstart);
6528 out1:
6529 if (freesyms)
6530 free (freesyms);
6531 }
6532
6533 return ret;
6534}
6535
6536/* The sweep phase of garbage collection. Remove all garbage sections. */
6537
6538static boolean
6539elf_gc_sweep (info, gc_sweep_hook)
6540 struct bfd_link_info *info;
6541 boolean (*gc_sweep_hook)
6542 PARAMS ((bfd *abfd, struct bfd_link_info *info, asection *o,
6543 const Elf_Internal_Rela *relocs));
6544{
6545 bfd *sub;
6546
6547 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
6548 {
6549 asection *o;
6550
f6af82bd
AM
6551 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
6552 continue;
6553
252b5132
RH
6554 for (o = sub->sections; o != NULL; o = o->next)
6555 {
6556 /* Keep special sections. Keep .debug sections. */
6557 if ((o->flags & SEC_LINKER_CREATED)
6558 || (o->flags & SEC_DEBUGGING))
6559 o->gc_mark = 1;
6560
6561 if (o->gc_mark)
6562 continue;
6563
6564 /* Skip sweeping sections already excluded. */
6565 if (o->flags & SEC_EXCLUDE)
6566 continue;
6567
6568 /* Since this is early in the link process, it is simple
6569 to remove a section from the output. */
6570 o->flags |= SEC_EXCLUDE;
6571
6572 /* But we also have to update some of the relocation
6573 info we collected before. */
6574 if (gc_sweep_hook
6575 && (o->flags & SEC_RELOC) && o->reloc_count > 0)
6576 {
6577 Elf_Internal_Rela *internal_relocs;
6578 boolean r;
6579
6580 internal_relocs = (NAME(_bfd_elf,link_read_relocs)
6581 (o->owner, o, NULL, NULL, info->keep_memory));
6582 if (internal_relocs == NULL)
6583 return false;
6584
3e932841 6585 r = (*gc_sweep_hook) (o->owner, info, o, internal_relocs);
252b5132
RH
6586
6587 if (!info->keep_memory)
6588 free (internal_relocs);
6589
6590 if (!r)
6591 return false;
6592 }
6593 }
6594 }
6595
6596 /* Remove the symbols that were in the swept sections from the dynamic
6597 symbol table. GCFIXME: Anyone know how to get them out of the
6598 static symbol table as well? */
6599 {
6600 int i = 0;
6601
6602 elf_link_hash_traverse (elf_hash_table (info),
6603 elf_gc_sweep_symbol,
6604 (PTR) &i);
6605
6606 elf_hash_table (info)->dynsymcount = i;
6607 }
6608
6609 return true;
6610}
6611
6612/* Sweep symbols in swept sections. Called via elf_link_hash_traverse. */
6613
6614static boolean
6615elf_gc_sweep_symbol (h, idxptr)
6616 struct elf_link_hash_entry *h;
6617 PTR idxptr;
6618{
6619 int *idx = (int *) idxptr;
6620
6621 if (h->dynindx != -1
6622 && ((h->root.type != bfd_link_hash_defined
6623 && h->root.type != bfd_link_hash_defweak)
6624 || h->root.u.def.section->gc_mark))
6625 h->dynindx = (*idx)++;
6626
6627 return true;
6628}
6629
6630/* Propogate collected vtable information. This is called through
6631 elf_link_hash_traverse. */
6632
6633static boolean
6634elf_gc_propagate_vtable_entries_used (h, okp)
6635 struct elf_link_hash_entry *h;
6636 PTR okp;
6637{
3e932841 6638 /* Those that are not vtables. */
252b5132
RH
6639 if (h->vtable_parent == NULL)
6640 return true;
6641
6642 /* Those vtables that do not have parents, we cannot merge. */
6643 if (h->vtable_parent == (struct elf_link_hash_entry *) -1)
6644 return true;
6645
6646 /* If we've already been done, exit. */
6647 if (h->vtable_entries_used && h->vtable_entries_used[-1])
6648 return true;
6649
6650 /* Make sure the parent's table is up to date. */
6651 elf_gc_propagate_vtable_entries_used (h->vtable_parent, okp);
6652
6653 if (h->vtable_entries_used == NULL)
6654 {
6655 /* None of this table's entries were referenced. Re-use the
6656 parent's table. */
6657 h->vtable_entries_used = h->vtable_parent->vtable_entries_used;
6658 h->vtable_entries_size = h->vtable_parent->vtable_entries_size;
6659 }
6660 else
6661 {
6662 size_t n;
6663 boolean *cu, *pu;
6664
6665 /* Or the parent's entries into ours. */
6666 cu = h->vtable_entries_used;
6667 cu[-1] = true;
6668 pu = h->vtable_parent->vtable_entries_used;
6669 if (pu != NULL)
6670 {
6671 n = h->vtable_parent->vtable_entries_size / FILE_ALIGN;
6672 while (--n != 0)
6673 {
6674 if (*pu) *cu = true;
6675 pu++, cu++;
6676 }
6677 }
6678 }
6679
6680 return true;
6681}
6682
6683static boolean
6684elf_gc_smash_unused_vtentry_relocs (h, okp)
6685 struct elf_link_hash_entry *h;
6686 PTR okp;
6687{
6688 asection *sec;
6689 bfd_vma hstart, hend;
6690 Elf_Internal_Rela *relstart, *relend, *rel;
c7ac6ff8 6691 struct elf_backend_data *bed;
252b5132
RH
6692
6693 /* Take care of both those symbols that do not describe vtables as
6694 well as those that are not loaded. */
6695 if (h->vtable_parent == NULL)
6696 return true;
6697
6698 BFD_ASSERT (h->root.type == bfd_link_hash_defined
6699 || h->root.type == bfd_link_hash_defweak);
6700
6701 sec = h->root.u.def.section;
6702 hstart = h->root.u.def.value;
6703 hend = hstart + h->size;
6704
6705 relstart = (NAME(_bfd_elf,link_read_relocs)
6706 (sec->owner, sec, NULL, (Elf_Internal_Rela *) NULL, true));
6707 if (!relstart)
6708 return *(boolean *)okp = false;
c7ac6ff8
MM
6709 bed = get_elf_backend_data (sec->owner);
6710 relend = relstart + sec->reloc_count * bed->s->int_rels_per_ext_rel;
252b5132
RH
6711
6712 for (rel = relstart; rel < relend; ++rel)
6713 if (rel->r_offset >= hstart && rel->r_offset < hend)
6714 {
6715 /* If the entry is in use, do nothing. */
6716 if (h->vtable_entries_used
6717 && (rel->r_offset - hstart) < h->vtable_entries_size)
6718 {
6719 bfd_vma entry = (rel->r_offset - hstart) / FILE_ALIGN;
6720 if (h->vtable_entries_used[entry])
6721 continue;
6722 }
6723 /* Otherwise, kill it. */
6724 rel->r_offset = rel->r_info = rel->r_addend = 0;
6725 }
6726
6727 return true;
6728}
6729
6730/* Do mark and sweep of unused sections. */
6731
6732boolean
6733elf_gc_sections (abfd, info)
6734 bfd *abfd;
6735 struct bfd_link_info *info;
6736{
6737 boolean ok = true;
6738 bfd *sub;
6739 asection * (*gc_mark_hook)
6740 PARAMS ((bfd *abfd, struct bfd_link_info *, Elf_Internal_Rela *,
6741 struct elf_link_hash_entry *h, Elf_Internal_Sym *));
6742
6743 if (!get_elf_backend_data (abfd)->can_gc_sections
6d3e950b 6744 || info->relocateable || info->emitrelocations
252b5132
RH
6745 || elf_hash_table (info)->dynamic_sections_created)
6746 return true;
6747
6748 /* Apply transitive closure to the vtable entry usage info. */
6749 elf_link_hash_traverse (elf_hash_table (info),
6750 elf_gc_propagate_vtable_entries_used,
6751 (PTR) &ok);
6752 if (!ok)
6753 return false;
6754
6755 /* Kill the vtable relocations that were not used. */
6756 elf_link_hash_traverse (elf_hash_table (info),
6757 elf_gc_smash_unused_vtentry_relocs,
6758 (PTR) &ok);
6759 if (!ok)
6760 return false;
6761
6762 /* Grovel through relocs to find out who stays ... */
6763
6764 gc_mark_hook = get_elf_backend_data (abfd)->gc_mark_hook;
6765 for (sub = info->input_bfds; sub != NULL; sub = sub->link_next)
6766 {
6767 asection *o;
f6af82bd
AM
6768
6769 if (bfd_get_flavour (sub) != bfd_target_elf_flavour)
6770 continue;
6771
252b5132
RH
6772 for (o = sub->sections; o != NULL; o = o->next)
6773 {
6774 if (o->flags & SEC_KEEP)
6775 if (!elf_gc_mark (info, o, gc_mark_hook))
6776 return false;
6777 }
6778 }
6779
6780 /* ... and mark SEC_EXCLUDE for those that go. */
6781 if (!elf_gc_sweep(info, get_elf_backend_data (abfd)->gc_sweep_hook))
6782 return false;
6783
6784 return true;
6785}
6786\f
6787/* Called from check_relocs to record the existance of a VTINHERIT reloc. */
6788
6789boolean
6790elf_gc_record_vtinherit (abfd, sec, h, offset)
6791 bfd *abfd;
6792 asection *sec;
6793 struct elf_link_hash_entry *h;
6794 bfd_vma offset;
6795{
6796 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
6797 struct elf_link_hash_entry **search, *child;
6798 bfd_size_type extsymcount;
6799
6800 /* The sh_info field of the symtab header tells us where the
6801 external symbols start. We don't care about the local symbols at
6802 this point. */
6803 extsymcount = elf_tdata (abfd)->symtab_hdr.sh_size/sizeof (Elf_External_Sym);
6804 if (!elf_bad_symtab (abfd))
6805 extsymcount -= elf_tdata (abfd)->symtab_hdr.sh_info;
6806
6807 sym_hashes = elf_sym_hashes (abfd);
6808 sym_hashes_end = sym_hashes + extsymcount;
6809
6810 /* Hunt down the child symbol, which is in this section at the same
6811 offset as the relocation. */
6812 for (search = sym_hashes; search != sym_hashes_end; ++search)
6813 {
6814 if ((child = *search) != NULL
6815 && (child->root.type == bfd_link_hash_defined
6816 || child->root.type == bfd_link_hash_defweak)
6817 && child->root.u.def.section == sec
6818 && child->root.u.def.value == offset)
6819 goto win;
6820 }
6821
6822 (*_bfd_error_handler) ("%s: %s+%lu: No symbol found for INHERIT",
6823 bfd_get_filename (abfd), sec->name,
6824 (unsigned long)offset);
6825 bfd_set_error (bfd_error_invalid_operation);
6826 return false;
6827
6828win:
6829 if (!h)
6830 {
6831 /* This *should* only be the absolute section. It could potentially
6832 be that someone has defined a non-global vtable though, which
6833 would be bad. It isn't worth paging in the local symbols to be
6834 sure though; that case should simply be handled by the assembler. */
6835
6836 child->vtable_parent = (struct elf_link_hash_entry *) -1;
6837 }
6838 else
6839 child->vtable_parent = h;
6840
6841 return true;
6842}
6843
6844/* Called from check_relocs to record the existance of a VTENTRY reloc. */
6845
6846boolean
6847elf_gc_record_vtentry (abfd, sec, h, addend)
7442e600
ILT
6848 bfd *abfd ATTRIBUTE_UNUSED;
6849 asection *sec ATTRIBUTE_UNUSED;
252b5132
RH
6850 struct elf_link_hash_entry *h;
6851 bfd_vma addend;
6852{
6853 if (addend >= h->vtable_entries_size)
6854 {
6855 size_t size, bytes;
6856 boolean *ptr = h->vtable_entries_used;
6857
6858 /* While the symbol is undefined, we have to be prepared to handle
6859 a zero size. */
6860 if (h->root.type == bfd_link_hash_undefined)
6861 size = addend;
6862 else
6863 {
6864 size = h->size;
6865 if (size < addend)
6866 {
6867 /* Oops! We've got a reference past the defined end of
6868 the table. This is probably a bug -- shall we warn? */
6869 size = addend;
6870 }
6871 }
6872
6873 /* Allocate one extra entry for use as a "done" flag for the
6874 consolidation pass. */
fed79cc6 6875 bytes = (size / FILE_ALIGN + 1) * sizeof (boolean);
252b5132
RH
6876
6877 if (ptr)
6878 {
fed79cc6 6879 ptr = bfd_realloc (ptr - 1, bytes);
3e932841 6880
fed79cc6
NC
6881 if (ptr != NULL)
6882 {
6883 size_t oldbytes;
252b5132 6884
fed79cc6
NC
6885 oldbytes = (h->vtable_entries_size/FILE_ALIGN + 1) * sizeof (boolean);
6886 memset (((char *)ptr) + oldbytes, 0, bytes - oldbytes);
6887 }
252b5132
RH
6888 }
6889 else
fed79cc6 6890 ptr = bfd_zmalloc (bytes);
252b5132 6891
fed79cc6
NC
6892 if (ptr == NULL)
6893 return false;
3e932841 6894
252b5132 6895 /* And arrange for that done flag to be at index -1. */
fed79cc6 6896 h->vtable_entries_used = ptr + 1;
252b5132
RH
6897 h->vtable_entries_size = size;
6898 }
3e932841 6899
252b5132
RH
6900 h->vtable_entries_used[addend / FILE_ALIGN] = true;
6901
6902 return true;
6903}
6904
6905/* And an accompanying bit to work out final got entry offsets once
6906 we're done. Should be called from final_link. */
6907
6908boolean
6909elf_gc_common_finalize_got_offsets (abfd, info)
6910 bfd *abfd;
6911 struct bfd_link_info *info;
6912{
6913 bfd *i;
6914 struct elf_backend_data *bed = get_elf_backend_data (abfd);
6915 bfd_vma gotoff;
6916
6917 /* The GOT offset is relative to the .got section, but the GOT header is
6918 put into the .got.plt section, if the backend uses it. */
6919 if (bed->want_got_plt)
6920 gotoff = 0;
6921 else
6922 gotoff = bed->got_header_size;
6923
6924 /* Do the local .got entries first. */
6925 for (i = info->input_bfds; i; i = i->link_next)
6926 {
f6af82bd 6927 bfd_signed_vma *local_got;
252b5132
RH
6928 bfd_size_type j, locsymcount;
6929 Elf_Internal_Shdr *symtab_hdr;
6930
f6af82bd
AM
6931 if (bfd_get_flavour (i) != bfd_target_elf_flavour)
6932 continue;
6933
6934 local_got = elf_local_got_refcounts (i);
252b5132
RH
6935 if (!local_got)
6936 continue;
6937
6938 symtab_hdr = &elf_tdata (i)->symtab_hdr;
6939 if (elf_bad_symtab (i))
6940 locsymcount = symtab_hdr->sh_size / sizeof (Elf_External_Sym);
6941 else
6942 locsymcount = symtab_hdr->sh_info;
6943
6944 for (j = 0; j < locsymcount; ++j)
6945 {
6946 if (local_got[j] > 0)
6947 {
6948 local_got[j] = gotoff;
6949 gotoff += ARCH_SIZE / 8;
6950 }
6951 else
6952 local_got[j] = (bfd_vma) -1;
6953 }
6954 }
6955
dd5724d5
AM
6956 /* Then the global .got entries. .plt refcounts are handled by
6957 adjust_dynamic_symbol */
252b5132
RH
6958 elf_link_hash_traverse (elf_hash_table (info),
6959 elf_gc_allocate_got_offsets,
6960 (PTR) &gotoff);
6961 return true;
6962}
6963
6964/* We need a special top-level link routine to convert got reference counts
6965 to real got offsets. */
6966
6967static boolean
6968elf_gc_allocate_got_offsets (h, offarg)
6969 struct elf_link_hash_entry *h;
6970 PTR offarg;
6971{
6972 bfd_vma *off = (bfd_vma *) offarg;
6973
6974 if (h->got.refcount > 0)
6975 {
6976 h->got.offset = off[0];
6977 off[0] += ARCH_SIZE / 8;
6978 }
6979 else
6980 h->got.offset = (bfd_vma) -1;
6981
6982 return true;
6983}
6984
6985/* Many folk need no more in the way of final link than this, once
6986 got entry reference counting is enabled. */
6987
6988boolean
6989elf_gc_common_final_link (abfd, info)
6990 bfd *abfd;
6991 struct bfd_link_info *info;
6992{
6993 if (!elf_gc_common_finalize_got_offsets (abfd, info))
6994 return false;
6995
6996 /* Invoke the regular ELF backend linker to do all the work. */
6997 return elf_bfd_final_link (abfd, info);
6998}
6999
7000/* This function will be called though elf_link_hash_traverse to store
7001 all hash value of the exported symbols in an array. */
7002
7003static boolean
7004elf_collect_hash_codes (h, data)
7005 struct elf_link_hash_entry *h;
7006 PTR data;
7007{
7008 unsigned long **valuep = (unsigned long **) data;
7009 const char *name;
7010 char *p;
7011 unsigned long ha;
7012 char *alc = NULL;
7013
7014 /* Ignore indirect symbols. These are added by the versioning code. */
7015 if (h->dynindx == -1)
7016 return true;
7017
7018 name = h->root.root.string;
7019 p = strchr (name, ELF_VER_CHR);
7020 if (p != NULL)
7021 {
7022 alc = bfd_malloc (p - name + 1);
7023 memcpy (alc, name, p - name);
7024 alc[p - name] = '\0';
7025 name = alc;
7026 }
7027
7028 /* Compute the hash value. */
7029 ha = bfd_elf_hash (name);
7030
7031 /* Store the found hash value in the array given as the argument. */
7032 *(*valuep)++ = ha;
7033
7034 /* And store it in the struct so that we can put it in the hash table
7035 later. */
7036 h->elf_hash_value = ha;
7037
7038 if (alc != NULL)
7039 free (alc);
7040
7041 return true;
7042}
This page took 0.390937 seconds and 4 git commands to generate.